Re: Re: Hidden Copying Software

From: mr.nasty@ix.netcom.com
Date: Tue Jul 25 2006 - 10:33:08 EDT


('binary' encoding is not supported, stored as-is) My .02 cents.

First of all the Prof's pc is probably left unattended to allow windows of opportunity. Although the prof may lock his PC this won't prevent someone from being able to gather the data.

One way a student can do this is if the classroom is on a network and the Prof's pc is not hardened the network will allow access to his pc and he would probably never know a student sitting in his classroom is looking through his pc.

Another way would be for a student to set up a script that would copy the entire contents of any usb device pluged into the system. If the Prof's routine is to come to the classroom, plugin his usb drive, open his notes, etc etc. You get the point.

Afterwards the students access the unattended machine and gather their loot.

If it's an unattended box chances are very low that you'd ever be able to catch the person who set it up.

By unattended box I mean one that isn't secure. No password protection, no screen saver, etc.

If the box wasn't an unattended box, then you have some pretty smart students and probaby should consider changing their majors.

------------------------------------------------------------------------------
This List Sponsored by: Cenzic

Concerned about Web Application Security?
Why not go with the #1 solution - Cenzic, the only one to win the Analyst's
Choice Award from eWeek. As attacks through web applications continue to rise,
you need to proactively protect your applications from hackers. Cenzic has the
most comprehensive solutions to meet your application security penetration
testing and vulnerability management needs. You have an option to go with a
managed service (Cenzic ClickToSecure) or an enterprise software
(Cenzic Hailstorm). Download FREE whitepaper on how a managed service can
help you: http://www.cenzic.com/news_events/wpappsec.php
And, now for a limited time we can do a FREE audit for you to confirm your
results from other product. Contact us at request@cenzic.com for details.
------------------------------------------------------------------------------



This archive was generated by hypermail 2.1.7 : Sat Apr 12 2008 - 10:56:23 EDT