Wemoweh Code

Since many network security components work by identifying either suspicious behavior or known code signatures, how worried should we be about worms that sleep on our systems? Part of me says that the possibility of malicious code, digital Manchurian Candidates...

July 16, 2004

1 Min Read
NetworkComputing logo in a gray background | NetworkComputing

Since many network security components work by identifying either suspicious behavior or known code signatures, how worried should we be about worms that sleep on our systems?

Part of me says that the possibility of malicious code, digital Manchurian Candidates that wait until a specific trigger is provided, is a good argument for checksumming every file on your system and doing a regular scan. The other part of me says to get real, and lose the paranioa. For now, keeping tabs on behavior is as good as it gets, but I've now got a new reason to pop awake at 0330 and stare at the ceiling. It's just what I needed.

Oh, yeah, if you're wondering about the title--go listen to "The Weavers at Carnegie Hall. All will be explained.

SUBSCRIBE TO OUR NEWSLETTER
Stay informed! Sign up to get expert advice and insight delivered direct to your inbox

You May Also Like


More Insights