Skip to content
  • Categories
  • Recent
  • Tags
  • Popular
  • World
  • Users
  • Groups
Skins
  • Light
  • Cerulean
  • Cosmo
  • Flatly
  • Journal
  • Litera
  • Lumen
  • Lux
  • Materia
  • Minty
  • Morph
  • Pulse
  • Sandstone
  • Simplex
  • Sketchy
  • Spacelab
  • United
  • Yeti
  • Zephyr
  • Dark
  • Cyborg
  • Darkly
  • Quartz
  • Slate
  • Solar
  • Superhero
  • Vapor

  • Default (No Skin)
  • No Skin
Collapse
Code Project
  1. Home
  2. The Lounge
  3. Security consideration

Security consideration

Scheduled Pinned Locked Moved The Lounge
csharpc++securitytutorial
27 Posts 14 Posters 0 Views 1 Watching
  • Oldest to Newest
  • Newest to Oldest
  • Most Votes
Reply
  • Reply as topic
Log in to reply
This topic has been deleted. Only users with topic management privileges can see it.
  • M Maximilien

    Me think EXE (dll, lib) should not be on CodeProject. Me also think that if user X does indeed force people the run a virus, user X will be banned and thrown to the wolves as fast as you can vote 1. Also, never run an EXE if you are not certain what it does.

    Watched code never compiles.

    W Offline
    W Offline
    wolfbinary
    wrote on last edited by
    #6

    Maximilien wrote:

    Also, never run an EXE if you are not certain what it does.

    I wish more end users would do or that.

    1 Reply Last reply
    0
    • S Saurabh Garg

      RichardBrock wrote:

      Antivirus won't detect the break in

      Why do you say that? Isn't Antivirus softwares supposed to flag the malicious programs? I personally run all demo applications in a virtual machine and if something goes wrong then I just get a copy from last backup. -Saurabh

      J Offline
      J Offline
      John M Drescher
      wrote on last edited by
      #7

      AV is far from full proof. In the last month I have cleaned 4 machines that had the latest Norton or Endpoint installed with up to date virus definitions. These machines were full dozens of viruses / rootkits/ malware... Some of the viruses / rootkits were from 2008 and Norton still could not remove them.

      John

      S 1 Reply Last reply
      0
      • J John M Drescher

        AV is far from full proof. In the last month I have cleaned 4 machines that had the latest Norton or Endpoint installed with up to date virus definitions. These machines were full dozens of viruses / rootkits/ malware... Some of the viruses / rootkits were from 2008 and Norton still could not remove them.

        John

        S Offline
        S Offline
        Saurabh Garg
        wrote on last edited by
        #8

        Yes I am aware of that. But I was curious about the tone of the OP. It seems he thinks that demo applications cannot be detect Antivirus software for sure. But these days Antivirus softwares use hueristics and they might be able to detect such applications. -Saurabh

        J 1 Reply Last reply
        0
        • S Saurabh Garg

          Yes I am aware of that. But I was curious about the tone of the OP. It seems he thinks that demo applications cannot be detect Antivirus software for sure. But these days Antivirus softwares use hueristics and they might be able to detect such applications. -Saurabh

          J Offline
          J Offline
          John M Drescher
          wrote on last edited by
          #9

          My point is the Norton/Endpoint with its realtime scanner and hueristics obviously did not detect these viruses to let them install themselves in these machines.

          John

          S C 2 Replies Last reply
          0
          • J John M Drescher

            My point is the Norton/Endpoint with its realtime scanner and hueristics obviously did not detect these viruses to let them install themselves in these machines.

            John

            S Offline
            S Offline
            Saurabh Garg
            wrote on last edited by
            #10

            Yes that is why I used "might be able to detect..." while OP said "wont be able to..." which is bit too strong for my taste. Many utilities from nrisoft[^] are flagged as virus/trojan because they do hooking and other low level stuff. But all of them are for genuine use. -Saurabh

            J R 2 Replies Last reply
            0
            • S Saurabh Garg

              Yes that is why I used "might be able to detect..." while OP said "wont be able to..." which is bit too strong for my taste. Many utilities from nrisoft[^] are flagged as virus/trojan because they do hooking and other low level stuff. But all of them are for genuine use. -Saurabh

              J Offline
              J Offline
              John M Drescher
              wrote on last edited by
              #11

              Saurabh.Garg wrote:

              Yes that is why I used "might be able to detect..." while OP said "wont be able to..."

              Understand now. Agreed.

              John

              1 Reply Last reply
              0
              • S Saurabh Garg

                Yes that is why I used "might be able to detect..." while OP said "wont be able to..." which is bit too strong for my taste. Many utilities from nrisoft[^] are flagged as virus/trojan because they do hooking and other low level stuff. But all of them are for genuine use. -Saurabh

                R Offline
                R Offline
                RichardBrock
                wrote on last edited by
                #12

                Your point is valid, the post was made on an understanding that antivirus software requires a known signature to detect viruses and trojans.

                S 1 Reply Last reply
                0
                • R RichardBrock

                  Think about this scenario - someone signs up to codeproject using a gmail address and an arbitrary username. The person then posts an article about a new MFC control, for example a pure win32 Ribbon control that does not require any .net components. The source code contains intentional omissions that make it impossible to compile because the real objective is to get as many people as possible to download the demo executable and run it. The executable installs a trojan or SSH tunnel giving the author full access to the victims computer, allowing for theft of source code, documents, emails etc. Antivirus won't detect the break in, a personal firewall might, I guess it depends on how good the author is at coding. My point is - perhaps there is a rather wide open back door via article demo's - and I am in no way suggesting that it's the responsibility of codeproject to police uploads, just merely raising the concern.

                  H Offline
                  H Offline
                  hammerstein05
                  wrote on last edited by
                  #13

                  A user of Code Project would (presumably) be presumed to be a developer. If you're reading an article, then you should at least be able to understand the content of the article and at least be at a level with the language it's in that you understand the demo you're about to download. I don't run code before reading through it and at least understanding where it's going, even if I don't understand all the concepts present. I also know enough networking code to spot it. If I try and build it and it doesn't work, I'll invariably delete it and mark the rating of the article one lower than I would have had the demo code worked as described by the article. I don't think it's a security risk, and I'm pretty sure a report of an article that had malicious content would be treated seriously and quickly by the admins on the site.

                  J 1 Reply Last reply
                  0
                  • R RichardBrock

                    Your point is valid, the post was made on an understanding that antivirus software requires a known signature to detect viruses and trojans.

                    S Offline
                    S Offline
                    Saurabh Garg
                    wrote on last edited by
                    #14

                    I see, it makes sense. -Saurabh

                    1 Reply Last reply
                    0
                    • R RichardBrock

                      Think about this scenario - someone signs up to codeproject using a gmail address and an arbitrary username. The person then posts an article about a new MFC control, for example a pure win32 Ribbon control that does not require any .net components. The source code contains intentional omissions that make it impossible to compile because the real objective is to get as many people as possible to download the demo executable and run it. The executable installs a trojan or SSH tunnel giving the author full access to the victims computer, allowing for theft of source code, documents, emails etc. Antivirus won't detect the break in, a personal firewall might, I guess it depends on how good the author is at coding. My point is - perhaps there is a rather wide open back door via article demo's - and I am in no way suggesting that it's the responsibility of codeproject to police uploads, just merely raising the concern.

                      S Offline
                      S Offline
                      Simon P Stevens
                      wrote on last edited by
                      #15
                      1. It's no different from any other .exe download, it will still be virus scanned by the users scanner. (And company firewall based scanners like we have). Obviously, the detection rate for new viruses is very poor for most checkers, they work on signatures, so if it's a know virus it will probably be found, if it's been custom written it's less likely, but this is completely the same as any other binary download from anywhere. 2) I would assume most CP users are above average in technical knowledge. Personally, I use the source code and build it myself. I rarely download the binaries, when I do, I'm careful with them, using virtual machines etc. If it doesn't build, I look for what's wrong, or post a message to the author, failure to build doesn't encourage me to download binaries (probably the opposite actually, I'm rarely at codeproject for binary downloads, it's usually because I want to know how to do something in code, I'm not interested in the binary) 3) Users will down vote articles where the source code doesn't build. It won't take very long for this to be noticed. In fact, It's possible the article would be removed before it even passed through the acceptance process. (You may not be aware, but new articles from non-gold members have to be approved by a gold member before they become public).

                      Simon

                      1 Reply Last reply
                      0
                      • R R Giskard Reventlov

                        Don't download the demo. Only download and compile the source code: if it doesn't compile without errors the first time I usually delete the whole thing (and maybe post a note to the author. Maybe demos should be banned (how would that work?) or articles can't be posted until you've partcipated for 6 months or made 100 other posts or some other arbitrary measure of honesty.

                        Tychotics: take us back to the moon "Life, for ever dying to be born afresh, for ever young and eager, will presently stand upon this earth as upon a footstool, and stretch out its realm amidst the stars." H. G. Wells

                        M Offline
                        M Offline
                        Mark_Wallace
                        wrote on last edited by
                        #16

                        digital man wrote:

                        Maybe demos should be banned (how would that work?)

                        By only having demos that are built by a trusted third party. A lot of work for the hamsters, though.

                        I wanna be a eunuchs developer! Pass me a bread knife!

                        R 1 Reply Last reply
                        0
                        • R RichardBrock

                          Think about this scenario - someone signs up to codeproject using a gmail address and an arbitrary username. The person then posts an article about a new MFC control, for example a pure win32 Ribbon control that does not require any .net components. The source code contains intentional omissions that make it impossible to compile because the real objective is to get as many people as possible to download the demo executable and run it. The executable installs a trojan or SSH tunnel giving the author full access to the victims computer, allowing for theft of source code, documents, emails etc. Antivirus won't detect the break in, a personal firewall might, I guess it depends on how good the author is at coding. My point is - perhaps there is a rather wide open back door via article demo's - and I am in no way suggesting that it's the responsibility of codeproject to police uploads, just merely raising the concern.

                          C Offline
                          C Offline
                          Chris Maunder
                          wrote on last edited by
                          #17

                          This is an issue for any executable (and many non-executable) downloads on the internet, and is precisely the reason we do not allow downloads that do not contain source code. I've also see anti-virus software complain about demo downloads from CodeProject - not because the code contained a trojan, but because a trojan contained the code!

                          cheers, Chris Maunder The Code Project | Co-founder Microsoft C++ MVP

                          C 1 Reply Last reply
                          0
                          • R RichardBrock

                            Think about this scenario - someone signs up to codeproject using a gmail address and an arbitrary username. The person then posts an article about a new MFC control, for example a pure win32 Ribbon control that does not require any .net components. The source code contains intentional omissions that make it impossible to compile because the real objective is to get as many people as possible to download the demo executable and run it. The executable installs a trojan or SSH tunnel giving the author full access to the victims computer, allowing for theft of source code, documents, emails etc. Antivirus won't detect the break in, a personal firewall might, I guess it depends on how good the author is at coding. My point is - perhaps there is a rather wide open back door via article demo's - and I am in no way suggesting that it's the responsibility of codeproject to police uploads, just merely raising the concern.

                            B Offline
                            B Offline
                            BRShroyer
                            wrote on last edited by
                            #18

                            If someone were to ever try this, I bet the next CP contest would be to develop a botnet that would bury this guy so deep that the next three generations of his family wouldn't even be able to use a computer for as much as googling "When is this going to end?"

                            Brad Deja Moo - When you feel like you've heard the same bull before.

                            N 1 Reply Last reply
                            0
                            • N Nelek

                              The best security is your own common sense. If a user is a very new member (none or very few posts, short membership and directly one article), it already is a "warning". Most things or article contents are quite difficult to follow just with a demo-app without the needed source, so if the source code doesn't compile... I just ignore the app.

                              Regards. -------- M.D.V. ;) If something has a solution... Why do we have to worry about?. If it has no solution... For what reason do we have to worry about? Help me to understand what I'm saying, and I'll explain it better to you Rating helpfull answers is nice, but saying thanks can be even nicer.

                              C Offline
                              C Offline
                              Christopher Duncan
                              wrote on last edited by
                              #19

                              Nelek wrote:

                              The best security is your own common sense.

                              Then we are so totally screwed...

                              Christopher Duncan
                              www.PracticalUSA.com
                              Author of The Career Programmer and Unite the Tribes
                              Copywriting Services

                              1 Reply Last reply
                              0
                              • C Chris Maunder

                                This is an issue for any executable (and many non-executable) downloads on the internet, and is precisely the reason we do not allow downloads that do not contain source code. I've also see anti-virus software complain about demo downloads from CodeProject - not because the code contained a trojan, but because a trojan contained the code!

                                cheers, Chris Maunder The Code Project | Co-founder Microsoft C++ MVP

                                C Offline
                                C Offline
                                Christopher Duncan
                                wrote on last edited by
                                #20

                                ...and the dog merrily chases his tail.

                                Christopher Duncan
                                www.PracticalUSA.com
                                Author of The Career Programmer and Unite the Tribes
                                Copywriting Services

                                1 Reply Last reply
                                0
                                • J John M Drescher

                                  My point is the Norton/Endpoint with its realtime scanner and hueristics obviously did not detect these viruses to let them install themselves in these machines.

                                  John

                                  C Offline
                                  C Offline
                                  Caslen
                                  wrote on last edited by
                                  #21

                                  Thats what you get for using Norton Crapware ;P

                                  J 1 Reply Last reply
                                  0
                                  • B BRShroyer

                                    If someone were to ever try this, I bet the next CP contest would be to develop a botnet that would bury this guy so deep that the next three generations of his family wouldn't even be able to use a computer for as much as googling "When is this going to end?"

                                    Brad Deja Moo - When you feel like you've heard the same bull before.

                                    N Offline
                                    N Offline
                                    Nelek
                                    wrote on last edited by
                                    #22

                                    :laugh: :laugh: :thumbsup:

                                    Regards. -------- M.D.V. ;) If something has a solution... Why do we have to worry about?. If it has no solution... For what reason do we have to worry about? Help me to understand what I'm saying, and I'll explain it better to you Rating helpfull answers is nice, but saying thanks can be even nicer.

                                    1 Reply Last reply
                                    0
                                    • C Caslen

                                      Thats what you get for using Norton Crapware ;P

                                      J Offline
                                      J Offline
                                      John M Drescher
                                      wrote on last edited by
                                      #23

                                      It's not my choice. For the one laptop that is under my control we have an exclusive contract to use Endpoint. The others were home users.

                                      John

                                      C 1 Reply Last reply
                                      0
                                      • M Mark_Wallace

                                        digital man wrote:

                                        Maybe demos should be banned (how would that work?)

                                        By only having demos that are built by a trusted third party. A lot of work for the hamsters, though.

                                        I wanna be a eunuchs developer! Pass me a bread knife!

                                        R Offline
                                        R Offline
                                        R Giskard Reventlov
                                        wrote on last edited by
                                        #24

                                        Ah, bit like Escrow, perhaps? Not bad: I suppose it could be a paid service that would earn CP some more gazillions and would certainly weed out some of the more, how can I put it... not terribly well thought out articles.

                                        Tychotics: take us back to the moon "Life, for ever dying to be born afresh, for ever young and eager, will presently stand upon this earth as upon a footstool, and stretch out its realm amidst the stars." H. G. Wells

                                        1 Reply Last reply
                                        0
                                        • H hammerstein05

                                          A user of Code Project would (presumably) be presumed to be a developer. If you're reading an article, then you should at least be able to understand the content of the article and at least be at a level with the language it's in that you understand the demo you're about to download. I don't run code before reading through it and at least understanding where it's going, even if I don't understand all the concepts present. I also know enough networking code to spot it. If I try and build it and it doesn't work, I'll invariably delete it and mark the rating of the article one lower than I would have had the demo code worked as described by the article. I don't think it's a security risk, and I'm pretty sure a report of an article that had malicious content would be treated seriously and quickly by the admins on the site.

                                          J Offline
                                          J Offline
                                          John M Drescher
                                          wrote on last edited by
                                          #25

                                          hammerstein05 wrote:

                                          I don't think it's a security risk, and I'm pretty sure a report of an article that had malicious content would be treated seriously and quickly by the admins on the site.

                                          What if you were the first to review the code?

                                          John

                                          H 1 Reply Last reply
                                          0
                                          Reply
                                          • Reply as topic
                                          Log in to reply
                                          • Oldest to Newest
                                          • Newest to Oldest
                                          • Most Votes


                                          • Login

                                          • Don't have an account? Register

                                          • Login or register to search.
                                          • First post
                                            Last post
                                          0
                                          • Categories
                                          • Recent
                                          • Tags
                                          • Popular
                                          • World
                                          • Users
                                          • Groups