Skip to content
  • Categories
  • Recent
  • Tags
  • Popular
  • World
  • Users
  • Groups
Skins
  • Light
  • Cerulean
  • Cosmo
  • Flatly
  • Journal
  • Litera
  • Lumen
  • Lux
  • Materia
  • Minty
  • Morph
  • Pulse
  • Sandstone
  • Simplex
  • Sketchy
  • Spacelab
  • United
  • Yeti
  • Zephyr
  • Dark
  • Cyborg
  • Darkly
  • Quartz
  • Slate
  • Solar
  • Superhero
  • Vapor

  • Default (No Skin)
  • No Skin
Collapse
Code Project
  1. Home
  2. The Lounge
  3. Security consideration

Security consideration

Scheduled Pinned Locked Moved The Lounge
csharpc++securitytutorial
27 Posts 14 Posters 0 Views 1 Watching
  • Oldest to Newest
  • Newest to Oldest
  • Most Votes
Reply
  • Reply as topic
Log in to reply
This topic has been deleted. Only users with topic management privileges can see it.
  • J John M Drescher

    My point is the Norton/Endpoint with its realtime scanner and hueristics obviously did not detect these viruses to let them install themselves in these machines.

    John

    S Offline
    S Offline
    Saurabh Garg
    wrote on last edited by
    #10

    Yes that is why I used "might be able to detect..." while OP said "wont be able to..." which is bit too strong for my taste. Many utilities from nrisoft[^] are flagged as virus/trojan because they do hooking and other low level stuff. But all of them are for genuine use. -Saurabh

    J R 2 Replies Last reply
    0
    • S Saurabh Garg

      Yes that is why I used "might be able to detect..." while OP said "wont be able to..." which is bit too strong for my taste. Many utilities from nrisoft[^] are flagged as virus/trojan because they do hooking and other low level stuff. But all of them are for genuine use. -Saurabh

      J Offline
      J Offline
      John M Drescher
      wrote on last edited by
      #11

      Saurabh.Garg wrote:

      Yes that is why I used "might be able to detect..." while OP said "wont be able to..."

      Understand now. Agreed.

      John

      1 Reply Last reply
      0
      • S Saurabh Garg

        Yes that is why I used "might be able to detect..." while OP said "wont be able to..." which is bit too strong for my taste. Many utilities from nrisoft[^] are flagged as virus/trojan because they do hooking and other low level stuff. But all of them are for genuine use. -Saurabh

        R Offline
        R Offline
        RichardBrock
        wrote on last edited by
        #12

        Your point is valid, the post was made on an understanding that antivirus software requires a known signature to detect viruses and trojans.

        S 1 Reply Last reply
        0
        • R RichardBrock

          Think about this scenario - someone signs up to codeproject using a gmail address and an arbitrary username. The person then posts an article about a new MFC control, for example a pure win32 Ribbon control that does not require any .net components. The source code contains intentional omissions that make it impossible to compile because the real objective is to get as many people as possible to download the demo executable and run it. The executable installs a trojan or SSH tunnel giving the author full access to the victims computer, allowing for theft of source code, documents, emails etc. Antivirus won't detect the break in, a personal firewall might, I guess it depends on how good the author is at coding. My point is - perhaps there is a rather wide open back door via article demo's - and I am in no way suggesting that it's the responsibility of codeproject to police uploads, just merely raising the concern.

          H Offline
          H Offline
          hammerstein05
          wrote on last edited by
          #13

          A user of Code Project would (presumably) be presumed to be a developer. If you're reading an article, then you should at least be able to understand the content of the article and at least be at a level with the language it's in that you understand the demo you're about to download. I don't run code before reading through it and at least understanding where it's going, even if I don't understand all the concepts present. I also know enough networking code to spot it. If I try and build it and it doesn't work, I'll invariably delete it and mark the rating of the article one lower than I would have had the demo code worked as described by the article. I don't think it's a security risk, and I'm pretty sure a report of an article that had malicious content would be treated seriously and quickly by the admins on the site.

          J 1 Reply Last reply
          0
          • R RichardBrock

            Your point is valid, the post was made on an understanding that antivirus software requires a known signature to detect viruses and trojans.

            S Offline
            S Offline
            Saurabh Garg
            wrote on last edited by
            #14

            I see, it makes sense. -Saurabh

            1 Reply Last reply
            0
            • R RichardBrock

              Think about this scenario - someone signs up to codeproject using a gmail address and an arbitrary username. The person then posts an article about a new MFC control, for example a pure win32 Ribbon control that does not require any .net components. The source code contains intentional omissions that make it impossible to compile because the real objective is to get as many people as possible to download the demo executable and run it. The executable installs a trojan or SSH tunnel giving the author full access to the victims computer, allowing for theft of source code, documents, emails etc. Antivirus won't detect the break in, a personal firewall might, I guess it depends on how good the author is at coding. My point is - perhaps there is a rather wide open back door via article demo's - and I am in no way suggesting that it's the responsibility of codeproject to police uploads, just merely raising the concern.

              S Offline
              S Offline
              Simon P Stevens
              wrote on last edited by
              #15
              1. It's no different from any other .exe download, it will still be virus scanned by the users scanner. (And company firewall based scanners like we have). Obviously, the detection rate for new viruses is very poor for most checkers, they work on signatures, so if it's a know virus it will probably be found, if it's been custom written it's less likely, but this is completely the same as any other binary download from anywhere. 2) I would assume most CP users are above average in technical knowledge. Personally, I use the source code and build it myself. I rarely download the binaries, when I do, I'm careful with them, using virtual machines etc. If it doesn't build, I look for what's wrong, or post a message to the author, failure to build doesn't encourage me to download binaries (probably the opposite actually, I'm rarely at codeproject for binary downloads, it's usually because I want to know how to do something in code, I'm not interested in the binary) 3) Users will down vote articles where the source code doesn't build. It won't take very long for this to be noticed. In fact, It's possible the article would be removed before it even passed through the acceptance process. (You may not be aware, but new articles from non-gold members have to be approved by a gold member before they become public).

              Simon

              1 Reply Last reply
              0
              • R R Giskard Reventlov

                Don't download the demo. Only download and compile the source code: if it doesn't compile without errors the first time I usually delete the whole thing (and maybe post a note to the author. Maybe demos should be banned (how would that work?) or articles can't be posted until you've partcipated for 6 months or made 100 other posts or some other arbitrary measure of honesty.

                Tychotics: take us back to the moon "Life, for ever dying to be born afresh, for ever young and eager, will presently stand upon this earth as upon a footstool, and stretch out its realm amidst the stars." H. G. Wells

                M Offline
                M Offline
                Mark_Wallace
                wrote on last edited by
                #16

                digital man wrote:

                Maybe demos should be banned (how would that work?)

                By only having demos that are built by a trusted third party. A lot of work for the hamsters, though.

                I wanna be a eunuchs developer! Pass me a bread knife!

                R 1 Reply Last reply
                0
                • R RichardBrock

                  Think about this scenario - someone signs up to codeproject using a gmail address and an arbitrary username. The person then posts an article about a new MFC control, for example a pure win32 Ribbon control that does not require any .net components. The source code contains intentional omissions that make it impossible to compile because the real objective is to get as many people as possible to download the demo executable and run it. The executable installs a trojan or SSH tunnel giving the author full access to the victims computer, allowing for theft of source code, documents, emails etc. Antivirus won't detect the break in, a personal firewall might, I guess it depends on how good the author is at coding. My point is - perhaps there is a rather wide open back door via article demo's - and I am in no way suggesting that it's the responsibility of codeproject to police uploads, just merely raising the concern.

                  C Offline
                  C Offline
                  Chris Maunder
                  wrote on last edited by
                  #17

                  This is an issue for any executable (and many non-executable) downloads on the internet, and is precisely the reason we do not allow downloads that do not contain source code. I've also see anti-virus software complain about demo downloads from CodeProject - not because the code contained a trojan, but because a trojan contained the code!

                  cheers, Chris Maunder The Code Project | Co-founder Microsoft C++ MVP

                  C 1 Reply Last reply
                  0
                  • R RichardBrock

                    Think about this scenario - someone signs up to codeproject using a gmail address and an arbitrary username. The person then posts an article about a new MFC control, for example a pure win32 Ribbon control that does not require any .net components. The source code contains intentional omissions that make it impossible to compile because the real objective is to get as many people as possible to download the demo executable and run it. The executable installs a trojan or SSH tunnel giving the author full access to the victims computer, allowing for theft of source code, documents, emails etc. Antivirus won't detect the break in, a personal firewall might, I guess it depends on how good the author is at coding. My point is - perhaps there is a rather wide open back door via article demo's - and I am in no way suggesting that it's the responsibility of codeproject to police uploads, just merely raising the concern.

                    B Offline
                    B Offline
                    BRShroyer
                    wrote on last edited by
                    #18

                    If someone were to ever try this, I bet the next CP contest would be to develop a botnet that would bury this guy so deep that the next three generations of his family wouldn't even be able to use a computer for as much as googling "When is this going to end?"

                    Brad Deja Moo - When you feel like you've heard the same bull before.

                    N 1 Reply Last reply
                    0
                    • N Nelek

                      The best security is your own common sense. If a user is a very new member (none or very few posts, short membership and directly one article), it already is a "warning". Most things or article contents are quite difficult to follow just with a demo-app without the needed source, so if the source code doesn't compile... I just ignore the app.

                      Regards. -------- M.D.V. ;) If something has a solution... Why do we have to worry about?. If it has no solution... For what reason do we have to worry about? Help me to understand what I'm saying, and I'll explain it better to you Rating helpfull answers is nice, but saying thanks can be even nicer.

                      C Offline
                      C Offline
                      Christopher Duncan
                      wrote on last edited by
                      #19

                      Nelek wrote:

                      The best security is your own common sense.

                      Then we are so totally screwed...

                      Christopher Duncan
                      www.PracticalUSA.com
                      Author of The Career Programmer and Unite the Tribes
                      Copywriting Services

                      1 Reply Last reply
                      0
                      • C Chris Maunder

                        This is an issue for any executable (and many non-executable) downloads on the internet, and is precisely the reason we do not allow downloads that do not contain source code. I've also see anti-virus software complain about demo downloads from CodeProject - not because the code contained a trojan, but because a trojan contained the code!

                        cheers, Chris Maunder The Code Project | Co-founder Microsoft C++ MVP

                        C Offline
                        C Offline
                        Christopher Duncan
                        wrote on last edited by
                        #20

                        ...and the dog merrily chases his tail.

                        Christopher Duncan
                        www.PracticalUSA.com
                        Author of The Career Programmer and Unite the Tribes
                        Copywriting Services

                        1 Reply Last reply
                        0
                        • J John M Drescher

                          My point is the Norton/Endpoint with its realtime scanner and hueristics obviously did not detect these viruses to let them install themselves in these machines.

                          John

                          C Offline
                          C Offline
                          Caslen
                          wrote on last edited by
                          #21

                          Thats what you get for using Norton Crapware ;P

                          J 1 Reply Last reply
                          0
                          • B BRShroyer

                            If someone were to ever try this, I bet the next CP contest would be to develop a botnet that would bury this guy so deep that the next three generations of his family wouldn't even be able to use a computer for as much as googling "When is this going to end?"

                            Brad Deja Moo - When you feel like you've heard the same bull before.

                            N Offline
                            N Offline
                            Nelek
                            wrote on last edited by
                            #22

                            :laugh: :laugh: :thumbsup:

                            Regards. -------- M.D.V. ;) If something has a solution... Why do we have to worry about?. If it has no solution... For what reason do we have to worry about? Help me to understand what I'm saying, and I'll explain it better to you Rating helpfull answers is nice, but saying thanks can be even nicer.

                            1 Reply Last reply
                            0
                            • C Caslen

                              Thats what you get for using Norton Crapware ;P

                              J Offline
                              J Offline
                              John M Drescher
                              wrote on last edited by
                              #23

                              It's not my choice. For the one laptop that is under my control we have an exclusive contract to use Endpoint. The others were home users.

                              John

                              C 1 Reply Last reply
                              0
                              • M Mark_Wallace

                                digital man wrote:

                                Maybe demos should be banned (how would that work?)

                                By only having demos that are built by a trusted third party. A lot of work for the hamsters, though.

                                I wanna be a eunuchs developer! Pass me a bread knife!

                                R Offline
                                R Offline
                                R Giskard Reventlov
                                wrote on last edited by
                                #24

                                Ah, bit like Escrow, perhaps? Not bad: I suppose it could be a paid service that would earn CP some more gazillions and would certainly weed out some of the more, how can I put it... not terribly well thought out articles.

                                Tychotics: take us back to the moon "Life, for ever dying to be born afresh, for ever young and eager, will presently stand upon this earth as upon a footstool, and stretch out its realm amidst the stars." H. G. Wells

                                1 Reply Last reply
                                0
                                • H hammerstein05

                                  A user of Code Project would (presumably) be presumed to be a developer. If you're reading an article, then you should at least be able to understand the content of the article and at least be at a level with the language it's in that you understand the demo you're about to download. I don't run code before reading through it and at least understanding where it's going, even if I don't understand all the concepts present. I also know enough networking code to spot it. If I try and build it and it doesn't work, I'll invariably delete it and mark the rating of the article one lower than I would have had the demo code worked as described by the article. I don't think it's a security risk, and I'm pretty sure a report of an article that had malicious content would be treated seriously and quickly by the admins on the site.

                                  J Offline
                                  J Offline
                                  John M Drescher
                                  wrote on last edited by
                                  #25

                                  hammerstein05 wrote:

                                  I don't think it's a security risk, and I'm pretty sure a report of an article that had malicious content would be treated seriously and quickly by the admins on the site.

                                  What if you were the first to review the code?

                                  John

                                  H 1 Reply Last reply
                                  0
                                  • J John M Drescher

                                    It's not my choice. For the one laptop that is under my control we have an exclusive contract to use Endpoint. The others were home users.

                                    John

                                    C Offline
                                    C Offline
                                    Caslen
                                    wrote on last edited by
                                    #26

                                    Luckily I've never been forced to use it at work but I've never heard a good word said about it

                                    1 Reply Last reply
                                    0
                                    • J John M Drescher

                                      hammerstein05 wrote:

                                      I don't think it's a security risk, and I'm pretty sure a report of an article that had malicious content would be treated seriously and quickly by the admins on the site.

                                      What if you were the first to review the code?

                                      John

                                      H Offline
                                      H Offline
                                      hammerstein05
                                      wrote on last edited by
                                      #27

                                      I was thinking more of a user reading the code and deeming the content to be malicious, than them actually running the content.If you were the first to read and you ran it without checking, then, whoops.

                                      1 Reply Last reply
                                      0
                                      Reply
                                      • Reply as topic
                                      Log in to reply
                                      • Oldest to Newest
                                      • Newest to Oldest
                                      • Most Votes


                                      • Login

                                      • Don't have an account? Register

                                      • Login or register to search.
                                      • First post
                                        Last post
                                      0
                                      • Categories
                                      • Recent
                                      • Tags
                                      • Popular
                                      • World
                                      • Users
                                      • Groups