Skip to content
  • Categories
  • Recent
  • Tags
  • Popular
  • World
  • Users
  • Groups
Skins
  • Light
  • Cerulean
  • Cosmo
  • Flatly
  • Journal
  • Litera
  • Lumen
  • Lux
  • Materia
  • Minty
  • Morph
  • Pulse
  • Sandstone
  • Simplex
  • Sketchy
  • Spacelab
  • United
  • Yeti
  • Zephyr
  • Dark
  • Cyborg
  • Darkly
  • Quartz
  • Slate
  • Solar
  • Superhero
  • Vapor

  • Default (No Skin)
  • No Skin
Collapse
Code Project
  1. Home
  2. The Lounge
  3. Security consideration

Security consideration

Scheduled Pinned Locked Moved The Lounge
csharpc++securitytutorial
27 Posts 14 Posters 0 Views 1 Watching
  • Oldest to Newest
  • Newest to Oldest
  • Most Votes
Reply
  • Reply as topic
Log in to reply
This topic has been deleted. Only users with topic management privileges can see it.
  • R Offline
    R Offline
    RichardBrock
    wrote on last edited by
    #1

    Think about this scenario - someone signs up to codeproject using a gmail address and an arbitrary username. The person then posts an article about a new MFC control, for example a pure win32 Ribbon control that does not require any .net components. The source code contains intentional omissions that make it impossible to compile because the real objective is to get as many people as possible to download the demo executable and run it. The executable installs a trojan or SSH tunnel giving the author full access to the victims computer, allowing for theft of source code, documents, emails etc. Antivirus won't detect the break in, a personal firewall might, I guess it depends on how good the author is at coding. My point is - perhaps there is a rather wide open back door via article demo's - and I am in no way suggesting that it's the responsibility of codeproject to police uploads, just merely raising the concern.

    R M S N H 8 Replies Last reply
    0
    • R RichardBrock

      Think about this scenario - someone signs up to codeproject using a gmail address and an arbitrary username. The person then posts an article about a new MFC control, for example a pure win32 Ribbon control that does not require any .net components. The source code contains intentional omissions that make it impossible to compile because the real objective is to get as many people as possible to download the demo executable and run it. The executable installs a trojan or SSH tunnel giving the author full access to the victims computer, allowing for theft of source code, documents, emails etc. Antivirus won't detect the break in, a personal firewall might, I guess it depends on how good the author is at coding. My point is - perhaps there is a rather wide open back door via article demo's - and I am in no way suggesting that it's the responsibility of codeproject to police uploads, just merely raising the concern.

      R Offline
      R Offline
      R Giskard Reventlov
      wrote on last edited by
      #2

      Don't download the demo. Only download and compile the source code: if it doesn't compile without errors the first time I usually delete the whole thing (and maybe post a note to the author. Maybe demos should be banned (how would that work?) or articles can't be posted until you've partcipated for 6 months or made 100 other posts or some other arbitrary measure of honesty.

      Tychotics: take us back to the moon "Life, for ever dying to be born afresh, for ever young and eager, will presently stand upon this earth as upon a footstool, and stretch out its realm amidst the stars." H. G. Wells

      M 1 Reply Last reply
      0
      • R RichardBrock

        Think about this scenario - someone signs up to codeproject using a gmail address and an arbitrary username. The person then posts an article about a new MFC control, for example a pure win32 Ribbon control that does not require any .net components. The source code contains intentional omissions that make it impossible to compile because the real objective is to get as many people as possible to download the demo executable and run it. The executable installs a trojan or SSH tunnel giving the author full access to the victims computer, allowing for theft of source code, documents, emails etc. Antivirus won't detect the break in, a personal firewall might, I guess it depends on how good the author is at coding. My point is - perhaps there is a rather wide open back door via article demo's - and I am in no way suggesting that it's the responsibility of codeproject to police uploads, just merely raising the concern.

        M Offline
        M Offline
        Maximilien
        wrote on last edited by
        #3

        Me think EXE (dll, lib) should not be on CodeProject. Me also think that if user X does indeed force people the run a virus, user X will be banned and thrown to the wolves as fast as you can vote 1. Also, never run an EXE if you are not certain what it does.

        Watched code never compiles.

        W 1 Reply Last reply
        0
        • R RichardBrock

          Think about this scenario - someone signs up to codeproject using a gmail address and an arbitrary username. The person then posts an article about a new MFC control, for example a pure win32 Ribbon control that does not require any .net components. The source code contains intentional omissions that make it impossible to compile because the real objective is to get as many people as possible to download the demo executable and run it. The executable installs a trojan or SSH tunnel giving the author full access to the victims computer, allowing for theft of source code, documents, emails etc. Antivirus won't detect the break in, a personal firewall might, I guess it depends on how good the author is at coding. My point is - perhaps there is a rather wide open back door via article demo's - and I am in no way suggesting that it's the responsibility of codeproject to police uploads, just merely raising the concern.

          S Offline
          S Offline
          Saurabh Garg
          wrote on last edited by
          #4

          RichardBrock wrote:

          Antivirus won't detect the break in

          Why do you say that? Isn't Antivirus softwares supposed to flag the malicious programs? I personally run all demo applications in a virtual machine and if something goes wrong then I just get a copy from last backup. -Saurabh

          J 1 Reply Last reply
          0
          • R RichardBrock

            Think about this scenario - someone signs up to codeproject using a gmail address and an arbitrary username. The person then posts an article about a new MFC control, for example a pure win32 Ribbon control that does not require any .net components. The source code contains intentional omissions that make it impossible to compile because the real objective is to get as many people as possible to download the demo executable and run it. The executable installs a trojan or SSH tunnel giving the author full access to the victims computer, allowing for theft of source code, documents, emails etc. Antivirus won't detect the break in, a personal firewall might, I guess it depends on how good the author is at coding. My point is - perhaps there is a rather wide open back door via article demo's - and I am in no way suggesting that it's the responsibility of codeproject to police uploads, just merely raising the concern.

            N Offline
            N Offline
            Nelek
            wrote on last edited by
            #5

            The best security is your own common sense. If a user is a very new member (none or very few posts, short membership and directly one article), it already is a "warning". Most things or article contents are quite difficult to follow just with a demo-app without the needed source, so if the source code doesn't compile... I just ignore the app.

            Regards. -------- M.D.V. ;) If something has a solution... Why do we have to worry about?. If it has no solution... For what reason do we have to worry about? Help me to understand what I'm saying, and I'll explain it better to you Rating helpfull answers is nice, but saying thanks can be even nicer.

            C 1 Reply Last reply
            0
            • M Maximilien

              Me think EXE (dll, lib) should not be on CodeProject. Me also think that if user X does indeed force people the run a virus, user X will be banned and thrown to the wolves as fast as you can vote 1. Also, never run an EXE if you are not certain what it does.

              Watched code never compiles.

              W Offline
              W Offline
              wolfbinary
              wrote on last edited by
              #6

              Maximilien wrote:

              Also, never run an EXE if you are not certain what it does.

              I wish more end users would do or that.

              1 Reply Last reply
              0
              • S Saurabh Garg

                RichardBrock wrote:

                Antivirus won't detect the break in

                Why do you say that? Isn't Antivirus softwares supposed to flag the malicious programs? I personally run all demo applications in a virtual machine and if something goes wrong then I just get a copy from last backup. -Saurabh

                J Offline
                J Offline
                John M Drescher
                wrote on last edited by
                #7

                AV is far from full proof. In the last month I have cleaned 4 machines that had the latest Norton or Endpoint installed with up to date virus definitions. These machines were full dozens of viruses / rootkits/ malware... Some of the viruses / rootkits were from 2008 and Norton still could not remove them.

                John

                S 1 Reply Last reply
                0
                • J John M Drescher

                  AV is far from full proof. In the last month I have cleaned 4 machines that had the latest Norton or Endpoint installed with up to date virus definitions. These machines were full dozens of viruses / rootkits/ malware... Some of the viruses / rootkits were from 2008 and Norton still could not remove them.

                  John

                  S Offline
                  S Offline
                  Saurabh Garg
                  wrote on last edited by
                  #8

                  Yes I am aware of that. But I was curious about the tone of the OP. It seems he thinks that demo applications cannot be detect Antivirus software for sure. But these days Antivirus softwares use hueristics and they might be able to detect such applications. -Saurabh

                  J 1 Reply Last reply
                  0
                  • S Saurabh Garg

                    Yes I am aware of that. But I was curious about the tone of the OP. It seems he thinks that demo applications cannot be detect Antivirus software for sure. But these days Antivirus softwares use hueristics and they might be able to detect such applications. -Saurabh

                    J Offline
                    J Offline
                    John M Drescher
                    wrote on last edited by
                    #9

                    My point is the Norton/Endpoint with its realtime scanner and hueristics obviously did not detect these viruses to let them install themselves in these machines.

                    John

                    S C 2 Replies Last reply
                    0
                    • J John M Drescher

                      My point is the Norton/Endpoint with its realtime scanner and hueristics obviously did not detect these viruses to let them install themselves in these machines.

                      John

                      S Offline
                      S Offline
                      Saurabh Garg
                      wrote on last edited by
                      #10

                      Yes that is why I used "might be able to detect..." while OP said "wont be able to..." which is bit too strong for my taste. Many utilities from nrisoft[^] are flagged as virus/trojan because they do hooking and other low level stuff. But all of them are for genuine use. -Saurabh

                      J R 2 Replies Last reply
                      0
                      • S Saurabh Garg

                        Yes that is why I used "might be able to detect..." while OP said "wont be able to..." which is bit too strong for my taste. Many utilities from nrisoft[^] are flagged as virus/trojan because they do hooking and other low level stuff. But all of them are for genuine use. -Saurabh

                        J Offline
                        J Offline
                        John M Drescher
                        wrote on last edited by
                        #11

                        Saurabh.Garg wrote:

                        Yes that is why I used "might be able to detect..." while OP said "wont be able to..."

                        Understand now. Agreed.

                        John

                        1 Reply Last reply
                        0
                        • S Saurabh Garg

                          Yes that is why I used "might be able to detect..." while OP said "wont be able to..." which is bit too strong for my taste. Many utilities from nrisoft[^] are flagged as virus/trojan because they do hooking and other low level stuff. But all of them are for genuine use. -Saurabh

                          R Offline
                          R Offline
                          RichardBrock
                          wrote on last edited by
                          #12

                          Your point is valid, the post was made on an understanding that antivirus software requires a known signature to detect viruses and trojans.

                          S 1 Reply Last reply
                          0
                          • R RichardBrock

                            Think about this scenario - someone signs up to codeproject using a gmail address and an arbitrary username. The person then posts an article about a new MFC control, for example a pure win32 Ribbon control that does not require any .net components. The source code contains intentional omissions that make it impossible to compile because the real objective is to get as many people as possible to download the demo executable and run it. The executable installs a trojan or SSH tunnel giving the author full access to the victims computer, allowing for theft of source code, documents, emails etc. Antivirus won't detect the break in, a personal firewall might, I guess it depends on how good the author is at coding. My point is - perhaps there is a rather wide open back door via article demo's - and I am in no way suggesting that it's the responsibility of codeproject to police uploads, just merely raising the concern.

                            H Offline
                            H Offline
                            hammerstein05
                            wrote on last edited by
                            #13

                            A user of Code Project would (presumably) be presumed to be a developer. If you're reading an article, then you should at least be able to understand the content of the article and at least be at a level with the language it's in that you understand the demo you're about to download. I don't run code before reading through it and at least understanding where it's going, even if I don't understand all the concepts present. I also know enough networking code to spot it. If I try and build it and it doesn't work, I'll invariably delete it and mark the rating of the article one lower than I would have had the demo code worked as described by the article. I don't think it's a security risk, and I'm pretty sure a report of an article that had malicious content would be treated seriously and quickly by the admins on the site.

                            J 1 Reply Last reply
                            0
                            • R RichardBrock

                              Your point is valid, the post was made on an understanding that antivirus software requires a known signature to detect viruses and trojans.

                              S Offline
                              S Offline
                              Saurabh Garg
                              wrote on last edited by
                              #14

                              I see, it makes sense. -Saurabh

                              1 Reply Last reply
                              0
                              • R RichardBrock

                                Think about this scenario - someone signs up to codeproject using a gmail address and an arbitrary username. The person then posts an article about a new MFC control, for example a pure win32 Ribbon control that does not require any .net components. The source code contains intentional omissions that make it impossible to compile because the real objective is to get as many people as possible to download the demo executable and run it. The executable installs a trojan or SSH tunnel giving the author full access to the victims computer, allowing for theft of source code, documents, emails etc. Antivirus won't detect the break in, a personal firewall might, I guess it depends on how good the author is at coding. My point is - perhaps there is a rather wide open back door via article demo's - and I am in no way suggesting that it's the responsibility of codeproject to police uploads, just merely raising the concern.

                                S Offline
                                S Offline
                                Simon P Stevens
                                wrote on last edited by
                                #15
                                1. It's no different from any other .exe download, it will still be virus scanned by the users scanner. (And company firewall based scanners like we have). Obviously, the detection rate for new viruses is very poor for most checkers, they work on signatures, so if it's a know virus it will probably be found, if it's been custom written it's less likely, but this is completely the same as any other binary download from anywhere. 2) I would assume most CP users are above average in technical knowledge. Personally, I use the source code and build it myself. I rarely download the binaries, when I do, I'm careful with them, using virtual machines etc. If it doesn't build, I look for what's wrong, or post a message to the author, failure to build doesn't encourage me to download binaries (probably the opposite actually, I'm rarely at codeproject for binary downloads, it's usually because I want to know how to do something in code, I'm not interested in the binary) 3) Users will down vote articles where the source code doesn't build. It won't take very long for this to be noticed. In fact, It's possible the article would be removed before it even passed through the acceptance process. (You may not be aware, but new articles from non-gold members have to be approved by a gold member before they become public).

                                Simon

                                1 Reply Last reply
                                0
                                • R R Giskard Reventlov

                                  Don't download the demo. Only download and compile the source code: if it doesn't compile without errors the first time I usually delete the whole thing (and maybe post a note to the author. Maybe demos should be banned (how would that work?) or articles can't be posted until you've partcipated for 6 months or made 100 other posts or some other arbitrary measure of honesty.

                                  Tychotics: take us back to the moon "Life, for ever dying to be born afresh, for ever young and eager, will presently stand upon this earth as upon a footstool, and stretch out its realm amidst the stars." H. G. Wells

                                  M Offline
                                  M Offline
                                  Mark_Wallace
                                  wrote on last edited by
                                  #16

                                  digital man wrote:

                                  Maybe demos should be banned (how would that work?)

                                  By only having demos that are built by a trusted third party. A lot of work for the hamsters, though.

                                  I wanna be a eunuchs developer! Pass me a bread knife!

                                  R 1 Reply Last reply
                                  0
                                  • R RichardBrock

                                    Think about this scenario - someone signs up to codeproject using a gmail address and an arbitrary username. The person then posts an article about a new MFC control, for example a pure win32 Ribbon control that does not require any .net components. The source code contains intentional omissions that make it impossible to compile because the real objective is to get as many people as possible to download the demo executable and run it. The executable installs a trojan or SSH tunnel giving the author full access to the victims computer, allowing for theft of source code, documents, emails etc. Antivirus won't detect the break in, a personal firewall might, I guess it depends on how good the author is at coding. My point is - perhaps there is a rather wide open back door via article demo's - and I am in no way suggesting that it's the responsibility of codeproject to police uploads, just merely raising the concern.

                                    C Offline
                                    C Offline
                                    Chris Maunder
                                    wrote on last edited by
                                    #17

                                    This is an issue for any executable (and many non-executable) downloads on the internet, and is precisely the reason we do not allow downloads that do not contain source code. I've also see anti-virus software complain about demo downloads from CodeProject - not because the code contained a trojan, but because a trojan contained the code!

                                    cheers, Chris Maunder The Code Project | Co-founder Microsoft C++ MVP

                                    C 1 Reply Last reply
                                    0
                                    • R RichardBrock

                                      Think about this scenario - someone signs up to codeproject using a gmail address and an arbitrary username. The person then posts an article about a new MFC control, for example a pure win32 Ribbon control that does not require any .net components. The source code contains intentional omissions that make it impossible to compile because the real objective is to get as many people as possible to download the demo executable and run it. The executable installs a trojan or SSH tunnel giving the author full access to the victims computer, allowing for theft of source code, documents, emails etc. Antivirus won't detect the break in, a personal firewall might, I guess it depends on how good the author is at coding. My point is - perhaps there is a rather wide open back door via article demo's - and I am in no way suggesting that it's the responsibility of codeproject to police uploads, just merely raising the concern.

                                      B Offline
                                      B Offline
                                      BRShroyer
                                      wrote on last edited by
                                      #18

                                      If someone were to ever try this, I bet the next CP contest would be to develop a botnet that would bury this guy so deep that the next three generations of his family wouldn't even be able to use a computer for as much as googling "When is this going to end?"

                                      Brad Deja Moo - When you feel like you've heard the same bull before.

                                      N 1 Reply Last reply
                                      0
                                      • N Nelek

                                        The best security is your own common sense. If a user is a very new member (none or very few posts, short membership and directly one article), it already is a "warning". Most things or article contents are quite difficult to follow just with a demo-app without the needed source, so if the source code doesn't compile... I just ignore the app.

                                        Regards. -------- M.D.V. ;) If something has a solution... Why do we have to worry about?. If it has no solution... For what reason do we have to worry about? Help me to understand what I'm saying, and I'll explain it better to you Rating helpfull answers is nice, but saying thanks can be even nicer.

                                        C Offline
                                        C Offline
                                        Christopher Duncan
                                        wrote on last edited by
                                        #19

                                        Nelek wrote:

                                        The best security is your own common sense.

                                        Then we are so totally screwed...

                                        Christopher Duncan
                                        www.PracticalUSA.com
                                        Author of The Career Programmer and Unite the Tribes
                                        Copywriting Services

                                        1 Reply Last reply
                                        0
                                        • C Chris Maunder

                                          This is an issue for any executable (and many non-executable) downloads on the internet, and is precisely the reason we do not allow downloads that do not contain source code. I've also see anti-virus software complain about demo downloads from CodeProject - not because the code contained a trojan, but because a trojan contained the code!

                                          cheers, Chris Maunder The Code Project | Co-founder Microsoft C++ MVP

                                          C Offline
                                          C Offline
                                          Christopher Duncan
                                          wrote on last edited by
                                          #20

                                          ...and the dog merrily chases his tail.

                                          Christopher Duncan
                                          www.PracticalUSA.com
                                          Author of The Career Programmer and Unite the Tribes
                                          Copywriting Services

                                          1 Reply Last reply
                                          0
                                          Reply
                                          • Reply as topic
                                          Log in to reply
                                          • Oldest to Newest
                                          • Newest to Oldest
                                          • Most Votes


                                          • Login

                                          • Don't have an account? Register

                                          • Login or register to search.
                                          • First post
                                            Last post
                                          0
                                          • Categories
                                          • Recent
                                          • Tags
                                          • Popular
                                          • World
                                          • Users
                                          • Groups