02-19-2006, 04:29 PM
Sam3, thanks for your comments. I was glad to get at least one well considered response.
I felt as you do after reading the information that I posted here and like you, I don't have sufficient knowledge to judge the quality of the author's premise.
If he is correct, then it is important to heed the warnings.
Here's another interesting discussion about this topic.
The discussion includes some seemingly knowledgeable members who mostly seem to pooh, pooh the danger by saying that this piece of malware is poorly written.
My take is, that while this threat may not be a very big problem, it doesn't take much imagination to envision a more sophisticated "rat" producing a more serious piece of malware that takes advantage of the supposed security flaws in the Tiger OS.
I feel we have to do what we can to stay on top of this.
As I always say "That's just my opinion, I could be wrong."
I felt as you do after reading the information that I posted here and like you, I don't have sufficient knowledge to judge the quality of the author's premise.
If he is correct, then it is important to heed the warnings.
Here's another interesting discussion about this topic.
The discussion includes some seemingly knowledgeable members who mostly seem to pooh, pooh the danger by saying that this piece of malware is poorly written.
My take is, that while this threat may not be a very big problem, it doesn't take much imagination to envision a more sophisticated "rat" producing a more serious piece of malware that takes advantage of the supposed security flaws in the Tiger OS.
I feel we have to do what we can to stay on top of this.
As I always say "That's just my opinion, I could be wrong."