View Poll Results: What was your understanding of the term, 'political engineering'?

Voters
16. You may not vote on this poll
  • Only as a computer-security term. I'm not a computer guru.

    0 0%
  • Only as a computer-security term. I am a computer guru.

    3 18.75%
  • Only as a political-science term. I'm not a computer guru.

    1 6.25%
  • Only as a political-science term. I am a computer guru.

    3 18.75%
  • I knew it referred to both. I'm not a computer guru.

    0 0%
  • I knew it referred to both. I am a computer guru.

    1 6.25%
  • Never heard the term B4. I am not a computer guru

    1 6.25%
  • Never heard the term B4. I am a computer guru

    4 25.00%
  • Why are people ALWAYS picking on Microsoft?

    2 12.50%
  • DON'T bother me! I've got malware to finish!

    1 6.25%
Results 1 to 10 of 10

Thread: Prudish Microsoft response to Kama Sutra worm

  1. #1
    Senior Member
    Join Date
    Apr 2005
    Posts
    2,536
    Thanks
    15
    Thanked
    4 times in 3 posts

    Prudish Microsoft response to Kama Sutra worm

    Microsoft recently joined the chorus of voices warning to protect yourself before Friday against an email-borne worm that could bring down your PC completely but it is doing so in such prudish terms that few will understand what it's saying.

    Making doubly sure that it won't cause anyone any offence - even if its prudery could result in a whole bunch of totally non-working PCs - the [Microsoft] Security Advisory sums up the whole issue with the Kama Sutra worm by saying,

    "The mass mailing malware tries to entice users through social engineering efforts into opening an attached file in an e-mail message".
    Don't understand? No, us neither - and that's whole point.

    Check out this HEXUS.headline

    Then, if you would, please participation in our poll - so we can try to get an idea of the proportion of people (of differing levels of computer experience) that will or won't have understood the meaning of the term 'social engineering' in the context it was used by Microsoft.

    Here, are two contrasting definitions, courtesy of Wikipedia:

    Social engineering (political science)
    Social engineering in political science refers to efforts to systematically manage popular attitudes and social behavior on a large scale, whether by governments or private groups.

    The term has a negative connotation, and is sometimes used as an accusation against any who propose to use law, tax policy, or other kinds of state influence to accomplish social goals. For instance, political conservatives in the United States have accused their opponents of 'social engineering' through their promotion of political correctness, on the basis that political correctness is an attempt to change social attitudes by defining 'acceptable' and 'unacceptable' language.

    Social engineering (computer security)
    Social engineering (computer security), is the practice of obtaining confidential information by manipulation of legitimate users. A social engineer will commonly use the telephone or Internet to trick people into revealing sensitive information or getting them to do something that is against typical policies. By this method, social engineers exploit the natural tendency of a person to trust his or her word, rather than exploiting computer security holes. It is generally agreed upon that “users are the weak link” in security and this principle is what makes social engineering possible.

    A contemporary example of a social engineering attack is the use of e-mail attachments that contain malicious payloads (that, for instance, use the victim's machine to send massive quantities of spam). After earlier malicious e-mails led software vendors to disable automatic execution of attachments, users now have to explicitly activate attachments for this to occur. Many users, however, will blindly click on any attachments they receive, thus allowing the attack to work.
    Last edited by Bob Crabtree; 02-02-2006 at 12:41 PM.

  2. #2
    Senior Member
    Join Date
    Apr 2005
    Posts
    2,536
    Thanks
    15
    Thanked
    4 times in 3 posts
    In case anyone does want to protect their PC against, viruses, worms, trojans and other sorts of malware, and doesn't have a lot of readies to throw at the problem before Friday (though the same nasty is supposed to strike every third day of the month), below are some of the free apps you can use - and with confidence, in my experience.

    My current favourite anti-virus freebie is Grisoft's AVG Free.

    Set it to update daily and to run directly afterwards.

    Trojans are well dealt with by
    Lavasoft's Ad-Aware SE Personal Edition 1.06.

    and

    Safer-networking's SpyBot Search & Destroy.

    In my view you are better to have both of the last two installed and to run each of them at least once a week.

    In addition, you should use Microsoft's own freebies (get them via Windows Update) and, if you are technically knowledgeable, also get Merijn's HiJack This but use it with EXTREME care.

    To help you do that - but remember, any changes you make are down to you - there's a very useful auto-diagnostic tool here into which you can paste the log file that HiJack This produces.

    Other folks' suggestions are most welcome.
    Last edited by Bob Crabtree; 01-02-2006 at 10:14 PM.

  3. #3
    Does he need a reason? Funkstar's Avatar
    Join Date
    Aug 2005
    Location
    Aberdeen
    Posts
    19,874
    Thanks
    630
    Thanked
    965 times in 816 posts
    • Funkstar's system
      • Motherboard:
      • Gigabyte EG45M-DS2H
      • CPU:
      • Intel Core2Quad Q9550 (2.83GHz)
      • Memory:
      • 8GB OCZ PC2-6400C5 800MHz Quad Channel
      • Storage:
      • 650GB Western Digital Caviar Blue
      • Graphics card(s):
      • 512MB ATI Radeon HD4550
      • PSU:
      • Antec 350W 80+ Efficient PSU
      • Case:
      • Antec NSK1480 Slim Mini Desktop Case
      • Operating System:
      • Vista Ultimate 64bit
      • Monitor(s):
      • Dell 2407 + 2408 monitors
      • Internet:
      • Zen 8mb
    i don't see what is so confusing about that sentance. Although it does sound like a standard response. This could be used to describe dozens of 'famous' worms over the last few years.

  4. #4
    Senior Member
    Join Date
    Apr 2005
    Posts
    2,536
    Thanks
    15
    Thanked
    4 times in 3 posts
    Nice one Paul - I forgot all about that.

    But, people, do make sure you've got your antis in place - and keep them up-to-date and run them regularly; better not to get any nasties in the first place than to remove them after they've done their work.

  5. #5
    Senior Member
    Join Date
    Apr 2005
    Posts
    2,536
    Thanks
    15
    Thanked
    4 times in 3 posts
    Quote Originally Posted by Funkstar
    i don't see what is so confusing about that sentance. Although it does sound like a standard response. This could be used to describe dozens of 'famous' worms over the last few years.
    Ah, I understand your thinking - cos they've used geekish gibberish in the past, it's okay to use it now.

    Well, the absolute bottom line - in my view - is that Microsoft has a duty to communicate in such a way that ordinary mortals can understand what it's trying to tell them, especially if that's something that requires them to take some appropriate action.

    By mentioning NOTHING specific about the possible subject lines and contents of the body of the email, MS has done people no favours at all - and the only reasons I can think it has copped out are either prudishness somewhere in the decision-making hierachy or the fact that the people who write such stuff are so cut off from the real world that they don't realise they are using gibberish.

    It could, of course, be a combination of both.

    It's also my belief that were you to take a straw poll of normal computer users - ordinary people who don't live and die computers - a large majority, if they even knew what social engineering meant, would think of it in the context of political science, rather than computer security.

    But, perhaps, better that I test that theory by adding a poll to this thread [now done].

    Here, though, are two contrasting definitions, courtesy of Wikipedia:

    Social engineering (political science)
    Social engineering in political science refers to efforts to systematically manage popular attitudes and social behavior on a large scale, whether by governments or private groups.

    The term has a negative connotation, and is sometimes used as an accusation against any who propose to use law, tax policy, or other kinds of state influence to accomplish social goals. For instance, political conservatives in the United States have accused their opponents of 'social engineering' through their promotion of political correctness, on the basis that political correctness is an attempt to change social attitudes by defining 'acceptable' and 'unacceptable' language.

    Social engineering (computer security)
    Social engineering (computer security), is the practice of obtaining confidential information by manipulation of legitimate users. A social engineer will commonly use the telephone or Internet to trick people into revealing sensitive information or getting them to do something that is against typical policies. By this method, social engineers exploit the natural tendency of a person to trust his or her word, rather than exploiting computer security holes. It is generally agreed upon that “users are the weak link” in security and this principle is what makes social engineering possible.

    A contemporary example of a social engineering attack is the use of e-mail attachments that contain malicious payloads (that, for instance, use the victim's machine to send massive quantities of spam). After earlier malicious e-mails led software vendors to disable automatic execution of attachments, users now have to explicitly activate attachments for this to occur. Many users, however, will blindly click on any attachments they receive, thus allowing the attack to work.
    Last edited by Bob Crabtree; 02-02-2006 at 01:25 PM.

  6. #6
    Seething Cauldron of Hatred TheAnimus's Avatar
    Join Date
    Aug 2005
    Posts
    17,168
    Thanks
    803
    Thanked
    2,152 times in 1,408 posts
    or, just not open attachments on strange sounding emails?

    Which is easyer? Resisting the temptation to get some free porn which why would someone you don't know like that email you? Or having to deal with the consiquences of an infection..... Hmmm.......
    throw new ArgumentException (String, String, Exception)

  7. #7
    Fried Chip Extremist alsenior's Avatar
    Join Date
    Nov 2005
    Location
    Stafford
    Posts
    2,949
    Thanks
    103
    Thanked
    191 times in 145 posts
    • alsenior's system
      • Motherboard:
      • DFI Lanparty Jr x58-T3H6
      • CPU:
      • Core i7 920
      • Memory:
      • 6 x 2GB ocz Gold
      • Storage:
      • 1 TB Samsung F3
      • Graphics card(s):
      • 1gb 4890 vapor-x xfire
      • PSU:
      • xfx 850W
      • Case:
      • Lian-li Pc7
      • Operating System:
      • Windows 7 X64
      • Monitor(s):
      • Dell 2208WFP
      • Internet:
      • 30mb Virgin media
    Quote Originally Posted by TheAnimus
    or, just not open attachments on strange sounding emails?

    Which is easyer? Resisting the temptation to get some free porn which why would someone you don't know like that email you? Or having to deal with the consiquences of an infection..... Hmmm.......
    sounds alot like real life

  8. #8
    ayembee
    Guest

    beware of the grammar

    i don't see the missing "not" in that last paragraph that the author makes such a song and dance about. am i going mad?

    what it looks like the author was expecting to see was a standard "Customers who are not using the most recent and updated antivirus software are at risk...", but of course what it actually says is that "Customers who are using the most recent and updated antivirus software could be at a reduced risk of infection...", which is fine... meh. life goes on...

  9. #9
    Senior Member
    Join Date
    Apr 2005
    Posts
    2,536
    Thanks
    15
    Thanked
    4 times in 3 posts
    Quote Originally Posted by ayembee
    i don't see the missing "not" in that last paragraph that the author makes such a song and dance about. am i going mad?

    what it looks like the author was expecting to see was a standard "Customers who are not using the most recent and updated antivirus software are at risk...", but of course what it actually says is that "Customers who are using the most recent and updated antivirus software could be at a reduced risk of infection...", which is fine... meh. life goes on...
    No, you're not going mad (at least, judging from the above post, anyway).

    You are quite right in your observation and I was quite wrong in mine.

    That being so, I was going to change that section to correct my error.

    Then I read the original again and realised that what I was actually highlighting wasn't an error in what was written but a densely written sentence the meaning of which wasn't clear on the first or subsequent read-throughs by myself - someone whose daily life is spent juggling with words.

    Or am I just clutching at straws here?

    Debate, please.

    Bob

  10. #10
    ayembee
    Guest
    oh, i certainly agree it's badly written, and worth a mild chastisement on those grounds alone, i just didn't think it was technically wrong... maybe one for the Plain English campaign

Thread Information

Users Browsing this Thread

There are currently 1 users browsing this thread. (0 members and 1 guests)

Similar Threads

  1. Why response times of LCDs are misleading
    By Carvahlo in forum Graphics Cards
    Replies: 9
    Last Post: 23-09-2004, 08:35 PM
  2. New RPC hotfix from Microsoft
    By Paul Adams in forum Software
    Replies: 12
    Last Post: 14-09-2003, 08:44 AM

Posting Permissions

  • You may not post new threads
  • You may not post replies
  • You may not post attachments
  • You may not edit your posts
  •