I was looking at a driver download from Lexar for the JumpDrive secure version 3.1. It has drivers for Linux, Mac and Windows. In the Linux directory is the driver to use the secure functions of the stick/drive. It appears to be gtk based from a hexdump. There is also a .hlp file, which has the magic number and identifier for ELF files. It also appears to be a GTK executable file. I don't recall ever seeing a Linux help file that was actually a program. Is this some new trend in Linux or is it just something Lexar has taken upon themselves to do? I don't have a Linux desktop handy to test this, but will try to load it later and see how well the driver works in Linux and how portable it is. I'm assuming that Lexar has not opensourced the driver, there is no sourcecode included. It's nice to see the support though. When I contacted the support people the second question was which OS I was using. Not which version of Windows.
Brian Densmore
On Tue, 28 Dec 2004, Brian Densmore wrote:
There is also a .hlp file, which has the magic number and identifier for ELF files. It also appears to be a GTK executable file. I don't recall ever seeing a Linux help file that was actually a program. Is this some
uh oh... the seeds of the first linux virus has been invented...
-=Duane http://dattaway.org
On Fri, 31 Dec 2004 07:25:48 -0600 (CST), Duane Attaway [email protected] wrote:
There is also a .hlp file, which has the magic number and identifier for ELF files. It also appears to be a GTK executable file. I don't recall ever seeing a Linux help file that was actually a program. Is this some
uh oh... the seeds of the first linux virus has been invented...
I'm not sure how an executable help file would be any more of a vulnerability than any other executable. Any program could contain malicious code. So use the packages that have been vetted by your distro's maintainers, or install as non-root to avoid the worst pitfalls.
uh oh... the seeds of the first linux virus has been invented...
I'm not sure how an executable help file would be any more of a vulnerability than any other executable. Any program could contain malicious code. So use the packages that have been vetted by your distro's maintainers, or install as non-root to avoid the worst pitfalls.
I'm waiting for the day a company from Redmond emails an ELF executable help file. The world will flip on its axis that day and toilets will flush backwards.