How Did They Come
To This?"> Its a shame in a way. I was a customer of the earliest, original Norton Utilities. (I actually wrote fan mail to Peter Norton and he wrote back!) The applications had universal appeal, but it was very techie-oriented software. In later versions, trying to appeal to a larger audience, Symantec (which had bought out "Peter Norton Software") essentially dumbed down the software, and this directory hiding stuff is a part of that. How far back does the feature go? Its an important question, and one I posed to Symantec. Until last spring I was using a copy of SystemWorks 2002 on one of my computers. I could have upgraded, but there was never anything new and better in new versions of SystemWorks. If I were still using it, would I have an update available? What about 2001, 2000 and so on? According to Symantecs advisory the 2005 and 2006 versions are vulnerable, but Symantec tells me that it works for earlier versions as well, at least for 2002.By the time security became a serious mainstream issue and malware writers became competent, the Norton Protected Recycle Bin was basically a legacy feature skating along from version to version, probably with little attention being paid to it. But Symantec, being a security company, should have caught this one many years ago, instead of being notified by a third party (once again we have F-Secure to thank for this, a competitor of Symantecs, and Mark Russinovich of Sysinternals). I dont think theres much reason to worry about it. Ive never heard of any malware that tried to hide itself using this feature, and any that did would quickly be detected. Furthermore, its safe to assume that Norton SystemWorks users are much more likely than the average user to have anti-virus protection on their computers, and therefore to have some protection against any malware that attempted to utilize the hidden directory. Some versions of SystemWorks actually come with Norton Antivirus bundled. So Im hoping that Symantec gets proactive with their users and reaches out to them to push out the update that unhides the directory, but Im not going to worry about this one. On the other hand, I hope it sends a signal through the industry to analyze your products for techniques like this that could be abused. Better to deal with it proactively than to be the subject of the next expose. Security Center Editor Larry Seltzer has worked in and written about the computer industry since 1983. Check out eWEEK.coms for the latest security news, reviews and analysis. And for insights on security coverage around the Web, take a look at eWEEK.com Security Center Editor Larry Seltzers Weblog.
More from Larry Seltzer
Microsoft looks to zap Sonys DRM "rootkit." Click here to read more.