<< Okay, I just glanced through this entire thread, and I had to mention something:
I thought Russ's original statement was that if you executed a trojan that was stored on computer A from computer B, computer A would be infected. That's not possible - it's simply a shared device - anything you run from that drive on your local computer will only affect your local computer. For example, if you double-clicked an MP3 on your friend's shared drive, would the MP3 start playing on his computer? Therefore, I'm with josphstalinator on that one.
On the other hand, like Russ is indicating, it _is_ possible that the person who placed the trojan on computer A could, using his write-access, rig computer A to execute the trojan upon next restart. However, I don't think that's what you guys were arguing, was it?
Correct me if I'm wrong, but that's my interpretation of this thread! >>
OK as I see it.
Stalin was arguing it's not possible to infect a computer remotely directly. Russ said it's easily done. Initially Russ said they could execute a trojan remotely, which Stalin and others disagreed with because the program had to be executed locally even if the trojan managed to plop itself on the victim's hard drive. I am with Stalin on this. Russ and others pointed out that you didn't have to really "trick" the user to run it. You could almost guarantee the trojan would be run simply by sticking it in the Windows Startup directory. So after learning this point I'm with Russ on this one.
In other words as I interpret it, they're both right, or wrong, depending on how you look at it. I'm surprised the banter went on so long. 😛
I had always wondered how the trojans were infecting these computers (besides the email attachment method), because the mechanism didn't seem that easy without making itself obvious. I was thinking along the lines of it substituting itself for some Windows program. Completely overlooked the Startup directory method.