Check out the new USENIX Web site. next up previous
Next: Creator ID Replacement Up: Desktop Conduits Previous: Desktop Conduits

Recommendations

Cross-architecture infection risks exist for any portable device that employs data transfer or synchronization capabilities to other devices. Proper security practices should exist in the desktop environment consisting of, but not limited to, disabling macros, scripting, and the unprompted execution of code. Anti-virus software running on the desktop should scan the incoming data before passing it to the destination application. Once the malicious code has successfully been transferred to the destination application, it poses the same threats as if a user executed such a file directly.

Kingpin
2001-05-09