latest news...
well, isn't this a kick in the head... symantec was wickedly on the ball about the whole thing and was actually addressing the issue as early as last night, shortly after i had sent off the original email. their latest definition file (2006-09-20 rev 52) does NOT flag TightVNC 1.2.3 as a trojan.
in addition to their president for consumer products responding to me, their senior director for security response ops had the matter come across his desk and he, too, offered apologies and assurances that things were being addressed.
i, for one, am impressed. a huge corporation like this wouldn't have likely upset or offended a wide array of their customers if they just ignored the matter. i mean, how many people can be running a wildly out of date version of an open-source offshoot of an old AT&T remote admin tool? i may have been one of a dozen people affected. (of course, the fact that i had deployed this executable to like ~500 machines may have skewed the data in this matter)

so, yeah... any stragglers or clients who were unreachable in the past 36 hours will not be a problem. by now their AV tools have likely fetched the latest definitions and will not balk about TightVNC.
heh, quite a good day in my book, i must say... something of significance got done and was done well. i'm pleased to be a part of that when it manages to happen every now and then.

Leave a comment: