|
Register | FAQ | The Twelve Commandments | Members List | Calendar | Arcade | Find the Best VPN | Today's Posts | Search |
General P2P Network Discussion For general discussion about peer-to-peer networks. |
| LinkBack | Thread Tools | Display Modes |
| |||
KathW beat me to it: Quote:
As for a virus/spyware infecting your computer through an .mp3 thats just a hoax http://www.f-secure.com/hoaxes/mp3vir.shtml If you did get spyware from anything related to mcdonalds it would be from there website wich im betting wasnt the case but I think this thread was just supposed to be a reminder to check for corrupted data and keep the networks clean. |
| |||
Quote:
email.doc _______________.exe (w/out the line of course) where the "exe" exceeds the space alloted for listing the email so is not visable as an exe? |
| ||||
Quote:
Quote:
Last edited by Morgwen; September 20th, 2004 at 12:20 AM. |
| |||
After reading the article re: Sony's depositing a rootkit on its cd's, http://www.sysinternals.com/blog/200...al-rights.html http://lists.webjunction.org/wjlists...er/039005.html doesn't it make paranoia & limiting the scope of transgressions to your own experience just a little naive? They were caught and eventually had to recall the cd's (b4 the recall, the Dave Matthews Band was posting inf on how to find it), but what happens should the next one go unfound? *applause & appreciation to Mark Russovich* . It is a blessing to have a talent which can be used to help others. |
| |||
You can of course infect your computer through any kind of file. Executable files are just the most blatant obvious way. Nonetheless the same is very often possible through pictures, audio files, videos etc. This is especially true on Microsoft Windows because it is the most widely deployed software and there are countless well-known exploits for this platform and its standard applications. Also multimedia software like audio and video players for Linux and other operating systems has frequently serious bugs - actually they are just discovered, they exist all the time - that would allow compromise of your account - and thus likely your complete computer - just by playing an infected audio or video file. Even worse, you can get your system infected by checking a file for viruses because after all the people who program this software are not really any more intelligent than any other programmer. If people only talked about things they had a clue of, this place would be very silent. |
| ||||
McDonald offers = download through Sony software I've seen these McDonald offers in France too. It was clearly stated that this was a free offer to promote the Sony's online music shop. So what you won was a ticket number, with which you coulddownloadthe music fromthe Sony's online music store. But to activate this number, you first needed to accept the EULA for the Sony's downloader kit, and register it with your email address and true name (verified by sending back a confirmation number through your email) which was needed to validate your number. The kit also permanently assigns you a UUID alsoassociated to a personal cookie used in your browser. So, you could download free MP3's, but these MP3s contain watermarked fingerprints with your personal registration number or Sony transaction number encrypted in it. If you later share these MP3s on the net, your digital fingerprint is visible in it.Sony assumes that such a file present on the net is a proof that you have violated their EULA, because such fingerprint uses a strong enough cryptographic algorithm which should be impossible to generate randomly by someone else. But Sony ignores the fact that fingerprinted files may be stolen on user's harddisks by hidden softwares using the same technics that Sony used to install their rootkits. Until it is proven that Windows is reliable for its storage, I don't think that any DRM fingerprint found in a downloaded MP3 file can be used as proof of any EULA violation by users. It can only be used within investigations to detect which users may beviolating EULA, but then the act of counterfeighting still requires other proofs, notably the correlation of other fingerprints and Internet access logs collected by ISPs. But the bad thing is that fingerprints are also inserted within all the legitimate MP3 you create yourself with addons implemented in your player (WMP, RealOne Player, QuickTime/iTunes, WinAmp), and as well in your photos and video made by your camera, or documents created with your favorite office application. These fingerprints, are also correlated externally within undeclared databases each time you send orshare these files legally. Today, third party databases are so powerful things that they can really spy on your whole life: just ask yourself why you start receiving personal adds in your snailmail letterbox just afewdaysafter you have moved to a new location, from merchants you evendid not know before, and you'll seethat new database recordsadded by your bank or post office or phone company or travel agency or cable TV provider (or even public services like health care, tax services) are sold to advertizers. With so much information about you, it's not difficult to correlate many things about new contents on the net. But the dangerous way is now to use these data,often collected without your knowledge or control (whichmay contain errors or incorrect correlations) as evidences for alleged illegal activities. Media companies consider that this type of proof is insufficidently strong to create proofs, sothey want to justify this with even more spying on your daily activities, as if we were not already too much spied often illegally.
__________________ LimeWire is international. Help translate LimeWire to your own language. Visit: http://www.limewire.org/translate.shtml |
| ||||
Quote:
|
| ||||
Quote:
Don't forget that this code may also use data or code embedded within valid image file fragments (even if this part produces some "garbage" on screen if that part of the image was effectively rendered). In addition, you can put this image on amaliciouswebsite whereit is downloaded along with multiple images containing other parts of the exploit code. This code could also be used to remove security restriction settings, that will be used immediately after by an active viral component downloaded from the same malicious page (this active viral component beingnormally blocked by security restrictions). One common target you could perform within 1KB would be to set a domain into the "safe" security zone instead of the internet zone. You can also control the sequencing order for these downloaded component, for example by using delayed HTTP redirects or delayed javascript redirects. With thosetypesofredirect, you have a content bodyto downloadthe first component, and later you'll goto the next page that performs the following action. In all modern attacks, the first steps to viral infection is first to disable the security restrictions that will allow a virus or rootkit to be "trusted" by the host and then install itself without notice.
__________________ LimeWire is international. Help translate LimeWire to your own language. Visit: http://www.limewire.org/translate.shtml Last edited by verdyp; February 12th, 2006 at 05:16 AM. |
| |
Similar Threads | ||||
Thread | Thread Starter | Forum | Replies | Last Post |
download music but rather than the song, a link to other "free" dl programs came up | dibennett | Download/Upload Problems | 4 | June 13th, 2006 08:55 AM |
Free 16 song sampler not syncing to iPod | thefoodguy | Open Discussion topics | 1 | February 16th, 2005 03:41 PM |
free amazon gift certificate and free desktop pc from gratis (the free ipod people) | ehd | Open Discussion topics | 1 | September 2nd, 2004 01:21 PM |
Kernel Trap | Lennie | Download/Upload Problems | 0 | December 20th, 2003 09:15 AM |
Is this a trap? | J Hayes | Open Discussion topics | 1 | March 17th, 2003 12:28 PM |