[<prev] [next>] [thread-next>] [day] [month] [year] [list]
From: matt at dynamicanswers.com (Matt Marooney)
Subject: Bios programming...
I believe the software is Softex TheftGuard. I wonder how this is
possible. I understood that most modern BIOS are protected against
writing. I know there are a fiew viruses that can write to the BIOS?
Anybody know how to store a small program there?
-----Original Message-----
From: Gerry Eisenhaur [mailto:GEisenhaur@...co.com]
Sent: Thursday, March 03, 2005 2:28 PM
To: Matt Marooney
Subject: Re: [Full-Disclosure] Bios programming...
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1
Matt,
I too am interested in un-installable apps. Do you know that name of the
application you are talking about (in 1.)? I am interested for different
reasons than you, but think we may be able to help each other.
Thanks,
Gerry
Matt Marooney wrote:
> I am trying to write a program to help people who are addicted to
> internet p****graphy. This application would be tied into an online
> service where someone could sign up for monitoring, and download a
> thin client app. The application would run in the background of the
> person's computer, and upload the person's internet activity to the
> website. The service would then email this activity report to
> designated recipients. I have most of the knowledge to create this
> service, but I need to know how to do a couple things:
>
> 1. I would like the program to be "un-installable". I've heard of a
> couple of hardware security tracking services that can load a very
> small setup package in the CMOS and if a computer is stolen, and the
> hard drive is replaced, the app reloads itself and the next time the
> computer is on the internet, it sends out a beacon. Does anyone have
> any insight about how to do something like this? I want the CMOS
> program to run on boot, and check to see if the monitoring software is
> still installed. If it is not, the boot process reloads it.
>
> 2. obviously, the program does not need to be very large, so I want it
> to run in the background and not be visible to the computer's user.
> This is easy, I know, but I want the process to be completely
> invisible. (even to super-geeks)
>
> 3. I would like to figure out a way to monitor traffic for multiple
> protocols (HTTP, FTP, File Sharing, Chat, etc.) . I'm wondering if
> there is a way to figure out "bad" requests on a packet level.
>
> I really appreciate any help with these questions! Thank you all,
>
> -- Matt
>
>
>
>
>
> ----------------------------------------------------------------------
> --
>
> _______________________________________________
> Full-Disclosure - We believe in it.
> Charter: http://lists.netsys.com/full-disclosure-charter.html
- --
+------------------------------------------------------+
| Gerry Eisenhaur | | |
| Cisco Security Agent ||| ||| |
| Boxborough, Massachusetts .|||||. .|||||. |
| PGP Key: 0xC13E8AFC .:|||||||||:.:|||||||||:. |
| 978-936-0465 C i s c o S y s t e m s |
+------------------------------------------------------+
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.2.6 (GNU/Linux)
Comment: Using GnuPG with Thunderbird - http://enigmail.mozdev.org
iD8DBQFCJ2VXRY7FIcE+ivwRAsd/AKCipzmsU+j8cIwNnve3WqbgX/7i/ACeID7t
V6jxmM0BLNyGRzc73blLM5A=
=SWZV
-----END PGP SIGNATURE-----
Powered by blists - more mailing lists