[<prev] [next>] [day] [month] [year] [list]
From: droyer at taleo.com (David Royer)
Subject: Bios programming...
That's a funny one, really...
Can you adapt your application to open a backdoor on the person's
computer and email me it's IP address?
Best regards,
David
-----Original Message-----
From: full-disclosure-bounces@...ts.netsys.com
[mailto:full-disclosure-bounces@...ts.netsys.com] On Behalf Of Christian
Leber
Sent: Thursday, March 03, 2005 2:40 PM
To: full-disclosure@...ts.netsys.com
Subject: Re: [Full-Disclosure] Bios programming...
On Thu, Mar 03, 2005 at 01:44:39PM -0500, Matt Marooney wrote:
> I am trying to write a program to help people who are addicted to
internet
> pornography.
That is very nice of you.
> This application would be tied into an online service where
> someone could sign up for monitoring, and download a thin client
app. The
> application would run in the background of the person's computer,
and
> upload the person's internet activity to the website. The service
would
> then email this activity report to designated recipients. I have
most of
> the knowledge to create this service, but I need to know how to do
a
> couple things:
I see millions of poor addicts that would love to get logs sent to some
service. This service WILL have a GREAT future!!
> 1. I would like the program to be "un-installable". I've heard of
a
> couple of hardware security tracking services that can load a very
small
> setup package in the CMOS and if a computer is stolen, and the hard
drive
> is replaced, the app reloads itself and the next time the computer
is on
> the internet, it sends out a beacon. Does anyone have any insight
about
> how to do something like this? I want the CMOS program to run on
boot,
> and check to see if the monitoring software is still installed. If
it is
> not, the boot process reloads it.
That's easy, will easily run on millions of different hardware
combinations. NOT
> 2. obviously, the program does not need to be very large, so I want
it to
> run in the background and not be visible to the computer's user.
This is
> easy, I know, but I want the process to be completely invisible.
(even to
> super-geeks)
You are lying.
There is no reason why someone would sign up for a service that installs
some application that is invisible and not removable and sents data to
some "service".
> 3. I would like to figure out a way to monitor traffic for multiple
> protocols (HTTP, FTP, File Sharing, Chat, etc.) . I'm wondering if
there
> is a way to figure out "bad" requests on a packet level.
In the end you are either a insufficient troll[1] or someone who has no
idea of nothing.
Oh, or you are working for the Bush administration.
Regards
Christian Leber
[1] If that is true, I'm sorry that i gave food to it.
--
http://www.nosoftwarepatents.com
_______________________________________________
Full-Disclosure - We believe in it.
Charter: http://lists.netsys.com/full-disclosure-charter.html
Powered by blists - more mailing lists