[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Message-ID: <!~!UENERkVCMDkAAQACAAAAAAAAAAAAAAAAABgAAAAAAAAA0BKn9uKnWEeCDU7Vx+IAQ8KAAAAQAAAAZGx21VhRPkmueImSnB/zlQEAAAAA@online.gateway.expertworks.net>
From: aditya.deshmukh at online.gateway.expertworks.net (Aditya Deshmukh)
Subject: Bios programming...
does this not look like a big brother watching scheme ?
and with what are u trying to do how can u monitor if I access all the
things from my own proxy over encrypted tunnels using my own custom protocol
encapsulated over tcp/ip. u cannot detect it
but from your post it look like u want to hook your girl friend's or bosses
computer. better watch where u are asking question :)
_____
From: full-disclosure-bounces@...ts.netsys.com
[mailto:full-disclosure-bounces@...ts.netsys.com] On Behalf Of Matt Marooney
Sent: Friday, March 04, 2005 12:15 AM
To: full-disclosure@...ts.netsys.com
Subject: [Full-Disclosure] Bios programming...
I am trying to write a program to help people who are addicted to internet
pornography. This application would be tied into an online service where
someone could sign up for monitoring, and download a thin client app. The
application would run in the background of the person's computer, and upload
the person's internet activity to the website. The service would then email
this activity report to designated recipients. I have most of the knowledge
to create this service, but I need to know how to do a couple things:
1. I would like the program to be "un-installable". I've heard of a couple
of hardware security tracking services that can load a very small setup
package in the CMOS and if a computer is stolen, and the hard drive is
replaced, the app reloads itself and the next time the computer is on the
internet, it sends out a beacon. Does anyone have any insight about how to
do something like this? I want the CMOS program to run on boot, and check
to see if the monitoring software is still installed. If it is not, the
boot process reloads it.
2. obviously, the program does not need to be very large, so I want it to
run in the background and not be visible to the computer's user. This is
easy, I know, but I want the process to be completely invisible. (even to
super-geeks)
3. I would like to figure out a way to monitor traffic for multiple
protocols (HTTP, FTP, File Sharing, Chat, etc.) . I'm wondering if there is
a way to figure out "bad" requests on a packet level.
I really appreciate any help with these questions! Thank you all,
-- Matt
-------------- next part --------------
An HTML attachment was scrubbed...
URL: http://lists.grok.org.uk/pipermail/full-disclosure/attachments/20050304/a7a8e122/attachment.html
Powered by blists - more mailing lists