lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite for Android: free password hash cracker in your pocket
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Message-ID: <003c01c5e739$28d8b4d0$5601010a@P4>
Date: Sat Nov 12 03:29:02 2005
From: full-disclosure at pchandyman.com.au (Greg)
Subject: the "Sony/BMG" virus


----- Original Message ----- 
From: "Kenneth Ng" <kenneth.d.ng@...il.com>
To: "Todd Towles" <toddtowles@...okshires.com>
Cc: <full-disclosure@...ts.grok.org.uk>
Sent: Saturday, November 12, 2005 3:46 AM
Subject: Re: [Full-disclosure] the "Sony/BMG" virus


> - Right now the program phones home with info every time you play a song. 
> How long before it phones home when you play
> competitors songs?

Question - would a SIMPLE firewall prog that checks outbound connections 
properly (eg, not Win XP firewall) pick up an odd attempt to connect to the 
net? Eg, even if it is hiding and cloaked how did it connect to the net? 
Port 80 for example (anyone remember the original Realplayer "phone home" 
controversy years back?)?

Greg. 

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ