Free Republic
Browse · Search
News/Activism
Topics · Post Article

Skip to comments.

Sony, Rootkits and Digital Rights Management Gone Too Far
Mark's Sysinternals ^ | Monday, October 31, 2005 | Mark's Sysinternals

Posted on 10/31/2005 7:59:57 PM PST by zeugma

click here to read article


Navigation: use the links below to view more comments.
first previous 1-2021-4041-6061-8081-88 next last
To: zeugma
I don't believe so.

Would the music CD be able to write over a read-only file?

61 posted on 11/02/2005 10:19:25 AM PST by AppyPappy (If you aren't part of the solution, there is good money to be made prolonging the problem.)
[ Post Reply | Private Reply | To 57 | View Replies]

To: AppyPappy
Would the music CD be able to write over a read-only file?

Maybe, maybe not. The 'administrator' can write over anything, although I think it normally kicks up errors. I just don't do enough in windows to be able to tell you one way or another on that.

62 posted on 11/02/2005 10:24:53 AM PST by zeugma (Warning: Self-referential object does not reference itself.)
[ Post Reply | Private Reply | To 61 | View Replies]

To: zeugma

Bottom line - Avoid Microsoft Windows like the plague.


63 posted on 11/02/2005 12:24:33 PM PST by HAL9000 (Get a Mac - The Ultimate FReeping Machine)
[ Post Reply | Private Reply | To 1 | View Replies]

To: zeugma

Bump


64 posted on 11/02/2005 12:42:24 PM PST by RJL
[ Post Reply | Private Reply | To 1 | View Replies]

To: zeugma
The problem in windows land is that there are too many programs out there written in such a (stooopid) way that they require Admin privs to run.

Actually, very few require admin privs to run, but most require admin privs to install. This little bug will fail quite readily if you attempt to run it from a non-administrative account - non-administrators cannot, by default, write to HKLM or %systemroot%.

65 posted on 11/02/2005 12:48:23 PM PST by Senator Bedfellow (g_r)
[ Post Reply | Private Reply | To 58 | View Replies]

To: zeugma; HAL9000

FYI, the term "rootkit" was originally developed to describe a process that compromised Unix systems, not Windows. You mean you didn't know this?

Here's a long list of current examples of rootkits for Unix and Linux since you seem oblivious:

http://packetstormsecurity.nl/UNIX/penetration/rootkits/


66 posted on 11/02/2005 3:46:57 PM PST by Golden Eagle
[ Post Reply | Private Reply | To 62 | View Replies]

To: Golden Eagle
I know where the term comes from moron. We're discussing a windows rootkit on this thread, or are to too freaking dense to know that.

Do you ever have anything useful to contribute to FreeRepublic?

67 posted on 11/02/2005 4:24:48 PM PST by zeugma (Warning: Self-referential object does not reference itself.)
[ Post Reply | Private Reply | To 66 | View Replies]

To: zeugma
Do you ever have anything useful to contribute to FreeRepublic?

One of my uses seems to be pointing out your inaccuracies most every time we come in contact. You did manage to admit it previously in this thread. This time though, it was your normal temper tantrum and name calling instead.

68 posted on 11/02/2005 4:28:26 PM PST by Golden Eagle
[ Post Reply | Private Reply | To 67 | View Replies]

To: Golden Eagle
I call you a moron because you are a moron. You contribute nothing at all to this forum. You are a psychic leach that attempts to suck anything good out of any discussion and divert it into word games and non-sequitors. With any luck, someday the mods will decide they've had enough of your crap and ban you permanently.
69 posted on 11/02/2005 4:45:24 PM PST by zeugma (Warning: Self-referential object does not reference itself.)
[ Post Reply | Private Reply | To 68 | View Replies]

To: zeugma

LOL, it must suck to have what you consider a moron constantly correct your ignorant claims. Guess you'll have to deal with it, since I doubt it's going to change.


70 posted on 11/02/2005 8:33:13 PM PST by Golden Eagle
[ Post Reply | Private Reply | To 69 | View Replies]

To: zeugma

Bump


71 posted on 11/02/2005 9:59:30 PM PST by jokar (On line data base http://www.trackingthethreat.com/db/index.htm)
[ Post Reply | Private Reply | To 1 | View Replies]

To: rdb3; chance33_98; Calvinist_Dark_Lord; Bush2000; PenguinWry; GodGunsandGuts; CyberCowboy777; ...
Sony releases a fix for this.
72 posted on 11/03/2005 9:19:50 AM PST by ShadowAce (Linux -- The Ultimate Windows Service Pack)
[ Post Reply | Private Reply | To 1 | View Replies]

To: ShadowAce
How do you like the accompanying self serving pablum:

"November 2, 2005 - This Service Pack removes the cloaking technology component that has been recently discussed in a number of articles published regarding the XCP Technology used on SONY BMG content protected CDs. This component is not malicious and does not compromise security. However to alleviate any concerns that users may have about the program posing potential security vulnerabilities, this update has been released to enable users to remove this component from their computers."

73 posted on 11/03/2005 9:25:45 AM PST by Still Thinking (Disregard the law of unintended consequences at your own risk.)
[ Post Reply | Private Reply | To 72 | View Replies]

To: Still Thinking
"This component is not malicious and does not compromise security."

They must be liberals. We can't judge their actions, since their intent was good ("not malicious").

The "does not compromise security" is bold-faced enough to be worthy of Harry Reid.

74 posted on 11/03/2005 9:32:37 AM PST by thulldud (It's bad luck to be superstitious.)
[ Post Reply | Private Reply | To 73 | View Replies]

To: js1138
Windows allows non-administrator accounts. This will become more user friendly in the next version of Windows, which will allow non-administrators to install programs for their own use, without touching the main registry. Non-admins who install programs will get a private programs folder and a private copy of the registry. Perhaps something like this should have been done years ago, but MS has been obsessed with making Windows work with legacy programs. I have programs from 1982 that still run on XP.

The main problem under XP is unruly software devolopers whose software doesn't play well under non-admin accounts. Not much Microsoft can do about that but withold certification.

You are absolutely right about them needing to break the backward-compatibility death spiral. They need to just pull an Apple and say, "After this, backward compatibility is not supported except in emulation mode".

75 posted on 11/03/2005 9:48:23 AM PST by RogueIsland
[ Post Reply | Private Reply | To 59 | View Replies]

To: RogueIsland
The main problem under XP is unruly software devolopers whose software doesn't play well under non-admin accounts. Not much Microsoft can do about that but withold certification.

But there is. Vista will allow non-admin users to appear as virtual admins. The software will not know the difference, but it will not be able to trash the real registry. The downside is that machines with more than one login will need to have some software installed multiple times, but disk space is cheap.

76 posted on 11/03/2005 9:57:48 AM PST by js1138 (Great is the power of steady misrepresentation.)
[ Post Reply | Private Reply | To 75 | View Replies]

To: ShadowAce

Thanks for the ping-- this stuff is happening so fast and furious that I'm finding it impossible to keep up with it all.


77 posted on 11/03/2005 10:14:03 AM PST by expat_panama
[ Post Reply | Private Reply | To 72 | View Replies]

To: Golden Eagle
FYI, the term "rootkit" was originally developed to describe a process that compromised Unix systems, not Windows. You mean you didn't know this?

I'm vaguely familar with the history of rootkits. Windows is probably the easiest platform for surreptitious installation.

Were you aware that Apple has filed a patent for tamper-resistant code?

78 posted on 11/03/2005 10:53:49 AM PST by HAL9000 (Get a Mac - The Ultimate FReeping Machine)
[ Post Reply | Private Reply | To 66 | View Replies]

To: thulldud
The "does not compromise security" is bold-faced enough to be worthy of Harry Reid.

Well, on second thought maybe it IS a true statement. Maybe they were talking about THEIR security, and not the computer security of their victims. (Also see "trusted computing")

79 posted on 11/03/2005 12:26:34 PM PST by Still Thinking (Disregard the law of unintended consequences at your own risk.)
[ Post Reply | Private Reply | To 74 | View Replies]

To: HAL9000

No I wasn't, thank you for the info.


80 posted on 11/03/2005 12:59:00 PM PST by Golden Eagle
[ Post Reply | Private Reply | To 78 | View Replies]


Navigation: use the links below to view more comments.
first previous 1-2021-4041-6061-8081-88 next last

Disclaimer: Opinions posted on Free Republic are those of the individual posters and do not necessarily represent the opinion of Free Republic or its management. All materials posted herein are protected by copyright law and the exemption for fair use of copyrighted works.

Free Republic
Browse · Search
News/Activism
Topics · Post Article

FreeRepublic, LLC, PO BOX 9771, FRESNO, CA 93794
FreeRepublic.com is powered by software copyright 2000-2008 John Robinson