Skip to comments.
Sony, Rootkits and Digital Rights Management Gone Too Far
Mark's Sysinternals ^
| Monday, October 31, 2005
| Mark's Sysinternals
Posted on 10/31/2005 7:59:57 PM PST by zeugma
click here to read article
Navigation: use the links below to view more comments.
first previous 1-20, 21-40, 41-60, 61-80, 81-88 next last
To: zeugma
I don't believe so.Would the music CD be able to write over a read-only file?
61
posted on
11/02/2005 10:19:25 AM PST
by
AppyPappy
(If you aren't part of the solution, there is good money to be made prolonging the problem.)
To: AppyPappy
Would the music CD be able to write over a read-only file?Maybe, maybe not. The 'administrator' can write over anything, although I think it normally kicks up errors. I just don't do enough in windows to be able to tell you one way or another on that.
62
posted on
11/02/2005 10:24:53 AM PST
by
zeugma
(Warning: Self-referential object does not reference itself.)
To: zeugma
Bottom line - Avoid Microsoft Windows like the plague.
63
posted on
11/02/2005 12:24:33 PM PST
by
HAL9000
(Get a Mac - The Ultimate FReeping Machine)
To: zeugma
64
posted on
11/02/2005 12:42:24 PM PST
by
RJL
To: zeugma
The problem in windows land is that there are too many programs out there written in such a (stooopid) way that they require Admin privs to run. Actually, very few require admin privs to run, but most require admin privs to install. This little bug will fail quite readily if you attempt to run it from a non-administrative account - non-administrators cannot, by default, write to HKLM or %systemroot%.
To: zeugma; HAL9000
FYI, the term "rootkit" was originally developed to describe a process that compromised Unix systems, not Windows. You mean you didn't know this?
Here's a long list of current examples of rootkits for Unix and Linux since you seem oblivious:
http://packetstormsecurity.nl/UNIX/penetration/rootkits/
To: Golden Eagle
I know where the term comes from moron. We're discussing a
windows rootkit on this thread, or are to too freaking dense to know that.
Do you ever have anything useful to contribute to FreeRepublic?
67
posted on
11/02/2005 4:24:48 PM PST
by
zeugma
(Warning: Self-referential object does not reference itself.)
To: zeugma
Do you ever have anything useful to contribute to FreeRepublic? One of my uses seems to be pointing out your inaccuracies most every time we come in contact. You did manage to admit it previously in this thread. This time though, it was your normal temper tantrum and name calling instead.
To: Golden Eagle
I call you a moron because you are a moron. You contribute nothing at all to this forum. You are a psychic leach that attempts to suck anything good out of any discussion and divert it into word games and non-sequitors. With any luck, someday the mods will decide they've had enough of your crap and ban you permanently.
69
posted on
11/02/2005 4:45:24 PM PST
by
zeugma
(Warning: Self-referential object does not reference itself.)
To: zeugma
LOL, it must suck to have what you consider a moron constantly correct your ignorant claims. Guess you'll have to deal with it, since I doubt it's going to change.
To: zeugma
71
posted on
11/02/2005 9:59:30 PM PST
by
jokar
(On line data base http://www.trackingthethreat.com/db/index.htm)
To: rdb3; chance33_98; Calvinist_Dark_Lord; Bush2000; PenguinWry; GodGunsandGuts; CyberCowboy777; ...
72
posted on
11/03/2005 9:19:50 AM PST
by
ShadowAce
(Linux -- The Ultimate Windows Service Pack)
To: ShadowAce
How do you like the accompanying self serving pablum:
"November 2, 2005 - This Service Pack removes the cloaking technology component that has been recently discussed in a number of articles published regarding the XCP Technology used on SONY BMG content protected CDs. This component is not malicious and does not compromise security. However to alleviate any concerns that users may have about the program posing potential security vulnerabilities, this update has been released to enable users to remove this component from their computers."
73
posted on
11/03/2005 9:25:45 AM PST
by
Still Thinking
(Disregard the law of unintended consequences at your own risk.)
To: Still Thinking
"This component is not malicious and does not compromise security." They must be liberals. We can't judge their actions, since their intent was good ("not malicious").
The "does not compromise security" is bold-faced enough to be worthy of Harry Reid.
74
posted on
11/03/2005 9:32:37 AM PST
by
thulldud
(It's bad luck to be superstitious.)
To: js1138
Windows allows non-administrator accounts. This will become more user friendly in the next version of Windows, which will allow non-administrators to install programs for their own use, without touching the main registry. Non-admins who install programs will get a private programs folder and a private copy of the registry. Perhaps something like this should have been done years ago, but MS has been obsessed with making Windows work with legacy programs. I have programs from 1982 that still run on XP. The main problem under XP is unruly software devolopers whose software doesn't play well under non-admin accounts. Not much Microsoft can do about that but withold certification.
You are absolutely right about them needing to break the backward-compatibility death spiral. They need to just pull an Apple and say, "After this, backward compatibility is not supported except in emulation mode".
To: RogueIsland
The main problem under XP is unruly software devolopers whose software doesn't play well under non-admin accounts. Not much Microsoft can do about that but withold certification. But there is. Vista will allow non-admin users to appear as virtual admins. The software will not know the difference, but it will not be able to trash the real registry. The downside is that machines with more than one login will need to have some software installed multiple times, but disk space is cheap.
76
posted on
11/03/2005 9:57:48 AM PST
by
js1138
(Great is the power of steady misrepresentation.)
To: ShadowAce
Thanks for the ping-- this stuff is happening so fast and furious that I'm finding it impossible to keep up with it all.
To: Golden Eagle
FYI, the term "rootkit" was originally developed to describe a process that compromised Unix systems, not Windows. You mean you didn't know this? I'm vaguely familar with the history of rootkits. Windows is probably the easiest platform for surreptitious installation.
Were you aware that Apple has filed a patent for tamper-resistant code?
78
posted on
11/03/2005 10:53:49 AM PST
by
HAL9000
(Get a Mac - The Ultimate FReeping Machine)
To: thulldud
The "does not compromise security" is bold-faced enough to be worthy of Harry Reid.Well, on second thought maybe it IS a true statement. Maybe they were talking about THEIR security, and not the computer security of their victims. (Also see "trusted computing")
79
posted on
11/03/2005 12:26:34 PM PST
by
Still Thinking
(Disregard the law of unintended consequences at your own risk.)
To: HAL9000
No I wasn't, thank you for the info.
Navigation: use the links below to view more comments.
first previous 1-20, 21-40, 41-60, 61-80, 81-88 next last
Disclaimer:
Opinions posted on Free Republic are those of the individual
posters and do not necessarily represent the opinion of Free Republic or its
management. All materials posted herein are protected by copyright law and the
exemption for fair use of copyrighted works.
FreeRepublic.com is powered by software copyright 2000-2008 John Robinson