Free Republic
Browse · Search
News/Activism
Topics · Post Article

To: longtermmemmory
the professor said the malicious code was self erasing

And how do you do that? Pretty neat trick, easy for a Princeton professor with an agenda to say, but let's see a real demo backed up by computer forensic experts and James Randi if he's available.

How does the malware know when to erase itself? Remember too, it was loaded from a bogus memory card. The card would need to know that it was about to be removed from the machine, signal the operating system, have sys delete the malware and correct CRC, then sys deletes the malware from within its own code space. Then does it recompile itself? Don't forget, it would have to secure-wipe the free space in memory too.

And if the malware resides in a eeprom on the motherboard, the motherboard would need to have an eeprom burner onboard for sys to instruct to reprogram the eeprom.

Sorry, the story borders on magic and does not pass the computer geek smell test.
53 posted on 10/20/2006 12:54:02 PM PDT by DBrow
[ Post Reply | Private Reply | To 51 | View Replies ]


To: DBrow

It is on YouTube.

You do a search of Princeton and Diebold and it comes up and you can hear and see him explain it himself.


58 posted on 10/20/2006 1:24:18 PM PDT by longtermmemmory (VOTE! http://www.senate.gov and http://www.house.gov)
[ Post Reply | Private Reply | To 53 | View Replies ]

Free Republic
Browse · Search
News/Activism
Topics · Post Article


FreeRepublic, LLC, PO BOX 9771, FRESNO, CA 93794
FreeRepublic.com is powered by software copyright 2000-2008 John Robinson