Free Republic
Browse · Search
News/Activism
Topics · Post Article

To: RedBloodedAmerican
A British research lab ran the story a couple months ago.
17 posted on 01/18/2003 9:20:08 AM PST by steve50
[ Post Reply | Private Reply | To 12 | View Replies ]


To: steve50
http://www.windowsbbs.com/showthread.php?s=7ce73da18993ed68cdcc9f15d9048297&threadid=13442

"Read this on another site--thought it might be of interest to some folks.

XP Phone Home
I've mentioned my recent play with ZoneAlarm Pro, and while I don't use it heavily, I have left it to start automatically on one workstation where I do a lot of software testing. It's a fairly clean installation of Windows XP Pro, Office XP and a few other commonly used tools. Part of my routine with XP is to put a halt to the various automated procedures that it attempts to shove down my throat. This would include Automatic Updates most notably, but I also be sure to disable Windows Messenger, IE automatic updates and Error Reporting. Nothing should be contacting Microsoft without my knowledge as things are configured.

Imagine my horror when ZoneAlarm informs me that rundll32.exe wishes to contact 207.46.134.94:HTTP. I realize that spyware and viruses have posed as the legitimate rundll32.exe, but there are two things to consider. First of all, 207.46.134.94 is Microsoft's Windows Update site. Second, the version and date are identical to those of the rundll32.exe file on a different Windows XP Pro installation.

Nothing is launching from any of the startup registry entries or Startup Program Group using rundll32.exe explicitly, and there certainly isn't anything specific to Microsoft that is launching in those areas.

A service perhaps? Well, the process associated with rundll32.exe is executing under the context of my username, versus SYSTEM, which most services utilize unless configured to use different credentials. Speaking of services, both the Cryptographic Services and (gasp) Automatic Updates have been started by the operating system behind my back!

I have denied the access for now, but I have not forgotten. Next, I dig out a hub so I can sniff the packets as they wander by for clues regarding the suspicious activity. Not that I'm going to let it contact Microsoft, mind you. I also plan to fire up a full- blown hardware router to further isolate the machine from Microsoft, add a static route for the offending IP address, pointing it at a Windows 2000 server running IIS so there will at least be a session establishment attempt instead of the request being immediately stomped by the router and/or ZoneAlarm.

My suspicions at this point are not that Microsoft is being deceptive, collecting my hat size or preference in pain relievers for subversive use, but this lends weight to my very sincere believe that Microsoft is overstepping the bounds of reasonable respect to paying customers. Whatever XP is trying to do is likely trivial, but how it's being done is far from it. I'm plenty steamed, believe me."

19 posted on 01/18/2003 9:22:50 AM PST by Sir Gawain (_|_)
[ Post Reply | Private Reply | To 17 | View Replies ]

To: steve50
Thanks, I'll see if I can find the story. If you have a link to it handy, I'd like to know what the review was.

You can connect to the net and see what ports are open, then check to where (who) they connect to. And as for the auto update feature you can disable it in control panel and remove it from task manager. It does NOT control your computer in an attempt to contact MS when set up properly. The main problem with PCs running Windows is operator error.

32 posted on 01/18/2003 10:26:06 AM PST by RedBloodedAmerican
[ Post Reply | Private Reply | To 17 | View Replies ]

Free Republic
Browse · Search
News/Activism
Topics · Post Article


FreeRepublic, LLC, PO BOX 9771, FRESNO, CA 93794
FreeRepublic.com is powered by software copyright 2000-2008 John Robinson