[Full-Disclosure] Bios programming...
droyer at taleo.com
Thu Mar 3 20:31:00 GMT 2005
That's a funny one, really...
Can you adapt your application to open a backdoor on the person's
computer and email me it's IP address?
From: full-disclosure-bounces at lists.netsys.com
[mailto:full-disclosure-bounces at lists.netsys.com] On Behalf Of Christian
Sent: Thursday, March 03, 2005 2:40 PM
To: full-disclosure at lists.netsys.com
Subject: Re: [Full-Disclosure] Bios programming...
On Thu, Mar 03, 2005 at 01:44:39PM -0500, Matt Marooney wrote:
> I am trying to write a program to help people who are addicted to
That is very nice of you.
> This application would be tied into an online service where
> someone could sign up for monitoring, and download a thin client
> application would run in the background of the person's computer,
> upload the person's internet activity to the website. The service
> then email this activity report to designated recipients. I have
> the knowledge to create this service, but I need to know how to do
> couple things:
I see millions of poor addicts that would love to get logs sent to some
service. This service WILL have a GREAT future!!
> 1. I would like the program to be "un-installable". I've heard of
> couple of hardware security tracking services that can load a very
> setup package in the CMOS and if a computer is stolen, and the hard
> is replaced, the app reloads itself and the next time the computer
> the internet, it sends out a beacon. Does anyone have any insight
> how to do something like this? I want the CMOS program to run on
> and check to see if the monitoring software is still installed. If
> not, the boot process reloads it.
That's easy, will easily run on millions of different hardware
> 2. obviously, the program does not need to be very large, so I want
> run in the background and not be visible to the computer's user.
> easy, I know, but I want the process to be completely invisible.
You are lying.
There is no reason why someone would sign up for a service that installs
some application that is invisible and not removable and sents data to
> 3. I would like to figure out a way to monitor traffic for multiple
> protocols (HTTP, FTP, File Sharing, Chat, etc.) . I'm wondering if
> is a way to figure out "bad" requests on a packet level.
In the end you are either a insufficient troll or someone who has no
idea of nothing.
Oh, or you are working for the Bush administration.
 If that is true, I'm sorry that i gave food to it.
Full-Disclosure - We believe in it.
Full-Disclosure is hosted and sponsored by Secunia.