How NSA access was built into Windows
Anne Wilson
cannewilson at tiscali.co.uk
Wed Jan 17 11:44:32 UTC 2007
On Wednesday 17 January 2007 02:24, Les wrote:
>
> Thank you. I have written code that creates programs before, and even
> put in things such as my name to mark my work. But this is the most
> unique thing I have seen to date. Many forms are possible, and I have
> even lectured some of the people I worked with about the issues of
> secuitry and worms and trojans. I typically use a sample based on the
> old DOS concept of a TSR (Terminate and Stay Resident), today on windows
> you could use a thread or a filter, or even a key press or other event
> driven bit of code to accomplish the same thiing.
>
Hah! Now I understand! This thread is a trojan! That's why it stays active
no matter what I do! :-)
Anne
-------------- next part --------------
A non-text attachment was scrubbed...
Name: not available
Type: application/pgp-signature
Size: 189 bytes
Desc: not available
URL: <http://listman.redhat.com/archives/fedora-list/attachments/20070117/ea6e9943/attachment-0001.sig>
More information about the fedora-list
mailing list