How NSA access was built into Windows

Anne Wilson cannewilson at tiscali.co.uk
Wed Jan 17 11:44:32 UTC 2007


On Wednesday 17 January 2007 02:24, Les wrote:
>
> Thank you.  I have written code that creates programs before, and even
> put in things such as my name to mark my work.  But this is the most
> unique thing I have seen to date.  Many forms are possible, and I have
> even lectured some of the people I worked with about the issues of
> secuitry and worms and trojans.  I typically use a sample based on the
> old DOS concept of a TSR (Terminate and Stay Resident), today on windows
> you could use a thread or a filter, or even a key press or other event
> driven bit of code to accomplish the same thiing.
>
Hah!  Now I understand!  This thread is a trojan!  That's why it stays active 
no matter what I do! :-)

Anne
-------------- next part --------------
A non-text attachment was scrubbed...
Name: not available
Type: application/pgp-signature
Size: 189 bytes
Desc: not available
URL: <http://listman.redhat.com/archives/fedora-list/attachments/20070117/ea6e9943/attachment-0001.sig>


More information about the fedora-list mailing list