[Date Prev][Date Next]   [Thread Prev][Thread Next]   [Thread Index] [Date Index] [Author Index]

Re: How NSA access was built into Windows



On Mon, 2007-01-15 at 18:58 -0500, magicus wrote:
> -----BEGIN PGP SIGNED MESSAGE-----
> Hash: SHA1
> 
> Tim wrote:
> 
> > And you'll need to check the compiler...
> 
> Very carefully one might think, do check out:
> 
> http://www.acm.org/classics/sep95/
> 
> :-)
> 
> ciao,
> furlan
> 
> - --
> 
> Music: http://www.myspace.com/acidredux
> 
> Links: http://del.icio.us/furlan
> 
> Home:  http://flprim.us/index.html
> 
> "Play--more than piety, more than charity or vigilance--is what allows
> human beings to transcend evil."
> - -- Tom Robbins (Jitterbug Perfume)
> -----BEGIN PGP SIGNATURE-----
> Version: GnuPG v1.4.6 (GNU/Linux)
> Comment: Using GnuPG with Fedora - http://enigmail.mozdev.org
> 
> iD8DBQFFrBUUbi10WxsICPgRAiahAJsF7w3JF7Nrp1geYEgTJFd6vFjLPgCgnnVl
> P5/6VUn0UFUBg2SR8bYJ8Sc=
> =zlc8
> -----END PGP SIGNATURE-----
> 
Thank you.  I have written code that creates programs before, and even
put in things such as my name to mark my work.  But this is the most
unique thing I have seen to date.  Many forms are possible, and I have
even lectured some of the people I worked with about the issues of
secuitry and worms and trojans.  I typically use a sample based on the
old DOS concept of a TSR (Terminate and Stay Resident), today on windows
you could use a thread or a filter, or even a key press or other event
driven bit of code to accomplish the same thiing.

Regards,
Les H


[Date Prev][Date Next]   [Thread Prev][Thread Next]   [Thread Index] [Date Index] [Author Index]