Skip to main content

Posts

Showing posts from November, 2005

Bots

bots' For Sony Cd Software Spotted Online Sony's software, installed when playing one of the record label's recent copy-protected CDs in a computer, hides itself on hard drives using a powerful programming tool called a "rootkit." But the tool leaves the door open behind it, allowing other software--including viruses--to be deeply hidden behind the rootkit cloak. The first version of a Trojan horse spotted early Thursday, which aims to give an attacker complete remote control over an infected computer, didn't work well. But over the course of the day, several others emerged that apparently fixed early flaws. This is no longer a theoretical vulnerability; it is a real vulnerability," said Sam Curry, vice president of Computer Associates' eTrust Security Management division. "This is no longer about digital rights management or content protection, this is about people having their PCs taken over." Sony's use of the rootkit software has spa

Is it only IT individuals who do hacking..?

Most of time hackers known as individuals who committed to attack some one with his/her skills in IT, but when considering the news that we listen in our day to day life, we can ask a question from our selves that does only those individuals who use hacker skills..? . I don think so, see now day it seems most big organizations use hacker skills too As you know the SONY BMG crisis is long talked news that we heard few days ago. SONY BMG is not the only organizations who use hacker skills to businesses issues. Nowadays hackers are used by military, intelligence services and there are some hacker companies too, most known as computer security companies. The bottom line is every body need hackers and their skills; only deference is how they use them or their skills against others. Well in a way it seems hackers make somebody’s life comfortable while some one get in trouble, well what do you think..?

Adding Back Doors to the Standard C Library

Adding Back Doors to the Standard C Library Hacked by chrootstrap December 2003 (GNU Free Documentation License ) In computer terms, a library is an archive of reusable functions, data, and types. When a program uses parts of a library, the library is said to be statically linked when the library's parts are copied into the program and dynamically linked when the parts are loaded when the program are running. Libraries which support dynamic linking are said to be shared libraries because their parts may be used by many different programs, even at the same time. Only one copy of the parts needs to be on the system and any updates to a part apply to all programs using the part. Because of these advantages, shared libraries are very popular on many operating systems including Linux. Normally when a shared library is updated or changed, it has to be rebuilt from all of the original parts and the new library simply replaces the old library. It is possible, however, to modify the l

Sony's Anti Piracy

Sonys Xcp Anti Piracy Mechanism Shut Down! Well its funny that the same mechanism they used to stop piracy is now being copied by hackers to create worms and spyware.Sony had to shut down production of there new disk becuase of the security risk .. I guess its true that when they step up so will others to put them down.. Entertainment giant Sony has finally announced that they are suspending the production of their music CDs that are loaded with controversial anti-piracy mechanism. These measures installed hidden software on the MS Windows based machines to limit the number of times the CD can be replicated on it. However, the mechanism has been so insecure that the concept has been picked up hackers to develop spywares and worms based on it. Sony has however claimed that they standby their right to prevent users from pirating songs and other digital content from the CDs. They are however halting the manufacturing of these disks, which used XCP technology. Sony sa

Hacking Art or Science

By Mark Hinge (Thu, 29 Sep 2005 21:40:00 +0100) 1. Introduction The argument regarding the principal nature of hacking - be it an art or a science is not a new one. This paper hopes to discuss both the meaning of the term “hack” and the underlying arguments for it being defined as an art or a science in reference to the base principles and basic methodologies of the discipline. Ultimately the question is this: Does the creative thinking required to be a successful “hacker” outweigh the necessity for scientific process? The dictionary [www.dictionary.com] defines the term “hacking” in a computer security context as: 1. Informal. a. To write or refine computer programs skilfully. b. To use one's skill in computer programming to gain illegal or unauthorized access to a file or network: hacked into the company's intranet. The origin of the term however is a far more relevant issue than the “dictionary” definition itself – as is the subsequent media bastardisat