ну понятно, все та же песня Высоцкого. Вообщем поймаем,увидим, пощупаем, вылечим наконец, а там видно будет. А пока вопрос вы кто-нибудь то реально бирус ловили? Или это из анекдота " петька сказал , что у федьки есть 300р, а тот в свою очередь видел их у васьки"
LoJack for Laptops
A software product from Vancouver, Canada, based Absolute Software that enables law enforcement to recover stolen laptops by tracing them via the Internet.[9][10] The product was initially sold under the name "Computrace". In 2005, Absolute Software licensed the LoJack brand name and produces the software under both the Computrace and "LoJack for Laptops" product names.[11] Unlike the LoJack for vehicles and equipment products, which use a small radio beacon installed in the tracked device, the Computrace/LoJack for Laptops product is laptop tracking software that periodically phones home to Absolute Software's server to both announce its location and to check to see if the machine has been reported stolen.[12][13] LoJack comes preinstalled in the BIOSes of, at least, Lenovo, HP, Dell, Fujitsu, Panasonic, Toshiba, and Asus machines.[14] It is disabled by default and can be enabled by purchasing a license for Computrace; upon being enabled, the BIOS will copy a downloader named rpcnetp.exe from the BIOS flash ROM to %WINDIR%\System32 (which usually resolves to C:\WINDOWS\System32) which will in turn download the actual agent rpcnet.exe and install it as a windows service. Recently[when?], Dell, Lenovo, Panasonic and Fujitsu appear to have discontinued this method and require manual installation.[citation needed] Once enabled, Computrace cannot be disabled or deinstalled without assistance from Absolute Software, not even by reformatting or substituting the hard disk, because the BIOS keeps reinstalling or repairing it prior to loading the operating system.
From then on, rpcnet.exe will phone home to Absolute Software servers once a day, querying for a possible theft report, and, in any case, transmitting the results of a comprehensive system scan, IP address, user- and machine names and location data, which it obtains either by tapping the GPS data stream on machines equipped with GPS hardware, or by triangulating available WLAN access points in the vicinity, by providing WLAN IDs and signal strengths so Absolute Software servers can geolocate the device using the Mexens Technology data base.[citation needed]
If Absolute receives a theft report, the service can be remotely commanded to phone home every 15 minutes, install additional 3rd vendor software, such as a key logger or a forensic package, make screenshots, etc.
Computrace also supports Intel's AT-p anti theft protection scheme: If it is unable to phone home within a configurable time interval it will require a special BIOS password upon the next reboot. It can be configured to shut down the machine's power supply immediately in this case, to force a reboot. As the Computrace client exhibits trojan-like behaviour, it was detected as TR/Hijack.Explor.1245 or W32/Agent.SW!tr by antivirus software; however, these warnings have been discontinued.[citation needed]
At the Black Hat Briefings conference in 2009, researchers Anibal Sacco[15] and Alfredo Ortega showed that the implementation of the Computrace/LoJack agent embedded in the BIOS has vulnerabilities and that this "available control of the anti-theft agent allows a highly dangerous form of BIOS-enhanced rootkit that can bypass all chipset or installation restrictions and reutilize many existing features offered in this kind of software."[16][17] Absolute Software rejected the claims made in the research, stating that "the presence of the Computrace module in no way weakens the security of the BIOS". Another independent analyst confirmed the flaws, noted that a malware hijacking attack would be a "highly exotic one", and suggested that the larger concern was that savvy thieves could disable the phone home feature.[18]
Later, Core Security Technologies proved the researcher's finding by making publicly available several proofs of concept, videos, and utilities on its webpage.
p.s. если очень хочется покопаться:
найти один из таких буков и слить биос в котором уже джек-код вкручен.
p.p.s. а если внимательнее почитать то, о чем, мистер сказочник говорит, то можно узнать человека под именем pinczacco
ну а если еще ето имя и погуглитЬ... sites.google.com/site/pinczakko/
p.p.p.s. я когда был на ЦЕС в лас вегасе, говорил с ихним главным по программированию (Aly S.), он поделился, что у них большая часть программеров из россии и украины...
ну понятно, все та же песня Высоцкого. Вообщем поймаем,увидим, пощупаем, вылечим наконец, а там видно будет. А пока вопрос вы кто-нибудь то реально бирус ловили? Или это из анекдота " петька сказал , что у федьки есть 300р, а тот в свою очередь видел их у васьки"
Уважаемый Bishop, от чего же не смешно? я как тут посмотрел почти вся администрация сайта любит поржать и поиздеваться
Нда, grin_78 так и не смог пройти по пути самосовершенствования ни одного шага.
ага, а вы похоже шагнули далеко и надолго, только в пропасть. за которой уже не видете своих ошибок, а замечаете только чужие
Ваши ошибки трудно не заметить .
не вижу смысла дальше продолжать дискуссию не о чем. " а если бы да кабы". Увидим товар лицом, потом поговорим
ооо не зря Вы сказочник, О Великий и Ужасный Масо!!!
LoJack for Laptops
A software product from Vancouver, Canada, based Absolute Software that enables law enforcement to recover stolen laptops by tracing them via the Internet.[9][10] The product was initially sold under the name "Computrace". In 2005, Absolute Software licensed the LoJack brand name and produces the software under both the Computrace and "LoJack for Laptops" product names.[11] Unlike the LoJack for vehicles and equipment products, which use a small radio beacon installed in the tracked device, the Computrace/LoJack for Laptops product is laptop tracking software that periodically phones home to Absolute Software's server to both announce its location and to check to see if the machine has been reported stolen.[12][13] LoJack comes preinstalled in the BIOSes of, at least, Lenovo, HP, Dell, Fujitsu, Panasonic, Toshiba, and Asus machines.[14] It is disabled by default and can be enabled by purchasing a license for Computrace; upon being enabled, the BIOS will copy a downloader named rpcnetp.exe from the BIOS flash ROM to %WINDIR%\System32 (which usually resolves to C:\WINDOWS\System32) which will in turn download the actual agent rpcnet.exe and install it as a windows service. Recently[when?], Dell, Lenovo, Panasonic and Fujitsu appear to have discontinued this method and require manual installation.[citation needed] Once enabled, Computrace cannot be disabled or deinstalled without assistance from Absolute Software, not even by reformatting or substituting the hard disk, because the BIOS keeps reinstalling or repairing it prior to loading the operating system.
From then on, rpcnet.exe will phone home to Absolute Software servers once a day, querying for a possible theft report, and, in any case, transmitting the results of a comprehensive system scan, IP address, user- and machine names and location data, which it obtains either by tapping the GPS data stream on machines equipped with GPS hardware, or by triangulating available WLAN access points in the vicinity, by providing WLAN IDs and signal strengths so Absolute Software servers can geolocate the device using the Mexens Technology data base.[citation needed]
If Absolute receives a theft report, the service can be remotely commanded to phone home every 15 minutes, install additional 3rd vendor software, such as a key logger or a forensic package, make screenshots, etc.
Computrace also supports Intel's AT-p anti theft protection scheme: If it is unable to phone home within a configurable time interval it will require a special BIOS password upon the next reboot. It can be configured to shut down the machine's power supply immediately in this case, to force a reboot.
As the Computrace client exhibits trojan-like behaviour, it was detected as TR/Hijack.Explor.1245 or W32/Agent.SW!tr by antivirus software; however, these warnings have been discontinued.[citation needed]
At the Black Hat Briefings conference in 2009, researchers Anibal Sacco[15] and Alfredo Ortega showed that the implementation of the Computrace/LoJack agent embedded in the BIOS has vulnerabilities and that this "available control of the anti-theft agent allows a highly dangerous form of BIOS-enhanced rootkit that can bypass all chipset or installation restrictions and reutilize many existing features offered in this kind of software."[16][17] Absolute Software rejected the claims made in the research, stating that "the presence of the Computrace module in no way weakens the security of the BIOS". Another independent analyst confirmed the flaws, noted that a malware hijacking attack would be a "highly exotic one", and suggested that the larger concern was that savvy thieves could disable the phone home feature.[18]
Later, Core Security Technologies proved the researcher's finding by making publicly available several proofs of concept, videos, and utilities on its webpage.
source: en.wikipedia.org/wiki/LoJack#LoJack_for_Laptops
p.s. если очень хочется покопаться:
найти один из таких буков и слить биос в котором уже джек-код вкручен.
p.p.s. а если внимательнее почитать то, о чем, мистер сказочник говорит, то можно узнать человека под именем pinczacco
ну а если еще ето имя и погуглитЬ...
sites.google.com/site/pinczakko/
p.p.p.s. я когда был на ЦЕС в лас вегасе, говорил с ихним главным по программированию (Aly S.), он поделился, что у них большая часть программеров из россии и украины...
Для неверующих: 3dnews.ru/software-news/616944
Thinking... [■■■■■■■■■■■■■■■□□□□□]75% completed...
"что у них большая часть программеров из россии и украины" , вот тоже мне , дейсвительно новость!!!
Отправить комментарий