From: Beauregard T. Shagnasty on
G. Morgan wrote, about keylogging software:

> I'm not the only one with admin rights to my PC, I have a girlfriend
> (nuf' said?) lol ...

If you don't trust her, why does she have an _admin_ account on your
computer?

Solution: upgrade to Girlfriend 2.0

--
-bts
-Four wheels carry the body; two wheels move the soul
From: ~BD~ on
FromTheRafters wrote:
> "~BD~"<BoaterDave(a)hot.mail.co.uk> wrote in message
> news:156dnS2rcsGUg0HWnZ2dnUVZ8o6dnZ2d(a)bt.com...
[...]
>> *What if* ....... ?
>>
>> One or more of those 'trusted' malware cleaning forums (or even a
>> trusted software programme) could, surely, download such a programme
>> onto a user's machine so that, forever afterwards, whatever is done on
>> that machine may be monitored by an outside agency.

Thank you for responding FTR! :)

> That's not very likely,

But .... *I* believe that it is *possible*!
********

As I've said elsewhere ..........

"What a super ruse it would be, eh? - to clear a machine of everyone
else's 'nasties' but then, perhaps, leave their own package installed on
the user's machine. No one would ever suspect, would they?"

> such a trojan would soon be discovered and dealt
> with - very bad for the 'trusted' source's reputation.[...]

Now this is where we seem to have a *real* difference of opinion, FTR!

Just *who* would discover such covert malware. With today's high-speed
and powerful machines a *user* is highly *unlikely* to discover that
they have become part of a botnet! If their /cleaned/ machine is
performing *better* that it had in a long while, why would the *user*
suspect anything untoward?

My limited understanding of matters is that once a machine is under the
control of a botmaster, all personal control is effectively lost.

Do you dispute this?

> I can't think of a legitimate reason, offhand, for surreptitiously
> installing spyware. The administrator/owner of a machine can install it
> *and* exclude the AV or whatever from alerting someone in userland to
> its existence.

The reasons for installing /illegitimate/ spyware are manifold but it
would be principally to steal money. Cybercrime has risen exponentially
since the advent of high-speed Broadband connection - maybe in the past
6 or 7 years in most places.

How this has happened is of much interest to me. Perhaps we could
discuss anything in this article which which you disagree?

http://www.geekstogo.com/2007/10/03/what-is-a-backdoor-trojan/

I was especially interested in this extract:-

"Because backdoor trojans have the potential to gain such complete
control of a system, and install malicious code that may not be
detectable, it�s wise to consider reformatting any system that�s been
infected."

MAY NOT BE DETECTABLE - Wow! ;-)

--
Dave - seeking only the truth
From: FromTheRafters on
"~BD~" <BoaterDave(a)hot.mail.co.uk> wrote in message
news:8aydnQR6ar0tr0DWnZ2dnUVZ8oKdnZ2d(a)bt.com...
> FromTheRafters wrote:
>> "~BD~"<BoaterDave(a)hot.mail.co.uk> wrote in message
>> news:156dnS2rcsGUg0HWnZ2dnUVZ8o6dnZ2d(a)bt.com...
> [...]
>>> *What if* ....... ?
>>>
>>> One or more of those 'trusted' malware cleaning forums (or even a
>>> trusted software programme) could, surely, download such a programme
>>> onto a user's machine so that, forever afterwards, whatever is done
>>> on
>>> that machine may be monitored by an outside agency.
>
> Thank you for responding FTR! :)
>
>> That's not very likely,
>
> But .... *I* believe that it is *possible*!
> ********
>
> As I've said elsewhere ..........
>
> "What a super ruse it would be, eh? - to clear a machine of everyone
> else's 'nasties' but then, perhaps, leave their own package installed
> on the user's machine. No one would ever suspect, would they?"
>
>> such a trojan would soon be discovered and dealt
>> with - very bad for the 'trusted' source's reputation.[...]
>
> Now this is where we seem to have a *real* difference of opinion, FTR!
>
> Just *who* would discover such covert malware. With today's high-speed
> and powerful machines a *user* is highly *unlikely* to discover that
> they have become part of a botnet! If their /cleaned/ machine is
> performing *better* that it had in a long while, why would the *user*
> suspect anything untoward?

Bigger picture:

Remember the quote about how you can fool some of the people some of the
time, but you can't fool all of the people all of the time? Malware like
that relies on the first part of that quote. It doesn't care about the
second part because there is no shortage of fools. Such software does
eventually get discovered, but usually cannot be traced back to a single
source - there are many sources and they change location often. If
someone has a *real firewall* then this type of commercial malware's
activities can soon be discovered.

So asking "who would" is the wrong question - the individual is
insignificant in comparison to the whole. Instead you must ask yourself
if *anybody* would discover the hidden function, and what that would
mean to an otherwise legitimate (contactable) business.

> My limited understanding of matters is that once a machine is under
> the control of a botmaster, all personal control is effectively lost.
>
> Do you dispute this?

Yes, but I may be reading it differently than you are. It would depend
on how much control is still afforded you by the nature of the offeding
program.

[...]

> I was especially interested in this extract:-
>
> "Because backdoor trojans have the potential to gain such complete
> control of a system, and install malicious code that may not be
> detectable, it�s wise to consider reformatting any system that�s been
> infected."
>
> MAY NOT BE DETECTABLE - Wow! ;-)

Not to be confused with being "undetectable". :o)

The author is probable talking about what I usually refer to here as
"unknowns". Once you discover that you have a backdoor trojan that is
known to download and execute various and sundry *other* malicious
programs. Various and sundry "may not be detectable" since they are
undefined.


From: ~BD~ on
FromTheRafters wrote:
> "~BD~"<BoaterDave(a)hot.mail.co.uk> wrote in message
> news:8aydnQR6ar0tr0DWnZ2dnUVZ8oKdnZ2d(a)bt.com...
>> FromTheRafters wrote:
>>> "~BD~"<BoaterDave(a)hot.mail.co.uk> wrote in message
>>> news:156dnS2rcsGUg0HWnZ2dnUVZ8o6dnZ2d(a)bt.com...
>> [...]
>>>> *What if* ....... ?
>>>>
>>>> One or more of those 'trusted' malware cleaning forums (or even a
>>>> trusted software programme) could, surely, download such a programme
>>>> onto a user's machine so that, forever afterwards, whatever is done
>>>> on
>>>> that machine may be monitored by an outside agency.
>>
>> Thank you for responding FTR! :)
>>
>>> That's not very likely,
>>
>> But .... *I* believe that it is *possible*!
>> ********
>>
>> As I've said elsewhere ..........
>>
>> "What a super ruse it would be, eh? - to clear a machine of everyone
>> else's 'nasties' but then, perhaps, leave their own package installed
>> on the user's machine. No one would ever suspect, would they?"
>>
>>> such a trojan would soon be discovered and dealt
>>> with - very bad for the 'trusted' source's reputation.[...]
>>
>> Now this is where we seem to have a *real* difference of opinion, FTR!
>>
>> Just *who* would discover such covert malware. With today's high-speed
>> and powerful machines a *user* is highly *unlikely* to discover that
>> they have become part of a botnet! If their /cleaned/ machine is
>> performing *better* that it had in a long while, why would the *user*
>> suspect anything untoward?
>
> Bigger picture:
>
> Remember the quote about how you can fool some of the people some of the
> time, but you can't fool all of the people all of the time?

�You may fool all the people some of the time, you can even fool some of
the people all of the time, but you cannot fool all of the people all
the time.� Abraham Lincoln

> Malware like
> that relies on the first part of that quote. It doesn't care about the
> second part because there is no shortage of fools. Such software does
> eventually get discovered, but usually cannot be traced back to a single
> source - there are many sources and they change location often. If
> someone has a *real firewall* then this type of commercial malware's
> activities can soon be discovered.
>
> So asking "who would" is the wrong question - the individual is
> insignificant in comparison to the whole. Instead you must ask yourself
> if *anybody* would discover the hidden function, and what that would
> mean to an otherwise legitimate (contactable) business.

OK. Let' use an example.

I do not consider Aumha.net to be a business (do you?)

Let's say someone goes there for the cleaning of their machine and all
seems to go to plan. Is there *any* company/organisation which makes
random checks on such 'help' sites to ensure that nothing untoward,
along the lines which I've described, is happening - to ensure that they
are *not* compromising the machines of naive 'customers'?

>> My limited understanding of matters is that once a machine is under
>> the control of a botmaster, all personal control is effectively lost.
>>
>> Do you dispute this?
>
> Yes, but I may be reading it differently than you are. It would depend
> on how much control is still afforded you by the nature of the offending
> program.

Perhaps you are. I meant that an outside agency may do whatever they
wish - whenever they wish - with the owner of the machine being
completely unaware of the 'intruder'. This may only be achieved if the
user can still carry out whatever he/she wishes to do and does not
become suspicious in any way.

HTH

--
Dave
From: JD on
~BD~ wrote:
> FromTheRafters wrote:
>> "~BD~"<BoaterDave(a)hot.mail.co.uk> wrote in message
>> news:8aydnQR6ar0tr0DWnZ2dnUVZ8oKdnZ2d(a)bt.com...
>>> FromTheRafters wrote:
>>>> "~BD~"<BoaterDave(a)hot.mail.co.uk> wrote in message
>>>> news:156dnS2rcsGUg0HWnZ2dnUVZ8o6dnZ2d(a)bt.com...
>>> [...]
>>>>> *What if* ....... ?
>>>>>
>>>>> One or more of those 'trusted' malware cleaning forums (or even a
>>>>> trusted software programme) could, surely, download such a programme
>>>>> onto a user's machine so that, forever afterwards, whatever is done
>>>>> on
>>>>> that machine may be monitored by an outside agency.
>>>
>>> Thank you for responding FTR! :)
>>>
>>>> That's not very likely,
>>>
>>> But .... *I* believe that it is *possible*!
>>> ********
>>>
>>> As I've said elsewhere ..........
>>>
>>> "What a super ruse it would be, eh? - to clear a machine of everyone
>>> else's 'nasties' but then, perhaps, leave their own package installed
>>> on the user's machine. No one would ever suspect, would they?"
>>>
>>>> such a trojan would soon be discovered and dealt
>>>> with - very bad for the 'trusted' source's reputation.[...]
>>>
>>> Now this is where we seem to have a *real* difference of opinion, FTR!
>>>
>>> Just *who* would discover such covert malware. With today's high-speed
>>> and powerful machines a *user* is highly *unlikely* to discover that
>>> they have become part of a botnet! If their /cleaned/ machine is
>>> performing *better* that it had in a long while, why would the *user*
>>> suspect anything untoward?
>>
>> Bigger picture:
>>
>> Remember the quote about how you can fool some of the people some of the
>> time, but you can't fool all of the people all of the time?
>
> �You may fool all the people some of the time, you can even fool some of
> the people all of the time, but you cannot fool all of the people all
> the time.� Abraham Lincoln
>
>> Malware like
>> that relies on the first part of that quote. It doesn't care about the
>> second part because there is no shortage of fools. Such software does
>> eventually get discovered, but usually cannot be traced back to a single
>> source - there are many sources and they change location often. If
>> someone has a *real firewall* then this type of commercial malware's
>> activities can soon be discovered.
>>
>> So asking "who would" is the wrong question - the individual is
>> insignificant in comparison to the whole. Instead you must ask yourself
>> if *anybody* would discover the hidden function, and what that would
>> mean to an otherwise legitimate (contactable) business.
>
> OK. Let' use an example.
>
> I do not consider Aumha.net to be a business (do you?)
>
> Let's say someone goes there for the cleaning of their machine and all
> seems to go to plan. Is there *any* company/organisation which makes
> random checks on such 'help' sites to ensure that nothing untoward,
> along the lines which I've described, is happening - to ensure that they
> are *not* compromising the machines of naive 'customers'?
>
>>> My limited understanding of matters is that once a machine is under
>>> the control of a botmaster, all personal control is effectively lost.
>>>
>>> Do you dispute this?
>>
>> Yes, but I may be reading it differently than you are. It would depend
>> on how much control is still afforded you by the nature of the offending
>> program.
>
> Perhaps you are. I meant that an outside agency may do whatever they
> wish - whenever they wish - with the owner of the machine being
> completely unaware of the 'intruder'. This may only be achieved if the
> user can still carry out whatever he/she wishes to do and does not
> become suspicious in any way.
>
> HTH
>

boater Dave, You are so full of $hit my monitor stinks when I see your
messages. Try a slow boat to anywhere but these newsgroups. OK?

--
JD..