I believe the software is Softex TheftGuard. I wonder how this is possible. I understood that most modern BIOS are protected against writing. I know there are a fiew viruses that can write to the BIOS? Anybody know how to store a small program there?
-----Original Message----- From: Gerry Eisenhaur [mailto:[EMAIL PROTECTED] Sent: Thursday, March 03, 2005 2:28 PM To: Matt Marooney Subject: Re: [Full-Disclosure] Bios programming... -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 Matt, I too am interested in un-installable apps. Do you know that name of the application you are talking about (in 1.)? I am interested for different reasons than you, but think we may be able to help each other. Thanks, Gerry Matt Marooney wrote: > I am trying to write a program to help people who are addicted to > internet p****graphy. This application would be tied into an online > service where someone could sign up for monitoring, and download a > thin client app. The application would run in the background of the > person's computer, and upload the person's internet activity to the > website. The service would then email this activity report to > designated recipients. I have most of the knowledge to create this > service, but I need to know how to do a couple things: > > 1. I would like the program to be "un-installable". I've heard of a > couple of hardware security tracking services that can load a very > small setup package in the CMOS and if a computer is stolen, and the > hard drive is replaced, the app reloads itself and the next time the > computer is on the internet, it sends out a beacon. Does anyone have > any insight about how to do something like this? I want the CMOS > program to run on boot, and check to see if the monitoring software is > still installed. If it is not, the boot process reloads it. > > 2. obviously, the program does not need to be very large, so I want it > to run in the background and not be visible to the computer's user. > This is easy, I know, but I want the process to be completely > invisible. (even to super-geeks) > > 3. I would like to figure out a way to monitor traffic for multiple > protocols (HTTP, FTP, File Sharing, Chat, etc.) . I'm wondering if > there is a way to figure out "bad" requests on a packet level. > > I really appreciate any help with these questions! Thank you all, > > -- Matt > > > > > > ---------------------------------------------------------------------- > -- > > _______________________________________________ > Full-Disclosure - We believe in it. > Charter: http://lists.netsys.com/full-disclosure-charter.html - -- +------------------------------------------------------+ | Gerry Eisenhaur | | | | Cisco Security Agent ||| ||| | | Boxborough, Massachusetts .|||||. .|||||. | | PGP Key: 0xC13E8AFC .:|||||||||:.:|||||||||:. | | 978-936-0465 C i s c o S y s t e m s | +------------------------------------------------------+ -----BEGIN PGP SIGNATURE----- Version: GnuPG v1.2.6 (GNU/Linux) Comment: Using GnuPG with Thunderbird - http://enigmail.mozdev.org iD8DBQFCJ2VXRY7FIcE+ivwRAsd/AKCipzmsU+j8cIwNnve3WqbgX/7i/ACeID7t V6jxmM0BLNyGRzc73blLM5A= =SWZV -----END PGP SIGNATURE----- _______________________________________________ Full-Disclosure - We believe in it. Charter: http://lists.netsys.com/full-disclosure-charter.html
