That's a funny one, really... Can you adapt your application to open a backdoor on the person's computer and email me it's IP address?
Best regards, David -----Original Message----- From: [EMAIL PROTECTED] [mailto:[EMAIL PROTECTED] On Behalf Of Christian Leber Sent: Thursday, March 03, 2005 2:40 PM To: full-disclosure@lists.netsys.com Subject: Re: [Full-Disclosure] Bios programming... On Thu, Mar 03, 2005 at 01:44:39PM -0500, Matt Marooney wrote: > I am trying to write a program to help people who are addicted to internet > pornography. That is very nice of you. > This application would be tied into an online service where > someone could sign up for monitoring, and download a thin client app. The > application would run in the background of the person's computer, and > upload the person's internet activity to the website. The service would > then email this activity report to designated recipients. I have most of > the knowledge to create this service, but I need to know how to do a > couple things: I see millions of poor addicts that would love to get logs sent to some service. This service WILL have a GREAT future!! > 1. I would like the program to be "un-installable". I've heard of a > couple of hardware security tracking services that can load a very small > setup package in the CMOS and if a computer is stolen, and the hard drive > is replaced, the app reloads itself and the next time the computer is on > the internet, it sends out a beacon. Does anyone have any insight about > how to do something like this? I want the CMOS program to run on boot, > and check to see if the monitoring software is still installed. If it is > not, the boot process reloads it. That's easy, will easily run on millions of different hardware combinations. NOT > 2. obviously, the program does not need to be very large, so I want it to > run in the background and not be visible to the computer's user. This is > easy, I know, but I want the process to be completely invisible. (even to > super-geeks) You are lying. There is no reason why someone would sign up for a service that installs some application that is invisible and not removable and sents data to some "service". > 3. I would like to figure out a way to monitor traffic for multiple > protocols (HTTP, FTP, File Sharing, Chat, etc.) . I'm wondering if there > is a way to figure out "bad" requests on a packet level. In the end you are either a insufficient troll[1] or someone who has no idea of nothing. Oh, or you are working for the Bush administration. Regards Christian Leber [1] If that is true, I'm sorry that i gave food to it. -- http://www.nosoftwarepatents.com _______________________________________________ Full-Disclosure - We believe in it. Charter: http://lists.netsys.com/full-disclosure-charter.html _______________________________________________ Full-Disclosure - We believe in it. Charter: http://lists.netsys.com/full-disclosure-charter.html