Matt Marooney wrote:
Very true, and I'm sure that I am not going to be able to keep people
from getting around it, I just want to make it really really hard.
Obviously, if the person is smart enough to boot to a different OS,
setup their internet connection on that OS, and browse, then they are
Matt Marooney wrote:
I am trying to write a program to help people who are addicted to
internet pornography. This application would be tied into an online
(Ever heard of ask-slashdot? that would be very on-topic there ;-))
service where someone could sign up for monitoring, and download a thin
:40 PM
To: full-disclosure@lists.netsys.com
Subject: Re: [Full-Disclosure] Bios programming...
On Thu, Mar 03, 2005 at 01:44:39PM -0500, Matt Marooney wrote:
I am trying to write a program to help people who are addicted to
internet
pornography.
That is very nice of you
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
Matt Marooney wrote:
| Thanks for the feedback Valdis!
|
| I've been doing some reading about custom BIOS chips that include
| security programs, so that may not be the way I want to go...
|
| I definatly want the program to behave like spyware, but
Matt Marooney wrote:
{snip}
I'll disregard the troll comment as this
is the first time I've NEEDED to post anything to this list. I've been
reading it for years now. Thanks.
Aww then, you really have no excuse for this post Matt. It's off-topic
and the scope of your problem covers too much
Ask a simple question on this list, and a thousand philosophers, all of whom
apparently believe they are more intelligent, more informed and more correct
than the OP, spout their unsolicited opinions ad nauseam, ad infinitum, as
if somewhere someone actually cared to hear and was listening
Title: Message
I am trying to write
a program to help people who are addicted to internet pornography. This
application would be tied into an online service where someone could sign up for
monitoring, and download a thin client app. The application would run in
the background of the
: Gerry Eisenhaur [mailto:[EMAIL PROTECTED]
Sent: Thursday, March 03, 2005 2:28 PM
To: Matt Marooney
Subject: Re: [Full-Disclosure] Bios programming...
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
Matt,
I too am interested in un-installable apps. Do you know that name of the
application you
On Thu, Mar 03, 2005 at 01:44:39PM -0500, Matt Marooney wrote:
I am trying to write a program to help people who are addicted to internet
pornography.
That is very nice of you.
This application would be tied into an online service where
someone could sign up for monitoring, and
: Thursday, March 03, 2005 3:19 PM
To: Matt Marooney
Cc: full-disclosure@lists.netsys.com
Subject: Re: [Full-Disclosure] Bios programming...
On Thu, 03 Mar 2005 13:44:39 EST, Matt Marooney said:
1. I would like the program to be un-installable. I've heard of a
Did you mean un-installable
On Thu, Mar 03, 2005 at 01:44:39PM -0500, Matt Marooney wrote:
I am trying to write a program to help people who are addicted to internet
pornography...
This application would be tied into an online service where
someone could sign up for monitoring, and download a thin client app. The
the admin password, of course), and invisble to
operate.
Thanks for the comments!
-- Matt
-Original Message-
From: Paul J. Morris [mailto:[EMAIL PROTECTED]
Sent: Thursday, March 03, 2005 8:46 PM
To: [EMAIL PROTECTED]
Subject: Re: [Full-Disclosure] Bios programming...
Matt,
Don't
On Mar 3, 2005, at 11:40 AM, Christian Leber wrote:
3. I would like to figure out a way to monitor traffic for multiple
protocols (HTTP, FTP, File Sharing, Chat, etc.) . I'm wondering
if there
is a way to figure out bad requests on a packet level.
In the end you are either a
Anybody know how to store a small program there?
It's easy. Use an EEPROM programmer.
On write protected BIOSes all you have to do is figure out which pin
is write_enable (get a pinout from the web) and figure out if that pin
goes to +5v or ground to do what you want. Jumper accordingly.
On Thu, 03 Mar 2005 20:40:00 +0100, Christian Leber said:
There is no reason why someone would sign up for a service that installs
some application that is invisible and not removable and sents data to
some service.
That's assuming of course that the user actually signs up for the service.
: Thursday, March 03, 2005 2:40 PM
To: full-disclosure@lists.netsys.com
Subject: Re: [Full-Disclosure] Bios programming...
On Thu, Mar 03, 2005 at 01:44:39PM -0500, Matt Marooney wrote:
I am trying to write a program to help people who are addicted to
internet
pornography.
That is very nice
On Thu, 03 Mar 2005 15:33:09 EST, Matt Marooney said:
The intent of the BIOS portion of the program was just to have a small
bit of code that checked for the existence of the main monitoring
program on the disk, and if it was not there, reload it somehow.
The main program would run from
.
-Original Message-
From: [EMAIL PROTECTED] [mailto:[EMAIL PROTECTED]
Sent: Thursday, March 03, 2005 3:19 PM
To: Matt Marooney
Cc: full-disclosure@lists.netsys.com
Subject: Re: [Full-Disclosure] Bios programming...
On Thu, 03 Mar 2005 13:44:39 EST, Matt Marooney said:
1. I would
@lists.netsys.com
Subject: Re: [Full-Disclosure] Bios programming...
On Thu, 03 Mar 2005 15:33:09 EST, Matt Marooney said:
The intent of the BIOS portion of the program was just to have a small
bit of code that checked for the existence of the main monitoring
program on the disk
The program in question is quite legitimate in nature and already
exists in several forms.
In some instances, it sends the data to 'accountability partners'
who are your chosen peers that monitor your activity.
Think of it as AA for online porn. Online porn has become a
real problem for males age
Bill Humphries wrote:
Closing the colleges and sending the youth to work on collective farms
was big in the 1960's.
Now that the communists are gone, someone has to step into their place.
S - don't give the Republicans any more bright ideas...
Regards,
Brent
--
No virus found in this
Hello,
Out of curiousity, isn't it possible/easier to monitor those stats by
viewing your firewall traffic logs?
Goodbye,
Edgardo
On Thu, 3 Mar 2005, Matt Marooney wrote:
I am trying to write a program to help people who are addicted to
internet pornography. This application would be tied into
Matt, maybe you should not be so concerned with
trying to put code into the bios; but, rather
install it to the boot sector of the hard drive.
That is copy the monitoring program to the boot sector
That will launch the service you are talking about
And that service can also rewrite itself
On Mar 3, 2005, at 1:39 PM, Matt Marooney wrote:
Exactly, thank you Randall. I appreciate your feedback, I'll check
into
your suggestions further.
I like the way you put, this is targeted at adults who are trying to
curb their own behavior. Seems like this list needs more people like
that! ;)
this list needs more people like
that! ;)
-- Matt
-Original Message-
From: Randall Perry [mailto:[EMAIL PROTECTED]
Sent: Thursday, March 03, 2005 4:17 PM
To: full-disclosure@lists.netsys.com
Cc: Matt Marooney
Subject: RE: [Full-Disclosure] Bios programming...
The program in question
, March 03, 2005 3:57 PM
To: Matt Marooney
Cc: full-disclosure@lists.netsys.com
Subject: Re: [Full-Disclosure] Bios programming...
On Thu, 03 Mar 2005 15:33:09 EST, Matt Marooney said:
The intent of the BIOS portion of the program was just to have a small
bit of code that checked
it look like u want to hook your girl friend's or bosses
computer. better watch where u are asking question :)
From: [EMAIL PROTECTED]
[mailto:[EMAIL PROTECTED] On Behalf Of Matt
MarooneySent: Friday, March 04, 2005 12:15 AMTo:
full-disclosure@lists.netsys.comSubject: [Full-Disclosure
-Original Message-
From: [EMAIL PROTECTED]
[mailto:[EMAIL PROTECTED] On Behalf Of
Matt Marooney
Sent: Friday, March 04, 2005 01:35 AM
I want this software to help people who want help, to keep them honest,
and unaware that their system is monitoring activity.
I still don't see any
I'm banking on the probability that most people don't even know what a
BIOS is.
If your main security is through obscurity then just wait untill someone
post a way to bypass this program and removal instrctions on the net.
On Fri, 04 Mar 2005 09:46:54 +0530, Aditya Deshmukh said:
tell me how me people are going to use a guest accont on their own computer
and then be able to use the computer normally ?
Actually, if the regular user needs more than guest privs to do their
*normal* stuff, the system's security
30 matches
Mail list logo