- win+dows

Latest

пятница, 8 декабря 2017 г.

Is Windows XP spying on us?


I found this article and thought it would be good basis for discussion here at Cnet Forums. I would tend to agree with the general thrust of this analysis.


I am reminded of the saying "Some people are paranoid for good reason". I would like to know what you think of it. (Maybe I should have posted this in the Speakeasy)


It's lengthy but bear with it.


Here's the article:


Mark McCarron, 07.10.2004 05:33


By Mark McCarron


2. Big Brother deployment scenarios were real?


3. M$ Windows was a type of bugging device?


If You Could See, What I Can See, Reinstalling Windows.


Report On Analysis of Microsoft Windows XP


2. Help System, F1


3. Microsoft Backup


4. Process Viewer (Task Manager)


6. The Windows Registry


7. Temporary Files


11. Swap Space/Virtual Memory/Page File


13. Memory Usage


14. Automatic Updates


Executive 2: the dog coded it, ah nuts. erm.


Executive 1: Can we blame Bin Laden?'


16. Remote Access Bugs


18. Windows Media Player


19. Alternate Data Streams


21. Internet Explorer 'Features'


22. Temporary Internet Files


2. The hotmail email address


3. The Date and time the account was accessed


4. External graphics viewed and the sources of those graphics


5. The machine from which it was accessed.


6. The duration of viewing.


7. And generally, the individuals sexual, political, social, personal and religious preferences based upon the information accessed.


26. MSN Messenger


27. Web-Cams and Microphones


Microsoft Windows XP Services


1. Application Layer Gateway Service


Provides support for 3rd party protocol plug-ins for Internet Connection Sharing and the Internet Connection Firewall,,Manual,Local Service


This thing just loves making remote connections and accepting them. Set this up in your firewall to ask each time using ADSL or higher.


2. Automatic Updates


Enables the download and installation of critical Windows updates. If the service is disabled, the operating system can be manually updated at the Windows Update Web site. Disabled,Local System


Enabled by default. Enables Microsoft to distribute and incorporate any 'feature', at will. Not the greatest thing in the Universe to be allowing.


3. Computer Browser


Maintains an updated list of computers on the network and supplies this list to computers designated as browsers. If this service is stopped, this list will not be updated or maintained. If this service is disabled, any services that explicitly depend on it will fail to start.,Started,Automatic,Local System


This stupid design will breach security. The only computer a client needs to know, is the server and it should coordinate everything.


4. Fast User Switching Compatibility


Provides management for applications that require assistance in a multiple user environment. Disabled,Local System


Switches to every account, but the Administrator account. In fact, unless you know exactly what your doing, an end user cannot access the administrator account.


5. IMAPI CD-Burning COM Service


Manages CD recording using Image Mastering Applications Programming Interface (IMAPI). If this service is stopped, this computer will be unable to record CDs. If this service is disabled, any services that explicitly depend on it will fail to start. Manual,Local System


Part of CD Burning and this thing is a nightmare. Any CD you make, it first makes a copy to the system drive, then only to use a scratch drive after that. Why?


6. Indexing Service


Indexes contents and properties of files on local and remote computers; provides rapid access to files through flexible querying language. ,,Manual,Local System


A search using the DOS emulator will run like a bullet. Windows search, however, will take its time unless the indexing service is activated. This provides quick post-forensic and real-time access to files remote files.


7. Internet Connection Firewall(ICF)/Internet Connection Sharing(ICS)


Provides network address translation, addressing, name resolution and/or intrusion prevention services for a home or small office network. Manual,Local System


First off information is sent to both Microsoft and to a range identified as belonging to ARIN whenever a PC connects to the Internet. Random connection attempts are made by Explorer, NT Kernel, Internet Explorer, Windows Help, svchost.exe, csrss.exe and numerous others. I have even caught calc.exe (The calculator) attempting to initiate a remote connection, now and again. Without reverse engineering, I was unable to tell if it really was the applications, or a subsystem calling the applications. Very odd.


Transmits net send and Alerter service messages between clients and servers. This service is not related to Windows Messenger. If this service is stopped, Alerter messages will not be transmitted. If this service is disabled, any services that explicitly depend on it will fail to start. Disabled,Local System


Messages should only be broadcast, by and to, the main server. Having this on every machine provides a method of transmitting real-time keystroke intercept across the Internet. This service is also enabled by default, even with the known Internet abuse of the function. This only indicates design manipulation.


9. Network Connections


Manages objects in the Network and Dial-Up Connections folder, in which you can view both local area network and remote connections.,Started,Manual,Local System


Only weakens security by providing a central reporting mechanisms. These aspects have been combined by design, with no logical requirement for the function. Again, a single-point of failure is introduced into the system.


10. Protected Storage


Provides protected storage for sensitive data, such as private keys, to prevent access by unauthorized services, processes, or users.,Started,Automatic,Local System


Also provides quick access to this information. Swift breaking of security. Sweet.


11. Remote Procedure Call (RPC)


Provides the endpoint mapper and other miscellaneous RPC services.,Started,Automatic,Local System


May the saints preserve us from RPC. RPC provides remote computers with the ability to operate your PC and listens for these connections on the network/Internet.


12. Remote Registry


Enables remote users to modify registry settings on this computer. If this service is stopped, the registry can be modified only by users on this computer. If this service is disabled, any services that explicitly depend on it will fail to start. Disabled,Local Service


This nifty service is enabled by default. It provides remote access to the windows registry, allowing run-time modifications to be made to your PC. Hmmm. what an excellent idea! Just what I always needed, a way to 'tweak' my running spy applications remotely.


Supports file, print, and named-pipe sharing over the network for this computer. If this service is stopped, these functions will be unavailable. If this service is disabled, any services that explicitly depend on it will fail to start.,Started,Automatic,Local System


This is not required, it provides a central management for open files and printing operations. It also provides a method of remotely monitoring a users activities.


14. SSDP Discovery Service


Enables discovery of UPnP devices on your home network. Disabled,Local Service


What in Gods name for? This is part of the 'remote orientation' facilities encoded into Windows, allowing remote hackers the ability to explore the network swiftly, reducing chances of alarm and excessive activity through exploration.


15. System Event Notification


Tracks system events such as Windows logon, network, and power events. Notifies COM+ Event System subscribers of these events.,Started,Automatic,Local System


No way of knowing, without full reverse engineering, how many undocumentented events exist throughout Windows. Windows could have an entire additional level of event reporting.


16. System Restore Service


Performs system restore functions. To stop service, turn off System Restore from the System Restore tab in My Computer->Properties,,Automatic,Local System


Keeps ghost copies of various forms of cached information in a nice quick accessible format. We can't let our hard earned information go down the pan now.


17. Terminal Services


Allows multiple users to be connected interactively to a machine as well as the display of desktops and applications to remote computers. The underpinning of Remote Desktop (including RD for Administrators), Fast User Switching, Remote Assistance, and Terminal Server. Disabled,Local System


I just bet its interactive and highly 'functional' too. This is enabled by default, providing a remote desktop for any hacker. Wow, what a service M$.


18. Windows Time


Maintains date and time synchronization on all clients and servers in the network. If this service is stopped, date and time synchronization will be unavailable. If this service is disabled, any services that explicitly depend on it will fail to start.


Sends information to Microsoft and keeps your date and time stamps nice and fresh for post-forensic analysis. At least they're tidy when they invade your privacy.


19. Wireless Zero Configuration


Provides automatic configuration for the 802.11 adapters,,Disabled,Local System


Zero configuration means zero security and that's exactly what you get. The entire network is exposed to anyone within reception range. Therefore, if you are using this in your home environment, that can mean remote monitoring from up to 3Km using proper equipment, or someone else using your Internet connection from a range of around 50-80m radius.


20. Microsoft Works


Windows Security, Not What You Think


Bugs Of The Third Kind


Wild Speculation On Codenaming Strategy


2. A play on a reference to 'pinocheo'? (tells stories, reference to Long (Nose) and Horn (Whistle Blower) )


3. Horn, as in a form of 'early warning system' and Long because of its distributed nature?


Can Windows Be Secured?


2. Is this why M$ Windows was altered?


3. What would the suggested reason be for military adaptations to M$ Windows prior to 9/11?


4. Why 3 Operating Systems (ME, 2000 and XP) between 1999-2001?


Barnes & Noble.com, 6000 Freeport Ave - Suite 101, Memphis, TN 38141.


onlinebooks.library.upenn.edu, University of Pennsylvania


www.cia.gov, CIA - Factbook.


BookFinder.com - Berkley California


www.kbb.com - Orange County


www.worldbookonline.com - Country Wide, with world-wide divisions


www.superpages.com - 651 Canyon Drive. Coppell, TX 75019.


www.abebooks.com - Victoria B.C.with offices in Canada and Germany.


www.bookwire.com - 630 Central Ave. New Providence. New Jersey.


A Small Bit of Advice


Appendix 2. Magnetic Force Microscopy (MFM)


Appendix 1. Symbiotic Duality


Why is 'Symbiotic Duality' important to understand?


Appendix 2. Magnetic Force Microscopy (MFM)


from the indy site --> All contributions are considered availiable for re-use without seeking permission from author as long as those that re-use them allow further free re-use of the derivative work. This is know as copyleft


btw, congrats on the red 'M'



OK, Interesting long post. What is the solution to the spying? Anybody has some answers?


when I was 1/10th the way down the article.


ROFLMAO MARKFLAX! bankrobbery. thats ingenious!


If this is the case and you can prove it then Microsoft has left itself open for a class action lawsuit and I would be willing to lead this lawsuit if you can prove what you are saying.


i am a newby to the computer world. i am taking courses at a local technical college to learn computer service and networking specialist material. i would like to learn the material and take the a+ and networking certification tests and pass. I don't claim to have many computer skills or extensive computer knowlege. i have been interested in these things in only the last six years. previously i was a spray painter in a production enviornment for 25 years. the reason i told you these things about myself is to point out to you that i am an "average joe" who does "average things", and happens to be of "average intelligence". i think you "read me" now.


as a potential spy threat is really a surprise to anyone!


people are aware of the privacy rights they risk every single day. people have known about it for years. they have even discussed it flippantly. everyone knows about the potential of being tracked on their cellular phone.


they know about the potential to be listened to on a land line phone. they know the potential of being tracked by using a gps device, whether in their car via onstar or while hunting using their gps enabled compass. they see the ever-so-slow degradation of their privacy rights at every single level.


will of the PEOPLE is the law of the land instead of the will of a "few dictating" to the many how we construct ourselves and our lives. get out of here and use your knowlege and insight to safegaurd yours and future generations freedom, happiness, and free will.


But trying to get most people to even care is like pounding your head repeatedly against the wall.I am afraid the battle has already been lost,at best the only hope is to slow down the process


Lets talk..I have the will, You have the smarts! We can Change all this, if we are organized, informed and persistent.


I want to stop the intrusive acts committed against us by all the conspiring Governments.


The U.S.A. is NOT the only guilty party here, this is a worldwide problem with the USA and Great Britain as the chief architects.


as I think evidenced by this example:


frequently I have on my bottom right task bar a pop notification that says "security updates downloaded and ready to install!" .


REALLY? Where would they have come from? Actually I believe what it really means is: " Windows XP has now collected sufficent spy info to justify making you connect to MS so it can upload all data under the guise of need patches!!" Cute!


why not turn off automatic updates?


everytime I boot up, I have to "listen" to its visual complaining that I turned it off and dire disaster is lurking if I don't re-instate it instantly!! It even enforces acknowledgement as everything is put on hold until I click it away!!


In truth, Billy Boy is this generations' Howard Hughes. Just as he(Howard) became too rich & powerful with his control of aircraft design & manufacture (especially military) the government saw him as a loose cannon type threat and virtually forced him to become a paranoid recluse for his own safety (Another of Fidels poisoned/exploding cigars Howard?), Bill has likewise become too rich and powerful with his control/access to everything computer (especially the military which couldn't function without them now). He has been brought to heel and I think he's been forced to conceed access to all windows machines thru raw ports and he's trying to warn us that the next (thoroughly compromised) system that he is making is being forced on him by A TEXAN (where else to see Longhorns?) !! Paranoid enough yet?


you can change the way the security centers warns you


When u doing Fedora update though Redhat network or using yum, info abt wat applications is install, what patches/bugfixes u need will all be collected.


Popular Forums

HOLIDAY GIFT GUIDE 2017



Cameras that make great holiday gifts


Let them start the new year with a step up in photo and video quality from a phone.

Комментариев нет:

Отправить комментарий