![]() |
I only think its scary as the whole idea was spoken of.
I did in fact have a virus once that fubar'd my bios - back in the days of windows 98 so I dont know if that can still happen in todays computer world. And Adam, need I remind you of that nifty little program that actually did erase a hard drive? I dont believe it will ever happen - but ffs for some hot shot corporate world to even consider/discuss it :blink: |
Quote:
|
Quote:
1: the mp3's headers are correct, enough so that a player would recognize the header of the file as mp3, and play it, but also have a malformed header to exploit.... 2: the player has to have a flaw to let an mp3 run code 3: zone is hands down the better coder than me, so i may be wrong, but, the only way they could destroy a drive while windows is running on it would be assembly, they would have to directly interact with it through assembly language and wipe it from there, which would cause the machine to reboot, obviously that said, if there is a flaw in the player you're using, what's to keep other hackers from figuring that flaw that the RIAA's technology is using, and start spreading viruses that way? the flaw would be found in a day or two tops i'm sure, and the hole would have to be patched by whoever's software it was, else every script kiddie in the world is going to exploit it sooner or later [/b][/quote] Like I said, the RIAA is spending $$$ on NEW technology. I'm sure whatever they come up with will be defeated by a simple filter but the BIG story is, a US senator is considering giving the RIAA permission to release these bugs through P2P systems. What we have here is the software industry seeking permission to LEGALY spread viruses! I can't wait until some chump noob at the pentagon downs a new Metallica MP3 and wipes out all of our Nuclear Secrets! :D :D :D }---:) |
It's ok people. The senator just got caught with unlicensed copyrighted software on his OWN webpage, and a link to an X-RATED website....
|
Quote:
What programming language its written in is irrelevant. All compilers first translate your code to assembly language, and then its encoded in a bytecode understandable by your proccessor. The thing is windows intercepts requests to access the hard drive directly. That can be gotten around by installing a custom driver that provides raw disk access functionallity (although not easy to do transparently on new windows versions). Not that its even neccessary to use raw sector access to delete data, the windows API includes functions to delete files etc. Destroying a hard drive is much more complicated. There may be flaws in individual models, but there is no standard "self-destruct" command present in all harddrives ;). Some viruses attempted to write to the same sector over and over continiously until it got 'worn out', but thats a crude and very unpredictable method, and the hdd activity will get noticed weeks before it causes damage. And the concept of an MP3 doing this is again ridiculous. There may have been vulnerabilites in MP3 frame parsing on some players, but they tend to get fixed very shortly after they are discovered, and a malicious MP3 probably wont affect more than a tiny fraction of PCs - not to mention as soon as its hyped up, everyone will patch their players or install an AV program, and itll be the end of the threat. Knowing the RIAA's technical skillz, their malicious MP3 is probably a "Really Good!1!1! - New nude pix britney!1!.mp3.EXE". It will never happen, and I am sure the RIAA is aware of this. The thing is they are winning a different battle - if rumours like this circulate, many computer novices will believe them. Somewhere out there there will be parents stopping their kids from trading MP3's because they read that it will destroy their PC. Somewhere there will be company managments who decide to crack down on sharing, because they are mislead they will lose property. These tactics are entirely psychological. They do not need to actually have any of this malicious capability - they just want people to believe they do. |
found on: *http://www.securityfocus.com/columnists/168
Quote:
/JD |
Quote:
|
Quote:
|
All times are GMT +1. The time now is 11:22 PM. |
Powered by vBulletin® Version 3.6.5
Copyright ©2000 - 2025, Jelsoft Enterprises Ltd.