Jump to content

<<< 12Oz Computer Tech Support SuperThread >>>


Mainter

Recommended Posts

This forum is supported by the 12ozProphet Shop, so go buy a shirt and help support!
This forum is brought to you by the 12ozProphet Shop.
This forum is brought to you by the 12oz Shop.

A fifteen year old from Perth, Australia, posed as an employee of the Australian Broadcasting Commission, demanding that YouTube remove hundreds of video clips of 'The Chasers War on Everything.' The amusing part is that The Chaser is a comedy company well known to perpetrate exactly this sort of prank."

Link to comment
Share on other sites

"News.com.au is reporting that the ARIA [Australia's Version of the RIAA] is making plans to have ISPs cancel or terminate the accounts of those who download music illegally. If the user is on dialup, that's not a problem: their telephone line will be disconnected. 'Fed up with falling sales, the industry — which claims Australians download more than one billion songs illegally each year — has been discussing tough new guidelines with internet service providers (ISPs) since late last year. The music industry is lobbying for a three strikes and you're out policy to enforce their copyright. Under this system, people who illegally download songs would be given three written warnings by their Internet service provider. If they continued to illegally download songs, their internet account would be suspended or terminated.'"

Link to comment
Share on other sites

Vista DRM = rootkit?

April 13, 2007 3:30 PM PDT

Add to your del.icio.usdel.icio.us Digg this storyDigg this

 

A security researcher has released a program that shows how digital rights management processes in Windows Vista could be used to hide malicious software, rootkit-like behavior.

 

Alex Ionescu developed the program, called D-Pin Purr, to show that Vista features designed to protect media files can also be used to protect other kinds of files. This could also include malicious software.

 

"It is trivial to make a process protected or unprotected by bypassing all the code integrity checks and sandbox in which protected processes are supposed to run," Ionescu wrote. "I think it's time to signal a wake-up call to all the developers who were counting on simply ignoring protected processes and assuming they're legitimate media applications."

 

Ionescu posted his program to the Internet. It is currently being tested by security experts.

 

Fraser Howard, a principal virus researcher at security vendor Sophos, told CNET News.com sister site ZDNet UK that the program looks feasible. Howard had managed to get it running, but had not managed to successfully protect and unprotect processes on his machine.

 

"I have not confirmed it, but I have little doubt it will work as intended (to remove protection)," Howard told ZDNet UK. "This should mean it is perfectly possible to add protection to processes as well."

 

Microsoft in a statement late Thursday said it is also investigating Ionescu's findings. The company had no additional comments, other than stating that to change the protection status on Vista processes an attacker would need a high level of privilege on a Vista machine.

 

Vista, the successor to Windows XP, became broadly available in late January. Microsoft promotes the operating system as the most secure version of Windows it has delivered to date.

Link to comment
Share on other sites

"News.com.au is reporting that the ARIA [Australia's Version of the RIAA] is making plans to have ISPs cancel or terminate the accounts of those who download music illegally. If the user is on dialup, that's not a problem: their telephone line will be disconnected. 'Fed up with falling sales, the industry — which claims Australians download more than one billion songs illegally each year — has been discussing tough new guidelines with internet service providers (ISPs) since late last year. The music industry is lobbying for a three strikes and you're out policy to enforce their copyright. Under this system, people who illegally download songs would be given three written warnings by their Internet service provider. If they continued to illegally download songs, their internet account would be suspended or terminated.'"
Well this is rather gay...:mad:

 

How can they do this? Are they gonna put a ban on torrents or something?

Link to comment
Share on other sites

stop beating off so close to the keyboard?

 

:lol:

 

As to my powerpoint need, in this case I'm not sure that site will cut it. I'm actually doing a power point for my girlfriends senior thesis. Powerpoint itself is easy, but I'm hoping to avoid 2 hours at work and I'm only important enough that they give me a laptop for company progects. Further, I'd like to learn about it anyway at home. MS Office link anyone?

Link to comment
Share on other sites

To install BITS Server Extensions

 

1.

 

 

Click Start and then click Control Panel.

 

2.

 

 

Select Add or Remove programs and then click Add or Remove Windows Components.

 

3.

 

 

From the Windows Components Wizard, select Application Server, and then click Details.

 

4.

 

 

In the Application Server dialog box, check Internet Information Services (IIS), and then click Details.

 

5.

 

 

In the Internet Information Services (IIS) dialog box, check Background Intelligent Transfer Service (BITS) Server Extensions.

 

By default, both the BITS server extension ISAPI and the BITS management console snap-in are installed. To deselect either one, click Details in the Internet Information Services (IIS) dialog box to open the Background Intelligent Transfer Service (BITS) server extension dialog box.

 

6.

 

 

Close the IIS and Application Server dialog boxes to return to the Windows Component Wizard. Then click Next to begin the installation of BITS Server Extensions as part of Application Server. The wizard completes the installation.

 

Notes

 

To install BITS Server Extensions, you must be a member of the Administrators group on the local computer, or you must have been delegated the appropriate credentials. If the computer is joined to a domain, members of the Domain Admins group might be able to perform this procedure. As a security best practice, consider using the runas command to perform this procedure. For Windows 2000 Server family products, see the online Help documentation or go to Windows 2000 product Documentation and select Help for the appropriate product.

 

You might need your Windows Server 2003 family CD available when you install BITS Server Extensions, in case the installation process requires additional files.

 

You can install BITS on Windows 2000 Server by installing the Platform SDK Redistributables for Windows 2000. Windows 2000 Server uses IIS 5. For help using IIS 5, see Windows 2000 Server Documentation for Internet Information Services.

 

To install BITS on a client computer, open the SUPPORT\TOOLS directory on the Windows XP Professional CD, disk image, or network directory, and double-click SUPTOOLS.EXE. The BITS tool file is Bitsadmin.exe.

 

Internet Information Services is installed on the server you are using when the console opens. If you want to connect to another computer, add that computer in the Connect to Computer dialog box by right-clicking Internet Information Services in the console tree and selecting Connect.

Link to comment
Share on other sites

Join the conversation

You can post now and register later. If you have an account, sign in now to post with your account.

Guest
Reply to this topic...

×   Pasted as rich text.   Paste as plain text instead

  Only 75 emoji are allowed.

×   Your link has been automatically embedded.   Display as a link instead

×   Your previous content has been restored.   Clear editor

×   You cannot paste images directly. Upload or insert images from URL.

×
×
  • Create New...