Full Disclosure mailing list archives
RE: Bios programming...
From: "Aditya Deshmukh" <aditya.deshmukh () online gateway expertworks net>
Date: Fri, 4 Mar 2005 09:41:49 +0530
does this not look like a big brother watching scheme ? and with what are u trying to do how can u monitor if I access all the things from my own proxy over encrypted tunnels using my own custom protocol encapsulated over tcp/ip. u cannot detect it but from your post it look like u want to hook your girl friend's or bosses computer. better watch where u are asking question :) _____ From: full-disclosure-bounces () lists netsys com [mailto:full-disclosure-bounces () lists netsys com] On Behalf Of Matt Marooney Sent: Friday, March 04, 2005 12:15 AM To: full-disclosure () lists netsys com Subject: [Full-disclosure] Bios programming... I am trying to write a program to help people who are addicted to internet pornography. This application would be tied into an online service where someone could sign up for monitoring, and download a thin client app. The application would run in the background of the person's computer, and upload the person's internet activity to the website. The service would then email this activity report to designated recipients. I have most of the knowledge to create this service, but I need to know how to do a couple things: 1. I would like the program to be "un-installable". I've heard of a couple of hardware security tracking services that can load a very small setup package in the CMOS and if a computer is stolen, and the hard drive is replaced, the app reloads itself and the next time the computer is on the internet, it sends out a beacon. Does anyone have any insight about how to do something like this? I want the CMOS program to run on boot, and check to see if the monitoring software is still installed. If it is not, the boot process reloads it. 2. obviously, the program does not need to be very large, so I want it to run in the background and not be visible to the computer's user. This is easy, I know, but I want the process to be completely invisible. (even to super-geeks) 3. I would like to figure out a way to monitor traffic for multiple protocols (HTTP, FTP, File Sharing, Chat, etc.) . I'm wondering if there is a way to figure out "bad" requests on a packet level. I really appreciate any help with these questions! Thank you all, -- Matt
_______________________________________________ Full-Disclosure - We believe in it. Charter: http://lists.netsys.com/full-disclosure-charter.html
Current thread:
- Re: Bios programming..., (continued)
- Re: Bios programming... Steve Kudlak (Mar 03)
- Re: Bios programming... dk (Mar 04)
- Re: Bios programming... Paul Schmehl (Mar 04)
- Re: Bios programming... Valdis . Kletnieks (Mar 03)
- RE: Bios programming... Matt Marooney (Mar 03)
- Re: Bios programming... Steve Kudlak (Mar 03)
- RE: Bios programming... Aditya Deshmukh (Mar 03)
- Re: Bios programming... Steve Kudlak (Mar 04)
- Re: Bios programming... Pedro Venda (Mar 04)
- Re: Bios programming... Michael Holstein (Mar 03)
- RE: Bios programming... Aditya Deshmukh (Mar 03)
- Re: Bios programming... Valdis . Kletnieks (Mar 03)
- Re: Bios programming... devis (Mar 04)
