Hi,

Lisi Reisz wrote:
> http://news.bbc.co.uk/2/hi/technology/4456970.stm

Pity they don't tell on what operating system or
player the root kit was installed. 

https://en.wikipedia.org/wiki/Sony_BMG_copy_protection_rootkit_scandal
says that "Sony BMG quickly released software to remove the
rootkit component of XCP from affected Microsoft Windows computers"

Well, that's simply virus infection via MS-Windows CD autostart.

(Beware of SanDisk U3 USB sticks which appear as hub with
 USB stick and CD-ROM. The latter containing "helpful" software.
 That's one notch less evil than reprogrammed USB sticks which
 play keyboard.)


> Thomas's instincts are right in this case. 

I try hard to blind out any instinct or emotion here.

This is a sincere technical issue and i am still looking
for more info.
We all have to trust in the firmware of our computer parts.
Such stuff is in about anything that can be plugged into
the machine.

Malware cannot easily break out of an SCSI drive via
normal operation by an operating system.
But it could try to exploit bugs in the bus controller's
firmware, the operating system, or the applications.
In the latter class, such bugs might be announced as feature.

Not to speak of users who help by installing proprietary
programs which intentionally open the door for malware
updates.

Whatever, a useless 80 Euro BD burner would be as
embarrassing as it would be a waste of money.


So please bring me the rumors, the urban legends, and
the true horror stories about this topic.


Have a nice day :)

Thomas

Reply via email to