Hi, Lisi Reisz wrote: > http://news.bbc.co.uk/2/hi/technology/4456970.stm
Pity they don't tell on what operating system or player the root kit was installed. https://en.wikipedia.org/wiki/Sony_BMG_copy_protection_rootkit_scandal says that "Sony BMG quickly released software to remove the rootkit component of XCP from affected Microsoft Windows computers" Well, that's simply virus infection via MS-Windows CD autostart. (Beware of SanDisk U3 USB sticks which appear as hub with USB stick and CD-ROM. The latter containing "helpful" software. That's one notch less evil than reprogrammed USB sticks which play keyboard.) > Thomas's instincts are right in this case. I try hard to blind out any instinct or emotion here. This is a sincere technical issue and i am still looking for more info. We all have to trust in the firmware of our computer parts. Such stuff is in about anything that can be plugged into the machine. Malware cannot easily break out of an SCSI drive via normal operation by an operating system. But it could try to exploit bugs in the bus controller's firmware, the operating system, or the applications. In the latter class, such bugs might be announced as feature. Not to speak of users who help by installing proprietary programs which intentionally open the door for malware updates. Whatever, a useless 80 Euro BD burner would be as embarrassing as it would be a waste of money. So please bring me the rumors, the urban legends, and the true horror stories about this topic. Have a nice day :) Thomas