adsense from aus

Thursday, June 18, 2009

Researchers Show How to Take Control of Windows 7

这个要转一个下:microsoft sucks.

Security researchers demonstrated how to take control of a computer running Microsoft's upcoming Windows 7 operating system at the Hack In The Box Security Conference (HITB) in Dubai on Thursday.
Researchers Vipin Kumar and Nitin Kumar used proof-of-concept code they developed, called VBootkit 2.0, to take control of a Windows 7 virtual machine while it was booting up. They demonstrated how the software works at the conference.

"There's no fix for this. It cannot be fixed. It's a design problem," Vipin Kumar said, explaining the software exploits the Windows 7 assumption that the boot process is safe from attack.

While VBootkit 2.0 shows how an attacker can take control of a Windows 7 computer, it's not necessarily a serious threat. For the attack to work, an attacker must have physical access to the victim's computer. The attack can not be done remotely.

VBootkit 2.0, which is just 3KB in size, allows an attacker to take control of the computer by making changes to Windows 7 files that are loaded into the system memory during the boot process. Since no files are changed on the hard disk, VBootkit 2.0 is very difficult to detect, he said.

However, when the victim's computer is rebooted, VBootkit 2.0 will lose its hold over the computer as data contained in system memory will be lost.

VBootkit 2.0 is a follow-up to earlier work that Kumar and Kumar have done on vulnerabilities contained in the Windows boot process. In 2007, Kumar and Kumar demonstrated an earlier version of VBootkit for Windows Vista at the Black Hat Europe conference.

The latest version of VBootkit includes the ability to remotely control the victim's computer. In addition, the software allows an attacker to increase their user privileges to system level, the highest possible level. The software can also able remove a user's password, giving an attacker access to all of their files. Afterwards, VBootkit 2.0 restores the original password, ensuring that the attack will go undetected.

Microsoft 一定会在5年之内被取代。

Thursday, June 4, 2009

今天六四

今天六四, 如果不是出国可能还是对六四运动不了解。不想抨击中国政府什么, 只希望慢慢变好吧。 作为一个中国人的尴尬, 又恨又爱。。

想了解一下六四运动, 就看看吧。
http://zh.wikipedia.org/wiki/六四事件

Wednesday, June 3, 2009

传承一下经典

孔子曰:“莫装B,装B遭雷劈。”
  
  1.No B, or else P.
  
  2.mo zhuang B, zhuang b bei lei pi.
  
  3.People who are zhuangbility want to show their niubility but only reflect their shability.
  
  4.Mr.Mo pretended to be Mr.B,but he was pied by Miss Lei.
  
  5.Don't zhuangbility,or thunder will strike you bitch……
  
  6.No more zhuangbility, zhuangbility leads to leipility.
  
  7.No Zhuangbity allowed.
   Zhuangbiers are most likely end up riven by lightning.
  
  8.GOD FUCKS FAKE B.
  
  9.Don’t be a smart ass or someone will kick your ass.
  
  10. P is always after zhuangbility.