Yes, didn't even know about this issue until you guys mentioned it in
reply,
then this morning on usatoday
(
http://www.usatoday.com/tech/news/2005-11-09-sony-usat_x.htm) ... what
a
coincidence : ) Anwyay, I see that I got this through my SwitchFoot CD
...
which defintiely made me ticked as I had to install their software just
to
get the songs on my PC. In the report it says security experts say Sony
can
use it for consumer tracking, but Sony says it doesn't collect
information
and is only there for copy protection...which is it? Even if Sony is
honest
in that, the fact that it can be exploited, as you show below, is even
worse.
Now Sony has a lawsuit on their hands as well. Copyprotection and
consumer
freedom... the battle continues. I find it quite amussing how a vast
amount
of film and music atrists don't want to be morally responsible in
expressing
themselves, yet then turn around and expect the consumer base, which
feeds
on
their entertainment, to be morally responsible in how they handle their
products. Hmm...could it be that one should pracitce some
responsibility
in
the type of material they produce and promote in the first place? Well,
that's another thread for another place. : ) Thanks for the info and
previous
links.
Darrel
:
According to The Register
(
http://www.theregister.com/2005/11/10/sony_drm_trojan/) the first
trojan taking advantage of Sony's rootkit is out.
I haven't looked into this in detail--i.e. I don't know what the means
of
initial infection is--but this news makes removing this critter a
higher
priority.
--
NoAdware - Items Found.. Registry: 44, Cookies: 53, Files: 19 (Total
116)
Examples (taken from program output but "reformatted" to fit here):
Item:
Searchit/SearchitBar
Location:
HKEY_CLASSES_ROOT\\softomate.ietRegKey
Type :
RegKey
Danger:
Dangerous
Item:
Starware
Location:
C:\Documents and Settings\Owner\Local Settings\Temporary Internet
Files\Content.IE5\GBM547Gv\cmdatatagutils[1].js
Type:
File
Danger:
Severe
SpyWare Doctor - 200 Items found (Alot of these were just labeled
"known
bad
sites" though)
Examples:
Infection Name:
Known Bad Sites
Location:
C:\Documents and Settings\Owner\Local Settings\Temporary Internet
Files\Content.IE5\CHWDQNC1\PRScript[2].dll
Risk:
High
Infection Name:
Affiliated with Browser Hijackers
Location:
C:\Documents and Settings\Owner\Local Settings\Temporary Internet
Files\Content.IE5\KHERKH6N\index[2].htm
Risk:
Elevated
Infection Name:
First 4 Internet Rootkit
Location:
C:\WINDOWS\system32\$sys$filesystem\aries.sys
Risk:
Elevated
Not sure if this is helpful as to what you're looking for, but they
are
some
examples from the output of those programs. I realize the filter
criterea
may
be different on your program and that it might not include all the
non
critical threats these other programs pick up on, but it seemed to
me
(admittedly a non expert) that there were at least a few that were
important
as those other programs deemed them anyway. I ran those two programs
first
and didn't expect the same results with the MS program, but for it
to
come
up
with absolutely nothing shocked me and seemed like something wasn't
right
in
comparison... anyway maybe I need to better understand how your
program
is
filtering things, I'll try to read more on that, but perhaps you
could
explain as well. Thanks for your timely response and service in
looking
into
this.
Darrel
:
If you are finding actual executable spyware on your systems that
Microsoft
Antispyware is missing, and these other programs are
finding--something
is
indeed wrong--with real-time protection, at least. Can you give
some
examples of the non-cookie items, with complete details of exactly
what
is
found?