I certainly never said that. But you're right. It should have occured
to me that the homepage for the spyware would rape one's computer.
Guess I forgot because I'd already removed Java from my system and
also am using Kerio.
Here's a better site that gives tons of info on how the spyware works:
http://kalsey.com/2002/11/java_spyware/
It's hard to say which files are depended on to do the spying though,
since it's a server side spyware, depends on cookies and runs a java
applet. Somehow, files are freely modified without one's permission.
For example: when opened in Wordpad, the file I referred to
(C:\WINDOWS\.plugin141_03.trace) read like this on Dec. 27, last year:
_____________________________________________________
Java(TM) Plug-in: Version 1.4.1_03
Using JRE version 1.4.1_03 Java HotSpot(TM) Client VM
User home directory = C:\WINDOWS
Proxy Configuration: No proxy
----------------------------------------------------
c: clear console window
f: finalize objects on finalization queue
g: garbage collect
h: display this help message
l: dump classloader list
m: print memory usage
o: trigger logging
p: reload proxy configuration
q: hide console
r: reload policy configuration
s: dump system properties
t: dump thread list
v: dump thread stack
x: clear classloader cache
0-5: set trace level to <n>
----------------------------------------------------
_____________________________________________________
Then a couple of days ago, it included the link to the Redsheriff
site. I'll try reinstalling Java to see of the file is part of Java
itself. If it's a standard part of it, then it's open to an exploit
and Java goes away permanently. I never have liked it anyway.
This is the file to watch out for: measure.class
I also read this info at the site I mention above. There was no such
file(s) on my system. However, I noticed there were a lot of files
whose names started out with "measure.class", but had a long string of
characters after that and then either ended in .class or .idx. When I
opened one of them up in Wordpad, it contained a reference to the
Redsheriff website's privacy statement. Those files resided in the
following folder on my system:
C:\WINDOWS\.jpi_cache\file\1.0
Gone now.
At the site I mention above, one of the people in the discussion claim
that another file name to be wary of is sleepthread.class.
I still maintain that the best way to prevent this spyware from
working is to TOTALLY REMOVE SUN SYSTEM'S JAVA FROM YOUR COMPUTER. May
sound like overkill, but maybe Sun will get the message eventually and
sue Redsheriff and-or take other measures to stop the exploit.