Jump to content

Movie Junkie

Beta Team Members
  • Posts

    1,374
  • Joined

  • Last visited

Everything posted by Movie Junkie

  1. That ranks right up there with the most stupid shit I have ever heard!
  2. If you are talking about the part that states; "AMD's SVM/Pacifica virtualization technology to create an ultra-thin hypervisor that takes complete control of the underlying operating system." I didn't take that as it not affecting Intel systems. I took it as they are using a technology developed by AMD to make this piece of malware.
  3. .............................................................................................................................................................,,, ,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, ,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,
  4. A security researcher with expertise in rootkits has built a working prototype of new technology that is capable of creating malware that remains "100 percent undetectable," even on Windows Vista x64 systems. Joanna Rutkowska, a stealth malware researcher at Singapore-based IT security firm COSEINC, says the new Blue Pill concept uses AMD's SVM/Pacifica virtualization technology to create an ultra-thin hypervisor that takes complete control of the underlying operating system. Rutkowska plans to discuss the idea and demonstrate a working prototype for Windows Vista x64 at the SyScan Conference in Singapore on July 21 and at the Black Hat Briefings in Las Vegas on Aug. 3. The Black Hat presentation will occur on the same day Microsoft is scheduled to show off some of the key security features and functionality being fitted into Vista. Rutkowska said the presentation will deal with a "generic method" of inserting arbitrary code into the Vista Beta 2 kernel (x64 edition) without relying on any implementation bug. he technique effectively bypasses a crucial anti-rootkit policy change coming in Windows Vista that requires kernel-mode software to have a digital signature to load on x64-based systems. The idea of a virtual machine rootkit isn't entirely new. Researchers at Microsoft Research and the University of Michigan have created a VM-based rootkit called "SubVirt" that is nearly impossible to detect because its state cannot be accessed by security software running in the target system. Now, Rutkowska is pushing the envelope even more, arguing that the only way Blue Pill can be detected is if AMD's Pacifica technology is flawed. "The strength of the Blue Pill is based on the SVM technology," Rutkowska explained on her Invisible Things blog. She contends that if generic detection could be written for the virtual machine technology, then Blue Pill can be detected, but it also means that Pacifica is "buggy." PointerRead more here about Microsoft's moves to hardens Vista against kernel-mode malware. "On the other hand?if you would not be able to come up with a general detection technique for SVM based virtual machine, then you should assume, that you would also not be able to detect Blue Pill," she added. "The idea behind Blue Pill is simple: your operating system swallows the Blue Pill and it awakes inside the Matrix controlled by the ultra thin Blue Pill hypervisor. This all happens on-the-fly (i.e. without restarting the system) and there is no performance penalty and all the devices," she explained. Rutkowska stressed that the Blue Pill technology does not rely on any bug of the underlying operating system. "I have implemented a working prototype for Vista x64, but I see no reasons why it should not be possible to port it to other operating systems, like Linux or BSD which can be run on x64 platform," she added. Blue Pill is being developed exclusively for COSEINC Research and will not be available for download. However, Rutkowska said the company is planning to organize trainings about Blue Pill and other technologies where the source code would be made available. Rutkowska has previously done work on Red Pill, which can be used to detect whether code is being executed under a VMM (virtual machine monitor) or under a real environment.
  5. Welcome to the ImgBurn Support Forum Matt. I'm sorry but we can't help you copy movies. If you do a search on Google or some other search engine I'm sure you'll be able to find what you're looking for.
  6. I'm glad to know that your problem has been solved. Using top of the line media is the only way to go.
  7. Thanks. It's from a Firefox extension.
  8. Well calweycn you've managed to do what only a very small percentage of those before you have done. That is to PISS OFF JUST ABOUT EVERYONE HERE! It seems that you really don't want answers, suggestions or help. You want to show all of us that you know it all! You alone have decided that ImgBurn is the cause of your problems. You ignore the fact that a huge majority of the people here have had NO problems and most of the people that did have a problem found out that ImgBurn didn't cause it. I am humbled by your knowledge. I should not be in the same forum as you... SO FUCKIN' LEAVE ALREADY!
  9. Ok Kev. Now that you've revealed that information I will reveal your secret. You are the one on top in the following picture: To go further Kev, here is what you look like eating: I'm really sorry that I had to do that Kev but by revealing what I look like, I just had to do the same for you. Please don't force me to show the nasty pictures of you.
  10. That's just what I thought. That's the folder I can't access. Even in the Admin account I get the following error:
  11. Please tell me what the name of the folder is that hold the restore points. Are you saying that within the restore folder are additional numbered folders that correspond to the restore points?
  12. You mean System Restore points? If so, this is Windows! Forget about it! You MIGHT have luck by copying over the System Volume Information folder for a drive to somewhere else as a backup and copying it back over. But, I would highly doubt it would work. You'd have to do it outside Windows or disable the monitoring on that drive, do the copy, and re-enable it, which would probably just overwrite what you just copied. Thus, defeating the purpose. But, that's Big Bill for you. It does seem like a hopeless task db. I'll keep searching but I think it'll be for naught.
  13. Is there a way to either selectively delete or selectively save to another media, restore points? I searched a bit on the 'net but from what I was able to find it looks like the answer to both questions is no.
  14. That makes sense but why didn't they just say that they limited the downloads to X number of people and that number has been reached? WAIT, I KNOW...BECAUSE IT'S MICROSOFT!
  15. A name from the past that I had just about forgotten. He is truly an enigma.
  16. According to blu the webcam spyware is going to be in 2.1. That's why he's so bent on it's release.
  17. Hello Michelle. Welcome to the forum. If your drive doesn't support DVD-R discs there really isn't any reason to buy a new drive unless you're having problems with yours. Blu told you right when he said Verbatim and Taiyo Yuden are the 2 most highly recommended blanks. The only thing I would add to that is to only use Verbatim for your dual-layer burning and only use the DVD+R DL discs. This isn't a problem since you can only use + discs but if you decide to get a burner that does both - and + you still need to use Verbatim DVD+R DL discs and not their DVD-R DL discs because the DVD-R DL discs are horrible. Don't be afraid to ask question if you can't find the answers on your own. You'll find that the people here are more than willing to help you.
  18. Hey there Alien. I haven't seen you here in awhile. Glad to have you back.
×
×
  • Create New...

Important Information

By using this site, you agree to our Terms of Use.