Full Disclosure mailing list archives
Re: Fwd: stealthbomb
From: Dan Yefimov <dan () lightwave net ru>
Date: Fri, 26 Feb 2010 15:57:50 +0300
On 26.02.2010 15:35, RandallM wrote:
anyone see this and know about it? How it works and good detection? http://www.brickhousesecurity.com/pc-computer-spy.html
I doubt very much in that. The matter is that USB hardware is able to transfer data only when host requests that, IOW it is the host that decides from where, to where and how much data to transfer. If that was an IEEE 1394 device, those assertions would be correct. -- Sincerely Yours, Dan. _______________________________________________ Full-Disclosure - We believe in it. Charter: http://lists.grok.org.uk/full-disclosure-charter.html Hosted and sponsored by Secunia - http://secunia.com/
Current thread:
- Fwd: steathbomb RandallM (Feb 26)
- Re: Fwd: steathbomb Robert Portvliet (Feb 26)
- Re: Fwd: steathbomb Michael Holstein (Feb 26)
- Re: Fwd: stealthbomb Dan Yefimov (Feb 28)
- Re: Fwd: steathbomb McGhee, Eddie (Feb 28)
- Re: Fwd: steathbomb T Biehn (Feb 28)