1996-11-12 - Re: two bogus messages to this list

Header Data

From: ichudov@algebra.com (Igor Chudov @ home)
To: teddygee@visi.net (Ted Garrett)
Message Hash: 072525805022028e3461484af4408b42754bf46ac60556d83e8b56341209c475
Message ID: <199611120454.WAA22994@manifold.algebra.com>
Reply To: <Pine.LNX.3.95.961111230028.1242C-100000@tgrafix.livesys.net>
UTC Datetime: 1996-11-12 05:30:38 UTC
Raw Date: Mon, 11 Nov 1996 21:30:38 -0800 (PST)

Raw message

From: ichudov@algebra.com (Igor Chudov @ home)
Date: Mon, 11 Nov 1996 21:30:38 -0800 (PST)
To: teddygee@visi.net (Ted Garrett)
Subject: Re: two bogus messages to this list
In-Reply-To: <Pine.LNX.3.95.961111230028.1242C-100000@tgrafix.livesys.net>
Message-ID: <199611120454.WAA22994@manifold.algebra.com>
MIME-Version: 1.0
Content-Type: text


Ted Garrett wrote:
> Microsloth has, at the heart of it's system, a call which traps ALL
> KEYSTROKES and EVENTS.  This call exists from Win32s on, and can be
> placed inside of a DLL which most users would have no idea was loaded.
> Even under NT, this DLL can be made to remain resident and trapping
> Keystrokes, events, and window contents.
> 
> Does this just BEG to be exploited?

Also, permissions of many of the system binaries on NT 4.0 are
wrong.

	- Igor.





Thread