Analysis of Spyware 246
scubacuda writes "What actually happens when you install adware/spyware/malware? Follow the Bouncing Malware examines what's downloaded, redirected, and obfuscated. A fascinating read. (Part two was postponed in order to cover a new My Doom variant.)"
Even Sevens (Score:5, Interesting)
Personally, I think you should examine ways to get even. Even-Stevens.
Up until this point, I've seen lots of anti-spyware put out that blocks spyware and protects your system from unjustified Reg entries etc., but it generally stops there. It's a shield when what we need is a shield and a sword.
Covenants, without the sword, are but words, and of no strength to secure a man at all -Hobbes
What I would like to see is anti-malware that bites back, hard.
We had this site going a while back that was going to test anti-trolling methods, like by taking a troll user and stuffing them in their own world. All their posts would be modded up and their view of the site was totally different than the users who were not trolls. Of course in tests it was easy enough for them to spoof their IP to get past this, but many of them didn't realize how to do it.
But for malware sites, what if we came up with a solution that would detect it and let it believe it was working, but generated the data needed to put these goofs in jail. I think the SETI distributed computing model could be slightly altered to work to this end.
Then we could get Even-Stevens.
Re:Even Sevens (Score:5, Insightful)
Well, you could feed the spyware's controllers some fudged data, but how do you think you're going to get a SETI@Home-like model to "generate the data needed to put these goofs in jail"? Please, explain how repeated computation of fast Fourier transforms will do anything to uncover the spyware's owner. :)
Suppose we managed to get your nice antispyware software to collect data on the spyware's owners. What form do you think that data will take? I'm guessing it would be little more than IP addresses. Perhaps you can convince the authorities to subpeona the ISP for the owners of those addresses, but I doubt it. Good luck.
Re:Even Sevens (Score:3, Interesting)
Why is it that "the authorities" are interested in subpoenaing the addresses of filesharers, but not illegal malware scammers?
Re:Mod Parent Up (Score:2)
Of course, it's just way too easy to blame others. Just remember that, the next time you sell out by working for or purchasing crap from corporations.
We're here, because we deserve to be here. It can't change if we don't.
Re:Even Sevens (Score:2)
Re:Even Sevens (Score:3, Interesting)
Re:Even Sevens (Score:4, Insightful)
A virus gets onto a user's computer through security holes, but malware simply walks through the front door stating their evil intents in a clickwrap TOS that the user usually doesn't read. There's no crime in getting people to agree to something stupid in exchange for a silly little app that runs in the corner of their screen.
Re:Even Sevens (Score:2, Informative)
Re:Even Sevens (Score:5, Interesting)
After I reinstalled XP for him, I installed Firefox and ordered him to use that and forget about IE unless he wanted to be hit upside the head with my cluestick. He doesn't know much about the underlying technology of computers and recent software but everyone in the family understands when I say "use that and evil stuff might be installed on the PC even if you're only surfing around". They take my word for it as I'm the resident geek.
I did the same with his family's computer. Now I just have to explain stuff to the youngest son who insists on using BearShare, Kazaa (even if I've said NOOOO!) and such stuff. He downloads and installs small programs. Once, the family computer was infected with over 150 viruses.
My cousin is extremely happy with Firefox, once I've shown him the concenpt of tabbed browsing, he's never looked back. And the computer don't get as much spyware installed now. The younger brother screws that up a bit 'cause he won't listen. Damn nu-metal ignoramus
Re:Even Sevens (Score:2)
Re:Even Sevens (Score:2)
Re:Even Sevens (Score:4, Interesting)
I did something similar to the article's author some time ago, although I wasn't particularly detailed in my "analysis." I set up a dummy XP Pro machine (unpatched, since that's how Joe Average's machine will likely be even if he does have broadband and knows how to use WindowsUpdate) and started browsing around for a couple of days as I normally would. I installed no applications other than those that came with XP. At the end of my test period, I had a couple of dozen different unauthorized apps running that entered the system solely through the browser. No warnings, no click-throughs
And I wouldn't be so sure these jerks aren't breaking any laws. Regardless of the privacy implications, spyware causes damage. Trashed systems, lost data, personnel time spent cleaning infestations and so forth. I've seen corporate workstations with thirty or forty spyware applications running simultaneously, causing major performance loss and instabilities. It wouldn't be hard for a corporation with a few hundred workstations to get the FBI interested with a legitimate damage claim of a few hundred grand in losses.
Spyware, malware, adware, spam
Re:Even Sevens (Score:2)
Now I understand how I got Excellent Karma! :-)
Re:Even Sevens (Score:4, Insightful)
Re:Even Sevens (Score:3, Insightful)
Hmmm. Interesting opening comment:
Surely you don't mean to discredit these malcontents' freewill do you? And the suggestion that the have "need" to hurt other people also seems to disown them of their personal responsibility to behave properly dispite if they are malcontent and have antisocial personality "features". I'd rather call the later "choices."
Shheesh! What kind system would any lawful country have if
In other news (Score:4, Funny)
Re:In other news (Score:2)
What happens? (Score:5, Funny)
I'm not sure. Let me ask BonziBUDDY...
Re:What happens? (Score:2, Funny)
It told me i need viagra.
firefox testimonial (Score:5, Insightful)
Seriously, how hard can it be for MS to write an application as straightforward, yet secure as Firefox.
I downloaded Service pack 2 release candidate and noted a lot of security improvements and features, but in agreeance with with MS whom today released the full Service pack 2, it seems to mainly add 'bars and locks' to your 'doors and windows'. Whereas Firefox seems to be a better neighborhood to live in from the start.
Re:firefox testimonial (Score:5, Interesting)
You hit the nail on the head several times with firefox's security. It does seem to have marked improvements over IE in security, blocking 'wares from going off in your system, to barring banners from starting up, ever!
Of course I maintain a hosts file that pretty much keeps them at bay.
http://www.pelicancoast.net/~nighthawke/hosts.z
Re:firefox testimonial (Score:2)
Re:firefox testimonial (Score:4, Informative)
Re:firefox testimonial (Score:4, Funny)
Re:firefox testimonial (Score:2)
Re:firefox testimonial (Score:2)
Re:firefox testimonial (Score:2, Informative)
pac file [schooner.com]
I use it in addition to a decent hosts file. I even combined the two. That way the freeking browser doesnt even ASK to be nuked. Before popup blocker was put into Mozilla and IE this is what I used. I rarely saw a popup, and my spyware count went to 0. Sometimes it pukes on itself but someone was kind enough to put a 'turn it off for now' thing. Which is kind of cool as with a hosts file you have to move it out of the way then back when done. There is als
Re:firefox testimonial (Score:3, Interesting)
Actually, i've put a IPblock in my hosts file by entering the IP address into it and referring it to loopback. (I know, it goes agianst the RFC for DNS, but it works!)
I've dogfarted on gator/claria with this action and they are pretty much torqued off at me for that. Of course, i've made it rather difficult for them to get in touch with me without sending a message thru a lawyer by blocklisting their domain in our POP3, hee hee hee hee.
This way it keeps'em honest and let's them know tha
Re:firefox testimonial (Score:2)
Re:firefox testimonial (Score:2)
Re:firefox testimonial (Score:5, Insightful)
Perhaps lots [ca.com] of [symantec.com] people [bitdefender.com], including Microsoft itself [theinquirer.net], have an interest in perpetuating the myth that software is inherently insecure.
Re:firefox testimonial (Score:2)
Insecure software creates a whole economy for crutch-software. If software were secure, entire corporations would go bankrupt.
Re:firefox testimonial (Score:4, Funny)
Shiiit, maybe I should have put this in the slashdot-user-friendly format with little numbers as in:
1. Write shitty OS
2. Invest in A/V vendors
3. Profit
What a bunch of bullshit.
Re:firefox testimonial (Score:2)
Hmm.. let's think about that. Let the flaws continue and create an industry that doesn't compete with core Microsoft business. When that industry is rolling in cash, point out that Microsoft has them by the balls. If they fixed the flaws, those businesses wou
Just not IE! (Score:5, Informative)
I've been using Opera since v5.x and have never looked back. Lately I've seen a lot of improvement in Firefox but they are still playing catchup with Opera.
For whatever reason Opera only seems to get a nod here when it should be getting a lot more but cest la vie. I personally will continue to support Opera until they sell out or whatever but I hope that they, and everyone else, realize that having a marketplace full of a few, maybe even many diffrent browsers will only help everyone in the long run.
Currently I am installing Firefox for people who just need to use anything but IE; mostly end users. For a power user however Opera is the way to go.
Re:Just not IE! (Score:2)
I guess I'm not sure what the difference is between an average Firefox user and a "power user" of the web, then. If there are features that Opera has that you simply can't get in Firefox/Mozilla, you'd do your crusade a service by posting what they are.
Re:Just not IE! (Score:2)
Now don't get me wrong, I just downloaded 9.3 and it looks great. Works great. Updates are coming fast. I would almost say it ties with Opera in total useablity but for one little thing.
F12. F12 is what I mean when I talk about Power Users. Unless I'm missing somethi
Re:Just not IE! (Score:2)
Pop-up windows (the good sorts) are also tabs, as opposed to Firefox where they open in their own windows. Pressing CTRL-N opens a new tab, not a new window. Opera was designed from the ground up with the concept of everything being self-contained in the Opera window.
It also has a shitload of re
Re:Just not IE! (Score:2)
iantri: "BTW, do you know if there is a Firefox extension to prevent stuff from opening in new windows? (opening as tabs instead, like Opera)"
Yes, there is: Single Window 1.0 [mozilla.org]. It doesn't catch things that the browser wants to open in a new window like the "get more extensions/themes" links, and Ctrl+N still opens a new window. However, things that websites want to open in a new window using "target=_blank" or similar open in new tabs and not new windows.
Re:Just not IE! (Score:2)
About Opera--Switched 3 days ago (Score:2, Interesting)
I moved to Opera three days ago after finally getting cheesed off with having IE launch spyware apps and then crash virtually every time I opened it.
I have the free version right now, in which I can even choose whether I prefer Google ads or big, noisy banners. I went with Google, since I am a Gmail fan anyway. One of my friends thinks I am a wuss for thinking this, but I actually like the text ads by Google. They are becoming familiar, and they virtually disappear on the Opera interface unless I need the
Re:firefox testimonial (Score:2)
Never again... Its bad enough my browsing efficiency is much reduced on IE now (damn mouse gestures!), and my system resources take a decent hit... But I sp
Re:I guess you missed the memo... (Score:3, Funny)
After all, just this one vulnerability makes it just as insecure as IE's 1035.
New one just in: now 1036...
another: 1037...
another: 1038...
Shit! I'm not gonna keep this up all day!
Re:I guess you missed the memo... (Score:2)
malware honeypot? (Score:5, Interesting)
Then maybe the state DA's will jump in and make a lesson of a malware producer or two. That is, if they are local. IF not, LART until their router is unplugged.
This 'ware business is seriously getting out of hand and MUST be dealt with, one way or another. IF we have to force these jokers to go overseas, fine, then we'll do so and isolate their domains at root DNS.
Re:malware honeypot? (Score:2, Interesting)
Did you RTFA? The spyware he mentioned all loaded automatically using exploits that are only available in IE and Windows! This is all courtesy of Microsoft!
Face it: these people would not be able to do these things without Microsoft's brain-dead approach to secure design. If you wanna sic DA's on somebody, point them at Microsoft!
Re:malware honeypot? (Score:3, Informative)
We all now how well that worked
Face it : malware is the new spam, and it is a lot harder to detect & isolate. OSX & linux users may be safe for now since the problem is moved from mailserver to client machine, but it is only a matter of time until java malware shows up.
The ONLY solution is keeping the OS secure, the firewall tight and the user aware not to click bogus utilities. That and a network wide hosts file that redirects a lot of crap.
Re:malware honeypot? (Score:5, Insightful)
If someone goofs and winds up on a site like the article mentioned, guess what, the customer just hit a malware mine.
It's not like the lovebug bit where it spread like wildfire, at random, the 'wares are more focused and actually show a purpose behind their creation: to retrieve personal information on the user behind the keyboard.
Under Federal and State regulations, this shows Willing Intent to Commit Malice, possible violations of Wiretapping Laws,and is grounds for prosecution to the fullest extent of the Law.
Re:malware honeypot? (Score:2)
If the malware itself operates in a silent way (i.e. not blatantly plop ads all over your screen, but rather replace existing ads with his own crap), it can be very tricky to pinpoint a guilty party
Re:malware honeypot? (Score:2, Insightful)
Mozilla Firefox - it solves most problems.... (Score:4, Interesting)
Usually, I skeptical about "Freeware", but Mozilla's Firefox has been a glorious exception. Not only is it faster, more intuitive, and easier to use than IE, it is also MORE SECURE. Unlike IE, Firefox does not allow ActiveX and VBScripts to run - and this is a blessing.
Please consider giving it a try.
Happy surfing.
Re:Mozilla Firefox - it solves most problems.... (Score:5, Funny)
Jesus, it's about time you upgraded from ME, I'd say...
Re:Mozilla Firefox - it solves most problems.... (Score:2, Interesting)
Currently, I'm running Mozilla Firefox on Windows 2000, and I have no complaints. In fact, I'm happier about surfing the web than I've been in years!
For reference, Firefox may be downloaded at http://texturizer.net/firefox/index.html.
Happy Surfing.
Spyware Prevention (Score:4, Insightful)
make it fun (Score:3, Interesting)
Re:Spyware Prevention (Score:3, Insightful)
I don't think Ad-Aware (or other spyware scanners) checks Firefox cookies. I just ran and older version and it only found an Alexa registry entry, but I opened my Firefox cookies.txt and found a doubleclick.net cookie in there.
I'm a Firefox user/fan and IE hater, but Firefox doesn't inherently block tracking cookies, so I had to pick at your example. (Yes, Firefox does allow forcing per-session cookies, but it's no
And let's not forget... (Score:5, Interesting)
And don't deny it - their affiliates DDoSed SpywareInfo because it told people how to remove their bastardly malware and provided CWShredder.
I say we go after them, drain their coffers dry, and donate the funds to the Mozilla Foundation or something.
Re:And let's not forget... (Score:2)
And then I highly doubt the money would go to something worthy. The lawers would get at least a 1/3 of a large settlement, and unless Mozilla did the suing, little money would go there.
Re:And let's not forget... (Score:2)
1. Norton Ghost - Since it's a single particular user's machine that keeps getting it, this would work well. He will, of course, bitch about losing his pictures every time we wipe the drive, though.
2. RIS - F12 is your friend, I've learned. At least during the boot process. Having a RIS setup would make installation quick and hopefully painless. (Yeah, right.)
There's another CoolWebSe
How about fixing the user... (Score:3, Funny)
Re:And let's not forget... (Score:2)
Why tell him? Set the permissions so that he can't save to it.
No spyware here (Score:2, Informative)
I switched to Mozilla about 2 months ago and not only do i never get spyware cookies due to its easy to use cookie blocking and plugins, but its so much better in many respects. I still have to use IE on some pages that contain video files, and i do have a few gripes but overall its much better and lets me control my internet experience on many more levels.
Spyware is just another form of a virus (Score:5, Insightful)
Look, I have worked on systems that have had hundreds of infections, from viruses and spyware. I routinely subject a drive from a machine with spyware to the same checks and controls I do with viruses. I start by removing the victim drive and putting it in a secondary control system. Only then can I properly remove the hooks installed to prevent you from really removing things.
I've seen everything from DLL hooks to putting itself into the system restore file or hidden OEM restore partitions. This way windows itself will *fix* your removal. I've seen where they try to emulate legitimate hotpacks and patches. It's pretty simple really, if a program installs surreptitiously, disguises itself, and takes steps to prevent it's removal - than it is a virus.
Re:Spyware is just another form of a virus (Score:3, Insightful)
Re:Spyware is just another form of a virus (Score:4, Informative)
A program that can infect other programs by modifying them to include a possibly evolved copy of itself.
"A parasitic program written intentionally to enter a computer without the user's permission or knowledge. The word parasitic is used because a virus attaches to files or boot sectors and replicates itself, thus continuing to spread. Though some viruses do little but replicate, others can cause serious damage or affect program and system performance. A virus should never be assumed harmless and left on a system." -- Symantec
Get your terminology straight. If it doesn't infect other software, it is not a virus. Your argument is like saying malnutrition is a virus because it makes you sick.
Re:Spyware is just another form of a virus (Score:2, Insightful)
He said: "I've seen everything from DLL hooks to putting itself into the system restore file or hidden OEM restore partitions."
That sounds like it's infecting software. Last I checked, Windows wasn't hardware.
Re:Spyware is just another form of a virus (Score:2, Insightful)
Re:Spyware is just another form of a virus (Score:2)
Re:Spyware is just another form of a virus (Score:3, Insightful)
Peter Norton: SpyVirus removal complete!
User: Norton broke my SuperKaazaMidgetCursor. No more free MP3s and naked strippers on my desktop WAH! I want my money back!
[The big difference between Anti-Virus and Spyware-Removal programs, is that the former is based on program behavior, and the latter makes value judgements about what is 'good' software or 'bad' software. I don't think any developers want a situation where they have to get
Re:Spyware is just another form of a virus (Score:2)
A virus is a piece of malware that embeds itself in other programs. This is often done by gluing the malware code onto the end of an innocent executable and modifying the start of the real program so it jumps to the malware code first.
AFAIK there hasn't been a virus written in a _long_ time.
By contrast, most of what the media call viruses
A lot of people don't care (Score:5, Interesting)
Re:A lot of people don't care (Score:2)
It's not that the dancer is spyware, it's that wild tangent is. In order to run it, or any other wild tangent content, you have to install the wild tangent player.
Re:A lot of people don't care (Score:4, Funny)
Re:A lot of people don't care (Score:2)
Re:A lot of people don't care (Score:2)
You can't just run an installer either, you have to go looking for it in the Windows folder, and delete it, otherwise it keeps running. The really infuriating part is I found a text file in the folder where it is installed that contains a long diatribe about why WildTangent doesn't consider their crap spyware. They can bite me. AOL should not work with these dicks.
This is why I installed GAIM [sourceforge.net]. Problem solved!
Re:A lot of people don't care (Score:2, Insightful)
Re:A lot of people don't care (Score:2)
Are there security holes in Flash? Have not heard of any.
SVG would also be a good idea, it is equivalent to Flash but completely standardized and open and the files are text. Unfortunately there are no working implementations yet.
pollution (Score:4, Interesting)
Just how that's done is another matter; but how long will it be before some enterprising young soul comes up with a daemon that generates false information and does nothing but pollute spyware databases? If it can be done with SETI, it can be done here
Re:pollution (Score:2)
Run it all in VMware.
This would actually be a cool project to do for Defcon. If anyone is interested in something like that, e-mail me: scubacuda#iname-c0m
Working version (Score:2, Informative)
Working version of the article (for now): http://isc.sans.org/diary.php?date=2004-07-23 [sans.org]
I want an integrated tool! (Score:4, Interesting)
I'd love to see a tool that would deal with all security threats to the desktop. A single tool that would protect against viruses, malware and would act as a smart desktop firewall. We already use an anti-span service but I think the tool should do that too. In the workplace it should be centrally controlled and updated automatically. It should report on attemts and allow the networking folks to use this data to stop stuff at the corporate firewall.
While I am dreaming, I think I'd even like to tool to provide a transparent, managable method of deploying service packs and patches to the desktop (although that is I admit probably better seperately with software deployment tools).
I suppose the server boys would probably need a tool to keep those back-room boxes squeeky clean too. Maybe a special server version of the same software could be slapped on those bad-boys.
I understand why companies are reluctant to share data but in the case of "common security threats" I think that an exception should be made and an automated but monitorable system of threat identification and reporting should be built into the software so as soon as a new threat is identified it can be made available to everyone using the software.
Then we can all cooperativly figure out who is doing this and we can publish that information somewere (like slashdot?) and we can provide them with a little justice!
Re:I want an integrated tool! (Score:2)
Re:I want an integrated tool! (Score:2, Insightful)
What's your ticker symbol, because I don't ever want to buy stock in a company that can't run a network properly.
Re:I want an integrated tool! (Score:2, Interesting)
I am not trying to be anti-Linux here, since I am booted into it anyway, but I tend to believe that there is a "properly configured Windows XP" too.
It includes:
All users use a Limited account
The is ONE admin account, to be configured with a red desktop and boring scheme as to place zero doubt that no one is supposed to be there to do anything except to install software.
Except for Windows Update, no user under any circum
Startup Cop (Score:4, Informative)
Re:Startup Cop (Score:2)
Re:Startup Cop (Score:5, Informative)
First, get HijackThis. If you're not very familiar with windows internals, run it on a couple clean systems to get a feel for what should be there.
If it isn't being blocked by some really nasty spyware, AdAware or one of those is a good first step to remove the easy stuff before you tackle the hard stuff.
Now, run HijackThis on the infected computer. It will take some practice to learn what is bad and what isn't, but some things will be obvious. In the case of TVM, there will be a startup item (O4 iirc) for tvm.exe, a URLSearchHook for tvmbho.dll, and a bunch of BHO entries for randomly named 'ms????.dll', and possibly a few more dlls in the system32 directory. (I havn't personally ever seen a valid BHO entry, but YMMV.) The important thing to do here is to make a list of files to delete in the next step. At this point you can check the suspicious entries and click 'fix', then re-scan the computer and see how many of them come back. In the case of TVM, several of them will, most notably being the tvm.exe startup item. Killing tvm.exe won't help with this, either.
Now, on to removing hard files. In this case, tvm.exe is hard because it loads with explorer so it's always 'in use'. A couple of the ms????.dll files are hard because they are in use and/or get replaced on reboot by tvm.exe if they're gone. There are three methods to remove these.
First, safe mode. This is easy, albeit time consuming waiting for reboots, but doesn't work for all files. (In TVM's case, it works.) Just reboot into safe mode and delete each file on your list, then use HijackThis to remove the registry entries.
Second method. Faster if you're a decent typist, works for files (like tvm.exe) that hide their process inside explorer.exe so you can't kill them. Open a command prompt and task manager. Use task manager to kill any visible tvm.exe (or whatever) tasks, then kill explorer.exe. Your shell goes away. Use the command prompt to delete the files, then run HijackThis and remove the registry entries. (You can re-run explorer from the prompt when you're done.)
Third method. Slow, complicated, but works for files that can't be deleted by either of the other two methods. This method also works remotely through most desktop-sharing type connections, unlike the other two. Once you've figured out where the files are being launched from (HKLM\Software\Microsoft\Windows\CurrentVersion\Ru n in TVM's case), open regedit and go to that key. (NOTE: If you're using windows 2000, you'll need to use regedt32 instead of regedit, but the rest of the process is similar) Click on the key (The entire folder, not the individual entry) and choose permissions from the file menu (or right-click menu in XP). Now you need to deny access to everyone for that key. If you're not familiar with permissions, the exact steps are to click 'Add', type 'Everyone' as the name, hit 'OK', hit 'Advanced', highlight the 'Everyone' entry and hit 'Edit', then check the 'Deny' column next to 'Full Control', then OK out. Reboot. The files won't load (and neither will and of the other startup items in that registry key), so you can delete them and run HijackThis freely. When you're done, run the registry editor again, and in the permissions window for the key in question just click on your 'Everyone' entry and click 'Remove', then reboot one more time.
Hope that helps, and good luck.
alternate method (Score:2)
Sysinternals autoruns (Score:2)
Re:Startup Cop (Score:2)
Umm, how does spyware or viruses prevent you from booting off the CD and reinstalling?
I avoid spyware by... (Score:3, Informative)
Re:I avoid spyware by... (Score:2, Informative)
You really need to take a look at some of the vulnerabilties in IE. You don't have to click any popup or banner ads; they can install whatever they want just because the ad popped up in the first place. Did you RTFA? This particular spyware infection started by opening a popup frame that was 1 pixel by 1 pixel; you wouldn't even know that something had popped up, let alone have to click on it. Then it used a
As an IT Consultant, this is a huge problem..... (Score:3, Interesting)
On the flipside, a simple solution that I've been implementing, is a simple linux box, setup as a transparent proxy, using Squid, with DansGuardian (a pay-for product) doing content filtration, as well as stopping Active-X controls dead in their tracks.
This has proved to be very cost effective, around $300-400 in my time to setup, and stops the junk dead.
Perhaps some other IT managers can put this software to use.
-H
REGMON and FILEMON (Score:3, Informative)
SysInternal [sysinternals.com]
To get utilities like REGMON and FILEMON.
While people has used them for other purposes (for example, figuring out where sharewares store dates), they can useful tools against spywares too.
Run them before doing anything you think MAY be dangerous, and you'll be able to see spyware activities right in front of your eyes.
Re:HAH!!! (Score:3, Funny)
(runs away)
N.
Re:HAH!!! (Score:5, Funny)
Mua ha ha ha ha ha ha ha! Inferior beings! I run an antiquated version of SPARC solaris, and NOTHING is compatible with SPARC solaris! Not even spyware!
Re:HAH!!! (Score:3, Funny)
Re:HAH!!! (Score:4, Funny)
You know that your C compiler might well be infected [acm.org] to compile some spyware and backdoors into itself and applications it compiles?
Re:HAH!!! (Score:2)
Re:There's a simple solution to this.. (Score:4, Funny)