Well yeah, if it is the case it is very, very scary to think of the possibilities and the damage something like this could cause. <br><br>Perhaps it's time to move into security industry, looks like the business will be booming there.
<br><br><div><span class="gmail_quote">On 24/12/06, <b class="gmail_sendername">Martin Marcher</b> <<a href="mailto:martin.marcher@openforce.com">martin.marcher@openforce.com</a>> wrote:</span><blockquote class="gmail_quote" style="border-left: 1px solid rgb(204, 204, 204); margin: 0pt 0pt 0pt 0.8ex; padding-left: 1ex;">
Hi,<br><br>Am 23.12.2006 um 16:10 schrieb Serg B.:<br><br>> Sounds like Jame Bond stuff to me. Do you have a link to an article<br>> that<br>> talks about the above proof of concept code? Since you know...<br><br>
nope sorry was a printed articel and I already threw away the<br>magazine... :(<br><br>> However you would definitely know about it. Nothing stealthy there<br>> unless<br>> you run one powerful mother of a machine! And even then you would
<br>> see that<br>> things are not quite as fast. You would notice a performance<br>> decrease since<br>> you would be now running 2 OS's. One for the virus and one for the<br>> guest.<br>> Reduced disk size - a noticeable chunk sine there is another OS
<br>> installed.<br>> On reboot a boot-up screen would show messages inconsistent to the<br>> guest OS,<br>> etc. Like I said nothing stealthy, in MY opinion.<br><br>the stealthy thing as I understood it was that you are in fact not
<br>running to OS but with the virtualization technology the software<br>could at runtime of the os switch the context in which the os is<br>running.<br><br>I have no idea how large such a thing would be, but even if it was 20
<br>MB with todays HD sizes one would hardly recognize. And since it's a<br>"small" programm that just hides a few processes from being found I<br>don't think that you would notice any difference.<br><br>
> So yeah I doubt that this proof of concept is anything more then a<br>> marketing<br>> speak for VM tools and somebody trying to get security paper out<br>> for self<br>> promotion.<br><br>I desperately hope so, if not that would mean a _lot_ of spam (which
<br>is the thing that imho pays off most at the moment). Consider you<br>have a running windows/linux/whatever os box and someone has a root<br>kit of that kind installed. no chance to detect it, new investements<br>for anti malware software etc.
<br><br>martin<br><br><br><br>--<br>ubuntu-users mailing list<br><a href="mailto:ubuntu-users@lists.ubuntu.com">ubuntu-users@lists.ubuntu.com</a><br>Modify settings or unsubscribe at: <a href="https://lists.ubuntu.com/mailman/listinfo/ubuntu-users">
https://lists.ubuntu.com/mailman/listinfo/ubuntu-users</a><br><br><br><br></blockquote></div><br><br clear="all"><br>-- <br>Serg