"Mark McIntyre" <markmcintyre@TROUSERSspamcop.net> wrote in message
news:e%5Pk.76280$wc2.48368@en-nntp-01.am2.easynews.com...
> David H. Lipman wrote:
>> From: "Mark McIntyre" <markmcintyre@TROUSERSspamcop.net>
>>
>>
>> | Course it does. You can image the HDD, you can install hardware that
>> | intercepts the decrypted stream en route between disk and memory, you
>> | can put in a modded CMOS or BIOS that includes a builtin keylogger or
>> | data logger thats part of the firmware etc etc etc.
>>
>> | If you have access to the box for long enough, its yours.
>>
>> Now your making things up...
>
> Ya reckon?
>
>> "put in a modded CMOS or BIOS that includes a builtin keylogger "
>
> PC BIOSes are on EEPROMS. Booting the pc from a CD and running a custom
> BIOS upgrade is far from beyond the bounds of possibility.
>
> People hack the BIOS for CD and DVD drives all the time to add features
> and remove region settings. A quick google search shows that numerous
> people have hacked their PC bios to enable features that the mobo provider
> decided weren't for use.
BIOS might not be the right term - but what used to be called "option ROM"
and now referred to as "expansion ROM" can be used nefariously by malware
program fragments. I don't think an entire keylogger would work, but I could
be wrong. Most people don't realize just how much code lives outside the HD
or on the harddrive outside the filesystem's files.


Reply With Quote
)