Return-Path: <sentto-279987-3644-1004452049-fc=all.net@returns.onelist.com> Delivered-To: fc@all.net Received: from 204.181.12.215 [204.181.12.215] by localhost with POP3 (fetchmail-5.7.4) for fc@localhost (single-drop); Tue, 30 Oct 2001 06:28:08 -0800 (PST) Received: (qmail 1178 invoked by uid 510); 30 Oct 2001 14:26:46 -0000 Received: from n14.groups.yahoo.com (216.115.96.64) by 204.181.12.215 with SMTP; 30 Oct 2001 14:26:46 -0000 X-eGroups-Return: sentto-279987-3644-1004452049-fc=all.net@returns.onelist.com Received: from [10.1.1.223] by n14.groups.yahoo.com with NNFMP; 30 Oct 2001 14:28:29 -0000 X-Sender: fc@red.all.net X-Apparently-To: iwar@onelist.com Received: (EGP: mail-8_0_0_1); 30 Oct 2001 14:27:28 -0000 Received: (qmail 76003 invoked from network); 30 Oct 2001 14:27:27 -0000 Received: from unknown (10.1.10.142) by 10.1.1.223 with QMQP; 30 Oct 2001 14:27:27 -0000 Received: from unknown (HELO red.all.net) (65.0.156.78) by mta3 with SMTP; 30 Oct 2001 14:27:26 -0000 Received: (from fc@localhost) by red.all.net (8.11.2/8.11.2) id f9UERUW17322 for iwar@onelist.com; Tue, 30 Oct 2001 06:27:30 -0800 Message-Id: <200110301427.f9UERUW17322@red.all.net> To: iwar@onelist.com (Information Warfare Mailing List) Organization: I'm not allowed to say X-Mailer: don't even ask X-Mailer: ELM [version 2.5 PL3] From: Fred Cohen <fc@all.net> X-Yahoo-Profile: fcallnet Mailing-List: list iwar@yahoogroups.com; contact iwar-owner@yahoogroups.com Delivered-To: mailing list iwar@yahoogroups.com Precedence: bulk List-Unsubscribe: <mailto:iwar-unsubscribe@yahoogroups.com> Date: Tue, 30 Oct 2001 06:27:30 -0800 (PST) Reply-To: iwar@yahoogroups.com Subject: [iwar] [fc:Chinese.crackers.dampen.WinXP.celebration] Content-Type: text/plain; charset=US-ASCII Content-Transfer-Encoding: 7bit Chinese crackers dampen WinXP celebration By Nick Farrell, vnunet.com, 10/30/2001 <a href="http://www.vnunet.com/News/1126503">http://www.vnunet.com/News/1126503> A Nottingham-based security company claims Chinese crackers had disabled Windows XP's anti-piracy system within a few hours of the product's launch. BitArts Labs' chief technology officer, John Safa, said that crackers have developed illegal installation files that bypass the registration process for Microsoft's new operating system. "These files can now be downloaded from websites in the Far East and cracked copies of Windows XP, with the protection mechanism stripped out, can be downloaded from Warez sites across the internet," Safa said. Safa added that his company warned Microsoft about its flawed anti-piracy system when it tested the product during its beta phase. The Redmond giant said the problems it highlighted would be fixed in the final version. "But it wasn't, and now crackers have studied and bypassed the security by using publicly available monitoring tools," Safa said. He dubbed Microsoft as naive for underestimating the high level of technical intellect within today's cracking community. "If they'd taken our advice, they really wouldn't be having these problems," Safa said. While Microsoft was right to introduce licence activation, it needed to adopt a much better approach. The design of many software companies' activation technologies - and this includes Microsoft - provide no barrier to today's advanced cracking techniques. "Companies must learn to understand cracking ideologies or they will be consistently caught out. The industry is educated in the art of hacking, but the elusive world of cracking allows the inner workings of applications to be reversed and modified," Safa said. ------------------------ Yahoo! Groups Sponsor ---------------------~--> Get your FREE VeriSign guide to security solutions for your web site: encrypting transactions, securing intranets, and more! http://us.click.yahoo.com/UnN2wB/m5_CAA/yigFAA/kgFolB/TM ---------------------------------------------------------------------~-> ------------------ http://all.net/ Your use of Yahoo! Groups is subject to http://docs.yahoo.com/info/terms/
This archive was generated by hypermail 2.1.2 : 2001-12-31 20:59:58 PST