YDDOS: A Look Inside How Adware Works
Jan. 14th, 2009 11:29 amFrom Your Daily Dose Of Slashdot, today I present the following. This article will be an interesting read for many people who are worried about their online security, who are interested in learning more about adware in order to avoid getting infected by it, and everyone who knows a little bit about computers. This interview might seem very complicated, but I assure you that you will be able to follow it easily.
From the interview:
S: "How private is people’s information today?"
M: "Not at all."
I really recommend you read this interview. It will certainly make you think about what you do with your computer.
Interview With an Adware Author
Posted by kdawson on Tuesday January 13, @04:26PM
from the warming-up-for-the-botnet-era dept.
rye writes in to recommend a Sherri Davidoff interview with Matt Knox, a talented Ruby instructor and coder, who talks about his early days designing and writing adware for Direct Revenue. (Direct Revenue was sued by Eliot Spitzer in 2006 for surreptitiously installing adware on millions of computers.) "So we've progressed now from having just a Registry key entry, to having an executable, to having a randomly-named executable, to having an executable which is shuffled around a little bit on each machine, to one that's encrypted — really more just obfuscated — to an executable that doesn't even run as an executable. It runs merely as a series of threads. ... There was one further step that we were going to take but didn't end up doing, and that is we were going to get rid of threads entirely, and just use interrupt handlers. It turns out that in Windows, you can get access to the interrupt handler pretty easily. ... It amounted to a distributed code war on a 4-10 million-node network."
Read More...
From the interview:
S: "How private is people’s information today?"
M: "Not at all."
I really recommend you read this interview. It will certainly make you think about what you do with your computer.