Skip to content
  • Categories
  • Recent
  • Tags
  • Popular
  • World
  • Users
  • Groups
Skins
  • Light
  • Cerulean
  • Cosmo
  • Flatly
  • Journal
  • Litera
  • Lumen
  • Lux
  • Materia
  • Minty
  • Morph
  • Pulse
  • Sandstone
  • Simplex
  • Sketchy
  • Spacelab
  • United
  • Yeti
  • Zephyr
  • Dark
  • Cyborg
  • Darkly
  • Quartz
  • Slate
  • Solar
  • Superhero
  • Vapor

  • Default (No Skin)
  • No Skin
Collapse
Code Project
  1. Home
  2. The Lounge
  3. Anyone else think think the following posting is dangerous?

Anyone else think think the following posting is dangerous?

Scheduled Pinned Locked Moved The Lounge
comquestion
17 Posts 13 Posters 0 Views 1 Watching
  • Oldest to Newest
  • Newest to Oldest
  • Most Votes
Reply
  • Reply as topic
Log in to reply
This topic has been deleted. Only users with topic management privileges can see it.
  • M Offline
    M Offline
    Mike Diack
    wrote on last edited by
    #1

    Does anyone else share my worry about the following article recently posted here which basically talks about rootkit type techniques. I have major doubts whether it's wise/responsible to post it here: http://www.codeproject.com/KB/tips/hide-driver.aspx Anyone care to comment: Mike

    J R P E D 7 Replies Last reply
    0
    • M Mike Diack

      Does anyone else share my worry about the following article recently posted here which basically talks about rootkit type techniques. I have major doubts whether it's wise/responsible to post it here: http://www.codeproject.com/KB/tips/hide-driver.aspx Anyone care to comment: Mike

      J Offline
      J Offline
      J4amieC
      wrote on last edited by
      #2

      Mike Diack wrote:

      I have major doubts whether it's wise/responsible to post it here

      Yet you just did!

      1 Reply Last reply
      0
      • M Mike Diack

        Does anyone else share my worry about the following article recently posted here which basically talks about rootkit type techniques. I have major doubts whether it's wise/responsible to post it here: http://www.codeproject.com/KB/tips/hide-driver.aspx Anyone care to comment: Mike

        R Offline
        R Offline
        Rob Graham
        wrote on last edited by
        #3

        It's a bit of a grey area. I guess i would just report the Article, summarizing your concerns, and let the Staff/Chris decide. It is their site and liability, after all.

        1 Reply Last reply
        0
        • M Mike Diack

          Does anyone else share my worry about the following article recently posted here which basically talks about rootkit type techniques. I have major doubts whether it's wise/responsible to post it here: http://www.codeproject.com/KB/tips/hide-driver.aspx Anyone care to comment: Mike

          P Offline
          P Offline
          Programm3r
          wrote on last edited by
          #4

          I kinda agree with this[^] ... Kind regards,

          The only programmers that are better those C# programmers are those who code in 1's and 0's :bob:

          :)Programm3r My Blog: ^_^

          C R 2 Replies Last reply
          0
          • P Programm3r

            I kinda agree with this[^] ... Kind regards,

            The only programmers that are better those C# programmers are those who code in 1's and 0's :bob:

            :)Programm3r My Blog: ^_^

            C Offline
            C Offline
            Chris Maunder
            wrote on last edited by
            #5

            And so do I. My general rule of thumb is: if it's a legitimate programming technique, if it can be helpful to others, and if it's not trying to promote illegal activities then I'll consider it. Rootkits are part of life thanks to Sony. The more the developer community knows about them the more likely it is that users will be protected through the efforts of the community to promote awarness and provide helpful utilities to detect and remove them.

            cheers, Chris Maunder

            CodeProject.com : C++ MVP

            L D 2 Replies Last reply
            0
            • M Mike Diack

              Does anyone else share my worry about the following article recently posted here which basically talks about rootkit type techniques. I have major doubts whether it's wise/responsible to post it here: http://www.codeproject.com/KB/tips/hide-driver.aspx Anyone care to comment: Mike

              E Offline
              E Offline
              Ennis Ray Lynch Jr
              wrote on last edited by
              #6

              Is the most dangerous risk of all. Personally, I am still ticked that one of my articles was rejected because it may have an interest to the more devious sort.

              Need software developed? Offering C# development all over the United States, ERL GLOBAL, Inc is the only call you will have to make.
              If you don't ask questions the answers won't stand in your way.
              Most of this sig is for Google, not ego.

              E 1 Reply Last reply
              0
              • M Mike Diack

                Does anyone else share my worry about the following article recently posted here which basically talks about rootkit type techniques. I have major doubts whether it's wise/responsible to post it here: http://www.codeproject.com/KB/tips/hide-driver.aspx Anyone care to comment: Mike

                D Offline
                D Offline
                DaveyM69
                wrote on last edited by
                #7

                Hmmm... I don't do censorship normally - except to keep utter crap articles out of my sight. Although we can see obvious illegitimate uses for it and it's hard to see legitimate ones, I'm not sure that it should be stricken from CP. It's not breaking any laws and it's not a bad article, and you can guarentee it'll be all over other sites soon enough anyway even if removed from here. I think Chris needs to make the call on this one. I'm on the fence :confused:

                Dave
                BTW, in software, hope and pray is not a viable strategy. (Luc Pattyn)
                Visual Basic is not used by normal people so we're not covering it here. (Uncyclopedia)

                1 Reply Last reply
                0
                • E Ennis Ray Lynch Jr

                  Is the most dangerous risk of all. Personally, I am still ticked that one of my articles was rejected because it may have an interest to the more devious sort.

                  Need software developed? Offering C# development all over the United States, ERL GLOBAL, Inc is the only call you will have to make.
                  If you don't ask questions the answers won't stand in your way.
                  Most of this sig is for Google, not ego.

                  E Offline
                  E Offline
                  El Corazon
                  wrote on last edited by
                  #8

                  Ennis Ray Lynch, Jr. wrote:

                  Is the most dangerous risk of all. Personally, I am still ticked that one of my articles was rejected because it may have an interest to the more devious sort.

                  Hell, if I rejected my job because of the same danger... at least I am doing it rather than someone else!

                  1 Reply Last reply
                  0
                  • C Chris Maunder

                    And so do I. My general rule of thumb is: if it's a legitimate programming technique, if it can be helpful to others, and if it's not trying to promote illegal activities then I'll consider it. Rootkits are part of life thanks to Sony. The more the developer community knows about them the more likely it is that users will be protected through the efforts of the community to promote awarness and provide helpful utilities to detect and remove them.

                    cheers, Chris Maunder

                    CodeProject.com : C++ MVP

                    L Offline
                    L Offline
                    Lost User
                    wrote on last edited by
                    #9

                    Consider the vast amount of "How do I make my process hidden, how do I make it unkillable" etc posts we get here a week. A week we get at least 3 per each vb.net and c# forum, I'm not going to begin on any of the others. Is the article good? Sure. I saved it and I'm going to read it. twice. Maybe more. Is this technique or knowledge useful to 90-95% of the users here on CP? No, on top of that hell no. Perhaps this might be a prime example of how user levels should be rethought? Making some articles available to silver / gold members only? Yes we can all sit and say 'but it has legitimate uses' and 'thats no reason to remove it', except we all know that there is no real legitimate use for it, and that is a damned good reason to remove it. If you wan't to play that argument, let's post a tutorial or article on how to make your own Trojan or Sub7 under the premise that, you know, if your a sysadmin and you need to monitor peoples systems that's the best route. Or not. But it's a route. Ok, let's just wink at them when we say it's for "monitoring / legitimate" uses. Comments?

                    E 1 Reply Last reply
                    0
                    • L Lost User

                      Consider the vast amount of "How do I make my process hidden, how do I make it unkillable" etc posts we get here a week. A week we get at least 3 per each vb.net and c# forum, I'm not going to begin on any of the others. Is the article good? Sure. I saved it and I'm going to read it. twice. Maybe more. Is this technique or knowledge useful to 90-95% of the users here on CP? No, on top of that hell no. Perhaps this might be a prime example of how user levels should be rethought? Making some articles available to silver / gold members only? Yes we can all sit and say 'but it has legitimate uses' and 'thats no reason to remove it', except we all know that there is no real legitimate use for it, and that is a damned good reason to remove it. If you wan't to play that argument, let's post a tutorial or article on how to make your own Trojan or Sub7 under the premise that, you know, if your a sysadmin and you need to monitor peoples systems that's the best route. Or not. But it's a route. Ok, let's just wink at them when we say it's for "monitoring / legitimate" uses. Comments?

                      E Offline
                      E Offline
                      El Corazon
                      wrote on last edited by
                      #10

                      EliottA wrote:

                      Consider the vast amount of "How do I make my process hidden, how do I make it unkillable" etc posts we get here a week. A week we get at least 3 per each vb.net and c# forum, I'm not going to begin on any of the others.

                      Ironically none of those know how to google, or search at CP....

                      EliottA wrote:

                      useful to 90-95% of the users here on CP?

                      Ironically, the above still holds. :)

                      L 1 Reply Last reply
                      0
                      • E El Corazon

                        EliottA wrote:

                        Consider the vast amount of "How do I make my process hidden, how do I make it unkillable" etc posts we get here a week. A week we get at least 3 per each vb.net and c# forum, I'm not going to begin on any of the others.

                        Ironically none of those know how to google, or search at CP....

                        EliottA wrote:

                        useful to 90-95% of the users here on CP?

                        Ironically, the above still holds. :)

                        L Offline
                        L Offline
                        Lost User
                        wrote on last edited by
                        #11

                        Regardless you always have a user or two who pushes them in the right direction. This article would probably be referenced a bunch of times in those posts. All it would be used for, and I do mean *all* the time would be for malicious users. If any of that 5% of CP users who look at that article have a legitimate use, they would read it for ideas, not follow it and it's direction.

                        El Corazon wrote:

                        EliottA wrote: useful to 90-95% of the users here on CP? Ironically, the above still holds.

                        That 10-5% was extremely generous. There's no gain to having that article on CP, the maliciousness that it will encourage should be enough to allow it's removal.

                        E 1 Reply Last reply
                        0
                        • L Lost User

                          Regardless you always have a user or two who pushes them in the right direction. This article would probably be referenced a bunch of times in those posts. All it would be used for, and I do mean *all* the time would be for malicious users. If any of that 5% of CP users who look at that article have a legitimate use, they would read it for ideas, not follow it and it's direction.

                          El Corazon wrote:

                          EliottA wrote: useful to 90-95% of the users here on CP? Ironically, the above still holds.

                          That 10-5% was extremely generous. There's no gain to having that article on CP, the maliciousness that it will encourage should be enough to allow it's removal.

                          E Offline
                          E Offline
                          El Corazon
                          wrote on last edited by
                          #12

                          EliottA wrote:

                          That 10-5% was extremely generous. There's no gain to having that article on CP, the maliciousness that it will encourage should be enough to allow it's removal.

                          But I could use half the articles at CP, and certainly the existence of Visual Studio to do maliciousness. If we remove EVERYTHING that could in any way be used for harm, you might as well close up shop and remove all programmers from the workforce and lock us up. I understand the reasoning, but I disagree that hiding helps in any way. I mentioned before, pair the article with the one on detecting it. Someone could even write an answer, to the article and link them with the authors' consent, how to detect it. Knowing there is a method of detecting it will handle most of your malicious user base.

                          L 1 Reply Last reply
                          0
                          • E El Corazon

                            EliottA wrote:

                            That 10-5% was extremely generous. There's no gain to having that article on CP, the maliciousness that it will encourage should be enough to allow it's removal.

                            But I could use half the articles at CP, and certainly the existence of Visual Studio to do maliciousness. If we remove EVERYTHING that could in any way be used for harm, you might as well close up shop and remove all programmers from the workforce and lock us up. I understand the reasoning, but I disagree that hiding helps in any way. I mentioned before, pair the article with the one on detecting it. Someone could even write an answer, to the article and link them with the authors' consent, how to detect it. Knowing there is a method of detecting it will handle most of your malicious user base.

                            L Offline
                            L Offline
                            Lost User
                            wrote on last edited by
                            #13

                            Again, half of the articles on CP that allow you to create malicious tools only get you so far. To quote my other post..

                            Elie wrote:

                            The difference is those articles on DLL injection and Hooks can be used to create malicious tools, to an extent. This tool allows complete obfuscation and stealth, making whatever tools created from the articles you mentioned above a hell of a lot more dangerous. I don't mind people making a keylogger in C# using a globalsystemhook, you can find it easily, and kill it with even more ease. This devastates the simplicity of defense against those simple applications. It makes it incredibly harder for the average user to remove the malicious application in question. This isn't about drawing a line, it's about the severity of implication this article has. And I'm sorry, but maybe at best 2% of codeproject will benefit from this article with legitimate use. The rest will draw up a hell of a lot of new malicious tools.

                            So to paraphrase, this article takes it to far.

                            1 Reply Last reply
                            0
                            • P Programm3r

                              I kinda agree with this[^] ... Kind regards,

                              The only programmers that are better those C# programmers are those who code in 1's and 0's :bob:

                              :)Programm3r My Blog: ^_^

                              R Offline
                              R Offline
                              Rage
                              wrote on last edited by
                              #14

                              Mladen Jankovic wrote:

                              Anyway, hiding process is always useful in environment where you have "expert" user(s) who think(s) your VeryImportantServiceThatShouldNotBeKilled.exe is just useless piece of software eating CPU cycles and memory, when in fact it has critical task of keeping the system consistent.

                              Programm3r wrote:

                              I kinda agree with this

                              And I don't. As a SW dev, I am an expert user (I mean compared to the other people here sitting all day behind a computer), and I think I am clever enough to let a service live peacefully even if it eats CPU cycles and so IF someone explains why I should have to do so. Why hiding ? Don't you think it would be better to let people know about things instead of trying to hide them ? And I do think that at least half of the processes that are started when I am logging in qualifies as "useless piece of software crap eating CPU cycles and memory", written by some sysadmin who thinks he is the latest and greatest VB developper on earth and that this includes some kind of merit. Do you find it really surprising that one of the first things I do Transparency will always be better than trying to hide, put restrictions, put access rights, set up huge amount of scripts just to restrict anything.

                              I'm waiting for Windows Feng Shui, where you have to re-arrange your icons in a manner which best enables your application to run. Richard Jones www.immo-brasseurs.com

                              1 Reply Last reply
                              0
                              • M Mike Diack

                                Does anyone else share my worry about the following article recently posted here which basically talks about rootkit type techniques. I have major doubts whether it's wise/responsible to post it here: http://www.codeproject.com/KB/tips/hide-driver.aspx Anyone care to comment: Mike

                                P Offline
                                P Offline
                                PIEBALDconsult
                                wrote on last edited by
                                #15

                                Yes, but someone approved the article so my message is gone. My concern is that I wouldn't want any such thing running on my computer without my knowledge. And I doubt the author would either. I don't think anyone here would. And I see no point in running it on my system intentionally either. On the other hand, if the computer belongs to my employer, then said employer would seem to have a right to run whatever he likes on his computer. Why an employer would want to hide such processes I have no idea, there are likely better paths to reach whatever goal is sought. There should be an article on how to detect and remove such processes. The argument that "the information may be available elsewhere anyway" holds no water with me. Limit the sources of such techniques as best you can. If we stand up for what's right, maybe other such sites will too.

                                1 Reply Last reply
                                0
                                • C Chris Maunder

                                  And so do I. My general rule of thumb is: if it's a legitimate programming technique, if it can be helpful to others, and if it's not trying to promote illegal activities then I'll consider it. Rootkits are part of life thanks to Sony. The more the developer community knows about them the more likely it is that users will be protected through the efforts of the community to promote awarness and provide helpful utilities to detect and remove them.

                                  cheers, Chris Maunder

                                  CodeProject.com : C++ MVP

                                  D Offline
                                  D Offline
                                  Dave Kreskowiak
                                  wrote on last edited by
                                  #16

                                  Chris Maunder wrote:

                                  Rootkits are part of life thanks to Sony.

                                  And a contributing factor for me not buying CD's anymore. :-D

                                  A guide to posting questions on CodeProject[^]
                                  Dave Kreskowiak Microsoft MVP Visual Developer - Visual Basic
                                       2006, 2007, 2008

                                  1 Reply Last reply
                                  0
                                  • M Mike Diack

                                    Does anyone else share my worry about the following article recently posted here which basically talks about rootkit type techniques. I have major doubts whether it's wise/responsible to post it here: http://www.codeproject.com/KB/tips/hide-driver.aspx Anyone care to comment: Mike

                                    M Offline
                                    M Offline
                                    Member 96
                                    wrote on last edited by
                                    #17

                                    We've been over this before many times with other articles in the past and in all cases that I recall people wisely agreed that knowledge in itself is not harmful and it's best to have it out there so people can defend against it / understand it or in some cases put it to good use.


                                    "It's so simple to be wise. Just think of something stupid to say and then don't say it." -Sam Levenson

                                    1 Reply Last reply
                                    0
                                    Reply
                                    • Reply as topic
                                    Log in to reply
                                    • Oldest to Newest
                                    • Newest to Oldest
                                    • Most Votes


                                    • Login

                                    • Don't have an account? Register

                                    • Login or register to search.
                                    • First post
                                      Last post
                                    0
                                    • Categories
                                    • Recent
                                    • Tags
                                    • Popular
                                    • World
                                    • Users
                                    • Groups