Ads
related to: sony rootkit removal toolavast.com has been visited by 100K+ users in the past month
antivirussoftwareguide.com has been visited by 100K+ users in the past month
avg.com has been visited by 100K+ users in the past month
Search results
Results From The WOW.Com Content Network
Sony BMG quickly released software to remove the rootkit component of XCP from affected Microsoft Windows computers, [15] but after Russinovich analyzed the utility, he reported in his blog that it only exacerbated the security problems and raised further concerns about privacy. [16]
XCP.Sony.Rootkit loads a system filter driver which intercepts all calls for process, directory or registry listings, even those unrelated to the Sony BMG application. This rootkit driver modifies what information is visible to the operating system in order to cloak the Sony BMG software. This is commonly referred to as rootkit technology ...
The following compact discs, sold by Sony BMG, were shipped with the computer software known as Extended Copy Protection (XCP). [1] As a result, any Microsoft Windows computer that has been used to play these CDs is likely to have had XCP installed. This can cause a number of serious security problems.
A rootkit may detect the presence of such a difference-based scanner or virtual machine (the latter being commonly used to perform forensic analysis), and adjust its behaviour so that no differences can be detected. Difference-based detection was used by Russinovich's RootkitRevealer tool to find the Sony DRM rootkit. [1]
SecuROM 7.x was the first version to include the SecuROM Removal Tool, which is intended to help users remove SecuROM after the software with which it was installed has been removed. [5] Most titles now also include a revoke tool to deactivate the license; revoking all licenses would restore the original activation limit. [6]
RootkitRevealer is a proprietary freeware tool for rootkit detection on Microsoft Windows by Bryce Cogswell and Mark Russinovich. It runs on Windows XP and Windows Server 2003 (32-bit-versions only). Its output lists Windows Registry and file system API discrepancies that may indicate the presence of a rootkit.
In 2005, Russinovich discovered the Sony rootkit in Sony DRM products, whose function was to prevent users from copying their media. [6] In January 2006, Russinovich discovered a rootkit in Norton SystemWorks by Symantec. Symantec immediately removed the rootkit.
On November 15, 2005, Felten and J. Alex Halderman showed that Sony's method for removing XCP copy protection software from the computer makes it more vulnerable to attack, as it essentially installed a rootkit, in the form of an Active X control used by the uninstaller, and left it on the user's machine and set so as to allow any web page ...