Monday, February 16, 2009

S - Syndrome and Sysinternals Conspiracy

The S Virus how people call it brings many minds in turmoil. But the barrels overflow is a rude censorship at sysinternals forum. If you tell anything about S they cut off and erase all informations. So it must have something to do with a ms secret. The S is high likely nothing else then a experiment of microsoft and nsa. This experiment takes place for maybe 20-25 years but came in mind specially for the last 2,3,4,5,6,7,8 years to the world (especially since the publication of Windows XP) due to several software errors, emotional outbreaks and inattentions from ms members. The S was implemented in many tools and software of ms.
Anyone remembered Messenger? Once microsoft used to store the user information at HKEY_CURRENT_USER\S. Then there occured a error in file system and you could see many S directories in System32 folder with a tool called rkdetector. It was summarized altogether as Revelation of The Old Rootkit. A 45 page long topic that was erased by forum admins to fog the truth. Then there is a appreciated tool called procexp it generates under unusual conditions a S driver which can be only seen from cd rom windows or with special forensic tools. Are we all in Cyberspace nothing else then part of a devilish matrix experiment sponsored by ms? What are you thinking?

Check also: http://subversionhack.blogspot.com it manifests the impression.

Thursday, October 2, 2008

Power Supply

ASI.Eye also heavily affects the power supply, actually it is unknown to which degree but there is a high probability that it is able to destroy the power supply. The latest trick of Eye that I observed is a 5 second cycle sleep and wake up game of the power supply unit. You set your system into sleep mode then some times later you wake it up but your system remains in a endless sleep and wake up loop at cost to the health of your power supply. You have to pay attention their favorite loop time is 5 seconds you can count that in many situation when they try to manipulate computer systems.

Thursday, September 18, 2008

More information about A.S.I.Eye

A.S.I.Eye must use a kind of automatic information management system otherwise it wouldn´t be able to control possibly each and every pc system that connects to the internet. There is one guy who seems to be the chief they simply call him BOSS (original content of network sniff):
There exists several other typical catchwords everyone might be able to identify them with ease, such as following (the most significant designations, catchwords and names over the past three months):This should prove the existence of all seeing internet eye. Take a closer look this happens to most people everyday when they surf the internet as usual. Most machines will likely be part of a stealth information bot collection system and part of a vicious secret chat community.

Sunday, August 17, 2008

Core Problem: static http/s tunneling

One of the core problem that allows A.S.E to do his job quite effective is what I call static http/s tunneling. You can´t evade a primary static tunnel system like that because you need a browser to surf the internet. IMHO, there are actually not many possibilities to prevent static http/s tunneling. ALF (application level firewall) was a try worth but couldn´t prevent the information flow of A.S.E for long. Apparently it used kind of http exploit or http request smuggling to circumvent the proxy wall, further disadvantages might be slow down of general internet activities and errors of several services. What about SPI (stateful packet inspection) mostly found in nowadays routers, blocks outside potential harmful traffic and ddos but is vulnerable against http tunnels. If http traffic adapts to standards and is encrypted and embedded in http, firewalls remain powerless. This can be considered as one of the key vulnerabilities of the internet. All bypassing Eye could use hidden tunnel streams to evade all security setups.

Ethernet and Router as gates?

The question is can we explain this phenomenon with the latest threats like direct attack of network and ethernet cards and manipulation of routers? Probably at least partially. One thing that never should come out of focus is the direct cpu or microcode manipulation this seems to be very close to the attack of the bios and soon also to efi. Several people reported and even proved that such occurances are more then real. Also more reports talk about special prepared udp packets that virtually replace the usual executable malware which means while connecting to internet you could be directly affected without doing much wrong. That means the problem exists not behind the computer the mistake is inside your computer in combination with the vulnerable and unsecure structure of the internet.

It is crucial to create awareness so that many people don´t waste their time trying to hit the evil on the wrong side. Visualize about a Zombie (Exploit, Virus) that always stands up no matter how hard you hit him (security tools) he will always come back. It won´t help if you bash him (regular updates, system hardening, backups) it also won´t help if you start using haphazardly weapons (antivirus, antispy..) you may blast him away a part of his body but he will stand up again and again. You must analyze how it is constituted to get a possibility to punch evil on the right side.

Sunday, August 10, 2008

The ultimate tunnel?



I made some experiments trying to see how the assumed all seeing and all bypassing internet eye would react on restrictions. I started to install top of the notch firewall, using latest updates, 64 bit, windows vista, restriction/block of java, javascript, images, animations, referrers, cookies, ads, frames, surfing to google, in short I blocked quasi all.
Usually one should expect not much traffic at all and repetitive traffic but what happens? We see variable byte traffic can we now conclude a all bypassing tunnel?
Check yourself what do you think?

Thursday, August 7, 2008

Why no full encryption?

The first question you may ask is why they do not fully encrypt their transmission channels? Why do they let us take a look inside their All Seeing Eye?

This question can´t be answered directly but I can give you hints and impulses for their reasons. One cause could be the paradigm of nature they simply copy the system of nature because they assume that nothing can be more perfect then that what nature has done. They took a look into DNA and RNA and simply thought it could be a good idea to use it as paradigm. The All Seeing Internet Eye wants to be the root of the root and what is the root of the root? The genomic structure especially Deoxyribonucleic Acid the repository of the genetic information. What we see if we take a fast look into it? We see two things coding and decoding, encryption and decryption.
Expressed regions and intervening regions and what is the catalytic effect to create a encryption that is the new buzzword of it security scene: Splicing. Unencrypted information (intron) and encrypted material (exon), catalyzer (splicing). I am no bio scientist I only compared some parts of biology with things that happens when taking a look into net packets and saw a common denominator. Remember the question? Now you have one possible idea. Think about something that wants to dominate everything on this planet it has to go to the deepest root of being and change its structure to fit the needs of this hidden thing. If we would carry on this thought The All Seeing Internet Eye could be invented for only one aim: World Domination or World Control.