![]() |
SUBSIM: The Web's #1 resource for all submarine & naval simulations since 1997 |
![]() |
#46 | |
Rear Admiral
![]() Join Date: Apr 2005
Posts: 11,866
Downloads: 0
Uploads: 0
|
![]() Quote:
-S |
|
![]() |
![]() |
![]() |
#47 | ||
Electrician's Mate
![]() Join Date: May 2005
Location: U.S.A.
Posts: 137
Downloads: 0
Uploads: 0
|
![]() Quote:
You have to understand that Ubisoft, although many of you hate them, has no understanding of Starforce. Yes they should be held accountable in some regards for messing with our machines. But truthfully they have been in the dark as much as all of us. |
||
![]() |
![]() |
![]() |
#48 | |
Silent Hunter
![]() Join Date: Mar 2005
Location: Germany
Posts: 3,668
Downloads: 4
Uploads: 0
|
![]() Quote:
|
|
![]() |
![]() |
![]() |
#49 |
Ocean Warrior
![]() Join Date: May 2005
Location: New Castle of Delaware
Posts: 3,231
Downloads: 658
Uploads: 0
|
![]()
Soulcommander is not making up definitions! They are coming from someone else that is using the terms. Whether they make them up or not, is NOT important. It's the term they use, pure and simple.
__________________
Gary No Borders, No Language, No Culture =s No Country I'm a Deplorable, and proud of it. |
![]() |
![]() |
![]() |
#50 | |
Silent Hunter
![]() Join Date: Mar 2005
Location: Germany
Posts: 3,668
Downloads: 4
Uploads: 0
|
![]() Quote:
|
|
![]() |
![]() |
![]() |
#51 | ||
Rear Admiral
![]() Join Date: Apr 2005
Posts: 11,866
Downloads: 0
Uploads: 0
|
![]() Quote:
|
||
![]() |
![]() |
![]() |
#52 |
Silent Hunter
![]() Join Date: Mar 2005
Location: Germany
Posts: 3,668
Downloads: 4
Uploads: 0
|
![]()
Whose (stupid) idea was it then?
|
![]() |
![]() |
![]() |
#53 | |
Electrician's Mate
![]() Join Date: May 2005
Location: U.S.A.
Posts: 137
Downloads: 0
Uploads: 0
|
![]() Quote:
Speaking of Press!! BREAKING NEWS!!!!!!!!!!!!!!!!! Toms Hardware article will be released Saturday February 11th! Thats tomorrow guys. |
|
![]() |
![]() |
![]() |
#54 |
Ocean Warrior
![]() Join Date: May 2005
Location: New Castle of Delaware
Posts: 3,231
Downloads: 658
Uploads: 0
|
![]()
It seems "stupid" is in the eye of the beholder only.
__________________
Gary No Borders, No Language, No Culture =s No Country I'm a Deplorable, and proud of it. |
![]() |
![]() |
![]() |
#55 |
Silent Hunter
![]() Join Date: Mar 2005
Location: Germany
Posts: 3,668
Downloads: 4
Uploads: 0
|
![]()
Right. So whose idea was it? Just curious.
|
![]() |
![]() |
![]() |
#56 |
Ocean Warrior
![]() Join Date: May 2005
Location: New Castle of Delaware
Posts: 3,231
Downloads: 658
Uploads: 0
|
![]()
More than likely... it's none of you business. Leave it at that.
__________________
Gary No Borders, No Language, No Culture =s No Country I'm a Deplorable, and proud of it. |
![]() |
![]() |
![]() |
#57 | |
Rear Admiral
![]() Join Date: Apr 2005
Posts: 11,866
Downloads: 0
Uploads: 0
|
![]() Quote:
The first people to call it a rootkit on this site were the game developers guys that are also boycotting them (And who give an excellent description of the problems of SF) - you can find that on this forum somewhere. It was about a few weeks back where they give a clear definition on the subject. NG? Forget. Do a search - if I find it again, I'll post it. Sony recently got in trouble for using a rootkit in a similar manner. Official description: Functions of a rootkit A rootkit typically hides logins, processes, files, and logs and may include software to intercept data from terminals, network connections, and the keyboard. In many instances, rootkits are counted as trojan horses. Uses of rootkits A rootkit is often used to hide utilities used to abuse a compromised system. These often include so-called "backdoors" to help the attacker subsequently access the system more easily. For example, the rootkit may hide an application that spawns a shell when the attacker connects to a particular network port on the system. Kernel rootkits may include similar functionality. A backdoor may also allow processes started by a non-privileged user to execute functions normally reserved for the superuser. All sorts of other tools useful for abuse can be hidden using rootkits. This includes tools for further attacks against computer systems the compromised system communicates with such as sniffers and keyloggers. A common abuse is to use a compromised computer as a staging ground for further abuse. This is often done to make the abuse appear to originate from the compromised system or network instead of the attacker. Tools for this can include denial-of-service attack tools, tools to relay chat sessions, and e-mail spam attacks. A recent example where a rootkit was used on commercial CDs for digital rights management purposes is the 2005 Sony CD copy protection controversy. Types of rootkits Basic types Rootkits come in two different flavours, kernel and application level kits. Kernel level rootkits add additional code and/or replace a portion of kernel code with modified code to help hide a backdoor on a computer system. This is often accomplished by adding new code to the kernel via a device driver or loadable module, such as Loadable Kernel Modules in Linux or device drivers in Microsoft Windows. Kernel rootkits commonly patch, hook, or replace system calls with versions that hide information about the attacker. Application level rootkits may replace regular application binaries with trojanized fakes, or they may modify the behavior of existing applications using hooks, patches, injected code, or other means. Kernel rootkits can be especially dangerous because they can be difficult to detect without appropriate software. Examples Rootkit.com hosts examples of rootkits too many to list individually here. Ambient's Rootkit (ARK) for Linux Hacker Defender Sony BMG's use of First 4 Internet XCP (Extended Copy Protection) DRM [1] |
|
![]() |
![]() |
![]() |
#58 |
Seaman
![]() Join Date: Apr 2005
Location: NNW
Posts: 42
Downloads: 0
Uploads: 0
|
![]()
So how many of you reading this thread are still playing SHIII? Has everyone given it up to protect their systems?
I'm sitting here with the SHIII box in front of me wondering if I should install it on the new system I just built. My heart says yes, but my stomach says no. I'm tempted to install just to see what happens. |
![]() |
![]() |
![]() |
#59 | |
Electrician's Mate
![]() Join Date: May 2005
Location: U.S.A.
Posts: 137
Downloads: 0
Uploads: 0
|
![]() Quote:
Get all the posts others have said and make your choice. Personally????? If your asking me... I say Never again on my computer! NEVER! I have seen Starforce act unprofessional and insulting towards the gaming community. I have seen it all. Even if every game that comes out in the future is laced with Starforce it will never be on my computer ever again unless it gets there by accident! But you have to make your own choice my friend. |
|
![]() |
![]() |
![]() |
#60 | |
Rear Admiral
![]() Join Date: Apr 2005
Posts: 11,866
Downloads: 0
Uploads: 0
|
![]() Quote:
-S |
|
![]() |
![]() |
![]() |
|
|