Idle Condition (what winlogon.exe doing when we sleep)

Discussion in 'privacy problems' started by mant, Oct 27, 2007.

Thread Status:
Not open for further replies.
  1. mant

    mant Registered Member

    Joined:
    Sep 8, 2006
    Posts:
    73
    Location:
    DIY
    Well, I want to sleep. Sorry for my stupid paranoid question:

    What our PC doing to the out-world when the monitor is blackout on idle?
    especially winlogon.exe, svchost.exe (BITS), Live Messenger etc. even our firewall software.

    I'm worried because that icon (winlogon.exe icon is so abnormal, mysterious, strange, weird for me).

    Some says that Sysinternals Co. into Microsoft Corp. because Autoruns can expossed the secret of winlogon.exe.

    Thanks for advice.
     
    Last edited: Oct 27, 2007
  2. 19monty64

    19monty64 Registered Member

    Joined:
    Apr 10, 2006
    Posts:
    1,302
    Location:
    Nunya, BZ
    If you are worried about services running when not in use, they can be put to "manual" or "disabled" if never used. A good place I use for such is http://www.blackviper.com/index.html and a good idea is to make an image before making any changes, in case you shut down something you need.
     
  3. Mrkvonic

    Mrkvonic Linux Systems Expert

    Joined:
    May 9, 2005
    Posts:
    8,698
    Hello,
    Winlogon.exe icon? I'm not sure what you're talking about.
    As to what my PCs do when they are supposedly idle - nothing.
    You don't need to go to sleep to check it out, let your computer run for half an hour or so, the monitor will probably power off - then move the mouse and observe. Nothing remarkable or different from any other moment. After all, the OS need not be aware of the monitor at all...
    Mrk
     
  4. Jim Verard

    Jim Verard Registered Member

    Joined:
    Jun 5, 2007
    Posts:
    205
    http://www.futurepower.net/microsoft.htm

    According to this old article, is really simple to verify, by using a firewall, how Windows XP tries to do about 16 different connections - not authorized - with Microsoft computers.

    Some connections could be identified, like the one who tells Microsoft what DVDs are being played on your computer (did someone authorize them to know that?), and other who allows even the remote control of machine (I, Robot?); in other cases, however, was not possible to determinate the reason of connection.

    There are only two ways to verify the existence of spies hidden on computers and machines like printers (remember the article "Is your printer spying on you" from EFF — Electronic Frontier Foundation who says every printer has some system who may identify his owner?), the reverse engineer (forbidden on several countries), and the opening of source-code from softwares, which gives you freedom to depurate and recompile them.

    The first alternative is practically impossible. The amount of data and chances of hiding using strong cryptography, for example, plus these kinds of activities, by terms of license or laws, makes no other choice but drop this possibility.

    The second alternative seems to be the only effective way to provide results. Making a choice for free or open-code softwares it's more than an ideological or economic choice - it's a necessity for those who needs security and transparency. :)

    I wonder if there's some sort of investigation not only about what all Windows unauthorized connections can possibly do, but every software available on the market.

    What about firewalls? You can't block their own unauthorized access to the internet while you're connecting. What seems most dangerous is the fact that you prove the existence of hidden source codes on systems placed by government requests or by companies.

    It is possible, we can be sure, that our printers connected by network are not sending informations to other places?

    And even a software far more complex than a printer, like a text editor, Excel, or operational systems can't do the same things?

    How do you know there are no spies hidden on each computer, leaving thin marks to be read by those who know the correct code?

    How you may guarantee a country's supremacy, while they can be sending, without any knowledge, privileged informations to others?

    Regarding the article "Is your printer spying you", it was announced, on October 17, 2005, by the EFF — Electronic Frontier Foundation that many printers bring a hidden system that may identify herself and all papers she ever printed. The result of this research may find here:

    http://www.eff.org/Privacy/printers

    The EFF is one of the most recognized institutions of privacy defense of electronics, working since 1990. It's well know by his articles about privacy protection and civil rights throughout the world. It's the company who supports TOR.

    Resuming what the article says: it was discovered that all pages printed by many printers, from many models, are leaving, using a "stealth camouflage", a code that shows informations about the machine which is being used, like his serial number and the date of your print.

    The list of all printers which this code could be found was available here:

    http://www.eff.org/Privacy/printers/list.php.

    It's a huge list and includes printers from several models like Brother, Epson, HP, Canon, Dell, Lexmark, Xerox, etc.

    EFF's text begins that way: Imagine if all printed pages that you can generate may identify, by using a secret code, what printer and the date of this action, and, potentially, who print that page?

    We should note that all printers that uses ID codes are doing that by using the best possible camouflage. Usually, in order to find that kind of code, you need to increase the image 10 to 60 times and put her on blue light, to find out the yellow dots. That means their original intention wasn't let normal users to find out the code.

    And the worst thing about this: this system was inserted by pression of the american government, according to EFF. Their intention can't be other than identify who's printing texts, even if they are anonymous.

    The issue from common users, and every people, is huge, since many cases can ended badly, how you may identify who is doing one anonymous tip, some sort of guest from a public contest which doesn't requires any kind of ID documents, or even any simple document, in cases that the author wishes not being identified.

    When some printer is bought, his serial number goes to guaranty and order of payment papers, making very simple to identify all documents printed by her.

    The two great concerns of EFF are: a) the confirmation of existence, from hidden agreements between the government and companies in order to promote illegal espionage; b) the fact that there's no law to prevent this kind of action in U.S.

    How we are going to dismiss, based on these allegations, violations of intimacy and private lifes by some sort of insertion of a hidden code on printed pages, without the knowledge of his own users? How we may defend that some ID code placed on papers sent by some sources from his newspaper, which have his own work protected by the Constitution, free from this kind of violation (the most important)?

    Anonymous tips/warnings about drugs, pedophiles and other crimes should be, from systems discovered by EFF, identify all people for police and criminals if they have access to these printed documents.
     
Thread Status:
Not open for further replies.