Democratic Underground Latest Greatest Lobby Journals Search Options Help Login
Google

Data mining? Does anyone work in a corporation with "Shadow" technology?

Printer-friendly format Printer-friendly format
Printer-friendly format Email this thread to a friend
Printer-friendly format Bookmark this thread
This topic is archived.
Home » Discuss » Archives » General Discussion: Presidential (Through Nov 2009) Donate to DU
 
kentuck Donating Member (1000+ posts) Send PM | Profile | Ignore Mon Feb-20-06 12:41 PM
Original message
Data mining? Does anyone work in a corporation with "Shadow" technology?
There is much discussion about the NSC and "data maining" ...They look for keywords and then intercept the message or email. But are they really that backward? I presently work in a place where they have the technology to tap right into your computer and watch your mouse movements. They see everything except your hand on the mouse. They can see how you move the mouse and what you click on. They can even record it and watch it later to see what you are clicking on your computer. After all, that is company property - it is not your personal computer.

But, that said, why should we think that NSC and intelligence does not have the same technology tenfold? All they need is your IP address and then they can spy on you anytime they want - not just your email but all your computer movements...even this "Screw them!" that I just printed. Anybody else work with this type of technology?
Printer Friendly | Permalink |  | Top
wtmusic Donating Member (1000+ posts) Send PM | Profile | Ignore Mon Feb-20-06 12:45 PM
Response to Original message
1. Just because they have your IP
Edited on Mon Feb-20-06 12:45 PM by wtmusic
doesn't mean they can "spy on you anytime they want'.

Just doesn't work that way. If you have software installed on your computer which transmits your mouse movements, it's a different story.
Printer Friendly | Permalink |  | Top
 
kentuck Donating Member (1000+ posts) Send PM | Profile | Ignore Mon Feb-20-06 12:50 PM
Response to Reply #1
2. Isn't that the "remote control" program on Microsoft ?
If you search C:/ drive for "shadow.*" it pulls up such a program? What does it do?
Printer Friendly | Permalink |  | Top
 
wtmusic Donating Member (1000+ posts) Send PM | Profile | Ignore Mon Feb-20-06 01:01 PM
Response to Reply #2
4. Good question
Personally I don't trust MS products and thus don't use them.

Just an example--when you install Windows Media Player on a Mac it's not a straight plug-in type download. You download software first, which contacts the MS website and then downloads the player.

What's the harm? The software you downloaded could easily scan your entire hard disk and transmit data back to MS. It bypasses all of the security features implemented in browsers to prevent hackers from getting access to your files. A program like this could install just the type of program you're talking about--one which transmits every mouse movement over the web.
Printer Friendly | Permalink |  | Top
 
PetraPooh Donating Member (1000+ posts) Send PM | Profile | Ignore Mon Feb-20-06 01:03 PM
Response to Reply #2
5. Wow, mine has two Windows programs named shadow,
I have a great restore program, so I just renamed both of them (which should essentially make them unusable without losing them). We will see if that screws anything up in the near future.
Printer Friendly | Permalink |  | Top
 
Pavulon Donating Member (1000+ posts) Send PM | Profile | Ignore Mon Feb-20-06 01:11 PM
Response to Reply #2
8. XP and 2k3 server
can do SHADOW copies of your hard drive. Like point in time backups. Volume shadow copies.
SHADOW is also a terminal services term used to by administrators to assist users by sharing a terminal sessions (like remote control)

If you are curious as to what a file does you should google it first.
Printer Friendly | Permalink |  | Top
 
PetraPooh Donating Member (1000+ posts) Send PM | Profile | Ignore Mon Feb-20-06 01:50 PM
Response to Reply #8
11. I tried the googling but
I found that as with all MS programs the only thing of interest is that it says NOT TO MESS with this program. So I got offline and ran a couple of tests.

First since I have a third party restore program, it works even when the files are renamed.

Second, unfortunately, Windows recreates the file upon reboot. So, I think I am going to try putting a blank file name shadow.exe in there and see what happens.

Last the file description in properties, specifically says remote operation software. . .

I will post again once I find out how a blank file responds to normal things like rebooting, restoring, and getting on line.. . . . . bbl
Printer Friendly | Permalink |  | Top
 
Pavulon Donating Member (1000+ posts) Send PM | Profile | Ignore Mon Feb-20-06 01:58 PM
Response to Reply #11
12. What is the path
to this file? There is a remote control tool that uses this name. However Microsoft also uses this on xp and 2k3 server to allow legit remote access. Windows will put protected files back if you delete them, however a sophisticated hack can do the same.

c:\windows\?

This is the legit path.

C:\WINDOWS\SYSTEM32\DLLCACHE\SHADOW.EXE

careful using a blank exe, the os could try to execute it and cause tha machine to crash.
Printer Friendly | Permalink |  | Top
 
PetraPooh Donating Member (1000+ posts) Send PM | Profile | Ignore Mon Feb-20-06 03:22 PM
Response to Reply #12
13. You're right, it just keeps making a new file
The paths are
C:\Windows\system32\shadow.exe

and C:\Windows\system32\dllcache\shadow.exe

Now upon more diligent googling I found a site http://www.spywaredb.com/remove-winshadow/

It has two options, one a spyware program that will remove it, and a long format as to how to remove it that seems a bit "scary" to say the least.

But its intro also lets you know how scary having shadow on your puter is in the first place and how easily someone can be monitoring you.

snip
WinShadow is one of Commercial RAT spywares.
Finding it on your computer means that your computer is infected with Commercial RAT and crucial data could be endangered or even lost.
WinShadow description by publisher:
Vendor: ´allows one or more client computers to connect to a host computer, creating a remote control session over the Internet or private WAN/LAN network. The client session is a window displaying the desktop of the host, & via it, the client can access any file & run programs on the host computer. The winShadow Server Manager runs as an icon in the System Tray. Using the winShadow Server Manager, you can: º ´Quick Connect´ to a host. º Run winShadow Neighborhood. º Invite a remote computer to become a client for this computer (useful if this computer is behind a firewall). º Stop & start the winShadow Server. º Configure the host properties for this computer.´
>> Delete WinShadow automatically - Download SpySweeper
snip

So I decided that before I do anything else I would try to locate it in system configuration, wherein SERVICES I find two shadow services being run. . . so I unclicked those two and I am debating on whether to try the long hand self delete contained at the above link or the SpySweeper free download.
Printer Friendly | Permalink |  | Top
 
PetraPooh Donating Member (1000+ posts) Send PM | Profile | Ignore Mon Feb-20-06 12:57 PM
Response to Reply #1
3. Since we're on the topic, I'm curious about ZoneAlarm and if
it is capable of stopping the "intrusions" by outside sources. I have had Zone Alarm for many years now. It seems to block all incoming inquiries, because once I get offline the list of blocked incoming queries is HUGE. Particularly if I use the "Engage Internet Lock" option. This option locks everything that is PASS Lock approved. For example, Firefox is passlock approved in my settings, so long as I am open to DU, fine, I can browe, chat, and reply. . . .BUT I cannot go to any other domain until I release the Lock. Granted it is a bit of a hassle to lock and unlock as I go from site to site, but generally I only frequent a few sites anyway, so for me it seems worthy.

However I have no way of knowing if others are really being locked out, or is it only certain types of inquiries relating to my bios and "sensitive" material. I would be interested in running a test with someone who has access of these shadow programs to see if you can in fact "see" everything I am doing online while zone alarm is supposedly locking everything out.
Printer Friendly | Permalink |  | Top
 
Pavulon Donating Member (1000+ posts) Send PM | Profile | Ignore Mon Feb-20-06 01:07 PM
Response to Reply #3
7. It will stop
many things. Especially bs viruses and hacks. But like your home if someone really wants to get in they will. If they are good you will never know they were there.
Printer Friendly | Permalink |  | Top
 
Pavulon Donating Member (1000+ posts) Send PM | Profile | Ignore Mon Feb-20-06 01:06 PM
Response to Original message
6. Technology
Is available to companies to monitor all aspects of use of their property (computers). Terminal monitoring, content monitoring, email monitoring,etc are all available.

Most companies monitor for things that will get them sued or for people who blatantly fuck off on the job. Some companies do nothing.

Yes they can but there are many more citizens than people who can monitor the data.
Printer Friendly | Permalink |  | Top
 
flamin lib Donating Member (1000+ posts) Send PM | Profile | Ignore Mon Feb-20-06 01:17 PM
Response to Original message
9. Don't know about the mouse movements, but my wife
received an automated notice that a notation was entered into her personnel file regarding inappropriate language in an email. She had exchanged email with our daughter in which she jokingly said she was going to sell our grand son to the highest bidder. Wife returned with "If I don't get last look I'll kill you!"

The software picked up the sentence as a threat and automatically placed the notation. Wife had to go to HR and show them the entire exchange to get it expunged.
Printer Friendly | Permalink |  | Top
 
wtmusic Donating Member (1000+ posts) Send PM | Profile | Ignore Mon Feb-20-06 01:34 PM
Response to Reply #9
10. Email sent from work? nt
Printer Friendly | Permalink |  | Top
 
DU AdBot (1000+ posts) Click to send private message to this author Click to view 
this author's profile Click to add 
this author to your buddy list Click to add 
this author to your Ignore list Fri Apr 26th 2024, 12:21 AM
Response to Original message
Advertisements [?]
 Top

Home » Discuss » Archives » General Discussion: Presidential (Through Nov 2009) Donate to DU

Powered by DCForum+ Version 1.1 Copyright 1997-2002 DCScripts.com
Software has been extensively modified by the DU administrators


Important Notices: By participating on this discussion board, visitors agree to abide by the rules outlined on our Rules page. Messages posted on the Democratic Underground Discussion Forums are the opinions of the individuals who post them, and do not necessarily represent the opinions of Democratic Underground, LLC.

Home  |  Discussion Forums  |  Journals |  Store  |  Donate

About DU  |  Contact Us  |  Privacy Policy

Got a message for Democratic Underground? Click here to send us a message.

© 2001 - 2011 Democratic Underground, LLC