It acts as spyware, surreptitiously sending information about you to Sony. Sony rolled out this incredibly invasive copy-protection scheme without ever publicly discussing its details, confident that its profits were worth modifying its customers' computers.And it can't be removed; trying to get rid of it damages Windows. 11, Sony announced it was temporarily of that copy-protection scheme. 14 the company announced it was pulling copy-protected CDs from store shelves and offered to replace customers' infected CDs for free. When its actions were first discovered, Sony offered a "fix" that didn't remove the rootkit, just the cloaking. Some pointed out how this sort of software would degrade the reliability of Windows.As amazing as it might seem, the code seems to include an open-source MP3 encoder in violation of that library's license agreement. It's an epic of class-action lawsuits in California and elsewhere, and the focus of criminal investigations. That's a good question, but -- again -- not the real story.The rootkit has even been found on computers run by the Department of Defense, to the Department of Homeland Security's displeasure. It's yet another situation where Macintosh users can watch, amused (well, mostly) from the sidelines, wondering why anyone still uses Microsoft Windows. The story to pay attention to here is the collusion between big media companies who try to control what we do on our computers and computer-security companies who are supposed to be protecting us.You will only get mail when there is infected files. /bin/bash # Email alert cron job script for Clam AV # Original, unmodified script by: Deven Hillard #( # Modified to show infected and/or removed files # Directories to scan #!It's a David and Goliath story of the tech blogs defeating a mega-corporation. 31, Mark Russinovich broke the story in his blog: Sony BMG Music Entertainment distributed a copy-protection scheme with music CDs that secretly installed a rootkit on computers.we are going to create a cron job for this, you can use your favorite text editor i am going to use nano as it is mine.we are going to open /etc/cron.hourly/manual_clamscan and you can replace houry with daily with you only want the scan to perform once a day or every hour that’s up to your.
At first the company didn't consider XCP malware at all. 11 that Symantec posted a tool to remove the cloaking. 15, it is still wishy-washy about it, explaining that "this rootkit was designed to hide a legitimate application, but it can be used to hide other objects, including malicious software." The only thing that makes this rootkit legitimate is that a multinational corporation put it on your computer, not a criminal organization.And Sysinternals, of course, which hosts Russinovich's blog and brought this to light. But the reason we buy security products from Symantec, Mc Afee and others is to protect us from bad security.I truly believed that even in the biggest and most-corporate security company there are people with hackerish instincts, people who will do the right thing and blow the whistle.What do you think of your antivirus company, the one that didn't notice Sony's rootkit as it infected half a million computers?And this isn't one of those lightning-fast internet worms; this one has been spreading since mid-2004.