FBI on the Windows Source Code Theft 504
Chris Gondek writes "There are various articles about the Stolen Windows Source Code, but today it is confirmed that an FBI task force hunted for a cyber-criminal who posted on the internet source code for Windows which says 'I can confirm that the Northwest Cybercrime Task Force was investigating, FBI spokeswoman Robbie Burroughs said. The posted program is part of the source codes, or blueprints, for Windows 2000 and Windows NT 4.0, according to the company.' "
Re:Simple question (Score:5, Informative)
Only the source torrent, people who download from it are only anonymous if there are no logs kept, and even then, due to the way that it works, I doubt that it could be possible.
Correct me if I'm wrong there...
NeoThermic
well... (Score:5, Informative)
Re:Simple question (Score:5, Informative)
Key: CHK@JANQuMJMYGNWPVWyfwBwyXPsgBwPAwI,LeWue01uUKoEM
Bytes: 213748207
CHK@JANQuMJMYGNWPVWyfwBwyXPsgBwPAwI,LeWue01uUKo
Of course if you don't have Freenet yet (wtf are you waiting for?) you'd do good to visit http://www.freenetproject.org [freenetproject.org].
Re:Blueprints? (Score:3, Informative)
"These instructions have to be converted from the programming language in which they are written, like C or Java or C++ into a binary equivalent that the computer can understand, but that process is not analogous to building a house from blueprints - it's more like translating a book from one language into another."
Idiot world (Score:1, Informative)
Why does a magazine called "PC World" write idioticisms like
Download it on Freenet...Anonymously! (Score:5, Informative)
File: windows_2000_source_code.zip
Key: CHK@JANQuMJMYGNWPVWyfwBwyXPsgBwPAwI,LeWue01uUKoEM
Bytes: 213748207
CHK@JANQuMJMYGNWPVWyfwBwyXPsgBwPAwI,LeWue01uUKo
Of course if you don't have Freenet yet (what are you waiting for?) you'd do good to visit http://www.freenetproject.org [freenetproject.org].
Yes, you can find DOS 6 source! (Score:3, Informative)
Re:Interesting note... (Score:5, Informative)
Torrent for W2K and NT4 source (Score:3, Informative)
http://torrent.spyderlake.com/download.php?i
W2K (208 Mb)
http://torrent.spyderlake.com/download.php?i
Re:Illegal to download? (Score:5, Informative)
Re:Illegal to download? (Score:5, Informative)
If ever someone busts your ass for anything, whether it's an overdue library book or murder, feel free to knock on my door asking what I feel is right or wrong but don't expect the law to agree with everything I say.
Rightly or wrongly, as I said before, ignorance is often no defence at all in the eyes of the law. If that offends you, well, I don't know what to suggest because that's pretty much standard practice everywhere on the planet.
The Secret Coca Cola Formula Can Be Found Here: (Score:3, Informative)
Re:Scapegoat (Score:5, Informative)
According to BetaNews, Mainsoft is to blame.... (Score:5, Informative)
Re:According to BetaNews, Mainsoft is to blame.... (Score:5, Informative)
We will cooperate fully with Microsoft and all authorities in their investigation.
We are unable to issue any further statement or answer questions until we have more information.
From Mike Gullard, Chairman of the Board, Mainsoft Corporation"
Re:Illegal to download? (Score:4, Informative)
Downloading from the net is not illegal. Putting stuff on the net you don't have rights to is - but the downloaders aren't doing that. They are just accessing publicly available information.
Re:That particular case would hold up (Score:2, Informative)
My pet hate... (Score:4, Informative)
Re:Scapegoat (Score:3, Informative)
Re:I don't know if this is true (Score:5, Informative)
Re:Help your local law enforcement team (Score:3, Informative)
Re:The Immaculate Transmission (Score:2, Informative)
Re:Windows longhorn sourcecodes out there, too (Score:2, Informative)
Can be verified by a glimpse at the partially downloaded files: every part-file just consists of text lines saying this:
"Rar!Fake!Hahaha!"
A zillion times of course. So don't waste your time & bandwidth for that. If in doubt, download the first parts to see for yourselves...
Re:Looking at the src (Score:2, Informative)
Press Release (Score:2, Informative)
Re:Precompiled code (Score:2, Informative)
while(lax_us_laws && sheep_like_users)
{
find_devices();
find_software();
secretly_report_back_to_redmond();
}
mov 0AH, 0x085a
inc 0AH
sub 0B
jmp 0x05a
01001110000010101000010101110101011010101010
So no, they didn't get pre-compiled code (pre-compiled code is assembly language software like the middle step above) so that is a lie (but like so many other things, journalists get very important technicals wrong, publish, and the clueless repeat what they read (and we all suffer).
Blueprint not a bad metaphor (Score:3, Informative)
MUTE 0.2.2 (Score:1, Informative)
Simple, anonymous, encrypted. I noticed the MS source code was available on the MUTE network yesterday.
Re:well... (faking ip address) (Score:1, Informative)
Actually you can fake you IP partially (at least in ethernet). Just pick IP belonging to same local subnet so that trafic gets routed to your subnet and then grab packets with that IP.
In practice, it's good idea to wait till some machine is down and then use temporarily free IP. This only works 100% if you know exactly when machine/IP will be down (so it cannot see trafic you generated) and if you can change your card's ethernet address to be also correct. One could also scan constantly to check if rightful owner of IP has become online again but in ethernet everyone can see the scanning.
Re:The Immaculate Transmission (Score:3, Informative)
Re:Windows AQ (Score:1, Informative)
Re:Windows AQ (Score:3, Informative)
Insert whatever code you want before and after handoff to the old
It still comes down to the same thing. If you are running a binary system that's not signed with a trusted key, you are vulnerable. Period. This is as true with Linux as it is Windows. Access to source doesn't change anything.
Besides, if you are running Windows, some terrorist plot to subvert your machine is the least of your problems. Trying to not get infected, 0wn3d, and bluescreened twice a day is a much larger concern. If you are running Windows, you clearly don't care about security anyway.
Re:What about the source files with no copyright (Score:2, Informative)
No, that isn't true. Under U.S. copyright law you own the copyright to something the minute it is created. If I write a song and never register it with the copyright office I still own the copyright and I can still sue over the unauthorized use of my work. Not placing a copyright notice makes it *difficult* to prove ownership but it doesn't make it impossible and it certainly doesn't mean it's now in the public domain.
Additionally, do you really think that Microsoft (or any company in a similar situation) wouldn't simply go in and *add* the copyright notices to their source? It's a trivial matter and who do you think law enforcement will believe: a multi-billion dollar company who says "it was there all the time" or somebody who stole their code and is trying to save themselves from an IP suit? One of the most important things anyone in this situation can do is NOT to underestimate Microsoft. Multimillion dollar companies have done so in the past and many of them are no longer around. How do you think the average hacker will fair?
Re:Stupid article (Score:2, Informative)
And he messed up the plurals again. It's source code now, but it "were public"...
The writer's use of "were" is correct here. It is the past subjunctive form of "to be", used mostly in "if" clauses and to express hypotheticals.
See The American Heritage(r) Book of English Usage [bartleby.com] for details.