Democratic Underground Latest Greatest Lobby Journals Search Options Help Login
Google

BBV: Have you EVER seen Microsoft take ALL files off the web?

Printer-friendly format Printer-friendly format
Printer-friendly format Email this thread to a friend
Printer-friendly format Bookmark this thread
This topic is archived.
Home » Discuss » Archives » General Discussion (Through 2005) Donate to DU
 
BevHarris Donating Member (1000+ posts) Send PM | Profile | Ignore Thu Jul-17-03 08:32 PM
Original message
BBV: Have you EVER seen Microsoft take ALL files off the web?
And if you wonder what this has to do with Black Box Voting, we began investigating whether illicit remote access could be gained via building atl.dll files, along with RPC library items. So, of course, we are using those Microsoft libraries heavily as we document our findings. GONE.

In the final stages of a line-by-line road map. What the hell happened?

All Microsoft pages down for MSDN (Microsoft Developers pages) -- all of the MSDN reference pages in connection to ATL files are gone. Just gone. Have you ever seen Microsoft do this? The RPC stuff went down last night and -- was it replaced? Some has red, saying "this is preliminary documentation."

Why are they doing this? Is the remote control bug that big a threat? Are you finding ANY ATL info on the MSDN site?

Just go into MSDN and enter ATL and see if you get ANY command references. No programming examples. No class examples. No nothing. Is it just the ones that match the Diebold code? Feedback please.

Am I nuts?

Bev Harris



Printer Friendly | Permalink |  | Top
caribmon Donating Member (258 posts) Send PM | Profile | Ignore Thu Jul-17-03 08:46 PM
Response to Original message
1. Here's what I got on the search... it's there no?
Search Results from MSDN
for all the words: ATL
Change your Advanced Search


Downloads
Free Microsoft products & technologies, service packs, updates, code samples...
Active Template Library 2.0
The Active Template Library (ATL) is a set of template-based C++ classes that simplify the programming of Component Object Model (COM) objects. The COM support in Visual C++ allows developers to easily create a variety of COM objects, Automation servers, and ActiveX controls.
http://msdn.microsoft.com/visualc/downloads/updates/atl/default.aspx
Service Pack 3 - Readme
Microsoft Visual Studio 6.0 site with product information, technical information, samples and downloads, developer community information and product news and reviews
http://msdn.microsoft.com/vstudio/downloads/updates/sp/vs97/readme.aspx
Service Pack 3 Fixes for Microsoft Visual C++ - Overview
Microsoft Visual Studio 6.0 site with product information, technical information, samples and downloads, developer community information and product news and reviews.
http://msdn.microsoft.com/vstudio/downloads/updates/sp/vs6/sp3/vcfixes.asp
More Downloads results
Printer Friendly | Permalink |  | Top
 
BevHarris Donating Member (1000+ posts) Send PM | Profile | Ignore Thu Jul-17-03 09:36 PM
Response to Reply #1
14. Thanks, this was very helpful
BTW what we are talking about is the technical library info online.

There is info, but whole sections are not there. I'm sure they are updating them.

Bev
Printer Friendly | Permalink |  | Top
 
Wonk Donating Member (1000+ posts) Send PM | Profile | Ignore Thu Jul-17-03 08:47 PM
Response to Original message
2. Tried the wayback machine yet?
Printer Friendly | Permalink |  | Top
 
Caution Donating Member (1000+ posts) Send PM | Profile | Ignore Thu Jul-17-03 08:48 PM
Response to Original message
3. MSDN Universal
Someone out there must have MSDN universal. MSDN sends out dvds or cd's with the entire library on them, so if you are looking for specific information someone out there should be able to find it for you.
Printer Friendly | Permalink |  | Top
 
Walt Starr Donating Member (1000+ posts) Send PM | Profile | Ignore Thu Jul-17-03 08:51 PM
Response to Original message
4. Bev, PM me
I'll send you something right now.
Printer Friendly | Permalink |  | Top
 
BevHarris Donating Member (1000+ posts) Send PM | Profile | Ignore Thu Jul-17-03 09:34 PM
Response to Reply #4
13. Walt - check PM --
Thanks so much

Bev
Printer Friendly | Permalink |  | Top
 
Must_B_Free Donating Member (1000+ posts) Send PM | Profile | Ignore Thu Jul-17-03 08:56 PM
Response to Original message
5. Don't make a fool of yourself Bev!
Trying to link the latest security hole du jour to BBV is a LOOOOOOOONG stretch. And I say that as a friend.
Printer Friendly | Permalink |  | Top
 
w13rd0 Donating Member (1000+ posts) Send PM | Profile | Ignore Thu Jul-17-03 08:59 PM
Response to Reply #5
6. Especially when there are SO many...
...this latest exploit is one in a very long list, but it's meant hours for me as locations scramble to patch holes. Easiest 'best' defense is a non-Microsoft point of access and not letting users be Admins on their machines...
Printer Friendly | Permalink |  | Top
 
Walt Starr Donating Member (1000+ posts) Send PM | Profile | Ignore Thu Jul-17-03 09:03 PM
Response to Reply #6
8. My take on the latest hole has been
to look mostly at customer facing machines to begin with and then go after the workstations because sure as we're talking there will end up being a virus in a few months that takes advantage of the latest epxloits.

Happens every time....
Printer Friendly | Permalink |  | Top
 
Must_B_Free Donating Member (1000+ posts) Send PM | Profile | Ignore Fri Jul-18-03 12:30 AM
Response to Reply #8
21. And let me further qualify my statement
The holes are found fast and fixed fast. There is no long term hole.

So if you were to pursue this angle, look for the many holes that were known and existed at the time of the election.
Printer Friendly | Permalink |  | Top
 
ConsAreLiars Donating Member (1000+ posts) Send PM | Profile | Ignore Fri Jul-18-03 12:53 AM
Response to Reply #21
23. Right
There are two questions here.

First, why use a notoriously insecure OS? Malevolence or incompetence? The downside for the malevolent is that holes close unpredictably. OTOH, there are lots to choose from, especially if a nonstandard componant is added. Beyond Linux, there are lots of OS's designed for machine control that are far less vulnerable - and cheaper.

Other options? I suspect the holes are persistent, and not likely to be closed by CE or NT patches, and rely more on "features" of the Microsoft OS rather than "bugs."



Printer Friendly | Permalink |  | Top
 
BevHarris Donating Member (1000+ posts) Send PM | Profile | Ignore Fri Jul-18-03 01:49 AM
Response to Reply #23
24. Note that some election officials are saying they don't upgrade
That's right. I have to check the source on that, I think it's in the letter from Brit Williams -- I'll hunt around -- they say they do NOT apply Microsoft patches.

The only reason they applied patches in Georgia was that the machines wouldn't work at all. Now, if you are in there rewriting MS files, maybe they won't work too well, and certainly you wouldn't want to be using the patches.


Bev
Printer Friendly | Permalink |  | Top
 
ParanoidPat Donating Member (1000+ posts) Send PM | Profile | Ignore Fri Jul-18-03 02:06 AM
Response to Reply #21
26. "The holes are found fast and fixed fast"????
BWAAHAHAHAHAHAHAH :evilgrin: That's a joke right?

What part of ALL Windows platforms don't you understand? :shrug:
Printer Friendly | Permalink |  | Top
 
w4rma Donating Member (1000+ posts) Send PM | Profile | Ignore Thu Jul-17-03 09:10 PM
Response to Reply #5
9. I'm thinking this is a red-herring, also (n/t)
Printer Friendly | Permalink |  | Top
 
Walt Starr Donating Member (1000+ posts) Send PM | Profile | Ignore Thu Jul-17-03 09:13 PM
Response to Reply #9
10. As somebody who uses MSDN
They are probably replacing files with patched versions or patching the servers that hold the files.

I've seen this time and again when a major security alert comes out.

Microsoft is in the same boat as everybody else. They need to patch their boxes just like everybody else and that means some things become unavailable at times.
Printer Friendly | Permalink |  | Top
 
Capn Sunshine Donating Member (1000+ posts) Send PM | Profile | Ignore Thu Jul-17-03 09:00 PM
Response to Original message
7. Just an excuse ...
But could the monster hole in their OS have something to do with them taking it down prior to script attacks from around the world?

BTW: something weird just happened on my home office machine. This box is hooked up to banking networks all over the place and also several trading desks downtown via proprietary software.
So, I'm on DU literally moments ago, and while typing a response, the page skips right over to Microsoft's Update and critical patch page and asks me to download the patch?

With NO input from me? I mean, sure, I need the updates and they ARE critical, but WTF? :wtf:
Printer Friendly | Permalink |  | Top
 
papau Donating Member (1000+ posts) Send PM | Profile | Ignore Thu Jul-17-03 09:16 PM
Response to Original message
11. I am over my head - but ATL "stuff" still seems to be out there
Printer Friendly | Permalink |  | Top
 
Junkdrawer Donating Member (1000+ posts) Send PM | Profile | Ignore Thu Jul-17-03 09:24 PM
Response to Original message
12. OK. Here's my two questions:
Edited on Thu Jul-17-03 09:25 PM by Junkdrawer
1.) This particular exploit only works if RPC is turned on and port 135 is open. If this was true for either GEMS host machines or AccuTouch units, my first question is WHY? Fredda has told us again and again they were "stand alone machines".

2.) This exploit was discovered by (wait for it...) The Last Stage of Delirium Research Group in Poland. Several other small, Eastern European "security" firms made news a few years back:
http://www.cnn.com/2001/TECH/internet/03/08/hacker.attacks/

<snip>
The FBI says the Eastern European groups, after successfully hacking into a company, then attempt to extort the company offering services to solve the computer vulnerability.

"If the victim company is not cooperative in making payments or hiring the group for their security services, the hackers' correspondence has become more threatening," the FBI announcement said.
<snip>

My next question is: why did this firm reveal this juicy little exploit FOR FREE?
Printer Friendly | Permalink |  | Top
 
Capn Sunshine Donating Member (1000+ posts) Send PM | Profile | Ignore Thu Jul-17-03 09:39 PM
Response to Reply #12
15. To LOOK LIKE ONE OF THE GOOD GUYS?
It's common in the hacker to security Biz ; going straight is where the money's at.

BFEE may have a useful task from them in , oh, about 16 months.....?
:grr:
Printer Friendly | Permalink |  | Top
 
Junkdrawer Donating Member (1000+ posts) Send PM | Profile | Ignore Thu Jul-17-03 09:41 PM
Response to Reply #15
16. Or they HAD a useful task for them about 8 months AGO. n/t
.
Printer Friendly | Permalink |  | Top
 
BevHarris Donating Member (1000+ posts) Send PM | Profile | Ignore Thu Jul-17-03 10:00 PM
Response to Reply #12
19. By the way, according to that article MS has not fully explained
the parameters of the problem. The article says they need to fix some holes first. It indicates there is more to come.

Bev
Printer Friendly | Permalink |  | Top
 
Junkdrawer Donating Member (1000+ posts) Send PM | Profile | Ignore Fri Jul-18-03 07:12 AM
Response to Reply #19
27. *** Something odd about LSD-Planet.... ****
This is their FIRST Microsoft vulnerability posted. All the others involved every OS but Windows...

http://lsd-pl.net/vulnerabilities.html
Printer Friendly | Permalink |  | Top
 
Az Donating Member (1000+ posts) Send PM | Profile | Ignore Thu Jul-17-03 09:42 PM
Response to Original message
17. I really hate to give cause for more tinfoil hats but
Some history. Under the Clinton administration a lawsuit was set in motion against MS. Its eventual outcome was a guilty verdict for MS and a looming split of the company. Lawyers tied the judgement up for a time until * got in office. Then the case went to ground for a while and eventually resurfaced with MS getting a slap on the wrist instead of being torn asunder. The sentence was they had to donate $90million (IIRC) in computers to the public education system.

I wondered at the time what kind of deal was cut to get this slap on the wrist.

An aside. In my opinion it was the initial sentence against MS that initiated the Dot.Com bubble burst. Right after MS got the verdict other tech stocks tumbled. They never recovered.
Printer Friendly | Permalink |  | Top
 
Eloriel Donating Member (1000+ posts) Send PM | Profile | Ignore Fri Jul-18-03 12:24 AM
Response to Reply #17
20. Interesting
One only has to think about their predatory, um, "marketing" to realize these are NOT nice people.

I have no doubt in my mind, whether this is related to BBV or not, that MS has known about this for some time. It's odd for it to be surfacing now, but -- who knows? Things keep getting stranger and stranger these days.

Strange days indeed, momma.

Eloriel
Printer Friendly | Permalink |  | Top
 
Name removed Donating Member (0 posts) Send PM | Profile | Ignore Thu Jul-17-03 09:49 PM
Response to Original message
18. Deleted message
Message removed by moderator. Click here to review the message board rules.
 
Twitch14 Donating Member (117 posts) Send PM | Profile | Ignore Fri Jul-18-03 12:51 AM
Response to Original message
22. Might this have something to do with the issue?
http://story.news.yahoo.com/news?tmpl=story&u=/ap/20030717/ap_on_hi_te/cisco_vulnerability_5

Can't speak for Microsoft, but since I work for one of the "Big Three" long-distance companies, I can definitely tell you that our router folks have been scrambling for the last two days to patch the IOS on EVERY router we have.....

Printer Friendly | Permalink |  | Top
 
BevHarris Donating Member (1000+ posts) Send PM | Profile | Ignore Fri Jul-18-03 01:52 AM
Response to Reply #22
25. The symptoms are different -- the IOS seems to stop traffic
altogether, whereas the Microsoft hole allows remote access to computers.

Bev
Printer Friendly | Permalink |  | Top
 
DU AdBot (1000+ posts) Click to send private message to this author Click to view 
this author's profile Click to add 
this author to your buddy list Click to add 
this author to your Ignore list Mon Apr 29th 2024, 02:52 PM
Response to Original message
Advertisements [?]
 Top

Home » Discuss » Archives » General Discussion (Through 2005) Donate to DU

Powered by DCForum+ Version 1.1 Copyright 1997-2002 DCScripts.com
Software has been extensively modified by the DU administrators


Important Notices: By participating on this discussion board, visitors agree to abide by the rules outlined on our Rules page. Messages posted on the Democratic Underground Discussion Forums are the opinions of the individuals who post them, and do not necessarily represent the opinions of Democratic Underground, LLC.

Home  |  Discussion Forums  |  Journals |  Store  |  Donate

About DU  |  Contact Us  |  Privacy Policy

Got a message for Democratic Underground? Click here to send us a message.

© 2001 - 2011 Democratic Underground, LLC