On Tue, Apr 23, 2013 at 2:53 PM, James Rankin <[email protected]> wrote:
> I think the BIOS piece, if Activated, puts the agent back onto it.

  Yah, that's scary enough.  I mean, sure, if someone else can control
the hardware, in theory they can do anything, but think about the
implications.  Is there some kind of hook in Windows that lets the
BIOS run arbitrary code?  If so, that's kind of spooky.  Or are they
using a higher privilege level to inject code directly into the
kernel?  If so, what happens when a kernel update comes out?

  Or does it depend on the PC vendor's "special" Windows disc?  In
which case, it's easily defeated by using generic media.

> How this works cross-platform is beyond me though

  I went there first because it's an extreme case.  :)

-- Ben

~ Finally, powerful endpoint security that ISN'T a resource hog! ~
~ <http://www.sunbeltsoftware.com/Business/VIPRE-Enterprise/>  ~

---
To manage subscriptions click here: 
http://lyris.sunbelt-software.com/read/my_forums/
or send an email to [email protected]
with the body: unsubscribe ntsysadmin

Reply via email to