On Tue, Apr 23, 2013 at 2:53 PM, James Rankin <[email protected]> wrote: > I think the BIOS piece, if Activated, puts the agent back onto it.
Yah, that's scary enough. I mean, sure, if someone else can control the hardware, in theory they can do anything, but think about the implications. Is there some kind of hook in Windows that lets the BIOS run arbitrary code? If so, that's kind of spooky. Or are they using a higher privilege level to inject code directly into the kernel? If so, what happens when a kernel update comes out? Or does it depend on the PC vendor's "special" Windows disc? In which case, it's easily defeated by using generic media. > How this works cross-platform is beyond me though I went there first because it's an extreme case. :) -- Ben ~ Finally, powerful endpoint security that ISN'T a resource hog! ~ ~ <http://www.sunbeltsoftware.com/Business/VIPRE-Enterprise/> ~ --- To manage subscriptions click here: http://lyris.sunbelt-software.com/read/my_forums/ or send an email to [email protected] with the body: unsubscribe ntsysadmin
