On Thu, 12 Aug 2010, Lisa Kachold wrote:
> It can be used for malicious reasons.
so can almost any tool
As you later note:
> It is not cheap. Free applications and online tools exist
> to do the samething.
drop in a VNC server, pre-key it, and hide it from the
process table listing, and one is home in a Windows environment; munge
a kernel module, and one can attain the same effect in Linux.
Apple has similar in OS/X ...
back to the lead post ...
> It is currently being used by NSA and government
> surveillance of citizens of interest, or it can be used for
> technical support purposes.
A strong assertion. A search turns up just another vendor, in
the marketing hunt trying to sell to the Homeland Security
'garrison state'
http://www.kaseya.com/
with a FIPS-140-2 certification. They are co-marketing with
Microsoft
http://www.microsoft.com/sbs/en/us/software-solutions.aspx
and they seem to advert having sold to the U S Air Force
Conspicuously absent from a google search is non 'tinfoil hat'
evidence beyond supposition and capabilities, and actually
showing improper use by a federal agency
Please, prove me wrong with URLs I missed
-- Russ herrold
---------------------------------------------------
PLUG-discuss mailing list -
PLUG-discuss@lists.plug.phoenix.az.us
To subscribe, unsubscribe, or to change your mail settings:
http://lists.PLUG.phoenix.az.us/mailman/listinfo/plug-discuss