Search results
Results from the WOW.Com Content Network
Computer Associates, makers of the PestPatrol anti-spyware software, characterize the XCP software as both a trojan horse and a rootkit: [8] XCP.Sony.Rootkit installs a DRM executable as a Windows service, but misleadingly names this service "Plug and Play Device Manager", employing a technique commonly used by malware authors to fool everyday ...
As a result, any Microsoft Windows computer that has been used to play these CDs is likely to have had XCP installed. This can cause a number of serious security problems. Several security software vendors, including Microsoft , regard XCP as a trojan horse , spyware , or rootkit . [ 2 ]
Sony BMG quickly released software to remove the rootkit component of XCP from affected Microsoft Windows computers, [15] but after Russinovich analyzed the utility, he reported in his blog that it only exacerbated the security problems and raised further concerns about privacy. [16]
SecuROM 7.x was the first version to include the SecuROM Removal Tool, which is intended to help users remove SecuROM after the software with which it was installed has been removed. [5] Most titles now also include a revoke tool to deactivate the license; revoking all licenses would restore the original activation limit. [ 6 ]
Main page; Contents; Current events; Random article; About Wikipedia; Contact us; Donate; Pages for logged out editors learn more
XCP is a three-letter abbreviation which may refer to: Copper , the ISO 4217 code for trading the metal Extended Copy Protection , a CD copy protection technique used on some Sony CD albums
Start a discussion about improving the Sony BMG copy protection rootkit scandal page Talk pages are where people discuss how to make content on Wikipedia the best that it can be. You can use this page to start a discussion with others about how to improve the " Sony BMG copy protection rootkit scandal " page.
The arrow represents a rootkit gaining access to the kernel, and the little gate represents normal privilege elevation, where the user has to enter an Administrator username and password. Privilege escalation is the act of exploiting a bug , a design flaw , or a configuration oversight in an operating system or software application to gain ...