New
#121
Nonetheless, as of this moment, more than anytime in the past 3.5 weeks since I found myself left with nothing else except bluetooth as a means of penetration (since I had exhausted my options to fix or block I would say 99% of every other possible means), I stand behind this postulation with firm conviction. Yes, it was a theory originally. But in the past month, after paying a bit more attention to my problem, reading about the Windows services I did not recognize, exploring certain corners of Windows I had not investigated before (like environment variables), and now, after spending an aggregate of approximately 8 hours reading MSDN, covering what I could in that time pertaining to .NET, Bluetooth, and the finer points of various MS Mobile platform implementations and their related APIs and the functionality among them, I stand firmer than ever of the concept. Bluetooth, at least as a initial means, is accessing my laptop from an AP, the signal originating from who knows where
Bluetooth has a fairly short range and for remote computer communication you do need Line-of-Sight for a fairly stable communication, especially if you where trying to hack someone.
Class 1 devices do not reach over 30 meters in real life because of the amount of interference and obstructions
Class 1
100 mW (20 dBm)
100 meters
Class 2
2.5 mW (4 dBm)
10 meters
Class 3
1 mW (0 dBm)
1 meter
I think that's where some problems have started, Microsoft changed the majority of system configuration like Services and when you've attempted changing these settings its resulted in other complications that you've then attributed to being caused by malicious software. Services dont really need reconfiguring or modifying from their defaults considering they are now dynamically loaded and secure in their default state. Security Watch: Services Hardening in Windows Vista, and because I do not want it there restricting me as I have never been restricted before in windows (I never really investigated RPCsvc before Dmex, but in an earlier post, I asked which services of the ones I was prohibited from altering were already hardened in Windows, like grpsvc is), I take steps to change the situation, and that results in more reactions by my opponent, and then, of course still further actions, by me. There is a client-server relationship. There is synchronization taking place,
Security and safety features new to Windows Vista - Wikipedia, the free encyclopedia
I dont recommend anyone install/enable ActiveX and Scripting while using Internet Explorer, That decision is (doomed) yours to make but Firefox is much more capable when it comes to security, especially Scripting and ActiveXthere are dialog boxes at random times popping up in IE8 (when I happen to be in there) stating "Unsigned ActiveX scripts are not that harmful. Would you like to enable them?"
There might be a startup entry your missing somewhere that is causing the Sidebar to continue launching, You also cant exactly get infected via gadgets because the Sidebar.exe application runs under a low user privledge and prevents gadgets from accessing secure system areas.I have existed with Vista and no gadgets/sidebar for a year on a laptop after deciding I did not want Sidebar to startup with Windows. Never had a problem after that. Now, everytime I restart, there is that Sidebar again. Why? Why the Windows Sidebar? Is this only coincidental that it also happens to be a mobile platform that could potentially enable or assist through scripting, a larger and more significant breach of my laptop?
Cyberlink Power2Go was probably bundled by the shop where you purchased the laptop and its not used for hacking.Why is Cyberlink Power2Go (nothing but audio related apps) installed on my system when I checked the web and determined that HP did not bundle that with the laptop. Is it just coincidental that audio drivers, or the Tablet service are both used with Bluetooth and Windows Mobile PC? Is it coincidence that Remote Differential Compression and RIP listener, again both potentially used with Mobile PC and Bluetooth, turned on as a Windows feature? Coincidence? How many coincidences before they start becoming possibilities?
Remote Differential Compression is enabled by default on all Vista and Windows 7 systems, It allows Windows to transfer files over your LAN using compression making the transfer faster.
RIP listener is not enabled by default but its default configuration is secure.
The screenshot where you attempted running rstrui from a command prompt failed because you didnt use an Elevated Administrative Command prompt.The only thing I will say is that when you look at these screenshots, keep in mind that every application, or service or component in windows that you can spot in these pictures--aside from a very few items--either came with a native Vista installation (or with the HP programs bundled with the laptop) or someone else put them there. Someone other than MS, HP, or myself.
Thank you for your understanding.
Paul
Im not sure why you would be getting that other message preventing you from uninstalling applications, Its possible one of the registry cleaners you used reset the configuration of the Local Securoty Policy, It can be revered by resetting that setting but I cant remember where you would find it in the registry
Steven