Current botnets are not immune to legal attacks against the DNS infrastructure of their Command and Control (C&C) servers. While this is good news to spam fighters and every respectable netizen, it is bad news to those who would use botnet-based techniques to disseminate useful information in a hostile environment (like, say, whistle blowers, dissidents, file sharers, …). Fortunately — or unfortunately, depending on how we look at it — those legal attacks are easily circumvented.

Microsoft is at its usual worst again, when it comes to the sensible matter of stifling freedom of expression that puts them in a bad light with heavy-handed yet still ineffective legal means. Or are they actually giving their customers a heads up and being the good guys despite all appearances?

Kamp Netzwerkdienste GmbH, my long-time German ISP (dating back to long gone 56kbps modem days!) has just sent me a formal notice of termination for my local DSL account. In their letter, they said that they abandoned the private DSL customers segment altogether, and wanted to concentrate on business customers and server hosting.

In the previous post, we’ve explored the observer effect in IT by writing a program that behaved differently under a debugger session than standalone. In this post, we’ll extend selfmod1_amd64.S and selfmod1_i386.S in such a way, that they won’t crash anymore, irrespectively of the environment they run in.