It looks like you're using an Ad Blocker.
Please white-list or disable AboveTopSecret.com in your ad-blocking tool.
Thank you.
Some features of ATS will be disabled while you continue to use an ad-blocker.
-In my windows machine my firewall status shows me that any time I open a network related application a few connections open, from 0.0.0.0 and a port between 3000 and 4200, to some external IPs 80 port. Three of these IPs are 209.85.135.103, 74.125.39.139, and 64.124.14.70.
-Reverse DNS and whois show the IPs belong to MarkMonitor, a company whose scope I am unsure about but whose full name is Markmonitor Brand Protection Antifraud Solutions. That sounds scary.-In my windows machine my firewall status shows me that any time I open a network related application a few connections open, from 0.0.0.0 and a port between 3000 and 4200, to some external IPs 80 port. Three of these IPs are 209.85.135.103, 74.125.39.139, and 64.124.14.70.
-Reverse DNS and whois show the IPs belong to MarkMonitor, a company whose scope I am unsure about but whose full name is Markmonitor Brand Protection Antifraud Solutions. That sounds scary.
taskmgr.exe is asking permission to connect to 66.152.109.110.
I am using windows 7. Is it normal? Is my machine infected with malware? Thank you!
Now let's do some whois to see who these guys are:
whois rr.com
Domain Name: rr.com
Registrar Name: Markmonitor.com
Registrar Whois: whois.markmonitor.com
Registrar Homepage: www.markmonitor.com...
originally posted by: yuppa
a reply to: darkbake
You do know how to block IP ranges correct? You can do it through your router or ISP if you call them and ask them to block that IP. You can even do so with the firewall.
originally posted by: Aliensun
a reply to: darkbake
My goodness. Thieves think they are being victimized.
Well, that kind of thinking is in the air these days.
It could suggested that is one aspect of what is wrong with the general society today, but probably it would be shouted down.
originally posted by: supermarket2012
originally posted by: yuppa
HA sanyone heard of turining off windows update and in the srervices and disabling the rights protection? Sheesh. its a easy fix to keep windows from spying on you. SHoot you can even get programs that will block microsoft having access to the system.
So are you using win10 right now? What does windows update have to do with the topic? What makes you think disabling the ability for microsoft to spy on you via windows is possible?
originally posted by: StargateSG7
originally posted by: supermarket2012
originally posted by: yuppa
HA sanyone heard of turining off windows update and in the srervices and disabling the rights protection? Sheesh. its a easy fix to keep windows from spying on you. SHoot you can even get programs that will block microsoft having access to the system.
So are you using win10 right now? What does windows update have to do with the topic? What makes you think disabling the ability for microsoft to spy on you via windows is possible?
-----
Actually it's very possible to do! Just run the Executables, DLL files,
DAT files, and Microsoft Jet database files through an assembler code
checker line-by-line running it within a virtual CPU to see what ports,
addresses and other things it accesses...EASY AS PIE! We can log ALL
of Windows 10 in a few days or so running it through EVERY command,
link address, CPU instruction, BIOS access, Input/Output access
(i.e. Northbridge/Southridge chip and disk controller access).
We will then tell you what it can do privacy wise.
Just so you know, companies like Symantec and other anti-virus
publishers and various intelligence and military agencies within
the U.S. government still pay MS at least $30 million a year for
small and large bits of Windows source dealing with common
keyboard and Human Interface Device (HID) hooks, port addresses
and NTFS file system formats so they can target ZERO-day exploits
within the OS.
There are also specific hardware-exploits and microcircuit
manufacturing flaws that have been inserted into various
CPU chip and peripheral controller masks for YEARS that
seem innocuous at first but can be targeted for exploit
to cause microcode execution via internal CPU caches
or have iterative code execution on specific chip layers
or within specified circuit blocks to cause targeted failure
of specific circuits which technically can cause a slight rewrite
of a circuit diagram so that a targeted failure point can be invoked
allowing external or internal code be loaded or run, or specific parts
of a chip mask be made vulnerable to external exploit.
These days we can SHAVE a chip so that we can see an
entire chip mask layer by layer and then run THAT mask
diagram through a materials and circuitry profiling system
to see intentionally manufactured failure points and
improper circuit mask layering issues.
Even a SIX BILLION Transistor AMD GPU or a 1.2 billion lines-of-ode
Expert System Data Miner is NOT immune to procedural/command
debugging or chip circuit profiling...so what makes you think we
can't profile the latest Windows 10 OS or Intel i7 chip mask!
We made it! We can profile it and debug it!
---
P.S. This is For the Spooks! ........>>>
Some of my best buddies have Opto-Electronic systems
that can do MASSIVELY parallel operations for profiling
WAAAAAAAY into 3-digit Exaflop territory...What makes
you thing we can't profile and debug it in JUST HOURS?
originally posted by: darkbake
a reply to: jedi_hamster
In the original news article, which I sourced in the O.P., it mentions that Windows 10 sends data to MarkMonitor. This same information was mentioned in a few dozen other articles that I found on the web. I have sources for what I said. What I was looking for was an official statement from Microsoft about sending data to MarkMonitor, but I couldn't find any.
Their user agreement states that they will send information to third parties, and supposedly there was a separate statement made by Microsoft that they send information to MarkMonitor. This second statement I could not find any evidence of beside it being referenced in over a dozen different news articles.
Microsoft User Agreement
I did not think of other spyware and the like being the reason that MarkMonitor was connecting to a forum user's PC, but if that is true, there isn't conclusive evidence that Windows is behind that.