Talk:Absolute Home & Office
This article is rated C-class on Wikipedia's content assessment scale. It is of interest to the following WikiProjects: | ||||||||||||||||||||||
|
This article links to one or more target anchors that no longer exist.
Please help fix the broken anchors. You can remove this template after fixing the problems. | Reporting errors |
Disputed-section: Kaspersky Lab claims
[edit]The disputed section is one-sided and does not present Absolute Software's detailed response to the Kaspersky Lab report, which disproved much of what Kaspersky Lab had alleged: http://www.absolute.com/en/about/pressroom/research/kaspersky
Because of a conflict of interest, I can't make changes to this section myself, but would very much appreciate someone taking a look. Moorhou (talk) 16:44, 13 March 2015 (UTC)
- Hi. Which part of text in article is disputed? There is text from intro section: `a5b (talk) 03:57, 16 April 2015 (UTC)
Analysis of Absolute CompuTrace by Kaspersky Lab shows that the persistence module is preinstalled into many BIOS images by most of laptop vendors
and can be activated without user authorization.
- This can be rewritten according to Kaspersky: to something like "was found to be pre-activated on several laptops" `a5b (talk) 03:57, 16 April 2015 (UTC)
The software behaves like rootkit (bootkit), reinstalling some programs into Windows OS at boot and downloading modules from Command server via Internet.
The rootkit is vulnerable to some local attacks
- This can be rewritten to "first-stage loader of the rootkit is vulnerable". `a5b (talk) 03:57, 16 April 2015 (UTC)
- Thanks for taking the time to look into this. The disputed text in the article is this whole paragraph below. Moorhou (talk) 20:17, 16 April 2015 (UTC)
Analysis of Absolute CompuTrace by Kaspersky Lab shows that the persistence module is preinstalled into many BIOS images by most of laptop vendors and in rare cases was preactivated without user authorization. The software behaves like rootkit (bootkit), reinstalling some programs into Windows OS at boot and downloading modules from Command server via Internet. Rootkit installer is vulnerable to some local attacks[8][9] and to attacks from hackers, controlling all network communications of victim.[10]
- Unfortunately the suggested rewrites include quotes and assertions from Kaspersky that were refuted by Absolute to be factually incorrect. So the rootkit was not actually proven "to be vulnerable to some local attacks" and no substantial evidence was found (according to Absolute's report, linked in my first comment) to show that any laptops were "found to be pre-activated" without prior knowledge of the users. At the very least, would it be possible to move all these points out of the intro section and into the "Vulnerabilities" section and change the wording so that Kaspersky's claims are shown as claims and not proven facts. Moorhou (talk) 20:17, 16 April 2015 (UTC)
- Is it true that Absolute CompuTrace and its module is preinstalled into many BIOS images? There is no way to disable or to delete this module from the BIOS (I hav it in my laptop and there is no BIOS option to turn it off; and no BIOS update with computrace deletion).
- Then there is a claim from Kaspersky Lab - about "rare cases was preactivated without user authorization". They demonstrated this. Should this demonstraion be censored from Wiki?
- When agent is not "fully installed", there is "small agent" ("Rootkit installer") which IS vulnerable, and it does not use encryption & authentication. I think this claim is correct and not contested by Absolute ("once the installation is complete, the communication is secure and uses encryption as well as authentication of the host server to reject attacks as described in the Kaspersky report").
- Hackers may use own copy of "small agent" (because it is whitelisted by most antivirus vendors) to download and install any trojan software (settings of the small agent are not signed). Absolute says "source of the binary is from firmware." but anyone can take this small agent as single file; modify its settings; copy it to some USB flash or in any other way transfer it to some Windows machine (even without computrace agent in BIOS) and use it as trojan downloader / remote control agent..
External links modified
[edit]Hello fellow Wikipedians,
I have just added archive links to one external link on LoJack for Laptops. Please take a moment to review my edit. If necessary, add {{cbignore}}
after the link to keep me from modifying it. Alternatively, you can add {{nobots|deny=InternetArchiveBot}}
to keep me off the page altogether. I made the following changes:
- Added archive http://web.archive.org/web/20090411170601/http://www.absolute.com:80/Service_Agreement.pdf to http://www.absolute.com/service_agreement.pdf
When you have finished reviewing my changes, please set the checked parameter below to true to let others know.
This message was posted before February 2018. After February 2018, "External links modified" talk page sections are no longer generated or monitored by InternetArchiveBot. No special action is required regarding these talk page notices, other than regular verification using the archive tool instructions below. Editors have permission to delete these "External links modified" talk page sections if they want to de-clutter talk pages, but see the RfC before doing mass systematic removals. This message is updated dynamically through the template {{source check}}
(last update: 5 June 2024).
- If you have discovered URLs which were erroneously considered dead by the bot, you can report them with this tool.
- If you found an error with any archives or the URLs themselves, you can fix them with this tool.
Cheers.—cyberbot IITalk to my owner:Online 15:09, 26 February 2016 (UTC)
External links modified
[edit]Hello fellow Wikipedians,
I have just modified one external link on LoJack for Laptops. Please take a moment to review my edit. If you have any questions, or need the bot to ignore the links, or the page altogether, please visit this simple FaQ for additional information. I made the following changes:
- Added archive https://web.archive.org/web/20130318211526/http://www.absolute.com/en/resources/whitepapers/theft-report to http://www.absolute.com/en/resources/whitepapers/theft-report
When you have finished reviewing my changes, you may follow the instructions on the template below to fix any issues with the URLs.
This message was posted before February 2018. After February 2018, "External links modified" talk page sections are no longer generated or monitored by InternetArchiveBot. No special action is required regarding these talk page notices, other than regular verification using the archive tool instructions below. Editors have permission to delete these "External links modified" talk page sections if they want to de-clutter talk pages, but see the RfC before doing mass systematic removals. This message is updated dynamically through the template {{source check}}
(last update: 5 June 2024).
- If you have discovered URLs which were erroneously considered dead by the bot, you can report them with this tool.
- If you found an error with any archives or the URLs themselves, you can fix them with this tool.
Cheers.—InternetArchiveBot (Report bug) 19:26, 4 January 2018 (UTC)
- C-Class Computing articles
- Low-importance Computing articles
- C-Class software articles
- Mid-importance software articles
- C-Class software articles of Mid-importance
- All Software articles
- C-Class Computer Security articles
- High-importance Computer Security articles
- C-Class Computer Security articles of High-importance
- All Computer Security articles
- All Computing articles