Jump to content

Bogun

Members
  • Posts

    73
  • Joined

  • Last visited

  • Days Won

    1

Everything posted by Bogun

  1. All you even wanted to know about MiG-29 (study, seven pages) http://www.sci.fi/~fta/MiG-29.htm MiG-29 variants http://www.aeronautics.ru/archive/vvs/mig29-01.htm Delivery of MiG-29s in US http://www.af.mil/news/airman/0598/mig.htm
  2. Абсолютно не согласен. Добавление F-16 или F/A-18 вызовет огромный интерес на Западе. Будет волна паблисити на всех F-4 сайтс, очень многие захотят попробовать. Даже если ED полу-официально объявит о планах в будущем добавить даже одного из них к линейке имеющихся самолетов - этот релиз будут ждать больше чем выхода FighterOps. Мое мнение K-50 в v1.20 - ошибка. Только ЛОКОН фанаты на Западе захотят за него платить. Даже если 1.2 адд-он будет бесплатным - много интереса он, к сожалению, не вызовет. Возможно было бы по другому если одновременно выпустили и AH-64. Хочется верить что у ED есть достаточно денег чтоб пережить v1.20 и продолжать развивать ЛОКОН в сторону где возможен commercial success.
  3. Guys, there still is (and had been for some time) basic misunderstanding of what StarForce “backdoor” is and how it may jeopardize your system security even if you do almost all things right trying to protect your PC(s). Many people like Gel214th, others where trying hard, but still some people keep missing the explanation. I will try one more time. Here is a very simple version of explanation: First – StarForce driver is NOT a “virus”,”tojan” or alike. It does what it suppose to do – prevent illegally obtained copy of the software/game from running on one’s PC. It is a peace of software written to run as a low level driver. The first category “Drivers” are usually only needed to make your PC to recognize and be able to interact with your PC’s hardware, they are running in the most privileged Ring0 of the x86 processors where OS is running. No security apply onto anything running on this level. StarForce driver runs like that and that’s why it is actually capable of executing unstoppable “CreateSystemProcess” routine coded into it. There is also second category of software running as a “Processes” – almost like TSR in the old Windows 3.x world. They are running all the time and user may try to stop them to not to consume system resources if they (processes) are not needed for normal PC operation. The “Processes” may start to run with either “Users” or “System” privileges and run in either “User Mode” or “Kernel Mode”. The third category - “Applications” are runing in “User Mode”, they don’t have direct access to any functions, and must request services from the Operating System, Processes or Drivers. Now - You are malicious software writer and your target is the PC with “StarForce driver” installed. You write the ActiveX application for the Web page or “normal executable” to be distributed via e-mail, counting on the user to allow it to run even if user is not an “Administrator” on his PC and normally would not be able to install malicious software to run as a “Process”. You (virus writer) use the capability of the “StarForce driver’s backdoor” (use “function call”) to “CreateSystemProcess” to install your malware somewhere on target PC and give it a name like svchost.exe or csrss.exe to make it look undistinguishable in Task Manager from legitimate system processes running on PC and make it to start it with the “System” privileges. This malicious process (your application) can do anything you want it to do on target PC – be that remote control, FTP server, e-mail worm or anything else – this process will start every time your PC starts, run with “System privileges” and will be extremely hard to detect for normal computer user. You may even create second system process (with similar legitimately sounding name) to prevent user from shutting down your first process. Now – there are no known working malware to take advantage of the “StarForce driver backdoor” yet. There is one worm, which try to use the “backdoor” but it is poorly written and it doesn’t work, but that’s just the beginning. I’m sure some other “better malware writers” will soon try to take advantage of the “StarForce driver backdoor”. When this happened Microsoft or anti-virus companies like Symantec and McAfee will try to close the “backdoor” and all the software/games protected by StarForce will stop working. Should we all wait for that?
  4. One of the ED people on Russian forum said: “…Delay is related to unexpectedly negative reaction of the community on [starForce] copy protection and also to the issue of “stuck buttons” in some configuration of the [players] computers. It forces us to revisit the packaging of the distributive and run the cycle of testing through one more round. Because of the customer’s wishes release [of the v1.1] had smoothly flown into March (:D :D :D-Bogun). I don’t see any reason why v1.1 would not be released in March.”
  5. All right, I will try read and write more carefully... (English is a second language for me, after all) In this thread Dmut said Russian CD version of 1.1 was to be protected by “Starforce 3 Pro”. In this thread Dmut said Western "download" version was to be protected by “StarForce ProActive 1.1”. As I understand - both current versions of StarForce products. Dmut tested and confirmed that both packages of StarForce software that ED has - sucsaptable to "priviege escalation vulnurability". Does this help?
  6. Stormin, you live in California, USA. I assume you can not only write but also read English. :) Why don’t you try to read this thread from the beginning? Why don’t you try to find the confirmation of the existence of the “backdoor” Dmut posted here? Why don’t you try to run the test I offered for everyone to illustrate how vulnerable you PC become and how StarForce “backdoor” can be exploited. If you are having problem with reading, how else can we help you? Call you to explain?
  7. Thank you very much.
  8. Так скачай русскую с http://www.lockon.ru (для v1.1) - новая manual гораздо лучше.
  9. No, this guy is probably from Germany or France... ;)
  10. O4ki Go here and read: http://xforce.iss.net/xforce/xfdb/18047 http://www.securityfocus.com/bid/11628 In short - Starforce drivers, installed in your system, will allow ring-0 type privileges to any mailitious code from ring-3 (user level). The worst case - any virus or trojan (written to take adwantage of the “backdoor” build into StarForce) can get OS privileges and totally control your system. You can try it for yourself: 1. Install LOCON v1.1 DEMO. 2. Download and unzip this “prove of concept” test: http://www.wasm.ru/forum/files/_194194340__starforcemeat.zip 3. Run starforcemeat.exe. 4. Enjoy! This starforcemeat.exe harmless, it is just to show you how StarForce “backdoor” can be exploited. Read what people like Sida and Starlight are saying, don’t just declare – I have no problem yet, then all is OK… It is not OK, you may start having problem after opening next malicious e-mail or accidentally visiting wrong web site, who’s authors may try to take advantage of this security hole. Understand – average users have so many security holes in their OS, there probably many more chances that any other exploit going to get them first, the problem with the Starforce – even if user is doing all right steps to protect his PC, and not login into it with Administrative account every time to play games – this exploit will still allow malware to take control of his machine. StarForce is just badly designed/written software. But it does not metter. Hopefully, as Chizh stated, they are looking and will find better copyprotection solution for LOCON v1.1.
  11. Finally! Please, don’t punish us for being willing and loyal customers (having copy protection is fine, just not the StarForce)… Chizh, ED - good luck with all your current and future projects. My PayPal account is already setup to pay for all of them…
  12. Да, проверенно - для Данте - Чиж и все остальные ED люди - не авторитет. Он знает лучше этих всех "чайников". :):):) Ну и гонор у гада - с ним не согласен - бан. Кому не лень - можете проверить на их форуме...
  13. Dmut, I don’t know how did you managed to miss the predicaments of 1C distributing StarForce “protected” IL-2 Forgotten Battles in Russia. By now all the details had to be written in the encyclopedias under the definitions for “laughable flop” and “horrible disaster” :). I guess it does not qualify for the “SF epidemy” in your book :):):)… Dmut, I don’t know why you chose to ignore what I wrote about StarForce on a page three of this branch of the forum. I said: Please, read the definition of the backdoor on the link you yourself gave us: --------------------------------------------------- back door: n. [common] A hole in the security of a system deliberately left in place by designers or maintainers. --------------------------------------------------- Its not the MS Windows programmers coded function call in StarForce driver to allow to “CreateSystemProcess” for non-privileged user, those were StarForce programmers – by mistake or by design. Hope you also realize - it was ED programmers, who created the installation routine to install the LOCON v1.1 DEMO with this crap distributed in it, without provision to uninstall it with the uninstallation of the DEMO. If you want - you may try to call Windows a “backdoor” but by the same token you call Netware, Linux, FreeBSD and Solaris – “backdoors”. They all will allow a brainless user with administrative privileges to willingly or unwillingly to undermine their security by installing malicious software. It just because of the ease of use millions of those 404s having Windows installed on their computers, and because of those shear numbers software developers (and malware programmers) flock to develop for this platform of choice. Please, do not insult our intelligence implying that if one of the “system amin wannabee” knows how to type “netstat -?” or “netstat -an” - it make it all OK. He may not have ports opened by malware yet, but he (meaning some of the LOCON players, thanks to StarForce backdoor) may get malware installed with the next e-mail or with visiting next website. Knowing how all those bugs and vulnerabilities being exploited by virus/spyware/addware writers – it is just the matter of time. I hate to see ED contributing to their (virus/spyware/addware writers) cause, paving the road to make their life easier. Yes, users may have all this crap installed on their PCs without help of SF or ED, but ED does not have to help! Just to make you to understand were I’m coming from – I am a system engineer working in the environment with about 500 servers and about 15000 users. System integrity – is one of my primary responsibilities. I don’t think you can tell me anything new about the extend of the users’ stupidity. But it (users’ stupidity) does not give SF or ED an excuse to compromise their PC security farther. Also, you may not worry about “my system” – it is setup, maintained and protected slightly :) :) :) better then the computers of majority of the potential LOCON buyers. I regret to say, but I must - my experiments with "StarForce ProActive 1.1" version December 2004 shows, that exploit works with it in the same way as with "Starforce 3.x Pro" version. Now, this is really bad news. Please, understand – not even for a second I doubted about a need for ED to protect its intellectual property. I just hoped that they will find the way to accomplish this without unduly exposing their customers to another potential vulnerability… I still hope…
  14. Whats the difference between the two Starforces? My Starforce knowledge is a little limited. As I understand it: The Russians are getting complete v1.1 game on two CDs. Game will be protected by “Starforce 3 Pro” which will require them to have original CD in the CD-ROM when they start the game (at list until they will get no-CD crack). http://www.star-force.com/index.phtml?category=56&type=5 In addition to braking many CD/DVD-copying software titles (like Alcohol, etc.), this “Starforce 3 Pro” is definitely contains the “backdoor”. We are getting “the v1.1 patch” to the original LOCON game. Patch is going to be protected by “StarForce ProActive 1.1” which I assume will not need the original CD, but will implement another copy protection scheme – upon install it will generate the unique Key with which you would need to register with the Star Force to get an activation key good for 3 major hardware upgrade during half-year. http://www.star-force.com/protection.phtml?category=11&type=3&id=210 Dmut has promised to check if this “StarForce ProActive 1.1” contains backdoor as well. My concern is – what did DEMO of the v1.1 installed on my PC already? Does this StarForce driver contains the “backdoor” or not? And why was it not uninstalled after the DEMO uninstallation?
  15. Guys, stop this – the only two people who definitely know how it will work are Chizh and Dmut. Dmut said – “it's counter of major hardware changes”. So "3 times" is the counter for major hardware (I imagine CPU,Video card, motherboard...). JG27_Arklight Russian guys are definitely screwed more them we are – they are getting the real “Starforce 3 Pro” with the backdoor. We, on the West are getting “StarForce ProActive 1.1” which may not contain the backdoor.
  16. SF don't allow DOS, or remote control, or something. it only allow locally strarted process to get a ring-0 privileges. only if you run a malware on your own computer, then malware might use SF vulnerability. But, it you run such programms on your PC, then they could do many bad things even without SF. I mean, your antivirus and firewall should protect you from getting running such malware things. SF is not helping you to catch a virus. If you already infected, then SF don't make any changes. btw, still I don't know any malware that are using SF vulnarability, except for starforcemeat exploit, which is harmless. Right Dmut, I wrote about StarForce not being problem by itself in my post. It is what it allow malware writers to do is the problem. What you wrote will bring another question: How long will it take for Anti-Virus software companies to recognize StarForce as a “backdoor” and start removing it like any other malicious software, will LOCON still work? It will not, and ED will be besieged by the angry users asking for what? Fixes? Refunds?
  17. Нащет "Кота" - не надо, кот - отдыхает... Тугой какой, сколько проблем с ним... Я поигрался и выбросил (ну не выбросил - обратно сдал :))... У меня с CH троицей другая проблемма - так и не смог к педалям привыкнуть в ИЛ-2. Пришлось РУС и педали обратно в коробки поставить, пользуюсь одним РУДом. Когда снесу ИЛ-2 с компа - опять попытаюсь весь CH комлекс поставить - для LOCONа он должен быть превосходен.
  18. For those “computer-challenged”… The “backdoor” in Starforce 3 Pro is not imagined one, but real, existing, confirmed. It allows any malicious software to use “CreateSystemProcess” function call to creat process running in highest privilege Ring 0 of x86 CPU, in which OS kernel runs. No OS level security apply to processes running in Ring 0 – it would be able to do anything malicious software designer would want to program – like remotely control your PC to perpetrate DOS attacks on others, distribute spam, get all your personal data, all without you knowing it… Understand – not StarForce protection itself is the problem, but what it allow other malicious software to do. Now, the question is – if the StarForce ProActive 1.1 contains the same “backdoor”? If it is only Starforce 3 Pro distributed with the LOMAC v1.1 CD’s – only Russian LOCON users will be screwed. If StarForce ProActive 1.1 has it – all of LOCON Western user’s PC’s are going to be potentially open for the attacks as well. I would like to restate – after uninstalling v1.1 DEMO – StarForce driver remained installed and functioning on my PC. If you have time – check it for yourself – just unzip and run the EXE from here: http://www.wasm.ru/forum/files/_194194340__starforcemeat.zip I am at work, can’t test it for myself. Read the ReadMe – it is entertaining: “...StarForce Professional 3.0 is a powerful multi-level CD-ROM, DVD-ROM copy protection system designed for hackers and virmakers who wish to grant their applications ultimate, most powerful ways against your security. ...Most modern copy protection systems today encrypt only the applications' executable files and then bind them in some way to the licensed discs. StarForce Professional 3.0 is the first system that offers a multi-level and fully-functional vulnerabilities, which granted access to your PC with any privileges (including Guests) to any user. ...With this product, you, the developer, have a unique ability to hack your potential victim as well! ...The research conducted by StarForce Technologies' specialists reveals that in most cases the pirate releases don't contain the protected executable files with that pretty access system. Enjoy it today! Sincerelly yours, Protection Technologies”
  19. Re: LOMAC v1.1 copy protection – good news/bad news it's not a reinstall counter, it's counter of major hardware changes, when SF will ask you for a new activation, similar to Windows XP. Anybody has a problems with activating MS Windows after hardware changes? I mean legal copies, of course. You will not need a new activation if you just reinstalling it. Dmut is there any confirmation about the 3 re install thing? To my experience I had to re install lockon so many times. Why? Due that some mod's that in the long wrong corrupted my game. Also have to re install my OS at least 2 times a year either due to virus or registry corruption... I think if you reinstall your v1.1 on the same PC (same hardware) - you would not need to re-register, you use the same key StarForce will give you initially. Guys, listen to what Dmut has to say.
  20. Good, we have ED person here. Please, Dmut, check for the backdoor!
  21. First – the Good News: ED is serious about 1.1 copy protection. Hopefully the scheme they eventually will come up with, will prevent unrestricted pirating of the game and will promote the moneyflow to finance the future development of LOCKON. In the thread on Russian branch of LockOn Forum here: http://forum.lockon.ru/viewtopic.php?t=3369&sid=528ebad60f78971e93cc7a00398c086b the issue of copy protection of the upcoming v1.1 is being discussed. Second – the Bad News: It look like the software they choose right now to protect the game is the StarForce v3. How it suppose to work: 1. In Russian version – normal copy protected CD. CD is required to play the game. (That is - until “noCD fix” been found). 2. In Western version (as I understand it) – when we install the game – the key tied to the hardware on your computer is going to be generated. If you update your computer this key will/may change. With this key we will need to go to StarForce site to activate the key. StarForce will start the counter which will allow you to reinstall the game total of 3 times. The though is – when pirates try to distribute the game+key and many people try to use the same key often – it will quickly become clear – this key is been used by software pirates and will be locked. The problem - StarForce is just bad peace of software. Do the search on Google for “StarForce +backdoor” to find out more. Here are two links: http://xforce.iss.net/xforce/xfdb/18047 http://www.securityfocus.com/bid/11628 In short - Starforce drivers, installed in your system, may grant ring-0 (OS core) privileges to any code from ring-3 (user level) - in the worst case any virus or trojan can get OS privileges and totally control you on your system. StarForce is not the virus by itself, but it allow real viruses, spyware, exploits to be installed on your computer. To make thing worst – often when you uninstall StarForce protected software – the StarForce driver remains installed and running. Check it for yourself – uninstall the Flaming Cliffs DEMO and do the search in registry for StarForce or sfdrv01.sys… Why did ED need to distribute StarForce with the v1.1 DEMO anyway? For me this is major issue. I would not want knowingly or unknowingly have such peace of software installed on my PC. Hope ED can come up with any other way to protect their game, while there is still time left before the release…
  22. Вообще - голосую двумя руками! Или хотябы за подпись над дефолтом - "как в реале"!
  23. Knowing that ED has limited resources for the farther development of the LOCON series it makes it so much more important to pick right aircraft as an addition to a list of available flyables… Would they choose to pick either one (not even both) – F-16 or F-18 – game would have considerably greater incentives to upgrade for the new and old LOCON players alike. This would simply kept the name ED as a company continuously developing desirable addition to the game, building and incising supporters base. Selecting Ka-50 was a mistake, in this respect. There wasn’t demand for it even in Russia to have it added to the games’ list of flyables… ED proclaimed that they do not have enough info to accurately model either one of F-16 or F-18, but can they at list make “educated guesses”? Obviously first incarnations of other flyable fighters weren’t “exactly” on the mark, but we all bought the game nevertheless…
  24. Guys, We all know a little (like myself) and some know a lot about how pulls Doppler radar operate. I was NOT really talking about not being able to detect or track, but about diminished range and probability of detection of low flying targets. Also I was talking about years 1980-90...
  25. Can anybody please, shed the light on the issue of airborne radar effectiveness in detecting and tracking low flying targets? As I understand it was fairly resent, when modern radars become capable of performing this task and in time period covered in LOMAC (80-90) we should experience real difficulties in tracking target aircraft flying at altitudes lower then our own, even if they are described having “look down, shoot down capabilities”. My understanding is – if I'm flying lets say at about 3000m - even targets at altitudes of few hundred meters should be much harder to track/lock onto and nearly impossible for the targets flying below, lets say, 100m. Am I right? I would especially appreciate any sources were we can read about how problem actually present itself the resolution of it.
×
×
  • Create New...