From mboxrd@z Thu Jan 1 00:00:00 1970 X-Spam-Checker-Version: SpamAssassin 3.4.4 (2020-01-24) on polar.synack.me X-Spam-Level: * X-Spam-Status: No, score=1.4 required=5.0 tests=BAYES_50,INVALID_MSGID autolearn=no autolearn_force=no version=3.4.4 X-Google-Language: ENGLISH,ASCII-7-bit X-Google-Thread: 103376,fcf921a2df82f8ac X-Google-Attributes: gid103376,public From: mfb@mbunix.mitre.org (Michael F Brenner) Subject: Re: auto exec and hide Date: 1997/04/17 Message-ID: <5j57fc$e9p@top.mitre.org>#1/1 X-Deja-AN: 235462015 References: <334D4F5D.5F49@usa.net> Organization: The MITRE Corporation, Bedford Mass. Newsgroups: comp.lang.ada Date: 1997-04-17T00:00:00+00:00 List-Id: I'd like to how how to make a program auto-exec when window boots and how to hide it from the screen (no icons) and from the C dir. Plus I'd like that program to sent(specifique info) by email (without the user of that computer knowing it)to a specified email account. (a) auto-exec. From windows you could either put it in autoexec, config.sys, the boot sector, the startup directory, or use the startup API. (b) hide it. You could make the icon the same foreground and background color as the screen background, you could use the game programmers interface to search out the icon and erase it from the vga memory, you could never have an icon for it to begin with, or you could use the api instead of the startup directory. If starting from autoexec.bat or config.sys an icon would NOT automatically be created for you anyway. If starting from the boot sector you might get a menu instead of an icon, but that also can be set to have the same foreground and background color. Using chron, kron, at, batch, or other operating system features or apis to schedule your job. (c) send email. Use the Ada applet generator to call the email object, use an Ada API to call email, use the Ada distributed appendix to do an rpc to ask a CORBA server to send the email for you, write a subroutine that implements a mime-compatible email protocol and tcp/ip and send the email yourself, or spawn a mail command. (d) without the user of that computer knowing it. There is no way to do this. The user of the computer WILL feel the reflections of the messages you send and know about them almost immediately. In some cases you could delay them finding out for a very short time, using temporal sublimation or metasthesis, but the Longer you delay them finding out, the Greater the repercussions will be. Marketers, thieves, politicians, investigators, blackmailers, spies, wives and husbands, warriors, beggars, assassins, police states, and bigots have used intimidation techniques like this to destroy those who disagree with them. However, it is the Essence of Corruption to have secret criteria. And taking information without the persons knowledge is the ultimate in having secret criteria. In the United States, this is unconstitutional, except when done under orders of a judge AFTER it has been shown that a crime is suspected. I recommend three courses of action for you: (1) consider working peacefully to change the laws of your city to forbid secret criteria, (2) consider looking up the phrase Karmic Repercussions on the Net, and (3) consider studying intolerance from the point of view of honesty by examining such things as the possiblity of not hiding the messages or from the point of view of the ancient gods and goddesses of Truth or from the point of view that doing this will actually give power to those you do it to and they will react strongly against it, eventually; of course, it is different if it is done with their permission (in which case they know about it); for example, we do this in the better configuration management tools to check in and check out data whenever you open or close a file in a text editor, to automatically comply with configuration management conventions. We also do this in software development environments to automatically run regression tests each time a software module is changed; to do this just put the code that calls the e-mail api as executable statements at the bottom of the package body in the elaboration part, but watch out for elaboration order dependencies if you do this.