•
Yes, it's THAT book!

Drop your email here to stay informed of the status of my "tell most" book about the National Security Agency:

--OR--

Read a little about the book here:

Employees are allies, not the adversary

--OR--

Check out the Kickstarter here (click)
How can I help you?
Contact Jeremy
Recommendations

Here's something that


I, Jeremy Duffy, actually recommend and think is worth checking out.
No web-bugs, no bs, just a legit recommmendation that I have personally evaluated before allowing it to be listed here:

Think something's here that shouldn't be? contact me!

Windows Vista Proven to be Spyware

Spyware: Any software that covertly gathers user information through the user's Internet connection without his or her knowledge, usually for advertising purposes. Spyware applications are typically bundled as a hidden component of freeware or shareware programs that can be downloaded from the Internet. Once installed, the spyware monitors user activity on the Internet and transmits that information in the background to someone else.
Because of the End User License Agreement of Vista, Microsoft arguably has the legal right to collect a large amount of data on you and report it back to their home servers. Some will say that they're not hidden, but is being buried in a giant EULA that most people don't have the expertise to understand really the same as full disclosure?
Microsoft says that users have the possibility to disable or not use the features and services altogether. But at the same time Windows update is crucial to the security of Windows Vista, so turning it off is not really an option, is it?
Not only that, but you have to know this a problem and then perform the immense amount of work required to identify all the various services and features that spy on you and disable them properly. By the time you're done, you won't really be using much of the software that came with Vista in the first place. JTAG ERROR: No slashdot_ht index defined Tags: , ,

Share This

Have a Comment or Question?

5 Comments to “Windows Vista Proven to be Spyware”

» Comments RSS Feed
william robinson says:

from my new book in progress

VISTA the Corruption of the code by the federal government.

In the beginning there was DOS.
And that Disk Operating System was for pc
pc used that dos and never crashed.
It was fast.
It was stable.
It was in a practical since perfect in its function.

Then came a dos GUI.
And that Graphical User Interface was windows.
Thus began the era of the system crash.
Dos wasn’t crashing, just the layer over top of dos.
The first offerings of windows wer mostly stable beaning used only a newer way to run multiple programs in dos.

Windows 95 increased the crashing but offered a better over all experience to the common user.

Then windows ME malleniam addition brought lost resources and crashing to new heights. This caused a revolt in the consumer market and a demand to return to windows 95s current stability and friendly reconfigurability.

The locks placed in ME brought frustration in the computing industry among administrators and users alike.
And a absolute and passionate dislike of the ME os.

The attempt was to deny users access to dos.
Why?
Why would the consumer be denied access to an ancient OS which was the underpinning of the GUI?

Enter the NSA
the national security agency began to lace the ME GUI with imbeded spy software designed to keep copies of your data in hidden text files. This was don secretly by making them invisible to the OS simply by by attributing the files and folders involved in spying on you with ā€œ.s ?system files.

There was a problem.
Even though they are totally hidden from DOS they still could be destroyed by DOS

the DOS disk operating system had to be hidden from the consumer to prevent the corruption and deletion of the spy files.

This new GUI was released hiding the access to the DOS back end.

Microsoft was forced to comply with this or be to be busted up.

That was when the ME fiasco started.
With the release of me came Crippled slow buggy system poison bad crashey unstable, etc….

There pc managers claimed of a massive memory hole in ME.
There was no hole.
And disk memory reporting bugg
there was no bug.
There was a hidden spy file.

Class action suets began to emerge and Microsoft was forced to admit that the os was instable.
The OS was a total and complete failure crashing systems loosing valuable work data.
Windows nt server was released to run databases and it had omitted implementing some of the spy code for greater stability.
It was marketed with the strong recommendation to reformat the drive partitions into the new ntfs file system.

This new file system scuttled the ability of a user to remove hidden files on the partitions ensuring that all your relevant data and text would be protected from you.
To the horror of the national security agency windows nt server was quickly being adopted as the standard os of choice.

Work on xp based on ntserver was being stepped up and hoped to bring stability and reconfigurability back to the it professionals and consumer alike.

Why when there was better hardware and operating systems did the federal government choose Microsoft?

Many systems weren’t built to spy from the ground up so they knew that they had to do things differently if they hoped to keep information from the consumers computers.
They had to do things differently.
The amega’s legisy hardware was practically impossible to in bed spy ware in its os and the US government had disabled to sponsor windows as Americas next best way to spy on you and the world.
Rolling back doors wer being designed for the next offerings of windows that would allow the federal government a always open back door into any computer network connected to a BBS bulletin board system or the Internet.

And anyway it was in the moral quest of national security to spy on you, right?
It seemed to be the perfect reason to hang the constitution for the governments insecurity.
Excuse me, thats national security.
How do i know this?
Because I made a dos utility to Delete them.
I would do this so I didn’t have to reformat the drive and reinstall windows.
N T F S successfully scuttled my efforts for a faster and more stable system.
The hid spy files would grow and grow until the Windows GUI would trash the hard drive causing bad performance,crashing frequently.
At that point all data would be lost.
This would force a reformat if the drive was readibal and then a reinstall of windows.
This might fix the problem by making a new empty spy file in a new directory.
This frustrated me because I knew that if I could blank that hidden directory that the system would return to stability.
This would regain the memory lost if I could just use the DOS deltree command on the hidden directory.

IT professionals Quickly learned that windows needed to be reinstalled frequently to ensure stability, making sure to backup all relevant data.
The federal government had officially informed Microsoft that the fat 16 partitions were not secure and that gave them the excuse to implement the N T F S partitioning by default.
This meant that common people and IT prose had no access to the data in by D O S S to change it and eradicate it.
The NSA informed those involved that the new partition table that couldn’t be seen by D O S was necessary for the underpinning of windows.
This was in the entrust of national security and had to be a priority.
All those involved are sworn to a level of secrecy that places there freedom in jeopardy if they divulge the truth about what the government had implemented in there system.
And what was about to be implemented was much worse.

We the people of America who supposedly govern ourselves never voted for this.
No congressman or senator has disclosed the decisions that are suppose to be the representation of the will of the people to his or her constituents if even they know about it.
Those who know and are involved are sworn to national security.
This is in my openoin illegal activity, and if I know my constitutional law each act of spying without a judg signing off declaring just cause and not just reasonable suspicion individually is a felony.
This would make all the people involved ineligible to be in government, secret government, heired government position or even vote. From the lowest tech who knows and refused to report the crime to the heads of state government in the know.

This is one reason you will never own the OS and only own the right to use the OS.
If you decompile the operating system and discover just exactly how the OS is spying on you then you are yourself committing an alleged federal crime.

A crime that holds a greater penalty than snatching the OS from an IT store and running away with it.

This is why Microsoft developers are held in contractual and governmental secrecy clauses being denied there constitutional rights to free speech.

And this leads all the way up to vista

william robinson says:

I just removed a 7gig text file that was made by windows ans was uploading it to microsofts database

And what is the name of this file? I would like to get rid of it also.

To find it quickly, use Windirstat to visually show the files on your computer. I was also able to get rid of a 2 GB text file (though this was a log file for a different program and was Vista unrelated).

http://www.jeremyduffy.com/tools/windirstat/

Dale Stensland says:

Hello I am a “whistleblower” on abuse of powers in local & federal police powers incorperating “real time” audio editing of (destroying) audio forensic wave files, death threats & the likes. I would sure like to find out how they are accessing my computer & changing audio? even with the wireless “unhooked” -no light showing hook up. There seems to be a program that is capable of utilizing the wireless with out showing it being used, even to the degree of no drivers engaged by that meaning I disabled the drivers in device manager. Then when I operate the audio editing software they seem to still change the message in “real time” I am using DC7, wavepad, & audacity. It seems not to matter which I use “they” seem to be able to “hack” the files? I am rather disappointed in our national security to say the least! Just WHO is the enimey anymore? thank you Dale

Loading...

If you want to learn more about my professional background, click here to learn more.

Check out one of my guides/tutorials:

seminar destroy Tutorial
|INDEX|next: The Consequences of Posting Online
Online Addiction: From gambling to surfing and online gaming, people can destroy themselves and others with online addiction.
Posting Online: The Internet never forgets anything completely. Make sure you don't make mistakes that will stick with you for the rest of your life.
Protecting Photos: The Internet never forgets anything completely. Make sure you don't make mistakes that will stick with you for the rest of your life.
Getting Tricked: You WERE doing fine... until someone convinced you to install a virus or give away your passwords. Don't fall for it!
Account Hijacking: One of the most common security risks today is people getting their accounts taken over and then used to trick their friends and family.
Trusting Webservices: An online service promises they'll 'Never abuse or misuse your data' and you believe them? Think again.

... or check out any of my other guides and tutorials by clicking here!

Online Addiction

Concerned about online addiction? You should be. Learn the types, the signs, and the preventions.

[Click for full description]

The Consequences of Posting Online

It's fun to post online. What you think, what you feel. But words typed and posted on the Internet can come back to bite you more than anything you could say with your mouth.

[Click for full description]

Photo Safety

You can reveal far more than you intended when you post a photo online. Don't make a critical mistake and check your photos before they're online.

[Click for full description]

Tricks and Scams

Just because you won't willing give up data doesn't mean that I can't trick you out of it. Don't fall for these well known tricks!

[Click for full description]

Account Hijacking

One of the newest threats we face is the risk of someone getting control of your online account and using it against you and the people you know. Do everything you can to prevent that from happening!

[Click for full description]

Trusting Companies

Store, online or off, are not known for being fair and helpful unless it benefits them to be so. Good deals exist, but many are bad deals in disguise. It's not in your best interests to be too trusting with any of them.

[Click for full description]