From frugals
http://flightsimhq.org/hyperlobby/index.php
http://flightsimhq.org/hyperlobby/evidence.html
The guy making this page seems a bit wack but how real is this?
...
software installs powerful system files
those system files ARE not reported or do they get uninstalled
software installs powerful remote access to your system, bypassing your virus and firewall programs
remote access to your system is routed to a hidden location[s], connect to the HLJ server are tunnelled and encrypted
Jiri refuses to offer a verify identities
software can allow remote rebooting of your machine
software is NOT detectable by trojan / virus checkers, because each module is not dangerous by itself. Simply crafty concept.
Jiri refuses any audit of the software by a trusted 3rd party.
Is HyperLobby a security conern?
-
- Posts: 524
- Joined: Sun Sep 17, 2006 10:38 am
- Contact:
It shouldn't.. HL utility uses visual basic routines and scripts that natively they do considered dangerous. Of course, i'm not sure yet for the nature of components that loads into it's processes looking into it later, but since you trust a publisher there is no good reasons not to use his software.
It's not intended for making online transactions but just play a game. In my point of view it asks for outbound connections only HL itself, like http and 1698 both tcp ports, case that doesn't look suspicious to me. F4AF now needs inbound and outbound connections to go live and it "could" be considered more dangerous since it requires UDP packets instead of tcp.
If you got a good firewall like outpost thaen there's nothing to be afraid of, just learn how to recognize components and which processes really need to be allowed to use memory injection techiques.
It's not intended for making online transactions but just play a game. In my point of view it asks for outbound connections only HL itself, like http and 1698 both tcp ports, case that doesn't look suspicious to me. F4AF now needs inbound and outbound connections to go live and it "could" be considered more dangerous since it requires UDP packets instead of tcp.
If you got a good firewall like outpost thaen there's nothing to be afraid of, just learn how to recognize components and which processes really need to be allowed to use memory injection techiques.
Nobody Dies For Ever
Skype Contact Name:SubZer0
Skype Contact Name:SubZer0
Who is online
Users browsing this forum: No registered users and 5 guests