Green Dam Youth Escort is the censor ware developed and distributed by Chinese government to filter ‘harmful’ content. Here are some details about the working of the software.

‘Green Dam-Youth Escort’ will filter

All text editors on the market (EditPlus, UltraEdit, EmEditor),
Office software suites (WPS, MS Office),
E-mail clients,
Instant messaging clients
Browsers

Green Dam-Youth Escort will ‘force’ you to do some work

Green Dam controls the time minors spend online, using QQ or MSN, and playing games.

Green Dam effectively eliminates Internet addiction.

If any word resembling “Falun Gong” is entered into either Notepad or WordPad, the application will shut down

Filter porn images based on skin tone.

It recognizes humans

How Green Dam-Youth Escort filter works?

“Green Dam” utilizes the Winsock2 SPI port to obtain data from both sender and recipient, and through analyzing these data, obtains http data.

Two processes, xdaemon.exe and xnet2.exe screens of anti-circumvention software, such as FreeGate.

Beijing Dazheng Language Technology Co. Ltd.’s text filtering engine is used.

Green Dam updates automatically online.

Upon discovery of harmful information, report automatically to Jinhui Corporation

Current versions only support Windows; effective only when used in conjunction with Internet Explorer or Google Chrome, it has no effect when used with Firefox.

Explore More

Bypassing Shell Security

Safemode = On (Secure) Disables Functions = dl, passthru, proc_open, proc_nice, proc_terminate, proc_get_status, proc_close, pfsockopen, leak, apache_child_terminate, posix_kill, posix_mkfifo, posix_setpgid, posix_setsid, posix_setuid ================ Create A File “Php.ini” In Some Writeable

You’ve Hired a Hacker (Section 3)

Section 3: Productivity 3.1: My hacker plays video games on company time. Abraham Lincoln said, “If I had ten hours to chop down an oak tree, I’d spend the first

What are the various steps in the pre-attack phase?

In the pre-attack phase, there are seven steps, which have been defined by the EC-Council, as follows: 1. Information gathering 2. Determining network range 3. Identifying active machines 4. Finding