Green Dam Youth Escort is the censor ware developed and distributed by Chinese government to filter ‘harmful’ content. Here are some details about the working of the software.

‘Green Dam-Youth Escort’ will filter

All text editors on the market (EditPlus, UltraEdit, EmEditor),
Office software suites (WPS, MS Office),
E-mail clients,
Instant messaging clients
Browsers

Green Dam-Youth Escort will ‘force’ you to do some work

Green Dam controls the time minors spend online, using QQ or MSN, and playing games.

Green Dam effectively eliminates Internet addiction.

If any word resembling “Falun Gong” is entered into either Notepad or WordPad, the application will shut down

Filter porn images based on skin tone.

It recognizes humans

How Green Dam-Youth Escort filter works?

“Green Dam” utilizes the Winsock2 SPI port to obtain data from both sender and recipient, and through analyzing these data, obtains http data.

Two processes, xdaemon.exe and xnet2.exe screens of anti-circumvention software, such as FreeGate.

Beijing Dazheng Language Technology Co. Ltd.’s text filtering engine is used.

Green Dam updates automatically online.

Upon discovery of harmful information, report automatically to Jinhui Corporation

Current versions only support Windows; effective only when used in conjunction with Internet Explorer or Google Chrome, it has no effect when used with Firefox.

Explore More

[Crimeware] Researches and Reversing about Eleonore Exploit Pack

A very nice paper about eleonore exploit pack by Evilcry /*##############################################*/ Hi, Today we will see how works Eleonore Exploit Pack directly from an infected website. Essentially Eleonore Exploit Pack

LDAP Injection Vulnerabilities

LDAP Injection Overview LDAP Injection attacks are not as common as the other types of injection attacks, but if your product uses an LDAP server this must be tested. An

Methods of Making Your Trojans/Bots F/Undetecable

1. Crypters/Binders. This is By far the most Common Way to Make Your Trojan Undetectable. Almost everyone Who Makes There Trojans Undetectable Uses a Public Crypter, My First Public Crypter,