Green Dam Youth Escort is the censor ware developed and distributed by Chinese government to filter ‘harmful’ content. Here are some details about the working of the software.

‘Green Dam-Youth Escort’ will filter

All text editors on the market (EditPlus, UltraEdit, EmEditor),
Office software suites (WPS, MS Office),
E-mail clients,
Instant messaging clients
Browsers

Green Dam-Youth Escort will ‘force’ you to do some work

Green Dam controls the time minors spend online, using QQ or MSN, and playing games.

Green Dam effectively eliminates Internet addiction.

If any word resembling “Falun Gong” is entered into either Notepad or WordPad, the application will shut down

Filter porn images based on skin tone.

It recognizes humans

How Green Dam-Youth Escort filter works?

“Green Dam” utilizes the Winsock2 SPI port to obtain data from both sender and recipient, and through analyzing these data, obtains http data.

Two processes, xdaemon.exe and xnet2.exe screens of anti-circumvention software, such as FreeGate.

Beijing Dazheng Language Technology Co. Ltd.’s text filtering engine is used.

Green Dam updates automatically online.

Upon discovery of harmful information, report automatically to Jinhui Corporation

Current versions only support Windows; effective only when used in conjunction with Internet Explorer or Google Chrome, it has no effect when used with Firefox.

Explore More

Critical xss vulnerabilities at classified listings site Ads.com.mm

PlanetCreator has reported another critical XSS Vulnerability on classified listings site Ads.com.mm Cross Site Scripting is a client-side attack where an attacker can craft a malicious link, containing script- code

Ethical Hacker

Gmail Fake login page using XSS vulnerability on google mail A XSS vulnerability in Gmail allow hackers to create fake login page and show the domain name as mail.google.com.See the

What are the phases of malicious hacking?

The following are the phases of malicious hacking: 1. Reconnaissance: In this phase, the attacker gathers information about the victim. 2. Scanning: In this phase, the attacker begins to probe