Green Dam Youth Escort is the censor ware developed and distributed by Chinese government to filter ‘harmful’ content. Here are some details about the working of the software.

‘Green Dam-Youth Escort’ will filter

All text editors on the market (EditPlus, UltraEdit, EmEditor),
Office software suites (WPS, MS Office),
E-mail clients,
Instant messaging clients
Browsers

Green Dam-Youth Escort will ‘force’ you to do some work

Green Dam controls the time minors spend online, using QQ or MSN, and playing games.

Green Dam effectively eliminates Internet addiction.

If any word resembling “Falun Gong” is entered into either Notepad or WordPad, the application will shut down

Filter porn images based on skin tone.

It recognizes humans

How Green Dam-Youth Escort filter works?

“Green Dam” utilizes the Winsock2 SPI port to obtain data from both sender and recipient, and through analyzing these data, obtains http data.

Two processes, xdaemon.exe and xnet2.exe screens of anti-circumvention software, such as FreeGate.

Beijing Dazheng Language Technology Co. Ltd.’s text filtering engine is used.

Green Dam updates automatically online.

Upon discovery of harmful information, report automatically to Jinhui Corporation

Current versions only support Windows; effective only when used in conjunction with Internet Explorer or Google Chrome, it has no effect when used with Firefox.

Explore More

What are the countermeasures against software keyloggers?

It is very hard to detect a keylogger’s activity. Hence, a Network Administrator should take the following steps as countermeasures against software keyloggers: * Actively monitor the programs running on

Critical SQL Injection in Myanmar Teleport – Myanmar Internet Service Provider (formerly known as BaganNet)

PlanetCreator has reported another critical SQL Injection (vulnerability) on Myanmar Teleport – Myanmar Internet Service Provider (formerly known as BaganNet) http://www.myantel.net.mm/ SQL injection is a code injection technique that exploits

What Damage Can Hackers Do?

Hackers like to subvert computer security without permission. They are cyber criminals. This can mean gaining access to a computer across the Internet for illicit purposes. They might engage in