{"id":1102,"date":"2004-11-14T18:05:01","date_gmt":"2004-11-14T16:05:01","guid":{"rendered":"https:\/\/www.fullo.net\/blog\/index.php\/archives\/2004\/11\/14\/lexmark-e-spyware\/"},"modified":"2006-07-06T09:13:17","modified_gmt":"2006-07-06T07:13:17","slug":"lexmark-e-spyware","status":"publish","type":"post","link":"https:\/\/www.fullo.net\/blog\/2004\/11\/14\/lexmark-e-spyware\/","title":{"rendered":"lexmark e spyware"},"content":{"rendered":"<p>scovato grazie a <a href=\"http:\/\/wikilab.net\/archivi\/2004\/11\/12\/lexmark-un-altra-blog-debacle\/\">wikilab<\/a><\/p>\n<blockquote><p>Yes, Lexmark is now in the Spyware business!<\/p>\n<p>Just the other day I purchased a new Lexmark X5250 All-in-one printer. I installed it as per the instructions and monitored the install with Norton as I do with all new software.<\/p>\n<p>On reviewing the install log I noticed a program called Lx_CATS had been placed in the c:\\program files directory. I investigated and found a data log and an initialisation file called Lx_CATS.ini. Further investigation of this file showed that Lexmark had, without my permission, loaded a Trojan backdoor on to my computer. Furthermore,<br \/>\nit is embedded into the system registry, so average users would likely never know it was there and active.<\/p>\n<p>This Lexmark Trojan was programmed to monitor my use of the printer by way of data collected from two DLLs in the c:\\program files\\lexmark500 folder. The Trojan would then send information on printer usage, including types of print activity, scanning activity, OCR activity etc., back to a hidden URL at 30 day intervals.<br \/>\n[<a href=\"http:\/\/groups.google.it\/groups?hl=it&#038;lr=&#038;frame=right&#038;th=4a51ef4144963b85&#038;seekm=3ec7f2e1.0411090817.3c9c0c7%40posting.google.com#link1\">continua<\/a>]<\/p><\/blockquote>\n<p>ciuaz<\/p>\n","protected":false},"excerpt":{"rendered":"<p>scovato grazie a wikilab Yes, Lexmark is now in the Spyware business! Just the other day I purchased a new Lexmark X5250 All-in-one printer. I installed it as per the instructions and monitored the install with Norton as I do with all new software. On reviewing the install log I noticed a program called Lx_CATS [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"jetpack_post_was_ever_published":false,"_jetpack_newsletter_access":"","_jetpack_dont_email_post_to_subs":false,"_jetpack_newsletter_tier_id":0,"_jetpack_memberships_contains_paywalled_content":false,"_jetpack_memberships_contains_paid_content":false,"footnotes":"","jetpack_publicize_message":"","jetpack_publicize_feature_enabled":true,"jetpack_social_post_already_shared":false,"jetpack_social_options":{"image_generator_settings":{"template":"highway","default_image_id":0,"font":"","enabled":false},"version":2}},"categories":[5],"tags":[150,151,152],"class_list":["post-1102","post","type-post","status-publish","format-standard","hentry","category-tecnologia","tag-lexmark","tag-spyware","tag-trojan"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.5 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>lexmark e spyware - Fullo<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.fullo.net\/blog\/2004\/11\/14\/lexmark-e-spyware\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"lexmark e spyware - Fullo\" \/>\n<meta property=\"og:description\" content=\"scovato grazie a wikilab Yes, Lexmark is now in the Spyware business! Just the other day I purchased a new Lexmark X5250 All-in-one printer. I installed it as per the instructions and monitored the install with Norton as I do with all new software. On reviewing the install log I noticed a program called Lx_CATS [&hellip;]\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.fullo.net\/blog\/2004\/11\/14\/lexmark-e-spyware\/\" \/>\n<meta property=\"og:site_name\" content=\"Fullo\" \/>\n<meta property=\"article:published_time\" content=\"2004-11-14T16:05:01+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2006-07-06T07:13:17+00:00\" \/>\n<meta name=\"author\" content=\"Francesco Fullone\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@fullo\" \/>\n<meta name=\"twitter:site\" content=\"@fullo\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Francesco Fullone\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"1 minute\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.fullo.net\\\/blog\\\/2004\\\/11\\\/14\\\/lexmark-e-spyware\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.fullo.net\\\/blog\\\/2004\\\/11\\\/14\\\/lexmark-e-spyware\\\/\"},\"author\":{\"name\":\"Francesco Fullone\",\"@id\":\"https:\\\/\\\/www.fullo.net\\\/blog\\\/#\\\/schema\\\/person\\\/24e91bc6caea6c411a8668df5639428c\"},\"headline\":\"lexmark e spyware\",\"datePublished\":\"2004-11-14T16:05:01+00:00\",\"dateModified\":\"2006-07-06T07:13:17+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.fullo.net\\\/blog\\\/2004\\\/11\\\/14\\\/lexmark-e-spyware\\\/\"},\"wordCount\":179,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\\\/\\\/www.fullo.net\\\/blog\\\/#\\\/schema\\\/person\\\/24e91bc6caea6c411a8668df5639428c\"},\"keywords\":[\"lexmark\",\"spyware\",\"trojan\"],\"articleSection\":[\"tecnologia\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\\\/\\\/www.fullo.net\\\/blog\\\/2004\\\/11\\\/14\\\/lexmark-e-spyware\\\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.fullo.net\\\/blog\\\/2004\\\/11\\\/14\\\/lexmark-e-spyware\\\/\",\"url\":\"https:\\\/\\\/www.fullo.net\\\/blog\\\/2004\\\/11\\\/14\\\/lexmark-e-spyware\\\/\",\"name\":\"lexmark e spyware - Fullo\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.fullo.net\\\/blog\\\/#website\"},\"datePublished\":\"2004-11-14T16:05:01+00:00\",\"dateModified\":\"2006-07-06T07:13:17+00:00\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.fullo.net\\\/blog\\\/2004\\\/11\\\/14\\\/lexmark-e-spyware\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.fullo.net\\\/blog\\\/2004\\\/11\\\/14\\\/lexmark-e-spyware\\\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.fullo.net\\\/blog\\\/2004\\\/11\\\/14\\\/lexmark-e-spyware\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.fullo.net\\\/blog\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"lexmark e spyware\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.fullo.net\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/www.fullo.net\\\/blog\\\/\",\"name\":\"Fullo\",\"description\":\"nulla e&#039; impossibile per chi non lo deve fare!\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.fullo.net\\\/blog\\\/#\\\/schema\\\/person\\\/24e91bc6caea6c411a8668df5639428c\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.fullo.net\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":[\"Person\",\"Organization\"],\"@id\":\"https:\\\/\\\/www.fullo.net\\\/blog\\\/#\\\/schema\\\/person\\\/24e91bc6caea6c411a8668df5639428c\",\"name\":\"Francesco Fullone\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/i0.wp.com\\\/www.fullo.net\\\/blog\\\/wp-content\\\/uploads\\\/2024\\\/10\\\/hawiaina-gold-circled-white.png?fit=622%2C622&ssl=1\",\"url\":\"https:\\\/\\\/i0.wp.com\\\/www.fullo.net\\\/blog\\\/wp-content\\\/uploads\\\/2024\\\/10\\\/hawiaina-gold-circled-white.png?fit=622%2C622&ssl=1\",\"contentUrl\":\"https:\\\/\\\/i0.wp.com\\\/www.fullo.net\\\/blog\\\/wp-content\\\/uploads\\\/2024\\\/10\\\/hawiaina-gold-circled-white.png?fit=622%2C622&ssl=1\",\"width\":622,\"height\":622,\"caption\":\"Francesco Fullone\"},\"logo\":{\"@id\":\"https:\\\/\\\/i0.wp.com\\\/www.fullo.net\\\/blog\\\/wp-content\\\/uploads\\\/2024\\\/10\\\/hawiaina-gold-circled-white.png?fit=622%2C622&ssl=1\"},\"sameAs\":[\"http:\\\/\\\/www.fullo.net\",\"https:\\\/\\\/www.linkedin.com\\\/in\\\/fullo\",\"https:\\\/\\\/x.com\\\/fullo\"],\"url\":\"https:\\\/\\\/www.fullo.net\\\/blog\\\/author\\\/fullo\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"lexmark e spyware - Fullo","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.fullo.net\/blog\/2004\/11\/14\/lexmark-e-spyware\/","og_locale":"en_US","og_type":"article","og_title":"lexmark e spyware - Fullo","og_description":"scovato grazie a wikilab Yes, Lexmark is now in the Spyware business! Just the other day I purchased a new Lexmark X5250 All-in-one printer. I installed it as per the instructions and monitored the install with Norton as I do with all new software. On reviewing the install log I noticed a program called Lx_CATS [&hellip;]","og_url":"https:\/\/www.fullo.net\/blog\/2004\/11\/14\/lexmark-e-spyware\/","og_site_name":"Fullo","article_published_time":"2004-11-14T16:05:01+00:00","article_modified_time":"2006-07-06T07:13:17+00:00","author":"Francesco Fullone","twitter_card":"summary_large_image","twitter_creator":"@fullo","twitter_site":"@fullo","twitter_misc":{"Written by":"Francesco Fullone","Est. reading time":"1 minute"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.fullo.net\/blog\/2004\/11\/14\/lexmark-e-spyware\/#article","isPartOf":{"@id":"https:\/\/www.fullo.net\/blog\/2004\/11\/14\/lexmark-e-spyware\/"},"author":{"name":"Francesco Fullone","@id":"https:\/\/www.fullo.net\/blog\/#\/schema\/person\/24e91bc6caea6c411a8668df5639428c"},"headline":"lexmark e spyware","datePublished":"2004-11-14T16:05:01+00:00","dateModified":"2006-07-06T07:13:17+00:00","mainEntityOfPage":{"@id":"https:\/\/www.fullo.net\/blog\/2004\/11\/14\/lexmark-e-spyware\/"},"wordCount":179,"commentCount":0,"publisher":{"@id":"https:\/\/www.fullo.net\/blog\/#\/schema\/person\/24e91bc6caea6c411a8668df5639428c"},"keywords":["lexmark","spyware","trojan"],"articleSection":["tecnologia"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.fullo.net\/blog\/2004\/11\/14\/lexmark-e-spyware\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/www.fullo.net\/blog\/2004\/11\/14\/lexmark-e-spyware\/","url":"https:\/\/www.fullo.net\/blog\/2004\/11\/14\/lexmark-e-spyware\/","name":"lexmark e spyware - Fullo","isPartOf":{"@id":"https:\/\/www.fullo.net\/blog\/#website"},"datePublished":"2004-11-14T16:05:01+00:00","dateModified":"2006-07-06T07:13:17+00:00","breadcrumb":{"@id":"https:\/\/www.fullo.net\/blog\/2004\/11\/14\/lexmark-e-spyware\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.fullo.net\/blog\/2004\/11\/14\/lexmark-e-spyware\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/www.fullo.net\/blog\/2004\/11\/14\/lexmark-e-spyware\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.fullo.net\/blog\/"},{"@type":"ListItem","position":2,"name":"lexmark e spyware"}]},{"@type":"WebSite","@id":"https:\/\/www.fullo.net\/blog\/#website","url":"https:\/\/www.fullo.net\/blog\/","name":"Fullo","description":"nulla e&#039; impossibile per chi non lo deve fare!","publisher":{"@id":"https:\/\/www.fullo.net\/blog\/#\/schema\/person\/24e91bc6caea6c411a8668df5639428c"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.fullo.net\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":["Person","Organization"],"@id":"https:\/\/www.fullo.net\/blog\/#\/schema\/person\/24e91bc6caea6c411a8668df5639428c","name":"Francesco Fullone","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/i0.wp.com\/www.fullo.net\/blog\/wp-content\/uploads\/2024\/10\/hawiaina-gold-circled-white.png?fit=622%2C622&ssl=1","url":"https:\/\/i0.wp.com\/www.fullo.net\/blog\/wp-content\/uploads\/2024\/10\/hawiaina-gold-circled-white.png?fit=622%2C622&ssl=1","contentUrl":"https:\/\/i0.wp.com\/www.fullo.net\/blog\/wp-content\/uploads\/2024\/10\/hawiaina-gold-circled-white.png?fit=622%2C622&ssl=1","width":622,"height":622,"caption":"Francesco Fullone"},"logo":{"@id":"https:\/\/i0.wp.com\/www.fullo.net\/blog\/wp-content\/uploads\/2024\/10\/hawiaina-gold-circled-white.png?fit=622%2C622&ssl=1"},"sameAs":["http:\/\/www.fullo.net","https:\/\/www.linkedin.com\/in\/fullo","https:\/\/x.com\/fullo"],"url":"https:\/\/www.fullo.net\/blog\/author\/fullo\/"}]}},"jetpack_publicize_connections":[],"jetpack_featured_media_url":"","jetpack_sharing_enabled":true,"jetpack_shortlink":"https:\/\/wp.me\/p3OSc1-hM","jetpack_likes_enabled":true,"jetpack-related-posts":[{"id":1404,"url":"https:\/\/www.fullo.net\/blog\/2005\/05\/20\/aurora-spyware\/","url_meta":{"origin":1102,"position":0},"title":"aurora spyware","author":"Francesco Fullone","date":"20\/05\/2005","format":false,"excerpt":"se vi imbattete in questo fastidiosissimo spyware che (attualmente) non viene rimosso da spybot, ms spyware e adware provate a seguire questa procedura. ciuaz","rel":"","context":"In &quot;sysadmin&quot;","block_context":{"text":"sysadmin","link":"https:\/\/www.fullo.net\/blog\/category\/tecnologia\/amministrazione-di-sistema\/"},"img":{"alt_text":"","src":"","width":0,"height":0},"classes":[]},{"id":1166,"url":"https:\/\/www.fullo.net\/blog\/2004\/12\/23\/spyware\/","url_meta":{"origin":1102,"position":1},"title":"spyware!","author":"Francesco Fullone","date":"23\/12\/2004","format":false,"excerpt":"andrea beggi spiega come eliminare uno spyware fastidiosissimo, ma ancora senza nome, dal proprio computer. ciauz","rel":"","context":"In &quot;tecnologia&quot;","block_context":{"text":"tecnologia","link":"https:\/\/www.fullo.net\/blog\/category\/tecnologia\/"},"img":{"alt_text":"","src":"","width":0,"height":0},"classes":[]},{"id":1410,"url":"https:\/\/www.fullo.net\/blog\/2005\/05\/23\/aurora-spyware-2\/","url_meta":{"origin":1102,"position":2},"title":"aurora spyware (2)","author":"Francesco Fullone","date":"23\/05\/2005","format":false,"excerpt":"pare che il maledetto spyware sia tornato alla carica con una serie di biechi trucchetti, per fortuna c'\u00e8 gi\u00e0 chi ha gi\u00e0 preparato una pezza, nello specifico i metodi per identificarlo e rimuoverlo adesso sono 3: la rc2 di spybot-search & destroy, unico neo \u00e8 che bisogna utilizzarla con il\u2026","rel":"","context":"In &quot;sysadmin&quot;","block_context":{"text":"sysadmin","link":"https:\/\/www.fullo.net\/blog\/category\/tecnologia\/amministrazione-di-sistema\/"},"img":{"alt_text":"","src":"","width":0,"height":0},"classes":[]},{"id":1725,"url":"https:\/\/www.fullo.net\/blog\/2005\/11\/03\/drm-sony-e-rootkit\/","url_meta":{"origin":1102,"position":3},"title":"DRM, Sony e rootkit","author":"Francesco Fullone","date":"03\/11\/2005","format":false,"excerpt":"Del Rootkit di Sony ne ho parlato qualche giorno fa su Downloadblog.it, quello che non sapevo \u00e8 che se viene disinstallato impedisce il corretto utilizzo del lettore CD del proprio computer. F-Secure pubblica questa notizia insiema all'avviso che l'unico modo per rimuovere il software malevolo \u00e8 di chiedere il permesso\u2026","rel":"","context":"In &quot;pensieri&quot;","block_context":{"text":"pensieri","link":"https:\/\/www.fullo.net\/blog\/category\/pensieri\/"},"img":{"alt_text":"","src":"","width":0,"height":0},"classes":[]},{"id":2307,"url":"https:\/\/www.fullo.net\/blog\/2007\/07\/15\/nuovo-aggiornamento-per-n95\/","url_meta":{"origin":1102,"position":4},"title":"Nuovo aggiornamento per N95","author":"Francesco Fullone","date":"15\/07\/2007","format":false,"excerpt":"Oggi, contestualmente all'aggiornamento della Nokia PCSuite \u00e8 partito anche il download del nuovo firmware per il Nokia N95, non so se \u00e8 una vera e propria novit\u00e0, la mia macchina windows \u00e8 stata spenta per circa 2 settimane per\u00f2 la cosa mi ha stuzzicato l'interesse e la voglia di aggiornare.\u2026","rel":"","context":"In &quot;tecnologia&quot;","block_context":{"text":"tecnologia","link":"https:\/\/www.fullo.net\/blog\/category\/tecnologia\/"},"img":{"alt_text":"","src":"","width":0,"height":0},"classes":[]},{"id":1292,"url":"https:\/\/www.fullo.net\/blog\/2005\/03\/07\/gds-google-desktop-search\/","url_meta":{"origin":1102,"position":5},"title":"GDS: google desktop search","author":"Francesco Fullone","date":"07\/03\/2005","format":false,"excerpt":"su wikilab \u00e8 descritta la nuova versione, la definitiva, di google desktop search. Ed ho subito notato due cose allarmanti, la prima che: GDS offre anche un interfaccia per aggiungere funzionalit\u00e0 di ricerca alle proprie applicazioni (non solo quelle di GDS, quelle di Google in genere). la seconda invece che\u2026","rel":"","context":"In &quot;pensieri&quot;","block_context":{"text":"pensieri","link":"https:\/\/www.fullo.net\/blog\/category\/pensieri\/"},"img":{"alt_text":"","src":"","width":0,"height":0},"classes":[]}],"_links":{"self":[{"href":"https:\/\/www.fullo.net\/blog\/wp-json\/wp\/v2\/posts\/1102","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.fullo.net\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.fullo.net\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.fullo.net\/blog\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.fullo.net\/blog\/wp-json\/wp\/v2\/comments?post=1102"}],"version-history":[{"count":0,"href":"https:\/\/www.fullo.net\/blog\/wp-json\/wp\/v2\/posts\/1102\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.fullo.net\/blog\/wp-json\/wp\/v2\/media?parent=1102"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.fullo.net\/blog\/wp-json\/wp\/v2\/categories?post=1102"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.fullo.net\/blog\/wp-json\/wp\/v2\/tags?post=1102"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}