|
Phoning home, in computing, refers to an act of client to server communication which is undesirable to the user and/or proprietor of the device or software. It is often used to refer to the behavior of security systems which report network location, username, or other such data to another computer. Phoning home may be useful for the proprietor in tracking a missing or stolen computer. This type of phoning home is frequently used on mobile computers at corporations. It typically involves a software agent which is difficult to detect or remove.〔Technology Meetings Website - http://technologymeetings.com/ar/meetings_catch_laptop_thief/index.htm〕 However, there are malicious types of phoning home such as surreptitious communication between applications or hardware installed at end-user sites and their manufacturers or developers. The traffic may be encrypted to make it difficult or impractical for the end-user to determine what data are being transmitted.〔ZoneAlarm phones home, Apple throws Intel a bone http://www.infoworld.com/article/06/01/13/73792_03OPcringley_1.html〕 The Stuxnet attack on Iran's nuclear facilities was facilitated by phone home technology as reported by The New York Times. ==Legal phoning home== There are some uses for the phoning home practice that are legal in some countries. For example: Phoning home could be for purposes of access restriction, such as transmitting an authorization key. This is done with the Adobe Creative Suite. Each time one of the programs is opened, it phones home with the serial number. If the serial number is listed as being already in use, or a fake, then the program will present the user with the option of inputting the correct serial number. If the user refuses, the next time the program loads, it will operate in trial mode until a valid serial number has been input. However, the method can be thwarted by either disabling the internet connection when starting the program or adding a firewall or Hosts file rule to prevent the program from communicating with the verification server. Phoning home could also be for marketing purposes, such as the "Sony BMG Rootkit", which transmits a hash of the currently playing CD back to Sony, or a digital video recorder (DVR) reporting on viewing habits. High-end computing systems such as mainframes have had 'phone home' capabilities for many years, to alert the manufacturer of hardware problems with the mainframes or disk storage subsystems (this enables repair or maintenance to be performed quickly and even proactively under the maintenance contract).〔IBM EServer and ZSeries and S/390 Servers - http://books.google.com/books?id=NtHhpIjIFMEC&pg=PA9&lpg=PA9&dq=%22phone+home%22+mainframes&source=bl&ots=iXj04sMVQ6&sig=L3_rOl6Xsik0Bi4DTigwnNb2DwI&hl=en&sa=X&oi=book_result&resnum=4&ct=result#PPA9,M1〕 Similarly, high-volume copy machines have long been equipped with phone-home capabilities, both for billing and for preventive/predictive-maintenance purposes.〔Xerox Model 1090 Copier/Duplicator User Guide. Xerox Corporation, Stamford, Connecticut and North York, Ontario, Canada, August 1990.〕 Aside from malicious software phoning home, phoning home may be done to track computer assets—especially mobile computers. One of the most well-known software applications that leverages phoning home for tracking is Absolute Software's CompuTrace. This software employs an agent which calls into an Absolute-managed server on regular intervals with information companies or the police can use to locate a missing computer.〔Absolute Software's website: http://www.absolute.com/〕 抄文引用元・出典: フリー百科事典『 ウィキペディア(Wikipedia)』 ■ウィキペディアで「Phoning home」の詳細全文を読む スポンサード リンク
|