Tan Kit Hoong
Member
Registered: Dec 1999
Location: Kuala Lumpur
Posts: 247 |
I'm talking about the EEPROM, PDAENVY - for example, the Palm Vx has 2MBs worth of EEPROM where the actual OS and default apps are stored.
This is flashable like when you do an OS upgrade to OS3.5 from OS3.1.
However, with a program like FlashPro, you CAN actually have access to the EEPROM to store apps (and it works similar to the FileMover, except that instead of moving file from RAM to SpringBoard module, it moves it right into the EEPROM) - out of the 2MBs of flash EEPROM (different from the 8MBs of RAM) on the Palm Vx, there is still about 800K that is free. With programs like FlashPro (from TRG), you can actually store apps right on the EEPROM. Some people have actually flashed DateBk4 into this space. Yes, since it is stored on the EEPROM, a hard reset WILL NOT clear the DateBk 4 that's been flashed into the it.
I have personally used FlashPro to do this and have even deleted some built-in Palm apps from the ROM, like the "Welcome" app for example.
Therefore, by the same extension, if I modified FlashPro a little bit, added some malicious code into it and disguised it as, say, a game, then the next time you install it on your Palm Vx and click on it, it could conceivably start a process which will write the malicious code right into your EEPROM, causing havoc with the Palm which even a hard reset could not cure.
JackFlash is also another application that can access the Palm's flashable EEPROM: http://www.palmgear.com/software/sh...cfm?prodID=5347
FlashPro : http://www.palmgear.com/software/sh...amp;prodID=2611
Check out the documentation. I've given this a lot of thought and I think it's entirely possible and quite scary if you are a Palm Vx, Palm IIIc, Palm IIIxe or TRGPro owner.
[Edited by Tan Kit Hoong on 11-28-2000 at 09:45 AM]
__________________
Tan Kit Hoong,
Star Publications (M) Ltd
<img src="http://thestar.com.my/tech/images/thestar_140x45.gif">
|