Catch up on stories from the past week (and beyond) at the Slashdot story archive

 



Forgot your password?
typodupeerror
×
Microsoft Security IT

Black Screen of Death Not Microsoft's Fault 583

Barence follows up to the ongoing Black Screen of Death Saga by saying "Microsoft says reports of 'Black Screen of Death' errors aren't caused by Windows Updates, as claimed by a British security firm. The software giant claims November's Windows Updates didn't alter registry keys in the way described by Prevx, which said that the Microsoft Patches caused PCs to boot with just a black screen and a Windows Explorer window. Microsoft is now blaming the problem on malware. Prevx has issued a grovelling apology on its own blog."
This discussion has been archived. No new comments can be posted.

Black Screen of Death Not Microsoft's Fault

Comments Filter:
  • Re:malware... (Score:4, Informative)

    by sopssa ( 1498795 ) * <sopssa@email.com> on Wednesday December 02, 2009 @01:19PM (#30299150) Journal

    Not really a surprise though. All the things I've read about Prevx come to just marketing their shit, somewhat like Symantec is. Not really a surprise they'll make shit statements like this and then just 'sorry' afterwards.

  • by geekoid ( 135745 ) <dadinportland&yahoo,com> on Wednesday December 02, 2009 @01:20PM (#30299172) Homepage Journal

    DId you rad the link? this is not being reported by very many people at all.

    And in fact, it isn't their problem.

  • by SuperKendall ( 25149 ) on Wednesday December 02, 2009 @01:31PM (#30299320)

    What do you want them to replace it with? hundreds of .conf files scattered randomly about the filesystem, with no standard format?

    After having used Linux and Windows and OS X systems for years, OS X does this right.

    Yes there are "hundreds of conf files". But they are not scattered around, they are all in ~/Library/Preferences.

    And they are usually named via the company name + app convention, like com.apple.mail.

    And as opposed to being in "no standard format", they are all plist files (which are basically XML).

    So it's easy to find where they are, easy to figure out what plist file belongs to what, and easy to edit or remove them as needed. If there is corruption (which I have never actually seen in practice) it would be limited to a single file - and an app encountering a preference file it could not read would simply replace it with a new default version. You would at worst lose a few custom settings for one app - and even then only as long as it took you to pull a backup of that single file out of Time Machine, since it's easy to restore the preferences for a single application from any backup.

    However, I have to add that even if you went with a Linux system where the conf files are scattered all over in many different forms, I can say with confidence it is still 100% better than the nightmare of the registry. In practice the files are very easy to edit regardless of format, it's really only the question of the location that gets annoying.

  • Re:System Registry (Score:0, Informative)

    by Kill all Muslims ( 845937 ) on Wednesday December 02, 2009 @01:33PM (#30299344) Homepage Journal

    This is already how it is. This particular key exists in HKLM, for which you need Administrator access to write to.

  • Re:System Registry (Score:5, Informative)

    by BarryJacobsen ( 526926 ) on Wednesday December 02, 2009 @01:37PM (#30299388) Homepage

    Maybe one day Microsoft will get rid of the Windows Registry. It's like putting port holes on the bottom of your boat. Sure, they let you see the fish, but sooner or later one is going to break and sink your ship.

    The Windows registry has always been a bane of Windows use since it's inception.

    Because Malware would clearly have trouble modifying the config files that would be used instead?

  • Re:malware... (Score:2, Informative)

    by Ziekheid ( 1427027 ) on Wednesday December 02, 2009 @01:38PM (#30299392)
    Oh wow, we haven't heard that joke before!
  • by Kill all Muslims ( 845937 ) on Wednesday December 02, 2009 @01:38PM (#30299404) Homepage Journal

    It's not really the registry per se; it's the fact that the Win32 API uses NULL-terminated strings while the underlying NT API uses Pascal strings. You can run into similar problems with the file system for the same reason. This dilemma can't really be fixed due to backward compatibility concerns, so this problem will continue to exist in all versions of Windows into the foreseeable future.

  • Comment removed (Score:5, Informative)

    by account_deleted ( 4530225 ) on Wednesday December 02, 2009 @01:44PM (#30299480)
    Comment removed based on user account deletion
  • Re:malware... (Score:1, Informative)

    by Anonymous Coward on Wednesday December 02, 2009 @01:49PM (#30299566)

    To be fair to Obama, George W. Bush was a really horrible president.

  • Re:malware... (Score:3, Informative)

    by MickyTheIdiot ( 1032226 ) on Wednesday December 02, 2009 @01:56PM (#30299674) Homepage Journal

    Unless you make above 500k a year, then he was the best president ever.

  • Re:System Registry (Score:1, Informative)

    by Anonymous Coward on Wednesday December 02, 2009 @02:16PM (#30299948)

    This is what they have. HKLM for important stuff, HKLU for stuff the user can screw around with.

    Oh, you mean you always run as administrator in Windows so malware can screw with HKLM? Well, running as root on Linux will allow malware to screw with your x.conf and you'll have the same problem.

  • Re:Really? (Score:3, Informative)

    by jimicus ( 737525 ) on Wednesday December 02, 2009 @02:25PM (#30300032)

    Does the sudo part really matter anyway? The most important files on my system are those in my home directory and they're owned by my own user account, thus no privilege escalation is required to touch them.

    Furthermore, running with no special privileges you can still:

    - Start a process on an unprivileged port (>1024)
    - Establish a connection to another system.
    - Put a process in the background so it'll still run after you've logged off.
    - Subject to permissions, write to network-mounted filesystems.
    - (depending on cron configuration) Set up a process to run periodically without leaving anything tell-tale to the casual observer in the output of ps unless by sheer blind luck they hit ps when your process is executing. So it would still run on reboot (though it'd be really easy to find if you ever edited your own crontab, a lot of people simply don't bother checking such things).

    All of which are quite enough to set up a system as a node on a hypothetical botnet somewhere. Now all you have to do is spread (easy, you've got enough power in that list to email something to everyone you can think of and stick a copy on a fileserver) and persuade people to run you - either intentionally (Click here for pictures of Britney nekkid!) or unintentionally (bug in email application).

  • by Enderandrew ( 866215 ) <enderandrew&gmail,com> on Wednesday December 02, 2009 @02:31PM (#30300114) Homepage Journal

    When performing a Windows 2000 or XP install, it prompts you to name a user, which is an administrator account.

    So it is designed by default to log you in as an administrator.

  • Re:Really? (Score:5, Informative)

    by TheRaven64 ( 641858 ) on Wednesday December 02, 2009 @02:50PM (#30300360) Journal
    On UNIX-like systems, files are not actually deleted from the disk until the last open file descriptor is closed. You can use this to get completely anonymous temporary files that are garbage-collected when the program abnormally terminates by opening a file and then unlinking it. The file still exists, but it isn't in any directory. When you run the rm command, it and all of its dependent libraries are opened and mapped into the process's address space. Deleting them just removes them from the directory that contains them, it does not return their space for reuse until later.
  • Re:Really? (Score:3, Informative)

    by aix tom ( 902140 ) on Wednesday December 02, 2009 @02:51PM (#30300364)

    In fact, that's one of the main advantages of *nix over Windows. The reason that you have to re-boot windows so much during installations is that you can't delete / replace files while a process is accessing them.

    In *nix you can delete a file while a process is accessing the file, and the process continues to see the file until it finishes, while other, new processes can't see the file.

    Of course, once I started a five-hour database export job, then deleted the target file without realizing it, and after the export finished successfully (since it could still "see" the file it was writing into) the export file was gone.

  • Re:malware... (Score:1, Informative)

    by sexconker ( 1179573 ) on Wednesday December 02, 2009 @03:00PM (#30300480)

    To be fair to Ron Paul, all politicians are really horrible, except for Ron Paul.

  • by Luke727 ( 547923 ) on Wednesday December 02, 2009 @03:51PM (#30301104) Homepage Journal

    If you remove the Win32 API, EVERY WINDOWS APPLICATION EVER WRITTEN breaks. Assuming we don't want to do that, the only other option would be to remove the NT API. Unfortunately, this is the API that allows user-mode applications to communicate with the kernel. I don't think you could write a very useful application that has no ability to access the registry, files, network, hardware, etc, all of which require calls to the kernel. You were right, that *was* easy!

    Obviously you don't know the first thing about the architecture of Windows NT (and judging by many other comments I've read you are not alone). If anybody cares to educate themselves, I highly recommend Windows Internals [microsoft.com].

  • Re:Really? (Score:2, Informative)

    by Corporate Troll ( 537873 ) on Wednesday December 02, 2009 @07:48PM (#30305298) Homepage Journal
    I thought it was an internal bash command. I'm wrong. Doesn't change the argument...

"And remember: Evil will always prevail, because Good is dumb." -- Spaceballs

Working...