Security Affecting Microsoft's Bottom Line 416
kidlinux writes "The Globe and Mail has an article discussing the impact of viruses and security flaws in Windows. Apparently Microsoft has bounties out on virus writers. 'The campaign reveals just how much of a threat to Microsoft's bottom line security flaws now represent.' The effects of various worms and security issues are becoming visible in financial terms - having to deal with the security issues keeps Microsoft from closing new deals, and governments and businesses are starting to look at the alternatives, such as Linux. 'For the first time, it seemed, flaws in Microsoft's software were translating into flaws in the company's business model.'"
They really are far overreacting about this. (Score:3, Insightful)
Re:They really are far overreacting about this. (Score:5, Insightful)
Re:They really are far overreacting about this. (Score:4, Funny)
If they are going to grow like they have in the past, we're gonna have to populate a few new planets and then let the sonofabitches take monopoly shares of the OS market there too!
Re:They really are far overreacting about this. (Score:3, Insightful)
Re:They really are far overreacting about this. (Score:3, Insightful)
Thinking about tabletPC? What OS is on that?
Think of a games console.
Thinking Xbox? What OS is on that?
Insidious little company, this upstart from Redmond. We should nip it in the bud before it starts becoming a problem for all us C/PM users.
Re:They really are far overreacting about this. (Score:3, Informative)
Re:They really are far overreacting about this. (Score:3, Insightful)
Re:They really are far overreacting about this. (Score:5, Interesting)
Yeah, I just found my next PDA (if my old Pilot III ever wears out) at Costco. From Sharp. Looks like a Palm Pilot to me. Has all the USEFUL functionality of a Palmtop. Can sync with a PC etc. $25.
My last two cell phone were free. One as a "Good Customer Bonus" from AT&T, and the other as a Sign-up reward from Verizon. You CAN pay a lot for a cell phone, but the vast majority of users won't.
A $200 operating system for my microwave? Hmmm I don't think so.
I'm not saying the embedded market isn't important. It will be at the heart of everything we do with electronics. I'm just not sure that Microsoft is prepared to only make two dollars a pop on Windows CE. This is not how they are going to achieve new market share. That is, unless they decide to merge with Sony or something in which case they will soon cease to be Microsoft as we know it an will become a part of a much more intricate Borg.
Re:They really are far overreacting about this. (Score:5, Insightful)
Actually, since Microsoft has stated one of its ultimate goals is to have only one codebase for all of their versions of OS, mr. PDA had damned well better be concerned about the same vulnerabilities the "server admins" are concerned about. Search Microsoft's web site for their version of the "smart" home. Then, think to yourself, if my entire home is running Microsoft OS, and MS has achieved their goal of every appliance being internet enabled, what happens when the Slammer2008 (or whatever) worm hits? It won't be just you locked out of your PC, but you locked out of your home. It won't be a matter of your e-mail client filling up, and annoying you with 600+ "emails" an hour, it will be your house cooking every bit of food you have stored, at 500 degrees, all afternoon while you're at work. I could go on, but what's the point? Call me a paranoid, but I have a cabin in the hills, which will not be automated.
As an interesting side note, Microsoft has stated they could not afford (even with >$50BILLION) to go back to the drawing board and rewrite their OS in a modern and secure manner. They are now telling AMD and Intel to enable code security in the CPU. Must be nice to make others clean up your own mess all the time, huh?
Re:They really are far overreacting about this. (Score:5, Interesting)
I have talked to many people who seriously were considering disconnecting from the internet due to worms. I suggested using something other than Outlook, and most of the problems would disappear. And don't use IE.
There was a phone-in program on CBC the other day about this. There was an obvious chasm of experience between those who used Windows and those who didn't, ie Mac, linux, etc. It was amusing to hear a professor at a university say that he was moving away from using computers for sending stuff back and forth due to the instability of it all. Yes, and putting the blame squarely on Microsoft.
Microsoft has a real serious problem here. The solution is very scary for them: put all their best and smartest programmers for the next 3 years on rewriting critical parts of their application stack. Will they be able to hold onto the market? Will they be able to hold on to their talent? All this to produce something that is unmarketable.
It is very funny actually. Microsoft spent years building a marketplace that functions the way they want. Then some kid spends 15 minutes writing a script (yes, it is that easy) and the whole thing tumbles down.
Derek
Re:They really are far overreacting about this. (Score:2)
This will hurt even Microsoft. Governments, small businesses, developing countries, and people who don't want to or can't afford to spend $500 on Windows/Office will continue to eat away at MS desktop sales.
time to protect the monolpoly (Score:5, Insightful)
Is it really easier or more cost-effective to change the world (pay bounties for crackers, lobby for prtctionist laws) than to change your business practices (write more secure software)?
This had better be a temporary endeavor conducted in parallel with major shifts toward better busines practices, or MS is starting the downward spiral.
Maybe that's why they coneived .NET (Score:5, Insightful)
Re:Maybe that's why they coneived .NET (Score:2)
That was one of the core idea of Java. Microsoft takes these ideas and makes them easier to use. Security is hard to understand. That's usually the first thing they remove to make their shit popular. How much of the code of a real production system will be secure managed code? And how much of it will be "fast" and "easy to use"?
Re:Maybe that's why they coneived .NET (Score:5, Informative)
Re:Maybe that's why they coneived .NET (Score:2)
Of course there is no silver bullet to make your code secure and robust. Just because a buffer overflow is impossible or remote code execution/system privilege or root is unattainable, it doesn't mean someone can take advantage of a badly written service that doesn't check ar
Re:Maybe that's why they coneived .NET (Score:5, Informative)
Re:Maybe that's why they coneived .NET (Score:5, Interesting)
Garbage collection is no cure for intentionally failing to follow secure practice by default in order to "enhance the user experience" or gain an apparent performance advantage over those systems that use some portion of machine capacity to maintain security.
Ever denormalize a database to gain performance? Well, than you serve as an example yourself of the sort of thing Microsoft does. That performance increase came at the price of less secure data (in the sense that your data can become unintentionally corrupted).
If you make choices of that nature in kernel space no programing enviroment in the world is going to save your security ass.
KFG
Re:Maybe that's why they coneived .NET (Score:3, Interesting)
Hrm... with Microsoft's track record, and the Mono Projects [[really big]] gaping flaws... do you really belive that?
.NET becomes the de-facto API for programming... in the case that is [[probably is]] flawed, instead of having one or two gaping holes
Better Yet, lets imagine
Re:time to protect the monolpoly (Score:3, Insightful)
Yes, yes and not exactly.
My impression is that Microsoft is fully engaged in attempting to address their security problems. They will persue both tracks you mention, and any others that present themselves, to try and get a handle on the situation. However, I disagree that this is the beginning of a downward spiral for Microsoft. The hits they are taking no
It gets better (Score:3, Insightful)
Sooner or later the stock would hit its limit,
Re:time to protect the monolpoly (Score:2, Interesting)
My thought is that Microsoft does not know how to satisfy it's customers with regards to security and with the next end-all OS releases not due til 2006, I doubt patching
Re:time to protect the monolpoly (Score:5, Funny)
Well, it seems to work for the RIAA...
Re:time to protect the monolpoly (Score:2)
They can run on fumes for a few more decades before they finally go broke or smarten up. I'll hedge bets on the former before I lay a dollar on the latter.
Re:time to protect the monolpoly (Score:5, Interesting)
It's the home users... (Score:5, Insightful)
Whereas a competent MCSE or IT director will have properly secured a corporation's machines against remote exploits (a properly designed network, even if none of the machines had been patched, should've been able to stay free of worms like Blaster and Welchia, for example), home users have been thrust into the unfortunate situation of running an enterprise OS (anything from the NT family), with no experience on securing it, and often, no knowledge that it needs to be secured at all.
Windows NT-based operating systems listen on so many ports, and are designed so wide open, because they are meant to sit inside a secured corporate network. Though Microsoft's unification of the NT and personal trees of Windows starting with XP gave personal users much of the speed and stability they had been lacking for so long, it also gave them security issues they should not have been expected to deal with.
This is why, though NT-based OSes have had widely publicized security flaws for years, their flaws are now in the spotlight.
Microsoft's recent steps to finally globally disable the Windows Messenger service and enable the firewall by default are a late, but necessary, effort to help bridge this divide.
Re:It's the home users... (Score:3, Funny)
mod this up as Funny
Re:It's NOT ONLY the home users... (Score:4, Insightful)
0) you assume that a system admin has time to address the daily patches that were coming out at the peak.
1) patches take time to test and apply. You might be able to break a users computer (as long as it's not the company heads), but you can't break the server.
2) MS charges $$$$ for the systems which give you the ability to maintain many systems.
3) things get behind the firewall. Probably a lot less since these worms, but they do get behind the firewall.
MS is paying for bad decisions.
* Trust. Trust will work on the internet. Nobody would click ok without reading what the message says.
* Sandbox, VB don't need no stinking sandbox
* No user permission separation
Re:It's the home users... (Score:2)
Please show me this "properly designed network", that allows an unpatched Active Directory domain and blocks traffic on RPC ports.
This may work in a perfect environment where the users don't run untrusted junk, run email attachments
Re:It's the home users... (Score:2)
Or has no idea what they are talking about and has no buisness running their mouths...
Re:It's the home users... (Score:5, Informative)
Please show me this "properly designed network", that allows an unpatched Active Directory domain and blocks traffic on RPC ports.
I've been hearing this bit of FUD for a while now about how it's not Microsoft's fault. If only all of these incompetent network and system administrators would patch their systems and maintain their firewalls how there wouldn't be any problem.
Well, I'm here to tell you that I work for an organization with about 1500 employees. We process over a hundred million transactions annually in our systems. Our average system administrator or network engineer has about 7.5 years of experience in the IT industry, our security staff (I'm the security director) has an average of 9 years of IT industry experience. Except for the Windows administrators (our office automation network is Windows based), everyone comes from either a Unix or mainframe or both background. We know what we are doing, have a very good network and well maintained servers and appropriate security levels.
And every damn Windows virus/worm that comes along impacts us, even our mainframes and unix boxes. Why? Cause the stupid things propagate with attack vectors that are ridiculous. Root exploits in a web browser or via an email message and you don't even have to execute the damn thing? RPC worms with multiple attack vectors (browser, file shares, mail, RPC)? Local user exploits using html pages and scripts that can bypass web browser security settings and then execute arbitrary code!
It doesn't matter how well built your network is, if you are not running it like an NSA network, with no connectivity to the outside world, no email, no web browsing, no nothing, these damn Windows attacks are going to get in and cost money. I've lost more than a thousand work hours this year to dealing with SQL Slammer, MS Blaster and SoBig. Even if I got rid of all the Windows systems in my network, I'd still have a problem because the attacks would continue, and continue to affect me, although only at the boundaries, which would be better. Except for all the crap the mail servers have to deal with.
So where are all the Apache holes? (Score:3, Insightful)
Re:It's the home users... (Score:2)
Except that when I worke
Re:It's the home users... (Score:2)
See, it's funny becaus
Corporate deployments (Score:5, Insightful)
With that ONE practice, the single greatest/easiest chunk of security - separation of user from admin, is gone.
From what I understand, quite a bit of Windows software actually depends on this practice, and can't run without admin priviledges. So regardless of who takes the blame, Microsoft or the Windows Culture that has grown up around their products, there's an architectural-level problem, here.
Re:It's the home users... (Score:3, Interesting)
Exactly; 'process over product'. I try and drive this same idea home to people I talk with, and the few that get it truely get it. The rest are puzzled that enabling a firewall won't solve all security issues...or they are happy to leave it at "the firewall will protect us, right?".
Re:It's the home users... (Score:2, Insightful)
"Enable the firewall by default"? Why not just disable the services by default?
Microsoft does not know how to include a feature that is off by default.
Perhaps (Score:3, Insightful)
Be grateful he didn't use another "variant"... (Score:2)
Re:Perhaps (Score:3, Informative)
UNIX was designed to be a timesharing system, a bunch of teletypes and dumb terminals plugged into a minicomputer. UUCP, which isn't real-time networking, was added later. Support for TCP/IP was grafted on to UNIX years later, in the VAX era.
Security Holes (Score:2)
http://www.microsoft.com/technet/treeview/defau
http://www.pcworld.com/news/article/0,aid,63784
As Steve Jobs once said, "Every security scheme that is based on secrets eventually fails."
About. Bloody. Time! (Score:2, Informative)
Seriously, now is when we find out which model of software development really is more secure. Results like these will energize Microsft's management to try and address security even more forcefully. My money is on FOSS, but we'll actually get to see how it plays out in the real world.
Re:About. Bloody. Time! (Score:2, Interesting)
Stability used to be a major reason for avoiding MS operating systems. Win9x crashed frequently, others didn't.
As of Windows 2000 SP1, they managed to pretty much eliminate that problem. It took them about 5 years, but they got there in the end.
Possibly by the time Longhorn SP1 comes out, in about 2006, they will have pretty much sorted out the security problem. I guess it will still require stupid amounts of memory and CPI time compared to other systems, but that is becoming le
Re:About. Bloody. Time! (Score:2)
In Longhorn (or whatever version theoretically becomes secure) perhaps. But there are businesses still running DOS. Win9x still has a significant presence in the business workplace, not to mention home use. This legacy will not change fast enough to save them from the consequences of their earlier shortsightedness.
Re:About. Bloody. Time! (Score:2)
About time! (Score:3, Interesting)
If OpenBSD can produce a secure distro for FREE, why can't Microsoft with all the resources available to them? Marketing never thought that it was important. End users are finally starting to realize that it doesn't need to be this way.
At this point, it's a little late to go back and design security into a system which never had it.
Of course, there goes my job security...
Re:About time! (Score:5, Insightful)
MS has made a decision to give people extremely usable products, and this comes at the cost of some security and reliability. They could make the most secure software around, but them it wouldn't be usable. They are now trying to balance their products more between security and usability because they have gone too far away from security. Security and usability are generally on 2 different ends of the spectrum. To make things easy to use, you have to give up security and vice-versa.
Re:About time! (Score:5, Insightful)
The flaw in your argument comes when you realize that a company with the resources of Microsoft (money and personnel) should be able to realize that balance between usability and proper security in about one fiscal quarter.
Instead, for years and years, since there was little incentive for them to do anything about it due to their monopoly (and the tactics to keep it), nothing was done to make the software more secure. Even the normal "usability" features were largely unexciting past Windows 95.
So, in the 8 years since the release of 95 (wherein the current Windows user interface and experience was defined) the security problems have gotten quite a bit worse while the usability has been marginally increased. Some stability was added with the 2000 release, but with an even larger decrease in security.
This is why people hate MS so much (well, one of the reasons). Despite the fact that they COULD do better, and SHOULD do better, they don't. There is no excuse in the world why they couldn't have produced truly top notch software when companies working for free can.
$50 Billion dollars agrees (Score:5, Insightful)
It might take a year or two, but they could squash future bugs if they wanted to. And yes, I know about the mythical man month and adding manpower to a late project, but this is not a single project, it is hundreds of small projects.
Microsoft is still not serious about fixing security holes. They never will be.
$50 Billion dollars is not enough (Score:3, Insightful)
I doubt it. A complete rewrite is the only way to clean up the cobled together mess of intentionally spagetti coded junk they have purchased and stolen. The might be able to do that in a year or so, but it would not be Windblows it would be OSX1 or some other varient of BSD with an ugly and non-intuitive Redmond themed desktop.
They can complain all they want about it not being cost effective to fix bugs. I think they are g
Re:About time! (Score:2)
Well...that was the theory anyway.
Isn't there an old saying that goes: "Those who would trade freedom for security deserve neither."?
I guess the geek version of that would be: "Those who would trade security for
A backwards solution... (Score:5, Interesting)
VIRUSES is the correct spelling (Score:2, Informative)
The computer usage of this word stems from the medical word virus and the correct pluralization is VIRUSES - Dorlands 28th ed Medical dictionary.
No doctor that I know uses the word virii..we all use viruses.
Coulda fooled me (Score:3, Insightful)
Besides, you understood what was meant, so where is the problem?
And even more, I think it was Andrew Jackson, President of the US around 1820 or 1830, who said "It's a poor mind that can only think of one way to spell a word."
Nope you're still wrong VIRUSES is correct (Score:2)
computer viruses 3,690,000 hits
computer virii 80,000 hits
3 out of 3 on line dictionaries also used viruses as the plural for computer virus..
What's a couple mil to Bill G.? (Score:4, Insightful)
The campaign reveals just how much of a threat to Microsoft's bottom line security flaws now represent.
The campaign reveals just how much extra cash Microsoft has lying around and is willing to put up to make the buying public think it gives two shits about security.
Re:What's a couple mil to Bill G.? (Score:2)
I know how much cash Micros~1 has on hand, and what they did to the industry, their competitors, and their customers to get it. Before I would even think about lifting a finger to help that company, they would have to increase their bounty by at least two orders of magnitude, minimum.
Schwab
Corporate Philosophy (Score:5, Funny)
Re:Corporate Philosophy (Score:2)
Well, Microsoft has supported NT4 for 7 years, compare that to Linux distributions...
They make choices regarding what they fix, they won't release a patch for a small issue which doesn't affect many people, but all real problems are addressed usually.
Re:Corporate Philosophy (Score:2)
Cheap security fixes? (Score:3, Interesting)
If MS were really serious (Score:5, Insightful)
Re:If MS were really serious (Score:2, Insightful)
This is great (Score:2, Interesting)
It's only fair (Score:5, Insightful)
If the wind blows right, sometimes shit does roll uphill.
Solution (Score:3, Funny)
Microsoft creates insecure software. Microsoft-owned Symantec secures networks which runs insecure Microsoft software. End result: PROFIT!
Too bad the anti-trust laws would probably break the whole deal up.
Flaws in the business model...?? (Score:2)
Now, I heard about Red Hat stopping selling it's consumer version OS. I haven't heard about MS dropping any products. So, how are these flaws being "translated"? A $1/2 million bounty? Big fucking deal. That's peanuts. They spend more than that on toilet paper every year.
Re:Flaws in the business model...?? (Score:2)
Why Microsoft's rule is beginning to wane. (Score:5, Insightful)
(In this post, I am going to describe two or three reasons that I believe Microsoft will soon become a regular industry player, and will no longer rule at the top.)
Think that putting a bounty on virus writers is going to solve the problem? That's the trouble with you, billg, you think you can buy your way out of all your problems. Heck, if I had as much money as you, I could buy my way out of anything, too. The only trouble is that your mighty empire is slipping through your fingers, and because of what I'm about to say, you cannot fix it, no matter what you do.
Many companies have realized that using free software, and contributing to that software, both in fixes and in features, provides many advantages, such as independance from a vendor. If you think about it, suppose you get a contractor to add a room to your house and he does a crappy job. You could fire him and get someone else to do it. But when you use proprietary Microsoft programs, there is nobody but Microsoft that can fix them. While this may not have been an issue over the past 20 years or so, this is becoming a very critical issue.
Not only does the proprietary status of your software prevent others from finding and fixing its problems before they cost billions, but you continue to do everything in your power to isolate your software from anything else out there. Other companies want their software to interoperate with the competition, but you just want to embrace and extend. Why do you do that? If your software is so good, why can't you make it friendlier with your competitors' stuff? I know the answer: It's because you're insecure. You know that perhaps the biggest thing that kept people using your software was the fact that they were locked in to it and were forced to upgrade repeatedly.
By doing what I just described, you tightened your fist as much as you could on this software, but now governments, corporations, and individual users are beginning to look elsewhere in significant numbers. This is the beginning of the end of your monopoly. Soon, you will no longer rule at the top, but will be just another player in an industry. I'm sure it was fun while it lasted, though.
Re:Why Microsoft's rule is beginning to wane. (Score:3, Interesting)
Hey dumbass, you think the top brass at MS is sitting around a table thinking that ONE solution will fix their problem? Of course not.
Hey dumbass, you think the top brass at Microsoft are sitting around a table, thinking? They don't get paid to think. They get paid to write memos.
Why are they so big? Two words: Inertia, and cunning. Business decisions are what got them where they are, not adequate development strategies. Otherwise, they wouldn't be in this mess.
The virus
Maybe the OpenBSD team could educate Microsoft. (Score:4, Insightful)
From the Slashdot story: "Apparently Microsoft has bounties out on virus writers."
Offering a bounty is no substitute for providing secure software. Maybe the OpenBSD [openbsd.org] team would help teach Microsoft how. Or, is someone in the U.S. government interested in having security vulnerabilities in the software everyone uses? There are just too many; is Microsoft really that sloppy?
Who was using Microsoft security vulnerabilities before they became public knowledge?
OpenBSD's motto: "Only one remote hole in the default install, in more than 7 years!"
Microsoft's motto: "Extremely serious flaws that allow an attacker complete control, every week."
Something is fishy about this. It is not that difficult to write secure software. If the extremely well-funded OpenBSD team can do it, the poor Microsoft people should be able to do it, too.
Re:Maybe the OpenBSD team could educate Microsoft. (Score:3, Funny)
Microsoft should hire Theo and Company as an security audit team.
FreeBSD is very popular for servers. (Score:3, Interesting)
The most popular server software for ISPs is FreeBSD, a BSD variant. It's great software, and very capable.
One company uses NetBSD for dedicated mail servers.
We don't hear much about these uses, because the software just works. That's why it is seldom in the news.
Rewards (Score:3, Insightful)
Rewards don't do squat (Score:2)
Microsoft's Bag 'O Tricks (Score:2, Interesting)
Newt-dog
Bounty Hunters Unite! (Score:2)
My name is Boba Fett. I do thy bidding....
just don't forget to let me use those damn cool carbonite freezer to chill 'em virus writers.
Why can't they just trash Windows and start over? (Score:3, Insightful)
Re:Why can't they just trash Windows and start ove (Score:5, Insightful)
2 reasons. First, support for legacy apps has to be included in any new OS Microsoft developes. Second, imagine how long that would take to complete. It took what, 5 or 6 years, for the NT kernel to be able to reliably run 95/98/ME apps. Imagine the press release, "Longhorn to arrive in 2009".
Starting over would render close to a decade of work worthless. That kind of suggestion is hard to justify.
Re:Why can't they just trash Windows and start ove (Score:3, Insightful)
Re:Why can't they just trash Windows and start ove (Score:3, Insightful)
The famous MS instability is often a fault of the insane amount of crappy obsolete hardware that is still attached to machines. I recently heard someone bitch on how none of the P4 boards had an ISA slot for his modem and now he had to upgrade and
Bottom Line... (Score:2)
Governments and big corporations are starting to realize that the cost of using Microsoft includes:
Linux isn't free of security holes, but it has considerably fewer because the underlying design isn't nearly as permissive to start with. Further, the open source model means tha
Warning Will Robbinson (Score:3, Insightful)
What this means is
It's a great thing for them, it's a great thing for the RIAA, it's a great thing for the MPAA (sp?). It's a shit lousy thing for you. But they are going to give you a secure platform. Makes you wonder if they couldn't have planned things any better.
Re:Warning Will Robbinson (Score:2, Insightful)
EVOLUTION IN ACTION (Score:2)
A joke to Microsoft. (Score:3, Insightful)
With the first machine, I connected to the Internet and was infected with Welchia about 24 minutes later.
With the second machine, it was FIVE MINUTES.
In neither case did I even have enough time to get the latest patches (over 25mb of standalone patches + IE SP1 + SP4) before I was infected with a virus.
It's just plain ridiculous -- What happens when Joe Average User connects his computer he just bought from a local computer store (who I doubt would have installed the patches on every machine going out the door)? How is he supposed to know what to do?
focusing on the exploits and not the flaws (Score:4, Insightful)
Wouldn't they be better off spending that $250,000 on another programmer-year or two of code audits?
This whole business with bounties for virus writers is just an attempt at misdirection: draw the public's attention to the people writing the viruses instead and away from the fundamental flaws they're exploiting.
It's important that the public realize that the security holes exploited by the virus writers are also exploited in less public and more nefarious ways.
--Bruce Fields
Bounties on virus writers? Hmm... (Score:2)
A better way to spend $250k... (Score:2)
This is more MS Palladium Propaganda (Score:3, Insightful)
There is no way MS would publish this information unless doing so is in their interest. They could had have played the same old games with accountants and auditing, etc, etc to hide this information if they had wanted to.
But no, they pretty much came right out with it and most of you have been taken hook, line and sinker. All this is not about any real pain that MS is feeling. No, it is about providing another justification for Palladium aka NGSCB "enscub" aka Next Generation Secure Computing Base.
MS can now point to how a lack of security is hurting their bottom line so whater bogus Palladium schemes they come up with to sell as increasing security (rather than just stealing control of your computer and divvying it up between MS, the MPAA and the RIAA) so of course Palladium will really provide better, more secure system becaue MS's ass is on the line too, see it if even says so in their SEC filings!
If microsoft would just fix windows... (Score:4, Insightful)
The design of windows means that it is insecure.
A really great way to make windows more secure:
Make it so that by default, windows is installed with an administrator (who you cant actually login to from the login prompt without extra effort) and 1 or more "regular users".
a "regular user" basicly has access to all normal stuff (i.e. anything thats not a risk to the system) but if they want to do something thats "risky" (e.g. if they or something they are running wants to add something to "load this at startup") they need to enter the Administrator password first. If they dont, the action is denied (for example, windows returns a "cant open file for writing error" or a "cant write registry key error" or whatever as appropriate.
Some things that should be "restricted":
1.putting any file in c:\windows\system or its sub-folders (such as c:\windows\system\drivers). Also modifying, deleting, changing etc those same files.
2.adding a program to the "this program starts at startup" list (this would also cover drivers, services etc)
3.modifying key Windows Sockets settings (for example, like how some Spyware inserts itself into those places to hook winsock)
4.perhaps there are other key settings that could be blocked (for example, access to certain control panels or changing the display settings or whatever)
and 5.there should be a way for someone (with the administrator password) to specificly add extra things to the "block list" (e.g. someone could show settings as to how to stop spyware crap from changing the homepage of M$IE)
Some benifits:
1.Viruses, Worms, Trojan Horses and other crap wouldnt be able to just "silently" install themselves (since it would say "c:\documents\your settings\temp\abc123.tmp.pif wants to write to c:\windows\system\dontdeletethisorwindowswontwork. exe. If you want to allow this, type in the administrator password"
2.Spyware (e.g. Gator, New.Net etc) wouldnt be able to install without specific authorization (for example it would say "c:\downloaded files\newnetinstaller.exe wants to modify winsock settings and install its own custom crap. If you want to allow this, type in the administrator password"
3.On shared computers (e.g. family PCs or kids PCs), the parents could be the only ones that know the administrator password (and therefore prevent the kids from changing the settings)
4.On computers e.g. work machines or machines in labs at schools, the sysadmin would be the only one that knows the administrator password and therefore e.g. you dont get people installing kazza or whatever.
Thats not to say that my system would prevent installing new software, it would only prevent it if:
1.the new software wants to modify important windows settings.
2.you dont have the administrator password.
and 3.when the install program gets the error back from windows "cant open file" or whatever, the install will fail in a way that makes the program unusable.
Basicly, this would be a benifit since:
1.if some program wants to do something behind your back (e.g. virus or spyware), you can be notified and more importantly block it.
and 2.you can be sure that the users of your machine arent installing anything that messes with the settings or messing with them themselves.
Some might say it would cause problems but I dont believe so.
For example, if a kid brings home a new game from school (that he has "borrowed" off a mate or more likely these days gotten that mate to burn him a copy of) and wants to install it, the kid puts the disk in and runs the installer. Then, if it needs to install system things (for example, new DirectX), the box asking for the password will come up and the kid will have to wait for the parents to give the OK before it can be run.
Another benifit is that if the user has to enter the password, its likely that (unless they are so cluless that they think that the "any" key is the
Comment removed (Score:4, Informative)
M$ Security killed a competitor (Score:3, Informative)
Well this past spring and summer, he said he saw a drop in service calls by an amazing 85%. Those remaining calls were either hardware or the three windows boxes he had to maintain because of that customer demanded it, they owned the kiosks, he just provided service so he was making money on the service call.
When the "Work of the Week" started, the other guy lost at least 30 customers that switch to using our client because they were getting complaints from their ISP that their boxes were being used in DDOS attacks from the competitor's product. In last week business journal, our client's competitor has filed for chapter 11.
Now, chances are they were having cash flow problems, the manufacture of their product is also having problems, however I know that our client has been able to undercut his competor by 20% in price because and he is still reporting increased profits of 10% after slashing prices. That's how much his TCO has lowered on service calls in the last nine months.
I know in our consultancy that using Apples with OS X have lowered our costs and increased productivy over Windows dispite their higher initial cost. Why? most of our units are about 4 - 5 years old and are now in use by administrative staff and going stong. That, and we make about $400 a week from the company on the second and fifth floors for fixing their computers.
Home computer hit (Score:4, Interesting)
For an email client my wife uses Outlook Express and has a Hotmail account. She gets very little mail and almost no spam -- maybe one a month and it goes to the Junk Mail folder (my Hotmail account fills with email worm infection attempts every 2 to 3 hours, which is the price I pay for redirecting all incoming mail to "slashdot@rjamestaylor.com" to my Hotmail account. I figured if a worm went through Hotmail it would be checked for viruses. Unfortunately, that is true ONLY if you are using the Web Client to attempt to download an attachment. If you use OE, they don't bother to check the attachments.
Earlier this week my wife told me the computer is running really slow. I told her to press Ctrl-Shift-Esc to bring up the Windows Task Manager and she replied "something popped up but went away." I told her not to hit Esc twice (my assumption being that she had). She tried it again -- "nothing happened this time." Crap I thought - we've got Klez, or some other virus that kills WTM and other attempts someone may use to discover/remove it.
Turns out she received a spam that had Kelz and also used the iframe expoit -- and when the email was displayed in the Preview folder, *splat*, Agent Smith began infecting our machine's programs.
So, on my weekend I get to disinfect my home computer because I failed to install an Anti-Virus program. But really, I was let down by Microsoft 3 times:
Microsoft at fault...and not... (Score:3, Insightful)
I think in many of the arguments here, a critical fact has been overlooked. Users of MS products generally want the features that allow for the problems we've seen in the past to crop up. The average user wants automation; they don't want to configure software, or have to understand how the system does what it does, they (here it comes) just want it to work. It's this attitude that has fueled MS' design process; they build software that the end user can turn on and have "just work." No fiddling, no
I think that if similar products existed in a Linux environment, we'd still be seeing a lot of the same problems, simply because the level of automation required to satisfy the typical user is inherently insecure. I am willing to concede that a suite of applications built on Linux could be more secure, and that Microsoft definitely has a problem in that the flaws in their system are very deep, however: I can recall a number of occasions where I've seen articles here on Slashdot that announce "security hole in (whatever) allows root access! Come get your patches...." If Linux held sway in the desktop world, why would we expect the typical user to be any more willing or able to patch their OS than if they were using MS systems? Granted, there's fewer holes, but they're still there. If typical user never patches their default OS install, then why shouldn't we expect mass root exploits?
Don't get me wrong; I'm not wholeheartedly defending MS. They could have done things better, but I'm not ready to jump on the "Linux is more secure" bandwagon. I firmly believe that if similar applications had been developed for Linux to meet the same demands that MS has answered, we'd still be seeing problems.
Re:For Pete's sake (Score:2, Informative)
If the Corp world switches from MS products people will start learning and wanting to use the same in thier home environment so a migration will start toi occur.. This will take a long time.. but its a threat that needs to be dealt with from MS's perspective...
For the most part... People hear Linux is more secure an
Re:Security at last? (Score:2)
Hahahaha! Tell me another one! That was GREAT.
Come on. "Trustworthy Computing" was supposed to be Microsoft's stab at taking security seriously - an initiative that, in two months, will be two years old. Not [symantec.com] much [cert.org] has [microsoft.com] changed [f-secure.com].
Trustworthy Computing was the launch of some kind of supposed effort by Microsoft to tighten down security in their products. That obviously failed. So now, rather than stomp out the bugs in their pro
Re:What does Microsoft R&D do? (Score:3, Interesting)
Also, I am less than pleased about the P/R regarding the Sloan Digital Sky Survey. Yes, Microsoft has made some significant contributions for presentation of the data gathered by
Re:Why is patching systems so hard? (Score:5, Insightful)
Windows Update is fine if you've just got 1 system. Now, imagine you've got to patch 30,000 systems in 700 offices in 43 states, and you don't have any access to the main keyboard. And you can't use automatic updates because IT has to vet the patches before they're installed to make sure they won't make inoperable third-party software which your business depends on being operational.
Re:Why is patching systems so hard? (Score:3, Interesting)
Quite frankly I don't think an IT person should be patching a system in another state. What happens if it goes down? Do they have to fly out or is there someone else they have on staff to fix it?