Microsoft Taking Longer to Fix Flaws 192
An anonymous reader writes "A look back at the last three years of security patches from Microsoft shows Redmond is taking at least 25 percent longer to issue patches for "critical" vulnerabilities, now averaging around 135 days to issue a fix. The exception appears to be with "full disclosure" flaws, for which Redmond issued fixes in an average of 46 days last year."
And this is bad why? (Score:2, Interesting)
Re:And this is bad why? (Score:2)
Re:And this is bad why? (Score:5, Insightful)
Re:And this is bad why? (Score:5, Insightful)
Re:And this is bad why? (Score:3, Insightful)
Re:And this is bad why? (Score:2, Informative)
I won't even begin to go into how many times a redhat update has "broken" both of these.
Re:And this is bad why? (Score:2)
Well, to be accurate, debian as distro supports a number of packages that dwarfs what Microsoft supports. Just look at a list. Now multiply that by the number of platforms, compared to MS's platforms, which is just one. As for 'enterprise' packages, yes many of the debian (and linux in general) packages are smaller than things like exchange or veritas, but many are also on par as well. So the statement "definitely !=
Re:And this is bad why? (Score:4, Insightful)
How much would it cost? (Score:5, Insightful)
Is it a day?
Is it a week?
Is it a month?
Doesn't Microsoft have enough money to maintain images of different configurations just for such testing?
Doesn't Microsoft have the people who could automate such testing?
Is the problem that they don't have enough money? Or that they don't have people who are smart enough? Or that they just aren't doing it?
Re:How much would it cost? (Score:2, Insightful)
The software that we write at my current employer is a complex vector editing system and image RIPing. Our regression test suite can take up to 3 days to run. Whoops, that last fix broke something in abc.dll that depended on some behavior coming from def.dll. That will take a day to fix, 4 hours to build and rerun the test suite. Rince repeat until
Re:How much would it cost? (Score:3, Interesting)
In all likihood they are diverting resources from patching to Vista so they can ship it sooner. This is bad.
It's all about how you dedicate your resources. (Score:2)
The question is, how many people and machines do you have dedica
Re:How much would it cost? (Score:2)
No, the problem is it takes time.
Much like you can't produce a baby in a month just by getting 9 women in the same room.
Re:And this is bad why? (Score:5, Insightful)
when you're accountable to that many customers
When who's accountable? The disclaimer included with the last MS security update I downloaded read as follows:
Now, unless I misunderstood, it's telling me that if I install said security patch, and it breaks something, I can't hold MS accountable.
Re:And this is bad why? (Score:5, Insightful)
Now, unless I misunderstood, it's telling me that if I install said security patch, and it breaks something, I can't hold MS accountable.
You may or may not be able to hold them accountable in court, but third party adjudication is not the only form of accountability.
If Microsoft didn't bother to test their patches carefully they'd risk upsetting their corporate customers, and hence their bottom line.
Re:And this is bad why? (Score:3, Insightful)
Re:And this is bad why? (Score:2)
1- Produce and test a fix faster. I'll assume that since this is Microsoft and they have a lot of money in the bank, they could afford a few more coders and testers.
2- Release a work around/fix with some simple testing and only release the official patch after some amount of testing has been completed. This allows the sy
Re:And this is bad why? (Score:2)
There's accountable, and then there's accountable.
Let's say MS releases a patch that ends up causing major problems for mission critical systems at a nonzero number of Fortune 500 companies. The next time those companies are looking at major systems overhauls, do you think they're going to seriously consider MS products?
Sure, MS isn't liable if their products caus
Re:And this is bad why? (Score:2, Insightful)
Re:And this is bad why? (Score:3, Insightful)
Let's say MS releases a patch that ends up causing major problems for mission critical systems at a nonzero number of Fortune 500 companies. The next time those companies are looking at major systems overhauls, do you think they're going to seriously consider MS products?
Good point. Similarly, Let's say MS releases a product that ends up causing major problems for mission critical systems at nearly every Fortune 500 company, a product that requires them to spend exorbitant amounts of money and resources
Re:And this is bad why? (Score:2)
Patch testing (Score:3)
Fixes like this have to be tested and re-tested which is not exactly something you do
Re:Patch testing (Score:2)
How long ago ? What were your userbase demographics like ?
It's not just Microsoft... (Score:1)
Realities of patching. (Score:5, Informative)
That doesn't make me happy with the current situation, but it does make sense to react quickly (even if it puts the reaction at risk of being a problem itself) when something is actively being exploited. More quality assurance can be placed on patches that are not actively exploited (although each day increases the chance it will be exploited) and even more quality assurance can be placed on patched for flaws that are unlikely vectors.
Being responsible for very high reliability networks (our customer facing web and their support servers), high reliability networks (the corporate network, where I can apologize to someone's face if it blows up) and low reliability networks (my own internal network where I can fire anyone who complains) I have different thresholds for pain in the patching process depending on the network involved.
I'm far more willing to just slap a patch on my internal network: after all, it is my testing ground and it affects me far more than anyone else if it dies. After I have assured myself it isn't total bunk, I will patch our corporate network. Finally, our high reliability network is patched only after the corporate network's servers and clients have given us confidence in the patch. Of course, that means our high reliability network has to be far more insulated (URL scanning proxies in another operating system, tightly controlled trust relationships, intrusion detection, etc) but it is worth the extra effort and cost to avoid a "bum" patch bringing down the show.
Microsoft may not be reacting perfectly, but I think they are trying to balance corporate stability with the realities of exploitation. It sounds like they do need to throw some more resources to the departments involved to shorten the critical path, but with a system this complex, test cycles are going to be long and involved.
You had me until... (Score:2)
Would throwing more resources actually help speed the process, though? More resources (meaning more people) just tend to get more done in the same or longer time. It's not a linear relationship, anyway. And the "more" they get done is not necessarily productive. On its face, adding more resources to the test p
Re:Realities of patching. (Score:2)
It's not just corporate stability. A lot of it is the architecture of their systems. While Dave Cutler designed a nice, highly-modular system in Windows NT, the newest versions of t
Re:Realities of patching. (Score:2)
Re:Realities of patching. (Score:2)
I don't think "modular" and "integrated" mean what you think they mean.
Combined with truly st
Re:Realities of patching. (Score:2)
IT has? Why does cat have like 6 different options then, including numbering lines (which we also have nl for). Why did we move on from ed to vi? And then move on to xemacs?:) -- I still read my email in xemacs/gnus. One word: perl. Another one word: apache-httpd (this one is esp. close to my heart as I wrote my own webserver because apache-httpd had way to many options/bugs).
in other news... (Score:3, Funny)
Re:in other news... (Score:4, Funny)
Re:in other news... (Score:3, Funny)
Re:in other news... (Score:2)
Or...
If a Windows Server crashes and no one is around to see it, does it make a blue screen?
Well, Duh... (Score:1)
Meh (Score:4, Insightful)
Re:Meh (Score:3, Insightful)
Re:Meh (Score:4, Insightful)
The legal department?
Re:Meh (Score:2)
http://lists.debian.org/debian-user/2006/01/msg004 08.html [debian.org]
However, the "issued patch" solved the problem. And better yet, I could patch it myself by editing one text file and rebooting.
So yes; patches can and do break stuff in linux.
That being said, a similar issue in would have required a reinstall.
Like the three win2k machines I have here right now which *refuse* to actually use windows update. I'm having to download all patches by hand and force feed them one at a time.
Re:Meh (Score:2)
Nowhere near as much (I'm assuming here by "Linux" you mean "people writing open source software for Linux).
Sure you are more likely to have something break in Linux after a patch, but usually a few hours or a day later you have a patch for the program that got broken so it works properly again [...]
And that's the problem it produces.
Not the WMF vulnerability (Score:1)
http://www.stockmarketgarden.com/ [stockmarketgarden.com]
Re:Not the WMF vulnerability (Score:3, Insightful)
Or how much press they're getting for not having one.
Re:Not the WMF vulnerability (Score:3, Informative)
Do expoits speed up the fixing? (Score:5, Insightful)
The most interesting result of Security Fix's study is that Microsoft took longer to fix a problem if the researcher waited to disclose the problem until after Microsoft published the patch.
I'd like to know if the time to issue a fix also depends on existing exploits, i.e. is Microsoft faster if there is already an exploit out there. If yes, than it seems obvious that Microsoft does not really put as much afford into fixing bugs as they claim, they're "motivated" by public pressure.
One explanation for additional delay in case of a not yet disclosed or not yet exploited problem may be more thorough testing, so it may not even be a bad thing. But I'm afraid that the delay is not really "in the best of the customers", more in the best of Microsoft. I have no prove, but it seems to be the general company policy.
Chriss
--
memomo.net [memomo.net] - brush up your German, French, Spanish or Italian - online and free
Re:Do expoits speed up the fixing? (Score:2)
Re:Do expoits speed up the fixing? (Score:3, Interesting)
I don't think they set out to solve X bugs in Y months. I would assume they have a certain number of manhours devoted to fixing bugs, and fix however many they get around to. They can always increase the resources devoted
Re:Do expoits speed up the fixing? (Score:2)
I don't think they set out to solve X bugs in Y months. I would assume they have a certain number of manhours devoted to fixing bugs, and fix however many they get around to. They can always increase the resources devoted to this, yes, but I doubt anyone over there says "oh, this one doesn't have an exploit in the wild, try to take as long as you can to fix it".
If you had the public reputation of Microsoft and also declared years ago, that from now on security would be priority no 1, don't you think tha
Re:Do expoits speed up the fixing? (Score:2, Insightful)
The problem with this is simply that you can never know that a given exploit is NOT being taken advantage of somewhere. "It's safe for now; nobody knows about it." Meanwhile someone is quietly carrying the goods out of the back door somewhere.
Just because a flaw isn't being broadcast from the rooftops doesn't mean that it's not be
The Microsoft Effect (Score:5, Insightful)
We're dealing with a number of different dates, some of which are often months or years apart:
Somehow, being a political movement / cult, MS becomes exempt from the rules of a normal business and from what customers expect. No other device or appliance has had even a fraction of the defects as MS' without going through a major product recall. Our dear Chairman Bill will go down in history as the man that made bad engineering acceptible aka the Microsoft Effect
Why is this a bad thing? (Score:5, Insightful)
When Microsoft has to issue a bug fix (and all jokes aside about not testing), I am sure they have a team devoted to testing it, then it has to get sent to all internal Microsoft employees and tested, and then probably even has some initial customer testing with the bigger companies to make sure nothing breaks, and then finally gets released to the public.
Hopefully 165 or 365 days
Re:Why is this a bad thing? (Score:1)
BTW, you're totally right and I completely agree with you.
Re:Why is this a bad thing? (Score:5, Insightful)
You ask why it is a bad thing if the time between the discovery of a security vunerability and the time to relase a patch is increasing. You ackowlegde that in the Linux world, patches are fixed much faster due to their development model. So why is it a big deal if hackers can own your systems for longer without a patch being availiable? Isn't it obvious? HACKERS CAN OWN YOUR SYSTEM FOR LONGER BECAUSE A PATCH IS NOT AVAILIABLE. That is what the big deal is. They can use whatever development model they want. Releasing shoddy patches is only one solution that is available to them. The fact that they are able to cut the time it takes to release a patch in half if a working exploit has been publically released shows that it is more a matter of what resources they want to bring to bear on the problem rather than the minimum time to release a good patch. Or another way of stating this is, they are 25% less concerned with getting patches out in a timely manner than they used to be. So, the importance of security at Microsoft is decreasing.
Re:Why is this a bad thing? (Score:3, Insightful)
It's a bad thing because Linux's process—which involves having thousands of alpha and beta testers of the patch with direct access to the source code and the knowledge to make that access useful deploy it on their boxes—turns out to produce better patches faster. You, as a user who "doesn't want to be their beta tester", don't have to be. In 5-10 days (not 46 or 135) your distro vendor will have enough evidence that the patch is harmless and effective that they will make it available to you, a
Still too long, but you can take precautions. (Score:5, Interesting)
If you look at the data, you will notice that some critical flaws were patched in less than 3-4 weeks. While that may seem long, it is somewhat reasonable due to the amount of verification/validation necessary. People forget that 95% of the world runs on M$ so they have to really test a patch before releasing it.
On the other hand... because so much of the world depends on M$, they have an obligation to its customers to provide a secure OS and timely patches. Personally, I feel they are doing an "ok" job and seem to be getting better. Alot of vulnerabilities can be avoided just by running your PC behind a router and/or by using a firewall application. Personally, I have NEVER had a virus at home on any of my computers because I take simple preventative measures like running Norton AV and AdAware. I also put all my pcs behind a router.
http://religiousfreaks.com/ [religiousfreaks.com]Re:Still too long, but you can take precautions. (Score:2, Interesting)
The background: I've never had a virus at home (well, not since DOS days). I don't run antivirus; I used to run antispyware, but it kept turning up nothing so I stopped. I run 3 windows xp PCs and several linux PCs. I don't use MS products for web browsing or e-mail (ever. period.) I do run windows firewall on my laptops (my wife uses hers at school, and I use mine at work and school, so it's safest), and I have a hardware firewall/router. I have open ports fo
Re:Still too long, but you can take precautions. (Score:2)
Details, please?
Why do you feel like they are doing better? Because they release more marketing materials advertising security?
How is XP now more secure than at release? Is the rate of infection down? (no, its not). Are patches being released more quickly? (no, they aren't).
I guess the XP firewall is on by default since SP2. I can't think of anything else, however.
Re:Still too long, but you can take precautions. (Score:2)
How many security problems has Windows 2003 had ?
I guess the XP firewall is on by default since SP2. I can't think of anything else, however.
Most of the system has been recompiled to thwart buffer-overflow style attacks.
Still, just what do you propose they do to "fix" all the Windows XP machines out there ?
Re:Still too long, but you can take precautions. (Score:2)
http://secunia.com/product/1174/#advisories [secunia.com] lists 8 out of 76 vulnerabilites as 'unpatached'. I have a feeling that Windows 2003 is also vulnerable to the new, critical WMF problems (yes, the ones discovered AFTER the previous one was patched last week.) XP complaint is here: http://secunia.com/advisories/10968/ [secunia.com]
Either way, the answer is 'a lot'.
Why not compare Redhat ES 3.0 with Windows 2003?
http://secunia.com/product/1174/#advisories_2003 [secunia.com]
http://secunia.com/ [secunia.com]
Re:Still too long, but you can take precautions. (Score:2)
Yep. It came out 6 months after Windows 2003 and it has had 250 advisories (vs 76 for Windows 2003).
31% system access bugs, versus 55% for Windows 2003.
Ah, but raw percentages can be so delightfully misleading. Let's attach some real numbers to that:
RHEL3 has had 78 "system access bugs" in the past ~25 months, Windows 2003 has had 42 in the past ~31 months.
And notice the nature of the vulnerabilities? Things like cups, or curl. Or Realplayer (wtf?).
A
Re:Still too long, but you can take precautions. (Score:2)
HOW THE HELL can you be so indulgent ? Sure 3-4 weeks may seem reasonable but the average 135 days can in no way whatsoever be justified by this argument ("they need to QA patches"). Microsoft is a multi-billion-dollar software company wh
They are NOT getting better (Score:2)
No, statistics show they are not getting better (though it looks like Microsoft is putting more efforts into improving their patch development process), read TFA: "In 2003, Microsoft took an average of three months to issue patches for problems reported to them. In 2004, that time frame shot up to 134.5 days, a number that remained virtually unchanged in 2005."
Re:They are NOT getting better (Score:2)
That probably reflects the standard problem with large-scale software development - as the product gets larger, the number of bugs increases and the difficulty of fixing each bug also increases. One of the reasons you see so many apps being duplicated and rewritten from the ground up is that it is often easier to start from scratch than fix a flawed progra
Kind of Applogetic... (Score:4, Insightful)
I'm tired of this kind of applogetic excusing for Microsoft. As much as people want to blame the users, its still all in MS's lap since many of the problems stem from software doing things that it should never be allowed to do in the first place. AV software, hardware and software firewalls, malware scanners...its all a hack to stop users from breaking their machines doing normal operations because MS won't or can't engineer a system that disallows it.
Years of experience on other systems have shown that computers are complex machines with complex interactions all of which are prone to error and worst exploit if not carefully designed. On the other hand Microsoft sold most of the world on the promise that Windows is as easy to use as a VCR and requires just as much maintaince and look at where we are. We have to throw more and more money and time into work arounds while MS takes longer and longer to fix up things. Why aren't more people asking why does Windows work this way?
Re:Still too long, but you can take precautions. (Score:2, Informative)
No, 95% of the desktop world runs on Microsoft. Microsoft certainly doesn't have that kind of marketshare in server systems.
Re:Still too long, but you can take precautions. (Score:2)
who cares?
Does Full Disclosure Increase Eventual Harm? (Score:4, Insightful)
Just because Microsoft releases a patch quicker when full disclosure is used doesn't mean this results in less harm to users. It might take Microsoft 200 days to release a patch, but if the only people who know about the bug are the researchers who discovered it and Microsoft, then the end result is that little harm was done to the users.
If, however, an easily understandable exploit is posted before Microsoft has fixed the bug, those 45 days might be a lot more dangerous for those users than the 200 days in the previous example.
Of course, it's very difficult to know if the security researchers who discovered the bug are the only ones with knowledge of that bug. Could other people know about it and be actively using it to compromise machines? Maybe. But I would really like to see some data on this.
I suspect that the vast majority of major worms and viruses take advantage of well known exploits published on the Internet by usually well meaning security researchers. Certainly all of the major worms I can think of off the top of my head follow this pattern. (MYTOB, LOVGATE, NETSKY, SASSER, ZAFI, SOBER, BAGEL, etc.)
If so, people really are safer when the exploit is not published before Microsoft releases a patch despite the significant lag time for those fixes.
So I guess which approach you take depends on your goal. If your goal is the glory of a 0-day exploit, then post away. But if your goal is the security of the end user, maybe you should keep it to yourself for the time being.
Re:Does Full Disclosure Increase Eventual Harm? (Score:2)
There's a good biblbiography of the full disclosure debate [wildernesscoast.org] that will point you to many, many arguments.
My personal favorite was a big study of many CERT reports which concluded that the practical window of vulnerability begins when the first automated exploit code hits the street and ends only when attackers lose interest. Practically speaking, not enough people install patches to affect the dynamics. Yo
Re:Does Full Disclosure Increase Eventual Harm? (Score:2)
Good point. Hopefully things like auto-updates will mitigate this problem a bit. Since WinXP SP2 comes with auto-updates enabled, I have a feeling this will slowly be changing for the better as more and more people update to SP2 or buy new computers with SP2 pre-installed.
Re:Does Full Disclosure Increase Eventual Harm? (Score:2)
You're begging the question of whether the Major Internet Worm/Virus is the main thing worth patching to avoid. I'm not sure that's the case; most vulnerabilities are used in a variety of exploits, and the major malware is just the one that makes the most headlines. Also, most of the ones you mention already had patches available; they weren't zero-day exploits precipitated by "usually well meaning security researchers."
I appreciate that you've said you need more data, but I think you actually need a lot
Re:Does Full Disclosure Increase Eventual Harm? (Score:3, Interesting)
So I guess which approach you take depends on your goal. If your goal is the glory of a 0-day exploit, then post away. But if your goal is the security of the end user, maybe you should keep it to yourself for the time being.
You've made a number of incorrect assumptions and failed to consider several important concerns. First, is the vulnerability likely being exploited? Is the vulnerability able to be mitigated by users and if so, are there drawbacks to the fix? What systems would be made vulnerable?
F
Re:Does Full Disclosure Increase Eventual Harm? (Score:2)
Re:Does Full Disclosure Increase Eventual Harm? (Score:3, Interesting)
Heres a new benchmark that Microsoft would not like.
T.C.C.M.
Total Cost of Code Maintnence, how much does it cost to patch and test the base operating system source code per year? Microsoft vs Other commerical operating systems? Vs opensource operating systems.
The T.C.O Microsoft does not talk about is on ther
Re:Does Full Disclosure Increase Eventual Harm? (Score:2, Insightful)
If so, people really are safer when the exploit is not published before Microsoft releases a patch despite the significant lag time for those fixes.
I'd counter that with the WMF vulnerability. The details of it were released with no Microsoft patch available. Now, once I know where the vulnerability is, I can protect myself immediately by unregistering the offending DLL and using my registry-monitoring tool to block any attempt by other software to re-register it. Or I can take advantage of a third-party
Intrusion Prevention Systems (IPS) (Score:4, Informative)
I'd say that in this week I've seen stuff from 3Com/TippingPoint, Secure Computing, Sonicwall, etc. all about securing WMF fairly quickly after the exploit had been announced.
Think about it (Score:1)
Re:Think about it (Score:2)
I hope you're being facetious because making excuses for the world's largest software company is just plain ignorant.
They have NO excuse. Period. OpenBSD, a free open source operating system, is constantly auditing their code for security flaws. Windows has millions, perhaps billions of more code to audit, however they also have
Re:Think about it (Score:2)
"Sit down, shut up, and eat the gruel we put in front of you. We're better than you, smarter than you, and we know whats best."
I'm not aware of any other software project, free or proprietary, that has as poor of a security record as an equivalent Microsoft product.
Don't blame it on marketshare; otherwise, Apache would lead IIS in terms of infection. And even if it is because of marketshare, you would think that the completely untouched (as in 0 viruses) environment of OS X would be a great targ
It would be more informative ... (Score:1, Insightful)
Assuming that the more important repairs are done in under thirty days,
I'm willing to overlook the 365 day fixes that push the average way up.
Re:It would be more informative ... (Score:2)
OK, so how useful would it be to know that exactly half the patches are over the median time, and exactly half are under? If you want something really useful, we should have the mean time plus a standard deviation or two...
3rd Party Patch (Score:1)
Delayed Ratification (Score:2, Funny)
It wasn't necessarily because it actually took longer for them to fix these new vulnerabilities, rather, their marketing department just wanted you realize the immediate benefits of installing Microsoft Anti-Spyware beta.
But seriously folks... (Score:2)
The reason it is taking so long to fix vulnerabilities in my best estimation is that they have many different applications/OSs to test these patches with, while at the same time are trying to ramp up the efforts for a smooth release of Windows Vista. Attacks against Windows PCs are increasing by the day and it is probably much more time consuming to fix the myriad of these vulnerabilities than what it was say 5 years ago. But that is just a g
Reduce the critical path for non-critical patches (Score:1)
A danger is that the time difference between patches for undisclosed vs. fully-disclosed vulnerabilities will encourage people to fully disclose without waiting. I hope Microsoft are working to bring down their cycle time for characterising the vulnerability, and developing and testing the patch.
Does anyone have statistics for the number of bugs f
Re:Reduce the critical path for non-critical patch (Score:1)
Doesn't seem too awful (Score:3, Insightful)
That is a daunting task, and I can imagine theres a very lengthy process a patch must go through.
To Microsofts credit, I can hardly remember a time that a patch was released which cuased any major problems, which in itself is a great achievement given the amazing variety of hardware and software the users may have. There was of course alot of hype over compatibility issues in SP2, but to the best of my knowledge any actual issues were understood ahead of time and due to compromises that were made intentionally for one reason or another.
Re:Doesn't seem too awful (Score:2)
I know that as consumers we should expect Microsoft to test out there patches and since back in 1997 I think they are obviously doing
Why MS takes so long to release patches (Score:5, Interesting)
Imagine if their patch accidentally disabled * * * TENS OF MILLIONS * * * of computers. If that happened, they'd loose so much consumer confidence -- essentially loosing whatever gains (if any) they have made in the last several years (and billions in spending).
(okay, that did happen on a lot of sp2 systems, and MS is not loved for it)
MS has to ensure that the patch works on a staggering and dizzying array of systems and architectures (lots of different mobos, pentiums, AMD's, dual core CPU's, XENON's, via chips), and for dozens upon dozens of applications. That's why you often find that they'll often release a patch on NT or more server based systems before they release it for consumer systems.Another reason is that, depending on the type of problem, will do a full tracability check, and also cross reference all their code that references the changed module, and evaluate (probably manually) if they put that dependency at risk. A huge, horrible job, suitable only for type-A micro-detail oriented folks. I wouldn't want to do it!
If MS disabled TENS OF MILLIONS of computers, you would see a huge shift away from regular Patch Tuesday activities, towards one of 'install on a test bed' -- extremely tedious and manual that everyone would hate. Millions of people would be put out. Seriously bad Karma.
So, they can:
I'm sure at least someone is thinking "Heck: our flaws are the manure in which an entire security industry will grow in".
An Interesting Argument, but WRONG (Score:2)
Linux runs on ALL those platforms (Intel, AMD, etc). And more (Alpha, IBM Mainframe, Sparc, etc.). There is really no comparision.
Consider:
Linux supports more legacy hardware with the OS core.
Consider:
Linux vendors typically support 4+ GB of object code with a typical installation.
Not that I care one way or the other about Linux/Windows comparisions, but this should give you something to think about.
The obvious conclusion to draw? That the Open Source model is SO SUPERIOR to Microsofts, that there
Re:Why MS takes so long to release patches (Score:2)
Imagine if them delaying a patch ended up with HUNDREDS OF MILLIONS of disabled computers.
I, for one, am amazed this hasn't happened yet. Fortunately malware authors haven't gotten to the pure vandalism stage of their development.
On Full Disclosure (Score:2, Insightful)
What really concerns me is not some 14 year kid in Bulgaria playing "my botnet is bigger than yours" games. I'm concerned about hostile governments, terrorist groups, and organized criminals who already have a stable of zero
Re:On Full Disclosure (Score:2)
EVERY vulnerability is a race between the people trying to fix it and the people tring to exploit it. It is NOT possible to "win" every race; the best you can do is set the rules in such a way that winning is much more likely for the good guys than the bad guys.
I don't care what metric you try t
I can see it now... (Score:1)
All other members please use the public servers. Wait time is 10 minutes to 90 days. Please be patient. OR UPGRADE TO GOLD MEMBERSHIP STATUS!! FIND OUT HOW BY CLICKING HERE!!!
This is perfectly reasonable. (Score:2, Funny)
MS is a very lucky company. (Score:3, Insightful)
I've never met a truly destructive worm or trojan. I don't mean one that disabled systems as a side effect of its operation. I mean one specifically designed to destroy data, and/or BIOS/CMOS/anything flashable.
A 4 month patch cycle. I imagine that if North Korea, or whoever felt angry about the global economy, decided to try and do something devestating that they could easily prepare some kind of trojan payload that would install itself, replicate for a week or so, and then destroy the system in question. Blow away the BIOS (won't be determined until a reboot), blow away the partition table, and then start writing loads of garbage all over the disk.
Such a worm would break MS. MS execs would be brought before a congressional hearing.
That is, after banks, airlines, and major companies managed to rebuild some kind of IT infrastructure.
MS is very luck that no black hats have decided to do such a thing. I guess its most likely because no one wants to bring THAT kind of heat down upon themselves.
Why does Microsoft need to test patches so much? (Score:2)
I mean really, why? If I get a patch to, say, gaim, I know that my motherboard and soundcard just aren't going to matter. That's what the job of the OS is, to abstract away those details from the application.
Why does Microsoft have to test patches to things like browsers against all possible configurations? Why does it matter which CPU or motherboard or soundcard you have for a stupid browser issue?
This all comes down to the stupidly broken architecture of having a largely monolithic system that has a
Re:Why does Microsoft need to test patches so much (Score:2)
No the flaw is in the user (Score:3, Funny)
Or to paraphrase, "sell me a bug ridden OS once shame on you, sell me a bug ridden OS twice shame on me".
Cue everyone giving lousy examples of why they cannot live without windows.
Proposal for a new moderation system, you can only mod people in OS discussions who are on the same OS as you.
Re:No the flaw is in the user (Score:2)
That's the biggest mistake of most end users.
Re:Amazing, just fucking amazing (Score:2)
Depends, can my computer fail to come to a complete stop at an intersection, leading to a fatal collision?
Re:Amazing, just fucking amazing (Score:2)