[jaws-uk] Alternative to Windows

  • From: "Barry" <bbinc@xxxxxxxxxxxxx>
  • To: "Jaws list" <jaws-uk@xxxxxxxxxxxxx>
  • Date: Wed, 9 Mar 2005 21:19:00 -0000

Hi all

I found the article that prompted the title:

Gates Misses the Mark, and the Point, on Security
March 7, 2005
By
Linda LeBlanc

Bill Gates wants us to believe security is Microsoft's new Number One 
priority. He wants us to believe they have the users' best interests at 
heart.

I, personally, want to believe the moon is made of green cheese. The problem 
with both of these situations is I know too much for either to ever happen.

Until Microsoft announces a major effort to rearchitect the source code for 
the Windows operating system, everything he says about security should fall
on deaf ears.

Windows machines account for somewhere between 70 and 90 percent of all 
computers on the Internet -- for safety's sake, we'll put those numbers in 
the U.S.
Windows' Number One selling point is ease-of-use for the end user. Well, 
that and it's cute, too.

From the beginning, the emphasis has not been on security.

How can I make such a bold statement? Two words: Buffer Overflow.

In the very first class I took in programming (those many years ago), we 
were berated class after class about proper bounds checking to prevent 
buffer overflows.
What this means in simple terms is that every time my program asked the user 
for input, it had better check to make sure the input fit in the place I 
reserved
for it. If I asked for a ''Y/N'' and I got a ''yes'' or a ''no'', those 
extra characters had to go somewhere and I had better be prepared for them.

Buffer overflows are just the beginning of security flaws written into the 
Windows operating system.

Gates states that the new IE 7.0 will fix ''most security flaws'' in 
Internet Explorer. That's great, but it will only be available to WindowsXP 
Service
Pack 2 users. What? If you're running Windows 2000, that's just too darn 
bad. Security isn't for you.

But that's kind of OK, because it really isn't for the XP SP2 crowd, either.

Why is that? Service Pack 2 is a package of patches, updates, and fixes all 
rolled into one large executable. It's also the size of a small operating 
system
(about 40Mb). And it doesn't fix everything or we wouldn't currently be 
experiencing the revival of the MyDoom virus on networks around the world.

According to
Microsoft,
there are more than 70 security patches rolled into Service Pack 2. This 
doesn't include the ones that are listed as base operating system patches, 
IE patches,
RPC patches and ''other'', many of which involve that little thing known as 
the Buffer Overflow, which ''could allow arbitrary code execution''.

My favorite patch in Service Pack 2 is listed as Windows XP and Windows XP 
Service Pack 1 (SP1) Kernel Rollup Hotfix Package. Do you want to know what 
this
fixes? It fixes a Buffer Overflow in Service Pack 1.

Yah, it's all about the security.

The week before the recent RSA Conference in San Francisco, Microsoft 
announced 14 new vulnerabilities in Windows XP. Since the first of the year, 
there
have been more than 20 vulnerabilities found in Windows, and these are just 
the ones being tracked by the SANS Critical Vulnerability Assessment group.

In 2001, when XP was released, it was held up as a new paradigm in operating 
systems, built to withstand the foibles of the older DOS-based OS. But 
Service
Pack 1 came out in late 2002, the patch to the patch was released in May 
2003 and Service Pack 2 was released in November of 2004.

It's clear they haven't gotten it worked out yet. But they are going to 
continue to throw patches and hotfixes at the problem rather than resolve 
the underlying
weakness in the source code.

To top it all off, there are free operating systems on the Internet that are 
smaller than the latest Service Pack. Yes. They are complete operating 
systems
that will run on your PC, and that are smaller than Microsoft's latest patch 
rollup.

There also are free browsers that do a much, much better job of preventing 
the installation of subversive code without your knowledge. They also block 
all
those annoying popup ads, which are the source of much spyware. Why isn't 
everyone bolting for a more secure, better managed operating system? They 
don't
have the Windows-like simple interface and plug-n-play abilities. In some 
cases, they aren't even cute.

But what about free browsers? Why wait for the latest and greatest Internet 
Explorer to come out this summer? Take a look at Firefox and see what you 
think
for yourself.

And we can't forget that buffer overflows are just one example of 
vulnerabilities.

Windows users are under threat from privilege elevation exploits, 
denial-of-service attacks, spyware and malware, which are probably the most 
insidious
of all vulnerabilities.

At the recent RSA conference, Gates said security is a challenging area. 
''New threats are emerging all the time... but we're working to mitigate 
those
problems,'' he added.

But the question remains -- What is being done about preventing the threat 
in the first place?

If you don't build a house made of glass, every rock-throwing little kid 
won't be a threat.

One argument that I've heard from various sources is that Microsoft is a 
victim of it's own popularity. Because it is the predominant operating 
system in
use, the bad guys target it for attack because the victim pool is so large.

My response is phrased in a simple proverb I learned in my childhood -- ''To 
whom much is given, much shall be required.''

Microsoft has the money and the resources, and it has an obligation to the 
people who swear by Windows to do it right, and do it right the first time. 
Gates
wants more market share. He wants the space shuttle to run Windows (And to 
be honest, it probably already DOES run Windows on some systems. Isn't that
a scary thought?) But he never acknowledges the need to complete a top 
down/bottom up overhaul of the existing code base.

If I had the money Gates does, I could write an operating system that 
incorporates security, does everything Windows does for the user, and more.

It's never been about security for Microsoft and I don't think it is now.

** To leave the list, click on the immediately-following link:-
** [mailto:jaws-uk-request@xxxxxxxxxxxxx?subject=unsubscribe]
** If this link doesn't work then send a message to:
** jaws-uk-request@xxxxxxxxxxxxx
** and in the Subject line type
** unsubscribe
** For other list commands such as vacation mode, click on the
** immediately-following link:-
** [mailto:jaws-uk-request@xxxxxxxxxxxxx?subject=faq]
** or send a message, to 
** jaws-uk-request@xxxxxxxxxxxxx with the Subject:- faq

Other related posts: