Free Republic
Browse · Search
General/Chat
Topics · Post Article

Skip to comments.

Vista is 'more secure' says Gates
BBC ^ | Tuesday, 30 January 2007, 15:33 GMT | BBC Staff

Posted on 01/30/2007 1:08:55 PM PST by Ernest_at_the_Beach

click here to read article


Navigation: use the links below to view more comments.
first previous 1-2021-4041-6061-80 ... 141-145 next last
To: antiRepublicrat
I like your statement beter.....was just reading about this newest Linus distro this morning:

Review: Trustix Secure Linux lives up to its name

This is not a desktop distro...however...

Trustix Secure Linux is an interesting distro for servers that is designed to be all about security. While Linux, in general, is fairly secure, a distro that focuses on security and stability from the ground up should be a good choice for Internet servers. In our testing, we found Trustix lives up to its intentions.

*********************************

Trustix concentrates on keeping it simple. You won't get a GUI or the latest bells and whistles. What you do get with Trustix is a small and secure distribution that incorporates IBM's Stack Smash Protection, which protects the system and applications from stack-smashing attacks. This is one of the major forms of attacks, and many secure Linux distros have this turned on by default.

21 posted on 01/30/2007 1:22:24 PM PST by Ernest_at_the_Beach (The DemonicRATS believe ....that the best decisions are always made after the fact.)
[ Post Reply | Private Reply | To 17 | View Replies]

To: Jaxter

Vista = Bloatware


22 posted on 01/30/2007 1:22:30 PM PST by Hydroshock (Duncan Hunter For President.)
[ Post Reply | Private Reply | To 19 | View Replies]

To: Ernest_at_the_Beach

I've always liked the Microsoft languages and they once had a great flight simulator (possibly still do), but their op-systems, starting with the original MS-DOS (almost entirely ripped off from Gary Killdal's CP/M....they made no effort to hide it) they just continue to get worse with each release.


23 posted on 01/30/2007 1:24:55 PM PST by capt. norm (Liberalism = cowardice disguised as tolerance.)
[ Post Reply | Private Reply | To 1 | View Replies]

To: Hydroshock
Linux is going to be available to run older computers when Microsoft stops support for XP.

"Show me just what Mohammed brought that was new, and there you will find things only evil and inhuman, such as his command to spread by the sword the faith he preached." - Manuel II Palelologus

24 posted on 01/30/2007 1:25:17 PM PST by goldstategop (In Memory Of A Dearly Beloved Friend Who Lives In My Heart Forever)
[ Post Reply | Private Reply | To 22 | View Replies]

To: goldstategop

I like linux, would use it if I could, but my wife will not let me load it on her machine. My laptop is a company one so I am limited on what I can tweak.


25 posted on 01/30/2007 1:26:51 PM PST by Hydroshock (Duncan Hunter For President.)
[ Post Reply | Private Reply | To 24 | View Replies]

To: All
I wonder what Vista has implemended for this issue:

**********************************************

stack-smashing attacks

Some detail:

**************************************************

Protecting from stack-smashing attacks
Introduction
Attack Scenarios and their Classification

****************************AN EXCERPT *************************************88

The buffer overflow vulnerability appears where an application needs to read external information such as a character string, the receiving buffer is relatively small compared to the possible size of the input string, and the application doesn't check the size. The buffer allocated at run-time is placed on a stack, which keeps the information for executing functions; such as local variables, argument variables, and the return address. The overflowing string can alter such information. This also means that an attacker can change the information as he wants to. For example, he can inject a series of machine language commands as a string that also leads to the execution of the attack code by changing the return address to the address of the attack code. The ultimate goal is usually to get control of a privileged shell by such methods.

Figure 1 shows a typical stack structure after a function is called. The stack pointer points at the top of stack, which is at the bottom in the figure. The programming language C uses the area from the top of the stack in the following order: local variables, the previous frame pointer, the return address, and arguments of the function. This data is called the frame of the function, which represents the status of the function. The frame pointer locates the current frame and the previous frame pointer stores the frame pointer of the caller function.

Figure 1: Stack Structure
\begin{figure*}\centering \begin{tabular}{l\vert c\vert l}
& & $\uparrow$ stri...
...grightarrow$ & & $\downarrow$ stack growth \\
\end{tabular}\par\end{figure*}

The function foo (see Figure 2) is a vulnerable function, which produces the stack structure such as shown in Figure 1. It reads the content of the environment variable ``HOME'' into the ``buffer'' which has a size of 128 bytes. Since the function strcpy doesn't check the size of the output, it can copy more than 128 bytes of data to the ``buffer''. Imagine the ``HOME'' variable has this string: 128 bytes of 41, 1, 1, 1, 1, 2, 2, 2, 2, 3, 3, 3, and 3. This will assign 128 character 'A's, 0x01010101, 0x02020202, and 0x03030303 into the ``buffer'', ``lvar'', the previous frame pointer, and the return address respectively. (We assume that 32-bit variables are used by default and that C language notation is used.) When the function foo finishes it's operations and returns to the caller based on this memory arrangement, it will go back to the address 0x03030303, which isn't the caller address. If malicious code is located at the address, it is executed with the same privilege level as the application.

Figure 2: Sample function having Buffer Overflow Vulnerability
\begin{figure}\centering\begin{verbatim}void foo()
{
long *lvar;
char buffer...
........
strcpy (buffer, getenv (''HOME''));
.......
}\end{verbatim} \end{figure}

We will now introduce a classification of attack methods, how an attacker acquires control of the application. In the first category the target of the attack is to show in the stack. The following lists the data stored in this area and describes the attack method used.


26 posted on 01/30/2007 1:28:08 PM PST by Ernest_at_the_Beach (The DemonicRATS believe ....that the best decisions are always made after the fact.)
[ Post Reply | Private Reply | To 21 | View Replies]

To: Ernest_at_the_Beach

MSDOS with a few more wrinkles in the GUI layer interfaces.


27 posted on 01/30/2007 1:28:37 PM PST by Marine_Uncle
[ Post Reply | Private Reply | To 1 | View Replies]

To: Ernest_at_the_Beach

I am sure I am not the only one that can envision a scenario where flaws in XP/2000 are released and exploited in order to sell more copies of Vista.


28 posted on 01/30/2007 1:29:03 PM PST by DalcoTX
[ Post Reply | Private Reply | To 1 | View Replies]

To: Ernest_at_the_Beach
"Vista is 'more secure' says Gates"

My 8-year-old used car is 'more new' than my 9-year-old used car.
29 posted on 01/30/2007 1:30:25 PM PST by CertainInalienableRights
[ Post Reply | Private Reply | To 1 | View Replies]

To: Ernest_at_the_Beach

I suppose it depends your definition of "secure." If it means secure from files unapproved by RIAA and Microsoft, this is probably the case...


30 posted on 01/30/2007 1:31:30 PM PST by Little Ray
[ Post Reply | Private Reply | To 1 | View Replies]

To: Ernest_at_the_Beach

Secure as in keeps ME safe from crooks and software companies or secure as in Bill can do whatever the heck he wants to me?


31 posted on 01/30/2007 1:31:39 PM PST by Still Thinking (Quis custodiet ipsos custodes?)
[ Post Reply | Private Reply | To 1 | View Replies]

To: Still Thinking
The latter. If you have several thousand dollars worth of fancy audiovisual equipment, it won't work with Vista - not unless it complies with content restrictions. That sucks.

"Show me just what Mohammed brought that was new, and there you will find things only evil and inhuman, such as his command to spread by the sword the faith he preached." - Manuel II Palelologus

32 posted on 01/30/2007 1:37:24 PM PST by goldstategop (In Memory Of A Dearly Beloved Friend Who Lives In My Heart Forever)
[ Post Reply | Private Reply | To 31 | View Replies]

To: goldstategop

I know. The question was somewhat rhetorical. I have no intention of "upgrading" to Vista. I'm not entirely sure I won't chuck XP and revert to 2K.


33 posted on 01/30/2007 1:39:29 PM PST by Still Thinking (Quis custodiet ipsos custodes?)
[ Post Reply | Private Reply | To 32 | View Replies]

To: Ernest_at_the_Beach

"dramatically more secure than any other operating system released"

Now THAT'S a statement begging to be parsed, lol. Released by whom? Microsoft?


34 posted on 01/30/2007 1:40:48 PM PST by RegulatorCountry
[ Post Reply | Private Reply | To 1 | View Replies]

To: All
Reference Link:

Protecting from stack-smashing attacks
Hiroaki Etoh and Kunikazu Yoda
IBM Research Division, Tokyo Research Laboratory,
1623-14 Shimotsuruma, Yamato, Kanagawa 242-8502, Japan
June 19, 2000

**********************EXCERPT****************************

Abstract:

This paper presents some new ideas for improving the state of the art in buffer overflow detection. The main ideas are (1) the reordering of local variables to place buffers after pointers to avoid the corruption of pointers that could be used to further corrupt arbitrary memory locations, (2) the copying of pointers in function arguments to an area preceding local variable buffers to prevent the corruption of pointers that could be used to further corrupt arbitrary memory locations, and the (3) omission of instrumentation code from some functions to decrease the performance overhead.

35 posted on 01/30/2007 1:40:53 PM PST by Ernest_at_the_Beach (The DemonicRATS believe ....that the best decisions are always made after the fact.)
[ Post Reply | Private Reply | To 26 | View Replies]

To: RegulatorCountry

Prompted me to post this....wonder if they have implemented the techniques published in 2000 or something even more recent....see post # 35.


36 posted on 01/30/2007 1:43:47 PM PST by Ernest_at_the_Beach (The DemonicRATS believe ....that the best decisions are always made after the fact.)
[ Post Reply | Private Reply | To 34 | View Replies]

To: Ernest_at_the_Beach
Vista is "dramatically more secure than any other operating system released", Microsoft founder Bill Gates has told BBC News.

Translation: "Vista is 'dramatically more secure than any other MICROSOFT operating system released,' Microsoft founder Bill Gates has told BBC News."

37 posted on 01/30/2007 1:47:52 PM PST by E. Pluribus Unum (Islam is a religion of peace, and Muslims reserve the right to kill anyone who says otherwise.)
[ Post Reply | Private Reply | To 1 | View Replies]

To: Ernest_at_the_Beach

Golden rule of IT: NEVER upgrade a stable platform unless a new business requirement calls for it. I will not be going to Vista until it's time to replace my current PC.


38 posted on 01/30/2007 1:48:05 PM PST by Squawk 8888 (Pluto's been marginalized! Call the ACLU!)
[ Post Reply | Private Reply | To 1 | View Replies]

To: Rudder

"Vista is so wonderful that when my current PC craps out I'm getting a Mac."

Ditto. Waiting on Leapard to drop and the Mini's to be updated to C2D and I'll buy.


39 posted on 01/30/2007 1:48:49 PM PST by Wyatt's Torch (I can explain it to you. I can't understand it for you.)
[ Post Reply | Private Reply | To 10 | View Replies]

To: All
It's here! Introducing Windows Vista
40 posted on 01/30/2007 1:50:08 PM PST by Ernest_at_the_Beach (The DemonicRATS believe ....that the best decisions are always made after the fact.)
[ Post Reply | Private Reply | To 1 | View Replies]


Navigation: use the links below to view more comments.
first previous 1-2021-4041-6061-80 ... 141-145 next last

Disclaimer: Opinions posted on Free Republic are those of the individual posters and do not necessarily represent the opinion of Free Republic or its management. All materials posted herein are protected by copyright law and the exemption for fair use of copyrighted works.

Free Republic
Browse · Search
General/Chat
Topics · Post Article

FreeRepublic, LLC, PO BOX 9771, FRESNO, CA 93794
FreeRepublic.com is powered by software copyright 2000-2008 John Robinson