New User? Need help? Click here to register for free! Registering removes the advertisements.

Computer Cops
image image image image image image image image
Donations
If you found this site helpful, please donate to help keep it online
Don't want to use PayPal? Try our physical address
image
Prime Choice
· Head Lines
· Advisories (All)
· Dnld of the Week!
· CCSP News Ltrs
· Find a Cure!

· Ian T's (AR 23)
· Marcia's (CO8)
· Bill G's (CO11)
· Paul's (AR 5)
· Robin's (AR 2)

· Ian T's Archive
· Marcia's Archive
· Bill G's Archive
· Paul's Archive
· Robin's Archive
image
Security Central
· Home
· Wireless
· Bookmarks
· CLSID
· Columbia
· Community
· Downloads
· Encyclopedia
· Feedback (send)
· Forums
· Gallery
· Giveaways
· HijackThis
· Journal
· Members List
· My Downloads
· PremChat
· Premium
· Private Messages
· Proxomitron
· Quizz
· RegChat
· Reviews
· Google Search
· Sections
· Software
· Statistics
· Stories Archive
· Submit News
· Surveys
· Top
· Topics
· Web Links
· Your Account
image
CCSP Toolkit
· Email Virus Scan
· UDP Port Scanner
· TCP Port Scanner
· Trojan TCP Scan
· Reveal Your IP
· Algorithms
· Whois
· nmap port scanner
· IPs Banned [?]
image
Survey
How much can you give to keep Computer Cops online?

$10 up to $25 per year?
$25 up to $50 per year?
$10 up to $25 per month?
$25 up to $50 per month?
More than $50 per year?
More than $50 per month?
One time only?
Other (please comment)



Results
Polls

Votes: 1010
Comments: 21
image
Translate
English German French
Italian Portuguese Spanish
Chinese Greek Russian
image
image winxp: Security HeadLines: Microsoft Checks Leaky Windows image
Windows XP/Pro


Microsoft Checks Leaky Windows
Company says code published on Net has had no known impact on customers.
Joris Evers,
IDG News Service
Tuesday, February 24, 2004

Microsoft is conducting a security review of the Windows 2000 and NT 4.0 source code leaked onto the Internet earlier this month to determine if there is any risk to its customers, the company said Monday.

Microsoft is currently performing an in-depth security review of the leaked code, the Redmond, Washington-based software maker said in a statement sent via e-mail.



Cross-Checking Code
The code was checked prior to its commercial release, but Microsoft is taking another look at it with more modern review tools.

Since the commercial release of the source code that was leaked, more sophisticated tools and processes have been developed, and there have been numerous improvements in the security review process, the company said.

Analysts and security experts have warned that the Windows source code breach could lead to an increase in cyberattacks because it would make it easier for hackers to find holes in the operating systems. However, the leaked source code is old and many issues have already been fixed by patches and service packs.

Still, a bug hunter last week claimed to have uncovered a security flaw in Internet Explorer 5 by studying leaked source code. Microsoft said the problem is a known issue that it had discovered already and fixed in IE 6.0. The company was investigating why the flaw was not patched in IE 5, which is used by millions of Internet users worldwide.

In order to thoroughly determine whether or not our customers may be impacted by the unauthorized release of this source code, we are reviewing it again, Microsoft said. The company has not assigned a timeline to its review and has yet to decide how to respond to anything the review may uncover, according to the statement.



Same Old Situation?
Some Microsoft customers were concerned that the code leak will require them to install more security patches, although others seemed to consider it business as usual with Microsoft's software.

This doesn't necessarily change the environment we've had to become accustomed to. Existing vulnerabilities in Windows prior to this code release have forced us to take a much more aggressive approach to service pack upgrades and security fixes, said Ken Meszaros, assistant vice president and infrastructure manager at LandAmerica Financial Group, a real estate transaction services provider in Richmond, Virginia.

We've instituted a staffed security function within our infrastructure group to develop, implement, and maintain an aggressive patch management process. We've gained management commitment to staying current and patched. We utilize system management functions to review and enforce compliance, Meszaros said.

Tony Tovar, network administrator at accounting and consulting firm Moss Adams in San Diego, said he trusts that Microsoft has already identified and patched any obvious bugs in Windows 2000 and NT 4.0. I wouldn't be surprised, though, if the virus-writer community were to find new avenues to exploit, he said.

My company isn't doing anything we weren't already doing: firewalls, antivirus, and automated operating system updates, Tovar added.



Customer Concerns..............................
More at PCWorld
Posted on Tuesday, 24 February 2004 @ 18:14:43 EST by phoenix22
image

 
Login
Nickname

Password

· New User? ·
Click here to create a registered account.
image
Related Links
· TrackBack (0)
· Microsoft
· Microsoft
· HotScripts
· W3 Consortium
· More about Windows XP/Pro
· News by phoenix22


Most read story about Windows XP/Pro:
Windows XP Administrator Exploit

image
Article Rating
Average Score: 0
Votes: 0

Please take a second and vote for this article:

Bad
Regular
Good
Very Good
Excellent


image
Options

Printer Friendly Page  Printer Friendly Page

image
"Login" | Login/Create an Account | 0 comments
Threshold
The comments are owned by the poster. We aren't responsible for their content.

No Comments Allowed for Anonymous, please register