-- Leo's gemini proxy

-- Connecting to gemini.techrights.org:1965...

-- Connected

-- Sending request

-- Meta line: 20 text/gemini;lang=en-GB

● 11.16.09


●● Microsoft Won’t Secure Firefox/Chrome Users, Shows More Negligence


Posted in Microsoft, Security, Vista 7, Windows at 9:19 am by Dr. Roy Schestowitz


Summary: ActiveX required by Microsoft’s OneCare; investigation into Vista 7 vulnerabilities a case of “too little, too late”


MICROSOFT pretends to have changed for the better. It pretends that it allows users of Windows to use Web browsers other than Internet Explorer, but the following post — artistically titled “Microsoft being a Onecare [Wanker]“ — suggests otherwise:


↺ “Microsoft being a Onecare [Wanker]“


> For starters, it uses an ActiveX control – Internet Explorer required in other words – that’s annoyingly hard to install. You get warnings galore from Windows 7′s UAC and IE about popups and do you really really really want to install something that has the potential to roger your system well and truly?


ActiveX was designed to restrict competition by supplanting Web standards. It ended up becoming one of the biggest security nightmares out there and Novell supports this.


restrict competition by supplanting Web standards

Novell supports this


Here is the new story of a man who has just been fired because of these practices from Microsoft:


↺ the new story of a man


> Linux Contractor Fired for Using Firefox/Linux[...]The irony? The “compentency test” was a Security & Privacy test from the four letter credit card company that HAD to be taken on MS Windows with IE?I’ll let you be the ones to point out the obvious…the fact that this large computer/server company with three letters in their name is reportedly a “friend to Linux”. I’ll let you talk about how a Linux Professional who uses Linux as their desktop environment was denied access to employment. Employment that was based on his knowledge of Linux. Yeah, the server side…but still…Now let’s brag about how much ground Linux has made…And a Linux Project Manager for said company asking the question:“What’s this Foxfire thing?”


As a secondary item of news, some days ago we argued for Microsoft liability when it comes to the latest Vista 7 vulnerability. Microsoft deserves to be accused of negligence and the following article implies deception too.


deserves to be accused of negligence

↺ implies deception


> Is Microsoft Overhyping Security In Windows 7?[...]Microsoft has been aggressively marketing the security improvements in Windows 7, but some security experts believe this strategy could leave the software giant open to some unpleasant repercussions.


Vista 7 has been breached before and to give some examples of insecurity, we have:


↺ Vista 7


Cybercrime Rises and Vista 7 is Already Open to HijackersVista 7: Broken Apart Before ArrivalDepartment of Homeland Security ‘Poisoned’ by Microsoft; Vista 7 is Open to Hijackers AgainVista 7 Security “Cannot be Fixed. It’s a Design Problem.”Why Vista 7 Could be the Least Secure Operating System EverVista 7 Vulnerable to Latest “Critical” FlawsVista 7 Seemingly Affected by Several More “Critical” Flaws This MonthReason #1 to Avoid Vista 7: InsecurityVista 7 Left Hijackable Again (Almost a Monthly Recurrence)Vista 7 as Insecure as Predecessors, Shows SophosMicrosoft, Novell, SCO, and NASDAQ Delistings


Now there is the SMB flaw that Microsoft finally acknowledges.


↺ SMB flaw

↺ Microsoft finally acknowledges


> Microsoft on Friday said it is working on a fix for a vulnerability in the Server Message Block file-sharing protocol in Windows 7 and Windows Server 2008 Release 2 that could be used to remotely crash a computer.


It really took them too long, having waited for attack code to appear before properly investigating. That’s negligence and it is irresponsible. Gregg Keizer writes:


↺ writes


> The zero-day vulnerability was first reported by Canadian researcher Laurent Gaffie last Wednesday, when he revealed the bug and posted proof-of-concept attack code to the Full Disclosure security mailing list and his blog. According to Gaffie, exploiting the flaw crashes Windows 7 and Server 2008 R2 systems so thoroughly that the only recourse is to manually power off the computers.


Why has Microsoft waited so long before looking into the problem? Could it be that lack of security and increased fear help Microsoft sell more ‘solutions’ to those very same problems? As we showed some days ago, is clearly profiting from Conficker, for example. █


is clearly profiting from Conficker


Share in other sites/networks: These icons link to social bookmarking sites where readers can share and discover new web pages.


Permalink  Send this to a friend


Permalink

↺ Send this to a friend



----------

Techrights

➮ Sharing is caring. Content is available under CC-BY-SA.

-- Response ended

-- Page fetched on Sat May 18 09:57:56 2024