Democratic Underground Latest Greatest Lobby Journals Search Options Help Login
Google

More fine print on the Windows XP-SP2 update..."some" protection

Printer-friendly format Printer-friendly format
Printer-friendly format Email this thread to a friend
Printer-friendly format Bookmark this thread
This topic is archived.
Home » Discuss » The DU Lounge Donate to DU
 
Bush_Eats_Beef Donating Member (1000+ posts) Send PM | Profile | Ignore Tue Aug-17-04 09:41 PM
Original message
More fine print on the Windows XP-SP2 update..."some" protection
http://reviews.cnet.com/4520-3513_7-5324906.html?tag=cnetfd.plug

Some XP SP2 changes are harder to see. Microsoft used this release to harden its operating system; in other words, Microsoft recompiled all its Windows system binaries to include a new flag, GS, which will mitigate buffer overflows, a common method used by criminal hackers (crackers) to overwrite legitimate code with malicious code on your PC. A buffer overflow is the method the Sasser worm used to infect PCs. Windows XP SP2 also makes important changes to core Windows components, such as DCOM and RPC. (Flaws within the DCOM RPC led to the damaging MSBlast attack last year.)

To fully block the aforementioned buffer overflow and the Internet worms that feed on them, you'll need to follow fine print: turns out the necessary No Execute setting isn't present in the current hardware architecture of most 64-bit and 32-bit processors on the market today. This data execution protection, or DEP, is currently available only on newer AMD and a handful of Intel's Itanium server chips. In other words, the new Windows DEP changes won't help you unless you're running XP SP2 on a machine with AMD or Intel Itanium processors. My colleague, David Berlind, has suggested that large companies looking to upgrade their hardware fleet should wait until after the first of the year, after Intel has released its chips.

And remember what I said above about the XP firewall? That it's new and improved? Well, I need to qualify that statement. Despite the firewall's improvements, it's not invincible. A month ago, I asked Fred Felmen, vice president of marketing for Zone Labs, what impact Windows XP SP2 might have on third-party firewalls such as his Zone Labs ZoneAlarm. He said the Microsoft firewall protects only against inbound threats, not outbound threats, such as keystroke-logging Trojans that report your passwords and credit card info to others. Also, the lack of outbound protection means your infected PC could still participate in distributed denial-of-service attacks. In short, I recommend keeping your third-party firewall enabled alongside Microsoft's. Two firewalls are better than one.
Printer Friendly | Permalink |  | Top
kiahzero Donating Member (1000+ posts) Send PM | Profile | Ignore Tue Aug-17-04 09:46 PM
Response to Original message
1. Any idea where we can get a list of supported processors?
I just had to buy a new AMD XP 3000+ Barton Core CPU (my old mobo and CPU appear to have died) and I'm a bit curious if it supports this setting.
Printer Friendly | Permalink |  | Top
 
DU AdBot (1000+ posts) Click to send private message to this author Click to view 
this author's profile Click to add 
this author to your buddy list Click to add 
this author to your Ignore list Thu May 02nd 2024, 01:13 AM
Response to Original message
Advertisements [?]
 Top

Home » Discuss » The DU Lounge Donate to DU

Powered by DCForum+ Version 1.1 Copyright 1997-2002 DCScripts.com
Software has been extensively modified by the DU administrators


Important Notices: By participating on this discussion board, visitors agree to abide by the rules outlined on our Rules page. Messages posted on the Democratic Underground Discussion Forums are the opinions of the individuals who post them, and do not necessarily represent the opinions of Democratic Underground, LLC.

Home  |  Discussion Forums  |  Journals |  Store  |  Donate

About DU  |  Contact Us  |  Privacy Policy

Got a message for Democratic Underground? Click here to send us a message.

© 2001 - 2011 Democratic Underground, LLC