05.15.11

Negligence at Microsoft, Not ‘Market Share’, Causes Major Technical Problems

Posted in Deception, Microsoft, Security, Windows at 11:51 am by Dr. Roy Schestowitz

Not a victim of “success”

Swing

Summary: Microsoft’s vanity about market share is being used as a distractor in face of allegations that its software is inherently shoddy

THE MONOPOLIST (poor Microsoft) loves blaming its illegally-earned market share on the desktop for security problems, but as we explained yesterday, this is a nonsensical argument and it is negligence [1, 2, 3] — not installed base — which makes software vulnerable. Vista 7 is not secure and even Microsoft’s fanbase is willing to admit this. And in Windows, the “latest hole will soon be patched after a decade of vulnerability,” says a blogger. It is not the first such example of belated patching. If Microsoft’s installed base is the reason exploitable errors can be found, why has it taken a decade? The matter of fact is, less auditing of code lowers the quality of the code. Developers can get away with terrible programming practices and security is assumed to be assured by secrecy, not peer review that requires full transparency. This explains not only why Microsoft software is not secure but also why it is of such low quality (which makes the coders embarrassed to show it). As mentioned briefly in the daily links, Microsoft Fog Computing turns out to be as unreliable as its desktop-side software:

Customers on BPOS in the US and worldwide were kicked off their hosted Exchange email systems, being unable to read, write, or access their messages. All users were affected – from down in the cubicle farm all the way up to the CEO’s corner office. The outages started Tuesday and came after weeks of the service slowly degrading.

In conclusion, secret code is shoddy code. Free code is high-quality code. The more a stack uses components like Linux and Apache, the more solid it is likely to be. Every day I write software that will be freely shared; the visibility of the code comes with a burden — the burden that the code should actually be decent and well tested, not “spaghetti” as Vista’s codebase was once referred to as.

Share in other sites/networks: These icons link to social bookmarking sites where readers can share and discover new web pages.
  • Reddit
  • email

If you liked this post, consider subscribing to the RSS feed or join us now at the IRC channels.

Pages that cross-reference this one

2 Comments

  1. Needs Sunlight said,

    May 16, 2011 at 2:51 am

    Gravatar

    Incompetence as much as negligence is likely to blame.

  2. TemporalBeing said,

    May 19, 2011 at 12:15 pm

    Gravatar

    Microsoft has several problems on the security front:

    1. They don’t have a very good patch management system, likely due to their source code management practices. The big problems result in one patch fixing an issue, and another unfixing it; this then goes round and round over years.

    2. Win32 by design is insecure and cannot be fixed. The basic interface for applications with the Windows API is a system that utilizes and object called a HANDLE. Applications are suppose to use the HANDLE to do something, and then clean it up when they’re done. However, there is not protection against one application getting a HANDLE for an object of another application. Furthermore, a HANDLE is merely a _pointer_ into one of several different tables (which one depends on the use of the HANDLE) inside kernel space, and by the way there is no method to authenticate the validity of a HANDLE – at least from the application layer.

    What this means is that Win32 by design allows other applications to put bugs into your application. here’s one very valid example:

    Your application creates a text box that is suppose to only be 256 characters long. You specify this on the creation of the text box. You properly use the text box to get the 256 characters.

    However, your friend BillB writes another application that accesses your text box and changes it to be 64536 bytes long, and inserts a lot of extra text into it to use up the entire space. Windows updates your text box to be the size BillB’s application said it is, but its YOUR text box, not BillB’s. Your application is now subject to a buffer overflow attack through no fault of your own. (Your application properly used the text box.)

    That is just one attack vector – and it applies to any use of a HANDLE to do something – whether it is a text box or a lock; yes, Locks use HANDLES – so BillB’s application could access one of your locks and cause your application to go into a Deadlock situation -or worse, unlock something at the wrong time. There are simply no protections and no method of protecting against those kinds of attacks – it’s the design of the Win32 API.

What Else is New


  1. Free Speech on the Web Not Respected by Companies That Used to Support Software Freedom

    Mozilla does not have to make its Web browser about politics; it can just make an excellent piece of software that is neutral about the Web pages that it renders, based on the user's personal preferences



  2. Suppressed Facts of the Free Software Movement and Its Community of Volunteers – Part I: We Are Under Attack by Corporations and Their Salaried Facilitators

    The corporate takeover (taking over the Commons, produced by volunteers who are motivated by altruism) is a subject we must speak about and somehow tackle; this series will highlight uncomfortable or difficult truths



  3. InteLeaks – Part XVI: Intel Cannot Do Command Line, Even When It's Vastly Simpler and More Suitable for Development

    The Developer eXperience (DX) team at Intel seems to be full of Microsoft drones instead of developers and/or mildly technical people; this has not only harmed the quality of documentation but also upset staff, alienating people who actually understand what developers need (more than buzzwords like "DX")



  4. IRC Proceedings: Friday, January 15, 2021

    IRC logs for Friday, January 15, 2021



  5. Links 15/1/2021: KaOS 2021.01, Whisker Menu 2.5.2, Istio 1.8.2

    Links for the day



  6. InteLeaks – Part XV: Intel is Blind to Blind and Colour-Blind People

    Intel does not seem to grasp very basic concepts associated with accessibility; nevertheless, Intel shamelessly tries painting itself as "woke" and a "justice warrior" (policing speech while overlooking much-needed practical work)



  7. Links 15/1/2021: GStreamer 1.18.3 and Proton 5.13-5

    Links for the day



  8. IRC Proceedings: Thursday, January 14, 2021

    IRC logs for Thursday, January 14, 2021



  9. Links 14/1/2021: Wine 6.0, Debian 11 Freeze, and Alpine Linux 3.13

    Links for the day



  10. Patent Propaganda and UPC Jingoism Instead of Actual News

    Today's so-called 'news' about the EPO (Europe's second-largest institution) and the failed UPC is nothing short of shameless propaganda



  11. Links 14/1/2021: Season of KDE 2021 Selection, Mesa 21.0.0-RC1, Tor Browser 10.0.8

    Links for the day



  12. InteLeaks – Part XIV: Technical Incompetence and Incoherence Leading to Alienation and Brain Drain

    The idea that Intel "loves Linux" or "supports Linux" is somewhat of a sham; one needs only to consider what Intel insiders are saying about that, having witnessed it firsthand



  13. IRC Proceedings: Wednesday, January 13, 2021

    IRC logs for Wednesday, January 13, 2021



  14. Links 13/1/2021: $150 RISC-V Computer With GNU/Linux, Intel Replaces CEO Again, and New Fedora 34 Plans

    Links for the day



  15. Unitary Patent is Dead and Lies About the Unified Patent Court (UPC) Aren't Ending

    Not "Russian agents" but concerned European citizens are beginning to see the truth behind the Unified Patent Court, which the 'media' has wrongly called "Unitary Patent Court" three times in 2 days



  16. InteLeaks – Part XIII: GNU/Linux Documentation From People Who Never Even Use GNU/Linux

    Inside Intel there's a whole bunch of embarrassing secrets about the Developer/Development eXperience ("DX") team; no wonder documentation efforts have been lacking and far too much time wasted putting such documentation together



  17. Links 13/1/2021: Mozilla VPN, NeoChat 1.0.1 and Sci-Hub Under Attack

    Links for the day



  18. IRC Proceedings: Tuesday, January 12, 2021

    IRC logs for Tuesday, January 12, 2021



  19. GNOME Foundation is Still Participating in the Attack on Richard Stallman

    GNOME's supposed 'representatives' (close-knit friends with Microsoft connections) continue to attack RMS (Richard Stallman), the founder of GNU (the G in GNOME) and the Free Software Movement



  20. Links 12/1/2021: GTK 4.0.1 Released, Jailbroken iPhone 7 Running Ubuntu

    Links for the day



  21. InteLeaks – Part XII: Intel Isn't Interested in Improving and Instead It's Shooting the Messengers Who Highlight Areas for Improvement

    It seems rather clear that Intel (quite frankly like many other companies but perhaps even more so than the rest) isn't interested in self-assessment and instead it's looking to muzzle or even oust constructive critics



  22. IRC Proceedings: Monday, January 11, 2021

    IRC logs for Monday, January 11, 2021



  23. Tiger Computing Ltd Afraid of Being Seen as Close to the British Military, Resorts to SLAPP Against Blogger and GNU/Linux Developer

    Tiger Computing Ltd (UK) has resorted to baseless legal threats against critics and sceptics, based on clear and obvious misuse of trademark or copyright laws (they don't even seem to know the difference)



  24. Marketing Companies (Disguised as News Sites) Badmouth Linux, Go, Monero and More

    Another day, another shallow piece associating “Linux” with security risks based on something that has nothing to do with GNU/Linux and generally boils to nothing like a real threat (unlike Windows back doors)



  25. The Media is Slurring and Misleading Linux Users Instead of Just Telling the Mundane and Objective News

    The "big sites" or the so-called 'news' sites seem incapable of just objectively covering the news (in line with journalism/journalistic standards)



  26. Links 11/1/2021: Kdenlive 20.12.1, fwupd 1.5.5, Microsoft Offline Again

    Links for the day



  27. InteLeaks – Part XI: Accountability Issues and Disdain for Views/Opinions of Actual GNU/Linux Users/Developers/Communities

    The truth about internal affairs at Intel and developers' struggle with "low/non-tech involvement," as told by insiders



  28. Links 11/1/2021: Linux 5.11 RC3, Firefox Integrates More Patent Traps

    Links for the day



  29. As Microsoft Windows Drops to Just 30% Market Share the Microsoft-Connected 'Net Applications' Wants You to Think Windows Still Has Over 90% of the Market

    StatCounter says Windows is down to 30% this month (Android is at over 42%) and it’s time to talk about the lies which are still being spread by Net Applications (many so-called ‘news’ sites helped spread those lies last year, including so-called ‘Linux’ sites)



  30. IRC Proceedings: Sunday, January 10, 2021

    IRC logs for Sunday, January 10, 2021


RSS 64x64RSS Feed: subscribe to the RSS feed for regular updates

Home iconSite Wiki: You can improve this site by helping the extension of the site's content

Home iconSite Home: Background about the site and some key features in the front page

Chat iconIRC Channel: Come and chat with us in real time

Recent Posts