05.15.11

Gemini version available ♊︎

Negligence at Microsoft, Not ‘Market Share’, Causes Major Technical Problems

Posted in Deception, Microsoft, Security, Windows at 11:51 am by Dr. Roy Schestowitz

Not a victim of “success”

Swing

Summary: Microsoft’s vanity about market share is being used as a distractor in face of allegations that its software is inherently shoddy

THE MONOPOLIST (poor Microsoft) loves blaming its illegally-earned market share on the desktop for security problems, but as we explained yesterday, this is a nonsensical argument and it is negligence [1, 2, 3] — not installed base — which makes software vulnerable. Vista 7 is not secure and even Microsoft’s fanbase is willing to admit this. And in Windows, the “latest hole will soon be patched after a decade of vulnerability,” says a blogger. It is not the first such example of belated patching. If Microsoft’s installed base is the reason exploitable errors can be found, why has it taken a decade? The matter of fact is, less auditing of code lowers the quality of the code. Developers can get away with terrible programming practices and security is assumed to be assured by secrecy, not peer review that requires full transparency. This explains not only why Microsoft software is not secure but also why it is of such low quality (which makes the coders embarrassed to show it). As mentioned briefly in the daily links, Microsoft Fog Computing turns out to be as unreliable as its desktop-side software:

Customers on BPOS in the US and worldwide were kicked off their hosted Exchange email systems, being unable to read, write, or access their messages. All users were affected – from down in the cubicle farm all the way up to the CEO’s corner office. The outages started Tuesday and came after weeks of the service slowly degrading.

In conclusion, secret code is shoddy code. Free code is high-quality code. The more a stack uses components like Linux and Apache, the more solid it is likely to be. Every day I write software that will be freely shared; the visibility of the code comes with a burden — the burden that the code should actually be decent and well tested, not “spaghetti” as Vista’s codebase was once referred to as.

Share in other sites/networks: These icons link to social bookmarking sites where readers can share and discover new web pages.
  • Reddit
  • email

Decor ᶃ Gemini Space

Below is a Web proxy. We recommend getting a Gemini client/browser.

Black/white/grey bullet button This post is also available in Gemini over at this address (requires a Gemini client/browser to open).

Decor ✐ Cross-references

Black/white/grey bullet button Pages that cross-reference this one, if any exist, are listed below or will be listed below over time.

Decor ▢ Respond and Discuss

Black/white/grey bullet button If you liked this post, consider subscribing to the RSS feed or join us now at the IRC channels.

2 Comments

  1. Needs Sunlight said,

    May 16, 2011 at 2:51 am

    Gravatar

    Incompetence as much as negligence is likely to blame.

  2. TemporalBeing said,

    May 19, 2011 at 12:15 pm

    Gravatar

    Microsoft has several problems on the security front:

    1. They don’t have a very good patch management system, likely due to their source code management practices. The big problems result in one patch fixing an issue, and another unfixing it; this then goes round and round over years.

    2. Win32 by design is insecure and cannot be fixed. The basic interface for applications with the Windows API is a system that utilizes and object called a HANDLE. Applications are suppose to use the HANDLE to do something, and then clean it up when they’re done. However, there is not protection against one application getting a HANDLE for an object of another application. Furthermore, a HANDLE is merely a _pointer_ into one of several different tables (which one depends on the use of the HANDLE) inside kernel space, and by the way there is no method to authenticate the validity of a HANDLE – at least from the application layer.

    What this means is that Win32 by design allows other applications to put bugs into your application. here’s one very valid example:

    Your application creates a text box that is suppose to only be 256 characters long. You specify this on the creation of the text box. You properly use the text box to get the 256 characters.

    However, your friend BillB writes another application that accesses your text box and changes it to be 64536 bytes long, and inserts a lot of extra text into it to use up the entire space. Windows updates your text box to be the size BillB’s application said it is, but its YOUR text box, not BillB’s. Your application is now subject to a buffer overflow attack through no fault of your own. (Your application properly used the text box.)

    That is just one attack vector – and it applies to any use of a HANDLE to do something – whether it is a text box or a lock; yes, Locks use HANDLES – so BillB’s application could access one of your locks and cause your application to go into a Deadlock situation -or worse, unlock something at the wrong time. There are simply no protections and no method of protecting against those kinds of attacks – it’s the design of the Win32 API.

DecorWhat Else is New


  1. Links 07/06/2023: Reddit Layoffs and OpenGL 3.1 in Asahi Linux

    Links for the day



  2. Gemini Links 07/06/2023: Jukka Charting Geminispace

    Links for the day



  3. IRC Proceedings: Tuesday, June 06, 2023

    IRC logs for Tuesday, June 06, 2023



  4. NOW LIVE: Working for the Public — Universities, Software and Freedom - a Talk by Richard Stallman at Università di Pisa (Italy)

    As noted a few hours ago, Richard Stallman is delivering a talk at Università di Pisa this morning



  5. Richard Stallman's Talk is in Two Hours and There's a BigBlueButton Livestream

    Dr. Stallman is in Italy to give talks at universities this week; he will soon give a live talk, accessible in his site or directly at the source



  6. Links 06/06/2023: Angie 1.2.0, New EasyOS and EndeavourOS Released

    Links for the day



  7. Gemini Links 06/06/2023: OpenKuBSD, GrapheneOS, and More

    Links for the day



  8. Links 06/06/2023: OpenSUSE Plans for Leap

    Links for the day



  9. Gemini Links 06/06/2023: Bubble 4.0, Neutral News, and Older Bits

    Links for the day



  10. IBM's War on Open (Look at the Pattern of Layoffs at Red Hat)

    By abandoning OpenSource.com and OpenOffice.org/LibreOffice IBM sends out a clear signal that it doesn’t understand or simply does not care about the community of Free software users; its siege against the FSF and other institutions never ended and today we look at who’s being laid off or shown the door (the work environment is intentionally being made worse)



  11. Links 06/06/2023: IceWM 3.4.0 and Liveslak 1.7.0

    Links for the day



  12. Gemini Links 06/06/2023: Apple Might Kill VR, Tea Tea Deluxe 1.2.7 and Tea Land

    Links for the day



  13. IRC Proceedings: Monday, June 05, 2023

    IRC logs for Monday, June 05, 2023



  14. Links 05/06/2023: Debian 12 Almost Ready, Hong Kong 'Cannot' Remember Tiananmen Massacre

    Links for the day



  15. Gemini Links 05/06/2023: New Ship in Cosmic Voyage, Stack Overflow Moderator Strike

    Links for the day



  16. IRC Proceedings: Sunday, June 04, 2023

    IRC logs for Sunday, June 04, 2023



  17. Links 04/06/2023: Unifont 15.0.05 and PCLinuxOS Stuff

    Links for the day



  18. Gemini Links 04/06/2023: Wayland and the Old Computer Challenge

    Links for the day



  19. StatCounter: GNU/Linux (Including ChromeOS) Grows to 8% Market Share Worldwide

    This month’s numbers from StatCounter are good for GNU/Linux (including ChromeOS, which technically has both GNU and Linux); the firm assesses logs from 3 million sites and shows Windows down to 66% in desktops/laptops (a decade ago it was above 90%) with modest growth for GNU/Linux, which is at an all-time high, even if one does not count ChromeOS that isn’t freedom- or privacy-respecting



  20. Journalism Cannot and Quite Likely Won't Survive on the World Wide Web

    We’re reaching the point where the overwhelming majority of new pages on the Web (the World Wide Web) are basically junk, sometimes crafted not by humans; how to cope with this rapid deterioration is still an unknown — an enigma that demands hard answers or technical workarounds



  21. Do Not Assume Pensions Are Safe, Especially When Managed by Mr. EPOTIF Benoît Battistelli and António Campinos

    With the "hoax" that is the financial assessment by António Campinos (who is deliriously celebrating the inauguration of illegal and unconstitutional kangaroo courts) we urge EPO workers to check carefully the integrity of their pensions, seeing that pension promises have been broken for years already



  22. Links 04/06/2023: Why Flatpak and Wealth of Devices With GNU/Linux

    Links for the day



  23. Gemini Links 04/06/2023: Rosy Crow 1.1.3 and NearlyFreeSpeech.NET

    Links for the day



  24. IRC Proceedings: Saturday, June 03, 2023

    IRC logs for Saturday, June 03, 2023



  25. Links 04/06/2023: Azure Outage Again (So Many!) and Tiananmen Massacre Censored

    Links for the day



  26. Links 03/06/2023: Qubes OS 4.2.0 RC1 and elementaryOS Updates for May

    Links for the day



  27. Gemini Links 03/06/2023: Hidden Communities and Exam Prep is Not Education

    Links for the day



  28. Links 03/06/2023: IBM Betraying LibreOffice Some More (After Laying off LibreOffice Developers)

    Links for the day



  29. Gemini Links 03/06/2023: Bubble Woes and Zond Updates

    Links for the day



  30. Links 03/06/2023: Apache NetBeans 18 and ArcaOS 5.0.8

    Links for the day


RSS 64x64RSS Feed: subscribe to the RSS feed for regular updates

Home iconSite Wiki: You can improve this site by helping the extension of the site's content

Home iconSite Home: Background about the site and some key features in the front page

Chat iconIRC Channel: Come and chat with us in real time

Recent Posts