| Forum Home | ||||
| Press F1 | ||||
| Thread ID: 53889 | 2005-01-30 08:57:00 | Data Execution Protection hacked | robsonde (120) | Press F1 |
| Post ID | Timestamp | Content | User | ||
| 319394 | 2005-01-30 08:57:00 | The SP2 measure, known as Data Execution Protection, is intended to prevent would-be attackers from inserting rogue code into a PC's memory and tricking Windows into running the program. However, in a paper published Friday, Moscow-based Positive Technologies said two minor mistakes in the implementation of the technology allow a knowledgeable programmer to sidestep the protection. The company notified Microsoft of the problem Dec. 22, but it apparently decided not to wait for the software giant to patch the flaws. Neither Microsoft nor Positive Technologies immediately responded to requests for comment Friday. After several delays, Microsoft began rolling out SP2 in August of last year, at which time company Chairman Bill Gates called the update "a significant step in delivering on our goal to help customers make their PCs better isolated and more resilient in the face of increasingly sophisticated attacks." |
robsonde (120) | ||
| 319395 | 2005-01-30 09:12:00 | Take a brief trip back in time and you'll see this has already been pointed out. :) | agent (30) | ||
| 319396 | 2005-01-30 09:14:00 | my fault , core dumped | robsonde (120) | ||
| 1 | |||||