LAS VEGAS--It's easy now to look back at Microsoft's Windows Vista and berate the company for the operating system's shortcomings, but the truth is far more complex, according to one security researcher. Trolls Watch Bluray 2016 Online read more. At the second day of the annual Black Hat conference here, Chris Paget, chief hacker at the security company Recursion Ventures, discussed her independent contracting work for Microsoft on Vista to its release for the first time prior. Before Recursion took on the contract, all members of the team that worked on Vista were made to sign non-disclosure agreements that took five years to expire. Chris Paget, talking about her experience with Windows Vista at Black Hat 2011. Microsoft hired her team as a final measure to verify that the operating system was safe to ship. gzpiratebay. The move was so unusual for Redmond that the ongoing company had actually never done it before, said Paget. There were process and tool improvements. This was the first time that Microsoft brought in an outside team," she said. Her team had to upgrade the hard drive of the test computer that Microsoft sent her before they could even install the operating system, she said with a slightly incredulous laugh. The process was so atypical for Microsoft that they weren't sure what to expect. They expected us to come in and find nothing. Recursion looked at code kernel and the user space but was told not to look at legacy code. Microsoft didn't add legacy code vetting until Windows 7, Paget said. Qik adds Android to iPhone video calls. They got verification, not remediation." She said that her team was so good at finding critical flaws in Vista code that Vista was actually delayed as a result of one critical bug she found, and another Microsoft employee referred to them as a "rape gang" because they were beating up Vista so much. Despite the security problems that company and Paget found out in Vista, she had high praise for Microsoft also. She discussed Microsoft's bug track system and how Microsoft's own security team had created an extensive set of features ranked by risk. Risk, she said, was defined as whether the feature required credentials. If you had to enter a password, like an administrative password, there was a greater risk naturally associated with the feature. So because of Microsoft's work on this end, she was able to commence looking at features from beginning of the contract critically. The experience, she said, showed her that by the time Microsoft had far better procedures in place for security vetting than she would have thought otherwise. utorrentpitch here. Paget said that at home, she's more of a Unix fan and only uses Windows for gaming. World-leading' is totally appropriate" when discussing Microsoft's security procedures, she said at the start of her talk. Microsoft's security process is spectacular." And toward the end, she reiterated the point. Torrent Wiretap Pro Mac read more. If security is a process, not a product, Microsoft deserves a lot of credit. A Street Cat Named Bob Full Movie'>A Street Cat Named Bob Full Movie.
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |