Linked by Thom Holwerda on Wed 20th Dec 2006 20:56 UTC
Windows "On November 30, Sophos issued its monthly report on the top ten threats reported to them in November of 2006. As a part of this, Sophos also studied Vista's vulnerability to these malware threats. I found the information and press discussion confusing, so I thought I would clarify what this really means for customers. In order to understand what was really going on here, I asked the team to go look at the technical facts behind the story, and that started in the lab. We began by observing first-hand how these various forms of malware affect a Vista system using a machine that was configured with the default settings and without any additional security software. What we found was that if you are using only the software in Vista (e.g., Windows Mail and no add-on security software), then you are immune to all ten of the malware threats that Sophos cited."
Permalink for comment 194834
To read all comments associated with this story, please click here.
Member since:

At default install, Windows XP (without service packs) enables services for:

* Remote procedure call, which indirectly allows
** Remote access to registry
** Remote access to disk configuration
** Remote access to event log

* Disk sharing

* Internet Information Services (web server)
** With many add-ons, like remote printing

* Distributed COM (which allowed that one minute take down)

And others, running in the background without any kind of firewall.

While it's of course normal to have bugs in software, it's not such a good practice to open up such potential holes at default configuration.

Then Microsoft realized what they're doing, and released SP2 to address these issues. And they did a much better job with 2K3 (which probably has better security record than most desktop Linux distributions).

Security is not a foolproof game. But your approach has a great impact on the risk.

Edited 2006-12-21 05:23

Reply Parent Score: 4