Linked by Amjith Ramanujam on Mon 11th Aug 2008 16:13 UTC, submitted by gonzo
Privacy, Security, Encryption Ars Technica has analyzed recently publicized Vista's security flaws. "Unfortunate, yes, but not as was reported in the immediate aftermath of the presentation evidence that Vista's security is useless, nor does this work constitute a major security issue. And it's not game over, either. Sensationalism sells, and there's no news like bad news, but sometimes particularly when covering security issues, it would be nice to see accuracy and level-headedness instead. ... Furthermore, these attacks are specifically on the buffer overflow protections; they do not circumvent the IE Protected Mode sandbox, nor Vista's (in)famous UAC restrictions."
E-mail Print r 10   41 Comment(s)
Permalink for comment 326527
To read all comments associated with this story, please click here.
RE: Quesiton for programmers ...
by SterlingNorth on Mon 11th Aug 2008 18:21 UTC in reply to "Quesiton for programmers ..."
SterlingNorth
Member since:
2006-02-21

They crash, that's why. I'm presuming some software behaves in such a way as they try to execute software that is stored in data pages. (I'm no programmer. I just read Wikipedia...http://en.wikipedia.org/wiki/Data_Execution_Prevention That, and I know that having DEP on crashed an older version of flash.)

Reply Parent Score: 1