Linked by Thom Holwerda on Sat 27th May 2006 17:26 UTC, submitted by Ricus
Windows "Windows Vista Beta 2 includes a new defense against buffer overrun exploits called address space layout randomization. Not only is it in Beta 2, it's on by default too. Now before I continue, I want to level set ASLR. It is not a panacea, it is not a replacement for insecure code, but when used in conjunction with other technologies, which I will explain shortly, it is a useful defense because it makes Windows systems look 'different' to malware, making automated attacks harder." On a related note, Microsoft is having difficulties in reaching parity between the 64bit and 32bit version of Vista concerning the amount of drivers shipped.
Thread beginning with comment 128640
To view parent comment, click here.
To read all comments associated with this story, please click here.
Member since:

Other features in Hardened Gentoo Linux are:
PIC (Position Independent Code)
PIE/SSP (Position Independent Executable)/(Stack Smashing Protector)
MAC (Mandatory Access Control)

These all features are available by default in FC-5, too ;) (ASLR is done by Exec Shield)

Reply Parent Score: 3

netpython Member since:

And it's all there by don't have to compile anything:)

Reply Parent Score: 1