Linked by Thom Holwerda on Wed 10th Aug 2005 18:51 UTC, submitted by Not_Today
Privacy, Security, Encryption Microsoft unveiled details of its Strider HoneyMonkey research, a project that sniffs out sites hosting malicious code, and hands the information to other parts of the company for patching or legal action. The technical report (pdf) outlines the concept of cruising the Web with multiple automated Windows XP clients - some unpatched, some partially patched, some patched completely - to hunt for Web sites that exploit browser vulnerabilities.
Thread beginning with comment 16963
To view parent comment, click here.
To read all comments associated with this story, please click here.
RE[3]: typical ms politics
by on Thu 11th Aug 2005 17:39 UTC in reply to "RE[2]: typical ms politics"

Member since:

How about you take Basic Reading 101 and read up on what has been happening over the last 4 years.

Reply Parent Score: 0

RE[4]: typical ms politics
by on Fri 12th Aug 2005 02:12 in reply to "RE[3]: typical ms politics"
Member since:

"How about you take Basic Reading 101 and read up on what has been happening over the last 4 years."

go ahead...

explain the last 4 years.

Reply Parent Score: 0

RE[5]: typical ms politics
by CPUGuy on Fri 12th Aug 2005 05:18 in reply to "RE[4]: typical ms politics"
CPUGuy Member since:
2005-07-06

Let's see, complete code review of Windows gives us Windows 2003 and IIS6, which was/is such a giant leap from 2000.
.NET API
XPSP2
Microsoft actually spending time on getting Vista right.
Most everything that still has problems, security wise, hasn't had a re-release since the focus shift!

Reply Parent Score: 1