Linked by Thom Holwerda on Wed 5th Jan 2011 22:09 UTC
Windows And this is part two of the story: Microsoft has just confirmed the next version of Windows NT (referring to it as NT for clarity's sake) will be available for ARM - or more specifically, SoCs from NVIDIA, Qualcomm, and Texas Instruments. Also announced today at CES is Microsoft Office for ARM. Both Windows NT and Microsoft Office were shown running on ARM during a press conference for the fact at CES in Las Vegas.
Thread beginning with comment 456180
To view parent comment, click here.
To read all comments associated with this story, please click here.
RE[5]: BC
by Neolander on Thu 6th Jan 2011 13:24 UTC in reply to "RE[4]: BC"
Member since:

The problem is that almost all malware is also distributed as closed-source binary executables only, and that (being closed source) there is no way that anyone other than the creators of any given piece of such software can tell the difference. No amount of user education will change the fact that no-one (other than the authors of the software) can tell if a given closed-source binary executable does or does not contain new malware.

At least a part of malware can be blocked without knowing how a program works internally, by using a capability-based security model. If the binary blob is sandboxed, it can only do the amount of harm it has been allowed to do.

Most desktop applications, as an example, don't need full access to the user's home folder. Really, they don't. Most of the time, they use this access to open either private config files, or user-designated files. Thus, if we only allow desktop apps to access their config files and user-designated files, we just got rid of that part of malware which used this universal access to the user's home folder for privacy violation or silently deleting and corrupting files without the user knowing.

It's exactly the same tactic as preventing forkbombing by not allowing a process to fork an infinite amount of times by default. Seriously, what kind of non-system software would require that with honest intents ?

This doesn't block the "please enter your facebook password in the form below" kind of malware, though... But at least, the user is conscious of what he's doing now. Only then may user education work.

Edited 2011-01-06 13:32 UTC

Reply Parent Score: 1