All Things Microsoft > Microsoft as a Company

TCPA/Palladium cut from Longhorn

(1/4) > >>

PseudoRandomDragon:
http://www.crn.com/sections/BreakingNews/dailyarchives.asp?ArticleID=49936

I hope this is true. HORRAY! That TCPA in hardware thing would really piss me off.

Xeen:
YAY!! But what the fuck is No Execute techonoloy?

Lime:

quote: Some attacks by malicious software leverage software
vulnerabilities that allow too much data to be copied into areas
of the computer's memory. These vulnerabilities are typically
referred to as buffer overruns. Although no single technique can
completely eliminate this type of vulnerability, Microsoft is
employing a number of security technologies to mitigate these
attacks from different angles. First, core Windows components
are being recompiled with the most recent version of our
compiler technology to help mitigate against buffer overruns.

Additionally, Microsoft is working with microprocessor companies
to help Windows support hardware-enforced "no execute" (or NX)
on microprocessors that contain the feature. NX uses the CPU
itself to enforce the separation of application code and data,
preventing an application or Windows component from executing
program code that an attacking worm or virus inserted into a
portion of memory marked for data only.
--- End quote ---


And, http://www.iunknown.com/000368.html
 
quote: Scoble just posted a link to the Developer's View of Windows XP SP2. It's worth reading the section on the new memory protection features in SP2, specifically the No-Execute (NX) flag. It requires hardware support from the CPU, specifically the ability to set a no-execute flag on each virtual page. This would effectively make it impossible to execute code that was injected via a buffer overrun attack on a data page. Currently the only CPU's that implement this feature are AMD's K8 and Intel Itanium processors, but "it is expected that future 32 and 64-bit processors will provide execution protection. Microsoft is preparing for and encouraging this trend by supporting execution protection in its flagship Windows operating systems."
--- End quote ---

http://msdn.microsoft.com/library/default.asp?url=/library/en-us/dnwxp/html/securityinxpsp2.asp

WMD:
Um...

http://slashdot.org/articles/04/05/05/1520224.shtml?tid=109&tid=126&tid=172&tid=185&tid=187&tid=190&tid=201

Sorry guys.  MS has denied it completely.

Lime:
Well then, if "palladium" or whatever they call it now bothers you so much, don't use Longhorn.

Navigation

[0] Message Index

[#] Next page

Go to full version