lists.openwall.net | lists / announce owl-users owl-dev john-users john-dev passwdqc-users yescrypt popa3d-users / oss-security kernel-hardening musl sabotage tlsify passwords / crypt-dev xvendor / Bugtraq Full-Disclosure linux-kernel linux-netdev linux-ext4 linux-hardening linux-cve-announce PHC | |
Open Source and information security mailing list archives
| ||
|
Message-ID: <20040317154311.GA1158@phobos.fs.tum.de> From: Simon.Richter at hogyros.de (Simon Richter) Subject: Re: Microsoft Security, baby steps ? Hi, > When you want to be the leader, you don't ask questions like that. You > recognize problems and you solve them and one of the problems today for > Windows is that MS is making it very difficult to keep patched if the user > doesn't want to put the machine on the net BEFORE it's fully patched. (a > valid security oriented attitude) Hrm, how about inventing an option (at install time) that places a very restrictive firewall on the network connection by default, say, only outgoing port 80 to windowsupdate.com (or even better, only let it establish a secure tunnel there), so you can patch and then loosen the firewall settings after that? Granted, you won't be able to install AntiSpy or sth. like that from the 'net, then, but the < $1 for a CD-R shouldn't really matter if you have just bought Windows. Simon -- GPG Fingerprint: 040E B5F7 84F1 4FBC CEAD ADC6 18A0 CC8D 5706 A4B4 -------------- next part -------------- A non-text attachment was scrubbed... Name: not available Type: application/pgp-signature Size: 189 bytes Desc: Digital signature Url : http://lists.grok.org.uk/pipermail/full-disclosure/attachments/20040317/a89f8181/attachment.bin
Powered by blists - more mailing lists