lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite for Android: free password hash cracker in your pocket
[<prev] [next>] [thread-next>] [day] [month] [year] [list]
Date: Thu, 09 Dec 2010 20:39:21 -0500
From: John Jester Wilham Patrick III <watermonk@...out.com>
To: full-disclosure@...ts.grok.org.uk
Subject: Windows is 100% self-modifying assembly code?
	(Interesting security theory)



 

 From Andrew Auernheimer's Diary / irc memories:

Windows is written in pure, self-modifying assembly code. Notice how you can install 15 gigs of data from a single Windows install DVD, which can only hold 5 gigs? This is because the code is dynamically generated to minimize attack vectors. Any attempt to observe the static files on the disk will change how it looks in runtime. This is also why Windows needs to be updated so often, so the running code never looks like it did before.

Does this sound true to you guys? Windows does seem to have updates that take forever and speed wise it always felt there was something going on.  Whenever I leave my laptop alone, even when it's offline, indexing off, the computer is always working on stuff and you new know what it is.

Maybe all applications with Windows compile on runtime for dynamic binaries, yet through .net's open, user-friendly API are still compatible?

Balmer said he wanted to make Vista and 7 an OS that would not slow down after usage, but instead speed up. Windows is constantly reprogramming itself to suit the behavior of it's users and performing security and performance auditing.

This is likely true - Think about it:

All viruses are just malicious scripts. It's like saying *nix is insecure because script kiddies compile binaries and bash scripts that rm /.

No one ever has ever had an attack vector against Windows 7 or Vista. Please confirm.


 

Content of type "text/html" skipped

_______________________________________________
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ