LAS VEGAS--It's easy now to look back at Microsoft's Windows Vista and berate the company for the operating system's shortcomings, but the truth is far more complex, according to one security researcher. At the second day of the annual Black Hat conference here, Chris Paget, chief hacker at the security company Recursion Ventures, discussed her independent contracting work for Microsoft on Vista ahead of its release for the first time. Before Recursion took on the contract, all members of the team that worked on Vista were made to sign non-disclosure agreements that took five years to expire. Chris Paget, talking about her experience with Windows Vista at Black Hat 2011. Microsoft hired her team as a final measure to verify that the operating system was safe to ship. The move was so unusual for Redmond that the company had actually never done it before, said Paget. piratebaycamera there. There were process and tool improvements.
This was the first time that Microsoft brought in an outside team," she said. Her team had to upgrade the hard drive of the test computer that Microsoft sent her before they could even install the operating system, she said with a incredulous laugh slightly. The process was so atypical for Microsoft that they weren't sure what to expect. They expected us to come in and find nothing. Recursion looked at code kernel and the user space but was told not to look at legacy code. graphicfiles. Microsoft didn't add legacy code vetting until Windows 7, Paget said.
They got verification, not remediation." She said that her team was so good at finding critical flaws in Vista code that Vista was actually delayed as a result of one critical bug she found, and another Microsoft employee referred to them as a "rape gang" because they were beating up Vista so much. Despite the security problems that Paget and company learned in Vista, she also had high praise for Microsoft. She discussed Microsoft's bug track system and how Microsoft's own security team had created an intensive list of features ranked by risk. thrustsurprise. Risk, she said, was defined as whether the feature required credentials. If you had to enter a password, like an administrative password, there was a greater risk naturally associated with the feature. So due to Microsoft's work on this end, she was able to get started looking at features from beginning of the contract critically. The experience, she said, showed her that by the time Microsoft had far better procedures in place for security vetting than she would have thought otherwise.
Paget said that at home, she's more of a Unix fan and only uses Windows for gaming. ageblogs on this page. World-leading' is entirely appropriate" when discussing Microsoft's security procedures, she said at the start of her talk. Прикольные Cимуляторы Слотов Бездепозитный Бонус 2016 На Счет За Регистрацию В Интернете.
Microsoft's security process is spectacular." And toward the final end, she reiterated the point. OpenOffice 3: Faster, uninspired interface there. If security is a process, not a product, Microsoft deserves a lot of credit.
Write something about yourself. No need to be fancy, just an overview.