This page permanently redirects to gemini://gemini.techrights.org/2015/04/17/microsoft-back-doors-haven/.

● 04.17.15

●● Microsoft Windows Remotely Crashed, Remotely Hijacked, But Still No Logo and No Branding for the Bugs

Posted in Microsoft, Security, Windows at 6:02 am by Dr. Roy Schestowitz

Summary: Windows maintains its reputation as a back doors haven, but the media is still not highlighting the severity of this issue, instead focusing on accidental bugs in Free software, even very old (and already fixed) bugs

AS our previous post stated, there is an effort to keep insecurity debates around Free software, even if by going a whole year back to the "Heartbleed" brand. “More branded bug FUD” can be found here, according to a reader of ours. So why are journalists still so stubborn and so eager to keep us talking about Free software as the risk when Microsoft deliberately makes its software insecure as if the priority is to keep remote access (by anyone) in tact (some countries now recognise this)? Why are there no brands for Microsoft's critical bugs these days? Free software is a big threat to the Security State, not to security, so a large number of moles can be suspected or even assumed. How many SSL flaws have already affected Microsoft and how many of them got “branded” in the same way as the OpenSSL bug? Some journalists don’t even name Windows, to spare Microsoft the embarrassment.

=> our previous post | going a whole year back to the "Heartbleed" brand | ↺ here | ↺ Microsoft deliberately makes its software insecure | to keep remote access (by anyone) in tact | now recognise this | no brands for Microsoft's critical bugs these days | ↺ don’t even name Windows

“Some journalists don’t even name Windows, to spare Microsoft the embarrassment.”Another back door/bug door in Windows has just been found. As iophk told us yesterday: “No logo or name?” No, it’s Windows. Remote access by anyone is a given any day.

=> ↺ been found

As this article noted the other day, “Microsoft abruptly ended advance notification of security patches in January.”

=> ↺ this article

In other words, Microsoft does not even inform those affected by serious bugs anymore. And in other news (yesterday), “HTTP ‘pings of death’ are spewing across web to kill Windows servers” (not the first of this kind).

=> ↺ other news (yesterday)

To quote the article: “The SANS Institute has warned Windows IIS web server admins to get patching as miscreants are now exploiting a flaw in the software to crash websites.”

“For Microsoft,” says an IDG report, “the vulnerabilities just keep popping up, and appear to be surfacing more quickly than ever before.

=> ↺ an IDG report

“Like last month, Microsoft issued a fairly large number of security bulletins for April Patch Tuesday—11 bulletins addressing 26 vulnerabilities. Last month brought 14 bulletins from Microsoft, covering 43 vulnerabilities.”

Remember that Microsoft does not even report all the vulnerabilities. It games the system by making up bogus numbers (silent patches). █

=> games the system by making up bogus numbers (silent patches)

Share in other sites/networks: These icons link to social bookmarking sites where readers can share and discover new web pages.

Permalink  Send this to a friend

=> Permalink | ↺ Send this to a friend


=> Techrights

➮ Sharing is caring. Content is available under CC-BY-SA.

Proxy Information
Original URL
gemini://gemini.techrights.org/2015/04/17/microsoft-back-doors-haven
Status Code
Success (20)
Meta
text/gemini;lang=en-GB
Capsule Response Time
282.072165 milliseconds
Gemini-to-HTML Time
1.803517 milliseconds

This content has been proxied by September (ba2dc).