In message <[EMAIL PROTECTED]>, "Kenneth R. van Wyk" writes:
>FYI, eWeek has an interesting article on Intel's "System Integrity Services," 
>which aims to add hardware level protection against rootkits.  Now, it seems 
>to me that they're bundling all sorts of nasty critters in with their 
>definition of "rootkit" but it's worth reading, IMHO.  
>
>The detection mechanism seems to primarily be looking primarily for non-OS 
>software modifying OS inhabited memory blocks.  Wonder how they're definining 
>(and maintaining the definition) of each...  I also wonder how it'll impact 
>near-OS software installations like, say, device drivers, authentication 
>plug-ins, and other things that need to poke pretty deeply into the OS in 
>order to install.
>
>Anyway, here's a URL to the article.
>
>http://www.eweek.com/article2/0,1895,1900533,00.asp
>
Put another way, Sony's DRM stunt, though ill-conceived and poorly 
executed, would have been *authorized* if they'd cleaned up the 
permission request just a little bit.

                --Steve Bellovin, http://www.stevebellovin.com


_______________________________________________
Secure Coding mailing list (SC-L)
SC-L@securecoding.org
List information, subscriptions, etc - http://krvw.com/mailman/listinfo/sc-l
List charter available at - http://www.securecoding.org/list/charter.php

Reply via email to