Security Watch

Is 'Genuine Windows Validation' a Good Thing?

Microsoft's latest attempt to curb piracy restricts security patches to only owners of genuine copies of Windows.

Hacking
Microsoft announced it will require "genuine Windows validation" in mid-2005 for anyone running Windows XP or Windows 2000 Professional who attempts to download security patches manually. Users of other operating systems, and those who obtain security patches automatically via enabling Automatic Updates, will be exempt for now. "Genuine Windows validation" involves determining whether or not the operating system has been purchased legally or not. The process, similar to Windows Activation, does not require the consumer to divulge private information to Microsoft.

Some of the media coverage about this speculates that preventing illegal copies of Windows from obtaining patches is going to make for a huge number of compromised systems. This idea is, to say the least, hilarious. It makes the assumption that someone running an illegal copy is more likely to get patches via manual downloads than Automatic Updates. I don't think so!

The problem is that most people don't get any updates at all, whether their installation is legal or not. I see no reason that Microsoft's shareholders should continue to allow illegal copies of Windows to run at all, but no doubt a large number of people who have such copies installed don't even know they've got an illegal OS in the first place. They got it when they bought a cheap PC, or purchased the OS separately from a store that had bogus stock.

No doubt eventually Microsoft will make "genuine Windows validation" mandatory for all security updates, and no doubt there are some who fear that eventuality also. My response to that concern is equally simple—get a legal copy before it happens. If withholding security updates makes for greater compliance with the law, then so be it.

The U.S. Department of Energy apparently accidentally published confidential Homeland Security documents marked "For Official Use Only," and the documents remain visible via Google's Web cache.

Want More Security?

This column was originally published in our weekly Security Watch newsletter. To subscribe, click here.

Please be sure you've created a properly configured robots.txt file on your Web servers. While it won't prevent confidential documents from being placed on a publicly available server, it is at least one way to prevent such documents from being available in Google's Web cache from now until eternity.

Denial of Service
Cisco IOS has been found to have several vulnerabilities, including:

  • IPv6 Packet Denial of Service
  • Multi Protocol Label Switching (MPLS) Denial of Service
  • Border Gateway Protocol (BGP) Denial of Service

Analysis suggests that the IPv6 and BGP vulnerabilities are highly unlikely to ever be exploited. The MPLS vulnerability does have some potential for attacks, but a MPLS vulnerability last year did not result in attacks.

Malicious Code
The volume of malware variants has significantly increased this month, with more than 2,000 different samples being provided to Wildlist. Despite this increase, nothing appears to be gaining "legs," or spreading significantly.

Human Factors
A new survey by the London's Licensed Taxi Drivers Association reported that almost 5,000 laptops and more than 60,000 mobile phones were left in London's black cabs by passengers over the last six months. Compare this with an August 2001 report for the same area which indicated that 2,900 laptops and 1,300 PDAs were left in the six months prior.

While typically such items are stolen purely for their resale value, one can only imagine the quantity of sensitive and confidential information they contained.

About the Author

Russ Cooper is a senior information security analyst with Verizon Business, Inc. He's also founder and editor of NTBugtraq, www.ntbugtraq.com, one of the industry's most influential mailing lists dedicated to Microsoft security. One of the world's most-recognized security experts, he's often quoted by major media outlets on security issues.

comments powered by Disqus
Most   Popular