Security has become a strategic concern at Microsoft but security must not be permitted to become a tool of further monopolization.The claim, with which I agree, is that MS will argue that we must keep non MS software out of our computers to achieve security and that this argument is bogus. Their architecture has tended to make this claim plausible. Their closing recommendation is to require by law the publication of interfaces to the various major system components to achieve modularity thus allowing piecemeal replacement of components.
Windows XP Service Pack 2: Install With Care illustrates nicely a point made in the previous paper: beyond some complexity point, a bug fix is expected to introduce more than one bug. This was a point made about 1970 by Belady.
This notes the emergence of the virtual mobile phone service provider. The real provider’s employee’s climb cell towers. The virtual providers buy from the latter and add soft services much like the Internet portals.
The silent monopoly notes the near monopoly of the ARM processor chip in cell phones. ARM, the company, does not build chips but licenses the design to others.
U.S. Steers Consumers Away From IE. Homeland Security’s perspective.
New Scam Targets Bank Customers Worm infects browsers to capture bank passwords.
World’s First Mobile Virus Is designed to strike India in September 2004. Symbian: “But we can never say it’s not going to be possible. Smartphones have been designed... as open, programmable networked devices,” he said, adding that users should be careful before accepting to install new software.
He doesn’t say how users should decide.
First Windows CE Virus Emerges. A “proof of concept” virus called “WinCE4.Duts” designed to prove that a virus for the platform is possible without doing any damage.
Nokia releases ‘bluesnarfing’ fix. This article is interesting in that the system provider says that he joins the hacking group to learn about the vulnerabilities.