{"id":1491,"date":"2006-06-01T00:00:00","date_gmt":"2006-06-01T00:00:00","guid":{"rendered":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/2006\/06\/01\/vista-hides-from-hackers\/"},"modified":"2021-12-30T11:39:29","modified_gmt":"2021-12-30T11:39:29","slug":"vista-hides-from-hackers","status":"publish","type":"post","link":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/2006\/06\/01\/vista-hides-from-hackers\/","title":{"rendered":"Vista hides from hackers"},"content":{"rendered":"<p>Windows Vista Beta 2, released last week, includes a new security feature designed to protect against buffer overrun exploits.   Called Address Space Layout Randomization (ASLR), the feature loads key system files in different memory locations each time the PC starts, making it harder for malicious code to run, according to Microsoft.  &#8220;It is not a panacea, it is not a replacement for insecure code,&#8221; Michael Howard, a senior security program manager at Microsoft, wrote in a blog post announcing the feature.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Several open-source security systems use it already, including OpenBSD, and the PaX and Exec Shield patches for Linux.<\/p>\n<p>Certain attacks attempt to call Windows system functions, such as the &#8220;socket()&#8221; function in &#8220;wsock32.dll,&#8221; to open a network socket.<\/p>\n<p>Randomization seems to have served open-source systems fairly well, said Russ Cooper, senior scientist at Cybertrust, a security vendor in Herndon, Va.  &#8220;I suspect this will be the first thing looked for&#8211;something which tells you which of the locations has been chosen, or anything that provides you with a pointer,&#8221; Cooper said.  Attackers could also create malicious software that tries to poke at all 256 memory locations.<\/p>\n<p>http:\/\/ct.zdnet.com\/clicks?t=2480243-800b8f382c23b3407752a20ab3416b11-bf&#038;s=5&#038;fs=0<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[3],"tags":[],"class_list":["post-1491","post","type-post","status-publish","format-standard","hentry","category-product"],"_links":{"self":[{"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/posts\/1491","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/comments?post=1491"}],"version-history":[{"count":1,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/posts\/1491\/revisions"}],"predecessor-version":[{"id":3978,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/posts\/1491\/revisions\/3978"}],"wp:attachment":[{"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/media?parent=1491"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/categories?post=1491"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/tags?post=1491"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}