View Full Version : Vista Protected Applications
Opcode
June 5th, 2006, 08:46
Hi everbody!!!
Windows Vista is really becoming a very attractive operating system.
http://www.microsoft.com/whdc/system/vista/process_Vista.mspx
The best part of the document:
Quote:
Do not attempt to circumvent this restriction by installing a kernel-mode component to access the memory of a protected process because the system and third-party applications may rely on the fact that protected processes are signed code that is run in a contained environment. |
Vista will be so cool
Regards,
Opcode
Woodmann
June 5th, 2006, 16:11
BAHAHAHAAAAaaaaaaaa
0xf001
June 5th, 2006, 17:12
signed code, shit!
i honestly appreciate these movements, it makes all more spicy!
somehow i find it really interesting how ms attemts to implement tighter security. they have some good ideas and I watch the model they build up.
we will see if the theory will survive in practice hehe.
cheers,
0x3c004>>2
PS:
Note
Certain process properties (such as the working set) can be indirectly changed through membership in a job object.
LLXX
June 5th, 2006, 22:37
Also, don't forget that if software isn't enough to crack, there's always hardware
I doubt the RAM is encrypted

Shub-nigurrath
June 6th, 2006, 03:23
without going to explain the things, the interesting is that new Vista will have a totally new dynamical rings structure, as also in the two slides I extracted from existing presentations for you..
im wondering if they are really using all 4 rings now, instead of only 0 and 3
but i guess, they did the priv. separation through a more restrictive api
SKiLLa
June 16th, 2006, 08:41
Yes, it would definitely be cool when the really implement all the 4 rings

As far as I know there isn't any other x86 OS which does so, but please correct me if I'm wrong ....
Shub-nigurrath
June 16th, 2006, 10:41
the reason for having only 0 and 3 was coming from the support of alpha processors, which have only 2 rings. Unill all the supported platforms will have the same rings MS will be able to support also the missing rings, but up to now it's only a caracteristic of intel processors.
bart
June 17th, 2006, 13:35
i just wish all exe packers would work fine :P
Silkut
June 24th, 2006, 10:58
http://download.microsoft.com/download/A/B/3/AB39CA51-CA4E-4B43-8714-28498E200D0E/VistaSecurityForDevelopers.ppt
Here is a powerpoint document about security under Vista for developers.
(thanks Neitsa)
ps: replace 'tt' in 'hxxp', use OpenOffice if you don't have the Office suite.
EDIT KAYAKER:
Don't bother using 'hxxp' when posting in these forums, 'http' is OK.
phosphorus
June 28th, 2006, 09:10
About "Service profiling":
"...enables service to restrict IT'S behavior"
What kind of censorship is that ?! OS will temper 'certified' code? What for?...
If all this 'os-protecting' will ever see the light, how os will find out that one app needs access to printer, and other low-level hdd. Maybe there will be certificates that allow access to devices/memory pages...;P
F001 ! \m/
0xf001
June 28th, 2006, 09:28
OMG, ORC called my name!!
I did not look into that further, but I guess there could be policies applied or ... blah. I think the theory is to make the systems more secure / robust with more granularity on control. I just fear the implementation, as M$ code ..... well .... I guess we all saw some of it allready

, also the implementation I am afraid is sometimes a bit not matching reality and appears like just somebody did something (hyped as the ultra feature) and in reality it turns out as totally annoying, not helping and just truning all good ideas into shit. sorry my language

(Like "super user" confirmations preventing you from work ahem)
regards, 0xf001
dELTA
June 29th, 2006, 04:24
Signed code and "Do not attempt to circumvent this restriction", my ass.
http://www.eweek.com/article2/0,1895,1983037,00.asp
blabberer
June 30th, 2006, 09:26
look for joannas blog she says she is going to present some pills for SINGED DRIVERS (no no misspelling she spelt it like that

)
hehe
edit oops the link in deltas post above points to same story
and silver posted this in offtopic
well i still get the bronze trophy
Actually, you get "dipped in bronze", which is a totally different category of "reward", altogether.
Regards,
Silkut
July 1st, 2006, 10:22
Quote:
A security researcher with expertise in rootkits has built a working prototype of new technology that is capable of creating malware that remains "100 percent undetectable," even on Windows Vista x64 systems. |
100% does not exist in computer, imho

RITZ
July 10th, 2006, 00:00
There seems to be a lot of people who think putting a lock on a safe with the key right next to it will protect the contents any more than leaving the safe unlocked. All you're really doing is adding a tedious step to the process of cracking it.
Powered by vBulletin® Version 4.2.2 Copyright © 2018 vBulletin Solutions, Inc. All rights reserved.