Basically, the status-quo is actually worse than you or others have stated - if any rogue code gets to execute on your local machine, game over.
Which was essentially my point, that given those problems, the existance of the SC itself is a security risk, as pertaining to the feedback given to the user, and therefore how the user configures the security policy on the machine because of that (potentially faulty) feedback.
Originally posted by: STaSh
Basically, the status-quo is actually worse than you or others have stated - if any rogue code gets to execute on your local machine, game over.
Yes!
Originally posted by: STaSh
Which was essentially my point, that given those problems, the existance of the SC itself is a security risk, as pertaining to the feedback given to the user, and therefore how the user configures the security policy on the machine because of that (potentially faulty) feedback.
But it isn't a security risk. If you get the user to download and execute code, you can no longer trust that machine. So yes, the security center may provide you with misleading information. But that is not a flaw with the security center! If you can get a user to download your code to their machine and then run it, you can do whatever you want.
Originally posted by: VirtualLarry
(Which is also unfortunately a necessity of modern versions of Windows, because they don't support concurrent console-session logins like most *nix boxes do, and you have to log out and shut down all of your open apps in order to switch users, and because so many apps, MS's own included, simply don't operate properly as non-admin. I also do development work, and things like the debugger need advanced privs too.)
More or less, yes. I'm still not all that happy with MS for providing even more "idiot lights" to confuse non-clueful users, especially ones that don't use a securely-authenticated channel for communications between components
especially ones that don't use a securely-authenticated channel for communications between components.
Just wondering exactly what the TCP/IP connection limit does and what is that limit. Despite some P2P use I use my internet and many internet programs regularly.
Originally posted by: bsobel
<blockquote>quote:
<hr>Just wondering exactly what the TCP/IP connection limit does and what is that limit. Despite some P2P use I use my internet and many internet programs regularly. <hr></blockquote>
The people claiming that their is a TCP/IP connection limit in SP2 are spreading FUD (this isn't directed at you elkinm, I'll explain what MS did in a second). I've seen this 'limit' quoted on a zillion sites, and it simply not true.
What was added was a queue (not a limit) of the number of uncompleted TCP connection outstanding. The default queue size is 10. Which means you can attempt to establish 10 TCP connection at once and their is no change in the behaviour. If you try to establish 20 at once, the first 10 are put on the wire while the next 10 are queued and released as those first 10 either complete or fail (e.g. first connection is built, #11 is put on the wire, #4 fails, #12 is put on the wire, and so on).
In 'normal' usage, TCP connection establish quickly and you simply won't notice any difference. Where you will see a difference is if you try to create a large number of connections to sites which are not listening/responding to your requests (so in your examples "Multiple IE or other active browsers, multiple downloads, multiple email, telnet, ftp, ssh clients and others may run. Norton update, weatherbug, VPN, terminal services, and a telnet and web server on my PC, and possibly multiple multisource download clients and programs, by own or something like steam or fileplanet." there are all services which will respond quickly and even if you tried really hard, I do not believe you would ever be able to determine if the queuing happened.)
So, why the change? Flash worms that utilize TCP connections typically sit and loop while connecting to a random IP (they then attempt to infect that machine and they go back to picking another random target). Some of these worms can literally eat up your entire connection while they sit and pump packets out, since many of the destinations are not going to be valid targets (since the selection was random) this queue will kick in and help throttle how quickly the worm can leave the box.
Even throttled the worm will still spread quickly, but more importantly (and the reason for this feature), your connection will not become so unusable that you will be unable to access updates/repair tools/patches/etc.
Bill
Originally posted by: bsobel
&lt;BR&gt;&lt;BR&gt;Just curious, have a link or something (the site STaSH mentioned doesn't seem to report any SP2 issues)&lt;BR&gt;BillOriginally posted by: tm37&lt;BR&gt;Kills NOAH so the hearing aid industry is freaking little.
Originally posted by: VirtualLarry
Ironically, news outlets (at least ones partially-owned by Intel), are reporting that there is a conflict between XP SP2 and AMD 64-bit CPUs
http://news.com.com/Microsoft+...00-1016_3-5326707.html
...when in fact, the real conflict, is between XP SP2 and Intel's new, upcoming, Prescott PIV CPUs...
http://cquirke.mvps.org/sp2intel.htm
Thankfully, there is a workaround involving disabling both L1+L2 cache in the BIOS setup.
Talk about horribly biased reporting! Why isn't CNet telling the truth here? I suppose the answer to that is so obvious as to make the question rhetorical.![]()
Originally posted by: bsobel
Just wondering exactly what the TCP/IP connection limit does and what is that limit. Despite some P2P use I use my internet and many internet programs regularly.
The people claiming that their is a TCP/IP connection limit in SP2 are spreading FUD (this isn't directed at you elkinm, I'll explain what MS did in a second). I've seen this 'limit' quoted on a zillion sites, and it simply not true.
What was added was a queue (not a limit) of the number of uncompleted TCP connection outstanding. The default queue size is 10. Which means you can attempt to establish 10 TCP connection at once and their is no change in the behaviour. If you try to establish 20 at once, the first 10 are put on the wire while the next 10 are queued and released as those first 10 either complete or fail (e.g. first connection is built, #11 is put on the wire, #4 fails, #12 is put on the wire, and so on).
In 'normal' usage, TCP connection establish quickly and you simply won't notice any difference. Where you will see a difference is if you try to create a large number of connections to sites which are not listening/responding to your requests (so in your examples "Multiple IE or other active browsers, multiple downloads, multiple email, telnet, ftp, ssh clients and others may run. Norton update, weatherbug, VPN, terminal services, and a telnet and web server on my PC, and possibly multiple multisource download clients and programs, by own or something like steam or fileplanet." there are all services which will respond quickly and even if you tried really hard, I do not believe you would ever be able to determine if the queuing happened.)
So, why the change? Flash worms that utilize TCP connections typically sit and loop while connecting to a random IP (they then attempt to infect that machine and they go back to picking another random target). Some of these worms can literally eat up your entire connection while they sit and pump packets out, since many of the destinations are not going to be valid targets (since the selection was random) this queue will kick in and help throttle how quickly the worm can leave the box.
Even throttled the worm will still spread quickly, but more importantly (and the reason for this feature), your connection will not become so unusable that you will be unable to access updates/repair tools/patches/etc.
Bill
Originally posted by: bsobel
Originally posted by: VirtualLarry
Ironically, news outlets (at least ones partially-owned by Intel), are reporting that there is a conflict between XP SP2 and AMD 64-bit CPUs
http://news.com.com/Microsoft+...00-1016_3-5326707.html
...when in fact, the real conflict, is between XP SP2 and Intel's new, upcoming, Prescott PIV CPUs...
http://cquirke.mvps.org/sp2intel.htm
Thankfully, there is a workaround involving disabling both L1+L2 cache in the BIOS setup.
Talk about horribly biased reporting! Why isn't CNet telling the truth here? I suppose the answer to that is so obvious as to make the question rhetorical.![]()
How is this biased or ironic? The article documents an issue with a certain common application on the AMD chip. How is CNet not telling the truth here?
I think your looking way to hard for some consipracy...
Bill
Originally posted by: Adam8281
After installing SP2, I can no longer right-click on icons. When I do the system hangs for a couple minutes, and they explorer restarts. Has anyone else experienced this or found a solution? I am running Norton Internet Security 2004, and I disabled the windows firewall and kept the norton going.
The problem, is that the CNet article about XP SP2 and AMD64 CPUs, is that it paints the problem as clearly the result of the AMD CPUs, when using SP2, when the facts are, that the CPU is performing completely correctly, in terms of the DEP feature added to SP2. The fact that it flags an (apparently) untested-with-SP2 driver file installed with fairly-common RealMagic hardware, doesn't make the fault lie with either the AMD64 CPU, nor XP SP2's DEP feature. Again, both are working correctly here.
PS. The issue isn't even with an application, it's an MPEG system driver (MPEGPORT.SYS). I'm guessing that you didn't even read it, given your comments.If you did, you would see how horribly biased it really is.
You would think, that evidence that existing CPUs, already on the market, also containing this CPU ID feature, although not highly-publicised by Intel, would be *big news*. Especially with a state senator threatening to ban their products.
I believe now that I witnessed a media black-out, first-hand. The power of the mass-media to inform, is nothing, compared to the mass-media's power to censor. Never forget that fact. I know I won't.