November 2: The Morris worm, created by Robert Tappan Morris, infects DEC VAX and Sun machines running BSD UNIX connected to the Internet, and becomes the first worm to spread extensively "in the wild", and one of the first well-known programs exploiting buffer overrun vulnerabilities.
Honestly, I haven't been incredibly impressed with Google Docs. The other day, a couple of friends and I tried to collaboratively edit a document, but each person would only think that one other person was editing the document, and the only way we could see each other's updates was to refresh the page. Furthermore, changes are only pushed out every 15 seconds from the Google server, making real-time collaboration difficult. If only Google Docs were more like Etherpad...
TFA even says that the worm can update itself, so how does BitDefender plan to distribute the worm if the worm can be updated to shut down everything that may harm it?
Yes, I did. That part would have been more interesting if they had provided more evidence of what they did, but it just seemed like a permissions issue (perhaps they had created the files as administrator and could not change it afterwards). However, this does not change the fact is that the first two arguments presented are worthless.
Seriously, what sort of conclusions does this "article" even make? They say that it is somehow Window's fault that their software stops working because a DLL is replaced, because you know, somehow programs are supposed to run after you change parts of them. Next thing you know, they'll blame Windows for breaking their graphics card after they deleted their graphics driver. As for programs modifying the firewall, that has been implemented since the Windows XP firewall at least. Run an iTunes install and you'll see all the exceptions that Apple puts into the firewall for their own software. Hell, perhaps we should blame Windows for letting the iTunes installer put Bonjour and Apple Updater and QuickTime on your computer as well? Clearly, they are allowing software vendors to put crapware on your machine!
Just managed to get worse? That's ignoring things like the Sony rootkit fiasco, right?
Actually, I believe Windows Vista fixed this vulnerability. To bad MS did such a poor job with UAC that a lot of people might end up catching this virus anyways.
Wikipedia says that the first worm spread through BSD UNIX. (1988):
The EU's issue with Microsoft is that it is limiting competition among web browsers by including IE with its product, so a removal of the GUI wrapper would probably be sufficient. Inclusion of the rendering engine won't do anything if you can't use it to browse the Internet in any reasonable fashion.
BSDer writes: An Israeli security researcher published a paper few hours ago, detailing attacks against Mac, OpenBSD and other BSD-style operating systems. The attacks, says Amit Klein from Trusteer enable DNS cache poisoning, IP level traffic analysis, host detection, O/S fingerprinting and in some cases even TCP blind data injection. The irony is that OpenBSD boasted their protection mechanism against those exact attacks when a similar attack against the BIND DNS server was disclosed by the same researcher mid 2007. It seems now that OpenBSD may need to revisit their code and their statements. According to the researcher, another affected party, Apple, refused to commit to any fix timelines. It would be interesting to see their reaction now that this paper is public.