writes: In his latest blog post, Mark Russinovich analyzes the network slowdown experienced by some users when playing multimedia content. "Tests of MMCSS during Vista development showed that [...] heavy network traffic can cause enough long-running DPCs to prevent playback threads from keeping up with their media streaming requirements, resulting in glitching. MMCSS' glitch-resistant mechanisms were therefore extended to include throttling of network activity. It does so by issuing a command to the NDIS device driver [...] [to] pass along, at most 10 packets per millisecond (10,000 packets per second)."
writes: Mark Russinovich examined the default permissions on objects and files created by top-tier security software and found out that most are vulnerable to denial of service or can be used for privilege escalation on Windows systems. 'To my surprise and dismay, I found security holes in several namespaces. The security settings on one application's global synchronization and memory mapping objects, as well as on its installation directory, allow unprivileged users to effectively shut off the application, corrupt its configuration files, and replace its executables to elevate to Local System privileges. What application has such grossly insecure permissions? Ironically, that of a top-tier security vendor.'Link to Original Source