Feeds

IE uninstall expert upgrades his program

Responds to customer (Microsoft) reactions - how touching...

  • alert
  • submit to reddit

High performance access to file storage

MS on Trial Edward Felten, the DoJ trial witness who produced a program to demonstrate that IE could be removed from Windows, has upgraded his software after listening to his users. Microsoft, that is. Felten, who will be back on the stand when the trial resumes, said yesterday that he'd been working on the Windows Update feature, and had nailed a couple of error messages which Microsoft had said were misleading during earlier sparring. The online Windows Update routine allows Windows users to upgrade their software via the Web, but requires Internet Explorer. Felten had this working without IE just before his previous court appearance, but Microsoft's Web site mysteriously changed, breaking the feature, just before he was due in court. The full transcript of his earlier deposition is now available, and we'll probably get to that in the next couple of days - the session seems to have been wonderfully acrimonious. On deposition duty again yesterday Felten seems to have found himself covering well-trampled territory. Microsoft attorney Steve Holley bashed away with claims that Felten's program simply hides IE rather than removing it, while Felten retorted that the program was only intended to demonstrate that Microsoft could ship Windows without IE if it wanted to. Felten is of course right, and the amount of IE that can or cannot be removed is related to which DLLs are needed for which functions. Which of course leads us on to querying which DLLs are needed for multiple functions, and why Microsoft has chosen to link them in this way. Basically, have some been glued together arbitrarily as a spurious justification for integration, or does the integration provide real benefits? Expect more sound than light on this one when Felten takes the stand. ® Complete Register trial coverage

Top three mobile application threats

More from The Register

next story
Dropbox defends fantastically badly timed Condoleezza Rice appointment
'Nothing is going to change with Dr. Rice's appointment,' file sharer promises
Audio fans, prepare yourself for the Second Coming ... of Blu-ray
High Fidelity Pure Audio – is this what your ears have been waiting for?
Record labels sue Pandora over vintage song royalties
Companies want payout on recordings made before 1972
Ex–Apple CEO John Sculley: Ousting Steve Jobs 'was a mistake'
Twenty-nine years later, post-Pepsi exec has flat-forehead moment
Zucker punched: Google gobbles Facebook-wooed Titan Aerospace
Up, up and away in my beautiful balloon flying broadband-bot
Apple DOMINATES the Valley, rakes in more profit than Google, HP, Intel, Cisco COMBINED
Cook & Co. also pay more taxes than those four worthies PLUS eBay and Oracle
Number crunching suggests Yahoo! US is worth less than nothing
China and Japan holdings worth more than entire company
prev story

Whitepapers

SANS - Survey on application security programs
In this whitepaper learn about the state of application security programs and practices of 488 surveyed respondents, and discover how mature and effective these programs are.
Combat fraud and increase customer satisfaction
Based on their experience using HP ArcSight Enterprise Security Manager for IT security operations, Finansbank moved to HP ArcSight ESM for fraud management.
The benefits of software based PBX
Why you should break free from your proprietary PBX and how to leverage your existing server hardware.
Top three mobile application threats
Learn about three of the top mobile application security threats facing businesses today and recommendations on how to mitigate the risk.
3 Big data security analytics techniques
Applying these Big Data security analytics techniques can help you make your business safer by detecting attacks early, before significant damage is done.