Feeds

Microsoft, stealth bombing and the hacker challenge

Games people don't play

  • alert
  • submit to reddit

Build a business case: developing custom apps

Usually, Microsoft is PR-adept when it comes to dealing with its customers and the media. But when it comes to understanding hackerdom, it hasn't a clue. Last Tuesday, Microsoft challenged hackers to attempt to break the Windows 2000 + IIS security system, and was foolish enough to hope that it would generate positive publicity and provide some free feedback. It set up what it called some "ground rules", as though it was some jolly game in which the participants would play for the sake of the game, but of course, both sides cheated. Naturally the server went down soon after it was made available, and all manner of other problems arose. Windows 2000 is only in beta and, judging by the problems that were seen, it will be in beta for a wee while yet until it has at least a modicum of resilience. Microsoft's spinmeisters are exercising their black arts on another hacker/cracker security image. This is the tale of the Back Orifice 2000 Trojan horse produced by the Cult of the Dead Cow. Microsoft would have us believe that stealth software is intrinsically evil and performs "malicious actions". But as cDc pointed out, the same stealth principles are included in Microsoft's Systems Management Server which, we recall, caused all manner of problems when NatWest was trying to use it for roll-outs, assisted by highly-paid Microsoft consultants who could not get it to perform properly. It's worth remembering that the guys wearing the white hats are the hackers. What a pity that their considerable talents are not put to more positive use -- although warning the world of serious software deficiencies is at least a public service. It's also worth noting Microsoft's record on stealth software. In 1995, Microsoft produced a registration wizard for Windows 95 that, if used online, allowed Microsoft to check covertly what rival (and MS) software was loaded on the PC. The information was used of course for Microsoft's marketing purposes, and -- who knows -- for policing illegal copies of Microsoft software. The adverse publicity from this dark episode made Microsoft squirm with embarrassment. ® See also LinuxPPC mounts hack challenge as MS fails to tempt crackers

Build a business case: developing custom apps

More from The Register

next story
iPad? More like iFAD: We reveal why Apple fell into IBM's arms
But never fear fanbois, you're still lapping up iPhones, Macs
Sonos AXES support for Apple's iOS4 and 5
Want to use your iThing? You can't - it's too old
Amazon says Hachette should lower ebook prices, pay authors more
Oh yeah ... and a 30% cut for Amazon to seal the deal
Philip K Dick 'Nazi alternate reality' story to be made into TV series
Amazon Studios, Ridley Scott firm to produce The Man in the High Castle
Nintend-OH NO! Sorry, Mario – your profits are in another castle
Red-hatted mascot, red-colored logo, red-stained finance books
Joe Average isn't worth $10 a year to Mark Zuckerberg
The Social Network deflates the PC resurgence with mobile-only usage prediction
Chips are down at Broadcom: Thousands of workers laid off
Cellphone baseband device biz shuttered
Feel free to BONK on the TUBE, says Transport for London
Plus: Almost NOBODY uses pay-by-bonk on buses - Visa
Twitch rich as Google flicks $1bn hitch switch, claims snitch
Gameplay streaming biz and search king refuse to deny fresh gobble rumors
Stick a 4K in them: Super high-res TVs are DONE
4,000 pixels is niche now... Don't say we didn't warn you
prev story

Whitepapers

Implementing global e-invoicing with guaranteed legal certainty
Explaining the role local tax compliance plays in successful supply chain management and e-business and how leading global brands are addressing this.
Boost IT visibility and business value
How building a great service catalog relieves pressure points and demonstrates the value of IT service management.
Why and how to choose the right cloud vendor
The benefits of cloud-based storage in your processes. Eliminate onsite, disk-based backup and archiving in favor of cloud-based data protection.
The Essential Guide to IT Transformation
ServiceNow discusses three IT transformations that can help CIO's automate IT services to transform IT and the enterprise.
Maximize storage efficiency across the enterprise
The HP StoreOnce backup solution offers highly flexible, centrally managed, and highly efficient data protection for any enterprise.