Feeds

WinXP SP1 out next Monday – but can you avoid it?

In the long run, of course not...

  • alert
  • submit to reddit

New hybrid storage solutions

Windows XP Service Pack 1 is complete, and will be available for download and via CD (cost as yet unspecified) from next Monday (9th September). According to the release, it "provides enhanced user experience" and "brings enhanced security, reliability and compatibility to business and home users." It also fixes some bugs, and includes the " required changes of the proposed consent decree signed with the U.S. Department of Justice and nine state attorneys general."

The official announcement does not mention the new shotgun EULA, nor the measures against piracy it includes, but these are pretty well known already. Essentially, Microsoft reserves the right for it and its designated chums to steal your stuff, but they're not going to abuse that right, of course, and Microsoft now explicitly states that unlicensed copies will not qualify for upgrades and fixes. SP1 will refuse to install on systems with well-known leaked keys, SP1 will repair and deactivate cracked installations, and Windows Update will shortly begin checking your key on entry.

These new measures will achieve widespread uptake because they'll be fitted as standard on new PCs shipped from around October, and because they come attached to a handy rollup of fixes, security patches and drivers. It is just about possible for a determined refusenik to avoid the new EULA and to work around having to install SP1, but the effort involved in this is seriously burdensome, and will increase as time goes by.

As an experiment, The Register followed up on a suggestion from Carl Thomas (thanks Carl), who pointed us at Microsoft's Baseline Security Analyzer. With this one, you do the scanning of your machine locally rather than having Windows Update do it for you, and it identifies security issues with your machine, and links to the relevant Microsoft hotfixes. So at least in theory you can audit yourself and download the patches individually for review and installation. Carl notes that as it uses an XML plug-in it doesn't need BITS (Background Intelligent Transfer Service) enabled for it to function.

On a fresh install of Windows XP, it identified nine hotfixes, whereas Windows Update came up with more like a dozen for the same machine. That however shouldn't be particularly surprising, as Microsoft appears to run several different databases for its several and ever-changing update services, and Microsoft security issues do seem to come thick and fast. All of the hotfix links however 404ed on the day we tried, meaning that we had to search for each of them at their new location. But this is probably a database syncing thing rather than a deliberate speedbump.

By applying the individual fixes you seem to be able to avoid the new EULA, with the possible exception of the Windows Media 'Steve Ballmer reserves the right to sleep with your sister' amendment. We decided not to install that one anyway. The fixes do however generally come with a supplementary EULA stressing that unlicensed copies do not qualify for updates, so they're by no means immune to EULA-creep.

Nor do they help you in the slightest in getting hold of driver updates, so BSA is only a partial solution. Carl also points out that you can get a free security scan here, from Pedestal Software. It might not seem entirely logical to avoid getting scanned by Microsoft by getting scanned by somebody else instead, but the Pedestal scan is a demo for its commercial SecurityExpressions product, and provides a lot more detailed information about vulnerabilities than BSA. For what it's worth, this scan found around 15 issues on a fresh XP install.

It is however, er, IE-only, so gets you next to nowhere if you've used SP1 to hide access to IE. Of course, if you've refused to install SP1 and you haven't filed off IE by hand yourself, then you can use a Microsoft product in order to avoid installing Microsoft products. Or something - confusing thing, life... ®

Secure remote control for conventional and virtual desktops

More from The Register

next story
'Windows 9' LEAK: Microsoft's playing catchup with Linux
Multiple desktops and live tiles in restored Start button star in new vids
Not appy with your Chromebook? Well now it can run Android apps
Google offers beta of tricky OS-inside-OS tech
New 'Cosmos' browser surfs the net by TXT alone
No data plan? No WiFi? No worries ... except sluggish download speed
Greater dev access to iOS 8 will put us AT RISK from HACKERS
Knocking holes in Apple's walled garden could backfire, says securo-chap
NHS grows a NoSQL backbone and rips out its Oracle Spine
Open source? In the government? Ha ha! What, wait ...?
Google extends app refund window to two hours
You now have 120 minutes to finish that game instead of 15
Intel: Hey, enterprises, drop everything and DO HADOOP
Big Data analytics projected to run on more servers than any other app
prev story

Whitepapers

Secure remote control for conventional and virtual desktops
Balancing user privacy and privileged access, in accordance with compliance frameworks and legislation. Evaluating any potential remote control choice.
Saudi Petroleum chooses Tegile storage solution
A storage solution that addresses company growth and performance for business-critical applications of caseware archive and search along with other key operational systems.
High Performance for All
While HPC is not new, it has traditionally been seen as a specialist area – is it now geared up to meet more mainstream requirements?
Security for virtualized datacentres
Legacy security solutions are inefficient due to the architectural differences between physical and virtual environments.
Providing a secure and efficient Helpdesk
A single remote control platform for user support is be key to providing an efficient helpdesk. Retain full control over the way in which screen and keystroke data is transmitted.