Feeds

BitLocker gives dual-boot systems the elbow

Vista security feature is 'anti-Linux'

The Power of One Brief: Top reasons to choose HP BladeSystem

Infosec Security features introduced in Windows Vista will make setting up PCs to boot in either Linux or Windows far more difficult, according to security guru Bruce Schneier. Vista is due to feature hardware-based encryption, called BitLocker Drive Encryption, which acts as a repository to protect sensitive data in the event of a PC being either lost or stolen.

This encryption technology also has the effect of frustrating the exchange of data needed in a dual boot system. "You could look at BitLocker as anti-Linux because it frustrates dual boot," Schneier told El Reg. Schneier said Vista will bring forward security improvements, but cautioned that technical advances are less important than improvements in how technology is presented to users.

"The fundamental security problems have been solved and now it's all about making the technology work. Installation, implementation, and update are key. A lot of work needs to be done on the user interface," he said.

Schneier is concerned at the possibility that Vista users might be bombarded with "endless" warning messages. Overexposure to messages will lead many consumers to ignore them and blindly agree to what applications are seeking to do, he added.

Schneier made his comment during an appearance at the Infosec conference in London on Wednesday. ®

Application security programs and practises

Whitepapers

Designing a Defense for Mobile Applications
Learn about the various considerations for defending mobile applications - from the application architecture itself to the myriad testing technologies.
Implementing global e-invoicing with guaranteed legal certainty
Explaining the role local tax compliance plays in successful supply chain management and e-business and how leading global brands are addressing this.
Top 8 considerations to enable and simplify mobility
In this whitepaper learn how to successfully add mobile capabilities simply and cost effectively.
Seven Steps to Software Security
Seven practical steps you can begin to take today to secure your applications and prevent the damages a successful cyber-attack can cause.
Boost IT visibility and business value
How building a great service catalog relieves pressure points and demonstrates the value of IT service management.