Feeds

Cracks in China censorware patched

Claims personal pornwall is voluntary

Reducing security risks from open source software

The Chinese government has ordered patches to fix security holes in censorship software which will be shipped with every new computer sold in the country from 1 July.

Researchers from the University of Michigan found major flaws in Green Dam's software which they claimed would allow a hacker to take over a machine. They also found the software included politically controversial sites along with lists of pornographic content.

But an official at the Ministry of Industry and Information Technology said that patches were available to fix the problems, and that the list of banned sites was created by Dazheng Human Language Technology Academy Company, not by the Chinese government. The Green Dam Youth Escort software was a joint venture between Dazheng Human Language Technology Academy and Jinhui Computer System Engineering Company.

The official also insisted the pornwall is voluntary and the government only requires it be shipped on, or with, new computers - whether it is turned on or not is up to individuals.

The anonymous civil servant told China Daily: "PC makers are only required to save the setup files of the program in the hard drives of the computers, or provide CD-ROMs containing the program with their PC packages,"

The same official said the government was aware of the security issues but patches were on their way - he said the problems reported by the University of Michigan had already been fixed. He said the two firms behind the software were chosen after an open bidding process for the $6.1m contract.

Although individual security holes might have been blocked, such widespread use of the same blacklisting programme could raise security problems of its own. ®

Maximizing your infrastructure through virtualization

More from The Register

next story
Yorkshire cops fail to grasp principle behind BT Fon Wi-Fi network
'Prevent people that are passing by to hook up to your network', pleads plod
Major problems beset UK ISP filth filters: But it's OK, nobody uses them
It's almost as though pr0n was actually rather popular
UK government officially adopts Open Document Format
Microsoft insurgency fails, earns snarky remark from UK digital services head
HP, Microsoft prove it again: Big Business doesn't create jobs
SMEs get lip service - what they need is dinner at the Club
ITC: Seagate and LSI can infringe Realtek patents because Realtek isn't in the US
Land of the (get off scot) free, when it's a foreign owner
MPs wave through Blighty's 'EMERGENCY' surveillance laws
Only 49 politcos voted against DRIP bill
EU's top data cops to meet Google, Microsoft et al over 'right to be forgotten'
Plan to hammer out 'coherent' guidelines. Good luck chaps!
prev story

Whitepapers

Seven Steps to Software Security
Seven practical steps you can begin to take today to secure your applications and prevent the damages a successful cyber-attack can cause.
Consolidation: The Foundation for IT Business Transformation
In this whitepaper learn how effective consolidation of IT and business resources can enable multiple, meaningful business benefits.
Designing a Defense for Mobile Applications
Learn about the various considerations for defending mobile applications - from the application architecture itself to the myriad testing technologies.
Build a business case: developing custom apps
Learn how to maximize the value of custom applications by accelerating and simplifying their development.
Consolidation: the foundation for IT and business transformation
In this whitepaper learn how effective consolidation of IT and business resources can enable multiple, meaningful business benefits.