Security Basics mailing list archives

RE: Windows Vista current flaws


From: "Kofron, Matt" <Matt.Kofron () AGEDWARDS com>
Date: Tue, 27 Sep 2005 15:42:36 -0500

There are a few good reasons:

http://news.softpedia.com/news/New-Security-Flaw-for-Windows-Vista-6707.
shtml

http://www.pro-networks.org/forum/viewstory.php?t=61681 

http://zdnet.com.au/news/security/soa/Windows_Vista_tool_targeted_by_vir
us_writers/0,2000061744,39205746,00.htm

-----Original Message-----
From: Jon Lawhead [mailto:samurai () berkeley edu] 
Sent: Monday, September 26, 2005 11:01 PM
To: security-basics () securityfocus com
Subject: Windows Vista current flaws

Greetings all,

I work in Network Security for UC Berkeley's residence halls.  We have a
list of several "minimum security standards" that we require all
connected computers to meet before being allowed access to the network
(stuff like having a firewall program, antivirus, etc).  One of the
standards involves having the latest patched version of a secure
operating system.  I have a user on the network who wishes to run a
(legitimately acquired, or so he says) version of Windows Vista beta
version. 
 Before I decide on this, I wanted opinions on whether or not this is a
good idea.  My first instinct is to disallow any beta operating systems
simply on the grounds that they'll be buggy by definition and may
potentially have serious security flaws, but I can't find anything to
back this up.  Just wondering if I could get a few opinions on whether
or not this is a good idea.  Thanks!


Jon Lawhead
Network Security Coordinator
Residential Computing
University of California, Berkeley



-------------------------------------------------------------------------------------
A.G. Edwards & Sons' outgoing and incoming e-mails are electronically
archived and subject to review and/or disclosure to someone other 
than the recipient.

-------------------------------------------------------------------------------------


Current thread: