Retired Microsoft engineer Davepl discusses "back doors" in Windows, the implications, and how the software developer protects against such attacks from rogues, hackers, and nation-states. Understand how back doors are like the Follina zero-day exploit in Office, giving complete control of the system to the attacker.
For information on my book, "Secrets of the Autistic Millionaire":
https://amzn.to/3diQILq
My other channel, join now so you're there for episode 01 of my AudioBook!
https://www.youtube.com/channel/UCtb6a_CnmGbSns9G8W2Ny0w
Discord Chat w/ Myself and Subscribers:
https://discord.gg/eMVWUvrkP6
Primary Equipment (Amazon Affiliate Links):
* Camera: Sony FX-3 -
https://amzn.to/3w31C0Z
* Camera Lens: 50mm F1.4 Art DG HSM -
https://amzn.to/3kEnYk4
* Microphone: Electro Voice RE 320 -
https://amzn.to/37gL65g
* Teleprompter: Glide Gear TMP 100 -
https://amzn.to/3MN2nlA
* SD Cards: Sony TOUGH -
https://amzn.to/38QZGR9
0:00 - Start
2:50 - Zero-Days like Follina vs Back Doors
5:12 - Code Compartmentalization
8:06 - Security Credentials
9:15 - Open Source (Linux v Windows)
10:50 - Dave Pronounces Trisquel badly
11:00 - Kernel Checkins
11:35 - The Build Lab
12:23 - Ownership breeds Responsibility
12:45 - The Code Review
13:25 - An exception
15:13 - Multiple Layers
Remember by and large I am referring to things that happened about 25 years ago, so you cannot judge contemporary Windows by it. And for comparison, that's when Linux was still Minix :-)
As always, all content and opinions are mine only, (c) 2022 Plummer's Software LLC. I am not now nor have I ever been a spokesperson for Microsoft, and retired from my technical role almost 20 years ago. I'm now working on a episode about the Follina zero-day exploit, so if you have any juicy details on that, please let me know!
Share this page with your family and friends.