IT-222 Operating System

Wednesday, November 21, 2007

2.)

The first reason why regional bank might decide to buy 6 server computers than a supercomputer and it is applicable than a one computer.
The another one is if the bank buy a 6 server computer its because if a computer will not function anymore, there are still five remaining, computers that can work faster than a supercomputer and if the supercomputer will not function anymore, there will be no backup of all the data that have save in the supercomputer and thye cannot retrieve the data anymore..

Operating System News

November 20, 2007 (Computerworld) -- The flaw in Windows 2000's random number generator uncovered by Israeli researchers is a vulnerability -- but not a security vulnerability, Microsoft Corp. said late last week, as it left users wondering if newer versions of the operating system shared the same problem.
In a paper published earlier this month,
Benny Pinkas of the University of Haifa and two Hebrew University graduate students, Zvi Gutterman and Leo Dorrendorf, described how attackers could exploit a weakness in Windows' pseudo-random number generator (PRNG) to predict encryption keys generated by the operating system and its applications.
After
reverse-engineering the algorithm used to power the PRNG, Pinkas and his colleagues found that they could easily predict its future results and reveal what it had produced in the past. They could then compute both future and previously used encryption keys.
The past was most important to Pinkas. "For you as a user, it means that if you are managing sensitive information today, it is not enough for you to verify that your computer hasn't been compromised in the past," said Pinkas in a follow-up interview Monday. "You should also worry about future attacks, since a compromise in the future might reveal the sensitive information used today.
"In the security world, this is called an attack on 'forward secrecy,' and is taken very seriously," he added for emphasis.
Last week, Microsoft responded to Pinkas' paper with several statements sent to Computerworld in which it first acknowledged that the PRNG had a "local information disclosure vulnerability" but then denied that it had a "security vulnerability."
"There is no security vulnerability," Bill Sisk, the company's security response communications manager said in the statement issued through Microsoft's outside public relations firm. "Information is not disclosed inappropriately to unauthorized users on any supported Windows systems. In all cases discussed in the claim, information is visible only to the users themselves or to another user logged on to the local system with administrator credentials."
Microsoft's justification that the PRNG issue was not a security vulnerability didn't sit well with Pinkas, who argued the other side. "Applied alone, [our attack] does not enable unauthorized parties to access the system, but it does disclose to authorized users information which they are not supposed to learn," he said Monday.
Symantec Corp., which posted its own analysis last week, issued a low-level alert for it today to customers of its DeepSight threat network. Like Microsoft,
Symantec didn't classify the threat as a security vulnerability, but instead called it a design error.