Open main menu
Home
Random
Recent changes
Special pages
Community portal
Preferences
About Wikipedia
Disclaimers
Incubator escapee wiki
Search
User menu
Talk
Dark mode
Contributions
Create account
Log in
Editing
Norton Internet Security
(section)
Warning:
You are not logged in. Your IP address will be publicly visible if you make any edits. If you
log in
or
create an account
, your edits will be attributed to your username, along with other benefits.
Anti-spam check. Do
not
fill this in!
===Windows Vista=== Sarah Hicks, Symantec's vice president of consumer product management, voiced concern over Windows Vista 64-bit's [[Kernel Patch Protection|PatchGuard]] feature. PatchGuard was designed by Microsoft to ensure the integrity of the [[kernel (operating system)|kernel]], a part of an [[operating system]] which interacts with the hardware. [[Rootkit]]s often hide in an operating system's kernel, complicating removal.<ref>{{cite web |url=http://ericuday.googlepages.com/EKumar_Rootkits.pdf |title=Battle with the Unseen–Understanding Rootkits on Windows |access-date=2009-03-15 |author=Eric Uday Kumar |publisher=Association of Anti-Virus Asia Researchers |year=2006 |archive-date=2010-01-20 |archive-url=https://web.archive.org/web/20100120023038/http://ericuday.googlepages.com/EKumar_Rootkits.pdf |url-status=dead }}</ref> Mike Dalton, European president of [[McAfee]] said, "The decision to build a wall around the kernel with the assumption it can't be breached is ridiculous", claiming Microsoft was preventing security vendors from effectively protecting the kernel while promoting its own security product, [[Windows Live OneCare]]. Hicks said Symantec did not mind the competition from OneCare.<ref>{{Cite news|url=https://www.forbes.com/2006/10/05/symantec-virus-microsoft-tech-cx_ll_1006symantec.html |title=Symantec Snaps At Microsoft |access-date=2009-03-11 |author=Lisa Lerer |work=Forbes |date=October 10, 2006 }}</ref> Symantec later published a white paper detailing PatchGuard with instructions to obtain a PatchGuard exploit.<ref>{{cite web |url=http://www.symantec.com/avcenter/reference/Security_Implications_of_Windows_Vista.pdf |title=Security Implications of Windows Vista |access-date=2009-03-11 |publisher=Symantec Corporation |archive-date=2008-12-07 |archive-url=https://web.archive.org/web/20081207170756/http://www.symantec.com/avcenter/reference/Security_Implications_of_Windows_Vista.pdf |url-status=dead }}</ref> After negotiations and investigations from antitrust regulators, Microsoft decided to allow security vendors access to the kernel by creating special [[Application programming interface|API]] instructions.<ref>{{Cite news|url=https://www.reuters.com/article/technologyNews/idUSTRE4AI0M020081119 |title=Microsoft to offer free security software |access-date=2009-03-14 |author=Gabriel Madway |publisher=Thomson Reuters |date=November 18, 2008 }}</ref>
Edit summary
(Briefly describe your changes)
By publishing changes, you agree to the
Terms of Use
, and you irrevocably agree to release your contribution under the
CC BY-SA 4.0 License
and the
GFDL
. You agree that a hyperlink or URL is sufficient attribution under the Creative Commons license.
Cancel
Editing help
(opens in new window)