Topics microsoft, tech.ed, security, hacking When hackers crash their methods although building viruses, the code is usually sent directly to Microsoft,
Windows 7 Home Premium X64, according to one among its senior protection architects, Rocky Heckman. Once the hacker's process crashes in Windows, as with all normal Windows crashes, Heckman explained the consumer can be prompted to deliver the error facts — including the malicious code — to Microsoft. The funny thing is that many say yes, in line with Heckman. "People have sent us their virus code when they're trying to develop their virus and they keep crashing their programs," Heckman mentioned. "It's amazing how much stuff we get." At a Microsoft Tech.Ed 2010 conference session on hacking today, Heckman detailed to the delegates the top five hacking methods and the best methods for developers to avoid falling victim to them. Heckman explained how to create malicious code that could be used in cross-site scripting or SQL injection attacks and, although he stated it "wasn't anything you couldn't pick up on the internet", he suggested delegates use the code responsibly to aid in their protection efforts. In keeping with Heckman, based on the number of attacks on Microsoft's website, the company was only too familiar with what types of attacks were most popular. "The first thing [script kiddies] do is fire off all these attacks at Microsoft.com,
Windows 7 Home Premium Serial Key," he explained. "On average we get attacked between 7000 and 9000 times per second at Microsoft.com,
Microsoft Office 2007 Professional Plus Key," mentioned the senior security architect. "I think overall we've done pretty good, even when MafiaBoy took down half the internet, you know,
Office 2007 Standard Product Key, Amazon and eBay and that, we didn't go down, we were still up." Heckman mentioned there were two reasons why the top hacking methods of cross-site scripting and SQL injection had not changed in the past six years. "One, it tells me that the bad guys go with what they know, and two,
Windows 7 Enterprise Activation Key, it says the developers aren't listening," he mentioned. Heckman explained that developers should consider all data input by a user as harmful until proven otherwise. Josh Taylor travelled to Tech.Ed as a guest of Microsoft.