/* DEFENDER GENERATED SALTS */ define('AUTH_KEY', '<{$xxjzx%3bNbK+txNTyqx7&cMF9Nw%kY0Rxm)M7s,sfS0.nh qyFyoK3><`c$uY'); define('SECURE_AUTH_KEY', '9b%31=W|#Yl6tX4`4Wb1dzk<8oekKu0oH 0@UtU)bahHl<@f$x^X3|gfn*mMfa~Z'); define('LOGGED_IN_KEY', 'NH*zV|`SJwD#A_026]bSZ1-uul|Z]6/JP/).m6inx9RH}B!4c7/$X0lGRfNlx2Nk'); define('NONCE_KEY', 'u|z2xQm3ZoRh[x9no*5Kdy-~3Q[O^/g+R-z@1qJ$cKngR}4]EPVzRhR -7KGy.0='); define('LOGGED_IN_SALT', '>Z`v[XNq:*;RY|q!LOP{n7$rpi.@t~Q+9GPuIt2x!W{|]{W7s-@4|*8`6?+ys3v|'); define('NONCE_SALT', 'v}--dJ1YH$^A|*5[zfkqi?y]z>GNv!qA)8+a=}0NLH Just When You Thought It Was Safe To Use Your Windows PC | The Gadget Grill

Just When You Thought It Was Safe To Use Your Windows PC

Kaspersky, the makers of some great PC security tools, reported this week of an interesting hole in the Windows platform.

Apparently, if the security certificate being used to install software onto your system has been tampered with, Windows does not pick this up, and fails to report this important breach of the security regime.

it seems that a new worm that surfaced a month or so ago, Stuxnet, used fake Verisign digital certificates issued to hardware manufacturer Realtek Semiconductor. Those certificates had already been revoked by both Microsoft and Verisign, but yet the worm was able to be installed on systems.

Kaspersky Lab’s Roel Schouwenberg looked at how Microsoft was handling digitally signed files. Having removed the signature of the digital certificate from a legitimate software package, he then installed the package on his computer. There was no indication that the certificate had been modified,

The underlying problem here is that fake certificates can cause issues with the reputation based approach that many anti-virus vendors are taking to protection.