Close
  • Latest News
  • Artificial Intelligence
  • Big Data and Analytics
  • Cloud
  • Networking
  • Cybersecurity
  • Applications
  • IT Management
  • Storage
  • Sponsored
  • Mobile
  • Small Business
  • Development
  • Database
  • Servers
  • Android
  • Apple
  • Innovation
  • Blogs
  • PC Hardware
  • Reviews
  • Search Engines
  • Virtualization
Read Down
Sign in
Close
Welcome!Log into your account
Forgot your password?
Read Down
Password recovery
Recover your password
Close
Search
Logo
Logo
  • Latest News
  • Artificial Intelligence
  • Big Data and Analytics
  • Cloud
  • Networking
  • Cybersecurity
  • Applications
  • IT Management
  • Storage
  • Sponsored
  • Mobile
  • Small Business
  • Development
  • Database
  • Servers
  • Android
  • Apple
  • Innovation
  • Blogs
  • PC Hardware
  • Reviews
  • Search Engines
  • Virtualization
More
    Home IT Management
    • IT Management
    • Servers

    MS Source Code and the Lesson of Pandoras Box

    By
    Steven J. Vaughan-Nichols
    -
    February 13, 2004
    Share
    Facebook
    Twitter
    Linkedin

      Eventually, everything secret leaks. The fact that you ate the last cookie, that you didnt take out the trash, or that you looked at the source code for Windows 2000 Service Patch 1… it all comes out eventually.

      But lets face it, peeking at W2Ks source code is a much, much bigger deal.

      Most of the attention over the release has been, rightly I think, focused on the fact that with this code out there it will be an awful lot easier for crackers to break into W2K systems and write viruses and worms.

      In a way I feel sorry for Microsoft, its not as if Windows has any reputation for security to speak of anyway, and this latest breach will offer a detailed road map to anyone who wants to break into Windows 2000.

      However, I feel much more sorry for Windows users. For years now, many business IT departments have been willing to put up with one Windows security problem after another. I guess its because their CFOs never looked at the real cost of Windows maintenance and downtime vs. the cost of switching to Linux, BSD or another more-secure operating system.

      Now, following the leak of Windows source code, even the most shortsighted bean-counter must see that sticking with Windows 2000 will be an extremely expensive proposition.

      But, enough of that. Ive made those arguments before.

      There is another, more subtle, problem with the code release. Obtaining the code isnt a big deal. I found out how easy it was after about an hour of checking cracker sites and by Monday, Im sure anyone who wants to look at the code will be able to find out how.

      On the other hand, I have but one word for anyone considering looking at the source, and who is now, ever has been or ever hopes to be a developer: Dont.

      If you look at the code, there will always be reasonable doubt that any programming project you work on in the future will reflect Microsofts work. If that sounds far-fetched, you havent been paying attention to the ways that intellectual property law has been being looked at in the courts.

      Of course there are programs under development, like Black Duck Software Inc.s Black Duck Enterprise Edition, that exist expressly for finding legally questionable code. But a future employer may not want to take a chance on hiring you in the first place if its known youve been reading Microsofts proprietary code.

      Some programmers may believe that this tainting issue is mainly a problem for open-source developers. They would point to those who work on programs that try to duplicate Windows functionality in open source such as Samba, which provides Windows-compatible file and print services or Mono, an open source implementation of .NET. Thats not true.

      Open source or closed source, youre taking a big chance of getting into legal hot water with Microsoft, if youve viewed stolen Windows code. If you write a Windows-compatible program, and Microsoft decides that it shows signs of having tainted code within it, Microsoft will come after the product, its vendor and you. Frankly, the boys from Redmond would have every reason to come after you.

      And, if you have looked at the code, dont be surprised if the courts find for Microsoft even if you swear on a stack of bibles that you never inhaled any Microsoft source code in your brief peek.

      It may be a cliché, but its true that when it comes to the sin of looking at stolen source code, you should just say no.

      eWEEK.com Linux & Open Source Center Editor Steven J. Vaughan-Nichols has been using and writing about operating systems since the late 80s and thinks he may just have learned something about them along the way.

      Be sure to add our eWEEK.com Linux feed to your RSS newsreader:
      http://rssnewsapps.ziffdavis.com/eweeklinux.xml</a>

      Steven J. Vaughan-Nichols
      I'm editor-at-large for Ziff Davis Enterprise. That's a fancy title that means I write about whatever topic strikes my fancy or needs written about across the Ziff Davis Enterprise family of publications. You'll find most of my stories in Linux-Watch, DesktopLinux and eWEEK. Prior to becoming a technology journalist, I worked at NASA and the Department of Defense on numerous major technological projects.
      Get the Free Newsletter!
      Subscribe to Daily Tech Insider for top news, trends & analysis
      This email address is invalid.
      Get the Free Newsletter!
      Subscribe to Daily Tech Insider for top news, trends & analysis
      This email address is invalid.

      MOST POPULAR ARTICLES

      Latest News

      Zeus Kerravala on Networking: Multicloud, 5G, and...

      James Maguire - December 16, 2022 0
      I spoke with Zeus Kerravala, industry analyst at ZK Research, about the rapid changes in enterprise networking, as tech advances and digital transformation prompt...
      Read more
      Applications

      Datadog President Amit Agarwal on Trends in...

      James Maguire - November 11, 2022 0
      I spoke with Amit Agarwal, President of Datadog, about infrastructure observability, from current trends to key challenges to the future of this rapidly growing...
      Read more
      Cloud

      IGEL CEO Jed Ayres on Edge and...

      James Maguire - June 14, 2022 0
      I spoke with Jed Ayres, CEO of IGEL, about the endpoint sector, and an open source OS for the cloud; we also spoke about...
      Read more
      IT Management

      Intuit’s Nhung Ho on AI for the...

      James Maguire - May 13, 2022 0
      I spoke with Nhung Ho, Vice President of AI at Intuit, about adoption of AI in the small and medium-sized business market, and how...
      Read more
      Applications

      Kyndryl’s Nicolas Sekkaki on Handling AI and...

      James Maguire - November 9, 2022 0
      I spoke with Nicolas Sekkaki, Group Practice Leader for Applications, Data and AI at Kyndryl, about how companies can boost both their AI and...
      Read more
      Logo

      eWeek has the latest technology news and analysis, buying guides, and product reviews for IT professionals and technology buyers. The site’s focus is on innovative solutions and covering in-depth technical content. eWeek stays on the cutting edge of technology news and IT trends through interviews and expert analysis. Gain insight from top innovators and thought leaders in the fields of IT, business, enterprise software, startups, and more.

      Facebook
      Linkedin
      RSS
      Twitter
      Youtube

      Advertisers

      Advertise with TechnologyAdvice on eWeek and our other IT-focused platforms.

      Advertise with Us

      Menu

      • About eWeek
      • Subscribe to our Newsletter
      • Latest News

      Our Brands

      • Privacy Policy
      • Terms
      • About
      • Contact
      • Advertise
      • Sitemap
      • California – Do Not Sell My Information

      Property of TechnologyAdvice.
      © 2022 TechnologyAdvice. All Rights Reserved

      Advertiser Disclosure: Some of the products that appear on this site are from companies from which TechnologyAdvice receives compensation. This compensation may impact how and where products appear on this site including, for example, the order in which they appear. TechnologyAdvice does not include all companies or all types of products available in the marketplace.

      ×