An Introduction to Kernel Patch Protection
Hello, I'm Scott Field, an Architect working on Windows Kernel Security. There have been a lot of questions recently about a Windows technology called Kernel Patch Protection (sometimes referred to as PatchGuard) so I wanted to provide some context about the feature to help answer them. OS kernel design is a very specialized area of computer science that rarely receives a lot of public attention, so it's understandable that there are a lot of questions out there. The purpose of this post is to give a basic primer on Kernel Patch Protection and why it is an important technology to increase the security and reliability of Windows-based PCs.
What is the Kernel?
The kernel is the lowest-level, most central part of a computer operating system and one of the first pieces of code to load when the machine starts up. The kernel is what enables the software of the machine to talk to the hardware and is responsible for basic OS housekeeping tasks such as memory management, launching programs and processes, and managing the data on the disk. All applications and even the graphical interface of Windows run on a layer on top of the kernel. The performance, reliability, and security of the entire computer depend on the integrity of the kernel.
You may have heard the term "rootkit" and that they can be very difficult to detect and remove. Rootkits are a type of malicious software that can use a number of different techniques, including monitoring keystrokes, changing system log files or existing system applications, or creating a backdoor into the system to gain remote access to a computer and launch attacks. Rootkits often try to gain access to the kernel of the OS. Since the kernel has the power to control all of the other applications on the PC, the rootkit can actually hide itself from the file system or even anti-malware tools, and ultimately from view of the user.
The kernel is the most carefully coded piece of the entire operating system. Since all other programs depend upon it, a glitch in the kernel can make all other programs crash or perform unexpectedly. You're probably also familiar with the term, "Blue Screen of Death" (BSoD). This is the result of an error in the kernel or in a driver running in the kernel that is so severe that the system can't recover from it. The BSoD is bad, so we want to do everything we can to keep customers from seeing it. One of the ways we can do that is to maintain the integrity of the kernel by restricting what software is allowed to run in and interact with it.
What is Kernel Patching?
"Kernel patching" or "kernel hooking" is the practice of using unsupported mechanisms to modify or replace kernel code. Patching fundamentally violates the integrity of the Windows kernel and is undocumented, unsupported and has always been discouraged by Microsoft. Kernel patching can result in unpredictable behavior, system instability and performance problems—like the Blue Screen of Death–which can lead to lost user productivity and data. More importantly, kernel patching has increasingly become a mechanism used by malware developers to attack Windows systems.
Motivations for patching the kernel vary widely. Anti-malware vendors, for example, may intercept system calls to prevent applications they have deemed malicious from creating processes on the system. The goals of these types of software are obviously laudable but these practices also may cause reliability and performance problems. The greatest risk from kernel patching comes from virus and spyware writers that use this technique with malicious intent and to hide their presence.
Malware authors are motivated to patch the kernel because it is a powerful mechanism for attacking the user's PC and data. Patching can be used to implement rootkits, which also hide the presence of other malware on the system. This form of malware can be extremely potent—for example, allowing the capture of banking passwords and monitoring of all user activities.
What is Kernel Patch Protection?
There are many brand new security features in Windows Vista, but Kernel Patch Protection is actually not one of them. Kernel Patch Protection was first supported on x64 (AMD64 and Intel EMT64T) CPU architecture versions of Microsoft Windows including Microsoft Windows Server 2003 SP1 and Windows XP Microsoft Windows XP Professional x64 Edition. (Patch protection is currently not supported on x86 or ia64 architectures.) Though, as the use of 64-bit computers is increasing, Windows Vista users will end up benefiting most from this technology.
Kernel Patch Protection monitors if key resources used by the kernel or kernel code itself has been modified. If the operating system detects an unauthorized patch of certain data structures or code it will initiate a shut down of the system.
Kernel Patch Protection does not prevent all viruses, rootkits, or other malware from attacking the operating system. It helps prevent one way to attack the system: patching kernel structures and code to manipulate kernel functionality. Protecting the integrity of the kernel is a fundamental steps in protecting the entire system from malicious attacks and from inadvertent reliability problems that result from patching.
Impacts on Application Compatibility
Kernel Patch Protection may impact compatibility of some legitimate software, on x64 systems, which were built using unsupported kernel patching techniques. Microsoft is sensitive to how application compatibility changes impact our customers and our partners. That is the reason that we have implemented this technology on x64 systems only. As customers adopt the x64 platform, and new native 64-bit software, we have the opportunity to build a more secure and reliable next generation platform that does not facilitate unsupported and unreliable practices such as kernel patching.
We have also been asked to provide a supported way for 'known good' vendors to continue hooking the kernel but prevent others from doing so. Unfortunately, there is no reliable mechanism for us to distinguish between 'known good' software and malicious software. Moreover, we cannot prevent a malicious software author from "bundling" purportedly good software in an attempt to thwart the system. Even if we could include such a mechanism, it's unclear if we could use this mechanism to selectively allow kernel hooking in a manner that provides an acceptable trade off between performance and reliability and security. Furthermore, creating such an exception would greatly hamper the ability to utilize hardware assisted security technology, such as a virtual machine hypervisor, to further improve the integrity of the operating system.
Alternatives to Kernel Patching
Clearly, customers demand effective security solutions, and they can be developed without relying on kernel patching techniques. Some of the alternatives to kernel patching are:
Windows Vista includes the "Windows Filtering Platform", which enables software to perform network oriented activities such as packet inspection and other activities necessary to support firewall products.
The file system mini filter model allows software to participate in file system activities, which can be used by Anti-Virus software.
Registry notification hooks, introduced in Windows XP, and recently enhanced in Windows Vista, allow software to participate in registry related activities in the system.
These solutions were designed with reliability and long term supportability in mind, and also provide a means for multiple products to co-exist without the conflicts that kernel patching could cause. We have been working with our security partners and other types partners for almost 2 years to assist them in making their solutions compatible with our current x64 architecture—and we are working with them even more closely as the Windows Vista launch approaches. If your application or driver must perform a task that you believe cannot be accomplished without patching the kernel, contact your Microsoft representative or msra@microsoft.com for help in finding a documented alternative.
It's important to note that Kernel Patch Protection applies uniformly to Microsoft products as well as third party products. No code is allowed to modify the kernel using unsupported patching techniques. Security products developed by Microsoft only have access to the same supported interfaces that any other vendor would use.
In Conclusion
Since Microsoft announced our Trustworthy Computing initiative, helping to ensure the security of our customers has been one of our primary goals as an organization. Part of this is ensuring a rich ecosystem of powerful security products that will reduce the threats from malware and other types of attack. We would not develop a technology designed to lessen the security of our customers or weaken the security of the Windows platform.
We will continue to work with security partners to help them make their current and future products compatible with Kernel Patch Protection and the new security investments that we have made in Windows Vista.
More information on Kernel Patch Protection is available at these locations and we will update the post as more resources become available.
· Patching Policy for x64-Based Systems
· Kernel Patch Protection: Frequently Asked Questions
· Kernel Enhancements for Windows Vista and Windows Server "Longhorn"
· Microsoft Windows Vista Security Advancements [Word Document]
-- Scott Field
Comments
Anonymous
August 11, 2006
Symantec has definitely been the target of my wrath as of late, and the time has now come to address...Anonymous
August 11, 2006
Symantec has definitely been the target of my wrath as of late, and the time has now come to address...Anonymous
August 13, 2006
I hope kernel patch protection in Vista will be also avaible for x86 systems.Anonymous
August 14, 2006
It would be nice if the end user could opt out. Sometimes I like running 3rd party program made by independent developers. It would be nice to have the option. Don't get me wrong I think patchguard should be enabled be default. I just like the ability to choose.Anonymous
August 14, 2006
My thoughts:
* UAC should not be optional otherwise a malware can disable it. UAC should be hard coded enable!
* Kernel Patch Protection should not be optional otherwise a malware can disable it.Anonymous
August 14, 2006
 
NOTE:  I know this is a long post.  If you don’t want to read all the details...Anonymous
August 15, 2006
Quote: "Registry notification hooks, introduced in Windows 2000".
Is this correct? To my understanding they were introduced in Windows XP. Could you clarify this statement, please.Anonymous
August 16, 2006
What is "registry notification hooks"? Google finds only 2 pages with this phrase including this one.Anonymous
August 17, 2006
Would it be possible to give a little bit more information about the TPM module supported by vista and the available librairies to access that TPM (f.e. how to access the platform integrity metrics) ?
Thanks in advance for any pointer at that level.Anonymous
August 17, 2006
KK & db: Thanks for your questions about Kernel patch protection:
KK is correct that these were introduced in Windows XP. The blog has been updated.
Db, there is a page on MSDN that was not showing up for some reason. The link is here http://msdn.microsoft.com/library/default.asp?url=/library/en-us/Kernel_r/hh/Kernel_r/drvrrtns_988f8f3d-4ee8-4351-8fc0-703a88bd8421.xml.asp. We will be releasing an updated version of that doc (to include the significant registry filtering enhancements in Windows Vista) in coordination with Windows Vista RC1, so stay tuned.Anonymous
August 22, 2006
I've been playing around with Vista a lot as well as doing a lot of reading about it.  More and...Anonymous
August 24, 2006
I was just looking at Jeff Jones' security blog and noticed this post where he links to a new blog addressing...Anonymous
August 24, 2006
The comment has been removedAnonymous
August 25, 2006
PingBack from http://www.thebillblog.com/billblog/index.php/2006/08/26/will-we-want-to-open-the-windows/Anonymous
August 27, 2006
Hi Scott. You say that
"Kernel Patch Protection monitors if key resources used by the kernel or kernel code itself has been modified. If the operating system detects an unauthorized patch of certain data structures or code it will initiate a shut down of the system."
To me it sounds like this would result in anyone being able to write a program to crash the system!
It seems to me to be a reactionary approach rather than a preventive approach . . . what you should want to do is to make it impossible for anyone to modify the kernel and system data structures. Since the kernel is responsible for memory management, it should be able to restrict areas of memory that a program can access. As a matter of fact, there shouldn't be any reason for a program to have to access any area of memory not allocated to it by the kernel. If it is necessary for a program to access system data structures, this should be controlled by the kernel by using procedure calls to the operating system, not by direct access. I'm not a Windows programmer, so I don't understand why it's necessary for ANY program to have to be able to run in kernel mode. Maybe someone can explain that to me some day. . .Anonymous
August 30, 2006
Web Resources
 
[SQL Server and Data Access] 2006 PASS Community Summit: Microsoft SQL...Anonymous
September 18, 2006
I have finally got my outlook unread messages down to zero. There are 1229 Messages in my deleted Items...Anonymous
September 19, 2006
PingBack from http://daep.dyndns.org/2006/09/20/windows-vista-security-an-introduction-to-kernel-patch-protection/Anonymous
September 26, 2006
PingBack from http://blogs.msdn.com/windowsvistasecurity/archive/2006/08/11/695993.aspxAnonymous
October 02, 2006
See Skywing's analysis of current antivirus software incorrectly patching the windows kernel at http://www.uninformed.org/?v=4&a=4&t=sumry to realise why PatchGuard is a good idea.Anonymous
October 02, 2006
IT THE KERNEL CODE IS BROKEN WHO WILL TAKE THE CAN - MICROSOFT OR THE CUSTOMER? SHOULD WE LEAVE VISTA ALONE?Anonymous
October 03, 2006
PingBack from http://www.uberbin.net/archivos/seguridad/%c2%bfnuevo-problema-en-vista-seguridad-cerrada.phpAnonymous
October 03, 2006
The comment has been removedAnonymous
October 06, 2006
Great article, Scott. I agree that starting with the x64 codebase is the best way to add the functionality, while leaving backwards compatibility in the 32bit space. And I prefer my OS to be resilient before 3rd party code gets into play.Anonymous
October 06, 2006
Otherwise known as Vista vs the Selfish Security Vendors: Part Two ... Here's a follow-up to my earlierAnonymous
October 07, 2006
Recently some security software companies had heavily criticised Microsoft approached to secure Vista...Anonymous
October 11, 2006
http://www.softsphere.com/articles/boycott-microsoft-windows-vistaAnonymous
October 12, 2006
PingBack from http://www.tipsdr.com/?p=467Anonymous
October 12, 2006
The comment has been removedAnonymous
October 12, 2006
Anyone who can tell me, how to attach to the harddisk driver stack? My driver use IoAttachDevice to filter "DeviceHarddisk0Partition0". But it can not run well in Vista.Anonymous
October 14, 2006
After 20 years of 386 and "protected mode" you came up with this stupidity... Go and write kernel as it should be done for ages. Minimum ring 0 code, third party code only on ring 3, including drivers. PS: Ring switch performance is not your problem, i/amd will solve it shortly.Anonymous
October 16, 2006
check it :- http://www.secgeeks.infys.net/bypassing_patchguard_on_windows_x64Anonymous
October 18, 2006
Otherwise known as Vista vs the Selfish Security Vendors: Part Two ... Here's a follow-up to my earlierAnonymous
October 29, 2006
PingBack from http://www.clubbyte.com/noticias/2006/10/30/hoy-tres-noticias/Anonymous
November 10, 2006
Please refer to the following link. The article is skeptical. But is it fair that Microsoft is becoming an island as far as security is concerned. Is a consensus among security organizations and vendors is lacking? http://www.frontline.in/fl2321/stories/20061103002303800.htmAnonymous
November 13, 2006
PingBack from http://www.noticias-de.com/noticias-de-informatica/con-windows-vista-no-hace-falta-antivirus-segun-microsoft/Anonymous
November 22, 2006
PingBack from http://zakladi.com/blog/2006/11/23/ali-kupiti-windows-visto/Anonymous
November 24, 2006
>After 20 years of 386 and "protected mode" you came up >with this stupidity... Go and write kernel as it should be >done for ages. Minimum ring 0 code, third party code only >on ring 3, including drivers. BTW, this is called a "microkernel" architecture. Or, if you are willing to satifice portablity (NT can't, but...) , you can use ring 1 and ring 2 as apporate.Anonymous
December 10, 2006
Uma das polêmicas que mais agitaram o mercado de tecnologia foi em relação ao acesso ao kernel do WindowsAnonymous
January 02, 2007
PingBack from http://www.audenard.com/blog/?p=22Anonymous
January 05, 2007
PingBack from http://www.vistalogy.com/2007/01/05/an-introduction-to-kernel-patch-protection/Anonymous
January 22, 2007
Hello! I am Billy Johnson Nice design. Enjoy! Good site! OK. 0n79p7k .Anonymous
January 25, 2007
[url=http://avistar-parking.bestusacheap.info/index.html] avistar parking [/url] [url=http://clip-utube-video.bestusacheap.info/index.html] clip utube video [/url] [url=http://rachel-hunter.bestusacheap.info/index.html] rachel hunter [/url] [url=http://penut-butter-jelly-time.bestusacheap.info/index.html] penut butter jelly time [/url] [url=http://california-lemon-law.bestusacheap.info/index.html] california lemon law [/url]Anonymous
February 01, 2007
PingBack from http://4vista.info/?p=40Anonymous
February 05, 2007
It will be really helpfull to my new system . Kernel Patching Protection can remove 3rd party protection use hope so............Anonymous
February 07, 2007
I'm new and I'm frustrated and I have no where else to go. My laptop was stolen and I had to buy a new one. It never occured to me that I would buy one with a Windows Operating system that caused so many issues with programs that ran great on other versions. When I contacted the Mfg. to ask how to replace the operating system with XP I was told that the computer would not function correctly with anything but VISTA. Good for the VISTA maker but bad for someone like me that travels and simply wants to be able to VPN into my office. I even went back to return the thing the very next day and was told I would have to pay a 15% restocking fee. So here I sit with a computer that is worthless to me, with an operating system I didn't care about or want. What a RIP!Anonymous
February 10, 2007
[url=http://avena-lee.freesitesworld.com/index.html] avena lee [/url]Anonymous
February 11, 2007
Hi all , very nice site! Thank You !Anonymous
February 15, 2007
PingBack from http://www.vista-word.com/?p=44Anonymous
February 25, 2007
The comment has been removedAnonymous
March 21, 2007
BitLocker Drive Encryption BitLocker Drive Encryption BitLocker Drive Encryption Frequently Asked QuestionsAnonymous
April 10, 2007
Luogo molto buon:) Buona fortuna!Anonymous
April 10, 2007
pagine piuttosto informative, piacevoli =)Anonymous
April 13, 2007
9 su 10! Ottenerlo! Siete buoni!Anonymous
April 14, 2007
Stupore! ho una sensibilit molto buona circa il vostro luogo!!!!Anonymous
May 10, 2007
PingBack from http://pulanet.afaceri-pe-internet.com/qa-with-search-security/Anonymous
May 15, 2007
interesting <a href=" http://cw.mariancollege.edu/jburns/_disc12/000002f5.htm?levaquin "> levaquin </a> http://cw.mariancollege.edu/jburns/_disc12/000002f5.htm?levaquin levaquinAnonymous
May 15, 2007
interesting <a href=" http://cw.mariancollege.edu/jburns/_disc12/000002f5.htm?levaquin "> levaquin </a> http://cw.mariancollege.edu/jburns/_disc12/000002f5.htm?levaquin levaquinAnonymous
May 16, 2007
Interesting... <a href=" http://acadweb.snhu.edu/vita/_disc3/000005ea.htm?zovirax "> zovirax </a> http://acadweb.snhu.edu/vita/_disc3/000005ea.htm?zovirax zoviraxAnonymous
May 16, 2007
Nice! <a href=" http://acadweb.snhu.edu/vita/_disc3/000005a6.htm?mesterolone "> mesterolone </a> http://acadweb.snhu.edu/vita/_disc3/000005a6.htm?mesterolone mesteroloneAnonymous
May 16, 2007
Nice! <a href=" http://e-courses.cerritos.edu/spch150-9263/_disc1/000004f3.htm?trimox "> trimox </a> http://e-courses.cerritos.edu/spch150-9263/_disc1/000004f3.htm?trimox trimoxAnonymous
May 16, 2007
Cool! <a href=" http://academic.csuohio.edu:8080/ljeffres/_discocity/00000479.htm?neurontin "> neurontin </a> http://academic.csuohio.edu:8080/ljeffres/_discocity/00000479.htm?neurontin neurontinAnonymous
May 16, 2007
Nice <a href=" http://www.csusm.edu/politicalscience/_politics/00001c58.htm?celebrex "> celebrex </a> http://www.csusm.edu/politicalscience/_politics/00001c58.htm?celebrex celebrexAnonymous
May 16, 2007
Interesting... <a href=" http://www.csusm.edu/politicalscience/_politics/00001c5d.htm?zyrtec "> zyrtec </a> http://www.csusm.edu/politicalscience/_politics/00001c5d.htm?zyrtec zyrtecAnonymous
May 16, 2007
interesting <a href=" http://academic.csuohio.edu:8080/ljeffres/_discocity/00000505.htm?prilosec "> prilosec </a> http://academic.csuohio.edu:8080/ljeffres/_discocity/00000505.htm?prilosec prilosecAnonymous
May 16, 2007
Sorry :( <a href=" http://acadweb.snhu.edu/vita/_disc3/000005e5.htm?glucophage "> glucophage </a> http://acadweb.snhu.edu/vita/_disc3/000005e5.htm?glucophage glucophageAnonymous
May 16, 2007
Nice <a href=" http://academic.csuohio.edu:8080/ljeffres/_discocity/00000500.htm?danazol "> danazol </a> http://academic.csuohio.edu:8080/ljeffres/_discocity/00000500.htm?danazol danazolAnonymous
May 16, 2007
Cool! <a href=" http://www.csusm.edu/politicalscience/_politics/00001c5d.htm?zyrtec "> zyrtec </a> http://www.csusm.edu/politicalscience/_politics/00001c5d.htm?zyrtec zyrtecAnonymous
May 17, 2007
Sorry :( <a href=" http://acadweb.snhu.edu/vita/_disc3/000005e8.htm?prozac "> prozac </a> http://acadweb.snhu.edu/vita/_disc3/000005e8.htm?prozac prozacAnonymous
May 17, 2007
Sorry :( <a href=" http://www.lcsc.edu/NS350/_discNS350/000003d7.htm?retin "> retin </a> http://www.lcsc.edu/NS350/_discNS350/000003d7.htm?retin retinAnonymous
May 17, 2007
Nice <a href=" http://coefaculty.valdosta.edu/jthomers/Discussion1/_disc23/00004606.htm?cozaar "> cozaar </a> http://coefaculty.valdosta.edu/jthomers/Discussion1/_disc23/00004606.htm?cozaar cozaarAnonymous
May 17, 2007
interesting <a href=" http://english.edgewood.edu/eng259d2006/_disc24/0000037f.htm?effexor "> effexor </a> http://english.edgewood.edu/eng259d2006/_disc24/0000037f.htm?effexor effexorAnonymous
May 17, 2007
Cool! <a href=" http://coefaculty.valdosta.edu/jthomers/Discussion1/_disc23/0000460c.htm?zocor "> zocor </a> http://coefaculty.valdosta.edu/jthomers/Discussion1/_disc23/0000460c.htm?zocor zocorAnonymous
May 17, 2007
interesting <a href=" http://coefaculty.valdosta.edu/jthomers/Discussion1/_disc23/0000460b.htm?testosterone "> testosterone </a> http://coefaculty.valdosta.edu/jthomers/Discussion1/_disc23/0000460b.htm?testosterone testosteroneAnonymous
May 17, 2007
Cool... <a href=" http://english.edgewood.edu/eng259d2006/_disc24/00000384.htm?zithromax "> zithromax </a> http://english.edgewood.edu/eng259d2006/_disc24/00000384.htm?zithromax zithromaxAnonymous
May 17, 2007
Nice... <a href=" http://www.people.vcu.edu/~rjohnson/_disc321/00000568.htm?cipro "> cipro </a> http://www.people.vcu.edu/~rjohnson/_disc321/00000568.htm?cipro ciproAnonymous
May 17, 2007
Interesting... <a href=" http://www.depts.ttu.edu/agriculturalteachers/_disc2/000049ca.htm?propecia "> propecia </a> http://www.depts.ttu.edu/agriculturalteachers/_disc2/000049ca.htm?propecia propeciaAnonymous
May 18, 2007
Nice! <a href=" http://courses.csusm.edu/lbst301by/2000/_disc2000/000000e8.htm?prevacid "> prevacid </a> http://courses.csusm.edu/lbst301by/2000/_disc2000/000000e8.htm?prevacid prevacidAnonymous
May 18, 2007
Nice... <a href=" http://fps.okstate.edu/_disc4/000061b3.htm?testosterone "> testosterone </a> http://fps.okstate.edu/_disc4/000061b3.htm?testosterone testosteroneAnonymous
May 18, 2007
interesting <a href=" http://courses.csusm.edu/lbst301by/2000/_disc2000/000000c1.htm?glucophage "> glucophage </a> http://courses.csusm.edu/lbst301by/2000/_disc2000/000000c1.htm?glucophage glucophageAnonymous
May 18, 2007
Nice <a href=" http://virtual.mjc.edu/kgyuran/100bio/00004198.htm?plavix "> plavix </a> http://virtual.mjc.edu/kgyuran/100bio/00004198.htm?plavix plavixAnonymous
May 18, 2007
interesting <a href=" http://fps.okstate.edu/_disc4/000061aa.htm?augmentin "> augmentin </a> http://fps.okstate.edu/_disc4/000061aa.htm?augmentin augmentinAnonymous
May 18, 2007
Nice! <a href=" http://virtual.mjc.edu/kgyuran/100bio/0000418f.htm?buspar "> buspar </a> http://virtual.mjc.edu/kgyuran/100bio/0000418f.htm?buspar busparAnonymous
May 18, 2007
Cool! <a href=" http://courses.csusm.edu/lbst301by/2000/_disc2000/000000ab.htm?deltasone "> deltasone </a> http://courses.csusm.edu/lbst301by/2000/_disc2000/000000ab.htm?deltasone deltasoneAnonymous
May 18, 2007
Sorry :( <a href=" http://courses.csusm.edu/lbst301by/2000/_disc2000/0000012c.htm?zovirax "> zovirax </a> http://courses.csusm.edu/lbst301by/2000/_disc2000/0000012c.htm?zovirax zoviraxAnonymous
May 18, 2007
Nice... <a href=" http://courses.csusm.edu/lbst301by/2000/_disc2000/0000007a.htm?allegra "> allegra </a> http://courses.csusm.edu/lbst301by/2000/_disc2000/0000007a.htm?allegra allegraAnonymous
May 18, 2007
Nice... <a href=" http://virtual.mjc.edu/kgyuran/100bio/00004193.htm?danazol "> danazol </a> http://virtual.mjc.edu/kgyuran/100bio/00004193.htm?danazol danazolAnonymous
May 18, 2007
Interesting... <a href=" http://www.depts.ttu.edu/agriculturalteachers/_disc2/000049cb.htm?celebrex "> celebrex </a> http://www.depts.ttu.edu/agriculturalteachers/_disc2/000049cb.htm?celebrex celebrexAnonymous
May 18, 2007
Cool... <a href=" http://fps.okstate.edu/_disc4/000061ab.htm?cozaar "> cozaar </a> http://fps.okstate.edu/_disc4/000061ab.htm?cozaar cozaarAnonymous
May 18, 2007
interesting <a href=" http://virtual.mjc.edu/kgyuran/100bio/000041a6.htm?zyrtec "> zyrtec </a> http://virtual.mjc.edu/kgyuran/100bio/000041a6.htm?zyrtec zyrtecAnonymous
May 18, 2007
Nice! <a href=" http://www.depts.ttu.edu/agriculturalteachers/_disc2/000049d5.htm?zocor "> zocor </a> http://www.depts.ttu.edu/agriculturalteachers/_disc2/000049d5.htm?zocor zocorAnonymous
May 18, 2007
Cool. <a href=" http://fps.okstate.edu/_disc4/000061ad.htm?desyrel "> desyrel </a> http://fps.okstate.edu/_disc4/000061ad.htm?desyrel desyrelAnonymous
May 18, 2007
Interesting... <a href=" http://fps.okstate.edu/_disc4/000061b2.htm?prilosec "> prilosec </a> http://fps.okstate.edu/_disc4/000061b2.htm?prilosec prilosecAnonymous
May 18, 2007
Cool! <a href=" http://www.depts.ttu.edu/agriculturalteachers/_disc2/000049d3.htm?retin "> retin </a> http://www.depts.ttu.edu/agriculturalteachers/_disc2/000049d3.htm?retin retinAnonymous
May 18, 2007
Nice <a href=" http://virtual.mjc.edu/kgyuran/100bio/00004195.htm?keftab "> keftab </a> http://virtual.mjc.edu/kgyuran/100bio/00004195.htm?keftab keftabAnonymous
May 18, 2007
Nice <a href=" http://www.depts.ttu.edu/agriculturalteachers/_disc2/000049d4.htm?tylenol "> tylenol </a> http://www.depts.ttu.edu/agriculturalteachers/_disc2/000049d4.htm?tylenol tylenolAnonymous
May 18, 2007
Nice... <a href=" http://virtual.mjc.edu/kgyuran/100bio/0000419d.htm?trimox "> trimox </a> http://virtual.mjc.edu/kgyuran/100bio/0000419d.htm?trimox trimoxAnonymous
May 28, 2007
Zyrtec Uses, How Taken, Warnings/Precautions, Missed Dose, Possible Side Effects, Storage, Overdose, More Information, where to buy online.Anonymous
May 28, 2007
thanks, i had some problems with my kernel not too long ago.Anonymous
June 02, 2007
z1eknd41i5z4 <a href = http://www.695497.com/139030.html > 43nbk8kumd </a> [URL=http://www.523603.com/343929.html] p7xsane5p [/URL] l4xq6kr8slajAnonymous
June 02, 2007
Hello, article is interesting. My work friends read too - Great. Keep up! good work! Greetings, Ricky LelisAnonymous
June 03, 2007
I agree! nice article. Maybe too little for professional but quite good for me!! THANKS !!Anonymous
June 03, 2007
- [URL= ] [/URL] - [URL= ] [/URL] - [URL= ] [/URL] - [URL= ] [/URL] - [URL= ] [/URL] - [URL= ] [/URL] - [URL= ] [/URL] - [URL= ] [/URL] - [URL= ] [/URL] - [URL= ] [/URL]
- Anonymous
June 07, 2007
- [URL= ] [/URL] - [URL= ] [/URL] - [URL= ] [/URL] - [URL= ] [/URL] - [URL= ] [/URL] - [URL= ] [/URL] - [URL= ] [/URL] - [URL= ] [/URL] - [URL= ] [/URL] - [URL= ] [/URL]
- Anonymous
June 08, 2007
- [URL= ] [/URL] - [URL= ] [/URL] - [URL= ] [/URL] - [URL= ] [/URL] - [URL= ] [/URL] - [URL= ] [/URL] - [URL= ] [/URL] - [URL= ] [/URL] - [URL= ] [/URL] - [URL= ] [/URL]
Anonymous
June 12, 2007
Thanks for this really interesting post. It appears really helpful for me. I would like to ask you if I could translate it and include it in our page, also with link to your page. Alternatively I would like to put link to your page on my section with interesting articles. If it would be possible to put this link on my page please email me. One more time thanks for really great article. GreetingsAnonymous
July 17, 2007
Thanks for very interesting article. btw. I really enjoyed reading all of your posts. It’s interesting to read ideas, and observations from someone else’s point of view… makes you think more. So please keep up the great work. Greetings.Anonymous
July 25, 2007
I think these blog is really useful for new comers and Excellent resource list. It´s a very interesting Blog and simple answer of many questions. Keep up the good work! Thanks it helps me a lot…Anonymous
July 28, 2007
The comment has been removedAnonymous
August 15, 2007
So I am reading a lot of stories that seem to have confused, or incorrectly aligned, Windows Vista driverAnonymous
August 15, 2007
So I am reading a lot of stories that seem to have confused, or incorrectly aligned, Windows Vista driverAnonymous
August 15, 2007
PingBack from http://www.vista-word.com/2007/08/15/driver-signing-kernel-patch-protection-and-kpp-driver-signing/Anonymous
August 15, 2007
PingBack from http://puntodivista.mirkotebaldi.it/2007/08/16/microsoft-precisa-la-differenza-tra-le-patch-kernel-per-i-driver-firmati-e-il-problema-in-se-dei-driver-firmati/Anonymous
August 16, 2007
PingBack from http://www.errorforum.com/microsoft-windows-vista-error/25258-windows-vista-security.html#post31293Anonymous
August 16, 2007
Thanks for very interesting article. btw. I really enjoyed reading all of your posts. It’s interesting to read ideas, and observations from someone else’s point of view… makes you think more. So please keep up the great work. Greetings.Anonymous
August 22, 2007
The comment has been removedAnonymous
August 30, 2007
Thanks for very interesting article. btw. I really enjoyed reading all of your posts. It’s interesting to read ideas, and observations from someone else’s point of view… makes you think more. So please keep up the great work. Greetings.Anonymous
September 14, 2007
english teacher websites 7th gradeAnonymous
September 16, 2007
PingBack from http://winvista.ws/driver-signing-kernel-patch-protection-and-kpp-driver-signing/Anonymous
September 18, 2007
<a href="http://www.nomorewart.com/">genital warts cure</a>Anonymous
October 04, 2007
Hello Nice one. good explanation of the topic GreetingsAnonymous
October 15, 2007
Great post. I have a constant battle with clients that have all these great ideas on design and want them implemented even though I try to tell them this will make it very difficult for a visitor to figure out and navigate the site.Anonymous
October 16, 2007
PingBack from http://kasperskyblog.com/?p=3Anonymous
October 16, 2007
PingBack from http://kasperskyblog.com/?p=4Anonymous
October 20, 2007
Thanks for very interesting article. btw. I really enjoyed reading all of your posts. It’s interesting to read ideas, and observations from someone else’s point of view… makes you think more. So please keep up the great work. Greetings.Anonymous
October 21, 2007
http://blogs.die-zedlers.de/it/it_blog.php?p=59Anonymous
October 22, 2007
This is the kind of thing that can only work if an app is really “sticky” even for the first users of the system. And it’s true, you can benefit from use of a social bookmarking system without needing anyone else to participate, but each added participant makes the whole system more valuable. This recognition that personal value precedes network value is now commonly being referred to as the Del.icio.us LessoAnonymous
October 22, 2007
If you don’t want to post adsense ads,i think you can try some affiliate programs to earn some money,may be Amazon’s book affiliate program more better to your blog.You are good blogger who can consider visiters feeling.Anonymous
October 22, 2007
How about running a Favicon Ads Page on your site. Similar to the million dollar web site where you buy a pixel for one dollar, for a small fee (just a suggestion - £5) you can have your favicon displayed there for the lifetime of this site for all the world to see. As your site stats are impressive its a great way for others to promote their site and for you to generate some income to fund your bookAnonymous
October 22, 2007
this is a great party - here is the Party kingAnonymous
October 22, 2007
Thanks for very interesting article. btw. I really enjoyed reading all of your posts. It’s interesting to read ideas, and observations from someone else’s point of view… makes you think more. So please keep up the great work. Greetings.Anonymous
October 22, 2007
This site is interesting and very informativeAnonymous
October 22, 2007
I don't see Vista having an easy time in Europe. Convivted anti-competitive company blocking competition is such an overtly way.Anonymous
October 22, 2007
The comment has been removedAnonymous
October 22, 2007
Symantec has definitely been the target of my wrath as of late, and the time has now come to address...Anonymous
October 22, 2007
The impact that AV software has on a machine is significant, the security protection negligible. Thats right, they just do not work. They worked in the pre-broadband era when viruses were slowing moving from address book to address book, they don't work any more.Anonymous
October 22, 2007
The impact that AV software has on a machine is significant, the security protection negligible. Thats right, they just do not work. They worked in the pre-broadband era when viruses were slowing moving from address book to address book, they don't work any more.Anonymous
October 22, 2007
Thanks for this really interesting post. It appears really helpful for me. I would like to ask you if I could translate it and include it in our page, also with link to your page. Alternatively I would like to put link to your page on my section with interesting articles. If it would be possible to put this link on my page please email me. One more time thanks for really great article. GreetingsAnonymous
October 22, 2007
How about running a Favicon Ads Page on your site. Similar to the million dollar web site where you buy a pixel for one dollar, for a small fee (just a suggestion - £5) you can have your favicon displayed there for the lifetime of this site for all the world to see. As your site stats are impressive its a great way for others to promote their site and for you to generate some income to fund your bookAnonymous
October 22, 2007
So in my opinion your priority hormes must be to “work for IE.sequent gregariousness”. “Train internal Microsoft folks on black flags” is a nice wise as dexterously, except, I aspire following Chris Wilson is single who’s dedicated to commutatives, and that’s what counts.Anonymous
October 22, 2007
The comment has been removedAnonymous
October 22, 2007
By the way: application/xhtml+xml would be nice in IE 8 (Next), at all, in my opinion their definite last fair expectation is IE 9 (past a time Next).Anonymous
October 25, 2007
I hope kernel patch protection in Vista will be also avaible for x86 systems. Its a must for me...Anonymous
October 30, 2007
PingBack from http://discount-perfume-hq.com/?p=2119Anonymous
October 30, 2007
Nice article and very helpfull. THXAnonymous
November 03, 2007
Yes it´s always the same. It´s so hard to protect all. But thanks for this article. Interesting to read.Anonymous
November 11, 2007
Thanks for this article. It will help me with my new system. Kernel Patching Protection can remove 3rd party protection useAnonymous
November 12, 2007
Wonderful Article i enjoyed reading it, thanks for sharing with us!Anonymous
November 16, 2007
Nice one. good explanation of the topicAnonymous
November 21, 2007
The Articel was very interesting and helpfull. And now i will see, how can i use this new informations in my projects and systems...Anonymous
November 24, 2007
Tanks a lot for this great article.Anonymous
December 02, 2007
Yes! Thanks a lot! Very important!Anonymous
December 02, 2007
better of without a firewall. securing the pc -to-much- makes users look like they have something to hide. in my humble opinion.Anonymous
December 02, 2007
Thanks for this article. It will help me with my new system. Really Great!Anonymous
December 27, 2007
Train internal Microsoft folks on black flags” is a nice wise as dexterously, except, I aspire following Chris Wilson is single who’s dedicated to commutatives, and that’s what countsAnonymous
January 03, 2008
PingBack from http://actors.247blogging.info/?p=384Anonymous
January 05, 2008
Interesting post, Ill be checking back to see how this issue progressesAnonymous
January 05, 2008
Thanks for sharing your feedback! If your feedback doesn't appear right away, please be patient as it may take a few minutes to publish - or longer if the blogger is moderating comments. Leave a CommentAnonymous
January 05, 2008
Thanks for sharing your feedback! If your feedback doesn't appear right away, please be patient as it may take a few minutes to publish - or longer if the blogger is moderating comments. Leave a CommentAnonymous
January 05, 2008
Thanks for sharing your feedback! If your feedback doesn't appear right away, please be patient as it may take a few minutes to publish - or longer if the blogger is moderating comments. Leave a CommentAnonymous
January 05, 2008
I agree this article is very helpful. I have been reading about how to improve mt article writing, but it would be nice if I actually had some visitors which left some input. I think that could help me to improve my blog..Anonymous
January 06, 2008
I think it is a good beginning for the protection of data and the operating system and makes it harder attackers!Anonymous
January 09, 2008
There are many useful informations. Thanks and greetings from Thuringia!Anonymous
January 09, 2008
There are many useful informations in this article. Thanks and greetings from Thuringia!Anonymous
January 15, 2008
There are many useful informations! Thanks!Anonymous
January 25, 2008
Nice constribution. Thank you and greets from germany!Anonymous
January 25, 2008
PingBack from http://softwareinformation.247blogging.info/windows-vista-security-an-introduction-to-kernel-patch-protection/Anonymous
January 29, 2008
Thanks for the imporatant Infos. Greeting from Pab Passivhaus and PassivhäuserAnonymous
February 03, 2008
There are many useful informations in this great article…I really enjoy reading the whole blog that you write. Thanks!Anonymous
February 04, 2008
I have been reading about how to improve mt article writing, but it would be nice if I actually had some visitors which left some input. I think that could help me to improve my blog..Anonymous
February 05, 2008
Good article! thank! Greating! mm MarkisenAnonymous
February 14, 2008
Wow, that is a lot of information to the kernel. That knew everything I did not.Anonymous
February 22, 2008
The comment has been removedAnonymous
April 18, 2008
The comment has been removedAnonymous
April 19, 2008
I wonder why....<a href="http://www.seslichatciler.com" title="sesli chat sesli sohbet">sesli chat sesli sohbet</a><a href="http://www.seslichatciler.com" title="sesli chat">sesli chat</a><a href="http://www.seslichatciler.com" title="sesli sohbet">sesli sohbet</a>Anonymous
May 03, 2008
Thanks a lot - a really informational article about Vista Security.Anonymous
May 03, 2008
Wow I like your vista kernel patch article very much.Anonymous
May 08, 2008
thanks for the article very usefull. Kernel patching is an unbelivably good technique.Anonymous
May 15, 2008
Interesting story about Kernel Patching. Thanks!Anonymous
May 28, 2008
Cool and excellent article it's realy helpful. Thank youAnonymous
June 02, 2008
Interesting names, marketing, markise, ....Anonymous
June 15, 2008
Thank you very much . this site has provided me with an understanding of ....., It's just what I was looking for!Anonymous
June 16, 2008
The comment has been removedAnonymous
June 18, 2008
The comment has been removedAnonymous
June 18, 2008
PingBack from http://chattercube.com/kuznetsovv/2008/06/19/33/Anonymous
June 19, 2008
PingBack from http://antiwaree.miniblogger.org/2008/06/19/8/Anonymous
June 19, 2008
PingBack from http://antiwaree.unrestrictedminds.com/2008/06/19/27/Anonymous
June 19, 2008
PingBack from http://hansens.myboatspot.com/2008/06/19/33/Anonymous
June 19, 2008
PingBack from http://blog.tecnicosfutbol.com/hansens/2008/06/20/110/Anonymous
June 19, 2008
PingBack from http://hansens.authorsabode.com/2008/06/20/72/Anonymous
June 20, 2008
PingBack from http://miblogito.es/clearedsoft/2008/06/20/12/Anonymous
June 20, 2008
Great job. Special thanks from me.Anonymous
June 21, 2008
The comment has been removedAnonymous
June 22, 2008
PingBack from http://vgtc.org/wpmu/kavalskiya/2008/06/22/10/Anonymous
June 22, 2008
PingBack from http://stagelocallysf.org/blog/kuznetsovv/2008/06/22/87/Anonymous
June 22, 2008
PingBack from http://kavalskiya.six.lv/2008/06/23/20/Anonymous
June 22, 2008
PingBack from http://kuznetsovv.miniblogger.org/2008/06/23/84/Anonymous
June 22, 2008
PingBack from http://hansens.tokuchira.com/wpmu/2008/06/23/145/Anonymous
June 22, 2008
PingBack from http://kuznetsovv.pornblink.com/2008/06/23/89/Anonymous
June 22, 2008
PingBack from http://kavalskiya.myboatspot.com/2008/06/23/24/Anonymous
June 23, 2008
PingBack from http://antiwaree.adultblogpress.com/2008/06/23/69/Anonymous
June 23, 2008
PingBack from http://kavalskiya.tublogya.com/2008/06/23/23/Anonymous
June 23, 2008
PingBack from http://clearesoft.cubaweblogs.com/2008/06/23/38/Anonymous
June 23, 2008
PingBack from http://blog.azsoftz.net/kavalskiya/2008/06/23/25/Anonymous
June 24, 2008
PingBack from http://andrevasko.sensibleblog.com/2008/06/24/26/Anonymous
June 24, 2008
PingBack from http://kavalskiya.blog.mediaregionalne.pl/2008/06/24/27/Anonymous
June 24, 2008
PingBack from http://bursier.ro/antiwaree/2008/06/25/77/Anonymous
June 24, 2008
PingBack from http://hansens.myboatspot.com/2008/06/24/90/Anonymous
June 24, 2008
PingBack from http://kavalskiya.p0wnography.com/2008/06/25/43/Anonymous
June 24, 2008
PingBack from http://clearesoft.p0wnography.com/2008/06/25/55/Anonymous
June 25, 2008
PingBack from http://newxblogx.cgi-bin.com/blog/2008/06/25/23/Anonymous
June 25, 2008
PingBack from http://clearesoft.bloglivers.com/2008/06/25/58/Anonymous
June 25, 2008
PingBack from http://kavalskiya.adsurf.ru/2008/06/25/43/Anonymous
June 25, 2008
PingBack from http://clearesoft.herhangout.com/2008/06/25/60/Anonymous
June 25, 2008
PingBack from http://andrevasko.tenderblogs.com/2008/06/25/40/Anonymous
June 25, 2008
PingBack from http://hansens.tenderblogs.com/2008/06/25/163/Anonymous
June 25, 2008
PingBack from http://hansens.myboatspot.com/2008/06/25/104/Anonymous
June 25, 2008
PingBack from http://infocart-jp.net/kuznetsovv/2008/06/26/123/Anonymous
June 26, 2008
PingBack from http://altermusik.fr/kavalskiya/2008/06/26/58/Anonymous
June 26, 2008
PingBack from http://nikolapite.nicholsblog.com/2008/06/26/4/Anonymous
June 26, 2008
PingBack from http://nikolapite.iblogs.be/2008/06/26/4/Anonymous
June 26, 2008
PingBack from http://blog.tecnicosfutbol.com/kavalskiya/2008/06/26/55/Anonymous
June 26, 2008
PingBack from http://jatha.no/nikolapite/2008/06/26/8/Anonymous
June 26, 2008
PingBack from http://kuznetsovv.adsurf.ru/2008/06/27/134/Anonymous
June 26, 2008
مقالة رائعة جدآ شكرآ لك . ThanksAnonymous
June 27, 2008
PingBack from http://antiwaree.dimensionsites.com/2008/06/27/116/Anonymous
June 27, 2008
PingBack from http://brokers.centrro.com/clearesoft/2008/06/27//Anonymous
June 27, 2008
<a href="http://www.seo-reklam.com">adtech ile reklam 2.0 dönemi başlıyor ve Trkycmhrytllbtpydrklcktr r10.net seo yarışması</a>Anonymous
June 27, 2008
<a href="http://www.seo-reklam.com">adtech ile reklam 2.0 dönemi başlıyor ve Trkycmhrytllbtpydrklcktr r10.net seo yarışması</a>Anonymous
June 27, 2008
<a href="http://www.seo-reklam.com">adtech ile reklam 2.0 dönemi başlıyor ve Trkycmhrytllbtpydrklcktr r10.net seo yarışması</a>Anonymous
June 28, 2008
PingBack from http://clearesoft.tenderblogs.com/2008/06/28/86/Anonymous
June 28, 2008
PingBack from http://hansens.blog.mediaregionalne.pl/2008/06/28/121/Anonymous
June 28, 2008
PingBack from http://andrevasko.th3blogs.com/2008/06/28/74/Anonymous
June 28, 2008
PingBack from http://vgtc.org/wpmu/clearesoft/2008/06/29/96/Anonymous
June 28, 2008
PingBack from http://jatha.no/kuznetsovv/2008/06/29/110/Anonymous
June 29, 2008
PingBack from http://vgtc.org/wpmu/newxblogx/2008/06/29/Anonymous
June 29, 2008
PingBack from http://vgtc.org/wpmu/kavalskiya/2008/06/29/Anonymous
June 29, 2008
PingBack from http://blog.pipesd.net/hanklogax/2008/06/29/16/Anonymous
June 29, 2008
PingBack from http://badomgo.com/newxblogx/2008/06/29/66/Anonymous
June 29, 2008
PingBack from http://drmfr.com/team/andrevasko/2008/06/29/60/Anonymous
June 29, 2008
The comment has been removedAnonymous
June 29, 2008
The comment has been removedAnonymous
June 29, 2008
PingBack from http://blog.pipesd.net/hanklogax/2008/06/29/22/Anonymous
June 29, 2008
PingBack from http://antiwaree.bizhat.in/2008/06/29/140/Anonymous
July 01, 2008
This is another reason why I enjoy Linux, as you can get multiple kernels on the same OS and so, if anything goes wrong with a particular kernel (usually not because of a security problem, but perhaps a bug which is fixed speedily anyway) you can just use one of the other kernels on your system and either sort the problem out or wait the 15 hours for the new update to come through. I know it's irritating when people come to these forums to talk of another OS, but I only say this as a way of putting in some sort of suggestion to MS.Anonymous
July 02, 2008
The comment has been removedAnonymous
July 02, 2008
PingBack from http://namaskh.nueblog.com/2008/07/02/nod32-antivirus/Anonymous
July 02, 2008
PingBack from http://newxblogx.ruo.de/2008/07/02/143/Anonymous
July 02, 2008
PingBack from http://stagelocallysf.org/blog/nikolapite/2008/07/03/24/Anonymous
July 02, 2008
PingBack from http://blog.tecnicosfutbol.com/namaskh/2008/07/03/7/Anonymous
July 02, 2008
PingBack from http://blog.tecnicosfutbol.com/clearesoft/2008/07/03/284/Anonymous
July 02, 2008
The comment has been removedAnonymous
July 02, 2008
The comment has been removedAnonymous
July 03, 2008
PingBack from http://yfhbytvo.p0wnography.com/2008/07/03/3/Anonymous
July 03, 2008
PingBack from http://andreascb.cgi-bin.com/blog/2008/07/03/603/Anonymous
July 03, 2008
PingBack from http://yfhbytvo.whichgenerator.com/2008/07/03/11/Anonymous
July 03, 2008
PingBack from http://yfhbytvo.blogs.soignez-vous.com/2008/07/03/11/Anonymous
July 03, 2008
PingBack from http://yfhbytvo.farmnet.com.au/2008/07/03/11/Anonymous
July 03, 2008
The comment has been removedAnonymous
July 03, 2008
The comment has been removedAnonymous
July 03, 2008
PingBack from http://yfhbytvo.blogschleuder.de/2008/07/04/14/Anonymous
July 03, 2008
PingBack from http://yfhbytvo.seolevel.com/2008/07/03/17/Anonymous
July 03, 2008
PingBack from http://clearesoft.bizhat.in/2008/07/04/antivirus-update/Anonymous
July 03, 2008
PingBack from http://stagelocallysf.org/blog/namaskh/2008/07/04/free-xp-antivirus-24-register-key/Anonymous
July 09, 2008
The comment has been removedAnonymous
July 09, 2008
PingBack from http://badomgo.com/nikolapite/2008/07/09/cannot-update-norton-antivirus-2008/Anonymous
July 09, 2008
PingBack from http://localchoir.com/clearesoft/2008/07/09/antivirus-software/Anonymous
July 09, 2008
PingBack from http://miblogito.es/cabanova/2008/07/10/nod32-antivirus-updates/Anonymous
July 09, 2008
PingBack from http://antiwaree.seo-blog.org/2008/07/09/solo-antivirus-reviews/Anonymous
July 09, 2008
PingBack from http://kavalskiya.th3blogs.com/2008/07/10/antivirus-mac-osx-2/Anonymous
July 10, 2008
PingBack from http://cabanova.blog.mediaregionalne.pl/2008/07/10/free-xp-antivirus/Anonymous
July 10, 2008
PingBack from http://newxblogx.authorsabode.com/2008/07/10/best-free-antivirus-software/Anonymous
July 13, 2008
Really interesting article I like it. Best wishes from tuscanyAnonymous
July 25, 2008
Very interesting an informative article - Great job, thank you!Anonymous
July 30, 2008
Buspar vs zanax. Buspar. Buspar buspar effexor.Anonymous
August 21, 2008
PingBack from http://expertester.wordpress.com/2008/08/21/ok-i-love-vista/Anonymous
September 12, 2008
Nice vista security article, it was interesting to read it. Thank you.Anonymous
September 30, 2008
I think eventually microsoft will have self updating patches for the kernel, kind of like sfc but ran as a system process.Anonymous
October 15, 2008
Really great information, has given me an idea for a blog of my friends.Anonymous
October 27, 2008
PingBack from http://mstechnews.info/2008/10/driver-signing-kernel-patch-protection-and-kpp-driver-signing/Anonymous
October 30, 2008
This is just a promotion for Windows Vista, the Kernel issue is "case hopeless" a whole new strategy for building a new kernel and dumping the old one would maybe solve the problem.Anonymous
October 30, 2008
But it seems like they came up with something about it though, this is the start , you can never know where it will landAnonymous
November 22, 2008
I think eventually microsoft will have self updating patches for the kernel, kind of like sfc but ran as a system process.Anonymous
December 07, 2008
A great article and very helpul tips about Patch Protection. Thanks