If it weren’t for RAM there would be 70% fewer Windows patches
Windows and RAM have a love-hate relationship.
Keep up to date with the most important stories and the best deals, as picked by the PC Gamer team.
You are now subscribed
Your newsletter sign-up was successful
Want to add more newsletters?
Every Friday
GamesRadar+
Your weekly update on everything you could ever want to know about the games you already love, games we know you're going to love in the near future, and tales from the communities that surround them.
Every Thursday
GTA 6 O'clock
Our special GTA 6 newsletter, with breaking news, insider info, and rumor analysis from the award-winning GTA 6 O'clock experts.
Every Friday
Knowledge
From the creators of Edge: A weekly videogame industry newsletter with analysis from expert writers, guidance from professionals, and insight into what's on the horizon.
Every Thursday
The Setup
Hardware nerds unite, sign up to our free tech newsletter for a weekly digest of the hottest new tech, the latest gadgets on the test bench, and much more.
Every Wednesday
Switch 2 Spotlight
Sign up to our new Switch 2 newsletter, where we bring you the latest talking points on Nintendo's new console each week, bring you up to date on the news, and recommend what games to play.
Every Saturday
The Watchlist
Subscribe for a weekly digest of the movie and TV news that matters, direct to your inbox. From first-look trailers, interviews, reviews and explainers, we've got you covered.
Once a month
SFX
Get sneak previews, exclusive competitions and details of special events each month!
Are you tired for patching Windows every month, and sometimes even more often than that? As it turns out, the vast majority of Windows patches are to address memory safety bugs, according to Matt Miller, an engineer at Microsoft.
Miller made an interesting revelation at a recent security conference in Israel. He said that over the course of the last 12 years, around 70 percent of Microsoft's patches were aimed at fixing memory issues, Fudzilla reports.
That doesn't mean you should blame your PC's memory. The culprit, according to Miller, is that Windows is written almost entirely in C and C++ (along with C# and some hand tuned/hand written assembly, according to a decade-old support query). Those "memory-unsafe" programming languages give developers fine-grain access to memory addresses where code can reside and be executed.
Mistakes in coding happen, but if memory management code is not on point, it opens the door to memory errors that attackers can exploit, regardless if you're running a cheap memory kit or spent some extra scratch on the best RAM for gaming money can buy. Either way, system memory is a huge attack vector for hackers. They can use these exploits to conduct remote code execution attacks, give themselves elevated privileges, and other nasty behavior.
You would think that by now Microsoft would have stomped out most of the bugs related to memory, but it's not as simple as that. While most of the basic bugs have been exterminated, hackers have shifted to different types of exploits, ones that are more complex. So, the cat and mouse game continues.
There's nothing you can really do about the situation, but the next time you're lamenting yet another system reboot to install the latest round of patches, at least you'll know why.
Keep up to date with the most important stories and the best deals, as picked by the PC Gamer team.
Paul has been playing PC games and raking his knuckles on computer hardware since the Commodore 64. He does not have any tattoos, but thinks it would be cool to get one that reads LOAD"*",8,1. In his off time, he rides motorcycles and wrestles alligators (only one of those is true).


