Dan Blum, senior vice-president and research director at Burton Group, warns users that each additional layer of security Microsoft adds to Windows operating systems creates new security risks. Most applications use the Win32 interface, which has no code access control, allowing any component software to invoke any other component software; a rogue Win32 program could thus subvert add-on security measures. A Burton Group report on Windows vulnerabilities recommends that developers avoid the Win32 interface in favor of the .Net architecture, which reduces the effect of programming errors. Many users are shying away from Windows Server 2003 in favor of Linux and Unix platforms, which have fewer dependencies and are easier to reconfigure.
http://www.computerweekly.com/articles/article.asp?liArticleID=128907

Chowhound
Comic Vine
GameFAQs
GameSpot
Giant Bomb
TechRepublic