Security and Windows Vista
Computer Repair and Consulting Service TIPSIt’s been a tough decade for Windows users. As Microsoft’s operating system entered the dominant phase of its existence, hackers began focusing almost solely on Windows, since that’s where all the users are. As a result, various Windows versions have suffered through a seemingly neverending series of electronic attacks, security vulnerabilities, and high-profile malware breakouts.
In 2003, Microsoft halted development of its major operating system and application products and began an internal review of its software development practices. The company went back and re-examined the source code to its then-current projects and developed a new software engineering approach that is security-centric. Now, the software giant will not release any software product that hasn’t undergone a stringent series of security checks. Windows Vista is the first client operating system shipped since that time that’s been developed from the get-go with these principles in mind. It has been architected to be secure from the beginning.
Is Windows Vista impenetrable? Of course not. No software is perfect. But Windows Vista is demonstrably more secure than its predecessors. And although we will no doubt face awesome security threats in the future, Microsoft at least has the lessons it learned from the mistakes of the past to fall back on. There’s little doubt that the security enhancements in Windows Vista will prove to be a major reason many people will upgrade to this version. It’s not a misplaced desire.
Windows Vista’s security features extend all the way through the system, from the highprofile applications, applets, and control panels you will deal with every day to the lowlevel features most Windows users have never heard of. In this chapter, we’ll highlight most of Vista’s new security features, starting with those you will likely have to deal with as soon as you begin using Microsoft’s latest operating system.
Computer Repair,Computer Service
Computer Consulting,Computer Consultant
Computer Support
No comments:
Post a Comment