A Quick Take on Windows Security Evolution
نویسنده
چکیده
A while back I wondered how software developers’ concerns about security evolved over time. Obviously, studying under-the-hood changes would be a major research undertaking—and frankly beyond my interest. But mightn’t there be a feasible shortcut, a sort of poor man’s time-series analysis of security concerns? Behind this question was my speculation that the tightening user-controlled security con guration options and default settings in operating systems indicate areas of critical concern to OS developers. I therefore decided to test that hypothesis on some Windows OSs—XP, Vista, 7, and 8—that roughly coincide with the time frame of interest to me. In the Windows world, robustness really started with the NT kernel. Before that, Windows was little more than a shell in front of DOS. NT had its own hardware abstraction layer for several platforms, a worthy TCP/IP stack, full preemptive multitasking, a native logging system, its own secure native le system (NTFS), a native Windows API, support for 32and 64-bit architectures, symmetrical multiprocessor support, and so forth. With the introduction of NT in 1993, Windows was beginning to look like a real OS. NT was the existential moment for Microsoft OS development. While NT proved that Microsoft could build something approaching a real OS, it was XP, introduced in 2001, that added sophistication to the NT platform. The graphical user interface was intuitive and versatile, the NT kernel was sound, and the networking and multimedia support was beginning to mature. The rest, as they say, is history. XP went on to sell over a billion copies while it was still supported by Microsoft until 2014, and remains the fourth most popular Windows OS to this day, just slightly behind 8.1 (gs.statcounter.com /os-version-market-share/windows/desktop/worldwide). So it’s with XP that I began my analysis of changes in Windows OS con guration options and default settings as a possible indicator of Microsoft’s security concerns. My operative principle was that adding a new con guration A Quick Take on Windows Security Evolution
منابع مشابه
Detection of high impedance faults in distribution networks using Discrete Fourier Transform
In this paper, a new method for extracting dynamic properties for High Impedance Fault (HIF) detection using discrete Fourier transform (DFT) is proposed. Unlike conventional methods that use features extracted from data windows after fault to detect high impedance fault, in the proposed method, using the disturbance detection algorithm in the network, the normalized changes of the selected fea...
متن کاملInformation Security in Multiprocessor Systems Based on the X86 Architecture
Debugging multiprocessor systems is much more tedious and complex because of the limited support offered by debuggers for solving synchronization problems for these types of processor systems. The most advanced kernel mode debugger available for Windows NT gives multiprocessor support by completely stopping one of the processors while the code is being debugged in the other processor.We will ta...
متن کاملAn Analytical Study of the Evolution of Qajar Palaces
The political and social system involved in the limbo between tradition and modernity of the Qajar Era caused widespread and quick developments in Iranian culture, art, and architecture as well as a challenge between tradition and modernity. Relatively numerous palaces built in this era were signs of greatness and distinction-seeking of the Qajar kings and aristocrats, who embraced all transfor...
متن کاملA PFIH-Based Heuristic for Green Routing Problem with Hard Time Windows
Transportation sector generates a considerable part of each nation's gross domestic product and considered among the largest consumers of oil products in the world. This paper proposes a heuristic method for the vehicle routing problem with hard time windows while incorporating the costs of fuel, driver, and vehicle. The proposed heuristic uses a novel speed optimization algorithm to reach its ...
متن کاملThe Myths of Security: What the Computer Security Industry Doesnt Want You to Know by Viega John
Why is security so bad? With many more people online than just a few years ago, there are more attackers -and theyre truly motivated. Attacks are sophisticated, subtle, and harder to detect than ever. But, as Viega notes, few people take the time to understand the situation and protect themselves accordingly. This book tells you: Why its easier for bad guys to own your computer than you think W...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
- IEEE Computer
دوره 50 شماره
صفحات -
تاریخ انتشار 2017