Report Casts Doubt on Vista's Security Impact

Hines, Matt
May 2012
Baseline;5/3/2012, p5
The article deals with a report that casts doubt about the security features of Windows Vista operating system from technology firm Microsoft. The report argues that the tools of the system are not user friendly that causes consumers to hesitate to deploy the product. The analysis also calls for the company to enhance the network access controls of the platform.


Related Articles

  • The Windows XP tweak Microsoft doesn't want you to know about... Dockrill, Peter // APC (Future Publishing Ltd.);Jul2014, Issue 404, p6 

    The article focuses on a registry hack which provides security updates to Windows XP operating system of software firm Microsoft Corp. It mentions that BetaNews Inc. has reported that tweaking registry with a single text file enables XP users to access updates intended for XP-based variant of...

  • XP Holds On To Virus Warnings.  // Micro Mart;1/30/2014, Issue 1296, p35 

    The article reports on the assurance of software and operating system (OS) provider Microsoft Corp. to its Windows XP users that it will continue to carry on its virus warnings until 2015.

  • No Support. CALLOWAY, JIM // Texas Bar Journal;Feb2014, Vol. 77 Issue 2, p142 

    The article offers information on the software firm Microsoft Corp.'s decision to end support for operating system Windows XP form April 8, 2014 along with removal of all upgrades. It mentions that the firm is taking such actions to promote sales of Windows 8.1, increased virus threat to the...

  • Three ways to fix Windows 10 password problems. SPECTOR, LINCOLN // PCWorld;Feb2016, Vol. 34 Issue 2, p156 

    The article offers suggestions for dealing with the Windows 10 operating system password problems. Topics discussed include changing password to something simple, using a Personal identification number (PIN) to log in to Windows 10, converting the Microsoft account to local account which will...

  • BEHIND THE CURTAIN ON Vista. Paget, Chris // Information Security;Dec2011, Vol. 13 Issue 10, p21 

    The article describes the experience of Chris Paget as a member of the final security review team for Windows Vista. To secure Windows, Microsoft designed Security Development Lifecycle (SDL) of which the Final Security Review (FSR) is the final stage. Microsoft's alleged poor reputation for...

  • The Care and Feeding of the Active Directory Security Access Token. DEUBY, SEAN // Windows IT Pro;Sep2011, Vol. 17 Issue 9, p14 

    The article focuses on Active Directory (AD) security access token, which is usually created after a user successfully authenticates to an AD domain. The Kerberos protocol handles the authentication of AD and with the launch of Windows 2000, it was extended to include handle authorization....

  • THE TOP 10 Best Practices for Locking Down Corporate PCs. Chernicoff, David // Windows IT Pro;May2011, Vol. 17 Issue 5, preceding p48 

    The article presents the top 10 best practices that companies can apply to prevent potential liability of unfettered computer use and establish control amongst end users. Some of the strategies discussed include taking into consideration significant issues when migrating to Windows 7, performing...

  • Windows 8 security.  // Computer Shopper;Dec2012, Issue 298, p152 

    The article discusses several ways to maximise the security features of the Windows 8 operating system. It states that there are numerous security features added on Windows 8 to prevent various threats from invading the system. It tackles how to use the SmartScreen Filter as well as how to...

  • Sharing An External Hard Drive.  // Micro Mart;9/18/2014, Issue 1329, p56 

    The article offers information about sharing an external hard disk drive (HDD). It provides sharing instructions for the Microsoft Windows XP operating system including plugging external HDD into the personal computer (PC), selecting sharing and security from the menu, and naming the shared...


Read the Article


Sorry, but this item is not currently available from your library.

Try another library?
Sign out of this library

Other Topics