Language Selection

English French German Italian Portuguese Spanish

Vista: They took five years for this?

Filed under

Linux users can, at times, be the worst kind of ingrates, whining and complaining about what they perceive as missing features in a free operating system. My advice to all such whingers: spend 10 days using the latest version of Windows and you'll realise that you are living in a world of relative bliss.

I asked my editor, Stan Beer, if he had a Vista pack for a cursory look, out of sheer curiosity. You hear so much about Vista on the net but there's a good deal of truth yet in the old saying, "seeing is believing."

At times I could not believe what I saw during the 14-odd days that I played around with both versions of Vista Ultimate - the 32-bit and 64-bit versions.

Microsoft has admittedly set the bar pretty low for this new avatar; the marketing blurb on the pack says "the most secure Windows ever." I couldn't help a snigger when I glimpsed this - the same slogan was used to try and sell Windows XP.

There are certain names which come to mind when associates the word "security" with XP, names like Sasser, Blaster, Sobig aand so on. Not to mention the fact that there was a second service pack issued for XP in August 2004 - well over three years after it was launched - which had 810 fixes and updates.

I was thus prepared for low-key peformance with lots of eye candy. I was disappointed. At the end of the testing, when I gratefully used a CD of the latest Ubuntu release (and I don't have a very high opinion of that as regular readers of this column would know) to wipe Vista off my drive, I realised that even those expectations had been too much.

More Here.

Re: "They took five years for this"

And it will probably take another 5 years for the next windows. Smile

Comment viewing options

Select your preferred way to display the comments and click "Save settings" to activate your changes.

More in Tux Machines

Would stock Android make you more likely to buy a Chinese smartphone?

Huawei, like any manufacturer that puts time and effort into a software layer of unique features and enhancements, believes wholeheartedly in the value its interface adds to the core Android experience. As Android nerds, we naturally tend to gravitate toward a stock experience that we can customize ourselves, but we are also aware that we are hardly representative of 'average' smartphone consumers. Read more

KTU exams to run on open source software

All examinations of the A.P.J. Abdul Kalam Technological University (KTU) — which run on an online platform — would switch to open source software from the second semester onwards. For the first semester examinations, the KTU would use a proprietary, Microsoft, software. In response to demands from student organisations, the KTU has pushed back its first semester examinations by two days. The first of the examinations would now begin on December 4 instead of December 2. The first of the results would be published on December 19. Read more Also: KTU goes ahead with exam outsourcing

CMS News

Security Leftovers

  • Friday's security updates
  • Researchers poke hole in custom crypto built for Amazon Web Services
    Underscoring just how hard it is to design secure cryptographic software, academic researchers recently uncovered a potentially serious weakness in an early version of the code library protecting Amazon Web Services. Ironically, s2n, as Amazon's transport layer security implementation is called, was intended to be a simpler, more secure way to encrypt and authenticate Web sessions. Where the OpenSSL library requires more than 70,000 lines of code to execute the highly complex TLS standard, s2n—short for signal to noise—has just 6,000 lines. Amazon hailed the brevity as a key security feature when unveiling s2n in June. What's more, Amazon said the new code had already passed three external security evaluations and penetration tests.
  • Social engineering: hacker tricks that make recipients click
    Social engineering is one of the most powerful tools in the hacker's arsenal and it generally plays a part in most of the major security breaches we hear about today. However, there is a common misconception around the role social engineering plays in attacks.
  • Judge Gives Preliminary Approval to $8 Million Settlement Over Sony Hack
    Sony agreed to reimburse employees up to $10,000 apiece for identity-theft losses
  • Cyber Monday: it's the most wonderful time of year for cyber-attackers
    Malicious attacks on shoppers increased 40% on Cyber Monday in 2013 and 2014, according to, an anti-malware and spyware company, compared to the average number of attacks on days during the month prior. Other cybersecurity software providers have identified the December holiday shopping season as the most dangerous time of year to make online purchases. “The attackers know that there are more people online, so there will be more attacks,” said Christopher Budd, Trend Micro’s global threat communications manager. “Cyber Monday is not a one-day thing, it’s the beginning of a sustained focus on attacks that go after people in the holiday shopping season.”