Language Selection

English French German Italian Portuguese Spanish

First look at Windows Vista: Secure at last?

Filed under
Microsoft

At the MVP global summit in Redmond, Wash., I had the opportunity to hear from a number of Microsoft insiders, the guys who actually wrote the code, about their goals and philosophy in creating the new operating system and included components such as Internet Explorer 7.0.

I was encouraged by what I heard. Defense in depth was a concept that kept coming up over and over again. Multilayered security is the only way to provide real protection, and Microsoft's commitment to making fundamental changes in the architecture to support that type of protection will give Vista a big security edge over older Windows operating systems.

Another philosophical position we're hearing a lot out of Microsoft employees has to do with "integration of the edge," or the idea that the Internet is the network. This goes along with the well-publicized "death of the DMZ" concept promulgated by Steve Riley, one of the senior program managers in Microsoft's Security Business Unit (you can download Steve's presentation on this topic from his Web site). This theme, in one form or another, ran throughout a number of the Microsoft presentations.

Taken together, these philosophies indicate a whole new way of looking at security, which incorporates strategies such as server and domain isolation and network access protection (NAP) enforcement. Another big focus is on identity authentication and management. We see this everywhere, from proposed antispam technologies such as Sender ID to enterprise/federation level products like MIIS. We also see it in Vista's improvements to such technologies as IPsec and better smart-card support.

Full Article.

Talk is cheap

After reading the full article I'm not convinced that Microshaft has any intentions of completely securing their software. Because of the way Windows registry is set-up I highly doubt that they will be able to successfully implement the necessary safeguards to make it as secure as Linux. And changing it so that only the admin account can add a printer is laughable. ladee-freakin-da lol

Bring me your tired, your poor, your huddled masses, yearning to free themselves from the shackles of mindless desktop experiences

Comment viewing options

Select your preferred way to display the comments and click "Save settings" to activate your changes.

More in Tux Machines

Thunderbolt 3 in Fedora 28

  • The state of Thunderbolt 3 in Fedora 28
    Fedora 28 is around the corner and I wanted to highlight what we did to make the Thunderbolt 3 experience as smooth as possible. Although this post focuses on Fedora 28 for what is currently packaged and shipping, all changes are of course available upstream and should hit other distributions in the future.
  • Thunderbolt 3 Support Is In Great Shape For Fedora 28
    Red Hat developers have managed to deliver on their goals around improving Thunderbolt support on the Linux desktop with the upcoming Fedora 28 distribution update. This has been part of their goal of having secure Thunderbolt support where users can authorize devices and/or restrict access to certain capabilities on a per-device basis, which is part of Red Hat's Bolt project and currently has UI elements for the GNOME desktop.

New Heptio Announcements

Android Leftovers

New Terminal App in Chome OS Hints at Upcoming Support for Linux Applications

According to a Reddit thread, a Chromebook user recently spotted a new Terminal app added to the app drawer when running on the latest Chrome OS Dev channel. Clicking the icon would apparently prompt the user to install the Terminal app, which requires about 200 MB of disk space. The installation prompt notes the fact that the Terminal app can be used to develop on your Chromebook. It also suggests that users will be able to run native apps and command-line tools seamlessly and securely. Considering the fact that Chrome OS is powered by the Linux kernel, this can only mean one thing. Read more