Some Cool Ways Windows 8 Is More Secure Than Windows 7

Whatever you think of it, Ms windows 8 isn’t just a new interface slapped on top of Ms windows seven. Ms windows 8 has seen a lot of security upgrades, including a anti-virus, an program reputation system, and security from boot-time rootkits.

There are also quite a few low-level security upgrades under the bonnet. Ms has not explained all of them, but Ms windows 8 controls storage in a more protected way and contains features that create security weaknesses more complicated to manipulate.
Integrated Antivirus

Windows 8 lastly has a anti-virus system. it’s named Ms windows Defensive player, but the interface will be immediately familiar to anyone that’s ever used Ms Security Requirements – this is Ms Security Requirements with a new name. You can easily set up any other anti-virus you prefer and Ms windows Defensive player will be automatically disabled if another anti-virus is operating, but the incorporated anti-virus is a capable product. Best of all, this ensures that all Ms windows customers will lastly have anti-virus security out-of-the-box.
Early Release Anti-Malware

In Ms windows 8, anti-virus items can begin previously in the boot-up procedure to check out the system’s motorists for viruses. This helps protect against rootkits that begin before the anti-virus system and cover up from it. Ms windows Defensive player starts previously in the begin procedure out-of-the-box, and third-party anti-virus vendors can also add the Early-Launch Anti-Malware (ELAM) function to their items.
SmartScreen Filter

Previously used only in Online Traveler, the SmartScreen narrow is now implemented at the operating system-level. It will be used to check out EXE data files you obtain from Online Traveler, Mozilla Firefox, Google Chrome, and other applications. When you obtain and double-click an EXE data file, Ms windows will check out the data file and send its signature to Microsoft’s servers. If the program is known-good, such as the installer for iTunes, Photoshop, or another well-known system, Ms windows will allow it to run. If it’s known-bad, perhaps if it contains viruses, Ms windows will prevent it from operating. If it’s new and Ms windows does not know what it is, Ms windows will warn you and allow you to bypass the warning.

This function should help less-experienced customers from downloading and operating harmful applications from the Online. Even new pieces of viruses will be detected by the SmartScreen narrow as an unknown new system that should be approached with caution. Study more about the new SmartScreen narrow here.

Secure Boot

On new Ms windows 8 pc systems that use the UEFI firmware instead of the old-style BIOS, Secure Boot guarantees that only specially finalized and approved application can run at begin. On current pc systems, viruses could set up a harmful begin loading machine that loads before the Ms windows begin loading machine, starting a boot-level rootkit (or “bootkit”) before Ms windows even launches. The rootkit could then cover up itself from Ms windows and anti-virus application, pulling the strings in the qualifications.

On Intel x86 PCs, you will be able to add your own security keys to the UEFI firmware, so you could even have your system begin only protected Linux begin loaders that you have finalized. Study more about Secure Boot here.
Memory Management Improvements

Microsoft has made a lot of under-the-hood upgrades to the way Ms windows 8 controls storage. When a security opening is found, these upgrades can create the security opening more complicated or even impossible to manipulate. Some types of exploits that operate on previously versions of Ms windows wouldn’t operate at all on Ms windows 8.

Microsoft has not explained all of these upgrades, but they have mentioned a few:

ASLR (Address Space Layout Randomization) has been extended to more parts of Ms windows, randomly moving data and code around in storage to create it more complicated to manipulate.
Mitigations that were once used to Ms windows applications are now also used to the Ms windows kernel.
The Ms windows heap, where Ms windows applications receive their storage from, contains additional checks to defend against manipulate techniques.
Online Traveler 10 contains upgrades that create 75% of the security weaknesses reported over the last two years more difficult to manipulate.

New Applications Are Sandboxed

Apps for Ms windows 8’s new Contemporary interface (formerly known as Metro) are sandboxed and restricted in what they can do on your pc.

On the Ms windows desktop pc, applications had full entry to your system. If you downloaded and ran a Ms windows game, it could set up motorists on your system, read data files from everywhere on your disk drive, and set up viruses on your pc. Even if applications run with restricted credentials thanks to UAC, they typically set up with Administrator privileges and can do anything they want during installation.

Windows 8 apps operate more like web pages and cellular phone applications on other well-known cellular platforms. When you set up an app from the Ms windows Shop, that app has restricted entry to your system. It cannot run in the qualifications and monitor all your keystrokes, logging your bank card number and internet banking passwords like applications on the traditional Ms windows desktop pc can. it does not have entry to every data file on your system.

Apps for Ms windows 8’s new Contemporary interface are also available only available through the Ms windows Shop, which is more controversial. However, customers cannot set up harmful Contemporary apps from outside the shop. They would have to go through the Ms windows Shop, where Ms has the ability to pull them if they are discovered to be harmful.

Author Bio:
This post is written by Ilya Elbert who is an expert in it support services.

Author: Guestpost

Share This Post On

Submit a Comment

Your email address will not be published. Required fields are marked *

You may use these HTML tags and attributes: <a href="" title=""> <abbr title=""> <acronym title=""> <b> <blockquote cite=""> <cite> <code> <del datetime=""> <em> <i> <q cite=""> <strike> <strong>