Microsoft Windows: the Launch of Windows 7

Total Page:16

File Type:pdf, Size:1020Kb

Microsoft Windows: the Launch of Windows 7 S w 909A23 MICROSOFT WINDOWS: THE LAUNCH OF WINDOWS 7 Matthew Ball wrote this case under the supervision of Professor Miranda Goode solely to provide material for class discussion. The authors do not intend to illustrate either effective or ineffective handling of a managerial situation. The authors may have disguised certain names and other identifying information to protect confidentiality. Ivey Management Services prohibits any form of reproduction, storage or transmittal without its written permission. Reproduction of this material is not covered under authorization by any reproduction rights organization. To order copies or request permission to reproduce materials, contact Ivey Publishing, Ivey Management Services, c/o Richard Ivey School of Business, The University of Western Ontario, London, Ontario, Canada, N6A 3K7; phone (519) 661-3208; fax (519) 661-3882; e-mail [email protected]. Copyright © 2009, Ivey Management Services Version: (A) 2009-08-13 INTRODUCTION It was the spring of 2009, and Steve Ballmer, chief executive officer of Microsoft Corporation, was planning the launch of Windows 7, the company’s newest operating system. Successfully marketing Windows 7 had become essential for the company, which had faced numerous challenges in recent years. The company’s image had been tarnished by the commercial and public relations failure of its last operating system, Windows Vista. Moreover, the company became the target of a brutal series of advertisements by its largest competitor, Apple Inc., and was continuing to bleed market share. Beta releases had been well received by the Internet community, and Microsoft hoped that Windows 7 would not only improve its bottom line, but also restore its tarnished image. Ballmer was faced with a weighty question: How could carefully executed advertising, pricing and product decisions enable Microsoft to revive consumer perceptions, and realize Windows 7’s potential? MICROSOFT CORPORATION In 1986, Microsoft successfully released its first independently developed operating system, Windows 1.0 (see Exhibit 1). In 1989, Microsoft introduced its flagship productivity suite, Microsoft Office, which bundled individual applications, such as Microsoft Word and Microsoft Excel. On May 22, 1990, Microsoft launched Windows 3.0. The new version of Microsoft’s operating system boasted a more streamlined user graphics interface and improved application performance and integration, and sold over 100,000 copies in two weeks.1 Two years later, Microsoft ran its released Windows 3.1 along with its first promotional campaign on TV; the software sold over three million copies in its first two months on the 2, 3 market. 1“Windows Desktop Products History,” Microsoft. Available at http://www.microsoft.com/windows/WinHistoryDesktop.mspx, accessed June 15, 2009. 2 “Microsoft Visitor Center for Students,” Microsoft. Available at http://www.microsoft.com/about/companyinformation/visitorcenter/students.aspx, accessed June 15, 2009. 3 “Microsoft Company History,” The History of Computing Project. Available at Dohttp://www.thocp.net/companies/microsoft/microso Not Copyft_company_part2.htm, accessed or June 15, 2009. Post This document is authorized for use only by Vandana Bharti at ITM Business School until March 2014. Copying or posting is an infringement of copyright. [email protected] or 617.783.7860. Page 2 9B09A023 By 1993, Windows had become the most widely used operating system in the world.4 That same year, Fortune Magazine named Microsoft the “Most Innovative Company Operating in the U.S.”5 As part of its strategy to broaden its business, Microsoft released Microsoft Encarta in March 1993, the first encyclopedia designed to run on a computer.[5] Shortly after, the Microsoft Home brand was introduced, encompassing Microsoft’s new multimedia applications for Windows 3.x. Microsoft changed its slogan to “Where do you want to go today?” in 1994 as part of an attempt to appeal to nontechnical audiences in a US$100 million advertising campaign.6 On August 24, 1995, Microsoft released Microsoft Windows 95, which featured a completely new user interface, including a novel start button; more than a million copies of Microsoft Windows 95 were sold in the first four days after its release.6 In 2001, Microsoft released Windows XP, the first version of Windows that encompassed the features of both its business and home product lines. XP introduced a new graphical user interface, the first such change since Windows 95. Microsoft encountered turmoil in March 2004 when antitrust legal action was brought against it by the European Union for abusing its current dominance with the Windows operating system. This suit eventually resulted in a judgment to produce new versions of its Windows XP platform that did not include its Windows Media Player, as well as a fine of $613 million.7 The 21st century has seen Microsoft expand its offerings into several new product markets. In 2001, it entered the multibillion-dollar video game console market with the release of the Microsoft Xbox. In the following year, the company released Windows Mobile, a mobile phone version of its operating system.8 In 2006, the company released its own MP3 and digital music store, Zune and Zune Marketplace. Increased integration between these products provided Microsoft with a significant competitive advantage that helped secure the company’s market position across its entire product line. WINDOWS VISTA Development Production on Windows Vista, originally known by its codename “Longhorn,” began in May of 2001, five months prior to the release of Windows XP. Longhorn was originally conceived as an update to the Windows XP operating system and was targeted for release in late 2003. However, faced with ongoing delays, concerns about feature creep9 and mounting criticism on the security of XP, Microsoft announced in August of 2004 that Longhorn’s development had been completely restarted,10 with the primary goal of 4 “Microsoft History – 1993,” WebArchive.Org. Available at http://web.archive.org/web/19961017232408/library.microsoft.com/msinfo/mshist/1993.htm, accessed June 15, 2009. 5 Gill Dunsford, “Feature: Brand Microsoft,” Sales Promotion. Available at http://www.salespromo.co.uk/article/90, accessed June 15, 2009. 6 “Microsoft Company History,” The History of Computing Project. Available at http://www.thocp.net/companies/microsoft/microsoft_company_part2.htm, accessed June 15, 2009. 7 “Commission Decision,” The Commission of the European Communities. Available at http://ec.europa.eu/competition/antitrust/cases/decisions/37792/en.pdf, accessed June 15, 2009. 8 Daniel Eran Dilger, “Microsoft plans “Skymarket” apps store for Windows Mobile 7 in 2009,” RoughlyDrafted Magazine. Available at http://www.roughlydrafted.com/2008/09/01/microsoft-plans- per centE2 per cent80 per cent9Cskymarket per centE2 per cent80 per cent9D-apps-store-for-windows-mobile-7-in-2009/, accessed June 15, 2009. 9 “Feature creep” is a tendency for product or project requirements to increase during development beyond those originally foreseen, leading to features that weren't originally planned and increasing risk to product quality or scheduled deadlines. Feature creep may be driven by a client's growing "wish list" or by developers themselves as they see opportunity for improving the product. “feature creep”, SearchCIO.com. Available at http://searchcio.techtarget.com/sDefinition/0,,sid182_gci860179,00.html, accessed August 13, 2009 10 Ina Fried and Marget Kane, “Microsoft overhauls Longhorn plans”, CNET. Available at http://news.cnet.com/Microsoft- Dooverhauls-Longhorn-plans/2100-1016_3-5326 Not Copy850.html, accessed June 15, 2009. or Post This document is authorized for use only by Vandana Bharti at ITM Business School until March 2014. Copying or posting is an infringement of copyright. [email protected] or 617.783.7860. Page 3 9B09A023 improving the security and stability of the Windows platform.11 As a result, of Longhorn’s previously announced features such as WinFS, a revolutionary new data storage and management system, were eventually dropped. In 2005, Microsoft initiated an unprecedented beta-test program that involved hundreds of thousands of volunteers. From September 2005 to October 2006, Microsoft regularly released Community Technology Previews to beta testers and two beta release versions to the public. After nearly six years, the longest wait for a Windows release, Vista was launched on January 30, 2007, at an estimated cost of more than US$6 billion.12 Features Windows Vista included numerous new features designed to increase system security and provide users with a more aesthetic and user-friendly graphical interface (see Exhibit 2). Vista’s much-hyped Aero gave users the ability to choose the color of their windows and apply “glass-like” transparency effects. Additionally, users could “tab” through their Windows by stacking them in 3D or by displaying “live thumbnails” from the taskbar. Another new feature to Vista was Windows Gadgets, which allowed users to place a variety of continually running applications (such as a clock, weather tracker, slideshow or Sudoku) on a sidebar on the desktop. Additionally, Microsoft significantly improved its media suite, which included newer, high-definition-capable versions of Windows Movie Maker, Windows DVD Maker and Windows Photo Gallery. User Account Control represented the forefront of Microsoft’s efforts to improve the security on the Windows operating system. UAC was designed to stop viruses and malware from making any unauthorized changes to the user’s system. When a user (with either administrator or limited privileges) tried to install or uninstall software, make system-wide configuration changes, download updates, allow a program access to their files, or connect their files to an Internet program, he or she would be prompted to confirm whether to proceed or not. When this prompt took place, the rest of the screen was dimmed and frozen, and only the authorization window was active. The intent of this process was to stop a malicious program from misleading the user by interfering with the authorization window or by providing its own authorization requests to trick the user.
Recommended publications
  • I Hate Comic Sans!
    I HATE COMIC SANS! It’s Overused It’s Badly used It’s not serious typography Used Incorrectly by Hospitals, Businesses, and Banks, etc. ? “A Computer on Every Desk, In every Home, Running Microsoft Software” the Microsoft Mission statement c. 1980 Computers were expensive Marketed mostly to businesses Expensive Dial up internet Off peak use only on AOL (after 6pm-6am) Screen savers were products Microsoft Scenes After Dark (flying toasters) CD-ROM ‘multimedia’ software MS Beethoven, Schubert, Stravinsky, Strauss MS Ultimate Frank Lloyd Wright MS Wine Guide, MS Dogs, MS Complete Gardening Microsoft Home (1993 Consumer Division) •Goal: To create software for Mums, Dads, and kids Product titles: •Microsoft Flight Simulator* •Microsoft Encarta* •Microsoft Scenes* •Microsoft Creative Writer Wall Street Journal: Aug 24, 1995 • Home computers in US home electronic stores for about $1000 •First affordable computers available • with Windows 95 installed • MSN Online network released to compete with America Online (AOL), Compuserve, Genie etc. • First Generation Internet Explorer released in the Plus Pack for Windows 95 ‘Utopia’ Project Lead: Melinda French (future Mrs. BillG) UI used a simple method of Launching Applications Similar to Hypercard stacks of the late 1980s For children and novice users Release: to coincide with Win95 and 1995 Christmas Season Rover talks in Times New Roman 1994 Microsoft Bob DC Comics: DC Comics The Dark Knight Returns Watchmen DC COMICS: WATCHMEN 1986-87 ILLUSTRATOR/LETTERER : DAVE GIBBONS •
    [Show full text]
  • Microsoft Corporation
    Before the Federal Trade Commission Washington, DC In the Matter of ) ) Microsoft Corporation. ) _____________________________ ) Complaint and Request for Injunction, Request For Investigation and for Other Relief INTRODUCTION 1. This complaint concerns the privacy implications of the Microsoft XP operating system that is expected to become the primary means of access for consumers in the United States to the Internet. As is set forth in detail below, Microsoft has engaged, and is engaging, in unfair and deceptive trade practices intended to profile, track, and monitor millions of Internet users. Central to the scheme is a system of services, known collectively as “.NET,” which incorporate “Passport,” “Wallet,” and “HailStorm” that are designed to obtain personal information from consumers in the United States unfairly and deceptively. The public interest requires the Commission to investigate these practices and to enjoin Microsoft from violating Section 5 of the Federal Trade Commission Act, as alleged herein. PARTIES 2. The Electronic Privacy Information Center (“EPIC”) is a non-profit, public interest research organization incorporated in the District of Columbia. EPIC’s activities include the review of government and private sector polices and practices to determine their possible impact on the privacy interests of the American public. Among its other activities, EPIC has prepared reports and presented testimony before Congress and administrative agencies on the Internet and privacy issues. 3. The Center for Digital Democracy (“CDD”) is a non-profit organization that represents the interests of citizens and consumers with respect to new media technologies. 4. The Center for Media Education (“CME”) is a national nonprofit, nonpartisan organization dedicated to creating a quality electronic media culture for children, their families, and the community.
    [Show full text]
  • Yahoo Messenger Error Code 7 Softpedia
    Yahoo Messenger Error Code 7 Softpedia Available now for Linux, Mac OS X, and Microsoft Windows. Mozilla Thunderbird 38.0 Arrives with GMail OAuth2 and Yahoo Messenger Support. DESKTOP Windows Messenger, Google Talk, ICQ, Skype), but it can also directly access social with red highlights), or change font to code style (which is especially useful if you're trying There are tons of emoticons you can play with (smiley faces, objects and symbols), and some of them are compatible with Yahoo! Clear Yahoo Messenger cache in Windows. Caution: These steps apply to 32-bit and 64-bit versions of Windows XP, Windows Vista, Windows 7, and Windows. ManyCam also allows you to broadcast four video windows simultaneously or picture in picture video. wont finish downloading, gets stuck everytime and Im on an i7 the exe file runs (and I assume pulls more code down from web) Norton says Trojan. Operating Systems, Windows XP/Vista/7/8 Yahoo Messenger. Yahoo! Messenger can be run on various versions of the Windows operating Download Skype 7.1 Offline Installer Latest Version 2015 Download Skype. -Softpedia.com can add not only keystrokes and mouse actions to your scripts but also manage windows, Facebook, Yahoo, AOL, Hotmail So im using this for a game and it works great but theres one issue it doesnt June 19 at 7:32am. Yahoo Messenger Error Code 7 Softpedia >>>CLICK HERE<<< Telegram Desktop is a powerful, cross-platform messenger app that enables iOS (known as Telegram Messenger) and Windows Phone, but also desktop a valid mobile phone number, which is used for generating a security code.
    [Show full text]
  • Software Sites-2010 ALL FULL
    Software Sites-2010 ALL FULL related:http://www.brothersoft.com/ related:http://download.cnet.com/ related:http://www.soft32.com/ related:http://www.freedownloadscenter.com/ related:http://www.filehippo.com/ related:http://www.softpedia.com/ related:http://www.dl4all.com/ related:http://www.topdownloads.net/ related:http://downloads.zdnet.com/ related:http://www.freedownloadmanager.org/ related:http://www.tucows.com/ related:http://www.download3k.com/ related:http://www.bestfreewaredownload.com/ related:http://www.download3000.com/ related:http://www.download3k.com/ related:http://www.123-free-download.com/ related:http://www.download3k.com/ related:http://www.123-free-download.com/ related:http://www.topshareware.com/ related:http://www.freedownloadsplace.com/ related:http://www.freedownloadsplace.com/ related:http://www.download32.com/ related:http://www.sharewareplaza.com/ related:http://www.freewarefiles.com/ related:http://majorgeeks.com/ related:http://www.top4download.com/ http://www.brothersoft.com/ http://download.cnet.com/ http://www.soft32.com/ http://www.freedownloadscenter.com/ http://www.filehippo.com/ http://www.softpedia.com/ http://www.dl4all.com/ http://www.topdownloads.net/ http://downloads.zdnet.com/ http://www.freedownloadmanager.org/ http://www.tucows.com/ http://www.download3k.com/ http://www.bestfreewaredownload.com/ http://www.download3000.com/ http://www.download3k.com/ http://www.123-free-download.com/ http://www.download3k.com/ http://www.123-free-download.com/ http://www.topshareware.com/ http://www.freedownloadsplace.com/ http://www.freedownloadsplace.com/ http://www.download32.com/ http://www.sharewareplaza.com/ http://www.freewarefiles.com/ http://majorgeeks.com/ http://www.top4download.com/ 1. http://download.cnet.com/ 2. http://www.soft32.com/ 3. http://www.freedownloadscenter.com/ 4.
    [Show full text]
  • Installing Microsoft Windows Vista on Selected HP Products
    Installing Microsoft Windows Vista on Selected HP Products Introduction......................................................................................................................................... 2 List of Tested Systems ........................................................................................................................... 2 Install Guide........................................................................................................................................ 3 Operating System Requirements for Upgrade ...................................................................................... 3 Minimum Requirements ................................................................................................................. 3 Recommended ............................................................................................................................. 3 Recommended Install Order .............................................................................................................. 3 Check and Upgrade BIOS............................................................................................................. 3 Update Drivers and Utilities ........................................................................................................... 4 Check for Application Compatibility ............................................................................................... 4 Additional Information.........................................................................................................................
    [Show full text]
  • Windows 10: Considered Harmful
    Windows 10: Considered Harmful 26 August, 2016 Last Updated: 25 September 2016 Previously I made a series of articles against Windows 10, consisting of basic explanation, open letters, and even a long-winded chance.org petition. However, I have come to realize that these various things could be better as one page rather than fragments across my website. On this page I hope to explain why the Windows 10 system is evil and also include why Windows as a whole is Considered Harmful . Sources to unreferenced items in this article can be found in the various resource links on the bottom of the page. Information can also be found in the photographs shown and with a simple web search. The primary reason against the Windows 10 system is an obvious one. The system is designed to be a system that data-mines the user. This is proven time and time again. Using a tool such as wireshark, one can clearly see that it makes encrypted connections to a variety of Microsoft servers. This uses a very weak RSA encryption that can be broken in under a minute. When a user successfully decrypted the encrypted data, he simply converted the decrypted ``.bin'' extension to ``.png'' and opened them. The image files were screen- shots of him installing the RSA decryptor tool. This was in a VM and was a fresh install. In addition to this, another user in Australia also monitored the odd connection but did not decrypt it. He noticed this when he opened a photograph in the Windows Photo App.
    [Show full text]
  • Download Torrent 32 Bit Windows 7 Download Torrent 32 Bit Windows 7
    download torrent 32 bit windows 7 Download torrent 32 bit windows 7. Download Tixati v2.84 for 32-Bit Windows. Windows XP Windows Vista Windows 7 Windows 8 Windows 10 Windows Server 2003 Windows Server 2008 Windows Server 2012. First Time Users Remember, you can press F1 any time for context-sensitive help. We also have a Finding Content Guide for those who are new to torrents in general, and an Optimizing Tixati Guide for those who want to squeeze every last drop of speed out of their internet connection. Your Suggestions And Bug-Reports Are Welcome Feel free to visit forum.tixati.com and let us know what you think. Registration is not required and posting a comment is fast and simple. We consider all suggestions and your opinion counts! Our NO Spyware, NO Adware, NO Nonsense Guarantee Unlike many other torrent clients, we take pride in saying NO to spyware and adware. Tixati installs and uninstalls cleanly and doesn't add anything extra to your system. Our software is fully self-contained and doesn't have annoying dependencies on Java or .Net frameworks. Download torrent 32 bit windows 7. Source: Windows 10 Pro v1803 RS4 3in1 Fr x64 (13 Juin 2018).iso (Fais par ace N kelly ) Build: v1803 build 17134.112 Compression: ESD Langue: Français MD5: 823C3F936E7AC20A722C9CE67F4E0D34 SHA-1: 1539A155124D691743C74CFB983B272CB3264092. Fonctions de Bases Supprimés et "Tweaks" : Supprimés : Windows Defender Cortana Microsoft Edge Internet Explorer (Réinstallable via "Programmes et Fonctionnalités") Tweaks : Desktop - Icône du poste de travail visible
    [Show full text]
  • Automated Malware Analysis Report For
    ID: 396299 Cookbook: urldownload.jbs Time: 09:35:05 Date: 23/04/2021 Version: 31.0.0 Emerald Table of Contents Table of Contents 2 Analysis Report https://us.softpedia-secure- download.com:443/dl/4b98b6dbc02a94c36aff3c7686bdbd31/60813f0d/300818793/drivers/keyboard/sp100907.exe Overview 33 General Information 3 Detection 3 Signatures 3 Classification 3 Startup 3 Malware Configuration 3 Yara Overview 3 Sigma Overview 3 Signature Overview 3 Mitre Att&ck Matrix 4 Behavior Graph 4 Screenshots 5 Thumbnails 5 Antivirus, Machine Learning and Genetic Malware Detection 6 Initial Sample 6 Dropped Files 6 Unpacked PE Files 6 Domains 6 URLs 6 Domains and IPs 7 Contacted Domains 7 URLs from Memory and Binaries 7 Contacted IPs 7 Public 7 General Information 7 Simulations 8 Behavior and APIs 8 Joe Sandbox View / Context 8 IPs 8 Domains 8 ASN 9 JA3 Fingerprints 9 Dropped Files 9 Created / dropped Files 9 Static File Info 9 No static file info 9 Network Behavior 9 Network Port Distribution 10 TCP Packets 10 UDP Packets 10 DNS Queries 11 DNS Answers 11 HTTPS Packets 11 Code Manipulations 11 Statistics 11 Behavior 11 System Behavior 11 Analysis Process: cmd.exe PID: 5548 Parent PID: 2128 11 General 12 File Activities 12 File Created 12 Analysis Process: conhost.exe PID: 5536 Parent PID: 5548 12 General 12 Analysis Process: wget.exe PID: 6028 Parent PID: 5548 12 General 12 File Activities 13 File Created 13 Disassembly 13 Code Analysis 13 Copyright Joe Security LLC 2021 Page 2 of 13 Analysis Report https://us.softpedia-secure-download.co…m:443/dl/4b98b6dbc02a94c36aff3c7686bdbd31/60813f0d/300818793/drivers/keyboard/sp100907.exe
    [Show full text]
  • Bi-Weekly Cybersecurity Rollup
    UNCLASSIFIED October 28, 2016 North Dakota State and Local Intelligence Center Bi-Weekly Cybersecurity Rollup Included in this week’s summary: Click on the Section Header to go directly to that location in the Summary NORTH DAKOTA & REGIONAL (U) Phish Looking to Hook NDSU Community (U) Task force close to finalizing cybersecurity recommendations NATIONAL (U) Locky ransomware accounted for 97 percent of all malicious email attachments (U) Weebly breach affects over 43 million users (U) U.S. calls on automakers to make cyber security a priority INTERNATIONAL (U) Magneto malware hides stolen card data in image files (U) WordPress sites under attack via security flaw in unmaintained plugin (U) Windows zero-day exploited by “FruityArmor” APT group (U) Linux kernel zero-day CVE-2016-5195 patched after being deployed in live attacks (U) Dyn DDoS attack: The aftermath (U) LinkedIn to get Banned in Russia for not Complying with Data Localization Law UNCLASSIFIED UNCLASSIFIED NORTH DAKOTA & REGIONAL (U) Phish Looking to Hook NDSU Community (U) Over 280 North Dakota State email accounts had been compromised by phishing attackers since Tuesday. Students, staff and faculty are mainly being targeted through malicious phishing emails through their NDSU accounts. Examples include false emails saying users may upgrade their email storage space through Help Desk, someone’s cousin needs money or individuals in Africa need money. Source: (U) http://ndsuspectrum.com/phish-looking-to-hook-ndsu-community/ (U) Task force close to finalizing cybersecurity recommendations (U) A state cybersecurity task force is preparing for one last discussion early next month before they sign off on their recommendations in a final report to the governor.
    [Show full text]
  • Windows Tool Reference
    AppendixChapter A1 Windows Tool Reference Windows Management Tools This appendix lists sets of Windows management, maintenance, configuration, and monitor- ing tools that you may not be familiar with. Some are not automatically installed by Windows Setup but instead are hidden away in obscure folders on your Windows Setup DVD or CD- ROM. Others must be downloaded or purchased from Microsoft. They can be a great help in using, updating, and managing Windows. We’ll discuss the following tool kits: ■ Standard Tools—Our pick of handy programs installed by Windows Setup that we think are unappreciated and not well-enough known. ■ Support Tools—A set of useful command-line and GUI programs that can be installed from your Windows Setup DVD or CD-ROM. ■ Value-Added Tools—Several more sets of utilities hidden away on the Windows Setup CD-ROM. ■ Windows Ultimate Extras and PowerToys for XP—Accessories that can be downloaded for free from microsoft.com. The PowerToys include TweakUI, a program that lets you make adjustments to more Windows settings than you knew existed. ■ Resource Kits—A set of books published by Microsoft for some versions of Windows that includes a CD-ROM containing hundreds of utility programs. What you may not have known is that in some cases you can download the Resource Kit program toolkits with- out purchasing the books. ■ Subsystem for UNIX-Based Applications (SUA)—A package of network services and command-line tools that provide a nearly complete UNIX environment. It can be installed only on Windows Vista Ultimate and Enterprise, and Windows Server 2003.
    [Show full text]
  • 1. from XP to Vista
    17 1. From XP to Vista Microsoft, the creator of Windows, has published various versions of the Windows operating system over the past two decades. Windows Vista is the latest version, the successor to Windows XP. Many Windows XP users are wondering if they should switch to Windows Vista right away or wait for a while. This is a decision you must make on your own. To help you decide, the advantages and disadvantages of switching to Windows Vista are listed in this chapter. In case you do decide to trade in your trusted Windows XP for Windows Vista, you will have to make a lot of choices. For example, which edition of Vista are you going to use? Are you going to use your old computer, or will you buy a new one? Is your old computer capable of running Windows Vista? If that is the case, are you going to upgrade your Windows XP system to Vista, or will you start with a clean installation? These are all choices you have to make for yourself, but the information provided in the first part of this chapter will make that a lot easier. In the second part of this chapter you will read how you can perform an upgrade and a clean installation. Furthermore, you will see how you can use Windows Easy Transfer to secure your files and settings. With the special Easy Transfer cable you can transfer data between an XP and a Vista computer. In this chapter you will find information on the following subjects: the advantages of Windows Vista compared to Windows XP; the disadvantages of switching to Windows Vista; the different editions of Windows Vista; the system requirements; using Windows Vista Upgrade Advisor; upgrading Windows XP, a complete installation or a new computer; performing an upgrade from Windows XP to Windows Vista; downloading, installing and using Windows Easy Transfer; performing a complete installation on an empty or an XP computer; completing the installation; importing data into Vista using Windows Easy Transfer; using an Easy Transfer cable to transfer data; setting up a dial-up account.
    [Show full text]
  • Ursnif Malware Executive Summary on April 16, 2020, Fireeye Released a Report on the Top 10 Malware Affecting the Healthcare Industry in the First Quarter of 2020
    Health Sector Cybersecurity Coordination Center (HC3) Sector Note June 16, 2020 TLP: WHITE Report: 202006160800 Ursnif Malware Executive Summary On April 16, 2020, FireEye released a report on the Top 10 malware affecting the healthcare industry in the first quarter of 2020. Among the Top 10 malware identified was the malware family Ursnif (ranked number 2 with 30.2% of malware detections), which is a form of banking trojan and spyware. The malware has previously targeted entities in North America, Europe, and Asia and has undergone a number of development iterations following the leak of its source code in 2015. As a result, it is highly likely that this malware will continue to evolve and appear in a variety of campaigns targeting myriad industry verticals and geographies by indistinct threat actors. Report Ursnif (aka Gozi, Gozi-ISFB, Dreambot, Papras) is a modified modular banking malware with backdoor capabilities. The latest source code was leaked to GitHub in February 2015 and its capabilities include intercepting and modifying browser traffic (i.e. web injects), file download and upload, establishing a SOCKS proxy, system restart and shutdown, system information gathering, and a domain generation algorithm (DGA). The malware can also steal data and credentials from popular email and FTP clients and browsers as well as capture keystrokes, screenshots, and clipboard data. While it is considered a banking Trojan by many security researchers, the Ursnif malware family is also considered spyware given its information gathering capabilities. The malware is also capable of file infection. Since the 2015 source code leak, Ursnif has been continuously distributed and the code has been routinely modified and updated.
    [Show full text]