Sample Content from Windows Vista Resource

Total Page:16

File Type:pdf, Size:1020Kb

Sample Content from Windows Vista Resource Windows Vista™ Resource Kit Mitch Tulloch, Tony Northrup, Jerry Honeycutt with the MSWinVista Team To learn more about this book, visit Microsoft Learning at http://www.microsoft.com/MSPress/books/9536.aspx 9780735622838 Publication Date: April 2007 Table of Contents Acknowledgments . xxvii System Requirements . xxix Introduction . xxxi Part I Overview 1 Overview of Windows Vista Improvements . 3 What’s New . 3 User Interactions . 5 Performance . 13 Mobility . 16 Tablet PC . 20 Deployment . 22 Reliability and Supportability . 23 Troubleshooting . 28 Architecture Improvements . 30 Windows Vista Editions . 32 Windows Vista Starter . 34 Windows Vista Home Basic . 35 Windows Vista Home Premium . 35 Windows Vista Business . 35 Windows Vista Enterprise . 36 Windows Vista Ultimate . 36 Choosing Hardware . 37 Windows Vista Logos . 37 Hardware Requirements . 38 Summary . 38 Additional Resources . 39 2 Security in Windows Vista . 41 Addressing Specific Security Concerns with Windows Vista . 41 Wireless Networks . 42 Help Desk Calls Related to Malware . 42 Data Theft . 47 New and Improved Windows Vista Security Features . 50 User Account Control (UAC) . 50 Windows Defender . 54 Windows Firewall . 55 What do you think of this book? We want to hear from you! Microsoft is interested in hearing your feedback so we can continually improve our books and learning resources for you. To participate in a brief online survey, please visit: www.microsoft.com/learning/booksurvey/ v vi Table of Contents Internet Explorer Security Features . 58 BitLocker . 60 Encrypting File System (EFS) . 63 Auditing Enhancements . 64 Smart Card Improvements . 65 Credential Manager Enhancements . 66 Architectural and Internal Windows Vista Security Improvements . 66 Code Integrity (CI) . 67 Windows Resource Protection (WRP) . 68 Kernel Patch Protection . 70 Required Driver Signing . 71 Windows Service Hardening . 71 Authorization Manager . 73 Network Access Protection Client . 74 Web Services for Management . 74 Crypto Next Generation (CNG) Services . 74 Data Execution Prevention (DEP) . 75 Address Space Layout Randomization (ASLR) . 76 New Logon Architecture . 76 Rights Management Services (RMS) . 77 Multiple Local Group Policy Objects . 78 Summary . 78 Additional Resources . 79 Part II Deployment 3 Deployment Platform . 83 Tools Introduction . 83 Windows Vista Deployment Terminology . 85 Platform Components . 87 Windows Imaging . 88 Answer Files . ..
Recommended publications
  • Microsoft Patches Were Evaluated up to and Including CVE-2020-1587
    Honeywell Commercial Security 2700 Blankenbaker Pkwy, Suite 150 Louisville, KY 40299 Phone: 1-502-297-5700 Phone: 1-800-323-4576 Fax: 1-502-666-7021 https://www.security.honeywell.com The purpose of this document is to identify the patches that have been delivered by Microsoft® which have been tested against Pro-Watch. All the below listed patches have been tested against the current shipping version of Pro-Watch with no adverse effects being observed. Microsoft Patches were evaluated up to and including CVE-2020-1587. Patches not listed below are not applicable to a Pro-Watch system. 2020 – Microsoft® Patches Tested with Pro-Watch CVE-2020-1587 Windows Ancillary Function Driver for WinSock Elevation of Privilege Vulnerability CVE-2020-1584 Windows dnsrslvr.dll Elevation of Privilege Vulnerability CVE-2020-1579 Windows Function Discovery SSDP Provider Elevation of Privilege Vulnerability CVE-2020-1578 Windows Kernel Information Disclosure Vulnerability CVE-2020-1577 DirectWrite Information Disclosure Vulnerability CVE-2020-1570 Scripting Engine Memory Corruption Vulnerability CVE-2020-1569 Microsoft Edge Memory Corruption Vulnerability CVE-2020-1568 Microsoft Edge PDF Remote Code Execution Vulnerability CVE-2020-1567 MSHTML Engine Remote Code Execution Vulnerability CVE-2020-1566 Windows Kernel Elevation of Privilege Vulnerability CVE-2020-1565 Windows Elevation of Privilege Vulnerability CVE-2020-1564 Jet Database Engine Remote Code Execution Vulnerability CVE-2020-1562 Microsoft Graphics Components Remote Code Execution Vulnerability
    [Show full text]
  • Compare Tools Pro Report for Virtual Class
    Compare Tools Pro Report for Virtual Class www.spsp.ir Products included in this report: • Citrix GoToMeeting 7.6 • ClickMeeting • WebEx Meetings Premium • Adobe Connect 9.3 • AnyMeeting Pro • ReadyTalk Web Meeting • omNovia Web Conference • Microsoft Lync Online • iLinc for meetings • AT&T Connect 9.5 • Microsoft Office Live Meeting* • Microsoft NetMeeting* COMPARE TOOLS PRO REPORT LEGAL NOTICE © 2016 Publicare Marketing Communications GmbH ("Publicare"). All Rights Reserved. Nature of the information provided in this document The analyses and statements provided in this document are statements of opinion as of the date indicated on the website, and are not statements of fact. The analyses and statements are not recommendations to purchase or use any specific product, or to make any investment decisions. Publicare assumes no obligation to update the content following its publication in any form or format. The content provided herein is not a substitute for the customer's own skill, judgment and experience when evaluating potentially suitable web conferencing tools. Before purchasing or using any specific tool customer shall always thoroughly test a trial version of this tool, and shall seek independent information on its capabilities and limitations from the tool's producer or distributor. Limited license Customer's right to use the content provided herein is limited to customer's internal use to evaluate web conferencing tools that might be suitable for customer's own use. Any use for the purposes of third parties, any transfer of the provided content to third parties, as well as any publication or making available thereof are not permitted. This limited right to use may neither be transferred nor sub-licensed by customer to any third party.
    [Show full text]
  • Installing Microsoft Windows Vista on Selected HP Products
    Installing Microsoft Windows Vista on Selected HP Products Introduction......................................................................................................................................... 2 List of Tested Systems ........................................................................................................................... 2 Install Guide........................................................................................................................................ 3 Operating System Requirements for Upgrade ...................................................................................... 3 Minimum Requirements ................................................................................................................. 3 Recommended ............................................................................................................................. 3 Recommended Install Order .............................................................................................................. 3 Check and Upgrade BIOS............................................................................................................. 3 Update Drivers and Utilities ........................................................................................................... 4 Check for Application Compatibility ............................................................................................... 4 Additional Information.........................................................................................................................
    [Show full text]
  • Windows 10: Considered Harmful
    Windows 10: Considered Harmful 26 August, 2016 Last Updated: 25 September 2016 Previously I made a series of articles against Windows 10, consisting of basic explanation, open letters, and even a long-winded chance.org petition. However, I have come to realize that these various things could be better as one page rather than fragments across my website. On this page I hope to explain why the Windows 10 system is evil and also include why Windows as a whole is Considered Harmful . Sources to unreferenced items in this article can be found in the various resource links on the bottom of the page. Information can also be found in the photographs shown and with a simple web search. The primary reason against the Windows 10 system is an obvious one. The system is designed to be a system that data-mines the user. This is proven time and time again. Using a tool such as wireshark, one can clearly see that it makes encrypted connections to a variety of Microsoft servers. This uses a very weak RSA encryption that can be broken in under a minute. When a user successfully decrypted the encrypted data, he simply converted the decrypted ``.bin'' extension to ``.png'' and opened them. The image files were screen- shots of him installing the RSA decryptor tool. This was in a VM and was a fresh install. In addition to this, another user in Australia also monitored the odd connection but did not decrypt it. He noticed this when he opened a photograph in the Windows Photo App.
    [Show full text]
  • BASS Application Sharing System
    BASS Application Sharing System Omer Boyaci and Henning Schulzrinne Department of Computer Science, Columbia University fboyaci,[email protected] 1 Introduction Application and desktop sharing allows two or more people to col- laborate on a single document, drawing or project in real-time. We have developed an application and desktop sharing platform called BASS which is efficient, reliable and independent of the operating system. It scales well via heterogenous multicast, sup- ports all applications, and features true application sharing. Any application can be shared, including word processors, browsers, Powerpoint or video players. Also, the participants do not need to install the application. BASS is based on a client-server architec- ture. The server is the computer which runs the shared application. Clients receive screen updates from the server and send keyboard and mouse events to the server. Figure 2: BASS Figure 3: UVNC formation from other non-shared applications. Shared application may open new child windows such as those for selecting options or fonts. UltraVNC and MAST failed to share child windows. A true application sharing system must blank all the non-shared windows and must transfer all the child windows of the shared application. Figure 1: Desktop with overlapping windows Figure 4: Mast client view Application sharing differs from desktop sharing. In desktop For example, if a user wants to share only the “Internet Ex- sharing, a server distributes any screen update. In application shar- plorer” application, which has the title “Windows Live Hotmail - ing, the server distributes screen updates if and only if they belong Windows Internet Explorer”, from the desktop seen in (Figure 1), to the shared application’s windows.
    [Show full text]
  • BASS Application Sharing System∗
    BASS Application Sharing System∗ Omer Boyaci and Henning Schulzrinne Department of Computer Science Columbia University fboyaci,[email protected] Abstract nature makes it less efficient as compared to the application- specific model in certain scenarios. We have developed an Application and desktop sharing allows sharing of any application and desktop sharing system, BASS, based on application with one or more people over the Internet. The the generic model. participants receive the screen-view of the shared applica- Application sharing differs from desktop sharing. In tion from the server. Their mouse and keyboard events are desktop sharing, a server distributes any screen update. In delivered and regenerated at the server. Application and application sharing, the server distributes screen updates if desktop sharing enables collaborative work, software tu- and only if they belong to the shared application’s windows. toring, and e-learning over the Internet. We have devel- The main challenges of application and desktop sharing oped an application and desktop sharing platform called are scalability, reliability, true application sharing, operat- BASS which is efficient, reliable, independent of the operat- ing system independence, and performance. BASS scales ing system, scales well via heterogenous multicast, supports quite well via reliable multicast as discussed in Section 6.6. all applications, and features true application sharing. The sharing system should be efficient in the sense that it should transmit only the changed parts of the screen, and it should not consume all the bandwidth and CPU resources 1. Introduction while doing this. BASS uses the most efficient technique, a mirror driver, to detect changed regions of the screen.
    [Show full text]
  • 1. from XP to Vista
    17 1. From XP to Vista Microsoft, the creator of Windows, has published various versions of the Windows operating system over the past two decades. Windows Vista is the latest version, the successor to Windows XP. Many Windows XP users are wondering if they should switch to Windows Vista right away or wait for a while. This is a decision you must make on your own. To help you decide, the advantages and disadvantages of switching to Windows Vista are listed in this chapter. In case you do decide to trade in your trusted Windows XP for Windows Vista, you will have to make a lot of choices. For example, which edition of Vista are you going to use? Are you going to use your old computer, or will you buy a new one? Is your old computer capable of running Windows Vista? If that is the case, are you going to upgrade your Windows XP system to Vista, or will you start with a clean installation? These are all choices you have to make for yourself, but the information provided in the first part of this chapter will make that a lot easier. In the second part of this chapter you will read how you can perform an upgrade and a clean installation. Furthermore, you will see how you can use Windows Easy Transfer to secure your files and settings. With the special Easy Transfer cable you can transfer data between an XP and a Vista computer. In this chapter you will find information on the following subjects: the advantages of Windows Vista compared to Windows XP; the disadvantages of switching to Windows Vista; the different editions of Windows Vista; the system requirements; using Windows Vista Upgrade Advisor; upgrading Windows XP, a complete installation or a new computer; performing an upgrade from Windows XP to Windows Vista; downloading, installing and using Windows Easy Transfer; performing a complete installation on an empty or an XP computer; completing the installation; importing data into Vista using Windows Easy Transfer; using an Easy Transfer cable to transfer data; setting up a dial-up account.
    [Show full text]
  • Copyrighted Material
    02_046401 ftoc.qxp 3/12/07 10:57 PM Page vii Contents Acknowledgments . xxiii Introduction . xxiv Part I: Beginner’s Crash Course 1 Chapter 1: Getting Started . 3 Getting to Know Your Computer’s Hardware. 3 Using Your Mouse or Touchpad. 5 Using Your Keyboard. 6 Typing Those key1 + key2 Things . 8 Getting to Know Your Computer’s Software . 9 What Is Windows Vista? . 9 Why Learn Windows Vista? . 9 Starting Windows Vista . 10 The Windows Desktop . 13 The Taskbar . 15 The Notification Area . 17 Using Icons. 17 Working Common Controls . 19 Using Scroll Bars . 20 Hiding and Showing Details . 21 Using Dragging Handles . 22 About Disabled (Dimmed) Controls . 23 The Right Way to Turn Off Your Computer . 24 Summary . 25 Chapter 2: Workin’ It. 27 Understanding Objects and Properties . 27 Introducing Control Panel . 28 COPYRIGHTEDControl Panel Home View and ClassicMATERIAL View . 30 Using Dialog Boxes . 31 Using Tabs . 33 Using Option Buttons. 34 Using Check Boxes . 34 Using Spin Boxes . 35 02_046401 ftoc.qxp 3/12/07 10:57 PM Page viii viii Contents Using Drop-Down Lists . 35 Using List Boxes. 36 Using Sliders. 38 Getting Help in Dialog Boxes. 39 Using Buttons . 40 What’s the Default? . 41 Typing Text and Passwords . 41 Changing Text in a Text Box . 42 Changing Chunks of Text . 42 Combo Boxes and AutoComplete . 44 Typing Passwords. 44 Summary . 45 Chapter 3: Getting Help When You Need It. 47 Using Help and Support . 47 Searching for Specific Information . 51 Getting Around in Help and Support . 53 Troubleshooting. 54 Getting Guided Help. 54 Windows Vista Maintenance Help.
    [Show full text]
  • Acronis True Image Workstation 9
    User’s Guide Acronis® True Image 9.1 Workstation Copyright © Acronis, Inc., 2000-2007. All rights reserved. “Acronis”, "Acronis Compute with Confidence", “Acronis Snap Restore”, “Acronis Recovery Manager, “Acronis Secure Zone” and the Acronis logo are trademarks of Acronis, Inc. Linux is a registered trademark of Linus Torvalds. Windows and MS-DOS are registered trademarks of Microsoft Corporation. All other trademarks and copyrights referred to are the property of their respective owners. Distribution of substantively modified versions of this document is prohibited without the explicit permission of the copyright holder. Distribution of this work or derivative work in any standard (paper) book form for commercial purposes is prohibited unless prior permission is obtained from the copyright holder. DOCUMENTATION IS PROVIDED «AS IS» AND ALL EXPRESS OR IMPLIED CONDITIONS, REPRESENTATIONS AND WARRANTIES, INCLUDING ANY IMPLIED WARRANTY OF MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE OR NON-INFRINGEMENT, ARE DISCLAIMED, EXCEPT TO THE EXTENT THAT SUCH DISCLAIMERS ARE HELD TO BE LEGALLY INVALID. 2 Copyright © Acronis, Inc., 2000-2007 END-USER LICENSE AGREEMENT BY ACCEPTING, YOU (ORIGINAL PURCHASER) INDICATE YOUR ACCEPTANCE OF THESE TERMS. IF YOU DO NOT WISH TO ACCEPT THE PRODUCT UNDER THESE TERMS, YOU CAN CHOOSE NOT TO ACCEPT BY SELECTING "I decline..." AND NOT INSTALLING THE SOFTWARE. Acronis® True Image Workstation (the Software) is Copyright © Acronis, Inc., 2000-2007. All rights are reserved. The ORIGINAL PURCHASER is granted a LICENSE to use the software only, subject to the following restrictions and limitations. 1. The license is to the original purchaser only, and is not transferable without prior written permission from Acronis.
    [Show full text]
  • Desktop Streamer Using Pandaboard Over WLAN 1Rahul Konapure, 2A
    IJCST VOL . 3, Iss UE 1, JAN . - MAR C H 2012 ISSN : 0976-8491 (Online) | ISSN : 2229-4333 (Print) Desktop Streamer using Pandaboard over WLAN 1Rahul Konapure, 2A. S. Gundale 1,2 Dept. of Electronics, Walchand Institute of Technology, Sholapur, Maharashtra, India Abstract Section IV, where as the details of the PDS protocol is discusses The rise of mobile communications and the Internet has stemmed a in Section V. Client and server architectures are explained in need to optimize streamed video solutions, especially those of high Sections VI and VII, respectively. Section VIII, gives information bit rates; for example, HD video, multi-user conferences, cellular about the performance of the system in terms of bandwidth and video calls, Skype, etc in a bandwidth-restricted environment, processing power requirements and finally Section 9 summarizes optimum video delivery is a demanding but a technically our work. challenging issue. Exploiting the trade-off between the image- quality and the frame-rate in adapting to varying channel bandwidth II. Background is an attractive solution. From this need, many multimedia codecs OS S AS RC have been developed to compress, encode and then decode the Window streamed video data for efficient propagation through various - - + + Netmeeting Space mediums. This paper aims to synchronize Desktop environment Leopard Screen running on one panda board with another panda board over Wi- - - - + Fi. The project involves segmentation of the desktop using the sharing effective algorithm and segmented information is structured in VNC + - - + custom format. The output of the algorithm is then encoded with PDS + + + + the help of efficient encoding method to minimize the need of Desktop Streaming (DS) allows sharing an application with remote network resources.
    [Show full text]
  • For the Workplace. 10 Ways Your Business Can Accomplish More
    More for the workplace. 10 ways your business can accomplish more. 1. Your data safety net. 6. Protect your inbox, your data and your Easily schedule automatic back-ups of documents, peace of mind. files and even entire hard disks With Microsoft® Improved junk-mail filters in Office Outlook 2007 and Windows® Backup and Restore. Recover lost files new anti-phishing technologies minimise junk mail more easily with new Windows Vista™ Shadow Copy and potentially harmful email messages. Windows and improved Microsoft Office Document Recovery. Defender* provides built-in tools for detecting and removing spyware. 2. Organise it your way. Enhancements to Windows Vista Explorer let you 7. Stop searching. Find. use file properties to intuitively sort, organise Instant Search in Windows Vista and Office Outlook and view your files - including work created in 2007 helps you quickly find what you’re looking for Microsoft Office. Use the new Microsoft Office – documents, media, programs, email messages and more Outlook® 2007 To-Do Bar to see your daily tasks - on your PC, in your email and across your network. and appointments in an integrated view, so you can quickly check your priorities. 8. Work virtually anywhere. Windows Meeting Space lets you easily share files 3. New ways to see and do your work. directly from your PC to other Windows Vista PCs over Innovative navigational tools in Windows Aero™* one-time, wireless or peer-to-peer networks. Windows make it easier to get to recently used documents Vista Remote Desktop Connection allows you access to and programs. The new Microsoft Office Ribbon files on your office PC from another computer.
    [Show full text]
  • Microsoft Windows Vista: Visual Quickstart Guide (ISBN 0
    Ch06 Vista (251-284) 12/05/2006 12:24 PM Page 251 Installing and Running 6 Programs Windows, like all operating systems, is a launching pad for programs, or applications. and Running Programs Installing More programs from more software firms are available for Windows than for any other OS. Fortunately, Microsoft and sound design enforce substantial consistency, so you can apply knowledge of a few common operations to many programs. Most programs share user- interface elements—scroll bars, copy-and-paste functions, menus, buttons, and so on—as well as setup and management options. In this chapter, you’ll learn how to install, remove, launch, and manage Windows pro- grams. You’ll also learn about documents, which are self-contained pieces of work (files) that you create with programs. 251 Ch06 Vista (251-284) 12/05/2006 12:24 PM Page 252 Chapter 6 Installing Programs How you install a program depends on where its installation files are located. Most shrink-wrapped programs are installed from a CD or DVD. Windows’s AutoPlay feature runs the Setup program automatically when you insert the disc into the drive. You also can install programs from the internet or from a network. To install a program from CD or DVD: 1. Insert the program’s installation or setup disc. Figure 6.1 When you insert a program’s disc, the If a security prompt appears, type an AutoPlay dialog box opens; click the option that runs administrator password or confirm Setup. You may see a vague or puzzling message when you try to install older programs made for the action.
    [Show full text]