Sunday, February 11, 2007

Windows Vista: Dissected: Part 3 Software Update for Compatibility

The Application Compatibility Update :
SUMMARY
The Windows Vista Application Compatibility Update is a package of software updates that address common application compatibility issues in Windows Vista. When you try to install and run certain legacy games or applications in Windows Vista, you may experience one or more of the following symptoms:• The game or application may not be installed correctly.
• The game or application may cause system instability.
• The primary functions of the game or application may not work correctly.
This update improves support in Windows Vista for the following applications:• IBM Rescue and Recovery with Rapid Restore 3.00
• Rosetta Stone 2.1.3
• MS Encarta Standard 2007
• Family Feud Online
• Crystal Player Professional 1.97
• Photoshop 7.0.1
• Total Commander 6.55
• Sony FeliCa Port (PaSoRi) 3.0.0.0
• Label Mighty 6
• AVG Anti-Spyware 7.5.0.47
• Lego Star Wars
• HD Tach 3
• Adobe Photoshop Elements Version 4.0
• Digital Zenkoku Map Townpage Database 7
• Auslogics Disk 1.0.3
• EasyRecovery Professional Version 6.04
• Microsoft Money 2005
• Microsoft Money 2006
• SmartInstall 2.16
• Adobe Create Suite CS2
• Jv16 Power Tools
• SG TCP Optimizer 2.0.3
• Cyber link Power Cinema 4.0
• Google desktop 4.2006.1008
• Roxio Easy Media Creator 7.5
• Premiere Elements 3
• Battlefield 2 Deluxe
• Opera 9.02
• Palm Desktop 6.0
• Digital Image Suite 2006
• Flight Simulator X
• SmartSuite Millennium Edition - Freelance Graphics 9.8
• LimeWire 4.12
• Point 5.3
• BitVise Tunnelier 4.20
• Java Control Panel
• ACDSee 8
• Azureus 1.0
• HD Tune 2.5.1
• BeatJam 2006 SE
• ICHITARO 2006
• Adobe Photoshop CS 8.0
• Arcsoft Photo Impression 5
• J2SE Runtime Environment 5.0 Update 9
• AOL 9.0 - x64
• DevStudio 9.0
• The Weather Channel Desktop 5.0.1
• Absolute Poker Version 5.7
• BitLord 1.1.5.6
• RealPlayer 6.0.12.1700
• Speedfan 4.31
• Delphi 7 Professional
• TweakNow PowerPack 2006
• Office 2003 Web Folders
• Outlook 2003
• Ulead DVD MovieFactory 5 Plus
• Virtual CD 8
• Fireworks MX2004 7.0.2.295
• Doranet Kids Nyugaku Jyunbi Taikenban
• Doranet Shogaku Ichinensei Taikenban
• Minna de TV Denwa Starter
• Power Utility - Remote administration 3.1.0.0
• MotionDV STUDIO 5.8J for FUJITSU
• OmniPass 1.0.0.1
• Minna de TV Phone Starter 2.1.0.1
• ColdFusion MX 7 Enterprise Edition
• Age of Empires III
• Age of Empires III : The WarChiefs Expansion Pack
• Zoo Tycoon 2
• Zoo Tycoon 2: African Adventure Expansion Pack
• Zoo Tycoon 2: Endangered Species Expansion Pack
• Zoo Tycoon 2: Marine Mania Expansion Pack
• Zoo Tycoon 2: Zookeeper Collection Expansion Pack
• Rise of Nations: Rise of Legends
• Fable: The Lost Chapters
• Dungeon Siege II
• Dungeon Siege: Legends of Aranna



tags: , ,

Windows Vista: Dissected: Part 2 UAC

Let's go into a bit of history of Windows.
is finally moving towards a security model that competing operating systems such as and Linux have utilized for years. As usual, Microsoft is a late comer. Since Microsoft has a virtual monopoly on the world's desktop, Microsoft will prevail in the mission of securing Windows Vista. Microsoft will expend more resources than Apple, and Linux combined to catch up and out do Linux, and OS X. Now off my rant, and back to the regular scheduled portion of the program. Administrators will now run majority of the applications with Standard User Privileges. The restricted privileges gives hackers a much smaller footprint for attack. This ensures more overall . The main new feature in this category is called (previously known as User Account Protection and Limited User Account).

User Account Control is necessary because the previous versions of Windows was way too lax concerning user accounts. It was took easy to configure any user account with administrator privileges. This allowed for an open and undefended system for hacker and virus attacks. Therefore, most Windows applications written assumed that users had administrator account privileges. This creates a problem of an open system, where the user has access to everything - I mean EVERYTHING - on the computer. When the system is compromise by worm, Trojan, virus, or other form of malware, that malicious code then runs with administrator privileges as well. That's how PCs get "owned."; everything in the OS is fair game.

Security Minded individuals initially attempted to improve the previous Windows security model. Due to the poor design, these security minded individual realized the entire model needed to be rearchitected. One of the main components in this new security model is the UAC.

Below are the various features and benefits:

Standard User Privileges
In Windows Vista, Standard user accounts have additional privileges to perform common tasks which will not require helpdesk assistance. The tasks can be completed on your schedule, and not the schedule of the helpdesk. The privileges have been determine to have minimal system impact, and potential to a compromised system. The administrators still have the option of restricting the privileges. The new permissions for standard user accounts in Windows Vista include:

* View system clock and calendar
* Change time zone
* Install Wired Equivalent Privacy (WEP) to connect to secure wireless networks
* Change power management settings
* Add printers and other devices that have the required drivers installed on computer or have been allowed by an IT administrator in Group Policy
* Install ActiveX Controls from sites approved by an IT administrator
* Create and configure a Virtual Private Network connection
* Install critical Windows Updates

Additionally, disk defragmentation is now an automatically scheduled process in Windows Vista, so users will not have a need to initiate that action.

An excellent example is users able to change time. In previous versions of Windows only administrators had privileges to change time. The current Windows Vista reduces this uncertainty by using a shield icon throughout the operating system to identify commands that require administrator privileges.


Figure 1: The shield icon notifies users that they cannot perform the Change Date and Time operation.



tags: , , , ,