Introduce Something New for Security in Windows 7
What’s nice is that Windows 7 has improved upon several useful features for security of your machine. Like Windows Defender, Windows Firewall, User Account Control and simpler interfaces and new capabilities. Additionally, Windows 7 also has numerous under-the-hood improvements and security features for computers on large networks that are of interest primarily to software developers and information technology professionals—and hackers, who now have many additional challenges and obstacles to face. Today I will show you some of the most important security improvements of Windows 7.
Windows Biometric Service The Windows Biometric Service provides support for fingerprint biometric devices so that you can use a fingerprint reader to log on to your computer and to enter administrative credentials in response to UAC elevation prompts.
Data encryption BitLocker Drive Encryption (available only in Enterprise and Ultimate editions) encrypts entire hard drives—making the data they contain completely inaccessible to a thief who makes off with a computer. In Windows 7, BitLocker To Go can also be used to protect removable storage drives, such as portable hard drives and USB Flash Drives.
Windows Defender Windows Defender, an antispyware program, continuously monitors System Settings to prevent the installation of known spyware and to alert you to the presence of spyware-like activity. The new interface in the Windows 7 version has fewer confusing options—which is appropriate for a program that normally runs silently in the background.
User Account Control (UAC) UAC reduces the inherent danger of using an administrator account for everyday tasks by requesting your consent when an application needs to do something with systemwide effect. Furthermore, architectural changes wrought by UAC make it practical for most people to use a standard account for daily computing. In Windows 7, UAC is far less intrusive than in Windows Vista because fewer tasks trigger UAC prompts, and new configuration options make it easier to control UAC so that it doesn’t control you.
Internet Explorer Internet Explorer runs in Protected Mode, which lessens the likelihood of installing malicious code. Effectively, it runs isolated in a “sandbox” with reduced privileges, able to write data only in locked-down temporary folders unless you grant permission to act outside the protected area. Other security improvements to Internet Explorer include restrictions on ActiveX controls, a SmartScreen phishing filter, and InPrivate Filtering and InPrivate Browsing to prevent information about your browsing habits from being tracked.
Windows Firewall Windows Firewall is substantially changed from the version in Windows XP. As in Windows Vista, it is a two-way firewall, monitoring outbound traffic as well as inbound, and it fully supports Internet Protocol version 6 (IPv6). In Windows 7, Windows Firewall adds multiple access firewall profiles, a feature that provides appropriate protection for each connected network when you’re connected to more than one at a time—an increasingly common situation. With an advanced configuration console for Windows Firewall, administrators have granular control over firewall rules and other settings. You can choose what you like from the list above if you need. Actually…those I mentioned are just part of Windows 7, if you know more useful improvements, welcome to share your precious advices or ideas below.
If you also have some questions or you want to download the softwares I mentioned above, you can visit the original article from:
Newton360.com is the BEST and FREE Windows 7 tweaks website, Newton360.com also provide free Windows 7 wallpapers, themes and Windows 7 tips. Welcome to http://www.newton360.com to get more informatin, including Windows 7 tips, news, wallpapers and softwares…etc.
Learn more from Newton360.com
Clip 6/7 Speaker: Nguyen Anh Quynh (Researcher, Japan National Institute of Advanced Industrial Science and Technology) This talk presents eKimono, a new malware scanner for Virtual Machine (VM). By putting eKimono outside of the protected VM, we can fix, or raise the bar in other cases, the most significant flaws in the legacy anti-malware solutions. Advantages offered by our scanner include, but not limited to, the followings: firstly, eKimono is tamper-resistant against malware inside VM, even if the malware compromises the VMs kernel. Secondly, it is harder to be fooled, because eKimono does not rely on the services provided by VM. Last, but not least, our scanner is invisible from VM, so that malware inside never know that they are being monitored. The architecture and implementation of eKimono will be discussed in length. We will show how our scanner easily supports hypervisors like Xen, KVM and QEMU out-of-the-box. The talk will also demonstrate that it is trivial to support other types of VM, such as VMWare, thanks to its extremely flexible design. Technically, eKimono is a top component of a multiple framework architecture. The talk analyses all the layers and explains how we solve challenges in designing and implementing eKimono. The extended application of the below layers is also examined to prove that our frameworks are not just useful for eKimono, but can also be the base to create many new tools, such as such as live memory forensic and VM administration …
Video Rating: 0 / 5