Windows 8 - Deepest Level of Secure

If every computer had antivirus software running, life would be tough for bot herders and cyber crooks.
Windows 8 will put the squeeze on those creeps. It has antivirus protection built right in, enabled by default if no other antivirus is present.
Windows 8

But the new security features at the very deepest level may be even more significant.

So far, COM file programs for the original MS-DOS were laughably insecure by modern standards.
Early file-infector viruses simply appended their own code to the program's end and replaced the very first instruction with a jump to that code.

The EXE file format, still in use today, isn't quite as open to manipulation. It does distinguish between memory areas used for code and those used for data. Windows XP SP2 introduced Data Execution Protection, which ensures that a memory area marked as data will never be executed

Even with these enhancements, malware writers managed to craft attacks that could inject arbitrary code into trusted processes. Address Space Layout Randomization (ASLR), introduced with Windows Vista, made those attacks tougher by making it impossible for an attacker to predict where in memory a given code module would load.

Statement Given by Valasek and Mandt
"Windows 8 isn't totally hack-proof But Not as long as humans are writing the code"

Windows 8 Toughens Up

Despite all these protective features, malware attacks can still succeed in Windows 7. Windows 8 will block many such attacks by toughening up at the very deepest level—memory allocation. Many low-level memory functions have new safeguards in Windows 8.

source (pc mag) | credit (think digit)

Stay tuned For More Updates

Email Newsletter

Subscribe our daily newsletter us for Free Updates

Blogger widgets

0 comments:

Post a Comment

1.Your feedback is appreciated .we will try to respond as soon as possible .
2.While commenting make sure you click "subscribe by mail ", so that you will be notified follow up replies
3.Please don't spam ,dont use keyword in the name section, don't drop the links for the sake of backlinks and other purpose ( Comments will not be published and deleted)
4.Make sure you check the previous comments , before asking any any queries . you may get the solition in the comments itself.
5.Comments should be related to the topic .
if above all not followed the user may result in ban :(

    Contributors

    Powered By Blogger

    About Explore IT

    Explore IT is a Technology blog , In simple Words
    " One Stop For the Latest Updates "
    Mobile Phone,Smartphone,Tablets,PC,Laptop,Games,
    Software,Hardware,Blog .

    Any One Can Share and Explore their Knowledge to the unknown.
    (Read our Privacy policy and Guest Post Terms)

    Follow Us Via Facebook and Twitter

    Total Pageviews

    Followers