The first thing users see when logging in Service Pack 2, the new and improved Windows ® XP operating system, a new Security Center to inform them of the status of essential security functions like firewall, antivirus updates and automatic updates. The following is a brief look at the major security improvements are within XP SP2.
Network protection:
Microsoft has changed the name server Internet Connection Firewall Windows Firewall before. The newly appointed firewall is enabled by default, with the ports closed except when in use, an improved user interface for setup, application compatibility and improved management through Group Policy settings that allow separate policies defined for the configuration of the firewall. Input Connections can be restricted according to their origin, and the Remote Procedure Call (RPC) vulnerability is significantly reduced through the insistence of SP2 secure RPC connections. DCOM also has additional restrictions on access control to protect against network attacks.
Memory protection:
Some attacks exploit vulnerabilities that allow too much data to be copied in the areas of computer memory (buffer overflow). To mitigate this vulnerability, the core Windows components have been recompiled with protection against buffer overflows. Microsoft has also partnered with Intel and AMD to implement hardware-based protection against buffer overflow vulnerability.
Network protection:
Microsoft has changed the name server Internet Connection Firewall Windows Firewall before. The newly appointed firewall is enabled by default, with the ports closed except when in use, an improved user interface for setup, application compatibility and improved management through Group Policy settings that allow separate policies defined for the configuration of the firewall. Input Connections can be restricted according to their origin, and the Remote Procedure Call (RPC) vulnerability is significantly reduced through the insistence of SP2 secure RPC connections. DCOM also has additional restrictions on access control to protect against network attacks.
Memory protection:
Some attacks exploit vulnerabilities that allow too much data to be copied in the areas of computer memory (buffer overflow). To mitigate this vulnerability, the core Windows components have been recompiled with protection against buffer overflows. Microsoft has also partnered with Intel and AMD to implement hardware-based protection against buffer overflow vulnerability.
No comments:
Post a Comment