SlideShare a Scribd company logo
1 of 9
The Death of Windows XP
End of the line for venerable operating system
Dr. Jan Vanderpool
Email-vanderj@wlac.edu
Microsoft History
Operating System Defined
the software that supports a computer's basic functions, such
as scheduling tasks, executing applications, and controlling
peripherals.
Common Operating Systems
•Microsoft Windows
Windows XP
Windows Vista
Windows 7
Windows 8
•Apple OS
•Linux
The coming stormData thieves and hackers; barbarians at the gate
Microsoft Security Intelligence Report
The Microsoft Security Intelligence Report
(SIR) analyzes the threat landscape of
exploits, vulnerabilities, and malware
using data from Internet services and
over 600 million computers worldwide.
SIR
Security Terms
•Vulnerabilities
are weaknesses in software that enable an
attacker to compromise the integrity,
availability, or confidentiality of the software or
the data that it processes.
•Exploits
An exploit is malicious code that takes
advantage of software vulnerabilities to infect,
disrupt, or take control of a computer without
the user’s consent and typically without their
knowledge. Exploits target vulnerabilities in
operating systems, web browsers, applications,
or software components that are installed on
the computer
Microsoft Windows Fact Sheet
•End of Sales
•The date when a particular version of Windows is no
longer available to retailers or Original Equipment
Manufacturers
•End of Support
•Refers to the date when Microsoft no longer provides
automatic fixes, updates, or online technical assistance.
Fact Sheet
Windows XP Extended Support
Windows XP
Microsoft officially ends all technical
support for Windows XP on April 8th
2014.
There are 45 million lines of code that
comprise Windows XP and each line
may contain a potential security breach
point.
Options
Option 1-Do nothing
If you continue to use Windows XP after support ends, your
computer will still work but it might become more
vulnerable to security risks and viruses. Also, as more
software and hardware manufacturers continue to optimize
for more recent versions of Windows, you can expect to
encounter greater numbers of apps and devices that do not
work with Windows XP
Option 2-Upgrade your operating system
Very few older computers will be able to run Windows 8.1,
which is the latest version of Windows. We recommend that
you download and run the Windows Upgrade Assistant to
check if your PC meets the system requirements for
Windows 8.1 and then follow the steps in the tutorial to
upgrade if your PC is able. For more detailed information,
read the FAQ
Options
Option 3-Purchase a new computer
Things to consider
•Desktop, Laptop or Tablet
•Microsoft , Apple or Android
•64 bit or 32 bit O/S
•Touch screen
•RAM
•Hard disk
•Applications

More Related Content

What's hot

Computer viruses
Computer virusesComputer viruses
Computer virusesBilliyan
 
ATEA IT EXPO: Hit by ransomware - again
ATEA IT EXPO: Hit by ransomware - againATEA IT EXPO: Hit by ransomware - again
ATEA IT EXPO: Hit by ransomware - againJesper Nielsen
 
Virus and Antivirus Protect your Computer system
Virus and Antivirus Protect your Computer systemVirus and Antivirus Protect your Computer system
Virus and Antivirus Protect your Computer systemLee Ray
 
Virus and Anti Virus - Types of Virus and Anti Virus
Virus and Anti Virus - Types of Virus and Anti VirusVirus and Anti Virus - Types of Virus and Anti Virus
Virus and Anti Virus - Types of Virus and Anti VirusAdeel Rasheed
 
Rajul computer presentation
Rajul computer presentationRajul computer presentation
Rajul computer presentationNeetu Jain
 
computer viruses power point presentation
computer viruses power point presentationcomputer viruses power point presentation
computer viruses power point presentationRohit Kashyap
 

What's hot (17)

Presentation1
Presentation1Presentation1
Presentation1
 
Computer viruses
Computer virusesComputer viruses
Computer viruses
 
Computer virus
 Computer virus Computer virus
Computer virus
 
Antivirus software
Antivirus softwareAntivirus software
Antivirus software
 
Computer viruses
Computer virusesComputer viruses
Computer viruses
 
Virus and antivirus
Virus and antivirus Virus and antivirus
Virus and antivirus
 
ATEA IT EXPO: Hit by ransomware - again
ATEA IT EXPO: Hit by ransomware - againATEA IT EXPO: Hit by ransomware - again
ATEA IT EXPO: Hit by ransomware - again
 
Computer virus
Computer virusComputer virus
Computer virus
 
Virus and antivirus
Virus and antivirusVirus and antivirus
Virus and antivirus
 
Powerpoint
PowerpointPowerpoint
Powerpoint
 
Virus and Antivirus Protect your Computer system
Virus and Antivirus Protect your Computer systemVirus and Antivirus Protect your Computer system
Virus and Antivirus Protect your Computer system
 
Virus and Anti Virus - Types of Virus and Anti Virus
Virus and Anti Virus - Types of Virus and Anti VirusVirus and Anti Virus - Types of Virus and Anti Virus
Virus and Anti Virus - Types of Virus and Anti Virus
 
Antivirus PPt
Antivirus PPtAntivirus PPt
Antivirus PPt
 
Computer virus
Computer virusComputer virus
Computer virus
 
Rajul computer presentation
Rajul computer presentationRajul computer presentation
Rajul computer presentation
 
Computer viruses
Computer virusesComputer viruses
Computer viruses
 
computer viruses power point presentation
computer viruses power point presentationcomputer viruses power point presentation
computer viruses power point presentation
 

Viewers also liked

Audio codes one voice for lync
Audio codes one voice for lyncAudio codes one voice for lync
Audio codes one voice for lyncJohn D'Annunzio
 
Hvordan være relevant i en alder dominert av digitale medier
Hvordan være relevant i en alder dominert av digitale medierHvordan være relevant i en alder dominert av digitale medier
Hvordan være relevant i en alder dominert av digitale medierNebojsha Mihajlovski
 
Desktop, laptop, tablet or smartphone
Desktop, laptop, tablet or smartphoneDesktop, laptop, tablet or smartphone
Desktop, laptop, tablet or smartphoneDr. Jan Vanderpool
 
IDM Hospitality Management Portfolio 2014
IDM Hospitality Management Portfolio 2014IDM Hospitality Management Portfolio 2014
IDM Hospitality Management Portfolio 2014Connie Barbian
 
Atc admin twihr_job_methods_150516
Atc admin twihr_job_methods_150516Atc admin twihr_job_methods_150516
Atc admin twihr_job_methods_150516Tom Albrecht
 
SHIFT Happens! BIG CHANGE AND WHAT TO DO ABOUT IT
SHIFT Happens! BIG CHANGE AND WHAT TO DO ABOUT ITSHIFT Happens! BIG CHANGE AND WHAT TO DO ABOUT IT
SHIFT Happens! BIG CHANGE AND WHAT TO DO ABOUT ITBarbara Shannon
 
New sport: the Washi-wall bounce
New sport: the Washi-wall bounceNew sport: the Washi-wall bounce
New sport: the Washi-wall bouncefanny2006
 
One Voice For Hosted Services
One Voice For Hosted ServicesOne Voice For Hosted Services
One Voice For Hosted ServicesJohn D'Annunzio
 
Introduzione all'informazione giuridica e banche dati
Introduzione all'informazione giuridica e banche datiIntroduzione all'informazione giuridica e banche dati
Introduzione all'informazione giuridica e banche datiEvelina Ceccato
 
AudioCodes Session Border Controller Update
AudioCodes Session Border Controller UpdateAudioCodes Session Border Controller Update
AudioCodes Session Border Controller UpdateJohn D'Annunzio
 
Strumenti per il recupero dell'informazione bibliografica e servizi della bib...
Strumenti per il recupero dell'informazione bibliografica e servizi della bib...Strumenti per il recupero dell'informazione bibliografica e servizi della bib...
Strumenti per il recupero dell'informazione bibliografica e servizi della bib...Evelina Ceccato
 
Desktop, laptop, tablet or smartphone
Desktop, laptop, tablet or smartphoneDesktop, laptop, tablet or smartphone
Desktop, laptop, tablet or smartphoneDr. Jan Vanderpool
 

Viewers also liked (15)

Audio codes one voice for lync
Audio codes one voice for lyncAudio codes one voice for lync
Audio codes one voice for lync
 
Hvordan være relevant i en alder dominert av digitale medier
Hvordan være relevant i en alder dominert av digitale medierHvordan være relevant i en alder dominert av digitale medier
Hvordan være relevant i en alder dominert av digitale medier
 
Desktop, laptop, tablet or smartphone
Desktop, laptop, tablet or smartphoneDesktop, laptop, tablet or smartphone
Desktop, laptop, tablet or smartphone
 
IDM Hospitality Management Portfolio 2014
IDM Hospitality Management Portfolio 2014IDM Hospitality Management Portfolio 2014
IDM Hospitality Management Portfolio 2014
 
IDM Portfolio 2014
IDM  Portfolio  2014IDM  Portfolio  2014
IDM Portfolio 2014
 
Atc admin twihr_job_methods_150516
Atc admin twihr_job_methods_150516Atc admin twihr_job_methods_150516
Atc admin twihr_job_methods_150516
 
SHIFT Happens! BIG CHANGE AND WHAT TO DO ABOUT IT
SHIFT Happens! BIG CHANGE AND WHAT TO DO ABOUT ITSHIFT Happens! BIG CHANGE AND WHAT TO DO ABOUT IT
SHIFT Happens! BIG CHANGE AND WHAT TO DO ABOUT IT
 
New sport: the Washi-wall bounce
New sport: the Washi-wall bounceNew sport: the Washi-wall bounce
New sport: the Washi-wall bounce
 
Libro empodera-org
Libro empodera-orgLibro empodera-org
Libro empodera-org
 
Branding og kommunikasjon
Branding og kommunikasjonBranding og kommunikasjon
Branding og kommunikasjon
 
One Voice For Hosted Services
One Voice For Hosted ServicesOne Voice For Hosted Services
One Voice For Hosted Services
 
Introduzione all'informazione giuridica e banche dati
Introduzione all'informazione giuridica e banche datiIntroduzione all'informazione giuridica e banche dati
Introduzione all'informazione giuridica e banche dati
 
AudioCodes Session Border Controller Update
AudioCodes Session Border Controller UpdateAudioCodes Session Border Controller Update
AudioCodes Session Border Controller Update
 
Strumenti per il recupero dell'informazione bibliografica e servizi della bib...
Strumenti per il recupero dell'informazione bibliografica e servizi della bib...Strumenti per il recupero dell'informazione bibliografica e servizi della bib...
Strumenti per il recupero dell'informazione bibliografica e servizi della bib...
 
Desktop, laptop, tablet or smartphone
Desktop, laptop, tablet or smartphoneDesktop, laptop, tablet or smartphone
Desktop, laptop, tablet or smartphone
 

Similar to Death of windows xp business

Windows Operating System
Windows Operating SystemWindows Operating System
Windows Operating SystemTarun Nayak
 
2010-03 Yesterday's Trusted Web Sites are Today's Malicious Servers
2010-03 Yesterday's Trusted Web Sites are Today's Malicious Servers2010-03 Yesterday's Trusted Web Sites are Today's Malicious Servers
2010-03 Yesterday's Trusted Web Sites are Today's Malicious ServersRaleigh ISSA
 
basicitknowledge-101119022655-phpapp02.ppt
basicitknowledge-101119022655-phpapp02.pptbasicitknowledge-101119022655-phpapp02.ppt
basicitknowledge-101119022655-phpapp02.pptPawachMetharattanara
 
Basic IT knowledge
Basic IT knowledgeBasic IT knowledge
Basic IT knowledgeTechsailor
 
Why microsoft ended windows xp
Why microsoft ended windows xpWhy microsoft ended windows xp
Why microsoft ended windows xpmayur6560
 
Windows 10 KKK
Windows 10 KKKWindows 10 KKK
Windows 10 KKKPrimend
 
Panda Security - Endpoint Protection
Panda Security - Endpoint ProtectionPanda Security - Endpoint Protection
Panda Security - Endpoint ProtectionPanda Security
 
Discussing Windows® XP End of Support with Management: 5 Key Factors
Discussing Windows® XP End of Support with Management: 5 Key FactorsDiscussing Windows® XP End of Support with Management: 5 Key Factors
Discussing Windows® XP End of Support with Management: 5 Key FactorsLenovo Business
 
Splunk app for_windows
Splunk app for_windowsSplunk app for_windows
Splunk app for_windowsGreg Hanchin
 
ICT-CONTACTSJDHJBQFFVEGVCGSVCHCHDCHDCVCKACH
ICT-CONTACTSJDHJBQFFVEGVCGSVCHCHDCHDCVCKACHICT-CONTACTSJDHJBQFFVEGVCGSVCHCHDCHDCVCKACH
ICT-CONTACTSJDHJBQFFVEGVCGSVCHCHDCHDCVCKACHJamaicaCabrales
 
features of windows7 & 8(trail)
features of windows7 & 8(trail)features of windows7 & 8(trail)
features of windows7 & 8(trail)ava & araf co.
 
Digital literacy 1 b operating systems
Digital literacy 1 b operating systemsDigital literacy 1 b operating systems
Digital literacy 1 b operating systemsmrspetty19
 

Similar to Death of windows xp business (20)

Windows Operating System
Windows Operating SystemWindows Operating System
Windows Operating System
 
2010-03 Yesterday's Trusted Web Sites are Today's Malicious Servers
2010-03 Yesterday's Trusted Web Sites are Today's Malicious Servers2010-03 Yesterday's Trusted Web Sites are Today's Malicious Servers
2010-03 Yesterday's Trusted Web Sites are Today's Malicious Servers
 
541networking
541networking541networking
541networking
 
541networking
541networking541networking
541networking
 
basicitknowledge-101119022655-phpapp02.ppt
basicitknowledge-101119022655-phpapp02.pptbasicitknowledge-101119022655-phpapp02.ppt
basicitknowledge-101119022655-phpapp02.ppt
 
Basic IT knowledge
Basic IT knowledgeBasic IT knowledge
Basic IT knowledge
 
Why microsoft ended windows xp
Why microsoft ended windows xpWhy microsoft ended windows xp
Why microsoft ended windows xp
 
Windows 10 KKK
Windows 10 KKKWindows 10 KKK
Windows 10 KKK
 
Panda Security - Endpoint Protection
Panda Security - Endpoint ProtectionPanda Security - Endpoint Protection
Panda Security - Endpoint Protection
 
Discussing Windows® XP End of Support with Management: 5 Key Factors
Discussing Windows® XP End of Support with Management: 5 Key FactorsDiscussing Windows® XP End of Support with Management: 5 Key Factors
Discussing Windows® XP End of Support with Management: 5 Key Factors
 
Os
OsOs
Os
 
Splunk app for_windows
Splunk app for_windowsSplunk app for_windows
Splunk app for_windows
 
windows 7
windows 7windows 7
windows 7
 
Windows Vista Security
Windows Vista SecurityWindows Vista Security
Windows Vista Security
 
Lecture10.pptx
Lecture10.pptxLecture10.pptx
Lecture10.pptx
 
ICT-CONTACTSJDHJBQFFVEGVCGSVCHCHDCHDCVCKACH
ICT-CONTACTSJDHJBQFFVEGVCGSVCHCHDCHDCVCKACHICT-CONTACTSJDHJBQFFVEGVCGSVCHCHDCHDCVCKACH
ICT-CONTACTSJDHJBQFFVEGVCGSVCHCHDCHDCVCKACH
 
K04 software
K04 softwareK04 software
K04 software
 
Computer viruses
Computer virusesComputer viruses
Computer viruses
 
features of windows7 & 8(trail)
features of windows7 & 8(trail)features of windows7 & 8(trail)
features of windows7 & 8(trail)
 
Digital literacy 1 b operating systems
Digital literacy 1 b operating systemsDigital literacy 1 b operating systems
Digital literacy 1 b operating systems
 

Death of windows xp business

  • 1. The Death of Windows XP End of the line for venerable operating system Dr. Jan Vanderpool Email-vanderj@wlac.edu
  • 2. Microsoft History Operating System Defined the software that supports a computer's basic functions, such as scheduling tasks, executing applications, and controlling peripherals. Common Operating Systems •Microsoft Windows Windows XP Windows Vista Windows 7 Windows 8 •Apple OS •Linux
  • 3. The coming stormData thieves and hackers; barbarians at the gate
  • 4. Microsoft Security Intelligence Report The Microsoft Security Intelligence Report (SIR) analyzes the threat landscape of exploits, vulnerabilities, and malware using data from Internet services and over 600 million computers worldwide. SIR
  • 5. Security Terms •Vulnerabilities are weaknesses in software that enable an attacker to compromise the integrity, availability, or confidentiality of the software or the data that it processes. •Exploits An exploit is malicious code that takes advantage of software vulnerabilities to infect, disrupt, or take control of a computer without the user’s consent and typically without their knowledge. Exploits target vulnerabilities in operating systems, web browsers, applications, or software components that are installed on the computer
  • 6. Microsoft Windows Fact Sheet •End of Sales •The date when a particular version of Windows is no longer available to retailers or Original Equipment Manufacturers •End of Support •Refers to the date when Microsoft no longer provides automatic fixes, updates, or online technical assistance. Fact Sheet
  • 7. Windows XP Extended Support Windows XP Microsoft officially ends all technical support for Windows XP on April 8th 2014. There are 45 million lines of code that comprise Windows XP and each line may contain a potential security breach point.
  • 8. Options Option 1-Do nothing If you continue to use Windows XP after support ends, your computer will still work but it might become more vulnerable to security risks and viruses. Also, as more software and hardware manufacturers continue to optimize for more recent versions of Windows, you can expect to encounter greater numbers of apps and devices that do not work with Windows XP Option 2-Upgrade your operating system Very few older computers will be able to run Windows 8.1, which is the latest version of Windows. We recommend that you download and run the Windows Upgrade Assistant to check if your PC meets the system requirements for Windows 8.1 and then follow the steps in the tutorial to upgrade if your PC is able. For more detailed information, read the FAQ
  • 9. Options Option 3-Purchase a new computer Things to consider •Desktop, Laptop or Tablet •Microsoft , Apple or Android •64 bit or 32 bit O/S •Touch screen •RAM •Hard disk •Applications