SlideShare a Scribd company logo
1 of 36
WINDOWS VISTA AND TRUSTWORTHY COMPUTING BY S.VIJAY SARADHI
Importance of windows vista ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
DEVELOPMENT OF VISTA
SECURE DEVELOPMENT LIFE CYCLE ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Threats and Vulnerabilities Mitigation   ,[object Object]
Internet Explorer 7 Protected Mode ,[object Object],[object Object],[object Object],[object Object]
Working of protected mode
USER ACCOUNT CONTROL ,[object Object],[object Object],[object Object],[object Object]
User Account Control
WORKING OF UAC ,[object Object],[object Object],[object Object],[object Object]
Secure Desktop Mode
UAC PROMPT LEVELS
Address space layout randomization ,[object Object],[object Object],[object Object],[object Object]
ASLR ENFORCEMENT
 
DATA EXECUTION PREVENTION ,[object Object],[object Object],[object Object],[object Object]
DEP ENFORCEMENT
BIT LOCKER DRIVE ENCRYPTION ,[object Object],[object Object],[object Object],[object Object]
WORKING OF BITLOCKER
KERNEL PATCH PROTECTION ,[object Object],[object Object],[object Object],[object Object]
SHELL AND UI ENHANCEMENTS ,[object Object],[object Object],[object Object]
WINDOWS AERO ,[object Object],[object Object],[object Object],[object Object]
START MENU USING AERO
WINDOWS FLIP ANF FLIP 3D ,[object Object],[object Object],[object Object],[object Object]
WINDOWS FLIP 3D
WINDOWS FLIP
LIVE THUMBNAILS
WINDOWS DRIVER DISPLAY MODEL ,[object Object],[object Object],[object Object]
RENDERING BY USING WDDM
WINDOWS INSTANT SEARCH ,[object Object],[object Object],[object Object]
WINDOWS INSTANT SEARCH
ARCHITECTURE OF SEARCH ,[object Object],[object Object],[object Object],[object Object]
ARCHITECTURE
CONCLUSION ,[object Object],[object Object],[object Object],[object Object],[object Object]
REFERNCES ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
[object Object]

More Related Content

What's hot

Operating systems security 2007 vulnerability report
Operating systems security 2007 vulnerability reportOperating systems security 2007 vulnerability report
Operating systems security 2007 vulnerability report
Ajit Gaddam
 
M w f in-class 12.2.11 and homework for 12.5
M w f in-class 12.2.11 and homework for 12.5M w f in-class 12.2.11 and homework for 12.5
M w f in-class 12.2.11 and homework for 12.5
Allan Jackson
 
It windows 8 project
It windows 8 projectIt windows 8 project
It windows 8 project
bpedersen5
 
Operating system security
Operating system securityOperating system security
Operating system security
Rachel Jeewa
 
Operating system security
Operating system securityOperating system security
Operating system security
Sarmad Makhdoom
 
Cloud Security
Cloud SecurityCloud Security
Cloud Security
Ali Habeeb
 
IT109 Microsoft Windows 7 Operating Systems Unit 07 lesson 10
IT109 Microsoft Windows 7 Operating Systems Unit 07 lesson 10IT109 Microsoft Windows 7 Operating Systems Unit 07 lesson 10
IT109 Microsoft Windows 7 Operating Systems Unit 07 lesson 10
blusmurfydot1
 

What's hot (20)

Windows advanced
Windows advancedWindows advanced
Windows advanced
 
Operating systems security 2007 vulnerability report
Operating systems security 2007 vulnerability reportOperating systems security 2007 vulnerability report
Operating systems security 2007 vulnerability report
 
Intel vmcs-shadowing-paper
Intel vmcs-shadowing-paperIntel vmcs-shadowing-paper
Intel vmcs-shadowing-paper
 
thesis sample
thesis samplethesis sample
thesis sample
 
Design for security in operating system
Design for security in operating systemDesign for security in operating system
Design for security in operating system
 
Introduction to Android Development and Security
Introduction to Android Development and SecurityIntroduction to Android Development and Security
Introduction to Android Development and Security
 
Android security
Android securityAndroid security
Android security
 
M w f in-class 12.2.11 and homework for 12.5
M w f in-class 12.2.11 and homework for 12.5M w f in-class 12.2.11 and homework for 12.5
M w f in-class 12.2.11 and homework for 12.5
 
Windows 7 in 60 minutes - New Horizons Bulgaria
Windows 7 in 60 minutes - New Horizons BulgariaWindows 7 in 60 minutes - New Horizons Bulgaria
Windows 7 in 60 minutes - New Horizons Bulgaria
 
It windows 8 project
It windows 8 projectIt windows 8 project
It windows 8 project
 
Operating system security
Operating system securityOperating system security
Operating system security
 
Android security in depth
Android security in depthAndroid security in depth
Android security in depth
 
Android Security
Android SecurityAndroid Security
Android Security
 
Operating system security
Operating system securityOperating system security
Operating system security
 
Pentesting with linux
Pentesting with linuxPentesting with linux
Pentesting with linux
 
Cloud Security
Cloud SecurityCloud Security
Cloud Security
 
Program Threats
Program ThreatsProgram Threats
Program Threats
 
Android security
Android securityAndroid security
Android security
 
IT109 Microsoft Windows 7 Operating Systems Unit 07 lesson 10
IT109 Microsoft Windows 7 Operating Systems Unit 07 lesson 10IT109 Microsoft Windows 7 Operating Systems Unit 07 lesson 10
IT109 Microsoft Windows 7 Operating Systems Unit 07 lesson 10
 
Why Windows Xp
Why Windows XpWhy Windows Xp
Why Windows Xp
 

Similar to Windows Vista and Trust Worthy Computing

Microsoft Operating System Vulnerabilities
Microsoft Operating System VulnerabilitiesMicrosoft Operating System Vulnerabilities
Microsoft Operating System Vulnerabilities
Information Technology
 
Windows 7 Security Enhancements
Windows 7 Security EnhancementsWindows 7 Security Enhancements
Windows 7 Security Enhancements
Presentologics
 
Security best practices for hyper v and server virtualisation [svr307]
Security best practices for hyper v and server virtualisation [svr307]Security best practices for hyper v and server virtualisation [svr307]
Security best practices for hyper v and server virtualisation [svr307]
Louis Göhl
 

Similar to Windows Vista and Trust Worthy Computing (20)

Vista Presentation
Vista PresentationVista Presentation
Vista Presentation
 
Windows Vista
Windows VistaWindows Vista
Windows Vista
 
Security @ Windows 10 Partner Technical Bootcamp Microsoft Norway October 2015
Security @ Windows 10 Partner Technical Bootcamp Microsoft Norway October 2015Security @ Windows 10 Partner Technical Bootcamp Microsoft Norway October 2015
Security @ Windows 10 Partner Technical Bootcamp Microsoft Norway October 2015
 
Lecture 2.6 software
Lecture 2.6 softwareLecture 2.6 software
Lecture 2.6 software
 
Windows Vista Security
Windows Vista SecurityWindows Vista Security
Windows Vista Security
 
Ch08 Microsoft Operating System Vulnerabilities
Ch08 Microsoft Operating System VulnerabilitiesCh08 Microsoft Operating System Vulnerabilities
Ch08 Microsoft Operating System Vulnerabilities
 
Microsoft Operating System Vulnerabilities
Microsoft Operating System VulnerabilitiesMicrosoft Operating System Vulnerabilities
Microsoft Operating System Vulnerabilities
 
Microsoft OS Vulnerabilities
Microsoft OS VulnerabilitiesMicrosoft OS Vulnerabilities
Microsoft OS Vulnerabilities
 
Windows 7 Security Enhancements
Windows 7 Security EnhancementsWindows 7 Security Enhancements
Windows 7 Security Enhancements
 
Security Lock Down Your Computer Like the National Security Agency (NSA)
Security Lock Down Your Computer Like the National Security Agency (NSA)Security Lock Down Your Computer Like the National Security Agency (NSA)
Security Lock Down Your Computer Like the National Security Agency (NSA)
 
Security best practices for hyper v and server virtualisation [svr307]
Security best practices for hyper v and server virtualisation [svr307]Security best practices for hyper v and server virtualisation [svr307]
Security best practices for hyper v and server virtualisation [svr307]
 
An inconvenient truth: Evading the Ransomware Protection in windows 10 @ Hack...
An inconvenient truth: Evading the Ransomware Protection in windows 10 @ Hack...An inconvenient truth: Evading the Ransomware Protection in windows 10 @ Hack...
An inconvenient truth: Evading the Ransomware Protection in windows 10 @ Hack...
 
Final viva
Final vivaFinal viva
Final viva
 
Operating system
Operating systemOperating system
Operating system
 
IoT Day - Introducing Azure Sphere
IoT Day -  Introducing Azure SphereIoT Day -  Introducing Azure Sphere
IoT Day - Introducing Azure Sphere
 
Application Security Guide for Beginners
Application Security Guide for Beginners Application Security Guide for Beginners
Application Security Guide for Beginners
 
Windows 7 For Developers
Windows 7 For DevelopersWindows 7 For Developers
Windows 7 For Developers
 
Azure Sphere - GAB 2019
Azure Sphere - GAB 2019Azure Sphere - GAB 2019
Azure Sphere - GAB 2019
 
Operating system Definition Structures
Operating  system Definition  StructuresOperating  system Definition  Structures
Operating system Definition Structures
 
Windows Architecture Explained by Stacksol
Windows Architecture Explained by StacksolWindows Architecture Explained by Stacksol
Windows Architecture Explained by Stacksol
 

Windows Vista and Trust Worthy Computing