SlideShare a Scribd company logo
1 of 36
WINDOWS VISTA AND TRUSTWORTHY COMPUTING BY S.VIJAY SARADHI
Importance of windows vista ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
DEVELOPMENT OF VISTA
SECURE DEVELOPMENT LIFE CYCLE ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Threats and Vulnerabilities Mitigation   ,[object Object]
Internet Explorer 7 Protected Mode ,[object Object],[object Object],[object Object],[object Object]
Working of protected mode
USER ACCOUNT CONTROL ,[object Object],[object Object],[object Object],[object Object]
User Account Control
WORKING OF UAC ,[object Object],[object Object],[object Object],[object Object]
Secure Desktop Mode
UAC PROMPT LEVELS
Address space layout randomization ,[object Object],[object Object],[object Object],[object Object]
ASLR ENFORCEMENT
 
DATA EXECUTION PREVENTION ,[object Object],[object Object],[object Object],[object Object]
DEP ENFORCEMENT
BIT LOCKER DRIVE ENCRYPTION ,[object Object],[object Object],[object Object],[object Object]
WORKING OF BITLOCKER
KERNEL PATCH PROTECTION ,[object Object],[object Object],[object Object],[object Object]
SHELL AND UI ENHANCEMENTS ,[object Object],[object Object],[object Object]
WINDOWS AERO ,[object Object],[object Object],[object Object],[object Object]
START MENU USING AERO
WINDOWS FLIP ANF FLIP 3D ,[object Object],[object Object],[object Object],[object Object]
WINDOWS FLIP 3D
WINDOWS FLIP
LIVE THUMBNAILS
WINDOWS DRIVER DISPLAY MODEL ,[object Object],[object Object],[object Object]
RENDERING BY USING WDDM
WINDOWS INSTANT SEARCH ,[object Object],[object Object],[object Object]
WINDOWS INSTANT SEARCH
ARCHITECTURE OF SEARCH ,[object Object],[object Object],[object Object],[object Object]
ARCHITECTURE
CONCLUSION ,[object Object],[object Object],[object Object],[object Object],[object Object]
REFERNCES ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
[object Object]

More Related Content

What's hot

Operating systems security 2007 vulnerability report
Operating systems security 2007 vulnerability reportOperating systems security 2007 vulnerability report
Operating systems security 2007 vulnerability reportAjit Gaddam
 
Intel vmcs-shadowing-paper
Intel vmcs-shadowing-paperIntel vmcs-shadowing-paper
Intel vmcs-shadowing-paperAhmed Sallam
 
Design for security in operating system
Design for security in operating systemDesign for security in operating system
Design for security in operating systemBhagyashree Barde
 
Introduction to Android Development and Security
Introduction to Android Development and SecurityIntroduction to Android Development and Security
Introduction to Android Development and SecurityKelwin Yang
 
M w f in-class 12.2.11 and homework for 12.5
M w f in-class 12.2.11 and homework for 12.5M w f in-class 12.2.11 and homework for 12.5
M w f in-class 12.2.11 and homework for 12.5Allan Jackson
 
Windows 7 in 60 minutes - New Horizons Bulgaria
Windows 7 in 60 minutes - New Horizons BulgariaWindows 7 in 60 minutes - New Horizons Bulgaria
Windows 7 in 60 minutes - New Horizons BulgariaNew Horizons Bulgaria
 
It windows 8 project
It windows 8 projectIt windows 8 project
It windows 8 projectbpedersen5
 
Operating system security
Operating system securityOperating system security
Operating system securityRachel Jeewa
 
Android security in depth
Android security in depthAndroid security in depth
Android security in depthSander Alberink
 
Operating system security
Operating system securityOperating system security
Operating system securitySarmad Makhdoom
 
Cloud Security
Cloud SecurityCloud Security
Cloud SecurityAli Habeeb
 
Android security
Android securityAndroid security
Android securityMobile Rtpl
 
IT109 Microsoft Windows 7 Operating Systems Unit 07 lesson 10
IT109 Microsoft Windows 7 Operating Systems Unit 07 lesson 10IT109 Microsoft Windows 7 Operating Systems Unit 07 lesson 10
IT109 Microsoft Windows 7 Operating Systems Unit 07 lesson 10blusmurfydot1
 

What's hot (20)

Windows advanced
Windows advancedWindows advanced
Windows advanced
 
Operating systems security 2007 vulnerability report
Operating systems security 2007 vulnerability reportOperating systems security 2007 vulnerability report
Operating systems security 2007 vulnerability report
 
Intel vmcs-shadowing-paper
Intel vmcs-shadowing-paperIntel vmcs-shadowing-paper
Intel vmcs-shadowing-paper
 
thesis sample
thesis samplethesis sample
thesis sample
 
Design for security in operating system
Design for security in operating systemDesign for security in operating system
Design for security in operating system
 
Introduction to Android Development and Security
Introduction to Android Development and SecurityIntroduction to Android Development and Security
Introduction to Android Development and Security
 
Android security
Android securityAndroid security
Android security
 
M w f in-class 12.2.11 and homework for 12.5
M w f in-class 12.2.11 and homework for 12.5M w f in-class 12.2.11 and homework for 12.5
M w f in-class 12.2.11 and homework for 12.5
 
Windows 7 in 60 minutes - New Horizons Bulgaria
Windows 7 in 60 minutes - New Horizons BulgariaWindows 7 in 60 minutes - New Horizons Bulgaria
Windows 7 in 60 minutes - New Horizons Bulgaria
 
It windows 8 project
It windows 8 projectIt windows 8 project
It windows 8 project
 
Operating system security
Operating system securityOperating system security
Operating system security
 
Android security in depth
Android security in depthAndroid security in depth
Android security in depth
 
Android Security
Android SecurityAndroid Security
Android Security
 
Operating system security
Operating system securityOperating system security
Operating system security
 
Pentesting with linux
Pentesting with linuxPentesting with linux
Pentesting with linux
 
Cloud Security
Cloud SecurityCloud Security
Cloud Security
 
Program Threats
Program ThreatsProgram Threats
Program Threats
 
Android security
Android securityAndroid security
Android security
 
IT109 Microsoft Windows 7 Operating Systems Unit 07 lesson 10
IT109 Microsoft Windows 7 Operating Systems Unit 07 lesson 10IT109 Microsoft Windows 7 Operating Systems Unit 07 lesson 10
IT109 Microsoft Windows 7 Operating Systems Unit 07 lesson 10
 
Why Windows Xp
Why Windows XpWhy Windows Xp
Why Windows Xp
 

Similar to Windows Vista and Trust Worthy Computing

Vista Presentation
Vista PresentationVista Presentation
Vista Presentationsdrayin
 
Windows Vista
Windows VistaWindows Vista
Windows Vistabcobbs86
 
Security @ Windows 10 Partner Technical Bootcamp Microsoft Norway October 2015
Security @ Windows 10 Partner Technical Bootcamp Microsoft Norway October 2015Security @ Windows 10 Partner Technical Bootcamp Microsoft Norway October 2015
Security @ Windows 10 Partner Technical Bootcamp Microsoft Norway October 2015Jan Ketil Skanke
 
Ch08 Microsoft Operating System Vulnerabilities
Ch08 Microsoft Operating System VulnerabilitiesCh08 Microsoft Operating System Vulnerabilities
Ch08 Microsoft Operating System Vulnerabilitiesphanleson
 
Microsoft Operating System Vulnerabilities
Microsoft Operating System VulnerabilitiesMicrosoft Operating System Vulnerabilities
Microsoft Operating System VulnerabilitiesInformation Technology
 
Microsoft OS Vulnerabilities
Microsoft OS VulnerabilitiesMicrosoft OS Vulnerabilities
Microsoft OS VulnerabilitiesSecurityTube.Net
 
Windows 7 Security Enhancements
Windows 7 Security EnhancementsWindows 7 Security Enhancements
Windows 7 Security EnhancementsPresentologics
 
Security Lock Down Your Computer Like the National Security Agency (NSA)
Security Lock Down Your Computer Like the National Security Agency (NSA)Security Lock Down Your Computer Like the National Security Agency (NSA)
Security Lock Down Your Computer Like the National Security Agency (NSA)José Ferreiro
 
Security best practices for hyper v and server virtualisation [svr307]
Security best practices for hyper v and server virtualisation [svr307]Security best practices for hyper v and server virtualisation [svr307]
Security best practices for hyper v and server virtualisation [svr307]Louis Göhl
 
An inconvenient truth: Evading the Ransomware Protection in windows 10 @ Hack...
An inconvenient truth: Evading the Ransomware Protection in windows 10 @ Hack...An inconvenient truth: Evading the Ransomware Protection in windows 10 @ Hack...
An inconvenient truth: Evading the Ransomware Protection in windows 10 @ Hack...Soya Aoyama
 
IoT Day - Introducing Azure Sphere
IoT Day -  Introducing Azure SphereIoT Day -  Introducing Azure Sphere
IoT Day - Introducing Azure SphereMirco Vanini
 
Application Security Guide for Beginners
Application Security Guide for Beginners Application Security Guide for Beginners
Application Security Guide for Beginners Checkmarx
 
Windows 7 For Developers
Windows 7 For DevelopersWindows 7 For Developers
Windows 7 For Developersjoycsc
 
Azure Sphere - GAB 2019
Azure Sphere - GAB 2019Azure Sphere - GAB 2019
Azure Sphere - GAB 2019Mirco Vanini
 
Operating system Definition Structures
Operating  system Definition  StructuresOperating  system Definition  Structures
Operating system Definition Structuresanair23
 
Windows Architecture Explained by Stacksol
Windows Architecture Explained by StacksolWindows Architecture Explained by Stacksol
Windows Architecture Explained by StacksolStacksol
 

Similar to Windows Vista and Trust Worthy Computing (20)

Vista Presentation
Vista PresentationVista Presentation
Vista Presentation
 
Windows Vista
Windows VistaWindows Vista
Windows Vista
 
Security @ Windows 10 Partner Technical Bootcamp Microsoft Norway October 2015
Security @ Windows 10 Partner Technical Bootcamp Microsoft Norway October 2015Security @ Windows 10 Partner Technical Bootcamp Microsoft Norway October 2015
Security @ Windows 10 Partner Technical Bootcamp Microsoft Norway October 2015
 
Lecture 2.6 software
Lecture 2.6 softwareLecture 2.6 software
Lecture 2.6 software
 
Windows Vista Security
Windows Vista SecurityWindows Vista Security
Windows Vista Security
 
Ch08 Microsoft Operating System Vulnerabilities
Ch08 Microsoft Operating System VulnerabilitiesCh08 Microsoft Operating System Vulnerabilities
Ch08 Microsoft Operating System Vulnerabilities
 
Microsoft Operating System Vulnerabilities
Microsoft Operating System VulnerabilitiesMicrosoft Operating System Vulnerabilities
Microsoft Operating System Vulnerabilities
 
Microsoft OS Vulnerabilities
Microsoft OS VulnerabilitiesMicrosoft OS Vulnerabilities
Microsoft OS Vulnerabilities
 
Windows 7 Security Enhancements
Windows 7 Security EnhancementsWindows 7 Security Enhancements
Windows 7 Security Enhancements
 
Security Lock Down Your Computer Like the National Security Agency (NSA)
Security Lock Down Your Computer Like the National Security Agency (NSA)Security Lock Down Your Computer Like the National Security Agency (NSA)
Security Lock Down Your Computer Like the National Security Agency (NSA)
 
Security best practices for hyper v and server virtualisation [svr307]
Security best practices for hyper v and server virtualisation [svr307]Security best practices for hyper v and server virtualisation [svr307]
Security best practices for hyper v and server virtualisation [svr307]
 
An inconvenient truth: Evading the Ransomware Protection in windows 10 @ Hack...
An inconvenient truth: Evading the Ransomware Protection in windows 10 @ Hack...An inconvenient truth: Evading the Ransomware Protection in windows 10 @ Hack...
An inconvenient truth: Evading the Ransomware Protection in windows 10 @ Hack...
 
Final viva
Final vivaFinal viva
Final viva
 
Operating system
Operating systemOperating system
Operating system
 
IoT Day - Introducing Azure Sphere
IoT Day -  Introducing Azure SphereIoT Day -  Introducing Azure Sphere
IoT Day - Introducing Azure Sphere
 
Application Security Guide for Beginners
Application Security Guide for Beginners Application Security Guide for Beginners
Application Security Guide for Beginners
 
Windows 7 For Developers
Windows 7 For DevelopersWindows 7 For Developers
Windows 7 For Developers
 
Azure Sphere - GAB 2019
Azure Sphere - GAB 2019Azure Sphere - GAB 2019
Azure Sphere - GAB 2019
 
Operating system Definition Structures
Operating  system Definition  StructuresOperating  system Definition  Structures
Operating system Definition Structures
 
Windows Architecture Explained by Stacksol
Windows Architecture Explained by StacksolWindows Architecture Explained by Stacksol
Windows Architecture Explained by Stacksol
 

Windows Vista and Trust Worthy Computing