{"id":1461,"date":"2006-01-27T00:00:00","date_gmt":"2006-01-27T00:00:00","guid":{"rendered":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/2006\/01\/27\/microsofts-allchin-buy-vista-for-the-security\/"},"modified":"2021-12-30T11:39:25","modified_gmt":"2021-12-30T11:39:25","slug":"microsofts-allchin-buy-vista-for-the-security","status":"publish","type":"post","link":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/2006\/01\/27\/microsofts-allchin-buy-vista-for-the-security\/","title":{"rendered":"Microsoft&#8217;s Allchin: Buy Vista for the security"},"content":{"rendered":"<p>If new features won&#8217;t get you to upgrade to Vista, security enhancements should, Windows chief Jim Allchin has urged.   Microsoft has already touted the bells and whistles it is putting into Windows Vista, the operating system successor to XP that&#8217;s due out by the end of the year.   Other changes include improved touch-screen support and a Windows sidebar that can display all kinds of information such as upcoming appointments, just-in e-mail messages and a clock.   But if none of that strikes your fancy, Vista will still be worth getting, thanks to its better defenses against phishing attacks, spyware and other malicious code, Allchin said.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>&#8220;Safety and security is the overriding feature that most people will want to have Windows Vista for,&#8221; the co-president of Microsoft&#8217;s platform, products and services division said in an interview with CNET News.com.  It is reversing its plan to add virtual folders that contain all the files that match specific criteria, such as &#8220;created by Michelle&#8221; or &#8220;images,&#8221; no matter where they are on the PC.<\/p>\n<p>Originally, Microsoft wanted virtual folders to replace standard views, which show the physical location of files on a hard disk drive, but it has backpedaled on that decision.  The software maker had already scaled back on planned features for Vista, leaving some out so it could meet a ship date in 2006 for the update.<\/p>\n<p>Vista will go much further in protecting consumers, he said.  &#8220;If we ever find something trying to open a port that the developer said it should not be opening, it is immediately shut down,&#8221; he said.<\/p>\n<p>Additionally, Vista aims to offer improved security by letting people run their PC with fewer privileges, which control how a particular person can interact with the software.  In Windows Vista, the default will likely be &#8220;protected administrator,&#8221; a new privilege level that Microsoft is introducing with Vista, Allchin said.  The standard user mode has been improved from Windows XP&#8211;people won&#8217;t have to call IT to change their PC clock, for instance&#8211;but it won&#8217;t allow a user to install applications, for example.<\/p>\n<p>http:\/\/news.zdnet.com\/2100-3513_22-6032344.html<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[3],"tags":[],"class_list":["post-1461","post","type-post","status-publish","format-standard","hentry","category-product"],"_links":{"self":[{"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/posts\/1461","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/comments?post=1461"}],"version-history":[{"count":1,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/posts\/1461\/revisions"}],"predecessor-version":[{"id":3948,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/posts\/1461\/revisions\/3948"}],"wp:attachment":[{"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/media?parent=1461"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/categories?post=1461"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/tags?post=1461"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}