Close
  • Latest News
  • Artificial Intelligence
  • Video
  • Big Data and Analytics
  • Cloud
  • Networking
  • Cybersecurity
  • Applications
  • IT Management
  • Storage
  • Sponsored
  • Mobile
  • Small Business
  • Development
  • Database
  • Servers
  • Android
  • Apple
  • Innovation
  • Blogs
  • PC Hardware
  • Reviews
  • Search Engines
  • Virtualization
Read Down
Sign in
Close
Welcome!Log into your account
Forgot your password?
Read Down
Password recovery
Recover your password
Close
Search
Logo
Logo
  • Latest News
  • Artificial Intelligence
  • Video
  • Big Data and Analytics
  • Cloud
  • Networking
  • Cybersecurity
  • Applications
  • IT Management
  • Storage
  • Sponsored
  • Mobile
  • Small Business
  • Development
  • Database
  • Servers
  • Android
  • Apple
  • Innovation
  • Blogs
  • PC Hardware
  • Reviews
  • Search Engines
  • Virtualization
More
    Home Latest News

      Windows XP SP2: Coming to a PC Near You

      Written by

      Neil J. Rubenking
      Published August 6, 2004
      Share
      Facebook
      Twitter
      Linkedin

        eWEEK content and product recommendations are editorially independent. We may make money when you click on links to our partners. Learn More.

        The next major version of Windows may still be hovering just out of sight, but todays security problems are very much with us, looming larger all the time. And though a properly configured Windows XP system with the latest security patches is fairly well-protected from most Internet-borne threats, many XP systems arent set up correctly or fully updated.

        Longhorn, the next major Windows update, should ameliorate the situation, but no one can wait that long. As an interim solution, Microsoft soon will release the security-centric Windows XP Service Pack 2 (SP2) update. (For more on Windows XP, click here.)

        If Microsoft hasnt managed to get SP2 out the door by the time you read this, you should still be able to download the current release candidate here.

        SP2 is dedicated to enhancing security in a variety of ways. Microsoft had originally planned for SP2 to turn on Automatic Updates by default to ensure that as many users as possible installed important patches. But this turned out to be illegal in some countries.

        Instead, users will be forced to choose “on” or “off” (see Figure 1) during installation (or, we assume, on first boot for machines that come with SP2 preinstalled).

        Automatic Updates currently install only critical patches for Windows; in SP2, theyll install both critical and security patches for Windows as well as some other Microsoft applications. If a download is interrupted, Windows Update will restart at the point where the interruption occurred. At shutdown, if updates have been downloaded but not installed, Windows will offer to install them and then shut down.

        The new Security Center keeps essential security information visible. Its tray icon turns red (see Figure 2) if theres a problem or yellow if new updates are available. Double-clicking on the icon brings up the Security Center window, showing the current security status in three areas: Firewall, Automatic Updates and Virus Protection (see Figure 3).

        Though the final lists of supported applications arent yet available, SP2 will monitor a number of third-party antivirus and firewall products and warn users if they are turned off or out of date. The Security Center also includes direct links to configuration of Automatic Updates, Internet Options and the Windows Firewall.

        Many of SP2s security enhancements are hidden. It offers tighter control of communications protocols such as RPC (Remote Procedure Call), DCOM (Distributed Common Object Model) and WebDAV (Web-based Distributed Authoring and Versioning). The system is protected against buffer-overrun exploits used by many Trojans. The Local Zone Lockdown prevents Trojans from taking advantage of reduced restrictions for programs running on the local machine.

        Although these wont make a visible difference in your day-to-day experience, theyre important steps toward keeping you safer. Now, well take a detailed look at three areas where SP2s changes will be apparent: Windows Firewall, Internet Explorer and Outlook Express.

        If all Windows XP users had enabled the operating systems Internet Connection Firewall (ICF), they would have been protected from worms like Nimda, Blaster and Sasser. But the ICF was disabled by default, and its low profile meant many users never noticed it. In addition, when users did enable it, the ICF blocked desired tasks such as sharing a network printer, except for those users expert enough to open specific ports manually.

        Microsoft has learned something from experience: The Windows Firewall in SP2, which replaces the ICF, is substantially easier to use and configure, and offers greater security—and its enabled by default. And protection now begins the moment the computer boots up.

        During the boot process, the firewall watches network traffic by using stateful packet inspection (SPI), checking every incoming data packet against the record of outgoing requests for data. If any incoming packet doesnt match a request, Windows Firewall discards it.

        When system initialization is complete, this simple boot-time policy is replaced by Windows Firewalls run-time policy, which may permit incoming traffic on specific ports or for specific programs.

        Where the ICF was hidden away on the last tab of the Properties dialog for each network connection, Windows Firewalls status is immediately visible in the Security Center. If its not on, the Security Centers tray icon will turn red. Users can reach the Windows Firewall configuration page directly from the Security Center. And Windows Firewall settings apply to all network connections.

        A complete lockdown by Windows Firewall would provide total protection—but block file and printer sharing, instant messaging, remote access and other useful functions. Windows Firewall automatically offers to enable file and printer sharing, restricted by default to the local network. A number of other common exceptions are predefined in the configuration dialog.

        Users also can open specific ports to allow incoming (unrequested) packets for any program, or to allow a program unlimited access to inbound traffic on all ports. Its not possible to do both at once—you cant limit a specific program to inbound traffic only on specific ports—but you can limit the scope of each exception to just the local network or to a specific list of trusted IP addresses.

        This program-specific exceptions feature is not the same as the “program control” offered by third-party personal-firewall products such as Norton Internet Security and ZoneAlarm Security Suite. Those products also prevent unknown programs from sending traffic out to the Internet; Windows Firewall does not.

        But the first time an unauthorized program tries to open itself to receiving incoming packets, Windows Firewall pops up a notice similar to those youd see from NIS or ZoneAlarm (see Figure 4). Users can unblock the program, keep blocking it without further notices, or block it without changing its “first-time” status.

        To read the full story,

        click here.

        Neil J. Rubenking
        Neil J. Rubenking
        Neil Rubenking served as vice president and president of the San Francisco PC User Group for three years when the IBM PC was brand new. He was present at the formation of the Association of Shareware Professionals and served on its board of directors. In 1986, PC Magazine brought Neil on board to handle the influx of Turbo Pascal tips submitted by readers. By 1990, he had become PC Magazine's technical editor and a coast-to-coast telecommuter. His "User to User" column provided readers with tips and solutions on using DOS and Windows, while his technical columns clarified fine points in programming and operating systems. His utility articles—over forty in total—featured useful programs and programming examples in Pascal, Visual Basic, and Delphi. Mr. Rubenking has written seven books on DOS, Windows, and Pascal/Delphi programming, including PC Magazine DOS Batch File Lab Notes and the popular Delphi Programming for Dummies. In his current role as a PC Magazine Lead Analyst, he evaluates and reports on client-side operating systems and security solutions, such as firewalls, anti-virus, anti-spyware, anti-spam, and full security suites. He continues to answer readers' questions in the ongoing "Solutions" column and on PC Magazine's discussion forums.

        Get the Free Newsletter!

        Subscribe to Daily Tech Insider for top news, trends & analysis

        Get the Free Newsletter!

        Subscribe to Daily Tech Insider for top news, trends & analysis

        MOST POPULAR ARTICLES

        Artificial Intelligence

        9 Best AI 3D Generators You Need...

        Sam Rinko - June 25, 2024 0
        AI 3D Generators are powerful tools for many different industries. Discover the best AI 3D Generators, and learn which is best for your specific use case.
        Read more
        Cloud

        RingCentral Expands Its Collaboration Platform

        Zeus Kerravala - November 22, 2023 0
        RingCentral adds AI-enabled contact center and hybrid event products to its suite of collaboration services.
        Read more
        Artificial Intelligence

        8 Best AI Data Analytics Software &...

        Aminu Abdullahi - January 18, 2024 0
        Learn the top AI data analytics software to use. Compare AI data analytics solutions & features to make the best choice for your business.
        Read more
        Latest News

        Zeus Kerravala on Networking: Multicloud, 5G, and...

        James Maguire - December 16, 2022 0
        I spoke with Zeus Kerravala, industry analyst at ZK Research, about the rapid changes in enterprise networking, as tech advances and digital transformation prompt...
        Read more
        Video

        Datadog President Amit Agarwal on Trends in...

        James Maguire - November 11, 2022 0
        I spoke with Amit Agarwal, President of Datadog, about infrastructure observability, from current trends to key challenges to the future of this rapidly growing...
        Read more
        Logo

        eWeek has the latest technology news and analysis, buying guides, and product reviews for IT professionals and technology buyers. The site’s focus is on innovative solutions and covering in-depth technical content. eWeek stays on the cutting edge of technology news and IT trends through interviews and expert analysis. Gain insight from top innovators and thought leaders in the fields of IT, business, enterprise software, startups, and more.

        Facebook
        Linkedin
        RSS
        Twitter
        Youtube

        Advertisers

        Advertise with TechnologyAdvice on eWeek and our other IT-focused platforms.

        Advertise with Us

        Menu

        • About eWeek
        • Subscribe to our Newsletter
        • Latest News

        Our Brands

        • Privacy Policy
        • Terms
        • About
        • Contact
        • Advertise
        • Sitemap
        • California – Do Not Sell My Information

        Property of TechnologyAdvice.
        © 2024 TechnologyAdvice. All Rights Reserved

        Advertiser Disclosure: Some of the products that appear on this site are from companies from which TechnologyAdvice receives compensation. This compensation may impact how and where products appear on this site including, for example, the order in which they appear. TechnologyAdvice does not include all companies or all types of products available in the marketplace.

        ×