Windows, Dex, desktop gadgets,
desktop gadgets. And they come the idea of sideshow
We're all introduced in Windows Vista,
and initially they had a lot of interest.
There was just kind of a unique away to customize your desktop.
Problem they ran into, um
it was a security issue. So we'll talk about
gadgets that will talk about the death of gadgets.
Today we would almost call the maps.
They were very similar to APS you'd put on a mobile device
s O. If you want that little clock that you see in the upper right hand corner,
you could have a little clock gadget
and it would create a a clock from the operating system. And give me that this way.
If you wanted a weather gadget,
you could point to a certain location and have that little weather gadgets to see
to see periodic pictures of some place. You get the picture. All the things we now think of is doing with APS on mobile devices they tried to do in
in what they called the Vista sidebar,
which was a collapsible
division of the main screen
for most people, knowing is on the right hand side. By the fall, you could move it.
But if you went over and dragged it over, you could see all these gadgets. And if you pushed it off, all the gun just went away.
they didn't pass the security test.
There were some really fatal security flaws with the whole gadget concept.
And by July 20,020 12 Microsoft had recommended immediate discontinuation of all gadgets and of the sidebar in sideshow.
So they were a feature. They did exist.
recommended to be disabled Investor in seven, and they were removed entirely from Windows eight.
Ready boost Ready Boost is an interesting concept.
Ah, lot of machines, a lot of hard drives. I'm sorry. Lot of
have memory limitations, and they may not be able to support
If you're running a 32 bit system, they may only have engineered enough support in the motherboard to support one Yeager two gigs of RAM, especially in smaller systems or in laptops.
Already boost is a way to get around that problem.
The concept already boost is you take a USB drive, you take a, um,
as d card anything like that. With that kind of memory in it,
you can actually put it into
the laptop into the operator into the hardware.
And if you see a button there,
you can act. You press that button and and tell her to go to work. Has ready boost, and what it will do is it will take it and turn it into cash for the operating system. So instead of being
ah, USB thumb drive now, now it's a part of your operating system cache.
And if you think of how Windows generally did file swapping,
I'll swap. You usually went to the hard drive, and that made the file swapping very slow.
So if we needed virtual memory, virtual memory was created on the hard disk and very smoke in this world. What you do is you create virtual memory that the virtual memory, instead of being mapped too hard drive space is mapped
which operates about 10 to the four tender, the six times faster, depending on which version of us be and how good the memory stick. It is
so in Windows Vista could support up before gigs of external flash storage for system cache
when the seven can support
up to a 32 gigabits per device
at a pate devices for a total of 256 gigabytes of cash storage
on just for a security feature, the cash storage is encrypted and compressed, so if somebody came along and ripped you cash drive out, they couldn't access the contents of memory because the contents of memory would be encrypted.
So just a unique feature.
And it's especially useful for people who have older operating system from hardware. And they want to install this door. Seven on that hardware, and they find it's running smoke because of memory shortages. This is the way to get around that
when the security center
supported in X p an investor
is not a feature as much as it's a container.
The controls for firewall for operating system updates for anti malware. We're all under the window Security center in control panel.
When you got two windows this window. Seven. Rather than putting him in security center, they had separate
Shadow copy is an interesting feature
Shadow copy is a way of making realty time online copies
of things that are happening in your operating system.
It can actually, in the newer versions, investor in seven shelter copies, copies storage at the block level. And what that means is when data is stored on your hard drive. It's not. Storage is a continuous stream. The hard drive is broken up into
chunks or blocks that can be ad dressed,
and Shadow Copy doesn't try to copy files. It copied blocks from the hard disk,
the captures can capture data at a given moment,
and then you can create backups from those captures.
The technology behind is pretty interesting. I'm gonna switch here, too,
So if I have a hard disk here
having to put another hard dicks next to it,
the waste out of copy works in Windows Vista and Window seven
is if I'm trying saving something to the hard drive
will save it to two places at once.
Saying get to two places at once means you have two copies of everything.
So to make the shadow copy, the copy is already there. Where Shadow Copy does is when you say I want to have a copy. At this moment in time,
Shadow Copy just stops
making the second copy and says, Okay, I'm going to save that one
and start over again.
So shadow copy can make as many shadows as you want. As always, you don't run out of Dr Space. Each one of them will have
the state of the hard drive or the state of whatever part of the hard drive you told it to shadow
some date in time when you said
That's the instant in time that I want to maintain that copy.
So pretty neat little system,
very similar. If you know anything about computers and raid levels,
this would be equivalent to raid one and then, at some point being able to just
cut off one of the hard drives and say, Okay, now I've got a copy at this moment in time
If you look at the uses for Shadow copy,
Shadow copies would enable system restore
So you have system restoring Windows Vista system, restoring a window seven
and you either mess something up yourself or there's a failure in the system or you've installed something that won't come out. You want to roll back
and you go back. The system Restore system restore have been periodically snapshot in your hard drive state
of certain components and allows you to roll back Twitter when your time well, the way it does it is. It's using Shadow copy function.
It pre identifies the operating system files that it wants
copies them and has periodic schedules for
the Seattle snapshots.
And that's what allows you to roll back.
You could do the same thing by creating your own Chava copy
configuration to copy
files for a project. All the files in my documents, however, you like to do that and make sure they're copies of them.
The advantage of Shadow copies If you can read on the screen,
it cocked. One of things it does is it copies active files at a certain state,
and the other thing is it overcomes file locking issues, and both of those have to relate to the fact that normally you can't copy a file that's open,
but without a copy, there's actually two sets of files.
working set that your applications running off. And then there's the duplicate er shadow set.
So if you want to create a backup at a certain point in time, you can create that back up very easily by backing it up off the shadow set
because the Shadow said isn't open.
So that's how it overcomes active file and file locking issues when it comes to creating backups.
And its technology has been used at large system levels for a long time.
Because if you think of Mart's databases that never get turned off because they're always running without some way to do that, you'd never be able to have backups of operating database
handle. Shadow copy does is extends that
server functionality down to a
We just talked about it being
enabled by Satya Copy.
So there is a system restore function X p.
But the system restore function
operates much better. Invest in seven because this have a copy got improved
if you see the screen on the right hand side, What that is is just a screen capture of the automatics. Have a copy is occurring on a laptop
every time there was a Windows update. It created another shadow copy and that show those shadow copies exist so that if the Windows update corrupted something or major system unusable, you could roll back to before the update.
So, you see, all these shadow copies are just different Role back points.
If you see what system restored
captures, it captures system files,
applications, registry settings and system settings.
copy your data files,
so if you do a roll back to an earlier version, you don't lose the letter you wrote yesterday.
You get to system restore. You can get there via
accessories system tools.
It will also come up automatically if your system fails to boot and you throw it into repair mode. One of the things that Alaska is do you want to
restored to an earlier date an earlier time.
And if you say you want to restore your system to an earlier time, it's actually accessing system restored.
So user account control
user account control didn't exist in with those. X p didn't exist in
98 95 didn't exist in you dos.
The idea of user account control
is an extension of security
if you go back to the DOS world. There were no user accounts, nobody logged on. There were no passwords. Windows 95 Windows 98 passwords are optional, but you'd actually bypassed the log on screen just by hitting the escape key.
So by the family got two Windows NT Windows 2000. You actually were required to have a log on to get into the operating system. To get to the desktop
and a lot of people,
things will go one of two ways
you need to be a privileged user like you were the administrator or you see, a lot of people would even log on his administrator.
And once you are on his administrator, you could do anything
that creates a problem. Because if you can do anything,
then the mall where you accidentally download can do anything
because the now where can now operate with administrator privileges, wipe out the hard drive, kill your whole system.
Option B is that people had unpublished account. So you log on, you'd have an unpublished account.
Problem was with the unprivileged to count. You couldn't update java. You couldn't have a printer. You couldn't do anything because you had no privileges.
So the idea of user account control
has two functions. One function is you can take in normally. Unclear which user
if you're operating, is that unprivileged user. But you know the administrative account,
then you can do most of your jobs has unprivileged user.
Then when you do want to update that printer driver
the little window pops up and says, Do you want to do this and you say yes.
If you weren't in with the proceeds to count, it would ask you to log in as administrator.
Ah, the other feature is even if you are an administrator.
The administrator doesn't normally operate with administrative privileges.
The administrator has the administrative privileges, but they're essentially suspended.
When you need to do something that requires your administrator role. Administrative privileges, you get this pop up screen that says, Do you really want to do this and give you a yes or no?
Since you're already log on his administrator, you don't have to re authenticate.
But it's kept those background functions. It kept viruses. It kept unexpected activities from just happening on their own because you happen to be log in as administrator
when they initially put this in, they put it in Windows Vista
and Windows Vista, where people thought was it pops up too often. It popped up for the wrong reasons.
So they tweaked it and a window. Seven.
Uh, if it was an application,
but the application was signed digitally signed by Microsoft,
then it didn't ask for permission because it was assumed to be
that stopped a lot of the pop ups that people that were unnecessary and people were much happier with user account control in Window seven.
But Windows seven and the concept of user account control
greatly reduced the threat of bad things happening without your knowledge on the computer.
The hard part now is people in the habit of saying yes all the time, say yes no matter what,
and that diminishes the value of user account control, because if you say yes without knowing why, then you may still allow bad things to happen.
Windows defenders supported in Next P supported investors supported in Window seven,
it was actually a company Microsoft bought called Giant.
They renamed it Windows Defender
and was originally an anti spyware application
Windows defender since been superseded by Microsoft.
Microsoft still has Windows Defender,
primary system is Microsoft Security Essentials.
If you install Microsoft Security essentials, Windows defenders uninstalled,
however. Four. Windows eight.
They took Microsoft's Defender Windows Defender and upgraded it to full anti malware support.
So Windows eight, you'll find
if Windows Defender is now the new and I'm hours system running in Windows eight.
When his firewall was first supported in Windows X P,
put into Windows Vista and Window seven
Initially, firewall was installed in all versions of Windows X P, but it was disabled by default until a number of significant attacks on Windows systems
where Microsoft decided in service back to to turn on
the firewall by the fall.
The difference in Windows X P All versions Windows X P is the firewall blocks Incoming activity Potentially bad activity coming into the Windows X P box
in Windows Vista and Windows seven. It can not only control inbound traffic, but it also can control outbound traffic.
Windows Firewall is an intelligent firewall,
meaning it already knows the minimum applications that are needed to run Microsoft
Apple in the Microsoft operating system. So if you're in the domain and you need to talk to the domain controller, the ports to the domain controller are automatically open on the firewall.
However, if you find the tour in a especially in a business environment,
one of the surprising things you'll find until you get used to it, you'll go to Ping Some Windows Machine. You're testing connectivity from a server back to a work station, and the work station won't pay.
The reason the workstation won't pain is that pings are blocked by the firewall.
So if you want to see Ping's work back to X P or Vistors window seven,
you actually have to go in and either temporarily disable the firewall or write specific rules to allow ICMP traffic
to be seen by the operating system.
So Thea Bonfire Walling, introduced in Vista that supported investigating Window seven
that was brought in for a number of reasons, none the least of which being things like botnets or other infection that not only reside on your machine but attempt to phone home to some bad guy server or malware server on the Internet
with outbound fire Walling invested in Window seven.
make changes to the firewall rules to block outbound traffic as well as protecting inbound traffic
windows Upgrade OS Advisor Windows Upgrade OS Adviser was a download
available for Windows seven to Tech Windows seven. System compatibility with hardware in applications,
Windows upgrade or s advisor has been suspended.
Now instead of Windows Upgrade, always Advisor, they have a
Windows Compatibility center.
You could see the girl on the screen, and you can see the compatibility center screen capture of that Web page.
So what they've done now, now the compatibility testers more universal.
You type the operating system. You want to get checked into the
input screen to input block,
you can download the specific tests that you want have run on your machine
to match the operating system you're concerned about.
Windows oh, upgrade always advisor has existed that it's been replaced
Bye compatibility Center