Time
8 hours 33 minutes
Difficulty
Beginner
CEU/CPE
9

Video Transcription

00:05
Windows, Dex, desktop gadgets,
00:09
desktop gadgets. And they come the idea of sideshow
00:14
and sidebar.
00:16
We're all introduced in Windows Vista,
00:19
and initially they had a lot of interest.
00:22
There was just kind of a unique away to customize your desktop.
00:28
Excuse me?
00:30
Problem they ran into, um
00:33
it was a security issue. So we'll talk about
00:35
gadgets that will talk about the death of gadgets.
00:39
Who? Gadget taxi.
00:41
Today we would almost call the maps.
00:43
They were very similar to APS you'd put on a mobile device
00:47
s O. If you want that little clock that you see in the upper right hand corner,
00:51
you could have a little clock gadget
00:54
and it would create a a clock from the operating system. And give me that this way.
00:59
If you wanted a weather gadget,
01:00
you could point to a certain location and have that little weather gadgets to see
01:07
if you wanted
01:07
to see periodic pictures of some place. You get the picture. All the things we now think of is doing with APS on mobile devices they tried to do in
01:17
Windows Vista
01:19
in what they called the Vista sidebar,
01:22
which was a collapsible
01:23
sub
01:25
division of the main screen
01:27
for most people, knowing is on the right hand side. By the fall, you could move it.
01:32
But if you went over and dragged it over, you could see all these gadgets. And if you pushed it off, all the gun just went away.
01:38
Nice idea. However,
01:42
they didn't pass the security test.
01:44
There were some really fatal security flaws with the whole gadget concept.
01:48
And by July 20,020 12 Microsoft had recommended immediate discontinuation of all gadgets and of the sidebar in sideshow.
02:00
So they were a feature. They did exist.
02:04
Um, but there now
02:06
recommended to be disabled Investor in seven, and they were removed entirely from Windows eight.
02:15
Ready boost Ready Boost is an interesting concept.
02:20
Ah, lot of machines, a lot of hard drives. I'm sorry. Lot of
02:23
motherboards
02:24
have memory limitations, and they may not be able to support
02:28
four gigs of RAM.
02:30
If you're running a 32 bit system, they may only have engineered enough support in the motherboard to support one Yeager two gigs of RAM, especially in smaller systems or in laptops.
02:43
Already boost is a way to get around that problem.
02:46
The concept already boost is you take a USB drive, you take a, um,
02:53
as d card anything like that. With that kind of memory in it,
02:58
you can actually put it into
03:00
the laptop into the operator into the hardware.
03:05
And if you see a button there,
03:07
you can act. You press that button and and tell her to go to work. Has ready boost, and what it will do is it will take it and turn it into cash for the operating system. So instead of being
03:17
ah, USB thumb drive now, now it's a part of your operating system cache.
03:24
And if you think of how Windows generally did file swapping,
03:30
I'll swap. You usually went to the hard drive, and that made the file swapping very slow.
03:36
So if we needed virtual memory, virtual memory was created on the hard disk and very smoke in this world. What you do is you create virtual memory that the virtual memory, instead of being mapped too hard drive space is mapped
03:50
to the USB drive,
03:51
which operates about 10 to the four tender, the six times faster, depending on which version of us be and how good the memory stick. It is
04:00
so in Windows Vista could support up before gigs of external flash storage for system cache
04:08
when the seven can support
04:10
up to a 32 gigabits per device
04:14
at a pate devices for a total of 256 gigabytes of cash storage
04:19
on just for a security feature, the cash storage is encrypted and compressed, so if somebody came along and ripped you cash drive out, they couldn't access the contents of memory because the contents of memory would be encrypted.
04:34
So just a unique feature.
04:36
And it's especially useful for people who have older operating system from hardware. And they want to install this door. Seven on that hardware, and they find it's running smoke because of memory shortages. This is the way to get around that
04:57
when the security center
05:01
supported in X p an investor
05:05
is not a feature as much as it's a container.
05:10
The controls for firewall for operating system updates for anti malware. We're all under the window Security center in control panel.
05:19
When you got two windows this window. Seven. Rather than putting him in security center, they had separate
05:27
icons for each one
05:32
Shadow copy
05:36
Shadow copy is an interesting feature
05:41
Shadow copy is a way of making realty time online copies
05:46
of things that are happening in your operating system.
05:50
It can actually, in the newer versions, investor in seven shelter copies, copies storage at the block level. And what that means is when data is stored on your hard drive. It's not. Storage is a continuous stream. The hard drive is broken up into
06:08
chunks or blocks that can be ad dressed,
06:11
and Shadow Copy doesn't try to copy files. It copied blocks from the hard disk,
06:20
so
06:21
the captures can capture data at a given moment,
06:26
and then you can create backups from those captures.
06:29
The technology behind is pretty interesting. I'm gonna switch here, too,
06:39
my drawing space.
06:45
So if I have a hard disk here
06:51
having to put another hard dicks next to it,
06:58
the waste out of copy works in Windows Vista and Window seven
07:01
is if I'm trying saving something to the hard drive
07:09
Shadow Copy
07:11
will save it to two places at once.
07:15
Saying get to two places at once means you have two copies of everything.
07:21
So to make the shadow copy, the copy is already there. Where Shadow Copy does is when you say I want to have a copy. At this moment in time,
07:31
Shadow Copy just stops
07:34
making the second copy and says, Okay, I'm going to save that one
07:40
and create a new
07:42
shadow copy
07:44
and start over again.
07:47
So shadow copy can make as many shadows as you want. As always, you don't run out of Dr Space. Each one of them will have
07:57
the state of the hard drive or the state of whatever part of the hard drive you told it to shadow
08:03
as, ah,
08:05
some date in time when you said
08:07
That's the instant in time that I want to maintain that copy.
08:13
So pretty neat little system,
08:16
very similar. If you know anything about computers and raid levels,
08:22
this would be equivalent to raid one and then, at some point being able to just
08:26
cut off one of the hard drives and say, Okay, now I've got a copy at this moment in time
08:33
of the drive
08:35
uses.
08:43
If you look at the uses for Shadow copy,
08:50
Shadow copies would enable system restore
08:54
So you have system restoring Windows Vista system, restoring a window seven
08:58
and you either mess something up yourself or there's a failure in the system or you've installed something that won't come out. You want to roll back
09:09
and you go back. The system Restore system restore have been periodically snapshot in your hard drive state
09:16
of certain components and allows you to roll back Twitter when your time well, the way it does it is. It's using Shadow copy function.
09:24
It pre identifies the operating system files that it wants
09:28
to copy,
09:30
copies them and has periodic schedules for
09:33
making
09:35
the Seattle snapshots.
09:37
And that's what allows you to roll back.
09:39
You could do the same thing by creating your own Chava copy
09:43
configuration to copy
09:46
files for a project. All the files in my documents, however, you like to do that and make sure they're copies of them.
09:54
The advantage of Shadow copies If you can read on the screen,
10:00
it cocked. One of things it does is it copies active files at a certain state,
10:05
and the other thing is it overcomes file locking issues, and both of those have to relate to the fact that normally you can't copy a file that's open,
10:16
but without a copy, there's actually two sets of files.
10:20
There's theme
10:22
working set that your applications running off. And then there's the duplicate er shadow set.
10:28
So if you want to create a backup at a certain point in time, you can create that back up very easily by backing it up off the shadow set
10:37
because the Shadow said isn't open.
10:43
So that's how it overcomes active file and file locking issues when it comes to creating backups.
10:50
And its technology has been used at large system levels for a long time.
10:54
Because if you think of Mart's databases that never get turned off because they're always running without some way to do that, you'd never be able to have backups of operating database
11:05
handle. Shadow copy does is extends that
11:09
server functionality down to a
11:13
host machine.
11:16
So system restore.
11:18
We just talked about it being
11:22
enabled by Satya Copy.
11:26
So there is a system restore function X p.
11:30
But the system restore function
11:31
operates much better. Invest in seven because this have a copy got improved
11:37
if you see the screen on the right hand side, What that is is just a screen capture of the automatics. Have a copy is occurring on a laptop
11:46
every time there was a Windows update. It created another shadow copy and that show those shadow copies exist so that if the Windows update corrupted something or major system unusable, you could roll back to before the update.
12:01
So, you see, all these shadow copies are just different Role back points.
12:07
If you see what system restored
12:11
captures, it captures system files,
12:16
applications, registry settings and system settings.
12:20
It does not
12:22
copy your data files,
12:26
so if you do a roll back to an earlier version, you don't lose the letter you wrote yesterday.
12:35
You get to system restore. You can get there via
12:37
accessories system tools.
12:43
It will also come up automatically if your system fails to boot and you throw it into repair mode. One of the things that Alaska is do you want to
12:52
restored to an earlier date an earlier time.
12:56
And if you say you want to restore your system to an earlier time, it's actually accessing system restored.
13:07
So user account control
13:11
user account control didn't exist in with those. X p didn't exist in
13:15
98 95 didn't exist in you dos.
13:20
The idea of user account control
13:22
is an extension of security
13:26
if you go back to the DOS world. There were no user accounts, nobody logged on. There were no passwords. Windows 95 Windows 98 passwords are optional, but you'd actually bypassed the log on screen just by hitting the escape key.
13:41
So by the family got two Windows NT Windows 2000. You actually were required to have a log on to get into the operating system. To get to the desktop
13:54
and a lot of people,
13:56
things will go one of two ways
13:58
you need to be a privileged user like you were the administrator or you see, a lot of people would even log on his administrator.
14:07
And once you are on his administrator, you could do anything
14:11
that creates a problem. Because if you can do anything,
14:13
then the mall where you accidentally download can do anything
14:18
because the now where can now operate with administrator privileges, wipe out the hard drive, kill your whole system.
14:28
Option B is that people had unpublished account. So you log on, you'd have an unpublished account.
14:35
Problem was with the unprivileged to count. You couldn't update java. You couldn't have a printer. You couldn't do anything because you had no privileges.
14:45
So the idea of user account control
14:46
has two functions. One function is you can take in normally. Unclear which user
14:54
and
14:56
if you're operating, is that unprivileged user. But you know the administrative account,
15:00
then you can do most of your jobs has unprivileged user.
15:03
Then when you do want to update that printer driver
15:09
and
15:09
the little window pops up and says, Do you want to do this and you say yes.
15:16
If you weren't in with the proceeds to count, it would ask you to log in as administrator.
15:22
Ah, the other feature is even if you are an administrator.
15:28
The administrator doesn't normally operate with administrative privileges.
15:31
The administrator has the administrative privileges, but they're essentially suspended.
15:37
When you need to do something that requires your administrator role. Administrative privileges, you get this pop up screen that says, Do you really want to do this and give you a yes or no?
15:46
Since you're already log on his administrator, you don't have to re authenticate.
15:50
But it's kept those background functions. It kept viruses. It kept unexpected activities from just happening on their own because you happen to be log in as administrator
16:04
when they initially put this in, they put it in Windows Vista
16:08
and Windows Vista, where people thought was it pops up too often. It popped up for the wrong reasons.
16:15
So they tweaked it and a window. Seven.
16:18
Uh, if it was an application,
16:22
but the application was signed digitally signed by Microsoft,
16:26
then it didn't ask for permission because it was assumed to be
16:30
a safe app
16:32
that stopped a lot of the pop ups that people that were unnecessary and people were much happier with user account control in Window seven.
16:41
But Windows seven and the concept of user account control
16:45
has
16:47
greatly reduced the threat of bad things happening without your knowledge on the computer.
16:53
The hard part now is people in the habit of saying yes all the time, say yes no matter what,
16:59
and that diminishes the value of user account control, because if you say yes without knowing why, then you may still allow bad things to happen.
17:12
Windows Defender
17:17
Windows defenders supported in Next P supported investors supported in Window seven,
17:22
it was actually a company Microsoft bought called Giant.
17:26
They renamed it Windows Defender
17:30
and was originally an anti spyware application
17:33
Windows defender since been superseded by Microsoft.
17:37
Microsoft still has Windows Defender,
17:41
but
17:41
now they're, um,
17:44
primary system is Microsoft Security Essentials.
17:47
If you install Microsoft Security essentials, Windows defenders uninstalled,
17:53
however. Four. Windows eight.
17:56
They took Microsoft's Defender Windows Defender and upgraded it to full anti malware support.
18:03
So Windows eight, you'll find
18:07
if Windows Defender is now the new and I'm hours system running in Windows eight.
18:14
Windows Firewall.
18:17
When his firewall was first supported in Windows X P,
18:21
it was improved and
18:23
put into Windows Vista and Window seven
18:26
in Windows X P.
18:30
Initially, firewall was installed in all versions of Windows X P, but it was disabled by default until a number of significant attacks on Windows systems
18:41
in 2000 to 2003
18:45
where Microsoft decided in service back to to turn on
18:48
the firewall by the fall.
18:52
The difference in Windows X P All versions Windows X P is the firewall blocks Incoming activity Potentially bad activity coming into the Windows X P box
19:03
in Windows Vista and Windows seven. It can not only control inbound traffic, but it also can control outbound traffic.
19:15
Windows Firewall is an intelligent firewall,
19:18
meaning it already knows the minimum applications that are needed to run Microsoft
19:23
Apple in the Microsoft operating system. So if you're in the domain and you need to talk to the domain controller, the ports to the domain controller are automatically open on the firewall.
19:36
However, if you find the tour in a especially in a business environment,
19:42
one of the surprising things you'll find until you get used to it, you'll go to Ping Some Windows Machine. You're testing connectivity from a server back to a work station, and the work station won't pay.
19:55
The reason the workstation won't pain is that pings are blocked by the firewall.
20:00
So if you want to see Ping's work back to X P or Vistors window seven,
20:03
you actually have to go in and either temporarily disable the firewall or write specific rules to allow ICMP traffic
20:14
to be seen by the operating system.
20:19
So Thea Bonfire Walling, introduced in Vista that supported investigating Window seven
20:25
that was brought in for a number of reasons, none the least of which being things like botnets or other infection that not only reside on your machine but attempt to phone home to some bad guy server or malware server on the Internet
20:42
with outbound fire Walling invested in Window seven.
20:47
You can
20:48
make changes to the firewall rules to block outbound traffic as well as protecting inbound traffic
21:03
windows Upgrade OS Advisor Windows Upgrade OS Adviser was a download
21:07
available for Windows seven to Tech Windows seven. System compatibility with hardware in applications,
21:15
Windows upgrade or s advisor has been suspended.
21:19
Now instead of Windows Upgrade, always Advisor, they have a
21:25
Windows Compatibility center.
21:27
You could see the girl on the screen, and you can see the compatibility center screen capture of that Web page.
21:37
So what they've done now, now the compatibility testers more universal.
21:41
You type the operating system. You want to get checked into the
21:45
input screen to input block,
21:48
and
21:51
you can download the specific tests that you want have run on your machine
21:55
to match the operating system you're concerned about.
21:59
So
22:00
Windows oh, upgrade always advisor has existed that it's been replaced
22:03
Bye compatibility Center

Up Next