Commentary Logo
Japan Island disputes in Southeast Asia    World War III Alarm Anti-Islam video and anti-US sentiment    Skull Say no to brainwashing

       peace and anti-war Israel Iran strike imminent    sanctions as a result of nuclear tests Sanctions on Iran and workarounds    black lightning bolt India's massive blackout

Snapshots of news
Gearheads and mastheads
Home  •  About this site  •  How did we once fight corruption in colonial Hong Kong?
 •  Historical US administrative thoughts  •  USA versus colonial Hong Kong
 •  Anti-corruption review of Nigeria  •  Procurement monitoring in Nigeria
 •  Syndicated news  •  Usman's blog  •  Anti-graft news  •  Socialist news

 Saturday, February 24 2018 6:16am Hongkong Time

Posted Sep 8, 2012

Back to Blog Index   

4 Radical Ways In Which Microsoft Has Made Windows 8 More Secure

Microsoft is just a month and a half away from releasing it's most ambitious OS version in the market. Yes I am talking about Windows 8 which has been receiving mixed reviews lately by bloggers and the press likewise.  Microsoft hopes that Windows 8 will usher the era of tablet computing with it's bold Metro styled design, apps and off course security.

Windows 8 Start 4 Radical Ways In Which Microsoft Has Made Windows 8 More Secure

Security has been a challenge to balance and counter on the Windows ecosystem as millions of Viruses, malware and other threats keep on coming and attacking users on a  daily basis. Microsoft had reduced the chances of being attacked via introducing some robust security mechanisms in Windows 7 which it is taking forward and improving upon in Windows 8. Lets look at some of the bold new measures taken by Steven Sinofsky's team.

1) Microsoft Security Essentials Comes Installed By Default : Attacks Other Security Vendors

Windows Defender 570x401 4 Radical Ways In Which Microsoft Has Made Windows 8 More Secure

Never has it been that Microsoft has installed a version of its own security software within Windows by default. Maybe this time Microsoft is taking no chances on the users who either don't go for 3rd party paid or free security software or don't care about security that much. Microsoft knows that if works on the model of security first, the Windows ecosystem which has been punished for it's security loopholes would be much appreciated for caring about users right from the word go. Microsoft security Essentials is a pretty neat software itself which helps you in enjoy protection from viruses, spyware, Trojan horses, rootkits, and other malware from the very first day you turn on your Windows PC–without installing any additional software or even spending a cent. Yes you heard us right the software comes in for FREE.

This does, however attack on Microsoft's partner ecosystem and other security vendor relations as  their entire portfolio is being taken care of by Microsoft itself hence from a revenue stand they must be worried on how to tackle Microsoft.

Editor’s note: Windows Security Essentials has been merged into Windows Defender in Windows 8. So you will not be able to install Windows Security Essentials in Windows 8 as Windows Defender is already doing the job of protecting you from malware.

2) Screening Downloads For Security Vulnerabilities

SmartScreen Filter 570x215 4 Radical Ways In Which Microsoft Has Made Windows 8 More Secure

SmartScreen technology was introduced by Microsoft in Internet Explorer 9 which helps the users to be aware of phishing sites, malware and Trojans infected download files on the fly using Microsoft's ThreatSense Database engine. Now with Windows 8, SmartScreen is built right into the Operating System and is triggered by any program be it Chrome, Office, Adobe Acrobat etc. The way it works is simple, any program asking for a download of any kind passes the checks by SmartScreen and if it detects any suspicious activity, the user is warned and is asked to take the appropriate decision. Pretty smart I must say as Microsoft is protecting the whole ecosystem and not just it's own apps.

In Windows 8, the first time you run a program that you downloaded from the Internet, the SmartScreen Filter checks it against a list of known safe applications, and alerts you if it is unknown and therefore has the potential to be malware. If the alert does pop up, you could then further investigate the program (and the source where you downloaded it) before running it.

SmartScreen produces an alert if you run an unknown program.

3) Goodbye BIOS Boot, Welcome UEFI (Unified Extensible Firmware Interface)

UEFI 4 Radical Ways In Which Microsoft Has Made Windows 8 More Secure

If you have been using a PC or a laptop even, one thing is for sure, you must have heard the term BIOS. Yes it's is background ecosystem that helps your system detect an Operating System and boot up, but now Windows 8 Microsoft is introducing a radical and a much faster bootstrap technology called UEFI (Unified Extensible Firmware Interface). Not only does this new technology make your PC go in salute mode in less than 10 seconds but predicts any kind of USB, disc or network attack being made in forms of  advanced malware (such as bootkits and rootkits) to protect you. Pretty darn nice.

4) Password What Password?, Introducing Picture Gesture and PIN Protection Technology

Picture password in Windows 8 4 Radical Ways In Which Microsoft Has Made Windows 8 More Secure

Since Windows 95 the most common interface a user of Windows Operating System has seen has been the first screen that ask for a password to enter .  Microsoft is removing the clunky methodology and has introduced two password types that you can use when logging in to your Windows account.

1) Picture passwords

2) PIN passwords

Picture password are pretty cool in their usage as you have to choose a photo or an image and draw three gestures (a combination of circles, straight lines, or taps/clicks) in different places to create your "password."

PIN password work similar to that of ATM's. You just enter a numeric PIN you remember easily and voila you are in, that is fast, easy to remember and secure.

Leave us your thoughts on how you find Windows 8 more secure.

4 Radical Ways In Which Microsoft Has Made Windows 8 More Secure is a post from: Technize.NET

Back to Blog Index   

© Usman Khurshid. Reproduced with permission of the copyright owner.


  04/06   Fix USB Device Not Recognized In Windows
  27/05   Using Windows Check Disk (CHKDSK) The Right Way
  26/05   Configure Windows Update Settings In Windows 8
  24/05   Install/Uninstall All Pre-Installed Metro Apps In Windows 8
  20/05   How To Close TCP/UDP Ports In Windows 8 For Better Security
  14/05   "Microsoft Adds Google Chat Support In \x{2013} Here\x{2019}s How To Enable It"
  09/05   How To Enable/Disable Metered Connection In Windows 8
  09/05   Why Using Keygens In Windows 8 Is Not A Good Idea
  09/05   Unhide Files And Folders By Single DOS Command
  08/05   How to Fix Internet Explorer Crashes
  08/05   3 Ways to Enable Remote Desktop Connection In Windows 7
  07/05   How To Enable/Disable Windows Defender In Windows 8
  07/05   Download Skype 6.5 Offline Installers With Video Messaging Support
  04/05   How To Enable Insert Key In Microsoft Word 2007, 2010 and 2013
  04/05   Check Disk (chkdsk) Runs Every Time Windows Starts
  01/05   3 Ways To Enable Super Administrator Account In Windows 8
  29/04   4 Ways To Enable Secure Logon (Ctrl + Alt + Del) In Windows 8
  29/04   Extract List Of Installed Programs In Windows Without Using Any Third Party Software
  28/04   How To Fix Wmploc.dll Version Error In Windows Media Player
  26/04   Extend Office 2013 With 180 Day Trial License
  26/04   iOS 6 Theme For Windows 8 Makes Your PC Look Like iPhone
  18/04   Download Office 2010 Service Pack 2 Beta
  09/04   Windows 8 And Windows Phone 8 Will Be Integrated In Windows Blue
  28/03   Everything You Need To Know About Windows Blue
  24/03   7 Ways to Customize Ribbon UI in Windows File Explorer
  20/03   How To Make Microsoft Word 2013 Touch Friendly
  14/03   Beginners Guide to Microsoft Windows Journal For Tablets
  12/03   How To Be More Productive Using Microsoft OneNote 2013
  11/03   Internet Explorer 10 For Windows 7 Final Offline Installers Direct Download Links
  11/03   Make a Business Calendar with Microsoft Word 2013
  07/03   Add Multiple Timezone Clocks as Desktop Widgets in Windows
  05/03   5 Productive Tips For Windows File Explorer In Windows 8
  28/02   5 Easy Ways To Increase Windows PC Speed Without Installing Additional Software
  22/02   Microsoft Security Essentials 4.2 Full Offline Installers [Direct Download Links]
  22/02   Parental Controls in Windows 8 [Complete Guide]
  20/02   Remove Multiple Windows 8 Store Apps At Once
  19/02   7 Quick Ways To Shutdown Windows 8
  16/02   Play Music and Create Playlists in Windows 8 Xbox Music App
  16/02   How to Use Reader Metro App In Windows 8 [Complete Guide]
  16/02   Download Skype 6.2 Offline Installers [Direct Download Links]
  15/02   Recovering Windows 8 Product Key From BIOS
  07/02   Fake Microsoft Office 2013 Activators And Product Key Generators
  06/02   Windows 8 Touch Gestures And Keyboard Shortcuts Cheatsheet
  05/02   "Mastering Windows 8 Search \x{2013} An Advanced Guide"
  01/02   Block Internet Explorer 10 Automatic Updates In Windows 7
  29/01   Windows 8 Productivity Tips And Hidden Features
  23/01   Get Windows 8 Ribbon Bar In Windows 7 With Better Explorer
  18/01   Messenger Contacts Not Showing In Skype Solution
  17/01   Get Microsoft Office 2013 For Less Then $10
  11/01   Jailbreak Windows RT To Run Third Party Apps
  10/01   Download Skype 6.1 Offline Installer [Direct Download Links]
  02/01   How To Create Restore Points In Windows 8
  01/01   Solution To Microsoft Surface Tablet Cover Split Problem
  30/12   Complete Guide To Run Commands
  27/12   How To Automatically Shutdown, Restart Or Logoff Windows At A Specific Time
  15/12   15 Unique And Useful Windows 8 Keyboard Shortcuts
  15/12   3 Ways To Enable Remote Desktop Connection In Windows 8
  14/12   Download Adobe Reader Metro App for Windows 8
  09/12   How To Use Excel Sorting and Filtering Options With Ease
  06/12   How to Fix Slow Loading Downloads Folder in Windows 8
  06/12   Download Windows Software Development Kit (SDK) For Developing Windows 8 Apps
  03/12   Fake Windows 8 Product Key Generators
  02/12   How To Install Windows 8 Over The Network (LAN)
  27/11   Two Ways To Enable Telnet Client In Windows 8
  27/11   Create ISO Files Using Command Line In Windows 8
  26/11   Windows 8 Security: How Secure Is Windows 8?
  24/11   How To Login With A Different User Account In Windows 8
  16/11   Office 2013 RTM Final Direct Download Links
  14/11   "Download Microsoft Office 2013 Proofing Tools \x{2013} Fonts, Spelling, Translations [All Languages]"
  13/11   Download Internet Explorer 10 For Windows 7 (All Languages)
  10/11   How To Use Startup Folder To Add Or Remove Items In Windows 8 Startup
  10/11   How To Remove Synchronization Data In Windows 8 With A Microsoft Account
  10/11   Buy And Download Windows 8 Using Windows 8 Upgrade Assistant
  06/11   Download Windows 8 For Dummies And Introducing Windows 8 E-books Free
  05/11   How To See CPU Utilization Of All Cores (Logical Processors) In Windows 8
  16/10   What Is Microsoft Surface? Full Technical Specifications And Pricing Revealed
  09/10   Windows 8 Updated Even Before Service Pack 1 (KB2756872)
  07/10   Microsoft Issues DMCA Notices Against BBC, CBS, CNN, Wikipedia And The US Government
  06/10   First Windows 8 Laptops Available On HSN
  06/10   Microsoft Office 2013 Security Cracked By ElcomSoft
  06/10   Windows 8 Pro And Windows Server 2012 Pricing Leaked
  05/10   Microsoft To Raise Product Prices By 25% In India
  04/10   Exciting Changes To Windows 8 Built-In Apps
  04/10   Microsoft Acquires PhoneFactor, A Multi Factor Authentication Company
  02/10   How To Fix And Resolve Internet Explorer 10 Crashes
  01/10   How To Manually Install Language Packs In Windows 8 ( Files)
  30/09   Download Microsoft Security Essentials 4.1 Full Offline Installers (All Languages)
  28/09   Download Microsoft Security Essentials 4.1 Full Offline Installers (All Languages)
  25/09   How To Search Windows 8 Store Apps
  24/09   Windows Server 2008 Official Support Will End In January 2015
  24/09   Open And Edit Any Post In Windows Live Writer 2012
  21/09   Upgrade Previous Version Of Windows To Windows 8
  18/09   Download Free E-Books From Microsoft Press
  18/09   5 Windows 8 Compatible Audio Players You should Not Miss
  17/09   Windows 8 Surface RT Tablets Will Have FREE Edition Of Office Installed
  14/09   Download Skype 5.11 Offline Installer With Facebook/Microsoft Account Login
  13/09   Windows 8 Metro Apps Is Now Windows Store Apps
  12/09   Enable/Disable App Notifications In Windows 8
  08/09   4 Radical Ways In Which Microsoft Has Made Windows 8 More Secure
  23/07   Download Microsoft Office 2013 Customer Preview (Offline Installers)
  23/07   Windows 8 Release Date In October, How To Upgrade Cheaply?
  01/06   How To Install Windows Media Center In Windows 8 Release Preview
  31/05   Download Visual Studio 2012 Release Candidate For Windows 8 (All ISO Images)
  31/05   Download Windows Server 2012 Release Candidate (ISO And VHD)
  31/05   Windows 8 RTM Release Date Leaked
  31/05   Download Windows 8 Release Preview (All Languages)
  29/05   Windows 8 Release Preview Chinese Edition(build 8400) leaked
  29/05   Upgrade From Windows 7 To Windows 8 In $14.99
  25/05   How To Remove System Tray Icons In Windows 7
  23/05 Social Network By Microsoft. Is It For You?
  16/05   Upgrade From Windows 7 To Windows 8 In $14.99









Usman Khurshid is a network consultant who works in a mixed environment of Windows and Linux platforms. He studies about the latest advancements in computer technology and shares his views on this technology blog.

Email Usman at usman {at} technize {dot} com

Commentary and reflection pages by Raymond Cheng, PhD DPA FRSA

  Main • Commentary   Special Foci • Syndicated News | Corruption | Socialism | GuanXi

  Health Related • Traditional Chinese Medicine   Others • OXLL

© 1997-2014 The Commentary, Office of Dr Raymond Cheng. All rights reserved. Copyright of selected news articles, the headlines and logos belongs to the respective entities. Read disclaimer

Digital platform powered by Wyith Limited, Wyith Institute. Wyith Limited and Wyith Institute are associated businesses operated by the Office of Dr Raymond Cheng • Dr Raymond Cheng & Partners Ltd and The Commentary Ltd.

Home  •  About this site  •  How did we once fight corruption in colonial Hong Kong?
 •  Historical US administrative thoughts  •  USA versus colonial Hong Kong
 •  Anti-corruption review of Nigeria  •  Procurement monitoring in Nigeria
 •  Syndicated news  •  Usman's blog  •  Anti-graft news  •  Socialist news

Contact the editor at raymond {dot} cheng {at} kellogg {dot} oxon {dot} org

The RendezvousBuildersCommentatorsContributorsReadersResearchers
Reflection Pages • Miscellaneous Stuff
The difference between instant evaluation and improving recognition – November 20
Freddy Krueger revisited: Politically correct education? – October 23
From the evaluator's perspective: Justified conclusions and decisions – October 8
Online and distance-learning degrees from the evaluator's perspective – September 25
The moment fake degrees turned recognized and appraised – September 9

Photo credits for top title bar, from left to right: Iza H (Work), Lukasz Gumowski (Blue balls), Marcin Bania (Smiling and naked), Lautaro Gonda (Milan station), Jan Abt (Girl taking a picture), Daniel Tang (Hot switch), Barbara Henry (Moriah reading), Ralf Herrmann (Checkmate II), Marko Roeper (Led #4), Ian Russell (Girl in downtown LA).
Note: Animated GIF graphics and clipart obtained from,,, and Sketches, cartoons and other handdrawings courtesy of Alice-the-Artist.

Special Alert! This is *NOT* the American Jewish Committee's Commentary Magazine! Special notice! This is not the American Jewish Committee's Commentary Magazine nor are we in any way affiliated with them. To visit AJC's magazine, please go to instead, thank you for your attention.
Memo with pin Technical memos for members
Receiving using Gmail | Sending using Gmail
0x800ccc0e | 0x800ccc19 | 0x800ccc79

This site is best viewed with Microsoft® Internet Explorer 6.0 or above, minimum 1024x768 16M color-depth resolution. The Commentary Group and its personnel do not endorse external sites and are not responsible for the content of these websites. All external sites will open in a new browser window.

COUNT ON THE STATISTICS  100% Towels (c) Daniel Chittka
Photo © Daniel Chittka

This new section contains some interesting statistics in bribe and corruption, please check back for more as we pile up our numbers!

It's statistics time!  Using n-gram: kickback, graft, bribe and corruption - Comparison of their historical occurrences from 1810 to 2009 A.D.

  The word guanxi (collocation) and meanings of bribe: Deeply rooted, disgusting, sad endings

Search for a domain name - no obligation!
 enter a name, word or phrase
 choose an extension
 click go!
Looking for a good book (c) Doug Logan
Photo © Doug Logan
tagged by area of interestBY AREA OF INTEREST
Pragmatics: Politeness trends from the historical perspective of global trade
Computer mediated communications: Social network – Came riding the waves of amazing coincidences
Language acquisition:
A critique on "A corpus driven study of the potential for vocabulary learning through watching movies"

Grammatical analysis: "When a linguist stumbled upon a Buttonwood"
Lexicon and the corpus: "John Sinclair's lexical items – an introduction"
tagged by regionBY REGION • Anything AsiaUS Presence in Asia
Communist ChinaNationalist TaiwanHong Kong and MacauJapanKoreaSingaporeMalaysiaPhilippinesPakistanIndiaAfghanistan0 • Vietnam, Laos, Cambodia, Thailand and MyanmarTimor-Leste and IndonesiaMongoliaNew Zealand and Australia
tagged by topicsBY TOPIC • BiofuelRhino and elephant poachingAmerican movies hit China marketChina Internet censorshipChina's outward FDI opportunitiesGlobal rice yield
GLUCK ON SOCIALISM AND CHINA Asia (c) Robert Churchill
Photo © Robert Churchill

Professor Sidney Gluck (c) Sandi BachomI am honored to have obtained Professor Sidney Gluck's (right) permission to allow me to repost here some of his work and interview related to China and socialism. Professor Gluck is professor emertius at the New School University in New York. A classical Marxist, Gluck has been studying China for 60 years in history and modern development. He has lectured all over the U.S. and still welcomes engagement at the age of 94 – photo © Sandi Bachom


COMING 2014 – COMPUTING CORPUS Active Network Hub (c) Phil Sigin-Lavdanski
Photo © Phil Sigin-Lavdanski

Oh, please do not get me wrong. This new section is not about computers, electronics or any engineering stuff, but rather I am currently constructing a new corpus based on Spectrum, the monthly publication from the Institute of Electrical and Electronics Engineers USA, from July 2007 to date. Having been a member for over 20 years since 1992, I am always fascinated by some of the terms scientists use when they talk about or envision their new inventions or methodologies. How many of them eventually come into practice? Could there be some insights we could possibly derive, from the linguistics perspective?


This website is published and designed by
Raymond Cheng, PhD DPA and reflects only his personal views and opinions in his individual capacity. It does not represent the views and opinions of his firm, employer(s), students, etc., and is not in any way sponsored or endorsed by any other thrid parties. Click here to read my full disclaimer

Share on Twitter  Add to Facebook  Share on LinkedIn  +1 on Google