But with the release of a new system of Microsoft learned that this rule does not always work: Vista became the largest marketing and trading company since the failure of Windows ME (Millennium Edition). Maybe that's why many opponents of Vista compared to those systems. But if they have indeed something in common? Was Vista second Millennium Edition? Of course, there are some parallels: in the ME because of the new model drivers older programs were not working or functioning properly. In Vista, there are the same critical mistakes. Most of the flaws Microsoft patched with Service Pack 1, but before that there was a whole year. But the similarity ends. Problems like bad connection to the Internet and the constant danger of freezing, have been in the ME, Vista does not have: a While based on MS-DOS Millennium Edition is highly vulnerable to pests, Vista shines all safety features.
In short, the methods of work on both systems comparable. Myth 6. One stroke. Windows – the main goal of hackers. The brave little tailor, who can put seven flies with one blow, not compete with the hackers, if they strike the web, far more computers become their victims. It is argued that the primary objective of hackers – it's Windows. This can be true name is very conditional, because the attackers are looking for weaknesses not only in the operating system.
The true source of danger – it's installed programs. Nostrum hackers – to send a user to a fake page and offer to download a program or codec, which is already built malicious scripts. The trend is clear: the danger comes from the rare Windows – more of a web-based applications such as browsers, email clients and Internet pagers. In order to effectively protect your PC, you should not simply hold monthly update Windows, but check all the programs on relevance. Myth 7. Vista. Obsessive protection. Some believe that the control system Account (User Account Control) is excessive. Remember in the book 'Alice in Wonderland' is only one lady, possessing absolute power: the duchess suppressed their subjects and quite a powerful effect on all nerves. Microsoft is not so harsh, but it prevents more – so say many opponents of Vista. One of the points of concern – a system of UAC (UAC): the prevention of corruption is too intrusive, there are too many and thus they can not be ignored. True, most often occurs on the newly installed system: Vista asks before every installation, whether the user wants to run and this program. But if all the basic settings are made, Vista user is unlikely to face with pop-up windows. If you want to completely disable the UAC system, it can be done via the 'System Management' under 'User Accounts'. But you remain without important safety function. Better level of protection you will achieve by creating two separate entries – user and admin: so only authorized users can make changes in system. This can be done via the menu 'System Management User Accounts Manage another account'. Alternatively, you can use Sandboxie, that make programs such as the browser to work in chroot?