Saturday 15 March 2014

Windows 8.1: The Anti Malware Operating System

We all use one or more antivirus software, Internet Security Suite or a Firewall software on our Windows computer. We keep them updated, go for zero-day patches, and keep hunting forbetter combination of anti-malware for better protections. But what most anti-malware do is that they provide us with application level security. This is because the anti-virus is itself loaded as an application. With such a system, our computers are still at danger during boot and also while invoking any other program. What we need to tackle such threats is an operating system that works like an anti-malware.

The Anti Malware Operating System

Windows 8.1 has some good security features to counter malware. We’ll look at the feature while talking about possible vulnerabilities on any computer.

Trusted Boot

Any computer is most vulnerable just when you press the Power button. When it is booting, there is a time gap between loading critical OS components and then the anti-malware. This gap is used by many malware to manipulate the boot process and thereby compromise the computer or network.
Most of the advanced operating systems now apply different techniques to prevent boot-hijacking. One of the most accepted method is Trusted Booting. In this method, the operating system first loads a component that verifies if the other components being loaded are indeed operating system files or files need to run a particular application. If it finds any anomalies, the boot process is terminated.
Likewise, for “secure applications”, that are considered part of the operating system and which are required by the OS to work properly, the app signature is determined by the Trusted Start process. If it appears hazy, it won’t loadand you may or may not receive an error message based upon the nature of the application.

Windows 8 boot-time anti-malware protection

Windows 8 supports four protection features to help prevent malware from loading during the boot process
  1. Secure Boot. PCs with UEFI firmware and a Trusted Platform Module (TPM) can be configured to load only trusted operating system boot loaders. This is Secure Boot.
  2. Trusted Boot. Windows checks the integrity of every component of the startup process before loading it.
  3. Early Launch Anti-Malware. ELAM protection technology tests all drivers before they load and prevents unapproved drivers from loading.
  4. Measured Boot. The PC’s firmware logs the boot process, and Windows can send it to a trusted server that can objectively assess the PC’s health.
Coming to different applications we use on different operating system, we tend to rely on third party anti-malware which keeps analyzing the different processes on a real time basis and alert you when anything suspicious is found.

Robust Windows Firewall

Though the Firewall was bought in early with Windows XP, it was weak. With subsequent version of Windows like Windows Vista, Windows 7 and Windows 8.1, the OS bundled firewall became only better. It keeps a real time check on both incoming and outgoing packets and blocks any connection that acts suspicious. The only downside is (if you think it is) lack of alerts so people don’t know whether the firewall is indeed working. But you can always check the Firewall log from the Control Panel – Windows Firewall to see how the traffic/packets were handled. Today the Windows firewall is truly a robust one!

RAM compartmentalization

Along with the hack attempts bypassing firewalls, another problem with traditional operating systems is that they tend to mix up electronic memory (the RAM bytes) with one or more programs. For example, if you are running program A, B and C at the same time, and if there isneed for some data to be stored for program B, the operating system will simply put the data into the next available empty cells. These data cells are not isolated, so the other programs may snoop out or even write on them to infect the computer.
From Windows 7, and especially in Windows 8.1, the operating system provides a RAM compartment for each program and its data. That is, a kind of sandboxed RAM. Ifprogram A is running in compartment 2, program B cannot store its code or data into the empty RAM cells allotted to program A. If there is need for more storage, it falls back to paging file on Hard Disk.
In short, the operating system now takes care that each program runs in its own shell (designated area) and other programs cannot manipulate its data, thereby reducing the chance of malware attack and malware replication.
I do not know about Mac and Linux, as I did not study them in depth. I know the previous versions of Windows were vulnerable. However, with Windows 8.1, a trend appears to have been set where you get an “anti-malware operating system” that reduces vulnerabilities to least.
I hope I was able to express it clearly. If you have doubts on Measured Boot, Secure Boot or Trusted boot in Windows, or anything to add, please leave a comment below.

Configure & Limit Reservable Bandwidth Setting In Windows 8.1

In general, bandwidth is actually the rate at which data travels to and fro from your computer. In other words, bandwidth is the range covered for data transmission between an upper range and lower range. Bandwidth is usually controlled by your Internet Service Provider (ISP). However, there exists some settings in Windows, by configuring which you limit the reservable bandwidth for your system.
Primarily, Windows reserves the certain amount of bandwidth for its application requirements and operation purposes. By configuring its setting in the Group Policy, you can easily limit the reservable bandwidth. This article will show you stepwise, how to access or open up the reservable bandwidth on your Windows 8.

Limit Reservable Bandwidth Setting in Windows 8

1. Press Windows Key + R combination, type put gpedit.msc in Run dialog box and hit Enter to open the Local Group Policy Editor.
GPEDIT Configure & Limit Reservable Bandwidth Setting In Windows 8.1
2. Navigate here:
Computer Configuration -> Administrative -> Network -> Qos Packet Scheduler
 How To Configure Bandwidth Settings In Windows 8 8.1 Configure & Limit Reservable Bandwidth Setting In Windows 8.1

3. In the right pane of this window, look for the settings named Limit reservable bandwidth, it must be showing a Not Configured status by default. Double click on the same setting to modify it:
How To Configure Bandwidth Settings In Windows 8 8.1 1 Configure & Limit Reservable Bandwidth Setting In Windows 8.1

This policy setting determines the percentage of connection bandwidth that the system can reserve. This value limits the combined bandwidth reservations of all programs running on the system. By default, the Packet Scheduler limits the system to 80 percent of the bandwidth of a connection, but you can use this setting to override the default. If you enable this setting, you can use the “Bandwidth limit” box to adjust the amount of bandwidth the system can reserve. If you disable this setting or do not configure it, the system uses the default value of 80 percent of the connection. If a bandwidth limit is set for a particular network adapter in the registry, this setting is ignored when configuring that network adapter.

4. Now, in the above shown window, select Enabled and in the Options section; you could input the percentage for limiting the bandwidth. If you input 0 percent here, you can gain the reserved bandwidth reserved by the system.UPDATE: Do read the note below.
Click Apply followed by OK then. You may now close the Local Group Policy Editor and reboot the system with gained bandwidth.
Hope you find the tip useful!