Content deleted Content added
Rescuing 4 sources and tagging 0 as dead. #IABot (v1.6.1) |
|||
Line 191:
|df=
}}</ref> [[Avast Software|avast!]], [[Avira|Avira Anti-Vir]] and [[Sophos]] do not patch the kernel in default configurations, but may patch the kernel when features such as "advanced process protection" or "prevent unauthorized termination of processes" are enabled.<ref>{{cite news
|first = Robert
|last = Jaques
|title = Symantec and McAfee 'should have prepared better' for Vista
|url = http://www.vnunet.com/vnunet/news/2167016/symantec-mcafee-should-prepared
|publisher = vnunet.com
|date = 23 October 2006
|accessdate = 30 November 2006
|deadurl = yes
|archiveurl = https://web.archive.org/web/20070927195203/http://www.vnunet.com/vnunet/news/2167016/symantec-mcafee-should-prepared
|archivedate = 27 September 2007
|df =
}}</ref>
Line 210 ⟶ 214:
|publisher=[[InfoWorld]]
}}</ref> Instead, Microsoft worked with third-party companies to create new [[Application Programming Interface]]s that help security software perform needed tasks without patching the kernel.<ref name="Allchin"/> These new interfaces were included in [[Windows Vista#Service Pack 1|Windows Vista Service Pack 1]].<ref>{{cite web
|url = http://technet2.microsoft.com/WindowsVista/en/library/005f921e-f706-401e-abb5-eec42ea0a03e1033.mspx?mfr=true
|title = Notable Changes in Windows Vista Service Pack 1
|publisher = [[Microsoft]]
|year = 2008
|accessdate = 20 March 2008
|deadurl = yes
|archiveurl = https://web.archive.org/web/20080503040732/http://technet2.microsoft.com/WindowsVista/en/library/005f921e-f706-401e-abb5-eec42ea0a03e1033.mspx?mfr=true
|archivedate = 3 May 2008
|df =
}}</ref>
Line 262 ⟶ 270:
Nevertheless, Microsoft has stated that they are committed to remove any flaws that allow KPP to be bypassed as part of its standard Security Response Center process.<ref>{{cite news
|last = Gewirtz
|first = David
|title = The great Windows Vista antivirus war
|url = http://www.outlookpower.com/issuesprint/issue200611/00001883.html
|publisher = OutlookPower
|year = 2006
|accessdate = 30 November 2006
|deadurl = yes
|archiveurl = https://web.archive.org/web/20070904075535/http://www.outlookpower.com/issuesprint/issue200611/00001883.html
|archivedate = 4 September 2007
|df =
}}</ref> In keeping with this statement, Microsoft has so far released two major updates to KPP, each designed to break known bypass techniques in previous versions.<ref name="Introduction"/><ref name="Microsoft Security Advisory (914784)"/><ref name="Microsoft Security Advisory (932596)"/>
Line 290 ⟶ 302:
|work=Jeff Jones Security Blog
}}</ref> Still, for other reasons a x64 edition of Windows Live OneCare was not available until November 15, 2007.<ref>{{cite web
|url = http://windowsvistablog.com/blogs/windowsvista/archive/2007/11/14/upgrade-to-next-version-of-windows-live-onecare-announced-for-all-subscribers.aspx
|title = Upgrade to Next Version of Windows Live OneCare Announced for All Subscribers
|last = White
|first = Nick
|work = Windows Vista Team Blog
|publisher = [[Microsoft]]
|date = 14 November 2007
|accessdate = 14 November 2007
|deadurl = yes
|archiveurl = https://web.archive.org/web/20080201162836/http://windowsvistablog.com/blogs/windowsvista/archive/2007/11/14/upgrade-to-next-version-of-windows-live-onecare-announced-for-all-subscribers.aspx
|archivedate = 1 February 2008
|df =
}}</ref>
|