What Are the Pros and Cons of Microsoft Operating Systems?
Microsoft Windows operating system is a set of operating systems developed by Microsoft Corporation in the United States. It came out in 1985. At first, it was only a Microsoft-DOS simulation environment. The subsequent system versions are not only easy to use, but also the most widely used. operating system. [1]
- 1. Excellent man-machine operability of Windows operating system.
- The operating system is a platform for people to communicate using computer hardware. Without good man-machine operability, it is difficult to attract users. In the field of mobile phones, Nokia mobile phones can occupy half of the mobile phone market. Good interoperability of mobile phone operating systems is one of the important factors for its success, and its rapid decline is also due to the outdated operating system. The Windows operating system can be a mainstream operating system for personal computers, and its excellent man-machine operability is an important factor. The Windows operating system has a friendly interface, beautiful windows, easy to learn operations, and good inheritance between multiple generations of systems. Computer resource management is more efficient and effective. [5]
- I. Windows 1.0
- The Windows series of network operating systems have successively launched multiple versions, and each version has its unique characteristics and scope. [11]
- Windows Mobile is Microsoft's "mobile version of Windows" for handheld devices. Devices that use the Windows Mobile operating system are mainly smartphones, personal digital terminals, and portable music players. The predecessor of Windows Mobile was Windows CE introduced at the end of the 20th century, followed by Windows Mobile 2003 and Windows Mobile 5.0 in 2003 and 2005. Windows Mobilc 6.5 was launched in 2007. [12]
- 1. Vulnerability
- Vulnerabilities are defects in hardware and software. Or the designer's defects in the design of software and hardware and implementation, also known as "bugs." Illegal users can use vulnerabilities to invade computers to increase their permissions or obtain additional permissions, thereby disrupting the normal operation of the system. The vulnerability itself does not harm computer systems. [13]
- 1. Strengthen Windows user account authentication and access control permission control
- Windows user accounts can confirm the identity of users who access system resources, which is the key for users to obtain system access. In current windows systems, identity authentication is usually performed by account and password authentication. Therefore, the security settings of user accounts and passwords are very important. For example, in the Windows system, you can open the "Local Security Policy" in the "Administrative Tools" in the "Control Panel" and find the "Password Policy" and "Account Lockout Policy" under "Account Policy" for security settings. From the perspective of account security, account passwords must have certain complexity and length requirements. You can enable "Passwords must meet complexity requirements" and set the "Minimum password length" to more than 8 digits. In addition, select "Account Locking Policy" and set "Account Locking Threshold" and "Account Locking Time" according to the security policy. In this way, when the number of invalid logins of a user account exceeds a specified threshold, the user will not be able to log in to the system within the set lock time. [14]
- 2. Make a Windows system backup
- Through the "Backup and Restore" in the windows control panel, you can protect the system from running normally and stably due to viruses or hacking, and avoid data loss or damage caused by accidental loss of the system. When the system is backed up, it is recommended that the system function is normal and common application software is installed to ensure that the backup is performed without viruses or Trojans. [14]
- Drive encryption using WindowsBitLocker
- You can right-click the hard disk partition that needs to be encrypted in My Computer, select "Enable BitLocker" function, and follow the BitLocker encryption wizard. The BitLocker encryption function is also effective for removable storage settings such as a USB flash drive. As long as the BitLocker function is enabled, devices such as mobile hard disks can be encrypted to prevent leakage of private information caused by the loss of these mobile devices. [14]
- 4, open the windows firewall
- As an important technology for realizing network security, firewalls are usually located at the network boundary. Setting rules on the firewall can block out data that does not meet the firewall security policy settings, which can largely prevent attacks from the outside world. In the windows firewall, you can set data filtering by setting "inbound rules", "outbound rules", "connection security rules", and "monitoring". However, once the firewall is not set properly, it will not only prevent malicious users from attacking the system, but will also cause legitimate users to fail to access the Internet. Therefore, firewall rule settings must be tested and regularly maintained at a later stage. [14]