Top Ad unit 728 × 90

Why the 64-bit Version of Windows is More Secure




Most new Pcs have been transportation with the 64-bit rendition of Windows — both Windows 7 and 8 — throughout recent years. 64 bit variants of Windows aren't pretty much exploiting extra memory. They're likewise more secure than 32-bit forms. 

64-bit working frameworks aren't invulnerable to malware, however they do have more security gimmicks. Some of this likewise applies to 64-bit adaptations of other working frameworks, for example, Linux. Linux clients will pick up security preferences by changing to a 64-bit adaptation of their Linux circulat

[post_ad]

Address Space Layout Randomization

ASLR is a security offer that causes a program's information areas to be haphazardly organized in memory. Before ASLR, a program's information areas in memory could be unsurprising, which made assaults on a program much simpler. With ASLR, an assailant needs to figure the right area in memory when attempting to adventure a defenselessness in a project. An inaccurate speculation may bring about the project slamming, so the assailant won't have the capacity to attempt once more. 

This security peculiarity is additionally utilized on 32-bit forms of Windows and other working frameworks, however its substantially all the more influential on 64-bit renditions of Windows. A 64-bit framework has a much bigger location space than a 32-bit framework, making ASLR considerably more successful.

[post_ad]

Mandatory Driver Signing

The 64-bit rendition of Windows upholds compulsory driver marking. All driver code on the framework must have a computerized mark. This incorporates bit mode gadgets drivers and client mode drivers, for example, printer drivers. 

Obligatory driver marking avoids unsigned drivers gave by malware from running on the framework. Malware creators will need to by one means or another sidestep the marking process through a boot-time rootkit or figure out how to sign the contaminated drivers with a substantial authentication stolen from an authentic driver engineer. This makes it more troublesome for contaminated drivers to run on the framework. 

Driver marking could likewise be authorized on 32-bit adaptations of Windows, yet it isn't — likely for proceeded with similarity with old 32-bit drivers that might not have been agreed upon. 

To impair driver marking amid advancement on 64-bit versions of Windows, you would have toattach a piece debugger or utilize an exceptional startup choice that doesn't persevere crosswise over framework reboot

[post_ad]

Kernel Patch Protection

KPP, otherwise called Patchguard, is a security emphasize just found on 64-bit forms of Windows. Patchguard avoids programming, even drivers running in part mode, from fixing the Windows piece. This has dependably been unsupported, however its actually conceivable on 32-bit variants of Windows. Some 32-bit antivirus projects have actualized their antivirus security measures utilizing part fixing. 

Patchguard keeps gadget drivers from fixing the piece. Case in point, Patchguard keeps rootkits from changing the Windows portion to insert themselves in the working framework. On the off chance that an endeavor at piece fixing is recognized, Windows will quickly closed down with a blue screen or reboot. 

This assurance could be instituted on the 32-bit variant of Windows, however it hasn't been — likely for proceeded with similarity with legacy 32-bit programming that relies on upon this right to gain entrance. 

Information Execution Protection 

DEP permits a working framework to check certain territories of memory as "non-executable" by setting a "NX bit." Areas of memory that should hold information just won't be executable. 

Case in point, on a framework without DEP, an aggressor could utilize a cushion flood to compose code into a district of an application's memory. This code could then be executed. With DEP, the assailant could compose code into a locale of the application's memory — however this area would be checked as not-executable and couldn't be executed, which would stop the assault. 

64-bit working frameworks have equipment based DEP. While this is likewise backed on 32-bit forms of Windows on the off chance that you have a present day CPU, the default settings are more stringent and DEP is constantly empowered for 64-bit projects, while its debilitated as a matter of course for 32-bit programs for similarity reasons. 

The DEP arrangement dialog in Windows is a bit deluding. As Microsoft's documentationstates, DEP is constantly utilized for every one of the 64-bit forms: 

"Framework DEP design settings apply just for 32-bit applications and courses of action when running on 32-bit or 64-bit renditions of Windows. On 64-bit renditions of Windows, if equipment implemented DEP is accessible it is constantly connected to 64-bit techniques and portion memory spaces and there are no framework design settings to incapacitate 

[post_ad]

WOW64

64-bit forms of Windows run 32-bit Windows programming, however they do it through a similarity layer known as Wow64 (Windows 32-bit on Windows 64-bit). This similarity layer authorizes a few limitations on these 32-bit programs, which may keep 32-bit malware from working appropriately. 32-bit malware will likewise be incapable run in part mode — just 64-bit projects can do that on a 64-bit OS — so this may keep some more seasoned 32-bit malware from working legitimately. Case in point, on the off chance that you have an old sound CD with the Sony rootkit on it, it won't be equipped for introducing itself on a 64-bit variant of Windows. 

64-bit forms of Windows likewise drop help for old 16-bit programs. Notwithstanding forestalling antiquated 16-bit infections from executing, this will likewise compel organizations to redesign their aged 16-bit programs that could be defenseless and unpatched. 

Given how far reaching 64-bit renditions of Windows now are, new malware will probably be fit for running on 64-bit Windows. Then again, the absence of similarity can help secure against old malware in nature. 

Unless you utilize creaky old 16-bit programs, aged fittings that just offers 32-bit drivers, or a machine with a genuinely old 32-bit CPU, you ought to be utilizing the 64-bit rendition of Windows. In case you're not certain which form you're utilizing yet you have an advanced machine running Windows 7 or 8, you're likely utilizing the 64-bit version. 

Obviously, none of these security peculiarities is idiot proof, and a 64-bit form of Windows is still helpless against malware. In any case, 64-bit adaptations of Windows are unquestionably more sec.

[post_ad]
Why the 64-bit Version of Windows is More Secure Reviewed by Vijitashv on 12:35 pm Rating: 5

No comments:

Powered By Blogger, Share by Star Tuan

Biểu mẫu liên hệ

Name

Email *

Message *

Powered by Blogger.