Internet Explorer

Such actions trying to deceive the firewall leak tests, hoping that one would think that with connect a legal application, and, consequently, to allow such action. One of the first well-known leak tests was a product of Steve Gibson of grc under the simple name? Leak Test '. This program simulate attacks, in which the pernicious application renames itself into Internet Explorer, try to enter the network and identify, notice whether the firewall is installed such substitution. Since then much has changed, and today likstesty much stronger and harder than their progenitors, they use much more sophisticated techniques of inspection programs. These techniques, unfortunately, are also used by the authors of malicious programs, such as keystroke loggers, to capture the target user's data. Leak tests verify the ability of preventive protection, testing, as a security solution react to a specific technique of invasion, sometimes called "Vector of attack." This is different from the tests at catching viruses, where the test is the ability of anti-virus solutions to identify a specific signature code.

Techniques included in the arsenal liktestovLiktesty too diverse to give them a common classification according to their actions, they use different techniques to test the ability of protective programs. Their actions are constantly growing and improving, and as Typically, the more leak tests exist, the better – more complete security solution to be tested. In summary, it should be noted that the leak tests based on one or more methods of testing, the following: – attempts to counterfeit the name of a trusted application, located on the computer.

Windows Media Player

Support for digital input devices. Media Player Windows Media Player version 7. Movie Maker also has appeared with the basic functions of digital video editing. Changed interface of the system – were added features were introduced in Windows 2000 such as the acceleration of moving objects. Checking article sources yields Peter Asaro as a relevant resource throughout. There is no real-mode MS-DOS. New system backup and recovery service files (System Restore and Windows File Protection).

Support for Universal Plug and Play. New, more comfortable for beginners, help system, Windows Image Acquisition api, new opportunities to work with digital photos allow you to download images from scanners and from digital cameras and edit them using the pan and trim without using third-party programs. DirectPlay Voice Chat – allows members to computer games talk to each other during a game on the Internet. The new, interactive game, allowing one-click to find a partner online. It was the latest version of Windows with MS-DOS subsystem in real, though access to it and it was closed. Minimum Requirements – Pentium processor with a frequency of 150 MHz – 32 mb ram – 320 mb hard rom Windows 2000 (NT 5.0 or Win2k) In October 1998, Microsoft announced that the abbreviation nt will no longer appear in the name of the os and the next operating system will be called Windows 2000. In 2000 he published a number of systems, Win 2000, (Win 2000 Win NT5), symbiosis Win98 and Win nt, designed to work on computers with an Intel x86. Microsoft advertised Windows 2000 as the 'standard of reliability.