I tried googling and searching several forums but wasn’t able to get anything concrete.
If I’m running a Windows XP machine with SP 2 or 3 and automatic updates turned off, is it safe to browse the web? I was reading a post on tom’s hardware that said every site you visit can tell which OS you are using. But let’s say I’m going to my bank’s website. The data is encrypted right (https)?, so how would the operating system matter? Is there some connection between the OS and the browser?
Thanks, I read that thread. I rather not say why my updates are turned off. Because I haven’t been using Windows updates, I don’t know if there has been any patches or fixes that make the web browsing experience any safer…and thanks eddy it’s SP 2
First thing to do is installing SP3 and all (security) updates released after that.
They will patch security holes and make your system more safe.
You also need to turn on the automatic updates.
Well with SP2 you won’t be getting any updates switched on or not, updates for XP were stopped some time ago unless you had SP3 installed. With that support ending in April this year you only have a short time frame to get SP3 and any other security updates after SP3 installed.
Ok thanks David, I think I will take my chances with SP 2 with automatic updates turned off. I haven’t had any issues and I’m hopeful that Avast Free is sufficient protection.
Many of those hotfixes don’t apply in my case but there are some security updates that sound scary such as:
“MS08-001: Vulnerability in TCP/IP could allow remote code execution
MS06-057: Vulnerability in Windows Explorer could allow remote code execution
MS06-036: A vulnerability in the DHCP Client Service could allow remote code execution
MS06-020: Vulnerabilities in Macromedia Flash Player from Adobe could allow remote code execution”
I don’t know what they mean but wouldn’t those things be picked up by Avast if someone was trying to intrude on my network?
The way I understand Security Patches to an OS.
A Security Software Program whether Anti Malware/ Anti Virus/or Firewall does not protect from the vulnerabilities discovered in an Operating System that the Security Patches address.
You are talking Apples and Oranges. While a strong layered Secuity profile including Anti Virus will help this still does not address the OS vulnerabilities.
I think that may be inaccurate. MS will not be issuing any new patches for XP after April but the existing service packs and patches will likely be available for quite some time after that. I haven’t seen MS suddenly yank all existing patches and SPs for older software versions as soon as active support ends.
Well, I think that depends on a number of factors. First off, a newly discovered and newly exploited vulnerability may not get detected when first released to “the wild”. So if such a vulnerability can be eliminated proactively by patching the OS before an exploit starts circulating then that’s ideal.
Once an exploit is identified, most top-tier AV/IS products will detect and block that exploit. So an AV can and will offer some protection against exploits of OS vulnerabilities. See:
Additionally, products such as EMET may afford some protection against new exploits of unpatched vulnerabilities by disrupting the typical methods used by exploits to attack most Windows vulnerabilties. It appears that Kaspersky for one also attempts similar interceptions and disruptions of common exploit behavior via Automatic Exploit Prevention.
According to that comparative analysis, using an up to date web browser and antivirus help but you should still be patching your operating system…
That chart (kasperky PDF) shows that 11% of attacks were on the Windows operating system but the article says that to be attacked you need to initiate it by clicking a link, opening a file, etc. I’m assuming if you stayed clear of malicious sites you should be OK.
Well, that would certainly reduce the risks - but the catch is that one can never be sure which sites have malicious content. Many legitimate, non-malevolent web sites - even some hosted by the likes of mainstream religious organizations - can and have been compromised by hackers who plant malware or links to malware on these reputable sites. The safest web surfing is probably done in a virtual environment such as a “sandbox”.