I use a fully updated version of XP pro for my daily computing chores . It was new in 2006. It might sound old, but it runs plenty fast for everything I need to do, and is very stable. My question is, what can I do after MS drops support for XP in April?
I don’t want a newer Version of Windows, and I am not fully comfortable with Linux, though I’ve been fiddling off and on with it for years.
I’m considering building a Linux based firewall machine to place at the entry point of my (cable connected) network, and of course considering the switch to a Linux desktop, but dread the learning curve. ( I have built Linux firewall boxes before)
Is there any possibility that I could run XP unpatched, (after April), with a software firewall, and be safe? How about with the hardware firewall in front of it?
Sorry about the multiple questions, but this is something that’s been digging at me since I heard about the April cut off. Poo on Microsoft!
I’m in no rush, but this is a decision that only the user can make.
They must be aware that future vulnerabilities won’t be fixed and may lead to exploits. So you really have to have a robust backup and recovery strategy. For me that is backing up volatile data files (media, .doc, .xls, emails, etc. etc.) daily and doing a weekly drive image of my partitions/drives.
Will you believe me if I tell you I’m using XP Pro SP2 with no updates at all since 2006 for many years.
The only thing for protection I use is avast free and the windows firewall(if it’s actually useful for something)
I use firefox for a browser,use the addon noscript wisely,and adblock and stylish for annoying things when the scripts are running.
I don’t remember when was that last time I had to deal with any kind of malware and believe it or not,I can tell if something is running\doing things without my approval.
Don’t know why should I care if the support end(I’ve never been using any kind of MS support anyway).
Like I always like to say “it depends on the device behind the keyboard”
Many users are less prone to attack because of their safe hex practices, there are some that it doesn’t seem to matter what OS they have they are constantly being attacked.
Whilst I’m a believer of whist there is support available for your OS then it should be used.
Aside from what you see in my signature I also use DropMyRights, for all internet facing applications, browsers, email clients, etc. to lower permissions so malware can’t have full rights.
Apparently Microsoft had a change of mind. They will still continue and provide support (providing updates to it’s virus definitions) for existing installation of MSE until April 15,2015 even after the end of support for Windows XP ends this April. They will stop the installation of new MSE and recommend to install third party antivirus softwares i.e. Avast, Norton, McAfee, and etc.
Though April 15, 2015 is not a very long time and better be safe than sorry we should upgrade to Windows 7 or 8.1 with third party antivirus softwares.
Microsoft will continue to provide signatures for well-known malicious programs that will help Windows XP spot when viruses, trojans and other cyber-threats try to compromise a PC. The malware-spotting updates will be provided for Microsoft’s Security Essentials and for a wide variety of corporate tools used to protect large numbers of PCs.
These security updates will be produced until 14 July, 2015.
However, security patches, regular updates and bug fixes for XP will stop as scheduled on 8 April.
In all honesty keeping updating MSE signatures in XP installations when it offers pretty poor protection in comparison to avast. So this is a bit of a red herring, given that MSE on XP is ‘just’ and anti-spyware and not an anti-virus and they are also recommending the installation of a proper 3rd party AV.
Windows 7 works fine on my Pentium 4 @3.20ghz and 3.256gb ddr1 ram (computer originally came with 256mb ram; we got it in 2004). I can get a few 30+ tabs, a game open, skype, word processor (I use AbiWord), multiple pdf files (Foxit Reader), a music player (AIMP3), sublime text, Windows Media Player, etc. and still maintain nice speeds despite being single-core.
Do note that I use Firefox for many tabs. Chrome/IE11 will use individual processes and use more of my ram.
After I upgraded to 7, WMP was much faster (I mean really fast, on my XP watching 720p in full speed was almost impossible) despite being on the same processor and using the same graphics card. I was able to play 3 1080p videos simultaneously with < 80% on my legacy processor before I upgraded (used to use P4 @2.80ghz). That really surprised me!
If you can upgrade your OS, you should! Windows 7 is nice after using XP/Vista for many years.
Even though my pc is pretty modern I opted to install xp sp3 pro. That was last year. I have been using avast free for more than ten years never had any issues whatsoever. Currently I am using avast 8 but that’s besides the point. I purchased win 7 ultimate a year and a half ago and installed it on my kids computer. I have to admit it I like it. You see I love XP the damn thing is really flying. What am I going to do about it ? I haven’t really decided as yet. I am very tempted to keep it for at least till June. I think I’ll play it by ear !
XP Lover ! 8)
You might find this interesting !
I was given this Forum a little while ago as I also will be looking to stay secure on xpSP3 after April.
Lots of input here: http://www.msfn.org/board/
Interesting summary of AV vendors’ possible commitments to XP support here:
“AV-TEST - The Independent IT-Security Institute: The End Is Nigh for Windows XP:
These Anti-Virus Software Products Will Continue to Protect XP after the End of Support”
Yes, however we must be sure not to confuse the facts, As the AV venders will continue to update ‘their software’ after xp support ends; this does not mean the Operating System in question will be updated with security patches as obviously that will not be the case.
That’s the crucial point from a security standpoint. After April, I imagine you will see a lot of kernel exploits targeted at Windows XP. These type of attack bypass most local safeguards like browser sandboxes b/c they attack the OS directly and are a whole another level of the usual plugin, browser and local software attacks. Beside the known cyberwarfare incidents, they were uncommon in the criminal world b/c there was minimum payoff relative to the tremendous time and effort required due to MS’ vigilant patching efforts but it is a whole new ballgame after April b/c obviously there will be no more kernel patches from MS.
AVs can mitigate some of risk, but it is very difficult and it obviously not as effective as MS patching the OS kernel itself. Just googling about kernel attacks, it seems AV companies track record on these type of attacks is pretty dismal, they always seem to able to bypass any type of initial proactive protection encountered and AV vendors only seem to able to address the problem after the fact when attacks are already occurring in the wild after some time. I wouldn’t have that much faith in AV vendors heuristics to plug the gaping holes in the OS which will only get worse as time goes on.
Microsoft’s security patching of WIndows has not always been proactive, it has often been reactive with patches being issued after a vulnerability has been discovered and reported by independent researchers. It’s not uncommon for active exploits to be reported before a patch is released.
While there undoubtedly will be new exploits which will not be patched in the OS, it’s worth keeping in mind that the vulnerabilities that these exploits will be taking advantage of already exist in the OS. They may have been there since XP was released, or at the very least since the last Service Pack. In that regard, since XP will not be changing, there will not be any new vulnerabilities - only new exploits of already existing vulnerabilities which have not yet been discovered or taken advantage of by malevolent hackers. So we have effectively been living with many of these weak spots in the OS for years.
To what extent counter-measures such as EMET or “Automatic Exploit Prevention” will safe-guard against any such new attacks remains to be seen. Also, to the degree that past experience may be an indicator of future expectations, we may get some glimpse into what to expect with XP from the history of earlier versions of Windows after MS support ended for them (e.g. - Win2K, Win95, Win98, etc.) Was there an epidemic of compromised systems? The horizon may be darkening for XP users but the sky may not be falling.
For whatever it’s worth, I’ve been trying for the last couple weeks to determine if Avast will continue to support Windows XP subscribers after April, 2014.
Tech support couldn’t answer my question nor did anyone on this forum have actual knowledge.
Well, you can all rest easy on this question now because today I received an e-mail from an official at Avast who should know. Below is his message.
"AVAST will continue to support XP users well into 2016.
Sorry for the complications with late response from our support team.
With best regards,
Milos Korenko, marketing director"
Whether this will satisfy all Avast customers who are using XP, I can’t say. But, since I’ve been running Avast Internet Security Pro in tandem with Malwarebytes Pro (for four years now), I haven’t experienced a single virus or trojan intrusion. Before then, I would get hit at least once a month. I also maintain an external hard drive onto which I backup (clone) my entire hard drive once a week. The electric power to the external hard drive is shut off and is only switched on during the actual time I am cloning.