Digit - Fast Track - Windows8 - Vol - 08 - Issue - 02 - February - 2013
Digit - Fast Track - Windows8 - Vol - 08 - Issue - 02 - February - 2013
TECHNOLOGY
YOUR HANDY GUIDE TO EVERYDAY
Welcome to Windows 8
Getting started from scratch
Understanding the new UI
Usability and getting work done
Secure my Windows 8
Enterprise features
Tips and Tricks to become a Power User
windows 8
powered by
Chapters
windows 8
february 2013
06 PAGE
Welcome to Windows 8
Where did it come from where will it go? What is it doing here? That’s
what we explore
16 PAGE
Start from scratch
Now that you know what Windows 7 is all about, this chapter
tells you how to get started right from choosing the right version
to installation and other nitigrities
24 PAGE
Get to know the new UI
Windows 8 almost speaks another language when it comes to
interacting with its UI. But that’s OK we’ve got a dictionary here for you
45 PAGE
Usability and getting work done
Windows 8 would win “the good looks” competition in all probability.
Start using it and it would win your heart too. We showcase a few
features designed to make life easier
58 PAGE
Windows 8 security and performance
Hardware features have long been ignored to elevate security.
Windows 8 changes that, and in a big way
71 PAGE
Enterprise features
“Built by one of the largest enterprises on earth” may be reason
enough to trust Windows 8 in your own enterprise. But that is not
where all reasons end
77 PAGE
Tips and Tricks
We pull back the curtains on Microsoft’s latest Windows and show you
how to get what you want out of the OS
Volume 08 | Issue 02
TECHNOLOGY
YOUR HANDY GUIDE TO EVERYDAY
February 2013
Free with Digit. If you have paid to buy this Fast Track from any
source other than 9.9 Mediaworx Pvt. Ltd., please write to
[email protected] with details Welcome to Windows 8
Free With Digit February 2013
If you want us to create a customised Fast Track for you in order to Tips and Tricks to become a Power User
demystify technology for your community, employees or students 02 A 9.9 media Publication
contact [email protected]
4
Introduction
W
indows 8 can be a confusing release for consumers even
before they have used it at all. Should you hate it, or should
you like it? “Love it to bits” and “hate with a passion” are
both valid opinions, but there seems to be no conclu-
sion for Windows 8. Hopefully this FastTrack will give you some much-
needed closure.
Windows 8 took some time to develop its reputation. Microsoft
announced change after change for their upcoming OS, and people were
mostly fine, happy even. Even the confirmation that Explorer would use
the ribbon only slightly dampened the joy.
But one cold, damp morning Microsoft finally announced to a media
rife with trepidation, that the Start Menu had passed away. A collective
“oh you didn’t” resounded through the masses and things just got real.
Microsoft had gone too far, the line must be drawn here, people said, this
far and no further.
Windows 8 was then heavily criticised by Valve co-founder Gabe Newell.
He really disliked the idea of Microsoft having monopoly of the Windows
ecosystem. After all Valve runs its own very successful app store for Win-
dows, called Steam, which has branched out to selling general-purpose
software in addition to games. If Windows is locked down now, Steam will
have no future.
There is a little truth in nearly every criticism of Windows 8 whether
positive or negative. Yes, Microsoft has started pushing an inbuilt store, not
as an option, but as the only way to purchase the new Modern UI applica-
tions. Yes, the Windows 8 UI is clunky and disjointed at places, but not
because the new UI is bad, but because the marriage between the classic
and Modern UIs 8 is unstable to say the least. Depending on how you look
at it, either the Classic UI seems tacked on, or the new UI does.
iNTRODUCTION 5
But having said all that, there is still a lot in Windows 8 to explore, and
take in before you can conclude for yourself whether this OS is worth your
time and money. Which is where this booklet comes in.
In this FastTrack we explore everything to do with Windows 8. We look
at the the history of Windows up to this release, we look at the new Win-
dows 8 editions and help you choose and install the must suitable one for
your needs. We go over basic Windows 8 concepts, gestures and shortcuts
and explore the classic UI and Modern UI in detail. If want to delve into
securing the OS or running it in an enterprise environment we have you
covered there as well. Finally if you really need the start menu or want to
even out some of the blemishes of the OS, there is the tips and tricks section
at the end. Be sure to check out this section if you want to leapfrog to the
covetted “power user” status you’ve probably garnered for yourself using
Windows 7 all these years.
Maybe you were forced to jump into Windows 8 when you purchased a
new computer and want to make the best of it, maybe you took to the OS and
bought it on an impulse, or maybe you’re curious, maybe you’re cautious
and just want to look before you leap. In any case this FastTrack should
have something in it for you.
6
Chapter #1
Welcome to
Windows 8
Where did it come from where will it
go? What is it doing here? That’s what
we explore
Ramping up to 8
Windows has had a long and confusing history filled with inconsistent
dates, names and version numbers, and recent Windows releases haven’t
improved the situation much. There are a few key milestones in the his-
tory of Windows, and here we are speaking at an architectural level, not
legal or financial.
It all begins, as always, with v 1.0, which for our purposes is unremark-
able if not for the fact that it was the first version of Windows. Windows
Welcome to windows 8 7
was a 16-bit operating system and came out back in 1985 – a time when you
really had to work hard to fill up 100kB of space.
Windows 2.0 came and went uneventfully, and then came the very
popular Windows 3.0 in 1990. In 1992 a minor update, Windows 3.1, was
released. This is also, however, a time when things started to get interesting.
Windows was just at v3.0 but already there was a completely redesigned
version of Windows in the works, Windows NT. Windows NT 3.1 quickly
followed Windows 3.1 in 1993, and unlike Windows 3.1, Windows NT 3.1
was 32-bit not 16-bit. Windows NT introduced the Win32 API, which was
used in Windows 95 as well and continues on to this day – with significant
improvements of course. Windows NT was also written with multiple dif-
ferent architectures in mind, although it didn’t stray far from x86.
It was supposed to be the new base for future versions of Windows, but
unfortunately this was not to be. Windows 95 got built on Windows 3.1
instead, and so was Windows 98, and – the one that should not be named,
but we still will – Windows ME. Meanwhile a line of Windows versions
based on Windows NT continued, with Windows NT 4, and then Windows
2000 (which is essentially Windows NT 5).
Windows XP finally merged the old Windows 3.1, 95, 98 series of Win-
dows with the NT series. Windows XP was mostly just a re-skinned Win-
dows 2000, and was technically Windows NT 5.1. It was also the first
version of Windows to support the full capabilities of 64-bit processors in
a special Windows XP Professional 64-bit edition, which unlike the 32-bit
version of Windows XP, was based on Windows Server 2003 rather that
Windows 2000 (making it v5.2).
8 Welcome to Windows 8
This is probably what most people think of when they think of Windows 8 since it is the
hallmark addition
for Windows. WinRT apps can be written such that major parts of it will run
on Windows phones, tablets and desktops with minor platform-specific code.
Windows 8 still supports running 16-bit applications made for Windows
1.0 (although you may have to enable this support), however only in the
32-bit version. Support for 16-bit applications has been absent in 64-bit
versions of Windows since XP.
With WinRT now available, the clock has started ticking on Win32,
which has been around since Windows 95. It’s still a long way away, but
eventually Win32 will go away, and it all starts with Windows 8.
Another major change that starts with Windows 8 has to do with a new
storage architecture – we will cover that in more detail later – and even the
beginning of the new ReFS file system that will eventually replace NTFS.
And perhaps biggest of all, if certain rumours hold true is that Windows 8
will begin a trend of quicker Windows releases, with Windows 9, or some
intermediate release of Windows coming in as early as next year.
boxes, there is no need for bevels, rather clear spacing and typography is
used for content presentation and segregation.
Is the new Windows 8 UI better? That’s a point of much argument
and the fact is, the answer will be different for different people. Even if we
assume that the new Windows 8 UI is brilliant, there is still great value
in familiarity. Many Linux distros still try to use the interface conven-
tions of Windows, because that
is what most people are familiar
with. Those who have used the
traditional Windows interface
for a long time are used to how
it looks and works, and they may
find the UI changes discordant.
Windows 8 is however the first
in this new brand of Windows,
and some teething problems are
Whoa! For a second I though I was holding a
real bookshelf to be expected. What is up to users
is whether they are willing to put
up with these issues for the other benefits it provides. Getting back to the
point on touch, it is something Windows 8 does well. An example of how far
touch support goes in Windows 8 is the boot and login process. Windows
8 goes as far as to give you a mouse or touch driven boot screen, so if you
have multiple operating systems, you will be able to boot to them right from
the boot screen using touch.
Once the system boots, logging in is the next pain point, but Windows
8 has your back here as well. Rather than log in using a clumsy on-screen
keyboard, Microsoft has developed a new gesture based login system that
lets you log in using gestures performed over a picture of your choice.
Digging Deeper
It might not seem like it but there is a lot more to Windows 8 than you can
tell from its shiny but disjointed exterior. There are many amazing features
14 Welcome to Windows 8
buried deep within the OS that would perhaps have come to the forefront if
it weren’t for the endless controversies about its UI and the Store.
Windows 8 touches every part of Windows, removing unused fea-
tures going way back and touching up even the remotest areas of the
Windows experience.
Let’s start with the boot process, which now supports – and for Windows
hardware manufacturers even mandates – secure boot. Secure boot ensures
that only code signed by Microsoft can run on boot, which almost nullifies
the risk of boot viruses.
Windows Explorer as you might know now has a ribbon-based UI, which
actually manages to save space since it is condensed most of the time. The
file copy dialog has be heavily enhanced with support for pausing transfers,
combining multiple transfers into one window, and viewing a graphs of
the performance rather than just a snapshot and changing estimate of time
remaining. Also, Windows finally supports mounting ISO files and throws
in VHD and IMG mounting support for good measure.
The task manager too has received a lot of love and is now a much more
powerful, yet simpler and prettier tool for understanding what is going on
in your system.
There are even bigger changes, for example Windows 8 now has much
better multi-monitor support. Each screen can now have its own taskbar
that can show all applications, or the applications open on that screen. Each
monitor can now be given a separate wallpaper as well.
Another major feature is the new Storage Spaces system for managing
hard drives. Storage Spaces takes away the pain of managing physical hard
drives, and rather focuses on virtual storage spaces. The way this works is
that you can use a number of hard drives to create a storage pool. This storage
pool can then have a number of storage spaces, each of which appears like
your traditional hard drive partition.
What is great about this feature is that it supports redundant storage
and storage virtualization. Redundant storage means that each piece of
data you store is stored on at least two hard drives. Even if one fails, your
data will continue to be accessible. Storage virtualization on the other hand
means that you can essentially create a 10TB storage space even if you are
only using three 1TB drives. The storage is virtualized so it will not be
allocated till it is actually used. This way you can create a 10TB partition
now, and only buy hard drives when the space in existing drives actually
begins to fill up. Since Windows maintains two copies of each piece of data,
Welcome to windows 8 15
Getting
started from
scratch
Now that you know what Windows 8 is
all about, this chapter tells you how to
get started right from choosing the right
version to installation and other nitigrities
Hardware requirements
While we might differ in our opinion on whether the roads in our country
are good enough for a Ferrari, no matter how powerful the car, it needs the
right road to run. The situation is very analogous to computing where the
Getting started from scratch 17
hardware would be the road and software, the car. If you have a great OS
and the hardware doesn’t support it, the OS is a waste. The performance and
smoothness of any application depends on the hardware and it’s more so
for the operating system. If the OS doesn’t run well, you can be sure that no
application will either. Naturally, hardware requirements and compatibility
issues for an OS carry much more weight than they do for any app. Windows
8 has a higher set of hardware requirements compared to Windows 7. Don’t
worry though; they’ve not been increased much.
Processor
If your processor can run Windows 7, it can also run Windows 8. The
system requirements on the processor side is the same for Windows 8 – 1
GHz of clock speed. But we’re talking about one of the most sophisticated
and complex electronic units being produced at the moment. Windows 8
has raised the bar in terms of features supported by the processor. It now
requires PAE, NX and SSE2.
1. PAE: Physical Address Extension is a feature that allows a 32-bit OS
to address more than 4 GB of memory installed on the computer. It’s a
hardware feature and has been there since quite some time now; almost
since we entered the new millennium. You shouldn’t worry about it. It
might however be the case that the BIOS settings on your PC are set to
NOT use PAE which you should be able to change.
2. NX: NX stands for Never eXecute. This feature disallows the execu-
tion of code in the data segment of a program’s address space. It ends
up providing an elevated application-level security. Intel calls the
technology ‘XD’. Interestingly, for NX to function, the processor must
run in PAE mode.
3. SSE2: This technology too has been around since the last decade and
is a SIMD (Single Instruction Multiple Data) instruction set which is
immensely useful in processing video.
Your processor should have all of the above unless it’s more than a
decade old.
Memory
It’s just as much as it was for Windows 7 – 1 GB. Though Microsoft recom-
mends that you have 4 GB, we’ve used the OS on as low as 1.5 GB and it
works just fine. However, for 64-bit installations, you must have 2 GB of
RAM or you would have to live with a lot of lag.
18 Getting started from scratch
Graphics
You need to have, at least, a DirectX 9 capable graphics device. Such devices
have also been available for quite some time now – they became widely
available way back in 2004-05. Windows 7 and Windows Vista had the
same minimum graphics requirement. If you’re running any of them, your
machine’s graphics capabilities should be sound enough.
Display
As low as 1024 x 768 pixels will do and most people have way more than that!
Input devices
As obvious as it sounds, you need a keyboard and a mouse. If you want
to use touch features, you need a device which has a touch-enabled
screen. In fact, a touch-enabled screen can perceptibly enhance your
Windows 8 experience.
Storage Space
This shouldn’t be a problem in this age of massive hard disks. If you have
the 32-bit OS, 16 GB should do, while 20 GB for the 64-bit version is recom-
mended. That said, the installation would typically take up 8 GB and 10 GB
of space, respectively, for 32-bit and 64-bit installations.
Extra features
Secure boot: It needs motherboard firmware with support for UEFI v2.3.1
and has the Microsoft Windows Certification Authority in the UEFI
signature database.
ΩΩ SkyDrive: Since it’s a cloud offering by Microsoft, you’re required to
have a Microsoft account (which is free, of course).
ΩΩ BitLocker: You would need a TPM (Trusted Platform Module) chip in
your system to encrypt the OS installation drive.
ΩΩ Hyper-V: It’s an enterprise class virtualization solution which requires
a 64-bit system with SLAT (Second Level Address Translation) support.
ΩΩ Snap apps: Snap apps is a feature that gives you an overview of the
list of Modern UI apps running on the system while you’re in desktop
mode and the list of desktop apps when you’re using a Modern UI app.
You need at least 1366 x 768 pixels for the feature, and that can be a
problem. Many laptop models sold in the past had a resolution of 1200
x 800 and a number of them are still in use today. While the height (800
Getting started from scratch 19
pixels) is sufficient, the width of the display (1200 pixels) is lower than
the minimum required.
Windows 7. And you need to check your wallet too! While there may not
be a very compelling reason to jump over, there’s no reason to step back
either. We recommend installing a trial on your PC and try it out for about
a week (Microsoft says new users take about a week to adjust to the new
UI). If you like it, you should buy a license. If not, Windows 7 isn’t retiring
and you should stick with that.
Installation methods
There are two ways to get Windows 8 running on your machine – you either
upgrade your existing Windows installation or you create a new one. The
simplest installation method is also the most common one – installation of
the OS from scratch. You pop in a DVD, boot from it and the installer comes
up. You partition the hard disk, a few extra clicks and the OS comes to life.
If you’ve ever performed a Windows setup, you would already be aware of
how this works. There are no new surprises here.
Getting started from scratch 23
Get to know
the new UI
Windows 8 almost speaks another
language when it comes to interacting
with its UI. But that’s OK we’ve got a
dictionary here for you
L
et us begin with the name that was: Metro. Why isn’t it Metro
anymore ? And what is it now? Such are the questions that keep us
awake at night, because we don’t always know how to answer them.
So let’s start with the simpler answers, why has the Metro
name suddenly disappeared.
For quite a while Microsoft was compulsively singing the praises of
Metro, and how wonderful and brilliant it was, and how it is a big part
of Windows Phone, and would soon be a big part of Windows 8. Then a
Get to know the new UI 25
to look at next is what was this language, what does it entail, and why is
Microsoft pushing for it.
Why Modern UI
Computer technology is hardly old, but it has its baggage.
Take a look at email which is, at this point, around four decades old. It
was created at a time when transferring files over a few kB per second was
an immense luxury. It was designed as a simple system with a sender, a
recipient, and a text message.
Then as its use evolved and expanded there was a need for protecting
against spam, or using hosted email service, or sending attachments. Since
email was designed for text, attachments would initially have to be converted
to plain text, increasing their size in the process, pasted in the mail, and then
sent. The recipient could then paste that attached text content in a file, and
decode it to get the original binary.
Today this process is transparent, and attachments show up as nice
clean file icons in webmail, but the technology is still plagued with the
limitations of the past.
In 2009 Google decided to take matters into its own hands and unveiled
the future of communication, Google Wave. Google Wave was designed with
one thing in mind, what would an email-like communication system look
like, and work like if it was created today. Wave supported inline replies,
instant messages, widgets, bots; it was an open system so like email, any
company could run a wave service.
In the time since its release it has now replaced 90% of email and IM
conversation. But only in an alternate universe that in this authors words
would have been “totally awesome”.
The reality is, it was a huge flop. Maybe it needed more time, maybe it
was half baked and tried to do too much. It doesn’t matter, Google gave up.
You may be wondering what this has to do with Microsoft, Windows 8
and Modern UI. Here is what; When we look at how the GUI has evolved,
we will find similar anachronisms, aspects of UI design that exist because
they existed in the past, because they are familiar and for no other reason.
What would a user interface look like if it was created for the computers of
today? Or perhaps more accurately if it did not have baggage from the past?
Microsoft thinks their design language is the answer. Microsoft is
pushing it hard because that is the only way to bring changes to things
that are widely accepted.
Get to know the new UI 27
Is it the best awesomest thing in the history of the world that will obvi-
ously be successful and eventually loved by everyone and adopted by all
operating systems and in time we wont even remember what old computers
used to look like but we will still all sing to the praise of how glorious our
new UIs are, and how brave Microsoft was in delivering us from the Evil
UI or yore as all countries of the world come together for the common cause
of celebrating the Modern UI?
We have a bet against that future—a hefty sum too. Still the fact is, a
lot of what we think about what a GUI should look like is based on what
GUIs already look like.
Why does the save icon have a floppy of all things; why is that a conven-
tion; who even uses a floppy now? Rather for those faced with a GUI for the
first time, that is just the save icon, and the fact that it looks like a floppy is
merely a matter of trivia for future school-level quizzes. They learn that it
is a save icon and understand what it is when it is used again. If we were
to suddenly replace the save icon with a picture of a horse, people would
soon learn what it means – while being understandably confused – and a
child participating in a quiz in the future would mention this FastTrack as
what started this whole trend.
Microsoft believes in this new design language – actually its beginnings
can be traced way back to Encarta – and the implications of this UI design
will be understood over time.
We said earlier that Microsoft was trending towards non-skeumorphic
designs but why is that even a good thing; shouldn’t we be evoking the
familiar in order to help people get familiar with computing concepts?
Evoking familiar patterns can be a good thing, but like all good things,
they can be overdone. Let’s take the example of skeuomorphs outside the
field of computers software; take for example the common example of an
electric car.
An electric car has no need for a front grill, since the engine does not
need air for cooling, even so these cars have such grills. Why? To evoke
the familiar design of a car, or for economic reasons having to do with
the fact that reusing similar designs is easier in manufacturing. Seems
fine enough?
Let’s go a step further and add an exhaust, which electric cars have no
need for. Now we’re just wasting money, but we can go further and install
a small smoke machine in it as well, just to get the feeling of a normal car.
While we’re at it, we all like the roar of an engine, so let’s add an engine
28 Get to know the new UI
noise generator as well, just to make it sound like a “real” car (this last bit
is actually useful if the car is too silent, to warn pedestrians).
There comes a point when you have started to reproduce the inefficiencies
and negative attributes just for the sake of familiarity. An example of this
in software would be the use of a volume knob instead of a straightforward
slider. The knob looks more familiar, but to use it you give up the accuracy
afforded by a digital solution.
ΩΩ “Win as one”
Apps should work well with other apps by taking advantage of the contracts
Windows provides, such as search, storage, and sharing. These principles
are more about the philosophy of the design rather than actual design
guidelines, but Microsoft has plenty of these as well.
Microsoft’s apps will obviously try to follow these principles, so you can
look at them as examples of what the Modern UI is; however most apps in
the Windows 8 store follow similar guidelines.
One thing you will notice is that while this has to do with touch, it isn’t
something that’s entirely built around touch. One could apply these prin-
ciples to desktop apps as well.
Microsoft’s design guidelines have to do with how an application should
use space, and how it should lay out its content and controls. The most
common examples of such applications also happen to be designed for touch.
application tiles keep changing what they show. Each tile is like a small peek
into the application; your mail app can show the latest mail and unread
mail count, your news app can show the latest news clip with their leading
image; an eBook reader can show which book you are currently reading.
This small feature also means that for some apps you don’t even need
to launch them to see if there is anything new. If your mail app shows there
are no new mails, you needn’t launch it.
The start screen isn’t just limited to apps either, it can also link to other
kinds of content. Apps can pin content here as well. For example, Internet
Explorer can pin websites here, the Kindle app can pin books here, and the
People apps can pin Contacts here. It’s just a convenient way to access con-
tent directly rather than going through the app.
At the top-left of the start screen you will
also see the name and photo of the currently
logged in user. Clicking on this shows a menu
that can be used to change the account picture,
lock the computer or sign out.
Managing Tiles
There a number of things you can do on your
start screen to keep things organised. The sim-
plest and most obvious being that you can drag Tiles can show the latest data
tiles around to rearrange them. available to the app
Get to know the new UI 31
Tiles for Modern UI apps can be displayed either as a normal square tile,
or an expanded rectangular tile that takes up as much space as two tiles.
As we said before, tiles can show information from an app, so you can use
this with tiles that have important data to display.
To perform operations on a tile, you need to select it first. If you are using
a touch screen, slightly slide the tile in a up-down motion, this will select
the tile, mouse users can just right click. For keyboard users you first need
to navigate to the tile using the arrow keys, and then press the space key to
select the tile. A bar will pop up at the bottom with command for the tile.
For all tiles you will see an option to unpin the app from the start screen
or uninstall the app. For Store apps you will also get an option to change
the size of the tile, and to turn off live updated for a tile. For desktop icons
you will be able to launch the app as an admin, open the location of the
shortcut, open a new window of the app, and to pin the app to the task bar.
The start screen shows apps in rows and columns, but the way these icons
these behave needs to be understood. As you start adding tiles to the start
screen, they will come in rows of two.
When the maximum number
of rows in a column is exhausted,
another column starts.
If you drag a tile away form a
column, to the left or right, at one
point a column of space will appear
highlighted, and you will be able to
start a new group of tiles.
You can have a number of such
groups. Unlike the old start menu
there is no system of folders on the Tiles: The operations visible here change
start start screen, so having hierarchy depending on what is supported by the
is not possible. Instead you can group application
tiles for similar apps together. It is
even possible give a name to these groups. So you can group together all
your photo editing apps under the heading “Photo Editing”, or for example
all your internet related apps under “Internet”.
To make managing the start screen easier, there is a zoomed out view
available. In this view you can move around entire groups, and name them.
This zoomed out view is accessible by using the zoom (pinching) gesture
on the start screen. To reach this view with a mouse you have two options,
32 Get to know the new UI
The share charm lets you share content from the app you are
using. To use this the app you are using should have something
to share, and support sharing. A web browser for example should
let you share the current URL, a music library application might
let you share the name of the currently playing app as your status.
You also need an application to share with, for example, a twitter app, or
a photo sharing app. Sharing isn’t just about links, applications can share
images, text or even arbitrary files. So if you share that zip file you might
find yourself faced with a the Dropbox and SkyDrive apps while sharing a
link will show you your Twitter and Facebook apps. An app pariticpates
both ways as well, so you can share files on your Dropbox via mail, but you
can also share files from your Photo app with Dropbox. You cannot share
from the desktop or desktop apps.
The Start charm in the middle takes you to the start screen. If tapped or
clicked while on the start screen it goes back to the last used app.
The Devices charm allows sending content from an app to connected
devices. This includes sending documents to a printer, streaming a video
to your TV, or streaming audio to a home theatre system.
The Settings charm is a standardised way you can access the settings for
any application. Nearly every application has some or the other configura-
tion settings associated with it, and this is where you will find the settings
for Windows 8 apps. In desktop mode it links to the desktop related set-
tings such as the control panel and personalisation. At any point it will also
show other system setting
such as the network infor-
mation, volume control,
brightness control, noti-
fications, power and key-
board settings. It also has
a link to the Modern UI
control panel.
As you can see, charms
might take a while to get
used to, but they stand-
ardise the way you can
access some of the most
common features found
in most applications. Multiple groups, with a little gap in between
34 Get to know the new UI
Things like the share charm are especially useful since it allows for
cross-application integration even when the software are made by two dif-
ferent – or even competing – companies as long as the applications share
some common ground in file formats.
The IE10 app bars include its location bar and tab bar
So as a quick guide:
Taskbar: shows ONLY desktop apps
Alt-tab: shows both desktop and Modern UI apps
Win-tab: shows ONLY Modern UI apps + desktop
There are a couple of other tricks you can use with the task manager.
If you are using the mouse, you can move the mouse to the top-left corner
of the screen and you will see the last used app, you can just click here to
switch to that app.
We said earlier that you can’t arbitrarily resize Windows 8 apps. You can,
however, snap an application to the left or right side of the screen. If you do
so the app will take up one column of the screen, while another application
can happily run alongside it.
Say you are listening to music, and browsing the internet. You can snap
the music player to one side of the screen while you continue browsing.
36 Get to know the new UI
Likewise you can have the messenger app or a social networking app open
alongside another application. The application needs to support this view,
and generally they do, but there is no guarantee that the application will be
very useful in that mode, some apps do this better than others.
To snap fit apps, you can drag an app from the Modern UI task manager
and move it towards the left or right side of the screen, Windows will indicate
that it can snap the application there, at which point you can drop it. If you
drag an app from the task bar to the centre of the screen it will just replace
the currently running app rather then run alongside it. If you drag an app
from the task bar to the bottom of the screen, that will just close the app.
A slider will also appear between two apps open side by side. This slider
can’t be arbitrarily moved either, but can can be used to change which app
is the primary and which is docked.
These gestures can be performed using the mouse as well, using the
mouse you can even drag and drop a running app from its top edge to left
/ right side of the screen to dock it, or to the bottom to close it.
These operations also be performed using the keyboard. You can find
those later in this booklet.
The lock screen shows the current date and time, and can be configured
to show a lot more. You can have it show information from as many as eight
different apps, of which one can show detailed information. The lock screen
background can also be changed, which we will come to later.
The lock screen is a good place to get an overview of your system, and
can tell you at a glance whether you need to interact with your system to
check mail, return an IM etc.
There’s nothing much to do with it but dispel it and get on with your
work, which fortunately is as simple as clicking anywhere, pressing any
key or sliding the lock screen away. This reveals the login screen.
Modern UI
settings
A result of the
dichotomy between
Modern UI and
traditional / classic
desktop UI in Win-
dows 8, there also
two control panels Here the lockscreen is showing details for the calendar app
of sorts. and icons for a couple of apps such as mail
The traditional
Control Panel is retained, but there is a new touch-friendly settings appli-
cation that can configure common Metro UI settings.
To access this panel all you need to do is use the Settings charm and
click on the bottommost “Change PC settings” link.
This area can be used to configure most new UI aspects of Windows 8,
such as the Lock screen, stat screen, notifications, search, sharing, syncing
and a lot more. We’ll go by each setting in turn.
Personalise: Here you can configure the visual aspects of the Modern UI.
You can set a Lock screen wallpaper, and configure which applications
should show information on the lock screen. For the start screen you have a
range of designs and patterns available that can be applied – in addition to
no style – and you can pick from a number of pre-defined colour schemes.
You can also pick an account picture which will then be shown on the start
screen and login screen.
Users: Windows is a multi-user OS, and that hasn’t gone with Win-
dows 8 even as devices become increasingly personal. Here you can add
38 Get to know the new UI
user accounts, or
configure your own
sign in options. If you
connected your login
account to a Micro-
soft account while
creating it, you will
have an option here
to unlink it. You can
also configure how
you sign into your
Welcome to the new “modern” control panel account. Windows 8
supports picture pass-
words, and PIN based login schemes in addition to a standard password.
Notifications: Windows 8 has an in built Notification system that can
show updates from installed apps. Here you an configure which apps are
allowed to show notifications, whether notifications should be shown on
the lock screen and whether a sound should accompany a notification.
Search: Like the notifications page, the Search page lets you opt out from
showing certain apps while searching – useful once things start getting
busy. Here you can also clear you search history and configure if search
should show suggestions.
Share: Settings related to sharing between apps are listed here. As with
notifications and search, you can disable apps from showing up when you
are sharing.
General: Here you can configure settings related to the time, switching
apps, spelling (yes Windows 8 has in-built spelling correction), language,
application storage, refresh and reset, and advanced start up.
While most of the other options are quite intuitive, advanced start-up
could need some explanation. Since Windows 8 could potentially be used
on a touch-screen only device, how do you access the boot menu which
requires pressing F8? Advanced start-up is the answer. When you want
to boot to another OS or run recovery options, you can restart the system
form here rather than the regular way.
Privacy: Here you can let Store apps access your location, or use your
real name and account picture. You can also participate in an improvement
program for Windows Store that will send the URL for any content you
browse using apps to Microsoft.
Get to know the new UI 39
Devices: Any devices you add that can interact with Modern UI apps
will show up here.
Ease of Access: Here you can configure assistive technologies such as
high contrast mode, and narrator.
Sync your settings: If you use a Microsoft account to log in rather than
a local account, Windows 8 will be able to sync a number of you settings
with Microsoft’s cloud. These include personalisations, stored passwords,
language settings, app settings, browser settings etc.
HomeGroup: Microsoft added HomeGroups in Windows 7 as a simpler
way of setting up home networks. This feature is still available in Windows
8 and here is where you can configure it. The old way of configuring these
settings is still available, so unless you have a pure touch screen, there isn’t
much point using it here.
Windows Update: This is the simplest page of all. If there is an update,
it will show that you can do something about it. Otherwise you can check
for updates.
A picture password is easy to set up, but doesn’t allow any more than three gestures
Microsoft Account
One of the things that might tick people off about Windows 8 is how neces-
sary it is to have a Microsoft account in order to use it.
When you hear that all Modern UI Windows 8 apps need to be installed
from the Store, it seems restrictive, but there is also the hidden implication,
how do you identify yourself to the store?
The Windows store, since it is run by Microsoft, requires that you have
a Microsoft account in order to use it. What this effectively means is that
unless you have a Microsoft account, you simply cannot install any Modern
UI applications on Windows 8, which means no applications at all on Win-
dows RT since it only runs Store apps.
Windows does come pre-installed with a couple of applications, and
these do not come from the store. However, even these applications need a
Microsoft account if you want to use them in any meaningful way, or at all
in the case of some applications.
The Messenger and Mail apps, for instance, both need you to
associate a Microsoft account even if you want to only use them for non-
Microsoft services.
Now, this isn’t a big deal if you don’t have a problem with having a
Microsoft account. This is by no means something that is unheard of.
Android devices need a Google account, while iOS devices need an Apple
account. However if you don’t like the idea of needing an account just to
use a desktop OS, then you are a bit out of luck. Even Ubuntu needs an
Get to know the new UI 41
account for some of the features of the OS, although it is not even close to
as restrictive as Windows 8.
If it is just a matter of not wanting to associate your primary Microsoft
account with your OS install, you can create a separate account for this
purpose. So, if you are OK with a Microsoft account, what all you get?
A Microsoft account is essentially what used to be Windows Live, or
Microsoft Live. It is a number of Microsoft services wrapped up into one.
If you have a Microsoft account if you have used Hotmail, or SkyDrive.
A Microsoft account will give you access to all these Microsoft services.
If you make a Microsoft account for use with Windows 8 it will include
access to SkyDrive, with 7GB free online storage, and a Hotmail or Outlook
account for email. For Windows 8 you will also need it for the Windows
Store and to install Modern UI apps.
There are some benefits you get from using your Microsoft account to
sign into Windows rather than a regular Windows account. The first benefit,
and one we have already mentioned before, is that it will synchronise a lot
of your personalisations and settings across multiple computers. This is
understandably useless if you have just one computer.
Even third party app developers can tap into SkyDrive APIs and syn-
chronise their data using it. So your eBook reading app, could keep the
same eBooks on all computers along with maintaining information about
what page you are on in each book, browsers can ensure that your browsing
sessions (tabs, history and even cookies) are in sync across devices.
Another benefit is that this automatically keeps you signed in into all
apps that need a Microsoft ID. Otherwise you have to individually sign
into the SkyDrive app, the Games app, the Mail app, the messenger app,
the calender app etc.
This even automatically signs you into Microsoft services in Internet
Explorer, and can be used by other third party apps for ID as well.
Still having a Microsoft account connected to your local account is not
necessary, although having a Microsoft account probably is, if you want to
install any Modern UI apps at all.
or let you install them from the Store. It is for discoverability only. Also, it
is possible to install Modern UI apps from outside the store in a way. For
enterprise users, where a company might want to distribute applications
within the company without going through Microsoft’s Store, there are
ways available, but they are not available to consumers.
If you are developing a Modern UI app, you need some way to run it
and test it right? So those methods make it possible to install open source
applications without going through the store.
Realistically though, you are looking at the store as the source for all
your Modern UI applications.
The Windows Store is still new, and developing, so it does currently have
a dearth of good applications. Still you will find a number of popular games
and apps on the store, such as the Angry Birds games. The Angry Birds
games for example, are priced at around `250. Apps and games generally
seem to be priced around their mobile and tablet counterparts rather than
the desktop versions.
The Store is divided into numerous categories: games, social, enter-
tainment, photo, music and video, sport, books and reference, news and
weather, health and fitness, food and dining, etc. There is also a spotlight
section curated by Microsoft.
Each section can be browsed by clicking on name of the section (this
might not seem readily apparent) by using the links for each section that
let you browse to free apps, top paid apps or new releases. If you browse a
category by clicking on it you will see all the apps in that category, which
might be a little overwhelming. So, you can filter items in a category based
The store might just get a little hard to navigate as the number of apps increases
Get to know the new UI 43
Usability
and getting
work done
Windows 8 might just be the prettiest
OS out there, though far from functional.
Given time, can it capture your heart?
Here are some of the features designed
to make your life easier
46 Usability and getting work done
O
ne of the most flamboyant features of Windows 8 is its new start
screen. Windows, as we’ve known it since the past 15 years, has
undergone radical change and the desktop is no more the same.
Mobiles have invaded our computing experience and Windows
8 duly refletcs that trend.
viewing pictures and the Music app as the default for opening MP3 files.
Both these apps are Modern UI apps and if you fancy using them, consider
the fact that Modern UI apps don’t create a button in the taskbar. Here’s
where the Snap Apps feature is your mate.
Taking the decision about when to use Modern UI apps and when to use
Desktop apps when both are available on the same system can be difficult.
To make it easier, take these parameters into account:
1. On what device are you using Windows 8? – With new devices con-
stantly entering the market, the options have widened and the OS can
run on almost all of them – be they PCs, tablets, laptops /ultrabooks
or convertibles.
• For a PC, laptop or ultrabook, we recommend a desktop app over a
Modern UI app. Modern UI apps are built for touchscreens and the
controls aren’t very friendly for a mouse user. You can also expect a
void of keyboard shortcuts for Modern UI apps.
• A convertible device can transform from a tablet into an ultrabook
and vice versa. Your usage of the device itself should determine the
choice of apps. If you prefer the tablet mode, Modern UI apps are the
way to go. If you use it more as an ultrabook (and mind you, we’re
skipping the touchscreen usage), desktop apps would please you.
2. How frequently do you use a keyboard and mouse? – If you change
applications in a jiffy remembering the sequence in which [Alt +
Tab] will bring them up on the screen and you add footnotes to MS
Word documents using a keyboard shortcut, Modern UI apps would
annoy you.
3. Is it a convertible device? – Touchscreens are awesome – they avoid
keystrokes, use less energy, feel smooth and since the keypads don’t
take up any space, you get larger screens. Using touch on a desktop PC
can be a pain, but on a laptop, it can feel very natural. Make sure you
try out both before considering a purchase as this can drastically affect
your views on Windows 8.
4. How advanced a user are you? – Advanced users know their way around
the system. They change options frequently based on needs and squeeze
as much juice as they can get out of every device and app. Typically an
advanced PC user (touchscreen geeks excluded) uses a lot of keyboard
shortcuts and Windows 8 supports plenty of those. An advanced user
might find the extra mouse movements frustrating but can get used to
them in time.
48 Usability and getting work done
Changes in Windows
Explorer
You’ll find that Microsoft has
decided to remove Windows
Explorer from Windows 8.
It’s now called ‘File Explorer’.
While this move may fail to
impress, the changes in its
looks, features and function- File Menu in Windows 8 File Explorer
ality are bound to impress
you. If you were happy with Windows Explorer in Windows 7, Windows
8’s File Explorer will please you even more. Since most of our work with
the OS revolves around files and File Explorer is a constantly summoned
tool, it affects a large part of how we interact with the OS.
The biggest change to the explorer is the addition of the ribbon, not
unlike the one you’ve seen on Office 2010. You can collapse the ribbon bar
to save space when you wish to. File explorer normally hosts four tabs in the
ribbon bar: File, Home, Share and View. Let’s talk about each of these tabs:
File tab
This holds the usual menu.
Useful as it may seem, there
resides another option to open
a command prompt right away
and it will ‘cd’ you into the
Well spaced controls are good only for the tablets directory you have open in the
explorer window. Similarly
you could open up the Windows PowerShell too. Help, Delete history and
Close are the other obvious options. Open new window is another useful one.
Home tab
The most common functions related to files are under the home tab of the
File Explorer. Functions such as Cut, Copy and Paste are on the left-hand
Usability and getting work done 49
Home tab of Windows 8 File Explorer - The parent-folder button has returned on the address bar
Three buttons in the ‘Select’ section allow you to select all files, select none
or invert the selection (deselect the selected ones and select the unselected).
Share tab
Here you get the common options to share the files you’ve selected in the
main window. You may zip the files, burn them to a disc and if Windows
knows how to print the file, it would enable the print and fax buttons. For
some strange reason, the Email button didn’t get enabled even after having
configured the Mail app (Modern UI app) successfully. Explorer doesn’t seem
to recognize the app as an email handling program and throws an error if
we try to use right-click > Send to > Mail recipients. Sharing files with the
homegroup and revoking the permissions are a click away.
While advanced users would have already used the functionality to their
advantage in the past, Advanced Security button exposes those arcane,
difficult-to-understand options to a normal user. We’ll try to explain some
of its functions in the chapter dedicated to security.
View tab
There are times when one can live with less screen real estate while there
are other times when one needs all the space they can get with all folders
shown, especially when looking for a file buried deep inside folders. Until
Windows 7, the options were located in the ‘Folder Options’ dialog box
only. The View tab exposes the most useful functions from that dialog box.
The navigation pane can be enabled/disabled in just a couple of clicks and
customizing its view is quite easy as well. You can toggle one of the preview
or details panes on the right side of the window without any difficulty (the
details pane no longer appears at the bottom of the window). View layout
options is now visible easily as opposed to the old ‘click to open a menu with
a vertical slider’ style. The good part is: the layout will change temporarily
as and when you hover over the option (in much the same way it happens
when you hover over the ‘styles’ in MS Word 2007 and higher). The bad
part is: if you scrolled all the way down in the directory, an accidental hover
on the layout styles will send you back to the top again.
The ‘Current view’ section allows you to sort and group the view the
way you’d like covering the options we’d usually find in the View, Sort by
and Group by entries of a right-click menu (call it the ‘context menu’ if you
will). Seeing hidden files and hiding the currently visible ones are both
single clicks away – the process is so simple now that it almost defeats the
Usability and getting work done 51
primary purpose of hiding the file. The only good purpose it can serve is to
make sure that [Ctrl + A] doesn’t select a hidden file or folder – useful if you
were to delete them all. Viewing file extensions is an option right up there
on the ribbon as a checkbox. And just in case you need more control, the old
‘Folder Options’ dialog box can be accessed by clicking the Options button.
Miscellaneous tabs
Miscellaneous tabs, one for each type of file or location can appear on the
ribbon bar. For example, when you’re in the ‘Computer’ window (the system
‘Computer’ folder which lists the available drives), the Home and Share
tabs disappear and the Computer tab comes up with links to Control Panel,
System Properties, Program management and Computer management tool.
Again, depending on what file you have selected, file explorer would
bestow a new tab e.g. ‘Play’ for video and audio files and ‘Manage’ for
picture files. Selecting a drive in the Computer folder will add the tab to
manage the drive – format, defragment, enable bitlocker and disk cleanup.
All of this makes it a whole lot easier for those who could not follow the
long instructions like “right-click drive, go to properties, and switch to
the Tools tab”.
File Explorer is one of the best changes made to the Windows 8 UI. It
comes with almost all the goodies we’ve been waiting for and wait, the ‘Folder
up’ button is back too! Most used functions which were hidden beneath
menus and tabs are now on the ribbon. One can add the more frequently
used functions on the quick access bar and personalize the experience alto-
gether. You can minimize the ribbon using the button located just beneath
the Close button on the title bar for some extra screen space as well.
overhaul. There are new tabs added to the interface and the information
shown is better organized.
With time, all apps have become update hungry. Almost every application
you can install has the capability to update itself over the Internet. Some
applications do it silently without informing you and they don’t even show
you an option to alter this behavior. Google Chrome serves well as one such
example. The Processes tab has replaced the Applications tab and hosts
an extra column to show
the network bandwidth
consumption by processes.
This is truly useful for those
who want to save every bit
of network resource. If your
network is not working at
the speed you’re expecting
it to, open Task Manager in
Windows 8 and if you find a
resource consuming process,
kill the culprit. At the top,
you have the total resource
The Task Manager has become more meaningful usage for each category
than ever in Windows 8 (CPU, Memory, Disk and
Network). Processes using
more resources than others are easily distinguishable by the intensity of
the background color. You can view the list of application windows running
under one process by clicking the triangle on the left of the process name
entry. Windows processes show up along with other background processes
as well. The background processes list would typically also contain the
tray icon processes among others – making it easy to kill off a process if
it doesn’t offer an ‘exit’ option! However, the Processes tab doesn’t show
the Modern apps by default. To view them, you need to enable them from
the menu; follow the path View > Status Values > Show suspended status.
The performance tab has a summary view which does away with details
and makes the window look like a widget showing you the summary of
resource usage. The regular view has been split into two – resource names
on the left, graphs on the right. Clicking the resource name on the left shows
the detailed view with the resource graph on the right. Each resource has its
graph summary view as well. We have a screenshot with CPU graph over-
Usability and getting work done 53
view and other graph overviews will appear very similar. However, you can
have only one task manager running despite your wishes to have multiple
windows floating around. You can disable/enable the small graph boxes on
the left pane via a right-click menu option. As always, you have the link to
Resource Monitor on the performance tab to have a detailed look, if you desire.
App History tab shows the list of apps with their respective resource
usages since Windows 8 was installed, or when you last cleared the usage
history. This can help discover the apps which have been utilizing too much of
network bandwidth or the ones which keep the CPU busy to drain the battery.
The only change on the Services tab is a link to open the Services Manage-
ment Console instead of a button. However, there is a new Startup tab which
shows the list of applications that start up when you log in to Windows. You
have options to not just disable the app from starting up but also to find the
file location or search online. The search online feature will launch Bing
search with the process filename as the search parameter. Traditionally,
controlling startup applications has been a part of the msconfig system
configuration tool until now. The msconfig tool in Windows 8 just links to
the task manager instead.
The Users tab now gives the details of resource utilization by processes
running under the respective user accounts. Details tab lists the processes
the way older versions of Windows have been doing under the Processes
tab. In other words, we still have the old ‘Processes’ tab, although now
renamed to ‘Details’.
Most other apps have not changed. Except of course, the title bar and the
new looks Windows 8 brings to the table by default, Notepad, WordPad,
Paint, Calculator and other accessories have gained absolutely nothing in
the new version.
Internet Explorer
Internet Explorer 10 looks pretty much the same as it looked on Windows
7. But there’s more to it. Windows 8 comes with two versions of Internet
54 Usability and getting work done
File History
File History is one of the long awaited features of Windows 8. Typically,
file backups have to be taken manually: you either write the data to a CD/
DVD or copy it to a USB drive or external hard disk. The File History feature
56 Usability and getting work done
tory in a separate location than the original file version, saving yourself
from accidentally overwriting all current files with their older versions.
ΩΩ Select Drive: It’s here that you select the partition from one of the drives
which qualify for the feature to be used by File History. Remember that
you can select only one drive at a time. File History can’t utilize more
than one drive at a time. A folder named ‘File History’ is automatically
created on the drive selected by you.
ΩΩ Exclude Folders: If there are any folders that you want to exclude from
being backed up by File History, you can specify them. This rule will
apply to any folder added to any library as well as to Desktop, Contact
and Favorites folders in your user folder as well.
ΩΩ Advanced Settings: There are three characteristics of File History you
can tame from this screen:
1. Frequency of file saves: By default, File History saves the files every
hour. You can change the frequency to anywhere between ‘10 minutes’
to ‘Daily’. It goes without saying that higher the frequency of backups
by File History, more the disk space utilized.
2. Size of offline cache: This applies to the case when you’ve selected
a network folder on the ‘Select Drive’ page. It determines how much
of the recent backups will be kept locally as cache. The default value
is 5% of the disk space, and 20% is just as high as you can go.
3. Versions to save: The default is ‘Forever’ which means that File His-
tory won’t delete anything, ever. However keeping the default is a bad
idea – you’re bound to eventually run out of space. Unless you really
have enough space, it’s recommended to change it to something more
modest such as three months. This should typically be the duration
after which you perform that boring manual job of organizing files and
ensuring that everything is in order. If you’re one of those who take
backups regularly, three months should be good otherwise ‘Forever’
isn’t a bad option either, given that fact that you can manually clean
up the versions you don’t need by clicking the ‘Clean up version’ link
just below this option.
File History is one of those features which we’d truly swear by. Once you
start using it, there’s no going back. Sure there have been backup programs
but when it comes integrated with the OS in a neat and easy to use package,
it becomes unbeatable. Although there are many improvements, for some,
this alone can be reason enough to purchase Windows 8. File History is
available in all versions of Windows 8.
58
Chapter #5
Windows 8
security
Hardware features have long been
ignored to elevate security. Windows 8
changes that, and in a big way
L
ike all other operating systems, Windows 8 has its army of fanboys.
While those standing on the anti-Microsoft podium may chastise
Windows for not being secure enough, a look under the hood
suggests that Windows has multiple defenses against hacking.
Windows 8 erects new walls to keep out cyber criminals. In this chapter,
we’ll show you glimpses of the Windows 8 security system (truly, there’s
no way we’d be able to explain all its marvels in a small booklet).
Windows 8 security 59
NTFS / EFS
NTFS, which provides enhanced security for files, is one of the most impres-
sive file systems around. It comes with a sub-system called EFS (Encrypting
File System) that can be used to encrypt files and folders. To encrypt the file
(or folder), you open the file’s properties and click on the ‘Advanced’ button
on the bottom of the ‘General’ tab. In the ‘Advanced Attributes’ window,
you can enable the ‘Encrypt contents to secure data’ option and apply it.
The best part about EFS is that it doesn’t need any explicit decryption
once you’ve encrypted the file. The user who has encrypted the file can
open it just like any other normal file and EFS will encrypt/decrypt the
file in the background as the user works on it. EFS is so tightly integrated
into Windows that if the disk is taken out the system or the OS removed/
reinstalled, it locks out the files completely. This behavior is embedded in
the process of encrypting the files; here’s how it happens:
1. The file is encrypted using either AES or 3DES algorithm with a ran-
domly generated number as the FEK (File Encryption Key). The reason
AES is used is because it’s fast and symmetric. Once encrypted, the file
can only be decrypted by using the FEK.2. The FEK is encrypted using
one of the most famous and secure public key algorithms – RSA. EFS
saves the encrypted version of the FEK with the file. The public-private
key pair to be used by RSA is automatically generated for a user if it’s
the first time s/he is encrypting a file. Since the FEK can be decrypted
only by the private key, knowing the private key is necessary. This key is
stored in the user’s profile directory. At this stage, if the file is transferred
to another computer it’s protected because the FEK is encrypted and the
private key needed to decrypt it won’t be available.
3. Storing the private key so openly exposes a major security risk. Hence
the private key is also encrypted by using a master key. At this point,
the file can only be decrypted if the master key is available.
4. The master key is also generated randomly by Windows when the
encryption happens the first time. The user’s master key is encrypted
using 3DES algorithm which employs a key that’s partly based on the
60 Windows 8 security
user’s password. When the user changes his password, the master key
is automatically decrypted and re-encrypted based on a key derived
from the new password.
5. Finally, the file is protected at the ‘installation’ level.
This procedure provides multiple levels of security under various cir-
cumstances. One needs to know the user’s password (along with all other
keys) to decrypt the master key if the file is to be accessed in a different instal-
lation on the same machine – one more reason to have a strong password.
When an administrator changes the password of another user, say ‘UserX’,
the master key of UserX is not automatically decrypted/encrypted. Hence
another user, even if its the administrator, can’t access files encrypted by
another user (but there are workarounds
for an administrator which he can set up
beforehand). If the file is moved out of
the machine then the user’s private key,
master key and the key used to encrypt
the master key – are all missing. Cracking
it becomes next to impossible. There’s a
downside though: if your installation gets
corrupted or you reinstall your OS, you’re
locked out of your own files. To save you
on such a day is this guide: http://bit.ly/
XFwygo
Encrypting a file using EFS Beyond EFS, NTFS has its own per-
mission system to grant and revoke per-
missions for every file or folder for every user and group in the system.
These options can be accessed and changed on the ‘Security’ tab of the
file/folder properties window. This is good enough to block programs
and certain files and folders from being accessed by a non-administrative
user on the system. An administrator though, can change the restrictions
imposed by another user.
Registry
Yet another integral part of Windows – a central spot for all system set-
tings, configurations and preferences – is the registry. Registry controls the
behavior of the entire OS. Any setting that you change in Windows will end
up changing some value in the registry. Many applications also host their
settings under Registry. It controls a large part of Windows’ behavior, and
Windows 8 security 61
there’s no shortage of tips and tricks (such as disabling the task manager
or the registry editor itself) on how to effectively utilise it. All keys and
hives of registry are also controlled using permissions that resemble the
NTFS permission set. Registry is (mostly) built by files located in Windows\
System32\config folder in your installation drive. If you change the per-
missions on the right hive, you’d be able to see your encrypted password,
your password hint... everything. Back that hive/key up and you’ve created
another way to recover your password!
BitLocker
Introduced in Windows Vista and
enhanced in subsequent releases,
BitLocker is a full-disk-encryption
method which encrypts an entire
volume (this could be an entire
disk or a primary or logical par-
tition) using AES 128 bit encryp-
tion. Though the algorithm is well You can turn on BitLocker right from the File
known by the world, its implemen- Explorer
tation in BitLocker is closed and
has probably been altered. BitLocker can be used to encrypt any drive
attached to Windows Vista. However with Windows 7, BitLocker was avail-
able to be used on external drives as well.
Given that the hardware has a TPM (Trusted Platform Module) chip, it
can also encrypt the Windows installation drive. The OS drive encryption
requires an additional volume formatted in NTFS with a size of 100 MB
which is left unencrypted (there’s your answer to why Windows 7 Ultimate
creates that apparently useless partition of 100 MB when installing). This
volume is used to store the files responsible for loading Windows. This is
similar to Linux which can also have a separate ‘/boot’ partition. However,
if the files on the boot volume of Windows are found to be altered, BitLocker
will refuse to load Windows! BitLocker is available in Enterprise and Ulti-
mate editions of Windows Vista and Windows 7 as well as in Pro and
Enterprise editions of Windows 8. You can find BitLocker in Control Panel.
Integrity Levels
Integrity Levels were introduced in Windows Vista to enhance the protec-
tion provided by Windows ACLs (Access Control Lists). Prior to Vista, any
62 Windows 8 security
process launched by a user could do what the user could. This was one of the
reasons why using your computer as an administrator was risky. Integrity
Levels introduced a ‘per object’ protection where each object in Windows
was marked with a certain integrity level. More important the file/object,
higher the integrity level it possessed. The (in)famous UAC in Windows
Vista actually determined the maximum integrity level of a process running
under a user account without prompting the user for permission. Even
the processes launched by an administrator had access to only moderate
integrity level objects.
So, while an admin user could read and modify an important file, a pro-
cess launched by him would not be able to do either, without first asking for
permission (well, according to the UAC settings). In Windows Vista, every
file and registry key was marked with an integrity level and the trend has
continued since then.
When the browser reads that, it will redirect to Digit’s website. That is
one of the most simple examples of code injection wherein the input received
by the program actually tries to produce results that were unintended. In
the web domain, this example would actually be called an XSS (Cross Site
Scripting) attack.
An application working on the computer would receive and process
inputs given to it by the user from time to time. In a fashion similar to that of
the webpage, if the user tries to send an input to the program which would
actually cause the program to do something different than it intended to,
then it would be called ‘code injection’. It’s termed as code injection because
the input given to the target program is usually a carefully crafted piece of
executable code. Remember however, that a code injection for an application
program is much more complicated and difficult than that for a web page
due to the arcane format in which executable codes are expressed.
Address Space Layout Randomization is a method to prevent hackers
from executing an injected code. Typically when a library (a DLL file) loads
into the memory, it prefers to be put at a certain address in the memory.
This is true for the executable files as well. Only if the location is unavail-
able, will Windows put it elsewhere. ASLR changes that. It randomizes
the memory location where libraries are to be loaded every time Windows
boots. This takes away one of the biggest advantages in the hands of hackers
– predictability of memory address of a library. ASLR was introduced in
Windows Vista.
Forced ASLR
Forced ASLR, a feature introduced in Windows 8, tries to force ASLR on
every library that is to be loaded. However if the library doesn’t have the
information needed to leverage the ASLR function then Forced ASLR
64 Windows 8 security
HEASLR
Although ASLR tries to allay the pos-
ASLR Randomizes the memory loca- sibilities of random code execution, its
tion of libraries each time you boot potential is limited on a 32-bit platform
Windows 8
due to limited memory space available
for allocation of libraries at the load-time. Theoretically 32-bit systems can
use up to 4 GB of memory but Windows won’t utilize more than 2 GB of
it for any process’ user address space. The ASLR algorithms in Windows
Vista and Windows 7 until now have been using the same algorithm for
both 32-bit and 64-bit platforms. This approach defeats the benefit ASLR
could get on 64-bit systems with a lot more randomization space available.
HEASLR or High Entropy ASLR utilizes the address space by giving more
randomness to the memory addresses at which libraries are loaded in
runtime thus elevating security to another level on 64-bit platforms. Like
ASLR, HEASLR is also an optional feature.
If you’re a developer, it’s advisable to make sure that ASLR is enabled
for the libraries that you create. While Visual Studio 2010 enables ASLR
by default (make sure of it in Project Properties > Configuration
Properties > Linker > Advanced), HEASLR needs to be enabled
manually by adding the /HIGHENTROPYVA option to the linker.
Interestingly, Internet Explorer 10 is one of the first apps to take advan-
tage of all the new ASLR improvements – and that makes it more secure
than the competition against specific attacks.
in the manifest (such as accessing the device camera) and it tries to access
the resource while running, the access is denied by Windows 8. Although
AppContainers is enabled by default for Modern UI apps, it can be utilized
in desktop apps too by using the API.
win32K.sys
If you know Windows internals well enough, you probably already know
about the win32k.sys driver. It’s the kernel part of the Windows sub-system.
This file is responsible for handling user spaces as well as the primitive
(and yet necessary) GDI sub-system. The GDI has almost always been a
primary target of attack due to the unprotected API it provides. This makes
the win32k.sys a bright attack target as well.
In Windows 8, Microsoft has restricted processes from accessing func-
tions in win32k.sys directly. This means that a significant set of functions
which were available for code injection and could later be used to execute
malevolent code have been barred. This cranks up overall security of the OS.
However, security is a cat and mouse game. Every time Microsoft comes
up with new measures, hackers around the world figure out workarounds.
One of the major loopholes of software has been the inability to use the
advanced features built into the hardware. Windows 8, for the first time
mandates certain hardware features to be installed (PAE, NX, DEP) and
utilizes some advanced features in newer, latest processors (such as SMEP
in Ivy Bridge). While we consider this to be a step in the right direction, only
time will tell if this will keep out hackers.
Creating a PIN
Windows 8 allows you to log in to the machine using a 4-digit PIN (reminds
you of an ATM, eh?) as an alternate option. You can create a PIN in the same
user management section within the PC settings app. The process is simple:
click the ‘Create PIN’ button, enter a 4-digit pin twice and you’ll be able to
use it the next time you need to log in to Windows. Although too small a
feature, when you opt to sign in with a PIN, Windows doesn’t require you to
press [Enter]. The moment you enter the 4th digit in the correct sequence,
you’ll be signed in.
2. Web filtering:
This can prevent
access to certain
websites, using
an automated rat-
ings system (has
to be previously
selected) or restrict
access to selected
websites. This can
help ensure that Family Safety can be used to restrict the period during the
children are not day when the child account can assessed on the PC
wasting time in the
name of doing research on Wikipedia.
3. Game and Store settings: This enables the parent to set an age-based or
content-based rating level for the games your child can view, download
and install from the Windows Store.
4. App restriction: The child won’t be allowed to launch certain apps.
It would help the parent emphasize that the child can launch a music
player but not a game.
Windows Defender
Introduced during the days of Vista’s rise and immediate fall, Windows
Defender has now matured into a full-fledged antivirus. You can launch
Defender using the start screen search. Just like any other antivirus, it would
update itself over the internet periodically and will scan the computer or a
folder when you want. Like a faithful protector, it sits in the background,
aware and ready to defend you if it senses suspicion. Windows Defender is
installed and enabled by default and is set to download updates automati-
cally by default as well.
Windows Firewall
If securing your PC from unwanted physical access is the first step towards
security, having a good firewall would definitely be the second. A firewall’s
responsibility is to block the incoming and outgoing traffic over the network.
Windows, since XP Service Pace 2 has provided a firewall which can get the
job done. While it shows you a simple interface in Control Panel, a much
advanced core sits beneath.
70 Windows 8 security
You can access the basic interface from Windows Control Panel >
System and Security > Windows Firewall). If you want to allow an
app or feature through the firewall, you have the option on the left pane. Be
warned though – that feature doesn’t help you restrict a program, only allow
it. If you want to restrict a program for inbound and outbound traffic, you’d
need to open Windows Firewall with Advanced Security (WFAS), which
can be accessed by clicking ‘Advanced settings’ on the left pane. Before we
proceed, we should inform you that WFAS is not a separate firewall; it’s
just an advanced interface to the same technology.
Though intimidating at first, WFAS is a pretty good tool to block traffic.
The rules are classified into two main types:
1. Outbound Rules: They’re basically there to restrict the initiation of com-
munication by a local program or service. They’d be applicable to most
programs and services we use. So if you don’t want Firefox to access the
internet, this is where you create the rule.
2. Inbound Rules: They restrict / allow a connection coming from another
computer to your computer. The rules here are useful for background
services such as a print service, Web server, Database server, FTP service
etc. Though in most cases the rules enabled by default suffice, you can
create one of your own. This you can do by right-clicking the rule type
(Outbound/Inbound) in the left pane and selecting ‘New Rule…’ from
the menu. All rules can be applied to any and all network types – Public,
Private and Domain. Remember though – the Domain network type
exists in Windows 8 Pro and Enterprise editions only.
Windows 8 takes the solid security foundations developed into the
Windows architecture over the course of the past 14 years and improves
them by utilizing more hardware features. Features such as Forced ASLR
and HEASLR improve the security on the software level and are aimed
to defeat malicious hackers. The AppContainer feature, along with strict
manifest checks help build confidence and reliability on Modern UI apps.
NTFS, BitLocker and EFS, as always stand firm in the background to secure
your data from potential file system attacks offline.
71
Chapter #6
Windows 8 –
Enterprise
features
“Built by one of the largest enterprises
on earth” may be reason enough to trust
Windows 8 in your own enterprise. But
that is not where all reasons end
W
indows is not simply the world’s most used desktop
OS because consumers buy it; it’s also a favourite with
businesses ranging from small enterprises to corporate
behemoths using it in their offices. And why shouldn’t
72 Windows 8 – Enterprise features
Active Directory
No, this is not really a directory. It’s a service available in Windows Server
Editions. Active Directory Services (or ADS) empowers an organization to
take control of its office computers. ADS is used to create “logical domains”
of computers and enforce security rules throughout the domain at different
levels of granularity.
ADS can be used as a cen-
tral password storage tool
– when a user logs in to the
domain on a client computer,
the domain controller (the
computer running the ADS)
checks for the password and
determines the type of user
that has logged into the client computer. It would then initiate the login pro-
cess for the client and send the list of security policies which the client must
follow. Policies of different types can be implemented via ADS. Controlling
74 Windows 8 – Enterprise features
AppLocker
This feature saw the light of day in Win-
dows 7 and is there in Windows 8 Enterprise
(only). If the name doesn’t make it obvious,
may we tell you that AppLocker is a dream
feature for bosses who’re always striving to
You need to enforce the rules
in AppLocker to bring them to improve employee productivity. It simply
effect disallows applications from running. This
feature answers four questions:
1. Which applications should a user have access to run? – Be it playing
Mahjongg or starting Windows Media Player, AppLocker can help.
Windows 8 – Enterprise features 75
Windows To Go
To have a ‘Live Linux’ is no big deal. NOTE
Download it, burn it, it runs. For Win- 1. AppLocker can be started
dows, it would be a herculean task if by typing ‘gpedit.msc’ in the
you could do it without any tools. There search box and then navigat-
already are tools like BartPE and Win- ing to Local Computer Policy
Builder which allow you to create your > Computer Configuration
own Live Windows DVD or USB, but > Windows Settings > Secu-
they’re not supported by Microsoft. rity Settings > Application
They’re more of a hobbyist’s tools, and Control Policies in the Group
enterprises would rather not bet on a tech- Policy Editor window.
nology unsupported by Microsoft due to 2. If you haven’t used Ap-
risks associated with such deployments. pLocker yet, then let it be
Don’t be disheartened because Windows known: just creating rules
8 Enterprise has an alternative – Win- won’t do anything. You need
dows To Go – which lets offices boot from to first enforce the rules.
USB disk drives (including external hard To do this, right-click ‘Ap-
disks). Enterprises can distribute their pLocker’ on the left pane and
preconfigured corporate setup on a USB select properties.
drive with all the security and restric-
tions they want and that too with official
support! Unfortunately, it’s not for home users. That said, one of the most
exciting features of Windows To Go is its behavior upon removal of the USB
76 Windows 8 – Enterprise features
drive. If it’s taken out of the port while a Windows To Go session is active,
Windows 8 will freeze the execution and resume if the device is plugged back
in within 60 seconds. If the device is not plugged back in, the system will
halt itself. The limited timeframe of 60 seconds has been given to prevent
any sensitive data from being displayed on screen. Since Windows To Go
is available only on Windows 8 Enterprise which is intended for office use,
the duration of 60 seconds is reasonable.
DirectAccess
VPN or Virtual Private Networking is not a new concept. Organizations have
been using it since eons to allow someone (well, usually employees) access
to the corporate network via the internet. DirectAccess, introduced with
Windows 7 is an improved version of VPN. While a VPN connection must
be explicitly started by the client, DirectAccess does the same automatically
(once you’ve configured it, of course). DirectAccess needs at least Windows
Server 2008 R2 on the server end and operates over IPv6. If the client com-
puter requesting the access is not on an IPv6 network, the traffic is tunneled
via 6to4 or Teredo. Once again, the feature is only for Enterprise clients.
BranchCache
Chances are fair that you know about the ‘Offline Files’ feature. Yeah, the
one which enables you to make remote files available on your own computer
so that you can work on them from anywhere. When you’re done, perform
sync and the files are pushed to the server. All well and good. But that’s not
enough for the more demanding amongst us. BranchCache is the enterprise
level offline file caching service for WANs (Wide Area Networks) which
needs Windows Server 2008 R2 and above to host files, typically from
branch offices of an enterprise (hence the name) so that computers in those
branches can easily access the files without having to overload one central
server. It not only saves the server from load but also optimizes network
usage and increases response times, similar to the way browser saves do
by caching images, CSS and JS files in a page.
Other features
While there’s no way we can describe all the enterprise elements Microsoft
built into Windows 8, these are the most distinguishing features with ADS
being the most important of them all.
77
Chapter #7
Become a
power-user
We pull back the curtains on Microsoft’s
latest Windows and show you how to get
the most of what you want out of the OS
L
ike with every previous version of Windows, the out-of-the-box
experience of Windows 8 can be greatly enhanced if you know
your way around the system. There are a number of hidden, unin-
tuitive or poorly explained features in all versions of Windows
and if you are willing to take a few risks, make a few changes under the
hood, and perhaps take advantage of some third-party tools, you can get
your Windows experience a lot closer in line with what you want.
78 Tips and Tricks
Now, if these two are the only ways you used the Start Menu, you don’t
really need a start menu at all to be honest. You can still pin applications to
the taskbar. And if you want to search for apps, you can still press the start
button and simply start typing on the start screen, the process is the same.
If you really want a menu though, there are a few options for you. The
lightest, cheapest and most straightforward option is to use the toolbars
function of the taskbar to create a simple start menu toolbar. Here is how
you can do that:
ΩΩ Right click on the task bar, and under the Toolbars menu click on “New
toolbar…” a dialog will open up for picking a folder.
ΩΩ The contents of the Start Menu are actually stored in two folders,
the folder for applications installed for the current user is located at:
%APPDATA%\Microsoft\Windows\Start Menu\Programs
Paste this in the file open dialog, press enter, and select it as the location
for the toolbar.
You will notice a new toolbar called Programs on your taskbar, and
you can click the arrows next to it to access the list of installed programs
on your computer.
There is another important folder here:
%PROGRAMDATA%\Microsoft\Windows\Start Menu\Programs
This lists applications that have been installed globally.
Of course this is very far from a perfect solution so, don’t worry, there
are a few apps that can get back the start menu.
Shutdown immediately:
shutdown /s /p
Reboot immediately:
shutdown /r /p
To add a time delay of x seconds to the shutdown process, just add a
space followed by a “/t x” after the above commands.
If you are not familiar with the process of creating a shortcut, just right
click on an empty space on your desktop or any open folder in Explorer,
and under the “New” menu click on “Shortcut”.
There are also a number of apps on the Windows 8 Store that can con-
nect multiple storage providers through a single app. One such application
(this should not be seen as an endorsement) is Cumulo, and it can connect
to Microsoft SkyDrive, Google Drive, and Dropbox (the Pro version sup-
ports SugarSync and Box as well). There are other similar apps for adding
multiple providers in one interface.
It is important to note that the storage providers you add will only be
accessible by modern UI apps.
Now you should be greeted by a text-based boot menu – the kind you would
find in previous versions of Windows. This isn’t just superficial though, the
old style menu works the old way, where it first shows the menu, and then
starts booting the OS. If you are dual booting, this is a huge time saver.
ΩΩ Press [Win]+[W] to search for settings in the start screen, type “group
policy” and press enter.
ΩΩ In the window that opens up drill down to Co m puter
Configuration>Windows Settings>Security Settings>Local
Policies>Security Options
ΩΩ In the right hand area near the bottom you will find the policy called
“User Account Control: Run all administrators in Admin Approval
Mode”; double click this setting.
ΩΩ In the dialog that opens up, select Disabled, and click OK.
ΩΩ Windows will warn you that the system’s security has been reduced and
will prompt you to restart.
Once you have restarted, the new settings will apply. Applications will
launch with admin privileges by default and Metro apps will be disabled.
Enable Hyper-V
If you are running Windows 8 Pro, you will be pleased to know that your OS
includes a pretty advanced virtualization software called Hyper-V. Hyper-V
is comparable to software like VMWare Workstation and Oracle VirtualBox.
Hyper-V is included with Windows, but does not come installed by
default. Installing it is simple though, all you need to do is the following:
Press [Win]+[W] to search for settings in the start screen, and type “fea-
tures” one of the results should be called “Turn Windows features on or
off”, launch it.
A dialog will show up that allows you to enable and disable a number
of Windows features, Hyper-V is one, select it and click OK.
Windows will now begin installing the software, and it should be avail-
able after a reboot.
You should note that installing Hyper-V may make it impossible to
install other virtualization software like VMWare Player or Workstation.
Gestures in Windows 8
Being the touch centred operating system that it is, Windows 8 includes
90 Tips and Tricks
a number of gestures that can be used to access many of its new and old
features. Some of these are probably not very comfortable for mouse
users though.
Here are some of the gestures you can perform in Windows 8, and their
resulting actions:
ACTION RESULT
Press and Hold Context menu (right click)
Swipe from right edge Charms bar
Swipe from left edge List of open apps
Swipe from bottom Command bar in modern apps
Swipe from top to right / left Snap app to left or right of screen
Swipe from top to bottom Close running app
Action Shortcut
Open the charms bar Win+C
Use the search charm Win+Q
Use the share charm Win+H
Use the devices charm Win+K
Use the setting charm Win+I
Search Win+Q or pres Win and start typing
Search Settings Win+W
Search Files Win+F
Zoom in on Start Screen Ctrl+Plus
Zoom out on Start Screen Ctel+Minus
Open command bar Win+Z
Switch to Desktop from Modern UI app Win+D
Snap app to the right Win+Period
Snap app to the left Win+Shift+Period
Move app to next monitor Win+PgDown
Move app to previous monitor Win+PgUp
Switch between Modern UI apps Win+Tab
Show Quick Link menu Win+X
The process for changing search and share apps is similar to changing notifications
just have a toolbar that has all the important file operations on it, there is
an simple solution.
If you launch explorer you will notice that above the ribbon, in the titlebar
area, there are a number of icons and a downward pointing arrow. You can
“pin” operations from the ribbon to this toolbar and use them from there
without using the ribbon UI at all. You can add individual items, individual
options or even entire panes as items to this toolbar.
If you don’t like the location up in the titlebar, you can click on the
downward arrow and select “Show below the Ribbon” to move it to the area
below the ribbon, but above the address bar.
Once you have created a pool, you can begin creating spaces. You can
add more drives to a pool, rename a pool or delete a pool from here as well.
You can also create a new pool with a new batch of drives if you want. So
you can have multiple pools with different storage spaces in each.
To use the storage spaces in a pool you need to connect all the drives in
that pool, or enough drives such that all the data is available.
A very important thing to note about Storage Spaces is that they wont
work on Windows XP, Vista or even 7. This is a new technology and will
only be available in Windows 8 and above. Also if you use Linux, you
may want to avoid this since it is currently not supported. Linux provides
similar – but harder to use – features.