First of all, Vista clearly paved the way for Windows 7. It introduced a new graphics and sound model that would help the OS compete better with Apple and properly bring it into the 21st century. The big change was forcing drivers to run in user mode as opposed to administrative mode. The benefit was a more stable system. It became harder, for example, for a graphics glitch to cause a BSOD forcing an unexpected reboot - something that would have certainly caused a fatal crash in XP.
Benefits like that didn't come without a price. Third-party software developers were slow to react to the new Vista environment. Despite the long beta phase, Vista didn't have the widespread support it needed at launch to really be successful. As a result, early adopters found the new OS cumbersome, slow, and often buggy. Vista never recovered, at least not in time. Windows 7 didn't really fix the issues with Vista either. Truth is, by the time Windows 7 launched, 3rd-party support for Vista was already stabilizing, and it immediately carried over into Windows 7. The newer OS appeared to be the savior to Microsoft's Vista debacle, but in reality it had the benefit of not coming first. Vista deserves more credit than most people give it.
As for security,
dilettante makes a good point. UAC in Windows 7 and later was relaxed, sacrificing a little security for usability. While Vista undoubtedly had the more secure UAC model, it rendered a system practically useless in an Office environment. Corporate administrators don't like to give standard users admin rights. But with Vista, you had to, otherwise non-admin users would be faced with entering admin credentials on top of clicking "Yes" to the UAC prompt (as you can imagine, this would become a nightmare for the company's IT dept). Some may think the newer UAC model in Windows 7 was a poor decision, but in reality, Microsoft had no choice. Vista's implementation of it wasn't practical for business, and without corporate backing, the OS had no chance of becoming widely accepted.
Good thing UAC is only one piece of the security pie. Advances in other areas, like software and hardware DEP (Data Execution Prevention), new features like "Supervisor Mode Execution Prevention" (SMEP) integrated within modern Intel CPU's, and Windows enhancements like ASLR and ForceASLR which randomize address space allocation, all help to make the environment more secure. Even with a flawed UAC model, these features make it harder for malicious code to gain complete access. So we shouldn't be quick to judge a weaker UAC in later Windows releases as meaning the OS is less secure. The operating systems are advancing in other ways.
-Carl
"
The glass is neither half-full nor half-empty: it's twice as big as it needs to be."
[tab][navy]For this site's posting policies, click [/navy]
here.