Please NEVER Connect Windows XP To The Internet...

SomeOrdinaryGamers
19 May 202415:57

Summary

TLDRIn this informative video, Mudahar warns against connecting outdated Windows systems like XP, Vista, and 7 to the internet due to the high risk of hacking within minutes. He references Eric Parker's experiment where a Windows XP system was exposed online, resulting in a Russian hacker gaining access within 10 minutes. Mudahar emphasizes the importance of using updated operating systems and maintaining security measures like firewalls. He also touches on the fact that large organizations, including the US military, still use Windows XP due to the critical nature of their operations, despite its end of life in 2014. The video serves as a cautionary tale, advising viewers to keep their systems up to date to avoid falling prey to cyber threats.

Takeaways

  • 🚨 Connecting old Windows installations like XP, Vista, and 7 to the internet without proper security measures can lead to hacking within minutes.
  • 🌐 Routers and modems act as firewalls, protecting devices from the 'wild west' of the internet. Without a firewall, systems are vulnerable to attacks.
  • πŸ”’ For systems like Windows XP, which has many known vulnerabilities, it's recommended to have a robust antivirus program installed.
  • πŸ•΅οΈβ€β™‚οΈ Eric Parker's video demonstrated how quickly a Windows XP system could be hacked when directly connected to the internet without a firewall.
  • πŸ“‚ The video showed that hackers could gain access to files, create new user accounts, and even trace the system back to its geographical location.
  • πŸ’» There are still places and individuals using older operating systems like Windows XP, including some large organizations and military groups.
  • πŸ”š Windows XP reached its 'end of life' in 2014, meaning no more security updates from Microsoft, leaving it exposed to threats.
  • πŸ›‘οΈ Despite the end of life, some large organizations like the US military continue to use Windows XP, investing in custom security patches to maintain operations.
  • πŸ’‘ It's crucial to keep operating systems updated to benefit from the latest security patches and protect against known vulnerabilities.
  • πŸ”¬ Tools like Shodan can search for and identify outdated systems like Windows XP that are accessible on the internet, making them targets for hackers.
  • πŸ›‘ The general advice is to avoid connecting old, unsupported operating systems to the internet without proper security measures in place.

Q & A

  • Why should you not connect older Windows installations like Windows XP, Vista, and 7 to the internet?

    -Older Windows installations are vulnerable to numerous security risks and can be hacked within minutes due to outdated security measures and lack of support for updates.

  • What did Eric Parker's video demonstrate when he connected a Windows XP system to the internet?

    -Eric Parker's video showed that within 10 minutes of connecting an unprotected Windows XP system to the internet, hackers, presumably from Russia, gained access to his system and began manipulating files and creating unauthorized user accounts.

  • What is the role of a firewall in protecting a computer connected to the internet?

    -A firewall acts like a border control agent, regulating the incoming and outgoing traffic from a computer to the internet, preventing unauthorized access and potential threats from reaching the computer.

  • What does 'end of life' mean for an operating system?

    -The 'end of life' for an operating system refers to the date when the software vendor no longer provides security updates, technical support, or any updates for that particular version of the operating system.

  • Why might large organizations, like the military, still use older operating systems like Windows XP?

    -Large organizations may continue to use older operating systems because they rely on specific software or hardware that was designed for that system, and updating could disrupt critical processes or require extensive and costly changes.

  • How can hackers find older operating systems like Windows XP on the internet?

    -Hackers can use search engines and tools designed to scan the internet for specific operating systems, identifying IP addresses and systems that are vulnerable and accessible.

  • What happens when a hacker gains access to an outdated Windows XP system?

    -Once a hacker gains access, they can exploit the system's vulnerabilities to gain control, create new user accounts, download and execute malicious files, and potentially use the system as part of a botnet for further nefarious activities.

  • Why does Microsoft no longer provide security updates for Windows XP?

    -Microsoft stopped providing security updates for Windows XP because it reached its 'end of life' on April 8, 2014. The company focuses on supporting and updating more recent versions of its operating systems.

  • What is the significance of the Windows XP source code leak?

    -The leak of Windows XP's source code has led to the discovery of numerous new bugs and vulnerabilities that Microsoft is not patching, as the operating system is no longer supported, leaving these exploits available for hackers to use indefinitely.

  • Is it safe to use Windows XP in a virtual machine for nostalgic purposes?

    -Yes, it can be safe to use Windows XP in a virtual machine as long as it is confined within a network running behind a router and other security measures are in place to prevent unauthorized internet access.

  • What is the general advice for users to avoid security risks associated with outdated operating systems?

    -The general advice is to keep your operating system updated to the latest version to benefit from the latest security patches and updates, which protect against known vulnerabilities and threats.

Outlines

00:00

🚨 Dangers of Connecting Old Windows Systems to the Internet

The video script warns viewers about the risks of connecting outdated Windows operating systems like XP, Vista, and Windows 7 to the internet. The speaker emphasizes that such systems can be hacked within minutes due to their vulnerabilities. The script references a video by Eric Parker, who demonstrated the rapid hacking of a Windows XP system connected to the internet in 2024. It explains the importance of firewalls as digital borders that protect computers from the internet's dangers. The speaker also mentions the significance of having an antivirus and the consequences of not having one when exposing an old system like Windows XP to the internet, as seen in Parker's experiment where hackers, apparently from Russia, infiltrated the system within 10 minutes.

05:01

πŸ”’ Importance of Firewalls and System Updates for Security

This paragraph discusses the importance of firewalls and system updates for maintaining security. The speaker explains that even with Windows' built-in defenses turned off, their Windows XP system remained secure for over an hour and a half due to hardware-level firewalls and protections. The paragraph highlights the fact that while Windows XP can still access some websites, many modern sites and services are no longer compatible with it. The video also touches on the concept of 'end of life' for operating systems, noting that Windows XP's support ended in 2014, which means no more security updates from Microsoft. The speaker advises viewers to always keep their systems updated to protect against hackers who constantly search for outdated systems like Windows XP on the internet.

10:02

🏦 Large Organizations and the Challenge of Updating Systems

The script addresses the issue of large organizations, including the United States military, still using Windows XP due to the critical nature of their operations and the potential risks associated with updating their systems. It is mentioned that such organizations may pay substantial amounts, like the reported $3.8 million by the US military, to ensure continued functionality and security patches for outdated software like Windows XP, even after its end of life for the general public. The speaker explains that updating these systems could cause more problems than it solves, especially when the software or hardware involved is critical and needs to function without fail. The military's preference for maintaining Windows XP is framed as a practical decision to avoid disrupting established processes.

15:02

πŸ›‘οΈ Safeguarding Against Cyber Threats on Outdated Systems

The final paragraph focuses on the steps that can be taken to protect systems like Windows XP from cyber threats. It suggests that while it is not advisable to use outdated systems like Windows XP, it is possible to do so safely by running them in a confined virtual machine environment behind a router. The speaker also emphasizes the importance of keeping all systems updated to avoid being targeted by hackers. The paragraph concludes by reiterating the message that while older operating systems are susceptible to attacks, taking basic security precautions can mitigate these risks. It also encourages viewers to like, comment, and subscribe if they found the information useful.

Mindmap

Keywords

πŸ’‘Windows XP

Windows XP is an operating system developed by Microsoft, released in 2001. It is significant in this video as it represents an older, outdated system that is no longer supported with security updates, making it vulnerable to hacking when connected to the internet. The video script mentions that Windows XP has '20 years of vulnerabilities' and discusses the risks of connecting such an old system to the internet without proper security measures.

πŸ’‘Hacking

Hacking refers to the unauthorized access to computer systems or networks, often with the intent of exploiting or controlling them. In the context of the video, hacking is the main risk associated with connecting older Windows systems like Windows XP to the internet without proper security. The script illustrates this with the example of a video by Eric Parker, where a Windows XP system was hacked within minutes of being connected to the internet.

πŸ’‘Firewall

A firewall is a network security system that monitors and controls incoming and outgoing network traffic based on predetermined security rules. In the video script, the firewall is likened to a border agent controlling the flow of data to and from a computer. It is highlighted as an essential security measure that protects a system from unauthorized access, especially when connecting older operating systems like Windows XP to the internet.

πŸ’‘End of Life

End of Life (EOL) is a term used to describe the date when a product or technology is no longer supported or manufactured by the company that made it. In the video, Windows XP's EOL is mentioned as April 8, 2014, indicating that Microsoft no longer provides security updates for this operating system. This lack of updates leaves systems running Windows XP exposed to security vulnerabilities, which is a central theme in the video.

πŸ’‘Virtual Machine

A virtual machine is a software emulation of a computer system. In the script, Eric Parker uses a virtual machine to demonstrate what happens when an outdated operating system like Windows XP is connected to the internet. The virtual machine acts as a controlled environment to show the risks associated with such a connection without affecting the actual system.

πŸ’‘Antivirus

An antivirus is a software program designed to detect, prevent, and remove malicious software, including viruses, worms, and Trojans. The video script suggests that while the presenter doesn't care much about antiviruses due to 'common sense', connecting an old system like Windows XP to the internet 'probably should have an antivirus', emphasizing the importance of antivirus software in protecting outdated systems from cyber threats.

πŸ’‘Router

A router is a networking device that forwards data packets between computer networks, creating an overlay network. In the video, the router is mentioned as part of the infrastructure that connects a computer to the internet. It is also noted that being connected behind a router provides a layer of protection, as the router acts as a barrier that can help prevent unauthorized access to the connected devices.

πŸ’‘Exploit

An exploit in cybersecurity refers to a piece of software, a chunk of data, or a sequence of commands that takes advantage of a bug or vulnerability in order to cause unintended or unanticipated behavior to occur on computer software or hardware. The script discusses how hackers use exploits to gain control over systems like Windows XP that are no longer receiving security updates.

πŸ’‘Botnet

A botnet is a network of private computers infected with malicious software and controlled as a group without the owners' knowledge. In the video, the script mentions that once a hacker gains control over a system, they can use it as part of a botnet for various nefarious purposes. This illustrates the potential misuse of compromised systems like Windows XP.

πŸ’‘Update

Updating refers to the process of installing the latest version of software or firmware to ensure that it has the most recent features and security patches. The video script emphasizes the importance of updating operating systems to protect against known vulnerabilities. It is suggested that keeping systems updated is a best practice to avoid the risks associated with outdated software like Windows XP.

Highlights

Connecting old Windows installations like XP, Vista, and 7 to the internet can lead to being hacked within minutes.

Even without clicking on a link, just being connected to the internet can make a system vulnerable to hacking.

A creator named Eric Parker conducted an experiment showing the risks of connecting Windows XP to the internet in 2024.

There are places in the world where people still use Windows XP, such as for gaming or running old servers.

Modern routers have firewalls that act as a border control for the internet, protecting computers from threats.

Windows XP has over 20 years of vulnerabilities, making it a high-risk target when connected to the internet without protection.

Eric Parker's video demonstrated how quickly hackers gained access to a Windows XP system with the firewall turned off.

Hackers can exploit Windows XP systems to gain control and use them for nefarious purposes, such as creating botnets.

Large organizations, including the US military, still use Windows XP in critical systems due to the complexity of updating.

The US military reportedly spends millions to ensure Windows XP and other outdated systems remain functional.

Hackers use tools like Metasploit to find and exploit vulnerabilities in systems like Windows XP.

Microsoft ended support for Windows XP in 2014, meaning no more security updates for the operating system.

Windows 10 is set to end its support in October 2025, prompting users to update to newer operating systems.

Using outdated operating systems can be safe if they are confined within a network and behind a router.

Basic protections and keeping systems updated can prevent the risks demonstrated in hacking experiments.

The video by Eric Parker was designed to show the extreme vulnerability of unsecured systems connected to the internet.

It's important to update not just Windows but all operating systems to avoid becoming a target for hackers.

Transcripts

00:00

hello guys and gals me mudahar and today

00:02

I want to remind you never connect

00:04

Windows XP Vista Windows I think seven

00:07

is safe don't connect old windows

00:10

installations to the

00:11

internet because you can be hacked in

00:14

literal minutes ladies and gentlemen and

00:16

if you're wondering whoa what if I don't

00:17

click on a link boys just by connecting

00:20

to the internet you can get hacked now

00:23

this video is going to be a little bit

00:25

of I guess demystification but a couple

00:27

days ago I saw a Creator known as Eric

00:29

Parker who made a video titled what

00:31

happens if you connect Windows XP to the

00:33

internet in

00:34

2024 now I guarantee you a lot of you

00:37

guys watching here probably have never

00:39

even thought of connecting older Windows

00:41

installations to the internet I mean

00:43

there's not much you can do with Windows

00:45

XP these days so why would anybody

00:47

connect themselves to the internet well

00:50

there are a lot of places in the world

00:51

where people don't have the most

00:53

up-to-date gamer gear and computers out

00:55

there and there are still people

00:57

somewhere in the world probably using

00:59

Windows XP okay there's probably a

01:01

grandma sitting somewhere out there in

01:02

the world logging into the old MRC

01:05

connecting to other guils on the

01:06

internet just to play some bridge over

01:09

Windows XP all right pretty extreme

01:11

example probably not even healthy there

01:13

but there are probably people that have

01:14

some Windows XP server sitting around

01:16

somewhere too now for this to work you

01:19

have to expose your Internet to Windows

01:22

XP in such a way that many people are

01:24

actually not able to do so anymore these

01:27

days without actually trying so to

01:29

understand how internet works most of

01:31

you guys are connecting your computer or

01:33

your phones or whatever to wireless

01:36

routers or routers in general now

01:38

routers connect to your modem and that

01:40

modem connects to the internet now

01:42

already in that span there's something

01:44

known as a firewall okay now firewalls

01:47

are basically like borders you know how

01:49

you cross the US Canada Border you know

01:52

you come across a border agent they ask

01:54

you a few questions they basically

01:56

control the ingoing and outgoing of your

01:58

computer to the bad scary wild west

02:01

internet out there okay without a

02:03

firewall you're effectively not having

02:05

any border and sometimes Aon stuff gets

02:08

in and out now I've talked about why I

02:10

don't really care about antiviruses just

02:13

because I have something known as common

02:14

sense but when you connect something as

02:17

old as Windows XP which has 20 years of

02:20

vulnerabilities to the internet you

02:22

probably should have a [Β __Β ] antivirus

02:25

now watching Eric Parker's video what he

02:27

basically did was create a virtual

02:29

machine that was connect entirely to the

02:31

Internet by itself okay meaning that it

02:33

was a direct connection to the actual

02:36

internet right there and then and beyond

02:38

all of it what he did was he basically

02:40

let the system cook for 10 minutes

02:42

meaning that he walked away waited 10

02:44

minutes and all of a sudden a bunch of

02:46

Russians were inside his actual system

02:48

now if you watch his video you can see

02:50

right over here that he's got a bunch of

02:52

actual executable files one of them

02:54

being

02:58

ftp.com getting access to his files on

03:02

his Windows XP system in fact what is

03:05

actually wild in this situation too is

03:07

if you look inside his actual user

03:09

directory you can find out that without

03:11

him even doing anything a hacker had

03:15

created what appeared to be another user

03:17

account known as admin a now in this

03:20

situation what was effectively going on

03:22

was somebody was creating a new account

03:23

getting access to his file system and

03:26

downloading whatever and because of

03:28

connecting to the internet he had found

03:29

some random actual you know uh processes

03:33

opening up processes like conhost.exe

03:36

which led to him finding a address

03:40

leading all the way to the Russian

03:41

Federation so here you can see kr1 S.R

03:45

Colin 1041 okay so that actually ended

03:49

up going back to a private [Β __Β ] in

03:51

the Russian Federation all right so yeah

03:54

connecting Windows XP to the internet

03:56

without any form of protections is

03:58

insane now Eric's video what he did was

04:01

he turned off the firewall which

04:02

probably didn't really do much

04:04

considering the Windows Firewall wasn't

04:06

updated at all now this led to a bunch

04:09

of news media kind of looking at this

04:11

and saying boys if you ever think of

04:13

running XP without anything on the

04:15

internet you are setting yourself up for

04:17

disaster now to give you an idea Eric's

04:20

video involved a lot of actual case

04:23

examples now this is what Windows XP

04:25

looks like with all of its features

04:27

turned off and connected to the internet

04:29

so here I have a Windows XP virtual

04:31

machine which again I have it directly

04:33

connected to the internet as well and of

04:35

course what I'm going to do is I'm going

04:37

to pin Google just to show you that I'm

04:38

connected and as you can see I am

04:40

connected I am pinging but one thing

04:42

important over here is I am also

04:44

connected behind a router so here you

04:47

can see 192 16851 this is my actual

04:51

router at my place now had I decided to

04:53

follow Eric's example and take this

04:56

directly to the internet which is easily

04:58

done by Bridging the connections under a

05:00

virtual machine that would cause the

05:03

same [Β __Β ] to happen to the system now

05:05

this Windows installation has basically

05:07

been connected to the internet for an

05:09

hour and a half and nothing has happened

05:11

in the situation because there have been

05:14

actual firewalls and protections at the

05:16

hardware level keeping my Windows

05:19

installation safe now even with all of

05:21

the windows defense basically taken down

05:24

everything over here is still hunky dory

05:27

meaning that if you wanted to connect

05:28

Windows XP to the inter internet you

05:30

still actually can in fact what's Wild

05:32

is some websites at least still work

05:34

like you can go to google.com and

05:36

actually still search for uh Windows XP

05:39

antivirus let's see if we can even like

05:41

open up any page outside this when you

05:44

send information to the internet it

05:46

might be possible for others to see that

05:48

information yeah I know oh I can

05:51

download AVG oh hell yeah oh no we can't

05:55

access the browser is so [Β __Β ]

05:57

outdated XP antivirus in

06:00

2023 Bros who's actually you can't even

06:03

browse Reddit dude that's why people

06:05

update Windows they can't access

06:07

anything now I decided to check uh

06:09

Eric's uh you know uh testing out with

06:11

further operating systems I didn't even

06:13

went all the way up to Windows Vista

06:15

which I personally think is one of the

06:16

best Windows operating systems to ever

06:19

grace the world unfortunately in Windows

06:22

uh vista's case it doesn't seem like it

06:24

faces the same fun hacker epidemic that

06:26

Windows XP and previous windows

06:28

installations up to 2000 feel so again

06:32

certain versions of Windows are a little

06:34

more susceptible obviously certain ones

06:36

aren't but the reason why Eric's video

06:38

worked really well was if you actually

06:40

look at Windows xp's history every

06:42

operating system goes through something

06:44

known as an end of life okay so in this

06:47

situation Windows XP had its support end

06:50

on April 8 2014 which meant according to

06:53

Microsoft there will be no more security

06:56

updates for Microsoft's XP operating

06:58

system so again to give you an idea most

07:02

Windows operating systems as old as they

07:04

get have their endof life situation drop

07:07

in as far as Windows 10 goes which a lot

07:10

of people are still actually on will end

07:13

its support in October 2025 so October

07:16

14th next year okay so around the time

07:19

we're all playing Grand Theft Auto 6

07:21

Microsoft will no longer provide

07:23

security or updates or security updates

07:26

or any tech support for Windows 10 but

07:29

they do recommend you move to Windows 11

07:31

now for anybody who's using a computer

07:34

there's no reason why you shouldn't ever

07:36

update your system and keep it

07:37

relatively updated in general unless you

07:40

actually need an older version of an

07:41

operating system for a program that's

07:43

never been updated you should always

07:45

keep everything pretty much up to date

07:47

simply because the reason why Eric's

07:49

video is as cool as it is is because

07:52

actual hackers are looking constantly

07:55

for Windows XP on the internet so to

07:57

give you an idea of how this occurs some

07:59

somebody uses a search engine like

08:01

showon for instance which allows you to

08:03

look for Windows XP installations and

08:06

systems sitting outside on the open

08:08

internet so in a lot of cases you can

08:09

see IP addresses from I guess China and

08:12

Shenzhen where they detected Windows XP

08:15

Service Pack 2 now again this is a

08:17

search for just Service Pack 2 and the

08:20

more you go down you'll find that a lot

08:21

of places uh typically in Russia or

08:24

China have Windows XP still in active

08:27

use for instance one IP that trip the

08:29

flag over here for Windows XP Service

08:32

Pack 2 belong to the institute for

08:34

nuclear research of the ooh that's a

08:37

that's not good I'm I'm pretty sure

08:39

they're going to be fine it's it's all

08:41

safe over there a lot of places in the

08:42

world use older ass operating systems

08:45

okay so what will happen is a hacker

08:47

will search the internet for boxes that

08:49

exist and if they find one that is

08:51

basically accessible they will launch

08:53

every possible exploitation at it and

08:56

then gain control of it now one thing

08:58

that I want to ask actually bring up is

09:00

there are actually large organizations

09:02

that still use Windows XP and it's not

09:05

surprising for instance you might have

09:06

read that the United States military

09:08

uses Windows XP and that's not a shock

09:11

to anybody for instance the US military

09:13

works on very very very critical things

09:16

and they work with life and death and

09:18

when they create chains of processes and

09:20

software and Hardware Windows XP was at

09:23

one point a actual critical component of

09:26

it instead of updating and dealing with

09:28

breaking something else is especially

09:29

when you need that software or Hardware

09:32

or piece of technology to work at any

09:34

given moment the Army will most likely

09:36

make sure that it stays Windows XP and

09:39

it's not because they don't have

09:40

intelligent people working there at the

09:41

military they absolutely do it's just

09:44

the reality of it is this is very

09:45

critical and they need to make sure

09:47

things work as they are intended maybe

09:50

updating to like Windows 10 or Windows

09:51

11 or anything or Linux can maybe cause

09:54

more issues than one would expect maybe

09:56

the software that they need Windows XP

09:58

to run on maybe that can't be updated

10:00

maybe that can't be supported maybe they

10:01

can't work a deal out with the people

10:03

writing stuff for that so you have to

10:05

think of all of these things as you're

10:06

updating chains of hardware and

10:08

processes and yes there is a lot of

10:11

money that goes into making sure Windows

10:13

XP is functional for the military up

10:15

until

10:16

2024 now when I showed you end of life

10:19

that's end of life for you and me but

10:21

see the Army can spend up to $3.8

10:24

million reportedly to make sure Windows

10:26

XP 2003 office Exchange and Windows

10:29

Server are actually working meaning they

10:32

get access to security patches uh while

10:34

the rest of the world really doesn't and

10:36

this would be pretty standard for the

10:38

Chinese military or the Russians or

10:40

really any large scale group that is

10:43

using this kind of software that needs

10:45

to make sure things work they'll work

10:46

out deals with Microsoft really anybody

10:48

to make sure that this software will

10:50

work until the foreseeable future and if

10:52

they can update down the road to like

10:54

Windows 10 or Windows 11 or whatever

10:56

then they will probably consider it but

10:58

for now $30 million for the United

11:01

States military is [Β __Β ] Chum change

11:04

and they'd be far willing to pay that

11:05

than break something in the process that

11:07

may end up costing them a lot more money

11:10

down the road remember military

11:11

contracts are huge for a reason so once

11:14

you find a whole slew of addresses this

11:16

is effectively low hanging fruit you can

11:18

take over these computers to serve as

11:20

part of a botn net or really any other

11:22

nefarious purpose a hacker has cooked up

11:25

in their head now once you find an

11:27

actual service like this there are over

11:29

20 years of security vulnerabilities for

11:32

Windows XP that exist and so what'll

11:34

happen is a hacker will effectively

11:36

launch a tool that exists out there

11:38

anyways and these tools are downloaded

11:40

in various penetration testing dros like

11:43

Ci Linux so metas sploit for instance

11:45

they'll find any exploit that exists for

11:47

Windows XP and again remember the last

11:50

security update was like

11:52

2014 so since 2014 Windows XP

11:56

specifically from what I understand is

11:58

that its source code leaked tons of

12:00

actual new bugs have been found enough

12:02

to the point that since Microsoft

12:04

doesn't care about patching and updating

12:06

it these hacks will stay forever so if

12:09

you have even the most updated Windows

12:11

system out there the XP the most secure

12:13

system imaginable you probably still

12:15

have an exploit that is out there

12:17

connected to the internet and being

12:19

abused by a hacker now you might ask but

12:21

muda why can't Microsoft just patch one

12:24

of those exploits right I mean people

12:25

still use XP look it's unrealistic to

12:28

expect any company okay whether it be

12:31

apple whether it be any Linux maintainer

12:34

or Microsoft to keep all their systems

12:37

up to date look at the end of the day

12:39

they've made so many versions of Windows

12:41

all the way from Windows 1.0 all the way

12:44

to 211 where trying to make sure all

12:47

these security updates are there is

12:48

impossible you have to have so much

12:51

staff on retainer and people working for

12:53

again like what a percent of people in

12:56

the world maybe even a percent so it's

12:58

not really worth it for Microsoft in

12:59

general if you want to stay safe update

13:02

your operating system okay that's pretty

13:04

much the general advice now again going

13:06

back to you know the Windows 10 end of

13:08

life obviously uh Microsoft is kind of

13:11

hastening people updating to more recent

13:13

operating systems as far as it as far as

13:15

it seems to me but generally that's just

13:18

the idea they have they want you to use

13:20

the new stuff because it's just easier

13:22

for them to maintain one or two

13:23

operating systems versus like [Β __Β ] 20

13:26

okay that's basically the idea so so

13:29

when a hacker exploits a Windows XP box

13:31

they will then launch everything

13:33

imaginable to gain persistence gain

13:35

control and in Eric's case when he had

13:37

ftp.com

13:48

now obviously if you have any form of

13:50

protections even if you go back to the

13:53

uh ad block video where I showed you how

13:55

to set up Network wide ad blocking all

13:58

these things add up to protect you from

14:00

hackers in general look Windows XP again

14:04

this is connected for over 2 hours at

14:06

this point this box is still safe having

14:09

the most base level of connections gives

14:11

you actual like security but of course

14:13

in Eric's case when he was making his

14:16

video he connected an unsecured box

14:19

right to the internet basically turning

14:21

it into the nicest access point for a

14:23

lot of these script Kites and

14:25

entry-level Russian hackers that you

14:26

would find sitting on the internet

14:28

constantly prying for any weakness that

14:30

would exist now is using Windows XP

14:33

unsafe uh no if you want to relive the

14:35

days of nostalgia you absolutely can't

14:38

just run this thing under a virtual

14:39

machine confined within a network

14:41

running behind a router and at that

14:43

point you will be the safest Windows XP

14:46

user currently on the internet but it is

14:48

a fun experiment that Eric showed to

14:50

show you how hackers pry for weaknesses

14:53

on the internet if you have Windows XP

14:55

hell if you have Windows 2000 Windows NT

14:58

[Β __Β ] millennium Edition 98 if that

15:00

thing still even has some functioning

15:02

internet connectivity left then all of

15:04

those things are ripe to grab and it's

15:07

not just Windows that's the case for

15:09

this I would wager that if you connected

15:11

older versions of Mac OS 10 or even

15:14

older systems or older versions of Linux

15:17

older packages you might be just as

15:19

susceptible as Windows XP users are in

15:23

general again the whole point of this is

15:25

to just keep your [Β __Β ] updated and then

15:27

you'll never have to worry about this

15:29

okay so for anybody thinking damn

15:32

Windows XP is just dangerous to use

15:34

basic protections will keep you safe

15:36

Eric's video was designed in a manner to

15:38

show you exactly how unsecured you can

15:40

be which isn't too far off from how

15:42

people again once connected their actual

15:45

systems to the internet in general but

15:47

yeah don't connect old windows to the

15:49

internet okay directly that's a [Β __Β ]

15:51

recipe for disaster if you like what you

15:52

saw please like comment and subscribe

15:54

dislike if you dislike it I am out

Rate This
β˜…
β˜…
β˜…
β˜…
β˜…

5.0 / 5 (0 votes)

Related Tags
Windows XPCybersecurityHackingInternet SafetyOperating SystemsVirtual MachinesFirewallsAntivirusEnd of LifeMilitary Tech