Gdetrailer wrote:
:R
Not really.
The Windows 4.x kernel was in use through ME, which was released long after NT.
NT was more a contemporary of Windows 95. 95, 95 Second Release, 98, 98SE, and ME were all running the Win4.x kernel series.
NT itself was built upon OS/2 which in-turn was built upon QNX.
NT kernels were used in 2k, XP, 2k3, and somewhat in Vista.
Win7 uses a microkernel of some sort (read, NOT THE SAME AS XP Kernel), which was running next to NT style kernel in Vista (hence making Vista's drivers usable in Win7) BUT you can’t use XP drivers for Win7 or for the most part even Vista.
You might want to double-check your OS history a bit. NT had nothing to do with OS/2 other than marketing. If anything it was closer to VMS because they were designed by the same person, Dave Cutler. The NT family and Windows family were entirely different. It wasn't until Windows 2000 that they merged.
Also, XP was the first desktop Windows version to use a hybrid kernel or "macrokernel". So XP, Vista, Windows 7 & 8 are all hybrid kernels, as opposed to the older monolithic kernel used in Window 95 and all prior versions. The kernel architecture doesn't have to change to cause issues with driver compatibility. Microsoft has tried to improve their driver model with each new release (and anyone who's used Windows for more than 3 versions can attest it's gotten *so much better*.) But changes in their driver manager or requirements can cause older drivers to not work on newer versions. The kernel architecture is rarely the cause.
(And I'm pretty sure OS/2 wasn't built on top of any other OS, it was entirely homegrown between Microsoft & IBM initially, later just Big Blue)
Not all security issues reside in the kernel, as your post seems to allude. In fact, very few do. They exist mostly in user mode built on top and in that case there is much code shared between Windows XP and its successors.
And don't forget that the browser is the #1 vector of security vulnerabilities - it has nothing to do with the kernel (directly) and will not be patched going forward. I'm willing to bet that a lot of people who continue to use XP after its end of support life will be running IE8.
Gdetrailer wrote:
Basically Windows 7 security “holes” are NOT NECESSARILY the same as XP, in fact none of the “updates” between XP, Vista, W7 ever addressed the SAME “exploits”.
In fact with new OS releases typically you end up with a WHOLE LOT MORE bugs and security issues that NEVER existed in the previous versions.
The ONLY thing in common was the fact that MS RELEASED “updates” for XP, Vista, 7, 8 on the same day (Tue of each week)…
That's just not true. Many, many security issues impact entire classes of the Windows family from XP to Windows Server 2012. A quick glance at this site
this site shows just how many issues impact multiple versions of Windows including XP.
The phenomena that Chris refers to where the bad guys reverse engineer patches to find the vulnerabilities is very real. It happens every day with every product. Don't underestimate the bad guys here - it's not script kiddies getting their jollies, it's organized crime with hundreds of millions of dollars or more in play.
If you want to use XP that's fine, it's your choice. But don't spread misinformation that is potentially harmful. You can lament that technology doesn't stay stagnant and is constantly evolving. But to say that because a company doesn't want to support an OS for 20 years is only due to corporate greed is kind of short sighted. Technology has always evolved at a quick pace and in the past 25 years computer technology has advanced at a breathtaking pace. But that's how technology goes. Remember that only 66 years elapsed between the Wright brothers' flight and Neil Armstrong walking on the moon. That's only 5 XP lifetimes.