{"id":7579,"date":"2020-01-27T11:23:05","date_gmt":"2020-01-27T08:23:05","guid":{"rendered":"https:\/\/www.kaspersky.com.tr\/blog\/?p=7579"},"modified":"2020-01-27T11:23:05","modified_gmt":"2020-01-27T08:23:05","slug":"rip-windows-seven","status":"publish","type":"post","link":"https:\/\/www.kaspersky.com.tr\/blog\/rip-windows-seven\/7579\/","title":{"rendered":"Huzur i\u00e7inde yat Windows 7. Peki, \u015fimdi ne olacak?"},"content":{"rendered":"<p>Her iyi \u015feyin bir sonu vard\u0131r; nihayet Windows 7\u2019ye veda etme zaman\u0131 geldi. 14 Ocak 2020\u2019den itibaren Microsoft, bu i\u015fletim sistemini desteklemeyi resmi olarak durdurdu; bu, g\u00fcncelle\u015ftirmelerin ve d\u00fczeltmelerin art\u0131k otomatik olarak (veya istek \u00fczerine) kar\u015f\u0131dan indirilemeyece\u011fi, y\u00fcklenemeyece\u011fi ve yeni g\u00fcvenlik a\u00e7\u0131klar\u0131n\u0131n yamalanamayaca\u011f\u0131 anlam\u0131na geliyor.<\/p>\n<p>Windows 7\u2019de g\u00fcvenlik a\u00e7\u0131klar\u0131 bulundu\u011fu \u015f\u00fcphesiz; bu Microsoft\u2019un programlamada k\u00f6t\u00fc oldu\u011fu anlam\u0131na gelmiyor. Herhangi bir i\u015fletim sistemi, say\u0131s\u0131z bile\u015fen ve milyonlarca kod sat\u0131r\u0131ndan olu\u015fan karma\u015f\u0131k bir canavard\u0131r, bu nedenle h\u0131zdan ve kolayl\u0131ktan \u00f6d\u00fcn vermeden hatalardan ka\u00e7\u0131nmak imkans\u0131zd\u0131r. Siber su\u00e7lular her zaman istismar edilecek g\u00fcvenlik a\u00e7\u0131klar\u0131n\u0131 aramaya, bilgisayarlara k\u00f6t\u00fc ama\u00e7l\u0131 yaz\u0131l\u0131m bula\u015ft\u0131rmaya, veri \u00e7almaya, sistemlerin kontrol\u00fcn\u00fc ele ge\u00e7irmeye, vb. devam edecek.<\/p>\n<p>\u0130stisnai durumlarda geli\u015ftiriciler, eski i\u015fletim sistemlerindeki g\u00fcvenlik a\u00e7\u0131klar\u0131n\u0131 d\u00fczeltmeyi s\u00fcrd\u00fcrebilir. Ancak, bunun ger\u00e7ekle\u015fmesi k\u00fcresel salg\u0131n \u00f6l\u00e7e\u011finde bir durum gerektirir. \u00d6rne\u011fin 2017\u2019deki WannaCry sald\u0131r\u0131s\u0131 s\u0131ras\u0131nda Microsoft, halihaz\u0131rda durdurulan Windows XP ve Windows Server 2003\u2019\u00fc de kapsayan g\u00fcncellemeler yay\u0131nlad\u0131.<\/p>\n<p>Bu g\u00fcncellemeler, k\u00f6t\u00fc ama\u00e7l\u0131 yaz\u0131l\u0131m\u0131n cihazlara girmek i\u00e7in faydaland\u0131\u011f\u0131 bir g\u00fcvenlik a\u00e7\u0131\u011f\u0131n\u0131 giderdi. Ancak, \u00e7o\u011fu siber sald\u0131r\u0131 b\u00f6yle b\u00fcy\u00fck bir tantanaya (ve dolay\u0131s\u0131yla geli\u015ftiricilerin tepkisine) neden olmuyor. Bununla birlikte, sald\u0131r\u0131lar\u0131n nispeten daha m\u00fctevaz\u0131 \u00f6l\u00e7eklerde olmas\u0131, kurbanlar a\u00e7\u0131s\u0131ndan bir \u015fey de\u011fi\u015ftirmiyor.<\/p>\n<h2>Windows 7 ile ilgili ne yapmal\u0131<\/h2>\n<p>Bilgisayar\u0131n\u0131zda Windows 7 y\u00fckl\u00fcyse tavsiye edebilece\u011fimiz en basit ve en iyi yol Windows 10\u2019a y\u00fckseltmek. Windows 7 ruh e\u015finiz bile olsa, i\u015fletim sisteminin g\u00fcncel s\u00fcr\u00fcm\u00fc daha g\u00fcvenilir. \u0130\u00e7inizin rahat etmesi ve veri g\u00fcvenli\u011fi i\u00e7in kuruluma ve al\u0131\u015fmaya harcayaca\u011f\u0131n\u0131z birka\u00e7 saate de\u011fer.<\/p>\n<p>Donan\u0131m veya yaz\u0131l\u0131m uyumsuzlu\u011fu sorunlar\u0131 gibi herhangi bir nedenle Windows 10\u2019a y\u00fckseltme yapam\u0131yorsan\u0131z ve Windows 7\u2019de kalman\u0131z gerekiyorsa, g\u00fcvenlik sorumlulu\u011funu \u00fcst\u00fcn\u00fcze almal\u0131s\u0131n\u0131z. \u00d6ncelikle, kapat\u0131lmam\u0131\u015f g\u00fcvenlik a\u00e7\u0131klar\u0131ndan yararlan\u0131lmas\u0131n\u0131 engelleyen bir korumaya ihtiyac\u0131n\u0131z var.<\/p>\n<p>Kaspersky g\u00fcvenlik \u00e7\u00f6z\u00fcmleri, daha \u00f6nce bilinmeyen hatalar\u0131n kullan\u0131lmas\u0131n\u0131 \u00f6nleyen Kaspersky Exploit Prevention \u00e7\u00f6z\u00fcm\u00fcn\u00fc i\u00e7eriyor. Windows\u2019ta <a href=\"https:\/\/securelist.com\/a-new-exploit-for-zero-day-vulnerability-cve-2018-8589\/88845\/\" target=\"_blank\" rel=\"noopener\">CVE-2018-8589<\/a>, <a href=\"https:\/\/www.kaspersky.com.tr\/blog\/cve-2019-0797-vulnerability-detected\/5779\/\" target=\"_blank\" rel=\"noopener\">CVE-2019-0797<\/a> ve <a href=\"https:\/\/www.kaspersky.com.tr\/blog\/cve-2019-0859-detected\/5870\/\" target=\"_blank\" rel=\"noopener\">CVE-2019-0859<\/a> dahil olmak \u00fczere bir\u00e7ok s\u0131f\u0131r g\u00fcn g\u00fcvenlik a\u00e7\u0131\u011f\u0131n\u0131 tespit etmemizi sa\u011flayan bu teknolojiydi.<\/p>\n<p>Exploit Prevention \u00f6zelli\u011fi, hem <a href=\"http:\/\/kas.pr\/kdkistr\" target=\"_blank\" rel=\"noopener\">ev kullan\u0131c\u0131lar\u0131<\/a> hem de <a href=\"http:\/\/kas.pr\/kdksostr\" target=\"_blank\" rel=\"noopener\">kurumsal kullan\u0131c\u0131lara<\/a> y\u00f6nelik g\u00fcvenlik \u00e7\u00f6z\u00fcmlerimize entegre edilmi\u015ftir. Bu \u00f6zelli\u011fi \u015fu \u015fekilde etkinle\u015ftirebilirsiniz:<\/p>\n<ul>\n<li>Uygulaman\u0131n sol alt k\u00f6\u015fesindeki di\u015fli \u00e7ark simgesine t\u0131klayarak ayarlar\u0131 a\u00e7\u0131n.<\/li>\n<li><em>Koruma<\/em> b\u00f6l\u00fcm\u00fcne gidin.<\/li>\n<li><em>Sistem \u0130zleyici\u2019yi<\/em> se\u00e7in.<\/li>\n<li><em>Otomatik K\u00f6t\u00fcye Kullan\u0131m Korumas\u0131<\/em> alt\u0131nda, <em>Yetkisiz i\u015flem ger\u00e7ekle\u015ftirme giri\u015fimlerini <\/em><em>izle<\/em> onay kutusunu se\u00e7in.<\/li>\n<li>\u015e\u00fcpheli eylemlerle ne yap\u0131laca\u011f\u0131n\u0131 se\u00e7in. Desteklenmeyen bir sistemde en iyi se\u00e7enek, engellemektir.<\/li>\n<\/ul>\n<input type=\"hidden\" class=\"category_for_banner\" value=\"ksos\">\n","protected":false},"excerpt":{"rendered":"<p>Hala Windows 7 mi kullan\u0131yorsunuz? Art\u0131k Windows 10&#8217;a ge\u00e7me veya korumay\u0131 art\u0131rma zaman\u0131.<\/p>\n","protected":false},"author":40,"featured_media":7580,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[1726,1194,1727],"tags":[744,519,2099,113],"class_list":{"0":"post-7579","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-enterprise","8":"category-business","9":"category-smb","10":"tag-guvenlik","11":"tag-ipuclari-2","12":"tag-kullanim-omru-sonu","13":"tag-windows"},"hreflang":[{"hreflang":"tr","url":"https:\/\/www.kaspersky.com.tr\/blog\/rip-windows-seven\/7579\/"},{"hreflang":"en-in","url":"https:\/\/www.kaspersky.co.in\/blog\/rip-windows-seven\/18429\/"},{"hreflang":"en-ae","url":"https:\/\/me-en.kaspersky.com\/blog\/rip-windows-seven\/15305\/"},{"hreflang":"ar","url":"https:\/\/me.kaspersky.com\/blog\/rip-windows-seven\/7372\/"},{"hreflang":"en-us","url":"https:\/\/usa.kaspersky.com\/blog\/rip-windows-seven\/20186\/"},{"hreflang":"en-gb","url":"https:\/\/www.kaspersky.co.uk\/blog\/rip-windows-seven\/18498\/"},{"hreflang":"es-mx","url":"https:\/\/latam.kaspersky.com\/blog\/rip-windows-seven\/16937\/"},{"hreflang":"es","url":"https:\/\/www.kaspersky.es\/blog\/rip-windows-seven\/20946\/"},{"hreflang":"it","url":"https:\/\/www.kaspersky.it\/blog\/rip-windows-seven\/19731\/"},{"hreflang":"ru","url":"https:\/\/www.kaspersky.ru\/blog\/rip-windows-seven\/26162\/"},{"hreflang":"x-default","url":"https:\/\/www.kaspersky.com\/blog\/rip-windows-seven\/32137\/"},{"hreflang":"fr","url":"https:\/\/www.kaspersky.fr\/blog\/rip-windows-seven\/13630\/"},{"hreflang":"pl","url":"https:\/\/plblog.kaspersky.com\/rip-windows-seven\/12675\/"},{"hreflang":"de","url":"https:\/\/www.kaspersky.de\/blog\/rip-windows-seven\/21980\/"},{"hreflang":"ja","url":"https:\/\/blog.kaspersky.co.jp\/rip-windows-seven\/26741\/"},{"hreflang":"nl","url":"https:\/\/www.kaspersky.nl\/blog\/rip-windows-seven\/24889\/"},{"hreflang":"ru-kz","url":"https:\/\/blog.kaspersky.kz\/rip-windows-seven\/20873\/"},{"hreflang":"en-au","url":"https:\/\/www.kaspersky.com.au\/blog\/rip-windows-seven\/25711\/"},{"hreflang":"en-za","url":"https:\/\/www.kaspersky.co.za\/blog\/rip-windows-seven\/25543\/"}],"acf":[],"banners":"","maintag":{"url":"https:\/\/www.kaspersky.com.tr\/blog\/tag\/windows\/","name":"windows"},"_links":{"self":[{"href":"https:\/\/www.kaspersky.com.tr\/blog\/wp-json\/wp\/v2\/posts\/7579","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.kaspersky.com.tr\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.kaspersky.com.tr\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.kaspersky.com.tr\/blog\/wp-json\/wp\/v2\/users\/40"}],"replies":[{"embeddable":true,"href":"https:\/\/www.kaspersky.com.tr\/blog\/wp-json\/wp\/v2\/comments?post=7579"}],"version-history":[{"count":1,"href":"https:\/\/www.kaspersky.com.tr\/blog\/wp-json\/wp\/v2\/posts\/7579\/revisions"}],"predecessor-version":[{"id":7581,"href":"https:\/\/www.kaspersky.com.tr\/blog\/wp-json\/wp\/v2\/posts\/7579\/revisions\/7581"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.kaspersky.com.tr\/blog\/wp-json\/wp\/v2\/media\/7580"}],"wp:attachment":[{"href":"https:\/\/www.kaspersky.com.tr\/blog\/wp-json\/wp\/v2\/media?parent=7579"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.kaspersky.com.tr\/blog\/wp-json\/wp\/v2\/categories?post=7579"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.kaspersky.com.tr\/blog\/wp-json\/wp\/v2\/tags?post=7579"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}