Use a different web browser
There are a number of significant vulnerabilities in technologies relating to the IE domain/zone security model, the DHTML object model, MIME type determination, the graphical user interface (GUI), and ActiveX. It is possible to reduce exposure to these vulnerabilities by using a different web browser, especially when browsing untrusted sites. Such a decision may, however, reduce the functionality of sites that require IE-specific features such as DHTML, VBScript, and ActiveX. Note that using a different web browser will not remove IE from a Windows system, and other programs may invoke IE, the WebBrowser ActiveX control, or the HTML rendering engine (MSHTML).
Have you noticed that inexplicably, after applying XP SP2 that certain web pages seem to load slower? Are you experiencing slower/different ftp connection issues? Dropped ftp connections? If you have any of these symptoms and/or other 'out of the blue' issues with performance where multiple TCP connections are needed, you MUST read on! Billy Gates strikes again, apparently continuing to believe that MS knows better than you what your system needs are :GRRRRR:! For a resolution to these issues see this article at Raven's site
Five state counties and two cities have filed a class-action lawsuit against the software giant for using its monopoly power to deny government agencies free choice in software products and charge high prices. The legal action, filed by the city and county of San Francisco, said that Microsoft's tactics caused harm to government users of its Windows operating system and Word and Excel software.
Your computer will be prevented from running shareware or freeware
TCPA stands for Trusted Computing Platform Alliance. For the technology we will speak from TCP (The trusted computing platform). This plans that every computer will have a TPM (Trusted Platform Module), also known as Fritz-Chip, built-in. At later development stages, these functions will be directly included into CPUs, graphiccards, harddisks, soundcards, bios and so on. This will secure that the computer is in a TCPA-conform state and that he checks that it's always in this state. This means: On the first level comes the hardware, on the second comes TCPA and then comes the user.
The complete communication works with a 2048 bit strong encryption, so it's also secure enough to make it impossible to decrypt this in realtime for a longer time. This secures that the TCPA can prevent any unwanted software and hardware.