i play about 90% of these games on winxp, just a few require me to reboot into win7, i kinda prefer winxp especially after some malware got in and couldn't activate cuz my kernel was missing the thing it needed it, made me lol before i deleted it. reminds me of a trojan/virus my kid had it kept polling the network for every ip in the 192.168.x.x range but i use 10.x.x.x range for the lan, saved a bunch of computers. turned out it was a nasty one that propagates via network in the lan. easily cleaned tho.
Yeah, very smart then going back to an operating system that has massive unpatched security vulnerabilities that are known for 10-15 years at least, that haven't been fixed since then and most likely will never get fixed...
Here are some fun ones:
Microsoft Windows XP allows remote attackers to cause a denial of service (CPU consumption) by flooding UDP port 500 (ISAKMP).
You must be registered to see the links
Microsoft Virtual Machine (VM) build 5.0.3805 and earlier allows remote attackers to determine a local user's username via a Java applet that accesses the user.dir system property, aka "User.dir Exposure Vulnerability."
You must be registered to see the links
Two vulnerabilities in Microsoft Virtual Machine (VM) up to and including build 5.0.3805, as used in Internet Explorer and other applications, allow remote attackers to read files via a Java applet with a spoofed location in the CODEBASE parameter in the APPLET tag, possibly due to a parsing error.
You must be registered to see the links
The following one is one of my favourites...putting exes in the autostart is an almost blatantly easy way to infect a system with shit...
The Compressed Folders feature in Microsoft Windows 98 with Plus! Pack, Windows Me, and Windows XP does not properly check the destination folder during the decompression of ZIP files, which allows attackers to place an executable file in a known location on a user's system, aka "Incorrect Target Path for Zipped File Decompression."
You must be registered to see the links
This one can at least be an annoyance, but with the previous one it could potentially be used to place a faked certificate on a users system, so a software seems authentic.
Unknown vulnerability in the Certificate Enrollment ActiveX Control in Microsoft Windows 98, Windows 98 Second Edition, Windows Millennium, Windows NT 4.0, Windows 2000, and Windows XP allow remote attackers to delete digital certificates on a user's system via HTML.
You must be registered to see the links
DOS attacks are always fun, when someone pisses you of...
Windows XP with port 445 open allows remote attackers to cause a denial of service (CPU consumption) via a flood of TCP SYN packets containing possibly malformed data.
You must be registered to see the links
This one can also be useful to get into someones system
The Remote Desktop client in Windows XP sends the most recent user account name in cleartext, which could allow remote attackers to obtain terminal server user account names via sniffing.
You must be registered to see the links
Just a random selection, there are plenty more...
Seriously, ppl, if it isn't for historic reasons on an completly isolated system, get rid of that stoneage OS. WinXP was pretty crappy anyway...(Not as bad as vista, or 98 first edition, but still...