So why did Microsoft choose to ship a 32-bit version of Internet Explorer with Windows XP 圆4? Notwithstanding these concerns, in theory, the 64-bit Internet Explorer could have made use of 32-bit ActiveX objects and plug-ins.
However, calling 32-bit code from a 64-bit application does not come without drawbacks, speed and security being the main concerns. This means that, at least in theory, any 64-bit application could be made to use a 32-bit DLL. In Windows 圆4, the 64-bit applications can make use of IPC to call older 32-bit code, just like 32-bit applications can call 16-bit DLLs in Win32 through the use of thunking. Although this may sound a little strange, there is a very good reason: compatibility. So it seems that the Windows developers have decided to offer the user the choice of which version of Internet Explorer to use. 2: A 32-bit edition of the same product is available from the Start menu Its ‘About’ dialog is shown in Figure 1.įig. The assumption is correct – a 64-bit Internet Explorer (version ) is built into the most recent Windows XP release for the 圆4 platform. Since all the system applications in Windows 圆4 are 64-bit PE files, one would assume that Internet Explorer has also been compiled as a 64-bit native application. This article is written in response to that question. The significance of this, of course, is that there is a great plethora of spyware and adware which installs from the Internet via IE vulnerabilities, through the use of ActiveX technology or Java applications. It related to Internet Explorer in Windows 圆4 and how ActiveX objects and BHO (Browser Helper Objects) – which until now have been exclusively 32-bit – work (or don’t work) in the Windows 圆4 environment. There were a number of questions from the audience at the end of the presentation, but the most interesting one was a question posed by a researcher from Symantec’s European AntiVirus Research Centre. At the 2005 Virus Bulletin Conference I presented a paper on the 圆4 architecture, detailing how known 32-bit viruses and rootkits interact with it. Having released two major Windows versions for the 圆4 architecture (also known as ‘AMD64’), Microsoft has opened the door to inexpensive 64-bit computing for just about everybody. Kaspersky Advanced Cyber Incident Communications.KasperskyEndpoint Detection and Response.KasperskyPhysical, Virtual & Cloud Workloads Security.KasperskyEndpoint Security for Business Advanced.KasperskyEndpoint Security for Business Select.