i have contacted microsoft and suggested that they release the source code of windows xp. hope that helps.
Not possible as it uses the same NT base as Vista, 7 and 8 also use. The code in XP may be old but a lot of it is still in use.
An example is the network interface system. Although it has changed a bit, 90% of it is the same or at least based on the same code as was in XP.
at least i do something to try to help windows xp fans. it is however unlikely that it will get targeted by hackers so it should be safe.
That is because it has already been hacked to pieces. There is pretty much nothing left to hack in it as all exploits are common knowledge. Most people here know how to destroy a XP WC3 player's OS for example by using the preload bug to remove the Windows folder or something dumb by placing a startup script.
i have experienced a lot of attacks that just crash if windows is downgraded. the hackers are becoming smarter so they are hacking the latest stuff more than the old stuff. i am using vista and i get hacked regularily but that doesnt happen when i use xp.
Although it is true that XP will start to become less targeted by hackers (just like how IE is since hackers rather target Chrome and Firefox) the problem is that it has already been hacked to pieces with many exploits being common knowledge.
If you are being "hacked" regularly on Vista then you are doing something seriously wrong. Vista is even less a target than XP as even fewer people use it and it is also considerably more secure than XP so is harder to hack. It sounds to me like you are visiting dodgy sites with a dodgy browser or downloading and running dodgy files.
It is also a total fallacy that people can get hacked by just plugging their computer into the internet and having it sitting there running. This lie came about when a badly written network driver back around the times of DOS allowed kernel level control by abusing a buffer overflow to corrupt function pointers. This meant that receiving a packet was enough to compromise a computer. Obviously programmers have wised up since then (back in the early 1990s) and now actively reject packets that cannot fit into buffers.
A computer will only get "hacked" under the following situations...
1. A user runs a Trojan. Intentionally or otherwise (he was stupid and ran untrusted and malicious software).
2. A user instructs the computer to touch a Trojan that is activated via that interaction. This is usually the result of exploits inside running software that result in the Trojan executing. Most commonly seen in browsers where visiting some web sites with insecure browsers will result in a system compromise.
3. The computer is running insecure processes. These processes may automatically execute or be the target of Trojans. This literally means a computer can be hacked by being connected to the internet but due to the software it is running. Most well known were those highly destructive email viruses which destroyed the Windows folder (whipped the OS) when downloaded by old email clients.