The company announced changes to the distribution of Windows software patches plus planned new technologies for its latest operating systems that target the most common methods of viral and hacker attack.

The changes were announced while opening Microsoft’s inaugural World Wide Partner Conference in New Orleans, Louisiana.

These latest improvements come as Bill Gates’ Trusted Computing Initiative lies in tatters, torn to shreds by this year’s onslaught of worms such as MSBlast and SoBigF e-mail virus.

Microsoft’s troubles have, meanwhile, led some consumers to take action. A class action lawsuit has been filed on behalf of a Californian PC user claiming she was the victim of identity theft due to vulnerability in Microsoft’s software that allowed hackers to steal her personal financial information.

Microsoft now plans changes to its technology and support mechanisms to secure Windows against further attack.

Patches, used to secure specific vulnerabilities, will become available on a monthly rather than a weekly basis making it easier for IT administrators to apply.

Microsoft will also extend security patch support for Windows NT Workstation 4 Service Pack (SP) 6a and Windows 2000 SP 2 until June 2004.

So-called safety technologies are planned for Windows XP and Windows Server 2003, the operating system Microsoft this year claimed it spent nearly $200 million in securing.

Changes to Windows XP tackle port-based, e-mail, malicious web content and buffer overrun attacks, which Microsoft claims constitute the largest percentage of threats.

Windows Server 2003 safety technologies will enable remote access connection client inspection and Internet client inspection to prevent corporate networks from becoming infected via mobile devices.

Windows XP safety technologies will first ship in the operating system’s SP2, due in the first-half of 2004, and subsequently SP 1 for Windows Server 2003. Protection against remote attack in Windows Server 2003 is scheduled for the second half of 2004.

Also planned are education and training programs, including TechNet seminars, monthly web casts and a dedicated developer symposium for secure coding at this month’s Professional Developers’ Conference in Los Angeles.

This article was based on material originally published by ComputerWire.