17 Burst results for "Windows Os"

"windows os" Discussed on Security Now

Security Now

01:36 min | 3 months ago

"windows os" Discussed on Security Now

"The encoded payload. That PowerShell command downloads a PowerShell module from an Amazon S three bucket URL and it actually is HTTP slash slash. S three dot Amazon AWS dot com slash Doc library sales forward slash test dot text and executes it. And we have a picture of that in the show notes. The actual thing that's downloaded. The downloaded PowerShell payload is the main module that's then responsible for basic communication with the command and control server, and the execution of additional modules which may be received. So the main module performs the following operations. It validates the network connection upon execution, the script waits for an active Internet connection by repetitively making HTTP post requests to Google dot com with the parameter high equal high HI equals HI. Just to see if it can succeed. That's how it detects whether or not it's got an Internet connection. Assuming that it does, then it knows that. It also performs basic system enumeration. It collects the Windows OS version, the computer's name, and the contents of a file NI, me dot text in app data. In the app

"windows os" Discussed on Security Now

Security Now

03:48 min | 4 months ago

"windows os" Discussed on Security Now

"U.S. and UK bans come after both countries intelligence agencies warned against the use of equipment from Chinese companies, cautioning the Chinese equipment could be used for digital surveillance, digital sabotage, and economic espionage. Again, of course, they're not wrong, but we already do lots of even dumber things, like deploying proprietary design, closed source, voting machine technology in critical elections. You know, how do we know what those machines are doing? Both daw and hick vision had already lost a large chunk of their market in the U.S. after the US Treasury Department sanctioned the companies for providing the Chinese government with facial recognition and video tagging solutions in the government's efforts to oppress the Uyghurs. And I recall, as I mentioned, that hick vision was on our radar was on our radar separately for something that they were doing, maybe 6 months ago or so. We've talked about this a lot in the past. I noted that it was hard to believe that Russia was still using the American made closed source Windows OS when hostilities between the U.S. and Russia have been so aggravated. And it's also amazing that until now, the U.S. has been deploying Chinese made networking gear while having absolutely no idea what's inside the box. In the past, we've even discussed the existence of counterfeit Cisco networking gear. Since Cisco equipment is all manufactured in China, both the real and the clearly counterfeit equipment all comes from the same place. How do we know what the counterfeit systems are going to do? And the burden of trust is really not symmetrical. Due to Chinese massive manufacturing and fabrication capability, they receive western technology from us and the west purchases the resulting Chinese products from the east. Thus, more trust is required from the rest, then is from the east. So I suppose my point is, we can not discount such concerns as being purely hyperbolic and inflammatory. Our dependence upon our networks and digital infrastructure has slowly but surely been growing through the last several decades. So it's only natural that at some point someone at the national government level is going to wake up one morning and pose the big, but what if question to their staff? You know, it's that, but what if that was the driving factor behind the recent decision to just say no to Chinese networking and video equipment? And unfortunately, protectionism that results, I think, is both sane and rational. Even if you can't prove that anybody's doing anything wrong, you know? What if? And, you know, the equipment we're buying is just a black box. We plug it in. And we assume it's going to be okay. But we have no ability to prove that that's the case. It really is a dilemma that we've gotten ourselves in. And all I can see is that over time, between countries where there are clear hostility,

U.S. US Treasury Department Chinese government Russia Cisco UK government China national government
"windows os" Discussed on Security Now

Security Now

02:04 min | 5 months ago

"windows os" Discussed on Security Now

"Just that older versions of Windows were stuck on a block list that couldn't be updated. You know what? What does it mean? Full Windows OS releases. In a support page detailing the vulnerable driver block list after the October 2022 preview release, Microsoft states, this October 2022 preview release, addresses an issue that only updates the block list for full Windows OS releases. Okay, so does that mean they're changing that or not? We don't know. They said, when you install this release, the block list on older OS versions will be the same as the block list on Windows 11, version 21 H two and later. Okay, so a catch up. Microsoft had told ours technica writes a ZD net that it was in fact regularly updating the vulnerable driver list. But that there was a quote a gap in synchronization across OS versions. Again, it's no longer possible, apparently, to get Microsoft to actually tell anyone what's going on. You just have to poke it and then experiment and figure it out for yourself. So they said on, they said, so the October 2022 preview release is that promised fix, which should be released broadly in the November 2022 patch Tuesday again next week through Windows update. Microsoft's release notes for the October Windows 1122 H two preview update states. It updates the Windows kernel vulnerable driver block list that is the that is in the and that will explain what this means in a second, but they said in the driver SI policy dot P 7 B file. Again, I'll explain that. This update also ensures that the block list is the same across Windows 10 and Windows

Microsoft technica
"windows os" Discussed on The Defiant - DeFi Podcast

The Defiant - DeFi Podcast

05:40 min | 5 months ago

"windows os" Discussed on The Defiant - DeFi Podcast

"And it looks, I get it because it looks like you're doing a trade through the website. However, that is not what you are doing. You are not doing a trade through the website. The website is essentially acting kind of like Windows OS, right? When you go on Windows, it looks like you're. Moving some window around or something like that. But really, there's no window. And you're not actually moving anything. The OS is providing an appealing layer of abstraction that assists you with giving technological commands to your computer, right? But in this case, the website isn't even doing that because it doesn't send your commands anywhere, right? It helps you figure out what you want to do. And it essentially generates a data object, and it gives that data object not to someone else on your behalf. It does not send that data object anywhere. It does not send it to a broker. It does not send it to an exchange. It doesn't even send it to a minor or a validator. It doesn't send it. It gives it to you. The user now, you as a user might have a separate application called a wallet on your browser, and instead of just showing you what the data object is, it might give you the convenience of directly putting that data object into your wallet. But at the end of the day, you are looking at your wallet and you are deciding what you want to do with that data object. You can change the parameters around. You can change the fees you want to pay the gas price, right? You can send it to the default RPC node that is paired with that. Or you could send it to your own RPC node that you might be happening to run. Or your Friends RPC know that. But you are the one Senegal. That website is not doing any of that for you. It is not interacting with the blockchain free. It is not executing the treat for you. So historically, we as a society have not regulated mere software tools, mere software assistance tools.

Senegal
"windows os" Discussed on Security Now

Security Now

04:11 min | 7 months ago

"windows os" Discussed on Security Now

"Which holds the leds configuration. For embedded controllers, the control of the neck is typically performed via internal bus or USB interfaces. For example, sample code for LAN 9 15 X Ethernet controllers, programs, the corresponding LED register via USB commands. So that's the first way that the best if you can get it. Way number two, link status control. They say, in this method, only the status LED can be controlled. The malicious code can intentionally change the link speed, which in turn causes the network adapter to change the status LED. For example, setting the link speed to ten megabits, 100 megabits, and one gigabit, will set the status LED to off green and amber, respectively. Selecting the link speed can be done by interacting with the Nick driver. For example, the ETH tool command line tool in Linux enables to change the link speed of the Ethernet controller. The same as possible in the Windows OS via the net SH command. Note that setting the link speed requires root admin privileges in both Linux and Windows. Technically, the link speed is determined through the otter negotiation procedure. In this procedure, which occurs in the physical layer that connected devices share their capabilities regarding supportive parameters such as transmission rate, half full duplex, et cetera. The link speed of a network Nick can be determined from the computer's OS. And third, user LED control. They say in this method, the user directly turns the status leds on and off by enabling and disabling the Ethernet interface using APA using API or tools such as the eth tool or ETH command. The user directly turns these status leds on and off by enabling and disabling the Ethernet interface, another technique to blink the status LED is using the test or identify functionality, enabling the operator to identify the adapter by visual indication. These operations can be triggered programmatically or via low level tools such as eth tool. Okay, so as they always do, some of them, some group of them, whomever, really looked at this and wrung out every detail and actually implemented these strategies. They consider the cameras needed to receive the information and the camera frame rates and interactions thereof that the maximum distances at which cameras can be focused upon leds on Nick adapters. And basically what could be done to make the entire thing work. Then they finally get down to the effective bit rates, which are achievable through each of these three methods. They have the driver firmware control that first and best one, they have in their table, which is their short for on off keying. And they say blink blink frequency and colors. Allows them to achieve 100 bits per second. So they talk about being able to use that to exchange text files, usernames, passwords, encryption keys, and pin codes. The second approach is link status control, they can get one bit per second there. So you're not going to exchange anything really long, or at least not quickly. And then the final, the user LED control, they're claiming two bits per second. So you could do key logging, user names, and passwords, credentials, encryption keys, and so forth.

ETH Nick
"windows os" Discussed on Security Now

Security Now

05:37 min | 8 months ago

"windows os" Discussed on Security Now

"IDE collide dot com slash security now. I just love this. Idea. All right, back to Steve and the picture. Of the week. So the way to describe this, we don't often get thick fog in Southern California. But I spent the first third of my life in Northern California. Yeah, we get it. Oh boy. And especially like Sacramento driving like around the Sacramento or for some reason like this super thick fog. So remember how, if you've ever driven in fog, how you all you can see are the lights of an oncoming car. There is just two white glowing things in the darkness. Or even in the day, depending upon what time of the day the fog is. But the point is that the fog obscures everything that's not lit up. Okay, so I have to say, this picture of the week, it's worth getting the show notes just to see this because this was an actual photo taken in the distance is a digital billboard which has which has, I know, it's just so good, which has crashed. And or for some reason, caused its backing Windows OS to display an error message in a dialog box. So you don't see the normal, so the billboard itself is not displaying whatever ad it normally would. Instead, it's this dialog box. And because this is taken on a foggy night, all you see is like hovering in the sky, is this eerie glowing windows error dialog. And so the caption on this great photo says a digital billboard in Odessa, malfunctioned in the fog. Convincing unknown numbers of motorists, not only were they living in the matrix, but it was being run on Windows 98.

Sacramento Northern California Southern California Steve Odessa
"windows os" Discussed on Security Now

Security Now

04:04 min | 8 months ago

"windows os" Discussed on Security Now

"Didn't include it in here, but he mentioned he had a long tweet that went with this picture showing brother MFC J 9 85 DW printer, and then another identical one parens copy one. And notice that it's the second one that has been set to default. He solved it. Yes. He noted that exactly this happened. For reasons he was never able to figure out now he knows the real one stopped working. The copy worked, and he said, okay, fine, he fixed it the way most people do, I'll just use that one. Okay. Wow. That's clergy. Someone tweeting as high wear said at SG GRC. A little pushback on your Windows OS being creaky and brittle. He says, take a look at 11s settings controls. No longer are they a thin veneer over ancient code. They are beautiful, they are a beautiful evolution of the venerable property sheet control. Top to bottom, credit to MS where credit is due. Okay, so after reading this tweet and wanting to include it in the podcast for the sake of balance, I would like to be balanced. I thought I might have missed something. So I fired up a virtual box VM where I keep an instance of Windows 11 because it's not actually good for anything. And I went over to the settings controls. After waiting for it to update itself somewhat endlessly, much like Kirk on the bridge, I was unable to go to warp drive. Or warp speed. So anyway, it looks, first of all, exactly like Windows 10. Perhaps I missed what hive wear was referring to. But what are you talking about? It's beautiful. It's beautiful. Just like Windows 10. So I poked around and actually it was your discussion with Paul from last week, Leo, that led me to the control panel for sound. It looks exactly like what we had, perhaps as far back as Windows 3.1. It is in fact the old control panel. You nailed it. Yes, it is. It is all property sheet control. Or go to Internet options dialog. It's the same as we've had forever. Or the device manager, the same as we've had. And I could go on and on. So he says, no longer are they a thin veneer over ancient code? Well, I think that's precisely what those ancient dialogs are. I know. Nothing has changed. It looks like they XP. They are ancient code. And I think that's great. Because those are the parts of windows that still work. Right. Most reliable. In fact, when you want to change user settings, you don't want the thin veneer crap no. The Microsoft is giving us the you want the old school. You don't want something that looks like a web page. You don't want this. No. No, you don't. You don't. You want the old school. In fact, so many people have learned with the command is to open those old user property settings. So anyway, I didn't mean to dis on high wear, but I thought, okay, wait. Am I missing something here? Maybe 11 did change everything. And I just haven't dug in deep enough. But no, it's still windows three one. It doesn't have the same borders and the same colors. It's got rounded corners now. And for what it's worth again, I'm happy that they're leaving the stuff alone that works. Because for that reason, it works. Okay,

Kirk Leo Paul Microsoft
"windows os" Discussed on Security Now

Security Now

03:15 min | 10 months ago

"windows os" Discussed on Security Now

"That stands for senior software development engineer in test Jerry Berg recently answered Berg worked for 15 years at Microsoft, where one of his roles was to design and develop tools and processes to automate testing for the Windows OS. He left the company after Windows 8.1 shipped to the public..

"windows os" Discussed on Security Now

Security Now

03:56 min | 11 months ago

"windows os" Discussed on Security Now

"This group gets in your network, your host, basically. And of greatest concern, according to cyber recent CEO, was that the companies had no clue they had been breached. In a pair of detailed reports, cyber reason attributes the attacks to winti based on an analysis of the digital artifacts the group left behind after its intrusions. Several other cybersecurity companies have also been tracking windy since it first emerged 12 years ago in 2010. And researchers have observed that the hackers are clearly operating on behalf of China's state interests while specializing in cyber espionage and intellectual property theft. The group used a previously unknown and undocumented malware strain called deploy log, as well as new versions of malware like spider loader, private log and win NT kit. The malware included digitally signed colonel level root kits, as well as an elaborate, multi stage infection chain that enabled the operation to remain undetected. The group also managed to abuse the windows common log file system. Which allowed the intruders to conceal their payloads and evade detection by traditional security products. Is a logging framework that was first introduced by Microsoft and Windows server 2003 R two and has been included in all subsequent Windows OSes. Cyber reason explained that the attackers implemented a delicate House of Cards approach. I was their term, meaning that each component depends on the others to execute properly. Making it very difficult to analyze each component separately and unsurprisingly, operation cuckoo bees generally took advantage of existing weaknesses, including unpatched systems. I know, yes, thank you. It's sufficient network segmentation. Unmanaged assets forgotten accounts. And a lack of multi factor authentications. In other words, stupid oversights. Easily remedied. Easily. Yes. Exactly. Cyber reason said that the attackers generally obtained their initial foothold in the organizations through vulnerabilities in enterprise resource planning. ERP platforms, last month's last month, FBI's director Christopher wray, told 60 minutes that the biggest threat American law enforcement officials face is from Chinese hackers stealing proprietary information. He said that the FBI opens a new China counterintelligence investigation about every 12 hours. Oh my God. Think about that. Oh my God. Every 12 hours, another new Chinese counterintelligence investigation is opened by the FBI. Ray said that quote, they are targeting our innovation, our trade secrets are intellectual property on a scale that's unprecedented in history..

China Christopher wray Microsoft FBI Ray
"windows os" Discussed on TechtalkRadio

TechtalkRadio

03:33 min | 1 year ago

"windows os" Discussed on TechtalkRadio

"Listening? Mike. This is for Mike Lawson who sent us a note wanting to get a system. PC part picker dot com. All right? I'm going to put this together, but there are a couple entry level gaming builds that are already on PC part picker that are already the parts are already put together, budgeted. For less than for less than a $1000. You're kidding me. Really? I didn't think you'd be able to do it. So I'm going to go through and I'm going to tweak a couple of things, right? But I still think for now this isn't going to include a monitor, right? There's a couple of things that you're going to have to sacrifice. You're going to spend more than a $1000 total, but if you want a PC that is less than a $1000, we can do that, right? But you're going to have to there's a couple of things you have to spend a little bit more money on, right? But do it over time. Right. So I'll put that together. We'll get that link up on the website. We'll share it at our next show, but I think we can do it. A $1000. All right. Well, no, no. He's staying under a $1000 for the PC itself. Yeah, yeah. That is not including Windows OS that's not including the monitor that's not including the miles. It's not including the keyboard. The camera, the headset, the microphone, all those other things to capture card, you're gonna need for streaming. That's gonna be more. When you think about it, I still think with my expertise in doing this at work getting budget PCs put together for doing zoom and stuff. Okay, I think I'm gonna be able to still do it. I will say I will, for the PC, the headset, a cheap monitor, a good light, a webcam. I'm going to say it's going to be less than 1200 bucks. Now, if he does have an older PC, if he's got a PC that's running Windows 10, you can move that license. How? I didn't know you could do that. You contact Microsoft and tell him you're upgrading the hardware? Right? Yeah. Oh, I had no idea. Yeah. So if you can do that. He has a PC with Windows 10. Now it's going to be the same version of Windows 10, so if you have Windows 10 home or a Windows 10 premium or whatever it's going to be that same version. Hold on. So if the PC that he has currently was a Windows 7 PC that got upgraded to Windows 10 for free, that does not count. Now, doesn't. Incorrect. Really? You can reach out to Microsoft and they will issue you a Windows 10 license based on your Windows 7 Windows key. Of course. I built my most recent PC. I went through this, right? Because I bought Windows 7. I've never bought Windows 10. I did the accessibility upgrade, which was free. And then I moved to a new computer while I was having problems getting windows reinstalled because once you move from 7 to ten, you get a product key, but that product key isn't the Windows license key. It's the product key for your hardware identifier. Got it. For Microsoft. So you have to call Microsoft and say, look, I'm moving to a new PC. I'm changing all my hardware. I would like to move my license and I still had my Windows 7 key. And I just told them, here's the key. And they're like, oh yeah, that's the key you're going to use. So now my Windows 7 key is now my, if I move to a new machine, I can just take that window 7 key and use it to install Windows 10 homes. You know, I remember a few years ago, I had to contact Microsoft and it was regarding an issue we were having with the key. They were like super helpful. I mean, they were really, really great. I mean, I think I was on the phone. I think I held longer than it took them for me to fix the problem. Yeah. Yeah. Very nice. That's awesome. All right. So we'll give.

Mike Lawson Microsoft Mike
"windows os" Discussed on Security Now

Security Now

05:06 min | 1 year ago

"windows os" Discussed on Security Now

"That's how it detects whether or not it's got an Internet connection. Assuming that it does, then it knows that. It also performs basic system enumeration. It collects the Windows OS version. The computer's name and the contents of a file NI me dot txt in app data in the app data path. The file is presumably created and filled by different modules that will be downloaded by the main module. It then retrieves the command and control servers domain. The malware decodes the command and control domain retrieved from a hard coded URL located in the same S three bucket from where the back door was downloaded. So the bad guys have dynamic control over that by deciding what goes in this AWS bucket. It also retrieves decrypts and executes follow up modules. Okay, so once all the data is gathered, the malware starts communication with the command and control server at the domain, which it determines by pulling that from the Amazon AWS cloud bucket. And it does that. It communicates with the command and control server by periodically sending HTTP post requests. I mean, none of this is high-tech. None of this is rocket science. This is easy to do, which is why this terrified everybody so much. So this thing sends HTTP post requests to a pre configured URL with each post request containing information from which to build a session key. The OS version, the computer's name and the contents of that file in the app data directory. So that ends up being something unique, which it uses to identify itself each time. And I think as I recall, it puts it in a session header in the post query. In response to the command and control servers receiving these post requests, it can either choose not to respond in which case the script will keep setting post requests periodically to continue to provide the server with a stream of response opportunities, or the server will return a base 64 encoded string..

Amazon
"windows os" Discussed on This Week in Tech

This Week in Tech

05:39 min | 1 year ago

"windows os" Discussed on This Week in Tech

"I feel like this is truly a generation two device so far from my very, very limited testing of it. And you know, what they always say is Microsoft doesn't make a good device close in the third generation. I have a feeling that's gonna be true. All about Android. Samsung had an event actually. Yeah, recall this. Unpacked part two happened last week. So you can now customize the galaxy Z flip three. It's the magical bespoke edition. That was somebody said, this could have been an email. Twit. Yeah, I'm not gonna argue that one one bit. Welcome back. And there was some good watching to be out this week. Right, okay, this week also saw the 20th anniversary of Windows XP for those of us who were still using Windows 2000 at the time. It wasn't that big a deal, but if you're on Windows millennium edition, then it was a very, very welcome edition. It's an iconic operating system. It's still massively in use as a big, long tail of users out there. I mean, in terms of outdated technology, it's one of those things that has hung around like a smell and a space suit. Any vast consistent working on it, padre? Yes. Actually, yes, but all of the air gapped. So we have a few machines that are still running Windows XP just because of some legacy software that will only run on XP or below. But they are not connected to anything. So that's the concession that we made. They're not even hooked up to a private network. They are completely stand-alone, which kind of limits their usefulness. It is rather weird, but I was down at JPL for the curiosity rover landing. And after we got the first shots back, and everyone applauded and then they sort of closed down the meeting. But the default screensaver came onto the projection. The projector. And it was Windows XP, and you're like, you've just landed a ton and a half of rover on Mars and you're still using Windows XP. It's Brianna, did you have much experience with XP or you Mac all the way? God, yeah. I was doing network support for a career. I remember it. Like it was yesterday. I can't believe it's been that long. Yeah, one of the things that really strikes me is when I ran for Congress here in Massachusetts, I personally dropped off. You have to get signatures to get on the ballot. And I personally went around to every single town, basically clerk's office to drop off my signatures because I wanted to get to know people. There would be a fun event. And I was terrified to be honest with you. How many election computers were still running on Windows XP? You know, we talk I talked a lot about cybersecurity on my campaign. And here's an example, a lot about how we may need to be spending a little bit more money on infrastructure to make sure we can't be hacked. So fingers crossed that that lucky street continues. Well, this is it, but I mean, when XP first came out, it was it was billed as the secure operating system owned because Microsoft had had such problems with computer viruses really going rampant on its thing. It was just like, yep, this is XP's built on the NT framework. This is going to be the most secure operating system yet. And I think people are hanging out a bit too long. It does seem as you were saying with the election machine stuff, the DEFCON voting hacking Sessions. They were still running Windows C on some of these machines. But why is it padre? You think XP is still hanging around? Is it just the legacy software? It's just the legacy software, but remember there were a couple of advantages to running XP. It was the first Windows OS that allowed for multi monitor setups. It was the last Microsoft OS that allowed you to move setup files to either a hard drive or solid state if you had one of those later on and do a completely in computer installation. A ridiculously fast. It also had no problem being mirrored from machine to machine to machine. It was before Microsoft added any of those protections. So as a whole, it is a fantastic test bed system. It is an operating system that I still use every once in a while. I will occasionally spin up an XP instance, put it on the Internet and see how quickly it gets owned and see what kind of new attacks the box experiences. So it's still kind of fun. It's a versatile environment. It will run on very low end hardware. I can move it from box to box to box without ever having to worry about whether or not I'm licensed for it properly. So yes, it's still in use. And yes, it will remain in use for years and years to come. I mean, the same attacks that are working on XP machines now will probably be seen on the Internet in about 15 years. It's interesting. I mean, how was it from a network topology? Standpoint, Briana. And was it actually good better to work with in 2000? I remember young it was an upgrade in a lot of ways. You know, we are figuring out technologies like direct X back then. So the underlying reset for the game industry was revolutionary at the time. Networking overall and getting office systems to talk to one another was tremendously more difficult back then. I don't know if you remember this, but trying to get windows in Mac machines to talk to each other on the same network. That was an absolute nightmare back then..

Microsoft JPL Samsung Brianna Massachusetts Congress Briana
"windows os" Discussed on Cyber Security Headlines

Cyber Security Headlines

02:31 min | 1 year ago

"windows os" Discussed on Cyber Security Headlines

"This guys actually legit or how. Big of a player is He certainly talks a big game But you know. I wonder if eli must've to reach out to them because i think anonymous just threatened ilan for bitcoin position. So you know And of us will always be around. They are decentralized collective They only get involved with social justice type of attacks. Last year actually had quite a few things that occurred. I think the blm you know they would be a lamb and they I think we're responsible for some of the attacks on different precincts and things like that. So i i wouldn't say it's necessarily whether or not it's a question that they're still relevant. I think it will always be relevant. Is just going to be a matter of you know from a decentralized volunteer organization. Are they eventually gonna hit. The jackpot have another attack and then two years from now. We're going to be like holy moly. They are you know this huge powerful no no way no but i think always be around. I think i'd love to learn more about them. I can't imagine even though this gentleman was the face of anonymous as the as the The news is putting it It's a much larger much more well organized organization than just that so i. I tend to agree. I think that they're they're always around than i do. Honestly think that's a good thing. It's the kind of the other side of the story. We had a moment ago about. The police Information as well so for those who are nerds for a leaked software before it becomes real windows. Eleven was leaked to this week or supposedly. Anyway it was. An image was leaked on chinese-speaking forum and users are rushing to install the new leaked operating system as reading through some of the features of windows eleven. It's kind of like windows ten Just apparently anywhere with some some cosmetic changes with rounded corners and stuff. Like that and a few improvements. But it's still early days for this of course Bleeping computer was reading. I was printing this out and just saying for example that this could be a fake could be manipulated and people who are looking to download this and play with. It should look to do it on a safe. Sandbox environments in case it has been manipulated and his actually malware type tricks so Is that what you would think. I mean your your knowledge off this kind of thing in terms of pre releasing software. Do you think this could be one of these gifts. That might be taking if you listen to it or is it just normal. Normal pre release for microsoft and Well first off. This is the first time a windows. Os was released before.

microsoft windows ten windows eleven Last year windows first this week one of these gifts two years ilan chinese Eleven
"windows os" Discussed on Security Now

Security Now

03:33 min | 1 year ago

"windows os" Discussed on Security Now

"In ms graph component can be embedded in most office documents which will then exploit the flaw when any one of those documents which has ms ms graph component embedded in. It is opened. so you know again. These are all ways that email right phishing email can attack a user because they just do something. That should be fine. But isn't yeah. It's just so wrong. Another vulnerability being actively exploited. These are all things like you know. These were all loose already right. I mean you know windows users were being hurt by these things. These six different things that got fixed last tuesday In this case there's a privilege escalation flaw or allegation in the d. w. m. core library. Which is what microcosm microsoft calls at. Dwi is the desktop windows manager. It can be exploited by running an executable or script on the local machine it has a cvs of only eight point four You know so. It's bad Microsoft only labeled it as important even though again actively exploited in the wild. Oh yeah. I think maybe you need to get that fixed and finally Cv twenty twenty one thirty one nine fifty five. That's the flaw. That i talked about before relative to chrome. That's the flaw that allows an attacker to read the contents of the windows. Os kernel memory. They called it an information disclosure. I'd call it. You know game over the current. The colonel is the land of exploitable secrets and microsoft stated their advisory that it has also been actively exploited in the wild. So yeah another patch tuesday and a few hundred overall. If you consider intel adobe and microsoft a few hundred fewer outstanding bugs in the software the world is using that would be a hopeful sign. Right a few hundred fewer if we didn't appear to be creating them a new at an even faster clip than we're eliminating them. I did know last week. And i didn't have a chance to get to it. But it was in one of those tabs that i had left open in fire fox and that i mentioned and leo unlike you being hip is not a designation. I have ever at any prior point in my life laid claim to. Yeah i just never had that. Nora is steve. You're way hip or than i am. You know what a lot of this stuff is. You know all indications are that. I'm headed in the other direction. Both those those who are hip will know that tiktok is a popular short form video sharing alarm that hip. Yes see okay ninety. Not i know okay anyway there. I'm sure that they're not happy that they recently made the tech news press due to a somewhat chilling explicit change in their services privacy policy. Ok now stepping back a bit..

Nora Microsoft last week tuesday steve windows microsoft six different things intel chrome Both one Cv twenty twenty one thirty on Os kernel ninety adobe fire fox last tuesday eight point four one of those tabs
"windows os" Discussed on Anything But Idle

Anything But Idle

05:58 min | 2 years ago

"windows os" Discussed on Anything But Idle

"I have tugging his show multiple times of neverwhere. Never were It saved for machine that do not a frankenstein that was dying and then greece resuscitate with thanks to never wearing to a chrome os and that machine stop working almost working and then it was inherited by somebody else to everybody's surprise but never where was bought by google and really nobody knew what was the future of that at least nobody outside of a close group of google but this week we got news that the code of cloudy eases starting to change from get hop that were never had it to the crumbs to google servers and they are starting to integrate and that is really really exciting. Because i believe. I again there as we sent him the previous note news. Now there is really get into difference between chromebook and and the power and the capabilities. A really short. This idea that you can only install in any piece of howard where windows will not cover security. Mac will willnot cover security and now google can come and keep it updated and keep it mother and keep it secure. I believe it is really something incredible. So i am particularly excited about seeing this note. Every howard deserve to be to be still asian there is how are simply too ugly for that but still the use are exciting. I don't think this is necessarily about resuscitating old of You know Devices that are you know kind of just sitting on the on the tables. I think chrome os and the krummel's team is really looking to be able to revive old chromebooks and being able to keep them in some position to continue operating once they fall out of automatic update They expire from their automatic software. Updates and i think that'll be really powerful. I hope. I hope that as they go forward they'll do what neverwhere cloud ready was doing which was allowing people to be able to exhume from the graveyard some of these older devices. I have i have an hp laptop that i've been thinking about running a db in the latest version of debbie on and Which links colonel based operating system. But i've been. I've been thinking while you know what i could probably get cloud ready on it. If i you know baling wire and duct tape the the pieces together and it would be really nice if there was a little bit more seamless. If it was easier for me to be able to say this is google sanctioned. Let me put this directly on the system and make it work. I think i'm gonna have to do a little bit of a coating under under the hood to be able to make that work on this particular. Hp laptop because of its in the state of cloud ready. and so. that's just like one of those things where it'd be really nice if get us that capability to Bring new life to devices that otherwise are perfectly good hardware. That just can't run. The latest operating system say windows os or or something else. like that. so. And i and i believe is what we experience with pandemic and i hope this scientific all right and this is only once every hundred years. I don't need to see the next one..

hp google windows os this week chromebook Mac once every hundred years chrome os one windows asian pandemic frankenstein krummel
"windows os" Discussed on Anything But Idle

Anything But Idle

05:49 min | 2 years ago

"windows os" Discussed on Anything But Idle

"Be taken to that episode on the future of android and i'm sure we had other topics we argued about lesson android. But that's the one that comes to mind In in the history of productivity cast. I will say this. i'm. I'm one of the product experts for google chrome and i spend a lot of time in the forums are reading and helping folks who have issues with google chrome and it's just phenomenal to see the growth of the platform. It's really become while we have chrome os. Which is its own operating system chrome itself being a browser for most people it is now. It's got probably more surface than most operating systems. You might run. You know mac. Os or windows os but in reality most of what you do. Every day is in the browser and that really creates a larger surface for operating than the operating system itself and chrome especially being the dominant Browser on the planet is just so much of what how we consume the web and so I know that in the productivity community. Many of you are going to be using alternative browsers or multiple browsers in your world. That's totally cool But i just find it to be fascinating that ten years only ten years in and google has really Swallowed up a big portion. Of what is the the operating system world today and And i'm curious to see how it will develop into the future. Google chrome is now gone into a two week A four week cycle so they'll be a publishing You know new editions every every four weeks now and And i'm looking forward to seeing what the update cycle. The accelerate update cycle really does for us in that sense as well. I may say that. That's i think is inciting from from every what in that is incredibly exciting for for the geek in me. The gate the geeky. I can describe how excited i am this. But from the training Consumer side than the person who don digest technology really really. Well okay now. We are officially put the host getting fire fire hose and said enjoy an. I don't know what's going to how could was that. That said let's move to our next news with the ten year birthday. You know krone got some things that were quite interested in one of them was phone and the other one is nearby. Share that i wish on. I'm looking for something that can do nearby share between my ios on my chromebook and we we recorded this podcast using a chromebook. So there is certain things for which i have not chromebook. I sai- said i needed to learn and be good at so can help some of my clients and what these machine do but he struggled because everything else in. My world is ios compatible. And sometimes i wanted to send things to this and there is not that share that works so well on my irs. And my mac so hopefully someday will see that. It's but in the meantime. Let's talk about phone hub. And i'm sure you can describe it much better much better than i asked you are the they.

android mac ten years two week windows os chrome os google chrome today four week chrome mac. Os chromebook one ten year birthday google four weeks Google krone ios
"windows os" Discussed on Nuff Said: The Marvel, Agents of S.H.I.E.L.D, and Comics Fan Podcast

Nuff Said: The Marvel, Agents of S.H.I.E.L.D, and Comics Fan Podcast

04:13 min | 2 years ago

"windows os" Discussed on Nuff Said: The Marvel, Agents of S.H.I.E.L.D, and Comics Fan Podcast

"Hayward chuck hayward Peter cameron a writer gets get written with this week. Of course jack shafer. The great jack shafer is always are created for television by. She's the producer. of course. jack. Kirby and stan lee created one to maximus roy. Thomas and john busey creative vision. Peer cameron was our executive story editor. This week as bobak as far. Johnny both executive story editors and then along with mackenzie door and then we get three three hardest working people show business this week. Our staff writers. Meghan mcdonald's laura. Donny and cameron squires all staff writers all doom. What needs to be done to get the off there. Were on the air As it needs to be anyway so this is an interesting of course opens with our malcolm in the middle entrance which which was a lot of fun Don't question just keep going and is it a dream. is it reality. All these things that are in our thing wasn't technicial song to malcolm in the middle that don't give a damn about my bad reputation. That was Freaks and geeks okay. That was that one. Yeah so different shows but no malcolm in the middle was By they might be giants. Life is unfair by. Viz is right right right and the utilize utilize. The fourth wall. Breaks a lot in this. 'cause this is the fourth wall breaks of malcolm in the middle which also and also tellingly the first character breaks. The fourth wall was little billie with the magic powers. And this is interesting. We also get this idea in this. That remember in the last episode vision makes you statement. We always used to be of one mind. But we aren't any more. And i think that is maybe a reference to the fact that her she in the minds stone were linked but now that he's been recreated maybe he doesn't share that link with her anymore but they used to be of one mind but now that he's evolving and becoming his own person again to some extent ch- reducing that. There's something missing He is now gaining that independence giving their economy. Which again is why. I say again. I do think that the vision. Israel's and this whole process is about healing both the vision and the people of westview know it's interesting. It's almost like he's. He's getting less than himself by finding out more right to the more he finds out about the law that he doesn't know the less he really knows who he is. Full adam and what it is is he is. He's a computer programs as he always was. And the thing about a computer program is he's an operating system so when you have an operating system it can pull data but the os remains even if you way. Pull the data. If you lose all your files you still have microsoft word. you know. it's still going to behave just like microsoft word evenly extra windows. Yes walberg own called. Which is operatives systems. So mac has an. There's the mac os and then there's the windows os technically koldo s.'s. Everyone thinks about s. The mac os because it didn't come up with a fancy name because you know they had the first graphic interface and then you know bill gates it..

Donny john busey stan lee cameron Thomas Peter cameron Meghan mcdonald windows os jack mac Johnny This week mac os this week first character fourth wall windows Peer cameron both one mind