Welcome to nsane.forums

Welcome to nsane.forums, like most online communities you need to register to view parts of our community or to make contributions, but don't worry: this is a free and simple process that requires minimal information. Be a part of nsane.forums by signing in or creating an account.

  • Access special members only forums
  • Start new topics and reply to others
  • Subscribe to topics and forums to get automatic updates

Search the Community

Showing results for tags 'windows'.



More search options

  • Search By Tags

    Type tags separated by commas.
  • Search By Author

Content Type


Forums

  • Site Related
    • News & Updates
    • Site / Forum Feedback
    • Member Introduction
  • News
    • General News
    • FileSharing News
    • Mobile News
    • Software News
    • Security & Privacy News
    • Technology News
  • Downloads
    • nsane.down
  • General Discussions & Support
    • Filesharing Chat
    • Security & Privacy Center
    • Software Chat
    • Mobile Mania
    • Technology Talk
    • Entertainment Exchange
    • Guides & Tutorials
  • Off-Topic Chat
    • The Chat Bar
    • Jokes & Funny Stuff
    • Polling Station

Found 1,144 results

  1. Screenshot: Changelog: Patch changed to offline patch only. no online servers for this patch. Links: ProPresenter Homepage: http://www.renewedvision.com/propresenter.php Download Page: http://www.renewedvision.com/pro_download.php Instructions: Download the bundle above, extract using WinRAR or 7zip Install ProPresenter 6 , but DO NOT launch ProPresenter 6 after install. Run Patch as Administrator Run the local webserver by running launch.bat The webserver is required for activation to work Run ProPresenter Updating your ProPresenter to the latest version: Each version will have a separate thread, as it is not encouraged here to edit threads. Modules: Modules are pre-registered with the patch. Use them in the preferences pane. DO NOT CLICK demo modules or buy. Bibles: To Install Bibles: Click the Bibles Icon on the ProPresenter Toolbar Click the GEAR icon on the Bibles Window Click the Bibles Tab Click the Free Bibles Tab Install the bible you need. Local webserver must be running if the Offline Patch is made, otherwise patch the program to download from the web. ProPresenter version 6 for Mac SEE Kataklop's Thread on MacSerialJunkie (google is your friend) He regularly updates as the Mac version also updates. His links are being removed by RenewedVision and maybe mine would be gone too Good luck getting the patch for new versions Blame those guys who post contents of this forum elsewhere.
  2. We are currently developing a new User Interface for the Avira Antivirus for Windows and we are thrilled to show it to you! It has a modern, fresh look which fits the overall Avira design. This easy to use interface simplifies and reduces the number of interactions a user has to make in order to achieve to most common tasks. We've also made sure that all the relevant information is presented in an easy to understand fashion. While it's not 100% final yet this is now build on modern front-end technology ensuring greater compatibility with various platforms and also creates a foundation for faster iteration cycle. Known issues: Custom Scan, Scheduled scans, Password protection are not going to be available in the first beta build UAC integration is not yet done Configuration & Scanner will still show up in its current style. During this test you will be provided with a Pro license key to test all modules of Avira Antivirus Pro. The test is scheduled to start in the week of the 16th of August. Article source
  3. Adobe Creative Cloud & Acrobat DC ML [Windows-Mac] Download distributions Adobe CC 2017 ML Direct Download Links: Download Creative Cloud 2017 Apps [Download Links & Instruction ] ** Free Sign-in required** https://helpx.adobe.com/creative-cloud/kb/creative-cloud-apps-download.html ================================= Troubleshoot download and install errors https://helpx.adobe.com/creative-cloud/kb/troubleshoot-download-install-log-files.html Creative Cloud Cleaner Tool to solve installation problems [Windows-Mac] https://helpx.adobe.com/ca/creative-cloud/kb/cc-cleaner-tool-installation-problems.html Adobe CC 2017 ML Direct Download Links: Adobe CCMaker 1.3.4 by El Sanchez - Utility for downloading and or installing products from Adobe Creative Cloud Adobe CC 2015 ML Direct Download Links: Adobe CC 2014 ML Direct Download Links: Products not included in the CC [Captivate 8] Method To Download Adobe CC Adobe CC Useful Utility Tools Adobe CC 2015 Alternative Trials Direct Download Source - Windows Adobe CC 2014 Alternative Trials Direct Download Source - Windows ========================================================================== Product Updates Adobe CC 2017 Product Updates Direct Download Links: Adobe CC 2015 Product Updates Direct Download Links: Adobe CC 2014 Product Updates Direct Download Links: ADOBE Update Management Tool 8.0 by PainteR WIN | MACOS Adobe Application Manager 9.0 Adobe CC 2014 Alternative Update Direct Download Source - Windows Adobe CC 2014 Alternative Update Direct Download Source - Mac OS ========================================================================== Medicines Windows: Medicine For Adobe Creative Cloud CC 2015 -2017: AMT Emulator v0.9.2 by PainteR [Support Adobe CC 2017] Adobe Universal Patcher v2.0 By Painter'S [Windows] + Instruction [Support Adobe CC 2017] ============================================= Medicine For Adobe Creative Cloud CC 2014 ADOBE CC v2015 XFORCE-KEYGEN Windows + Instruction ADOBE_TECHNICAL_COMMUNICATION_SUITE_V2015_MULTI-XFORCE ADOBE CC v2015 KEYGEN MACOSX XFORCE OR Adobe Universal Patcher v2.0 By Painter'S [Windows] + Instruction OR amtlib 2015 adobe snr patch painter fix By Painter'S ============================================= Windows XP Adobe XP Support Patch [x86] v0.8 By Painter'S - Beta ============================================= Adobe Acrobat DC ADOBE_ACROBAT_PRO_DC_V2015_MULTI-XFORCE -------------------------------------------------------------------------------------------------------------------- MAC OS X: AMT Emulator v0.8.1 for Mac by PainteR [Support Adobe CC 2017] ============================================= Medicine For Adobe Creative Cloud CC 2014 ADOBE CC v2015 XFORCE-KEYGEN [Windows - Mac OS] + Instruction ============================================= Medicine For Adobe Acrobat DC ADOBE_ACROBAT_PRO_DC_V2015_MULTI_MACOSX-XFORCE ============================================= Importand Topic Replies: Run the Adobe CC Cleaner Tool to resolve some Creative Cloud or Creative Suite installation issues. Creative Cloud Cleaner Tool for Mac ==========================================================================
  4. Users on 64-bit Windows who download Firefox will now get our 64-bit version by default. That means they’ll install a more secure version of Firefox, one that also crashes a whole lot less. How much less? In our tests so far, 64-bit Firefox reduced crashes by 39% on machines with 4GB of RAM or more. 64-bit Firefox has more security and fewer crashes What’s the difference between 32-bit and 64-bit? Here’s the key thing to know: 64-bit applications can access more memory and are less likely to crash than 32-bit applications. Also, with the jump from 32 to 64 bits, a security feature called Address Space Layout Randomization (ASLR) works better to protect you from attackers. macOS and Linux users, fret not. You already enjoy a Firefox that’s optimized for 64-bit. How do you get 64-bit Firefox? If you’re running 64-bit Windows (here’s how to check), you have two options to get your computer hooked up with this improved Firefox experience: You can download Firefox now and reinstall, which will automatically install Firefox 64-bit; or You can wait. We intend to migrate the remaining 64-bit Windows users to a 64-bit version of Firefox with a future release. If you prefer to stay with 32-bit Firefox after the 64-bit migration, you can simply download and re-run the Firefox 32-bit installer from the Firefox platforms and languages download page. Article source
  5. WinRAR 5.50 was released on August 14, 2017. The new version comes with important changes that users of the application need to be aware of. Probably the two biggest changes of WinRAR 5.50 are that the program uses the RAR 5.0 archive format by default when it comes to the creation of archives, and the new master password option to protect saved password records by using encryption. The RAR 5 archive format was introduced in WinRAR 5.0 which the company released back in 2013 to the public. It was not set as the default back in 2013, and users of the program had to change the program's configuration to make it the default. WinRAR 5.50 This changes with the release of WinRAR 5.50. RAR 5 is the default format of WinRAR 5.50 and newer versions of the program. Most third-party programs that can extract archives support the RAR 5.0 format, and this is likely the reason why it has been made the default in WinRAR 5.50. WinRAR users who prefer the RAR4 format, for instance for compatibility reasons, can make it the default format again in the following way: Open WinRAR on the system. Select Options > Settings from the menu. Switch to the Compression tab. Select Create default... Select RAR4 under General to make it the default. You may make ZIP the default as well. WinRAR 5.50 Master Password The second new feature of WinRAR 5.50 is the option to set a master password. Select Options > Settings in WinRAR. Switch to the Compression tab. Select Create default.. Select Set password. Open Organize passwords. Select Set master password when the organize passwords window opens. You are asked to enter and confirm a password. This password protects saved password records from unauthorized access. Passwords stored in the password organizer of WinRAR 5.50 are not readable in older versions because of a new data format that is used. A prompt to set the master password is displayed when you are storing a password in a compression profile. WinRAR 5.50 other changes Here is a short list of other changes that WinRAR 5.50 comes with: Support for the .lz archive format. LZ and ZIPX extensions added to integration list under Settings > Integration. WinRAR uses AES-256 encryption to encrypt ZIP archives. This may cause incompatibility with older unzip software, and if you want to avoid this, you may enable ZIP legacy compression in the password dialog to avoid this. WinRAR supports PAX headers and uses them when extracting TAR archives. High Precision Modification Time option is replaced by High Precision Time Format. Settings > General has a new "full paths in title bar" option. Settings > Compression has a new "file types to open as archives first" option to define what a double-click / Enter-key initiates on non-archive extensions and archive content. File menu has a new "copy full names to clipboard" option. WinRAR context menu has been optimized. WinRAR prompts to re-enter a password if the first entered password to extract an archive is invalid (it exited before). Plenty of bug fixes. You find the full list of changes in WinRAR 5.50 on the official website. There you find downloads for all supported operating systems. Landing Page: http://rarlab.com/ Article source
  6. protonvpn

    Proton VPN 1.0.7 Overview: ProtonVPN is designed from the ground up with a special emphasis on security and privacy, and features a number of innovations that we have made to harden VPN against compromises. ProtonVPN will eventually feature free and premium versions containing different features. For the beta period, you will be able to test the full-fledged premium version of ProtonVPN for free. Layers of Protection: Limitation / blocking access to the data / application Isolation and create a separate database / application Backup / important data Detecting and deleting viruses / malware. Proton Mail earlier announced beta VPN service for PLUS proton mail users. At this moment, Proton VPN offers 14 countries Australia Canada France Germany Hong Kong Iceland Japan Netherlands Singapore - New Spain Sweden Switzerland United Kingdom United States Standard Servers All of our servers are dedicated to ProtonVPN and feature high bandwidth connections Secure Core Servers Secure Core Servers add an additional layer of protection against VPN endpoint compromise. Learn More More Info: Official Product Homepage / Detailed Features: https://protonvpn.com/home Official Website: https://protonvpn.com/ Register/Signup: https://account.protonvpn.com/signup Login: https://account.protonvpn.com/login/ Note for free plan: Pricing: https://protonvpn.com/pricing VPN Servers: https://protonvpn.com/vpn-servers Security: https://protonvpn.com/secure-vpn VPN Threat Model: https://protonvpn.com/blog/threat-model/ Transparency Report: https://protonvpn.com/blog/transparency-report/ About Us: https://protonvpn.com/about Blog: https://protonvpn.com/blog/ We are open for registration. You can follow ProtonVPN on social media to get the latest news and updates: Facebook: https://facebook.com/ProtonVPN Twitter: https://twitter.com/ProtonVPN Reddit: https://www.reddit.com/r/ProtonVPN/ We would love to hear your feedback on the beta and what we can do to improve ProtonVPN. In addition to the links above, you can also send your suggestions to [email protected] If you run into trouble with ProtonVPN, or have questions, you can search for answers or contact us via the ProtonVPN support site: https://protonvpn.com/support/ Screenshots: Downloads: Download: https://protonvpn.com/download/ Windows Client: https://protonvpn.com/download/ProtonVPN_win_v1.0.7.exe Clients for macOS, Linux, Android, and iOS are still under development, but it is still possible to use ProtonVPN with these operating systems using third-party OpenVPN clients. Setup guides can be found here: MacOS: https://protonvpn.com/support/mac-vpn-setup/ Linux: https://protonvpn.com/support/linux-vpn-setup/ Android: https://protonvpn.com/support/android-vpn-setup/ iOS: https://protonvpn.com/support/ios-vpn-setup/ VPN Servers and Country Code for Linux, Mac, Android and iOS: https://protonvpn.com/support/vpn-servers/ More Info - Articles & Reviews: Three years ago we launched ProtonMail. Today, we’re launching ProtonVPN. Encrypted email provider ProtonMail launches free VPN service to counter increasing online censorship ProtonVPN Swiss-Based VPN Launches Keeping ProtonVPN Secure
  7. August has seen a relatively normal number of bugs in Windows and Office patches, some acknowledged by Microsoft, some not. Open Clips One week after Patch Tuesday, and would-be Windows Updaters are facing a handful of bugs. Some will find them minor annoyances. Others … not so much. Here are the known bugs, and where we stand in the struggle to resolve the problems. Worthy of note: Microsoft is now acknowledging many bugs that in the past would’ve gone without comment. There’s hope. Here are the known, significant buggy security patches: Windows 10 Anniversary Update, version 1607 – Cumulative update KB 4034658 wipes out Update History, unhides hidden updates, and effectively disconnects some updated computers from WSUS. Microsoft has acknowledged all three of those bugs in the KB 4034658 article with the usual “Microsoft is investigating this issue and will provide an update as soon as possible.” The first undocumented buggy driver this month for the Surface Pro 4, “Surface - System - 7/21/2017 12:00:00 AM - 1.0.65.1,” was released on August 1. It was replaced by a second driver “Surface – System – 7/31/2007 12:00:00 AM - 1.0.75.1” on August 4. The second one was documented. But then we saw four more undocumented Surface Pro 4 drivers — “Intel driver update for Intel(r) Dynamic Platform and Thermal Framework Generic Participant,” “Power Participant,” Processor Participant” and “Manager” — all released on Saturday, August 12. Sometime late on August 14, Microsoft posted information about two of the drivers. Both the Windows 7 August Monthly rollup KB 4034664 and the manually installed security-only patch KB 4034679 are causing problems with two-screen systems: The second screen starts showing gibberish with many applications, including Office. The problem has been widely reported — even replicated with a Proof of Concept program — but Microsoft hasn’t yet acknowledged it. The only bug reported by Microsoft in its August Windows 7 security patches is an old bug, continuing from July, in which a buggy LDAP plugs up TCP dynamic ports. That bug hasn’t been fixed. The Windows 8.1 Monthly rollup listing mentions a known bug: NPS authentication may break, and wireless clients may fail to connect. The solution is to manually set a registry entry on the server. Dozens of patches were made to Office earlier this month but, so far, I’m not aware of any bugs. Depending on which version of Windows you’re using, and how you’re using it, those bugs may be important or they may be annoyances. I continue to recommend that you hold off on applying this month’s patches. I haven’t seen any malware outbreaks that are blocked by the August patches, and we may get some surprises — good, bad or indifferent — later today. Have a question or a bug report? Drop by the AskWoody Lounge. Source: Where we stand with this month’s Windows and Office security patches (Computerworld - Woody Leonhard)
  8. We've all been there. A friend calls up, saying that they're having a problem with their computer. Every time they open a particular document file, the computer hangs. As the troubleshooter on the other end of the phone, you probably start with the 2 basic questions. Firstly, "what precisely were you doing when the computer hung?". Secondly, "what did the problem actually look like?". The user will, of course, provide 2 perfectly sensible answers. But they will both be wrong. When they listed the steps that they were doing to make the PC crash, they forgot a couple of key actions. And they're almost certainly mis-quoting the error message. Wouldn't it be handy if there was a simple way of recording a user's actions leading up to a problem? As a troubleshooter, you can ask the user to create the recording and send it to you to analyze. As a power user, you can make it easy to file bug reports about other people's software by simply creating a recording and sending it to the relevant company or department. Then there's no way they can deny that the bug really did happen. As you might expect, from the nature of this column, such a tool exists and it's free. What's more, you don't even need to download or install it because it's actually built right into Windows. It's been there since version 7 and it's still there in 10. It's called the Problem Steps Recorder, or PSR. To find it, the easiest option is to type PSR into the search box on your PC. Once it's running, click on the Start Recording button and then carry out some tasks on your PC. When you're done, stop recording, and you can then review the playback. What you get is a scrollable list of actions (such as "user clicked on Save button"), plus a collection of screen shots. You can view the report right away, or save it and send it to someone else. PSR is a really handy tool. I have no idea why Microsoft doesn't publicist it more. Article source
  9. Windows and Office Genuine ISO Verifier is a lightweight piece of software that enables you to determine whether you have a genuine copy of Windows or Office with minimal effort. Since the application comes in a portable package, the setup is a quick matter of decompressing the archive in the desired location on your hard disk. However, in case you are having a hard time accessing the file, then you should consider Unblocking the tool from Properties in the context menu. The strong point of the program stems from the fact that it is designed to recognize a vast array of hashes that are associated with Microsoft's operating system and Office bundle. To be more precise, the utility can compare file SHA-1 to relatively old Microsoft releases, such as Office 95 and Windows XP. Changelog: see Homepage Homepage Download
  10. protonvpn

    Proton VPN 1.0.6 Overview: ProtonVPN is designed from the ground up with a special emphasis on security and privacy, and features a number of innovations that we have made to harden VPN against compromises. ProtonVPN will eventually feature free and premium versions containing different features. For the beta period, you will be able to test the full-fledged premium version of ProtonVPN for free. Layers of Protection: Limitation / blocking access to the data / application Isolation and create a separate database / application Backup / important data Detecting and deleting viruses / malware. Proton Mail earlier announced beta VPN service for PLUS proton mail users. At this moment, Proton VPN offers 14 countries Australia Canada France Germany Hong Kong Iceland Japan Netherlands Singapore - New Spain Sweden Switzerland United Kingdom United States Standard Servers All of our servers are dedicated to ProtonVPN and feature high bandwidth connections Secure Core Servers Secure Core Servers add an additional layer of protection against VPN endpoint compromise. Learn More More Info: Official Product Homepage / Detailed Features: https://protonvpn.com/home Official Website: https://protonvpn.com/ Register/Signup: https://account.protonvpn.com/signup Login: https://account.protonvpn.com/login/ Note for free plan: Pricing: https://protonvpn.com/pricing VPN Servers: https://protonvpn.com/vpn-servers Security: https://protonvpn.com/secure-vpn VPN Threat Model: https://protonvpn.com/blog/threat-model/ Transparency Report: https://protonvpn.com/blog/transparency-report/ About Us: https://protonvpn.com/about Blog: https://protonvpn.com/blog/ We are open for registration. You can follow ProtonVPN on social media to get the latest news and updates: Facebook: https://facebook.com/ProtonVPN Twitter: https://twitter.com/ProtonVPN Reddit: https://www.reddit.com/r/ProtonVPN/ We would love to hear your feedback on the beta and what we can do to improve ProtonVPN. In addition to the links above, you can also send your suggestions to [email protected] If you run into trouble with ProtonVPN, or have questions, you can search for answers or contact us via the ProtonVPN support site: https://protonvpn.com/support/ Screenshots: Downloads: Download: https://protonvpn.com/download/ Windows Client: https://protonvpn.com/download/ProtonVPN_win_v1.0.6.exe Clients for macOS, Linux, Android, and iOS are still under development, but it is still possible to use ProtonVPN with these operating systems using third-party OpenVPN clients. Setup guides can be found here: MacOS: https://protonvpn.com/support/mac-vpn-setup/ Linux: https://protonvpn.com/support/linux-vpn-setup/ Android: https://protonvpn.com/support/android-vpn-setup/ iOS: https://protonvpn.com/support/ios-vpn-setup/ VPN Servers and Country Code for Linux, Mac, Android and iOS: https://protonvpn.com/support/vpn-servers/ More Info - Articles & Reviews: Three years ago we launched ProtonMail. Today, we’re launching ProtonVPN. Encrypted email provider ProtonMail launches free VPN service to counter increasing online censorship ProtonVPN Swiss-Based VPN Launches Keeping ProtonVPN Secure
  11. Microsoft just posted a succinct, accurate description of the new 'Semi-Annual Channel' terminology, but there are a few important loose ends. Thinkstock/Microsoft (Thinkstock) If you haven’t yet read Michael Niehaus’s post on the TechNet blog titled #WaasInANutshell, you should take a couple of minutes and do so. It’s admirably short and pithy, an overview of the terminology that supplants “Current Branch” and “Current Branch for Business.” Unfortunately, life’s a little more complex than that overview. At the risk of waxing when I should be waning, let me tie some pieces together. Start with this screenshot from the Win10 Creators Update 1703 Pro, Settings app, Advanced Settings pane: Woody Leonhard/IDG If you’re running the latest version of Windows 10 Pro or Enterprise, you can choose to delay updating to the next version of Windows (1709? 1710?) until Microsoft declares the new version is ready for business — what we used to know as the Current Branch for Business, generally expected about four months after the new version hits the limelight. Except there is no Current Branch for Business anymore. So how do we, as Windows users, figure out when we’re going to get upgraded to the next version of Windows? It's a rather pressing question because the new version should be out in a couple of months. I can’t find any definitive answer to that question, but if history is any indication, it’ll be announced in a TechNet post. On July 27, in a post titled Windows as a service: Simplified and Aligned, Niehaus said: With each Semi-Annual Channel release, we begin deploying right away to targeted consumer devices and gradually ramp up to full deployment based on the telemetry that we receive. As John Cable discussed on the Windows Experience blog, we recommend that enterprises follow the same approach. Start with targeted deployments to validate that apps, devices and infrastructure used by the organization works well with the new release. When that validation is complete, begin broadly deploying. Windows 10 1703 is ready for that broad deployment. As best as I can tell, that was the formal announcement that Windows 10 Creators Update, version 1703, had reached Current Branch for Business status. For those who had the analogous “Defer feature updates” setting turned on in 1607, that sudden change came as something of a shock. In addition to issuing that announcement of change in status, Microsoft updated its Current versions list by adding a “Microsoft recommends” on the right (screenshot) of the 1703 entry. You’ll notice that all of the other entries are identified as CB, CBB or LTSB. None of those branches exists anymore. Woody Leonhard/IDG Unless Microsoft changes the terminology in that “Choose when updates are installed” dialog in Win10 1703, by the time 1709/1710 rolls around, there’s going to be a discrepancy between what you choose on the screen and what you get on your machine. Again. But all of this will be better in the next version of Windows 10, 1709 or 1710, right? Microsoft will surely have sorted the terminology out by then, to make things consistent between the announcements, the documentation, and the product itself. Right? Well, maybe not. Here’s a screenshot of the latest beta version (build 16257) of the Advanced Options screen. Woody Leonhard/IDG There’s no mention of moving to Current Branch for Business, no indication of how to set your machine to the “Install when Microsoft Recommends” branch. Perhaps we're going to lose that option, even in the Pro edition. Microsoft’s naming changes have confused the living daylights out of everyone. Or at least they’ve confused the living daylights out of me, and I’ve been following the vagaries of updating since Win286. The new, simplified approach would be fine, but there’s no specific name for what was once called CBB, and no way to line up what’s in the Windows interface (1703 or 1709/1710) with what appears in the announcements, or the documentation. I guess we’ll continue to muddle on through. Grumble, grumble. Discussion and consolatory drinks all around on the AskWoody Lounge. Source: Windows as a service in a nutshell, explained (Computerworld - Woody Leonhard)
  12. The Microsoft August 2017 Patch Tuesday security patches include fixes for 48 issues, of which 25 are rated critical, but none is as ominous as CVE-2017-8620. This bug is a vulnerability in the Windows Search service and affects all currently supported versions of Windows. The vulnerability — discovered internally at Microsoft by Nicolas Joly of MSRC Vulnerabilities & Mitigations — allows an attacker to execute code and take over unpatched computers. The issue is quite serious if we consider the ubiquity of the Windows Search service. Below is Microsoft's full explanation regarding CVE-2017-8620: A remote code execution vulnerability exists when Windows Search handles objects in memory. An attacker who successfully exploited this vulnerability could take control of the affected system. An attacker could then install programs; view, change, or delete data; or create new accounts with full user rights. To exploit the vulnerability, the attacker could send specially crafted messages to the Windows Search service. An attacker with access to a target computer could exploit this vulnerability to elevate privileges and take control of the computer. Additionally, in an enterprise scenario, a remote unauthenticated attacker could remotely trigger the vulnerability through an SMB connection and then take control of a target computer. CVE-2017-8620 can be used for self-spreading worms The danger comes from the vulnerability's potential of being used for self-spreading worms. We've all seen what happens when malware coders combine classic malware with worm components (cough WannaCry, cough NotPetya). "That’s pretty close to wormable and just the sort of thing malware writers look for in a bug," says Trend Micro's Zero-Day Initiative team in a review of yesterday's Patch Tuesday fixes. In addition, Symantec claims that "failed attacks [using CVE-2017-8620] will cause denial of service conditions," leading Windows installations to malfunction or shut down. Sysadmins should disable WSearch if they can't patch If there should be a reason for users to apply this month's Patch Tuesday updates, then CVE-2017-8620 should be the one. In cases where system administrators can't update systems due to incompatibilities and other reasons, Microsoft recommends they disable the WSearch service as a workaround, but this will also disable any search functions on those machines. Instructions to disable or re-enable the WSearch service are available here. Article source
  13. No matter what you do in your Windows computer, your activity is bound to leave some or other traces behind whether in the configuration files or in the Windows registry. In fact, the Windows operating system uses a certain set of registry keys known as “shellbags”. These shellbag registry keys are used to hold the information about various folders that you open in the Windows File Explorer, about various items you access in the Windows Control Panel, and the items that you look for using the search function of the File Explorer. These shellbag registry keys can be used to track your user activity in your Windows PC – which folders you accessed, which folders were deleted, whether you used an external USB drive or a network drive and which actions were taken etc. You can find more technical information about the shellbag registry keys at http://www.williballenthin.com/forensics/shellbags/. But if you just want to find out what information your computer’s shellbag registry keys hold then you can use the free Shellbag Analyzer & Cleaner. This same tool can also be used to clean the shellbag entries. This is a portable tool, so you can launch it without having to install anything. Clicking on the Analyze button will find the entries from the registry and list them in the window. You can find the entries belonging to various categories by selecting a category from the drop-down listbox – deleted folders, folders on network/external devices, existing folders, control panel & system, search results and so on. And if you want to clean these items from the registry, you can select the ones that you want to be cleaned and click on the Clean button. Conclusion: Shellbag Analyzer & Cleaner can find and clean the hidden items in the Windows registry that can carry information about your user activity – the folders you opened, the folders you have deleted, network drives, removable drives and so on. Download Shellbag Analyzer & Cleaner Article source
  14. Overview Microsoft Windows automatically executes code specified in shortcut (LNK) files. Description Microsoft Windows supports the use of shortcut or LNK files. A LNK file is a reference to a local file. Clicking on a LNK or file has essentially the same outcome as clicking on the file that is specified as the shortcut target. For example, clicking a shortcut to calc.exe will launch calc.exe, and clicking a shortcut to readme.txt will open readme.txt with the associated application for handling text files. Microsoft Windows fails to safely obtain icons for shortcut files. When Windows displays Control Panel items, it will initialize each object for the purpose of providing dynamic icon functionality. This means that a Control Panel applet will execute code when the icon is displayed in Windows. Through use of a shortcut file, an attacker can specify a malicious DLL that is to be processed within the context of the Windows Control Panel, which will result in arbitrary code execution. The specified code may reside on a USB drive, local or remote filesystem, a CD-ROM, or other locations. Viewing the location of a shortcut file with Windows Explorer is sufficient to trigger the vulnerability. Other applications that display file icons can be used as an attack vector for this vulnerability as well. The origin of this vulnerability is outlined in VU#940193 (CVE-2010-2568). The fix for CVE-2010-2568 and the subsequent fix for CVE-2016-0096 are both insufficient in that they not take into account LNK files that use the SpecialFolderDataBlock or KnownFolderDataBlock attributes to specify the location of a folder. Such files are able to bypass the whitelisting first implemented in the fix for CVE-2010-2568. Exploit code for this vulnerability is publicly available. Impact By convincing a user to display a specially-crafted shortcut file, an attacker may be able to execute arbitrary code with the privileges of the user. Depending on the operating system and AutoRun/AutoPlay configuration, this can happen automatically by connecting a USB device. Solution Apply an update This issue is addressed in the Microsoft Update for CVE-2017-8464. Block outgoing SMB traffic Block outgoing connections on ports 139/tcp, 139/udp, 445/tcp, and 445/udp at your network perimeter. Doing so will help prevent machines on the local network from connecting to SMB servers on the internet. While this does not remove the vulnerability, it does block an attack vector for this and other vulnerabilities. Disable WebDAV Even if outgoing SMB traffic is disabled, Windows clients can still connect to network shares using the WebDAV protocol, which uses HTTP as a transport. WebDAV can be disabled at various layers, depending on the requirements of your organization: At the client To disable WebDAV on a Windows client, set the Startup type property for the WebClient service to Disabled. Note that this may interfere with the ability to access features that utilize WebDAV, such as some aspects of Microsoft SharePoint. On the network WebDAV can be blocked at the network level by blocking the methods used by the WebDAV extension to HTTP. See Blocking WebDAV methods for an example of how to accomplish this. Check with your firewall vendor for more details. Article source
  15. !!!LOOK OUT!!! If you like MS Windows and MS Office please buy legal and original copy. This tools can be used for evaluation purposes ONLY. I recommend to buy a legal copy of the product. I will not encourage piracy and misuse of it. Some techniques used can make your antivirus alert. [Reboot] Ra1n Act1vat0r v1.0 RC 8 * Requirements .NET 4.0. - Install Windows OEM Logos; - Activate Windows XP/Vista/7/8.x/10/Server 2008 (R2)/Server 2012 (R2)/Server 2016 RTM; - Activate Office 2010/2013/2016; - Activate Visual Studio 2012/2013/2015/2017; * Before post a question, please read the FAQ. OEMLogo Pack 121 [09/03/2015]: Site: http://pastebin.com Sharecode[?]: /raw.php?i=rSP5spZg Ra1n Act1vat0r v1.0 RC 8 [16/07/2017]: Site: http://www.mirrorcreator.com Sharecode[?]: /files/DLGIC66U/ Virus Total Scan [04/07/2017]: Site: https://www.virustotal.com Sharecode[?]: /file/3db4e947cd2e50f9631a85e977c862b160384ae337eb2fa9fa622d3b0809183d/analysis/1499190243/ *The interface of this program is available at: English (tnx to azroach). on Twitter: @Ra1nReLoader: Be good it is for fun. PLEASE REPORT ANY BUGS I'm back on Twitter with the account @Ra1nReLoader This is my original account! other accounts are fake! be careful!
  16. 'SlowLoris' vuln could see a mouse of a machine take down an elephant of a server Updated A Windows SMB vulnerability revealed late last week at DEF CON won't be patched because Microsoft says the service should be firewalled off from the internet anyway. The 20-year-old Windows bug was discovered by RiskSense bods, who combed Redmond's file server code for flaws similar to the ones exploited by the NSA's leaked EternalBlue tool. After the talk was given, infosec researcher Jenna Magius described the SMB cockup in detail on Twitter: it's essentially a remote denial-of-service. Bear in mind it only works from afar if the target machine has SMB exposed to the internet, and for that reason, Microsoft doesn't see it as demanding an immediate patch. The security weakness, dubbed SMBLoris, is a memory-handling bug: it can be exploited to force a vulnerable server on the internet or local network to allocate 128KiB of non-paged physical memory, which can't be swapped out, for every connection to the service. You do this by sending three bytes to the SMB service with the 17-bit NBSS length field set to the max. The kernel keeps the connection open for 30 seconds and then gives up. So for 30 seconds, 128KiB of memory is tied up for every connection attempted. You then fire off a connection request for every TCP port possible – up to 65,535 – and thus potentially chew through up to 8GiB of non-paged RAM for half a minute. This will hamper the performance of the machine as the kernel is forced to scour the system for any free memory as more allocations arrive. If a miscreant launches this attack on IPv4 and IPv6, that memory burden rises to 16GiB, and if an attack comes from just two IPs, they can fill 32GiB, and so on. Eventually, the target can't allocate memory, and needs a manual reboot if it becomes unresponsive. The name SMBLoris is a reference to the 2009 Slowloris bug. In response to Microsoft saying it didn't intend to issue a security fix for the problem, Dillon said: “The reason they say it’s a moderate issue is because it does require opening many connections to the server, but you could do it all from a single machine, and a Raspberry Pi could take down the beefiest server”. ® Updated to add According to Microsoft's SMB supremo Ned Pyle, SMBLoris affects all versions of SMB – not v1 as first thought – because it all happens so early on in the connection. Best thing to do is firewall off ports 445 and 139 from the public, and rate limit access to the service locally if you're paranoid about internal attacks. Article source
  17. There are some things you can only do from the command line—even in Windows. Some of these tools don’t have graphical equivalents, while others are just plain faster to use than their graphical interfaces. If you’re into using PowerShell over Command Prompt, you should note that all the commands we’re covering in this article work just the same in either tool. And obviously, we can’t possibly cover all the useful commands that these tools offer. Instead, we’ll be focusing on commands that should be useful even if you’re not a command-line person. ipconfig: Quickly Find Your IP Address You can find your IP address from the Control Panel, but it takes a few clicks to get there. The ipconfig command is a fast way of determining your computer’s IP address and other information, such as the address of its default gateway—useful if you want to know the IP address of your router’s web interface. To use the command, just type ipconfig at the Command Prompt. You’ll see a list of all the network connections your computer is using. Look under “Wireless LAN adapter” if you’re connected to Wi-Fi or “Ethernet adapter” if you’re connected to a wired network. For even more details, you can use the ipconfig /all command. ipconfig /flushdns: Flush Your DNS Resolver Cache If you change your DNS server, the effects won’t necessarily take place immediately. Windows uses a cache that remembers DNS responses it’s received, saving time when you access the same addresses again in the future. To ensure Windows is getting addresses from the new DNS servers instead of using old, cached entries, run the ipconfig /flushdns command after changing your DNS server. ping and tracert: Troubleshoot Network Connection Issues If you’re experiencing issues connecting to a website or other network connection issues, Windows and other operating systems have some standard tools you can use to identify problems. First, there’s the ping command. Type ping howtogeek.com (or whatever Internet server you want to test) and Windows will send packets to that address. You can use either a name or the actual IP address. The server at that IP address (in our case, the How-To Geek server) will respond and let you know it’s received them. You’ll be able to see if any packets didn’t make it to the destination—perhaps you’re experiencing packet loss—and how long it took to get the response—perhaps the network is saturated and packets are taking a while to reach their destinations. The tracert command traces the route it takes for a packet to reach a destination and shows you information about each hop along that route. For example, if you run tracert howtogeek.com, you’ll see information about each node the packet interacts with on its way to reach our server. If you’re having issues connecting to a website, tracert can show you where the problem is occurring. For more information about using these commands—and other great tools for figuring out why your network or Internet connection is giving you problems—check out our introduction to troubleshooting Internet connection problems. shutdown: Create Shutdown Shortcuts for Windows The shutdown command lets you shut down or restart Windows. Admittedly, it was more useful in Windows 8 (where the shut down button was harder to access), but still handy no matter what version of Windows you use. You can use the command to create your own shortcuts and place them on your Start menu, desktop, or even taskbar. In Windows 8 and 10, you can even use a special switch to restart your computer into the advanced startup options menu. To use the command at the Command Prompt or when creating a shortcut, just type one of the following: shutdown /s /t 0: Performs a regular shut down. shutdown /r /t 0: Restart the computer. shutdown /r /o: Restarts the computer into advanced options. sfc /scannow: Scan System Files for Problems Windows includes a system file checker tool that scans all the Windows system files and looks for problems. If system files are missing or corrupted, the system file checker will repair them. This may fix problems with some Windows systems. To use this tool, open a Command Prompt window as Administrator and run the sfc /scannow command. telnet: Connect to Telnet Servers The telnet client isn’t installed by default. Instead, it’s one of the optional Windows features that you can install through the Control Panel. Once installed, you can use the telnet command to connect to telnet servers without installing any third-party software. You should avoid using telnet if you can help it, but if you’re connected directly to a device and it requires that you use telnet to set something up—well, that’s what you have to do. cipher: Permanently Delete and Overwrite a Directory The cipher command is mostly used for managing encryption, but it also has an option that will write garbage data to a drive, clearing its free space and ensuring no deleted file can be recovered. Deleted files normally stick around on disk unless you’re using a solid state drive. The cipher command effectively allows you to “wipe” a drive without installing any third-party tools. To use the command, specify the drive you want to wipe like so: cipher /w:C:\ Notice that there is no space between the switch ( /w: ) and the drive ( C:\ ) netstat -an: List Network Connections and Ports The netstat command is particularly useful, displaying all sorts of network statistics when used with its various options. One of the most interesting variants of netstat is netstat -an , which will display a list of all open network connections on their computer, along with the port they’re using and the foreign IP address they’re connected to. nslookup: Find the IP Address Associated With a Domain When you type a domain name (say, into a browser address bar), your computer looks up the IP address associated with that domain name. You can use the nslookup command to find that information out for yourself. For example, you could type nslookup howtogeek.com at the Command Prompt to quickly find out our server’s assigned IP address. You can also perform a reverse lookup by typing an IP address to find out the associated domain name. This isn’t a comprehensive list of all the commands you might find useful, but we hope it’s given you some idea of the many powerful tools lurking under the surface. Article source
  18. Media Player Classic Home Cinema, or short MPC-HC, is a popular open source media player for Microsoft Windows devices. The program is available as a 32-bit and 64-bit version for Windows, and may be installed or run as a portable program. MPC-HC is a fork of the Media Player Classic application for Windows. The player interface looks similar to that of Windows Media Player 6.4, a legacy version of the built-in media player for Windows, but similarities between the two programs end there. You can read out initial review of Media Player Classic Home Cinema that we published in 2008 here. Media Player Classic Home Cinema is a full blown media player. It plays virtually any media format out of the box, but lacks some of the advanced features that popular media players such as VLC offer. Is this the last version of MPC-HC? The developer of Media Player Classic Home Cinema released a new version of the player yesterday. MPC-HC version 1.7.13 introduces new features and changes to the program. The program requires a CPU with SSE2 support for instance now, and several of the libraries and filters were updated. The announcement on the official website of the project suggests that it may be very well the end of it. The main reason for that is that development contributions have reached a new low, as the developer count has reached zero. While the project maintainer has hope that developers will reach out to him to continue development of Media Player Classic Home Cinema, it seems that the project will be abandoned if that does not happen. This, unfortunately, means that the project is officially dead and this release would be the last one. …Unless some people step up that is. So, if someone’s willing to really contribute and has C/C++ experience, let me know on IRC or via e-mail. Otherwise, all things come to an end and life goes on. It’s been a nice journey and I’m personally pretty overwhelmed having to write this post. Please note that the decision won't affect the second high profile fork of Media Player Classic, Media Player Classic Black Edition. Closing Words It is always disappointing from the point of view of a user if a popular highly respected application is abandoned. While there is still hope that new developer blood will revive the project, it seems very likely at this point in time that MPC-HC is dead. (via Deskmodder) Article source
  19. protonvpn

    Proton VPN 1.0.5 Overview: ProtonVPN is designed from the ground up with a special emphasis on security and privacy, and features a number of innovations that we have made to harden VPN against compromises. ProtonVPN will eventually feature free and premium versions containing different features. For the beta period, you will be able to test the full-fledged premium version of ProtonVPN for free. Layers of Protection: Limitation / blocking access to the data / application Isolation and create a separate database / application Backup / important data Detecting and deleting viruses / malware. Proton Mail earlier announced beta VPN service for PLUS proton mail users. At this moment, Proton VPN offers 14 countries Australia Canada France Germany Hong Kong Iceland Japan Netherlands Singapore - New Spain Sweden Switzerland United Kingdom United States Standard Servers All of our servers are dedicated to ProtonVPN and feature high bandwidth connections Secure Core Servers Secure Core Servers add an additional layer of protection against VPN endpoint compromise. Learn More More Info: Official Product Homepage / Detailed Features: https://protonvpn.com/home Official Website: https://protonvpn.com/ Register/Signup: https://account.protonvpn.com/signup Login: https://account.protonvpn.com/login/ Note for free plan: Pricing: https://protonvpn.com/pricing VPN Servers: https://protonvpn.com/vpn-servers Security: https://protonvpn.com/secure-vpn VPN Threat Model: https://protonvpn.com/blog/threat-model/ Transparency Report: https://protonvpn.com/blog/transparency-report/ About Us: https://protonvpn.com/about Blog: https://protonvpn.com/blog/ We are open for registration. You can follow ProtonVPN on social media to get the latest news and updates: Facebook: https://facebook.com/ProtonVPN Twitter: https://twitter.com/ProtonVPN Reddit: https://www.reddit.com/r/ProtonVPN/ We would love to hear your feedback on the beta and what we can do to improve ProtonVPN. In addition to the links above, you can also send your suggestions to [email protected] If you run into trouble with ProtonVPN, or have questions, you can search for answers or contact us via the ProtonVPN support site: https://protonvpn.com/support/ Screenshots: Downloads: Download: https://protonvpn.com/download/ Windows Client: https://protonvpn.com/download/ProtonVPN_win_v1.0.5.exe Clients for macOS, Linux, Android, and iOS are still under development, but it is still possible to use ProtonVPN with these operating systems using third-party OpenVPN clients. Setup guides can be found here: MacOS: https://protonvpn.com/support/mac-vpn-setup/ Linux: https://protonvpn.com/support/linux-vpn-setup/ Android: https://protonvpn.com/support/android-vpn-setup/ iOS: https://protonvpn.com/support/ios-vpn-setup/ VPN Servers and Country Code for Linux, Mac, Android and iOS: https://protonvpn.com/support/vpn-servers/ More Info - Articles & Reviews: Three years ago we launched ProtonMail. Today, we’re launching ProtonVPN. Encrypted email provider ProtonMail launches free VPN service to counter increasing online censorship ProtonVPN Swiss-Based VPN Launches Keeping ProtonVPN Secure
  20. Microsoft Paint has been in the news since yesterday when Redmond announced that the software is being deprecated with the upcoming Windows 10 Fall Creators Update. News publications all around the world didn’t report the news accurately, claiming that Microsoft is “killing” Paint in Windows 10. But that’s not the case at all. In a statement to MSPoweruser, Microsoft has confirmed that the company is not killing Microsoft Paint. The image you see above was shared by a Microsoft spokesperson earlier on Monday. Rather than completely killing Microsoft Paint, Redmond is instead going to bring Microsoft Paint to the Windows Store, allowing fans of the classic Paint app to install the app whenever they want. In fact, Microsoft is also going to build some of the features of the classic Paint app into the new Paint 3D app in the meantime, too. “MS Paint is not going away. In addition to the new 3D capabilities, many of the MS Paint features people know and love like photo editing and 2D creation are in Paint 3D – the new app for creativity, available for free with the Windows 10 Creators update. In the future, we will offer MS Paint in the Windows Store also for free and continue to provide new updates and experiences to Paint 3D so people have the best creative tools all in one place.” Microsoft didn’t provide us with a date for the release of Microsoft Paint on the Windows Store, but we’d imagine it’s not too far away and will likely make an appearance shortly after the release of the Windows 10 Fall Creators Update later this September/October. Article source blogs.windows.com: MS Paint is here to stay
  21. WikiLeaks has released new documents in their Vault 7 series of leaks exposing the CIA’s hacking tools. The new documents cover tools that the CIA uses to hack the Secure Shell (SSH) cryptographic protocol. SSH allows users to securely access other computers remotely over an unsecured network. Two exploits that allow the CIA to capture and exfiltrate SSH credentials are covered in the new release by WikiLeaks. These SSH exploits target SSH users who are running Windows or Linux operating systems. The two SSH hacks are known as BothanSpy and Gyrfalcon. BothanSpy is used by the CIA to steal the usernames and passwords for all active SSH sessions of Windows users who are using Xshell. It “officially” supports Xshell Version 3, build 0288, Version 4, build 0127, Version 5, build 0497, and Version 5, build 0537. The documentation for BothanSpy states that it is risky to use the implant against certain versions of Xshell, and that it does not conduct a version check. If public key authentication is utilized, BothanSpy will intercept and exfiltrate the filename of the private SSH key and the key password. Xshell is a proprietary SSH and Telnet client, and also functions as a terminal emulator. It is produced by NetSarang Computer, Inc. and was first released in 2002. The BothanSpy implant is installed as an extension for Shellterm 3. The stolen data can be sent to a server that is controlled by the CIA, thereby avoiding saving any data onto the victim’s hard drive. Stolen data can also be stored on a victim’s computer in an encrypted file, and be exfiltrated at a later date by other means. Previously, WikiLeaks published documents which exposed the CIA’s ability to gain remote access to computers running Windows by using the Athena and Hera malware. The CIA had worked with a private corporation known as Siege Technologies to develop the Athena and Hera malware for Windows operating systems. In late June, WikiLeaks published documents on the CIA’s ELSA program. ELSA is malware which impacts Windows users who are using WiFi and enables the CIA to track someone using geo-location by monitoring ESS identifiers, WiFi signal strength, and MAC addresses. Gyrfalcon is an implant that consists of two binaries that allow the CIA to hack OpenSSH on Linux operating systems. It is unclear if Gyrfalcon impacts all Linux operating systems, but the documentation for the implant states that it can target users of Ubuntu, Debian, CentOS, Suse, and Red Hat. It allows the CIA to intercept and exfiltrate usernames and passwords of active SSH sessions. The implant also has the ability to intercept some or all of the traffic from an OpenSSH session. The data that is collected is then compressed and stored in an encrypted file on the victim’s computer and exfiltrated at a later time. Gyrfalcon is installed using the CIA’s JQC/KitV rootkit, and effects both 32bit and 64bit versions of Linux. In late June WikiLeaks released documents on the CIA’s OutlawCountry program which targets Linux operating systems. OutlawCountry enables the CIA to redirect the entire outbound traffic of a victim’s computer. It allows the CIA to both exfiltrate and infiltrate data onto a victim’s computer. OutlawCountry uses a kernel module that the CIA can install through shell access on the victim’s computer. The CIA malware then installs a hidden Netfilter table. The hidden Netfilter table allows rules to be made using the iptables command. These rules will supersede any pre existing rules on the victim’s computer and administrator can only discover it if they know the table name. OutlawCountry creates an obscure table name. The CIA relies on other exploits and backdoors to infect victims with OutlawCountry. Version 1.0 of OutlawCountry is limited to infecting only certain Linux kernel modules such as the 64bit versions of CentOS and Red Hat 6. The new documents detailing BothanSpy and Gyrfalcon marks the 15th release in the Vault 7 series of CIA leaks. WikiLeaks began publishing its Vault 7 series of CIA documents in March. They have been regularly releasing new documents every few weeks. More CIA leaks are expected to be published. Article source
  22. Microsoft has made available Project Springfield as an Azure service preview called Microsoft Security Risk Detection (MSRD) for detecting code bugs and security vulnerabilities in Windows and Linux applications. While MSRD is advertised as a finder of security holes in code, it can be used to discover bugs too. It uses artificial intelligence to root out the causes of program crashes that might point to a security issue or a bug in the code. Microsoft has been using a part of the service on Windows, Office and other software since mid 2000s. The tool is also used by the Microsoft Security Development Lifecycle process which recommends testing at least those surface attacks that expose a data parser to untrusted data. Customers willing to run MSRD on their software are offered a VM where they upload the binaries of the application to be tested and input data seed files. MSRD uses white-box fuzzing based on the data seed files provided to test the program, and reports the possible vulnerabilities found, offering information to developers to reproduce the problem. (More information on Fuzzing Basics can be found on this documentation page.) MSRD can be used to fuzz the code of websites but with some limitations, not being able to discover cross-site scripting or request forgery vulnerabilities. Also, it can be used for managed code and Azure applications, but in the latter case the service won’t be able to access other Azure services as it usually happens with cloud applications. Applications running on Windows Server 2008 R2 and Red Hat Linux are currently supported, with Linux under preview. Microsoft is also working on adding support for Windows 10 and Windows Server 2016. Microsoft intends to offer the Security Risk Detection tool through Microsoft Services later this fall. Article source
  23. protonvpn

    Proton VPN 1.0.4 Overview: ProtonVPN is designed from the ground up with a special emphasis on security and privacy, and features a number of innovations that we have made to harden VPN against compromises. ProtonVPN will eventually feature free and premium versions containing different features. For the beta period, you will be able to test the full-fledged premium version of ProtonVPN for free. Layers of Protection: Limitation / blocking access to the data / application Isolation and create a separate database / application Backup / important data Detecting and deleting viruses / malware. Proton Mail earlier announced beta VPN service for PLUS proton mail users. At this moment, Proton VPN offers 14 countries Australia Canada France Germany Hong Kong Iceland Japan Netherlands Singapore - New Spain Sweden Switzerland United Kingdom United States Standard Servers All of our servers are dedicated to ProtonVPN and feature high bandwidth connections Secure Core Servers Secure Core Servers add an additional layer of protection against VPN endpoint compromise. Learn More More Info: Official Product Homepage / Detailed Features: https://protonvpn.com/home Official Website: https://protonvpn.com/ Register/Signup: https://account.protonvpn.com/signup Login: https://account.protonvpn.com/login/ Pricing: https://protonvpn.com/pricing VPN Servers: https://protonvpn.com/vpn-servers Security: https://protonvpn.com/secure-vpn VPN Threat Model: https://protonvpn.com/blog/threat-model/ Transparency Report: https://protonvpn.com/blog/transparency-report/ About Us: https://protonvpn.com/about Blog: https://protonvpn.com/blog/ We are open for registration. You can follow ProtonVPN on social media to get the latest news and updates: Facebook: https://facebook.com/ProtonVPN Twitter: https://twitter.com/ProtonVPN Reddit: https://www.reddit.com/r/ProtonVPN/ We would love to hear your feedback on the beta and what we can do to improve ProtonVPN. In addition to the links above, you can also send your suggestions to [email protected] If you run into trouble with ProtonVPN, or have questions, you can search for answers or contact us via the ProtonVPN support site: https://protonvpn.com/support/ Screenshots: Downloads: Download: https://protonvpn.com/download/ Windows Client: https://protonvpn.com/download/ProtonVPN_win_v1.0.4.exe Clients for macOS, Linux, Android, and iOS are still under development, but it is still possible to use ProtonVPN with these operating systems using third-party OpenVPN clients. Setup guides can be found here: MacOS: https://protonvpn.com/support/mac-vpn-setup/ Linux: https://protonvpn.com/support/linux-vpn-setup/ Android: https://protonvpn.com/support/android-vpn-setup/ iOS: https://protonvpn.com/support/ios-vpn-setup/ VPN Servers and Country Code for Linux, Mac, Android and iOS: https://protonvpn.com/support/vpn-servers/ More Info - Articles & Reviews: Three years ago we launched ProtonMail. Today, we’re launching ProtonVPN. Encrypted email provider ProtonMail launches free VPN service to counter increasing online censorship ProtonVPN Swiss-Based VPN Launches
  24. After a series of pushed-then-pulled buggy fixes to the admittedly buggy Microsoft Outlook patches on June 13, we’re still waiting for updated versions Credit: wonderferret On June 13—five and a half weeks ago—Microsoft released a series of buggy patches for Outlook. We know they’re buggy because Microsoft acknowledged seven bugs (including one primarily caused by bugs in Windows patches) in those four original June 13 security patches. As of this morning, we still don’t have fixes for those seven bugs. Here are the known buggy original security patches: KB 3191898 – Security update for Outlook 2007, released June 13, 2017 KB 3203467 – Security update for Outlook 2010, released June 13 KB 3191938 – Security update for Outlook 2013, June 13 KB 3191932 – Security update for Outlook 2016, June 13 If you have Automatic Update turned on, you were treated not only to those patches, but to all of these three later, interim fixes for the bugs in the security patches. Don't get too excited about them. In fact, they didn't fix the bugs: KB 4011042 – Yet another update for Outlook 2010, released July 5, pulled July 15 KB 3191849 - Another update for Outlook 2013, released June 27, pulled July 15 KB 3213654 - Another update for Outlook 2016, released June 30, pulled July 15 Those KB numbers don’t line up with the originally buggy security patch numbers because Microsoft didn’t re-release the bad patches. These new interim patches aren’t cumulative. In other words, in order to get Outlook 2016 patched, for example, you had to install the June 13 patch, then install the June 30 patch. Except, well, the June 30 patch didn’t fix the problems created by the June 13 patch. Got that? Lots of Outlook users and admins have been waiting for new fixes ever since Microsoft pulled the three interim patches on July 15. (Outlook 2007 never received an interim patch.) If Microsoft’s told anyone why they pulled those interim patches, I haven’t heard about it. I haven’t seen any instructions about removing the interim patches. We’re all left sitting in limbo. On Monday, Microsoft sent its largest customers a secret email saying they would release new patches on Tuesday. The new security updates scheduled for release are intended to address currently unresolved functional issues affecting Outlook. But Tuesday came and went, and there weren’t any new patches—re-issues, interim, cumulative or otherwise. One of the “fixes” to the Outlook bugs proposed by Microsoft relies on patches to Windows itself, and those patches are going through a mind-numbing series of flip-slops. Anybody who used Automatic Update this past month has seen their systems flop around like a beached bluegill. Ball’s in your court, again, Microsoft. Discussion continues on the AskWoody Lounge. Source: Where are the fixes to the botched Outlook security patches? (Computerworld - Woody Leonhard)