Jump to content

Search the Community

Showing results for tags 'block'.



More search options

  • Search By Tags

    Type tags separated by commas.
  • Search By Author

Content Type


Forums

  • Site Related
    • News & Updates
    • Site / Forum Feedback
    • Member Introduction
  • News
    • General News
    • FileSharing News
    • Mobile News
    • Software News
    • Security & Privacy News
    • Technology News
  • Downloads
    • nsane.down
  • General Discussions & Support
    • Filesharing Chat
    • Security & Privacy Center
    • Software Chat
    • Mobile Mania
    • Technology Talk
    • Entertainment Exchange
    • Guides & Tutorials
  • Off-Topic Chat
    • The Chat Bar
    • Jokes & Funny Stuff
    • Polling Station

Find results in...

Find results that contain...


Date Created

  • Start

    End


Last Updated

  • Start

    End


Filter by number of...

Found 44 results

  1. Users and clients of Instapaper, Unroll.me and Ragnarok Online among those affected The General Data Protection Regulation comes into force on Friday With less than a day until the General Data Protection Regulation (GDPR) comes into effect, a growing number of companies are taking the nuclear option to ensure compliance: blocking all European users from their servers. Instapaper, a read-later service owned by the US firm Pinterest, became the latest to disconnect European customers on Thursday. It said the cutoff was temporary while it made the required changes, and told users: “We apologise for any inconvenience, and we intend to restore access as soon as possible.” Pinterest did not respond to a request for comment. Other companies have taken a more permanent approach. Unroll.me, an inbox management firm, announced it was withdrawing services for EU companies due to an inability to offer its product – which is monetised by selling insights gleaned from reading users’ emails – in a way that was compatible with EU law. “We are truly sorry that we are unable to offer our service to you,” the company told EU users. Some online games, including Ragnarok Online, have switched off their EU servers. Other firms have not gone so far as to blame the new regulation but have closed EU operations with convenient timing. Crowdpac, a political fundraising organisation set up by David Cameron’s former “guru” Steve Hilton, announced it was closing its UK wing “for business reasons” until further notice. The company, which was still raising funds in the UK as recently as Sunday, now says it “hopes one day to be back”. Some see the law as a moneymaking opportunity. One service, GDPR Shield, offers to block EU users from companies’ sites. Its website says it can save companies that are not targeting EU users thousands in legal fees. “If you don’t have an in-house legal team, complying with the law requires you to consult with a lawyer specialising in data protection law,” GDPR Shield tells potential customers. “In addition, you’re at risk of vindictive reporting from no-win-no-fee legal firms.” Klout, a social media analytics service, and Super Monday Night Combat, an online game, will shut down on Friday. Lithium, the owner of Klout, said: “Klout no longer made sense as a standalone service. The upcoming deadline for GDPR implementation simply expedited our plans to sunset Klout.” Brian Honan, a data protection expert, said he did not view the shutdowns as a consequence of the new law. “The GDPR’s primary goal is to enhance the protections around the gathering and processing of the personal data belonging to individuals residing within the European Union,” he said. “Companies have had well over two years to prepare for the enforcement date and to be ready. “Organisations outside of the EU who target and process personal data belonging to individuals resident in the EU are also required to comply with the GDPR. Organisations outside of the EU that are blocking access or refusing to provide their services to people within the EU are demonstrating how little regard they have paid to protecting the privacy and the personal data of their users, and it could also be argued are commercially being naive by deciding to ignore one of the largest consumer markets in the world.” Source
  2. Someone high up in Indian politics with something to hide? The Indian government has blocked the Internet Archive in the country - without prior warning or explanation. Users in Delhi and Bangalore, particularly those using the Airtel ISP, are being greeted by the following message when attempting to access the Wayback Machine: "Your requested URL has been blocked as per the directions received from the Department of Telecommunications, Government of India. Please contact administrator for more information." Unfortunately, no one at the ISP seems to know either, or if they do, they aren't telling. For the uninitiated, the Wayback Machine has been taking snapshots of the internet for the past two decades and more, and can, therefore, show previous versions of web pages, of news stories and even revive the last known configuration of a web page long since offline. In total it is estimated it allows users to access 302 billion cached web pages. In the past, India has been responsible for blocking sites including Github and Wordpress (as well as the predictable stuff like porn sites). More recently it blocked video sites such as Vimeo and Daily Motion for ‘failing to control' access to what it described as "Jihadi propaganda". Some experts have speculated that the ban is because the Internet Archive allows citizens to access documents, since removed, from the Aadhaar citizen ID program (sort of like an NI number in the UK) managed by the Unique Identification Authority of India, and heavily criticised for being light on security and heavy on data leaking. "Obviously, we are disappointed and concerned by this situation and are very eager to understand why it's happening and see full access restored," Internet Archive office manager Chris Butler told Medianama. The Internet Archive has said it has had no contact with the Indian government and has had no response to its own enquiries. Inevitably, at some point, the government is either going to have to explain or lift the block. Article source
  3. An entire generation of PCs, most only three or four years old, are now unable to receive new feature updates to Windows 10. If Microsoft doesn't deliver a patch within the next six to nine months, those PCs could be cut off from security fixes. Some PCs that received a free upgrade to Windows 10 less than two years ago are now officially blocked from receiving future updates. If you are one of the unlucky owners of one of the first 2-in-1 PCs, announced in 2012 and sold throughout 2013 and 2014, your PC was eligible for the free Windows 10 upgrade in mid-2015, and it also received the Summer 2016 Anniversary Update (version 1607) without any compatibility issues. But when Windows Update tries to install the March 2017 Creators Update, version 1703, the installation fails with a dire (and confusing) message that reads: Windows 10 is no longer supported on this PC Uninstall this app now because it isn't compatible with Windows 10. Don't be fooled by that message. There's no app to uninstall. This problem occurs because of a fundamental incompatibility between the PC hardware and the latest release of Windows 10. I've received multiple reports of this problem, which affects devices built around Intel's Atom Clover Trail series CPUs. Those chips first appeared in entry-level Windows 8 PCs, especially 2-in-1 devices, between four and five years ago. I was able to confirm that this hard block exists by attempting to install the Creators Update on an HP Envy X2, which uses a Clover Trail CPU, the Atom Z2760. HP shipped me the device in early 2015 and I've used it in lab tests as a benchmark for low-spec CPUs. The compatibility check that's part of the Windows Setup program gave this system a clean bill of health, but after downloading more than 3GB of setup files for the Creators Update, the upgrade failed, with the error message shown above. There's no easy way to work around the block, either. Unless and until the underlying compatibility issue is fixed, this device is stuck on Windows 10, version 1607. And that's a big problem for owners of those devices. In the "Windows as a Service" model, Microsoft's servicing policy says, "Each Windows 10 feature update will be serviced with quality updates [security and reliability fixes] for 18 months from the date of the feature update release." If Microsoft sticks to its announced support deadlines, any device running Windows 10 version 1607 will stop receiving updates in early 2018. In some cases, this cutoff date will be only three years after those devices were placed in service. A search of Microsoft's website doesn't turn up any support documents that explain this serious compatibility issue. I did find confirmation from Acer, which published this support note: "Intel Clover Trail processors are not currently supported in Windows 10 Creators Update." The following Intel Clover Trail processors are currently not supported on Windows 10 Creators Update: * Atom Z2760 * Atom Z2520 * Atom Z2560 * Atom Z2580 Microsoft is working with us to help provide compatible drivers to address this incompatibility. If you install the Windows 10 creators update, icons and text may not appear at all, or may show up as solid color blocks or bars. If you have already installed Creators Update and are experiencing problems, you can use Windows 10 recovery options to restore your system to the previous build. That note is echoed in a reply in this thread on the TechNet Windows 10 IT Pro support forums. That thread was marked as an official answer by forum moderators, including one identified as "Microsoft contingent staff." When you try to upgrade a Clover Trail-based PC to the Creators Update, Setup returns the error code 0xC1900209, which means "the system does not pass the compatibility scan to install the update ... Incompatible software is blocking the upgrade process." The entire affair brings back memories of a confusing announcement in the months before the launch of Windows 10. In January 2015, Windows boss Terry Myerson announced the new "Windows as a service" plan using this language. I've highlighted the head-scratching caveat that was included: This is more than a one-time upgrade: once a Windows device is upgraded to Windows 10, we will continue to keep it current for the supported lifetime of the device - at no additional charge. [emphasis added] That odd phrase confused a lot of people and launched more than a few conspiracy theories. In July 2015, two weeks before the official Windows 10 launch date, Microsoft committed to a 10-year support lifecycle for Windows 10 and clarified the "supported lifetime of the device" policy with this footnote. Here, too, I've highlighted the relevant portion: ** Updates are cumulative, with each update built upon all of the updates that preceded it. A device needs to install the latest update to remain supported. Updates may include new features, fixes (security and/or non-security), or a combination of both. Not all features in an update will work on all devices. A device may not be able to receive updates if the device hardware is incompatible, lacking current drivers, or otherwise outside of the Original Equipment Manufacturer's ("OEM") support period. Update availability may vary, for example by country, region, network connectivity, mobile operator (e.g., for cellular-capable devices), or hardware capabilities (including, e.g., free disk space). [emphasis added] This is the first example of hardware that was initially supported by Windows 10 but has since run afoul of those rules. Microsoft and its OEM partners made a big deal of this entry-level Atom processor for the first wave of Windows 8 devices. An Intel press release (PDF) from the launch event in September 2012 highlighted eight tablets and hybrids from Acer, ASUS, Dell, Fujitsu, HP, Lenovo, Samsung, and ZTE. The devices themselves were delayed until early 2013 because of driver problems. The HP Envy X2 was a relative star among this class of PCs, boasting a real-world battery life measured in days, with a detachable tablet that compared favorably in size and weight (but not app support) to the then-current iPad model. (You can read my first impressions of the device in the March 2013 post, "PCs learn new tricks, but can tablet/notebook hybrids rescue Windows 8?" ) Some three- and four-year-old PCs are unable to install the latest Windows 10 update The Envy X2 went on sale at a starting price of $700, but the price was cut by $100 shortly thereafter. HP and its distributors continued to offer the device until its replacement arrived some two years later, and bargain hunters could still find it for sale in 2015. No one knows exactly how many Clover Trail-based devices were sold, but collectively the total from all manufacturers was probably in the millions. Today, owners of those devices who took advantage of Microsoft's free upgrade offer for Windows 10 are facing a rude shock. It's possible that Microsoft and Intel will deliver a fix to this issue. That's what Acer's support note implies, but with no details of the underlying issue and no official word from Microsoft, that's certainly not guaranteed. (I've asked Microsoft for comment and will update this post when I hear back from them.) And are there other PC architectures that are likely to face this issue in the next year or two? We don't know. As Microsoft moves to a Windows 10 upgrade cadence of twice a year, with feature updates delivered in March and September and a support lifecycle of 18 months, that support policy can in theory cause even a two-year-old device to end up on the Island of Lost CPUs. The irony in this case is that Microsoft aggressively pushed the free Windows 10 upgrade offer to the owners of these devices, turning up the pressure dramatically as the July 2016 cutoff date approached. Now, less than a year later, those devices are being cut off without notice. The bottom line: If your PC was originally designed for Windows 8 or Windows 8.1 and the manufacturer doesn't officially support it for Windows 10, you're at risk. For the short term, at least, this policy shouldn't affect PCs that were designed for Windows 10 or for which the manufacturer has explicitly delivered support for Windows 10 in the form of drivers and firmware updates. But that could change in a few years, perhaps without notice. Article source
  4. 2018 deadline to stop individuals from accessing global web Tightening controls come amid Xi’s goal of "cyber-sovereignty" China’s government has told telecommunications carriers to block individuals’ access to virtual private networks by Feb. 1, people familiar with the matter said, thereby shutting a major window to the global internet. Beijing has ordered state-run telecommunications firms, which include China Mobile, China Unicom and China Telecom, to bar people from using VPNs, services that skirt censorship restrictions by routing web traffic abroad, the people said, asking not to be identified talking about private government directives. The clampdown will shutter one of the main ways in which people both local and foreign still manage to access the global, unfiltered web on a daily basis. China has one of the world’s most restrictive internet regimes, tightly policed by a coterie of government regulators intent on suppressing dissent to preserve social stability. In keeping with President Xi Jinping’s “cyber sovereignty” campaign, the government now appears to be cracking down on loopholes around the Great Firewall, a system that blocks information sources from Twitter and Facebook to news websites such as the New York Times and others. While VPNs are widely used by businesses and individuals to view banned websites, the technology operates in a legal gray area. The Ministry of Industry and Information Technology pledged in January to step up enforcement against unauthorized VPNs, and warned corporations to confine such services to internal use. At least one popular network operator said it had run afoul of the authorities: GreenVPN notified users it would halt service from July 1 after “receiving a notice from regulatory departments.” It didn’t elaborate on the notice. It’s unclear how the new directive may affect multinationals operating within the country, which already have to contend with a Cybersecurity Law that imposes stringent requirements on the transfer of data and may give Beijing unprecedented access to their technology. Companies operating on Chinese soil will be able to employ leased lines to access the international web but must register their usage of such services for the record, the people familiar with the matter said. Shares in U.S.-listed 21Vianet Group Inc., a provider of networking and datacenter services to Chinese clients, slid as much as 4.1 percent before ending 2.4 percent lower. Westone Information Industry Inc., which helps to set up VPNs and secure networks, fell as much as 1.5 percent Tuesday. “This seems to impact individuals” most immediately, said Jake Parker, Beijing-based vice president of the US-China Business Council. “VPNs are incredibly important for companies trying to access global services outside of China,” he said. “In the past, any effort to cut off internal corporate VPNs has been enough to make a company think about closing or reducing operations in China. It’s that big a deal,” he added. China Mobile Ltd., the Hong Kong-listed arm of the country’s biggest carrier, declined to comment. Representatives for publicly traded China Telecom Corp. and China Unicom (Hong Kong) Ltd. couldn’t immediately comment. The ministry didn’t immediately reply to an email seeking comment. — With assistance by Steven Yang, and Christina Larson Article source
  5. straycat19

    Ad Feeder IPs and Blocking

    I was getting a bunch of ads that adguard and ublock origin could not stop. They would initially open a webpage with an address like lqpkjasgqjve.com/ and then real ad pages. If I blocked lqpkjasgqjve.com/ then I might not get ads for a little while but then a new page bkmtspywevsk.com would open and send me to another real ad page. Block that and another web page, mictxtwtjigs.com/ would be the initial page. I chased these web sites, adding them to ublock until it became obvious something else was happening. The initial page with the 10 character addresses passed so fast that the only way to see them was to press print screen real quick when they first came up, I literally only had a second. I then traced the websites and found that they all came back to the same group of IP addresses. I block that entire group with my firewall 216.21.13.0 - 216.21.13.255. Since then I have not had one ad pop up in any browser. Now I just get a notification that my firewall blocked an IP if the website uses that service to feed ads to its visitors.
  6. i can't unsubscribe or even if i do then there will be other new senders ... a vicious circle. how do i block these?
  7. Get most of their costs covered. Australia’s biggest carriage service providers have been ordered to block The Pirate Bay and a number of other copyright-infringing websites after the federal court today ruled in favour of Foxtel and Village Roadshow. The movie rights holders were successful in securing injunctions under the federal government’s new piracy website blocking laws, requiring Telstra, Optus, TPG and M2 to block five movie torrent sites: The Pirate Bay, Torrentz, TorrentHound, IsoHunt, and SolarMovie. The carriers now have 15 business days to implement the blocks in whichever method they choose: DNS, IP address, and URL blocks, or any other technical approach. However, the carriers successfully fought off a bid to secure a rolling injunction regime. Federal court Justice Nicholas today said he was not persuaded that rights holders should be granted the discretion to issue out-of-court orders to CSPs to block mirror domains. The ruling is likely to come as a disappointment to rights holders who have throughout the case argued that the need to go through court processes to address the appearance of mirror sites would leave them facing excessive administrative burden. “This … is a known problem in the real world. It will be a problem that arises in the implementation of your honour’s orders," Richard Lancaster, the lead barrister representing rights holders, said in June. "And we’re concerned - given this is the first case [of the legislation] - that a procedure be adopted that will not create a real administrative burden for the future in having to do something unnecessary and elaborate such as the CSPs suggest.” The carriers argued that the difference between the administrative burden placed on rights holders to issue out-of-court notices, and seeking a new order, would be small. Justice Nicholas today made it clear that he wasn’t prepared to allow any extension of an injunction application to new domains without court oversight. “Whether the terms of any injunction should be varied to refer to additional domain names, IP addresses or URLs is a matter for the court to determine in light of evidence,” Justice Nicholas wrote in his judgment. Telcos get their costs covered The carriers were mostly successful in their bid to force the rights holders to reimburse them for the costs of implementing the blocks, and of appearing in court. The court ordered Foxtel to pay Optus $1500 for compliance costs, and $50 per domain blocked to Telstra and TPG. Roadshow will pay M2, Telstra and TPG $50 per domain blocked. The rights holders were also ordered to pay CSPs' costs for preparing evidence and written submissions. Telstra had sought to be compensated just over $10,000 to cover the cost of setting up its site blocking mechanisms. TPG had sought $21,000 if Telstra and other CSPs were successful recovering these costs. Justice Nicholas rejected the rights holders’ arguments that CSPs benefited from the activity of pirate website operators. “This was denied by the respondents who also submitted that the applicants’ submission is not supported by any evidence in these proceedings. On the latter point I think the respondents are correct,” he wrote. Foxtel and Village Roadshow brought separate injunction applications against the CSPs late in 2015, but the court has been dealing with the two matters together due to substantial similarities between the cases. The two applications are the first major attempts on the part of copyright holders to take advantage of new piracy site-blocking laws the federal government passed in June 2015. The laws give copyright holders the ability to apply to the court to order CSPs to block access to online locations established for the “primary purpose” of facilitating piracy. Justice Nicholas’s ruling today has substantially set the parameters in which the scheme is expected to operate. The outcome of the case is also expected to impact a third injunction application brought by music rights holders against CSPs. That application, launched early this year, saw a group of the country's biggest music companies led by Universal Music, along with APRA AMCOS, join forces to file an application for eight KickassTorrents domains to be blocked. In that matter the parties agreed that many of their differences would be resolved by the movie rights holders case. Justice Nicholas’s ruling today is expected to provide substantial guidance to the ruling in that matter. Source: Aussie ISPs ordered to block The Pirate Bay (and others) (ITNews) Internet service providers to block web sites (Whirlpool forum) Village Roadshow Piracy Blocking Australia Part 1 (Whirlpool forum)
  8. When you visit a web site in your favorite web browser, it interacts with the web servers in a variety of ways. It sends data to the web server such as the browser name, operating system, browser locale and your geographical location. All this data is then used by the server to offer you the content suitable for your browser or locale. For example, if you visit the Bing or Yahoo search engine web site (e.g. yahoo.com) and you are not from the US, then it will redirect you to the relevant local search engine web site (e.g. yahoo.co.uk). Unfortunately, some of the web servers also monitor your web browsing habits across a multiple of sites. With your web browsing data or habits, they can then use it to analyze how what people look for and deliver them the advertisement of the products that they might be looking for. Such servers are called tracking servers or just trackers. Although it is pretty much harmless, some people take it as an invasion of their privacy. Firefox offers to block such tracking servers inside the private browsing mode (also called the incognito mode). You can open a private browsing window in Firefox using the hotkey Ctrl+Shift+P. By default, Firefox blocks only some trackers web bad reputation. But you can change the settings for blocking all the known tracking servers in Firefox. Here is how: Open Firefox browser, type about:preferences#privacy in the address bar and press the Enter key. Alternatively, you can also click on the menu icon (looks like three layered burger), choose Options and then select Privacy section from the left side of the screen. Click on the Change Block List button shown under the Tracking section. 3. You will be shown two options and you can select any of these. One is for blocking only some of the trackers and other is for blocking all of the known trackers. . 4. Click on the Save Changes button when done. Restart Firefox web browser for the changes to take effect. Note that even after you restart Firefox browser, tracking protection will not work in the regular mode unless you have changed some other settings. It will work only in the private browsing mode. Article source
  9. A powerful and easy to use tool that enables you to protect your computer from undesirable content by blocking the Internet access of selected applications The Windows operating system bundles a firewall tool, ready to provide protection against possible threats that might have a negative impact on your system. Even so, it might not be enough. An application such as Windows 10 Firewall Control Plus is designed to add an extra security layer to your computer, permanently monitoring and analyzing the network data traffic in order to identify unwanted or dangerous content. As most programs of this type, it acts like a filtering barrier between the protected computer and the network, sorting out the incoming and outgoing packets and blocking potentially harmful ones. Its goal is to prevent other applications from sending personal data to unauthorized sources. Newly detected processes are analyzed and Windows 10 Firewall Control Plus prompts you for action (using a popup window and sound notifications), allowing you to specify the permission policy for each. This means that the initial access attempt of an application is automatically restricted. Alternatively, you can manually add new programs to the list and specify the rules that are to be applied in every case (access to email, FTP, LAN, VPN, Web and more such so-called 'zones' for incoming and / or outgoing requests). Windows 10 Firewall Control Plus logs all blocked events, enabling you to browse the stored entries and view the restricted IP addresses. The protection areas (or 'security zones') can be easily managed by accessing the dedicated tab. Unlike (the free edition), this version allows you to edit zones and comes with an extended set of areas. Additionally, it supports port forwarding and can generate statistics related to applied restrictions. Windows 10 Firewall Control Plus offers you full control over the network activity, protecting your system against intrusions. While having to set rules for each running program might be annoying and even exhausting, this software solution can prove to be efficient enough to worth the effort. Changelog 8.0.0.9 The manual is pending. Windows7 may require Windows6.1-KB3033929-x64.msu or Windows6.1-KB3033929-x86.msu WindowsUpdates (depending on Windows bitness) Domains priorities are changed. There are priorities "AboveApps", Those rules are analyzed before all the other rules. Take care not to enable too much. 8.0.0.7 SetMode enhancements. Switching Mode:Normal <-> Mode:Limited may take time only. Events/Address with hostname resolution enhanced. DPI awareness fixed Plus Edition: Import/Export/Reset/Manage from the command line. The keys are "import","export","reset","manage" (not available in Portable Editions). The main panel screen position is saved for re-opening at the same location. Previously the panel screen sizes were saved only. New UI. Max rules per zone limit is increased. (agents must be updated, of the same version) EventsPane/Filter allows filtering by the Program,Time,Zone,EventAddress columns 8.0.0.0 By-name/by-site filtering available as per applications settisngs, in Settings/All Applications and the Domains dedicated pane Homepage: http://www.sphinx-soft.com/Vista/order.html Download: Basic (i386+x64): http://sphinx-soft.com/download/prerelease/Windows10FirewallControlBasic-Setup.exe Plus (i386+x64): http://sphinx-soft.com/download/prerelease/Windows10FirewallControlPlus-Setup.exe Network/Cloud (i386+x64): http://sphinx-soft.com/download/prerelease/Windows10FirewallControlServer-Setup.exe Free Portable : http://sphinx-soft.com/download/prerelease/Windows10FirewallControl-Portable.zip Plus Portable: http://sphinx-soft.com/download/prerelease/Windows10FirewallControlPlus-Portable.zip Free beta testing keys found in this post (valid for the entire testing period and may be converted to a free perpetual license on the personal basis) http://vistafirewallcontrol.freeforums.org/the-latest-betas-releases-t6.html
  10. Stop Resetting My Apps is a free program for Microsoft's Windows 10 operating system to block the system from resetting default programs for certain tasks. One of Windows 10's biggest usability issues is that the operating system may reset some or even all default apps or file associations after operating system updates. This can be extremely frustrating for the user, as it means that files or protocols will open in the default programs that ship with Windows 10 instead of user selected programs. Additionally, it means that you have to waste some time correcting the reset file associations again. Stop Resetting My Apps Stop Resetting My Apps is a rather simple program for Windows 10 designed to block Windows 10 from resetting default apps. The program displays a list of default Windows 10 apps, Microsoft Edge, Mail, Photos, Movies & TV, Groove Music and 3D Builder, on start. All you need to do to block it from being set as the default app on the system is to click on it in the program interface. This adds a "stop" icon to the tile that marks it as blocked. Blocking won't prevent the application from working on the computer. You can still run it and use all of its functionality. What it does is block the selected application from being set as a default app for any file extension or protocol. So, if you want Mail to be handled by Thunderbird or Gmail instead of the default Mail application, you simply click on it for that. Windows 10 cannot set Mail as the default handler for the mailto protocol anymore from that moment on. The same is true for any of the other applications the program supports. You could for instance block any app that you don't use if you are unsure about some of the apps supported by Stop Resetting My Apps. You can undo any blocking by running the program again and clicking on its tile in the interface. This removes the "stop" icon from it and enables it for file associations and protocols again. Stop Resetting My Apps does not need to run in the background once you have made the changes. You can close the program afterwards without losing any of its functionality. Note: In case you are wondering how this works: You can set a NoOpenWith string in the Windows Registry to prevent specific apps from taking over file associations. So, here is what you need to do for that if you prefer the manual way: Tap on the Windows-key, type regedit.exe and hit the Enter-key. This opens the Windows Registry Editor. If you can, open a second Registry window for easier handling of the following operations. Navigate to the following key: HKEY_CURRENT_USER\SOFTWARE\Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppModel\Repository\Packages Locate the application you want to block from being the default, and open App\Capabilities\FileAssociations there. This displays the list of file associations of that particular application. Take note of the value in Data, it looks like a long random string: AppXsq3757nydv3f9bx6862hv0t4z7ennqqd Please note that this string may be different for any of the file types or protocols listed there. Switch to the second Registry Editor window, and go to HKEY_CURRENT_USER\SOFTWARE\Classes\ThatRandomString, e.g. HKEY_CURRENT_USER\SOFTWARE\Classes\AppXsq3757nydv3f9bx6862hv0t4z7ennqqd Right-click on it, and select New > String Value. Name it NoOpenWith, and keep its value empty. Repeat the process for any file association that you don't want that particular app to be ever associated with again. Stop Resetting My Apps Article source
  11. If you’d like to limit what apps a user can run on a PC, Windows gives you two options. You can block the apps you don’t want a user to run, or you can restrict them to running only specific apps. Here’s how to do it. NOTE: Be absolutely sure that you are making changes to a user account you actually want to restrict, and that you always have an unrestricted administrative account available to undo those changes. This is especially true if you are restricting users to a specific set of apps, as those users will lose access even to tools like Registry Editor and Local Group Policy Editor. If you do accidentally apply restrictions to your administrative account, the only way we’ve found to reverse the changes is to run System Restore by going to Settings > Update & Security > Recovery and clicking the “Restart now” button under Advanced Startup. From there, you can find the setting for running System Restore after a restart, since you won’t be able to run System Restore the normal way. For this reason, we also highly recommend creating a restore point before making any of the changes here. Home Users: Block or Restrict Apps by Editing the Registry To block or restrict apps in the Home edition of Windows, you’ll need to dive into the Windows Registry to make some edits. The trick here is that you’ll want to log on as the user you want to make changes for, and then edit the Registry while logged onto their account. If you have multiple users for which you want to changes for, you’ll have to repeat the process for each user. Standard warning: Registry Editor is a powerful tool and misusing it can render your system unstable or even inoperable. This is a pretty simple hack and as long as you stick to the instructions, you shouldn’t have any problems. That said, if you’ve never worked with it before, consider reading about how to use the Registry Editor before you get started. And definitely back up the Registry (and your computer!) before making changes. Block Certain Apps Through the Registry First, you’ll need to log on to Windows using the user account for which you want to block apps. Open the Registry Editor by hitting Start and typing “regedit.” Press Enter to open Registry Editor and give it permission to make changes to your PC. In the Registry Editor, use the left sidebar to navigate to the following key: HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies Next, you’re going to create a new subkey inside the Policies key. Right-click the Policies key, choose New > Key, and then name the new key Explorer . Next you’re going to create a value inside the new Explorer key. Right-click the Explorer key and choose New > DWORD (32-bit) value. Name the new value DisallowRun . Double-click the new DisallowRun value to open its properties dialog. Change the value from 0 to 1 in the “Value data” box and then click “OK.” Back in the main Registry Editor window, you’re now going to create a new subkey inside the Explorer key. Right-click the Explorer key and choose New > Key. Name the new key DisallowRun , just like the value you already created. Now, it’s time to start adding apps you want to block. You’ll do this by creating a new string value inside the DisallowRun key for each app you want to block. Right-click the DisallowRun value and then choose New > String Value. You’ll be naming these values with simple numbers, so name the first value you create “1.” Double-click the new value to open its property dialog, type the name of the executable you want to block into the “Value data” box (e.g., notepad.exe ), and then click “OK.” Repeat this process, naming the second string value “2” and the third “3” and so on, and then adding the executable file names you want to block to each value. When you’re done, you can restart Windows, log onto that user account, and then test things by trying to run one of those apps. You should see a “Restrictions” window pop-up letting you know that you can’t run the app. You’ll need to repeat this process for each user account for which you need to block apps. Though, if you’re blocking the same apps for multiple user accounts, you could always create your own Registry hack by exporting the DisallowRun key after you’ve configured the first user account and then importing it after logging onto to each subsequent account. If you want to edit the list of blocked apps, just return to the DisallowRun key and make the changes you want. If you want to restore access to all apps, you can either delete the wholeExplorer key you created–along with DisallowRun subkey and all the values. Or you could just go back and change the value of the DisallowRun value you created from 1 back to 0, effectively turning off app blocking while leaving the list of apps in place should you want to turn it on again in the future. Block Only Certain Apps Through the Registry Restricting users to running only certain apps in the Registry follows almost exactly the same procedure as blocking specific apps. You’ll again need to log on to Windows using user account you want to change. Fire up Registry Editor and then head to the following key: HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies Right-click the Policies key, choose New > Key, and then name the new key Explorer . Next you’re going to create a value inside the new Explorer key. Right-click the Explorer key and choose New > DWORD (32-bit) value. Name the new value RestrictRun . Double-click the new RestrictRun value to open its properties dialog. Change the value from 0 to 1 in the “Value data” box and then click “OK.” Back in the main Registry Editor window, you’re now going to create a new subkey inside the Explorer key. Right-click the Explorer key and choose New > Key. Name the new key RestrictRun , just like the value you already created. Now, you’ll add apps to which the user is allowed access. Create a new string value inside the RestrictRun key for each app you want to block. Right-click the RestrictRun value and then choose New > String Value. You’ll be naming these values with simple numbers, so name the first value you create “1.” Double-click the new value to open its property dialog, type the name of the executable you want to block into the “Value data” box (e.g., notepad.exe ), and then click “OK.” Repeat this process, naming the values “2,” “3,” and so on, and then adding the executable file names you want the user to be able to run to each value. When you’re done, restart Windows, log into that user account again, and test your settings. You should only be able to run apps to which you explicitly allowed access. You’ll need to repeat the process with each user account for which you want to restrict apps or create your own Registry hack you can use to apply settings to each user more quickly. To reverse your changes, you can delete the Explorer key you created (along with the RestrictRun subkey and all values) or you can set that RestrictRun value you created back to 0, turning off restricted access. Pro and Enterprise Users: Block or Restrict Apps with the Local Group Policy Editor If you use the Pro or Enterprise version of Windows, blocking or restricting apps can be a little easier because you can use the Local Group Policy Editor to do the job. One big advantage is that you can apply policy settings to other users–or even groups of users–without having to log in as each user to make the changes the way you do when making these changes with Registry Editor. The caveat here is that you’ll need to do a little extra setup by first creating a policy object for those users. You can read all about that in our guide to applying local Group Policy tweaks to specific users. You should also be aware that group policy is a pretty powerful tool, so it’s worth taking some time to learn what it can do. Also, if you’re on a company network, do everyone a favor and check with your admin first. If your work computer is part of a domain, it’s also likely that it’s part of a domain group policy that will supersede the local group policy, anyway. The process for allowing or restricting apps with the Local Group Policy Editor is almost identical, so we’re going to show you how to restrict users to only running certain apps here and just point out the differences. Start by finding the MSC file you created for controlling policies for those particular users. Double-click to open it and allow it to make changes to your PC. In this example, we’re using one we created for applying policy to all non-administrative user accounts. In the Group Policy window for those users, on the left-hand side, drill down to User Configuration > Administrative Templates > System. On the right, find the “Run only specified Windows applications” setting and double-click it to open its properties dialog. If you want to block specific applications rather than restricting them, you would open the “Don’t run specified Windows applications” setting instead. In the properties window that opens, click the “Enabled” option and then click the “Show” button. In the “Show Contents” window, click each line in the list and type the name of the excecutable you want users to be able to run (or the name of apps you want to block if that’s what you’re doing instead). When you’re done building your list, click “OK.” You can now exit the Local Group Policy window. To test your changes, sign in with one of the affected user accounts and try to launch an app to which the user should not have access. Instead of launching the app, you should see an error message. If you want to disable your changes, just head back into the Local Group Policy editor by double-clicking your MSC file again. This time, change the “Run only specified Windows applications” or “Don’t run specified Windows applications” options to “Disabled” or “Not Configured.” This will turn the setting off entirely. It will also reset your list of apps, so if you want to turn it on again, you’ll need to retype that list. Credit to
  12. 2016/09/21 15:50 GMT Update: Lenovo speaking to The Register denied any intended blocking for Linux or any other OS. They said that it’s a driver issue on Linux that makes it unable to read RAID on SSD disks. Microsoft opening the source code of a lot of its projects in the last months convinced some people that the company – under its new management – is now good, and that it “loves Linux”, however, this assumption came to be wrong today with the latest monopoly try from Microsoft. In a TL;DR format: Some new laptops that ship with Windows 10 Signature Edition don’t allow you to install Linux (or any operating system) on it; the BIOS is locked and the hard drives are hidden in a way you can’t install any OS. Those news are not some rumors from the Internet, Lenovo for example confirmed that they have singed an agreement with Microsoft for this. Other vendor Where Did It Start? Lenovo is one of the largest hardware manufactures in the world, they make everything, from smartphones to laptops and tablets, and they have been rising in the marke due to its “good” price and quality. However it seems that’s the company doesn’t care a lot when it comes to its consumers after they sell you the product, I am not talking about the hardware guarantee or something here, but about the software. Some users have reported that one of the new Lenovo Ultrabooks (Yoga 900 ISK2 and other models) has a locked BIOS setup. which doesn’t allow you to install another operating system on the laptop. It’s simply “locked”; for example if you tried to install Ubuntu on it, the installer won’t detect the hard drives because of this setup. BaronHK is one of those who faced this problem and started talking about it, here’s his quote about the issue: So consider “Signature Edition” a warning label that means “You aren’t allowed to run Linux, per Microsoft.”. Lenovo from its side, confirmed the problem yesterday by replying to the guy’s review on BestBuy saying: Here’s a screenshot (In case they deleted that review): Lenovo’s Reply on BIOS Locking That means that there’s an agreement between Microsoft and Lenovo to do this kind of setup, it’s intended and not just a “bug” in the BIOS or something, as the official response states from the above Lenovo reply. Other laptops from Dell or ASUS for example also come pre-loaded with the Signature Edition. But they provide an option in the BIOS to switch the hard drive mode from RAID to AHCI; which later allows installing Linux. Lenovo however, doesn’t. Many people from other hardware vendors are facing the same problem, check this post. Some users on the Lenovo forums tried to replace the BIOS with a new one beside doing a lot of other things to disable the LOCK, but all their attempts failed, it doesn’t seem that there’s any way to install Linux on those laptops. They have locked that thread now and they said they will update their reply soon. The Problem Is Caused By Windows 10 Signature Edition And BIOS Lock Windows 10 Signature Edition is an official public edition since around a year ago, Microsoft says that it’s better, cleaner and more secure, as no 3rd-party software are allowed to be installed on laptops which come pre-loaded with that edition, however, it looks like that edition doesn’t even allow the OS to be replaced, it depends on the hardware vendor, with Lenovo for example, there’s nothing to do, with others, switch the hard drive mode may fix it. Here’s another quote from the bottom line of the Windows 10 Signature Edition page: For you: If you see the “Windows 10 Signature Edition” badge on a laptop (specially Lenovo), DON’T BUY IT! You may not be able to install Linux (or any OS) on it, and there’s nothing you can do to the machine to change this currently. Please also, spread the word and tell your friends and collages about this issue, you may save them a huge headache trying to figure where the problem is or why they can’t install a new OS, the problem is not from Linux or the distribution they are using, it’s a hardware problem due to monopoly tries from Microsoft and hardware vendors. Article source Other source
  13. Chrome and Firefox are actively blocking direct access to the The Pirate Bay's download pages. According to Google's Safe Browsing diagnostics service TPB contains "harmful programs," most likely triggered by malicious advertisements running on the site. Comodo DNS also showed a "hacking" warning but this disappeared after a few hours. Starting a few hours ago Chrome and Firefox users are unable to access The Pirate Bay’s torrent download pages without running into a roadblock. Instead of a page filled with the latest torrents, visitors now see an ominous red warning banner when they try to grab a torrent. “The site ahead contains harmful programs,” Google Chrome informs its users. “Attackers on thepiratebay.org might attempt to trick you into installing programs that harm your browsing experience (for example, by changing your homepage or showing extra ads on sites you visit),” the warning adds. Mozilla’s Firefox browser displays a similar message. While Pirate Bay’s homepage and search is still freely available, torrent detail pages now show the following banner. Chrome’s Pirate Bay block Both Chrome and Firefox rely on Google’s Safe Browsing report which currently lists TPB as a partially dangerous site. In addition to the two browsers, people who use Comodo’s Secure DNS also experienced problems reaching the site. Comodo’s secure DNS has a built-in malware domain filtering feature and earlier today it flagged the Pirate Bay as a “hacking” site, as the banner below shows. Shortly before publishing this warning disappeared. Pirate Bay hacking? Comodo DNS still blocks access to ExtraTorrent, the second largest torrent site trailing just behind The Pirate Bay. The secure DNS provider accuses ExtraTorrent of spreading “malicious” content. Interestingly, Google’s Safe Browsing doesn’t report any issues with ExtraTorrent’s domain name, so another source may play a role here. This isn’t the first time that Comodo has blocked torrent sites and usually the warnings disappear again after a few hours or days. Until then, users can add the domains to a whitelist to regain access. Of course, they should do so at their own risk. Chrome and Firefox users should be familiar with these intermittent warning notices as well, and can take steps (Chrome, FF) to bypass the blocks if they are in a gutsy mood. Article source
  14. Have you ever received an eMail from someone you do not want one from? I know I do, and many of my clients do, too. It can be very frustrating receiving messages from unwanted senders. The best way to deal with this is to block that sender’s eMail address. Many people use Mozilla Thunderbird as their primary eMail application. So I figured, ‘Why not show you the steps on how to block a sender’s eMail through Thunderbird?’. This will also delete the sender’s eMail immediately (almost like call blocker on your phone). This is a very helpful step-by-step guide that will keep the stress down when checking your mail. How to Block a Sender’s eMail in Thunderbird Step 1: Open your Thunderbird eMail application. Most of us will have it on the Task Bar. You are looking for this Logo– click on it Step 2: Find one of the eMails that you received from the sender. Open the eMail and then right click on the sender’s eMail address at the top of the eMail. Step 3: This will bring up a drop-down menu which you will want to select “Create Filter From…” Step 4: The next window that will appear is “Filter Rules” and the address you selected will be auto-filled in the filter. If you want to add more eMail addresses, just click the Plus Sign (+) next to the first eMail. Make sure to name the filter “Block Sender” or something similar. Step 5: Here you will want to head down to the bottom box (Perform these actions). Now you will want to Click the down-arrow next to “Move Message to” wording. Step 6: This will bring up a drop-down menu. You will want to choose “Delete message.” Now click OK Magic! If the sender tries to eMail you again, it will automatically go to the desired folder. If you selected Delete Message, it will go there rather than your Thunderbird Inbox. You can reverse this if you forgive that sender at a later time. Unblocking is very easy to do compared to setting up the Block. Bonus: Removing a sender from the block list (unblocking) Step 1: At the top of your Thunderbird eMail application choose “Tools” From the drop-down menu, select “Message Filters” Step 2: In the the Message Filters box, click once on the Filter name. On this one you will click on “Block Sender,” (or whatever you titled your filter). Now click Edit Step 3: The next step is to just Click the Negative Sign (-) next to the blocked eMail you wish to unblock. Click OK once you are done. Now this can only be done this way if you have more than one eMail set up to be blocked in the filter. If you only have one, then you have to delete the entire filter The way to do this is when you are on the “Message Filter” window, select the filter you want to delete. Then, just click on the “Delete” button to the right So there you have it! You can now block and unblock sender eMails. Credit to
  15. The company will change the upgrade system in this case The free Windows 10 upgrade offer ended on July 29, but you can still get the new operating system completely free of charge by downloading the version aimed at users with assistive technologies, even if you don’t use any. This is because Microsoft isn’t restricting this offer to certain tech and doesn’t make any verification in this regard, so pretty much anyone can download Windows 10 without paying using this trick. Since this isn’t exactly fair play, and users can abuse this method to get the new operating system free of charge, Microsoft is planning to block it in the coming weeks and make it available only with Microsoft support. Users already abusing this method The moderator of the Windows 10 subreddit, Swaggy_McSwagSwag, says he’s been in touch with Microsoft over this method of getting the new operating system and claims that the company will remove the page to make the upgrade exclusively available through support services. “As it stands, that method of upgrading is based on an honour rule. However, having spoken with MS earlier today, they inform me that within the next couple of weeks that webpage and tool will be removed and instead require you to contact MS support directly to upgrade this way,” he explains. Basically, keeping Windows 10 free for users with disabilities was a decision that Microsoft made because the operating system might not be fully compatible with assistive tech, so some people need to delay the upgrade until support is being offered. But in the last few days, however, the number of users who have actually tried to upgrade free of charge using the assistive tech trick has exploded. And what’s more, a Microsoft Disability Answer Desk tech engineer says that the number of people calling for support for this version has increased significantly just because users need help to download Windows 10, even if no assistive tech is employed. Certainly, Microsoft is making the right move here, but for the moment, there’s no specific info on when this is projected to happen, but more details should be provided in the coming weeks. Article source
  16. Google's plans to gather Street View data in India have hit a brick wall after the country rejected the company's proposals. Indian security agencies expressed concerns about plans to send Google Street View cars around the country, taking 360-degree photos along roadways. This is certainly not the first time Google Street View has faced problems, with numerous cases relating to privacy resulting in changes being made to the service. India's interior minister said that Google's proposed photographic journey was being rejected because of concerns that it could compromise the country's security. It is thought that terrorist attacks in the country may have been planned with the help of similar services. The Hindu newspaper quotes a senior government minister as saying: While Google has previously been able to work with governments to get around concerns, it's not clear whether the Indian government is willing to negotiate. The company is yet to comment on the block. Article source
  17. After taking action against people using VPNs and proxies, Netflix is engaged in enhanced efforts to stop users accessing geo-blocked content. According to several reports, Netflix is now blocking users who use IPv4 to IPv6 tunnel brokers, even when doing so legitimately. It used to be a little talked about secret but the fact that all Netflix users aren’t treated equally is now well and truly out of the bag. Due to licensing deals with content providers, most regions in the world are granted access to differing levels of content. Users in the United States get the best deal from a choice perspective while subscribers in many other regions are offered much more shallow libraries. However, for many years determined subscribers from all over the world have been using various tricks to gain access to the forbidden fruits of the U.S. Netflix library. This has largely been achieved through the use of VPNs and proxies, techniques which worked almost flawlessly until complaints from rightsholders forced Netflix into a crackdown earlier this year. Nevertheless, other methods to circumvent Netflix blocks do exist. Some savvy individuals have been using something known as a tunnel broker, an online service which provides the user with a network tunnel. One particular type, known as an IPv6 tunnel broker, provides users with a modern IPv6 tunnel to sites via the much older (but massively more prevalent) IPv4 protocol. One such service is provided free of charge by Hurricane Electric, the operator of the world’s largest IPv6 transit network. Called simply ‘IPv6 Tunnel Broker‘, the company describes the service as follows. “Our free tunnel broker service enables you to reach the IPv6 Internet by tunneling over existing IPv4 connections from your IPv6 enabled host or router to one of our IPv6 routers. Our tunnel service is oriented towards developers and experimenters that want a stable tunnel platform,” Hurricane explains. With noble goals at heart, this service is clearly not designed to give Netflix headaches. However, with tunnel endpoints in the United States that was apparently the net result, with people using the service able to access titles geo-restricted to the U.S. Somehow this situation came to Netflix’s attention and during the past few days the company decided to take action. Numerous reports indicate that Netflix has now blocked users of Hurricane Electric’s tunnel broker from accessing its services, regardless of their intent. They now receive the message below. A Reddit user called KeiroD contacted Netflix after receiving an identical message with the same error code – M7111-1331-5059. From the transcript of the discussion its clear that KeiroD already had a good idea why he was blocked. “The only thing that I can think of that would affect us would be using the Hurricane Electric tunnelbroker but we’re US-based as is Hurricane Electric’s tunnel,” he explained. Netflix responded as expected. “Yes it is possible as they work the same as the VPN or proxies. There is a way to find out if that is the reason, do you have a way to turn it off for a moment so we can try the service again?” customer support asked. In response KeiroD turned off IPv6 in his router’s tunnel broker setup, rebooted, and played a random movie successfully. General blocking aside, the sad part here is that KeiroD is based in the United States, so already had access to U.S. content on Netflix. The fact that his account with Netflix was registered in the United States and his endpoint was in Kansas City didn’t help at all. Interestingly, the topic is also under discussion in Hurricane Electric’s forums. After years of people questioning whether he had access to the U.S. version of Netflix, a Canadian user there reported that his Netflix suddenly stopped working a few days ago. “Turns out that I did [have the U.S. Netflix] and didn’t even know it! Now Netflix is blocking me, and after a long while I finally figured out that it was because of my IPv6 tunnel. The thing is though, I am in Canada, and I use the tunnel server in Toronto, also in Canada, but Netflix detects my connections as coming from the US!” he explains. “Well of course this problem only affects traffic coming over the IPv6 tunnel. If I shut it down, then Netflix works fine over native IPv4. I obviously still want my IPv6 connectivity, and don’t have any easy way that I know of to specifically block only Netflix-related traffic from resolving IPv6 addresses and using the tunnel.” Sadly, however, Hurricane say they can’t help. “Our [subnet] is registered as part of a US company, and that is the address space being used there. We do not have any IPv6 allocations allocated and designated as ‘Canada’,” a senior Hurricane engineer responded. “Our [subnet] is used globally, as-is. If Netflix has some sort of whitelisting system in place, perhaps the ranges used there can be submitted, if such a whitelist exists, Netflix willing.” As an avid supporter of IPv6, Netflix’s decision to block Hurricane users is somewhat disappointing, especially when they have U.S. accounts and are also based in the U.S. Understandably the company is responding to pressure from rightsholders but interestingly there’s no change in the current situation even when they aren’t a factor. Netflix previously indicated it wanted to improve licensing issues by creating its own shows, shows that can be accessed anywhere in the world without issues. But even they are off-limits, it seems. “This started happening to me this afternoon. Called Netflix support, and based on that conversation I concluded they consider Tunnelbroker a VPN/Proxy,” another user on HE’s forums explains. “They’re not wrong, but it’s still frustrating. Ironically the show I was trying to resume is a Netflix original. I wouldn’t have expected that there would be licensing issues on their own content.” And so the whac-a-mole continues…. Article source
  18. Today we are going to be testing SecureAplus, we will be testing against ransomware and see if it can detect ransomware and blocking it using its whitelist system. I will be showing you a test on Windows 10 and Windows 7. The ransomware we will be using in our test is Crypto Ransom, which once injected on the system will encrypt all your data, we will test CTB Locker, Torrent Locker, Teslacrypt, Locky, CryptoWall, and CryptoLocker. How to Block Ransomware
  19. Microsoft offers alternative method to prevent the upgrade It’s not a secret that Microsoft has been quite aggressive in its attempt to upgrade computers to Windows 10 and users turned to all kinds of tricks to block this and just stick with their current Windows version. While third-party software solutions such as GWX Control Panel are quite popular these days, it is important to know that Microsoft is offering an alternative way that’s actually quite easy to implement in Windows 7. And very effective, that is. It’s all possible with an update released by Microsoft in mid-2015 for Windows 7 computers (download the 32-bit/64-bit version here) which introduces support for a new policy that completely blocks the upgrade to new Windows versions, as AskVG reports. So all you have to do is to install this update and then enable the new policy to make sure that your computer never gets upgrades to Windows 10. How to enable the new policy Once you install this update (it’s also shipped via Windows Update, so if you’re running a fully up-to-date computer, it should already be there), you can enable the new policy via the Group Policy Editor or via the Registry Editor. To use GPE, click the Start menu in Windows 7 and type gpedit.msc to launch it and then navigate to the following path: Computer Configuration -> Administrative Templates -> Windows Components -> Windows Update Open the option called “Turn off the upgrade to the latest version of Windows through Windows Update,” set it to “Enabled” and you’re done. This option needs to be enabled on Windows 7 For the Registry Editor method, just click the Start menu, launch the app by typing regedit.exe and go to this path: HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows Select the Windows folder, right-click it and create a new entry called “WindowsUpdate.” In the right page, create a new DWORD entry called “DisableOSUpgrade” and set its value to 1. These methods might not be new for more experienced users, but they certainly come in handy when seeing all these forced upgrades reports. We’ve also heard from readers saying that Microsoft might overwrite these changes with new updates, so it’s better to check back every once in a while to make sure you stay on Windows 7. The free upgrade promo ends on July 29 and Microsoft will remove the Get Windows 10 app from our PC at that date, so stories on forced upgrades should no longer show up. Article source
  20. Aegis is a powerful script for Windows 7 and Windows 8 devices that takes care of all components related to Microsoft's news operating system Windows 10. In addition to that, it is performing additional operations such as adding a number of Microsoft hosts to the blocklist, setting Windows Update to check/notify, and more. Since it is script-based, it is easy enough to check out what it does in detail, and even to add or remove commands from the script to adjust it accordingly as its author allows code modifications or the sharing of the code or components. Aegis in detail Aegis is updated regularly to reflect changes that Microsoft makes, for instance by taking into account new updates or modified updates. The application is offered via a Mega download currently. The package is offered as a zip file that you need to download to your system. Once you have unpacked it, you find several command files listed in the directory that you can edit directly using any plain text editor. The file setacl.exe, in case you are wondering supports the managing of Windows permissions from the command line. How to use it All you need to do is right-click on the file aegis.cmd and select "run as administrator" to get started. Follow the on-screen instructions from that moment on to complete the process. Note: It is highly recommended to create a system backup before the program is run on a machine as you may not have any options to undo the changes should things go wrong. So what does it do in detail? Disables or hides the Windows 10 download directory. Disables GWX (Get Windows 10), OneDrive, Telemetry, Wifisense. Uninstalls or hides 31 KB updates. Disables 31 schedules tasks. Uninstalls Diagtrack. Disables Remote Registry. Blocks 188 Microsoft Hosts on 221 IPs. Change Windows Update settings to check/notify instead of download/install. The Windows Updates that the program uninstalls or hides kb update description kb971033 update for windows activation technologies kb2902907 description not available, update was pulled by microsoft kb2922324 description not available, update was pulled by microsoft kb2952664 update for upgrading windows 7 kb2976978 update for windows 8.1 and windows 8 kb2977759 update for windows 7 rtm kb2990214 update that enables you to upgrade from windows 7 to a later version of windows kb2999226 update that enables you to run windows 10 applications on earlier versions of windows kb3012973 upgrade to windows 10 kb3014460 update for windows insider preview / upgrade to windows 10 kb3015249 update that adds telemetry points to consent.exe in Windows 8.1 and Windows 7 kb3021917 update for windows 7 sp1 for performance improvements kb3022345 update for customer experience and diagnostic telemetry kb3035583 update installs get windows 10 app in windows 8.1 and windows 7 sp1 kb3044374 update that enables you to upgrade from windows 8.1 to windows 10 kb3046480 update for migrating .net when upgrading to later version of windows kb3050265 update for windows update client for windows 7 june 2015 kb3050267 update for windows update client for windows 8.1 june 2015 kb3065987 update for windows update client for windows 7 and windows server 2008 r2 july 2015 kb3065988 update for windows update client for windows 8.1 and windows server 2012 r2 july 2015 kb3068708 update for customer experience and diagnostic telemetry kb3075249 update that adds telemetry points to consent.exe in windows 8.1 and windows 7 kb3075851 update for windows update client for windows 7 and windows server 2008 r2 august 2015 kb3075853 update for windows update client for windows 8.1 and windows server 2012 r2 august 2015 kb3080149 update for customer experience and diagnostic telemetry kb3083324 update for windows update client for windows 7 and windows server 2008 r2 september 2015 kb3083325 update for windows update client for windows 8.1 and windows server 2012 r2 september 2015 kb3083710 update for windows update client for windows 7 and windows server 2008 r2 october 2015 kb3083711 update for windows update client for windows 8.1 and windows server 2012 r2 october 2015 kb3112343 update for windows update client for windows 7 and windows server 2008 r2 december 2015 kb3112336 update for windows update client for windows 8.1 and windows server 2012 r2 december 2015 Closing Words Aegis is a sophisticated program that is updated regularly to block Windows 10 components, updates designed solely for the promotion or installation of Windows 10, and other undesirable components on systems running Windows 7 or 8. Aegis Article source
  21. Adblock Plus has for some time tried to find a way to balance the needs of websites to display money-making ads, with the preferences of visitors who do not want to see such ads. After experimenting with its Acceptable Ads program whereby some discrete ads are allowed to slip through the net, Eyeo, the company responsible for Adblock Plus, is teaming up with Flattr to give sites another way to make money. The scheme is called Flattr Plus, and it gives people the chance to pay a monthly subscription to access content on sites. It's a similar idea to an existing payment option run by Flattr, but the monthly subscription is used as an alternative to paying for access to individual articles. Users are able to decide the amount of money they would like to pay out each month. Flattr Plus then uses an algorithm to analyze users' browsing and article consumption, and uses metrics such as length of time spent reading articles to determine how to distribute the monthly fee. It is also possible to opt to give a favorite site a larger share of the subscription. Flattr Plus is currently in beta testing, and people are invited to sign up for early access to help test out the algorithm. Websites that are interested in participating in the scheme are also encouraged to sign up. The company says: The ultimate aim is to integrate Flattr Plus into Adblock Plus, but it's not clear quite how far off this might be at this stage. Article source
  22. Chrome, Firefox and Safari are actively blocking direct access to The Pirate Bay. According to the browsers, Thepiratebay.se is a "deceptive site" or "web forgery," that may steal user information. The TPB crew has been alerted to the issue, and hope it will be resolved soon. There’s a slight panic breaking out among Pirate Bay users, who are having a hard time accessing the site. Over the past few hours Chrome and Firefox and Safari have started to block access to Thepiratebay.se due to reported security issues. Instead of a page displaying the iconic pirate ship, visitors are presented with an ominous red warning banner. “Deceptive site ahead: Attackers on Thepiratebay.se may trick you into doing something dangerous like installing software or revealing your personal information,” the Chrome warning reads. Firefox users may encounter a similar banner, branding The Pirate Bay as a “web forgery” which may trick users into sharing personal information. This may lead to identity theft or other fraud. “Web forgeries are designed to trick you into revealing personal or financial information by imitating sources you may trust. Entering any information on this web page may result in identity theft or other fraud,” the browser warns. Google’s safebrowsing page for TPB currently lists the site as dangerous. It is likely that the current problems are related to issues caused by third-party advertisers. Just last week Malwarebytes reported that some ads were dropping ransomware through the site. The issue appears to be limited to the desktop versions of most browsers, and not everyone is seeing the error pages yet. This is not the first time browsers have flagged The Pirate Bay. The same issue has come up before supposedly due to malicious advertisers. The Pirate Bay team is aware of the issues and will probably resolve it sooner than later. Impatient or adventurous users who want to bypass the warning can do so by disabling their browser’s security warnings altogether in the settings, at their own risk of course. Article source
  23. Microsoft has retroactively removed the ability of companies to turn off access to the Windows Store in its Windows 10 Pro version. Microsoft is no longer allowing administrators to block Windows 10 Pro users' access to the Windows Store. Up until a month ago, admins could use Group Policy to shut off employees' access to Windows Store if they were running Windows 10 Pro. Controlling this access is a requirement for some businesses. But last month, Microsoft changed that option, claiming that Store access was required for all versions of Windows 10 except Enterprsie and Education "by design." (Thanks to @SwitftonSecurity for the heads up.) Admins still can use AppLocker or Group Policy to block access to the Windows Store if their employees (or students) are running Enterprise or Education. A Microsoft spokesperson confirmed the change, noting that businesses who need to shut off Store access have no recourse other than Windows 10 Enterprise. The official statement: The clamp-down on administrator control over the Store was timed with Microsoft's declaration that Windows 10 1511 (a k a, the November update) had been designated the new Current Branch for Business (CBB) release. Driving visibility and use of Windows Store has been one of Microsoft's goals with Windows 10. Article source
  24. Netflix isn't winning any popularity awards from users this month. First, many users had forgotten about next month's price hike, and have been very upset at the prospect of paying an extra $2 per month for the service. Now a large group of users in Canada are reporting that they can no longer access US content through VPN providers. You might wonder why people in Canada would want to circumvent their geographical settings, in order to access US content. As it turns out, according to JustWatch, there are currently 3,008 titles currently available in Canada on Netflix. Compare this to the 4,908 available in the US, and there's a big difference in service. And users in Canada also state that the variety of shows and movies is far less appealing than the US selection. With nearly 2,000 fewer titles to choose from, Canadian users aren't happy with the amount that they are paying, when just across the border they could get far more content for the same price. This is why they turn to VPN services to get them access to shows and movies that are otherwise unavailable on any streaming service in the country. Over the weekend users started pouring into threads on Reddit and taking to Twitter to complain about their inability to use VPNs to help them watch US content. It looks like there may still be a couple of services out there that work, but the majority of users seem to be cut off completely. This is just one more case of Netflix making good on their promise to shut down users taking advantage of VPNs to bypass geographic restrictions on content. One has to wonder when they're planning to make good on offering the same content worldwide. source
  25. Chrome and Firefox are actively blocking direct access to the popular torrent site KickassTorrents. According to the browsers, Kat.cr is a "deceptive site" or "web forgery," that may steal user information. The site's operators are looking into the issue, and hope to resolve it soon. There’s a slight panic breaking out among KickassTorrents users, who are having a hard time accessing the site. Over the past few hours Chrome and Firefox have both started to block access to Kat.cr due to reported security issues. Instead of a page filled with the latest torrents, visitors are presented with an ominous red warning banner. “Deceptive site ahead: Attackers on kat.cr may trick you into doing something dangerous like installing software or revealing your personal information,” the Chrome warning reads. Chrome warns against using Kat.cr Firefox users encounter a similar banner, branding Kat.cr as a “web forgery” which may trick users into sharing personal information. This may lead to identity theft or other fraud. “Web forgeries are designed to trick you into revealing personal or financial information by imitating sources you may trust. Entering any information on this web page may result in identity theft or other fraud,” the browser warns. Firefox’s alert Interestingly, Google’s safebrowsing page for Kat.cr currently lists no issues with the site. The KAT team informs TorrentFreak that they are looking into the issue and hope to have the blocks removed soon. This is not the first time the two browsers have flagged KickassTorrents. Last year site was flagged on several occasions after it was linked to a malicious advertiser. At the time the KAT team said they addressed the issue in a matter of hours, but it nonetheless took more than two days before the site was unblocked on both Firefox and Chrome. Impatient or adventurous users who want to bypass the warning can do so by disabling their browser’s security warnings altogether in the settings, at their own risk of course. Article source
×