Jump to content
New Members Read more... ×

Search the Community

Showing results for tags 'windows'.

More search options

  • Search By Tags

    Type tags separated by commas.
  • Search By Author

Content Type


  • Site Related
    • News & Updates
    • Site / Forum Feedback
    • Member Introduction
  • News
    • General News
    • FileSharing News
    • Mobile News
    • Software News
    • Security & Privacy News
    • Technology News
  • Downloads
    • nsane.down
  • General Discussions & Support
    • Filesharing Chat
    • Security & Privacy Center
    • Software Chat
    • Mobile Mania
    • Technology Talk
    • Entertainment Exchange
    • Guides & Tutorials
  • Off-Topic Chat
    • The Chat Bar
    • Jokes & Funny Stuff
    • Polling Station

Find results in...

Find results that contain...

Date Created

  • Start


Last Updated

  • Start


Filter by number of...

Found 999 results

  1. # Note Due to the bugs in this site, you may see errors in pasting the text copied from here. It's better to copy the text from the Read me inside the script. # Digital Activation - Windows 10 # KMS38 Activation - Windows 10 /Server # Online KMS Activation - Windows /Server /Office # Supported Products # $OEM$ Folder (Preactivated Windows Install) # What's that big block of text in this script? # Custom install and activate 'C2R-Retail Office' # Download Original Windows /Server /Office Images # Manual Activation Process # Troubleshoot activation issues # Credits # File Details and Download links File: MAS_0.6_CRC32_656492C8.cmd Size: 1.94 MB (20,37,154 bytes) CRC-32: 656492c8 SHA-1: be7b7467fcbda06a844f880668a0e84ca9387c23 SHA-256: d329d03e5679d8b90f306d06087979f480e053bae775958189d9ef05eefb55cd File: MAS_0.6_Pass_2019.zip Size: 1.45 MB (15,29,663 bytes) CRC-32: 015e7aa3 SHA-1: fc771b25962ff833ec7db2328e5a67c9b0e1f3e5 SHA-256: 9b58b15436d5be982a73f7c13971b18e6eb3f39876ce7bff2c339f0ba2505a6e Password: 2019 Site: https://0x0.st (shortened for put.re direct link) Sharecode: /sVX Mirror Site: https://tinyurl.com (shortened for GDrive direct link) Sharecode: /yc9xf7sq # Changelog
  2. Franzis Profibuch Aktfotografie 2. Auflage(Professional Book Nude Photography - 2nd Edition) - [E-Book] - Promo by Heise.de & Franzis.de Links: Offer: https://www.franzis.de/franzis/affiliate/138379520/url/directory/angebot/profibuch-aktfotografie-2.auflage-heise-adventskalender Note: Limited Period Offer. Page in German. Free e-book worth 29.99 € Current Status: Open. For further information about the e-book, please see the picture gallery here. Download - Steps: Visit the promotional page during the offer period Click on Download to download your free e-book application[zip file]. Please unzip the download, and open the folder corresponding to your operating system. To save the professional book nude photography 2nd Edition on your computer, please double click on the file and follow the instructions of the registration and copy Wizard. Optional: Open the e-book application and register to get your personal user ID and the registration code for your free book by e-mail. Optional: Enter the information in the appropriate fields and release the book as a PDF file. More Advent Kalender Giveaways:
  3. Hash Check Via MSDN: http://msdn.microsoft.com/en-us/subscriptions/downloads/default.aspx#searchTerm=Windows%208.1%20with%20Update&ProductFamilyId=0&Languages=en&PageSize=10&PageIndex=0&FileId=0 Details: November 2014 update rollup for Windows RT 8.1, Windows 8.1, and Windows Server 2012 R2: New features and improvements/List of the fixed issues: Windows 8.1 RTM Installations-Keys Full versions : Core/Standard .......: 334NH-RXG76-64THK-C7CKG-D3VPTProfessional ........: XHQ8N-C3MCJ-RQXB6-WCHYG-C9WKBProfessional WMC ....: GBFNG-2X3TC-8R27F-RMKYB-JK7QTProfessional VL .....: GCRJD-8NW9H-F2CDX-CCM8D-9D6T9Professional VL WMC .: 789NJ-TQK6T-6XTH8-J39CJ-J8D3PEnterprise ..........: FHQNR-XYXYC-8PMHT-TV4PH-DRQ3HN-versions:Core/Standard N .....: 6NPQ8-PK64X-W4WMM-MF84V-RGB89Professional N ......: JRBBN-4Q997-H4RM2-H3B7W-Q68KCProfessional VL N ...: HMCNV-VVBFX-7HMBH-CTY9B-B4FXYEnterprise N ........: NDRDJ-3YBP2-8WTKD-CK7VB-HT8KWAll Other Edition Installation Keys:http://pastebin.com/M5VV6750 Windows 8.1 with Update [November 2014 Rollup] - MSDN DVD ISO English FTP Direct Download Links #351 >>> Windows 8.1 with Update (multiple editions) - DVD (English) File: en_windows_8.1_with_update_x64_dvd_6051480.isoCRC-32: cd5bc9f1MD4: 86112ed6364204bc96a3046fd931b2cbMD5: e0d4594e56c0545d379340e0db9519a5SHA-1: a8b5df0b0816280ae18017bc4b119c77b6c6eb7magnet:?xt=urn:btih:df6c4765ded49d65a29bef89014bdb9ba3758f66&dn=en_windows_8.1_with_update_x64_dvd_6051480.isoOr with Public Tracker Magnet Linkmagnet:?xt=urn:btih:DF6C4765DED49D65A29BEF89014BDB9BA3758F66&dn=en_windows_8.1_with_update_x64_dvd_6051480.iso&tr=http%3a%2f%2f94.228.192.98%2fannounce&tr=http%3a%2f%2fannounce.torrentsmd.com%3a6969%2fannounce&tr=http%3a%2f%2fbeta.mytracker.me%3a6969%2fannounce&tr=http%3a%2f%2fexodus.desync.com%3a6969%2fannounce&tr=http%3a%2f%2fretracker.local%2fannounce&tr=http%3a%2f%2ftracker.blazing.de%2fannounce&tr=udp%3a%2f%2f10.rarbg.com%2fannounce&tr=udp%3a%2f%2fbt.rghost.net%3a80%2fannounce&tr=udp%3a%2f%2fopen.demonii.com%3a1337%2fannounce&tr=udp%3a%2f%2ftracker.istole.it%3a80%2fannounce&tr=udp%3a%2f%2ftracker.jamendo.com%3a80%2fannounce&tr=udp%3a%2f%2ftracker.openbittorrent.com%3a80%2fannounce&tr=udp%3a%2f%2ftracker.prq.to%3a80%2fannounce&tr=udp%3a%2f%2ftracker.publicbt.com%3a80%2fannounce&tr=udp%3a%2f%2ftracker.token.ro%3a80%2fannounceOr Multi Collection Magnet Link:magnet:?xt=urn:btih:2F7D04E7F4B3D29AEF3AB54D86016B47A80AE7B8&dn=Windows%208.1%20with%20Update%203%20%28English%29&tr=http%3a%2f%2fbt.nnm-club.info%3a2710%2f002e7cdbb48cbaace76c0eed6f2ec311%2fannounce Windows 8.1 with Update (multiple editions) (x86) - DVD File: en_windows_8.1_with_update_x86_dvd_6051550.isoCRC-32: 86e3499fMD4: 0ff14bffabc4bf7c680c1df7c2936df2MD5: 46ce6553a0e0abc264b77c1fc59dfb29SHA-1: c7fa828e01e98b601e0aca8019f1cb223eb23223magnet:?xt=urn:btih:024e78a6f38386c5338fbdd7220cf92c32c452c1&dn=en_windows_8.1_with_update_x86_dvd_6051550.isoOr with Public Tracker Magnet Linkmagnet:?xt=urn:btih:024E78A6F38386C5338FBDD7220CF92C32C452C1&dn=en_windows_8.1_with_update_x86_dvd_6051550.iso&tr=http%3a%2f%2f94.228.192.98%2fannounce&tr=http%3a%2f%2fannounce.torrentsmd.com%3a6969%2fannounce&tr=http%3a%2f%2fbeta.mytracker.me%3a6969%2fannounce&tr=http%3a%2f%2fexodus.desync.com%3a6969%2fannounce&tr=http%3a%2f%2fretracker.local%2fannounce&tr=http%3a%2f%2ftracker.blazing.de%2fannounce&tr=udp%3a%2f%2f10.rarbg.com%2fannounce&tr=udp%3a%2f%2fbt.rghost.net%3a80%2fannounce&tr=udp%3a%2f%2fopen.demonii.com%3a1337%2fannounce&tr=udp%3a%2f%2ftracker.istole.it%3a80%2fannounce&tr=udp%3a%2f%2ftracker.jamendo.com%3a80%2fannounce&tr=udp%3a%2f%2ftracker.openbittorrent.com%3a80%2fannounce&tr=udp%3a%2f%2ftracker.prq.to%3a80%2fannounce&tr=udp%3a%2f%2ftracker.publicbt.com%3a80%2fannounce&tr=udp%3a%2f%2ftracker.token.ro%3a80%2fannounceOr Multi Collection Magnet Link:magnet:?xt=urn:btih:2F7D04E7F4B3D29AEF3AB54D86016B47A80AE7B8&dn=Windows%208.1%20with%20Update%203%20%28English%29&tr=http%3a%2f%2fbt.nnm-club.info%3a2710%2f002e7cdbb48cbaace76c0eed6f2ec311%2fannounce Windows 8.1 Pro Volume License with Update DVD (English) File: en_windows_8.1_pro_vl_with_update_x64_dvd_6050880.isoCRC-32: a466193aMD4: 3f14a3a7125cf282a97b9ca4f04c62a7MD5: 2b57629165900f93e73305ddf27124d4SHA-1: 962a1d890987b5877469433928b8c8b8a3e945cdmagnet:?xt=urn:btih:12e023cc81dd4981363aaf78de9b36eecb0c51c3&dn=en_windows_8.1_pro_vl_with_update_x64_dvd_6050880.isoOr with Public Tracker Magnet Linkmagnet:?xt=urn:btih:12E023CC81DD4981363AAF78DE9B36EECB0C51C3&dn=en_windows_8.1_pro_vl_with_update_x64_dvd_6050880.iso&tr=http%3a%2f%2f94.228.192.98%2fannounce&tr=http%3a%2f%2fannounce.torrentsmd.com%3a6969%2fannounce&tr=udp%3a%2f%2ftracker.jamendo.com%3a80%2fannounce&tr=http%3a%2f%2fexodus.desync.com%3a6969%2fannounce&tr=http%3a%2f%2fretracker.local%2fannounce&tr=http%3a%2f%2ftracker.blazing.de%2fannounce&tr=udp%3a%2f%2ftracker.publicbt.com%3a80%2fannounce&tr=udp%3a%2f%2f10.rarbg.com%2fannounce&tr=udp%3a%2f%2fbt.rghost.net%3a80%2fannounce&tr=udp%3a%2f%2ftracker.token.ro%3a80%2fannounce&tr=udp%3a%2f%2ftracker.istole.it%3a80%2fannounceOr Multi Collection Magnet Link:magnet:?xt=urn:btih:2F7D04E7F4B3D29AEF3AB54D86016B47A80AE7B8&dn=Windows%208.1%20with%20Update%203%20%28English%29&tr=http%3a%2f%2fbt.nnm-club.info%3a2710%2f002e7cdbb48cbaace76c0eed6f2ec311%2fannounce Windows 8.1 Pro VL with Update (x86) - DVD (English) File: en_windows_8.1_pro_vl_with_update_x86_dvd_6050918.isoCRC-32: 4ce30039MD4: 04cb297e1704de7e7bf91280c8d652a8MD5: a4355ab46a40fd343deb0a534e4a4823SHA-1: e46f44cd74f812ec3fe2e854317a088e85322a68magnet:?xt=urn:btih:2c9f99876a177185ac17be522e9861f6485d159f&dn=en_windows_8.1_pro_vl_with_update_x86_dvd_6050918.isoOr with Public Tracker Magnet Linkmagnet:?xt=urn:btih:2C9F99876A177185AC17BE522E9861F6485D159F&dn=en_windows_8.1_pro_vl_with_update_x86_dvd_6050918.iso&tr=http%3a%2f%2f94.228.192.98%2fannounce&tr=http%3a%2f%2fannounce.torrentsmd.com%3a6969%2fannounce&tr=udp%3a%2f%2ftracker.jamendo.com%3a80%2fannounce&tr=http%3a%2f%2fexodus.desync.com%3a6969%2fannounce&tr=http%3a%2f%2fretracker.local%2fannounce&tr=http%3a%2f%2ftracker.blazing.de%2fannounce&tr=udp%3a%2f%2ftracker.publicbt.com%3a80%2fannounce&tr=udp%3a%2f%2f10.rarbg.com%2fannounce&tr=udp%3a%2f%2fbt.rghost.net%3a80%2fannounce&tr=udp%3a%2f%2ftracker.token.ro%3a80%2fannounce&tr=udp%3a%2f%2ftracker.istole.it%3a80%2fannounceOr Multi Collection Magnet Link:magnet:?xt=urn:btih:2F7D04E7F4B3D29AEF3AB54D86016B47A80AE7B8&dn=Windows%208.1%20with%20Update%203%20%28English%29&tr=http%3a%2f%2fbt.nnm-club.info%3a2710%2f002e7cdbb48cbaace76c0eed6f2ec311%2fannounce Windows 8.1 Enterprise with Update - DVD (English) File: en_windows_8.1_enterprise_with_update_x64_dvd_6054382.isoCRC-32: 524fc31eMD4: e5005b0d5943956c6bf60a2e436c5d58MD5: 115d7c4203417e52c09d16b50043b10dSHA-1: b7dd748446d89b9449a160cdc24bd282989bbd96magnet:?xt=urn:btih:a5051cf4aaf1e3f5a66ce44bbdd050f7142ed30d&dn=en%5Fwindows%5F8.1%5Fenterprise%5Fwith%5Fupdate%5Fx64%5Fdvd%5F6054382.iso&tr=udp://open.demonii.com:1337/announcemagnet:?xt=urn:btih:a5051cf4aaf1e3f5a66ce44bbdd050f7142ed30d&dn=en_windows_8.1_enterprise_with_update_x64_dvd_6054382.isoOr with Public Tracker Magnet Linkmagnet:?xt=urn:btih:A5051CF4AAF1E3F5A66CE44BBDD050F7142ED30D&dn=en_windows_8.1_enterprise_with_update_x64_dvd_6054382.iso&tr=http%3a%2f%2f94.228.192.98%2fannounce&tr=http%3a%2f%2fannounce.torrentsmd.com%3a6969%2fannounce&tr=udp%3a%2f%2ftracker.jamendo.com%3a80%2fannounce&tr=http%3a%2f%2fexodus.desync.com%3a6969%2fannounce&tr=http%3a%2f%2fretracker.local%2fannounce&tr=http%3a%2f%2ftracker.blazing.de%2fannounce&tr=udp%3a%2f%2ftracker.publicbt.com%3a80%2fannounce&tr=udp%3a%2f%2f10.rarbg.com%2fannounce&tr=udp%3a%2f%2fbt.rghost.net%3a80%2fannounce&tr=udp%3a%2f%2ftracker.token.ro%3a80%2fannounce&tr=udp%3a%2f%2ftracker.istole.it%3a80%2fannounceOr Multi Collection Magnet Link:magnet:?xt=urn:btih:2F7D04E7F4B3D29AEF3AB54D86016B47A80AE7B8&dn=Windows%208.1%20with%20Update%203%20%28English%29&tr=http%3a%2f%2fbt.nnm-club.info%3a2710%2f002e7cdbb48cbaace76c0eed6f2ec311%2fannounce Windows 8.1 Enterprise with Update (x86) - DVD (English) File: en_windows_8.1_enterprise_with_update_x86_dvd_6050710.isoCRC-32: 31592527MD4: 68d0bb22e86bd92263ebfda5ef9fad21MD5: ce18de710a9c025323b8dee823bfbe7bSHA-1: 584a9ad7e2bb3d7e189adcfba44a497cc9155937magnet:?xt=urn:btih:c6b8fd001232c5a4662ccad3b09d933710af6632&dn=en%5Fwindows%5F8.1%5Fenterprise%5Fwith%5Fupdate%5Fx86%5Fdvd%5F6050710.iso&tr=udp://open.demonii.com:1337/announcemagnet:?xt=urn:btih:c6b8fd001232c5a4662ccad3b09d933710af6632&dn=en_windows_8.1_enterprise_with_update_x86_dvd_6050710.isoOr with Public Tracker Magnet Linkmagnet:?xt=urn:btih:C6B8FD001232C5A4662CCAD3B09D933710AF6632&dn=en_windows_8.1_enterprise_with_update_x86_dvd_6050710.iso&tr=http%3a%2f%2f94.228.192.98%2fannounce&tr=http%3a%2f%2fannounce.torrentsmd.com%3a6969%2fannounce&tr=udp%3a%2f%2ftracker.jamendo.com%3a80%2fannounce&tr=http%3a%2f%2fexodus.desync.com%3a6969%2fannounce&tr=http%3a%2f%2fretracker.local%2fannounce&tr=http%3a%2f%2ftracker.blazing.de%2fannounce&tr=udp%3a%2f%2ftracker.publicbt.com%3a80%2fannounce&tr=udp%3a%2f%2f10.rarbg.com%2fannounce&tr=udp%3a%2f%2fbt.rghost.net%3a80%2fannounce&tr=udp%3a%2f%2ftracker.token.ro%3a80%2fannounce&tr=udp%3a%2f%2ftracker.istole.it%3a80%2fannounceOr Multi Collection Magnet Link:magnet:?xt=urn:btih:2F7D04E7F4B3D29AEF3AB54D86016B47A80AE7B8&dn=Windows%208.1%20with%20Update%203%20%28English%29&tr=http%3a%2f%2fbt.nnm-club.info%3a2710%2f002e7cdbb48cbaace76c0eed6f2ec311%2fannounce ---------------------------------- * N Edition(s) * ---------------------------------- Windows 8.1 N with Update (multiple editions) - DVD (English) File: en_windows_8.1_n_with_update_x64_dvd_6051677.isoCRC-32: 0c6a8abaMD4: a2dc46badcc9e7222a4ad685c4d7797eMD5: 233e312a97f03b35010b6dbbac9e6044SHA-1: 457d02bd26a19965da172daae78f985cf53af692magnet:?xt=urn:btih:2f8a84ed6884457d5630f40ecc4248fba77f77b6&dn=en_windows_8.1_n_with_update_x64_dvd_6051677.isomagnet:?xt=urn:btih:2F8A84ED6884457D5630F40ECC4248FBA77F77B6&dn=en_windows_8.1_n_with_update_x64_dvd_6051677.iso&tr=http%3a%2f%2f94.228.192.98%2fannounce&tr=http%3a%2f%2fannounce.torrentsmd.com%3a6969%2fannounce&tr=udp%3a%2f%2ftracker.jamendo.com%3a80%2fannounce&tr=http%3a%2f%2fexodus.desync.com%3a6969%2fannounce&tr=http%3a%2f%2fretracker.local%2fannounce&tr=http%3a%2f%2ftracker.blazing.de%2fannounce&tr=udp%3a%2f%2ftracker.publicbt.com%3a80%2fannounce&tr=udp%3a%2f%2f10.rarbg.com%2fannounce&tr=udp%3a%2f%2fbt.rghost.net%3a80%2fannounce&tr=udp%3a%2f%2ftracker.token.ro%3a80%2fannounce&tr=udp%3a%2f%2ftracker.istole.it%3a80%2fannouncemagnet:?xt=urn:btih:07F0BF62E1510171E9E4A477EDCBF0A75DAE84B2&dn=Windows%208.1%20N%20with%20Update%203%20%28English%29&tr=http%3a%2f%2fbt.nnm-club.info%3a2710%2f002e7cdb7ba87f9f4d7dde0bb759b601%2fannounce Windows 8.1 N with Update (multiple editions) (x86) - DVD (English) File: en_windows_8.1_n_with_update_x86_dvd_6051704.isoCRC-32: c54e74adMD4: e08c72c71ff802909962ec27830e94ebMD5: 19396aa74f220546f49bd7d912ae9613SHA-1: a2c2d9916a4aee87afdd0aea19459f2f8414737cmagnet:?xt=urn:btih:f2b86d30cde3d01553e74dedca57d4a2af03558b&dn=en_windows_8.1_n_with_update_x86_dvd_6051704.isomagnet:?xt=urn:btih:F2B86D30CDE3D01553E74DEDCA57D4A2AF03558B&dn=en_windows_8.1_n_with_update_x86_dvd_6051704.iso&tr=http%3a%2f%2f94.228.192.98%2fannounce&tr=http%3a%2f%2fannounce.torrentsmd.com%3a6969%2fannounce&tr=udp%3a%2f%2ftracker.jamendo.com%3a80%2fannounce&tr=http%3a%2f%2fexodus.desync.com%3a6969%2fannounce&tr=http%3a%2f%2fretracker.local%2fannounce&tr=http%3a%2f%2ftracker.blazing.de%2fannounce&tr=udp%3a%2f%2ftracker.publicbt.com%3a80%2fannounce&tr=udp%3a%2f%2f10.rarbg.com%2fannounce&tr=udp%3a%2f%2fbt.rghost.net%3a80%2fannounce&tr=udp%3a%2f%2ftracker.token.ro%3a80%2fannounce&tr=udp%3a%2f%2ftracker.istole.it%3a80%2fannouncemagnet:?xt=urn:btih:07F0BF62E1510171E9E4A477EDCBF0A75DAE84B2&dn=Windows%208.1%20N%20with%20Update%203%20%28English%29&tr=http%3a%2f%2fbt.nnm-club.info%3a2710%2f002e7cdb7ba87f9f4d7dde0bb759b601%2fannounce Windows 8.1 N Pro VL with Update - DVD (English) File: en_windows_8.1_pro_n_vl_with_update_x64_dvd_6050969.isoCRC-32: 7fd3792dMD4: d7cf74125c320da14a941051d2afa372MD5: a047785bb6185dc77ee704f3504bda2cSHA-1: 169b23ac9f222426741f260607e090f327c03021magnet:?xt=urn:btih:b55e8fcac6e9a3ed828fcc906e4a844e85036461&dn=en_windows_8.1_pro_n_vl_with_update_x64_dvd_6050969.isomagnet:?xt=urn:btih:B55E8FCAC6E9A3ED828FCC906E4A844E85036461&dn=en_windows_8.1_pro_n_vl_with_update_x64_dvd_6050969.iso&tr=http%3a%2f%2f94.228.192.98%2fannounce&tr=http%3a%2f%2fannounce.torrentsmd.com%3a6969%2fannounce&tr=udp%3a%2f%2ftracker.jamendo.com%3a80%2fannounce&tr=http%3a%2f%2fexodus.desync.com%3a6969%2fannounce&tr=http%3a%2f%2fretracker.local%2fannounce&tr=http%3a%2f%2ftracker.blazing.de%2fannounce&tr=udp%3a%2f%2ftracker.publicbt.com%3a80%2fannounce&tr=udp%3a%2f%2f10.rarbg.com%2fannounce&tr=udp%3a%2f%2fbt.rghost.net%3a80%2fannounce&tr=udp%3a%2f%2ftracker.token.ro%3a80%2fannounce&tr=udp%3a%2f%2ftracker.istole.it%3a80%2fannouncemagnet:?xt=urn:btih:07F0BF62E1510171E9E4A477EDCBF0A75DAE84B2&dn=Windows%208.1%20N%20with%20Update%203%20%28English%29&tr=http%3a%2f%2fbt.nnm-club.info%3a2710%2f002e7cdb7ba87f9f4d7dde0bb759b601%2fannounce Windows 8.1 N Pro VL with Update (x86) - DVD (English) File: en_windows_8.1_pro_n_vl_with_update_x86_dvd_6051127.isoCRC-32: 1afbb41cMD4: 4b2816dc9058017de71085017833a770MD5: 36cfcecf1c7817976a2f42d06092b617SHA-1: ea571feb0ad31f1daa4916f161dc87416d8690camagnet:?xt=urn:btih:6dc4a106185e640a67d0105af951f63b21576eb9&dn=en_windows_8.1_pro_n_vl_with_update_x86_dvd_6051127.isomagnet:?xt=urn:btih:6DC4A106185E640A67D0105AF951F63B21576EB9&dn=en_windows_8.1_pro_n_vl_with_update_x86_dvd_6051127.iso&tr=http%3a%2f%2f94.228.192.98%2fannounce&tr=http%3a%2f%2fannounce.torrentsmd.com%3a6969%2fannounce&tr=udp%3a%2f%2ftracker.jamendo.com%3a80%2fannounce&tr=http%3a%2f%2fexodus.desync.com%3a6969%2fannounce&tr=http%3a%2f%2fretracker.local%2fannounce&tr=http%3a%2f%2ftracker.blazing.de%2fannounce&tr=udp%3a%2f%2ftracker.publicbt.com%3a80%2fannounce&tr=udp%3a%2f%2f10.rarbg.com%2fannounce&tr=udp%3a%2f%2fbt.rghost.net%3a80%2fannounce&tr=udp%3a%2f%2ftracker.token.ro%3a80%2fannounce&tr=udp%3a%2f%2ftracker.istole.it%3a80%2fannouncemagnet:?xt=urn:btih:07F0BF62E1510171E9E4A477EDCBF0A75DAE84B2&dn=Windows%208.1%20N%20with%20Update%203%20%28English%29&tr=http%3a%2f%2fbt.nnm-club.info%3a2710%2f002e7cdb7ba87f9f4d7dde0bb759b601%2fannounce Windows 8.1 Enterprise N with Update - DVD (English) File: en_windows_8.1_enterprise_n_with_update_x64_dvd_6050225.isoCRC-32: 7b73f762MD4: 7700c9878a61eeb98c8a0754d3c0a8f8MD5: 3dd3707820473dfa2adff73b2c44d4f3SHA-1: 33e141a1a7f02b4b3b4f590fb5ae47b71f18c3b8magnet:?xt=urn:btih:55208160763ccd10206f8952a96991835fc78e4f&dn=en%5Fwindows%5F8.1%5Fenterprise%5Fn%5Fwith%5Fupdate%5Fx64%5Fdvd%5F6050225.iso&tr=udp://open.demonii.com:1337/announcemagnet:?xt=urn:btih:55208160763ccd10206f8952a96991835fc78e4f&dn=en_windows_8.1_enterprise_n_with_update_x64_dvd_6050225.isomagnet:?xt=urn:btih:55208160763CCD10206F8952A96991835FC78E4F&dn=en_windows_8.1_enterprise_n_with_update_x64_dvd_6050225.iso&tr=http%3a%2f%2f94.228.192.98%2fannounce&tr=http%3a%2f%2fannounce.torrentsmd.com%3a6969%2fannounce&tr=udp%3a%2f%2ftracker.jamendo.com%3a80%2fannounce&tr=http%3a%2f%2fexodus.desync.com%3a6969%2fannounce&tr=http%3a%2f%2fretracker.local%2fannounce&tr=http%3a%2f%2ftracker.blazing.de%2fannounce&tr=udp%3a%2f%2ftracker.publicbt.com%3a80%2fannounce&tr=udp%3a%2f%2f10.rarbg.com%2fannounce&tr=udp%3a%2f%2fbt.rghost.net%3a80%2fannounce&tr=udp%3a%2f%2ftracker.token.ro%3a80%2fannounce&tr=udp%3a%2f%2ftracker.istole.it%3a80%2fannouncemagnet:?xt=urn:btih:07F0BF62E1510171E9E4A477EDCBF0A75DAE84B2&dn=Windows%208.1%20N%20with%20Update%203%20%28English%29&tr=http%3a%2f%2fbt.nnm-club.info%3a2710%2f002e7cdb7ba87f9f4d7dde0bb759b601%2fannounce Windows 8.1 Enterprise N with Update (x86) - DVD (English) File: en_windows_8.1_enterprise_n_with_update_x86_dvd_6050217.isoCRC-32: 3d8eee43MD4: b4007d7e4b7688ac036b5f090c418d92MD5: 826a4b6107f78e1e3310185534dc5155SHA-1: e4651c6ed8b6e5ad30da429a1dfb4be8760504f0magnet:?xt=urn:btih:a867941e07ad4f6e2e880b0850d8cd2181342921&dn=en%5Fwindows%5F8.1%5Fenterprise%5Fn%5Fwith%5Fupdate%5Fx86%5Fdvd%5F6050217.iso&tr=udp://open.demonii.com:1337/announcemagnet:?xt=urn:btih:a867941e07ad4f6e2e880b0850d8cd2181342921&dn=en_windows_8.1_enterprise_n_with_update_x86_dvd_6050217.isomagnet:?xt=urn:btih:A867941E07AD4F6E2E880B0850D8CD2181342921&dn=en_windows_8.1_enterprise_n_with_update_x86_dvd_6050217.iso&tr=http%3a%2f%2f94.228.192.98%2fannounce&tr=http%3a%2f%2fannounce.torrentsmd.com%3a6969%2fannounce&tr=udp%3a%2f%2ftracker.jamendo.com%3a80%2fannounce&tr=http%3a%2f%2fexodus.desync.com%3a6969%2fannounce&tr=http%3a%2f%2fretracker.local%2fannounce&tr=http%3a%2f%2ftracker.blazing.de%2fannounce&tr=udp%3a%2f%2ftracker.publicbt.com%3a80%2fannounce&tr=udp%3a%2f%2f10.rarbg.com%2fannounce&tr=udp%3a%2f%2fbt.rghost.net%3a80%2fannounce&tr=udp%3a%2f%2ftracker.token.ro%3a80%2fannounce&tr=udp%3a%2f%2ftracker.istole.it%3a80%2fannouncemagnet:?xt=urn:btih:07F0BF62E1510171E9E4A477EDCBF0A75DAE84B2&dn=Windows%208.1%20N%20with%20Update%203%20%28English%29&tr=http%3a%2f%2fbt.nnm-club.info%3a2710%2f002e7cdb7ba87f9f4d7dde0bb759b601%2fannounce ---------------------------------- * Windows 8.1 Language Pack with Update (Multiple Languages) * ---------------------------------- Languages: English, Japanese, Korean, Arabic, Bulgarian, Czech, Danish, German, Greek, Spanish, Estonian, Finnish, French, Hebrew, Croatian, Hungarian, Italian, Lithuanian, Latvian, Dutch, Norwegian, Polish, Portuguese-Brazil, Romanian, Russian, Slovak, Slovenian, Serbian, Swedish, Thai, Turkish, Ukrainian, Chinese - Hong Kong SAR, Chinese - Simplified, Portuguese-Portugal Windows 8.1 Language Pack with Update - DVD (Multiple Languages) File Name: mu_windows_8.1_language_pack_with_update_x64_dvd_6066963.isoSHA1: 70940468031652C3E7384AB92D4F7969FBF5A004magnet:?xt=urn:btih:BFCC5C9B8D97F4758622025E92F70FE970663726magnet:?xt=urn:btih:B21CC217C3A836FD12E57F3BCC7CFD72E8996A2Cmagnet:?xt=urn:btih:BFCC5C9B8D97F4758622025E92F70FE970663726&dn=mu_windows_8.1_language_pack_with_update_x64_dvd_6066963.iso&tr=http%3a%2f%2fannounce.torrentsmd.eu%3a6969%2fannounce.php%3fpasskey%3d1d5007ada34c95a6523ba4e4458cd7ec&tr=udp%3a%2f%2ftracker.publicbt.com%3a80%2fannounce&tr=udp%3a%2f%2ftracker.openbittorrent.com%3a80%2fannounce&tr=http%3a%2f%2fannounce.torrentsmd.me%3a8080%2fannounce.php%3fpasskey%3d1d5007ada34c95a6523ba4e4458cd7ec Windows 8.1 Language Pack with Update (x86) - DVD (Multiple Languages) File Name: mu_windows_8.1_language_pack_with_update_x86_dvd_6066964.isoSHA1: B6EAC4C1F57493C5B6F67A20A214BF4B0B62BF59magnet:?xt=urn:btih:5BECDDB1EA903A24BCA157EC843FFD35010E8C0Bmagnet:?xt=urn:btih:B21CC217C3A836FD12E57F3BCC7CFD72E8996A2Cmagnet:?xt=urn:btih:5BECDDB1EA903A24BCA157EC843FFD35010E8C0B&dn=mu_windows_8.1_language_pack_with_update_x86_dvd_6066964.iso&tr=http%3a%2f%2fannounce.torrentsmd.eu%3a6969%2fannounce.php%3fpasskey%3d1d5007ada34c95a6523ba4e4458cd7ec&tr=udp%3a%2f%2ftracker.publicbt.com%3a80%2fannounce&tr=udp%3a%2f%2ftracker.openbittorrent.com%3a80%2fannounce&tr=http%3a%2f%2fannounce.torrentsmd.me%3a8080%2fannounce.php%3fpasskey%3d1d5007ada34c95a6523ba4e4458cd7ec ------- * Windows Server 2012 R2 with Update [November 2014 Rollup] - MSDN Edition(s) * -------- [English l Release Date: 12/15/2014] Hash Check Via MSDN: http://msdn.microsoft.com/en-us/subscriptions/downloads/default.aspx#searchTerm=Windows%20Server%202012%20R2&ProductFamilyId=0&Languages=en&PageSize=10&PageIndex=0&FileId=0 Windows Server 2012 R2 Installations-Keys: Windows Server 2012 R2 with Update (x64) - DVD (English) Windows Server 2012 R2 VL with Update (x64) - DVD (English) Windows Storage Server 2012 R2 & Windows Server 2012 R2 Foundation with Update x64 DVD (English) Windows Server 2012 R2 Essentials with Update (x64) - DVD (English) --------------------------------- * Windows Server 2012 R2 Language Pack with Update (Multiple Languages) * ---------------------------------- Languages: Windows Server 2012 R2 Language Pack with Update (x64) - DVD (Multiple Languages) ---------------------------- * Windows Embedded 8.1 Industry with Update Edition(s)* ---------------------------------- Windows Embedded 8.1 Industry Installations-Keys: Embedded=6Q7P9-NFD2F-7JGQR-3X277-9BQMREmbeddedEval=VV6W8-NF7BJ-FKHGQ-P424D-FHC7KEmbeddedAutomotive=J2ND2-BCW98-8669Y-HPBF3-RDY99EmbeddedE=MNKW8-HYCCD-G88JY-283WV-W9FX9EmbeddedEEval=VKKC6-NQQQH-JW3QX-XRVKX-KJJK9EmbeddedIndustry=GN7VX-YKPC2-XY98J-9RYKX-KP9HVEmbeddedIndustryA=TP7MN-9H7FK-P4PJM-K6KJT-Y97RYEmbeddedIndustryE=NDXXJ-YX29Q-JDY6B-C93G8-TQ6WHEmbeddedIndustryEEval=PPBKC-NQYJM-JJ8X6-26W42-VFQ4REmbeddedIndustryEval=XDJ76-KNBM8-BB9BK-B4CHH-XD6VRAll Edition Installation Keys: http://pastebin.com/M5VV6750 Windows Embedded 8.1 Industry Enterprise & Pro with Update (x64/x32) - DVD (English) magnet:?xt=urn:btih:e4697090636dd157ab6e1eab46fc3ce7bdb06de6 magnet:?xt=urn:btih:E4697090636DD157AB6E1EAB46FC3CE7BDB06DE6&dn=en_Windows_8.1_Embedded_with_Update_3&tr=http%3a%2f%2f94.228.192.98%2fannounce&tr=http%3a%2f%2fannounce.torrentsmd.com%3a6969%2fannounce&tr=udp%3a%2f%2ftracker.jamendo.com%3a80%2fannounce&tr=http%3a%2f%2fexodus.desync.com%3a6969%2fannounce&tr=http%3a%2f%2fretracker.local%2fannounce&tr=http%3a%2f%2ftracker.blazing.de%2fannounce&tr=udp%3a%2f%2ftracker.publicbt.com%3a80%2fannounce&tr=udp%3a%2f%2f10.rarbg.com%2fannounce&tr=udp%3a%2f%2fbt.rghost.net%3a80%2fannounce&tr=udp%3a%2f%2ftracker.token.ro%3a80%2fannounce&tr=udp%3a%2f%2ftracker.istole.it%3a80%2fannounce Credit & Thanks to: Threat, GezoeSloog, Paul [MDL]ru-board, NNM-Club also every nsane members contributing download links & discussion. : ) Some Of the Important Direct l Magnet l Torrent Download Links: * Be caution some links may be removed or Remote Upload may fail to order to get the original MSDN Hash etc... *
  4. The vulnerability can further be used to conduct a denial-of-service attack on a machine. This is the fourth Windows zero-day discovered in last five months. A new zero-day vulnerability in the Windows operating system has been discovered recently. This is the fourth Windows zero-day discovered in last five months and it could allow attackers to overwrite a targeted file with random data. The exploit code of the vulnerability is published on GitHub by a security researcher who goes by the name of SandboxEscaper. By running the Proof-of-Concept (PoC), the researcher had managed to overwrite ‘pci.sys’ - by collecting software and hardware problems through the Windows Error Reporting (WER) event-based feedback infrastructure. ‘Pci.sys’ is a system component that helps in correctly booting the operating system. Limitations of the attack The exploit code published on GitHub works with some limitations. The researcher said that zero-day vulnerability discovered does not affect the CPU and that it takes a while to produce an effect on targeted systems. Explaining the reason behind this delay, SandboxEscaper said the bug relies on a race condition and other operations for the executing an attack. The impact of the vulnerability was confirmed by Will Dorman, a vulnerability analyst at CERT/CC, after he was able to reproduce the bug on a Windows 10 system - build 17134. Impact Since the target is ‘pci.sys’, SandboxEscaper highlights that the vulnerability can further be used to conduct a denial-of-service attack on a machine. It can also be used to disable third-party AV software. SandboxEscaper has informed Microsoft Security Response Center(MSRC) about the new bug. This is the second bug discovered by the researcher in this month. On December 19, SandboxEscaper had published a PoC of third zero-day vulnerability that could allow hackers to read protected files. source
  5. What are these 2 small blue arrow overlays which appear on desktop icons? If you have noticed an icon with 2 small blue overlays, then know that it has been placed there by the Windows OS to indicate that the file or folder has been compressed to save disk space. If you are looking for a way to remove these two blue compression arrows on desktop icons, then this post will show you how to do it. My younger daughter recently brought this to my notice and so I decided to write about it. 2 small blue overlays which appear on desktop icons You may have noticed several icons in your Windows operating system which have an overlay icon on it. This could be the most common overlay arrow icon, which indicates that the icon is a shortcut icon; or it could be a padlock icon, which would indicate that you have a private item in a non-private directory. Two small blue arrows on the top right corner of the icon indicate a compressed file or folder. To save disk space, the Windows operating system allows you to compress files and folders. When you compress a file, using the Windows File Compression function, the data is compressed using an algorithm, and re-written to occupy lesser space. When you access that file again, the data has to be again decompressed first before you can access it. Thus reading compressed files require more time and consume processing power too. The compression behavior is as follows: If you move a file from a DIFFERENT NTFS drive into a compressed folder, it is also compressed. If you move a file from the SAME NTFS drive into a compressed folder, the file retains its original state, either compressed or uncompressed. The 2-arrows can appear if you compressed the folder or file, or if you moved the file or folder into a compressed folder. Remove two blue compression arrows on desktop icons You have two ways of removing this icon overlay. The first is to decompress the file or folder and the other to prevent Windows from displaying this overlay icon even when the folder is compressed. In the latter case, you will not know simply by looking at the icon if the item is compressed or not and that could be a disadvantage. 1] Decompress via Properties To decompress a file or a folder, right-click on and the file or folder and under the General tab, select Advanced. Here uncheck the option to Compress contents to save disk space and click Apply/OK. Windows will start un-compressing the contents and the 2-arrows will disappear. 2] Registry method Before you begin, create a System Restore Point first. Now to remove the 2-arrows overlay icon, you will have to open Registry Editor. To do so, press Win+R in combination. In the empty field of the Run dialog box that appears on your computer screen, type regedit and hit Enter. When the Registry Editor opens, navigate to the following location: Please note that, if the Shell Icons key does not exist, you will have to create it. To do so, select File Explorer, right-click Explorer, chose New and select ‘Key’ from the options displayed, and name the key as Shell Icons. If you already have Shell Icons, you will see a string 179 in the right panel of your window screen. If not, create a new String Value and name it 179. Now set its Value Data to the full path of a blank icon file. You will have to create a blank or transparent .ico file of size, or you can download this one from our servers and use it. Now, for removing the 2-arrows Icon Overlay, edit the string value 179 and insert the path of the blank .ico file you want to use. At any point in time, if you would like to restore to original settings, then simply delete the 179 String. Source
  6. IT administrators certainly know that restricting the access certain users or user categories have in Windows 10 is a must, especially because the changes they could make may eventually affect system performance and stability. Setting up the level of access could even come in handy on home systems with more than one user account, though it goes without saying that this method is mostly used within large corporate networks. When trying to access files they aren’t allowed to load, users are provided with an access denied error, typically instructing them to get in touch with the system administrator. Windows comes with further settings in this regard, including options to customize the access denied message with all kinds of content, including even links which they would have to click to request access. First and foremost, let’s see where this option is located. You need to launch the Group Policy Editor by typing gpedit.msc in the Start menu and then navigate to this path:Computer Configuration > Administrative Templates > System > Access-Denied Assistance Without any tweaks, there are two different policies on the right side of the screen, and the one you’re going to use is called:Customize message for Access Denied errors By default, this policy is set to Not Configured, so you to double-click it to change its status. By enabling it, you can create a customized message that is displayed when users get an access denied error, with additional parameters (which you must set up) in the lower part of the screen. Microsoft explains in the description of the policy: “This policy setting specifies the message that users see when they are denied access to a file or folder. You can customize the Access Denied message to include additional text and links. You can also provide users with the ability to send an email to request access to the file or folder to which they were denied access.” Once enabled, the policy unlocks additional customization options, including setting up your own message to be displayed to users. There’s a dedicated setting to enable users to request assistance. As said, users can even send an email to IT admins in order to request access to the files they’re trying to open, and you can set up your own email that would be automatically used as the default template for this purpose. This option comes with its very own configuration settings, and you can set up the email recipient and email parameters, like including user and device claims and logging all messages in the Application and Services event log. If you don’t configure this setting, Windows will use the default access denied message, so keep this in mind if you’re planning to set up restrictions on the devices in your network. “If you do not configure this policy setting, users see a standard Access Denied message unless the file server is configured to display the customized Access Denied message. By default, users see the standard Access Denied message,” Microsoft explains. This policy was originally introduced in Windows 8, and it is also available in Windows RT (which is obviously a thing of the past already), Windows Server 2012, and newer OS versions like Windows 10. Setting up the policy that does require a system reboot and all the changes are applied automatically. Keep in mind that the restricted access must be enabled before activating this policy, alongside the assistance service. To do this, enable the policy called Enable access-denied assistance on client for all file types in the same location as the one mentioned above. Source
  7. Here are some of our top picks from the flurry of announcements coming out of CES 2019. DAN THORP-LANCASTER 10 Jan 2019 10 Look, the annual Consumer Electronics Show (CES) is never an easy thing to keep up with. With virtually every big tech brand under the sun arriving in Las Vegas with an onslaught of announcements (heck, even Apple made an appearance this year, albeit by proxy), it can prove to be a mind-melting experience just trying to take it all in. Luckily, we've been keeping track of every big announcement for Windows fans. And all told, CES 2019 has proven to be a blockbuster year for PC brands, particularly if you're into gaming. From VR innovations to huge gaming displays and a virtual torrent of new gaming laptops, here are our top 10 announcements for PC users from CES 2019, in no particular order. NVIDIA brings GeForce RTX graphics to laptops NVIDIA had one of the biggest keynotes to kick off the week, revealing what gamers had been anticipating for some time: GeForce RTX 20-series graphics chips are coming to laptops. Like their desktop counterparts, the RTX chips for laptops are based on NVIDIA's new Turing architecture. They also add support for real-time ray tracing, which heavily improves the realism of lighting in games that support it. That's in addition to cores dedicated to assisting with real-time rendering and image processing, along with an added dose of AI magic. Gamers should be able to pick up laptops sporting RTX graphics starting January 29, when machines packing RTX 2060 (which just made its desktop debut as well), RTX 2070, and RTX 2080 graphics are expected to launch. All three should boast significant performance increases over even their desktop-class GTX predecessors, giving gamers on the go an extra chunk of horsepower. Gaming laptops galore With the reveal of NVIDIA's GeForce RTX 20-series graphics for notebooks, manufacturers came out of the woodwork to announce laptops sporting the new chips. Some of the most impressive laptops on display were the Razer Blade 15 Advanced, MSI's GS75 Stealth, and the new ASUS ROG Zephyrus S GX701. Dell even got in on the game with an overhaul of its relatively affordable G5 and G7 laptops And if you were looking for this year's oddball standout, look no further than the ASUS Mothership, a gaming behemoth that somehow combines a ton of power with a detachable form factor reminiscent of Microsoft's Surface Pro. AMD throws down the gaming gauntlet Not content to sit back while NVIDIA soaked up all of the gaming fun, AMD had a big announcement of its own: the Radeon VII. While it doesn't support the same ray-tracing tech that has been a hot item with NVIDIA's RTX series, the Radeon VII represents the first 7nm gaming GPU to hit the market. Packed with 60 computer units running at up to 1.8GHz and 16GB of high-performance VRAM, the Radeon VII manages to achieve similar framerates as the GeForce RTX 2080 in popular games, while beating it out in some cases. In addition, the 7nm process that the Radeon VII chip is built on allows AMD to achieve up to 25 percent more performance than its predecessors without increasing its power draw, according to the company. Efficiency and power are the key terms here, and you'll be able to check it out for yourself soon. The Radeon VII is expected to go on sale on February 7, 2019, for $700. Laptop stunners While gaming laptops received the lion's share of attention this CES, there were plenty of stunning regular laptops to get excited about, as well. LG unveiled a couple of innovative updates to its gram lineup, including the incredibly light 17-inch gram and the new 2-in-1 gram 14 – a first for the range. Huawei was dressed to impress with the new MateBook 13, which could give the MacBook Air a run for its money in the style department. Meanwhile, Lenovo adopted some sleek styling of its own with the new Yoga S940, a traditional laptop that features tiny bezels around a stunning 4K display and Dolby Atmos support. Equally impressive was the ASUS StudioBook S, which manages to jam a 17-inch display into a 15-inch chassis. Oh, and for fans of Dell's XPS range, you finally won: the latest XPS 13 has moved the webcam above the screen. Intel teases 'Ice Lake' innovation If you were hoping to get a glimpse of what the future will hold for Intel's lineup of chips, the company didn't disappoint at CES 2019. During its keynote this week, Intel offered a peek at its upcoming "Ice Lake" processors, detailing new features coming with the move to the 10nm chips. Perhaps the biggest change is that Ice Lake chips will include native support for Thunderbolt 3 on the system on a chip (SoC) for the first time. Also included is support for Wi-Fi 6, the next-generation 802.11ax Wi-Fi standard that is only now starting to populate the market. Additionally, Ice Lake will include Gen 11 integrated graphics and special tweaks for machine learning tasks. Intel didn't stop there, though. The company revealed its new Project Athena initiative, which is ill-defined at the moment. According to Intel, the project is similar to its push to make "Ultrabook" a household name a few years ago, and it's using Project Athena as a rallying point to push its PC partners to develop the "future of mobile computing." The company also teased a new hybrid CPU it is working on, which combines high-powered cores with several low-powered cores to more efficiently handle computing tasks. The end result is a set of smaller chips living on the smallest motherboard Intel has created, which the company hopes will eventually find its way into innovative dual-screen devices and more. Oh, and if you're looking for more near-term initiatives, Intel is set to bring its 9th Gen Core processors to laptops during the second quarter of 2019. Ice Lake, meanwhile, is expected to arrive toward the end of 2019, as long as delays don't get in the way. Alienware stuffs desktop parts in a monster laptop We've already covered the cavalcade of gaming laptops that marched through CES 2019, but Dell's latest Alienware monster deserves its own spot. The new Alienware Area-51m is what you'd get if you stuffed a desktop PC into a laptop chassis. The goal with the Area-51m was to make absolutely everything user-upgradable, and Dell set out designing the laptop with that in mind. Inside, you'll find desktop-class processors and NVIDIA's latest RTX graphics for laptops, both of which can be upgraded. And that's not all; the RAM and storage drives can be swapped out, and Dell constructed the PC in a way that makes it easy to do just that, with smart labeling and easily accessible parts. Aside from its impressive components, the Area-51m just looks plain cool. Dell says that it was designed using a new "Industrial" design language, and it sports clean lines and neat lighting effects. So long as you're OK with what is bound to be terrible battery life, a chunky exterior, and the Area-51m's decidedly beefy 8.51-pound weight, it's quite intriguing. The Alienware Area-51m is expected to launch on January 29 for $2,550. Massive gaming displays When is a monitor just a TV by another name? That's a question that was sure to pop into many a mind when looking at HP's new Omen X Emperium display, a 65-inch gaming monitor with a matching soundbar. The massive display checks all of the boxes gamers will care about: 144Hz, G-Sync, 4K, and HDR. Whether you're gaming or checking out the latest episodes of your favorite shows on Netflix, the Omen X Emperium X can, at least on paper, fit the bill. Oh, and there's one more thing: HP designed a matching soundbar for the Omen X Emperium. Locking in just below the display, the soundbar packs three stereo amps at 120 watts, along with Low-Frequency Array tech that HP says should eliminate the need for a separate subwoofer. Just don't expect this thing to come cheap. HP is expected to launch the Omen X Emperium in February for a whopping $5,000. Dell brings your phone into VR While it had a lot of hardware to show off at CES, Dell has also been busy tweaking its software. The highlight from the show is Dell Mobile Connect, which will soon let you interact with your phone in VR. And we're not talking just responding to notifications. Dell Mobile Connect in VR will let you interact with your whole phone UI. That means, if you're grinding away with a particularly tough game in VR but need to take a break to check Twitter or send a text, there's no need to pull your headset off. Rather, Dell Mobile Connect will let you bring up your full phone UI on screen and interact with any apps just as you would holding your phone. Dell isn't giving any indication as to when the next version of Dell Mobile Connect with this VR wizardry will be available, but it should be coming "soon." Lenovo makes a cheaper Surface Studio One of the biggest barriers to entry for Microsoft's impressively sleek Surface Studio is its price. But as long as you're not a Microsoft hardware diehard, Lenovo may now have an alternative: the Yoga A940. There are two main things that make the Yoga A940 an incredibly intriguing alternative to the Surface Studio. First, its price: the PC starts at $2,350, which undercuts the Surface Studio by $1,150. Second, the Yoga A940 comes sporting a full desktop-class Intel Core i7-8700 processor, which is a big step up from the laptop-class processor in the Surface Studio. Available with a 27-inch Dolby Vision-capable display in either QHD or 4K options, the Yoga A940 packs a similar rotating arm mechanism as the Surface Studio. That allows artists to lower the display into position for drafting or sketching with an included pen. And while the AMD Radeon RX 560 graphics won't blow the pants off of any games, it is perfectly viable for creative applications. One of the other little tidbits that make the A940 interesting is the Lenovo Precision Dial, a Surface Dial-like device that can be plugged into either the right or left side of the display and can be used to toggle settings in apps, scroll, and much more. As a little bonus, the side of the A940 has a dedicated Qi charging pad for your phone and a holder for the pen. The Lenovo Yoga A940 is expected to hit stores in March. HTC debuts exciting innovations for Vive Lastly, HTC had a couple of new and interesting products to show off that should get VR fans salivating. The first is the HTC Vive Cosmos, a new VR headset that features inside-out tracking. That means, at least with the Vive Cosmos, you'll no longer have to set up base stations around your room. Instead, the Vive Cosmos can track your position and movement using cameras mounted on the headset itself. The goal with the Vive Cosmos, HTC said, was to create a headset that could be used almost anywhere. And while the company didn't explicitly say so, that statement left speculation open that the headset could eventually work with a phone instead of requiring a gaming PC. The other big announcement HTC had ready was the Vive Pro Eye, which takes a Vive Pro headset and adds "foveated rendering." Essentially, this is a revamped Vive Pro that sports a number of sensors inside to track your eyes. Foveated rendering is a graphics trick that allows your PC to draw what you're looking at in high quality, freeing up more resources by ramping down the quality on what you're not looking at. That technique could allow lower-powered graphics cards to run intense experiences, while more capable graphics cards could make what you're seeing look even better. With the eye-tracking sensors, developers can also create experiences that track exactly what you're looking at and respond accordingly. There's no release date set for either the Vive Pro Eye or Vive Cosmos just yet, but the Cosmos is expected to get a price and release date later in 2019. source
  8. Cortana has become a somewhat unwelcome feature in Windows 10, and Microsoft has been making increasing moves to distance themselves from their own voice assistant. The latest is disabling the Cortana voice-over when setting up Windows 10 for the first time in an enterprise setting. The changelog for Windows 10 Insider Preview Build 18309 notes: It appears the feature will still be available for Home users. The cacophony of PCs being set up automatically all reciting the same Cortana phrases has been a running joke this last year. Experience the horror in full below. Source
  9. I need some method to record my windows screen. I am taking CA classes online which doesn;t allow me to watch a video more than 5 times. I am not planning to sell their video classes but I think I should be able to watch some classes in case I am unable to understand any part clearly. The problem is everytime I login to software using login credentials, it automatically closes all running apps and doesn't allow to run anything else until I close the software running classes videos. I tried several screen recording softwares (camtasia, snagit, OBS Studio etc) and none worked. I dona't have a good video camera or I would have recorded using cam. Any Tips to record??
  10. If you need to reinstall, upgrade, or set up a new device with Windows 10, a clean installation is your best choice If you need to reinstall, upgrade, or set up a new device with Windows 10, a clean installation is your best choice – Here's why and how to do it. On Windows 10, a clean installation is the best option to remove everything from the hard drive and start from scratch when your device is having performance and other issues. Using this process, you can quickly resolve startup and shut down problems as well as memory usage and apps issues. In addition, you can quickly get rid of viruses and other types of malware, fix system corruption and improve battery life. If you're upgrading from a previous version, a clean installation is also a good method to install the new version. Although there are several ways to upgrade, they usually don't work correctly, and they may bring unwanted settings, files, and apps to the new installation. It's also a useful choice to start fresh with a copy of Windows 10 on a new hard drive that you just replaced, or to set up a new device that came pre-installed with a lot of bloatware. In this Windows 10 guide, we'll walk you through the steps to properly prepare and perform a clean installation, whether you're upgrading to the latest version of Windows 10 (October 2018 Update), or you're moving from a previous version, including from Windows 8.1 or Windows 7. Update December 6, 2018:We've updated this article with the latest information for the Windows 10 October 2018 Update. How to prepare a device before installation How to create a USB bootable media of Windows 10 How to perform a clean installation of Windows 10 How to prepare a device before installation Although the installation isn't a complicated process, there are a number of steps you want to follow for a smooth and successful installation, including backing up your files, downloading essential drivers, making sure that your device can boot from USB, and more. Backing up your device and data The installation process will delete everything on the primary hard drive of your computer, as such it's a good idea to create a backup of your files before proceeding. You can do this by making sure to upload your files to OneDrive or to the cloud storage service that you prefer. Or you can simply copy the files that you want to restore in the new installation to an external storage. To make a backup of your files, connect an external removable drive, and use these steps: Open Internet Explorer. Click on This PC from the left pane. Browse to the following path: C:\Users Right-click the user folder you want to backup and select the Copy option. Browse to the location of the removable storage. Right-click the select the Paste option. Once you've completed the steps, if you're sharing your device with multiple people, repeat step No. 4, 5, and 6 to copy the remaining folders to the external storage. Also, make a note of the apps you have installed, and make sure to have the product keys to reinstall them again (if applicable). If you're not already saving your passwords and bookmarks in the cloud, it's a good idea to export your web browser links and online services credentials as well. Downloading device drivers While the setup process does a pretty good job detecting and installing the necessary drivers, you also want to download the latest drivers for devices, such as for your graphics card, wireless, and Ethernet adapter in case they may not get detected. You can use this guide to install device drivers on Windows 10. Also, here's a list with some of the most common computer manufacturer's support websites to download the latest drivers: Dell. HP. Lenovo. ASUS. Acer. MSI. Samsung. Knowing Windows 10 system requirements If you're trying to upgrade an older version of Windows 10, it's likely that the new release will be compatible with your hardware. However, if you're trying to install Windows 10 on a computer running Windows 8.1, Windows 7, Vista, or XP, you need to make sure that your device meets the minimum hardware requirements. Windows 10 minimum hardware requirements are as follows: Processor: 1GHz or SoC (System on a Chip). Memory: 1GB for 32-bit or 2GB for 64-bit. Storage: 16GB for 32-bit or 20GB for 64-bit. Graphics card: DirectX 9 or later with WDDM 1.0 driver. Display: 800x600. An internet connection is also recommended, but not a requirement to download and install updates. However, if you're using Windows 10 on S mode, you'll need an internet connection to complete the out-of-box experience (OOBE). Checking Windows 10 activation If you're trying to install a feature update or start fresh with a clean installation on a device that's already running Windows 10, you don't need to re-enter a product key during the setup. Windows 10 will re-activate automatically using an internet connection after the installation. However, your device will re-activate only if it was previously properly activated. You can use these steps to confirm that your copy of Windows 10 is activated: Open Settings. Click on Update & Security. Click on Activation. Under the "Windows" section, confirm that your license is activated. Getting a product key In the case that you're planning to install the OS on a new device or trying to upgrade an old version, such as Windows 8.1 or Windows 7, you'll need a genuine product key, which you can purchase from the Microsoft Store using the links below: Buy Windows 10 Pro license Windows 10 Home license In the past, you're able to upgrade to Windows 10 using an existing Windows 8.1 and Windows 7 license, but the promotion officially ended in 2016. However, some users are still able to activate their installation using old product keys. While it's not guaranteed that it'll work, if you want to give this a try, you'll need to find your product key. Usually, you can find it on the sticker attached at the bottom of your laptop or the back of the desktop tower. Alternatively, you can use tools like Enchanted Keyfinder Tool to retrieve the activation key from your current setup. (This is a free third-party tool that you can use at your own risk.) Configuring correct boot order To use a USB installation media to do a clean install of Windows 10, you'll have to make sure that your device can start from a USB device. This means that you'll need to access the Basic Input/Output System (BIOS) or Unified Extensible Firmware Interface (UEFI) firmware on your motherboard to change the boot order. This process typically requires hitting one of the function keys (F1, F2, F3, F10, or F12), the ESC, or Delete key as soon as you start your device. However, these settings will vary by manufacturer, and even by computer model. So make sure to check your PC manufacturer's support website for more specific instructions. Inside the BIOS interface, look for the Boot menu, and configure the boot order to start from the USB drive that includes the installation files, and save the new changes (usually using the F10 key). In the case that your device has a UEFI firmware, then the steps to change the boot order will be different as well. On Windows 10, you need to use these steps to access the UEFI firmware: Open Settings. Click on Update & Security. Click on Recovery. Under "Advanced Startup," click the Restart now button. Click the Troubleshoot option. Click on Advanced options. Click the UEFI Firmware Settings option. Click the Restart button. On Windows 8.1, you have to use these steps: Open PC Settings. Click on Update and recovery. Click on Recovery. Under "Advanced Startup," click the Restart now button. Click the Troubleshoot option. Click on Advanced options. Click the UEFI Firmware Settings option. Click the Restart button. Once you're in the UEFI firmware interface, look for the Boot menu, and make sure to change the boot order to start with the USB drive that includes the installation files, and save the settings. Disconnecting non-essential peripherals Peripherals connected to your computer are often the reason for problems during installation. Before proceeding with the clean installation of Windows 10, make sure to disconnect non-essential peripherals, including removable drives, Bluetooth and USB devices, SD cards, printers, scanners, and others. You only need a monitor, keyboard and mouse, and an internet connection. After the process, you can reconnect your peripherals. How to create a USB bootable media of Windows 10 To perform a clean installation of Windows 10, you'll need a USB bootable media, which you can create using the Media Creation Tool or third-party tools like Rufus. Creating a USB bootable media using Media Creation Tool To create a bootable installation media using the Microsoft Media Creation Tool, connect a USB flash drive of at least 8GB, and use these steps: Open the Windows 10 download page on your web browser. Click the Download tool now button. Save the file on your computer. Double-click the file to launch the Media Creation Tool. Click the Accept button to agree to the licensing agreement. Select the Create installation media (USB flash drive, DVD, or ISO file) for another PC option. Click the Next button. If you're downloading the files on the device that you're about to perform a clean install, the tool will detect the required configuration automatically. If you're not, clear the Use the recommended options for this PC option, and select the correct settings to override the default selections. Quick Tip: If you're planning to use the USB bootable media on multiple devices, on "Architecture," select the Both option to download the 32-bit and 64-bit versions. (This may require a USB flash drive with a larger capacity.) Click the Next button. Select the USB flash drive option. Select the USB drive that you want to make bootable. Click the Next button. Click the Finish button. Once you've completed the steps, you can use the USB flash drive to perform a clean install of Windows 10 on any device that meets the minimum hardware requirements. How to perform a clean installation of Windows 10 Once you've created the bootable media, connect the USB drive to your computer, and follow these steps to perform a clean installation of Windows 10. Warning: This is a friendly reminder that this process will erase everything on your device. It's recommended to make a full backup of your PC before proceeding. Installing Windows 10 To start fresh with a clean copy of Windows 10, use these steps: Start your device with the USB bootable media. On "Windows Setup," click Next to begin the process. Click the Install Now button. If you're installing Windows 10 for the first time or upgrading an old version, you must enter a genuine product key. However, if you're reinstalling Windows 10, you can click the I don't have a product key option to continue (assuming that your computer was already activated). (If applicable) Select the edition of Windows 10. This selection must match the edition your product key activates. Click the Next button. Select the I accept the license terms to agree option to continue. Click the Next button. Click on the Custom: Install Windows only (Advanced) option. Select the partition with the current installation of Windows (usually "Drive 0"), and click the Delete button to remove it from the hard drive. Quick Tip: If you have multiple partitions, on the primary hard drive (Drive 0), you can select and delete each of the partitions to allow the setup to use the entire drive for the installation. Windows 10 will create the required partitions automatically during the installation. If you have multiple hard drives, you don't need to delete those partitions. Click the Yes button to confirm the deletion. Select the empty drive (Drive 0 Unallocated Space). Click the Next button. Once you've completed the steps, the setup will proceed to install Windows 10 on your device. Completing out-of-box experience (OOBE) After the installation, you need to complete the out-of-box experience to finish creating a new account and setting up your environment. In this guide, we're using the OOBE available with the October 2018 Update (version 1809), but depending on the version that you're installing this setup may be a little different. Select your Region. Click the Yes button. Select your keyboard layout. Click the Yes button. Click the Skip button, unless you need to add a second keyboard layout. Click the Set up for personal use option. Type your Microsoft account information. Quick Tip: If you don't want to use a Microsoft account, click the Offline accountoption at the bottom left corner to create a traditional local account. Click the Next button. Type your Microsoft account password. Click the Next button. Click the Create PIN button to set up a PIN to unlock your device. Quick Tip: If you prefer to use a traditional password, click the Create PIN button, and then click the Cancel button to skip the process. Create your new four-digit PIN. (If you want to create a complex PIN, you can check the Include letters and symbols option.) Click the OK button. (Optional) You can enter your phone number and then click the Send button to link your phone with your device, but this is a feature that you can set up some other time. If you want to skip this option (recommended), click the Do it laterbutton in the bottom left corner of the screen. Click the Next button to set up OneDrive. If you're not interested in using this cloud storage service, click the Only save files to this PC option in the bottom left corner of the screen. (Optional) Select the Let Cortana respond to "Hey Cortana" option. Click the Accept option to allow Cortana personalized your experience. (If you click the Decline button, Cortana will still be available on the taskbar, but it won't collect information about you.) (Optional) If you want to enable Timeline to access your activity history across devices, click the Yes button. Otherwise, click the No button. Using this option, you'll still be able to access your timeline, but it'll only show four days of activities, and your activities will not sync across devices. Choose the privacy settings that you like to use with Windows 10. (And don't forget to scroll down the page to review all settings.) Click the Accept button. Once you've completed the steps, your settings will apply to the installation, and then you'll be directed to the desktop. After installation tasks After the installation, there are a few tasks left to do. First, you want to confirm that you're running an activated copy of Windows 10: Open Settings. Click on Update & Security. Click on Activation. Confirm that Windows 10 is activated. If you're having activation problems, you can use the Activation Troubleshooter to re-activate. Install the latest cumulative updates: Open Settings. Click on Update & Security. Click on Windows Update. Click the Check for updates button. Confirm that all the device drivers have been recognized and installed correctly. Open Start. Search for Device Manager, click the top result to open the experience. While in Device Manager, if none of the branches are expanded revealing a device with a yellow or red mark, then you're in the clear. In the case that there's a problem, make sure to download and install the latest driver available through your device manufacturer. You can refer to this guide to properly install device drivers on Windows 10. Also, don't forget to install the apps you need to get the work done on your device, including Google Chrome or Mozilla Firefox, Office apps, Spotify or iTunes, and others. If you created a backup of your files, now it's a good time to re-connect the drive and restore the files to your account folders. (You can quickly open your account folders using the Windows key + R keyboard shortcut, using this path %HOMEPATH% and clicking the OK button.) Wrapping things up Although on supported systems, you can use the Media Creation Tool to start fresh with a clean copy of Windows 10, there are some differences, limitations, and more chances to come across problems. If you want to perform a truly clean installation, using the bootable media route is perhaps your best option. On devices already running Windows 10, you may be able to save some steps when installing a new release using Windows Update or the Update Assistant, or even using the reset option when you're troubleshooting problems. However, sometimes, using these options, you're more likely to see compatibility and other issues that may even block the installation. When you use a bootable media, you'll significantly reduce the number of problems. source
  11. If you open the Windows Task Manager, you may see a process csrss.exe. This is Client Server Runtime file, and it is a Windows operating system file located in the System32 folder. So what is this csrss.exe? How do you know if it is a virus or not? Why does it consume high CPU on Windows 10/8/7 at times and what you do about this? What is Client Server Runtime or csrss.exe process The Client Server Runtime process has a long history. Prior to 1996, the process managed the whole graphical subsystem, while as of present it is restricted to a few critical processes like shutting down Windows, and initiating console Windows. CSRSS stands for client/server run-time subsystem and it must be running at all times. Earlier Client Server Runtime drew Command Prompt, however, since Windows 7 was launched, the function on the process is limited to launching the conhost.exe process which in turn draws Command Prompt. Can we terminate the csrss.exe process The Client Server Runtime process has limited functionality for Windows systems as of present, however, that limited functionality is critical. You cannot kill the process and doing so forcibly would make the system unusable. It may shutdown the computer automatically. However, the process has no reason to over-utilize system resources and since it runs in the background, it shouldn’t bother you for any reason. Is csrss.exe a virus? The original Client Server Runtime process is located in the C:\Windows\System32 directory. In case the file is not located at the intended location, it could be possible that a virus or malware is using the same name. Please run an anti-virus to perform a full system scan. To reconfirm, you may right-click on the file once you open the folder and loacte it and check its Properties. It should be noted that if the csrss.exe process causes high-CPU usage, it could probably be a virus. source
  12. Are you a developer and getting started with containerization? Containerization is the new trend these days and it makes your existing application system-independent and more reliable. If you are just a beginner and getting started with tools like Docker, then this is the right place to be at. In this post, we have covered a tutorial on how to set up and use Docker on a Windows machine. The process assumes that you are somewhat familiar with the concept of containerization. To give you a clearer definition of a container, I would directly like to quote Docker: Set up & use Docker Desktop on Windows Docker has quite a lot of use case. The most popular of them being containerization of existing applications. You can repackage your existing Java or .NET applications in a highly portable container that can be deployed to any server. But to do that, you need to get through the basics of it. So let’s get started and see how to set it up on Windows. 1. Download and install the setup. Head over to Docker’s website and download Docker Desktop for Windows. Once downloaded, install it on your computer by following the simple instructions in the setup. Your computer might restart a few times during the process. 2. Once everything is installed, you need to create an account. Head over to hub.docker.com and create a new account. Now use the same account to login into you installation on Windows. Creating an account is totally free and you won’t be charged anything. 3. The setup part is now over. You can confirm if Docker is running by going to system tray and clicking on the whale icon. Or you can open a CMD window and execute docker --version to check if you have Docker installed on your computer. Or you can also download the hello-world image to check if everything is working fine. In the same CMD window execute docker run hello-world to run all the checks. 4. Now you need an image to start your first container. There are a lot of public images available for different purposes. You can go to Docker hub and search for any image that you would like. There are images available for WordPress, Ubuntu, Node.Js etc. In this example, we are going to install a WordPress image on a local container so that you can run a local WordPress container on your computer. 5. The first step of creating any container is creating its configuration file. The configuration file specifies what image the container will use and with what parameters. So, create a new folder and inside that folder create a new file called docker-compose.yml. Paste the following contents into it and save the file: version: '3.3' services: db: image: mysql:5.7 volumes: - db_data:/var/lib/mysql restart: always environment: MYSQL_ROOT_PASSWORD: somewordpress MYSQL_DATABASE: wordpress MYSQL_USER: wordpress MYSQL_PASSWORD: wordpress wordpress: depends_on: - db image: wordpress:latest ports: - "8000:80" restart: always environment: WORDPRESS_DB_HOST: db:3306 WORDPRESS_DB_USER: wordpress WORDPRESS_DB_PASSWORD: wordpress volumes: db_data: {} Source: Docker Documentation 6. Open a CMD window in this folder and execute docker-compose up -d to start downloading the images and setting up the container on your local machine. Once the command finishes execution, you will have a WordPress container up and running on your local machine. You can open it up in your browser by going to http://localhost:8000. This was how you can create a configuration file and then download the required things for running your application inside a container. Remember that, there are tons of other possibilities available and this post is here to only give you an overview of Docker and containerization. You can search the internet for more configuration files or you can even create your own. There are a lot of free open-source Docker images available online that can get you started. Once you’ve customized your image and made the necessary changes, you can also push it to a Docker Hub repository. Click here to download Docker Desktop for Windows. Further reading about Docker for Windows here. source
  13. If you have used Windows for a long time, I am sure you are aware of BIOS or UEFI password. This password lock makes sure that you need to enter the set password even before the Windows computer boots up. However, the biggest problem with BIOS or UEFI Password is there is no recovery option like Microsoft account. In this guide, we will share how you can recover or set a BIOS or UEFI Password for Windows computers. The steps involved are: Temporarily remove CMOS battery Clear Unknown BIOS/UEFI passwords using bios-pw website Call Customer care. BIOS or UEFI passwords are stored at the hardware level. So unless the OEM wants or has configured a way out to recover the password, it is impossible to reset it. Sometimes they are so strict, that only way to get through is by calling customer care. Do remember any Windows computer with this lock, cannot be unlocked by trying to reinstall Windows. Recover or reset a BIOS or UEFI Password Temporarily remove CMOS battery Every motherboard comes with CMOS battery. This helps the system to keep the clock ticking, make sure the BIOS settings are not lost when the computer is powered down. So when the computer turns on, CMOS battery makes sure the information is available for the computer to boot up. That said, if you temporarily remove CMOS battery for around 30 seconds or a minute, the settings are lost. Some motherboards are built such that removing the battery for long, resets everything. This includes the password for the BIOS / UEFI. Clear Unknown BIOS/ UEFI passwords using bios-pw website If the above step doesn’t work, you can use this BIOS Password website to clear it. Follow these steps: Enter wrong password multiple times when prompted by the BIOS. This will lock you out of the system. Post this a new number or code on the screen. This will include a message about System Disabled [XXXXX] Service TAG [YYYYY] Open the BIOS password website, and enter the XXXXX code in it. Make sure to hit Shift+ Enter instead of just enter. It will then offer multiple unlock keys which you can try to clear out the BIOS / UEFI lock on your Windows computer. Call Customer care If none of the methods work for you, it is best to call customer care and take their suggestions. They might help you over the call using the service tag or might suggest you visit a Service center and get this resolved. Set a BIOS or UEFI Password Setting up a password on BIOS or UEFI is not really recommended, but if you have made up your mind, here is how you can do it. That said, BIOS or UEFI interface varies from OEM to OEM. So look for something related with SECURITY or PASSWORD. You will have options similar to Supervisor password: It is like a master password to change important settings. User password: Using this anybody can change minor settings. Master password for the hard drive or a general password. Some OEMs offer micro control where you will need to enter BIOS password. For example, you get the option to skip for a normal restart or when selecting a boot device. While you may have to enter it for unattended reboots or when the computer is powered on, and so on. If you are here to remove the password, look for a remove password option in the same section. You will get a prompt where you can enter the set password once. If it’s correct, it will remove the BIOS password. Once you are done, make sure to save and exit the BIOS. Reboot the computer and see if the settings have applied properly. Lastly, be very careful with BIOS / UEFI locks. It’s better to use Microsoft account to lock the computer instead of this. source
  14. Windows 10 S can install apps only from the Windows Store. Here's how to switch out of S mode and upgrade to the full version of Windows 10. Some laptops come with Windows 10 S, such as the Surface Laptop. It looks and runs like normal Windows with one exception: you can install apps only from the Microsoft Store. If you need to install something that isn't available there, such as the Google Chrome web browser, you will see an error message saying that you're not allowed to do that and the installation will be blocked. But the good news is that you can switch out of S mode and into the full Windows 10. It's simple and quick to do, and here's what you need to do. Switch out of Windows 10 S mode Choose Settings from the Start menu - the cog icon just above the power button - and then navigate to Update & Security > Activation. You will see a screen that looks like this: It explains that Windows 10 in S mode only allows verified Windows Store apps to be installed. And that if you choose to switch to Windows 10 Pro (or Home, depending upon which version your laptop is eligible for) you risk malware and should download apps from trusted sources. What you need to do is to click on the Go to Store button which will take you to the listing for Windows 10. Be careful not to click the Go to Store button in the 'Upgrade your edition of Windows' however, as you will be charged for this. You'll know if you've done it correctly because it should show a 'Switch out of S mode.' title and display Free instead of a price. Click the Get button and then Install. You will see a warning to save your files, and once you click Yes, let's go, it will make the necessary changes which won't take long at all. Can I go back to Windows 10 in S mode? Microsoft says it's a one-way deal: once you switch out of S mode you cannot go back. But you can if you have a Surface device and are willing to put in some effort. Head to Microsoft's website where you can download a recovery image for your laptop. You'll have to sign in with your Microsoft account to download the file. The process will restore the laptop to factory settings, so all your files, settings and apps will be wiped, so be sure to back up anything you don't want to lose. You need to put the image onto a suitably sized USB drive, which will wipe any files already on it. Follow the instructions on the website to create this 'recovery drive'. In order to use it, make sure it's plugged into your Surface which must be switched off. Hold the volume down button and press the power button. Let go of the power button and only let go of the volume button when the Windows logo appears on screen. This starts the recovery process. Choose Troubleshoot, then Recovery from the options and follow the instructions on screen. For more detail, see our guide to resetting Windows. source
  15. Hello ! Can u guys name some apps that can limit and controll wich devices are connected to my wifi network ? If possible, i want a desktop app that can show me like : Hey ! This device (phone, tablet, whatever....) is connected to your wifi net : and then show me some options like letting that device to stay connected to internet for an amount of time a day and to be able to turn off internet remotely for that device/s I knew i used in the past an windows app something called Connect......and whatever but pls, show some other apps I want as many options as possible Thank u and Merry Christmass !
  16. xhartom

    Windows Updates News

    Microsoft has released a new batch of cumulative updates for Windows 10, but this time the purpose isn’t to bring improvements to the operating system but to resolve an Internet Explorer flaw. Windows 10 version 1809 (October 2018 Update) devices are provided with cumulative update KB4483235, while Windows 10 version 1803 (April 2018 Update) gets KB4483234. Users still running Windows 10 version 1709 (Fall Creators Update) can download cumulative update KB4483232. The new updates increase the OS build number as it follows: Windows 10 version 1809 - KB4483235 (OS Build 17763.195) Windows 10 version 1803 - KB4483234 (OS Build 17134.472) Windows 10 version 1709 - KB4483232 (OS Build 16299.847) Windows 10 version 1703 - KB4483230 (OS Build 15063.1508) Windows 10 version 1607 - KB4483229 (OS Build 14393.2670) Windows 10 version 1507 - KB4483228 (OS Build 10240.18064) You can check out the OS build number on your system by clicking the Start menu and typing winver. No delta updates this time What’s very important to know is that this time, Microsoft isn’t offering any delta updates, so you have to download the full package for each Windows 10 version. The company explains the following: “A Delta package for this update will not be available. Customers using Delta package updates need to apply the Full Update. Customers who do not apply the Full update, and only the December Delta package update from December 11, 2018 will experience an update failure when installing the January Delta Update. The January Full update will install correctly.” There are no new known issues in these updates, as all of them inherit the bugs from their predecessors. There are no acknowledged bugs with the update aimed at Windows 10 version 1809. You can download the updates from Windows Update, and Microsoft recommends you to do it as soon as possible given that it resolves a security bug in Internet Explorer.
  17. Auslogics Windows Slimmer is a full-service option to clean up useless data, uninstall software including obsolete Windows versions.The goal here is to slim down non-essential data that is taking up precious space to help improve your machine's performance and speed. Over time your PC accumulates items that are no longer needed (or ever needed) including some non-optimal settings, unused system apps, in the background data transmitting options, etc., these take up space that waste resources and are detrimental to the overall efficiency of your machine. You need to periodically perform a clean up of these junk items to allow your machine to operate at its best. Items such as old System Restore points, Windows Update files, outdated Windows libraries or disabled system components can take up a large amount of disk space over time and reduce performance. Windows Slimmer is designed to enable any user a simple option to remove unneeded Windows components, uninstall obsolete or unused apps and tweak your machine's settings to reduce the footprint of your OS on your drive smaller, and also reduce the amount of memory and CPU power needed for privacy protection by blocking unnecessary data transmissions. You have a choice for the type of maintenance you wish to perform; one-time maintenance which allows you to target specific files and data like disabled components, the Windows.old folder. The other is regular maintenance which as the name implies is to clean up those areas that need constant attention like memory dump files, the recycle bin, temp and cache folders, etc. Lastly, you have the app list clean up where you can uninstall any app from your machine. This option also includes an app rating key providing you with an at-a-glance indicator to the trustworthiness of the app, but we are not sure exactly where the rating was compiled. That said, it is another nice option for cleaning out junk and providing some always needed space. Changelog: The program will now handle folder links and empty folders. Enhanced processing of issues during Regular Maintenance scans. Resolved a few user interface issues. Made some improvements to processing of Retail Demo content. Resolved some user interface issues. Fixed some minor bugs. Made improvements to Scheduler interaction mechanism. Check for updates will now display information on what’s new in the latest version available for download. Fixed all known bugs. Made some enhancements to ensure faster algorithm execution. Made functionality improvements to support the latest changes in Windows 10. Fixed all known bugs. Made functionality improvements to support the latest changes in Windows 10. Fixed all known bugs. Homepage: https://www.auslogics.com/en/software/windows-slimmer/ Changelog: https://www.auslogics.com/en/software/windows-slimmer/popup/history/ Download: http://downloads.auslogics.com/en/windows-slimmer/windows-slimmer-setup.exe
  18. Microsoft has been expanding its popular Windows 10 app Sticky Notes, adding a slew of useful new features. In recent months, the app has gained cross-device syncing and some initial integrations into Microsoft’s other products. As a consequence of these changes, you can now view your Sticky Notes on the web when you’re away from your PC. Likewise, you can create notes online and see them appear within Windows 10’s Sticky Notes app when you get back to your desk. First, create a new test note on your PC by opening the Sticky Notes app and writing some content. You will see your new note show up in the app’s notes list. It will immediately sync to the cloud using your Microsoft account. Now, you’re ready to view your note online. To do so, just visit onenote.com/stickynotes. You’ll see a simple interface that displays all your notes in a list on the left. You can click each note to show its full content on the right. Editing tools and note background colour options are available in the same manner as Sticky Notes for Windows 10. To create a new note, click the “+” button next to the search bar. Type your content and then wait a moment to see the note show up in the notes list in your Windows 10 Sticky Notes app. Needless to say, this is a simple but extremely useful experience. With Sticky Notes now syncing across devices and to the web, you’ve got a much better chance of keeping track of your thoughts. If you’ve got a Surface, or another device with an active stylus, you can scribble down thoughts on sticky notes using Windows Ink and then consume them wherever you happen to be. It’s worth noting it’s still quite early days for Sticky Notes on the web. The current experience is exceedingly basic and may well be expanded over time. Microsoft has chosen to put Sticky Notes under the OneNote umbrella but, so far, the two seem to be completely separate except for the domain. Unless you already know the URL, you won’t find Sticky Notes easily either – there’s no links to it from any of the other Office 365 apps. Still, the core functionality is there and is ready for you to use today. Microsoft’s also testing Sticky Notes integration in the OneNote apps for Android and iOS, giving you even more options when you need to note something down. source
  19. Telegram for Desktop is a messaging app with a focus on speed and security, it’s super-fast, simple and free. You can use Telegram on all your devices at the same time — your messages sync seamlessly across any number of your phones, tablets or computers. Download Telegram Offline Installer Setup for PC! With Telegram, you can send messages, photos, videos and files of any type (doc, zip, mp3, etc), as well as create groups for up to 1000 people or channels for broadcasting to unlimited audiences. You can write to your phone contacts and find people by their usernames. As a result, Telegram is like SMS and email combined — and can take care of all your personal or business messaging needs. You can download Telegram for PC offline installer from our site by clicking on free download button. What can you do with Telegram? Connect from most remote locations. Coordinate groups of up to 1000 members. Synchronize your chats across all your devices. Send documents of any type. Encrypt personal and business secrets. Destruct your messages with a timer. Store your media in the cloud. Build your own tools on our API. Enjoy feedback from your customers. Changelog v 1.3.14: Fix a crash in calls. v 1.3.13: Export data from individual chats using the '...' menu. Added a new night theme. You can now assign custom themes as night and day themes to quickly switch between them. Support for Telegram Passport 1.1 and improved password hashing algorithm to better protect Telegram Passport data. v 1.3.12: Bug fixes and other minor improvements. v 1.3.11: Added a new night theme. You can now assign custom themes as night and day themes to quickly switch between them. v 1.3.10: Bug fixes and other minor improvements. v 1.3.9 Mark chats in the chat list as Read or Unread. Improved censorship circumvention. v 1.3.8: Bug fixes and other minor improvements. v 1.3.7: Push fixes to stable version. v 1.3.6: Bug fixes and other minor improvements. v 1.3.5: Bug fixes and other minor improvements. v 1.3.4: Bug fixes and other minor improvements. v 1.3.3: Bug fixes and other minor improvements. v 1.3.2: Bug fixes and other minor improvements. v 1.3.1: Bug fixes and other minor improvements. v 1.3.0: Improved censorship circumvention. Improved stability when working through proxy servers. Save several proxy servers to quickly switch between them in Settings. Use proxy for calls. Emoji and text replacement now happens immediately after typing (instead of after sending) and can be rolled back using Backspace or CTRL/CMD + Z. Replacement no longer happens when pasting text. Added formatting shortcuts. Select text and use: CTRL/CMD + B/I for bold and italic CTRL/CMD + K to create or edit a custom link CTRL/CMD + SHIFT + M for monospace font CTRL/CMD + SHIFT + N to clear formatting Homepage Changelog - only major versions Github page - Source code & all builds changelog FAQ ███ Desktop Windows or Direct Link: https://updates.tdesktop.com/tsetup/tsetup.1.3.14.exe Portable or Direct Link: https://updates.tdesktop.com/tsetup/tportable.1.3.14.zip Mac or Direct Link: https://updates.tdesktop.com/tmac/tsetup.1.3.14.dmg App Store or Direct Link App Store: https://itunes.apple.com/us/app/telegram-desktop/id946399090 Linux x64 or Direct Link: https://updates.tdesktop.com/tlinux/tsetup.1.3.14.tar.xz Linux x86 or Direct Link: https://updates.tdesktop.com/tlinux32/tsetup32.1.3.14.tar.xz v1.3.13: Win Direct Link: https://updates.tdesktop.com/tsetup/tsetup.1.3.13.exe Portable Direct Link: https://updates.tdesktop.com/tsetup/tportable.1.3.13.zip Mac Direct Link: https://updates.tdesktop.com/tmac/tsetup.1.3.13.dmg Linux x64 Direct Link: https://updates.tdesktop.com/tlinux/tsetup.1.3.13.tar.xz Linux x86 Direct Link: https://updates.tdesktop.com/tlinux32/tsetup32.1.3.13.tar.xz ███ Phone Android or Direct Link Google Play: https://play.google.com/store/apps/details?id=org.telegram.messenger iphone / ipad or Direct Link App Store: https://itunes.apple.com/app/telegram-messenger/id686449807 Windows Phone
  20. Can the open source upstart really stand up to Microsoft's enterprise juggernaut? For decades, a secret war has been raging, fought in back offices and IT departments across the globe. Teams have been torn asunder, driven apart by an ideological clash that seems as old as time itself: which is better, Windows or Linux? Both sides are often staunchly committed to their preferred platform, taking any opportunity to hold its counterpart's failings over those perceived heretics that have the gall to suggest that their operating system of choice is anything less than flawless. Of course, as with any ideological conflict, the reality is far less black and white. Both Linux and Windows have advantages and drawbacks, and both excel in areas where the other falls down somewhat. or example, although Linux is (by and large) more secure than Windows, anyone who's spent time troubleshooting a Linux issue will agree it's hard to argue that Windows has the edge in terms of user-friendliness. At the end of the day, Linux and Windows are both merely tools; tools that IT professionals use to get their jobs done. With that in mind, it's important to set aside the tribalism and the dyed-in-the-wool dedication to one particular type of software in order to objectively look at which one is best-suited to your specific individual needs. Below we dive deep into the history of both and weight up the pros and cons to help you decide. Ultimately, what's most important is whether the operating system is right for your needs, so, by the end, you should have a better understanding of the capabilities of both. Windows vs Linux: History The first version of Windows, known as Windows 1.0, was revealed in 1985 following the formation of Microsoft. It was based upon the MS-DOS core, at the time the most widely used Program Manager for running applications. Following that initial launch, new versions of Windows were quickly rolled out, including the first major update in 1987, quickly followed by Windows 3.0 in the same year. This journey of evolution happened quickly and in 1995, perhaps the most widely used version yet, Windows 95 was born. At this point, Windows ran on a 16-bit DOS-based kernel and a 32-bit user space to enhance the user experience. Windows hasn't changed a whole lot in terms of core architecture since Windows 95 and although vast amounts of features have been added on to address modern computing, many of the elements we recognise today were present. For example, the Start Menu, the task bar and Windows Explorer (now known as File Explorer) all presented themselves in Windows 98. One major shift happened with the launch of Windows ME in 2000. That was the last MS-DOS version of Windows, allowing for an even faster evolution of services since. However, some iterations of the platform still fared better than others and although it is still the most popular computing platform, users have dropped off over the years and migrated to other platforms, such as MacOS and Linux. Linux was launched later than Windows, in 1991. It was created by Finnish student Linus Torvalds, who wanted to create a free operating system kernel that anyone could use. Although it's still regarded as a very bare bones operating system, without a graphical interface like Windows, it has nevertheless grown considerably, with just a few lines of source code in its original release to where it stands today, containing more than 23.3 million lines of source code. Linux was first distributed under GNU General Public License in 1992. Windows vs Linux: Distros Before we begin, we need to address one of the more confusing aspects to the Linux platform. While Windows has maintained a fairly standard version structure, with updates and versions split into tiers, Linux is far more complex. Originally designed by Finnish student Linus Torvalds, the Linux Kernel today underpins all Linux operating systems. However, as it remains open source, the system can be tweaked and modified by anyone for their own purposes. What we have as a result are hundreds of bespoke Linux-based operating systems known as distributions, or 'distros'. This makes it incredibly difficult to choose between them, far more complicated than simply picking Windows 7, Windows 8 or Windows 10. Given the nature of open source software, these distros can vary wildly in functionality and sophistication, and many are constantly evolving. The choice can seem overwhelming, particularly as the differences between them aren't always immediately obvious. On the other hand, this also brings its own benefits. The variety of different Linux distros is so great that you're all but guaranteed to be able to find one to suit your particular tastes. Do you prefer a macOS-style user interface? You're in luck - Elementary OS is a Linux distro built to mirror the look and feel of an Apple interface. Similarly, those that yearn for the days of Windows XP can bring it back with Q4OS, which harkens back to Microsoft's fan-favourite. There are also more specialised Linux flavours, such as distros that are designed to give ancient, low-powered computers a new lease of life, or super-secure distros that can be booted from a USB drive to keep you safe when using an unfamiliar PC. Naturally, there are also numerous Linux versions for running servers and other enterprise-grade applications. For those new to Linux, we'd recommend Ubuntu as a good starting point. It's very user-friendly (even compared to Windows) whilst still being versatile and feature-rich enough to satisfy experienced techies. It's the closest thing Linux has to a 'default' distro – although we would urge everyone to explore the various distro options available and find their favourite. Windows vs Linux: Installation Still with us? Good; now we move on to looking at installation. Again, this differs a little from Windows methods, as well as varying between distros. A common feature of Linux OS’ is the ability to ‘live’ boot them – that is, booting from a DVD or USB image without having to actually install the OS on your machine. This can be a great way to quickly test out if you like a distro without having to commit to it. The distro can then be installed from within the live-booted OS, or simply run live for as long as you need. However, while more polished distros such as Ubuntu are a doddle to set up, some of the less user-friendly examples require a great deal more technical know-how to get up and running. Windows installations, by contrast, while more lengthy and time consuming, are a lot simpler, requiring a minimum of user input compared to many distros. Windows vs Linux: Software and compatibility Most applications are tailored to be written for Windows. You will find some Linux-compatible versions, but only for very popular software. The truth, though, is that most Windows programs aren't available for Linux. A lot of people who have a Linux system instead install a free, open source alternative. There are applications for almost every program you can think of. If this isn't the case, then programs such as WINE or a VM can run Windows software in Linux instead. Despite this, these alternatives are more likely to be amateur efforts compared to Windows. If your business requires a certain application then it's necessary to check if Linux runs a native version or if an acceptable replacement exists. There are also differences in how Linux software installs programs compared with Windows. In Windows, you download and run an executable file (.exe). In Linux, programs are mostly installed from a software repository tied to a specific distro. Installing on Linux is done by typing an apt-get command from the command line. A package manager handles this by layering a graphical user interface over the messy mechanics of typing in the right combination of words and commands. This is in many ways the precursor of a mobile device's app store. Depending on the software, some won't be held in a repository and will have to be downloaded and installed from source, such as the non-open source variants of proprietary software like Skype or Steam. In this case, the installation becomes more similar to that of Windows software. You simply download the relevant package for your distro from the company's website, and the inbuilt package installer will complete the rest. Windows has a big advantage over Linux which is that in the software stakes, virtually every program is designed from the ground up with Windows support in mind. In general, Windows users aren't affected by compatibility worries. As mentioned previously, the set-up is also often a much simpler affair. Windows vs Linux: Support As it’s created and maintained by a community of passionate fans, Linux has a huge wealth of information to fall back on, in the form of tips, tricks, forums and tutorials from other users and developers. However, it’s somewhat fragmented and disarrayed, with little in the way of a comprehensive, cohesive support structure for many distros. Instead, anyone with a problem often has to brave the wilderness of Google to find another user with the answer. Microsoft is much better at collating its resources. Though it doesn’t have quite the amount of raw information that’s available regarding Linux, it’s made sure that the help documents it does have are relatively clear and easy to access. There’s also a similar network of Windows forums and tutorials if the official assistance doesn't help you. Windows vs Linux: Security Security is a cornerstone of the Linux OS, and one of the principal reasons for its popularity among the IT community. This reputation is well deserved and stems from a number of contributing factors. One of the most effective ways Linux secures its systems is through privileges. Linux does not grant full administrator – or ‘root’ – access to user accounts by default, whereas Windows does. Instead, accounts are usually lower-level and have no privileges within the wider system. This means that when a virus gets in, the damage it can do is limited, and restricted mainly to files and folders on the individual machine. This can be incredibly beneficial from a damage control standpoint, since it’s far easier to simply replace one machine than scour the entire network for malware traces. There’s also the fact that open source code, such as Linux software, is generally thought to be more secure and better maintained, due to the number of people scanning it for flaws. Similar to the ‘infinite monkeys’ principal, ‘Linus’ Law’ (named after Torvalds), states that “given enough eyeballs, all bugs are shallow”. Possibly most important, however, is the issue of compatibility. As we mentioned earlier, virtually all software is written for Windows, and this also applies to malware. Given that the number of Windows machines in the world vastly outnumbers the number of Linux ones, cyber attacks targeting Microsoft’s OS are much more likely to succeed, and therefore much more worthwhile prospects for threat actors. This isn’t to say that Linux machines are totally immune from being targeted, of course, but statistically, you’re probably safer than with Windows, provided you stick to best practice. Windows vs Linux: Layout, Design and User Interface As we mentioned above, the sheer volume of distros means that users are spoilt for choice in terms of design. There are distros that visually emulate both OSX and Windows, as well as stripped-down systems for those that favour minimalism. Some, of course, are visually dire, but that's the risk of community-created software. Most of the major distros, however, are very well-designed, particularly corporate-backed offerings such as Ubuntu and Fedora. In the end, a lot of it comes down to personal taste. We should mention, though, that many Linux variants will require an adjustment period for those familiar with Windows or OSX. They’re also just that little bit less polished when compared with the big boys. Windows vs Linux: Performance Microsoft’s ubiquitous OS can be called many things, but ‘lightweight and speedy’ is not one of them. Windows has an unfortunate tendency towards bloating and sluggishness, and can very quickly feel outdated if not properly maintained. Linux is much quicker, on the whole. The OS itself is less demanding, and many distros sacrifice any visual bells and whistles to ensure that performance is the absolute best it can be. Opting for one of these builds can be an excellent way to bring an ailing older laptop back up to its former speed. There are, of course, numerous ways to ensure that a Windows PC or laptop remains decently nippy over the course of its lifespan, but Linux computers will on average outperform them over a longer period. Windows vs Linux: User-friendliness The fact that Microsoft has been producing its system software for nearly 30 years means that many aspects of it have become cultural touchstones. Accordingly, certain elements of the layout and navigation have been absorbed through osmosis, and a lot of users can essentially operate the system instinctively. Linux does not have the luxury of being the most widely-used operating system in the world. As such, new users have to re-learn how to perform simple tasks on an unfamiliar and often complicated system, which can be offputting for the casual user. However, Linux is an operating system that gets simpler to use the more you understand about it, while Windows can sometimes be the opposite. Digging down past the basic tasks into more complicated functions can leave some people baffled. Microsoft, to its credit, has spent the past few years simplifying the more confusing and labyrinthine elements of its software, and generally making it much more accessible for entry-level users that aren’t necessarily computer literate. This is especially evident in Windows 10’s settings menu, which boils down some of the most common and crucial control panel tasks and lays them out under clear and concise headings. It’s a lot more straightforward for the layperson, and the control panel’s still available for power users to tinker with. Windows vs Linux: Verdict Given their different strengths and use cases, it’s difficult to definitively state whether Linux or Windows is the better OS. Whether or not each one will be a good fit for your business depends a lot on how your company operates, and what applications it uses. If you’re a small firm that works primarily in software, Linux is likely to be a good fit, as the free availability will reduce overheads, and set-up won’t be too complicated to manage. It also has a reputation as a tool for coding. However, larger deployments will be much more complicated. Replacing the computers of hundreds of employees is likely to cause chaos, particularly if they’re not familiar with Linux. It’s possible – especially if a simple, Windows-style distro is used – but without a very capable and well-integrated IT department, many companies will struggle. Given the flexibility of multiple distros, the non-existent asking price and the heightened security, Linux is our overall favourite - assuming you’ve got the patience to adapt to a new system. Windows, however, remains the winner in terms of pure convenience. It’s simple, familiar, and guaranteed to be compatible with virtually all software; for busy companies, that could well be more valuable in the long run. Source
  21. With the buggy Win10 version 1803 cumulative update officially yanked, two bad Office patches pulled, and the Win10 1809 forced upgrade momentarily defanged, the coast is clear to install November’s patches. Here’s what you need to know about the latest game of whack-a-mole. Thinkstock/Microsoft November’s patches initially appeared relatively innocuous, with a few catastrophic problems in 64-bit Office 2010, which is a bit of a standing joke anyway. As the month melted on, we saw a Win10 version 1803 second cumulative update, KB 4467682, that caused havoc, including blue screens on Surface Book 2 PCs, and customized Start Menu bugs (thx, Günter Born). Microsoft yanked it on Dec. 6 — no small consolation to those of you who install everything as soon as it’s offered. Or even a week later. We also saw a reappearance of the Windows 10 September-October-November-December 2018 Update, version 1809. This time, nine weeks after the original release, the new cumulative update seems pretty stable, although I’m seeing some reports of jiggered sleep states. More Flash maladies Meanwhile, we have an emergency Flash Player update (thank you, Adobe), KB 4471331, released a couple of days ago, that addresses a currently active exploit in the wild. Yes, it’s a December patch. Yes, you should install it now. Think of it this way. The worst it’ll do is mess up Flash — and that’s doing you a favor. Like so many other Flash updates, it screams for you to disable and abandon Flash entirely — something I’ve been harping about for years. The Win10 version 1809 upgrade isn’t being forced yet As best I can tell, Microsoft’s re-re-release of Win10 version 1809, via KB 4469342, hasn’t yet triggered forced upgrades. You can run Windows Update on Win10 version 1803, at the moment, and be reasonably sure that you won’t get bumped to version 1809. That’ll change soon. If you actually want Win10 version 1809, check your pulse and your IQ, and make sure you install the new December 2018 Servicing Stack Update, KB 4070788, first. That compensates for the fact that the Windows updater isn’t smart enough to update itself first. No, I won’t point you to the instructions for installing 1809. More .Net fun 'n' games I’m seeing more and more reports about problems with this month’s .Net patches. Fuhgeddaboutit. This month’s .Net patches are all non-security patches, and aren’t worth your time, or the headaches. Win7/Server 2008R2 Network Card bugs continue Microsoft has a bug in its Win7 Monthly Rollup that’s been, uh, bugging us since March. If you installed any Win7/Server 2008R2 patches after March and your network connections didn’t go kablooey, you’re almost undoubtedly OK to proceed with this month’s patches. On the other hand, if you’ve been waiting to install patches on your Win7 or Server 2008R2 machine, you need to be aware of a bug that Microsoft has acknowledged. Symptom: There is an issue with Windows and third-party software that is related to a missing file (oem<number>.inf). Because of this issue, after you apply this update, the network interface controller will stop working. Workaround: 1.To locate the network device, launch devmgmt.msc; it may appear under Other Devices. 2. To automatically rediscover the NIC and install drivers, select Scan for Hardware Changes from the Action menu. Alternatively, install the drivers for the network device by right-clicking the device and selecting Update. Then select Search automatically for updated driver software or Browse my computer for driver software. That’s a bizarre, convoluted series of steps. Microsoft still hasn’t confirmed which third-party software is at fault, but reports have it that it’s largely a VMware problem. Eight months later, the bug’s still there, still acknowledged, still unfixed. If you’re worried that installing this month’s updates will clobber your network interface card, make sure you take a full backup before installing the updates. You can also take @GoneToPlaid’s advice and edit certain registry entries in advance. Seek Bar problems Many of November’s updates include a warning like this: After installing this update, users may not be able to use the Seek Bar in Windows Media Player when playing specific files. This issue does not affect normal playback. Microsoft is working on a resolution and estimates a solution will be available mid-December 2018. If you use the Seek Bar in Windows Media Player, perhaps it’s time you look at something much more capable, such as VLC or Plex. But if you absolutely must have the Seek Bar, in WMP, don’t update until next Patch Tuesday. The returning bad penny, KB 4023057 Yesterday Microsoft released yet another version of KB 4023057, the Update to Windows 10, versions 1507, 1511, 1607, 1703, 1709, and 1803 for update reliability. This is the 20th or 30th version of the patch. As I said on Nov 19, the last time it was updated: @ch100 has offered the only explanation that makes sense to me: KB4023057 was and still is one of the most weird and unexplained updates in the recent times. This update has never been offered to WSUS, but only to Windows Update. This would indicate that it meant for unmanaged end-users and unmanaged small business users. … This patch may be harmless, but why it was released and where it actually applies, it is still a mystery. It’s most likely associated with the 1809 rollout, although why it didn’t appear in early October when 1809 first raised its ugly head leaves me baffled. You don’t need it, don’t want it, and if you find it installed, uninstall it. Unless you want to be pushed to 1809 at the earlier opportunity, anyway. Update All of this makes right now a very good time to apply Windows and Office patches. Here’s how to proceed: Step 1. Make a full system image backup before you install the November patches. There’s a non-zero chance that the patches — even the latest, greatest patches of patches of patches — will hose your machine. Best to have a backup that you can reinstall even if your machine refuses to boot. This, in addition to the usual need for System Restore points. There are plenty of full-image backup products, including at least two good free ones: Macrium Reflect Free and EaseUS Todo Backup. For Win 7 users, If you aren’t making backups regularly, take a look at this thread started by Cybertooth for details. You have good options, both free and not-so-free. Step 2. For Win7 and 8.1 Microsoft is blocking updates to Windows 7 and 8.1 on recent computers. If you are running Windows 7 or 8.1 on a PC that’s 18 months old or less, follow the instructions in AKB 2000006 or @MrBrian’s summary of @radosuaf’s method to make sure you can use Windows Update to get updates applied. If you’ve already installed any March or later updates, your Network Interface Card should be immune to the latest slings and arrows. But if you haven’t been keeping up on patches, see the discussion in the Network Card bugs section above to protect yourself. If you’re very concerned about Microsoft’s snooping on you and want to install just security patches, realize that the privacy path’s getting more difficult. The old “Group B” — security patches only — isn’t dead, but it’s no longer within the grasp of typical Windows customers. If you insist on manually installing security patches only, follow the instructions in @PKCano’s AKB 2000003 and be aware of @MrBrian’s recommendations for hiding any unwanted patches. For most Windows 7 and 8.1 users, I recommend following AKB 2000004: How to apply the Win7 and 8.1 Monthly Rollups. Realize that some or all of the expected patches for November may not show up or, if they do show up, may not be checked. DON'T CHECK any unchecked patches. Unless you're very sure of yourself, DON'T GO LOOKING for additional patches. In particular, if you install the November Monthly Rollups, you won’t need (and probably won’t see) the concomitant patches for October. Don't mess with Mother Microsoft. Watch out for driver updates — you’re far better off getting them from a manufacturer’s website. After you’ve installed the latest Monthly Rollup, if you’re intent on minimizing Microsoft’s snooping, run through the steps in AKB 2000007: Turning off the worst Win7 and 8.1 snooping. If you want to thoroughly cut out the telemetry, see @abbodi86’s detailed instructions in AKB 2000012: How To Neutralize Telemetry and Sustain Windows 7 and 8.1 Monthly Rollup Model. Realize that we don’t know what information Microsoft collects on Window 7 and 8.1 machines. But I’m starting to believe that information pushed to Microsoft’s servers for Win7 owners is nearing equality to that pushed in Win10. Step 3. For Windows 10 If you’re running Win10 version 1709, or version 1803 (my current preference), you definitely want to block the forced upgrade to Win10 1809. Don’t get caught flat-footed: Although it looks like we're clear right now, Microsoft may decide to push 1809 again with little or no notice. Follow the advice in How to block the Windows 10 October 2018 Update, version 1809, from installing. Of course, all bets are off if Microsoft, uh, forgets to honor its own settings. Those of you who run Win10 Pro and followed my “new tactic” advice last month — to set “quality update” (cumulative update) deferrals to 15 days — don’t need to do anything. Your machine got updated last week, and should be working fine. Don’t touch a thing. For the rest of you, including those of you stuck with Win10 Home, go through the steps in "8 steps to install Windows 10 patches like a pro." Note that clicking “Check for updates” in Step 6 won’t cause undue heartache at this point: the “seeker” Win10 1709 cumulative update is working fine; the second Win10 1803 cumulative update has been pulled; the second cumulative update for Win10 1809 (released in December) may actually help; and Microsoft isn’t yet forcing an upgrade to 1809 on Win10 1709 or 1803 seekers. Surely a temporary calm before the usual patching storm. You can use the wushowhide procedure in the “8 steps” explanation to block KB 4023057 — a patch you definitely don’t want. For those of you running Win10 Pro, I suggest you follow the instructions in Step 7, but leave your advanced setup settings like the ones shown in the screenshot. Woody Leonhard That’ll ensure Microsoft has 15 days to pull its bad initial patches Windows patching has turned into a game of whack-a-mole. Make sure you’re the one with the mallet. Thanks to the dozens of volunteers on AskWoody who contribute mightily, especially @sb, @PKCano, @abbodi86, @gborn, @GoneToPlaid, @Cybertooth and @MrBrian. We’ve moved to MS-DEFCON 4 on the AskWoody Lounge. Source: Patching waters finally look calm; now is a good time to install the November Windows and Office patches (Computerworld - Woody Leonhard)
  22. malakai1911

    Comprehensive Security Guide

    Comprehensive Security Guide NOTE: As of 1/1/2019 this guide is out of date. Until parts are rewritten, consider the below for historical reference only. i. Foreword The primary purpose of this guide is to offer a concise list of best-of-breed software and advice on selected areas of computer security. The secondary purpose of this guide is to offer limited advice on other areas of security. The target audience is an intermediately skilled user of home computers. Computer software listed are the freeware versions when possible or have free versions available. If there are no free versions available for a particular product, it is noted with the "$" symbol. The guide is as well formatted as I could make it, within the confines of a message board post. ii. Table of Contents i. Foreword ii. Table of Contents 1. Physical Security a. Home b. Computer c. Personal 2. Network Security a. Hardware Firewall b. Software Firewall 3. Hardening Windows a. Pre-install Hardening b. Post-install Hardening c. Alternative Software d. Keep Windows Up-To-Date 4. Anti-Malware a. Anti-Virus b. HIPS / Proactive Defense c. Malware Removal 5. Information and Data Security a. Privacy / Anonymity b. Encryption c. Backup, Erasure and Recovery d. Access Control (Passwords, Security Tokens) 6. Conclusion 1. Physical Security I just wanted to touch on a few things in the realm of physical security, and you should investigate physical and personal security in places other than here. a. Home How would you break in to your own home? Take a close look at your perimeter security and work inwards. Make sure fences or gates aren't easy to climb over or bypass. The areas outside your home should be well lit, and motion sensor lights and walkway lights make nice additions to poorly lit areas. If possible, your home should have a security system featuring hardwired door and window sensors, motion detectors, and audible sirens (indoor and outdoor). Consider integrated smoke and carbon monoxide detectors for safety. Don't overlook monitoring services, so the police or fire department can be automatically called during an emergency. Invest in good locks for your home, I recommend Medeco and Schlage Primus locks highly. Both Medeco and Schlage Primus locks are pick-resistant, bump-proof, and have key control (restricted copying systems). Exterior doors should be made of steel or solid-core wood and each should have locking hardware (locking doorknob or handle), an auxiliary lock (mortise deadbolt) with a reinforced strike plate, and a chain. Consider a fireproof (and waterproof) safe for the storage of important documents and valuables. A small safe can be carried away during a robbery, and simply opened at another location later, so be sure and get a safe you can secure to a physical structure (in-wall, in-floor, or secured to something reasonably considered immovable). You may be able to hide or obscure the location of your safe in order to obtain some additional security, but don't make it cumbersome for yourself to access. b. Computer Computers are easy to just pick up and take away, so the only goal you should have is to deter crimes of opportunity. For desktop computers, you may bring your desktop somewhere and an attacker may not be interested in the entire computer, but perhaps just an expensive component (video card) or your data (hard drive), and for that I suggest a well-built case with a locking side and locking front panel. There are a variety of case security screws available (I like the ones from Enermax (UC-SST8) as they use a special tool), or you can use screws with less common bits (such as tamper resistant Torx screws) to secure side panels and computer components. There are also cable lock systems available for desktop computers to secure them to another object. For laptop computers, you are going to be primarily concerned about a grab-and-go type robbery. There are a variety of security cables available from Kensington, which lock into the Kensington lock slot found on nearly all laptops, which you can use to secure it to another object (a desk or table, for example). Remember though, even if it's locked to something with a cable, it doesn't make it theft-proof, so keep an eye on your belongings. c. Personal Always be aware of your surroundings. Use your judgment, if you feel an area or situation is unsafe, avoid it altogether or get away as quickly and safely as possible. Regarding hand to hand combat, consider a self-defense course. Don't screw around with traditional martial arts (Karate, Aikido, Kung-Fu), and stay away from a McDojo. You should consider self-defense techniques like Krav Maga if you are serious about self defense in a real life context. I generally don't advocate carrying a weapon on your person (besides the legal mess that may be involved with use of a weapon, even for self-defense, an attacker could wrestle away a weapon and use it against you). If you choose to carry any type of weapon on your person for self-defense, I advise you to take a training course (if applicable) and to check with and follow the laws within the jurisdiction you decide to possess or carry such weapons. Dealing with the Police Be sure to read Know Your Rights: What to Do If You're Stopped by the Police a guide by the ACLU, and apply it. Its advice is for within the jurisdiction of the US but may apply generally elsewhere, consult with a lawyer for legal advice. You should a;so watch the popular video "Don't talk to the police!" by Prof. James Duane of the Regent University Law School for helpful instructions on what to do and say when questioned by the police: (Mirror: regent.edu) Travelling Abroad Be sure and visit the State Department or Travel Office for your home country before embarking on a trip abroad. Read any travel warnings or advisories, and they are a wealth of information for travelers (offering guides, checklists, and travel advice): (US, UK, CA). 2. Network Security As this is a guide geared towards a home or home office network, the central theme of network security is going to be focused around having a hardware firewall behind your broadband modem, along with a software firewall installed on each client. Since broadband is a 24/7 connection to the internet, you are constantly at risk of attack, making both a hardware and software firewall absolutely essential. a. Hardware Firewall A hardware firewall (router) is very important. Consider the hardware firewall as your first line of defense. Unfortunately, routers (usually) aren't designed to block outbound attempts from trojans and viruses, which is why it is important to use a hardware firewall in conjunction with a software firewall. Be sure that the firewall you choose features SPI (Stateful Packet Inspection). Highly Recommended I recommend Wireless AC (802.11ac) equipment, as it is robust and widely available. Wireless AC is backwards compatible with the earlier Wireless N (802.11n) G (802.11g) and B (802.11b) standards. 802.11ac supports higher speeds and longer distances than the previous standards, making it highly attractive. I generally recommend wireless networking equipment from Ubiquiti or Asus. Use WPA2/WPA with AES if possible, and a passphrase with a minimum of 12 characters. If you are really paranoid, use a strong random password and remember to change it every so often. Alternatives A spare PC running SmoothWall or IPCop, with a pair of NIC's and a switch can be used to turn a PC into a fully functional firewall. b. Software Firewall A software firewall nicely compliments a hardware firewall such as those listed above. In addition to protecting you from inbound intrusion attempts, it also gives you a level of outbound security by acting as a gateway for applications looking to access the internet. Programs you want can access the internet, while ones you don't are blocked. Do not use multiple software firewalls simultaneously. You can actually make yourself less secure by running two or more software firewall products at once, as they can conflict with one another. Check out Matousec Firewall Challenge for a comparison of leak tests among top firewall vendors. Leaktests are an important way of testing outbound filtering effectiveness. Highly Recommended Comodo Internet Security Comodo is an easy to use, free firewall that provides top-notch security. I highly recommend this as a first choice firewall. While it includes Antivirus protection, I advise to install it as firewall-only and use an alternate Antivirus. Alternatives Agnitum Outpost Firewall Free A free personal firewall that is very secure. Be sure to check out the Outpost Firewall Forums, to search, and ask questions if you have any problems. Online Armor Personal Firewall Free Online Armor Personal Firewall makes another great choice for those who refuse to run Comodo or Outpost. Online Armor 3. Hardening Windows Windows can be made much more secure by updating its components, and changing security and privacy related settings. a. Pre-install Hardening Pre-install hardening has its primary focus on integrating the latest available service packs and security patches. Its secondary focus is applying whatever security setting tweaks you can integrate. By integrating patches and tweaks, you will be safer from the first boot. Step 1 - Take an original Windows disc (Windows 7 or later) and copy it to a folder on your hard drive so you can work with the install files. Step 2 - Slipstream the latest available service pack. Slipstreaming is a term for integrating the latest service pack into your copy of windows. Step 3 - Integrate the latest available post-service pack updates. This can be done with a utility such as nLite or vLite, and post-service pack updates may be available in an unofficial collection (such as the RyanVM Update Pack for XP). Step 4 - Use nLite (Windows 2000/XP) or vLite (Windows Vista/7) to customize your install. Remove unwanted components and services, and use the tweaks section of nLite/vLite to apply some security and cosmetic tweaks. Step 5 - Burn your newly customized CD, and install Windows. Do not connect the computer to a network until you install a software firewall and anti-virus. b. Post-Install Hardening If you have followed the pre-install hardening section, then your aim will be to tweak settings to further lock down windows. If you hadn't installed from a custom CD, you will need to first update to the latest service pack, then install incremental security patches to become current. After updating, you'll then disable unneeded Windows services, perform some security tweaks, and use software such as xpy to tweak privacy options. Disable Services Start by disabling unneeded or unnecessary services. By disabling services you will minimize potential security risks, and use fewer resources (which may make your system slightly faster). Some good guides on disabling unnecessary services are available at Smallvoid: Windows 2000 / Windows XP / Windows Vista. Some commonly disabled services: Alerter, Indexing, Messenger, Remote Registry, TCP/IP NetBIOS Helper, and Telnet. Security Tweaks I highly recommend using a strong Local Security Policy template as an easy way to tweak windows security options, followed by the registry. Use my template (security.inf) to easily tweak your install for enhanced security (Windows 2000/XP/Vista/7): 1. Save the following attachment: (Download Link Soon!) 2. Extract the files. 3. Apply the Security Policy automatically by running the included "install.bat" file. 4. (Optional) Apply your policy manually using the following command: [ secedit /configure /db secedit.sdb /cfg "C:\<Path To Security.inf>\<template>.inf" ] then refresh your policy using the following the command:[ secedit /refreshpolicy machine_policy ] (Windows 2000), [ gpupdate ] (Windows XP/Vista/7) This template will disable automatic ("administrative") windows shares, prevent anonymous log on access to system resources, disable (weak) LM Password Hashes and enable NTLMv2, disable DCOM, harden the Windows TCP/IP Stack, and much more. Unfortunately my template can't do everything, you will still need to disable NetBIOS over TCP (NetBT), enable Data Execution Prevention (AlwaysOn), and perform other manual tweaks that you may use. Privacy Tweaks xpy (Windows 2000/XP) and vispa (Windows Vista/7) These utilities are great for modifying privacy settings. They supersede XP AntiSpy because they include all of XP Anti-Spy's features and more. You should use them in conjunction with the security tweaks I've listed above. c. Alternative Software Another simple way of mitigating possible attack vectors is to use software that is engineered with better or open security processes. These products are generally more secure and offer more features then their Microsoft counterparts. Highly Recommended Google Chrome (Web Browser) Mozilla Thunderbird (Email Client) OpenOffice.org (Office Suite) Alternatives Mozilla Firefox (Web Browser) Google Docs (Online) (Office Suite) Firefox Additions Mozilla has a Privacy & Security add-on section. There are a variety of add-ons that may appeal to you (such as NoScript). And although these aren't strictly privacy related, I highly recommend the AdBlock Plus add-on, with the EasyList and EasyPrivacy filtersets. d. Keep Windows Up-To-Date Speaking of keeping up-to-date, do yourself a favor and upgrade to at least Windows XP (for older PC's) and Windows 7 (or later) for newer PC's. Be sure to keep up-to-date on your service packs, they're a comprehensive collection of security patches and updates, and some may add minor features. Microsoft Windows Service Packs Windows 2000 Service Pack 4 with Unofficial Security Rollup Package Windows XP Service Pack 3 with Unofficial Security Rollup Package Windows XP x64 Service Pack 2 with Unofficial Security Rollup Package Windows Vista Service Pack 2 Windows 7 Service Pack 1 Microsoft Office Service Packs Office 2000 Service Pack 3 with the Office 2007 Compatibility Pack (SP3). Office XP (2002) Service Pack 3 with the Office 2007 Compatibility Pack (SP3). Office 2003 Service Pack 3 with the Office 2007 Compatibility Pack (SP3) and Office File Validation add-in. Office 2007 Service Pack 3 with the Office File Validation add-in. Office 2010 Service Pack 1 After the service pack, you still need to keep up-to-date on incremental security patches. Windows supports Automatic Updates to automatically update itself. However, if you don't like Automatic Updates: You can use WindowsUpdate to update windows periodically (Must use IE5 or greater, must have BITS service enabled), or you can use MS Technet Security to search for and download patches individually, or you can use Autopatcher, an unofficial updating utility. In addition to security patches, remember to keep virus definitions up-to-date (modern virus scanners support automatic updates so this should not be a problem), and stay current with latest program versions and updates, including your replacement internet browser and mail clients. 4. Anti-Malware There are many dangers lurking on the internet. Trojans, viruses, spyware. If you are a veteran user of the internet, you've probably developed a sixth-sense when it comes to avoiding malware, but I advocate backing up common sense with reliable anti-malware software. a. Anti-Virus Picking a virus scanner is important, I highly recommend Nod32, but there are good alternatives these days. Check out AV Comparatives for a comparison of scanning effectiveness and speed among top AV vendors. Highly Recommended Nod32 Antivirus $ I recommend Nod32 as a non-free Antivirus. Features excellent detection rates and fast scanning speed. Nod32 has a great heuristic engine that is good at spotting unknown threats. Very resource-friendly and historically known for using less memory than other AV's. There is a 30 day free trial available. Alternatives Avira AntiVir Personal I recommend Avira as a free Antivirus. Avira is a free AV with excellent detection rates and fast scanning speed. (Kaspersky no longer recommended, due to espionage concerns.) Online-Scanners Single File Scanning Jotti Online Malware Scan or VirusTotal These scanners can run a single file through a large number of different Antivirus/Antimalware suites in order to improve detection rates. Highly recommended. Whole PC Scanning ESET Online Scanner Nod32 Online Antivirus is pretty good, ActiveX though, so IE only. There is a beta version available that works with Firefox and Opera. b. HIPS / Proactive Defense Host-based intrusion prevention systems (HIPS) work by disallowing malware from modifying critical parts of the Operating System without permission. Classic (behavioral) HIPS software will prompt the user for interaction before allowing certain system modifications, allowing you stop malware in its tracks, whereas Virtualization-based HIPS works primarily by sandboxing executables. Although HIPS is very effective, the additional setup and prompts are not worth the headache for novice users (which may take to just clicking 'allow' to everything and defeating the purpose altogether). I only recommend HIPS for intermediate or advanced users that require a high level of security. Highly Recommended I highly recommend firewall-integrated HIPS solutions. Comodo Defense+ is a classic HIPS built into Comodo Internet Security, and provides a very good level of protection. Outpost and Online Armor provide their own HIPS solutions, and the component control features of the firewalls are powerful enough to keep unwanted applications from bypassing or terminating the firewall. If you want to use a different HIPS, you can disable the firewall HIPS module and use an alternative below. Alternatives Stand-alone HIPS solutions are good for users who either don't like the firewall built-in HIPS (and disable the firewall HIPS), or use a firewall without HIPS features. HIPS based on Behavior (Classic) ThreatFire ThreatFire provides a strong, free behavioral HIPS that works well in conjunction with Antivirus and Firewall suites to provide additional protection. HIPS based on Virtualization DefenseWall HIPS $ DefenseWall is a strong and easy-to-use HIPS solution that uses sandboxing for applications that access the internet. GeSWall Freeware GeSWall makes a nice free addition to the HIPS category, like DefenseWall it also uses sandboxing for applications that access the internet. Dealing with Suspicious Executables You can run suspicious executables in a full featured Virtual Machine (such as VMware) or using a standalone sandbox utility (such as Sandboxie) if you are in doubt of what it may do (though, you may argue that you shouldn't be running executables you don't trust anyway). A more advanced approach to examining a suspicious executable is to run it through Anubis, a tool for analyzing the behavior of Windows executables. It displays a useful report with things the executable does (files read, registry modifications performed, etc.), which will give you insight as to how it works. c. Malware Removal I recommend running all malware removal utilities on-demand (not resident). With a firewall, virus scanner, HIPS, and some common sense, you won't usually get to the point of needing to remove malware... but sometimes things happen, perhaps unavoidably, and you'll need to remove some pretty nasty stuff from a computer. Highly Recommended Anti-Spyware Spybot Search & Destroy Spybot S&D has been around a long time, and is very effective in removing spyware and adware. I personally install and use both Spybot & Ad-Aware, but I believe that Spybot S&D has the current edge in overall detection and usability. Anti-Trojan Malwarebytes' Anti-Malware Malwarebytes has a good trojan detector here, and scans fast. Anti-Rootkit Rootkit Unhooker RKU is a very advanced rootkit detection utility. Alternatives Anti-Spyware Ad-Aware Free Edition Ad-Aware is a fine alternative to Spybot S&D, its scanning engine is slower but it is both effective and popular. Anti-Trojan a-squared (a2) Free a-squared is a highly reputable (and free) trojan scanner. Anti-Rootkit IceSword (Mirror) IceSword is one of the most capable and advanced rootkit detectors available. 5. Information and Data Security Data can be reasonably protected using encryption and a strong password, but you will never have complete and absolute anonymity on the internet as long as you have an IP address. a. Privacy / Anonymity Anonymity is elusive. Some of the following software can help you achieve a more anonymous internet experience, but you also must be vigilant in protecting your own personal information. If you use social networking sites, use privacy settings to restrict public access to your profile, and only 'friend' people you know in real life. Don't use (or make any references to) any of your aliases or anonymous handles on any websites that have any of your personal information (Facebook, Amazon, etc..). You should opt-out from information sharing individually for all banks and financial institutions you do business with using their privacy policy choices. You should opt-out of preapproved credit offers (US), unsolicited commercial mail and email (US, UK, CA), and put your phone numbers on the "Do Not Call" list (US, UK, CA). Highly Recommended Simply install and use Tor with Vidalia to surf the internet anonymously. It's free, only downside is it's not terribly fast, but has fairly good anonymity, so it's a tradeoff. Keep in mind its for anonymity not for security, so make sure sites you put passwords in are SSL encrypted (and have valid SSL certificates), and remember that all end point traffic can be sniffed. You can use the Torbutton extension for Firefox to easily toggle on/off anonymous browsing. POP3/IMAP and P2P software won't work through Tor, so keep that in mind. Portable Anonymous Browsing The Tor Project now has a "Zero-Install Bundle" which includes Portable Firefox and Tor with Vidalia to surf anonymously from a USB memory stick pretty much anywhere with the internet. It also includes Pidgin with OTR for encrypted IM communications. Note: These won't protect you from Trojans/Keyloggers/Viruses on insecure public terminals. Never type important passwords or login to important accounts on a public computer unless it is absolutely necessary! Alternatives I2P functions similar to Tor, allowing you to surf the general internet with anonymity. IPREDator $ is a VPN that can be used to anonymize P2P/BitTorrent downloads. Freenet is notable, but not for surfing the general internet, it's its own network with its own content. b. Encryption For most people, encryption may be unnecessary. But if you have a laptop, or any sort of sensitive data (whether it be trade secrets, corporate documents, legal or medical documents) then you can't beat the kind of protection that encryption will offer. There are a variety of options available today, including a lot of software not listed here. A word to the wise, please, please don't fall for snake oil, use well established applications that use time tested (and unbroken) ciphers. Regardless of what software you use, the following "what to pick" charts will apply universally. If you have to pick an encryption cipher: Best: AES (Rijndael) (128-bit block size) Better: Twofish (128-bit block size), Serpent (128-bit block size) Good: RC6 (128-bit block size) Depreciated: Blowfish (64-bit block size), CAST5 (CAST-128) (64-bit block size), Triple-DES (64-bit block size) When encrypting large volumes of data, it is important to pick a cipher that has a block size of at least 128-bytes. This affords you protection for up to 2^64x16 bytes (264 exabytes) . 64-bit block ciphers only afford protection of up to 2^32x8 bytes (32 gigabytes) so using it as a full disk or whole disk encryption cipher is not recommended. The depreciated list is only because some of you might be stuck using software that only supports older encryption methods, so I've ordered it from what I feel is best to worst (though all three that are on there are pretty time tested and if properly implemented, quite secure). If you have to pick a hash to use: Best: Whirlpool (512-bit) Better: SHA-512 (512-bit), SHA-256 (256-bit) Good: Tiger2/Tiger (192-bit), RIPEMD-160 (160-bit) Depreciated: RIPEMD-128, SHA-1, MD-5. With all the recent advances in cryptanalysis (specifically with work on hash collisions) These days I wouldn't trust any hash that is less than 160-bits on principle. To be on the safe side, use a 192-bit, 256-bit, or 512-bit hash where available. There will be cases where your only options are insecure hashes, in which case I've ordered the "depreciated" list from best to worst (they are all varying levels of insecure). Many older hashes (MD4, MD2, RIPEMD(original), and others) are totally broken, and are not to be used. A quick software rundown, these applications are popular and trusted: Highly Recommended Freeware Whole Disk Encryption TrueCrypt Based upon E4M, TrueCrypt is a full featured disk encryption suite, and can even be run off a USB memory stick. TrueCrypt supports the whole disk encryption of Windows, with pre-boot authentication. Very nice. If you can't use whole-disk encryption (WDE), you can use the TCTEMP add-on to encrypt your swapfile, temp files and print spooler, and you can use the TCGINA add-on to encrypt your windows home directory. (Note: TCTEMP/TCGINA is less secure than WDE, and only preferable if WDE is not an option. WDE is highly recommended.) Freeware PKI Encryption GnuPG (GPG) GnuPG provides public-key encryption, including key generation and maintenance, signing and checking documents and email messages, and encryption and decryption of documents and email messages. Freeware Email Encryption Enigmail Enigmail is truly a work of art, it integrates with GnuPG and provides seamless support for encryption and decryption of email messages, and can automatically check PGP signed documents for validity. (Enigmail requires both Mozilla Thunderbird and GnuPG) Alternatives Encryption Suite (with Whole Disk and Email Encryption) PGP Full Disk Encryption $ PGP provides public-key encryption, including key generation and maintenance, signing and checking documents and email messages, encryption and decryption of documents and email messages, volume disk encryption, whole disk encryption, outlook integration, and instant messenger encryption support. c. Backup, Erasure and Recovery // This section is under construction. Backups Your data might be safe from prying eyes, but what if you are affected by hardware failure, theft, flood or fire? Regular backups of your important data can help you recover from a disaster. You should consider encryption of your backups for enhanced security. Local Backup Cobian Backup Cobian Backup is a fully-featured freeware backup utility. SyncBack Freeware, Macrium Reflect Free SyncBack Freeware and Macrium Reflect Free are feature-limited freeware backup utilities. Off-site Backup SkyDrive (25GB, filesize limited to 100MB), box.net (5GB) SkyDrive and box.net offer free online storage, useful for easy offsite backups. Be sure to utilize encrypted containers for any sensitive documents. Data Destruction It would be better to have your data residing in an encrypted partition, but sometimes that may not be possible. When sanitizing a hard drive, I recommend using a quality Block Erase tool like DBAN followed by a run-through with ATA Secure Erase if you really want a drive squeaky clean. Block erasing is good for data you can normally reach, but ATA secure erase can hit areas of the drive block erasers can't. As for multiple overwrite passes, there is no proof that data overwritten even one time can be recovered by professional data recovery corporations. For moderate security, a single pseudorandom block-erase pass (random-write) followed by an ATA Secure Erase pass (zero-write) is sufficient to thwart any attempts at data recovery. For a high level of security, a "DoD Short (3 pass)" block-erase pass followed by an ATA Enhanced Secure Erase will ensure no recovery is possible. Single-File/Free Space Erase If you are interested in just erasing single files or wiping free space, you can use the Eraser utility. Block Erase For hard drive block-erasure, use DBAN. ATA Secure Erase For ATA Secure Erasing, use the CMRR Secure Erase Utility. CMRR Secure Erase Protocols (.pdf) http://cmrr.ucsd.edu...seProtocols.pdf NIST Guidelines for Media Sanitation (.pdf) - http://csrc.nist.gov...800-88_rev1.pdf File Recovery Software This is kind of the opposite of data destruction. Keep in mind no software utility can recover properly overwritten data, so if it's overwritten there is no recovery. Highly Recommended Recuva Recuva is an easy to use GUI-based recovery utility. Alternatives TestDisk and PhotoRec These tools are powerful command-line recovery utilities. TestDisk can recover partitions, and PhotoRec is for general file recovery. Ontrack EasyRecovery Professional $ EasyRecovery is one of the best paid utilites for file recovery. d. Access Control (Passwords, Security Tokens) // This section is under construction. Secure Passwords //Section under construction. Your security is only as strong as its weakest password. There are a few basic rules to follow when creating a strong password. Length - Passwords should be at least 12 characters long. When possible, use a password of 12 or more characters, or a "passphrase". If you are limited to using less than 12 characters, you should try and make your password as long as allowable. Complexity - Passwords should have an element of complexity, a combination of upper and lowercase characters, numbers, and symbols will make your passwords much harder to guess, and harder to bruteforce. Uniqueness - Passwords should avoid containing common dictionary words, names, birthdays, or any identification related to you (social security, drivers license, or phone numbers for example). Secret - If you have a password of the utmost importance, do not write it down. Do not type them in plain view of another person or share them with anyone. Avoid use of the same password in multiple places. Security Tokens Security Tokens are cryptographic devices that allow for two-factor authentication. Google Titan Yubikey 5 Series 6. Conclusion And here we are at the end! I would like to thank all of you for taking the time to read my guide, it's a few (slow) years in the making and I've kept it up to date. This guide is always changing, so check back from time to time. Revision 1.10.020 Copyright © 2004-2012 Malakai1911, All Rights Reserved The information contained within this guide is intended solely for the general information of the reader and is provided "as is" with absolutely no warranty expressed or implied. Any use of this material is at your own risk, its authors are not liable for any direct, special, indirect, consequential, or incidental damages or any damages of any kind. This guide is subject to change without notice. Windows_Security_Template__1.10.015_.zip
  23. FukenGruven

    WindowTabs v2013.5.23

    WindowTabs Add Tabs to Any Application Website: http://www.windowtabs.com/ Download: Official Installer Download: Official Portable WindowTabs 2013 Crack by wronce: Site: http://www.tusfiles.net Sharecode: /6fx26kgmulo3 WindowTabs 2012 with Keygen c/o mrpink: Site: http://rghost.net Sharecode: /50575629 Compatibility: WinAll Dependencies: .NET Framework 2.0. (Windows 8 requires .NET Framework 3.5) Synopsis: i used to use QTTabBar.. it worked very well.. however.. i hated installation.. it left a mess behind.. WindowTabs is exactly what i have been searching for.. Tabs when i need it.. w/out installation It's light, fast, reliable, and does exactly what you expect from having tabs.. WindowTabs has increased my productivity.. especially working off of a laptop where space is limited... This is one of those apps. i pin to my Start Menu.. Happy Thanksgiving everyone! WindowTabsPortable_2013.5.23_English.paf.exe PortableApps.comFormat Makes application portable & stealth CRC: 8366377A Size: 0.99 MB (1,048,129 bytes) Note: this is fully cracked by wronce Site: http://www.mirrorcreator.com Sharecode: /files/BARHEDSO/WindowTabsPortable_2013.5.23_English.paf.exe_links WindowTabsPortable_2012.12.20_English.paf.exe CRC32: B6887370 Size: 0.99 MB (1,047,974 bytes) Note: cracked by BRD Site: http://www.mirrorcreator.com Sharecode: /files/7BQTRPY7/WindowTabsPortable_2012.12.20_English.paf.exe_links Changelog: November 29, 2013 - removed [Activate] Registry=true.. (forgot to remove it after testing was done) - if you downloaded earlier, you can simply remove that line in the Launcher.ini. Changelog: November 30, 2013 - added 2012 edition.. sadly im experiencing memory leak with 2013? anyone else? - updated 2013 installer with version checks. Changelog: December 2, 2014 - added crack by wronce. - updated 2013 PAF installer w/wronce's cracked EXE. - added 2012 keygen.
  24. Kon-Boot is an application which will silently bypass the authentication process of Windows based operating systems. Without overwriting your old password! In other words you can login to your Windows profile without knowing your password. Easy to use and excellent for tech repairs, data recovery and security audits. Fast, tiny and gets your job done! KON-BOOT 2in1 for Windows and Mac OSX. One Kon-Boot pendrive to bypass Windows and Mac OSX authorization process. One Kon-Boot pendrive to rule them all! Kon-Boot 2in1 is basically Kon-Boot for Windows and Kon-Boot for Mac OSX connected together. No need for multiple pendrives anymore. System Requirements: Kon-Boot 2in1 can be only installed on USB thumb drive (there is no .ISO in the package). Windows OS and Internet connection is required for the installation. All other requirements were already presented above (in the Kon-Boot for Windows and Kon-Boot for Mac OSX sections). Supported Operating Systems: All Windows systems starting from Windows XP to Windows 10 (both x86 and x64) Regarding the UEFI support only Windows 8/8.1/10 x64 systems are supported (this is default Microsoft policy, additionally there are virtually none x86 UEFI systems out there). Kon-Boot now is able to bypass online account authorization on Windows 8/8.1. On Windows 10 only local account authorization bypass is available (with possibility to add new administrator account automatically (USB only)). macOS: - macOS High Sierra OSX 10.13 (NEW) - macOS Sierra OSX 10.12 - OSX 10.11 - OSX 10.10 - OSX 10.9 - OSX 10.8 - OSX 10.7 - OSX 10.6 (experimental) Changelog: - Includes fixes for Windows (+awesome feature for Commercial licenses) and Mac OSX (supports 10.13). Complete Changelog: Version 2.7 update released - 03.02.2018: Multiple Kon-Boot installer fixes Version 2.7 released (2.6 version was skipped to match the 2in1 version) - 01.01.2018: Additional features for Commercial version (automatically executed powershell scripts!) (UEFI part only for Windows 8/Windows 10 x64) Multiple fixes for kon-boot stability (UEFI part) Multiple installer fixes (USB installer now requires online activation) CD version is deprecated and will no longer be maintained (last version with CD support is 2.5) UEFI support for x86 bit Windows system is deprecated and will no longer be maintained (there are virtually no x86 UEFI systems out there anyway) Entire documentation updated and moved to online form Homepage: http://www.piotrbania.com/all/kon-boot/ Changelog: https://kon-boot.com/docs/#windows_guide/#changelog Downloads: Kon-Boot 2.7 Full - Win + Mac: Site: https://www.upload.ee Sharecode[?]: /files/8141386/Kon-Boot_2.7.rar.html Mirror: Site: https://www.multiup.eu/en Sharecode[?]: /download/8525461794db0387a206788d25d91c13/Kon-Boot_2.7.rar FYI: Multiup can be .eu or .org. Pls use which is working for your location.
  25. The return of Windows 10's October updatewasn't welcome news for everyone. Microsoft says it's "working with Apple" to solve an iCloud for Windows bug that creates problems updating or syncing shared photo albums when using the latest Windows release. Suffice it to say that's a serious problem if you're interested in seamless access to your photos across your devices. It's not certain when you can expect a solution, but the two companies aren't taking any chances in the meantime. It's blocking PCs with iCloud for Windows from installing the latest Windows 10 update, and those who try to install it after the fact will get a warning that Windows doesn't support that version of iCloud. Like it or not, you may have to forego iCloud or the Windows update for a while. Source