Zum Inhalt der Seite gehen

Suche

Beiträge, die mit windows getaggt sind


🔐 Enhance your Windows automation with Ansible! Our latest blog explores authentication and encryption methods using WinRM, covering Basic Authentication, Domain User Authentication, and Certificate-based Authentication. Learn how to securely manage Windows systems with Ansible.

https://atix.de/en/blog/winrm-ansible-wege-der-authentifizierung-und-verschluesselung/

#windows #ansible #domain #user #authentication #certificate #blog #techblog #technology


Microsoft fixes 91 Vulnerabilities & 4 Zero-Days.

Microsoft’s November Patch Update fixes 91 Windows security vulnerabilities, including 4 zero-days. The critical fixes address actively exploited flaws in Windows. It is strongly recommended that users apply these updates as soon as possible to mitigate possible security risks. Updates can be installed via Windows Update.

https://msrc.microsoft.com/update-guide/

#microsoft #windows #update #it #security #privacy #engineer #media #tech #news
It is worth noting that, four vulnerabilities are rated as critical, including two remote code executions and two elevations of privilege flaws.

The two actively exploited zero-day vulnerabilities are:

• CVE-2024-43451: An NTLM Hash Disclosure Spoofing Vulnerability that exposes NTLMv2 hashes to remote attackers with minimal user interaction, such as selecting or right-clicking a malicious file.
• CVE-2024-49039: A Windows Task Scheduler Elevation of Privilege Vulnerability allowing attackers to execute RPC functions typically restricted to privileged accounts, potentially leading to unauthorized code execution or resource access.

Additionally, two publicly disclosed but not actively exploited vulnerabilities were addressed:

• CVE-2024-49040: A Microsoft Exchange Server Spoofing Vulnerability enabling threat actors to spoof sender email addresses to local recipients.
• CVE-2024-49041: A Windows MSHTML Platform Spoofing Vulnerability that could be leveraged to deceive users into interacting with malicious content.

The 91 vulnerabilities fixed in this update are categorized as follows:

• 3 Spoofing vulnerabilities
• 4 Denial of Service vulnerabilities
• 1 Information Disclosure vulnerability
• 26 Elevation of Privilege vulnerabilities
• 2 Security Feature Bypass vulnerabilities
• 52 Remote Code Execution vulnerabilities.


In a historic first, Microsoft releases Windows 11 24H2 Arm64 ISOs for direct download for Raspberry Pi’s etc


A laptop standing open on top of a wooden surface. The screen shows a red desert scene with blue sky.
Up until now, one of the ways to download Windows on Arm ISOs was by becoming a Windows Insider. Since the ISOs were available only as VHDX files, you could only use them on virtual disks for virtual machines like Hyper-V, but not on physical Arm hardware. Alternatively, you could also get those ARM ISOs through third-party sources like UUP dump. However, with the latest Arm64 ISO release on Microsoft’s website, you no longer have any limitations that you faced previously and can feel confident that the ISOs are legitimate and secure.

Now that the first-ever Arm64 ISOs for Windows 11 24H2 are live for everyone, you can download it directly from Microsoft’s ISO download page and install it directly on Arm hardware, just like how you do for x64 versions of PCs.

Which of course does go to show that Windows 11 could actually install on your more powerful PC or laptop that has no TPM chip, or a TPM v1.1 or whatever. But depending on what you really want to use your ARM device for, you may well still be better off installing a Linux distro on it because there won’t be any future restrictions on updating it, and it will probably be lighter to run on that hardware.

See https://www.xda-developers.com/microsoft-releases-windows-11-24h2-arm64-isos-for-direct-download
#Blog, #raspberrypi, #technology, #windows


#Linux and #Windows users with experience with #VirtualMachines, I need help. I've tried to install #ArchLinux 3 times now. The first time, I got a permission denied error because I chose the loopback device, not the #VMWare one. The second and third time, I did everything right but got an error saying the device path was not set. Does anyone know what might cause this?
#tech #technology #techProblems #techSupport


💡 Proton VPN: arriva il supporto nativo per dispositivi Windows ARM

https://gomoot.com/proton-vpn-arriva-il-supporto-nativo-per-dispositivi-windows-arm

#arm #blog #laptop #microsoft #news #picks #privacy #protonmail #protonvpn #surface #tech #tecnologia #windows @ProtonPrivacy


#Windows was created in the wake of IBM, Apple and Xerox and was therefore originally an acronym for "Wind shadows".


"Cyber-security firm Crowdstrike has admitted that the problem was caused by an update to its antivirus software, which is designed to protect Microsoft Windows devices from malicious attacks."

Any sufficiently bad update is indistinguishable from a malicious attack :neocat_floof_mug:

#CrowdStrike #Windows #Update as #CyberAttack


Why is Ubuntu used so much in the scientific field?
https://www.reddit.com/r/Ubuntu/comments/19cb7nh/why_is_ubuntu_used_so_much_in_the_scientific_field/
Spoiler: Cause I have to say... there's zero reasons to use windows on science, industry, technology, production, military... or any other field that takes it serious.
#foss #linux #ubuntu #fedora #redhat #windows #science #compare


#OpenRefine needs help to improve its #Windows and #MacOS #packaging. We want to make it easier to install the tool on those platforms. We use #Java #Maven #Launch4j and #Appbundle. Do you know someone who can help? RTs appreciated! https://openrefine.org/blog/2022/09/30/windows-macos-packaging.html