Blogs
Links
Social networks
Awards
Sponsors
(Paypal-Donations)Recent Comments
- AltCtrlDel Anonymous on Word/Excel 2016 crashing after April 2025 update KB5002700
- Anonymous on Windows: Mysterious folder C:\Virus; Trend Micro involved?
- me on Windows: RDP access possible with old cached credentials
- yanta on Windows 11 24H2: Global rollout on compatible systems
- fd on Windows: RDP access possible with old cached credentials
Recent Comments
- AltCtrlDel Anonymous on Word/Excel 2016 crashing after April 2025 update KB5002700
- Anonymous on Windows: Mysterious folder C:\Virus; Trend Micro involved?
- me on Windows: RDP access possible with old cached credentials
- yanta on Windows 11 24H2: Global rollout on compatible systems
- fd on Windows: RDP access possible with old cached credentials
Monthly Archives: October 2020
Advertising
Data leak: Amazon customer data were leaked (Oct. 2020)
[English]There has been a data leak incident at Amazon. Amazon employees have passed customer data, including their e-mail addresses, to third parties. The employees were fired and the affected customers were informed. I came across the issue in two places … Continue reading
Nitro (PDF) data leak affects Apple, Google, Microsoft & Co.
[German]The provider Nitro PDF has experienced a massive data breach where cyber criminals have been able to stole data from customers. They are now selling the captured data in underground forums. This has implications for many high-profile organizations, including Apple, … Continue reading
Windows 10 20H2: Known issues and throttled rollout
[German]Microsoft currently throttles the broad rollout for Windows 10 October 2020 Update (20H2) and partially sets upgrade blockers for machines. There are also some known bugs in this new Windows 10 version. Advertising
End of support for Windows 10 and Office builds (October 2020 to May 2021)
[English]With the October 2020 patchday, the end of support for various Windows and Office products is approaching, which will soon no longer receive updates. Here is a brief overview of which products are no longer supported or have already reached … Continue reading
Advertising
Why ISL Online: Critical factors when choosing a remote desktop solution
[Sponsored Post]In the rapidly evolving IT world, choosing the right remote desktop software is critical for organizations that value security, ease of use and reliability. One provider of secure remote access that has been on the market since 2001 is ISL Online, which presents some considerations for choosing such software below. More ...
Docker Content Trust – Set environment variables correctly
Docker container security means that users must set the correct environment variables on the management host so that image signatures can be verified by Docker commands. Trend Micro describes how to verify container images in this article. Advertising
Advertising
FYI: WSUS Satisfaction survey
A small note to adminswho manage their updates via WSUS in Enterprise environments. Colleague Susan Bradley makes a small survey about the satisfaction with the WSUS. Maybe one or the other administrator will participate. Susan will publish the results in … Continue reading
Vulnerability in Nvidia GeForce Experience application fixed
[German]Nvidia recently had to release a security update for an application for its GeForce Experience driver package. The update fixed a security hole that was classified as critical. Advertising
Advertising
VirtualBox 6.1.16 freigegeben
[English]Small addendum: Oracles developers have already released Virtualbox version 6.1.16 on October 16, 2020. It is a maintenance update which should fix bugs of earlier versions. Advertising
From my past: Microsoft Windows Script Host 2.0 Developer’s Guide
Long time ago – 20 years ago my book 'Microsoft Windows Script Host 2.0 Developer's Guide' was published by Microsoft Press in the USA. Somebody told me on Twitter that someone in Hungary is hosting (illegally) the online version of … Continue reading
Mysterious 'Robin Hood' hackers donate stolen money
[German]Premiere in the field of cyber-crime? A group of hackers donates a tiny portion of the money they get from hacks to charity, which puzzles the experts. Here is some information about it. Advertising