Blogs
Links
Archives
Categories
Social networks
Awards
Sponsors
(Paypal-Donations)Recent Comments
- Chris Pugson on Vivaldi developer complains in letter to EU about Microsoft's approach to Edge
- Chris Pugson on Google Pixel Watch: No repair for broken glass
- EP on Windows 11 23H2 announced for 4th Q. 2023; Windows 10 IoT Enterprise LTSC 2021 starting Aug. 1, 2023.
- headdub on DLL hijacking vulnerabilities in Nirsoft tools
- Emon on Office 2016 Update KB5002457 causes appwiz.cp-/mso.dll errors
Meta
Recent Comments
- Chris Pugson on Vivaldi developer complains in letter to EU about Microsoft's approach to Edge
- Chris Pugson on Google Pixel Watch: No repair for broken glass
- EP on Windows 11 23H2 announced for 4th Q. 2023; Windows 10 IoT Enterprise LTSC 2021 starting Aug. 1, 2023.
- headdub on DLL hijacking vulnerabilities in Nirsoft tools
- Emon on Office 2016 Update KB5002457 causes appwiz.cp-/mso.dll errors
Archives
Categories
Meta
Tag Archives: Securityt
Important notes from Microsoft regarding the Exchange server security update (March 2021)
[German]Microsoft warns, that installing the March 2021 cumulative security updates for Exchange servers need to be done with administrative privileges. Otherwise the patch will not close the vulnerabilities. In addition, German BSI (Federal Office for Information Security) warns that thousands … Continue reading
Advertising
China Flash Player shipped with malicious Adware
[German]After the end of Flash support, a Flash player is offered on a website In China that behaves like adware and opens browser windows to display advertisements. This case, revealed by security researchers, proves how risky downloading software from unofficial … Continue reading
How to find weak passwords in Active Directory and eliminate them with PowerShell
[Sponsored Post]Weak or compromised passwords are a known gateway for attackers. If you are able to identify which users in Active Directory (AD) are threatened by this, then PowerShell can help to remedy it. However, PowerShell scripts cannot eliminate basic AD deficits, other tools are needed for this. More ...
Design flaws endanger low energy Bluetooth devices
[German]A design flaw compromises the safety of low energy Bluetooth devices such as fitness trackers or smart speakers. These are prone to hacker attacks due to the flaw. Advertising