Tag Archives: Software

Vulnerabilities in Netwrix PingCastle Pro/Enterprise (Nov. 2024)

[German]Brief information for administrators and IT service providers who use PingCastle (now part of Netwrix) to analyze Active Directory security. Due to vulnerabilities in the code, older versions of the Enterprise and Pro editions of the tool should no longer … Continue reading

Posted in Security, Software | Tagged , | Leave a comment

Advertising

3CX V18 with NFR license: Update to V20 mandatory since Nov. 15, 2024

[German]Brief information for IT supporters who use 3CX as a telephone system. The provider has probably significantly reduced the functionalities of 3CX version 18 in the NFR license as of 15 November 2024. Anyone wishing to use the full functionality … Continue reading

Posted in issue, Software | Tagged | Leave a comment

CISA warns about attacks on 0 day vulnerability in Palo Alto Networks firewalls

[German]An unpatched vulnerability (0-day) exist in the firewalls of Palo Alto Networks. The management interface can be accessed via this vulnerability. This 0-day vulneability is already being exploited for attacks. Both the BSI and the US authority CISA have issued … Continue reading

Posted in devices, Security | Tagged , | Leave a comment

Vulnerability in CrushFTP; update recommended

[German]Quick note to users who use CrushFTP. A blog reader has informed me that a serious vulnerability has been discovered ans has been made public on November 11, 2024. However, there are updates in which this vulnerability, for which no … Continue reading

Posted in Security, Software | Tagged , | Leave a comment

Script to prevent forced switch from Classic Outlook to New Outlook

[German]Microsoft wants to switch certain Microsoft 365 user groups from Outlook Classic to the new Outlook app from the beginning of 2025. A reader has written a "remediation script" to prevent this. I'll present it here, maybe someone can use … Continue reading

Posted in Office, Software, Windows | Tagged , | 1 Comment
Advertising

Why ISL Online: Critical factors when choosing a remote desktop solution

[Sponsored Post]In the rapidly evolving IT world, choosing the right remote desktop software is critical for organizations that value security, ease of use and reliability. One provider of secure remote access that has been on the market since 2001 is ISL Online, which presents some considerations for choosing such software below. More ...


Google uncovers vulnerability in SQLite with AI

[German]They do exist, useful examples of AI applications. The Project Zero team has now explained how it unleashed a Large Language Model (LLM) on software for vulnerability analysis in the "Big Sleep" project (the successor to "Naptime"). This uncovered a … Continue reading

Posted in Security, Software | Tagged , | Leave a comment

Advertising

Time capsule: DOOM in 1993

A little nostalgic look back for the older members of the blog readership. Do you still remember the year 1993 and the PCs of that time? And did any of you play the game DOOM – available as shareware at … Continue reading

Posted in Software | Tagged | 1 Comment

Why ISL Online: Critical factors when choosing a remote desktop solution

Advertising – In a rapidly evolving IT world, choosing the right remote desktop software is critical for organizations that count on security, ease of use and reliability. A vendor of secure remote access software – that has been on the … Continue reading

Posted in Software | Tagged | Leave a comment

Advertising

Windows: Adobe Reader (24.003.20180) freezes constantly (Oct. 2024)

[German]A quick question for the readers of this blog who use or administer Adobe Reader. Are there more and more reports that the Reader under Windows hangs after being called up and then no longer responds? I have come across … Continue reading

Posted in issue, Software | Tagged , | 1 Comment

Veeam warns of critical RCE vulnerability CVE-2024-4071 in Backup & Replication

[German]Veeam warns of a critical RCE vulnerability in Backup & Replication. Blog reader j. pointed out the vulnerability yesterday in the discussion area (thanks for that) – but I had already heard about it elsewhere. The vulnerability CVE-2024-4071 was classified … Continue reading

Posted in Security, Software | Tagged , | Leave a comment