Latest Posts from all MSMVPS.COM blogs

  • Oracle – October 2019 security updates
    ADMINs, DBAs, and developers should update accordingly for this Oracle SECURITY release for October 2019 https://www.us-cert.gov/ncas/current-activity/2019/10/15/oracle-releases-october-2019-security-bulletin https://www.oracle.com/technetwork/security-advisory/cpuoct2019-5072832.html This Critical Patch Update contains 219 new security patches across the product families listed below. Please note that an MOS note summarizing the content of this Critical Patch Update and other Oracle Software Security Assurance activities is located at October 2019 Critical Patch Update: Executive Summary and Analysis.         ... read more
    Source: Latest Blog PostsPublished on Tuesday, October 22, 2019By harrywaldron
  • FTC – International Charity Fraud Awareness Week October 21–25 2019
    https://www.us-cert.gov/ncas/current-activity/2019/10/22/ftc-promotes-international-charity-fraud-awareness-week QUOTE: The Federal Trade Commission (FTC) has released an article promoting International Charity Fraud Awareness Week (ICFAW), which runs October 21–25. FTC, the National Association of State Charities Officials, and state and international partners coordinated this campaign to help both charities and donors avoid charity fraud. The Cybersecurity and Infrastructure Security Agency (CISA) encourages charities and donors to review FTC’s article and the following resources for more information: How to Donate Wisely and Avoid Charity Scams Tip Avoiding Social Engineering and Phishing Attacks Tip ICFAW resources and tips on FTC’s Twitter and Facebook accounts ... read more
    Source: Latest Blog PostsPublished on Tuesday, October 22, 2019By harrywaldron
  • Security – Best practices to ensure monitoring is working properly
    Excellent SANS ISC article describes need to verify all monitoring systems are working properly through recurring calendar reminders https://isc.sans.edu/forums/diary/What+Assumptions+Are+You+Making/25432/ I have been fortunate to work in cybersecurity for many years and at several diverse types of organizations. During that time, I always found it helpful to check on the status of the security agents periodically. I have found that by scheduling regular and recurring calendar reminders, I can better validate the assumption that the security agents are working as intended. ... read more
    Source: Latest Blog PostsPublished on Tuesday, October 22, 2019By harrywaldron
  • Avast network breeched
    Avast Network Breached As Hackers Target CCleaner Again “Avast said that it believes that the intrusion, first detected on Sept. 25, was likely targeting its CCleaner business in a supply chain attack. CCleaner, which is software that fights infections in PCs, was previously infiltrated by attackers in 2017 and led to the compromise of 2.27 million people’s systems.” ... read more
    Source: Latest Blog PostsPublished on Monday, October 21, 2019By hankshelp
  • Microsoft Surface – Hands on review of new hardware October 2019
    https://www.express.co.uk/life-style/science-technology/1192974/Microsoft-Windows-10-update-devices-new-Surface-laptop-Surface-Pro-release Although it may look the same, the 12.3-inch Surface Pro 7 has been totally rebuilt and now arrives with a better processor which makes it twice as fast as before. Then there’s the new Surface Pro X which offers powerful performance in a design that is Microsoft’s thinnest and lightest yet. The US firm has worked with Qualcomm to make sure there’s plenty of processing power and this is officially the fastest Qualcomm processor ever created for a PC. Another nice feature of the Pro X is the Signature Keyboard which finally includes a neat space to hold your digital stylus meaning it’s less likely to get lost when on the move. This device is also always-on and always connected so you won’t have to find Wi-Fi to get online. ... read more
    Source: Latest Blog PostsPublished on Monday, October 21, 2019By harrywaldron
  • NIST – Critical Cybersecurity Patch the Enterprise Project 2019
    https://redmondmag.com/articles/2019/10/09/microsoft-touts-nist-enterprise-patch-guide.aspx https://www.microsoft.com/security/blog/2019/10/09/patching-social-responsibility/ https://www.nccoe.nist.gov/projects/building-blocks/patching-enterprise An effort to help enterprise organizations better patch their software will be “kicking off soon,” according to a Wednesday Microsoft announcement.  That perspective comes from Mark Simos, lead cybersecurity architect for Microsoft’s Enterprise Cybersecurity Group. He was referring to a National Institute of Standards and Technology (NIST) effort called “Critical Cybersecurity Hygiene: Patching the Enterprise Project.” ... read more
    Source: Latest Blog PostsPublished on Monday, October 21, 2019By harrywaldron
  • How to Mount Folder as Virtual Drive in Windows 7, Windows 8, and Windows 10
    In Windows, you can mount any folder at any location as a virtual drive with a drive letter. When you mount a folder as virtual drive, you will be able to access the folder from the virtual drive. The contents of the folder will still physically be located in the folder. Anything you save into the virtual drive will actually be saved to the folder’s location. Virtual drives from mounted folders are not persistent and only available during the current user session by default. If you sign out, restart the computer, or shut down the computer, all current virtual drives will be removed (unmounted). This tutorial will show you how to mount any folder as a virtual drive with a drive letter in Windows 7, Windows 8, and Windows 10. Read more… ... read more
    Source: Latest Blog PostsPublished on Sunday, October 20, 2019By Brink
  • Security Mailer (2019 # 42)
    Security Mailer Volume 19 Number 42 Cisco Security Advisories Linux Updates Microsoft Update released Known issues reported Windows 10 end of service reminders General Security reviews last week ... read more
    Source: Latest Blog PostsPublished on Sunday, October 20, 2019By hankshelp
  • How to Mount a Drive to a Folder in Windows 10
    You can assign a mount point folder path to a drive to have the drive appear as a normal folder located where you want. With you mount an internal or external drive to an empty folder, you will be able to access the contents of the drive from the folder path. The contents of the drive will still physically be located on the drive. Anything you save into this folder will actually be saved to the drive. You can mount a drive with or without a drive letter to an empty folder. This tutorial will show you how to assign a mount point folder path to a drive to link the folder and drive in Windows 10. Read more… ... read more
    Source: Latest Blog PostsPublished on Saturday, October 19, 2019By Brink
  • How to Securely Login to Local Accounts with YubiKey Security Key in Windows 7, Windows 8, and Windows 10
    Yubico Login for Windows application provides a simple and secure way for YubiKey users to securely access their local accounts on Windows computers. The primary benefits of Yubico Login for Windows include: Highly secure and easy-to-use multi-factor authentication (MFA) for login using local accounts to Windows workstations Simple configuration for up to 10 individual users Fast enrollment for backup YubiKeys Easy recovery mechanisms for lost YubiKeys Yubico Login for Windows is designed to provide strong MFA for logging into local accounts on Windows 7, Windows 8.1 or Windows 10 computers. It is not suited for logging into any of the following accounts: Azure Active Directory (AAD), Active Directory (AD), Microsoft accounts. See also: Yubico Login for Windows Configuration Guide | Yubico support Once you have Yubico Login setup and configured for a local account on the computer, the user will be required to connect the YubiKey security Key before typing their user name and password credentials to log in to Windows. This tutorial will show you how to set up Yubico Login to login to a local account with a YubiKey security key in Windows 7, Windows 8, and Windows 10. Read more… ... read more
    Source: Latest Blog PostsPublished on Friday, October 18, 2019By Brink
  • Windows 7 – CISA highlights EOL warning for January 14 2020
    https://www.us-cert.gov/ncas/alerts/aa19-290a QUOTE:  Systems running Windows 7 and Windows Server 2008 R2 will continue to work at their current capacity even after support ends on January 14, 2020. However, using unsupported software may increase the likelihood of malware and other security threats. Mission and business functions supported by systems running Windows 7 and Windows Server 2008 R2 could experience negative consequences resulting from unpatched vulnerabilities and software bugs. These negative consequences could include the loss of confidentiality, integrity, and availability of data, system resources, and business assets. Mitigations The Cybersecurity and Infrastructure Security Agency (CISA) encourages users and organizations to: Upgrade to a newer operating system. Identify affected devices to determine breadth of the problem and assess risk of not upgrading. Establish and execute a plan to systematically migrate to currently supported operating systems or employ a cloud-based service. Contact the operating system vendor to explore opportunities for fee-for-service maintenance, if unable to upgrade. References [1] Microsoft End of Support FAQ [2] Microsoft Windows Lifecyle Fact Sheet [3] Microsoft Windows Upgrade and Migration Considerations [4] ComputerWorld: Leaving Windows 7? Here are Some non-Windows Options [5] CISA Analysis Report AR19-133A: Microsoft Office 365 Security Observations ... read more
    Source: Latest Blog PostsPublished on Friday, October 18, 2019By harrywaldron
  • Tips for DBA: “SET QUERY_STORE = OFF” AND “QUERY STORE BACKGROUND FLUSH DB”
    Если выполнение отключения QS для базы данных блокируется системным процессом: QUERY STORE BACKGROUND FLUSH DB SET DEADLOCK_PRIORITY HIGH ALTER DATABASE [DATABASENAME] SET QUERY_STORE = OFF WITH NO_WAIT GO Подключиться через DAC и сделать: TRUNCATE table sys.plan_persist_runtime_stats; TRUNCATE table sys.plan_persist_runtime_stats_interval; TRUNCATE table sys.plan_persist_plan; TRUNCATE table sys.plan_persist_query; TRUNCATE table sys.plan_persist_query_text; TRUNCATE table sys.plan_persist_context_settings; Подробности можно найти тут: Manually Clearing the Query Store ... read more
    Source: Latest Blog PostsPublished on Friday, October 18, 2019By gladchenko
  • Tips for DBA: The SQL Server service and the SQL Server Agent Service fail to start on a stand-alone server
    Если в журнале приложений есть ошибки для MSSQLService: “…TDSSNIClient initialization failed with error 0x80092004…” нужно В POWERSHELL создать самоподписной сертификат (заменив в скрипте имя SERVERNAME.DOMENNAME.ru на полное имя вашего сервера): New-SelfSignedCertificate -Type SSLServerAuthentication -DnsName SERVERNAME.DOMENNAME.ru -KeyLength 2048 -KeySpec KeyExchange -KeyUsage KeyEncipherment -TextExtension @(“2.5.29.37={text}1.3.6.1.5.5.7.3.1”) -NotAfter (Get-Date).AddMonths(1200) Далее нужно указать для протоколов созданный сертификат, как это описано в главе “Configuring SSL for SQL Server” статьи: https://docs.microsoft.com/en-us/previous-versions/sql/sql-server-2008-r2/ms189067(v=sql.105) ... read more
    Source: Latest Blog PostsPublished on Friday, October 18, 2019By gladchenko
  • How to Specify Scheduled Scan Type for Windows Defender Antivirus in Windows 10
    Windows Security is built-in to Windows 10 and includes an antirvirus program called Windows Defender Antivirus. Windows Defender Antivirus helps protect your PC against malware (malicious software) like viruses, spyware, and other potentially unwanted software. Malware can infect your PC without your knowledge: it might install itself from an email message, when you connect to the Internet, or when you install certain apps using a USB flash drive, CD, DVD, or other removable media. Some malware can also be programmed to run at unexpected times, not only when it’s installed. Windows Defender Antivirus regularly scans your device to help keep it safe. Windows tries to do this while you are not using your device so it doesn’t interfere with your work. You can also schedule Windows Defender Antivirus to scan at a time and frequency that you choose. By default, Windows Defender Antivirus will perform a Quick Scan during a scheduled scan. This tutorial will show you how to specify to use a Quick Full scan type during a scheduled scan by Windows Defender Antivirus in Windows 10. Read more… ... read more
    Source: Latest Blog PostsPublished on Thursday, October 17, 2019By Brink
  • How to Change Windows Defender Antivirus Maximum CPU Usage for a Scan in Windows 10
    Windows Security is built-in to Windows 10 and includes an antirvirus program called Windows Defender Antivirus. Windows Defender Antivirus helps protect your PC against malware (malicious software) like viruses, spyware, and other potentially unwanted software. Malware can infect your PC without your knowledge: it might install itself from an email message, when you connect to the Internet, or when you install certain apps using a USB flash drive, CD, DVD, or other removable media. Some malware can also be programmed to run at unexpected times, not only when it’s installed. Windows Defender Antivirus has a maximum 50 percentage CPU usage for a scan by default in Windows 10. If you like, you can specify a percentage of CPU usage you want Windows Defender Antivirus to not exceed. This tutorial will show you how to specify the maximum percentage CPU usage allowed for a scan by Windows Defender Antivirus in Windows 10. Read more… ... read more
    Source: Latest Blog PostsPublished on Thursday, October 17, 2019By Brink
  • Instant Karma: Stolen credit card sale site hacked!!
    Data for a whopping 26 million stolen payment cards leaked in hack of fraud bazaar A thriving online bazaar selling stolen payment card data has been hacked in a heist that leaked the records for more than 26 million cards, KrebsOnSecurity reported on Tuesday. ... read more
    Source: Latest Blog PostsPublished on Thursday, October 17, 2019By hankshelp
  • Oracle Critical Patch Update for October 2019
    Source: Latest Blog PostsPublished on Wednesday, October 16, 2019By hankshelp
  • Hidden files
    If you suspect there are hidden files in a folder you can use the Attributes parameter to discover them: PS> Get-ChildItem -Path c:test -Attributes H OR PS> Get-ChildItem -Path c:test -Attributes h OR PS> Get-ChildItem -Path c:test -Hidden   If you want to see all files irrespective of them being hidden use Force PS> Get-ChildItem -Path c:test –Force   which will also show system files. There are a number of ways to make a file hidden but the most generic is: PS> Get-ChildItem -Path C:testNewoutdata03.txt | ForEach-Object {$_.Attributes += ‘Hidden’}   You can modify the criteria used to define the files passed into Foreach-Object by using the path, filter, exclude or include parameters of Get-ChildItem. The Hidden attribute is set while preserving the other attributes. To remove the Hidden attribute: PS> Get-ChildItem -Path C:test -Hidden | ForEach-Object {$_.Attributes -= ‘Hidden’}   The Hidden attribute is removed whilst preserving other attributes. The files passed into ForEach-Object can again be filtered with the Get-ChildItem parameters. ... read more
    Source: Latest Blog PostsPublished on Sunday, October 13, 2019By richardsiddaway
  • Security Mailer (2019 # 41)
    Security Mailer Volume 2019 Number 41 Adobe security update prenotification Apple Security updates Browser updates Chrome Firefox Cisco security advisories Linux updates Microsoft Tuesday updates update revisions advisory General Security reviews last week Notepad++ update ... read more
    Source: Latest Blog PostsPublished on Sunday, October 13, 2019By hankshelp
  • How to Set App and Game Limits for Microsoft Family Child on Windows 10, Xbox One, and Android
    A family group helps families stay connected and keeps kids safer on Windows 10, Xbox One devices, and Android devices running Microsoft Launcher. It’s free, and it’s one of the many benefits of having a Microsoft account. With the settings on family.microsoft.com, you can get reports on a child’s activity, set screen time limits, check on a child’s location, limit which websites and games they can access, and require your approval to purchase from the Microsoft Store. Once you set up your family group, you can add or remove child and adult members. If your child is spending too much time on certain apps, you can set limits on the apps to help them achieve a healthy balance. App limits are available on Windows 10 and Xbox One devices, along with Android devices with Microsoft Launcher installed. Once you set a limit on an app, that limit will work across all of their devices. (For example, if you give them three hours on YouTube, they can spend a total of three hours on Windows 10, Xbox One, and Android.) This tutorial will show you how to turn on an manage app and game limits for a child member in your ... read more
    Source: Latest Blog PostsPublished on Saturday, October 12, 2019By Brink
  • Resoluciones del Nuevo Mes: Octubre 2019
    Antes de escribir las resoluciones del nuevo mes, revisión de las del mes anterior: – Continuar RLie [completo] ver repo – Continuar Erlie [pendiente] – Continuar Walang [pendiente] – Continuar SimpleNeuron [pendiente] – Continuar SimpleTalk [pendiente] – Continuar BlockchainJ [completo] ver repo – Preparar charla sobre Deep Learning y el Juego del Go [completo] presentation links – Continuar evmcompiler [pendiente] – Continuar selang [pendiente] – Continuar solcom [pendiente] – Continuar EthRlp [pendiente] – Continuar EthMeta [completo] ver repo – Continuar Monki [pendiente] – Continuar aprendiendo curvas elípticas [completo] – Continuar aprendiendo Rust [pendiente] – Continuar aprendiendo Golang [pendiente] También estuve trabajando en: – Mejorando RskAPI agregando comandos [completo] ver repo – Comenzar EthSwap [completo] ver repo – Mejorar EthMMR [completo] ver repo – Mejorar gelex lexer genérico [completo] ver repo – Mejorar gepars parser genérico [completo] ver repo Resoluciones del nuevo mes: – Continuar RLie – Continuar Erlie – Continuar Walang – Continuar SimpleNeuron – Continuar SimpleTalk – Continuar BlockchainJ – Dar una charla sobre Blockchain y Contratos Inteligentes – Continuar evmcompiler – Continuar selang – Continuar solcom – Continuar EthRlp – Continuar EthMeta – Continuar Learning Elliptic Curves – Continuar Learning Rust – Continuar Learning Golang – Continuar EthSwap ... read more
    Source: Latest Blog PostsPublished on Friday, October 11, 2019By lopez
  • How to Enable or Disable Windows Update Status Taskbar Notification Area Icon in Windows 10
    The Windows Update Status icon in the taskbar notification area was first introduced in the Windows 10 April 2018 Update (version 1803). By default, the Windows Update Status notification icon will only show on the taskbar when there is a warning or alert about Windows Update showing on the Settings > Update & Security > Windows Update page. You can click/tap on the Windows Update Status icon to open the Settings > Update & Security > Windows Update page. You can right click on the Windows Update Status icon, it will open a context menu to click/tap on available options. The available options will vary depending on what the warning or alert is for, but can be: Restart now, Schedule restart, Download now, Open Windows Update, and Hide for now. If you prefer to not to see the Windows Update Status icon, you can disable it. This tutorial will show you how to enable or disable the Windows Update Status icon in the taskbar notification area for your account or all users in Windows 10. Read more… ... read more
    Source: Latest Blog PostsPublished on Thursday, October 10, 2019By Brink
  • How to Turn On and Setup or Turn Off Calls in Your Phone app on Windows 10 PC for Android Phone
    Microsoft has made an early preview of a new Calls feature available for the Your Phone app version 1.19092.399.0 in Windows 10 for Windows Insiders. No need to dig for your Android phone to answer your personal or work calls. You can now stay connected by simply answering (or not) your phone calls on your PC. Tap into your PC’s speakers, microphone, and large screen for a richer calling experience. With the Calls feature you can: Answer incoming phone calls on your PC. Initiate phone calls from your PC using in-app dialer or contact list. Decline incoming phone calls on your PC with custom text or send directly to your phone’s voicemail. Access your recent call history on your PC. Clicking on a specific call will auto populate the number within the dialer screen. Seamlessly transfer calls between your PC and phone. This tutorial will show you how to turn on and set up or turn off the Calls feature to make and receive calls from an Android phone in the Your Phone app on a Windows 10 PC. Read more… ... read more
    Source: Latest Blog PostsPublished on Wednesday, October 9, 2019By Brink
  • Microsoft Security Updates – OCTOBER 2019
    Below are key resources documenting this recent monthly Microsoft Patch Tuesday release https://isc.sans.edu/forums/diary/Microsoft+October+2019+Patch+Tuesday/25396/ https://blog.talosintelligence.com/2019/10/microsoft-patch-tuesday-oct-2019.html https://www.thezdi.com/blog/2019/10/8/the-october-security-update-review https://patchtuesdaydashboard.com/ https://portal.msrc.microsoft.com/en-us/security-guidance/summary TALOS — Microsoft disclosed nine critical vulnerabilities this month, eight of which we will highlight below. CVE-2019-1333 is a client-side remote execution vulnerability in Remote Desktop Services (RDP) that occurs when a user visits a malicious server. CVE-2019-1238 and CVE-2019-1239 are remote code execution vulnerabilities that exist in the way VBScript handles objects in memory. An attacker could exploit these vulnerabilities by tricking a user into visiting a specially crafted, malicious website through Internet Explorer. CVE-2019-1307CVE-2019-1308CVE-2019-1335 and CVE-2019-1366 are all memory corruption vulnerabilities in the Chakra Scripting Engine inside of the Microsoft Edge web browser. CVE-2019-1372 is an elevation of privilege vulnerability on Azure Stack when the Azure App Service fails to properly check the length of a buffer prior to copying memory to it. There is also CVE-2019-1060, a remote code execution vulnerability in  Microsoft XML Core Services. ... read more
    Source: Latest Blog PostsPublished on Wednesday, October 9, 2019By harrywaldron
  • Security Mailer (2019) # 40
    Security Mailer Volume 19 Number 40 Browsers Firefox update Vendors begin depricating TLS 1.0 and TLS 1.1 Cisco Security Advisories Open Source Linux Kernel getting new Lockdown feature Linux updates; Microsoft Updates released Updates revised SDX Helper issues General Security reviews last week, Updates for TCPDUMP and LIBPCAP ... read more
    Source: Latest Blog PostsPublished on Wednesday, October 9, 2019By hankshelp

Windows 10 users (16299.334 and higher) – Get the latest articles from MSMVPs.com bloggers with our Progressive Web App.

Available in the Windows Store

https://www.microsoft.com/en-us/store/p/msmvps/9pj5grdshnz1?rtc=1 – Pin to your Start menu and/or Taskbar.

Questions? Contact Susan at Susan-at-msmvps.com or Barb-at-msmvps.com. Each post's copyright held by the original author. All rights reserved. Blog site is an independent site not sponsored by Microsoft.


Our servers would like to thank www.ownwebnow.com and www.exchangedefender.com . We wouldn't be here without the generosity of Vlad Mazek and his companies.