Browsed by
Category: New Technical

This forum is for new technical discussion and are open for comments and posts

Install Windows 11 on my “incompatible” PC

Install Windows 11 on my “incompatible” PC

I have a PC with an Intel Core i7-7660U CPU, running Windows 10. It’s only a few years old. When I check Windows Update, I see a message that says it’s not compatible with Windows 11. Will this machine eventually support Windows 11? Is there any way around this? Microsoft officially released the Surface Pro 5 in June 2017 and continued selling it as a current model until its successor was released in October 2018. That means your Surface Pro…

Read More Read More

Restore Full Context Menus in Windows 11

Restore Full Context Menus in Windows 11

If you hate having to dig into “Show more options” in your context menu to do something you used to be able to do in Windows 10 a whole lot more conveniently, here’s the trick to fixing Windows 11’s context menus. 1. Open Regedit by hitting the Windows key and typing regedit. Hit Enter to launch it. 3. Right-click > New > Key, and paste in this name: {86ca1aa0-34aa-4e8b-a509-50c905bae2a2} 4. With the new key you just created highlighted, again right-click…

Read More Read More

People have got their files back without paying the gangs

People have got their files back without paying the gangs

No More Ransom project now offers free tools for decrypting 165 families of ransomware as the fight against extortion groups continues. The battle against ransomware is challenging because not only are ransomware attacks extremely disruptive, but in many cases, victims opt to pay the ransom demand for a decryption key – fueling additional ransomware attacks because criminals know they can make easy money.  However, one scheme continues to take the fight to ransomware gangs and has now helped over 1.5…

Read More Read More

Improve network speed by increasing IRPStackSize

Improve network speed by increasing IRPStackSize

Increasing IRPStackSize’s value from its safe-but-slow default number should considerably increase the network performance of your Windows 10 PC. It doesn’t matter whether you are working at the office or remotely, a high-performance network connection is vital to your productivity. This simple fact is why so many people working from home offices have opted to purchase high speed broadband internet connections. But getting the fastest internet connection does not guarantee a high-performance network—the are other factors to consider. The default…

Read More Read More

Microsoft Issues Hotfix For Windows 10 Chkdsk BSODs And SSD File System Corruption

Microsoft Issues Hotfix For Windows 10 Chkdsk BSODs And SSD File System Corruption

The Windows 10 Check Disk Utility (chkdsk) that is crippling some PCs. The bug was unfortunately introduced with KB4592438 for Windows 10 20H2 during Patch Tuesday earlier this month. The update led to disk corruption – primarily with SSDs – when running chkdsk /f using the command prompt as an administrator. After running the chkdsk, users would be presented with a Blue Screen of Death (BSOD) pointing to a NTFS_FILE_SYSTEM error. Microsoft has now acknowledged the problem in an update to the “Known Issues”…

Read More Read More

PHISHING SCAMS AND HOW NOT TO GET CAUGHT

PHISHING SCAMS AND HOW NOT TO GET CAUGHT

Email phishing scams are getting more sophisticated every day, using familiar sender names and other information to lower their targets’ defenses and make them more likely to become victims. It may seem like we’ve seen it all, and then — bam! — we’re hit with a sneaky new tactic or a complicated computer virus. How can we keep our computers, networks, and personal identities safe online? By remaining vigilant — think before you click! Following are 4 ways internet scammers…

Read More Read More

Five Utilities for Improving your Online Privacy

Five Utilities for Improving your Online Privacy

There are more Hacks, leaks, and breaches that are a constant threats. As security firms patch holes new ones emerge, meaning it’s only a matter of time before your information is leaked on the web through no fault of your own. Staying safe on the internet means defending yourself against any and all scripts, plugins, applets, and pop ups that may appear. Here are five apps that can do just that. Ghostery Everything you do online is tracked—that’s just the…

Read More Read More

Outmaneuver Ransomware Threats and Keep Data Safe

Outmaneuver Ransomware Threats and Keep Data Safe

Ransomware made a huge splash in 2016. There’s no denying the motivation here: Money—as in virtually untraceable, digital cryptocurrency—has made this segment of the security realm nearly unstoppable. And if it continues to grow as projected, its reach will extend to more and more users, bringing in tens of millions of dollars for threat actors wishing to cash in on the epidemic. So what does this mean for your data if it’s something that can’t be stopped? Well, many of…

Read More Read More

Reduce Risk of Exposure to CSRF or XSRF attacks?

Reduce Risk of Exposure to CSRF or XSRF attacks?

Cross site request forgery (CSRF or XSRF) exploits take advantage of websites’ trust in your browser. When you are logged into a website, an attacker can send a request to that site while pretending to be you—even if you’re not actively using the site. For example, while you’re logged into a message board or social media account, the attacker could send a request to post a virus download link as if it came from you. While you’re logged into your…

Read More Read More

Phishing Campaign that Targets Gmail Users

Phishing Campaign that Targets Gmail Users

Security Researchers have Detected a Phishing Campaign that Targets Gmail Users Internet security researchers have detected a new phishing campaign that has recently been targeting Google account users. The highly successful campaign has managed to affect even the most experienced computer users. The phishing attacks are carried out through an email sent to unsuspecting Gmail user. The email is sent from a compromised account belonging to a person familiar to the user complete with actual subject lines. It contains a…

Read More Read More