<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>M.A.S. Electronics&#039; Blog</title>
	<atom:link href="https://blog.maselectronics.com/feed/" rel="self" type="application/rss+xml" />
	<link>https://blog.maselectronics.com</link>
	<description>A Great Place To Share Technical Ideas.</description>
	<lastBuildDate>Mon, 15 Apr 2024 20:36:56 +0000</lastBuildDate>
	<language>en-US</language>
	<sy:updatePeriod>
	hourly	</sy:updatePeriod>
	<sy:updateFrequency>
	1	</sy:updateFrequency>
	<generator>https://wordpress.org/?v=6.9.1</generator>
	<item>
		<title>Install Windows 11 on my &#8220;incompatible&#8221; PC</title>
		<link>https://blog.maselectronics.com/install-windows-11-on-my-incompatible-pc/</link>
					<comments>https://blog.maselectronics.com/install-windows-11-on-my-incompatible-pc/#respond</comments>
		
		<dc:creator><![CDATA[Mike]]></dc:creator>
		<pubDate>Sat, 11 Mar 2023 21:21:19 +0000</pubDate>
				<category><![CDATA[New Technical]]></category>
		<guid isPermaLink="false">https://blog.maselectronics.com/?p=5573</guid>

					<description><![CDATA[I have a PC with an Intel Core i7-7660U CPU, running Windows 10. It&#8217;s only a few years old. When I check Windows Update, I see a message that says it&#8217;s not compatible with Windows 11. Will this machine eventually support Windows 11? Is there any way around this? Microsoft officially released the Surface Pro 5 in June 2017 and continued selling it as a current model until its successor was released in October 2018. That means your Surface Pro...<p class="read-more"><a class="btn btn-default" href="https://blog.maselectronics.com/install-windows-11-on-my-incompatible-pc/"> Read More<span class="screen-reader-text">  Read More</span></a></p>]]></description>
										<content:encoded><![CDATA[
<p>I have a PC with an Intel Core i7-7660U CPU, running Windows 10. It&#8217;s only a few years old. When I check Windows Update, I see a message that says it&#8217;s not compatible with Windows 11. Will this machine eventually support Windows 11? Is there any way around this?</p>



<figure class="wp-block-image size-full"><a href="https://blog.maselectronics.com/wp-content/uploads/2023/03/override-compatibility-check-windows11.webp"><img fetchpriority="high" decoding="async" width="640" height="360" src="https://blog.maselectronics.com/wp-content/uploads/2023/03/override-compatibility-check-windows11.webp" alt="" class="wp-image-5574" srcset="https://blog.maselectronics.com/wp-content/uploads/2023/03/override-compatibility-check-windows11.webp 640w, https://blog.maselectronics.com/wp-content/uploads/2023/03/override-compatibility-check-windows11-300x169.webp 300w, https://blog.maselectronics.com/wp-content/uploads/2023/03/override-compatibility-check-windows11-480x270.webp 480w" sizes="(max-width: 640px) 100vw, 640px" /></a></figure>



<p>Microsoft officially released the Surface Pro 5 in June 2017 and continued selling it as a current model until its successor was released in October 2018. That means your Surface Pro is probably about four years old and should have plenty of useful life remaining. Alas, its 7th Generation Intel Core CPU isn&#8217;t on the list of Windows 11 compatible CPUs, which means upgrades via Windows Update are not supported and probably never will be.</p>



<p>If you&#8217;re willing to perform a clean install of Windows 11, you can boot from installation media and run Windows Setup. That option skips the CPU compatibility check completely.</p>



<p>To upgrade your system, you need to modify the registry, as documented in this&nbsp;<a href="https://support.microsoft.com/en-us/windows/ways-to-install-windows-11-e0edbbfb-cfc5-4011-868b-2ce77ac7c70e" target="_blank" rel="noreferrer noopener">Microsoft support document</a>. (The usual warnings apply when working with the registry. Make a complete backup before proceeding.) Open Registry Editor and navigate to the following key:</p>



<p>HKEY_LOCAL_MACHINE\SYSTEM\Setup\MoSetup</p>



<p>Create a new DWORD value, AllowUpgradesWithUnsupportedTPMOrCPU, and set it to 1.</p>



<p>You can now perform the upgrade by downloading an ISO file, mounting it as a virtual drive, and running Setup from Windows 10. You&#8217;ll see a stern warning about compatibility issues, but after you click OK on that dialog box your upgrade should proceed without any serious issues.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://blog.maselectronics.com/install-windows-11-on-my-incompatible-pc/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>Restore Full Context Menus in Windows 11</title>
		<link>https://blog.maselectronics.com/restore-full-context-menus-in-windows-11/</link>
					<comments>https://blog.maselectronics.com/restore-full-context-menus-in-windows-11/#respond</comments>
		
		<dc:creator><![CDATA[Mike]]></dc:creator>
		<pubDate>Sun, 26 Feb 2023 21:47:53 +0000</pubDate>
				<category><![CDATA[New Technical]]></category>
		<guid isPermaLink="false">https://blog.maselectronics.com/?p=5549</guid>

					<description><![CDATA[If you hate having to dig into &#8220;Show more options&#8221; in your context menu to do something you used to be able to do in Windows 10 a whole lot more conveniently, here&#8217;s the trick to fixing Windows 11&#8217;s context menus. 1. Open Regedit by hitting the Windows key and typing regedit. Hit Enter to launch it. 3. Right-click &#62; New &#62; Key, and paste in this name: {86ca1aa0-34aa-4e8b-a509-50c905bae2a2} 4. With the new key you just created highlighted, again right-click...<p class="read-more"><a class="btn btn-default" href="https://blog.maselectronics.com/restore-full-context-menus-in-windows-11/"> Read More<span class="screen-reader-text">  Read More</span></a></p>]]></description>
										<content:encoded><![CDATA[
<p>If you hate having to dig into &#8220;Show more options&#8221; in your context menu to do something you used to be able to do in Windows 10 a whole lot more conveniently, here&#8217;s the trick to fixing Windows 11&#8217;s context menus.</p>



<figure class="wp-block-image size-full"><a href="https://blog.maselectronics.com/wp-content/uploads/2023/02/1a.png"><img decoding="async" width="970" height="497" src="https://blog.maselectronics.com/wp-content/uploads/2023/02/1a.png" alt="" class="wp-image-5554" srcset="https://blog.maselectronics.com/wp-content/uploads/2023/02/1a.png 970w, https://blog.maselectronics.com/wp-content/uploads/2023/02/1a-300x154.png 300w, https://blog.maselectronics.com/wp-content/uploads/2023/02/1a-768x394.png 768w" sizes="(max-width: 970px) 100vw, 970px" /></a></figure>



<p><strong>1. </strong>Open Regedit by hitting the Windows key and typing <strong>regedit</strong>. Hit Enter to launch it.</p>



<figure class="wp-block-image size-full"><a href="https://blog.maselectronics.com/wp-content/uploads/2023/02/1.png"><img decoding="async" width="970" height="395" src="https://blog.maselectronics.com/wp-content/uploads/2023/02/1.png" alt="" class="wp-image-5551" srcset="https://blog.maselectronics.com/wp-content/uploads/2023/02/1.png 970w, https://blog.maselectronics.com/wp-content/uploads/2023/02/1-300x122.png 300w, https://blog.maselectronics.com/wp-content/uploads/2023/02/1-768x313.png 768w" sizes="(max-width: 970px) 100vw, 970px" /></a><figcaption class="wp-element-caption"><strong>2. </strong>Navigate to HKEY_CURRENT_USER\Software\Classes\CLSID</figcaption></figure>



<p><strong>3. </strong>Right-click &gt; New &gt; Key, and paste in this name: <strong>{86ca1aa0-34aa-4e8b-a509-50c905bae2a2}</strong></p>



<figure class="wp-block-image size-full"><a href="https://blog.maselectronics.com/wp-content/uploads/2023/02/2.png"><img loading="lazy" decoding="async" width="970" height="395" src="https://blog.maselectronics.com/wp-content/uploads/2023/02/2.png" alt="" class="wp-image-5552" srcset="https://blog.maselectronics.com/wp-content/uploads/2023/02/2.png 970w, https://blog.maselectronics.com/wp-content/uploads/2023/02/2-300x122.png 300w, https://blog.maselectronics.com/wp-content/uploads/2023/02/2-768x313.png 768w" sizes="auto, (max-width: 970px) 100vw, 970px" /></a></figure>



<p>4. With the new key you just created highlighted, again right-click &gt; New &gt; Key, and paste in this name: <strong>InprocServer32</strong></p>



<p><strong>5.</strong> Double-click the <strong>(Default)</strong> registry entry and then hit Enter without typing anything to set its value to blank. Before making this change, you&#8217;ll see under the Data column that it says (value not set), but once you hit Enter it&#8217;ll show nothing.&nbsp;</p>



<figure class="wp-block-image size-full"><a href="https://blog.maselectronics.com/wp-content/uploads/2023/02/3.png"><img loading="lazy" decoding="async" width="970" height="395" src="https://blog.maselectronics.com/wp-content/uploads/2023/02/3.png" alt="" class="wp-image-5553" srcset="https://blog.maselectronics.com/wp-content/uploads/2023/02/3.png 970w, https://blog.maselectronics.com/wp-content/uploads/2023/02/3-300x122.png 300w, https://blog.maselectronics.com/wp-content/uploads/2023/02/3-768x313.png 768w" sizes="auto, (max-width: 970px) 100vw, 970px" /></a></figure>
]]></content:encoded>
					
					<wfw:commentRss>https://blog.maselectronics.com/restore-full-context-menus-in-windows-11/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>People have got their files back without paying the gangs</title>
		<link>https://blog.maselectronics.com/people-have-got-their-files-back-without-paying-the-gangs/</link>
					<comments>https://blog.maselectronics.com/people-have-got-their-files-back-without-paying-the-gangs/#respond</comments>
		
		<dc:creator><![CDATA[mmessier]]></dc:creator>
		<pubDate>Wed, 27 Jul 2022 23:37:36 +0000</pubDate>
				<category><![CDATA[New Technical]]></category>
		<guid isPermaLink="false">https://blog.maselectronics.com/?p=5529</guid>

					<description><![CDATA[No More Ransom project now offers free tools for decrypting 165 families of ransomware as the fight against extortion groups continues. The battle against ransomware is challenging because not only are ransomware attacks extremely disruptive, but in many cases, victims opt to pay the ransom demand for a decryption key – fueling additional ransomware attacks because criminals know they can make easy money.&#160; However, one scheme continues to take the fight to ransomware gangs and has now helped over 1.5...<p class="read-more"><a class="btn btn-default" href="https://blog.maselectronics.com/people-have-got-their-files-back-without-paying-the-gangs/"> Read More<span class="screen-reader-text">  Read More</span></a></p>]]></description>
										<content:encoded><![CDATA[
<p>No More Ransom project now offers free tools for decrypting 165 families of ransomware as the fight against extortion groups continues.</p>



<p>The battle against ransomware is challenging because not only are ransomware attacks extremely disruptive, but in many cases, victims opt to pay the ransom demand for a decryption key – fueling additional ransomware attacks because criminals know they can make easy money.&nbsp;</p>



<p>However, one scheme continues to take the fight to ransomware gangs and has now helped over 1.5 million victims successfully decrypt their machines without giving into ransom demands, preventing an estimated $1.5 billion from ending up in the hands of cyber criminals.&nbsp;</p>



<p>The figures come from Europol on the sixth anniversary of&nbsp;<a href="https://www.nomoreransom.org/en/index.html" target="_blank" rel="noreferrer noopener">No More Ransom</a>, the European Union law enforcement agency&#8217;s anti-ransomware initiative.</p>



<p>First launched in 2016 by Europol, the Dutch National Police (Politie), and a handful of cybersecurity and IT companies with four decryption tools available, No More Ransom has now grown to offer 136 free decryption tools for 165 variants of ransomware, including GandCrab, REvil, Maze, and more.&nbsp;</p>



<p>Over 188 partners from the private sector, the public sector, law enforcement, academia and others are now involved in the scheme, which continues to provide new decryption tools, with a portal available in 37 languages to help victims of ransomware attacks around the world.&nbsp;</p>



<p><a href="https://www.europol.europa.eu/media-press/newsroom/news/hit-ransomware-no-more-ransom-now-offers-136-free-tools-to-rescue-your-files" target="_blank" rel="noreferrer noopener">According to Europol</a>, the scheme has helped over 1.5 million victims decrypt their devices without needing to pay a ransom for a decryption key. However, the agency is under no illusions that the battle is won, especially as ransomware not only continues to be a problem, but it also continues to become more dangerous and effective.&nbsp;</p>



<p>&#8220;It&#8217;s up to us as Europol and other law enforcement agencies to keep evolving ourselves as well, rethink our strategies beyond No More Ransom. The No More Ransom platform is in place and hopefully it will stay in place for a long time as an answer to many of those scams,&#8221; said Marijn Schuurbiers, head of operations at Europol&#8217;s European Cybercrime Centre (EC3).&nbsp;</p>



<p>Law enforcement agencies are also looking at new ways to stop attacks: that includes disrupting infrastructure being used by cyber criminals.&nbsp;Europol has previously taken action against cyber crime in this way.&nbsp;</p>



<p>There are also actions which everyone can take to help avoid falling victim to ransomware. Europol recommends regularly backing up data on devices, so it can be recovered without paying a ransom, ensuring security software and operating systems are up to date with the latest security patches, and using multi-factor authentication&nbsp;to help prevent accounts being hacked and abused to help launch ransomware attacks.&nbsp;</p>



<p>In the event of falling victim to a ransomware attack, Europol urges victims not to pay a ransom but to check the No More Ransom portal for help and report the incident to the police – because each report of a ransomware attack can help provide additional insights into how ransomware works.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://blog.maselectronics.com/people-have-got-their-files-back-without-paying-the-gangs/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>Improve network speed by increasing IRPStackSize</title>
		<link>https://blog.maselectronics.com/improve-network-speed-by-increasing-irpstacksize/</link>
					<comments>https://blog.maselectronics.com/improve-network-speed-by-increasing-irpstacksize/#respond</comments>
		
		<dc:creator><![CDATA[Mike]]></dc:creator>
		<pubDate>Tue, 09 Mar 2021 15:18:13 +0000</pubDate>
				<category><![CDATA[New Technical]]></category>
		<guid isPermaLink="false">https://blog.maselectronics.com/?p=5506</guid>

					<description><![CDATA[Increasing IRPStackSize&#8217;s value from its safe-but-slow default number should considerably increase the network performance of your Windows 10 PC. It doesn&#8217;t matter whether you are working at the office or remotely, a high-performance network connection is vital to your productivity. This simple fact is why so many people working from home offices have opted to purchase high speed broadband internet connections. But getting the fastest internet connection does not guarantee a high-performance network—the are other factors to consider. The default...<p class="read-more"><a class="btn btn-default" href="https://blog.maselectronics.com/improve-network-speed-by-increasing-irpstacksize/"> Read More<span class="screen-reader-text">  Read More</span></a></p>]]></description>
										<content:encoded><![CDATA[
<p>Increasing IRPStackSize&#8217;s value from its safe-but-slow default number should considerably increase the network performance of your Windows 10 PC.</p>



<p>It doesn&#8217;t matter whether you are working at the office or remotely, a high-performance network connection is vital to your productivity. This simple fact is why so many people working from home offices have opted to purchase high speed broadband internet connections. But getting the fastest internet connection does not guarantee a high-performance network—the are other factors to consider.</p>



<p>The default network configuration settings in Microsoft Windows 10 are notorious for being programmed to what are considered safe, stable values. Predictably, safe and stable does not always equal fast and high-performance, especially with regard to network connections.&nbsp;</p>



<p>This how-to tutorial shows you how to edit the Windows 10 Registry file to change an obscure setting known as IRPStackSize. Increasing that parameter&#8217;s value should considerably increase the overall network performance of your Windows 10 personal computer.</p>



<p><strong><em>Disclaimer:</em></strong><em> Editing the Windows Registry file is a serious undertaking. A corrupted Windows Registry file could render your computer inoperable, requiring a reinstallation of the Windows 10 operating system and potential loss of data. Back up the Windows 10 Registry file and create a valid restore point before you proceed.</em></p>



<p><strong>How to improve network speed in Windows 10 by increasing IRPStackSize</strong></p>



<p>The I/O Request Packet Stack Size (IRPStackSize) refers to how many 36-byte receive buffers your computer can use simultaneously. A larger number of buffers means your computer can handle more data simultaneously, which, in theory, should make your computer perform more efficiently.</p>



<p>While there is little official Microsoft documentation concerning this parameter, the default setting is 15, which is adequate for most normal speed (10 Mbps) network connections. The maximum number is limited to 50, and Microsoft warns that choosing values in the 33 to 38 range can cause stability issues. For our example, we are going to increase the value to 32.</p>



<p>Type &#8220;regedit&#8221; into the Windows 10 desktop search box and select regedit.exe from the list of results. Use the left-hand windowpane to navigate the Windows 10 Registry file until you find this specific key, as shown in <strong>Figure A</strong>:</p>



<p>Computer\HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\LanmanServer\Parameters</p>



<p><strong>Figure A</strong></p>



<figure class="wp-block-image size-large"><a href="https://blog.maselectronics.com/wp-content/uploads/2021/03/1.jpg"><img loading="lazy" decoding="async" width="770" height="541" src="https://blog.maselectronics.com/wp-content/uploads/2021/03/1.jpg" alt="" class="wp-image-5507" srcset="https://blog.maselectronics.com/wp-content/uploads/2021/03/1.jpg 770w, https://blog.maselectronics.com/wp-content/uploads/2021/03/1-300x211.jpg 300w, https://blog.maselectronics.com/wp-content/uploads/2021/03/1-768x540.jpg 768w" sizes="auto, (max-width: 770px) 100vw, 770px" /></a></figure>



<p><a href="https://www.techrepublic.com/a/hub/i/r/2021/03/08/d552fb4d-c4b0-4e4a-af64-19768d803288/resize/770x/38e45d00affed1e891e66cd5a2ac2605/a-network-speed-irpstacksize.jpg" target="_blank" rel="noreferrer noopener"></a></p>



<p>For most users, there will be no entry for IRPStackSize, so we will have to create it. Right-click the Parameters folder (or right-click an open area in the right-hand windowpane) and select New | DWORD (32-bit) Value from the context menu. Give the new key entry the name IRPStackSize, as shown in <strong>Figure B</strong>. Note: The capitalization is vital to the success of this configuration change.</p>



<p><strong>Figure B</strong></p>



<figure class="wp-block-image size-large"><a href="https://blog.maselectronics.com/wp-content/uploads/2021/03/2.jpg"><img loading="lazy" decoding="async" width="770" height="541" src="https://blog.maselectronics.com/wp-content/uploads/2021/03/2.jpg" alt="" class="wp-image-5508" srcset="https://blog.maselectronics.com/wp-content/uploads/2021/03/2.jpg 770w, https://blog.maselectronics.com/wp-content/uploads/2021/03/2-300x211.jpg 300w, https://blog.maselectronics.com/wp-content/uploads/2021/03/2-768x540.jpg 768w" sizes="auto, (max-width: 770px) 100vw, 770px" /></a></figure>



<p><a href="https://www.techrepublic.com/a/hub/i/r/2021/03/08/c7fafadd-4a16-4b73-813d-39efdf4f3136/resize/770x/2737e0373a6a923090f60b42e9986f71/b-network-speed-irpstacksize.jpg" target="_blank" rel="noreferrer noopener"></a></p>



<p>Double-click the new IRPStackSize key you just made and change the value base to Decimal to make your life easier. Then, as shown in <strong>Figure C</strong>, change the Data value to 32.</p>



<p><strong>Figure C</strong></p>



<figure class="wp-block-image size-large"><a href="https://blog.maselectronics.com/wp-content/uploads/2021/03/3.jpg"><img loading="lazy" decoding="async" width="770" height="591" src="https://blog.maselectronics.com/wp-content/uploads/2021/03/3.jpg" alt="" class="wp-image-5509" srcset="https://blog.maselectronics.com/wp-content/uploads/2021/03/3.jpg 770w, https://blog.maselectronics.com/wp-content/uploads/2021/03/3-300x230.jpg 300w, https://blog.maselectronics.com/wp-content/uploads/2021/03/3-768x589.jpg 768w" sizes="auto, (max-width: 770px) 100vw, 770px" /></a></figure>



<p><a href="https://www.techrepublic.com/a/hub/i/r/2021/03/08/8824206e-295f-4544-83f2-99d02fb012a5/resize/770x/4561165dcab4fa4ee1f1dd8de91204a5/c-network-speed-irpstacksize.jpg" target="_blank" rel="noreferrer noopener"></a></p>



<p>Click OK to lock in the change and then exit out of regedit. To finish the process, you will need to reboot your PC.</p>



<p>If you are connected to a broadband network with speed ratings exceeding 10 Mbps, you should see improved network performance right away. If you have a connection rating under 10 Mbps, you will likely see no benefit. However, if you have ever received this strange error message, &#8220;Not enough storage available to process this command,&#8221; then this change may solve that problem for you, as well.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://blog.maselectronics.com/improve-network-speed-by-increasing-irpstacksize/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>Microsoft Issues Hotfix For Windows 10 Chkdsk BSODs And SSD File System Corruption</title>
		<link>https://blog.maselectronics.com/microsoft-issues-hotfix-for-windows-10-chkdsk-bsods-and-ssd-file-system-corruption/</link>
					<comments>https://blog.maselectronics.com/microsoft-issues-hotfix-for-windows-10-chkdsk-bsods-and-ssd-file-system-corruption/#respond</comments>
		
		<dc:creator><![CDATA[mmessier]]></dc:creator>
		<pubDate>Thu, 24 Dec 2020 19:29:02 +0000</pubDate>
				<category><![CDATA[New Technical]]></category>
		<guid isPermaLink="false">https://blog.maselectronics.com/?p=5495</guid>

					<description><![CDATA[The Windows 10 Check Disk Utility (chkdsk) that is crippling some PCs. The bug was unfortunately introduced with KB4592438 for Windows 10 20H2 during Patch Tuesday earlier this month. The update led to disk corruption – primarily with SSDs – when running chkdsk /f using the command prompt as an administrator. After running the chkdsk, users would be presented with a Blue Screen of Death (BSOD) pointing to a NTFS_FILE_SYSTEM error. Microsoft has now acknowledged the problem in an update to the “Known Issues”...<p class="read-more"><a class="btn btn-default" href="https://blog.maselectronics.com/microsoft-issues-hotfix-for-windows-10-chkdsk-bsods-and-ssd-file-system-corruption/"> Read More<span class="screen-reader-text">  Read More</span></a></p>]]></description>
										<content:encoded><![CDATA[
<p>The Windows 10 Check Disk Utility (chkdsk) that is crippling some PCs. The bug was unfortunately introduced with KB4592438 for Windows 10 20H2 during Patch Tuesday earlier this month. The update led to disk corruption – primarily with SSDs – when running chkdsk /f using the command prompt as an administrator.</p>



<p>After running the chkdsk, users would be presented with a Blue Screen of Death (BSOD) pointing to a NTFS_FILE_SYSTEM error. Microsoft has now <a href="https://support.microsoft.com/en-us/help/4592438/windows-10-update-kb4592438" rel="noreferrer noopener" target="_blank">acknowledged the problem</a> in an update to the “Known Issues” for the KB4592438 update. &#8220;A small number of devices that have installed this update have reported that when running chkdsk /f,&#8221; Microsoft writes. “Their file system might get damaged and the device might not boot.&#8221;</p>



<p>According to Microsoft, a fix has already been rolled out automatically to non-managed devices. However, the company states that it can take up to 24 hours for the fix to propagate to <em>all</em> non-managed devices. If you’re in a hurry to get this problem fixed, Microsoft says that you can restart your device to expedite the installation of the fix.</p>



<p>“For enterprise-managed devices that have installed this update and encountered this issue, it can be resolved by installing and configuring a special&nbsp;<a rel="noreferrer noopener" href="https://docs.microsoft.com/en-us/previous-versions/windows/it-pro/windows-server-2012-r2-and-2012/hh831791(v%3Dws.11)" target="_blank">Group Policy</a>,” Microsoft adds. “To find out more about using Group Policies, see&nbsp;<a rel="noreferrer noopener" href="https://docs.microsoft.com/en-us/previous-versions/windows/it-pro/windows-server-2012-r2-and-2012/hh831791(v%3Dws.11)" target="_blank">Group Policy Overview</a>.”</p>



<p>If your system has already been kneecapped with disk corruption and you are currently unable to boot into Windows 10, Microsoft details the following workaround:</p>



<ol class="wp-block-list"><li>The device should automatically start up&nbsp;into the Recovery Console after failing to start up a few times.</li><li>Select Advanced options.</li><li>Select Command Prompt from the list of actions.</li><li>Once Command Prompt opens, type: chkdsk /f</li><li>Allow chkdsk to complete the scan, this can take a little while. Once it has completed, type: exit</li><li>The device should now start up as expected. If it restarts into Recovery Console, select Exit and continue to Windows 10.</li></ol>



<p>It should be noted that your device will likely run chkdsk once again when you go through the above steps. However, rest assured that it won’t cause your machine fail this time around.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://blog.maselectronics.com/microsoft-issues-hotfix-for-windows-10-chkdsk-bsods-and-ssd-file-system-corruption/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>PHISHING SCAMS AND HOW NOT TO GET CAUGHT</title>
		<link>https://blog.maselectronics.com/phishing-scams-and-how-not-to-get-caught/</link>
					<comments>https://blog.maselectronics.com/phishing-scams-and-how-not-to-get-caught/#respond</comments>
		
		<dc:creator><![CDATA[mmessier]]></dc:creator>
		<pubDate>Fri, 12 Apr 2019 16:31:40 +0000</pubDate>
				<category><![CDATA[New Technical]]></category>
		<guid isPermaLink="false">https://blog.maselectronics.com/?p=5453</guid>

					<description><![CDATA[Email phishing scams are getting more sophisticated every day, using familiar sender names and other information to lower their targets’ defenses and make them more likely to become victims. It may seem like we’ve seen it all, and then — bam! — we’re hit with a sneaky new tactic or a complicated computer virus. How can we keep our computers, networks, and personal identities safe online? By remaining vigilant — think before you click! Following are 4 ways internet scammers...<p class="read-more"><a class="btn btn-default" href="https://blog.maselectronics.com/phishing-scams-and-how-not-to-get-caught/"> Read More<span class="screen-reader-text">  Read More</span></a></p>]]></description>
										<content:encoded><![CDATA[
<p>Email phishing scams are getting more sophisticated every day, using 
familiar sender names and other information to lower their targets’ 
defenses and make them more likely to become victims. It may seem like 
we’ve seen it all, and then — bam! — we’re hit with a sneaky new tactic 
or a complicated computer virus. How can we keep our computers, 
networks, and personal identities safe online? By remaining vigilant — 
think before you click!</p>



<p>Following are 4 ways internet scammers are trying to get into our systems and ways to protect your organization and yourself.</p>



<h5 class="wp-block-heading"><strong>1. Scam with a Familiar Name through Email</strong></h5>



<p>Phishers and hackers have become a lot better at copying email 
addresses and sending them in a way that makes them look legitimate. A 
familiar scam that’s been circulating lately is an email that looks like
 it’s from your parish priest. Typically, it’s a hastily written request
 for the recipient to purchase gift cards for sick hospital patients he 
is “visiting” or for a parish event like an upcoming auction.</p>



<p>Usually, “Bob” will ask the person to pick up some Google Play or  iTunes gifts cards in various denominations, take pictures of the back  with the PIN numbers scratched off, and have them email the information  back to him. Unfortunately, this is a common scam that a lot of people  fall for. Once those numbers are revealed and sent, funds can be  depleted within a matter of minutes. Even if you were to discover the  scam within a short period of time, gifts cards are typically  non-returnable … and can be used by anyone with the PIN.</p>



<h5 class="wp-block-heading"><strong>2. Payroll Scams via Email</strong></h5>



<p>Payroll scams through email are especially popular today. Using a 
familiar name but fake email address, the fraudster will ask someone in 
the finance department for their direct deposit paycheck to be sent to a
 new bank account and routing number, which is all supplied through 
email. However, you guessed it: it’s a scam.</p>



<p>You should never accept vital information sent through email, no 
matter how authentic it might appear. Always request a voided check and 
verify with each parish employee any changes to a paycheck, checking 
account, or financial institution. All it takes is a quick phone call or
 a stop at their desk to verify whether this is a true request.</p>



<h5 class="wp-block-heading"><strong>3. Phishing Attempt via Text Messaging</strong></h5>



<p>Imagine that you just received a notification on your phone that 
“you’ve got mail.” Checking your email on the fly, you see a 
communication from your pastor, asking for a huge favor. They ask for 
your phone number so they can text you, and you send it. Minutes later, 
you receive a text message. “I’m in a meeting and can’t talk,” it reads.
 “I need you to stop at the nearest gas station. It’s important.” 
Congratulations — you’ve been phished.</p>



<p>Falling for this type of scam is even easier if you use your phone to
 check email, because it doesn’t automatically show the email address 
it’s sending from, just the name, which is easy to customize. And if 
your boss or pastor is a fast-paced kind of person, a random email from 
them isn’t <em>that</em> unusual. But even so, if you were to have 
followed instructions, you’d have ended up purchasing gift cards, and 
then asked to scratch off the back so you could send the details via 
text.</p>



<h5 class="wp-block-heading"><strong>4. Phishing Attempt via Account Verification</strong></h5>



<p>It’s normal for employees, parish staff, and other organizations to 
send files back and forth through email. However, rarely, if ever, do 
these files require you to enter personal information in order to open 
them. A trending phishing scam is an email sent to a person with a PDF 
document attached. Using a simple message that conveys that this is an 
urgent request, someone clicks the link and is then prompted to enter 
their Adobe login/password to open the document. Unfortunately, you’ve 
been phished, and your personal information is now at risk.</p>



<p>If you’re like most people, you have a password that you use for 
multiple accounts. So if a hacker is able to guess even one password for
 one account, it won’t take long until they start finding more of your 
accounts and try that same password. In addition to not falling for this
 particular phishing scam, you should also be sure to use multiple 
passwords for various accounts and update them often. You should also 
consider a secure password manager, like <a href="https://1password.com/" target="_blank" rel="noreferrer noopener">1Password.com</a> or <a href="https://www.lastpass.com/password-manager" target="_blank" rel="noreferrer noopener">lastpass.com,</a>
 which holds all of your logins and passwords in one secure spot, but 
also suggests better passwords and remembers them for when you need 
them. No need for post-it notes under your keyboard, multiple passwords 
that get forgotten, or a chance of one being guessed by a hacker.</p>



<p>Every day, you hear of a new internet scam. The best way to not fall 
for these scams is to remain vigilant, always verify, and always think 
before you click. For more ways to protect yourself, visit the <a href="https://www.consumer.ftc.gov/media/game-0011-phishing-scams" target="_blank" rel="noreferrer noopener">Federal Trade Commission’s Consumer Information website</a> for some great tips.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://blog.maselectronics.com/phishing-scams-and-how-not-to-get-caught/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>Did You Know &#8211; They Are Recording Everything Now</title>
		<link>https://blog.maselectronics.com/did-you-know-they-are-recording-everything-now/</link>
					<comments>https://blog.maselectronics.com/did-you-know-they-are-recording-everything-now/#respond</comments>
		
		<dc:creator><![CDATA[mmessier]]></dc:creator>
		<pubDate>Sat, 29 Apr 2017 15:06:03 +0000</pubDate>
				<category><![CDATA[Open Discussions]]></category>
		<guid isPermaLink="false">https://blog.maselectronics.com/?p=5386</guid>

					<description><![CDATA[They Even Know Whats In This Post! If you don&#8217;t already know, the governments and ISP&#8217;s around the world are tightening their grasp and monitoring everything. The Trump administration just revoked the Internet Privacy act so now all the ISP&#8217;s can and are recording everything you do online.   They are logging everything, they are recording your Social Security Number, your health details, financial information as well as your browsing data and the contents of your emails! This is not...<p class="read-more"><a class="btn btn-default" href="https://blog.maselectronics.com/did-you-know-they-are-recording-everything-now/"> Read More<span class="screen-reader-text">  Read More</span></a></p>]]></description>
										<content:encoded><![CDATA[<table id="yui_3_16_0_ym19_1_1493477802031_2431" class="yiv4462942391wrapper" border="0" width="555" cellspacing="0" cellpadding="0" align="center" bgcolor="#ffffff">
<tbody id="yui_3_16_0_ym19_1_1493477802031_2430">
<tr id="yui_3_16_0_ym19_1_1493477802031_2461">
<td id="yui_3_16_0_ym19_1_1493477802031_2460" align="left" valign="top">
<table id="yui_3_16_0_ym19_1_1493477802031_2459" border="0" width="100%" cellspacing="0" cellpadding="0" align="center">
<tbody id="yui_3_16_0_ym19_1_1493477802031_2458">
<tr id="yui_3_16_0_ym19_1_1493477802031_2457">
<td id="yui_3_16_0_ym19_1_1493477802031_2456" class="yiv4462942391lh-1" align="left" valign="top">
<div id="yui_3_16_0_ym19_1_1493477802031_2455"><span id="yui_3_16_0_ym19_1_1493477802031_2454">They Even Know Whats In This Post!</span></div>
</td>
</tr>
</tbody>
</table>
</td>
</tr>
<tr id="yui_3_16_0_ym19_1_1493477802031_2483">
<td id="yui_3_16_0_ym19_1_1493477802031_2482" align="left" valign="top">
<table id="yui_3_16_0_ym19_1_1493477802031_2481" border="0" width="100%" cellspacing="0" cellpadding="0" align="center">
<tbody id="yui_3_16_0_ym19_1_1493477802031_2480">
<tr id="yui_3_16_0_ym19_1_1493477802031_2479">
<td id="yui_3_16_0_ym19_1_1493477802031_2478" class="yiv4462942391lh-1" align="left" valign="top">
<div id="yui_3_16_0_ym19_1_1493477802031_2477">
<div id="yui_3_16_0_ym19_1_1493477802031_2476"><span id="yui_3_16_0_ym19_1_1493477802031_2475">If you don&#8217;t already know, the governments and ISP&#8217;s around the world are tightening their grasp and monitoring everything.<a href="http://affiliate.vpnpartner.com/a.php?id=294_3_1_76"><img loading="lazy" decoding="async" class="alignright wp-image-5388 size-full" src="https://blog.maselectronics.com/wp-content/uploads/2017/04/02-anon-1.png" alt="" width="160" height="600" srcset="https://blog.maselectronics.com/wp-content/uploads/2017/04/02-anon-1.png 160w, https://blog.maselectronics.com/wp-content/uploads/2017/04/02-anon-1-80x300.png 80w" sizes="auto, (max-width: 160px) 100vw, 160px" /></a></span></div>
<div id="yui_3_16_0_ym19_1_1493477802031_2484"></div>
<div id="yui_3_16_0_ym19_1_1493477802031_2514"><span id="yui_3_16_0_ym19_1_1493477802031_2513">The Trump administration just <a title="" href="http://app.getresponse.com/click.html?x=a62b&amp;lc=44Dsw&amp;mc=JC&amp;s=iOxKT8&amp;u=B21e&amp;y=0&amp;" target="_blank" rel="nofollow noopener noreferrer">revoked the Internet Privacy act</a> so now all the ISP&#8217;s can and are recording everything you do online.  </span></div>
</div>
<div id="yui_3_16_0_ym19_1_1493477802031_2512"></div>
<div id="yui_3_16_0_ym19_1_1493477802031_2511"><span id="yui_3_16_0_ym19_1_1493477802031_2510">They are logging everything, they are recording your Social Security Number, your health details, financial information as well as your browsing data and the contents of your emails!</span></div>
<div></div>
<div id="yui_3_16_0_ym19_1_1493477802031_2509"><span id="yui_3_16_0_ym19_1_1493477802031_2508">This is not just limited to the USA. Australia, UK, Netherlands, France, Germany, heck the entire EU, Asia and most of the middle East have already done this.</span></div>
<div id="yui_3_16_0_ym19_1_1493477802031_2506"><span id="yui_3_16_0_ym19_1_1493477802031_2507"> </span></div>
<div id="yui_3_16_0_ym19_1_1493477802031_2486"><span id="yui_3_16_0_ym19_1_1493477802031_2485">You can get busted for things you do now, years in the future since it is all recorded and stored.</span></div>
<div id="yui_3_16_0_ym19_1_1493477802031_2489"></div>
<div id="yui_3_16_0_ym19_1_1493477802031_2488"><span id="yui_3_16_0_ym19_1_1493477802031_2487">Be vigilant with your online anonymity my friends. You should be doing the following</span></div>
<div id="yui_3_16_0_ym19_1_1493477802031_2493">
<ol id="yui_3_16_0_ym19_1_1493477802031_2492">
<li id="yui_3_16_0_ym19_1_1493477802031_2491"><span id="yui_3_16_0_ym19_1_1493477802031_2490">Always use a VPN. <a id="yui_3_16_0_ym19_1_1493477802031_2494" title="" href="http://app.getresponse.com/click.html?x=a62b&amp;lc=44D1T&amp;mc=JC&amp;s=iOxKT8&amp;u=B21e&amp;y=a&amp;" target="_blank" rel="nofollow noopener noreferrer">Get one here</a><br />
</span></li>
<li id="yui_3_16_0_ym19_1_1493477802031_2496"><span id="yui_3_16_0_ym19_1_1493477802031_2495">Encrypt private emails using <a id="yui_3_16_0_ym19_1_1493477802031_2497" title="" href="http://app.getresponse.com/click.html?x=a62b&amp;lc=44D30&amp;mc=JC&amp;s=iOxKT8&amp;u=B21e&amp;y=P&amp;" target="_blank" rel="nofollow noopener noreferrer">PGP</a>. </span></li>
<li id="yui_3_16_0_ym19_1_1493477802031_2503"><span id="yui_3_16_0_ym19_1_1493477802031_2502">Don&#8217;t post shit on Reddit unless the account is linked to an anonymous email and your using a VPN.</span></li>
<li id="yui_3_16_0_ym19_1_1493477802031_2504"><span id="yui_3_16_0_ym19_1_1493477802031_2505">Mix your bitcoins.</span></li>
</ol>
</div>
</td>
</tr>
</tbody>
</table>
</td>
</tr>
</tbody>
</table>
]]></content:encoded>
					
					<wfw:commentRss>https://blog.maselectronics.com/did-you-know-they-are-recording-everything-now/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>Five Utilities for Improving your Online Privacy</title>
		<link>https://blog.maselectronics.com/five-utilities-for-improving-your-online-privacy/</link>
					<comments>https://blog.maselectronics.com/five-utilities-for-improving-your-online-privacy/#respond</comments>
		
		<dc:creator><![CDATA[mmessier]]></dc:creator>
		<pubDate>Thu, 13 Apr 2017 15:09:16 +0000</pubDate>
				<category><![CDATA[New Technical]]></category>
		<guid isPermaLink="false">https://blog.maselectronics.com/?p=5376</guid>

					<description><![CDATA[There are more Hacks, leaks, and breaches that are a constant threats. As security firms patch holes new ones emerge, meaning it&#8217;s only a matter of time before your information is leaked on the web through no fault of your own. Staying safe on the internet means defending yourself against any and all scripts, plugins, applets, and pop ups that may appear. Here are five apps that can do just that. Ghostery Everything you do online is tracked—that&#8217;s just the...<p class="read-more"><a class="btn btn-default" href="https://blog.maselectronics.com/five-utilities-for-improving-your-online-privacy/"> Read More<span class="screen-reader-text">  Read More</span></a></p>]]></description>
										<content:encoded><![CDATA[<p>There are more Hacks, leaks, and breaches that are a constant threats. As security firms patch holes new ones emerge, meaning it&#8217;s only a matter of time before your information is leaked on the web through no fault of your own.</p>
<p>Staying safe on the internet means defending yourself against any and all scripts, plugins, applets, and pop ups that may appear. Here are five apps that can do just that.</p>
<h2 class="western">Ghostery</h2>
<p><a href="https://blog.maselectronics.com/wp-content/uploads/2017/04/ghostery.jpg"><img loading="lazy" decoding="async" class="alignleft wp-image-5377" src="https://blog.maselectronics.com/wp-content/uploads/2017/04/ghostery.jpg" alt="" width="585" height="439" srcset="https://blog.maselectronics.com/wp-content/uploads/2017/04/ghostery.jpg 770w, https://blog.maselectronics.com/wp-content/uploads/2017/04/ghostery-300x225.jpg 300w, https://blog.maselectronics.com/wp-content/uploads/2017/04/ghostery-768x576.jpg 768w" sizes="auto, (max-width: 585px) 100vw, 585px" /></a></p>
<p>Everything you do online is tracked—that&#8217;s just the way of the modern web. Sites use tracking to target ads, generate analytics, and track users in the name of a better UX, but they also result in a long, detailed paper trail of all your online activity.</p>
<p><a href="https://www.ghostery.com/">Ghostery</a> is a browser plugin that disables tracking functionality of most any kind and it&#8217;s super simple to use. It&#8217;s even available on Android and iOS as a standalone browser.</p>
<p>If you want to be sure targeted ads, location data, personal info, and other details are inaccessible to the places you visit Ghostery is for you.</p>
<h2 class="western">Tor browser</h2>
<p><a href="https://blog.maselectronics.com/wp-content/uploads/2017/04/tor.jpg"><img loading="lazy" decoding="async" class="alignleft wp-image-5378" src="https://blog.maselectronics.com/wp-content/uploads/2017/04/tor.jpg" alt="" width="643" height="482" srcset="https://blog.maselectronics.com/wp-content/uploads/2017/04/tor.jpg 770w, https://blog.maselectronics.com/wp-content/uploads/2017/04/tor-300x225.jpg 300w, https://blog.maselectronics.com/wp-content/uploads/2017/04/tor-768x576.jpg 768w" sizes="auto, (max-width: 643px) 100vw, 643px" /></a></p>
<p>When it comes to anonymity on the web there&#8217;s no better tool than <a href="https://www.torproject.org/projects/torbrowser.html.en">the Tor browser</a>. This self-contained browser uses The Onion Router, a secure way to redirect web traffic to a number of sources before routing it to its final destination. The end result is completely anonymized traffic—think of it as the money laundering of the data packet world.</p>
<p>You don&#8217;t need to be a nefarious hacker, government dissident, or drug smuggler to make good use of <a href="http://www.techrepublic.com/article/tor-the-smart-persons-guide/">Tor</a>. Installing the browser is a good idea for anyone who requires complete anonymity from time to time.</p>
<p>You don&#8217;t need to be tethered to your desktop for this level of privacy either. Tor offers browsers for <a href="https://mike.tig.as/onionbrowser/">iOS</a> and <a href="https://guardianproject.info/apps/orbot/">Android</a> too.</p>
<h2 class="western">Adblock</h2>
<p><a href="https://blog.maselectronics.com/wp-content/uploads/2017/04/adblock.jpg"><img loading="lazy" decoding="async" class="alignleft wp-image-5379" src="https://blog.maselectronics.com/wp-content/uploads/2017/04/adblock.jpg" alt="" width="607" height="455" srcset="https://blog.maselectronics.com/wp-content/uploads/2017/04/adblock.jpg 770w, https://blog.maselectronics.com/wp-content/uploads/2017/04/adblock-300x225.jpg 300w, https://blog.maselectronics.com/wp-content/uploads/2017/04/adblock-768x576.jpg 768w" sizes="auto, (max-width: 607px) 100vw, 607px" /></a></p>
<p>&nbsp;</p>
<p>&nbsp;</p>
<p>While most tech professionals know better than to click on a banner ad, that wisdom isn&#8217;t universal to all computer users. It doesn&#8217;t matter which camp you&#8217;re in—installing an adblocker is a good idea if you want to maintain your privacy and anonymity.</p>
<p>Ad blockers like <a href="https://getadblock.com/">Adblock</a> and <a href="https://adblockplus.org/">Adblock Plus</a> are both able to sift through the junk, but be warned: Many sites have developed tools to detect adblockers and block traffic unless the site is whitelisted. Ad blocking isn&#8217;t a catch-all solution for privacy but it is a way to minimize the clutter. You just have to use your judgement on who to block.</p>
<h2 class="western">Privacy Badger</h2>
<p><a href="https://blog.maselectronics.com/wp-content/uploads/2017/04/badger.jpg"><img loading="lazy" decoding="async" class="alignleft wp-image-5380" src="https://blog.maselectronics.com/wp-content/uploads/2017/04/badger.jpg" alt="" width="576" height="432" srcset="https://blog.maselectronics.com/wp-content/uploads/2017/04/badger.jpg 770w, https://blog.maselectronics.com/wp-content/uploads/2017/04/badger-300x225.jpg 300w, https://blog.maselectronics.com/wp-content/uploads/2017/04/badger-768x576.jpg 768w" sizes="auto, (max-width: 576px) 100vw, 576px" /></a></p>
<p><a href="https://www.eff.org/privacybadger">Privacy Badger</a> is the Electronic Freedom Foundation&#8217;s take on a web privacy browser plugin. It&#8217;s actually based on Adblock Plus&#8217;s code, but is designed to go further by automating the whole blocking and filtering process.</p>
<p>When you install Privacy Badger it starts building a log of all the domains that feed you content on a particular website. If it starts to see similar ones popping up, which indicates tracking, it blocks them automatically. The more you use it the cleaner your browsing experience will be, at least in a perfect world.</p>
<h2 class="western">HTTPS Everywhere</h2>
<p><a href="https://blog.maselectronics.com/wp-content/uploads/2017/04/httpseveryhwere.jpg"><img loading="lazy" decoding="async" class="alignleft wp-image-5381" src="https://blog.maselectronics.com/wp-content/uploads/2017/04/httpseveryhwere.jpg" alt="" width="589" height="442" srcset="https://blog.maselectronics.com/wp-content/uploads/2017/04/httpseveryhwere.jpg 770w, https://blog.maselectronics.com/wp-content/uploads/2017/04/httpseveryhwere-300x225.jpg 300w, https://blog.maselectronics.com/wp-content/uploads/2017/04/httpseveryhwere-768x576.jpg 768w" sizes="auto, (max-width: 589px) 100vw, 589px" /></a></p>
<p>Also from the EFF, <a href="https://www.eff.org/https-everywhere">HTTPS Everywhere</a> forces secure connections on any website which has the capability. HTTPS is almost necessary on the modern internet, but many sites which support it still default to unencrypted HTTP.</p>
<p>HTTPS Everywhere will add one more layer of security to your browsing experience, and all it takes is a couple clicks to install.</p>
<h3><strong>Good security practices start at the lowest level.</strong></h3>
]]></content:encoded>
					
					<wfw:commentRss>https://blog.maselectronics.com/five-utilities-for-improving-your-online-privacy/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>Outmaneuver Ransomware Threats and Keep Data Safe</title>
		<link>https://blog.maselectronics.com/outmaneuver-ransomware-threats-and-keep-data-safe/</link>
					<comments>https://blog.maselectronics.com/outmaneuver-ransomware-threats-and-keep-data-safe/#respond</comments>
		
		<dc:creator><![CDATA[mmessier]]></dc:creator>
		<pubDate>Thu, 13 Apr 2017 14:53:16 +0000</pubDate>
				<category><![CDATA[New Technical]]></category>
		<guid isPermaLink="false">https://blog.maselectronics.com/?p=5374</guid>

					<description><![CDATA[Ransomware made a huge splash in 2016. There&#8217;s no denying the motivation here: Money—as in virtually untraceable, digital cryptocurrency—has made this segment of the security realm nearly unstoppable. And if it continues to grow as projected, its reach will extend to more and more users, bringing in tens of millions of dollars for threat actors wishing to cash in on the epidemic. So what does this mean for your data if it&#8217;s something that can&#8217;t be stopped? Well, many of...<p class="read-more"><a class="btn btn-default" href="https://blog.maselectronics.com/outmaneuver-ransomware-threats-and-keep-data-safe/"> Read More<span class="screen-reader-text">  Read More</span></a></p>]]></description>
										<content:encoded><![CDATA[<p>Ransomware made a huge splash in 2016. There&#8217;s no denying the motivation here: Money—as in virtually untraceable, digital cryptocurrency—has made this segment of the security realm nearly unstoppable. And if it continues to grow as projected, its reach will extend to more and more users, bringing in tens of millions of dollars for threat actors wishing to cash in on the epidemic.</p>
<p>So what does this mean for your data if it&#8217;s something that can&#8217;t be stopped? Well, many of the best practices still apply. For instance, making sure you&#8217;re up to date on system and application patches, rolling out modern antivirus with malware protection that is both updated and that actively runs in the background, and performing multiple scheduled backups are good computing habits. Of course, staying clear of questionable websites and not clicking on links or attachments sent to you via email, social media, or just about anywhere are excellent safety guidelines to practice too.</p>
<p>But even with all that, you&#8217;re still susceptible to data compromise. So what&#8217;s next? Well, next might be <a href="https://ransomfree.cybereason.com/" target="_blank">RansomFree</a>. This <a href="https://ransomfree.cybereason.com/faq/#1481739149887-83cdf56a-2933" target="_blank">proactive ransomware detection application</a> watches your computer for files being accessed and monitors their interaction closely to determine whether encryption is taking place. Using behavioral detection techniques, <a href="https://ransomfree.cybereason.com/demo/" target="_blank">if RansomFree determines the behavior being displayed to be ransomware</a>, it immediately halts the process and flags it, creating an alert onscreen. At that point, the user must authorize the process before it will proceed, according to RansomFree&#8217;s developer.</p>
<h2 class="western">How does it do it?</h2>
<p>The secret to RansomFree&#8217;s success is not in signature files similar to antivirus applications, but rather in how it detects ransomware-like behavior (e.g., the local encryption of user data). This makes the application good at doing its job, since all ransomware thus far has displayed the same characteristics regardless of its payload. Whether the attack is a Trojan, vulnerability exploit, or malicious code (aka file-less ransomware), RansomFree is designed to deal with the interaction of the file(s) with the system and bring it to an immediate halt once the behavior is classified as a threat and until the user intervenes.</p>
<p>While testing this application myself, I did find evidence of false-positives being detected when using some 3rd-party software. However, it would stand to reason that this is a real possibility, given that some applications offer the ability to encrypt single files they use, or in the case of 3rd-party encryption applications, as was my specific case. Either way, that would appear to me to be a small price to pay to avoid going through the removal and data recovery process in cleaning up a ransomware infection—or having to pay to get your data back and waste all the time that takes to complete.</p>
<p>RansomFree worked as advertised. It&#8217;s also small and runs largely in the background, checking processes for malicious activity. And did I mention that<strong> it&#8217;s</strong> <strong>free</strong>? Not for a trial period or pending an ongoing subscription, but as in free for personal and commercial use on both client and server versions of Windows operating systems. There&#8217;s really no excuse not give it a shot and let it work to stop a possible ransomware infection from occurring like it did in my tests. If you&#8217;re not targeted, you&#8217;d never know it was there—but isn&#8217;t it great peace of mind to have it on your side in the event of a breach? I think so. That&#8217;s why I&#8217;ve added it to my &#8220;fleet&#8221;of go-to software apps and installed it on all my personal and commercial computers and servers.</p>
<p>&nbsp;</p>
]]></content:encoded>
					
					<wfw:commentRss>https://blog.maselectronics.com/outmaneuver-ransomware-threats-and-keep-data-safe/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>Reduce Risk of Exposure to CSRF or XSRF attacks?</title>
		<link>https://blog.maselectronics.com/reduce-risk-of-exposure-to-csrf-or-xsrf-attacks/</link>
					<comments>https://blog.maselectronics.com/reduce-risk-of-exposure-to-csrf-or-xsrf-attacks/#respond</comments>
		
		<dc:creator><![CDATA[mmessier]]></dc:creator>
		<pubDate>Sat, 01 Apr 2017 15:55:48 +0000</pubDate>
				<category><![CDATA[New Technical]]></category>
		<guid isPermaLink="false">https://blog.maselectronics.com/?p=5371</guid>

					<description><![CDATA[Cross site request forgery (CSRF or XSRF) exploits take advantage of websites’ trust in your browser. When you are logged into a website, an attacker can send a request to that site while pretending to be you—even if you’re not actively using the site. For example, while you’re logged into a message board or social media account, the attacker could send a request to post a virus download link as if it came from you. While you’re logged into your...<p class="read-more"><a class="btn btn-default" href="https://blog.maselectronics.com/reduce-risk-of-exposure-to-csrf-or-xsrf-attacks/"> Read More<span class="screen-reader-text">  Read More</span></a></p>]]></description>
										<content:encoded><![CDATA[<p>Cross site request forgery (CSRF or XSRF) exploits take advantage of websites’ trust in your browser. When you are logged into a website, an attacker can send a request to that site while pretending to be you—even if you’re not actively using the site. For example, while you’re logged into a message board or social media account, the attacker could send a request to post a virus download link as if it came from you. While you’re logged into your online banking account, an attacker could request to transfer money from your account into the attacker’s account.</p>
<p>The most common ways for an attacker to make these attacks is with HTML in an email that you view or JavaScript in an email or website that you view.</p>
<p>Unfortunately, you cannot fully protect yourself against all CSRF attacks—those protections must be implemented by the websites and applications that you use. However, you can substantially reduce your risk of exposure to CSRF attacks by following these web security best practices.</p>
<p>These security practices are based on recommendations from the Open Web Application Security Project (OWASP) <a href="https://www.owasp.org/index.php/CSRF_Prevention_Cheat_Sheet#Personal_Safety_CSRF_Tips_for_Users" target="_blank">Cross-Site Request Forgery (CSRF) Prevention Cheat Sheet</a>:</p>
<ul>
<li>Always log out of websites as soon as you are done using them, particularly any site that sends or receives payments or stores sensitive information.</li>
<li>Never open email messages with attachments when you do not recognize the sender.</li>
<li>Never open attachments that don’t seem trustworthy or that you did not request.</li>
<li>Be suspicious of mass email messages that contain links, pictures, or attachments, even if they are from people you know.<br />
Email accounts can be compromised by a virus.</li>
<li>Always keep your web browser up to date.<br />
Never use a browser that is no longer being updated by the developer. New security vulnerabilities are found regularly, and browsers must release regular updates to combat them.</li>
<li>Do not allow your web browser to save any passwords or other login information.</li>
<li>Do not allow your web browser to save your personal or financial information and fill out web forms with it.</li>
<li>Do not allow any websites, particularly banking or shopping websites, to remember your personal information, including login information.<br />
Websites use cookies to remember you, and those stored cookies put you at risk for CSRF attacks.</li>
<li>Clear your web browsing data and cookies regularly, preferably after each browsing session.<br />
Many browser extensions, such as Click &amp; Clean, can do this automatically when you close the browser. The Click &amp; Clean extension is available for both <a href="https://addons.mozilla.org/en-US/firefox/addon/clickclean/" target="_blank">Firefox</a> and <a href="https://chrome.google.com/webstore/detail/clickclean/ghgabhipcejejjmhhchfonmamedcbeod?hl=en" target="_blank">Chrome</a>.</li>
<li>Use a browser extension such as <a href="https://addons.mozilla.org/en-US/firefox/addon/noscript/" target="_blank">NoScript</a> (only available for Firefox), which blocks the execution of JavaScript on websites that are not on your list of trusted sites.<br />
JavaScript is the tool used in most CSRF exploits to execute commands without your knowledge.</li>
</ul>
<p class="ng-note"><em>JavaScript is essential for many webpages to function as intended, so NoScript will affect your browsing experience. However, it is a useful tool for reducing your risk of CSRF, cross-site scripting (XSS) and other common web exploits.</em></p>
<ul>
<li>Use two different web browsers: one for accessing sensitive information, such as shopping or banking details, and one for freely browsing the web.<br />
For example, consider using Firefox, which has NoScript and Click &amp; Clean, for online banking, email, and shopping, and using a different browser, such as Chrome or Safari, for regular web browsing.</li>
</ul>
<p>For more information about CSRF, see page 12 of <a href="https://www.owasp.org/images/0/0f/OWASP_T10_-_2010_rc1.pdf" target="_blank">The Ten Most Critical Web Application Security Risks</a> from <a href="https://www.owasp.org/index.php/Main_Page" target="_blank">OWASP</a>.</p>
<p>For more information about computer and web security, see the United States Computer Emergency Readiness Team (US-CERT) article on <a href="https://www.us-cert.gov/publications/securing-your-web-browser" target="_blank">Securing Your Web Browser</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://blog.maselectronics.com/reduce-risk-of-exposure-to-csrf-or-xsrf-attacks/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
	</channel>
</rss>
