Archive

Posts Tagged ‘Windows 7 SP1’

Understanding Meltdown & Spectre: What To Know About New Exploits That Affect Virtually All CPUs

https://www.powershellgallery.com/packages/SpeculationControl/1.0.2

https://www.anandtech.com/show/12214/understanding-meltdown-and-spectre

Meltdown and Spectre: A closer look at the recent CPU security flaws and how to protect yourself

https://www.onmsft.com/news/meltdown-and-spectre-a-closer-look-at-the-recent-cpu-security-flaws-and-how-to-protect-yourself

Microsoft responds to AMD and Intel processor exploits, now rolling out emergency fix:

https://www.onmsft.com/news/microsoft-responds-to-amd-and-intel-processor-exploits-now-rolling-out-emergency-fix

Microsoft to release emergency Windows Update to address Intel, AMD processors security concerns

https://www.onmsft.com/news/microsoft-to-release-emergency-windows-update-to-address-intel-amd-processors-security-concerns

KB4056892 bugs: Install fails, browser crashes, PC freezes, and more

http://windowsreport.com/kb4056892-issues/

Microsoft releases PowerShell script to check if your PC is vulnerable to Meltdown and Spectre:

https://betanews.com/2018/01/05/microsoft-powershell-meltdown-spectre-script/

Verifying Spectre / Meltdown protections remotely:

https://blogs.technet.microsoft.com/ralphkyttle/2018/01/05/verifying-spectre-meltdown-protections-remotely/

Lawsuits stack up against Intel over Meltdown and Spectre bugs:

https://betanews.com/2018/01/05/intel-meltdown-spectre-lawsuits/

Google answers your questions about Meltdown and Spectre vulnerabilities:

https://www.blog.google/topics/google-cloud/answering-your-questions-about-meltdown-and-spectre/

https://www.onmsft.com/news/intel-plans-to-patch-90-of-processors-from-past-5-years-by-the-end-of-next-week

https://newsroom.intel.com/news-releases/intel-issues-updates-protect-systems-security-exploits/

Understanding the performance impact of Spectre and Meltdown mitigations on Windows Systems:

https://cloudblogs.microsoft.com/microsoftsecure/2018/01/09/understanding-the-performance-impact-of-spectre-and-meltdown-mitigations-on-windows-systems/

Changing between Windows SKUs

https://blogs.technet.microsoft.com/mniehaus/2017/10/09/changing-between-windows-skus/

cscript.exe c:\windows\system32\slmgr.vbs /ipk xxxxxxxxx

An easy way to measure computer reboot and logon times (processmon)

New ransomware, old techniques: Petya adds worm capabilities

https://blogs.technet.microsoft.com/mmpc/2017/06/27/new-ransomware-old-techniques-petya-adds-worm-capabilities/

Alles, was wir bisher über den Petya/NotPetya-Ausbruch wissen:

https://www.heise.de/security/meldung/Alles-was-wir-bisher-ueber-den-Petya-NotPetya-Ausbruch-wissen-3757607.html

Petya-Attacke oder "NotPetya": Erstes Angriffsziel offenbar in der Ukraine:

https://www.heise.de/security/meldung/Petya-Attacke-oder-NotPetya-Erstes-Angriffsziel-offenbar-in-der-Ukraine-3757496.html

Windows 10 platform resilience against the Petya ransomware attack:

https://blogs.technet.microsoft.com/mmpc/2017/06/29/windows-10-platform-resilience-against-the-petya-ransomware-attack/

Exploring the crypt: Analysis of the WannaCrypt ransomware SMB exploit propagation

https://blogs.technet.microsoft.com/mmpc/2017/06/30/exploring-the-crypt-analysis-of-the-wannacrypt-ransomware-smb-exploit-propagation/

Eternal Champion Exploit Analysis:

https://blogs.technet.microsoft.com/srd/2017/06/29/eternal-champion-exploit-analysis/

 

https://www.heise.de/newsticker/meldung/Cyber-Attacke-NotPetya-Angebliche-Angreifer-wollen-250-000-Euro-fuer-Datenrettung-3764208.html

Immer noch nicht alle Schäden behoben

Getroffen wurde unter anderem der Nahrungsmittelriese Mondelēz, weswegen seit Tagen keine Milka-Schokolade produziert werden kann, wie der Tagesspiegel berichtet. Für Beiersdorf (Nivea, Tesa, Eucerin) war der Angriff der folgenschwerste Hackerangriff überhaupt, berichtet der Stern. Weltweit sei in den 17 Fabriken des Unternehmens viereinhalb Tage lang nichts mehr gegangen. Massiv betroffen war offenbar auch die dänische Reederei Maersk, die mehr als eine Woche nach dem Angriff immer noch daran arbeitet, die Schäden vollständig zu beheben. (mho)

 

Cyber-Attacke Petya/NotPetya: Neue Einblicke in die perfide Verbreitungsmasche

https://www.heise.de/security/meldung/Cyber-Attacke-Petya-NotPetya-Neue-Einblicke-in-die-perfide-Verbreitungsmasche-3763750.html

Latest Improvements to the Simplified Servicing for Windows 7 and Windows 8.1

SCCM: Building Windows 7 Images in 2017

Windows Management Framework (WMF) 5.1 Released