Attacking the VM Worker Process

Posted on Wednesday September 11, 2019

In the past year we invested a lot of time making Hyper-V research more accessible to everyone. Our first blog post, "First Steps in Hyper-V Research", describes the tools and setup for debugging the hypervisor and examines the interesting attack surfaces of the virtualization stack components. We then published "Fuzzing para-virtualized devices in Hyper-V", which...

 

September 2019 Security Updates

Posted on Tuesday September 10, 2019

We have released the September security updates to provide additional protections against malicious attackers. As a best practice, we encourage customers to turn on automatic updates. More information about this month's security updates can be found in the Security Update Guide. As a reminder, Windows 7 and Windows Server 2008 R2 will be out of...

 

VoIP systems keep callers on the line

Posted on Tuesday September 10, 2019

According to an AT&T study, more than 70% of business phone calls in the US are placed on hold for an average of 45 to 60 seconds each. While organizations try to minimize hold times, sometimes there's nothing you can do except put the caller on hold while you transfer them to the correct department. But that doesn't mean that you can't make this customer experience better. Voice over Internet Protocol (VoIP) systems make it very easy to do so.

 

Save time with Bookings by Office 365

Posted on Monday September 09, 2019

We all undeniably have hectic schedules, and they're made even worse with unorganized meetings, impromptu playdates, and unscheduled yoga classes. To move or cancel appointments, your clients would generally have to pick up the phone and call someone, which can be a drag. But with Microsoft Bookings, clients can schedule and effortlessly manage appointments. In case one isn't enough, here are four more reasons to give it a go:

 

Wired Lists 'The Windows 10 Privacy Settings You Should Check Right Now'

Posted on Sunday September 08, 2019

"If you're at all concerned about the privacy of your data, you don't want to leave the default settings in place on your devices -- and that includes anything that runs Windows 10," warns a new article in Wired, listing out the "controls and options you can modify to lock down the use of your data, from the information you share with Microsoft to the access that individual apps have to your location, camera, and microphone." Long-time Slashdot reader shanen calls the the article "a rough estimate of the degree to which my privacy can be intruded upon," adding some particularly pessimistic additional thoughts: Not just Microsoft, of course. It's safe to conclude that there are similar capabilities embedded in the software from Apple, the google, Amazon, and Facebook (and others...) [T]here is no real boundary between the software that does the privacy intrusions, the software that controls the intrusions, and the software that tells me the state of the intrusions. Have I actually disabled that particular abuse of my privacy? Or is the software still doing it and lying to me and claiming it isn't doing it... Or maybe it's the NSA, GRU, FBI, FSB, DHS, MSS, CIA, or any other governmental agency with a secret legal power to compel intrusions that you can't be told about...

 

Optimizing website images for SEO

Posted on Friday September 06, 2019

Small- and medium-sized businesses are often tempted to relegate their search engine optimization (SEO) analyses to the free reports offered by online platforms like WordPress and Google Analytics. Unfortunately, those reports rarely provide the details you need to make improvements. One of the things they tend to glaze over is image optimization.

 

Page:   1...160161162163164165166167168...353

Celebrating 35+ Years

Off-Site Cloud Backups

Contact Us

Support Ends for Windows 10 22H2, Windows Server 2012 R2, Exchange 2013, Office 2016