Windows

Windows | News, how-tos, features, reviews, and videos

youtube thumbnails template
video

Your Windows 10 1903 questions answered | TECH(talk)

You asked (questions about Windows 10) and we answered (with advice from Windows expert Preston Gralla). We cover everything from the pace of annual updates, how to find better Windows apps and why you should change your default...

tt19 023 thumb
video

Microsoft delivers download flexibility with Windows 10 1903 | TECH(talk)

With the arrival of Windows 10 1903, users will be allowed to delay installation of the upgrade for up to about 18 months. That's a big change in how Microsoft has done updates in the past.

cssg 016 thumb
video

How to set up a Microsoft Azure backup process

Setting up a backup process in Azure is one way to quickly recover from a ransomware attack.

Broken window with band-aid patch

Microsoft urges Windows customers to patch wormable RDP flaw

A newly found vulnerability allows remote exploits using the Remote Desktop Protocol to gain full access to systems with no authentication.

Windows security and protection [Windows logo/locks]

How to outwit attackers using two Windows registry settings

These Microsoft Windows registry settings will prevent attackers from scheduling tasks that will hide their activities or gain unauthorized access.

security firewall breach hacker privacy battle id work getty

How to enable the Windows Potentially Unwanted Application (PUA) feature

Turning on the PUA setting helps avoid users falling prey to malicious drive-by downloads.

patch on top of Windows logo

How to prep legacy Windows systems for the switch to SHA-2

Install these patches on Windows 7 and other legacy platforms now so you can continue to receive security updates.

Microsoft Office logo within an environment of abstract binary code with shield and lock.

Microsoft Office now the most targeted platform, as browser security improves

The number of attacks carried out using the popular suite has increased in the past two years, Kaspersky Lab researchers say.

Windows security and protection [Windows logo/locks]

How to protect yourself from PC hardware and hardware driver vulnerabilities

Attackers have hijacked PC motherboard update software and hardware drivers to install malware. Here's how to identify vulnerable systems and prevent driver-delivered malware.

deadline clock time speed analog clock by ryan mcguire gratisography

How and when to set Windows logging to UTC time

As networks become more distributed and cloud-based, you should consider changing servers to UTC time to ensure proper syncing. This will help with forensics investigations.

Microsoft Windows update arrows / progress bars

How to prepare for the Microsoft Windows 10 1903 security feature update

Microsoft is changing the way it does Windows 10 feature updates, and that will affect how you schedule update deferrals. Here's what you need to know.

clock on the processor of a circuilt board

How to time-sync Windows systems

Incorrect time on a Windows device or server can prevent security updates or user authentication, and it can interfere with a forensics investigation.

tt19 013 thumbnail
video

What's new in Windows 10 version 1903? | TECH(talk)

With the next version of Windows 10 set to appear this spring, it’s a good time to take a look at what’s new and what’s changed in version 1903. (Not much, actually.) But that’s a good thing, according to Computerworld contributing...

security audit - risk assessment - network analysis

How to audit Windows Task Scheduler for cyber-attack activity

Two recently discovered Windows zero-day attacks underscore the importance of monitoring for unauthorized tasks.

cssg 015 enable auditing
video

How to audit Windows Task Scheduler to detect attacks

Learn how to prevent attackers from using Task Scheduler to hide and set up tasks to access Windows systems.

Microsoft Windows update arrows on laptop and mobile phone

Windows security updates that require new registry keys

Don't assume automated Windows security updates are complete. You might need to add registry keys manually. Here are a few to check now.

11 event logging

How to install PowerShell 5 on Windows 7

Have older Windows systems on your network? You can give them PowerShell 5's event logging capabilities even if they run Windows 7.

05 malware

How to identify, prevent and remove rootkits in Windows 10

Rootkits are among the most difficult malware to detect and remove. Now, new variations are targeting Windows 10 systems. Use this advice to protect yourself from them.

cssg 014 thumbnail
video

Updating Spectre, Meltdown and Foreshadow mitigations

Use these Windows registry key changes and fixes to protect your systems from known side channel vulnerabilities.

managed security service providers

How to prevent and recover from an APT attack through a managed service provider

Threat actors are compromising their targeted victims through managed service providers (MSPs). These are the steps to take to minimize your exposure and to recover from these attacks if necessary.

Load More