The TPM has NOTHING to do with securing the computer for security sake.
it has EVERYTHING to do with MS trying to kill linux
990 publicly visible posts • joined 27 Feb 2014
Trust microsoft.....
this is of course hte same Microsoft that jad Russian & Chinese spy's running about their systems...
and the same Ms , system , I have managed to thwart the security & login systems several times just during normal working.
And the same MS who seem annoyed that i wont work for free debugging their security systems.
the same company who string me along with their engineering team for 3-4 months over 5 separate security reports , only to give me a link to their forums where i can request improvements...
Definitely a company i'd feel safe putting all my data with.
Yep.. what they don't tell you is that it CANNOT use ".pst" files.
There users are going absolutely mental, becasue all the old records for legal compliance are stored in ".pst" exported archives.
also there is ZERO way to do an export of any data in the online version.
and to top it off, now you cannot do a export, MS has a plan to start charging for archived emails & data , pius an additional charge to actually access the material.
all this is coming in 2025
DO NOT fall for this bullshit.
go read the supreme court ruling on this and police powers....
Basically it goes like this;
If the police ask you for access to your pass-worded device and you say no, they have to get a warrant and can only search for material in the warrant and they have to prove a crime or suspect one.
HOWEVER if your device is protected by "bio-metric" data ,the police are allowed to FORCE access by using your face or thumbprint WITHOUT A WARRANT.
giving them FULL access to EVERYTHING and without PROBABLE cause!!!
Do you know in certain areas, you have to load mandated software onto your business accounts computers for the tax department.
After you log in & provide a usr id via mobile phone , you get an "update"package.
in that package loaded from government servers, is ....
A back door
A network scanning app
A screen cap & keyboard RAT.
I know this becasue of samples I submitted to an AV provider & the fact that the FBI said back in 2020 that his was floating about, its been improved since then.
Same.....
but don't let the store update your version 6.....
once it's done, the version 6 is strangely DEAD.... and wont run any longer, well it runs but you cannot log in.
Also they seem to have removed the "plugins" from their web site.
so if your V6 needs to reload the plugin into the browser.. strangely they are GONE..... Despite it being a perpetual license you can no longer get copies of the SW. or plugins, even if you have a valid license.
so a lot more is going on with this than just some "randomly found CVE"
This seems more like a way to F*** over the perpetual license owners...
going back a few years tehy already know this process was leaking and it was not an "issue"
They also admitted the PW were stored encrypted in main memory... after the master pw was entered.
But hte interesting thing is WTF are tehy STILL having the 7.x version in the apple store if they know it is F**ed...
or is that just a "hook" and then a forced upgrade to 8.x
Let's cut to the chase.....
I don't want a bunch of fuckwhits forcing me to store my pw in the cloud and charging me to do it...
nor do i want the same said fuckwhits to be spamming my screen with cloud signups every time I login to a website
it's all nonsense, current is limited by resistance and voltage....
my kettle is connected to the national grid, which can supply thousands of amps, but i don't need to program my kettle to not use that current...
The reality is Intel F**ed up... they are allowing the microcode in their CPu's to pull more current than the silicon can handle.
it's the same misinformation and pisspoor designs they have continually done.
like saying their CPU can run at "XYZ Ghz" , it's all nonsense, becasue as soon as you try to meet that limit , all the other cores scale back, so maybe a limited number can run close to that speed.
Then you actually look at what they classify as "GHZ" and it's not actually GHZ speed, it's mult threading that gives a similar speed to what might be seen at that speed , when using manipulated code
Until the issue of inter operability is sorted out, Linux will not replace windows.
there is NO viable way to run Linux in a large business and interact with windows users in other companies.
sorry been trying it for 20 years.
Word/Excel is continually being changed to prevent the seamless sharing of data, and not "open office" is NOT a solution.
If it were i'd be using it.
Actually they are NOT getting worse.
What is getting worse is the amount being bought from China.
As regards the Changing of the Density, this has been on going for 20 years.....
It does not shorten the life of the cells, the issue is the range comparators, the level of the charge on the cell has to be detected, if the Vref for the comparators drifts , the WHOLE content will be misrepresented or will dissapear. (actually it is still there, but not detectable correctly)
They are actually more reliable is they are used now & again, since the cells get re-written based on the aging of the comparators.
If you write the contents out and the comparators Vref moves , then its game over.
also if you get hold of some very well known chip brand datasheets, after signing the NDA, you will see that they spec all the way down to 1 or 2 writes, with multiple reads.
they even spec specific pages missing... all this shite ends up in the market, since it may have a valid use in writing hardware that only needs to be written once at manufacture, but with changing parameter data.
all you are seeing is teh bottom of the barrel criminals going below the bottom of the barrel to make a profit., since now everyone else is doing the same.
it's all the big retailers, that are involved.
Only a complete Moron would use any of D-LINK'S kit.....
And before anyone says "it's safe if not connected directly to the internet.... no.... no it is not.
We have seen Russian malware come in via Chinese mobile phones provider networks , then attempt to bridge over to the other networks they can see,
Thereby attempting to bypass corporate firewalls.
And guess what.... Microsoft will slime its way out of this with ZERO liability.
When will this be stopped with legal requirements that prevent such companies from setting up shite services , then using users as testing agents.
A single company just totally destroyed a countries security & privacy...
WTF does it rely on a single key to access the whole of the system.
fortinet is garbage kit...its the Australian Version of TP-LINK.
There are all sorts of problems , right from their earliest implementations , we battled with endless bugs ,strange behavior, 1980's version GUI and in the end we dropped their kit completely, due to their attitude of , well we shipped buggy OS but you still have to pay, despite hte bug being there from years before your support contract ended.
ALL companies should be responsible for "free fixes" to their kit, if bugs existed, it's time we grew up and stopped allowing companies to get away with this endless bullshit of
"well you need a support contract before we will give you the fixes for our own mistakes"
The whole UDP case was for SPEED.....
over TCP, you have to setup a formal connection , do your communication , verify the data, hold it open until you get it all, then tear it down.
as a result it is easier to DOS in tcp than over UDP ,as regards to taking hte DNS down..., then there is the issue with FIN packets...
Sadly it is IMPOSSIBLE to move from windows, when many of your customers insist that they can only use office .
We have tried a number of times with trial migrations and have always had them destroyed by the customers insistence of using MS office.
There is a set of "copy" windows programs by a Chinese company "Kingsoft" that run on linux, but after taking a look at the network traffic from these programs we decided against using them.
Until someone comes up with a 100% viable way to GET OFF office, migration to another platform is impossible for many companies...
Actually them splitting out the "attachment" is potentially fraud...
Since they also handle business & legal emails for client storage, they are changing the email contents, to strip out the attachments.
Thereby tampering with the emails and changing the content...
since that content is no longer "inline" but extracted from the actual email.
in the real world an attachment to an email is NOT an attachment but inline text..., which they are both removing from and converting from the verbatim copy that went thru their systems.
there is no guarantee the email they reconstructed , is IDENTICAL to the email sent.
so in-effect they are fraudulently changing the contents of emails and misrepresenting the actual copy sent., specifically it is fraudulent ,because they do not state it is reconstructed and a misrepresentation of the actual email...
It's like me taking a 50 pound note, scraping off the ink, grinding the paper down, then reconstructing a new 50 from the material, then claiming it is genuine...
that is even before we get into are they storing the base 64 content of the email in one-drive , deliberately chewing up storage, or are they converting it back to binary, thereby potentially corrupting the verbatim copy..
Yep... just like they screwed over virtually Evey SYS admin.. a few months ago..
by preventing Computers from re-registering into AD using the SAME computer account.
so if you have machine "A", there are situations where it will not be allowed to register back into the AD if it disconnects...
they shout "Security fix" and "hardening"
Really...
so if it is "security hardening" , why is it only CLIENT side & not AD side?
What a crock of shit.... a "Security fix that any hacker can bypass locally on the machine... and no i'm not talking about the registry bypass.
They are deliberately throwing rocks in the road, to force people onto Azure... and off inhouse authentication.
Yep... I keep telling HSBC about this in HK that thier shitty SMS messages about all the bank transfers can be listened into...
they say it is for security of their customers...
more like they are providing a feed to the HK government...
but they insist phones are secure devices if they have not been rooted....
LOL you are really funny......
AV programs are the biggest offenders of Telemetry....
Go see the amount that their cloud front end offers , every false positive & every file scanned that has malware is squirreled up into their cloud , including the users name...
when a virus is found a complete path is uploaded to their cloud.. which includes ur name folder and path... such as "big coloured girls" as was recently seen on our cloud av solution... along with the directors name...
So much for the rule for our stock market listing requiring all security risks files to be identified to the board & CEO in writing in a monthly report........
sometimes i really love my job..