* Posts by [VtS]Alf

22 posts • joined 14 Jun 2019

The PrintNightmare continues: Microsoft confirms presence of vulnerable code in all versions of Windows


Re: As much as I like to dump on microsoft a pile...

Shirley this deserves this link: http://www.bash.org/?835030

If you don't have anything nice to say, don't say anything at all: El Reg takes Twitter's anti-mean algorithm for a spin


Re: Twitter: Where twits twaddle.

You only spotted 20 errors/inconsistencies in the tech field? On Twitter?


Re: Your mother .....

Go away! Before I shall taunt you a second time! *prepares a cow in a trebuchet*

No ports, no borders, no hope: Xiaomi's cool but impractical all-screen concept phone


Re: Reset hole?

You Shirley never tried to hit a Nokia 3310 with a sledgehammer.

Paragon 'optimistic' that its NTFS driver will be accepted into the Linux Kernel


Re: @big_D - @DrXym - Whatever for?

In an enterprise, even the CEO gets told that a reinstall is really a reinstall and if any files are left on places they shouldn’t be, they’re wiped.

And why not?

There are processes in place in an enterprise and the CEO should comply with it.

Being a young PFY you get to salvage anything from the disk, but within our enterprise, the CEO gets the same treatment basically.

It doesn’t work? Cool, when you are booting, press F12 and choose <image>. You’ll be fine.

The Surface Duo isn't such an outlandish idea, but Microsoft has to convince punters the form factor is worth having


Re: Does it run Windows?

It actually runs Android with an MS skin.

Microsoft wants to show enterprises that Edge means business, rather than the thing you use to download Chrome


Re: New Edge, now with even more spyware

And exactly that is what happening with Win10. There is a list of programs/apps (uwp) you used recently. When you minimize it, it is being ‘snapshotted’ in the state it was in and kept in a hybernate state. Thus it can open your window ‘instantly’, because it wakes is from the hibernation state.

And yes, it does this with calc.exe too, because all executed programs are treated in the same way. Now, that you don’t care if calc.exe is kept in memory/hybernation, doesn’t mean that the mechanism is wrong. It treats your calc.exe with the same importance as ‘photoshop.exe’ or ‘illustrator.exe’. Yes, more RAM equals better performance this way. On the other hand, who doesn’t have 4-8GB RAM in their work desktop? And 8-16GB in your private PC probably.

Less RAM means less programs that are kept in hybernation (it saves the state to disk and closes the program where possible).

Now to get more on topic with your comment; You seem to use iDevices with iOS. You might even use an Android device as well. Those OS-es do exactly the same. Granted, you mentioned that mobile OS-es do this, but why should a desktop OS not do the same?

The dream of a single European patent may die next month – and everyone is in denial about it


As a non-native English tongue, I have my moments where I see a mistake in my spelling or grammar, but often after the 10 minute limit.

To prevent too much clutter in the comments with posts like “*colour instead of color”, I would like to be able to correct my err indefinitely.

Just my point of view

This page is currency unavailable... Travelex scrubs UK homepage, kills services, knackers other sites amid 'software virus' infection


Re: .NET 4.0.30319

After edit: I just saw a serious leak in the Metasploit db for 2019 on MS RDP (BlueKeep), however it has been patched already.


Re: .NET 4.0.30319

And finally we DO have the right question to this thread! Thank you sir.


Re: .NET 4.0.30319

I think, my point still stands. I just checked the CVE database with a few searches (queried ‘Cisco ASA’, ‘Microsoft RDP’, ‘Microsoft Remote Desktop’, ‘Microsoft Terminal Server’ and the results for Cisco for 2019 were 28 and for MS the last CVE was from 2017.

Also, the RDS server can be configured just as easily with certificates and 2FA (Who doesn’t remember our RSA tokens which generated a new code every x seconds?).

And that should be the way to configure it when you’d expose 3389 directly to the internet. But just stating that it is unsafer to expose 3389 to the www, instead of a VPN port is incorrect I think.

Ofcourse I don’t expose 3389 to the outer world and we use a VPN solution for our users. Seeing the CVE list, we might ask ourselves if it isn’t safer even.


Re: .NET 4.0.30319

But really it does NOT. Security by obscurity et al. If you, for example, provide a Cisco Anyconnect VPN for your clients at IP xxx.xxx.xxx.xxx:port_not_at_default, portscanners all over the world WILL discover your open port.

With a few tools they might discover that you run an IPSec VPN solution straight from your ASA. There ARE holes in the ASA software (up to version xxx, but you did not get to update to just yet, because enterprise), thus a VPN connection can be hacked/initiated/abused with a brute force hack (often). The attacker can connect with VPN (our just hacked account) and can discover other servers in that network. Keep this in mind.

Other situation:

Now, I am a business that exposes (hopefully) a Terminal Server Gateway or an RDP server to the internet. Port 3389. People can brute force accounts to this server (they can’t because of MS’ software).

Both situations provide an open port, which software do we need to hack?

Either way, they are both equally dangerous and updated software/firmware from all vendors prevents this.

I might not make myself popular with my statements, but I trust Microsoft more to mitigate these flaws than I do Cisco (at the ASA level).


Re: .NET 4.0.30319

We can all laugh, but having port 3389 exposed to the internet is just as dangerous as having your VPN port exposed to the internet. Just sayin’

Mozilla Firefox to begin slow rollout of DNS-over-HTTPS by default at the end of the month


Really, a hosts file with thousands of entries fcks up your (advertless)experience. Your hosts file is not loaded in cache (ok ok, but just for a bit). Get rid of hosts files. They suck. Move to a DB driven solution, speeds things up by a LOT!


[quote]If you want privacy, you'll need to get an up to date copy of the Internet-wide "hosts" file, the name resolution technology used before DNS came along. Good luck with that. There are ways to solve this, but they require a great deal of engineering work not to mention a disruptive and challenging global rollout. Not only do few people have the appetite, but all the large players have strong incentives to make sure it never happens.[/quote]

I can very easily make my DNS servers think they are the top root servers and have never get any request leave my network. But as you stated, it would be a helluva job to make google or el reg available to my users without forwarders


In practice however, doing a recursive query, i.e going through the root servers for the TLD’s and get sent down for each and every subdomain is fscking slow, so in practice noone ever configures that. I think 98% of all DNS queries over the Internet is not recursive, but just bounced off from Authoritive Zone server to the next.

And also, after rereading your comment, I think you got recursive requests confused just the other way around, since recursive starts at the root servers (with all TLD’s), trickling down to all respective authorative servers, while “normal” DNS just asks its configured DNS server for a record, DNS server does not know, forwards to next “configured” server etc.. up until no answer is given and just THEN a recursive query is done


To make things more clear (doing a simple ssl handshake, but explaining the loophole afterwards);

Situation now:

Alice and Bob want to talk about their secret shit. Alice calls Bob through a BT land line and says; hey Bob, gonna send you a message. To do that, I need your public key to encrypt my message. (Lets assume there is a spy on this land line). So Bob tells Alice his public key to encrypt the message so he can decrypt the message with his own private key. However, since we have a spy on the line who knows that Alice will send Bob a message that is encrypted with his public key, our spy could think; right, I will send a message in name of Alice with the public key of Bob encrypting the message and Bob can decrypt it with his private key. So we need some verification. To make sure Alice sent the message, she SIGNS the final message with her private key. So when Bob uses Alice’ public key, he can make sure that Alice sent the message.

Now... what this article is implying, is as follows; Mozilla (Jasper) says; dude! You are yelling that you want to reach Alice, but instead of yelling, I could be the one that silently tells Alice that you want to reach her. However, for Alice to know that I am not lying; I need to resign your “shout out” with my own ciphers. To do this I need to resign your original message with my own keys though. When you get contact with Alice and all is mighty fine, but you keep exchanging messages through me (Jasper). I can read your (Bob’s) messages, I encrypt them for you, Alice reads it, sends messages back, but all in all I can still read all messages between you (Bob) and Alice.

So.. would you rather have people hearing that you as Bob want to talk to Alice and encypt messages after when you do a ‘handshake’, or move the “Hey Alice” shoutout to a middle man that will see all your messages in between afterwards?


And how is this implemented? To encrypt DNS and decrypt DNS requests, there has to be a ‘man in the middle’ that can ‘read’ your DNS requests. Thus to make this work for all major vendors, we all need to get another (root)certificate that encrypts and sends our DNS requests to our preferred DNS server, there it gets decrypted and forwarded, only to have the answer encrypted back to the user and gets decrypted in the browser to get redirected to the requested website.

Thus as I read it; we either encrypt the DNS requests and have our favourite browser vendor be a man in the middle that can decrypt _everything_ after that... OR we just accept that our DNS requests are unencrypted, but ALL traffic afterwards is unable to read for ANY other party (As it is now).

I know which one I would choose...

Divert the power to the shields. 'I'm givin' her all she's got, Captain!'


Re: Trusty UPS's...

Sure... an array of 100W bulbs. We all do that to replace a UPS and test the load. Then again, the fire system gets tested quarterly, but have you ever tested those red flasks filled with inertious gas at 300bar? Just because the detectors and the controller are tested, who knows if all works at the vents when the signal is given from the main controller? Ever did a test on that system to verify if the fire department is actually notified? Ah right, that line was an ISDN line... just being decomissioned by the provider...

My point is; you _could_ do all that, but when is enough, enough? And you should be able to trust on your supplier and testers and tell you all is ok?

I couldn't possibly tell you the computer's ID over the phone, I've been on A Course™


Re: He should be proud that of that guy

AWAC’s are a special kind of breed apparantly. I used to do repairs on 747’s and every now and then we couldn’t order parts for our own planes, because reserved for AWAC’s

The in and outs of Microsoft's new Windows Terminal


“Support for emoji”

What your predecessor meant was that “full utf-8” support also means “support for emoji”, since those are all defined within utf-8. So if you talk to the Direct* text API’s you get support for ClearType rendering, as well as scaling for all kinds of resolutions AND emoji support =D =D

Flight Simulator 2020: Exciting new ride or a doomed tailspin in a crowded market?


So, not a native English speaker over here, but I read this article like; MS _will_ bring out a new FS(2020) and while we enjoy the 4K trailer, we are still assuming that MS will use the old physics engine, so it _might_ suck anyway. But until there’s more information released, we actually don’t have a clue, but try to bloom it with ifs and maybes. ¿Que?


Biting the hand that feeds IT © 1998–2022