ISSUE 20.22 • 2023-05-29 PUBLIC DEFENDER By Brian Livingston The security community is up in arms, because Google this month started selling domain na
[See the full post at: Beware of Google’s .ZIP domain and password-embedded URLs]
![]() |
There are isolated problems with current patches, but they are well-known and documented on this site. |
SIGN IN | Not a member? | REGISTER | PLUS MEMBERSHIP |
-
Beware of Google’s .ZIP domain and password-embedded URLs
Home » Forums » Newsletter and Homepage topics » Beware of Google’s .ZIP domain and password-embedded URLs
- This topic has 63 replies, 24 voices, and was last updated 3 months, 2 weeks ago.
AuthorTopicB. Livingston
AskWoody MVPViewing 30 reply threadsAuthorReplies-
steeviebops
AskWoody PlusGoogle’s argument that .com is also used in filenames doesn’t make sense. Back in the DOS and Windows 3.x days when .com files were common, most people didn’t have internet access and the amount of bad actors out there was significantly less.
2 users thanked author for this post.
-
MHCLV941
AskWoody PlusI don’t know how long since Google stopped pretending “Don’t be evil” was its motto/corporate code of conduct, probably when Alphabet assimilated it, but it most certainly has abandoned all pretext of believing in it anymore. For that matter, Alphabet’s claim to “Do the right thing” is completely discredited by these stupid, stupid top-level domains.
That said, who is/are the idiot(s) and ICANN who licensed .mov and .zip to any company?
The other TLDs seem pretty harmless, no more dangerous than vanity license plates. I’ve actually looked at the list of TLDs and there are some pretty strange ones in there. My personal favorite is XN–VERMGENSBERATUNG-PWB, the longest one in the list.
Google used to have some pretty smart people running the place. What happened to them?
Fred
AskWoody LoungerMHCLV941
AskWoody PlusGoogle’s argument that .com is also used in filenames doesn’t make sense. Back in the DOS and Windows 3.x days when .com files were common, most people didn’t have internet access and the amount of bad actors out there was significantly less.
Nothing about this whole bit of insanity makes any sense.
4 users thanked author for this post.
MHCLV941
AskWoody PlusGoogle used to have some pretty smart people running the place. What happened to them?
They are all into AI I suppose. Or a momentary lapse of……?
The bean counters have staged a coup and locked all of them in a lab, along with all of Alphabet/Google’s security staff.
1 user thanked author for this post.
MHCLV941
AskWoody Plustrailcook
AskWoody Plus-
gwt10
AskWoody Plus -
rc primak
AskWoody_MVPWait for the updates to your favorite browser guard security products. Many more updates to come. (May I put in a plug now for Malwarebytes Browser Guard? Though, they may not have caught up with this development yet.)
Another probability is that someone will place into the Google Web Store an extension to block these domains. The existing block lists (like uBlock Origin) no doubt will be blocking these domain names even sooner. Even Ghostery has an opportunity here. Firefox might block them in the browser just out of spite for their rival.
What I worry about are email links. Especially in ads. Those are harder to train people to ignore or check out using other methods.
This is looking like the QR Codes issue, only worse.
-- rc primak
-
steeviebops
AskWoody PlusAdded both *.zip and *.mov to pihole’s domain block list
– So if you don’t have a pihole, how to block?
If you have a Pro version of Windows it can be done via Group Policy.
11 users thanked author for this post.
-
rc primak
AskWoody_MVP -
Just another Forum Poster
AskWoody Lounger
-
RonB001
AskWoody Plus-
geekdom
AskWoody_MVPHere is information on punycode which is a unicode look-alike. Configuring the Firefox browser is shown:
https://www.askwoody.com/forums/topic/replies-daily-computer-tip/#post-2503383
On permanent hiatus {with backup and coffee}
offline▸ Win10Pro 2004.19041.572 x64 i3-3220 RAM8GB HDD Firefox83.0b3 WindowsDefender
offline▸ Acer TravelMate P215-52 RAM8GB Win11Pro 22H2.22621.1265 x64 i5-10210U SSD Firefox106.0 MicrosoftDefender
online▸ Win11Pro 22H2.22621.1992 x64 i5-9400 RAM16GB HDD Firefox116.0b3 MicrosoftDefender3 users thanked author for this post.
-
rc primak
AskWoody_MVPWhich, if any, browsers allow you to disable formatting in the url?
None of them really can do the trick presently. And there aren’t any good extensions I know of to do this generalized job. In fact, Google in particular has been moving the opposite direction since at least 2014, according to Paul Thurott.
-- rc primak
L95
AskWoody PlusI’m a bit of a computer dummy and so a lot of this discussion is over my head. I did a Google search to try to find an easy step-by-step procedure to use Group Policy to block *.zip and *.mov as mentioned by Steeviebops above. The search let me to a step-by-step article (that shows screenshots for every step) at https://www.grouppolicy.biz/2010/04/how-to-configure-applocker-group-policy-in-windows-7-to-block-third-party-browsers/. It appears to be kind of an old article written in 2010. Would this article be a good article for me to use, or is there something better? I am presently using a Windows 7 computer (security protected by 0Patch), and will also be setting up a couple more computers to replace it, one is a laptop with Windows 10 Home Edition and the other is a desktop with Windows 10 Professional. It looks like there may not be a way to do it on the one with Home Edition because Steeviebops said the method applies to Windows Pro, but at any rate I’d like to find an easy step-by-step article (with screenshots) to accomplish this on the the 2 computers that do have Windows Pro.
And then for the one that has Home Edition, is there a way to accomplish this in view of the fact I don’t have pi-hole?
Also, Brian Livingston said “even worse, some browsers are allowing usernames and passwords to be embedded into URLs.” Which browsers is he referring to?
-
rc primak
AskWoody_MVPFrom a fellow tech dummy (me) to your question:
I did a lengthy search, but did not find a way to use the Windows 10/11 Pro Group Policies to block a specific domain from being used by all your web browsers and all mail apps. (Other applications should be well-behaved unless the apps themselves are malicious.)
Although Chatgpt-4 seems to think there is a way to use Windows 10/11 Group Policies to block domains from all applications, actual discussions online about this exact concept come to the opposite conclusion:
GPO’s won’t be able to achieve that.
The simplest approach may be to use web browser extensions, or the router’s settings, various kinds of parental controls, or your Windows Hosts File. This article shows you how these things can be done in Windows 10 (or 11).
There is also a Powershell way to block web sites or domains. This is basically an indirect way to access the Windows Defender Firewall settings. Check this article.
AppLocker, last I knew, was an Enterprise Windows feature not yet available fully to Pro users.
Generally, Home Editions may have Registry Edits available to accomplish what the Pro and Enterprise Group Policies do. But not always. And for this scenario, there appears not to be so simple a way to handle the mess Google has created.
Passwords or passcodes embedded in URLs work in all major browsers. Zoom for example, has their meting passwords embedded into their links if you choose to allow this. The basic method used is shown in this article. This is not a State Secret and does not require a lot of technical skill. Making it happen automatically just by clicking on a malicious link is a bit more challenging.
Woody Leonhard used to love dummies. He always introduced himself as our fellow dummy.
There are no dumb questions — only people dumb enough not to ask.
-- rc primak
5 users thanked author for this post.
-
Just another Forum Poster
AskWoody LoungerTo block all apps from accessing a specific domain (i.e. somedomain.com), simply add it to the “end” of the host file located in:
C:\Windows\System32\drivers\etc
Using the following format:
0.0.0.0 somedomain.com
Then any app attempting to connect to it will get redirected to the “non-existant” 0.0.0.0 IP address and won’t be able to connect.
Notes:
• The host file is a simple text file (i.e. it can be opened with any text editor) but doesn’t have an extension and must be saved that way if modified.
• You can either use spaces or tabs between the IP address and the domain name (I “sort” the rows and use a tab so the domain names line up in the same column and are easy to read.)
• To block “multiple” domains, enter each one on it’s own line using the above format.
• You can’t block “partial” domain names or TLD suffixes, only full domain names!
• This will not block attempts to “directly connect” to an IP address (i.e. it only blocks domain names!)
¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯
To block all apps from accessing a specific TLD (i.e. .zip, .mov, .xyz, etc., etc.) use the Group Policy method steeviebops posted above.BTW, I verified that Group Policy does block all apps from accessing the particular TLD you enter.
i.e. google-analytics.zip is one of the newly “registered” .zip domains with an assigned IP address (list of newly registered .zip domains)
After implementing a TLD block of .zip using the Name Resolution Group Policy, when I attempt to browse to it (4 different browsers), ping it, run tracert to it, or use any of the other programs I have to check domain info, they all failed because they couldn’t find the “google-analytics.zip” domain name.
Just FYI, even though a Whois check shows that domain does belong to Google, I did not try to visit it before implementing my .zip block and would suggest no one else visit it either.
5 users thanked author for this post.
-
rbailin
AskWoody PlusURL syntax allows the following:
https://username:password@www.domain.com
I’ve used this myself for easy link or bookmark access to FTP servers:
ftp://username:password@ftp.domain.com
The username and password are transmitted as plaintext, and is a potential security problem, but it’s just a formality for most ftp sites to prohibit casual file access and google scanning. In addition, that access is usually always read-only for all directories except /tmp .
1 user thanked author for this post.
rc primak
AskWoody_MVPrc primak
AskWoody_MVPNone of them really can do the trick presently. And there aren’t any good extensions I know of to do this generalized job. In fact, Google in particular has been moving the opposite direction since at least 2014, according to Paul Thurott.
-- rc primak
wavy
AskWoody Plusgwt10
AskWoody PlusAdded both *.zip and *.mov to pihole’s domain block list
– So if you don’t have a pihole, how to block?
If you have a Pro version of Windows it can be done via Group Policy.
Hi and thanks for that info.
However there are certain cases where I do download zip files from some sources that I do trust, either through Firefox itself, or using programs like IDM or JDownloader. The files themselves typically end in .zip or .rar
Will this group policy disable the ability to do that?
-
Just another Forum Poster
AskWoody Loungerthere are certain cases where I do download zip files from some sources that I do trust, either through Firefox itself, or using programs like IDM or JDownloader. The files themselves typically end in .zip or .rar Will this group policy disable the ability to do that?
The Group Policy Rule only applies to DNS lookups (that convert the “Domain Name” into the “IP address” needed to actually make the connection) not the URL entered in your browser!
So if a particular “link” ends with a blocked “domain suffix“, it won’t be affected.
I.e., I just downloaded the “seamonkey-2.53.16.en-US.win64.zip” file from the Mozilla archives without any problems because the “domain suffix” for that site is .org not .zip.
1 user thanked author for this post.
Tim W. Elder
Gueststeeviebops
AskWoody PlusFrom a fellow tech dummy (me) to your question:
I did a lengthy search, but did not find a way to use the Windows 10/11 Pro Group Policies to block a specific domain from being used by all your web browsers and all mail apps. (Other applications should be well-behaved unless the apps themselves are malicious.)
Although Chatgpt-4 seems to think there is a way to use Windows 10/11 Group Policies to block domains from all applications, actual discussions online about this exact concept come to the opposite conclusion:
GPO’s won’t be able to achieve that.
The simplest approach may be to use web browser extensions, or the router’s settings, various kinds of parental controls, or your Windows Hosts File. This article shows you how these things can be done in Windows 10 (or 11).
There is also a Powershell way to block web sites or domains. This is basically an indirect way to access the Windows Defender Firewall settings. Check this article.
AppLocker, last I knew, was an Enterprise Windows feature not yet available fully to Pro users.
Generally, Home Editions may have Registry Edits available to accomplish what the Pro and Enterprise Group Policies do. But not always. And for this scenario, there appears not to be so simple a way to handle the mess Google has created.
Passwords or passcodes embedded in URLs work in all major browsers. Zoom for example, has their meting passwords embedded into their links if you choose to allow this. The basic method used is shown in this article. This is not a State Secret and does not require a lot of technical skill. Making it happen automatically just by clicking on a malicious link is a bit more challenging.
Woody Leonhard used to love dummies. He always introduced himself as our fellow dummy.
There are no dumb questions — only people dumb enough not to ask.
The way I did it above was go to Computer Configuration > Windows Settings > Name Resolution Policy. Set the dropdown to zip (or whatever TLD you want to block), then go to the Generic DNS Server tab, select Enable DNS settings, click Add, and then enter 0.0.0.0 as the DNS server Click Create, and then Apply at the end. You can add multiple entries here.
4 users thanked author for this post.
-
Alex5723
AskWoody Plus4 users thanked author for this post.
-
L95
AskWoody Plus -
steeviebops
AskWoody Plus -
Just another Forum Poster
AskWoody LoungerIf so, can you provide a link to it?
The link provided by @alex5723 in the post immediately above yours provides detailed instructions on how to do this with one difference, it says to use IP address 127.0.0.1 instead of 0.0.0.0.
As @steeviebops points out in his below post, 0.0.0.0 is a “much better” option because 127.0.0.1 will “redirect” those domains to your local PC and, if it’s running a 3rd party DNS server (i.e. Anti-virus, VPN, etc., etc.) the block won’t work!
Using the 0.0.0.0 IP address will always work because it’s not a valid IP address for any software/hardware!
5 users thanked author for this post.
-
steeviebops
AskWoody Plushttps://windowsloop.com/how-to-block-zip-and-mov-domains-in-windows/
I prefer to use 0.0.0.0 rather than 127.0.0.1 because if your machine is running a DNS agent of some sort (some AVs such as Webroot DNS Protection might have this), then the block won’t be effective.
7 users thanked author for this post.
-
Alex5723
AskWoody Plus
MHCLV941
AskWoody Plushttps://windowsloop.com/how-to-block-zip-and-mov-domains-in-windows/
Very nice article so long as one does not have the Home version. Group policy is not available in the Home version.
-
Just another Forum Poster
AskWoody LoungerGroup policy is not available in the Home version.
A 3rd party option that does allow you to apply Group Policies for the Home version is Policy Plus.
It makes the same registry changes as Group Policy on the Windows Pro/Enterprise editions but requires you logoff and/or reboot for them to take effect.
3 users thanked author for this post.
-
Steve S.
AskWoody PlusI think I recall Susan Bradley saying something along the lines that: Even though programs like this will insert the edits into the Windows 10 Home registry, the operating system will sometimes just ignore some of those registry entries. Have you tested the Name Resolution Group Policy fix using this program? Just curious. (I used the UblockOrigin method below and can confirm it does the trick.)
Win10 Pro x64 22H2, Win10 Home 22H2, Linux Mint + a cat with 'tortitude'.
1 user thanked author for this post.
-
Just another Forum Poster
AskWoody LoungerAs for the assertion…
the operating system will sometimes just ignore some of those registry entries
It appears that’s only true for Group Policies intended to block “automatic” Windows updates. I know the “registry settings” made by the Group Policies that block “automatic Windows Updates” stopped working on my Aunt’s Windows Home version quite some time ago (had to switch her internet connection to “metered” to stop them!)
But I’ve applied registry settings for “other” Group Policies, and they’ve always worked as expected, and I’ve see posts here on Askwoody by various users who’ve done the same on their Windows Home versions and, so far, they all seem to still work.
Of course, unless you never apply any Windows updates, Microsoft has ultimate control over your Windows installation during the update process and can chose to ignore any settings you’ve changed/applied!
Note: I haven’t been able to apply this new one to my Aunt’s Windows Home setup yet; she’s a CPA and hasn’t been willing to allow me remote access to her PC due to her current work load. I “may” be able to test it this weekend… if another Askwoody user doesn’t beat me to it first.
BTW, attached are the appropriate registry settings to block the MOV and ZIP suffixes, taken directly from my own registry after applying the Name Resolution Policy, as well as versions that will remove the block if you decide you don’t need it.
-
PKCano
Manager -
Just another Forum Poster
AskWoody LoungerIt’s located in the \Services\Dnscache section of the registry so, unless you have the Dnscache service (DNS Client) disabled, it should.
Just be aware, there must be a separate key {Rule GUID} for each Name Resolution Policy you want to apply and the key names are a “randomly generated” 36 character hex value.
The key for my MOV block is {54a5f496-186f-459a-8f70-35ddd056de0b}
The key for my XYZ block is {7b5ab7dd-082b-4f47-95bc-552906b3ab4a}
(note: I didn’t attach the reg file for this one)The key for my ZIP block is {af9c213e-8011-4eb6-bac6-5e43da4bd456}
I scanned my registry and the \Services\Dnscache section was the only location using those values so you “should” be able to create your own key (as long as it follows that same format and is unique) and have it apply.
For more info about the Name Resolution Policy setting, see Microsoft’s Name Resolution Policy Table (NRPT) page.
(note: while that page indicates NRPT is for Windows Server 2012 & Windows Server 2012 R2, it also applies to the newer versions of Windows Server as well as Win10 & 11.)2 users thanked author for this post.
-
-
-
-
Cybertooth
AskWoody PlusThe snag I ran into when trying to use this Policy Plus is that the categories it lists don’t seem to necessarily match what’s in Group Policy Editor. In this case, for instance, whereas Alex’s link says to navigate in Group Policy to “Computer Configuration” > “Windows Settings” > “Name Resolution Policy”, there is no corresponding listing in Policy Plus. Where exactly would one go in PP to make that GP change? Searching for these terms in PP turns up hundreds of results.
-
Just another Forum Poster
AskWoody LoungerAll my PC’s are Win10 Pro and I never actually tried using Policy Plus, so I downloaded it and here’s what I discovered.
It shows the “Administrative Template” policies for Users or Computer but does not show the “Software Settings” or “Windows Settings” policies; which makes it useless for applying this particular policy!
As to why it doesn’t include those policy categories, only the developer could answer that question but I “suspect” they weren’t included because most users would never need them.
Unfortunately, this means Win10 & 11 Home users will need to modify their registry to apply this policy and, at this point, we don’t know if that actually works.
3 users thanked author for this post.
-
CBA
AskWoody PlusBased on a Reddit thread I added this to my uBlock Origin “My Filters” list:
||mov^
||zip^Testing so far shows that it works:
uBlock Origin has prevented the following page from loading: http://test.mov/
uBlock Origin has prevented the following page from loading: http://test.zip/
11 users thanked author for this post.
gwt10
AskWoody Plusthere are certain cases where I do download zip files from some sources that I do trust, either through Firefox itself, or using programs like IDM or JDownloader. The files themselves typically end in .zip or .rar Will this group policy disable the ability to do that?
The Group Policy Rule only applies to DNS lookups (that convert the “Domain Name” into the “IP address” needed to actually make the connection) not the URL entered in your browser!
So if a particular “link” ends with a blocked “domain suffix“, it won’t be affected.
I.e., I just downloaded the “seamonkey-2.53.16.en-US.win64.zip” file from the Mozilla archives without any problems because the “domain suffix” for that site is .org not .zip.
Ok well I appreciate all that clarification, thank you.
Just another Forum Poster
AskWoody LoungerTwo problems with using UblockOrigin or other “browser” add-ins to do this:
1- It only blocks browser access; “other programs” on your PC can still connect to those domains.
2- It only works for the specific browser that has the add-in installed.
The Group Policy method works to block access by all programs installed on your system!
5 users thanked author for this post.
-
geekdom
AskWoody_MVPIt never hurts to do both Group Policy and uBlock Origin.
On permanent hiatus {with backup and coffee}
offline▸ Win10Pro 2004.19041.572 x64 i3-3220 RAM8GB HDD Firefox83.0b3 WindowsDefender
offline▸ Acer TravelMate P215-52 RAM8GB Win11Pro 22H2.22621.1265 x64 i5-10210U SSD Firefox106.0 MicrosoftDefender
online▸ Win11Pro 22H2.22621.1992 x64 i5-9400 RAM16GB HDD Firefox116.0b3 MicrosoftDefender1 user thanked author for this post.
-
Microfix
AskWoody MVP
Microfix
AskWoody MVPPKCano
ManagerI generated the TLD blocks using Group Policy on my Pro machines. Here’s what the equivalent Registry blocks on .zip and .mov look like on my Win8.1/10/11. Seems the “DNSPolicyConfig” name (see highlighted alpha-numeric in screenshots) is unique to the generation of each individual policy, not common to the TLDs blocked on each machine.
Win8.1 Registry settings:
Win10 Registry settings:
Win11 Registry settings:
3 users thanked author for this post.
CBA
AskWoody PlusMany excellent ideas in this thread, but, I follow the maxim “As Much As Necessary, As Little As Possible” whenever feasible. Plus common sense and a little prudence.
On that basis, using uBlock Origin (Firefox and Edge) to block .mov and .zip domains has the advantage that I can decide to “Proceed”, should I trust the site in question. My thoughts…
dmt_3904
AskWoody LoungerWow! There’s a lot to absorb here, and it’s a little overwhelming, coming from another tech dummy : D
I am actually a little tech savvy but this is definitely over my head. I think since I am the only Windows user in my home, I can avoid these nefarious TLDs (or so I hope!). I try to use my IOS devices for any web activity and generally avoid the browser (Firefox) on my laptop. But my husband is vulnerable and I have no way to realistically teach him to avoid these TLDs. Just not gonna happen!!!
So all of this discussion is around Windows. What about IOS? I use Safari and Duckduckgo. Is it vulnerable if one were to click on an infected url? And would Lockdown stop it? thanks! Donna
-
rc primak
AskWoody_MVPMy best guess is that in the very near future programs like Malwarebytes Browser Guard (free) will be coming out with at least an option to block domain names and top-level domains. Full security suites, but probably not Windows Defender, will also offer the option, I suspect. The Windows Firewall however, does offer such capabilities now, if you know how to configure it. Again, third party tweaks for dummies (my TM 🙂 ) will most likely come out soon to make the process very simple indeed. Just make sure the utilities and methods you choose come from trusted vendros or developers. Or from the folks right here at AskWoody.
-- rc primak
2 users thanked author for this post.
dmt_3904
AskWoody LoungerPhilInWA
AskWoody PlusIf you’re using an ASUS router that will support Merlin’s firmware, then see this post about blocking at the router level: https://www.snbforums.com/threads/how-to-block-top-level-domains.79311/ . It works for me testing get.store (an existing domain). (These add-ins are a reason I’ve been using ASUS routers for 10+ years. See, e.g., diversion. I even send contributions to these guys!) -Phil
1 user thanked author for this post.
MHCLV941
AskWoody PlusThe games have begun!
While testing my firewall changes, I found a live .zip domain. It’s, well, the forum won’t let me post anything that actually has it, so….
Replace .com in http://www.microsoft.com with the offensive TDL.
(Fingers crossed that this posts!)
AlphaCharlie
AskWoody PlusI came across this list of “The 10 Most Abused Top Level Domains”
at https://www.spamhaus.org/statistics/tlds/
so then I went to the My Filters tab in Ublock Origin and did this:
This is my first time wandering inside uBlock origin, so I will report back if I note any strange behavior. Of course, this is on one Win 10 machine.
I wonder when we will have a simple procedure for my Chromebook and my iOS devices.
-
b
ManagerI came across this list of “The 10 Most Abused Top Level Domains”
For spam:
The 10 Most Abused Top Level Domains
As of 09 June 2023 the TLDs with the worst reputations for spam operations are:so then I went to the My Filters tab in Ublock Origin and did this:
Can uBlock Origin block emails?
Windows 11 Pro version 22H2 build 22621.2361 + Microsoft 365 + Edge
-
AlphaCharlie
AskWoody Plus
-
L95
AskWoody PlusOn June 3, 2023, rc primak wrote:
My best guess is that in the very near future programs like Malwarebytes Browser Guard (free) will be coming out with at least an option to block domain names and top-level domains. Full security suites, but probably not Windows Defender, will also offer the option, I suspect. The Windows Firewall however, does offer such capabilities now, if you know how to configure it.
I have contacted a Malwarebytes representative by e-mail, and she said their Browser Guard does already do this blocking. She also provided a link to an article on their website about this domain-name issue. The link is at https://www.malwarebytes.com/blog/news/2023/05/zip-domains. I found the article to be helpful in understanding the issue.
However, as alejr wrote on May 31, 2023, a problem with browser add-ins is that “it only blocks browser access; ‘other programs’ on your PC can still connect to these domains.” I didn’t ask Malwarebytes about this, but I would assume that probably the same is true of their Browser Guard. I may ask them about it at some point in a future e-mail correspondence.
2 users thanked author for this post.
Viewing 30 reply threads -

Plus Membership
Donations from Plus members keep this site going. You can identify the people who support AskWoody by the Plus badge on their avatars.
AskWoody Plus members not only get access to all of the contents of this site -- including Susan Bradley's frequently updated Patch Watch listing -- they also receive weekly AskWoody Plus Newsletters (formerly Windows Secrets Newsletter) and AskWoody Plus Alerts, emails when there are important breaking developments.
Get Plus!
Welcome to our unique respite from the madness.
It's easy to post questions about Windows 11, Windows 10, Win8.1, Win7, Surface, Office, or browse through our Forums. Post anonymously or register for greater privileges. Keep it civil, please: Decorous Lounge rules strictly enforced. Questions? Contact Customer Support.
Search Newsletters
Search Forums
View the Forum
Search for Topics
Recent Topics
-
A.I. and AskWoody
by
WCHS
28 minutes ago -
Where is Windows Update?
by
bsfinkel
2 hours, 46 minutes ago -
mailwasher
by
jferr333
3 hours, 14 minutes ago -
Windows Photos
by
Linda2019
4 hours, 3 minutes ago -
OT QuickBooks payroll module not letting you efile 941
by
Susan Bradley
5 hours, 2 minutes ago -
MSA logins have been retired from DPC May 1st
by
Cormy1
5 hours ago -
Administrator Lock
by
John Monge
9 hours ago -
Skype cancels loopback audio
by
Steven
12 hours, 52 minutes ago -
Python re-installation
by
WSepzcaw
11 hours, 16 minutes ago -
Finally updated to Thunderbird 115
by
EricB
3 hours, 45 minutes ago -
Hard drive boot up problem in Windows AND Linux
by
rkacmar
20 hours, 51 minutes ago -
WSUS fails to download monthly Cumulative Update for Windows 11 Version 22H2
by
Bruce23
4 hours, 15 minutes ago -
Excel tone
by
WSmmi16
8 hours, 57 minutes ago -
Wait for the bugs to be worked out
by
Susan Bradley
15 hours, 24 minutes ago -
What Windows Really Needs [Pure OPINION]
by
RetiredGeek
7 hours, 39 minutes ago -
“Winmail.dat” attachments when email is sent from Outlook to Thunderbird
by
MrJimPhelps
23 hours, 48 minutes ago -
win 11 22H2 Memory itegrity error
by
krism
1 day, 7 hours ago -
McLaren Health Care 6TB data breach
by
Microfix
21 hours, 4 minutes ago -
Long Live the Red Envelope Era | Farewell to DVDs | Netflix
by
Alex5723
1 day, 10 hours ago -
Faststone Image Viewer updates
by
Alex5723
2 days, 12 hours ago -
Malicious ad served inside Bing’s AI chatbot
by
Alex5723
2 days, 12 hours ago -
win10 pro 22H2 current minus 1 mo,to, win11. suggestions…
by
krism
2 days ago -
Microsoft entered negotiations to sell Bing to Apple in 2020
by
Alex5723
2 days, 21 hours ago -
X CEO shows her iPhone’s Home Screen – and X isn’t there
by
Alex5723
2 days, 22 hours ago -
Keeping an older Mac secure
by
Susan Bradley
2 days, 23 hours ago -
Thunderbird – problem ”setting up existing email address”
by
stajourneyman
14 hours, 34 minutes ago -
Windows 11 Insider Preview build 23555 released to DEV
by
joep517
3 days, 9 hours ago -
Something didn’t go as planned KB5030310, KB 5030219
by
Donald Wyllie
1 day, 23 hours ago -
“Enhanced” search box
by
WSraysig
3 days, 11 hours ago -
Windows Ends Installation Path for Free Windows 7/8 Upgrade
by
Alex5723
3 days, 11 hours ago
Recent blog posts
- Wait for the bugs to be worked out
- MS-DEFCON 4: Is Windows 11 really a disaster?
- Windows 11, Surface, and Windows Copilot
- Why File Explorer keeps me on Windows
- Uninstalr — “World’s best cup of coffee”
- Locked out of your refurbished computer?
- What happened to the manual?
- Apple zero days out – September 2023
Key Links
S | M | T | W | T | F | S |
---|---|---|---|---|---|---|
1 | 2 | 3 | 4 | 5 | 6 | 7 |
8 | 9 | 10 | 11 | 12 | 13 | 14 |
15 | 16 | 17 | 18 | 19 | 20 | 21 |
22 | 23 | 24 | 25 | 26 | 27 | 28 |
29 | 30 | 31 |
Want to Advertise in the free newsletter? How about a gift subscription in honor of a birthday? Send an email to sb@askwoody.com to ask how.
Mastodon profile for DefConPatch
Mastodon profile for AskWoody
Home • About • FAQ • Posts & Privacy • Forums • My Account
Register • Free Newsletter • Plus Membership • Gift Certificates • MS-DEFCON Alerts
Copyright ©2004-2023 by AskWoody Tech LLC. All Rights Reserved.