News, tips, advice, support for Windows, Office, PCs & more. Tech help. No bull. We're community supported by donations from our Plus Members, and proud of it
Home icon Home icon Home icon Email icon RSS icon
  • GoneToPlaid

    Forum Replies Created

    Viewing 15 posts - 1 through 15 (of 1,092 total)
    • Author
      Posts
    • in reply to: We’re easing into the Plus Membership benefits #1917123

      GoneToPlaid
      AskWoody Plus

      Hi everyone,

      I completely understand that AskWoody needs to be able to pay its bills. Signing up and donating to AskWoody isn’t rocket science. For me, it was money well spent. I hope that everyone, after browsing the forum categories, after seeing what knowledge is available, and also seeing how others take the time help others, would consider it to be a no-brainer to sign up and donate to the continuing existence of AskWoody.

      Oh, and what else is now GONE from the forum? Advertising! If you want to see how incredibly disrupting and intrusive inline advertising on a website can be, simply visit space.com for a really bad taste for how the AskWoody forum could readily choose to pay its bills. So ask yourself, is it worth having an incredibly useful and helpful forum which you can enjoy, and in which you are not inundated by advertising? I certainly hope so.

      Sign up. Make a donation and earn Premium Membership. You will get a Badge next to your avatar which shows that you are a Premium Member and that you do care about this extremely helpful forum. Your Badge shows everyone that you are not dirt cheap!

      Susan spends a lot of time creating and vetting her Master Patch Lists. She and others also spend a lot of time researching and writing their very informative Newsletter articles. So yeah, I think that Susan’s Master Patch List should be available only to the forum’s Plus members, given that Woody has killed all forum third party advertising.

      This forum will be useless to everyone if it does not survive. I hope that everyone thinks of this forum as a history book which is continuously being written, such that it is an ongoing and living and valuable archive of information which continues to help all of us. I hope that everyone who posts useful information or posts helpful information for others, will realize that they do become a part of this forum’s living history which, collectively, all of us are writing.

      In summary, I have two very simple questions for everyone who is not a Plus member. If this forum is really useful to you, would you like this forum to survive? If you want this forum to survive, are you willing to help this forum survive in whatever modest way that you can and which is within your means?

      Woody created AskWoody to help others. I pray that all of us will Pay It Forward by financially supporting this forum and Woody’s vision.

      Best regards,

      –GTP

       

      6 users thanked author for this post.

    • GoneToPlaid
      AskWoody Plus

      The CRCs for the 2019-08-16 windows6.1-kb4517297-x64.msu and for the 2019-08-21 windows6.1-kb4517297-x64.msu are the same. It appears that MS has now made kb4517297 searchable in the Windows Update Catalog? I recall that the link for kb4517297 was different back on August 16 when the kb article was originally published.

      1 user thanked author for this post.
    • in reply to: Patch Lady – How to avoid using RDP in Windows #1914236

      GoneToPlaid
      AskWoody Plus

      I read that there were potential serious caveats when trying to install Powershell 5 on Win7 systems, and that specific steps had to be taken. This might be beyond the average user, and users might want a much simpler yet secure solution. I instead highly recommend installing the paid version of RealVNC if you need remote access to your computers. Here are the configuration settings for RealVNC which I use:

      I disabled allowing access via the RealVNC Java viewer since having Java installed is an inherent security risk. Instead, I must use the actual RealVNC program to remotely access my computers.

      I set a very strong password.

      I do not use VNC’s default Java port 5800 or HTTP port 5900 since these two ports are regularly scanned by hackers since they know that most users of RealVNC will not bother to change the default ports.

      I disallowed shared connections so that a hacker can’t try to log in if I am already logged in and remotely accessing one of my computers.

      I further configured RealVNC, via its Expert tab, with these following settings:

      AuthTimeout — 120 seconds (a user must authenticate the login attempt within 120 seconds)

      BlacklistThreshold — 5 failed login attempts (the max number of authorization attempts by an individual host, after which the host IP is blacklisted if all login attempts fail)

      BlacklistTimeout — 3600 seconds (If a host gets blacklisted, the host now must wait 15 minutes before trying to login again)

      Three or four years ago, the above settings successfully defeated an adept Russian hacker who tried for nearly three weeks to gain access using scripted commands, via VNC, to my computers. The hacker also tried all 65535 ports in order to try to gain access to my local network. The hacker eventually gave up and never tried again. I don’t recall the city to which I tracked the hacker’s IP address.

      RealVNC is a UK company which is not subject to the whims of the NSA.

      Note: I have no affiliations with RealVNC.

       

    • in reply to: Patch Lady – How to avoid using RDP in Windows #1914169

      GoneToPlaid
      AskWoody Plus

      Microsoft does in their ATP documentation: Customers that don’t turn on Remote Desktop Services are not exposed to exploits for these vulnerabilities. Remote Desktop Services is off by default on affected platforms.

      I wonder if there might be a caveat associated with this statement from Microsoft. Microsoft’s statement makes no mention of Remote Assistance. Microsoft’s statement might assume that the user is also using Windows Firewall and not a third party firewall which could still be passing RDP port 3389. From my understanding, if stuff through RDP port 3389 isn’t blocked, then the specific unpatched DLL is exploitable.

      Here is a trick that I learned in terms of third party firewalls: Some third party firewalls do not pickup newly configured rules in Windows Firewall if Windows Firewall is disabled. This sometimes can cause weird networking issues. For example, Panda’s firewall has this issue. The solution is to temporarily disable the third party firewall, then enable Windows Firewall, and then enable the third party firewall. The third party firewall should then pick up the new rules in Windows Firewall. Most third party firewalls then automatically disable Window Firewall. Panda’s firewall, for example, will pick up the new rules in Windows Firewall and then disable Windows Firewall when Panda’s firewall is re-enabled. I consider this to be a bug with an easy workaround.

      If anyone is afraid to install the August updates, you should be able to block port 3389 in your home router or ISP provided modem/router. Remember to block port 3389 for all protocols, specifically HTTP and UDP.

      • This reply was modified 2 days, 5 hours ago by  GoneToPlaid. Reason: Fixed a typo
      1 user thanked author for this post.

    • GoneToPlaid
      AskWoody Plus

      A question for the experts. Now that I have KB3133977 installed on my Win7 computers, do I simply run bcdboot.exe with no parameters from an elevated command prompt?

    • in reply to: We’re easing into the Plus Membership benefits #1917225

      GoneToPlaid
      AskWoody Plus

      I am trying to figure out how to renew my Plus subscription. I don’t see any way to renew it early. My subscription expires on 2020-01-15. I would like to have the ability to renew it before then, and for another year.

      Or perhaps I click on the JOIN TODAY! link so that I can renew my subscription? Inquiring minds might want to know how to renew subscriptions.

      Update…

      I clicked on the Join Today link, and I easily renewed my Plus subscription via Paypal. Wow. That was easy and painless. Now, if only I could get rid of the pimple on my $$$, then I will totally be a happy camper! Alas, there are some things which the forum cannot help with.

      And thus there this is my inglorious end to my Friday evening levity.

      • This reply was modified 3 hours, 48 minutes ago by  GoneToPlaid.
      • This reply was modified 3 hours, 36 minutes ago by  GoneToPlaid. Reason: Add info
    • in reply to: Glacially slow at low resource utilization #1917129

      GoneToPlaid
      AskWoody Plus

      That is exactly what I was about to suggest to check. One has to look at the size of all files in the folder which contain the CBS.log file. My solution is to highlight all, and then click on Delete. If any given file can’t be deleted, then click Cancel since the file was actively in use. Then reboot. After rebooting and waiting 10 minutes, Windows will have automatically created a new CBS.log file which has a file size which will be well under 1 MB and may be well under 100 KB.

      Once this is done, then checking for updates, checking if a given update is already installed, or listing all installed updates will be far faster than before.


    • GoneToPlaid
      AskWoody Plus

      Hi plodr,

      Sometimes Microsoft’s knowledge base articles can be really confusing to read. KB4512486 is the August Security Only update for Windows 7. This Security Only update broke Visual Basic and VBscript programs which used simple methods to create arrays which were completely empty.

      KB451297 does only one thing. It simply fixes what Microsoft broke in the KB451486 SO with regards the empty array issue in Visual Basic and VBscript programs. Microsoft didn’t choose to call KB451297 a Security Only update since it does not offer any new security features. Instead, KB451297 simply fixes the Visual Basic and VBscript issue which Microsoft created in the KB451486 Security Only update.

      I am on Group B. I have already installed KB451297 to fix the botched Security Only update KB451486.

      Below, I have marked with ** the updates which are replaced when the KB4512486 Security Only update is installed, and similarly marked with ** the same updates which are once again replaced when KB451297 is installed to fix the Visual Basic and VBscript issues.

      2019-08 Security Only Quality Update for Windows 7 for x64-based Systems (KB4512486)
      Last Modified: 8/10/2019
      Size: 42.2 MB
      This update replaces the following updates:
      2017-11 Update for Windows 7 for x64-based Systems (KB4055038) **
      Security Update for Windows 7 for x64-based Systems (KB2676562)
      Security Update for Windows 7 for x64-based Systems (KB2957189)
      Security Update for Windows 7 for x64-based Systems (KB2993651)
      Security Update for Windows 7 for x64-based Systems (KB3033889)
      Security Update for Windows 7 for x64-based Systems (KB3069762)
      Security Update for Windows 7 for x64-based Systems (KB3075222)
      Security Update for Windows 7 for x64-based Systems (KB3087039)
      Security Update for Windows 7 for x64-based Systems (KB3126446)
      Security Update for Windows 7 for x64-based Systems (KB3145739)
      Security Update for Windows 7 for x64-based Systems (KB3146706)
      Security Update for Windows 7 for x64-based Systems (KB3153171)
      Security Update for Windows 7 for x64-based Systems (KB3153199)
      Security Update for Windows 7 for x64-based Systems (KB3156013)
      Security Update for Windows 7 for x64-based Systems (KB3161561)
      Security Update for Windows 7 for x64-based Systems (KB3161664)
      Security Update for Windows 7 for x64-based Systems (KB3164033)
      Security Update for Windows 7 for x64-based Systems (KB3164035)
      Security Update for Windows 7 for x64-based Systems (KB3167679)
      Security Update for Windows 7 for x64-based Systems (KB3175024)
      Security Update for Windows 7 for x64-based Systems (KB3177186)
      Security Update for Windows 7 for x64-based Systems (KB3177725)
      Security Update for Windows 7 for x64-based Systems (KB3178034)
      Security Update for Windows 7 for x64-based Systems (KB3184122)
      Update for Windows 7 for x64-based Systems (KB2563227) **
      Update for Windows 7 for x64-based Systems (KB2732487) **
      Update for Windows 7 for x64-based Systems (KB2763523) **
      Update for Windows 7 for x64-based Systems (KB3138901) **
      Update for Windows 7 for x64-based Systems (KB3156417) **
      Update for Windows 7 for x64-based Systems (KB3187022) **

      2019-08 Update for Windows 7 for x64-based Systems (KB4517297)
      Last Modified: 8/21/2019
      Size: 42.2 MB
      This update replaces the following updates:
      2017-11 Update for Windows 7 for x64-based Systems (KB4055038) **
      Update for Windows 7 for x64-based Systems (KB2563227) **
      Update for Windows 7 for x64-based Systems (KB2732487) **
      Update for Windows 7 for x64-based Systems (KB2763523) **
      Update for Windows 7 for x64-based Systems (KB3138901) **
      Update for Windows 7 for x64-based Systems (KB3156417) **
      Update for Windows 7 for x64-based Systems (KB3187022) **

      Best regards,

      –GTP

       


    • GoneToPlaid
      AskWoody Plus

      You wrote a very nice comparison about these two laptop models. The only thing which I could add is that I watched a video about this Acer laptop model’s teardown. It it very straightforward, yet like you mentioned, an owner would have to perform a basic teardown in order to replace the battery. I seriously do not like any laptop which has an internal battery. For this reason alone, I would probably choose the Dell laptop. Another up vote for the Dell is its Core I7 CPU. Yet I should note that the I7’s hyperthreading might have to be disabled in BIOS if this particular I7 CPU is affected by a bug in hyperthreading. No big deal as far as disabling hyperthreading since the performance penalty is fairly marginal, and only affects programs which actually support hyperthreading.

      1 user thanked author for this post.
    • in reply to: Patch Lady – How to avoid using RDP in Windows #1914263

      GoneToPlaid
      AskWoody Plus

      And I will bet 99.99 percent on Yes.

      1 user thanked author for this post.
    • in reply to: Patch Lady – How to avoid using RDP in Windows #1914237

      GoneToPlaid
      AskWoody Plus

      Yep, very true. Thus MS’s statement that disabling RDP, with no mention about Remote Assistance, now comes into question.


    • GoneToPlaid
      AskWoody Plus

      I have been thinking about why I didn’t have any trouble installing the August SO on my three primary Win7 computers. The laptop doesn’t support UEFI, so that explains why it didn’t have any issues. My two primary desktops (virtually identical computers) have their BIOS configured to use a hybrid UEFI/legacy mode in which non-EFI partitions can also boot. I suppose that this is why I had no issues after installing the August SO even though I didn’t have KB3133977 installed? Also, I never installed the convenience rollup since it contains telemetry.


    • GoneToPlaid
      AskWoody Plus

      Maybe check your Windows Update settings to make sure that WU checks for optional updates?


    • GoneToPlaid
      AskWoody Plus

      A question. Were you actually using Bitlocker on these two computers? I ask since I am not using Bitlocker on my Win7 computers, and I had no issues after installing the August SO without KB3133977 being installed on any of my Win7 computers.


    • GoneToPlaid
      AskWoody Plus

      I just installed EasyBCD 2.4 and used it to make a backup of my EFI boot loader. That was easy! It looks like Neosmart also has a USB version which can be used to fix computers which BSOD on bootup.

    Viewing 15 posts - 1 through 15 (of 1,092 total)