-
Steve S
AskWoody LoungerKeyboard should be English QWERTY. How to Confirm?
When I try to type in the password, it is completely blank. Nothing showing up.
No eye to click.
On Screen keyboard act the same as the hardware one. (no characters shown)
Opened an Command prompt, typed test (which I can see there), then tried typing in PW area. no text shown whether symbols, letters, or numbers.
EDIT: Problem fixed. The Touch Screen service was off. And this computer is NOT a touch screen. I noticed when I tried to use the sticky pad, no text there. But Please explain Microsoft why a service that seems to have no purpose on a computer that with NO TOUCH SCREEN is needing a touch screen service? Name of the service is : Touch Keyboard and Handwriting Panel Service.
-
This reply was modified 5 years, 8 months ago by
Steve S.
-
This reply was modified 5 years, 8 months ago by
-
Steve S
AskWoody LoungerGot a couple suggestion for you. First these are easier to do in Control Panel. The best way to get there is to right click This Pc and choice Properties. On the Address Bar Click the arrow by Control Panel then Highlight All Control Panel Items.
Next you will want to click on Administrative Tools. When the Next window opens click on services. Click on name if you want them in order, then scroll down to Background Intelligent Transfer Service. Right Click on this and choice properties. Make the start up type disabled. Then click ok which will bring you back to the main area. Scroll down to Windows Update and disable that as well. The next two services that need disabled are tricker. Windows Update Medic Service and Update Orchestrator Service. If you want to continue on those let me know. Also again in the advanced class is disabling the task.
-
Steve S
AskWoody LoungerJuly 18, 2019 at 2:25 pm in reply to: Kevin Beaumont: Still no sign of BlueKeep in the wild #1876595You might be missing the question. BlueKeep is a big Deal. Yes I agree you can find it there, but the KB pages you think would also mention it and the Security Updates notes, it definitely should be there. Yes I see this
“The following CVEs have FAQs with additional information and may include * further steps to take after installing the updates. Please note that this is not a complete list of CVEs for this release.”.
But again notice what the security update notes are suppose to be
“For more information about the resolved security vulnerabilities, please refer to the Security Update Guide.”
as big a deal at BlueKeep is IT Should be in the Security update guide. Please find it there.
(as in notes of security patches, not general like you did.)
Also the KB’s mention some CVE, but CVE 2019-0708 is not there.
The point is why is such a Big deal not mentioned where it should be. If a users want to confirm that, yes this does patch BlueKeep, if it is not listed in the KB or the notes, how would they know for sure that, yes this is the right patch?
-
Steve S
AskWoody LoungerJuly 18, 2019 at 11:57 am in reply to: Kevin Beaumont: Still no sign of BlueKeep in the wild #1876539I got a question and this might be the best place to put it.
First BlueKeep is CVE 2019-0708
https://en.wikipedia.org/wiki/BlueKeep
I am now going to explain why that is important. Here is ms advisory
https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2019-0708
Using Windows 7 Sp1 32 bit as example. The Kb’s are 4499164 and 4499175.
Starting with 4499175. https://support.microsoft.com/en-us/help/4499175/windows-7-update-kb4499175
Note this line:
“Provides protections against a new subclass of speculative execution side-channel vulnerabilities, known as Microarchitectural Data Sampling, for 64-Bit (x64) versions of Windows (CVE-2019-11091, CVE-2018-12126, CVE-2018-12127, CVE-2018-12130). Use the registry settings as described in the Windows Client and Windows Server articles. (These registry settings are enabled by default for Windows Client OS editions, but disabled by default for Windows Server OS editions).”
First this is talking about 64 bit not 32bit. Second no mention of CVE 2019-0708 (BlueKeep)
Same in 4499164: https://support.microsoft.com/en-us/help/4499164/windows-7-update-kb4499164
Also let check security only for 64 bit. which are the same exact KB’s
One more part
the page has this: “For more information about the resolved security vulnerabilities, please refer to the Security Update Guide.” Lets do that:
https://portal.msrc.microsoft.com/en-us/security-guidance
Searching that page again has no mention of CVE 2019-0708. I checked the listed under
If this was really patched, why no mention above in either the Security Update Release notes or KB pages?
-
Steve S
AskWoody LoungerJuly 12, 2019 at 12:54 pm in reply to: Microsoft surreptitiously adds telemetry functionality to July 2019 Win7 Security-only patch #1874379There is one major problem with telemetry that either most are ignoring or simply not thinking about. Think about what telemetry is. It is an open door to data on your computer, A door that by its existence means your so called “secure” computer is not really secure. After all if m$ can go through the door, that others can as well. That data is likely not just going to m$, but possibly malware writer as well.
If you want security at home, you do not leave an open door. No, you control the ins and outs. That alone means Windows 7 without telemetry is greatly more secure that build in hole for telemetry that 10 has. It is one thing to say ms, my computer crashed. Here the data about it. It is another for ms to enter your computer have a look around, maybe take the Vincent Van Gogh and leave behind the three year old scribbling. Again any opening no matter how small is still a hole in your security. Better no holes if you want to be secure.
Finally a famous Quote: Those who desire to give up freedom in order to gain security will not have either one.
Benjamin FranklinDo we really want to give to ms the power to get anything, anywhere on our computers? Remember they write the code and can make more back doors and thus even more security holes. And malware comes in through those bugs and back doors.
-
Steve S
AskWoody LoungerJuly 6, 2019 at 2:50 pm in reply to: Update: The “wormable” Win XP/Win7 RDP security hole, BlueKeep, still hasn’t been cracked #1870515As I have not seen any mention of this even though it was back in June. Three questions.
First look at the last line of the Three set process:
- The target user connects to a Windows 10 or Server system via RDP
- The user blocks their session and leaves the device unattended
- The attacker with access to the device can interrupt the user’s connection and access the RDP session without having to authenticate.
In other words to exploit this vulnerability, the attacker must have physical access to the device (computer) . Then the computer will be compromised. As most know if one has physical access to a computer, it can be hacked and not patch or security program on the computer will stop it. So the remote part requires being at the computer in question. Have you read or heard anything about that?
next this:
The later versions of Windows 10 1803 and Windows Server 2019 are those that present this vulnerability, because with the most recent update it changed the handling of the NLA-based Windows RDP sessions so that an unexpected performance can be generated in the session lock, mentions the web application security test specialist.
Notice this vulnerability was caused by an update. If the computer in question was not fully updated, that this vulnerability would not be possible. Right?
Last this part
The company was notified since last April 9th, but responded to the flaw report by mentioning that “this behavior does not meet the criteria established by the Microsoft Security Center for Windows”, so the failure will not be corrected, at least not now.
So did Ms patch this or just say they did. What was the real reason for all the doomsday hype?
-
Steve S
AskWoody LoungerSame here. Around 4MT got a 502 Bad Gateway.
-
This reply was modified 6 years ago by
Steve S.
1 user thanked author for this post.
-
This reply was modified 6 years ago by
-
Steve S
AskWoody LoungerSounds like a Group Policy. Do the Following:
Type Gpedit.msc in the run box. Then click on computer configuration. Then Administrative Templates. Then Window Components. Then Window Updates and see if any are set.
-
Steve S
AskWoody LoungerMay 9, 2019 at 8:23 pm in reply to: MS under Nadella is the real big time winner. And us? Read this, and don't weep. #1492709https://www.technewsworld.com/story/Microsoft-Becomes-Master-of-Its-Own-Linux-Kernel-86007.html
What are your thoughts? Should we be scared? Is Windows on its way of becoming Open Source and thus Linux? Can microsoft be trusted not to destroy this like they are currently doing with 10 (IMO)?
-
Steve S
AskWoody LoungerYou could also use other “true” Disposal Email. I like mailinator.com as no account is needed. just pick a email name and it will let you check that box. Google disposable email for more options.
-
Steve S
AskWoody LoungerOh, Lovely Eternal Blue. I learned about that exploit from a Malwarebyte’s Newsletter talking about another possibly nastier uses of that Exploit, Emotet. Links
https://en.wikipedia.org/wiki/EternalBlue
https://blog.malwarebytes.com/cybercrime/2018/09/emotet-rise-heavy-spam-campaign
https://blog.malwarebytes.com/detections/trojan-emotet
https://blog.comodo.com/comodo-news/new-immense-attack-emotet-trojan-targeted-thousands-users/
Why I bring this up? Because it is easy to avoid be detected by antivirus scanners.
From the last link:
IMPORTANT: Emotet is a very advanced polymorphic network worm that has multiple ways to avoid detection. Stopping this worm requires every machine on an infected network to be protected with Anti-Virus, it is also critical that you are following best practice advice. Specifically, you must have Behavior Monitoring (HIPS) enabled including the Detect malicious traffic option also enabled.
The Best Protection from this is simple. Even though it currently MS-DEFCON -1, IMO if you are missing the Patch for this Exploit, get Patched now!
![]() |
There are isolated problems with current patches, but they are well-known and documented on this site. |
SIGN IN | Not a member? | REGISTER | PLUS MEMBERSHIP |

Plus Membership
Donations from Plus members keep this site going. You can identify the people who support AskWoody by the Plus badge on their avatars.
AskWoody Plus members not only get access to all of the contents of this site -- including Susan Bradley's frequently updated Patch Watch listing -- they also receive weekly AskWoody Plus Newsletters (formerly Windows Secrets Newsletter) and AskWoody Plus Alerts, emails when there are important breaking developments.
Get Plus!
Welcome to our unique respite from the madness.
It's easy to post questions about Windows 11, Windows 10, Win8.1, Win7, Surface, Office, or browse through our Forums. Post anonymously or register for greater privileges. Keep it civil, please: Decorous Lounge rules strictly enforced. Questions? Contact Customer Support.
Search Newsletters
Search Forums
View the Forum
Search for Topics
Recent Topics
-
MS Excel 2019 Now Prompts to Back Up With OneDrive
by
lmacri
2 hours, 42 minutes ago -
Firefox 139
by
Charlie
1 hour, 58 minutes ago -
Who knows what?
by
Will Fastie
28 minutes ago -
My top ten underappreciated features in Office
by
Peter Deegan
19 minutes ago -
WAU Manager — It’s your computer, you are in charge!
by
Deanna McElveen
12 hours, 35 minutes ago -
Misbehaving devices
by
Susan Bradley
2 hours, 27 minutes ago -
.NET 8.0 Desktop Runtime (v8.0.16) – Windows x86 Installer
by
WSmeyerbos
1 day, 6 hours ago -
Neowin poll : What do you plan to do on Windows 10 EOS
by
Alex5723
1 hour, 36 minutes ago -
May 31, 2025—KB5062170 (OS Builds 22621.5415 and 22631.5415 Out-of-band
by
Alex5723
1 day, 4 hours ago -
Discover the Best AI Tools for Everything
by
Alex5723
4 hours, 1 minute ago -
Edge Seems To Be Gaining Weight
by
bbearren
19 hours, 6 minutes ago -
Rufus is available from the MSFT Store
by
PL1
1 day, 3 hours ago -
Microsoft : Ending USB-C® Port Confusion
by
Alex5723
2 days, 5 hours ago -
KB5061768 update for Intel vPro processor
by
drmark
5 hours, 48 minutes ago -
Outlook 365 classic has exhausted all shared resources
by
drmark
4 hours, 31 minutes ago -
My Simple Word 2010 Macro Is Not Working
by
mbennett555
2 days, 1 hour ago -
Office gets current release
by
Susan Bradley
2 days, 4 hours ago -
FBI: Still Using One of These Old Routers? It’s Vulnerable to Hackers
by
Alex5723
3 days, 18 hours ago -
Windows AI Local Only no NPU required!
by
RetiredGeek
3 days, 2 hours ago -
Stop the OneDrive defaults
by
CWBillow
3 days, 19 hours ago -
Windows 11 Insider Preview build 27868 released to Canary
by
joep517
4 days, 5 hours ago -
X Suspends Encrypted DMs
by
Alex5723
4 days, 7 hours ago -
WSJ : My Robot and Me AI generated movie
by
Alex5723
4 days, 7 hours ago -
Botnet hacks 9,000+ ASUS routers to add persistent SSH backdoor
by
Alex5723
4 days, 8 hours ago -
OpenAI model sabotages shutdown code
by
Cybertooth
4 days, 8 hours ago -
Backup and access old e-mails after company e-mail address is terminated
by
M W Leijendekker
3 days, 21 hours ago -
Enabling Secureboot
by
ITguy
4 days, 4 hours ago -
Windows hosting exposes additional bugs
by
Susan Bradley
4 days, 16 hours ago -
No more rounded corners??
by
CWBillow
4 days, 12 hours ago -
Android 15 and IPV6
by
Win7and10
4 days, 2 hours ago
Recent blog posts
Key Links
S | M | T | W | T | F | S |
---|---|---|---|---|---|---|
1 | 2 | 3 | 4 | 5 | 6 | 7 |
8 | 9 | 10 | 11 | 12 | 13 | 14 |
15 | 16 | 17 | 18 | 19 | 20 | 21 |
22 | 23 | 24 | 25 | 26 | 27 | 28 |
29 | 30 |
Want to Advertise in the free newsletter? How about a gift subscription in honor of a birthday? Send an email to sb@askwoody.com to ask how.
Mastodon profile for DefConPatch
Mastodon profile for AskWoody
Home • About • FAQ • Posts & Privacy • Forums • My Account
Register • Free Newsletter • Plus Membership • Gift Certificates • MS-DEFCON Alerts
Copyright ©2004-2025 by AskWoody Tech LLC. All Rights Reserved.