Category Archives: Microsoft

Two more Windows 10 Insider Preview builds

When Windows 10 updates itself, in the final stages, we’re treated to a series of screen-filling messages, like “We’ve updated your computer”, and “All your files are right where you left them.” I can understand why Microsoft is showing messages like this: to reassure users who would otherwise be wondering what’s going on as their hard drive thrashes away. As a more technically-minded person, I would prefer an indication of exactly what’s happening, and how long it’s going to take, but I can live with these messages instead.

On the other hand, sometimes these messages are misleading. Take this one: “We’ve got some new features to get excited about.” Apart from the grammatical issues, this message simply isn’t usually true. The most recent Preview builds, for example.

Windows 10 Insider Preview Build 11102

Build 11102, released on January 21, includes only one new feature of note, and it’s hardly exciting: you can now “right-click on the back and forward buttons in Microsoft Edge for quick access to your recently visited websites in the current tab.” Woo hoo.

Note that this build still has the problem with WSClient.dll error dialogs popping up at inconvenient times. At least the build announcement describes a workaround.

Windows Insider Preview Build 14251

Build 14251, released on January 27, has the distinction of generating a lot of discussion regarding the large jump in build number. It turns out that the big jump is the result of Microsoft trying to synchronize builds across platforms, which is actually a good thing.

Meanwhile, the announcement for build 14251 actually says “This build doesn’t have notable new features in it”. And sure enough, it’s mostly bug fixes.

Windows 10 Insider Preview build 11099

My Windows 10 test computer just upgraded itself to the latest Insider Preview build, 11099.

I’m now on what Microsoft calls the ‘Fast Ring’, which means that I get new Windows 10 builds almost immediately after they become available. One of the drawbacks of this scheme is that these early builds tend to have more problems than regular releases. For me, that’s acceptable, because my test PC is not used for much aside from testing. I wouldn’t try this on my main computer.

The first thing I noticed about the new build is that the File Explorer progress dialogs are back. Those dialogs disappeared in the last build, which wasn’t a huge problem, but it was disconcerting.

The only other difference I’ve noticed in this build is a weird error message that pops up when Windows starts. There’s additional information, including a couple of possible fixes, over at Neowin.

I’ll post updates here as I work with the new version.

Patch Tuesday for January 2016

This month’s Microsoft updates are more interesting than usual, in that they are the last for versions of Internet Explorer earlier than 11. No more patches for older IE versions means you should avoid using them if at all possible, since they are likely to become a major target for malicious persons intent on spreading malware and increasing the size of their botnets.

It’s interesting to speculate on how much of a hit Microsoft will take in terms of browser share once people move way from IE 8, 9, and 10. Estimates vary, but I’ve seen recent numbers that show IE 8 at 9%, IE 9 at 7%, and IE 10 at 4%. If everyone does the right thing and switches browsers, Microsoft could lose as much as 20% of their browser market share.

There are ten updates from Microsoft this month, affecting Windows, Internet Explorer, Edge, MS Office, Visual Basic, Silverlight, and Exchange Server. Six of the updates are flagged as Critical. A total of twenty-five vulnerabilities are addressed.

When installed, the Silverlight update will bump the software’s version up to Build 5.1.41212.0. Silverlight’s release notes page has been updated to show what’s changed.

Three security advisories were also published by Microsoft today, the most interesting of which is titled Deprecation of SHA-1 Hashing Algorithm for Microsoft Root Certificate Program.

Adobe joins the fun once again this month, but this time we only get an update for Reader that addresses fifteen vulnerabilities. Surprisingly, there are no updates for Flash.

Update: Support for Windows 8 has also ended. Anyone still using Windows 8 should upgrade to Windows 8.1 to continue receiving updates.

Clarification: Microsoft will still develop security updates for Internet Explorer 7, 8, 9, and 10, as well as Windows XP, Vista, and Windows 8, because they are still supported for some business clients, and for some Windows Server versions. The updates just won’t be available to regular folks.

Remove those annoying Windows 10 upgrade prompts

If you run Windows 7 or 8.x, you’ve probably seen for yourself the many ways in which Microsoft is trying to get people to upgrade to Windows 10, or at least to add unwanted Windows 10 features to your O/S. I wrote about my own experiences with this back in October. Here are a few observed examples:

  • ‘Get Windows 10’ icon in the notification area.
  • Windows Update installs tracking features from Windows 10.
  • Windows Update shows messages and special highlights encouraging users to upgrade.
  • Windows 10 installation files are downloaded to your hard drive.
  • Windows 10 upgrade runs without your approval.
  • Windows Update stops letting you install updates, and only lets you upgrade to Windows 10.

If you’re like me, you plan to upgrade to Windows 10 when you bloody well feel like it, and not when Microsoft decides you should. And, like me, you’re looking for ways to prevent all this annoying behaviour on your Windows 7 or 8.x computer.

One of the more annoying features of the ‘Get Windows 10’ icon is that even if you remove it (using instructions I posted earlier) it typically reappears for no apparent reason. This makes it seem more like a virus than anything helpful.

Microsoft’s own instructions for removing the ‘Get Windows 10’ icon, published only grudgingly after many user complaints, are poorly written and needlessly complicated. But rather than try to present a simpler guide here, I will instead point to a small utility that does all the work for you: GWX Control Panel, available as freeware from Ultimate Outsider.

GWX Control Panel
GWX Control Panel

GWX Control Panel shows the status of the ‘Get Windows 10’ app, whether Windows Update O/S upgrades are enabled, and whether there are any Windows 10 installation files on your computer. Buttons let you disable ‘Get Windows 10’, disable O/S upgrades in Windows Update, and clear the Windows 10 download folders (which, by the way, are typically huge). It’s totally safe and simple to use.

Sadly, Windows 10 will start appearing as a ‘Recommended’ update in Windows Update on Windows 7 and 8.x computers at some point in 2016. Hopefully the update will be clearly labeled and easy to ignore and/or hide.

How-To Geek has additional information.

Windows 10 Insider Preview Build 11082

It could be argued that it’s unfair to talk about problems with Windows 10 preview builds, since they are provided to us for testing purposes and expected to have issues. I hold the opposite view: everyone is better off if we report problems as publicly as possible. But I’ll try to stick to the facts and avoid complaining.

With the arrival of Windows 10 Insider Preview Build 11082, my test PC started doing some very weird things. The extent to which these problems are specific to my hardware remains unclear.

  • On logging in for the first time after the new build was installed, Windows reported that the application CCleaner was not compatible with the new Windows build, and had been removed. CCleaner (formerly CrapCleaner) is primarily a tool for removing junk and temporary files from Windows systems. The message pointed to this page, which says “If you try to use this app with Windows Insider Preview , it might not work correctly or might not work at all.” Not too helpful. I reported the problem to the CCleaner developers.
  • Normally, when File Explorer copies, moves, or deletes files, it displays a progress dialog. Those dialogs no longer appear. File operations still work, but there’s no visual indication of what’s going on.
  • Audio stopped working completely. A reboot didn’t help. Powering off the computer completely and then back on did fix the problem. There was nothing in the Windows events logs to point to a possible cause.

None of these issues are show-stoppers for me. I used the Windows 10 Feedback app to report the File Explorer dialog problem.

This is the first Windows 10 preview build with which I’ve had any serious problems, aside from privacy concerns. It will be interesting to see how quickly Microsoft responds.

Update 2015Dec21: The CCleaner developer responded to my report, saying that they have received similar reports and that they are looking into it.

Patch Tuesday for December 2015

Another month, another pile o’ patches from Microsoft and Adobe. This month Microsoft is pushing out twelve updates, affecting 71 vulnerabilities in Windows, Internet Explorer, Edge, Office, .NET and Silverlight. Eight of the updates are flagged as Critical.

Microsoft has also published a few security advisories since the last monthly update.

Adobe’s chimed in this month with a new Flash (aside: how weird would it be if they didn’t?) The new version addresses at least 78 security vulnerabilities in the veritable piece of swiss cheese we know as the Flash player. The new version is designated 20.0.0.228 on most platforms, but the version designed for use in Firefox and Safari on Windows and Mac is 20.0.0.235.

Security and privacy roundup for November 2015

PCs from Dell were found to include support software and related security certificates that potentially expose users to various threats. Dell moved quickly to provide fixes, but many systems remain vulnerable. As if we needed more convincing, this is yet another reason to remove manufacturer-installed software from new PCs as soon as possible after purchase.

A hacking tool called KeeFarce looks for KeePass password databases, attempts to decrypt the stored passwords, and makes the decrypted passwords available to intruders. For this to work, the target computer must already be compromised, and the KeePass database left unlocked. According to researchers, the technique could be used on any password management software. Please, if you use password management software, remember to leave it locked, even if you’re the only user. Why make things any easier for intruders?

Anti-adblocking service provider PageFair was hacked on Halloween, and for a couple of hours, visitors to about 500 web sites were shown fake Flash update warnings that actually installed malware. PageFair fixed the problem relatively quickly and apologized for the breach.

The web site for the popular vBulletin forum software was hacked and user account information stolen. Site admins reset all user passwords and warned users, but have yet to address claims that the attackers used a long-standing vulnerability in the vBulletin software itself to achieve the intrusion. If true, anyone who manages a vBulletin site should immediately install the patch, which was made available after the vBulletin site hack.

With all the furor over Windows 10’s privacy issues, it’s important to recognize that modern phones have all the same issues. Anyone who uses a smartphone has observed that most apps ask for access to private information when they are installed. Generally, user choices are limited to agreeing or cancelling installation. A new study looks at popular iOS and Android apps, the user information they collect, and where they send it. The results are about as expected, and the authors conclude, “The results of this study point out that the current permissions systems on iOS and Android are limited in how comprehensively they inform users about the degree of data sharing that occurs.” No kidding.

A nasty new type of Android malware has been discovered. Researchers say that the perpetrators download legitimate Android apps, repackage them with malware, then make the apps available on third-party sites. Once installed, the infected apps allow the malware to install itself with root access. So far, the malware only seems to be used to display ads, but with root access, there’s no limit to the potential damage. Worse still, it’s extremely difficult to remove the malware, and in many cases it’s easier to simply buy a new phone.

Ransomware was in the news a lot in November. SANS reported seeing a malware spam campaign that impersonates domain registrars, tricking recipients into clicking email links that install the ransomware Cryptowall. Ars Technica reports on changes in the latest version of Cryptowall, and a new ransomware player called Chimera. Brian Krebs reports on new ransomware that targets and encrypts web sites. Luckily, the encryption applied by that particular ransomware is relatively easy to reverse.

Several web sites and services were hit with Distributed Denial of Service (DDoS) attacks in November. In some cases, the attackers demanded ransom money to stop the attack. ProtonMail, provider of end-to-end encrypted email services (and used by yours truly) was hit, and the attacks didn’t stop even when the ransom was paid.

Security certificates generated using the SHA1 algorithm are nearing the end of their usefulness. Plans are already underway to stop providing them and stop supporting them in web browsers and other software. SHA1 is being phased out in favour of the much more secure SHA2 algorithm.

A rash of vulnerabilities in popular WordPress plugins, including the excellent BPS Security plugin, came to light in November. WordPress site operators are strongly encouraged to either enable auto-updates or configure their sites to send alerts when new plugin versions are detected.

An app called InstaAgent was pulled from the Apple and Google app stores when it was discovered that the app was transmitting Instagram userids and passwords to a server controlled by the app’s developer. It’s not clear how the app managed to get past the quality controls in place for both stores.

Security researchers discovered a bizarre new form of privacy invasion that uses inaudible sound – generated by advertisements on TV and in browsers – to track user behaviour. As weird as it seems, this technology is allowing true Cross Device Tracking (CDT).

On a brighter note, Google is now detecting web sites that appear to use social engineering techniques to trick users. Chrome’s Safe Browsing feature will now show a warning when you are about to visit a page Google thinks is using these devious methods.

The whole-disk encryption technology TrueCrypt was previously reported as vulnerable, and a new study has confirmed those vulnerabilities. The study also found that if TrueCrypt is used on unmounted drives, it is perfectly secure, but what use is a hard disk if it isn’t connected to anything? TrueCrypt users are still anxiously awaiting new encryption technologies like VeraCrypt.

Security researchers discovered a critical flaw in many Virtual Private Network (VPN) services. VPN software and services are used by many torrent users to protect their identity. The flaw allows a malicious person to obtain the true IP address of a VPN user.

The Readers Digest web site was infected with a variant of the Angler malware and proceeded to infect unpatched visitor computers for about a week before site operators took action. Thousands of Windows computers may have been infected before the site was finally cleaned up.

Windows 10 miscellany

Ed Bott noticed that the latest release of Windows 10 (1511) was mysteriously removed from availability via the Media Creation Tool. The new version can still be obtained through Windows Update. Microsoft’s explanation isn’t very helpful, and it’s rather annoying to system builders who missed the brief window during which release 1511 was available via MCT. Update #1: Ars Technica reports on the situation, noting that there are reports of serious problems with release 1511 when installed via the MCT. Update #2: Ars Technica confirms that upgrading via MCT was causing privacy settings to be reset to defaults. The problem has been fixed, and build 1511 is once again available via MCT.

Meanwhile, Microsoft apparently updated its privacy policy in response to concerns about information gathered and transmitted by Windows 10. Changes to the policy make it clear that Microsoft will only provide law enforcement access to your data on their servers, not data stored locally on your computer. Encryption keys are backed up to Microsoft servers, but Microsoft will not use them to decrypt disks or files on your computer. The collection of telemetry data cannot be disabled, but it can be limited so that only very basic data is collected, and none of it personal.

And finally, Microsoft has relented somewhat on its Windows 10 activation policy, allowing for legitimate installs using old, unused activation keys from Windows 7 or 8.

Microsoft to start pushing Windows 10 on business customers

Microsoft is turning its sights on businesses and other large customers, making changes to Windows 10 that it hopes will entice IT departments to try the new O/S.

With the arrival of build 10586, Windows Update for Business is now ready for use in Windows 10. This is bound to be helpful for business users, since it allows updates to be delayed, but there’s still no way to avoid updates indefinitely. Microsoft is still promising to provide better information about updates, but as yet that hasn’t actually happened.

There’s also now a business-oriented version of the Windows Store. Most importantly, there are options for disabling telemetry and other data sent to Microsoft from Windows 10 computers. Hopefully that change will find its way to regular Windows 10 versions as well.

It’s far too early to decide whether these changes will have any influence over business and corporate decision makers. I certainly wouldn’t recommend Windows 10 for use in business or educational environments; there are simply too many unresolved issues related to privacy, updates, and the user interface.

Ars Technica has additional details.