|
fishmech posted:Sasser could infect an unpatched XP PC that was behind a NAT router easily. Uhh, assuming that the router isn't forwarding any ports, as tends to be the default, how exactly is an unsolicited TCP or UDP packet (Sasser was one of those single UDP packet exploits, right?) going to reach the computer?
|
# ¿ Jun 9, 2009 00:35 |
|
|
# ¿ Apr 23, 2024 17:26 |
|
imnotzig posted:Sorry if this has been asked before: Is there a way to disable combining windows on the taskbar, but still hide labels? If have the taskbar on the side of the screen (instead of the top or bottom) and have combine turned off, it will use the icons but not the text labels.
|
# ¿ Jun 27, 2009 04:04 |
|
I guess people want something to read while installing their two copies of Windows 7?
|
# ¿ Jul 1, 2009 20:29 |
|
Does anyone have the hashes for the x64 pro edition? I don't really trust the MSDNAA downloader.
|
# ¿ Sep 3, 2009 08:22 |
|
Is there an application or anything that will give me "hide labels, don't combine" type behaviour for the taskbar? Or allow me to restore the group with a single or double click or something? EDIT: Aside from putting the taskbar on the side, since I'd like to try it on the bottom again. big shtick energy fucked around with this message at 22:37 on Sep 19, 2009 |
# ¿ Sep 19, 2009 22:34 |
|
Xenomorph posted:You really prefer things without UAC? That means the most destructive malware and most retardedly written applications can happily destroy anything they want in your OS. Windows was actually designed to let this happen before, and only Linux and Mac OS X actually tried to prevent it. Windows has an absolute lovely security record. UAC is a great step to improve security. It puts Windows security back up at a Linux and Mac OS X level. Yeah except the part where they neutered the security aspects of UAC in Windows 7.
|
# ¿ Sep 21, 2009 05:22 |
|
fishmech posted:They didn't neuter it, that's just slashdot stupidity. http://www.pretentiousname.com/misc/win7_uac_whitelist2.html quote:Win 7 UAC Code-Injection: How it works quote:The underlying problem is that the silent elevation feature, enabled by default in Windows 7 beta, does not check where the code requesting elevation comes from. It checks which process it is running within but not the particular code came from. So, for example, if you inject code into Explorer, or get Explorer to load your DLL, then you can create elevated COM objects without the user's knowledge or consent. big shtick energy fucked around with this message at 09:19 on Sep 21, 2009 |
# ¿ Sep 21, 2009 09:16 |
|
echinopsis posted:What about Windows Defender? MSE replaces windows defender and should be as adequate as anything else to prevent malware infections.
|
# ¿ Oct 15, 2009 09:51 |
|
How come I can't save files to the root of a drive? I claimed ownership of the entire drive for my user account and my account definitely has full permissions for the root of the drive, but it sill doesn't work.
|
# ¿ Feb 7, 2010 00:18 |
|
rolleyes posted:I just played around with this and got it to work no problems. I opened the drive properties, clicked the security tab, clicked "advanced", clicked "change permissions", clicked "add", and added my personal user account with full control with the "Apply to:" option set to "This folder only." to avoid loving up any other permissions if anything went wrong. Weird, I did the same thing and had a "special" entry that was full control and it didn't work. I cleared everything out so that SYSTEM, Users, and my account had full control, but that didn't work either. EDIT: I even did icacls D:\ /grant Username:(F) and it it didn't change anything. big shtick energy fucked around with this message at 03:47 on Feb 7, 2010 |
# ¿ Feb 7, 2010 03:44 |
|
|
# ¿ Apr 23, 2024 17:26 |
|
Is there an easy way to unpin icons that reference something that doesn't exist? I uninstalled a program and now there's a zombie icon on my taskbar that does nothing when I right or left click on it.
|
# ¿ Feb 28, 2010 04:47 |