Архив метки: Powershell

Новое крупное обновление для Windows 10 получит название October 2018 Update » Community

Автор: | 12.07.2018

По всей видимости, компания Microsoft определилась с официальным названием для следующего крупного обновления для Windows 10, разрабатываемого под кодовым названием Redstone 5. В свежей инсайдерской сборке системы энтузиастам удалось обнаружить первые упоминания названия October 2018 Update и версию 1809 в отчёте команды Get-VMHostSupportedVersion в PowerShell. Впрочем, ничего удивительного здесь нет, учитывая выбор названия April 2018… Читать далее »

Доступно новое накопительное обновление для Windows 10 April 2018 Update (17134.165) » Community

Автор: | 11.07.2018

Сегодня компания Microsoft выпустила новое накопительное обновление для Windows 10 April 2018 Update. Как и прежде, обновление не несёт в себе никаких новых функций, а направлено лишь на исправление ошибок и закрытие обнаруженных дыр в безопасности. Обновление распространяется под кодом KB4338819 и изменит номер сборки системы на 17134.165. Улучшена способность семейства функций Universal CRT Ctype… Читать далее »

This new dual-platform malware targets both Windows and Linux systems

Автор: | 09.07.2018

One of the oft-repeated reasons for using alternative operating systems is the suggestion that alternatives to Windows are more secure because malware is not produced for these minority systems—in effect, an argument in favor of security by minority. For a variety of reasons, this is a misguided notion. The proliferation of web-based attacks—which are inherently… Читать далее »

Let automation take away the tedium

Автор: | 02.07.2018

Computer Weekly looks at how far the suppliers of systems management tools and associated products have progressed with automation Share this item with your network: The degree to which information technology increases automation, often now aided by machine learning and artificial intelligence (AI), is high on the list of benefits put forward by IT suppliers… Читать далее »

Amazon vs Azure vs Google vs IBM Softlayer

Автор: | 30.06.2018

Computer Weekly looks at the biggest four cloud storage providers, how they stand in the market, the products they offer, and who offers the widest range of products and features Share this item with your network: Storage is key to cloud operations, but offerings differ between the main players in the market. «; } });… Читать далее »

5 new cyberthreats pop up every second, here’s how to protect yourself

Автор: | 27.06.2018

The start of 2018 has seen a massive rise in cryptocurrency mining and cryptojacking attacks, along with steady numbers of familiar malware and ransomware attacks, according to a Wednesday report from McAfee. On average, five new threat samples arose every second of Q1 2018, with several notable campaigns demonstrating just how sophisticated hackers have become.… Читать далее »

Cyber criminals ‘infect and collect’ in cryptojacking surge

Автор: | 27.06.2018

The first quarter of 2018 was dominated by growth in illicit cryptocurrency mining, known as cryptojacking, according to the latest cyber threats report from security firm McAfee. Researchers saw an average of five new threat samples every second in the first three months of the year and notable campaigns demonstrating a deliberate drive to technically… Читать далее »

How to make file sharing easy on your network with LAN-Share

Автор: | 08.06.2018

chombosan, Getty Images/iStockphoto I’m always on the lookout for ways to make my workflow more efficient. One area that always needs improving is file sharing across a LAN. Sure there’s Samba, but that requires a bit of configuration and usage that could be a bit above the paygrade of your users. So when I need… Читать далее »

Legit tools exploited in bank heists

Автор: | 22.05.2018

Common IT administration tools are being hijacked to act as invisibility cloaks for cyber criminals targeting financial institutions, according to a report by security firm Carbon Black. The report is based on a survey of CISOs at 40 financial institutions and notes that cyber attacks against financial institutions are most often conducted for the purpose… Читать далее »

Top 5: Things to know about fileless attacks

Автор: | 26.04.2018

Securing your company does mean stopping malware. But in the ever evolving security war, bad actors are turning to what are called fileless attacks that don’t require a payload or tricking someone into installing them. Easy for the bad people, but harder for you. Here are five things to know about fileless attacks: 1. They… Читать далее »