Hoffman Amplifiers Tube Amplifier Forum
Other Stuff => Other Topics => Topic started by: shooter on March 05, 2020, 12:30:20 pm
-
My tablet started dogging bad, looked n found Microsoft was using a virtual mini port WiFi, I disabled it and now I'm flying like a kid down a hill :laugh:
My question, It offers me option to un-install, that's where I'm unsure :dontknow:
thanks
dave
-
I would be satisfied with just disabling it. You do know there has to be some real hardware for that wifi.
-
Yup and MFsoft is stealing up to a gig WITHOUT paying!!!!
ya my actual wifi hardware all works fine and my speeds are good
-
if you had to disable it, then you don't need it - uninstall it. a future update could revert to default settings (enabled).
ROT - unused applications should be uninstalled, hackers use security holes in applications to compromise systems. e.g., if the code isn't there it can't be hacked.
--pete
-
Thanks Pete, that's what I was thinking especially since it's Win7 and there shouldn't BE any updates, changing all passwords next :icon_biggrin:
-
Thanks Pete, that's what I was thinking especially since it's Win7 and there shouldn't BE any updates, changing all passwords next :icon_biggrin:
Watch out for that keystroke logger :l2:
-
one of my 1st hacks of a CT system used the keystrokes to figure out which Tech logged in, then compare to a birthday list I stored, IF = then a ascii character Bday cake popped up :icon_biggrin:
-
Quit Windows in something like 2010 when I discovered Linux. Had to buy a windows computer for Karaoke last November. I'm only now waiting for the time to debug an audio problem with this latest computer and then I'm going back to Linux. Once I started using Win-10 about a month ago, all the old moth eaten code techniques, constant updates of 10's of megs, same old bullshit with a new gloss of paint on it. XP was likely the best all time version; NT with a better GUI.
Gates should be stripped of all his ill gotten gains and sentenced to a term of fixing the POS until it performs as well as Ubuntu 15; Winders banned from use in the commercial domain. Relegated to the realm of Kalico Vision toys.
Interesting aside- Gates sponsored a pandemic virus simulation I believe it was October. Based in NY. Something 201.
silverfox.
-
all the old moth eaten code techniques
:laugh:
I've been doing MS since DOS 3 :cussing:
might have to look at Linux again, GE used it on their MRI's, wasn't bad, I just had to adapt :BangHead:
whatever I do next will probably have a VPN just to help mitigate the hoards trying their dam_dest to monetize me :cussing:
-
The other side of the coin on Linux certainly is, if you have to get under the hood it is very complex and counter intuitive. It's almost as if the programmers created their own mystic clan speak. Many of the command names bear no resemblance to the actual function, creating a natural cognitive dissonance in the thought process. For example: grep Command: grep command (https://www.tecmint.com/12-practical-examples-of-linux-grep-command/) searches for a specified pattern in a file (or files) and displays in output lines containing that pattern.
How about just calling it: patfind; Oh, then anyone could understand the relationship. And now although I've tried to change the font color after the copied line from a web page command example, it won't take.
On the other hand, since Linux is a privileges based operating system, it is very hard to insert a virus program that gains root access to the operating system for the purpose of modifying it. Damit I still can't change the font color back to black.
Now having said all that, the first instance of a virus attack was in fact perpetrated using a Unix operating system. Most notable for me was around late 80's when the first large scale attack on Unix systems was seen. Rather simple in construct it took advantage of the back door password in Unix systems that was meant to allow engineers into the system if there was a lock out. The script simply knocked on the door as administrator using the password: debug. Once inside the system the code searched for other networked systems that it propagated to. In less than 24 hours there was a huge number of systems infected.
silverfox.
-
if you have to get under the hood
ya, I've had to look and work under there!!
a software upgrade on a GE was an 11 page 11hr nightmare of unintuitive Tibetan chants :icon_biggrin:
I finally figured out how to do 1 clean upgrade, mirror it to a backup, use the backup to propagate it to my other systems and just change names to protect the innocent :icon_biggrin: