installer

Winsage
June 1, 2025
The author's PC experienced significant issues while trying to run DOOM: The Dark Ages, primarily due to problems with NVIDIA RTX graphics drivers on a system equipped with an Intel Core i7-14700K and NVIDIA RTX 5080. The Windows 11 Start Menu became unresponsive, leading to a complete system failure despite attempts to roll back and update drivers. The author used a USB drive with a Linux installer as a temporary solution but continued to face crashes. Attempts to reinstall Windows were complicated by an incorrectly formatted USB stick, which needed to be exFAT. Ultimately, the author resolved the issues by wiping both SSDs and creating fresh partitions. The author also noted the complexity and bloat of Windows 11 compared to the simplicity of ChromeOS, which has become a reliable alternative for tasks and gaming.
Winsage
May 30, 2025
The orchestrator manages updates by scheduling them based on user activity, system performance, and power availability. It supports MSIX/APPX and Win32 applications and provides custom installer support through additional executable packages. Users receive updates via Windows notifications, and a consolidated update history is available in system settings. The orchestrator aims to deliver a consistent management experience across Windows 11 products, offering centralized logs and policy enforcement for IT teams. However, enterprises with hybrid or air-gapped systems require robust support for localized deployment. The unified platform may raise compliance concerns for organizations with strict regulatory requirements, necessitating clear accountability between independent software vendors and Microsoft, along with pre-deployment validation.
Winsage
May 27, 2025
FunOS is a Linux distribution built on Ubuntu LTS, focusing on stability, performance, and security. It has an idle RAM usage of approximately 250 MB and an installer size of 1.8 GB, making it suitable for older hardware. The installation process is straightforward, taking about five minutes. FunOS features a familiar desktop layout but lacks a graphical user interface for the package manager and does not include an app store. Users can install Synaptic via the terminal for software management. FunOS is designed for users with older Windows 10 machines, aiming to extend their lifespan while prioritizing a simple and efficient user experience.
Winsage
May 27, 2025
FunOS is a lightweight operating system built on Ubuntu LTS, focusing on stability, performance, and security. It uses Joe's Window Manager, consumes approximately 250 MB of RAM when idle, and has a compact installer size of 1.8 GB. The installation process is straightforward, taking under five minutes, and features a familiar desktop layout. FunOS lacks a graphical user interface for the package manager, requiring users to utilize the command line for software management, although Synaptic can be installed for easier application installations. New applications require a menu reload to appear. FunOS is suitable for aging Windows 10 machines, providing a reliable and efficient computing experience.
Winsage
May 19, 2025
Computers have a finite lifespan, and companies like Microsoft withdraw support for older devices to focus on newer models, a practice known as planned obsolescence. Microsoft is discontinuing support for the Windows 10 operating system, which means users will no longer receive security updates or technical assistance. Google has developed ChromeOS Flex, an operating system that can be installed on older Windows 10 devices, providing essential security features and updates. ChromeOS Flex offers rapid boot times and automatic updates and is compatible with a range of hardware from major manufacturers. Users must verify their device against an approved list and meet specific installation requirements, including having a 64-bit processor, at least 4 GB of RAM, and 16 GB of storage. An empty USB drive of at least 8 GB is needed to create the bootable installer for the installation process.
AppWizard
May 14, 2025
Since April 2024, the threat actor Marbled Dust has been exploiting a zero-day vulnerability (CVE-2025-27920) in the Output Messenger chat application, targeting user accounts that have not applied necessary fixes. This exploitation has resulted in the collection of sensitive data from users in Iraq, specifically linked to the Kurdish military. Microsoft has high confidence in this assessment and notes that Marbled Dust conducts reconnaissance to identify potential targets using Output Messenger. Marbled Dust has successfully utilized this vulnerability to deploy malicious files and exfiltrate data. Microsoft notified the application’s developer, Srimax, about the vulnerability, leading to the release of a software update. A second vulnerability (CVE-2025-27921) was also found, but no exploitation of this second flaw has been observed. The zero-day vulnerability allows an authenticated user to upload malicious files to the server's startup directory. Marbled Dust has exploited this flaw to place a backdoor file, OMServerService.vbs, in the startup folder, enabling them to access communications and sensitive data indiscriminately. The attack chain begins with Marbled Dust gaining access to the Output Messenger Server Manager, likely through DNS hijacking or other credential interception techniques. Once inside, they exploit the vulnerability to drop malicious files, including a GoLang backdoor, which connects to a Marbled Dust command-and-control domain for data exfiltration. To mitigate this threat, Microsoft recommends updating to the latest version of Output Messenger, activating various security protections, and implementing rigorous vulnerability management strategies. Microsoft Defender XDR customers can identify potential threat activity through specific alerts related to Marbled Dust and utilize advanced hunting queries for detection. Indicators of compromise include traffic to the domain api.wordinfos[.]com, associated with Marbled Dust activities.
AppWizard
May 13, 2025
Microsoft reported that Turkish espionage operatives have been exploiting a zero-day vulnerability (CVE-2025-27920) in the Output Messenger app to gather intelligence on the Kurdish military in Iraq. This operation, attributed to the group Marbled Dust, began in April 2024. The vulnerability is a directory traversal flaw in version 2.0.62 of the app, and many users have not yet updated to the patched version released in December. Marbled Dust has used this flaw to access sensitive user data and deploy malicious files within the Output Messenger server. The group has a history of targeting entities opposing Turkish interests and has evolved its tactics by leveraging this vulnerability for unauthorized access. Srimax and Microsoft are advising users to upgrade to version V2.0.63 to mitigate the risks associated with the exploit.
Search