modified version

Winsage
December 30, 2025
The transition to Windows 11 is significant due to new features, enhanced security, and improved performance. Users with unsupported CPUs may face challenges when upgrading, including installation warnings, potential performance issues, lack of Microsoft support, and possible bugs. Preparations for installation include backing up files, creating a system image, and disconnecting unnecessary devices. Four methods to install Windows 11 on unsupported CPUs are: 1. 4DDiG Partition Manager: This tool bypasses checks for TPM 2.0, CPU, and Secure Boot. 2. Registry Editor: Modify settings to skip hardware checks by creating a DWORD value named “AllowUpgradesWithUnsupportedTPMOrCPU” and setting it to “1”. 3. Rufus: Create a modified Windows 11 USB installer that bypasses checks for TPM, Secure Boot, RAM, and CPU. 4. Replace appraiserres.dll File: Swap the appraiserres.dll file in the installation media with a modified version to bypass hardware checks.
Winsage
December 27, 2025
Microsoft is facing significant user criticism regarding Windows 11, particularly due to its emphasis on artificial intelligence features, which many users find unnecessary and detrimental to performance. Complaints include sluggish interfaces, increased resource consumption, and a cluttered user experience, leading to calls for a more streamlined version that prioritizes speed, reliability, and efficiency. Users have reported issues such as slow file explorers and excessive RAM usage, often linking these problems to AI-driven functionalities. Community-driven alternatives like Tiny11 have emerged, focusing on eliminating bloatware and AI features to enhance efficiency, especially on older hardware. Microsoft has acknowledged user concerns and promised improvements, but the integration of AI tools continues to dominate updates. The company is also reconsidering its strategy in response to backlash, including relaxing system requirements for certain versions of Windows. However, there remains a strong demand for a lightweight version that balances innovation with core functionalities, as users express frustration over imposed features and a lack of choice.
Winsage
December 18, 2025
A newly identified cyber threat cluster called LongNosedGoblin has been linked to cyber espionage attacks targeting governmental entities in Southeast Asia and Japan, with activities traced back to at least September 2023. The group uses Group Policy to spread malware and employs cloud services like Microsoft OneDrive and Google Drive for command and control. Key tools include NosyHistorian, NosyDoor, NosyStealer, NosyDownloader, and NosyLogger, which perform functions such as collecting browser history, executing commands, and logging keystrokes. ESET first detected LongNosedGoblin's activities in February 2024, identifying malware on a governmental system. The attacks showed a targeted approach, with specific tools affecting select victims. Additionally, a variant of NosyDoor was found targeting an organization in an EU country, indicating a possible connection to other China-aligned threat groups.
Tech Optimizer
November 15, 2025
A new malware called RONINGLOADER specifically targets Chinese users and can disable security tools. It operates as a multi-stage loader that spreads a modified version of gh0st RAT and bypasses antivirus protections. RONINGLOADER infiltrates systems through fake software installers that mimic legitimate applications like Google Chrome and Microsoft Teams. Once inside, it disables Windows Defender and Chinese security solutions such as Qihoo 360 Total Security and Huorong. The malware uses a signed driver that appears legitimate to Windows but is designed to terminate security processes. If one method of disabling security fails, RONINGLOADER has multiple fallback strategies. The Dragon Breath APT group is behind this campaign, having refined their techniques based on previous operations. The infection begins with a trojanized NSIS installer that drops components onto the victim's system. One installer deploys genuine software, while the other initiates the attack chain. RONINGLOADER creates a directory at C:Program FilesSnieoatwtregoable and deposits two files: Snieoatwtregoable.dll and an encrypted file named tp.png. The DLL decrypts tp.png using XOR encryption and a rotation operation, then loads new system libraries to eliminate security hooks. It elevates privileges using the runas command and scans for active security software, specifically targeting Microsoft Defender, Kingsoft Internet Security, Tencent PC Manager, and Qihoo 360 Total Security. To terminate these processes, it uses a signed driver named ollama.sys, which is digitally signed by Kunming Wuqi E-commerce Co., Ltd. This driver can terminate processes using kernel-level APIs that standard security tools cannot intercept. Additionally, RONINGLOADER blocks network connections for Qihoo 360 before injecting code into the Volume Shadow Copy service process, utilizing Windows thread pools with file write triggers to evade detection.
Tech Optimizer
November 13, 2025
Cybersecurity researchers at AhnLab Security Intelligence Center (ASEC) have discovered an attack campaign that uses legitimate Remote Monitoring and Management (RMM) tools, specifically LogMeIn Resolve and PDQ Connect, to deploy backdoor malware on users' systems. Attackers lure victims to fake download sites that mimic legitimate software pages for utilities like Notepad++, 7-Zip, and VLC Media Player, delivering modified versions of LogMeIn Resolve. The malicious installers are disguised with filenames such as "notepad++.exe" and "chatgpt.exe." Once executed, these files install the RMM tool and additional malware capable of stealing sensitive information. ASEC has identified three CompanyId values associated with the attacks: 8347338797131280000, 1995653637248070000, and 4586548334491120000. The malware, known as PatoRAT, is a Delphi-developed backdoor that gathers system information and has extensive malicious capabilities, including keylogging and remote desktop access. Users are advised to download software only from official websites and verify digital signatures, while organizations should monitor for unauthorized RMM installations and the identified indicators of compromise.
Winsage
October 19, 2025
The Discover feed on the Widgets board in Windows 11 is being redesigned with rounded corners, multiple dashboards, and curated stories powered by Copilot. Users can customize or disable their Discover feed. This update will be part of the Windows 11 25H2 update. Widgets originated from Windows Vista's Gadgets in 2007, which included mini-apps like weather updates and calendars. Windows 11 reintroduced Widgets as a standalone feature in October 2021, though it has not been as popular as Gadgets. Copilot Discover, announced in June, aims to summarize content from trusted MSN publishers and is currently being tested in Insider builds. The new Widgets board will support multiple dashboards and feature a left-side navigation bar. User feedback on Widgets is mixed, with some finding the design outdated and cluttered. The effectiveness of the Copilot-curated widget will depend on the quality of news selected for users. The rollout of the new features will occur server-side and through updates to the Copilot app, with personalization options available in the Widgets settings.
Winsage
October 14, 2025
Microsoft has officially ceased support for Windows 10, which was launched in 2015. Users with compatible hardware may transition to Windows 11, while those with incompatible devices can use ChromeOS Flex, a modified version of ChromeOS that enhances older hardware. ChromeOS Flex, developed by Neverware and rebranded after Google’s acquisition in 2020, allows users to extend the lifespan of their devices by several years and offers robust security against viruses. Transitioning to ChromeOS Flex involves backing up files, checking device compatibility, installing the Chromebook Recovery Utility, and following instructions to install ChromeOS Flex from a USB drive.
Search