system tools

Winsage
January 8, 2026
The Command Palette is a feature in PowerToys for Windows 11 that allows advanced users to access applications, settings, and system tools quickly, similar to macOS Spotlight. To install it, users must install PowerToys via Command Prompt or the Microsoft Store. Configuration involves enabling the Command Palette, customizing activation shortcuts, and adjusting display settings. Users can search for applications, settings, and files, perform calculations, access clipboard history, and execute system commands. Keyboard modifiers enhance functionality, and users can create custom search shortcuts with community plugins. The Command Palette also includes a Registry browser extension for navigating the Windows Registry.
Winsage
January 1, 2026
Puppy Linux is a lightweight Linux distribution with a footprint of 500 MB to 1.5 GB, capable of running entirely in RAM and allowing users to boot from a USB drive without altering their existing OS. It offers session persistence, comes pre-installed with essential applications, and supports various package managers. It is ideal for users prioritizing performance over aesthetics. Linux Lite is based on the latest Long Term Support release of Ubuntu and features a desktop layout similar to Windows, making it user-friendly for newcomers. It includes pre-installed applications like Chrome, LibreOffice, VLC, and GIMP, and utilizes the Xfce desktop environment for customization. It is optimized for speed and resource efficiency and facilitates a smooth transition from Windows. The choice between Puppy Linux and Linux Lite depends on individual needs: Puppy Linux is suited for those wanting a lightweight, portable solution, while Linux Lite is better for users seeking a traditional OS experience.
Winsage
December 15, 2025
A pro-Russian hacktivist group, CyberVolk, has re-emerged in 2025 with a new ransomware-as-a-service (RaaS) operation called VolkLocker, which targets both Windows and Linux systems using Golang. The group utilizes Telegram bots for command-and-control operations, allowing affiliates to manage ransomware interactions. Despite its advancements, coding errors in the ransomware enable victims to recover encrypted files without paying a ransom. VolkLocker employs AES-256 encryption but has a critical flaw where the master encryption key is hard-coded and saved in plaintext, allowing easy decryption. The ransomware also ensures persistence by replicating itself and disabling essential system tools. CyberVolk offers additional RAT and keylogger add-ons for sale, with complete RaaS packages priced between [openai_gpt model="gpt-4o-mini" prompt="Summarize the content and extract only the fact described in the text bellow. The summary shall NOT include a title, introduction and conclusion. Text: A newly rebooted pro-Russian hacktivist group, CyberVolk, has made a notable comeback in 2025, unveiling a new ransomware-as-a-service (RaaS) operation dubbed VolkLocker, as detailed in recent research by SentinelOne. After a prolonged period of dormancy following extensive bans on Telegram, this group has re-emerged with a Golang-based ransomware solution that targets both Windows and Linux systems. This latest initiative signifies CyberVolk's commitment to revitalizing its operations, showcasing what analysts refer to as the “CyberVolk 2.x” generation of tools. Despite the group's advancements, their integration of sophisticated Telegram-based automation has inadvertently led to coding errors that allow victims to recover their encrypted files without the need to pay a ransom. Telegram-Fueled Automation and Functionality VolkLocker is heavily reliant on Telegram bots for its command-and-control operations, which form the core of its new RaaS model. All interactions between operators and the ransomware's ecosystem, from onboarding new customers to managing victims, are facilitated through a Telegram bot known as CyberVolk_Kbot. This bot provides various commands such as /decrypt, /list, and /status, enabling affiliates to monitor infections and communicate with compromised systems in real time. Operators tasked with creating new ransomware payloads must input several configuration details, including a Bitcoin address, Telegram bot token ID, chat ID, encryption deadline, and file extension. Decryption triggered via backed-up key file This design approach aligns with CyberVolk’s goal of simplifying deployment for affiliates with limited technical skills. The Golang-based payloads, compiled for both Linux and Windows platforms, utilize the “ms-settings” UAC bypass technique (MITRE ATT&CK T1548.002) for privilege escalation. Once operational, VolkLocker performs system reconnaissance, checks for virtual machine environments by matching MAC address prefixes, and strategically excludes key system paths from encryption. Encryption Flaws and System Destruction Features VolkLocker employs AES-256 in Galois/Counter Mode (GCM) for file encryption; however, its encryption design reveals a significant oversight. The master encryption key is hard-coded within the binary and is also saved in a plaintext file named system_backup.key located in the %TEMP% directory. This easily accessible key allows victims to decrypt their files without paying the ransom, highlighting a critical flaw in CyberVolk’s development process. In addition to its encryption capabilities, VolkLocker ensures persistence by replicating itself across multiple directories and disabling essential tools such as Task Manager, Windows Defender, and Command Prompt through registry modifications. It also deletes Volume Shadow Copies and can trigger a Blue Screen of Death (BSOD) using the Windows NtRaiseHardError() function when the countdown timer expires or when incorrect decryption keys are repeatedly entered. Despite these coding missteps, CyberVolk is expanding its offerings, providing RAT and keylogger add-ons for 0 each, along with complete RaaS packages ranging from 0 to ,200. SentinelOne researchers caution that this resurgence underscores how politically motivated groups are increasingly leveraging Telegram infrastructure to commercialize their ransomware operations. Indicators of Compromise: Windows Sample: dcd859e5b14657b733dfb0c22272b82623466321 Linux Sample: 0948e75c94046f0893844e3b891556ea48188608 Bitcoin Wallet: bc1qujgdzl0v82gh9pvmg3ftgnknl336ku26nnp0vy Telegram Bot: 8368663132:AAHBfe3xYPtg1IMynKhQy1BRzuF5UZRZspw Find this Story Interesting! Follow us on Google News, LinkedIn, and X to Get More Instant Updates" max_tokens="3500" temperature="0.3" top_p="1.0" best_of="1" presence_penalty="0.1" frequency_penalty="frequency_penalty"] and ,200. Indicators of compromise include specific Windows and Linux sample hashes, a Bitcoin wallet address, and a Telegram bot ID.
Winsage
November 26, 2025
When upgrading to Windows 11 on older hardware, users may encounter frustrating error codes and messages. To resolve upgrade issues, it is recommended to: 1. Ensure all necessary driver and firmware/BIOS updates are installed, as many users have found success after addressing these updates. 2. Check Microsoft's Windows release information dashboard for known issues related to the upgrade, as there may be temporary compatibility blocks that can be bypassed by updating or uninstalling incompatible software. 3. Restart the upgrade process after checking for pending updates, uninstalling unnecessary software, and disconnecting non-essential peripherals. Selecting "Not right now" for update downloads can help minimize complications. 4. Search for specific error codes and messages online, using reliable sources like Reddit or Microsoft for potential solutions. 5. Utilize the SetupDiag tool to analyze Windows log files for detailed reports on upgrade failures, which can help identify the causes of issues. This involves downloading the tool, creating a specific folder, and running commands in an elevated command prompt to generate a readable report.
Winsage
November 9, 2025
Windows 11 does not have a built-in feature to automatically toggle between light and dark modes, but users can achieve this functionality by installing the PowerToys app. To enable automatic switching, users must install PowerToys, open the app, navigate to System Tools, and activate the Light Switch feature. Users can choose to schedule the switch based on sunset or sunrise times or manually set a schedule. The app can also adjust color modes for the system or apps. A keyboard shortcut ("Windows key + Ctrl + Shift + D") is available for manual switching.
Winsage
October 19, 2025
Windows 11 users are experiencing unexpected fluctuations between light and dark theme modes due to a known issue with PowerToys v0.95, which inadvertently activated the 'Light Switch' feature. This feature toggles themes based on local time or a customized schedule, overriding user preferences. Microsoft acknowledged that the feature should not have been enabled by default and is working on a fix. Users can temporarily resolve the issue by disabling the Light Switch feature in PowerToys.
Winsage
September 24, 2025
A Zero Salarium specialist has developed a method called EDR-Freeze that temporarily disables antivirus processes and EDR agents on Windows systems. This technique utilizes built-in system tools and exploits race conditions between processes, specifically using MiniDumpWriteDump to suspend target processes while capturing snapshots. The method operates without third-party driver exploits and functions in user mode. The EDR-Freeze tool is available on GitHub and requires the target program's PID and a pause time in milliseconds to keep the antivirus process suspended. A demonstration showed that the Windows Defender service (MsMpEng.exe) was successfully suspended. The specialist warns to monitor WerFaultSecure for unusual boot parameters related to sensitive services and recommends implementing robust protection mechanisms to verify boot chains of protected processes.
Search