user permissions

Winsage
December 17, 2024
Linux is generally considered to offer superior security compared to Windows, with the author having experienced only one significant security incident in nearly three decades of use. 1. Windows 10 includes Windows Defender as a default firewall, while many Linux distributions, such as Ubuntu and Fedora, do not have their firewalls enabled by default. Linux firewalls allow for detailed configurations, although default settings are often sufficient for most users. 2. In Windows, administrative tasks can often be performed with a simple confirmation, whereas Linux requires users to enter their password for administrative actions using the sudo command, enhancing security. 3. Windows 10 has limited user-configurable permissions, while Linux provides comprehensive control over file and folder permissions through both command line and GUI options, contributing to its enhanced security reputation. 4. Antivirus and antimalware solutions are essential for Windows users to protect against threats, while Linux does not require such software due to its design prioritizing user permissions and advanced security measures. 5. Linux responds rapidly to vulnerabilities, often releasing patches within hours, unlike Windows, which may take weeks to address vulnerabilities and follows a Patch Tuesday schedule for updates.
Winsage
December 2, 2024
Microsoft has reintroduced its AI Recall technology for Copilot Plus-powered computers, currently in testing and available to select users via the Windows 11 Insider Preview Build 26120.2415 (KB5046723) in the Dev Channel. The technology is limited to devices with Qualcomm Snapdragon chipsets, with plans for broader compatibility with AMD and Intel systems. Microsoft has implemented a stricter privacy framework requiring user permissions for data access and ensuring that snapshots are stored locally. The US Department of Justice (DOJ) and Google presented closing arguments in an antitrust case concerning the advertising market in a Virginia court. DOJ attorney Aaron Teitelbaum accused Google of manipulating ad auctions and monopolistic control, while Google's attorney Karen Dunn argued the DOJ had not proven its claims. The case could lead to significant changes in Google's business structure. Evolv Technology reached a settlement with the Federal Trade Commission (FTC) over misleading claims about its AI scanners' effectiveness in detecting weapons. Evolv is now prohibited from making unsupported claims about its products following investigations that questioned the technology's real-world performance.
Tech Optimizer
November 29, 2024
Cybersecurity researchers Tal Peleg and Coby Abrams from Varonis have identified a significant security vulnerability in PostgreSQL, designated as CVE-2024-10979, which has a CVSS severity score of 8.8. This vulnerability affects all PostgreSQL versions prior to 17.1, 16.5, 15.9, 14.14, 13.17, and 12.21. It allows unprivileged users to manipulate environment variables within the PostgreSQL PL/Perl extension, potentially enabling arbitrary code execution. PostgreSQL's advisory states that this flaw can lead to data theft or system takeover by altering sensitive process environment variables. Users are advised to update to the fixed versions and implement restrictions on allowed extensions and user permissions to mitigate the risk.
Winsage
November 22, 2024
Users without administrative privileges in Windows 11 24H2 are unable to change the time zone settings in the Date & Time screen of Windows Settings, as the option does not appear for them. This issue can disrupt schedules for users who travel or work across different time zones. Microsoft has confirmed that the glitch is limited to the Date & Time screen and is not due to user permissions. Workarounds include accessing the time zone settings through the Control Panel or the Run dialog box. Microsoft is investigating the issue and plans to provide a resolution in a future update.
Winsage
November 20, 2024
In Windows 11 version 24H2, users without administrative privileges are unable to change time zone settings through the Date & Time view in the Settings app due to a bug. Microsoft is addressing this issue, which is not related to user permissions. A workaround is available via the Control Panel or by using the Run dialog with "timedate.cpl" to change time zone settings. This situation highlights the ongoing relevance of the Control Panel amid discussions about the separation of settings between it and the Settings app.
Winsage
November 12, 2024
Microsoft's November 2024 Patch Tuesday update addressed 89 new security vulnerabilities. Two vulnerabilities, CVE-2024-43451 and CVE-2024-49039, are actively exploited. CVE-2024-43451 allows attackers to elevate privileges by exposing the user's NTLMv2 hash, while CVE-2024-49039 enables privilege escalation through an AppContainer escape in the Windows Task Scheduler. Other notable vulnerabilities include CVE-2024-43639, which allows unauthenticated remote code execution via a Kerberos weakness; CVE-2024-5535, a flaw in OpenSSL affecting Microsoft Defender for Endpoint; CVE-2024-49019, an elevation of privilege vulnerability in Active Directory Certificate Services; CVE-2024-49040, a spoofing vulnerability in Microsoft Exchange Server; CVE-2024-43498, a remote code execution flaw in .NET and Visual Studio; and CVE-2024-43602, a remote code execution vulnerability in Azure CycleCloud.
AppWizard
September 18, 2024
A recent investigation by Cybernews analyzed 50 widely-used Android applications, revealing that the MyJio app requests the most permissions at 29, followed by WhatsApp with 26, Google Messages and WhatsApp Business with 23 each, and Facebook and Instagram with 22 and 19 permissions, respectively. In contrast, gaming apps like Among Us require no permissions, while Candy Crush Saga and 8 Ball Pool ask for only 1 or 2. Communication apps average nearly 19 permissions, social apps 17.2, and shopping apps like AliExpress average 13.4. A total of 40 apps request permission to write files, and 34 seek to read from external storage. Camera and audio recording permissions are requested by 33 apps, while 27 apps seek the "Get accounts" permission. Additionally, 26 apps track users' precise locations, and the same number request access to read contacts. Lastly, 22 apps request permission to read the phone state.
Search