Overnight, interest in the so-called KRACK attack (“Key Reinstallation attack”) hit fever proportions. The details just hit. You can read the disclosu
[See the full post at: KRACK attach – bad, but the sky isn’t falling]
![]() |
Patch reliability is unclear. Unless you have an immediate, pressing need to install a specific patch, don't do it. |
SIGN IN | Not a member? | REGISTER | PLUS MEMBERSHIP |
-
KRACK attach – bad, but the sky isn’t falling
Home » Forums » Newsletter and Homepage topics » KRACK attach – bad, but the sky isn’t falling
- This topic has 50 replies, 12 voices, and was last updated 7 years, 7 months ago by
anonymous.
AuthorTopicViewing 18 reply threadsAuthorReplies-
anonymous
GuestOctober 16, 2017 at 7:31 am #138079Would hiding the SSID broadcast for a WiFi network help with preventing attacks? I heard that suggestion last night on IRC and I was hoping that could be a viable solution until the patches for my devices get released (I have a Samsung Galaxy Grand Prime and Samsung hasn’t released any patches for it since March… thanks Samsung for looking out for my security!)
-
PKCano
ManagerOctober 16, 2017 at 7:36 am #138087Not broadcasting the SSID can help some in hiding your router from the average user. There are some side effects.
On my Netgear router, not broadcasting the SSID disables WPS (which in itself is insecure, so that may be good to some people). Another side effect is that some devices can’t cope with not seeing the SSID and may be unable to connect. I have an old (1st generation) Kindle, the one with the manual keyboard, and it has to see an SSID.
-
woody
ManagerOctober 16, 2017 at 8:06 am #138095As @PKCano says, hiding your SSID only protects you from outright amateurs. The recommendation that you hide your SSID to prevent KRACK is about as well-informed as the recommendation to update your antivirus software to protect against Stuxnet, WannaCry or Petya. It won’t do a thing, and the person who recommended it should be drawn and quartered.
Follow Kevin and Cimpanu’s recommendations – install fixes to your router(s) when they’re available – and don’t worry about it.
Oh. And tell your friends. There’s so much BS being shoveled at the moment, it’s embarrassing.
-
AlexEiffel
AskWoody_MVPOctober 16, 2017 at 12:54 pm #138176Hiding the SSID is a very bad idea. I’m mad that “experts” (not users) still recommends that. It can in fact make you less secure, as when it is hidden, Windows will periodically check for the hidden network saved and could give hints to hackers about putting a honey pot for you.
Even Microsoft recommends against it. Look at this 2008 article:
1 user thanked author for this post.
-
-
ht
AskWoody Lounger -
NetDef
AskWoody_MVPOctober 16, 2017 at 10:00 am #138119Glad sky’s not falling. If it were am I right to think that using ethernet cable from modem OR using VPN would protect?
Wired connections: protected (from this hack)
VPN: Likely protected, depending on the quality of your VPN provider and connection method.
~ Group "Weekend" ~
1 user thanked author for this post.
-
-
anonymous
GuestOctober 16, 2017 at 9:37 am #138081 -
Ascaris
AskWoody MVPOctober 16, 2017 at 9:45 am #138114Changing the password won’t help. The key that can be intercepted isn’t the one you type in when you want to associate with the network for the first time– that one can’t be discovered via the exploit. It’s a key you never see that can be discovered.
Dell XPS 13/9310, i5-1135G7/16GB, KDE Neon 6.2
XPG Xenia 15, i7-9750H/32GB & GTX1660ti, Kubuntu 24.04
Acer Swift Go 14, i5-1335U/16GB, Kubuntu 24.04 (and Win 11) -
Ascaris
AskWoody MVPOctober 16, 2017 at 10:09 am #138123DoublePulsar also reports that the issue is patchable on both the client and host side. What they don’t say is whether it needs to be patched on both to prevent the exploit, or if either side being patched would prevent it… or whether the patch needs to be in Windows or in the driver for the wifi card. In Linux, most such drivers are part of the kernel package, so updating the kernel brings all of the new drivers with it, but Windows, of course, is not like that.
Dell XPS 13/9310, i5-1135G7/16GB, KDE Neon 6.2
XPG Xenia 15, i7-9750H/32GB & GTX1660ti, Kubuntu 24.04
Acer Swift Go 14, i5-1335U/16GB, Kubuntu 24.04 (and Win 11)
-
-
NetDef
AskWoody_MVPOctober 16, 2017 at 9:58 am #138118Sky’s not falling today because there’s no script kiddy tool available yet for this hack. Consider this our advance warning – we have some time during which we should try to prepare our systems for the surge.
Sometime in the near future we will see this break out into the wild. And as speculated in my other post last night, it looks like almost everything that uses Wi-Fi will need updates. If you are an admin for a secure environment, this needs to be a priority before the actual storm hits. AP’s first then all devices on your network.
Bleeping computer has posted a nice running list of major players that have released or announced forthcoming updates, or not. Great page to check against your devices. Might want to bookmark it — they will be updating it as more patches are announced.
One sore point (from that list) is Android. Google has not yet patched, and even if they do many of us will be unable to get the patch until our carriers accept the firmware update and deliver it. For many phone models this may take months, if ever.
I’m also concerned about Intel – there are an amazing number of Wi-Fi/Bluetooth modules from them in almost all modern business class laptops.
~ Group "Weekend" ~
-
NetDef
AskWoody_MVPOctober 16, 2017 at 10:45 am #138131Verge reports that Microsoft has stated they already fixed this in a recent patch.
https://www.theverge.com/2017/10/16/16481818/wi-fi-attack-response-security-patches
If true, (details direct from MS are coming later today) then I was wrong that this might require firmware updates to Windows devices.
~ Group "Weekend" ~
-
NetDef
AskWoody_MVPOctober 16, 2017 at 12:22 pm #138161MS has released their notes on the WPA2 Krack hack.
https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2017-13080
Appears they patched this last week (October 2017 Patch Tuesday) but posted the article today in compliance with the industries disclosure schedule.
Reading this I am getting the distinct feeling that we should still install updated drivers for Wi-Fi adaptors on windows machines.
Does this security update fully address these vulnerabilities on Microsoft Platforms, or do I need to perform any additional steps to be fully protected?
The provided security updates address the reported vulnerabilities; however, when affected Windows based systems enter a connected standby mode in low power situations, the vulnerable functionality may be offloaded to installed Wi-Fi hardware. To fully address potential vulnerabilities, you are also encouraged to contact your Wi-Fi hardware vendor to obtain updated device drivers.
Fun!
~ Group "Weekend" ~
3 users thanked author for this post.
-
AlexEiffel
AskWoody_MVPOctober 16, 2017 at 1:04 pm #138179Maybe another reason to not use the connected standby mode…
On my desktop, there is a setting in the BIOS to be compliant with low power standards for saving the planet or something. I don’t remember the exact name and it is turned off by default, but it has the interesting effect of disabling any capability to automatically turn on the computer when it is off by having a trigger to get updates or receive a magic packet from the network to wake the computer, which basically is when I want it off, it is really off!
-
-
-
-
Microfix
AskWoody MVPOctober 16, 2017 at 10:50 am #138132Correct me if I’m wrong:
Insofar as PC’s and laptops are concerned, a firmware update for the wireless router AND drivers/ firmware for the wireless network card connecting to the router are needed for all devices from respective manufacturers?
If so, this could take a while, especially if there are different manufacturers involved
Smartphones, tablets, Smart TV’s, Smart meters, Sonos etc…this list is bigger than first impressions.
Windows - commercial by definition and now function... -
NetDef
AskWoody_MVPOctober 16, 2017 at 11:36 am #138138Yes both AP’s and client devices will need updates.
The list is huge. And a large number of devices will never get updates.
I’m seeing notes here and there on various forums that the access points are not really the problem (although they should be patched when possible asap) . . . it’s client devices that will be hit the worst.
I am thinking that turning WiFi off on a smartphone when you are walking/driving around might be a very good idea until you get a fix.
And as for the unknown masses of IoT devices . . . this is pretty horrible to contemplate. Such a mixed bag of unsupported things, and odd manufacturers that never provide fixes, and several I can think of that don’t even provide a method to update.
~ Group "Weekend" ~
1 user thanked author for this post.
-
Microfix
AskWoody MVP
-
-
-
MrBrian
AskWoody_MVPOctober 16, 2017 at 11:06 am #138136From How the KRACK attack destroys nearly all Wi-Fi security:
“While Windows and iOS devices are immune to one flavor of the attack, they are susceptible to others. And all major operating systems are vulnerable to at least one form of the KRACK attack. And in an addendum posted today, the researchers noted that things are worse than they appeared at the time the paper was written:”
-
MrBrian
AskWoody_MVPOctober 16, 2017 at 12:26 pm #138164Microsoft has already fixed the Wi-Fi attack vulnerability
See also the October 16, 2017 entries at https://portal.msrc.microsoft.com/en-us/security-guidance.
1 user thanked author for this post.
-
Microfix
AskWoody MVPOctober 16, 2017 at 12:42 pm #138170Aha! Do these fixes pertain to the patches that are currently on MS-Defcon 1?
i.e.
10/16/2017 Windows 8.1 for x64-based system (Security only) kb4041687
‘Security updates to Microsoft Windows Search Component, Windows kernel-mode drivers, Microsoft Graphics Component, Internet Explorer, Windows kernel, Windows Wireless Networking, Windows Storage and Filesystems, Microsoft Windows DNS, Windows Server, Microsoft JET Database Engine, and the Windows SMB Server.’
Windows - commercial by definition and now function... -
krisweir
AskWoody LoungerOctober 17, 2017 at 6:26 am #138343Yes – it does appear that the Krak attack fixes were bundled in the Windows 10 October Cumulative updates, e.g. kb4041676
So – since the Woody recommendation is currently not to apply these patches, what do we do??
Chris.
-
PKCano
ManagerOctober 17, 2017 at 6:30 am #138349Woody’s is quite aware of these circumstances, and the DEFCON number is still 1. He weighs the risks and changes the DEFCON number accordingly. The go-ahead is DEFCON 3 or above, and at the time, Woody also publishes instructions on updating – what to do and what to watch out for.
1 user thanked author for this post.
-
anonymous
GuestOctober 18, 2017 at 5:48 pm #138793For Group B users installing Monthly Security Only Updates (which I understand are NOT cumulative), if we were to forego installing any month’s security package, doesn’t it mean that our system will be inadequately patched against known security vulnerabilities ?
Microsoft doesn’t update the Monthly Security Only Updates (non-cumulative) after their initial release. I notice that their respective SHA-1 file hashes always remain identical even months later.
So for instance, if Oct 2017’s patches never reach DEFCON 3 or above, & we don’t install this Oct 2017 Security Only package, won’t our system remain vulnerable to KRACK-WPA2 in the long run ?
-
PKCano
ManagerOctober 18, 2017 at 6:03 pm #138801For Group B users installing Monthly Security Only Updates (which I understand are NOT cumulative), if we were to forego installing any month’s security package, doesn’t it mean that our system will be inadequately patched against known security vulnerabilities ?
The security-only patches are NOT cumulative. If you do not install the patch, you do not install the security fixes it contains. The system will not be patched against the vulnerabilities it corrects.
So for instance, if Oct 2017’s patches never reach DEFCON 3 or above,
The DEFCON number is an indicator of when to WAIT and when to PROCEED. It is kept at 1-2 to tell you that the problems are not known yet. Sometime before the next Patch Tuesday, Woody will feel like he knows where the pitfalls are and give the go-ahead with DEFCON 3-5. At some point, you will be able to install the update.
IF you then choose not to install the update, your computer will remain vulnerable to the security fixes contained in the update.
-
anonymous
GuestOctober 19, 2017 at 2:26 pm #138963@PKCano — Thanks for the above clarification.
1) I seem to recall that Sep 2017 patches only attained a max of DEFCON 2 here before Oct 2017’s patches arrived. This seems also the case for some other months as well. Hence the query.
Assuming Sep 2017’s patch status did reach DEFCON 3 or above, but was overwritten by the new DEFCON status for Oct 2017’s Patch Tuesday releases, perhaps the DEFCON indicator at the top of this website can be expanded for better clarity — such as showing not just the current month’s status, but also the last 1 or 2 months’ statuses.
For instance:
Oct 2017: MS-DEFCON 2
Sep 2017: MS-DEFCON 3
Aug 2017: MS-DEFCON 32) I’ve read through the Group B: Monthly Security Only update advisory (Win 7 & 8.1) several times over several months. The advisory emphasizes that the monthly security only packages must be installed in chronological order, but to date, doesn’t mention the consequences (if any) if the packages were installed in non-chronological order.
For example, what might posssibly happen if we intentionally skip (or accidentally forgot to) install, say, Sep &/or Oct 2017’s Security Only package(s), proceed to install Nov 2017’s Security Only package, & then subsequently install Sep &/or Oct 2017’s package(s) ?
Is Win OS or some programs going to become non-functional, or would the installed security packages be rendered ineffective ?
When Windows Updates were previously offered as individual “modular” patches, I understand that it wasn’t mandatory to install them by the monthly order, or even in any particular sequence — unless certain patches were prerequisites for something else.
For the current system of “rolled-up” monthly security update packages, I can’t seem to find any official MS documentation suggesting that the preceding month’s package is a prerequisite (or similar) for the current month’s package.
-
PKCano
ManagerOctober 19, 2017 at 2:43 pm #138966) I seem to recall that Sep 2017 patches only attained a max of DEFCON 2 here before Oct 2017’s patches arrived.
September patches were at DEFCON 3 on Sept 29th
Oct patches were at DEFCON 2 on the morning of Oct 10th.
Once patches have reached DEFCON 3, you can install them any time because the problems are known. In other words, DEFCON 1-2 only applies to THIS month’s patches and doesn’t stop you from installing anything from previous months.2) I’ve read through the Group B: Monthly Security Only update advisory (Win 7 & 8.1) several times over several months. The advisory emphasizes that the monthly security only packages must be installed in chronological order,
Since the Security-only patches are NOT cumulative, you can install them in any order, but it is best to do so in chronological order if you can. If you miss one, you can go ahead and install it when you can. The IE11 Cumulative Update must also be installed, and you only need the latest one since it IS cumulative.
-
MrBrian
AskWoody_MVPOctober 19, 2017 at 4:20 pm #138974“The advisory emphasizes that the monthly security only packages must be installed in chronological order, but to date, doesn’t mention the consequences (if any) if the packages were installed in non-chronological order.”
As far as I know, they can be installed in any order without any negative consequences.
-
-
-
-
-
Microfix
AskWoody MVPOctober 16, 2017 at 12:53 pm #138173Looks like Ubuntu based linux distro’s just got fixed:
wpa (2.4-0ubuntu6.2) xenial-security; urgency=medium
* SECURITY UPDATE: Multiple issues in WPA protocol
– debian/patches/2017-1/*.patch: Add patches from Debian stretch
– CVE-2017-13077, CVE-2017-13078, CVE-2017-13079, CVE-2017-13080,
CVE-2017-13081, CVE-2017-13082, CVE-2017-13086, CVE-2017-13087,
CVE-2017-13088Windows - commercial by definition and now function...1 user thanked author for this post.
-
MrBrian
AskWoody_MVPOctober 16, 2017 at 3:41 pm #138219 -
MrBrian
AskWoody_MVPOctober 17, 2017 at 5:33 am #138336From https://www.krackattacks.com/: “Finally, although an unpatched client can still connect to a patched AP, and vice versa, both the client and AP must be patched to defend against all attacks!”
2 users thanked author for this post.
-
-
Kirsty
ManagerOctober 17, 2017 at 12:16 am #138295For those with Intel AMT still enabled, this information is from Intel’s page (INTEL-SA-00101):
• Intel is targeting an updated firmware release to System Manufacturers in early November 2017 to address the identified WPA2 vulnerabilities. Please contact System Manufacturers to ascertain availability of the updated firmware for their impacted systems.
• Until the firmware update is deployed, configuring Active Management Technology in TLS Mode to encrypt manageability network traffic is considered a reasonable mitigation for remote network man-in-the-middle or eavesdropping attacks. (Details here)
AMT = Intel® Active Management Technology
1 user thanked author for this post.
-
MrBrian
AskWoody_MVPOctober 17, 2017 at 6:37 am #138351From WPA2 KRACK Vulnerability, Getting Information (my bolding): “There are 9 vulnerabilities that are client related and 1 that is AP / Infrastructure related. All are implementation issues, meaning software patching can fix them! Of the 9 CVE’s related to clients, ALL can be mitigated with AP / Infrastructure updates as a workaround, but the infrastructure won’t be able to determine if failure is from packet loss issues or attack. The long-term fix is definitely client software patching. The 1 CVE related to AP / Infrastructure is related to 802.11r Fast Transition – if you have it enabled you should patch ASAP. If not, no big deal.”
From https://en.wikipedia.org/wiki/IEEE_802.11r-2008: ‘IEEE 802.11r-2008 or fast BSS transition (FT), also called “fast roaming,” is an amendment to the IEEE 802.11 standard to permit continuous connectivity aboard wireless devices in motion, with fast and secure handoffs from one base station to another managed in a seamless manner.’
1 user thanked author for this post.
-
anonymous
Guest -
MrBrian
AskWoody_MVPOctober 17, 2017 at 12:26 pm #138435From https://lesterchan.net/blog/2016/12/12/linksys-re7000-max-stream-ac1900-mu-mimo-wi-fi-range-extender/ (my bolding):
“Linksys uses 802.11r to support Seamless Roaming.
It is actually common in most enterprise Access Points (AP) and now it is being brought to consumer products.”
-
anonymous
Guest
-
-
-
-
anonymous
GuestOctober 17, 2017 at 8:58 pm #138580Please correct me if I’ve misunderstood your post about this (138351) but, the way I read what you’ve wrote is that if you don’t have anything that uses 802.11r or the like, is that home networks should be at least partially safe as long as all user devices (phones, computers) are patched, is this correct?
EDIT html to text – content may not appear as intended
-
MrBrian
AskWoody_MVPOctober 18, 2017 at 5:47 am #138653The way I interpret it is that if all clients are patched, then an access point doesn’t need to be patched if it either doesn’t support 802.11r or its 802.11r support is disabled. Caveat for “if all clients are patched”: https://askwoody.com/forums/topic/krack-attach-bad-but-the-sky-isnt-falling/#post-138161.
-
MrBrian
AskWoody_MVPOctober 18, 2017 at 5:51 am #138655From https://www.krackattacks.com/:
“What if there are no security updates for my router?
Our main attack is against the 4-way handshake, and does not exploit access points, but instead targets clients. So it might be that your router does not require security updates. We strongly advise you to contact your vendor for more details. In general though, you can try to mitigate attacks against routers and access points by disabling client functionality (which is for example used in repeater modes) and disabling 802.11r (fast roaming). For ordinary home users, your priority should be updating clients such as laptops and smartphones.”
-
-
-
anonymous
Guest -
MrBrian
AskWoody_MVP -
anonymous
GuestOctober 18, 2017 at 10:15 am #138711Hi, 138580 again, would you be able to explain what “client functionality” is exactly? The equipment I’m monitoring is just 2 basic modem/router combos with no special features and from what I read a wi-fi repeater is a separate piece of equipment, is that wrong? Or is there another setting I need to look for? the only time any wi-fi is actually used though is at my grandparents when the cousins and grand kids play video games at family gatherings. Sorry for all the questions.
-
MrBrian
AskWoody_MVP -
anonymous
Guest
-
-
-
-
-
MrBrian
AskWoody_MVPOctober 19, 2017 at 6:28 am #138886From https://twitter.com/campuscodi/status/920954179249610752: “KRACK attack proof-of-concept code published online […]”
-
Daubie
AskWoody LoungerOctober 20, 2017 at 1:30 pm #139200(Decide whether these adds are worthwhile to your discussion.)
and
Wife and I are way behind the times compared to most of you guys. I use my Alienware desktop hardwired for a specific online multiplayer flight sim combat scenario out of Europe been playing for years and mod my machine with updated hardware until some day I will buy another more current gaming machine. My wife uses my router’s server wi-fi app for her Android hand-held to play her games and e-mails throughout the house. We don’t do wi-fi outside the house… yet.
We don’t do any money matters online, anywhere, related to our banking institution. We do the online money transactions another way.
-
MrBrian
AskWoody_MVPOctober 22, 2017 at 10:36 am #139879From https://www.krackattacks.com/ (my bolding):
“Is it sufficient to patch only the access point? Or to patch only clients?
Currently, all vulnerable devices should be patched. In other words, patching the AP will not prevent attacks against vulnerable clients. Similarly, patching all clients will not prevent attacks against vulnerable access points. Note that only access points that support the Fast BSS Transition handshake (802.11r) can be vulnerable.
That said, we are working on access points modifications that do prevent attacks against vulnerable clients. These modifications are different from the security patches for vulnerable access points! So unless your access point vendor explicitly mentions that their patches prevent attacks against clients, you must also patch clients.“
-
anonymous
Guest -
MrBrian
AskWoody_MVP -
anonymous
Guest
-
-
-
anonymous
GuestOctober 23, 2017 at 6:12 pm #140303PKCano wrote:
September patches were at DEFCON 3 on Sept 29th
Oct patches were at DEFCON 2 on the morning of Oct 10thThanks for the info. Good to know that Sep 2017’s patches did at least reach DEFCON 3 status at end Sep 2017.
However, posts about such DEFCON status updates are easy to miss (or get lost in KB-induced jigsaw fog), since there are usually multiple unrelated posts here per day, & the posts’s respective URLs also lack the month indicator (ref: “… /2017/ms-defcon-3-get-patched …”, “… /2017/ms-defcon-2-check-to-see …” of the above-supplied links).
For instance, after my query (published 19 Oct 2017), at least 2 other users as of 21 & 22 Oct 2017 appear to be still waiting for Sep 2017’s patches to hit DEFCON 3. See replies #139781 & #139805:
“2017-09 […] what the current recommendation for patching is”
“wait until we are at MS-DEFCON 3 or higher and then apply them”As such, one might perhaps like to reconsider adopting my previous suggestion about displaying the DEFCON status appended with the corresponding current & immediate-preceding months upfront at the DEFCON indicator at the top of this website.
And/or: Introduce an additional “DEFCON Update” tag to the bottom of posts regarding DEFCON status updates, so that users can click straight to them. Currently, all DEFCON updates are tagged only as “Windows Patches/Security“, & there are a lot of such posts to sieve through.
In this current bewildering & risk-fraught ecosystem of Windows Updates/Patches, any help in improving the clarity of information would be most appreciated. Thanks !
-
anonymous
GuestOctober 23, 2017 at 6:59 pm #140311PKCano wrote:
Since the Security-only patches are NOT cumulative, you can install them in any order, but it is best to do so in chronological order if you can. If you miss one, you can go ahead and install it when you can.MrBrian wrote:
As far as I know, they can be installed in any order without any negative consequences.Thanks to both for the reassuring clarification.
As such, might it be better to reword the info shown at the Group B advisory to state something along the lines of: “For full protection, all of the Monthly Security Only patches should be installed. It is preferable (although not strictly necessary) to install them in chronological order.” ?
The current info in the said advisory is as follows, noting especially the part highlighted in bold.
“Group B” Security-Only patches are not cumulative. In order to be protected, you must install all of them. Every. Single. One. By hand. More than that, you have to install them in chronological order — the October patch, followed by the November patch, followed by the December patch, and so on.
The emphasis as implied by the phrase “More than that” , & accentuated by the belaboring expression (X month, followed by Y month, & so on) imparts the impression that that this step is most critical part about security patching — failing which … this is where the confusion begins, because no adverse consequences are stated, & the recommended chronological method is also contrary to how Windows Updates/ patching are usually carried out.
1 user thanked author for this post.
Viewing 18 reply threads - This topic has 50 replies, 12 voices, and was last updated 7 years, 7 months ago by
-

Plus Membership
Donations from Plus members keep this site going. You can identify the people who support AskWoody by the Plus badge on their avatars.
AskWoody Plus members not only get access to all of the contents of this site -- including Susan Bradley's frequently updated Patch Watch listing -- they also receive weekly AskWoody Plus Newsletters (formerly Windows Secrets Newsletter) and AskWoody Plus Alerts, emails when there are important breaking developments.
Get Plus!
Welcome to our unique respite from the madness.
It's easy to post questions about Windows 11, Windows 10, Win8.1, Win7, Surface, Office, or browse through our Forums. Post anonymously or register for greater privileges. Keep it civil, please: Decorous Lounge rules strictly enforced. Questions? Contact Customer Support.
Search Newsletters
Search Forums
View the Forum
Search for Topics
Recent Topics
-
Help with WD usb driver on Windows 11
by
Tex265
1 hour, 29 minutes ago -
hibernate activation
by
e_belmont
2 hours, 19 minutes ago -
Red Hat Enterprise Linux 10 with AI assistant
by
Alex5723
6 hours, 6 minutes ago -
Windows 11 Insider Preview build 26200.5603 released to DEV
by
joep517
9 hours, 11 minutes ago -
Windows 11 Insider Preview build 26120.4151 (24H2) released to BETA
by
joep517
9 hours, 13 minutes ago -
Fixing Windows 24H2 failed KB5058411 install
by
Alex5723
12 hours, 23 minutes ago -
Out of band for Windows 10
by
Susan Bradley
13 hours, 56 minutes ago -
Giving UniGetUi a test run.
by
RetiredGeek
20 hours, 53 minutes ago -
Windows 11 Insider Preview Build 26100.4188 (24H2) released to Release Preview
by
joep517
1 day, 4 hours ago -
Microsoft is now putting quantum encryption in Windows builds
by
Alex5723
1 day, 2 hours ago -
Auto Time Zone Adjustment
by
wadeer
1 day, 9 hours ago -
To download Win 11 Pro 23H2 ISO.
by
Eddieloh
1 day, 6 hours ago -
Manage your browsing experience with Edge
by
Mary Branscombe
11 hours, 15 minutes ago -
Fewer vulnerabilities, larger updates
by
Susan Bradley
22 hours, 11 minutes ago -
Hobbies — There’s free software for that!
by
Deanna McElveen
6 hours, 5 minutes ago -
Apps included with macOS
by
Will Fastie
3 hours, 57 minutes ago -
Xfinity home internet
by
MrJimPhelps
44 minutes ago -
Convert PowerPoint presentation to Impress
by
RetiredGeek
1 day, 1 hour ago -
Debian 12.11 released
by
Alex5723
2 days, 6 hours ago -
Microsoft: Troubleshoot problems updating Windows
by
Alex5723
2 days, 9 hours ago -
Woman Files for Divorce After ChatGPT “Reads” Husband’s Coffee Cup
by
Alex5723
1 day, 13 hours ago -
Moving fwd, Win 11 Pro,, which is best? Lenovo refurb
by
Deo
30 minutes ago -
DBOS Advanced Network Analysis
by
Kathy Stevens
3 days, 2 hours ago -
Microsoft Edge Launching Automatically?
by
healeyinpa
2 days, 17 hours ago -
Google Chrome to block admin-level browser launches for better security
by
Alex5723
14 hours, 52 minutes ago -
iPhone SE2 Stolen Device Protection
by
Rick Corbett
2 days, 21 hours ago -
Some advice for managing my wireless internet gateway
by
LHiggins
2 days, 5 hours ago -
NO POWER IN KEYBOARD OR MOUSE
by
HE48AEEXX77WEN4Edbtm
1 day, 7 hours ago -
A CVE-MITRE-CISA-CNA Extravaganza
by
Nibbled To Death By Ducks
3 days, 14 hours ago -
Sometimes I wonder about these bots
by
Susan Bradley
1 day, 3 hours ago
Recent blog posts
Key Links
Want to Advertise in the free newsletter? How about a gift subscription in honor of a birthday? Send an email to sb@askwoody.com to ask how.
Mastodon profile for DefConPatch
Mastodon profile for AskWoody
Home • About • FAQ • Posts & Privacy • Forums • My Account
Register • Free Newsletter • Plus Membership • Gift Certificates • MS-DEFCON Alerts
Copyright ©2004-2025 by AskWoody Tech LLC. All Rights Reserved.