15.8 C
New York
Wednesday, March 19, 2025
Home Blog Page 3806

Microsoft patches out single-command trick to put in Home windows 11 on unsupported {hardware}

0


Backside line: Microsoft shocked your entire PC ecosystem by introducing strict {hardware} necessities for putting in and utilizing Home windows 11. Whereas there are numerous strategies and tips to bypass these restrictions, the corporate has now eliminated one of many easiest choices.

The not too long ago launched Canary Construct 27686 of Home windows 11 accommodates an unwelcome shock for these trying to run the OS on older PCs. A preferred and simple methodology for putting in Home windows 11 on machines with unsupported {hardware} not works, though customers nonetheless have a number of various choices to realize the identical outcome.

Home windows 11 Construct 27686 introduces official enhancements, together with rising the scale restrict for FAT32 file methods from 32GB to 2TB, simpler HDR content material entry on appropriate shows, and extra. Nevertheless, the preview OS additionally removes the flexibility to bypass system requirement checks utilizing the “setup.exe /product server” command, which beforehand allowed customers to put in the OS on older {hardware}.

Microsoft has confronted important criticism for blocking Home windows 11 installations on methods with no TPM 2.0 chip. Whereas the core expertise of Home windows 11 is not vastly totally different from Home windows 10, the brand new {hardware} necessities have led many customers with practical Home windows 10 methods to keep away from upgrading to the brand new OS.

Over time, many strategies have been found to bypass the set up necessities of Home windows 11 on {hardware} designed for Home windows 10 and even older methods. The “/product server” trick was one of many quickest and best, however the upcoming Home windows 11 (24H2) launch will possible compel resourceful customers to search out new methods to run the OS on unsupported machines.

Microsoft can also be introducing new “exhausting” compatibility blocks in latest Home windows 11 variations, resembling the shortcoming to run the OS on CPUs that do not assist SSE4.2 directions. SSE4.2 know-how was first launched by Intel with its Nehalem-based processors in 2008, so any x86-64 CPU manufactured after that yr ought to nonetheless be capable to load the OS if the setup course of is profitable.

The variety of undocumented or unofficial tips to pressure Home windows 11 set up continues to dwindle, however Microsoft nonetheless gives sure OS editions that successfully bypass the TPM 2.0 requirement. The IoT editions of Home windows seem to fully skip the {hardware} compatibility verify, and Home windows 11 LTSC 2024 may be put in on methods with lower than 4GB of RAM.



Embarking on a New Chapter as Chief Income Officer at Atlan

0


My skilled journey has at all times been pushed by a deep ardour for information and its transformative impression on companies. It started within the BI area, the place I immersed myself within the nuances of varied industries, serving to information groups ship dashboards and experiences that their finish customers cherished.

As cloud migration turned mainstream, I reconnected with a childhood good friend, Taylor Brown, co-founder of Fivetran. Taylor, alongside George Fraser, had developed a totally automated pipeline for the trendy information stack, positioning the corporate on the forefront of the information revolution.

I joined Fivetran as the pinnacle of income in 2019 when the corporate had fewer than 500 prospects and about $8M in income. Throughout my tenure, we expanded to over 5,000 prospects and revenues surged to over $240M. Throughout this era, I additionally witnessed Snowflake’s public debut, the acquisitions of Looker and Tableau by Google and Salesforce respectively, and the fast progress of Databricks.

After my tenure at Fivetran, I took a well-deserved break to replicate and hunt down my subsequent problem. This search was intensive, treating every potential alternative like an funding, evaluating over thirty firms, assessing their potential, and assembly with many inspiring leaders and visionaries.

My standards have been clear (aided by an in depth spreadsheet):

  • Founding Group: Collaborative, visionary, humble, with a concentrate on constructing a world-class go-to-market technique.
  • Know-how: Disruptive, with excessive momentum progress, and aligned with transformational tendencies, significantly AI readiness.
  • Market: A big addressable market ripe for disruption.
  • Buyer Love: A robust dedication to customer-centric decision-making.
  • Journey: An thrilling path the place I may considerably impression their progress into a permanent firm.

The turning level got here throughout my discussions with Atlan’s co-founders, Prukalpa and Varun. Prukalpa shared an enthusiastic account of a Fortune 100 financial institution that had totally embraced Atlan as their information management aircraft for his or her AI technique. This was simply certainly one of many compelling tales.

Atlan’s origin story as an information crew is kind of distinctive, having even crafted a manifesto to be the form of firm they wished to companion with of their earlier days. Their method extends past merely promoting a product—it’s about crafting options that assist information groups excel.

Throughout my time at Fivetran, I noticed the trendy information stack evolve, excelling in elements like compute velocity and setup effectivity. Nonetheless, this evolution launched new challenges for information groups, comparable to information discovery, governance, and compliance. Analysis, like Gartner’s 2024 report, underscores that over half of Chief Knowledge and Analytics Officers are ramping up AI investments, with an equal concentrate on enhancing information governance.

This development underscored a transparent message: maintaining tempo with evolving information governance methods is essential for the success of recent information platforms, that are foundational for creating precious AI purposes.

To construct an iconic firm, it’s essential to tackle a big downside that’s prime of thoughts. Chief Knowledge and AI Officers, now extra mainstream than ever, view Atlan as a strategic precedence—the hub of their stack. The success tales from main enterprises, the place prospects achieved unprecedented time-to-value inside 90 days and noticed widespread finish person adoption because the norm, confirmed that Atlan is not only one other information firm—it’s a game-changer.

Becoming a member of Atlan because the Chief Income Officer has been exhilarating. Every day affirms my choice to be a part of this dynamic crew, whose experience and constructive person suggestions proceed to encourage me. At Atlan, we’re not simply maintaining with tendencies—we’re setting them. We’re dedicated to redefining requirements and empowering information groups to realize unprecedented ranges of efficiency and innovation.

As we proceed to develop and evolve, we’re looking out for passionate people desperate to contribute to this thrilling journey. In case you’re able to be a part of an organization that’s on the forefront of the trendy information revolution, Atlan is the stage for you.

Right here’s to the way forward for the trendy information platform and the numerous adventures that await!

WWDC 2021: State of the Union Recap | by Joseph Maurer | Geek Tradition


Right here’s a fast recap of Apple’s State of the Union at WWDC (World Extensive Developer Convention 2021). You could find the full video right here.

A brand new steady integration and supply service constructed proper into Xcode and hosted within the cloud, Xcode Construct is Apple’s tackle simplifying the method of constructing an app whereas serving to you concentrate on what’s vital. It helps you offload your builds, take a look at, and code signing for distribution. It publishes your consequence proper again into Xcode’s report navigator so that you by no means have to modify context out of the place you might be constructing your app.

One cool characteristic is you can have the construct notify you when it completes and publish it to your Slack or some other service. There’s additionally a public API you can dive into for grabbing details about your builds. I can see how constructing apps this fashion is far more built-in and handy. This really looks like a enjoyable technique to write exams on your app!

Code critiques additionally look to make large enhancements on commenting and reviewing code. The brand new views will let you choose between a number of methods to see what code has modified, and even view feedback as you might be fixing any potential bugs. Anybody who does code critiques how complicated it might get when there are a number of revisions and recordsdata eliminated or added to a pull request.

Most builders and engineers are used to the thought of writing concurrent code because it’s such a significant a part of making quick and responsive code.

“Concurrency permits your apps to carry out a number of duties on the identical time, which helps your apps keep attentive to consumer enter whereas doing work within the background, like a climate app fetching forecast knowledge whereas the consumer selects a metropolis.

The issue? Swift by no means had native help for concurrent code, so it was unnecessarily troublesome to put in writing good concurrent code. Apple’s new strategy to that is Structured Concurrency. Actors are an business normal and are important to secure concurrent programming.

Conceptually, an actor is an object that protects its personal state by solely offering mutually unique entry. This fully eliminates concurrent entry and the low-level knowledge races that include it.

Actors’ are actually a first-class citizen in Swift and have a a lot easier declaration:

One other profit is MainActor, which helps you to adorn a perform to all the time run on the principle thread. That is important for API calls which might be wanted for the UI.

This yr, Swift playgrounds 4 means that you can work in your concepts wherever you go. It means that you can swap between Playgrounds and Xcode. Upon getting created an app, you may even publish your app to TestFlight proper from the Playgrounds app.

Now you can add cool results to your AR objects with Customized metallic shaders and dynamic textures. You’ll be able to see these results within the Birthday Cake demo with confetti falling across the object.

One factor that stood out to me as a Recreation Engineer is you can now have extra management over the show refresh fee. Particularly if you’re growing video games which might be going to run on the IPad Professional with ProMotion or on Macs which might be linked to excessive finish screens, having management over the refresh fee could be helpful for making your recreation appear like it’s operating easily!

Recreation controller help can be simpler so as to add now, with haptic help. You’ll be able to add a brand new on display screen controller with only some traces of code.

iOS is now altering how notifications work and at what degree they’re delivered. Focus permits the consumer to pick what sorts of notifications are delivered. There are actually 4 ranges of notifications: Low, Lively, Time Delicate, and Pressing (seen above). Notifications abstract permits customers to get a short overview of what was delivered with some marks of relevance.

Unable to ping/Scan Profinet PLC System Via Siemens SCALANCE X108 related to Cisco VLAN-Primarily based Switches


I am going through a difficulty with community connectivity to a Profinet PLC machine and would admire some assist. This is the setup:

enter image description here

  • PC ↔ DLINK Swap ↔ Cisco C2960 ↔ SCALANCE X108 ↔ PLC System
  • Solely Managed change is the Cisco Swap, All different switches are Unmanaged
  • SCALANCE X108 is an Industrial Unmanaged change.
  • The PLC is assigned an IP tackle of 192.168.101.9 and is configured
    with Profinet.
  • Each the PC and the port connecting to the SCALANCE X108 are
    configured in VLAN 101. The Swap has a number of different VLANs for different IT infrastructure.

Concern:

  • I can efficiently ping and scan the Profinet PLC in TIA Portal
    when it is related on to the DLINK Swap.
  • I can ping the 2 PLC gadgets (192.168.101.21, 192.168.101.22) that use Modbus over TCP/IP.
  • Nevertheless, when the Profinet PLC related by the SCALANCE X108, I
    can now not ping it from the PC, I believe the Cisco Swap is dropping VLAN
    0 frames. Precedence is assigned to Profinet real-time messages in accordance wit normal IEEE 802.1Q. The VLAN ID 0 with VLAN precedence 6 is used for Profinet Actual Time packets.

What I’ve Checked:

Since Profinet use VLAN 0, I configured Cisco Swap port to permit this VLAN 0 visitors, I’ve tried two workarounds , to make a non industrial Cisco Catalyst VLAN-Primarily based Swap to work with Profinet Protocol. The primary makes use of a voice VLAN that may move vlan 0. The second strategy makes use of a trunk port.

  1. Voice VLAN over entry port :
Swap(config)# interface GigabitEthernet 0/16
Swap(config-if)# switchport mode entry
Swap(config-if)# switchport entry vlan 101
Swap(config-if)# switchport voice vlan dot1p
  1. Trunk Port:
Swap(config)# default interface 0/16
Swap(config)# interface GigabitEthernet 0/16
Swap(config-if)# switchport trunk allowed vlan 101
Swap(config-if)# switchport native vlan 101

With these approaches I am fairly certain that Profinet gadgets will work on non industrial Cisco switches when these gadgets are instantly hooked to the identical change. I have to make it work with Profinet gadgets related to an Industrial Siemens Swap which is related to a Cisco change.

I’ve additionally checked the Cisco change MAC tackle desk and ARP desk on Port Gi 0/16 and the machine will not be exhibiting up:

cisco# present mac address-table interface gigabitEthernet 0/16
          Mac Tackle Desk
-------------------------------------------

Vlan    Mac Tackle       Kind        Ports
----    -----------       --------    -----
 101    000e.8c87.5b71    DYNAMIC     Gi0/16
 101    000e.cf1b.1288    DYNAMIC     Gi0/16
Complete Mac Addresses for this criterion: 2
cisco#

Im nonetheless not capable of ping the PLC even permitting VLAN 0 by the voice VLAN and Trunking. I do not know the place to verify if the Cisco change is definitely dropping visitors. I’ve checked debug arp and to this point see no difficulty

Has anybody encountered the same difficulty or may present steering on what may be fallacious? Any particular configurations or checks I ought to carry out on the Cisco C2960 to make sure Profinet visitors is passing by appropriately?

Thanks prematurely to your assist!

Evaluation of a malware exploiting Android accessibility providers


On Android and iOS, accessibility options can be found to assist folks use their smartphones: audio feedback, subtitles, customized show… Some cellular functions designed with an inclusive strategy are appropriate with accessibility providers.

To allow these providers in an software, it requires the accessibility permission. However this permission provides functions full entry to the consumer’s machine. At the moment, an increasing number of cybercriminals are leveraging it to take management of smartphones and tablets. When this occurs, customers discover themselves in a bind, unable to uninstall the app and even reset their machine.

Not too long ago, the Pradeo Safety answer neutralized an software utilizing Android accessibility providers for malicious functions on a protected machine. The recognized malware was put in via a phishing hyperlink. It pretends to be a QR code scanning software however really exploits the accessibility permission to carry out fraudulent banking transactions.

 

The dangers of cellular accessibility providers

An software can use the android.permission.BIND_ACCESSIBILITY_SERVICE permission so as to profit from superior options facilitating accessibility to customers with disabilities. With this permission, an software can management the entire display (clicks, strikes…) in addition to the keyboard, learn what’s displayed and shut or open functions.

These options are delicate as a result of they allow the management of virtually all layers of a tool. When a malicious software is granted the accessibility permission, it might ship all the data displayed on the display and typed on the keyboard to a distant server, forestall its personal elimination or a system reset, and even launch itself robotically when the machine is rebooted. Sadly, the distribution channels utilized by hackers similar to unofficial software shops and messaging providers (SMS) don’t present any safety towards this risk.

 

Case research: QR-Code Scanner

Title of the analyzed app: QR-Code Scanner

Package deal identify: com.sq..boss

OS: Android

The “QR-Code Scanner” software seems as a QR code scanning software. Its icon and identify are usually not suspicious. Nonetheless, when launched, no QR code scanning performance is obtainable.

Instantly, the appliance sends a notification that urges to grant the accessibility possibility, which is important for the execution of its assault. So long as the consumer doesn’t permit it, it constantly sends the identical permission request.

 

image-png-Oct-27-2022-07-57-41-2518-AMimage-png-Oct-27-2022-07-58-03-5173-AMimage-png-Oct-27-2022-07-58-21-2187-AM

 

As soon as licensed, the malware can silently approve its personal permission requests rather than the consumer. Thus, it grants itself all of the permissions that may permit it to hold out its assault.

On this case, our evaluation of the malware means that the aim of the hacker behind the appliance is to commit fraud, by accumulating knowledge that the consumer varieties or shows on his display (login, password, bank card numbers …) and intercepting the non permanent authentication code despatched.

First, the QR-Code Scanner software accesses the checklist of functions put in on the sufferer’s machine to gauge curiosity. When banking or e-commerce functions are used, there’s a better probability that banking knowledge is manipulated by the consumer. When it occurs, the hacker collects them.

To enter the sufferer’s account or make a cost along with his bank card, the hacker intercepts the one-time password contained in an SMS or a notification. Therefore, he bypasses all safety measures that authenticate funds and connections utilizing a code. Solely verification protocols that use biometric knowledge are protected at this level.

Lastly, the appliance makes use of the sufferer’s cellphone to unfold to different gadgets. To do that, it sends an SMS containing a phishing hyperlink to the whole contact checklist. This fashion, the message comes from a identified quantity and has a greater probability of convincing the recipients to put in the malware.

 

All through the assault, the malware exploits accessibility providers to:

  • Spy on customers exercise
  • Grant and stop the rejection of the permissions it wants
  • Forestall elimination of the appliance, both from the homepage or from the settings
  • Forestall manufacturing unit reset, even from a third-party machine
  • Forestall sleep or shutdown of its course of
  • Launch at startup

 

The permissions utilized by the malware are the next:

android.permission.QUERY_ALL_PACKAGES

android.permission.QUICKBOOT_POWERON

android.permission.RECEIVE_LAUNCH_BROADCASTS

android.permission.GET_TASKS

android.permission.SYSTEM_ALERT_WINDOW

android.permission.RECEIVE_SMS

android.permission.READ_SMS

android.permission.WRITE_SMS

android.permission.SEND_SMS

android.permission.REQUEST_IGNORE_BATTERY_OPTIMIZATIONS

android.intent.motion.BOOT_COMPLETED

com.htc.intent.motion.QUICKBOOT_POWERON

android.intent.motion.QUICKBOOT_POWERON

android.permission.RECEIVE_BOOT_COMPLETED

android.permission.QUICKBOOT_POWERON

 

Protecting measures

Regardless of the plain want for accessibility providers, the superior rights they provide on the system imply that they have to be used (on the developer facet) and licensed (on the consumer facet) with due consideration.

At the moment, only some instruments and remediation actions are efficient to neutralize the analyzed malware:

  • Blocking the appliance earlier than launching it with Pradeo Safety
  • Forcing the uninstallation of the appliance with Pradeo Safety for Samsung
  • Uninstalling by way of a tool administration answer (UEM, MDM)
  • Uninstalling by way of ADB command