When a folder or file is created, Windows assigns default permissions. Generally, there is total control for the user who creates the file, as well as for the administrator groups and for the system itself. But of course, these permissions are fully customizable In the following lines, I explain how you can modify them step by step to meet your needs.
The first thing to do to change the permissions of a folder or file is to right-click on it and choose the Properties option. In the new window that opens, you must select the Security tab.
Once inside, you can see the permissions assigned by the folder or file. If something does not convince you and you need to change them, you only have click the Edit button, just below the list of users and groups with access. This will open a new window very similar to the previous one in which, this time, you will be able to edit all the permissions.
Names and groups with a permission type on the directory or file appear at the top of the window. You can delete or add them using the buttons that appear just below. Here, you can, for example, allow access to all administrators of the computer by adding the Administrators group and adding a specific user to which access is denied to you (you always get the ###################################################################### 39, the most restrictive permission possible if there are several).
Once you have added all the users and groups of your choice, you can now configure the specific permissions. For that you just need to click on the user or group you want to change the permissions and adjust it below with the available options (Full Control, Modify, Read and Execute, View Folder Contents, Read, Write, Special Permissions, etc.).
Just check the option to allow or deny each license. Once you have selected the user configuration, you can choose to select another user or group. Once all the permissions have been changed, click Accept in the edit window and in the viewport.
Once the changes are accepted, the permissions will be applied and only authorized persons will be able to access, modify, or execute the folder or file.
In this way, neither installed applications nor anyone using our equipment will know where we went. To do this, the first thing to do is to open the page of Configuration Windows 10, go to the option confidentiality and once there, in the menu shown on the left, select the option Location in the section Application permissions.
This will load a series of parameters and options on the right side of the configuration page where we will find the section History of the location. If location is enabled, location history will be stored for a limited time on our device and may be used by apps using our location, such as local news apps, weather forecasts etc.
In this section we will find the option Remove The location history on this device only has to click on the Delete button located just below.
Automatically, the process that eliminates all the locations saved on our computer will be launched so that no application can access this information. If all goes well, we'll see how, next to the Delete button, a check check. From this same page of the configuration of Windows 10, we also find other interesting options allowing us to choose the applications that can access your specific location or even establish a default location when Windows, services and applications can not not access our exact location. as long as we want or need to share it with them.
Written by Roberto Adeva
This vulnerability has affected both Windows XP as Windows 10, and to all operating systems in between. The problem lies in the way in which MSCTF it establishes communications, allowing even an application running in an isolated or low-privilege environment to read and write data to an application with more privileges.
MSCTF is a module present in the Text Services Framework (TSF) Windows that manages elements such as the processing of what we type with the keyboard, key distribution or voice recognition. Therefore, this element is executed each time we connect to our user. If we go into the task manager, we will see the CTF Loader process running, and it is responsible for communicating the changes made to the keyboard layout or input methods to the rest of the applications.
This interaction is forced into applications by the kernel, but the problem is that there is no access control or verification for this interaction. Any application or user can connect to a CTF session, read and write text in any window. any session, falsify the identifier of an application, increase the privileges or take the identity of a CTF service.
So, it's as simple as waiting for a administrator Sign in to take control of your session and read sensitive information from other apps, including Passwords, get System permissions, delete the UAC dialog box, or execute commands in the Administrator Console. And all this in Windows 10 fully corrected.
The investigator who discovered the incident reported his discovery to Microsoft in mid-May. After 90 days, he decided to publish the information because Microsoft has not fixed the bug yet in one of its operating systems. In addition, it took more than a month for the company to respond to the investigator she was going to investigate. Two weeks before its release, Microsoft was still asking for details about the exploit.
Let's hope now that the vulnerability is public Microsoft hurry to fix itbecause, at the moment, all Windows computers are vulnerable to a failure of the provisioning function. For the moment, Microsoft has corrected one of them, CVE-2019-1162, this month, but for the rest, they said they would need more time.
These drivers affect all versions of Windows, which means that millions of users are at risk because the detected failures allow any malicious software to gain user-level kernel permissions and have direct access to the system. firmware and hardware of the computer. sit in it. That implies that even the reinstall windows 10 would not be enough get rid of this malware because it will be installed directly in the heart of our computer.
More than 40 drivers in which vulnerabilities have been detected come from Microsoft-certified hardware vendors, such as:
Microsoft has already indicated that it would use its HVCI capability to set up a blacklist to all controllers in which the security company has detected such failures. However, this feature is only available in processors. Intel seventh generation and laterTherefore, older or modern processors on which HCVI is not enabled, are those that require disabling the drivers. manual.
In addition, it is important to know that to exploit the failures detected on all these controllers, the attacker should have already infected our computer. To avoid this, Microsoft recommends the use of applications such as Windows Defender, to block this type of software and unknown vulnerable drivers. It is still possible to protect more of these types of threats. enable memory integrity in Windows 10.
Written by Roberto Adeva
In recent months, Microsoft has launched Updated May, 2019 computers that do not have compatibility issues. Depending on the drivers or installed programs, you will not be able to receive the update before updating them to avoid failures. Now, three of these compatibility issues have been fixed.
The first is the crash causing the loss of WiFi connectivity intermittently, introduced on May 21 with the fix KB4505057. The decision was related to Qualcomm Drivers for WiFi and Bluetooth, but since August 1, the drivers that solve the error are already available on the manufacturer's website. So, once the driver is installed, the May 2019 update will install automatically if you have no other incompatibilities in the system.
Another failure results in the application of Incorrect color profiles in Windows 10, with wrong gamma settings and badly applied Nightlight settings. Turning on and off the Nightlight feature and restarting the computer seem to temporarily solve the problem, as they discovered, but Microsoft will fix the crash in the future.
Third, another bug discovered on May 29 with update KB4497935 has caused compatibility issues with some drivers. Intel Rapid Storage Technology (Intel RST). Microsoft recommends using version 22.214.171.1244 or later.
To update to Windows 10 May 2019 Update, it is possible to force the update with the Media Creation Tool. If no method works for you, you can download the ISO and install from scratch, because all the appropriate drivers will be installed without worry, but at the cost of losing the programs and settings you have in your computer. current installation
The May 2019 update continues to gain market share two-and-a-half months after its launch, being already present in the 11.4% Windows computers 10. In July, it gained 5% of the market and this figure should continue to increase. The version with the largest share is 1803 (update of April 2018) with 53.7%, followed by 1809 (update of October 2018) with 29.7%.
However, little or no interest for this version was quickly demonstrated and became the Windows 10 S Mode. "Switch to Mode S" was one of the new arrivals a few months ago. Again, total failure of Windows 10 S and users "leaving" mode S to have the full and unrestricted version of the operating system.
But not everyone gets out of this Windows 10 S Mode. This is enabled with some devices such as Surface Go allowing, as we have already said, to download only applications from the Microsoft Store and not from web pages. The problem is that even though it may be safer, the Microsoft application store does not have basic programs (such as Google Chrome).
The output of S mode should be simple, or at least the function. However, many users have started complaining about not being able to disable this mode. This option is present in the Microsoft Store through which you can upgrade to a full version of Windows 10.
Users checked the page to exit S mode it does not work and we see only a blank page that does not let us do anything. Fortunately, Microsoft is aware of this problem and will fix it soon, although they are not able to provide an estimated date at which this will occur.
Have you been stuck in Windows 10 S mode when trying to update?
Written by Claudio Valero