<?xml version="1.0" encoding="UTF-8"?>
<rss version="2.0" xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/">
	<channel>
		<title><![CDATA[Geeks for your information - All Forums]]></title>
		<link>https://www.geeks.fyi/</link>
		<description><![CDATA[Geeks for your information - https://www.geeks.fyi]]></description>
		<pubDate>Tue, 14 Apr 2026 14:18:11 +0000</pubDate>
		<generator>MyBB</generator>
		<item>
			<title><![CDATA[Is the CCNA 200-301 Exam Best?]]></title>
			<link>https://www.geeks.fyi/showthread.php?tid=21822</link>
			<pubDate>Tue, 14 Apr 2026 11:34:09 +0000</pubDate>
			<dc:creator><![CDATA[<a href="https://www.geeks.fyi/member.php?action=profile&uid=2487">jacklim</a>]]></dc:creator>
			<guid isPermaLink="false">https://www.geeks.fyi/showthread.php?tid=21822</guid>
			<description><![CDATA[The CCNA 200-301 is one of the most popular entry-level networking certifications, designed to build a strong foundation in networking concepts. It covers essential topics like IP connectivity, network access, security fundamentals, automation, and troubleshooting, making it ideal for beginners entering the IT field.<br />
<br />
Many candidates use exam dumps and practice tests to understand real exam patterns and commonly tested scenarios. These resources help improve accuracy, speed, and confidence before the actual exam. Platforms like <span style="font-weight: bold;" class="mycode_b">Cert Empire</span> provide updated <span style="font-weight: bold;" class="mycode_b">CCNA 200-301 exam dumps</span> that align with current exam objectives, making preparation more efficient. However, combining these with hands-on lab practice and official Cisco resources ensures a deeper understanding. With the right preparation strategy, CCNA can open doors to networking roles and long-term career growth.<br />
<br />
<span style="font-weight: bold;" class="mycode_b">See: <a href="https://certempire.com/exam/ccna-200-301-exam-questions/" target="_blank" rel="noopener" class="mycode_url"><span style="color: #9b59b6;" class="mycode_color">https://certempire.com/exam/ccna-200-301-exam-questions</span></a></span>]]></description>
			<content:encoded><![CDATA[The CCNA 200-301 is one of the most popular entry-level networking certifications, designed to build a strong foundation in networking concepts. It covers essential topics like IP connectivity, network access, security fundamentals, automation, and troubleshooting, making it ideal for beginners entering the IT field.<br />
<br />
Many candidates use exam dumps and practice tests to understand real exam patterns and commonly tested scenarios. These resources help improve accuracy, speed, and confidence before the actual exam. Platforms like <span style="font-weight: bold;" class="mycode_b">Cert Empire</span> provide updated <span style="font-weight: bold;" class="mycode_b">CCNA 200-301 exam dumps</span> that align with current exam objectives, making preparation more efficient. However, combining these with hands-on lab practice and official Cisco resources ensures a deeper understanding. With the right preparation strategy, CCNA can open doors to networking roles and long-term career growth.<br />
<br />
<span style="font-weight: bold;" class="mycode_b">See: <a href="https://certempire.com/exam/ccna-200-301-exam-questions/" target="_blank" rel="noopener" class="mycode_url"><span style="color: #9b59b6;" class="mycode_color">https://certempire.com/exam/ccna-200-301-exam-questions</span></a></span>]]></content:encoded>
		</item>
		<item>
			<title><![CDATA[MRG Effitas - Consumer Assessment & Certification Programme 03/2026]]></title>
			<link>https://www.geeks.fyi/showthread.php?tid=21821</link>
			<pubDate>Tue, 14 Apr 2026 07:29:17 +0000</pubDate>
			<dc:creator><![CDATA[<a href="https://www.geeks.fyi/member.php?action=profile&uid=1322">harlan4096</a>]]></dc:creator>
			<guid isPermaLink="false">https://www.geeks.fyi/showthread.php?tid=21821</guid>
			<description><![CDATA[<blockquote class="mycode_quote"><cite>Quote:</cite><span style="font-weight: bold;" class="mycode_b">MRG Effitas - Consumer Assessment &amp; Certification Programme 03/2026</span><br />
<br />
<span style="font-weight: bold;" class="mycode_b">Introduction</span><br />
<br />
Since its inception in 2009, MRG Effitas has specialised in evaluating how security products perform against real-world threats, with particular emphasis on malware and online fraud affecting everyday users.<br />
<br />
This Consumer Assessment &amp; Certification Programme is powered by the Tempus testing platform and is designed to closely reflect real-world usage scenarios on Windows systems. The methodology simulates the types of threats consumers are most likely to encounter, enabling an objective assessment of how effectively security products protect against modern attacks and supporting informed product selection.<br />
<br />
Historically, security testing focused primarily on static malware detection rates. In recent years, however, methodologies have evolved significantly.<br />
<br />
Under the guidance of AMTSO, of which MRG Effitas is a member, testing organisations increasingly conduct Real-World testing based on transparent and standardised principles. Information regarding the AMTSO compliance status of this test is publicly available at:<br />
<br />
<a href="https://www.amtso.org/amtso-ls1-tp192" target="_blank" rel="noopener" class="mycode_url">https://www.amtso.org/amtso-ls1-tp192</a><br />
<br />
<a href="https://www.mrg-effitas.com/wp-content/uploads/2026/04/MRG_Effitas_Consumer_Assessmnet_03_2026.pdf" target="_blank" rel="noopener" class="mycode_url">Full Report</a></blockquote>
]]></description>
			<content:encoded><![CDATA[<blockquote class="mycode_quote"><cite>Quote:</cite><span style="font-weight: bold;" class="mycode_b">MRG Effitas - Consumer Assessment &amp; Certification Programme 03/2026</span><br />
<br />
<span style="font-weight: bold;" class="mycode_b">Introduction</span><br />
<br />
Since its inception in 2009, MRG Effitas has specialised in evaluating how security products perform against real-world threats, with particular emphasis on malware and online fraud affecting everyday users.<br />
<br />
This Consumer Assessment &amp; Certification Programme is powered by the Tempus testing platform and is designed to closely reflect real-world usage scenarios on Windows systems. The methodology simulates the types of threats consumers are most likely to encounter, enabling an objective assessment of how effectively security products protect against modern attacks and supporting informed product selection.<br />
<br />
Historically, security testing focused primarily on static malware detection rates. In recent years, however, methodologies have evolved significantly.<br />
<br />
Under the guidance of AMTSO, of which MRG Effitas is a member, testing organisations increasingly conduct Real-World testing based on transparent and standardised principles. Information regarding the AMTSO compliance status of this test is publicly available at:<br />
<br />
<a href="https://www.amtso.org/amtso-ls1-tp192" target="_blank" rel="noopener" class="mycode_url">https://www.amtso.org/amtso-ls1-tp192</a><br />
<br />
<a href="https://www.mrg-effitas.com/wp-content/uploads/2026/04/MRG_Effitas_Consumer_Assessmnet_03_2026.pdf" target="_blank" rel="noopener" class="mycode_url">Full Report</a></blockquote>
]]></content:encoded>
		</item>
		<item>
			<title><![CDATA[Windows 11 Setup Now Lets You Skip the Update Installation Step]]></title>
			<link>https://www.geeks.fyi/showthread.php?tid=21820</link>
			<pubDate>Tue, 14 Apr 2026 06:16:04 +0000</pubDate>
			<dc:creator><![CDATA[<a href="https://www.geeks.fyi/member.php?action=profile&uid=1322">harlan4096</a>]]></dc:creator>
			<guid isPermaLink="false">https://www.geeks.fyi/showthread.php?tid=21820</guid>
			<description><![CDATA[<blockquote class="mycode_quote"><cite>Quote:</cite><a href="https://www.ghacks.net/category/windows/" target="_blank" rel="noopener" class="mycode_url">Microsoft</a> has introduced a change to the <a href="https://www.ghacks.net/2026/02/06/windows-11-has-powerful-built-in-features-most-users-never-touch/" target="_blank" rel="noopener" class="mycode_url">Windows 11</a> out-of-box setup experience that lets users skip the update installation step during initial PC setup. The option is now generally available after months of testing with select groups, according to Aria, a Microsoft engineer working on Windows Update.<br />
<br />
Previously, Windows 11 setup forced users to wait through an update process that could take up to <span style="font-weight: bold;" class="mycode_b">30 minutes,</span> depending on the number of pending updates, resulting in total setup times of up to <span style="font-weight: bold;" class="mycode_b">40 minutes.</span><br />
<br />
<span style="font-weight: bold;" class="mycode_b">How the Windows 11 “Update Later” Button Works and What It Means for Future Updates</span><br />
<br />
A new <span style="font-weight: bold;" class="mycode_b">"update later"</span> button now appears below the update progress bar during setup. Users who choose it will go straight to the desktop without waiting for updates to install. Aria confirmed that skipping updates means "the latest features and security fixes won't be applied until you choose to install them after reaching the desktop." Updates can still be installed manually later through Windows Update in Settings.<br />
<br />
<a href="https://www.ghacks.net/2026/04/14/windows-11-setup-now-lets-you-skip-the-update-installation-step/" target="_blank" rel="noopener" class="mycode_url">Continue Reading...</a></blockquote>
]]></description>
			<content:encoded><![CDATA[<blockquote class="mycode_quote"><cite>Quote:</cite><a href="https://www.ghacks.net/category/windows/" target="_blank" rel="noopener" class="mycode_url">Microsoft</a> has introduced a change to the <a href="https://www.ghacks.net/2026/02/06/windows-11-has-powerful-built-in-features-most-users-never-touch/" target="_blank" rel="noopener" class="mycode_url">Windows 11</a> out-of-box setup experience that lets users skip the update installation step during initial PC setup. The option is now generally available after months of testing with select groups, according to Aria, a Microsoft engineer working on Windows Update.<br />
<br />
Previously, Windows 11 setup forced users to wait through an update process that could take up to <span style="font-weight: bold;" class="mycode_b">30 minutes,</span> depending on the number of pending updates, resulting in total setup times of up to <span style="font-weight: bold;" class="mycode_b">40 minutes.</span><br />
<br />
<span style="font-weight: bold;" class="mycode_b">How the Windows 11 “Update Later” Button Works and What It Means for Future Updates</span><br />
<br />
A new <span style="font-weight: bold;" class="mycode_b">"update later"</span> button now appears below the update progress bar during setup. Users who choose it will go straight to the desktop without waiting for updates to install. Aria confirmed that skipping updates means "the latest features and security fixes won't be applied until you choose to install them after reaching the desktop." Updates can still be installed manually later through Windows Update in Settings.<br />
<br />
<a href="https://www.ghacks.net/2026/04/14/windows-11-setup-now-lets-you-skip-the-update-installation-step/" target="_blank" rel="noopener" class="mycode_url">Continue Reading...</a></blockquote>
]]></content:encoded>
		</item>
		<item>
			<title><![CDATA[What happens in the bedroom stays in the bedroom]]></title>
			<link>https://www.geeks.fyi/showthread.php?tid=21811</link>
			<pubDate>Mon, 13 Apr 2026 11:20:10 +0000</pubDate>
			<dc:creator><![CDATA[<a href="https://www.geeks.fyi/member.php?action=profile&uid=1322">harlan4096</a>]]></dc:creator>
			<guid isPermaLink="false">https://www.geeks.fyi/showthread.php?tid=21811</guid>
			<description><![CDATA[<blockquote class="mycode_quote"><cite>Quote:</cite><span style="font-size: medium;" class="mycode_size">Smart sex toys and their companion apps collect and process some extremely personal data. We break down the risks involved, and ways to protect your privacy.</span><br />
 <br />
The smart-home craze has connected everything — from your lightbulbs to your tea kettle — to the internet, and the adult industry isn’t sitting this one out: manufacturers are releasing more smart models than ever. While syncing a sex toy to your smartphone unlocks some cool extra features, it also opens the door to potential security and privacy headaches. The good news? You can significantly lower most of these risks just by tweaking your settings and adjusting your usage habits.<br />
<br />
<span style="font-weight: bold;" class="mycode_b">How sex-toy apps actually work</span><br />
<br />
To be clear upfront, while researchers have successfully <a href="https://internetofdon.gs/no-youre-not-going-to-cheat-at-chess-with-a-buttplug/" target="_blank" rel="noopener" class="mycode_url">hijacked</a> sex toys in controlled experiments, the odds of a hacker remotely taking over your vibrator in the real world are pretty slim. In this post, we focus on the more realistic risks: your privacy and the safety of your data.<br />
<br />
Most modern adult toys link up with the manufacturer’s app. These apps offer a range of usage options: you can control the device yourself, or hand over the remote to a partner — anywhere in the world via the internet.<br />
<br />
Beyond just basic controls, many of these apps have social features: private messaging, group chats, calls, and even video sessions. In fact, you don’t even need a physical device to use some of them; you just create an account. Because of this, some of these services have essentially evolved into niche dating platforms.<br />
<br />
The toy and your phone talk to each other via Bluetooth — with minimal risks. To handle social features or remote control, the app connects to a cloud server. This creates a constant stream of data moving back and forth: everything from commands to private messages.<br />
<br />
Here’s the catch: even if you only use the app to control your toy locally via Bluetooth, you still get connected to that cloud server. That means you’re inheriting all the security and privacy risks.<br />
<br />
<a href="https://www.kaspersky.com/blog/sex-toy-app-privacy-security-guide/55600/" target="_blank" rel="noopener" class="mycode_url">Continue Reading...</a></blockquote>
]]></description>
			<content:encoded><![CDATA[<blockquote class="mycode_quote"><cite>Quote:</cite><span style="font-size: medium;" class="mycode_size">Smart sex toys and their companion apps collect and process some extremely personal data. We break down the risks involved, and ways to protect your privacy.</span><br />
 <br />
The smart-home craze has connected everything — from your lightbulbs to your tea kettle — to the internet, and the adult industry isn’t sitting this one out: manufacturers are releasing more smart models than ever. While syncing a sex toy to your smartphone unlocks some cool extra features, it also opens the door to potential security and privacy headaches. The good news? You can significantly lower most of these risks just by tweaking your settings and adjusting your usage habits.<br />
<br />
<span style="font-weight: bold;" class="mycode_b">How sex-toy apps actually work</span><br />
<br />
To be clear upfront, while researchers have successfully <a href="https://internetofdon.gs/no-youre-not-going-to-cheat-at-chess-with-a-buttplug/" target="_blank" rel="noopener" class="mycode_url">hijacked</a> sex toys in controlled experiments, the odds of a hacker remotely taking over your vibrator in the real world are pretty slim. In this post, we focus on the more realistic risks: your privacy and the safety of your data.<br />
<br />
Most modern adult toys link up with the manufacturer’s app. These apps offer a range of usage options: you can control the device yourself, or hand over the remote to a partner — anywhere in the world via the internet.<br />
<br />
Beyond just basic controls, many of these apps have social features: private messaging, group chats, calls, and even video sessions. In fact, you don’t even need a physical device to use some of them; you just create an account. Because of this, some of these services have essentially evolved into niche dating platforms.<br />
<br />
The toy and your phone talk to each other via Bluetooth — with minimal risks. To handle social features or remote control, the app connects to a cloud server. This creates a constant stream of data moving back and forth: everything from commands to private messages.<br />
<br />
Here’s the catch: even if you only use the app to control your toy locally via Bluetooth, you still get connected to that cloud server. That means you’re inheriting all the security and privacy risks.<br />
<br />
<a href="https://www.kaspersky.com/blog/sex-toy-app-privacy-security-guide/55600/" target="_blank" rel="noopener" class="mycode_url">Continue Reading...</a></blockquote>
]]></content:encoded>
		</item>
		<item>
			<title><![CDATA[Microsoft Simplifies Windows Insider Program to Two Channels and Ends Gradual Feature]]></title>
			<link>https://www.geeks.fyi/showthread.php?tid=21810</link>
			<pubDate>Mon, 13 Apr 2026 10:22:04 +0000</pubDate>
			<dc:creator><![CDATA[<a href="https://www.geeks.fyi/member.php?action=profile&uid=1322">harlan4096</a>]]></dc:creator>
			<guid isPermaLink="false">https://www.geeks.fyi/showthread.php?tid=21810</guid>
			<description><![CDATA[<blockquote class="mycode_quote"><cite>Quote:</cite><a href="https://www.ghacks.net/2026/04/07/microsoft-begins-automatic-windows-11-25h2-rollout-to-unmanaged-home-and-pro-devices/" target="_blank" rel="noopener" class="mycode_url">Microsoft</a> has announced updates to <span style="font-weight: bold;" class="mycode_b">the Windows Insider program</span>, streamlining its channels into two main options and giving Insiders more direct control over the features they access. The company says these changes respond to feedback from Insider participants, including their first in-person meet-up, where users expressed confusion about how the current channels worked.<br />
<br />
<span style="font-weight: bold;" class="mycode_b">Two Primary Windows Insider Channels Replace Four</span><br />
<br />
The current Dev, Canary, and Beta channels are being replaced by two main channels: Experimental and Beta.<span style="font-weight: bold;" class="mycode_b"> </span><br />
<br />
<span style="font-weight: bold;" class="mycode_b">The Experimental</span> channel takes the place of the former Dev and Canary channels. Microsoft explains it as early access to features still under development, with the understanding that what appears in this channel may change, be delayed, or not be released at all.<span style="font-weight: bold;" class="mycode_b"> </span><br />
<br />
<span style="font-weight: bold;" class="mycode_b">The Beta</span> channel replaces the previous Beta Channel and previews features that Microsoft plans to ship in the coming weeks. The key change here is that gradual feature rollouts in Beta are ending. Microsoft states that when a feature is announced in a Beta update and a user installs that update, the feature will be available on their device.<br />
<br />
<a href="https://www.ghacks.net/2026/04/13/microsoft-simplifies-windows-insider-program-to-two-channels-and-ends-gradual-feature-rollouts-in-beta/" target="_blank" rel="noopener" class="mycode_url">Continue Reading...</a></blockquote>
]]></description>
			<content:encoded><![CDATA[<blockquote class="mycode_quote"><cite>Quote:</cite><a href="https://www.ghacks.net/2026/04/07/microsoft-begins-automatic-windows-11-25h2-rollout-to-unmanaged-home-and-pro-devices/" target="_blank" rel="noopener" class="mycode_url">Microsoft</a> has announced updates to <span style="font-weight: bold;" class="mycode_b">the Windows Insider program</span>, streamlining its channels into two main options and giving Insiders more direct control over the features they access. The company says these changes respond to feedback from Insider participants, including their first in-person meet-up, where users expressed confusion about how the current channels worked.<br />
<br />
<span style="font-weight: bold;" class="mycode_b">Two Primary Windows Insider Channels Replace Four</span><br />
<br />
The current Dev, Canary, and Beta channels are being replaced by two main channels: Experimental and Beta.<span style="font-weight: bold;" class="mycode_b"> </span><br />
<br />
<span style="font-weight: bold;" class="mycode_b">The Experimental</span> channel takes the place of the former Dev and Canary channels. Microsoft explains it as early access to features still under development, with the understanding that what appears in this channel may change, be delayed, or not be released at all.<span style="font-weight: bold;" class="mycode_b"> </span><br />
<br />
<span style="font-weight: bold;" class="mycode_b">The Beta</span> channel replaces the previous Beta Channel and previews features that Microsoft plans to ship in the coming weeks. The key change here is that gradual feature rollouts in Beta are ending. Microsoft states that when a feature is announced in a Beta update and a user installs that update, the feature will be available on their device.<br />
<br />
<a href="https://www.ghacks.net/2026/04/13/microsoft-simplifies-windows-insider-program-to-two-channels-and-ends-gradual-feature-rollouts-in-beta/" target="_blank" rel="noopener" class="mycode_url">Continue Reading...</a></blockquote>
]]></content:encoded>
		</item>
		<item>
			<title><![CDATA[Linux 7.0 Released With Official Rust Support and New Code for SPARC and Alpha CPUs]]></title>
			<link>https://www.geeks.fyi/showthread.php?tid=21809</link>
			<pubDate>Mon, 13 Apr 2026 10:21:07 +0000</pubDate>
			<dc:creator><![CDATA[<a href="https://www.geeks.fyi/member.php?action=profile&uid=1322">harlan4096</a>]]></dc:creator>
			<guid isPermaLink="false">https://www.geeks.fyi/showthread.php?tid=21809</guid>
			<description><![CDATA[<blockquote class="mycode_quote"><cite>Quote:</cite><span style="font-weight: bold;" class="mycode_b">Linus Torvalds</span> has announced the release of <a href="https://www.ghacks.net/2026/04/07/linux-kernel-7-1-moves-to-drop-i486-support-for-the-first-time-since-2012/" target="_blank" rel="noopener" class="mycode_url">Linux kernel</a> 7.0. This version uses a rounded number because <a href="https://www.ghacks.net/2026/02/09/january-brought-major-updates-to-these-6-linux-distros-2/" target="_blank" rel="noopener" class="mycode_url">the 6.x series</a> reached a point where a clean rollover helps avoid confusion. Torvalds has made it clear that major version numbers do not necessarily indicate architectural changes.<br />
<br />
The release also included a comment from Torvalds about the increasing role of AI in kernel development. He noted that AI tools are likely to continue uncovering corner cases for some time, which he described as possibly becoming the 'new normal" for the foreseeable future.<br />
<br />
<span style="font-weight: bold;" class="mycode_b">Official Rust Support And Other Notable Changes in Linux 7.0</span><br />
<br />
The most notable update in Linux 7.0 is <span style="font-weight: bold;" class="mycode_b">the end of experimental support for the Rust programming language</span>, which is now officially supported for kernel development. Rust had been in an experimental phase within the kernel for several release cycles. With the move to official support, developers can now write kernel code in Rust without it being considered provisional.<br />
<br />
Linux 7.0 introduces several updates, including enhanced support for ARM, RISC-V, and Loongson processors. It also offers more advanced KVM virtual machine support for AMD EPYC 5 CPUs. The filesystem has been made more resilient against corruption through self-healing XFS. Additionally, new code has been added for SPARC and DEC Alpha processors, as spotted by Phoronix.<br />
<br />
<a href="https://www.ghacks.net/2026/04/13/linux-7-0-released-with-official-rust-support-and-new-code-for-sparc-and-alpha-cpus/" target="_blank" rel="noopener" class="mycode_url">Continue Reading...</a></blockquote>
]]></description>
			<content:encoded><![CDATA[<blockquote class="mycode_quote"><cite>Quote:</cite><span style="font-weight: bold;" class="mycode_b">Linus Torvalds</span> has announced the release of <a href="https://www.ghacks.net/2026/04/07/linux-kernel-7-1-moves-to-drop-i486-support-for-the-first-time-since-2012/" target="_blank" rel="noopener" class="mycode_url">Linux kernel</a> 7.0. This version uses a rounded number because <a href="https://www.ghacks.net/2026/02/09/january-brought-major-updates-to-these-6-linux-distros-2/" target="_blank" rel="noopener" class="mycode_url">the 6.x series</a> reached a point where a clean rollover helps avoid confusion. Torvalds has made it clear that major version numbers do not necessarily indicate architectural changes.<br />
<br />
The release also included a comment from Torvalds about the increasing role of AI in kernel development. He noted that AI tools are likely to continue uncovering corner cases for some time, which he described as possibly becoming the 'new normal" for the foreseeable future.<br />
<br />
<span style="font-weight: bold;" class="mycode_b">Official Rust Support And Other Notable Changes in Linux 7.0</span><br />
<br />
The most notable update in Linux 7.0 is <span style="font-weight: bold;" class="mycode_b">the end of experimental support for the Rust programming language</span>, which is now officially supported for kernel development. Rust had been in an experimental phase within the kernel for several release cycles. With the move to official support, developers can now write kernel code in Rust without it being considered provisional.<br />
<br />
Linux 7.0 introduces several updates, including enhanced support for ARM, RISC-V, and Loongson processors. It also offers more advanced KVM virtual machine support for AMD EPYC 5 CPUs. The filesystem has been made more resilient against corruption through self-healing XFS. Additionally, new code has been added for SPARC and DEC Alpha processors, as spotted by Phoronix.<br />
<br />
<a href="https://www.ghacks.net/2026/04/13/linux-7-0-released-with-official-rust-support-and-new-code-for-sparc-and-alpha-cpus/" target="_blank" rel="noopener" class="mycode_url">Continue Reading...</a></blockquote>
]]></content:encoded>
		</item>
		<item>
			<title><![CDATA[CPUID Website Hacked to Serve Malware Through CPU-Z and HWMonitor Download Links]]></title>
			<link>https://www.geeks.fyi/showthread.php?tid=21808</link>
			<pubDate>Mon, 13 Apr 2026 10:20:05 +0000</pubDate>
			<dc:creator><![CDATA[<a href="https://www.geeks.fyi/member.php?action=profile&uid=1322">harlan4096</a>]]></dc:creator>
			<guid isPermaLink="false">https://www.geeks.fyi/showthread.php?tid=21808</guid>
			<description><![CDATA[<blockquote class="mycode_quote"><cite>Quote:</cite>Hackers accessed a secondary API on the <span style="font-weight: bold;" class="mycode_b">CPUID</span> website between April 9 at 15:00 UTC and April 10 at around 10:00 UTC. During this time, the site served malicious download links instead of legitimate installers for several popular hardware monitoring utilities. CPUID has confirmed the breach and says the compromised API has been fixed. They are now serving clean versions of all affected tools.<br />
<br />
Users who downloaded CPU-Z, HWMonitor, HWMonitor Pro, or PerfMonitor during the six-hour period may have received tampered versions. However, CPUID's original signed binaries were not altered.<br />
<br />
<span style="font-weight: bold;" class="mycode_b">What Malware Was Delivered Through the CPUID Downloads</span><br />
<br />
The malicious downloads were funneled through <span style="font-weight: bold;" class="mycode_b">Cloudflare R2</span> storage and delivered a fake <span style="font-weight: bold;" class="mycode_b">HWiNFO</span> installer named HWiNFO_Monitor_Setup, packaged with a Russian Inno Setup wrapper. According to Kaspersky's analysis, the trojanized versions included a legitimately signed executable along with a malicious DLL called CRYPTBASE.dll, which was used for DLL sideloading.<br />
<br />
The malicious DLL performed anti-sandbox checks before connecting to a command-and-control server and executing a final payload identified as STX RAT. This remote access trojan has infostealer capabilities and has been documented by researchers at eSentire. The malware operated almost entirely in memory and used techniques to evade endpoint detection and antivirus software.<br />
<br />
The four affected software versions were:<ul class="mycode_list"><li>CPU-Z version 2.19<br />
</li>
<li>HWMonitor Pro version 1.57<br />
</li>
<li>HWMonitor version 1.63<br />
</li>
<li>PerfMonitor version 2.04.<br />
</li>
</ul>
<a href="https://www.ghacks.net/2026/04/13/cpuid-website-hacked-to-serve-malware-through-cpu-z-and-hwmonitor-download-links/" target="_blank" rel="noopener" class="mycode_url">Continue Reading...</a></blockquote>
]]></description>
			<content:encoded><![CDATA[<blockquote class="mycode_quote"><cite>Quote:</cite>Hackers accessed a secondary API on the <span style="font-weight: bold;" class="mycode_b">CPUID</span> website between April 9 at 15:00 UTC and April 10 at around 10:00 UTC. During this time, the site served malicious download links instead of legitimate installers for several popular hardware monitoring utilities. CPUID has confirmed the breach and says the compromised API has been fixed. They are now serving clean versions of all affected tools.<br />
<br />
Users who downloaded CPU-Z, HWMonitor, HWMonitor Pro, or PerfMonitor during the six-hour period may have received tampered versions. However, CPUID's original signed binaries were not altered.<br />
<br />
<span style="font-weight: bold;" class="mycode_b">What Malware Was Delivered Through the CPUID Downloads</span><br />
<br />
The malicious downloads were funneled through <span style="font-weight: bold;" class="mycode_b">Cloudflare R2</span> storage and delivered a fake <span style="font-weight: bold;" class="mycode_b">HWiNFO</span> installer named HWiNFO_Monitor_Setup, packaged with a Russian Inno Setup wrapper. According to Kaspersky's analysis, the trojanized versions included a legitimately signed executable along with a malicious DLL called CRYPTBASE.dll, which was used for DLL sideloading.<br />
<br />
The malicious DLL performed anti-sandbox checks before connecting to a command-and-control server and executing a final payload identified as STX RAT. This remote access trojan has infostealer capabilities and has been documented by researchers at eSentire. The malware operated almost entirely in memory and used techniques to evade endpoint detection and antivirus software.<br />
<br />
The four affected software versions were:<ul class="mycode_list"><li>CPU-Z version 2.19<br />
</li>
<li>HWMonitor Pro version 1.57<br />
</li>
<li>HWMonitor version 1.63<br />
</li>
<li>PerfMonitor version 2.04.<br />
</li>
</ul>
<a href="https://www.ghacks.net/2026/04/13/cpuid-website-hacked-to-serve-malware-through-cpu-z-and-hwmonitor-download-links/" target="_blank" rel="noopener" class="mycode_url">Continue Reading...</a></blockquote>
]]></content:encoded>
		</item>
		<item>
			<title><![CDATA[Google Chrome 146 Adds Device Bound Session Credentials to Stop Session Cookie Theft]]></title>
			<link>https://www.geeks.fyi/showthread.php?tid=21794</link>
			<pubDate>Fri, 10 Apr 2026 06:54:29 +0000</pubDate>
			<dc:creator><![CDATA[<a href="https://www.geeks.fyi/member.php?action=profile&uid=1322">harlan4096</a>]]></dc:creator>
			<guid isPermaLink="false">https://www.geeks.fyi/showthread.php?tid=21794</guid>
			<description><![CDATA[<blockquote class="mycode_quote"><cite>Quote:</cite><a href="https://www.ghacks.net/category/companies/google/" target="_blank" rel="noopener" class="mycode_url">Google</a> has introduced Device Bound Session Credentials in <a href="https://www.ghacks.net/2026/04/08/google-chrome-rolls-out-vertical-tabs-and-full-page-reading-mode-to-all-users/" target="_blank" rel="noopener" class="mycode_url">Chrome 146</a> for <a href="https://www.ghacks.net/2026/04/09/microsoft-fixes-broken-windows-11-start-menu-search-caused-by-faulty-bing-server-update/" target="_blank" rel="noopener" class="mycode_url">Windows</a>. This security feature cryptographically ties session cookies to a device's hardware, making it impossible for stolen cookies to be used on a different machine.<br />
<br />
Support for macOS has not been announced. The feature was first announced in 2024 and was developed in partnership with <a href="https://www.ghacks.net/category/windows/" target="_blank" rel="noopener" class="mycode_url">Microsoft</a> as an open web standard.<br />
<br />
<span style="font-weight: bold;" class="mycode_b">How DBSC Works in Chrome 146 on Windows</span><br />
<br />
<img src="https://www.ghacks.net/wp-content/uploads/2026/04/Screenshot-2026-04-09-at-10.11.22-AM-scaled.png" loading="lazy"  alt="[Image: Screenshot-2026-04-09-at-10.11.22-AM-scaled.png]" class="mycode_img" /><br />
<br />
DBSC links a user's browser session to the device's security hardware, which is the Trusted Platform Module on Windows and the Secure Enclave on macOS. During session creation, the security chip generates a unique pair of public and private keys.<br />
<br />
Since the private key can’t be exported from the device, any session cookie stolen by malware becomes useless elsewhere. Short-lived session cookies are only issued when Chrome can <span style="font-weight: bold;" class="mycode_b">prove to the server that it possesses the corresponding private key.</span> Without this proof, exfiltrated cookies will expire and cannot be used to authenticate the attacker to the target service.<br />
<br />
<a href="https://www.ghacks.net/2026/04/10/google-chrome-146-adds-device-bound-session-credentials-to-stop-session-cookie-theft-on-windows/" target="_blank" rel="noopener" class="mycode_url">Continue Reading...</a></blockquote>
]]></description>
			<content:encoded><![CDATA[<blockquote class="mycode_quote"><cite>Quote:</cite><a href="https://www.ghacks.net/category/companies/google/" target="_blank" rel="noopener" class="mycode_url">Google</a> has introduced Device Bound Session Credentials in <a href="https://www.ghacks.net/2026/04/08/google-chrome-rolls-out-vertical-tabs-and-full-page-reading-mode-to-all-users/" target="_blank" rel="noopener" class="mycode_url">Chrome 146</a> for <a href="https://www.ghacks.net/2026/04/09/microsoft-fixes-broken-windows-11-start-menu-search-caused-by-faulty-bing-server-update/" target="_blank" rel="noopener" class="mycode_url">Windows</a>. This security feature cryptographically ties session cookies to a device's hardware, making it impossible for stolen cookies to be used on a different machine.<br />
<br />
Support for macOS has not been announced. The feature was first announced in 2024 and was developed in partnership with <a href="https://www.ghacks.net/category/windows/" target="_blank" rel="noopener" class="mycode_url">Microsoft</a> as an open web standard.<br />
<br />
<span style="font-weight: bold;" class="mycode_b">How DBSC Works in Chrome 146 on Windows</span><br />
<br />
<img src="https://www.ghacks.net/wp-content/uploads/2026/04/Screenshot-2026-04-09-at-10.11.22-AM-scaled.png" loading="lazy"  alt="[Image: Screenshot-2026-04-09-at-10.11.22-AM-scaled.png]" class="mycode_img" /><br />
<br />
DBSC links a user's browser session to the device's security hardware, which is the Trusted Platform Module on Windows and the Secure Enclave on macOS. During session creation, the security chip generates a unique pair of public and private keys.<br />
<br />
Since the private key can’t be exported from the device, any session cookie stolen by malware becomes useless elsewhere. Short-lived session cookies are only issued when Chrome can <span style="font-weight: bold;" class="mycode_b">prove to the server that it possesses the corresponding private key.</span> Without this proof, exfiltrated cookies will expire and cannot be used to authenticate the attacker to the target service.<br />
<br />
<a href="https://www.ghacks.net/2026/04/10/google-chrome-146-adds-device-bound-session-credentials-to-stop-session-cookie-theft-on-windows/" target="_blank" rel="noopener" class="mycode_url">Continue Reading...</a></blockquote>
]]></content:encoded>
		</item>
		<item>
			<title><![CDATA[WhatsApp is rolling out long-overdue username privacy feature]]></title>
			<link>https://www.geeks.fyi/showthread.php?tid=21793</link>
			<pubDate>Fri, 10 Apr 2026 06:53:11 +0000</pubDate>
			<dc:creator><![CDATA[<a href="https://www.geeks.fyi/member.php?action=profile&uid=1322">harlan4096</a>]]></dc:creator>
			<guid isPermaLink="false">https://www.geeks.fyi/showthread.php?tid=21793</guid>
			<description><![CDATA[<blockquote class="mycode_quote"><cite>Quote:</cite>If you use the popular messaging service WhatsApp, you know that you can only add contacts to the service with a phone number. Don’t have the number registered to a WhatsApp account? Then you can’t add the contact to the app.<br />
<br />
Clearly, having to share your phone number is not always a good idea. While you may not have any issues sharing it with close friends or family, giving it to others is another matter.<br />
<br />
It is a privacy and security issue. Other messengers support usernames, which do not reveal critical information to a third-party.<br />
<br />
WhatsApp started to work on usernames about three years ago, but the Meta-owned app is just about to start rolling the feature out to a first batch of users, <a href="https://wabetainfo.com/whatsapp-is-rolling-out-the-username-feature-on-android-and-ios/" target="_blank" rel="noopener" class="mycode_url">reports WABetaInfo</a>.<br />
<br />
You can add a username in the settings. Once you do, you may share the username with others to get them to add you to the messenger. Good news is that you can further protect the username with a code, which others need to provide when they try to add you.<br />
<br />
However, there are quite a few limitations regarding usernames. Here are noteworthy ones:<ul class="mycode_list"><li>The username can be between 3 and 23 characters in length.<br />
</li>
<li>It needs to start with a letter, and can only contain letters, numbers, underscore, and a period.<br />
</li>
<li>It can’t be a domain name or start with www.<br />
</li>
<li>It can’t be taken, if someone on Instagram or Facebook picked it already. The user who picked it can get it on WhatsApp.<br />
</li>
</ul>
<a href="https://chipp.in/security-privacy/whatsapp-is-rolling-out-long-overdue-username-privacy-feature/" target="_blank" rel="noopener" class="mycode_url">Continue Reading...</a></blockquote>
]]></description>
			<content:encoded><![CDATA[<blockquote class="mycode_quote"><cite>Quote:</cite>If you use the popular messaging service WhatsApp, you know that you can only add contacts to the service with a phone number. Don’t have the number registered to a WhatsApp account? Then you can’t add the contact to the app.<br />
<br />
Clearly, having to share your phone number is not always a good idea. While you may not have any issues sharing it with close friends or family, giving it to others is another matter.<br />
<br />
It is a privacy and security issue. Other messengers support usernames, which do not reveal critical information to a third-party.<br />
<br />
WhatsApp started to work on usernames about three years ago, but the Meta-owned app is just about to start rolling the feature out to a first batch of users, <a href="https://wabetainfo.com/whatsapp-is-rolling-out-the-username-feature-on-android-and-ios/" target="_blank" rel="noopener" class="mycode_url">reports WABetaInfo</a>.<br />
<br />
You can add a username in the settings. Once you do, you may share the username with others to get them to add you to the messenger. Good news is that you can further protect the username with a code, which others need to provide when they try to add you.<br />
<br />
However, there are quite a few limitations regarding usernames. Here are noteworthy ones:<ul class="mycode_list"><li>The username can be between 3 and 23 characters in length.<br />
</li>
<li>It needs to start with a letter, and can only contain letters, numbers, underscore, and a period.<br />
</li>
<li>It can’t be a domain name or start with www.<br />
</li>
<li>It can’t be taken, if someone on Instagram or Facebook picked it already. The user who picked it can get it on WhatsApp.<br />
</li>
</ul>
<a href="https://chipp.in/security-privacy/whatsapp-is-rolling-out-long-overdue-username-privacy-feature/" target="_blank" rel="noopener" class="mycode_url">Continue Reading...</a></blockquote>
]]></content:encoded>
		</item>
		<item>
			<title><![CDATA[Apple Releases iOS 26.4.1 and iPadOS 26.4.1 With Bug Fixes]]></title>
			<link>https://www.geeks.fyi/showthread.php?tid=21792</link>
			<pubDate>Thu, 09 Apr 2026 12:41:39 +0000</pubDate>
			<dc:creator><![CDATA[<a href="https://www.geeks.fyi/member.php?action=profile&uid=1322">harlan4096</a>]]></dc:creator>
			<guid isPermaLink="false">https://www.geeks.fyi/showthread.php?tid=21792</guid>
			<description><![CDATA[<blockquote class="mycode_quote"><cite>Quote:</cite><span style="font-weight: bold;" class="mycode_b">Apple Releases iOS 26.4.1 and iPadOS 26.4.1 With Bug Fixes</span><br />
<br />
Apple today released minor iOS 26.4.1 and iPadOS 26.4.1 software updates for the iPhone and iPad, respectively. The updates have a build number of 23E254, and they arrive a little more than two weeks after Apple released iOS 26.4 and iPadOS 26.4.<br />
<br />
According to Apple's release notes, the software updates contain unspecified "bug fixes."<br />
<br />
The updates do not include any security fixes, according to Apple's website.<br />
<br />
<a href="https://www.macrumors.com/2026/04/08/apple-releases-ios-26-4-1/" target="_blank" rel="noopener" class="mycode_url">Apple Releases iOS 26.4.1 and iPadOS 26.4.1 With Bug Fixes</a><br />
<br />
<a href="https://9to5mac.com/2026/04/08/iphone-icloud-sync-bug-apple-passwords-fixed/" target="_blank" rel="noopener" class="mycode_url">iOS 26.4.1 fixes iPhone bug that stopped iCloud data from syncing, including Apple Passwords - 9</a></blockquote>
]]></description>
			<content:encoded><![CDATA[<blockquote class="mycode_quote"><cite>Quote:</cite><span style="font-weight: bold;" class="mycode_b">Apple Releases iOS 26.4.1 and iPadOS 26.4.1 With Bug Fixes</span><br />
<br />
Apple today released minor iOS 26.4.1 and iPadOS 26.4.1 software updates for the iPhone and iPad, respectively. The updates have a build number of 23E254, and they arrive a little more than two weeks after Apple released iOS 26.4 and iPadOS 26.4.<br />
<br />
According to Apple's release notes, the software updates contain unspecified "bug fixes."<br />
<br />
The updates do not include any security fixes, according to Apple's website.<br />
<br />
<a href="https://www.macrumors.com/2026/04/08/apple-releases-ios-26-4-1/" target="_blank" rel="noopener" class="mycode_url">Apple Releases iOS 26.4.1 and iPadOS 26.4.1 With Bug Fixes</a><br />
<br />
<a href="https://9to5mac.com/2026/04/08/iphone-icloud-sync-bug-apple-passwords-fixed/" target="_blank" rel="noopener" class="mycode_url">iOS 26.4.1 fixes iPhone bug that stopped iCloud data from syncing, including Apple Passwords - 9</a></blockquote>
]]></content:encoded>
		</item>
		<item>
			<title><![CDATA[VeraCrypt developer claims that Microsoft has terminated his account]]></title>
			<link>https://www.geeks.fyi/showthread.php?tid=21791</link>
			<pubDate>Thu, 09 Apr 2026 12:22:15 +0000</pubDate>
			<dc:creator><![CDATA[<a href="https://www.geeks.fyi/member.php?action=profile&uid=1322">harlan4096</a>]]></dc:creator>
			<guid isPermaLink="false">https://www.geeks.fyi/showthread.php?tid=21791</guid>
			<description><![CDATA[<blockquote class="mycode_quote"><cite>Quote:</cite>VeraCrypt is a popular cross-platform encryption software that is available for Windows, Linux and macOS. It is one of the successors of TrueCrypt and can be used to encrypt hard drives, including system drives, and to create data containers on drive that are encrypted.<br />
<br />
The developer of the application, Mounir Idrassi, <a href="https://sourceforge.net/p/veracrypt/discussion/general/thread/9620d7a4b3/#09" target="_blank" rel="noopener" class="mycode_url">published a project update</a> on Sourceforge a few days ago. There, he explained why the project had been silent for the past few months.<br />
<br />
According to his description, Microsoft terminated the account that he used to sign Windows drivers and the bootloader. This affects the Windows version of the encryption software, as updates can’t be signed anymore because of this. The Linux and macOS versions of the software are not affected by this.<br />
<br />
To make matters worse, a screenshot with a message by Microsoft suggests that an appeal is not available. It is unclear what that means for the project. While a solution may be found eventually, likely through enough outside pressure to get a Microsoft representative to look at the case, it is certainly problematic when a company that operates its own encryption software — Microsoft with BitLocker — is blocking a competitor from releasing updates for his.<br />
<br />
<a href="https://chipp.in/software/windows/veracrypt-developer-claims-that-microsoft-has-terminated-his-account/" target="_blank" rel="noopener" class="mycode_url">Continue Reading...</a></blockquote>
]]></description>
			<content:encoded><![CDATA[<blockquote class="mycode_quote"><cite>Quote:</cite>VeraCrypt is a popular cross-platform encryption software that is available for Windows, Linux and macOS. It is one of the successors of TrueCrypt and can be used to encrypt hard drives, including system drives, and to create data containers on drive that are encrypted.<br />
<br />
The developer of the application, Mounir Idrassi, <a href="https://sourceforge.net/p/veracrypt/discussion/general/thread/9620d7a4b3/#09" target="_blank" rel="noopener" class="mycode_url">published a project update</a> on Sourceforge a few days ago. There, he explained why the project had been silent for the past few months.<br />
<br />
According to his description, Microsoft terminated the account that he used to sign Windows drivers and the bootloader. This affects the Windows version of the encryption software, as updates can’t be signed anymore because of this. The Linux and macOS versions of the software are not affected by this.<br />
<br />
To make matters worse, a screenshot with a message by Microsoft suggests that an appeal is not available. It is unclear what that means for the project. While a solution may be found eventually, likely through enough outside pressure to get a Microsoft representative to look at the case, it is certainly problematic when a company that operates its own encryption software — Microsoft with BitLocker — is blocking a competitor from releasing updates for his.<br />
<br />
<a href="https://chipp.in/software/windows/veracrypt-developer-claims-that-microsoft-has-terminated-his-account/" target="_blank" rel="noopener" class="mycode_url">Continue Reading...</a></blockquote>
]]></content:encoded>
		</item>
		<item>
			<title><![CDATA[Google Chrome Rolls Out Vertical Tabs and Full-Page Reading Mode to All Users]]></title>
			<link>https://www.geeks.fyi/showthread.php?tid=21790</link>
			<pubDate>Thu, 09 Apr 2026 12:21:05 +0000</pubDate>
			<dc:creator><![CDATA[<a href="https://www.geeks.fyi/member.php?action=profile&uid=1322">harlan4096</a>]]></dc:creator>
			<guid isPermaLink="false">https://www.geeks.fyi/showthread.php?tid=21790</guid>
			<description><![CDATA[<blockquote class="mycode_quote"><cite>Quote:</cite><a href="https://www.ghacks.net/category/companies/google/" target="_blank" rel="noopener" class="mycode_url">Google</a> has begun a broad rollout of <span style="font-weight: bold;" class="mycode_b">vertical tabs</span> and an updated <span style="font-weight: bold;" class="mycode_b">full-page Reading Mode</span> in <a href="https://www.ghacks.net/2026/03/04/google-will-release-chrome-updates-every-2-weeks-starting-september-2026/" target="_blank" rel="noopener" class="mycode_url">Chrome</a>, making both features available without the need to enable experimental flags. The rollout is happening gradually and is tied to <span style="font-weight: bold;" class="mycode_b">Chrome 146</span>. Users who do not see either feature immediately may need to wait until the update reaches their installation.<br />
<br />
Vertical tabs were previously limited to Chrome Beta following their announcement in January 2026. The Reading Mode update is being announced alongside the changes to the tab layout.<br />
<br />
<span style="font-weight: bold;" class="mycode_b">How Vertical Tabs Work in Google Chrome</span><br />
<br />
<img src="https://www.ghacks.net/wp-content/uploads/2026/04/Blog_Header_Final.width-2200.format-webp-scaled.webp" loading="lazy"  alt="[Image: Blog_Header_Final.width-2200.format-webp-scaled.webp]" class="mycode_img" /><br />
<br />
Vertical tabs in Chrome move the tab strip from the top of the window to a sidebar on the left side. Each tab shows full page titles, making it easier to identify and manage multiple open tabs. Google says this layout is designed for multitasking.<br />
<br />
To turn on vertical tabs, right-click on any Chrome window and select <span style="font-weight: bold;" class="mycode_b">"Show Tabs Vertically."</span> To switch back to the horizontal layout, right-click inside the vertical tab panel and choose <span style="font-weight: bold;" class="mycode_b">"Show tabs at the top."</span><br />
<br />
<a href="https://www.ghacks.net/2026/04/08/google-chrome-rolls-out-vertical-tabs-and-full-page-reading-mode-to-all-users/" target="_blank" rel="noopener" class="mycode_url">Continue Reading...</a></blockquote>
]]></description>
			<content:encoded><![CDATA[<blockquote class="mycode_quote"><cite>Quote:</cite><a href="https://www.ghacks.net/category/companies/google/" target="_blank" rel="noopener" class="mycode_url">Google</a> has begun a broad rollout of <span style="font-weight: bold;" class="mycode_b">vertical tabs</span> and an updated <span style="font-weight: bold;" class="mycode_b">full-page Reading Mode</span> in <a href="https://www.ghacks.net/2026/03/04/google-will-release-chrome-updates-every-2-weeks-starting-september-2026/" target="_blank" rel="noopener" class="mycode_url">Chrome</a>, making both features available without the need to enable experimental flags. The rollout is happening gradually and is tied to <span style="font-weight: bold;" class="mycode_b">Chrome 146</span>. Users who do not see either feature immediately may need to wait until the update reaches their installation.<br />
<br />
Vertical tabs were previously limited to Chrome Beta following their announcement in January 2026. The Reading Mode update is being announced alongside the changes to the tab layout.<br />
<br />
<span style="font-weight: bold;" class="mycode_b">How Vertical Tabs Work in Google Chrome</span><br />
<br />
<img src="https://www.ghacks.net/wp-content/uploads/2026/04/Blog_Header_Final.width-2200.format-webp-scaled.webp" loading="lazy"  alt="[Image: Blog_Header_Final.width-2200.format-webp-scaled.webp]" class="mycode_img" /><br />
<br />
Vertical tabs in Chrome move the tab strip from the top of the window to a sidebar on the left side. Each tab shows full page titles, making it easier to identify and manage multiple open tabs. Google says this layout is designed for multitasking.<br />
<br />
To turn on vertical tabs, right-click on any Chrome window and select <span style="font-weight: bold;" class="mycode_b">"Show Tabs Vertically."</span> To switch back to the horizontal layout, right-click inside the vertical tab panel and choose <span style="font-weight: bold;" class="mycode_b">"Show tabs at the top."</span><br />
<br />
<a href="https://www.ghacks.net/2026/04/08/google-chrome-rolls-out-vertical-tabs-and-full-page-reading-mode-to-all-users/" target="_blank" rel="noopener" class="mycode_url">Continue Reading...</a></blockquote>
]]></content:encoded>
		</item>
		<item>
			<title><![CDATA[Microsoft Fixes Broken Windows 11 Start Menu Search Caused by Faulty Bing Server Upda]]></title>
			<link>https://www.geeks.fyi/showthread.php?tid=21789</link>
			<pubDate>Thu, 09 Apr 2026 12:19:49 +0000</pubDate>
			<dc:creator><![CDATA[<a href="https://www.geeks.fyi/member.php?action=profile&uid=1322">harlan4096</a>]]></dc:creator>
			<guid isPermaLink="false">https://www.geeks.fyi/showthread.php?tid=21789</guid>
			<description><![CDATA[<blockquote class="mycode_quote"><cite>Quote:</cite><a href="https://www.ghacks.net/category/companies/microsoft-companies/page/3/" target="_blank" rel="noopener" class="mycode_url">Microsoft</a> has released a server-side fix for a known issue that affected Start Menu search on some <a href="https://www.ghacks.net/2026/03/10/windows-11-pro-features-every-modern-worker-should-enable-in-2026/" target="_blank" rel="noopener" class="mycode_url">Windows 11</a> 23H2 devices. The problem started on <span style="font-weight: bold;" class="mycode_b">April 6</span> and was linked to a Bing update aimed at improving search performance. Microsoft has rolled back the update and reports that search failures are decreasing as the fix takes effect.<br />
<br />
An investigation found that the issue coincided with a server-side Bing update meant to improve search performance. To fix the problem, the update was rolled back, and reports of search failures are gradually declining, according to a Windows release health update from Microsoft.<br />
<br />
<span style="font-weight: bold;" class="mycode_b">How Microsoft’s Fix Reaches Affected Devices</span><br />
<br />
Affected devices show blank or non-functional results when using the Start Menu search. Microsoft states that the issue is limited to a small number of users, but reports of similar problems have been shared online for several months. These reports include cases of blank search results that remain clickable even though they do not display any content.<br />
<br />
No manual update installation is necessary. The fix is deployed automatically as a server-side change. Microsoft notes that two conditions must be met for the fix to apply: the device must be connected to the internet, and Web Search must not have been disabled via Group Policy. Devices that meet both conditions will receive the fix automatically.<br />
<br />
<a href="https://www.ghacks.net/2026/04/09/microsoft-fixes-broken-windows-11-start-menu-search-caused-by-faulty-bing-server-update/" target="_blank" rel="noopener" class="mycode_url">Continue Reading...</a></blockquote>
]]></description>
			<content:encoded><![CDATA[<blockquote class="mycode_quote"><cite>Quote:</cite><a href="https://www.ghacks.net/category/companies/microsoft-companies/page/3/" target="_blank" rel="noopener" class="mycode_url">Microsoft</a> has released a server-side fix for a known issue that affected Start Menu search on some <a href="https://www.ghacks.net/2026/03/10/windows-11-pro-features-every-modern-worker-should-enable-in-2026/" target="_blank" rel="noopener" class="mycode_url">Windows 11</a> 23H2 devices. The problem started on <span style="font-weight: bold;" class="mycode_b">April 6</span> and was linked to a Bing update aimed at improving search performance. Microsoft has rolled back the update and reports that search failures are decreasing as the fix takes effect.<br />
<br />
An investigation found that the issue coincided with a server-side Bing update meant to improve search performance. To fix the problem, the update was rolled back, and reports of search failures are gradually declining, according to a Windows release health update from Microsoft.<br />
<br />
<span style="font-weight: bold;" class="mycode_b">How Microsoft’s Fix Reaches Affected Devices</span><br />
<br />
Affected devices show blank or non-functional results when using the Start Menu search. Microsoft states that the issue is limited to a small number of users, but reports of similar problems have been shared online for several months. These reports include cases of blank search results that remain clickable even though they do not display any content.<br />
<br />
No manual update installation is necessary. The fix is deployed automatically as a server-side change. Microsoft notes that two conditions must be met for the fix to apply: the device must be connected to the internet, and Web Search must not have been disabled via Group Policy. Devices that meet both conditions will receive the fix automatically.<br />
<br />
<a href="https://www.ghacks.net/2026/04/09/microsoft-fixes-broken-windows-11-start-menu-search-caused-by-faulty-bing-server-update/" target="_blank" rel="noopener" class="mycode_url">Continue Reading...</a></blockquote>
]]></content:encoded>
		</item>
		<item>
			<title><![CDATA[Qualcomm Snapdragon X2 Elite Review Roundup]]></title>
			<link>https://www.geeks.fyi/showthread.php?tid=21788</link>
			<pubDate>Wed, 08 Apr 2026 07:55:16 +0000</pubDate>
			<dc:creator><![CDATA[<a href="https://www.geeks.fyi/member.php?action=profile&uid=1322">harlan4096</a>]]></dc:creator>
			<guid isPermaLink="false">https://www.geeks.fyi/showthread.php?tid=21788</guid>
			<description><![CDATA[<blockquote class="mycode_quote"><cite>Quote:</cite><span style="font-weight: bold;" class="mycode_b">Snapdragon X2, second time the charm?</span><br />
<br />
<img src="https://cdn.videocardz.com/1/2026/02/ZENBOOK-SORA-QUALCOMM-SNAPDRAGON-X2-HERO-1200x624.jpg" loading="lazy"  alt="[Image: ZENBOOK-SORA-QUALCOMM-SNAPDRAGON-X2-HERO-1200x624.jpg]" class="mycode_img" /><br />
<br />
Unfortunately, review coverage once again appears limited to the largest media outlets, so there is little point looking for smaller channels or niche sites covering this launch right now. In fact, it took longer than expected to put this roundup together simply because the first wave is so concentrated.<br />
<br />
<span style="font-weight: bold;" class="mycode_b">Qualcomm’s Snapdragon X2 Elite</span> is the company’s next-generation Arm chip for premium Windows laptops, and the model getting the most attention today is the <span style="font-weight: bold;" class="mycode_b">Snapdragon X2 Elite Extreme.</span> It brings an 18-core CPU and an 80 TOPS NPU, but this launch is also heavily tied to ASUS, because most of the <span style="font-weight: bold;" class="mycode_b">early reviews are based on the new Zenbook A16.</span> Just like the last Snapdragon launch, the first round of coverage is showing the platform through one system more than through a broad lineup of laptops.<br />
<br />
So far, the reviews are broadly aligned. Most outlets point to stronger CPU performance, good battery life, a light design for a 16-inch laptop, and a solid OLED panel. At the same time, the usual Windows on Arm limits are still part of the discussion, especially around app support and gaming.<br />
<br />
<a href="https://videocardz.com/226961/qualcomm-snapdragon-x2-elite-review-roundup" target="_blank" rel="noopener" class="mycode_url">Continue Reading...</a></blockquote>
]]></description>
			<content:encoded><![CDATA[<blockquote class="mycode_quote"><cite>Quote:</cite><span style="font-weight: bold;" class="mycode_b">Snapdragon X2, second time the charm?</span><br />
<br />
<img src="https://cdn.videocardz.com/1/2026/02/ZENBOOK-SORA-QUALCOMM-SNAPDRAGON-X2-HERO-1200x624.jpg" loading="lazy"  alt="[Image: ZENBOOK-SORA-QUALCOMM-SNAPDRAGON-X2-HERO-1200x624.jpg]" class="mycode_img" /><br />
<br />
Unfortunately, review coverage once again appears limited to the largest media outlets, so there is little point looking for smaller channels or niche sites covering this launch right now. In fact, it took longer than expected to put this roundup together simply because the first wave is so concentrated.<br />
<br />
<span style="font-weight: bold;" class="mycode_b">Qualcomm’s Snapdragon X2 Elite</span> is the company’s next-generation Arm chip for premium Windows laptops, and the model getting the most attention today is the <span style="font-weight: bold;" class="mycode_b">Snapdragon X2 Elite Extreme.</span> It brings an 18-core CPU and an 80 TOPS NPU, but this launch is also heavily tied to ASUS, because most of the <span style="font-weight: bold;" class="mycode_b">early reviews are based on the new Zenbook A16.</span> Just like the last Snapdragon launch, the first round of coverage is showing the platform through one system more than through a broad lineup of laptops.<br />
<br />
So far, the reviews are broadly aligned. Most outlets point to stronger CPU performance, good battery life, a light design for a 16-inch laptop, and a solid OLED panel. At the same time, the usual Windows on Arm limits are still part of the discussion, especially around app support and gaming.<br />
<br />
<a href="https://videocardz.com/226961/qualcomm-snapdragon-x2-elite-review-roundup" target="_blank" rel="noopener" class="mycode_url">Continue Reading...</a></blockquote>
]]></content:encoded>
		</item>
		<item>
			<title><![CDATA[Report: Windows has a new 0-day vulnerability called BlueHammer]]></title>
			<link>https://www.geeks.fyi/showthread.php?tid=21787</link>
			<pubDate>Wed, 08 Apr 2026 07:48:54 +0000</pubDate>
			<dc:creator><![CDATA[<a href="https://www.geeks.fyi/member.php?action=profile&uid=1322">harlan4096</a>]]></dc:creator>
			<guid isPermaLink="false">https://www.geeks.fyi/showthread.php?tid=21787</guid>
			<description><![CDATA[<blockquote class="mycode_quote"><cite>Quote:</cite>The next Windows Patch Day is just a week away and it is unclear whether it will include a fix for a recently disclosed 0-day vulnerability.<br />
<br />
The new security vulnerability has been <a href="https://github.com/Nightmare-Eclipse/BlueHammer" target="_blank" rel="noopener" class="mycode_url">disclosed on GitHub</a>, including proof of concept code to exploit the issue. However, there is no explanation how the issue works.<br />
<br />
Well-known security researcher <a href="https://infosec.exchange/@wdormann/116358064691025711" target="_blank" rel="noopener" class="mycode_url">Will Dormann commented</a> on the issue and confirmed that it is working. He admitted that it “may not be 100%” reliable though. It seems that frustration with MSRC, the Microsoft Security Research Center, and how it operates, was the reason for the public disclosure of the vulnerability. Whether that is true or not can’t be verified though.<br />
<br />
So, what do we know about the vulnerability so far?<ul class="mycode_list"><li><span style="font-weight: bold;" class="mycode_b">What it is:</span> “BlueHammer” is an unpatched zero-day Local Privilege Escalation (LPE) vulnerability affecting Microsoft Windows.<br />
</li>
<li><span style="font-weight: bold;" class="mycode_b">Impact</span>: It allows a local attacker with limited, low-level user access to escalate their permissions to SYSTEM or elevated administrator rights. This effectively grants the attacker full control over the compromised machine.<br />
</li>
<li><span style="font-weight: bold;" class="mycode_b">Current Status</span>: Microsoft has not yet released an official patch or mitigation, making it a true zero-day.<br />
</li>
</ul>
<a href="https://chipp.in/software/windows/report-windows-has-a-new-0-day-vulnerability-called-bluehammer/" target="_blank" rel="noopener" class="mycode_url">Continue Reading...</a></blockquote>
]]></description>
			<content:encoded><![CDATA[<blockquote class="mycode_quote"><cite>Quote:</cite>The next Windows Patch Day is just a week away and it is unclear whether it will include a fix for a recently disclosed 0-day vulnerability.<br />
<br />
The new security vulnerability has been <a href="https://github.com/Nightmare-Eclipse/BlueHammer" target="_blank" rel="noopener" class="mycode_url">disclosed on GitHub</a>, including proof of concept code to exploit the issue. However, there is no explanation how the issue works.<br />
<br />
Well-known security researcher <a href="https://infosec.exchange/@wdormann/116358064691025711" target="_blank" rel="noopener" class="mycode_url">Will Dormann commented</a> on the issue and confirmed that it is working. He admitted that it “may not be 100%” reliable though. It seems that frustration with MSRC, the Microsoft Security Research Center, and how it operates, was the reason for the public disclosure of the vulnerability. Whether that is true or not can’t be verified though.<br />
<br />
So, what do we know about the vulnerability so far?<ul class="mycode_list"><li><span style="font-weight: bold;" class="mycode_b">What it is:</span> “BlueHammer” is an unpatched zero-day Local Privilege Escalation (LPE) vulnerability affecting Microsoft Windows.<br />
</li>
<li><span style="font-weight: bold;" class="mycode_b">Impact</span>: It allows a local attacker with limited, low-level user access to escalate their permissions to SYSTEM or elevated administrator rights. This effectively grants the attacker full control over the compromised machine.<br />
</li>
<li><span style="font-weight: bold;" class="mycode_b">Current Status</span>: Microsoft has not yet released an official patch or mitigation, making it a true zero-day.<br />
</li>
</ul>
<a href="https://chipp.in/software/windows/report-windows-has-a-new-0-day-vulnerability-called-bluehammer/" target="_blank" rel="noopener" class="mycode_url">Continue Reading...</a></blockquote>
]]></content:encoded>
		</item>
	</channel>
</rss>