In need of Computer or OS Help? Please bookmark this page!

Ace Help copy

Ace News Feature: Do you have  a problem with your PC we can offer help and guidance. Just add your details if you are a WordPress blogger in the box provided on this site.

I will reply and give you any advice on the problem or get qualified staff member will help as much as they can.

I can also offer quality parts and software or even best priced computers from our own AceiShop

So if you need help with any PC/Laptop/Tablet or Phone or assistance with open source, Windows OS on either Apple or Android.

Just leave your question and someone will try and help. We will start a Skype for this soon so if we need to help via Audio or remote assistance we can offer this service if required and of course a Twitter account and maybe a Facebook page if it gets busy.

For now, please know we are happy to help

So need help ……. Call PC Help Services on Business Line: 07504-495160 if your in the UK or add +44 then my number or alternatively Email: me at acepchelp@virginmedia.com if not leave a message on here in comment box of how to contact you.      

Regards Ian

Editors Notes:

I would remind you that this blog is produced free for the public good and you are welcome to republish or re-use this article or any other material freely anywhere without requesting further permission.

News & Views welcome always published as long as NO bad language or is not related to subject matter. 

To keep online information secure, experts recommend keeping your social media accounts private, changing your passwords often, and never answering unsolicited emails or phone calls asking for your personal information. Need help and guidance visit https://acepchelp.wordpress.com and leave a comment or send a private message on Telegram @Aceone31

Ace News Services Site Links Listed Here: 

AceTweet This News  

Ace Worldwide News Group 

#ace-news-feature, #ace-news-services, #acepchelp, #pc-help, #twitter

Advertisements

Microsoft building Chrome-based browser to replace Edge on Windows 10 ‘ Codenamed Anaheim ‘ The Hackers News #AcePCHelpDesk reports

It is no secret how miserably Microsoft’s 3-year-old Edge web browser has failed to compete against Google Chrome despite substantial investment and continuous improvements: According to the latest round of tech rumors, Microsoft has given up on Edge and reportedly building a new Chromium-based web browser, dubbed project codename “Anaheim” internally, that will replace Edge on Windows 10 #AcePCDesk reports

Source: https://t.me/TheHackerNewsRSS/1062 Published: December.04:

Editor says #AceNewsDesk reports & #Brittius says are provided by Sterling Publishing & Media News and all our posts, links can be found at here Live Feeds https://acenewsroom.wordpress.com/ Ace News Services Posts https://t.me/AceSocialNews_Bot and thanks for following as always appreciate every like, reblog or retweet and free help and guidance tips on your PC software or need help & guidance from our experts AcePCHelp.WordPress.Com or you can follow our breaking news posts on AceBreakingNews.WordPress.Com or become a member on Telegram https://t.me/acebreakingnews all private chat messaging on here https://t.me/sharingandcaring

Tor Browser Gets a Redesign, Switches To New Firefox Quantum Engine: It has rolled out a new interface with the release of V8 #AcePCHelpDesk reports

#AcePCHelpReports – Sept.06: The Tor Browser has always been based on the Firefox codebase, but it lagged behind a few releases: Mozilla rolled out a major overhaul of the Firefox codebase in November 2017, with the release of Firefox 57, the first release in the Firefox Quantum series #AcePCHelpDesk reports

Firefox Quantum came with a new page rendering engine, a new add-ons API, and a new user interface called the Photon UI: Because these were major, code-breaking changes, it took the smaller Tor team some time to integrate all of them into the Tor Browser codebase and make sure everything worked as intended.

The new Tor Browser 8, released yesterday, is now in sync with the most recent version of Firefox, the Quantum release, and also supports all of its features: This means the Tor Browser now uses the same modern Photon UI that current Firefox versions use, it supports the same speed-optimized page rendering engine and has also dropped support for the old XUL-based add-ons system for the new WebExtensions API system used by Chrome, Opera, Vivaldi, Brave, and the rest of the Chromium browsers

Source: #AceTelegramNews https://t.me/acenewsgroup/752383 Published on September 06, 2018 at 08:00AM

Editor says #AceNewsDesk reports & #Brittius says are provided by Sterling Publishing & Media News and all our posts, links can be found at here Live Feeds https://acenewsroom.wordpress.com/ Ace News Services Posts https://t.me/AceSocialNews_Bot and thanks for following as always appreciate every like, reblog or retweet and free help and guidance tips on your PC software or need help & guidance from our experts AcePCHelp.WordPress.Com or you can follow our breaking news posts on AceBreakingNews.WordPress.Com or become a member on Telegram https://t.me/acebreakingnews all private chat messaging on here https://t.me/sharingandcaring

Adobe and Microsoft each released security updates for their software on Tuesday. Adobe Flash Player browser plugin, reader and acrobat and Microsoft pushed 17 updates in Windows and other software, including two “zero-day” flaws that attackers were already exploiting before Microsoft issued patches #Ace PCHelp reports

Adobe and Microsoft each released security updates for their software on Tuesday. Adobe plugged five security holes in its Flash Player browser plugin. Microsoft pushed 17 updates to fix at least 60 vulnerabilities in Windows and other software, including two “zero-day” flaws that attackers were already exploiting before Microsoft issued patches to fix them.

According to security firm Ivanti, the first of the two zero-day flaws (CVE-2018-8373) is a critical flaw in Internet Explorer that attackers could use to foist malware on IE users who browse to hacked or booby-trapped sites. The other zero-day is a bug (CVE-2018-8414) in the Windows 10 shell that could allow an attacker to run code of his choice.

Microsoft also patched more variants of the Meltdown/Spectre memory vulnerabilities, collectively dubbed “Foreshadow” by a team of researchers who discovered and reported the Intel-based flaws. For more information about how Foreshadow works, check out their academic paper (PDF), and/or the video below. Microsoft’s analysis is here.

One nifty little bug fixed in this patch batch is CVE-2018-8345. It addresses a problem in the way Windows handles shortcut files; ending in the “.lnk” extension, shortcut files are Windows components that link (hence the “lnk” extension) easy-to-recognize icons to specific executable programs, and are typically placed on the user’s Desktop or Start Menu.

That description of a shortcut file was taken verbatim from the first widely read report on what would later be dubbed the Stuxnet worm, which also employed an exploit for a weakness in the way Windows handled shortcut (.lnk) files. According to security firm Qualys, this patch should be prioritized for both workstations and servers, as the user does not need to click the file to exploit. “Simply viewing a malicious LNK file can execute code as the logged-in user,” Qualys’ Jimmy Graham wrote.

Not infrequently, Redmond ships updates that end up causing stability issues for some users, and it doesn’t hurt to wait a day or two before seeing if any major problems are reported with new updates before installing them. Microsoft doesn’t make it easy for Windows 10 users to change this setting, but it is possible. For all other Windows OS users, if you’d rather be alerted to new updates when they’re available so you can choose when to install them, there’s a setting for that in Windows Update.

It’s a good idea to get in the habit of backing up your computer before applying monthly updates from Microsoft. Windows has some built-in tools that can help recover from bad patches, but restoring the system to a backup image taken just before installing updates is often much less hassle and an added peace of mind while you’re sitting there praying for the machine to reboot successfully after patching.

Adobe’s Flash update brings the program to v. 30.0.0.154 for Windows, macOS, Chrome and Linux. Most readers here know how I feel about Flash, which is a major security liability and a frequent target of browser-based attacks. The updates from Microsoft include these Flash fixes for IE, and Google Chrome has already pushed an update to address these five Flash flaws (although a browser restart may be needed).

But seriously, if you don’t have a specific need for Flash, just disable it already. Chrome is set to ask before playing Flash objects, but disabling Flash in Chrome is simple enough. Paste “chrome://settings/content” into a Chrome browser bar and then select “Flash” from the list of items. By default it should be set to “Ask first” before running Flash, although users also can disable Flash entirely here or whitelist and blacklist specific sites.

By default, Mozilla Firefox on Windows computers with Flash installed runs Flash in a “protected mode,” which prompts the user to decide if they want to enable the plugin before Flash content runs on a Web site.

Adobe also released security updates for its PDF Reader and Acrobat products.

Source: Courtesy: Krebssecurity.Com/ This entry was posted on Wednesday, August 15th, 2018 at 10:52 am

Editor says #AceNewsDesk reports & #Brittius says are provided by Sterling Publishing & Media News and all our posts, links can be found at here Live Feeds https://acenewsroom.wordpress.com/ Ace News Services Posts https://t.me/AceSocialNews_Bot and thanks for following as always appreciate every like, reblog or retweet and free help and guidance tips on your PC software or need help & guidance from our experts AcePCHelp.WordPress.Com or you can follow our breaking news posts on AceBreakingNews.WordPress.Com or become a member on Telegram https://t.me/acebreakingnews all private chat messaging on here https://t.me/sharingandcaring

Apple Launches iOS 11.3: European Data Protection Regulation GDPR: Launches major privacy push, with software updates across all its devices to introduce new data privacy information immediately, with an updated website offering new privacy management tools to follow in May according to a report on Thursday #AcePCHelpNews

#AceNewsReport – Mar.30: Thursday’s updates (macOS 10.13.4, iOS11.3 and tvOS 11.3) are prompted by the enormous new European data protection regulation GDPR, and have been in the works since at least January: But they come at a good time for the company, whose head Tim Cook has been merrily capitalising on the Facebook/Cambridge Analytica scandal publicly rebuking Mark Zuckerberg over the social network’s business model #AceNewsDesk reports

For users of the company’s devices, the biggest change will be the introduction of a unified data privacy iconography, which now shows up alongside detailed information about how Apple uses personal data for its various first-party services. “Apple believes privacy is a fundamental human right,” the company will tell every user the first time they turn on their devices after the update, “so every Apple product is designed to minimise the collection and use of your data, use on-device processing whenever possible, and provide transparency and control over your information.”

What is GDPR?

For users of the company’s devices, the biggest change will be the introduction of a unified data privacy iconography, which now shows up alongside detailed information about how Apple uses personal data for its various first-party services. “Apple believes privacy is a fundamental human right,” the company will tell every user the first time they turn on their devices after the update, “so every Apple product is designed to minimise the collection and use of your data, use on-device processing whenever possible, and provide transparency and control over your information”.

Although the new features are prompted by GDPR, they are rolling out to users worldwide, and the company proudly notes that it has not had to change any of its software to comply with the new regulations. Unlike competitors such as Google, who operate on the principle that large scale data collection bestows an advantage in areas such as machine learning and transport planning, Apple has repeatedly argued that it has a responsibility to minimise data collection.

Speaking on Wednesday, Cook said “We could make a ton of money if we monetised our customers, if our customers were our product … We’ve elected not to do that. We’re not going to traffic in your personal life. Privacy to us is a human right, a civil liberty.”

In May, shortly before GDPR takes effect, Apple will also update its website to make it easier for users to exercise four key rights granted by the regulation: getting a copy of their data; requesting a correction to their data; deactivating their accounts; and deleting their accounts.

The company sees an opportunity to distinguish from competitors there too: deactivation, in particular, is a much stronger implementation than in other platforms. It removes the user’s information from all aggregated data stores, isolating their accounts but stopping short of deleting them.

Editor says #AceNewsDesk reports & #Brittius says are provided by Sterling Publishing & Media News and all our posts, links can be found at here https://t.me/acenewsdaily and thanks for following as always appreciate every like, reblog or retweet and free help and guidance tips on your PC software or need help & guidance from our experts AcePCHelp.WordPress.Com or you can follow our breaking news posts on AceBreakingNews.WordPress.Com or become a member on Telegram https://t.me/acebreakingnews

Microsoft’s Meltdown Patch Made Windows 7 PCs More Insecure: Meltdown CPU vulnerability was bad, and Microsoft somehow made the flaw even worse on its Windows 7, allowing any unprivileged, user-level application to read content from and even write data to the operating system’s kernel memory #AcePCHelpNews

#AceNewsDesk – Mar.29: For those unaware, Spectre and Meltdown were security flaws disclosed by researchers earlier this year in processors from Intel, ARM, and AMD, leaving nearly every PC, server, and mobile phone on the planet vulnerable to data theft: Shortly after the researchers disclosed the Spectre and Meltdown exploits, software vendors, including Microsoft, started releasing patches for their systems running a vulnerable version of processors #AceNewsDesk reports
microsofts-meltdown-vulnerability

However, an independent Swedish security researcher Ulf Frisk found that Microsoft’s security fixes to Windows 7 PCs for the Meltdown flaw—which could allow attackers to read kernel memory at a speed of 120 KBps—is now allowing attackers to read the same kernel memory at a speed of Gbps, making the issue even worse on Windows 7 PCs and Server 2008 R2 boxes https://t.me/TheHackerNewsRSS/671

Frisk is the same researcher who previously discovered a way to steal the password from virtually any Mac laptop in just 30 sec by exploiting flaws in Apple’s FileVault disk encryption system, allowing attackers to unlock any Mac system and even decrypt files on its hard drive.

The discovery is the latest issue surrounding Meltdown and Spectre patches that were sometimes found incomplete and sometimes broken, making problems such as spontaneous reboots and other ‘unpredictable’ system behavior on affected PCs.

According to Frisk, the problem with MS’ early Meltdown fixes occurs due to a single bit (that controls the permission to access kernel memory) accidentally being flipped from supervisor-only to any-user in a virtual-to-physical-memory translator called PLM4, allowing any user-mode application to access the kernel page tables.

The PML4 is the base of the 4-level in-memory page table hierarchy that Intel’s CPU Memory Management Unit (MMU) uses to translate the virtual memory addresses of a process into physical memory addresses in RAM.

The correctly set bit normally ensures the kernel has exclusive access to these tables.

“The User/Supervisor permission bit was set to User in the PML4 self-referencing entry. This made the page tables available to user mode code in every process. The page tables should normally only be accessible by the kernel itself,” Frisk explains in his blog post.

To prove his claim, Frisk also provided a detailed breakdown and a proof-of-concept exploit. The issue only affects 64-bit versions of Windows 7 and Windows Server 2008 R2, and not Windows 10 or Windows 8.1 PCs, as they still require attackers to have physical access to a targeted system.

Buggy Patch Allows to Read Gigabytes of Data In a Second

Also since the PML4 page table has been located at a fixed memory address in Windows 7, “no fancy exploits” are needed to exploit the Meltdown vulnerability.

“Windows 7 already did the hard work of mapping in the required memory into every running process,” Frisk said. “Exploitation was just a matter of read and write to already mapped in-process virtual memory. No fancy APIs or syscalls required – just standard read and write!”

Once read/write access has been gained to the page tables, it would be “trivially easy” to gain access to the entire physical memory, “unless it is additionally protected by Extended Page Tables (EPTs) used for Virtualization,” Frisk said.

All attackers have to do is to write their own Page Table Entries (PTEs) into the page tables in order to access arbitrary physical memory.

Frisk said he has not been able to link the new vulnerability to anything on the public list of Common Vulnerabilities and Exposures. He also invited researchers to test the flaw using an exploit kit he released on GitHub.

The issue with the Microsoft’s Meltdown patch has been fixed by the company in its March Patch Tuesday, so all admins and users of Windows 7 and Windows 2008R2 are strongly recommended to update their systems as soon as possible.

Editor says #AceNewsDesk reports & #Brittius says are provided by Sterling Publishing & Media News and all our posts, links can be found at here https://t.me/acenewsdaily and thanks for following as always appreciate every like, reblog or retweet and free help and guidance tips on your PC software or need help & guidance from our experts AcePCHelp.WordPress.Com or you can follow our breaking news posts on AceBreakingNews.WordPress.Com or become a member on Telegram https://t.me/acebreakingnews

Released in the stable channel this week, Chrome 65 brings 45 security fixes, including 27 patches for vulnerabilities discovered by external researchers: #AcePCHelpNews

#AceNewsDesk – Mar.10: The browser also includes an updated JavaScript engine, namely V8 version 6.5. Announced in early February and initially made available in Chrome 65 Beta, the new V8 engine includes an untrusted code mode meant to mitigate the latest speculative side-channel attack called Spectre.#AceNewsDesk reports

The 27 vulnerabilities reported by researchers include 9 security flaws assessed with a High severity rating, 15 bugs considered Medium risk, and 3 issues with a Low severity rating.

Google rewarded the researchers over $34,000 in bug bounties, but hasn’t provided details on all payouts in the published advisory.

The most important of the addressed bugs are two High risk use after free in Flash (CVE-2018-6058 and CVE-2018-6059). Both were reported by JieZeng of Tencent Zhanlu Lab in August 2017 and were awarded a $5,000 bounty each.

Google also addressed a Use after free in Blink (CVE-2018-6060) and a Race condition in V8 (CVE-2018-6061) – two High severity flaws awarded $3,000 each –, as well as a Heap buffer overflow in Skia (CVE-2018-6062) – awarded $1,000.

Other High risk issues resolved in Chrome 65 include two incorrect permissions on shared memory bugs, one Type confusion in V8, and one Integer overflow in V8.

The most important of the Medium risk issues was CVE-2018-6066, a Same Origin Bypass via canvas that was awarded a $4,000 bounty.

Other Medium severity issues addressed in this release include Buffer overflow in Skia, Object lifecycle issues in Chrome Custom Tab, Stack buffer overflow in Skia, CSP bypass through extensions, Heap buffer overflow in Skia, Integer overflow in PDFium, Heap buffer overflow in WebGL, and Mark-of-the-Web bypass.

Google also addressed an overly permissive cross origin download, incorrect handling of URL fragment identifiers in Blink, a timing attack using SVG filters, URL Spoof in OmniBox, Information disclosure via texture data in WebGL, and Information disclosure in IPC call.

The three Low risk bugs resolved in the browser include XSS in interstitials, circumvention of port blocking, and incorrect processing of AppManifests.

The new application release is available for download as version Chrome 65.0.3325.146 for Windows, Mac and Linux computers. Chrome for Android has been updated as well, now available as version 65.0.3325.109.

Released in the stable channel this week, Chrome 65 brings 45 security fixes, including 27 patches for vulnerabilities discovered by external researchers http://ift.tt/2tokdr5

Editor says #AceNewsDesk reports & #Brittius says are provided by Sterling Publishing & Media News and all our posts, links can be found at here https://t.me/acenewsdaily and thanks for following as always appreciate every like, reblog or retweet and free help and guidance tips on your PC software or need help & guidance from our experts AcePCHelp.WordPress.Com or you can follow our breaking news posts on AceBreakingNews.WordPress.Com or become a member on Telegram https://t.me/acebreakingnews

You Can Use A VPN To Battle ISP Net Neutrality Abuse: The FCC’s butchery of net neutrality has become law, and people are turning to virtual private networks to preserve their privacy and access: VPN: Why you should hide your IP address ? #AcePCHelpNews

#AceNewsDesk – Mar.03: The Republican-dominated Federal Communications Commission (FCC) has destroyed net neutrality: While there are efforts from the Senate to local governments to restore net neutrality, in the meantime, we’re still stuck with ISPs that can control how much bandwidth we get to a particular site and who can spy on your web traffic. One answer we can use today to reclaim some of our freedom are virtual private networks (VPNs) #AceNewsDesk reports

The need for such services is becoming clear, as ISPs are starting to break net neutrality. AT&T is leading the destruction of net neutrality. Despite its claims to the contrary, AT&T is preparing to implement fast and slow lanes. Its “free” lanes are with the Sponsored Data plan for AT&T video services such as DirecTV Now.

These changes foreshadow more drastic damage to net neutrality. Under the FCC’s new rules, for example, an ISP could charge you more if you watched Netflix instead of Hulu. Or, it could slow your Sling TV video while allowing YouTube TV to run at full speed.

Don’t think ISPs would do this? Think again. It’s already happened. In 2012, AT&T banned Apple FaceTime on its networks. And, in 2014, Verizon slowed down Netflix traffic.

In addition, the Electronic Frontier Foundation (EFF) has pointed out that you can expect your ISP to sell your data to marketers; hijack your searches; snoop through your traffic to add yet more ads; and inject undetectable, non-deletable tracking cookies in all of your HTTP traffic. These are all things ISPs have done before — and free of regulation, they’ll do even more of it.

What can you do? Turn to a VPN.

With a VPN service, your ISP can’t see your your network traffic, so it can’t tell where you’re going or what services you’re using. Verizon, which owns Yahoo, won’t be able to tell, for instance, that you’re using Google for your searches. And, of course, since your ISP can’t read your traffic, it can’t sell your information or place targeted ads in it.

Your ISP should — note I said should — treat your VPN traffic as ordinary traffic. In some countries, notably China and Russia, VPNs are tightly controlled or banned. It’s possible ISPs or President Donald Trump’s government may yet try similar things with US VPNs, but they haven’t tried this yet.

In the meantime, some people have already turned to VPNs to protect themselves from their ISPs. Ariel Hochstadt, former Gmail marketing manager and present internet entrepreneur, noticed that just the FCC’s first moves to kill off net neutrality in April 2017 caused a 170-percent increase in VPN sales. In an interview, David Gorodyansky, CEO of Anchor Free, the parent company of the HotSpot Shield VPN, said he saw a spike in VPN sales after the FCC’s anti-net neutrality moves.

NordVPN claimed, “A VPN service gives access to the internet without throttling and censorship – the way it’s supposed to be.” It’s right.

You Can Use A VPN To Battle ISP Net Neutrality Abuse

#AceRelatedNews

Editor says #AceNewsDesk reports & #Brittius says are provided by Sterling Publishing & Media News and all our posts, links can be found at here https://t.me/acenewsdaily and thanks for following as always appreciate every like, reblog or retweet and free help and guidance tips on your PC software or need help & guidance from our experts AcePCHelp.WordPress.Com or you can follow our breaking news posts on AceBreakingNews.WordPress.Com or become a member on Telegram https://t.me/acebreakingnews