Windows 10 October 2018 Update: removed or no longer developing features

Before the release of the new Windows 10 October 2018 Update (version 1809), Microsoft published the list of removed or planned for replacement features.

Removed features:

  • Business Scanning, also called Distributed Scan Management (DSM);
  • FontSmoothing setting in unattend.xml;
  • Hologram app;
  • limpet.exe;
  • Phone Companion;
  • Trusted Platform Module (TPM) management console;
  • Future updates through Windows Embedded Developer Update for Windows Embedded Standard 8 and Windows Embedded 8 Standard.

No longer developing features:

  • Companion device dynamic lock APIS;
  • OneSync service;
  • Snipping Tool.

Microsoft Windows Server 2016 certification exam

Our specialists continue to confirm their qualifications: we congratulate our colleague Andrii on the successful passing of the 70-740 Installation, Storage and Compute with Windows Server 2016 exam. This exam tests the knowledge about installation, storage, and compute functionalities available in Windows Server 2016. Candidates perform general installation tasks, including installing and configuring Nano Server, as well as creating and managing images for deployment.

Our team certificates.

Microsoft certifications

Microsoft Windows 0-day vulnerability in the ALPC interface

Information about 0-day vulnerability was first disclosed in Twitter by independent security researcher. The CERT / CC specialist confirmed that Windows Task Scheduler contains a local privilege escalation vulnerability in the ALPC interface. Public exploit code works on 64-bit Windows 10 and Windows Server 2016 systems, and with minor modifications with 32-bit Windows 10. Security consultancy Acros Security released unofficial patch for the 64-bit version of Windows 10 on its 0patch platform.

Hackers exploited D-Link routers to steal personal data

Radware researchers found that the attackers used the vulnerability of some D-Link routers to modify remotely DNS server settings. Malicious DNS server IPs used in the exploit were 69.162.89.185. and 198.50.222.136. Banco de Brasil and Unibanco сustomers were redirected to the fake malicious website that requested his personal data. Experts say that these attacks are very unique because they don’t require any user interaction: the hijacking works without crafting or changing URLs in the user’s browser, attackers don’t send phishing emails and no changes are required on the computer.