Contact us today!
(469) 567-0181
facebooktwitterlinkedinA PC Geek RSS Feed

David M. Lay

A PC Geek has been serving the Waxahachie area since 2001, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

These 2 Keystrokes are All that’s Needed to Access Windows 10

These 2 Keystrokes are All that’s Needed to Access Windows 10

When someone asks you to troubleshoot a problem, it’s because there is something that is preventing their solutions from working properly, which they need them to do. In business, this happens all the time. This is why every business provides some semblance of support with their product or service. What happens, however, when the act of troubleshooting makes something worse. One security analyst came across this problem in an unlikely place: Microsoft’s newest desktop operating systems, Windows 10.

Sami Laiho, a software and network security expert, and reputed “Microsoft MVP”, discovered that by keying in Shift + F10 during a “Feature Update” (previously known as “Upgrade), a user could access a Command Prompt window with total control over the machine. Making matters worse, current Microsoft updates disable BitLocker while in progress, giving that user complete access to all connected hard disks.

We don’t have to tell you that if that person had nefarious intentions, they would absolutely be able to manipulate the machine through the command-line interface. While this process would have to be completed quickly if a user was to take advantage of this vulnerability, it’s a vulnerability all the same and should be taken into consideration by your organization’s network security support when updating or patching Windows 10.

Lailo has been in contact with Microsoft, which is developing a resolution. Until then, stay vigilant in the management of what users have access to a workstation anytime that “Feature update” is running. When Microsoft finishes their patch for this vulnerability, you will want to immediately want to apply it.

For more information about critical vulnerabilities, patch management, and overall workstation maintenance, call (469) 567-0181 and talk with the IT experts at A PC Geek.



No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Sunday, 26 May 2019
If you'd like to register, please fill in the username, password and name fields.

Sign Up for Our Newsletter

Powered by ChronoForms -

Blog Archive

Free Consultation

Sign up today for a
FREE Network Consultation

How secure is your IT infrastructure?
Let us evaluate it for free!

Sign up Now!


Tag Cloud

Security Tip of the Week Technology Privacy Cloud Best Practices Internet Productivity Microsoft Hackers Malware Software Business Computing Google Business Miscellaneous Workplace Tips Windows 10 Innovation Computer Backup Efficiency Hosted Solutions Windows Hardware IT Services Health Mobile Devices Mobile Computing IT Support User Tips Communication Business Management VoIP Server Network Data Quick Tips Smartphone Email Virtualization Holiday Going Green Save Money Remote Computing Business Continuity Mobile Device Management Operating System Saving Money Social Media Upgrade Office Disaster Recovery Apps Alert Android Chrome Small Business Identity Theft Best Practice Antivirus Employer-Employee Relationship Ransomware The Internet of Things Mobility Big Data Managed Service Provider Microsoft Office Social WiFi Facebook Application Current Events Government Lithium-ion battery Printer Information Technology Spam Bandwidth BYOD Unified Threat Management Hacking Tablet Passwords Analytics Law Enforcement History Gmail Search Office Tips Saving Time Browser Password Work/Life Balance Data Management Streaming Media Money Maintenance Education Hard Drives User Error Fraud communications Computers Disaster Telephone Systems Humor Avoiding Downtime Phone System Router Encryption Apple Recovery Network Security Automation Remote Monitoring Tech Support Gadgets Smartphones Users USB intranet Wireless Firewall Net Neutrality iPhone Collaboration Laptop Budget Online Currency Content Filtering Business Intelligence Wi-Fi Transportation Shortcut Point of Sale Internet Exlporer Flexibility PowerPoint Biometrics Cost Management Social Engineering Retail Telephony Customer Service BDR Entertainment Virtual Reality Google Drive Mobile Office DDoS VPN Office 365 Benefits IT Solutions App Cybercrime Risk Management Personal Information Managing Stress IT Consultant Fax Server Private Cloud Outlook Wireless Technology Data Loss Printer Server Update Managed IT Services Wearable Technology Marketing Proactive IT Administration Compliance Programming Access Presentation Meetings Display Hacker Hosted Solution Science Legal Inbound Marketing Running Cable Phishing Keyboard Emails Audit End of Support Politics Twitter OneNote Robot Networking Hiring/Firing Advertising Scalability Near Field Communication Website Experience RAM OneDrive Data storage Human Resources Ebay Bring Your Own Device PDF Paperless Office Uninterrupted Power Supply How To Blogging Music CPU Workplace Amazon Computer Accessories Text Messaging Miscelllaneous Internet of Things Bloatware IT consulting Books Slow Applications Smart Phones Distributed Denial of Service Mouse Artificial Intelligence HIPAA Sports Black Market Windows 8 Electronic Medical Records Travel Touchpad Branding eWaste Network Congestion Regulations HaaS Instant Messaging ISP WIndows 7 Vendor Management Safety Operating Sysytem 3D Printing Television Storage Battery Files Two-factor Authentication Computing Emergency Bluetooth Trending Cameras Automobile Data Theft Chromecast Customer Relationship Management Prodcuctivity User Cleaning SharePoint Excel Worker Commute CloudSync Online Backup Administrator Best Available Save Time Reputation Teamwork Video Games

Top Blog

Let's look at the definition of disaster. dis·as·ter A calamitous event, especially one occurring suddenly and causing great loss of life, damage, or hardship, as a flood, airplane crash, or business failure.To A PC Geek, a disaster is anything that involves a major loss of data or major downt...