Contact us today!
(469) 567-0181
facebooktwitterlinkedinA PC Geek RSS Feed

David M. Lay

A PC Geek has been serving the Waxahachie area since 2001, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

These 2 Keystrokes are All that’s Needed to Access Windows 10

These 2 Keystrokes are All that’s Needed to Access Windows 10

When someone asks you to troubleshoot a problem, it’s because there is something that is preventing their solutions from working properly, which they need them to do. In business, this happens all the time. This is why every business provides some semblance of support with their product or service. What happens, however, when the act of troubleshooting makes something worse. One security analyst came across this problem in an unlikely place: Microsoft’s newest desktop operating systems, Windows 10.

Sami Laiho, a software and network security expert, and reputed “Microsoft MVP”, discovered that by keying in Shift + F10 during a “Feature Update” (previously known as “Upgrade), a user could access a Command Prompt window with total control over the machine. Making matters worse, current Microsoft updates disable BitLocker while in progress, giving that user complete access to all connected hard disks.

We don’t have to tell you that if that person had nefarious intentions, they would absolutely be able to manipulate the machine through the command-line interface. While this process would have to be completed quickly if a user was to take advantage of this vulnerability, it’s a vulnerability all the same and should be taken into consideration by your organization’s network security support when updating or patching Windows 10.

Lailo has been in contact with Microsoft, which is developing a resolution. Until then, stay vigilant in the management of what users have access to a workstation anytime that “Feature update” is running. When Microsoft finishes their patch for this vulnerability, you will want to immediately want to apply it.

For more information about critical vulnerabilities, patch management, and overall workstation maintenance, call (469) 567-0181 and talk with the IT experts at A PC Geek.



No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Monday, 21 January 2019
If you'd like to register, please fill in the username, password and name fields.

Sign Up for Our Newsletter

Powered by ChronoForms -

Blog Archive

Free Consultation

Sign up today for a
FREE Network Consultation

How secure is your IT infrastructure?
Let us evaluate it for free!

Sign up Now!


Tag Cloud

Security Tip of the Week Technology Privacy Cloud Best Practices Internet Microsoft Productivity Hackers Malware Google Business Software Business Computing Miscellaneous Workplace Tips Windows 10 Efficiency Innovation Computer Backup Hosted Solutions Windows Hardware IT Services Health Mobile Devices Mobile Computing IT Support User Tips Communication VoIP Business Management Virtualization Server Network Smartphone Data Quick Tips Email Holiday Disaster Recovery Apps Alert Save Money Remote Computing Going Green Operating System Business Continuity Mobile Device Management Social Media Upgrade Saving Money Office Android Chrome Small Business Social Facebook Mobility WiFi Identity Theft Application Antivirus Best Practice The Internet of Things Employer-Employee Relationship Big Data Ransomware Managed Service Provider Microsoft Office Analytics History Search Gmail Browser Current Events Law Enforcement Saving Time Government Office Tips Password Lithium-ion battery Printer Information Technology Spam Bandwidth Unified Threat Management BYOD Hacking Tablet Passwords Automation intranet Net Neutrality Firewall iPhone Collaboration Laptop Streaming Media Education User Error Wireless Computers Data Management Disaster Hard Drives Money Maintenance Fraud Avoiding Downtime communications Phone System Work/Life Balance Router Telephone Systems Apple Humor Encryption Gadgets Smartphones Recovery USB Remote Monitoring Users Tech Support Network Security Cybercrime Printer Server Risk Management IT Consultant Office 365 Fax Server Data Loss Managing Stress Private Cloud Marketing Wireless Technology Administration Wearable Technology Update Content Filtering Proactive IT Point of Sale Personal Information PowerPoint Cost Management Online Currency Budget Retail Business Intelligence BDR Transportation Shortcut Managed IT Services Entertainment Internet Exlporer Biometrics Social Engineering Mobile Office Telephony Customer Service Wi-Fi Virtual Reality VPN Google Drive DDoS Flexibility IT Solutions Benefits App Outlook Music Data Theft WIndows 7 Operating Sysytem Television Storage Computing Files Books Two-factor Authentication CloudSync Bluetooth Trending Black Market Prodcuctivity Chromecast Electronic Medical Records Customer Relationship Management Compliance Programming Online Backup User SharePoint HaaS Instant Messaging Excel Administrator Safety Inbound Marketing Emails Best Available Audit Reputation Teamwork Display Battery OneNote Access Emergency Twitter Presentation Meetings Hosted Solution Automobile Science OneDrive Cleaning Running Cable Phishing Bring Your Own Device End of Support Worker Commute Paperless Office Workplace Robot Save Time Networking Video Games RAM Advertising Website Ebay Miscelllaneous Near Field Communication Data storage Hacker Human Resources Legal CPU Amazon PDF Blogging Uninterrupted Power Supply HIPAA Keyboard Travel Regulations Slow Computer Accessories Smart Phones Text Messaging Internet of Things Politics Bloatware ISP IT consulting 3D Printing Applications Hiring/Firing Distributed Denial of Service Scalability Mouse Artificial Intelligence Windows 8 Sports Experience Touchpad Branding Vendor Management eWaste How To Cameras Network Congestion

Top Blog

Let's look at the definition of disaster. dis·as·ter A calamitous event, especially one occurring suddenly and causing great loss of life, damage, or hardship, as a flood, airplane crash, or business failure.To A PC Geek, a disaster is anything that involves a major loss of data or major downt...