<?xml version="1.0" encoding="UTF-8"?>
<rss version="2.0" encoding="UTF-8" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:sy="http://purl.org/rss/1.0/modules/syndication/" xmlns:admin="http://webns.net/mvcb/" xmlns:atom="http://www.w3.org/2005/Atom/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:googleplay="http://www.google.com/schemas/play-podcasts/1.0" xmlns:itunes="http://www.itunes.com/dtds/podcast-1.0.dtd" xmlns:fireside="http://fireside.fm/modules/rss/fireside">
  <channel>
    <fireside:hostname>web01.fireside.fm</fireside:hostname>
    <fireside:genDate>Fri, 03 Apr 2026 18:10:53 -0500</fireside:genDate>
    <generator>Fireside (https://fireside.fm)</generator>
    <title>TechSNAP - Episodes Tagged with “Windows Update”</title>
    <link>https://techsnap.systems/tags/windows%20update</link>
    <pubDate>Fri, 24 Jan 2020 00:15:00 -0800</pubDate>
    <description>Systems, Network, and Administration Podcast. Every two weeks TechSNAP covers the stories that impact those of us in the tech industry, and all of us that follow it. Every episode we dedicate a portion of the show to answer audience questions, discuss best practices, and solving your problems.
</description>
    <language>en-us</language>
    <itunes:type>episodic</itunes:type>
    <itunes:subtitle>Systems, Network, and Administration Podcast. </itunes:subtitle>
    <itunes:author>Jupiter Broadcasting</itunes:author>
    <itunes:summary>Systems, Network, and Administration Podcast. Every two weeks TechSNAP covers the stories that impact those of us in the tech industry, and all of us that follow it. Every episode we dedicate a portion of the show to answer audience questions, discuss best practices, and solving your problems.
</itunes:summary>
    <itunes:image href="https://media24.fireside.fm/file/fireside-images-2024/podcasts/images/9/95197d05-40d6-4e68-8e0b-2f586ce8dc55/cover.jpg?v=4"/>
    <itunes:explicit>no</itunes:explicit>
    <itunes:owner>
      <itunes:name>Jupiter Broadcasting</itunes:name>
      <itunes:email>chris@jupiterbroadcasting.com</itunes:email>
    </itunes:owner>
<itunes:category text="News">
  <itunes:category text="Tech News"/>
</itunes:category>
<item>
  <title>421: Firewall Fun</title>
  <link>https://techsnap.systems/421</link>
  <guid isPermaLink="false">34f7722c-c7da-4f86-a8f9-14e67de6d899</guid>
  <pubDate>Fri, 24 Jan 2020 00:15:00 -0800</pubDate>
  <author>Jupiter Broadcasting</author>
  <enclosure url="https://aphid.fireside.fm/d/1437767933/95197d05-40d6-4e68-8e0b-2f586ce8dc55/34f7722c-c7da-4f86-a8f9-14e67de6d899.mp3" length="18463600" type="audio/mp3"/>
  <itunes:episodeType>full</itunes:episodeType>
  <itunes:author>Jupiter Broadcasting</itunes:author>
  <itunes:subtitle>We explore the latest round of Windows vulnerabilities and Jim shares his journey adding OPNsense to his firewall family. </itunes:subtitle>
  <itunes:duration>25:09</itunes:duration>
  <itunes:explicit>no</itunes:explicit>
  <itunes:image href="https://media24.fireside.fm/file/fireside-images-2024/podcasts/images/9/95197d05-40d6-4e68-8e0b-2f586ce8dc55/cover.jpg?v=4"/>
  <description>We explore the latest round of Windows vulnerabilities and Jim shares his journey adding OPNsense to his firewall family. 
Plus a look back at Apollo-era audio that's still relevant today with the surprising story of the Quindar tones. 
</description>
  <itunes:keywords>Windows, Windows Update, Patch Tuesday, Microsoft, cryptography, EternalBlue, crypt32.dll, CryptoAPI spoofing, RDP, RDP Gateway, RDP client, NSA, National Security Administration, patching, security, vulnerability, ECC, elliptic curve cryptography, Windows 10, certificate validation, OPNsense, pfSense, pf, BSD, iptables, Linux, Netgate, Netgear, networking, routing, security gateway, firewall appliance, x86, ARM, Unix, MITM, VPN, firewall, CVE-2020-0601, NASA, Apollo, moon, space, Quindar, Quindar Tones, phreaking, telephony, hacking, Captain Crunch whistle, 2600, nmap, Crystal Method, John Draper, DevOps, TechSNAP, Jupiter Broadcasting, A Cloud Guru, Linux Academy, sysadmin podcast, </itunes:keywords>
  <content:encoded>
    <![CDATA[<p>We explore the latest round of Windows vulnerabilities and Jim shares his journey adding OPNsense to his firewall family. </p>

<p>Plus a look back at Apollo-era audio that&#39;s still relevant today with the surprising story of the Quindar tones.</p><p>Links:</p><ul><li><a title="Critical Vulnerabilities in Microsoft Windows Operating Systems" rel="nofollow" href="https://www.us-cert.gov/ncas/alerts/aa20-014a">Critical Vulnerabilities in Microsoft Windows Operating Systems</a></li><li><a title="Win10 Crypto Vulnerability: Cheating in Elliptic Curve Billiards 2" rel="nofollow" href="https://medium.com/zengo/win10-crypto-vulnerability-cheating-in-elliptic-curve-billiards-2-69b45f2dcab6">Win10 Crypto Vulnerability: Cheating in Elliptic Curve Billiards 2</a></li><li><a title="NSA discovers a serious flaw in Windows 10" rel="nofollow" href="https://betanews.com/2020/01/14/nsa-discovers-a-serious-flaw-in-windows-10/">NSA discovers a serious flaw in Windows 10</a></li><li><a title="Exploiting CVE-2020-0601" rel="nofollow" href="https://blog.sean-wright.com/exploiting-cve-2020-0601/">Exploiting CVE-2020-0601</a></li><li><a title="CVE-2020-0601 POC" rel="nofollow" href="https://github.com/ollypwn/cve-2020-0601">CVE-2020-0601 POC</a></li><li><a title="NSA Cybersecurity Advisory on CryptoAPI Flaw" rel="nofollow" href="https://media.defense.gov/2020/Jan/14/2002234275/-1/-1/0/CSA-WINDOWS-10-CRYPT-LIB-20190114.PDF">NSA Cybersecurity Advisory on CryptoAPI Flaw</a></li><li><a title="Why can’t I get to the internet on my new OPNsense install?! - Jim&#39;s Blog" rel="nofollow" href="https://jrs-s.net/2020/01/19/why-cant-i-get-to-the-internet-on-my-new-opnsense-install/">Why can’t I get to the internet on my new OPNsense install?! - Jim's Blog</a></li><li><a title="OPNsense: a true open source security platform and more" rel="nofollow" href="https://opnsense.org">OPNsense: a true open source security platform and more</a></li><li><a title="There&#39;s An Actual Name And Reason For Those Beeps You Hear In Recordings Of Astronauts In Space" rel="nofollow" href="https://jalopnik.com/theres-an-actual-name-and-reason-for-those-beeps-you-he-1841024797">There's An Actual Name And Reason For Those Beeps You Hear In Recordings Of Astronauts In Space</a></li><li><a title="Quindar Tones" rel="nofollow" href="https://www.hq.nasa.gov/alsj/quindar.html">Quindar Tones</a></li><li><a title="Cap&#39;n Crunch Whistle and the Secrets of the Little Blue Box" rel="nofollow" href="https://telephone-museum.org/telephone-collections/capn-crunch-bosun-whistle/">Cap'n Crunch Whistle and the Secrets of the Little Blue Box</a></li></ul>]]>
  </content:encoded>
  <itunes:summary>
    <![CDATA[<p>We explore the latest round of Windows vulnerabilities and Jim shares his journey adding OPNsense to his firewall family. </p>

<p>Plus a look back at Apollo-era audio that&#39;s still relevant today with the surprising story of the Quindar tones.</p><p>Links:</p><ul><li><a title="Critical Vulnerabilities in Microsoft Windows Operating Systems" rel="nofollow" href="https://www.us-cert.gov/ncas/alerts/aa20-014a">Critical Vulnerabilities in Microsoft Windows Operating Systems</a></li><li><a title="Win10 Crypto Vulnerability: Cheating in Elliptic Curve Billiards 2" rel="nofollow" href="https://medium.com/zengo/win10-crypto-vulnerability-cheating-in-elliptic-curve-billiards-2-69b45f2dcab6">Win10 Crypto Vulnerability: Cheating in Elliptic Curve Billiards 2</a></li><li><a title="NSA discovers a serious flaw in Windows 10" rel="nofollow" href="https://betanews.com/2020/01/14/nsa-discovers-a-serious-flaw-in-windows-10/">NSA discovers a serious flaw in Windows 10</a></li><li><a title="Exploiting CVE-2020-0601" rel="nofollow" href="https://blog.sean-wright.com/exploiting-cve-2020-0601/">Exploiting CVE-2020-0601</a></li><li><a title="CVE-2020-0601 POC" rel="nofollow" href="https://github.com/ollypwn/cve-2020-0601">CVE-2020-0601 POC</a></li><li><a title="NSA Cybersecurity Advisory on CryptoAPI Flaw" rel="nofollow" href="https://media.defense.gov/2020/Jan/14/2002234275/-1/-1/0/CSA-WINDOWS-10-CRYPT-LIB-20190114.PDF">NSA Cybersecurity Advisory on CryptoAPI Flaw</a></li><li><a title="Why can’t I get to the internet on my new OPNsense install?! - Jim&#39;s Blog" rel="nofollow" href="https://jrs-s.net/2020/01/19/why-cant-i-get-to-the-internet-on-my-new-opnsense-install/">Why can’t I get to the internet on my new OPNsense install?! - Jim's Blog</a></li><li><a title="OPNsense: a true open source security platform and more" rel="nofollow" href="https://opnsense.org">OPNsense: a true open source security platform and more</a></li><li><a title="There&#39;s An Actual Name And Reason For Those Beeps You Hear In Recordings Of Astronauts In Space" rel="nofollow" href="https://jalopnik.com/theres-an-actual-name-and-reason-for-those-beeps-you-he-1841024797">There's An Actual Name And Reason For Those Beeps You Hear In Recordings Of Astronauts In Space</a></li><li><a title="Quindar Tones" rel="nofollow" href="https://www.hq.nasa.gov/alsj/quindar.html">Quindar Tones</a></li><li><a title="Cap&#39;n Crunch Whistle and the Secrets of the Little Blue Box" rel="nofollow" href="https://telephone-museum.org/telephone-collections/capn-crunch-bosun-whistle/">Cap'n Crunch Whistle and the Secrets of the Little Blue Box</a></li></ul>]]>
  </itunes:summary>
</item>
<item>
  <title>405: Update Uncertainty</title>
  <link>https://techsnap.systems/405</link>
  <guid isPermaLink="false">8a576c94-20cc-497c-9de7-8402cd0a1135</guid>
  <pubDate>Tue, 11 Jun 2019 20:15:00 -0700</pubDate>
  <author>Jupiter Broadcasting</author>
  <enclosure url="https://aphid.fireside.fm/d/1437767933/95197d05-40d6-4e68-8e0b-2f586ce8dc55/8a576c94-20cc-497c-9de7-8402cd0a1135.mp3" length="22166906" type="audio/mp3"/>
  <itunes:episodeType>full</itunes:episodeType>
  <itunes:author>Jupiter Broadcasting</itunes:author>
  <itunes:subtitle>We explore the risky world of exposed RDP, from the brute force GoldBrute botnet to the dangerously worm-able BlueKeep vulnerability.</itunes:subtitle>
  <itunes:duration>30:47</itunes:duration>
  <itunes:explicit>no</itunes:explicit>
  <itunes:image href="https://media24.fireside.fm/file/fireside-images-2024/podcasts/images/9/95197d05-40d6-4e68-8e0b-2f586ce8dc55/cover.jpg?v=4"/>
  <description>We explore the risky world of exposed RDP, from the brute force GoldBrute botnet to the dangerously worm-able BlueKeep vulnerability.
Plus the importance of automatic updates, and Jim's new backup box.  
</description>
  <itunes:keywords>BlueKeep, RDP, GoldBrute, Terminal Services, Remote Desktop, Windows, Windows Update, network security, security, firewalls, worm, internet worm, wannacry, NSA, Microsoft, updates, patching, vulnerabilities, automatic updates, backups, supermicro, rosewill, ssd, hard drive, NAS, storage, brute force, industrial control systems, out of support, windows xp, patching policies, password security, remote desktop protocol, DevOps, TechSNAP</itunes:keywords>
  <content:encoded>
    <![CDATA[<p>We explore the risky world of exposed RDP, from the brute force GoldBrute botnet to the dangerously worm-able BlueKeep vulnerability.</p>

<p>Plus the importance of automatic updates, and Jim&#39;s new backup box. </p><p>Links:</p><ul><li><a title="Errata Security: Almost One Million Vulnerable to BlueKeep Vuln (CVE-2019-0708)" rel="nofollow" href="https://blog.erratasec.com/2019/05/almost-one-million-vulnerable-to.html">Errata Security: Almost One Million Vulnerable to BlueKeep Vuln (CVE-2019-0708)</a> &mdash; Microsoft announced a vulnerability in it's "Remote Desktop" product that can lead to robust, wormable exploits. I scanned the Internet to assess the danger. I find nearly 1-million devices on the public Internet that are vulnerable to the bug. </li><li><a title="Even the NSA is urging Windows users to patch BlueKeep (CVE-2019-0708) | ZDNet" rel="nofollow" href="https://www.zdnet.com/article/even-the-nsa-is-urging-windows-users-to-patch-bluekeep-cve-2019-0708/">Even the NSA is urging Windows users to patch BlueKeep (CVE-2019-0708) | ZDNet</a> &mdash; "[The] NSA is concerned that malicious cyber actors will use the vulnerability in ransomware and exploit kits containing other known exploits, increasing capabilities against other unpatched systems.

</li><li><a title="Prevent a worm by updating Remote Desktop Services (CVE-2019-0708) – MSRC" rel="nofollow" href="https://blogs.technet.microsoft.com/msrc/2019/05/14/prevent-a-worm-by-updating-remote-desktop-services-cve-2019-0708/">Prevent a worm by updating Remote Desktop Services (CVE-2019-0708) – MSRC</a> &mdash; This vulnerability is pre-authentication and requires no user interaction. In other words, the vulnerability is ‘wormable’, meaning that any future malware that exploits this vulnerability could propagate from vulnerable computer to vulnerable computer in a similar way as the WannaCry malware spread across the globe in 2017</li><li><a title="BlueKeep - everyone agrees, you should patch PCs running legacy versions of Windows" rel="nofollow" href="https://www.grahamcluley.com/bluekeep-everyone-agrees-you-should-patch-pcs-running-legacy-versions-of-windows/">BlueKeep - everyone agrees, you should patch PCs running legacy versions of Windows</a> &mdash; I have this horrible feeling that the only way we’re going to wake the world up to the need to patch their ageing versions of Windows against the BlueKeep vulnerability is to wait until a malicious worm begins to spread around the world.

</li><li><a title="CVE-2019-0708 | Remote Desktop Services Remote Code Execution Vulnerability" rel="nofollow" href="https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2019-0708">CVE-2019-0708 | Remote Desktop Services Remote Code Execution Vulnerability</a> &mdash; A remote code execution vulnerability exists in Remote Desktop Services – formerly known as Terminal Services – when an unauthenticated attacker connects to the target system using RDP and sends specially crafted requests. This vulnerability is pre-authentication and requires no user interaction. An attacker who successfully exploited this vulnerability could execute arbitrary code on the target system. An attacker could then install programs; view, change, or delete data; or create new accounts with full user rights.

</li><li><a title="Customer guidance for CVE-2019-0708 | Remote Desktop Services Remote Code Execution Vulnerability" rel="nofollow" href="https://support.microsoft.com/en-us/help/4500705/customer-guidance-for-cve-2019-0708">Customer guidance for CVE-2019-0708 | Remote Desktop Services Remote Code Execution Vulnerability</a> &mdash; Microsoft is aware that some customers are running versions of Windows that no longer receive mainstream support. That means those customers will not have received any security updates to protect their systems from CVE-2019-0708, which is a critical remote code execution vulnerability.

</li><li><a title="Forget BlueKeep: Beware the GoldBrute | Threatpost" rel="nofollow" href="https://threatpost.com/forget-bluekeep-beware-goldbrute/145482/">Forget BlueKeep: Beware the GoldBrute | Threatpost</a> &mdash; In the past few days, GoldBrute (named after the Java class it uses) has attempted to brute-force Remote Desktop Protocol (RDP) connections for 1.5 million Windows systems and counting, according to Morphus Labs chief research officer Renato Marinho. The botnet is actively scanning the internet for machines with RDP exposed, and trying out weak or reused passwords to see if it can gain access to the systems.</li><li><a title="The GoldBrute botnet" rel="nofollow" href="https://nakedsecurity.sophos.com/2019/06/10/the-goldbrute-botnet-is-trying-to-crack-open-1-5-million-rdp-servers/">The GoldBrute botnet</a> &mdash; The latest round of bad news emerged last week when Morphus Labs’ researcher Renato Marinho announced the discovery of an aggressive brute force campaign against 1.5 million RDP servers by a botnet called ‘GoldBrute’.

</li><li><a title="Ubuntu Automatic Updates" rel="nofollow" href="https://help.ubuntu.com/lts/serverguide/automatic-updates.html.en">Ubuntu Automatic Updates</a> &mdash; The unattended-upgrades package can be used to automatically install updated packages, and can be configured to update all packages or just install security updates. </li><li><a title="AutoUpdates - Fedora Project Wiki" rel="nofollow" href="https://fedoraproject.org/wiki/AutoUpdates">AutoUpdates - Fedora Project Wiki</a> &mdash; You must decide whether to use automatic DNF or YUM updates on each of your machines. </li><li><a title="It&#39;s time to block Windows Automatic Updating | Computerworld" rel="nofollow" href="https://www.computerworld.com/article/3339563/its-time-to-block-windows-automatic-updating.html">It's time to block Windows Automatic Updating | Computerworld</a> &mdash; Those of you who feel it’s important to install Windows and Office patches the moment they come out – I salute you. The Windows world needs more cannon fodder.</li><li><a title="Windows 10&#39;s Ugly Updates Just Got Uglier. Here&#39;s How To Stay Safe by Disabling Automatic Updates" rel="nofollow" href="https://www.forbes.com/sites/kevinmurnane/2019/04/25/windows-10s-ugly-updates-just-got-uglier-heres-how-to-stay-safe-by-disabling-automatic-updates/#591e6ac67ff0">Windows 10's Ugly Updates Just Got Uglier. Here's How To Stay Safe by Disabling Automatic Updates</a> &mdash; Stay safe by disabling automatic updates? How is that possible? As a general rule of thumb, I’d never recommend disabling updates because security patches are essential. But the situation with Windows 10 has become intolerable. Microsoft continues to fail and continues to release update after update that they know, or should know, has serious problems.</li><li><a title="Jim&#39;s New Rig" rel="nofollow" href="https://twitter.com/jrssnet/status/1136721049641455617">Jim's New Rig</a> &mdash; I build, sell, and manage much bigger and meaner systems than this all the time. But this one's MINE! 12 hot swap bays, Ryzen 7 2700 w/ ECC RAM, quiet enough to share an office with, and the trays can take either HDD or SSD with no adapter needed.</li></ul>]]>
  </content:encoded>
  <itunes:summary>
    <![CDATA[<p>We explore the risky world of exposed RDP, from the brute force GoldBrute botnet to the dangerously worm-able BlueKeep vulnerability.</p>

<p>Plus the importance of automatic updates, and Jim&#39;s new backup box. </p><p>Links:</p><ul><li><a title="Errata Security: Almost One Million Vulnerable to BlueKeep Vuln (CVE-2019-0708)" rel="nofollow" href="https://blog.erratasec.com/2019/05/almost-one-million-vulnerable-to.html">Errata Security: Almost One Million Vulnerable to BlueKeep Vuln (CVE-2019-0708)</a> &mdash; Microsoft announced a vulnerability in it's "Remote Desktop" product that can lead to robust, wormable exploits. I scanned the Internet to assess the danger. I find nearly 1-million devices on the public Internet that are vulnerable to the bug. </li><li><a title="Even the NSA is urging Windows users to patch BlueKeep (CVE-2019-0708) | ZDNet" rel="nofollow" href="https://www.zdnet.com/article/even-the-nsa-is-urging-windows-users-to-patch-bluekeep-cve-2019-0708/">Even the NSA is urging Windows users to patch BlueKeep (CVE-2019-0708) | ZDNet</a> &mdash; "[The] NSA is concerned that malicious cyber actors will use the vulnerability in ransomware and exploit kits containing other known exploits, increasing capabilities against other unpatched systems.

</li><li><a title="Prevent a worm by updating Remote Desktop Services (CVE-2019-0708) – MSRC" rel="nofollow" href="https://blogs.technet.microsoft.com/msrc/2019/05/14/prevent-a-worm-by-updating-remote-desktop-services-cve-2019-0708/">Prevent a worm by updating Remote Desktop Services (CVE-2019-0708) – MSRC</a> &mdash; This vulnerability is pre-authentication and requires no user interaction. In other words, the vulnerability is ‘wormable’, meaning that any future malware that exploits this vulnerability could propagate from vulnerable computer to vulnerable computer in a similar way as the WannaCry malware spread across the globe in 2017</li><li><a title="BlueKeep - everyone agrees, you should patch PCs running legacy versions of Windows" rel="nofollow" href="https://www.grahamcluley.com/bluekeep-everyone-agrees-you-should-patch-pcs-running-legacy-versions-of-windows/">BlueKeep - everyone agrees, you should patch PCs running legacy versions of Windows</a> &mdash; I have this horrible feeling that the only way we’re going to wake the world up to the need to patch their ageing versions of Windows against the BlueKeep vulnerability is to wait until a malicious worm begins to spread around the world.

</li><li><a title="CVE-2019-0708 | Remote Desktop Services Remote Code Execution Vulnerability" rel="nofollow" href="https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2019-0708">CVE-2019-0708 | Remote Desktop Services Remote Code Execution Vulnerability</a> &mdash; A remote code execution vulnerability exists in Remote Desktop Services – formerly known as Terminal Services – when an unauthenticated attacker connects to the target system using RDP and sends specially crafted requests. This vulnerability is pre-authentication and requires no user interaction. An attacker who successfully exploited this vulnerability could execute arbitrary code on the target system. An attacker could then install programs; view, change, or delete data; or create new accounts with full user rights.

</li><li><a title="Customer guidance for CVE-2019-0708 | Remote Desktop Services Remote Code Execution Vulnerability" rel="nofollow" href="https://support.microsoft.com/en-us/help/4500705/customer-guidance-for-cve-2019-0708">Customer guidance for CVE-2019-0708 | Remote Desktop Services Remote Code Execution Vulnerability</a> &mdash; Microsoft is aware that some customers are running versions of Windows that no longer receive mainstream support. That means those customers will not have received any security updates to protect their systems from CVE-2019-0708, which is a critical remote code execution vulnerability.

</li><li><a title="Forget BlueKeep: Beware the GoldBrute | Threatpost" rel="nofollow" href="https://threatpost.com/forget-bluekeep-beware-goldbrute/145482/">Forget BlueKeep: Beware the GoldBrute | Threatpost</a> &mdash; In the past few days, GoldBrute (named after the Java class it uses) has attempted to brute-force Remote Desktop Protocol (RDP) connections for 1.5 million Windows systems and counting, according to Morphus Labs chief research officer Renato Marinho. The botnet is actively scanning the internet for machines with RDP exposed, and trying out weak or reused passwords to see if it can gain access to the systems.</li><li><a title="The GoldBrute botnet" rel="nofollow" href="https://nakedsecurity.sophos.com/2019/06/10/the-goldbrute-botnet-is-trying-to-crack-open-1-5-million-rdp-servers/">The GoldBrute botnet</a> &mdash; The latest round of bad news emerged last week when Morphus Labs’ researcher Renato Marinho announced the discovery of an aggressive brute force campaign against 1.5 million RDP servers by a botnet called ‘GoldBrute’.

</li><li><a title="Ubuntu Automatic Updates" rel="nofollow" href="https://help.ubuntu.com/lts/serverguide/automatic-updates.html.en">Ubuntu Automatic Updates</a> &mdash; The unattended-upgrades package can be used to automatically install updated packages, and can be configured to update all packages or just install security updates. </li><li><a title="AutoUpdates - Fedora Project Wiki" rel="nofollow" href="https://fedoraproject.org/wiki/AutoUpdates">AutoUpdates - Fedora Project Wiki</a> &mdash; You must decide whether to use automatic DNF or YUM updates on each of your machines. </li><li><a title="It&#39;s time to block Windows Automatic Updating | Computerworld" rel="nofollow" href="https://www.computerworld.com/article/3339563/its-time-to-block-windows-automatic-updating.html">It's time to block Windows Automatic Updating | Computerworld</a> &mdash; Those of you who feel it’s important to install Windows and Office patches the moment they come out – I salute you. The Windows world needs more cannon fodder.</li><li><a title="Windows 10&#39;s Ugly Updates Just Got Uglier. Here&#39;s How To Stay Safe by Disabling Automatic Updates" rel="nofollow" href="https://www.forbes.com/sites/kevinmurnane/2019/04/25/windows-10s-ugly-updates-just-got-uglier-heres-how-to-stay-safe-by-disabling-automatic-updates/#591e6ac67ff0">Windows 10's Ugly Updates Just Got Uglier. Here's How To Stay Safe by Disabling Automatic Updates</a> &mdash; Stay safe by disabling automatic updates? How is that possible? As a general rule of thumb, I’d never recommend disabling updates because security patches are essential. But the situation with Windows 10 has become intolerable. Microsoft continues to fail and continues to release update after update that they know, or should know, has serious problems.</li><li><a title="Jim&#39;s New Rig" rel="nofollow" href="https://twitter.com/jrssnet/status/1136721049641455617">Jim's New Rig</a> &mdash; I build, sell, and manage much bigger and meaner systems than this all the time. But this one's MINE! 12 hot swap bays, Ryzen 7 2700 w/ ECC RAM, quiet enough to share an office with, and the trays can take either HDD or SSD with no adapter needed.</li></ul>]]>
  </itunes:summary>
</item>
  </channel>
</rss>
