The Windows OS Thread - Formerly THE OS for gamers and normies, now sadly ruined by Pajeets

A while ago I had to disable a "WebClient" service to make Outlook stop lagging when downloading attachments to a LAN drive by default.
For context, this "WebClient" service allowed PCs to share files with an http-using application I'd never heard of called WebDAV, and Outlook was trying this http method before defaulting to smb.
Serious question, no snark, etc. etc., but while I appreciate that Windows is at an advantage by supporting legacy shit, why is this legacy shit enabled by default, especially when it fucks up other, more modern applications? This seems like a prime candidate to be hidden behind an arcane reactivation process for whatever poor schmucks still need to use http-based file sharing (probably some Japanese company, IDK, I only know the stereotypes).
 
You ever stop to think something from long ago that you only half remember might actually be wrong - and a community of people saying otherwise, with more recent knowledge and sources and evidence and more technical explanations of the underlying process, may actually be right?
You willingly allowed a man who was twice your age to fuck you.
 
You willingly allowed a man who was twice your age to fuck you.
You can't even keep your arguments on topic. You're completely ignoring the subject matter and bringing up irrelevant stuff as if it is some sort of win. The fact of the matter that that windows software installers do NOT compile the software, and you would rather take offense at any attempt to correct your half forgotten memory of something so long ago you can't even describe the details involved.
 
Nonono, to draw circles you need to install circlemagic, but if you want to draw rectangles you need ubersquare. If you want to draw both and in colour you need to install seven different packages to stitch everything together
so basically what you do to get functionality in win11 back and windows being less shit in general? guess it's "even" then...

I couldn't tell you, it's been too long. I find it kind of funny that @the rat can get away with saying that you have to compile every program on Linux, but I get put on trial for confusing the words decompress and decompile.

I guess if you use Microcuck's software every day, you're bound to pick up these dishonest tactics.
to be fair, third party installers being shit is not the fault of the operating system, shit software happens everywhere (thanks poettering).
 
  • Agree
Reactions: sweater_supremacy
You can't even keep your arguments on topic. You're completely ignoring the subject matter and bringing up irrelevant stuff as if it is some sort of win. The fact of the matter that that windows software installers do NOT compile the software, and you would rather take offense at any attempt to correct your half forgotten memory of something so long ago you can't even describe the details involved.
You got fucked by a man who was 20 years older than you. The people on your side call Linux users trannies and faggots. Do you not see the irony?
Please keep fanboy battles outside of the threads made for just talking about the OS. It makes the other computer nerds cry.
 
You should read the article. On-board TPM is insecure because the initial communication across the CPU-TPM bus at boot time is insecure. On-chip TPM doesn't have this problem.
First of all that's TPM 1.2 not TPM 2.0. Great so you've dumped the encryption keys between the TPM and the CPU. Wonderful. How does that circumvent the purpose of the TPM? You could run a TPM with only a public encryption key provided to the client by the TPM. You haven't defeated the core purpose of a TPM which is dedicated authentication without external access to the saved credentials. TPM 2.0 allows for password auth which is what windows 11 uses. Essentially what this does is bind your copy of windows to your motherboard preventing a hard drive swap attack.
 
Essentially what this does is bind your copy of windows to your motherboard preventing a hard drive swap attack.
Is it just me or is there a really absurd amount of energy going into preventing Evil Maid attacks lately, compared to how common they actually are?
"Bu-bu-but what if someone cold-cocks me while I have my banking app open on the phone?"
I dunno, what if?
 
  • Like
Reactions: geckogoy
Is it just me or is there a really absurd amount of energy going into preventing Evil Maid attacks lately, compared to how common they actually are?
"Bu-bu-but what if someone cold-cocks me while I have my banking app open on the phone?"
I dunno, what if?
maybe to look better for those government contracts, but those are heavily lobbied/bribed anyway, no real need for features.
or a side-effect from everyone going more mobile with tablets etc but saving all the cloud passwords (normalfags are lazy) so you'd only need to swipe that for access.

I just wanted everyone to keep that fact in mind when they read posts made by Betonhaus. Spread awareness so no one catches digital AIDS or something.
just put him on ignore. you don't wanna become slav HHH whining about stickers and shit.
 
First of all that's TPM 1.2 not TPM 2.0. Great so you've dumped the encryption keys between the TPM and the CPU. Wonderful. How does that circumvent the purpose of the TPM?

Because if you've got the keys, now you can use standard brute-force attacks and such to get them. My point here is MS was right to require CPUs with embedded TPM. Too many flaws in off-chip TPM.

Is it just me or is there a really absurd amount of energy going into preventing Evil Maid attacks lately, compared to how common they actually are?

TPM is needed for all those "remember me on this machine" prompts so that you don't need 2FA on every website, every time. But yeah, it's an arms race. We've come a long way form websites with ActiveX giving your computer AIDS.

I couldn't tell you, it's been too long. I find it kind of funny that @the rat can get away with saying that you have to compile every program on Linux, but I get put on trial for confusing the words decompress and decompile.

Because if you don't know the difference between CMake and gzip, you should really stop trying to lecture software engineers and IT workers who have been using Linux longer than you about computers. Nothing more to discuss here.

I'm genuinely more concerned with Google embedding content harvested from emails and docs into AI NN weights than I am with Microsoft telling the NSA I'm not using Edge. Not that I particularly trust Microsoft, either, but the latest announcement that Salesforce is going to start harvesting your private chats from Slack is much more concerning.
 
Last edited:
@the rat probably fell for the meme and actually installed Gentoo. That would explain his comment.
From what I've experienced, packages from the AUR are not compiled and I was talking about YAM which uses the AUR.

So you get these fun cases where it's like: "oh fuck i need a program, ok, 'pacman -Sy <packagename>', oh wtf why isn't it working... oh ok it was actually 'pacman -Sy <package-name>', oh wtf it's still not working.... oh i have to use YAM to get it from the AUR." And then the program has to compile because it's from the fucking AUR.
 
From what I've experienced, packages from the AUR are not compiled and I was talking about YAM which uses the AUR.

So you get these fun cases where it's like: "oh fuck i need a program, ok, 'pacman -Sy <packagename>', oh wtf why isn't it working... oh ok it was actually 'pacman -Sy <package-name>', oh wtf it's still not working.... oh i have to use YAM to get it from the AUR." And then the program has to compile because it's from the fucking AUR.
ur fault for not using yay lol
 
  • Agree
Reactions: HahaYes
TPM is needed for all those "remember me on this machine" prompts so that you don't need 2FA on every website, every time. But yeah, it's an arms race.
Right, and I'm not disputing that TPM is useful or anything. But it seems to me that many (not all) of the scenarios they're guarding against assume a very, very specific threat model where the adversary is willing to spend unlimited resources to screw with your hardware but none on anything else. Your hardware may not even be the weak point of the system it's participating in. We're installing tamper-evident seals on the chimney to prevent glowies from crawling down, while the window can be smashed by a crackhead with a simple rock.
 
Back