Latest Windows 10 1909 Features Update and How to Deal With DoS Attacks – Microsoft has released a new update for Windows 10 version 1909 users. This update of course emphasizes bug fixes and stability improvements. The following is a list of fixes and improvements to Windows 10 version 1909:
- Addresses an issue that prevented applications with the speech platform from being used for several minutes in a noisy environment.
- Addresses an issue that reduces image quality in Windows Mixed Reality (WMR) home environments.
- Improves battery performance during Modern Standby mode.
- Addresses an issue that caused Microsoft Narrator to stop working when a user session was longer than 30 minutes.
- Addresses an issue that added an unwanted keyboard layout as the default after an upgrade even though the user removed it.
- Addresses an issue that prevented the Windows Search box from rendering correctly.
- Addresses an issue that prevents the user’s display of printer settings from displaying correctly.
New Features of windows 10 1909
- Create calendar events right from the taskbar.
- Automatic expansion menu. Microsoft has updated the navigation bar on the start menu to allow it to expand automatically when you drag the cursor over it or get closer to options such as the cursor settings icon.
- File explorer by using windows search. The file explorer has been updated using windows search and traditional index results will also include the content of your OneDrive.
- Performance improvements. There was a performance increase in windows 1909 as microsoft had implemented a new rotation policy that would send more CPU intensive tasks to run faster.
How to deal with a POC DoS Attack
Windows 10 version 1909 turned out to be vulnerable to DoS type attacks. This attack called DoS Poc can be a very dangerous attack because it can make the computer not run at all.
The error caused by this vulnerability is in the form of an instantaneous Blue Screen Error on the screen in Windows 10 version 1909. In the error display, a message appears informing you that the computer is having problems and the user is asked to restart. To carry out this attack, an attacker only needs the IP address or address of a computer with Windows 10 version 1909 and performs an SMB V3 server configuration.
Here are some things users can do so they don’t get into trouble because of the vulnerability:
- Disabling SMB V3 Compression and workground.
- Block TCP port 445 on the enterprise perimeter firewall
Blocking TCP port 445 on the firewall’s perimeter network will help protect the systems behind that firewall from attempts to exploit this type of vulnerability.
- Follows guidelines from Microsoft to prevent SMB traffic from connecting laterally
Users can follow the guidelines provided by Microsoft to protect computers from this DoS attack through this address: https://support.microsoft.com/en-us/help/3185535/preventing-smb-traffic-from-lateral-connections