At what point will Microsoft make the decision to do without it moot. As with the W11 TPM2 requirement nonsense, will they mandate that W12 or W13 will require an AI NPU ?
Even if it's not actually necessary.
27 publicly visible posts • joined 15 Jun 2017
Yep, and all the NAS stuff based on it out there like QNAP Synology etc. Scanners with network file drop etc ... lots of stuff.
I can only assume that it will still be possible to configure fallback eg down to SMB2, 3.02 and it's only the default that's changing.
At least I *really* hope so !
"For Windows users, VirtualBox's UEFI support now includes Secure Boot and emulation of TPM 1.2 and 2.0 chips"
Can anyone confirm if the TPM emulation has been included in the linux versions ? It's the one thing preventing me from updating my test W10 VM to W11.
... and when I say test windows VM, I mean boot it every three months, install updates and shut it down again :)
At least nowadays on OpenSUSE we have 'reboot' as well as 'shutdown -r'
I tend to only use shutdown when I know I really mean it as 'shutdown -h now'
I'm sure 'reboot' is a common alternative on other distros too.
But yeah -- definitely as a whippersnapper I tripped myself up with it.
Installing from the catalog in to WSUS seems to have worked on two of my test rigs so far. The good news is that it does actually seem to have fixed the issue.
All we need to do now is get an update for the same broken issue in the Server 2012 R2 CU patch :(
I found the docking computers more of a hinderence - especially after I'd played for long enough to get the muscle memory on the roll keys down to match rotation without even thinking. I tended to make heavy use of the BBC not being able to process multiple pressed keys at once for some 'on a sixpence' manoeuvring. To my detriment I then could never get the hang of some of the emulated versions or re-emaginings on other platforms.
Oolite was about my favourite non-original - but I still found myself remapping keys to the 'old ways'
I agree, much of the time the gmail addresses themselves might be spoofed, but what I'm seeing a great deal in our samples is that Google are the unwitting hosts of the actual attack content / fake web pages through their firebase cloud storage.
Lots of links like https://firebasestorage.googleapis.com/reallylongurl...