To: Abby4116; afraidfortherepublic; aft_lizard; AF_Blue; AppyPappy; arnoldc1; ATOMIC_PUNK; bajabaja; ...
2 posted on
07/01/2021 7:56:16 AM PDT by
dayglored
("Listen. Strange women lying in ponds distributing swords is no basis for a system of government.")
To: dayglored
Does the print spooler run on stand-alone Windows installations?
11 posted on
07/01/2021 8:17:55 AM PDT by
MortMan
(Shouldn't "palindrome" read the same forward and backward?)
To: dayglored
The Cybersecurity and Infrastructure Security Agency (CISA) has issued a notification regarding the critical PrintNightmare zero-day vulnerability and advises admins to disable the Windows Print Spooler service on servers not used for printing. "CISA encourages administrators to disable the Windows Print spooler service in Domain Controllers and systems that do not print," the US federal agency said. https://www.bleepingcomputer.com/news/security/cisa-disable-windows-print-spooler-on-servers-not-used-for-printing/ a workaround fix can be applied by disabling the printer spooler service. Here's how to do it on both GPO and PowerShell. https://github.com/LaresLLC/CVE-2021-1675
36 posted on
07/02/2021 4:48:37 AM PDT by
daniel1212
( Turn to the Lord Jesus as a damned+destitute sinner, trust Him to save + be baptized + follow Him!)
FreeRepublic.com is powered by software copyright 2000-2008 John Robinson