What. You don't have 200 txt files full of random PowerShell, Cisco commands, and other random scripts?
What if you remember just one part of the command? Search is great for that. If it actually works like it used to.
Actually that's all it needs to do.. Just end the current process so it can spawn with the reinstalled one that will magically work
Though I agree with your sentiment lol, would be nice to just have a simple search built into the start menu
There's actually an easy fix for this. Some PowerShell command that reinstalls cortana and all windows store apps. Then killing cortana in task manager and you can search again.
Go to method 3, may as well reboot after
Comparing this to an Intel/esxi combo...
Unless your on latest esxi with vsphere 6.7update3 using the better optimized performance mitigation kernel option, guess what happens when an Intel cpu is over 70% usage, you lose performance... 30% if you max the CPU out or 1% for each percentage over...
If you have an Intel cpu (certain models) and an m.2 drive using Intel optane drives there's an option to use some of it as system memory (tricks the OS so it sees it as memory anyways). Also supposedly it will survive a reboot and no data lost
It's going to be non-stop whack a mole since they can't fix the original spectre vulnerability, supposedly the 10th gen series has a fix in hardware? Either way this won't stop until they end of life all of their processors
I really hope they come out with a 10k switch model with the 7nm+ Zen chips.
The Intel processors they used for 9k was def a step up, but they are so loud (and heavy) compared to 3k models. Plus with all those threads the virtualized app space will be much bigger (you can run a lightweight...
Okay, but you are still not understanding application whitelisting. Even if remote code is downloaded, de-serialized, or any other method, every file on every computer and it's hash value is given explicit permission if it's allowed to read, write, or execute.
Changing a dll in any way will...
Why don't you actually read the exploit and see the list of dll's with associated sha hash
It says quite clearly it's used to download other programs into the network or modify the dll. Guess what a whitelisting application could prevent? All of that.