Windows 10 SDK Preview Build 18908 available now! – Windows Developer Blog

Today, we released a new Windows 10 Preview Build of the SDK to be used in conjunction with Windows 10 Insider Preview (Build 18908 or greater). The Preview SDK Build 18908 contains bug fixes and under development changes to the API surface area.
The Preview SDK can be downloaded from developer section on Windows Insider.
For feedback and updates to the known issues, please see the developer forum. For new developer feature requests, head over to our Windows Platform UserVoice.

This build works in conjunction with previously released SDKs and Visual Studio 2017 and 2019. You can install this SDK and still also continue to submit your apps that target Windows 10 build 1903 or earlier to the store.
The Windows SDK will now formally only be supported by Visual Studio 2017 and greater. You can download the Visual Studio 2019 here.
This build of the Windows SDK will install ONLY on Windows 10 Insider Preview builds.
In order to assist with script access to the SDK, the ISO will also be able to be accessed through the following static URL: https://software-download.microsoft.com/download/sg/Windows_InsiderPreview_SDK_en-us_18908_1.iso.

Message Compiler (mc.exe)

Now detects the Unicode byte order mark (BOM) in .mc files. If the If the .mc file starts with a UTF-8 BOM, it will be read as a UTF-8 file. Otherwise, if it starts with a UTF-16LE BOM, it will be read as a UTF-16LE file. If the -u parameter was specified, it will be read as a UTF-16LE file. Otherwise, it will be read using the current code page (CP_ACP).
Now avoids one-definition-rule (ODR) problems in MC-generated C/C++ ETW helpers caused by conflicting configuration macros (e.g. when two .cpp files with conflicting definitions of MCGEN_EVENTWRITETRANSFER are linked into the same binary, the MC-generated ETW helpers will now respect the definition of MCGEN_EVENTWRITETRANSFER in each .cpp file instead of arbitrarily picking one or the other).

Windows Trace Preprocessor (tracewpp.exe)

Now supports Unicode input (.ini, .tpl, and source code) files. Input files starting with a UTF-8 or UTF-16 byte order mark (BOM) will be read as Unicode. Input files that do not start with a BOM will be read using the current code page (CP_ACP). For backwards-compatibility, if the -UnicodeIgnore command-line parameter is specified, files starting with a UTF-16 BOM will be treated as empty.
Now supports Unicode output (.tmh) files. By default, output files will be encoded using the current code page (CP_ACP). Use command-line parameters -cp:UTF-8 or -cp:UTF-16 to generate Unicode output files.
Behavior change: tracewpp now converts all input text to Unicode, performs processing in Unicode, and converts output text to the specified output encoding. Earlier versions of tracewpp avoided Unicode conversions and performed text processing assuming a single-byte character set. This may lead to behavior changes in cases where the input files do not conform to the current code page. In cases where this is a problem, consider converting the input files to UTF-8 (with BOM) and/or using the -cp:UTF-8 command-line parameter to avoid encoding ambiguity.

TraceLoggingProvider.h

Now avoids one-definition-rule (ODR) problems caused by conflicting configuration macros (e.g. when two .cpp files with conflicting definitions of TLG_EVENT_WRITE_TRANSFER are linked into the same binary, the TraceLoggingProvider.h helpers will now respect the definition of TLG_EVENT_WRITE_TRANSFER in each .cpp file instead of arbitrarily picking one or the other).
In C++ code, the TraceLoggingWrite macro has been updated to enable better code sharing between similar events using variadic templates.

Removal of IRPROPS.LIB
In this release irprops.lib has been removed from the Windows SDK. Apps that were linking against irprops.lib can switch to bthprops.lib as a drop-in replacement.

The following APIs have been added to the platform since the release of Windows 10 SDK, version 1903,build 18362.
Additions:

namespace Windows.Foundation.Metadata {
public sealed class AttributeNameAttribute : Attribute
public sealed class FastAbiAttribute : Attribute
public sealed class NoExceptionAttribute : Attribute
}
namespace Windows.Graphics.Capture {
public sealed class GraphicsCaptureSession : IClosable {
bool IsCursorCaptureEnabled { get; set; }
}
}
namespace Windows.Management.Deployment {
public enum DeploymentOptions : uint {
AttachPackage = (uint)4194304,
}
public sealed class PackageManager {
IIterable FindProvisionedPackages();
}
}
namespace Windows.Networking.BackgroundTransfer {
public sealed class DownloadOperation : IBackgroundTransferOperation, IBackgroundTransferOperationPriority {
void RemoveRequestHeader(string headerName);
void SetRequestHeader(string headerName, string headerValue);
}
public sealed class UploadOperation : IBackgroundTransferOperation, IBackgroundTransferOperationPriority {
void RemoveRequestHeader(string headerName);
void SetRequestHeader(string headerName, string headerValue);
}
}
namespace Windows.Storage {
public sealed class StorageFile : IInputStreamReference, IRandomAccessStreamReference, IStorageFile, IStorageFile2, IStorageFilePropertiesWithAvailability, IStorageItem, IStorageItem2, IStorageItemProperties, IStorageItemProperties2, IStorageItemPropertiesWithProvider {
public static IAsyncOperation GetFileFromPathForUserAsync(User user, string path);
}
public sealed class StorageFolder : IStorageFolder, IStorageFolder2, IStorageFolderQueryOperations, IStorageItem, IStorageItem2, IStorageItemProperties, IStorageItemProperties2, IStorageItemPropertiesWithProvider {
public static IAsyncOperation GetFolderFromPathForUserAsync(User user, string path);
}
}
namespace Windows.UI.Composition.Particles {
public sealed class ParticleAttractor : CompositionObject
public sealed class ParticleAttractorCollection : CompositionObject, IIterable, IVector
public class ParticleBaseBehavior : CompositionObject
public sealed class ParticleBehaviors : CompositionObject
public sealed class ParticleColorBehavior : ParticleBaseBehavior
public struct ParticleColorBinding
public sealed class ParticleColorBindingCollection : CompositionObject, IIterable, IMap
public enum ParticleEmitFrom
public sealed class ParticleEmitterVisual : ContainerVisual
public sealed class ParticleGenerator : CompositionObject
public enum ParticleInputSource
public enum ParticleReferenceFrame
public sealed class ParticleScalarBehavior : ParticleBaseBehavior
public struct ParticleScalarBinding
public sealed class ParticleScalarBindingCollection : CompositionObject, IIterable, IMap
public enum ParticleSortMode
public sealed class ParticleVector2Behavior : ParticleBaseBehavior
public struct ParticleVector2Binding
public sealed class ParticleVector2BindingCollection : CompositionObject, IIterable, IMap
public sealed class ParticleVector3Behavior : ParticleBaseBehavior
public struct ParticleVector3Binding
public sealed class ParticleVector3BindingCollection : CompositionObject, IIterable, IMap
public sealed class ParticleVector4Behavior : ParticleBaseBehavior
public struct ParticleVector4Binding
public sealed class ParticleVector4BindingCollection : CompositionObject, IIterable, IMap
}
namespace Windows.UI.ViewManagement {
public enum ApplicationViewMode {
Spanning = 2,
}
}
namespace Windows.UI.WindowManagement {
public sealed class AppWindow {
void SetPreferredTopMost();
void SetRelativeZOrderBeneath(AppWindow appWindow);
}
public enum AppWindowPresentationKind {
Spanning = 4,
}
public sealed class SpanningPresentationConfiguration : AppWindowPresentationConfiguration
}

Gears of War: Retrospective Now Available for Pre-Order – Xbox Wire

Today, Xbox and The Coalition are thrilled to partner with UDON Entertainment to announce the upcoming release of “Gears of War: Retrospective, The First 10 Years,” an extensive history of the Gears of War franchise, in advance of the highly anticipated 2019 release of Gears 5.

With its acclaimed gameplay, intense characters, and visceral action, the award-winning Gears of War franchise helped define the modern shooter genre. Written by Arthur Gies, “Gears of War: Retrospective, The First 10 Years” provides a detailed look into the history of Gears through the words of its developers, designers, and artists that fans of the series will not want to miss. With over 250 pages of commentary, concept art and key visuals, the book features new interviews with Cliff Bleszinski, Gears co-creator and design director (Gears 1-3); Rod Fergusson, co-creator and studio head at The Coalition; Chris Perna, Director of Art, Worldwide Studios at Epic Games; and Laura Fryer, executive producer, Microsoft Games Studios, and more.

“Gears of War: Retrospective, The First 10 Years” will be available July 16 and is available for pre-order now. For a full chapter preview please visit Polygon’s preview coverage.

Go to Original Article
Author: Microsoft News Center

Tech buyer rights raised in Cisco vulnerability

A network vulnerability as hard to fix as the recently disclosed Thrangrycat flaw in 150 varieties of Cisco switches and routers raises the question of a tech buyer’s rights when repairing a potentially destructive defect.

Fixing the Cisco vulnerability, which a hacker could exploit to take down a network, carries the risk of making the hardware unusable. The vendor has said it would replace a product destroyed in the patching process.

“If an affected product becomes unusable and requires a hardware replacement, it will be replaced according to the terms of the customer’s support contract or warranty,” Cisco said in a statement emailed last week.

However, an expert for management consulting firm Avasant said tech buyers could sometimes get defective hardware replaced, even if product warranties and maintenance contracts have expired. A lot depends on whether the flaw was due to a vendor’s faulty design.

If the thing that they put in in the first place had a design flaw, then that would imply more risk [to the vendor],” said Ravi Mahalingam, general counsel for Avasant, based in Los Angeles. Another condition that could favor the buyer is whether the supplier knew — or should have known — that the defect existed.

Vendors face fewer risks with software patches

Contracts used when purchasing network hardware typically list the device’s specifications and guarantee it will operate in a customer’s network as promised. The product also comes with a warranty, and companies will often buy a support and maintenance contract from the vendor or reseller.

Maintenance typically includes patches for software vulnerabilities, which carry less risk to the seller than a design flaw in a product. As long as the vendor doesn’t try to hide a bug and releases a patch as quickly as possible, then the repair process is seldom controversial, even if multiple code releases are needed to fix a problem.

“[Even] in that situation, I don’t think that there’s a huge liability risk,” Mahalingam said. “The window for that risk is limited, and you’ve done the best effort possible to fix it.”

Researchers at Red Balloon Security, which specializes in securing industrial devices, found the Cisco vulnerability in a semiconductor component, called a field-programmable gate array. Fixing the flaw requires someone with the skill to reprogram the FPGA, which is the heart of Cisco’s Trust Anchor module. The component authenticates software before allowing it to boot in a switch or router.

Reviewing support contracts

Tech buyers who want maximum protection against product defects should keep support and purchase contracts organized and accessible and maintain a paper trail of all contacts with vendors. Businesses should also keep support contracts active.

“The things that clients can do are, in a sense, fairly obvious, but they’re often overlooked,” said Aaron Polikaitis, who conducts IT sourcing research at IDC. “There’s been a significant underinvestment in those areas.”

Go to Original Article
Author:

For Sale – Gaming PC, i5-4460, Asus Strix GTX970 4GB, EVGA Supanova G2 850w PS

Discussion in ‘Desktop Computer Classifieds‘ started by schillaci0, May 20, 2019.

  1. Hi All,

    Selling my son’s gaming PC.

    CPU:Intel Core i5 4460 3.2Ghz
    CPU Cooler: Zalman CNPS10X Optima
    Operating System: Windows 10 Pro
    Motherboard: Gigabyte Z97P-D3
    RAM: 8GB Corsair 1600mhz Vengeance – 2x4GB
    Hard Drive: Kingston 120GB SSD & Seagate 1TB SSHD
    Graphics card: Asus Strix GeoForce GTX970 4GB OC edition with original box
    PSU: EVGA Supanova G2 Gold 850w with original box
    Case: Corsair Carbide Spec-03
    will include a basic gaming keyboard if sold as whole ​

    May split

    Price and currency: £380
    Delivery: Delivery cost is not included
    Payment method: Bank Transfer
    Location: Bexhill on Sea
    Advertised elsewhere?: Advertised elsewhere
    Prefer goods collected?: I prefer the goods to be collected

    ______________________________________________________
    This message is automatically inserted in all classifieds forum threads.
    By replying to this thread you agree to abide by the trading rules detailed here.
    Please be advised, all buyers and sellers should satisfy themselves that the other party is genuine by providing the following via private conversation to each other after negotiations are complete and prior to dispatching goods and making payment:

    • Landline telephone number. Make a call to check out the area code and number are correct, too
    • Name and address including postcode
    • Valid e-mail address

    DO NOT proceed with a deal until you are completely satisfied with all details being correct. It’s in your best interest to check out these details yourself.

    Last edited: May 20, 2019

  2. Also have an additional 8GB Corsair 1600mhz Vengeance LP – 1x8GB ram stick £25

Share This Page

Loading…

Go to Original Article
Author:

Microsoft In Culture | Cloud9 is disrupting the esports landscape

With half a billion fans globally, esports has been experiencing a meteoric rise. And at the forefront is Cloud9—one of the fastest growing and most successful organizations in the world of competitive video gaming. Cloud9’s teams are comprised of world-class players and coaches, and they’re focused on the same things as any traditional top-tier sports team: developing the next generation of elite players and cultivating a competitive edge to ensure success.

When it comes to how esports organizations function, recruit, and nurture their talent, Cloud9 was an early pioneer. But today, with international teams across 12 of esports’ most popular games like League of Legends and Counter Strike: Global Offensive and with several championships to their name, their new challenge is staying on top. And the key to that competitive advantage is data.

Go to Original Article
Author: Microsoft News Center

Ransomware attacks on local and state governments increasing

It’s not just enterprises that fall victim to ransomware attacks. According to Recorded Future, such attacks against local and state governments are on the rise.

A report published earlier this month from the Boston-based threat intelligence firm catalogued 53 ransomware incidents involving local and state governments in 2018, compared to 38 the year before.

There were 21 reported ransomware attacks against state and local governments in the first four months of 2019 — excluding the attacks on Lynn, Mass.; Cartersville, Ga.; and Baltimore — said Allan Liska, senior security architect at Recorded Future and author of the report.

Liska listed a total of 169 ransomware incidents affecting state and local governments since 2013.

“There are vulnerable systems in state and local governments that happen to be the same kind of systems that the bad guys are looking to exploit,” Liska said.

According to Recorded Future, attackers are often not specifically targeting local and state governments. They’re targeting networks’ communication protocols like Microsoft’s remote desktop protocol, Liska said, because older versions of RDP have a ton of exploits and a lot of state and local governments happen to leave these systems open.

“Often you can brute force your way into one of these open RDP servers and that then gives you direct access into the network,” he said.

Unfortunately, if you look at the landscape of state and local governments … they tend to be under-resourced and therefore they tend to be high-value targets.
Marc French Senior vice president and chief trust officer, Mimecast

Criminals are opportunistic and go after easy targets, and those tend to be the organizations that have the least amount of investment and protective measures in place, said Marc French, senior vice president and chief trust officer at Mimecast.

“Unfortunately, if you look at the landscape of state and local governments … they tend to be under-resourced and therefore they tend to be high-value targets; they also have interesting data like driver’s license information, or healthcare data, or tax information,” French said.

It creates a perfect storm for opportunistic criminals, he added.

Liska said cybercriminals think there’s an opportunity because of the outsized media coverage such attacks get, which makes them think they are going to be paid. But state and local governments are less likely than other sectors to pay the ransom, the report found.

Big game hunting

Endpoint security vendor CrowdStrike has observed a significant occurrence of targeted ransomware attacks, dubbed “big game hunting,” in the past 12 months. Many of these big game hunting attacks — which causes widespread disruption and comes with a steep ransom demand — are targeting state and local governments, said Adam Meyers, vice president of intelligence at CrowdStrike.

In the last few months there has been reported big game hunting attacks on Cartersville, Ga.; Potter County, Texas; Baltimore; Cleveland Hopkins Airport and Greenville, N.C., Meyers said.

“Big game hunting actors look for organizations that cannot have down time and are potentially unprepared for the complex recovery that would be required to get back online,” Meyers said via email. “They also likely perceive these targets as capable of paying a steep ransom. Municipalities, utilities and operational environments are all ripe targets for these actors.”

But these ransomware attacks are preventable, he added.

“Having visibility on the endpoint, an operations team which is abreast of current threats and a security-driven approach are all critical,” he said. “In addition, a solid backup system and table-topping these types of incidents can ensure quick recovery without paying a ransom.”

Defending against ransomware attacks

Experts expect ransomware attacks on state and local governments to rise in the next couple of years.

“I do think until it’s less profitable, meaning people aren’t paying the ransom because they figured out how to protect themselves, ransomware attacks will continue to rise,” said David Dufour, vice president of engineering at Webroot. “Government entities do need to put the backups in place, and put a restore plan in place and then you’ll see a decline.”

Most enterprises have the finances to have a good security posture, Dufour said, but local and state governments lack such resources.

“I don’t see a lot of government entities have done that mainly because they don’t have the budget,” he said. “Enterprises commit to that because most enterprises make a profit and they contribute some of that profit to the overhead expense of being able to recover. It’s just part of their disaster recovery plan, where governments just don’t have the funds to do that.”

A lot of state and local governments are also spending their allocated resources to protect against phishing campaigns, but most cybercriminals aren’t using phishing as the method of delivering ransomware anymore, Liska said.

“They are protecting against the wrong thing,” Liska said. “A sort of centralized accounting of the type of ransomware attacks and how it works would allow local and state governments to better say, ‘Oh, I should be putting my resources here to defend my network rather than where I’m putting them now.'”

Liska also advised state and local governments to get an external view of their networks.

“They need to have somebody come in to make sure that all of the systems are closed to ensure that what they think the security posture of the network is, is actually the reality of the security posture of their network,” he said.

For those with multiple users on their networks, Liska said, they should make sure their backups aren’t connected in a way that the ransomware can jump through it and encrypt their backups.

“A good backup is really one of the best defenses against ransomware because if you can restore and restore quickly you can get your operations back and running faster.”

Mimecast’s French urged local and state government IT professionals to not be afraid of reaching out for help.

“What I’ve seen to be successful in the past is there are organizations of municipal and county governments and also volunteers in the private sector that will help them defend those environments,” he said. “Leverage the environment around you and don’t think that you need to do it yourself.”

Go to Original Article
Author:

For Sale – Gaming PC, i5-4460, Asus Strix GTX970 4GB, EVGA Supanova G2 850w PS

Discussion in ‘Desktop Computer Classifieds‘ started by schillaci0, May 20, 2019.

  1. Hi All,

    Selling my son’s gaming PC.

    CPU:Intel Core i5 4460 3.2Ghz
    CPU Cooler: Zalman CNPS10X Optima
    Operating System: Windows 10 Pro
    Motherboard: Gigabyte Z97P-D3
    RAM: 8GB Corsair 1600mhz Vengeance – 2x4GB
    Hard Drive: Kingston 120GB SSD & Seagate 1TB SSHD
    Graphics card: Asus Strix GeoForce GTX970 4GB OC edition with original box
    PSU: EVGA Supanova G2 Gold 850w with original box
    Case: Corsair Carbide Spec-03
    will include a basic gaming keyboard if sold as whole ​

    May split

    Price and currency: £380
    Delivery: Delivery cost is not included
    Payment method: Bank Transfer
    Location: Bexhill on Sea
    Advertised elsewhere?: Advertised elsewhere
    Prefer goods collected?: I prefer the goods to be collected

    ______________________________________________________
    This message is automatically inserted in all classifieds forum threads.
    By replying to this thread you agree to abide by the trading rules detailed here.
    Please be advised, all buyers and sellers should satisfy themselves that the other party is genuine by providing the following via private conversation to each other after negotiations are complete and prior to dispatching goods and making payment:

    • Landline telephone number. Make a call to check out the area code and number are correct, too
    • Name and address including postcode
    • Valid e-mail address

    DO NOT proceed with a deal until you are completely satisfied with all details being correct. It’s in your best interest to check out these details yourself.

    Last edited: May 20, 2019

  2. Also have an additional 8GB Corsair 1600mhz Vengeance LP – 1x8GB ram stick £25

Share This Page

Loading…

Go to Original Article
Author: