<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>windows Archives - DNS Texas</title>
	<atom:link href="https://www.dnstexas.com/tag/windows/feed/" rel="self" type="application/rss+xml" />
	<link>https://www.dnstexas.com/tag/windows/</link>
	<description>Your One-Stop Multi-Solution Service Provider</description>
	<lastBuildDate>Wed, 19 Jun 2019 04:11:22 +0000</lastBuildDate>
	<language>en-US</language>
	<sy:updatePeriod>
	hourly	</sy:updatePeriod>
	<sy:updateFrequency>
	1	</sy:updateFrequency>
	<generator>https://wordpress.org/?v=6.9.4</generator>

<image>
	<url>https://www.dnstexas.com/wp-content/uploads/2023/06/favico2023.png</url>
	<title>windows Archives - DNS Texas</title>
	<link>https://www.dnstexas.com/tag/windows/</link>
	<width>32</width>
	<height>32</height>
</image> 
	<item>
		<title>The BlueKeep (CVE-2019-0708) Vulnerability</title>
		<link>https://www.dnstexas.com/201906/the-bluekeep-cve-2019-0708-vulnerability/</link>
					<comments>https://www.dnstexas.com/201906/the-bluekeep-cve-2019-0708-vulnerability/#respond</comments>
		
		<dc:creator><![CDATA[DNS Texas Support]]></dc:creator>
		<pubDate>Wed, 19 Jun 2019 04:00:33 +0000</pubDate>
				<category><![CDATA[Security Alerts]]></category>
		<category><![CDATA[Windows Server O/S]]></category>
		<category><![CDATA[Windows Workstation O/S]]></category>
		<category><![CDATA[bluekeep]]></category>
		<category><![CDATA[microsoft]]></category>
		<category><![CDATA[patch]]></category>
		<category><![CDATA[security]]></category>
		<category><![CDATA[securityalerts]]></category>
		<category><![CDATA[windows]]></category>
		<guid isPermaLink="false">https://www.dnstexas.com/?p=1081</guid>

					<description><![CDATA[<p>Quick Summary A recently discovered, critical, flaw affecting Remote Desktop Protocol (RDP) in multiple versions of Microsoft Windows has been discovered.  Both Microsoft and the Department Of Homeland Security strongly urges all customers running affected operating systems to make sure their systems are patched immediately by running Windows Updates. The BlueKeep (CVE-2019-0708) Vulnerability BlueKeep (AKA: [&#8230;]</p>
<p>The post <a href="https://www.dnstexas.com/201906/the-bluekeep-cve-2019-0708-vulnerability/">The BlueKeep (CVE-2019-0708) Vulnerability</a> appeared first on <a href="https://www.dnstexas.com">DNS Texas</a>.</p>
]]></description>
		
					<wfw:commentRss>https://www.dnstexas.com/201906/the-bluekeep-cve-2019-0708-vulnerability/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>Ransomware Alert &#8211; June 27 2017</title>
		<link>https://www.dnstexas.com/201706/ransomware-alert-june-27-2017/</link>
					<comments>https://www.dnstexas.com/201706/ransomware-alert-june-27-2017/#respond</comments>
		
		<dc:creator><![CDATA[DNS Texas Support]]></dc:creator>
		<pubDate>Wed, 28 Jun 2017 03:33:54 +0000</pubDate>
				<category><![CDATA[DNS Texas Communications]]></category>
		<category><![CDATA[Security Alerts]]></category>
		<category><![CDATA[alert]]></category>
		<category><![CDATA[backup]]></category>
		<category><![CDATA[malware]]></category>
		<category><![CDATA[security]]></category>
		<category><![CDATA[windows]]></category>
		<guid isPermaLink="false">https://www.dnstexas.com/?p=643</guid>

					<description><![CDATA[<p>On Tuesday 6/27/2017 another massive ransomware attack hit the world.  This one is known as ‘Petya’ appears to have originated from a highly sophisticated Russian strain of the WannaCry strand that hit back in May 2017.  The ransomware, if launched, will encrypt all files on the user’s computer, making them unusable.  The ‘worm’ also transmits [&#8230;]</p>
<p>The post <a href="https://www.dnstexas.com/201706/ransomware-alert-june-27-2017/">Ransomware Alert &#8211; June 27 2017</a> appeared first on <a href="https://www.dnstexas.com">DNS Texas</a>.</p>
]]></description>
		
					<wfw:commentRss>https://www.dnstexas.com/201706/ransomware-alert-june-27-2017/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>URGENT Malware/Ransomware Newsletter – May 2017</title>
		<link>https://www.dnstexas.com/201705/urgent-malwareransomware-newsletter-may-2017/</link>
					<comments>https://www.dnstexas.com/201705/urgent-malwareransomware-newsletter-may-2017/#respond</comments>
		
		<dc:creator><![CDATA[DNS Texas Support]]></dc:creator>
		<pubDate>Sat, 13 May 2017 19:45:34 +0000</pubDate>
				<category><![CDATA[DNS Texas Communications]]></category>
		<category><![CDATA[Security Alerts]]></category>
		<category><![CDATA[alert]]></category>
		<category><![CDATA[backup]]></category>
		<category><![CDATA[malware]]></category>
		<category><![CDATA[ms17]]></category>
		<category><![CDATA[security]]></category>
		<category><![CDATA[windows]]></category>
		<guid isPermaLink="false">https://www.dnstexas.com/?p=606</guid>

					<description><![CDATA[<p>URGENT Malware/Ransomware Newsletter – May 2017 As you may have heard, a new threat has emerged on the internet known as WannaCry (AKA Wcry and WannaCryptor), although the exploit is not new as far as what it does, this latest ransomware threat has already crippled companies overseas and has started to show up in the [&#8230;]</p>
<p>The post <a href="https://www.dnstexas.com/201705/urgent-malwareransomware-newsletter-may-2017/">URGENT Malware/Ransomware Newsletter – May 2017</a> appeared first on <a href="https://www.dnstexas.com">DNS Texas</a>.</p>
]]></description>
		
					<wfw:commentRss>https://www.dnstexas.com/201705/urgent-malwareransomware-newsletter-may-2017/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>Internet Explorer Missing &#8216;Continue To This Website&#8217; Option</title>
		<link>https://www.dnstexas.com/201702/internet-explorer-missing-continue-website-option/</link>
					<comments>https://www.dnstexas.com/201702/internet-explorer-missing-continue-website-option/#respond</comments>
		
		<dc:creator><![CDATA[DNS Texas Support]]></dc:creator>
		<pubDate>Sat, 25 Feb 2017 06:13:47 +0000</pubDate>
				<category><![CDATA[Knowledgebase]]></category>
		<category><![CDATA[TechSupport]]></category>
		<category><![CDATA[ie10]]></category>
		<category><![CDATA[ie11]]></category>
		<category><![CDATA[internetexplorer]]></category>
		<category><![CDATA[ssl]]></category>
		<category><![CDATA[techsupport]]></category>
		<category><![CDATA[windows]]></category>
		<guid isPermaLink="false">https://www.dnstexas.com/?p=597</guid>

					<description><![CDATA[<p>Internet Explorer Missing &#8216;Continue To This Website&#8217; Option Using Internet Explorer 10 or 11 and visiting a website with a weak or untrusted SSL certificate, such as those typically found on some home routers, legacy RAID management cards, etc. You may find that you receive the error &#8220;There is a problem with this website&#8217;s security [&#8230;]</p>
<p>The post <a href="https://www.dnstexas.com/201702/internet-explorer-missing-continue-website-option/">Internet Explorer Missing &#8216;Continue To This Website&#8217; Option</a> appeared first on <a href="https://www.dnstexas.com">DNS Texas</a>.</p>
]]></description>
		
					<wfw:commentRss>https://www.dnstexas.com/201702/internet-explorer-missing-continue-website-option/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>Setting A Reliable Time Server For Your PDC Emulator</title>
		<link>https://www.dnstexas.com/201503/setting-reliable-time-server-pdc-emulator/</link>
					<comments>https://www.dnstexas.com/201503/setting-reliable-time-server-pdc-emulator/#respond</comments>
		
		<dc:creator><![CDATA[DNS Texas Support]]></dc:creator>
		<pubDate>Tue, 10 Mar 2015 00:24:45 +0000</pubDate>
				<category><![CDATA[Knowledgebase]]></category>
		<category><![CDATA[TechSupport]]></category>
		<category><![CDATA[Windows Server O/S]]></category>
		<category><![CDATA[nist]]></category>
		<category><![CDATA[techsupport]]></category>
		<category><![CDATA[time]]></category>
		<category><![CDATA[windows]]></category>
		<category><![CDATA[windowsserver]]></category>
		<guid isPermaLink="false">http://beta.dnstexas.com/?p=174</guid>

					<description><![CDATA[<p>Setting A Reliable Time Server For Your PDC Emulator ISSUE You need to set an authoritative time server on your PDC emulator and make it remain a reliable time source for your domain. APPLIES TO Windows Server 2008/2008r2/2012/2012r2. The authoritative time is configured only on the PDC emulator for your domain. The other domain controllers [&#8230;]</p>
<p>The post <a href="https://www.dnstexas.com/201503/setting-reliable-time-server-pdc-emulator/">Setting A Reliable Time Server For Your PDC Emulator</a> appeared first on <a href="https://www.dnstexas.com">DNS Texas</a>.</p>
]]></description>
		
					<wfw:commentRss>https://www.dnstexas.com/201503/setting-reliable-time-server-pdc-emulator/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
	</channel>
</rss>
