Jump to content

domroderiguez

Member
  • Posts

    3
  • Joined

  • Last visited

Awards

This user doesn't have any awards

Profile Information

  • Gender
    Male
  • Location
    Philadelphia, PA

System

  • CPU
    Intel Core i9-9900KS
  • Motherboard
    Gigabyte Z390 AORUS Xtreme
  • RAM
    G.Skill Trident Z RGB 64 GB (4 x 16 GB) DDR4-3600 Memory
  • GPU
    Gigabyte Aorus GeForce RTX 2080 Ti Xtreme WATERFORCE
  • Case
    NZXT H710i
  • Storage
    Samsung 1TB 970 PRO, 2x Seagate 6TB BarraCuda Pro
  • PSU
    SeaSonic Prime Ultra Titanium Series 1000W
  • Display(s)
    Dell U2718Q, ASUS ROG Swift PG279Q
  • Cooling
    NZXT Kraken Z73, 3x Noctua NF-F12 iPPC, Noctua NF-A14 iPPC
  • Keyboard
    Das Keyboard 4Q
  • Mouse
    Logitech MX Master 2S
  • Operating System
    Windows 10 Pro
  • Laptop
    Apple MacBook Pro
  • PCPartPicker URL

Recent Profile Visitors

The recent visitors block is disabled and is not being shown to other users.

domroderiguez's Achievements

  1. Sorry, I didn't see that this story was already posted. I found the original post and is linked below.
  2. Google researchers discovered a Windows exploit involving local system privileges being combined by attackers with a separate Google Chrome security flaw patched last Friday. While the Chrome exploit is inactive after Google rolled out a security update, Windows users running old versions are still at risk. "The flaw, which resides in the Windows win32k.sys kernel driver, gives attackers a means to break out of security sandboxes that Chrome and most other browsers use to keep untrusted code from interacting with sensitive parts of an OS. Attackers combined an exploit for this vulnerability with an exploit for CVE-2019-5786, a use-after-free bug in Chrome’s FileReader component. The Windows vulnerability is a NULL pointer dereference in win32k!MNGetpItemFromIndex when the NtUserMNDragOver() system call is called under specific circumstances." - Ars Technica While Google released a patch for chrome a week ago the update requires a browser restart to take effect unlike the previous chrome exploit involving the Adobe Flash plug-in which did not require a restart. Clement Lecigne, a member of Google’s Threat Analysis Group advises that all Windows users upgrade to version 10. (source - https://arstechnica.com/information-technology/2019/03/attackers-are-actively-exploiting-a-serious-windows-zeroday-in-the-wild/)
  3. Amazon US Deals: Blue Yeti USB Microphone - Blackout Edition $89.99 Blue Yeti USB Microphone - Silver $89.99 Blue Yeti USB Microphone - Midnight Blue $89.99 Blue Microphones Yeti USB Microphone - Whiteout $89.99 Blue Yeti USB Microphone - Vintage White $89.99 Corsair Hydro Series H100i v2 Extreme Performance Liquid CPU Cooler, Black $84.99 Corsair Crystal Series 570X RGB - Tempered Glass, Premium ATX Mid-Tower Case Cases CC-9011098-WW $139.99 Razer Blade Stealth 12.5" 4K Touchscreen Ultrabook (7th Generation Intel Core i7, 16GB RAM, 512GB SSD, Windows 10) $1,299.99 Razer Firefly Chroma Custom Lighting Cloth Gaming Mouse Pad $39.99 Razer Naga Hex V2 MOBA Gaming Mouse - 7 Button Mechanical Thumb Grid - Chroma Lighting - 16,000 DPI $39.99 NETGEAR Nighthawk X10 $344.99 Linksys Velop Tri-band Whole Home WiFi Mesh System, 3-Pack $399.99
×