By continuing to use the site or forum, you agree to the use of cookies, find out more by reading our GDPR policy

Unlike Windows 10 desktop PC, every Windows laptop keyboard has special keys we know as the Function Keys or the F1, F2, …F12 keys on the top row that lead to different shortcuts to certain features or functions. But what if you don’t aren’t a frequent user of such features or functions and you just want to use them as the regular function keys? Want to use the function keys without pressing the Fn button? There’s a whole lot of things you can do with the function keys, you can change the brightness, control the volume, control the music using the dedicated media playback keys, toggle Wi-Fi and Bluetooth connection, and so on. These keys are just fine and come handy at times, however, the function keys on your Windows 10 PC comes with a specific Fn key that temporarily gives you access to the standard Fn keys such as F1, F2, …F12 keys and disables these features. What if you don’t want to press the double keys (F1, F2… keys along with the Fn key) to work with the actual F1, F2, …F12 keys? You can disable the special features that your laptop offers via the function key and simply gain access to the regular F1, F2, …F12 keys on Windows. However, altering the function keys on Windows 10 isn’t as easy as you see on Mac. Use Of The Keyboard Shotcut is a method for those who have a Windows laptop with the Fn lock key on the keyboard. The quickest way to disable the Fn key and use the standard function keys instead of the special features, no need to enter the BIOS settings for changing it. Although this shortcut is pretty much handy, not all laptops come with the Fn lock key, notice the Fn lock icon or lock/unlock symbol on the F1, F2… keys or Esc key. Once you find it, press the Fn Key + Function Lock key simultaneously to enable or disable the standard F1, F2, …F12 keys. Voila! You can now use the functions keys without pressing the Fn key. Your laptop manufacturer offers you either software for disabling the function key features or you do it through the BIOS or UEFI settings. Your laptop needs to boot into the BIOS mode or UEFI settings which can be accessed before starting the Windows. Whenever you restart your laptop or start by pressing the power button, a quick screen with a logo at the start comes by and this is where you can access the function key and the rest of the system settings. Look for the shortcut like Press F2 or F10 for BIOS settings. The shortcut isn’t the same across the manufacturers, you may press the shortcut given to your Windows laptop. In some cases, the shortcut can be F1, F9, or F12 too, but before pressing these keys, make sure you look at your laptop’s start screen carefully for the shortcut mentioned below. You can try for F2 if the screen doesn’t show at the start. Once you enter the BIOS or UEFI settings, locate to the function keys option in the system configuration or advanced settings, once you find it, enable or disable the function keys as desired. For detailed instructions navigate to OUR FORUM.

Windows 10 May 2020 Update is the first of two feature-packed releases planned for this year. The new version of the operating system brought a redesigned Cortana app and the ability to make your PC password-less name just a few new additions. Unfortunately, there were some unplanned changes that arrived with the update too, including users left unable to connect to printers, randomly deleting emails in Gmail, problems accessing files saved in OneDrive cloud storage, and stuttering video games. And now there's another quibble to add to the ever-growing list since the rollout of Windows 10 May 2020 Update. Spotted by Microsoft-centric blog Windows Latest, a number of users who installed the latest Patch Tuesday – a monthly bundle of bug fixes and security improvements pushed out by Microsoft – have started to notice issues with their internet connection. Windows 10 users who are impacted by the issue are being alerted by a "No Internet Access" warning message that appears within the "Network and Internet" panel in the Settings app. Bafflingly, the issue only appears to affect select internet-enabled services baked into the operating system. According to one user, while the "No Internet Access" warning appears within the Settings app, browsing the internet works without a hitch... but asking Cortana a question doesn't return an answer – only a notification that an active internet connection is required to use the digital assistant. Even though there is an active internet connection to your device, a number of apps and system features will not work if Windows 10 believes – incorrectly, in this case – that there is a problem connecting to Wi-Fi. Anecdotal evidence from the Windows Latest blog post suggests the main features impacted for users are Cortana, Microsoft Store, and Spotify. That's enough to cause users a serious headache. Thankfully, Microsoft is well aware of the issue and is actively looking into a fix. With any luck, that means we won't have to wait very long until a new update is rolled out to fix the problem. The next Patch Tuesday is scheduled on August 11, 2020, although Microsoft could rush it out to users a little earlier as long as it's ready / considered urgent enough. It's another blow for Windows 10 users who have had a rough time with the latest operating system. And as millions of people stay home to work and study due to the ongoing public health crisis, it's not an ideal time to be breaking essential features like internet connectivity, printers, and emails. (As for the video game problem, that's admittedly less essential ...but equally annoying). Keep up with all the problems Microsoft is having with bad updates by visiting OUR FORUM on a regular basis.

We’ve long heard rumors of Microsoft making a new lightweight version of Windows codenamed “Windows Lite”. Last year, Microsoft finally announced Windows 10X, a modular and lightweight operating for the dual-screen hardware with the ability to run Win32 apps in a virtualized container, but now it seems plans may have changed. According to multiple sources, Microsoft has delayed Windows 10X to Spring 2021 and it won’t arrive on dual-screen hardware until 2022. Windows 10X will first arrive on low-end PCs without legacy Win32 apps, but support for streaming legacy apps on Windows 10X could be delivered later through a “cloud-based solution”. In addition, Microsoft is also looking to launch and advertise Windows 10X as a web-first i.e web-focused operating system for low-cost PCs to take on Chromebooks. Windows 10X is a more modular hybrid version of Windows 10 desktop. It offers a simpler user interface and it includes “app container” for Win32 (legacy apps) backward compatibility. When Microsoft demoed Windows 10X on Surface Neo in 2019, Microsoft said that this version of Windows was specifically intended for dual-screen devices. In 2020, Microsoft said Windows 10X is being retooled for single-screen devices and it will show up on dual-screen hardware later. The plans have now changed and Microsoft is looking to deliver Windows 10X with Chromebook-like affordable 2-in-1s in early 2021 and that version of Windows 10X will not include Win32 apps container support. In other words, Windows 10X will operate a bit like Windows 10 S, but it will offer a different set of capabilities, functions and security features than the Windows 10 desktop, which should make it a viable alternative to the Chromebook. The core interface of Windows 10X will be similar to Windows as it exists today, but it will work like a lightweight OS with greater touch optimizations and less cluttered interface to deliver long-lasting performance and battery backup. As is the case with mobile platforms, there’ll be some limitations to improve the performance and security of the OS. For example, you won’t be officially allowed to modify your Windows Registry to customize the experience and Microsoft will also remove the legacy components, such as Control Panel and classic File Explorer. Windows 10X will be both faster and leaner than previous Windows operating systems because it ditches the legacy components. Like Windows 10 in S Mode, it will reportedly only run UWP and PWAs downloaded from the Microsoft Store. The PWAs generated using Microsoft Edge will also work on Windows 10X. Windows 10X won’t have local support for Win32 apps when it launches next year, but Microsoft is planning to offer “app streaming” support. According to reports, you will have to stream the desktop or legacy apps you want to use over an internet connection using Microsoft’s cloud-powered streaming technology. According to a job post on LinkedIn, Microsoft has already started exploring a new virtualization service called “Cloud PC” where software such as Office will be delivered virtually by Microsoft. The tech giant’s work on “Cloud PC” might allow users to run Win32 apps on Windows 10X in future, but the highly-anticipated Win32 container support won’t be there next year because of power and resources problem. As I reported earlier this year, Microsoft has had problems with Win32 app performance in internal builds of Windows 10X apps. Learn more about this interesting new operating system at OUR FORUM.

Chinese hackers are targeting Android phones with a new piece of malware that attempts to fool people into clicking on a “missed delivery” text — the kind of text that’s no doubt become especially familiar to people during the coronavirus pandemic as they spend more time at home and ordering items for delivery. The text is actually a phishing scam that enables everything from stealing bank details to a user’s contact list.It’s being perpetrated, according to cybersecurity researchers, by a group of hackers operating under the “Roaming Mantis” collective. Another day, another nasty new piece of Android malware to be aware of — this time, according to cybersecurity researchers at Cybereason, it’s malware that uses a “missed delivery” text to phish its unsuspecting recipients. There has been a spate of these incidents lately, involving everything from sketchy apps found in the Google Play Store to the presence of undeletable, malicious files and apps inside Android phones. After investigating this latest malfeasance, Cybereason’s team found that it’s a Chinese-speaking group of hackers operating under the banner of “Roaming Mantis” that’s behind this so-called FakeSpy malware campaign. “FakeSpy has been in the wild since 2017; this latest campaign indicates that it has become more powerful,” the Cybereason team notes. “Code improvements, new capabilities, anti-emulation techniques, and new, global targets all suggest that this malware is well-maintained by its authors and continues to evolve.” According to this research, FakeSpy can exfiltrate and send SMS messages, in addition to stealing financial data, reading account information, and contact lists, among other nefarious acts. Users are tricked into clicking a text message informing them of a missed delivery, which steers them to download an Android application package. This is being used to target Android users all over the world, including in the US thanks to the malware’s ability to send messages that purport to be from the US Postal Service. “Roaming Mantis” sounds the name of a villain from a movie, but it’s actually the moniker of a Chinese threat actor group that’s been around for a few years now and has continued to evolve. They used to mostly target Asian countries but have since expanded to strike at victims across the world. What can you do to protect yourself? Cybereason senior director and head of threat research Assaf Dahan told ZDNet that people should be suspicious of SMS messages that contain links. “If they do click on a link,” Dahan said, “they need to check the authenticity of the webpage, look for typos or wrong website name, and most of all — avoid downloading apps from unofficial stores.” These practices can protect you from inadvertently downloading malicious apps, getting phished by clicking on dodgy text message links, and more. For more on this topic visit OUR FORUM often.

Phone signals may cut out for days if networks are forced to remove Huawei equipment, executives from operators informed Members of Parliament. Representatives from Vodafone and BT told the Science and Technology Select Committee they would need at least five years to completely remove the Chinese firm's equipment without causing disruption. The government is currently reviewing a report from the National Cyber Security Centre (NCSC) and the potential security risk Huawei poses by being a part of 5G networks. A government decision in January permitted the Chinese firm limited access, but there is continued pressure to remove Huawei from communication networks entirely, and new US sanctions aimed at the firm's supply chain has sparked a review of the decision. Currently, Government policy permits Huawei to be in up to 35 percent of a 5G network, but as a “high-risk vendor”, it can not be present in the core parts of a network. When asked about the impact of being told to completely remove Huawei equipment from their networks should Government policy change, both Vodafone and BT warned that it would cost “billions of pounds” and could lead to some customers losing phone signal for several days. “Should the guidance become stricter it will have an effect, it will delay the rollout of our 5G, it will have cost implications and focus our investment in the removal of the existing equipment,” Andrea Dona, Vodafone UK's head of networks said. If the current guidelines were to be tightened and further restrictions were to be imposed, we would need to spend in the order of billions to change our current infrastructure.” Dona also said it would be “highly disruptive” for customers if the Government asked the firm to remove Huawei within two years and any swap would see customers “lose their signal”, in some cases for “a couple of days”. To avoid such a scenario, the Vodafone executive told MPs “a five-year transition plan” would be the minimum required. Vodafone had made similar warnings last year, saying that the cost of banning Huawei equipment would run into the “hundreds of millions”. BT's chief technology and information officer, Howard Watson added: “It is logically impossible to get to zero (Huawei presence) in a three-year period. “That would literally mean blackouts for customers on 4G and 2G, as well as 5G, throughout the country as we were to build that in. So we would definitely not recommend that we go down that route.” Earlier in the session, Huawei defended its security record and denied that it would be compelled to follow any orders given to it by the Chinese government. Huawei vice president Victor Zhang told MPs that it was independent of any government and it would always follow UK law. Zhang also urged the Government to give Huawei time to understand the implication of US sanctions before choosing to ban the company from digital infrastructure. He called the sanctions “unjustified” and said allegations about security were not true, adding that Huawei believed it could still successfully operate in the UK in the short term. “We have already submitted our initial assessment to our customers and to the NCSC and the initial solution is that in the short term there is Huawei's capability to supply to the UK's 5G and fiber solution, and we have already prepared for the next five years to make sure the UK's existing network will not be impacted by the sanctions,” he said. You want to learn more, please visit OUR FORUM.

A healthy percentage of Android users targeted by mobile malware or mobile adware last year suffered a system partition infection, making the malicious files virtually undeletable. That’s according to research from Kaspersky, which found that 14.8 percent of its users who suffered such attacks were left with undeletable files. These range from trojans that can install and run apps without the user’s knowledge, to less threatening, but nevertheless intrusive, advertising apps. “A system partition infection entails a high level of risk for the users of infected devices, as a security solution cannot access the system directories, meaning it cannot remove the malicious files,” the firm explained, in a posting on Monday. Moreover, the research found that most devices harbor pre-installed default applications that are also undeletable – the number of those affected varies from 1 to 5 percent of users with low-cost devices and reaches 27 percent in extreme cases. “Infection can happen via two paths: The threat gains root access on a device and installs adware in the system partition, or the code for displaying ads gets into the firmware of the device before it even ends up in the hands of the consumer,” according to the firm. In the latter scenario, this could lead to potentially undesired and unplanned consequences. For instance, many smartphones have functions providing remote access to the device. If abused, such a feature could lead to a data compromise of a user’s device. Among the most common types of malware that Kaspersky has found installed in the system partition of Android smartphones are two older threats: The Lezok and Triada trojans. “The latter is notable for its ad code embedded not just anywhere, but directly in libandroid_runtime — a key library used by almost all apps on the device,” according to the analysis. However, examining victims’ system apps revealed a wide range of threats. The Agent trojan for instance is an obfuscated malware that usually hides in the app that handles the graphical interface of the system, or in the Settings utility, without which the smartphone cannot function properly. The malware delivers its payload, which in turn can download and run arbitrary files on the device. Then there’s the Sivu trojan, which is a dropper masquerading as an HTMLViewer app. “The malware consists of two modules and can use root permissions on the device,” according to Kaspersky. “The first module displays ads on top of other windows, and in notifications. The second module is a backdoor allowing remote control of the smartphone. Its capabilities include installing, uninstalling, and running apps, which can be used to covertly install both legitimate and malicious apps, depending on the intruder’s goals.” The Plague adware app is another common threat that Kaspersky found installed in the system partition. It pretends to be a legitimate system service, calling itself Android Services – but in reality, it can download and install apps behind the user’s back, as well as display ads in notifications. “What’s more, Plague.f can display ads in SYSTEM_ALERT_WINDOW — a pop-up window that sits on top of all apps,” explained the researchers. The Necro.d trojan is unusual because it’s a native library located in the system directory. Its launch mechanism is built into another system library,, which handles the operation of Android services. “At the command of the command-and-control (C2), Necro.d can download, install, uninstall and run apps,” explained the researchers. “In addition, the developers decided to leave themselves a backdoor for executing arbitrary shell commands. On top of that, Necro.d can download Kingroot superuser rights utility — seemingly so that the OS security system does not interfere with delivering ‘very important’ content for the user.” Further details can be found on OUR FORUM.