Recent Facebook, Instagram, WhatsApp, Messenger & Oculus fiasco and downtime reminded us that even big IT tech behemoth is vulnerable and can go offline. The situation has been resolve in not so fast manner but not long also, let’s say it was resolved in time that people have not left and switched to another platform.
That being said, now when services are back we stopped and reflected on the platform itself and on its users. If Facebook is vulnerable so are its users, but sometimes users themselves are responsible for being a target. We step back and take a look at posts that manifest on Facebook and have come with some advice on what things you should never post on Facebook and on other social platforms.
Pictures of any kind of ID, bill, vaccine cards or similar document
This should be a no-brainer at all but we see people posting this kind of information. They go on a rant about how the bill is too high and place a picture of it, or they took their vaccine shot and posted a vaccine card as proof. Why this is a bad idea is that any of these documents contain certain things like birthdays, names, and even more like addresses and other information that can be used against users.
Information about where you live
This could be tied to the previous point but it is very crucial that a living address is not something that you wish to share publicly. A lot of burglars are stalking social media for exactly this kind of information so they can then analyze when and how to strike and this time you have done all work for them providing them with the information on where to find your flat.
Daily routines and vacation plans
The most burglary happens to believe it or not during the day, in hours when people are at work. So by providing the world with your daily routines and when you are not at home you are putting your home at risk of being broken into. Posting vacation plans are even worse or posting pictures and status when you are on vacation will send a clear message to anyone that your home is empty and unattended.
Pictures of your home interior
This can also sadly disclosure more information that you wish like maybe some interesting facts like address or birthday on certificates, diplomas, or other documents accidentally caught in the taken picture. Also, these kinds of pictures can show much about your home security, alarm positions if you have some, how is your front door secured, etc.
Content that can get you fired
We hear all the time, famous star or director has some tweets that have resurfaced and now it is fired. I know that many of us are not famous stars but we can also be fired. Sharing some offensive opinions, inappropriate content or just plain pure lies like took sick leave to play this new game can have not so great resolution for your working relationship with your employer. We do not support lies nor do any kind of inappropriate content but posting it online on social media will just make things worse for you personally.
Your login info or sites and services that you are using
It is fairly safe to say hey we are chilling with Netflix or watching the new season of Mandalorian on Disney plus but speaking of things like made a new account on freelancer service of got my new e-banking in this cool new bank, etc. is not very wise. Cyber crooks are always on the lookout for identity theft and will use available information to steal data and money. You are risking also losing provided accounts this way leaving you with tons of work to explain that you got mugged to service providers.
Conclusion
We know that this article seems paranoid and maybe assumes that among your friends there are some crocks and people trying to take advantage of you. As this certainly was not our attention nor goal, we had to point to extremes in order to protect you the most.
If you suddenly see a black border in your computer’s display then you might be wondering how come this happened but worry not for this post will give you a couple of suggestions that could help you resolve the problem.
The black bar could appear at the bottom or just the sides of the screen. Whichever it may be, there are options you can check out. Refer to the options givens below and make sure to follow them carefully.
Option 1 – Try checking the screen resolution
You might want to try checking the resolution of your screen.
Open the Windows 10 Settings and go to Display.
Next, go for the “100% (Recommended)” option under Scale and layout for the size of the text, apps, and other items.
After that, select the Recommended setting again under Resolution.
Now check to see if the black bars are still there. They should be gone at this point, but if for some strange reason nothing has changed, then attempt the steps below.
You might want to try updating your graphics and monitor drivers if you haven’t updated them for some time now. To do that, refer to these steps:
First, boot your computer into Safe Mode.
After that, tap the Win + R keys to launch Run.
Type in devmgmt.msc into the box and tap Enter or click OK to open the Device Manager.
After that, a list of device drivers will be displayed. From there, look for the Graphics drivers or the Monitor drivers and then click each one of them.
After that, right-click on each entry and select the “Uninstall Device” option from the menu.
Now restart your computer.
After restarting your computer, go to the Settings app and Check for Updates in the Windows Update section.
Note: You can also try to roll back the graphics and monitor drivers back to their previous versions if updating them didn’t work. You can also try visiting the manufacturer’s website and download the graphics or monitor driver setup for your operating system.
Option 3 – Try to run the DISM tool
You can also run the DISM Tool as it might also help in getting rid of the black border or bar on your Windows 10 computer. Using this built-in tool, you have various options such as the “/ScanHealth”, “/CheckHealth”, and “/RestoreHealth” which could help you resolve the problem.
Open the Command Prompt with admin privileges.
Then type in the following commands and make sure to hit Enter right after you type each one of them:
Dism /Online /Cleanup-Image /CheckHealth
Dism /Online /Cleanup-Image /ScanHealth
exe /Online /Cleanup-image /Restorehealth
Do not close the window if the process takes a while as it will probably take a few minutes to finish.
Option 4 – Troubleshot the problem in a Clean Boot State
There are some instances that some conflicting programs installed in your computer might be the one that’s causing the Black border issue. To identify which program is causing the problem, you need to put your computer in a Clean Boot State. To do so, follow the steps below.
Log onto your PC as an administrator.
Type in MSConfig in the Start Search to open the System Configuration utility.
From there, go to the General tab and click “Selective startup”.
Clear the “Load Startup items” check box and make sure that the “Load System Services” and “Use Original boot configuration” options are checked.
Next, click the Services tab and select the “Hide All Microsoft Services” check box.
Click Disable all.
Click on Apply/OK and restart your PC. (This will put your PC into a Clean Boot State. And configure Windows to use the usual startup, just simply undo the changes.)
From there, start to isolate the problem by checking which one of the programs you installed recently is the root cause of the problem.
The latest update from Panos Panay on Twitter is including New and redesigned Snipping tool inside Windows 11. From the shared video, we can see that it includes modern Windows 11 UI redesign and it looks and feels like a part of Windows 11.
More things that can be seen from the shared video is that it looks like the new snipping tool is a merged version of the old with snip & sketch.
It is good to see that it is still possible to capture screen with easier way natively inside Windows 11 but some more functionality would be more welcome I guess.
Users were asking for added functions for a long time like adding simple text for example but from shared video, no new features were presented so for some users 3rd party solutions will still be the way to go.
The new and redesigned Snipping tool will roll out with the next update and we will see then about all new features inside it firsthand. Until then, take care.
PrintNightmare vulnerability has been a struggling issue for Microsoft in the past weeks, each time it seems to be addressed and fixed something new popped up and it still had issues.
Microsoft finally addressed the issue but with a price. The default behavior of Point and Print is changed. From this fix onward, the Point and Print driver installation and update behavior will require administrator privileges, which should prevent the exploit to the Windows Print Spooler that could be used by malicious individuals to gain administrative privileges in Windows.
The drawback of this fix from Microsoft is that non-elevated users may have difficulty adding or updating printers. Microsoft feels that the security risks caused by PrintNightmare are worth the tradeoff, though.
If you really want to let non-elevated users add printers, you can follow the instructions in this Microsoft Support article to disable this mitigation with a registry key. However, doing so will expose you to this known vulnerability and isn’t recommend.
Windows Vista had in it animated wallpapers on desktop but sadly how they were heavy on system resources Microsoft abandoned the idea. Moving forward a couple of years later we have Windows 10 but still, we do not have live animated wallpapers. Since I am the kind of person who does not want to wait on Microsoft and now it is time to bring animated wallpapers back I am going to make one all by myself and you are welcome to join the ride and do the same for you as well.
Enough talk, let's dive into how we can make animated wallpaper for our Windows 10.
Choosing the application
First, we will need some form of application which can we look at our animated wallpapers and since they are animations it means video, so we will need a video player and what better choice than a VLC player, an open-source light weighs all-format player.
Get a VLC player from here and install it.
Finding video source
The next thing is to of course have some looping video that we will use as background. There are many sites and ways to get seamless loop videos, I use this youtube channel for my backgrounds. Altho you can use any video footage you want it is recommended that it is not too long, that it is hi-resolution so we do not have pixels on-screen, and if you can, get it as seamless since we do not want to see stutter when the video is lopped from the beginning.
So hopefully you have desired video and VLC player installed.
Putting it all together
Copy the following code and paste it into your search bar in Windows to open the Startup folder, or navigate to the Startup folder yourself via file explorer if you know where it is.
%appdata%\Microsoft\Windows\Start Menu\Programs\Startup
Now, next thing is to copy and past the VLC shortcut into this folder so it is started when Windows is first time booted.
Right-click on the shortcut and in the edit field paste this:
"C:\Program Files\VideoLAN\VLC\vlc.exe" --video-wallpaper --qt-start-minimized --no-qt-fs-controller --repeat --no-video-title-show --qt-notification=0 "C:\videopath\filename.mp4"
where "C:\Program Files\VideoLAN\VLC\vlc.exe" is the path where VLC is installed, point this to where you have installed it
"C:\videopath\filename.mp4" is the path where you have your video that you wish to use as animated wallpaper. Please note also that in my case there is mp4 as an extension but it does not need to be mp4, just use any extension VLC can open and play.
Conclusion
And that's it, you have successfully made an animated background or live wallpaper on your Windows 10 computer. You can change your wallpaper anytime by editing shortcut and giving it a new path to a new video or simply overwrite the existing one with a new baring same name.
To develop a good understanding of the Sysdata.xml error code, it is first important to learn what is sysdata.xml file and its function. Sysdata.xml is a type of XML file. The .XML file extension is an Extensible Markup Language file.
XML-based formats have now become the default for many office productivity tools including Microsoft Office and LibreOffice. Furthermore, it has also come into common use for the interchange of data over the internet.
Sysdata.xml error code usually pops up when .XML based applications are unable to run and crash while loading. This is a type of BSoD (Blue Screen of Death) error code.
Common symptoms include:
System freeze
The screen turns blue
Sudden system shut down
Solution
Error Causes
The Sysdata.xml error code is triggered due to multiple reasons such as:
Faulty hardware
Malware or viral infection
Registry issues
No matter what the reason may be, it is advisable to fix this error code right away without any delays. This is a fatal error and can result in a system crash and loss of data. And recovering valuable lost data is the hardest.
Further Information and Manual Repair
Here are some of the effective and easy do it yourself methods to resolve this error on your system:
Method 1: Fix Faulty Hardware
Hardware issues may arise due to many reasons like manufacturing issues or voltage fluctuations. Electrical storms can cause power surges which may affect the hardware causing it to fail.
The best way to resolve this is to download the latest drivers for the problematic devices or alter the device configuration in the BIOS setup program.
To reconfigure the BIOS simply restart your PC and before Windows starts, press Del Key to access your BIOS.
Now find the factory reset option.
Select the option and press the button to load your factory defaults.
After that save changes and confirm your selection.
Reboot your PC to activate the changes.
Method 2: Scan for Viruses
Sometimes viruses and malware can disguise themselves in the .XML files which can cause them to get corrupted.
To resolve the issue, it is advisable to download a powerful antivirus and scan your entire PC for viruses. Remove the detected viruses to resolve the Sysdata.xml error on your system.
Method 3: Repair the Registry
If the registry is not cleaned frequently, it loads with unnecessary and obsolete files like the junk files and cookies.
These files clutter and damage the registry and eventually corrupt it and the important files like .XML files stored in it. To resolve the issue it is recommended to download Restoro.
It is a user-friendly and powerful PC Fixer embedded with a registry cleaner. It scans your entire PC for registry-related errors and removes them immediately. It cleans the cluttered registry and restores the damaged files thereby repairing the issue right away.
Click here to download Restoro.
As you know, Windows has a built-in Automatic Maintenance feature that takes care of important tasks such as security scanning and updating, Windows software updates, Disk Defragmentation, System Diagnostics, Disk Volume Errors, and many more. So if you receive an error message saying, “Windows is unable to run automatic maintenance, The maintenance schedule is unavailable”, then this post will guide you in what you can do to resolve this issue.
Here are some suggestions you can try if the Automatic Maintenance in your Windows 10 PC is not able to run.
Option 1 – Enable Automatic Maintenance
It is possible that Automatic Maintenance has been disabled so you can try enabling Automatic Maintenance on your Windows 10 PC. To do so, follow these steps:
Go to Control Panel.
From there, select System and Security > Security and Maintenance > Automatic Maintenance.
After that, set the time you want to run the Automatic Maintenance and then check the checkbox saying, “Allow scheduled maintenance to wake up my computer at the scheduled time”.
Click OK to save the changes.
On the other hand, you can also enable Automatic Maintenance via the Registry Editor. But before you proceed, you need to create a System Restore Point first.
Tap the Win + R keys to open the Run dialog box.
After that, type “Regedit” in the field and hit Enter to open the Registry Editor.
Next, look for the “MaintenanceDisabled” key and then double click on it to open it and then set its value to “0”.
Click OK and exit the Registry Editor.
Restart your computer.
Option 2 – Check the Task Scheduler Services status
Majority of the tasks in Windows 10 run via services. So it is most likely that either the Service has been stopped or is set to the manual which is why Windows is unable to run Automatic Maintenance. Thus, you need to change it to automatic mode.
Tap the Win + R keys to open Run.
Type “services.msc” in the field and hit Enter to open Services.
Next, look for the Task Scheduler service and tap the T key on your keyboard which should take you to the services that start with T.
Double click on the Task Scheduler service and select the Automatic option under the Startup Type.
If it is not started yet, click on the Start button.
Then click Apply and OK to save the changes.
Option 3 – Check the Status in Task Scheduler
You can also try checking the status in the Task Scheduler. Just open the Task Scheduler > Task Scheduler Library > Microsoft > Windows > TaskScheduler. From there, make sure that Idle Maintenance, Maintenance Configurator, and Regular Maintenance are enabled.
Option 4 – Run the System File Checker
The SFC or System File Checker scan could detect and automatically repair damaged system files that could be causing the Automatic Maintenance issue. SFC is a built-in command utility that helps in restoring corrupted files as well as missing files. It replaces bad and corrupted system files with good system files. To run the SFC command, follow the steps given below.
Tap Win + R to launch Run.
Type in cmd in the field and tap Enter.
After opening Command Prompt, type in sfc /scannow and hit Enter.
The command will start a system scan which will take a few whiles before it finishes. Once it’s done, you could get the following results:
Windows Resource Protection did not find any integrity violations.
Windows Resource Protection found corrupt files and successfully repaired them.
Windows Resource Protection found corrupt files but was unable to fix some of them.
Option 5 – Run the DISM tool
The DISM tool is another command-line tool in the Windows operating system that could help users fix various corrupted system files. To use it, follow these steps:
Open the Command Prompt as admin.
Then type in this command: DISM /Online /Cleanup-Image /RestoreHealth
The DISM command you entered will repair the corrupted system image. Do not close the window if the process takes a while as it will probably take a few minutes to finish.
Ever gotten an e-mail offer that seemed just a little bit too good to be true? Might’ve been a phishing attempt! These are everywhere and can come in many different forms.
So what’s phishing exactly, how can you detect it and how can you keep safe?
What is phishing?
Phishing (pronounced like fishing) is a type of cyberattack that tricks the user into trusting the source and revealing sensitive information. Fishing being the perfect analogy, the bait is a legitimate-looking site, e-mail or file and when you take a bite, your identity, banking information and much more can be revealed and stolen.
Credit: Anne Nygård on Unsplash
Some phishing attempts are incredibly obvious, others are super elaborate. Like with most types of malware, cybercriminals have become extremely well-versed in phishing and anyone can fall for it. To help you recognize and avoid it, we’ll take you through a couple of phishing types and give you tips on what to do if faced with them.
Phishing techniques
E-mail phishing
This is actually the most common type of phishing. A cybercriminal creates an e-mail containing stuff like attractive offers, legitimate-looking attachments or links and makes it appear as though it’s coming from a trusted source.
Credit: Justin Morgan on Unsplash
For example, it looks like it’s coming from your bank or your favorite retailer. The logo looks legit and the structure of the e-mail seems familiar, so you might get tricked into clicking on whatever clickable content is in it.
Unfortunately this exposes your device to malware that hands your data off to the hacker, who can decide what to do with it further.
SMS and social media phishing
Like the above example, you could be approached with lucrative offers or links via text messages or social media messages. Typically, the messages seem relevant to the user as they will be made to look like they’re related to apps or services you’re using.
Voice phishing
Voice phishing attacks are schemes that appear as though they’re coming from a credible number. Normally, you’ll get a call about something related to credit cards or taxes to get you into a state of worry, leading you to disclose personal information on the phone.
Spear phishing, whaling and BEC
Spear phishing normally targets specific individuals within a company who are likely to have access to sensitive data. Spear phishers spend time collecting information they can use to reach out to the individual looking as trustworthy as possible. They’ll typically lead with something relevant, for example mentioning an upcoming company event, and make a seemingly legitimate request.
Whaling is a more elaborate form of spear phishing, which targets people in even stronger positions such as executives or high-value individuals. The ultimate goal is to get them to transfer financial or other sensitive information that can be used to compromise the entire business.
Credit: Azamat E on Unsplash
BEC, or Business e-mail compromise, is a specific spear phishing technique carried out via e-mail. While there are many ways this is done, most commonly you’ll see instances where the phisher poses as a CEO or similar executive, or as a lower-level employee in specific positions (e.g. sales managers or financial controllers).
In the first situation, the impersonator reaches out to employees requesting them to transfer certain files or pay invoices. In the second situation, the phisher takes control of the employee’s e-mail account and sends false instructions to other employees in order to obtain data and information from them.
What can you do?
There are many ways you can be aware and spot a phishing attempt. Here are some tips:
Always check the sender’s address in your e-mails, even when they seem to come from a familiar source.
In any instance where payment information is requested, be very, very careful.
If you are receiving attachments you never asked for and definitely didn’t expect, better not click on them.
Beware of content that transmits a sense of urgency (sales deals, urgent updates to login credentials, etc.).
Bad spelling and grammar are usually a telltale sign of phishing.
Links that look shortened (e.g. Bit.ly) or just suspicious in general - if you have a bad feeling, do not click on them.
If you are receiving threats, you probably shouldn’t be clicking on anything in that message.
Always examine first-time senders in detail.
Block suspicious e-mail addresses, numbers and social media accounts.
If you are receiving a coupon for free stuff… You aren’t.
If you’re being asked to update your payment details by a service you use, such as Netflix, chances are it’s an impersonator.
Those are some of the ways to identify and prevent phishing attacks. However, sometimes phishers disguise themselves a little too well or a misclick happens and there you go - you’ve been exposed to malware.
Credit: FLY:D on Unsplash
This won’t happen if you invest in powerful protection software from the get-go, though. A good antivirus program like Bitdefender will keep you safe from becoming a victim of phishing scams. In fact, it will protect you from malicious attacks overall.
Be it your household or your business you’re concerned about, there are a bunch of different packages and options available, providing different kinds of cybersecurity services. That’s the only way you can ever really be sure you aren’t at risk of a digital attack.
Summary
Have you ever been targeted by phishers and didn’t know that’s what it was until you read this article? Many can relate. Protect yourself before it’s too late!
One of the issues with external storage devices is that unplugging them right away without using the “Safely Remove Hardware” feature is not safe and doing so could lead to data corruption and data loss. However, in some cases, even when you use the “Safely Remove Hardware” feature, you could get an error that says:
“Windows can’t stop your ‘Generic volume’ device because a program is still using it. Close any programs that might be using the device, and then try again later.”
It is possible that the system is still using the external device – for instance, a copy operation might still be in progress, or Windows is still indexing the contents of the drive in the background or it could also be that the drive is not configured to be quickly removed. To fix this error, there are a couple of suggestions you can try. You can try to close all the open programs and file explorer windows, or you could also configure the Device Removal Policy or change its file system to FAT32. In addition, you can also try to change its drive letter or use the DISKPART utility to get the drive to be offline or simply manage the hogging process that prevents it from being safely removed.
Follow each one of the given potential fixes below to resolve the error when using the Safely Remove Hardware feature.
Option 1 – Close all the open programs and File Explorer windows
The first thing you have to do to resolve the error is to close any open programs as well as File Explorer windows. This is because there are some programs and File Explorer instances that could be using the external device in the background which explains why you’re getting the error when you try to safely remove your device.
Option 2 – Try to configure the Device Removal Policy
The next thing you can do is to configure the Device Removal Policy. How? Refer to these steps:
Open File Explorer and right-click on the drive where you encountered the error.
Next, select Properties from the context menu.
After that, navigate to the Hardware tab and select the disk drive where you got the error under the “All disk drives” section.
Then select Properties under the Device Properties section. This will open a new mini window and from there, select Change Settings on the bottom portion of the window.
Now navigate to the Policies tab and select the “Quick Removal (default)” option under the Removal Policy section.
Click on the OK and Apply buttons to save the changes made and then see if the error is now fixed.
Option 3 – Try to manage the hogging process
You could also try managing the hogging process to get rid of the error.
Tap the Ctrl + Shift + Esc key combination to open the Task Manager.
Then look for the running processes and programs that are hogging your USB storage device. If there is a program that’s using your device, it will hog on some Disk or CPU while transferring data and interacting with the device which is why you’re getting an error when you safely remove the device.
Next, select the concerned processed and right-click on each one of them, and then select the End Task or End Process option. You can also restart the Explorer.exe process and see if that helps.
Option 4 – Try to change the drive letters
Tap the Win + R keys to open the Run utility and then type “diskmgmt.msc” in the field and click OK or tap Enter to open Disk Management.
Next, look for your USB storage device using the drive letter that’s assigned to it. Right-click on your device and select the “Change Drive Letter and Paths…” option.
This will open a mini window and from there select the drive letter you want to change and click on the Change button.
After that, another smaller window will appear where you’ll have to select the new drive letter from the drop-down menu.
Click OK and if you got a warning prompt, just click on Yes.
Now restart your computer.
Option 5 – Try using DISKPART utility to get the drive to be offline
The next thing you can try to resolve the issue is to use DISKPART. Refer to the given steps below to do so.
Tap the Win + R keys to launch Run and then type “cmd” in the field and tap Enter or click OK to open an elevated Command Prompt.
Next, type and enter this command to execute it: diskpart
The command you entered will initiate the DISKPART utility. After that, type and enter this second command: list disk
Next, type and enter this third command: list volume
The commands you just executed will help you in either listing all the Disk connects or all the partitions on those disks formed and from there, you need to select one command depending on the “list” command you entered. You can execute either of the two following commands:
select disk #
select volume #
After that, it will select the Disk or Partition you want to select.
Now type either one of the following commands:
offline disk #offline volume #
The command you entered will mark the selected disk is Offline. Afterward, try to safely remove your USB Storage device. Just remember that when you plug it back in again, you have to carry out the same method except for the last given command as this time you will have to enter either of these commands in order to get your USB storage device back online:
online disk #
online volume #
Option 6 – Try to change the file system to FAT32
If you keep getting this error on a particular USB device, you might have to format the disk and change its file system to FAT32. Make sure that you copy its contents safely into another location before you format the disk. Keep in mind that formatting the disk will remove all the contents of your drive.
Open File Explorer and right-click on the drive where you got the error and then select Format from the context menu.
Next, in the newly opened mini window, select the FAT32 (Default) option from the drop-down menu under File System.
Now check the Quick Format checkbox and then click on the Start button to start formatting your drive.
In today’s world and age, there are some essential IT skills that basically everyone should know. No matter in what field you are working some skills are just needed in order to function properly in the work. So, without further ado let's dive into what are these essential IT skills everyone, even your grandmother should know.
5 Essential IT skills everybody should know
Word processing
No matter are you creating or editing business documents or just trying to help a friend or relative, word processing skill is an essential asset and requirement in today’s age. Writing anything on a bunch of paper is time-consuming, papers can get lost, and searching for a particular item inside a bunch of papers is not a really enjoyable experience. A much easier solution is to write, format, and keep everything on the computer and almost all employers are asking for this skill.
Send and using emails
Today we live in the digital age and most communication is done in real-time via messaging apps and file sharing is done via file-sharing services. Despite mentioned technology, many files are shared and sent through emails. When a message is too long or complex when it needs to have some attachment or to be kept in archive emails are the way to go and therefore using email is a must-have essential skill.
Using search engines
When talking about using search engines we really do not think about firing up your favorite browser, going into the search engine,s and typing cat pictures. What we think is that a person should know how to use a search engine properly, tweak its search options, and phrase words and sentences to find everything he or she needs.
Doing data work
Data entry and data calculations have been made easier than ever thanks to today's technology. Microsoft excel, libre office calc, google sheets, etc. are all capable of performing a great variety of calculations and keeping track of plenty of required data. This skill is often asked by employers as an essential one.
Cyber security
Each employee or person, in general, should be quite aware of various scams and best practices to keep itself safe in this digital world. We have several articles on this topic and there are a great variety of articles on the internet as well.
Conclusion
No matter are you young or old, employed or looking for a job, these skills are a must-have in today’s world. There are a lot of great tutorials online on these various topics and I am sure that your knowledgeable friend or cousin would be happy to help and show you how to do all of these things.
Windows 11 has been officially presented during Microsoft’s virtual event on June 24th.
Since presentation internet has been pretty live and busy with a discussion about it, some discussions are positive, some not so much but that is expected and it happens always when a new product is presented.
One of information that we have about Windows 11 is tied to the home edition of this OS,
Windows 11 home edition will require an internet connection at setup, and a Microsoft account in order to be installed and used. Previous versions of Windows could be installed and used with local accounts but it seems Microsoft has abandoned that idea for its new OS.
OS will be delivered mostly as updates or via internet download so internet and online requirement make sense but why it cannot use the local account and must have a Microsoft one is beyond me.