May 262017
 
CentOS 7:

https://bashtheshell.github.io/guide/ssd-trim-on-centos-7/

 

Windows 7:

Enabled by default but can be confirmed via elevated command prompt and:

fsutil behavior query disabledeletenotify

DisableDeleteNotify = 1 = TRIM support disabled
DisableDeleteNotify = 0 = TRIM support enabled

To enable trim, issue:

fsutil behavior set disabledeletenotify 0

 

Mac OS X:

Enabled by default on Apple provided SSDs.
Requires enabling on third-party provided SSDs.

To confirm via the terminal, issue:

system_profiler SPSerialATADataType | grep 'TRIM'

Enable TRIM via terminal, with this command:

sudo trimforce enable

Follow the on-screen advice.

For reference, Third-party solutions include Cindori TrimEnabler, which were
a workaround when Apple temporarily disabled default trim support
for non-Apple SSDs.
May 262017
 

This minor reset can be used when Windows 7 fails to find updates i.e progress bar never stops.

Open an elevated command prompt and run these commands:

net stop wuauserv
net stop cryptsvc

Delete or rename %windir%\SoftwareDistribution directory
Delete or rename %windir%\System32\catroot2

Restart the services we had previously stopped:

net start wuauserv
net start cryptsvc

Install latest Windows Update Client from:

W7 64bit: https://www.microsoft.com/en-us/download/details.aspx?id=53332
W7 32bit: https://www.microsoft.com/en-us/download/details.aspx?id=53335

Restart the computer
You should then be able to check for updates manually and get the PC fully patched

If the above fails, Microsoft have documented a ‘hard reset’ at:
https://support.microsoft.com/en-au/kb/971058

 

May 232017
 

Microsoft Security Response Center
https://technet.microsoft.com/en-us/security/dn440717.aspx

Security TechCenter
https://technet.microsoft.com/en-us/security/default

_________________________________________________________________

2017, October 25th:

Ransom: Bad Rabbit Win32/Tibbar.A
https://www.microsoft.com/en-us/wdsi/threats/malware-encyclopedia-description?Name=Ransom:Win32/Tibbar.A

Windows Defender Offline Scan
https://docs.microsoft.com/en-us/windows/threat-protection/windows-defender-antivirus/windows-defender-offline#run-a-scan

 

Windows 7 SP1 and Windows Server 2008 R2 SP1 update history
https://support.microsoft.com/en-gb/help/4009469

 

2017, June 28th:

Microsoft Malware Protection Engine flaw (CVE-2017-8558) – now patched at 1.1.13903.0+
https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2017-8558

 

2017, June 13th:

Microsoft Security Advisory 4025685
https://technet.microsoft.com/en-us/library/security/4025685

4025685: Guidance for older platforms: June 13, 2017
https://support.microsoft.com/en-us/help/4025687/microsoft-security-advisory-4025685-guidance-for-older-platforms

Microsoft Security Scanner
https://www.microsoft.com/security/scanner/en-us/default.aspx

Manual updates for Microsoft Security products
https://www.microsoft.com/security/portal/definitions/adl.aspx

 

2017, May 5th:

Microsoft Customer Guidance for Wannacrypt attacks
https://blogs.technet.microsoft.com/msrc/2017/05/12/customer-guidance-for-wannacrypt-attacks/