New
#11
Yup. Amazing. Gonna miss this OS once they completely torch it.
I'm running 7-11 too and still finding Win 7 to be the most stable and dependable OS of all time made by Microsoft. Win 11 IMO has a long, long ways to go ... [Scannerman777]
Yes, exactly ... Win11, while faster and more powerful than Win7 (eg. PowerShell improvements), suffers greatly from constant but unnecessary MS "interference" with simple staples such as TaskBar plus multiple instances of MS spyware and snoopware. Win7 is genuinely stable, Win11 doesn't even pretend to be.
Windows 11 even cannot search by date/time range. A common task for PC users. and easy on Windows 7.
If do, you have to do manually setup time range on Windows 11.
answers.microsoft.com/en-us/windows/forum/all/using-file-explorer-to-search-by-date-range
Redirecting
Too more user-friendly apps are gone on Windows 11. I cannot believe it.
I just finished sending a long missive to Microsoft (since they asked) about why I hated Windows 11. I literally asked them when they were going to make another stable, full-fledged OS like Windows 7 Ultimate. I also asked them when they were going to stop resorting to antiquated and archaic hardware such as TPM to make newer hardware obsolete when they are in the software business. I don't suppose I will be getting much of a response but I felt it was incumbent upon me to share my insights. Not many people know that TPM first came out in 2011. Making TPM on Windows 11 mandatory is like making USB 3.0 mandatory for all Windows 10 users. It's silly and totally unnecessary. TPM (both 1.2 and 2) needs to remain an option because it consistently fails.
I still use W7 on my PC and on my DW's PC. I'm really going to be sad when it quits working but so far with the help here I have a good system. I had to enable TLS(?) 1.2 for my email but it's in there. One of my boys is crazy about Linux so I will probably use that when the time comes. I bought W10 and W11 so I don't mind paying to stay up to speed but really, they can't compare. Dual booting 7 & 10 right now and 10 rarely gets used.
Linux makes for a fine backup system for in the event Windows fails to boot. You don't need to use terminal to browse and check your email but learning a few simple commands helps just as it does with Windows. It is a shame that maintaining a DUAL BOOT with both Windows and Linux is almost always a continuous challenge as the two systems compete to dominate the kernel. There are programs that can assist with this but sooner or later there is always a problem, I find. For this reason (and others) many moguls recommend avoiding multi-boot systems using both Windows and Linux. I am not among them.
I too am disappointed with Windows 11 as I was hoping to make for myself a fine 7-11 dual boot Work Station. It would seem that many features are thrown for the sake of Win 11, features that would not be otherwise disturbed. Optane and IRST are among them. Permanent problematic driver issues can be generated such as Turbo Boost Technology 3.0 icons that, at best, will show as unknown devices but simply cannot be made to disappear. It can get worse.
The mandatory requirement for TPM2 is bogus and Microsoft needs to come clean with it.
The Operating System will install without TPM2 and will function but for a smattering of cosmetic altercations that are completely unnecessary. TPM is an old, antiquated bit of hardware that is notorious for generating security issues despite the fact that it was designed to make industrial and commercial system boards more secure. Hence TPM2 was developed and now TPM2 is suffering as buffer exploits and stolen security keys are become the standard byproduct of this "new and improved" version of TPM.
The Consortium (IBM, INTEL, HP, AMD, LENOVO etc.) only received Microsoft's blessing on TPM recently and it isn't hard to figure out the real reason why. Security is certainly not the main motive here. Indubitably NSA, FBI, CIA, CSIS, and the rest of the alphabet soup companies love TPM2. But don't take my word for it. Here's what WIKI has to say:
Attacks
In 2010, Christopher Tarnovsky presented an attack against TPMs at Black Hat Briefings, where he claimed to be able to extract secrets from a single TPM. He was able to do this after 6 months of work by inserting a probe and spying on an internal bus for the Infineon SLE 66 CL PC.[66][67]
In 2015, as part of the Snowden revelations, it was revealed that in 2010 a US CIA team claimed at an internal conference to have carried out a differential power analysis attack against TPMs that was able to extract secrets.[68][69]
In 2018, a design flaw in the TPM 2.0 specification for the static root of trust for measurement (SRTM) was reported (CVE-2018-6622). It allows an adversary to reset and forge platform configuration registers which are designed to securely hold measurements of software that are used for bootstrapping a computer.[70] Fixing it requires hardware-specific firmware patches.[70] An attacker abuses power interrupts and TPM state restores to trick TPM into thinking that it is running on non-tampered components.[71]
Main Trusted Boot (tboot) distributions before November 2017 are affected by a dynamic root of trust for measurement (DRTM) attack CVE-2017-16837, which affects computers running on Intel's Trusted eXecution Technology (TXT) for the boot-up routine.[71]
In case of physical access, computers with TPM are vulnerable to cold boot attacks as long as the system is on or can be booted without a passphrase from shutdown or hibernation, which is the default setup for Windows computers with BitLocker full disk encryption.[72]
In 2021, the Dolos Group showed an attack on a discrete TPM, where the TPM chip itself had some tamper resistance, but the other endpoints of its communication bus did not. They read a full-disk-encryption key as it was transmitted across the motherboard, and used it to decrypt the laptop's SSD.[73]
2017 weak key generation controversy
Main article: ROCA vulnerability
In October 2017, it was reported that a code library developed by Infineon, which had been in widespread use in its TPMs, contained a vulnerability, known as ROCA, which generated weak RSA key pairs that allowed private keys to be inferred from public keys. As a result, all systems depending upon the privacy of such weak keys are vulnerable to compromise, such as identity theft or spoofing.[74]
Cryptosystems that store encryption keys directly in the TPM without blinding could be at particular risk to these types of attacks, as passwords and other factors would be meaningless if the attacks can extract encryption secrets.[75]
Infineon has released firmware updates for its TPMs to manufacturers who have used them.[76]
https://en.wikipedia.org/wiki/Truste..._organizations
Learning what I've learned about TPM translates to this for me: The "trusted" part of it doesn't mean that I can trust the module. The trusted part means that I agree to trust them to mess me up and essentially own the rest of my hardware. To see Broadcom's endorsement on TPM made my heart sink. All these companies have sold out to it for one main reason: PROFITS. They all have stakes in these chips they want to sell and what better way to do it than to tell you it is for your security. . . It's a tried and tested tactic, my friend. Security sells even if it isn't secure.
At best TPM should always be optional and never ever be a mandatory feature. That Microsoft has made it mandatory in an operating system is both disturbing and depressing. The user needs to be made aware of these hitlerian tactics and the end user community should be outraged that such things are even legal. Clearly the bottom line here is profits and not security.
I saw a 32 Ford Roadster today. It was painted a beautiful yellow and detailed perfectly. It exuded the pride the owner had in owning such a desirous older machine and the exhilaration he had in putting it through it's paces. The sound of the four cylinder engine, while small, seemed to frighten the "look alike" modern vehicles with the holes drilled in their exhaust systems to make them sound aggressive. I smiled and thought of my Windows-7 Pro install, yes, old but proud, functional and efficient and a thing of beauty.
"Is anyone still using Windows 7?"
Yes, we are and will be for quite a while longer! Mike - PS as a side note, My wife and I just celebrated our 58th., wedding anniversary.
Last edited by Mike Lynch; 15 Mar 2023 at 19:54.
Yikes! I didn't know a lot of this about TPM. I mean, why would I? Windows 7 doesn't require it or many other "security" methods. Of course, I'm not saying security isn't important but security hardware/software not being secure is ironic.
This stubborn stickiness to Windows 7 probably is not good for my technical mental maintenance. Now, not only do I keep up with Win 7 stuff but sporadically follow the Win 10 site as well. I haven't made it to Win 11 except to register. Just too much info for my needs.
I use a 3rd party booting program and have always had good results with it.
I am so glad Simplix is available and people here and other sites can help plinkers like me keep 7 alive on my boxes.
We had Windows 10 at work before I retired and it's okay. It just doesn't measure up though as far as I'm concerned.
One thing I have tried to some extent is Win 7 in a VM on Win 10. One user here that I know of really likes it but so far I'm still behind the learning curve.