: c't-Redaktion
: c't Know-how 2024 Nerdy research and technology things
: Heise Zeitschriften Verlag
: 9783957884022
: 1
: CHF 11.00
:
: Allgemeines, Lexika
: English
: 140
: Wasserzeichen
: PC/MAC/eReader/Tablet
: ePUB
The c't Know-how 2024 special issue offers in-depth knowledge on IT topics. It examines long-standing IT myths for their accuracy, such as whether changing passwords regularly actually enhances security. The editorial team explains the workings of AI models and their potential beyond automated text and image generation.AI image generating tools sometimes deliver unexpected results and eavesdropping cars may enhance road safety in the future. The special issue also provides answers to unexpected questions - such as how to decrypt a QR code, mathematical methods that may not have been taught by your math teacher, and how to crack an encryption that has challenged scientists for 300 years.

The c't magazine for computer technology is Europe's most subscribed computer title. For over 40 years, c't has been characterized by thematically diverse, expertly grounded and independent journalism. More than 80 experts regularly report on current developments in the IT sector and scrutinize the latest hardware and software in the c't test laboratory. Online, c't offers computer professionals and demanding users a comprehensive collection of tips and tricks for PC usage, reading samples from magazine articles, extensive services, and information about the magazine (e.g., research in the magazine archive). This offering is rounded off with its own forum.

Myths about Windows and Linux


Windows is insecure and every second version is stupid. Linux, on the other hand, is much more secure, although – or why – it doesn't need updates. And what about gaming and Linux? It's not quite that simple, we'll explain the mistakes.

Jörg Wirtgen

Picture: Andreas Martini

An SSD must be trimmed


It actually has to! But: Windows has been doing this regularly all by itself since Windows 7. Exceptions are extremely rare and then most likely with ancient SATA controllers that do not even know the TRIM command –, i.e. are at least 12, more likely 15 years old. If the operating system, driver and SSD are TRIM-capable, the system remembers whenever data is deleted and informs the SSD of this at intervals of a few days to weeks so that these memory areas are available more quickly for the next write access.

(jss@ct.de)

Windows spies


This myth can neither be fully proven nor completely refuted. However, it does contain several accusations, so it helps to understand what ‘espionage’ actually means.

The fact that Windows collects telemetry data (called ‘diagnostic data’ by Microsoft) is often mistakenly referred to as espionage. In fact, Windows collects a remarkable amount of data, especially if the user does nothing to reduce its collection. With these maximum settings, the diagnostic data can also include document content, images, personal data and the like. However, this is not ‘espionage’ because Microsoft openly announces that it collects this data – and also provides a tool that can be used to view the mountains of data in plain text.

Things get a little more complicated when it comes to the suspicion that Windows could also be spying independently of any telemetry data. For example, it could forward company documents, chat histories, photo collections and so on to Microsoft, any secret services or other questionable institutions. However, any halfway attentive administrator should be able to notice this from excessive network traffic.

There is also the recurring suspicion or fear that Windows is inadvertently or deliberately riddled with security vulnerabilities that are only known to certain intelligence services but have not yet been noticed. These gaps could be exploited for espionage purposes.

Based on the IT security news of the past few years, two things quickly become clear. Firstly: Yes, such security vulnerabilities have existed from time to time in the past and have also caused catastrophic damage. It is therefore not paranoid to assume that this will continue to be the case, but quite obvious. Secondly, the problem is unfortunately not limited to Windows – prominent and relatively recent example: the Pegasus spyware from the Israeli company NSO Group targets Android and iOS.

Windows pe