Chipp.in Tech News and Reviews

Windows, Security & Privacy, Open Source and more

Menu
  • Home
  • Windows
  • Security & Privacy
  • Gaming
  • Guides
  • Windows 11 Book
  • Contact
  • RSS Feed
Menu

Category: Software

Fastfetch output

Fastfetch: nerdy tool that displays system information next to Ascii Art

Posted on September 14, 2024September 14, 2024 by Martin Brinkmann

Fastfetch is an open source cross-platform application that is command line driven. It collects system information and displays the info in the terminal window next to an Ascii art image of the used operating system.

The information that it collects is useful, but the main purpose of the tool seems to be to share a screenshot of the info with others.

An alternative: Glow is an open source system analyzer for Windows that displays lots of hardware and software information.

All you need to do to get started is to download the latest version of the app from its GitHub repository. On Windows, you’d simply extract the archive, open a command prompt window at the location and run the executable without any parameters.

The output displays information about the operating system, processor, graphics unit, RAM, disk drives and other hardware or software components.

Here is where it gets interesting: Fastfetch comes with a billion parameters that add more information about the system to the output. On top of that, it supports dozens of parameters to change the output itself, e.g. by specifying colors.

To run it with all parameters, use fastfetch -c all.jsonc. This adds lots more to the output, including network information, cpu and gpu usage info, temperatures, and more.

Tip: run the –help parameter to get the full list of supported parameters. It is long, but thankfully grouped to improve accessibility.

Closing Words

Fastfetch may not be as easy to use as other system information tools, provided that you do not work with a Terminal window all the time.

It is a niche program, but it seems to have a loyal following. Plus, it is updated regularly, which is always a plus.

Have you used Fastfetch, or the grandmother of this type of programs Neofetch, before? If not, would you? Feel free to leave a comment down below.

Windows Surface PC

Microsoft is changing Windows Security to avoid another Crowdstrike disaster

Posted on September 13, 2024September 13, 2024 by Martin Brinkmann

Will it disallow access to the Windows kernel by security products? Not right now, but the path could lead there.

Microsoft held a security conference earlier this week at its Redmond headquarters. It invited business partners, especially those in the security field, to participate.

The hot topic during the conference was the Crowdstrike disaster that took down more than 8.5 million PCs worldwide. More precisely, how to avoid a repeat of it in the years to come.

David Weston, Vice President Enterprise and OS Security at Microsoft, published a summary of the event on the Microsoft Windows blog.

The main short-term takeaways:

  • Microsoft and security vendors agree that choice is good when it comes to security products for Windows.
  • A list of best practices for developing and distributing security updates will be created based on discussing Safe Deployment Practices.
  • Other areas of improvement include testing, information sharing, and improved incident response effectiveness.

For the long-term, Microsoft plans to introduce new security capabilities to the Windows platform to add “security capabilities outside of kernel mode”.

Microsoft will design and develop the new platform in collaboration with “ecosystem partners”. The goal is “enhanced reliability without sacrificing security” according to Microsoft.

The blog post ends with several partner quotes and how everyone appreciated the opportunity to discuss security. Reading between the lines, several expressed concern that security could suffer, especially if kernel access would be revoked.

Closing Words

It will take some time before changes, even the discussed short-term changes, are applied. While Microsoft said nothing about pushing security products out of the kernel on Windows, some are worried already that Microsoft could create a solution that benefits its own products over everyone else’s.

Called it. Regulators need to be paying attention. A world where only Microsoft can provide effective endpoint security is not a more secure world. pic.twitter.com/PR2AnJwpZi

— Matthew Prince 🌥 (@eastdakota) August 23, 2024

It would not be the first time in the history of Windows.

What is your take on this development? It should be clear that something needed to be done to avoid another scenario that would cause millions of PCs to go down in flames. Are the proposed changes the right way?

Super MS Config tool

Super MSConfig: open source tweaker checks for “bad” Windows settings

Posted on September 9, 2024September 10, 2024 by Martin Brinkmann

Super Microsoft Configuration is a new tool by “built by Bel”. It is an “advanced and fully automated alternative to the traditional MSConfig tool” according to the developer.

Key Details:

  • It is designed specifically for Microsoft’s Windows 11 operating system.
  • It checks the state of certain Windows features and settings to rate them as good or bad.
  • Bad settings can be “fixed”.

The current version of the app has the title Super System Configuration. Whether that is going to be the new name or not is unclear. The developer has a habit of changing program names.

Using Super Microsoft Configuration

The program is portable and you may run it right after you have downloaded it from the GitHub repository.

Note: Windows SmartScreen may display a security warning. The reason for this is that it is a new program, not because it is malicious. A check on Virustotal returned a single false positive hit.

Hit the check button in the interface to run the scan. This should not take longer than a few seconds and you end up with a long log at the end.

The bad entries are shown in red. You can check “show only bad config” to hide the good settings to better focus on what the program considers bad.

While that helps, it is possible that you will still end up with dozens of entries. The main issue here is that each entry is listed in a single row. Since the information includes a description, Registry path, and other information, it is possible that you may need to scroll to read everything.

As far as what is considered beta is concerned, here are a few examples:

  • Sending feedback and error reports.
  • Radio access.
  • Disabled Windows Defender Real-time Protection.
  • Disabled User Account Control.
  • Disabled Secure Boot.

At least two of the detected bad configurations were erroneous. User Account Control was enabled on the test system, for instance. The program returned no “current value” for the entry, which is why it detected it as bad.

You may double-click on an entry to display the details in a new window. This improves accessibility.

Overview of a specific tweak

The window includes buttons to apply the fix or revert it. Here you may also copy the Registry value to search for it online.

It is necessary to go through them one by one, as you may not want to disable or enable features that might cause issues.

This makes Super System Configuration an advanced tool. The GitHub repository says as much as well.

Verdict

The application is not that different from other tweaking tools, including some of the developer’s past and present offerings. The main difference is the scanning and that it reveals advanced information, such as Registry keys.

On the other hand, it is difficult to navigate and there is no distinction between disabling quick links on Microsoft Edge’s new tab page and enabling Secure Boot or disabling microphone access.

It is not something that inexperienced users may want to use. It lacks guidance and at least some kind of warning or classification for some of the tweaks.

Considering that the program is available as a preview, it is a good idea to monitor its development and wait for the final release. For now, it is an interesting rough application.

Copilot key laptops

You can remap the Windows Copilot Hardware Key to something useful

Posted on September 8, 2024September 9, 2024 by Martin Brinkmann

Many Windows devices will ship with a new hardware key. The Copilot key is a new key on the keyboard that activates the core AI feature of the operating system when pressed.

If that is all it does, it is probably the most useless key on the keyboard. Yes, it is worse than Scroll Lock.

The main reason is that Copilot sits on the taskbar already. A click opens the interface. Why would you need a key for that?

I’d take it back if Microsoft would add Copilot shortcuts to it, similar to how the Windows-key works. Press Copilot Key and V, and Copilot gives you an analysis of the Clipboard content. Something like that.

How to remap the Copilot key

The Group Policy entry Set Copilot Hardware Key and the corresponding Registry entry. Source: Tero Alhonen

Good news is that you can remap the Copilot Hardware Key. Right now, you may do so either through a policy or directly in the Registry. Tero Alhonen published the information on X.

Since Windows Home admins have no access to the Policy Editor, it is easier to remap the key in the Registry.

Here is how it is done:

  1. Open the Start menu.
  2. Type regedit and select Registry Editor from the list of results.
  3. Confirm the UAC prompt by selecting the option Yes.
  4. Navigate to HKEY_CURRENT_USER\SOFTWARE\Policies\Microsoft\Windows\CopilotKey
    • Note: if a key does not exist, right-click on the previous key and select New > Key. Name it accordingly and proceed.
  5. Right-click on CopilotKey and select New > Dword (32-bit) Value.
  6. Name it SetCopilotHardwareKey.
  7. Double-click on SetCopilotHardwareKey and set its value to 1.
  8. Right-click on CopilotKey again and select New > String Value.
  9. Name it EnterAppAumid.
  10. Double-click on it and paste the Application User Model ID of an installed app into the field.
  11. Close the Registry Editor.
  12. Restart Windows.

Background information: The AUMID / AppID (Application User Mode ID) is used by Windows to “identify and differentiate applications for switching, launching, telemetry, and functions”.

You can get the IDs of all installed apps in the following way:

  • Open the Start menu.
  • Type Terminal and select the Terminal app.
  • Type Get-StartApps and press the Enter-key in the Terminal window.

The list of IDs of installed apps is returned. You need to copy the entire ID, e.g. Microsoft.WindowsCalculator_8wekyb3d8bbwe!App, as the value of EnterAppAumid in the Registry.

O&O Lanytix

This free Windows program lists and logs all devices connected to the local network

Posted on September 6, 2024September 6, 2024 by Martin Brinkmann

Computer users have a few options to list devices connected to the local network. O&O Lanytix is a free software for Windows that does offers the functionality.

Why is this important? There are several purposes. One may help reveal foreign devices connected to the network. It may also reveal hidden cameras, provided that they are connected to the same network.

The application is compatible with all supported versions of Windows (Windows 10 and up). Just download the 2 megabyte file to get started. You can run it after the download completes, an installation is not necessary.

Activate the scan local network button to run the first scan. It takes a moment to complete and reveals connected devices.

Each device is listed with its name, IP address, Mac, manufacturer, ping, OS, and the time it first appeared on the network. The status, on (connected) or off (disconnected) is also displayed.

Name, operating system, and manufacturer may reveal much about the devices, but this is not always the case. Some devices have no name or manufacturer, which may make it difficult to identify them.

An option to assign notes to entries is missing; this could help improve identification, as it may make it easier to spot foreign or new devices.

One of the shortcomings of Lanytix is that it does not support automation. There is no hourly scan option or other scan options. If you want a scan, you need to activate the scan button manually.

The application keeps a history for each detected device. Double-click on a device to look up the information. It shows changes, for instance to a device’s IP address, among other things.

The program supports scanning an IP range next to that. Data can be exported.

Verdict: O&O Lanytix is a well-designed program for Windows. It is easy to use and scans the local network for devices quickly. The log feature is particularly handy, as it reveals a device’s history.

Do you scan devices in your networks sometimes? Or is that something that you have no interest in at all? Feel free to leave a comment down below.

Windows 11 Sign out

Microsoft listened? Sign out restored in Windows 11’s Start menu

Posted on September 4, 2024September 4, 2024 by Martin Brinkmann

Microsoft has restored a feature that it removed some time ago from Windows. At least in the Beta version of the operating system, sign-out is once again accessible directly when clicking on the profile icon in the Start menu.

Here is the current process in Windows 11 when you want to sign out using the Start menu:

  1. Click on the Start button to open the Start menu.
  2. Click on the profile icon.
  3. Activation of the menu (three dots).
  4. Selection of sign out.

Once the change lands, the process is the following one:

  1. Click on the Start button to open the Start menu.
  2. Click on the profile icon.
  3. Select Sign out.

It used to be this way, but Microsoft introduced the account manager to the Start menu. The main purpose of it, if you ask me, is to advertise Microsoft 365 and Microsoft cloud storage.

Account manager in Start menu. Source: Microsoft

It shows the M365 subscription status and also the available cloud storage. For that, Microsoft removed the options to sign out or switch users from the main interface and hid it behind a new menu that it added just for that purpose.

If you look at the screenshot of the revised version, you may notice that something is amiss. Where is the option to switch to another user? Microsoft says that it will show a list of signed in users under menu.

The screenshot shows nothing of it though. Maybe it is only displayed when there are other users who are signed in.

Note: a better way of signing out is to right-click on the Start button. It shows that option next to others under shutdown.

Since it is a beta release, it is possible that Microsoft is going to alter the interface further before it hits the stable channel and the majority of users.

How do you sign our or shut down your Windows PCs? Do you have any preference? Feel free to leave a comment down below.

Windows 11: Intelligent Media Search feature powered by AI is coming

Posted on September 3, 2024September 3, 2024 by Martin Brinkmann

I have a simple opinion about AI. If it is off by default and if I control my data, I might use it if it is useful. Whether Intelligent Media Search is such a feature remains to be seen.

First spotted by Xeno and revealed on X, it is designed to let users index all of their audio and video files to make it searchable. The feature is powered by AI and the idea is that you can use natural language to search for matching audio or video files.

You can ask questions like:

  • What cakes did I eat over the years on my wife’s birthday?
  • Who shot first? Han or Greedo in the film Star Wars?
  • Retrieve every mention of X in project videos / audio files.

Obviously, you could do a lot with this, provided that you have the media files on the local system. Ask questions about a teleconference call, financial audio webcasts, or anything else that is available as media on the system.

There is also the possibility for it to find specific files, music by a band, appearances of an actor, or a certain event in movies or videos.

Does that sound useful? Not to everyone, but it certainly has more appeal than the overreaching Recall feature. That is back to the drawing board as Microsoft was certainly caught off-guard when the rain of negative feedback started.

Still, little is known about the feature. Good news is that Microsoft is asking for consent and it seems likely that the feature is off by default because of that. So, there is little to worry about for users who do not want to use it, provided that Microsoft does not push the Intelligent Media Search feature to hard or in an annoying way.

The verdict is still out on this one. Lots is unclear. Where is the indexed data stored, how is it protected, will it be synced? What controls do users get?

What is your take on the feature? Would you use it under certain circumstances? Feel free to leave a comment down below.

Windows 11: new update time estimation is as accurate as Windows’ copy dialog

Posted on September 1, 2024September 1, 2024 by Martin Brinkmann

When you copy files from one location to another in Windows, an estimation of the remaining time is displayed. This estimation may fluctuate widely and it has been at the center of many jokes.

source: xkcd

Microsoft has added a similar estimation to Windows updates in the latest Insider builds.

Some Insiders in the Canary Channel will begin to see an estimated time for how long their PC will be offline to install Build 27695. This estimate will be shown on the Windows Update settings page and via the Start menu power button.

If you have installed updates in Windows before, you know that you never know how long an update will take to install.

When you hit the restart button, it feels like a game of chance. Sometimes, updates seem to install quickly, at other times, they seem to take ages.

New builds or feature updates take longer, naturally, than the monthly cumulative updates or minor updates.

It is a good idea to avoid installing updates if you are in a hurry. If you just have a bit of time before you need to leave the computer, you better postpone the installation until you return.

There is another reason for that: if something goes wrong, you may not have the time to start fixing the issue immediately.

Microsoft hopes that the displayed estimates help administrators; but does it?

Windows Update downtime estimation

Problem is, Windows Update displays a range and not a fixed number. The screenshot that Microsoft published shows a downtime between 15 and 50 minutes.

Source: Microsoft

Is that helpful? Would not it be better if Microsoft would either display just the maximum, e.g. up to 50 minutes, or the average, e.g. 35 minutes to the user?

The feature is in testing right now and only some Insiders see it. It is shown on the Windows Update settings page and the start menu power button after an update has been downloaded and prepared for installation.

How do you handle updates in Windows? Feel free to leave a comment down below.

VeraCrypt interface

VeraCrypt: first update of the year improves security and fixes bugs

Posted on August 31, 2024August 31, 2024 by Martin Brinkmann

The developers of the open source encryption software VeraCrypt have released VeraCrypt 1.26.14 for all supported platforms. The new version adds a notification if volumes are affected by the XTS master key vulnerability.

The issue was fixed last year in VeraCrypt 1.26.7, but only for newly created volumes. While unlikely even then, the newly added notification ensures that users are informed if one of their encrypted volumes are still affected by the vulnerability.

Installation or upgrade

The new release installs over existing installations. This should not be problematic for most users. A system restore point is created by default during the installation. Note that a restart is required to complete the process. You cannot mount volumes until the final restart.

VeraCrypt 1.26.24 does not mount TrueCrypt volumes anymore. This was the case for last year’s release as well, but is still noteworthy.

If you still have an old TrueCrypt volume, e.g., on a removable drive you have not touched for years, you may want to use an earlier version of VeraCrypt to decrypt the encrypted volume before you encrypt it again using the software.

Note that you may download older VeraCrypt versions from the official project website. VeraCrypt 1.25.9 was the last to support TrueCrypt volumes.

An overview of the changes of VeraCrypt 1.26.14

The update is a bug fix release for the most part. It does come with updated translations and documentation as well as some compatibility improvements on non-Windows systems.

Here is a short list of the most important changes and fixes:

  • Windows: VeraCrypt Expander: Fix expansion of volumes on disks with a sector size different from 512.
  • Linux: Enhance ASLR security of generic installer binaries by adding linked flag for old GCC version.
  • macOS: Fix near zero width PIM input box and simplify wxTextValidator logic.
  • FreeBSD: Support automatic detection and mounting of ext2/3/4, exFAT, NTFS filesystems.

You can check out the full changelog here. As you can see, it is mostly maintenance related changes and a fix bug fixes.

Closing Words

Still, it is a good idea to upgrade to the new version because of these fixes and the notification if one of the volumes has a vulnerable XTS master key.

Now You: do you use encryption software? Maybe even VeraCrypt? Or do you swear on a different software? Feel free to leave a comment down below!

Vivaldi Rename Tabs

Vivaldi Browser’s Tab Renaming feature is an incredibly useful feature

Posted on August 29, 2024August 29, 2024 by Martin Brinkmann

So, Vivaldi has released a new stable version of its web browser, which is also called Vivaldi. Vivaldi 6.9 includes a number of new features that improve customization and options for its users, as usual.

Among the batch of 6.9 features is tab renaming. To the best of my knowledge, it is a first in the browser space, but correct me, if I’m wrong.

Update: Arc Browser supports this as well.

The idea is simple: you can use it to rename any open tab in the browser. To do that, you simply right-click on the tab, select rename, and type the new name.

Note that this works better for unpinned tabs, as pinned tabs show only the site’s icon by default. But even here, it is useful. More on that later.

Once you have changed the name of the tab, it stays. Restart the browser, and you still get the custom tab names after the restart.

While some may wonder what this feature is good for, others may have noticed it immediately. It depends a bit on how you use the browser.

Here are a few examples:

  • Make the titles descriptive. Some sites use titles that do not always reflect their name or purpose. If you visit eBay, you get Electronics, Cars, Fashion, C as the visible title. Change it to eBay, and you do not have to look twice. If you are the romantic type, you could change tabs from your crush so that they read I love you, from Bob, or something similar.
  • Shorten titles. Many sites use titles that do not display fully. Also, if you open enough tabs, the available space shrinks further. You could assign the letter C to my site for instance or Chip, or whatever, and it is visible for longer.
  • Use titles as reminders. Don’t feed after midnight, message mom, or CANCEL are all valid.
  • Disguise names. If you fear that someone could catch a glimpse of the sites that you have open, and you do not want that, you could use the feature to change the title to something else. Maybe change Facebook to TikTok to avoid having to defend you still spending time on the site. The site’s icon may still reveal the real site to some bystanders though.

There is the slight chance that you may get confused and want to restore the title. This is done by selecting rename again and deleting the current title. Press the Enter-key and the original title returns. You may use the same method to alter a modified title.

The new title is also shown when you hover over tabs. This is where the usefulness for pinned tabs comes from.

You can download the latest version of the Vivaldi web browser from the official site. If you like customization options, this might the browser for you.

Tab renaming, is that something that you might use, if your browser supported it? Let me and everyone else know in the comments down below.

  • Previous
  • 1
  • …
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • …
  • 33
  • Next

Support This Site

If you like what I do please support me!

Any tip is appreciated. Thanks!
  • April 16, 2026 by Martin Brinkmann Windows 11 Context Menu Manager: remove items with a click
  • April 15, 2026 by Martin Brinkmann One Exploited Zero-Day and Record Numbers: The April 2026 Windows Patch Tuesday Breakdown
  • April 14, 2026 by Martin Brinkmann Brave is getting Container support and the feature has made a big jump recently
  • April 13, 2026 by Martin Brinkmann A More User-Friendly Way to Pause Windows 11 Updates is Coming
  • April 11, 2026 by Martin Brinkmann Microsoft is Radically Changing the Windows Insider Program

About

We talk, write and dream about Technology 24/7 here at Chipp.in. The site, created by Martin Brinkmann in 2023, focuses on well-researched tech news, reviews, guides, help and more.

Legal Notice

Our commitment

Many websites write about tech, but chipp.in is special in several ways. All of our guides are unique, and we will never just rehash news that you find elsewhere.

Read the About page for additional information on the site and its founder and author.

Support Us

We don't run advertisement on this site that tracks users. If you see ads, they are static links. Ads, including affiliate links, never affect our writing on this site.

Here is a link to our privacy policy

©2026 Chipp.in Tech News and Reviews