How to update Microsoft Windows with patch


P 1 Update Your PC

It’s a residing PrintNightmare—on Tuesday, Microsoft revealed that it had recognized a extreme vulnerability in its working system that would let hackers delete knowledge in your PC, set up applications, and even create new person accounts with full management permissions for themselves.

The flaw, dubbed PrintNightmare, impacts the Windows Print Spooler service, which is what permits Microsoft to wrangle the recordsdata and paperwork you queue up to print. Each Microsoft laptop has this function enabled by default, together with these operating Windows 10, Windows 8.1, and the outdated Windows 7, in addition to administrative Servers 2004 and 2008 via 2019.

The flaw was found by researchers in Might, who deliberate to conjure a repair and current the findings on the annual Black Hat cybersecurity summit. However then—right here’s the nightmare—they unintentionally web-published their proof-of-concept, basically a how-to information for exploiting the code. It was shortly taken down, however not earlier than it made the rounds on the web, hitting websites like well-liked developer discussion board GitHub.


Microsoft has since detected the malicious code within the wild, and it’s recommending that every one PC customers take motion to defend their computer systems in opposition to the flaw instantly.

Right here’s how:

  • Step 1: Be sure to have put in Microsoft’s June 2021 emergency safety update. This patches one in all two main loopholes within the Windows Print Spooler system. Obtain the model to your system here; all choices are listed beneath “Safety Updates.”
  • Step 2: Sadly, there isn’t any patch but for the second loophole, so Microsoft and the federal Cybersecurity and Infrastructure Safety Company are advising folks to disable Windows Print Spooler when it’s not getting used for printing. Observe the directions listed beneath “Workarounds” here. It includes some coding magic through PowerShell, a program which you’ll be able to download here.