此主题已被锁定
InfernusMatrix 2023 年 3 月 30 日 下午 4:53
20
14
3
11
21
5
7
3
3
4
4
3
3
3
2
2
78
Windows 7 Support Ending - Refunding my Entire Library?
So let me get this straight, my games that run fine on Windows 7 I can no longer access past a certain point? If this is the case I will be talking to my bank and refunding my entire games library. I have zero interest in upgrading my hardware or Operating system.

Does this not violate consumer or anti-trust laws?

When I started using Steam I never agreed for them to control what hardware and operating system I can use, especially considering all of the games I play support Windows 7.
< >
正在显示第 4,786 - 4,800 条,共 11,277 条留言
Boblin the Goblin 2023 年 6 月 28 日 上午 8:36 
引用自 MonkehMaster
引用自 RasaNova
Do you have a source that disproves what the various vulnerability trackers show, or are you just saying that because you want it to be true? I'm no expert but it seems like a bit of a stretch to say that all Win 7's security holes have been patched.

not really when they were dropping security updates long after support ended (not the paid updates) and majority of those recorded are issues on win 10 as well.

lets not forget about the paid updates, anyone could have and still can get those free and they in case you are wondering, those security updates stopped at the beginning of this year and in case thats to hard to understand.... it means all those have been patched aside from maybe w/e they found after the end date of paid updates.


So you don't.
MonkehMaster 2023 年 6 月 28 日 上午 8:38 
引用自 SlowMango
引用自 MonkehMaster

not really when they were dropping security updates long after support ended (not the paid updates) and majority of those recorded are issues on win 10 as well.

lets not forget about the paid updates, anyone could have and still can get those free and they in case you are wondering, those security updates stopped at the beginning of this year and in case thats to hard to understand.... it means all those have been patched aside from maybe w/e they found after the end date of paid updates.


So you don't.

microsoft is your proof.
RasaNova 2023 年 6 月 28 日 上午 8:46 
引用自 MonkehMaster
引用自 RasaNova
Do you have a source that disproves what the various vulnerability trackers show, or are you just saying that because you want it to be true? I'm no expert but it seems like a bit of a stretch to say that all Win 7's security holes have been patched.

not really when they were dropping security updates long after support ended (not the paid updates) and majority of those recorded are issues on win 10 as well.

lets not forget about the paid updates, anyone could have and still can get those free and in case you are wondering, those security updates stopped at the beginning of this year and in case thats to hard to understand.... it means all those have been patched aside from maybe w/e they found after the end date of paid updates.

so ask me again what needs proving?
The claim was that all windows 7s security holes have been patched. Seems you're moving the goalposts to extended updates happened, plus some of the same holes also exist in newer versions. Like I said before I'm no expert, but those seem like very different answers.
MonkehMaster 2023 年 6 月 28 日 上午 8:50 
引用自 RasaNova
引用自 MonkehMaster

not really when they were dropping security updates long after support ended (not the paid updates) and majority of those recorded are issues on win 10 as well.

lets not forget about the paid updates, anyone could have and still can get those free and in case you are wondering, those security updates stopped at the beginning of this year and in case thats to hard to understand.... it means all those have been patched aside from maybe w/e they found after the end date of paid updates.

so ask me again what needs proving?
The claim was that all windows 7s security holes have been patched. Seems you're moving the goalposts to extended updates happened, plus some of the same holes also exist in newer versions. Like I said before I'm no expert, but those seem like very different answers.

you are right, you are no expert and the proof you wanted is microsoft, go ask them about it.
Wolfstorm 2023 年 6 月 28 日 上午 9:06 
Any hacker will assume a W7 system have nothing valuable inside it, and it is just one of those generic office computers. So any hole that is left on it will go unexploited.

They will target the computers that hold more important data, and these will be running Windows 10, because of the muh security myth. So even if W10 have less holes than W7, it would still be the main target.

From a single user perspective, you are more safe running W7 with a good anti-virus and anti-rootkit, then the mess of bloatware that is W10. Remember the more complex the system, the more vulnerable it is.
最后由 Wolfstorm 编辑于; 2023 年 6 月 28 日 上午 9:07
RasaNova 2023 年 6 月 28 日 上午 9:08 
引用自 MonkehMaster
引用自 RasaNova
The claim was that all windows 7s security holes have been patched. Seems you're moving the goalposts to extended updates happened, plus some of the same holes also exist in newer versions. Like I said before I'm no expert, but those seem like very different answers.

you are right, you are no expert and the proof you wanted is microsoft, go ask them about it.
So, you are sticking with your claim that all windows 7 security holes have been patched and Microsoft is the proof?
最后由 RasaNova 编辑于; 2023 年 6 月 28 日 上午 9:08
crunchyfrog 2023 年 6 月 28 日 上午 9:08 
引用自 MonkehMaster
引用自 RasaNova
The claim was that all windows 7s security holes have been patched. Seems you're moving the goalposts to extended updates happened, plus some of the same holes also exist in newer versions. Like I said before I'm no expert, but those seem like very different answers.

you are right, you are no expert and the proof you wanted is microsoft, go ask them about it.
That's not how evidence works.

YOU made the claim. You can't just say "Microsoft" as that is just evidence of you saying a word.

Evidence must be germane to your claim. So please do demosntrate HOW this backs up your claim. Saying one word can never do that.
MonkehMaster 2023 年 6 月 28 日 上午 9:09 
引用自 RasaNova
引用自 MonkehMaster

you are right, you are no expert and the proof you wanted is microsoft, go ask them about it.
So, you are sticking with your claim that all security holes have been patched and Microsoft is the proof?

so it still hasnt sunk in yet? deal with the facts and move on.
MonkehMaster 2023 年 6 月 28 日 上午 9:09 
引用自 crunchyfrog
引用自 MonkehMaster

you are right, you are no expert and the proof you wanted is microsoft, go ask them about it.
That's not how evidence works.

YOU made the claim. You can't just say "Microsoft" as that is just evidence of you saying a word.

Evidence must be germane to your claim. So please do demosntrate HOW this backs up your claim. Saying one word can never do that.

microsoft
Dr.Shadowds 🐉 2023 年 6 月 28 日 上午 9:15 
引用自 Wolfstorm
Any hacker will assume a W7 system have nothing valuable inside it, and it is just one of those generic office computers. So any hole that is left on it will go unexploited.

They will target the computers that hold more important data, and these will be running Windows 10, because of the muh security myth. So even if W10 have less holes than W7, it would still be the main target.

From a single user perspective, you are more safe running W7 with a good anti-virus and anti-rootkit, then the mess of bloatware that is W10. Remember the more complex the system, the more vulnerable it is.
https://steamcommunity.com/sharedfiles/filedetails/?id=1189431235

I don't think you understand, if they can get access on target PC they wouldn't care what OS it using as long they can take any info from you, and if it a office, or company that more reason to wanting access to it, so yeah not sure if actually spend more than a second to think about this.
RasaNova 2023 年 6 月 28 日 上午 9:26 
引用自 MonkehMaster
引用自 RasaNova
So, you are sticking with your claim that all security holes have been patched and Microsoft is the proof?

so it still hasnt sunk in yet? deal with the facts and move on.
There is nothing to sink in, you haven't provided any facts yet. I'm trying to take you seriously and give an opportunity to clarify your statement but it doesn't really seem like you're trying to make a real point.
MonkehMaster 2023 年 6 月 28 日 上午 9:30 
引用自 RasaNova
引用自 MonkehMaster

so it still hasnt sunk in yet? deal with the facts and move on.
There is nothing to sink in, you haven't provided any facts yet. I'm trying to take you seriously and give an opportunity to clarify your statement but it doesn't really seem like you're trying to make a real point.

so you are telling me that you need a link to win 7 ESU, just so you can have me "prove myself"?

nah, do your own work and stop being lazy.
最后由 MonkehMaster 编辑于; 2023 年 6 月 28 日 上午 9:31
eram 2023 年 6 月 28 日 上午 10:54 
Microsoft wants to move windows 100% into the cloud, come on Linux be gooder.
https://www.theverge.com/2023/6/27/23775117/microsoft-windows-11-cloud-consumer-strategy
Tito Shivan 2023 年 6 月 28 日 上午 11:12 
引用自 RasaNova
So, you are sticking with your claim that all windows 7 security holes have been patched and Microsoft is the proof?
The problem with exploits and security holes aren't the ones you've patched. It's the ones you don't even know you're there.

引用自 Wolfstorm
Any hacker will assume a W7 system have nothing valuable inside it, and it is just one of those generic office computers. So any hole that is left on it will go unexploited.
That's not how it works.
Hackers knock all the doors, hoping for some to open, hoping there's something valuable inside (or simply to zombify your machine for their own purposes)
RiO 2023 年 6 月 28 日 上午 11:21 
引用自 Wolfstorm
Any hacker will assume a W7 system have nothing valuable inside it, and it is just one of those generic office computers. So any hole that is left on it will go unexploited.

Your fallacy is assuming the l33t h4x0rz are sitting their behind their keyboards and are trying to manually hack the world; one system at a time. And are valuing their targets a priori, based on what data they can find.

A very classic house-burgling take on things.
But in practice, it doesn't work that way.

What happens in practice is that on one particular unfortunate morning, you will happen to open up one of your regularly trusted web sites to read something - but someone managed to break into their CMS and drop some exploit code there. Or maybe that site loads an ad off an ad network that let some malicious stuff slip through.

You don't know it yet. But you've just been drive-by infected.
The malware finds its way back out, and comes knocking to a command & control server.
The C&C server registers it and the malware drops some system specs so the C&C server knows what it bagged.
Ooh! Great. A full blown Intel CPU rather than the low-power ARM trash in those easily compromised IoT devices. So that one gets sorted in the "high value" pile for being sold on or rented out as part of a botnet.

You know how legit enterprises rent computing capacity in large commercial cloud environments, like Google Cloud; Amazon Web Services; or Microsoft Azure? Well; botnets for hire is how criminal organizations and 'lesser' hackers and script kiddies do it.

Maybe at some point, some criminals decide they're going to buy access to the botnet to install key loggers on the machines; steal credentials; etc. Maybe they'll deploy ransomware and encrypt your files. Or maybe one day in the future you get to deal with some very, very uncomfortable questions from the FBI (or your regional equivalent), on why your system was found serving out child pornography on the dark web. Full-fledged desktop systems tend to have big hard drives with lots of slack to them, where no regular user is going to notice a few GB of space going missing - after all.
最后由 RiO 编辑于; 2023 年 6 月 28 日 上午 11:28
< >
正在显示第 4,786 - 4,800 条,共 11,277 条留言
每页显示数: 1530 50

发帖日期: 2023 年 3 月 30 日 下午 4:53
回复数: 11,277