It looks like Twitter is in the process of rolling out or testing a handy new tabs feature to its Windows 10 app.
It looks like Twitter is in the process of rolling out or testing a handy new tabs feature to its Windows 10 app.
In my last post on code coverage, I shared the process for you to collect coverage for your environment. This week, I’ll be describing a way to use our tools to create new tests and show how you can measure the increase of coverage for PowerShell Core after adding new tests. To recap, we can collect code coverage with the OpenCover module, and then inspect the coverage. In this case I would like to know about coverage for a specific cmdlet. For this post, we’re going to focus on the Clear-Content Cmdlet because coverage is ok, but not fantastic and it is small enough to go over easily.
Here’s a partial capture from running the OpenCover tools:
By selecting the class Microsoft.PowerShell.Commands.ClearContentCommand we can drill into the specifics about the class which implements the Clear-Content cmdlet. We can see that we have about 47% line coverage for this class which isn’t fantastic, by inspecting the red-highlights we can see what’s missing.
It looks like there are some error conditions, and some code which represents whether the underlying provider supports should process are not being tested. We can create tests for these missing areas fairly easily, but I need to know where these new tests should go.
Test Code Layout
Now is a good time to describe how our tests are laid out.
https://github.com/PowerShell/PowerShell/test contains all of the test code for PowerShell. This includes our native tests, C-Sharp tests and Pester tests as well as the tools we use. Our Pester tests should all be found in https://github.com/PowerShell/PowerShell/test/powershell and in that directory there is more structure to make it easier to find tests. For example, if you want to find those tests for a specific cmdlet, you would look in the appropriate module directory for those tests. In our case, we’re adding tests for Clear-Content, which should be found in https://github.com/PowerShell/PowerShell/test/powershell/Modules/Microsoft.PowerShell.Management. (You can always find which module a cmdlet resides via get-command). If we look in this directory, we can already see the file Clear-Content.Tests.ps1, so we’ll add our tests to that file. If that file didn’t exist, you should just create a new file for your tests. Sometimes the tests for a cmdlet may be combined with other tests. Take this as an opportunity to split up the file to make it easier for the next person adding tests. If you want more information about how we segment our tests, you can review https://github.com/PowerShell/PowerShell/docs/testing-guidelines/testing-guidelines.md.
New Test Code
Based on the missing code coverage, I created the following replacement for Clear-Content.Tests.ps1 which you can see in this PR: https://github.com/PowerShell/PowerShell/pull/3157. After rerunning the code coverage tools, I can see that I’ve really improved coverage for this cmdlet.
There seems to be a small issue with OpenCover as some close braces are not being marked as missed, but you can see the improvement:
Now it’s your turn and we could really use your help. If you have areas of the product that you rely on, and don’t have the tests that you think they should have, please consider adding tests!
In September 2016, we started adding to Microsoft Malicious Software Removal Tool (MSRT) a malware suite of browser modifiers and other Trojans installed by software bundlers. We documented how the malware in this group install other malware or applications silently, without your consent. This behavior ticks boxes in the evaluation criteria that Microsoft Malware Protection Center (MMPC) uses for identifying unwanted software. Installing software without your permission, interaction, or consent is considered unwanted behavior because that can take away the choice you should have in determining what applications to install on your computer.
By October 2016, MSRT detected and removed most of the malware families in this suite:
Sasquor, which changes browser search and homepage settings to circumvent the browser’s supported methods and bypass your consent, and can install other malware like Xadupi and Suweezy
SupTab, which also changes browser search and homepage settings, and installs services and scheduled tasks that regularly install additional malware
Suweezy, which attempts to modify settings for various antivirus software, including Windows Defender, creating a significant danger to your computer’s overall security
Xadupi, which registers a service that regularly installs other apps, including Ghokswa and SupTab, and is ostensibly an update service for an app that has some user-facing functionality: CornerSunshine displays weather information on the taskbar, WinZipper can open and extract archive files, and QKSee can be used to view image files
Ghokswa, which installs a customized version of Chrome or Firefox browsers, modifying the home page and search engine front-end or stopping processes and replacing shortcuts and associations for the legitimate browser with ones pointing to its own version
This month, we’re adding Chuckenit, the last remaining malware in this group, to MSRT, helping make sure the whole suite is detected and removed from your computer and doesn’t interfere with your computing experience.
Chuckenit is an application called “Uncheckit”, whose main purpose is to uncheck checkboxes in installation dialogue boxes, effectively messing with choices without your knowledge during installation.
Chuckenit is installed together with Suptab and Ghokswa when Xadupi downloads and installs updates. Xadupi, meanwhile is installed by Sasquor, although it may also be installed directly by software bundlers.
Figure 1. Chuckenit is installed silently by Xadupi, which is installed by Sasquor.
Figure 2. Xadupi may also be installed directly by software bundlers, such as ICLoader.
Similar to the other malware in this suite, as part of its installation, Chuckenit adds several Scheduled Tasks and registers a couple of services to automatically download updates, which may come with other applications or malware.
Since May 2016, Windows Defender has encountered this threat in over 418,000 computers, of which 12% are in Brazil, 7% are in India, and 7% are in Russia.
Figure 3. Geographic distribution of Chuckenit encounters
Prevention, detection, and recovery
Chuckenit is part of an infection chain that involves malware and software bundlers silently installing other applications. You need security solutions that detect and remove all components of this type of infection.
Ensure you get the latest protection from Microsoft. Keep your Windows operating system and antivirus up-to-date and, if you haven’t already, upgrade to Windows 10.
Ensure your antimalware protection, such as Windows Defender and Microsoft Malicious Software Removal Tool, is up-to-date. In Windows Defender, you can check your exclusion settings to see whether the malware added some entries in an attempt to exclude folders from being scanned. To check and remove excluded items in Windows Defender: Navigate to Settings > Update & security > Windows Defender > Add an exclusion. Go through the lists under Files and File locations, select the excluded item that you want to remove, and click Remove. Click OK to confirm.
Use cloud protection to get protection against the latest malware threats. It’s turned on by default for Microsoft Security Essentials and Windows Defender for Windows 10. Go to Settings > Update & security > Windows Defender and make sure that your Cloud-based Protection settings is turned On.
Use the Settings app to reset to Microsoft recommended defaults that may have been changed by the malware in this suite. Launch the Settings app. Navigate to the Default apps page. From Home go to System > Default apps, then click Reset.
For enterprises, use Device Guard, which can lock down devices and provide kernel-level virtualization-based security, allowing only trusted applications to run.
Use Windows Defender Advanced Threat Protection to get alerts about suspicious activities, including the download of malware, so you can detect, investigate, and respond to attacks in enterprise networks. Evaluate Windows Defender Advanced Threat Protection for free.
James Patrick Dee
The fine folks on the Xbox team don’t make it easy to keep an eye on all the cars are in the Forza games, because there are so many of them! That’s great for us as gamers, but there’s a lot of information to digest.
The Forza Horizon 3 car list is complete, for now, so we compiled a giant list of each and every vehicle you’ll find within the game. They’re arranged alphabetically below and split by letter, so hopefully it’ll be easy enough to see if your favorites made the cut.
Stardew Valley is a superb indie game that caters to a vibrant community of virtual farmers and dungeon explorers.
The game revolves around you inheriting and building up a neglected farm. Unfortunately, there’s an issue you may encounter that causes slight Frame-Per-Second (FPS) drops at seemingly random intervals. But fear not. There’s an easy fix that will get you back to your crops in no time.
The problem has been narrowed down to Microsoft’s XNA framework. You can reinstall the suite to see if that solves the issue and gets gameplay back to smooth levels. Here’s how.
Hit Windows Key + Q to bring up Cortana.
Search “Add or Remove Programs”.
Choose the top result. (It should match your query.)
Scroll down to the “Microsoft XNA” listing.
Select the program.
Select the “Repair” option in the wizard.
Relaunch Stardew Valley and see if that solved your problem. If not, try to import a working configuration for XNA.
Ooblets, an indie title that’s been intriguingly described by its developer as “Harvest Moon meets Pokémon meets Animal Crossing,” will see its initial release on Xbox One and PC.
Instagram aficionados, brace yourselves for impact; the photo-sharing service is adding support for one of its most requested features.
Logitech’s new webcam supports 4K resolutions, HDR and Windows Hello … but how well does it actually work? And do you really need 4K today?
It’s not often that I’ve thought to myself, “Man, I wish my webcam was 4K.” Let’s be honest, in 2017 4K isn’t a “mainstream” resolution that everybody is taking advantage of. That day is slowly coming, however, and Logitech appears to be aware of that. Logitech’s new BRIO 4K webcam is the first consumer-facing webcam that supports 4K, HDR and Windows Hello, all in one package. It’s a beast of a webcam, and we’re here to review it.
It’s worth noting that this is an expensive webcam, costing $200 new from Logitech. That’s a hefty price, but considering what you get in the box, it makes sense. As the specifications below explain, this is one of the first webcams to be fully kitted out with 4K resolution support, BrightLight HDR, Windows Hello, omnidirectional microphones, 30FPS, 60FPS and 90FPS support, and a whole lot more. It’s overkill, and that’s great.
BRIO 4K specifications
Just a week after delaying its usual monthly Patch Tuesday updates for February, Microsoft has issued a critical Adobe Flash Player fix for Windows.
March’s free Xbox Games with Gold have been revealed, and, as always, there’s plenty to like on both Xbox One and Xbox 360. All told, March offers up $99 worth of games and 3,450 gamerscore to be had.
First, Xbox One owners will be able to pick ups horror title Layers of Fear for all of March. Then, runningfrom March 16 through April 15, you’ll be able to grab Evolve for free.
Xbox 360 gamers, on the other hand, will get Borderlands 2 for free from March 1-15. Heavy Weapon will also be free from March 16-31. As always, both Xbox 360 titles are also playable on Xbox one via backward compatibility.
If you have an active Xbox Live Gold subscription, you can start grabbing your free games at the beginning of the month. Are there any specific games you’re looking forward to checking out?