#Word

LeRoy Millerkd8bxp
2025-10-10

Numbword #1156 100/100

⬜🟦⬜⬜🟦
🟦⬜⬜⬜⬜
🟦🟦⬜⬜🟦
⬜🟦🟦⬜🟦
🟦🟦🟦🟦🟦

"When two divorced people marry, four people get into bed"
- Anonymous

numbword.com/

Danči🦝danci@mas.to
2025-10-10

😖😖😖

Microsoft flips the switch: Word will now save new documents to OneDrive by default — and that changes everything

windowscentral.com/microsoft/m

#windows #word #onedrive #cloud

2025-10-10

Microsoft sẽ thay đổi Word để tự động lưu tài liệu mới lên OneDrive theo mặc định, hỗ trợ đồng bộ và bảo mật dữ liệu nhưng cũng gây quan ngại về quyền riêng tư. #Microsoft #Word #OneDrive #Tech #CôngNghệ #MicrosoftVietnam #WordVietnam

msn.com/en-gb/technology/softw

2025-10-10

Microsoft Word vừa có một thay đổi quan trọng: các tài liệu mới giờ đây sẽ được lưu vào OneDrive theo mặc định, thay vì trên máy tính của bạn.

Sự thay đổi này nhằm thúc đẩy việc sử dụng lưu trữ đám mây và đồng bộ hóa dữ liệu. Người dùng vẫn có thể chọn lưu file cục bộ nếu muốn.

#Microsoft #Word #OneDrive #CongNghe #TinTucCongNghe #CapNhatPhanMem
#TechNews #SoftwareUpdate

windowscentral.com/microsoft/m

LeRoy Millerkd8bxp
2025-10-10

🦊 #1140 5/8
foximax.com/

🟩🟩🟩🟩🟩
🟩🟩🟩🟩🟩
🟩🟩🟩⬜🟩
🟩🟩⬜⬜🟩
⬜🟩🟩🟩⬜

Kevin Karhan :verified:kkarhan@infosec.space
2025-10-10

@mrmasterkeyboard @arnan hmm...

I mean, there were #CLI-based office suites like #Lotus and even #Excel and #Word started with a #TUI

2025-10-09

Attackers Actively Exploiting Critical Vulnerability in Service Finder Bookings Plugin

On June 8th, 2025, we received a submission through our Bug Bounty Program for an Authentication Bypass vulnerability in Service Finder Bookings, a WordPress plugin bundled with the Service Finder theme. This theme has been sold to approximately 6,000 customers. This vulnerability makes it possible for an unauthenticated attacker to gain access to any account on a site including accounts with the ‘administrator’ role. The vendor released the patched version on July 17, 2025, and we publicly disclosed this vulnerability on July 31, 2025.

Pulse ID: 68e7e8b4e4ba51db6e3330ef
Pulse Link: otx.alienvault.com/pulse/68e7e
Pulse Author: AlienVault
Created: 2025-10-09 16:54:10

Be advised, this data is unverified and should be considered preliminary. Always do further verification.

#CyberSecurity #InfoSec #OTX #OpenThreatExchange #RAT #RDP #Vulnerability #Word #Wordpress #bot #AlienVault

LeRoy Millerkd8bxp
2025-10-09

Numbword #1155 100/100

⬜🟦⬜⬜🟦
⬜🟦⬜⬜🟦
⬜⬜⬜🟦🟦
🟦⬜⬜⬜🟦
⬜⬜⬜🟦🟦
⬜🟦⬜🟦🟦
🟦🟦🟦🟦🟦
🟦🟦🟦🟦🟦

""Life doesn't throw me curve balls. It just hits me with the bat.""
- Jealousy

numbword.com/

2025-10-09

#TrucsEtAstuces
#Word
#Windows

3) raccourcis clavier : récupérer le fichier "Normal.dot" qui se trouve dans le dossier Windows\Utilisateurs\NomduPC\AppData\Roaming\Microsoft\Templates, et le copier dans le même dossier du nouveau PC ;

4) personnalisations du ruban : aller dans Word, cliquer sur Fichier, puis Options en bas à gauche, puis Personnaliser le ruban, et enfin Importer/Exporter. Enregistrer le fichier quelque part, et faire pareil pour l'importer dans le Word du nouveau PC.

2/2

2025-10-09

#TrucsEtAstuces
#Word
#Windows

Vous devez changer de PC Windows et vous voulez transférer vos paramètres de Word ? Voici :

1) activer "afficher les fichiers et dossiers cachés" dans Windows Explorer ;

2) corrections automatiques: récupérer le fichier MS1036, qui se trouve dans le dossier Windows\Utilisateurs\NomduPC\AppData\Roaming\Microsoft\Office de l'ordinateur d'origine, et le coller dans le même dossier de l'ordi de destination ;

1/2

2025-10-09

Microsoft、Copilotのアイコンからインスピレーションを受けAI時代の到来を反映させた新アイコンの「Word for iOS」をリリース。
applech2.com/archives/20251009

#applech2 #Microsoft_for_iOS #iOS #iPhone #Microsoft #Word #アイコン

2025-10-09

Wilde Geschichte:
In Word gelöschte Grafik taucht beim drucken wieder auf.
Bei Export in pdf ist sie weg. Bei bestimmten pdf readern wird sie angezeigt.

Alles auswählen und in neues Dokument kopieren bringt nichts.

Internet kennt nur den Fall, dass Grafiken NICHT gedruckt werden.

#Word #microsoft

N-gated Hacker Newsngate
2025-10-09

Ah, the age-old tale of trying to wrangle Word's monstrous hydra into Rust's cold, type-safe embrace. 😅 Because clearly, the true measure of "legal tech greatness" is the ability to decode an endless labyrinth of nested tables without losing your . 🧠🔧 Spoiler alert: It's still a nightmare.
tritium.legal/blog/word

GripNewsGripNews
2025-10-09

🌘 Tritium 團隊對 Rust Word 規格的思考
➤ 從函式庫依賴到自主研發:Tritium 在 Word 格式處理上的技術演進
tritium.legal/blog/word
本文探討了 Tritium 團隊在處理 Word 檔案格式時,從採用現有的 Rust 函式庫 `docx_rs` 到自行開發客製化模組的心路歷程。作者解釋了 Word 檔案格式的複雜性,以及 `docx_rs` 在生成和讀取 Word 文件方面的優勢,特別是其利用 enum 結構來處理大量 XML 元素的記憶體效率。然而,由於 `docx_rs` 主要為文件建構設計,未能完整支援 Tritium 進行精確的編輯與資料的雙向轉換(round-trip),因此 Tritium 團隊決定重寫自家的 docx 模組,以確保核心業務功能的穩定性,強調當核心業務依賴某項技術時,應掌握該技術的完整控制權。
+ 很有啟發性的文章!看到 Tritium 團隊為了核心業務的穩定性,寧願投入資源重寫,而不是妥協,這點值得讚賞。這也讓我反思在專案中,什麼纔
Spec

2025-10-09

GPTLocalhost - Công cụ mới cho phép bạn sử dụng các mô hình ngôn ngữ lớn (LLM) trực tiếp trong Microsoft Word ngay trên máy tính. Giải pháp này đảm bảo bảo mật dữ liệu hoàn toàn, không phí hàng tháng, và dễ dàng chuyển đổi giữa các mô hình bất kỳ lúc nào. #AI #Technology #Software #LLM #MicrosoftWord #DataPrivacy #AI #CôngNghệ #PhầnMềm #NgônNgữLớn #Word #BảoMậtDữLiệu

gptlocalhost.com/

LeRoy Millerkd8bxp
2025-10-09

🦊 #1139 2/8
foximax.com/

🟩🟩🟩🟩🟩
🟩🟩🟩🟩🟩

Simon Harpersimonharper
2025-10-08

The new icon 🫣

Ramon Marqueznotasrem
2025-10-08

Microsoft anuncia dos cambios relevantes que impactarán en la experiencia de Windows 11: el guardado automático de documentos Word en OneDrive y la integración del explorador de archivos con Copilot y OneDrive. En este artículo te enterarás de qué van estos nuevos cambios.



notasrem.com/microsoft-integra

LeRoy Millerkd8bxp
2025-10-08

Numbword #1154 100/100

⬜🟦🟦🟦⬜
🟦🟦🟦🟦🟦

"We make the world we live in and shape our own environment."
- Orison Swett Marden

numbword.com/

2025-10-08

Nezha Tool Used in New Cyber Campaign Targeting Web Applications

A sophisticated cyber campaign utilizing the open-source Nezha tool has been discovered targeting vulnerable web applications since August 2025. Attackers gained access through an exposed phpMyAdmin panel, employing creative log poisoning techniques to implant a PHP web shell. The intrusion involved the use of AntSword for server control, followed by the installation of Nezha agent and Ghost RAT malware. This marks the first public report of Nezha being used for web server compromises. The campaign, linked to China-based infrastructure, affected over 100 systems, primarily in Taiwan, Japan, South Korea, and Hong Kong. Attackers used Nezha to disable Windows Defender and deploy Ghost RAT, establishing persistence under the name 'SQLlite'. Recommendations include patching public-facing applications, implementing authentication, and improving detection for post-exploitation activities.

Pulse ID: 68e68274cd83b867a1eb6dc7
Pulse Link: otx.alienvault.com/pulse/68e68
Pulse Author: AlienVault
Created: 2025-10-08 15:25:40

Be advised, this data is unverified and should be considered preliminary. Always do further verification.

#China #CyberSecurity #HongKong #InfoSec #Japan #Korea #Malware #OTX #OpenThreatExchange #PHP #RAT #RCE #SQL #SouthKorea #Windows #Word #bot #phpMyAdmin #AlienVault

Client Info

Server: https://mastodon.social
Version: 2025.07
Repository: https://github.com/cyevgeniy/lmst