Removing Copilot

What are the effects of removing Copilot AI features.

Removing all Copilot AI features from your laptop will not harm your operating system or delete any of your files, but it will significantly change your system’s resource usage, interface layout, and data privacy footprint.

1. Performance Gains and Resource Reclaiming

  • Lower Idle Memory (RAM): Disabling Copilot stops background web-wrapper processes from pre-loading. Users frequently report a substantial drop in idle RAM usage, keeping more memory open for heavy apps and gaming.
  • Reduced CPU Spikes: Turning off localized AI scanning stops arbitrary background processing spikes. Your laptop will run slightly cooler, which can subtly extend battery longevity during daily workflows.
  • Snappier Office App Launches: Disabling “Connected Experiences” in Word and Excel means your apps load files locally without spending processing time pinging Microsoft servers to fetch LLM features.

2. Interface and Workflow Simplification

  • Zero Accidental Triggers: The Copilot sidebars, pop-up text prompts, and taskbar shortcuts are eliminated. You will no longer accidentally activate the assistant via misclicks or tracking triggers while typing.
  • Clean Taskbar and Menus: Stripping the apps clears out the forced search box icons and unnecessary app bloat, reverting your laptop to a traditional, minimalist Windows interface.

3. Data Privacy and Security Enhancements

  • Local Cloud Isolation: Disabling content analysis stops Microsoft from parsing your live local documents, text selections, and data spreadsheets for real-time contextual suggestions.
  • Minimized Server Pings: Your machine will drastically reduce telemetry traffic sent to external Microsoft data centers, locking down your network bandwidth and data privacy.

4. What You Will Actually “Lose”

  • No AI Assistance: You lose the ability to generate summaries, rewrite emails, or parse graphs natively inside Microsoft 365. Note: If you ever need AI later, you can still access the exact same tools via any standard web browser using the Microsoft Copilot Web Interface.
  • Broken Shortcut Keys: If your laptop features a dedicated hardware “Copilot” key, pressing it will either do nothing or default to opening a generic Windows Search box.

Recognize and Stop Phishing Attacks

What is Phishing?

In today’s IT environment, understanding what is phishing is just as important as knowing how to configure a firewall. High‑profile data breaches have shown that attackers don’t always break in through unpatched systems—often, they simply convince a person to click.

Phishing is one of the most common cyber threats facing every organization. Because these attacks focus on people instead of technology, anyone with an email account, phone number or social media profile can become a victim.

This guide explains what phishing is, how different phishing attacks work, and practical steps you can take to protect yourself and your organization.

What is phishing?

Phishing is a type of cyber-attack in which scammers send deceptive messages—usually email, but also text messages, social media messages, or phone calls—to trick a target into sharing sensitive information or installing malicious software.

The attacker usually pretends to be a trusted company, bank, or internal department. The message might:

  • Ask you to “verify” or “update” your account
  • Direct you to a fake website that looks legitimate
  • Urge you to open an attachment that secretly contains malware

Once the attacker has your credentials or other personal data, they can steal money, impersonate you online, or move deeper into your employer’s network and cause a data breach.

For anyone working in IT, being able to explain “what is phishing” in plain language and spot phishing attempts in real time is now a core skill.

Why phishing awareness matters in the IT industry

From an IT and cybersecurity perspective, phishing is uniquely dangerous:

  • It bypasses technical security controls by targeting human behavior.
  • A single successful phishing attack can compromise multiple systems and accounts.
  • Phishing emails are cheap to send and easy to automate, so scammers can reach thousands of users at once.

Industry studies consistently show that phishing continues to be a leading cause of data breaches and ransomware incidents. That’s why many compliance frameworks explicitly require ongoing phishing training and awareness programs.

When you understand what is phishing, you can play an active role in defending both your own data and your employer’s environment.

How phishing attacks work

Most phishing attacks follow a similar pattern:

  1. Reconnaissance and targeting
    • Cybercriminals select an organization or group of individuals as the target.
    • They gather information from public sources (websites, LinkedIn, social media) or previous data leaks.
  2. Message creation
    • Attackers design phishing emails or other messages that look legitimate, often copying real branding, logos, and signatures.
    • They register look‑alike domain names and build fake websites to capture credentials.
    • Many phishing attacks add urgency, such as “Your payroll account will be locked today.”
  3. Delivery to the victim
    • The messages are sent via bulk email, SMS, messaging apps, or automated phone calls.
    • Some attacks come from compromised real accounts, which makes them appear even more trusted.
  4. Exploitation
    • The victim clicks a URL, opens an attachment, or replies with personal details.
    • Login pages silently record usernames, passwords, and multi‑factor codes.
    • Attachments install malware that gives hackers remote access.
  5. Action on Objectives
    • Stolen data and accounts are used to move through networks, steal additional credentials, or launch further attacks.
    • Data may be sold or combined with other phishing scams to increase impact.

At every step, attackers use social engineering techniques to make their messages look routine and safe.

Main types of phishing attacks

Phishing isn’t a single technique—it’s a family of related attacks that use similar psychology but different delivery methods.

  1. Email phishing

Classic email phishing is still the most common form:

  • Phishing emails often claim to be from a bank, shipping company, cloud provider, or HR.
  • The recipient is urged to click a link or open an attachment.
  • Links lead to fake websites with spoofed domains such as “security‑paypa1[.]com” instead of “paypal.com.”

Because these messages look routine and are sent in bulk, even a small success rate is profitable for scammers.

  1.  Spear phishing and whaling

Spear phishing is highly targeted:

  • Attackers research a specific individual or small group.
  • They reference real projects, colleagues, or tools to appear legitimate.
  • The goal is to compromise higher‑value accounts such as system admins or finance staff.

When the target is an executive or “big fish,” the attack is often called whaling. These phishing attacks can create a severe risk for the entire organization.

  1. Smishing and vishing

Not all phishing happens in your inbox:

  • Smishing uses fraudulent text messages to lure victims to fake websites or to call a spoofed phone number.
  • Vishing uses live or automated voice calls. Callers may pretend to be tech support, a government office, or your bank, asking you to share card numbers, reset codes, or other sensitive information.

These social‑engineering attacks rely heavily on real‑time pressure and urgency.

  1. Clone phishing, angler phishing, and domain spoofing

Other notable types include:

  • Clone phishing – A previous legitimate email is copied, but the link or attachment is replaced with something malicious.
  • Angler phishing – Scammers use social‑media replies or direct messages to impersonate customer support and gather personal data.
  • Domain spoofing – Attackers forge a sender address so that phishing emails appear to come from a real organization.
  1. Search engine and website phishing

In search‑engine phishing, scammers build a fake website and try to get it indexed or advertised so users find it when they search for a real brand. The site may:

  • Collect credentials through fake login forms
  • Offer “free” software that hides malware
  • Mimic an online bank or payment portal to grab card numbers

Recognizing common signs of phishing emails

Knowing what is phishing is only useful if you can spot it in time. Watch for these red flags in phishing emails and other messages:

  • Unexpected contact from a company or organization you don’t normally interact with
  • Poor spelling and grammar, or a tone that doesn’t match legitimate communications
  • Generic greetings (“Dear customer”) instead of your name
  • Attachments or links you weren’t expecting
  • A sender address that looks odd when you double‑check the full domain
  • Links that show a different URL when you hover over them
  • Requests for passwords, credit‑card numbers, or other sensitive information
  • Strong urgency: “Your account will be closed in 1 hour” or “final warning to avoid serious threats”

When in doubt, assume the message might be part of a phishing attack until you confirm otherwise.

Security measures against phishing emails

Defending against phishing emails requires layered security—technical controls plus informed users.

Technical protections

IT and security teams can:

  • Use email filters and secure email gateways to block known malicious senders and common phishing attacks.
  • Implement SPF, DKIM, and DMARC to reduce spoofed sender addresses.
  • Enforce multi‑factor authentication (MFA) so stolen passwords alone can’t access critical accounts.
  • Monitor systems for suspicious logins and signs of malware or credential abuse.
  • Block known fraudulent websites and URLs with web‑filtering tools.

These measures significantly protect organizations but cannot replace user judgment.

Employee training and reporting culture

Because humans remain the prime target, staff training is essential:

  • Include phishing awareness in onboarding and regular security refreshers.
  • Use real‑world examples of phishing scams that have hit your industry.
  • Run simulated phishing attempts so employees can practice safely.
  • Provide a simple way to report suspicious messages (for example, a “Report Phish” button).

When people feel supported for reporting, they’re more likely to flag phishing emails quickly instead of ignoring them.

Protecting your accounts from phishing threats

You can’t control every phishing attack, but you can control how exposed your accounts are if one succeeds.

Practical tips for individuals

  • Use strong, unique passwords for every account, stored in a reputable password manager.
  • Turn on MFA wherever available—especially for email, cloud services, and bank logins.
  • Keep operating systems, browsers, and apps updated to reduce malware risk.
  • Go directly to a website by typing the URL instead of following links in messages.
  • Review account‑activity logs where available and set alerts for unusual sign‑ins.

Practical tips for organizations

Organizations can strengthen resilience against phishing attacks by:

  • Documenting clear steps users should follow to report phishing attempts.
  • Regularly reviewing security logs to detect unusual sign‑in patterns or repeated failed logins.
  • Limiting user privileges so a compromised account can’t access more than necessary.
  • Segmenting networks to contain damage if malicious access occurs.

Phishing vs. other cyber threats

Phishing often overlaps with other cyber threats, but it has some distinct characteristics.

  • Malware – Any malicious software designed to damage or compromise systems. Phishing can deliver malware, but malware can also spread through other channels.
  • Ransomware – A form of malware that encrypts data and demands payment for decryption. Many ransomware campaigns begin with a simple phishing email.
  • Social engineering – A broader category of psychological manipulation used by hackers and cybercriminals to get people to do something they shouldn’t. Phishing is one type of social‑engineering attack focused on deceptive communications.

Understanding how these concepts relate helps you explain the bigger picture to non‑technical stakeholders.

What to do if you suspect a phishing attempt

If you receive a message that might be phishing:

  1. Do not click any links or open attachments.
  2. Capture details such as sender address, full URLs, and the time the message was sent.
  3. Report the suspicious email or text messages using your organization’s official process.
  4. If you believe you entered credentials on a fake website, immediately change your password and update any other accounts where you reused it.
  5. Notify your security or IT team so they can investigate and warn others.

Timely reporting can stop a single victim incident from turning into an organization‑wide breach.

Staying ahead of evolving phishing techniques

Phishing continues to evolve. Attackers now use AI to craft more convincing messages at scale, combine multiple attacks (for example, a phone call followed by a confirming email), and exploit new platforms.

To stay prepared:

  • Follow trustworthy security blogs and advisories.
  • Encourage a culture where people question anything that seems off—even if it looks legitimate at first glance.

The more familiar you are with what is phishing and how modern phishing attacks operate, the better positioned you are to protect both yourself and your organization.

Microsoft Copilot

Can I safely remove the AI component from my computer?

If you do not want Copilot on your laptop, nothing bad happens to your operating system, but because Microsoft has transitioned Copilot into a standalone web application, you can safely uninstall or completely disable it without impacting core Windows functions.

1. Uninstall the Copilot App

The easiest way to remove the main application from your laptop is through the native Windows settings:

  • Open Settings by pressing the Windows Key + I shortcut.
  • Click on Apps in the sidebar, then select Installed apps.
  • Type “Copilot” in the search box.
  • Click the three-dot menu next to Microsoft Copilot and select Uninstall.
  • Restart your PC to clear any remaining cache.
2. Disable Copilot System-Wide (Windows Pro & Enterprise)

To prevent Windows updates from automatically reinstalling or re-enabling Copilot, block it at the system level using the Group Policy Editor:

  • Press Windows Key + R, type gpedit.msc, and press Enter.
  • Navigate to: User Configuration > Administrative Templates > Windows Components > Windows Copilot.
  • Double-click Turn off Windows Copilot, change the selection to Enabled, and click OK.
  • Next, navigate to: User Configuration > Administrative Templates > Windows Components > Windows AI.
  • Double-click Remove Microsoft Copilot App, set it to Enabled, and hit Apply.
3. Disable Copilot in Windows Home (Registry Method)

If your laptop runs Windows Home, you must use the Registry Editor to block it:

  • Press Windows Key + R, type regedit, and click OK.
  • Head to the path: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows.
  • Right-click the Windows folder, select New > Key, and name it WindowsCopilot.
  • Right-click your new WindowsCopilot folder, select New > DWORD (32-bit) Value, and name it TurnOffWindowsCopilot.
  • Double-click TurnOffWindowsCopilot, change the Value data to 1, and click OK.

4. Remove Copilot from Microsoft Edge & Microsoft 365

Copilot is also embedded into individual productivity tools and must be turned off within them:

  • Microsoft Edge: Open Edge settings, click Sidebar, select Copilot, and toggle the switch to Off.
  • Microsoft 365 (Word/Excel): Go to File > Options > Copilot and clear the Enable Copilot checkbox.

If you have both Copilot and Microsoft 365 Copilot, the difference between these two apps are listed below:

The core difference is that Microsoft Copilot is a basic, standalone consumer chat app, whereas the Microsoft 365 Copilot app is the renamed “Microsoft Office” master hub that consolidates all your productivity apps (Word, Excel, PowerPoint) and connects to enterprise or personal cloud files.

FeatureMicrosoft CopilotMicrosoft 365 Copilot
Primary FunctionStandalone AI conversational chat.Central dashboard for Office apps & files.
Data SourceInformation pulled from the public web.Your secure documents, emails, and chats.
Target AudienceIndividual home users (Free/Pro).Business professionals and students.
App OriginsOriginally a web shortcut built into Windows 11.The actual, rebranded Microsoft 365 (Office) app.
Account TypePersonal Microsoft Accounts.Corporate Entra ID or M365 accounts.

Microsoft Copilot (The Standalone Chat App)

  • What it is: A standalone interface built as a conversational AI companion.
  • What it does: It functions identically to a web browser opening Microsoft Copilot directly. It answers questions, generates images, and references public internet data.
  • Impact of removal: Safe to delete. Removing it only removes a web app wrapper and does not affect your local documents or other programs.

Microsoft 365 Copilot (The Productivity Hub)

  • What it is: This is actually your primary Microsoft Office/365 app suite under a new name. Microsoft permanently rebranded the main desktop Office hub app to “Microsoft 365 Copilot” to reflect its AI-first design.
  • What it does: It acts as your single launchpad to open Word, Excel, PowerPoint, and Outlook. If you have an active organization or school subscription, it acts as a secure work portal that indexes your enterprise data with commercial data protection.
  • Impact of removal: Do not uninstall this if you rely on Microsoft Office. Deleting this application can remove your central dashboard access to your cloud documents, shared files, and quick-launch shortcuts for the Office suite.

If you want to reduce AI clutter, you can safely uninstall the standalone Microsoft Copilot app. Let me know if you would like step-by-step instructions to turn off the AI components inside the Microsoft 365 app without deleting the whole Office hub.

If you are running Windows Pro, you have full access to the Local Group Policy Editor. This allows you to permanently strip the standalone AI from your operating system, remove its background processes, and shut off the AI capabilities inside your Microsoft 365 Office apps without breaking the apps themselves.

Step 1: Permanently Kill Windows Copilot & Background AI

This removes the standalone Copilot app and stops Windows updates from forcefully reinstalling it:

  1. Press Windows Key + R, type gpedit.msc, and press Enter.
  2. In the left panel, navigate to: User Configuration > Administrative Templates > Windows Components > Windows Copilot.
  3. Double-click Turn off Windows Copilot on the right side, select Enabled, and click OK.
  4. Next, look at the left panel again and navigate to: User Configuration > Administrative Templates > Windows Components > Windows AI.
  5. Double-click Remove Microsoft Copilot App, set it to Enabled, and hit Apply.
  6. Close the window, open your Start menu, click the Power icon, and select Restart.
Step 2: Strip AI Features from Microsoft 365 (Office Apps)

You should keep the “Microsoft 365 Copilot” application because it is your main Office launchpad, but you can block the actual AI tracking and icons inside Word, Excel, and PowerPoint:

Method A: The Global Privacy Switch (Recommended)

  1. Open Microsoft Word or Excel, and click File in the top-left corner.
  2. Click Options at the bottom of the left sidebar.
  3. Select Trust Center > Trust Center Settings > Privacy Options > Privacy Settings.
  4. Scroll down and uncheck the box labeled “Turn on experiences that analyze your content”.
  5. Click OK and restart your Office applications. Note: This instantly deactivates the Copilot LLM data-processing engine for your documents.

Method B: Turn Off the Copilot Buttons Directly

  1. Open any Office app (like Excel) and click File > Options.
  2. Click on the Copilot tab in the left-hand pane.
  3. Uncheck the Enable Copilot checkbox.
  4. Click OK and restart the application to hide the toolbar ribbons.
Step 3: Purge the AI Sidebar from Microsoft Edge
  1. Open Microsoft Edge, click the three dots (…) in the top-right corner, and open Settings.
  2. Click Sidebar in the left menu.
  3. Under App and notification settings, click on Copilot.
  4. Turn the toggle for Show Copilot to Off

Cybersecurity plan

White House eyes overhaul of cybersecurity plan

The Office of the National Cyber Director has begun developing a new strategy to address threats from China and other adversaries. The strategy will involve collaborating with the private sector, focusing on harmonizing regulations and setting minimum cybersecurity standards, said Director Sean Cairncross who has cited the need for a clear message to deter attacks. Full Story: Federal News Network/WFED-AM (Washington, D.C.) (10/31)

This new strategy may eventually be adopted on a Global scale, as we follow the goings on around the World.

cloud save

Microsoft Word now autosaves new documents to the cloud

Microsoft is updating Word for Windows to automatically save new documents to the cloud, eliminating the need for users to enable AutoSave manually. While users can set default cloud locations or disable the feature, some have expressed frustration over the added steps to save files locally. Full Story: PCWorld (8/28)

In my opinion this is a really sad state of affairs, not giving people a choice, is an infringement of our rights.

Disable Excel workbook links 

Microsoft to disable Excel workbook links to blocked file types

Microsoft has announced that it will start disabling external workbook links to blocked file types by default between October 2025 and July 2026.

After the rollout, Excel workbooks referencing blocked file types will display a #BLOCKED error or fail to refresh, eliminating security risks associated with accessing unsupported or high-risk file types, including, but not limited to, phishing attacks that utilize workbooks to redirect targets to malicious payloads.

This change is being introduced as a new FileBlockExternalLinks group policy, which expands File Block Settings to include external workbook links.

Read the full article: Microsoft to disable Excel workbook links to blocked file types

Authenticator

Microsoft to rid Authenticator of password management

Microsoft will end support for password management in its Authenticator app at the end of July as part of a broader move toward passwordless authentication methods such as passkeys and FIDO2. Microsoft suggests users who continue to use passwords to use dedicated password managers such as Microsoft Edge or Google Password Manager.

Full Story: The Hacker News (India) (7/1) 

SolarWinds Backdoor

What They’re Not Telling You About SolarWinds: It Wasn’t a Breach — It Was the Backdoor

In December 2020, the world was told a Russian “Hack” hit U.S. federal networks through SolarWinds.

Wrong.

It wasn’t a foreign op.

It was a white hat takeover of the digital command grid.

Let me show you.

1. What Was SolarWinds?

A Texas-based IT company that pushed software updates to:

  • Pentagon
  • DHS
  • State Department
  • Treasury
  • NSA
  • Big Tech (Microsoft, Cisco)
  • Even Dominion Voting Systems
  • The update included a hidden “Sunburst” backdoor.

What they called a vulnerability…

…was actually a legal foothold.

2. EO 13848 Was Already Active

Trump had already signed Executive Order 13848 in 2018:

Declaring election interference a national emergency.

By 2020, SolarWinds gave federal intel teams lawful access to:

  • Servers
  • Email traffic
  • Internal communications
  • Contract records
  • Voting infrastructure

Under 13848, they didn’t need permission.

They needed access.

SolarWinds was access.

3. What Came Next?

  1. 2021: Microsoft, FireEye, and CISA all “confirm breach”
  2. 2021–2022: Mass resignations in Big Tech, banking, and military
  3. 2022–2023: SCOTUS shadow docket rulings + Roe overturned
  4. 2023–2024: NGO purges, media collapses, asset seizures escalate
  5. 2025: One Big Beautiful Bill → AI firewall codified

You’re watching a multi-year digital sting operation unfold in quarters.

4. SolarWinds + EO 13961 = Continuity Killbox

EO 13961 (Mission Continuity Strategy, Dec 2020):

Federalizes critical mission systems across all agencies.

Now link the pieces:

  • SolarWinds → digital access
  • EO 13848 → legal seizure authority
  • EO 13961 → control continuity
  • 2025 AI Clause → shields enforcement from state interference

This isn’t cleanup. It’s activation.

5. The Real Operation

SolarWinds wasn’t a failure.

It was the launchpad for:

  1. Asset tracing
  2. Intel extraction
  3. Sting AI deployment
  4. Legal lockdown of Deep State infrastructure

Total ops handoff to Continuity teams (Guard/Marines/Coast Guard)

The Great Reset isn’t theirs.

It’s ours.

Bottom Line:

  • SolarWinds was the moment they got the keys.
  • Every laptop seized…
  • Every NGO collapsed…
  • Every offshore trust exposed…
  • It all ties back to December 2020.
  • And now in July 2025, they’ve made it permanent.

New exploit

FileFix can make Windows File Explorer an attack vector

A cybersecurity researcher known as mr.d0x has built FileFix, a variant of the ClickFix social engineering attack that uses the Windows File Explorer address bar to execute malicious commands. The researcher explains that the method could be used by threat actors due to its simplicity and familiarity to users and serves as an example of how phishing attacks can evolve to exploit more user-friendly environments.

Full Story: BleepingComputer (6/24) 

WIFI password

Recovering a WIFI password.

You need to be logged in to get to the password information.

To access the control panel network connections use the ncpa.cpl tool by selecting the Windows +r keys, type in the “ncpa.cpl” and select run.

Ncpa.cpl is a file associated with the Network Connections control panel in Windows, which allows users to manage network adapters and settings.468 It can be accessed by typing “ncpa.cpl” in the Run dialog box (Windows + R) or by navigating to the Control Panel and opening Network Connections.46 The file is safe and should not be considered a threat to your computer.2

The acronym “NCPA” stands for Network Connections Properties and Adapters.3 This tool is particularly useful for network administrators and users who frequently need to adjust network settings.

Right Click the desired Wireless Network connection from the list.

Select Status from the dropdown list.

Select Wireless Properties

On the “Wireless Network Properties” open the Security tab

On the Security tab, select “Show characters”.

Have fun!