Help each other out of non-Webroot technical jams and discuss tech-related stuff in general.
- 4,800 Topics
- 12,153 Replies
Hotmail user swamped with thousands of unwanted emails, after Gmail goes down
If you think you receive a lot of unwanted email each day, spare a thought for Hotmail user David S. Peck of Fresno, California. He’s the owner of an email account that received thousands of unwanted messages, as Gmail went down for a few hours last week. As Sarah Perez from [url=http://techcrunch.com/2014/01/24/gmail-glitch-is-causing-thousands-of-emails-to-be-sent-to-one-mans-hotmail-account/]TechCrunch reported[/url], a bizarre glitch in Google’s search results meant that users hunting for Gmail could find themselves sending an email to Peck’s Hotmail address instead. Clicking on the “Email” link in the Google search results for “Gmail” took Gmail users directly to a compose message form, pre-filled with Peck’s Hotmail address. In time, Google confirmed that the bizarre bug was not related to the [url=http://mashable.com/2014/01/24/gmail-down-012414/]downtime[/url] which affected Gmail and Google Plus on Friday, but the timing seems unfortunate. Especially for David S Peck, who
Hi'ya peeps! I've just got a Kobo Touch e-reader (£30 through the Money Saving Expert website!) and have been trying to connect it to the web but don't know which password to use, there is a password and a passphrase on the router and (as instructed by Virgin help) I've tried putting the passphrase (wireless settings) in but it dosen't accept it; not sure if I should try the password (super hub settings) in case I somehow muck things up. Yet again, any help would be brill. :@
NEW LAPTOP BATTERY?
Hi everyone, My Dell laptop is now needing a new battery but I cannot for the life of me find the info that I need to purchase one. I do have info that I thought would be enough but when I enter these when searching for my particular battery I always get 'no results found' etc. Using the Dell system info I have: battery name GK2X60 manufacturer name LGC-LGC2.2 type LION battery serial number 27782 designed capacity % 36 current charge %
Fastest ever' broadband passes speed test
[b]The "fastest ever" broadband speeds have been achieved in a test in London, raising hopes of more efficient data transfer via existing infrastructure.[/b] Alcatel-Lucent and BT [url=http://www3.alcatel-lucent.com/wps/portal/!ut/p/kcxml/04_Sj9SPykssy0xPLMnMz0vM0Y_QjzKLd4x3tXDUL8h2VAQAURh_Yw!!?LMSG_CABINET=Docs_and_Resource_Ctr&LMSG_CONTENT_FILE=News_Releases_2014/News_Article_002988.xml]said speeds of 1.4 terabits per second were achieved[/url] during their joint test - enough to send 44 uncompressed HD films a second. The test was conducted on a 410km (255-mile) link between the BT Tower in central London and Ipswich. However, it may be many years before consumers notice any effect. But the breakthrough is being seen as highly important for internet service providers (ISPs), as it means a greater amount of information can be sent through existing broadband infrastructure, reducing the need for costly upgrades. "BT and Alcatel-Lucent are making more from what they've got," e
I'm BACK! I wasn't sure where to post a question about my wife didn't have her little green checkmarks, and I did. I went to the Automated Agent at the bottom of the home page, and they not only made several suggestions, but they FIXED the problem. That does bring up a good question, where is the proper place to go with questions?
SWEET!! Hershey's to make 3-D chocolate printer
"3D Systems announced a deal with Hershey's Thursday to collaborate on developing a 3-D printer that makes chocolate and other edible products." "In a statement, 3D Systems said making printers that print chocolate is a good way to help the relatively new technology go mainstream. Hershey sees it as a great delivery system for its products." [url=http://money.cnn.com/2014/01/16/technology/3d-printer-chocolate/index.html]Full Article[/url] As an occaisonal amatuer homemade chocolate maker, I love this idea! I do believe I have finally found a 3D printer that I REALLY crave! :)
interactive services detection
I keep getting a pjijtcutre of a camera and scanner on my bar at the bottom. It says: interactive services detection. No matter how many times I close it, it pops back up. I have run webroot several times on several days. It does not catch anything. The details say: program or device reqesting attention message titile: mirosoft visual C++Runtime Library program path: C:windowssystem32spoolsv.exe recived: today Any ideas what the heck is going on?
CES - What This Year's Show Had to Offer
The massive [url=http://www.cesweb.org/]International CES[/url] trade show in Las Vegas wraps up tomorrow, but most major tech sites have already selected who they think are the big winners in each major tech category. Digital Trends is one such tech site. You can check out their full list of winners [url=http://www.digitaltrends.com/ces/best-of-ces/]here[/url], but I'll also include a few brief highlights based off their selections below. [list] [*]LG seems to be a Digital Trends favorite at CES 2014, taking top honors in their 'Home Theater (Video)' and 'Computing' categories. DT were particularly impressed with the company's 77-inch curved OLED TV, calling it 'simply the most awesome TV we've ever seen'. Likewise, the LG Ultra PC took top honors in the 'Computing' category thanks to its ultra-slim profile, light weight, and 1080p IPS display, among other features. [*]While there were many smartphone announcements, none were from the major players like Samsung, HTC, or Moto
10 'Security' Resolutions for the New Year
2014 is upon us! As we said goodbye to 2013, we posted our top security predictions for the new year on our Threat Blog (you can [url=http://www.webroot.com/blog/2013/12/31/top-consumer-security-predictions-for-2014/]read them[/url] here in case you missed it). These predictions, coupled with all the [url=http://www.webroot.com/blog/2013/12/27/cybercrime-trends-2013-year-review/]new malware trends[/url] we saw in 2013, can only mean one thing for the average user - you need to make security a top priority in 2014...Here are 10 security resolutions to follow through on this year. Cheers! [img]https://d1qy7qyune0vt1.cloudfront.net/webroot-en/attachment/7861iD8F90268BF3E9C1D.jpg[/img] (Source: PCMag) [list] [*][b]Create stronger passwords.[/b] Last October's [url=https://community.webroot.com/t5/Security-Industry-News/Adobe-Hacked-Credit-card-information-potentially-exposed/m-p/59117#M2309]massive Adobe breach[/url] reiterated why your password should never be som
Uninstalling solution.. worked for me!
I've noticed some other people have had problems with uninstalling webroot. In my case, it kept telling me I couldn't uninstall because it was still running. My unconventional but effective solution was to change the file type (from the applications folder, add .jpg to the app name). It told me I didn't have permission to change the name, and then asked me if I wanted to uninstall it. It worked for me after a long time of mucking around trying to find a solution, so if this helps anyone else - you're welcome!
Royal pardon for codebreaker Alan Turing
[b]Computer pioneer and codebreaker Alan Turing has been given a posthumous royal pardon.[/b] It addresses his 1952 conviction for homosexuality for which he was punished by being chemically castrated. The conviction meant he lost his security clearance and had to stop the code-cracking work that had proved vital to the Allies in World War Two. The pardon was granted under the Royal Prerogative of Mercy after a request by Justice Minister Chris Grayling. [b]'Appalling' treatment[/b] "Dr Alan Turing was an exceptional man with a brilliant mind," said Mr Grayling. He said the research Turing carried out during the war at Bletchley Park undoubtedly shortened the conflict and saved thousands of lives. Turing's work helped accelerate Allied efforts to read German Naval messages enciphered with the Enigma machine. He also contributed some more fundamental work on codebreaking that was only released to [url=http://www.bbc.co.uk/news/technology-17771962]public scrutiny in April 2012.[/
Google Transparency Report: Government Records Removal Requests
From: [url=http://www.telegraph.co.uk/technology/google/10529900/Google-reveals-spike-in-government-removal-requests.html]www.telegraph.co.uk/technology/google/10529900/Google-reveals-spike-in-government-removal-requests.html[/url] [i]The number of government requests to remove content from Google's services has grown dramatically in the last year, according to Google's latest [url=http://www.google.com/transparencyreport/removals/government/]Transparency Report[/url].[/i] [i]Google received 3,846 government requests to remove 24,737 pieces of content between January and June 2013 – a 68 percent increase over the second half of 2012.[/i] [i]The company singled out two countries as being particularly zealous in their removal requests during the first half of the year – Turkey and Russia.[/i] [i]Google received 1,673 requests from Turkish authorities to remove content from its platforms during the period, nearly a tenfold increase over the second half of last year. About
Was 2013 the Run-Up to Nineteen Eighty-Four?
[i]Nineteen Eighty-Four may be three decades late, but it appears to be around the corner. The only question is whether the U.S. government or Google will be Big Brother -- and which would be worse. The NSA wants all our data, but it doesn't seem capable of crunching it. Google is more competent, but that could make it scarier, as it appears to be taking us toward a Terminator future.[/i] As we approach the end of the year, it is time to look back on 2013 and consider what we've learned about technology and human nature. Both Apple and Dell were massively changed; HP, Yahoo and other companies were in various stages of being turned around; and Google went from a company that wanted our private information to one that wanted our jobs. The U.S. government decided, through the NSA, that laws don't apply to it. Those who brought this to our attention (Manning and Snowden) got bigger punishments than the folks in government breaking the law. In 2013, the U.S. government became the least p
How not to get hacked
Hello everyone! This is pretty much all basic material, and a lot of us have it seen before, but it is alway a good idea to take a quick 'refresher course'. Remember, it may be the season of giving for most of us, but it is also the season in which there are others who work very hard at taking! To those with lesser amounts of computer and internet experience, there are some good tips here! [url=http://money.cnn.com/gallery/technology/2013/12/05/password-hack/index.html]Full Article[/url] Among other tips, this article covers: [list] [*]Safe online surfing habits [*]Passwords [*]What to do if you HAVE been hacked[/list]
Samsung or Dell
Hi Guys, I'm going to buy a new notebook, probably just before Christmasmm, and I must admit I have some doubts about the final choice. I am considering the purchase either [b]Samsung Ativ Book 8[/b] ([url=http://www.notebookcheck.net/Review-Samsung-ATIV-Book-8-Touch-880Z5E-X01-Notebook.102303.0.html)or]http://www.notebookcheck.net/Review-Samsung-ATIV-Book-8-Touch-880Z5E-X01-Notebook.102303.0.html) [/url]or [b]Dell Inspiron 7537 [/b]([url=http://www.notebookcheck.net/Review-Dell-Inspiron-15-7537-Notebook.104976.0.html).]http://www.notebookcheck.net/Review-Dell-Inspiron-15-7537-Notebook.104976.0.html).[/url] Both have a 15"6 Touch Full HD screen and 8 GB memory. The main differences: CPU - Dell has i7 Haswell, while Samsung has got i7 IvyBridge Graphics - Dell with NVIDIA GeForce GT 750M 2GB and Samsung with AMD Radeon HD 8870M 2GB. Choosing Dell I have better opportunities to set up configuration and there is also SSD Hard Drive, which makes the performance increased. Choosing Samsung
Silk Road 2.0 busted! At least two arrests as federal crackdown begins
If drugs traffickers thought the anonymous online black market calling itself Silk Road 2.0 would be any safer from law enforcement than the original, it looks like they had better think again. According to reports by Forbes and TechCrunch, the FBI have made "multiple arrests" of people believed to be involved with Silk Road 2.0 in a crackdown spanning at least two countries. Silk Road 2.0 forum moderators going by the handles "Inigo" and "Libertas" were reportedly arrested in Virginia and Wicklow, Ireland, respectively. A woman identified as the girlfriend of Inigo reportedly said that police told her that they were making simultaneous arrests of the site's users "all around the world." The FBI has since confirmed to Forbes that it had moved against the encrypted marketplace, but it did not disclose the names of any of the people cuffed, or how many arrests had been made in all. US authorities [url=http://www.theregister.co.uk/2013/10/02/silk_road_shutdown/]shut down[/url] the or
How Long Can Cloud Servers Hold Off Hackers? Not as Long as You Think
How long would it take to hack into an average Web-based server—the kind a company might rent from the likes of Amazon Web Services? To find out, the security company CloudPassage set up six servers, two running Microsoft operating systems and four running Linux-based operating systems, loaded them with various combinations of widely used programs, and invited hackers to take their best shot. Top prize: $5,000. It took just four hours for the winning hacker to captured the flag and the bounty. Worse still, he was a novice. Gus Gray, 28, has worked for a technology company for a little over a year and is taking classes toward a bachelor’s degree in computer science at California Polytechnic State University in San Luis Obispo. “I just thought I’d spend two or three hours poking around and see what I could learn, and it would make for an interesting evening,” he says. That’s one way to put it. As companies shift from old-fashioned and expensive servers managed within four walls to cloud
What can you buy with your Bitcoins?
We have had a few posts and discussions about BitCoins in the Community over the last several months. Today I see another interesting article that shows it is truly amazing how these things are being used. " A Florida man bought a Tesla Model S from a Lamborghini dealership in Newport Beach, Calif., this week. It was the first time the dealer had accepted Bitcoin, it said. "That's right, an electronic currency was used to purchase a fully electric vehicle," the dealer's blog stated. The buyer, who wishes to remain anonymous, bought the top-of-the-line Tesla for $103,000, which was equivalent to 91.4 Bitcoins on Tuesday, the day of the sale, said Cedric Davy, marketing director at the dealership. " [url=http://money.cnn.com/2013/12/06/autos/tesla-bitcoin/index.html?hpt=hp_t3]Full Article[/url] If you want to try it now, just a few days later, you better be prepared to pay more: evidently the BitCoin took a sharp drop in value Fri
Good guys should compete with criminals in buying zero-day vulnerabilities, report says
An effective way to significantly improve software security is to compete head-to-head with the black market for previously unknown vulnerabilities, a security research company says. In an analysis released Tuesday, NSS Labs recommended the formation of an international vulnerability purchase program (IVPP) that would pay competitive prices for so-called zero-day vulnerabilities sold to brokers, subscription services and hackers. From 60 percent to 80 percent of the vulnerabilities today are reported to software vendors for free by security experts more interested in protecting users than profiting off the flaws, NSS says. The remaining vulnerabilities are purchased by vendors or end up on the black market, where cybercriminals can easily buy them. By having a centralized vulnerability purchasing program, "we would get lots of researchers to investigate vulnerabilities," Stefan Frei, NSS Labs research director and co-author of the report, said. In addition, a clear message would be sen
Just purchased a 3 device package from Newegg today & got the download link thru an email with the keycode in the message. My problem is the keycodes first digits are block with asterics (encrypted ?) & only the last 4 are showing. I tried using the last 4 & also copying & pasting the whole line of code but nothing works. HELP Fred
How to fix broken Windows (Microsoft, not the glass kind)
Windows is a pretty customizable operating system, which also means that it's really easy to mess things up if you're not careful. Fortunately, PCWorld has just the [url=http://www.pcworld.com/article/2060365/when-windows-breaks-how-to-fix-it-piece-by-piece.html]article[/url] for you if, say, you let that tinkering freedom get to your head and messed up the registry or 'toolbared' IE to the [seeming] point of no return (just two of the numerous tips in the article). 1. Refresh and Reset-Let's jump straight into the extreme scenario, Windows 8-style. If you've gotten to a truly OS-desperate state, Windows 8 offers 'resfresh and reset' options that work to restore main Windows parts back to their native states. But they are not the same. 'Refresh' doesn't touch your personal files, but rather wipes everything else (i.e settings, apps, etc.) and replaces them with the stock settings and apps that you first got with your PC. 'Reset', on the other hand, is truly the 'last resort' op
Already have an account? Login
Login to the community
No account yet? Create an account
Enter your username or e-mail address. We'll send you an e-mail with instructions to reset your password.