Help each other out of non-Webroot technical jams and discuss tech-related stuff in general.
- 4,836 Topics
- 12,340 Replies
From: [url=http://www.telegraph.co.uk/technology/google/10529900/Google-reveals-spike-in-government-removal-requests.html]www.telegraph.co.uk/technology/google/10529900/Google-reveals-spike-in-government-removal-requests.html[/url] [i]The number of government requests to remove content from Google's services has grown dramatically in the last year, according to Google's latest [url=http://www.google.com/transparencyreport/removals/government/]Transparency Report[/url].[/i] [i]Google received 3,846 government requests to remove 24,737 pieces of content between January and June 2013 – a 68 percent increase over the second half of 2012.[/i] [i]The company singled out two countries as being particularly zealous in their removal requests during the first half of the year – Turkey and Russia.[/i] [i]Google received 1,673 requests from Turkish authorities to remove content from its platforms during the period, nearly a tenfold increase over the second half of last year. About
[i]Nineteen Eighty-Four may be three decades late, but it appears to be around the corner. The only question is whether the U.S. government or Google will be Big Brother -- and which would be worse. The NSA wants all our data, but it doesn't seem capable of crunching it. Google is more competent, but that could make it scarier, as it appears to be taking us toward a Terminator future.[/i] As we approach the end of the year, it is time to look back on 2013 and consider what we've learned about technology and human nature. Both Apple and Dell were massively changed; HP, Yahoo and other companies were in various stages of being turned around; and Google went from a company that wanted our private information to one that wanted our jobs. The U.S. government decided, through the NSA, that laws don't apply to it. Those who brought this to our attention (Manning and Snowden) got bigger punishments than the folks in government breaking the law. In 2013, the U.S. government became the least p
Hello everyone! This is pretty much all basic material, and a lot of us have it seen before, but it is alway a good idea to take a quick 'refresher course'. Remember, it may be the season of giving for most of us, but it is also the season in which there are others who work very hard at taking! To those with lesser amounts of computer and internet experience, there are some good tips here! [url=http://money.cnn.com/gallery/technology/2013/12/05/password-hack/index.html]Full Article[/url] Among other tips, this article covers: [list] [*]Safe online surfing habits [*]Passwords [*]What to do if you HAVE been hacked[/list]
Hi Guys, I'm going to buy a new notebook, probably just before Christmasmm, and I must admit I have some doubts about the final choice. I am considering the purchase either [b]Samsung Ativ Book 8[/b] ([url=http://www.notebookcheck.net/Review-Samsung-ATIV-Book-8-Touch-880Z5E-X01-Notebook.102303.0.html)or]http://www.notebookcheck.net/Review-Samsung-ATIV-Book-8-Touch-880Z5E-X01-Notebook.102303.0.html) [/url]or [b]Dell Inspiron 7537 [/b]([url=http://www.notebookcheck.net/Review-Dell-Inspiron-15-7537-Notebook.104976.0.html).]http://www.notebookcheck.net/Review-Dell-Inspiron-15-7537-Notebook.104976.0.html).[/url] Both have a 15"6 Touch Full HD screen and 8 GB memory. The main differences: CPU - Dell has i7 Haswell, while Samsung has got i7 IvyBridge Graphics - Dell with NVIDIA GeForce GT 750M 2GB and Samsung with AMD Radeon HD 8870M 2GB. Choosing Dell I have better opportunities to set up configuration and there is also SSD Hard Drive, which makes the performance increased. Choosing Samsung
If drugs traffickers thought the anonymous online black market calling itself Silk Road 2.0 would be any safer from law enforcement than the original, it looks like they had better think again. According to reports by Forbes and TechCrunch, the FBI have made "multiple arrests" of people believed to be involved with Silk Road 2.0 in a crackdown spanning at least two countries. Silk Road 2.0 forum moderators going by the handles "Inigo" and "Libertas" were reportedly arrested in Virginia and Wicklow, Ireland, respectively. A woman identified as the girlfriend of Inigo reportedly said that police told her that they were making simultaneous arrests of the site's users "all around the world." The FBI has since confirmed to Forbes that it had moved against the encrypted marketplace, but it did not disclose the names of any of the people cuffed, or how many arrests had been made in all. US authorities [url=http://www.theregister.co.uk/2013/10/02/silk_road_shutdown/]shut down[/url] the or
How long would it take to hack into an average Web-based server—the kind a company might rent from the likes of Amazon Web Services? To find out, the security company CloudPassage set up six servers, two running Microsoft operating systems and four running Linux-based operating systems, loaded them with various combinations of widely used programs, and invited hackers to take their best shot. Top prize: $5,000. It took just four hours for the winning hacker to captured the flag and the bounty. Worse still, he was a novice. Gus Gray, 28, has worked for a technology company for a little over a year and is taking classes toward a bachelor’s degree in computer science at California Polytechnic State University in San Luis Obispo. “I just thought I’d spend two or three hours poking around and see what I could learn, and it would make for an interesting evening,” he says. That’s one way to put it. As companies shift from old-fashioned and expensive servers managed within four walls to cloud
We have had a few posts and discussions about BitCoins in the Community over the last several months. Today I see another interesting article that shows it is truly amazing how these things are being used. " A Florida man bought a Tesla Model S from a Lamborghini dealership in Newport Beach, Calif., this week. It was the first time the dealer had accepted Bitcoin, it said. "That's right, an electronic currency was used to purchase a fully electric vehicle," the dealer's blog stated. The buyer, who wishes to remain anonymous, bought the top-of-the-line Tesla for $103,000, which was equivalent to 91.4 Bitcoins on Tuesday, the day of the sale, said Cedric Davy, marketing director at the dealership. " [url=http://money.cnn.com/2013/12/06/autos/tesla-bitcoin/index.html?hpt=hp_t3]Full Article[/url] If you want to try it now, just a few days later, you better be prepared to pay more: evidently the BitCoin took a sharp drop in value Fri
An effective way to significantly improve software security is to compete head-to-head with the black market for previously unknown vulnerabilities, a security research company says. In an analysis released Tuesday, NSS Labs recommended the formation of an international vulnerability purchase program (IVPP) that would pay competitive prices for so-called zero-day vulnerabilities sold to brokers, subscription services and hackers. From 60 percent to 80 percent of the vulnerabilities today are reported to software vendors for free by security experts more interested in protecting users than profiting off the flaws, NSS says. The remaining vulnerabilities are purchased by vendors or end up on the black market, where cybercriminals can easily buy them. By having a centralized vulnerability purchasing program, "we would get lots of researchers to investigate vulnerabilities," Stefan Frei, NSS Labs research director and co-author of the report, said. In addition, a clear message would be sen
Just purchased a 3 device package from Newegg today & got the download link thru an email with the keycode in the message. My problem is the keycodes first digits are block with asterics (encrypted ?) & only the last 4 are showing. I tried using the last 4 & also copying & pasting the whole line of code but nothing works. HELP Fred
Windows is a pretty customizable operating system, which also means that it's really easy to mess things up if you're not careful. Fortunately, PCWorld has just the [url=http://www.pcworld.com/article/2060365/when-windows-breaks-how-to-fix-it-piece-by-piece.html]article[/url] for you if, say, you let that tinkering freedom get to your head and messed up the registry or 'toolbared' IE to the [seeming] point of no return (just two of the numerous tips in the article). 1. Refresh and Reset-Let's jump straight into the extreme scenario, Windows 8-style. If you've gotten to a truly OS-desperate state, Windows 8 offers 'resfresh and reset' options that work to restore main Windows parts back to their native states. But they are not the same. 'Refresh' doesn't touch your personal files, but rather wipes everything else (i.e settings, apps, etc.) and replaces them with the stock settings and apps that you first got with your PC. 'Reset', on the other hand, is truly the 'last resort' op
Technology start-up Knightscope last week debuted a prototype security robot that looks a lot like a Dalek (of [i]Doctor Who[/i] infamy.) The K5 Autonomous Data Machine stands five feet high, rolls around on wheels, can sense a variety of potential security threats through an array of sensors, and can instantly notify the police in the event of an emergency. It was shown at the Plug and Play Winter Expo this week, gaining a top-three mention from a panel of 101 Silicon Valley judges. The K5 was noted for its imposing yet “friendly” presence. (It does not nor has it ever, to our knowledge, uttered the word “Exterminate.”) Its abilities and assets include optical character recognition, 360-degree video capture, thermal imaging, microphones for high-quality audio, air quality sensors for detecting chemical and biological threats, an ultrasonic sensor, infrared sensor, radar, and lidar for 3D mapping. Together these sensors allow it to move along a human-set course during normal pat
Hi everyone, I am running Norton along with Webroot and thought I would post on how I have the configurations set up so that the realtime protections don't both try to quarantine the same file. Usually, Webroot steps aside if Norton detects a threat using it's resident signatures during download, and Norton quarantines it, but sometimes, Norton doesn't detect a threat using resident signatures and instead uses it's cloud signature "WS.Reputation.1". When Norton uses a cloud signature as opposed to a resident signature, it doesn't scan the file and attempt to remove it until after the download is complete, so Webroot thinks "Okay, it's my turn" and also runs the file through it's own cloud. The only problem here is that Norton is also performing it's cloud lookup at the same time, and when they both detect a threat via the cloud, they both try to remove it. I see in the Webroot and Norton quarantines that both say that they removed the file, when in reality only one of them could
I have had a significant amount of problems getting Trojan horses, foreign ISPs and having over 20,000 corrupted program files. It even got through BitDefender. So I got Webroot. This cleaned up all of my problems. However, 3 days after the problems are solved, I have another virus that is impacting my Outlook. So I uninstalled Webroot and reloaded on my PC. But the scan took less than 2 minutes. Hardy enough time to remove the virus and surely what happened before. Why can I not get a complete scan with Webroot???
I think I have a virus, but the Webroot scan is not detecting anything. At least once a day, my laptop becomes possessed and does things like begins typing in all caps, highlights text, launches new internet pages in a separate window, etc. Does that sound like a virus? (My laptop did tip over once and took a tiny spill, so not sure if that could be the cause.) Please help. Thank you.
Here is a question for our members. If you sandbox your browser your completely safe and don't need a antivirus software. We are all well aware that numerous antivirus software's have sandbox feature incorporated within its app. So based on this premise you should be able to surf the web..............Download apps in the sandbox and when your done, simply empty the sandbox and no harm is done to your PC......................Right???? or wrong?????????????? Conclusion: Need input on this issue pro's and cons;)
Here are some solutions via my MVP channels. Something happened with the download and you need to reset Resolution: [url=http://blogs.technet.com/b/ouc1too/archive/2013/10/25/something-happened-in-the-install-of-windows-8-1-can-t-be-completed-and-now-you-re-annoyed.aspx]http://blogs.technet.com/b/ouc1too/archive/2013/10/25/something-happened-in-the-install-of-windows-8-1-can-t-be-completed-and-now-you-re-annoyed.aspx[/url] Can't move your user folders Resolution Now blocked from the 8.1 [url=http://answers.microsoft.com/en-us/windows/forum/windows8_1-windows_install/sorry-it-looks-like-this-pc-cant-run-windows-81/84310e8a-edd3-48d7-af31-0b09666b0c74]http://answers.microsoft.com/en-us/windows/forum/windows8_1-windows_install/sorry-it-looks-like-this-pc-cant-run-windows-81/84310e8a-edd3-48d7-af31-0b09666b0c74[/url] Biggest views: [url=http://answers.microsoft.com/en-us/windows/forum/windows8_1-windows_install/couldnt-update-to-windows-81-0xc1900101-0x40017/e1ee316f-f912-43ef-92
[img]https://d1qy7qyune0vt1.cloudfront.net/webroot-en/attachment/7463i147FDC320C8E7B2F.jpg[/img] (source: compurocketusa/BusinessGhana) [b]Internet crooks use personal information to guess your passwords or use them for password resets. [/b] [b]Many of the common security questions (mother's maiden name, where you were born, name of your high school mascott, etc.) are already on your social networks and are publicly available. [/b] [b]It is in your best interest to keep your personal information and loved one's (including relatives and pets) names off of the internet and off of public areas. [/b] [url=http://www.businessghana.com/portal/news/index.php?op=getNews&news_cat_id=1&id=193165][b]Full Article[/b][/url]
If you don't know of Mavis Batey, you should. Her work cracking the Enigma machine's coded messages was crucial to the success of D-Day landings during WWII. Cracking one of the most complicated cipher devices ever created -- the Enigma machine -- may not have been what Britain's Mavis Batey envisioned when she studied the German romantic poets at University College London when World War II broke out. But when she dropped out of school to help with the war effort by becoming a nurse, her German-language skills caught the attention of her superiors, and soon she was asked to train for a more covert kind of duty. "So I thought, great," Batey recalled to The Daily Telegraph in an interview before her death this week at age 92. "This is going to be an interesting job, Mata Hari, seducing Prussian officers. But I don't think either my legs or my German were good enough because they sent me to the Government Code & Cipher School." [url=http://news.cnet.com/8301-1009_3-57612488-
[img]https://d1qy7qyune0vt1.cloudfront.net/webroot-en/attachment/2606i0E23BE5680D25528.png[/img] [url=http://www.webroot.com/En_US/index.html]Webroot[/url], a leader in delivering Internet security as a service, today announced the availability of Webroot® SecureAnyNose tailored toward end users and enterprise customers looking to increase protection within their physical environment. This innovative collection of individual thin cloth strips easily integrate into any environment, providing complete protection from rapidly evolving airborne viruses, malware, and spyware, all built upon the same technology found in other Webroot’s product lineup. Due to the rapidly evolving nature of the threat landscape, individuals and companies need to consistently innovate and adapt in order to help protect themselves and those around from the latest threats. The Webroot SecureAnyNose package, powered by the Webroot Intelligence Network, the world’s most comprehensive cloud-based securi