Help each other out of non-Webroot technical jams and discuss tech-related stuff in general.
- 4,827 Topics
- 12,318 Replies
Mac users-You are likely familiar with CNET's download.com, a place where many Mac users go to download popular Mac apps. What you may not know, however, is that many of the links to these apps have been replaced with 'CNET Installer', which installs a toolbar containing adware and that changes your browser settings. It looks like this: [img]https://d1qy7qyune0vt1.cloudfront.net/webroot-en/attachment/7029i9F99D0D305D9006F.jpg[/img] (Source: SecureMac) SecureMac posted [url=http://securemac.com/cnet_adware_removal_guide.php]the story[/url], which explains how to avoid downloading this toolbar installer, how to determine if you accidentally installed it, as well as step-by-step instructions on how to remove it from your system on Safari, Chrome, and Firefox. Here is what you will see in Safari if you have the toolbar installed: [img]https://d1qy7qyune0vt1.cloudfront.net/webroot-en/attachment/7033iFC346377DEF287E5.jpg[/img] [img]https://d
[quote][b]Lance Whitney[/b] wrote: [img]http://asset3.cbsistatic.com/cnwk.1d/i/tim2/2013/10/30/laptopsDan01_610x436.jpg[/img] The walking dead notebook market showed some signs of life last quarter. [url=http://press.ihs.com/press-release/design-supply-chain-media/notebook-pc-market-achieves-sequential-growth-q3%E2%80%94-annual-plu]Shipments of mobile PC worldwide reached 47.9 million in the third quarter[/url], a rise of 6 percent from the second quarter, research firm IHS said on Wednesday. That percentage represented the largest sequential gain for the moribund notebook market since a 7 percent rise in the third quarter of 2011. That's the good news. The bad? Notebook shipments continued to plummet on a year-by-year basis. The third quarter results were down 9 percent from the same quarter last year, the fifth consecutive quarterly drop. The decline was also the second worst drop since shipments fell by 14 percent during the previous quarter,
[quote][b]Lynn La[/b] wrote: [img]http://asset2.cbsistatic.com/cnwk.1d/i/tim2/2013/10/28/35831141_-_full_press_closer_610x456.jpg[/img] Not long after LG revealed that it had successfully developed [url=http://news.cnet.com/8301-1035_3-57606615-94/lg-to-launch-flexible-batteries-is-bend-the-new-black/]curved smartphone batteries[/url], the Korean-based company announced the G Flex, a 6-inch quad-core smartphone that features an arched touch screen and rear control buttons. Though US pricing and availability remain unknown, the device will hit Korea in November, with more markets announced afterward. Like the name suggests, the G Flex sports a curved, 0.34-inch-thick construction, partly thanks to its plastic OLED screen. Usually, LG suits up its high-end devices with IPS LCD displays, but the OLED screen is bendable, which lends to the G Flex's vertically bowed design. In addition, the 6-inch HD display has a 1,280x720-pixel resolution. The handset also
[quote][b]Lance Whitney[/b] wrote: All Google+ users will now be able to customize their profile page with a vanity URL, assuming they meet three conditions. [url=https://plus.google.com/+VicGundotra/posts/AUKxL1Sj1WG]Custom URLs are are short and easy to remember Web addresses[/url] that link directly to your Google+ page, Google senior VP of engineering Vic Gundotra said in a Google+ post on Tuesday. As such, they can replace a cumbersome URL with a long string of numbers, such as [url=https://plus.google.com/115229808208707341778]https://plus.google.com/115229808208707341778[/url], with a shorter, snappier URL, such as [url=https://plus.google.com/+youtube/]https://plus.google.com/+youtube/[/url]. [/quote][u][b] Read [url=http://news.cnet.com/8301-1023_3-57609972-93/google-custom-urls-roll-out-for-average-users/]here[/url][/b][/u].
There is a new version of Google Glass on the way for those who have already become part of the 'tester' program. Those who have the original units will have the opportunity to trade up if they desire, and also invite 3 friends to become Glass owners. (For a modest $1500 that is...). "The new Google Glass hardware will work with eyeglasses or shades, and include an ear bud to replace the speaker in the current model. The bone-conduction speaker, which, similar to some hearing aids, literally sends sound waves through the skull to the ear, has been called faulty by some testers. The swap begins Friday and testers will have 60 days to decide if they want new Glass." [url=http://www.cnn.com/2013/10/29/tech/mobile/new-google-glass/index.html?hpt=hp_t2]Full Article[/url] Somehow, I am still not quite sold on it, but I have to admit that the improvements DO make it just a little more interesting to me. A little, not enough to want one quite yet.
Today's National Cyber Security Awareness Month Tip comes in the form of a sobering survey conducted by Marble Security. It turns out that those of us born in the millennial generation, who grew up alongside the internet, are ironically more likely to get hacked...or phished...or socially engineered, despite the common belief that we should be the ones wise enough to avoid these attacks. PCWorld has the [url=http://bit.ly/1bvJ4Ft]report[/url]. "Twenty-six percent of respondents aged 25 to 34 said at least one online account has been hacked. But that doesn't account for those ho have been part of major breaches over the years, or those who have had more than one account compromised. When it comes to those aged 35-44, the percentage drops to 24 percent." The reason 'digital natives' face the risk of getting breached is because we're the ones representing today's workforce, the people who find ourselves in the midst of the BYOD era, who spend more time online (both person
UK Wikipedia editors have expressed "shock and dismay" at the discovery of hundreds of user accounts set up to make paid-for entries. Paid-for advocacy and the adoption of fake "sockpuppet" identities for promotional purposes are against the free web encyclopaedia's policies. Sue Gardner, executive editor of the Wikimedia Foundation, said "as many as several hundred" accounts were suspect. Editors have blocked or banned more than 250 accounts, she added. "Our goal is to provide neutral, reliable information for our readers, and anything that threatens that is a serious problem," said Ms Gardner. "We are actively examining this situation and exploring our options." Wikipedia considers paid-for advocacy a "black hat" practice, she said, that "violates the core principles that have made Wikipedia so valuable for so many people." [url=http://www.bbc.co.uk/news/technology-24613608]Full Story[/url]
[quote][b]Dara Kerr[/b] wrote: [img]http://asset2.cbsistatic.com/cnwk.1d/i/tim2/2013/10/17/Screen_Shot_2013-10-17_at_6.43.39_PM_610x289.png[/img] After weeks of rumors about the specs, price, and release date of the upcoming Nexus 5, it appears that Google's new Nexus Android smartphone is being listed on the [url=https://play.google.com/store/devices/collection/web_home_5000005_nexusUS]Google Play[/url] store. The device appears next to the [url=http://reviews.cnet.com/google-nexus-7/] Nexus 7[/url] and [url=http://reviews.cnet.com/google-nexus-10/] Nexus 10[/url] along with the caption "Capture the everyday and the epic in fresh new ways." Google lists the price as "starting at $349." However, when the link to the smartphone is clicked on -- the new page doesn't load. And not long after the phone appeared, it was replaced by the older [url=http://reviews.cnet.com/lg-nexus-4/] Nexus 4[/url] again. [/quote] [u][b]Read [url=http://news.cnet.com/8301
One sometimes-overlooked security measure, that everyone should be using (particularly if you're using services from the likes of Google and/or Microsoft) is two-factor authentication. Below is a quick overview of how to setup two factor authentication for your Google and Microsoft accounts: [b]1.[/b] [b]Google [/b] [list] [*]After signing into your Google account, click 'Account'. [*]Click 'Security' on the left tan and then click 'Edit' under '2-Step Verification'. This will take you to the '2 Step Verification' settings page. [*]Follow the step-by-step guide as you go through the setup process.[/list]For more details (including how to easily setup two-factor authentication on your Android device, check out this [url=https://support.google.com/accounts/answer/185839?hl=en&ref_topic=1099588]Google support page[/url]) [b]2. Microsoft[/b] You have a Microsoft account if you use services like Skydrive, Outlook.com, Xbox Live, etc...and two-factor authentication i
It's important that you safeguard your Personal Identification Number (PIN). [list=1] [*][b]Don't use your birth date or year[/b] [*][b]Don't use sequential numbers and do not repeat the same number (1234, 1111)[/b] [*][b]Don't use the last four of your SSN[/b] [*][b]Don't use your phone number or address (no relatives either!) [/b] [*][b]DO use a random phrase using the letters associated with numbers[/b][/list][b][img]https://d1qy7qyune0vt1.cloudfront.net/webroot-en/attachment/6921i10CB0DDFF0F98518.jpg[/img] [/b] [b] [/b] [b](Source: aarp.org, cba.ca)[/b]
THE UNITED STATES government shutting down filesharing websites might be a blunt tool that harms individuals more than it helps industry. A report from Northeastern University in Boston first noticed by Torrentfreak found that while there was some copyrighted material on the filesharing websites, there were also a lot of legitimate files. The report found that while there is only what looks like a small amount of legitimate material, it all adds up, and that becomes a particularly bad thing when other content is whipped away by the authorities and perhaps lost forever. The study looked at six websites - Filefactory, Easy-share, Filesonic, Wupload, Megaupload and Undeadlink - and found a mix of content. "In our most conservative scenario, around 4.3 percent of the ?les hosted on Megaupload were detected as legitimate," it said. "We estimate that when Megaupload was forced to shut down, more than 10 million legitimate ?les were taken offline." [url=http://www.theinquirer.net/
[quote][b]Victoria Woollaston[/b] wrote: Facebook may be to blame for turning the word Like into a verb, but Google is set to take this a step further. According to a new patent filed by the internet giant, Google wants its Glass wearers to like brands, products and locations simply by making a heart shape with their hands. A camera on the headmounted device scans and recognises the item being liked and stores its details in a list of favourites, which can then be shared. [img]http://i.dailymail.co.uk/i/pix/2013/10/18/article-2465705-18D1721700000578-175_634x286.jpg[/img] A patent filed in the U.S. shows Google's plans to let its Glass users generate a like by creating a heart shape with their hands in front of real-life objects, pictured. The headmounted device would then scan the item to record that the wearer likes that particular brand, product or location The patent is called 'Hand gestures to signify what is important' and was made public on Wednesday.
Students have a wide array of devices that they take on and off of campus and connect to unsecure Wi-Fi networks and hotspots. OpenDNS found that college networks were 300 percent more likely to contain malware than government organizations or business entities due to the student mobility and their engagement in risky online activities. [i]"It's not that they are a target per se, but they are probably more infected because the students don't have proper protection when they are off the campus."[/i] [i] [/i] [b][url=http://www.webroot.com/us/en/home/products/complete]Protect your devices with Webroot[/url][/b] [b][url=http://www.scmagazine.com/college-networks-hit-with-highest-incidence-of-malware-infections-firm-finds/article/316776/]Full Story[/url][/b] [b] [/b] [b][img]https://d1qy7qyune0vt1.cloudfront.net/webroot-en/attachment/6841iCE9EA845539B5FEA.jpg[/img] [/b] [b](Source: scmagazine.com)[/b]
[b]iOS[/b] Enable data protection by creating a passcode for your iOS device: [list=1] [*]Tap [b]Settings[/b] > [b]General[/b] > [b]Passcode[/b] [*]Follow the prompts to create your passcode [*]Once your code is set, scroll to the bottom of the screen and verify that "[b]Data protection is enabled[/b]" is visible[/list][b][url=http://support.apple.com/kb/HT4175]Apple Support[/url][/b] [b]Android[/b] Android encryption can take hours to complete and will need to be done with a full battery. Keep in mind that you can only reverse encryption by performing a factory reset on your phone. [list=1] [*]Enable your lock screen PIN or password: Open [b]Settings[/b] > tap [b]Security[/b] > tap [b]Screen Lock[/b] > Tap [b]PIN[/b] or [b]Password[/b] [*]Plug in your phone and do not unplug/interrupt the encryption process (you will lose data from your phone) [*]Open [b]Settings[/b] > tap [b]Security[/b] > tap [b]Encrypt phone/tablet[/b] under [
[quote][img]http://news.bbcimg.co.uk/media/images/70513000.jpg/_70513085_70513080.jpg[/img][/quote][quote]The team dropped two 40lb (18kg) sensors into a lake near Buffalo[/quote][quote] [/quote][quote][i]Researchers have tested an "underwater wi-fi" network in a lake in an attempt to make a "deep-sea internet".[/i] [i]The team, from the University of Buffalo, New York, said the technology could help detect tsunamis, offering more reliable warning systems.[/i] [i]They aim to create an agreed standard for underwater communications, to make interaction and data-sharing easier.[/i] [i]Unlike normal wi-fi, which uses radio waves, the submerged network technology utilises sound waves.[/i] [i]Radio waves are able to penetrate water, but with severely limited range and stability. Sound waves provide a better option - as demonstrated by many aquatic species such as whales and dolphins.[/i] [i]Wireless communication underwater has been possible for some time, but the problem lies in gettin
[quote][b]Daniel Terdiman[/b] wrote: [img]http://asset1.cbsistatic.com/cnwk.1d/i/tim2/2013/10/15/iPhone_Email_270x522.png[/img] [i]Square launched a free service Tuesday that lets anyone send money via email to anyone else.[/i] [i]The service, known as [url=https://www.square.com/cash]Square Cash[/url], was previously available only in an [url=http://news.cnet.com/8301-1023_3-57585368-93/square-adds-paypal-like-cash-by-e-mail-feature/]invite-only beta[/url]. For now, at least, it is only available in the United States.[/i] [i]Square Cash doesn't require either person in a transaction to have a Square account, and there are no fees, said product manager Brian Grassadonia. In order to send money, all that's required is for the sender to address an e-mail to the recipient, with a CC: to firstname.lastname@example.org, and the amount in the e-mail's subject line. The body of the email can contain any information the sender wants.[/i] [/quote] [u][b]Read [url=http://news.cne
[quote][b]Lance Whitney[/b] wrote: [img]http://asset3.cbsistatic.com/cnwk.1d/i/tim2/2013/10/16/google-chrome.jpg[/img] [i]Microsoft will cut off support for Windows XP in April 2014, but Google will keep the XP version of Chrome updated for another year.[/i] [i]In a blog posted Wednesday, Mark Larson, director of engineering and superintendent of public safety for Google Chrome, said that [url=http://chrome.blogspot.ca/2013/10/extending-chrome-support-for-xp-users.html]Chrome support for XP users won't end until April 2015[/url]. That means Chrome XP users will continue to receive updates and patches to keep the browser secure. As Larson said, malware often sneaks its way onto computers through holes in unpatched browsers.[/i] [/quote][u][b] Read [url=http://news.cnet.com/8301-1023_3-57607780-93/google-to-support-chrome-for-windows-xp-until-april-2015/]here[/url][/b][/u].
In the console, there is a section to manage keycodes. You can add a keycode, and upgrade/renew an existing one. I don't see an option to remove a keycode, especially an expired one. Yes, one could upgrade/renew that, but what if you have other keycodes listed? It would be nice to be able to tidy it up a bit in those circumstances.
SOFTWARE REDEVELOPER Microsoft has started paying out bug bounties to third parties and has rewarded one chap with $100,000. That's over £60,000 in UK money, and it isn't the only payout made by the firm. James Forshaw from Content Information Security got the $100,000 prize for finding a new exploit called a "mitigation bypass technique". Forshaw also picked up cash for discovering some other software vulnerabilities and was awarded a $5,000 bonus for "finding cool IE design vulnerabilities," giving him a total payout of $109,400. [url=http://www.theinquirer.net/inquirer/news/2299492/microsoft-pays-a-usd100-000-bug-bounty]Full Article[/url]
I read a lot of articles about yesterday's Apple keynote and have stumbled upon [url=http://www.engadget.com/2013/09/10/apples-september-10th-event-roundup-iphone-5s-5c-ios-7/]this great roundup[/url]. Therein are two sections, iPhone and iOS & apps, the both containing links to the main news. BTW, what are your thoughts about the new hardware things in 5S and what do you think about the new 5C? As for myself, [list] [*]5S - except new A7 chip, M7 motion-sensing chip, iOS7 and Touch ID nothing new. It continues in the footsteps of previous "S" models. [*]5C - this model is in fact iPhone 5 dressed up in another body, everything would be fine with this model except price - everybody expected a low cost model thus being able to fight with the middle-priced Android phones but it turned out that it wasn't the case. Time will tell ... [*]iOS7 - I like it, cute and smart, a real improvement[/list]
Over the past four years, cybercrime costs have climbed by an average of 78%, while the time required to recover from a breach has increased 130%. Those findings come from the fourth annual Cost of Cyber Crime Study, conducted by Ponemon Institute and sponsored by HP. Ponemon's researchers studied 234 businesses around the world, located in the United States, Australia, France, Germany, Japan and the United Kingdom. In the United States, the annual cybercrime cost seen by the 60 businesses studied ranged from $1.3 million to more than $58 million and averaged $11.6 million per company -- an increase of $2.6 million from 2012. Meanwhile, the average cost of cleaning up after a single successful -- and serious -- attack was $1 million. "What we call a 'serious attack' is one that doesn't bounce off the firewall," said Larry Ponemon, chairman of the Ponemon Institute, speaking by phone. That's a reference to the fact that businesses are typically hit with numerous attempted -- or nuisa
I mean applications which are not included/bundled in Android OS, it means only those you have installed yourself. OK, I will kick off with mine. [url=https://play.google.com/store/apps/details?id=com.booking]Booking.com[/url] - since I am travelling quite a lot it's an inevitable application for hotel booking [url=https://play.google.com/store/apps/details?id=com.cleanmaster.mguard]Clean Master[/url] - cleans cache, remnant files etc. something like CCleaner for PC [url=https://play.google.com/store/apps/details?id=com.fsck.k9]K-9 Mail[/url] - the famous mail client [url=https://play.google.com/store/apps/details?id=com.mxtech.videoplayer.ad]MX Player[/url] - video and stream player [url=https://play.google.com/store/apps/details?id=com.opera.browser]Opera[/url] - alternative browser, yeah many users hate it but as I use Opera on my PC, it is a logical choice [url=https://play.google.com/store/apps/details?id=com.meecel.feedreader.RssDemonAd]RssDeamon[/url] - RSS feeds r
Already have an account? Login
Login to the community
No account yet? Create an account