Help each other out of non-Webroot technical jams and discuss tech-related stuff in general.
- 4,633 Topics
- 11,599 Replies
Alright Webroot Community, I need your help. I'm buying a new TV and I have to admit, it's been awhile since I've shopped for one. Jim even made fun of me when I said, "Since when do TVs have 3D?!?" So that being said, I'd love your advice. What are some "must have" features? What should I stay away from? [b]What I know I want: [/b] LED - Flat screen Moderately priced 1080p vertical resolution 120 Hz refresh rate [b]What I know I DON'T need:[/b] 3D (seriously...3D?) [b]What I don't know if I need:[/b] "Smart TV" - I do love the idea of internet cable vs regular cable though... PC input vs. USB port DVI imports Brand Any advice?
Samsung unveiled its Galaxy S3 smartphone earlier today...How cool is it? Check out this [url=http://www.digitalspy.com/tech/news/a379900/samsung-galaxy-s3-smartphone-unveiled.html]one[/url] (of many) articles and post what you think. I, personally, have a love-hate relationship with smartphones. On the one hand, I am intrigued by new releases. With their ever-more-sleek designs, abundance of new features, and polished operating systems, major mobile phone (can I even call it that anymore?) manufacturers usually do a good job of impressing (and convincing) consumers to dish out hundreds of dollars for their latest and greatest. On the other hand, however, few smartphones actually live up to the hype. As features turn out less cool than originally marketed and operating systems prove to be laggy and sluggish, your once super-fast-top-of-the-line smartphone gets lost and forgotten amongst a sea of other smartphones with comparable features and cosmetics. But to me, the most frustrati
Hey Guys, I just stumbled upon a fairly cool article on Yahoo about (see title), so I thought I'd share it: [url=http://news.yahoo.com/ridiculously-automated-dorm-room-draws-official-school-inquiry-170317304.html]Sweet Dorm Room![/url] Just in case you don't feel like reading much, here's your brief synopsis... Armed with a Mac Book Air, iPad, iPhone, and about $200 worth of store-bought electronic equipment, Cal Berkeley Freshman Derek Low decked out his dorm room to cater towards today's technology standards (modestly speaking). Dubbed "BRAD" (Berkeley Ridiculously Automated Dorm), the room features an array of futuristic amenities such as automatic window shades, voice-activated lights (which can be set to different modes like "sleep", "homework" and "romantic"), and an "emergency party button", which I am sure is the college crowd pleaser. And BRAD's idea of an alarm combines drawing back the curtains and turning on the ligh
This is very much a myth. Some security suites crow about blocking WiFi Intruders and tout this as a critical function. In reality, not only is it Mostly Useless™, but it can have some seriously bad unintended side effects. A WiFi Intruder is a device connected to your private Wireless network without your permission. While it SOUNDS scary, and actually is dangerous, there are a lot of things to consider before taking action. First and most important, the chances of having an intruder when your router is properly secured are next to none. Open WiFi or WEP encryption do not count as “properly secured” and WPA is not quite as good as WPA2. With WPA2 encryption, somebody would need to work very hard to get into your network and would need to really know what they’re doing. It’s not an easy (and often not even possible) process. If they know how to do that, nothing but shutting down your computer will help. But you’re also more
Starcraft players will find Google's new easter egg quite amusing. Zerg Rush is also a term used in rooting an Android. I actually used Zerg Rush myself when rooting my Samsung Conquer. I love Google's easter eggs. I only know of a few others though. Has anybody seen any other ones?
[b][u]Is the internet being shut off on July 9th?[/u][/b] Recently you may have seen some well-meaning but somewhat ill-informed gossip circulating online that the FBI is going to shut off the internet on July 9th. While there is a nugget of truth in that rumor, it's mostly incorrect. Here is what's actually true: Way back in ye olden days of the year 2007 when we were all still using IE7 and Firefox 2, there was some malware called DNSChanger. It worked by hijacking your DNS settings (the system that changes *insert any http:// web address here* into an IP address behind the scenes and allows you to get around online). Instead of going where you intended to go, you would be redirected someplace else entirely. In this case, when you tried to go to a website to buy something legitimate, it would redirect you to a similarly-themed but fraudulent website where you would essentially be robbed. This illegal scheme was quite lucrative for the malware wr
[b]As the mobile device industry continues to boom, we should all take a moment to make sure our devices and personal information are secured from threats.[/b] Here are some basic steps to get you started: [b]Smartphones need to be updated when security fixes are developed[/b]. Though basic phones generally don’t get updated, smartphones are essentially computers and they may need updates. While some updates simply provide you with cooler functionality and upgraded features, others fix critical security vulnerabilities that you do not want to be exposed to. Your service provider should notify you whenever an update is available; ignore these at your own peril. [b]Security software is a must for smartphone users.[/b] The mobile malware market is booming -and because few users protect these devices they are particularly attractive to hackers and cybercriminals. The fixes phone manufacturers make to their operating systems do not protect you from other types of m
[b]Back up everything on any device you intend to bring[/b] Laptops aren’t the only data-rich devices we carry around anymore. Increasingly, we’re carrying sensitive data on our MP3 players, portable hard drives and thumbdrives, and smartphones (and the tiny memory cards inside of them), simply because it’s convenient to do so. Don’t wait until disaster strikes and you realize you’ve left your iPhone in a taxi in another state (or worse, another country). [url=http://www.webroot.com/En_US/consumer-products-secureanywhere-complete.html]Back up everything[/url], as if you might never see the device again, before you hit the road. You should also password protect your devices. If you have a laptop, set up a login to access your desktop. If you have a mobile device, set up your access code. It may also be a good idea to install an app that [url=http://www.webroot.com/En_US/consumer-products-mobile-security-android-phone.html]remotely wipes[/url] your data—just in case
[b]Set up automatic bill-pay for your regular bills before you leave[/b] Being able to pay all of your bills online may leave you complacent about doing so in a public place, but you really shouldn’t be logging into your bank and cutting electronic checks for your utility bills while you’re on the road. Most banks offer free automatic bill payment services. Take advantage of them if they’re available, so you don’t miss a monthly charge. If, for some reason, you can’t set up automatic bill payment, try paying off your bills just before you leave, or pay more than the monthly total if you’ll still be travelling during the end of your next billing cycle. If you must pay a bill online while you’re on vacation, create a temporary password and change it as soon as you return home. ([url=http://community.webroot.com/t5/Rumors-and-Myths/Fact-or-Myth-quot-My-password-is-fine-and-doesn-t-need-to-change/m-p/524/highlight/true#M12]Click here for help with passwords[/url])
[b]Myth![/b] It may seem fun to brag to friends and acquaintances on social networks about your upcoming trip to a beach-party paradise, but you might want to resist the temptation to call too much attention to the fact that you’re leaving behind an empty, unattended apartment or house for weeks at a time. Burglars have already begun to turn to Facebook and Twitter to find homes that may be vacant during a holiday absence. Don’t make their job any easier for them by giving them your travel itinerary. Of course, if you feel compelled to post vacation snaps on the road, modify your privacy settings so only your closest friends see those notifications. At least then you’ll have a starting point for the police when they begin investigating the burglary of your home. And speaking of social networks, it’s a best practice to copy and paste links instead of clicking on social sharing icons while you’re on vacation. Using these icons opens the risk of [url=http://blog.webro
It can be tempting to take advantage of free WiFi access points in airports, hotels, or in cafes, but resist the urge to use those connections to do anything other than browse for a map or train schedule. Unsecured wireless connections — such as the open ones that some businesses provide as a service — can also leave you vulnerable to wireless snooping of your logins, email messages, or instant messages by other travelers or guests. The same can be said for untrusted computers in hotel business centers or cybercafés, which are magnets for data-stealing malware. If the connection doesn’t ask you to provide a WPA key, assume the connection is not secure, and treat it as such. If you must use a free wireless connection, turn off any programs that automatically connect to the Internet (such as email clients or file-sharing tools) before you hook up, and try to access sites by typing “https” at the beginning of the URL. Lastly, please don’t use the untrustworthy PC in t
This subject was inspired by a [url=http://community.webroot.com/t5/Security-Industry-News/New-scam-going-around/m-p/2312#M54]recent conversation[/url] here on the community about fake DHL emails that lead to scams. So, what exactly is phishing? Phishing is a type of online scam where criminals send an email that appears to be from a legitimate company asking you to provide sensitive information. This is usually done by including a link that supposedly takes you to the company’s website where you are asked to fill in your information – but the website is a clever fake and the information you provide goes straight to the crooks behind the scam. The term ‘phishing’ is a pun on the word fishing because criminals are dangling a fake ‘lure’ (the email that looks legitimate, as well as the website that looks legitimate) hoping users will ‘bite’ by providing the information the criminals have requested – such as credit card numbers, account numbers, passwords, user names,
Today's work environment demands at least a basic understanding of computer skills ([url=Read the fact sheet on digital literacy here: http://www.digitalliteracy.gov/sites/digitalliteracy.gov/files/Digital_Literacy_Fact_Sheet_051311.pdf]check out this fact sheet[/url]). And it's never too late to learn these skills, no matter what age you are. If you or someone you know would like to learn the basics of digital literacy - right down to the mouse click - there is a great place to start. [url=http://www.digitalliteracy.gov/content/learner]DigitalLiteracy.gov[/url] is collaboration of government and other entities that aim to "enhance the tools necessary to learn computer and Internet skills needed in today’s global work environment." Among the many tools available, you can also find [url=http://www.digitalliteracy.gov/content/workforce]job resources[/url] and even an [url=http://tech.tln.lib.mi.us/tutor/]online user tutorial[/url] to walk you throug
Just an interesting article, I am not really for or against, just an interesting concept. As with all tech, it may go no where or it might actually gain some traction. If it does gain traction, the need for Security will be higher than ever! [url=http://money.cnn.com/2012/02/28/technology/boot_to_gecko/index.htm]http://money.cnn.com/2012/02/28/technology/boot_to_gecko/index.htm[/url] -Keith
Anyone know how to get rid of the search browser hijacker? It is search-milk.net. I downloaded Webroot Anywhere 2012 last week, but I can't get it to find it...wondering if it I need an additional program from Webroot? The reading I have done thus far, has said this is a bad malware/spyware program. Help.
[b]Fact![/b] According to our partners at the Juniper Networks Mobile Threat Center, there was a 3,325 percent jump in malware targeting the Android platform over the last 7 months. To find out where the majority of malicious apps were found and which malware type was the most popular, read the full story from the Webroot Threat Blog. [url=http://blog.webroot.com/2012/02/17/report-3325-increase-in-malware-targeting-the-android-os/]>> Read More[/url]
Online browsing and social media sites [url=http://www.pewinternet.org/Reports/2010/Reputation-Management.aspx]play a central role[/url] in building your identity online. This means that kids are especially susceptible to publishing regrettable content online. If you have a teen who is active online, here are some way to keep them from crossing over to the proverbial Dark Side: [b][u]Teach them that they are searchable online[/u] [/b]The Pew Internet Project found that “two thirds of online teens are content creators–meaning they create videos, post photos, write blogs and message boards." While these activities serve as a way to participate in social networking, teens run the risk of posting something they might later regret. According to one study, 19% of adults use search engines to discover a person's professional contacts (coworkers, competition, etc), and 11% use Google as a tool to weed out applicants for jobs. The bottom lin
Hello Members! Avoid tech support phone scams Cybercriminals don't just send fraudulent email messages and set up fake websites. They might also call you on the telephone and claim to be from Microsoft. They might offer to help solve your computer problems or sell you a software license. Once they have access to your computer, they can do the following: [list] [*]Trick you into installing malicious software that could capture sensitive data, such as online banking user names and passwords. They might also then charge you to remove this software. [*]Take control of your computer remotely and adjust settings to leave your computer vulnerable. [*]Request credit card information so they can bill you for phony services. [*]Direct you to fraudulent websites and ask you to enter credit card and other personal or financial information there. [/list]Neither Microsoft nor our partners make unsolicited phone calls (also known as cold calls) to charge you for computer security or software fix
[list=1] [*]Stick to the facts of the item being sold. Leave out personal information, including your email and phone number, if you can help it [*]Look hard at any photo you post. You don’t want it to include house numbers in the background, or license plate numbers, family members, etc. [*]Understand that many out-of-area buyers are associated with fraudulent deals [*]If anything feels “off,” stop contact. It’s always a good idea to chat on the phone for a bit about the item for sale and be wary of erratic or nonsensical behavior on the phone [*]Make it clear that you will only accept cash for the item. Other forms of payment are highly likely to be fraudulent [*]Don’t accept partial payment or anything other than cash for the transaction. If the method of payment changes from your previous agreement, walk away from the deal [*]Agree to meet during daylight hours in a public place and bring a friend to accompany you. With high profile items, it’s okay to ask for proof of identity suc
Apart from grounding your kids or having the awkward “we need to talk” talk, there are some serious risks for kids who are connected all the time. The truth is, even if parents trust that their kids are making the right decisions online, threats such as online predators, inappropriate content, and cyberbullies are real. The Internet safety for children advocacy group, [i]ikeepsafe.org[/i], brings to light three main risks associated with all connected technology: [b]Inappropriate Contact[/b],[b] Content[/b], and [b]Conduct[/b] (the 3 C’s). [b]Inappropriate contact[/b] occurs when strangers or predators online reach out to kids to establish new relationships or to engage in regular communication. “The Internet is a place to enhance existing relationships, not a place to meet new people,” warns the organization. And it happens more than we would like to think. A recent study done by [url=http://www.redorbit.com/news/technology/2065158/study_examines_online_beha
[b]Fact![/b] Back in simpler times, you had to keep a close watch on .exe files. Now, malware infections can occur through “[url=http://en.wikipedia.org/wiki/Drive-by_download]drive-by[/url]” downloads. The malicious code lurks on seemingly innocent content, which then executes automatically via vulnerabilities in your browser without your knowledge. In other words, you never know what hit you. Cybercriminals are even using advanced distribution platforms to deliver their drive-by exploits. Webroot Threat Researcher, Dancho Danchev, recently gave us a glimpse into one of these platforms, a Java-based platform called AnonJDB, which you can read about [url=http://blog.webroot.com/2012/01/17/inside-anonjdb-a-java-based-malware-distribution-platforms-for-drive-by-downloads/]here.[/url] [url=http://www.infosecurity-magazine.com/view/19909/black-hat-2011-google-android-as-vulnerable-to-driveby-downloads-as-pcs-claims-dasient-research/]Research[/url] also suggest
[b]Who sent the message?[/b] If you were not expecting something from a family member or friend, it may legitimately be from them, or it could be that their account was hijacked and the message is actually being sent by a cybercriminal hoping to infect your computer and/or steal your information. The easy way to discover whether it is actually from your friend or family member is to call, text, or email the sender and ask. Be especially wary of emails from friends and family that a) have no subject line, and b) only contain a link or attachment. This is usually evidence for a hijacked account. Be sure to call the person who purportedly sent you the link to discuss the message with them. If the message and attachments or link come from a company, there is a different set of questions to ask. [b]Do you use this company?[/b] [b][/b] If not it is probably junk, or worse, a scam. If you do use the company, were you expecting to receive an email, or other message
[b]Myth![/b] While “%14lugnut_(1776)-tutu” is better than “pass*word,” you’re still not completely safe. No matter how creative or intellectualized your password, there’s someone (or something) out there devoting 24 hours a day, 7 days a week, to breaking your weak code. Hackers also use [url=http://blog.webroot.com/category/malware/keyloggers/]keyloggers[/url], which can snatch and monitor keypad activity. Encrypt all you want – there’s still a chance your password will be passed along. [u][b]If you want some password help, check out these 3 options:[/b][/u] [b][/b] 1. Use phrases These examples let you use phrases that either mean something to you, or you associate with a type of website. For example: [i]2BorNot2B_ThatIsThe?[/i] (To be or not to be, that is the question – from Shakespeare) 2. Use your artistic side You don’t have to think of it just as the numbers you see, it can also be a canvas to draw on. [i]1qazdrfvgy7[/i], is really
Purchasing items through an internet classified site is a great way to find the items you’re looking for at a terrific price, but there are risks you take when you do. Your first line of defense is to use reputable services and follow closely any advice the site gives about buying safely. [b]How to respond to an ad[/b] [list] [*]If the ad seems too good to be true, it probably is. There is a fine line between a great deal, and getting scammed or stuck with stolen goods. If the site allows you to see seller reviews, check these out and avoid anyone with a questionable sales history. [*]If you want the convenience of allowing the seller to call you (as opposed to responding by email through the service), provide a free disposable phone number. You can get one easily by searching on ‘disposable phone number’ and selecting from one of several companies that provide this service. Don’t put your personal phone number in your response to an ad – you don’t want people to be able to har
Already have an account? Login
Login to the community
No account yet? Create an account