Help each other out of non-Webroot technical jams and discuss tech-related stuff in general.
- 4,800 Topics
- 12,154 Replies
DNA Hard Drives
[b][url=http://www.extremetech.com/extreme/134672-harvard-cracks-dna-storage-crams-700-terabytes-of-data-into-a-single-gram]story link[/url][/b] [b] [/b] [i]A bioengineer and geneticist at Harvard’s Wyss Institute have successfully stored 5.5 petabits of data — around 700 terabytes — in a single gram of DNA, smashing the previous DNA data density record by a thousand times.[/i][b] [/b] I wonder how much longer it will be until we have DNA hard drives or we all become walking datacenters. Absolutely fascinating!
What is Bill Gates Doing Now?
[b]Bill Gates: Reinvent the toilet, save the world:[/b] [url=http://www.latimes.com/business/technology/la-fi-tn-bill-gates-reinvent-the-toilet-save-the-world-20120815,0,776312.story]http://www.latimes.com/business/technology/la-fi-tn-bill-gates-reinvent-the-toilet-save-the-world-20120815,0,776312.story[/url] Bill Gates wants to turn Waste into energy. I'm hoping this comes true and every Politician gets a free toilet. We wouldn't have to worry about energy anymore. :D
Apple vs. Samsung: The Drama Continues
The recent court battle between the two tech giants has certainly been a buzz-worthy topic for many (tech sites and consumers alike) these last couple of weeks. Who's right, who's wrong, who wins, and who loses, are all questions still unanswered at this point and everyone will have to wait until at least the the of the month before getting a better idea as to who will win the battle. Nevertheless, new evidence and arguments from both sides emerge daily so I thought I'd include two interesting Slashgear articles from earlier today. The [url=http://www.slashgear.com/judge-koh-suggests-apple-is-smoking-crack-in-samsung-case-16243128/]first article[/url] suggests that Judge Lucy Koh's patience is reaching it's limit after she was quoted asking Apple if they were "smoking crack" after they presented her a 75 page document in an attempt to call 22 witnesses for rebuttal testimony. While not the most professional way to put it, Koh's words proved to be popular on Twitter accordin
Microsoft: Surface Tablet to Ship October 26 Alongside Windows 8
[i]"In a filing with the US Security and Exchange Commission (SEC), Microsoft admitted something it has been silent about with the public: Yes, the first Surface tablets will ship to customers on October 26, the same day that Windows 8 arrives.[/i] [i]"The next version of our operating system, Windows 8, will be generally available on October 26, 2012,” the filing reads. “At that time, we will begin selling the Surface, a series of Microsoft-designed and manufactured hardware devices.”[/i] [i]Presumably, this means only the base Surface version, which runs on ARM hardware and utilizes the ARM version of Windows 8, called Windows RT. Surface Pro, which runs Windows 8 Pro on Intel-based hardware, will arrive about 90 days later, according to a previous Microsoft statement.[/i] [i]Of course, there are still so many questions about Surface, not the least of which is pricing. The ARM-based Surface versions will come in 32GB and 64GB variants, and the Intel Pro versions will ship w
Apple's Crazy New Patent Approved!
Alright my technology-obsessed friends... Looks like Apple is diving head first into their next groundbreaking "project" in the form of TV and 5D tech. That's right, it's no misprint...I said 5D!!! According to a [url=http://news.cnet.com/8301-13579_3-57478805-37/apple-gets-patent-for-tv-and-5d-tech/?tag=FD.epic]CNET article,[/url][b][i] "The U.S Patent and Trademark Office granted Apple a patent today for a way to connect human beings to computers using sensors, touch screens, and virtual reality gloves."[/i][/b] So apart from sounding like it came out of quantum physics (how there can even be a fourth dimension?), what does it actually mean? Basically, the patent outlines that this kind of advanced 5D technology can be used for anything from interactive gaming to starting a car by recognition of a particular signature. Crazy cool-sounding stuff. Read the full article by clicking above and let me know what you think! Cheers,
State of Washington to Use Facebook for Voter Registration
[i]"The secretary of state's office said Tuesday it will have an application on [url=http://www.facebook.com/WashingtonStateElections]its Facebook page[/url] that allows residents to register to vote and then "like" the application and recommend it to their friends. It's expected to launch as early as next week."[/i] [url=http://www.msnbc.msn.com/id/48217987/ns/technology_and_science-tech_and_gadgets/#.UAY70ZGD81I]Full Article Here[/url][i][/i] [u]Interesting things to note:[/u] [list] [*]They already had online voter registration - just not via Facebook until now. [*]Users must allow Facebook to access their information. [*]Users must provide a driver's license or state ID card number in the process. [*]According to the "co-director of elections," Facebook does not have access to the state's database itself. [/list]On the positive side, this might make registering to vote easier for some people, and it might increase the overall number of registered voters. On
Is your password strong? How to make it stronger
[url=http://www.securitywatch.pcmag.com/hacking/298891-how-to-make-strong-passwords-stronger]http://www.securitywatch.pcmag.com/hacking/298891-how-to-make-strong-passwords-stronger[/url] The above article shows you how to make even stronger passwords and provides a link to test the strength of your secure passwords.
Did the rapid release cycle ruin Firefox for you?
[url=http://www.neowin.net/news/firefox-dev-claims-everybody-hates-firefox-updates][b][u]Ex-Firefox Dev Claims "Everybody Hates Firefox Updates"[/u][/b][/url] As of the most recent round of updates, Mozilla has already moved to updating in the background. So I'm somewhat inclined to agree with the Mozilla rep that "Jono's (the ex-dev's) analysis is interesting, but outdated." However, as the ex-dev points out, "People who got fed up and ditched Firefox are going to be hard to win back." Google definitely beat them to the punch as far as automatic updates operating in the background is concerned. However, a lot of the Firefox improvements, to their credit, have been really good improvements. On the other hand, the ex-dev raises a valid concern about breaking extensions fairly quickly with new updates being released at a pretty rapid pace. Background or not, that will probably still be a concern going forward. I'm not really bothered by t
Sorry, this isn't a rumor or a myth (yet). It's a question and this seemed like the best area for it: I've searched, but I can't find a clear answer on which files get hashed and submitted to the cloud. Imagine a scenario where you receive a sensitive Word document or PDF--let's say it's the Pentagon Papers--as an email attachment. Does this file ever get hashed and submitted? If so, can Webroot be subpoenaed to reveal which accounts submitted that hash for inspection?
Droid Razr and Razr Max to (finally) get ICS starting today!
According to multiple web sources [url=http://blogs.computerworld.com/smartphones/20576/motorola-droid-razr-razr-maxx-ice-cream-sandwich](my favorite here) [/url] The Verizon Droid Razr and Droid Razr Max are to start receiving the update today and throughout the next week.
New Surface Tablet Looks Promising
Hey All, Happy Friday! While this is not exactly "breaking news" (June 18 is considered old news by now), I'm sure you all have seen (or at least heard) of Microsoft's brand new toy, the "Surface" tablet. With the Windows 8 release looming, Microsoft decided to build the tablet themselves. While not known for their hardware prowess, I must say, from a completely neutral technology-appreciating perspective, this thing looks pretty cool. How about you?? Let me know what you think! One (of the many) articles can be found [url=http://www.businessweek.com/articles/2012-06-18/microsofts-surface-tablets-raise-the-bar-for-pc-rivals]here[/url]. Cheers and have a great weekend!
Can't paste clipboard into reply?
Hello: There appears to be some sort of anomaly in the way this message board handles copy/paste of clipboard contents into replies. I can copy text from my text editor and paste here (after clearing a warning by IE8). But I don't appear to be able to copy the contents of another post on this forum into this text box. I had to copy/paste it into Word, and then use the "Paste from Word' to get it into the message (didn't try to pass it through the text editor, which I assume might have worked.) TIA -- Roy Zider
What exactly is Cross Site Scripting (XSS)
There is a lot of talk about Cross Site Scripting(XSS) vulnerabilities and I thought an introduction might be helpful to some in our community. Simply put an XSS exploit is caused by a coding error in the web page that lets attacks add unwanted code to a page which is executed by the victims browser. This post will cover the anatomy of an attack, techniques for detecting vulnerabilities and methods for mitigation. An XSS exploit can take many shapes, but the most common is phishing emails. The attack scenario looks something like this: [list=1] [*]Phishing email from fake trusted domain includes a link to the trusted domain[list=1][list][url=http://example.com/index.php?i=%E2%80%9D%3e%3cscript%3ealert%28%27XSS%27%29%3c/script]http://example.com/index.php?i=”><script>alert(‘XSS’)</script>[/url][/list][/list] [*]User hovers over link, notices it goes to example.com and clicks on link [*]The web page does not handle the user input in the URL correctly and it adds it to
Web Server Log File Analysis To Detect Malicious Traffic
During an incident response, you are usually not lucky enough to have months of full packet capture or forensic images of machines. That is not a problem though, as there are artifacts for use in analysis throughout your network. I'm speaking specifically about log files. The two data sources in particular that can be most useful are Web Server and Proxy logs. If you think about most common attack patterns, they are either attacks on poorly configured web sites or phishing/malware downloads. If you are using a proxy server, you will see this phishing traffic, and the web server logs (unless compromised) will have traces of the attack. [u][b]Web Server[/b][/u] In a typical web server attack you will see traffic from reconnaissance, attack, and exploit. Reconnaissance traffic will usually be discoverable in log files by looking at the total number of pages viewed by distinct IP. If you are seeing lots of quick, sequential access to pages you can make an assumption it
Fact or Myth: Is the internet being shut off on July 9th?
[b][u]Is the internet being shut off on July 9th?[/u][/b] Recently you may have seen some well-meaning but somewhat ill-informed gossip circulating online that the FBI is going to shut off the internet on July 9th. While there is a nugget of truth in that rumor, it's mostly incorrect. Here is what's actually true: Way back in ye olden days of the year 2007 when we were all still using IE7 and Firefox 2, there was some malware called DNSChanger. It worked by hijacking your DNS settings (the system that changes *insert any http:// web address here* into an IP address behind the scenes and allows you to get around online). Instead of going where you intended to go, you would be redirected someplace else entirely. In this case, when you tried to go to a website to buy something legitimate, it would redirect you to a similarly-themed but fraudulent website where you would essentially be robbed. This illegal scheme was quite lucrative for the malware wr
QR Codes: What are they, and are they secure?
[b]A QR Code (or Quick Response Code), is a barcode that looks like this:[/b] [img]https://d1qy7qyune0vt1.cloudfront.net/webroot-en/attachment/99iAB29B0A75C148303.jpg[/img] When scanned with a QR Code reader, it will commonly take you to a website represented by the QR Code.[b][/b][b] [/b] [b] [/b] [b]What else are QR Codes used for?[/b] There are other uses for QR Codes as well. In fact, they were originally used for industrial labeling, but most of the time you see them these days it will be for marketing purposes. It’s not uncommon to see QR Codes on advertisements or even telephone poles these days. A lot of guerilla marketing campaigns will leave QR Codes lying around cities in places people might be tempted to scan them just to see what they are. [url=http://techcrunch.com/2012/03/25/facebook-rooftop-qr-code/] For instance, Facebook recently painted a giant QR Code on their roof.[/url] Readers for QR Codes are very common as well.
Fact or Myth: Older, slower antivirus software is better and more thorough than the faster Webroot SecureAnywhere
[b][u]MYTH[/u][/b] [b][u] [/u][/b] Ever since the launch of Webroot SecureAnywhere (WSA), one of the biggest concerns we have seen is that the scans are "too fast to be doing anything effectively." Having worked in support since well before the launch of WSA, I cannot tell you how many times I have seen this topic come up due to a popular misconception that a fast scan is somehow less thorough. [b]To explain why this is a myth rather than a fact, I'll first explain how older, conventional detection models work.[/b] When you first install a program that relies on one of those models, the program first imports tens to hundreds of megabytes of detection definitions from a central server. The installation is slow and cantankerous. If you're on a slower-speed connection, this initial stage can prove insurmountable at times. Believe it or not, some people still use dial-up. There are some parts of the world that unfortunately still don't have a choice.&nb
Newest Wireless Tech
T-rays, sounds more science fiction than cutting edge wireless tech. In a recent article regarding the future of wireless communication found [url=http://www.bbc.co.uk/news/science-environment-18072618]Here[/url], researchers in Japan have smashed the record for wireless data transmission in the terahertz band, an uncharted part of the electro-magnetic spectrum.
A whole new meaning to the term "computer virus"
[url=http://www.redorbit.com/news/technology/1112534189/portable-virus-powered-recharging-source-on-the-horizon/]Researchers have discovered a way to generate electricity from a genetically engineered virus.[/url] Once this technology is perfected, you will be able to power devices through basic kinetic actions like walking up stairs or opening a door. You could conceivably power your laptop just by walking around with it. That's a virus I wouldn't mind having!
Cat needs a TV...
Alright Webroot Community, I need your help. I'm buying a new TV and I have to admit, it's been awhile since I've shopped for one. Jim even made fun of me when I said, "Since when do TVs have 3D?!?" So that being said, I'd love your advice. What are some "must have" features? What should I stay away from? [b]What I know I want: [/b] LED - Flat screen Moderately priced 1080p vertical resolution 120 Hz refresh rate [b]What I know I DON'T need:[/b] 3D (seriously...3D?) [b]What I don't know if I need:[/b] "Smart TV" - I do love the idea of internet cable vs regular cable though... PC input vs. USB port DVI imports Brand Any advice?
Avoid tech support phone scams claimed to be from Microsoft
Hello Members! Avoid tech support phone scams Cybercriminals don't just send fraudulent email messages and set up fake websites. They might also call you on the telephone and claim to be from Microsoft. They might offer to help solve your computer problems or sell you a software license. Once they have access to your computer, they can do the following: [list] [*]Trick you into installing malicious software that could capture sensitive data, such as online banking user names and passwords. They might also then charge you to remove this software. [*]Take control of your computer remotely and adjust settings to leave your computer vulnerable. [*]Request credit card information so they can bill you for phony services. [*]Direct you to fraudulent websites and ask you to enter credit card and other personal or financial information there. [/list]Neither Microsoft nor our partners make unsolicited phone calls (also known as cold calls) to charge you for computer security or software fix
To all you Community Android Fans...
Samsung unveiled its Galaxy S3 smartphone earlier today...How cool is it? Check out this [url=http://www.digitalspy.com/tech/news/a379900/samsung-galaxy-s3-smartphone-unveiled.html]one[/url] (of many) articles and post what you think. I, personally, have a love-hate relationship with smartphones. On the one hand, I am intrigued by new releases. With their ever-more-sleek designs, abundance of new features, and polished operating systems, major mobile phone (can I even call it that anymore?) manufacturers usually do a good job of impressing (and convincing) consumers to dish out hundreds of dollars for their latest and greatest. On the other hand, however, few smartphones actually live up to the hype. As features turn out less cool than originally marketed and operating systems prove to be laggy and sluggish, your once super-fast-top-of-the-line smartphone gets lost and forgotten amongst a sea of other smartphones with comparable features and cosmetics. But to me, the most frustrati
Already have an account? Login
Login to the community
No account yet? Create an account
Enter your username or e-mail address. We'll send you an e-mail with instructions to reset your password.