Help each other out of non-Webroot technical jams and discuss tech-related stuff in general.
- 4,828 Topics
- 12,325 Replies
"In advance of one of the most significant waves of product launches in Microsoft’s history, today we are unveiling a new logo for the company. It’s been 25 years since we’ve updated the [url=http://www.microsoft.com/en-us/news/imagegallery/logos/logoguidelines.aspx]Microsoft logo[/url] and now is the perfect time for a change. This is an incredibly exciting year for Microsoft as we prepare to release new versions of nearly all of our products. From Windows 8 to Windows Phone 8 to Xbox services to the next version of Office, you will see a common look and feel across these products providing a familiar and seamless experience on PCs, phones, tablets and TVs. This wave of new releases is not only a reimagining of our most popular products, but also represents a new era for Microsoft, so our logo should evolve to visually accentuate this new beginning. The Microsoft brand is about much more than logos or product names. We are lucky to play a role in the lives of more than a billion
Microsoft deal alert! If you recently bought or plan to buy a computer with Windows 7 on it, you can get a Windows 8 Pro upgrade for $14.99. Quite a bit better than its $119 Windows 7 upgrade in 2009! [url=https://windowsupgradeoffer.com/en-US]Check out the deal.[/url]
[i][u][b]How to locate source of the remote which makes Android apps working retarded way?[/b][/u][/i] I foud that my Zenonia 4 game has slow reaction. I want find if that is the on the middle remote to my phone or it is the program developer on the game server, or it is the remote from some processes on my phone at all, for example on background while I use the app. How I understand the phone has loadable microchip for CACHE in which information from Server got uploaded during the game. I checked up the SecureAnywhereApp>Identity and Privacy>AppInspector>Network Monitor> ?Detail of Apps which are accessing the Network. Also, I got a peep in the Battery Monitor and I reviewed the Apps. I found that Some Apps may have access to the sensitive data how: Google search, Facebook, Downloads, Russian Keyboard and that my Zenonia 4 app. The Gamevil, Inc made the Zenonia app joined to the GMail account and the Credit card access to execute and realize the purchases on Android M
[b][url=http://www.extremetech.com/extreme/134672-harvard-cracks-dna-storage-crams-700-terabytes-of-data-into-a-single-gram]story link[/url][/b] [b] [/b] [i]A bioengineer and geneticist at Harvard’s Wyss Institute have successfully stored 5.5 petabits of data — around 700 terabytes — in a single gram of DNA, smashing the previous DNA data density record by a thousand times.[/i][b] [/b] I wonder how much longer it will be until we have DNA hard drives or we all become walking datacenters. Absolutely fascinating!
[b]Bill Gates: Reinvent the toilet, save the world:[/b] [url=http://www.latimes.com/business/technology/la-fi-tn-bill-gates-reinvent-the-toilet-save-the-world-20120815,0,776312.story]http://www.latimes.com/business/technology/la-fi-tn-bill-gates-reinvent-the-toilet-save-the-world-20120815,0,776312.story[/url] Bill Gates wants to turn Waste into energy. I'm hoping this comes true and every Politician gets a free toilet. We wouldn't have to worry about energy anymore. :D
The recent court battle between the two tech giants has certainly been a buzz-worthy topic for many (tech sites and consumers alike) these last couple of weeks. Who's right, who's wrong, who wins, and who loses, are all questions still unanswered at this point and everyone will have to wait until at least the the of the month before getting a better idea as to who will win the battle. Nevertheless, new evidence and arguments from both sides emerge daily so I thought I'd include two interesting Slashgear articles from earlier today. The [url=http://www.slashgear.com/judge-koh-suggests-apple-is-smoking-crack-in-samsung-case-16243128/]first article[/url] suggests that Judge Lucy Koh's patience is reaching it's limit after she was quoted asking Apple if they were "smoking crack" after they presented her a 75 page document in an attempt to call 22 witnesses for rebuttal testimony. While not the most professional way to put it, Koh's words proved to be popular on Twitter accordin
[i]"In a filing with the US Security and Exchange Commission (SEC), Microsoft admitted something it has been silent about with the public: Yes, the first Surface tablets will ship to customers on October 26, the same day that Windows 8 arrives.[/i] [i]"The next version of our operating system, Windows 8, will be generally available on October 26, 2012,” the filing reads. “At that time, we will begin selling the Surface, a series of Microsoft-designed and manufactured hardware devices.”[/i] [i]Presumably, this means only the base Surface version, which runs on ARM hardware and utilizes the ARM version of Windows 8, called Windows RT. Surface Pro, which runs Windows 8 Pro on Intel-based hardware, will arrive about 90 days later, according to a previous Microsoft statement.[/i] [i]Of course, there are still so many questions about Surface, not the least of which is pricing. The ARM-based Surface versions will come in 32GB and 64GB variants, and the Intel Pro versions will ship w
Alright my technology-obsessed friends... Looks like Apple is diving head first into their next groundbreaking "project" in the form of TV and 5D tech. That's right, it's no misprint...I said 5D!!! According to a [url=http://news.cnet.com/8301-13579_3-57478805-37/apple-gets-patent-for-tv-and-5d-tech/?tag=FD.epic]CNET article,[/url][b][i] "The U.S Patent and Trademark Office granted Apple a patent today for a way to connect human beings to computers using sensors, touch screens, and virtual reality gloves."[/i][/b] So apart from sounding like it came out of quantum physics (how there can even be a fourth dimension?), what does it actually mean? Basically, the patent outlines that this kind of advanced 5D technology can be used for anything from interactive gaming to starting a car by recognition of a particular signature. Crazy cool-sounding stuff. Read the full article by clicking above and let me know what you think! Cheers,
[i]"The secretary of state's office said Tuesday it will have an application on [url=http://www.facebook.com/WashingtonStateElections]its Facebook page[/url] that allows residents to register to vote and then "like" the application and recommend it to their friends. It's expected to launch as early as next week."[/i] [url=http://www.msnbc.msn.com/id/48217987/ns/technology_and_science-tech_and_gadgets/#.UAY70ZGD81I]Full Article Here[/url][i][/i] [u]Interesting things to note:[/u] [list] [*]They already had online voter registration - just not via Facebook until now. [*]Users must allow Facebook to access their information. [*]Users must provide a driver's license or state ID card number in the process. [*]According to the "co-director of elections," Facebook does not have access to the state's database itself. [/list]On the positive side, this might make registering to vote easier for some people, and it might increase the overall number of registered voters. On
[url=http://www.securitywatch.pcmag.com/hacking/298891-how-to-make-strong-passwords-stronger]http://www.securitywatch.pcmag.com/hacking/298891-how-to-make-strong-passwords-stronger[/url] The above article shows you how to make even stronger passwords and provides a link to test the strength of your secure passwords.
[url=http://www.neowin.net/news/firefox-dev-claims-everybody-hates-firefox-updates][b][u]Ex-Firefox Dev Claims "Everybody Hates Firefox Updates"[/u][/b][/url] As of the most recent round of updates, Mozilla has already moved to updating in the background. So I'm somewhat inclined to agree with the Mozilla rep that "Jono's (the ex-dev's) analysis is interesting, but outdated." However, as the ex-dev points out, "People who got fed up and ditched Firefox are going to be hard to win back." Google definitely beat them to the punch as far as automatic updates operating in the background is concerned. However, a lot of the Firefox improvements, to their credit, have been really good improvements. On the other hand, the ex-dev raises a valid concern about breaking extensions fairly quickly with new updates being released at a pretty rapid pace. Background or not, that will probably still be a concern going forward. I'm not really bothered by t
Sorry, this isn't a rumor or a myth (yet). It's a question and this seemed like the best area for it: I've searched, but I can't find a clear answer on which files get hashed and submitted to the cloud. Imagine a scenario where you receive a sensitive Word document or PDF--let's say it's the Pentagon Papers--as an email attachment. Does this file ever get hashed and submitted? If so, can Webroot be subpoenaed to reveal which accounts submitted that hash for inspection?
According to multiple web sources [url=http://blogs.computerworld.com/smartphones/20576/motorola-droid-razr-razr-maxx-ice-cream-sandwich](my favorite here) [/url] The Verizon Droid Razr and Droid Razr Max are to start receiving the update today and throughout the next week.
Hey All, Happy Friday! While this is not exactly "breaking news" (June 18 is considered old news by now), I'm sure you all have seen (or at least heard) of Microsoft's brand new toy, the "Surface" tablet. With the Windows 8 release looming, Microsoft decided to build the tablet themselves. While not known for their hardware prowess, I must say, from a completely neutral technology-appreciating perspective, this thing looks pretty cool. How about you?? Let me know what you think! One (of the many) articles can be found [url=http://www.businessweek.com/articles/2012-06-18/microsofts-surface-tablets-raise-the-bar-for-pc-rivals]here[/url]. Cheers and have a great weekend!
Hello: There appears to be some sort of anomaly in the way this message board handles copy/paste of clipboard contents into replies. I can copy text from my text editor and paste here (after clearing a warning by IE8). But I don't appear to be able to copy the contents of another post on this forum into this text box. I had to copy/paste it into Word, and then use the "Paste from Word' to get it into the message (didn't try to pass it through the text editor, which I assume might have worked.) TIA -- Roy Zider
There is a lot of talk about Cross Site Scripting(XSS) vulnerabilities and I thought an introduction might be helpful to some in our community. Simply put an XSS exploit is caused by a coding error in the web page that lets attacks add unwanted code to a page which is executed by the victims browser. This post will cover the anatomy of an attack, techniques for detecting vulnerabilities and methods for mitigation. An XSS exploit can take many shapes, but the most common is phishing emails. The attack scenario looks something like this: [list=1] [*]Phishing email from fake trusted domain includes a link to the trusted domain[list=1][list][url=http://example.com/index.php?i=%E2%80%9D%3e%3cscript%3ealert%28%27XSS%27%29%3c/script]http://example.com/index.php?i=”><script>alert(‘XSS’)</script>[/url][/list][/list] [*]User hovers over link, notices it goes to example.com and clicks on link [*]The web page does not handle the user input in the URL correctly and it adds it to
During an incident response, you are usually not lucky enough to have months of full packet capture or forensic images of machines. That is not a problem though, as there are artifacts for use in analysis throughout your network. I'm speaking specifically about log files. The two data sources in particular that can be most useful are Web Server and Proxy logs. If you think about most common attack patterns, they are either attacks on poorly configured web sites or phishing/malware downloads. If you are using a proxy server, you will see this phishing traffic, and the web server logs (unless compromised) will have traces of the attack. [u][b]Web Server[/b][/u] In a typical web server attack you will see traffic from reconnaissance, attack, and exploit. Reconnaissance traffic will usually be discoverable in log files by looking at the total number of pages viewed by distinct IP. If you are seeing lots of quick, sequential access to pages you can make an assumption it
[b][u]Is the internet being shut off on July 9th?[/u][/b] Recently you may have seen some well-meaning but somewhat ill-informed gossip circulating online that the FBI is going to shut off the internet on July 9th. While there is a nugget of truth in that rumor, it's mostly incorrect. Here is what's actually true: Way back in ye olden days of the year 2007 when we were all still using IE7 and Firefox 2, there was some malware called DNSChanger. It worked by hijacking your DNS settings (the system that changes *insert any http:// web address here* into an IP address behind the scenes and allows you to get around online). Instead of going where you intended to go, you would be redirected someplace else entirely. In this case, when you tried to go to a website to buy something legitimate, it would redirect you to a similarly-themed but fraudulent website where you would essentially be robbed. This illegal scheme was quite lucrative for the malware wr
[b]A QR Code (or Quick Response Code), is a barcode that looks like this:[/b] [img]https://d1qy7qyune0vt1.cloudfront.net/webroot-en/attachment/99iAB29B0A75C148303.jpg[/img] When scanned with a QR Code reader, it will commonly take you to a website represented by the QR Code.[b][/b][b] [/b] [b] [/b] [b]What else are QR Codes used for?[/b] There are other uses for QR Codes as well. In fact, they were originally used for industrial labeling, but most of the time you see them these days it will be for marketing purposes. It’s not uncommon to see QR Codes on advertisements or even telephone poles these days. A lot of guerilla marketing campaigns will leave QR Codes lying around cities in places people might be tempted to scan them just to see what they are. [url=http://techcrunch.com/2012/03/25/facebook-rooftop-qr-code/] For instance, Facebook recently painted a giant QR Code on their roof.[/url] Readers for QR Codes are very common as well.
Fact or Myth: Older, slower antivirus software is better and more thorough than the faster Webroot SecureAnywhere
[b][u]MYTH[/u][/b] [b][u] [/u][/b] Ever since the launch of Webroot SecureAnywhere (WSA), one of the biggest concerns we have seen is that the scans are "too fast to be doing anything effectively." Having worked in support since well before the launch of WSA, I cannot tell you how many times I have seen this topic come up due to a popular misconception that a fast scan is somehow less thorough. [b]To explain why this is a myth rather than a fact, I'll first explain how older, conventional detection models work.[/b] When you first install a program that relies on one of those models, the program first imports tens to hundreds of megabytes of detection definitions from a central server. The installation is slow and cantankerous. If you're on a slower-speed connection, this initial stage can prove insurmountable at times. Believe it or not, some people still use dial-up. There are some parts of the world that unfortunately still don't have a choice.&nb
T-rays, sounds more science fiction than cutting edge wireless tech. In a recent article regarding the future of wireless communication found [url=http://www.bbc.co.uk/news/science-environment-18072618]Here[/url], researchers in Japan have smashed the record for wireless data transmission in the terahertz band, an uncharted part of the electro-magnetic spectrum.
[url=http://www.redorbit.com/news/technology/1112534189/portable-virus-powered-recharging-source-on-the-horizon/]Researchers have discovered a way to generate electricity from a genetically engineered virus.[/url] Once this technology is perfected, you will be able to power devices through basic kinetic actions like walking up stairs or opening a door. You could conceivably power your laptop just by walking around with it. That's a virus I wouldn't mind having!
Alright Webroot Community, I need your help. I'm buying a new TV and I have to admit, it's been awhile since I've shopped for one. Jim even made fun of me when I said, "Since when do TVs have 3D?!?" So that being said, I'd love your advice. What are some "must have" features? What should I stay away from? [b]What I know I want: [/b] LED - Flat screen Moderately priced 1080p vertical resolution 120 Hz refresh rate [b]What I know I DON'T need:[/b] 3D (seriously...3D?) [b]What I don't know if I need:[/b] "Smart TV" - I do love the idea of internet cable vs regular cable though... PC input vs. USB port DVI imports Brand Any advice?
Already have an account? Login
Login to the community
No account yet? Create an account