Help each other out of non-Webroot technical jams and discuss tech-related stuff in general.
- 4,747 Topics
- 12,036 Replies
Some macOS Monterey users are encountering a peculiar “Volume Hash Mismatch” error message, informing them that a hash mismatch was detected and to reinstall macOS on the volume. The full error message reads:“Volume Hash Mismatch – Hash mismatch detected on volume disk1s5. macOS should be reinstalled on this volume.”Some users experience this error after a major system crash or kernel panic, after which the error constantly reappears.For some users, the “Volume Hash Mismatch” error is accompanied by a significant increase in instability on the Mac running macOS Monterey, with apps crashing frequently afterwards. Other users have the error message showing up constantly, but without any apparent impact to the stability of the Mac. ✿✿ Full Article ✿✿
October 20, 2020How to get the Windows 10 October 2020 UpdateByJohn Cable, Vice President, Program Management, Windows Servicing and Delivery With organizations moving and adapting from remote to hybrid work scenarios, and essential workers continuing to support us all, it is more important than ever that we continue to provide you with the tools you need to remain protected and productive. In June, we announced Windows 10, version 20H2—and the availability of the first preview build in the Windows Insider Program. We then released a preview build to commercial customers in the Beta and Release Preview Channels for pre-release validation in August. We have continued to make improvements based on the feedback received through these programs and I am pleased to announce that we are beginning the availability of the October 2020 Update. Today’s post offers details on our measured and phased roll out approach, how you can get the update, and information to enable commercial organizations t
I upgraded to Quickbooks 2020 and am unable to open my file. I am receiving the following message, which I do not understand how to correct the problem. QuickBooks Pro and Premier Grant the following files access through your firewall on ports 80, 8019, 56725-56728, and 55363 through 55382 (ports are for QuickBooks 2017 through 2018) for both incoming and outgoing traffic: AutoBackupExe.exe located in C:\Program Files\Intuit\QuickBooks 20XX Dbmlsync.exe located in C:\Program Files\Intuit\QuickBooks 20XX DBManagerExe.exe located in C:\Program Files\Intuit\QuickBooks 20XX FileManagement.exe located in C:\Program Files\Intuit\QuickBooks 20XX FileMovementExe.exe located in C:\Program Files\Intuit\QuickBooks 20XX IntuitSyncManager.exe located in C:\Program Files\Common Files\Intuit\Sync QBCFMonitorService.exe located in C:\Program Files\Common Files\Intuit\QuickBooks QBDBMgrN.exe located in C:\Program Files\Intuit\QuickBooks 20XX QBGDSPlugin.exe located in C:\Program Files\Intuit\QuickBook
[img]https://d1qy7qyune0vt1.cloudfront.net/webroot-en/attachment/4510i921DAD6BC8B17B96.gif[/img]Don't get left in the dark when Google Reader shuts its doors on July 1. Check out this list of free alternatives that will let you continue to keep tabs on the news you need. Full Read Here: [url=http://www.computerworld.com/slideshow/detail/107793/15-free-Google-Reader-alternatives]http://www.computerworld.com/slideshow/detail/107793/15-free-Google-Reader-alternatives[/url]
[quote][b]Jessica Dolcourt[/b] wrote: Here's why the Samsung Galaxy S5 should grab your attention: it looks good, it performs very well, and it has everything you need to become a fixture in nearly every aspect of your life. But, like a candidate running for reelection, the GS5 gets where it is today based on experience and wisdom, not on flashy features or massive innovation. With the exception of a few nonessential hardware and software additions -- like the fingerprint scanner and novel heart-rate monitor -- and a few design tweaks, you're pretty much looking at the same phone Samsung released in 2013. The S5 is more of a Galaxy S4 Plus than it is a slam-the-brakes, next-generation device; it makes everything just a little smoother and faster. [/quote][b]Read[/b] [url=http://www.cnet.com/products/samsung-galaxy-s5/]here[/url].
Starcraft players will find Google's new easter egg quite amusing. Zerg Rush is also a term used in rooting an Android. I actually used Zerg Rush myself when rooting my Samsung Conquer. I love Google's easter eggs. I only know of a few others though. Has anybody seen any other ones?
Hi, I'm wondering if the Webroot Antivirus scans all of the links/sites that are sometimes listed under UTube videos to check if they're OK to use. I've been searching for a movie but have come across lots of links to other sites that stream the full film on-line, are these sites also checked by Webroot?
Another day, another controversial console story from E3 in Los Angeles... Yesterday [url=http://community.webroot.com/t5/Techie/E3-2013-How-to-be-Sony-Smart/m-p/44030#.Ubi8k9jV2L0]I posted about Sony's intelligent strategy[/url] that helped them steal the spotlight (and likely many would-be Xbox One buyers) at E3, after it announced that they would not restrict the way users buy, sell, and lend games for the PS4. In other words, they didn't change anything from the policies that exist now on current consoles. The problem is that Microsoft did. Now, after hearing a barrage of customer backlash and anger over the Xbox One's licensing and used game policies, Microsoft (more specifically Chief Marketing and Strategy officer Yusuf Mehdi) is firing back...politely. "We're trying to do something pretty big in terms of moving the industry forward for console gaming into the digital world. We believe the digital world is the future, and we believe digital is better." Y
As some of you may or may not know, there is a major computer exhibition happening this week across the Pacific. Computex 2013 in Taipei, Taiwan, is where many PC, chip, tablet, and mobile manufacturers show off their latest and greatest (much like CES, but more 'real products that will soon be available' rather than 'awesome concepts from the future that you may see go mainstream in five years'). And while the show officially starts June 4 (keeping in mind that Taiwan is 12-15 hours (Eastern to Pacific) ahead of the US), many companies (such as Taiwan's own Asus and Acer) have already made their big announcements, the most interesting [so far] being Asus's Transformer Book Trio, which, in a nutshell is a combination of three computing devices and two operating systems. Basically, it's an Android tablet that you can snap into a keyboard, at which point it becomes a laptop capable running both Android and Windows 8. The other twist? The keyboard has it's own hard drive with a Cor
On deck in our types of phishing series: Spear phishing. Where most phishing attacks cast a wide net, hoping to entice as many users as possible to take the bait, spear phishing involves heavy research of pre-defined, high-dollar target—like a CEO, founder, or public persona—often relying on publicly available information for a more convincing ruse. FYI: When the target is sizeable enough, spear phishing is sometimes called ‘whaling.’ Landing the Big One SIM swapping is a type of spear phishing where attackers phish a target’s phone carrier, pretending to be the target, and replacing the SIM card with one of their own. One such case resulted in $24 million of lost cryptocurrency. Download the 11 Types of Phishing eBook
According to multiple web sources [url=http://blogs.computerworld.com/smartphones/20576/motorola-droid-razr-razr-maxx-ice-cream-sandwich](my favorite here) [/url] The Verizon Droid Razr and Droid Razr Max are to start receiving the update today and throughout the next week.
So i recently i bought Webroot Internet Security Complete and it's by far the best antivirus i've had. I'm really a fan of Webroot :D But the thing is i also had a license of Norton Security sitting around and wanted to give this combo a try. [b]I'm posting this as the last posts on the subject date from 2015 and i though some people would be interested to know if the latest version of Webroot and Norton are compatible as of 2017.[/b] [u][i]What i did:[/i][/u] - Uninstalled Webroot and restarted computer - Installed Norton Security, updated and restarted - installed Webroot and restarted [u][i]What happened:[/i][/u] Norton did not prompt me to uninstall Webroot and the installation went smoothly. Both Webroot and Norton don't interfere with each other. There is no system slowdown and the system is just slightly slower as if using Norton alone (of course the lightest config is using Webroot only). I've excluded Webroot in Norto
[quote][b]Dara Kerr[/b] wrote: [img]http://asset2.cbsistatic.com/cnwk.1d/i/tim2/2013/10/17/Screen_Shot_2013-10-17_at_6.43.39_PM_610x289.png[/img] After weeks of rumors about the specs, price, and release date of the upcoming Nexus 5, it appears that Google's new Nexus Android smartphone is being listed on the [url=https://play.google.com/store/devices/collection/web_home_5000005_nexusUS]Google Play[/url] store. The device appears next to the [url=http://reviews.cnet.com/google-nexus-7/] Nexus 7[/url] and [url=http://reviews.cnet.com/google-nexus-10/] Nexus 10[/url] along with the caption "Capture the everyday and the epic in fresh new ways." Google lists the price as "starting at $349." However, when the link to the smartphone is clicked on -- the new page doesn't load. And not long after the phone appeared, it was replaced by the older [url=http://reviews.cnet.com/lg-nexus-4/] Nexus 4[/url] again. [/quote] [u][b]Read [url=http://news.cnet.com/8301
Check out [url=http://www.lifehacker.com.au/2012/06/the-10-most-useful-windows-8-keyboard-shortcuts/]these cool tricks[/url] to get the most out of your Windows 8 experience! I like the printscreen feature, but they still need to get SnagIt-level functionality into Print Screen. So, what's your favorite shortcut key?
[img]https://d1qy7qyune0vt1.cloudfront.net/webroot-en/attachment/4508iCA3F32C07FAFECDA.jpg[/img] Now that Barnes & Noble is getting out of the color tablet business, these fire-sale prices could drop even lower. I suppose the writing was on the tablet. Back in May, ostensibly in honor of Mother's Day, Barnes & Noble whipped out [url=http://reviews.cnet.com/8301-19736_7-57582928-251/b-n-chops-prices-on-nook-hd-and-nook-hd-for-one-week/]some pretty hefty discounts on its Nook HD and Nook HD+[/url]. Then, earlier this month, [url=http://news.cnet.com/8301-13845_3-57588445-58/barnes-noble-slashes-nook-hd-prices-for-one-week/]the cuts went even deeper for Father's Day[/url], with the 7-inch and 8.9-inch slates selling for $129 and $149, respectively. But even after the holiday came and went, the discounted prices remained -- and now we know why: [url=http://news.cnet.com/8301-1023_3-57590937-93/nooks-last-stand-b-n-still-must-battle-amazon/]B&N is getting out of the color
Alright my technology-obsessed friends... Looks like Apple is diving head first into their next groundbreaking "project" in the form of TV and 5D tech. That's right, it's no misprint...I said 5D!!! According to a [url=http://news.cnet.com/8301-13579_3-57478805-37/apple-gets-patent-for-tv-and-5d-tech/?tag=FD.epic]CNET article,[/url][b][i] "The U.S Patent and Trademark Office granted Apple a patent today for a way to connect human beings to computers using sensors, touch screens, and virtual reality gloves."[/i][/b] So apart from sounding like it came out of quantum physics (how there can even be a fourth dimension?), what does it actually mean? Basically, the patent outlines that this kind of advanced 5D technology can be used for anything from interactive gaming to starting a car by recognition of a particular signature. Crazy cool-sounding stuff. Read the full article by clicking above and let me know what you think! Cheers,
National Change your Password Day is coming up this Saturday. If you haven't changed your passwords in a while, now is the time to do so (just like you check the batteries in your smoke detector every year :) I'm as guilty as the next person of not managing my passwords well, so I'll be taking this opportunity to finally install a [url=http://www.webroot.com/En_US/SecureAnywhere/PC/WSA_PC_Help.htm#C7_PasswordManagement/CH7_PasswordManagement.htm]password manage[/url]r. Here's a couple good resources for password management: [url=http://community.spiceworks.com/topic/436610-seven-security-steps-to-take-on-national-change-your-password-day-february-1st]Seven security steps to take on National Change Your Password Day (February 1st)[/url] [url=http://blog.lastpass.com/2014/01/start-2014-right-with-these-security-to.html]Start 2014 Right With These Security To-Do's[/url]
The world of malware, including the teams that build and orchestrate malware attacks, has been drastically changing over the past decade. One of the biggest changes that has occurred is the configurability and modularity of malware payloads. The Ransomware business model is a prime suspect in this development. The biggest ransomware attacks that take place nowadays are often orchestrated by different pieces of malware, all developed by different teams. It is less common to see a “one size fits all” form of malware anymore; instead, multiple malware payloads are utilized for each step of the process to eventually lock data behind a ransom demand. There are a few main steps involved in dropping a ransomware payload on a computer network. In this article we are going to analyze each of those steps by describing how they are carried out, which piece of software is being used, and how all of the modular malware pieces fit into the larger puzzle of a ransomware attack. There are many configu
With Ransomware continuing to take down digital infrastructure across the globe and natural disasters seemingly more dramatic every year, having a disaster recovery plan for your business has never been more critical. The time is past when a simple “backup plan” was sufficient for a company relying on servers and its data to be available at a moment’s notice.Disaster recovery is the process of devising failsafes to allow a business to bounce back from adverse events, like a hurricane disabling a server or ransomware locking down entire banks of computers. Employing disaster recovery as a service (DRaaS) is now a vital part of a strong cyber resilience plan for every market, from small businesses to Fortune 500 companies.The truth is, almost every industry has trended digital for the past two decades. As such, being prepared for the inevitable disaster is on par with cybersecurity in terms of importance. Because let’s face it: something will happen to company data at some point. Even if
Now that the [url=https://community.webroot.com/t5/Techie/Samsung-s-new-Galaxy-S4-The-Specs/m-p/30644#M551]successor[/url] to the most popular Android phone of all time is out, here's a bit of unexpected S4 news for you all. According to numerous reports (including [url=http://tcrn.ch/144yBOV]this one[/url] from TechCrunch), come June 26th, Google will start to offer an unlocked version of the Samsung Galaxy S4 with stock Android. "The S4 is not only carrier unlocked, but it also has a fully unlocked bootloader. That means that owners of the device can load their own software on to the device, including things like CyanogenMod, which allows for extremely deep device software customization options. In other words, this new unlocked S4 will essentially be the ultimate developer plaything, but again it's likely to have more or less niche appeal because of the high price tag." That price tag? $649, available on both AT&T and T-Mobile. I'll throw this question out to all of you
The massive [url=http://www.cesweb.org/]International CES[/url] trade show in Las Vegas wraps up tomorrow, but most major tech sites have already selected who they think are the big winners in each major tech category. Digital Trends is one such tech site. You can check out their full list of winners [url=http://www.digitaltrends.com/ces/best-of-ces/]here[/url], but I'll also include a few brief highlights based off their selections below. [list] [*]LG seems to be a Digital Trends favorite at CES 2014, taking top honors in their 'Home Theater (Video)' and 'Computing' categories. DT were particularly impressed with the company's 77-inch curved OLED TV, calling it 'simply the most awesome TV we've ever seen'. Likewise, the LG Ultra PC took top honors in the 'Computing' category thanks to its ultra-slim profile, light weight, and 1080p IPS display, among other features. [*]While there were many smartphone announcements, none were from the major players like Samsung, HTC, or Moto
Microsoft deal alert! If you recently bought or plan to buy a computer with Windows 7 on it, you can get a Windows 8 Pro upgrade for $14.99. Quite a bit better than its $119 Windows 7 upgrade in 2009! [url=https://windowsupgradeoffer.com/en-US]Check out the deal.[/url]
Fronm DrigitalTrends, a great article on the future of desktops. "Desktops sales have slowed because manufacturers have let their designs stagnate, but the need for a comfortable machine you can work on hasn’t gone away. Who will reinvent the PC and reap the rewards?Every other week, there seems to be story about the PC dying. This week, it was because Intel is planning on exiting the motherboard business. The screwy thing is, I think the exact opposite is about to happen. Not only is the desktop not dead, it’s about to go through a resurgence. We’re just waiting for that visionary vendor who realizes that bigger is still better, and this Lemming-like agreement that the desktop is dead is holding people back. Here’s why.How we got hereWe started off with desktop computers. The Apple II, Mac, IBM PCs, and even Commodore and Atari machines were all designed to mostly stay in one place. Our first portables were pretty ugly. My own first portable from Panasonic, called the Sr. Partn
As operating systems come to rely more and more on cloud connected services, everything from a digital personal assistant to file sharing, there comes a sometimes mutually exclusive tradeoff between complete privacy and added functionality. When systems are properly managed this choice in a tradeoff should be a normal and practical decision for the end user. However, when it is starting look like users are being deprived of the choice between absolute privacy over added functionality, then things begin to alarm privacy advocates. As [url=http://www.winbeta.org/news/how-check-and-adjust-your-privacy-settings-windows-10]WinBeta reported earlier[/url] this week in our how to section, the privacy features of Windows 10 have been getting a lot of attention and some skeptical responses. Under moving to a Software as a Service model, Windows 10 is more connected to Microsoft with more frequent updates and more interconnected cloud service features. This has created a worrying sense for some
Already have an account? Login
Login to the community
No account yet? Create an account
Enter your username or e-mail address. We'll send you an e-mail with instructions to reset your password.