News, Announcements, Tech Discussions
Microsoft is offering people a peek at Windows 8.1 in action courtesy of a new video. Posted Wednesday on [url=http://www.youtube.com/watch?feature=player_embedded&v=VQb5caeSo00]YouTube[/url], and embedded into [url=http://blogs.technet.com/b/microsoft_blog/archive/2013/06/05/windows-8-1-updates-unveiled-at-computex-2013.aspx]a Microsoft blog[/url], the tour conducted by Jensen Harris, Microsoft's director of program management for Windows User Experience, shows off key enhancements to the Start screen, the All Apps screen, and the search tool. The video kicks off with a glimpse of the new lock screen, which can now display a collage of photos gathered from your PC and your SkyDrive account. The tour then segues to the Start screen where you can now shrink or enlarge your tiles using a wider array of sizes. Then it's on to the All Apps screen, where tiles can now be sorted by date installed, most used, or category, as well as by name. Tiles from the All Apps screen can easily be ad
Microsoft will be offering a free version of Office in the smaller versions of tablets running its operating system, a new report claims. [url=http://www.theverge.com/2013/6/5/4397972/windows-8-tablets-free-word-excel-powerpoint-onenote]According to The Verge[/url], which quoted Windows CFO Tami Reller at Computex on Wednesday, Microsoft will allow vendors to bundle Word, Excel, PowerPoint, and OneNote into 7- and 8-inch [url=http://reviews.cnet.com/tablets/]tablets[/url] running [url=http://reviews.cnet.com/windows-8-review/]Windows 8[/url]. Outlook 2013 will not be bundled with the device, despite the fact that Windows RT 8.1, the latest version of that software, [url=http://news.cnet.com/8301-10805_3-57587700-75/outlook-finally-coming-to-windows-rt-tablets/]will come with Outlook RT[/url]. Read [url=http://news.cnet.com/8301-10805_3-57587740-75/office-2013-to-be-bundled-with-smaller-windows-8-tablets/]here[/url]. [img]https://d1qy7qyune0vt1.cloudfront.net/webroot-en/at
Samsung's long-rumored [url=http://crave.cnet.co.uk/mobiles/samsung-galaxy-s4-active-leaks-better-looking-than-the-s4-50011270/]Galaxy S4 Active[/url] has entered the realm of officialdom at last, and will be out in the U.K. this summer, Samsung has confirmed. The S4 Active is a rugged version of the regular S4, aimed at outdoorsy types who don't want a phone that'll faint at the first sight of dust or water. The phone has a sealed design that -- Samsung [url=http://global.samsungtomorrow.com/?p=24447]promises[/url] -- will protect the S4 Active from water damage for up to 30 minutes of submergence at a depth of one meter. More than enough protection against dropping it in your pint, then, but Samsung also reckons you'll be able to take underwater photos using the Active's 8-megapixel camera, and a new "Aqua Mode." Read [url=http://news.cnet.com/8301-1035_3-57587736-94/galaxy-s4-active-takes-a-waterproof-tack/]here[/url]. [img]https://d1qy7qyune0vt1.cloudfront.net/webroot
Consumers who own tablets running Microsoft's Windows RT operating system will get a new version of the software giant's widely used e-mail program, Outlook 2013 RT, later this year. At the Computex computer trade show in Taiwan, Microsoft said Wednesday that the e-mail program will be included as part of the [url=http://reviews.cnet.com/windows-8-review/]Windows 8[/url].1 update [url=http://news.cnet.com/8301-10805_3-57584370-75/windows-blue-gets-official-name-windows-8.1/]announced last month[/url]. Outlook 2013 RT will be available as a free update for [url=http://reviews.cnet.com/tablets/]tablets[/url] running Windows RT, the scaled-down version of Windows 8, and will be included in Windows RT devices going forward. When Microsoft rolled out Windows RT last year, it included other Office applications, such as Word, Excel, PowerPoint, and OneNote, but not Outlook. Speculation mounted in recent months that [url=http://news.cnet.com/8301-10805_3-57578078-75/microsoft-outlook-ready-to-
Intel has officially dubbed the next version of its high-speed port "Thunderbolt 2." The technology was actually [url=http://news.cnet.com/8301-11386_3-57578503-76/intel-shows-off-speedier-thunderbolt-tech/]revealed at the National Association of Broadcasters conference in April[/url] under the code name Falcon Ridge. Technically, Thunderbolt 2 is a controller chip that doubles the speed of the first-generation port, supporting up to 20Gbps bidirectionally. That means the cables can now support both transferring a 4K video and putting it on screen at the same time. Current versions of Thunderbolt are limited to an individual 10Gbs channel each for both data and display, less than the required bandwidth for 4K video transfer, Intel said in a [url=http://blogs.intel.com/technology/]blog post[/url] Tuesday. Read [url=http://news.cnet.com/8301-1001_3-57587687-92/intels-thunderbolt-2-official-coming-later-this-year/]here[/url]. [img]https://d1qy7qyune0vt1.cloudfront.net/webroo
Splashy [url=http://reviews.cnet.com/8301-3121_7-57518020-220/how-windows-8-will-shake-up-the-laptop-market/]convertibles and hybrids[/url] might be what many laptop makers are using to get people interested in buying a new [url=http://reviews.cnet.com/windows/microsoft-windows-8/4505-3672_7-35321713.html]Windows 8[/url] system, but we've been waiting for some good ol' traditional clamshells that are more than Windows 7 models with touch screens. And, apparently, all it took to get them was some [url=http://reviews.cnet.com/8301-3121_7-57587411-220/intels-new-fourth-gen-haswell-processors-what-you-need-to-know-faq/]new Intel processors[/url]. Case in point, Sony's new Vaio Pro 11 and Pro 13, two Windows 8 ultrabooks that can go clickpad-to-clickpad with the current Apple [url=http://reviews.cnet.com/8301-3121_7-57452648-220/macbook-pro-and-macbook-air-2012-roundup/]MacBook Air lineup[/url]. Weighing 1.9 pounds and 2.3 pounds respectively, the Pro 11 and Pro 13 are both only 0.68 inch t
I would really like to know if webroot has any plans to work with other browsers besides IE and FireFox? Browsers like Opera, Safari, or any of the other spin off's Chrome or Firefox or IE? Is there a reason software company's only cater to those browsers? Not everyone uses IE or Firefox!! Just a curious question. It would be nice. These are a few in question! Pale Moon Comodo Dragon or Ice Dragon CoolNovo Srware Iron
The h-online wrote: [i] [/i] [i]VirusTotal is now able to help detect exploit attempts made using video and music files in ASF format. The ASF format is able to include embedded URLs which are opened automatically when the files are played. The detection service determines the destination of these URLs. This service is not yet offered by local anti-virus software.[/i] [b]Full Article[/b]: [url=http://www.h-online.com/security/news/item/VirusTotal-detects-social-engineering-in-media-files-1876237.html]http://www.h-online.com/security/news/item/VirusTotal-detects-social-engineering-in-media-files-1876237.html[/url] I'm assuming that WSA is covering for this as well, unless someone can tell me otherwise?
I finally got a picture from the MVP Open Day from May 24th, 2013 at Microsoft Head Office in Toronto, Canada. We got allot of new info on many fronts from Software and Hardware but my MVP NDA does not allow me to discuss anything to my Fellow Webrooters but it was a great day 8:00am to 5:00pm and there were over 100 of us and 60 via Web Hookup then after they took 40 of us the ones that wanted to go to a Toronto Blue Jays game in an Executive Suite we had a great time and I got home around 1:00am. :D Daniel If you look close enough I'm wearing my Webroot Expert Advisor Polo Shirt! ;) [img]https://d1qy7qyune0vt1.cloudfront.net/webroot-en/attachment/3794i16F54209258C956E.png[/img]
[h2]For Ars, three crackers have at 16,000+ hashed passcodes—with 90 percent success.[/h2]by [url=http://arstechnica.com/author/dan-goodin/]Dan Goodin[/url] - May 27 2013, 9:00pm EST [img]http://cdn.arstechnica.net/wp-content/uploads/2013/05/correcthorsebatterystaple.jpg[/img] In March, readers followed along as [url=http://arstechnica.com/author/nate-anderson/]Nate Anderson[/url], Ars deputy editor and a self-admitted newbie to password cracking, downloaded a list of more than 16,000 cryptographically hashed passcodes. Within a few hours, [url=http://arstechnica.com/security/2013/03/how-i-became-a-password-cracker/]he deciphered almost half of them[/url]. The moral of the story: if a reporter with zero training in the ancient art of password cracking can achieve such results, imagine what more seasoned attackers can do. Imagine no more. We asked three cracking experts to attack the same list Anderson targeted and recount the results in all their color and technical detai
From the land down under! :D Jeff Whalley, Angus Thompson [list] [*] [url=http://www.heraldsun.com.au]Herald Sun[/url] [*]June 02, 2013 9:04PM[/list] [img]http://resources3.news.com.au/images/2013/06/02/1226655/472987-craig-reynolds.jpg[/img]Craig Reynolds with his garage fridge. Picture: Mike Keating [i]Source:[/i] Herald Sun [b] WANGARATTA'S backyard beer swillers are marvelling at the magic of their chillers after one man's fridge played havoc with Telstra's mobile network. [/b] The faulty unit shooting out freak electric signals was believed to have caused interference in the mobile data network across several neighbourhoods of the town. A team of the telco's crack black-spot cops tracked the rogue beer fridge to a garage in Wangaratta. This followed the Telstra network "war room" detecting the interference in the system. Telstra engineers say problems are pinpointed by "software robots" scanning reams of system data. Defective electric wa
Yesterday, during the unofficial first day of Computex 2013 in Taipei, companies like Acer and Asus used the time to start the show with a bang before it even began. Asus was the one to really steal the show when it presented a slew of new devices, none more interesting than the [url=https://community.webroot.com/t5/Techie/Three-In-One-Say-Hello-to-the-Asus-Transformer-Book-Trio/m-p/42492#M1062]Android/Windows 8 hybrid Transformer Book Trio[/url]. So what about today, the official first day of Computex? Mostly, it was about Intel and their new line of Haswell processors. And yet, the bigger story may be that mobile manufacturers are finally opening up to Intel's portable CPU's, according to a [url=http://bit.ly/15FnzQU]PC World article[/url]. "While Intel has notched a few Android smartphone wins on its post, it was never able to convince a big manufacturer to take a stab at a proper Atom-powered Android tablet-until Computex, that is. And at Computex, it landed one of th
Is PC gaming getting conservative? Razer, the PC peripherals manufacturer, is now a risk-taking newcomer to the world of PC gaming laptop hardware. The Razer Edge gaming tablet and funky second-screen Razer Blade gaming laptop were bold moves, both of which made experimental departures from a somewhat stale gaming-laptop pattern. Yet, the newly announced 14-inch Razer Blade is a throwback: no touch screen. No Switchblade second-screen clickpad. No convertible tablet mode. This is a laptop. A very thin, very sleek gaming laptop, the type you'd recognize. Read [url=http://www.cnet.com/laptops/razer-blade-14-inch/4505-3121_7-35780325.html]here[/url]. [img]https://d1qy7qyune0vt1.cloudfront.net/webroot-en/attachment/3788i135FF39A851B86B8.jpg[/img]
With the Black Hat security conference less than two months away, a team of Georgia Tech researchers plan to show how to hack into an iPhone or iPad in less than a minute. Their tool? A 'malicious charger'. Here is what the researchers wrote: [i]"We investigated the extent to which security threats were considered when performing everyday activities such as charging a device...The results were alarming: despite the plethora of defense mechanisms in iOS, we successfully injected arbitrary software into current-generation Apple devices running the latest operating system (OS) software."[/i] This is just another reason why, although Apple devices are relatively secure, it's crucial for users to remember that their iOS gadgets are still susceptible to hacks and malicious applications. This is also why it's important for iOS users to be in the know of new potential threats (such as the one described in this post) and to also make sure to take safety measures on their devices (such a
As some of you may or may not know, there is a major computer exhibition happening this week across the Pacific. Computex 2013 in Taipei, Taiwan, is where many PC, chip, tablet, and mobile manufacturers show off their latest and greatest (much like CES, but more 'real products that will soon be available' rather than 'awesome concepts from the future that you may see go mainstream in five years'). And while the show officially starts June 4 (keeping in mind that Taiwan is 12-15 hours (Eastern to Pacific) ahead of the US), many companies (such as Taiwan's own Asus and Acer) have already made their big announcements, the most interesting [so far] being Asus's Transformer Book Trio, which, in a nutshell is a combination of three computing devices and two operating systems. Basically, it's an Android tablet that you can snap into a keyboard, at which point it becomes a laptop capable running both Android and Windows 8. The other twist? The keyboard has it's own hard drive with a Cor
Cloud Technology though still in its infancy is the direction to go in the future. Webroot has grabbed the bull by the horns and has implement this technology. Now for some of the pro's and cons. PROS: Maximizing the IT services 2 Sharing the large volumes of data and better access to data for large number of users 3 better security and safety of data (against cyber attacks) CONS; 1 Cloud does not work if there is no connectivity to internet 2 Clouds are targets of more sophisticated cyber attacks These are some of the points that come to mine. What are your thoughts on this and what can you can to this?
Webroot's and PrevX's history apart and together are a very long story. Many, like me, know parts of it. People from the Wilders Security Forums know most of all (where power-user TripleHelix hails from.) Has anyone assembled a history of everything that's known? I know it's going to sound like brown-nosing - posting this on the Webroot forum, identified as a Webroot Community Guide - but I think it's a really interesting business story. Webroot saw what PrevX was doing, something completely different, and in the end dropped all its consumer products in the belief that PrevX was the right path. It's not often you'll find a company that will replace the core tech it has been building for a decade with that of a small team's from another country.
[img]http://cdn3.sbnation.com/entry_photo_images/8284435/google-logo-stock-31_2040_large_verge_medium_landscape.jpg[/img] [b]By [url=http://www.theverge.com/users/jeffblagdon]Jeff Blagdon[/url] on May 30, 2013 04:42 am The Verge [/b][b] [/b]Google’s security researchers are well known for uncovering vulnerabilities in other people's products. Standard operating procedure is to give the affected company sixty days before publishing the problem, keeping things under wraps until a fix can be shipped out. But when it comes to critical vulnerabilities that are actively being exploited, Google wants its researchers to cut that down to just a week. A [url=http://googleonlinesecurity.blogspot.ch/2013/05/disclosure-timeline-for-vulnerabilities.html]post on its Online Security Blog[/url] explains the reasoning behind the seven-day guideline: "each day an actively exploited vulnerability remains undisclosed to the public and unpatched, more computers will be compromised." The change in
[h2]The company will make changes that suggest it's listening to feedback from the security research community![/h2] By Lucian ConstantinMay 31, 2013 09:26 AM ET [b] ComputerWorld[/b] IDG News Service - Oracle plans to make changes to strengthen the security of Java, including fixing its certificate revocation checking feature, preventing unsigned applets from being executed by default and adding centralized management options with whitelisting capabilities for enterprise environments. These changes, along with other security-related efforts, are intended to "decrease the exploitability and severity of potential Java vulnerabilities in the desktop environment and provide additional security protections for Java operating in the server environment," said Nandini Ramani, vice president of engineering for Java Client and Mobile Platforms at Oracle, in a [url=https://blogs.oracle.com/security/entry/maintaining_the_security_worthiness_of]blog post[/url] on Thursday. Ramani'
Friday morning I received an Email from[b] Bank of America Billpay[/b]: ******** Dear XXXXX XXXXXXXX: Bank of America Credit Card has changed your account number. We've already updated your account number in Online Banking to make sure your payments will be credited to the correct account. You don't need to take any action. If you have any questions about your account, including the reason why your account number changed, contact Bank of America Credit Card directly. Thank you for using Online Banking. Please do not reply to this email. Contact us about this email If you have any questions, please either call the phone number on your account statement or use the Contact Us page, so we can properly verify your identity. Email Preferences This is a service email from Bank of America. Please note that you may receive service email in accordance with your Bank of America service agreements, whether or not you elect to receive promotional email. Privacy and Security Keeping yo
What I thought would be fun would be to come up pith slogans for Webroot. Unique and catchy phrases that users of/and potential user would be attracted to. Here is my first one " Webroot gets to the Root of the Problem" or " Webroot Aims High In The Cloud For Your Protection" I know we have some excellent members with great ideas.........................whats yours!!!!!!;)
Hi. My name is Marc, from Scottsdale, Arizona. I have just started using Webroot Secure Anywhere. I usually do not take the time to write product reviews good or bad, but I am so impressed by the product that I wanted to leave a 5-star review somewhere. I purchased it direct from the company website, as opposed to Amazon or other retailer where they have a system for user reviews. Is there such a place here, or should I post back to this forum with my review and some technical observations? Thanks.
Here is a question for our members. If you sandbox your browser your completely safe and don't need a antivirus software. We are all well aware that numerous antivirus software's have sandbox feature incorporated within its app. So based on this premise you should be able to surf the web..............Download apps in the sandbox and when your done, simply empty the sandbox and no harm is done to your PC......................Right???? or wrong?????????????? Conclusion: Need input on this issue pro's and cons;)
[h2]Strategic Partnerships, Market Share Growth, Customer Wins, and Industry Awards Underscore the Value of Cloud Security Intelligence to Stop Today's Cyber Threats[/h2] [b]Broomfield, CO – May 30, 2013[/b] [url=http://www.webroot.com/En_US/index.html]Webroot[/url], a leader in cloud-based security intelligence solutions, today announced significant global achievements in its third fiscal quarter, which spanned from January to March of this year. Major strategic partnerships, key business customer wins, and new industry awards confirm Webroot's market leading cloud-based security platform is becoming the solution of choice in fighting the changing security threat landscape. Webroot's growth in the quarter was led by the rapid adoption of SecureAnywhere™ solutions which showed a 138 percent growth in bookings versus the same quarter last year. In the quarter, Webroot added more than 1500 new business customers. The company also bolstered its worldwide channel network by forging a
Already have an account? Login
Login to the community
No account yet? Create an account
Enter your username or e-mail address. We'll send you an e-mail with instructions to reset your password.