News, Announcements, Tech Discussions
Just installed Webroot. Checked PC Security on my online account. My settings for Webroot Secure Anywhere are "user defined" although I didnt change anything, just installed it. When I click on the help icon on this page, a number of security settings are listed. The "Medium(recommended)" setting is highlighted in blue. Should I change my security settings to this, and if so, what will it do as regards the program? Any help would be appreciated. Thanks.
[img]https://d1qy7qyune0vt1.cloudfront.net/webroot-en/attachment/3986i9AC5CC32FF7FD15D.jpg[/img] Vitesse of the vineyards The special-edition Veyron in northern California's Napa Valley. (Nick Czap) [img]https://d1qy7qyune0vt1.cloudfront.net/webroot-en/attachment/3988i6E8D719B685FB2E2.jpg[/img] Vitesse of the vineyards Butch Leitzinger, three-time 24 Hours of Daytona winner and Bugatti's Official Driver for North America since 2006. (Nick Czap) [img]https://d1qy7qyune0vt1.cloudfront.net/webroot-en/attachment/3990i3E82DD03025D5040.jpg[/img] Vitesse of the vineyards (Nick Czap) [img]https://d1qy7qyune0vt1.cloudfront.net/webroot-en/attachment/3992iD16FD95FF0D09854.jpg[/img] Vitesse of the vineyards A pair of massive carbon-fibre intakes feed air to the engine's four turbochargers. (Nick Czap) [img]https://d1qy7qyune0vt1.cloudfront.net/webroot-en/attachment/3994i0E5B756C606C16E4.jpg[/img] Vitesse of the vineyards A number of the Vitesse's components, inclu
As some of you know, E3 2013 is upon us. And while this year's Xbox One and PS4 announcements did give users a glimpse into the next-gen consoles, they were mostly focused on the social and all-purpose capabilities of the new machines. At E3, on the other hand, it's all been about the games (so far). Microsoft was up first with it's announcement of sequels and Xbox One exclusives (as well as non-exclusives). Among the sequels, there was the impressive looking Forza follow-up, Forza Motorsport 5, which should put a smile on the faces of both car-lovers and racing fanatics. Perhaps (actually without a doubt), the more exciting sequel news for the majority of gamers will be the much-anticipated Halo 5. Although it won't be available at launch, Microsoft promises a release during the first half of 2014. Other notable announcements were a Killer Instinct reboot (Finally!), the futuristically-cool-yet-beautiful Quantum Break, and third person slice-em-up Ryse: Son of Rome. Chec
The world's most expensive motorhome has gone on sale in Dubai - made from solid gold and worth a cool £2 million. The space-age eleMMent Palazzo comes complete with a colossal master bedroom, 40-inch TV, on-board bar, fireplace and even its own rooftop terrace. But the most impressive piece of luxury is the 'Sky Lounge' - at the press of a button the 430ft home transforms into a personal retreat with pop up cocktail bar, underfloor heating and extravagant marble lighting. [img]https://d1qy7qyune0vt1.cloudfront.net/webroot-en/attachment/3966i9C7FA57D4CE971BE.jpg[/img] Not your average caravan: The world's most expensive motorhome has gone on sale in Dubai - made from solid gold and worth a cool £2 million. [img]https://d1qy7qyune0vt1.cloudfront.net/webroot-en/attachment/3968i8290ABB960DE947C.jpg[/img] Luxury travel: The space-age eleMMent Palazzo is comes complete with a colossal master bedroom, 40-inch TV, on-board bar, fireplace and even its own rooftop terrace
What if the plug was pulled today and no internet???? How would this affect you and your everyday life. My thoughts on this are.: Like the 80's. Work would be very menial and tedious. Lots of paperwork and faxes. Business communication would be much slower. Education would be duller and probably harder for teachers and students. People would not be able to connect with as many people socially as fast as they can today. Newspapers and TV would be the main source of entertainment. Phones would be the main source of communication. What are your thoughts on this????????????????????
This is a bit of history and trivia. Do you know whom thee first person was that wrote a program and when??? Also who was the first person to successfully run a program on a computer???? Scroll down for the answer, but try to guess first. British countess and mathematician [url=/wiki/Ada_Lovelace]Ada Lovelace[/url] is popularly credited as history's first to write a program for a computing machinery, as she was the first to write and publish an [url=/wiki/Algorithm]algorithm[/url] intended for implementation on [url=/wiki/Charles_Babbage]Charles Babbage[/url]'s [url=/wiki/Analytical_engine]analytical engine[/url], in October 1842, intended for the calculation of [url=/wiki/Bernoulli_number]Bernoulli numbers.[/url][url=https://community.webroot.com/t5/forums/postpage/board-id/Non-Techie#cite_note-8][/url] Her work never ran because Babbage's machine was never completed to a function
A ship which sank during a violent storm a century ago has been found largely intact at the bottom of a lake by a group of divers. The Henry B. Smith freighter went down in Lake Superior, Michigan after sailing into the Great Lakes Storm of November 1913. The Duluth News Tribune reported on Sunday that shipwreck hunters found the boat last month in about 535 feet of water off the shore of Marquette. [img]https://d1qy7qyune0vt1.cloudfront.net/webroot-en/attachment/3958iC3277BACF68873F6.jpg[/img] Secrets of the deep: The 'flying bridge' of a previously undiscovered shipwreck in Lake Superior about 30 miles north of Marquette, Michigan almost 100 years after the boat is believed to have sunk in a huge storm [img]https://d1qy7qyune0vt1.cloudfront.net/webroot-en/attachment/3960iEA6B5EB8C28588B6.jpg[/img] Watery grave: The SS Henry B. Smith was a steel-hulled, propeller-driven lake freighter which sunk in 1913, killing all 25 crew on board The group says it hasn
Via Mashable - [url=http://mashable.com/2012/10/12/the-10-types-of-social-media-addict-infographic/]http://mashable.com/2012/10/12/the-10-types-of-social-media-addict-infographic/[/url] [img]http://rack.2.mshcdn.com/media/ZgkyMDEyLzEyLzA0LzdhL3RoZTEwdHlwZXNvLjhpdS5qcGcKcAl0aHVtYgk5NTB4NTM0IwplCWpwZw/377fe463/d28/the-10-types-of-social-media-addicts-infographic--a951eea27d.jpg[/img] [img]http://rack.1.mshcdn.com/media/ZgkyMDEyLzEwLzEyLzAwXzEwXzM2XzI3NF9maWxlCnAJdGh1bWIJMTIwMHg5NjAwPg/865f7d2f[/img]
I have found this to be a interesting read, as Microsoft according to sources is planning to release a new operating system. Here is the URL for your review: [url=http://www.iclarified.com/25911/microsoft-is-working-on-a-new-operating-system-codenamed-windows-blue]http://www.iclarified.com/25911/microsoft-is-working-on-a-new-operating-system-codenamed-windows-blue[/url] According to the source it is to be released in mid - 2013................ So based on that statement it should be soon.
Worldwide, 1.5 billion smart phones will ship in 2017, according to the latest country level forecasts from Canalys, to account for 73% of all mobile phone shipments. In North America and Western Europe, virtually all phones shipped will be smart phones. Even in Greater China, smart phones will represent 95% of all mobile phone shipments in 2017. The smart phone market will grow at a compound annual growth rate (CAGR) of 18%, while mobile phone shipments will decline by a CAGR of 9% over the same period. Growth in the smart phone market will continue to be driven by Android. In 2012, over 470 million Android-based smart phones shipped and by 2017 this number will have more than doubled to over 1 billion, giving the platform a 67.1% market share. Over the same period, it is forecast that Apple’s shipments will continue to grow, but at a slower rate than the total smart phone market and hence its market share will fall from 19.5% in 2012 to 14.1% in 2017. ‘Apple’s growth will be c
Insiders say to expect some surprises at this year’s Apple Worldwide Developers Conference, starting with some big announcements today that will be ‘polarizing.’ The first day of the highly anticipated yearly meeting always sees the big product and software debuts, and this year Apple blogger in-the-know John Gruber says even he’s unsure what to expect, except the unexpectedly big. ‘The one thing I keep hearing over and over again from friends who would know is some of the stuff they're going to show is "polarizing,”’ the blogger said in his podcast about the conference. [img]https://d1qy7qyune0vt1.cloudfront.net/webroot-en/attachment/3956i1183B144E50E9214.jpg[/img] This, according to [url=http://www.businessinsider.com/gruber-new-iphone-software-2013-6]Business Insider[/url], where it was previously reported the computer giant has been in preparations for a ‘major overhaul’ of its iPhone and iPad operating system iOS. In April, [url=http://www.busines
[b]60% off Webroot SecureAnywhere Antivirus![/b] [b]30% off Webroot SecureAnywhere Internet Security Plus and Webroot SecureAnywhere Complete![/b] Check out the offer [url=http://www.webroot.com/En_US/sites/promo2.html?utm_source=community&utm_medium=rail&utm_campaign=best]here[/url], and get the best deal on Webroot! :D [img]https://d1qy7qyune0vt1.cloudfront.net/webroot-en/attachment/3436i8519B6D702686F14.jpg[/img]
The U.S. Government has obtained a top secret court order that requires Verizon to turn over the telephone records of millions of Americans to the National Security Agency on an "ongoing daily basis. Here is the following URL for your reading. : [url=http://www.cnn.com/2013/06/06/politics/nsa-verizon-records/index.html?hpt=hp_t1]http://www.cnn.com/2013/06/06/politics/nsa-verizon-records/index.html?hpt=hp_t1[/url] What are your thoughts on this issue??? Is is right or wrong???
Hiding your data in a "time hole?" The future is closer than you may think. According to this article, the proof of concept already exists. In fact, "The cloak successfully hid data added at a rate of 12.7 gigabits per second." If this research pans out, the results will be pretty exciting to see. [i] [/i] [i]If you’ve ever wanted to edit an event from your history, then help may soon be at hand. Electrical engineers have used lasers to create a cloak that can hide communications in a 'time hole', so that it seems as if they were never sent. The method, published today in Nature, is the first that can cloak data streams sent at the rapid rates typically seen in telecommunications systems. It opens the door to ultra-secure transmission schemes, and may also provide a way to better shield information from noise corruption.[/i] [i] [/i] [img]https://d1qy7qyune0vt1.cloudfront.net/webroot-en/attachment/3876i002060A2616ACDCD.jpg[/img] [i] [/i] This is
[img]https://d1qy7qyune0vt1.cloudfront.net/webroot-en/attachment/3866iCFF8C2B1D495BB04.png[/img] [b][img]https://d1qy7qyune0vt1.cloudfront.net/webroot-en/attachment/3864i949975B865B321EF.png[/img][/b] [u][b] Learn More at Our Upcoming Spiceworks eSeminar[/b][/u][b] [/b] It's It's not shocking that many companies allow mobile devices on their networks, but how are they protecting against critical security breaches? Are they doing enough? This webinar will discuss the ever changing BYOD landscape and how to protect your network from malicious mobile applications. Webroot's Grayson Milbourne will present the results of a Voice of IT survey and how perception and reality of risk vary greatly, even with the "spiciest" of IT Pros. [b][url=https://www2.gotomeeting.com/register/761185386]Register Now![/url][/b] [img]https://d1qy7qyune0vt1.cloudfront.net/webroot-en/attachment/3862i6E3C478E8FA43FA6.png[/img]
[b]By Jim Finkle BOSTON | Wed Jun 5, 2013 7:52pm EDT [img]https://d1qy7qyune0vt1.cloudfront.net/webroot-en/attachment/3840i6EB6A498D74BFC0F.jpg[/img] [/b] [b] [/b] [b] (Reuters) - [url=http://www.reuters.com/finance/stocks/overview?symbol=MSFT&lc=int_mb_1001]Microsoft Corp[/url] and the FBI, aided by authorities in more than 80 countries, have launched a major assault on one of the world's biggest cyber crime rings, believed to have stolen more than $500 million from bank accounts over the past 18 months.[/b] [url=http://www.reuters.com/finance/stocks/overview?symbol=MSFT.O&lc=int_mb_1001]Microsoft[/url] said its Digital Crimes Unit on Wednesday successfully took down at least 1,000 of an estimated 1,400 malicious computer networks known as the Citadel Botnets. Citadel infected as many as 5 million PCs around the world and, according to [url=http://www.reuters.com/finance/stocks/overview?symbol=MSFT.O&lc=int_mb_1001]Microsoft[/url], was used to steal from dozens
[b]Do you utilize virtualization? If so, you're probably used to making some sacrifices when it comes to your security. [/b] The most obvious of these sacrifices is the performance degredation. Traditional AV software comes with a performance impact, and you may have resigned yourself to accepting excessive use of your limited virtual resources any time the software is scanning, updating, or even idling. Worse yet, when it steps up to do its job for you, it can often times have negative repercussions in terms of what happens resource-wise. And if you try to fight the performance impact with an agentless antivirus system, historically, you should be prepared to sacrifice the quality of your security instead. If you're going with an agentless antivirus system, you can't scan virtual memory, which is right where many types of malware try to hide. Thus, you recoup performance at the expense of security. [img]https://d1qy7qyune0
[b]Reset Your World: The Evolving Role of Risk Management and Information Security[/b] On June 10-13, 2013, Gartner will host its Security & Risk Management Summit in Washington D.C. Webroot will be on site, meeting with Gartner analysts and attendees. As a thought leader in the security industry, we are excited about meeting other security experts and analysts to discuss other viewpoints and emerging trends. If you are a business or IT professional who is attending the event and would like to chat with our own [url=https://community.webroot.com/member/profile?mid=122]GeorgeA[/url] while you're there, send him a private message, and he'll reach out to you. [img]https://d1qy7qyune0vt1.cloudfront.net/webroot-en/attachment/3836i2B3DD484BDA99046.gif[/img] [b]From Gartner:[/b] [i]After nearly a decade of steady progress toward maturity, IT security and risk management have reached a tipping point.[/i] [i]The Nexus of Forces — social, mobile, cloud
[img]https://d1qy7qyune0vt1.cloudfront.net/webroot-en/attachment/3834iCE64366A0EF45E0A.jpg[/img] [list] [*]By [url=http://www.wired.com/threatlevel/author/davidkravets/]David Kravets [/url] [*]06.04.13[/list][img]http://www.wired.com/images_blogs/threatlevel/2013/06/computerlock.jpg[/img][i]Photo: [url=http://www.flickr.com/photos/fboyd/4123050832/]Â°Florian[/url]/Flickr[/i] If a judge orders you to decrypt the only existing copies of incriminating files, are your constitutional rights against compelled self-incrimination being violated? That’s the provocative question being raised as a Wisconsin man faces a deadline today either to give up his encryption keys or risk indefinite imprisonment without a trial. The defendant’s attorney, Robin Shellow of Milwaukee, said it’s “one of the most important constitutional issues of the wired era.” Shellow is making a novel argument that the federal magistrate’s decryption order is akin to forcing her client to build a case for the go
The h-online wrote: [i] [/i] [i]VirusTotal is now able to help detect exploit attempts made using video and music files in ASF format. The ASF format is able to include embedded URLs which are opened automatically when the files are played. The detection service determines the destination of these URLs. This service is not yet offered by local anti-virus software.[/i] [b]Full Article[/b]: [url=http://www.h-online.com/security/news/item/VirusTotal-detects-social-engineering-in-media-files-1876237.html]http://www.h-online.com/security/news/item/VirusTotal-detects-social-engineering-in-media-files-1876237.html[/url] I'm assuming that WSA is covering for this as well, unless someone can tell me otherwise?
Hi. My name is Marc, from Scottsdale, Arizona. I have just started using Webroot Secure Anywhere. I usually do not take the time to write product reviews good or bad, but I am so impressed by the product that I wanted to leave a 5-star review somewhere. I purchased it direct from the company website, as opposed to Amazon or other retailer where they have a system for user reviews. Is there such a place here, or should I post back to this forum with my review and some technical observations? Thanks.
Already have an account? Login
Login to the community
No account yet? Create an account
Enter your username or e-mail address. We'll send you an e-mail with instructions to reset your password.