Explore topic-wise InterviewSolutions in .

This section includes InterviewSolutions, each offering curated multiple-choice questions to sharpen your knowledge and support exam preparation. Choose a topic below to get started.

1.

Solve : eye Watch will drive Apple down.?

Answer» FILL HEADLINE is:
iWatch, The DISTRACTION That Will Drive APPLE's Stock Down

Quote
...A year ago, who needed to buy a watch when you could pull a smartphone out of your pocket and read the time on a brightly-lit screen? Yet that sentiment may change soon enough....
FULL Story  on Forbers...
2.

Solve : Internet's 'bad neighbourhoods' spread scams and spam?

Answer»

About 50% of all JUNK MAIL on the net emerges from just 20 internet service providers (ISPs), a study has found.

The survey of more than 42,000 ISPs tried to map the net's "bad neighbourhoods" to help pinpoint sources of MALICIOUS mail.

The survey by a researcher in the Netherlands found that, in many cases, ISPs specialise in particular threats such as spam and phishing.

Methods to THWART attacks and predict TARGETS also emerged from the study.

Full story: http://www.bbc.co.uk/news/technology-21798829

3.

Solve : Apple iOS bug lets fake Apps run.?

Answer»

Major media is now reporting a new Apple iOS flaw.
Here is ONE:
Apple iPad, iPhone Vulnerable. - Daily Mail UK
QUOTE

...
Cybersecurity researchers have warned that a bug in Apple Inc's iOS operating SYSTEM makes most iPhones and iPads vulnerable to cyberattacks.
Cybersecurity firm FireEye says the bug enables hackers to access their devices by persuading users toinstall malicious applications with tainted text messages,emails and web links.
The malicious application can then be used to replace genuine, trusted apps that were INSTALLED through Apple's App Store, including email and banking programs, with malicious software through a technique that FireEye has dubbed 'Masque Attack.' ...
Here are tips from the above source:
Don't install apps from third-party sources other than Apple's official App Store or the user's own organization
Don't click 'Install' on a pop-up from a third-party web PAGE, no matter what the pop-up says about the app.

Good advice!
4.

Solve : Apple iMessage Lawsuit Go Ahead?

Answer»

Can Apple be held countable for missing messages?
A judge has ruled  Apple may face a Lawsuit for lost messages.
Source:
http://www.valuewalk.com/2014/11/apple-imessage-lawsuit/
Headline:
A U.S. DISTRICT Judge has GIVEN the go-ahead to a lawsuit against Apple filed in May over disappearing iMessages.
Quote

Apple Inc. (NASDAQ:AAPL) has been ordered by the U.S. District COURT Judge Lucy Koh to clarify its stand over the disappearing iMessage from the iPhone, says a report from CNET. The judge said that the company should be answerable to users over the iMessage issue while switching from the iPhone to another operating system, regarding which a FEDERAL lawsuit was filed in May.
Read the article. The messages were not lost. But the messages can not be forwarded to another OS. Specifically, Android or Windows.
Comments anyone? 

5.

Solve : Windows patch?

Answer» Here's a significant PATCH from Windows. I wonder if XP will GET the patch?
6.

Solve : New viruys hits Apple OS via USB.?

Answer»

Any IPHONE user KNOWS he can connect a iPhone to a PC using USB. Now there is a NEW threat.
Quote

According to researchers at Palo Alto Networks, the so-called WireLurker virus can infect your iPhone or iPad from a simple USB CONNECTION. Hundreds of thousands of users have been INFECTED already, say researchers.
Source: Computerworld
Plugging in your iPhone? Don't blindly trust Macs or chargers...
My charger?   
Quote
Apple says it's already fixed the problem, but independent infosec geeks say the company still has a long way to go, and that the problem isn't limited to China.
7.

Solve : Computer hijacking arrests in UK and across Europe?

Answer»

Fifteen people have been arrested, including four in the UK, in connection with the hijacking of computers.

Police say the individuals were using software designed to remotely control computers - allowing for the stealing of information.

The other arrests were made in Estonia, France, Romania, Latvia, ITALY, and Norway.

The PRACTICE, which in some instances can grant access to a victim's webcam, is KNOWN as "Ratting".

The phrase takes its name from the malicious software used to gain control - Remote Access Trojans (Rats).

Using Rats to view people through their own webcams, without their knowledge, is becoming "increasingly common" according to the UK government-backed Get Safe Online advice website.

The NATIONAL Crime Agency (NCA) said it arrested two 33-year-old men, and a 30-year-old woman, in Leeds.

Full story: http://www.bbc.co.uk/news/technology-30146176 Quote

The practice, which in some instances can grant access to a victim's webcam, is known as "Ratting".
A new story has Russian hackers watching UK families who did not change the webcam password.
http://www.dailymail.co.uk/news/article-2841714/Russians-spy-UK-families-webcams-Hackers-use-computer-watch-home-post-photos-online.html

Never leave your webcam in the bedroom.
8.

Solve : Cdhrome Confsirms XP death with Unsupport.?

Answer»

EDIT:The announcement was made last year. But April 16, 2016 was given as the date for no more updates for Chrome on XP.

You can still use Google Chrome on Windows XP. Bat do not expect Google to update any issues related to Windows XP. In other words, if a problem is found only on Windows XP, do not hope Google with fix it.
Here is the announcement:
Quote

Today, we’re ANNOUNCING the end of Chrome’s support for Windows XP, as well as Windows Vista, and Mac OS X 10.6, 10.7, and 10.8, since these platforms are no longer actively supported by Microsoft and Apple. Starting April 2016, Chrome will continue to function on these platforms but will no longer receive updates and security FIXES.
https://chrome.googleblog.com/2015/11/updates-to-chrome-platform-support.html
Now, having said that, the current version of Chrome may still be the better choice for users of Windows XP.  Do you agree?   

(Yes, I use both Chrome and Firefox on XP. But I had to backtrack with  Firefox. Firefox could not find my printers when I went to PRINT a page.)
While we're on the topic of this sort of recent EVENT, The Compaq Deskpro, which is planned for release in the next year or so, combines IBM's CGA graphics with MDA graphics and a faster processor, giving the IBM PC XT a run for it's money. We can look forward to learn more about this unfolding market competition over time. Who knows what the rest of the 80's will bring.
9.

Solve : European Parliament Eyes Google Break-Up?

Answer»

About a dozen or more sources on this story.
Washington Post.
http://www.huffingtonpost.com/2014/11/21/european-parliament-eyes-google-break-up_n_6202020.html
Forbes.
http://www.forbes.com/fdc/welcome_mjx.shtml
Reuters.
http://www.reuters.com/article/2014/11/21/us-google-antitrust-idUSKCN0J525V20141121
Quote

(Reuters) - The European Parliament is preparing a non-binding resolution that proposes splitting Google INC's (GOOGL.O) search engine operations in Europe from the rest of its business as one possible option to rein in the Internet company’s dominance in the search market.
European politicians have grown increasingly concerned about Google's and other American companies' command of the Internet industry, and have sought ways to curb their power. A public call for a break-up would be the most FAR-reaching action PROPOSED and a significant threat to Google's business ...
If they don't like it...just turn it off.
You really think Google would lose in this scenario ? ? Quote from: patio on November 23, 2014, 05:18:56 PM
If they don't like it...just turn it off.
You really think Google would lose in this scenario ? ?
You want me to answer that? Really?
From the articles I have looked at so far, it would seem that the EU has more to lose here. I have no ill will toward the EU, but they have taken a position that might hurt their credulity.
To be technical, parliament has no authority until the commission makes a move against Google. So that is what I read. Is that right?
10.

Solve : Russia hacking?

Answer»

The Russians are now into the hacking game here.At least this exploit requires someone to OPEN and e-mail attachment to get infected with trojan to allow for the attack I SUPPOSE. It COULD have been far worse if it was a wide open ZERO day that targeted Windows Update Service to slip in a dirty non official update that opened up remote connectivity over port 80 etc.

11.

Solve : Apple bans 'bonded servitude' for factory workers?

Answer»

Apple has banned the practice of bonded labour - where new recruits are charged a fee - from its factories.

In its latest audit of factory conditions, the iPhone maker said that any such fee must be paid by its supplier and not the employee.

Apple began the audits following criticism of the working conditions in some of its factories.

It comes as a report from labour RIGHTS group China LABOR Watch questioned the low wages earned by some Apple workers.

Deeply offended
Its 2015 Supplier Responsibility Progress report said it had told its suppliers in October that it was outlawing bonded servitude from the beginning of this year.

"That fee NEEDS to be paid by the supplier, and Apple ultimately bears that fee when we pay the supplier, and we're OK doing that," said Jeff Williams, Apple's senior vice-president of operations.

Bonded servitude or labour sees new workers charged a fee - sometimes equivalent to a MONTH's SALARY or more - for being introduced to a factory, typically by third-party recruiters.

Full story: http://www.bbc.com/news/technology-31438699Nothing will come of this...it'll still go on.

12.

Solve : Kaspersky Labs has uncovered NSA malware?

Answer»

This is filed under the "Well DUH!" news section but nonetheless an important finding.

I wouldn't normally link to Reddit for news but the first few comments have a lot of good information.

Source: Kaspersky Labs has uncovered a malware publisher that is pervasive, persistent, and seems to be the US Government. They infect hard drive firmware, USB thumb drive firmware, and can intercept encryption keys used

Quote

WHAT MAKES THE EQUATION GROUP UNIQUE?

Ultimate persistence and invisibility

GReAT has been able to recover two modules which allow reprogramming of the hard drive firmware of more than a dozen of the popular HDD brands. This is perhaps the most powerful tool in the Equation group’s arsenal and the first known malware capable of infecting the hard drives.
By reprogramming the hard drive firmware (i.e. rewriting the hard drive’s operating system), the group achieves two purposes:

An extreme level of persistence that helps to survive disk formatting and OS reinstallation. If the malware gets into the firmware, it is available to “resurrect” itself forever. It may prevent the deletion of a certain disk sector or substitute it with a malicious one during system boot. “Another dangerous thing is that once the hard drive gets infected with this malicious payload, it is impossible to scan its firmware. To put it simply: for most hard drives there are functions to write into the hardware firmware area, but there are no functions to read it back. It means that we are practically blind, and cannot detect hard drives that have been infected by this malware” – warns Costin Raiu, Director of the Global Research and Analysis Team at Kaspersky Lab. The ability to create an invisible, persistent area hidden inside the hard drive. It is used to save exfiltrated information which can be later retrieved by the attackers. Also, in some cases it may help the group to crack the encryption: “Taking into account the fact that their GrayFish implant is active from the very boot of the system, they have the ability to capture the encryption password and save it into this hidden area,” explains Costin Raiu.
The NSA also has a special piece of software that can actually create clowns and they come out of the floppy drive, according to a former NSA employee.And that's why I normally wouldn't link to Reddit as a news source BC. They don't take anything seriously. Especially when there are fake KARMA points to gain. It's a race to see just how fast and how far they can take a post off topic.

This Kaspersky finding isn't a joke. Law enforcement, especially federal, can bend the rules farther and faster than any criminal can. If you or I have typed a certain keyword into Google, Bing or any other search engine or visited a certain website then this malware can easily be on our computer right now. I haven't broken any federal laws and I don't deserve to be spied on.

Maybe I need a Snickers. I get all Edward Snowden when I'm hungry.... Quote from: evilfantasy on February 17, 2015, 11:54:56 AM
And that's why I normally wouldn't link to Reddit as a news source BC. They don't take anything seriously. Especially when there are fake karma points to gain. It's a race to see just how fast and how far they can take a post off topic.

This Kaspersky finding isn't a joke. Law enforcement, especially federal, can bend the rules farther and faster than any criminal can. If you or I have typed a certain keyword into Google, Bing or any other search engine or visited a certain website then this malware can easily be on our computer right now. I haven't broken any federal laws and I don't deserve to be spied on.

Maybe I need a Snickers. I get all Edward Snowden when I'm hungry....

My point was this. "according to a former NSA employee."

You can staple that onto anything if you want to write an article, and, automatically, what you say is gospel. Considering online journals and news sites have been found fabricating quotes completely from people who they never talked to, I wouldn't be surprised if they just invented the information that "came from a former NSA employee". It makes sense that the name would be ANONYMIZED I suppose and there would be no way to externally verify it to protect them, but with such claims they need to at least have some corroboration outside of that.So you think the Kaspersky article is, in part, fabricated? They didn't find the malware or the fake company behind it? You think the NSA isn't stepping all over the US Constitution that protects us from what they are accused of doing? Really? Quote from: evilfantasy on February 17, 2015, 01:53:34 PM
So you think the Kaspersky article is, in part, fabricated? They didn't find the malware or the fake company behind it? You think the NSA isn't stepping all over the US Constitution that protects us from what they are accused of doing? Really?

the Kaspersky article says nothing about the NSA. it is the other articles that link the Kaspersky article which make that claim, and they are highly speculative.

What they found (Kaspersky) is malware created by a group they (or themselves?) call "The Equation Group".

Within the article, Kaspersky mentions that "The Equation Group" has "solid links indicating that the Equation group has interacted with other powerful groups, such as the Stuxnet and Flame operators – generally from a position of superiority."

The "logic" goes that stuxnet, based on very little, was created by the NSA, and so was Flame. (many of the articles claim "there are strong connections between worms like stuxnet and the NSA" which is pretty much a fabrication, as those "connections" don't exist.

The real "connection" is:

1.Equation Group interacts with those responsible for the stuxnet and flame operators acting as an authority towards them
2.Stuxnet was created by a malware authorship sponsored by the Israeli government to try to damage or otherwise negatively impact Iranian public works. (somewhat speculative)
3.Because Israel's actions against it's neighbours are generally supported by the United States, and if there was a more powerful entity associating with the Israeli during the creation of stuxnet, than that "more powerful entity"- The Equation Group- must be the NSA.

Tenous connections, finely drawn.


Quote
You think the NSA isn't stepping all over the US Constitution that protects us from what they are accused of doing? Really?
Need a lighter for that strawman?

I didn't think you were this naive BC. At least you weren't at one time.A fine argument! I'm convinced.From your replies there is no changing your mind or even meeting in the middle so I would rather avoid the circle jerk, thanks.I also have a rule of not discussing politics with family and friends. We won't see eye to eye on this so no need in hurting each others feelings.The "naive" here would be the people who were surprised to LEARN about it. It's like everybody was like "Oh, remember how your average American was often under surveillance during the McCarthy era? Good thing they never did the same thing with the internet, whew! Dodged a bullet there guys! Now let's anonymize ourselves online using this anonymizer created by the NSA." and then was flabbergasted to learn that, powerpoint skills aside, "OMGS THEY KNOW HOW TO INTERNETS".

Yes, It is HUGE revelation that a similar branch of the government that was responsible for effectively suspending their country's founding documents when it was convenient to "drive out the reds" after bills dictating the cause were passed into law during the Cold War are also responsible for effectively suspending their country's founding documents when it is convenient to "find terrorists" after bills dictating the cause were passed into law.

Forgive me, but my attitude has been mostly surprise that there were people so naive as to think that it wasn't going on, and then when it all came out everybody was going on like it was big news. They may as well have declared the sky was blue for all the new information it actually presented. But then following that suddenly everything conncets back to it. Like come on this isn't illuminati conspiracy, if anything it's just Hoover's FBI all over again.


EDIT: For some reason I feel it important to point out that the U.S constitution doesn't apply to me anyway, since I'm not an American, but the presumption one can make (I am assuming, for the moment, that all the articles are true and every single one of them is 100% accurate in their connections) would be that Canada is no doubt a party to this in some fashion, as would be most U.S allies.

The only thing truly surprising would be that they became so incompetent that people actually know any details and the person responsible (who has a true hollywood hero backstory) hasn't been "dealt with".
Quote from: BC_Programmer on February 17, 2015, 02:48:26 PM
The "naive" here would be the people who were surprised to learn about it.

The very first comment of mine when I posted this.

Quote from: evilfantasy on February 16, 2015, 07:44:59 PM
This is filed under the "Well DUH!" news section but nonetheless an important finding.

Quote from: BC_Programmer on February 17, 2015, 02:48:26 PM
EDIT: For some reason I feel it important to point out that the U.S constitution doesn't apply to me anyway, since I'm not an American, but the presumption one can make (I am assuming, for the moment, that all the articles are true and every single one of them is 100% accurate in their connections) would be that Canada is no doubt a party to this in some fashion, as would be most U.S allies.

What makes this so important is that you my friend are presumably affected by this. The NSA does not recognise or acknowledge virtual borders. The US Government's attitude towards data on the internet, including PEOPLES personal password protected and/or encrypted data, is no different than how many people feel about downloading copyright protected material. It's there so they are entitled to use it however they want to. It is state sponsored malware and you are right in suspecting that it isn't just the USA using this malware. It's not a local story. It's worldwide. Quote from: evilfantasy on February 17, 2015, 03:07:18 PM
What makes this so important is that you my friend are presumably affected by this. The NSA does not recognise or acknowledge virtual borders. The US Government's attitude towards data on the internet, including peoples personal password protected and/or encrypted data, is no different than how many people feel about downloading copyright protected material. It's there so they are entitled to use it however they want to. It is state sponsored malware and you are right in suspecting that it isn't just the USA using this malware. It's not a local story. It's worldwide.

But this does bring us back, I think, to my previous post- the Kaspersky article doesn't mention NSA. So I am unclear, personally, how that connection is made. Aside from the known information fitting into the narrative (via the jumps I noted previously).  some other articles do quote "NSA Contacts" and "former NSA employees". That sort of nebulity is troublesome for me in terms of TRUST-factor. I suppose it comes down to a case of trust. I don't trust news sites, and I truly do not think they are above fabricating information, particularly since they have been found to do just that sometimes.

I also do not think questioning news magazines/articles should be considered naivety. If we are going to be skeptical of, say, the NSA's motives (or whatever), I don't think that skepticism should stop when it comes to the source of the news on which we base that skepticism. It's particularly worth considering how many such news sites have- well, ballooned- the original claims. kaspersky's article makes it clear it was intended for specific high-profile targets, and doesn't mention the NSA... Fair enough.  Reuters than has the aforementioned quotation, which (allegedly) connects the entire operation to the NSA. And then you have sites taking that and turning it into "Your hard drives were RIDDLED with NSA SPYWARE for YEARS, and attributes claims to Kaspersky "Kaspersky's analysis says the NSA...". I hope you can understand what I'm saying here, because that is just a ridiculous title given what we can see in the Kaspersky article used as the primary source, and is nothing more than scare-mongering clickbait, and this sort of thing is only made worse with the passage of time as well.
Forget the unnamed sources for a minute and nevermind the fact that we all have had suspicions about the NSA creating malware. Besides those two things it's not so much that the story was published but rather it's the physical evidence that Kaspersky has found. Programs like this run by the US have a very bad record of not just over stepping the "rules" but completely ignoring the rules to begin with. (The rules being the US Constitution) I'm all for counter terrorism but judging from the past this will trickle down to the state level and be turned against everyday citizens, if it already hasn't. If this malware is embedded as deeply into the hardware as Kaspersky claims you have to ask yourself just how it got there to begin with? AMD? Cisco? Intel? Do you see where I'm going here? Who else is in on this because it sounds like it is being built into the hardware at the manufacturing level and THAT is what concerns me the most.

The NSA freaked out on Google, Apple and other companies when they said they will no longer make it possible for the NSA to snoop on their users. Is this how the NSA will get around the new security? Building the malware into the hardware seems like a pretty effective way to do it and that means they are spying on everyone. Not just US citizens or suspected terrorists but the entire world population.If the story is fake, in time it will be exposed. Stories like that one are coming in every day. Are all such bogus because the lack of some detail?
Here is another:
NSA planted surveillance software on hard drives, report says
The link is to CNET. So must we dismiss it?
OR:
Find out if the UK used NSA data to spy on you

The link below was published some time ago. Nothing new.
http://en.wikipedia.org/wiki/Terrorist_Surveillance_Program
Quote
During the Obama Administration, the NSA has allegedly continued operating under the new FISA guidelines despite campaign promises to end warrantless wiretapping.[3] However, in April 2009 officials at the United States Department of Justice acknowledged that the NSA had engaged in "overcollection" of domestic communications in excess of the FISA court's authority, but claimed that the acts were unintentional and had since been rectified.[4]
Accoutring the that, it was unintentional.  So it does not count.
13.

Solve : Fake luxury goods online sites closed by UK police?

Answer»

Two thousand websites selling fake luxury goods have been removed since the start of the year, UK POLICE say.

Counterfeit goods from brands such as Burberry, Longchamp and Abercrombie & FITCH were among the products offered.

The raids were the result of a collaboration between brand-protection groups and internet registries.

The Police Intellectual Property CRIME Unit, run by City of London Police, also warned the sites could be harbouring malicious software.

"The criminals BEHIND these websites will often take advantage of your personal details, such as financial information, and so people may find their card has been compromised and used for other fraudulent scams," said Det Ch Insp Danny Medlycott, who heads the unit.

"The sites themselves can also be harmful, as they contain malware and viruses that can infect your computer.

As a general RULE, "if it looks too good to be true, then it probably is", he said.

And heavily discounted products were "often a telltale sign that something isn't right", he added.

Full story: http://www.bbc.com/news/technology-31454822

14.

Solve : MiniTool Partition Wizard Bootable?

Answer»

Maybe it is more of a PRESS Release taht real news. STILL, they claim it is more compatible now with Windows 8.1 and the preview of 10.
MiniTool Partition Wizard Free 9 simplifies OS migration
The ARTICLE goes on to say:
Quote

The new wizard is designed to make it possible to migrate the OS partition to a new SSD or hard disk with a single step: once clicked, users SIMPLY select the destination drive and the wizard will wipe it and copy all required partitions to migrate the OS to the new drive.
For a free product, that SOUNDS good!
15.

Solve : Mainstream Win 7 Support Ends, but still extended support til 1/14/2020?

Answer»

Windows 7 has  just REACHED its Microsoft Planned MILESTONE in its life cycle TOWARDS OBSOLESCENCE. Still extended support until 2020, but here is the article.

http://www.kitguru.net/gaming/operating-systems/matthew-wilson/mainstream-windows-7-support-ends-today/Quickest life-cycle since WinME..... Or MS BOB

16.

Solve : Apple Reports Record First Quarter Results?

Answer»

Goods news if you are long in Apple stock.
Apple Report
Quote

Growth led by record revenue from iPhone, Mac & App Store
CUPERTINO, California—January 27, 2015—Apple® TODAY announced financial results for its fiscal 2015 first quarter ended DECEMBER 27, 2014. The Company posted record QUARTERLY revenue of $74.6 billion and record quarterly net PROFIT of $18 billion, or $3.06 per diluted share. These results compare to revenue of $57.6 billion and net profit of $13.1 billion, or $2.07 per diluted share, in the year-ago quarter. GROSS margin was 39.9 percent compared to 37.9 percent in the year-ago quarter. International sales accounted for 65 percent of the quarter’s revenu
Meanwhile,  Google and Microsoft are not so hot.
17.

Solve : Cyber-security experts judge '$1bn bank hack' report?

Answer»

A leading security company says it has uncovered an "unprecedented" cyber-attack on up to 100 banks, which could result in $1bn (£648m) of losses.

But security experts are split over the severity of the alleged breaches, and on how much cash was stolen.

Russian company Kaspersky Lab said the hackers had accessed the banks' networks by sending spoof emails to staff.

It added that the criminals manipulated cash machines to dispense stolen money.

The majority of banks that ALLEGEDLY fell victim to the scheme are based in Russia, with a handful of others SPREAD across China, Ukraine, and Uzbekistan, and other countries.

One bank is said to be based in the UK, although it is not believed to be a well-known brand.

Kaspersky said it had worked with Interpol and Europol on the investigation.

Europol director Rob Wainwright told the BBC the agency had "issued warnings and intelligence to national law enforcement AUTHORITIES and European banks through the European Banking Federation".

He added: "Reported INFECTIONS in the EU are unconfirmed at this STAGE, although we are continuing to work actively on the matter."


Full story: http://www.bbc.com/news/technology-31487258

18.

Solve : North Korea's Internet down; cause unknown?

Answer»

Just few hours ago,  media reports some IPs in North Korea are down.
Link:
http://www.politico.com/story/2014/12/north-korea-internet-113746.html
The story is repeated by some sources.
http://recode.net/2014/12/22/north-koreas-internet-connections-disrupted-may-be-under-attack/
Quote

“They’re pretty stable networks NORMALLY,” Madory said. “In the last 24 hours or so, the networks in North Korea are under some kind of duress, but I can’t tell you exactly what’s causing it.” Possible reasons include an attack by another NATION or third-party hackers, he said, but also things like power outages and network maintenance. “
Lots of activity tonight...lol

Reminds me of the movie WARGAMES. Fortunately its not nukes and only represents some of the SAMPLED network traffic.

http://map.ipviking.com/They were back ONLINE today but were offline again in a few hours.

I saw a funny comment on Reddit yesterday.
Headline: North Korea has lost Internet access
Comment: South Korea must have changed their Wifi password

 China turned off their service. The country first needs to work on getting stable electricity before internet. It would work much better that way. I predict all in china will have a cell phone before they have electricity. Or indoor bathrooms. 
19.

Solve : HP announces mini pavilion desktop - under $200.?

Answer»

Last month HP introduced a new line of mini pavilion desktop boxes ranging in price from  $ 179. 99 ,   $ 319. 99  and  $ 449. 99 with either white or BLUE. Why no red?

Here is a pix:


Just go to the HP site and it will likely pop up.
Or look at this review:
HP announces new Mini Desktops for home and Workstation
Personally, I  think it will flop big time. There is noting impressive about it. Except being small.  LOOKS pretty similar to the INTEL NUC that has been out for a while.  Sure it's nothing special but they are very power efficient and work great for uses such as as home theatre PCs.32G mem CARD...i PREDICT fail as well...

20.

Solve : Wave of Fake Federal and State Tax Returns Filed?

Answer»

This is not last year's news. It was just now released by the experts.
Quote

The recent flood of fraudulent tax returns -- both state and federal -- is the work of "a criminal gang, possibly working outside the country," a leading cyber security expert told NBC News.
Haywood Talcove, CEO for government solutions at LexisNexis, believes the gang is using stolen user names and passwords to gain access to the accounts of people who use online tax preparation software.
http://www.nbcnews.com/business/taxes/wave-fake-federal-state-tax-returns-filed-experts-say-n302781
How could this impact your use of a PC? WELL, do you do your own tax return? Do you use an on-line service? Read over the story and find how the crooks got into accounts of individuals. It could happen to you.
"Lisa Letchworth, who lives in Washington State, doesn't know how it happened, but crooks got into her TurboTax account. Last Tuesday, when she logged on to start her federal return, she got a nasty surprise. A message on the screen said her return had already been filed and the IRS was issuing a refund of $5,013 to someone else on a prepaid card."

I WOULD be so pissed if that happened to me. I hope she is able to get her refund. The IRS shouldn't issue refunds without some kind of IDENTITY confirmation. I still don't see how the crooks, can get the refunds since the IRS, won't issue until you send them a w-2 and a signed and completed 1040.With electronic filling they send a refund right away. Ask a local tax CONSULTANT. The crooks make bogus copies of everything relevant. The crooks buy the passwords on the black market cheap and then go through the accounts until they find one that looks like a prospect.   
21.

Solve : Android adware 'infects millions' of phones and tablets?

Answer»

Android users are being warned that several popular apps that were on the official Google Play store APPEAR to have contained hidden code that made malicious ads pop up.

Security firm Avast said that one of the apps involved - a free version of the card game Durak - had been downloaded up to 10 million times, according to Google Play's own counter.

Google has now blocked access.

But one EXPERT noted that the problem MIGHT be less widespread than feared.

Avast said that it first became aware of the issue after a member of the PUBLIC contacted it after CARRYING out his own investigation into how his Nexus 5 smartphone had come to be infected with malicious code.

The "adware" was causing spurious pop-up messages to appear that had been made to look like system notifications. These told him his phone was running "slow" and that he needed to install new software to fix the problem.

Full story: http://www.bbc.com/news/technology-31129797

22.

Solve : ARM announces 2016 SoC line-up?

Answer»

ARM is the company that helps with designs for tablets and smartphones. The UK company is in the news due to the new version of Raspberry Pi.  However, the announcement just now of new SoC for 2016 goes way beyond  cheap computers.
http://www.fudzilla.com/news/processors/36913-arm-announces-2016-soc-line-up
Quote

ARM is also helping vendors MIGRATE from 28nm and 32nm planar nodes with POP IP for TSMC’s upcoming 16nm FinFET+ (16FF+) process.
A number of major companies in the SoC space, including TSMC, MediaTek, Rockchip, Cadence and HiSilicon welcomed ARM’s latest announcement, DESCRIBING the A72 as a “game changing” DESIGN.
See that? A16nm design is a big step from a 28mm. That means about 3.5 times better performance with the same BATTERY power.
23.

Solve : Ross Ulbricht: Silk Road creator convicted on drugs charges?

Answer»

The man accused of operating Silk Road, a deep web marketplace where illegal drugs were sold, has been found guilty.

Ross Ulbricht, 30, was convicted by a Manhattan jury on all seven counts including narcotics and money laundering conspiracies.

Prosecutors said more than a million drug deals took place on Silk Road, earning Ulbricht about $18M in Bitcoins

His defence lawyers had argued he was framed for much of the site's activity and had quit the site.

The jury deliberated less than day before handing down the verdict, which leaves Ulbricht facing a POSSIBLE life sentence.

US Attorney Preet Bharara said the conviction sent a clear message: "The supposed ANONYMITY of the dark web is not a protective shield from arrest and prosecution."


Full story: HTTP://www.bbc.com/news/world-us-canada-31134938 "The supposed anonymity of the dark web is not a protective shield from arrest and prosecution."
Only corporation have that shield. Crazy sentence CONSIDERING he never touched a drug.

24.

Solve : FREE Windows for Raspberry PI?

Answer»

Interesting...

http://www.wired.com/2015/02/internet-anything-microsoft-brings-free-windows-raspberry-pi/?mbid=social_fbGoing to be interesting to see.  I imagine it's going to be a bit limited like Windows RT since there aren't going to be many ARM binaries for Windows yet.From the article:
Quote

Since its release in 2012, the original Raspberry Pi has been used to build everything from aerial drones to beer fermentation systems to supercomputers. Microsoft wants in on this mini-revolution. And this could lead to bigger things.
DIY Beer Project?  No GUI, just a kernel compiled for ARM, as far as I can make out. Command line only. Like a Windows version of embedded Linux like you find in routers, NAS drives etc.



Quote from: Salmon Trout on February 03, 2015, 03:55:00 PM
No GUI, just a kernel compiled for ARM, as far as I can make out. Command line only. Like a Windows version of embedded Linux like you find in routers, NAS drives etc.
True.
But even routers with tiny OS can show an attractive page like simple HTML in a browser. Might be a useful tablet for web browsing. Maybe some video.
The story is going around. Just founds these:
http://www.eurogamer.net/articles/2015-02-03-faster-windows-10-compatible-raspberry-pi-2-released
http://www.geeky-gadgets.com/raspberry-pi-2-quad-core-hands-on-and-unboxing-02-02-2015/
http://www.theinquirer.net/inquirer/review/2393354/raspberry-pi-2-hands-on-review-video
Very interesting.  Quote from: Geek-9pm on February 03, 2015, 09:06:33 PM
But even routers with tiny OS can show an attractive page like simple HTML in a browser. Might be a useful tablet for web browsing. Maybe some video.

I don't know how much of that will be possible with the cut-down remnant of Windows 10 that the free version will be. It's a shame nobody developed any Linux distros that provided Pi users with web browsing, video playing at 1080p, video streaming, NAS and server functions, etc. Even maybe high altitude robot camera balloons? Oh. Er, wait....

Yeah, I was wondering about that. But apparently it can.
Look at this:
Quote
The Raspberry Pi is a credit-card sized computer that plugs into your TV and a keyboard. It’s a capable little PC which can be used for many of the things that your desktop PC does, like spreadsheets, word-processing and games. It also plays high-definition video.
The Raspberry Pi measures 85.60mm x 53.98mm x 17mm, with a little overlap for the SD card and connectors which project over the edges. The SoC is a Broadcom BCM2835. This contains an ARM1176JZFS with floating point running at 700Mhz, and a Videocore 4 GPU. The GPU is capable of BluRay quality playback, using H.264 at 40MBits/s.
http://archlinuxarm.org/platforms/armv6/raspberry-pi
That article is about the prior release!
The new one is a four-core ARM chip. 

So, this has the potential of  being sold for about the price of a Chrome cast or Roku device and functioning as a mini desktop PC. Plug it  in the HDMI and add keyboard and mouse.  Maybe a external HDD and printer.




Quote from: Geek-9pm on February 04, 2015, 12:27:41 PM
That article is about the prior release!
The new one is a four-core ARM chip. 
Yes, the new chip is a quad ARM 7 while the old is a single core ARM 11, also at 1 GB of RAM it has twice the memory of the previous Raspberry Pi models and 4 times the original Model A.

The point I was making is that the new Raspberry Pi 2 is 100 percent software compatible with the earlier models, which themselves were perfectly capable of web browsing and playing HD (1080p) video.

The version of Windows 10 being made free is a stripped down version targeted at Internet-of-things developers, so expect to see it running gadgets. Nobody should expect to see a full-fledged GUI operating system like the Windows you see on tablets and desktop and laptop PCs.
I can't argue with your logic.
But let me remind you of what you already know.
The minimum  requirements for Windows XP.
Quote
    Pentium 233-megahertz (MHz) processor or faster (300 MHz is recommended)
    At least 64 megabytes (MB) of RAM (128 MB is recommended)
    At least 1.5 gigabytes (GB) of available space on the hard disk
    CD-ROM or DVD-ROM drive
    Keyboard and a Microsoft Mouse or some other compatible pointing device
    Video adapter and monitor with Super VGA (800 x 600)or higher resolution
    Sound card
    Speakers or headphones[
http://support.microsoft.com/kb/314865
Current ATM devices outperform older Pentium CPUs.
By those standards, the raspberry Pi should be able to support an install of Windows XP, it it were an Intel device and not an ARM.  The needed HDD space could be on an external drive.

My point is this: It is really hard to estimate how well a new design can scale up or down. Especially microprocessors.  The ARM 7 family has been very well deployed in a number of devices. The iPad. Game boy. Sirius Satellite Radio receivers. Dreamcast. And lots of other stuff.

Because the ARM is custom made for an application, it is hard to guess at the limitations. The new model had input from Microsoft.  It just my be better than what you would guess.
Here is what I think. If a Raspberry package with keyboard and power supply can sell for under $100 with Windows, it will outperform and outsell  tablets selling for twice the price. Time will tell.  Geek, I am not arguing with you about the power of the Arm7! I am just saying it ain't going to get a full featured Windows 10 OS that is like a PC version of Windows. Every already knows that even the older Pis can run a GUI-heavy OS like Fedora or Gentoo, or FreeBSD (true Unix some say!) so the A7 in the Pi2 is certainly a cpu comparable in capability to one that could run a 14 year old OS WHOSE development STARTED in the 1990s like Windows XP was.

 Right!
It should run an old OS with no issue.
If somebody will port the code.
But why did MS endorse the new Raspberry Pi?  Well, maybe they just want a presence, not really port  real windows to a exterminate  handheld device.
Life hacker has picked up the story.
http://lifehacker.com/the-operating-systems-updated-for-the-raspberry-pi-2-s-1683514788
The Operating Systems Updated for the Raspberry Pi 2 (So Far)

Quote
The Raspberry Pi 2 was released yesterday and it comes packed with a new SoC ** that requires a little tweaking to get operating systems to work with it. So, we decided to dig in and see what operating systems have added support already.
The article says there are five OS that do run on it now. But I have never heard of any of then except Debian.
**SoC
A system on a chip or system on chip (SoC or SOC) is an integrated circuit (IC) that integrates all components of a computer or other ELECTRONIC system into a single chip.
25.

Solve : NETFLIX IS COMING TO LINUX?

Answer»

Quote

NETFLIX IS COMING TO LINUX through HTML5 streaming in the CHROME WEB browser, and Ubuntu might soon have it available in its stable release.
Source:
http://www.theinquirer.net/inquirer/news/2371405/ubuntu-linux-users-might-be-able-to-stream-netflix-soonThe News Editor position is still open...
With Netflix on my Android SMART i don't think I will ever be able to put it down.  I did this post a few months ago. Many others are following the lead of Netflix.
However, Netflix is removing some stuff. Look at this:
http://www.businessinsider.com/netflix-everything-leaving-january-2014-12
"Beverly Hills Cop"
"Beethoven"
"Boyz n the Hood"
"Braveheart"
"Carrie"
... and a lot more. See link above.
But they have also added a bunch of stuff.
http://www.businessinsider.com/netflix-january-2015-1
"Dallas"
"Friends"
"White Collar"
"Psych"
"The Adventures of Puss in Boots"
Quote
The company was established in 1997 and is headquartered in Los Gatos, California. It started its subscription-based service in 1999. By 2009, Netflix was offering a COLLECTION of 100,000 titles on DVD and had surpassed 10 million subscribers.   ...
As of September 2014, Netflix has subscribers in over 40 countries, with intentions of expanding their services in unreached countries (such as New Zealand and Australia).[8]
... Wikipedia.







26.

Solve : No More News from Spain. Why would you care??

Answer»

This is based on a blog from Google date Dec 11 of last year.
http://googlepolicyeurope.blogspot.com/2014/12/an-update-on-google-news-in-spain.html
In essence, it SAYS  a Spanish news tax will shut down the Google news office in Spain. Google will no longer index and list any news published first in Spain.
If other countries shod adopt this practices, it WOULD mike the internet less useful for keeping  up to date on world developments.

Therefore, any Spanish companies that wish to get themselves promoted over the Internet will have to get newspapers outside of Spain to publish their PR. A number of Spanish companions are in the the Hi-TECH industries and this new law may harm them.

CBS news covered this story earlier.
http://www.cbsnews.com/news/google-shutting-down-google-news-in-spain/
Quote

Google last year agreed to help French news organizations increase their online advertising revenue and fund digital publishing innovations to settle a dispute over whether the company should pay for news content in its search results.
Google also had to respond to a ruling this year from Europe's highest COURT, which decided that people have a right to scrub unflattering or outdated information from Google's search engine. That case started in Spain
IMHO, this is not good news for Spain's tech  sector. 
The CH News Editor position is still open...

In case you weren't aware google is not the sole search engine in the Universe... Quote from: patio on January 11, 2015, 05:26:28 PM
The CH News Editor position is still open...

In case you weren't aware Google is not the sole search engine in the Universe...
Google was the target of  the Spanish government. In private conversation the law was called the "Google Tax".

But for anybody that needs to research Spanish publications online, user this:
http://www.searchenginecolossus.com/Spain.html
Once again...i give up...
27.

Solve : FCC says broad band is 25 Mbps plus.?

Answer»

Today FCC says broad band is 25 Mbps plus.
Also on Tom's Hardware:
http://www.tomshardware.com/news/fcc-redefines-broadband-speeds-25mbps,28476.html
And on Consumerist:
http://consumerist.com/2015/01/29/fcc-votes-to-make-25-mbps-the-new-minimum-definition-of-broadband/
Summary:
From now on an Internet Service Provider (ISP) can not advertize broadband service unless the service can really do 25 Mega bits per SECOND (Mbps). This MIGHT mean some PROVIDERS will IMPROVE their service and/or  reduce the price.
Prior to this there had been some talk about revising the definition. The old standard was 6x  lower.
Quote

... the U.S. Federal COMMUNICATIONS Commission (FCC) defined "Basic Broadband" as data transmission speeds of at least 4 Mbit/s downstream (from the Internet to the user’s computer
http://en.wikipedia.org/wiki/Internet_access
I want board band!
28.

Solve : WD Shows Off Fastest 4TB Hybrid SATAe Drive?

Answer»

Western Digital earlier this moth showed a Fast 4TB Hybrid SATAe Drive At Storage Visions 2015
Read more at :
http://www.legitreviews.com/wd-shows-off-fastest-4tb-hybrid-satae-drive-at-storage-visions-2015_156168#RpuDizKjkSs3o3az.99
They claim:
“... demonstration will show how a WD prototype SATAe drive enables world class gaming experience,” SAID Jackson Hsu, product planning division manager of Gigabyte. “Included in our demonstration is work we have done with WD to make the combination of a hard disk drive and a flash subsystem look like a single volume to the end user. This allows the power of having separate devices in a system along with the convenience of having only a single drive to manage.”

Seagate and Toshiba have already shewed off Hybrid drives some time AGO. At Amazon you can buy a 2.5 inch Hybrid drive for  about $80 that gives you a big TB of space with performance t much better than  a STANDARD HDD.
Of course, that is not new. What is new is the above story about what WD claims fro their new hybrid. But they said that before. Now if that can deliver it to the marketplace at a fair price?  I don't know about the drive, but I certainly like the bright red open frame thing they put the demo rig into.
Looks like an Inwin D-Frame.
A little pricy but I do like how Inwin have brought out some very different cases in the last few years.  Their 900 series cases with the full tempered glass panels look amazing IMO and aren't crazily expensive for what they are. Quote from: Calum on January 31, 2015, 11:15:29 AM

A little pricy
OMG!! 329.99 UK pounds (around $500)!!! For a "case"!
It's not the most expensive case out there anyone remember the Thermaltake Level 10?  (Not the GT version or any of the other cheaper ones).  That was around £500 and sold very well indeed (horrible case to build in btw), the limited titanium edition is still available at almost £1000.  I agree it is expensive for what it is but sometimes that's the price you pay for something out of the norm.  Check out some of Lian Li's creations over the years if you want to see some really out of this world designs with equally crazy price tags.  There are plenty of cases to suit most builds at £70-100 tops, £200 should cover the majority of special requirements, above that really it's EITHER limited edition models, "different" cases like this one or the Level 10, or specialised manufacturers like Little Devil or Mountain Mods.  I don't think personally I could ever justify paying £320 for the D-Frame, but quite a few people must have done - it certainly is eye catching hence WD using it as a showcase (pun intended) for their drives.
29.

Solve : Windows 10 Will be free upgrade for 1 year after launch (Win 7 & up)?

Answer»

And, no that doesn't mean you have to pay after 1 year.

Terry Myerson,  executive vice president of the Operating Systems Group:

Quote

We announced that a free UPGRADE for Windows 10 will be made available to customers running Windows 7, Windows 8.1, and Windows Phone 8.1 who upgrade in the first year after launch.

This is more than a one-time upgrade: once a Windows device is upgraded to Windows 10, we will continue to keep it current for the supported lifetime of the device – at no additional charge.

http://blogs.windows.com/bloggingwindows/2015/01/21/the-next-generation-of-windows-windows-10/

Quote from: Salmon Trout on January 21, 2015, 01:40:10 PM
And, no that doesn't mean you have to pay after 1 year.

I mean, they won't make the recipients of the free upgrade pay after they have used it for 1 year. As some have suggested.

Just read this and was going to share this and you beat me to it.. 

Curious as to what the costs will be that havent been announced.

OS's have generally been $89 to $139 for Home and Pro versions, and if a monthly fee, would it be like $2 a month = $48 a year or more.

I personally PREFER a 1 time fee per license and not having to worry about additional costs. Article I read was similar here:

 http://www.digitaltrends.com/computing/windows-10-now-a-free-service-news/My understanding is there isn't going to be a subscription model, (I sure hope not), that for 1 year people running a qualifying OS will be able to upgrade to Windows 10 free of charge, thereafter they (and everyone else) will have to pay whatever one-time price Microsoft decide to charge, and also that people BUYING a "full retail" Windows 10 product will pay one time like they do now for Windows 8 products and did in the past for 7, Vista, XP, etc. That Digitaltrends article says it's "unclear" what will happen after the 1 year period, but the Microsoft blog by Terry Myerson I quoted above seems clear enough.



Very happy to see this, through uni I have 3 copies of Windows 8 and 2 copies of Windows 7 then an additional copy of 7 that I bought when it came out, that means I have 6 copies of Windows 10 for free (excluding the ones that I'll probably GET through uni again) .Hopefully Microsoft will keep track of what Windows 7, 8, 8.1 keys have been used during the free upgrade period so that say 2 years later when you need to rebuild the system clean you can install 7 and then perform the same upgrade to 10 without having to buy it at that point because it was after the 1 year free upgrade period. 

It may be worth while to create an image after you get your free upgrade just in case it will cost you on a reinstall say 2 years later. 

Only MS has figured out how to make MONEY giving things away...i say it's brilliant.
30.

Solve : Making CS a core colledge course.?

Answer»

The full HEADLINE is:
Making it Count: Computer Science SPREADS as Graduation Requirement
From: http://www.usnews.com/news/stem-solutions/articles/2014/11/25/making-it-count-computer-science-spreads-as-graduation-requirement
Quote

Typically, students can take computer science courses as electives, but they don't count as a core course requirement for graduation, said Cameron Wilson, chief operating officer and vice president of governmental affairs for Code.org. In June 2013, the organization partnered initially with Microsoft to advocate for state-level policy changes to make sure computer science can SATISFY a graduation requirement.

"That doesn't mean SCHOOLS would have to teach it. It doesn't mean students would have to take it," Wilson said during the panel discussion. "What it means is students would have some motivation to take it as a core course instead of an elective."
The article is about higher education in the USA. Other countries differ.
31.

Solve : Smuggler Busted For Wearing Suit of 94 iPhones?

Answer» Smuggler Busted For Wearing an Armor-like Suit of 94 iPhones into China
He'd MAKE more with Heroin...At least he smuggled it on the OUTSIDE and not the other mule methods. Why does this phone smell WEIRD.  Quote from: patio on January 13, 2015, 09:07:17 AM
He'd make more with Heroin...

PRC executes drug traffickers.
32.

Solve : W i n d o w s 1 0?

Answer»

We all know it had to happen. Microsoft is finally fixing up WINDOWS 8 with a new gui and no more full screen metro start menu. Sorry inventors of classic shell but you are becoming useless soon.
I am quite excited I did JOIN the windows insider program so i get to preview it. Hopefully its better.Many of us have it.
But it is not officially a beta. It is a preview.
Microsoft continues tinkering with Windows 10 preview
This is from CNET.
Quote

On Tuesday, Microsoft made available a few FIXES and updates to the November Windows 10 Technical Preview BUILD (9879), including one meant to fix Explorer-specific crashes. And it sounds like more fixes will be coming for Build 9879 before this year is out.

Elsewhere is was said that Windows 10 will come in mid-2015.
This item from ZNET may have some details of interest.
http://www.zdnet.com/whats-next-for-windows-10-7000036358/
33.

Solve : Earth's ocean abyss has not warmed, NASA study finds?

Answer»

This was published  by NASA in October. Of special interest is how this study was done with the aid of computers and very advanced image processing technology.

Quote

While the upper part of the world’s oceans continue to absorb heat from global warming, ocean depths have not warmed measurably in the last decade. This image shows heat radiating from the Pacific Ocean as imaged by the NASA’s Clouds and the Earth's Radiant Energy System instrument on the Terra satellite. (Blue regions indicate thick cloud cover.)
Visit  link for full details.
http://www.sciencedaily.com/releases/2014/10/141006101043.htm
Very impressive!  Are you a GW denier, Geek?
Climate change denial - Wikipedia, the free encyclopedia
No, I can't afford it.
Quote
Between 2002 and 2010, conservative billionaires secretly donated nearly $120 million (£77 million) via two trusts (Donors Trust and Donors Capital Fund) to more than 100 organizations seeking to cast doubt on the science behind climate chang
Another quote:
Quote
    As one TOBACCO company memo noted: "Doubt is our product since it is the best means of competing with the "body of fact" that exists in the mind of the general public. It is also the means of establishing a controversy."[35] As the 1990s progressed ...

    As one tobacco company memo noted: "Doubt is our product since it is the best means of competing with the "body of fact" that exists in the mind of the general public. It is also the means of establishing a controversy."[35] As the 1990s progressed ... TASSC began receiving DONATIONS from Exxon (among other oil companies) and its "junk science" website began to CARRY MATERIAL attacking climate change science.
    —Clive Hamilton, Requiem for a Species: Why We Resist the Truth about Climate Change
 began receiving donations from Exxon (among other oil companies) and its "junk science" website began to carry material attacking climate change science.
    —Clive Hamilton, Requiem for a Species: Why We Resist the Truth about Climate Change
It is the technology used that impressed me.
One can make assumptions about what the date prove.
And be very wrong!
34.

Solve : Digital River is almost Dead.?

Answer»

This story was published earlier this month.
 If you did not see it, read it now.
Digital River's stock plummets over MICROSOFT extension
From Star TRIBUNE.  Updated: December 8, 2014
Quote

The stock of Minnetonka-based Digital River PLUNGED 23 percent Monday after the company extended Microsoft’s deadline for deciding whether it would renew a key distribution agreement that expires in March.
Microsoft, a software customer since 2006, was to have made its RENEWAL decision by Dec. 1. But it now has until Dec. 19, the company said in a filing to the U.S. Securities and Exchange Commission.
...
And today is December  19.   
This was found several hours later...   

Digital River and Microsoft's Bumpy E-Commerce Road.
Full Story

So they are not dead yet.
35.

Solve : FCC rules on data roaming. Pro T-Mobile .?

Answer»

In 2011 the FCC made provision that CELL companies could use other carriers for roaming customers. At a 'reasonable' PRICE.  T-Mobile complained.
Here is the story just published by CNET:
FCC sides with T-Mobile on data roaming
Quote

What's that mean for consumers? It could LEAD to lower prices and BETTER coverage for 3G and 4G service when using T-Mobile and SPRINT.  ...
36.

Solve : Sony woes grow. Torrent sites upload stuff.?

Answer»

Before you say 'That is not Computer News', read then sad story.
Sony woes grow
Think about it. Sony is big. If they get  mad enough, they can perhaps make the use of our computers very HARD.
Quote

...comes after a statement released FRIDAY by a North Korean government-controlled website THREATENED the filmmakers of Sony's upcoming comedy The Interview with "stern punishment." The plot of the film centers on two guys, played by Seth Rogen and James Franco, who are sent to North Korea to assassinate LEADER Kim Jong Un.
Somebody explain this, PLEAS
37.

Solve : DIY PC for $150. CNN Money?

Answer»

Yeah, CNN  has a report that somebody is doing a Do It Yourself PC for $150. And it is targeted for children. Really!
Wait! Don't run  away! They have a nice v video with tow cute kids.
Take a look.
DIY computer kit gives gift of coding
Quote

Last year, Kano raised $1.5 million on Kickstarter -- far surpassing its $100,000 campaign goal, which it hit in just 16 hours. And it attracted the attention of high-profile backers like APPLE's (AAPL, Tech30) Steve Wozniak. Now available for the general public, Kano has shipped 20,000 kits around the world.
It was said that kids can learn  do some graphic game coding.  The CH News Editor position is still accepting applications... Quote from: patio on December 12, 2014, 07:14:36 PM
The CH News Editor position is still accepting applications...
I WOULD apply.
But I can not work on Monday,  Thursday and Saturday. 
EDIT: forgot  to mention, by attention span is about twenty minutes.

It's a nice idea but it is still just a raspberry pi which could be purchased a lot cheaper, it just doesn't come with all the other parts to make it appealing to kids.  You are paying for the extras such as the accessories and documentation which would be nice for kids to have, not the computer.

In the end, while it is a cool device, it's not powerful and struggles even with basic web browsing.  They are a great idea in developing countries or for fun projects, but it is not fast enough to be used for any sort of programming at a comfortable speed.

$150 could easily buy a much more capable machine such as a second hand desktop/laptop or a new Chromebook (Which could run Linux if required). Quote from: camerongray on December 12, 2014, 07:20:25 PM
It's a nice idea but it is still just a raspberry pi ...
$150 could easily buy a much more capable machine such as a second hand desktop/laptop or a new Chromebook (Which could run Linux if required).
Point well made. Still, if the documentation is good, it would be a fair investment.
http://www.kano.me/kit?gclid=CJ6k0rGBwsICFU-TfgodtqEAkA
The above link provides some more detail.
But it seems they are not too keen on traditional book learning.
Quote
Manuals are boring. Kano is a story. With illustrated ideas and simple steps, build a computer, make stuff, and explore a new world. Meet cool characters and level up. 
Personally, I would be reluctant to give something to a child that does not load to a real book not encourage reading skills.
Quote
$150 could easily buy a much more capable machine such as a second hand desktop/laptop or a new Chromebook (Which could run Linux if required).

This was my same exact thought when reading about this. I have seen refurb desktop systems for sale for $89.99 with Windows 7 Core 2 Duo CPU, 2GB RAM, 80GB HDD with 1 year warranties which are more powerful. * Note: Most of these refurbs assume you already have a display to use with them as for they come with everything except for the display, but a used flat screen that works such as an old 15 or 17" display could be bought for around $20. Quote from: camerongray on December 12, 2014, 07:20:25 PM
It's a nice idea but it is still just a raspberry pi which could be purchased a lot cheaper, it just doesn't come with all the other parts to make it appealing to kids.  You are paying for the extras such as the accessories and documentation which would be nice for kids to have, not the computer. ...
You're also paying for the custom Kano OS which comes preloaded on the SD CARD.

You guys can poke fun at this all you want but it really is a nice little kit and not outrageously priced at $150.  Yes, you could buy a Raspberry Pi for $35 but then you still need an SD card, keyboard, power supply, speakers, case and cables.  You could buy a Chromebook or 2nd hand computer for about the same PRICE but then you would just have the computer without the Kano OS and other parts that make up the whole kit.

If you guys have experience with the Kano OS and can honestly say that it isn't well designed for kids to learn from then I could see your argument but since I doubt you do, I'm not sure why you're knocking it down.

I have a Raspberry Pi and I am currently downloading the Kano OS from their website and plan to put it on an SD card and check it out.  That's the only way I know of to truly know if this kit would be something I would recommend to parents with young children as a learning tool.  A Raspberry Pi starter kit could still be put together for around $60 so you are still paying a lot for the kit, sure you don't get the custom OS out of the box or the books however as you stated, you could put it on a RPi yourself.  I totally agree that it is nice to have as a complete kit for young kids (especially if they want to learn how to code but don't know any technical people who help them get it set up), but it is not the amazing bargain computer that it was originally made out to be - It has a very niche market.

If kids are learning to code, they are going to be capable of working a regular OS, be it Raspbian, Ubuntu or even Windows on a refurbished PC.  Kids nowadays are extremely quick at learning technology and don't really need a super easy to use operating system.  A Raspberry Pi would be potentially okay for the most basic of programming but kids would very quickly outgrow it.

I mentor at a group that helps kids learn to code and where they can work on their own projects, a few kids there started off using Raspberry Pis however they quite quickly outgrew them and are now using regular (albeit fairly basic) laptops.  Raspberry Pis are still used, but as a platform to build projects on top of such as little robots.etc, not as their primary programming machine.

The way I see it is that for the average kid who wants a computer to learn to program, for $150 you could easily find quite a nice used laptop (At least a Core 2 Duo, possibly even an older i3/i5).  This could handle all their programming work (from Scratch all the way up to Java/Python.etc) as well as be able to do web browsing at a decent speed.  It also has the advantage of being a single, portable unit whereas the Pi needs to be connected to a monitor, keyboard and mouse.

Don't get me wrong, the Raspberry Pi is a fantastic bit of kit, but $150 seems to be a lot of money for such limited computing power.  The kit has a niche market such as in schools and developing countries, but for the average computer user or kid wanting to learn programming, there are better options out there.You make some good points but I think there is still a market for this kind of thing.

What age group are you working with?  The Kano kit seems to be aimed at pretty young kids.  The fact that they "build it" may give them an additional sense of accomplishment in addition to learning to use and code with it.

I got the Kano OS downloaded and burned onto an SD card but I have to get my RPi back from my son before I can try it.We work with anyone under 19 - Most kids are in the age range of 7 - 18.

You make a good point about building it, my concern really is just that it is quite expensive compared to a standard starter kit, if it were under $80 I'd consider it but $150 is pretty steep for what you get.
38.

Solve : New computer with windows eight?

Answer»

I have heard via the grapevine that a computer with windows eight can be configured to run as windows seven.

Does anyone know if this is true if so how to do it?

Thanks much,
CopasIf it's a pre-built it's BEST to contact the manuf....
Some of the large box retailers can also tell you yes...or no.If it came with Windows 8 Professional, then you should be able to downgrade to Windows 7.

If your looking to alter Windows 8 to look like 7, there are skin applications out there to do this, but not all the functionality of 7 are in the skinned over 8, especially the start menu choices.If you mean the interface, I use Classic Shell and it probably the best start menu replacement available - and it's free!For some it's just a matter of preferences...

His best bet is to check the downgrade path...which MS is no longer pushing BTW...and making sure the PC has all available Win7 drivers...

PERSONALLY i still prefer 7...but that's just me.You can INSTALL third party programs to make it look and work mostly like 7 but you end up using third party software for things like a start menu.  I would generally recommend to just force yourself to learn to use Windows 8 as once you do it it is not that bad, or wait for Windows 10 which has the start menu again.

Machines that come with Windows 8 Pro come with the rights to be downgraded to Windows 7 but the average PC you get will be running regular Windows 8 and therefore doesn't have these rights. Quote

Machines that come with Windows 8 Pro come with the rights to be downgraded to Windows 7 but the average PC you get will be running regular Windows 8 and therefore doesn't have these rights.

I understand that...
However if the User wants to do it as a Help Forum it's on us to instruct them how...not constantly try and talk them into something they don't want...

Just sayin.Here's my desktop in Windows 8.1 I never go the apps desktop. I installed Classic shell and added all my icons exactly as I have it in XP.

[attachment deleted by admin to conserve space]
39.

Solve : Google wants to fight Cancer?

Answer»

Why is this TECHNOLOGY news? Because GOOGLE wants to USE nanotechnology to put sensors in the blond stream to locate and even DISABLE alignment cells.
Full Story from CNN
Are they planning on IGNORING Redheads and Brunettes ? ?

Seems cruel...

40.

Solve : Microsoft ends retail sales of Windows 7 and 8?

Answer»

Quote

Microsoft has officially STOPPED selling retail copies of some versions of Windows 7 and 8.

The date to stop selling the software was set some time ago and should help Microsoft MOVE PEOPLE on to more RECENT versions of its operating system.

Separately, statistics suggest people are finally moving away from some very old versions of Windows.

The next version of Windows, called Windows 10, is due to be released in late 2015.

http://www.bbc.com/news/technology-29880144WOW!
The article also said:
Quote
The current version of Windows, 8.1, will be the default version offered on PCS.

The change will take time to feed through into the market, as many PC makers have large stocks of older versions of Windows and will continue to sell PCs running the software.

Those keen to get a computer running Windows 7 will be able to "downgrade" from 8.1 to Windows 7 Professional but relatively few PC firms offer this option.
What will happen now for those who uses windows 7 & 8? Is there will be automatic upgrade? Quote from: halstead on November 04, 2014, 02:43:24 AM
What will happen now for those who uses windows 7 & 8? Is there will be automatic upgrade?

I'm not sure what this has to do with the topic?
41.

Solve : New USB will be better, faster tahn ever.?

Answer» Type C USB. This was published a few weeks ago.
The next generation of USB cables to be easier to use and push more data.
Quote
In FACT, the upcoming Type-C plug just might end up being the one plug to rule them all: A single USB CONNECTOR that links everything from a PC's keyboard and mouse to external storage devices and displays.
See that? USB to your display! Good-Bye DVI!
Also see:
Reversible USB Type-C wonder cable
Quote
The upcoming Type-C USB cable just keeps looking more and more like the HOLY Grail of cords. The fact that it works no matter which way it's plugged into a port is a game-changer all by itself, but the improvements don't end there: Type-C USB will deliver USB 3.1's blazing 10Gbps speeds
My question is: Why didn't they do it that way in the first place? 

Quote
In fact, the upcoming Type-C plug just might end up being the one plug to rule them all: A single USB connector that links everything from a PC's keyboard and mouse to external storage devices and displays.
Ahh right. Never heard that one before.

The only thing CONSTANT about electronics and technology is that it is always changing and PEOPLE will always be grumbling essentially about how their MDA display won't plug into their new EGA display card.
42.

Solve : USB Malware Code Unleashed?

Answer»

The quotes below are from copyright material. Go to the link for full inkformation.
Quote

Gear and Gadgets
Warning: USB Malware Code Unleashed
Oct 6, 2014 10:40 AM ET // by Sara Angeles, Business News Daily
Back in July, security researchers Karsten Nohl and Jakob Lell revealed that USB sticks have an unfixable security flaw that can allow malware to take over your entire PC -- without you knowing it.
...
The malware can also be executed from any USB device, not just flash drives. This includes USB keyboards, mobile devices and more.
...
http://news.discovery.com/tech/gear-and-gadgets/warning-usb-malware-code-unleashed-141006.htm
So is this news? Because to date there is NOT an defective way to eliminate this threat. Contrary to what you may think, thee is no simple tool to remove the threat. It is a design flaw, not a specific virus.
Another reference:
http://www.pcmag.com/article2/0,2817,2469800,00.asp
We already covered this. Quote from: BC_Programmer on October 25, 2014, 09:02:37 PM
We already covered this.
No we did not. Do some research.
It is not about as virus per se. It is a design defeat. Unfortunately most discussions treat this as just anther virus threat. It is not just another  hacker trick. The USB standard has a fundamental flew that is an open door to whoever wants in.
Earlier this was explained in wired.
http://www.wired.com/2014/07/usb-security/
Since then, few so-called 'expert's, including yourself , failed to get the point. USB is broken.
 If you know part of it,  learn all of it.
Google it. USB is broken
http://www.computerworld.com/article/2476621/malware-vulnerabilities/panic--stop-using-usb--it-s---fundamentally-broken-----badusb.html Quote from: Geek-9pm on October 25, 2014, 09:09:14 PM
No we did not. Do some research.
The topic I linked is about this exact thing. It's based on the EXACT same source articles, the only difference is the one you linked has decided to be three months behind.
Quote
It is not about as virus per se. It is a design defeat.
The fact is that USB drives and devices do not recognize or use some sort of standard in terms of flashing their firmware or controller EEPROMs. most devices don't use EEPROMS at all, and instead use EPROMS; quite a different technology in terms of "badUSB". I wasn't able to find much beyond laymans crap detailing exactly what it exploits, written by PEOPLE who probably have no more of a clue about it. The actual information I was able to find presents details that call many of the original claims of how dangerous it is as unsubstantiated FUD. Most of them assert- as I believe you have done, that USB firmware is "vulnerable".

This raises several questions. Namely- What, Why, How, and Who. As in, What is it vulnerable to, Why is it vulnerable to it, How would it be used and who would benefit from making use of the vulnerability. Answers to these questions are not forthcoming, even though the badUSB source has been released.

I was able to find a sourcecode repository which paints some realistic light over the actual thing, rather than the absolute garbage FUD that you get from a google search that pretty much just gives you clickbait articles:

https://github.com/adamcaudill/Psychson

As we see here the issue is allegedly with the 8051 microcontroller used on a subset of USB devices. It is far from as ubiquitous as the clickbait articles would seem to suggest. In this particular case, it will only apply to Flash Drives, as well- so there goes all the claims in FUD articles about keyboards and mice and such.

Of particular note would be to read through the instructions. There are a large number of pitfalls. for example, some scripts will need adjustments based on the drive. This is done from a perspective of having the drive. The use in malware, however, would require that these payloads be delivered and installed to drives that aren't known.

Also, we can easily note some particular issues in terms of it's application to malware. I would first note the issues page, which currently has around 20 issues where people are having trouble using it on a drive for which they know the parameters.

Browsing the source code, the programs core operation- and the mechanic which allows it to trick various drives- is particularly limited.

DeviceIoControl. it uses this function a lot. This has an issue  though- it won't work unless the program is running as administrator. Also, it only works for very specific drive parameters. The entire concept code only works with a very specific patriot drive and a few compatible drives.

Assuming a device can even be "infected"(flashed) at all, the second issue is that the "malicious" actions of the drive are limited to pretending to be other USB devices. That is of rather limited utility- generally the best option is to pretend to be a keyboard, which is pretty limited in terms of it's ability to infect an arbitrary machine. Thus my reasoning in my post in the other thread which I linked, which was that this would only be particularly useful for malicious uses when you knew exactly what hardware was being used- what flash drives, what OS on the system, etc- thus penetration testing or for trying to get into specific computer systems.

I'd just like th repeat the tidbit that this actually only works for mass storage devices and only very specific ones; many articles are positing that this can be used to basically "infect" keyboards; the publications hosting those articles should probably be kept at arms length, given that the actual source code of the exploit and the information on it explicitly requires a mass storage device and doesn't work with other devices by virtue of the 8052 being a memory controller and not being used in keyboards/mice etc.

Quote
Unfortunately most discussions treat this as just anther virus threat. It is not just another  hacker trick. The USB standard has a fundamental flew that is an open door to whoever wants in.
Earlier this was explained in wired.
http://www.wired.com/2014/07/usb-security/
Since then, few so-called 'expert's, including yourself , failed to get the point. USB is broken.
 If you know part of it,  learn all of it.
Google it. USB is broken
http://www.computerworld.com/article/2476621/malware-vulnerabilities/panic--stop-using-usb--it-s---fundamentally-broken-----badusb.html

Those researchers failed to meet their burden of proof, refused to release any source code that would demonstrate the tenacity that they were claiming, and then another security researcher released it anyway (the repository I linked). It's notable that the source code and what it is capable of does not line up in any way with many of the claims they made about what it does. Curious.Thanks for coming back BC.
This is an important issue and needs to understood.
One research person claims is is not a 'design flaw' as much as a wrong conception. He asserts that layman think the USB device is only a memory device. But it is not. It is a microchip  to manage a memory array. The USB standard does not specify what, if any. security measures any USB device must have. So in one sense, it is not a 'design flaw' but instead a design decision.
Quote
As we see here the issue is allegedly with the 8051 micro controller
Right! What other companies use it  is uncertain.

Quote
... most devices don't use EEPROMS at all, and instead use EPROMS;
Please clarify that. Does it matter?  Are all USB devices field programmable?  The term 'field programmable' means easy to alter away from the factory with simple portable equipment.
Granted, there is, to date,  much speculation about would may or may not happen. But just imagine the following. Many devices do use the chip in question.

An gang of thugs are organized to break into a IT deportment and locate the stock of USB drives that are being inspected by the staff during the day. Maybe an inside job. The thugs zap all the USB devices they find with a portable device which does the chip  mentioned. Some USB devices are burnt out because they had other chip sets. Next day the IT department does not see any trace of a break in. They have no idea why some USB sticks  WENT bad overnight. What happens next?

Yes, pure conjecture. Now should we just wait and see if it happens? 

More...
EDIT:  Some links to sourtce code.
http://blog.lumension.com/9442/unpatchable-badusb-malware-code-is-now-publicly-available/

http://www.extremetech.com/extreme/191467-badusb-returns-hackers-publish-code-that-could-infect-millions-of-usb-devices

http://www.securityweek.com/badusb-code-published

These are recent posts,  which may suggest this is not the code mentioned artier. Otherwise, why publish three months after the demonstration? Quote from: Geek-9pm on October 26, 2014, 11:01:41 AM
Please clarify that. Does it matter?  Are all USB devices field programmable?  The term 'field programmable' means easy to alter away from the factory with simple portable equipment.
an EEPROM can be reprogrammed by altering the voltages and inputs on the chip pins. So too, in fact, can an EPROM. the Difference is that you cannot erase an EPROM electrically. You can program a blank EPROM chip as desired, however you cannot, electrically, erase them. (Typically they are erased via UV Light exposure).

That seems rather critical given this exploit/vulnerability. If the chips used for  the firmware on a USB Flash Drive are EPROM than they cannot be reprogrammed via the USB plug. Even an EEPROM is tenuous and as we can see in the source code, examples, and documentation, the vulnerability and particularly, taking advantage of it, is very dependent on the model, manufacturer, and even capacity of the drive. the firmware storage of the 8051 is not built into the IC, and needs to be hooked up to it by sending traces to the appropriate pins on the chip. The microcontroller then runs that code. the exploit them relies on the 8051 having direct access to the programmability of that separate chip, and that separate chip being electrically erasable. This is why the concept code can only work on a single model, manufacturer, and capacity of drive (Patriot 8GB SuperSonic). It also won't work if the drive supports USB3 (since that typically uses a different embedded microcontroller to begin with)

Quote
Granted, there is, to date,  much speculation about would may or may not happen. But just imagine the following. Many devices do use the chip in question.
None of the USB Drives I've taken apart (broken ones, of course) appear to use the controller.  Since it is a Memory controller USB interface it is not going to be present except on Flash Drives and composite devices. It is not used in USB keyboards, USB Mice, USB network adapters. It's not even used on external hard drives. And even within Flash thumbdrives, only a subset of devices actually use it. This is demonstrable by simply taking apart a few such devices and identifying the chips within.
Quote
An gang of thugs are organized to break into a IT deportment and locate the stock of USB drives that are being inspected by the staff during the day. Maybe an inside job. The thugs zap all the USB devices they find with a portable device which does the chip  mentioned. Some USB devices are burnt out because they had other chip sets. Next day the IT department does not see any trace of a break in. They have no idea why some USB sticks  went bad overnight. What happens next?
Yes, pure conjecture. Now should we just wait and see if it happens? 

Quote from: BC_Programmer
Thus my reasoning in my post in the other thread which I linked, which was that this would only be particularly useful for malicious uses when you knew exactly what hardware was being used- what flash drives, what OS on the system, etc- thus penetration testing or for trying to get into specific computer systems.

The problem with your hypothetical is that it is dumb. The thugs already have physical access to the systems that they would be intending to infect. using a special device to basically infect USB drive firmware in order to allow those USB drives to pretend to be keyboards on host systems and do.... something?... is pretty useless considering they already have physical access to those systems they want to infect.

Your entire hypothetical completely contradicts your original assertion that "It is not just another hacker trick" by providing an example in a context where it is exactly that.

Quote from: Geek-9pm on October 26, 2014, 11:25:40 AM
More...
EDIT:  Some links to sourtce code.
http://blog.lumension.com/9442/unpatchable-badusb-malware-code-is-now-publicly-available/

http://www.extremetech.com/extreme/191467-badusb-returns-hackers-publish-code-that-could-infect-millions-of-usb-devices

http://www.securityweek.com/badusb-code-published

These are recent posts,  which may suggest this is not the code mentioned artier. Otherwise, why publish three months after the demonstration?

Those articles link to the same github repository that I already linked, Created on Sept 26th. The articles themselves- which if I may be so bold to say that you don't appear to have read since it answers your question- are clear as to why the code was released after the original Black Hat conference.

Quote
Previously, it was DEMONSTRATED by Karsten Nohl and Jakob Lell at the Black Hat security conference in Las Vegas, showcasing that the firmware of USB devices made by Taiwanese electronics manufacturer Phison could be injected with undetectable, unfixable malware.

Crucially, however, Nohl did not release the code used for the exploit at the time. But Caudill and Wilson have subsequently made the decision to release fuller details about BadUSB at the recent DerbyCon hacking conference in Louisville, Kentucky.

“The belief we have is that all of this should be public. It shouldn’t be held back. So we’re releasing everything we’ve got,” Caudill said to the audience at DerbyCon. “This was largely inspired by the fact that [SR Labs] didn’t release their material. If you’re going to prove that there’s a flaw, you need to release the material so people can defend against it.”

It's notable that even in that original conference, the "exploit" demonstrated- like the source code now made available, only works on a very specific brand of Microcontroller (Phison). and it only works in very specific circumstances- the core issue is simply that, if the chip is traced to it's firmware chip in a specific way, and  that firmware chip is an EEPROM, than the microcontroller can be instructed to electrically erase that chip and reprogram it, thus revising it's own firmware.

-If that chip is not an EEPROM, nothing happens, and the existing firmware would remain.
-If the microcontroller is not connected to the EEPROM firmware chip in a specific way, nothing happens.
-If the microcontroller is not a 8051, nothing happens.
-If the EEPROM chip containing the firmware is larger than 200K, nothing happens.
-If the EEPROM chip containing the firmware is smaller than 200K, nothing happens.
-If the Microcontroller is not manufactured by a specific taiwanese manufacturer who accidentally left development EE traces active, nothing happens.

And the end result? Even in a case where the chip can be exploited.... It can only pretend to be other USB devices. It cannot arbitrarily run code on the host system- only on the device itself. It cannot connect to the internet itself- because it has no network connectivity. In general all it can do is pretend to be a keyboard and perform a specific sequence of pre-programmed keyboard input. In the Blackhat demonstration for example the device was programmed to input a specific sequence of keystrokes which would open Internet Explorer and take it to a compromised, exploited web page. That could only work when you know the specific system.

Fundamentally what it boils down to here is that despite your assertions otherwise this really is just  "yet another hacker trick"; You illustrated that particularly well in your (arguably contrived) example. It is something that those looking to harden a company network and protect company data will want to explore, but only if they haven't already hot-glued all the USB ports on the company systems. eg to expound on your example somebody who wants to get into a company's database for presumably nefarious purposes might befriend an employee. After learning about the company's system and that employees particular workstation, they might engineer a specific USB flash drive- one that they know can be exploited in this manner and which they can successfully purchase, test, and verify works as they intend. They could then infect their 'friend''s PC with something that prevents all mass storage devices from working. Knowing that employee only has one flash drive, the nefarious hacker can loan them the exploited one. It connects as both a flash drive- allowing the employee to borrow the drive to copy his work files, as well as as a keyboard. When files are copied from that drive it will activate a sequence of keystrokes that would activate a hidden browser and launch it to a website that the nefarious hacker setup specifically the take advantage of perhaps unpatched exploits in the browser version used at the employee's company. It would then install a backdoor and broadcast it's address to an IRC server that the nefarious hacker setup for that purpose, and the hacker can then instruct the employees system to connect to a server IP they have listening for connections and then access the system via remote access.

The fact is, however- in this example the entire operation is absolutely destroyed by any prudent security on the company's end.

-Many companies disable, uninstall, or block USB devices entirely (hot glue in the USB ports of company systems, for example).

-Unauthorized systems on the network are typically not leased an IP and thus are unable to access the internet (eg laptops brought from home, iPods, Wifi routers inconspiciously installed in that conference room nobody uses)

-software should be kept patched and up to date, particularly web browsers. most competent IT Support is going to have an established update procedure using group policy.

-normal users will not have local administrator permissions. This would eliminate the threat entirely, as that would be required for any exploit to be installed via said web browser (again, excluding possible, specific privilege escalation).

Summary? Just another "hacker trick" that can be added to the pen-test book, with limited (if not entirely non-existent) applications in the wild.




Your explanation about UV erasable chips is wrong, it is out of context. This is 2014, not 1998.  UV erase is not used  is new designs where size is important.
UV-EPROMs are a technology made obsolete in an incredibly short period of time by widely available, and more FLEXIBLE, Flash and EEPROM technology.  Processors evolved, DRAM and SRAM evolved, EPROMs simple ceased to exist.  There were attempts to make them faster, lower-power, or in more convenient packages, but at the end of the day... that have gone away.

How many USB devices have you taken apart? The all  have controllers. There is no such things as memory array the connects directly to USB.

Nobody has yet come forth with any proof that other designs are more resistant to the attack concept of the BadUSB d drama.

So you think that we can prevent any attack on USB devices by preventing physical access?   How?  Do you suggest that all USB devices be glued with gorilla glue so and  can not be removed ever ?

The chip used in the USB flash drive the researchers chose is typical of the kind of silicon device use to made a USB thumb drive. And this kind of device are also used in the typical mouse, keyboard, camera or scanner.

One point in particular I have to agree with. The people who write about this seem to have little understanding of what they are talking about.
The complicity of the USB interface is unseen. Just looking at it one does not see the myriad of calculations made in a few milliseconds  just  to create a stack for the protocol. A micro controller has to be used for this. Ideally, it should be micro-code in  ROM with hidden internal registers for calculations. I has to have a clock and timers. It has to handle different baud rates. I has to conform to the specs of the USB protocol.
Here one poster at least knows something:
Quote
USB interface microcode may be inherently vulnerable
If Andy Greenberg and others are right, a large portion of existing USB devices - from keyboards to peripheral controllers and data-keys - may be vulnerable to reprogramming at the microcode level of the USB controller to do any and all kinds of nasty work that software viruses can do, and perhaps more.

In Why the Security of USB Is Fundamentally Broken Greenberg discloses some very new information about how ordinary USB devices can become high-power snoops and saboteurs with nothing more than some diddling of their internal microcode, loaded by a hacker into the device via the USB interface itself.

The effect of this discovery could be that no USB device may be considered totally trustworthy henceforth, whether memory or peripheral, if it remains internally reprogrammable at the microcode level after manufacture. Some USB-controller architectures have fuses or other locks that can be set to permanently inhibit reprogramming, but often these protections may not be engaged in existing products, observers say.
Seems to be a whole new can of worms to worry about. ...
http://www.pprune.org/computer-internet-issues-troubleshooting/544742-usb-interface-microcode-may-inherently-vulnerable.html

He is right on! Responsible manufacture blow the inter links (fuses) to prevent any any more programming, accidental or intentional.

So the question is: How many Thumb Drive  makers fix  the device to  not be reworked at the micro-code level? One? Two? Who?

BC, do you think only one company was guilty of this oversight?

Reference:
A number of books have been written about programmable micro-controllers
These serve as a introduction of common industry practice with these powerful little gems.

Here is important information. Just now found it.
Phison PS2251-01 format tools download

Quote
today we will discuss how can repair corrupted Phison PS2251-01 chip controller and we will put all possible software for  Phison PS2251-01 flash drive recovery tools .
Phison PS2251-01 also called Phison PS2301 and Toshiba TC58NC2301GFA .First we must be sure that our USB flash drive chip controller is Phison PS2251-01 by using Chip genius report
Wow 
43.

Solve : CBS goes on demand. Others may follow?

Answer»

CBS, a MAJOR TV network in the USA, now offers on demand full EPISODES for about $6 a month. Compare that to Hulu Plus about $8  per month
CBS All Access launches for $5.99 a month, offers full seasons and episodes .
HBO already did it. You can bet the others will follow. 

IDEA: If  you have a TV antenna STILL in a box, save it. In just in a few years donate it to a local museum and get a tax WRITE off. Maybe. 

44.

Solve : SSLv3 Poodle issue?

Answer»

While this info was new news 9 days ago, I figured I'd SHARE this here in case its new news as of the DAY you are reading this like myself.

http://www.pcworld.com/article/2834015/security-experts-warn-of-poodle-attack-against-ssl-30.html

45.

Solve : Windows with Bing boosts PC bounce-back .?

Answer»

Windows with Bing was introduced a few months back.  It allows manufactures  to offer cheap notebooks to competes against the Chrome book.
Just now a report from ZDNet CLAIMS 'Windows  with Bng' has lifted up sales 13% so far for this year. Really?
Quote

PC shipments in Europe have bounced back thanks to BUSINESSES replacing ageing hardware, and consumers lured by cheap Windows notebooks.
According to IDC, PC shipments in Europe, the Middle East, and Africa hit 23.7 MILLION units in the third quarter of 2014 — up 10.4 percent year on year, in what the analyst firm described as a "clear return to growth" with now two consecutive positive quarters after a "DIFFICULT" 2013.
...
Consumers were a major factor in the 13.5 percent growth in notebook demand, boosted by back-to-school shipments and the run up to Christmas. In contrast, desktop PC shipments increased by just 5.2 percent.
Read it yourself.
 



Still taking applications for CH News Editor...
46.

Solve : Microsoft Yanks Win 7 patch and replaces with another?

Answer»

Interesting...  MICROSOFT YANKS Win 7 patch and REPLACES with another

http://www.infoworld.com/article/2834930/security/microsoft-yanks-botched-patch-kb-2949927-re-issues-kb-2952664.html?source=IFWNLE_nlt_daily_pm_2014-10-17#tk.rss_security

47.

Solve : News for Windows Blue.?

Answer»

From ZDNet...
Quote

By HOWARD Lo for Small Talk | JUNE 7, 2013
These three features show Microsoft is responding to customer FEEDBACK and easing customers into familiarity with Windows 8, taking a step back from the "throw them into the deep end approach" that characterizes the current release. These three features HELP create a bridge from the Windows 7 EXPERIENCE...

Windows Blue, thank you for listening
48.

Solve : New "ac" standard for very fast Wi-Fi?

Answer»

Quote

NEW YORK (CNNMoney)
A new, faster version of Wi-Fi was officially rubber-stamped Wednesday.

The latest Wi-Fi technology, called "802.11ac," offers speeds of up to 1.3 Gigabits per second. That's fast enough to transfer an entire high-definition movie to a tablet in under 4 minutes, SHARE photo albums with friends in a matter of seconds or stream three HD VIDEOS at the same time. It's more than DOUBLE the top speed of the previous standard, known as 802.11n.

HTTP://money.cnn.com/2013/06/19/technology/mobile/wifi-speeds/index.html
49.

Solve : Facebook adds video clips to Instagram app?

Answer»

Users of Facebook's photo-sharing app, Instagram, will now be able to take videos as well as still photographs, the social network has announced.

In a press conference, Instagram's chief executive Kevin Systrom SAID the app would allow them to make clips lasting between THREE and 15 seconds.

Users will also be able to add the distinctive filters that epitomise Instagram photographs.

The app will vie with Twitter's Vine, which also LETS users share video.

The Instagram update will allow iPhone and Android users to record and stitch together their clips to form a "collage", which can then have one of 13 customisable filters applied to them.

These can make the clips black-and-white, add a blur-effect or otherwise alter the footage.

In addition, iPhone users are offered a "cinema" facility, which stabilises the clips to counteract camera shake.

"Fifteen seconds of video [is] the right balance between not-too-short that constrains your creativity and not-too-long where you END up having to wait a lot of time for something to download," said MR Systrom.

Full story: http://www.bbc.co.uk/news/technology-22968222

50.

Solve : Millions exposed by Facebook data glitch?

Answer»

Personal details of about six million PEOPLE have been inadvertently exposed by a bug in Facebook's data archive.

The bug meant EMAIL and telephone numbers were accidentally shared with people who would not otherwise have had access to the information.

So far, there was no evidence the data exposed was being exploited for malicious ends, said Facebook.

It said it was "upset and embarrassed" by the bug, which was found by a programmer OUTSIDE the company.
Bug bounty

The data exposure came about because of the way that Facebook handled contact lists and address books uploaded to the social network, it said in a security advisory.

Typically, it said, it analysed the names and contact details on those lists so it could make friend recommendations and put people in touch with those they knew.

The bug meant some of the information Facebook generated during that checking process was stored ALONGSIDE the uploaded contact lists and address books.

That meant, said Facebook, that when someone had downloaded their profile this extra data had travelled with it, letting people see contact details that had not been explicitly shared with them.

Full STORY: http://www.bbc.co.uk/news/technology-23027643Another fine example why i have no use for Social Media...