InterviewSolution
This section includes InterviewSolutions, each offering curated multiple-choice questions to sharpen your knowledge and support exam preparation. Choose a topic below to get started.
| 1501. |
Solve : Apple and Google vs. the automovile industry? |
|
Answer» No, I did not imagine that headline. .... is battery electric vehicles. That's just a reality. There are a bunch of reasons for that, but here are a few: First, electricity from generation to wheel is a lot cheaper than any of the proposed intermediaries.... Or just Google for: Apple, Google automobile And find stories done WITHIN the last three days. Try NEWSWEEK 3 days back. |
|
| 1502. |
Solve : Report details Google’s “Project Skybender,”? |
|
Answer» This is so otherworldly ,no way I could have dreamed THS even if I ate a whole anchovy pineapple pizza. Apparently, Google currently has drones whizzing around the airspace of Spaceport America in New Mexico, where the project shares a HANGAR with Virgin Galactic. Currently, the drone hardware seems to be an "optionally piloted" commercial aircraft called the "Centaur," along with the solar-powered drones from Google Titan. Both aircraft are "plane LIKE" drones with wings and front-facing propellers.Quote Virgin GalacticBecause Intergalactic Digital Research was not ORIGINAL enough |
|
| 1503. |
Solve : Super-fast 10TB Intel SSDs could be coming? |
|
Answer» The story was just published in PC World. 3D NAND flash achieveshigher density by PLACING storage chips on top of each other. That is an advance from a planar structure, in which the chips are placed NEXT to each other. The new structure has also improved the speed of SSDs, because the storage cells are closer to each other. Don't hold your breath yet... 4 years away at minimum...Well, by then will the SSD price get down to $1 per gigabyte? I can't predict that at all...Quote from: Geek-9pm on February 13, 2016, 03:35:22 PM Well, by then will the SSD price get down to $1 per gigabyte? It's already well below 50¢/gb - Almost at 25¢/gb |
|
| 1504. |
Solve : Widespread T-Mobile outage Feb. 20? |
|
Answer» Today, February 20, T-Mobile has acknowledged a macrophages in some areas. T-Mobile (@TMobile)Elsewhere: Quote http://downdetector.com/status/t-mobile/map/Also: Quote http://www.tmonews.com/2016/02/t-mobile-volte-and-wi-fi-calling-outage-kicked-off-overnight-some-users-still-having-issues/What is notable is that the map shows this to be all over the USA. (Map attached.) [attachment deleted by admin to conserve space]Handy for me to be (a) living in Europe (b) not using T-Mobile INFRASTRUCTURE! Quote from: Salmon Trout on February 21, 2016, 02:25:45 AM Handy for me to be (a) living in Europe (b) not using T-Mobile infrastructure! I'm sure somewhere will report it as a "worldwide" outage... When I made that post I was on the T-Mobile network and it was as slow as molasses on a winter day. Still no explanation. Snow...and ice. |
|
| 1505. |
Solve : Kangaroo, a portable $99 Windows 10 desktop? |
|
Answer» Huh? Don't believe it. I don't either, but they are saying... The Kangaroo is a pocket-sized device that, when attached to any screen, keyboard and monitor or iPad (even a projector), becomes a fully-functioning Windows 10 desktop PC Really? Very limited applications. I was doing a search for a low cost low power consumption X86 or x64 based computer since i have a need for a low power consumption server. Sure i could run an old Pentium 4 system i already have but figured i would find a Intel Atom board that just needs RAM and go that route. What i found was that its actually cheaper to buy a used netbook for around $40 that comes with everything ready to roll and no assembly required. The Atom netbook that i got for $45 after shipping used is probably more powerful and application matching than the kangaroo. I will be following the kangaroo to see the ratings on newegg from the people who buy it and complain about its limited applications.DaveLembke, Thanks for sharing. You are right. A good used notebook is much more VERSATILE and ready to go. And some models even have serial and the parallel ports, making them suitable for legacy applications.. Looks very similar to devices such as the Intel Compute Stick. Sure they aren't very powerful and I wouldn't be recommending them as a general purpose computer but they do have a place for certain applications such as kiosks, digital signage and media playback SITUATIONS or for users with very limited needs. I'd think of them as more like a more powerful x86 version of the Raspberry Pi instead of as full blown PCs. It's the sort of chip you'd find in the latest Windows tablets and they are generally pretty quick - My tablet has the much older Intel Atom Z2760 and while it is easy to push it to the limits, it's generally okay in terms of performance for note taking, web browsing and IRC.etc. Dave - Pretty sure this would be more powerful than that Netbook as it also has an Atom but likely a much newer generation one.It would depend on which netbook and which processor it came with. I have a couple of older netbooks that came with 32-bit single core ATOM cpus that maxed out at 2GB of RAM. The Cherrytrail SOC in the Kangaroo is a 64-bit quad core with max RAM of 8GB. BTW, for kicks, I upgraded both of my netbooks to Win 10 and it runs pretty well on them. I seriously doubt even on what is stated it'll be full blown Win 10 in any shape or form... However Geek...carry on with your news editor job here at CH...I don't see any reason why it wouldn't be a full version. The Intel compute stick and other similar devices have been available for a while with Windows 8.1 with Bing which is essentially identical to Windows 8.1 except that the manufacturer cannot change the default search engine from Bing (the user, however, can change it).This might be one of a new class called: Pocket PC https://en.wikipedia.org/wiki/Pocket_PC What's in your pocket? Quote from: camerongray on October 27, 2015, 06:40:05 PM I don't see any reason why it wouldn't be a full version. The Intel compute stick and other similar devices have been available for a while with Windows 8.1 with Bing which is essentially identical to Windows 8.1 except that the manufacturer cannot change the default search engine from Bing (the user, however, can change it). At 32 G ? ?...You sure about that ? ? The OS itself is 28 + installed... Just sayin.Quote from: patio on October 27, 2015, 08:03:31 PM At 32 G ? ?...You sure about that ? ?Reilly? Windows 10 takes 28GB?Quote from: patio on October 27, 2015, 08:03:31 PM At 32 G ? ?...You sure about that ? ? A Clean install of Windows 10 Home Edition is ~11GB. According to the article the storage can be expanded with a MicroSD. It could probably WORK for a very basic HTPC or web browser system.For what is worth... http://liliputing.com/2015/03/microsoft-shrunk-the-windows-10-footprint-to-free-up-space-on-cheap-tablets-notebooks.html Microsoft addressed this sue. That is, the issue about running the Windows OS on a 32 GB SSD in a compact or mobile device. What they said was, in essence, get rid of the recovery image and com,press system files to reduce the storage footprint. If that is true, then one could have a useful system on a 32 GB device. Factor in the possibility of 4g cellular service becoming widespread, users could store photos and videos in a cloud service at a very low price. Of course, user needs vary WIDELY. Win 8.1 and Win 10 can be installed on small footprint devices using WIMBOOT. See this blog for more info: http://chariotsolutions.com/blog/post/upgrading-a-wimboot-machine-to-windows-10/ |
|
| 1506. |
Solve : Game compay must pay $2 million for false claims.? |
|
Answer» Breaking news. |
|
| 1507. |
Solve : Apple to Supreme Court :o Overturn Guilty E-Books Antitrust? |
|
Answer» Not a rumor. It appears in Mac Rumors and a number of other places. As REPORTED by Reuters, Apple filed a petition with the court on WEDNESDAY, arguing that the most RECENT appeal ruling against the company would "harm COMPETITION and the national economy." In its most recent letter to the court, Apple suggested that its actions were not anticompetitive, writing that a decision was "exceedingly important to the United States economy as it concerns the rules that will govern disruptive entry by dynamic companies into new or stagnant markets."QuoteWait and see. |
|
| 1508. |
Solve : Hubble: After 25 years of faithfull service...? |
|
Answer» The Hubble Telescope began its service in 1990. It has given much delight with its views of the distant stars. NASA plans its next giant space telescope, and it’s so much COOLER than HubbleQuote Two weeks ago NASA gave a burp about a wonderful new telescope in the works. This was "news" in 1996. I'm also detecting a bit of cynicism here. Hubble was not the first Space Telescope and it is not beyond improvement in a new project. Quote contraption that does not exist.Most of the major components are completed, including the Primary Mirror, which was finished in February of last year.Yes, I was a bit cynical. Really, the video just released is impressive. Hope you saw it. What is exciting is the idea they will let the public help study the photos and data from the wide filed eye in the sky. BTW...Hubble is far from retirement.Quote Hubble: After 25 years of faithfull service...Marianne Faithfull? (Cue obligatory Mars Bar joke) Not bad Salmon.... There is a legend that she turned down a large offer of money to appear in a TV ad for Mars Bars. BTW...Voyager is 39 years old...left the outer bounds of the Solar system...although that is now being re-defined...and is still sending back info.And the 2 Mars rovers that supposedly had a lifespan of 180-240 days are also still chuggin along...Quote from: patio on February 21, 2016, 02:49:53 PM BTW...Hubble is far from retirement.Yep, James WEBB is a successor, but not a full replacement. We'll have two space telescopes, which will be incredibly useful as it allows distribution of workloads- many astronomical observations can still gather useful data using Hubble, so it will likely still be used, at least until it's projected re-entry into the atmosphere in 2030 or so. (It's in the upper atmosphere so it's ORBIT decays due to drag). James Webb will be an "improvement" not unlike the improvement Space telescopes gave over ground based observatories, which we also still utilize. Quote from: patio on February 21, 2016, 02:54:36 PM And the 2 Mars rovers that supposedly had a lifespan of 180-240 days are also still chuggin along... Well one of them is- the other got stuck, then it stopped broadcasting in 2009. Both far exceeded their expected lifespan, at least 20 times over. Quote from: BC_Programmer on February 21, 2016, 03:12:32 PM
Spirit / ?...or Opportunity ? ? I actually didn't know 1 passed...thanx. |
|
| 1509. |
Solve : Microsoft now taking on ... browser hijacking? |
|
Answer» Good news. Some of those SESSIONS required that I remote connect to the customers desktop in order to help begin clearing things up but these adware/ad injection infections would not even ALLOW the user to browse to the right website to download a small remote connection TOOL. Instead, the infection would redirect them to a screen that looked a lot like the destination I was sending them to but in reality it was not.Please read the full story above. Richard Hay sure likes writing long sentences, and I guess his religion frowns on punctuation. Quote I once worked helpdesk tech SUPPORT for a security software company and my main job was to assist customers in dealing with malware/adware infections on their systems.Now, perhaps I'm a bit out of the loop- but if his main job was dealing with malware and adware infections, what exactly was the security software for? |
|
| 1510. |
Solve : The SLOTH attacks in 2016? |
|
Answer» LAZINESS about cryptography puts you at risk. Not a JOKE. Users have become complacent. The odds are you will suffer some kind of malware attack this year. Why? It is not just you, software companies, computer makers and financial institutions are just not taking the danger seriously. Part of the problem is the governments fear of advanced cryptography. These remarks are base on this article just just published. The SLOTH attacks: why laziness about cryptography puts security at risk. Quote The SLOTH paper is FAIRLY technical, and relies on quite a LOT of cryptographic jargon, making it hard to penetrate if you aren’t a cryptographer already. Here is the document. http://www.mitls.org/downloads/transcript-collisions.pdf Sounds weird, but it is not a joke! |
|
| 1511. |
Solve : Get 2GB more of Google Drive Space for doing the Security Checkup? |
|
Answer» Protect your Google Account by reviewing your account settings. Safer Internet Day 2016 Security CheckupDid it but no mention of 2GB ADDITIONAL drive space.After clicking 'Done' at the bottom of the page it should say: The 1st time thru, no message and no additional storage. That's odd. At least it worked the second time. I have 3 Google accounts and it worked for all 3.evil you probably got the last 6G they had.... I keep my banking email separate from my social email. The third one is me not keeping my impulses in check... Heee.... |
|
| 1512. |
Solve : Android Chief Promises Chromebook, Chrome OS Commitment? |
|
Answer» This was just published in Tom's Hardware. Right after the Wall STREET Journal published a report that Chrome OS will be folded into Android, the new Android chief, Hiroshi Lockheimer, tweeted that Google is still very committed to Chromebooks and Chrome OS. Chrome and Android shall become one. Oh, My! |
|
| 1513. |
Solve : Lawsuit over 'unfair' Steam game resale ban.? |
|
Answer» From France. 29 August 2014But here is the story today: Quote A French consumer association, steamed up at the way major online game platforms prohibit the resale of games, is seeking to make an example of Valve Software, operator of the Steam platform.From the first link above.. If you live in Europe, please explain this. |
|
| 1514. |
Solve : New Bug In Intel Skylake CPU? |
|
Answer» HOT news. The Intel Skylake has a BUG. This is the latest, greatest thing Intel has been promoting. Only recently have some developers got samples. Here is what they say... How to test for the Skylake bug Intel SAYS: Intel confirms bug with Skylake CPUs So, can I get one for free? It's a bug in the microcode, so it can be PATCHED with an UPDATE relatively easily. Should be a lot cheaper than replacing the Pentium FDIV chips.As far as I'm aware the fix is being integrated into BIOS updates. |
|
| 1515. |
Solve : Free Office Software for PC from Amazon? |
|
Answer» Well.. its new to me. Sold by Amazon Digital Services, Inc. Additional taxes may apply. By placing your order, you agree to our Terms of Use. Game and software downloads are non-returnable and non-refundable after purchase. Of course you must have an account. But it is a free download! I just now downloaded it! I'm not certain I see any value in this. Open Office and Libre Office can already be downloaded from their websites. Also, The versions on Amazon are over 2 years old. |
|
| 1516. |
Solve : Last day for one HP. Two Nov. 1? |
|
Answer» Full title is: When that happens, one of the companies will be called simply HP Inc. That will be the one that most consumers are used to dealing with, as they will continue to make PC hardware devices, along with printers. It will be led by Dion Weisler as its CEO. The other company will be called Hewlett Packard Enterprise, which will offer businesses server computers, software and other tech services. It will be led by Meg Whitman, who currently is CEO of HP for the NEXT few hours. Full Story Couldn't they have called one part Hewlett and the other part Packard? Just asking. My oldest son currently works as a Sales Engineer for the part that is now Hewlett Packard Enterprise and his younger brother interviewed for a similar position there and has been told to expect an offer after the 1ST of the year.Sounds like one is being put out to pasture and the other to be the golden child. |
|
| 1517. |
Solve : Computer predicts new planet in Solar System? |
|
Answer» This time a new planet has been found close t o home. By the use of computers, astronomers believe another planet the size of Neptune lies BEYOND Pluto. Konstantin Batygin and Mike BROWN, two CalTech scientists, say the new planet is about 10 times the mass of Earth and has an atmosphere of hydrogen and HELIUM. SCIENCE magazine reports that the mysterious "Planet X" moves in a distant orbit beyond Neptune |
|
| 1518. |
Solve : PC sales drop to lowest in four years.? |
|
Answer» Yes, PC sales have dropped very low. The only driving force that causes me to have a need to stay with a system that is only a few years old technology wise is due to Video Games. If I wasn't a gamer and only web surfed and e-mail, i could potentially get by with a Pentium II 233Mhz running Windows XP for web surfing and e-mail with a Geforce PCI type video card. The flash content might run a little rough on a Pentium II, but video content that is driven off of video card vs software rendering needy of CPU processing would probably be bearable. But these days I dont bother much with use of systems day to day that are not at least a dual-core, because why deal with a laggy single core system when you have better to use. I think I like having more modern hardware mostly because it means I get to build the system. This means that despite having 3 desktop PCs, none of them would be counted as a "PC Sale" because of the custom build detail you mentioned. I do try to make use of my 32GB of RAM for example but I doubt I really see any benefit from it. Realistically, I would be able to do my job with merely an Internet Connection, an SVN client and a text editor, which would probably be doable on a Pentium System, but it's made a lot easier with IDE software and IDE software has started to get ridiculously heavyweight in the last few years. Quote Lastly with all the modern android phones and tablets etc, those who dont feel a need for a keyboard have migrated over to these portable touch screen computer devices. I just finally bought a LG Android TracPhone back in August and I resisted getting one mainly because I didnt want to be like so many others out there that go overboard with the use of them, these are the people who walk into objects such as fountains in malls and you have to avoid them walking into you in public because they are walking in a direction and not watching where they are going when texting. I got an unlocked Nexus 6 a few months ago. Set me back quite a bit. It's nice to have when I'm waiting for something or so I can keep track of E-mails and Skype (even without a SIM Card, my ISP has hotspots pretty much EVERYWHERE). Other than that, hilariously, it's only real purpose has been as an alarm clock- Though I have found it useful on occasion to watch videos/shows I have on my main desktop system accessed via a network share.The sales slump is working out very well for those that are buying...Quote The sales slump is working out very well for those that are buying... So they are desperate to make a sale and selling with minimal margin?Well for example i priced out an i7 build back in June...currently it's approx 15% less...same components. |
|
| 1519. |
Solve : ARM 64 bit chip for emerging Smart Phone Markets.? |
|
Answer» Yes, this is a new ARM 64 bit chip for emerging Smart Phone Markets. ARM says 2 billion smartphones have been shipped to date with its entry-level Cortex-A5 and A7 chips. "We're now enabling 64-bit features for the next billion smartphone users," said Ian Smythe, ARM director of CPU marketing.So it is both better and cheaper? Quote There's some debate about the value of 64-bit chips in smartphones today, but ARM says the new chip provides significant gains even running 32-bit software. Compared to its Cortex-A7, it says the A35 gives an average 20 percent better performance depending on the application.As you may already KNOW, ARM does not really make the silicon, they do the design stuff. Other people pay for the chip designs and create the silicon wafers and the rest of the smartphone. What will this mean? |
|
| 1520. |
Solve : Automakes giing to Silicon Valley for AI research? |
|
Answer» Even European Automakers are among the latest to invest in SILICON valley. Toyota already said they would SPEND a Billion. It is for new computer related research. Here is the recent Forbes story about the industry shift. Just within the past two years, Ford, Mercedes-Benz, Nissan, Continental and Delphi have set up or expanded their presence...Bear in mind that AMD, Apple, Google and INTEL are long time residents of the San Francisco BAY Area. Stanford is in Palo Alto. Quote ...to compete with fast-moving and well-financed tech titans like Google and Apple – it will require a shift in corporate culture in addition to a Silicon Valley zip code. So if you want to going into AI, you might think about California. FREMONT is a nice place and a short drive to Santa Clara. |
|
| 1521. |
Solve : Adele says no streaming album '25'? |
|
Answer» You can BUY it at iTunes. But no streaming at all. Apple Inc confirmed "25," released on Friday, will not be available to stream on Apple Music. It did say in a statement that Adele's latest single "Hello" will CONTINUE being available for streaming, and that it was "thrilled to offer" the album to buy on its online store iTunes.What next? Footnote: RELATED is the thing with Taylor Swift, one of the most powerful names in pop music. Her "1989" became the biggest-selling album in the world in 2014 with estimated sales of more than 8.5 million copies. She had forbid it going stream last year.I think I can live without hearing Adele's latest album (or any of her others). She is a shrieker. Why is this News ? ? I haven't even heard her shriek but over the years i trust Salmon's judgement....She had this awful hit that goes "someone like you-ooooo-oooooooooo... and the oooooos could shatter reinforced glass. Horrible. I remember the Memorex commercials when Aretha Franklin would shatter champagne glasses.... This is not news that will shatter glades. But it could mean a sea changfe in the way we use our computers. Part of the popularity of PC and Internet comes from the free MP3 songs downloaded over cyberspace. Many artists would follow this course if it works for her. If is news because it came quickly and unexpectedly. It caught Apple by surprise. Apple makes a lot of money on iTunes, but lets people steam some content for free. Apple can still sell her STUFF, but can not stream it. If more artists follow this model, we will do a lot less streaming of content. Hard to say where this will go. Adele is one of the latest to join the club of non streamers. For past stories, Google on: Artists oppose free music streaming. Over a dozen top artists can taken a stand. Expect to see more of this."Most artists have no choice but to opt for streaming and accede to the terms set by the services. But Adele, along with Taylor Swift and Beyoncé, are viewed as among the very few superstar acts with enough leverage to set the terms for how they want their music to be consumed." |
|
| 1522. |
Solve : Next Big Win 10 Update in November.? |
|
Answer» Microsoft has announced a MAJOR update to the Windows 10 Operating system will come in November. |
|
| 1523. |
Solve : Some Hotels had data attacks. What can you do?? |
|
Answer» The full title is: If you stayed at a Sheraton, Westin or other Starwood hotel in the US or Canada this PAST year, you'll want to keep an eye on your credit or debit card account.Read More... Question: How can a traveler prevent this?A traveler cannot prevent it...unless they pay cash for everything... The issue and burden is not on the traveler...it's on the shirty POS systems being used.As Patio correctly stated, it's not the traveler's responsibility. Without getting too technical, and keeping in mind there are MANY factors involved so I am only stating the basics, card holders gets first priority on reversals. Just to note, there's a distinction between a reversal and refund . If you find a suspicious transaction on your statement, request a reversal immediately from the bank. The bank has a fraud department that will investigate the situation and if the merchant account holder can't prove that it was a legitimate transaction, the bank is obligated to ensure that the funds is returned to the card holder and would then seek legal action against the merchant account holder. In this scenario, it is a clear cut case and the hotel is 100% liable, meaning the traveler's would most certainly be refunded by the banks as the banks themselves are insured against fraud. In fact the hotel's system may very well be placed into a audit cycle pending recertification, which could take from three, to six months depending on the processing gateway. The audit process has no bearing on the refunding of card holders though and would have no affect on when the funds are returned. By law, a POS system is not allowed to keep the credit card number in full on their records. The first six and last four digits of the card is sufficient to IDENTIFY a card for query purposes. There is no reason for a restaurant to be able to call up your card for further transactions once you left the restaurant. Any theft would occur between the swipe machine and the processing gateway ... i.e. through malware or physical card readers. Never let your card out of your sight, if the waiter says his swipe machine is broken, follow him and make sure he is using a legitimate swipe and not a card reader. Greatly contested, the annoying habit that some stores has to make a carbon rubbing of your card is Illegal in some countries. This gives them a full record of your card and, pre chip-cards, if they RECORDED your cvv number they would have carte-blanche with your bank account. Do not ALLOW anyone to make a photostat or carbon rubbing of your card ... ever. This is where it gets tricky. Even though the same can be said for a hotel as for a restaurant, a hotel setting may be different due to online reservations... Internet transactions ( or card not present transactions ) and traditional POS transactions follow two seperate routes and adhere to seperate rules. Amazon, PayPal, Ebay ... etc ... all retain your full card number on their database but is still compelled by law to keep it encrypted. In the event of card theft, it is up to the company to refund you in full and then take the matter up with the bank as either they themselves, or their gateway provider, essentially becomes the "card holder". Internet fraud can become fairly complex to resolve, for that reason most banks has a black list of specific countries and would refuse outright to honor any transactions coming from those countries due to the high risk of fraud. Suffice it to say, there is no way that a card holder can protect him or herself of becoming a victim of credit card fraud but there are measures in place to "protect" them in the sense that, generally speaking, the funds would be recovered. Again, these are broad strokes and there are many nuances and complications when it comes to internet transactions. P.S. This does not apply when it comes to common sense ... protecting your credit card details, including online passwords or physical details outside of a transaction, is still the cardholders responsibility and how to protect you from that is an entirely different topic. |
|
| 1524. |
Solve : California bill over encryption backdoors would stop Apple selling iPhone in CA? |
|
Answer» YES, that means Apple might not sell the iPhone in California. No, it is not yet law. But read the story. Page not found...Fixed link: http://9to5mac.com/2016/01/21/california-bill-encryption-iphone-sales/Quote This bill would require a smartphone that is manufactured on or after January 1, 2017, and sold in California, to be capable of being decrypted and unlocked by its manufacturer or its operating system provider.This affects more than just iPhones, I expect. And any devices it doesn't ban are the types I would give a wide berth.Sorry I typo ed the link.. Camerongray found it: http://9to5mac.com/2016/01/21/california-bill-encryption-iphone-sales/ Recently the FBI made a request to Apple. New York state has a similar plan. In the UK that want something line this. The implication is that other makers already do what the governments want. Else whee I saw something where anybody caught purchasing an iPhone next year would face a $2000 FINE. The logic must be that a criminal would never have that much money to pay for a secure phone. Quote Else whee I saw something where anybody caught purchasing an iPhone next year would face a $2000 fine. The logic must be that a criminal would never have that much money to pay for a secure phone. This is above Geek random ridiculousness...Quote from: patio on January 22, 2016, 01:19:41 PM This is above Geek random ridiculousness...He's not wrong, at least not about the fine part. The bill proposes banning the device, and that anybody purchasing a smartphone capable of non-back-doored encryption after January 1st, 2017 would be fined $2,500 per-device. link to the bill.Perfect for the land of FRUITS and nuts....Nothing they do out there makes any SENSE whatsoever so they get what they deserve. Nancy Pelosi outlawed wind farms because a few stupid birds were killed flyin into the props...and they can't afford electricity... Makes all kinda sense to me. Didn't MEAN to go on a political rant...but they are basically clueless.Quote from: patio on January 22, 2016, 04:43:44 PM ... Didn't mean to go on a political rant...but they are basically clueless.And you're not?for a really funny security joke, look at the UK. UK snooping law won't ban WhatsApp, but could leave your data open to HACKERS Quote Apple has raised concerns about the Investigatory Powers Bill to a parliamentary committee. California is following in the footsteps of New York, which has a pending bill that is nearly the same (including, as far as I can tell, the fines)It's against the law in New York to shovel your own snow...without a permit.Quote from: patio on January 23, 2016, 09:08:09 AM It's against the law in New York to shovel your own snow...without a permit.It's illegal to offer snow shoveling services without registering. It's fine to shovel your own driveways and so forth.Apple CEO says there will be no backdoor. But last year some claim that Apple has a backdoor that can be used if you have physical control of the device. Is this true? http://www.forbes.com/sites/gordonkelly/2014/07/22/every-iphone-has-a-security-backdoor/#73b2473037d7 Quote from: BC_Programmer on January 23, 2016, 09:47:56 AM It's illegal to offer snow shoveling services without registering. It's fine to shovel your own driveways and so forth. I stand corrected...still pretty silly if you think about it. |
|
| 1525. |
Solve : Wal-Mart Closures Bring Out the Amazon Sellers? |
|
Answer» Here is the story in brief: Dave's real last name is Rockefeller... ha ha ha ha ... I wouldnt mind having that kind of dough But making money takes money as a very successful person once told me. As well as to be at the right market at the right time and take advantage of a situation before anyone else, or mass populous does. btw yard sales are a good place to find items to make money on. Sometimes a killing!! But to make money from some people you do feel like that guy named AL in AL's Toy Barn on toy story movie. But I'd never steal an item like AL. Good money has been made in buying and selling collectible items like Star Trek, Star Wars, old video games and systems, LP Records that are in demand in good condition or unopened, and antique tube radios etc. Took a 25 cent Star Trek (First Edition Book) in like new condition and sold that for $50 Took an old miniature Donkey Kong arcade, the ones that came out in the early 1980s with the VFD display in complete working condition and bought that for $3 and sold it for $125 on ebay. *Too bad it didnt have its original box or been unopened as for those go for much much more. Took an old 1950s era light bulb that was a old Neon, and got that for $1 and sold that for $40 to a guy who needed it for an old light fixture of the period. It worked fine when I tested it before selling it too. Got old original 1980s Star Wars action figures in a box with the wing fighter that worked but was missing its battery cover for $10 and sold all that individually and made about $250 Atari Cartridges and system I got for $15 and there were about 80 game cartridges pieced it out on ebay selling cartridges for $2 to $10 each depending on rarety and the system and made about $350 C64 in original box in protective styrofoam with manual and power supply I paid $25 and sold that for $300 Old 1960s and 1970s baseball cards I bought in a box for $5. Sold them to a collector for $75 Original Garbage Pail Kid Cards + unopened packs of them, some loose and some complete series in 3 ring binders I paid $40 and sold them for $600 Old 1874 50 cent note. Person thought it was an old coupon. Bought it for $1 and sold it for $25 because it was rather aged and not mint condition as seen here another person selling one: http://www.ebay.com/itm/like/231740011640?ul_noapp=true&chn=ps&lpid=82 Bought a cigar box of foreign coins for $20, I saw the "American" Half Cents in the box and had to have it. There was a 1809 and 1833 Half Cent in there which was American among other coins that were the REST of them old English Copper with Victoria etc. I pieced it all out and made about $300 You have to know what to look for, have money, and take advantage of opportunity when it knocks! I dont look at it as being a crook because people are selling it because they are too lazy to list it on ebay and do research etc. One persons laziness is profit for another. Making money like what I shared above doesnt happen every day, otherwise I'd be rich which Im not. Many yard sales just have modern junk and are a waste of time LOOKING around. Local Library had a book sale a few years back to make room for new books and were charging by the box full $3 per box full. I grabbed automotive, CAD, and other pricey books that still had use, and of the $9 in books I sold them and made about $120 with only a couple books that no one wanted and those became fire starter for camping. Friend of mine really scored big at a yard sale 2 years ago and in a box of foreign coins that he picked up was a 1793 Penny. It was almost completely worn smooth on both sides but he got $350 for it and it only cost him $5 for the small handful of old english coins with the rare 1793 american penny in the mix. Looking now at the current price, he probably could have gotten more than $350 for it since its $4850 in AG-3, but his was Lower than AG-3 but probably worth around $800 or so to plug a hole in a collection. [attachment deleted by admin to conserve space] |
|
| 1526. |
Solve : Miaght Advanced Micro Devices take a Fall?? |
|
Answer» AMD has been in Silicon Valley for a long time.They are based in Sunnyvale, CA. AMD is the second-largest supplier and only significant rival to Intel in the market for x86-based microprocessors. Since acquiring ATI in 2006, AMD and its competitor Nvidia have dominated the discrete graphics processor unit (GPU) market.[6]But now this is the headline that might mean the end of AMD. Can Advanced Micro Devices Inc. Survive 2016? And other media sites are also picking on AMD. AMD quarterly results show improvement When they say 'show improvement', they are trying to be tactful. AMD hopes to attract gamers Quote AMD has revealed the details of its GPUOpen project, through which it hopes to carve a bigger niche for itself in the crowded market for graphics processors in x86 machines.But I don't think AMD will DISAPPEAR. Sadly.... I think AMD is going to die off. I have bought mostly AMD CPU's for the last 12 years since GETTING an Athlon XP 2800+ in 2004 and being impressed with the performance I got at a discount compared to Intel at the time. I have stuck around through socket 939, AM2, AM2+, AM3, AM3+, and bought a single AM1 Sempron 3850 Kabini 25 watt quadcore. My AMD FX8350 4000Mhz 8-core is probably the last AMD I will buy new. Its plenty of processing power and AMD will likely fail before the octo-core needs to be replaced. When it comes to Intel I have gotten all of those socket 370, 478 and 775 CPUs except for 2 x Pentium E5400 CPUs free or used. I bought into two Pentium E5400 2.7Ghz dual-core builds a while back, but the Pentium E5400's just seemed CRIPPLED compared to the AMD Athlon II x2 CPUs I had. The E5400's felt like they were Celerons performance wise and so those systems didnt run for very long before I WENT back to running AMD CPUs as my main systems. My wife I had given a E5400 and it was just lagging with mutitasking, I downgraded her to a Core 2 Duo E6600 2.4Ghz and the system ran better for games than with the Pentium E5400 even though online benchmarks show the Pentium E5400 being better than the Core 2 Duo E6600. |
|
| 1527. |
Solve : Claim your free 15GB of OneDrive storage today or lose it? |
|
Answer» This is last minute news and the first time I have seen it. Full story: Microsoft's free 15GB of OneDrive storage ends today Over 60,000 different users complained about Microsoft’s changes to its OneDrive policy, which also reneged on an earlier deal to supply Office 365 subscribers with unlimited OneDrive storage at a future date. But what users were really unhappy with was Microsoft’s decision to reduce the amount of free storage from 15GB to 5GB per account, as well as discontinuing the 15GB camera roll storage bonus for mobile users who uploaded their mobile photos to OneDrive. Microsoft’s new offer reverses the latter decision.from PCWorld back in December. They did this quietly too. I never got an email saying I should backup anything I don't want to lose or to claim the free 15gb. It's kind of shady and I don't know why.I just checked... I have 30 GB storage available on OneDrive, are they going to reduce this to 5 GB? I have 15 GB available on Google Drive, so maybe I'll just transfer everything. Quote from: SALMON Trout on February 01, 2016, 12:57:23 PM I have 30 GB storage available on OneDrive Is it a free storage account? Do you use another MS service that GIVES you extra storage? I was under the impression that 15gb was the limit for basic free accounts.I've had it since it was SkyDrive. It used to be 7 GB and then 15 GB. The name changed to OneDrive and then in September 2014 they had a promo where you got another 15 GB for your camera roll. I now see on the Wikipedia article about OneDrive that Microsoft announced on December 11 2015 that it would allow existing users to request to have their free storage (up to 30GB) unaffected by the reduction. I seem te remember sending that request. Anyhow, as of today it says I have 30 GB. Does this mean I survived the cull? I guess I'll check in a week or two. Quote from: Salmon Trout on February 01, 2016, 01:49:25 PM Does this mean I survived the cull? It will probably take a while to purge all of the accounts. Like a roll out only in reverse. You might backup anything you don't want to lose just in case.I'm seeing the same thing as Salmon Trout, Though I don't recall sending any request to prevent it shrinking- Heck the only files I have on it I saved there by accident thinking it was the local my documents folder, and I've never signed into the web portal until now, shows 29.9GB available. Maybe they are culling it in stages or something.To be honest, I just sign up for free stuff and never use it. I have about half a GB of photos on Google Drive and less on OneDrive. I wouldn't really notice if they vanished. I just looked and I have 30 GB too. I checked the settings and it says: Your plan
I read something earlier that MS didn't anticipate how people would use the unlimited storage and that's why they are taking some of the space back. Instead of USING it as office/personal storage people are saving their music and video collections and turning OneDrive into a media server. Yeah I'm seeing the same thing, seems I have the "Camera Roll Bonus" as well. I wasn't sure how this might have happened, I found some references that would seem to indicate uploading images to the "Photos" folder might give you the "Camera Roll Bonus" but that folder is empty for me. I found some information that connecting to your Microsoft Account with an Android or iPhone using one of the MS Apps can do it, which would explain why I have the "Bonus" since I use Outlook and Skype on my phone.I think I missed the deadline. -from Forbes. Time Is Running Out On Microsoft's Free 15GB OneDrive Storage, |
|
| 1528. |
Solve : Apple software update threatens to kill your iPhone 6? |
|
Answer» If you see "error 53" on you iPhone, Apple did it. But the problem only comes to light when the latest version of Apple’s iPhone software, iOS 9, is installed. Indeed, the phone may have been working perfectly for weeks or months since a repair or being damaged (alleged) Explanation from reddit Quote The home button has the touchID sensor intergrated. The TouchID sensor is a trusted platform module and has a unique hardware code in it. If the code in the touchID button does not match the code in the chip on the main system board the OS will not authenticate the module and return Error 53. Only Apple has the equipment to re-KEY the hardware keys. Apple introduced this extra authentication step in IOS9 to address some security concerns around impersonating the touchID hardware to get around it as a security module. |
|
| 1529. |
Solve : LG light weight VR headset for USB-C smartphones.? |
|
Answer» This VR headset uses a USB-C cable to get IMAGES from a smartphone. So far, they have not given the PRICE. It will come sometime after a NEW phone in April. |
|
| 1530. |
Solve : Apple and the FBI.? |
|
Answer» Apple and the FBI. Published on Feb 17. It's actually scary that the FBI needs Apples help on this...think about it,That sis what many people wonder. The Washington Post. https://www.washingtonpost.com/news/wonk/wp/2016/02/17/how-long-it-takes-to-crack-an-iphone/ Earlier BBC. http://www.bbc.com/news/world-us-canada-35537954 This is going to be a ongoing story for some time. Some legal experts say the FBI request is not legal under current law. And it is all over on the major media outlets with a lot of experts siding with Apple. This link gives a list of stories on this topic. List of Google results on Apple vs FBI Enjoy! Quote It's actually scary that the FBI needs Apples help on this...think about it, Yah I found it interesting that they went this route. I looked yesterday to see if I could find a datasheet on the Flash chip used in the iPhone 5c and I found a picture in which I was able to get the chip info, but the datasheets are not there or well hidden. All flash chips I have ever known have a write enable leg on them. If you clip this leg or cut the trace that goes to them you can essentially make them Read-Only. The fact that the FBI wants to brute force it and they are worried about a lock out after 10 failed attempts in which it will then destroy (wipe itself) of data, should be able to be circumvented by clipping or cutting trace to the write enable. You then would have endless tries as for it would not be able to wipe the Flash chip when the count reached 10. The only drawback would be that the phone might have to be rebooted after each 10th try as for the counter in RAM might have to be reset back to 0 after hitting the limit of 10 in which the phone would lock up when attempting to wipe the data in which it would lock up unsuccessful at wiping the data. The above method is assuming that the iPhone does not require a swap space created on the fly which would require the write enable to be functional. I personally dont see a need for apple to have engineered the phone requiring a swap space as for the RAM itself should be plenty for the shuffling of data coming and going within the device vs additional write cycles that would wear out the cells in the flash that much quicker. As far as moving the Flash chip to another board to do a raw data dump to duplicate the data to multiply the brute force to the data among multiple (many threads) to crack it faster than a single brute force of the data, it might be far too much tampering involved in which the data then is not permissible in court, however the people involved are dead and so its really just intel info that they need in which any way to get the data without destroying the data could be utilized. The flash chip in the iPhone 5c appears to be a BGA type so it would require knowing the layout of the multilayer breadboard to cut a trace as for the legs are the BALLS under the chip that are surface mount soldered to the pads. They would likely still need Apple to at least disclose the schematics for this device so they can pin point the write enable trace and then carefully sever it without damaging other traces and components. Its the only method I can think of other than having Apple giving away a tool to them as a skeleton key which would cause distrust with customers and Apple in regards to security and tracking people without their approval etc. I looked out of curiosity as well as was interested as to if Apple made their own Flash chip in which the write enable was protected from being altered. If they were able to hide the write enable to it being tampered with by having a CPU/Flash/RAM chip to where all is well protected within the single silicon waffer then it would be almost impossible to stop a write condition from wiping the data because the signals are non serviceable hidden in the safety of embedded in a single silicon waffer. At some point I could see this being rolled out as for with the drive in APU's and better power efficiency it would make sense to save electricity/battery life as well as allow devices to communicate faster, as well as the security advantage of eliminating a hardware hack would be there too with signals off limits and only an input and output between touch pad and display. DaveLembke, Nice post. But are you saying that the entire chip is encrypted? Or is it just the data area that is encrypted. On my iPhone for the password is just a four digit number, which I think anybody could easily guess. But if I get locked out, I can sign into my Apple account and asked them to reset the password for me. So, I don't quite understand why the FBI could not unlock the phone. Is there some level of encryption that the user can employ to make the phone more secure? Apparently, that must be the case because the FBI could not crack the phone. Surely if it was just a four digit numeric code, they would've cut it open by now. Now about the chip. I don't know anything about the trip. But I do know that if you order a large quantity of chips will make it any way you want. Including strange or unusual pinouts. For the purpose of security is possible to create a chip that does not have a discrete data read or write leg. In other words, the address, data and control lines could all be hidden. I could imagine that if you work for Apple you probably would come up with some idea about how to make it very difficult for anybody to know which pin on the chip is needed to write data into the chip. Also, there could be an algorithm to detect if the data right leg has been damaged. Simply write some data into just one area of the chip that has been reserved for that purpose. After so many failed attempts at the password, it could check to see if the right 10 was still working by attempting to write something into that part of the chip. If, after say 25 tries, it could break the whole chip. Now I do not know anything about the chipset Apple uses and I have no idea if they of. The encryption protection to this level. But I am sure it must have occurred to you that they could be some way to detect any attempt to physically damage the chip. Of course, I don't know anything. IPhones use an Encrypting File System. Every single bit of information saved to the Flash Chip is encrypted when encryption is enabled. The key used is the User PIN as well as having that salted with the unique device ID and group ID assigned by Apple. The issue here is that while a PIN can easily be brute forced- as Geek notes- the iPhone prevents this- after some number of attempts, it will not only lock the phone, but it will delete the contents of Flash memory, effectively, as I understand, bricking the phone. Of course in this instance since it is the data that they want access to, that presents something of a barrier, as it means that one combination can only be tried every day (I don't know how often the attempt-counts reset). Personally, I don't think the FBI needs Apple's help at all. The lock-out functionality is part of the iPhone ROM itself as I understand- the bit of logic that allows you to enter a PIN or swipe code or whatever, so it should be within their means to extract the appropriate salts from other chips in the phone and then desolder the Flash chip and attempt to decrypt it's contents directly, as Dave mentioned. The reasons they want Apple's "help" is because it is more convenient for them (they should not be looking to make their job "more convenient"!), but perhaps more important it appears to be an attempt to normalize the idea that personal privacy stops where government agency begins.On the other side of things there is no finite # that can be PLACED on the worth of all this Free publicity / good will Apple is garnering from this chess match...Quote On the other side of things there is no finite # that can be placed on the worth of all this Free publicity / good will Apple is garnering from this chess match... Good point Patio What would be a sneaky move is if this was used in a way to get terrorists to switch to iPhones to feel more secure because Apple would never give away the tool to gain access... when in actuality behind the scenes there was a deal made and tool created and this then allows access to the inside of the terrorist groups without the world knowing. Information gathered able to be acted on in a way that protects its source from being detected as spy phones. Knowing the unique identifiers of these phones, they could target these phones for a "Update" which allows more spying without having to spy on the general public. What better way to get the enemy cornered into a communication means that you then have direct access to without them being aware because they feel so secure because Apple stood their ground to the world when behind the scenes just the opposite happens. Sounds like the start of a good book.... You just made Tom Clancy smile....Quote from: patio on February 20, 2016, 08:45:06 AM You just made Tom Clancy smile....http://www.engadget.com/2016/02/18/tag-enemies-with-your-eyes-in-tom-clancys-the-division/ Quote You just made Tom Clancy smile....You must see this. Brute Forcing iOS 9 Passcode https://www.youtube.com/watch?v=bKggZezZf2M (skip the advertisement.) Bill Gates 'disappointed' in reports he sides with FBI in Apple case http://www.usatoday.com/story/tech/news/2016/02/23/bill-gates-backs-fbi-battle-apple/80791116/ Quote "This is a specific case where the government is ASKING for access to information," Gates told the Financial Times. "They are not asking for some general thing, they are asking for a particular case." |
|
| 1531. |
Solve : Google Chrome and HTTPS Only.? |
|
Answer» Google is working on a HTTPS only standard. Web browser security is important, which is why Google is adding a security panel for developers in Chrome 48 beta that lets them visualize and troubleshoot all of their connections.This idea is not new. http://www.infoworld.com/article/2621353/encryption/google-protects-its-current-https-traffic-against-future-attacks.html That was back in 2011. I've been increasingly often wondering in the last few years why increasingly everything is encrypted through Google, even when it's totally non-confidential content and unimportant to secure the page. Especially since SSL requires greater bandwidth, decreases throughput, and commonly doesn't use a browser cache, it seemed foolish to use it needlessly. I guess this news sheds some light on what they are doing. It's too bad that's the measure that is required to deal with it.About SSL overhead. On a PC is is hardly a factor. It does make a difference on a large server. But on a commercial server anything makes a difference. For the commercial people who want to get best return on investment, even a 1 per CENT improvement is meaningful. It's often hard to determine what is confidential and what isn't so in many ways it's still good to use SSL. The OVERHEADS involved do exist but they are so small it makes no noticeable difference to overall performance. As far as caching goes, there is nothing stopping a modern browser from caching content served over HTTPS and they do cache it. When people refer to not being able to cache content they are referring to caching content on some third party server between the remote site and the user's PC - Situations where this sort of caching is employed are not really common enough for this to be a major issue.It's easy to establish if there is personal information involved or not. In what way and for whom would it be hard to determine confidentiality? That SSL overhead makes a small difference assumes a user has a decent speed broadband. If, however, they're using a limited speed connection, or dial-up, it can make a large difference. I never said there was anything stopping a modern browser from caching HTTPS. However, AFAIK it's still commonly not cached by default, and many inexperienced users may not be aware of how to change the setting, or of any need to. Plus, caching confidential data is a potential security risk. So, if everything gets cached, there's no longer any distinguishing between what shouldn't be cached and what should, for security reasons. (It'd require some alternate method, which I haven't heard of, if exists.)An example of something that may not seem confidential at first glance could be a search engine's search box but for some people they may be using this to search for confidential things. Browsers do behave differently with respect to caching but this can be overridden using headers sent from the server side so if the person running the site sets the server up correctly to send the appropriate caching headers, the browser should cache the content - Nothing to change on the user's side. As far as security goes - If you have a site that requires login over HTTPS but then drops back to HTTP after login, it can still be open for session stealing. The cookies that define the user's logged in session will continue to be sent when they are running over HTTP so these could be sniffed on a public WiFi network and then used to spoof the user's session. If the entire session runs over HTTPS then this is not possibleA browser is going to allow a site's header to override the user's cache setting, and cache restricted data anyway? Not any browser that's any good at all at privacy, it's not! Restricted info like credit card numbers, social security number, etc., remaining on your computer needlessly, in the browser's cache is not a good idea, let alone against your explicit permission (settings). Cookies could be captured on any network if it drops to HTTP. On a public Wi-Fi, HTTPS only secures it over the network, and it's insecure between the access point and the client computer. So the cookies could still be captured locally, along with anything else while using SSL/TLS. It's common that people don't realize this, and do shopping, e-mail, etc., unsecurely in this manner. The only way to truly and fully secure a connection with unsecured public Wi-Fi is to use a Virtual Private Network (VPN).Thanks to both of you. There is so much that could be said about the security and passwords. The main point of this thread is that Google is recommending that all communications be made more secure and that there should not be any areas in the network where plaintext would be visible to non-authorized personnel. An argument has been made that some people need to have the right or privilege of looking into your e-mail and your website. But many disagree with that. One of the issues that goes back to 1934 when the communications act was established in the United States was the issue of privacy in communication. At that time it was agreed that all kinds of communication should be under the authority of one central agency, the FCC, and that both radio and telephone conversations were to be considered private even if they were not encoded. Put another way, it was just this illegal to eavesdrop on somebody's telephone conversation as it was to open up their mail. And that policy would also APPLY on private communications that was being done over two way radio. But now we're in a period of time where the whole idea of citizens rights to confidential privacy are being questioned. At the present time some of the biggest companies, Apple, Google and Microsoft, have taken the position that they will protect the privacy of individuals. This would not prevent law enforcement agencies from getting a warrant and seeking to investigate private communications that have taken place. However, some take the position that law enforcement agencies should be able snoop on your communications at any time they want to. The assertion has been made that this is the only way to protect the country from organized terrorists. Really, any organization that has the resources can find ways to hide information that would be very difficult for government agencies to discover unless nobody is allowed to use any kind of VPN, virtual private network. As for myself, I don't say or do things that are against the law, but still I am not comfortable with other people listening into my conversations or reading my mail. Hopefully private communications will remain private. Now about Wi-Fi. It has been recommended that all Wi-Fi links use some form of encryption. Otherwise it is much too easy to pick up somebodies access point and see all the information that is being passed back and forth from the client to the access point. Encryption of the data between access points and client ensures that other people can't just drive by and pick up a wireless signal and see what other people are talking about. However, wireless encryption does not help us on the Internet. If the Internet information is not encrypted, then using wireless encryption doesn't do a thing to prevent somebody from tapping in to a wired connection. Of course, tapping into a wired connection is very illegal and probably would be noticed by somebody. Still, full encryption on the Internet would do quite a bit to improve personal privacy. This is a plain text message and does not contain nay hidden codes. h)+_)lfi48][pide9049vbmj 298fjniruve3es.;'f]=;r Just ignore the above. I was just clearing my throat while using speech recognition. Quote from: Superhuman on January 31, 2016, 10:05:33 PM A browser is going to allow a site's header to override the user's cache setting, and cache restricted data anyway?The server-side Cache Response Directives that are part of the http header indicate when resources can be cached. A Bank website might have a header image with the bank's logo; there is no reason for that to need to be re-downloaded by the client at every page load, so the server indicates that it is a cacheable resource. Conversely, pages that contain, say, account information would likely use a no-store directive which would indicate to browsers not to cache the data. Browsers don't cache data by default over HTTPS, but those defaults can be overridden on a file-by-file basis with the cache-control headers sent from the server. of course, whether the browsers respect these settings is another matter entirely. They might cache information marked as no-store or they might not cache information marked as cacheable (which would be the case if caching is shut off completely, for example). Quote Restricted info like credit card numbers, social security number, etc., remaining on your computer needlessly, in the browser's cache is not a good idea, let alone against your explicit permission (settings).data such as stylesheets, images, and other ancillary data- which typically constitutes the bulk of most webpage data don't contain any private information and thus will almost always be marked as cacheable. The overhead of HTTP is not mostly in raw data size- which remains approximately the same, particularly considering HTTPS supports HTTP2 which adds compression features. The primary overhead is that HTTPS requires additional round trips/connections which will suffer connection latency. This definitely affects connections such as 3G or, say, dial-up, but the main factor is not the amount of data, but entirely a result of the additional round trips paired with those connections typically having very poor PING times. Google's Push for HTTPS typically makes use of SPDY, which has the rather interesting trait of being faster than HTTP for most purposes. This is primarily because SPDY uses features of HTTP2, which requires HTTPS. This can be seen in action here. BC_Programmer, Great find!. A picture or visual aid is worth a thousand words. The link is the post above makes it clear that spree-time is a non-issue with a secure connection. Most of the stuff we need to keep private is not part of the HTML tags and style features.Text data itself is fast enough. There might be no need to encrypt pictures. But even then, the encryption overhead is very small. Actually, a JPEG file is already a form of encoding that takes some time to do. But it is done to improve bandwidth, not overload it. To put it bluntly, the argument that privacy slows down the internet is a false idea. As for piing and latency, these are not real issue in real world communications. Unless you are flying a warship over the Internet. Quote from: Geek-9pm on January 31, 2016, 11:03:09 PM However, some take the position that law enforcement agencies should be able snoop on your communications at any time they want to. The assertion has been made that this is the only way to protect the country from organized terrorists. I think it's dubious exactly how effective this assertion is. It is allowing the terrorists to succeed in instilling fear in us, and sacrificing our original liberties as a result. Then they win. There are other methods of deterring terrorism, including attacking it where it festers from. Even if one assumes all the snooping on data is effective at foiling terrorist plots, there is the question of if it's better to live relatively "safely" in fear and paranoia, or to courageously live with essentially unimpeded liberty and possibly have some risk of another terrorist plot slipping through undetected. I would choose the latter, no contest. Quote Really, any organization that has the resources can find ways to hide information that would be very difficult for government agencies to discover unless nobody is allowed to use any kind of VPN, virtual private network. You have reiterated much of what I mentioned, but don't quite seem to comprehend some aspects. VPN is only for securing wireless communication between routers and client devices, and only where needed. Routers/access points that have their built in authentication and encryption turned on, are already secure to use. And of course ethernet is wired and doesn't need wireless security protocols. Quote As for myself, I don't say or do things that are against the law, but still I am not comfortable with other people listening into my conversations or reading my mail. Hopefully private communications will remain private. Yes, there's much reason why law-abiding people would want their private communication to actually be private. Quote Now about Wi-Fi. It has been recommended that all Wi-Fi links use some form of encryption. Otherwise it is much too easy to pick up somebodies access point and see all the information that is being passed back and forth from the client to the access point. Routers do usually have their security turned on, unless the owner specifically turns it off. This is commonly only done on public Wi-Fi networks. Quote from: BC_Programmer Browsers don't cache data by default over HTTPS, but those defaults can be overridden on a file-by-file basis with the cache-control headers sent from the server. Ah... this makes sense. Thanks. Quote from: BC_Programmer Google's Push for HTTPS typically makes use of SPDY, which has the rather interesting trait of being faster than HTTP for most purposes. This is primarily because SPDY uses features of HTTP2, which requires HTTPS. This can be seen in action here. That page says my browser doesn't support HTTP2, and hence isn't accurate. But, when I click each protocol it does display the secure data faster than regular HTTP, and reports it as a fraction of the load time. Seems accurate to me. Quote from: Geek-9pm spree-time Quote from: Geek-9pm on February 01, 2016, 11:59:17 AM Actually, a JPEG file is already a form of encoding that takes some time to do. But it is done to improve bandwidth, not overload it. And a PNG takes significantly more processing time, but it is also very quick on modern computers. Quote To put it bluntly, the argument that privacy slows down the internet is a false idea. Using security on all pages did used to slow down the internet. It's only these recent security protocols (I hadn't yet heard about) employing compression that have now changed that. Quote from: Geek-9pm As for piing and latency, these are not real issue in real world communications. Unless you are flying a warship over the Internet. Indeed they are an issue with dial-up, even 3G, as BC_Programmer says: Quote from: BC_Programmer on February 01, 2016, 12:21:46 AM The primary overhead is that HTTPS requires additional round trips/connections which will suffer connection latency. This definitely affects connections such as 3G or, say, dial-up, but the main factor is not the amount of data, but entirely a result of the additional round trips paired with those connections typically having very poor ping times. |
|
| 1532. |
Solve : One line of Code Burns His Company? |
|
Answer» One Man, One line of Code Burns Entire Company. By accidentally telling his computer to delete everything in his servers, hosting provider Marco Marsala has seemingly removed all trace of his company and the websites that he looks after for his customers. Guy is an idiot. Back up media mounted when running this script and no backups elsewhere = stupid When I was system admin at my prior job we had RAID5 plus Daily, Weekly, and Monthly backups. The daily backups were overwritten every 7th day. The weekly backups were overwritten once every month. The monthly backups became a hard copy of the data to be retained and never overwritten ever again and placed into a safe. We had failures a few times with the RAID 5 breaking and I had to rebuild the RAID array and push the prior days backup to rebuilding the data to the RAID. *Given what this guy had for a company and clients content, it sounds like he skimped on a proper setup for multiple parachutes in place when the single backup plan fails. Reading this initially my thoughts were did this guy run a business with absolutely NO backup plan. In this case if this story is true he had the backup plan, but it was weak. Its playing with fire to only have a single backup plan as for if a viral attack got in, and DRIVES mounted he would have corrupted, infected the backup too. A business to the scale of what he "once had" should have had daily, weekly, and monthly backups in which there are multiple restore POINTS to not lose everything, and if there is an infection that is DISCOVERED after mounting a backup media, you can deal with the infection and then go back further to where the infection is missing or if yesterdays data is destroyed, go back 2 days with virus taken care of and restore likely more than 99% of the data lost.I feel bad for him....Not.The original Serverfault story has been taken down. Now known to be fake. The author has released a statement about it being a "viral marketing campaign" for his startup. This was heavily demolished on Slashdot. Thanks Salmon for pointing out that this is fake. I had serious doubts, however it seems that with all the poorly IT/MIS managed businesses out there its not at all impossible for someone to lose their company in such a way as was suggested. Quote In this case if this story is true he had the backup plan, but it was weak. I know of one business owner that had a video store that he use to use a ZIP drive to backup his business daily around 2004 that lost all his data for example. He ran the backup daily to the same ZIP drive tape. Never a rotational backup, always risking losing it all. He felt safe because he was after all doing a backup. He read enough online in how to perform the backup and so he did. However he didnt Verify the data that was being backed up after the data was copied to make sure that the backup was successful. Simply when it ended all was well he thought. However when his video store point of sale system crashed and he reloaded the point of sale video store program back onto the computer that was running Windows 98 and then went to recover his data from the ZIP drive. It failed to read the ZIP drive. The data there was corrupt. He contacted me for help. My initial question was ok, so you have this backup tape for the iomega ZIP drive, where are your other tapes so we can try going back to a day prior. He said thats the only tape, he never bought any other tapes, never created a second copy. Inspection of the ZIP drive tape looked like the tape was heavily worn. Small scratches on the tape surface as it was run in a non serviced point of sale system that the dust and dirt would rub against the magnetic tape. He was in a situation to where he could have put himself out of business. He ended up having to recatalog into the system his entire video store all over again. People returning movies he had no clue if they owed late fees and so he couldnt charge for late fees. People could have if they known that his data was gone kept the movies and he would never know who had what movie. I worked with him to help him repopulate the database and then I got him onto a 7 day rolling backup as well as once a month he back up the system and save the monthly backup off site at home. The mistake cost him a lot, and fortunately his video store only had about 1400 movies and the point of sale system was not too bad to enter movie titles and scan the barcode to associate the movie title with the barcode for each one for checking in and out movies. As well as repopulate snacks and other stuff he sold there like 3D glasses etc. In the end it likely cost him a few thousand dollars for that mistake.The CH News Editor position is still taking applications...NEW Slashdot story https://developers.slashdot.org/story/16/04/16/1646212/that-man-who-deleted-his-entire-company-with-a-line-of-code-it-was-a-hoax?utm_source=feedburner&utm_medium=feed&utm_campaign=Feed%3A+Slashdot%2Fslashdot+%28Slashdot%29 Tanks to Salmon Trout. The story has been removed from a forum that had it. It was said to be a kind of publicity stunt to promote something. A PCWorld post contains this sentence: "The most surprising thing might be that so many people believed him, including those on a forum for technology experts." |
|
| 1533. |
Solve : QuickTime? |
| Answer» Here's an INTERESTING ARTICLE about QuickTime. | |
| 1534. |
Solve : Apple and the FBI. - part 2.? |
|
Answer» Link: Federal officials announced Monday night they successfully cracked into an iPhone belonging to one of the San Bernardino shooters and no longer needed Apple's help in unlocking the device.This would not have been an issue if the man had backed up everything to Apple Cloud. Everybody should have a backup. Curious what method they used to gain access. My guess is that they somehow were able to copy the information from the one phone to others and try up to 10,000 combinations of 4 digit pins until they hit the right one. Say they have 100 PHONES and 100 people given a group of 10 pins each to try out, its a crack the pin party at the FBI and you go until someone Yells Bingo! With 100 phones and 100 people, within 10 tries of 10 digit pins ( 100 pins per cracker ) they would be in pretty quickly, at the expense of 100 people hourly, plus 100 phones, plus whoever they hire to carefully EXTRACT a copy of the phones encrypted memory to clone to the other phones. Maybe the reason why it took so long is because they didnt buy 100 phones and someone was WORKING around the clock cloning the phone and running a group of 10 pins and then cloning again and trying the next 10 and so on and repeat until bingo.... I wonder if Apple will increase the pin length to say 8 digits and make it that much longer to brute force crack by cloning the memory. But the minute someone has physical access to your device its just a matter of time before they are in if they are determined and educated in how it all works.Aside from the April Fool jokes, there has been some rial response to the question: 'How Did they Crack It?' From PC Mag: Senators Briefed on How FBI Cracked iPhone. From CNN: We bought 'a tool' to hack iPhone (Also with video of Apple CEO TOM COOK.) No clue as to the price. |
|
| 1535. |
Solve : Security updates available for Adobe Flash Player? |
|
Answer» These recent updates apply to Windows, MAC and Linux. ALSO, server updates are available. Here is the specific link for the Flash player: Release date: APRIL 7, 2016 |
|
| 1536. |
Solve : USA to Disable Drones Near Airpots; Stop Wi-Fi.? |
|
Answer» The full title from BBC is: The bill also contains new rules that would force commercial airlines to KEEP flight-critical systems separate from in-flight ENTERTAINMENT systems in the wake of concerns that hackers could remotely take control of aircraft.But they are just thinking albout it... so far. EDIT: Drones like the Parrot AR.Drone use the 802.11n specs for remote control. Thus to disable any drone using that set of rmicroware bands would have to jam tghe whole set to disable a NEARBY dlrone. |
|
| 1537. |
Solve : Comcast to bring Free Wi-Fi to East Coast.? |
|
Answer» Yes, it is a PR and it is alsol news. tI made CBS news in San Diego, therefore it must be news. The CBS -8 link is below: Wawa Stores in DELAWARE, Florida, Maryland, New Jersey, Pennsylvania and Virginia to offer Xfinity WiFi for all visitors A Wawa store is a like a Dlii or fastr food place. They serve both hot and cold items. Really, Wi-Fi and Freench Fry are not new. At least 7 major food chains ALREADY have it. Link below: http://www.whereverworker.com/7-worldwide-fast-food-chains-with-free-wifi The above link has some maps for WORLD travelers. Take note taht there is no Burger King in Colombia. But Colombia does have Quiznos. If it's the East Coast ...then why was it news in San Diego ? ? Slow news day out there ? ? |
|
| 1538. |
Solve : Spotify hacked? Angry users fight to regain accounts.? |
|
Answer» That is what is being reported by Computerworld and OTHERS. Here is one link: "First spotify sends me an E-mail asking me to reply to confirm my account details, and now my account is hacked! dang you spotify and your poor security" Quote of the Month Finalist.... |
|
| 1539. |
Solve : More Big Tech Layoffs Coming Soon.? |
|
Answer» Yeah, you already heard about it. But it is a sad story that is getting worse. Bay Area High Tech Layoffs 2016He is wrong. It will really get worse. CNBC did the story early this year and they made it sound almost funny. When 33,000 white collar people lose jobs, it is never funny. The total count is not yet know because it is still going on. Intel said 12,000 were laid off. Apple? Maybe 30,000. (It is not over yet.) Name any tech company and do a search. Here is an old Apple story. http://www.cnet.com/news/apple-layoffs-due-march-14/ Here is a map: This gives you an idea of which areas in USA could SUFFER the most. Where did you get the 33,000 number? And, where did you get the 30,000 number for Apple? Sources ? And, what does the venture capital map have to do with this? Nothing, as I see it. Agreed...and waiting for sources as well...The venture capital map shows where the money has been invested in the High Tech areas. These areas are also the places whens the tech layoffs occur. Numbers, names and places. Yahoo to lay off 15% of workforce (USA Today February) Later reported as 10% Intel to lay off 11% of workforce in big shift from PCs (USA Today April) Last was the start of the worst. HP Plans To Lay Off 30,000 American Workers While Hiring (Earlier 33,000 was stated.) IBM last year an dearly this year. (Notice the report is from IEEE.) Quote Those laid off are being told that they are welcome to apply for jobs internally; IBM officials boast of 25,000 openings, but don’t indicate whether any of those are in the United States. (The company no longer breaks down its worldwide headcount—about 378,000 at the end of 2015—by region; a fairly recent estimate suggests the U.S. headcount is about 70,000.) What the IBM Layoffs Look Like - IEEE Spectrum They knew it was coming and why. Quote “RA'd today, I'm a 20 year employee. Have been training my replacements in India for more than a month now so I was fully aware this was coming—as it was openly discussed that they are my replacements.”(From same report) A more intense report January 19, 2016 Chowdhry: Major Tech Layoffs Are Coming, Fed's Dudley Is 'Clueless' On Labor Market Clueless? Really? I don't think they were clueless. Chowdhry smashed out estimate for 333,000 layoffs in the Technology sector. According to Chowdhry, Back Expertise, Products and Services is going to shrink ... He names: Amazon. Microsoft EMC Corporation VMWare, Inc. Hewlett Packard Enterprise Co IBM Cisco Systems Juniper Networks Oracle Corporation He is that link again. http://www.benzinga.com/analyst-ratings/analyst-color/16/01/6149651/chowdhry-major-tech-layoffs-are-coming-feds-dudley-is-cl#ixzz47hleNUyD My point here is that it can only get worse. The media has played with this for about two or three years and just now it is becoming clear that high Technology is leaving the USA and few what to spread bad news. Some believe you need to downplay bad news. That does not really chage what it is. If you work in any of the Tech centers in the USA, you likely know this already. Now it you are a youngster just getting into Electrical Engineering or Software ware Development, consider moving to another country someday. The sky is falling...Quote from: patio on May 04, 2016, 10:50:56 AM The sky is falling......YESTERDAY: “The Sky is Falling” Scare Stories Have No Place in Public Interest Science or Policy The author is talking about the environmental THING. Still, an economic ice age would have as much impact or people's lives. Before you solve any problem, you have to know what it is. |
|
| 1540. |
Solve : You should delete QuickTime from your computer right now, Homeland Security warn? |
|
Answer» I'll put this here. A moderator can move it if placement elsewhere is preferred. browser can get you in more trouble than a app. Just a thought.That PARTICULAR app, Quick Time, wants a LOT of privileges. Also, some video presentation say they are better in Quick Time, so users download it. Here is more details from a reliable source: http://www.howtogeek.com/250926/quicktime-for-windows-is-dead-and-you-should-uninstall-it-to-stay-secure/ Quote QuickTime for Windows is VULNERABLE to two security attacks that would allow an attacker to run code on your computer if you visited a web page or played a downloaded file. It’s particularly exploitable thanks to its browser plug-in. If you’re using Internet Explorer or Mozilla Firefox, which still support the plug-in, you can be compromised just by visiting a web page. Google Chrome no longer does supports these old plug-ins, but Chrome users shouldn’t get too complacent. Even downloaded video files could exploit the desktop version of Apple’s QuickTime Removing QuickTime should not be a concern for the vast majority of users. I haven't encountered a website for a very long time that requires QuickTime. It's just fallen out of use, which is probably why Apple no longer supports it. |
|
| 1541. |
Solve : Microsft offers Windows 10 ISO with no key required.? |
|
Answer» As POSTED in another place, MS will let you have an ISO of Windows 10 that you can use with not product key. But read the details. A genuine Windows product key will be REQUIRED for activation purposes during or after installation.What about anybody who did the upgrade and the SYSTEM crashed later? Anybody who thinks he got the early Windows 10 in a legal way should go ahead and try the new installation. Microsoft will know if you are lying. A careful read of the article shows you can skip the product key step and go ahead and install Windows 10 and it will run. Unless you are a pirate. Microsoft has made some statements earlier about you can rover the product key from a crashed system. The article from Redmond PIE makes it clear that even if you lost the key, you can STILL install Windows 10 on a machine that had Windows 10 and crashed. Microsoft knows. One must read the whole thing. Including all the comments.This is great, something Microsoft should have done a long time ago IMO. At last people can simply download an ISO of Windows to reinstall their machine rather than having to worry about making restore disks. It also resolves the issue where for Windows 10 you previously needed to use their pointless "Media creation tool" - All this did was mean that you needed a Windows machine to make an installer for Windows (can you see the problem with this! ). As far as what happens if you have performed an upgrade from 7/8 - Your key should still work, I've clean installed Windows 10 on several PCs with Windows 7 licences and the 10 installer simply accepts the Windows 7 key. If you don't enter a product key it will run for a short period of time. In order to keep using it you will need to enter a product key. |
|
| 1542. |
Solve : Binge TV Watching News of Today? |
|
Answer» Some time back T-Mobile introduced 'Binge On' for their mobile customers. “‘Binge-watching’ is a growing public health concern that needs to be ADDRESSED,” scientists concluded.But it is not just the USA... (New Zealand.) For the record, 94 hours of TV isn't good for you Quote On Saturday, Fragoso holed up in a Midtown Manhattan APARTMENT with two others and several witnesses to start what would become a nearly four-day attempt at making binge-watching history.I would post more, but I have to catch up on 'Super girl.' Quote For the record, 94 hours of TV isn't good for you Only time ever close to this was when I had the flu and COULD only just lay on the couch and occasionally get up and walk to bathroom with a splitting headache when i right sided self. But while I was in front of a TV for about 2 days around 48 hours, the longest I was up to watch anything was about 4 hours and then nap and then repeat, and then wake up at 6:00 in the winter and wonder is it 6AM or 6PM which is the strangest feeling when at both times in the winter its dark outside, and the only way to tell was to watch TV and wait for some indication of if it was AM or PM. I'd say I have binge'd on the computer far more than the TV because TV is boring. I watch very little TV. I need interaction and a TV is just blasting you with information most of which is nonsense advertising etc. At least on the computer I can adblock as well as have some logical interaction to exercise the brain. I think the only exercise a brain does watching TV is if you watch some history or science stuff or game show that asks questions to make you think, but the rest of it is useless pretty much. I was up once for 27 hours on my computer when snowed in and having to remote into work and take care of some stuff. When I should have been sleeping i was gaming and then I went right back to work to work from home some more. I then started to get an headache and my eyes felt so dry that I finally called it quits and got 2 hrs sleep and back to remote admin work for another 10 hours and then broke out of the long STRETCHES that are unhealthy. My biggest FLAW in being on the computer too long is that I will I guess either not feel hungry or ignore my stomach and keep going and then my blood sugar will dive to where I finally get up and just about fall over needing to eat to get back to feeling healthy again and no feeling like im going to pass out. Fast metabolism and not eating is not good. As well as eating and not doing physical activities also doesnt help. I have found my balance to stay healthy and not have too much of any one thing although I still binge game etc if a new game comes out etc and play it for like 13 hours and then crash.To help you with your health, may I suggest a new giant keyboard? (Requires use of both legs for shift key.) Just want to help! Thanks for the laugh... Thinking they might have a twister version of this too for special sites that I cant mention here. |
|
| 1543. |
Solve : 8 Android camera apps that will take your photo game to the next level? |
|
Answer» I consider myself an Android novice. TAKING pictures with my smartphone has been interesting but the camera options, with the default camera app that was installed on the phone when I bought it, are somewhat limited. I gave no thought to the possibility of installing another camera app that might offer some additional features. So, this article caught my INTEREST when I learned of it from an email from TechConnect Daily. Camera MX works well...didn't know of the others but i don't do selfies.... If you're anything like me, there's a good reason for that Quote from: patio on May 09, 2016, 12:59:42 PM Camera MX works well...didn't know of the others but i don't do selfies....HA! I don't do them either. On the other HAND, using the camera on the other side has been convenient. I've been helping my son by doing some improvements and repairs to a rental property, or meeting with contractors, while my son is out of state. The ability to take PHOTOS and attach them to text messages enhances the communication regarding the status of work on this house. Those would be "housies".... |
|
| 1544. |
Solve : 250 GB SD micro card? |
|
Answer» From Samsung. |
|
| 1545. |
Solve : Big Update for Windows 10 'abnormally slow'? |
|
Answer» Full Title is: |
|
| 1546. |
Solve : Samsung's foldable phone in 2017? |
|
Answer» Full title: |
|
| 1547. |
Solve : Apple pours $1B into China company? |
|
Answer» You can search for |
|
| 1548. |
Solve : Unlimited Mobile Data plans Are Dead.? |
|
Answer» This STATEMENT is news because it was made by Verizon CFO . And of course, as DSLReports points out, Verizon has been happy to exempt its own video streaming service Go90 from its own data caps, which means that the CARRIER doesn’t mind when users watch a LOT of video on its network as long as they’re doing so through Verizon’s own application.(The article is about wireless, not DSL.) |
|
| 1549. |
Solve : Win Tin Auto Upgrade Goes Way, Way Too Far!? |
|
Answer» Yeah, it finally happened.... it went over tithe edge. Win Tin ? ?...No, it was not. Or it is a drtamatization of what did happen. In took place back in April. Pepple are now blaming Microsft for the bad wheter. There's more. You can find a lotmore of tghis stuff everywhere. Facebook. Twitter. You Tube. https://www.youtube.com/watch?v=Q5Dy_uGW6iI This time they really did go way too far. Some professionsals can nearly lost work projects because trhe Widows 10 thsing is intgrusive. The ughe download also eats lyour bandwidth if yhou areon a limited service. Which means you have to shell out more money to get the stuff yhour really want. Quote No, it was not. Or it is a drtamatization of what did happen. Source ? ?Quote from: patio on May 29, 2016, 09:57:54 PM Source ? ? http://www.kcci.com/news/windows-10-notice-appears-during-live-tv-weathercast/39241288Quote from: patio on May 29, 2016, 09:57:54 PM Source ? ?BC beat me . It was not a photo shop thing.It is from footage from the TV station KCCI is channel 8 in Des Moines, Iowa. http://www.kcci.com/ The blooper was on April 26, this year. The station itself reported the blooper and many other sources. Windows 10 notice appears during live TV weathercast This makes the update a security risk. http://www.theverge.com/2016/4/28/11525418/microsoft-windows-10-upgrade-prompt-storms-weather-report http://betanews.com/2016/04/27/windows-10-interrupts-live-tv-broadcast/ https://www.youtube.com/watch?v=WumCZLTpfKw No very good PR. No action against Microsoft has been published. Nat yet. I don't think there is much basis for any action, actually. Competent IT staff should have been able to nip the problem in the bud before there was any damage to these companies. What kind of an IT staff at a place like that pushes updates without smoke-testing them in the intended software environment? Quote from: BC_Programmer on May 30, 2016, 12:18:15 AM I don't think there is much basis for any action, actually.A TV station is mostly made of engineers, technicians and actors who are involved with their medium. The spend very little time on IT issues, other that what relates directly to their work. Never before has MS pulled a stunt like this. It came unwanted or unexpectedly to perhaps 5000,000 users. (Based on the number of download of the Never 10 application.) https://www.thurrott.com/windows/windows-10/65706/steve-gibsons-never-10-helps-turn-off-windows-10-upgrade-announcement Quote The inestimable Steve Gibson has chimed in with his own utility for preventing your Windows 7/8.x-based PC from ever upgrading to Windows 10 without your CONSENT. Called Never 10, it gives control back to the user Other related problems are now reported. http://betanews.com/2016/04/25/windows-10-update-problems/ Quote Problems reported by users following the installation of the updates (which rolled out on April 12) include broken apps, Start menu crashes, and crash loops and bluescreens. But turning of the forced upgrade also disables needed updates. What responsible IT department will allow that? Dammed if you do, dammed if you don't. Quote from: Geek-9pm on May 30, 2016, 01:28:26 AM But turning of the forced upgrade also disables needed updates. No, it doesn't.Quote from: Calum on May 30, 2016, 08:58:26 AM No, it doesn't.Well, I must have missed it. Please explain. If a user is running Windows 7, how does he stop the Windows 10 auto update without missing other updates important to the Windows 7 system? Quote from: Geek-9pm on May 30, 2016, 10:04:11 AM Well, I must have missed it. Don't accept (in other words, decline) the Windows 10 upgrade, or use one of the many programs that offer to do this for you - perhaps by following the guide you've linked to in your original post on this topic. I'm sorry to be blunt but there are approximately 9001 articles describing how to not upgrade to Windows 10, and you seem to have linked to most of them in your posts on the subject since MS started offering the upgrade. By default, yes, if your installation of Windows 7 has the appropriate updates installed and meets the conditions then the upgrade will be scheduled unless the user intervenes, this does not mean that it's impossible to stay on Windows 7 and get security updates.Calum, thank you. You made your point. There are HUNDREDS, if not thousands of articles on the subject of The Windows 10 upgrade options. If one pays attention and reads the details, there should be no issue. Of course you pay attention, Calum. I try. But I don't know how many users really read the details. A number of seasoned users claim MS tricked them into getting Windows 10 and afterwards they found n they did not expect it to happen overnight. In my case, I have keep a copy of Windows XP on my system. Windows auto-update will not work with XP, only windows 7 or 8 or 8.1 versions. I have my PC to auto start itself early in the morning. Then when I have finished breakfast I can reboot and get into Windows 7. And yes, I do have the Windows 10 also installed on this old Dell Desktop. When I am in Windows, the Auto Update has piped up on my screen and I dismiss it. So far I have not installed any tool that will stop it. (Some have said that I am not entitled to have both Windows 7 and Windows 10. I disagree. I have two licenses for windows 7, so I do not think I have hurt MS in any way by using three different versions of Windows on one machine. I have as many licenses for all.) But about the trick from Microsoft, the changing the X to mean 'I don't care' when it used to mean 'get out of mu face' , has many veterans users up in arms. Steve Gibson is one of many, many professionals that are crying foul. But whee is the referee? Quote Steve Gibson's Never 10 Helps You Turn Off the Windows 10 Upgrade ...Link Here: I use Windows 10 for a specific need I have. But often I don't use it for general use. When Window 7 becomes no longer piratical, I will use a third-party program I help me adjust to the strange desktop of Windows 10. Interestingly, I've learned just a short time ago that customers of our older software have started to be upgraded to Win10 as a result of this. Our new Windows stuff works fine in Win10, so that's not a problem. But that is a replacement for a much older set of software that runs on a separate OS, which would have sidestepped the issue except that because the OS barely works on MODERN systems, we run it inside a Virtual Machine on VMWare, which we run on a Windows System. Some of those Servers the customer didn't spring for an actual Server copy of Windows, So they got upgraded to Win10 due to these latest changes. However this makes the Virtualized OS unbootable- it RELIES on a hardware dongle in the USB Port and on Windows 10 VMWare cannot pass-through that USB Device. Even sites that do use a server version of Windows have been affected. While their server still runs fine (as the server versions of Windows do not upgrade to Win10) their workstations did get upgraded so they haven't been able to print through the Terminal program that connects to the mainframe, so they've been unable to print reports and such. Quote Steve Gibson is one of many, many professionals"Steve Gibson" hardly belongs in the same sentence as "professional" without a strong negative.Which Steve Gibson? Quote Steven Gibson is an American software engineer, security researcher, and IT security proponent.[2] In the early 1980s, Gibson was best known for his work on light pen technology for use with Apple and Atari systems. In 1985, Gibson founded Gibson Research Corporation, best known for its SpinRite software.Anybody who worked on either early Apple or Atari was an amateur. |
|
| 1550. |
Solve : Intel stays on track. Bad news for AMD?? |
|
Answer» Not surprising news. What is surprising is many have thought that now was the timed for Intel to branch out and become a presence in other markets besides the PC . Instead, they will KEEP pushing the 86 design into the future. Full title of the reference is: Intel's Retrenchment Is More Bad News For AMD Jun. 7, 2016 http://seekingalpha.com/article/3980476-intels-retrenchment-bad-news-amd Quote Following Intel's (NASDAQ:INTC) Q1 earnings, I wrote that the company had a fundamental choice between retrenchment and transformation. After recent presentations at Bernstein and Computex, it has become clear that Intel has chosen retrenchment: doubling down on x86 architecture to preserve its domination of the PC market, and leveraging this to make gains in the data center and Internet of Things. The wisdom of this course of action will long be debated, .... The author goes on to speculate this is bad news for AMD. Doing a bit of research, "Seeking Alpha" appears to be a front for shorters/short term traders. They seem to SPECIALIZE in "bad news" articles; they release negative articles, depress the stock PRICE of a company very slightly, the traders buy, then when the stock recovers, they sell, making a reasonable profit. They are a CLEVER scheme because, legally, they operate in such a way that legal screens covering FRAUDULENT trading practices cannot be proven.Thank for the warning. I will refrain from reading it anymore. The idea that Intel can hurt AMD is rather silly. AMD is doing well. If anything, Intel is, in my humble option, top heavy with too much capitol invested in one area. The title could have been, 'Intel is too stubborn to transform' and they are missing the boat. If anything, buy more AMD if it goes down a bit. |
|