 
                 
                InterviewSolution
This section includes InterviewSolutions, each offering curated multiple-choice questions to sharpen your knowledge and support exam preparation. Choose a topic below to get started.
| 1651. | Solve : Google finds new planet. Far away.? | 
| Answer» These stories indicate taht AI was used to find a planet.  NASA has discovered an eighth planet around a distant star, which means we’re no longer the largest solar system we know of. The discovery was made thanks to some artificial intelligence help from Google, which found the planet by scouring previously overlooked “weak” signals in data captured by the Kepler Space Telescope. The newly found planet is located in the solar system around Kepler-90, a star about 2,500 light-years away from Earth that was previously discovered in 2014. Hard to grasp. How can they find ANOTHER solar system so FAR away? Quote How can they find another solar system so far away? Whole bunch of different ways! One of the first extrasolar planets was discovered around a Pulsar, because the planet disrupts the otherwise precise timing of the light we see from the pulsar. Observing transits is a way of determining extrasolar planets and helping gauge their mass, and observing changes in the spectra coming from the star during such a transit can tell us the makeup of the planet's atmosphere. We can also detect "wobble" from stars that have planets, because like our own sun the barycenter of the planetary orbits is not in the center of the star, this can tell us the GENERAL mass of the system in general. In the same way we can learn about the composition of other stars, through their bright-line spectra. As a side note and to make it even more "computer related" I rather like a program called "Space Engine" which is possibly best classed as a Software Toy. In addition to being able to see a LOT of stuff that we know about (I presume it will be updated for this new system as well!) it will also procedurally GENERATE stars and planets, which is good for taking nifty screenshots. I put a few into an Album here. Some from Our solar System, and some from a Galaxy far, far away, but quite recently. | |
| 1652. | Solve : AOL users paying for accounts ?? | 
| Answer» This comes from channel 7 news in San Fransisco. November 20, 2012 12:00:00 AM PSTCheck your credit card bill and see if AOL is biking you. By the way, Both AOL and Yahoo are changing their policies about free e-mail. Years ago when broadband came in my mother was also paying for AOL she thought to keep her e-mail address. I saw her using her AOL e-mail the one day and said so how much are you paying for internet and she said $89.99 for Cable Internet and then $24.95 to AOL for e-mail and I put a stop to that quickly when I told her that she doesnt have to pay to keep her e-mail, she only needed to pay if she was still using their 56k dial up service. It would be pretty bad if someone was paying for say the last 10 years for AOL to find out that 120 payments x $25 was all wasted MONEY... = $3000 USD My mom fortunately only paid 9 months before I caught this problem, so only $225 wasted. | |
| 1653. | Solve : Intel and ARM collaborating on 10 nm mobile CPU? | 
| Answer» The full title is: The next gen 10 nm mobile CPU runs at 3.5 GHz and 0.5 V, with an outstanding energy efficiency of 0.25 mW/MHz. ADDITIONALLY, Intel and ARM will UPDATE the EXISTING Cortex A55 to Intel's 22 nm manufacturing process, which will enable it to run at 2.35 GHz and 0.4 V.https://www.notebookcheck.net/Intel-and-ARM-collaborating-on-next-gen-3-5-GHz-10-nm-Cortex-A-mobile-processor.261548.0.html The idea that ARM and Intel could ever work together is remarkable. Quote from: Geek-9pm on November 03, 2017, 09:41:56 PM The idea that ARM and Intel could ever work together is remarkable. Only if you have been on the MOON for 15 months Quote August 16, 2016 At the time... Quote ARM said it has actually been collaborating with Intel for some time | |
| 1654. | Solve : New Old Rumor: Snapdragon laptops? | 
| Answer» Here we go again. Microsoft last year was working on enabling x86 EMULATION on Arm processors in the Windows 10 Fall CREATORS Update, ALLOWING Arm devices to run x86 apps.Wait and see... I saw an article the other day that talked about some leaked performance results of running Win 10 on a snapdragon processor. The numbers showed the snapdragon to be significantly slower than an Intel i3 cpu while running Windows. Here's a link to an article regarding the snapdragon's performance: https://www.digitaltrends.com/computing/windows-10-on-qualcomm-snapdragon-tests/ | |
| 1655. | Solve : Mahor Yahoo Mail Breach.? | 
| Answer» The BBC and other news sources REPORT Yahoo mail has been cracked. billion users Above link has video report.You rectal that Verizon got Yahoo in 2018. Do not think other mails services are PERFECTLY safe. Gail, Hotmail ans others have had major problems with security. | |
| 1656. | Solve : Mac, PC or smartphone? A major security flaw SNAFU.? | 
| Answer» A number of media brfoadcasts today say that Apple and otghers know of two major security flaws. The flaws are not softrware exactly. Rather, it is something inside the chips made by Intel or others. Apple says all of its Macs, iPhones and iPads contain a security flaw that requires an update. It's not alone. Any owner of a PC, tablet or smartphone should make sure that automatic software updates for their operating systems are enabled after security researchers this week revealed a broad flaw in Intel and other chips that could allow hackers to access data previously thought to be secure.Question: How did this happen? EDIT: Another link: https://www.technologyreview.com/s/609891/at-least-3-billion-computer-chips-have-the-spectre-security-hole/ Quote Its chief U.S. competitor, AMD, which has been gaining ground on Intel, said in a blog post that its chips are not vulnerable to Meltdown and there is a “near zero risk” from one variant of Spectre and zero risk from another.IMO, The media response to the flaw is vastly overblown, which is about what you can expect for any security-related issue. "Meltdown" is a security issue related to speculative execution on Intel Processors which (allegedly) dates to the Pentium Pro and affects all x86 processors save certain Atom chips. It allows local processes, by carefully manipulating their specific Assembly instructions and use of the CPU cache, paired with tight timing (it is a race condition, after all) to possibly read small segments of memory from areas within the process address space that they would typically be restricted from accessing. Spectre is a related vulnerability which is largely the same but doesn't allow directly reading information but allows otherwise restricted information to be "guessed" based on specific timings of page faults under certain instructions. As far as I can tell, both exploits require the ability to execute direct machine code- eg Local Machine access, so the attack surface is not particularly wide. Of course, a vulnerability in a web browser which allows a piece of javascript to "escape" the sandbox and run arbitrary assembly code might be able to read restricted memory addresses.... But then we also have ASLR, which randomizes the Address Space Layout of processes in largely unpredictable ways. And the process is incredibly slow to read these areas of memory as the turnaround time is rather long (for software) and the throughput is small. You would have to no precisely where to LOOK for something to get anything that was particularly valuable/secure. There are claims that this will allow FREE access, via Javascript, to all of your physical Memory; or that it will allow malicious websites to steal SSL certificates and signing keys. But it only allows access within the same process address space and things like SSL certificates and signing keys aren't usually kept in Kernel memory anyway- a javascript exploit that allows you to read the process memory of the browser normally doesn't really need an exploit to run amuck. And it's unclear how ASLR might factor into this, as well. It seems like at best it will make the segments of data that are from privileged areas of memory that are accessible to user-mode code through the vulnerability unpredictable. Personally I think the media response is the same old security circus they make about every "security issue" the only real winners are the vendors of security software, who get more customers because everyday users have been frightened by the idiotic coverage. The fact that infecting your typical user typically requires nothing more than a readme file saying to shut off their AV and to run it as administrator, and certainly doesn't require some elaborate, complicated CPU security flaw that requires assembly language and tight timings to pull off.This was topic of discussion at work today as for it was in yesterdays newspaper. As BC stated it I feel is the security circus "scare tactic's" which makes for news ratings to draw attention and make it sound way worse than it really is. In addition to the winners being the vendors of security software, this likely also caused some over paranoid users to ditch their Intel computers for a new AMD system since AMD doesnt have this first flaw. The second flaw affects all processors Intel and AMD, and Phones & Tablets with ARM based processors and it looks to be easily patched. http://www.zdnet.com/article/security-flaws-affect-every-intel-chip-since-1995-arm-processors-vulnerable/ I'm curious though how javascript could pull off such a means to read memory outside of its scope unless its something along the lines of accessing array elements outside of the normal scope to try to read in information that is outside of that of the javascript program itself. In my years of hobbyist programming I have accidentally accessed array elements outside of the scope such as when forgetting that arrays start at 0 and not 1 and so I call to array[64] to get the 64th element, but its actually the 65th element and if you have 64 characters stored etc, its really between 0 and 63 and so whatever is read in at array[64] is whatever was last stored at the memory address and its unpredictable what the output would be. In other languages there are methods of accessing memory directly to get whatever is stored at specific addresses as well as if you know a memory address that is used for specific pieces of information you can exploit that to grab INFO or force change info which is how a lot of game cheats work by memory injection to make a game god mode where the value is refreshed to MAXIMUM even if the game itself has reduction calculations that are suppose to reduce hit points or health bar of a player etc, it constantly tops the value off or the value is set to a huge number. In my tinkering with javascript, it has felt as if there are very tight controls on what is and isn't allowed. Calling to an array element outside of the scope however last i knew wasnt restricted and still doable to grab whatever is in memory at that placeholder. But to read in memory from some other means, I am not aware of any methods with javascript due to the limitations in place of its design. Additionally due to inability to write to file from javascript its not like you can create another file type from javascript and then call to that to execute which other script and programming methods are not restricted In some of the articles about the 'fix' is a concern the 'fix' will slow down the CPU. Such would be a concern to companies that do a lot of data processing. They may prefer to ignore the risk and go for better throughput with the very small risk of getting an infection. Some administrators would rather not have a patch that reduces the throughput even if it makes the CPU only 7% slower.If there is a performance hit then hopefully there is a choice on implementing it in a corporate environment via and update server, however with Windows 10 its a forced update at this time for non-corporate systems. I have a year old Dell Core i3-5015U 2.1Ghz Laptop that is Windows 10 that I haven't turned on in about 4 months because I prefer Windows 7 for what I use my laptops for. I will run a benchmark I guess offline and then save that data and then roll it forward to all updates and run a benchmark after and see if there is any change to what the CPU can crunch for single and multithreaded tasks. Meltdown is fixable. It involves patching context switches between user and kernel mode to account for the possibility of the flaw. This reduces the performance of such calls. That is what will affect software performance. However, realistically, the context switches were already one of the most time-intensive things that could be done, so software already avoids them at all costs. The patch is speculated to reduce performance as much as 30% but so far even synthetic BENCHMARKS have shown very little real-world difference in most applications. A few companies have had problems which they have now blamed on the patch for reducing performance as much as 60% which I'm skeptical of. Spectre is not fixable in existing chips. It is much harder to exploit though and doesn't give much information. As far as Javascript- that was sort of my point. Exploiting these security issues requires rather low level access to be able to run Machine code instructions, which is not something you can do in Javascript, which means that utilizing Meltdown or Spectre from javascript will require also exploiting far more serious browser security problems that would allow, for example, a javascript string to be directly executed as machine code, or something. At the point where untrusted software is able to directly execute machine-code instructions on your PC I think the "battle is lost" anyway. Aspects like UAC or AV software can protect you but at that point your system is effectively compromised. As I mentioned for the majority of consumer systems, these sorts of exploits are entirely redundant. It wouldn't make sense to design an elaborate scheme involving obscure, low-level exploits in the hardware when so many people are security-ignorant and happily turn off their AV because you claim your software is a "false positive" and then wonder where the malware keeps coming from. | |
| 1657. | Solve : Say Good-Bye to the iPod clasics.? | 
| Answer» This last week Apple announced the end of life of the iPod and some of the other items related to it. This should not come as a surprise as nowadays you can FIND smart phones radios and other gadgets that will play MP3 files just as good. It should be no surprise that Apple has finally canned these two older 'Pods which no LONGER really fit into Apple's suite of modern devices. Neither device supports apps, which have become a cornerstone of Apple's music business now that Apple Music has all but replace the aging, bloated disaster that is iTunes. Similarly, streaming (which neither of these devices can fully support given they've got no capacity for a data connection) has overtaken older download-ing based habits. They are no longer sold new, but they didn't vanish from existence. Personally I've found smartphones to SUCK awfully for playing music. Aside from having awful battery life, they lack tactile buttons and oftentimes the software sucks. I tried to put music on my phone and then found out it doesn't actually have a way to play music- so I download VLC and it manages to find about 20% of the music I put on, arbitrarily not allowing me to play others unless I navigate there manually for EVERY single file. I still have no idea how to make playlists and can't be bothered to look into it due to the general deficiencies; If you are going to play music on a smartphone it seems the way you have to go is through the use of streaming services which is exactly what was noted in the article. I still use a 16GB Sony MP3 Player for music. Which replaced a similar 4GB model I've had for 10 years. Only reason I replaced it was because it has literally fallen apart over time. It's so sad | |
| 1658. | Solve : Conflicts about reported defects in CPU design? | 
| Answer» Recently there have been reports of some kind of strange defects in almost all current CPU designs. These defects have been reported as 'Meltdown and Spectre exploits .' Linus Torvalds, Linux's PRIMARY creator, had good and bad news about the chip security problems Meltdown and Spectre. The good news is the lead up to the Linux 4.15 was "quiet and small, and no last-minute panics, just small fixes for various issues". The bad news? "It's not like we're 'done' with Spectre/Meltdown."The above ZDNet story also has some more links and bout Intel and Linux and the reported CPU security issues. In essence, they say it has not been fixed yet. I don't consider even 1 of those sources credible... I certainly don't respect their so-called Tech writers either.Quote from: patio on January 31, 2018, 12:51:56 PM I don't consider even 1 of those sources credible...So NOTED. Here is where you can get back to the first source: https://meltdownattack.com/ They link to papers from the University of Pennsylvania and University of Maryland. Very bestirring. No pictures at all. A quote with the tech stuff: Quote The issue affects Intel CPUs broadly, but also AMD and various ARM processors are suspect to a similar attack. Browser vendors have already started mitigating the issue with Microsoft, for example announcing improvements to Internet Explorer and Microsoft Edge browsers against Speculative Execution. Mozilla has also taken action against the new class of timing attacks and Chromium based browers a fix is scheduled for version 64. The WebKit team also did a writeup on the implications of Spectre and Meltdown in their blog.https://react-etc.net/entry/exploiting-speculative-execution-meltdown-spectre-via-javascriptYou still don't get it...it is NOT a manuf. defect...it's a WEAKNESS that was being exploited. BTW all the fixes to date have been more a nightmare than the exploit itself...The Title is: Re: Conflicts about reported defects in CPU design In the reports there was no MENTION I saw about defects in the factory. A very weak over done design that makes people cry is a defect in design. The fact that it works good in an honest society does not justify its use. Does it? In a hostile world anything that has a weakness can be seen as a defect. One could argue that, but the fact remains that criminals take advantage of whatever can be exploited. whether a law, a person or a machine. The concept was to make a CPU faster by speculative pee fetch. The CPU does not really needed to per-fetch, but the engineers who design logic think the speed increase is worth the risk of something networking right. If somehow I came across as saying there was a glitch in the factory, I Herby sate that it was not my intent to say the factories made the mistake. The defect or flaw is more at the abstract level. The CPU shall put unverified code or data into a cache if it might be needed. The issue is when or how will the code or data be certified or tested for evil intentions of people. Additionally, even if everybody in the world was honest, there is the question of data integrity. Will corrupted data be allowed to enter the cache? Presently there is no proof t his issue is causing any harm. There are other things to worry about. I hope this post will help others locate the information they need. There is no coming danger from the 'meltdown' thing.. The bad things that have happened were due to some plain simple lazy security habits. What we learn is that a some thnings we believe are fool proof and not. Quote The Title is: Your words...not mine.What's your definition of defect? Quote fault, flaw, imperfection, deficiency, weakness, weak spot, inadequacy, shortcoming, limitation, failing; kink, deformity, blemishIn the above the abstract set comes comes before the concrete set. Yhe CPU has a design deflect. Or weakness. Or shortcoming. I would say they are defects- similar to things like the FDIV bug, as they are issues with how the CPU operates that are part of it's design. I think their realistic impact has been overstated. As Patio mentions the impact on people by the supposed fixes- such as for example making many AMD systems unbootable- is probably a greater impact than any security problems. The Meltdown exploit which affects only Intel is the "easier" to exploit. It requires carefully crafted machine code and allows a process to read areas of memory in it's address space which normally are not accessible to it and are used by the OS Kernel. Spectre is a similar class of bug but requires even more carefully crafted machine code instructions and data is "guessed" based on specific timings of those instructions. It doesn't seem like a vulnerability that is likely to allow particularly private information to be taken. Some sites claim it allows sensitive data to be stolen, but kernel memory doesn't have things like say passwords, and given it needs very careful ASM programming the exploit even the "easy" Meltdown exploit I'd argue that the common premise that this is something that "any website" can use to steal your passwords with javascript is just another act of the ongoing security circus.Yes, the danger is overstated. But what is worrisome is that for such a long time nobody ever nmotices. One might wonder if there are other things the CPU can do that are not well known? Would there be some hidden danger? Years ago some CPUs had undocumented instructions in the code set and hobbyists loved to speculate of what they might do. Modern CPU designs are so very complex that it would very very hard to verify that a design does not have a vulnerability that might show how be exploited. Here is an article that explains this statement: A CPU Researcher Explains Why It Took 22 Years to Discover Fundamental Chip Flaw In this context the term 'clup flaw' does not mean something went bad in the factory that makes the chips. No, rather, it is behavior that is thought to be worrisome or unwanted. Quote To me, a layman, it’s odd that CPUs require so much research, since the architecture is designed by humans. Why do they require so much outside research to sort of understand what they’re doing?You will find no simple answers. Well, not simple answer of amazing value. As I alluded, I think it's really just another symptom of the "Security Circus" that seems to PERVADE modern computing. There is an excessive focus on exploits, software vulnerabilities, security updates, security flaws, and so forth and not nearly enough focus on educating users on applying basic common sense to their computing; to much presumption that missing security updates directly leads to malware infection when typically it is the user not being proficient in identifying threats or performing their own threat analysis of things they do or intend to do with their PC that causes problems. Fact is that a diligent user isn't going to be impacted by these CPU vulnerabilities because they will at some level require the exploitation of user vulnerabilities in order to be utilized.I agree. This topic was blow out of proportion. You remarks remind me that I need to get a better password manager. The one I like to use has been downgraded by Mozilla, so I need to go over to a more secure add-on for Firefox. Just yesterday I did a scan with Malwarebytes and was surprised about how many PUPs were found. One has to be careful. And yes, a complex exploit wooed have to have some kind of malware to let in into the system. So the solution is to maintain and fortify the basic common sense security. | |
| 1659. | Solve : Cyber attak - Europe ^ USA? | 
| Answer» Major media reports: Many firms, including Symantec, have suggested the ransomware is a variant of Petya, a known ransomware. But according to security firm Kaspersky Lab, preliminary findings indicate the attacks are from a new ransomware that it's now calling "ExPetr."Massive GoldenEye Ransomware Campaign Slams worldwide users New ransomware outbreakQuote Bitdefender has identified a massive ransomware campaign that is currently unfolding worldwide. Preliminary information shows that the malware sample responsible for the infection is an almost identical clone of the GoldenEye ransomware family. At the time of writing this there is no information about propagation vector but we presume it to be carried by a wormable component.From the link above linkPosted by Hackoo https://labs.bitdefender.com/2017/06/massive-goldeneye-ransomware-campaign-slams-worldwide-users/?icid=overlaycall-pagesgoldeneye This has been a problem for quite some time, and its just gonna grow, recently I read that more and more Ransomware codes is turning into ranosmware-as-a-service. The Europe alone has lost millions of dollars due to the attacks, ergo the new regulations. The massive increase in ransomware families just shows another one recently described as Rapid ransomware. Truth be told its just gonna expand. And it apparently starts with small and medium businesses using them as a TUNNEL to reach major companies through SUPPLY chains. JockB, When criminals go unpunished, they just get more bolder in their crimes. I will refrain from citing any sources. It should be self-apparent. Some proverbs or sayings about crime: In times of trouble leniency becomes crime. ~ Traditional Proverb Commit a sin twice and it will not seem a crime. ~ Jewish Proverb It’s a crime if you get caught. ~ Russian Proverbs Great thieves punish little ones. ~ Author Unknown Crime expands according to our willingness to put up with it. ~ Barry J. Farber Still, the Internet now a social amplifier that makes crime and even larger problem that what anybody WOULD have foreknown. Here is a breaking news story: https://abcnews.go.com/Technology/wireStory/albanian-sought-us-arrested-cybercrime-market-probe-53026559 Quote Ymeraj is among 36 people who have been indicted in the U.S. for allegedly being part of the Infraud Organization. The U.S. Justice Department alleges the organization was an online forum where stolen credit card numbers, bank account data and other personal information were sold and purchased.Please tell me it is not true. I don't think the Internet - or Computers, for that matter- has realistically made Crime any worse. It's just a different venue. In some aspect I'd even argue that it's had a positive effect, As with many crimes it leaves an "audit trail" that can be used to put together illegal activities. Outside ransomware and scams and fraud, There are far more serious crimes, and I think the Internet has helped with some of that. Where 30 years ago a pedophile could kidnap a kid, do god knows what, then murder them and you *might* hear about it on the local news, Now these weirdo's share their disgusting pictures with other weirdo's and law enforcement can act quickly enough to piece together locations before that happens. Meanwhile evening news never covers that unless it goes awry, so they are thankfully usually left with stories where some guy walked through a playground as a shortcut and they have to interview all the parents who say "Oh no doubt in my mind he wanted to kidnap our kids" or they bring on experts to talk about it at length. And the "expert" looks like he might understand the mind of a pedophile all too well, sort of like how news channels sometimes bring on nutritionists who talk about healthy eating and you can't help but notice they need two chairs. | |
| 1660. | Solve : Apple's Siri in the spotlight for potty mouth!? | 
| Answer» Apple's Siri in the spotlight for potty mouth. test-to-speech Text-to-speechMy experiments with text-to-speech in Windows were with the "MSAgent" control in Visual Basic. I certainly didn't always use my powers for good.Text-to-speech ... I had fun calling my boss once and playing it as Stephen Hawking as for thats how the voice sounded in a text -to-speech program I had been using that sounded just slightly better than a Speak & Spell Quote from: DaveLembke on May 01, 2018, 12:37:01 PM Text-to-speech ... I had fun calling my boss once and playing it as Stephen Hawking as for thats how the voice sounded in a text -to-speech program I had been using that sounded just slightly better than a Speak & SpellStephen Hawking passed away recently. He made use of Test to Speech while working as a professor at Cambridge. Here is a recent article by the Washington post. How will we remember Stephen Hawking? Quote Despite his almost unbelievable conquest of his disabilities, Stephen Hawking should be remembered for at least four other reasons:For many people, Test to speech is very IMPORTANT tool. (Myself included.) postscript... During his time at Cambridge Professor Hawking wrote a large number of publications. The best WAY to read the academic publications AUTHORED by Professor Hawking or his colleagues is by going to the SLAC SPIRES HEP site and searching for "Find author Hawking". | |
| 1661. | Solve : Warren Buffett:I love Apple so much...? | 
| Answer» .. He would like to have 100 per cent of it. When apple was in trouble in the 90s, I thought they were going to fail and stayed away from them. Coworker who loves Apple products bought into them and Microsoft gave them a 150 Million Dollar bail out in 8/6/1997.From Microsoft's perspective, That was actually a transaction like any other; Microsoft got a bunch of non-voting shares in Apple, agreed to keep supporting OFFICE for Mac for at least 5 more years, And Apple agreed to drop their "Look and FEEL" lawsuit. It also helped give them a bit of "goodwill" considering Microsoft was embroiled in the 90's anti-trust litigation regarding Internet Explorer. | |
| 1662. | Solve : Apple changes iTunes. Windows XP and Cistra left out.? | 
| Answer» If you use iTunes on a Windows XP or Vista PC, this may be of interest to you. Windows XP or Vista PCsIt has bee reported that about 7 per cent of all PCs in the world still tun on Windows XP. How many also run iTunes is not easy to calculate. Still, Apple might be cutting off g out a significant part of its customers. Maybe. Also, this also has impact ton Apple TV (1st generation). Apple is just covering their bottom by removing support from an OS that is no longer PATCHED. If they continued to support their software for use on XP and somehow people had their accounts (hacked/stolen or WHATEVER) it would make for bad news. I am actually surprised that Apple didn't pull the plug sooner on XP. If anyone was hard up for money to where they cant afford a used or refurbished Windows 7 or newer computer for less than $90, then they might have the wrong priority to spend money on media.... Getting a Windows 7 or newer computer doesn't cost all that much and anyone who is still on XP still have other ways to get music and videos from other than Apple. | |
| 1663. | Solve : Cortana flaw ... maalicious websites? | 
| Answer» From Digital Trends. By Kevin Parrish — Posted on March 7, 2018Really? Hard to believe! You FIND it hard to believe that somebody with physical access to a system could compromise it?Yes, hard to believe. Modern computers are protected from even direct physical use. You can destoy the computer, but not steal the data. Or it ought to be that way. When the machine is locked, you should not be able to do anything in the NORMAL way of controlling the machine. - Right? Tue locking computer locking must mean: 
 What exceptions do you know about?"Locking" refers to a very specific windows feature, it is locking your SESSION not the computer. It's been in Windows NT pretty much SINCE the earliest releases. Windows Key+L Works on NT4 and later for this. Windows XP depending on the configuration takes you back to the "welcome" screen. Windows 8 and later have a 'Lock Screen'. "Locking" a computer doesn't suspend running processes, all tasks continue to run in the background. Eg if you connect a USB device, you will hear the USB connect sound and, in the background, necessary drivers will be installed. You can also log in as a different user on the system and have tasks from multiple users running in different sessions at the same time. Screensavers typically still run as well. | |
| 1664. | Solve : What happened to Kellys Korner?? | 
| Answer» Quote from: evilfantasy on March 16, 2008, 12:56:44 AM Doug KNOX has many of the same tweaks and fixes http://www.dougknox.com/ Came across this topic when running a search query for: Code: [Select]https://www.startpage.com/do/dsearch?query=what+happened+to+dougknox.com Unfortunately, KELLY's Korner is gone for good; it's now parked via some host (privacy.co.com), WHOIS@ Code: [Select]https://whois.icann.org/en/lookup?name=www.kellys-korner-xp.com ... Used to be very fond of these (& other!) Windows "Tips" web sites, over the years - many of us have grown up with them. It'll always be a great MEMORY! ;-s P.S. Should anyone, perhaps, know what happened to Doug's web pages, please do let me (us!) know. Haven't seen any updates for years & everything is - pretty much - malfunctioning, including the Feedback page which doesn't work (on submit). I've tried to look for (the real) "Doug Knox" on Twitter and wherever, to no avail, meh.Quote Unfortunately, Kelly's Korner is gone for good; it's now parked via some host (privacy.co.com), [emailprotected] It's not gone and still bein supported.The URL, for the web site (?!) Code: [Select]www.kellys-korner-xp.com ... It takes me to - Code: [Select]http://ww25.kellys-korner-xp.com/?z & that page source is: Code: [Select]<!DOCTYPE HTML><html data-adblockkey="MFwwDQYJKoZIhvcNAQEBBQADSwAwSAJBANDrp2lz7AOmADaN8tA50LsWcjLFyQFcb/P2Txc58oYOeILb3vBw7J6f4pamkAQVSQuqYsKx3YzdUHCvbVZvFUsCAwEAAQ==_HW8AJcx3BFZxuON0KVPW0n5cdI6PEIotV/l6wU1MCDMWdKbu8oZ2IdtkDX2xkPFMaegh4Tiup7EdyJ4aJ7hi0w=="><head><meta http-equiv="Content-Type" content="text/html; charset=utf-8"><title></title><meta name="viewport" content="width=device-width, initial-scale=1"><meta name="description" content="See related links to what you are looking for."/></head><!--[if IE 6 ]><body class="ie6"><![endif]--><!--[if IE 7 ]><body class="ie7"><![endif]--><!--[if IE 8 ]><body class="ie8"><![endif]--><!--[if IE 9 ]><body class="ie9"><![endif]--><!--[if (gt IE 9)|!(IE)]> --><body><!--<![endif]--><script type="text/javascript">g_pb=(function(){var DY=document,azu=location,DE=DY.createElement('script'),aAx=false,LX;DE.defer=true;DE.async=true;DE.src="//www.google.com/adsense/domains/caf.js";DE.onerror=function(){if(azu.search!=='?z'){azu.href='/?z';}};DE.onload=DE.onreadystatechange=function(){if(!aAx&&LX){if(!window['googleNDT_']){} LX(google.ads.domains.Caf);} aAx=true;};DY.body.appendChild(DE);return{azj:function(n$){if(aAx) n$(google.ads.domains.Caf);else LX=n$;},bq:function(){if(!aAx){DY.body.removeChild(DE);}}};})();g_pd=(function(){var azu=window.location,nw={},bH,azs=azu.search.substring(1),aAp,aAr;if(!azs) return nw;aAp=azs.split("&");for(bH=0;bH<aAp.length;bH++){aAr=aAp[bH].split('=');nw[aAr[0]]=aAr[1]?aAr[1]:"";} return nw;})();g_pc=(function(){var $is_ABP_whitelisted=null;var $Image1=new Image;var $Image2=new Image;var $error1=false;var $error2=false;var $remaining=2;var $random=Math.random()*11;function $imageLoaded(){$remaining--;if($remaining===0) $is_ABP_whitelisted=!$error1&&$error2;} $Image1.onload=$Image2.onload=$imageLoaded;$Image1.onerror=function(){$error1=true;$imageLoaded();};$Image2.onerror=function(){$error2=true;$imageLoaded();};$Image1.src='/px.gif?ch=1&rn='+$random;$Image2.src='/px.gif?ch=2&rn='+$random;return{azl:function(){return'&abp='+($is_ABP_whitelisted?'1':'0');},$isWhitelisted:function(){return $is_ABP_whitelisted;},$onReady:function($callback){function $poll(){if($is_ABP_whitelisted===null) setTimeout($poll,100);else $callback();} $poll();}}})();(function(){var aAj=screen,RC=window,azu=RC.location,aAw=top.location,DY=document,Sp=DY.body||DY.getElementsByTagName('body')[0],aAu=0,aAs=0,aAt=0,$IE=null;if(Sp.className==='ie6') $IE=6;else if(Sp.className==='ie7') $IE=7;else if(Sp.className==='ie8') $IE=8;else if(Sp.className==='ie9') $IE=9;function aAq($callback){aAt++;aAu=RC.innerWidth||DY.documentElement.clientWidth||Sp.clientWidth;aAs=RC.innerHeight||DY.documentElement.clientHeight||Sp.clientHeight;if(aAu>0||aAt>=5){$callback();} else{setTimeout(aAq,100);}} var $num_requirements=2;function $requirementMet(){$num_requirements--;if($num_requirements===0) aAv();} aAq($requirementMet);g_pc.$onReady($requirementMet);function aAv(){var ef=undefined,IQ=encodeURIComponent,aAo;if(aAw!=azu&&g_pd.r_s===ef) aAw.href=azu.href;aAo=DY.createElement('script');aAo.type='text/javascript';aAo.src='/glp'+'?r='+(g_pd.r!==ef?g_pd.r:(DY.referrer?IQ(DY.referrer.substr(0,255)):''))+ (g_pd.r_u?'&u='+g_pd.r_u:'&u='+IQ(azu.href.split('?')[0]))+ (g_pd.gc?'&gc='+g_pd.gc:'')+ (g_pd.cid?'&cid='+g_pd.cid:'')+ (g_pd.query?'&sq='+g_pd.query:'')+ (g_pd.search?'&ss=1':'')+ (g_pd.a!==ef?'&a':'')+ (g_pd.z!==ef?'&z':'')+ (g_pd.z_ds!==ef?'&z_ds':'')+ (g_pd.r_s!==ef?'&r_s='+g_pd.r_s:'')+ (g_pd.r_d!==ef?'&r_d='+g_pd.r_d:'')+'&rw='+aAj.width+'&rh='+aAj.height+ (g_pd.r_ww!==ef?'&ww='+g_pd.r_ww:'&ww='+aAu)+ (g_pd.r_wh!==ef?'&wh='+g_pd.r_wh:'&wh='+aAs)+ (g_pc.$isWhitelisted()?'&abp=1':'')+ ($IE!==null?'&ie='+$IE:'')+ (g_pd.partner!==ef?'&partner='+g_pd.partner:'')+ (g_pd.subid1!==ef?'&subid1='+g_pd.subid1:'')+ (g_pd.subid2!==ef?'&subid2='+g_pd.subid2:'')+ (g_pd.subid3!==ef?'&subid3='+g_pd.subid3:'');Sp.appendChild(aAo);}})();</script></body></html>Am I missing something? o.0Nope, you aren't missing anything, it's been gone for a number of years now. It's parked by some kind of advertisement website. The script apparently checks for ad blockers- if you have them on you get a blank page. Otherwise it gives you pretty typical advertiser's parking page. Just to add, based on web.archive.org- it was up February 2014, but was gone in March 2014, and was ALREADY a parking website. Like when it went down related to the creation of this thread, the hosting probably expired and didn't get renewed. | |
| 1665. | Solve : Tax Scam 2018. Fake phone calls? | 
| Answer» This is a fake IRS number: 800 218 5846 and just now I got it. IR-2018-40, March 6, 2018Warn your family and friends about this new scam. Do not respond to any call that claims to be from the IRS, unless you are expecting a call. Normally the IRS does not make surprise phone calls. Quote For Taxpayers Who Don’t Owe Taxes or Don’t Think They Do:See above link for moire details. I corrected your spelling in the Topic line...I sometimes receive E-mails telling me it is from the IRS and they found some anomalies on my last Tax Return. I would CERTAINLY find that unusual given that I'm Canadian and therefore the appropriate agency would be the CRA. Though some of the scammers have adapted and do actually claim they are from the CRA. Notwithstanding that the CRA never actually contacts PEOPLE by E-mail, they seem to just replace IRS with CRA. It will suggest there were "anomalies on your 1040". 1040 is the IRS form. the Canadian Tax Return Form is the T1 General. Though, that is all intentional. Scams are less about "tricking" people directly as much as they are about funneling the most gullible people you can towards your schemes. If you can convince an elderly UK resident they didn't pay their UK income taxes to the IRS, you've hit scammer paydirt.Doesn't qualify as "news"...been goin on quite awhile now...Quote from: Geek-9pm on April 27, 2018, 02:52:36 PM This is a fake IRS number: 800 218 5846 and just now I got it. I also got few calls from these IRS scammers using different number since last week. I Googled the number and found that some people have reported the number as scam at http://www.whycall.me/845-450-2153.html even since few months ago. I just blocked it now. | |
| 1666. | Solve : Intel has new and better SSD chips? | 
| Answer» The Intel news release is also reviewed on PCWORLD, Gismo and TechRadar. This thing flies. The machine I’ve I installed it in is already POSITIVELY loaded: It’s got Intel’s latest 6-core i7 processor, an Nvidia 1080 graphics card, and a whole mess of RAM. But this little stick of STORAGE makes everything even faster. Intel’s Optane 800P storage is likely some of the fastest storage you can buy. It’s also incredibly expensive—think three-and-a-half-times more expensive than an SSD. Yet the Intel Optane 800P is hardly just another storage drive. Computing on the bleeding edge will cost you. For more links search for: Intel 800P Optane SSD I chuckle to myself when I read about how expensive SSDs are. I paid $500 for my first HDD in 1986. It was a 20MB Seagate ST-225 which WORKED out to $25 per MB. I don't consider $1.69 per GB particularly expensive although it is CERTAINLY more expensive than other forms of storage. Perspective...I remember most of that stuff! | |
| 1667. | Solve : Very Bad News for Facebook and its susers.? | 
| Answer» Read this report from CNBC: Mark Zuckerberg’s net worth is down a whopping $15 billion from its recent peak, according to Bloomberg. Could congressional testimony put him even further in the red?He is sorry. Mark Zuckerburg has given a strong performance in his appearances before Congressional committees and Facebook's stock was strongly upward in the market yesterday and again today. So, too early to make any judgement about the future of Facebook. It's very doubtful that it will completely crash because people will still use Facebook despite this news, in fact, the common people won't really care until someone that matters to them GOES ahead and speaks out about it. Otherwise, they just see the government attacking another company.pamela2, The accusations are, arguably, the most scandalous ever. Some have even gone so far as to implicate Facebook in some kind of international conspiracy to influence the USA presidential election of Donald Trump. The mass media now have this story going around: https://www.usatoday.com/story/news/politics/2018/04/20/democratic-party-sues-russia-trump-campaign-and-wikileaks-alleging-conspiracy-influence-2016-electio/536032002/ The above link does NOT even mention Facebook. Which is odd.Earlier stories mentioned Facebook as part of the plot. Here is a earlier story that includes Facebook: https://www.wired.com/story/facebook-does-not-know-how-many-followers-russian-trolls-had-on-instagram/ Quote For more than a year, Jonathan Albright has served as something of a one-man General Accounting Office for the tech industry. The researcher at Columbia University's Tow Center for Digital Journalism has dug into the details on how political Twitter trolls manipulate the media, and UNEARTHED an intricate web of conspiracy theory videos on YouTube.And.. Quote Facebook told Congress last fall that it had deleted 170 Instagram accounts linked to the IRA. Albright found 27 of the accounts, confirming they were Agency accounts by cross-referencing against Congressional exhibits or media mentions. He downloaded data on those sites in October using a social media analytics SITE called SocialBlade and found they had nearly 2.2 million followers combined. It might get worse. Or maybe it will pass. Hard to say. Who has the most money? | |
| 1668. | Solve : Googles Spring Cleaning Again? | 
| Answer» Some may have NOTICED and some may not, Google continues the spring cleaning STARTED in 2017 and continues at the end of the FEBRUARY 2018 | |
| 1669. | Solve : ZTE shuts down main operations . USA investing.? | 
| Answer» Quote ZTE was accused of dodging United States sanctions on Iran in 2016, by selling technology from the U.S. to Iran through multiple shell COMPANIES. The US Department of Commerce threatened to cut off ZTE from all its supply chain partners in the United States, which ZTE avoided by paying nearly a billion dollars in fines.Why is the Computer News? Many ZTE products are in Cell Phone and Wireless technology, which is part of the Personal Computer industry. If ZTE can no longer do can business with the USA, users with ZTE smart phones might not have support Here is the story: https://www.androidpolice.com/2018/05/09/zte-shuts-main-operations-talks-u-s-continue/ Many US companies use ZTE products for Internet service to subscribers. AT&T, T-Mobile, Verizon Wireless and others offer ZTE products. In view of recent developments in the world, ZTE may lose their USA market. If that happens, many users will find there is not direct support for any ZTE devices needed for Internet access. Quote The ban is a massive blow to ZTE, as it blocks the company from its supply chains in the United States. The company can't use Qualcomm processors, modems from Intel, and other components. Google is still trying to figure out if ZTE can legally keep its Google Play license.BTW, the Snapdragon CPU is used by ZTE.It doesn't matter...they are cryin the blues because they potentially have lost access to the US market because of security concerns and now are feelin the pinch... It's their own fault...and well deserved.Patio, I agree. The Billion Dollar FINE and the market loss is the price they pay for trying to dodge an agreement they had made. Meanwhile, users who already bought ZTE smartphones might find there is no longer official factory service for the devices. However, repair kits are available.This is more about android cell phones than computers....that being said, it seems the orange hair man has as usual changed his mind again.......ZTE lives!!!! https://www.cnbc.com/2018/05/16/trump-says-his-actions-on-chinas-zte-relate-to-the-larger-trade-deal.htmlWho's the "orange hair man" ? ?The one and only POTUS........Trump!!!!This brings up some political questions. For an idea of what this means, NPR did a report that trys ts outline the issues without taking a political position. Trump, China And ZTE May 17, 2018. Heard on Morning Edition Quote President Trump says his effort to help Chinese telecommunications company ZTE is only part of a "larger trade deal." NPR's Rachel Martin talks with Robert Daly of the Wilson Center.... Quote MARTIN: So both COUNTRIES here, the U.S. and China, have been threatening each other with tariffs, something neither really wants to happen. The Trump administration also wants to lower the trade deficit with China. That's the overall goal. What does China want out of these talks at this moment? | |
| 1670. | Solve : South Korea stops working late? | 
| Answer» Full tittle is: The government in South Korea's capital is introducing a new initiative to force its employees to leave work on time - by powering down all their computers at 20:00 on Fridays.They call 8 PM on Friday "working late"? Where I work, we call 4:30 PM on Friday working late. We have flexible hours. My contracted hours are 37 a week. At the end of each 4 week period I can be up to 14 hours in credit or debit. The office is open 7:30 AM to 6:45 PM. Core time (when you must be there) is 10 AM to 12 noon, and 2 PM to 3:30 PM. If I get to work at 7:30 AM and take half an hour for lunch I can go HOME at 3:30 PM and still make up time, at the rate of 6 minutes per day. Our PCs have a thing CALLED "Night Watchman" that logs you off at 7 PM, but site security would turf you out at 6:45 PM anyhow. When I have 7 hours 24 minutes surplus time, I can have a day off. Or "borrow" that time, thus not touching my annual leave allowance.Can see it now... you go to hospital at 7:59pm for help and it hits 8pm. They SAY sorry come back in the morning and leave for the day. Obviously there has to be exceptions to this. Quote from: DaveLembke on March 24, 2018, 09:26:29 AM Obviously there has to be exceptions to this. Hospitals tend to run their emergency rooms 24/7/365 in most countries. The article is talking about daytime office workers in government offices, such as tax, etc. But you knew that. | |
| 1671. | Solve : News about Malware In Your Router? | 
| Answer» This story is on mass-media. New York Times: https://www.nytimes.com/2018/05/27/technology/router-fbi-reboot-malware.html ABC News: http://abc7chicago.com/technology/video-how-to-reboot-your-router-to-avoid-malware/3532671/ CBS News: http://newyork.cbslocal.com/2018/05/28/fbi-russian-malware-infects-routers-warning/ Actually, this threat has been known for some time. Yeah, it’s one of those media stories that does the rounds every few months. Somehow it gets a bit of traction and, pow, it’s ‘the latest thing’.Mark, tha is how we know summer is near. - When the mass-media repeats old stories. This time they say the news comes from the FBI. FBI Says You Should Reboot Your Routers And NAS Devices Copy the above into your favorite search engine. So, simply rebooting is SUPPOSED to be a solution to this problem? I find that hard to believe, since the router would have been booted before it could be used when new. On the plus side regarding the articles, the recommendation to update firmware, if available, and change the default password is sound advice. Those default passwords are usually practically worthless in providing any security. Quote from: soybean on May 29, 2018, 10:48:42 AM ... Here is the default for the router I just received from Comcast: User: admin Password: password Both are case sensitive. I am not GOING to change them; anything else is too hard to remember. Quote from: Geek-9pm on May 29, 2018, 12:40:58 PM Here is the default for the router I just received from Comcast:Well, if you can't even devise some method of keeping record of a few passwords, then you deserve any consequences that MIGHT befall you. Surely, you could buy a simple spiral notepad and write some usernames and passwords in it. Quote from: Geek-9pm on May 29, 2018, 12:40:58 PM I am not going to change them; anything else is too hard to remember.Oh Geek!that is just laziness and exactly the mindset these idiots rely on to get their foot in your (digital) door. change all your default passwords now - it's dead easy and is your first LINE of defence.it doesn't have to be anything long or hard to remember, it can even simply be your last name, or house phone number for example.you aren't trying to stop a direct, dedicated attack, you just want to change the default password so every Tom, *censored* and Harry with "let's SEE who's out there?" on their minds can't get into your modem/router and flog your wifi password. Mark, I will take your advice. I will use passwords I can remember. | |
| 1672. | Solve : IRS Computer Crash Delays Deadline.? | 
| Answer» Here is the STORY: The INTERNAL Revenue SERVICE blamed the problem on a hardware error, and the glitch exposed the information-technology challenges that agency officials have been warning about for years. The systems were back up and running late Tuesday.The story from The New York Times says it was a computer crash, not a glitch. And NYT also says a warning was GIVEN back in October about the poor state of the IRS computer software and hardware. Aug 3, 2017 - During fiscal year 2014, the IRS collected almost $3.1 trillion in federal revenue and processed almost 240 million returns. One would think with that kind of money they would INVEST in better stuff. | |
| 1673. | Solve : Windows 10 growth rate up.? | 
| Answer» But not by much. Windows 10 is now four times as popular as the MAC Windows 10 is four times as popular as the Media Access Control? Or do you mean Mac? In any case Microsoft probably got a big boost using their rather unethical funneling upgrade tactics which used intentionally poor designs to "trick" users into upgrading, like having the X button on a window act as confirm.Quote from: BC_Programmer on March 31, 2018, 01:51:46 AM Windows 10 is four times as popular as the Media Access Control?I was referring the Apple product. Windows 10 is now, and was, the most dominant OS for desktops A reference from January this year: https://www.windowslatest.com/2018/01/08/netmarketshare-windows-remains-dominant-os-apple-continues-gain-pc-market-share/ The above appears to SHOW that all Windows versions are more than 11 times the Apple OS versions. Always has been...whats the point ? ? The section is after all called news.Well, this discussion seems to imply that Mac is the main competitor of Windows. But, a (relatively) new kid on the block seems to be garnering more attention: Chromebook shipments surge by 38 percent, cutting into Windows 10 PCsSome would argue that the real news is in the mobile market, not the desktop. Here is a recent report that calls Android the out in front runner. https://techcrunch.com/2018/03/08/android-beats-ios-in-smartphone-loyalty-study-finds/ Android beats iOS in smartphone loyalty, study finds But look closer. The data is already old by now. And that report does not really show what people are using, just something about loyalty, whatever that means. | |
| 1674. | Solve : Details Leak on PC-Focused Snapdragon 1000? | 
| Answer» This is from Extreme Tech site. They claim it is real news. Look at this: Increasing the TDP RANGE on the ARM chips MAY not help bring them into competitive standing with x86 as such — there’s no way that simply allowing for a slightly higher TDP range will lift the impact of emulation altogether. But allowing the CPUs to burst to higher frequencies would absolutely give the ARM chips better performance in their own right, and that’ll become more important as ARM and Qualcomm try to establish themselves as contenders in new markets rather than struggling for the Chromebook (or Chromebook-equivalent) space.The TDP here means: The thermal design power (TDP), sometimes called thermal design point, is the maximum amount of heat generated by a computer chip or component (often the CPU or GPU) that the cooling system in a computer is designed to dissipate under any workload. So, a better battery life for a better Smart Phone? In summation...YES...that's what they are claiming. Till it rolls out into production we won't know.Read about this the other day through a geek app that I have on my smartphone that had some info on it, but as to if I would get one, it all comes down to features, storage capacity, (quality) brand name that will use this processor, and price. *If brand name is cheap, I then will look at user reviews to see if its a lemon or not and avoid if reviews are bad, but buy if reviews are like 4 stars or better of 5 and the issues found are just inexperienced people complaining about features they thought something had but didn't come with or other dumb reviews that ruin a better rating. But if real problems exist I will avoid products VS taking a gamble usually. I currently have a NuVision Windows 10 tablet that I got for $68 on sale that can run Windows apps and programs I create in C++. I also got a Bluetooth keyboard for it and so I can use it like a PC, however at times I miss my mouse because I have to touch the screen to navigate. https://www.amazon.com/Performance-Touchscreen-Quad-Core-Processor-10-Silver/dp/B01N2USU5A/ref=sr_1_4?ie=UTF8&qid=1529966875&sr=8-4&keywords=nuvision+windows+10+tablet One feature I wish my tablet had was a HDMI or other video output available to connect to a larger display, but for $68 I wont complain about that.. Only other issue is that the 32GB internal storage isn't big enough for Windows 10 updates, so its running an older version of Windows 10. So I don't use it for anything confidential like banking or online purchases. At some point I will see if I can create a symbolic link to the MicroSD Card and make for a space for the update to download to, to then be installed to the 32GB internal storage, but I also don't want to brick it, so I might just leave it be and run it as is version locked in the older Windows 10 that it came with from factory.Quote from: DaveLembke on June 25, 2018, 04:56:12 PM I also got a Bluetooth keyboard for it and so I can use it like a PC, however at times I miss my mouse because I have to touch the screen to navigate.What about a Bluetooth mouse? I have one to use with my tablet computer. | |
| 1675. | Solve : AT&T merge to hurt Amazon, Netflix? | 
| Answer» You already know about the AT&T merge with Time-Warner.  June 13, 2018 10:02 AMReally? FASCINATING...yawn... | |
| 1676. | Solve : News about Intel And Microsoft New Security? | 
| Answer» The above title is from Google for THINGS Intel and MICROSOFT have done recently. | |
| 1677. | Solve : Galaxy to make foldable phone soon.? | 
| Answer» Not a flip fome. A Fold Fone. Tech radar says that GALAXY will do it next year. https://www.techradar.com/news/samsungs-foldable-galaxy-x-smartphone-could-launch-in-early-2019 Here is the concept: The flexible display allows you to fold the phone. This was first announced last year. The full story is in the Wall Street Journal. https://www.wsj.com/articles/samsung-plans-to-launch-foldable-screen-phone-early-next-year-1531910967 Will you get one? $1,500 yikes! Ever since Apple broke the $1000 smartphone barrier with the IPHONE 10, it seems manufactures are getting bolder in the consumer market. Samsung will really be testing the flexibility of the market with a phone at that price. Don't get me wrong, I love the innovation since this ACTUALLY looks like the first leap forward technologically since the capacitive touch screen, but dang! I'll put it to you this way: would you walk around with $1,500 in your POCKET? But instead of paper money, the $1,500 is made of aluminum and glass. But... APPARENTLY consumers are willing to carry $1000 with the iPhone 10. People will buy anything that gives them status or the 'cool' factor.EndOfForever, Thanks for your reply. If, and I do mean if, they really can do this and mass-produce it, someday you can roll up you cell phone and shove it into the top of your socks. And a roll-up phone may cost less than the designer tennis shoes your wear. Then next they have to make it weatherproof because .... | |
| 1678. | Solve : USA will blame N. Korea for cyber attacks.? | 
| Answer» The full title is: The United States Department of Justice is set to indict a North Korean spy connected to the 2014 cyberattack on Sony Pictures Entertainment and the 2017 WannaCry malware that crippled the Britain’s National Health Service. The indictment alleges that Pak Jin-hyok conducted the attack under orders from the Democratic People’s Republic of Korea’s Reconnaissance General Bureau, the country’s intelligence agency that’s seen as North Korea’s version of the CIA.The implications are wide. ...(deleted)...This is computer news how exactly?It is a new development about something that happened some time ago. Here is another link: https://abcnews.go.com/US/doj-announce-charges-north-koreans-sony-hack-wannacry/story?id=57643239 Should I have posted this in 'other'? As to how it would AFFECT our current computer environment... you ha veto use your imagination. Think about a possible recall o fall smartphones made by one overseas company. That would depend on how far the investigation goes. The U.S, United Kingdom, and Australia all declared officially that North Korea was responsible for the Wannacry Worm last December. Though, that was shortly after a Russian hacker Claimed the FSB was responsible. Quote Think about a possible recall o fall smartphones made by one overseas company. Maybe you could explain why a *South* Korean company would issue a recall of smartphones because the U.S points a finger at North Korea for cyberattacks? Maybe you are out of the LOOP but North and South Korea haven't really gotten along very well PRETTY much since they were split apart after World War II. We aren't talking about a history like North and South Dakota here.Quote from: BC_Programmer on SEPTEMBER 07, 2018, 12:44:20 PM Maybe you are out of the loop but North and South Korea haven't really gotten along very well pretty much since they were split apart after World War II.Little spat around 1950-1953 perhaps? A British Army regiment local to me lost a lot of men there, and the commanding officer, Lieutenant-Colonel James Carne, was awarded the Victoria Cross for his bravery under fire. He was later captured by the North Koreans and, so it is alleged, subjected to "brainwashing" by them. "On 22/23 April 1951 near the Imjin River, Korea, Lieutenant Colonel Carne's battalion was heavily and incessantly engaged by vastly superior numbers of the enemy. Throughout this time Colonel Carne moved among the whole battalion under very heavy mortar and machine-gun fire, inspiring the utmost confidence and the will to resist among his troops. On two separate occasions, armed with rifle and grenades, he personally led assault parties which drove back the enemy and saved important situations. His courage, coolness and leadership was felt not only in his own battalion but throughout the whole brigade." Carne also was awarded the (American) Distinguished Service Cross by the President of the United States for gallant and distinguished services during operations by the United Nations in Korea. | |
| 1679. | Solve : Microsft Releases Sticky Notes 3.0? | 
| Answer» This was FOUND this in a search: | |
| 1680. | Solve : New reports about Chinese Hacker attacks? | 
| Answer» Some REPORTS about Chinese Hacker attacks are old news. Two Chinese nationals — one nicknamed "Godkiller" — were charged with participating in a MASSIVE hacking campaign that targeted the U.S. government and military, including NASA and the Navy, the Justice Department said Thursday. The original source was not apparent to me. I first heard it on TV. Do you know the source? Is it really something new?Nope...the national security hacks have been ongoing for years ...including the NASA hack, | |
| 1681. | Solve : News You missed; Microsoft liberates ancient MS-DOS .? | 
| Answer» This is from October 2018. STEVE BALLMER, Microsoft’s former chief executive, became an internet meme when he gave a speech to employees in which he bounced across the stage shouting “developers” over a dozen times. While much has changed since Mr Ballmer’s chant, developers remain central to Microsoft’s strategy. Earlier this month his successor, Satya Nadella, announced that Microsoft would acquire GitHub, a platform for hosting software code—especially “open-source” projects—for $7.5bn. Developers took to the internet in outrage, predicting a slow death for the service. Many non-coders, meanwhile, were left wondering what all the fuss was about. What is GitHub, and why do developers care so much about it?Finding full documentation for older MS-DOS version is still a challenge. Quote from: Salmon Trout on December 21, 2018, 02:48:13 PM I later got a Hercules card and a compatible monitor in exchange for a moped that didn't run. The moped was brought back to life and still runs. 25 years later. Can't say the same for the PC. Very Cool Salmon. My first PC was my friend and me riding our bicycles around and we cut through a businesses parking lot as a shortcut to a store to buy candy and we spotted computers stacked by a dumpster in the summer of 1984. We went over and was checking it out and the guy that worked there saw us looking through it all. I was 9 then, and the guy said are you kids looking to trash pick a computer. I said if allowed to I would love to have one. The guy helped us pick out the parts we needed to assemble them back home. We made about 6 trips riding our bikes 6 city blocks back home to drop off the computer pieces straddled between our legs on our bikes. The guy gave us cassettes and some floppies and books as well for them. The 30 or so computers they were throwing away were Tandy TRS-80 Model 1 computers with 16k RAM expansion modules connected to the keyboard which was the computer with its 4k RAM and memory expansion through ribbon cables to a silver box that was like a BOOM box on its side that the monitor sat on top of. That was my first experience to my own computer. Tandy's DOS was different than Microsofts. My first exposure to MS-DOS was version 2.11 with GW-Basic at school in 1985. Teacher heard about me self teaching myself BASIC and so I was then exposed to the 8088 computer that the school had and GW-Basic to program on in my free time and after school.Brilliant story...Thanx for sharing... | |
| 1682. | Solve : Windows 10's April 2019 Update should...? | 
| Answer» Windows 10's April 2019 Update should.... | |
| 1683. | Solve : Infecting Firefox Add-ons With Malware? | 
| Answer» Firefox is easily extended via add-ons. And the way extensions work makes it relatively easy for bad guys to inject malware that would be difficult to detect and remove.  C:/Program Files/Mozilla/Firefox/extentions/{xxxxxxxxxx}/chrome/content/overlay.xul And then a redirector found in the extensions. This one can be fixed with a tool called GooredFix (Google Redirect FIX) Using GooRedFix to fix FireFox browser redirection problems. Quote Example, they are all different.Quote from: evilfantasy on May 27, 2009, 02:46:13 PM Firefox has become a bigger target over the last 6 months or so. Is the "overlay.xul" shown in hijackthis log reports? If so, you think it'd be advisable for me to add this to the CH process tool to check for?Unfortunately no it isn't. That is one of those that, after you have pulled all of your hair out, someone comes ALONG and says "hey, check this out" lol. Broni tipped me off to that one. No scanner can seem to find it because the file path is always random and the overlay.xul is a legitimate file. Original 4 page conversation at the Mozillazine forums. "clickfeedmanager.com" virus targets FirefoxHmm that's too bad, well hopefully maybe something the next version of HijackThis may have. | |
| 1684. | Solve : Windows netbooks may harbor malware - what's next?? | 
| Answer» http://news.idg.no/cw/art.cfm?id=58E2CC84-1A64-67EA-E459AE31EA733AAE After discovering attack code on a brand new Windows XP netbook, antivirus vendor Kaspersky Labs warned users yesterday that they should scan virgin systems for malware before connecting them to the Internet. When Kaspersky developers INSTALLED their recently-released Security for Ultra Portables on an M&A Companion Touch netbook purchased for testing, "they thought something strange was going on," said Roel Schouwenberg, a senior antivirus researcher with the Moscow-based firm. Schouwenberg scanned the machine -- a $499 netbook designed for the school market -- and found three pieces of malware. "This was done at the factory," said Schouwenberg. "It was completely brand new, still in its packaging." With a little more digging, Schouwenberg found multiple Windows system restore points, typically an indication that the machine had been updated with new drivers or software had been installed before it left the factory. One of the restore points, stamped with a February date, included the malware, indicating that it had been put on the machine before then. And the malware itself hinted how the netbook had been infected. "In February, the manufacturer was busy installing some drivers for an Intel product in the netbook," said Schouwenberg, citing the restore point. Among the three pieces of malware was a variant of the AutoRun worm, which spreads via infected USB flash drives. "The USB stick they used to install the drivers onto the machine was infected, and [it] then infected the machine," said Schouwenberg. Installed along with the worm was a rootkit and a password stealer that harvests log-in CREDENTIALS for online games such as World of Warcraft. Kaspersky has reported its findings to M&A, said Schouwenberg, but the netbook maker has not been in contact with the security company since then. Although factory-installed malware is rarely found on consumer electronics, there have been cases. Last December, for example, Amazon.com told customers it had sold Samsung digital photo frames before the holidays that came with a driver installation CD infected with a Trojan DOWNLOADER. "These [cases involving computers] are much rarer than picture frames," said Schouwenberg. To ensure that a new PC is malware-free, Schouwenberg recommended that before users connect the machine to the Internet, they install security software, update it by retrieving the latest definition file on another computer and transferring that update to the new system, then running a full antivirus scan. "That's the best course of action, even though it sounds like a lot of work," said Schouwenberg. It's extremely rare for something like this to happen and with a quote like: Quote After discovering attack code on a brand new Windows XP netbook, antivirus vendor Kaspersky Labs warned users yesterday that they should scan virgin systems for malware before connecting them to the Internet. Sounds more like a FEAR tactic to promote their products than to actually legitimately warn users of real computer threats. Suggesting to scan a virgin system isn't something that would be necessary IMO since it's so rare. Although if the netbooks had no FORM of protection it'd of course be advisable to get some sort of protection. Kaspersky has stooped to this level in the past....i'm not suprised at all. | |
| 1685. | Solve : 40,000 sites hit by PC-pwning hack attack? | 
| Answer» More than 40,000 websites worldwide have fallen under the spell of a sneaky piece of attack code that silently tries to install malware on the machines of people who visit them, security experts from Websense have warned. The mass attack has been dubbed Beladen because beladen.net is ONE of the internet domains used to UNLEASH a swarm of exploits that target unpatched vulnerabilities in the Internet Explorer and Firefox browsers and programs such as Apple's QuickTime. It plants highly obfuscated javascript on the BOTTOM of websites that's slightly different each TIME, making it impossible to spot INFECTED sites using search engines. Link | |
| 1686. | Solve : Vista Service Pack 2 Now Ready for Download? | 
| Answer» Did I say without a hitch? Did I say without a hitch? did you uninstall SP2 first? You can do that can't you unless you've deleted all the backup stuff made during SP2 installation.Quote from: 2x3i5x on May 30, 2009, 10:04:59 AM did you uninstall SP2 first? You can do that can't you unless you've deleted all the backup stuff made during SP2 installation. Nope. Just did a restore to before the installation.i wonder now, you can undo the system restoration, I'm sure of that so ... SEE if you can't go back to the post-SP2 state before you wanted to go backwards and ee if that won't get it to work, then try uninstalling sp2 this time.But that's the opposite of what I just did. Obviously something wasn't right, so I undid it, and everything's fine again. The intro to SP2 did say something like this "Microsoft Windows Vista Service Pack 2 will greatly improve hardware compatibility and usability" - well, it did the opposite for me. Anyway, all service packs do mainly is reinstall all previous updates, as well as a few new ones. All previous updates are installed, so I think I'll be alright.Just after doing a system restore to undo all the changes SP2 made. - My USB 3G modem stopped working - Actually, all USB ports stopped working - Programs would randomly stop responding So, what's up Microsoft? [/quote] The way you typed it here makes me feel that the problems happened when you attempted to get rid of SP2 and that you were OK with SP2 on.Is there any place to buy Vista service pack 2 on disk? It is telling me that it will take over two days to INSTALL this. My top speed is about 46 KBPS.Quote from: I Shooter on June 03, 2009, 04:32:00 PM Is there any place to buy Vista service pack 2 on disk? It is telling me that it will take over two days to install this. My top speed is about 46 KBPS. All the checking i did tells me it is not yet available for order on a CD...sorry. Perhaps have a friend with a faster connection DLoad and burn it for you... Best of Luck...completely destroyed my friends pc.Quote from: BatchFileBasics on June 03, 2009, 08:00:27 PM completely destroyed my friends pc. For everything that's developed, at least one person will have it fail for them.let me guess, the old, "service pack installed gigs of porn" issue. notwithstanding the files created and modified dates are long before when the service pack was installed. Mother: what are these? sexy blonde.jpg? hmm. must be ... *censored*! BILLY! GET IN HERE! Billy: What. Mother: WHAT is this? Billy: Oh erm... I installed service pack 2, there's a err.... known issue, with it accidentally downloaded thousands upon thousands of innappropriate, high resolution images. Mother: Well, by golly it's destroyed our PC! there's absolutely no room left! Although I think it's the same amount of room as we had before the service pack, but what do I know!ok smart....but http://www.google.com/search?hl=en&q=vista+sp2+0xc0000034&btnG=Google+Search&aq=f&oq=&aqi= there's also http://www.google.com/search?hl=en&q=Vista+sp1+BSOD&btnG=Search&aq=f&oq=&aqi=Quote For everything that's developed, at least one person will have it fail for them.That's very true. Maybe more than one.... I've been trying to fix one computer on some other board, which became not bootable after SP installation attempt, and so far nada. Can't do anything. It looks like reinstall needed. Don't forget, that I had a problem on my laptop, until I disables all startups, and non-M$ services. Never had any update problem before. | |
| 1687. | Solve : DDoS Attack Leaves Five Chinese Provinces Without Internet? | 
| Answer» AhAaaaaa... AhAaaaaa... With its might, fail safe 8/3 Rule! I just can't help observing 1/2 of the comments here are drivel... Just thought i'd have some fun with it. OK i'm done.It won't be long before this thread becomes about peanut butter. So before that happens I would like to contribute that there are a number of jams that go wonderfully with peanut butter. The science may not exist to prove why the taste combination of peanuts and smashed berries goes so well together but it appears to be a culinary constant. Now the real question is, while there are a number of different types of jams, going from strawberry, raspberry, blackberries, and any number of combinations with other common drupes, there are some that depend on taste. For example, blueberries. If you don't like blueberries, a blueberry jam and peanut butter sandwich will not be your favourite, regardless of how intense your love for peanut butter is. Also some people who do like blueberries detest the fact that in order to create blueberry jam it is necessary to add synthetic pectin since blueberries don't contain quite enough of their own. But I suppose that depends on their viewpoint on artificial food additives. Apple jam, on the other hand, while still requiring a proper affection for it's flavour, and while not going with peanut butter quite as well as berries, is one of the highest pectin containing fruits, and thus requires no synthetic pectin. Bananas, a natural companion with peanut butter, while traditionally SIMPLY served via SLICES on the bread alongside the chosen form of peanut butter, can also be smashed in much the same format as berries to create a gooey yellowish white mass that tastes of bananas and is easily spreadable. OK. I'm done now too.I roasted a Rainbow Trout ( fresh caught ) on the grill yesterday and stuffed it with 2 sliced bananas ; bread crumbs and a healthy dollop of peanut butter smeared inside... My strategy worked...i got to eat it all to myself.the science behind culinary ART is often both misunderstood and overly contemplative. a prime example being the often disparaged combination of ketchup and chocolate pudding. It sounds unorthodox, and people disparage it before even trying it, with their own biases and filters taking effect, telling them such a combination will fail without actually performing an actual scientific observation, instead lending their opinion to superstition that sweet and savoury only go together in sweet and sour pork. So, I decided to try it myself. I mixed 1/2 ketchup and 1/2 chocolate pudding, and discovered it was horrible. like eating out of a goats *censored*. It also looked like a bloody stool, which didn't really help matters either. However, I was proud to say that I was the first person to come to that conclusion based on the solid evidence of observation, rather then some silly presumption based entirely on traditional culinary knowledge. Quote The Board says i've exceeded the character limit...so BC's not allowed in my sigLOL which one were you trying for? Based on that premise you would have never came up with your cheese drink recipe so i just don't get it... You know they serve it on the Riviera now ? ?exactly! following "traditional" culinary ideals always results in the same old drab culinary experiences. I kick it up a notch with unexpected twists, like peach marinaded beefsteak, or fruit salad with beef gravy. Or- vodka and cheese. Why, I guarantee that before the Peanut butter and jam sandwich set the standard for basic nutritional supplements for young and old alike the idea of peanut butter and jam in the same dish was appalling, much in the same way most people produce a CONTORTED facial expression when I tell them of my exploits with my "jolly rancher" turkey recipe. Quote You know they serve it on the Riviera now Actually, we're in a legal battle with them, they insist that they invented the drink by accident when a drunkard, who consumed large quantities of both alcohol and cheese, vomited in somebody elses glass when they weren't looking. that lucky person was, according to them "the first person to indulge in the ecstasy of cheese, vodka, and a smattering of gastrointestinal flotsam and jetsam". what a ridiculously unbelievable story! there was no way the drunkard consumed the exact proportions and fermented the cheese further in their stomach before "delivering" it to the eventual recipient. Additionally how does one only vomit a glassful? A ludicrous story at best. But I'll leave it to my well paid lawyers. at least until they realize they aren't getting paid. | |
| 1688. | Solve : Mozilla patches three public Firefox bugs? | 
| Answer» Mozilla today patched Firefox 3.5 and Firefox 3.0 to QUASH three SECURITY vulnerabilities, including a pair unveiled last week at Black Hat, and a THIRD Mozilla itself revealed last month. | |
| 1689. | Solve : Deciphering Windows 7 Upgrades: The Official Chart? | 
| Answer» Over the past two weeks, in my Personal Technology columns, here and here, I’ve explained some of the challenges and limitations that will be involved in upgrading an EXISTING Windows XP or Windows Vista PC to the forthcoming Windows 7 operating system, due out October 22. Several readers ASKED me to publish a chart showing which current versions of Windows could be easily upgraded to which planned versions of Windows 7, and which couldn’t. So I asked Microsoft to supply such a chart we could publish, and the company graciously did so. It is reproduced below, unaltered. You can click on it to make it larger. Link | |
| 1690. | Solve : ASUS Eee Keyboard to launch by end of June? | 
| Answer» The dream of owning a keyboard embedded with a full-blown PC running XP on an Atom N270 processor and 5-inch, 800 x 480 pixel touchscreen display/trackpad is nearly upon us. A dream, quite honestly, nobody had prior to seeing the reveal of the 2-pound Eee Keyboard prototype at CES in January. LinkSounds like a MAC.That's already been done. It will FLOP. Think of commodore 64 (Image from news.cnet.com) Hehe yeah Geek-9pm. Story also reminded me of my first computer, the Atari 1040ST. Bringing back the Old Skool!Quote from: Ironman on May 15, 2009, 04:55:49 PM Bringing back the Old Skool!N0. We're bringing in the 1337 5ch001.the difference is- this new one will have the screen integrated to the keyboard- and smaller as well. Much like a tablet PC but with a smaller screen and built-in keyboard. Quote from: Helpmeh on May 18, 2009, 07:32:46 PM N0. We're bringing in the 1337 5ch001. heh, the funny part about "leet" SPEAK is that people that use it obviously have no clue what it implies. It doesn't imply anything good, I might add. Quote from: BC_Programmer on May 18, 2009, 07:59:12 PM It doesn't imply anything good, I might add. H4x0r. The supposed LANGUAGE of hackers. It's truly the language of 5k¡dd¡35.That's pretty amazing.I bet these will be faster then both the atari AND the commodore 64! Quote from: Helpmeh on May 18, 2009, 08:18:00 PM H4x0r. The supposed language of hackers. It's truly the language of 5k¡dd¡35. ... It's not a "language", it's a ridiculous shorthand invented by people whose mommies and daddies thought they were geniuses because they wrote 8008i35 on their calculators. It went downhill from there. Quote from: BC_Programmer on May 18, 2009, 08:57:34 PM I bet these will be faster then both the atari AND the commodore 64!Please note the word SUPPOSED in my post...and you absolutely correct.Quote from: BC_Programmer on May 18, 2009, 07:59:12 PM the difference is- this new one will have the screen integrated to the keyboard- and smaller as well. Much like a tablet PC but with a smaller screen and built-in keyboard.Integrated? Really? I can visualize a keyboard on one side and the screen on the other. Type a paragraph, then look on the back side to see what you wrote. integrated in the same way the screen of the original imac is part of the system itself. Ok... that's gotta be the most completely useless thing I've ever seen from ASUS in their Eee line. I thought the Sony VGN-UX180P was useless, but this is even worse.Quote from: quaxo on May 20, 2009, 03:57:00 AM Ok... that's gotta be the most completely useless thing I've ever seen from ASUS in their Eee line. I thought the Sony VGN-UX180P was useless, but this is even worse. I'm leaning towards you on this although I'd like to see some reviews when it's ACTUALLY released. If done properly they could potentially be on to something for those people who want to simply have an Internet computer up in their kitchen or something similiar. | |
| 1691. | Solve : Firefox to hit 1 billion downloads Friday? | 
| Answer» http://www.computerworld.com/s/article/9136111/Firefox_to_hit_1_billion_downloads_Friday The Firefox Web browser is fast approaching its billionth DOWNLOAD and is likely to hit that milestone some time on Friday. Mozilla has a Web site (http://www.spreadfirefox.com/news_events) and a Twitter feed where people can keep track of the total. On Thursday afternoon, the feed showed more than 999,180,000 downloads, with about 15 more happening each second. Mozilla said initially that it expected to hit the billion mark some time over the weekend. An hour later, as the news trickled out and the pace of downloads increased, Mozilla revised its estimate to Friday. An enthusiast Web site with a "Firefox Download Guesstimator" PREDICTS it will reach a billion on Friday at noon GMT. The figure includes all versions of Firefox since the first release in 2004. If a single user downloaded multiple copies for different computers, they are each counted in the total. And if a user goes to the Web site to download an update to an existing version, instead of waiting for the automatic download, that is counted as well. Automatic updates are not included in the total. So the figure does not mean that 1 billion people are using Firefox. Still, it's a significant achievement for a piece of software that was unknown to most of the world just a few years ago, and one that has had to compete with Microsoft's Internet Explorer, which ships free with every Windows PC. Figures from earlier this month showed Firefox having just under a third of the global browser market, at 31 percent. Internet Explorer led the field with 60 percent, while Safari, Chrome and Opera each had less than 5 percent, according to Statcounter. Firefox is stronger in Europe, where it has 40 percent of the market to IE's 47 percent. In Asia, Firefox has 23 percent to IE's 72 percent. In Antarctica, Statcounter says, the browsers are neck and neck. Mozilla plans to launch a Web site Monday, at www.onebillionplusyou.com, where it will provide more information on the achievement.firefox reaches a billion yesterday!!!!!!!!Very cool. Glad to see that they're not trying to pad the numbers by including the automatic updates (from the browser) in this total. | |
| 1692. | Solve : Adobe Reader's security woes a boon for up-and-coming rival Foxit? | 
| Answer» http://www.computerworld.com/s/article/9136348/Adobe_Reader_s_security_woes_a_boon_for_up_and_coming_rival_Foxit Foxit Reader, a free PDF-reading knockoff of Adobe Systems Inc.'s free Adobe Reader, has won what its maker estimates is 70 million users worldwide because of its speed and light weight. The latest version of Foxit Reader 3.0 for Windows is a svelte 3MB download, compared with Adobe Reader 9.1 for Windows, which tips the scales at 25MB. And Foxit now has something else going for it: better security. For the past year and a HALF, Adobe Reader has been plagued with numerous nasty bugs, including zero-day vulnerabilities that, if unleashed by an unwitting enterprise employee, could have devastating consequences. Facing criticism, Adobe is aiming to release security patches more quickly. But it's not fast enough for many companies, says one anonymous security researcher at the Black Hat conference, who told CNET this week: "As a result of the number of zero-day attacks on PDFs this year, large banks hate Adobe." First released in 2004, Foxit Reader's downloads have been growing about 10% each month this year, to almost 4 million a month, says Erik Bryant, director of sales for Foxit Software. "We're not only getting more downloads, but also more inquiries from large corporations who want to replace Adobe Reader for as many as hundreds of thousands of employees," Bryant told Computerworld on Thursday. For one, Foxit is talking to an unnamed American bank about replacing Adobe Reader for all 300,000 of its workers, as well all related Adobe tools, such as Adobe Acrobat, Bryant said. Tools such as Acrobat are key. While Foxit offers enterprise-supported versions of the Foxit Reader at a low per-seat price, it makes most of its money from tools such as its PDF software development kit, which is sold to software DEVELOPERS, and enterprise tools such as the PDF Creator, which can replace the more expensive Adobe Acrobat. Sales at Foxit are on track to double over last year, said Bryant, who would only say the 150-employee company's annual revenues are in the range of between $5 million and 20 million. Though often recommended by security researchers as a good alternative to Adobe Reader, Foxit Reader isn't invulnerable. Foxit's site freely lists the security bulletins on its product, but they are far FEWER than those for Adobe Reader. "We develop our code from scratch, so 99% of the time we don't share the same vulnerabilities as Adobe Reader," Bryant said. Also, Foxit, by necessity lacks some of Adobe Reader's features, such as the ability to DISPLAY 3-D images in CAD-created PDFs, said Bryant. But he said that most of the missing features were for niche users. The company is very close to releasing two enterprise products. One is called Foxit Phantom, an all-in-one suite that includes a PDF creator, editor and more. That is meant to compete with Adobe's various Acrobat suites. The second is the Foxit Security Suite, which helps companies implement DIGITAL Rights Management (DRM) on PDFs using permissions managed by Microsoft Corp.'s Active Directory technology. This, said Bryant, will also be cheaper than Adobe's current server software. Despite having nipped at Adobe's heels for the past half-decade, Bryant maintains that the firms have a good relationship. "We've never been contacted by them. They've never said they were pissed, or tried to buy us out," he said. "They probably appreciate that we help make PDF more popular." | |
| 1693. | Solve : How Google is Tracking Your Online Web Surfing Behavior? | 
| Answer» That's a reach...Quote from: Helpmeh on August 02, 2009, 06:20:54 PM As I've said before, the DATA it collects is which sites you visit. The only companies who would be interested are companies trying to acomplish the thing google ads is acomplishing. How can that information be added to spamlists? The argument is not about them helping themselves when it comes to relevant advertising but an abuse of that information. How much is being taken? They say there watching our movement on the web, hang about if I go to Waterstones do I want more book adverts or if I go to HMV do I want more music adverts No I was fine looking myself. It's just the corporation MAKING money off my movements on the web. Do they give you a list of the information taken? No they just take 'some' info of you. Talk about Big brother.Quote from: BC_Programmer on August 02, 2009, 05:36:37 PM I have NEVER let an advertisement sway my opinion in any way Really? Never? I find that hard to believe.Quote from: JJ 3000 on August 02, 2009, 06:38:50 PM Really? Never? I find that hard to believe. Why I never do either. If I want something I buy it not after watching some naked woman dance across my screen telling me I'm half a man if I don't buy it.Never say never Quote from: JJ 3000 on August 02, 2009, 06:38:50 PM Really? Never? I find that hard to believe. I very seldom watch television. And those adverts I do see are so ridiculously stupid... and I don't mean, like my posts, super silly but usually with some form of deep meaning or connection that gives insight into some human fioble, no sir, when I see an advert I don't take it's content into account; in fact half the time It would be a major pain just finding out what they are advertising. "say, was that commercial that was just on with the people dancing for clothes, dancing shoes or a new chevrolet? Although I'll admit that sometimes an advertisement will remind me of something, like for example an advertisement for visual studio 2005 might make me remember to file my taxes for 2005. But really it's only far removed types of associations. And as Broni said, "never say never"; I cannot recall any specific instance where I thought, "wow, I know this hat is really EXPENSIVE, and I don't WEAR hats anyway, but GOSH! I saw somebody wearing it on TV!"Quote from: Broni on August 02, 2009, 06:50:56 PM Never say never True but I try not to.My opinion on this is, as BC said, Google's DEFAULT option on this is to give you the service, but others give you the option to have the service. Now why would they give you it first day, (without telling you) if there wasn't going to be some kind of catch. Money. That's all that's involved. Google are feeling the pain too of the economy - a few months ago they let off over 200 people. Quote from: kpac on August 03, 2009, 02:59:33 AM My opinion on this is, as BC said, Google's default option on this is to give you the service, but others give you the option to have the service. Now why would they give you it first day, (without telling you) if there wasn't going to be some kind of catch. Money. That's all that's involved. Google are feeling the pain too of the economy - a few months ago they let off over 200 people.I get your point. | |
| 1694. | Solve : FTC shuts allegedly rogue Internet provider? | 
| Answer» http://tech.yahoo.com/news/ap/20090604/ap_on_hi_te/us_tec_internet_provider_shutdown Quote SAN FRANCISCO -Quote an Oregon-based shell company run by "overseas criminals", operating out of Belize I bet there will be another one up and running within a week... Indeed. McColo is already back in business. | |
| 1695. | Solve : Apple claims JailBreaking Dangerous? | 
| Answer» Apple stated to the FCC that if JAILBREAKING iPhones is declared legal it could lead to crippling Cell Towers... Apple stated to the FCC that if jailbreaking iPhones is declared legal it could lead to crippling Cell Towers... That would give us ironworkers more to do, building CRUTCHES for crippled towers. That doesn't sound like Apple trying to maintain a deathgrip on shiny devices at all. If they don't like it though, why do they still buy them? It sounds like a SHOUT of desperation to me.Quote from: Mulreay on July 31, 2009, 05:42:53 AM It sounds like a shout of desperation to me.Same. They're clinging to straw now.This is my primary issue with Apple (mainly the IPHONE and ipod) and how closed / proprietary they are. But I guess if you've got a popular product and people are buying it (being controlled by it) why change. And some Developers have moved underground as a result... Story Here... | |
| 1696. | Solve : 5870 and 5870x2 specs reveled!? | 
| Answer» O | |
| 1697. | Solve : Half-Open Outbound TCP Connections Limit Removed in Windows 7 and Vista SP2? | 
| Answer» No patch needed anymore... http://www.mydigitallife.info/2009/06/07/half-open-outbound-tcp-connections-limit-removed-in-windows-7-and-vista-sp2-no-patch-required/ Looking for half-open concurrent TCP connections limit patcher? Microsoft introduces a limit (of 10) to restrict number of allowed simultaneous outgoing half-open TCP connections in Windows XP SP2 in a bid to prevent virus or malicious program to make unlimited infectious connections to other system when a PC is compromised. The limit continues to exist in Windows Vista RTM and SP1. Result is event ID 4226 with error message “TCP/IP has reached the security limit imposed on the number of concurrent TCP connect attempts”, and fanatic search for patched TCPIP.sys or half-open TCP connections limit memory value crack by many Windows users, especially P2P and torrent downloaders. Microsoft appears to have a change of heart on the half-open outbound TCP connection attempts limit with the release of Windows Vista SP2 and Windows 7, PROBABLY due to the fact that the limit never effective in stopping the spreading of worms and viruses, or Microsoft has grown more confident about security feature of newer operating system. According to Notable Changes in Windows Server 2008 SP2 and Windows Vista SP2 document published in conjunction with the release of SP2 RTM: Quote SP2 removes the limit of 10 half open outbound TCP connections. By default, SP2 has no limit on the number of half open outbound TCP connections. The complete removal of the limit for half-open outbound TCP connections, which is defaulted to 10, was finalized with the release of Windows Server 2008 and Vista SP2 Build 17506. In fact, the half-open outgoing TCP connection limit has been bypassed by default since Windows Vista SP2 RC Build 16670. Previously, the changelog of SP2 SHOWED that Microsoft looks LIKE going to “add a registry key that enables modification of the maximum number of open TCP connections to increase application compatibility”. Instead, Microsoft adds a registry key that allows user or administrator to enable (turn on) or disable (turn off) the half-open TCP connections limit in Windows Vista with Service Pack 2 and in Windows Server 2008 with Service Pack 2.so that means, that M$ has basically fixed windows so that you don't need the patch to get FEEL the effects that the patch was giving! how nice I would've thought being hidden under a good firewall and antivirus software would have done good to protect you from the half open outbound tcp issue that M$ was using to stop hackers. | |
| 1698. | Solve : Interesting new tool? | 
| Answer» Full StoryThe article suggests that all data be 'churned' to protect privacy. You have to read it to get the impact of what that means. That is a very good idea. It may seem impossible, but it is not. Someday that is the way all electronic communication will be done. When that happens, we all will have more freedom to use electronic communication without fear that it could harm us. Heartening to read. Also shoots holes in my thesis that young people are just up to no good! (I know that's not true -- we just need to see more "good news" stories.) Thanks, Patio.It's interesting but has at least one flaw- what if the recepient makes a copy of the decrypted data themselves? Like- say- what outlook does automatically?Nice tool, but STILL its all the more reason not to post personal data on the internet in the first place(My dad is sticking with paying his BILLS through Snail Mail ) Quote from: BC_Programmer on AUGUST 06, 2009, 09:27:26 AM It's interesting but has at least one flaw- what if the recepient makes a copy of the decrypted data themselves?You need to think beyond the present condition. Think of the future. Someday in the future if you make a copy of something for no good prose, the data will just decay. Data will be a life form. When it it dies, it rots. The CYBERNETIC equivalent of bacteria will eat anything that is not alive and productive. This is needed to keep cyberspace from becoming a cesspool of indestructible plastic junk. Link the big mess of plastic refuse flotsam in the ocean even now. Someday this post will self-destruct. Quote from: Geek-9pm on August 06, 2009, 11:08:40 PM You need to think beyond the present condition. Think of the future. Someday in the future if you make a copy of something for no good prose, the data will just decay. Data will be a life form. When it it dies, it rots. The cybernetic equivalent of bacteria will eat anything that is not alive and productive. This is needed to keep cyberspace from becoming a cesspool of indestructible plastic junk. Link the big mess of plastic refuse flotsam in the ocean even now. Sounds more and more like the Matrix...Quote from: macdad- on August 07, 2009, 06:19:15 AM Sounds more and more like the Matrix...Welcome to the rabbit hole Neo. Quote Data will be a life form. Not until data can reproduce itself. Data (INFORMATION) is certainly part of life forms. You make a good point, though, that perhaps data will have to undergo a "life cycle." (Which means, eventually, all those "Fred" videos on YouTube may actually go away.)Data by definition is never volatile- only the storage mechanism used to store it.Quote from: BC_Programmer on August 07, 2009, 08:46:03 AM Data by definition is never volatile- only the storage mechanism used to store it. You've obviously never met my ex. Everything was volatile. Good article btw. | |
| 1699. | Solve : Safari 4 Release? | 
| Answer» Apple announced the RELEASE of Safari4 will be this COMING MONDAY.... | |
| 1700. | Solve : Firefox has 1 BILLION Downloads!!!!? | 
| Answer» Firefox reached the MILESTONE!!! Firefox reached the milestone!!! That just goes to show that anybody will download anything. | |