Explore topic-wise InterviewSolutions in .

This section includes InterviewSolutions, each offering curated multiple-choice questions to sharpen your knowledge and support exam preparation. Choose a topic below to get started.

1651.

Solve : Google finds new planet. Far away.?

Answer»

These stories indicate taht AI was used to find a planet.
Therefore it is a computer news story.

Sources:
http://www.telegraph.co.uk/science/2017/12/14/nasa-makes-announcement-habitable-planets/

https://news.sky.com/story/google-helps-nasa-discover-an-eighth-planet-11171296

https://www.theverge.com/2017/12/14/16777394/google-nasa-ai-machine-learning-planets-astronomy

Quote

NASA has discovered an eighth planet around a distant star, which means we’re no longer the largest solar system we know of. The discovery was made thanks to some artificial intelligence help from Google, which found the planet by scouring previously overlooked “weak” signals in data captured by the Kepler Space Telescope. The newly found planet is located in the solar system around Kepler-90, a star about 2,500 light-years away from Earth that was previously discovered in 2014.



Hard to grasp. How can they find ANOTHER solar system so FAR away?






Quote
How can they find another solar system so far away?

Whole bunch of different ways! One of the first extrasolar planets was discovered around a Pulsar, because the planet disrupts the otherwise precise timing of the light we see from the pulsar. Observing transits is a way of determining extrasolar planets and helping gauge their mass, and observing changes in the spectra coming from the star during such a transit can tell us the makeup of the planet's atmosphere. We can also detect "wobble" from stars that have planets, because like our own sun the barycenter of the planetary orbits is not in the center of the star, this can tell us the GENERAL mass of the system in general.

In the same way we can learn about the composition of other stars, through their bright-line spectra.

As a side note and to make it even more "computer related" I rather like a program called "Space Engine" which is possibly best classed as a Software Toy. In addition to being able to see a LOT of stuff that we know about (I presume it will be updated for this new system as well!) it will also procedurally GENERATE stars and planets, which is good for taking nifty screenshots.

I put a few into an Album here. Some from Our solar System, and some from a Galaxy far, far away, but quite recently.
1652.

Solve : AOL users paying for accounts ??

Answer»

This comes from channel 7 news in San Fransisco.
AOL users may unnecessarily be paying for accounts
It SAYS:
Quote

November 20, 2012 12:00:00 AM PST
By Michael Finney
SAN FRANCISCO --
Have you ever had an AOL account? You could still be paying for it and not know it. Do you pay for an AOL account because you don't WANT to lose your email address? Either way, 7 On Your Side has a report you have got to see.

AOL used to be the big dog. Now it is scrambling with other Internet companies to find and keep its place in the world. The New Yorker magazine says the lion's SHARE of the company's income comes from subscribers and many of them don't need to pay for the service. Could you be one of them?

Debbie Newman operates a successful catering company and much of her business is booked through her AOL email account.
Check your credit card bill and see if AOL is biking you.

By the way, Both AOL and Yahoo are changing their policies about free e-mail. Years ago when broadband came in my mother was also paying for AOL she thought to keep her e-mail address. I saw her using her AOL e-mail the one day and said so how much are you paying for internet and she said $89.99 for Cable Internet and then $24.95 to AOL for e-mail and I put a stop to that quickly when I told her that she doesnt have to pay to keep her e-mail, she only needed to pay if she was still using their 56k dial up service. It would be pretty bad if someone was paying for say the last 10 years for AOL to find out that 120 payments x $25 was all wasted MONEY... = $3000 USD My mom fortunately only paid 9 months before I caught this problem, so only $225 wasted.
1653.

Solve : Intel and ARM collaborating on 10 nm mobile CPU?

Answer»

The full title is:
Intel and ARM collaborating on next gen 3.5 GHz 10 nm Cortex A mobile processor
Quote

The next gen 10 nm mobile CPU runs at 3.5 GHz and 0.5 V, with an outstanding energy efficiency of 0.25 mW/MHz. ADDITIONALLY, Intel and ARM will UPDATE the EXISTING Cortex A55 to Intel's 22 nm manufacturing process, which will enable it to run at 2.35 GHz and 0.4 V.
https://www.notebookcheck.net/Intel-and-ARM-collaborating-on-next-gen-3-5-GHz-10-nm-Cortex-A-mobile-processor.261548.0.html
The idea that ARM and Intel could ever work together is remarkable.

Quote from: Geek-9pm on November 03, 2017, 09:41:56 PM
The idea that ARM and Intel could ever work together is remarkable.

Only if you have been on the MOON for 15 months

Quote
August 16, 2016
Intel, ARM forge foundry partnership

At the time...
Quote
ARM said it has actually been collaborating with Intel for some time
1654.

Solve : New Old Rumor: Snapdragon laptops?

Answer»

Here we go again.
A New Old Rumor, ZDNet says a HP snapdragon Lapto is coming soon.
(In case you have been asleep, The snapdragon does x86 code on a ARM chip.)
Here is the link:
Windows 10 on Arm: HP's leak hints that new Snapdragon laptops nearing release

Quote

Microsoft last year was working on enabling x86 EMULATION on Arm processors in the Windows 10 Fall CREATORS Update, ALLOWING Arm devices to run x86 apps.
The company's execs have previously SAID Windows 10 on Snapdragon SoCs would be available in six-, 10-, and 14-inch devices.
Wait and see... I saw an article the other day that talked about some leaked performance results of running Win 10 on a snapdragon processor. The numbers showed the snapdragon to be significantly slower than an Intel i3 cpu while running Windows.

Here's a link to an article regarding the snapdragon's performance: https://www.digitaltrends.com/computing/windows-10-on-qualcomm-snapdragon-tests/
1655.

Solve : Mahor Yahoo Mail Breach.?

Answer»

The BBC and other news sources REPORT Yahoo mail has been cracked.
This is about an issue in 2013 that was under reported until now.

http://www.bbc.com/news/business-41493494

http://money.cnn.com/2017/10/03/technology/business/yahoo-breach-3-billion-accounts/index.html

https://www.wsj.com/articles/yahoo-triples-estimate-of-breached-accounts-to-3-billion-1507062804
Quote

billion users
By Robert McMillan and
Ryan Knutson
Updated Oct. 3, 2017 9:23 p.m. ET

A massive data breach at Yahoo in 2013 was far more extensive than previously disclosed, affecting all of its 3 billion user accounts, NEW parent company VERIZON Communications INC. said on Tuesday.

The figure, which Verizon said was based on new,,,

Above link has video report.You rectal that Verizon got Yahoo in 2018.

Do not think other mails services are PERFECTLY safe. Gail, Hotmail ans others have had major problems with security.

1656.

Solve : Mac, PC or smartphone? A major security flaw SNAFU.?

Answer»

A number of media brfoadcasts today say that Apple and otghers know of two major security flaws. The flaws are not softrware exactly. Rather, it is something inside the chips made by Intel or others.
Here is one of these stories:
http://www.ktvb.com/news/nation-world/mac-pc-or-smartphone-major-security-flaw-what-to-do-intel-cpu/505063383
Quote

Apple says all of its Macs, iPhones and iPads contain a security flaw that requires an update. It's not alone. Any owner of a PC, tablet or smartphone should make sure that automatic software updates for their operating systems are enabled after security researchers this week revealed a broad flaw in Intel and other chips that could allow hackers to access data previously thought to be secure.
Question: How did this happen?

EDIT: Another link:
https://www.technologyreview.com/s/609891/at-least-3-billion-computer-chips-have-the-spectre-security-hole/
Quote
Its chief U.S. competitor, AMD, which has been gaining ground on Intel, said in a blog post that its chips are not vulnerable to Meltdown and there is a “near zero risk” from one variant of Spectre and zero risk from another.
IMO, The media response to the flaw is vastly overblown, which is about what you can expect for any security-related issue.

"Meltdown" is a security issue related to speculative execution on Intel Processors which (allegedly) dates to the Pentium Pro and affects all x86 processors save certain Atom chips. It allows local processes, by carefully manipulating their specific Assembly instructions and use of the CPU cache, paired with tight timing (it is a race condition, after all) to possibly read small segments of memory from areas within the process address space that they would typically be restricted from accessing.

Spectre is a related vulnerability which is largely the same but doesn't allow directly reading information but allows otherwise restricted information to be "guessed" based on specific timings of page faults under certain instructions.

As far as I can tell, both exploits require the ability to execute direct machine code- eg Local Machine access, so the attack surface is not particularly wide. Of course, a vulnerability in a web browser which allows a piece of javascript to "escape" the sandbox and run arbitrary assembly code might be able to read restricted memory addresses....

But then we also have ASLR, which randomizes the Address Space Layout of processes in largely unpredictable ways. And the process is incredibly slow to read these areas of memory as the turnaround time is rather long (for software) and the throughput is small. You would have to no precisely where to LOOK for something to get anything that was particularly valuable/secure.

There are claims that this will allow FREE access, via Javascript, to all of your physical Memory; or that it will allow malicious websites to steal SSL certificates and signing keys. But it only allows access within the same process address space and things like SSL certificates and signing keys aren't usually kept in Kernel memory anyway- a javascript exploit that allows you to read the process memory of the browser normally doesn't really need an exploit to run amuck.

And it's unclear how ASLR might factor into this, as well. It seems like at best it will make the segments of data that are from privileged areas of memory that are accessible to user-mode code through the vulnerability unpredictable.


Personally I think the media response is the same old security circus they make about every "security issue" the only real winners are the vendors of security software, who get more customers because everyday users have been frightened by the idiotic coverage. The fact that infecting your typical user typically requires nothing more than a readme file saying to shut off their AV and to run it as administrator, and certainly doesn't require some elaborate, complicated CPU security flaw that requires assembly language and tight timings to pull off.This was topic of discussion at work today as for it was in yesterdays newspaper. As BC stated it I feel is the security circus "scare tactic's" which makes for news ratings to draw attention and make it sound way worse than it really is.

In addition to the winners being the vendors of security software, this likely also caused some over paranoid users to ditch their Intel computers for a new AMD system since AMD doesnt have this first flaw.

The second flaw affects all processors Intel and AMD, and Phones & Tablets with ARM based processors and it looks to be easily patched.


http://www.zdnet.com/article/security-flaws-affect-every-intel-chip-since-1995-arm-processors-vulnerable/

I'm curious though how javascript could pull off such a means to read memory outside of its scope unless its something along the lines of accessing array elements outside of the normal scope to try to read in information that is outside of that of the javascript program itself. In my years of hobbyist programming I have accidentally accessed array elements outside of the scope such as when forgetting that arrays start at 0 and not 1 and so I call to array[64] to get the 64th element, but its actually the 65th element and if you have 64 characters stored etc, its really between 0 and 63 and so whatever is read in at array[64] is whatever was last stored at the memory address and its unpredictable what the output would be.

In other languages there are methods of accessing memory directly to get whatever is stored at specific addresses as well as if you know a memory address that is used for specific pieces of information you can exploit that to grab INFO or force change info which is how a lot of game cheats work by memory injection to make a game god mode where the value is refreshed to MAXIMUM even if the game itself has reduction calculations that are suppose to reduce hit points or health bar of a player etc, it constantly tops the value off or the value is set to a huge number. In my tinkering with javascript, it has felt as if there are very tight controls on what is and isn't allowed. Calling to an array element outside of the scope however last i knew wasnt restricted and still doable to grab whatever is in memory at that placeholder. But to read in memory from some other means, I am not aware of any methods with javascript due to the limitations in place of its design. Additionally due to inability to write to file from javascript its not like you can create another file type from javascript and then call to that to execute which other script and programming methods are not restricted In some of the articles about the 'fix' is a concern the 'fix' will slow down the CPU. Such would be a concern to companies that do a lot of data processing. They may prefer to ignore the risk and go for better throughput with the very small risk of getting an infection.
Some administrators would rather not have a patch that reduces the throughput even if it makes the CPU only 7% slower.If there is a performance hit then hopefully there is a choice on implementing it in a corporate environment via and update server, however with Windows 10 its a forced update at this time for non-corporate systems.

I have a year old Dell Core i3-5015U 2.1Ghz Laptop that is Windows 10 that I haven't turned on in about 4 months because I prefer Windows 7 for what I use my laptops for. I will run a benchmark I guess offline and then save that data and then roll it forward to all updates and run a benchmark after and see if there is any change to what the CPU can crunch for single and multithreaded tasks.

Meltdown is fixable. It involves patching context switches between user and kernel mode to account for the possibility of the flaw. This reduces the performance of such calls. That is what will affect software performance.

However, realistically, the context switches were already one of the most time-intensive things that could be done, so software already avoids them at all costs. The patch is speculated to reduce performance as much as 30% but so far even synthetic BENCHMARKS have shown very little real-world difference in most applications. A few companies have had problems which they have now blamed on the patch for reducing performance as much as 60% which I'm skeptical of.

Spectre is not fixable in existing chips. It is much harder to exploit though and doesn't give much information.

As far as Javascript- that was sort of my point. Exploiting these security issues requires rather low level access to be able to run Machine code instructions, which is not something you can do in Javascript, which means that utilizing Meltdown or Spectre from javascript will require also exploiting far more serious browser security problems that would allow, for example, a javascript string to be directly executed as machine code, or something.

At the point where untrusted software is able to directly execute machine-code instructions on your PC I think the "battle is lost" anyway. Aspects like UAC or AV software can protect you but at that point your system is effectively compromised.

As I mentioned for the majority of consumer systems, these sorts of exploits are entirely redundant. It wouldn't make sense to design an elaborate scheme involving obscure, low-level exploits in the hardware when so many people are security-ignorant and happily turn off their AV because you claim your software is a "false positive" and then wonder where the malware keeps coming from.
1657.

Solve : Say Good-Bye to the iPod clasics.?

Answer»

This last week Apple announced the end of life of the iPod and some of the other items related to it. This should not come as a surprise as nowadays you can FIND smart phones radios and other gadgets that will play MP3 files just as good.
Still, the iPod genre was one-of-a-kind.
Here's an article from Popular Mechanics.

http://www.popularmechanics.com/technology/gadgets/news/a27515/ipod-shuffle-ipod-nano-dead-discontinued/
Quote

It should be no surprise that Apple has finally canned these two older 'Pods which no LONGER really fit into Apple's suite of modern devices. Neither device supports apps, which have become a cornerstone of Apple's music business now that Apple Music has all but replace the aging, bloated disaster that is iTunes. Similarly, streaming (which neither of these devices can fully support given they've got no capacity for a data connection) has overtaken older download-ing based habits.

They are no longer sold new, but they didn't vanish from existence.

Personally I've found smartphones to SUCK awfully for playing music. Aside from having awful battery life, they lack tactile buttons and oftentimes the software sucks. I tried to put music on my phone and then found out it doesn't actually have a way to play music- so I download VLC and it manages to find about 20% of the music I put on, arbitrarily not allowing me to play others unless I navigate there manually for EVERY single file. I still have no idea how to make playlists and can't be bothered to look into it due to the general deficiencies; If you are going to play music on a smartphone it seems the way you have to go is through the use of streaming services which is exactly what was noted in the article.

I still use a 16GB Sony MP3 Player for music. Which replaced a similar 4GB model I've had for 10 years. Only reason I replaced it was because it has literally fallen apart over time.

It's so sad
1658.

Solve : Conflicts about reported defects in CPU design?

Answer»

Recently there have been reports of some kind of strange defects in almost all current CPU designs. These defects have been reported as 'Meltdown and Spectre exploits .'
Some reports claim the problem can be found in ARM, AMD and Intell devices.
Below are some recent links:

https://www.theguardian.com/technology/2018/jan/04/meltdown-spectre-worst-cpu-bugs-ever-found-affect-computers-intel-processors-security-flaw

https://www.windowscentral.com/all-modern-processors-impacted-new-meltdown-and-spectre-exploits

https://www.theregister.co.uk/2018/01/02/intel_cpu_design_flaw/

http://appleinsider.com/articles/18/01/03/intel-claims-cpu-security-flaw-not-unique-to-its-chips-implies-arm-and-amd-chips-could-be-affected

Somehow this issue relates to an article by Forbes to the effect that AMD will benefit in this CPU defect debate. It was published on Jan 4 and You can read it below:
https://www.forbes.com/sites/kenkam/2018/01/04/amd-looks-poised-to-gain-at-intels-expense/#196ea84d74ec

The most recent was a 'good news for Linus' article form ZDNet.
http://www.zdnet.com/google-amp/article/linux-4-15-good-news-and-bad-news-about-meltdown-and-spectre/
Quote

Linus Torvalds, Linux's PRIMARY creator, had good and bad news about the chip security problems Meltdown and Spectre. The good news is the lead up to the Linux 4.15 was "quiet and small, and no last-minute panics, just small fixes for various issues". The bad news? "It's not like we're 'done' with Spectre/Meltdown."
On the Linux Kernel Mailing List (LKML), Torvalds explained, "The bulk of the 4.15 work is all the regular plodding 'boring' stuff. And I mean that in the best possible way. It may not be glamorous and get the headlines, but it's the bread and butter of kernel development, and is in many ways the really important stuff."
The above ZDNet story also has some more links and bout Intel and Linux and the reported CPU security issues.
In essence, they say it has not been fixed yet. I don't consider even 1 of those sources credible...

I certainly don't respect their so-called Tech writers either.Quote from: patio on January 31, 2018, 12:51:56 PM
I don't consider even 1 of those sources credible...

I certainly don't respect their so-called Tech writers either.
So NOTED. Here is where you can get back to the first source:
https://meltdownattack.com/
They link to papers from the University of Pennsylvania and University of Maryland.
Very bestirring. No pictures at all.

A quote with the tech stuff:
Quote
The issue affects Intel CPUs broadly, but also AMD and various ARM processors are suspect to a similar attack. Browser vendors have already started mitigating the issue with Microsoft, for example announcing improvements to Internet Explorer and Microsoft Edge browsers against Speculative Execution. Mozilla has also taken action against the new class of timing attacks and Chromium based browers a fix is scheduled for version 64. The WebKit team also did a writeup on the implications of Spectre and Meltdown in their blog.
https://react-etc.net/entry/exploiting-speculative-execution-meltdown-spectre-via-javascriptYou still don't get it...it is NOT a manuf. defect...it's a WEAKNESS that was being exploited.

BTW all the fixes to date have been more a nightmare than the exploit itself...The Title is:
Re: Conflicts about reported defects in CPU design

In the reports there was no MENTION I saw about defects in the factory.
A very weak over done design that makes people cry is a defect in design. The fact that it works good in an honest society does not justify its use. Does it? In a hostile world anything that has a weakness can be seen as a defect. One could argue that, but the fact remains that criminals take advantage of whatever can be exploited. whether a law, a person or a machine.

The concept was to make a CPU faster by speculative pee fetch. The CPU does not really needed to per-fetch, but the engineers who design logic think the speed increase is worth the risk of something networking right.

If somehow I came across as saying there was a glitch in the factory, I Herby sate that it was not my intent to say the factories made the mistake. The defect or flaw is more at the abstract level. The CPU shall put unverified code or data into a cache if it might be needed. The issue is when or how will the code or data be certified or tested for evil intentions of people.

Additionally, even if everybody in the world was honest, there is the question of data integrity. Will corrupted data be allowed to enter the cache?

Presently there is no proof t his issue is causing any harm. There are other things to worry about. I hope this post will help others locate the information they need. There is no coming danger from the 'meltdown' thing.. The bad things that have happened were due to some plain simple lazy security habits.

What we learn is that a some thnings we believe are fool proof and not.


Quote
The Title is:
Re: Conflicts about reported defects in CPU design

Your words...not mine.What's your definition of defect?
Quote
fault, flaw, imperfection, deficiency, weakness, weak spot, inadequacy, shortcoming, limitation, failing; kink, deformity, blemish
In the above the abstract set comes comes before the concrete set.

Yhe CPU has a design deflect. Or weakness. Or shortcoming.
I would say they are defects- similar to things like the FDIV bug, as they are issues with how the CPU operates that are part of it's design.

I think their realistic impact has been overstated. As Patio mentions the impact on people by the supposed fixes- such as for example making many AMD systems unbootable- is probably a greater impact than any security problems.

The Meltdown exploit which affects only Intel is the "easier" to exploit. It requires carefully crafted machine code and allows a process to read areas of memory in it's address space which normally are not accessible to it and are used by the OS Kernel. Spectre is a similar class of bug but requires even more carefully crafted machine code instructions and data is "guessed" based on specific timings of those instructions.

It doesn't seem like a vulnerability that is likely to allow particularly private information to be taken. Some sites claim it allows sensitive data to be stolen, but kernel memory doesn't have things like say passwords, and given it needs very careful ASM programming the exploit even the "easy" Meltdown exploit I'd argue that the common premise that this is something that "any website" can use to steal your passwords with javascript is just another act of the ongoing security circus.Yes, the danger is overstated.

But what is worrisome is that for such a long time nobody ever nmotices.
One might wonder if there are other things the CPU can do that are not well known? Would there be some hidden danger?

Years ago some CPUs had undocumented instructions in the code set and hobbyists loved to speculate of what they might do.

Modern CPU designs are so very complex that it would very very hard to verify that a design does not have a vulnerability that might show how be exploited.
Here is an article that explains this statement:
A CPU Researcher Explains Why It Took 22 Years to Discover Fundamental Chip Flaw
In this context the term 'clup flaw' does not mean something went bad in the factory that makes the chips. No, rather, it is behavior that is thought to be worrisome or unwanted.

Quote
To me, a layman, it’s odd that CPUs require so much research, since the architecture is designed by humans. Why do they require so much outside research to sort of understand what they’re doing?

Because CPUs are remarkably complex.
...
I’ve seen people writing that Spectre and Meltdown are a result of chip manufacturers favoring speed over security.

I’m not sure because I’m not really a CPU designer and the topic is ridiculously complex, but my guess is that they could have done something relatively easy. I’m not trying to say that Intel can do something about it in a short time frame because that’s an entirely different question, but I would guess they were taken by surprise by that.
You will find no simple answers.
Well, not simple answer of amazing value.
As I alluded, I think it's really just another symptom of the "Security Circus" that seems to PERVADE modern computing.

There is an excessive focus on exploits, software vulnerabilities, security updates, security flaws, and so forth and not nearly enough focus on educating users on applying basic common sense to their computing; to much presumption that missing security updates directly leads to malware infection when typically it is the user not being proficient in identifying threats or performing their own threat analysis of things they do or intend to do with their PC that causes problems.

Fact is that a diligent user isn't going to be impacted by these CPU vulnerabilities because they will at some level require the exploitation of user vulnerabilities in order to be utilized.I agree. This topic was blow out of proportion.

You remarks remind me that I need to get a better password manager.
The one I like to use has been downgraded by Mozilla, so I need to go over to a more secure add-on for Firefox.

Just yesterday I did a scan with Malwarebytes and was surprised about how many PUPs were found. One has to be careful.

And yes, a complex exploit wooed have to have some kind of malware to let in into the system. So the solution is to maintain and fortify the basic common sense security.
1659.

Solve : Cyber attak - Europe ^ USA?

Answer»

Major media reports:

http://abcnews.go.com/Technology/wireStory/hackers-strike-europe-sparking-widespread-disruption-48301067
New cyberattack wallops Europe; spreads more slowly in US

http://www.bbc.com/news/technology-40416611
Global ransomware attack causes turmoil

http://money.cnn.com/2017/06/27/technology/hacking-petya-europe-ukraine-wpp-rosneft/index.html
Another big malware attack ripples across the world
Quote

Many firms, including Symantec, have suggested the ransomware is a variant of Petya, a known ransomware. But according to security firm Kaspersky Lab, preliminary findings indicate the attacks are from a new ransomware that it's now calling "ExPetr."
Either way, researchers say Tuesday's attacks use a Windows flaw called EternalBlue to spread through corporate networks. WannaCry also leveraged the EternalBlue exploit, which was leaked as part of a trove of hacking tools believed to belong to the NSA. Microsoft (MSFT, Tech30) issued a patches for the exploits in March.
Massive GoldenEye Ransomware Campaign Slams worldwide users



New ransomware outbreakQuote
Bitdefender has identified a massive ransomware campaign that is currently unfolding worldwide. Preliminary information shows that the malware sample responsible for the infection is an almost identical clone of the GoldenEye ransomware family. At the time of writing this there is no information about propagation vector but we presume it to be carried by a wormable component.
Unlike most ramsonware, the new GoldenEye variant has two layers of ENCRYPTION: one that individually encrypts target files on the computer and another one that encrypts NTFS structures. This approach prevents VICTIMS computers from being booted up in a live OS environment and retreiving stored information or samples.
From the link above linkPosted by Hackoo
https://labs.bitdefender.com/2017/06/massive-goldeneye-ransomware-campaign-slams-worldwide-users/?icid=overlaycall-pagesgoldeneye
This has been a problem for quite some time, and its just gonna grow, recently I read that more and more Ransomware codes is turning into ranosmware-as-a-service. The Europe alone has lost millions of dollars due to the attacks, ergo the new regulations. The massive increase in ransomware families just shows another one recently described as Rapid ransomware. Truth be told its just gonna expand. And it apparently starts with small and medium businesses using them as a TUNNEL to reach major companies through SUPPLY chains. JockB,
When criminals go unpunished, they just get more bolder in their crimes.
I will refrain from citing any sources. It should be self-apparent.

Some proverbs or sayings about crime:

In times of trouble leniency becomes crime. ~ Traditional Proverb

Commit a sin twice and it will not seem a crime. ~ Jewish Proverb

It’s a crime if you get caught. ~ Russian Proverbs

Great thieves punish little ones. ~ Author Unknown

Crime expands according to our willingness to put up with it. ~ Barry J. Farber

Still, the Internet now a social amplifier that makes crime and even larger problem that what anybody WOULD have foreknown.

Here is a breaking news story:
https://abcnews.go.com/Technology/wireStory/albanian-sought-us-arrested-cybercrime-market-probe-53026559
Quote
Ymeraj is among 36 people who have been indicted in the U.S. for allegedly being part of the Infraud Organization. The U.S. Justice Department alleges the organization was an online forum where stolen credit card numbers, bank account data and other personal information were sold and purchased.
Please tell me it is not true. I don't think the Internet - or Computers, for that matter- has realistically made Crime any worse. It's just a different venue.

In some aspect I'd even argue that it's had a positive effect, As with many crimes it leaves an "audit trail" that can be used to put together illegal activities.

Outside ransomware and scams and fraud, There are far more serious crimes, and I think the Internet has helped with some of that. Where 30 years ago a pedophile could kidnap a kid, do god knows what, then murder them and you *might* hear about it on the local news, Now these weirdo's share their disgusting pictures with other weirdo's and law enforcement can act quickly enough to piece together locations before that happens. Meanwhile evening news never covers that unless it goes awry, so they are thankfully usually left with stories where some guy walked through a playground as a shortcut and they have to interview all the parents who say "Oh no doubt in my mind he wanted to kidnap our kids" or they bring on experts to talk about it at length. And the "expert" looks like he might understand the mind of a pedophile all too well, sort of like how news channels sometimes bring on nutritionists who talk about healthy eating and you can't help but notice they need two chairs.
1660.

Solve : Apple's Siri in the spotlight for potty mouth!?

Answer»

Apple's Siri in the spotlight for potty mouth.

On a Mac or iPhone, users can ask Siri to define the word "mother." Initially, it gives a standard definition:
-"a woman in relation to a child or children to whom she has given birth"
- "a female animal in relation to its offspring."
-"(especially as a title or form of address) the head of a female religious community."
...
Originally, Siri was delivering the surprising definition when it was asked "what does mother mean?" That query has since been fixed, but the issue still remains when it's asked to "define the word mother."
Siri is pulling the definition from the Oxford Dictionary, which offers the swear word as a secondary definition for the word "mother" in a somewhat colloquial response.

http://www.foxnews.com/tech/2018/04/30/apples-siri-in-spotlight-for-potty-mouth.html
You will ha veto read the story to see what they are talking about.The vulgar thing can not be posted here.
***Yawn***

It's been addressed....keep up.Siri says MoFo? I'd pay money to hear that!You have to ask twice for it to kick in...I shudder to think what she says if you ask three times. I have to admit that when I was first fooling around with test-to-speech in Windows, I made the robot lady say a lot of bad words.Quote from: Salmon Trout on April 30, 2018, 02:06:17 PM

test-to-speech

Text-to-speechMy experiments with text-to-speech in Windows were with the "MSAgent" control in Visual Basic. I certainly didn't always use my powers for good.Text-to-speech ... I had fun calling my boss once and playing it as Stephen Hawking as for thats how the voice sounded in a text -to-speech program I had been using that sounded just slightly better than a Speak & Spell
Quote from: DaveLembke on May 01, 2018, 12:37:01 PM
Text-to-speech ... I had fun calling my boss once and playing it as Stephen Hawking as for thats how the voice sounded in a text -to-speech program I had been using that sounded just slightly better than a Speak & Spell
Stephen Hawking passed away recently. He made use of Test to Speech while working as a professor at Cambridge. Here is a recent article by the Washington post.
How will we remember Stephen Hawking?
Quote
Despite his almost unbelievable conquest of his disabilities, Stephen Hawking should be remembered for at least four other reasons:
First, and many times with collaborators, for his seminal work on black holes, entropy and the RADIATION emitted from the black holes. Second, for his copious and popular writings of both nonfiction and fiction, making physics more interesting and understandable to the general public. Third, his heated and unsuccessful arguments with other physicists that the Higgs boson, if it existed, could never be found. (Incidentally, he was proved wrong in 2012.) Fourth and finally, his vitriolic attacks on Israel, motivated by his MENTOR Noam Chomsky, that included support of boycott, divestment and sanctions and questioning the need for a Jewish stat
For many people, Test to speech is very IMPORTANT tool. (Myself included.)

postscript...
During his time at Cambridge Professor Hawking wrote a large number of publications. The best WAY to read the academic publications AUTHORED by Professor Hawking or his colleagues is by going to the SLAC SPIRES HEP site and searching for "Find author Hawking".
1661.

Solve : Warren Buffett:I love Apple so much...?

Answer»

.. He would like to have 100 per cent of it.
Here is an interviews on the CNBC network.
https://www.cnbc.com/2018/05/07/warren-buffett-i-dont-have-to-do-a-thing-to-own-more-of-apple.html

12:42 AM 5/8/2018 pacific time.
Tae Kimr
Published 20 Hours Ago Updated 17 Hours Ago CNBC.com
Warren Buffett tells CNBC he likes Apple stock so much he would love to own all of it.
"We like very much the economics of their activities. We like very much the management and the way they THINK," the billionaire investor says.

Buffet also said:
"When I buy Apple, I know that Apple is going to repurchase a lot of shares," he said. "We own about 5 percent. But I know I don't have to do a thing and probably in a couple of years we'll own 6 percent without laying out another dollar. Well, I love the idea of having 5 percent go to 6 percent. The cheaper the stock is the more they will get for their money. There is no reason at all for me to encourage other people to buy Apple."

Wish I had just 1% of Apple.
When apple was in trouble in the 90s, I thought they were going to fail and stayed away from them. Coworker who loves Apple products bought into them and Microsoft gave them a 150 Million Dollar bail out in 8/6/1997.

Coworker friend cashed out of his apple stocks last year after 20 years in and made some serious money!

https://www.wired.com/2009/08/dayintech_0806/

video here: https://www.youtube.com/watch?v=WxOp5mBY9IY&feature=player_embedded

Myself, I saw Circuit City Failing and stocks were 70 cents a share, I thought they wouldnt go under, they would rebound and I would make some money. So I bought $500 in shares getting 685 shares after transaction fees. Circuit City crashed even harder the next day to 49 cents then 34 cents then 29 cents and then fizzled out into out f business. I was really hoping that the Electronic Superstore Giant would rebound and someday when their stocks were say $15 a share cash out at like $10,275 before taxes. BUT... it was a $500 gamble that I lost.

A few years ago when AMD was struggling and there shares fell to like $1.61 per share I was so tempted to buy into them but I couldnt afford to take another loss like that and AMD was so behind with the future of their CPUs making new products with older core technology driven harder like 220 watt TDP CPUs to try to compete with Intel i7's that ran on half the power and still outperformed in benchmarks. I am very happy that AMD pulled through as for I prefer AMD over Intel because the price tags are better and never had any problems with their products in the last 20 years and good performance, even if not the most power efficient.Truth is, I did make a little bit of money on both Microsoft and Apple as a day trader. But I eventually lost my money due to poor judgement on my part. Why not just invest in Berkshire Hathaway and LET him do the heavy lifting ? ?

I think he's a bit better at it than you were...just sayin.
Quote from: DaveLembke on May 08, 2018, 10:37:05 AM

When apple was in trouble in the 90s, I thought they were going to fail and stayed away from them. Coworker who loves Apple products bought into them and Microsoft gave them a 150 Million Dollar bail out in 8/6/1997.
From Microsoft's perspective, That was actually a transaction like any other; Microsoft got a bunch of non-voting shares in Apple, agreed to keep supporting OFFICE for Mac for at least 5 more years, And Apple agreed to drop their "Look and FEEL" lawsuit. It also helped give them a bit of "goodwill" considering Microsoft was embroiled in the 90's anti-trust litigation regarding Internet Explorer.
1662.

Solve : Apple changes iTunes. Windows XP and Cistra left out.?

Answer»

If you use iTunes on a Windows XP or Vista PC, this may be of interest to you.

Quote

Windows XP or Vista PCs
Starting May 25, Apple will introduce security changes that prevent older Windows PCs from using the iTunes Store. If you have Windows XP or Vista PC, your computer is no longer supported by MICROSOFT, and you're not able to use the latest version of iTunes.
You can CONTINUE to use PREVIOUS versions of iTunes on your Windows PC without support from Apple. However, you won't be able to make new purchases from the iTunes Store or redownload previous purchases on that computer.
After May 25, you'll need to use Windows 7 or later with the latest version of iTunes to make purchases from the iTunes Store and redownload previous purchases.
The latest version of iTunes is available for PCs running Windows 7 or later. Download the latest version at apple.com/itunes.
It has bee reported that about 7 per cent of all PCs in the world still tun on Windows XP. How many also run iTunes is not easy to calculate. Still, Apple might be cutting off g out a significant part of its customers. Maybe.

Also, this also has impact ton Apple TV (1st generation).
Apple is just covering their bottom by removing support from an OS that is no longer PATCHED. If they continued to support their software for use on XP and somehow people had their accounts (hacked/stolen or WHATEVER) it would make for bad news. I am actually surprised that Apple didn't pull the plug sooner on XP.

If anyone was hard up for money to where they cant afford a used or refurbished Windows 7 or newer computer for less than $90, then they might have the wrong priority to spend money on media.... Getting a Windows 7 or newer computer doesn't cost all that much and anyone who is still on XP still have other ways to get music and videos from other than Apple.
1663.

Solve : Cortana flaw ... maalicious websites?

Answer»

From Digital Trends.
Cortana flaw enables hackers to load malicious websites ...
https://www.digitaltrends.com/computing/microsoft-fixes-cortana-lock-screen-bug-malware/
Quote

By Kevin Parrish — Posted on March 7, 2018
Two independent Israeli researchers recently discovered that anyone with ACCESS to a Windows 10 PC could use Cortana and a USB-based network adapter to download and install malware even if the machine remained locked. This was accomplished using voice commands directed to Cortana, which could load up a malicious website in a browser without unlocking Windows. The PC could also be moved to a wireless network controlled by the hacker.
Really? Hard to believe! You FIND it hard to believe that somebody with physical access to a system could compromise it?Yes, hard to believe.
Modern computers are protected from even direct physical use. You can destoy the computer, but not steal the data. Or it ought to be that way.
When the machine is locked, you should not be able to do anything in the NORMAL way of controlling the machine. - Right?

Tue locking computer locking must mean:
  • no keyboard
  • no mouse
  • no display
  • no USB auto-sat
  • no remote command
  • no change in network
  • no use of screwdriver
  • no use of voice command
On modern computers built with security features even removing the CMOS cell will not grant use of either firmware or the OS.
What exceptions do you know about?"Locking" refers to a very specific windows feature, it is locking your SESSION not the computer. It's been in Windows NT pretty much SINCE the earliest releases.

Windows Key+L Works on NT4 and later for this. Windows XP depending on the configuration takes you back to the "welcome" screen. Windows 8 and later have a 'Lock Screen'.

"Locking" a computer doesn't suspend running processes, all tasks continue to run in the background. Eg if you connect a USB device, you will hear the USB connect sound and, in the background, necessary drivers will be installed. You can also log in as a different user on the system and have tasks from multiple users running in different sessions at the same time. Screensavers typically still run as well.
1664.

Solve : What happened to Kellys Korner??

Answer»

Quote from: evilfantasy on March 16, 2008, 12:56:44 AM

Doug KNOX has many of the same tweaks and fixes http://www.dougknox.com/

Came across this topic when running a search query for:
Code: [Select]https://www.startpage.com/do/dsearch?query=what+happened+to+dougknox.com
Unfortunately, KELLY's Korner is gone for good; it's now parked via some host (privacy.co.com), WHOIS@
Code: [Select]https://whois.icann.org/en/lookup?name=www.kellys-korner-xp.com
... Used to be very fond of these (& other!) Windows "Tips" web sites, over the years - many of us have grown up with them. It'll always be a great MEMORY! ;-s

P.S.
Should anyone, perhaps, know what happened to Doug's web pages, please do let me (us!) know. Haven't seen any updates for years & everything is - pretty much - malfunctioning, including the Feedback page which doesn't work (on submit). I've tried to look for (the real) "Doug Knox" on Twitter and wherever, to no avail, meh.Quote
Unfortunately, Kelly's Korner is gone for good; it's now parked via some host (privacy.co.com), [emailprotected]

It's not gone and still bein supported.The URL, for the web site (?!)
Code: [Select]www.kellys-korner-xp.com
... It takes me to -
Code: [Select]http://ww25.kellys-korner-xp.com/?z
& that page source is:
Code: [Select]<!DOCTYPE HTML><html data-adblockkey="MFwwDQYJKoZIhvcNAQEBBQADSwAwSAJBANDrp2lz7AOmADaN8tA50LsWcjLFyQFcb/P2Txc58oYOeILb3vBw7J6f4pamkAQVSQuqYsKx3YzdUHCvbVZvFUsCAwEAAQ==_HW8AJcx3BFZxuON0KVPW0n5cdI6PEIotV/l6wU1MCDMWdKbu8oZ2IdtkDX2xkPFMaegh4Tiup7EdyJ4aJ7hi0w=="><head><meta http-equiv="Content-Type" content="text/html; charset=utf-8"><title></title><meta name="viewport" content="width=device-width, initial-scale=1"><meta name="description" content="See related links to what you are looking for."/></head><!--[if IE 6 ]><body class="ie6"><![endif]--><!--[if IE 7 ]><body class="ie7"><![endif]--><!--[if IE 8 ]><body class="ie8"><![endif]--><!--[if IE 9 ]><body class="ie9"><![endif]--><!--[if (gt IE 9)|!(IE)]> --><body><!--<![endif]--><script type="text/javascript">g_pb=(function(){var
DY=document,azu=location,DE=DY.createElement('script'),aAx=false,LX;DE.defer=true;DE.async=true;DE.src="//www.google.com/adsense/domains/caf.js";DE.onerror=function(){if(azu.search!=='?z'){azu.href='/?z';}};DE.onload=DE.onreadystatechange=function(){if(!aAx&&LX){if(!window['googleNDT_']){}
LX(google.ads.domains.Caf);}
aAx=true;};DY.body.appendChild(DE);return{azj:function(n$){if(aAx)
n$(google.ads.domains.Caf);else
LX=n$;},bq:function(){if(!aAx){DY.body.removeChild(DE);}}};})();g_pd=(function(){var
azu=window.location,nw={},bH,azs=azu.search.substring(1),aAp,aAr;if(!azs)
return nw;aAp=azs.split("&");for(bH=0;bH<aAp.length;bH++){aAr=aAp[bH].split('=');nw[aAr[0]]=aAr[1]?aAr[1]:"";}
return nw;})();g_pc=(function(){var $is_ABP_whitelisted=null;var $Image1=new Image;var $Image2=new Image;var $error1=false;var $error2=false;var $remaining=2;var $random=Math.random()*11;function $imageLoaded(){$remaining--;if($remaining===0)
$is_ABP_whitelisted=!$error1&&$error2;}
$Image1.onload=$Image2.onload=$imageLoaded;$Image1.onerror=function(){$error1=true;$imageLoaded();};$Image2.onerror=function(){$error2=true;$imageLoaded();};$Image1.src='/px.gif?ch=1&rn='+$random;$Image2.src='/px.gif?ch=2&rn='+$random;return{azl:function(){return'&abp='+($is_ABP_whitelisted?'1':'0');},$isWhitelisted:function(){return $is_ABP_whitelisted;},$onReady:function($callback){function $poll(){if($is_ABP_whitelisted===null)
setTimeout($poll,100);else $callback();}
$poll();}}})();(function(){var aAj=screen,RC=window,azu=RC.location,aAw=top.location,DY=document,Sp=DY.body||DY.getElementsByTagName('body')[0],aAu=0,aAs=0,aAt=0,$IE=null;if(Sp.className==='ie6')
$IE=6;else if(Sp.className==='ie7')
$IE=7;else if(Sp.className==='ie8')
$IE=8;else if(Sp.className==='ie9')
$IE=9;function aAq($callback){aAt++;aAu=RC.innerWidth||DY.documentElement.clientWidth||Sp.clientWidth;aAs=RC.innerHeight||DY.documentElement.clientHeight||Sp.clientHeight;if(aAu>0||aAt>=5){$callback();}
else{setTimeout(aAq,100);}}
var $num_requirements=2;function $requirementMet(){$num_requirements--;if($num_requirements===0)
aAv();}
aAq($requirementMet);g_pc.$onReady($requirementMet);function aAv(){var ef=undefined,IQ=encodeURIComponent,aAo;if(aAw!=azu&&g_pd.r_s===ef)
aAw.href=azu.href;aAo=DY.createElement('script');aAo.type='text/javascript';aAo.src='/glp'+'?r='+(g_pd.r!==ef?g_pd.r:(DY.referrer?IQ(DY.referrer.substr(0,255)):''))+
(g_pd.r_u?'&u='+g_pd.r_u:'&u='+IQ(azu.href.split('?')[0]))+
(g_pd.gc?'&gc='+g_pd.gc:'')+
(g_pd.cid?'&cid='+g_pd.cid:'')+
(g_pd.query?'&sq='+g_pd.query:'')+
(g_pd.search?'&ss=1':'')+
(g_pd.a!==ef?'&a':'')+
(g_pd.z!==ef?'&z':'')+
(g_pd.z_ds!==ef?'&z_ds':'')+
(g_pd.r_s!==ef?'&r_s='+g_pd.r_s:'')+
(g_pd.r_d!==ef?'&r_d='+g_pd.r_d:'')+'&rw='+aAj.width+'&rh='+aAj.height+
(g_pd.r_ww!==ef?'&ww='+g_pd.r_ww:'&ww='+aAu)+
(g_pd.r_wh!==ef?'&wh='+g_pd.r_wh:'&wh='+aAs)+
(g_pc.$isWhitelisted()?'&abp=1':'')+
($IE!==null?'&ie='+$IE:'')+
(g_pd.partner!==ef?'&partner='+g_pd.partner:'')+
(g_pd.subid1!==ef?'&subid1='+g_pd.subid1:'')+
(g_pd.subid2!==ef?'&subid2='+g_pd.subid2:'')+
(g_pd.subid3!==ef?'&subid3='+g_pd.subid3:'');Sp.appendChild(aAo);}})();</script></body></html>Am I missing something? o.0Nope, you aren't missing anything, it's been gone for a number of years now. It's parked by some kind of advertisement website.

The script apparently checks for ad blockers- if you have them on you get a blank page. Otherwise it gives you pretty typical advertiser's parking page.
Just to add, based on web.archive.org- it was up February 2014, but was gone in March 2014, and was ALREADY a parking website.

Like when it went down related to the creation of this thread, the hosting probably expired and didn't get renewed.
1665.

Solve : Tax Scam 2018. Fake phone calls?

Answer»

This is a fake IRS number: 800 218 5846 and just now I got it.
Here is a report from the IRS on this new twist:
https://www.irs.gov/newsroom/phone-scams-pose-serious-threat-remain-on-irs-dirty-dozen-list-of-tax-scams
Quote

IR-2018-40, March 6, 2018

WASHINGTON — The Internal REVENUE Service reminded taxpayers to be careful with continuing aggressive phone scams as criminals pose as IRS agents in hopes of stealing money. These continuing phone calls remain a major threat to taxpayers and remain on the annual IRS "Dirty Dozen" list of tax scams for the 2018 filing season.

During filing season, the IRS generally sees a surge in scam phone calls threatening such things as arrest, deportation and license revocation if the victim doesn’t pay a bogus tax BILL. In a new twist being seen in recent weeks, identity thieves file fraudulent tax returns with refunds going into the real TAXPAYER’s bank account – followed by a phone call trying to con the taxpayer to send the money to the scammer.

The Dirty Dozen is compiled annually by the IRS and lists a variety of common scams taxpayers may encounter any time during the year.

To help protect taxpayers, the IRS is highlighting each of these scams on 12 consecutive days to help raise awareness. The IRS also urges taxpayers to help protect themselves against identity theft by reviewing safety tips prepared the Security Summit, a collaborative effort between the IRS, states and the private-sector tax community.
Warn your family and friends about this new scam.
Do not respond to any call that claims to be from the IRS, unless you are expecting a call. Normally the IRS does not make surprise phone calls.
Quote
For Taxpayers Who Don’t Owe Taxes or Don’t Think They Do:
Do not give out any information. Hang up immediately.
Contact TIGTA to report the call. Use their IRS Impersonation Scam Reporting web page. Alternatively, call 800-366-4484.
Report it to the Federal Trade Commission. Use the “FTC Complaint Assistant” on FTC.gov. Please add "IRS Telephone Scam" in the notes.
See above link for moire details.
I corrected your spelling in the Topic line...I sometimes receive E-mails telling me it is from the IRS and they found some anomalies on my last Tax Return. I would CERTAINLY find that unusual given that I'm Canadian and therefore the appropriate agency would be the CRA.

Though some of the scammers have adapted and do actually claim they are from the CRA. Notwithstanding that the CRA never actually contacts PEOPLE by E-mail, they seem to just replace IRS with CRA. It will suggest there were "anomalies on your 1040". 1040 is the IRS form. the Canadian Tax Return Form is the T1 General.

Though, that is all intentional. Scams are less about "tricking" people directly as much as they are about funneling the most gullible people you can towards your schemes. If you can convince an elderly UK resident they didn't pay their UK income taxes to the IRS, you've hit scammer paydirt.Doesn't qualify as "news"...been goin on quite awhile now...Quote from: Geek-9pm on April 27, 2018, 02:52:36 PM
This is a fake IRS number: 800 218 5846 and just now I got it.
Here is a report from the IRS on this new twist:
https://www.irs.gov/newsroom/phone-scams-pose-serious-threat-remain-on-irs-dirty-dozen-list-of-tax-scamsWarn your family and friends about this new scam.
Do not respond to any call that claims to be from the IRS, unless you are expecting a call. Normally the IRS does not make surprise phone calls.See above link for moire details.

I also got few calls from these IRS scammers using different number since last week. I Googled the number and found that some people have reported the number as scam at http://www.whycall.me/845-450-2153.html even since few months ago. I just blocked it now.
1666.

Solve : Intel has new and better SSD chips?

Answer»

The Intel news release is also reviewed on PCWORLD, Gismo and TechRadar.
Here is the story from Gizmo::
https://gizmodo.com/intel-invented-the-ssd-killer-of-the-future-and-its-so-1823598400
Quote

This thing flies. The machine I’ve I installed it in is already POSITIVELY loaded: It’s got Intel’s latest 6-core i7 processor, an Nvidia 1080 graphics card, and a whole mess of RAM. But this little stick of STORAGE makes everything even faster. Intel’s Optane 800P storage is likely some of the fastest storage you can buy. It’s also incredibly expensive—think three-and-a-half-times more expensive than an SSD. Yet the Intel Optane 800P is hardly just another storage drive. Computing on the bleeding edge will cost you.

For more links search for:
Intel 800P Optane SSD


I chuckle to myself when I read about how expensive SSDs are. I paid $500 for my first HDD in 1986. It was a 20MB Seagate ST-225 which WORKED out to $25 per MB. I don't consider $1.69 per GB particularly expensive although it is CERTAINLY more expensive than other forms of storage. Perspective...I remember most of that stuff!
1667.

Solve : Very Bad News for Facebook and its susers.?

Answer»

Read this report from CNBC:

▐ CNBC's Jim Cramer says the negative Facebook headlines make Wall Street "sick" of the tech stock.
▐ There is some sentiment among investors that Facebook is "the worst of the FAANGs," Cramer adds.

Cramer's trust recently sold some Facebook stock: People are 'sick' of the bad headlines

Any comment? I don't actually see anything special in it, just a regular stock trading chatter...The mass media is giving Facebook a lot of coverage. Most of it is very negative. It is,to say the least, scandalous in a big way. Read this:
Everything that's going wrong for Facebook right now
Some quotes:
1. Federal probe
The Federal Trade Commission has dinged Facebook in the past for being deceptive about users' privacy. The 2012 settlement was essentially a promise by Facebook to do better.
....
2. Four state attorneys general investigate

Massachusetts Attorney General Maura Healey announced she was launching an investigation into Facebook and Cambridge Analytica the same day the story was reported.
...
3. 37 AGs demand answers

Attorneys General from 37 states have written to CEO Mark Zuckerberg asking for detailed information on Facebook's privacy practices. Likely some of them are considering launching formal investigations as well.
End of quotes.
The above CBS report has more text and video.
Also, the link above has a graphic about the stock drop. This is not about some small company going down. This is about a huge company that is a major part of current trends. Graphic attached.

[attachment deleted by admin to conserve space]Well, to be honest, Facebook really does intrude a lot on privacy. I've been using Facebook for around 8 years or so, but recently they've been making "friend suggestions" of people who are within my neighborhood and also any friend of a person who logged into my computer. I assume that these people will also be getting the same suggestions as I am. Even people I see on the bus while going to work is getting suggested.

I'm not big on privacy, but that's just plain creepy. I've deactivated ever since then. The news media are now really tearing into Facebook.
Washington Post:
https://www.washingtonpost.com/news/the-switch/wp/2018/04/10/mark-zuckerberg-facebook-hearing-congress-testimony/?noredirect=on&utm_term=.81e70f9340cc
Wired:
https://www.wired.com/story/mark-zuckerberg-congress-facebook-troubles/
Fox News:
http://www.foxnews.com/opinion/2018/04/10/facebooks-zuckerberg-is-sorry-about-your-data-now-heres-how-to-protect-it.html

He lost a lot of money:
http://time.com/money/5233537/mark-zuckerberg-net-worth-cambridge-analytica-facebook/
Quote

Mark Zuckerberg’s net worth is down a whopping $15 billion from its recent peak, according to Bloomberg. Could congressional testimony put him even further in the red?
He is sorry.
Mark Zuckerburg has given a strong performance in his appearances before Congressional committees and Facebook's stock was strongly upward in the market yesterday and again today. So, too early to make any judgement about the future of Facebook. It's very doubtful that it will completely crash because people will still use Facebook despite this news, in fact, the common people won't really care until someone that matters to them GOES ahead and speaks out about it. Otherwise, they just see the government attacking another company.pamela2,
The accusations are, arguably, the most scandalous ever.
Some have even gone so far as to implicate Facebook in some kind of international conspiracy to influence the USA presidential election of Donald Trump.

The mass media now have this story going around:
https://www.usatoday.com/story/news/politics/2018/04/20/democratic-party-sues-russia-trump-campaign-and-wikileaks-alleging-conspiracy-influence-2016-electio/536032002/

The above link does NOT even mention Facebook. Which is odd.Earlier stories mentioned Facebook as part of the plot.

Here is a earlier story that includes Facebook:
https://www.wired.com/story/facebook-does-not-know-how-many-followers-russian-trolls-had-on-instagram/
Quote
For more than a year, Jonathan Albright has served as something of a one-man General Accounting Office for the tech industry. The researcher at Columbia University's Tow Center for Digital Journalism has dug into the details on how political Twitter trolls manipulate the media, and UNEARTHED an intricate web of conspiracy theory videos on YouTube.
And..
Quote
Facebook told Congress last fall that it had deleted 170 Instagram accounts linked to the IRA. Albright found 27 of the accounts, confirming they were Agency accounts by cross-referencing against Congressional exhibits or media mentions. He downloaded data on those sites in October using a social media analytics SITE called SocialBlade and found they had nearly 2.2 million followers combined.

It might get worse.
Or maybe it will pass. Hard to say.
Who has the most money?
1669.

Solve : ZTE shuts down main operations . USA investing.?

Answer»

Quote

ZTE was accused of dodging United States sanctions on Iran in 2016, by selling technology from the U.S. to Iran through multiple shell COMPANIES. The US Department of Commerce threatened to cut off ZTE from all its supply chain partners in the United States, which ZTE avoided by paying nearly a billion dollars in fines.
Why is the Computer News? Many ZTE products are in Cell Phone and Wireless technology, which is part of the Personal Computer industry. If ZTE can no longer do can business with the USA, users with ZTE smart phones might not have support
Here is the story:
https://www.androidpolice.com/2018/05/09/zte-shuts-main-operations-talks-u-s-continue/
Many US companies use ZTE products for Internet service to subscribers.
AT&T, T-Mobile, Verizon Wireless and others offer ZTE products.
In view of recent developments in the world, ZTE may lose their USA market.
If that happens, many users will find there is not direct support for any ZTE devices needed for Internet access.
Quote
The ban is a massive blow to ZTE, as it blocks the company from its supply chains in the United States. The company can't use Qualcomm processors, modems from Intel, and other components. Google is still trying to figure out if ZTE can legally keep its Google Play license.
BTW, the Snapdragon CPU is used by ZTE.It doesn't matter...they are cryin the blues because they potentially have lost access to the US market because of security concerns and now are feelin the pinch...

It's their own fault...and well deserved.Patio,
I agree. The Billion Dollar FINE and the market loss is the price they pay for trying to dodge an agreement they had made.
Meanwhile, users who already bought ZTE smartphones might find there is no longer official factory service for the devices. However, repair kits are available.This is more about android cell phones than computers....that being said, it seems the orange hair man has as usual changed his mind again.......ZTE lives!!!!


https://www.cnbc.com/2018/05/16/trump-says-his-actions-on-chinas-zte-relate-to-the-larger-trade-deal.htmlWho's the "orange hair man" ? ?The one and only POTUS........Trump!!!!This brings up some political questions.
For an idea of what this means, NPR did a report that trys ts outline the issues without taking a political position.

Trump, China And ZTE

May 17, 2018. Heard on Morning Edition
Quote
President Trump says his effort to help Chinese telecommunications company ZTE is only part of a "larger trade deal." NPR's Rachel Martin talks with Robert Daly of the Wilson Center.
...
Quote
MARTIN: So both COUNTRIES here, the U.S. and China, have been threatening each other with tariffs, something neither really wants to happen. The Trump administration also wants to lower the trade deficit with China. That's the overall goal. What does China want out of these talks at this moment?

DALY: At this moment, China wants to, from its point of view, cease the ABUSE and the threats from the United States and return to business as usual, if possible. China didn't begin this latest round of what Scott Horsley earlier called a trade skirmish, not a trade war yet.
1670.

Solve : South Korea stops working late?

Answer»

Full tittle is:
South Korea to shut off computers to stop people WORKING late

BBC News


The programme will begin on 30 March, with all computers switched off by 20:00.
The second PHASE starts in April, with employees having their computers turned off by 19:30 on the second and fourth Friday that month.
Quote

The government in South Korea's capital is introducing a new initiative to force its employees to leave work on time - by powering down all their computers at 20:00 on Fridays.
They call 8 PM on Friday "working late"? Where I work, we call 4:30 PM on Friday working late. We have flexible hours. My contracted hours are 37 a week. At the end of each 4 week period I can be up to 14 hours in credit or debit. The office is open 7:30 AM to 6:45 PM. Core time (when you must be there) is 10 AM to 12 noon, and 2 PM to 3:30 PM. If I get to work at 7:30 AM and take half an hour for lunch I can go HOME at 3:30 PM and still make up time, at the rate of 6 minutes per day. Our PCs have a thing CALLED "Night Watchman" that logs you off at 7 PM, but site security would turf you out at 6:45 PM anyhow. When I have 7 hours 24 minutes surplus time, I can have a day off. Or "borrow" that time, thus not touching my annual leave allowance.Can see it now... you go to hospital at 7:59pm for help and it hits 8pm. They SAY sorry come back in the morning and leave for the day. Obviously there has to be exceptions to this. Quote from: DaveLembke on March 24, 2018, 09:26:29 AM
Obviously there has to be exceptions to this.

Hospitals tend to run their emergency rooms 24/7/365 in most countries. The article is talking about daytime office workers in government offices, such as tax, etc. But you knew that.



1671.

Solve : News about Malware In Your Router?

Answer» This story is on mass-media.
New York Times:
https://www.nytimes.com/2018/05/27/technology/router-fbi-reboot-malware.html
ABC News:
http://abc7chicago.com/technology/video-how-to-reboot-your-router-to-avoid-malware/3532671/
CBS News:
http://newyork.cbslocal.com/2018/05/28/fbi-russian-malware-infects-routers-warning/
Actually, this threat has been known for some time. Yeah, it’s one of those media stories that does the rounds every few months.
Somehow it gets a bit of traction and, pow, it’s ‘the latest thing’.Mark, tha is how we know summer is near.
- When the mass-media repeats old stories.
This time they say the news comes from the FBI.

FBI Says You Should Reboot Your Routers And NAS Devices
Copy the above into your favorite search engine. So, simply rebooting is SUPPOSED to be a solution to this problem? I find that hard to believe, since the router would have been booted before it could be used when new.

On the plus side regarding the articles, the recommendation to update firmware, if available, and change the default password is sound advice. Those default passwords are usually practically worthless in providing any security. Quote from: soybean on May 29, 2018, 10:48:42 AM
...
Those default passwords are usually practically worthless in providing any security.

Here is the default for the router I just received from Comcast:
User: admin
Password: password
Both are case sensitive.
I am not GOING to change them; anything else is too hard to remember.



Quote from: Geek-9pm on May 29, 2018, 12:40:58 PM
Here is the default for the router I just received from Comcast:
User: admin
Password: password
Both are case sensitive.
I am not going to change them; anything else is too hard to remember.
Well, if you can't even devise some method of keeping record of a few passwords, then you deserve any consequences that MIGHT befall you. Surely, you could buy a simple spiral notepad and write some usernames and passwords in it. Quote from: Geek-9pm on May 29, 2018, 12:40:58 PM
I am not going to change them; anything else is too hard to remember.
Oh Geek!that is just laziness and exactly the mindset these idiots rely on to get their foot in your (digital) door.
change all your default passwords now - it's dead easy and is your first LINE of defence.it doesn't have to be anything long or hard to remember, it can even simply be your last name, or house phone number for example.you aren't trying to stop a direct, dedicated attack, you just want to change the default password so every Tom, *censored* and Harry with "let's SEE who's out there?" on their minds can't get into your modem/router and flog your wifi password.
Mark, I will take your advice.
I will use passwords I can remember.
1672.

Solve : IRS Computer Crash Delays Deadline.?

Answer»

Here is the STORY:
IRS Extends Tax Filing for One Day After Computer Problems
Questions:
Why Now?
Has this happened before?
Who is to blame?
Quote

The INTERNAL Revenue SERVICE blamed the problem on a hardware error, and the glitch exposed the information-technology challenges that agency officials have been warning about for years. The systems were back up and running late Tuesday.
The story from The New York Times says it was a computer crash, not a glitch. And NYT also says a warning was GIVEN back in October about the poor state of the IRS computer software and hardware.

Aug 3, 2017 - During fiscal year 2014, the IRS collected almost $3.1 trillion in federal revenue and processed almost 240 million returns.
One would think with that kind of money they would INVEST in better stuff.
1673.

Solve : Windows 10 growth rate up.?

Answer»

But not by much.
Computerworld made some comments about this on March 2, 2018..
Here is the link:
https://www.computerworld.com/article/3199373/windows-pcs/windows-by-the-numbers-windows-10-shows-signs-of-enterprise-upgrading.html
Title:
Windows by the numbers: Windows 10 shows signs of enterprise upgrading
Graphic:


Any comment?



nearly 4% growth rate is great.
if my savings account and super could do that, I'd be a happy man. Mark, you are right on!
Apple revealed that there are now nearly 100 million active Mac users
Windows 10 is now four times as popular as the MAC
Of course, Apple sells mostly hardware, Microsoft sells mostly software. But in the end, Microsoft is doing very well ans Apple has to catch up.

Consider:
400 million machines are now running Windows 10

Not counting all the other windows versions...
- just the ones called Windows 10.
A 3 % growth means 12 million copies of Windows 10 is sold every YEAR, if they keep up that 3% growth. The cost of distributing the software is very small when compared to hardware. Now if MS gets $30 for every copy sold to OEM, it is a lot of cash for a product that can be distributed for NEAR zero cost.

Do the math.

Here is another reference:
https://www.theverge.com/2016/9/26/13057980/microsoft-windows-10-400-million-devices
That is not news, it is two years old. So by now there could be 410million.
The windows phone is near dead, yet there are many other devices doing Windows 10. Every copy represents more cash into Microsoft.

Microsoft expects to hit its 1 billion devices target for Windows 10.
Soon. Quote

Windows 10 is now four times as popular as the MAC

Windows 10 is four times as popular as the Media Access Control?

Or do you mean Mac?

In any case Microsoft probably got a big boost using their rather unethical funneling upgrade tactics which used intentionally poor designs to "trick" users into upgrading, like having the X button on a window act as confirm.Quote from: BC_Programmer on March 31, 2018, 01:51:46 AM
Windows 10 is four times as popular as the Media Access Control?
Or do you mean Mac?
In any case Microsoft probably got a big boost using their rather unethical funneling upgrade tactics which used intentionally poor designs to "trick" users into upgrading, like having the X button on a window act as confirm.
I was referring the Apple product.
Windows 10 is now, and was, the most dominant OS for desktops
A reference from January this year:
https://www.windowslatest.com/2018/01/08/netmarketshare-windows-remains-dominant-os-apple-continues-gain-pc-market-share/
The above appears to SHOW that all Windows versions are more than 11 times the Apple OS versions.
Always has been...whats the point ? ?

The section is after all called news.Well, this discussion seems to imply that Mac is the main competitor of Windows. But, a (relatively) new kid on the block seems to be garnering more attention: Chromebook shipments surge by 38 percent, cutting into Windows 10 PCsSome would argue that the real news is in the mobile market, not the desktop.
Here is a recent report that calls Android the out in front runner.
https://techcrunch.com/2018/03/08/android-beats-ios-in-smartphone-loyalty-study-finds/
Android beats iOS in smartphone loyalty, study finds

But look closer. The data is already old by now. And that report does not really show what people are using, just something about loyalty, whatever that means.



1674.

Solve : Details Leak on PC-Focused Snapdragon 1000?

Answer»

This is from Extreme Tech site. They claim it is real news. Look at this:
https://www.extremetech.com/mobile/272186-new-details-leak-on-pc-focused-snapdragon-1000
What I LIKE is the image of a Toucan on the mystery laptop.

Looks just like me!
Here is a quote:
Quote

Increasing the TDP RANGE on the ARM chips MAY not help bring them into competitive standing with x86 as such — there’s no way that simply allowing for a slightly higher TDP range will lift the impact of emulation altogether. But allowing the CPUs to burst to higher frequencies would absolutely give the ARM chips better performance in their own right, and that’ll become more important as ARM and Qualcomm try to establish themselves as contenders in new markets rather than struggling for the Chromebook (or Chromebook-equivalent) space.
The TDP here means:
The thermal design power (TDP), sometimes called thermal design point, is the maximum amount of heat generated by a computer chip or component (often the CPU or GPU) that the cooling system in a computer is designed to dissipate under any workload.
So, a better battery life for a better Smart Phone? In summation...YES...that's what they are claiming.

Till it rolls out into production we won't know.Read about this the other day through a geek app that I have on my smartphone that had some info on it, but as to if I would get one, it all comes down to features, storage capacity, (quality) brand name that will use this processor, and price. *If brand name is cheap, I then will look at user reviews to see if its a lemon or not and avoid if reviews are bad, but buy if reviews are like 4 stars or better of 5 and the issues found are just inexperienced people complaining about features they thought something had but didn't come with or other dumb reviews that ruin a better rating. But if real problems exist I will avoid products VS taking a gamble usually.

I currently have a NuVision Windows 10 tablet that I got for $68 on sale that can run Windows apps and programs I create in C++. I also got a Bluetooth keyboard for it and so I can use it like a PC, however at times I miss my mouse because I have to touch the screen to navigate. https://www.amazon.com/Performance-Touchscreen-Quad-Core-Processor-10-Silver/dp/B01N2USU5A/ref=sr_1_4?ie=UTF8&qid=1529966875&sr=8-4&keywords=nuvision+windows+10+tablet

One feature I wish my tablet had was a HDMI or other video output available to connect to a larger display, but for $68 I wont complain about that.. Only other issue is that the 32GB internal storage isn't big enough for Windows 10 updates, so its running an older version of Windows 10. So I don't use it for anything confidential like banking or online purchases. At some point I will see if I can create a symbolic link to the MicroSD Card and make for a space for the update to download to, to then be installed to the 32GB internal storage, but I also don't want to brick it, so I might just leave it be and run it as is version locked in the older Windows 10 that it came with from factory.Quote from: DaveLembke on June 25, 2018, 04:56:12 PM
I also got a Bluetooth keyboard for it and so I can use it like a PC, however at times I miss my mouse because I have to touch the screen to navigate.
What about a Bluetooth mouse? I have one to use with my tablet computer.
1675.

Solve : AT&T merge to hurt Amazon, Netflix?

Answer»

You already know about the AT&T merge with Time-Warner.
Who will get hurt? Look here:

AT&T Merger Could Threaten Netflix, Amazon

Quote

June 13, 2018 10:02 AM
AT&T, once it completes its ACQUISITION of Time Warner, will launch a free 'skinny' bundle called AT&T WATCH for all its wireless subscribers, putting the newly created company in direct competition with internet streaming companies. "That is going to be a really disruptive move by AT&T," says Rich Greenfield, analyst at BTIG. (Credit: CHEDDAR)
Really? FASCINATING...yawn...
1676.

Solve : News about Intel And Microsoft New Security?

Answer»

The above title is from Google for THINGS Intel and MICROSOFT have done recently.
Here are the relevant items:
https://redmondmag.com/articles/2018/05/22/new-speculative-execution-patches-coming.aspx
And:
https://www.zacks.com/stock/news/304696/intel-google-amp-microsoft-discover-new-lowrisk-chip-flaws
Even Your Tube:
https://www.bing.com/videos/search?q=Inteland+Microsft+new+secujrity&view=detail&mid=7BE96DF84D02B4B66C9F7BE96DF84D02B4B66C9F&FORM=VIRE
The threats are not new.What is new is the Intel and others are now saying users must replace any old CPU.

This is what some Cyber Scientists had quietly said earlier. The news here is when Microsoft Intel and others are now coming out and saying i tout loud.

What this means to you? Wait before you buy a new computer or phone, if you worry about security. Soon all consumer IoT ** device swill have to have 'Safe CPU' to hold off the virus attacks.

** IoT = Internet of Things. This will include yurt coffee port if it has Internet. The Speculative execution BUGS are ways that processes can inspect data in other processes memory. It does require being able to run machine code- I've seen claims that it can be exploited directly via javascript in a browser, for example, but that's inconsistent with the information about the exploit(s). If there is a browser exploit that allows arbitrary code execution, then it may be possible to use the exploit to gather information on the system. This was reported earlier this yer, but only now have Intel and Microsoft went into more depth about what is coming. Namely, new chip designs. No a fix or patch, a major design change. The design flaw is found in ARM, AMD and Intel chips.

The design flaw goes back years, maybe before 1995. {No reference found.}

In January this YEAR CBS News did a study that covered the major points. The story was also done by NBC. Local TV stations also did reports.
Here is how you can find the early reports on You Tube.
Search on Bing for:
Tech firms rush to fix chip flaw.
Find TV reports from back in January of this year.

1677.

Solve : Galaxy to make foldable phone soon.?

Answer» Not a flip fome. A Fold Fone.
Tech radar says that GALAXY will do it next year.
https://www.techradar.com/news/samsungs-foldable-galaxy-x-smartphone-could-launch-in-early-2019
Here is the concept:

The flexible display allows you to fold the phone.
This was first announced last year.
The full story is in the Wall Street Journal.
https://www.wsj.com/articles/samsung-plans-to-launch-foldable-screen-phone-early-next-year-1531910967
Will you get one?
$1,500 yikes! Ever since Apple broke the $1000 smartphone barrier with the IPHONE 10, it seems manufactures are getting bolder in the consumer market. Samsung will really be testing the flexibility of the market with a phone at that price. Don't get me wrong, I love the innovation since this ACTUALLY looks like the first leap forward technologically since the capacitive touch screen, but dang!

I'll put it to you this way: would you walk around with $1,500 in your POCKET? But instead of paper money, the $1,500 is made of aluminum and glass. But... APPARENTLY consumers are willing to carry $1000 with the iPhone 10. People will buy anything that gives them status or the 'cool' factor.EndOfForever,
Thanks for your reply.
If, and I do mean if, they really can do this and mass-produce it, someday you can roll up you cell phone and shove it into the top of your socks. And a roll-up phone may cost less than the designer tennis shoes your wear.

Then next they have to make it weatherproof because ....
1678.

Solve : USA will blame N. Korea for cyber attacks.?

Answer»

The full title is:
U.S. set to charge North Korean spy with Sony hack and WannaCry cyberattack
Here is one of many links:
https://www.digitaltrends.com/computing/justice-department-charge-north-korean-spy-for-sony-and-wannacry-cyberattacks/?utm_source=sendgrid&utm_medium=email&utm_campaign=daily-brief
Quote

The United States Department of Justice is set to indict a North Korean spy connected to the 2014 cyberattack on Sony Pictures Entertainment and the 2017 WannaCry malware that crippled the Britain’s National Health Service. The indictment alleges that Pak Jin-hyok conducted the attack under orders from the Democratic People’s Republic of Korea’s Reconnaissance General Bureau, the country’s intelligence agency that’s seen as North Korea’s version of the CIA.
The implications are wide.
...(deleted)...This is computer news how exactly?It is a new development about something that happened some time ago.
Here is another link:
https://abcnews.go.com/US/doj-announce-charges-north-koreans-sony-hack-wannacry/story?id=57643239

Should I have posted this in 'other'?
As to how it would AFFECT our current computer environment... you ha veto use your imagination. Think about a possible recall o fall smartphones made by one overseas company. That would depend on how far the investigation goes.
The U.S, United Kingdom, and Australia all declared officially that North Korea was responsible for the Wannacry Worm last December.

Though, that was shortly after a Russian hacker Claimed the FSB was responsible.

Quote
Think about a possible recall o fall smartphones made by one overseas company.

Maybe you could explain why a *South* Korean company would issue a recall of smartphones because the U.S points a finger at North Korea for cyberattacks?

Maybe you are out of the LOOP but North and South Korea haven't really gotten along very well PRETTY much since they were split apart after World War II. We aren't talking about a history like North and South Dakota here.Quote from: BC_Programmer on SEPTEMBER 07, 2018, 12:44:20 PM
Maybe you are out of the loop but North and South Korea haven't really gotten along very well pretty much since they were split apart after World War II.
Little spat around 1950-1953 perhaps? A British Army regiment local to me lost a lot of men there, and the commanding officer, Lieutenant-Colonel James Carne, was awarded the Victoria Cross for his bravery under fire. He was later captured by the North Koreans and, so it is alleged, subjected to "brainwashing" by them.

"On 22/23 April 1951 near the Imjin River, Korea, Lieutenant Colonel Carne's battalion was heavily and incessantly engaged by vastly superior numbers of the enemy. Throughout this time Colonel Carne moved among the whole battalion under very heavy mortar and machine-gun fire, inspiring the utmost confidence and the will to resist among his troops. On two separate occasions, armed with rifle and grenades, he personally led assault parties which drove back the enemy and saved important situations. His courage, coolness and leadership was felt not only in his own battalion but throughout the whole brigade."

Carne also was awarded the (American) Distinguished Service Cross by the President of the United States for gallant and distinguished services during operations by the United Nations in Korea.




1679.

Solve : Microsft Releases Sticky Notes 3.0?

Answer»

This was FOUND this in a search:
https://www.msn.com/en-us/news/msn/best-new-features-in-windows-10s-sticky-notes-30/ar-BBMZV7n
The ARTICLE CLAIMS a significant improvement worthy of mention as a TRULY new feature in Windows 10.



Some other sites also say Sticky 3 is a remarkable improvement.

Do you agree?
Is this news for you?

Other links like the above:
https://liliputing.com/2018/09/microsoft-is-bringing-new-note-taking-features-to-windows-10.html
https://www.thurrott.com/windows/windows-10/168695/sticky-notes-3-for-windows-10-launches-with-syncing-dark-theme-more

This is about the April update, also know as 1803 build date.

1680.

Solve : New reports about Chinese Hacker attacks?

Answer»

Some REPORTS about Chinese Hacker attacks are old news.
https://en.wikipedia.org/wiki/Cyberwarfare_by_China
But yesterday came a scary report was GIVEN about how they they have penetrated.

Some LINKS:
https://www.zdnet.com/article/us-charges-two-chinese-nationals-for-hacking-cloud-providers-nasa-the-us-navy/

https://www.nydailynews.com/news/world/ny-news-china-spies-marriott-cyberattack-20181212-story.html

https://www.nbcnews.com/news/china/two-chinese-nationals-charged-hacking-u-s-government-military-n950346
Quote

Two Chinese nationals — one nicknamed "Godkiller" — were charged with participating in a MASSIVE hacking campaign that targeted the U.S. government and military, including NASA and the Navy, the Justice Department said Thursday.

The original source was not apparent to me. I first heard it on TV.
Do you know the source? Is it really something new?Nope...the national security hacks have been ongoing for years ...including the NASA hack,
1681.

Solve : News You missed; Microsoft liberates ancient MS-DOS .?

Answer»

This is from October 2018.

Microsoft liberates ancient MS-DOS source from the museum...

As Microsoft gears up to unleash the Windows 10 October 2018 Update, Rich Turner, guardian of the command line at Redmond, took a moment to remind us of simpler, MS-DOS-based times.
After original author Tim Paterson found the source for MS-DOS 1.25 (along with a six-inch stack of assembly print-outs), Microsoft handed the code for 1.25 and 2.0 to the Computer History Museum back in 2014.
Nice to know.
And it is available elsewhere as a ISO for a bookable CD!
https://superuser.com/questions/1230464/how-do-i-create-a-custom-bootable-ms-dos-iso-image.
In the link above the user had some issue with it.
But it works for me.
Microsoft ain't crazy, they are releasing something obsolete. Even MS-DOS 2.0 is limited compared to later versions. Support up to 16 MB or 32 MB FAT12 formatted hard disk drives depending on the formatting tool shipped by OEMs, and 5.25-inch, 180 KB and 360 KB floppy disks. Version 3.30 was the first version I ever used. Supports 3.5-inch, 1.44 MB floppy drives and diskettes, extended and logical partitions. I had an Epson Equity II PC-XT clone with a 40 MB hard drive and a CGA adapter. I later got a Hercules card and a compatible monitor in exchange for a moped that didn't run. Happy days. I then pirated MS-DOS 6.22 from a friend's machine by copying everything ONTO a stack of floppies over about a week.This first link I gave mentions GitHub.
Here is some info about GitHub mad why it matters to software developers.
https://www.economist.com/the-economist-explains/2018/06/18/what-is-github
Published in The Economist , Jun 18th 201.
Quote

STEVE BALLMER, Microsoft’s former chief executive, became an internet meme when he gave a speech to employees in which he bounced across the stage shouting “developers” over a dozen times. While much has changed since Mr Ballmer’s chant, developers remain central to Microsoft’s strategy. Earlier this month his successor, Satya Nadella, announced that Microsoft would acquire GitHub, a platform for hosting software code—especially “open-source” projects—for $7.5bn. Developers took to the internet in outrage, predicting a slow death for the service. Many non-coders, meanwhile, were left wondering what all the fuss was about. What is GitHub, and why do developers care so much about it?

GitHub is designed around Git, a system for tracking changes in software code. Git was originally created by Linus Torvalds, a Finnish-American software engineer, to track changes in Linux, an open-source rival to Windows that he designed. Unlike the previous generation of version-control software, Git was designed to track software written by a large, disparate group, rather than by a managed team at a software company. It allows multiple developers to work on the same code in different places, and to integrate their changes later. But WHEREAS Git makes such collaboration possible, it hardly makes it easy. To work out just what another developer has changed requires users to enter ARCANE directives at a command prompt and scroll through pages of text
Finding full documentation for older MS-DOS version is still a challenge. Quote from: Salmon Trout on December 21, 2018, 02:48:13 PM
I later got a Hercules card and a compatible monitor in exchange for a moped that didn't run.

The moped was brought back to life and still runs. 25 years later. Can't say the same for the PC. Very Cool Salmon.

My first PC was my friend and me riding our bicycles around and we cut through a businesses parking lot as a shortcut to a store to buy candy and we spotted computers stacked by a dumpster in the summer of 1984. We went over and was checking it out and the guy that worked there saw us looking through it all. I was 9 then, and the guy said are you kids looking to trash pick a computer. I said if allowed to I would love to have one. The guy helped us pick out the parts we needed to assemble them back home. We made about 6 trips riding our bikes 6 city blocks back home to drop off the computer pieces straddled between our legs on our bikes. The guy gave us cassettes and some floppies and books as well for them. The 30 or so computers they were throwing away were Tandy TRS-80 Model 1 computers with 16k RAM expansion modules connected to the keyboard which was the computer with its 4k RAM and memory expansion through ribbon cables to a silver box that was like a BOOM box on its side that the monitor sat on top of.

That was my first experience to my own computer. Tandy's DOS was different than Microsofts. My first exposure to MS-DOS was version 2.11 with GW-Basic at school in 1985. Teacher heard about me self teaching myself BASIC and so I was then exposed to the 8088 computer that the school had and GW-Basic to program on in my free time and after school.Brilliant story...Thanx for sharing...
1682.

Solve : Windows 10's April 2019 Update should...?

Answer»

Windows 10's April 2019 Update should....
(Note to moderator. This may qualify as FAKE news, which is the new standard.)
PCWoeld and others say the up going Windows spring update will be alright.
Some links:
https://www.pcworld.com/article/3336062/windows/windows-10-next-update-is-april-2019-update.html

https://www.digitaltrends.com/computing/upcoming-version-of-windows-10-could-be-called-april-2019-update/

https://www.webnews.it/2019/01/25/windows-10-19h1-windows-10-april-2019-update/
That last ones says:
Microsoft, sino ad ora, non si è MAI sbilanciata sul nome finale che darà a questo update. In realtà è da un po’ di tempo che il gigante del software non presta più attenzione a questi dettagli che una volta venivano annunciati per tempo. Tuttavia, grazie all’ultima versione di Microsoft Powershell è stato possibile scoprire in via ufficiosa il nome di questo aggiornamento. A meno di ripensamenti, Windows 10 19H1 si dovrebbe chiamare Windows 10 April 2019 Update. La denominazione che il gigante del software avrebbe scelto non dimostra particolare fantasia. Tuttavia il nome segue la LINEA presa da Microsoft nel corso del 2018.

Translation=
Microsoft, until now, has never biased on the final name that will give this update. In fact, it's been a while since the software giant has paid more attention to these details that were once announced in good time. However, thanks to the latest version of Microsoft Powershell, the name of this update was unofficially discovered. Unless you change your mind, Windows 10 19H1 should call Windows 10 April 2019 Update. The name that the software giant would have chosen does not show any particular fantasy. However, the name follows the line taken by Microsoft during 2018.
Would you say that? It's more a case of non-news.

Regardless of what they call it, There are two things that have prevented me from bothering to update my main desktop past 1803 so far:

1. There is no clear reason to

2. There is a clear reason not to.

Without 2 I'd probably still go ahead. But, 2- and it's arguably a niggle, but for some reason every time I see it on my laptop I get (unreasonably) and inexplicably irritated. in the October Update, they changed Start->SEARCH so that instead of merely presenting results, it now also has a IMO worthless right-side pane:



It's worthless to me because it's literally the options presented when you right click that result. It's wasted space. I can kind of see *why* they added it because perhaps a more average user might not be aware of the options found in right-click, but to me it's a huge amount of wasted space- IMO it should be something that could be disabled if you don't want it, but it's effectively hard-coded into Start->Search in 1809 as far as I can find.

For comparison, This is what the same search looks like in 1803:



The issue with Windows is that it's a rolling release. If you've dabbled in Linux for any lenght of time, you'll know that it's best not to run a rolling release bur, rather, a long term stable OS, on any production / mission-critical machine. Rolling releases may be good for general consumption computers (and in the case of Linux they might require manual intervention, so are mostly recommended to enthusiasts, even though distros like Solus execute the rolling release model for all customers well), but they are bound to have some stability issues and random things happening overtime. There is only so much time to put into testing UPDATES in that case.

...And the fact that keeping Windows a rolling release is a dumb idea has proven time and time and time again.

Please, Microsoft, open your LTS branch to everybody. Windows 10 being a rolling release forced me to outsource my more critical work to the LTS branch of Ubuntu, because I simply cannot afford a software update (that is, by the way, forced on me) to get on the bleeding edge Windows to delete all my files.

1683.

Solve : Infecting Firefox Add-ons With Malware?

Answer»

Firefox is easily extended via add-ons. And the way extensions work makes it relatively easy for bad guys to inject malware that would be difficult to detect and remove.
The problem is basically two-fold. First, Firefox extensions have access to raw unencrypted data streams. Second, extensions are typically based on a set of files that include XML and Javascript.

An attacker could inject malware into an existing legitimate extension (e.g. one that is already installed on your systems) by modifying the extension's XML file(s) to include additional Javascript code.

So for example, any data (INCLUDING keystrokes, form data, history, etc) could then be harvested directly from the browser and/or its network traffic and sent to a third-party offsite server. Ouch!

For a better understanding of this potential problem read about FFSpy. And to learn about why the extension subsystem in Firefox is fundamentally flawed read what Ralas Los has to say about this situation.

Now think about this for a moment. What if someone infects a popular add-on like NoScript, FlashBlock, GreaseMonkey, WebDeveloper, or Firebug? What tools do you have to find that infection and eradicate it?

http://myf00.net/?p=18

http://preachsecurity.blogspot.com/2009/05/pwning-firefox-via-extension-jacking.html

I'd imagine something like this based off the first example they gave with the external .js file could be found using most malware tools since the .js file would likely be a unique name that could be easily SEARCHED for. If not, I'd imagine most protection programs could analyze the code since it's the files are in plaintext and look for anything suspicious.

However, it still definately could be an issue, something that could potentially even affect the Mac users who still believe they can't be infected. Which is why it'd probably be best to just rely off of add-ons directly through mozilla and not third-party sites.

Firefox has become a bigger target over the last 6 months or so.

The overlay.xul is one target. This one has to be manually deleted.

Quote

C:/Program Files/Mozilla/Firefox/extentions/{xxxxxxxxxx}/chrome/content/overlay.xul

Note: {xxxxxxxxxx} represents random letters and NUMBERS. The exact letters and numbers vary from one computer to another.

And then a redirector found in the extensions. This one can be fixed with a tool called GooredFix (Google Redirect FIX) Using GooRedFix to fix FireFox browser redirection problems.

Quote
Example, they are all different.

[HKEY_LOCAL_MACHINE\SOFTWARE\Mozilla\Firefox\extensions]
"{609E0751-889D-402A-B225-DBA0ACE20764}"="C:\Documents and Settings\xxxx\Local Settings\Application Data\{609E0751-889D-402A-B225-DBA0ACE20764}"
Quote from: evilfantasy on May 27, 2009, 02:46:13 PM
Firefox has become a bigger target over the last 6 months or so.

The overlay.xul is one target. This one has to be manually deleted.

And then a redirector found in the extensions. This one can be fixed with a tool called GooredFix (Google Redirect Fix) Using GooRedFix to fix FireFox browser redirection problems.


Is the "overlay.xul" shown in hijackthis log reports? If so, you think it'd be advisable for me to add this to the CH process tool to check for?Unfortunately no it isn't.

That is one of those that, after you have pulled all of your hair out, someone comes ALONG and says "hey, check this out" lol.

Broni tipped me off to that one. No scanner can seem to find it because the file path is always random and the overlay.xul is a legitimate file.

Original 4 page conversation at the Mozillazine forums. "clickfeedmanager.com" virus targets FirefoxHmm that's too bad, well hopefully maybe something the next version of HijackThis may have.
1684.

Solve : Windows netbooks may harbor malware - what's next??

Answer» http://news.idg.no/cw/art.cfm?id=58E2CC84-1A64-67EA-E459AE31EA733AAE



After discovering attack code on a brand new Windows XP netbook, antivirus vendor Kaspersky Labs warned users yesterday that they should scan virgin systems for malware before connecting them to the Internet.

When Kaspersky developers INSTALLED their recently-released Security for Ultra Portables on an M&A Companion Touch netbook purchased for testing, "they thought something strange was going on," said Roel Schouwenberg, a senior antivirus researcher with the Moscow-based firm. Schouwenberg scanned the machine -- a $499 netbook designed for the school market -- and found three pieces of malware.

"This was done at the factory," said Schouwenberg. "It was completely brand new, still in its packaging."

With a little more digging, Schouwenberg found multiple Windows system restore points, typically an indication that the machine had been updated with new drivers or software had been installed before it left the factory. One of the restore points, stamped with a February date, included the malware, indicating that it had been put on the machine before then. And the malware itself hinted how the netbook had been infected.

"In February, the manufacturer was busy installing some drivers for an Intel product in the netbook," said Schouwenberg, citing the restore point. Among the three pieces of malware was a variant of the AutoRun worm, which spreads via infected USB flash drives.

"The USB stick they used to install the drivers onto the machine was infected, and [it] then infected the machine," said Schouwenberg. Installed along with the worm was a rootkit and a password stealer that harvests log-in CREDENTIALS for online games such as World of Warcraft.

Kaspersky has reported its findings to M&A, said Schouwenberg, but the netbook maker has not been in contact with the security company since then.

Although factory-installed malware is rarely found on consumer electronics, there have been cases. Last December, for example, Amazon.com told customers it had sold Samsung digital photo frames before the holidays that came with a driver installation CD infected with a Trojan DOWNLOADER. "These [cases involving computers] are much rarer than picture frames," said Schouwenberg.

To ensure that a new PC is malware-free, Schouwenberg recommended that before users connect the machine to the Internet, they install security software, update it by retrieving the latest definition file on another computer and transferring that update to the new system, then running a full antivirus scan.

"That's the best course of action, even though it sounds like a lot of work," said Schouwenberg.
It's extremely rare for something like this to happen and with a quote like:

Quote
After discovering attack code on a brand new Windows XP netbook, antivirus vendor Kaspersky Labs warned users yesterday that they should scan virgin systems for malware before connecting them to the Internet.

When Kaspersky developers installed their recently-released Security for Ultra Portables on an M&A Companion Touch netbook purchased for testing, "they thought something strange was going on," said Roel Schouwenberg, a senior antivirus researcher with the Moscow-based firm. Schouwenberg scanned the machine -- a $499 netbook designed for the school market -- and found three pieces of malware.

Sounds more like a FEAR tactic to promote their products than to actually legitimately warn users of real computer threats. Suggesting to scan a virgin system isn't something that would be necessary IMO since it's so rare. Although if the netbooks had no FORM of protection it'd of course be advisable to get some sort of protection.


Kaspersky has stooped to this level in the past....i'm not suprised at all.
1685.

Solve : 40,000 sites hit by PC-pwning hack attack?

Answer»
More than 40,000 websites worldwide have fallen under the spell of a sneaky piece of attack code that silently tries to install malware on the machines of people who visit them, security experts from Websense have warned.

The mass attack has been dubbed Beladen because beladen.net is ONE of the internet domains used to UNLEASH a swarm of exploits that target unpatched vulnerabilities in the Internet Explorer and Firefox browsers and programs such as Apple's QuickTime. It plants highly obfuscated javascript on the BOTTOM of websites that's slightly different each TIME, making it impossible to spot INFECTED sites using search engines.

Link
1686.

Solve : Vista Service Pack 2 Now Ready for Download?

Answer»

Did I say without a hitch?

Just after doing a system restore to undo all the changes SP2 made.
- My USB 3G modem STOPPED working
- Actually, all USB ports stopped working
- Programs would randomly stop responding

So, what's up Microsoft?Call them. It's a free support.Quote from: kpac on May 30, 2009, 04:53:33 AM

Did I say without a hitch?

Just after doing a system restore to undo all the changes SP2 made.
- My USB 3G modem stopped working
- Actually, all USB ports stopped working
- Programs would randomly stop responding

So, what's up Microsoft?

did you uninstall SP2 first? You can do that can't you unless you've deleted all the backup stuff made during SP2 installation.Quote from: 2x3i5x on May 30, 2009, 10:04:59 AM
did you uninstall SP2 first? You can do that can't you unless you've deleted all the backup stuff made during SP2 installation.

Nope. Just did a restore to before the installation.i wonder now, you can undo the system restoration, I'm sure of that so ... SEE if you can't go back to the post-SP2 state before you wanted to go backwards and ee if that won't get it to work, then try uninstalling sp2 this time.But that's the opposite of what I just did.

Obviously something wasn't right, so I undid it, and everything's fine again. The intro to SP2 did say something like this "Microsoft Windows Vista Service Pack 2 will greatly improve hardware compatibility and usability" - well, it did the opposite for me.

Anyway, all service packs do mainly is reinstall all previous updates, as well as a few new ones. All previous updates are installed, so I think I'll be alright.Just after doing a system restore to undo all the changes SP2 made.
- My USB 3G modem stopped working
- Actually, all USB ports stopped working
- Programs would randomly stop responding

So, what's up Microsoft?
[/quote]

The way you typed it here makes me feel that the problems happened when you attempted to get rid of SP2 and that you were OK with SP2 on.Is there any place to buy Vista service pack 2 on disk? It is telling me that it will take over two days to INSTALL this. My top speed is about 46 KBPS.Quote from: I Shooter on June 03, 2009, 04:32:00 PM
Is there any place to buy Vista service pack 2 on disk? It is telling me that it will take over two days to install this. My top speed is about 46 KBPS.

All the checking i did tells me it is not yet available for order on a CD...sorry.
Perhaps have a friend with a faster connection DLoad and burn it for you...
Best of Luck...completely destroyed my friends pc.Quote from: BatchFileBasics on June 03, 2009, 08:00:27 PM
completely destroyed my friends pc.

For everything that's developed, at least one person will have it fail for them.let me guess, the old, "service pack installed gigs of porn" issue. notwithstanding the files created and modified dates are long before when the service pack was installed.

Mother: what are these? sexy blonde.jpg? hmm. must be ... *censored*! BILLY! GET IN HERE!

Billy: What.

Mother: WHAT is this?

Billy: Oh erm... I installed service pack 2, there's a err.... known issue, with it accidentally downloaded thousands upon thousands of innappropriate, high resolution images.

Mother: Well, by golly it's destroyed our PC! there's absolutely no room left! Although I think it's the same amount of room as we had before the service pack, but what do I know!ok smart....but

http://www.google.com/search?hl=en&q=vista+sp2+0xc0000034&btnG=Google+Search&aq=f&oq=&aqi=
there's also

http://www.google.com/search?hl=en&q=Vista+sp1+BSOD&btnG=Search&aq=f&oq=&aqi=Quote
For everything that's developed, at least one person will have it fail for them.
That's very true. Maybe more than one....
I've been trying to fix one computer on some other board, which became not bootable after SP installation attempt, and so far nada. Can't do anything.
It looks like reinstall needed.

Don't forget, that I had a problem on my laptop, until I disables all startups, and non-M$ services.
Never had any update problem before.
1687.

Solve : DDoS Attack Leaves Five Chinese Provinces Without Internet?

Answer»

AhAaaaaa...
So it was DOS after all...... Quote from: patio on June 03, 2009, 05:15:22 PM

AhAaaaaa...
So it was DOS after all......

With its might, fail safe 8/3 Rule! I just can't help observing 1/2 of the comments here are drivel...
Just thought i'd have some fun with it.

OK i'm done.It won't be long before this thread becomes about peanut butter. So before that happens I would like to contribute that there are a number of jams that go wonderfully with peanut butter. The science may not exist to prove why the taste combination of peanuts and smashed berries goes so well together but it appears to be a culinary constant. Now the real question is, while there are a number of different types of jams, going from strawberry, raspberry, blackberries, and any number of combinations with other common drupes, there are some that depend on taste. For example, blueberries. If you don't like blueberries, a blueberry jam and peanut butter sandwich will not be your favourite, regardless of how intense your love for peanut butter is. Also some people who do like blueberries detest the fact that in order to create blueberry jam it is necessary to add synthetic pectin since blueberries don't contain quite enough of their own. But I suppose that depends on their viewpoint on artificial food additives.

Apple jam, on the other hand, while still requiring a proper affection for it's flavour, and while not going with peanut butter quite as well as berries, is one of the highest pectin containing fruits, and thus requires no synthetic pectin.

Bananas, a natural companion with peanut butter, while traditionally SIMPLY served via SLICES on the bread alongside the chosen form of peanut butter, can also be smashed in much the same format as berries to create a gooey yellowish white mass that tastes of bananas and is easily spreadable.


OK. I'm done now too.I roasted a Rainbow Trout ( fresh caught ) on the grill yesterday and stuffed it with 2 sliced bananas ; bread crumbs and a healthy dollop of peanut butter smeared inside...

My strategy worked...i got to eat it all to myself.the science behind culinary ART is often both misunderstood and overly contemplative. a prime example being the often disparaged combination of ketchup and chocolate pudding. It sounds unorthodox, and people disparage it before even trying it, with their own biases and filters taking effect, telling them such a combination will fail without actually performing an actual scientific observation, instead lending their opinion to superstition that sweet and savoury only go together in sweet and sour pork. So, I decided to try it myself. I mixed 1/2 ketchup and 1/2 chocolate pudding, and discovered it was horrible. like eating out of a goats *censored*. It also looked like a bloody stool, which didn't really help matters either. However, I was proud to say that I was the first person to come to that conclusion based on the solid evidence of observation, rather then some silly presumption based entirely on traditional culinary knowledge.


Quote
The Board says i've exceeded the character limit...so BC's not allowed in my sig
LOL
which one were you trying for?

Based on that premise you would have never came up with your cheese drink recipe so i just don't get it...
You know they serve it on the Riviera now ? ?exactly! following "traditional" culinary ideals always results in the same old drab culinary experiences. I kick it up a notch with unexpected twists, like peach marinaded beefsteak, or fruit salad with beef gravy. Or- vodka and cheese.

Why, I guarantee that before the Peanut butter and jam sandwich set the standard for basic nutritional supplements for young and old alike the idea of peanut butter and jam in the same dish was appalling, much in the same way most people produce a CONTORTED facial expression when I tell them of my exploits with my "jolly rancher" turkey recipe.

Quote
You know they serve it on the Riviera now

Actually, we're in a legal battle with them, they insist that they invented the drink by accident when a drunkard, who consumed large quantities of both alcohol and cheese, vomited in somebody elses glass when they weren't looking. that lucky person was, according to them "the first person to indulge in the ecstasy of cheese, vodka, and a smattering of gastrointestinal flotsam and jetsam". what a ridiculously unbelievable story! there was no way the drunkard consumed the exact proportions and fermented the cheese further in their stomach before "delivering" it to the eventual recipient. Additionally how does one only vomit a glassful? A ludicrous story at best. But I'll leave it to my well paid lawyers. at least until they realize they aren't getting paid.
1688.

Solve : Mozilla patches three public Firefox bugs?

Answer»

Mozilla today patched Firefox 3.5 and Firefox 3.0 to QUASH three SECURITY vulnerabilities, including a pair unveiled last week at Black Hat, and a THIRD Mozilla itself revealed last month.

Firefox 3.0.13, the update to the older browser that Mozilla will drop off the support list in January 2010, includes two bugs, while Firefox 3.5.2 fixes a separate flaw.

Full storyThey sure respond a HECK of alot faster than Redmond does when this happens...
Good on You, Mozilla...

1689.

Solve : Deciphering Windows 7 Upgrades: The Official Chart?

Answer»
Over the past two weeks, in my Personal Technology columns, here and here, I’ve explained some of the challenges and limitations that will be involved in upgrading an EXISTING Windows XP or Windows Vista PC to the forthcoming Windows 7 operating system, due out October 22. Several readers ASKED me to publish a chart showing which current versions of Windows could be easily upgraded to which planned versions of Windows 7, and which couldn’t. So I asked Microsoft to supply such a chart we could publish, and the company graciously did so. It is reproduced below, unaltered. You can click on it to make it larger.

Link
1690.

Solve : ASUS Eee Keyboard to launch by end of June?

Answer»
The dream of owning a keyboard embedded with a full-blown PC running XP on an Atom N270 processor and 5-inch, 800 x 480 pixel touchscreen display/trackpad is nearly upon us. A dream, quite honestly, nobody had prior to seeing the reveal of the 2-pound Eee Keyboard prototype at CES in January.

LinkSounds like a MAC.That's already been done.
It will FLOP.
Think of commodore 64 (Image from news.cnet.com)

Hehe yeah Geek-9pm. Story also reminded me of my first computer, the Atari 1040ST.

Bringing back the Old Skool!Quote from: Ironman on May 15, 2009, 04:55:49 PM
Bringing back the Old Skool!
N0. We're bringing in the 1337 5ch001.the difference is- this new one will have the screen integrated to the keyboard- and smaller as well. Much like a tablet PC but with a smaller screen and built-in keyboard.


Quote from: Helpmeh on May 18, 2009, 07:32:46 PM
N0. We're bringing in the 1337 5ch001.

heh, the funny part about "leet" SPEAK is that people that use it obviously have no clue what it implies. It doesn't imply anything good, I might add.


Quote from: BC_Programmer on May 18, 2009, 07:59:12 PM
It doesn't imply anything good, I might add.

H4x0r. The supposed LANGUAGE of hackers. It's truly the language of 5k¡dd¡35.That's pretty amazing.I bet these will be faster then both the atari AND the commodore 64!


Quote from: Helpmeh on May 18, 2009, 08:18:00 PM
H4x0r. The supposed language of hackers. It's truly the language of 5k¡dd¡35.

...
It's not a "language", it's a ridiculous shorthand invented by people whose mommies and daddies thought they were geniuses because they wrote 8008i35 on their calculators. It went downhill from there.


Quote from: BC_Programmer on May 18, 2009, 08:57:34 PM
I bet these will be faster then both the atari AND the commodore 64!


...
It's not a "language", it's a ridiculous shorthand invented by people whose mommies and daddies thought they were geniuses because they wrote 8008i35 on their calculators. It went downhill from there.



Please note the word SUPPOSED in my post...and you absolutely correct.Quote from: BC_Programmer on May 18, 2009, 07:59:12 PM
the difference is- this new one will have the screen integrated to the keyboard- and smaller as well. Much like a tablet PC but with a smaller screen and built-in keyboard.
Integrated? Really?
I can visualize a keyboard on one side and the screen on the other.
Type a paragraph, then look on the back side to see what you wrote.
integrated in the same way the screen of the original imac is part of the system itself. Ok... that's gotta be the most completely useless thing I've ever seen from ASUS in their Eee line. I thought the Sony VGN-UX180P was useless, but this is even worse.Quote from: quaxo on May 20, 2009, 03:57:00 AM
Ok... that's gotta be the most completely useless thing I've ever seen from ASUS in their Eee line. I thought the Sony VGN-UX180P was useless, but this is even worse.

I'm leaning towards you on this although I'd like to see some reviews when it's ACTUALLY released. If done properly they could potentially be on to something for those people who want to simply have an Internet computer up in their kitchen or something similiar.
1691.

Solve : Firefox to hit 1 billion downloads Friday?

Answer» http://www.computerworld.com/s/article/9136111/Firefox_to_hit_1_billion_downloads_Friday

The Firefox Web browser is fast approaching its billionth DOWNLOAD and is likely to hit that milestone some time on Friday.

Mozilla has a Web site (http://www.spreadfirefox.com/news_events) and a Twitter feed where people can keep track of the total. On Thursday afternoon, the feed showed more than 999,180,000 downloads, with about 15 more happening each second.

Mozilla said initially that it expected to hit the billion mark some time over the weekend. An hour later, as the news trickled out and the pace of downloads increased, Mozilla revised its estimate to Friday. An enthusiast Web site with a "Firefox Download Guesstimator" PREDICTS it will reach a billion on Friday at noon GMT.

The figure includes all versions of Firefox since the first release in 2004. If a single user downloaded multiple copies for different computers, they are each counted in the total. And if a user goes to the Web site to download an update to an existing version, instead of waiting for the automatic download, that is counted as well. Automatic updates are not included in the total.

So the figure does not mean that 1 billion people are using Firefox. Still, it's a significant achievement for a piece of software that was unknown to most of the world just a few years ago, and one that has had to compete with Microsoft's Internet Explorer, which ships free with every Windows PC.

Figures from earlier this month showed Firefox having just under a third of the global browser market, at 31 percent. Internet Explorer led the field with 60 percent, while Safari, Chrome and Opera each had less than 5 percent, according to Statcounter.

Firefox is stronger in Europe, where it has 40 percent of the market to IE's 47 percent. In Asia, Firefox has 23 percent to IE's 72 percent. In Antarctica, Statcounter says, the browsers are neck and neck.

Mozilla plans to launch a Web site Monday, at www.onebillionplusyou.com, where it will provide more information on the achievement.firefox reaches a billion yesterday!!!!!!!!Very cool. Glad to see that they're not trying to pad the numbers by including the automatic updates (from the browser) in this total.
1692.

Solve : Adobe Reader's security woes a boon for up-and-coming rival Foxit?

Answer» http://www.computerworld.com/s/article/9136348/Adobe_Reader_s_security_woes_a_boon_for_up_and_coming_rival_Foxit

Foxit Reader, a free PDF-reading knockoff of Adobe Systems Inc.'s free Adobe Reader, has won what its maker estimates is 70 million users worldwide because of its speed and light weight.

The latest version of Foxit Reader 3.0 for Windows is a svelte 3MB download, compared with Adobe Reader 9.1 for Windows, which tips the scales at 25MB.

And Foxit now has something else going for it: better security.

For the past year and a HALF, Adobe Reader has been plagued with numerous nasty bugs, including zero-day vulnerabilities that, if unleashed by an unwitting enterprise employee, could have devastating consequences.

Facing criticism, Adobe is aiming to release security patches more quickly.

But it's not fast enough for many companies, says one anonymous security researcher at the Black Hat conference, who told CNET this week: "As a result of the number of zero-day attacks on PDFs this year, large banks hate Adobe."

First released in 2004, Foxit Reader's downloads have been growing about 10% each month this year, to almost 4 million a month, says Erik Bryant, director of sales for Foxit Software.

"We're not only getting more downloads, but also more inquiries from large corporations who want to replace Adobe Reader for as many as hundreds of thousands of employees," Bryant told Computerworld on Thursday.

For one, Foxit is talking to an unnamed American bank about replacing Adobe Reader for all 300,000 of its workers, as well all related Adobe tools, such as Adobe Acrobat, Bryant said.

Tools such as Acrobat are key. While Foxit offers enterprise-supported versions of the Foxit Reader at a low per-seat price, it makes most of its money from tools such as its PDF software development kit, which is sold to software DEVELOPERS, and enterprise tools such as the PDF Creator, which can replace the more expensive Adobe Acrobat.

Sales at Foxit are on track to double over last year, said Bryant, who would only say the 150-employee company's annual revenues are in the range of between $5 million and 20 million.

Though often recommended by security researchers as a good alternative to Adobe Reader, Foxit Reader isn't invulnerable. Foxit's site freely lists the security bulletins on its product, but they are far FEWER than those for Adobe Reader.

"We develop our code from scratch, so 99% of the time we don't share the same vulnerabilities as Adobe Reader," Bryant said.

Also, Foxit, by necessity lacks some of Adobe Reader's features, such as the ability to DISPLAY 3-D images in CAD-created PDFs, said Bryant. But he said that most of the missing features were for niche users.

The company is very close to releasing two enterprise products. One is called Foxit Phantom, an all-in-one suite that includes a PDF creator, editor and more. That is meant to compete with Adobe's various Acrobat suites.

The second is the Foxit Security Suite, which helps companies implement DIGITAL Rights Management (DRM) on PDFs using permissions managed by Microsoft Corp.'s Active Directory technology. This, said Bryant, will also be cheaper than Adobe's current server software.

Despite having nipped at Adobe's heels for the past half-decade, Bryant maintains that the firms have a good relationship.

"We've never been contacted by them. They've never said they were pissed, or tried to buy us out," he said. "They probably appreciate that we help make PDF more popular."
1693.

Solve : How Google is Tracking Your Online Web Surfing Behavior?

Answer»

That's a reach...Quote from: Helpmeh on August 02, 2009, 06:20:54 PM

As I've said before, the DATA it collects is which sites you visit. The only companies who would be interested are companies trying to acomplish the thing google ads is acomplishing. How can that information be added to spamlists?

Honestly, I have to defend google ads...I DON'T EVEN SEE GOOGLE ADS.

This makes me feel like I am defending homosexual rights at school... at the same time as assuring that I am not, even though I am defending it.

The argument is not about them helping themselves when it comes to relevant advertising but an abuse of that information. How much is being taken? They say there watching our movement on the web, hang about if I go to Waterstones do I want more book adverts or if I go to HMV do I want more music adverts No I was fine looking myself. It's just the corporation MAKING money off my movements on the web. Do they give you a list of the information taken? No they just take 'some' info of you. Talk about Big brother.Quote from: BC_Programmer on August 02, 2009, 05:36:37 PM
I have NEVER let an advertisement sway my opinion in any way

Really? Never? I find that hard to believe.Quote from: JJ 3000 on August 02, 2009, 06:38:50 PM
Really? Never? I find that hard to believe.

Why I never do either. If I want something I buy it not after watching some naked woman dance across my screen telling me I'm half a man if I don't buy it.Never say never Quote from: JJ 3000 on August 02, 2009, 06:38:50 PM
Really? Never? I find that hard to believe.

I very seldom watch television. And those adverts I do see are so ridiculously stupid... and I don't mean, like my posts, super silly but usually with some form of deep meaning or connection that gives insight into some human fioble, no sir, when I see an advert I don't take it's content into account; in fact half the time It would be a major pain just finding out what they are advertising. "say, was that commercial that was just on with the people dancing for clothes, dancing shoes or a new chevrolet?

Although I'll admit that sometimes an advertisement will remind me of something, like for example an advertisement for visual studio 2005 might make me remember to file my taxes for 2005. But really it's only far removed types of associations.


And as Broni said, "never say never"; I cannot recall any specific instance where I thought, "wow, I know this hat is really EXPENSIVE, and I don't WEAR hats anyway, but GOSH! I saw somebody wearing it on TV!"Quote from: Broni on August 02, 2009, 06:50:56 PM
Never say never

True but I try not to.My opinion on this is, as BC said, Google's DEFAULT option on this is to give you the service, but others give you the option to have the service. Now why would they give you it first day, (without telling you) if there wasn't going to be some kind of catch. Money. That's all that's involved. Google are feeling the pain too of the economy - a few months ago they let off over 200 people. Quote from: kpac on August 03, 2009, 02:59:33 AM
My opinion on this is, as BC said, Google's default option on this is to give you the service, but others give you the option to have the service. Now why would they give you it first day, (without telling you) if there wasn't going to be some kind of catch. Money. That's all that's involved. Google are feeling the pain too of the economy - a few months ago they let off over 200 people.
I get your point.
1694.

Solve : FTC shuts allegedly rogue Internet provider?

Answer» http://tech.yahoo.com/news/ap/20090604/ap_on_hi_te/us_tec_internet_provider_shutdown

Quote
SAN FRANCISCO -

The FEDERAL government has severed the Internet connection of a company accused of helping CRIMINALS serve up a "WITCHES' brew" of nasty content online, from computer viruses to child pornography.

It's likely to be just a short-lived victory in the fight against cybercrime, though, since bad guys are very good at getting back online quickly.

The Federal Trade Commission said Thursday that it has ordered the shutdown of a company called Pricewert LLC, described in a complaint filed in San Jose, Calif., federal court as an Oregon-based shell company run by "overseas criminals", operating out of Belize and running many its illegal operations out of servers in Silicon Valley.

Pricewert, which operated the "Triple Fiber Network" or "3FN," wasn't the type of Internet service that average consumers would see or sign up for. Instead, the service was advertised "in the darkest corners of the Internet" and was targeted at criminals who want to put malicious Web sites online, but need the servers and bandwidth to do it, according to the complaint.

Technicians working for 3FN EVEN helped criminals maintain the armies of personal computers that they had infected with viruses, according to the complaint. Those armies are known as "botnets," and they require some sophistication to manage.

The FTC says the case marks the first time the agency has ordered the SHUTTERING of an Internet provider. The agency has usually focused on taking out harmful Web sites individually. Companies that host malicious Web sites are usually forced offline under pressure from the FBI or computer security researchers, but without a formal government order — which is what makes Thursday's announcement significant.

FTC Chairman Jon Leibowitz said the agency decided to move on 3FN after getting information about the company's behavior that made it "so clear this was a rogue (Internet service provider)" that the agency had a strong case against it.

"This is very, very important because rather than go after the individual spammers, in one action we can shut down a host of bad actors," Leibowitz said in an interview. "There's always a whack-a-mole problem in cases like this, but at the very least we've put a meaningful wrench in their gears."

The FTC's complaint draws a link between 3FN and a notorious Internet provider called McColo Corp., which was also operating out of a data center in Silicon Valley.

McColo was believed responsible for half of the world's spam before it was shut down in November. Spam dropped precipitously after McColo's Internet providers pulled the plug on McColo, but it has since rebounded.

When investigators from NASA looked into intrusions into some of its computers, they traced them back to McColo's servers. A search warrant later revealed those servers were also routing instant message conversations between 3FN employees and customers that formed the basis of some of the FTC's allegations.

A man who picked up the phone at one of 3FN's offices Thursday night said the company wasn't commenting and hung up.
Quote
an Oregon-based shell company run by "overseas criminals", operating out of Belize

I bet there will be another one up and running within a week... Indeed.
McColo is already back in business.
1695.

Solve : Apple claims JailBreaking Dangerous?

Answer»

Apple stated to the FCC that if JAILBREAKING iPhones is declared legal it could lead to crippling Cell Towers...

Full STORY.Quote from: patio on July 29, 2009, 08:45:36 AM

Apple stated to the FCC that if jailbreaking iPhones is declared legal it could lead to crippling Cell Towers...

Full Story.

That would give us ironworkers more to do, building CRUTCHES for crippled towers.

That doesn't sound like Apple trying to maintain a deathgrip on shiny devices at all. If they don't like it though, why do they still buy them? It sounds like a SHOUT of desperation to me.Quote from: Mulreay on July 31, 2009, 05:42:53 AM
It sounds like a shout of desperation to me.
Same. They're clinging to straw now.This is my primary issue with Apple (mainly the IPHONE and ipod) and how closed / proprietary they are. But I guess if you've got a popular product and people are buying it (being controlled by it) why change. And some Developers have moved underground as a result...

Story Here...
1696.

Solve : 5870 and 5870x2 specs reveled!?

Answer»

O
M
G
!
!

http://www.brightsideofnews.com/news/2009/4/24/ati-radeon-5870-and-5870x2-specs-revealed.aspx
Seems IMPRESSIVE, but this is all non-verified (aka rumor stuff), but if true will be interesting to see the PERFORMANCE COMPARISONS and how well it does with [emailprotected] PicsPoor DYSLEXICS. They just have to MAKE a 4980 now

1697.

Solve : Half-Open Outbound TCP Connections Limit Removed in Windows 7 and Vista SP2?

Answer» No patch needed anymore...

http://www.mydigitallife.info/2009/06/07/half-open-outbound-tcp-connections-limit-removed-in-windows-7-and-vista-sp2-no-patch-required/



Looking for half-open concurrent TCP connections limit patcher? Microsoft introduces a limit (of 10) to restrict number of allowed simultaneous outgoing half-open TCP connections in Windows XP SP2 in a bid to prevent virus or malicious program to make unlimited infectious connections to other system when a PC is compromised. The limit continues to exist in Windows Vista RTM and SP1. Result is event ID 4226 with error message “TCP/IP has reached the security limit imposed on the number of concurrent TCP connect attempts”, and fanatic search for patched TCPIP.sys or half-open TCP connections limit memory value crack by many Windows users, especially P2P and torrent downloaders.

Microsoft appears to have a change of heart on the half-open outbound TCP connection attempts limit with the release of Windows Vista SP2 and Windows 7, PROBABLY due to the fact that the limit never effective in stopping the spreading of worms and viruses, or Microsoft has grown more confident about security feature of newer operating system.

According to Notable Changes in Windows Server 2008 SP2 and Windows Vista SP2 document published in conjunction with the release of SP2 RTM:

Quote
SP2 removes the limit of 10 half open outbound TCP connections. By default, SP2 has no limit on the number of half open outbound TCP connections.

The complete removal of the limit for half-open outbound TCP connections, which is defaulted to 10, was finalized with the release of Windows Server 2008 and Vista SP2 Build 17506. In fact, the half-open outgoing TCP connection limit has been bypassed by default since Windows Vista SP2 RC Build 16670. Previously, the changelog of SP2 SHOWED that Microsoft looks LIKE going to “add a registry key that enables modification of the maximum number of open TCP connections to increase application compatibility”.

Instead, Microsoft adds a registry key that allows user or administrator to enable (turn on) or disable (turn off) the half-open TCP connections limit in Windows Vista with Service Pack 2 and in Windows Server 2008 with Service Pack 2.so that means, that M$ has basically fixed windows so that you don't need the patch to get FEEL the effects that the patch was giving!

how nice

I would've thought being hidden under a good firewall and antivirus software would have done good to protect you from the half open outbound tcp issue that M$ was using to stop hackers.
1698.

Solve : Interesting new tool?

Answer» Full StoryThe article suggests that all data be 'churned' to protect privacy. You have to read it to get the impact of what that means.
That is a very good idea. It may seem impossible, but it is not.
Someday that is the way all electronic communication will be done. When that happens, we all will have more freedom to use electronic communication without fear that it could harm us. Heartening to read. Also shoots holes in my thesis that young people are just up to no good! (I know that's not true -- we just need to see more "good news" stories.)

Thanks, Patio.It's interesting but has at least one flaw- what if the recepient makes a copy of the decrypted data themselves?

Like- say- what outlook does automatically?Nice tool, but STILL its all the more reason not to post personal data on the internet in the first place(My dad is sticking with paying his BILLS through Snail Mail )

Quote from: BC_Programmer on AUGUST 06, 2009, 09:27:26 AM
It's interesting but has at least one flaw- what if the recepient makes a copy of the decrypted data themselves?

Like- say- what outlook does automatically?
You need to think beyond the present condition. Think of the future. Someday in the future if you make a copy of something for no good prose, the data will just decay. Data will be a life form. When it it dies, it rots. The CYBERNETIC equivalent of bacteria will eat anything that is not alive and productive. This is needed to keep cyberspace from becoming a cesspool of indestructible plastic junk. Link the big mess of plastic refuse flotsam in the ocean even now.

Someday this post will self-destruct.
Quote from: Geek-9pm on August 06, 2009, 11:08:40 PM
You need to think beyond the present condition. Think of the future. Someday in the future if you make a copy of something for no good prose, the data will just decay. Data will be a life form. When it it dies, it rots. The cybernetic equivalent of bacteria will eat anything that is not alive and productive. This is needed to keep cyberspace from becoming a cesspool of indestructible plastic junk. Link the big mess of plastic refuse flotsam in the ocean even now.

Someday this post will self-destruct.


Sounds more and more like the Matrix...Quote from: macdad- on August 07, 2009, 06:19:15 AM
Sounds more and more like the Matrix...
Welcome to the rabbit hole Neo. Quote
Data will be a life form.

Not until data can reproduce itself. Data (INFORMATION) is certainly part of life forms.
You make a good point, though, that perhaps data will have to undergo a "life cycle."
(Which means, eventually, all those "Fred" videos on YouTube may actually go away.)Data by definition is never volatile- only the storage mechanism used to store it.Quote from: BC_Programmer on August 07, 2009, 08:46:03 AM
Data by definition is never volatile- only the storage mechanism used to store it.

You've obviously never met my ex. Everything was volatile.

Good article btw.
1699.

Solve : Safari 4 Release?

Answer»

Apple announced the RELEASE of Safari4 will be this COMING MONDAY....
Story.this coming monday is TODAY.

1700.

Solve : Firefox has 1 BILLION Downloads!!!!?

Answer»

Firefox reached the MILESTONE!!!
Can you ask them why MINE keeps crashing when I download SOMETHING off the web? After a billion downloads you would think I would get an email back from support.How long has it been since you ASKED Mozilla for supportCongrats to mozilla.Only 12 more billion to go! I thinkQuote from: ThomasTheXPUser on August 01, 2009, 10:40:36 AM

Firefox reached the milestone!!!


That just goes to show that anybody will download anything.