Previous News & Tips Weekly Page -5/7/17 - 5/13/17 Next

Weekly News & Tips Index

Day of week Date News & Tips Number
Sat 5/13/2017 913
Fri 5/12/2017 912
Thur 5/11/2017 911
Wed 5/10/2017 910
Tue 5/9/2017 909
Mon 5/8/2017 908
Sun 5/7/2017 907

Sat 913  5/13/2017

Preview: Meet the First Windows 10 S Laptops (10 models to scroll through)


Microsoft Testing Anti-Malware Feature For Edge Browser


Americans Can't Put Down Their Phones, Shut Off the TV

A new report from market research firm eMarketer reveals that US adults are now spending more than half their day — a total of 12 hours and 7 minutes, on average — consuming media.


What Should I Do When My Account Is Involved In A Breach?

If your account is ever part of a breach, secure your account to avoid further risk.


xDedic Marketplace Data Spells Danger for Businesses

The xDedic marketplace, a hotspot for cybercriminals on the dark web, sells access to RDP servers to enable attacks on government and corporations.


What Is Web Literacy?


Why malware is still the beating heart of cybercrime

Even the most basic form of malware allows cybercriminals to get closer to their goals.


How to Block Robocalls and Telemarketers


Unboxing and Hands On: Kensington's VeriMark Fingerprint Key for Windows Hello and FIDO/U2F


Microsoft Surface Pro 5 Launch Date Revealed?


Google Kit Brings Voice Control to Raspberry Pi

Google created a kit that lets tinkerers turn a Raspberry Pi into a voice-controlled virtual assistant.


Samsung's S8 Screen Is Epic, And Totally Pointless


Can I Use a Power Supply with a Higher Wattage Rating on my Laptop?

The voltage and polarity of the power supply must match. Amps and watts have some flexibility.


Hyundai Blue Link Vulnerability Allows Remote Start of Cars

Car maker Hyundai patched a vulnerability in its Blue Link software, which could potentially allow attackers to remotely unlock a vehicle and start it.


WiFi Woes: Fixing Troublesome Signals


Here's how to fast-charge your smartphone or tablet when you're in a hurry

You're leaving in 20 minutes and your smartphone's battery is almost dead. Here's how to get the maximum charge into your device in the least amount of time possible.


How to Get Your Streaming Video to Stop Buffering So Darn Much


Windows 10 Creators Update: How To Remove the App List from the Start Menu


Windows 10 reaches milestone of 300 million daily users


Inside GE's Research Center and its Quest for an Automated Future

PCMag visits GE's Research campus in upstate New York to learn more about its work to quantify everything and turn that data into a giant digital system.


Frustrated Samsung Galaxy S8 customers reporting even more bugs


Apple Loop: New iPhone 7S Leaks, MacBook Pro's Touch Bar Problems, Tim Cook's Embarrassing Admission


10 more quick tips to make Linux networking easier

Networking with Linux can be simple and secure — if you know a few tricks. Here are a few more pointers to help admins knock out various Linux networking tasks with a minimum of effort.


Why Isn’t Quicken Backwards Compatible In Windows 8.1?


Why it's a good day to change your password


How to Clear the Recent Documents List When You Exit Windows


How to Comment on the FCC's Proposal to Kill Net Neutrality


The PowerUp is the MacBook Pro charger to solve your USB-C woes


The Best Ransomware Protection of 2017

When ransomware turns your most important files into encrypted gibberish, and paying big bucks to get those files back is your only choice, you're in big trouble. One of these top-performing utilities is your best bet to stay safe.


Thousands of credit cards exposed publicly on the web!


Google Confirms Android O Beta Program Will Begin Soon


A Complete Guide to Updating Your Mac’s Software


How Do I Get Rid Of A Facebook Game?


Here's how you should really use Google Docs


How to Pin Folders to the Windows Taskbar


Here's What Happens When Broadband Companies "Self-Regulate"


The security Apple uses to prevent iPhone leaks is just crazy


How to Fix: Move Firefox to New Computer / Profile


Malware disguised as Adobe Flash is targeting macOS


Comments by -- Bob Primak --

Re. FYI #911 (Thurs 5/11/2017):

Brave Is a Faster, Safer, Non-Google Web Browser Made for Today’s Internet

Yet another Chromium based browser making great promises, but having in-app payments? Pass. I especially didn't like the way their "engineer" butted into the Comments every time anyone challenged the web standards, payment methods (bitcoin is the only accepted payment method) and the security of this browser. 

Also, the lack of extensions and lack of settings flexibility to allow access to sites which don't work with ad blocking enabled -- all of this is one hot mess at this time, and not eready for use in a production environment. Also mentioned (and defended -- poorly -- by the "Brave Engineer") is their use of Squirrel to spy on users. This is worse than the ads and trackers this browser pretends to eliminate.

I use Google Chrome with ten extensions to remain as free of tracking and page-slowing ads as possible while allowing such clutter only where it is absolutely required. Is this private -- not exactly. Is this good enough -- you betcha!


How To Remove The Bedep Malware From XHamster

Other than this article being a thinly veiled ad for Malwarebytes (which is not certified by any independent testing lab), this article is completely wrong.

xHamster does not serve up malware if you don't click on any ads posted there. It's a raunchy site, so I have very little experience with it, but my only contact with the site is under Linux with heavy script-blocking in place. So maybe that's why my Windows (including MSERT -- the stand-alone version of Windows Defender from Microsoft's site -- and Malwarebytes Free) and Linux virus scans have always come up free of detection of Bedep or anything else lately. And yes, I now scan Linux regularly with ClamTK antivirus -- specifically aimed at Linux malware.


Malware-laden music player app downloaded by thousands of users found in Google Play Store

With a name like "Super Free Music Player", what could possibly go wrong? (sarcasm) Definition of mass stupidity -- 10,000 maniacs and a rogue app. 


How to Record Over-the-Air TV Without a Cable TV Box DVR

Using a Digital Converter Box as the base element in a PVR is risky and inefficient. And it does not get full-HD broadcasts. As a DA Converter Box, it must downgrade the OTA DTV signal in order to make an analog output. (All analog outputs in the consumer arena are SD.) The analog output is designed for use with SDTVs which lacked ATSC tuners. Or with monitors which have no TV tuners at all.

Don't even think about using signal splitters and inline amps with these devices. This degrades the DTV signal further and causes frequent dropouts, more so than weather or electrical interference, both of which plague certain channels even with my outdoor antenna which I use with my TiVo Roamio OTA. And on windy days -- forget about it! Channel 50 (CW and local programming) has a frequency exactly the same as household electricity, so this channel is particularly challenging for any coax cable run. So Supergirl and The Flash must be shunted onto a Cable Company DVR most weeks. 

Technically, my TiVo Roamio OTA is an OTA receiver and recording box. It receives full-HD signals and can record and play them back. It does not stream without a $99.00 add-on (no additional subscription required). There was nearly zero user setup. Much easier than the Home Run or Android TV boxes favored by more hard-core tech enthusiasts. 

But convenience does not come cheap -- it'll take a few years for my $400.00 investment to pay off, and the box already could use a fan replacement (cheap, but technically a bit difficult). BTW, TiVo is now a (device) lifetime subscription and is included in the price of the box.


Re. FYI #912 (Fri 5/12/2017):

Find Your Passwords In Firefox (this generally applies with slight variations to all browsers)

I don't store passwords in browsers, as they are easily uncovered if the device falls into the wrong hands. So I have saved passwords marked for cleanup every time I close my browsers.


What Type of Linux Desktop or Laptop Should You Buy?

Buying a prebuilt Linux PC is a waste of money. Installation may be a bit tricky, but on the right older hardware (obtainable on eBay or from friends or relatives) Linux runs mostly trouble-free. Even in a dual-boot, as long as you observe the protocols for coexistence, Linux and Windows can play nicely side by side. On my Intel NUC, Ubuntu and Windows 10 don't interfere with each other, and GRUB boots very fast. Total time to fire up one OS or the other is comparable to BIOS booting (no Windows Fast Startup allowed here!) on a pre-UEFI PC. Or maybe a bit faster. And that's with about five screens to click through to get to the login screen of either OS. 


How to Back Up and Restore Windows 10 from an Image File

Windows 10 has similar procedures to this tutorial which is about Windows 7. Third party programs may be easier for many users, myself included. Being able to restore from a bootable USB stick and an external drive (even a flash drive, if it's large enough to hold the backup archive) is ahandy option. Whichever way you do it, system backup is important. Equally important is actually doing the restore operation, so as to know how to do it in a stressful situation where you really have to get it done. 

For my tablet, all I need is the Macrium Reflect WinPE 10 environment on a flash drive and the image archive on a second flash drive, with a hub to allow both drives to be used together. This works very well for travel, as there are no moving parts. My archive drive is so small I have to put it into a sandwich bag with the WinPE drive (and the hub) so as not to lose the mini flash drive.


Windows 10 Creators Update: The New Modern Way to Clean Up Your Disk Drive

Storage Sense has been in Windows 10 from the beginning, and therefore is nothing new. But it is being pushed to the forefront, as Disk Cleanup is being deprecated. Kind of a shame, as Disk Cleanup gets at areas not accessed by Storage Sense. Areas like Windows Update and Error Reporting dumps, which Microsoft would prefer users not clean. 


Free video streaming devices are riskier than you think

This is the EU, not the US. Streaming itself does not constitute downloading, and cache contents are not copies under US court rulings. Komando is dead wrong on this. However, boxes loaded with Kodi and containing certain channels or sources preloaded, are illegal. This is not because of cache contents. It is because of accessing certain websites through illegal apps or channels. The sites themselves are violating US Copyright Laws. That's the reason Amazon was forced to act. 

The mere presence of Kodi on a box is not a violation of anyone's laws. Unlike the EU, the US does not prosecute people for having a channel available on their box. In fact, what the EU is doing would violate the US Constitution and Bill of Rights in many ways, not to be discussed by a non-lawyer such as myself. Remember, EU nations do not follow our Constitution and our Bill of Rights. 

And technically, the EU rulings are just plain factually wrong.

Back to Top

Fri 912  5/12/2017

[Tip] How to Change Fonts of Menus, Dialog Box and Other Text in Windows 8 and Later


Hackers targeting North Korea with stealth spy malware attacks since 2014


Can I Stop People From Seeing Each Other On Facebook?


The Fastest VPNs of 2017 (free ones are slower do to collect info on your activities and ads sent to you)

Many VPNs are excellent at protecting your privacy online, but which of them deliver the best Internet speeds? We ran the tests.


Why You Can't Always Trust Google's Top Featured Answers


If You Have a Samsung Android Phone, You Need to Try These Features


Fingerprint Scanners on MasterCard’s Bank Cards – What’s the Concern? (we leave our fingerprints everywhere and the knowledge to pick them up and use them is available on the Internet, how secure can they be?  I have never believed in fingerprints as a good security option.)


4 Industries Account for Majority of Global Ransomware Attacks

When it comes to 77% of global ransomware attacks, these four industries take the greatest hit, according to a global threat trends report released today.


How to Secure Your Gmail and Google Account (this does not protect you from phishing attacks, they prey on human weaknesses, which you can learn in college courses)


Here's what it's like to use Microsoft's new MacBook rival that runs a brand-new version of Windows 10


Find Your Passwords In Firefox (this generally applies with slight variations to all browsers)


The Best Laptops for College Students (not all can use a Chromebook due to software they are required to use, check first before buying a college bound student a Chromebook)

After you choose your school, the next most important decision you need to make is which computer you'll have for the next four years. Start your short list with these top-rated, value-focused laptops.


The Beginner's Guide to 1Password


What Type of Linux Desktop or Laptop Should You Buy?


How to Back Up and Restore Windows 10 from an Image File


The Road Less Traveled: Building a Career in Cyberthreat Intelligence

It's hard to become a threat intelligence pro, but there are three primary ways of going about it.


How to Use an Android Device as a Second Monitor for Your PC or Mac


Microsoft Surface Laptop first look


How Your Smart Watch Puts You At Risk & How to Protect Yourself


64-bit Windows Users: Expect Auto-Upgrade to 64-bit Chrome

If you're running 64-bit Windows and 32-bit Chrome, Google is going to automatically upgrade you to 64-bit web browsing.


Samsung Smart TV security flaw leaves it open to hackers


11 Quick Fixes for the Bad Habits That Kill Your Mental Energy


Surface Laptop: 48 Hours Late


Windows 10 Creators Update: The New Modern Way to Clean Up Your Disk Drive


Lesson 5: Managing Your Device’s Storage and Backups


Acer Windows Mixed Reality head-mounted display: Our first take


Understanding Windows Libraries


Upgrade the Surface Laptop to Windows 10 Pro for Free

Microsoft's Surface Laptop runs a student-focused version of Windows 10, but you can upgrade to Windows 10 Pro for free until Dec. 31.


Free video streaming devices are riskier than you think


How to Disable and Remove HomeGroup for Windows


Surface Laptop: A Contrary View


Windows 10 Creators Update: Windows Defender Security Center and Antivirus


How to Auto-Control Your PC’s Fans for Cool, Quiet Operation


Google Docs Phishing Scam: What You Need to Know (remember, phishing attacks are against humans, not machines and software)


Fake Google Docs phishing deluge hits Gmail

The spam email appears as a contact sharing a Google Doc, so do not open it.


Google adds phishing protection to Gmail on Android


Google phishing attack was foretold by researchers—and it may have used their code

A potential threat from spoofing Google applications was cited in 2011.


Comments by -- Bob Primak --

Microsoft Security Advisory 4022344 plugs a bad hole in Windows Defender – here’s how to see if you got it


Here's how to check if your PC got Microsoft's fix for Windows Defender bug

Back to Top

Thur 911  5/11/2017

Microsoft Is Bringing Desktop Office Apps to the Windows Store


Google Pixel 2: UK release date, price and features to expect


Blocking Ads: 3 Great Ad Blockers for iOS 10 You Should Use


Windows 10 S: The Fine Print


Russian Citizen Gets Record 27-Year Sentence for Hacking, Fraud Scheme

Roman Valeryevich gets 27 years for hacking PoS machines. Meanwhile, spam master Pyotr Levashov's indictment is unsealed.


The Best Cheap Laptops of 2017

You don't have to spend a fortune—even a small one—on your next PC. If you need a laptop for basic computing, these are some of our top performers, and most of them ring up for less than $300.,2817,2371334,00.asp?utm_source=email&utm_campaign=whatsnewnow&utm_medium=title


Four Tips for Spotting Fake GoFundMe Campaigns


Bank robbers exploited SS7 weaknesses to drain 2SV-protected accounts

Attackers abused SS7 to redirect customers’ SMS text messages to phone numbers under their control.


Snake cyberespionage malware is ready to bite Mac users

One of the most sophisticated cyberespionage groups have ported its malware framework to macOS


Brave Is a Faster, Safer, Non-Google Web Browser Made for Today’s Internet


Why Google, Amazon, Target & eBay yanked their Apple Watch apps


How to Play Wii Games on Ubuntu with Dolphin


With Office 2016 Coming to Windows Store, Microsoft Demotes Office Mobile


Nigerian Convicted in Passport Wire Fraud and Internet Scam

A Nigerian man set up a number of U.S. bank accounts with bogus passports over a one year period, in which he managed to steal at least $500,000 through wire fraud and Internet scams.


How to Remotely Access and Control Another PC

You can connect to and control another Windows computer through Microsoft's Remote Desktop Connection tool.


Why You Should Be Using a VPN (and How to Choose One)


40% off Dell Computer Ultrasharp U2415 24.0-Inch Screen LED Monitor - Deal Alert


Are Smartphones A Hazard In The Doctor’s Office?


How To Remove The Bedep Malware From XHamster


This is the stupidest thing on Microsoft’s new laptop


How to Turn Any Website into an App on Linux


Surface Laptop is Microsoft’s Most Important Surface Release Ever (Premium)


Apple Music in iOS 11 could put video front and center

Apple is swinging for the fences by putting music and video together in one premium streaming service.


Jelly Is the World's Smallest 4G Smartphone

It runs Android 7.0, costs $109, uses a 2.5-inch display, and is already fully-funded on Kickstarter.


Windows 10 Creators Update: Use Reset PC or Fresh Start Options for Troublesome Systems


10 more quick tips to make Linux networking easier

Networking with Linux can be simple and secure — if you know a few tricks. Here are a few more pointers to help admins knock out various Linux networking tasks with a minimum of effort.


The Risks Of Using A Nanny Cam


Google Keep Is a Great Evernote Alternative and Here’s Why


Malware-laden music player app downloaded by thousands of users found in Google Play Store


How to Record Over-the-Air TV Without a Cable TV Box DVR


Microsoft Unveils Windows 10 S


Apple could finally launch a Siri speaker at WWDC

This time it's for real.


Introducing Fastest Mobile Networks 2017

We're headed out to 30 US cities to test all four major 4G LTE networks. Follow along!


Windows 10 Creators Update: App Folders on the Start Screen


How to work with remote filesystems using sshfs

If you need to work with remote directories between two Linux machines, here's how to do so securely, with the help of sshfs.


Ransomware On Facebook


How to Charge Your Android Phone Faster


Here’s why people keep buying Apple products


Paul Thurrott’s Short Takes: May 5


NASA is offering a $15,000 prize if you can speed up its simulation code


Comments by -- Bob Primak --

FYI #910 (Wed. 5/10/2017)

Tech Terms: Streaming Vs. Downloading

Important distinction. Even though technically, any caching is a download, if you are caught with downloaded unauthorized copyrighted content, you can be fined, lose Internet privileges, or be sued (and in rare cases, threatened with jail time). But if all you did was stream something, and your caches are cleared afterwards, prosecution will likely fail in the US. Then again, if the Cisco sniffing trick is employed, you could be caught while streaming, so don't depend on cleaning up afterwards to protect you. 

(FWIW, as a Comcast subscriber, and with free network and other players on the Web, I find it unnecessary to do illegal streaming anymore. I never considered downloading any media files, legal or illegal due to having low bandwidth or speeds, but my new Comcast Internet is fast enough for downloading media content. Then again, Comcast does have that monthly cap.)


What Is 5G? (smartphones and computer data plans)

Short answer is, there is no true 5G capability in the US. This is all marketing hype.


How to check for the Intel Active Management exploit that lets hackers take over your PC

"For example, some of Intel's NUC computers feature Small Business Advantage support. Users testing their systems for the exploit have reported on forums such as Reddit that their consumer-focused H97-based boards have the exploit."

This raised my eyebrows a bit.

Intel® Security Advisory regarding escalation of privilege vulnerability in Intel® Active Management Technology (AMT)

The known to be affected NUC motherboards are Intel fifth-Gen and earlier core-i5 processors and older kits. Mine (Swift Canyon, sixth-gen) and the Skull Canyon sixth and seventh-gen kits are not affected. 

More bulletins and updates may follow after May 12, 2017. That's when the new NUC BIOS releases (firmware updates) will come out, to be in line with the Creators Update of Windows 10. I would wait on these updates for awhile. 

It won't hurt to run the utility, but you won't find anything unless your MoBo is one of those listed by Intel or a handful of others. 



Comments by -- Joe Nowak

Latest edition of CyberHeist News

Mon May 8, 2017 10:27 pm (PDT)

CyberheistNews Vol 7 #19 [ALERT] FBI: "CEO Fraud Is Now a 5.3 Billion Email Scam"

Back to Top

Wed 910  5/10/2017

Latest Windows 10 'Redstone 3' test build adds container-based browser isolation

Microsoft's Windows 10 Redstone 3 test build 16188 includes Windows Defender Application Guard, as well as new PDF annotation and navigation features. (containers can allow failure of one tab, and leave others alone)


Microsoft releases new Windows 10 preview with PDF Reader features, Windows Defender Application Guard


Is your system booting slowly? Here’s how to flush out clogged startup apps


You Can’t Assume the Cloud Has Your Back

I received a question earlier this week that got me to thinking - too many people are making too many assumptions about the resilience of their data "in the cloud".


Nvidia quietly opens 4K Netflix streaming on GeForce GTX 10-series graphics cards

No Kaby Lake processor, no problem.


How to Clean Up and Optimize Your Sluggish Mac


Windows 10 Creators Update: How To Remove the App List from the Start Menu


Tech Terms: Streaming Vs. Downloading


FTC Offers ID Theft Victims Online Crime Reporting Tool

ID theft victims can report their cybercrime attack to the Federal Trade Commission, without having to file a police report in most cases.


How to Set Up Microsoft To-Do on Windows 10


Asus C302 review: A $500 MacBook for everyone


Should I Upgrade to Windows 10?

The most common question related to Windows 10 seems to be "Should I upgrade?" I'll cover my recommendations.


Hulu Live TV launches in beta: What you need to know

Here are all the details on Hulu's new live TV bundle.


Modern Phishing Attempts Look More Legit, but the Methods Haven't Changed Much


Windows 10 Creators Update: How To Setup Dynamic Lock


Creating ISO Files: Part 1


Fileless Malware Attacks Continue to Gain Steam

Endpoint woes grow as fileless attacks grow in prevalence and file-based attacks remain largely undetected by AV engines.


How to Disable the Touch Screen on Android for a Toddler


What Is 5G? (smartphones and computer data plans)

AT&T, Verizon Wireless, and other carriers will start to launch 5G networks this year. But what exactly is 5G? Here's what we know so far.


Apple Extends Warranty For Apple Watches With Swollen Battery Damage


What Does “There is a problem with this website’s security certificate” Mean, and What Should I Do?

https uses certificates to validate the site you're connecting to, as well as encrypt the data. Certificate errors are often benign, but are worth paying attention to.


How to master your music metadata (Part 1)

Tired of seeing “unknown track” by “unnamed artist” on your favorite music player? We’ll show you how to automatically identify, tag, and properly rename all your mystery tracks and albums to whip your music library into shape.


Chrome 62 To Mark All HTTP Websites As 'Not Secure' In Incognito Mode,34268.html?utm_source=th-newsletter&utm_medium=email&utm_campaign=20170502-th


Windows 10 S: New Cloud-Based Version of Windows 10 (competing against Chrome OS in Chromebooks)


Tech Terms: Baffled By Bluetooth


NSA To Scale Back Email Snooping


How to Extend Your WiFi Coverage




Microsoft HoloLens inventor: 'The phone is already dead' (more and more pronouncements of this)


Why Can’t We Use https for Everything?

HTTPS provides validation and encryption, two important pieces of security. Using it for everything is possible but costly, and issues would remain.


Sling TV misleads cord cutters with its "a la carte" marketing push

Sling's streaming bundle is more flexible than others, but it's not always cheaper, and it's definitely not a la carte.


Acer Mixed Reality HMD Doesn’t Do Mixed Reality,34266.html?utm_source=th-newsletter&utm_medium=email&utm_campaign=20170502-th


[Tip] How to Defer or Pause Windows Updates Download in Windows 10 (going to be harder to do in Home editions)


Set Up Personal Fundraiser On Facebook (competing against GoFundMe and others croud sourcing)


How to Fix: Move Thunderbird to New Computer / Profile


Gmail for Android now features better phishing protection

Based on Google's Safe Browsing technology, the new ability will help immediately identify nasty links.




BlackBerry's new phone is great for fans of the the classic keyboard (hate on screen keyboards, look at this)


Hackers used a long-neglected vulnerability in phone networks to empty victims' bank accounts



Comments by -- Bob Primak --

FYI #909 (Tues 5/9/2017)

PSA: This Google Doc scam is spreading fast and will email everyone you know


Google warns of email scam that impersonates Google Docs


This sophisticated phishing scam has the entire internet terrified

Old news. Already shut down by Google. Still haven't seen hide nor hair of this one. If phishing emails terrify you, you need to pull the plug on your Internet connection NOW. 


The Google Docs attack took over a million Gmail accounts in an hour

...and was shut down in a bit over two hours, according to Google. One million accounts is small potatoes to Google -- they service billions of accounts daily. 


[Tip] Enable Hidden Secret “Samples” Page in Windows 10 Settings

Why would I want to enable something which has no functionality?


Thieves stealing cars with $11 equipment

First, the equipment is $22, not $11. Second, the story was originally posted by, so its reliability cannot be verified in the Komando version. Third, I do not trust the alleged sources of this article. It needs fact-checking. 

"RFID Cases" are just a ripoff -- they do not block strong, nearby RFID transmissions. Car FOBs have such signals. Smartphones are NOT protected by these devices, as they are tracked by GPS and cell tower triangulation. 

The most common way cars get stolen or hijacked is when owners leave the engine running and step out of sight. Or when they leave the car unlocked in a driveway or garage. Also, "warming up" your car before getting into it is just a waste of fuel and is actually harmful to your engine. 


This little baby phone runs Android Nougat on a 2.4-inch screen 

Just what every pre-reading baby needs -- more screen time.



You do know, don't you that in Windows and Linux, Android phones show up automatically as external removable drives when connected by USB cables. (Special Permissions, aka Rooting, are no longer needed for most smartphones.) Android, unlike iPhone has a file system, particularly under Linux. There may even be a backup app already on your phone -- my Moto G4 does have such an app (for Windows). And then there's my Google Drive, which is nowhere near capacity.

Back to Top

Tue 909 5/9/2017

This Password Day, you can #LayerUp your login to make the Internet a more secure place.(Thursday May 4th)


This sophisticated phishing scam has the entire internet terrified


[Tip] Enable Hidden Secret “Samples” Page in Windows 10 Settings


How to Enable YouTube's Secret Dark Mode in Chrome


Hands On: Windows 10 Redstone 3 PC Build 16184 and Windows 10 Feature 2 Mobile Build 15208


Thieves stealing cars with $11 equipment


Stanford Researchers Develop Flexible, Biodegradable Semiconductor


This little baby phone runs Android Nougat on a 2.4-inch screen


19 Hidden Facebook Features Only Power Users Know

Facebook has been around for awhile, but there are probably a few tricks you don't know about.




The Google Docs attack took over a million Gmail accounts in an hour


[Tip] How to Uninstall Mixed Reality Portal in Windows 10


All the Coolest New Features in the Windows 10 Creators Update


Windows 10 Creators Update: 10 for 10 - Features to Check Out After Your Upgrade (Video)


Google and Facebook hit by $100 million phishing scam


How Do SSDs Work?



Microsoft CEO: our next phones may not look like phones


The Best Online Fax Services of 2017

Forget the clunky old machine and the paper rolls. With these web services, sending a fax is as simple as sending an email.',2817,2385681,00.asp?utm_source=email&utm_campaign=whatsnewnow&utm_medium=title




Microsoft CEO Satya Nadella's master plan for Windows is getting pushed to its limits


[Windows 10 Tip] Change “Windows User” Username Displayed in About Windows


Exploits Targeting Corporate Users Surged Nearly 30% In 2016

At same time, number of attacks targeting software vulnerabilities in systems used by consumers declined over 20%, Kaspersky Lab says in new report.


PSA: This Google Doc scam is spreading fast and will email everyone you know


Windows 10 S: What You Need to Know About Microsoft's New Lightweight OS


How to Set Up TorGuard VPN to Stay Private Online


Free vs. Paid VPNs: Which Should You Choose?,news-24992.html?utm_source=tg-newsletter&utm_medium=email&utm_campaign=20170503-tg


Malwarebytes Anti-Ransomware Beta




15 Common Problems with Chromebooks, and how to fix them


How to add printing services in Android

If you don't have a cloud-ready printer available, and you need to print from your Android device, Jack Wallen shows you how to add a printing service to make this possible.


Fake Delta Airlines Receipt Packs Malware

Phishing emails, disguised as receipts from Delta Airlines, trick victims into downloading malware.


This DIY Google Home uses Raspberry Pi and cardboard to make the magic happen


If You Don't Think You Need a Graphics Card, This $80 GPU Will Change Your Mind


No iPhone 8 in 2017? Report Says Yes (other reading indicate a parts shortage),news-25009.html?utm_source=tg-newsletter&utm_medium=email&utm_campaign=20170503-tg


Windows 10 S on the Surface Laptop Will Be Locked to Edge and Bing (until some hacker figures out how to change this)


Surface Laptop: Is Microsoft Ready to Eat Apple's School Lunch?

Microsoft has gone all in on hardware. This approach worked for Apple, but can the Surface Laptop replace the MacBook Air in people's hearts and minds?


This Swipe Trick For iPhone’s Calculator App Is Blowing People's Minds


Microsoft Launches Windows 10 S With the Classroom in Mind


Google warns of email scam that impersonates Google Docs


Why the Retail Crisis Could Be Coming to American Groceries

Back to Top

Mon 908 5/8/2017

Microsoft just launched a clever sneak attack against Apple's MacBook

     The Surface Laptop costs $999 and runs Windows 10 S.

     Windows 10 S is targeted at education and will be on a variety of laptops.

     The Surface Laptop can be upgraded to a full version of Windows 10 Pro.

     It's going to be appealing to everyone, not just students.


New iOS 11 details revealed in interview with Apple exec


What Are “Shared Experiences” on Windows 10?


How Cybercrooks Put the Beatdown on My Beats


Will you buy the $999 Surface Laptop? (The 3:59, Ep. 220) (looks good to me, but it will be a while for me)

We talk about Microsoft's education event, geek out over 5G and talk about cardboard boxes. Really.




Is It Time to Start Using an Adblocker? (just remembers some sites will block you see content unless you disable any ad blocker.  Reason is the ad income to the hosting site your trying to look at)

Advertising on the internet is broken. The result is that it might be time to think about adblockers, and supporting your favorite websites in other ways.


Is Someone Stealing My WiFi?


64-bit Windows Users: Expect Auto-Upgrade to 64-bit Chrome

If you're running 64-bit Windows and 32-bit Chrome, Google is going to automatically upgrade you to 64-bit web browsing.

(if you have a low budget PC/Tablet with 2GB of memory or Windows x86 (the 32bit version), you will not get this.  A large portion of machines are 64bit hardware with Windows 64bit OS will get this upgrade if running the 32bit version of Chrome.  Most will not notice which versions are installed on their systems unless using somethingn like a program removal tool which you can uninstall the 32bit version.)


Intel Will Rebrand Xeons, Preps Gold, Platinum Workstation Processors


Verizon and AT&T both launched misleading services this week — and it points to a larger problem


How to Set Tabs Aside for Later in Microsoft Edge


Tracing Spam: Diet Pills from Beltway Bandits


Here's what it's like to use Microsoft's new MacBook rival that runs a brand-new version of Windows 10




How Does Secure Delete Work?

There's deleted, and there's deleted. Secure delete is one approach to making sure your files can't be recovered.


Save Files From Damaged CDs


Jelly Is the World's Smallest 4G Smartphone

It runs Android 7.0, costs $109, uses a 2.5-inch display, and is already fully-funded on Kickstarter.


AMD Updates Ryzen’s Windows Power Plan, Boosts Performance With New Chipset Driver


A student who worked in a Chinese iPhone factory explains why manufacturing jobs aren't coming back


How to View Your Facebook Page as Someone Else


Microsoft's Surface Laptop arrives on June 15th for $999


Shodan search engine starts unmasking malware command-and-control servers (this may help all of us by finding and getting rid of the malware waiting to infect our systems)

The new Malware Hunter service could help companies and security vendors quickly block traffic to malware servers.




Are There Hidden Files that Save Every Keystroke I’ve Ever Typed?

There's a lot of misinformation, and even paranoia, relating to keystroke logging and privacy. Much of it, however, is based on small kernels of truth.


Find and Degrag Fragmented Files


Solving the World's Problems One Online Class at a Time

Now six years old, YaLa Academy provides distance learning and encourages collaboration between those from nations that have traditionally been in conflict.


The Internet Is Under Attack By the US Government


Samsung serves up a Chromebook Pro with an amazing display, and a superlight 15-incher


How to Easily Reinstall Windows 10 Without the Bloatware


Microsoft's lie-flat Surface Arc mouse is a new take on an old formula

It's a refinement of Microsoft's signature eye-catching mouse design.


Microsoft's Surface Laptop feels beautiful

This could be the Windows laptop I've always wanted




Intel Corporation Makes a Smart Move

Intel is apparently building a distinct brand for its gaming-focused processors, which could help boost its chip average selling prices.


Will OneDrive Work For Me?


How to Print From Your iPad

There's more than one way to print from your Apple tablet. Here's what you need to know.,2817,2362451,00.asp?utm_source=email&utm_campaign=whatsnewnow&utm_medium=title


Meet CRISPR: Our Genetic Superweapon


Don’t worry, we’ll help you ditch your iPhone and switch to the Galaxy S8


ISTR 22: Extraordinary Attacks, High-Dollar Heists, Electoral Disruption


Comments by -- Bob Primak --

FYI #906  (Sat 5/6/2017):

How to Easily Set Up Third Party DNS on Linux

I did this a long time ago, and my browser performance (Chrome Beta under Ubuntu Linux) has improved, especially for some web sites.


The One Trick That Hacker-Proofs Your Computer

While it's safer by far than running as Administrator, this trick of using a Limited User Account by no m eans solves all your issues with hackers. 

By the way, the way Windows 10 Home handles whole disk encryption, you cannot log in with a Limited User Account, and you cannot log in without accessing your Microsoft Cloud Account. Doing so as Administrator is just plain reckless. So if you want whole disk encryption and don't want to upgrade to Pro, use VeraCrypt instead.

Back to Top

Sun 907 5/7/2017

UNVEILED: Microsoft's new $999 MacBook killer with over 14 hours of battery life

     Microsoft unveils $999 Surface Laptop running Windows 10 S

     Microsoft unveils Windows 10 S, an education edition limited to Windows Store apps

     Making Sense of Windows 10 S

     Some Quick Thoughts About the Surface Laptop Leaks


US congressman to constituents: ‘nobody’s got to use the internet’


A few lucky cities will get AT&T’s 5G network by the end of the year


Cybereason RansomFree


How Do I Drag Items To Folders In Windows 10?


Google Maps - Everything you need to know!




Import Favorites Into Microsoft Edge


10 tips and tricks to master the Google app for iPhone


How to Share Your iCloud Photos with Friends Who Don’t Use Apple Products


Apple is overhauling its stores, and wants them to be the new Starbucks, says its retail chief


The Best Laptops of 2017

No matter how much you have to spend, laptops are not only more plentiful, but more powerful and portable than ever. Here are our top performers across a range of price levels.,2817,2369981,00.asp?utm_source=email&utm_campaign=lab-report=utm_medium=title


Simple Steps To Protect Your Family Online


What is Kodi and how do you use it?




[Windows 10 Tip] Use “Network Reset” Feature to Fix Common Internet Connection Issues


Great Google apps you didn't know you needed

All Android phones come with a bunch of preloaded Google apps, but these you'll have to download from Google Play


How to Protect Your Mac from Malware


People are getting bored of the same old iPhone, new report suggests


Dok Malware Takes Complete Control of Your Mac

The malware is currently not detected by security suites and uses a valid Apple developer certificate to infect all versions of Mac OS X.


Printer Update Help


UK Man Gets Two Years in Jail for Running ‘Titanium Stresser’ Attack-for-Hire Service




How to get a shared family calendar with a Microsoft Account

Microsoft is making it easy to create a calendar that everyone in your household can access and edit.


7 advanced Google Chrome tips and tweaks that save you time

If you spend most of your workday with Google's browser, you'll want to put these Chrome tips to work, so you can get more done in less time


How to Make Sure Google Has Your Correct Work and Home Address


Apple may use Wi-Fi routers for wireless charging, according to patent filing


The Best VPN Services of 2017

A virtual private network (VPN) is a powerful tool for staying anonymous and securing your web traffic against snooping corporations, governments, and attackers.,2817,2403388,00.asp?utm_source=email&utm_campaign=lab-report=utm_medium=title


More Chrome Tabbed Browsing Tips


The Backstory Behind Carder Kingpin Roman Seleznev’s Record 27 Year Prison Sentence




Back up photos & videos

Save your device's photos and videos to your Google Photos library. This can include photos you take with your device's camera and photos saved on your phone.


Shoulder Tap Internals in Redstone 3 Build 16184


How to Reset (or Tweak) Chrome’s Download Settings


How to get a refund from the Google Play Store


Modern “Hackintoshes” show that Apple should probably just build a Mac tower

Today, running macOS on PCs isn't just a way to avoid paying Apple's prices.

Back to Top



Back to Top

Page Updated