Home Page

About Us | Become a Member | Calendar | What's New In CCS | Members Only | Tips | Facebook | Site Map


Home Page | News-TipsI | Links

Previous News & Tips -4/16/17 - 4/22/17 Next

Weekly News & Tips Index

  Date News & Tips Number
Sat 4/22/2017 899
Fri 4/21/2017 898
Thur 4/20/2017 897
Wed 4/19/2017 896
Tue 4/18/2017 895
Mon 4/17/2017 894
Sun 4/16/2017 893

Sat 899  4/22/2017

Two years after its launch, the Apple Watch hasn’t made a difference at Apple



How I hacked my smart TV from my bed via a command injection

Giving a whole new meaning to "remote exploits"...



How Do You Safely Add Insecure Devices to a Home Network?



Why the iPhone 8 could cost a lot more than a typical iPhone, in one chart



Change Your Font Size & Change Your Attitude



You don't have to be a 'Genius' to like Albert Einstein drama

Ron Howard directs Geoffrey Rush in "Genius", National Geographic's smart, entertaining drama unraveling the passions and politics that shaped Albert Einstein.



Does Microsoft have what it takes to take on the Chromebook and the iPad?

Microsoft is expected to unveil Windows 10 Cloud next month, and leaked specs suggest that it is being positioned as a competitor to Google's Chromebook platform. And what about the iPad?



How to Get Google to Quit Tracking You

On Maps, Google is with you every step of the way. But you can do something about it.



FBI allays some critics with first use of new mass-hacking warrant

Judge authorized order allowing US to change data in thousands of infected devices.



How to Permanently Disable Windows Defender in Windows 10



Google Photos is Google's best service — here's why you should be using it



How to Combine Text from Multiple Cells into One Cell in Excel



PlayStation 4 vs. PS4 ‘Slim’: The more things change, the more they stay the same



What You Need To Connect Your Tablet To The Internet




Original works of short fiction with unique perspectives on technology, published exclusively by CNET.



It's still difficult to just buy a Google Pixel today, and that's insane



Symantec Links Trojans, Malware to CIA Hacking Tools

A series of computer viruses targeting companies and organizations closely resembles the Vault 7 hacking tools that WikiLeaks disclosed.



BrickerBot, the permanent denial-of-service botnet, is back with a vengeance

New botnet squadrons wage fiercer, more intense attacks on unsecured IoT devices.



Block Tracking Websites with Disconnect for Chrome



Apple is catastrophically late to the self-driving car game




Lesson 2: Managing Your Installed Applications



The Eve V, a crowdsourced Windows 10 tablet, is finally entering production



Help! I Can’t Watch My Videos In Windows 10



Google Maps now helps you travel abroad like a local

A new feature on Google Maps can translate local reviews into your language.



Got one of these 20+ models of Linksys Smart Wi-Fi routers? Bad news. 10 security holesdiscovered

Flaws enable DoS conditions, data harvesting, and more.



With No Bids, Hacking Group Leaks NSA Surveillance Tools

Shadow Brokers tried unsuccessfully to ransom its trove of surveillance tools, so it released them for free.



Windows 10: Create Reset Recovery Image in Windows 10  



How to Quickly Find Out All the Terminal Commands on Your Mac



It’s time for everyone to stop using traditional batteries and buy rechargeable ones instead



How to Install Windows on a Chromebook



Apple said to be building 100M new iPhones as Samsung strives for 60M Galaxy S8s



Ransomware Coming Disguised As Voice Message Notifications



AR is like your phone: Soon you'll feel naked without it

Commentary: VR is here, but the true reality revolution is augmented.



What life after the smartphone will look like



Netflix: Our Biggest Competitor Is Sleep

Amazon, HBO, aren't the real competition as far as Reed Hastings is concerned. He's in a battle against sleep.



Windows 10: Change DPI Scaling Level for Displays in Windows 10  



I've lost my Gmail password: Now what?



This journal breaks down your 10-year plan into steps you can take every day to achieve it



What Are the FOUND.000 Folder and FILE0000.CHK File in Windows?

On some volumes, you may see a new folder called FOUND.000 with a file in it using the .CHK extension. Here’s where those come from, and what they’re for.



How to Make the New Apple iPad Last All Week, Not Just 10 Hours

A few simple tricks can extend the life of the new Apple iPad 9.7-inch.



How to use MacOS Wireless Diagnostics to get the best possible Wi-Fi settings in your area



Comments by -- Bob Primak --

The death of the smartphone is closer than you think. Here's what comes next


One of the more outrageous examples of this kind of thinking:

Motorola Moto Z platform





Virtual Reality (mostly phones like the Samsung Galaxy 8 series)


And countless other examples. Phones are morphing into things we never imagined back in the days when a mobile phone was as big (and at least as heavy) as an actual brick.

So does all of this mean we're not going to be carrying these little phones in our pockets anymore? No. Not any more than "The Death of The PC" has made desktop PCs go away. 

Yes, towers under the desk are becoming rarities, and my little Intel NUC isn't looking so little anymore. 

Now Smart TVs and Smart Appliances are distributing computing power out to the edges of the home network. (Can Smart Routers which contain their own fully functioning PCs be far off?) 

But the desktop PC is still around, and I suspect that smart phones which look and feel like phones will be around for a long time to come.

With or without those strange-looking headsets or glasses for VR Apps. 

Back to Top

Fri 898  4/21/2017

Microsoft’s Preparing to Release Desktop Office Apps in the Windows Store



The Samsung Galaxy Note 8 will reportedly include a dual camera that's 'much better' than the iPhone 7+



This is arguably the best audio upgrade you can make for under $100



Will somebody please make a Chromebook with LTE?



Apple's Hidden MacBook Pro With Touch Bar Discount



Windows 10 Surface Pro 4 lookalike: Chuwi's Surbook goes the budget route

Chuwi has unveiled a Surface Pro 4 clone, but one that features Intel's lower-end Apollo Lake processor.



[Tip] How to Uninstall Modern Apps in Windows 10



Farewell, IDF: Is This the Demise of the Big Trade Show?

Big conferences and shows like IDF and WinHEC attracted tens, if not hundreds of thousands of attendees, and were a great way to get a deep dive on the latest tech. Now they're gone.



How to Reset Password in Windows 10 and Earlier With PCUnlocker



How to Spot Fake Reviews on Amazon, Yelp, and Other Sites



Apple made iMovie and a bunch of its other apps free for everyone



Here's the latest trick hackers are using to hide their phishing URLs



Do You Think Apps Can Really Replace Everything?



How to back up your music files to your computer or online storage



Microsoft Ups The Ante In Enterprise IoT and Edge Computing



Lenovo adds $279 Flex 11 to its Chromebook laptop lineup

The 2-in-1 device features a 11.6-inch touchscreen with 360-degree hinge, rugged design, and support for Android apps from the Google Play Store.



[Guide] How to Remove All Built-in Apps in Windows 10



Is Your PS4 Broken? Check for Roaches

The console's wide ventilation grates at the bottom make it easy for roaches to enter. It also doesn't help that people usually lay their consoles horizontally inside media cabinets close to the ground.



How to Secure Your Dropbox Account



GoPro just unveiled a super high-resolution camera for virtual reality



Facebook and Google are banning bad ads



How to Set Up and Use Cortana in Microsoft Edge Browser



Microsoft to Improve Gmail Support in Mail and Calendar for Windows 10



Will the DeX dock work for business? Maybe tomorrow.

Samsung's new DeX dock is a nifty piece of technology that enables Galaxy S8/S8+ owners to use their phones as desktop computers. But how practical is it?



The godfather of ransomware returns: Locky is back and sneakier than ever

After a mysterious disappearance, Locky has reemerged -- and is borrowing attack techniques from Dridex.



[Guide] How to Reinstall All Default Built-in Apps in Windows 10



How to Measure Home Power Usage

Electricity costs money. Devices can help you save, especially by killing vampire energy leaks... if you know what they do and how to understand your bills.



How to Turn a Raspberry Pi into a Cheap Plex Player with RasPlex



Microsoft is trying to make passwords obsolete, and it might succeed (one idea is to use your smartphone, but OH! you don't have one or you live in a urban area where robbery, armed robbery, muggings and pick-pocketing are high, how do you unlock your computer with no more phone?)



Apple reportedly hired a developer known for making $1,000 VR plugins



Best Free Sites to Legally Stream Movies



Windows 10 Tip: Master Movies & TV



Millions in US still living life in Internet slow lane

DSL and satellite drag down US broadband speeds, new FCC data shows.



The death of the smartphone is closer than you think. Here's what comes next

Every technology rises, then falls: soon it will be the turn of the smartphone. But what will replace it?



How to Fix: 'Your Yahoo account settings are out of date' Error



XYZprinting da Vinci Jr. 2.0 Mix



How to Add the Control Panel to Windows’ File Explorer



Google tackles a major flaw with home assistants



Uber Said to Have Tracked iPhone Users After They Deleted the App



This free app lets you remap the Galaxy S8's Bixby button to any app you want

Better than nothing



Google 50 qubit universal quantum computer could become world’s fastest computer this year



Did you know that cockroaches really love your PS4?



Comments by -- Joe Nowak

Source for Royalty-Free Images

Mon Apr 24, 2017 11:43 am (PDT

If you're looking for that perfect photo to use in your newsletter, flyer, or ad, you should be able to find what you need at one of the 73 sources listed for royalty free photos.

Get Visual: 73 Places to Find Amazing Royalty-Free Images for Your Business


 Back to Top

Thur 897  4/20/2017

Thousands of Hacked Home Routers are Attacking WordPress Sites

Update: By popular request, we have created a tool that lets you check if your own home router is vulnerable to the problems discussed in this post.  (later on are two such articles)



How Does a VPN Protect Me?

A VPN, or Virtual Private Network, is a fully encrypted and private internet connection via a VPN provider. I'll look at what protection it offers.



Microsoft Announces Next Windows 10 Feature Update (Redstone 3) Coming in September 2017 (where we've been, where we are, and where we will be)



Time’s Running Out For Office 2007, Samsung Adds Bixby Button For Instant Personal Assistant, and iHeart Radio App Hits 100 Million Users



5 Security Tools You Should Have on Linux



Ads for voice assistants are here and they're already terrible

Can commercials ruin the Amazon Echo and Google Home?



Using RPGs to Solve Environmental Problems

Landscape architects at North Carolina State University developed open-source modeling software that uses the basics of role-playing games to help solve environmental problems.



Run Android Apps on Your Windows PC



How to Install Tor Browser to a USB Drive and Surf Privately Wherever You Are



Go big or go home: Why you should buy the larger Galaxy S8+



How Do I Encrypt a Hard Drive Using VeraCrypt?

VeraCrypt makes is easy to encrypt whole drives, making it safer to travel with your data. Here's how to safely encrypt and then access your data.



[Windows 10 Tip] Restore “Open Command Window Here” Option in SHIFT+Right-Click Menu (this applies to the Creator's edition of Windows 10 - 1703)



Single-Space In WordPad



What Are Kodi Boxes and Is It Legal to Own One?



What Is the ProgramData Folder in Windows?



11 TV Episodes You Can Download Free on Google Play Right Now

These could disappear at any time. You snooze, ya lose!



How to turn your Mac into a digital video recorder for over-the-air TV

In the rush to pay for Internet-delivered streaming media, don’t forget that you can capture free programming.



Avoiding “Juice Jacking” Attacks on Your Phone



A secret prototype at Apple is reportedly causing eye pain, and it's stoking smartglasses speculation



Get the Windows 10 Creators Update Now, If You Like

If you're eager to get the newly released Windows 10 Creators Update, I'll show you how.



[Tip] Restore Command Prompt Shortcut in Win+X Menu in Windows 10 (this applies to the Creator's edition of Windows 10 - 1703)



Insufficient Backup Space



5 Easy and Affordable Smart Home Devices You Don’t Want to Miss



Windows 10: Optimize Battery Life when Watching Movies and Videos in Windows 10  

 Optimize Battery Life when Watching Movies and Videos in Windows 10



How to Recycle Your Technology

Do your part by donating your old tech or getting rid of it in an environmentally safe way.



Samsung’s Bixby is even less useful on the Verizon Galaxy S8 at launch

Verizon is ‘working with Amazon’ to let you shop with the Galaxy S8’s camera



Best wireless router

Few elements of your home’s infrastructure have a bigger impact on your tech life. We’ll help you find just the right router to anchor your home network.



Someone rendered that leaked iPhone 8 design, and it looks even worse than we thought



What’s the Difference Between Spam and Junk Mail?

"Spam" and "junk" mean the same thing when it comes to email. There's a lot of confusion about how they, your email service, and your email program all interact.



[Tip] Different Ways to Open Control Panel in Windows 10 (this applies to the Creator's edition of Windows 10 - 1703 The Control Panel is slowly disappearing, but some things are still only found there.)



Amazon Email Scam



2017 Guide: The Best Cheap SSDs

The ongoing price wars between SSD makers benefit you! Here's how to shop for a new budget SSD, along with our favorite picks.



Windows 10: Change Cortana SafeSearch Setting in Windows 10  

 Change Cortana SafeSearch Setting in Windows 10



Samsung Gear VR (2017)



Watch this all-electric ‘flying car’ take its first test flight in Germany

Lilium Jet claims its can reduce travel headaches with a network of vertical take-off and landing aircraft



What cord-cutting TV antenna users need to know about the FCC's spectrum auction

Big changes are coming to local broadcast TV stations. Here's how they'll affect cord cutters.



The best tablets you can buy



12 Steps To Keep from Getting Your Account Hacked

Here are the steps you need to take to prevent losing your account - forever - to a hacker.



Updates on CyberSecurity, WordPress and

what we're cooking in the lab today.

Check if Your Home Router is Vulnerable (check next article)



Inside the Tech Support Scam Ecosystem



There's now a tool to test for NSA spyware

A script that detects a related code implant has shown as many as 100,000 systems worldwide may be infected



HP ScanJet Pro 3000 s3 Sheet-Feed Scanner



Here Come Apple's "iMac Pros"

The new "server-grade" all-in-one desktops are due out later this year.



As US prepares to gut net neutrality rules, Canada strengthens them

Canada cracks down on zero-rating while FCC allows paid data cap exemptions.



Comments by -- Bob Primak --

Happening Soon

AT&T email users to lose access to Yahoo Groups



Setting up a Yahoo ID for continued access


If you have an AT&T email address which is your current access to Yahoo sites, take action!


Antivirus Quarantine and Removal Can Mess Up Windows Security Permissions

I ran into a dire warning from Chrome about downloading Java JRE Update (whatever) from the Filehorse download site. This site in the past had been perfectly benign and never served me adware or malware. But this time, the Chrome warning was only too real. 

Avira detected a malicious installer and Quarantined it. I decided to trust Avira after seeing that the file name was altered by Filehorse from Oracle's official file name. 

Then loads of troubles broke loose, as I could not remove the listing from the Admin. Downloads Folder for the rogue download from Filehorse. Windows Permission was denied -- I knew then and there I was in trouble. 

Other weirdness with Windows Permissions followed as I proceeded with other non-Microsoft updates.

Later, I tried to do a limited run of MS Updates (after running wushowhide to hide the current CU and one other big update)... 

10:31 AM 4/23/2017 I cannot run Microsoft Updates on this PC anymore!! Something has really wrecked this Windows installation, and I have no recent backups! Now I'll have to spend all day reinstalling EVERYTHING!!! 

Did I mention? I HATE WINDOWS!!!

(I tried various solutions suggested at the Microsoft Sites to repair Windows Update, and none worked.) Then...

10:40 AM 4/23/2017 Disk Check (recommended by Microsoft as a last resort) found and scheduled a repair of something in the Security Descriptors. I have restarted and the repairs should be completed. Now for the testing.

First, Can I remove the Download entry from the Filehorse Malware?

Yes. Now, Can I install the Flash Player Update? (Try the download from MS Updates first.)

Yes. So I have a probable analysis of what happened.

No need to try the MS Updates Catalog download, which said it was not for my system the last time I tried to run it. This error can mean lots of things, not necessarily that I downloaded the wrong version of the update.

Avira Quarantined the Filehorse Malware. I Removed the Malware from Avira's Quarantine. This changed the security descriptors for this Account. As the Administrator Account, this is a very bad event. Running Checkdisk /-R (perform repairs on next restart) can restore the security descriptors in this case. But not always, if a lot of damages were done by the Malware or by the Repair attempts of Avira. Any AV product can make these sorts of undesirable changes BTW, not just Avira. It's best to note that Filehorse is a Malware Site, and never get downloads from there again. Google is not kidding with their warning in Chrome about this site!

And did I mention? I HATE WINDOWS!!

In all fairness, even in Linux, I have downloaded software and updates from third party sites, and found the Ubuntu Software Center's installer refused to play nice with these downloads. Then the downloads themselves were difficult to remove in some cases. Still, this issue sure beats installing something which crashes the OS at the kernel level. In Linux, at least there is only minimal risk of having the system hijacked at the OS kernel level. So the risks of rogue third party updates and software are not restricted to Windows.

Oh, and did I mention? I HATE WINDOWS!!


FYI#896  (Wed 4/19/2017)

How Do I Encrypt a Disk?

This article and the comments (and the link for using Bitlocker when TPM is not available in a PC) makes me cringe at the thought of encrypting an entire Windows drive. Windows is a fragile enough OS without introducing further sources of instability. 

There is a version of Microsoft Drive Encryption which is available to Home Users, with a Microsoft Cloud Account. (In other words, you must log in with your Microsoft Account, and the Account on the device must be an Administrator Account. There is no TPM bypass policy for this method.) I do not recommend this method, as it leaves your passwords and keys with Microsoft and locked up in the Cloud. In other words, if you have no Internet Connection, good luck unlocking your drive.

What happens when an encrypted System Drive receives MS Updates? 

As for backup, Acronis was a poor choice (in comments). Macrium Reflect does not trip over Bitlocker or Veracrypt volumes. 

Cloud Backup is a very poor choice for those with large amounts of data to back up. The amount of bandwidth used by such backups is only one issue. Better to have several unencrypted backup copies in several locations, all offline. (Windows File History can make the first round of backup.)


How to Use the Snipping Tool in Windows to Take Screenshots

This is one of my favorite Windows built-in tools. Very useful, and a good article on how to use it.


You can now sign into your Microsoft account without a password: Here's how

Mastercard Adds Fingerprint Sensor to Biometric Card

RandolphRandolph3 days ago

So when someone steals your phone, they are you and you're nobody!

ReplyReplies (1)30


RoyB3 days ago

My thought exactly. A portable device is the worst security I can think of. 2 Step Verification is the best so far.

(Me, Now)

Fingerprint sensors which can fit onto a credit card can't distinguish between a live print and a copy. However, Windows Hello with a RealSense 3D webcam (even the $70.00 ones) will work just fine. 3D cams can distinguish a real face from a photo.


Pin the Control Panel to Your Taskbar for Quicker Access to Your Most-Used Windows Tools

I have mine pinned to the Start Menu and the All Apps List. But to each their own.


Bose accused of spying on end users, data mining their private records via headphone app

NBC News update Friday, April 21, 2017 -- Bose answered the charges. 

It's simple and anonymous telemetry. No Personally Identifiable Info is collected or transmitted. The case is dead. If you don't like telemetry, don't install the phone app. Duh.


5 Ways To Get Internet On A Limited Budget: Part 2

Here's Part 1



Have Cable? Use a Hotspot From Your Cable Provider

Who has Cable TV but no Internet? It's always the other way around. And without bundled services, the company's hotspots are not available to you in most cases. Comcast only has hotspots for people who themselves have Comcast modems. With AT&T, if you are a Wireless customer of theirs, you may be able to access their WiFi Hotspots, depending on your plan.


Google Developing Own Ad Blocker for Chrome

Guess whose ads this probably will not block?


Dell's new high-end all-in-one PC offers Ubuntu Linux or Red Hat Enterprise Linux

This is not what I think of as an all in one. It's a Desktop PC without a separate Tower, that's all. And for a Linux machine, this one's price is through the roof, even with all that hardware (which for Linux is massive overkill). You'll do a lot better at System 76, and putting Linux on an Intel NUC bolted to the rear of an HDTV monitor will cost you even less, with comparable performance under Linux. 


Lower Your Internet Bill with This $39 Modem

This modem does not comply with the soon to be implemented DOCSYS 3.1 standard, which for Comcast XFinity mid to upper tier customers, will be a real problem. It also will not support Comcast's WiFi Hotspots. Otherwise, this is a nice looking option.


Chrome Blocks Crafty URL Phishing Method

This patch requires updating your browsers. Don't wait for them to automatically update. Do it manually, and do it soon. Chrome 58 is not sufficient -- you need the latest dot-version, just released this week. Firefox was also updated this week. Probably Opera is in the same situation. IE, Edge and Safari were never vulnerable. I just got the updates for my Linux browsers a few days ago.


How Do You Safely Run an Untrusted Executable File on Linux?

The term "untrusted" in Ubuntu does not mean there's a security risk (although there may be one). It means that the executable does things which may make Ubuntu unstable, especially if kernel-level resources are going to be changed by a Binary. 

This is the reason many of the fixies by third party devs for the chronic NVidia graphics drivers issues in Ubuntu (especially after a kernel upgrade to version 4.8 or higher) have been branded "untrusted" by the Ubuntu Devs. 

Ignoring this warning can lead to GUI issues, failed logins and black screen issues.

Basically, any third party app or executable which does not have a registered Security Token (these can be imported) will be labeled "untrusted" and may be prevented from installing or running. This is not usually a security warning -- it has more to do with system stability.

My recommendation -- if you can't update to a stable NVidia driver, revert your system to an earlier kernel version (like version 4.4). You won't have issues with most other updates if you do this, and security is not compromised as long as you receive updates for your kernel version.


How To Create A Password That Will Take Years To Crack

The safest way to deal with passwords is by using a password manager which is not tied to your web browser. After that, most PW Managers will generate strong passwords and you can adjust them to use whatever constraints the web site places upon you. The Master Password should be something you can remember, so the method in the article might be as good as any for that limited purpose. But in general, as regards passwords --  Windows Hello can't come soon enough!



This change is one of the best updates I've seen for these Digital Assistants in all the time they've been around.


User-made patch restores Windows Update for blocked processors

As I have posted before, what good is this hack for Windows Updates, if Drivers for the older OS versions are not made available for these devices? And like any third-party hack, it is vulnerable to being made obsolete when Microsoft changes their Windows Update authentication scheme again. 


Back to Top

Wed 896  4/19/2017

Devilishly Clever Phishing Scam Could Fool Even the Most Cautious Into Revealing Their Passwords

Many popular browsers are vulnerable. Is yours one of them?



It's easier than ever to delete old apps from your Android phone



Apple Might Be Preparing to Overhaul the iPhone



Forget Typing: Facebook Teases Internet Mind Control

You could also be able to listen to speech and other sounds using an artificial skin. It's all part of Facebook's advanced Building 8 research efforts.



How Do I Encrypt a Disk?

For many, it's important to be able to encrypt a disk entirely. Particularly if a portable machine contains sensitive data, whole-disk encryption is key.



Raspberry Pi challenger Asus Tinker Board hits US: Faster, more memory, $60

US hardware enthusiasts can now buy Asus' high-performance alternative to the Raspberry Pi.



How to Use the Snipping Tool in Windows to Take Screenshots



Flaws let attackers hijack multiple Linksys router models

Attackers could exploit the vulnerabilities to crash routers, extract sensitive information from them or take them over



Humans are (still) the weakest cybersecurity link

Companies are regularly compromised by social engineering schemes, such as phishing and ransomware. Here’s what they can do prevent attacks and, if that’s too late, mitigate the damage.



Find Your Forgotten WiFi Password On Mac OS



You can now sign into your Microsoft account without a password: Here's how



Mastercard Adds Fingerprint Sensor to Biometric Card

Now thieves will have to figure out how to steal your fingerprint as well as your card and PIN.



How Do I Encrypt a Folder?

It's not uncommon to want to encrypt a folder and all it contains. There are several techniques to encrypt a folder, each with pros and cons.



How new national cybersecurity center aims to make Poland a tougher nut to crack

Juliusz Brzostek, director of Poland's NC Cyber, explains what the country's cybersecurity center has been up to in its first nine months of operation.



Pin the Control Panel to Your Taskbar for Quicker Access to Your Most-Used Windows Tools



You can now sign into your Microsoft Account without a password

It's not necessarily faster than entering a password, but it is easier.



Bose accused of spying on end users, data mining their private records via headphone app



5 Ways To Get Internet On A Limited Budget: Part 2



Apple’s most powerful computer in years will be in stores by Christmas



Google Developing Own Ad Blocker for Chrome

It would specifically target adverts deemed "beneath a threshold of consumer acceptability."



How Do I Encrypt a File?

Since most encryption tools are designed to encrypt collections of files, the best approach to encrypt a file isn't always obvious. I'll look at a couple of alternatives.



Dell's new high-end all-in-one PC offers Ubuntu Linux or Red Hat Enterprise Linux

Do you want a no-expenses spared Linux desktop? Then check out the new Dell Precision 5720.



How to Stop Windows from Adding “- Shortcut” to Shortcut File Names



Lower Your Internet Bill with This $39 Modem



How to improve your Wi-Fi range and reception at home



Don’t Miss Out On Android’s Help For Visually Impaired



World’s top Apple insider says Galaxy S8 is great news for the iPhone 8



Chrome Blocks Crafty URL Phishing Method

By using non-Latin Unicode characters, it's theoretically possible to register a domain name for a phishing website that looks nearly identical to the one it's trying to spoof.



The 5 Best Chromebooks You Can Buy Right Now



Terrified about cyber ninjas? You may be missing the real threat

The security industry has been urged to do more to help protect individuals from low-level attacks.



How Do You Safely Run an Untrusted Executable File on Linux?



7 Ways to Keep Your Smartphone Running Like New



Don't get bit by zombie cloud data

Data you thought you had deleted from the cloud can come back to haunt you. Get to know your provider’s data deletion policy



How To Create A Password That Will Take Years To Crack



Cockroaches could be hiding in your game console, waiting to pounce — here's why



macOS 10.13 — Everything you need to know!






User-made patch restores Windows Update for blocked processors

You shall not receive further updates ... Oh yeah?



Comments by -- Bob Primak --

FYI #895 (Tues 04/18/2017)

Linux desktop operating system: A beginner's guide

This is one of the best and most concise beginner's articles on Linux I have ever seen posted. I recommend this piece to anyone who wants to know the basics of Linux and how to get started with any Linux Distro.


Chrome, Firefox, and Opera users vulnerable to Unicode domain phishing attacks

Internet Explorer, Microsoft Edge, Safari, and others don't appear affected. Opera is affected. 

This was supposed to be patched in Chrome 58. Just keep your browsers up to date and you will be fine, they say. BUT... 

The article is correct about "if it looks like apple.com, you are vulnerable". The example's URL looked just fine in Chrome 58 under Ubuntu Linux. I copied the URL into a text editor (in Linux), and it definitely is not reading "apple.com"! 

(Read the linked original explanation from the discoverers of the exploit. I am on the Chrome Beta Track in both Windows and Linux, so if you're still on Chrome 57, you are vulnerable. The site URL and the message will still show up exactly the same way in Chrome 58, so you are still vulnerable.)

"Firefox users can limit their exposure to this bug by going to about:config and setting 'network.IDN_show_punycode' to 'true'. This will force Firefox to always display IDN domains in its Punycode form, making it possible to identify malicious domains."

In Linux, Chrome 58 does NOT automatically display Punycode renditions as anything unusual. 

Chrome has made available an Extension (PunyCode Domain Detection), whose little icon turns red when a possible Punycode Phishing site is accessed. This is the best defense at his time for Chrome users (both Windows and Linux, and even Chrome 57 and earlier). Don't forget to enable the Extension for Incognito Sessions as well. 

Firefox users can try the configuration change suggested above. 


Bose Accused of Spying on Listening Habits

So where's the evidence of this alleged behavior? Where are the datasets which allegedly demonstrated this "spying"? 

Chances are, this is no more personal than Microsoft Windows telemetry data. Those data are aggregated and do not reveal personal information individually.

But if the data are being used for Suggestions or Targeted Ads (like Microsoft's Cortana and Bing data) then the consumer needs to be informed in advance, and there needs to be a clear opt-out available for such data sharing.


How to Retrieve Folders, Files With Windows 10 Quick Access

Since I do file backups across multiple partitions and physical drives with Copy/Paste, this feature is very handy. Just remember to trim down the list once in awhile to prevent it from becoming overloaded. 


Ransomware is now so awful it's actually making us take security seriously

I haven't had any of these issues, but maybe that's because I have always taken security and web safety seriously. 


From My Own Reading:

User-created patch lets Kaby Lake and Ryzen PCs receive Windows 7 updates

But it may be more trouble than it's worth.


But Updates are only one side of the coin here. Drivers and firmware are the other side. If there are no Windows 7 or 8 drivers being issued and updated for these PCs and devices, what good will up to date MS Updates do? PC hardware and firmware (including EFI Boot firmware) are optimized to run only one OS version in Windows, and running anything else will cause problems if drivers and firmware aren't modified or adjusted.


19% off TaoTronics LED Dimmable Touch Control Desk Lamp with USB Charging - Deal Alert


The price is right, and this light looks good for using a PC in the evening. The charging port sounds quite capable. 

Back to Top

Tue 895 4/18/2017

Chrome, Firefox, and Opera users vulnerable to Unicode domain phishing attacks

Password managers to the rescue!



Chinese Brand Chuwi's Latest Budget Laptop Has Same Panel As Microsoft Surface Pro



Homeland Security warns of 'BrickerBot' malware that destroys unsecured internet-connected devices

Reminiscent of the Mirai botnet that brought down large swathes of the US internet last year, this new malware targets poorly secured Internet of Things devices and renders them useless.



Linux desktop operating system: A beginner's guide

If you don't know what the Linux desktop operating system is, or if you're new to it, Jack Wallen's quick explainer will get you up to speed.



The Best Home Security Cameras of 2017

If you want to keep an eye on what's happening at home when you're not there, but you don't want to invest in a full-fledged home security system, a Wi-Fi-connected camera is worth a look. These are the best we've tested.



How to prevent your smartphone from keeping you up at night



Bose Accused of Spying on Listening Habits



Get Command Prompt From Any Folder



How to Remove Bloatware from Your Android Device without Rooting



5 common problems with Apple TV and how to fix them

Apple TV is only getting better with age, but that doesn't mean it's perfect. Here are five of the most common problems with Apple TV and how to fix them.



With a radical redesign, the new Google Earth takes you on a brand-new voyage



How to set up a new Windows 10 PC perfectly in one hour or less

Doing a clean install of Windows used to be a tedious process that could take the better part of a day. With Windows 10 and cloud-based software and services, you can get the entire job done in an hour or less.



Google Chrome wants to help you block annoying ads (The 3:59, Ep. 214)

Also on the show: Facebook's Building 8 and Verizon's unlimited data push.



Lenovo Flex 11 Combines a Chromebook and a Tablet

Four modes make this $279 2-in-1 a very flexible laptop/tablet hybrid.



5 things you can do with the new Google Assistant



Facebook Admits Slow Response to Murder Video



Free Sound



How Does Audio Compression Work, and What Is “Lossless” Audio?



3 ways to take faster screenshots in Windows 10



'BankBot' malware targeting hundreds of Android apps sneaks onto Google Play Store



Free to iPhone, iPad, Mac users: Apple is now giving away its iWork and iLife apps

Even if you own older Apple hardware, you can now get Apple's iWork Office rival and iLife apps for free.



How Facebook wants to redefine urban wireless connectivity with Terragraph

At its F8 developer conference, Facebook explained how it would use its Terragraph wireless system and computer vision software to extend the capabilities of fiber in cities.



7 Easy Ways to Make Your Android Phone Less Annoying

Smartphone frustrations can snowball and add real stress to your day. Here are seven quick and simple things you can do to make your life just a bit easier.



Android's new filters will help you purge unused apps

A revamped Google Play section helps you sort and update your app library.



8 Reasons Not to Get a Galaxy S8 Right Now



Galaxy S8 Camera Pro Mode



Report: Google Chrome to Block “Bad” Ads



IoT malware clashes in a botnet territory battle

The Hajime malware is competing with the Mirai malware to enslave some IoT devices



Apple is having trouble getting the iPhone 8’s signature feature to actually work



Microsoft makes three more cognitive services generally available

Microsoft is rolling out more of its Cognitive Services programming interfaces, which provide developers with a way to add face recognition, computer vision and more to their apps and services.



How to create professional looking movies with Google Photos

If your business needs to add video for marketing, and you don't have the creative skills necessary, Jack Wallen shows you how to make use of Google Photos for easy movie creation.



How to Retrieve Folders, Files With Windows 10 Quick Access

Windows 10 offers a feature in File Explorer through which you can snag your most frequently used folders and recently used files. Let's check out how it works.



Apple is unexpectedly discontinuing Apple Music and iCloud subscriptions



PSA: Yet another reason not to click on links in suspicious emails



Deleted Outlook Contacts Are Still Showing Up



Samsung Galaxy Book Launch Begins April 21



A Western Digital 4TB external hard drive is $90 right now

A sub-$100 price for this amount of storage is a great deal.



It’s official: Everyone hates the iPhone 8 design that just leaked



Ransomware is now so awful it's actually making us take security seriously

'I've got nothing worth stealing' is no longer a good answer.



How to install Asterisk on the Raspberry Pi

Are you looking for a phone system for your small business or home office?






Comments by -- Bob Primak --

FYI #894 (Mon 4/18/2017):

What Are “Hotspot 2.0” Networks?

While this is an interesting concept (especially if Comcast adopts it) the infrastructure has not yet been built out for this feature. Like so many features new to Windows 10, this setting is mostly just a place holder for a future capability.


From My Own Reading -- Tech Topics

Securifi Almond 3 Smart Home Wi-Fi System review: An okay router bolted to a strong smart home hub

(As I would expect form a name like Securify, this router does take measures to secure the network and the IoT Things connected to it, as well as some Android and iPhone security measures. Pretty pricey if you go for the Mesh extenders, though.)





7 advanced Google Chrome tips and tweaks that save you time

(I use most of these myself every day, even in Linux. CloudPrint works well with my Epson XP 410 wireless all-in-one printer.)



You can now sign into your Microsoft Account without a password


(Not good on your at-home PC, but eliminates typing passwords into a smartphone. Coming in the Creators Update. Note that this app can be set up for fingerprint recognition, which on most phones is insecure. But it can also use a PIN.)(For at-home PCs, there are some RealSense 3D webcams coming out which can work with Windows Hello. The price point for these cams seems to be under $70.00, which while pricey, does fall within the consumer market pricing range.) 


Comments by -- Joe Nowak

Latest CyberHeistNews

Tue Apr 18, 2017 11:28 pm (PDT)

CyberheistNews Vol 7 #16 Scam of the Week: It's Not a WhatsApp Voice Mail!



Free ebook on photography for the web

Wed Apr 19, 2017 5:04 pm (PDT

For those who like photography for the web, here's a free ebook available for a limited time only.

Photography for the Web



Back to Top

Mon 894 4/17/2017

How to stop those annoying, endless robocalls to your smartphone



Windows 10 privacy settings: What's new in the Creators Update

Windows 10 is still a nosy operating system, but the Creators Update gives you more information and control.



What Is The Difference Between IE & Edge?



How Do You Reopen a Windows Firewall Prompt?



Ubuntu Abandoning Unity in Favor of GNOME: What This Means



Acer Chromebook 14 for Work (unusual, a Chromebook with a Intel Core i5 processor and more than 4 GB memory (8 GB))



Redstone 3 Preview: Design Language, Animations and More (I'm beginning to wonder where Windows is going)



Windows 10: The best hidden features, tips, and tricks



Windows 10 'Redstone 3' build 16170 for PC now available for Insiders in the Fast ring (what is coming next)

A new Windows 10 preview build is now available for Insiders in the Fast ring, and it's the first build of Redstone 3!



Google Photos will now stabilize your shaky smartphone videos



Where Do I Report Windows 10 Issues?

There are a couple of ways to report Windows 10 issues. One involves searching for an answer, and the other is a tool built into Windows 10 itself.



How To Save Voice Memos From Your iPhone



What Are “Hotspot 2.0” Networks?



How to Fix a Monitor Not Waking Up After Sleep



The Best Laptops of 2017

No matter how much you have to spend, laptops are not only more plentiful, but more powerful and portable than ever. Here are our top performers across a range of price levels.



Apple selling outdated 32-bit iOS apps that will soon stop working

Apple keeps warning users that 32-bit apps may slow down devices and not work with future versions of iOS. Yet Apple continues to offer -- and sell -- these apps.



Surface Win Says As Much About Apple As It Does About Microsoft (Premium)



New CPUs from AMD, Intel now locked out of Windows Update on Windows 7, 8.1



How Do I Keep Windows Update from Rebooting While I Use My Computer?

You can keep Windows Update from rebooting for certain key hours of the day, within limits... and as long as you're not a work-a-holic.



Apple has a new iPhone menu that makes it way easier to manage your iCloud account



Windows 10 Mail App: Why Can’t I See Bcc



How to Keep Your Child’s Videos Out of Your YouTube History



How to Fix a Mac with WiFi Problems and Dropping Connection



HP EliteBook x360 1030 G2



How to Fix: "Windows has detected your computer's performance is slow" (color scheme) Error



Microsoft + Android: It’s Time



After NSA Exploits Leak, Microsoft Finds Itself in an Odd Position



How do I reformat and reinstall Windows?

To reformat and reinstall is considered the "nuclear option" when it comes to dealing with Windows problems or just cleaning up.



6 Reasons I’m Buying the Galaxy S8 Over the Pixel and LG G6



Virtual Desktops In Windows 7 & 8.1



Jump Between Sections of Windows 10’s App List by Clicking the Letter Headings



Bitdefender BOX: Complete Security for All Your Devices



Asus ZenBook 3 (UX390UA)



10 Essential Security Measures To Keep Your Online Banking Safe In 2017



The PC Market Just (Barely) Bounced Off the Bottom (Premium)



Microsoft Announces Windows Event For May 2nd in NYC



How Do I Repair Microsoft Office?

Occasionally, Microsoft Office programs can become damaged for a variety of reasons. Fortunately, you can repair Microsoft Office.



Own an Aga oven? Hackers can turn it on and off, security experts say



Look Out For Fake FB Friend Requests



Updates to Silicon Support Policy for Windows (all Windows users need to read)



Comments by -- Bob Primak --

RE. FYI #893 (Sun 4/16/2017): (And other stuff)

Mysterious Microsoft patch killed 0days released by NSA-leaking Shadow Brokers


See also:


Microsoft: Past patches address leaked NSA exploits


As expected, the NSA exploits are largely good on systems without up to date patches. But not everything new is old.


4 of the Best Android Apps for WiFi File Transfer

Airdroid looks interesting. I may try it when I get a chance.


How to Take Android Screenshots without an App

Yep, my Moto G4 does that.


Where Should I Sell My Old Stuff? eBay vs. Craigslist vs. Amazon 

(personally, I would not use Craigslist)

eBay may work for items which a lot of people want, and if you have time to manage an auction. But for a quick unload of unwanted items, this is not the best option, IMHO.

If the item is not over $300.00 and you set ground rules for where and when you will show items, I have found that Craigslist was perfectly safe for me during my move. I sold a few items, but one big item (a futon) did not sell. No problems managing traffic or user behaviors. I would not list anything of high value there. I also have successfully used Bookoo (Naperville and Bolingbrook). You can also give away stuff for free at these sites.

What I would not trust as much are smartphone apps which give buyers instant access to your phone number and location (they allow GPS access). That's not a safe environment to do business.


Ubuntu 17.04: The bittersweet Linux release

The sweetness for me will be when they go back to the GNOME interface. I like that desktop environment better than Unity, and it crashes less. The bitter is the continued effort to be like a phone OS, with SNAPS instead of real applications. This comes out of the same failed efforts which led to adoption of Systemd, which crashes much more often than the original startup and program launcher manager. The Software Center is also becoming way too phone-like.


Honesty is not the best privacy policy

Hackers, tech companies and governments want our personal information. Only lies can save us now.

If you think giving out false information is a privacy or security enhancement, you are more a part of the problem than the hackers. Lying is not a good defense -- folks can out your lies and cause a lot of trouble with employers, insurers and credit information companies, to name a few of the risks.


9 Ways You’re Accidentally Damaging Your Smartphone

Good advice here. And I have been pretty careful about all of these things. It's when a phone goes into "turbo charge" or fast charging mode that they tend too overheat. When in use, video streaming and other intensive or continuous uses can cause heat buildup, especially if your case doesn't vent properly (and most don't -- they're also notoriously poor heat conductors, especially when competing with your body heat as in your pocket).


From My Own Reading:

How do you fix the Internet of Things? A better router


(I don't like Norton's products, so I'd choose BitDefender's offering.)


Bitdefender's BOX hardware protects your entire home network, not just your PC


($199.00 for a better firewall, antivirus for all devices, and VPN for away from home (can also be used at home if you don't trust your ISP). $99.00 per year ongoing subscription for unlimited devices. Protects phones and mobile devices. 


Bitdefender Box Review



New Bitdefender Box Promises Tough Smart-Home Protection


The updated model will probably be priced similarly to the existing model, but offers good new features. Also works better if used in a stand-alone configuration without tethering to your ISP provided router (which ISPs hate to allow). 

Norton and BitDefender (new model) will offer their products around summer, 2017. This means wait, install the Windows 10 Creators Update, then choose and install these products.

Street Prices may be lower.


Top 30 free apps for Windows 10


You can't go wrong taking advice from Woody Leonhard.

Back to Top

Sun 893 4/16/2017

(Just a reminder, you should always review the comments left by other readers of the article for their point of view and sometimes a nugget of additional information or additional sources of information.  Particularly important when your doing a search for information about a topic, like a solution to a problem.)


Mysterious Microsoft patch killed 0days released by NSA-leaking Shadow Brokers

Microsoft fixed critical vulnerabilities in uncredited update released in March. (if true, great)






Following Apple, Microsoft may finally bring tabs to Windows apps like File Explorer



THE ANDROID MESSAGING EVOLUTION: How Google is responding to messaging app dominance



How to Set Up Family Accounts in Windows 10

On a single Windows 10 device, you can set up accounts for all the adults and children in your home, and the adults can limit what the kids can do.



4 of the Best Android Apps for WiFi File Transfer



Microsoft’s Cortana Speaker Plans Come in to the Light



How to Use a Raspberry Pi as a Networked Time Machine Drive For Your Mac



Google may be quietly tracking everywhere you go — here's how to turn it off



Windows 10 Game Mode can boost performance after all



What's new in the Windows 10 Creators Update Settings app

The Windows 10 Creators Update delivers a lot of exciting features and enhancements for the Settings app. Here's everything you need to know.



How to find and activate YouTube’s secret Dark Mode



Walmart Adding 'Pickup Discount' to 1M Online-Only Products

If you order online, but opt to pick up your items from a local store, Walmart will lower the price.



How to Take Android Screenshots without an App



Microsoft Will Unveil Project Scorpio at E3



How to Make Windows 10 Look and Act More Like Windows 7



Amazon’s latest sale slashes the price of its super cheap Fire tablet



The Dallas siren hack was carried out with radio signals



Xbox Spring Sale kicks off on April 11 with big savings on more than 350 titles



Microsoft will stop updating the original version of Windows 10 in May



The Best Wi-Fi Mesh Network Systems of 2017

Have a large space with Wi-Fi dead zones? A multi-node system you control from your smartphone might be a better solution than a traditional wireless router. Here's what you need to know about this new crop of products along with our top-rated reviews.



Ethernet vs. WiFi in Gaming: Is There a Real Difference?



A $3 Trillion Market in 2020: 3 Sectors You Need to Watch

The Internet of Things will touch nearly every industry and offers massive opportunities for investors.



Where Should I Sell My Old Stuff? eBay vs. Craigslist vs. Amazon (personally, I would not use Craigslist)



Ubuntu 17.04: The bittersweet Linux release

Ubuntu 17.04 is another solid desktop release, but Unity, its default desktop, is being retired. This new distribution's real improvements are in its cloud and server versions.



Best tablets for taking notes

What's bigger than a Moleskine but smaller than a MacBook? Any of these writer-friendly tablets.



What you need to know about the new Windows Defender Security Center in the Creators Update

The Creators Update introduces the Windows Defender Security Center, which makes it easier to take control of your security settings. Here's everything you need to know about the tool.



Apple is slowly killing the iTunes brand



Google Family Link (for Android)



How to Set Different Wallpapers on Different Monitors in Windows 10



Where Is the Internet of Things Taking Us?

Cisco's former "chief futurist" shares his thoughts about the future of connectivity.



How to Fix Crackling or Popping Sound on a Windows PC



Honesty is not the best privacy policy

Hackers, tech companies and governments want our personal information. Only lies can save us now.



This is how SSDs work and what you can do to make yours last longer

CNET editor Dong Ngo explains how SSDs work and offers a few useful tips on how to make them last a long, long time.



Is the Windows phone fan community imploding?



If you think Samsung didn’t improve the Galaxy S8’s camera, these photos will change your mind



Surface Pro 5: Surface Pro 4 Tablet Successor Reveal Not At May Microsoft Event



All The Cool Kids Are Applying For McDonald’s Jobs Via Snapchat



How to Use Plex on Your Amazon Fire TV and TV Stick



9 Ways You’re Accidentally Damaging Your Smartphone



Comments by -- Bob Primak --

RE. FYI #887 (Mon 4/10/2017):

Why Doesn’t My External Drive Appear When Plugged In?

I can't tell you exactly why, but I have had this happen too. And solved it the same way. Some of my more frequently used drives I have permanently listed in the Windows Registry, with their letters and locations of their logo files. This works unless the Registered drive letter is already in use in Windows. If so, then it's back to Disk Manager as in the article.


Struggling with slow internet? These proven methods will boost bandwidth

My AT&T Internet Service sometimes slows, and in Linux, even quits. This is usually solved by restarting the PC, but sometimes I have to reboot my modem. That indicates that the AT&T network didn't authenticate my home network at their end. There's only one solution for this type of persistent network authentication issue -- switch to another ISP.


A Linux user's guide to Logical Volume Management

This article seems aimed at Corporate Server SysAdmins, not Desktop Linux Home Users. We on the desktop side have gParted and other tools to help manage our logical and physical volumes.


Is There a Way to Know Where a URL-shortened URL Is Going to Take Me?

In Chrome I have an extension, and the browser itself is now checking for malicious shortened URLs (since Chrome 57). This may not be failsafe, but it's a good indicator. 


Antivirus headaches that compromise browser security

The complaint about third-party Antivirus injection is not true of all third party antivirus browser protection schemes. So doing anything to disarm these protections from the server side would constitute illegal hacking. 

The person interviewed talks about "Microsoft Defender". What product is that? If he can't even get the name straight, how reliable is anything else he says? 

The whole thing seems to be toeing Microsoft's Party Line that users should only use Windows Defender and nothing else for AV protections. The problem is, Windows DEfender does nothing to protect third party web browsers. So it's also a pitch to use only IE or Edge Browsers. Cute! (NOT!) 

This article is aimed at the server side of browser security. BTW, NPAPI plugins are dead. Chrome no longer supports them, and they are on their way out from Firefox.


Zotac's Tiny ZBOX Nano PCs Upgrade to Kaby Lake

Depending on pricing, this could be a real contender to challenge the Intel NUC line of very small PCs.


RE. FYI #888 (Tues 4/11/2017):

How to Back Up and Restore an Image File of Windows 10

There are some known issues when restoring from Windows System Image ckup archives. But however you do it, just make sure you have a system image backup before making major changes to your Operating System.


Teaser hints at an imminent rollout for Google Home’s multi-user support

If true, this is the sort of thing users have been asking for -- the ability to keep separate accounts within Google Home.


Gboard studies your behavior without sending details to Google

I like predictive suggestions with mobile apps. When typing on a phone, this saves a lot of backspacing. Not to have the predictions sent to the Googleplex would be a plus.


The Ubuntu mobile dream is over

The platform's developer is ending all its phone and tablet efforts.

Well, this is disappointing. But not unexpected. I have Android now, and it's merging with ChromeOS, so that seems to be the way things mobile arte heading.


Police to Use Hybrids as Pursuit Vehicles

Given that acceleration has been a major issue with hybrids (my Prius included) I have to wonder how many police departments really want to rely on hybrids for pursuits (chases).


RE. FYI #889 (Wed 4/12/2017):

10 Portable Apps Every Linux User Should Use

And yet, with several devices, I find I have no reason to use any of these apps on a protable USB drive. Corporate environments would be a better target for this article.


Mirror Your Computer’s Screen on Your TV With Google’s Chromecast

Given the limitations of Chromecast (and they are many) Miracast/WiDi is a better way top go, if your hardware and OS support it. In Linux there is no such support, so I use Wireless HDMI with a clunky transmitter at the PC end. Neither of my solutions uses the router as an intermediary, which has its advantages.


Recover Files, Folders, Partitions and More with Remo Data Recovery

For $100.00 to actually use this program, I would do the Free Trial first and test it to see if it will work with your situation.


Is There Really A Reason to Hide From Your ISP using a VPN?

Good question. As yet, no one knows. But the idea is, once your info is in the hands of someone else and being sold to others, it is out of your control. Once it's out there, it can never be called back. That's why people are going to some lengths to try to maintain some semblance of control.


Good luck finding a safe VPN

It isn't as difficult as this article pretends it is. Several other articles have more extensive and detailed listings, with descriptions of what if any personal data various VPN services collect and retain. As well as security and privacy measures used by these services. Staying away from free VPN services is a good first step. 


RE. FYI #890 (Thurs 4/13/2017):

Burger King Hijacks Home Gadget for Ad

Google disabled this trick. Now Coke is doing the same thing with Google Search. Betcha they get banned, too.


The best free software for your new PC

Security and backup always generate multiple opinions after reading an article like this one. I prefer Avira for security and Macrium Reflect Free for backup. In fact, the WinPE 10 (bootable USB Rescue Media) version of the EaseUS ToDo program doesn't display properly on my tablet (Win 10 Pro, up to date) so I can't use that product on that device. Macrium Reflect Free does not have that problem. 


RE. FYI #891 (Fri 4/14/2017):

How to use a smartphone app to find your car (excuse me, if you can't remember where you park your car, how are you going to figure out how to use this app, much less the smart phone.)

As one with short-term visual memory issues, I kind of resent the implication that not being able to remember where the car is in a massive parking lot is a sign of stupidity. Keep the comments away from such implications, please. 

I can use a smart phone app a lot better than I can remember visual details after a long shopping trip. And since it uses the car's alarm and disarm signals, the response from the car can be heard a long ways off.


How to use night light in Windows 10 Creators Update

Reports are that this feature does not extend to Windows Mobile, and that it does not affect color temperatures of external monitors (like those used by desktop PCs). There is also no easy way to restore things to the original settings (default  settings). So it's still a work in progress. 


I built this computer for $50—and you can too

Raspbian OS is not Windows. It's Linux -- Debian based. (What do you expect from USA Today?) 


RE. FYI #892 (Sat 4/15/2017):

How to tell if your phone or tablet has a virus

As with computer viruses and malware, the most effective attacks will never leave a trace that the end user will recognize. Do not fool yourself into believing you can tell if your device is infected. That's the job of antivirus, and at least for Android, there are AV options. 


Researchers: Phone Tilt Could Reveal PIN

Given all the ifs ands and buts in this article, I wouldn't worry about this happening to ordinary non-business users.


When is your phone getting Android 7.0 Nougat? We asked every major manufacturer

My Moto G4 got it already. The upgrade was purely voluntary. 

Back to Top



Back to Top


The Chicago Computer Society
P.O. Box 159                      (708) 588-0385
LaGrange, IL 60525-0159  

Page Updated
July 05, 2018

Copyright © 1995- 2011, The Chicago Computer Society, All Rights Reserved.
Send changes to
Jerry Sass Webmaster for CCS