Analysis Supreme Court ruling on printer cartridges changes what
it means to buy almost anything
Google adds security features to Gmail
Using a dedicated machine learning model, Google is delaying a
small fraction of Gmail messages for more thorough phishing
Microsoft has finally beaten Apple’s legendary keyboard design
Essential? Maybe So
MICROSOFT ANNOUNCES THAT WINDOWS 10 S WILL NOT RUN LINUX APPS
How to Tweak Your Tiles in Windows 10
Here's how to make your Windows 10 tiled screen look and work
better for you.
Six Things You Need to Do Immediately After Plugging In Your New
Pinboard – Never Lose Bookmarks Again
Pinboard allows you to save bookmarks once and use them across
multiple machines, operating systems, browsers, and devices.
Healthy security cultures eat lots of phish
Our company got hit with the Google Docs phishing scam along with
many others. Our security culture protected us from harm.
HP Omen Accelerator Adds External GPU, SSD, and More for Laptop
Windows 10 Fall Creators Update (Redstone 3) Builds Changelog
How to build a Raspberry Pi-based desktop PC
Build your own under-$100 desktop Linux PC with Raspberry Pi; just
don’t expect it to be a true PC
After Massive Phishing Attack, Google Improves Gmail Security
How to ditch Microsoft Edge as your default PDF reader on Windows
Does Microsoft Edge keep opening your PDF files even when you've
installed another PDF application? In this guide, we'll show you
the steps to fix this issue.
Misguided Driving: 3 Smartphone Habits to Quit Behind the Wheel
How to get Android Auto in your car (and why you want to!)
Firefox finally unveils its faster, more memory-efficient browser
Microsoft’s “Always Connected PCs” Initiative Brings eSIMs to PCs
HOW TO MAKE YOUR OWN 3D CREATIONS WITH PAINT 3D
The Best Gadgets for High-Tech Grilling
The oldest form of cooking has moved well past the dark ages of
kettle grills and charcoal briquettes. Here are all the gadgets
you need to host the ultimate high-tech barbecue this Memorial Day
How to Download Movies and Shows From Netflix for Offline Viewing
5 of the Best Sandbox Applications for Windows 10 (an added layer
of protection, but expect a learning curve on how to do things you
currently do with a sandbox program active)
I’ve Been Told My Computer Has a Virus, But My Anti-Malware
Program Doesn’t Remove It. What Do I Do?
Making sure your anti-virus program and its definition database
are up-to-date is the best way to make sure it can recognize and
Human weakness enabling financial cybercrime
A Boston police detective told the Boston Fed’s 2017 Cybersecurity
Conference that one reason cybercrime is rampant is because
victims make it too easy
Microsoft Preps ‘Advanced’ Windows 10 Pro for Workstation PCs
How to Check Which Windows Version is Installed in My Computer?
Linux: Is Lubuntu better than Xubuntu?
Also in today’s open source roundup: How to kill a process from
the command line, and ReactOS 0.4.5 has been released
This 35-inch Curved HDR Monitor Is a Gamer's Dream
Seeing a Command Prompt box flash quickly on Windows 10? It's
because of Office, and here's the fix.
Do you see a Command Prompt box flash quickly on Windows 10? It's
Office 365 fault. There is a fix coming, but here's what you can
Amazon’s New Home Assistant Shows & Tells
3 great hacks for your Android device
Acer crams GeForce GTX 1080 graphics chip into its super-thin
Tip: Kill Those Suspicious Pop-Up Windows
HOW TO INCREASE YOUR INTERNET SPEEDS
To Spread Thunderbolt, Intel Will Let Others Make it, Royalty-Free
Expect to see Thunderbolt ports on many more computers,
peripherals, and even VR headsets once Intel opens up the
specification next year.
How to Disable the Search History in Windows File Explorer
Using Activity Monitor to Easily Troubleshoot Your Mac
What’s the Difference Between a “Trojan Horse”, a “Worm”, and a
There are many different terms that relate to software with
malicious intent. Ultimately, however, there's only one you really
need to know, and several things you need to do.
Top 10 Most Dangerous Phishing Attack Of The Week
Kaspersky Accuses Microsoft of Unfairly Disabling Its Antivirus
Behold, the spear phish that just might be good enough to hook you
Attackers are coming up with creative ways to trick you into
opening malicious files.
10 Unix commands every Mac and Linux user should know
Get started with Bash, Unix pipes, directory navigation, sudo,
Nano, and other command-line essentials
Best Gadgets for Home Cooks
Intel's tiny Compute Card will start shipping in August
Restoring Backed-Up Photos
Tech News This Morning - Wednesday, June 7th, 2017
WATCH NOW: Why you should ALWAYS delete your web cookies
Apple's Siri-powered smart speaker will reportedly debut next
Thinking About Microsoft’s Mobile Fantasy
TOP 6 PLACES TO TEST YOUR INTERNET SPEED
How to Make Windows Shut Down Faster
We Trust Heart Surgery Robots More Than Banking Robots
HSBC surveyed 12,000 consumers and found twice as many would trust
a robot to perform heart surgery than handle their savings. Is
anyone except HSBC surprised?
How to Make Use of Console Messages to Troubleshoot Your Mac
External drive died? Your data may still be easy to recover
Cyber Security: “We have met the enemy and it is us.”
IBM Announces 5nm Breakthrough Using Silicon Nanosheets
Thieves drain 2fa-protected bank accounts by abusing SS7 routing
The same weakness could be used to eavesdrop on calls and track
How to use Windows Libraries effectively in Windows 10
41 Best Google Chrome Extensions
How to expand your Surface Book's storage the cheap and easy way
Can you upgrade the storage in a Surface Book?
The Facebook Safety Rule Parents Break Every Day
Absolute best apps for your Android
It looks like Apple has some work to do if it wants Siri to be as
smart as Google Assistant
Microsoft says HP's Cortana speaker is a standalone personal
Flagging Treacherous Ground: Converting Security Liabilities into
Comments by -- Bob Primak --
Re. FYI #945
“Hotspot 2.0” Networks?
have this feature turned off in Windows and Android. This scheme
reminds me too much of the supposedly "secure" WPS scheme for
connecting devices effortlessly to home networks. The security was
nowhere near strong enough to prevent hacking. I fear this new
scheme will be just as vulnerable, and unsophisticated end-users
will not know what hit them.
Draft bill gives
the government power to control your drone
legislation would give the government sweeping powers in
causing a hazard or interfering with airport, First Responders,
police or military operations, I would certainly support officials
having the ability to immediately and without question take full
control of your drone and ground it. Then fine you for their
Lobbying Against Right-to-Repair Legislation Across the Country
commented about this planned legal change. While well-intended, in
its current form this goes too far.
Software: Anti-Ransomware Insurance
protection, a backup software still needs to be included in a
well-designed security concept. And especially in times of ever
more diabolical ransomware attacks, the new specialized data
backup applications can help to save time, money and nerves. The
AV-TEST Institute put four new programs onto the test bench,
however only one out of them received the certificate "Approved
Backup & Data Security Software".
wrong with just making periodic Image Backups and disconnecting
your Backup Drives from the PC and the Internet when you're not
backing up or restoring actively? There is no need for specialized
(and costly) solutions here.
On my Windows
10 devices, I have other an antivirus which disables Windows
Defender so it won't even update. That's where I find this tool
useful as a second-opinion stand-alone scanner.
It contains the
full AV engine and definitions of WD, but no active components.
You have to download this big file everyn time you want to run it.
Emsisoft has a similar program, EEK:
How to reset or
clear Data Usage in Windows 10
free a way to log your usage in an ongoing downloadable database.
It's from the Windows Store and it's called Data Usage:
Forces Victims to Play Near-Impossible Game to Unlock Their Own
Batman's The Riddler strikes in the cyber-world!
Again, an Image
Backup and frequent, offline data backups will spare you this
Patch My PC
A Full Review of
Patch My PC, a Free Software Updater
legit, and could supplement or replace programs like Ninite. I
prefer the control of doing my updates manually, working from a
suggestions list. This is what SUMo Lite does.
reportedly working on proper Android ‘Ice’ smartphones with
They're kind of
working against themselves with this. They and their partners are
already a ready source for cheap, unlocked phones. That's how I
got my Moto G4 for about 40% off full retail, unlocked.
Down FAA's Drone Registration Rule
enacted to improve safety, the requirement that recreational drone
pilots register their craft with the FAA is nevertheless unlawful,
a court ruled.
not, the rule proved to be such a regulatory burden on the FAA
that they were abandoning it already. This ruling presumably does
not apply to Commercial Drones.
How to Save or
Transfer Your Favorite Registry Keys to Another PC
This .REG file method is particularly useful when you find a
useful hack like the ones which some of us use to control Windows
Updates and prevent unwanted or premature downloading of unproven
updates. The settings can be transferred to any other PC once set
up in one PC. Provided they are all the same "bittedness" and
Windows version type and version number.
X Review: Makes My MacBook Air Look Clunky And Slow
have been far less kindly in their opinions of this look-alike.
What Is Pharming
and How Can It Be Prevented?
For those who
are wondering, OpenDNS and the more reputable alternative DNS
which you can substitute for your ISP's DNS, are for the most part
well protected from DNS poisoning. Certificates can go wonky for a
lot of reasons, so just because a familiar site has a Certificate
problem, this does not automatically mean you have been
redirected. Chrome, Firefox and other browsers also make an effort
to detect and alert you to redirections and dodgy Certificates.
Re. FYI #946
7 Chrome Flags
You Should Enable for a Better Browsing Experience
I tried most of
these flags in Chrome 60 Beta in Ubuntu Linux. Some results:
1. Automatic Tab
I did not find
this flag in Chrome 60 Beta.
2. Use The
“Material Design” Interface
There are fewer
of these flags, but I tried them.
3. Enable Smooth
I did not find
this flag in Chrome 60 Beta.
4. Quickly Mute
5. Enable Fast
Experimental QUIC protocol
I left this one
disabled, as I prefer other methods to generate passwords on
I also do not
like offline web pages, so I left Chrome Offline disabled.
I will report
if anything goes wrong, or if there are great improvements in my
browsing as I try ouit Chrrome 60 Beta in Linux with these
settings on my Intel NUC mini-PC.
New Material Design UI of Settings Page in Google Chrome
It appears that
many of the Material Design flags are already enabled since Chrome
59 Stable. I noticed this as well. I like the new Settings design,
so I kept it.
Eve V hands-on:
Quirky crowd convertible
Eve promises a
Surface-beating tablet at a disruptive price. And so far the signs
are very promising indeed.
campaign is now closed. We don't know where or when if ever, this
2-in-1 will appear again, nor for what price. The other references
to this project I found include this one:
production runs (as of May 2017) look very, very small, so don't
expect this to show up at Amazon anytime soon. So the whole
discussion is now moot. And will probably remain so. BTW, they
were cutting costs by using inferior Intel chipsets. The ones
which fry under heavy graphics loads.
LINUX TROJAN NOW
AFFECTING RASPBERRY PI USERS
reminder that even the simplest OS and the simplest device, need
to be kept up to date. I believe for older Pi boards, there is a
firmware update which may cover this issue.
The Best VPN
Services of 2017
private network is the best way to stay anonymous online and
secure your web traffic. We've tested more than 50 VPNs, and these
10 are our top performers.
which were listed, but which should not interest serious PC or
device users. (1) Ad blocking, which should be done using other
methods. (2) a free version. No one should be fooled into using a
free VPN, even from a reputable vendor. The free versions do data
mining which the paid versions do not do. And this leaves a trail.
HAJIME IS A
‘WHITE WORM’ THAT INFECTS AND SECURES VULNERABLE IOT DEVICES
nothing benign about breaking into a person's network and changing
router settings without their permission or knowledge. Then
potential to cause expensive harm to folks with ISP provided
gateways is very real. I for one would not want to find out that I
was locked out of my XFinity X1 system due to this kind of
Welcome to the
Messy Future of TV and Communications
In both Chicago
and Boston, I have yet to see Google Internet Services or Comcast
Wireless Services. Am I missing something? If Comcast were to
offer Wireless, I'd still stick with US Mobile (third-tier
reseller of AT&T services) due to my infrequent use of cell data,
no phone streaming over mobile networks, and general low usage per
month. With my current plan, I can buy very little per month, and
renew only that small amount. No long-term contracts either.
Best Tools for
Spyware Removal and Protection
McAfee? Webroot? Are you kidding me?? (Different reasons.) And
nowhere any mention of free products which test as well as or
better than these paid options. But if I had a lot of devices I
would consider BitDefender because it covers all your devices
(including IoT Things) with one subscription.
How to take
control of Chrome with its very own task manager
looking for ways to better troubleshoot Google Chrome, look no
further than the built-in task manager. Here's how to make use of
this handy feature.
something useful I hadn't known about before!
Attack is Almost Impossible to Detect On Chrome, Firefox and Opera
This is a
Cyrillic Character substitution scheme. All major browsers were
patched way back in March for this one. It does not show up the
same in Chrome 58-60.