The 10 most
popular apps people keep on their home screens
Cybersecurity Threats Projected to Ignite the Market
Windows 10 Fall
Creators Update news — everything you need to know
UWP Games to
Get More Powerful with Fall Creators Update
How to Disable
the “Is Running in the Background” Notification on Android Oreo
Nest jumps into
home security with Nest Secure
offers an entire home security system with no monitoring required
8 Google Slides
Tips You Should Know Before Your Next Presentation
How to Save
Data When Using Your Favorite Social Media Apps
hack: What are your legal options?
Can you sue
Equifax? We look at that question, as well as what the government
is doing and what you should do if you're one of the 143 million
HOW TO FIND OUT
WHAT DATA GOOGLE, FACEBOOK AND MICROSOFT ARE COLLECTING ON YOU
How to Fix:
Remote Desktop: Another Connection is in Progress Error
Equifax breach affect your Social Security benefits?
The Pirate Bay
website quietly runs a cryptocurrency miner on visitors' PCs,
gobbling up CPU cycles
Users were NOT
happy about a lack of notice…
The Best VPN
Apps for the iPhone
Your iPhone may
be well protected against malware, but it can't protect your data
as it travels the internet. Using a VPN keeps your information
safe and private, even when you're connected to the web through an
insecure Wi-Fi hotspot.
GTX 1050 Graphics Card Prices
Chromebook Pro review: One misstep spoils the show
10 Field Guide Better … And Prettier
How to Check
Your iPhone’s Battery Health
thermostat review: Retains the great functions of the Ecobee3, and
smart thermostat gets just a little smarter.
Power Up Your
Home Wi-Fi Using a Booster or Extender
Hosting Companies Be Responsible for Website Content?
Walsh on ICOs, phishing, and the future of fake news
OUTLINES EXCITING FEATURES WITHIN THE FALL CREATORS UPDATE
Compromised by Hackers - Update Immediately
turn Fitbits into spying devices
distributed by anti-virus firm Avast, contained malicious backdoor
Digitally-signed version of CCleaner 5.33 secretly stole
information from users’ computers.
Report: You Can
Stop a Forced iPhone X Face ID Unlock
force you to unlock your iPhone X using Face ID? Not according to
Apple's Craig Federighi.
Desktop Graphics Cards In Its Mini-PCs
180,000 iPhone apps won't be compatible with iOS 11
for iOS Update with More AI Smarts
Screenshot and Share Snapchat Snaps
Nest Hello is
the company's first video doorbell
bell will be out in early 2018.
Customize the Login Screen on Your Mac
How to Use
Wayback Machine to Archive Websites
enterprise antivirus: Kaspersky leads in latest tests
other threats often get through signature-based antivirus
protection, giving it a bad rap. However, anti-virus tools still
play an important role in the enterprise security strategy.
HOW TO BUILD
YOUR OWN NAS WITH RASPBERRY PI AND LINUX
How To Always
Open Shortcut as Normal window, Minimized, or Maximized in Windows
tricks for your smartphone
threatens almost every connected device with Bluetooth-based
have already addressed the offending vulnerabilities…
Password Managers of 2017
A password like
"123456" or "monkey" is easy to remember, but it's also easy to
crack. With the help of a password manager, you can have a unique
and strong password for every secure website. We've evaluated two
dozen to help you choose.
takedown: Lenovo ThinkPad X1 Tablet vs. Microsoft Surface Pro
Update Feature Focus: My People
Wish List Is Public By Default. Here’s How to Make It Private
motivated by water conservation, saving money, a drive to render
every aspect of your home smart, or all the above, a smart
irrigation controller will scratch that itch.
10 Mistakes Not
to Make as an Arduino Beginner
10 Mistakes Not to Make as an Arduino
How to View and
Revert Changes Made in Google Docs
Android app lets would-be hackers create ransomware without
writing any code
researchers just revealed the existence of Android apps that allow
users to generate ransomware with just a few simple taps. That's
bad news for device security.
HOW TO SAVE
ELECTRONICS AND HARDWARE FROM WATER DAMAGE
How to Find and
Save Windows Spotlight Background Images in Windows 10
Great tactic to
block spam calls on your smartphone
strangles critical vulnerabilities, including in-the-wild zero-day
flaw. Patch now!
The Best Mac
Antivirus Protection of 2017
you may have heard, your Apple computer isn't immune to malware.
We tested the top programs to find the ones that will keep your
Mac the safest.
Digital Bought Toshiba Memory
may soon have an option to keep websites muted
Welp, Vevo Just
Comments by -- Bob Primak --
I still do not
believe there is anything systemically insecure about CCleaner.
But in light of recent tech articles about the details of the
malware injection into CCleaner 5.33 code, I am now recommending
that users completely remove CCleaner and all Registry traces with
Geek Uninstaller or Revo Uninstaller, use something like Glary
Utilities to finish the Registry cleanup, restart and run
If MBAM finds
any further traces, it should (from an Administrator Account) be
able to remove those traces. Then you will have to delete the
quarantined traces, restart, rescan, and possibly one more round
of remnants could show up. That process should complete and leave
you with no further traces of the malware or CCleaner.
It's up to you
whether you download the current version of CCleaner (5.35) and
install it and use it -- I have done so and am not worried about
further issues. Avast assures us that they have taken closer
control over the Piriform codebase and have placed it under
security surveillance, something they probably should have been
doing the day they bought out Piriform. I wonder whether part of
the purpose for the attack was an attempt to embarass Avast? If
so, mission accomplished.
ultrasound commands can be used to secretly control Siri, Alexa,
and Google Now
could send secret commands to speech recognition systems with
Whisper Commands to Alexa, Siri, Google Now
This sounds like
a rich mining ground for practical jokes.
3 School Laptops
You Shouldn’t Buy for Any Reason
makes a good case for the points it makes. But Win 10 S is not
appropriate for students. These days, they know how to program as
early as the fifth grade. They know about Cloud Backup, localm
data backup and maybe even system image backups. For them, the Win
10 S to Pro upgrade (free now, $49.00 later fo cheap laptops and
$99.00 for everything else) would make sense. Start with Win 10 S
in the lower grades, then upgrade to Pro as they get better with
tech. Chromebooks are a strong competitor (with plenty of data and
documents backup) for just about anyone who wants to keep things
cheap, simple and safe.
How to Scan Your
Linux Computer for Viruses and Rootkits
Lately I've been
using ClamTK (GUI version of ClamAV) on my Ubuntu PC. But the
Linux rootkit checkers leave a lot to be desired. They always come
up with posssible rootkits which require a lot of research to find
out they are false positives. ClamAV allows checking with
VirusTotal. And not many false positives to confirm or deny in any
very fast on my NUC, so it's OK to use. No ambiguous findings, and
Rkhunter had a
few Warnings. The worst issue was that it did not recognize
certain Pulse Audio File Types. This might scare a Linux novice,
but I do understand where these File Types come from and why they
are not known to rkhunter. They are simply proprietary filetypes
and codecs I have added from specific audio players or
transcoders. Not a real issue.
So I now have
two more tools to play with in my Linux security arsenal. On my
NUC, they (and also ClamTK) run very fast, so it's never an issue
to do a run when I feel so inclined, and once a month before
making system backups in any case. Kind of boring finding nothing,
though. (Same with my Windows devices, until the CCleaner fiasco.)
Building a Vehicle-to-Everything Chip for Safer Cars
become too reliant on this type of tech, I sure hope no one ever
succeeds in hacking the chip or any parts of the systems it feeds
into or out of, or any device to which it connects. At least there
needs to be a manual override and a police override. Otherwise the
possibilities for mischief and mayhem are staggering.
23andMe Wants to
Turn Your Genetic Data into a Drug-Discovery Goldmine
This is the same
company which keeps telling people they have ancestors in wildly
inaccurate places all over the world, based on insufficient
genetic data. Would you trust this company with your health, let
alone your life? Heck, I wouldn't even trust them not to leak my
data and cause all sorts of grief that way. In any event,
participation must be strictly voluntary, and have no insurance
How to Detect
It took me
awhile to find a format which would play in my Linux inside of
Chrome. The podcast itself was not very enlightening.
Windows 10 Sound
Not Working? Here Are Some Fixes
My Windows sound
issue with my NUC had to do with installing two conflicting
drivers, one of which was from MS Updates. Actually, the Windows
10 driver worked better in the long run. (The other, recommended
by Intel, was a Realtek driver, and that company's drivers are
notorious for not playing well with Windows 8, 8.1 and 10.)
[Windows 10 Fix]
Why Too Many Svchost.exe (Service Host) Process Running in Task
on the change in how ServiceHost Processes are (un-)grouped in
10 Power Users Shut Off Windows Update?
There are less
draconian ways of controlling which updates you get and when,
especially in the Pro edition.But if you know what you are doing,
this is one more safeguard you can add. Too bad we need so many
layers of protection from untimely or buggy MS Updates.
3 awesome apps
that block unwanted robocalls
These are for
sell phones. I am not as familiar with these apps as I am with
Nomorobo, which is for land lines (and VOIP like Comcast Voice).
Using Linux With
Wayland? Here’s What You Should Know
Wayland is a
long way off from mainstream Linux use. I'm not interested in
being a beta tester. (We have a town called Wayland here in the
Boston, MA area.)
How to Check If
a USB Drive Is Bootable or Not in Windows 10
It seems to me,
it would take less time and effror to just restart with the Boot
from USB option in place. That's what I do with all my backup
software Rescue Media when I update them.
credit-monitoring site also reportedly hackable
This does not
surprise me at all. Why let the fox guard your chicken coop?
Will Block Autoplaying Video With Sound Next Year
I would be truly
amazed if this will work on all autoplaying content. Current
blockers simply do not work in every case. It is not in
advertisers' own best interests to allow this to work as
advertised. Google is one of the largest advertising companies on
Smartphone Operating Systems You Can Install Today
None of these is
even remotely usable. There is no such thing as a Linux Phone.
How to Use NMap
to Check Your Linux Computer for Open Ports
This works, but
it's very difficult to install, use and interpret.
Best DVRs for
cord cutters you can buy
is garbage. Many, many drawbacks.
Tablo would not
set up on my old U-Verse network, but might work on my present
Comcast XFinity network. But this device practically assumes
you're using Apple devcies to connect with it and to set it up.
I own a TiVo
Roamio OTA DVR now, and I liked how easy it was to set up on both
my old network and my present network. Komando did not include the
Guide subscription cost with thhis DVR. It adds about 40 percent
to the base price.
BUT... ATSC3 is
coming in 2019. All current-generation DVRs will be rendered
obsolete as this hybrid broadcast standard rolls out. It isn't
clear what the new standards will look like, but owners of DVRs
and modems (cable modems and even routers) may be in for some very
Is Fastest US ISP, Ookla Says
I don't have the
fastest tier of XFinity, but for the price, you do get more speed
with Comcast than FiOS or other competitors.
This Study Is
Trying to Ruin Your Precious Binge Watching
fatigue at different rates. So some people can binge-watch for
much longer than others and still retain all the details they will
need to keep watching the series. I have a truly gifted long-term
memory, but I don't like trying to follow a story line too fast.
So I may watch up to five or six episodes in a row, but rarely
more. Usually just two to four, depending on the length of each
episode. Some comedies get pretty redundant after about four
What Is the
System Reserved Partition and Can You Delete It?
something I've wondered about for a long time, and now I know
about it. BTW, in dual-boot environments like my NUC, the Windows
System Reserved Partition also must be there, whether Windows
controls the boot manager tasks or GRUB (Linux). Also, if you have
a Boot Option with Macrium Reflect to boot into the Recovery
Environment, this option menu is also stored in the System
Reserved Partition's Boot data.
From My Own
for Windows 10 1703 to get enterprises on the right release train