Free Republic 2nd Quarter Fundraising Target: $88,000 Receipts & Pledges to-date: $69,425
78%  
Woo hoo!! And with the remaining monthlies included we're now over 78%!! Less than $19k to go!! Thank you all very much!! Let's git 'er done!!

Keyword: computing

Brevity: Headers | « Text »
  • Google Tone Shares Links To Computers Within Earshot Using Beeps And Boops

    05/23/2015 9:46:54 AM PDT · by Enlightened1 · 21 replies
    Popular Science ^ | 05/22/15 | Jason Cipriani
    A new Chrome extension, called Google Tone, released this week makes it possible to share a URL with another computer in the room using a series of beeps and boops. The concept is dead simple yet instantly instills a sense of disbelief. A computer making seemingly random sounds can transmit the URL for the tab I have open in Chrome across the room? Get out. Full of skepticism, I decided to put it to the test. I installed the Chrome extension on a MacBook Air and a HP laptop running Windows 10. And you know what? It works! Click on...
  • Critical vulnerability in NetUSB driver exposes millions of routers to hacking

    05/20/2015 9:48:26 PM PDT · by Utilizer · 13 replies
    ITworld.com ^ | May 19, 2015 | Lucian Constantin
    Millions of routers and other embedded devices are affected by a serious vulnerability that could allow hackers to compromise them. The vulnerability is located in a service called NetUSB, which lets devices connected over USB to a computer be shared with other machines on a local network or the Internet via IP (Internet Protocol). The shared devices can be printers, webcams, thumb drives, external hard disks and more. NetUSB is implemented in Linux-based embedded systems, such as routers, as a kernel driver. The driver is developed by Taiwan-based KCodes Technology. Once enabled, it opens a server that listens on TCP...
  • CHIP, a $9 computer with WiFi, Bluetooth, 1GHz CPU, 512MB RAM and 4GB storage

    05/10/2015 3:56:53 PM PDT · by ShadowAce · 59 replies
    The Next Digit ^ | 10 May 2015 | Suzanne Jean
    With the sizes slimming down, it is certainly not a huge surprise that we have a Chip sized computer amidst us. What is really astonishing is the fact that this chip sized computer costs only $9 and can do literally everything for you. The Chip as it has been named runs on Linux and includes Wi-Fi and Bluetooth as well.In fact, CHIP from Next Thing Co.also offers a VGA or an HDMI post for monitors, adding immense versatility to it. To be true, this is certainly one invention that all of us might just have been looking forward to.CHIP has...
  • Solid-state drives lose data if left without power for just a few days

    05/10/2015 1:06:11 PM PDT · by Utilizer · 49 replies
    ZDNet ^ | May 9, 2015 | Zack Whittaker
    Storage. It's not a sexy topic. But everyone uses it in some way or another. You have iPhones, you have computers. Everyone knows how important a person's data is. But it doesn't just "disappear." Or does it? New research suggests that newer solid-state hard drives, which are faster and offer better performance, are vulnerable to an inherent flaw -- they lose data when they're left dormant in storage for periods of time where the temperature isn't properly regulated. The worrying factor is that the period of time can be weeks, months, but even in some circumstances -- just a few...
  • Taking on the Smart Criminals

    05/07/2015 11:29:45 PM PDT · by nickcarraway · 1 replies
    Financial Times ^ | Emma Jacobs
    In the mid-1990s, Marc Goodman, then an investigator in the Los Angeles Police Department, tried to convince his boss of the need for a computer crime unit. The reaction? Utter bafflement. “This captain said to me, ‘Computer crime, what is that? Like if you take the monitor and hit somebody in the head and kill them?’” It is a telling anecdote. While law enforcement agencies have become in­creasingly sophisticated technologically, criminals have the edge, according to Mr Goodman. That was something he observed when investigating drugs and vice in LA. “In those days the only people that had pagers in...
  • Big adobe Illustrator Issues

    04/29/2015 11:50:22 AM PDT · by MeshugeMikey · 26 replies
    MeshugeMikey ^ | April 29, 2015 | MeshugeMikey
    When I do a normal launch of adobe illustrator It freezes. when I do the optional launch....I get no toolbar etc etc. Im stumped and haven't been able to get anywhere on the adobe forums help! Thank you
  • "Fed Up" Colorado Man, 38, Busted For Killing His Computer In Cold Blood

    04/21/2015 3:34:59 PM PDT · by MeshugeMikey · 110 replies
    The Smoking Gun ^ | APRIL 21, 2015 | No Attribution
    A Colorado man who has been fighting with his computer for the last several months unloaded a volley of shots into his Dell tormentor, resulting in the death of the computer and his arrest for discharging a firearm, cops report. When asked about the shooting, Hinch told TSG, I just had it, adding that he tired of the balky computers blue screen of death. Hinch said that he whacked the computer with a 9mm Hi-Point pistol recently purchased from a Craigslist seller. The gun was seized by police, who left the computer behind. The late Dell XPS 410 model, seen...
  • Adobe Patches Flash Flaw Targeted by Exploit in the Wild

    04/14/2015 8:34:23 PM PDT · by Swordmaker · 45 replies
    Intego.com ^ | April 14th, 2015 | by Derek Erwin
    Adobe Systems has released a patch for22 vulnerabilities in Flash Player, one of which is reportedlyunder attack by an exploit that exists in the wild. The most critical vulnerability, CVE-2015-3043, could lead to code execution. Adobe's Flash Player security updates are available for Macintosh, Windows and Linux."Adobe is aware of a report that an exploit for CVE-2015-3043 exists in the wild, and recommends users update their product installations," saidAdobe. If you reached this page because you're unsure if a popup alert from Adobe is real, take a look at our helpful guide for best practices how to safely install and...
  • Kaspersky releases tools to decrypt files encrypted with CoinVault Ransomware

    04/14/2015 6:46:32 PM PDT · by Utilizer · 20 replies
    TechWorm ^ | on April 14, 2015 | Abhishek Kumar Jha
    Software security group Kaspesky labs in collaboration with the Dutch police has released a tool which helps to decrypt files locked by Ransomware. Kaspersky Labs has released a decryption tool for files encrypted with CoinVault ransomware. The tool was developed by the Kaspersky lab after the The National High Tech Crime Unit (NHTCU) of the Dutch police handed over the information obtained from a database of CoinVault command-and-control server containing the decryption keys.
  • How to: How much RAM do you really need?

    04/11/2015 11:25:09 AM PDT · by Utilizer · 126 replies
    PC Authority ^ | Friday 21 March 2014 | Darien Graham-Smith
    Typically, todays budget PCs come with 4GB of RAM. A mid-range configuration may offer double that, and high-end gaming systems and workstations go as high as 16GB or more. Theres no doubt which way the winds blowing, either: Windows 8 supports up to 128GB of physical memory (assuming youre running the 64-bit edition), while Windows 8 Pro can go up to 512GB. Does anyone really need this much RAM? Memory isnt as expensive as it used to be, but theres obviously no point paying for gigabytes of RAM from which youll receive no material gain. Does more equal faster? Many...
  • Mono 4 Released, First Version To Adopt Microsoft Code (Windows .NET for Linux)

    04/05/2015 8:26:58 AM PDT · by dayglored · 8 replies
    Slashdot ^ | April 5, 2015 | jones_supa
    Version 4.0.0 of Mono, the FOSS implementation of the .NET Framework, has been released. This is the first release of Mono that replaces various components of Mono with code that was released by Microsoft under the MIT license. Microsoft itself is working towards .NET Core: a redistributable and re-imagined version of .NET, which has two code drops: CoreFX and CoreCLR. Mono at this point continues to provide an API that tracks the .NET desktop/server version. This means that most of the Mono code that has been integrated from Microsoft comes from the ReferenceSource code drop. ...
  • Malwarebytes Programs

    04/02/2015 10:43:19 AM PDT · by hsmomx3 · 21 replies
    Is Malwarebytes and Malwarebytes Anti-Exploits two separate programs? If so, is it advised to have both programs on my computer? I am currently using Malwarebytes Anti-malware on my Windows 8.1 system.
  • No, its not always quicker to do things in memory (computer)

    03/26/2015 8:27:11 PM PDT · by Utilizer · 67 replies
    ITworld ^ | March 25, 2015 | Phil Johnson
    Its a commonly held belief among software developers that avoiding disk access in favor of doing as much work as possible in-memory will results in shorter runtimes. The growth of big data has made time saving techniques such as performing operations in-memory more attractive than ever for programmers. New research, though, challenges the notion that in-memory operations are always faster than disk-access approaches and reinforces the need for developers to better understand system-level software. These findings were recently presented by researchers from the University of Calgary and the University of British Columbia in a paper titled When In-Memory Computing is...
  • SSL/TLS Suffers 'Bar Mitzvah Attack'

    03/26/2015 10:43:03 AM PDT · by Citizen Zed · 5 replies
    Dark Reading ^ | 3-26-2015 | Kelly Jackson Higgins
    SSL/TLS encryption once again is being haunted by an outdated and weak feature long past its prime: a newly discovered attack exploits a weakness in the older, less secure RC4 encryption algorithm option in SSL/TLS that's still supported in many browsers and servers. Itsik Mantin, director of security research with Imperva, at Black Hat Asia in Singapore today will detail how an attacker could sniff credentials and other information during an SSL session in an attack he named the "Bar Mitzvah Attack" after 13-year-old weaknesses in the algorithm it abuses. The attack is a glaring reminder that the RC4 algorithm,...
  • BitWhisper turns up heat on air-gap security

    03/24/2015 9:46:52 AM PDT · by Patriot777 · 4 replies
    2015 Tech Xplore, Phys.org ^ | March 24, 2015 - 5 hrs ago | Nancy Owano
    Ben Gurion University reported Monday that researcher Mordechai Guri, assisted by Matan Munitz and guided by Prof. Yuval Elovici, uncovered a way to breach air-gapped systemsthat's quite something considering that air-gapped systems, said the Daily Mail, are among the most secure computers on the planet, used in high security settings such as classified military networks, payment networks processing credit and debit card transactions for retailers, and industrial control systems for critical infrastructure. The research initiative was given the name BitWhisper, part of research on the topic of air-gap security at the Cyber Security Research Center at Ben-Gurion University. Dudu Mimran,...
  • No love lost: Microsoft tries to block Linux on Windows machines

    03/24/2015 7:52:28 AM PDT · by ShadowAce · 37 replies
    Linuxveda ^ | 21 March 2015 | Paul Hill
    Remember the most talked about story of 2014? It was Microsoft loves Linux. It looks like Microsofts love for Linux is more likeMark Wahlbergs love for Reese Witherspoon as we saw in the movie Fear.If reports are to be trusted Microsofts survival mechanism may kick in again, with the new release of Windows. The legacy software maker may resort to secure boot to block alternative operating systems on Windows PCs.At Microsofts hardware conference WinHEC, new slides were shown which could mean bad news for Linux users. Machines shipping with Windows 10 may see OEMs enforcing Secure Boot without an option...
  • Trouble with Firefox and Java

    03/23/2015 2:07:45 PM PDT · by lafroste · 23 replies
    me | 3/23/15 | lafroste
    Last week I had a very wierd computer glitch. It screwed up my text fonts, desktop icons and other stuff. At any rate I have gotten things mostly back under control, except for one thing. Java scripts refuse to run in Firefox. I have updated Firefox, I have update Java, I have gone through everywhere I can think of to enable Java script, but it still will not run. Does anyone have any suggestians on how to fix this or what the problem might be? It has me flummoxed. Any help is appreciated. Thanks!
  • Chromium Hack : special 13 character can crash Chrome Browser Tab on a Mac PC

    03/21/2015 7:36:39 PM PDT · by Utilizer · 30 replies
    TechWorm ^ | on March 21, 2015 | Vijay
    No browsers are safe as proved yesterday at Pwn2Own, but crashing one of them with just one line of special code is slightly different. A developer has discovered a hack in Google Chrome which can crash the Chrome tab on a Mac PC. The code is a 13 character special string which appears to be written in Assyrian script *break* Matt C has reported the bug to Google, who have marked the report as duplicate. This means that Google are aware of the problem and are reportedly working on it.
  • Ransomware: Pay it or fight it?

    03/21/2015 9:30:33 AM PDT · by xzins · 50 replies
    Network World ^ | Mar 16, 2015 | Colin Neagle
    Ask security experts what to do when hit with ransomware the sophisticated malware that infects a device or network, uses military-grade encryption to restrict access, and demands payment for the decryption key and you'll typically get the same answer: "never pay the ransom." But for many, that's simply not an option. For example, last November an employee in the Sheriff's Department in Dickinson County, Tenn., accidentally clicked on a malicious ad and exposed the office network to the infamous CryptoWall ransomware. Detective Jeff McCliss told local News Channel 5 that CryptoWall had encrypted "every sort of document you...
  • Ethereum, IT Dreamed Up By a Wunderkind 19 y.o. That Could One Day Transform Law, Finance & Society

    03/19/2015 11:50:14 PM PDT · by 2ndDivisionVet · 16 replies
    Reason Magazine's Hit & Run Blog ^ | March 19, 2015 | Jim Epstein
    Ethereum, the brainchild of wunderkind software developer Vitalik Buterin, who was just 19 when he came up with the idea, is the most buzzed-about project right now in the cryptocurrency community. It has attracted an all-star team of computer scientists and raised $18.4 million in a crowdfunding campaignthe third most successful of all time. And now, according to the official Ethereum blog, it's on the verge of being rolled out to the public. Ethereum's developers use a rolling ticker tape of bold tag lines to describe what they're creating, including a Social Operating System for Planet Earth, and the Upcoming...
  • Why Does Laptop Keep Going Out When I Watch Video?

    03/17/2015 9:08:00 PM PDT · by onedoug · 38 replies
    Personal ^ | 17 MAR 2015 | onedoug
    My computer shuts down completely upon watching certain video. For example, the earlier posted Tom Cotton speech. When I clicked onto it, I was able to watch essentially the introduction, then, BLANK. The thing just shuts off. FR, or stuff like my library account, or the weather forecasts, etc, are fine. But the minute I switch to a video format, or try to watch a CD...blank. It suddenly shuts down completely. Is it my system, or is there a fix that I'm unaware of? I know there are many knowledgeable herein. Thank you all in advance.
  • Microsoft Is Phasing Out Internet Explorer

    03/17/2015 8:18:12 AM PDT · by lbryce · 46 replies
    Atlantic Monthly ^ | March 17, 2015 | ZACH WENER-FLIGNER
    The end is finally in sight for Microsofts long-fraught Internet Explorer. At the Microsoft Convergence conference yesterday in Atlanta, Georgia, Chris Capossela, Microsofts head of marketing, said that the new flagship browser for Windows, which was announced in January and is codenamed Project Spartan, will not be associated with the Internet Explorer brand. While Internet Explorer will still exist on Windows 10 for compatibility purposes, it will take a back seat to the new browser.
  • FBIs Plan to Expand Hacking Power Advances Despite Privacy Fears

    03/16/2015 8:14:08 PM PDT · by Citizen Zed · 2 replies
    National Journal ^ | 3-16-2015 | DUSTIN VOLZ
    A judicial advisory panel Monday quietly approved a rule change that will broaden the FBI's hacking authority despite fears raised by Google that the amended language represents a "monumental" constitutional concern. The Judicial Conference Advisory Committee on Criminal Rules voted 11-1 to modify an arcane federal rule to allow judges more flexibility in how they approve search warrants for electronic data, according to a Justice Department spokesman. Known as Rule 41, the existing provision generally allows judges to approve search warrants only for material within the geographic bounds of their judicial district. But the rule change, as requested by the...
  • Help with Sending Mass E mailings

    03/13/2015 8:19:14 PM PDT · by hsmomx3 · 19 replies
    self
    I am doing some clerical work for an insurance adjustor and he has asked that I assist in setting up a system where one email would be sent to 50 recipients. He does not want it done in BCC format as he claims those on the BCC list would be able to discover who the email was sent to. I do not want to make this more difficult than it has to be. He said an email blast program may be the way to go but I know nothing about these. Your advice/assistance is most appreciated.
  • Ransomware victims pay cybercriminals to save family photos

    03/11/2015 10:42:15 AM PDT · by rickmichaels · 27 replies
    CBC News ^ | March 11, 2015 | David Common
    Theresa and Billy Niedermayer paid an $800 ransom to get precious family photos of their three young boys back from cybercriminals. Their home computer had been seized by one of the more malicious malware programs spreading fast around the world. Ransomware takes computer files hostage. Cybercriminals target photos, videos, spreadsheets, documents, slide presentations anything that someone will pay to recover. The initial infection takes seconds. In some cases, the malicious software encrypts the files so their owners can no longer read them. The data isn't compromised or removed, just locked down and inaccessible. Try to access them and a...
  • Alan Turing and the New Emergentists

    02/18/2015 5:46:00 AM PST · by Heartlander · 38 replies
    Evolution News and Views ^ | February 18, 2015 | Erik J. Larson
    Alan Turing and the New Emergentists Erik J. Larson February 18, 2015 4:29 AM | Permalink The acclaimed Alan Turing biographical film The Imitation Game is up for multiple Oscars on Sunday. It is a tale of Turing as a tragic hero and misunderstood genius, irascible, certainly idiosyncratic, who insinuates himself into a job interview at Bletchley Park as a self-proclaimed mathematical genius, which later is born out as true. He "invents" the digital computer to solve the decryption challenge posed by the German Enigma machines, and thus saves the Allied powers from Hitler. The film is a human-interest story,...
  • Researchers stumble across Arab-speaking cybercriminal group

    02/18/2015 6:43:23 AM PST · by Ernest_at_the_Beach · 3 replies
    tweaktown.com ^ | Posted: 2 hours, 35 mins ago | Michael Hatamoto
    The Operation Arid Viper campaign has successfully stolen more than 1 million files with current malware campaigns underway, though it's not the usual suspects, according to Kaspersky Lab and Trend Micro. The Arab-speaking group, with ties to Gaza, have targeted foreign government offices, critical infrastructure, military, universities, and other high-profile targets. The attacks likely occurred starting in mid-2013 and a full investigation into their actions is underway. "Whoever the real culprits are, it is clear that they are part of the Arab world, evidence of a budding generation of Arab hackers and malware creators intent on taking down their...
  • Gas Stations Urged To Secure Internet-Exposed Fuel Tank Devices

    01/30/2015 1:18:58 AM PST · by Citizen Zed · 8 replies
    Dark Reading ^ | 1-26-2015 | Kelly Jackson Higgins
    Some 5,800 automated tank gauges, which monitor for fuel leaks and other problems with the tanks as well as fuel levels, recently were found sitting wide open on the Internet without password protection, leaving more than 5,000 gas stations in the US vulnerable to attackers who could remotely alter the alarm thresholds to simulate a leak, disrupt the fuel tank operations, and worst-case, wreak havoc by shutting down the gas stations altogether, researchers say. Rapid 7 chief research officer HD Moore says his team scanned for the vulnerable devices after getting a heads up from Jack Chadowitz, president and CEO...
  • FBI Seeks To Legally Hack You If You're Connected To TOR Or a VPN

    01/25/2015 11:15:40 PM PST · by LibWhacker · 55 replies
    Slashdot.org ^ | 1/20/15
    The investigative arm of the Department of Justice is attempting to short-circuit the legal checks of the Fourth Amendment by requesting a change in the Federal Rules of Criminal Procedure. These procedural rules dictate how law enforcement agencies must conduct criminal prosecutions, from investigation to trial. Any deviations from the rules can have serious consequences, including dismissal of a case. The specific rule the FBI is targeting outlines the terms for obtaining a search warrant. It's called Federal Rule 41(b), and the requested change would allow law enforcement to obtain a warrant to search electronic data without providing any specific...
  • Adobe acknowledges critical remote vulnerability in Flash, exploits already in the wild

    01/25/2015 9:08:43 PM PST · by Swordmaker · 67 replies
    AppleInsider ^ | Sunday, January 25, 2015 | By AppleInsider Staff
    Adobe on Saturday released an updated version of its Flash player software that patches an undisclosed vulnerability which could allow remote attackers to take control of Macs or PCs, urging users to update as the problem is being actively exploited by malicious actors. Flash versions up to and including 16.0.0.287 on OS X and Windows and 11.2.202.438 on Linux are susceptible to the attack, the cause of which has yet to be detailed. Mac users with Adobe's automatic update feature enabled should begin receiving updates to version 16.0.0.296 immediately, and the company is preparing a standalone patch for manual installation...
  • Google drops three OS X zero-day vulnerabilities on Apple

    01/24/2015 1:41:55 AM PST · by Swordmaker · 7 replies
    MacDailyNews ^ | Friday, January 23, 2015
    Dont look now, but Googles Project Zero vulnerability research program may have dropped more zero-day vulnerabilitiesthis time on Apples OS X platform, Dan Goodin reports for Ars Technica. In the past two days, Project Zero has disclosed [three] OS X vulnerabilities, Goodin reports. At first glance, none of them appear to be highly critical, since all three appear to require the attacker to already have some access to a targeted machine. Still, the exploits could be combined with a separate attack to elevate lower-level privileges and gain control over vulnerable Macs, Goodin reports. And since the disclosures contain proof-of-concept...
  • What 'MacKeeper' is and why you should avoid it

    01/21/2015 10:23:51 PM PST · by Swordmaker · 54 replies
    iMore ^ | Wednesday, Jan 21, 2015 | By Peter Cohen
    Literally every time I work in the computer store, we'll get a customer whose Mac is plagued with problems they don't understand: Their Mac is acting slow. It crashes. And more. And in more cases than not, we find that they've installed a program called MacKeeper. Removing MacKeeper fixes the problem. So what is MacKeeper and why should you avoid it? MacKeeper was originally developed by a company called Zeobit and was sold a couple of years ago to another firm called Kromtech. The software purports to be a suite of more than a dozen individual utilities that are actually...
  • Why You Should (or Shouldn't) Switch to Each Leading Linux Desktop

    01/15/2015 10:30:48 AM PST · by ShadowAce · 26 replies
    Datamation ^ | 13 January 2015 | Bruce Byfield
    The perfect desktop is undoubtedly the one you would design yourself. However, lacking the necessary time and expertise, many users hop instead from desktop to desktop desktop with the same enthusiasm as others hop between distros, hoping to find the ideal distribution.In many cases, they never find their ideal, and for good reason -- even the simplest Linux desktop is a mixture of advantages and disadvantages.Here, for example, are some core reasons for both accepting and rejecting the seven leading desktops of today:Cinnamon Leading Advantage: Like MATE, Linux Mint's other desktop, Cinnamon is a classic desktop for GNOME-based applications. However,...
  • A Favicon Question,,mystery,,

    12/31/2014 4:10:35 PM PST · by MeshugeMikey · 6 replies
    MeshugeMikey | December 31m 2014 | self
    A Favicon. for the "non initiated " that tiny little icon that displays in the address bar whenever a web site provides a the proper file for same. One of my browsers doesnt display a favicon for the drudge report...one has chosen to "adopt" a YAHOO Icon for that site. While I dont necessarily view this ias problematic...it is somewhat of a mystery. anyone have any ideas?
  • Comcast says I need a new Docsis 3.0 modem in January 2015. .....But I am skeptical (vanity)

    12/29/2014 2:00:12 PM PST · by dennisw · 34 replies
    Dec 2014 | self
    Freeper tech gurus I have a Motorola surfboard that has served me well for 8 years. It is probably Docsis 2.0...... I am topping out at 30 mbps which is good enough. Some internet reports say I can double this speed with a newer Docsis 3.0 modem I get phone calls from Comcast saying I will need this newer type modem or will have trouble with reception due to them upgrading where I am to a docsis 3.0 system. So I need the compatible modem Do I really need the newer 3.0 modem? THANKS!
  • How an Apple security expert bricked his brand new jeep

    12/12/2014 12:31:08 AM PST · by Swordmaker · 39 replies
    Cult of Mac ^ | December 11, 2014 | Luke Dormehl
    The worlds largest brick? Photo: Trucktrend In addition to Apple devices, noted security expert and The Mac Hackers Handbook co-author Charlie Miller has carried out some fascinating (and potentially terrifying) research into hacking vehicles. Last year, alongside fellow hacker Chris Valasek, Miller demonstrated that it is possible to hijack the steering and brakes of a Ford Escape and Toyota Prius using only a laptop connected to the car. Having done that, he has now moved onto exploring vulnerabilities in other vehicles including his new 2014 Cherokee jeep. All that research comes at a high price, however, since Miller recently...
  • Proof that The End of Moores Law is Not The End of The Singularity

    12/06/2014 1:48:55 PM PST · by 2ndDivisionVet · 14 replies
    Lifeboat News - Safeguarding Humanity The Blog ^ | December 5, 2014 | Eric Klien
    During the last few years, the semiconductor industry has been having a harder and harder time miniaturizing transistors with the latest problem being Intels delayed roll-out of its new 14 nm process. The best way to confirm this slowdown in progress of computing power is to try to run your current programs on a 6-year-old computer. You will likely have few problems since computers have not sped up greatly during the past 6 years. If you had tried this experiment a decade ago you would have found a 6-year-old computer to be close to useless as Intel and others were...
  • Physics: Quantum computer quest

    12/05/2014 11:28:06 AM PST · by LibWhacker · 11 replies
    Nature ^ | 12/3/14 | Elizabeth Gibney
    When asked what he likes best about working for Google, physicist John Martinis does not mention the famous massage chairs in the hallways, or the free snacks available just about anywhere at the company's campus in Mountain View, California. Instead, he marvels at Google's tolerance of failure in pursuit of a visionary goal. If every project they try works, he says, they think they aren't trying hard enough. Martinis reckons that he is going to need that kind of patience. In September, Google recruited him and his 20-member research team from the University of California, Santa Barbara, and set them...
  • Hacked Windows XP still updates, still a bad idea (not a bad idea!)

    12/03/2014 7:27:21 PM PST · by dennisw · 16 replies
    zdnet ^ | December 3, 2014 | Larry Seltzer
    Summary: Yes, you still can trick Microsoft into giving you security updates for Windows XP. No, it's not a good idea. You are not protected. Perhaps the most popular story I've written for ZDNet was the one explaining how you can hack the registry in Windows XP and trick Windows Update into continuing to send you security updates. The basis of it is that Microsoft has an embedded variant of Windows XP and support doesn't end on that until April 2016. The hack makes XP look like the embedded version. I have maintained a Hyper-V VM on a Windows 8.1...
  • Now e-cigarettes can give you malware

    11/21/2014 3:40:53 PM PST · by upchuck · 20 replies
    Guardian ^ | Nov 21, 2014 | Alex Hern
    E-cigarettes may be better for your health than normal ones, but spare a thought for your poor computer electronic cigarettes have become the latest vector for malicious software, according to online reports. Many e-cigarettes can be charged over USB, either with a special cable, or by plugging the cigarette itself directly into a USB port. That might be a USB port plugged into a wall socket or the port on a computer but, if so, that means that a cheap e-cigarette from an untrustworthy supplier gains physical access to a device. A report on social news site Reddit...
  • The man who can hear Wi-Fi wherever he walks [hearing aids]

    11/14/2014 11:01:04 AM PST · by BenLurkin · 17 replies
    newscientist.com ^ | 12 November 2014 | by Frank Swain
    I am walking through my north London neighbourhood on an unseasonably warm day in late autumn. I can hear birds tweeting in the trees, traffic prowling the back roads, children playing in gardens and Wi-Fi leaching from their homes. Against the familiar sounds of suburban life, it is somehow incongruous and appropriate at the same time. As I approach Turnpike Lane tube station and descend to the underground platform, I catch the now familiar gurgle of the public Wi-Fi hub, as well as the staff network beside it. On board the train, these sounds fade into silence as we burrow...
  • In strategy shift, Microsoft Office unlocks free editing on iOS and Android tablets and phones

    11/06/2014 11:21:01 PM PST · by Swordmaker · 16 replies
    GeekWire ^ | November 6, 2014 at 6:00 am | BY TODD BISHOP
    PowerPoint for iPad is one of the Office apps where Microsoft will now let users create and edit documents for free. In a significant change for its flagship software applications, and a potentially risky move for its business, Microsoft will let users create and edit documents without a paid subscription in its Word, Excel and PowerPoint apps on iPhone, iPad and Android phones and tablets. The change, announced this morning, makes Microsoft more competitive by eliminating one of the biggest criticisms of the Office apps for iPad the requirement to pay for an annual Office 365 subscription of...
  • This 3D Printer Is Made Out of a Floppy Disk Drive and Other E-Waste

    11/06/2014 12:57:12 PM PST · by 2ndDivisionVet · 5 replies
    Kinja's Gizmodo ^ | November 5, 2014 | Kelsey Campbell-Dollaghan
    When was the last time you used your computer's disc drive? What about your DVD player? E-waste is all around us, but as the brilliant Instructables user behind this $60 3D printer proves, there's plenty to be done with itif you've got some engineering chops. Last week we wrote about the world's smallest 3D printer, which costs less than $300 and prints resin. But an Instructables user named Mikelllc has gone way further, uploading his designs for a 3D printer made from 80 percent recycled e-waste and costing roughly $60. Part of the idea, he writes, is to "help us...
  • Retailers are disabling NFC readers to shut out Apple Pay

    10/26/2014 3:20:18 PM PDT · by ImJustAnotherOkie · 85 replies
    The Verge ^ | October 25, 2014 01:09 pm | By Dante D'Orazio
    There's a lot of hype around Apple Pay right now, but not everyone is on board with the new mobile payments system. In fact, a significant number of merchants, including heavyweights like Walmart, Kmart, 7-Eleven, and Best Buy, are in outright competition with Apple Pay. The retailers, through a joint venture formed in 2012, are building their own mobile payment app, called CurrentC. It's expected to launch next year. In the meantime, these retailers have no intention to support Apple Pay. Following Apple's announcement last month, both Wal-Mart and Best Buy confirmed to The Wall Street Journal that customers would...
  • Undetectable, Unpatchable USB-infecting malware is now publically available for anyone to use

    10/25/2014 10:35:47 AM PDT · by null and void · 11 replies
    Electronic Products ^ | Max Teodorescu
    Security experts prove its possible to infect USB sticks MCU Next time you find a foreign USB lying around, think twice before plugging it into your computer. A pair of security researchers named Karsten Nohl and Jakob Lell demonstrated before an audience at Black hat security conference in Las Vegas a fundamental flaw in USB firmware could be exploited to create an undetected malware that cannot be patched. Realizing the kind of power they were dealing with, the pair opted to keep the code secret until fellow colleagues decided to post it publically on Github. Two other researchers ...
  • Maybe Better If You Dont Read This Story on Public WiFi

    10/18/2014 7:52:38 AM PDT · by GonzoII · 22 replies
    Medium.com ^ | 15 Oct 2014 | Maurits Martijn
    We took a hacker to a caf and, in 20 minutes, he knew where everyone else was born, what schools they attended, and the last five things they googled. In his backpack, Wouter Slotboom, 34, carries around a small black device, slightly larger than a pack of cigarettes, with an antenna on it. I meet Wouter by chance at a random cafe in the center of Amsterdam. It is a sunny day and almost all the tables are occupied. Some people talk, others are working on their laptops or playing with their smartphones. Wouter removes his laptop from his backpack,...
  • Sears says Kmart stores targeted in malware attack

    10/10/2014 5:13:21 PM PDT · by John W · 28 replies
    cnbc.com ^ | October 10, 2014 | rma Allen
    Sears Holdings Corp. said Friday that its Kmart stores were hit with a data breach that compromised some shoppers' debit and credit card information. The company is working with federal authorities and security experts to investigate the matter. The Secret Service confirmed Friday evening that it is investigating the data breach. The investigation indicates that the breach occurred in early September and did not affect kmart.com customers, the statement said.
  • The Bash Bug Could be a Joe Biden-sized Problem Part 1

    09/26/2014 12:01:55 PM PDT · by lifeofgrace · 11 replies
    Charting Course ^ | 8/26/14 | Steve Berman
    Unless youre a real-life version of Sheldon Cooper, a computer security professional, or, like me, work in the online payment industry, you probably dont keep up with the latest computer vulnerabilities. A new one thats hit the web news like a tsunami in the last 72 hours is simply called the bash bug (sometimes called shellshock). Everyone from Time, to Vox*, to tech site C|Net has covered this story. I am not going to get technical here. You can read any of the above-mentioned articles which provide plenty of detail on that. To summarize the problem: a 25-year-old program thats...
  • Remote exploit vulnerability in bash CVE-2014-6271

    09/25/2014 10:47:12 AM PDT · by zeugma · 26 replies
    CSOonline ^ | Sep 24, 2014 | Dave Lewis
    A remotely exploitable vulnerability has been discovered by Stephane Chazelas in bash on Linux and it is unpleasant. The vulnerability has the CVE identifier CVE-2014-6271and has been given the name Shellshock by some. This affects Debian as well as other Linux distributions. You will need to patch ASAP. Bash supports exporting shell variables as well as shell functions to other bash instances. This is accomplished through the process environment to a child process. The major attack vectors that have been identified in this case are HTTP requests and CGI scripts. From Akamai: Akamai has validated the existence of the vulnerability...
  • SynoLocker demands 0.6 Bitcoin to decrypt Synology NAS devices

    08/05/2014 10:42:14 AM PDT · by Utilizer · 22 replies
    CSO ^ | on 04 August, 2014 09:53 AUS | Liam Tung (CSO Online (Australia)
    Synology network attached storage (NAS) devices, capable of storing terabytes of data, have been targeted by ransomware that encrypts victims files. Owners of Synology's NAS devices might want to unplug their storage boxes now to avoid being affected by ransomware that uses strong encryption to lock files on the brands machines and demands US$350 for the decryption key. The new attack on Synology kit comes within a year of Synology NAS devices being struck by fraudulent Bitcoin mining operators, with several owners on Sunday reporting that they had found a message from the SynoLocker Automated Decryption Service when accessing...