Free Republic 2nd Qtr 2024 Fundraising Target: $81,000 Receipts & Pledges to-date: $28,398
35%  
Woo hoo!! And we're now over 35%!! Thank you all very much!! God bless.

Keyword: computer

Brevity: Headers | « Text »
  • The Unending High-Frequency Rip-Off

    02/17/2015 7:31:08 AM PST · by alexmark1917 · 19 replies
    This is an update to article written a few years ago. Everybody knows that retail and institutional investors are usually late to a trade. When they decide to buy, the wise guys are distributing or selling their shares to them and locking in their gains. When they sell, the wise guys are accumulating or buying their shares from them, again locking in their gains. How do the wise guys pull it off? The answer lies in the combination of reflexive human behavior and the use of high frequency, algorithmic (HFA) trading. With the advance of computer trading on a massive...
  • Computers with consciousness: Stanley Kubrick

    01/29/2015 11:00:31 AM PST · by Reverend Saltine · 21 replies
    Jon Rappoport's Blog ^ | January 29, 2015 | Jon Rappoport
    Computers have as much consciousness as cars or concrete. This will not change. They’re machines. They can be programmed to follow directions and calculate certain kinds of solutions within those directed parameters. That’s it. That’s the beginning and end of the story. Why do some technocrats believe computers will gain actual consciousness? They think a) the brain is a machine that expresses consciousness via information processing, and b) information processing is all the consciousness there is. To sum up, technocrats are high-IQ idiots. You can assemble all the information in the world and cross-reference it 100 billion different ways; you...
  • Taiwanese man dies after three-day computer gaming binge

    01/19/2015 9:22:36 AM PST · by golux · 6 replies
    UPI ^ | Jan. 19, 2015 | Amy Connolly
    KAOHSIUNG, Taiwan, Jan. 19 (UPI) -- A Taiwanese man who was on a three-day computer gaming binge died in an Internet cafe and went unnoticed for hours, the second such death in the area in less than a month. The man, identified as Hsieh, went into the Internet cafe on Jan. 6 and was found motionless on a table on Jan. 8. Investigators said the man had a heart attack. His death went unnoticed for several hours as gamers continued around him. "The CCTV footage from the Internet cafe showed that he had a small struggle before he collapsed motionless,"...
  • easiest non-cloud backup for tech novices?

    01/08/2015 3:36:14 PM PST · by TurboZamboni · 35 replies
    me | 1-8-15 | TZ
    wanted for a dying laptop.
  • If you sign out of G Mail does google still track you?

    12/25/2014 5:51:08 AM PST · by dennisw · 60 replies
    self | Dec 25 | self
    One of my New Years resolutions is to not stay signed into Google mail or Google anything// Does this help with the tracking google does? I use track me not on Firefox and Chrome. I am using Bing and Google for searches Thanks
  • Dangerous 'Misfortune Cookie' flaw discovered in 12 million home routers

    12/19/2014 9:29:02 PM PST · by Swordmaker · 23 replies
    PCWorld ^ | December 19, 2014 | By John E. Dunn
    Researchers at Check Point have discovered a serious security vulnerability affecting at least 12 million leading-brand home and SME routers that appears to have gone unnoticed for over a decade. Dubbed the ’Misfortune Cookie’ flaw, the firm plans to give a detailed account of the issue at a forthcoming security conference but in the meantime it’s important to stress that no real-world attacks using it have yet been detected. That said, an attacker exploiting the flaw would be able to monitor all data travelling through a gateway such as files, emails and logins and have the power to infect connected...
  • Advice please: Dumping gmail and looking for email recommendations (Vanity)

    11/06/2014 1:59:06 PM PST · by tang-soo · 29 replies
    Self ^ | 11/6/2014 | Myself
    After about 10 years with gmail.com, I've decides to migrate to a new email address. I figure it will take few months, and will insert a forward rule in my current gmail account. I'd like to find another free provider if possible. I don't mind using a service that wraps advertising around received message, but I don't want to use a provide that wraps around sent messages. I know about reagan.com but they charge. I know they advertise explicitly that they do not browse messages for social engineering, advertising ... etc. That attracts me and if I do choose a...
  • How to protect OS X from the “rootpipe” vulnerability

    11/04/2014 7:32:21 PM PST · by Swordmaker · 19 replies
    Mac Issues ^ | November 4, 2014 | by Topher Kessler
    A relatively long-standing vulnerability in OS X has been uncovered by a Swedish hacker, Emil Kvarnhammar, who has dubbed it “rootpipe” by the so-far undisclosed method in which it can be used to take control of your Mac. In this vulnerability, a flaw allows a hacker to gain administrative access of a system without supplying a password, and then be able to interact with your Mac as an administrator. In an interview with MacWorld, Kvarnhammar describes this bug as having been present in OS X 10.8.5, but he was not able to replicate it in 10.9; however, Apple has shuffled...
  • Google’s New Computer With Human-Like Learning Abilities Will Program Itself

    10/29/2014 1:56:10 PM PDT · by Red Badger · 43 replies
    betabeat.com ^ | 10/29 3:22pm | By Sage Lazzaro
    The new hybrid device might not need humans at all. In college, it wasn’t rare to hear a verbal battle regarding artificial intelligence erupt between my friends studying neuroscience and my friends studying computer science. One rather outrageous fellow would mention the possibility of a computer takeover, and off they went. The neuroscience-savvy would awe at the potential of such hybrid technology as the CS majors argued we have nothing to fear, as computers will always need a programmer to tell them what to do. Today’s news brings us to the Neural Turing Machine, a computer that will combine the...
  • Ex-CBS reporter: Government agency bugged my computer {Sharyl Attkinson]

    10/27/2014 7:24:48 AM PDT · by SeekAndFind · 35 replies
    New York Post ^ | 10/27/2014 | By Kyle Smith and Bruce Golding
    A former CBS News reporter who quit the network over claims it kills stories that put President Obama in a bad light says she was spied on by a “government-related entity” that planted classified documents on her computer. In her new memoir, Sharyl Attkisson says a source who arranged to have her laptop checked for spyware in 2013 was “shocked” and “flabbergasted” at what the analysis revealed. “This is outrageous. Worse than anything Nixon ever did. I wouldn’t have believed something like this could happen in the United States of America,” Attkisson quotes the source saying. She speculates that the...
  • U.S. Homeland Security contractor reports computer breach (Illegal aliens not mentioned)

    08/06/2014 8:16:01 PM PDT · by Libloather · 7 replies
    MSN ^ | 8/06/14
    WASHINGTON (Reuters) - A company that performs background checks for the U.S. Department of Homeland Security said on Wednesday it was the victim of a cyber attack, adding in a statement that "it has all the markings of a state-sponsored attack." The computer breach at Falls Church, Virginia-based US Investigations Services (USIS) probably involved the theft of personal information about DHS employees, according to the Washington Post, which first reported the story. DHS has suspended all work with the company amid an investigation by the FBI, the Post reported. A U.S. government official confirmed to Reuters that the FBI is...
  • Why any decent website doesn't know your password. (video)

    08/06/2014 7:24:21 AM PDT · by servo1969 · 10 replies
    dump.com ^ | 8-6-2014 | Tom Scott
    A brief introduction to password hashing for the uninitiated -- and why you should never trust a site that emails your password back to you!
  • Visit the Wrong Website, and the FBI Could End Up in Your Computer

    08/05/2014 10:18:32 PM PDT · by Utilizer · 58 replies
    W I R E D ^ | 08.05.14 6:30 am | Kevin Poulsen
    Apparently, the feebs have been using malware and the TOR network to snoop on quite a bit more information than one might have suspected. Use the following link here for more info: http://www.wired.com/2014/08/operation_torpedo/
  • This thumbdrive hacks computers. “BadUSB” exploit makes devices turn “evil”

    07/31/2014 10:16:53 AM PDT · by Utilizer · 18 replies
    ars technica ^ | July 31 2014, 6:21am -0700 | Dan Goodin
    This thumbdrive hacks computers. “BadUSB” exploit makes devices turn “evil” Per FR posting rules, ars technica can not be posted, so a link to the article referring to USB thumbdrives hacking computers is listed instead. Ignore the "source url", it just points back to the FR website. Article here: http://arstechnica.com/security/2014/07/this-thumbdrive-hacks-computers-badusb-exploit-makes-devices-turn-evil/
  • moving all the data from one laptop to another...help

    07/13/2014 6:49:41 AM PDT · by TurboZamboni · 77 replies
    myself | 7-13-14 | TZ
    I was given the gift of a new laptop- HP Pavilion Smartouch 17. not my first choice, but it was a nice gift and the giver knew my old Toshiba Satellite L505-a6946 is dying and that I'm too cheap to buy a new one. The Satellite uses Vista and the new HP is Windows 8.1 . I need to know what's the best(easiest) way to move all my data from one to the other including AVG,Hitman Pro, Malwarebytes,emails(Outlook)and other vital programs. While I'm at it, I assume it came with all sorts of unwanted 'bloatware' so I will need to...
  • 19th century math tactic gets a makeover—and yields answers up to 200 times faster

    06/30/2014 10:09:28 AM PDT · by Red Badger · 14 replies
    Phys.Org ^ | 06-30-2014 | Provided by Johns Hopkins University
    A relic from long before the age of supercomputers, the 169-year-old math strategy called the Jacobi iterative method is widely dismissed today as too slow to be useful. But thanks to a curious, numbers-savvy Johns Hopkins engineering student and his professor, it may soon get a new lease on life. With just a few modern-day tweaks, the researchers say they've made the rarely used Jacobi method work up to 200 times faster. The result, they say, could speed up the performance of computer simulations used in aerospace design, shipbuilding, weather and climate modeling, biomechanics and other engineering tasks. Their paper...
  • Need operating system suggestions for old laptop (Vanity)

    06/25/2014 10:02:22 AM PDT · by deoetdoctrinae · 58 replies
    Yours truly | 6/25/2014 | Me
    I'm trying to determine if it's worth messing with to find a different (and free) operating system for my very old Dell Latitude laptop. It currently has Windows XP SP3, which of course Microsoft no longer supports.
  • 7 Hard Drives Failing: What are the odds? These are the odds. [IRS SCANDAL]

    06/24/2014 1:29:22 PM PDT · by QT3.14 · 57 replies
    American Digest ^ | June 22, 2014 | Gerard Vanderleun
    I run a data center. Disk drives that are left running continuously last between two and three years. Three years is about 36 months. The odds of a disk failing in any given month are roughly one in 36. The odds of two different drives failing in the same month are roughly one in 36 squared, or 1 in about 1,300. The odds of three drives failing in the same month is 36 cubed or 1 in 46,656. The odds of seven different drives failing in the same month is 37 to the 7th power = 1 in 78,664,164,096.
  • Did Lois Lerner have laptop, blackberry

    06/20/2014 9:09:11 AM PDT · by airedale · 58 replies
    vanity
    We know that Lois Lerner' s computer crashed at some time and per this morning it was just before "she learned of the rogue agents in Cincinnati." Since she was a fairly high level employee whose job required travel did she have a laptop? The way they describe their email system (not the way most systems work) not only would the desktop which crashed have a complete copy of all e-mails both incoming and outgoing so would the laptop. If she did have a laptop did it crash as well; did the agency give it to another employee at some...
  • The Tuesday List - Ten Inventions That Changed The World

    06/17/2014 11:35:24 AM PDT · by Scoutmaster · 66 replies
    Stuff of Genius ^ | June 24, 2013 | Ed Grabianowski
    If you think that the world's greatest inventions came from the fevered minds of solitary geniuses, think again. As you scan this list of the 10 inventions that changed the world, note how many of them perfected workable designs. 10. Plow Compared to some of the gleaming, electronic inventions that fill our lives today, the plow doesn't seem very exciting. It's a simple cutting tool used to carve a furrow into the soil, churning it up to expose nutrients and prepare it for planting. Yet the plow is probably the one invention that made all others possible. No one knows...