Free Republic 1st Quarter Fundraising Target: $88,000 Receipts & Pledges to-date: $45,023
51%  
Woo hoo!! And we're now over 51%!! Thank you all very much!! God bless.

Keyword: computers

Brevity: Headers | « Text »
  • Toshiba issues big recall for laptop batteries over fire fears

    02/11/2016 7:28:06 PM PST · by Utilizer · 10 replies
    iTnews-aus ^ | Feb 12 2016 9:35AM (AUS) | By Staff Writer
    54 models affected. Toshiba has issued a recall for Li-Ion battery packs sold with certain models of its laptops and notebooks due a risk of the device catching fire. The hardware company yesterday advised customers to immediately turn off their PC and remove their battery to check whether their device was affected. The vendor is offering free replacement battery packs for customers with affected units. Around 54 different PC models are affected, sold nationally from retail stores like Harvey Norman and JB Hi-Fi from June 2011 to September 2015. A full list can be found here. "There is a risk...
  • How bad decisions and poor IT killed Target Canada

    02/11/2016 10:41:34 AM PST · by Swordmaker · 17 replies
    ZDNet ^ | February 11, 2016 | David Gewirtz
    Unmanageable deadlines and disastrous IT wrecked this top US retailer's attempt at international expansion. The moral of the story: IT drives the enterprise. Business school case studies tend to fall into two categories: epic wins and oh-my-gosh-how-could-they-possibly-have-been-so-stupid epic failures. This article discusses a real-world billion dollar story that falls into the second category. As epic failures go, this one is worthy of the history books. . . EVERYTHING WENT TERRIBLY, TERRIBLY WRONG . . .
  • DLL Hijacking Issue Plagues Products like Firefox, Chrome, iTunes, OpenOffice

    02/08/2016 6:41:43 PM PST · by Utilizer · 25 replies
    SOFTPEDIA ^ | Feb 8, 2016 12:00 GMT | Catalin Cimpanu
    Oracle has released new Java installers to fix a well-known security issue (CVE-2016-0603) that also affects a plethora of other applications, from Web browsers to antivirus products, and from file compressors to home cinema software. The problem is called DLL hijacking (or DLL side-loading) and refers to the fact that malware authors can place DLLs of the same name in specific locations on the target's filesystem and have it inadvertently load the malicious DLL instead of the safe one. DLL hijacking is a very well-known issue This type of attack is very old and has been known to many software...
  • Misdirection in Politics and Computer Servers

    02/01/2016 2:26:28 PM PST · by PeaRidge · 8 replies
    self | 2/01/16 | Pearidge
    I've been watching late night movies lately, especially spy spoofs. I like twists and misdirection. The most obvious example was when James Bond learned that Goldfinger really was not trying to take the gold out, but to make Ft. Knox useless. Try explaining that to your boss James.....he would hand you a tin foil hat. But it was genius. Several years ago I argued at length with a friend about the yellow cake story out of Iran. I had read that the British intelligence community, that Bush quoted, had revealed that the Iraqi government was buying nuclear material. Well, everybody...
  • SF Startup Creates $15 64-Bit Computer

    01/31/2016 8:13:16 PM PST · by nickcarraway · 39 replies
    NBC Bay Area ^ | Jan 29, 2016 | Tamara Palmer
    A San Francisco startup has created a $15 computer. Pine 64 is now taking pre-orders for its Quad core 64-Bit expandable single board supercomputer, which will ship in May. The product can be combined with a keyboard and mouse to function as a full Android 5.1 computer. The company recently raised $1,731,465 on a Kickstarter campaign that had a goal of $31,416.
  • Microsoft cuts short support for downgraded Windows Skylake PCs

    01/24/2016 6:59:32 PM PST · by Utilizer · 22 replies
    iTnews ^ | Jan 25 2016 10:00AM (AUS) | Juha Saarinen
    Microsoft and its hardware partners have revealed the list of Intel Skylake-based PCs that will lose support after 18 months if the computers are downgraded from Windows 10 to Windows 7 or 8.1. The software giant along with Dell, HP, Lenovo and NEC today outlined a list of 100 PCs that will fall victim to a policy change outlined by Microsoft earlier this month. The company previously said it would support downgrades to Windows 7 and Windows 8.1 until January 2020 and January 2023. But on January 16, Microsoft backtracked on its pledge for newer hardware featuring Intel's Skylake processors....
  • Any Linux Gurus On FR?

    01/24/2016 4:32:58 PM PST · by Washi · 32 replies
    http://freerepublic.com ^ | 1/24/2016 | Self
    Are there any Linux gurus here? I've looked around online and asked some questions in various forums, but I'm not getting anywhere. I've found explanations of how to set it up, but no examples. I have yet to get it working. I am trying to configure an environment with several Red Hat Enterprise Linux 6.1 virtual machines. All of these machines need to be NTP clients of my NTP server. The NTP server uses MD5 authentication, and I need to have the Linux clients authenticate the NTP traffic. Can someone please post a working "ntp.conf" and "keys" file so that...
  • Any Jerry Pournelle fans?

    01/24/2016 2:57:47 AM PST · by Fhios · 31 replies
    WWW ^ | 1/24/2016 | Vanity
    I was a big fan in the early 80's. I had a week long correspondence with him in the mid 90's. I loved reading his Chaos Manner column in Byte magazine along with Garcia s circuit cellar. It was a great mag. I've been rereading some of his works lately and just reminiscing. Jerry Pournelle s Iron law: ...in any bureaucratic organization there will be two kinds of people: those who work to further the actual goals of the organization, and those who work for the organization itself. Examples in education would be teachers who work and sacrifice to teach...
  • Microsoft patches critical vulnerabilities in January update

    01/19/2016 6:56:29 PM PST · by Utilizer · 21 replies
    iTnews ^ | Jan 13 2016 6:55AM (AUS) | Juha Saarinen
    Microsoft's first Patch Wednesday update for the year has taken care of multiple vulnerabilities rated as critical. No known exploits are available for the vulnerabilities, but Microsoft recommends that users apply the patches through Windows Update as soon as possible. Internet Explorer 7, 8, 9, 10 and 11 see two common vulnerabilities and exploits (CVEs) fixed - CVE-2016-0002 and CVE-2016-0005 - as part of a cumulative update. Supported version of the Windows client and server operating systems are all affected by the vulnerabilities, which Microsoft rates as critical and exploitable. Microsoft's new Edge browser in Windows 10 is also being...
  • Electronics That Last: How I Built an Heirloom Laptop

    01/18/2016 6:30:20 PM PST · by Utilizer · 22 replies
    Makezine ^ | January 15, 2016, 5:30 am PST | Kurt Mottweiler
    The Novena Heirloom is a limited edition custom enclosure system I built for use with the open-source Novena computer designed by Bunnie Huang and Sean Cross. It was crowd funded in cooperation with Portland, Oregon-based Crowd Supply. Several prototype concepts were developed for the campaign. After consulting with Huang, we decided to forgo an easel design in favor of a more traditional clam shell laptop. The requirement for user access to the internal components argued for a removable keypad and drove the final result. The thrust of the design concept is informed by, and hopefully serves as homage to, the...
  • Does Anyone Here Write Phone Apps?

    01/13/2016 6:26:49 PM PST · by 50sDad · 15 replies
    Self ^ | 01/13/16 | 50sDad
    I have an idea for a brilliant, sarcastic Conservative phone app called "Happy Safe Space Filter" that would be a wonderfully hot ticket with Conservatives, and/or Sarcastic Teenagers. It could either be a freebie for the Cause, or in true Capitalist fashion, would probably sell well at 99 cents. (The joke works I a lot of ways, but would include a little body copy crediting Conservatives.) I claim the idea and would be willing to give it up for 10% of gross. It is a pretty simple thing. If you have App writing experience, please message me here on Free...
  • Will Infrastructure Sabotage Be the Next Pearl Harbor?

    01/09/2016 7:12:53 PM PST · by 2ndDivisionVet · 22 replies
    The National Review ^ | January 9, 2016 | R. James Woolsey & Peter Vincent Pry
    Revolutions in warfare, though they may be predicted by theorists, are often unnoticed by governments and their military establishments -- until it is too late. On November 11, 1940, during the Battle of Taranto, torpedo planes from the British aircraft carrier Illustrious sank the Italian battleship Conte di Cavour. It was the first time in history that an aircraft carrier sank a battleship....
  • Raspberry Pi: computing for pocket change -- $5 computer unleashes a storm of creative computing

    01/04/2016 12:36:43 PM PST · by SeekAndFind · 44 replies
    CBC News ^ | 01/04/2016 | By Greg Rasmussen, CBC News
    The era of the $5 computer has arrived.The latest version of the Raspberry Pi is even being given away free with a magazine. Not a subscription. Just buy the single issue of Magpi and you get a free computer.The devices have hobbyists and entrepreneurs excited about thepossibilities of Pi. Raspberry Pi Zero $5 computer unveiledThe Next Thing unveils $9 computer, CHIP Ben Z. Cooper is using one as the brains behind a spectacular light show at Vancouver's VanDusen Gardens."You wave your hand in the air and control a whole grove of maple trees lighting up," Cooper told CBC News...
  • Techno-skeptics’ objection growing louder [Agreement between grass roots left & right?]

    12/26/2015 7:38:04 PM PST · by SoFloFreeper · 60 replies
    Washington Post ^ | 12/26/15 | Joel Achenbach
    Astra Taylor's iPhone has a cracked screen. She has bandaged it with clear packing tape and plans to use the phone until it disintegrates. She objects to the planned obsolescence of today’s gadgetry, and to the way the big tech companies pressure customers to upgrade. Taylor, 36, is a documentary filmmaker, musician and political activist. She's also an emerging star in the world of technology criticism. She's not paranoid, but she keeps duct tape over the camera lens on her laptop computer - because, as everyone knows, these gadgets can be taken over by nefarious agents of all kinds. Taylor...
  • Washington State AG sues major tech support provider alleging deceptive scam

    12/24/2015 1:05:18 PM PST · by KeyLargo · 20 replies
    KOMO News ^ | December 16th 2015 | Connie Thompson
    State AG sues major tech support provider alleging deceptive scam By Connie Thompson Wednesday, December 16th 2015 State investigators just sued one of the rising stars in the tech-support industry claiming part of the operation is based on a scam. The company, called iYogi, is accused of tricking people into paying for tech support services they don't need. According to investigators iYogi engaged in a different twist on the notorious tech support scams where someone call you claiming your computer has problems. What's significant in this case is workers don't call you, you call them. And iYogi is one of...
  • Competition is Shifting to the High End

    12/18/2015 11:46:36 PM PST · by Swordmaker · 7 replies
    TechPinions ^ | December 17th, 2015 | by Jan Dawson
    The consumer electronics industry has always fascinated me. I spent my first ten years as an analyst covering the telecom industry, which historically has had very good margins. But, when I started covering the consumer electronics industry, I was struck by the fact the vast majority of players in that market make razor-thin margins, if they’re profitable at all. Even more striking is Apple, which might be described accurately, if incompletely, as a player in the consumer electronics market, makes telecom-like margins while competing with those barely profitable vendors. And just as interesting is the fact that, as players that...
  • Common Core Computer Crack-up

    12/08/2015 7:47:11 AM PST · by Academiadotorg · 6 replies
    Accuracy in Academia ^ | December 6, 2015 | Malcolm A. Kline
    What do Common Core and Obamacare have in common, other than the enthusiasm they engender in the White House and widespread disappointment they generate outside of it? Both programs have fatal computer glitches. "New Hampshire-based company Measured Progress, which developed online Common Core tests used in Montana, Nevada, and North Dakota, has acknowledged a major glitch in the tests' rollout," Chris Neal reported in School Reform News. "Technical malfunctions, such as servers crashing during testing, resulted in only 37 percent of Nevada students being able to take their exams." "Meanwhile, Montana and North Dakota only managed to test 76 percent...
  • Geek Gift Advice From Feepers

    12/07/2015 2:07:50 PM PST · by Bill Russell · 28 replies
    My Own Mind ^ | 12/07/2015 | Bill Russell
    Fellow Freepers, I am looking into getting my son (13, soon to be 14) a build-it-yourself computer kit. He has ripped apart a couple of old laptops, but they don't have compatible parts. I am looking for a kit that he can use to learn to put together a working cpu that is usable and can be loaded with an operating system. I see a couple available on Amazon, but one looks too simplistic and the other is too complicated. When it comes to hardware and operating systems, I am very much a novice. I welcome your insights. Thanks so...
  • Security Alert: Angler Exploit Kit Spreads CryptoWall 4.0 via New Drive-By Campaign

    12/07/2015 4:46:21 AM PST · by rarestia · 18 replies
    Heimdal Security ^ | December 2nd, 2015 • 11:23 | Andra Zaharia
    Our team has recently monitored and analysed a new stack of drive-by campaigns which aim to spread the Angler exploit kit by injecting malicious code into compromised web pages. Because of the mechanisms involved and the attackers’ objectives, the campaign is prone to achieve large distribution and affect a big number of PCs and their users. The campaign is carried out by installing a cocktail of malware on the compromised PC. The first payload consists of the notorious data thief Pony, which systematically harvests all usable usernames and passwords from the infected system and sends them to a series of...
  • The Official Fallout 4 Thread

    11/28/2015 7:53:03 PM PST · by Lazamataz · 661 replies
    11/28./2015 | By Laz A. Mataz
    Had to do it. Had to create the thread. The game is too damned good. This thread is reserved for hardcore gamers who play Fallout 4. Norm, KC, TADSLOS and I have hijacked so many threads discussing this game, I felt we needed our own thread.Fallout 4 is amazing. The content is excessively large. There is so much to explore, you could replay this game 10 times and not find every mission or quest. The characters are so much better fleshed out than any other game I have played. Even the radio announcer of Diamond City Radio will have you...
  • Maybe we should just let computers decide who gets a job

    11/28/2015 7:16:03 PM PST · by Kaslin · 39 replies
    Hot Air.com ^ | November 28, 2015 | JAZZ SHAW
    Should computers decide who gets a job? That’s a question recently asked by Government Executive Magazine which looked at a study of hiring practices and how much hiring recommendations generated by standardized testing differed from managers who “went with their gut” in terms of eventual employee performance and retention. The results were, at least as I read it, a bit muddled.First of all, the test subjects they looked at were all applicants for low skill service jobs. (Such as you’d find for new hires at call centers or data entry firms.) They were all given standardized tests and those results...
  • Raspberry Pi Zero: the $5 computer

    11/26/2015 4:10:18 AM PST · by Bobalu · 23 replies
    raspberrypi.org ^ | 26th Nov 2015 | Eben Upton
    Today, I’m pleased to be able to announce the immediate availability of Raspberry Pi Zero, made in Wales and priced at just $5. Zero is a full-fledged member of the Raspberry Pi family
  • Meg Whitman seeks reinvention for HP as it prepares for a split

    11/03/2015 6:16:44 AM PST · by Cronos · 12 replies
    The New York Times ^ | 30 October 2015 | Quentin Hardy
    When HP splits in two on Sunday after a year of planning,... on one side with be HP Inc., which will largely consist of personal computers and printers. Ont he other, HP Enterprise HPE, which will sell the servers, data storage, networking, software and consulting services... each company is expected to have annual revenue of about $50 billion and will be among America's largest public companies. The story HPE is taking to corporate customers is HPE itself.Need to change your business? HPE can show you how, executives say. After all, few companies have gone to greater lengths to change.Since Oct....
  • Prime Diffie-Hellman Weakness May Be Key to Breaking Crypto

    10/18/2015 12:19:56 PM PDT · by Mycroft Holmes · 20 replies
    ThreadPost ^ | October 16, 2015 | Michael Mimoso
    The great mystery since the NSA and other intelligence agencies cyber-spying capabilities became watercooler fodder has not been the why of their actions, but the how? For example, how are they breaking crypto to decode secure Internet communication? A team of cryptographers and computer scientists from a handful of academic powerhouses is pretty confident they have the answer after having pieced together a number of clues from the Snowden documents that have been published so far, and giving the math around the Diffie-Hellman protocol a hard look. The answer is an implementation weakness in Diffie-Hellman key exchanges, specifically in the...
  • Hackers being hunted after stealing $30.7M via malware

    10/18/2015 5:36:24 AM PDT · by nuconvert · 20 replies
    CNBC ^ | Oct. 14, 2015
    Global law enforcement agencies have arrested a gang member behind the theft of 20 million ($30.7 million) via a piece of malicious software that records banking details, and are on the hunt for the remaining members. The malware known as Dridex is believed to be developed by in eastern Europe and it's able to harvest bank details online in order to steal money from people. Global financial institutions and a variety of different payment systems have been targeted, the U.K.'s National Crime Agency (NCA), one of the authorities involved, said on Tuesday. "Thousands" of Brits have been infected...
  • NEW Adobe Flash Zero-day Vulnerability / Exploit - Uninstall Flash Today From All Computers

    10/15/2015 11:34:56 AM PDT · by dayglored · 63 replies
    (vanity, multiple sources) ^ | Oct 15, 2015 | (vanity, multiple sources)
    Yet another bad new Zero-Day (already exploited) Adobe Flash vulnerability. Time to uninstall Flash from all your computers and keep it off for good! To remove Flash from Windows: Close your browser In Control Panel -> Programs and Features, remove/uninstall all Adobe Flash or Shockwave items. Restart your browser Go to Add-ons/Plugins and confirm there are no Shockwave or Flash plugins. To remove Flash from OS X (10.6 and later): Download and run this Flash uninstaller: http://fpdownload.macromedia.com/get/flashplayer/current/support/uninstall_flash_player_osx.dmg To remove Flash from Linux: Close your browser Use "apt-get remove", "yum erase", or find the flashplayer .so (e.g. in /usr/lib[64]/mozilla/plugins or ~/.mozilla/plugins)...
  • PawSense Senses Your Cat At Work On Your Computer

    10/13/2015 6:40:19 AM PDT · by smokingfrog · 39 replies
    HNGN ^ | 10-12-15 | Aditi Simlai Tiwari
    If you are one of the many long-suffering people who have gone for a coffee break and come back to a computer screen full of gibberish or a crashed system, PawSense is for you! "PawSense is a software utility that helps protect your computer from cats. It quickly detects and blocks cat typing, and also helps train your cat to stay off the computer keyboard" is how BitBoost described the product. Chris Niswander, a graduate in computer science from Arizona State University, is the creator of this path-breaking product. "One day, my sister's cat, Amos, walked across her computer keyboard...
  • Clumps of gold nanoparticles can evolve to carry out computing

    09/22/2015 2:10:36 PM PDT · by BenLurkin · 9 replies
    Move over, microchip. A random assembly of gold nanoparticles can perform calculations normally reserved for neatly arranged patterns of silicon. Traditional computers rely on ordered circuits that follow preprogrammed rules, but this strategy limits how efficient they can be. The best microprocessors you can buy in a store now can do 1011 operations per second and use a few hundred watts, says Wilfred van der Wiel of the University of Twente in the Netherlands. The human brain can do orders of magnitude more and uses only 10 to 20 watts. Thats a huge gap. To close that gap, researchers have...
  • We Are IT Labour Contractors, Not IT Super Power: Javadekar (India)

    09/17/2015 5:32:42 PM PDT · by 2ndDivisionVet · 11 replies
    Outlook Magazine ^ | September 15, 2015
    Stressing on the importance of research and development for creating sustainable practices, Environment Minister Prakash Javadekar today said that India is not an 'IT-superpower' but an 'IT-labour contractor' as it lacks innovation. "We say that we are IT-superpower but we are not. We are IT-labour contractors. We have not come up with Facebook, WhatsApp, Google, any new operating system or real new products." "Indian industries must start investing more in research and development. Unless we research and come out with solutions, we do not get the benefit. Industrial progress should be based on it," the Minister said while speaking at...
  • What you should not expect when switching to Linux

    09/17/2015 6:48:25 AM PDT · by ShadowAce · 82 replies
    DarkDuck ^ | 17 September 2015 | Dmitry (Darkduck)
    Linux is a great operating system. Nobody in the Linux camp will argue about that. There are many articles on the Internet convincing you to try and to switch to Linux. There are also many articles that attempt to show you why you should not switch. Let's look at this question from a slightly different viewpoint today. Say, you are now convinced that you want to switch to Linux. What you should NOT expect from this switch? 1. Linux works much faster than Windows This isn't too far from the truth. Generally speaking, Linux OS is less resource-hungry than Windows....
  • Map Question

    09/12/2015 7:14:35 PM PDT · by Paul R. · 67 replies
    Me | 9/12/15 | PaulR
    Question: Does anyone here know of an online map source who provides maps that are better suited for printing on modest price (or even B&W) printers, than the usual Google, Bing, etc., maps? Anyone who's ever printed out a map from the above sources knows what I mean. The printed maps are just too "washed out" or faded looking. I can capture maps from the above and copy them into an image or photo viewer like IrfanView to improve them somewhat, but even then, results are poor, and often one ends up using lots of toner for bodies of water,...
  • SD Times Blog: C# is the most used programming language at work [Detailed Breakdown Here]

    09/06/2015 5:47:01 AM PDT · by SeekAndFind · 44 replies
    Software Development Times ^ | 08/25/2015 | Christina Mulligan
    C# is making its way past Java as the most popular programming language in the workplace, according to SD Times readers.While Java sits on top of the TIOBE Programming Community index for August 2015, with C# coming in at No. 4, our latest poll shows C# is the No. 1 language used in the workplace, with Java and C/C++ following.Out of 1,166 votes, 37% of developers voted for C#, 20% voted for Java, and 17% voted for C/C++. The least-popular programming languages used at work, according to the poll, included Python/Ruby/Perl and Objective-C/Swift.A more detailed breakdown of the poll...
  • Vanity: Help! Google Chrome takes 10 minutes to open on Windows 10.

    09/01/2015 11:15:44 AM PDT · by SilvieWaldorfMD · 65 replies
    Self ^ | 9/1/15 | Self
    Every morning, I fire up my home computer (downloaded Windows 10 last week) and when I go to my Google Chrome icon, it takes me exactly 10 minutes for the Google main page to pop up on my screen. I like Google Chrome because I have GooglePlus and GMail, but it seems that Windows 10 is not supporting it because they want users to jump to Microsoft Edge (their browser) instead. What can I do to correct this? Should I uninstall and then install Google Chrome again? This delay is very frustrating.
  • The Raspberry Pi is succeeding in ways its makers almost imagined

    08/27/2015 6:49:38 PM PDT · by markomalley · 41 replies
    The Register ^ | 8/27/15 | Mark Pesce
    Grandpa is getting pretty old. Out there all alone on that farm, he has no one to look in on him, just to see if hes ok. Hell use the landline, but hes beyond of the range of mobile, and hes never been really great with computers. No Skype or emails. Grandpa does have internet. So I built this for him.The girl points down to a small box with a few wires coming out. I can bring up a web browser, and take photos inside grandpas house. Has he moved his coffee cup today? Is the telly on? At least...
  • CPU Cooler Contact Pad

    08/27/2015 9:25:51 AM PDT · by Bob434 · 62 replies
    Just a quick question to all computer gurus- I have an old Pentium 4 2200, and have to replace the cpu cooler/fan, so I ordered one that is supposed to work with socket 478, but the contact pad that came with it is much smaller than the one that came with the computer's cpu cooler which needs replacing- Can I simply grease the new pad and install it? or will I need to purchase new larger pad?
  • Backdoors Won't Solve Comey's Going Dark Problem

    08/16/2015 11:10:27 AM PDT · by zeugma · 13 replies
    Crypto-gram ^ | 8/15/2015 | Bruce Schneier
    At the Aspen Security Forum two weeks ago, James Comey (and others) explicitly talked about the "going dark" problem, describing the specific scenario they are concerned about. Maybe others have heard the scenario before, but it was a first for me. It centers around ISIL operatives abroad and ISIL-inspired terrorists here in the US. The FBI knows who the Americans are, can get a court order to carry out surveillance on their communications, but cannot eavesdrop on the conversations, because they are encrypted. They can get the metadata, so they know who is talking to who, but they can't find...
  • Hillary Clinton May Go To Prison

    08/12/2015 3:01:46 AM PDT · by Biggirl · 64 replies
    Breitbart.com ^ | August 12, 2015 | Joel B. Pollak
    Hillary Clinton is going to prisonor would be, if she were an ordinary person. The FBI has reportedly taken possession of the emails on her home computer server, according to U.S. officials cited by the Associated Press.
  • Review: Epson Kills the Printer Ink Cartridge (plus Video at link)

    08/04/2015 7:25:55 PM PDT · by Swordmaker · 68 replies
    Wall Street Journal Total Return ^ | Aug. 4, 2015 6:27 a.m. ET | By WILSON ROTHMAN
    The new EcoTank printers cost more up front but can churn for years without running dry Epson's new printers change the ink-onomics of your home office. WSJ's Wilson Rothman explains why paying more will make your ink-cartridge hassles disappear. It was after midnight, and I was facing a ticking-clock real estate transaction. All I had to do was print 15 pages of black-and-white contract, sign it and fax it back. Only halfway through, my printer ran out of inkmagenta ink! Thus began a chain reaction culminating in my nearly throwing the printer out the window. I ended up at Kinkos....
  • Free Republic Tech Support HELP!

    07/25/2015 11:50:23 AM PDT · by US Navy Vet · 26 replies
    25 July 2015 | US Navy Vet
    Ok all my desktop(Gateway) died last week and it will be awhile before I will be able to get a replacement(we are looking a Dell Desktop), anyway we have an ASUS Laptop that will have to do for now and I am looking at either a Print Server for printing or getting a whole new wireless Printer, any suggestions/recommendations?
  • Young scientist discovers magnetic material unnecessary to create spin current

    07/24/2015 10:52:34 AM PDT · by Red Badger · 18 replies
    http://phys.org ^ | July 24, 2015 | by Carla Reiter & Provided by: Argonne National Laboratory
    Typically when referring to electrical current, an image of electrons moving through a metallic wire is conjured. Using the spin Seebeck effect (SSE), it is possible to create a current of pure spin (a quantum property of electrons related to its magnetic moment) in magnetic insulators. However, this work demonstrates that the SSE is not limited to magnetic insulators but also occurs in a class of materials known as paramagnets. Since magnetic moments within paramagnets do not interact with each other like in conventional ferromagnets, and thus do not hold their magnetization when an external magnetic field is removed, this...
  • Hacker remotely crashes Jeep from 10 miles away

    07/21/2015 9:51:38 AM PDT · by Zakeet · 70 replies
    (UK) Daily Telegraph ^ | July 21, 2015 | Daniel Bates
    Hackers took control of a car and crashed it into a ditch by remotely breaking into its systems from 10 miles away whilst sitting on their sofa. In the first such breach of its kind security experts cut out the engine and applied the brakes on the Jeep Cherokee, sending it into a spin. The US hackers said they used just a laptop and mobile phone to access the Jeeps on-board systems via its wireless Internet connection. They claim that more than 470,000 cars made by Fiat Chrysler could be at risk of being attacked by similar means - including...
  • Ransomeware attack, need advice

    07/19/2015 6:34:05 AM PDT · by fwdude · 84 replies
    self | 07/16/15 | fwdude
    I have recently had the unpleasant experience of having one of the new variants of the cryptolocker malware infect our computer servers at work. In case someone doesn't know, its a computer worm that encrypts all the standard-format files on a system so that the use can't open the file without a "key," supplied by the hacker for a ransom. My question, which I have researched extensively over over the internet, is whether it is advisable consider paying the ransom, if there is enough "honor among thieves" to trust that the files will be unlock if I pay, and if...
  • Internet Explorer 11, should I download and install

    07/14/2015 6:39:22 PM PDT · by GGpaX4DumpedTea · 69 replies
    Vanity
    I have a laptop with Windows 7 Pro installed and a couple years ago on one of the MS monthly downloads IE 11 was installed. It corrupted my laptop and I had to take it in to where I bought it - got it fixed for $100. I just downloaded the July updates and again did not download IE 11. Is it now safe to download and use? When I had my problem they told me they had seen a number of similar problems with IE 11, and this was not uncommon with IE when the upgrades first come out....
  • Adobe Flash, the much-loathed, bug-plagued relic of a browser plugin..[tr]

    07/14/2015 11:51:13 AM PDT · by don-o · 75 replies
    CNN Money ^ | July 14, 2015
    Mozilla blocked Flash by default in its Firefox browser late Monday night, a day after Facebook's (FB, Tech30) security chief called for Adobe to kill Flash once and for all. The Flash-bashing picked up last week after revelations that the spyware giant known as the Hacking Team had been using Flash to remotely take over people's computers and infect them with malware. (That discovery took place after the Hacking Team was itself hacked. Documents revealed in the breach showed that the Hacking Team exploited two critical vulnerabilities in Flash's code.) "It is time for Adobe to announce the end-of-life date...
  • Here are the 12 most influential programmers working today

    07/11/2015 9:17:04 AM PDT · by SeekAndFind · 38 replies
    Business Insider ^ | 07/11/2015 | MATT WEINBERGER
    The apps and games you use every day don't exist in a vacuum someone, somewhere, wrote the code. That also goes for the underlying platforms and hardware that those apps run on. And the web. And the entire Internet itself. Even the programming languages that people use to build this stuff first had to be written by somebody else. So who's at the top of the programming pyramid? 1) Linus Torvalds created Linux, a free operating system, in his dorm room at the University of Helsinki. Today, Linux is the operating system of choice for data centers, supercomputers, and...
  • No One Is Safe: $300 Gadget Steals Encryption Keys out of the Air, and Its Nearly Unstoppable

    07/08/2015 6:56:44 PM PDT · by 2ndDivisionVet · 27 replies
    BGR ^ | July 8, 2015 | Zach Epstein
    Just when you thought you were safe, a new hacking toy comes along and rocks your world. Imagine a tool exists that lets hackers pluck encryption keys from your laptop right out of the air. You cant stop it by connecting to protected Wi-Fi networks or even disabling Wi-Fi completely. Turning off Bluetooth also wont help you protect yourself. Why? Because the tiny device that can easily be hidden in an object or taped to the underside of a table doesnt use conventional communications to pull off capers. Instead it reads radio waves emitted by your computers processor, and theres...
  • United's 'Glitch' Will Disrupt More Than A Half Million Travelers Today - And Tomorrow Too

    07/08/2015 2:13:38 PM PDT · by SeekAndFind · 8 replies
    Forbes ^ | 07/08/2015 | Dan Reed
    For the second time in five weeks mighty United Airlines, the worlds second-largest carrier, has been brought to its knees by a technical glitch that promises to impact more than half-a-million travelers today at the height of the busiest travel period of the year. The Federal Aviation Administration lifted its full ground stop order at around 9:20 a.m. ET. A ground stop order means that no aircraft in this case no aircraft flown by United and its United Express EXPR +0.05% regional airline partners can take off. United flights already in the air were allowed to continue but...
  • Travel chaos as ALL United flights are grounded nationwide 'after computer glitch...

    07/08/2015 7:13:50 AM PDT · by Cincinatus' Wife · 39 replies
    The Daily Mail ^ | July 8, 2015 | Sophie Jane Evans
    United Airlines flights have been grounded nationwide due to a computer system glitch. Millions of passengers are currently stranded at airports across the U.S. after the airline requested that all planes be prevented from taking off, according to the Federal Aviation Administration (FAA). In a statement, United spokesman Luke Punzenberger told Bloomberg that the company had experienced a 'network connectivity issue' and was 'working to resolve this' as quickly as possible. '[We] apologize to our customers for any inconvenience,' he added.
  • Adobe to Patch Hacking Teams Flash Zero-Day (Yet another Flash player flaw)

    07/08/2015 4:09:02 AM PDT · by Drago · 20 replies
    Krebs on Security ^ | 07/07/2015 | Brian Krebs
    Adobe Systems Inc. says its plans to issue a patch on Wednesday to fix a zero-day vulnerability in its Flash Player software that is reportedly being exploited in active attacks.
  • Deprecating Secure Sockets Layer Version 3.0 (RFC 7568)

    06/30/2015 8:21:27 PM PDT · by zeugma · 32 replies
    Internet Engineering Task Force (IETF) ^ | 06/2015 | R. Barnes et.al.
    A post for the computer techies on the site Internet Engineering Task Force (IETF) R. Barnes Request for Comments: 7568 M. Thomson Updates: 5246 Mozilla Category: Standards Track A. Pironti ISSN: 2070-1721 INRIA A. Langley Google June 2015 Deprecating Secure Sockets Layer Version 3.0 Abstract The Secure Sockets Layer version 3.0 (SSLv3), as specified in RFC 6101, is not sufficiently secure. This document requires that SSLv3 not be used. The replacement versions, in particular, Transport Layer Security (TLS) 1.2 (RFC 5246), are considerably more secure and capable protocols. This document updates the backward compatibility section of RFC 5246 and its...