Free Republic 2nd Qtr 2024 Fundraising Target: $81,000 Receipts & Pledges to-date: $28,398
35%  
Woo hoo!! And we're now over 35%!! Thank you all very much!! God bless.

Keyword: computers

Brevity: Headers | « Text »
  • Conservatives Press GOP to Restrict DOJ’s Foreign Cloud Snooping

    05/13/2015 10:04:08 AM PDT · by Kaslin · 4 replies
    Townhall.com ^ | May 13, 2015 | Neil McCabe
    An alliance of free-market conservatives is building support for a bill that would thwart the Obama administration's bid to make foreign computers, servers and data farms subject to Justice Department search and seizure.The alliance stepped up its pressure on Capitol Hill with the release of its May 1 “coalition letter” to Sen. Charles “Chuck” Grassley (R-Iowa) and Rep. Robert W. Goodlatte (R.-Va.), the two men who chair the judiciary committees in their chamber. The letter calls on the chairmen to move forward on the Law Enforcement Access to Data Stored Abroad Act.To put things in perspective, in 1995 the email...
  • CHIP, a $9 computer with WiFi, Bluetooth, 1GHz CPU, 512MB RAM and 4GB storage

    05/10/2015 3:56:53 PM PDT · by ShadowAce · 59 replies
    The Next Digit ^ | 10 May 2015 | Suzanne Jean
    With the sizes slimming down, it is certainly not a huge surprise that we have a Chip sized computer amidst us. What is really astonishing is the fact that this chip sized computer costs only $9 and can do literally everything for you. The Chip as it has been named runs on Linux and includes Wi-Fi and Bluetooth as well.In fact, CHIP from Next Thing Co. also offers a VGA or an HDMI post for monitors, adding immense versatility to it. To be true, this is certainly one invention that all of us might just have been looking forward to.CHIP has...
  • Solid-state drives lose data if left without power for just a few days

    05/10/2015 1:06:11 PM PDT · by Utilizer · 49 replies
    ZDNet ^ | May 9, 2015 | Zack Whittaker
    Storage. It's not a sexy topic. But everyone uses it in some way or another. You have iPhones, you have computers. Everyone knows how important a person's data is. But it doesn't just "disappear." Or does it? New research suggests that newer solid-state hard drives, which are faster and offer better performance, are vulnerable to an inherent flaw -- they lose data when they're left dormant in storage for periods of time where the temperature isn't properly regulated. The worrying factor is that the period of time can be weeks, months, but even in some circumstances -- just a few...
  • Taking on the Smart Criminals

    05/07/2015 11:29:45 PM PDT · by nickcarraway · 1 replies
    Financial Times ^ | Emma Jacobs
    In the mid-1990s, Marc Goodman, then an investigator in the Los Angeles Police Department, tried to convince his boss of the need for a computer crime unit. The reaction? Utter bafflement. “This captain said to me, ‘Computer crime, what is that? Like if you take the monitor and hit somebody in the head and kill them?’” It is a telling anecdote. While law enforcement agencies have become in­creasingly sophisticated technologically, criminals have the edge, according to Mr Goodman. That was something he observed when investigating drugs and vice in LA. “In those days the only people that had pagers in...
  • Glenn Beck on Ted Cruz: 'I'm not sure that he could govern'

    05/04/2015 11:50:06 AM PDT · by 2ndDivisionVet · 127 replies
    The Washington Examiner ^ | May 4, 2015 | Eddie Scarry
    (VIDEO-AT-LINK) Conservative radio host Glenn Beck said on his show Monday that he's "not sure" Republican presidential candidate Ted Cruz is able to "govern." Beck made the comment while discussing each of the potential GOP presidential nominees and what he saw as their ability to lead. "We are looking at unbelievable times ahead of us," Beck said. "And I would say on this, I'm not sure [Cruz] could get the coalition together. He'll be a bulldog and he'll stand for principles but I'm not sure that he could govern. I'm not sure yet." One of Beck's co-hosts asked how Cruz...
  • Silicon Valley Then and Now: To Invent the Future, You Must Understand the Past

    05/03/2015 6:00:06 PM PDT · by 2ndDivisionVet · 10 replies
    BackChannel ^ | May 1, 2015 | Leslie Berlin
    “You can’t really understand what is going on now without understanding what came before.” Steve Jobs is explaining why, as a young man, he spent so much time with the Silicon Valley entrepreneurs a generation older, men like Robert Noyce, Andy Grove, and Regis McKenna. It’s a beautiful Saturday morning in May, 2003, and I’m sitting next to Jobs on his living room sofa, interviewing him for a book I’m writing. I ask him to tell me more about why he wanted, as he put it, “to smell that second wonderful era of the valley, the semiconductor companies leading into...
  • Big adobe Illustrator Issues

    04/29/2015 11:50:22 AM PDT · by MeshugeMikey · 26 replies
    MeshugeMikey ^ | April 29, 2015 | MeshugeMikey
    When I do a normal launch of adobe illustrator It freezes. when I do the optional launch....I get no toolbar etc etc. Im stumped and haven't been able to get anywhere on the adobe forums help! Thank you
  • Pentagon says it evicted Russian Hackers

    04/24/2015 11:38:40 AM PDT · by Izzy Dunne · 6 replies
    Reuters ^ | 23 Apr 2015 | Phil Stewart
    The United States on Thursday disclosed a cyber intrusion this year by Russian hackers who accessed an unclassified U.S. military network, in a episode Defense Secretary Ash Carter said showed the growing threat and the improving U.S. ability to respond.
  • Here’s How to Download and Delete What Google Search Knows About You

    04/22/2015 12:03:08 PM PDT · by ckilmer · 36 replies
    yahoo.com ^ | April 21, 2015 | Daniel Howley
    Have you ever what Google Search really knows about you? Well, now you can check, as Google has added a new feature that lets you view and download your entire search history. Yep. Everything.
  • "Fed Up" Colorado Man, 38, Busted For Killing His Computer In Cold Blood

    04/21/2015 3:34:59 PM PDT · by MeshugeMikey · 110 replies
    The Smoking Gun ^ | APRIL 21, 2015 | No Attribution
    A Colorado man who has been “fighting with his computer for the last several months” unloaded a volley of shots into his Dell tormentor, resulting in the death of the computer and his arrest for discharging a firearm, cops report. When asked about the shooting, Hinch told TSG, “I just had it,” adding that he tired of the balky computer’s “blue screen of death.” Hinch said that he whacked the computer with a 9mm Hi-Point pistol recently purchased from a Craigslist seller. The gun was seized by police, who left the computer behind. The late Dell XPS 410 model, seen...
  • Colorado man cited for 'killing' uncooperative computer with handgun

    04/21/2015 2:03:32 PM PDT · by Beave Meister · 37 replies
    Reuters ^ | 4/21/2014
    DENVER (Reuters) - Police in Colorado have cited a 37-year-old man for carrying his computer into an alley then shooting it eight times with a handgun after what authorities said had been a long battle with the uncooperative machine. Lucas Hinch was cited for discharging a firearm within city limits after officers responded to a "shots fired" call early on Monday evening, the Colorado Springs Police Department said in a statement. "Investigation revealed a resident was fed up with fighting his computer for the last several months," said the statement, entitled "Man Kills His Computer."
  • Future of BIG DATA

    04/17/2015 11:47:03 AM PDT · by Paul46360 · 1 replies
    The interesting part is the lower right hand of the pictorial.
  • Adobe Patches Flash Flaw Targeted by Exploit in the Wild

    04/14/2015 8:34:23 PM PDT · by Swordmaker · 45 replies
    Intego.com ^ | April 14th, 2015 | by Derek Erwin
    Adobe Systems has released a patch for 22 vulnerabilities in Flash Player, one of which is reportedly under attack by an exploit that exists in the wild. The most critical vulnerability, CVE-2015-3043, could lead to code execution. Adobe's Flash Player security updates are available for Macintosh, Windows and Linux."Adobe is aware of a report that an exploit for CVE-2015-3043 exists in the wild, and recommends users update their product installations," said Adobe. If you reached this page because you're unsure if a popup alert from Adobe is real, take a look at our helpful guide for best practices how to safely install and...
  • Kaspersky releases tools to decrypt files encrypted with CoinVault Ransomware

    04/14/2015 6:46:32 PM PDT · by Utilizer · 20 replies
    TechWorm ^ | on April 14, 2015 | Abhishek Kumar Jha
    Software security group Kaspesky labs in collaboration with the Dutch police has released a tool which helps to decrypt files locked by Ransomware. Kaspersky Labs has released a decryption tool for files encrypted with CoinVault ransomware. The tool was developed by the Kaspersky lab after the The National High Tech Crime Unit (NHTCU) of the Dutch police handed over the information obtained from a database of CoinVault command-and-control server containing the decryption keys.
  • More than 300 Chicago jobs lost as TigerDirect shutters stores

    04/08/2015 8:09:34 AM PDT · by fulltlt · 12 replies
    Crain's Chicago Business ^ | 4/6/2015 | Crain's Chicago Business
    More than 300 Chicago-area jobs will be lost when electronics retailer TigerDirect closes all but three of its 34 stores, including four Chicago-area locations and a distribution center. About 40 employees at each location will be cut, a spokeswoman said. Stores in Orland Park, Hoffman Estates, Naperville and Vernon Hills are among those closing. According to the latest Illinois Warn report, layoffs will occur at the retail locations May 9. A distribution center adjacent to the Naperville store will also be shuttered, with 172 workers scheduled to be laid off June 8.
  • How the US thinks Russians hacked the White House

    04/08/2015 4:17:19 AM PDT · by afraidfortherepublic · 15 replies
    CNN ^ | 4-8-15 | Evan Perez and Shimon Prokupecz
    Washington (CNN)—Russian hackers behind the damaging cyber intrusion of the State Department in recent months used that perch to penetrate sensitive parts of the White House computer system, according to U.S. officials briefed on the investigation. While the White House has said the breach only affected an unclassified system, that description belies the seriousness of the intrusion. The hackers had access to sensitive information such as real-time non-public details of the president's schedule. While such information is not classified, it is still highly sensitive and prized by foreign intelligence agencies, U.S. officials say. The White House in October said it...
  • Russia’s Invasion of White House Computers: The Story Still Has Not Been Told

    04/08/2015 4:10:21 AM PDT · by afraidfortherepublic · 9 replies
    Powerline ^ | 4-7-15 | John Hinderaker
    CNN has made news with this headline: “How the U.S. thinks Russians hacked the White House.” Russian hackers behind the damaging cyber intrusion of the State Department in recent months used that perch to penetrate sensitive parts of the White House computer system, according to U.S. officials briefed on the investigation. While the White House has said the breach only affected an unclassified system, that description belies the seriousness of the intrusion. The hackers had access to sensitive information such as real-time non-public details of the president’s schedule. While such information is not classified, it is still highly sensitive and...
  • Mono 4 Released, First Version To Adopt Microsoft Code (Windows .NET for Linux)

    04/05/2015 8:26:58 AM PDT · by dayglored · 8 replies
    Slashdot ^ | April 5, 2015 | jones_supa
    Version 4.0.0 of Mono, the FOSS implementation of the .NET Framework, has been released. This is the first release of Mono that replaces various components of Mono with code that was released by Microsoft under the MIT license. Microsoft itself is working towards .NET Core: a redistributable and re-imagined version of .NET, which has two code drops: CoreFX and CoreCLR. Mono at this point continues to provide an API that tracks the .NET desktop/server version. This means that most of the Mono code that has been integrated from Microsoft comes from the ReferenceSource code drop. ...
  • Malwarebytes Programs

    04/02/2015 10:43:19 AM PDT · by hsmomx3 · 21 replies
    Is Malwarebytes and Malwarebytes Anti-Exploits two separate programs? If so, is it advised to have both programs on my computer? I am currently using Malwarebytes Anti-malware on my Windows 8.1 system.
  • No, it’s not always quicker to do things in memory (computer)

    03/26/2015 8:27:11 PM PDT · by Utilizer · 67 replies
    ITworld ^ | March 25, 2015 | Phil Johnson
    It’s a commonly held belief among software developers that avoiding disk access in favor of doing as much work as possible in-memory will results in shorter runtimes. The growth of big data has made time saving techniques such as performing operations in-memory more attractive than ever for programmers. New research, though, challenges the notion that in-memory operations are always faster than disk-access approaches and reinforces the need for developers to better understand system-level software. These findings were recently presented by researchers from the University of Calgary and the University of British Columbia in a paper titled When In-Memory Computing is...