Free Republic 3rd Qtr 2025 Fundraising Target: $81,000 Receipts & Pledges to-date: $26,970
33%  
Woo hoo!! And we're now over 33%!! Thank you all very much!! God bless.

Keyword: computers

Brevity: Headers | « Text »
  • Blender 2.77 Question

    08/02/2016 8:32:17 PM PDT · by WhatNot · 20 replies
    Hello all, I recently started using the free blender 2.77 software, I'm a brand new user, and have never modeled anything using 3D software. (I got it for an educational job, I'll be taking soon) I have many of the basics down, but was hoping there may be some more advance users in freeper ville who could help with a couple questions. (I know there's forums out there for this, but I'm trying to cut down on all the sign ups)If you want to download this free software, here's the link.Blender Foundation Download
  • Vortex laser offers hope for Moore’s Law

    07/31/2016 11:23:06 PM PDT · by 2ndDivisionVet · 5 replies
    The University of New York at Buffalo ^ | July 28, 2016 | Cory Nealon
    The optics advancement may solve an approaching data bottleneck by helping to boost computing power and information transfer rates tenfold BUFFALO, N.Y. — Like a whirlpool, a new light-based communication tool carries data in a swift, circular motion. Described in a study published today (July 28, 2016) by the journal Science, the optics advancement could become a central component of next generation computers designed to handle society’s growing demand for information sharing. It may also be a salve to those fretting over the predicted end of Moore’s Law, the idea that researchers will find new ways to continue making computers...
  • Fun with the Windows Subsystem for Linux

    07/22/2016 12:13:55 PM PDT · by Scutter · 31 replies
    Windows Blog ^ | 7/22/2016 | Pete Brown
    At Build 2016, Microsoft introduced to the world the Windows Subsystem for Linux (Beta) [WSL], which enables developers to run native Ubuntu user-mode console binaries through the Bash shell in Windows 10. If you’re in the Windows Insider program, you’ve had the opportunity to try out this feature using the latest Windows Anniversary Update Insider Builds.
  • Maybe Now They’ll Pay Attention To The Gulen Schools

    12/12/2013 6:51:24 AM PST · by LSUfan · 16 replies
    The Hayride ^ | 11 Dec 13 | Christopher Holton
    Wednesday afternoon the story broke in Baton Rouge media that the Kenilworth Science & Technology School had been raided by the FBI. The FBI indicated that the raid, which evidently was conducted to gather material evidence in the form of documents and computers, was not a matter of public safety. As a result, it probably was not related to a report earlier this year that a teacher at the school was accused of having inappropriate pictures of children on his cell phone. Had those charges stuck, that would have been the second scandal of a sexual nature involving a Gulenist...
  • New ‘Ranscam’ Ransomware Lowers The Bar But Raises The Stakes

    07/14/2016 9:41:43 PM PDT · by Utilizer · 20 replies
    DarkReading ^ | 7/11/2016 05:15 PM | Kelly Jackson Higgins
    ... Ransomware variants are multiplying like rabbits: while some are more sophisticated and tougher to combat, others are more about scamming than kidnapping. Take the new Ranscam malware discovered by Cisco’s Talos team, a low-tech but highly destructive attack that demands ransom from its victims but never returns them their files because it actually deleted them. Ranscam isn’t the first ransomware variant to destroy files rather than return them after victims pay up—there’s AnonPop and JIGSAW, for example—but it’s a glaring example of how the ransomware scam itself is so lucrative and easy to pull off that less sophisticated attackers...
  • COURT: US GOVERNMENT CAN'T MAKE MICROSOFT REVEAL CLOUD DATA

    07/14/2016 1:41:33 PM PDT · by Swordmaker · 7 replies
    Associated Press ^ | July 14, 2016 | BY LARRY NEUMEISTER
    NEW YORK (AP) -- A federal appeals court delivered a victory to U.S. companies housing customer data overseas, ruling Thursday that prosecutors cannot force Microsoft to reveal content from a customer's email account stored in Ireland. The 2nd U.S. Circuit Court of Appeals in Manhattan overturned a lower court order finding the company in civil contempt for not handing over the data. Microsoft offers storage through its "public cloud," which places data from over 1 billion customers and over 20 million businesses on servers in over 40 countries, the court noted.
  • Ruling could make sharing passwords for subscription services a federal crime

    07/11/2016 11:12:16 AM PDT · by servo1969 · 41 replies
    FoxNews.com ^ | 7-11-2016 | FoxNews.com
    A new federal court ruling could make sharing your passwords for subscription services -- covering everything from Netflix to HBO GO -- a federal crime punishable by prison time, according to a judge who opposed the decision. The ruling, issued by the Ninth Circuit Court of Appeals last week, pertained to a trade-secrets case and found that certain instances of sharing passwords are prosecutable under the Computer Fraud and Abuse Act (CFAA) - legislation predominantly concerned with hacking. The case involved David Nosal, a headhunter who left his former company Korn/Ferry and then used the password of an employee to...
  • Cameras Catch break in at Whistleblower's law firm

    07/07/2013 5:02:23 PM PDT · by penelopesire · 114 replies
    Foreign Policy Magazine ^ | July 7,2013 | John Hudson
    The offices of a Dallas law firm representing a high-profile State Department whistleblower were broken into last weekend. Burglars stole three computers and broke into the firm's file cabinets. But silver bars, video equipment and other valuables were left untouched, according to local Fox affiliate KDFW, which aired security camera footage of the suspected burglars entering and leaving the offices around the time of the incident. The firm Schulman & Mathias represents Aurelia Fedenisn, a former investigator at the State Department's Office of the Inspector General. In recent weeks, she raised a slew of explosive allegations against the department and...
  • Symantec scrambles to patch severe holes in 26 products

    07/06/2016 10:19:36 PM PDT · by Utilizer · 27 replies
    iTnews (AUS) ^ | Jun 29 2016 12:09PM | Juha Saarinen
    Symantec enterprise and Norton security product users are being urged to patch their applications immediately after multiple dangerous vulnerabilities were discovered. The security firm has advised that 17 enterprise security products and nine Norton consumer offerings are affected. Google Project Zero researcher Tavis Ormandy discovered the flaws. The most serious is that the products unpack compressed executables in the operating system kernel to analyse them for malicious code. He said this dangerous practice means the vulnerability can be exploited by simply sending a link or an email - users don't need to do anything to activate an attack.
  • Feel Extreme Workbench Envy After Seeing The Tempel

    07/04/2016 7:25:53 PM PDT · by Utilizer · 32 replies
    Hackaday ^ | July 4, 2016 | Gerrit Coetzee
    For those of us with space to spare, our workbenches tend to sprawl. The others who are more space limited will certainly feel envy at [Love Hultén]’s beautiful Tempel workbench. The workbench appears at first to be a modern interpretation of a secretary’s desk. There are some subtle hints that it is no ordinary piece of furniture. The glowing model of our solar system on the front, for example.
  • Trump Starts Tracking, Targeting Fans With Web Ad Software

    06/27/2016 8:09:26 PM PDT · by 2ndDivisionVet · 58 replies
    NBC News ^ | June 27, 2016 | Ari Levy, CNBC
    Donald Trump is finally acknowledging that his online activity has to go beyond just posting on Twitter and Facebook. The Republican Party's presumptive nominee for president has started using online advertising software from ad-tech company Rocket Fuelthat can help the campaign track user behavior, send targeted messages to prospective supporters and engage with fans. CNBC.com learned of the addition by using Ghostery, a browser plug-in that shows all the data tracking tools running on a website. Hillary Clinton and Bernie Sanders turned to ad-tech software early on in the Democratic primary, as did Ted Cruz and others on the Republican...
  • Coding bootcamps: Can you believe their claims?

    06/25/2016 6:29:33 PM PDT · by 2ndDivisionVet · 44 replies
    The Christian Science Monitor ^ | June 25, 2016 | Max Lewontin
    The bootcamps promise 12-week immersive training programs, but critics say high job placement numbers may not be credible. Will federal loans help or undermine credibility and costs? To many students and career-changers hoping to gain programming skills and break into the lucrative tech world, coding bootcamps can seem like a promising option. Since 2012, such bootcamps have offered hands-on, intensive technical training in as little as 12 weeks, boasting job placements as high as 98 or 99 percent once students complete the program. But while advocates pitch them as an alternative to a traditional degree program, critics point to their...
  • Operators of Tech Support Scam Settle FTC Charges

    06/21/2016 11:48:28 AM PDT · by KeyLargo · 7 replies
    Imperial Valley News ^ | June 20, 2016
    Operators of Tech Support Scam Settle FTC Charges Details Written by IVN Category: National News Published: 20 June 2016 Washington, DC - The defendants behind Vast Tech Support have agreed to settle Federal Trade Commission and State of Florida charges that they scammed thousands of consumers out of millions of dollars by selling them bogus technical support services. Under the settlement, Vast Tech Support, LLC and OMG Tech Help, LLC and their chief operating officer, Mark Donohue are prohibited from misleading consumers about the nature of the products they sell or market, as well as from deceptive telemarketing. In addition,...
  • New (Windows) ransomware strain coded entirely in Javascript

    06/20/2016 7:31:04 PM PDT · by Swordmaker · 46 replies
    BBC ^ | June 20, 2016
    The script is disguised as a document Security researchers have discovered a new strain of ransomware coded entirely in Javascript, which could increase its chances of being activated. Unlike executable program files, Javascript documents do not always trigger a security warning on Windows or require administrator access to run. Named RAA, the malware is disguised as a document and starts encrypting files immediately when opened. One security expert said the approach was likely to fool many victims. "It's an interesting approach to ransomware," said Ken Munro of security company Pen Test Partners. "Using Javascript as an attachment to an email...
  • Kill Flash now. Or patch these 36 vulnerabilities. Your choice

    06/18/2016 10:08:56 AM PDT · by Utilizer · 26 replies
    The Register ^ | 16 Jun 2016 at 18:50 | Shaun Nichols
    Adobe has released an update for Flash that addresses three dozen CVE-listed vulnerabilities. The update includes a fix for the CVE-2016-4171 remote code execution vulnerability that is right now being exploited in the wild to install malware on victims' computers. Adobe is recommending that users running Flash for Windows, macOS, Linux, and ChromeOS update the plugin as quickly as possible, giving the update the "Priority 1" ranking, a designation reserved for flaws that are, according to Adobe, "being targeted, or which have a higher risk of being targeted." Adobe credited security researchers at Cisco Talos, Google Project Zero, FireEye, Microsoft...
  • Intel x86s hide another CPU that can take over your machine (you can't audit it)

    06/15/2016 7:43:51 PM PDT · by Utilizer · 44 replies
    Zicos ^ | Wednesday June 15, 2016. 02:48 PM | from BoingBoing
    The Intel Management Engine (ME) is a subsystem composed of a special 32-bit ARC microprocessor that's physically located inside the chipset. It is an extra general purpose computer running a firmware blob that is sold as a management system for big enterprise deployments. When you purchase your system with a mainboard and Intel x86 CPU, you are also buying this hardware add-on: an extra computer that controls the main CPU. This extra computer runs completely out-of-band with the main x86 CPU meaning that it can function totally independently even when your main CPU is in a low power state like...
  • This startup may have built the world's fastest networking switch chip

    06/15/2016 1:33:20 PM PDT · by 2ndDivisionVet · 7 replies
    IT News ^ | June 14, 2016 | Stephen Lawson
    Networking has undergone radical changes in the past few years, and two startup launches this week show the revolution isn’t over yet. Barefoot Networks is making what it calls a fully programmable switch platform. It came out of stealth mode on Tuesday, the same day 128 Technology emerged claiming a new approach to routing. Both say they’re rethinking principles that haven’t changed since the 1990s. Now is a good time to shake up networking, because IT itself is changing shape, says Nemertes Research analyst John Burke. “Everybody pretty much wants and needs their IT services to work continuously and scalably,”...
  • I feel like I'm being scammed.

    06/07/2016 9:38:51 AM PDT · by The Louiswu · 16 replies
    Me ^ | 6/7/2016 | The Louiswu
    I am being told by a representative of Yext.com that in order to change any of my business listings on the internet I have to PAY - that all of this information has been monetized and that information, even if I want to remove to is basically owned by someone else. Is this true? Is there a way I can correct errors in my business info without paying an arm and a leg?
  • Phone Scam ‘Onslaught’ Has Authorities Scrambling

    05/27/2016 7:17:06 AM PDT · by KeyLargo · 140 replies
    WSJ video ^ | 5/27/2016
    Phone Scam ‘Onslaught’ Has Authorities Scrambling 5/27/2016 Telephone scammers posing as tech support, lottery reps or even government officials are inundating U.S. homes as cheap technology and the rapid rise in Internet access globally makes it easier to set up ..
  • Hillary Clinton Wasn't Adept at Using a Desktop for Email, Inquiry Is Told

    05/27/2016 1:15:46 AM PDT · by Zakeet · 60 replies
    NY Times ^ | May 26, 2016 | Eric Lichtblau and Steven Lee Myers
    Hillary Clinton and her advisers have offered a series of explanations over the last year for her decision to use a private email server as secretary of state, a decision that she said again on Thursday had been "a mistake." She did not want the inconvenience of carrying two phones, Mrs. Clinton said initially. She did not want a government account that might pull in nonwork matters, she said later. Or perhaps, an adviser has said, she simply did not want Republican lawmakers rifling through her personal emails. Yet another explanation emerged Thursday: She was not comfortable with using a...