Keyword: computers
-
New evidence that the quantum world is even stranger than we thought .journalist-note { background-color: #ebd99f; padding: 0.5rem 0.75rem; } <p> .journalist-note p { margin: 0 !important; } Note to journalists: Journalists visiting campus should follow visitor health guidelines. Experimental evidence of quasiparticles called anyons has been found by a team of scientists at Purdue University. Electrical interference in the experiment created a pattern which the researchers called a “pyjama plot”; jumps in the interference pattern were the signature of the presence of anyons. (Purdue University image/James Nakamura) WEST LAFAYETTE, Ind. — New experimental evidence of a collective behavior of...
-
This 1981 episode of Nightline about computers is more relevant today than it was back then. People should be discussing an Internet Bill of Rights. https://youtu.be/3H-Y-D3-j-M
-
My nephew died last weekend without leaving his wife the password to his Apple MacBook Pro. Is there any possible way for her to hack the password or bypass it. She believes that he has his original compositions and artwork stored on it that he has never shown to anyone. I did not give her any hope but if there is a possibility I would appreciate any help.
-
Another U.S. professor "with strong ties to China" has been arrested and charged with allegedly lying about his ties to the communist country. Song Guo Zheng, who the Justice Department described as a "rheumatology professor and researcher," allegedly used more than $4.1 million in federal research funding to help advance China's capabilities with regard to rheumatology and immunology. The Justice Department alleges he then failed to disclose to the U.S. government that he held employment in China while conducting U.S. taxpayer-funded research as a researcher at multiple universities in the U.S., including Ohio State University. A Google Scholars profile with...
-
I listen to many talks on YouTube, some of the most interesting ones have really horrible audio, so bad, I end up turning it off. (I'm listening to a YouTube of an audio of Carroll Quigley of "Tragedy & Hope"). This really terrific equalizer, with more whistles & bells than you could ever use (I use it for recording music from keyboard direct and with mikes), is titled: PEACE - Peter's Equalizer APO Configuration Extension It interfaces well with FREE "Audacity" recording software. I can now listen to virtually any recording, even the ones that sound like a tin can...
-
Security researchers at Microsoft say they have seen a "steady increase" in unsolicited email attachments containing malicious Excel 4.0 macros. It is part of a "massive campaign" to infect PCs with malware under the guise of providing current statistics related to Covid-19. Phishing scams are nothing new by any stretch, but according to Microsoft (via ZDNet), this latest campaign only started around a week ago "and has so far used several hundreds of unique attachments." "The emails purport to come from Johns Hopkins Center bearing 'WHO COVID-19 SITUATION REPORT'. The Excel files open w/ security warning & show a graph...
-
Hackers have managed to install cryptocurrency mining malware on multiple supercomputers across Europe that have now had to shut down as they investigate...After reviewing malware samples, the UK-based cybersecurity firm Cado Security believes that the attackers likely gained access to the supercomputer clusters by using compromised SSH credentials. These credentials appear to have been stolen from university staff from Canada, China and Poland who were given access to the supercomputers to run demanding and complex computing jobs.
-
Thunderbolt vulnerabilities can let attacker with physical access steal data from memory and encrypted drives. A Dutch researcher has detailed nine attack scenarios that work against all computers with Thunderbolt shipped since 2011 and which allow an attacker with physical access to quickly steal data from encrypted drives and memory. Researcher Björn Ruytenberg detailed the so-called Thunderspy attacks in a report published on Sunday, warning that the attacks work even when users follow security best practice, such as locking an unattended computer, setting up Secure Boot, using strong BIOS and operating system account passwords, and enabling full disk encryption. Microsoft...
-
The Linux terminal is the place to get serious work done. We have plenty of useful linux command tips and tricks to help you with that.But, did you know that you can have a lot of fun using the terminal? Well, if you did not, then you are not alone. Most Linux users see the terminal as an interface that is designed and built for system management and development tasks.However, you will be surprised to know that there are tons of terminal based games and ASCII games that you can play in the terminal. And, in this article, I’m going...
-
Researchers pushing the limits of magnets as a means to create faster electronics published their proof of concept findings today, April 10, in the journal Science. . . . The team exploring methods for creating machines that operate at trillions of cycles per second includes the University of California, Santa Cruz and Riverside, Ohio State University, Oakland University (Michigan) and New York University, among others. Today's computers rely on ferromagnets (the same kind that stick to your refrigerator) to align the binary 1s and 0s that process and store information. Anti-ferromagnets are much more powerful, but their natural state, displaying...
-
Okay, I've had it with someone helping themselves in my computers.. in broad daylight. i have Norton on all and the turn it off. I just did a Windows reset on one.. and unplugged my computers till I can fix the way they get in. I am angry and fed up with their bold thievery. Anyone have a really good solution?
-
I purchased a new PC with Windows 10 the beginning of the year, and one of the first things I did was install Open Shell (used to be called Classic Shell). I had never used it before, but many Windows 7/8 users who were forced into Windows 10 found it to be a useful application to install. For the most part, I like Open Shell. But there is one issue that is bugging me that I can't seem to work around. In a Windows Explorer window, there is a Search box. Normally, past Explorer searches are retained and can be...
-
I have Tampermonkey installed and enabled, and I use Firefox Quantum. There are some userscripts related to Twitter that I can verify DO work correctly, such as "Dowload Twitter Videos" But the userscript I really want to get working is called "Twitter Filter" https://greasyfork.org/en/scripts/34646-twitter-filter Here is some background info. -I used to have greasemonkey scripts working, but they stopped working (possibly about the same time that I installed Tampermonkey?) -So I dis-abled greasemonkey, and only have the Tampermonkey engine enabled at the moment. -There is no way in he11 I want to ever LOGIN to Twitter and use their twitter-supplied...
-
In the past I've always used Malwarebytes and SpyBot to scan my computer. Recently Malwarebytes doesn't pickup anything, probably because I use the free. Looking to replace Malwarebytes.....any suggestions. THX
-
When Wei Sun, a 48-year-old engineer at Raytheon Missile Systems, left for an overseas trip last year, he told the company he planned to bring his company-issued HP EliteBook 840 laptop along. Sun, a Chinese-born American citizen, had been working at Raytheon, the fourth-largest US defense contractor, for a decade. He held a secret-level security clearance and worked on highly sensitive missile programs used by the US military. Since Sun’s computer contained large amounts of classified data, Raytheon officials told him that taking it abroad would not only be a violation of company policy, but a serious violation of federal...
-
China is making swift progress on its 200 billion yuan (US$29.08 billion) fund aimed at investing in home-grown semiconductor development, as the world’s second-largest economy looks to reduce dependence on foreign chips amid a tech war with the US. New investment is likely to lean towards applications in the downstream supply chain, such as chip design, advanced materials and equipment areas, according to the report. The fundraising progress comes amid an escalating tech war with the US, which has seen China tone down statements on its wider “Made in China 2025” policy ambitions, after President Xi Jinping first called for...
-
I am trying to help some family out who want to use a VPN both while on public wifi, and at home for simple privacy from their ISP. They are using 2 Mac laptops, 2 older iPhones, 2 iPads, and 1 old android phone. They do not need to use every device at the same time. They have Apple email accounts, gmail accounts, and Outlook and Hotmail email accounts; all email accounts are run through OSX Mail and iOS Mail. Whenever the VPN is enabled on the Macs, Microsoft instantly sends warning notices to the Outlook and Hotmail email accounts...
-
I am about to receive a Dell PC with Windows 10 Pro installed. It will have both an SSD drive (first one for me) and a SATA drive. With the past Dell PC purchases, I would take the supplied Windows OS disk and reinstall from scratch. Too much junk gets installed by Dell, and it seems trying to delete programs is more cumbersome than just performing a fresh install. I also like learning the clean install process before I actually put personal information on the new PC. Only issues are I have not used Windows 10 at all (initial need...
-
In case you have forgotten - or didn’t need to take note at the time - I would like to remind you again to never, ever buy a HP computer. I’m having another (major) computer problem. Less than 2 years old and I’ve already had it repaired once (to no avail) and then replaced under warranty. The new one worked for 8 months until this recent snafu. All of my issues have a common thread: drivers that will not load or load incorrectly. I’m as far from a techy as you could imagine and if I can diagnose the commonality...
-
An Arkansas-based telemarketing firm sent home more than 300 employees and told them to find new jobs after IT recovery efforts didn't go according to plan following a ransomware incident that took place at the start of October 2019. "Unfortunately, approximately two months ago our Heritage servers were attacked by malicious software that basically 'held us hostage for ransom' and we were forced to pay the crooks to get the 'key' just to get our systems back up and running," wrote Sandra Franecke, the company's CEO, in the letter sent to employees.
|
|
|