50,471 Archived Topics
Remove Filter ![]() | |
So Google has [admitted defeat](https://plus.google.com/+GoogleGlass/posts/9uiwXY42tvc) and is pulling the Google Glass Explorer Program with pretty much immediate effect. January 19 will be the last day to get the Glass Explorer Edition. In a statement, a Google Glass spokesperson said that "we’re ready to put on our big kid shoes and … Hardware and Software apple google seo smartphone | |
Group, My wife's Dell Inspiron had such severe touchpad movement issues we were at the point of scraping it as unuseable. The cursor arrow would randomly stick, jerk instead of moving smoothly or fly across the screen. I tried re-installing the touchpad driver - to no avail. Then I came … | |
Ever wondered why the bad guys continue throwing malware in your direction? The obvious answer is the correct one: because they make money from doing it. On Thanksgiving Day, as all others across the year it would seem, they can be thankful for the high profit to be raked in … | |
The Internet of Things (IoT) is something of a buzz-phrase right now, and locking down the IoT is certainly something that vendors across both security and hardware industries are talking up. The problem with the publicity surrounding stories of 'things' that have been hacked is that, well, they never really … | |
Reports started circulating yesterday that Gmail had been hacked, with some 5 million logins at risk. This follows the publication, on Tuesday, of a plain text list of Gmail usernames and passwords on a Russian Bitcoin forum. Within 24 hours the 'hack hysteria' had taken hold and people were being … | |
Yesterday, Tor [issued a security advisory](https://blog.torproject.org/blog/tor-security-advisory-relay-early-traffic-confirmation-attack) which revealed that a group of relays had been discovered on July 4th which looked like they "were trying to deanonymize users." The advisory states that the attack "involved modifying Tor protocol headers to do traffic confirmation attacks" with the relays having joined the … | |
According to newly published research from cloud-based social Wi-Fi software outfit [Purple WiFi](http://www.purplewifi.net/), of 2,540 consumer questioned vastly more were concerned about getting access to pornography than were worried about matters of data security. The 'Using Wi-Fi in Public Places’ study revealed that 28 percent of those asked (711 people) … | |
The average car is increasingly becoming a vehicle for the Internet; but does this also make it a vehicle for cybercrime? Security vendor Kaspersky Lab, in cahoots with Spanish digital media outfit IAB, reckons that software updates, in-car mobile apps and privacy are all areas which have ripe potential for … Hardware and Software cybersecurity engineering smartphone social-media | |
The Onion Router, better known as the Tor Network, is often thought of as being the dark-side of the web. Not least as the anonymity provided by Tor meant that sites hosted on so-called hidden service servers were free to trade in just about anything from drugs and guns through … | |
Back in the eighties, the Defense Advanced Research Projects Agency ([DARPA](http://www.darpa.mil/)) spent more than a billion dollars in an attempt to create what was, in effect, Skynet. You know, the self-aware artificial intelligence system that goes bad in The Terminator movie. DARPA called it the Strategic Computing Initiative, but it … | |
Given the amount of negative press that has been generated since the announcement of the iPhone 5, calling it everything from boring to disappointing and even naming it the Apple Meh!phone, you might be forgiven for thinking nobody would want to buy it. You would be wrong. Very wrong indeed, … | |
News headlines screaming that yet another Microsoft Windows vulnerability has been discovered, is in the wild or has just been patched are two a penny. Such has it ever been. News headlines declaring that a 'major security problem' has been found with Linux are a different kettle of fish. So … | |
So, Microsoft has finally announced that the SkyDrive cloud storage product line is to be renamed OneDrive. This isn't as a result of disappointing user take up leading to a re-branding exercise, it's much more daft than that. Six months ago a judge in a UK court ruled that Microsoft … | |
Dear All, I am new to Daniweb community. I am a business man in India and not a technical person anyhow. I want to create a SMS Gateway to send bulk SMS. For this I need to have all the technical know how about the same. I also want to … | |
According to Dell SecureWorks Counter Threat Unit (CTU) security researcher [Keith Jarvis](http://www.secureworks.com/cyber-threat-intelligence/threats/cryptolocker-ransomware/), the CryptoLocker ransomware that has been written about so much of late has infected as many as 250,000 computers during the first 100 days of distribution (staring on the 5th of September, 2013). What's more, Jarvis estimates, based … | |
PLEASE HELP - I have forgotten my Windows 8 Password for my new HP Laptop. I can not find a way to bypass. I changed my Microsoft Account password and tried using a new one, yet I continue to receive an error indicating - I do not have access,try again … | |
Hello, I thought I would pass this info along in case anybody comes across a similar problem. About a month ago when I turned on my LCD Monitor it was all fuzzy and the images were all distorted. A week or so later it started shaking and I couldn't even … | |
In my [DaniWeb report](http://www.daniweb.com/hardware-and-software/tablets-and-mobile-devices/news/462936/apple-iphone-5s-the-worlds-first-64-bit-smartphone) on the launch of the new iPhone 5s from Apple, I stated that you could "forget the fingerprint scanner built into the new circular home button" but I knew all along that was never going to be the case. In context, I was focusing upon what … | |
A survey of more than 700 tablet owners in US, UK and Australia has revealed some interesting insights into how people use their devices. The $195 Gartner 'Consumers Buy Media Tablets Based on Lower Prices and Better Quality, not Brand' report (gotta love that snappy title, huh?) unsurprisingly shows that … | |
I have this problem many times most specially to my costumers, this is what i do(video card is the problem) steps: 1. first of all check all hardware and connection to the motherboard if is running properly. 2. 2nd UN-slot video card adapter clean the agp/pci slot and video card … Hardware and Software display pci-card video-card | |
While the News International [phone hacking scandal](http://www.guardian.co.uk/media/phone-hacking) that saw the demise of the News of the World newspaper cannot have escaped your attention in the US or UK, news from India concerning the latest 'tumble and clone' developments could leave the mobile phone calls of more than just celebrities at … | |
A Freedom of Information request from staff at the UK offices of the Huffington Post has revealed, according to a BBC report on the story, that more than 300,000 attempts were made to access pornographic websites from the Houses of Parliament during the last 12 months. Of course, just looking … | |
Users of online banking services are at risk from a new 'in the wild' Trojan, Hesperbot, which has been discovered by the ESET malware research lab. Researchers have found that infections of users in Turkey are currently most rife, with users in the Czech Republic, Portugal, Thailand and the United … | |
[ATTACH]16171[/ATTACH] Windows 7 offers heaps of computing-gravy for users that are looking for something sweeter than XP and less bitter than Vista. It has been optimized and overhauled into a truly modern version of Windows. Unfortunately for a lot of users, upgrading from XP is a daunting task if you … | |
New research by [Varonis](http://www.varonis.com/) has revealed that only 25% of those companies questioned were able to answer yes to the question: "Are you able to detect when files containing sensitive data are uploaded to a third party cloud service?" Which left a staggering three-quarters of businesses in the dark about … ![]() | |
1st of all , let me mention my hardware : **HP G6 laptop with win8** : amd a4 4300M, radeon graphics : 512 MB 7420G + 1GB 7670M , 4 gb 1600 Mhz ram. **4 yr old Desktop running xp sp2** : amd athlon x2 250 , inbuilt graphics : … | |
Although the Opera web browser client is no longer the big 'little player' that it used to be having long since been eclipsed by the likes of Chrome and Firefox in the Internet Explorer alternatives stakes, it can still claim more than 300 million users and a place as world’s … ![]() | |
 This is the latest upgrade to the Camera Link product from Sandberg, making it compatible with the iPad 3 and iPad 4/Mini; but not at the same time. To get the iPad 4 compatibility rather obviously requires the Lightning connector equipped version, which costs the same as the … | |
Dana Tamir, Enterprise Security Director for [Trusteer](http://www.trusteer.com/) has recently uncovered a variation of the TorRAT banking data malware which has been actively configured to target Twitter users. The attack works by "injecting Javascript code into the victim’s Twitter account page" Tamir says, adding that the malware "collects the user’s authentication … ![]() | |
*hi!guys can any know the process how we cracke the windows 7 and that does not appear the message that is window is not a genuine..* | |
Why has it taken six years for someone to take a contract out on my life? Or, more accurately, for a scammer to send me an email demanding payment of a bribe in order for him to cancel a supposed contract. The first hitman scam was spotted almost exactly six … | |
The latest VIPRE report, detailing the ten most prevalent malware threat detections spotted by [GFI Labs](http://malwareprotectioncenter.com/) and the ThreatNet Detection System, reveals that Google, LinkedIn, Skype and Mass Effect 3 were amongst the big brands being exploited by cybercriminals in order to leverage trust whilst distributing malware-laden emails. As a … ![]() | |
Microsoft Security Advisory notices do not, as a rule, make the media sit up and take much notice. Not least as they have become relatively commonplace over the years, but every now and then one comes along which may grab some press attention. Take [MSA 2718704](http://technet.microsoft.com/en-us/security/advisory/2718704) for example.  … ![]() | |
Over the weekend I wrote a news story for DaniWeb which revealed how the iPhone was vulnerable to SMS text message spoofing. This went under the title "[Why Apple was right about iMessage 'fix' for iPhone SMS spoofing](http://www.daniweb.com/hardware-and-software/apple/ios-iphone-os/news/431373/why-apple-was-right-about-imessage-fix-for-iphone-sms-spoofing)" because, simply put, SMS text messaging is exposed to this kind of … ![]() | |
I was recently on my Laptop notebook "Hp Compaq NC6400" and the screen went black on me but the computer was still runnning. I tried shutting the comuter down and restarting it. Didn't work. I tried connecting the notebook to another monitor it worked for a few minutes until the … | |
Microsoft has been slowly moving away from the desktop PC software market for many years now, and with the recent launches of Windows 8 and the Surface tablets, along with the latest Windows Phone devices, the whole mobile and touch arena has taken quite a bit of the consumer-oriented focus. … | |
[i]I found this in a few different places around the 'net - hopefully it's helpful:[/i] [font=Arial][size=5][color=#0000ff]Create a Desktop Shortcut to Lock Your Computer[/color][/size][/font] [font=Arial][size=2]You secure your computer by locking it whenever you're away from your desk. If you?re on a domain, by pressing Ctrl+Alt+Del and then clicking Lock Computer, you … | |
Hi, Due to Hurricane Sandy, my office currently has electricity but no Internet access, with no ETA (it's been nearly a week, and they are saying it might be another week). I desperately need to move our SVN server, hosted in our office, to our off-site servers hosted in Texas, … | |
One of the Internet's biggest online dating sites, eHarmony, has confirmed that security has been breached and member passwords compromised. eHarmony spokesperson Becky Teraoka says that "a small fraction of our user base has been affected" although I am led to understand that the 'small fraction' in question is actually … | |
Hi! Does anyone know of any worthwhile machine language OSes to try? I just learned about them in class. It's an interesting idea in terms of speed and portability. I could only find two online, one was in Russian, and the other was MikeOS. Does anybody know any other OSes … | |
For unknows reasons, other than the fact that I'm trying to intall Windows 8 beta on a separate partion (and the fact that, well, I AM dealing with Windows <sigh>. I kept ending up with a dead 8GB thumb drive that was dead because Windows, in its infinite wisdom caused … | |
As a three times winner of the IT Security Journalist of the Year award in the UK, I am used to writing about all kinds of scams. Whilst most of them try and weasel their way into the bank accounts of the victim through purely online means, increasingly the bad … | |
Acronis responds to DaniWeb questions regarding a leak of customer data which, [as we exclusively reported over the weekend](http://www.daniweb.com/hardware-and-software/microsoft-windows/viruses-spyware-and-other-nasties/news/427455/breaking-acronis-blames-technical-issue-for-customer-data-leak), resulted in some information being indexed by search engines and accessible to anyone on the Internet.  Although the leak itself was identified by Acronis on Friday 29th June, the … | |
Recently we have all become somewhat over-exposed to the leaking of customer data courtesy of inadequate security allowing hackers to gain access to databases. The [LinkedIn LeakedOut leak](http://www.daniweb.com/internet-marketing/social-media-and-communities/news/425019/linkedin-confirms-six-million-password-hack-check-if-yours-is-one-of-them) and [eHarmony dating data disaster](http://www.daniweb.com/hardware-and-software/microsoft-windows/viruses-spyware-and-other-nasties/news/425118/dating-disaster-eharmony-confirms-passwords-exposed-by-linkedin-hacker#post1817377) are good examples of the genre. However, let's not forget that sometimes no hackers are required to … | |
I can neither copy nor paste text, either by pressing ctrl+C and ctrl+V or by right-clicking. Does anyone know why? ![]() | |
Ah, sunny California. Brent Fouch's day starts like many other business owners'. He gets to work, drinks his coffee and slips on a high resolution, neuro-signal acquisition and processing wireless neuroheadset. Flipping on his PC, Brent moves the cursor around his computer, opens programs and goes about his day - … | |
USING THE ACER ASPIRE 1410 LAPTOP AS AN HD MEDIA CENTER PC: A STEP-BY-STEP ILLUSTRATED TUTORIAL [I]This tutorial is not intended to be a full review of the Acer Aspire 1410 ultraportable laptop PC. It assumes that you already familiar with the machine and are looking to learn how to … Hardware and Software apple apple-hardware audio flash hard-drive home-theater laptop operating-system storage video-card windows-vista | |
Hi Driver cd of Usb to serial converter is lost, I do not know the make.model of the same. Can somebody Help me? :sad: | |
[ATTACH=RIGHT]21290[/ATTACH]The HP ProBook 6560b at first glance is not distinguishable from other laptops. However, this business rugged machine was designed for the modern day businessman. It’s sleek, charcoal black aluminum case is smooth to the touch. Weighing in at a little less than six pounds, this laptop was made to … | |
When you activate Windows XP, Microsoft stores the data in the Windows Product Activation database files [B]wpa.dbl[/B] and [B]Wpa.bak[/B] in the folder [I]%systemroot%\system32[/I]. If you change the motherboard or make significant hardware changes, XP will require you to reactive. But if you plan to reinstall XP on the same hardware, … |
The End.