18 Tutorial Topics
Remove Filter ![]() | |
OCR (Optical Character Recognition) is a technology that enables the conversion of images or scanned documents into machine-readable text. OCR software uses algorithms and machine learning models to recognize and extract text characters from an image, which can then be converted into an editable and searchable format. OCR technology has … Hardware and Software finance legal machine-learning operating-system troubleshoot-hardware | |
Last year, CryptoLocker ransomware [hit the headlines](http://www.daniweb.com/hardware-and-software/microsoft-windows/viruses-spyware-and-other-nasties/news/470427/cryptolocker-250k-infections-in-100-days-nets-300000-or-does-it) after infecting hundreds of thousands of computers and encrypting the data, and backups of that data to any connected device, with the promise of decryption on payment of a fee. This kind of IT extortion is profitable for the bad guys as it … | |
Got Android? Then you had better be on top of your security smarts. With Android cornering more than 80 per cent of the mobile operating system market, it's no surprise that Android devices are the number one target for the mobile malware merchants. Kaspersky Lab reckoned that Android malware attacks … | |
Shadow IT is the usage of unauthorized tech by employees; usually cloud applications and services. A progression of the Bring Your Own Device (BYOD) debate, I have not said that the applications or services themselves are inherently insecure. Nor that usage is for malicious purposes. Quite the opposite is mostly … | |
The Google Experience Launcher, as it was, first arrived exclusively for the Nexus 5 towards the end of last year. That changed recently when the renamed Google Now Launcher (GNL) appeared in the Play Store as a standalone app for Nexus devices and those handsets running Google Play Edition (GPE), … | |
The start button does make a comeback, sort of, in Windows 8.1 but it's still not enough to satisfy the die-hard 'I got Windows 8 but miss Windows 7' brigade. Not least as when you click the Windows 8.1 start button it doesn't pop up the old folder-structured start menu … | |
There are two very obvious truths which need to be stated before going any further: Truth 1 - prevention is better than cure, so don't visit 'dodgy' sites or download anything anyone sends you a link to, and do keep your PC as secure as possible with the help of … | |
##How to set up file synchronization using BitTorrent Sync (part 1) There are a number of services that offer file sharing/syncing via the "cloud". The free versions come with limitations on file size. As well, DropBox suffers from security issues in that encryption is done at the server meaning that … | |
Hello everyone! As some of you may know, Eclipse Luna appears to be broken for users of Kali Linux. There is a simple fix for that > Assuming that you have installed Eclipse Luna locate eclipse.ini `sudo nano eclipse.ini` add the following 2 lines before `--launcher.appendVmargs` --launcher.GTK_version 2 press `ctrl … | |
The purpose of this short and sweet tutorial is equally concise: how to get the original look and feel of the Google Chrome web browser back after installing on a Windows 8 computer. Having recently been forced into buying a new laptop, I finally took the plunge and decided to … | |
Many of you know how to hide your important files and folders and burn them to disc to keep them from being accessed from other users, but if you your drive has so many files that it would take too long to copy all to disc, then why not hide … | |
**How do passwords work?** What a password isn't, or at least really shouldn't be, is some kind of secret word or phrase that is simply compared against a table of usernames in a login database. Such plaintext systems are about as secure as a chocolate padlock on a furnace door. … Hardware and Software algorithm cybersecurity data-protection encryption | |
One of the oldest technology truisms must be that you only realise the importance of backing up your systems after disaster strikes. This is especially true if you have no backups to turn to. There are, thankfully, few excuses aside from sheer laziness not to backup your data these days; … | |
When it comes to web browsers, my general rule of thumb is that the latest version is usually the most secure and this is certainly the case with Internet Explorer. However, when I started using Internet Explorer 11 on my new Windows 8.1 Pro laptop I soon discovered that latest … | |
USING THE ACER ASPIRE 1410 LAPTOP AS AN HD MEDIA CENTER PC: A STEP-BY-STEP ILLUSTRATED TUTORIAL [I]This tutorial is not intended to be a full review of the Acer Aspire 1410 ultraportable laptop PC. It assumes that you already familiar with the machine and are looking to learn how to … Hardware and Software apple apple-hardware audio flash hard-drive home-theater laptop operating-system storage video-card windows-vista | |
With this method you can add any custom button to the Explorer Command Bar/Toolbar which I'm sure you have noticed that Vista and Windows 7 have excluded some familiar buttons, including the Delete Button/Icon. [url]http://www.aeroxp.org/2008/06/custom-explorer-buttons/[/url] If you just want the "Delete Button/Icon" as I did, then download the following zips … | |
If your application provides custom dialog-box features, menu items or other capabilities by making changes to the Windows Registry, you can deploy those capabilities to other computers simply by distributing an update or patch to the Registry. Updating the Registry involves nothing more than exporting the capabilities from the Windows … | |
Debian Linux is what you might call very, very flexible because it runs on nearly any hardware configuration, from Motorola chips to PowerPC to the x86 structure. So whatever your machine is Debian Linux can most likely run on it. However, because installation is so different between different setups, this … |
The End.