How to open & run Chrome, Firefox, IE, Microsoft Edge in Full Screen Mode

The content below is taken from the original ( How to open & run Chrome, Firefox, IE, Microsoft Edge in Full Screen Mode), to continue reading please visit the site. Remember to respect the Author & Copyright.

While the taskbar, bookmarks bar, and menu buttons make the things accessible, we at times want to remove all of them and browse the web using our web browser in full-screen mode, with no menu bar, buttons or taskbar around. […]

This post How to open & run Chrome, Firefox, IE, Microsoft Edge in Full Screen Mode is from TheWindowsClub.com.

Southampton meeting, 16th January

The content below is taken from the original ( Southampton meeting, 16th January), to continue reading please visit the site. Remember to respect the Author & Copyright.

Users in the Southampton area will have the opportunity to meet up on the evening of Tuesday, 16th January, in their usual venue, the Sports Centre of Itchen College. The group’s normal meeting day is the second Tuesday of the month, which should have meant the 9th – but a week’s delay was necessary because […]

windows10-media-creation-tool (10.0.16299.15)

The content below is taken from the original ( windows10-media-creation-tool (10.0.16299.15)), to continue reading please visit the site. Remember to respect the Author & Copyright.

Create a bootable ISO or Flashdrive to apply the free Windows 10 upgrade with a clean install (from scratch install).

The Best Robots of CES 2018

The content below is taken from the original ( The Best Robots of CES 2018), to continue reading please visit the site. Remember to respect the Author & Copyright.

Every year we get a peak at the latest and most exciting developments in tech at the Consumer Electronics Show. In many ways, it is the grand showcase for what the best software […]

The post The Best Robots of CES 2018 appeared first on Geek.com.

Go Retro to Build a Spectre and Meltdown-Proof x86 Desktop

The content below is taken from the original ( Go Retro to Build a Spectre and Meltdown-Proof x86 Desktop), to continue reading please visit the site. Remember to respect the Author & Copyright.

[Yeo Kheng Meng] had a question: what is the oldest x86 processor that is still supported by a modern Linux kernel? Furthermore, is it actually possible to use modern software with this processor? It’s a question that surely involves experimentation, staring into the bluescreen abyss of BIOS configurations, and compiling your own kernel. Considering Linux dropped support for the 386 in 2012, the obvious answer is a 486. This supposition was tested, and the results are fantastic. You can, indeed, install a modern Linux on an ancient desktop.

This project got its start last month at a Super Silly Hackathon where [Yeo] and [Hui Jing] installed Damn Small Linux on an ancient IBM PS/1 desktop of 1993 vintage. The hardware consists of an AMD 486 clone running at 133MHz, 64 MB of RAM, a 48x IDE CDROM drive (wow!), a floppy emulator, a Sound Blaster, 10Mbps Ethernet card, and a CompactFlash to IDE adapter. By any account, this is a pimped-out rig for 1993 that would have cost more than a car at the time. The hardware works, but can you run a modern Linux kernel on it?

[Yeo] decided to install the Gentoo x86 minimal installation, but sanity and time constraints meant compiling a kernel on a 486 wasn’t happening. That was done on a modern Thinkpad after partitioning all the drives, verifying all the compilation parameters, and configuring the kernel itself. The bootloader is LILO (Grub2 didn’t work), but for the most part, this is entirely modern software running on a 25-year-old machine. The step-by-step instructions for becoming a /g/entooman on a 486 are available on GitHub.

The entire (boring) boot process can be seen in the video below. One interesting application of this build is that the 486 does not support out-of-order execution, making this completely safe from Meltdown and Spectre attacks. It’s an impressive retrocomputing achievement that right now could not be more timely.

Filed under: classic hacks , Slider

Alexa is coming to Windows 10 PCs from HP, ASUS and others

The content below is taken from the original ( Alexa is coming to Windows 10 PCs from HP, ASUS and others), to continue reading please visit the site. Remember to respect the Author & Copyright.

Amazon’s Alexa recently arrived on headphones and even toilets, but it’s about to become much more ubiquitous by hitting Windows 10 PCs later this year. HP, ASUS and Acer have revealed that the voice assistant is coming to various models, including A… including…

TransferWise begins private launch of its consumer borderless account and bright green debit card

The content below is taken from the original ( TransferWise begins private launch of its consumer borderless account and bright green debit card), to continue reading please visit the site. Remember to respect the Author & Copyright.

Money transfer company TransferWise has begun a private launch of its “Borderless account” ‘Borderless account’ for consumers. It marks the first time the European unicorn has offered a debit card, card (pictured below), a move that is bound to draw further comparisons with newer fintech upstarts such as Revolut. Read More

Whitepaper: Lift and shift to Google Cloud Platform

The content below is taken from the original ( Whitepaper: Lift and shift to Google Cloud Platform), to continue reading please visit the site. Remember to respect the Author & Copyright.

Today we’re announcing the availability of a new white paper entitled “How to Lift-and-Shift a Line of Business Application onto Google Cloud Platform.” This is the first in a series of four white papers focused on application migration and modernization. Stay tuned to the GCP blog as we release the next installments in the coming weeks.

The “Lift-and-Shift” white paper walks you through migrating a Microsoft Windows-based, two-tier, expense reporting, web-application that currently resides on-premises, in your data center. The white paper provides background information, and a three-phased project methodology, as well as pointers to application code on github. You’ll be able to replicate the scenario on-premises, and walk through migrating your application to Google Cloud Platform (GCP).

The phased project includes implementation of initial GCP resources, including GCP networking, a site-to-site VPN and virtual machines (VMs), as well as setting up Microsoft SQL Server availability groups, and configuring Microsoft Active Directory (AD) replication in your new hybrid environment.

Want to learn more about how to lift and shift your own application by reading through (or following the same steps) in the white paper? If you’re ready to get started, you can download your copy of the white paper and start your migration today.

Microsoft Posts Office 365 Information Protection Guide for GDPR

The content below is taken from the original ( Microsoft Posts Office 365 Information Protection Guide for GDPR), to continue reading please visit the site. Remember to respect the Author & Copyright.

GDPR from Microsoft

GDPR from Microsoft

Less Than Five Months to GDPR

The European Union’s General Data Protection Regulation (GDPR) comes into force on May 25. Any company doing business in the EU or EEA needs to follow GDPR, and with the countdown towards the May deadline, companies are busy reviewing their exposure and understanding where they need to make changes to achieve compliance. Remember, GDPR dictates how to collect, store, process, and share personal data, so there’s a lot to think about.

GDPR Tools from Microsoft

Microsoft’s Compliance Manager breaks down GDPR into a set of tasks. Some of the tasks might not apply to your tenant, but it’s better to be safe than sorry, so consider them all. In addition, Microsoft has an online GDPR assessment tool designed to help companies understand their overall level of readiness.

Potential GDPR Impact on Office 365 Applications

Once you understand how GDPR affects data stored in Office 365, you can figure out how to protect and control that data. And, very importantly, how to educate users to deal with personal data correctly. Data that might come under the scope of GDPR can exist in repositories used by applications like Exchange, SharePoint, OneDrive, and Teams. The need therefore exists to understand:

  • What types of personal data exists inside your Office 365 tenant (passport numbers, credit card numbers, other identifiers).
  • How users gather and use personal data. For example, the HR department is likely to store tax identifiers for employees. Although this information is probably in a HR data system, it might also exist in spreadsheets, documents, and email.
  • The protection currently applied to personal data. You might already protect personal data with techniques such as applying rights templates to email and documents. If so, the question might be how to improve protection through new software capabilities available in Office 365 or recent upgrades (like the changes made to Office 365 Message Encryption).

Information Protection Guide for GDPR

As the countdown to GDPR continues, you can expect to hear more advice from Microsoft covering ways to use Office 365 technology to achieve compliance. A recent example is the release of the Office 365 Information Protection for GDPR guide (or solution), offering “ prescriptive recommendations for discovering, classifying, protecting, and monitoring personal data.”

Like any guide, this document has some limitations. In this case, a large part of the guide focuses on how to protect documents stored in SharePoint Online and OneDrive for Business with classification labels. It ignores the circulation of personal data within email, Teams, or Yammer. Of course, the reason is that classification labels are much more useful in SharePoint and OneDrive today. You can use classification labels with Exchange, but only as personal retention tags, and auto-label policies don’t work for email.

Teams and Yammer are weak spots inside Office 365 when it comes to GDPR. Although you can argue that people won’t post personal information to Teams or Yammer conversations, the simple fact is that users surprise administrators all the time in what they do. Where technology cannot help, user education must step in. If you use Teams or Yammer, make sure that you coach people about the proper use of personal data.

Using Sensitive Data Types

Even though the guide only partially covers Office 365, its content is valuable. The section about using sensitive data types with content searches to scan SharePoint and OneDrive libraries for documents that potentially hold personal data might help some companies understand how much GDPR-relevant data they have. Some of the examples illustrate the power of Keyword Query Language queries when looking for personal data.

The guide has some sensible recommendations for developing a classification schema for personal data and how to apply the classification labels that flow from the schema. Of course, if you want to use the auto-label policies to find and apply classification labels to documents, you need Office 365 E5 or the Advanced Data Governance add-on.

Data Loss Prevention

Other tips include using Data Loss Prevention policies to detect when users try to share documents with sensitive data with people outside the company. Be aware that two forms of DLP policies exist inside Office 365 – one for Exchange based on transport rules and one designed to work across multiple Office 365 workloads that is best for SharePoint and OneDrive. Again, Teams and Yammer don’t support this capability.

Audit Reporting

When it comes to checking up on leaks, the guide reviews the Office 365 audit log and notes that Office 365 only keeps audit records for 90 days. This probably isn’t long enough if someone sues your company for misuse of personal data. Litigation often starts well after the date of a purported offense and it is not good to admit in court that all your audit records for the period in question are unavailable because Office 365 flushes them after 90 days. The guide underlines that other solutions are available. For example, Advanced Security Management (part of Office 365 E5 and available as an add-on) stores audit data for 180 days while third-party products like Radar for Security and Audit will store tenant audit data for as long as you pay your bills.

Sponsored

GDPR Approaches

No guide will ever tell you all you need to do to prepare for something like GDPR. Every company is different, and Office 365 is a huge software suite that comes in many flavors. All a guide can do is pose questions and get you thinking. Microsoft’s Office 365 Information Protection guide is helpful in that respect.

Follow Tony on Twitter @12Knocksinna.

Want to know more about how to manage Office 365? Find what you need to know in “Office 365 for IT Pros”, the most comprehensive eBook covering all aspects of Office 365. Available in PDF and EPUB formats (suitable for iBooks) or for Amazon Kindle.

The post Microsoft Posts Office 365 Information Protection Guide for GDPR appeared first on Petri.

Google Chrome Versus Microsoft Edge in the Enterprise

The content below is taken from the original ( Google Chrome Versus Microsoft Edge in the Enterprise), to continue reading please visit the site. Remember to respect the Author & Copyright.

In today’s Ask the Admin, I’ll look at the pros and cons of each browser for use in the enterprise.

 

 

Emotions usually run high in any discussion about browsers. Most of us spend a good part of our working day in a browser, so it makes sense that it should be fast, reliable, secure, and have the extensions we need. Most users have an automatic preference for Google Chrome and it will be one of the first apps they download when setting up a new PC. Chrome is also the most widely used browser today according to Net MarketShare, with Internet Explorer taking second place, Firefox third, Microsoft Edge fourth, and Safari bringing up the rear.

Google Chrome

Unlike Microsoft Edge, Google Chrome is not installed in Windows by default. But Google does provide a Windows Installer file that allows system administrators to distribute the software using Group Policy, script, or System Center Configuration Manager (SCCM). Google Update is a separate mechanism used to update Google Chrome and any other Google software installed on the PC. Google offers Group Policy administrative templates that can be used to manage the configuration of Chrome and Google Update and let sysadmins enforce more than 200 policies, such as website blacklisting and content filtering. The Chrome Enterprise Bundle, which Google released in May, provides all the necessary downloads in one package.

Chrome 63 introduces site isolation as an experimental feature. Site isolation allows sysadmins to force Chrome to render sites in their own dedicated processes. While this increases memory usage between 10 and 20 percent, it adds better isolation to Chrome’s sandbox. Site isolation is designed to prevent attacks where hackers use cross-site scripting vulnerabilities to run malicious code to steal information running in other sites. While Chrome always tries to place sites in different processes, there are cases where it is not technically possible, such as cross-site iframes.

Sysadmins can configure site isolation to work for all sites or a list of selected sites. Limiting the sites that are isolated helps to improve performance. Google is also working on an additional feature to address situations when the renderer process is fully compromised.

 

 

Chrome did much better than Edge at this year’s Pwn2Own 2017 hacking event, where Chrome wasn’t hacked at all. But security is a cat and mouse game, so next year’s results might be something different. But nevertheless, Chrome has put in an excellent showing at the hacking event over the past two years. Google patched 153 vulnerabilities in Chrome in 2017. Considerably less than Microsoft’s 201 for Edge.

From a usability perspective, Chrome is fast and stable. It also has a much larger selection of extensions than Edge. And for the security conscious, Chrome extensions can be blocked by the permissions they require. But maybe more importantly, Chrome is very compatible. By that, I mean that it renders websites correctly because developers test their sites in Chrome. In comparison, Edge isn’t always able to render sites properly, sometimes causing minor usability issues. Edge doesn’t support sites that use WebM videos within the HTML5 <Video> tag. So, that should be a consideration if you’re going to restrict users to Edge.

Microsoft Edge

With all the negativity about Edge, is there any benefit to using it? Yes. Edge does have its advantages, especially in a corporate environment. The first being that it’s built into Windows 10 and updated via Windows Update, which provides a solid and trusted mechanism for updating Edge. But Edge isn’t available for Windows 7. Because Edge is built-in to Windows, there’s no need to download Group Policy administrative templates to manage the browser. When Edge is updated, so are the Group Policy settings. Google Chrome requires you to update administrative templates separately from browser updates.

Microsoft has also promised to separate Edge’s user interface from the backend rendering engine, although there’s no indication of when this is going to happen. This will allow the UI to be updated separately, via the Windows Store so that the Edge team can provide updates faster and without waiting for the next Windows release.

I think it’s fair to say that Edge hasn’t lived up to security expectations. Microsoft has made a lot of claims only to see Edge fall spectacularly at this year’s Pwn2Own hacking event. But that’s not to say that Edge is inherently insecure, even though there is clearly room for improvement. And on that note, the Windows Fall Creators Update includes Windows Defender Application Guard (WDAG), a new feature that allows system administrators to force Edge to open enterprise-defined untrusted sites in tabs that run in Hyper-V containers. If a site is malicious, it is isolated from the rest of the operating system using hardware-based virtualization.

At the time of writing, WDAG is only available to Windows 10 Enterprise customers. But Microsoft has announced that the spring 2018 update will bring WDAG to Windows 10 Professional customers as well. It’s also worth noting that because WDAG relies on hardware virtualization, it requires a 64-bit CPU with support for Second Level Address Translation (SLAT), and either VT-x (Intel) or AMD-V. But that shouldn’t be a problem for most modern hardware.

In terms of usability, Edge falls short. Although I have always preferred the font rendering in Edge and IE. Pages are just easier on the eye. Microsoft claims that Edge is faster than Chrome and more energy efficient. In my anecdotal experience, you’ll get a lot more battery time with Edge. In benchmark tests, Edge tends to beat Chrome. But performance isn’t the only criteria. Edge scores 476 in an HTML5 standards test compared to Chrome’s 519.

Apart from the limited extension support in Edge, there is one major usability letdown that is unforgivable. In the Fall Creators Update, Microsoft added the ability to pin sites to the taskbar. But in practice, it is next to useless. When you click on a site that’s pinned to the taskbar, if the site is already open in the browser, the page gets refreshed, at least most of the time. Furthermore, unlike Windows apps, there’s no white bar to highlight webpages opened from the taskbar. Microsoft’s implementation of pinned sites is nothing short of a disaster. Plus, if users require more than one input language, the Windows + SPACE keyboard shortcut for changing languages doesn’t always work properly in Edge.

 

Sponsored

Chrome Has The Edge

If you want a trouble-free life, then Google Chrome is the way to go. It’s compatible, fast, secure, and just as importantly, your users are likely to be happy. Microsoft Edge isn’t necessarily a bad browser, and it’s my personal preference, but it does have a couple of serious shortcomings that might result in compatibility issues with sites and complaints from users. And that might be enough to push your organization towards Chrome until Microsoft can fix those issues or offer a serious differentiator that makes Edge a must have.

 

The post Google Chrome Versus Microsoft Edge in the Enterprise appeared first on Petri.

Security hole in AMD CPUs’ hidden secure processor revealed ahead of patches

The content below is taken from the original ( Security hole in AMD CPUs’ hidden secure processor revealed ahead of patches), to continue reading please visit the site. Remember to respect the Author & Copyright.

Googler drops bug bomb in public – but don’t panic

Cfir Cohen, a security researcher from Google’s cloud security team, on Wednesday disclosed a vulnerability in the fTMP of AMD’s Platform Security Processor (PSP), which resides on its 64-bit x86 processors and provides administrative functions similar to the Management Engine in Intel chipsets.…

Best way to learn a language online fast free

The content below is taken from the original ( Best way to learn a language online fast free), to continue reading please visit the site. Remember to respect the Author & Copyright.

Learning a new language has forever been one of the most constructive hobbies and now, often a necessity. You can learn just about any language free of cost with some of the best language apps. Check out these top Language-learning […]

This post Best way to learn a language online fast free is from TheWindowsClub.com.

Robot DJ Commands Crowds at Prague Dance Club

The content below is taken from the original ( Robot DJ Commands Crowds at Prague Dance Club), to continue reading please visit the site. Remember to respect the Author & Copyright.

There ain’t no party like a robot DJ party, cause a robot DJ party don’t stop—until the cyborg runs out of power. Prague’s Karlovy Lazne dance club recently introduced a new spinner to […]

The post Robot DJ Commands Crowds at Prague Dance Club appeared first on Geek.com.

LG shows off the world’s first 88-inch 8K OLED display

The content below is taken from the original ( LG shows off the world’s first 88-inch 8K OLED display), to continue reading please visit the site. Remember to respect the Author & Copyright.

Just as 4K and HDR are finally going mainstream, the ambitious folks at LG Display have also been busy pushing its OLED technology to 8K. Come CES, the Korean manufacturer will be letting attendees get up close with its new 88-inch 8K OLED display (c… display, w…

bginfo (4.24)

The content below is taken from the original ( bginfo (4.24)), to continue reading please visit the site. Remember to respect the Author & Copyright.

Automatic desktop backgrounds that include system information

Learning ARM assembly with visUAL

The content below is taken from the original ( Learning ARM assembly with visUAL), to continue reading please visit the site. Remember to respect the Author & Copyright.

Learning assembly is very important if you want to get a grasp of how a computer truly works under the hood. VisUAL is a very capable ARM emulator for those interested in learning the ARM assembly.

The GUI: A simply program to ADD two numbers

In addition to supporting a large subset of ARM instructions, the CPU is emulated via a series of elaborate and instructive animations that help visualise the flow of data to/from registers, any changes made to flags, and any branches taken. It also packs very useful animations to help grasp some of the more tricky instruction such as shifts and stack manipulations.

As it is was designed specifically to be used as teaching tool at Imperial College London, the GUI is very friendly, all the syntax errors are highlighted, and an example of the correct syntax is also shown.

Branch visualisation, credits: VisUAL homepage

You can also do the usual things you would expect from any emulator, such as single step through execution, set breakpoints, and view data in different bases. It even warns you of any possible infinite loops!

That being said, lugging such an extravagant GUI comes at a price; programs that consume a few hundred thousand cycles hog far too much RAM should be run in the supported headless mode.

 

Filed under: Microcontrollers

Phone Security

The content below is taken from the original ( Phone Security), to continue reading please visit the site. Remember to respect the Author & Copyright.

...wait until they type in payment information, then use it to order yourself a replacement phone.

onenote (16.0.8730.2122)

The content below is taken from the original ( onenote (16.0.8730.2122)), to continue reading please visit the site. Remember to respect the Author & Copyright.

Microsoft OneNote Online Desktop Client

wakemeonlan (1.82)

The content below is taken from the original ( wakemeonlan (1.82)), to continue reading please visit the site. Remember to respect the Author & Copyright.

Turn on computers on your network with Wake-on-LAN packet

The Truth About The Tesla Semi-Truck

[https://youtu.be/oJ8Cf0vWmxE], Thank you for your amazing support this year! Help this channel get better by supporting at Patreon:
http://bit.ly/2pEMEiG

Website: http://bit.ly/2DYYc3m

My 2017 Patreon Expense Report:
http://bit.ly/2pDIFTH

Listen to our new podcast at:
Showmakers YouTube channel at: http://bit.ly/2DYRlr0

Itunes: http://bit.ly/2pC9zes
RSS and Libsyn Audio is available on our site: http://bit.ly/2DYYhnG

Get your Real Engineering shirts at: http://bit.ly/2pC9Kq8

Facebook:
http://bit.ly/2DYYhEc
Instagram:
http://bit.ly/2pEsbuD
http://bit.ly/2DYYhUI
Twitter:

Website:
http://bit.ly/2pDIGqJ

Thank you to my patreon supporters: Adam Flohr, darth patron, Zoltan Gramantik, Henning Basma, Karl Andersson, Mark Govea, Mershal Alshammari, Hank Green, Tony Kuchta, Jason A. Diegmueller, Chris Plays Games, William Leu, Frejden Jarrett, Vincent Mooney, Ian Dundore, John & Becki Johnston. Nevin Spoljaric

Once again thank you to Maeson for his amazing music. Check out his soundcloud here: http://bit.ly/2DWIiGR