SolarWinds Introduces Network Configuration Manager Connector for Cisco SmartAdvisor

The content below is taken from the original (SolarWinds Introduces Network Configuration Manager Connector for Cisco SmartAdvisor), to continue reading please visit the site. Remember to respect the Author & Copyright.

SolarWinds, a leading provider of powerful and affordable hybrid IT infrastructure management software, today announced that network engineers can… Read more at VMblog.com.

Circle with Disney makes it easy to control your kids’ screen time

The content below is taken from the original (Circle with Disney makes it easy to control your kids’ screen time), to continue reading please visit the site. Remember to respect the Author & Copyright.

When I was younger, I had a friend whose dad would shut down their house’s internet connection every 12AM without fail. He’d love Circle with Disney if his children were still kids. It’s a cube (despite its name) that pairs up with your WiFi network and gives you the power to control your kids’ internet activities. The device’s creator, Jelani Memory, originally tried to raise funds via Kickstarter a couple of years ago, but the campaign didn’t reach its goal. It turned out to be, as Memory told Wired, "a really great failure," because the startup found a powerful partner in Disney.

Via: Wired

Source: Circle

Google engineer takes on subpar USB Type-C cables

The content below is taken from the original (Google engineer takes on subpar USB Type-C cables), to continue reading please visit the site. Remember to respect the Author & Copyright.

OLYMPUS DIGITAL CAMERA

Trying to save a few bucks by purchasing offbrand cables? We’ve all done it — but there’s something you should know about new USB Type-C connectors popping up on cellphones (Nexus, OnePlus), laptops (Macbook, Pixel), tablets (Pixel C) and even Apple TV. The reason why they can charge so many devices, is their ability to transmit currents up to 3A, which could be 50 to 100 percent more electricity than older standards. That’s why Google engineer Benson Leung has been putting various USB-C cables sold on Amazon to the test. He worked on both of Google’s recent Pixel devices that use the new cable to charge, and found that many of the cables advertised as Type-C aren’t actually suited for use with the laptop. They might not be wired properly to charge a laptop, or they don’t accurately identify the power source — something that could damage your laptop, USB hub or charger.

Source: Benson Leung (G+), (2), Benson Leung "LaughingMan" (Amazon)

Infographic: The Endpoint is a Scary Place!

The content below is taken from the original (Infographic: The Endpoint is a Scary Place!), to continue reading please visit the site. Remember to respect the Author & Copyright.

Halloween may be over, but Ziften has created a nice Infographic shining a light on the endpoint, identifying why it can be a scary place! What’s on… Read more at VMblog.com.

Raspberry Pi Foundation And U.K.’s Code Club Merge For Global Push To Get Kids Coding

The content below is taken from the original (Raspberry Pi Foundation And U.K.’s Code Club Merge For Global Push To Get Kids Coding), to continue reading please visit the site. Remember to respect the Author & Copyright.

Code Club The not-for-profit Raspberry Pi Foundation, makers of the wildly popular $35 Raspberry Pi microprocessor, and the U.K.-based volunteer-led charitable organization Code Club, which runs after school programs to get kids coding, are merging — with the grand aim of getting a coding club in every community in the world. Read More

How RFID Delivers Big Data On Cows And Milk Production

The content below is taken from the original (How RFID Delivers Big Data On Cows And Milk Production), to continue reading please visit the site. Remember to respect the Author & Copyright.

milk We know that big data has been used in retail, healthcare and finance, but you might be surprised to find out that it also helps farmers with dairy production. This practice, called precision dairy farming, involves the use of technology such as RFID tags and sensors to track the health of cows, which are essential to the economy in areas such as India. Read More

Internet Movie Database Parental Guide

The content below is taken from the original (Internet Movie Database Parental Guide), to continue reading please visit the site. Remember to respect the Author & Copyright.

Non-judgmental guide to adult content in movies

Top Data Center Providers Strike Submarine Cable Deals

The content below is taken from the original (Top Data Center Providers Strike Submarine Cable Deals), to continue reading please visit the site. Remember to respect the Author & Copyright.

Chinese fire up world’s ‘most powerful’ drone brain

The content below is taken from the original (Chinese fire up world’s ‘most powerful’ drone brain), to continue reading please visit the site. Remember to respect the Author & Copyright.

Quad-core ARM Cortex A-15 and handy headphone socket

Chinese UAV outfit DJI is trumpeting the release of what it describes as the "most powerful computer designed for drones" – the "Manifold" embedded computer packing a quad-core ARM Cortex A-15 processor.…

Helium has a go at Internet of Things thing – using ultra-low power tech

The content below is taken from the original (Helium has a go at Internet of Things thing – using ultra-low power tech), to continue reading please visit the site. Remember to respect the Author & Copyright.

Platform includes homegrown sensors and 802.15.4

As the internet of things (IoT) gets closer to commercial reality, the solutions flooding into the market are increasingly targeted at a real world use case. Some of these are extremely specific – smart meters and smart streetlights are commonplace now, but startup Helium Systems says its initial focus is on smart refrigeration.…

Now you can create Windows 10 apps without writing a line of code

The content below is taken from the original (Now you can create Windows 10 apps without writing a line of code), to continue reading please visit the site. Remember to respect the Author & Copyright.

The Windows Store isn’t exactly known for being a robust app marketplace, and Microsoft knows it. The company is always looking for new ways to attract developers to the platform. In the past, Microsoft made tools designed to port iOS and Android apps to Windows, and created the Universal app system that puts all Windows apps on the same platform. Now, Microsoft has updated its App Studio to allow users to create, prototype and submit an app for release from the comfort of a web browser — without installing Visual Studio or writing a single line of code. It works, too: I just created a functional Windows 10 app in less than ten minutes.

Source: Microsoft, Github

Kaspersky announces ‘death’ of Coinvault, Bitcryptor ransomware

The content below is taken from the original (Kaspersky announces ‘death’ of Coinvault, Bitcryptor ransomware), to continue reading please visit the site. Remember to respect the Author & Copyright.

13,000 decryption keys unleashed.

The Coinvault and Bitcryptor ransomware are officially dead according to Kaspersky: the alleged authors have been arrested, and all 14,000 decryption keys released allowing victims to avoid paying ransoms to unlock their files.…

You might not have to update next-gen antivirus software

The content below is taken from the original (You might not have to update next-gen antivirus software), to continue reading please visit the site. Remember to respect the Author & Copyright.

Cyber Attacks

Antivirus and malware protection programs are great, but they have a fatal flaw: they can only protect your PC from threats they know about. It’s not a terrible problem, but it gives attackers a brief window of opportunity to harm your computer every time they tweak their code. If a PC hasn’t nabbed the latest update to its protection suite, it’s vulnerable — but it doesn’t have to be that way. Researchers are using deep learning algorithms that can spot new malicious code naturally, without database updates.

Source: TechnologyReview

Liquid Bitcoin

The content below is taken from the original (Liquid Bitcoin), to continue reading please visit the site. Remember to respect the Author & Copyright.

Silicone-3D-vdW Happy Halloween! Let’s talk about the scariest thing in the tech world today. No, no, not bubbles, drones, or unicorns: Bitcoin. Seriously. (Mostly.) Whether you think it’s a boondoggle scam, a libertarian Trojan horse that threatens governments, the scourge of Wall Street, or the thin edge of the post-capitalist wedge, you face two scary prospects: what if you’re right?… Read More

How to Build a Portable Hacking Station with a Raspberry Pi and Kali Linux

The content below is taken from the original (How to Build a Portable Hacking Station with a Raspberry Pi and Kali Linux), to continue reading please visit the site. Remember to respect the Author & Copyright.

Cracking Wi-Fi passwords , spoofing accounts, and testing networks for exploits is all fun enough, but if you want to take the show on the road, you’ll want an easily portable rig. Enter Kali Linux and the Raspberry Pi.

Read more…



How to Enable the Built-In Administrator Account in Windows 10

The content below is taken from the original (How to Enable the Built-In Administrator Account in Windows 10), to continue reading please visit the site. Remember to respect the Author & Copyright.

Windows 10

Learn two different methods for enabling the built-in administrator account in Windows 10.

The post How to Enable the Built-In Administrator Account in Windows 10 appeared first on Petri.

Sony’s CD rootkit fiasco marks its inglorious 10th anniversary

The content below is taken from the original (Sony’s CD rootkit fiasco marks its inglorious 10th anniversary), to continue reading please visit the site. Remember to respect the Author & Copyright.

Data security

Here’s one product anniversary that Sony probably wants you to forget. It’s the 10th anniversary of security researcher (now CTO for Microsoft Azure) Mark Russinovich publishing details of the Sony BMG rootkit, a CD copy protection system that compromised the security of Windows PCs and was near-impossible to safely uninstall. The music label was initially dismissive, but it soon had to change its tune — it paid millions to settle charges and recalled legions of discs. To top things off, the discovery made Sony a punching bag for anyone unhappy with digital rights management (DRM) and other heavy-handed uses of copyright.

Via: NetworkWorld

Source: FSFE

Tor Messenger makes chatting off the record easier

The content below is taken from the original (Tor Messenger makes chatting off the record easier), to continue reading please visit the site. Remember to respect the Author & Copyright.

Security concept, encrypted binary code with encrypt word inside

Tor has finally released a beta version of the cross-platform chat program it’s been working on for quite a while. The client works with several chat services/protocols such as Jabber, IRC, Google Talk, Facebook Chat, Twitter and Yahoo, but its main draw is definitely the privacy features Tor is famous for. It uses Off-the-Record (OTR) protocol to encrypt your IMs, which pass through Tor’s network of volunteer computers for security and anonymity. According to Wired, it even has chat logging disabled as a default setting. "With Tor Messenger, your chat is encrypted and anonymous… so it is hidden from snoops, whether they are the government of a foreign country or a company trying to sell you boots," Kate Krauss, the company’s public policy director, told the publication.

Via: TheNextWeb

Source: Tor

It’s official: Tor’s .onion domains will be kept off the public internet

The content below is taken from the original (It’s official: Tor’s .onion domains will be kept off the public internet), to continue reading please visit the site. Remember to respect the Author & Copyright.

IETF publishes RFC 7686 and makes edible bulb a reserved name

Software is forbidden from using Tor URLs ending in .onion on the public internet following the publication of RFC 7686, which makes the top-level domain a "special use" case.…

How to build a totally open computer from the CPU to the desktop

The content below is taken from the original (How to build a totally open computer from the CPU to the desktop), to continue reading please visit the site. Remember to respect the Author & Copyright.

Novena – a novel piece of lab equipment

How does one build a completely open-source computer from scratch? Answer: slowly.…

IBM Rolls Out Private OpenStack Cloud for On-Prem Data Centers

The content below is taken from the original (IBM Rolls Out Private OpenStack Cloud for On-Prem Data Centers), to continue reading please visit the site. Remember to respect the Author & Copyright.

Facebook gives staff slow internet to understand the developing world

The content below is taken from the original (Facebook gives staff slow internet to understand the developing world), to continue reading please visit the site. Remember to respect the Author & Copyright.

India Daily Life

Many have accused Silicon Valley of being out of touch, and for good reasons: among other things, it acts as if the entire planet has access to super-fast, always-on internet connections. Facebook, however, wants to give its employees a wake up call. It’s starting up "2G Tuesdays," an optional initiative that slows down its office internet access to speeds you see in rural India and other developing areas. It’s a blunt reminder that even an ordinary web page can take minutes to load on a basic connection, and that anything Facebook can do to save data will make a huge difference. While it only subjects people to pokey internet access for an hour, that might be enough to ground staffers in reality.

[Image credit: AP Photo/Tsering Topgyal]

Source: Business Insider

New Veeam Backup for Linux Delivers Availability for Linux Servers in the Cloud and On Premises; Latest FREE Tool from Veeam

The content below is taken from the original (New Veeam Backup for Linux Delivers Availability for Linux Servers in the Cloud and On Premises; Latest FREE Tool from Veeam), to continue reading please visit the site. Remember to respect the Author & Copyright.

Veeam Software , the innovative provider of solutions that deliver Availability for the Always-On Enterprise , today announced Veeam Backup for Linux Read more at VMblog.com.

Oracle Java ‘no longer the greatest risk’ to US Windows PC users

The content below is taken from the original (Oracle Java ‘no longer the greatest risk’ to US Windows PC users), to continue reading please visit the site. Remember to respect the Author & Copyright.

And too many people stuck on dead-end software or just simply not applying patches

Apple’s Windows apps have leapfrogged Oracle Java as the biggest security risk to PCs in the US, according to a study by vulnerability management outfit Secunia (now a Flexera Software company).…

Raspberry Pi boards can now be customized and mass produced

The content below is taken from the original (Raspberry Pi boards can now be customized and mass produced), to continue reading please visit the site. Remember to respect the Author & Copyright.

raspberry-pi-2
The existing models of the Raspberry Pi are all very capable and flexible tiny computers, with a range of connections allowing them to be customized to suit your needs. However, for some users, […]