50,473 Archived Topics
Remove Filter ![]() | |
We have a Dell Computer with Windows 7. The website history has been deleted and I am suspicious the reason is to hide a couple of sites that were visited. I am NOT computer smart and I really need some help with this. Is there a way for me to … ![]() | |
I have a Toshiba laptop that I bought back in 2005. I haven't really used it in the past year and a half because it shuts off within 20 seconds or less. The battery will no longer hold a charge, but even when it's plugged into the wall it still … | |
I purchased a used 2011 MacBook Pro laptop. It ran OK for a week but begin to slow down and now boots very slowly. I checked the drive spaces and found it has sufficient hard drive memory. Should I upgrade RAM. Currently it has 4 GB. I heard there are … | |
Some interesting [research](http://www.proofpoint.com/threatinsight/posts/phishing-in-europe.php) from security outfit Proofpoint was published this morning which reveals that unsolicited email heading towards users in the UK is three times more likely to contain malicious URLs than that destined for users in the United States, or Germany, or France for that matter. It's not, as … | |
I got up this morning to check my e-mail so when i opened my laptop i pressed the powere button to resume it from hibernation and about 2 minutes later the hardrive stoppped and the screen went blank. It was plugged into the AC adapter and had the battery in. … | |
I have tryed to save it then off the computer after few day, I turne on our PC but that don't work How to open our document any method to recover my doc file? Can anybody help me? | |
So, a bunch of US financial institutes have been hacked. Nothing new there, if we are being brutally honest. The newsworthyness in this particular case comes courtesy of one of those organisations apparently being none other than JP Morgan Chase. USA Today reported yesterday that a federal law enforcement official … | |
Hi all, I'd like your thoughts and recommendation. I'm currently thinking of switching from Windows 7 to Ubuntu, I'm new to UB/linux and have a series of package that I use all the time. I know that I can get libreoffice to replace MSOffice and some like for likes; where … | |
So you've got a tablet, be that an Android, iPad or Windows powered device. Maybe you've got a phablet or just a bog-standard smartphone. Whatever you have, the chances are that it will have a capacitive touch screen. Most people, however, won't have got a stylus. The reasons are straightforward … | |
SuperValu has confirmed that is has, indeed, suffered a data breach. The supermarket company [stated](http://www.supervalu.com/security.html) that what it calls a "criminal intrusion into the portion of its computer network that processes payment card transactions for some of its retail food stores, including some of its associated stand-alone liquor stores" may … | |
Hardly a week goes by without yet another press release hitting the desk of your technology journalist, or research flag being raised amongst the IT Security profession, that claims Android is insecure. What Android actually is, just like Windows on the desktop in fact, is a big and attractive target; … | |
Guys plz help me. i have a gmail account. i forgot the password. unfortunatley the email id for my recovery mail has been declined since i have not logged on to it for few weeks. Is there any way i can able to access my gmail account. Is there any … | |
It seems like forever, but actually it was only the end of last year that we were [writing about CryptoLocker](http://www.daniweb.com/hardware-and-software/microsoft-windows/viruses-spyware-and-other-nasties/news/470427/cryptolocker-250k-infections-in-100-days-nets-300000-or-does-it) which had pretty much redefined the ransomware landscape. Now this particular threat market is morphing again with the discovery of onion crypto ransomware. Also known as Critroni, and CTB-Locker for … ![]() | |
This is possibly a very strange question, and I'm not sure where to ask it! But is there anyone around that uses a standing desk or a treadmill desk, and can you tell us how it effects your productivity and your typing. Do you make more mistakes? Do you use … | |
If you've tried installing/recovering Windows from a usb boot drive before (rather than an optical drive) then you might be aware that, sometimes, the boot drive stops working. Windows refuses to boot from it anymore, and you have to recreate the drive for it to work. Is there a way … | |
I've always had the taskbar at the bottom of the screen not at the top, and now all of a sudden it's at the top. Can someone tell me how to restore it the way I like to have it? I looked around but did not see anyone posting this … | |
I have a Verizon FiOS Internet line coming into my office here at DaniPad, and it has a block of 5 static IPs (x.x.x.18 - x.x.x.22) that I'm paying for. The line is connected to a switch. Also connected to the switch, among other things (such as our security system), … | |
OS: Win XP sp2 Dell Dimmension B110 The first symptom was the onboard network connector stopped working. On reboot the blue bios screen appeared. the error number is: 0x000000A5 (0x00010007, 0x00000038, 0x00000000, 0x00000000) I have already tried removing the battery on the motherboard, and flipping the two pin connector inorder … | |
Following on from the news that an eBay password database has been compromised, and universal advice from security experts that users should now change their passwords, one thing has been loud clear: the total lack of that password change requirement from eBay. Sign into eBay and there is nothing to … | |
**How do passwords work?** What a password isn't, or at least really shouldn't be, is some kind of secret word or phrase that is simply compared against a table of usernames in a login database. Such plaintext systems are about as secure as a chocolate padlock on a furnace door. … Hardware and Software algorithm cybersecurity data-protection encryption | |
My 500GB HDD have 5 partitions including a time backup drive. Few days back I created another partition of size 50GB for some purpose. Later I deleted that partition and tried resizing OS partition to take the space. But everytime I try to resize the OS disk, the disk utility … | |
Please I really need urgent assistance here., I got a brand new pc and want to degrade it from win8 and install windows 7.. The computer system will not allow me to enter boot setup.. or boot from dvd.. Thanks | |
So, if - like me - you find yourself in need of installing SQL Developer on Ubuntu 12.04 and have for some or other reason ended up downloading the rpm instead of the zip from the Oracle [site](http://http//www.oracle.com/technetwork/developer-tools/sql-developer/downloads/index.html) or you already have an rpm of SQL Developer lying around follow … | |
As I stated when [reviewing the Minisuit 3-in-1 Folio Case](http://www.daniweb.com/hardware-and-software/tablets-and-mobile-devices/reviews/477039/review-minisuit-3-in-1-keyboard-folio-case-nexus-7-2013#) for the Nexus 7 2013, the most important things a writer looks for in any keyboard are key travel, spacing and feedback. Obviously a travel keyboard throws some additional requirements into the mix such as weight, size and battery life. … | |
For a professional writer of any description, there are three things that matter when it comes to the keyboard that they are using: key spacing, key travel and key feedback. The Minisuit 3-in-1 Folio manages, as far as any such small keyboard is ever going to achieve, to get the … | |
Hi, I've a LAN of 6 PCs. All PCs have WIN XP installed. I've workgroup for these PCs. I want to share a folder on LAN which will have password protection. Is it possible? | |
I had a interal disk that wouldn't show in the finder at all but was showing as mounted on disk utility. I could get to the disk through a file alias so I know the disk was there and working. I tried numious posts including this one (http://www.daniweb.com/hardware-and-software/apple/mac-os-x/threads/94420/hard-drive-not-visible-mac-osx) with not … | |
The Distributed Denial of Service (DDoS) attack is becoming the crowbar of the online criminal. In the past we have got rather used to DDoS attacks being one of the favoured approaches of hacktivists, with perhaps the Low Orbit Ion Cannon (LOIC) and later the High Orbit Ion Cannon (HOIC) … | |
When it comes to web browsers, my general rule of thumb is that the latest version is usually the most secure and this is certainly the case with Internet Explorer. However, when I started using Internet Explorer 11 on my new Windows 8.1 Pro laptop I soon discovered that latest … | |
I have a new Acer Aspire 1670 laptop which has worked fine for the past few weeks. However, I turned it on this morning (it worked fine last night) to find that my touchpad no longer works. I don't feel this is a hardware issue in the sense that the … | |
According to a [report](http://www.fireeye.com/resources/pdfs/fireeye-operation-ke3chang.pdf) from researchers at US security outfit FireEye, a number of computers belonging to diplomats attending the G20 summit in Russia three months ago, including at least five European foreign ministries, were successfully targeted by Chinese hackers. FireEye researchers had monitored a server, one of 23, used … | |
what is ddr333/400? is it ddr3 or just ddr1 or ddr2? my motherboard supports ddr333/400 and i am confuse what is it. Please help :) | |
Hi I have heard that we can change the backgroung on the lock screen of the windows 7 ,however they are different ways to do that i have downloaded the software called Tweekslogon and iam unable to change it iam getting a pop up which says that the it Access … | |
hi everyone! mine is a hp intel dualcore 32-bit system.iam on win7 ultimate OS.yesterday i was trying to install win7 OS with a CD,then it was saying "no hard drive found".So i was unable to install OS .what might be the problem and what should i do,please suggest me........ | |
Thanks to a federal copyright law ruling on Monday by the Library of Congress, jailbreaking your iPhone doesn’t have to be kept to the underground forums like it's alcohol during a digital prohibition. The process is now completely legal under US law. Grab a glass of e-freedom![ATTACH]16137[/ATTACH]The resulting decision was … | |
At first I thought it was just me. I restarted my DNS server after noticing intermittent connection issues. But nope! It looks like Facebook, Twitter and a handful of other sites are currently down in parts of the United States. At least here with Time Warner in NYC, and according … ![]() | |
The AR.Drone is what is known as a quadricopter device, and the Parrot drones are probably responsible for kick-starting the whole consumer drone industry. Unpacking the box you immediately notice how light it is, and how little you get by way of stuff to assemble or plug-in. Beyond the couple … | |
Did the FBI get the wrong man, or at least the wrong Dread Pirate Roberts (DPR), when it shut down the Silk Road darknet marketplace? Claims are being made that this is precisely what happened, and that Ross Ulbricht who was arrested took over as acting DPR from the real … | |
My battery is 100% charged but when ever I take off the A/C adapter the machine will just go off.Now the battery is charged up to 82% but what see at the notification is pluged in, not charging. And when i take off the a/c cable the machine will just … | |
[ATTACH=RIGHT]15727[/ATTACH]Green is in these days, and so is saving money. The EcoStrip 2.0 looks like a common power strip with built-in surge protection but it actually works to save you money while reducing your carbon footprint. The EcoStrip 2.0 comes with a USB connector that you plug into your PC … | |
please, help me key activation update windows 7 ultimate bit 32 | |
I would like to know if there is an off the shelf software program that will allow me to add a T-shirt design program to my website, or do you have to get it develped Dr. G | |
Hi, Can someone please provide me with some examples that would be best in describing how each model; the OSI and the TCP/IP model work. I understand how each have layers etc, but im having a hard time finding examples of when it would be best to use either of … | |
Since my remote server was recently migrated I am receiving an error message generally which goes like this Warning: session_start() [function.session-start]: open(c:/wampserver/tmp/sess_4bkd7oiqmi7298mhikv09447t6, O_RDWR) failed: No such file or directory (2) in /home/safetyte/public_html/portal/woodwork_sub/ws_member_profile.php on line 2 Lines 1 and 2 are <?php session_start(); This message is coming from the remote server … | |
Small groups of what are best described as cyber-mercenaries, willing and able to perform surgically precise hit and run hacking operations, are offering their services for hire out of China, Japan and South Korea. That's the conclusion of security researchers at [Kaspersky Lab](http://www.kaspersky.co.uk/) who have been following the progress of … | |
A jury in the US has, after just three days deliberating, ruled that Samsung must pay Apple more than $1 billion in damages. The lawsuit had focussed on alleged patent infringements by Samsung in terms of both software and design relating to Apple's iPhone and iPad devices. Although not all … | |
When I open up Adobe Photoshop and click the "open" button, and I am in a folder that has pictures in it (JPEG) The default VIEW MENU is "list" I change to "thumbnails" and all is good for selecting a picture to edit. I get done, save and then click … | |
UK home shopping pioneers Lakeland have sent an email to all customers past and present to warn them that the retailers website has been hacked. What Managing Director Sam Rayner calls a "sophisticated and sustained attack" took place late on Friday 19th July. Measures were taken at the time to … ![]() | |
I have a HP 5060zx laptop that does not boot up sometimes: The power light comes on, but there is no display. I tried connecting to an external display and nothing happens on that as well. This problem happens seems to happen intermittently. After this problem occurs if I leave … | |
Security researchers at ESET [have revealed](http://www.welivesecurity.com/2013/05/16/targeted-threat-pakistan-india/) that a prolonged and highly targeted data stealing attack aimed at Pakistan, using fake PDF documents, appears to have originated in India. Using a code signing certificate (issued to what looks like a legitimate company 'Technical and Commercial Consulting Pvt. Ltd') to sign malicious … |
The End.