Our Hardware and Software forum category encompasses topics related to end-user computer technical support troubleshooting, tips and tweaks.

76 76 70 70 66 49 49 47 46 40
Member Avatar
At first I thought it was just me. I restarted my DNS server after noticing intermittent connection issues. But nope! It looks like Facebook, Twitter and a handful of other sites are currently down in parts of the United States. At least here with Time Warner in NYC, and according …
by Dani 1,404 in Networking ()
Member Avatar
Apple has, of late at least, oft been accused of following rather than leading when it comes to smartphone innovation. Perhaps the launch of the iPhone 5s with the somewhat controversial fingerprint scanner has changed that, just a little bit. HTC, the powerhouse in the Android smartphone hardware market, has …
by happygeek 1,589 in Mobile and Wearables ()
Member Avatar
Are smartphones becoming thought of as disposable items these days? Research from one UK-based online auction site, BidGrid, would seem to suggest that Brits at least regard their gadgets, including mobile phones, as such. Indeed, BidGrid goes as far as to state that the UK is a throwaway nation with …
by happygeek 1,589 in Mobile and Wearables ()
Member Avatar
In my on the launch of the new iPhone 5s from Apple, I stated that you could "forget the fingerprint scanner built into the new circular home button" but I knew all along that was never going to be the case. In context, I was focusing upon what I think …
by happygeek 1,589 in Mobile and Wearables ()
Member Avatar
Exploit-based attacks are on the up (1), the majority of IT security professionals aren't sure if they can detect attackers attempting to breach the network (2), and 65% of companies let the tech support department give security training to staff. I would suggest, in order to make some sense of …
by happygeek 1,589 in Information Security ()
Member Avatar
Small groups of what are best described as cyber-mercenaries, willing and able to perform surgically precise hit and run hacking operations, are offering their services for hire out of China, Japan and South Korea. That's the conclusion of security researchers at who have been following the progress of a newly …
by happygeek 1,589 in Information Security ()
Member Avatar
A survey of more than 700 tablet owners in US, UK and Australia has revealed some interesting insights into how people use their devices. The $195 Gartner 'Consumers Buy Media Tablets Based on Lower Prices and Better Quality, not Brand' report (gotta love that snappy title, huh?) unsurprisingly shows that …
by happygeek 1,589 in Mobile and Wearables ()
Member Avatar
So here it is, or will be by the end of the month, the world's first smartphone to use a 64-bit chip. Immediately I would suggest that you can forget about most of what was announced yesterday: Forget the new colours that everyone is drooling over (gold? really? - grey? …
by happygeek 1,589 in Mobile and Wearables ()
Member Avatar
Users of online banking services are at risk from a new 'in the wild' Trojan, Hesperbot, which has been discovered by the ESET malware research lab. Researchers have found that infections of users in Turkey are currently most rife, with users in the Czech Republic, Portugal, Thailand and the United …
by happygeek 1,589 in Information Security ()
Member Avatar
A Freedom of Information request from staff at the UK offices of the Huffington Post has revealed, according to a BBC report on the story, that more than 300,000 attempts were made to access pornographic websites from the Houses of Parliament during the last 12 months. Of course, just looking …
by happygeek 1,589 in Information Security ()
Member Avatar
FireEye Labs has released a set of tools with the sole purpose of helping organisations detect and examine infections by the Poison Ivy RAT. Cleverly called Calamine, this collection of free tools promises to give security professionals the opportunity to identify the indicators of a Poison Ivy attack including the …
by happygeek 1,589 in Information Security ()
Member Avatar
The whole culture of Bring Your Own Device (BYOD) in the workplace has reignited the mobile device security debate. Although there are many ways to protect data, the first line of defence when a mobile device (be it a tablet or smartphone) is lost or stolen is almost always going …
by happygeek 1,589 in Mobile and Wearables ()
Member Avatar
The Onion Router, better known as the Tor Network, is often thought of as being the dark-side of the web. Not least as the anonymity provided by Tor meant that sites hosted on so-called hidden service servers were free to trade in just about anything from drugs and guns through …
by happygeek 1,589 in Networking ()
Member Avatar
UK home shopping pioneers Lakeland have sent an email to all customers past and present to warn them that the retailers website has been hacked. What Managing Director Sam Rayner calls a "sophisticated and sustained attack" took place late on Friday 19th July. Measures were taken at the time to …
by happygeek 1,589 in Information Security ()
Member Avatar
New research by has revealed that only 25% of those companies questioned were able to answer yes to the question: "Are you able to detect when files containing sensitive data are uploaded to a third party cloud service?" Which left a staggering three-quarters of businesses in the dark about the …
by happygeek 1,589 in Information Security ()
Member Avatar
Back in December 2011, reports were circulating regarding a data breach at one of the big Chinese social networking sites, Tianya.cn that suggested the login credentials of some 40 million users were potentially exposed. Clear text usernames and password combinations were stolen by hackers during the breach, although a Tianya …
by happygeek 1,589 in Information Security ()
Member Avatar
Kryten is a Series 4000 mechanoid, the neurotic robotic servant appearing in cult British sitcom Red Dwarf. So what's he got to do with your computer, apart from the somewhat stereotypical link between geeks and science fiction? Well, the Kryten character was played (in all but the first appearance) by …
by happygeek 1,589 in Hardware ()
Member Avatar
Although the Opera web browser client is no longer the big 'little player' that it used to be having long since been eclipsed by the likes of Chrome and Firefox in the Internet Explorer alternatives stakes, it can still claim more than 300 million users and a place as world’s …
by happygeek 1,589 in Information Security ()
Member Avatar
It started as just another early morning at work, arriving at 5.30am outside the converted mill where I rent a small space in amongst the myriad industrial units and office lets. I pulled up outside in my Fiat 500 and removed my backpack that doubles up as my laptop case …
by happygeek 1,589 in Mobile and Wearables ()
Member Avatar
Almost exactly a year ago I was writing about here at DaniWeb. In the meantime, the project has turned into a reality and and some lucky users with $1,500 to spare. This would all be much more exciting for me were it not for the fact that my vision is …
by happygeek 1,589 in Hardware and Software ()
Member Avatar
Security researchers at ESET that a prolonged and highly targeted data stealing attack aimed at Pakistan, using fake PDF documents, appears to have originated in India. Using a code signing certificate (issued to what looks like a legitimate company 'Technical and Commercial Consulting Pvt. Ltd') to sign malicious binaries the …
by happygeek 1,589 in Information Security ()
Member Avatar
Dana Tamir, Enterprise Security Director for has recently uncovered a variation of the TorRAT banking data malware which has been actively configured to target Twitter users. The attack works by "injecting Javascript code into the victim’s Twitter account page" Tamir says, adding that the malware "collects the user’s authentication token, …
by happygeek 1,589 in Information Security ()
Member Avatar
You may be wondering what a superfecta actually is, and the answer is: the most dangerous and serious threat to business. To clarify, the superfecta as defined by secure cloud hosting outfit FireHost is a group of four attack vectors that comprises of Cross-Site Request Forgery (CSRF), Cross-Site Scripting (XSS), …
by happygeek 1,589 in Information Security ()
Member Avatar
A new survey of 1000 commuters in London has revealed that, for a surprisingly large number of people, losing Internet access is more stressful than having no heating or water. Some 38% of those asked said that they would most stressed by a lack of Internet access at home, compared …
by happygeek 1,589 in Hardware and Software ()
Member Avatar
The media, online and off, has been full of scare stories about the 'biggest Internet attack ever' and how a distributed denial of service (DDoS) campaign aimed against anti-spam outfit Spamhaus peaked at an attack volume of 300 Gbps (the highest ever recorded by those who record such things) was …
by happygeek 1,589 in Information Security ()
Member Avatar
It has been just over a month now since North Korea gloated about its successful nuclear weapon test. A test which prompted the imposition of new UN sanctions against Pyongyang, and if the Korean Central News Agency (KCNA) which acts as a state mouthpiece for the Democratic People's Republic of …
by happygeek 1,589 in Information Security ()
Member Avatar
A recent survey, conducted by IT risk management specialists nCircle, suggests that as many as 50% of IT security professionals think that the organisations they work for are a potential target for state-sponsored hackers. A number that Tim Keanini, nCircle Chief Research officer, thinks is rather on the low side …
by happygeek 1,589 in Information Security ()
Member Avatar
The news wires have been buzzing over the weekend after it emerged that the Raspberry Pi website had been hit by a 'million zombie' Distributed Denial of Service (DDoS) attack during the week. Although the outage was relatively brief, with the Raspberry Pi Foundation admitting the attack with a Twitter …
by happygeek 1,589 in Hardware ()
Member Avatar
Apple, Facebook and Twitter have all been the target of hackers recently, and now Evernote has admitted to a potential breach that has forced it to reset the passwords of approximately 50 million registered users. Evernote, a kind of web scrapbook that enables you to take notes, save web pages …
by happygeek 1,589 in Information Security ()
Member Avatar
The 'World's Greatest Anti-Malware Software' is the spurious claim being made by Malwarebiter, which just so happens to sound an awful lot like Malwarebytes which could perhaps justifiably lay claim to that accolade. Take a look at this forum and you will see that Malwarebytes is a very valuable tool …
by happygeek 1,589 in Information Security ()
Chat Log Latest Posts