Last year, CryptoLocker ransomware [hit the headlines](http://www.daniweb.com/hardware-and-software/microsoft-windows/viruses-spyware-and-other-nasties/news/470427/cryptolocker-250k-infections-in-100-days-nets-300000-or-does-it) after infecting hundreds of thousands of computers and encrypting the data, and backups of that data to any connected device, with the promise of decryption on payment of a fee. This kind of IT extortion is profitable for the bad guys as it targets the people who are least likely to be in a position to do anything but pay; the people who are most likely to get infected are the same folk who are least likely to have an offsite backup or know how to get help with such a problem. This …

Member Avatar
Member Avatar
+2 forum 13

Got Android? Then you had better be on top of your security smarts. With Android cornering more than 80 per cent of the mobile operating system market, it's no surprise that Android devices are the number one target for the mobile malware merchants. Kaspersky Lab reckoned that Android malware attacks increased threefold between 2105 and 2016, and it's a trend it expects will continue. Not that malware is your only worry, everyone from pickpockets to coffee shop hackers, jealous spouses to seasoned cybercriminals, all want to get hold of your smartphone and the data it contains. So how do you …

Member Avatar
Member Avatar
+1 forum 7

Shadow IT is the usage of unauthorized tech by employees; usually cloud applications and services. A progression of the Bring Your Own Device (BYOD) debate, I have not said that the applications or services themselves are inherently insecure. Nor that usage is for malicious purposes. Quite the opposite is mostly true. Insecurity and risk enter the equation because by being unauthorized shadow IT remains invisible to security controls. This can lead to the creation of an unmanaged attack surface, and blind spots in your company security implementation are never going to be a good thing. Or are they? There are …

Member Avatar
Member Avatar
+3 forum 2

The Google Experience Launcher, as it was, first arrived exclusively for the Nexus 5 towards the end of last year. That changed recently when the renamed Google Now Launcher (GNL) appeared in the Play Store as a standalone app for Nexus devices and those handsets running Google Play Edition (GPE), or to put it another way this is for Stock Android only. ![706bab7221b9e4deadf1145a43fec609](/attachments/large/0/706bab7221b9e4deadf1145a43fec609.jpg "706bab7221b9e4deadf1145a43fec609") Along with some minor visual tweaking to the home screen and dock, you get to swipe left to open Google Now instead of another home screen and on the main home screen (assuming the device is …

Member Avatar
Member Avatar
+0 forum 2

The start button does make a comeback, sort of, in Windows 8.1 but it's still not enough to satisfy the die-hard 'I got Windows 8 but miss Windows 7' brigade. Not least as when you click the Windows 8.1 start button it doesn't pop up the old folder-structured start menu that many people miss so much, but instead it just takes you back to the start screen which those same folk have such a dislike of. Of course, if you right click the start button in Windows 8.1 it does produce a start menu of sorts, with one-click access to …

Member Avatar
Member Avatar
+1 forum 6

There are two very obvious truths which need to be stated before going any further: Truth 1 - prevention is better than cure, so don't visit 'dodgy' sites or download anything anyone sends you a link to, and do keep your PC as secure as possible with the help of security software such as real-time malware scanners and firewalls. Truth 2 - when it comes to malware there is no single 'removes it all' solution, there are far too many malware variations out there from rootkits and zero-day exploits through to long-established malware families which are continuously evolving in order …

Member Avatar
Member Avatar
+5 forum 23

##How to set up file synchronization using BitTorrent Sync (part 1) There are a number of services that offer file sharing/syncing via the "cloud". The free versions come with limitations on file size. As well, DropBox suffers from security issues in that encryption is done at the server meaning that any files you upload can be made available to the authorities by court order. SpiderOak encryption is done at the client which is more secure, but again, storage space is limited. In all cases, you are dependent on the availability of a server over which you have no control. You …

Member Avatar
+1 forum 0

Hello everyone! As some of you may know, Eclipse Luna appears to be broken for users of Kali Linux. There is a simple fix for that > Assuming that you have installed Eclipse Luna locate eclipse.ini `sudo nano eclipse.ini` add the following 2 lines before `--launcher.appendVmargs` --launcher.GTK_version 2 press `ctrl + x` then press `y` and finally press `Enter` That should fix it and you should be able to run eclipse. Now, next thing to do is we want to include Eclipse in Applications Menu for easier access or for dock users(like me on xfce) we can dock Eclipse. `sudo …

Member Avatar
Member Avatar
+2 forum 1

The purpose of this short and sweet tutorial is equally concise: how to get the original look and feel of the Google Chrome web browser back after installing on a Windows 8 computer. Having recently been forced into buying a new laptop, I finally took the plunge and decided to start using Windows 8 on a daily basis. In fact I upgraded the Windows 8 OS that came with my Lenovo Y510P laptop to Windows 8.1 Pro, and am happy enough with it apart from a few small UI niggles which I will be addressing in a series of brief …

Member Avatar
Member Avatar
+3 forum 3

Many of you know how to hide your important files and folders and burn them to disc to keep them from being accessed from other users, but if you your drive has so many files that it would take too long to copy all to disc, then why not hide the entire drive. Two methods, 1st one involves editing the registry, so again, back it up; 1st method found here; [url]http://www.howtogeek.com/howto/windows-vista/hide-drives-from-your-computer-in-windows-vista/[/url] 2nd method: Control Panel/System and Security/Administrative Tools, click on Create and format hard disk partitions, right click the drive you want to hide and remove the drive letter. To …

Member Avatar
Member Avatar
+0 forum 3

**How do passwords work?** What a password isn't, or at least really shouldn't be, is some kind of secret word or phrase that is simply compared against a table of usernames in a login database. Such plaintext systems are about as secure as a chocolate padlock on a furnace door. Even a login system whereby those passwords are encrypted isn't much better, although many people assume they are safe as houses. Breaches across the years have proven how insecure any system which relies purely on reversible algorithm encryption really is. The user logs in and enters a password, this triggers …

Member Avatar
Member Avatar
+1 forum 11

One of the oldest technology truisms must be that you only realise the importance of backing up your systems after disaster strikes. This is especially true if you have no backups to turn to. There are, thankfully, few excuses aside from sheer laziness not to backup your data these days; be that to a separate data directory (not much use if your hard drive dies), a separate hard drive (better, but not much help if the computer is stolen or lost), a removable drive (better yet, as it can be taken away from the computer itself) and now 'the cloud' …

Member Avatar
Member Avatar
+0 forum 2

When it comes to web browsers, my general rule of thumb is that the latest version is usually the most secure and this is certainly the case with Internet Explorer. However, when I started using Internet Explorer 11 on my new Windows 8.1 Pro laptop I soon discovered that latest doesn't always mean greatest in terms of usability. If you have read my "[How to return the resize buttons to Google Chrome](http://www.daniweb.com/hardware-and-software/microsoft-windows/windows-vista-and-windows-7-8/tutorials/470978/windows-8-how-to-get-your-google-chrome-resize-buttons-back)" tutorial, you will appreciate that Windows 8 doesn't always give you the UI experience that you are expecting, or that you want. Such was the case when I …

Member Avatar
Member Avatar
+1 forum 4

USING THE ACER ASPIRE 1410 LAPTOP AS AN HD MEDIA CENTER PC: A STEP-BY-STEP ILLUSTRATED TUTORIAL [I]This tutorial is not intended to be a full review of the Acer Aspire 1410 ultraportable laptop PC. It assumes that you already familiar with the machine and are looking to learn how to exploit its full capabilities for use as an HD media center PC in your home theater. Keep in mind that the Aspire 1410 isn't the only laptop than can be used as a media center PC. While I feel the Aspire is the best choice for this purpose, the information …

Member Avatar
Member Avatar
+2 forum 5

With this method you can add any custom button to the Explorer Command Bar/Toolbar which I'm sure you have noticed that Vista and Windows 7 have excluded some familiar buttons, including the Delete Button/Icon. [url]http://www.aeroxp.org/2008/06/custom-explorer-buttons/[/url] If you just want the "Delete Button/Icon" as I did, then download the following zips and extract the 2 files to any folder. Just make sure the 2 files stay together. Run as Admin., DeleteBTN and follow the instructions. Nothing to install. After its complete, save the zip for future use and delete the 2 files. Thanks goes to Disk4mat. [url]http://www.filefront.com/13713205/DeleteBtn.exe/[/url] [url]http://www.filefront.com/13713207/subinacl.exe/[/url]

Member Avatar
+0 forum 0

If your application provides custom dialog-box features, menu items or other capabilities by making changes to the Windows Registry, you can deploy those capabilities to other computers simply by distributing an update or patch to the Registry. Updating the Registry involves nothing more than exporting the capabilities from the Windows Registry Editor to a file and applying them on the target system(s). Carrying those changes is a plain text file with an [i].reg[/i] extension, and contains the key(s) or value(s) you've created. It's applied either by double-clicking its icon in Windows Explorer, importing via RegEdit or executing it from a …

Member Avatar
+1 forum 0

Debian Linux is what you might call very, very flexible because it runs on nearly any hardware configuration, from Motorola chips to PowerPC to the x86 structure. So whatever your machine is Debian Linux can most likely run on it. However, because installation is so different between different setups, this tutorial is only going to concentrate on one chip: the x86 chip. How do you know if you have the x86 chip? That's pretty easy; if you are already running Windows then you've got an x86 chip. Other clues are if you see an Intel Pentium or AMD sticker on …

Member Avatar
+1 forum 0

The End.