Last year, CryptoLocker ransomware [hit the headlines](http://www.daniweb.com/hardware-and-software/microsoft-windows/viruses-spyware-and-other-nasties/news/470427/cryptolocker-250k-infections-in-100-days-nets-300000-or-does-it) after infecting hundreds of thousands of computers and encrypting the data, and backups of that data to any connected device, with the promise of decryption on payment of a fee. This kind of IT extortion is profitable for the bad guys as it targets the people who are least likely to be in a position to do anything but pay; the people who are most likely to get infected are the same folk who are least likely to have an offsite backup or know how to get help with such a problem. This …

Member Avatar
Member Avatar
+2 forum 13

Got Android? Then you had better be on top of your security smarts. With Android cornering more than 80 per cent of the mobile operating system market, it's no surprise that Android devices are the number one target for the mobile malware merchants. Kaspersky Lab reckoned that Android malware attacks increased threefold between 2105 and 2016, and it's a trend it expects will continue. Not that malware is your only worry, everyone from pickpockets to coffee shop hackers, jealous spouses to seasoned cybercriminals, all want to get hold of your smartphone and the data it contains. So how do you …

Member Avatar
Member Avatar
+1 forum 7

Shadow IT is the usage of unauthorized tech by employees; usually cloud applications and services. A progression of the Bring Your Own Device (BYOD) debate, I have not said that the applications or services themselves are inherently insecure. Nor that usage is for malicious purposes. Quite the opposite is mostly true. Insecurity and risk enter the equation because by being unauthorized shadow IT remains invisible to security controls. This can lead to the creation of an unmanaged attack surface, and blind spots in your company security implementation are never going to be a good thing. Or are they? There are …

Member Avatar
Member Avatar
+3 forum 2

What has Schrodinger got to do with the complex and paradoxical concept of quantum computing? The answer is that both Erwin and his hypothetical cat relate directly to this subatomic world. In fact, Schrodinger is often referred to as the father of quantum mechanics. ## Erwin who? ## [Erwin Schrodinger](https://en.wikipedia.org/wiki/Erwin_Schr%C3%B6dinger) was an Austrian theoretical physicist, awarded a Nobel Prize way back in 1933 for his work with Paul Adrien Maurice Dirac regarding the discovery of 'new productive forms of atomic theory.' Two years later, Schrodinger proposed an experiment whereby a hypothetical cat and a radioactive sample are sealed within a …

Member Avatar
Member Avatar
+4 forum 3

The Google Experience Launcher, as it was, first arrived exclusively for the Nexus 5 towards the end of last year. That changed recently when the renamed Google Now Launcher (GNL) appeared in the Play Store as a standalone app for Nexus devices and those handsets running Google Play Edition (GPE), or to put it another way this is for Stock Android only. ![706bab7221b9e4deadf1145a43fec609](/attachments/large/0/706bab7221b9e4deadf1145a43fec609.jpg "706bab7221b9e4deadf1145a43fec609") Along with some minor visual tweaking to the home screen and dock, you get to swipe left to open Google Now instead of another home screen and on the main home screen (assuming the device is …

Member Avatar
Member Avatar
+0 forum 2

The start button does make a comeback, sort of, in Windows 8.1 but it's still not enough to satisfy the die-hard 'I got Windows 8 but miss Windows 7' brigade. Not least as when you click the Windows 8.1 start button it doesn't pop up the old folder-structured start menu that many people miss so much, but instead it just takes you back to the start screen which those same folk have such a dislike of. Of course, if you right click the start button in Windows 8.1 it does produce a start menu of sorts, with one-click access to …

Member Avatar
Member Avatar
+1 forum 6

There are two very obvious truths which need to be stated before going any further: Truth 1 - prevention is better than cure, so don't visit 'dodgy' sites or download anything anyone sends you a link to, and do keep your PC as secure as possible with the help of security software such as real-time malware scanners and firewalls. Truth 2 - when it comes to malware there is no single 'removes it all' solution, there are far too many malware variations out there from rootkits and zero-day exploits through to long-established malware families which are continuously evolving in order …

Member Avatar
Member Avatar
+5 forum 23

The purpose of this short and sweet tutorial is equally concise: how to get the original look and feel of the Google Chrome web browser back after installing on a Windows 8 computer. Having recently been forced into buying a new laptop, I finally took the plunge and decided to start using Windows 8 on a daily basis. In fact I upgraded the Windows 8 OS that came with my Lenovo Y510P laptop to Windows 8.1 Pro, and am happy enough with it apart from a few small UI niggles which I will be addressing in a series of brief …

Member Avatar
Member Avatar
+3 forum 3

There is no doubt that SEO is an important part of the online marketing machine. Lest we forget, SEO stands for Search Engine Optimization and only a fool would imagine that they could do business online without being indexed by the Gods of Search (Google, Bing, Yahoo!) However, there is more to marketing your business than making it search engine friendly; and blowing your entire marketing budget on SEO could prove a costly mistake. Traditionally, marketing your business (any business) has involved understanding who your customers are and how they think and feel. This is no different in the Internet …

Member Avatar
Member Avatar
+4 forum 3

There can be no denying the impact that social media has had on business, you only have to look at the reach it has: well over a billion people between Facebook, Twitter and LinkedIn subscribers. What's more, there is no sign of the social media bubble bursting just yet. ![socmedtutorial](/attachments/small/0/socmedtutorial.jpg "align-right") However, social media is actually much more than just a numbers game and in order for any marketing campaign to succeed then businesses simply have to understand how to embrace it properly. Indeed, the potential for extending the reach of your business and your brand has never been bigger. …

Member Avatar
Member Avatar
+7 forum 33

**How do passwords work?** What a password isn't, or at least really shouldn't be, is some kind of secret word or phrase that is simply compared against a table of usernames in a login database. Such plaintext systems are about as secure as a chocolate padlock on a furnace door. Even a login system whereby those passwords are encrypted isn't much better, although many people assume they are safe as houses. Breaches across the years have proven how insecure any system which relies purely on reversible algorithm encryption really is. The user logs in and enters a password, this triggers …

Member Avatar
Member Avatar
+1 forum 11

One of the oldest technology truisms must be that you only realise the importance of backing up your systems after disaster strikes. This is especially true if you have no backups to turn to. There are, thankfully, few excuses aside from sheer laziness not to backup your data these days; be that to a separate data directory (not much use if your hard drive dies), a separate hard drive (better, but not much help if the computer is stolen or lost), a removable drive (better yet, as it can be taken away from the computer itself) and now 'the cloud' …

Member Avatar
Member Avatar
+0 forum 2

When it comes to web browsers, my general rule of thumb is that the latest version is usually the most secure and this is certainly the case with Internet Explorer. However, when I started using Internet Explorer 11 on my new Windows 8.1 Pro laptop I soon discovered that latest doesn't always mean greatest in terms of usability. If you have read my "[How to return the resize buttons to Google Chrome](http://www.daniweb.com/hardware-and-software/microsoft-windows/windows-vista-and-windows-7-8/tutorials/470978/windows-8-how-to-get-your-google-chrome-resize-buttons-back)" tutorial, you will appreciate that Windows 8 doesn't always give you the UI experience that you are expecting, or that you want. Such was the case when I …

Member Avatar
Member Avatar
+1 forum 4

The End.