Test CircleCount PRO now!
Login now

Not your profile? Login and get free access to your reports and analysis.

Keith Petersen (w8sdz)

Keith Petersen (w8sdz) Verified in Google 

Computer Consultant, Amateur Radio w8sdz, Retired TV Engineer

Occupation: Computer Consultant. Retired TV Engineer. Former Manager of the SimTel Software Archive. Amateur Radio w8sdz. (Computer Consultant, TV Engineer, Software Archivist, Amateur Radio w8sdz)

Location: Port Orange, FL

Followers: 2,580

Following: -

Views: 686,773

Added to CircleCount.com: 01/05/2012That's the date, where Keith Petersen (w8sdz) has been indexed by CircleCount.com.
This hasn't to be the date where the daily check has been started.
(Update nowYou can update your stats by clicking on this link!
This can take a few seconds.
)

Tags

Sign in

The following tags have been added by users of CircleCount.com.
You can login on CircleCount to add more tags here.

  • Amateur Radio
  • Information Technology
  • Linux
  • Technology
  • VoIP

Are you missing a tag in the list of available tags? You can suggest new tags here.

Login now

Do you want to see a more detailed chart? Check your settings and define your favorite chart type.

Or click here to get the detailed chart only once.

Shared Circles including Keith Petersen (w8sdz)

Shared Circles are not available on Google+ anymore, but you can find them still here.

The Google+ Collections of Keith Petersen (w8sdz)

115231870248397182742 has no public Google+ Collections yet.

Activity

Average numbers for the latest posts (max. 50 posts, posted within the last 4 weeks)

0
comments per post
0
reshares per post
1
+1's per post

731
characters per posting

Top posts in the last 50 posts

Most comments: 4

posted image

2016-03-23 02:27:55 (4 comments; 0 reshares; 3 +1s)Open 

Android rooting bug opens Nexus phones to “permanent device compromise”
#android #security #vulnerability

Millions of Android phones, including the entire line of Nexus models, are vulnerable to attacks that can execute malicious code and take control of core functions almost permanently, Google officials have warned. They are in the process of releasing a fix, but at the moment any phone that hasn't received a security patch level of March 18 or later is vulnerable.

Most reshares: 7

posted image

2016-03-31 16:13:26 (3 comments; 7 reshares; 7 +1s)Open 

Major Toshiba laptop battery recall issued after faulty units overheat and literally melt
#toshiba #laptop #battery

The Consumer Product Safety Commission announced a recall for battery packs in Toshiba laptops sold between June 2011 and January 2016. The recall affects nearly 40 different Toshiba models of PCs including Portege, Satellite, and Tecra models. The CPSC estimates the recall will affect about 91,000 units sold in the United States and another 10,000 sold in Canada.

Most plusones: 31

posted image

2016-02-06 07:21:59 (2 comments; 6 reshares; 31 +1s)Open 

Upgrade 16GB iPhone To 128GB For $60 And In 30 Minutes Only [Video]
#iphone #memory #upgrade  

It is indeed possible to manually upgrade the internal storage of an iPhone with 16GB storage to 128GB. Here's how the whole process works:

Latest 50 posts

posted image

2016-04-23 04:30:53 (0 comments; 0 reshares; 1 +1s)Open 

Petya ransomware cracked: Get password to decrypt hard drive for free
#petya #ransomware #encryption

Victims of Petya ransomware have experienced a lock screen warning that their hard drive was encrypted with a military grade encryption algorithm and the only way to unlock it was to cough up the bitcoins to purchase a decryption key. That’s no longer true as the encryption has been defeated and a password generator has been developed so victims can decrypt their hard drives for free.

Petya ransomware cracked: Get password to decrypt hard drive for free
#petya #ransomware #encryption

Victims of Petya ransomware have experienced a lock screen warning that their hard drive was encrypted with a military grade encryption algorithm and the only way to unlock it was to cough up the bitcoins to purchase a decryption key. That’s no longer true as the encryption has been defeated and a password generator has been developed so victims can decrypt their hard drives for free.___

posted image

2016-04-23 04:21:05 (0 comments; 0 reshares; 1 +1s)Open 

When Windows 10 breaks, don't just blame Microsoft
#windows10 #microsoft #trouble

It might seem easy to simply blame Microsoft for every flaw and failing in our Windows update experience, but if we want our machines to function properly, it's important to dig deeper. The root cause of the problem may well be some old software from a third party vendor.

When Windows 10 breaks, don't just blame Microsoft
#windows10 #microsoft #trouble

It might seem easy to simply blame Microsoft for every flaw and failing in our Windows update experience, but if we want our machines to function properly, it's important to dig deeper. The root cause of the problem may well be some old software from a third party vendor.___

posted image

2016-04-20 20:49:41 (1 comments; 0 reshares; 3 +1s)Open 

700 Million People Just Got Encryption That Congress Can’t Touch
#encryption #viber #messenger

Viber, a messaging app with 711 million+ users, has just introduced end-to-end encryption for all messages and calls on its platform, including group chats, and a way to ‘hide’ chats on your account alongside its existing expanded deleting function. It will not be subject to US laws written by lawmakers desperate to regulate technology they do not understand.

700 Million People Just Got Encryption That Congress Can’t Touch
#encryption #viber #messenger

Viber, a messaging app with 711 million+ users, has just introduced end-to-end encryption for all messages and calls on its platform, including group chats, and a way to ‘hide’ chats on your account alongside its existing expanded deleting function. It will not be subject to US laws written by lawmakers desperate to regulate technology they do not understand.___

posted image

2016-04-19 00:33:00 (0 comments; 0 reshares; 1 +1s)Open 

How to deal with the rising threat of ransomware
#ransomware #vulnerability #security

Behavior-based detection mechanisms are now playing a key role in detecting and preventing ransomware-based attacks., While there may be many ransomware variants in the wild, they all share a common set of traits that can be detected during execution.

How to deal with the rising threat of ransomware
#ransomware #vulnerability #security

Behavior-based detection mechanisms are now playing a key role in detecting and preventing ransomware-based attacks., While there may be many ransomware variants in the wild, they all share a common set of traits that can be detected during execution.___

posted image

2016-04-17 21:37:57 (0 comments; 0 reshares; 1 +1s)Open 

A software fix for dangerous USB-C cables is coming
#usb #usbc #cables

The USB Implementers Forum (USB-IF), which certifies cables as safe, is announcing a new way to ensure that your devices are protected from rogue cables.

The "USB Type-C Authentication specification" is a set of software rules that a device can enforce on anything you plug into it. The new protocol will allow "host systems [to] confirm the authenticity of a USB device or USB charger, including such product aspects as the descriptors/capabilities and certification status."

A software fix for dangerous USB-C cables is coming
#usb #usbc #cables

The USB Implementers Forum (USB-IF), which certifies cables as safe, is announcing a new way to ensure that your devices are protected from rogue cables.

The "USB Type-C Authentication specification" is a set of software rules that a device can enforce on anything you plug into it. The new protocol will allow "host systems [to] confirm the authenticity of a USB device or USB charger, including such product aspects as the descriptors/capabilities and certification status."___

posted image

2016-04-16 20:22:24 (1 comments; 2 reshares; 2 +1s)Open 

Senate anti-encryption bill is itself a threat to national security
#encryption #security #privacy

The Burr-Feinstein bill aims to put the needs of law enforcement over the risk of hackers, by punching a hole in Silicon Valley's encryption effort. The bill would force companies to install a backdoor, or use weak encryption, making the data readable and useful to law enforcement who seek access to it.

The unwavering view of the security and cryptography community is that if there's a backdoor for law enforcement, hackers will find it and would take everything they can, leading to incalculable damage.

Senate anti-encryption bill is itself a threat to national security
#encryption #security #privacy

The Burr-Feinstein bill aims to put the needs of law enforcement over the risk of hackers, by punching a hole in Silicon Valley's encryption effort. The bill would force companies to install a backdoor, or use weak encryption, making the data readable and useful to law enforcement who seek access to it.

The unwavering view of the security and cryptography community is that if there's a backdoor for law enforcement, hackers will find it and would take everything they can, leading to incalculable damage.___

posted image

2016-04-15 06:23:55 (0 comments; 0 reshares; 1 +1s)Open 

Google’s Calendar Now Finds Spare Time and Fills It Up
#google #calendar  

Google is introducing new features to its popular calendar that will enable people to program in their aspirations for times when they don’t have work or meetings scheduled. Google’s algorithms will then seek appropriate gaps in a schedule in which stuff like exercise or discussing life with one’s spouse might be appropriate.

Google’s Calendar Now Finds Spare Time and Fills It Up
#google #calendar  

Google is introducing new features to its popular calendar that will enable people to program in their aspirations for times when they don’t have work or meetings scheduled. Google’s algorithms will then seek appropriate gaps in a schedule in which stuff like exercise or discussing life with one’s spouse might be appropriate.___

posted image

2016-04-15 05:30:37 (0 comments; 0 reshares; 1 +1s)Open 

Google Fiber planning wireless home Internet where fiber is too pricey
#googlefiber #wireless #internet

Google Fiber wants to provide fixed wireless Internet to homes where it wouldn't make financial sense to build fiber. They are experimenting with a number of different wireless technologies. While wireless networks are often slow, some companies are developing networks that can rival the speeds of faster wireline ones.

Google Fiber planning wireless home Internet where fiber is too pricey
#googlefiber #wireless #internet

Google Fiber wants to provide fixed wireless Internet to homes where it wouldn't make financial sense to build fiber. They are experimenting with a number of different wireless technologies. While wireless networks are often slow, some companies are developing networks that can rival the speeds of faster wireline ones.___

posted image

2016-04-14 18:28:17 (0 comments; 1 reshares; 3 +1s)Open 

Chrome abandons XP, Vista and older versions of OS X
#chrome #xp #vista #osx

Google yesterday released Chrome 50, dropping support for Windows XP and Vista, along with three older editions of Apple's OS X. 

The upgrade to Chrome 50 will not be recognized or downloaded by personal computers running Windows XP, Windows Vista, OS X Snow Leopard, OS X Lion or OS X Mountain Lion.

Chrome abandons XP, Vista and older versions of OS X
#chrome #xp #vista #osx

Google yesterday released Chrome 50, dropping support for Windows XP and Vista, along with three older editions of Apple's OS X. 

The upgrade to Chrome 50 will not be recognized or downloaded by personal computers running Windows XP, Windows Vista, OS X Snow Leopard, OS X Lion or OS X Mountain Lion.___

posted image

2016-04-14 10:09:39 (0 comments; 0 reshares; 1 +1s)Open 

USB-IF battles malware and bad chargers with Type-C Authentication spec
#usb #usbc #authentication

One of the problems that has emerged as USB Type-C has grown in popularity is non-compliant cables and power adapters, accessories that look like they ought to work but might actually end up frying the device they're plugged into. The USB-IF has announced the USB Type-C Authentication specification to combat this problem.

USB-IF battles malware and bad chargers with Type-C Authentication spec
#usb #usbc #authentication

One of the problems that has emerged as USB Type-C has grown in popularity is non-compliant cables and power adapters, accessories that look like they ought to work but might actually end up frying the device they're plugged into. The USB-IF has announced the USB Type-C Authentication specification to combat this problem.___

posted image

2016-04-05 20:28:10 (0 comments; 0 reshares; 1 +1s)Open 

Adding Links to the Windows 10 Start Menu
#windows10 #startmenu #links

I’m getting more used to Windows 10, but I miss having those links on the Start menu that went right to my Documents and Pictures folders. Can I get those back? In the Windows 10 settings, you can add Start Menu shortcuts to your computer’s Documents, Pictures and other folders.

Adding Links to the Windows 10 Start Menu
#windows10 #startmenu #links

I’m getting more used to Windows 10, but I miss having those links on the Start menu that went right to my Documents and Pictures folders. Can I get those back? In the Windows 10 settings, you can add Start Menu shortcuts to your computer’s Documents, Pictures and other folders.___

posted image

2016-04-01 21:41:56 (0 comments; 1 reshares; 1 +1s)Open 

Raspberry Pi: Amazon releases recipe for baking a low-cost Alexa voice assistant
#raspberrypi #alexa #assistant

Amazon has released a step-by-step guide on how to turn the $35 Raspberry Pi into a voice-controlled assistant. The instructions demonstrate how to set up the single board computer to use Amazon's Alexa Voice Service to create a low-cost alternative to the Echo, Amazon's $180 smart speaker.

Raspberry Pi: Amazon releases recipe for baking a low-cost Alexa voice assistant
#raspberrypi #alexa #assistant

Amazon has released a step-by-step guide on how to turn the $35 Raspberry Pi into a voice-controlled assistant. The instructions demonstrate how to set up the single board computer to use Amazon's Alexa Voice Service to create a low-cost alternative to the Echo, Amazon's $180 smart speaker.___

posted image

2016-03-31 18:06:42 (1 comments; 0 reshares; 1 +1s)Open 

How to clean install Windows the right way
#windows #windows10 #installation

Sometimes, the best way to fix deep-seated Windows issues is to burn everything to the ground and start from scratch. Reinstalling Windows refreshes the operating system, which gets rid of most corruption, errors, and viruses. Performing a clean install the right way takes some pre-wipe prep work in order to preserve your files and other saved data, though.

How to clean install Windows the right way
#windows #windows10 #installation

Sometimes, the best way to fix deep-seated Windows issues is to burn everything to the ground and start from scratch. Reinstalling Windows refreshes the operating system, which gets rid of most corruption, errors, and viruses. Performing a clean install the right way takes some pre-wipe prep work in order to preserve your files and other saved data, though.___

posted image

2016-03-31 16:13:26 (3 comments; 7 reshares; 7 +1s)Open 

Major Toshiba laptop battery recall issued after faulty units overheat and literally melt
#toshiba #laptop #battery

The Consumer Product Safety Commission announced a recall for battery packs in Toshiba laptops sold between June 2011 and January 2016. The recall affects nearly 40 different Toshiba models of PCs including Portege, Satellite, and Tecra models. The CPSC estimates the recall will affect about 91,000 units sold in the United States and another 10,000 sold in Canada.

Major Toshiba laptop battery recall issued after faulty units overheat and literally melt
#toshiba #laptop #battery

The Consumer Product Safety Commission announced a recall for battery packs in Toshiba laptops sold between June 2011 and January 2016. The recall affects nearly 40 different Toshiba models of PCs including Portege, Satellite, and Tecra models. The CPSC estimates the recall will affect about 91,000 units sold in the United States and another 10,000 sold in Canada.___

posted image

2016-03-31 14:44:08 (0 comments; 0 reshares; 1 +1s)Open 

Easily Control Automatic and Unwanted Windows 7 & 8.1 Upgrading to Windows 10
#windows7 #windows10 #upgrade

Never 10 is an easy to use free utility which gives users control over whether their Windows 7 or 8.1 will upgrade itself to Windows 10. This utility does not install ANY software of its own. It simply and quickly performs the required system editing for its user. It may also be used to easily re-enable Windows operating system automatic upgrading.

Easily Control Automatic and Unwanted Windows 7 & 8.1 Upgrading to Windows 10
#windows7 #windows10 #upgrade

Never 10 is an easy to use free utility which gives users control over whether their Windows 7 or 8.1 will upgrade itself to Windows 10. This utility does not install ANY software of its own. It simply and quickly performs the required system editing for its user. It may also be used to easily re-enable Windows operating system automatic upgrading.___

posted image

2016-03-31 14:35:37 (0 comments; 0 reshares; 1 +1s)Open 

Why should I upgrade from Windows 7 to 10?
#windows #windows10 #upgrade

Why should I upgrade from Windows 7 to 10? What are the benefits? Only you can decide whether you want to jump in now or wait until you buy a new PC, which will have been designed to run Windows 10. This article discusses the pros and cons.

Why should I upgrade from Windows 7 to 10?
#windows #windows10 #upgrade

Why should I upgrade from Windows 7 to 10? What are the benefits? Only you can decide whether you want to jump in now or wait until you buy a new PC, which will have been designed to run Windows 10. This article discusses the pros and cons.___

2016-03-31 13:54:20 (0 comments; 0 reshares; 1 +1s)Open 

Microsoft is dramatically cutting the free space available in OneDrive
#microsoft #onedrive #storage

The storage limit for all free OneDrive accounts will become 5 GB. If you currently have a free account with a 15 GB storage limit, that limit will reduce to 5 GB. All new free accounts will have 5 GB storage. The 15 GB camera roll storage bonus will also be discontinued for free accounts.

Microsoft is dramatically cutting the free space available in OneDrive
#microsoft #onedrive #storage

The storage limit for all free OneDrive accounts will become 5 GB. If you currently have a free account with a 15 GB storage limit, that limit will reduce to 5 GB. All new free accounts will have 5 GB storage. The 15 GB camera roll storage bonus will also be discontinued for free accounts.___

posted image

2016-03-29 06:18:35 (1 comments; 1 reshares; 1 +1s)Open 

Apple re-issues iOS 9.3 after crippling older devices, confusing customers
#ios9 #update #fix

Apple today replaced the iOS 9.3 update with a new version after the original crippled some older devices last week, and confused large numbers of unaffected customers when their iPhones and iPads told them that they weren't connected to the Internet when in truth they were. The initial version of iOS 9.3 threw owners of older hardware -- iPhone 5S and earlier, and iPad Air and earlier -- for a loop when it asked them for their Apple ID and password, normally not a step in the iOS update process.

Apple re-issues iOS 9.3 after crippling older devices, confusing customers
#ios9 #update #fix

Apple today replaced the iOS 9.3 update with a new version after the original crippled some older devices last week, and confused large numbers of unaffected customers when their iPhones and iPads told them that they weren't connected to the Internet when in truth they were. The initial version of iOS 9.3 threw owners of older hardware -- iPhone 5S and earlier, and iPad Air and earlier -- for a loop when it asked them for their Apple ID and password, normally not a step in the iOS update process.___

posted image

2016-03-24 10:40:05 (0 comments; 0 reshares; 2 +1s)Open 

Don't – don't – install iOS 9.3 on your iPad 2: Upgrade bricks slabs
#ipad2 #ios9 #fail

Apple's latest iOS update, version 9.3, is bricking iPad 2 devices.  Reg readers, along with those on Apple's support and discussion boards, say their iPad 2s are unable to fully update to iOS 9.3 due to error messages that, for the time being at least, render the device unusable. The hardware is left in a mid-install limbo, it appears, preventing people from backing out of or progressing through the botched upgrade.

Don't – don't – install iOS 9.3 on your iPad 2: Upgrade bricks slabs
#ipad2 #ios9 #fail

Apple's latest iOS update, version 9.3, is bricking iPad 2 devices.  Reg readers, along with those on Apple's support and discussion boards, say their iPad 2s are unable to fully update to iOS 9.3 due to error messages that, for the time being at least, render the device unusable. The hardware is left in a mid-install limbo, it appears, preventing people from backing out of or progressing through the botched upgrade.___

posted image

2016-03-23 02:27:55 (4 comments; 0 reshares; 3 +1s)Open 

Android rooting bug opens Nexus phones to “permanent device compromise”
#android #security #vulnerability

Millions of Android phones, including the entire line of Nexus models, are vulnerable to attacks that can execute malicious code and take control of core functions almost permanently, Google officials have warned. They are in the process of releasing a fix, but at the moment any phone that hasn't received a security patch level of March 18 or later is vulnerable.

Android rooting bug opens Nexus phones to “permanent device compromise”
#android #security #vulnerability

Millions of Android phones, including the entire line of Nexus models, are vulnerable to attacks that can execute malicious code and take control of core functions almost permanently, Google officials have warned. They are in the process of releasing a fix, but at the moment any phone that hasn't received a security patch level of March 18 or later is vulnerable.___

posted image

2016-03-16 09:50:13 (0 comments; 0 reshares; 0 +1s)Open 

Big-name sites hit by rash of malicious ads spreading crypto ransomware [Updated]
#malware #ads #ransomware

Mainstream websites, including those published by The New York Times, the BBC, MSN, and AOL, are falling victim to a new rash of malicious ads that attempt to surreptitiously install crypto ransomware and other malware on the computers of unsuspecting visitors, security firms warned.

Big-name sites hit by rash of malicious ads spreading crypto ransomware [Updated]
#malware #ads #ransomware

Mainstream websites, including those published by The New York Times, the BBC, MSN, and AOL, are falling victim to a new rash of malicious ads that attempt to surreptitiously install crypto ransomware and other malware on the computers of unsuspecting visitors, security firms warned.___

posted image

2016-03-15 04:01:16 (0 comments; 0 reshares; 1 +1s)Open 

The Ultimate Comparison of Nearly Every VPN on the Market
#vpn #security #privacy

Considering the fact that VPNs are useful for so many things today, you should be shopping for a VPN if you don’t have one already. If you need help picking one, this enormous Google spreadsheet is packed with over 100 different VPN services. It compares all of their features, stances, downsides, and prices.

The Ultimate Comparison of Nearly Every VPN on the Market
#vpn #security #privacy

Considering the fact that VPNs are useful for so many things today, you should be shopping for a VPN if you don’t have one already. If you need help picking one, this enormous Google spreadsheet is packed with over 100 different VPN services. It compares all of their features, stances, downsides, and prices.___

posted image

2016-03-15 02:50:25 (0 comments; 0 reshares; 1 +1s)Open 

Two-factor authentication (2FA) versus two-step verification (2SV)
#security #password #2fa #2sv

As we go about our online lives, many of us have considered enabling two-factor authentication (2FA) or two-step verification (2SV) on our accounts. Both measures introduce another element into a service's login process. For that reason, plenty of reputable sources online have left the impression that there is no difference between the two concepts. But those reports are wrong.

Two-factor authentication (2FA) versus two-step verification (2SV)
#security #password #2fa #2sv

As we go about our online lives, many of us have considered enabling two-factor authentication (2FA) or two-step verification (2SV) on our accounts. Both measures introduce another element into a service's login process. For that reason, plenty of reputable sources online have left the impression that there is no difference between the two concepts. But those reports are wrong.___

posted image

2016-03-12 00:33:18 (0 comments; 0 reshares; 1 +1s)Open 

Update Flash now – targeted attacks exploiting security holes
#flash #security #vulnerability

Windows, Mac and Linux users are being urged to update their installations of Adobe Flash, after the company pushed out a security patch addressing 23 reported vulnerabilities in the software. Adobe recommends users of the Adobe Flash Player Desktop Runtime for Windows and Macintosh update to 21.0.0.182 or later.  If you are running Flash Player on Linux, the version you should be running is 11.2.202.577 or later.

Update Flash now – targeted attacks exploiting security holes
#flash #security #vulnerability

Windows, Mac and Linux users are being urged to update their installations of Adobe Flash, after the company pushed out a security patch addressing 23 reported vulnerabilities in the software. Adobe recommends users of the Adobe Flash Player Desktop Runtime for Windows and Macintosh update to 21.0.0.182 or later.  If you are running Flash Player on Linux, the version you should be running is 11.2.202.577 or later.___

posted image

2016-03-11 01:37:17 (0 comments; 0 reshares; 1 +1s)Open 

Firefox 45 browser update patches 22 critical vulnerabilities
#firefox #security #privacy

The latest version of the Firefox browser comes with security fixes for a total of 40 vulnerabilities, 22 of which are deemed critical. Tab Groups have now been removed for users of the Firefox browser on Windows, Mac and Linux, although users can still keep this functionality if they wish through add-ons.

Firefox 45 browser update patches 22 critical vulnerabilities
#firefox #security #privacy

The latest version of the Firefox browser comes with security fixes for a total of 40 vulnerabilities, 22 of which are deemed critical. Tab Groups have now been removed for users of the Firefox browser on Windows, Mac and Linux, although users can still keep this functionality if they wish through add-ons.___

posted image

2016-03-06 23:51:53 (1 comments; 0 reshares; 4 +1s)Open 

Linux: How To Fix Failed to fetch Google Chrome Stable Release
#chrome #update #linux

If you are using Google Chrome on Linux you may get an error saying "Failed to fetch hxxp://dl.google.com/linux/chrome/deb/dists/stable/Release Unable to find expected entry 'main/binary-i386/Packages' in Release file (Wrong sources.list entry or malformed file) Some index files failed to download. They have been ignored, or old ones used instead." This article explains why.

Linux: How To Fix Failed to fetch Google Chrome Stable Release
#chrome #update #linux

If you are using Google Chrome on Linux you may get an error saying "Failed to fetch hxxp://dl.google.com/linux/chrome/deb/dists/stable/Release Unable to find expected entry 'main/binary-i386/Packages' in Release file (Wrong sources.list entry or malformed file) Some index files failed to download. They have been ignored, or old ones used instead." This article explains why.___

posted image

2016-03-02 23:35:51 (1 comments; 0 reshares; 2 +1s)Open 

Windows 10 May Delete Your Programs Without Asking
#windows10 #update #problems

If you’ve applied a major update to Windows 10 recently, you might notice that a couple of your apps have gone missing. It’s not a bug. Windows 10 is removing apps it considers incompatible or outdated.

Windows 10 May Delete Your Programs Without Asking
#windows10 #update #problems

If you’ve applied a major update to Windows 10 recently, you might notice that a couple of your apps have gone missing. It’s not a bug. Windows 10 is removing apps it considers incompatible or outdated.___

posted image

2016-02-29 23:06:52 (0 comments; 0 reshares; 0 +1s)Open 

The Raspberry Pi 3: Faster, Better, with Wi-Fi and Bluetooth
#raspberrypi #pi3

The Raspberry Pi 3 may be the ultimate mini-computer. It contains things that should have been included from the start, but weren’t, like Bluetooth and Wi-Fi. Performance has also seen a significant bump. The Raspberry Pi 3 does this while keeping its bargain-basement price of $35.

The Raspberry Pi 3: Faster, Better, with Wi-Fi and Bluetooth
#raspberrypi #pi3

The Raspberry Pi 3 may be the ultimate mini-computer. It contains things that should have been included from the start, but weren’t, like Bluetooth and Wi-Fi. Performance has also seen a significant bump. The Raspberry Pi 3 does this while keeping its bargain-basement price of $35.___

posted image

2016-02-29 05:34:16 (0 comments; 0 reshares; 0 +1s)Open 

Bernie Sanders, Other Senators Oppose Charter Merger
#charter #twc #bhn #merger  

Combining the nation’s second, third and sixth largest cable companies would in effect create another Comcast with little interest in customer service or quality, argues the Senators, focused instead solely on growth and anti-competitive behavior. The new, larger company would serve 24 million customers in 41 states.

Bernie Sanders, Other Senators Oppose Charter Merger
#charter #twc #bhn #merger  

Combining the nation’s second, third and sixth largest cable companies would in effect create another Comcast with little interest in customer service or quality, argues the Senators, focused instead solely on growth and anti-competitive behavior. The new, larger company would serve 24 million customers in 41 states.___

posted image

2016-02-28 22:22:17 (0 comments; 0 reshares; 0 +1s)Open 

How to make Linux's desktop look good on high-resolution displays
#linux #hidpi #hires

If you're running GNOME 3 in Linux, your first boot will have you looking for your reading glasses. Luckily, you can save your eyes and enjoy that glorious screen you paid for with a few steps. This article will show you how to change the scaling settings for GNOME 3, Mozilla’s Firefox and Thunderbird, and Chromium.

How to make Linux's desktop look good on high-resolution displays
#linux #hidpi #hires

If you're running GNOME 3 in Linux, your first boot will have you looking for your reading glasses. Luckily, you can save your eyes and enjoy that glorious screen you paid for with a few steps. This article will show you how to change the scaling settings for GNOME 3, Mozilla’s Firefox and Thunderbird, and Chromium.___

posted image

2016-02-26 20:52:44 (0 comments; 0 reshares; 1 +1s)Open 

Microsoft introduces more Windows 10 lock screen ads, but removing them is easy
#windows10 #ads #lockscreen

Microsoft has said it will use various methods to monetize the platform. Now it has made good on this promise, as several users have reported seeing Rise of the Tomb Raider ads appearing on their devices. Luckily, disabling the ads is very simple.

Microsoft introduces more Windows 10 lock screen ads, but removing them is easy
#windows10 #ads #lockscreen

Microsoft has said it will use various methods to monetize the platform. Now it has made good on this promise, as several users have reported seeing Rise of the Tomb Raider ads appearing on their devices. Luckily, disabling the ads is very simple.___

posted image

2016-02-25 16:54:00 (0 comments; 0 reshares; 0 +1s)Open 

Review: 8 password managers for Windows, Mac OS X, iOS, and Android
#password #manager #security

Password vaults, aka password safes or password managers give you a central spot to store all your passwords, encrypted and protected by a passphrase or token you provide. Here are eight of the leading password managers available, ranging from services designed to be used mainly on the Web to client-side apps with a slew of incarnations.

Review: 8 password managers for Windows, Mac OS X, iOS, and Android
#password #manager #security

Password vaults, aka password safes or password managers give you a central spot to store all your passwords, encrypted and protected by a passphrase or token you provide. Here are eight of the leading password managers available, ranging from services designed to be used mainly on the Web to client-side apps with a slew of incarnations.___

posted image

2016-02-19 05:51:45 (0 comments; 0 reshares; 2 +1s)Open 

Apple re-issues iOS 9.2.1 to fix iPhones bricked by Error 53
#iphone #ios #error53  

Apple has re-issued iOS 9.2.1 to fix the "Error 53" that had crippled iPhones whose owners had replaced some parts themselves or had a third-party shop do repairs. The new iOS 9.2.1 will only be served to users who update their iPhones through iTunes on a Mac or Windows PC. Most iPhone owners retrieve updates over the air using their cellular connection, and so will not receive the replacement.

Apple re-issues iOS 9.2.1 to fix iPhones bricked by Error 53
#iphone #ios #error53  

Apple has re-issued iOS 9.2.1 to fix the "Error 53" that had crippled iPhones whose owners had replaced some parts themselves or had a third-party shop do repairs. The new iOS 9.2.1 will only be served to users who update their iPhones through iTunes on a Mac or Windows PC. Most iPhone owners retrieve updates over the air using their cellular connection, and so will not receive the replacement.___

posted image

2016-02-17 14:26:16 (0 comments; 0 reshares; 1 +1s)Open 

A Simple Text Message Can Erase Your Android Phone
#android #security #malware  

Watch out for that next text message you receive. Security company Heimdal Security has discovered that hackers are randomly sending malicious text messages to Android device owners. If the user clicks on the link, the program is downloaded, allowing it to gain administrator rights to the device, the report claims.

A Simple Text Message Can Erase Your Android Phone
#android #security #malware  

Watch out for that next text message you receive. Security company Heimdal Security has discovered that hackers are randomly sending malicious text messages to Android device owners. If the user clicks on the link, the program is downloaded, allowing it to gain administrator rights to the device, the report claims.___

posted image

2016-02-16 14:57:50 (1 comments; 1 reshares; 2 +1s)Open 

How to install Linux Mint on your Windows PC
#linux #windows #linuxmint  

Linux Mint isn't just a great desktop, it's a great replacement for Windows. With Microsoft pushing Windows 10 on existing users, people are starting to explore alternatives to Windows.  I got a number of requests about switching out Windows 7 for Linux Mint 17.3. Here's how to do it.

How to install Linux Mint on your Windows PC
#linux #windows #linuxmint  

Linux Mint isn't just a great desktop, it's a great replacement for Windows. With Microsoft pushing Windows 10 on existing users, people are starting to explore alternatives to Windows.  I got a number of requests about switching out Windows 7 for Linux Mint 17.3. Here's how to do it.___

posted image

2016-02-15 11:10:52 (2 comments; 0 reshares; 1 +1s)Open 

This adblocker-blocker helps you get around sites that ban you for hiding ads
#adblock #adblocking #ads  

The adblocker-blocker tricks sites that use anti-adblocker technology into thinking you aren’t using an adblocker. It works against a number of different technologies used to detect adblock users.

This adblocker-blocker helps you get around sites that ban you for hiding ads
#adblock #adblocking #ads  

The adblocker-blocker tricks sites that use anti-adblocker technology into thinking you aren’t using an adblocker. It works against a number of different technologies used to detect adblock users.___

posted image

2016-02-13 09:10:44 (1 comments; 0 reshares; 2 +1s)Open 

The ultimate guide to proper SSD management
#ssd #tips  

There's no understating it: Solid-state drives are awesome. But SSDs aren’t the perfect replacement for a mechanical hard drive just yet, thanks to their far higher per-gigabyte costs compared to traditional drives and a few unique quirks. Read on for tips and tricks on how to put that rip-roaring SSD speed to best use.

The ultimate guide to proper SSD management
#ssd #tips  

There's no understating it: Solid-state drives are awesome. But SSDs aren’t the perfect replacement for a mechanical hard drive just yet, thanks to their far higher per-gigabyte costs compared to traditional drives and a few unique quirks. Read on for tips and tricks on how to put that rip-roaring SSD speed to best use.___

posted image

2016-02-12 06:55:27 (1 comments; 0 reshares; 1 +1s)Open 

US can't ban encryption because most of it comes from overseas 
#encryption #security #privacy

If the US government tried to ban or outlaw unbreakable encryption, it could harm American businesses, whose customers would simply look for secure products abroad, a group of researchers have said. The report's stark conclusion is that any law "regulating product features are national, and only affect people living in the countries in which they're enacted."

US can't ban encryption because most of it comes from overseas 
#encryption #security #privacy

If the US government tried to ban or outlaw unbreakable encryption, it could harm American businesses, whose customers would simply look for secure products abroad, a group of researchers have said. The report's stark conclusion is that any law "regulating product features are national, and only affect people living in the countries in which they're enacted."___

posted image

2016-02-12 05:28:50 (0 comments; 0 reshares; 1 +1s)Open 

Speeding up your home Wi-Fi might be as easy as changing one setting
#wifi #speed

You’ve tried everything when it comes to fixing your home Wi-Fi, but it’s still broken. It could have something to do with the Wi-Fi bands that you’re using. Now, Apple and Cisco have just acknowledged the issue and provided some details that might help.

Speeding up your home Wi-Fi might be as easy as changing one setting
#wifi #speed

You’ve tried everything when it comes to fixing your home Wi-Fi, but it’s still broken. It could have something to do with the Wi-Fi bands that you’re using. Now, Apple and Cisco have just acknowledged the issue and provided some details that might help.___

posted image

2016-02-12 03:15:56 (1 comments; 0 reshares; 1 +1s)Open 

When it comes to Windows 10 privacy, don't trust amateur analysts
#windows10 #privacy

Gordon F. Kelly of Forbes is at it again, whipping up a frenzy over Windows 10. This time he claims to have found SHOCKING EVIDENCE that Microsoft's telemetry is collecting STAGGERING amounts of data from Windows 10 users. Sadly, what Mr. Kelly's post* proves is how very, very little he understands about modern computing or networking.

When it comes to Windows 10 privacy, don't trust amateur analysts
#windows10 #privacy

Gordon F. Kelly of Forbes is at it again, whipping up a frenzy over Windows 10. This time he claims to have found SHOCKING EVIDENCE that Microsoft's telemetry is collecting STAGGERING amounts of data from Windows 10 users. Sadly, what Mr. Kelly's post* proves is how very, very little he understands about modern computing or networking.___

posted image

2016-02-08 07:39:32 (0 comments; 0 reshares; 0 +1s)Open 

Ad Blocking Is A Kind Of Populist Revolt Against The Internet Establishment
#ads #adblocking

Ad blocking has arisen chiefly because publishers, technology providers and advertisers have largely taken users for granted, as simply eyeballs, conversions or audiences ready to be tracked and harvested at will. 

Ad blockers are also addressing real-world problems and user frustrations such as slow page load times, ad clutter, malware and privacy issues.

Ad Blocking Is A Kind Of Populist Revolt Against The Internet Establishment
#ads #adblocking

Ad blocking has arisen chiefly because publishers, technology providers and advertisers have largely taken users for granted, as simply eyeballs, conversions or audiences ready to be tracked and harvested at will. 

Ad blockers are also addressing real-world problems and user frustrations such as slow page load times, ad clutter, malware and privacy issues.___

posted image

2016-02-08 04:24:42 (0 comments; 0 reshares; 1 +1s)Open 

‘Error 53’ fury mounts as Apple software update threatens to kill your iPhone 6
#iphone #repair #fail

Thousands of iPhone 6 users claim they have been left holding almost worthless phones because Apple’s latest operating system permanently disables the handset if it detects that a repair has been carried out by a non-Apple technician. The problem only comes to light when the latest version of Apple’s iPhone software, iOS 9, is installed. Indeed, the phone may have been working perfectly for weeks or months since a repair or being damaged.

‘Error 53’ fury mounts as Apple software update threatens to kill your iPhone 6
#iphone #repair #fail

Thousands of iPhone 6 users claim they have been left holding almost worthless phones because Apple’s latest operating system permanently disables the handset if it detects that a repair has been carried out by a non-Apple technician. The problem only comes to light when the latest version of Apple’s iPhone software, iOS 9, is installed. Indeed, the phone may have been working perfectly for weeks or months since a repair or being damaged.___

posted image

2016-02-06 07:21:59 (2 comments; 6 reshares; 31 +1s)Open 

Upgrade 16GB iPhone To 128GB For $60 And In 30 Minutes Only [Video]
#iphone #memory #upgrade  

It is indeed possible to manually upgrade the internal storage of an iPhone with 16GB storage to 128GB. Here's how the whole process works:

Upgrade 16GB iPhone To 128GB For $60 And In 30 Minutes Only [Video]
#iphone #memory #upgrade  

It is indeed possible to manually upgrade the internal storage of an iPhone with 16GB storage to 128GB. Here's how the whole process works:___

posted image

2016-02-04 04:56:05 (0 comments; 1 reshares; 1 +1s)Open 

eBay has no plans to fix “severe” bug that allows malware distribution [Updated]
#ebay #malware #javascript  

eBay has no plans to fix a "severe" vulnerability that allows attackers to use the company's trusted website to distribute malicious code and phishing pages, researchers from security firm Check Point Software said. The vulnerability allows attackers to bypass a key restriction that prevents user posts from hosting JavaScript code that gets executed on end-user devices.

eBay has no plans to fix “severe” bug that allows malware distribution [Updated]
#ebay #malware #javascript  

eBay has no plans to fix a "severe" vulnerability that allows attackers to use the company's trusted website to distribute malicious code and phishing pages, researchers from security firm Check Point Software said. The vulnerability allows attackers to bypass a key restriction that prevents user posts from hosting JavaScript code that gets executed on end-user devices.___

posted image

2016-02-01 09:15:20 (0 comments; 0 reshares; 2 +1s)Open 

Greasemonkey/Tampermonkey script removes Twitter URL redirects
#twitter #url #redirection  

"Fix Twitter Links" is a User Script that modifies your timeline URLs on the fly to eliminate Twitter redirects. To activate the functionality in your browser you will need a User Script manager, such as Greasemonkey or Tampermonkey.

Greasemonkey/Tampermonkey script removes Twitter URL redirects
#twitter #url #redirection  

"Fix Twitter Links" is a User Script that modifies your timeline URLs on the fly to eliminate Twitter redirects. To activate the functionality in your browser you will need a User Script manager, such as Greasemonkey or Tampermonkey.___

posted image

2016-01-31 10:26:45 (0 comments; 0 reshares; 1 +1s)Open 

Motherboard makers race out BIOS updates to squash show-stopping Skylake bug
#intel #skylake #bug  

Mere weeks after Intel fessed up to a serious bug crashing Skylake systems running Prime 95—a oft-used program for DIY PC builders—or other complex applications, motherboard makers are already rushing out patches to fix the issue. “Under some complex workload conditions, like those encountered when running applications such as Prime95, the processor may hang or cause unpredictable system behavior,” an Intel official told PCWorld.

Motherboard makers race out BIOS updates to squash show-stopping Skylake bug
#intel #skylake #bug  

Mere weeks after Intel fessed up to a serious bug crashing Skylake systems running Prime 95—a oft-used program for DIY PC builders—or other complex applications, motherboard makers are already rushing out patches to fix the issue. “Under some complex workload conditions, like those encountered when running applications such as Prime95, the processor may hang or cause unpredictable system behavior,” an Intel official told PCWorld.___

posted image

2016-01-28 14:05:11 (0 comments; 0 reshares; 1 +1s)Open 

Origin of the word "Ham" Operator
#hamradio #ham #amateurradio  

Have you ever wondered why we radio amateurs are called “HAMS”? Well, according to the Northern Ohio Radio Society, it goes like this:

Origin of the word "Ham" Operator
#hamradio #ham #amateurradio  

Have you ever wondered why we radio amateurs are called “HAMS”? Well, according to the Northern Ohio Radio Society, it goes like this:___

posted image

2016-01-28 13:41:32 (0 comments; 0 reshares; 2 +1s)Open 

When 'Free' Windows 10 Becomes Expensive, You Should Fear This
#windows10 #microsoft

Here is a date which should worry you: July 29th 2016. This is the date Microsoft will start charging for Windows 10. Here is another date which should worry you more: July 17th, 2017. Why? Because it just made July 29th, 2016 one heck of a lot worse. It is the last possible date Microsoft will allow Windows 7 or Windows 8 to be used on a cutting edge computer and still receive essential support like security patches.

When 'Free' Windows 10 Becomes Expensive, You Should Fear This
#windows10 #microsoft

Here is a date which should worry you: July 29th 2016. This is the date Microsoft will start charging for Windows 10. Here is another date which should worry you more: July 17th, 2017. Why? Because it just made July 29th, 2016 one heck of a lot worse. It is the last possible date Microsoft will allow Windows 7 or Windows 8 to be used on a cutting edge computer and still receive essential support like security patches.___

posted image

2016-01-28 12:54:31 (0 comments; 1 reshares; 1 +1s)Open 

Google's VirusTotal now identifies suspicious firmware
#virus #malware #firmware  

VirusTotal is a free service that analyzes suspicious files and URLs and facilitates the quick detection of viruses, worms, trojans, and all kinds of malware. The service has added a new tool that analyzes firmware, the low-level code that bridges a computer’s hardware and operating system at startup.

Google's VirusTotal now identifies suspicious firmware
#virus #malware #firmware  

VirusTotal is a free service that analyzes suspicious files and URLs and facilitates the quick detection of viruses, worms, trojans, and all kinds of malware. The service has added a new tool that analyzes firmware, the low-level code that bridges a computer’s hardware and operating system at startup.___

posted image

2016-01-28 03:57:58 (0 comments; 0 reshares; 1 +1s)Open 

Fake Facebook 'Security System Page' scams want your payment card details
#facebook #scam #security  

Fake "Security System Page" scams are making the rounds on Facebook and are trying to lure users into handing over their payment card details. If the scams are sent to you as a Facebook message or post, take a screenshot and report it to Facebook Security. If you know the Facebook user who sent it to you, you might also want to let your friend know that their account was likely hijacked.

Fake Facebook 'Security System Page' scams want your payment card details
#facebook #scam #security  

Fake "Security System Page" scams are making the rounds on Facebook and are trying to lure users into handing over their payment card details. If the scams are sent to you as a Facebook message or post, take a screenshot and report it to Facebook Security. If you know the Facebook user who sent it to you, you might also want to let your friend know that their account was likely hijacked.___

Buttons

A special service of CircleCount.com is the following button.

The button shows the number of followers you have directly on a small button. You can add this button to your website, like the +1-Button of Google or the Like-Button of Facebook.






You can add this button directly in your website. For more information about the CircleCount Buttons and the description how to add them to another page click here.

Keith Petersen (w8sdz)TwitterFacebookLinkedInCircloscope