Login now

Not your profile? Login and get free access to your reports and analysis.

Tags

Sign in

The following tags have been added by users of CircleCount.com.
You can login on CircleCount to add more tags here.

  • Amateur Radio
  • Information Technology
  • Linux
  • Technology
  • VoIP

Are you missing a tag in the list of available tags? You can suggest new tags here.

Login now

Do you want to see a more detailed chart? Check your settings and define your favorite chart type.

Or click here to get the detailed chart only once.

Keith Petersen (w8sdz) has been shared in 28 public circles

AuthorFollowersDateUsers in CircleCommentsReshares+1Links
Herb Firestone68,143Google Plus Engagers On TSUFollow Friday | Halloween, 2014!To Be Included In Next Friday's TSU/G+ Circle Share:1. Plus and Re-share this post2. Add your TSU url in the comments below3. Follow me on both G+ and TSU if you haven't already. https://www.tsu.co/HerbFirestoneTo Remain In Next Friday's TSU/G+ Circle Share:*Please do the same.If you wish to be removed please let me know by direct message.If you are not yet a member of the following awesome TSU G+ Communities, check them out and join one or more.TSU Strategy, Tips and Networkinghttps://plus.google.com/communities/108690489746900386612TSU Guruhttps://plus.google.com/communities/102413179503907741224TSU Open Networkershttps://plus.google.com/communities/117313545208700875407 #tsu   #googleplusengagers   #engagers   #tsuengagers   #sharedcircles   #circleoftheday   #sharedcircleoftheday   #halloweencircle   #engagerscircles  2014-10-31 19:56:01130000
Kelvin Williams3,027Here are the people I'd recommend you follow on this #FollowFriday .I think these people are so awesome I'm sharing this circle again.  Add it, share it, and I'll put you into the next one.  :)(This is a slightly modified circle that was shared earlier in the week--I had some people left out.)2013-06-21 20:52:51202303
Kelvin Williams3,027This circle rightchea....  This is the only one you ever need.  This is the bestest circle on Google+ without question.Import it and share it.  It will make your Google+ more better.2013-06-20 00:51:1319176338
Mithu Hassan17,704Astonishing Engagers Sunday Hyperball 1-2-3 steps; if you want to be added to the next  #hyperball ?1) Add to your circles.2) Re-share this circle publicly with thanking to +Scott Buehler3) If you already included and received this by mail please spread up with +1, comment and share as we are growing together. 4) After adding the circle, give some G+ love to +Scott Buehler   's stream (profile). #sharedcircles #addcircle #sharedpubliccircles #publiccircle #circlesharing #circleoftheday #publicsharedcircles   2013-06-10 03:51:28314201133
Scott Buehler6,201Astonishing Engagers Sunday Hyperball Full content: Click "Read more"This circle share is my effort in rewarding those who participate with my posts. This hyperball is all about rewarding those who reshare my content and therefore, who has helped me reach more people out there in the Googlesphere.Note: My niece had a wedding and reception yesterday, so I've moved this shared circle back one day.Want to be added to the #hyperball? Simpler than ever.1) Add me to your circles.2) Reshare anything that interests you on my stream (profile)2a) Or reshare this circle share.Want to stay in the hyperball? Just share this publicly.Please Connect with Scott - My Directory of Social Accountshttp://xeeme.com/buehler+1 My Page at https://plus.google.com/111555251124021034989/postsThis share is reset weekly so please be encouraged to add the circle. It's a list of people who reshare content! You want engagers? This is it!=========================================================Scott's FavoritesHere I list all of my favorite topics and things that happened for the week.Ultimate Google Plus GuideI've written a full Google Plus guide over the Memorial Day weekend and it has done quite well. This guide is a go-to guide to share with others who are new to the G+ experience. It solves the "ghost town" effect immediately.See It: https://plus.google.com/107415989115407435914/posts/3WL7edPMgQKThe Guide: http://www.scottbuehler.com/social-networking/google-plus/ultimate-guide-to-google-plus/My Chosen Caturday Photo for the WeekThis cat loves the bathtub!See it: https://plus.google.com/107415989115407435914/posts/61rA6v5Bc3yPhotos of the WeekWil Wheaton shared thios Xbox One infographic to his communtity which drove the post into the Hot section of Google Plus.1300+ Shares; 1016+ +1's; 415 commentsSee it: https://plus.google.com/u/0/107415989115407435914/posts/Qefxa5wixaG=========================================================Scott's CommunitiesI've been busy this week on Google Plus! I've created two new communities this week that I'd like to share. Please consider joining them if they interest you.Hyperball Shared CirclesThis is a community built around my Hyperball theme. I've got a lot of plans working with circle shares, and I've been hard at work putting together some nice themed circle shares.http://gplus.to/HyperballWeb Hosting ReviewsI wanted a place where people could post web hosting reviews without affiliate links. It's a community where you can review your favorite web hosting providers.http://gplus.to/WebHostingReviewTiger of the DayLike Tigers? I love them! I've had this community up for a few weeks now and it has grown to well over 140 members with people posting actively. Feel free to hit the share button on awesome Tiger shots if you come across them and share it to the community.http://gplus.to/TigerOfTheDay2013-06-09 18:22:28244644057
Mithu Hassan13,514Astonishing Engagers Saturday Hyperball by  +Scott Buehler * 1-2-3 steps; if you want to be added to the next*  #hyperball?1) Add to your circles.2) Re-share this circle publicly.3) After adding the circle, re-share anything that interests you on +Scott Buehler  's stream (profile).4) If you already included and got this by mail please spread up with +1, comment and share for mutual benefits.Full content:https://plus.google.com/u/0/107415989115407435914/posts/YUzAcm5jDfu#sharedcircles #addcircle #sharedpubliccircles2013-06-01 17:45:09451181025
Scott Buehler5,291Astonishing Engagers Saturday Hyperball Full content: Click "Read more"This circle share is my effort in rewarding those who participate with my posts. This hyperball is all about rewarding those who reshare my content and therefore, who has helped me reach more people out there in the Googlesphere.Want to be added to the #hyperball? Simpler than ever.1) Add me to your circles.2) Reshare anything that interests you on my stream (profile)2a) Or reshare this circle share.The more you share, the higher likelihood I'll pick you up.Want to stay in the hyperball? Just share this publicly.Please Connect with Scott - My Directory of Social Accountshttp://xeeme.com/buehler+1 My Page at https://plus.google.com/111555251124021034989/postsThis share is reset weekly so please be encouraged to add the circle. It's a list of people who reshare content! You want engagers? This is it!=========================================================Scott's FavoritesHere I list all of my favorite topics and things that happened for the week.Ultimate Google Plus GuideI've written a full Google Plus guide over the Memorial Day weekend and it has done quite well. This guide is a go-to guide to share with others who are new to the G+ experience. It solves the "ghost town" effect immediately.See It: https://plus.google.com/107415989115407435914/posts/3WL7edPMgQKThe Guide: http://www.scottbuehler.com/social-networking/google-plus/ultimate-guide-to-google-plus/Video of the WeekNeed an idea for fun next Winter season and don't mind risking a few bones in the process? Try extreme road tubing in snow!See it: https://plus.google.com/u/0/107415989115407435914/posts/LfbE7pckFTMMy Chosen Caturday Photo for the WeekThis cat is a special Bengal Cat breed that really caught my eye. As you know, I'm a huge Tiger fan (see community) and this cat's markings are incredibly similar. I want one!77+ Shares; 370+ +1's; 160+ comments!See it: https://plus.google.com/107415989115407435914/posts/SX6U7F7ExaGPhotos of the WeekMy first 500 comment viral hot post on Google+Check out the Albino Alligator. There's less than 100 in existance and everyone thought the photo was a fake, but it isn't!750+ Shares; 3294+ +1's; 500 commentsSee it: https://plus.google.com/107415989115407435914/posts/LqDPnX847gkScared of heights? This Tibetan Bridge in Claviere, Piedmont - Italy is sure to test your liimits.81+ shares; 500+ +1's; 40+ commentsSee it: https://plus.google.com/u/0/107415989115407435914/posts/HjJjDxEvDZ7=========================================================Scott's CommunitiesI've been busy this week on Google Plus! I've created two new communities this week that I'd like to share. Please consider joining them if they interest you.Hyperball Shared CirclesThis is a community built around my Hyperball theme. I've2013-06-01 16:15:09451794865
martin shervington82,368Commoogling Engagers Circle 4 (April 2013)Here you have some more great engagers since I started on Google+A few more of the newest engagers have been included as well, to give them as boost. Add them in for some great conversations and connections as well. #commoogling  2013-04-12 13:22:38425301130
Chris Row3,041This is my VoIP, HostedPBX, BYOD shared circle pt 2Most in this circle is into VoIP tech2013-03-05 15:35:35496314
AyJay Schibig13,875BOOST CIRCLEGive your circles a BOOST by adding this mix of all kinds of  interesting G Plussers  to your circles!Feel free to add yourself and re-share. If  you would like to be included in my next edition leave a comment below.  I keep  names and faces "fresh" across all of my 11 circles, so please ask only if you are not already in any of  my other circles. Thanks.Circles I am curating:21ST CENTURY PHOTOGRAPHERS (1&2), ALL KINDS, DISCOVERY, FULL CIRCLE,SOCIAL, ECLECTIC,ENGAGERS, AWESOME, NEW HORIZONS and BOOST#circleoftheday   #circleshare   #circlesharing   #circlesharingforthepeopleplc   #sharedcircles   #sharedpubliccircles   #sharedcircleoftheday   #sharedcircleday   #publiccirclesproject   #publiccircles   #publicsharedcircles  #sharedpublicircles   #circle   #circles   #circlemeup  #awesomepeople   #awesomecircle   #circleme   #sharedpoint   #sharewithyou    #ShareYourCircle2013-01-16 07:02:003069110
Chris Row2,274This is my VoIP related Shared Circle. hope you enjoy2013-01-09 20:52:42405114
AyJay Schibig13,391BOOST CIRCLEGive your circles a BOOST by adding this mix of all kinds of  interesting G Plussers  to your circles!Feel free to add yourself and re-share. If  you would like to be included in my next edition leave a comment below.#circleoftheday   #circleshare   #circlesharing   #circlesharingforthepeopleplc   #sharedcircles   #sharedpubliccircles   #sharedcircleoftheday   #sharedcircleday   #publiccirclesproject   #publiccircles   #publicsharedcircles  #sharedpublicircles   #circle   #circles   #circlemeup  #awesomepeople   #awesomecircle   #circleme   #sharedpoint   #sharewithyou 2013-01-06 03:05:282959711
AyJay Schibig13,174BOOST CIRCLEGive your circles a BOOST by adding this mix of all kinds of  interesting G Plussers  to your circles!Feel free to add yourself and re-share. If  you wish to be included in my next edition leave a comment.  I keep  names and faces "fresh" across all of my 11 circles, so please ask only if you are not already in any of  my other circles. Thanks.Circles I am curating:21ST CENTURY PHOTOGRAPHERS (1&2), ALL KINDS, DISCOVERY, FULL CIRCLE,SOCIAL, ECLECTIC,ENGAGERS, AWESOME, NEW HORIZONS and BOOST#circleoftheday   #circleshare   #circlesharing   #circlesharingforthepeopleplc   #sharedcircles   #sharedpubliccircles   #sharedcircleoftheday   #sharedcircleday   #publiccirclesproject   #publiccircles   #publicsharedcircles  #sharedpublicircles   #circle   #circles   #circlemeup  #awesomepeople   #awesomecircle   #circleme   #sharedpoint   #sharewithyou  2012-12-29 00:35:273134110
AyJay Schibig12,645BOOST CIRCLEGive your circles a BOOST by adding this mix of all kinds of  interesting G Plussers  to your circles!Feel free to add yourself and re-share. If  you would like to be included in my next edition leave a comment below.#circleoftheday   #circleshare   #circlesharing   #circlesharingforthepeopleplc   #sharedcircles   #sharedpubliccircles   #sharedcircleoftheday   #sharedcircleday   #publiccirclesproject   #publiccircles   #publicsharedcircles  #sharedpublicircles   #circle   #circles   #circlemeup  #awesomepeople   #awesomecircle   #circleme   #sharedpoint   #sharewithyou 2012-12-20 01:52:4839713220
AyJay Schibig11,988BOOST CIRCLEGive your circles a BOOST by adding this mix of all kinds of  interesting G Plussers  to your circles!Feel free to add yourself and re-share. If  you would like to be included in my next edition leave a comment below.#circleoftheday   #circleshare   #circlesharing   #circlesharingforthepeopleplc   #sharedcircles   #sharedpubliccircles   #sharedcircleoftheday   #sharedcircleday   #publiccirclesproject   #publiccircles   #publicsharedcircles  #sharedpublicircles   #circle   #circles   #circlemeup  #awesomepeople   #awesomecircle   #circleme   #sharedpoint   #sharewithyou 2012-12-11 22:56:3144620823
AyJay Schibig11,448BOOST CIRCLEGive your circles a BOOST by adding this mix of all kinds of  interesting G Plussers  to your circles!Feel free to add yourself and re-share. If  you would like to be included in my next edition leave a comment below.#circleoftheday   #circleshare   #circlesharing   #circlesharingforthepeopleplc   #sharedcircles   #sharedpubliccircles   #sharedcircleoftheday   #sharedcircleday   #publiccirclesproject   #publiccircles   #publicsharedcircles  #sharedpublicircles   #circle   #circles   #circlemeup  #awesomepeople   #awesomecircle   #circleme   #sharedpoint   #sharewithyou 2012-12-03 00:43:19444311035
Chris Row1,090Someone shared this Circle with me the other day, VoIP G+ users. anyone VoIP related. If you think you or someone you know should be added let me know, I'm trying to build a really good VoIP circle.  #voip   #skype   #googlevoice   #PBX   #avaya   #broadconnect     #Shared   #circles   http://www.broadconnect.ca/ 2012-11-28 05:00:31266201
Circles (CircleHub)18,607Technology Public CircleIf you love technology and would like to be included in the technology circle click on this link http://goo.gl/MDVitNote: If you have already shared this circle, you can delete the previous one from your profile.#Circleshare   #Technology   #TechologyCircle   #Circle   #Circles   #technologia   #Apple   #Tech   #HighTech   #iPhone   #WindowsPhone  #Microsoft   #Google   #Apple   #Android   #Public  #PublicTechnologyCircle2012-11-26 14:05:49427398193
Josh Schott1,790Tech & Social Media CircleSince it's Friday I thought I would share one of my circles. This happens to be one of my biggest circles. And since I'm now done cleaning my circles, I'm going to start having more circle shares. So if you're looking to supercharge your stream, I highly recommend adding these great people.BTW, a special thanks to +Jens Graikowski for his post on how to conduct shared circles!+Shared Circles on G+ +Full Circle +Circles +Best Shared Circle 2012-11-16 19:19:0510436948
Chris Row650Here is a Circle of active people on G+ , Still adding people so if You know a person or if You would like to be added please let me know. Feel free to share this as well.2012-11-16 17:48:0541813316
Circles (CircleHub)14,664Technology Public CircleIf you love technology and would like to be included in the technology circle click on this link http://goo.gl/MDVitNote: If you have already shared this circle, you can delete the previous one from your profile.#Circleshare   #Technology   #TechologyCircle   #Circle   #Circles   #technologia   #Apple   #Tech   #HighTech   #iPhone   #WindowsPhone  #Microsoft   #Google   #Apple   #Android   #Public  #PublicTechnologyCircle2012-11-16 08:08:10368254662
Circles (CircleHub)12,285Technology Public CircleIf you love technology and would like to be included in the technology circle click on this link http://goo.gl/MDVitNote: If you have already shared this circle, you can delete the previous one from your profile.#Circleshare   #Technology   #TechologyCircle   #Circle   #Circles   #technologia   #Apple   #Tech   #HighTech   #iPhone   #WindowsPhone  #Microsoft   #Google   #Apple   #Android   #Public  #PublicTechnologyCircle2012-11-08 11:15:25314122739
Robert Warren2,085I thought I would do a little circle share. Here is 500 (because that's the G+ share limit) of my Tech circle - enjoy! Hey +Jason Malone you need to expand your circles lol!2012-11-07 15:47:265018216
Moe „Gilvan Blight“ Tousignant3,306It's been a while since I've shared one of my RPG circles. Inspired by +Rhonda Koti getting involved over here and trying to find people to circle I thought it was time to do another.Here are a bunch of awesome gamers who's G+ names happen to start with the letter K or L. These are Games Masters, Writers, Artists, Podcaster, Bloggers,  Edition Warriors, LARPers or just plain old fans of Role Playing Games.If you choose to add this circle why not say hi?  Just toss all of them into a "new gamers" circle, send a message out to that introducing yourself and then move them into whatever sorting system you have. #circleshare  2012-11-01 02:44:25212302
Lee Smallwood8,954Want to share the 2nd of 2 circles of Engaging People here on G+ I love their content, the way the engage and I recommend you step and say Hello to them :)Have a great weekend all :)2012-04-13 17:23:5433731622
Scot Duke2,583Share My Circle The Best of G+It's time again to help out the Newbies to G+ by giving them a leg up on finding the people in G+ who are interactive, responsive and down right COOL!I hear there are a few million more here since my last so I am sure they are probably sitting there scratching their head with a look of confusion on what is going on. I remember when I got here, that was my thoughts. Wish there had been someone then sharing quality Circles.So here is my Inter-circle of real live people. If you are not in this circle here might be why.To be placed in my most cherished circle of friends you have had to: -Be someone I know personally-Have at least made one comment made to any of my posts, -Have a nice headshot photo,-Have a full profile-Make a number of original posts-Understand how social networking works.Sounds simple doesn't it! Well it is and how you should look to building your own circle. Here is your start. If your current circles are not producing the interaction you are looking for you might need to flush them and start over with this one.Warning: If you load this circle into your account to start spamming these people I can only warn you these people are well trained at using the Block for Spam button. Plus, there are a few people from G+ hidden in this circle who are very proud of their creation and I have actually witnessed them removing Knuckleheads like a bouncer at a bar.Have fun socializing..it will pay off ten times more than just gawking or becoming a Knucklehead.2012-03-20 12:07:3131326715
john sawyer0New Linux circle. Thanks guys.john sawyer shared a circle with you.2011-10-09 01:29:18398122
Phil Glass (voipusers)277VoIP, Telephony and Network TechnologiesRandulo Zeeek shared a circle with you.2011-10-02 10:15:49250704

Activity

Average numbers for the latest posts (max. 50 posts, posted within the last 4 weeks)

0
comments per post
0
reshares per post
2
+1's per post

959
characters per posting

Top posts in the last 50 posts

Most comments: 4

posted image

2014-10-26 00:49:08 (4 comments, 1 reshares, 3 +1s)Open 

Google blocks its own URL shortening service goo.gl links  
#google #shorturl #fail  

Google Chrome is blocking Google’s own URL shortening service goo.gl links. These links are mostly generated by Google’s own Feed Burner service which then auto tweets the links to the linked Twitter account. 

The exact causes are not known but Google blocking its own link shortening service is nothing short of a irony. Techworm is waiting for a comment from Google to know whether this is a genuine blockade for Malware or some software glitch in its search algorithm. 

Most reshares: 4

posted image

2014-10-07 12:52:35 (4 comments, 4 reshares, 8 +1s)Open 

Google has expanded carrier support for Google Voice MMS  
#googlevoice #mms #gvoice  

Quoting a Google spokesman: "When your sister texts you a picture of your newborn niece, it’s really important that you get it. For too long, however, Google Voice users would miss these messages for lack of MMS support. Google has been working with nearly 100 different North American carriers to enable this feature — including AT&T, Sprint, T-Mobile, Bell Canada, Rogers, Telus, and many more — and starting [Oct. 6, 2014] all these integrations are live. So enjoy those incoming pics, say goodbye to fomo (fear of missing out), and stay tuned for more Google Voice messaging improvements!"

Most plusones: 8

posted image

2014-10-07 12:52:35 (4 comments, 4 reshares, 8 +1s)Open 

Google has expanded carrier support for Google Voice MMS  
#googlevoice #mms #gvoice  

Quoting a Google spokesman: "When your sister texts you a picture of your newborn niece, it’s really important that you get it. For too long, however, Google Voice users would miss these messages for lack of MMS support. Google has been working with nearly 100 different North American carriers to enable this feature — including AT&T, Sprint, T-Mobile, Bell Canada, Rogers, Telus, and many more — and starting [Oct. 6, 2014] all these integrations are live. So enjoy those incoming pics, say goodbye to fomo (fear of missing out), and stay tuned for more Google Voice messaging improvements!"

Latest 50 posts

posted image

2014-10-11 17:53:40 (0 comments, 0 reshares, 1 +1s)Open 

How to Clear the Google Chrome DNS cache on Windows  
#chrome #dns #windows  

Flushing your DNS cache can be a useful tool to resolve any host connection errors that you may experience with Google Chrome or other browsers.When IP addresses become outdated or if a website switches to a new server, you may encounter DNS errors when you try to access them. Sometimes, due to continued use and accessing sites with a less than perfect web safety rating, your DNS cache may also become corrupted. This is where a DNS cache flush comes in handy.  It is very simple to do and can be done directly in Chrome or from an Elevated Command Prompt window in Windows 7 or 8. 

How to Clear the Google Chrome DNS cache on Windows  
#chrome #dns #windows  

Flushing your DNS cache can be a useful tool to resolve any host connection errors that you may experience with Google Chrome or other browsers.When IP addresses become outdated or if a website switches to a new server, you may encounter DNS errors when you try to access them. Sometimes, due to continued use and accessing sites with a less than perfect web safety rating, your DNS cache may also become corrupted. This is where a DNS cache flush comes in handy.  It is very simple to do and can be done directly in Chrome or from an Elevated Command Prompt window in Windows 7 or 8. ___

posted image

2014-10-10 04:48:30 (0 comments, 0 reshares, 2 +1s)Open 

Android SMS worm Selfmite returns, more aggressive than ever  
#android #malware #sms  

A new version of an Android worm called Selfmite has the potential to ramp up huge SMS charges for victims in its attempt to spread to as many devices as possible. It sends text messages with rogue links to all contacts in a victim’s address book, and does this in a loop. Selfmite.b has hit victims throughout at least 16 different countries: Canada, China, Costa Rica, Ghana, India, Iraq, Jamaica, Mexico, Morocco, Puerto Rico, Russia, Sudan, Syria, USA, Venezuela and Vietnam.

Fortunately, the worm’s distribution system does not use exploits and relies only on social engineering—users would have to click on the spammed links and then manually install the downloaded APK in order for their devices to be infected. Furthermore, their devices would need to be configured to allow theinstalla... more »

Android SMS worm Selfmite returns, more aggressive than ever  
#android #malware #sms  

A new version of an Android worm called Selfmite has the potential to ramp up huge SMS charges for victims in its attempt to spread to as many devices as possible. It sends text messages with rogue links to all contacts in a victim’s address book, and does this in a loop. Selfmite.b has hit victims throughout at least 16 different countries: Canada, China, Costa Rica, Ghana, India, Iraq, Jamaica, Mexico, Morocco, Puerto Rico, Russia, Sudan, Syria, USA, Venezuela and Vietnam.

Fortunately, the worm’s distribution system does not use exploits and relies only on social engineering—users would have to click on the spammed links and then manually install the downloaded APK in order for their devices to be infected. Furthermore, their devices would need to be configured to allow the installation of apps from unknown sources—anything other than Google Play—which is not the default setting in Android. This further limits the attack’s success rate.___

posted image

2014-10-14 19:45:54 (0 comments, 0 reshares, 1 +1s)Open 

Fixes for IE, Flash Player in October Patch Tuesday Release  
#ie #flash #security  

Microsoft and Adobe issued their monthly patch Tuesday releases today, and Microsoft posted eight bulletins, three of which are considered critical including the now-monthly cumulative Internet Explorer update, addressing 24 vulnerabilities in various products. Adobe has fixes for three vulnerabilities in both its Flash Player and ColdFusion lines. The Microsoft patches resolve vulnerabilities in Windows, Internet Explorer, the .NET Framework, Developer Tools, Office, Office Services and Web Apps.

Adobe has issued security updates for Adobe Flash Player for Windows, Macintosh and Linux, which seal off holes that could potentially have given attackers the capacity to take control of the affected system.

Fixes for IE, Flash Player in October Patch Tuesday Release  
#ie #flash #security  

Microsoft and Adobe issued their monthly patch Tuesday releases today, and Microsoft posted eight bulletins, three of which are considered critical including the now-monthly cumulative Internet Explorer update, addressing 24 vulnerabilities in various products. Adobe has fixes for three vulnerabilities in both its Flash Player and ColdFusion lines. The Microsoft patches resolve vulnerabilities in Windows, Internet Explorer, the .NET Framework, Developer Tools, Office, Office Services and Web Apps.

Adobe has issued security updates for Adobe Flash Player for Windows, Macintosh and Linux, which seal off holes that could potentially have given attackers the capacity to take control of the affected system.___

posted image

2014-10-07 13:35:33 (0 comments, 0 reshares, 1 +1s)Open 

New Google+ Head David Besbris: We’re Here for the Long Haul  
#googleplus #gplus  

Google+ isn't dying anytime soon, says Google’s new head of social media David Besbris. The Google+ team has new offices on the east side of Google’s sprawling Mountain View, Calif. campus, and rumors that the team was dwindling are also not true. “We’re the largest we've ever been,” Besbris told Re/code in an exclusive interview. “We weren't booted to any part of campus, we chose to come over here.”

New Google+ Head David Besbris: We’re Here for the Long Haul  
#googleplus #gplus  

Google+ isn't dying anytime soon, says Google’s new head of social media David Besbris. The Google+ team has new offices on the east side of Google’s sprawling Mountain View, Calif. campus, and rumors that the team was dwindling are also not true. “We’re the largest we've ever been,” Besbris told Re/code in an exclusive interview. “We weren't booted to any part of campus, we chose to come over here.”___

posted image

2014-10-14 19:14:25 (0 comments, 0 reshares, 1 +1s)Open 

Sandworm APT Team Found Using Windows Zero Day Vulnerability  
#zeroday #windows #security  

A cyberespionage team believed to be based in Russia has been using a Windows zero day vulnerability to target a variety of organizations in several countries, including the United States, Poland, Ukraine and western Europe. The vulnerability, which will be patched today by Microsoft, is trivially exploitable and researchers say that the team behind the attacks has been using it since August to deliver the Black Energy Malware.

Researchers at iSIGHT said that the Malware steals sensitive documents, SSL keys and code-signing certificates, among other things. The Windows zero day affects all currently supported versions of Windows and researchers said that exploiting the bug is extremely simple. The exploit code can be loaded into any Office document and when it executes, them... more »

Sandworm APT Team Found Using Windows Zero Day Vulnerability  
#zeroday #windows #security  

A cyberespionage team believed to be based in Russia has been using a Windows zero day vulnerability to target a variety of organizations in several countries, including the United States, Poland, Ukraine and western Europe. The vulnerability, which will be patched today by Microsoft, is trivially exploitable and researchers say that the team behind the attacks has been using it since August to deliver the Black Energy Malware.

Researchers at iSIGHT said that the Malware steals sensitive documents, SSL keys and code-signing certificates, among other things. The Windows zero day affects all currently supported versions of Windows and researchers said that exploiting the bug is extremely simple. The exploit code can be loaded into any Office document and when it executes, the machine doesn't crash, so the user is likely unaware of the attack.___

posted image

2014-10-10 07:12:49 (0 comments, 0 reshares, 1 +1s)Open 

7 New Google Chrome Features You Should Know  
#chrome #devtools #features  

Besides its function as a great day-to-day Internet browser, Google Chrome is also a great tool for web development through the DevTools.  The DevTools are constantly updated with new versions so there might be a few features and DevTools that you may have missed out on along the way. Here are 7 of the newest Google Chrome features you should know about.

7 New Google Chrome Features You Should Know  
#chrome #devtools #features  

Besides its function as a great day-to-day Internet browser, Google Chrome is also a great tool for web development through the DevTools.  The DevTools are constantly updated with new versions so there might be a few features and DevTools that you may have missed out on along the way. Here are 7 of the newest Google Chrome features you should know about.___

posted image

2014-10-22 22:49:12 (0 comments, 1 reshares, 3 +1s)Open 

Android Koler worm spreads via SMS, holds phones for ransom  
#android #malware #koler  

A new variant of the Android Malware Koler now spreads by text message and holds infected users’ phones hostage until a ransom is paid. AdaptiveMobile detected the emergence of the worm on October 19th, and has blocked thousands of messages from hundreds of infected phones.

This new version of Koler works by sending an SMS message with a bitly link stating that an account with the user’s photos has been created. 

Android Koler worm spreads via SMS, holds phones for ransom  
#android #malware #koler  

A new variant of the Android Malware Koler now spreads by text message and holds infected users’ phones hostage until a ransom is paid. AdaptiveMobile detected the emergence of the worm on October 19th, and has blocked thousands of messages from hundreds of infected phones.

This new version of Koler works by sending an SMS message with a bitly link stating that an account with the user’s photos has been created. ___

posted image

2014-10-20 21:27:36 (0 comments, 0 reshares, 1 +1s)Open 

BitLicense would force Bitcoin services to spy on their customers. Help stop it  
#bitcoin #bitlicense #eff  

The State of New York is proposing a "BitLicense" for people creating and innovating around virtual currencies like Bitcoin. Even technology users just dabbling in Bitcoin could be affected. Virtual currencies like Bitcoin have the potential to be privacy-protective and censorship-resistant, but the proposal from New York could undermine all of that. Help us stop the BitLicense.

BitLicense would force Bitcoin services to spy on their customers. Help stop it  
#bitcoin #bitlicense #eff  

The State of New York is proposing a "BitLicense" for people creating and innovating around virtual currencies like Bitcoin. Even technology users just dabbling in Bitcoin could be affected. Virtual currencies like Bitcoin have the potential to be privacy-protective and censorship-resistant, but the proposal from New York could undermine all of that. Help us stop the BitLicense.___

posted image

2014-10-19 19:15:14 (0 comments, 0 reshares, 1 +1s)Open 

Secure Your Online Accounts By Removing Third-Party App Access  
#security #account #thirdparty  

You've probably given a few applications or websites access to your Google, Facebook, Twitter, Dropbox, or Microsoft account. Every application you've ever allowed keeps that access forever — or at least until you revoke it. In other words, there are probably quite a few other web services that have access to your personal data. You should regularly check your lists of connected services on the websites you use and remove services you no longer use.  

You should only give access to applications you trust and regularly use. If you don’t use a service or application anymore, you should remove its access just to be safe.

Secure Your Online Accounts By Removing Third-Party App Access  
#security #account #thirdparty  

You've probably given a few applications or websites access to your Google, Facebook, Twitter, Dropbox, or Microsoft account. Every application you've ever allowed keeps that access forever — or at least until you revoke it. In other words, there are probably quite a few other web services that have access to your personal data. You should regularly check your lists of connected services on the websites you use and remove services you no longer use.  

You should only give access to applications you trust and regularly use. If you don’t use a service or application anymore, you should remove its access just to be safe.___

posted image

2014-10-26 00:49:08 (4 comments, 1 reshares, 3 +1s)Open 

Google blocks its own URL shortening service goo.gl links  
#google #shorturl #fail  

Google Chrome is blocking Google’s own URL shortening service goo.gl links. These links are mostly generated by Google’s own Feed Burner service which then auto tweets the links to the linked Twitter account. 

The exact causes are not known but Google blocking its own link shortening service is nothing short of a irony. Techworm is waiting for a comment from Google to know whether this is a genuine blockade for Malware or some software glitch in its search algorithm. 

Google blocks its own URL shortening service goo.gl links  
#google #shorturl #fail  

Google Chrome is blocking Google’s own URL shortening service goo.gl links. These links are mostly generated by Google’s own Feed Burner service which then auto tweets the links to the linked Twitter account. 

The exact causes are not known but Google blocking its own link shortening service is nothing short of a irony. Techworm is waiting for a comment from Google to know whether this is a genuine blockade for Malware or some software glitch in its search algorithm. ___

posted image

2014-10-12 20:37:54 (0 comments, 1 reshares, 1 +1s)Open 

Rooftop Solar Panels Are Almost All Facing the Wrong Direction  
#solarpower #solarpanels #solar  

If you're thinking that solar panels face south to capture the most sunlight and thus the most energy, then you'd be absolutely correct. Yet, solar experts are saying that rooftop panels should be installed facing west. This surprising turn can be explained by quirks in our electrical grid. Demand for electricity peaks in the afternoon, especially in the summer when air conditioners are cranking away under the hot afternoon sun.

South-facing solar panels capture the most energy at morning and midday, when there's already ample electricity in the grid. If we just turned our solar panels 90 degrees to face west, their electricity production would match our electricity demand.

Rooftop Solar Panels Are Almost All Facing the Wrong Direction  
#solarpower #solarpanels #solar  

If you're thinking that solar panels face south to capture the most sunlight and thus the most energy, then you'd be absolutely correct. Yet, solar experts are saying that rooftop panels should be installed facing west. This surprising turn can be explained by quirks in our electrical grid. Demand for electricity peaks in the afternoon, especially in the summer when air conditioners are cranking away under the hot afternoon sun.

South-facing solar panels capture the most energy at morning and midday, when there's already ample electricity in the grid. If we just turned our solar panels 90 degrees to face west, their electricity production would match our electricity demand.___

posted image

2014-10-31 01:48:06 (0 comments, 0 reshares, 1 +1s)Open 

Samsung users could be locked out of their devices by attackers  
#samsung #security #findmymobile  

A zero-day flaw in Samsung's Find My Mobile system that can be extremely easily exploited to remotely lock a target's phone has been uncovered. The Remote Controls feature on Samsung mobile devices does not validate the source of lock-code data received over a network, which makes it easier for remote attackers to cause a denial of service (screen locking with an arbitrary code) by triggering unexpected Find My Mobile network traffic.

Samsung users could be locked out of their devices by attackers  
#samsung #security #findmymobile  

A zero-day flaw in Samsung's Find My Mobile system that can be extremely easily exploited to remotely lock a target's phone has been uncovered. The Remote Controls feature on Samsung mobile devices does not validate the source of lock-code data received over a network, which makes it easier for remote attackers to cause a denial of service (screen locking with an arbitrary code) by triggering unexpected Find My Mobile network traffic.___

posted image

2014-10-16 23:24:52 (0 comments, 0 reshares, 1 +1s)Open 

Poodle: introducing another web bug that makes browsing less safe  
#security #ssl3 #browser  

A new bug in the security software that underpins the web has been found by security researchers from Google. The vulnerability nicknamed “Poodle” is a hole in the design of the third version of the secure sockets layer (SSL), a technology which encrypts data sent between users and servers. Researchers say the flaw allows attackers to decrypt and steal the data.

Websites using SSL 3.0 will need to be updated to prevent exploitation of the bug. Most already use stronger, more modern security standards, but removing SSL 3.0 will render some older browsers and software including Internet Explorer 6 and Windows XP incompatible. Newer browsers, including later versions of Internet Explorer, Google Chrome, Firefox and Apple’s Safari will continue to work without SSL 3.0.

Poodle: introducing another web bug that makes browsing less safe  
#security #ssl3 #browser  

A new bug in the security software that underpins the web has been found by security researchers from Google. The vulnerability nicknamed “Poodle” is a hole in the design of the third version of the secure sockets layer (SSL), a technology which encrypts data sent between users and servers. Researchers say the flaw allows attackers to decrypt and steal the data.

Websites using SSL 3.0 will need to be updated to prevent exploitation of the bug. Most already use stronger, more modern security standards, but removing SSL 3.0 will render some older browsers and software including Internet Explorer 6 and Windows XP incompatible. Newer browsers, including later versions of Internet Explorer, Google Chrome, Firefox and Apple’s Safari will continue to work without SSL 3.0.___

posted image

2014-10-27 01:49:17 (0 comments, 0 reshares, 1 +1s)Open 

Recover data from a corrupt Windows drive with Linux  
#windows #datarecovery #linux  

Windows by default looks for certain things when reading a drive. The file structure is one and if it cannot find that, or it has become corrupt, then Windows will prompt you to format the drive. Linux on the other hand, tries to mount the drive and read the data regardless, which makes it an excellent tool for recovering data.

h/t +Alan Stainer 

Recover data from a corrupt Windows drive with Linux  
#windows #datarecovery #linux  

Windows by default looks for certain things when reading a drive. The file structure is one and if it cannot find that, or it has become corrupt, then Windows will prompt you to format the drive. Linux on the other hand, tries to mount the drive and read the data regardless, which makes it an excellent tool for recovering data.

h/t +Alan Stainer ___

posted image

2014-10-17 22:16:13 (1 comments, 1 reshares, 7 +1s)Open 

The FBI Is Dead Wrong: Apple’s Encryption Is Clearly in the Public Interest  
#encryption #apple #fbi  

Apple’s new encryption has prompted a breathtaking and erroneous scare campaign led by Federal Bureau of Investigation director James Comey. In a speech at the Brookings Institute this week, Comey went so far as to claim that Apple’s new system risks creating an environment in which the United States is “no longer a country governed by the rule of law.” This is absurd. The only actions that have undermined the rule of law are the government’s deceptive and secret mass surveillance programs.

Apple’s new operating system, iOS 8, makes two changes to the encryption of data on the device that dramatically increases the security of those data. First, it now encrypts and passcode protects virtually all data on the device—such as text messages, photos,contacts, and not... more »

The FBI Is Dead Wrong: Apple’s Encryption Is Clearly in the Public Interest  
#encryption #apple #fbi  

Apple’s new encryption has prompted a breathtaking and erroneous scare campaign led by Federal Bureau of Investigation director James Comey. In a speech at the Brookings Institute this week, Comey went so far as to claim that Apple’s new system risks creating an environment in which the United States is “no longer a country governed by the rule of law.” This is absurd. The only actions that have undermined the rule of law are the government’s deceptive and secret mass surveillance programs.

Apple’s new operating system, iOS 8, makes two changes to the encryption of data on the device that dramatically increases the security of those data. First, it now encrypts and passcode protects virtually all data on the device—such as text messages, photos, contacts, and notes—unlike previous versions of iOS. Secondly, and most importantly, it virtually eliminates the possibility that the encrypted data can be unlocked without the passcode.___

posted image

2014-10-11 03:45:15 (1 comments, 1 reshares, 3 +1s)Open 

Mobile advertisers use Malware tricks to get installs  
#malware #android #ios  

Deceptive advertising targeting Android users is an effective way of getting Malware installed. Now some advertisers are using it to get paid through pay-per-install schemes. We've written about advertisers misleading users with scary “you are infected” ad pop-ups in order to get installs of a certain security app and we also know Malware uses these tactics. Lately, we've been seeing more and more of this, but this time advertisers are using these banner and pop-up ads to get installs of more trustworthy apps like Dolphin browser.

Mobile advertisers use Malware tricks to get installs  
#malware #android #ios  

Deceptive advertising targeting Android users is an effective way of getting Malware installed. Now some advertisers are using it to get paid through pay-per-install schemes. We've written about advertisers misleading users with scary “you are infected” ad pop-ups in order to get installs of a certain security app and we also know Malware uses these tactics. Lately, we've been seeing more and more of this, but this time advertisers are using these banner and pop-up ads to get installs of more trustworthy apps like Dolphin browser.___

posted image

2014-10-09 17:34:47 (0 comments, 0 reshares, 3 +1s)Open 

Good news for students: Where to get a free college degree  
#college #degree #free  

All German universities are now free to Americans and all other international students. The last German state to charge tuition at its universities struck down the fees this week. There are international language programs in Germany, which have become very popular with international students before they tackle obtaining a degree in a different language.

An increasing number of German universities are offering degrees in English.

Note from Keith: For additional information on studying in Germany visit this web page https://goo.gl/smkHHL

Good news for students: Where to get a free college degree  
#college #degree #free  

All German universities are now free to Americans and all other international students. The last German state to charge tuition at its universities struck down the fees this week. There are international language programs in Germany, which have become very popular with international students before they tackle obtaining a degree in a different language.

An increasing number of German universities are offering degrees in English.

Note from Keith: For additional information on studying in Germany visit this web page https://goo.gl/smkHHL___

posted image

2014-10-25 12:21:56 (0 comments, 0 reshares, 2 +1s)Open 

tsū: Free social network and payment platform shares revenues with users  
#tsu #socialnetwork #revenuesharing   

tsu is ideal for content creators, influencers and those with a captive audience (charities, musicians, artists, photographers, writers, publishers, producers, YouTubers, managers, bloggers, businesses, athletes, team owners, enthusiasts, proud parents, etc.) who receive few royalties for their current online efforts. This is how users turn the status quo upside down and truly own their content. True ownership always includes ownership of the economics.

For a complete overview see this PDF: https://goo.gl/DEY0uX

Use the link below as an invite if you'd like a free account.

tsū: Free social network and payment platform shares revenues with users  
#tsu #socialnetwork #revenuesharing   

tsu is ideal for content creators, influencers and those with a captive audience (charities, musicians, artists, photographers, writers, publishers, producers, YouTubers, managers, bloggers, businesses, athletes, team owners, enthusiasts, proud parents, etc.) who receive few royalties for their current online efforts. This is how users turn the status quo upside down and truly own their content. True ownership always includes ownership of the economics.

For a complete overview see this PDF: https://goo.gl/DEY0uX

Use the link below as an invite if you'd like a free account.___

posted image

2014-10-24 22:58:32 (0 comments, 0 reshares, 1 +1s)Open 

Clueless FBI sabotages its own anti-encryption campaign  
#encryption #fbi #comey  

FBI Director James Comey continues to bang the drum about the evils of smartphone encryption and the harm it will do to U.S. law enforcement efforts. He seems of two minds -- and baffled by technology to boot. Comey called on Congress to update CALEA to require tech companies to build into their systems "lawful intercept capabilities" (don't call them backdoors). 

But in an interview with "60 Minutes" this month, Comey led off by saying, "I believe that Americans should be deeply skeptical of government power. You cannot trust people in power." 

Clueless FBI sabotages its own anti-encryption campaign  
#encryption #fbi #comey  

FBI Director James Comey continues to bang the drum about the evils of smartphone encryption and the harm it will do to U.S. law enforcement efforts. He seems of two minds -- and baffled by technology to boot. Comey called on Congress to update CALEA to require tech companies to build into their systems "lawful intercept capabilities" (don't call them backdoors). 

But in an interview with "60 Minutes" this month, Comey led off by saying, "I believe that Americans should be deeply skeptical of government power. You cannot trust people in power." ___

posted image

2014-10-18 00:50:12 (0 comments, 0 reshares, 2 +1s)Open 

Six browser plug-ins that protect your privacy  
#browser #privacy #security  

It's no stretch to say that ads are what make the Web go 'round. Paid for by ads. Driven by ads. This is not a new concept: TV and radio have relied on commercials since their earliest days. Because, let's face it, something has to pay for all the free programming and services. All you need is an ad blocker: a browser plug-in designed to filter out those unwanted distractions and interruptions. In this roundup I chose six products: AdBlock, Adblock Plus, Disconnect, DoNotTrackMe, Ghostery and Privacy Badger.

Six browser plug-ins that protect your privacy  
#browser #privacy #security  

It's no stretch to say that ads are what make the Web go 'round. Paid for by ads. Driven by ads. This is not a new concept: TV and radio have relied on commercials since their earliest days. Because, let's face it, something has to pay for all the free programming and services. All you need is an ad blocker: a browser plug-in designed to filter out those unwanted distractions and interruptions. In this roundup I chose six products: AdBlock, Adblock Plus, Disconnect, DoNotTrackMe, Ghostery and Privacy Badger.___

posted image

2014-10-12 20:05:29 (0 comments, 0 reshares, 1 +1s)Open 

See All The Newspaper Front Pages You Want, For Free  
#newspaper #frontpagenews #free  

Have you ever stood in a newsagent shop, browsed along the shelves to read all the front pages, realized that this is actually a great way to catch up on the important news, and then wondered whether those front pages are also available anywhere online?

For anyone who's a fan of newspapers, www.thepaperboy.com is a gem of a site. Take a few minutes to explore the various options and menus, to find the layout that works best for you.

See All The Newspaper Front Pages You Want, For Free  
#newspaper #frontpagenews #free  

Have you ever stood in a newsagent shop, browsed along the shelves to read all the front pages, realized that this is actually a great way to catch up on the important news, and then wondered whether those front pages are also available anywhere online?

For anyone who's a fan of newspapers, www.thepaperboy.com is a gem of a site. Take a few minutes to explore the various options and menus, to find the layout that works best for you.___

posted image

2014-10-08 15:06:19 (0 comments, 1 reshares, 1 +1s)Open 

Windows 10 Preview Tracks Everything You Do (And That's the Point)  
#windows10 #tracking #microsoft  

The privacy statement accompanying Windows 10 Preview reveals a couple of things that not everyone might expect to share, including voice recordings and the text users type. The Microsoft statement explains that, “Examples of data we collect include your name, email address, preferences and interests; browsing, search and file history; phone call and SMS data; device configuration and sensor data; and application usage.” 

It goes on to list that Microsoft may collect “voice information and use it for purposes such as improving speech processing,” via a speech-to-text feature that you might use; and that they may pool what you type on your keyboard “for purposes such as improving autocomplete and spellcheck features.”

Windows 10 Preview Tracks Everything You Do (And That's the Point)  
#windows10 #tracking #microsoft  

The privacy statement accompanying Windows 10 Preview reveals a couple of things that not everyone might expect to share, including voice recordings and the text users type. The Microsoft statement explains that, “Examples of data we collect include your name, email address, preferences and interests; browsing, search and file history; phone call and SMS data; device configuration and sensor data; and application usage.” 

It goes on to list that Microsoft may collect “voice information and use it for purposes such as improving speech processing,” via a speech-to-text feature that you might use; and that they may pool what you type on your keyboard “for purposes such as improving autocomplete and spellcheck features.”___

posted image

2014-10-09 19:36:26 (0 comments, 0 reshares, 2 +1s)Open 

[Bad]USB ‘Patch’ Skirts More Effective Options  
#badusb #security #patch  

Two researchers who released code that can be used to exploit a critical weakness in most USB drives followed that up Sunday with their version of a patch for the problem. The patch disables boot mode, the mechanism by which firmware updates are made to USB-based devices. They also recommend applying a bonding epoxy to thumb drives to prevents physical tampering.

[Bad]USB ‘Patch’ Skirts More Effective Options  
#badusb #security #patch  

Two researchers who released code that can be used to exploit a critical weakness in most USB drives followed that up Sunday with their version of a patch for the problem. The patch disables boot mode, the mechanism by which firmware updates are made to USB-based devices. They also recommend applying a bonding epoxy to thumb drives to prevents physical tampering.___

posted image

2014-10-07 12:52:35 (4 comments, 4 reshares, 8 +1s)Open 

Google has expanded carrier support for Google Voice MMS  
#googlevoice #mms #gvoice  

Quoting a Google spokesman: "When your sister texts you a picture of your newborn niece, it’s really important that you get it. For too long, however, Google Voice users would miss these messages for lack of MMS support. Google has been working with nearly 100 different North American carriers to enable this feature — including AT&T, Sprint, T-Mobile, Bell Canada, Rogers, Telus, and many more — and starting [Oct. 6, 2014] all these integrations are live. So enjoy those incoming pics, say goodbye to fomo (fear of missing out), and stay tuned for more Google Voice messaging improvements!"

Google has expanded carrier support for Google Voice MMS  
#googlevoice #mms #gvoice  

Quoting a Google spokesman: "When your sister texts you a picture of your newborn niece, it’s really important that you get it. For too long, however, Google Voice users would miss these messages for lack of MMS support. Google has been working with nearly 100 different North American carriers to enable this feature — including AT&T, Sprint, T-Mobile, Bell Canada, Rogers, Telus, and many more — and starting [Oct. 6, 2014] all these integrations are live. So enjoy those incoming pics, say goodbye to fomo (fear of missing out), and stay tuned for more Google Voice messaging improvements!"___

posted image

2014-10-21 00:23:04 (0 comments, 0 reshares, 2 +1s)Open 

Finally we have a great app for streaming videos from Google Drive  
#streaming #googledrive #chromecast  

If you have Chromecast and Google Drive this app should interest you.

Finally we have a great app for streaming videos from Google Drive!

I have tried a number of Chromecast apps that say they can cast videos stored at Google drive to your TV. The free app Drivecast is one of the first that I'd recommend as a daily use app for your video viewing needs. The interface for accessing Google Drive is easy and the video player allows you to start at any point in the video and change the volume with your Android. You can also view your videos on your Android.

This excellent app can be obtained here:
https://play.google.com/store/apps/details?id=com.exootlab.drivecast

For more great posts like the following:
http://bit.ly/ChromecastCentral___Finally we have a great app for streaming videos from Google Drive  
#streaming #googledrive #chromecast  

If you have Chromecast and Google Drive this app should interest you.

posted image

2014-10-25 21:10:31 (0 comments, 1 reshares, 2 +1s)Open 

NSA-Approved Samsung Knox Stores PIN in Cleartext  
#security #samsung #nsa  

An unnamed researcher on Thursday published a lengthy report that claims a PIN chosen by the user during setup of the Samsung Knox App is stored in clear text on the device. The report goes on to explain that the PIN can be used to retrieve a password hint. “So now it is pretty obvious that Samsung Knox is going to store your password somewhere on the device,” the report says, adding that in fact he found the encryption key in a container folder.

NSA-Approved Samsung Knox Stores PIN in Cleartext  
#security #samsung #nsa  

An unnamed researcher on Thursday published a lengthy report that claims a PIN chosen by the user during setup of the Samsung Knox App is stored in clear text on the device. The report goes on to explain that the PIN can be used to retrieve a password hint. “So now it is pretty obvious that Samsung Knox is going to store your password somewhere on the device,” the report says, adding that in fact he found the encryption key in a container folder.___

posted image

2014-10-08 00:06:52 (0 comments, 0 reshares, 2 +1s)Open 

Adobe Spyware Reveals (Again) the Price of DRM: Your Privacy and Security  
#spyware #adobe #ebook  

The publishing world may finally be facing its “rootkit scandal.” Two independent reports claim that Adobe’s e-book software, “Digital Editions,” logs every document readers add to their local “library,” tracks what happens with those files, and then sends those logs back to the mother-ship, over the Internet, in the clear. In other words, Adobe is not only tracking your reading habits, it’s making it really, really easy for others to do so as well. And it’s all being done in the name of copyright enforcement. After all, the great “promise” of Digital Editions is that it can help publishers “securely distribute” and manage access to books.  Libraries, for example, encourage their patrons to use the software, because it helps them comply with therestrictions publishers impo... more »

Adobe Spyware Reveals (Again) the Price of DRM: Your Privacy and Security  
#spyware #adobe #ebook  

The publishing world may finally be facing its “rootkit scandal.” Two independent reports claim that Adobe’s e-book software, “Digital Editions,” logs every document readers add to their local “library,” tracks what happens with those files, and then sends those logs back to the mother-ship, over the Internet, in the clear. In other words, Adobe is not only tracking your reading habits, it’s making it really, really easy for others to do so as well. And it’s all being done in the name of copyright enforcement. After all, the great “promise” of Digital Editions is that it can help publishers “securely distribute” and manage access to books.  Libraries, for example, encourage their patrons to use the software, because it helps them comply with the restrictions publishers impose on electronic lending.___

posted image

2014-10-26 22:35:29 (0 comments, 0 reshares, 2 +1s)Open 

Retailers are disabling NFC readers to shut out Apple Pay  
#applepay #nfc #retailers  

Retailers are disabling NFC readers to shut out Apple Pay. A significant number of merchants, including heavyweights like Walmart, Kmart, 7-Eleven, and Best Buy, are in outright competition with Apple Pay. The retailers, through a joint venture formed in 2012, are building their own mobile payment app, called CurrentC. It's expected to launch next year. In the meantime, these retailers have no intention to support Apple Pay. Not a single bank backs CurrentC. That's because the system is designed to cut out the middleman -- and credit card processing fees. 

Retailers are disabling NFC readers to shut out Apple Pay  
#applepay #nfc #retailers  

Retailers are disabling NFC readers to shut out Apple Pay. A significant number of merchants, including heavyweights like Walmart, Kmart, 7-Eleven, and Best Buy, are in outright competition with Apple Pay. The retailers, through a joint venture formed in 2012, are building their own mobile payment app, called CurrentC. It's expected to launch next year. In the meantime, these retailers have no intention to support Apple Pay. Not a single bank backs CurrentC. That's because the system is designed to cut out the middleman -- and credit card processing fees. ___

posted image

2014-10-28 12:03:58 (0 comments, 0 reshares, 1 +1s)Open 

Amazon takes direct aim at Chromecast with $39 Fire TV stick  
#firetvstick #amazon #streamingtv  

Amazon has opened pre-orders for the Fire TV Stick, selling it for $19 the next two days to Amazon Prime members. The dual-core processor in the Fire TV stick has six times the processing power of Roku Streaming Stick, and features a dedicated VideoCore4 GPU and 8 GB of storage, 4x that of Chromecast and 32x that of the Roku Streaming Stick, according to Amazon.

Notes from Keith: I just submitted a pre-order to take advantage of the discount. Amazon says it will be delivered on or about December 24. This link is direct to the product page. It is not an affiliate link. I do not profit in any way by posting this information.

Amazon takes direct aim at Chromecast with $39 Fire TV stick  
#firetvstick #amazon #streamingtv  

Amazon has opened pre-orders for the Fire TV Stick, selling it for $19 the next two days to Amazon Prime members. The dual-core processor in the Fire TV stick has six times the processing power of Roku Streaming Stick, and features a dedicated VideoCore4 GPU and 8 GB of storage, 4x that of Chromecast and 32x that of the Roku Streaming Stick, according to Amazon.

Notes from Keith: I just submitted a pre-order to take advantage of the discount. Amazon says it will be delivered on or about December 24. This link is direct to the product page. It is not an affiliate link. I do not profit in any way by posting this information.___

posted image

2014-10-09 15:35:32 (2 comments, 0 reshares, 2 +1s)Open 

8 Things You Should Consider Hiding on Your Computer  
#security #privacy  

Your computer knows an awful lot about you, and in a few clicks someone else can, too.  It's more important than ever to keep your digital life as hidden as possible. From password-protected files to folders with misleading names to encryption, there are plenty of methods out there to keep sensitive information tucked away. But besides the obvious sexy photos and porn stash, what other secret stuff should you hide from prying eyes? We've compiled a list of eight things you should consider hiding on your computer.

8 Things You Should Consider Hiding on Your Computer  
#security #privacy  

Your computer knows an awful lot about you, and in a few clicks someone else can, too.  It's more important than ever to keep your digital life as hidden as possible. From password-protected files to folders with misleading names to encryption, there are plenty of methods out there to keep sensitive information tucked away. But besides the obvious sexy photos and porn stash, what other secret stuff should you hide from prying eyes? We've compiled a list of eight things you should consider hiding on your computer.___

posted image

2014-10-22 23:01:26 (0 comments, 0 reshares, 1 +1s)Open 

Windows 0-day exploited in ongoing attacks, offers temporary workarounds  
#0day #windows #ole  

Microsoft is warning users about a new Windows zero-day vulnerability that is being actively exploited in the wild and is primarily a risk to users on servers and workstations that open documents with embedded OLE objects. The vulnerability is currently being exploited via PowerPoint files. These specially crafted files contain a malicious OLE (Object Linking and Embedding) object.

"User interaction is required to exploit this vulnerability," Microsoft explained in the security advisory. "In an email attack scenario, an attacker could exploit the vulnerability by sending a specially-crafted file to the user. For this attack scenario to be successful, the user must be convinced to open the specially crafted file containing the malicious OLE object. AllM... more »

Windows 0-day exploited in ongoing attacks, offers temporary workarounds  
#0day #windows #ole  

Microsoft is warning users about a new Windows zero-day vulnerability that is being actively exploited in the wild and is primarily a risk to users on servers and workstations that open documents with embedded OLE objects. The vulnerability is currently being exploited via PowerPoint files. These specially crafted files contain a malicious OLE (Object Linking and Embedding) object.

"User interaction is required to exploit this vulnerability," Microsoft explained in the security advisory. "In an email attack scenario, an attacker could exploit the vulnerability by sending a specially-crafted file to the user. For this attack scenario to be successful, the user must be convinced to open the specially crafted file containing the malicious OLE object. All Microsoft Office file types as well as many other third-party file types could contain a malicious OLE object."___

posted image

2014-10-31 23:34:57 (0 comments, 0 reshares, 1 +1s)Open 

Roku Now Has Google Play, Is Pretty Much Unstoppable  
#roku #googleplay #streamingvideo  

Google has given Roku players access to all your Google Play movie and TV goodies. The new addition also gives Roku users access to Google Play's Info cards, which will offer helpful little facts about whatever's on screen when you hit pause. Unfortunately Google Music All Access isn't part of the deal yet.

Roku Now Has Google Play, Is Pretty Much Unstoppable  
#roku #googleplay #streamingvideo  

Google has given Roku players access to all your Google Play movie and TV goodies. The new addition also gives Roku users access to Google Play's Info cards, which will offer helpful little facts about whatever's on screen when you hit pause. Unfortunately Google Music All Access isn't part of the deal yet.___

posted image

2014-10-13 21:06:14 (0 comments, 0 reshares, 1 +1s)Open 

Samsung's futuristic WiFi tech is 5 times faster than today's WiFi  
#wifi #samsung #speed  

Those face-meltingly fast new 802.11ac routers might not be king of the wireless networking world for long. On Sunday, Samsung announced it’s developing new 802.11ad WiFi technology that can turbocharge network speeds fivefold, from today’s 866Mbps per-device maximum to a blistering 4.6Gbps.

The secret sauce: Ditching the crowded 2.4GHz and 5GHz wireless channels used by today’s routers and jumping to the 60GHz frequency band.

Samsung's futuristic WiFi tech is 5 times faster than today's WiFi  
#wifi #samsung #speed  

Those face-meltingly fast new 802.11ac routers might not be king of the wireless networking world for long. On Sunday, Samsung announced it’s developing new 802.11ad WiFi technology that can turbocharge network speeds fivefold, from today’s 866Mbps per-device maximum to a blistering 4.6Gbps.

The secret sauce: Ditching the crowded 2.4GHz and 5GHz wireless channels used by today’s routers and jumping to the 60GHz frequency band.___

posted image

2014-10-28 23:35:16 (0 comments, 0 reshares, 2 +1s)Open 

Retailers in US Block Apple Pay, Which Also Blocks Google Wallet  
#googlewallet #nfc #fail  

Over the weekend, news broke that many retailers across the US were not supporting Apple Pay, shutting down their wireless payment terminals to anyone looking to use them. Unfortunately, and apparently unknown by many, this move by retailers does not just hurt Apple Pay users, but also effects Google Wallet users as well. 
 
We used to joke back when Google Wallet was still young that if Apple would hurry up and implement NFC technology, retailers would be more on board for supporting wireless payments. Thanks to Apple, retailers may have just effectively killed Google Wallet for many users across the country.

Retailers in US Block Apple Pay, Which Also Blocks Google Wallet  
#googlewallet #nfc #fail  

Over the weekend, news broke that many retailers across the US were not supporting Apple Pay, shutting down their wireless payment terminals to anyone looking to use them. Unfortunately, and apparently unknown by many, this move by retailers does not just hurt Apple Pay users, but also effects Google Wallet users as well. 
 
We used to joke back when Google Wallet was still young that if Apple would hurry up and implement NFC technology, retailers would be more on board for supporting wireless payments. Thanks to Apple, retailers may have just effectively killed Google Wallet for many users across the country.___

posted image

2014-10-26 22:27:36 (0 comments, 2 reshares, 1 +1s)Open 

Verizon Wireless tracking on its customers browsing habits  
#privacy #verizon #wireless  

According to research published by Jonathan Mayer, a computer scientist  and lawyer at Stanford, who takes consumer privacy very strongly, Verizon is using the headers in the HTTP section to track its customers and gauge their spending habits. Verizon Wireless is injecting a unique identifier (UID) into web requests, as data transits the network in each and every customer of Verizon Wireless Network (VZW).

Apparently Verizon is doing this in complete disregard to the federal laws as Verizon Wireless is injecting a UID into all HTTP requests made on the VZW network, regardless of whether or not the customer has opted out of their Customer Proprietary Network Information (CPNI) options.

Verizon Wireless tracking on its customers browsing habits  
#privacy #verizon #wireless  

According to research published by Jonathan Mayer, a computer scientist  and lawyer at Stanford, who takes consumer privacy very strongly, Verizon is using the headers in the HTTP section to track its customers and gauge their spending habits. Verizon Wireless is injecting a unique identifier (UID) into web requests, as data transits the network in each and every customer of Verizon Wireless Network (VZW).

Apparently Verizon is doing this in complete disregard to the federal laws as Verizon Wireless is injecting a UID into all HTTP requests made on the VZW network, regardless of whether or not the customer has opted out of their Customer Proprietary Network Information (CPNI) options.___

posted image

2014-10-19 18:14:35 (0 comments, 0 reshares, 1 +1s)Open 

Reduce Eye Strain When Using Smartphones and Tablets in the Dark  
#smartphone #eyestrain #tablet  

There’s a growing body of research that suggests “peering at brightly lit screens at night disrupts the body’s natural rhythms and raises the risk of medical conditions linked to poor sleep, including obesity, heart disease, strokes and depression.”

While it’s no secret that artificial light takes a toll on our circadian rhythms, recent publications suggest that LCDs might be even worse on your sleep patterns. Phone and tablet screens display light in a predominantly blue hue, and it’s now thought that the blue light emitted by these screens actually tricks our brain into waking up, when it really needs to fall asleep.

Reduce Eye Strain When Using Smartphones and Tablets in the Dark  
#smartphone #eyestrain #tablet  

There’s a growing body of research that suggests “peering at brightly lit screens at night disrupts the body’s natural rhythms and raises the risk of medical conditions linked to poor sleep, including obesity, heart disease, strokes and depression.”

While it’s no secret that artificial light takes a toll on our circadian rhythms, recent publications suggest that LCDs might be even worse on your sleep patterns. Phone and tablet screens display light in a predominantly blue hue, and it’s now thought that the blue light emitted by these screens actually tricks our brain into waking up, when it really needs to fall asleep.___

posted image

2014-10-09 16:45:25 (0 comments, 0 reshares, 6 +1s)Open 

Phishing attacks with data: URIs  
#phishing #uri #security  

A recent spate of phishing attacks has taken to using the data URI scheme for evil. Supported in most browsers, these special URIs allow the content of a phishing page to be contained entirely within the URI itself, effectively eliminating the need to host the page on a remote web server and adding an additional layer of indirection.  One of these attacks is demonstrated below, where a phishing campaign was used to herd victims to a compromised site in the US, which then redirected them to a Base64-encoded data URI. This particular example impersonates Google Docs in an attempt to steal email addresses and passwords from Yahoo, Gmail, Hotmail, and AOL customers.

Note from Keith: The Netcraft Extension for Firefox, Chrome and Opera provides protection against the redirects used in the phishing attacksabo... more »

Phishing attacks with data: URIs  
#phishing #uri #security  

A recent spate of phishing attacks has taken to using the data URI scheme for evil. Supported in most browsers, these special URIs allow the content of a phishing page to be contained entirely within the URI itself, effectively eliminating the need to host the page on a remote web server and adding an additional layer of indirection.  One of these attacks is demonstrated below, where a phishing campaign was used to herd victims to a compromised site in the US, which then redirected them to a Base64-encoded data URI. This particular example impersonates Google Docs in an attempt to steal email addresses and passwords from Yahoo, Gmail, Hotmail, and AOL customers.

Note from Keith: The Netcraft Extension for Firefox, Chrome and Opera provides protection against the redirects used in the phishing attacks above. http://toolbar.netcraft.com/___

posted image

2014-10-09 16:36:26 (0 comments, 0 reshares, 1 +1s)Open 

Apple’s Four-Digit Passcodes Still Weak Link in iOS8 Encryption, Researcher Says  
#ios8 #security #encryption  

The new encryption system adopted in iOS 8 concerned US law enforcement because Apple would lack access to the encrypted user data, though it can still be vulnerable in some circumstances. “Users with any Simple Passcode have no security against a serious attacker who’s able to start guessing with the help of the device’s cryptographic coprocessor,” Joseph Bonneau said. The researcher’s theory is applicable if and only if the attacker can bypass the “secure boot” sequence.

Apple’s Four-Digit Passcodes Still Weak Link in iOS8 Encryption, Researcher Says  
#ios8 #security #encryption  

The new encryption system adopted in iOS 8 concerned US law enforcement because Apple would lack access to the encrypted user data, though it can still be vulnerable in some circumstances. “Users with any Simple Passcode have no security against a serious attacker who’s able to start guessing with the help of the device’s cryptographic coprocessor,” Joseph Bonneau said. The researcher’s theory is applicable if and only if the attacker can bypass the “secure boot” sequence.___

posted image

2014-10-23 00:24:18 (0 comments, 1 reshares, 2 +1s)Open 

Students' Open Access Button App Finds Free Access to Scientific and Scholarly Research  
#openaccess #education #research  

Two university students, David Carroll and Joseph McArthur, were finally fed up with being denied access to online journals and articles that were necessary to continue their studies—so they decided to take matters into their own hands. The result was Open Access Button, a browser-based tool that records users’ collisions with paywalls and aids them in finding freely accessible copies of those research articles. 
 
If a user hits a paywall to an article or paper, the tool will automatically notify its author on the user's behalf to let them know that someone has been blocked from accessing their work, and ask them to submit a link to a freely accessible version. If the author responds with a link, the app will not only provide thatlink to... more »

Students' Open Access Button App Finds Free Access to Scientific and Scholarly Research  
#openaccess #education #research  

Two university students, David Carroll and Joseph McArthur, were finally fed up with being denied access to online journals and articles that were necessary to continue their studies—so they decided to take matters into their own hands. The result was Open Access Button, a browser-based tool that records users’ collisions with paywalls and aids them in finding freely accessible copies of those research articles. 
 
If a user hits a paywall to an article or paper, the tool will automatically notify its author on the user's behalf to let them know that someone has been blocked from accessing their work, and ask them to submit a link to a freely accessible version. If the author responds with a link, the app will not only provide that link to the original user but will also display the alternative link to anyone who tried to views the research in the future. In practice, this could incentivize authors to deposit their work into open research repositories. ___

posted image

2014-10-28 02:47:02 (2 comments, 0 reshares, 1 +1s)Open 

Microsoft just stuck a dagger into Google Drive and Dropbox  
#onedrive #googledrive #dropbox  

The cloud storage wars have finally reached their inevitable climax — Microsoft announced on Monday that all Office 365 subscribers are now eligible to receive unlimited storage on OneDrive for no additional cost. The rollout for Office 365 Home, Personal and University customers begins today and will continue over the coming months. If you want to jump to the front of the line, be sure to visit the OneDrive landing page and click ‘Get on the list.’

Microsoft just stuck a dagger into Google Drive and Dropbox  
#onedrive #googledrive #dropbox  

The cloud storage wars have finally reached their inevitable climax — Microsoft announced on Monday that all Office 365 subscribers are now eligible to receive unlimited storage on OneDrive for no additional cost. The rollout for Office 365 Home, Personal and University customers begins today and will continue over the coming months. If you want to jump to the front of the line, be sure to visit the OneDrive landing page and click ‘Get on the list.’___

posted image

2014-10-28 01:01:10 (0 comments, 0 reshares, 1 +1s)Open 

Warning: New Online Ebola Alert Tool is Anything But  
#malware #ebola #security  

Web threats banking on hot topics like Ebola are effective lures against users. Recently, we found ebolawarnings(dot)com, a domain claiming to offer an early warning system tool that can alert the user of any Ebola outbreaks near their area. Upon initial visit to the page, users are presented with a prompt to download Malware.

Warning: New Online Ebola Alert Tool is Anything But  
#malware #ebola #security  

Web threats banking on hot topics like Ebola are effective lures against users. Recently, we found ebolawarnings(dot)com, a domain claiming to offer an early warning system tool that can alert the user of any Ebola outbreaks near their area. Upon initial visit to the page, users are presented with a prompt to download Malware.___

posted image

2014-10-13 23:40:08 (3 comments, 0 reshares, 2 +1s)Open 

Edward Snowden’s Privacy Tips: "Get Rid Of Dropbox," Avoid Facebook And Google  
#privacy #snowden #nsa  

According to Edward Snowden, people who care about their privacy should stay away from popular consumer Internet services like Dropbox, Facebook, and Google. Snowden conducted a remote interview today as part of the New Yorker Festival, where he was asked a couple of variants on the question of what we can do to protect our privacy.

His first answer called for a reform of government policies. Some people take the position that they “don’t have anything to hide,” but he argued that when you say that, “You’re inverting the model of responsibility for how rights work”. He added that on an individual level, people should seek out encrypted tools and stop using services that are "hostile to privacy."

Edward Snowden’s Privacy Tips: "Get Rid Of Dropbox," Avoid Facebook And Google  
#privacy #snowden #nsa  

According to Edward Snowden, people who care about their privacy should stay away from popular consumer Internet services like Dropbox, Facebook, and Google. Snowden conducted a remote interview today as part of the New Yorker Festival, where he was asked a couple of variants on the question of what we can do to protect our privacy.

His first answer called for a reform of government policies. Some people take the position that they “don’t have anything to hide,” but he argued that when you say that, “You’re inverting the model of responsibility for how rights work”. He added that on an individual level, people should seek out encrypted tools and stop using services that are "hostile to privacy."___

posted image

2014-10-29 00:01:12 (0 comments, 0 reshares, 2 +1s)Open 

Lollipop, with kevlar wrapping: New security features in Android 5.0  
#android #security #lollipop  

When it comes to security, Lollipop is the biggest update for Android to date. From the moment you turn on a device running Android 5.0, you’ll have a wealth of new security features protecting you, like encryption by default and a lock screen that’s easier and more powerful than ever.

With Android 5.0, SELinux Enforcing mode is required for all applications on all devices. There are a number of other features that were added to the platform to keep your devices secure.

Lollipop, with kevlar wrapping: New security features in Android 5.0  
#android #security #lollipop  

When it comes to security, Lollipop is the biggest update for Android to date. From the moment you turn on a device running Android 5.0, you’ll have a wealth of new security features protecting you, like encryption by default and a lock screen that’s easier and more powerful than ever.

With Android 5.0, SELinux Enforcing mode is required for all applications on all devices. There are a number of other features that were added to the platform to keep your devices secure.___

posted image

2014-10-28 02:35:40 (0 comments, 0 reshares, 1 +1s)Open 

Tsu: The Social Network That Pays You to Friend  
#tsu #socialnetworking  

While Facebook and Twitter have been criticized for failing to share their profits with those who post on their platforms, Tsu pledges to do just that: It will give 90 percent of its ad revenue back to users. Tsu’s philosophy is that all content creators, which is basically every social user, should receive royalties for the commercial use of their image, likeness and work.

Note from Keith: Here is an invite, in case you are interested; http://tsu.co/w8sdz

Tsu: The Social Network That Pays You to Friend  
#tsu #socialnetworking  

While Facebook and Twitter have been criticized for failing to share their profits with those who post on their platforms, Tsu pledges to do just that: It will give 90 percent of its ad revenue back to users. Tsu’s philosophy is that all content creators, which is basically every social user, should receive royalties for the commercial use of their image, likeness and work.

Note from Keith: Here is an invite, in case you are interested; http://tsu.co/w8sdz___

posted image

2014-10-07 13:15:31 (0 comments, 0 reshares, 1 +1s)Open 

Windows 10 is 'Windows for the masses'  
#windows10 #preview  

I came to the Windows 10 Technical Preview with a heavy heart and low hopes. I'm convinced that the purpose of this Technical Preview is to convince all those Windows 7 enterprise users that Windows 10 puts behind it all that Windows 8 nonsense. Mission accomplished. Windows 10 proves that Microsoft is brave enough to admit that the Windows 8 experiment was a failure and that it's now time to get back to the serious business of building a platform that people want, not one that they are told they need.

Windows 10 is 'Windows for the masses'  
#windows10 #preview  

I came to the Windows 10 Technical Preview with a heavy heart and low hopes. I'm convinced that the purpose of this Technical Preview is to convince all those Windows 7 enterprise users that Windows 10 puts behind it all that Windows 8 nonsense. Mission accomplished. Windows 10 proves that Microsoft is brave enough to admit that the Windows 8 experiment was a failure and that it's now time to get back to the serious business of building a platform that people want, not one that they are told they need.___

posted image

2014-10-14 09:59:33 (0 comments, 0 reshares, 1 +1s)Open 

Learning a second programming language? Try these 5 sites  
#programming #language #education  

Developers trying to jump from one language to another often hit the same wall: How do I do this? They can do it in their base language, but introduce them to a strange new world, and the going gets rough.

Programmers in this sticky position often benefit from seeing how the same concepts, designs, and algorithms can be implemented in parallel across multiple languages. Here are five sites that feature examples of how the most popular languages -- and a few you might not know -- tackle the same commands so very differently.

Learning a second programming language? Try these 5 sites  
#programming #language #education  

Developers trying to jump from one language to another often hit the same wall: How do I do this? They can do it in their base language, but introduce them to a strange new world, and the going gets rough.

Programmers in this sticky position often benefit from seeing how the same concepts, designs, and algorithms can be implemented in parallel across multiple languages. Here are five sites that feature examples of how the most popular languages -- and a few you might not know -- tackle the same commands so very differently.___

posted image

2014-10-19 20:02:58 (0 comments, 0 reshares, 1 +1s)Open 

31 Security Tips for a Safe Online October  
#security #internet #safety  

October is National Cyber Security Awareness Month, all the more reason to remind yourself to stay safe online. To start off, we've compiled a list of 31 handy security tips you should follow this month and every day of your digital life. You probably know some of them by heart, but it doesn't hurt to add them to your digital routine.  

31 Security Tips for a Safe Online October  
#security #internet #safety  

October is National Cyber Security Awareness Month, all the more reason to remind yourself to stay safe online. To start off, we've compiled a list of 31 handy security tips you should follow this month and every day of your digital life. You probably know some of them by heart, but it doesn't hurt to add them to your digital routine.  ___

posted image

2014-10-09 19:48:32 (4 comments, 2 reshares, 5 +1s)Open 

Google Fixes 159 Flaws in Chrome  
#chrome #security #update  

Google updates its Chrome browser on a very aggressive timeline, often a couple of times a month. Usually, each update includes a handful of security fixes, maybe 12 or 15. On Tuesday, the company released Chrome 38, which patched a staggering 159 vulnerabilities. The huge majority of those patches–113 of them–fix minor vulnerabilities in the browser, but Google also fixed several high-risk flaws and one critical bug that earned the researcher who reported it a reward of more than $27,000.

Google Fixes 159 Flaws in Chrome  
#chrome #security #update  

Google updates its Chrome browser on a very aggressive timeline, often a couple of times a month. Usually, each update includes a handful of security fixes, maybe 12 or 15. On Tuesday, the company released Chrome 38, which patched a staggering 159 vulnerabilities. The huge majority of those patches–113 of them–fix minor vulnerabilities in the browser, but Google also fixed several high-risk flaws and one critical bug that earned the researcher who reported it a reward of more than $27,000.___

posted image

2014-10-14 20:19:44 (0 comments, 0 reshares, 3 +1s)Open 

New Features In Firefox 33 For Desktop And Android  
#firefox #android #desktop  

Firefox 33 is out for both Desktop and Android. Users will want to upgrade for the improved search functions and the more reliable session restore feature. Firefox for Android has a new option to delete data when you quit the app and the ability to stream video content to Chromecast and Roku.

New Features In Firefox 33 For Desktop And Android  
#firefox #android #desktop  

Firefox 33 is out for both Desktop and Android. Users will want to upgrade for the improved search functions and the more reliable session restore feature. Firefox for Android has a new option to delete data when you quit the app and the ability to stream video content to Chromecast and Roku.___

posted image

2014-10-11 17:11:59 (0 comments, 0 reshares, 0 +1s)Open 

EFF Launches New Anti-Surveillance Site  
#eff #surveillance #encryption  

The EFF has launched a new site dedicated to educating users about how to resist pervasive surveillance online, through the promotion of encryption and other tools and the publication of first-person stories from people around the world who have fought surveillance in various ways.

The new site, I Fight Surveillance, is designed to bring attention to the problem of surveillance, what it involves and how to fight it. The site gives users advice on what kind of steps they can take to resist online surveillance, including the use of encryption and the Tor network.

EFF Launches New Anti-Surveillance Site  
#eff #surveillance #encryption  

The EFF has launched a new site dedicated to educating users about how to resist pervasive surveillance online, through the promotion of encryption and other tools and the publication of first-person stories from people around the world who have fought surveillance in various ways.

The new site, I Fight Surveillance, is designed to bring attention to the problem of surveillance, what it involves and how to fight it. The site gives users advice on what kind of steps they can take to resist online surveillance, including the use of encryption and the Tor network.___

Buttons

A special service of CircleCount.com is the following button.

The button shows the number of followers you have directly in a small button. You can add this button to your website, like the +1-Button of Google or the Like-Button of Facebook.






You can add this button directly in your website. For more information about the CircleCount Buttons and the description how to add them to another page click here.

Keith Petersen (w8sdz)TwitterFacebookLinkedInCircloscope