Test CircleCount PRO now!
Login now

Not your profile? Login and get free access to your reports and analysis.

Keith Petersen (w8sdz)

Keith Petersen (w8sdz) Verified in Google 

Computer Consultant, Amateur Radio w8sdz, Retired TV Engineer

Occupation: Computer Consultant. Retired TV Engineer. Former Manager of the SimTel Software Archive. Amateur Radio w8sdz. (Computer Consultant, TV Engineer, Software Archivist, Amateur Radio w8sdz)

Location: Port Orange, FL

Followers: 2,586

Following: -

Views: 711,295

Added to CircleCount.com: 01/05/2012That's the date, where Keith Petersen (w8sdz) has been indexed by CircleCount.com.
This hasn't to be the date where the daily check has been started.
(Update nowYou can update your stats by clicking on this link!
This can take a few seconds.
)

Tags

Sign in

The following tags have been added by users of CircleCount.com.
You can login on CircleCount to add more tags here.

  • Amateur Radio
  • Information Technology
  • Linux
  • Technology
  • VoIP

Are you missing a tag in the list of available tags? You can suggest new tags here.

Login now

Do you want to see a more detailed chart? Check your settings and define your favorite chart type.

Or click here to get the detailed chart only once.

Shared Circles including Keith Petersen (w8sdz)

Shared Circles are not available on Google+ anymore, but you can find them still here.

The Google+ Collections of Keith Petersen (w8sdz)

New!
Login and checkout your own profile to see the average response per collection.
Or check out how it looks like on the profile page of +CircleCount.

Looks like this is your profile but we haven't loaded your posts yet to show you here the average numbers per collection.
Just open your dashboard and let the server work for you.

115231870248397182742 has no public Google+ Collections yet.

Activity

Average numbers for the latest posts (max. 50 posts, posted within the last 4 weeks)

0
comments per post
0
reshares per post
2
+1's per post

651
characters per posting

Top posts in the last 50 posts

Most comments: 3

posted image

2016-07-15 01:33:51 (3 comments; 0 reshares; 2 +1s; )Open 

Google Deletes Dennis Cooper's Blog, Erasing Years of Artistic Output
#google #policies #nowarning

On June 27, when writer Dennis Cooper tried to access his blog—hosted by Blogger since 2002—he discovered that Google had deleted his fourteen-year project along with his Gmail account.

He may have lost years of artistic output that included writings, research, and photographs, as well as a platform through which he engaged almost daily with a community of followers and fellow artists.

Most reshares: 4

posted image

2016-05-27 23:52:13 (0 comments; 4 reshares; 3 +1s; )Open 

Researcher warns of 'pastejacking' hack attacks targeting users' clipboards
#security #clipboard #vulnerability

Some web browsers now allow developers to add content to a user's clipboard under certain circumstances. Attackers can theoretically exploit this ability to trick users into running commands they otherwise wouldn't want entered on their computers, in order to gain remote code execution.

Most plusones: 6

posted image

2016-06-21 07:59:41 (0 comments; 0 reshares; 6 +1s; )Open 

When everything else fails, Amateur Radio will still be there—and thriving
#hamradio #emergency #communication

When everything else fails (power, comms, roads), Ham Radio is still there. These days it can even be a full-fat digital medium.

Latest 50 posts

posted image

2016-07-26 20:37:08 (0 comments; 1 reshares; 2 +1s; )Open 

US government agency calls for the end of SMS authentication
#sms #authentication #security

The National Institute of Standards and Technology (NIST) states that "[out of band authentication] using SMS is deprecated, and will no longer be allowed in future releases of their guidance. NIST's guidelines aren't legally binding, but other government agencies stick by them, and the industry at large will follow.

US government agency calls for the end of SMS authentication
#sms #authentication #security

The National Institute of Standards and Technology (NIST) states that "[out of band authentication] using SMS is deprecated, and will no longer be allowed in future releases of their guidance. NIST's guidelines aren't legally binding, but other government agencies stick by them, and the industry at large will follow.___

posted image

2016-07-22 15:04:10 (1 comments; 0 reshares; 2 +1s; )Open 

Windows 10 - How to Upgrade from Windows 7 or 8 & Keep Data [Tutorial]
#windows10 #upgrade #tutorial

Learn how to upgrade Windows 8 or Windows 7 to Windows 10 using Microsoft’s Windows 10 Software Download Tool. Watch this free video tutorial with complete instructions for everyone from the absolute beginner to the more advanced computer user. Closed captioning is optionally provided.

Windows 10 - How to Upgrade from Windows 7 or 8 & Keep Data [Tutorial]
#windows10 #upgrade #tutorial

Learn how to upgrade Windows 8 or Windows 7 to Windows 10 using Microsoft’s Windows 10 Software Download Tool. Watch this free video tutorial with complete instructions for everyone from the absolute beginner to the more advanced computer user. Closed captioning is optionally provided.___

posted image

2016-07-22 13:44:45 (0 comments; 0 reshares; 1 +1s; )Open 

[WATCH] Free Training Videos for Windows 10
#windows10 #tutorial #training

Video tutorials can be a big help for people new to Windows 10, or any other software. There are many amateur Win 10 how-to videos online, but unfortunately, most of them are awful. Bob Rankin found some that are excellent, and free. If you're having trouble getting acclimated to your new operating system, or you just want to see what's new and different in Windows 10, read on...

[WATCH] Free Training Videos for Windows 10
#windows10 #tutorial #training

Video tutorials can be a big help for people new to Windows 10, or any other software. There are many amateur Win 10 how-to videos online, but unfortunately, most of them are awful. Bob Rankin found some that are excellent, and free. If you're having trouble getting acclimated to your new operating system, or you just want to see what's new and different in Windows 10, read on...___

posted image

2016-07-21 14:51:12 (0 comments; 0 reshares; 1 +1s; )Open 

Firefox will start blocking Flash content next month
#firefox #flash #security

It's another nail in the coffin for Flash. Mozilla will start intelligently auto-pausing Flash next month before going to even more extreme lengths in 2017.

Firefox will start blocking Flash content next month
#firefox #flash #security

It's another nail in the coffin for Flash. Mozilla will start intelligently auto-pausing Flash next month before going to even more extreme lengths in 2017.___

posted image

2016-07-18 07:06:06 (0 comments; 0 reshares; 2 +1s; )Open 

If You Don’t Upgrade to Windows 10, This Will Happen
#windows10 #upgrade

If you’ve decided that you don’t want to upgrade to Windows 10, no matter what, you can ignore the warnings from Microsoft and stay on your current operating system (OS). But what happens if you do that? Let’s take a quick look at what will happen to the various flavors of Windows after the end of July.

If You Don’t Upgrade to Windows 10, This Will Happen
#windows10 #upgrade

If you’ve decided that you don’t want to upgrade to Windows 10, no matter what, you can ignore the warnings from Microsoft and stay on your current operating system (OS). But what happens if you do that? Let’s take a quick look at what will happen to the various flavors of Windows after the end of July.___

posted image

2016-07-16 20:02:52 (0 comments; 1 reshares; 2 +1s; )Open 

How to Upgrade from Linux Mint 17.3 to Linux Mint 18
#linux #mint #upgrade

Upgrading from a completely different Ubuntu-base to another requires a special advanced instruction set. In this how-to guide, we shall walk through the recommended steps you will have to follow to upgrade from Linux Mint 17.3 to Linux Mint 18.

How to Upgrade from Linux Mint 17.3 to Linux Mint 18
#linux #mint #upgrade

Upgrading from a completely different Ubuntu-base to another requires a special advanced instruction set. In this how-to guide, we shall walk through the recommended steps you will have to follow to upgrade from Linux Mint 17.3 to Linux Mint 18.___

posted image

2016-07-15 01:33:51 (3 comments; 0 reshares; 2 +1s; )Open 

Google Deletes Dennis Cooper's Blog, Erasing Years of Artistic Output
#google #policies #nowarning

On June 27, when writer Dennis Cooper tried to access his blog—hosted by Blogger since 2002—he discovered that Google had deleted his fourteen-year project along with his Gmail account.

He may have lost years of artistic output that included writings, research, and photographs, as well as a platform through which he engaged almost daily with a community of followers and fellow artists.

Google Deletes Dennis Cooper's Blog, Erasing Years of Artistic Output
#google #policies #nowarning

On June 27, when writer Dennis Cooper tried to access his blog—hosted by Blogger since 2002—he discovered that Google had deleted his fourteen-year project along with his Gmail account.

He may have lost years of artistic output that included writings, research, and photographs, as well as a platform through which he engaged almost daily with a community of followers and fellow artists.___

posted image

2016-07-14 13:50:54 (0 comments; 1 reshares; 2 +1s; )Open 

20-year-old Windows bug lets printers install malware—patch now
#security #malware #printer

After more than two decades, Microsoft finally addressed a vulnerability in the Windows Print Spooler, which manages the process of connecting to available printers and printing documents. A protocol known as Point-and-Print allows people who are connecting to a network-hosted printer for the first time to automatically download the necessary driver immediately before using it.

20-year-old Windows bug lets printers install malware—patch now
#security #malware #printer

After more than two decades, Microsoft finally addressed a vulnerability in the Windows Print Spooler, which manages the process of connecting to available printers and printing documents. A protocol known as Point-and-Print allows people who are connecting to a network-hosted printer for the first time to automatically download the necessary driver immediately before using it.___

posted image

2016-07-09 06:16:39 (0 comments; 0 reshares; 2 +1s; )Open 

Google Chrome with native Cast integration
#chrome #chromecast #googlechrome

Google implemented a new feature in Chrome 51 that introduces a Cast option to the right-click menu and main menu of the browser.

Google Chrome with native Cast integration
#chrome #chromecast #googlechrome

Google implemented a new feature in Chrome 51 that introduces a Cast option to the right-click menu and main menu of the browser.___

posted image

2016-07-06 21:34:37 (0 comments; 0 reshares; 1 +1s; )Open 

6 top tips & tools for blocking spam
#spam #block #tips

Spam: The gift that keeps on giving...
Here are some of the best ways to block it:

6 top tips & tools for blocking spam
#spam #block #tips

Spam: The gift that keeps on giving...
Here are some of the best ways to block it:___

posted image

2016-07-02 03:21:48 (0 comments; 0 reshares; 2 +1s; )Open 

Google Chrome Scroll Anchoring
#chrome #scroll #anchor

You may have experienced this situation when using a browser like Google Chrome: you load a page and some text is loaded quickly. You begin to read the text and scroll a bit or a lot, and suddenly the page begins to scroll automatically as other elements, images or media, are added to the page. Scroll Anchoring has been designed to prevent these visible jumps from happening in Chrome.

Google Chrome Scroll Anchoring
#chrome #scroll #anchor

You may have experienced this situation when using a browser like Google Chrome: you load a page and some text is loaded quickly. You begin to read the text and scroll a bit or a lot, and suddenly the page begins to scroll automatically as other elements, images or media, are added to the page. Scroll Anchoring has been designed to prevent these visible jumps from happening in Chrome.___

posted image

2016-06-29 22:19:50 (0 comments; 0 reshares; 1 +1s; )Open 

High-severity bugs in 25 Symantec/Norton products imperil millions
#symantec #norton #vulnerability

Much of the product line from security firm Symantec contains a raft of vulnerabilities that expose millions of consumers, small businesses, and large organizations to self-replicating attacks that take complete control of their computers, a researcher warned Tuesday. "These vulnerabilities are as bad as it gets," Tavis Ormandy said.

High-severity bugs in 25 Symantec/Norton products imperil millions
#symantec #norton #vulnerability

Much of the product line from security firm Symantec contains a raft of vulnerabilities that expose millions of consumers, small businesses, and large organizations to self-replicating attacks that take complete control of their computers, a researcher warned Tuesday. "These vulnerabilities are as bad as it gets," Tavis Ormandy said.___

posted image

2016-06-27 16:11:57 (1 comments; 2 reshares; 2 +1s; )Open 

How to See If Your VPN Is Leaking Your IP Address (and How to Stop It)
#vpn #security #privacy  

VPNs are great for security, but one of the big reasons many people use one is to mask or change their IP address. This lets you get around location-based restrictions on content, or check if your provider is throttling your connection. Unfortunately, a security flaw can reveal your real IP address to prying eyes, even if you're using a VPN, and it's easy to exploit. Here's how it works, and what you can do about it.

How to See If Your VPN Is Leaking Your IP Address (and How to Stop It)
#vpn #security #privacy  

VPNs are great for security, but one of the big reasons many people use one is to mask or change their IP address. This lets you get around location-based restrictions on content, or check if your provider is throttling your connection. Unfortunately, a security flaw can reveal your real IP address to prying eyes, even if you're using a VPN, and it's easy to exploit. Here's how it works, and what you can do about it.___

posted image

2016-06-21 07:59:41 (0 comments; 0 reshares; 6 +1s; )Open 

When everything else fails, Amateur Radio will still be there—and thriving
#hamradio #emergency #communication

When everything else fails (power, comms, roads), Ham Radio is still there. These days it can even be a full-fat digital medium.

When everything else fails, Amateur Radio will still be there—and thriving
#hamradio #emergency #communication

When everything else fails (power, comms, roads), Ham Radio is still there. These days it can even be a full-fat digital medium.___

posted image

2016-06-20 16:16:29 (0 comments; 1 reshares; 3 +1s; )Open 

Typography nerds will love Google’s revamped site for Web fonts
#typography #fonts #google

For years, Google has offered a cache of excellent fonts for use on websites, apps like Docs and for your desktop tools. Now, the site has been completely overhauled with a beautiful interface that makes it easy to find the right typeface for your next design project.

Typography nerds will love Google’s revamped site for Web fonts
#typography #fonts #google

For years, Google has offered a cache of excellent fonts for use on websites, apps like Docs and for your desktop tools. Now, the site has been completely overhauled with a beautiful interface that makes it easy to find the right typeface for your next design project.___

posted image

2016-06-20 15:55:30 (0 comments; 0 reshares; 2 +1s; )Open 

GoToMyPC hit with hack attack; users need to reset passwords
#gotomypc #security #hack

If you use Citrix’s GoToMyPC remote desktop access service, you need to change your password. According to a post published to GoToMyPC’s system status page, the service experienced a hack attack this weekend, and it’s now requiring all users to reset their passwords before logging in to the service.

GoToMyPC hit with hack attack; users need to reset passwords
#gotomypc #security #hack

If you use Citrix’s GoToMyPC remote desktop access service, you need to change your password. According to a post published to GoToMyPC’s system status page, the service experienced a hack attack this weekend, and it’s now requiring all users to reset their passwords before logging in to the service.___

posted image

2016-06-20 15:46:56 (0 comments; 0 reshares; 1 +1s; )Open 

Massive Acer security breach exposes highly sensitive data of 34,500 online shoppers
#acer #security #breach #privacy

If you bought something from Acer over the past year, hackers may have your name, address, and credit card number—including its expiration date and three-digit CVC security code. Warn your pals.

Massive Acer security breach exposes highly sensitive data of 34,500 online shoppers
#acer #security #breach #privacy

If you bought something from Acer over the past year, hackers may have your name, address, and credit card number—including its expiration date and three-digit CVC security code. Warn your pals.___

posted image

2016-06-18 21:48:53 (0 comments; 0 reshares; 1 +1s; )Open 

Linux Mint vs Ubuntu: Which Distro Should You Choose?
#linux #ubuntu #mint

Linux Mint and Ubuntu are both known as two of the most newbie-friendly distros around. Ubuntu is the most popular — so much so that Linux Mint is based on it. But there are real differences between the two. Which one is right for you?

Linux Mint vs Ubuntu: Which Distro Should You Choose?
#linux #ubuntu #mint

Linux Mint and Ubuntu are both known as two of the most newbie-friendly distros around. Ubuntu is the most popular — so much so that Linux Mint is based on it. But there are real differences between the two. Which one is right for you?___

posted image

2016-06-18 10:36:40 (0 comments; 0 reshares; 2 +1s; )Open 

60+ iOS 10 Hidden / Secret Features For iPhone And iPad [List]
#ios10 #features #apple

Excited about iOS 10? Did you know that the latest version of Apple’s mobile platform packs over 60 new hidden / secret features that Apple made no fuss about at the WWDC? It’s often the features that aren’t mentioned during the keynote that have the most appeal, and iOS 10 has a ton of them it seems.

60+ iOS 10 Hidden / Secret Features For iPhone And iPad [List]
#ios10 #features #apple

Excited about iOS 10? Did you know that the latest version of Apple’s mobile platform packs over 60 new hidden / secret features that Apple made no fuss about at the WWDC? It’s often the features that aren’t mentioned during the keynote that have the most appeal, and iOS 10 has a ton of them it seems.___

posted image

2016-06-13 13:15:56 (1 comments; 0 reshares; 1 +1s; )Open 

VPN Speed Test: How To Find The Fastest VPN Service For Your Region
#vpn #speed #test

If you have ever been in the market for a VPN service, then you will know how difficult it can be to find just the right one. VPNify allows visitors of its website to select a potential VPN service provider and then run speed tests to get a good idea of what upload and download speeds they can expect to see on their connection and in their area should they become a user of that particular service.

VPN Speed Test: How To Find The Fastest VPN Service For Your Region
#vpn #speed #test

If you have ever been in the market for a VPN service, then you will know how difficult it can be to find just the right one. VPNify allows visitors of its website to select a potential VPN service provider and then run speed tests to get a good idea of what upload and download speeds they can expect to see on their connection and in their area should they become a user of that particular service.___

posted image

2016-06-13 13:08:49 (0 comments; 0 reshares; 1 +1s; )Open 

Netgear Routers Plagued by Serious Vulnerabilities
#netgear #router #vulnerability

Netgear released firmware updates last week for its D3600 and D6000 Wi-Fi modem routers to address a couple of serious vulnerabilities reported to the company in December 2015. The flaws affect D3600 and D6000 routers running version 1.0.0.49 or earlier of the firmware. CERT noted that other models may be impacted as well.

Netgear Routers Plagued by Serious Vulnerabilities
#netgear #router #vulnerability

Netgear released firmware updates last week for its D3600 and D6000 Wi-Fi modem routers to address a couple of serious vulnerabilities reported to the company in December 2015. The flaws affect D3600 and D6000 routers running version 1.0.0.49 or earlier of the firmware. CERT noted that other models may be impacted as well.___

posted image

2016-06-12 22:48:53 (0 comments; 0 reshares; 2 +1s; )Open 

How a boobytrapped PDF file could exploit your Chrome Browser – and it’s not Adobe’s fault!
#chrome #pdf #vulnerability

This week it has been revealed that PDFium, Chrome’s default PDF reader, contained an exploitable vulnerability (known as CVE-2016-1681) that could have resulted in malicious code being run on innocent users’ systems. Google patched its code when it released Chrome 51.0.2704.63 on May 25th, and has issued updates of other security issues since.

How a boobytrapped PDF file could exploit your Chrome Browser – and it’s not Adobe’s fault!
#chrome #pdf #vulnerability

This week it has been revealed that PDFium, Chrome’s default PDF reader, contained an exploitable vulnerability (known as CVE-2016-1681) that could have resulted in malicious code being run on innocent users’ systems. Google patched its code when it released Chrome 51.0.2704.63 on May 25th, and has issued updates of other security issues since.___

posted image

2016-06-08 23:50:22 (0 comments; 0 reshares; 1 +1s; )Open 

Google’s Project Fi cell service adds US Cellular to the mix
#projectfi #google #cellphone

Today Google announced that it is adding a third network, US Cellular, to its Project Fi cellular service. US Cellular is the fifth-largest carrier in the US, and Google says the company's LTE service in "23 states, both urban and rural" will be merged into the network.

Google’s Project Fi cell service adds US Cellular to the mix
#projectfi #google #cellphone

Today Google announced that it is adding a third network, US Cellular, to its Project Fi cellular service. US Cellular is the fifth-largest carrier in the US, and Google says the company's LTE service in "23 states, both urban and rural" will be merged into the network.___

posted image

2016-06-02 12:58:08 (0 comments; 0 reshares; 2 +1s; )Open 

How to Boost Your Wi-Fi Speed Up to 5x With One Quick Fix
#wifi #speed #performance

If multiple WiFi signals use the same channel, they can interfere with each other. This causes data to be lost so the waves have to be retransmitted, which is why your speed drops. If you live near other routers — such as in an apartment building — then there’s a good chance your slow Wi-Fi speeds are due to channel interference. That’s why you should download and run a Wi-Fi Analyzer.

How to Boost Your Wi-Fi Speed Up to 5x With One Quick Fix
#wifi #speed #performance

If multiple WiFi signals use the same channel, they can interfere with each other. This causes data to be lost so the waves have to be retransmitted, which is why your speed drops. If you live near other routers — such as in an apartment building — then there’s a good chance your slow Wi-Fi speeds are due to channel interference. That’s why you should download and run a Wi-Fi Analyzer.___

posted image

2016-05-28 00:56:25 (0 comments; 0 reshares; 2 +1s; )Open 

Microsoft sheds light on Windows 10 update policy
#windows10 #update #policy

Microsoft plans to release single cumulative updates each month, and so-called feature updates twice a year. These cumulative updates are already used by the company. They supersede the previous month's update, and contain only security, reliability or bug fixes according to Microsoft. Feature updates on the other hand, with the next major one called the Anniversary Update out in July 2016, ship with new features and capabilities but are released less frequently.

Microsoft sheds light on Windows 10 update policy
#windows10 #update #policy

Microsoft plans to release single cumulative updates each month, and so-called feature updates twice a year. These cumulative updates are already used by the company. They supersede the previous month's update, and contain only security, reliability or bug fixes according to Microsoft. Feature updates on the other hand, with the next major one called the Anniversary Update out in July 2016, ship with new features and capabilities but are released less frequently.___

posted image

2016-05-27 23:52:13 (0 comments; 4 reshares; 3 +1s; )Open 

Researcher warns of 'pastejacking' hack attacks targeting users' clipboards
#security #clipboard #vulnerability

Some web browsers now allow developers to add content to a user's clipboard under certain circumstances. Attackers can theoretically exploit this ability to trick users into running commands they otherwise wouldn't want entered on their computers, in order to gain remote code execution.

Researcher warns of 'pastejacking' hack attacks targeting users' clipboards
#security #clipboard #vulnerability

Some web browsers now allow developers to add content to a user's clipboard under certain circumstances. Attackers can theoretically exploit this ability to trick users into running commands they otherwise wouldn't want entered on their computers, in order to gain remote code execution.___

posted image

2016-05-25 02:00:16 (0 comments; 0 reshares; 1 +1s; )Open 

Windows hardware specs going up for the first time since 2009
#windows10 #hardware #compatibility

The Windows 10 Anniversary Update (referred to in documentation as version 1607, so it ought to ship in July) with the first meaningful change in the Windows system requirements in almost a decade. The RAM requirement is going up, with 2GB the new floor for 32-bit installations. The new specs also change the acceptable screen sizes for Windows 10.

Windows hardware specs going up for the first time since 2009
#windows10 #hardware #compatibility

The Windows 10 Anniversary Update (referred to in documentation as version 1607, so it ought to ship in July) with the first meaningful change in the Windows system requirements in almost a decade. The RAM requirement is going up, with 2GB the new floor for 32-bit installations. The new specs also change the acceptable screen sizes for Windows 10.___

posted image

2016-05-23 23:29:32 (0 comments; 0 reshares; 1 +1s; )Open 

4 LastPass Settings You Must Change to Be More Secure
#lastpass #security #settings

LastPass is one of the best password managers around. While the company urges you to make your master password (the one that unlocks your account and gives access to all your other passwords) secure, there are other default settings in LastPass you should change to make your account even safer.

4 LastPass Settings You Must Change to Be More Secure
#lastpass #security #settings

LastPass is one of the best password managers around. While the company urges you to make your master password (the one that unlocks your account and gives access to all your other passwords) secure, there are other default settings in LastPass you should change to make your account even safer.___

posted image

2016-05-23 07:32:16 (0 comments; 0 reshares; 1 +1s; )Open 

Never10 Prevents Windows 7 and 8.1 from Automatically Upgrading to Windows 10
#windows10 #upgrade #disable

Never 10 is an easy to use free utility which gives users control over whether their Windows 7 or 8.1 will upgrade itself to Windows 10. It does not install ANY software of its own. It simply and quickly performs the required system editing for its user. For more, see the "Additional Technical Information" link near the bottom of the page.

Never10 Prevents Windows 7 and 8.1 from Automatically Upgrading to Windows 10
#windows10 #upgrade #disable

Never 10 is an easy to use free utility which gives users control over whether their Windows 7 or 8.1 will upgrade itself to Windows 10. It does not install ANY software of its own. It simply and quickly performs the required system editing for its user. For more, see the "Additional Technical Information" link near the bottom of the page.___

posted image

2016-05-23 07:06:53 (0 comments; 0 reshares; 1 +1s; )Open 

How Microsoft's tricky new Windows 10 pop-up deceives you into upgrading
#wimdows10 #upgrade #fail

The annoying “Get Windows 10” pop-up began using deceiving malware-like tactics months ago, but it recently received an overhaul that seems purposefully designed to confuse users who have been wearily slogging through the nagging for half a year now. The Get Windows 10 (GWX) pop-up now treats exiting the window as consent for the Windows 10 upgrade.

How Microsoft's tricky new Windows 10 pop-up deceives you into upgrading
#wimdows10 #upgrade #fail

The annoying “Get Windows 10” pop-up began using deceiving malware-like tactics months ago, but it recently received an overhaul that seems purposefully designed to confuse users who have been wearily slogging through the nagging for half a year now. The Get Windows 10 (GWX) pop-up now treats exiting the window as consent for the Windows 10 upgrade.___

posted image

2016-05-21 20:39:26 (0 comments; 0 reshares; 1 +1s; )Open 

Why Windows 10 Upgrades Go Wrong, and How to Avoid It
#windows10 #upgrade #tips

The New York Times has received emails every week from readers about upgrade headaches. Some say that the software system rendered their machines inoperable, while others say it broke compatibility with apps or devices they rely on. To help overcome upgrade issues, Microsoft and tech experts offered tips on diagnosing and treating Windows 10 problems.

Why Windows 10 Upgrades Go Wrong, and How to Avoid It
#windows10 #upgrade #tips

The New York Times has received emails every week from readers about upgrade headaches. Some say that the software system rendered their machines inoperable, while others say it broke compatibility with apps or devices they rely on. To help overcome upgrade issues, Microsoft and tech experts offered tips on diagnosing and treating Windows 10 problems.___

posted image

2016-05-15 01:07:30 (0 comments; 0 reshares; 1 +1s; )Open 

How to stop hackers from stealing your information on public Wi-Fi
#wifi #security #privacy

All of us enjoy “free internet” through WiFi hotspots libraries, coffee shops, at bars, and other public places. Hackers can access just about anything you are doing on a public WiFi. To fight them, you need to know how they can steal your data.

How to stop hackers from stealing your information on public Wi-Fi
#wifi #security #privacy

All of us enjoy “free internet” through WiFi hotspots libraries, coffee shops, at bars, and other public places. Hackers can access just about anything you are doing on a public WiFi. To fight them, you need to know how they can steal your data.___

posted image

2016-05-14 04:19:17 (0 comments; 0 reshares; 1 +1s; )Open 

How To Disable Your WiFi Network When An Ethernet Cable Is Connected [Windows]
#windows #ethernet #wifi #disable

When connecting to a WiFi network, Windows always favors the strongest one available. An Ethernet cable connection is almost always going to be better and Windows will favor it over WiFI connections in most cases. However, if your system refuses to favor the Ethernet connection over your WiFi network you can tell Windows to disable the connection altogether when it detects an Ethernet connection. Here’s how.

How To Disable Your WiFi Network When An Ethernet Cable Is Connected [Windows]
#windows #ethernet #wifi #disable

When connecting to a WiFi network, Windows always favors the strongest one available. An Ethernet cable connection is almost always going to be better and Windows will favor it over WiFI connections in most cases. However, if your system refuses to favor the Ethernet connection over your WiFi network you can tell Windows to disable the connection altogether when it detects an Ethernet connection. Here’s how.___

posted image

2016-05-14 00:20:47 (0 comments; 0 reshares; 3 +1s; )Open 

How Chromecast Works
#chromecast #googlecast

Chromecast is an enlarged thumb drive-sized dongle that plugs into a modern television set's HDMI port and allows you to stream (or rather cast) media from your existing computer or mobile device through your home WiFi network and onto your TV screen. Read on to find out what makes this tiny but powerful device tick.

How Chromecast Works
#chromecast #googlecast

Chromecast is an enlarged thumb drive-sized dongle that plugs into a modern television set's HDMI port and allows you to stream (or rather cast) media from your existing computer or mobile device through your home WiFi network and onto your TV screen. Read on to find out what makes this tiny but powerful device tick.___

posted image

2016-05-13 17:35:33 (0 comments; 0 reshares; 1 +1s; )Open 

Tumblr Accounts Must Reset Passwords
#security #tumblr #password

Yahoo has forced a password reset on Tumblr account holders after it discovered that someone had accessed email addresses, and salted and hashed passwords from early 2013.

Tumblr Accounts Must Reset Passwords
#security #tumblr #password

Yahoo has forced a password reset on Tumblr account holders after it discovered that someone had accessed email addresses, and salted and hashed passwords from early 2013.___

posted image

2016-05-13 13:39:51 (0 comments; 0 reshares; 1 +1s; )Open 

Anti-virus products, security devices affected by 7-Zip flaws
#security #7zip #vulnerability

Cisco’s Talos researchers discovered two vulnerabilities in 7-Zip, the popular open-source file archiver known for having a high compression ratio and option to password protect compressed files. Users are urged to update their vulnerable versions of 7-Zip to the latest revision, version 16.00, as soon as possible.

Anti-virus products, security devices affected by 7-Zip flaws
#security #7zip #vulnerability

Cisco’s Talos researchers discovered two vulnerabilities in 7-Zip, the popular open-source file archiver known for having a high compression ratio and option to password protect compressed files. Users are urged to update their vulnerable versions of 7-Zip to the latest revision, version 16.00, as soon as possible.___

posted image

2016-05-12 22:16:12 (0 comments; 0 reshares; 1 +1s; )Open 

Adobe releases Flash update to fix critical security flaws
#adobe #flash #security

Adobe has patched a serious security vulnerability in Flash, which the company said hackers are actively exploiting. The flaw affects Windows, Macs, Linux and Chrome operating systems. A successful exploitation could cause a crash and potentially allow an attacker to take control of the affected system. Almost two-dozen other vulnerabilities were patched as part of the update.

Adobe releases Flash update to fix critical security flaws
#adobe #flash #security

Adobe has patched a serious security vulnerability in Flash, which the company said hackers are actively exploiting. The flaw affects Windows, Macs, Linux and Chrome operating systems. A successful exploitation could cause a crash and potentially allow an attacker to take control of the affected system. Almost two-dozen other vulnerabilities were patched as part of the update.___

posted image

2016-05-12 11:53:23 (0 comments; 0 reshares; 1 +1s; )Open 

Research before subscribing to a VPN
#vpn #comparison #research

Thinking about subscribing to a VPN service? Get answers to the following questions first before you do so to make sure it is the right one for you. There are big differences between VPN services, from price and availability to privacy and traffic.

Research before subscribing to a VPN
#vpn #comparison #research

Thinking about subscribing to a VPN service? Get answers to the following questions first before you do so to make sure it is the right one for you. There are big differences between VPN services, from price and availability to privacy and traffic.___

posted image

2016-05-09 21:48:17 (0 comments; 3 reshares; 6 +1s; )Open 

Which VPNs Still Work With Netflix?
#netflix #vpn #blacklisting

Netflix is getting serious in its crackdown against location pirates. In simple terms, it is blacklisting the most popular way to circumvent geographical restrictions on what content you can watch. Netflix hasn’t gotten around to blocking every VPN yet. We tested a large bunch of VPNs and found two free services that are still working, as well as two paid services.

Which VPNs Still Work With Netflix?
#netflix #vpn #blacklisting

Netflix is getting serious in its crackdown against location pirates. In simple terms, it is blacklisting the most popular way to circumvent geographical restrictions on what content you can watch. Netflix hasn’t gotten around to blocking every VPN yet. We tested a large bunch of VPNs and found two free services that are still working, as well as two paid services.___

posted image

2016-05-09 15:41:42 (0 comments; 1 reshares; 3 +1s; )Open 

20 fixes for a Windows 10 update meltdown
#windows10 #update #problems

If you’re having problems with Windows 10’s forced updates, you’re not alone. This isn’t meant to be an exhaustive list of problems and solutions. Instead, it tackles the most common problems, offering the most common solutions.

20 fixes for a Windows 10 update meltdown
#windows10 #update #problems

If you’re having problems with Windows 10’s forced updates, you’re not alone. This isn’t meant to be an exhaustive list of problems and solutions. Instead, it tackles the most common problems, offering the most common solutions.___

posted image

2016-05-09 14:24:18 (0 comments; 0 reshares; 1 +1s; )Open 

How to stop auto playing videos
#video #autoplay #browser

Many sites throughout the Internet play videos automatically when you visit them. The following guide provides you with information on how to stop the auto playing of videos in desktop and mobile web browsers.

How to stop auto playing videos
#video #autoplay #browser

Many sites throughout the Internet play videos automatically when you visit them. The following guide provides you with information on how to stop the auto playing of videos in desktop and mobile web browsers.___

posted image

2016-05-09 13:31:19 (0 comments; 0 reshares; 2 +1s; )Open 

Google Won’t Build a Desktop Music Player, So These Guys Did
#googleplaymusic #player #desktop  

"Searching through my numerous Crome tabs just to choose a new song seemed over-complicated to me, so a dedicated desktop client made logical sense,” says the creator of Google Play Music Desktop Player. This client for Windows, OS X, and Linux provides a standalone Google Play Music experience that liberates your albums from Chrome and offers far more granular control the experience.

Google Won’t Build a Desktop Music Player, So These Guys Did
#googleplaymusic #player #desktop  

"Searching through my numerous Crome tabs just to choose a new song seemed over-complicated to me, so a dedicated desktop client made logical sense,” says the creator of Google Play Music Desktop Player. This client for Windows, OS X, and Linux provides a standalone Google Play Music experience that liberates your albums from Chrome and offers far more granular control the experience.___

posted image

2016-05-06 17:56:07 (0 comments; 0 reshares; 1 +1s; )Open 

How to upgrade to Windows 10 for free (while you still can)
#windows10 #upgrade #howto

Microsoft's free Windows 10 upgrade offer officially expires on July 29, 2016. After July 29, upgrading will cost you $119, £100 or AU$180. So if you're running Windows 7, Windows 8 or Windows 8.1 on a laptop, desktop or tablet computer, the time to act is now.

How to upgrade to Windows 10 for free (while you still can)
#windows10 #upgrade #howto

Microsoft's free Windows 10 upgrade offer officially expires on July 29, 2016. After July 29, upgrading will cost you $119, £100 or AU$180. So if you're running Windows 7, Windows 8 or Windows 8.1 on a laptop, desktop or tablet computer, the time to act is now.___

posted image

2016-04-23 04:30:53 (0 comments; 0 reshares; 1 +1s; )Open 

Petya ransomware cracked: Get password to decrypt hard drive for free
#petya #ransomware #encryption

Victims of Petya ransomware have experienced a lock screen warning that their hard drive was encrypted with a military grade encryption algorithm and the only way to unlock it was to cough up the bitcoins to purchase a decryption key. That’s no longer true as the encryption has been defeated and a password generator has been developed so victims can decrypt their hard drives for free.

Petya ransomware cracked: Get password to decrypt hard drive for free
#petya #ransomware #encryption

Victims of Petya ransomware have experienced a lock screen warning that their hard drive was encrypted with a military grade encryption algorithm and the only way to unlock it was to cough up the bitcoins to purchase a decryption key. That’s no longer true as the encryption has been defeated and a password generator has been developed so victims can decrypt their hard drives for free.___

posted image

2016-04-23 04:21:05 (0 comments; 0 reshares; 1 +1s; )Open 

When Windows 10 breaks, don't just blame Microsoft
#windows10 #microsoft #trouble

It might seem easy to simply blame Microsoft for every flaw and failing in our Windows update experience, but if we want our machines to function properly, it's important to dig deeper. The root cause of the problem may well be some old software from a third party vendor.

When Windows 10 breaks, don't just blame Microsoft
#windows10 #microsoft #trouble

It might seem easy to simply blame Microsoft for every flaw and failing in our Windows update experience, but if we want our machines to function properly, it's important to dig deeper. The root cause of the problem may well be some old software from a third party vendor.___

posted image

2016-04-20 20:49:41 (1 comments; 0 reshares; 3 +1s; )Open 

700 Million People Just Got Encryption That Congress Can’t Touch
#encryption #viber #messenger

Viber, a messaging app with 711 million+ users, has just introduced end-to-end encryption for all messages and calls on its platform, including group chats, and a way to ‘hide’ chats on your account alongside its existing expanded deleting function. It will not be subject to US laws written by lawmakers desperate to regulate technology they do not understand.

700 Million People Just Got Encryption That Congress Can’t Touch
#encryption #viber #messenger

Viber, a messaging app with 711 million+ users, has just introduced end-to-end encryption for all messages and calls on its platform, including group chats, and a way to ‘hide’ chats on your account alongside its existing expanded deleting function. It will not be subject to US laws written by lawmakers desperate to regulate technology they do not understand.___

posted image

2016-04-19 00:33:00 (0 comments; 0 reshares; 1 +1s; )Open 

How to deal with the rising threat of ransomware
#ransomware #vulnerability #security

Behavior-based detection mechanisms are now playing a key role in detecting and preventing ransomware-based attacks., While there may be many ransomware variants in the wild, they all share a common set of traits that can be detected during execution.

How to deal with the rising threat of ransomware
#ransomware #vulnerability #security

Behavior-based detection mechanisms are now playing a key role in detecting and preventing ransomware-based attacks., While there may be many ransomware variants in the wild, they all share a common set of traits that can be detected during execution.___

posted image

2016-04-17 21:37:57 (0 comments; 0 reshares; 1 +1s; )Open 

A software fix for dangerous USB-C cables is coming
#usb #usbc #cables

The USB Implementers Forum (USB-IF), which certifies cables as safe, is announcing a new way to ensure that your devices are protected from rogue cables.

The "USB Type-C Authentication specification" is a set of software rules that a device can enforce on anything you plug into it. The new protocol will allow "host systems [to] confirm the authenticity of a USB device or USB charger, including such product aspects as the descriptors/capabilities and certification status."

A software fix for dangerous USB-C cables is coming
#usb #usbc #cables

The USB Implementers Forum (USB-IF), which certifies cables as safe, is announcing a new way to ensure that your devices are protected from rogue cables.

The "USB Type-C Authentication specification" is a set of software rules that a device can enforce on anything you plug into it. The new protocol will allow "host systems [to] confirm the authenticity of a USB device or USB charger, including such product aspects as the descriptors/capabilities and certification status."___

posted image

2016-04-16 20:22:24 (1 comments; 2 reshares; 2 +1s; )Open 

Senate anti-encryption bill is itself a threat to national security
#encryption #security #privacy

The Burr-Feinstein bill aims to put the needs of law enforcement over the risk of hackers, by punching a hole in Silicon Valley's encryption effort. The bill would force companies to install a backdoor, or use weak encryption, making the data readable and useful to law enforcement who seek access to it.

The unwavering view of the security and cryptography community is that if there's a backdoor for law enforcement, hackers will find it and would take everything they can, leading to incalculable damage.

Senate anti-encryption bill is itself a threat to national security
#encryption #security #privacy

The Burr-Feinstein bill aims to put the needs of law enforcement over the risk of hackers, by punching a hole in Silicon Valley's encryption effort. The bill would force companies to install a backdoor, or use weak encryption, making the data readable and useful to law enforcement who seek access to it.

The unwavering view of the security and cryptography community is that if there's a backdoor for law enforcement, hackers will find it and would take everything they can, leading to incalculable damage.___

posted image

2016-04-15 06:23:55 (0 comments; 0 reshares; 1 +1s; )Open 

Google’s Calendar Now Finds Spare Time and Fills It Up
#google #calendar  

Google is introducing new features to its popular calendar that will enable people to program in their aspirations for times when they don’t have work or meetings scheduled. Google’s algorithms will then seek appropriate gaps in a schedule in which stuff like exercise or discussing life with one’s spouse might be appropriate.

Google’s Calendar Now Finds Spare Time and Fills It Up
#google #calendar  

Google is introducing new features to its popular calendar that will enable people to program in their aspirations for times when they don’t have work or meetings scheduled. Google’s algorithms will then seek appropriate gaps in a schedule in which stuff like exercise or discussing life with one’s spouse might be appropriate.___

Buttons

A special service of CircleCount.com is the following button.

The button shows the number of followers you have directly on a small button. You can add this button to your website, like the +1-Button of Google or the Like-Button of Facebook.






You can add this button directly in your website. For more information about the CircleCount Buttons and the description how to add them to another page click here.

Keith Petersen (w8sdz)TwitterFacebookLinkedInCircloscope