Sponsors

Sunday, September 7, 2014

New Intel Core M processor will supercharge future tablets

Intel's senior VP and GM of individualized computing, Kirk Skaugen, has propelled its up and coming era of processors, instituted the Core M.

The new processor extent will concentrate on three portable fragments (convertibles, ultra portables, tablets), conveying what Intel says, is the most vitality effective processor in the organization's history at 4.5w.

Interestingly, the vast majority of the shows amid the keynote were alluding to portable computer, convertibles and tablets with consoles, with few tablets on their own.

The Core M uses a 14nm assembling process and offers half more CPU execution and additionally 40% speedier illustrations execution contrasted with a year ago's Core i5-4302y.

Different preferences incorporate essentially lower power utilization and thusly control scattering; that deciphers into a fan-less configuration — which decreases the size and weight of the gadgets and enhances unwavering quality — and in addition much better battery life.

Setting the smart phone free finally

The Core M stage will likewise incorporate backing for fantastic sound, Wi-Di 5.0, second era 802.11ac with remote docking Wigig coming in the (close) future.

Intel anticipates that makers will turn out with tablet items short of what 9mm thin; that about the thickness of the Apple ipad 2. More than 20 OEM items focused around the Core M processor are relied upon to hit the racks in the nick of time for Christmas.

One of the highlights of the keynote was the Llama Mountain reference gadget that is a 7.2mm tablet that is just 670 grams, on account of a motherboard bundle a large portion of the size.

Three Skus will be accessible at dispatch: The Intel Core M-5y10, the 5y10a, both timed at up to 2ghz and the M-5y70, timed at up to 2.6ghz; the recent likewise backs vpro, making it a decent fit for business clients.

Intel additionally affirmed that it will furnish with a $280 programming group for Smes called Small Business Program Partners Software Bundle for chose it.

Tuesday, August 20, 2013

Deleting carbonite.log file

Are you using a online backup service like Carbonite? If not you should be, for $55 a year for unlimited backup you can not go wrong. But if you are using Carbonite you might find you are losing space on your hard drive in this directory "ProgramData\Carbonite\Carbonite Backup", caused by this file, carbonite.log. We currently have a log file on one of our workstations that is reaching 110GB! Guess what, this file is as described, it is a log file, stop the Carbonite service, delete the file, restart your workstation and Carbonite will create a new log file in its place that will be much smaller than the previous file.



The only downfall to doing this from our research is that if for some reason you are having issues with the Carbonite service they may request access to this file to find out what is causing your problems.

Sunday, August 18, 2013

Danger On Facebook With Geo Tagged Photos

We have seen many posts here over the past few weeks about infosec and the risk of tracking someone using the geotag info in photos taken with smart phones with geotagging enabled and with cameras with geotagging enabled.
I would like to put you at a little ease with this information, Facebook strips this data from your photos as they are uploaded so the location in which the photo was taken is no longer available on your picture on Facebook.

We have a few more tests to run but as of right now you are safe to post your geotagged pictures on facebook, but on another hand we can not confirm at this time that facebook does not still have access to this tagged info but rest assured the general public does not have access to it.

Saturday, August 17, 2013

Mouse without Borders

If you have more than one workstation or servers and would like to control them with a single mouse and keyboard much like a hardware KVM, Mouse without Borders is for you. This is a free product from Microsoft that we have been using for about a week now and are in love with it. We have tried a handful of free and paid for software KVM and so far this was by far the easiest to set up, and has run flawlessly. At this point in time we highly recommend you try this software if you have a use for it, we will keep you updated on this software if any issues arise. Mouse without Borders

Thursday, July 25, 2013

Feds tell Web firms to turn over user account passwords

Speaking of password security here is a news feed from cnet outlining the alleged accusations that the Fed demanded major Internet companies divulge users' stored passwords.

Although most of these passwords are encrypted depending on the encryption algorithm used these passwords can be cracked and be used to gain access to your personal and professional accounts.

To help combat the Fed or anyone else for that fact from cracking your passwords use passwords that are at least 10 characters in length and with a mixture of upper and lower-case letters, numbers and, if the site or service allows, special characters, such as “!,” “#” and “?.

I know this may be hard at first to remember passwords but it only benefits you in the long run!


news.cnet.com
Secret demands mark escalation in Internet surveillance by the federal government through gaining access to user passwords, which are typically stored in encrypted form. Read this article by Declan McCullagh on CNET News.

Monday, February 25, 2013

Using the Wii USB to LAN Adapter for your windows PC

Using the Wii USB to LAN Adapter for your windows PC?


Guess what it works! Rocketfish™ - LAN Adapter for Nintendo Wii - RF-GWII008 is recognized by windows as a Asix ax88772 usb2.0 to fast ethernet adapter.

Go to the following website if Windows does not automatically install the driver for you:

http://www.asix.com.tw/products.php?op=pItemdetail&PItemID=86%3B71%3B101
Scroll down about 50% of the page until you see "Drivers"

select your operating system > download the driver > go to your device manager > right click on the network adapter > select update driver software > select browse my computer for driver software > browse to the folder that holds your newly downloaded drivers > select next and windows will do the rest.

Enjoy your new 10/100 network adaptor!

Saturday, February 23, 2013

Password Creation and Security

Password Creation and Security.


Let me ask you this, have you ever used your email address to:

Signup for; Craigslist, Facebook, Online Banking, Subject Forums or any other sites where you would have to give up your email address to use the site? When the website asked you for a password did you happen to use the same password as your email account? Oops!!

If you said yes to both of those you need to follow the steps below like yesterday!

Well we cant change our email address because lets face it, changing email addresses is like moving houses; if your change of address does not go smoothly you miss out on all kinds of email which could hurt your bottom line. So we are going to have to change our current password for all sites that we access on a daily basis.

Ideally we want to have a different password for everything so if a breach was to occur damage would be minimal. Let me give you a example:

I have a Craigs list account, I have a email address that I use for everything. The email address is 101@101.com. And my current password for my email and my Craigs List is 12345. We need to change the password for my email as well.

You need to remember a lot of passwords but this trick will help out a lot.

Take the first x about of letters, craigslist.org, I am going to use the first 6 "craigs". Now those 6 letters will be the secondary portion of the password, the first portion you come up with, if can be anything you want. I will pick "djwn5#". now I have 2 strings.

Now I want to combine the 2 in a way that will be the same for all sites I sign up for in the future. I'm going to do "djwcraigston5#", and this will be my new password for craigs.org. and if I was using Gmail.com for my email I would have a password of "djwGmail5#".

This little tip will help you from getting hacked!