jeudi 3 mai 2018

How to rollback and uninstall the Windows 10 April 2018 Update

The Windows 10 April 2018 Update is rolling out to users. If you install it and encounter major problems, as some users doubtless will, you might want to go back to your previous version, and wait until the update is a bit less buggy. If you've been using Windows 10 for a while you’ll probably know how to do this, although the process may be slightly different to what you've been used to. SEE ALSO: How to upgrade your PC to the Windows 10 April 2018 Update now How to delay the Windows 10 April 2018 Update Six great hidden… [Continue Reading]


Top tips for World Password Day

We're constantly being told that the password's days are numbered. No less a figure than Bill Gates predicted the end of the password as far back as 2004. Yet we still rely on them to protect many of our day-to-day activities. To mark today’s World Password Day, Raj Samani, chief scientist and fellow at McAfee, has produced a set of tips that people can follow to make the best use of passwords.  Create Strong Passwords. Never use family names, pets, birthdays, '12345' or 'password'. Many websites and apps will prompt you to include a combination of numbers, lowercase and uppercase… [Continue Reading]


Cinnamon 3.8 is here, but Linux Mint users can't have it

Linux Mint is a pretty good Linux distribution. Many people love it because of the Cinnamon desktop environment. Hell, despite having other DE versions -- such as Mate -- the Linux Mint operating system sort of exists only because of Cinnamon. I mean, look -- Mint is based on Ubuntu, so if you want to use Mate or Xfce environments, for instance, why not just run Ubuntu Mate or Xubuntu? The thing is, Cinnamon is available to any distro that wants to use it -- it is not only a Linux Mint affair. Since the Mint team both maintains and… [Continue Reading]


mercredi 2 mai 2018

Most popular travel sites have unsafe password practices

A new study of password and account security on 55 of the world's most popular travel-related sites reveals that 89 percent leave their users' accounts potentially exposed to hackers due to unsafe password practices. The research by password management company Dashlane tested each website on five critical password and account security criteria. A site received a point for each criterion it met, for a maximum score of 5/5. Any score below 4/5 was considered failing and not meeting the minimum threshold for good password security. Only 11 percent (6/55) passed with a score of 4/5 or better, and only one… [Continue Reading]


Turbonomic delivers AI-powered workload automation for the cloud

Workload automation specialist Turbonomic has released a major update to its software, delivering application-aware infrastructure and making any type of workload -- virtual, cloud and container -- self-managing. Turbonomic's AI-powered decision engine analyzes performance, cost and compliance data across the entire IT stack and generates trustworthy decisions at scale faster than before. It also delivers continuous automation of AWS Reserved Instance (RI) utilization, in concert with re-sizing actions, enabling greater elasticity and often driving 30 percent or more cloud savings. It enables greater understanding of application resource utilization and topology too, and the automating of decisions. New Application Performance Management (APM)… [Continue Reading]


Samsung announces the Galaxy A6 and A6+ with Super AMOLED screens and advanced cameras

Samsung’s flagship smartphones get a lot of coverage, but not everyone can afford the latest state-of-the-art handsets. The South Korean tech giant offers a number of more affordable devices, and today it announces the Galaxy A6 and A6+. The new phones feature powerful front and rear cameras, Super AMOLED screens and Samsung’s signature Infinity Display, offering an 18.5:9 screen ratio. The larger Galaxy A6+’s Dual Camera has a Live Focus mode, meaning users can control the depth of field and bokeh effect before or after taking a shot. The phone supports Dolby Atmos optimized audio through headphones and includes face… [Continue Reading]


Critical vulnerability found in infrastructure and manufacturing applications

A critical remote code execution vulnerability has been discovered in two Schneider Electric applications heavily used in manufacturing, oil and gas, water, automation and wind and solar power facilities. The vulnerability, discovered by cyber exposure company Tenable, could, if exploited, give cyber criminals complete control of the underlying system. Attackers would also be able to use the compromised system to move laterally through the network, exposing additional systems to attack. In a worst case scenario, attackers could use the vulnerability to disrupt or cripple plant operations. The vulnerability impacts InduSoft Web Studio, an automation tool used to develop human-machine interfaces… [Continue Reading]