Welcome to nsane.forums

Welcome to nsane.forums, like most online communities you need to register to view parts of our community or to make contributions, but don't worry: this is a free and simple process that requires minimal information. Be a part of nsane.forums by signing in or creating an account.

  • Access special members only forums
  • Start new topics and reply to others
  • Subscribe to topics and forums to get automatic updates

Search the Community

Showing results for tags 'laptop'.



More search options

  • Search By Tags

    Type tags separated by commas.
  • Search By Author

Content Type


Forums

  • Site Related
    • News & Updates
    • Site / Forum Feedback
    • Member Introduction
  • News
    • General News
    • FileSharing News
    • Mobile News
    • Software News
    • Security & Privacy News
    • Technology News
  • Downloads
    • nsane.down
  • General Discussions & Support
    • Filesharing Chat
    • Security & Privacy Center
    • Software Chat
    • Mobile Mania
    • Technology Talk
    • Entertainment Exchange
    • Guides & Tutorials
  • Off-Topic Chat
    • The Chat Bar
    • Jokes & Funny Stuff
    • Polling Station

Found 35 results

  1. Hey there , Currently I have a T410 Thinkpad (1st Gen i5 M560 @ 2.67GHz ,4GB RAM, Sam 750 Evo 120 GB SSD @240MBPS , 1440x900 Reso)( Refurbished ) But its So darn heavy ! It has that extra big battery butt too, makes it even more heavier.. So guys, please help me pick a comparatively new and light laptop model. Hopefully a Thinkpad. Thanks a lot!!
  2. A year-long study revealed on Friday that laptop manufacturers seriously overstate their claims on a device's battery life, sometimes by hours, not minutes. Which?, a website that provides reviews and expert advice on a various of topics, including hardware and technology, carried out the tests during the past year as part of their normal review process. Experts said they tested 8 Acer, 3 Apple, 8 Asus, 10 Dell, 12 HP, 20 Lenovo, and 6 Toshiba laptops. Each device went through two different tests three times. The first test included watching movies until the battery life died out, while the second test involved surfing the Internet via WiFi, also until the battery gave way. Results of these tests, portrayed in the infographic below, show that all but one laptop vendor overstated the average battery life for their devices. Battery life test results Besides Apple's MacBooks, who sometimes lasted longer than what Apple estimated, all laptops tested poorly. "The most optimistic laptop manufacturers are overstating their battery life by 50% or more, leaving you searching for the power cable twice as often as you’d expect," said Which?'s Jack Turner. For two decades, users have been whining about laptops not living up to vendor claims. This test shows how inaccurate those claims are to begin with. The vendors who replied to Which?'s request for comment said the Which? test result differed from their estimations because they used different tests to assess the initial presumed battery life. Source
  3. HP Recalls More Laptop Batteries After Finding They Could Catch Fire HP expands recall program originally started in June In an announcement today, the company says that batteries that are shipped with laptops such as HP, Compaq, HP ProBook, HP ENVY, Compaq Presario, and HP Pavilion Notebook Computers sold worldwide from March 2013 through October 2016 could be affected by an issue causing them to overheat, posing a fire and burn hazard. Additionally, batteries for these models that are sold separately could also be affected, HP says. The company recommends customers to recheck their batteries even if they were originally told they were safe. “Because these batteries pose a fire and burn hazard, it is essential to recheck your battery, even if you did so previously and were informed that it was not affected. However, if you have already received a replacement battery, you are not affected by this expansion,” HP says. If you’re trying to determine whether a specific battery is affected or not, the company also has a validation program that does the whole thing automatically, but you can also check it manually. Stop using defective batteries What’s important to note, however, is that HP does not recall laptops, but batteries, so the aforementioned models are not defective, but only come with a faulty battery that can pose a risk of fire when overheating. “HP is not recalling its notebook computers. HP has announced, in cooperation with various government regulatory agencies, a worldwide voluntary safety recall and replacement program for certain notebook computer batteries,” the company stated. Customers who have already replaced their batteries as part of the original recall program do not need to exchange them again, as this expansion does not affect new units. It goes without saying that should you have one of the laptops suspected to come with a defective battery, you are strongly recommended to stop using it as soon as possible and contact HP for a replacement. You can also use the laptop without a battery, but connected to an external power source until you get the new battery. Source
  4. Meet The GPD Pocket, A 7-inch Ubuntu Laptop The GPD Pocket Do you have small hands? Are you a Borrower? Do you consider 10-inch netbooks to be monstrous? If so, the GPD Pocket may be right up your (very miniature) street. GPD Pocket, 7″ Laptop The GPD Pocket is a 7-inch laptop that’s small enough to slip in to a pocket — and it will apparently be available in two versions: with Windows 10, and Ubuntu 16.04 LTS. As reported on Liliputing, GPD (the company who makes the device) is currently only showing the device off a few fancy renders and photos with a prototype unit. But GPD has form for releasing other (similar) devices, like the GPD Win, and Android gaming portables, so although a novelty this latest device is unlikely to be outright vapourware. The GPD Pocket touts some impressive specifications for the size, including a quad-core Intel Atom x7-Z8700 processor (the same one used in the Microsoft Surface 3), 4GB RAM and a high-res IPS touch display: 7-inch IPS touch display Intel Atom x7-Z8700 (quad-core @ 1.6GHz) 4GB of RAM 128GB of storage 1x USB Type-C 1x USB 3.0 Mini HDMI Out MicroSD Card slot Courage jack (“headphone port”) 7000 mAh battery The overall dimensions of the device mean you won’t be able to hammer away on a full-sized keyboard, but the chiclet style QWERTY one included (plus a ThinkPad-like mouse nub as there’s no room for a touchpad) looks perfectly serviceable for tweets, forum posts and some basic web browsing. Since I doubt anyone would be using this device as their primary device issues to do with the keyboard size, or lack of palm rest, etc, are unlikely to be primary considerations. No, the GPD Pocket is, as the name suggests, intended as the sort of device you literally slide into your pocket as you head out the door. The “bad” news is that, like everything these days, GPD plan to crowdfund the GPD Pocket over on Indiegogo sometime in February. Currently there’s no indication of pricing or release date, but providing it’s not too weighted at the high-end it could make a nice midrange alternative to Linux hobbyists. Source
  5. Recycling Is A Good Thing Just when you think you’ve seen it all, someone does something that is simply too good not to share. This is about laptop computers and strange-but-true things people do with them. I’m all for recycling, so I thought some of these examples would definitely be interesting. and may just have to check them out. Who needs a Stress Ball when you have old technology at your disposal? Kung Fu Training So you want to progress through the ranks and get the next color belt to add to your collection. You have no blocks of wood or bricks to use. No problem at all– grab an old laptop and have a friend hold it. Give it a few good, swift kicks until you totally destroy it or break your foot or toes in the process. I am going to pass on this one. I envision myself in a cast and with crutches. Killing Pesky Varmints An old laptop is great to have on hand when you can’t find the fly swatter. If the screen still works, you can turn it on to lure the pesky bugs to the bright light. Once they are there, quickly close the lid and you now have trapped the little varmints, and made your keyboard pretty disgusting in the process. Nut Cracker It is the Holidays and you will be entertaining guests. It figures you can’t find the nutcracker or a hammer. Trusty old laptops were made tough, no worries. Grab that laptop, place it on a hard surface insert a walnut or a few (in the shell) with the pointed end up. Drop the lid on them until the nut cracks along its axis and BAM, you have shelled walnuts. Messy but it works in a pinch. Heating Leftovers Laptops are notorious for running hot if left on all the time and if they are older and the vents are blocked. Why not see if you can fry an egg or heat up leftovers. I speak from experience, before I knew the right-and-wrongs of owning a laptop, I enjoyed holding it on my lap in the winter and warming up my thighs. Why not heat up leftovers and put it to good use? Laptop Stool When I was younger in Girl Scouts we took old metal cans and decorated them and added a rope handle which was attached and called it a sit-upon. You could put things inside it and carry it around and you instantly had a chair to sit on. That old laptop (or the one you currently use) can also be used in the event you need to rest your legs a bit. Open it up and slowly lower yourself onto it. You will definitely capture people’s interest when they see you sitting on a laptop. Note: I cannot emphasize enough to slowly squat onto it as it may leave ridge marks on your backside. If you have opted to eat that extra doughnut understand the additional weight may find you sitting on the floor and not the laptop. More Ideas I was feeling creative so here are some other ideas. Feel free to add to this list: Scraping your windshield of ice when you can’t find the ice scraper. The thought of this makes me cringe, but it sure is funny. Make a bird house or small dog house by opening the laptop up and tenting it. I am pretty sure my Golden Retrievers and Collies would not fit under any of my laptops. Dustpan when you can’t find one and are in a hurry to get the dirt picked up The best thing you could do though, is to peruse old Dave’s Computer Tips (DCT) articles and empower yourself to fix it. You can make the laptop RUN again! Maybe you just want to use it as a spare. Maybe you want to see what the inside looks like. To get it to run well again, blow the dust off, do some software cleanup, clean the internal components, or format it. Article source
  6. Hi everyone. Last week my old faithful Toshiba Laptop give its last breath, fortunately i noticed the problem before it was too late. I bought another second hand one but after putting it though the same hell as my Toshiba, i found many Hicks that weren't included in the sales description when purchased, so i returned the piece of crap to its owner. Now i have the choice between two different HPs with different processors. Ive done a little research on this but i prefer and trust your personal opinions more than a guy named Charley and Suey on the net. I dont game much but enjoy playing poker at many tables at once so many opened pages sometimes, performance is nice. I stream live sport events and movies. no porn HP Pavilion 17.5-inch (AMD Quad-Core A10-4655 12 GO RAM- 1tb) with beats audio cant find the specs page for this laptop on HP website Or HP DV7 CORE I7 3 GHZ/8GB RAM/ECRANT 17.3 1TB Older laptop but hardly used Specs found here Thanks guys for your help
  7. Quick And Simple Way To Prevent Laptop Power Cords Fraying I come across a lot of laptops with frayed power cords that are expensive to replace. Prevention is better than cure. Here's how to prevent the problem happening in the first place. As a MacBook owner, I've grown accustom to the fact that it won't be long before the cable on the power cord starts to fray, and once that's happened, it's only a matter of time before I'm giving Apple another $80 for a charger. Well, prevention is better than cure, so I've been taking steps to prevent the problem from happening, rather than dealing with it once it's started. And don't worry, this isn't specific to the MacBook - this will work on all brands of laptop power cords. This also works for smartphone or laptop power cables. I know, because I've tested this on the weakest of the weak charger cables - the Apple Lightning cable. I've been experimenting with a number of techniques over the past few months, and the best one I've come up with needs only two things: a pack of Sugru and a couple of small cable ties. Not heard of Sugru? It's a mouldable adhesive made of polysiloxane (silicone caulk) and talc. It sets into a durable, waterproof silicone rubber in about 24 hours, and it's stable between -50°C (-58°F) to +180°C (356°F). Here's what I do: Step - 1: Here's the laptop charger, the Sugru, the cable ties, and a pair of snips for cutting the cable ties. Step - 2: Next, I put a plastic tie at both ends of the cable (because I'm giving the Sugru treatment to both the connector end and the power brick end). It doesn't have to be super-tight, but you do need to be able to snip the tail off the cable tie as close to the lock as possible. The purpose of the cable tie is to give the Sugru something to grip onto. It does work without this, but I've found that this gives a more durable fix. Step - 3: Here's the Sugru. I'm using black because that's what I had. It does make a bit of a mess, so if you want to be tidy I suggest using white. Step - 4: Now you just start molding it over the cable and the existing strain relief. If you're thinking of doing this on a new power cord, I actually suggest you wait a few months because you'll find that the cable usually takes on a particular bend or twist, and then you can mold the Sugru to follow these bends. This, believe it or not, makes the fix stronger. And yes, I know my molding is messy. I never was any good at crafts. Step - 5: See how the Surgu molding at the connector end has a bend in it? I'm following what seems to be the way the cable wants to bend. Source
  8. You can partly credit the classic clamshell PC design to him. The PC industry has lost one of its quieter but more influential leaders: John Ellenby, the CEO of Grid Systems, died earlier this month at the age of 75 of yet to be determined causes. His company (particularly late designer William Moggridge) is widely credited with making the first commercially successful clamshell laptop, the Compass. The 1982-era machine was thick, had a tiny screen and was wildly expensive for the time at $8,150. However, it was a hit among companies and governments -- it was a relatively slick way of bringing computing (and even basic digital communication) with you at a time when the alternatives were barely-luggable desktops like the Kaypro or Osborne 1. Ellenby himself was influential beyond that one computer. Before Grid, he also worked at Xerox's groundbreaking Palo Alto Research Center. He took the Alto, the template for what would become Apple's Lisa and Mac desktops, and developed a sequel (the Alto II) that was much more commercially viable. He also founded an early tablet company, Agilis, and helped get the ball rolling on both augmented reality and navigation through another firm, GeoVector. You could argue that some of Ellenby's creations were premature. Laptops didn't really hit the mainstream until roughly a decade later through systems like Apple's PowerBook and IBM's ThinkPad, and it would be well over two decades before his other companies' fields really swung into high gear. With that said, there's no denying that he was forward thinking and had a knack for translating ambitious ideas to devices you could buy. He'll be missed. Source: New York Times Article source
  9. How to Play Pokémon Go On Your PC/Laptop Catch Pokemon with Pokemon Go on your PC/Laptop without ever leaving your desk, but it’s a little bit messy. If you are not living under a rock, you must have heard about Nintendo and Niantic’s gaming sensation, Pokémon GO, which is based on augmented reality. Pokémon GO requires gamers to walk around their neighborhood with the smartphones to capture Pokémon nearby. For now, Nintendo has not released this game for Windows devices. However, you can play this game on your Windows 10 PC using Android emulator such as Bluestacks. Since you can’t carry your Windows PC, you can use Fake GPS to fool the Pokemon Go on Windows PC/laptop that you are actually moving around. Even if you have Android smartphone or iOS device, if you want to collect all the Pokémons without leaving your desk, then the following may be your solution. Step by step guide to install Pokemon Go on your PC or Laptop Files to Download Download and Install BlueStacks App on your computer. The installation is simple and you simply need to follow the on-screen instructions to complete the setup. Once the program is installed, don’t launch it yet. We will have to download a few more files before we get started. Download KingRoot APK and LuckyPatcher APK. These apps will be used to gain Root access on BlueStacks player and then install our app as a system app. Download Mock Locations (fake GPS path) and Developer Options Tool APK. Finally, download the latest version of Pokémon GO. You can save all these files anywhere, however, Mock Locations should be saved in the Documents folder on your PC. Getting BlueStacks Player Ready for Pokémon GO. Open BlueStacks Player and wait for it to initialize. Once that’s done, navigate to the Android tab and from the left sidebar click on APK to install KingRoot APK. Once the app is installed, you will find it in the apps section. Run it once to gain root access on the BlueStacks Player. In the same way, install the Lucky Patcher app and run it. When prompted for Root Permissions, accept and close the app. Now to install the Location Spoofer app, open Lucky Patcher you just installed and then click Rebuild & Install at the bottom. Here, navigate to SD Card –> Windows –> Documents and click on the Mock Locations app to install it. Make sure you select Install as a System App when asked by Lucky Patcher. Install Developer Options Tool APK normally and turn the option off, if you see it turned on. Also, open up the Settings menu in BlueStacks and under location settings, make sure High Accuracy is selected. Finally, install the Pokémon GO app to start playing the game. Playing the Game Finally, when everything is set, open Lucky Patcher and launch the Mock Locations app. After the app is launched, click and hold on two locations on the map (the area which you want to explore in Pokémon GO), which then get selected. Next, click on the Play button. You will be asked to select a speed and here, give 4 kmph with 1 hour as a constraint modifier and start the path. Your Android device will now get your device location from the app which is the key ingredient to playing the Pokémon GO game. Now launch the Pokémon GO game, log in using your Google account and start playing the game. The avatar will follow the path you have given in the Mock Location app and you can collect Pokémons, take items from PokéStops and also do gym battles. Please make sure you turn off the AR (Augmented Reality) mode and play the game in a virtual environment. Conclusion So, that was all folks, you can now play Pokémon GO on your PC. Do ensure you don’t do big jumps on the map or you might get banned for location spoofing. Also, turn off the location of Windows PC if you are getting location errors while playing the game. But if you have a big park in your surrounding and it’s safe out there, I would insist you try the game there. It’s a lot more fun that way. Source
  10. How To Install Linux On An Android Device Unleash the full potential of your Android device by installing Linux OS on it Installing Linux on Your device involve four steps which are -installing BusyBox, installing Terminal Emulator, placing required files in SD card and finally running the Linux OS. Step 1: Installing the BusyBox libraries Before you start you’ll need: Android Device 4 GB SD card(or more) Root Access Full Backup of your data(for recovery if something goes wrong) You can get BusyBox from Play Store by clicking here. All you have to do is to download and install it. Step 2: Installing a Terminal You’ll need a terminal emulator for using your Linux OS. Installing this is recommended. Step 3:Putting required files in place Connect your device to your PC (remember to enable the USB mount), and then download this file and this file. Create a new folder in your SD card and name it Ubuntu(or whatever you like) and then extract these files in the folder. Step 4: You’re almost ready Go back to the Terminal app and write “su’ again. Then write “cd /mnt/sdcard”. To confirm everything is working try to write “ls” and see if you can recognize your folders (you might find the ubuntu folder as well). To start our ubuntu write “cd /ubuntu” and then “sh ubuntu.sh”. This will execute many procedures which are trying to set your system. It will request to enter a resolution. Use number x number format to express it. For example: 600×400 is the proper format. For the best appearance and performance I suggest 800×480. Now everything is done. The ubuntu system is running , however we can’t see it. To see it , we must use a VNC app. We can download it from Play Store. Thats it! However if you feel any difficulty in any of the steps or require further information, you may drop your query in the comments. Source
  11. Currently confirmed: Lenovo and HP laptops UEFI zero-day affects Lenovo, HP laptops Dmytro Oleksiuk, an independent security researcher, has released details about an unpatched UEFI firmware zero-day that's currently confirmed to affect some versions of Lenovo and HP laptops. Oleksiuk initially discovered the issue affecting Lenovo ThinkPad laptops but said that, in theory, many other OEMs may be affected as well. One of Oleksiuk's followers later learned that some HP laptops were also affected by the same problem. UEFI zero-day can alter firmware code, disable Windows security measures The issue resides in the source code of System Management Mode (SMM) module that's part of various UEFI firmware packages. The researcher said he created an exploit that leverages this vulnerable code to disable UEFI write protections and alter the device's firmware. Additionally, he could also disable the Secure Boot option and even Windows 10 built-in security settings such as Device Guard or credential Guard. The exploit code, named ThinkPwn, works on the level of the UEFI shell, that can be accessed at boot time. Oleksiuk says that, in theory, the code could be modified to run at the OS level, something that malware authors could incorporate inside their malicious code. Vulnerability resides in firmware IBV code In a statement on its website, Lenovo said that the issue doesn't reside in the UEFI code added by its engineers but on top of the IBV code provided by Intel. IBV stands for Independent BIOS Vendor and is a package of ready-made code that's integrated inside BIOS and UEFI (an evolution on BIOS firmware code) to ensure inter-compatibility with other device components. The issue appears to be an old one, which Intel engineers have apparently fixed in 2014, but has made its way in the UEFI distributions of various OEMs. "Importantly, because Lenovo did not develop the vulnerable SMM code and is still in the process of determining the identity of the original author, it does not know its originally intended purpose," Lenovo explains. "But, as part of the ongoing investigation, Lenovo is engaging all of its IBVs as well as Intel to identify or rule out any additional instances of the vulnerability's presence in the BIOS provided to Lenovo by other IBVs, as well as the original purpose of the vulnerable code." Oleksiuk revealed the exploit on his blog, after informing Lenovo of the issue, and has also published proof-of-concept code on GitHub. There's currently no fix available for this issue, neither from Lenovo or HP. Article source
  12. 5 Reasons to Install Linux on Your Laptop You can choose something other than MacOS or Windows 10 when it comes to an operating system for your computer. If you’re prepared to be a little more adventurous, Linux has plenty of great features that will save you time and make working a little less dull. The best part is that Live Installations allow you to try out the software before you wipe your entire hard drive. Linux comes in various flavors called distros (distributions) and it’s up to you to determine which one you opt for. Ubuntu is by far the most popular desktop distro and is a good place to start for beginners, so we’ve focused on that one here, but once you’ve grasped the basics feel free to explore the pros and cons of some others out there. 1) You don’t have to ditch Windows (or OS X) You don’t need to wave goodbye to Windows (or macOS) to give Linux a try—Ubuntu can run very happily on a dual-boot system or even straight from a USB drive. Follow the instructions provided on the Ubuntu website to get up and running: you need a blank DVD or a USB stick at least 2GB in size, and the setup process is very straightforward. Of course the benefit of using a USB drive or DVD is that your existing OS remains untouched. On the other hand, performance and responsiveness won’t be quite as good, and you’re limited in terms of some system operations (to install apps and save files permanently, you need to create a USB stick with the persistence option enabled). 2) It’s simple to set up In the past, installing software and popular codecs on Linux was a pain for the less tech-savvy, but that’s no longer the case. Ubuntu, for example, prompts you to download codecs for commonly used audio and video formats with a single check box, and on most modern systems can instantly identify available wifi networks and connect up to them. While it’s true that seasoned Windows and Mac OS X users may find themselves occasionally perplexed by how to do something, that’s to be expected when switching between OSes of any flavor, and there’s always plenty of support available on the web. Most users are going to be up and running and happily enjoying Linux in a few minutes. 3) Everything you need is included Ubuntu comes complete with Firefox for your web browsing, Thunderbird for your emailing, and LibreOffice for making documents, spreadsheets, and presentations. Other free and open source applications like GIMP (image editing), Evolution (the Linux version of Outlook), and Kodi (home theater and media management) are only a few clicks away. Other well-known apps with Linux versions include Google Chrome, Plex, VLC Player, Slack, Dropbox, Skype, and Spotify. And don’t forget all those programs that run in a browser now, from the online versions of Microsoft Office to Google Play Music. If there’s a Windows program you really need to bring along with you, then give Wine a try. 4) It’s very secure There’s a relatively small number of people using Linux as a desktop OS, which means a relatively small number of hackers looking to exploit it, but besides the raw numbers, Linux is an incredibly secure OS to run. It’s designed from the ground up to be secure, from the default privileges given to users to the way that Linux code is developed and maintained. Linux can crash and be exposed like any other operating system out there, but the fact that few pieces of malware will run on the platform and any damage they do will be more limited means it’s a solid choice for the security-conscious. It’s also less likely to be weighed down by bloat and creeping system sluggishness than its more well-known rivals. 5) You’re supporting open source and free software Linux is more than an operating system, it’s a philosophy. Not only is the software free (like Google Chrome, for example) but the source code is open and free (unlike Google Chrome, for example). You use the OS and the bundled software completely free of charge, but also view the code and make changes to it, should you be so inclined. When you use Linux you’re supporting a global community of millions committed to making software free to install and use. That philosophy has helped drive innovation on the web and in Windows and OS X, as well as Linux itself, and if you want to dive further into software development, Linux is a great place to get started. Source
  13. Software makers like Microsoft put a lot of effort into ensuring that the operating system and application updates they deliver to your system are secure, so that hackers can’t hijack updates to get into your computer. But it turns out that PC hardware makers are not so careful. An investigation conducted by Duo Security into the software updaters of five of the most popular PC manufacturers—HP, Dell, Acer, Lenovo, and Asus—found that all had serious security problems that would allow attackers to hijack the update process and install malicious code on victim machines. Researchers at Duo Security’s Duo Labs found that all five vendors, known as OEMs or Original Equipment Manufacturers, shipped computers with pre-installed updaters that had at least one high-risk vulnerability that would give an attacker remote-code execution abilities—the ability to remotely run whatever malicious code they want on a system—and gain complete control of the system. The skill required to exploit the vulnerabilities was minimal, the researchers said in a report they’re releasing (.pdf) about their findings. All of the sexy exploit mitigations, desktop firewalls, and safe browsing enhancements can't protect you when they're crippled with pre-installed software. The OEM vendors all shared similar security flaws in varying degrees, such as failure to deliver updates over a secured HTTPS channel or failure to sign update files or validate them. These problems make it possible for attackers to conduct a man-in-the-middle attack to intercept update files as they’re transmitted to computers and replace them with malicious ones. The malicious files can get installed regardless of other protections a machine might have because updaters operate with the highest level of trust and privilege on machines. “It doesn’t take much for one piece of software to negate the effectiveness of many, if not all defenses,” they write in their report. “All of the sexy exploit mitigations, desktop firewalls, and safe browsing enhancements can’t protect you when an OEM vendor cripples them with pre-installed software.” Many of the vendors also failed to digitally sign their manifests—lists of files the updater should pull down from a server and install. Attackers can intercept unsigned manifests if they’re transmitted unsecurely; then they can either delete important update files from the manifest, preventing computer users from getting updates they need, or add malicious files to the list. The latter would be effective in cases where vendors didn’t sign their update files, allowing attackers to slip in their own unsigned files. Some manifests include inline commands that are required to execute update files, but an attacker could simply add inline commands to install and launch his malicious files. In the case of HP, the researchers found they could in fact execute any administrative-level command on a system through the inline commands in its manifest, not just commands to install update files. An attacker could add a new user account to the system, for example, that gives him ongoing access to the system. “There are myriad ways to abuse command-injection bugs,” says Darren Kemp, a researcher with Duo Security. “Pretty much anything an administrator can do, you could do [through the inline commands in the manifest].” The five vendors they examined are just a sampling, but the researchers noted in their report that based on what they found, it’s unlikely that other vendors are any more secure. However, they suspect that Apple’s updater might be more locked down because the company is known for taking security seriously and for not installing third-party bloatware on its machines. “This is one of the cases where that Apple walled garden works,” says Kemp. “You get [only] Apple software … so their ability to control that tightly is in this case a befit to them.” PC makers install update tools on computers to deliver firmware updates—firmware is the software on a computer that boots up the machine and loads the operating system—as well as driver updates and updates to so-called bloatware that comes pre-installed on machines when consumers buy them. Bloatware can be anything from 30-day trial versions of third-party software, to special utilities the OEM offers to add functionality to your machine, to adware that sends ads to your browser as you surf the web. In some cases, the updaters direct computers to the OEM’s site to download updates, but in other cases they send computers to the third-party software maker’s site to get an update. The researchers found 12 vulnerabilities across the five vendors, and every vendor had at least one high-risk vulnerability in their updater that would allow remote-code execution. In some cases, vendors installed more than one updater on machines, for different purposes, and the security of each updater was inconsistent. Of the five OEMs, Dell’s updaters were the most secure—although the company doesn’t sign its manifests, it sends manifests as well as the update files themselves via secured HTTPS channels to thwart simple man-in-the-middle attacks. The Dell Update also validates that the files are signed and that the certificate used to sign them is valid. Although the researchers found problems with the latest version of another updater Dell uses for Dell Foundation Services, the company apparently discovered these vulnerabilities independently and patched them before they could report them. Hewlett-Packard also scored fairly well. The company transmitted updates over HTTPS and also validated updates. But it failed to sign its manifests. And in the case of one downloader component, although HP included a process for verifying signatures of files, it failed to ensure that the verification was always required. An attacker could, for example, download an unsigned malicious file to a computer and prompt the user to run the file. And since HP had a redirect problem that would allow an attacker to redirect a user’s machine to a malicious URL masquerading as a legitimate HP download URL, this would have made it easy for an attacker to download malicious code and trick the user into launching it. Lenovo was a mixed bag when it came to security. It had two updaters the researchers examined—Lenovo Solutions Center and UpdateAgent. The first was one of the best updaters the researchers examined. But the second was one of the worst. Both manifests and update files got transmitted in the clear and the updater didn’t validate the signature of files. Acer tried to do the right thing by signing update files, but failed to specify that the updater should verify signatures, essentially making the signing useless. It also failed to sign its manifests, allowing an attacker to add malicious unsigned files to the manifests. As bad as Acer was, however, Asus was worse. Its updater was so bad the researchers called it “remote code execution as a service”—essentially a built-in service for hackers to do remote-code execution. Asus transmits unsigned manifests over HTTP instead of HTTPS. And although the manifest file was encrypted, it was encrypted with an algorithm known to be broken, and the key to unlock the file was an MD5 hash of the words “Asus Live Update.” As a result, attackers could easily intercept and unlock the list to make changes. Asus update files weren’t signed, either, and they were also transmitted via HTTP. Across the board, the researchers found that if the vendors had simply used HTTPS and certificate signing in a consistent and competent manner, they would have “significantly raised the bar to exploitation.” As varied as their security stances were, the vendors also varied in how easy they made it to report security problems. While Lenovo, HP and Dell, all had direct channels for reporting security problems with their software, Acer and Asus did not, leaving Duo researchers to attempt contact to their customer support lines channels multiple times via email and phone calls before they got a response. How the vendors responded to the researchers also varied. HP has already patched the most egregious vulnerabilities the researchers found. Lenovo addressed its problems by simply removing the vulnerable software from affected systems. Duo reported the problems to the vendors more than four months ago, but Acer and Asus still haven’t indicated when they will fix the problems or if they will. “Asus told us they were going to patch in a month, then they backed off on that after we pointed out that their planned patch was also flawed,” says Steve Manzuik, director of security research at Duo Labs. “And that’s when our communication broke down with them.” Article source
  14. Have you ever thought about taking your powerful computer with yourself to wherever you go? maybe Laptops be the first choice for this job, but we all know that no matter how powerful their hardware be, due to limitations in size, power consumption and above all, cooling, they can't provide the performance of a Desktop PC. so what's the best choice? A science and technology based company located in Iran named "Mazesta" (DFM) has tried to make this idea happen and from professional hardware suppliers for powerful systems in the country, they created a portable system named RenderWay RW. from hardcore gaming to heavy rendering with a portable case. RW covers the new series of powerful systems, products of Mazesta company, built for gaming and heavy and complicated processing. but that's not all! huge processing power is not the only property RW series products, in addition to utilizing the most powerful and newest hardware, they are actually fully portable. it can be firmly said that RW series have no domestic nor foreign equivalent. it's not finished yet, RenderWay RW aren't pre-assembled and don't lack personalization. from Z170 motherboard all the way to X99 platform, the choice is up to you! When it comes to portable systems most of us think about very small form factor motherboards and unprofessional graphic cards, yet none of the things just has been said are true about RenderWay RW case. on the systems based on RenderWay RW, you can use all Nvidia Geforce GTX graphic cards, from GTX 950 to Titan X and also AMD Radeon graphic cards of all models from R7 to R9 and even Fury X, as well as workstation and computational cards like Quadro, Nvidia Tesla and AMD FirePro. two of each models can be used in RenderWay RW case. one of the key features of this system is its personalization capability, choosing the processor and graphic card, case color, case modding including color, logo, other appearance customization, lighting...etc. these give users the ability to have a very powerful and upgradable gaming system without the limitations of normal gaming consoles. In RenderWay RW based systems you can use two graphic cards using SLI with Nvidia cards or CFX with AMD Radeon cards in order to have the best gaming experience and the highest possible level of details. with the aid of different video output ports, you can connect up to 4 monitors with up to 4K resolution. Renderway RW systems also provide WIFI connectivity in addition to cable network adapters, so once you place your system on anyplace you can use wireless connection to connect to the world, from online gaming to web browsing and watching high definition videos. Mazesta company has proved that being portable doesn't mean being limited. despite the fact that RenderWay RW systems can be a great replacement for gaming consoles and gaming Laptops, but it doesn't mean that its users are limited only to gamers. you can use powerful Intel X99 platform with processors from Core i X and K series, as well as Intel's super processors like Xenon E5 V3 and V4 alongside with 2 powerful graphic cards, to create a powerful 3D computational and processing system. so if you are a professional user, from now on you can carry your personal workshop with yourself and use it wherever you desire. such a powerful system can prevent professional users from providing two parallel work place (one at work and one at home). users can only have one of these systems and carry it to work and in the end of the day bring it back home to continue their work. connecting only a few cables definitely takes less than 1 minute. this case is designed in a way that the hardware in it are resistant against problems caused by movements and there is no worries about any possibility of hardware failures due to constant movements of such expensive hardware. Probably you didn't expect such a tiny little system to be more powerful than huge computer cases, it might be interesting to know that the design of RenderWay RW is such a way that in addition to the possibility of installing max 4 Hard Disks or SSDs, you can use water cooling systems with 120 to 240 mm pipes, as well as using the most powerful and updated power supplies in the world. More images: Soft98.ir dfmrendering
  15. Rising security threats + vulnerable laptops = potential data risk disaster. Here’s why you need hardware as well as software security. Laptops are typically among the weakest links in any security chain. Mobile or remote users often access sensitive data on the go at public hot spots that are, to say the least, beyond a company’s secure network perimeter. Internet security risks to which laptop users can be especially vulnerable are growing in frequency, complexity, and sophistication. For example, data theft or loss from stolen or hacked laptops has long been a concern. But data sabotage, in which criminals hack into your system and change data to compromise its integrity, is IT’s “next nightmare,” according to an early 2016 Wired report. Clearly, protecting endpoints, especially laptops, is vital. All too often, however, laptops are protected mostly by software security, such as firewall and anti-virus software. But software security has its limitations. Here’s why software security isn’t enough, and what you can do about it. Security Should be a Top Priority—But it’s Not Security is a constantly moving target, but few IT departments have the resources to do security thoroughly. PC security is something of a thankless job, to boot. Do it right, no one says a word. Do it wrong, you’re on the firing line. Surprisingly, security isn’t always a top factor when IT looks to replace aging PCs, according to IDC. Of the top five considerations cited when making PC brand decisions, security ranked fourth below overall performance (priority no. 1), overall costs (no. 2), and overall specs (no. 3). IT typically adds security to laptops via software such as anti-virus, anti-malware, firewalls, and intrusion detection. They’re all certainly important and should be a part of your overall security strategy. Users Don’t Always Follow the Rules But even the most effective aftermarket security software won’t protect laptops when users don’t follow basic security protocols. Employees who connect to insecure public hot spots, click on unauthorized or questionable email attachments, visit questionable websites, or try to “outsmart” IT by using their own devices or cloud services can make your company more vulnerable to security risks. No surprise, then, that IDC research also shows that the top security risk identified by IT is that employees “underestimate the importance of following security policy.” Why Hardware Security is Important Because of these and other factors, IT should be looking at laptop security more holistically, with an eye toward securing data and devices at the hardware level as well as the software level. This trend is already well underway: IDC estimates that by next year, about 90 percent of enterprise endpoints will include some degree of hardware-based security. Beyond the basic security software installations, IT should seriously consider encrypting the data that employees store and access on laptops. Encryption is essential to protecting that data if the laptop is lost, stolen or hacked. Every mobile device should be protected by strong passwords that are regularly changed. And the data in cloud services should be protected with two-factor verification wherever possible. In addition, the next time you look to replace a laptop, consider enterprise-grade products offering security features built into the hardware or firmware, such as preboot authentication, self-encrypting drives, remote wiping capabilities and a self-healing BIOS. For more on hardware-based security, see “Security Features to Look for in New Laptops.” Ultimately, a patchwork of security measures, coupled with careless mobile users and rising security threats, can be a recipe for disaster. You don’t want to become the next Target (on the hook for $10 million after a data breach), Anthem (cost of data breach: well over $100 million), or Ashley Madison (hit with about $850 million in losses). Article source
  16. ok so i have an asus x301a laptop and the screen wont turn on BUT i can hear the windows booting and everything, i tried hooking it to another monitor via HDMI and VGA and the screen does indeed show then but the laptop screen does not show anything what do i try any ideas ?
  17. Hello nsane, I am buying a new laptop but was wondering what you might suggest if the price needs to be between 850$ and 1200$. I am not saying I wanna buy a gaming laptop but I appreciate if you take in consideration that i like to play some of the latest games. Please give me your opinions about what kind of laptops I need to buy. Thank you
  18. Have you coveted the Skylake-powered version of Dell's near-borderless XPS 13 laptop, but wished it would ship with an open platform like Linux instead of Windows? Now's your chance. Dell has released a new version of its XPS 13 Developer Edition that comes with Ubuntu Linux 14.04 out of the box. You'll need a deep bank account to buy one right now, as your only current choices are high-end Core i7 models (with a quad HD+ touchscreen) that start at a lofty $1,550. You can finally get a Linux-based XPS 13 with 16GB of RAM, however, and there are promises of a far more frugal Core i5 system with 8GB of RAM and a non-touch display. Pros looking for portables have reason to celebrate, too. You can now snag a Precision 3510, 5510, 7510 or 7710 mobile workstation with Ubuntu, giving you some extra computing power (including Xeon chips and a 4K display option) in your open source rig. Linux machines may still be more of a side project at Dell than the main event, but you won't have to settle for sub-par gear. The Source
  19. The average contract price of mainstream PC-Client OEM SSDs in Q1 of 2016 has dropped, a new report by TrendForce’s DRAMeXchange suggests. MLC-based SSDs, as well as their TLC-based counterparts have seen their prices drop 10-12 percent, and seven-12 percent respectively. The TLC ones are doing slightly better because most SSD makers are just starting to ship the products, the report suggests. That is mostly because the first quarter is traditionally slow season for notebooks. The price change between different disks will also shrink, the report says. The difference between 128GB SSDs and 500GB HDDs will shrink to less than $3 (£2.13) this year, and the difference between 256GB SSDs and 1TB HDDs will shrink to less than $7 (£4.98). Overall, this is expected to be a good year for the SSD, as its adoption in notebooks will reach 30 per cent. Samsung will still be the number one player in the game, however it might focus more on migrating to 3D NAND-Flash products, in order to cut costs. Other SSD manufacturers will play the catch-up game, as they step up shipments of 15nm/16nm TLC products with higher margins. The overall amount of shipments of Client-SSDs for Q1 of 2016 is expected to drop anywhere between four and six percent, compared to Q4 2015. Notebook shipments, on the other hand, will drop somewhat more. Senior manager at DRAMeXchange, Alan Chen, said that by taking retail SSD sales into account, the total Client-SSD shipments for Q4 2015 were 22.6 million. Article source
  20. Conspiracy?? Ancient Sculpture Of Lady Using A Laptop This is an ancient Greek sculpture of what appears to be a woman using a laptop. Of course it's not a laptop, it just looks like one. Just kidding, totally a laptop. I think she's Skyping a lover and about to take her top off! Pfft, I know a shallow chest when I see one, and that isn't one. What shallow chest has USB ports? That is a LAPPY TOPPY. Also I'm pretty sure that armrest is a giant lightsaber. And her little servant? CYBORG CHILD, possibly from outer space. Source
  21. Japan's laptop-makers mulling combined last stand say Taiwanese sources From Taiwan, an advance on a tantalising rumour: Toshiba, Fujitsu and Vaio look to be seriously considering a merger of their laptop-making operations. Vaio, the laptop spin-off from Sony, publicly floated the idea in late 2015. At that time it was thought that Toshiba would probably like the idea, as relieving itself of its laptop division in a declining market would mean one less thing to worry about as it wrestles with its accounting scandal. Fujitsu's LifeBook products are well-regarded, but are not big sellers globally. Now Taiwan's Digitimes says news of the merger is causing nervousness among the nation's manufacturers, who fear consolidation of contracts if the three do pursue a deal. The rumour is hard to dismiss, as PC sales are falling fast and none of the three companies make it into the world's top half-dozen vendors, meaning they're selling fewer than 20 million units a year. Even if the three are doing well in Japan, that market's not in great shape: analyst firm IDC's assessment is that “a weaker Yen, high inventory, and lack of Windows 10 marketing continued to constrain PC sales” in 2015. Consolidation into a combined brand could help to defend the Japanese market and make it easier to compete abroad. It's even possible that the three brands could survive, with Vaio in consumer-land, Fujitsu concentrating on the business sales its global services business brings and Toshiba straddling both markets as it already does today. Article source
  22. Hello, I know I'm not the most active member but I've followed the site for years and well this is the place I thought of to ask this question! :blink: My girlfriend wants a new laptop, ( for her photography course, aiming to become pro), not to take pics but to edit them. Budget is £600 I'm totally out of date on technology, been very sick, used to build PC's and was a tech head...no longer though. And I'm a bit lost on this. Can anyone please help me with choosing a laptop that is good enough for her needs of running Photoshop cs (and ... probably nothing more taxing to be honest. ^_^ )? Preferrably ssd or even a hybrid flash/mechanical drive. NOTE: She has a new camera to take the pictures. The laptop is for editing them, etc. Photoshop and lightroom mostly. Any help or recommendations are most welcomed! Thanks.
  23. Xiaomi Linux Laptop To Enter Production Early Next Year Xiaomi’s long-rumoured Linux laptop will enter production in the first part of 2016, a new report claims. Industry watcher Digitimes’ sources also reveal that China’s Xiaomi plans to launch two notebooks: one sporting a 12.5-inch display and another with a 13.3-inch display. A difference in screen size is not the only distinction as each device will be made by a separate ODM: The model with a 12.5-inch screen will be manufactured by Inventec (who make laptops for Acer, Toshiba and HP), with an initial order of 250,000 units.The slightly larger device is to be made by Compal Electronics (known for manufacturing Apple devices, and various PlayStation, Xbox and Nintendo games consoles), with Xiaomi placing an order for 300,000 units.Industry analysts say Xiaomi is now the world’s third biggest smartphone vendor – but Xiaomi is much more than a smartphone maker. It also makes the world’s second most popular wearable device, the Mi Band, and offers Smart TVs, routers, IoT home products and even an air purifier – ! – as part of its ‘lifestyle strategy’. It’s very much a case of when Xiaomi makes a laptop, not if. Manufacturing sources speaking to Digitimes earlier in the year said the company was developing a 15.6-inch notebook with its ODM partners. No firm production plans were set at the time. Now those sources claim there are two laptops, neither of which is 15-inch in size, but production of which is to commence in the first half of 2016. The manufacture and design of electronics is always subject to change and revision. What a source hears one month can be contradicted a few weeks later as component costs fluctuate, manufacturing availability changes, and market trends prompt a rethink. With word of the Xiaomi laptop entering production, it’s clear a direction has now been settled on. Xiaomi’s notebooks will, according to the same sources, be priced cheaply but offer high performance, just like the company’s smartphones. In fact, Xiaomi is said to be considering selling its new notebooks as a bundle with a new smartphone – a way to not only reinforce its overall lifestyle strategy, but ensure its new notebooks get off to a stellar start. And with a new, untested Linux-based OS onboard, it may well need the push. If anyone stands a chance of taking Linux mainstream in China it’s Xiaomi. Source
  24. But you have to purchase a new Windows 10 device Just in case it wasn’t clear by now, Microsoft is really, really serious about getting more people on Windows 10. They’ve made the upgrade from Windows 7 and Windows 8.X a free one to entice fence-sitters. They’re pushing out their own halo devices to show what Windows 10 can do. And, until October 20, 2015, Microsoft is offering up some serious cash when you trade in an old MacBook or laptop for a new Windows 10 machine. How much can you get? Well, generally, you get a little more for a MacBook than a general laptop: Here’s what you can get for your old machine. Of course, the trade-in must be in reasonably good condition, and it can’t be more than six (6) years old: Your old machine must be in decent enough condition. And, you have to buy a machine from a handful of specific vendors: You can’t just buy anything. The list of qualifying machines is a bit limited. Here are Dell’s, for example: These are the Dell machines you’d want, right? You’ll need to follow a specific process to get your money, but it’s not particularly onerous. Just make sure you hold onto your receipt when you buy your new Windows 10 machine, pack up your trade-in as directed, and you’ll get your money within 28 days from whenever Microsoft validates the deal. Here are a few caveats, from the deal’s terms and conditions, which you’ll definitely want to review: Your trade-in can’t be more than six (6) years oldYou’ll need to start the process within 14 days of purchasing the new machineYou’ll need to send in your trade-in within 30 days of purchaseLaptops must have a minimum 11″ display and including a working battery and power supplyThe deal is only good in the US and CanadaInterestingly, although the deal is aimed at Windows 10, purchasing a new machine running Windows 8.1 can also qualify for the trade-in offer. And, Microsoft has excluded their own Surface machines from the deal. If you have an old machine laying around that isn’t worth more than $200 or $300 on eBay, or you just don’t want to hassle with selling it yourself, head on over and check out the details. Make sure you understand all of the terms before pulling the trigger. Source
  25. HP signs deal with 3M for new security improvements HP has recently announced a new deal with 3M in order to integrate the latter’s privacy screen into laptops and prevent what the company calls “visual hacking.” Basically, this is a method of stealing private information by looking directly into someone’s computer screen and according to HP, this kind of practice is becoming a lot more common these days. The new screens will be available on HP’s business computers, but the company hasn’t yet mentioned which are the models to receive this upgrade. Visual hacking used to steal private info A study mentioned by HP in the press release rolled out today reveals that 90 percent of the visual hacking attempts have been successful so far, with compromised information including contact lists, customer information, corporate financials, and employee access and login credentials. “Visual hacking is a growing problem and 3M is investing in technology that can stop prying eyes,” said Herve Gindre, vice president and general manager, Display Materials and Systems Division, 3M. “By integrating our technology into the displays on HP notebooks, businesses will be able to address this concerning security threat and users will be able to get a privacy solution that can easily be switched on to help prevent visual hacking.” Such a feature would be a welcome addition to the security feature arsenal for Windows 10 laptops, which already benefit from additional protection thanks to improvements that are part of the operating system. For example, Windows 10 comes with support for Windows Hello, the new biometric authentication system that allows users to log into their computers with their face just by looking at the PC camera. The feature requires special hardware, so it’s only available on new computers. Obviously, expect the new laptops to be a little bit more expensive when shipped with this new technology, but more details on models to integrate it and pricing info will be provided at a later time. Source