Jump to content

All Activity

This stream auto-updates     

  1. Past hour
  2. I had one for my Mac for backup and archiving all the stuff I got off the net. Reliable as heck, 10 disks for a huge 1GB total of storage, better than 700 floppies. Heaven!
  3. FIX Source: Crash after processing with a certain combination of WinRE and Delete editions tasks Source: WinRE on live install (C:\Windows) handling Settings: Event Viewer channel settings weren’t fully saved to preset for session reload (now needs resaving) Components-Win10_2004: ‘Kernel Debugger’ leftovers Components-Win10_2004: ‘Cortana’ removal Start menu popup delay UPGRADE UI-Translation: Thanks for Korean (Redrabbit) Homepage: https://www.ntlite.com Changelog: https://www.ntlite.com/changelog/ Release Date: February 25, 2020 OS: Windows 7, 8 and 10 Language: Multilingual Download Page: https://www.ntlite.com/download/ DOWNLOAD: ============================== Installer/Portable (32-bit): http://downloads.ntlite.com/files/NTLite_setup_x86.exe Installer/Portable (64-bit) : http://downloads.ntlite.com/files/NTLite_setup_x64.exe ============================== Note: No medicine available.
  4. flash13

    The Final Countdown #7 Continue

  5. Even 25 Years Later, the Iomega Zip Is Unforgettable Homepage : https://www.howtogeek.com/658287/even-25-years-later-the-iomega-zip-is-unforgettable The year is 1995. You’re stuck with slow floppy disks that only hold 1.44 MB of data. But there’s an exciting new technology: Zip drives, which can hold 100 MB and free you from floppy disks! Now, 25 years later, we look back at Iomega’s Zip technology and its history. Did you know some industries still use Zip drives? Why Zip Drives Were Exciting Again, in 1995, when compared with the standard floppy disk, the Zip drive felt like a revelation! It allowed people to back up their hard drives and transfer large files with ease. At launch, it retailed for around $199 (about $337 today, when adjusted for inflation), and the disks sold for $19.95 apiece (about $34 today.) Zip drives were originally available in two versions. One used a Windows- or DOS-based PC’s parallel printer port as its interface. The other used the higher-speed SCSI interface common on Apple Macintosh computers. Zip proved phenomenally successful during its first year on the market. In fact, Iomega had trouble keeping up with the demand for both drives and disks. To celebrate its 25th birthday, let’s take a look at what made Zip so zippy, how the brand changed over time, and what eventually killed it.
  6. scarabou

    The Final Countdown #7 Continue

    741
  7. Microsoft releases Windows 10 builds 17763.1075, 17134.1345 - here's what's new Patch Tuesday was two weeks ago, and that's when all supported versions of Windows 10 got their mandatory monthly cumulative updates. As is common though, Microsoft releases new updates throughout the month, although these updates are optional. Today, cumulative updates are rolling out to Windows 10 versions 1809, 1803, 1709, and 1607. This leaves out the two newest versions, 1909 and 1903, and the oldest version, 1507, which is still supported on the Long-Term Servicing Branch. Version 1511 is the only version of Windows 10 that isn't supported anymore at all, and version 1703 is only supported for Surface Hub. If you're on Windows 10 version 1809, you'll get KB4537818, which brings the build number to 17763.1075. You can manually download it here, and these are the highlights: Updates an issue that prevents the speech application from opening for several minutes in a high noise environment. Improves the accuracy of Windows Hello face authentication. Updates an issue that might prevent ActiveX content from loading. Improves the battery performance during Modern Standby mode. Updates an issue that prevents you from taking a screenshot of a window. Updates an issue that adds an unwanted keyboard layout as the default after an upgrade even if you have already removed it. Updates an issue that prevents users from reactivating their copy of Windows using the product key stored in their Managed Service Account (MSA). Updates an issue that prevents some applications from printing to network printers. There's also a long list of fixes: Addresses an issue that prevents the speech platform application from opening for several minutes in a high noise environment. Improves the accuracy of Windows Hello face authentication. Improves Urlmon resiliency when receiving incorrect Content-Length for a PeerDist response. Addresses an issue that might prevent ActiveX content from loading. Addresses an issue that might cause Microsoft browsers to bypass proxy servers. Improves the battery performance during Modern Standby mode. Addresses an issue that causes the power dependency coordinator (PDC) driver to unnecessarily drain the battery in certain scenarios. Addresses an issue that prevents a user from upgrading or uninstalling some Universal Windows Platforms (UWP) apps in certain scenarios. Addresses an issue that causes attempts to take a screenshot of a window using the PrintWindow API to fail. Addresses an issue that adds an unwanted keyboard layout as the default after an upgrade or migration even if you have already removed it. Addresses an issue that fails to return search results in the Start menu Search box for users that have no local profile. Addresses an issue that causes the installation process to stop when installing Windows on a VMware guest machine that has a USB 3.0 hub attached. Addresses an issue in which re-running PowerShell workflows might fail with compilation errors for long sessions. Improves Event Forwarding scalability to ensure thread safety and increase resources. Addresses an issue in the Windows activation troubleshooter that prevents users from reactivating their copy of Windows using the product key stored in their Managed Service Account (MSA). Addresses an issue that generates an “unknown username or bad password” error when attempting to sign in. This occurs in an environment that has a Windows Server 2003 domain controller (DC) and a Windows Server 2016 or later DC. Addresses an issue with sign in scripts that fail to run when a user signs in or signs out. Addresses an issue that continues to collect IsTouchCapable and GetSystemSku data when they should no longer be collected. Addresses an issue that might cause Direct Access servers to use a large amount of non-paged pool memory (pooltag: NDnd). Addresses an issue in which the WinHTTP AutoProxy service does not comply with the value set for the maximum Time To Live (TTL) on the Proxy Auto-Configuration (PAC) file. This prevents the cached file from updating dynamically. Addresses an issue that prevents some applications from printing to network printers. Addresses an issue that causes the wrong printer name to be selected when you click the Print button in the SQL reporting service. Addresses an issue that might cause a printer to be a hidden device in Device Manager after a restart. Addresses an issue that prevents the Background Intelligent Transfer Service (BITS) from downloading files; the error is “0x80190191.” Addresses an issue that causes the Windows firewall to drop network traffic from Modern apps, such as Microsoft Edge, when you connect to a corporate network using a virtual private network (VPN). Addresses an issue that causes Host Networking Service (HNS) PortMapping policies to leak when the container host is reinstated after a restart. Addresses an issue that causes some systems to stop responding when operating embedded MultiMediaCard (eMMC) storage devices. Addresses an issue that occurs when you try to sign in to Windows during recovery mode. The error, "No administrator accounts are available on this machine", appears. Addresses an issue that prevents you from removing some local users from local built-in groups. For example, you cannot remove "Guest" from the "Guests" local group. Addresses an issue that causes the Local Security Authority Subsystem Service (LSASS) to stop working and triggers a restart of the system. This issue occurs when invalid restart data is sent with a non-critical paged search control. Addresses an Open Database Connectivity (ODBC) issue that causes an infinite loop in the retry logic when there are several lost connections in the connection pool. Addresses an issue that causes queries against large keys on Ntds.dit to fail with the error, “MAPI_E_NOT_ENOUGH_RESOURCES.” This issue might cause users to see limited meeting room availability because the Exchange Messaging Application Programming Interface (MAPI) cannot allocate additional memory for the meeting requests. Addresses an issue that intermittently generates Online Certificate Status Protocol (OSCP) Responder audit events (5125) to indicate that a request was submitted to the OCSP Responder Service. However, there is no reference to the serial number or the domain name (DN) of the issuer of the request. Addresses an issue that prevents Server Message Block (SMB) Multichannel from working within a cluster network that has IPv6 Local-Link addresses. Addresses an issue that might cause Storage Migration Service inventory operations on a Windows Server 2003 source computer to fail in clustered environments. Addresses an issue in which canceling a deduplication (dedup) job to rebuild hotspots prevents other deduplication PowerShell commands from responding. Addresses an issue that causes window ordering to fail after displaying tooltips in the RemoteApp window. Addresses an issue in which the Remote Desktop (RD) Licensing Diagnoser shows an incorrect version of the Remote Desktop Session Host (RDSH) and the Remote Desktop Licensing Server (RDLS). Addresses an issue with certificate validation that causes Internet Explorer mode in Microsoft Edge to fail. There are also a couple of known issues to be aware of: Symptom Workaround Certain operations, such as rename, that you perform on files or folders that are on a Cluster Shared Volume (CSV) may fail with the error, “STATUS_BAD_IMPERSONATION_LEVEL (0xC00000A5)”. This occurs when you perform the operation on a CSV owner node from a process that doesn’t have administrator privilege. Do one of the following: Perform the operation from a process that has administrator privilege. Perform the operation from a node that doesn’t have CSV ownership. Microsoft is working on a resolution and will provide an update in an upcoming release. After installing KB4493509, devices with some Asian language packs installed may receive the error, "0x800f0982 - PSFX_E_MATCHING_ COMPONENT_NOT_FOUND." Uninstall and reinstall any recently added language packs. For instructions, see Manage the input and display language settings in Windows 10. Select Check for Updates and install the April 2019 Cumulative Update. For instructions, see Update Windows 10. Note If reinstalling the language pack does not mitigate the issue, reset your PC as follows: Go to the Settings app > Recovery. Select Get Started under the Reset this PC recovery option. Select Keep my Files. Microsoft is working on a resolution and will provide an update in an upcoming release. Windows 10 version 1803 isn't supported on Home or Pro SKUs, but if you're on Enterprise or Education, you'll get KB4537795, which brings the build number to 17134.1345. You can manually download it here, and these are the highlights: Improves the accuracy of Windows Hello face authentication. Updates an issue that might prevent ActiveX content from loading. Updates an issue that adds an unwanted keyboard layout as the default after an upgrade even if you have already removed it. Updates an issue that prevents some applications from printing to network printers. Here's the full list of fixes: Improves the accuracy of Windows Hello face authentication. Improves Urlmon resiliency when receiving incorrect Content-Length for a PeerDist response. Addresses an issue that might prevent ActiveX content from loading. Addresses an issue that might cause Microsoft browsers to bypass proxy servers. Addresses an issue that adds an unwanted keyboard layout as the default after an upgrade or migration even if you have already removed it. Addresses an issue that causes an error if you open Microsoft OneDrive files on demand when User Experience Virtualization (UE-V) is enabled. To apply this solution, set the following DWORD to 1: “HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\UEV\Agent\Configuration\ApplyExplorerCompatFix.” Addresses an issue that generates an “unknown username or bad password” error when attempting to sign in. This occurs in an environment that has a Windows Server 2003 domain controller (DC) and a Windows Server 2016 or later DC. Addresses an issue with sign in scripts that fail to run when a user signs in or signs out. Addresses an issue that continues to collect IsTouchCapable and GetSystemSku data when they should no longer be collected. Provides live response capability that gives Security Operations (SecOps) immediate access to compromised machines using the Microsoft Defender Advanced Threat Protection (ATP) console (Microsoft Defender Security Center). Improves the accuracy of detection in Microsoft Defender ATP Threat & Vulnerability Management. Addresses an issue that might cause Direct Access servers to use a large amount of non-paged pool memory (pooltag: NDnd). Addresses an issue in which the WinHTTP AutoProxy service does not comply with the value set for the maximum Time To Live (TTL) on the Proxy Auto-Configuration (PAC) file. This prevents the cached file from updating dynamically. Addresses an issue that prevents some applications from printing to network printers. Addresses an issue that prevents the Background Intelligent Transfer Service (BITS) from downloading files; the error is “0x80190191.” Addresses an issue that causes the Windows firewall to drop network traffic from Modern apps, such as Microsoft Edge, when you connect to a corporate network using a virtual private network (VPN). Addresses an issue that intermittently generates Online Certificate Status Protocol (OSCP) Responder audit events (5125) to indicate that a request was submitted to the OCSP Responder Service. However, there is no reference to the serial number or the domain name (DN) of the issuer of the request. Addresses an issue that causes queries against large keys on Ntds.dit to fail with the error, “MAPI_E_NOT_ENOUGH_RESOURCES.” This issue might cause users to see limited meeting room availability because the Exchange Messaging Application Programming Interface (MAPI) cannot allocate additional memory for the meeting requests. Addresses an issue that corrupts a log file when a storage volume is full and data is still being written to the Extensible Storage Engine Technology (ESENT) database. Addresses an issue with certificate validation that causes Internet Explorer mode in Microsoft Edge to fail. This update only has one known issue: Symptom Workaround Certain operations, such as rename, that you perform on files or folders that are on a Cluster Shared Volume (CSV) may fail with the error, “STATUS_BAD_IMPERSONATION_LEVEL (0xC00000A5)”. This occurs when you perform the operation on a CSV owner node from a process that doesn’t have administrator privilege. Do one of the following: Perform the operation from a process that has administrator privilege. Perform the operation from a node that doesn’t have CSV ownership. Microsoft is working on a resolution and will provide an update in an upcoming release. For Windows 10 version 1709, you'll get KB4537816, bringing the build number to 16299.1717. You can manually download it here, and these are the highlights: Updates an issue that might prevent ActiveX content from loading. Updates an issue that prevents some applications from printing to network printers. Here's the full list of fixes: Addresses an issue that might prevent ActiveX content from loading. Addresses an issue that might cause Microsoft browsers to bypass proxy servers. Addresses an issue that generates an “unknown username or bad password” error when attempting to sign in. This occurs in an environment that has a Windows Server 2003 domain controller (DC) and a Windows Server 2016 or later DC. Provides live response capability that gives Security Operations (SecOps) immediate access to compromised machines using the Microsoft Defender Advanced Threat Protection (ATP) console (Microsoft Defender Security Center). Improves the accuracy of detection in Microsoft Defender ATP Threat & Vulnerability Management. Addresses an issue that might cause Direct Access servers to use a large amount of non-paged pool memory (pooltag: NDnd). Addresses an issue in which the WinHTTP AutoProxy service does not comply with the value set for the maximum Time To Live (TTL) on the Proxy Auto-Configuration (PAC) file. This prevents the cached file from updating dynamically. Addresses an issue that prevents some applications from printing to network printers. Addresses an issue with certificate validation that causes Internet Explorer mode in Microsoft Edge to fail. This update has the same known issue as the update for version 1803. Finally, Windows 10 version 1607 is only supported in the Long-Term Servicing Branch and for Windows Server 2016 customers, but those users will get KB4537806, bringing the build number to 14393.3542. You can manually download it here, and there's just one highlight: Updates an issue that prevents some applications from printing to network printers. Here's the full list of fixes: Addresses an issue that might cause Microsoft browsers to bypass proxy servers. Addresses an issue that propagates shared folder permissions incorrectly to parent folders after an administrator makes changes on the host system to shared subfolders that are not in the Users directory. Addresses an issue in which re-running PowerShell workflows might fail with compilation errors for long sessions. Improves Event Forwarding scalability to ensure thread safety and increase resources. Addresses an issue that generates an “unknown username or bad password” error when attempting to sign in. This occurs in an environment that has a Windows Server 2003 domain controller (DC) and a Windows Server 2016 or later DC. Addresses an issue that causes Transport Layer Security (TLS) sessions to fail with the error, "The request was aborted: Could not create SSL/TLS secure Channel." Addresses an issue that prevents some applications from printing to network printers. Addresses an issue that prevents the Network Policy Server (NPS) accounting feature from functioning. This occurs when NPS is configured to use SQL for accounting with the new OLE (compound document) database driver (MSOLEDBSQL.dll) after switching to TLS 1.2. Addresses an issue that causes Security Assertion Markup Language (SAML) errors and loss of access to third-party apps for users who do not have multi-factor authentication (MFA) enabled. Addresses an issue that intermittently generates Online Certificate Status Protocol (OSCP) Responder audit events (5125) to indicate that a request was submitted to the OCSP Responder Service. However, there is no reference to the serial number or the domain name (DN) of the issuer of the request. Addresses an issue with the spell checker in RemoteApp. This issue prevents the spell checker from using the locale language the user selects when there is a mismatch between the locale setting and the keyboard layout of the local or client machine. For example, the issue occurs if using a Dutch locale language with the United States-International keyboard layout; the spell checker incorrectly uses the English language instead of the locale language (Dutch) configured in the OS. Addresses an issue with certificate validation that causes Internet Explorer mode in Microsoft Edge to fail. This update has two known issues: Symptom Workaround After installing KB4467684, the cluster service may fail to start with the error “2245 (NERR_PasswordTooShort)” if the group policy “Minimum Password Length” is configured with greater than 14 characters. Set the domain default "Minimum Password Length" policy to less than or equal to 14 characters. Microsoft is working on a resolution and will provide an update in an upcoming release. Certain operations, such as rename, that you perform on files or folders that are on a Cluster Shared Volume (CSV) may fail with the error, “STATUS_BAD_IMPERSONATION_LEVEL (0xC00000A5)”. This occurs when you perform the operation on a CSV owner node from a process that doesn’t have administrator privilege. Do one of the following: Perform the operation from a process that has administrator privilege. Perform the operation from a node that doesn’t have CSV ownership. Microsoft is working on a resolution and will provide an update in an upcoming release. As always, you can install these updates manually, but you can also get them via Windows Update. They won't be installed automatically though. You'll need to go into Windows Update and choose to install the optional updates. If you choose not to take them, these fixes will be bundled into next month's Patch Tuesday updates. Source: Microsoft releases Windows 10 builds 17763.1075, 17134.1345 - here's what's new (Neowin)
  8. rushdie

    Windows Spy Blocker 4.28.0

    Windows Spy Blocker is a set of rules to block Windows spy / telemetry based on multiple tools to capture traffic. It is open for everyone and if you want to contribute, take a look at the Wiki. Windows Spy Blocker is a single executable to block spying and tracking on Windows system. The approach of this project is to capture and interpret network traffic based on a set of tools. Depending on the interactions between services and source or destination of traffic, rules are created and sorted by assignment. . Most malicious content is delivered through the information superhighway nowadays, so it’s highly recommended to take your security measures seriously. An antivirus solution alone can barely keep up with everything going on, that’s why programs like Windows Spy Blocker want to make things easier by blocking access to potentially harmful domains. Intuitive descriptions guide you along the way The application saves you the time and effort required to go through a setup process, so you benefit from all it has to offer from the moment download is done. This allows you to carry it on a removable thumb drive in case you want to add Firewall rules to other computers than your own. Management options are delivered through a command-line interface, but this gives you little to no accommodation problems, especially because of the detailed descriptions found along the way. Menus are comfortable, and you can always recall menu commands in case they’re out of sight or unsure on what to do next. View rule status, install, and remove There are a couple of default functions you can use to enhance the security of your computer. On the one hand, the application can deploy a set of Firewall rules dedicated to Windows 7, 8.1, and 10, which block access to various domains which are potentially harmful. You can view the status of the rules at any moment and even remove them. On the other hand, there’s the NCSI (Network Connectivity Status Indicator) function, which can deploy Windows Spy Blocker or Microsoft NCSI rules. These can also be removed on demand, and there’s also a function with which to test your Internet connection. Last but not least, the dev section comes in handy for analyzing results and log files. Although devoid of any particular usage on its own, it’s dedicated for working with Proxifier, Sysmon, and Wireshark if installed on your computer. These tools can be used to extract log data, and there’s also a general differences analyzer to be used with results from all previously mentioned third-party tools. OS: Windows 7, 8.1, 10 (32bit and 64bit) Homepage: https://github.com/crazy-max/WindowsSpyBlocker Usage: https://github.com/crazy-max/WindowsSpyBlocker/blob/master/doc/usage.md Changelog: https://github.com/crazy-max/WindowsSpyBlocker/releases v4.2.6 :: February 25, 2020 Update hosts for extra and spy rules Update IPs for extra and update rules Update libs Download Executable: https://github.com/crazy-max/WindowsSpyBlocker/releases/download/4.28.0/WindowsSpyBlocker.exe
  9. Microsoft's new Edge browser is now rolling out to Release Preview Windows Insiders On January 15, Microsoft officially released the new version of the Edge browser, based on the open-source Chromium project. On that day, the company also announced its plans to make the roll out the new browser automatically to Windows 10 users. Now, the first phase of this gradual rollout is underway, as Microsoft has announced that the new Edge browser is now starting to roll out to Windows Insiders in the Release Preview ring. The rollout will continue to expand to everyone in this ring, and at some point, it should be available to the general public. Enterprise and education users won't get the browser automatically, though, at least for now. Of course, if you don't want to wait for it to roll out automatically, you can always download the browser from the official website, and it will still replace the legacy version. Recently, Microsoft rolled out version 80 of the browser, meaning it now runs natively on ARM64 devices like the Surface Pro X. Benchmarks have also shown that the new browser is noticeably faster than the legacy version of Edge. The next version will naturally be number 81, which was released in the Beta channel last week. That means there are about five more weeks to go until it arrives in the stable channel. Source: Microsoft's new Edge browser is now rolling out to Release Preview Windows Insiders (Neowin)
  10. And also how to dealt with after sales support, even when warranty of it expires. Knowing that repairing cost can be much higher than ordinary Iphone 11.
  11. Gmail Is Catching More Malicious Attachments With Deep Learning Users of Gmail get 300 billion attachments each week. To separate legitimate documents from harmful ones, Google turned to AI—and it’s working. Photograph: Getty Images Distributing malware by attaching tainted documents to emails is one of the oldest tricks in the book. It's not just a theoretical risk—real attackers use malicious documents to infect targets all the time. So on top of its anti-spam and anti-phishing efforts, Gmail expanded its malware detection capabilities at the end of last year to include more tailored document monitoring. Good news, it's working. At the RSA security conference in San Francisco on Tuesday, Google's security and anti-abuse research lead Elie Bursztein will present findings on how the new deep-learning scanner for documents is faring against the 300 billion attachments it has to process each week. It's challenging to tell the difference between legitimate documents in all their infinite variations and those that have specifically been manipulated to conceal something dangerous. Google says that 63 percent of the malicious documents it blocks each day are different than the ones its systems flagged the day before. But this is exactly the type of pattern-recognition problem where deep learning can be helpful. Currently 56 percent of malware threats against Gmail users come from Microsoft Office documents, and 2 percent come from PDFs. In the months that it's been active, the new scanner has increased its daily malicious Office document detection by 10 percent. "Ten percent matters," Bursztein told WIRED. "We're trying to close the gap as much as possible. We want to keep adding machine learning everywhere we can, where it makes sense. Machine learning does amazing things sometimes, but sometimes it’s overhyped. We try to use it as an extra layer rather than the only layer. We think that works way better." The document analyzer looks for common red flags, probes files if they have components that may have been purposefully obfuscated, and does other checks like examining macros—the tool in Microsoft Word documents that chains commands together in a series and is often used in attacks. The volume of malicious documents that attackers send out varies widely day to day. Bursztein says that since its deployment, the document scanner has been particularly good at flagging suspicious documents sent in bursts by malicious botnets or through other mass distribution methods. He was also surprised to discover how effective the scanner is at analyzing Microsoft Excel documents, a complicated file format that can be difficult to assess. Though a 10 percent detection increase may not sound like a lot, it's a massive improvement at the scale Google is working on, and any gains are productive given that the threat of malicious documents is a real concern around the world. Bursztein says that companies and nonprofits are three times more likely to be targeted by malicious documents than other organizations, and that government entities are five times more likely. Some industries are more likely than others to be targeted, as well. Transportation and critical infrastructure utilities, for example, have a much higher risk than the education sector. The prevalence of malicious document attacks varies around the world, but for attackers the approach is always an option. Bursztein points out that kits for crafting malicious documents and tailoring them to evade antivirus scanners are readily available in online criminal forums, ranging in price from about $400 to $5,000. While the scanner is catching more malicious documents than ever, Bursztein and his colleagues will continue to refine it in the hopes of blocking an even bigger chunk of the malware sent to Gmail accounts worldwide. "Malware is something we did after spam and phishing, because malware is a bit harder," he says. "We don't have the malware itself in an email; the documents are all we have at that point. But we always want to improve our detection capabilities and with malicious documents we chose the one where we could make the most impact for our users." When a full-blown hack is just a rogue Word document download away, users will take whatever extra protections they can get. Source: Gmail Is Catching More Malicious Attachments With Deep Learning (Wired)
  12. Today
  13. Google patches Chrome zero-day vulnerability currently being exploited Google has released an update for Chrome that patches three security bugs, one of which is a zero-day vulnerability that is currently being exploited. The vulnerability, under the identifier CVE-2020-6418, was discovered by Clement Lecigne, a member of Google's Threat Analysis Group, on February 18. While it is known that the vulnerability is being exploited in the wild, information on how it is being used is not public yet. The vulnerability has been patched in Chrome version 80.0.3987.122. The update is rolling out to all Windows, Mac, and Linux users. However, it is not known when an update with the patch will make it to the mobile versions of the browser. As for the vulnerability itself, it is described as a ‘type confusion in V8’. V8 is Chrome’s component responsible for processing JavaScript code. Type confusion refers to a logical bug that occurs when a program accesses resources using an incompatible type, leading to logical errors. The vulnerability, when exploited, can allow attackers to run unrestricted code on the affected applications. The search giant patched Chrome’s first zero-day vulnerability back in March 2019 when it disclosed the security risk along with a vulnerability in Windows 7. Since the patch fixes a zero-day that is currently being exploited in the wild, it is best for users to update their browsers to the latest version (80.0.3987.122). You can download the update using the offline installer here, or head to the three-dot menu on Chrome > Help > About Google Chrome, and force the update. Source: Clement Lecigne (Twitter) via ZDNet Source: Google patches Chrome zero-day vulnerability currently being exploited (Neowin)
  14. flash13

    The Final Countdown #7 Continue

  15. OneDrive for Android finally receiving dark mode as part of design refresh The OneDrive app on iOS received a major design refresh back in July 2019 that brought with it a new header, improved navigation and search, and new colors. The web version of OneDrive too saw a Fluent Design refresh in late 2018. Now, the Android app is receiving a fresh coat of paint with improved icons, updates that increase legibility, and dark mode. The first subtle yet welcome improvement is that to the files view. The list and grid views are receiving new icons and borders to the icons that bring a sense of depth. The firm says that it has also revised the font size and spacing between the files to improve legibility. Additionally, the scan icon has now been replaced with a camera icon to reduce ambiguity about its function. Another major feature that is making it to the Android version of the app is Dark Mode. The Redmond giant states that dark mode for the app on Android was the highest-rated and most requested on the OneDrive UserVoice. Dark Mode is beginning to roll out to all business and personal accounts starting today. The design refresh is also bringing with it an improved search experience. A new toggle to search between only the users’ files and all files, including the ones in the users’ hared libraries in SharePoint, has been added. In addition to the improvements to search, the app is receiving ‘Recent files’ experience that is available on iOS and the web. The ‘Recent’ tab automatically surfaces all recently added/accessed files, including scanned PDFs and documents. Next up, the PDF annotation tool is receiving usability improvements that make it easy to find the annotation tools. Pens, highlighters, and the eraser are now placed at the bottom of the screen. There are enhancements to the Notes feature that improve performance and make it easier to select the note color. Lastly, the Signature feature is being improved with a larger area for users’ signatures and smoother pen strokes. For those that loved the ‘On this day’ feature, it is making a comeback on the Android app. The feature is situated in the Photos tab and surfaces photos uploaded/clicked on that specific day in the past. While some users might have begun seeing it already, it should be rolling out to more users with this refresh. The design refresh should begin rolling out to all Android users gradually. You can head to the Google Play Store here to download the app. Source: OneDrive for Android finally receiving dark mode as part of design refresh (Neowin)
  16. Fraidycat is a fantastic new app for keeping tabs on your favorite internet gems The free app (and browser extension) is like a super-powered RSS feed Keeping up to speed with the galactic firehouse of daily internet detritus that gets blasted at our eyeballs every minute of every day can be a taxing endeavor. It often involves using RSS readers, Twitter lists, YouTube and Twitch channel notifications, and all-too-frequent email inbox refreshing, among dozens of other methods for staying on top of your favorite internet oddities and sifting through all the junk to find them. Thankfully, something like Fraidycat now exists. A free, open source tool released late last year and significantly updated just yesterday, Fraidycat works as a browser extension for Chrome and Firefox or as an app for Windows, Mac, and Linux. It bundles together all of your favorite internet stuff into one easy-to-read page, much like a super-powered RSS reader. The best part is that it’s not algorithmic like the Social Network That Shall Not Be Named. You just drop a link to a favorite website, label it appropriately, and it pops up on Fraidycat under the tab you want it under and refreshes only as often as you like. The service looks, and feels, like something designed from a bygone internet era that wasn’t dominated by unregulated tech conglomerates with monopolistic holds on the attention economy. And that’s the point. “Magazines of the past kept us up to date with hundreds of people — celebrities and powerful names. The thing that excited me about the internet was that I could keep up with a whole lot of unknown but wonderfully interesting people,” says creator Kicks Condor in a YouTube video explaining the purpose of Fraidycat. “However, I don’t want some giant news feed of everything. Why is it the current obsession to just dump everything everyone is saying right in your face? I don’t want a giant noisy feed that’s dominated by anyone who posts the most frequently or, worse, the most flagrantly.” Image: Kicks Condor Condor says the point of Fraidycat is to create a sense of nostalgia for a younger, more innocent internet — and to be a useful way to recreate that. “Personal websites were like your home. It wasn’t this busy bustling street corner full of traffic noises and street vendors, or security cams. It was just your stuff, perhaps sloppily hoarded in disarray, but yeah — like a home. Think of watching TV in your bedroom.” Fraidycat, he says, is your “window on the world.” Say you want to know what a small, niche YouTuber you like has posted in a single week, but you’d rather know what your favorite tech blog posts every day. You can organize your Fraidycat lists to separate those out, so it’s easy to jump between either based on the frequency or by the individual tags you’ve given each respective item. (You can even use emoji as tags.) Fraidycat will pull new info every five to 10 minutes as it comes in for items designated real-time and once every one to hours for daily ones. (There’s also self explanatory weekly, monthly, and yearly options.) For me personally, I’m getting into mechanical keyboards, and Fraidycat is turning out to be a great way to organize the various subreddits, YouTube channels, and online stores I now find myself frequenting for new build guides and rare product drops. I also like a lot of specific Instagram accounts related to the hobby, but there’s no easy way to gather a custom Instagram feed on the web in a way similar to a Twitter list that makes it easy to jump to new posts and check in your favorite accounts. Yet Fraidycat is remarkably good at it. You can check out the Fraidycat code on Github here, and there’s desktop app versions of the service if you’re into that, although those don’t support sync between various computers. (The browser extension versions sync across devices using your Chrome or Firefox account.) You can also check out the service’s dedicated blog for some of Condor’s planned changes, including a visual overhaul apparently in the works. It’s really neat, and I’m already finding it a much more deliberate and less distracting way of surfing the modern web that doesn’t just involve me mindlessly refreshing social feeds and closing and opening various browser tabs like a rat in a maze. Less Facebook and more Fraidycat. Source: Fraidycat is a fantastic new app for keeping tabs on your favorite internet gems (The Verge)
  17. Directory List & Print is a software tool for Windows™ and enables listing and printing the content of any directory in a simplest way. In addition, the file lists can be formatted, filtered, saved to several file formats and also be further processed (delete/copy/move files). By copying to the clipboard the lists can be exported into other programs or opened directly in Word™ and Excel™. The Free Version (Freeware) has all the basic features included, the Pro Version (Shareware) provides interesting additional features. Features: Features (Pro Version only): OS: XP/Vista/7/8/10 Homepage: https://www.infonautics-software.ch/directorylistprint/ Changelog: https://www.infonautics-software.ch/directorylistprint/changelog/ v4.05 :: New: For printing and PDF output, the page margins can be adjusted and a title line and footnote can be defined (with time variables and page numbers). New: Display of file size of files with automatic range selection (Bytes, KB, MB, GB). Improved: Always displaying numerical values with locally set decimal signs and thousands separators, with the additional option of explicitly displaying the numerical values in other international formats. (In Excel, the numbers are always displayed according to the Excel settings, so that they retain their numerical function.) Download Page: https://www.infonautics-software.ch/directorylistprint/download/ Download: Installers: Installer (English): https://www.infonautics-software.ch/downloads/DirectoryListPrintEN.zip Installer (German): https://www.infonautics-software.ch/downloads/DirectoryListPrintDE.zip Installer (French): https://www.infonautics-software.ch/downloads/DirectoryListPrintFR.zip Installer (Dutch): https://www.infonautics-software.ch/downloads/DirectoryListPrintNL.zip Installer (Italian): https://www.infonautics-software.ch/downloads/DirectoryListPrintIT.zip Installer (Portuguese-BR): https://www.infonautics-software.ch/downloads/DirectoryListPrintBR.zip Portables: Portable (English): https://www.infonautics-software.ch/downloads/DirectoryListPrintPortableEN.zip Portable (German): https://www.infonautics-software.ch/downloads/DirectoryListPrintPortableDE.zip Portable (French): https://www.infonautics-software.ch/downloads/DirectoryListPrintPortableFR.zip Portable (Dutch): https://www.infonautics-software.ch/downloads/DirectoryListPrintPortableNL.zip Portable (Italian): https://www.infonautics-software.ch/downloads/DirectoryListPrintPortableIT.zip Portable (Portuguese-BR): https://www.infonautics-software.ch/downloads/DirectoryListPrintPortableBR.zip Med.:
  18. Karlston

    CDC tells Americans to brace for coronavirus

    Could the US Contain a Coronavirus Outbreak? The World Health Organization has urged other nations to learn from China's handling of the Covid-19 epidemic. But would an aggressive quarantine work here? A World Health Organization team found that the measures imposed by Chinese officials—which relied primarily on quarantines, social distancing, and tracing known contacts of Covid-19 patients—may have saved hundreds of thousands of people from infection.Photograph: Getty Images For weeks, the world has watched as China has taken increasingly extreme measures to try to slow the spread of a deadly new coronavirus that emerged there in December. As diagnoses of the disease, named Covid-19, exploded in late January, Chinese officials took the unprecedented step of locking down the regions of Hubei province at the center of the epidemic. Since then, tens of millions of people have been living under government-imposed quarantine, forced to stay in their homes or rounded up into makeshift field hospitals. Disease-response experts in the US have puzzled over these escalating efforts—a public health playbook ripped from the era before drugs and vaccines (and air travel). There’s no evidence, they’ve said, that such large-scale quarantines will work. But now, a delegation of international experts dispatched to China to assess the effectiveness of its aggressive response has reached a different conclusion. And as new cases have surged outside of China in recent days, public health officials in the US are contemplating whether they’ll have to go to similar lengths. After two weeks on the ground in China, a team sent by the World Health Organization determined that the epidemic there is now slowing, having peaked between January 23 and February 2. Since the WHO mission arrived two weeks ago, official case counts have fallen from 2,500 new infections per day to 416—an 80 percent decline. Led by Canadian epidemiologist Bruce Aylward, the team found that the measures imposed by Chinese officials—which relied primarily on quarantines, social distancing, and tracing known contacts of Covid-19 patients—may have saved hundreds of thousands of people from infection. “There’s no question that China’s bold approach to the rapid spread of this new respiratory pathogen has changed the course of what was a rapidly escalating—and continues to be a deadly—epidemic,” Aylward told reporters Monday at a press conference organized by the Chinese National Health Commission in Beijing. Epidemiologists at Imperial College London and Hong Kong University have questioned the reliability of the Chinese government’s data that’s being used as evidence of a slowdown, citing recent changes to how individuals are officially diagnosed, testing kit shortages, and the potential for political corruption. There’s plenty of reason to doubt the official numbers—Chinese officials initially covered up the virus and arrested whistle-blowers who tried to expose the outbreak. Aylward acknowledged these concerns on Monday, but added: “The decline that we see is real.” The team has presented a 45-page report to the WHO with recommendations about how China’s experience should inform future efforts to slow the spread of the new virus, Aylward said. The report has not yet been made public, but Aylward alluded to its contents during the press conference, suggesting that it’s time leaders in other nations think about employing similarly extreme tactics, instead of hoping experimental drugs and vaccines—which are still in development—will save the day. “People look at it and say, ‘That wouldn’t work here or there.’ But we have to work with what we have, and we have to work fast,” he said. “And what this country has demonstrated is this can work.” Even if such draconian quarantine measures really do slow Covid-19’s spread, could countries without an authoritarian government and a collectivist culture pull them off? Italy is already trying. Government officials there have quarantined citizens in 11 towns across the northern region of Lombardy, where an outbreak emerged suddenly over the weekend. On Tuesday, the number of confirmed cases had risen to 283 with seven deaths, said Angelo Borrelli, the head of the Civil Protection Agency and coordinator of the country’s coronavirus emergency response. It’s Europe’s first major outbreak of Covid-19, and the third worst in the world, after China and South Korea. Scrambling to limit further spread, Italian officials on Sunday issued orders closing schools and museums, canceling sporting events and other large gatherings, suspending passenger and freight travel in and out of the region, and closing most businesses, with the exception of some pharmacies and grocery stores. About 50,000 residents remain under lockdown, unable to leave the newly established “red zone” for the next two weeks. But public health law experts in the US say there’s no way such an aggressive regional quarantine could happen here. “A mass cordon sanitaire of the kind we’ve seen in China would be completely unthinkable in the US,” said Lawrence Gostin, a professor of global health law at Georgetown University. (“Cordon sanitaire” is a centuries-old French term for restricting the movement of people to prevent the spread of disease.) For one thing, he says, it would probably be illegal. Quarantine laws in the US date back to the 1700s, during America’s colonial era, and most states have updated versions of those laws on the books, said Gostin, who wrote model legislation for many of these states’ public health and emergency health powers acts in the wake of 9/11 and the ensuing anthrax attacks. Those laws have limits; they only allow the government to involuntarily isolate people who are actively contagious and a danger to society. That’s why local public health departments only have the authority to order citizens to stay home if they are infected with certain dangerous diseases. New York City still quarantines people for tuberculosis, and Los Angeles has periodically enacted small-scale quarantines during measles outbreaks. But a blanket quarantine of whole counties, cities, or even zip codes made up of mostly healthy people—like China and Italy have done—would amount to a mass and indiscriminate violation of Americans’ civil liberties, he argued. “No court would ever allow it,” added Gostin. What about the possibility of an executive order from the White House ordering a quarantine? Gostin said that in a federalist system like the US, which prioritizes states’ rights, the lawfulness of such an order would depend on whether or not the state wished to have such a quarantine. “The federal government would be on weak legal grounds if it sought to enforce a state order against the state’s wishes,” he notes, but it would be on firmer turf if the state government had invited the help. “The bottom line is that states under the Constitution are sovereigns, and the federal government cannot force them to act or accept help. But the federal government can incentivize cooperation through funding, for example.” The logistics of coercively quarantining an entire city or county would be another challenge. “If San Francisco’s mayor declared a quarantine tomorrow, do you know what most people’s response would be?” said Wendy Mariner, a professor of health law at Boston University. “To get the heck out of there.” Unlike in China, where intrusive surveillance and an authoritarian police presence enable large-scale social control, public health officials in America have to contend with a much less obedient (and much better armed) populace. “We have far more choice in rejecting government recommendations here in the US,” added Mariner. What Mariner said is lacking from the quarantine conversation are policies that would make it possible for people to stay home voluntarily. In addition to making sure they had access to food, water, and medications, such a strategy would require some kind of government subsidy to cover lost pay for people who work minimum wage jobs and can’t telecommute. “Rather than leaping to the most coercive measures, we need to enable people to stay at home of their own volition." On Tuesday, a top US health official urged the American public, for the first time, to begin preparing for “severe” disruption to their daily lives. Nancy Messonnier, director of the CDC’s National Center for Immunization and Respiratory Diseases, told reporters during a conference call that the agency now believes a sustained US outbreak of the coronavirus is likely inevitable. “The data over the last week showing the spread of Covid-19 in other countries has raised our concerns and raised the expectation that we are going to have community spread here,” she said. In addition to Italy, South Korea, and Iran are both experiencing explosive new outbreaks, suggesting that the coronavirus is picking up steam elsewhere in the world, even as it slows down in China, where more than 77,000 people so far have gotten sick and 2,663 have died. In the US, 14 people who’ve traveled from China, or their close contacts, have so far been diagnosed. Another 43 US residents returning from other parts of the world have been infected and since repatriated and quarantined, Messonnier said. Most of them caught the virus onboard the ill-fated cruise ship Diamond Princess. On Monday, the White House sent lawmakers a request for $2.5 billion in emergency funding that would pay to prepare for a potential coronavirus outbreak. The funds would also go to accelerating vaccine development and procuring equipment and supplies, a White House budget office spokeswoman told the Associated Press. Democrats in Congress have said it’s not enough, citing the need for expanding lab capacity, beefing up additional airport screening, and reimbursing the Pentagon, which is currently housing quarantined evacuees from China on several military bases. Since the US Centers for Disease Control and Prevention began quarantining US citizens returning from Hubei earlier this month, nongovernmental groups have been chipping in. The American Red Cross has provided those individuals with support items, including blankets, snacks, and stuffed animals. A spokesperson for the organization declined to answer specifics about supporting additional quarantine efforts, telling WIRED only that it is closely monitoring the evolving situation and working with government agencies and state officials to determine what Red Cross support may be needed in the coming days and weeks. Earlier this month, the US Food and Drug Administration fast-tracked a test developed by the CDC for diagnosing Covid-19. But technical issues with the kits have prevented their wide-scale rollout to the nation’s public health labs. As of Tuesday, only 12 labs in addition to CDC have testing capacity, said Messonnier. While there are currently no vaccines or drugs approved to treat Covid-19, researchers are moving swiftly to identify potential treatments, including a DARPA-backed search for protective antibodies that could be used for short-term protection by health care workers and the families of sick people. According to Messonnier, the CDC is now evaluating non-pharmaceutical measures that could be employed to slow the spread of the virus. Potential interventions include environmental interventions such as surface cleaning and disinfecting, as well as more intrusive social distancing strategies like closing schools, canceling mass gatherings, and asking sick people to voluntarily stay home. She said the agency will be working with state and local public health departments to provide a tailored approach for different locations, depending on the circumstances. In anticipation, Messonier asked citizens to start contacting their employers, health care networks, day care providers, and children’s schools about contingency plans in the event of an outbreak in their community. “I understand this whole situation may seem overwhelming, and the disruption to everyday life may be severe,” she said. “But these are the things that people need to start thinking about now.” Source: Could the US Contain a Coronavirus Outbreak? (Wired)
  19. Karlston

    The internet of tea

    The internet of tea Yorkshire Tea had a bad weekend online, and it explains how we argue on the internet Photo by Matt Dunham - WPA Pool/Getty Images The internet is a place where everyone meets everyone else. It is the site of a billion different micro- and macro-cultures; it is a space where you can find out anything you want, provided humans have come up with it; it is a weirdly temporary repository of our species’s history, which will end when the server lights finally wink off. In historical terms, it’s also very new. The World Wide Web debuted to the general public in August 1991, only 29 short years ago. And because it was a new technology, a kind of public square that felt novel and transformative, things felt lawless, and people began to behave lawlessly, as though the web was a place beyond pro-social norms. Today, that has changed somewhat, if only because now it’s easy for the majority of people to get online: in 2018, 69.6 percent of Americans had a smartphone, which is the way most people access the internet. The other reason for the change was Facebook CEO Mark Zuckerberg’s crusade for a real-name internet because real people are easier to sell to advertisers and because anonymity breeds toxicity. (Less discussed, of course, is pseudonymity: you can get the same social benefits just by having a persistent identity online. But that isn’t quite as lucrative.) Even so, vestiges of the old internecine spats and flame wars spring up now and again, generally with the unlikeliest people and brands centered in the crosshairs. The latest victim was Yorkshire Tea, a black tea blend 14 years older than the net and the current bestselling black tea in the United Kingdom. Last week, Rishi Sunak, Boris Johnson’s chancellor, posted a picture on Twitter of himself with a very large bag of Yorkshire Tea bags. That tweet kicked off a shitstorm of anger at Yorkshire Tea, which hadn’t staged the photo or been involved in any financial way. “Nothing to do with us - people of all political stripes like our brew,” the company wrote in a since-deleted tweet later that day. “Plus there’s no way we’d intentionally stick ourselves in a Twitter storm on a Friday afternoon. It’s nearly hometime!” The angry tweets continued through the weekend, which compelled the brand to tweet an unusually frank call for civility and kindness. It’s a very nice sentiment from a tea brand: don’t forget that there are people behind the usernames, and those people have feelings, too. Even faceless accounts are run by humans who look and think and have the capacity to feel, just as you do. The problem, however, is that it doesn’t matter. Everybody knows that there’s a human on the receiving end of an angry post; that’s why the posts are sent in the first place. They are meant to hurt. But beyond hurt, their point is to shame — because shame can seem like an effective way to change someone else’s behavior. And historically, shaming has been used as a visible way to enforce a community’s standards. As the historian of emotions Peter N. Stearns writes in his book Shame: A Brief History: “An impressive variety of regions, from ancient Egypt onward, displayed people who had misbehaved—from mischievous students who had not done their lessons to adults accused of adultery—in some form of public stocks, where for a few hours, even a few days, the general public could walk past and express their disgust.” (Remind you of anything?) Even so, he writes, because of shame’s power, some people either figured out ways to be welcomed back into their communities or to avoid it in the first place. The problem with public shaming on Twitter — the kind that Yorkshire Tea experienced — is that Twitter isn’t a community at all. It is a mishmash of random groups that form and deform unpredictably and encompass everyone from Juggalos to JNCO enthusiasts. Its context- and community-free nature means that Twitter shaming isn’t usually productive; it makes most targets dig in their heels. So let’s back up for a second. The reason this seemingly innocuous post from Sunak was controversial in the first place is because the chancellor / MP for Yorks is a Tory and a Brexiteer. As a person appointed by Johnson, the current prime minister, Sunak is expected to help cudgel the UK and the rest of Europe into supporting the United Kingdom’s withdrawal from the European Union. As an American, it’s been interesting to watch what’s been happening across the proverbial pond: seeing a culture war from a distance has a way of making the issues and deceptions appear relatively easy to parse. Obviously, that isn’t the case. It’s rare that a culture war is about the material considerations that birth it because they’re mostly about feelings. The Brexit vote was less about funding for the National Health Service and more about nostalgia for an empire the sun never sets on. (The same dynamic is currently playing out in the US Democratic primary for its presidential candidate, and it will play out again as soon as a nominee is decided and we start in on election season in earnest. To put it lightly, Trump and his party are, more than anything, nostalgic.) The online hostility toward Yorkshire Tea, then, can be read as a way for people who are angry about Brexit to vent or express an unfavorable opinion toward the powerful. It’s also a symptom of a capitalist culture that conflates someone’s personality with the things they buy and consume — which itself has become a predictor in the never-ending culture wars. If you like [insert thing], you probably believe [insert belief], right? (It’s the same on Amazon.) And as societies become more politically polarized, the predictive power increases: you buy this brand because it represents this thing. Because the internet operates as a feedback loop, those trends have started happening faster than ever. One example that feels particularly au courant is people involved in the alt-right / alt-light using the “OK” hand gesture to winkingly gesture toward white supremacy — because posters on 4chan decided it would be an excellent way to troll the libs. That meant, eventually, it became both of those things at once. Naturally, this brings us back to tea. Tea isn’t hard to find, not anymore. But it is the original symbol of globalization. More than one war has been fought over those precious leaves, and its trade has opened borders. The Boston Tea Party wouldn’t have happened without the Tea Act in 1773, which was meant to stop tea from being smuggled into America by granting the British East India Company the right to export tea from Britain duty-free to North America — which the colonists still had to pay tax on, according to the Townshend Acts. That conflict, of course, started the American Revolution. Last weekend, Yorkshire Tea found itself at the center of a thoroughly modern phenomenon: its brand was inadvertently associated with politics that a large number of people dislike; a group of people formed on Twitter who might not normally band together but shared the same feelings about Brexit; angry posts were tweeted as a way to shame the brand into saying something in line with the group’s views; the conflict went viral; and here you are now. Anyway, this morning, Chancellor Sunak posted another tweet about tea. It would seem he learned a lesson, although I still think he’s missing the point (even if he’s not digging his heels in), which is: you can’t escape from politics because it is everything now. The deception was that it didn’t matter, that the policies that determine the shape of our lives were anything but incredibly important. In an age of wild and growing inequality, people are starting to realize the way we use power matters — and the internet happens to be the best place to see it. Source: The internet of tea (The Verge)
  20. rushdie

    Xinorbis 8.3.1 Multilingual

    Xinorbis is a simple but powerful hard disk, folder and storage analyzer for use by anyone from the casual user up to network administrators.. It uses a sophisticated mix of graphs, tables and tree displays to give a complete overview of the contents of any hard disk, folder, removable or network drive. It makes it easy to see the contents, structure, file distribution and file composition of a whole hard disk, folder, or mapped network drive. Includes full report creation. Using a sophisticated mix of graphs, tables, and tree displays, Xinorbis gives the user a complete overview of the contents of a hard disk, folder, removable or network drive. It makes it easy to see the contents, structure and file distribution and file composition of a whole hard disk, directory, or mapped network drive. Xinorbis Includes full report creation and is bundled with the Be.HexEditor and options to view a file within the hex editor have been added to all relevant popup-menus. Several additions have been made to Xinorbis to make it operate more efficiently as a "portable application," for more information see the help pages. Xinorbis supports seamless integration with SQlite3 or ODBC for its Folder History data archive. Compare the contents of a hard drive or folder at any time or date. Features: · Analyse a single drive, folder or merge several together in one report · View the results by file type, attributes, size, user (owner) and date · The Folder History feature allows you to compare the contents of a folder or drive at times and dates · In-bullt powerful search engine (+ save results to a file or clipboard) · Find duplicate files (by name and size) · Complex report generation (with many user customisations) with export to HTML, ASCII, CSV or XML · Save reports and tables for later comparison or for inclusion in other documents · Shell support, scan a directory through Windows Explorer OS: Win 10 / 8 / 7 / Vista / XP Home page: http://www.xinorbis.com/ Changelog: http://xinorbis.com/xinorbis/changelog.txt 8.3.1 (26th February, 2020) - Added: New Search manual. I've dumped the web-based search help system and replaced it with a lovely new and updated manual. Updating all of this content is just taking too much time. This new way forward will save me time and ensure everything is up-to-date. - Added: Xinorbis will not count virtual or offline files when calculating sizes of folders/categories/etc. It is still possible to search for them and they will be included in reports, and other exported data. - Added: Added a toggle for the above, a button next to the Folder History toggle. By default all virtual/offline files are ignored. Without this toggle it would be impossible to scan the root folder for such services as OneDrive or Dropbox where the folder is 100% virtual. - Added: Several new file attribute types to the Type tab of Folder Properties: RECALLONOPEN, RECALLONDATAACCESS, and OFFLINE. These are used to represent various types of virtual file not present on the file system. - Added: "Ignore virtual files" option to Exclude Folder dialog. This will ignore any file with either of these file attributes present: RECALLONOPEN, RECALLONDATAACCESS, and OFFLINE. - Added: Checkbox on the Map page to enable/disable highlighting mode. - Fixed: A couple of places where the new colour scheme wasn't implemented 100%. Black text on dark grey is not fun! File Ages and Search Wizard. Download page: http://www.xinorbis.com/downloads.htm Download Installer: 32-bit: http://www.xinorbis.com/XinorbisFree32.exe OR http://www.xinorbis.com/XinorbisPro32.exe 64-bit: http://www.xinorbis.com/XinorbisFree64.exe OR http://www.xinorbis.com/XinorbisPro64.exe Download Portable: 32-bit: http://www.xinorbis.com/XinorbisFree32.zip OR http://www.xinorbis.com/XinorbisPro32.zip 64-bit: http://www.xinorbis.com/XinorbisFree64.zip OR http://www.xinorbis.com/XinorbisPro64.zip Download X.Robot (command-line companion to Xinorbis): 32-bit: http://www.xinorbis.com/X.Robot32.zip 64-bit: http://www.xinorbis.com/X.Robot64.zip
  21. The Samsung Galaxy S20 Ultra’s 120Hz display is a huge battery hog It recharges quickly though, thanks to world's first USB Fast Charger Certification (Image credit: Future) One of the star features of Samsung’s latest Galaxy S20 Ultra flagship smartphone is its ability to run its display at a silky smooth 120Hz, but as discovered by our sister site Tom’s Guide, this optional setting doesn’t play nice with overall battery life. The team conducted a series of tests that compared the beastly 6.9-inch handset’s battery life in both 60Hz and 120Hz refresh rate modes, measuring how long it would last on average while continuously surfing the web with a screen brightness of 150 nits. Tom’s Guide found that the phone’s massive 5,000mAh cell would last on average about 12 hours in the 60Hz mode, but when the same was done in the 120Hz mode, the test results weighed in at just over 9 hours, representing almost 3 hours (or 25%) less battery life than in the default 60Hz mode. A larger battery drain when using this boosted mode isn’t necessarily surprising, but the extent of its impact is worth noting for those trying to eke out extra life from their Galaxy S20 Ultra. As mentioned, the 60Hz mode is enabled by default, and with it you get an increased resolution (3,200 x 1,440 pixels) compared to 120Hz mode (2,400 x 1,080 pixels), so we’d recommend only switching it on when gaming or if you’re not that bothered by a shorter battery life. Officially fast Thankfully, battery-life related news on the S20 Ultra isn’t all bad today, with the USB Implementers Forum (USB-IF) announcing that the Galaxy S20 range of smartphones has just become the first ever to receive its USB Fast Charger Certification. While plenty of handsets have already been released with some form of fast charging, what separates the Galaxy S20 range (according to USB-IF) is its support for the Programmable Power Supply (PPS) feature. In brief, this should allow Samsung’s latest flagships to manage heat more effectively while charging rapidly and, in turn, work more optimally with any third party fast charger... so long as that charger also has the same certification and is able to produce the required current and voltage. Without PPS, the phone and charger aren’t able to effectively communicate with each other in order to determine the maximum speed at which the charger can charge, so instead it would default to a slower, safer option. The certification is great news for the future of fast charging, but at present, there aren’t too many options available that support the Galaxy S20 and S20 Plus 25W fast charging, and even fewer for the Galaxy S20 Ultra’s 45W, so sticking to a Samsung-made charger is still (and perhaps unsurprisingly) recommended. Source: The Samsung Galaxy S20 Ultra’s 120Hz display is a huge battery hog (TechRadar)
  22. Mandatory, but useless — Thanks, Qualcomm: Mandatory 5G means phones now ship with disabled 5G modems Pay for a 5G modem you can never use, thanks to Qualcomm's Snapdragon 865 design. First image of article image gallery. Please visit the source link to see all 7 images. It's Qualcomm's world, and we're all just living in it. Phones are starting to trickle onto the market with Qualcomm's new Snapdragon 865 SoC, and the company's unchecked monopoly power over the mobile industry is really coming to a head with this new chip. Qualcomm is forcing 5G on everyone with the Snapdragon 865, increasing the size, cost, and complexity of smartphones, even if the world's 5G networks are not ready yet. This week, we're seeing an absurd new wrinkle in the Mandatory 5G Saga: manufacturers are sticking to Qualcomm rules and shipping its 5G modems, but they are also disabling them because 5G just doesn't work in some markets. Meet the "iQoo 3." As pointed out by XDA Developers, in India, this phone ships the Snapdragon 865 in a first-ever "4G" configuration. Apparently, BBK subsidiary iQoo does all the work of paying for Qualcomm's mandatory 5G modem, integrating it into the phone design, and then the company just, uh, disables the 5G functionality completely. A phone that ships with some of its modem features disabled is not unusual. Sometimes companies turn off some 4G bands to help region lock phones to certain countries or possibly to save costs. Turning off the 5G bands on a Snapdragon 865 phone is tough to come to terms with, though, because the SoC's design and performance was compromised just to bring this 5G capability to market. Qualcomm rolled back years of SoC progress by building the Snapdragon 865 without an onboard modem, and the only way to give this SoC cellular capabilities is to pair it with an external modem chip, the Qualcomm Snapdragon X55, which adds 4G and 5G connectivity. External modems take up more space, run hotter, and use more power than an onboard modem, and to accept this compromise while also not getting 5G seems like a really bad deal. One reason for the lack of enthusiasm for 5G from iQoo is easy to understand: despite being the world's second-largest smartphone market, India does not have 5G networks. Unlike in places like the United States, where tiny pockets of 5G are slowly being built, India does not have a clear path to 5G. The Indian government set prices to auction off public spectrum for 5G, but Indian carriers say the prices are "prohibitively expensive" and aren't willing to pay the prices to buy the spectrum to begin to build the networks. Besides the conflict over the airways, the situation on the ground is not really settled, either. Most towers in India are not connected to fiber backhaul and probably can't handle the bandwidth demands of 5G. Fixing this requires even more money that the carriers say they don't have. In short, 5G ain't happening anytime soon in India. Enlarge / Enlarge / 2019's Snapdragon 855 offers 4G connectivity in a single, simple package. 2020's Snapdragon 865 has no onboard modem, and it needs an extra chip. Qualcomm / Ron Amadeo Last year, Qualcomm had a more sensible, flexible design for its first-ever 5G compatible chip, the Snapdragon 855. That chip had an integrated 4G modem—needed in every single market—and had a separate 5G modem as an optional extra. 4G connectivity would be more power-efficient than 5G on the Snapdragon 855 because the 4G modem was integrated and the 5G modem was not. This year, Qualcomm "fixed" that power discrepancy by making 4G as bad as 5G and pulled both modems off the main chip. So the iQoo 3 comes in both a 5G version—which, again, cannot possibly be used in the country—and a 4G version. The 4G version comes in two configurations: 8GB of RAM and 128GB of storage for Rs 36,990 ($515) or 8GB and 256GB of storage for Rs 39,990 ($557). The highest-end SKU—12GB of RAM and 256GB of storage for Rs 44990 ($626)—gets to keep the 5G functionality for... bragging rights? International travel? If the 5G chip has to be in the phone anyway, why disable it at all? Does Qualcomm charge less if you buy a 5G chip from the company and then disable it? Does iQoo view the "5G" label on the high-end version as some kind of market segmentation, even though it is completely irrelevant in India? Assuming there is some kind of financial incentive behind disabling 5G on cheaper Snapdragon 865 phones, we will probably see this from more devices. India is the world's second-largest smartphone market (behind China) and is a major battleground for the smartphone manufacturers. If manufacturers want to build a smartphone with the best specs—and they definitely do—Qualcomm hasn't given them a way to do that without also including 5G. There is no standalone 4G-only modem to pair with the Snapdragon 865—it only works with the Snapdragon X55 5G/4G Modem. iQoo is the latest brand launched by BBK, which is a company you can be forgiven for never having heard of. But if you combined the company's various operations, BBK is the world's second or third-biggest smartphone manufacturer. BBK is basically the General Motors of the smartphone world—a company that owns a million sub-brands targeted at various market segments and countries. You won't find a phone branded "BBK" in the market, but you've probably heard of OnePlus, Oppo, Vivo, and/or Realme, which are all brands in the BBK stable. Just like with GM, it's not uncommon for the brands to share technology, parts, and designs. With iQoo going the "disable 5G route," the other BBK sub-brands might find it an appropriate strategy for some devices, too. Another BBK brand, Realme, also took the odd step of launching a 5G phone (the Realme X50 Pro) in India this week. Listing image by iQoo Thanks, Qualcomm: Mandatory 5G means phones now ship with disabled 5G modem (Ars Technica) (To view the article's image gallery, please visit the above link)
  23. Adenman

    PCWinSoft Audio Split & Trim

    Audio Split & Trim is perfect for trimming audio and splitting audio into 2 or more segments. The user interface is as easy as can be, presenting no learning curve at all. http://www.pcwinsoft.com/audio-split-trim/ Terms and Conditions This is a 1-computer lifetime license, for noncommercial use No free updates; if you update the giveaway, it may turn into a trial No free tech support You must download and install the giveaway before the offer has ended Technical Details Developed by PCWinSoft Version is v1.7.3.10 Download size is 10.2 MB Supports Windows 7, 8/8.1, and 10 (32-bit and 64-bit) https://sharewareonsale.com/s/free-pcwinsoft-audio-split-trim-100-discount https://downloads.sharewareonsale.com/files/SharewareOnSale_Giveaway_PCWinSoft_Audio_Split__Trim.exe The download link for PCWinSoft Audio Split & Trim is given to you above. The download for PCWinSoft Audio Split & Trim is an exclusive SharewareOnSale installer with registration built-in. Download and install PCWinSoft Audio Split & Trim; there is no need to register is because we register it automatically when you download from us. Enjoy!
  24. KXR75

    TeamViewer 15.3.2682

    TeamViewer 15.3.2682 MSI Site: https://www.upload.ee Sharecode: /files/11187088/TeamViewerMSI.zip.html
  25. xuzhong

    Avast SecureLine 5.2.438

    Hi ,Thanks, Please send me one personal key.
  26. BTJB

    Internet Download Manager 6.37 Build 3 Beta

    Batch updated to WindowsAddict model and recommend from @yaschir
  27. Call to war — CDC tells Americans to brace for coronavirus WHO's insights from China suggest that the virus can be contained. Enlarge / Team leader of the joint mission between World Health Organization (WHO) and China on COVID-19, Bruce Aylward shows graphics during a press conference at the WHO headquarters in Geneva on February 25, 2020. Getty | Fabrice Coffrini Fresh off a plane from China, epidemiologist Bruce Aylward sat before members of the press at the World Health Organization’s headquarters in Geneva, Switzerland on Tuesday and laid out key insights from the coronavirus front lines. Aylward, a nearly 30-year veteran of outbreak and emergency responses with the WHO, had just led a joint mission through the COVID-19 trenches to appraise the outbreak and China’s control efforts. His assessment was glowing: China had responded swiftly, on a mind-boggling large scale, and with differential outbreak responses tailored to curb disease spread in different settings—from the outbreak’s blazing epicenter in a highly populated city to the spotty disease clusters in rural areas. He pointed to humped graphs of cases over time—they are the shape of an epidemic that has been hobbled, he said. Disease spread has been in decline since the beginning of the month, and doctors in China are honing their ability to treat patients. “If I had COVID-19, I’d want to be treated in China,” he said candidly. Based on the data, China’s massive efforts have been generally successful and indicate that the virus can be contained, Aylward reported. Yet Chinese officials remain vigilant, he added, in case this never-before-seen virus (which has plagued humanity for mere weeks) presents any surprises. While Aylward was impressed with the Chinese government response, he noted early in the briefing that he was also taken by the response of Chinese citizens—their cooperation and individual sense of duty to try to help quash the outbreak. “We spoke to hundreds of people... and they all shared this sense of responsibility, accountability to be part of this,” Aylward said, noting that there didn’t appear to be any government pressure or presence forcing that sense of duty. People were adhering to quarantine protocols on their own, he noted, and medical staff were volunteering to go to the hardest hit areas in Hubei province. “Every person you talk to there has a sense that they’re mobilized, like in a war against this virus,” Aylward said. Call to war The significance of that solidarity and cooperation was not lost on officials in the United States. Just as Aylward was making his remarks in Geneva, officials thousands of miles away at the US Centers for Disease Control and Prevention were making their own wartime rallying cry. In a press conference Tuesday, Dr. Nancy Messonnier, director of the CDC’s National Center for Immunization and Respiratory Diseases, said that the American public and businesses should prepare for the possibility that the new coronavirus will spread in the US. Given the rapid increase of COVID-19 in other countries outside of China in recent days, “we expect we will see community spread in this country,” Messonnier said. “It’s not so much a question of if this will happen anymore, but rather more a question of exactly when this will happen and how many people in this country will have severe illness.” Parents should talk with schools and daycares about outbreak responses and closure plans, and they should ask about tele-school options, she advised. Companies and employees should think about remote working arrangements and alternative childcare. And people should look into the availability of tele-medicine options with their healthcare providers. “I had a conversation with my family over breakfast this morning,” Dr. Messonnier said. “I told my children that, while I didn’t think they were at risk right now, we as a family need to be preparing for significant disruption of our lives.” Practical measures In the event of community spread of the virus, additional measures might also take effect, such as cancellation of mass gatherings, extra sanitation measures, and the delay of elective medical procedures. As always, people should be following good hygiene measures, including washing hands frequently and rigorously, covering coughs and sneezes, staying home when sick, and getting a flu shot. In terms of preparation that public officials should be doing to prepare, Aylward said there were key takeaways from China’s successful responses. “There are really practical things” to prepare, he said, such as making sure that hospital beds are available, isolation measures are in place, health facilities have adequate amounts of ventilators and oxygen, and public health workers are ready to trace contacts of new cases as they’re identified. Aylward also noted that based on the large amount of disease screening that’s been done in China so far, there does not seem to be a huge number of mild cases that are going undetected. And while asymptomatic spread of disease may happen, it does not seem to be a driver of the outbreak, he said. This assessment may dampen concern that the virus will become a pandemic by spreading widely in communities from unrecognized asymptomatic or mild cases. So far, household-level transmission appears to be the main driver of the outbreak, he said. As of Tuesday, the COVID-19 outbreak has reached more than 80,300 cases worldwide, with 2,704 deaths. Source: CDC tells Americans to brace for coronavirus (Ars Technica)
  1. Load more activity
×
×
  • Create New...