Jump to content

Search the Community

Showing results for tags '2016'.

More search options

  • Search By Tags

    Type tags separated by commas.
  • Search By Author

Content Type


  • Site Related
    • News & Updates
    • Site / Forum Feedback
    • Member Introduction
  • News
    • General News
    • FileSharing News
    • Mobile News
    • Software News
    • Security & Privacy News
    • Technology News
  • Downloads
    • nsane.down
  • General Discussions & Support
    • Filesharing Chat
    • Security & Privacy Center
    • Software Chat
    • Mobile Mania
    • Technology Talk
    • Entertainment Exchange
    • Guides & Tutorials
  • Off-Topic Chat
    • The Chat Bar
    • Jokes & Funny Stuff
    • Polling Station

Find results in...

Find results that contain...

Date Created

  • Start


Last Updated

  • Start


Filter by number of...

Found 24 results

  1. Controlling Which Apps Office 2016 Installs So I got a new computer late last year. When setting it up, I thought, "hey, I may as well put the latest Office on it," and got a copy of 2016 "ProPlus," as I use OneNote, Word, Excel, PowerPoint, and Outlook. The setup was incredibly easy, and in fact, I thought, "hmmm... too easy." I let it run and in a trice, it told me that Office was installed. So I looked on my Start Menu, and what do you know, Office installed all of the Office apps. That unfortunately included stuff I don't use and don't want like Publisher, Project and the like. Looking at the Add/Remove apps section of Control Panel offered no options. I uninstalled Office, paid closer attention as I re-installed it, and still... no choices. A few hours later, I discovered how to get Office to install but a few apps rather than gooping up my drive with the other junk. Basically the trick is to copy the install files to a folder, download the "Office 2016 Deployment Tool" from the Microsoft site, build an XML file (it'll be easy), and run setup — the step-by-steps follow. Get the ProPlus 2016 ISO Create a folder "C:\Officefiles" on your hard drive where you can copy the ISO's contents, as we need to modify it a bit to seize control of our copy of Office. Open the ISO. You'll see two files (autorun.inf and setup.exe) and a folder ("office"). Copy the "office" folder — and not the two other files — to the C:\Officefiles folder. Download the Office 2016 Deployment Tool from http://www.microsoft.com/en-us/download/details.aspx?id=49117> Run the exe. It'll ask where to extract its files — tell it C:\Officefiles . The C:\Officefiles folder will then contain two new files, setup.exe and configuration.xml. Delete that configuration.xml file. Open Notepad and copy the XML text below (starting with "<configuration>" and ending with "</configuration>" into Notepad. If you need a Product Key, replace the bogus value in my example below. (Enterprise customers may not need the line at all — sorry, I don't know as I don't have an Enterprise license for Office.) Save the resulting Notepad contents to c:\Officefiles\configuration.xml: <Configuration> <Add OfficeClientEdition="32" Branch="Current"> <Product ID="ProPlusRetail" PIDKEY="THISD-OESNT-WORKV-XXXXX-X"> <Language ID="en-us" /> <ExcludeApp ID="Access" /> <ExcludeApp ID="Groove" /> <ExcludeApp ID="InfoPath" /> <ExcludeApp ID="OneDrive" /> <ExcludeApp ID="Project" /> <ExcludeApp ID="Publisher" /> <ExcludeApp ID="SharePointDesigner" /> <ExcludeApp ID="Visio" /> </Product> </Add> <Updates Enabled="TRUE" Branch="Current" /> <Display Level="None" AcceptEULA="TRUE" /> <Property Name="AUTOACTIVATE" Value="1" /> <Logging Name="OfficeSetup.txt" Path="d:\OfficeFiles" /> </Configuration> Open an elevated command prompt and type the following: C: CD \OfficeFiles Setup /configure configuration.xml Result: a much trimmer Office install. Of course, you can add things back by removing their appropriate 'ExcludeApp" line in the XML, and if you use 64-bit Office, replace the "32" with "64." Source
  2. Ubisoft 30th Anniversary Giveaway - 7 Full Version Games June Giveaway: Prince of Persia: The Sands of Time July Giveaway: Tom Clancy's: Splinter Cell - Stealth Action Redefined August Giveaway: RAYMAN ORiGiNS September Giveaway: The Crew October Giveaway: Beyond Good & Evil November Giveaway: Far Cry 3: Blood Dragon December Giveaway: Assasin's Creed III To celebrate Ubisoft's 30th anniversary, The Ubisoft Club is offering you seven digital PC games. Every month a new game will be revealed and free to download. Then its yours to keep! The event starts this month of June and will end by December. I'll update this thread whenever new games are added to this promo. Links: Offer: UBI 30(Old Link) or UBI 30(New Link) or UBI 30(Direct Link) Note: Limited Period Offer. The offer game of the month will be open only for limited period/time. So, grab the game. Hurry!!! Steps: Visit any of the Offer link "UBI 30(Old Link)" or "UBI 30(New Link)" above. Click on "GET YOUR FREE GAME ON PC NOW". Optional: You can visit the Offer link "UBI 30(Direct Link)". Select the checkbox "for game age rating" and then click "GET THE GAME NOW" If you already have account, then login. To create a new account, click on "CREATE A UPLAY ACCOUNT". Note: You can't choose country as it is locked. Also, check your mail for email verification once you create account. Now the game is yours! However, it's available in your Uplay PC games library where you can download and play it now! Download Instruction and Info: Download Uplay PC Using the UPlay PC application you can download and install the game. Prince of Persia: The Sands of Time[Size: 1601.15 MB]. Tom Clancy's: Splinter Cell - Stealth Action Redefined[Size: 1970.68 MB]. RAYMAN ORiGiNS[Size: 2712.75 MB]. The Crew[Size: 25 GB]. Beyond Good & Evil[Size: 1955.26 MB]. Far Cry 3: Blood Dragon[Size: 3090.24 MB]. Assasin's Creed III[Size: 15636.8 MB].
  3. Nokia To Smartphone Owners: Malware Infections Are Far Higher Than You Think Nokia warns that mobile malware infections grew dramatically in the second half of 2016. Overall, the monthly smartphone infection rate averaged 0.90 percent, an 83 percent increase over the first half of 2016. Nokia no longer makes mobile devices but it's carving out a new business in mobile and Internet of Things security. Now new research from the unit is reporting a 83 percent rise in monthly smartphone infections in the second half of 2016. Two years ago Verizon challenged assumptions about the spread of mobile malware, reporting that just 0.03 percent of smartphones on its network were infected with 'higher-grade' malware. It was much lower than the 0.68 percent infection rate estimated in Kindsight Security Labs' biannual report. But a new report from Nokia, based on data from mobile networks that have deployed its NetGuard Endpoint Security, suggests infections are actually far higher. According to Nokia, the monthly rate of infections in mobile networks peaked at 1.35 percent in October, and averaged 1.08 percent in the second half of 2016. The average infection rate in the first half was 0.66 percent, translating to a 63 percent rise between the periods. It also measured monthly infections on smartphones and says the average rate was 0.9 percent in the second half, up 83 percent from 0.49 percent in the first half. Over the entire year, it says smartphone infections rose a whopping 400 percent. Nokia's data included around 100 million devices across Europe, North America, Asia Pacific and the Middle East. It says that 81 percent of infections were on Android devices, 15 percent on Windows devices, and four percent on iPhones and other mobile devices. It notes that Windows share of infections it counted shrank from 22 percent in the first half of 2016. Although Nokia's report doesn't exclusively deal with Android, it offers a contrast to Google's assessment of malware infections in its Android Security 2016 Year in Review report, released earlier this month. Google reported Android device infections at 0.64 percent in the first quarter of 2016 growing to 0.77 percent in the second quarter, and then moving to 0.67 percent and 0.71 percent in the third and fourth quarters, respectively. Google's measure is based on the frequency it finds PHAs or potentially harmful applications during a "routine full-device scan" with its Verify Apps Android anti-malware service. Google said since 2014 infections on Android have been less than one percent. It also noted that users were 10 times more likely to download malware from outside Google Play than inside its store in 2016. While Nokia reports that infections on mobile networks are increasing, infections on fixed-line residential networks have been falling since the beginning of 2015, despite a bump in early 2016 due to a surge in adware. Source
  4. Introduction An essential part of earning the trust of our customers is being transparent about the governmental requests we receive. To this end, Cloudflare is now publishing this complete semi-annual Transparency Report on the governmental requests it has received to disclose information about our customers. The data is complete as of December 31, 2016, including requests related to Cloudflare and StopTheHacker. This Report supplants our previous Transparency Reports, which are archived in their entirety. Cloudflare operates a global network and is thus extremely mindful of the responsibility that comes with that privileged position. It is Cloudflare's overriding privacy principle that any personal information you provide to us is just that: personal and private. We will not sell, rent, or give away any of your personal information without your consent. Our respect for our customers' privacy applies with equal force to commercial and to law enforcement requests. Cloudflare's approach to law enforcement requests is that we are supportive of their work; however, any request we receive must strictly adhere to the due process of law and be subject to judicial oversight. It is not Cloudflare's intent to make law enforcement's job harder, nor easier. We respect the work they do and appreciate their assistance in protecting the rights of our customers. It is our policy to notify our customers of a subpoena or other legal process requesting their customer or billing information before disclosure of information. Cloudflare is not subject to foreign jurisdictions and only accepts requests in English from foreign law enforcement agencies that are issued via a U.S. court either by way of a mutual legal assistance treaty (MLAT) or a letter rogatory. We received 4 MLAT requests through the U.S. court system in the second half of 2016. We received 1 FTC Civil Investigative Demand. Some things we have never done Cloudflare has never turned over our SSL keys or our customers' SSL keys to anyone. Cloudflare has never installed any law enforcement software or equipment anywhere on our network. Cloudflare has never terminated a customer or taken down content due to political pressure. Cloudflare has never provided any law enforcement organization a feed of our customers' content transiting our network. If Cloudflare were asked to do any of the above, we would exhaust all legal remedies, in order to protect our customers from what we believe are illegal or unconstitutional requests. The data The data presented below covers the period from July 1, 2016 to December 31, 2016. So, for example, a request received in December 2016, but not processed until January 2017 will show as both "Requests received" and "Requests in process." Also, requests for which we are waiting for a response from law enforcement before moving forward may also be reflected in "Requests in process." The Total # of domains affected and the Total number of accounts affected refer only to requests which have been answered. Subpoenas This category includes any legal process which does not have ex ante judicial review, including but not limited to grand jury subpoenas, U.S. government attorney issued subpoenas, and case agent issued summonses. 1 The one subpoena in process in 2013 was rescinded in 2014. 2 A small number of subpoenas received accounted for 2/3 of domains affected. 3 A small number of subpoenas received accounted for 2/3 of accounts affected. In 2016, production for 1 subpoena order was completed pursuant to Cloudflare's voluntary emergency disclosure policy. In 2016, Cloudflare pushed back on 4 subpoenas, and they were rescinded. In 2015, Cloudflare pushed back on 6 subpoenas, all of which were rescinded. In 2014, Cloudflare pushed back on 7 subpoenas, all of which were rescinded. In 2013, Cloudflare pushed back on 16 subpoenas, all of which were rescinded. In some instances, court orders were issued in lieu of the original subpoena and in other instances, Cloudflare was not able to provide any information. Court orders This category includes any order issued by a judge or magistrate, including but not limited to 18 U.S.C. § 2703(d), 18 U.S.C. § 2705(b), and MLAT orders. Orders which may fall under a more specific category such as search warrants or pen register / trap and trace orders will be reported under the more specific category and not counted here. 1 For one of the court orders in 2013, Cloudflare was not able to provide any information. Counts have been updated to reflect the requests in process in 2013 that were answered in 2014. 2 A small number of court orders received accounted for almost 2/3 of domains affected. 3 A small number of court orders received accounted for almost 2/3 of accounts affected. In 2015, one court order was rescinded, as Cloudflare was not able to provide any information. In 2016, six court orders were rescinded, as Cloudflare was not able to provide any information. Search warrants This category includes only search warrants which require judicial review, probable cause, and inclusion of a location to be searched and a detail of items requested. 1 One search warrant in 2013 was rescinded. Counts have been updated to reflect the requests in process in 2013 that were answered in 2014. 2 A small number of court orders received accounted for almost 2/3 of domains affected 3 A small number of court orders received accounted for almost 2/3 of accounts affected Cloudflare follows the principles laid out in U.S. v. Warshak and requires a valid search warrant before disclosing any customer content sought by law enforcement. Cloudflare is not a hosting provider or an email service provider and does not have customer content in the traditional sense. In the rare instances where law enforcement has sought content such as abuse complaints or support communications, Cloudflare has insisted on a warrant for those electronic communications. To date, we have received no such warrants. Pen register/Trap and trace (PRTT) orders This category includes only pen register/trap and trace orders issued by the court for real-time disclosure of non-content information, including IP address information. Wiretap orders This category includes only wiretap orders that were issued by a court. National security process What we can say in regard to national security orders is highly regulated. In January 2014, the Department of Justice and the Director of National Intelligence announced a change in the rules governing the disclosure of national security orders, including National Security Letters (NSLs) received by a company from the FBI. While an improvement, we still consider the 2014 guidance to be an undue prior restraint on the freedom of speech. These guidelines, now codified as part of the USA FREEDOM Act, allow companies to disclose the number of NSLs and FISA orders as a single number in bands of 250, starting with 0-249. FN1 In February 2013, the FBI served national security letter NSL-12-358696 on Cloudflare, requesting certain customer information. This NSL contained an administratively-imposed gag which prohibited Cloudflare from disclosing information about this NSL to anyone other than our attorneys and a limited number of our staff, under threat of criminal liability. In 2013, Cloudflare objected to the NSL and threatened to sue the U.S. Government to protect its customers’ rights. The FBI soon rescinded the NSL and withdrew the request for information. Cloudflare provided no customer information subject to NSL-12-358696; but nonetheless, the NSL's nondisclosure provisions remained in effect for nearly four years. The FBI delivered to Cloudflare a letter dissolving the 2013 gag order in December 2016. Now that the administrative gag order is no longer in effect, Cloudflare is disclosing receipt of the NSL in our second half 2016 report, along with a redacted copy of the NSL. FN2 Since no information was provided in response to NSL-12-358696, the Total accounts affected figure remains unchanged. Conclusion Given the prominence of our global network, Cloudflare occupies a special position in the Internet at large. Cloudflare is extremely mindful of the position and the responsibilities our customers have placed on us through their trust. While there has been an increase in the number of law enforcement requests since our first transparency report in 2013, this is due in part to the five-fold increase in the number of Cloudflare customer domains in that time period. We will continue to publish this report on a semiannual basis. Please be advised that we may restate data as we go forward as more complete information becomes available or if we change our classifications. This page will always contain the most recent version of our Transparency Report. Archival reports will be available from this page. Source: Cloudflare, Inc. http://www.cloudflare.stfi.re/transparency/?sf=lglrexj
  5. The network security firm said ransomware was the payload of choice for malicious email campaigns and exploit kits in 2016, with Locky claiming the title as the most popular payload globally Ransomware attacks on businesses large and small reached 638 million last year, up from 2015's 3.8 million, network security firm SonicWall has reported. In its 2017 Annual Threat Report, SonicWall said the rise of ransomware in 2016 was unlike anything it had seen in recent years, noting that the 634.2 million instance increase was "meteoric" in nature. "By the end of the first quarter [of 2016], $209 million in ransom had been paid by companies, and by mid-2016, almost half of organisations reported being targeted by a ransomware attack in the prior 12 months," the report said. The ransomware growth was an upward climb throughout the year, SonicWall said, and expected the increase to continue into 2017. The first major spike in ransomware was experienced in March 2016, when attack attempts shot up from 282,000 to 30 million over the course of the month, for a first-quarter total of 30.9 million hits. The report shows the upward trend continued throughout the year, with the fourth quarter closing at 266.5 million ransomware attack attempts. SonicWall attributed the growth of ransomware to easier access in the underground market, which it said was supported by the low cost of conducting a ransomware attack, the ease of spreading it, and the low risk of being caught or punished. "The rise of ransomware-as-a-service (RaaS) made ransomware significantly easier to obtain and deploy," the report said. "Individuals who wanted to profit from ransomware didn't need to be expert coders, they simply needed to download and deploy a malware kit." Typically, RaaS providers offer their malware for free, while SonicWall explained that others charged a flat rate of typically $100. According to SonicWall, another factor driving ransomware was the mass adoption of bitcoin, noting that before the cryptocurrency existed, payments were able to be tracked. Industry verticals were targeted almost equally, SonicWall said, with the mechanical and industrial engineering industry reaping 15 percent of average ransomware hits, followed by a tie between pharmaceuticals and financial services at 13 percent, and real estate claiming 12 percent of the total ransomware hits. Geographically speaking, the report highlighted that companies in the United Kingdom were three times as likely as United States-based ones, despite the US experiencing the highest number of ransomware attacks in 2016. China was flagged as least likely to be targeted, with SonicWall attributing this to the country's restricted access to bitcoin and low usage of Tor. While SonicWall said many victims of ransomware chose not to publicise the attacks, it highlighted several breaches that received attention. The San Francisco Municipal Transit Authority had to open its fare gates in November when a ransomware attack took down its payment and email systems, demanding 100 bitcoins -- the equivalent of $73,000 at the time. Similarly, Hollywood Presbyterian Medical Center in Los Angeles admitted to paying $17,000 in bitcoin to regain access to its data in February 2016; the Lansing Board of Water & Light revealed it had paid ransomware attackers $25,000 in April; and in September, hosted desktop and cloud provider VESK handed over approximately $22,800 in bitcoins as a result of a ransomware attack. "Each of these organisations, and the countless others who were hit with ransomware, faced an urgent and terrifying decision: Whether or not to pay the ransom," the report said. "Those who opted to pay were sometimes able to negotiate a lower ransom to regain access to their systems." Despite paying a ransom, SonicWall explained that in some instances, paying the ransom did not guarantee access to data, as was the case with the Kansas Heart Hospital that was attacked in May 2016. According to the security firm, only 42 percent of victims were able to fully recover their data from a backup. The most popular payload for malicious email campaigns in 2016 was the Locky ransomware, SonicWall said, which was utilised in more than 500 million total attacks throughout the year, compared with second placed Petya, which was only used in 32 million attacks. Locky was most commonly delivered via email as a Microsoft Word document attachment under the guise of an invoice from a vendor requiring payment. When the attachment is opened, the end user would be instructed to enable macros, which would set off a chain reaction leading to the encryption of the user's files and the service of a ransom demand. Locky evolved to become the most notorious ransomware threat during 2016, security vendor Forcepoint also noted, and the second-most common malware threat by November. Although Locky experienced a lull over Christmas, security experts have said it shows no signs of slowing down, with instances of Locky once again on the up. SonicWall officially spun out of Dell Technologies as an independent company in November, with private equity firm Francisco Partners and hedge fund Elliott Management completing the $2 billion acquisition of the technology giant's software arm. By Asha McLean http://www.zdnet.com/article/sonicwall-reports-638-million-instances-of-ransomware-in-2016/
  6. LeeSmithG

    [Outlook 365/2016] Fixed

    I think I repaired Outlook to work correctly with no crashes. I navigated to here: X:\Program Files (x86)\Microsoft Office\root\Office16 X is your location drive, usually C. In search I typed Scanpst.exe and then ran this software. It gave me this: C:\Users\Lee\AppData\Local\Microsoft\Outlook\[email protected] [email protected] is an example of an email, not an actual email account. I ran it and it either repaired the email account or told me it did not need a repair. So I did them all and it also pastes a .bak also in case you change your mind or does still cause errors. I got a fault when opening Outlook, said something wrong with an email .ost so I cancelled repairing it again, removed it and then reinstalled the email. I still have around twenty (20) emails to add, soon as I have sorted out that I will also check if they need a repair. So that's what I did to sort out my problems.
  7. Windows 7 (Not Windows 10) Wins 2016 Stats show Windows 7 dominated the past year And while Microsoft itself also admitted that it was wrong to become so pushy on Windows 10 upgrades, statistics show that despite all of these, it’s still Windows 7 the desktop operating system that was number one last year. NetMarketShare data for 2016 shows that Windows 7 clearly dominated the year despite Microsoft’s push for Windows 10, despite the release of the Windows 10 Anniversary Update, and despite the so many new devices launched with Windows 10. Windows 7 clearly survived the Windows 10 offensive and according to this data, it achieved a market share in 2016 of no less than 49.10 percent, which means that it was running on 1 in 2 PCs across the world. Windows 7 has long powered 50 percent of the world’s PCs, but everyone expected it to collapse following the release of Windows 10. Small impact following free Windows 10 upgrades Windows 7’s performance throughout the year was full of ups and downs, but the lowest market share it dropped to was 47.01 percent in July, so it didn’t actually collapse as so many people projected to happen. The biggest market share was in February when it was at 52.34 percent. Without a doubt, Windows 10 did have an impact on Windows 7’s market share, but its effects were pretty limited. Windows 10 benefitted from the huge adoption boost generated by the free upgrade, but as this promo ended, Windows 7 also started recovering. For example, in July 2016 when Microsoft ended the free upgrade campaign for Windows 10, Windows 7 was running on 47.01 percent of desktop computers across the world, but next month it started increasing by achieving 47.25 percent. The biggest market share post-free Windows 10 upgrades was recorded in October - 48.38 percent. Support for Windows 7 comes to an end in January 2020, and it goes without saying that Microsoft will have a super-difficult job to convince users to upgrade. The next few OS upgrades, such as the Creators Update and the Redstone 3, will be essential for Microsoft’s Windows 10 strategy, as they have the impossible mission of moving users from Windows 7 to the latest OS. Source
  8. Cheatbook-Database 2016 + Updates CheatBook DataBase 2016 - The encyclopedia of game cheats. A die hard gamer would get pissed if they saw someone using cheats and walkthroughs in games, but you have to agree, sometimes little hint or the "God Mode" becomes necessary to beat a particularly hard part of the game. If you're an avid gamer and want a few extra weapons and tools the survive the game, CheatBook DataBase is exactly the resource you would want. - Find even secrets here. Cheatbook-Database - Games, Cheats, Hints, Tips, Walkthroughs, Trainer and Cheat Codes... Cheatbook-DataBase 2016 is a cheats code tracker that makes hints, Tricks, Tips and cheats (for PC, Walkthroughs, Playstation, Playstation 2, Playstation 3, Playstation 4, Sega, Nintendo 64, Nintendo DS, DVD, Gameboy Advance, Gameboy Color, N-Gage, Nintendo DS, XBox, XBox 360, XBox One, iPhone, Gamecube, Dreamcast, Super Nintendo, Wii, Wii U, Sony PSP) easily accessible from one central location. If you're an avid gamer and want a few extra weapons or lives to survive until the next level, this freeware cheat database can come to the rescue. Covering more than 23.150 Games Cheats, this database represents all genres and focuses on recent releases. Games are listed alphabetically in the left-hand window. When you click on a game name, the relevant cheat is displayed in a editor window, with convenient buttons that let you print the selection or save any changes you've made. In the latest past many users of the CheatBook-DataBase and readers of the monthly being published magazine have sent to us small error messages and suggestions for improvement again and again. First of all we say "Thank you very much!" to all of you! Due to this assistance and the permanent sending in of new and revised cheats the Cheatbook is ever increasing and becoming more and more voluminous. Release date: January 10, 2016. Update Release: December 31, 2016. All Cheats inside from the first CHEATBOOK January 1998 until today Supported Operating Systems: Cheatbook-DataBase 2016 is Freeware for Win95/ 98/ 2000/ NT/ XP/ Vista/ Windows 7/ Windows 8/ Windows 10. Screenshots: Installation: Main Program: Unzip the ZIP package. Optionally read "readme.txt" Run "setup-Cheatbook-Database2016.exe" Follow the prompts. Updates: Unzip the ZIP package. Optionally read "readme.txt" Run "cheatbooksetup.exe" It'll extract and open a folder. First instance, it'll auto install, just click on "Direct Update". Note: If you use Vista & later, post first install, when asked for uninstall dialog, cancel it and run the file named "Cheatbook 0x.2016" or "Cheatbook 0x.2017" with admin prompts. To check the installation: Open Cheatbook Database 2016 Main program and click "Update" from Menu and Click on "Update infos". If properly installed, the installed month's issue should show "Green". Repeat the checking with "Run as Administrator" on Main program. It should show Green too. If not repeat the issue install as mentioned in Step 5. Now, click uninstall from extracted folder and click on "Delete All" to complete installation. Downloads: Cheatbook-Database 2016 - 69 MB: Cheatbook Database 2016 - Main Program Cheatbook Issue - Updates: Jan 2016 - 5.7 MB Feb 2016 - 4.2 MB Mar 2016 - 4.5 MB Apr 2016 - 4.4 MB May 2016 - 4.8 MB Jun 2016 - 5.6 MB July 2016 - 5.8 MB August 2016 - 4.9 MB September 2016 - 6.19 MB October 2016 - 5.9 MB November 2016 - 4.8 MB December 2016 - 3.6 MB January 2017 - 6.2 MB -
  9. Secret CIA Assessment Says Russia Was Trying To Help Trump Win White House CIA officials told senators it is now “quite clear” that electing Donald Trump was Russia’s goal. In an interview on Fox News Sunday on Dec. 11, President-elect Trump denied the CIA's assessment. (Victoria Walker/The Washington Post) The CIA has concluded in a secret assessment that Russia intervened in the 2016 election to help Donald Trump win the presidency, rather than just to undermine confidence in the U.S. electoral system, according to officials briefed on the matter. Intelligence agencies have identified individuals with connections to the Russian government who provided WikiLeaks with thousands of hacked emails from the Democratic National Committee and others, including Hillary Clinton’s campaign chairman, according to U.S. officials. Those officials described the individuals as actors known to the intelligence community and part of a wider Russian operation to boost Trump and hurt Clinton’s chances. “It is the assessment of the intelligence community that Russia’s goal here was to favor one candidate over the other, to help Trump get elected,” said a senior U.S. official briefed on an intelligence presentation made to U.S. senators. “That’s the consensus view.” The Post's Ellen Nakashima goes over the events, and discusses the two hacker groups responsible. (Jhaan Elker/The Washington Post) The Obama administration has been debating for months how to respond to the alleged Russian intrusions, with White House officials concerned about escalating tensions with Moscow and being accused of trying to boost Clinton’s campaign. [U.S. government officially accuses Russia of hacking campaign to interfere with elections] In September, during a secret briefing for congressional leaders, Senate Majority Leader Mitch McConnell (R-Ky.) voiced doubts about the veracity of the intelligence, according to officials present. The Trump transition team dismissed the findings in a short statement issued Friday evening. “These are the same people that said Saddam Hussein had weapons of mass destruction. The election ended a long time ago in one of the biggest Electoral College victories in history. It’s now time to move on and ‘Make America Great Again,’ ” the statement read. Trump has consistently dismissed the intelligence community’s findings about Russian hacking. “I don’t believe they interfered” in the election, he told Time magazine this week. The hacking, he said, “could be Russia. And it could be China. And it could be some guy in his home in New Jersey.” The CIA shared its latest assessment with key senators in a closed-door briefing on Capitol Hill last week, in which agency officials cited a growing body of intelligence from multiple sources. Agency briefers told the senators it was now “quite clear” that electing Trump was Russia’s goal, according to the officials, who spoke on the condition of anonymity to discuss intelligence matters. Sen. Lindsey Graham (R-S.C.) says he wants to investigate whether Russia interfered with the 2016 U.S. election, amongst claims that Donald Trump's rhetoric on Russia and Vladimir Putin is too soft. (Peter Stevenson/The Washington Post) The CIA presentation to senators about Russia’s intentions fell short of a formal U.S. assessment produced by all 17 intelligence agencies. A senior U.S. official said there were minor disagreements among intelligence officials about the agency’s assessment, in part because some questions remain unanswered. For example, intelligence agencies do not have specific intelligence showing officials in the Kremlin “directing” the identified individuals to pass the Democratic emails to WikiLeaks, a second senior U.S. official said. Those actors, according to the official, were “one step” removed from the Russian government, rather than government employees. Moscow has in the past used middlemen to participate in sensitive intelligence operations so it has plausible deniability. Julian Assange, the founder of WikiLeaks, has said in a television interview that the “Russian government is not the source.” The White House and CIA officials declined to comment. On Friday, the White House said President Obama had ordered a “full review” of Russian hacking during the election campaign, as pressure from Congress has grown for greater public understanding of exactly what Moscow did to influence the electoral process. “We may have crossed into a new threshold, and it is incumbent upon us to take stock of that, to review, to conduct some after-action, to understand what has happened and to impart some lessons learned,” Obama’s counterterrorism and homeland security adviser, Lisa Monaco, told reporters at a breakfast hosted by the Christian Science Monitor. Obama wants the report before he leaves office Jan. 20, Monaco said. The review will be led by James Clapper, the outgoing director of national intelligence, officials said. During her remarks, Monaco didn’t address the latest CIA assessment, which hasn’t been previously disclosed. Seven Democratic senators last week asked Obama to declassify details about the intrusions and why officials believe that the Kremlin was behind the operation. Officials said Friday that the senators specifically were asking the White House to release portions of the CIA’s presentation. This week, top Democratic lawmakers in the House also sent a letter to Obama, asking for briefings on Russian interference in the election. U.S. intelligence agencies have been cautious for months in characterizing Russia’s motivations, reflecting the United States’ long-standing struggle to collect reliable intelligence on President Vladi­mir Putin and those closest to him. In previous assessments, the CIA and other intelligence agencies told the White House and congressional leaders that they believed Moscow’s aim was to undermine confidence in the U.S. electoral system. The assessments stopped short of saying the goal was to help elect Trump. On Oct. 7, the intelligence community officially accused Moscow of seeking to interfere in the election through the hacking of “political organizations.” Though the statement never specified which party, it was clear that officials were referring to cyber-intrusions into the computers of the DNC and other Democratic groups and individuals. Some key Republican lawmakers have continued to question the quality of evidence supporting Russian involvement. “I’ll be the first one to come out and point at Russia if there’s clear evidence, but there is no clear evidence — even now,” said Rep. Devin Nunes (R-Calif.), the chairman of the House Intelligence Committee and a member of the Trump transition team. “There’s a lot of innuendo, lots of circumstantial evidence, that’s it.” [U.S. investigating potential covert Russian plan to disrupt elections] Though Russia has long conducted cyberspying on U.S. agencies, companies and organizations, this presidential campaign marks the first time Moscow has attempted through cyber-means to interfere in, if not actively influence, the outcome of an election, the officials said. The reluctance of the Obama White House to respond to the alleged Russian intrusions before Election Day upset Democrats on the Hill as well as members of the Clinton campaign. Within the administration, top officials from different agencies sparred over whether and how to respond. White House officials were concerned that covert retaliatory measures might risk an escalation in which Russia, with sophisticated cyber-capabilities, might have less to lose than the United States, with its vast and vulnerable digital infrastructure. The White House’s reluctance to take that risk left Washington weighing more-limited measures, including the “naming and shaming” approach of publicly blaming Moscow. By mid-September, White House officials had decided it was time to take that step, but they worried that doing so unilaterally and without bipartisan congressional backing just weeks before the election would make Obama vulnerable to charges that he was using intelligence for political purposes. Instead, officials devised a plan to seek bipartisan support from top lawmakers and set up a secret meeting with the Gang of 12 — a group that includes House and Senate leaders, as well as the chairmen and ranking members of both chambers’ committees on intelligence and homeland security. Obama dispatched Monaco, FBI Director James B. Comey and Homeland Security Secretary Jeh Johnson to make the pitch for a “show of solidarity and bipartisan unity” against Russian interference in the election, according to a senior administration official. Specifically, the White House wanted congressional leaders to sign off on a bipartisan statement urging state and local officials to take federal help in protecting their voting-registration and balloting machines from Russian cyber-intrusions. Though U.S. intelligence agencies were skeptical that hackers would be able to manipulate the election results in a systematic way, the White House feared that Russia would attempt to do so, sowing doubt about the fundamental mechanisms of democracy and potentially forcing a more dangerous confrontation between Washington and Moscow. [Putin denies that Russia hacked the DNC but says it was for the public good] In a secure room in the Capitol used for briefings involving classified information, administration officials broadly laid out the evidence U.S. spy agencies had collected, showing Russia’s role in cyber-intrusions in at least two states and in hacking the emails of the Democratic organizations and individuals. And they made a case for a united, bipartisan front in response to what one official described as “the threat posed by unprecedented meddling by a foreign power in our election process.” The Democratic leaders in the room unanimously agreed on the need to take the threat seriously. Republicans, however, were divided, with at least two GOP lawmakers reluctant to accede to the White House requests. According to several officials, McConnell raised doubts about the underlying intelligence and made clear to the administration that he would consider any effort by the White House to challenge the Russians publicly an act of partisan politics. Some of the Republicans in the briefing also seemed opposed to the idea of going public with such explosive allegations in the final stages of an election, a move that they argued would only rattle public confidence and play into Moscow’s hands. McConnell’s office did not respond to a request for comment. After the election, Trump chose McConnell’s wife, Elaine Chao, as his nominee for transportation secretary. Some Clinton supporters saw the White House’s reluctance to act without bipartisan support as further evidence of an excessive caution in facing adversaries. “The lack of an administration response on the Russian hacking cannot be attributed to Congress,” said Rep. Adam B. Schiff (Calif.), the ranking Democrat on the House Intelligence Committee, who was at the September meeting. “The administration has all the tools it needs to respond. They have the ability to impose sanctions. They have the ability to take clandestine means. The administration has decided not to utilize them in a way that would deter the Russians, and I think that’s a problem.” Philip Rucker contributed to this report. Source Alternate Source - Intelligence Figures Fear Trump Reprisals Over Assessment Of Russia Election Role Also Read:
  10. Abelssoft Undeleter 2016 - Full Version Promo by PC-WELT Links: Offer: http://www.pcwelt.de/ajax/eventcalendar/25/2016-12-07 Note: Limited Period Offer. Page in German. Use Translator here. During this promo, if you register the program, it'll automatically activate full version. Current Status - Open. Steps: Install and Start the Program. In the registration window fill name and E-Mail address. Click on "Request Activation". Downloads: Offline Installer - Giveaway Source: http://download.pcwelt.de/public/adventskalender16/07_12_2016/AbelssoftUndeleter_idg_de_Advent_2016.exe More Advent Kalender Giveaways:
  11. 2016 Xmas/Christmas Advent Calendar/Advents Kalender Collection by Me Here I share, My Own List of Active Xmas Advent Kalenders 2016[Almost Complete]: Please make sure that you don't miss any future days in the above Kalender[Calendar] Giveaways and Promotions. I hereby welcome nsaners to update this thread with more advent kalenders.
  12. WonderFox 2016 Thanksgiving Day Giveaway Party by WonderFox Come And Get Stuffed With The Feast Wishing you and your family a wonderful Thanksgiving! To celebrate the harvest time of the year, WonderFox and 2 excellent software developers have prepared a Thanksgiving feast for all of you! Come and enjoy the feast including 5 great products, totally value $280, before Nov 28th. Note: Limited Period Offer. Terms: Standard version No free upgrade No support Links: Offer: http://www.videoconverterfactory.com/thanksgiving/ Thanksgiving Appetizer Video Converter Factory Pro Time-Limited Giveaway. Come And Get the License Key Now Designed to convert between all mainstream videos, audios and portable devices without quality loss. Get License code + s/w - License[Zip - 23.0 MB] Thanksgiving Dinner Video Watermark Pro Time-Limited Giveaway It enables you to add watermarks on video files with 150+ free watermark materials to protect your copyright. Get License code + s/w - License[Zip - 15.7 MB] Thanksgiving Dinner Video to GIF Converter Time-Limited Giveaway A user-friendly video to GIF software capable of converting all popular formats of video to animated GIF. Get License code + s/w - License[Zip - 12.3 MB] Thanksgiving Dessert Partner Software Time-Limited Giveaway DoYourData Super Eraser 4.0 Giveaway DoYourData Super Eraser 4.0 is a powerful data erasure software to permanently destroy & wipe data from PCs, Servers, Hard Drives. Get License code - License[Zip - 37.9 KB] Windscribe Giveaway - 50GB Free Windscribe is an easy to use yet powerful desktop application and browser extension that work together to block ads and trackers. Get License code - License[Zip - 37.9 KB]
  13. Like many loyal Apple customers, I’m greatly disappointed by the 2016 MacBook Pro upgrades, especially for the 15″. Here are the most important reasons not to upgrade at this time: Expensive, the base cost is $2,399, an increase of $400 from before. No low end version of the 15″ MacBook Pro. The lower cost 15″ at $1,999 is more than a year old and only moderately faster than my 2013 laptop. iPhones can’t connect to the MacBook Pro without yet another dongle Performance improvement for common tasks is incremental, not worth the price increase The critically important magnetic, break-free MagSafe adaptor is gone The built-in SD card slot is gone so you’ll need a peripheral to upload camera photos The headphone jack won’t work with your new lightning-based iPhone 7 headphones A lot of developers are frustrated that the memory limit remains at 16 GB due to battery life issues No USB 3 ports: external hard drives, thumb drives et al. now require a dongle Reduced key press like on the MacBook No power extension cable like they’ve always had Space gray is for Windows laptops The positives just don’t outweigh all the above negatives. Michael Tsai has the best rundown of developer frustration I’ve read (via Daring Fireball). Source:: http://jeffreifman.com/2016/11/02/reasons-not-buy-new-macbook-pro/
  14. Ubuntu and Linux Mint are currently arguably 2 of the most popular Linux distros (with Debian) around. They are both quite user-friendly and for the Linux newbie, you couldn’t be wrong choosing either. For a very long time, Ubuntu was considered the distro of choice by most Linux enthusiasts, but it has currently been surpassed by Linux Mint (and Debian) as the distro with most hits. But which one is better? I believe we all have our favorite distros but having used either of these distros, I’m gonna make an argument for why I believe one is better than the other, so kindly indulge me and let’s see if you can agree with me. System Requirements Both Ubuntu and Linux Mint have quite similar requirements. For new computers, whichever way you go, you’re going to be fine. For older hardware, Ubuntu does best with Lubuntu, Xubuntu and Ubuntu MATE flavors and Mint users also have Mint MATE edition available. Installation There isn’t much difference in the installation experience of both distros. Both use the Ubiquity installer and the experience is quite similar. Ubuntu and Mint both offer support for UEFI. Interface(default) The default interface for Ubuntu is Canonical’s own built DE called Unity. With Unity, Canonical provides a global menu and notification area occupying the top panel. Some common applications live in a dock on the left. You launch software from the Dash by clicking on the Ubuntu icon. Mint ships with Cinnamon as its default DE. Applications appear in the panel on the bottom of the desktop, with a launcher menu in the bottom left and system icons on the right in a manner quite similar to MS Windows. Unity may feel more familiar to Mac OS X users, while Windows user will feel right at home on Linux Mint. Software (out of the box) Both Mint and Ubuntu use mostly free and open source software. Unlike Ubuntu, Linux Mint comes pre-installed with some proprietary software that most users tend to need, such as Flash, Java, audio and video codecs. Both distros come pre-installed with Libreoffice and Firefox browser. With Mint, you also get VLC and GIMP out of the box. Overall, Mint comes with more apps out of the box than with Ubuntu. Software Installation Both Ubuntu and Mint also have their own app stores that make it easy to find and download new software. Gnome software (previously Ubuntu's Software Center) comes with Ubuntu and Mint also offers Mint Software Manager(also responsible for updates) which is usually mistaken as a system tool instead of an app store. Both stores provide you with a ton of open source software for you to download and use. Official Spins There are ten different official flavors of Ubuntu listed on their website. Besides the Unity desktop, you have alternatives that have their default DEs to GNOME, KDE, LXDE, XFCE, MATE, and MythTV. There are also specialized distributions including Edubuntu for education community, Ubuntu Studio for multimedia production. There’s also Ubuntu Kylin for Chinese users. Linux Mint on the other hand comes in four main distros. There’s Cinnamon, MATE, KDE, and XFCE. Customization (default flavor) One great thing about Linux is the amount of customization it allows. With Ubuntu, most of this has been done away with in recent releases. You are quite limited on what you can tweak. Mint on the other hand has lots of settings that allow you to tweak everything down to the very little details of your interface. It customization is your thing, Mint does it way better. Performance (default flavor) Linux Mint most definitely has an edge when it comes to speed and performance. On a newer machine, the difference may be barely noticeable, but on older hardware, it will definitely feel faster. Ubuntu appears to run slower the older the machine gets. If you’re going to use Ubuntu on older hardware, I recommend your go in for Lubuntu or Xubuntu. Upgradeability Both Linux Mint and Ubuntu allow you to update to the new releases from the very recent version almost as soon as they are available. Software updates are also provided have easy-to-use updaters. For Ubuntu, it’s just a case of clicking on the Dash icon in the dock, and searching for the Software Updater. For Ubuntu, you use the software updater to check, download and install any updates (OS or apps), downloads them and then installs them. The process is similar in Mint using the Update Manager app to update your apps or OS.It is also worth noting that there has been some concern towards Mint’s approach to providing important updates Support While Ubuntu has software company Canonical behind it to run its development, Linux Mint relies on individual users and companies using the OS to act as sponsors, donors and partners. Both distros also have vibrant community support. In Summary Both Ubuntu and Linux Mint have a lot going for them and choosing one over the other. The main difference between the two is how they are implemented in terms of the User Interface and support. Between the default flavors, (Ubuntu Unity and Mint Cinnamon),it is not easy recommending one over the other. Ubuntu suffered a great deal of backlash due to Unity even though it is considered the more modern of the two, whilst Cinnamon is considered the more traditional but looks a bit old-fashioned. So which one is better? My Verdict... Based on the arguments I have outlined for either distros, I have provide a scorecard for them. Ubuntu has a lot going for it but in comes up on top only in 3 categories whilst Linux Mint comes top in 4 categories. Canonical has done a great job at keeping Ubuntu stable and secure. They also try well to keep their official packages as new and updated always. They lay down their own infrastructure (that Mint relies on). They provide a go-to point for transitioning OS users and companies. But Mint’s desktop and menus are easy to use whilst Ubuntu’s dash can be sort of confusing especially for new users. It's the gate that ex-Windows users walk through and as such is the most welcoming to such persons. Mint gives more in terms of the pre-installed software but finding and installing software from Ubuntu’s Software Center can be a little more easier. So I’m choosing Mint over Ubuntu, but don’t get me wrong, Ubuntu with Unity is awesome once you know what you are about. But with Canonical chasing unification of the desktop and mobile with Unity 8, I do belive Linux Mint in its current state is wee bit superior to Ubuntu. Mint is possibly "Ubuntu done better". Overall, Linux Mint with Cinnamon feels far more polished than Ubuntu with Unity. Source: http://www.linuxandubuntu.com/home/ubuntu-vs-linux-mint-which-is-better-in-2016
  15. Security Solution Overload The security industry turned out in force to Las Vegas this week to attend the annual Black Hat Conference. Vendors used the opportunity to showcase their latest and greatest technology releases. Those releases included new updates for threat detection, product integrations, security services, threat intelligence and much more. Vendors said the new solutions will help customers step up their game against attackers and cope with new threat vectors, many of which were presented by hackers at the show. Take a look at 16 solutions that were launched at the show this week. Attivo ThreatMatrix Deception And Response Platform Just in advance of the Black Hat event, Attivo Networks unveiled the enhancement of its Attivo ThreatMatrix Deception and Response Platform, adding capabilities around vulnerability visibility and assessment, automated responses to misconfigured systems or credentials, routed network support, and extending the platform to protect against Microsoft Active Directory attacks. These added capabilities expand Attivo's capabilities beyond detection to also include protection capabilities, the company said. Armor Anywhere Armor, formerly FireHost, Monday rolled out Armor Anywhere, a solution to provide data security across all infrastructures, including cloud infrastructures from Amazon Web Services and Azure. Capabilities of the new solution include managed security, visibility, controls, threat intelligence, patch monitoring, log management, malware protection, file integrity monitoring and external vulnerability scans for workloads, assets and applications, the company said. "The modern threat landscape presents sizable challenges for companies managing sensitive data, particularly those facing strict compliance requirements," said Chris Drake, founder and CEO of Armor, in a statement. "Armor Anywhere is a battle-tested security solution backed by threat expertise that complements our customers' unique needs. It simplifies security so they can focus on growth and driving revenue, not defending against sophisticated cyberattacks." RiskIQ Security Intelligence Services San Francisco-based RiskIQ expanded its External Threat Management platform at Black Hat 2016, announcing it has added Security Intelligence Services. The new services, now generally available, arms security teams with critical data sets for threat forensics and incident remediation, the company said. Specifically, the data sets include Passive DNS data for insight into how a domain name or IP address changes over time, WhoIS data about domain and IP address ownership, and newly observed domains. "Security teams spend so much time gathering all the information they need to respond to cyberincidents, it limits their efficacy," Arian Evans, vice president of product strategy at RiskIQ, said in a statement about the launch. "The new data services offering puts global internet data sets at researchers' fingertips to enrich analysis, inform decision-making and reduce the time it takes to investigate and respond to new threats." Trustlook Sentinel San Jose, Calif.-based mobile device security vendor Trustlook launched Trustlook Sentinel Monday to help provide an additional layer of mobile device protection. Different from other mobile device security solutions, which center around antivirus applications, Trustlook Sentinel is based on the operating system, providing threat monitoring, behavioral analytics and protections across applications, the company said. "Sentinel represents the next evolution in mobile device security," Allan Zhang, founder and CEO of Trustlook, said in a statement. "Tightly integrating security through an on-device, behavioral-based model makes detection much faster and more effective, and ultimately affords better protection against malware and other threats." The solution is expected to be available in the third quarter. Ironscales Federation Israeli security startup Ironscales is looking to tackle the phishing problem, unveiling at Black Hat the launch of Federation, a phishing threat intelligence network. The Federation solution will provide businesses with threat intelligence on zero-day attacks, ransomware, malware, bots, spam, spoofing, pharming and more to arm them with the data they need to protect their own organization. The launch adds to Ironscales' portfolio of anti-phishing solutions, including user training and an employee-based intrusion prevention system, where users flag questionable content for an automatic scan and threat mitigation. Kudelski Security Switzerland-based Kudelski Security used Black Hat 2016 to officially launch into the U.S. market, offering a cybersecurity service and managed security services. The launch was made possible by the company's May acquisition of Arizona-based MSSP Milestone Systems. Kudelski brings capabilities around consulting, security technology, managed services, training, technical support and custom innovation to the U.S. market, as well as a strong reputation in the European market. Kudelski said it is focused on next-generation technologies and growing services capabilities. Deloitte ThreatConnect Platform Just before Black Hat, Deloitte Cyber Risk Services unveiled an alliance with ThreatConnect to boost the capabilities around its Vigilant Managed Services. By integrating ThreatConnect's threat intelligence platform with its own intelligence and analytics services, Deloitte said it will be better able to tackle threats with deeper intelligence from a single platform. Specifically, Deloitte said key benefits include a united defense against threats, automated aggregation and analysis of threat intelligence, optimized management capabilities and a community to share intelligence with. "We're focused on providing a portfolio of tightly integrated cyber operations services. … By teaming with ThreatConnect, we can further enable organizations to maximize the value of their security technology investments, combat the fragmentation of their security organizations, and enhance their infrastructure with relevant threat intelligence across a scalable, integrated platform, said Adnan Amjad, cyber threat risk management practice leader for Deloitte Advisory cyber risk services and partner at Deloitte & Touche LLP. Demisto To help businesses develop incident response procedures, Demisto Tuesday launched an open industry standard to build and share incident response playbooks. Under the new standard, businesses can collaborate and share their own incident response procedures to help build better standards for the industry overall, the company said. Demisto has set up a platform for companies to automate and code the playbooks, as well as allow security analysts to collaborate over Slack. "While cybercriminals collaborate to attack and steal from organizations, our industry until now has lacked a means for sharing best practices around incident response and community development of playbooks," said Dan Sarel, Demisto co-founder and vice president of product, in a statement. "At Demisto we believe that the only way to combat cybercrime is through collaboration and we are proud to offer today a major step in this direction." Endgame Hunt Platform Version 2.0 Arlington, Va.-based endpoint security startup Endgame unveiled a new version of its Hunt platform just before the event, adding capabilities to speed time of detection and response. Specifically, the Hunt Platform Version 2.0 adds capabilities around hardware-assisted control flow integrity to monitor program execution in real time, signature-less malware detection, and automated investigation. Endgame also announced a partnership with Accenture, No. 2 on the 2016 CRN SP500 list, for a threat hunting-as-a-service offering. The offering brings together Endgame's security solutions with Accenture's cybersecurity team for continuous endpoint monitoring, exposing and eliminating both active and dormant adversaries, and actionable lists of vulnerabilities and remediation procedures to limit future attacks. More six products here...
  16. Less than two weeks before the start of the Games, 19 of 31 buildings have yet to pass full checks, with teams hinting they may demand compensation Less than two weeks ahead of the Olympics, the Rio 2016 organising committee has acknowledged that 19 of the 31 buildings in the Athletes Village have yet to pass safety tests. With hundreds of athletes turning up by the day, this will add to concerns prompted by gas and water leaks and at least one power outage. The Guardian has also learned that a short circuit caused a small fire on Saturday. Close to 10% of the competitors have already arrived in Brazil and many are housed in the village, though the shoddy conditions – which include flooded floors, broken elevators, mould and holes in the ceiling – have shocked some team managers, athletes and volunteers. The organisers promise to resolve the problems by Thursday, but in the interim the Australian team has decided to temporarily rehouse its athletes. The Dutch and Italian teams have also complained and hinted that there may be demands for compensation. Stress tests – which should have been done months ago – are still less than halfway complete because the 17-storey buildings were delivered behind schedule and the water, gas and electricity were only recently connected. Although Rio2016 said the faults affected only 5% of the rooms, spokesman Mário Andrada admitted only 12 of the 31 tower blocks have been checked and proved OK. “This should have been tested a long time ago,” he told the Guardian. “But the problem is there and now our task is to fix it as quickly as possible and to ensure everything is safe.” The risks were evident on Saturday when a small fire broke out in building 26, which is the home of the Dutch team. “A technician was working on a fuse box. There was a short circuit and a small fire, which he extinguished himself. The electricity was disconnected and there was no need for an evacuation or to call firefighters,” Andrada said. Nonetheless, with continued reports of gas leaks in the Athletes Village, such incidents are a concern. The Dutch team said it was notified about the fire and it has subsequently conducted tests of fire alarms and emergency stairwells, but its technicians are still encountering new problems, particularly with the plumbing. Maurits Hendriks, the Dutch chef de mission, said it will be a major challenge to get the accommodation fully ready before the Games begin even though its technical staff and local contractors are working 24 hours a day. “Of course, this is a disappointment. It affects all participating countries,” he said in a statement. He hinted that there may be financial consequences. “It is the responsibility of the organizing committee to deliver a safe and well-functioning village … Let it be clear that we will evaluate this situation with IOC and Rio 2016 after the Games. This applies for example to financial consequences as a result of the measures we are taking and have been taken.” He said some teams have had to move buildings. There is a priority list of reconstruction work needed for others. The Netherlands, Australia, New Zealand, Belgium and the UK are in daily contact about the situation. The Australian team, which was due to be housed in building 23, is refusing to use the Athletes Village until leaks and other problems are resolved and the checks are done to its satisfaction. Recently, it was the first team to conduct a full stress test of the plumbing system, which involved flushing all the toilets and running all the taps at the same time. The result was water running down the walls. “Clearly, it’s not safe,” said the team spokesman, Michael Tancred. “But we are hopeful the problems will be resolved and we’ll be in the village by Tuesday or Wednesday.” The first six Australian athletes, who arrived on Monday morning, are temporarily being rehoused in the media village. But relocation of the Olympic teams may not be an option. One of the reasons why the athletes’ and media villages are so large is that Rio does not have much spare hotel capacity. The British team, which is staying in one of the 12 finished buildings, said it has faced relatively few inconveniences. Team GB said there had been minor plumbing and electricity issues, but nothing that created a sense of vulnerability. “We’re in a much better place than other people,” spokesman Scott Field said. Meanwhile, Patrick Sandusky, the chief external affairs officer for the US Olympic Committee, said the situation was being monitored. “As is the case with every Games, we’re working with the local organizers to address minor issues and make sure the Village is ready for Team USA athletes,” he said. The Italian team has experienced problems that have obliged it to contract out renovations, the head of mission, Carlo Mornati, told Gazzetta dello Sport. However, Rio 2016 said 630 workers have been deployed to make sure all the glitches are cleared up and checked for safety. “We hope to be finished by the end of business tomorrow night,” Andrada said. With so much work remaining that will be an immense challenge. By the opening ceremony on 5 August, the majority of the expected 10,000 athletes are due to be housed in the Athletes Village, which the official website says is the biggest ever at an Olympics. The facilities will include the latest creature comforts, it says: “Athletes staying in the village will be treated like kings. They are, after all, the stars of the show.” But the plans have been knocked awry by a financial downturn and a corruption scandal. The near-billion-dollar project – also known as Ilha Pura – was built by local property developer Carvalho Hosken and Brazil’s biggest construction firm, Odebrecht. They planned to recoup their investment by selling the apartments for up to 1.5m reais each, but the property market has plunged by 20% over the past year. Earlier this year, Ilha Pura admitted they pre-sold just 240 of the 3,604 apartments – well below forecasts. This is likely to have caused cashflow problems and headcount cuts during the final stages of the work. Odebrecht, meanwhile, was distracted and leaderless as a result of the jailing of its president, Marcelo Odebrecht, in the Lava Jato (“car wash”) corruption investigation. He was sentenced to 19 years in prison earlier this year. The organisers and the Rio city government, however, repeatedly insisted neither the financial downturn nor the scandal would disrupt the delivery of facilities for the Games. Article source
  17. WonderFox Huge Summer Giveaway 2016 by WonderFox We Gather Ten+ Acclaimed Software Partners, and Giveaway for Two Rounds From July 18th to August 2nd (14 DAYS + $860 Total Value) Note: Limited Period Offer. Links: Offer: http://www.videoconverterfactory.com/summer/ July 18 - WonderFox DVD Ripper Pro: Note: Limited Period Offer. Current Status: Open - Activate Soon. Download License[Zip] from below downloads[end of this post]. WonderFox DVD Ripper Pro helps you to rip and convert DVD disc, DVD Folder and ISO image to any video with faster speed than competitors. Now You can free Get the No.1 DVD Ripper and save $40 to get supreme HD + Ripper pack this summer! Terms: - Full-featured version - Unlimited copies, everyone can get it for free. - No free upgrades The 1st Round Giveaway - July 18 - July 24: - Current Status: Open: iObit Advanced SystemCare 9 PRO(1 Year) - License[Zip - 36.0 KB] Aomei Partition Assistant Pro - License[Zip - 19.7 KB] EaseUS Todo PCTrans Pro - License[Zip - 36.1 KB] BurnAware Premium - License[Zip - 20.2 KB] TotalMailConverter(6 Months) - License[Zip - 20.6 KB] Sticky Password Premium - License[Zip - 20.7 KB] - Alternate Promo - https://www.stickypassword.com/ru/comss2016 Easy Audio Mixer 2 - License[Zip - 36.8 KB] Soda PDF - License[Zip - 20.3 KB] The 2nd Round Giveaway - July 25 - August 1: - Current Status: Open: Ashampoo Photo Commander 12 - License[Zip - 20.3 KB] - Alternate Promo already posted in a different thread Wise Care 365 Pro - License[Zip - 20.4 KB] Tenorshare iPhone Care Pro - License[Zip - 20.4 KB] Powerarchiver 2015 - License[Zip - 20.3 KB] - Promo link: http://www.powerarchiver.com/powerarchiver-2015-giveaway-only-for-wonderfox/ - Code - X9KTQ2 PD Howler 9.6 - License[Zip - 20.5 KB] DoYourData Recovery Pro - License[Zip - 20.3 KB] Downloads: WonderFox DVD Ripper Pro - License [Size: 36.7 KB]: http://www.videoconverterfactory.com/summer/license-2016/en/License-DVD-Ripper-Pro.zip WonderFox DVD Ripper Pro - [Size: 20.6 MB]: http://www.videoconverterfactory.com/download/dvd-ripper.exe Aomei Partition Assistant Pro v6.0 - [Size: 20.4 MB]: Pro: http://www.aomeisoftware.com/download/pa/full/DM_Pro.zip IObit Advanced SystemCare 9 PRO - Offline Installer[Cnet - Download.com]: http://www.iobit.com/downloadcenter.php?product=advanced-systemcare-pro IObit Advanced SystemCare 9 PRO - Offline Installer[Direct] - Size: 41.9 MB: http://update.iobit.com/dl/asc9/advanced-systemcare-setup.exe BurnAware Premium v9.3 - [Size: 9.8 MB]: https://www.burnaware.com/downloads/burnaware_premium_9.3.exe Todo PCTrans v9.0: Free: http://download.easeus.com/free/pctrans.exe Pro: http://download.easeus.com/trial/pctrans_trial.exe TotalMailConverter - [Size: 30.0 MB]: https://www.coolutils.com/download/TotalMailConverter.exe Easy Audio Mixer 2.2.1 - [Size: 37.3 MB]: http://www.gfsoftware-downloads.com/files/eamixer-setup.exe Soda PDF 8 - [Size: 9.2 MB]: http://www.sodapdf.com/get-trial Ashampoo Photo Commander 12 - [Size: 256 MB]: https://www.ashampoo.com/ashampoo_photo_commander_12_sm.exe Wise Care 365 Pro - [Size: 6.54 MB]: http://downloads.wisecleaner.com/soft/WiseCare365.exe Tenorshare iPhone Care Pro v3.0.0.0 - [Size: 26.0 MB]: http://download.tenorshare.com/downloads/iPhoneCareProtrial503.exe Powerarchiver 2015 - [Size: 29.2 MB]: http://dl.powerarchiver.com/2015/powarc150403.exe PD Howler 9.6(PD Pro): License Zip File contains custom build giveaway version ZIP File download link and instructions.
  18. Firefox Roadmap For 2016/2017 Mozilla updated the official Firefox roadmap entry on the organization's Wiki website recently, highlighting major plans for the browser in 2016/2017. The information highlight some of the features that Mozilla has in store for the next four stable versions of the Firefox browser (Firefox 48 to 51). The organization lists three main areas of improvement: foundation, customization and context graph. Foundation refers to improving the browser's responsiveness, reliability and polish. Customization primarily to extending the Web Extension API, and Context Graph to a new recommendation engine Mozilla plans to deliver. It needs to be noted that the roadmap does not highlight all new features or improvements of the next four or so Firefox releases. Instead, it highlights Mozilla's focus and strategy for those next releases of the web browser. Firefox Roadmap for 2016/2017 Features that were delayed several times, multi-process Firefox and add-on signing, will find their way into the stable version of Firefox. Discovery and recommendations seem to be a strong focus going forward. Chronological Firefox roadmap The following information lists Firefox versions and the new features Mozilla plans to integrate in them. Target milestones may change however so think of this as the earliest possible version shipping with the feature: Firefox 48 E10s, Electrolysis or multi-process Firefox, launches for about 1% of Firefox stable users (who meet certain criteria such as not using any add-ons). Firefox 48 will use a blocklist to protect against Flash fingerprinting. Sync Tab Sidebar is listed for Firefox 48, but it is already available in Firefox 47 Stable. It adds a new sidebar to Firefox that displays all synced tabs. Web Extension API milestone: make 35% of all Chrome extensions compatible with Firefox. Use this add-on to install Chrome extensions in Firefox. Add-on signing becomes mandatory for Stable and Beta versions of Firefox. The override switch is removed. Firefox 49 Modernization of Security UI. New security dialogs and modernization. New discovery pane that acts as a recommendation engine for add-ons. Firefox 50 E10s, Electrolysis or multi-process Firefox, rolls out to RTL and AllY/Touch users. Makes E10s available to Windows XP users, Right to Left systems, accessibility tool users and touch users. Firefox won't return that Flash is installed to sites anymore but sets Flash to click to play automatically. This is done to prioritize HTML5 playback over Flash. Firefox 51 E10s, Electrolysis or multi-process Firefox, rolls out for add-on users and continues to do so until Firefox 53. Firefox Future Firefox 52: Mozilla plans to disable NPAPI plugin support by default but ship the browser with a switch that enables users to re-enable support. Firefox 53: NPAPI support is removed from Firefox. The only option Firefox users have at this point in time is to use Firefox ESR which will support NPAPI for a bit longer (until May 2018). Firefox ??: Activity Stream replaces the New Tab Page. Closing Words The roadmap offers a feature-focused overview that highlights some of the upcoming changes. It is somewhat surprising that privacy and security are not mentioned in the roadmap at all, considering that this is one of the stronger points of Firefox. Now You: What's your take on the roadmap? Source
  19. Top 5 Best Video Editing Software For Linux In 2016 Brief: Tiwo discusses the best video editors for Linux, their pros and cons and the installation method for Ubuntu-based distros in this article. We have discussed best photo management applications for Linux, best code editors for Linux in similar articles in the past. Today we shall see the best video editing software for Linux. When asked about free video editing software, Windows Movie Maker and iMovie is what most people often suggest. Unfortunately, both of them are not available for GNU/Linux. But you don’t need to worry about it, we have pooled together a list of best free video editors for you. Best Video Editor Apps for Linux Let’s have a look at the top 5 best free video editing software for Linux below : 1. Kdenlive Kdenlive is a free and open source video editing software from KDE that provides dual video monitors, a multi-track timeline, clip list, customizable layout support, basic effects, and basic transitions. It supports wide variety of file formats and a wide range of camcorders and cameras including Low resolution camcorder (Raw and AVI DV editing), Mpeg2, mpeg4 and h264 AVCHD (small cameras and camcorders), High resolution camcorder files, including HDV and AVCHD camcorders, Professional camcorders, including XDCAM-HD™ streams, IMX™ (D10) streams, DVCAM (D10) , DVCAM, DVCPRO™, DVCPRO50™ streams and DNxHD™ streams. You can install it from terminal by running the following command : sudo apt-get install kdenlive Or, open Ubuntu Software Center then search Kdenlive. 2. OpenShot OpenShot is the second choice in our list of Linux video editing software. OpenShot can help you create the film that supports for transitions, effects, adjusting audio levels, and of course, it support of most formats and codecs. You can also export your film to DVD, upload to YouTube, Vimeo, Xbox 360, and many other common formats. OpenShot is simpler than kdenlive. So if you need a video editor with a simple UI OpenShot is a good choice. The latest version is 2.0.7. You can install OpenShot video editor by run the following command from terminal window : sudo apt-get install openshot It needs to download 25 MB, and 70 MB disk space after installed. 3. Flowblade Movie Editor Flowblade Movie Editor is a multitrack non-linear video editor for Linux. It is free and open source. It comes with a stylish and modern user interface. Written in Python, it is designed to provide a fast, and precise. Flowblade has focused on providing the best possible experience on Linux and other free platforms. So there’s no Windows and OS X version for now. To install Flowblade in Ubuntu and other Ubuntu based systems, use the command below: sudo apt-get install flowblade 4. Lightworks If you looking for a video editor software that has more feature, this is the answer. Lightworks is a cross-platform professional video editor, available for Linux, Mac OS X and Windows. It is an award winning professional non-linear editing (NLE) software that supports resolutions up to 4K as well as video in SD and HD formats. This application has two versions: Lightworks Free and Lightworks Pro. While free version doesn’t support Vimeo (H.264 / MPEG-4) and YouTube (H.264 / MPEG-4)- Up to 2160p (4K UHD), Blu-ray, and H.264/MP4 export option with configurable bitrate setting, then pro version is. Lightworks Free Lightworks Pro Pro version has more features such as higher resolution support, 4K and Blue Ray support etc. How to install Lightworks? Unlike the other video editors, installing Lightwork is not as straight forward as running a single command. Don’t worry, it’s not that complicated either. Step 1 – You can get the package from Lightworks Downloads Page. The package’s size about 79,5 MB. Please note: There’s no Linux 32-bit support. Step 2 – Once downloaded, you can install it using Gdebi package installer. Gdebi automatically downloads the dependency : Step 3 – Now you can open it from Ubuntu dashboard, or your Linux distro’s menu. Step 4 – It needs an account when you use it for first time. Click at Not Registerd? button to register. Don’t worry, it’s free! Step 5 – After your account has been verified, now login. Now the Lightworks is ready to use. Need Lightworks video tutorial? Get them at Lightworks video tutorials Page. 5. Blender Blender is a professional, industry-grade open source, cross platform video editor. It is popular for 3D works. Blender has been used in several Hollywood movies including Spider Man series. Although originally designed for produce 3D modeling, but it can also be used for video editing and input capabilities with a variety of formats. The Video Editor includes: Live preview, luma waveform, chroma vectorscope and histogram displays Audio mixing, syncing, scrubbing and waveform visualization Up to 32 slots for adding video, images, audio, scenes, masks and effects Speed control, adjustment layers, transitions, keyframes, filters and more. The latest version can be downloaded from Blender Download Page. Which is the best video editing software? If you need a simple video editor, OpenShot, Kdenlive or Flowblade is a good choice. These are suitable for beginners and a system with standard specification. Then if you have a high-end computer, and need advanced features you can go out with Lightworks. If you are looking for more advanced features, Blender has got your back. So that’s all I can write about 5 best video editing software for Linux such as Ubuntu, Linux Mint, Elementary, and other Linux distributions. Share with us which video editor you like the most. Source
  20. Totally paralysed people will be able to take part, using a brain-computer interface The first Cybathlon, an Olympics for bionic athletes, will take place in Switzerland in October 2016. The event will include a race where competitors control an avatar via a brain interface. There will also be races for competitors wearing prosthetic limbs and exo-skeletons. Hosted by the Swiss National Competence Center of Research, it is hoped the competition will spur interest in human performance-enhancing technology. More people are walking again thanks to exo-skeletons The brain-computer interface race is designed for competitors who are paralysed from the neck down. They will control an avatar in a computer racing game via a headset that connects the brain to a computer. There will also be races for those wearing arm or leg prosthetics, an exoskeleton race and a wheelchair race. The assistive devices worn by the athletes, who will be known as pilots, can either be ones that are already commercially available or prototypes from research labs. There will be two medals for each competition, one for the pilot and one for company that developed the device. There will also be a wheelchair race Bionic limbs and exoskeletons are becoming much more technically advanced, offering those wearing them much more realistic movements. Prof Hugh Herr, from the Massachusetts Institute of Technology, showed off some of the prosthetics that his team have been working on at the Ted (Technology, Entertainment and Design) conference in Vancouver last week. He is currently in negotiations with health care professionals to get the bionic limbs more widely available to those who need them. Pilots with arm prosthetics will be able to compete Often though there was a disconnect between technology and patients, said Prof Robert Riener, event organiser, from the University of Switzerland. "The idea is that we want to push development of assistive technologies towards devices that patients can really use in everyday life," he told the BBC. "Some of the current technologies look very fancy but are a long way from being practical and user-friendly," he added. The other main aim of the games is to allow people to compete who have never had the opportunity before. "We allow technology that has previously been excluded from the Paralympics. By making it a public event we want to get rid of the borders between patients, society and the technology community," Prof Riener said. Source
  • Create New...