Jump to content

Search the Community

Showing results for tags 'computer'.

  • Search By Tags

    Type tags separated by commas.
  • Search By Author

Content Type


Forums

  • Site Related
    • News & Updates
    • Site / Forum Feedback
    • Member Introduction
  • News
    • General News
    • FileSharing News
    • Mobile News
    • Software News
    • Security & Privacy News
    • Technology News
  • Downloads
    • nsane.down
  • General Discussions & Support
    • Filesharing Chat
    • Security & Privacy Center
    • Software Chat
    • Mobile Mania
    • Technology Talk
    • Entertainment Exchange
    • Guides & Tutorials
  • Off-Topic Chat
    • The Chat Bar
    • Jokes & Funny Stuff
    • Polling Station

Find results in...

Find results that contain...


Date Created

  • Start

    End


Last Updated

  • Start

    End


Filter by number of...

Found 9 results

  1. Hi. I have been investigating this for a while to try and establish what was preventing my computers from automatically sleeping. I predominantly use Firefox, but it apparently also happens with Chrome and maybe other browsers. But it is definitely happening in Firefox. The problem is caused by a silent audio stream. It is not directly an Nsane Forums issue, but an Invision Forums issue. If you want to see if you are being affected by this issue and test it for yourself, ensure you have an Nsane tab open and then open an elevated Command Prompt or Pow
  2. Black Friday & Cyber Monday Giveaway! Digiarty is launching a grand giveaway to offer MacX DVD Ripper Pro for free ($29.95 valued) till December 10, 2018. Everyone is welcome to get a fully licensed copy for free with no strings attached! There are 500 licensed copies each day. First come first served! Backup and rip any DVDs to MP4, H.264, MPEG, etc for playback on iPhone, iPad, and Android devices. Only 5 minutes to digitize the DVD. 1:1 backup your disc to Mac computer. How to get: Head over to the page, enter a valid email address and then you can get the license
  3. Japan's new cyber-security minister has dumbfounded his country by saying he has never used a computer. Yoshitaka Sakurada made the admission to a committee of lawmakers. "Since I was 25 years old and independent I have instructed my staff and secretaries. I have never used a computer in my life," he said, according to a translation by the Kyodo news agency. The 68-year-old was appointed to his post last month. His duties include overseeing cyber-defence preparations for the 2020 Olympic Games in Tokyo. A politician from the oppo
  4. Have you ever played a video on YouTube in which a song was used that you liked a lot but could not identify because the video itself, description or title did not reveal its title or artist? Or maybe you listen to Internet Radio regularly and want to identify music that is playing from time to time. Or, you have an mp3 file that is not named properly that you want to identify. There are quite a few situations where a software like My Music Recognition comes in handy. The free program for Windows can identify songs playing on your computer regardless of the program it is playing in. This means
  5. Commentary: Asking if an iPad is a computer is like asking if a hot dog is a sandwich. In late 2009, one of the worst-kept secrets in technology was that Apple planned to launch a tablet of some sort, probably within months. Would it be a locked-down device like the iPhone, launched just two years earlier in 2007? Or would it be a more traditional platform like the MacBook, following in the footsteps of personal computers since the early '80s? In December, 2009, I wrote: "Either the Apple tablet (or iSlate, or whatever it ends up being called)
  6. Security researchers have discovered an interesting piece of malware that infects systems with either a cryptocurrency miner or ransomware, depending upon their configurations to decide which of the two schemes could be more profitable. While ransomware is a type of malware that locks your computer and prevents you from accessing the encrypted data until you pay a ransom to get the decryption key required to decrypt your files, cryptocurrency miners utilize infected system's CPU power to mine digital currencies. Both ransomware and cryptocurrency mining-based
  7. straycat19

    Sick Computer

  8. Thanks for the info
  9. malakai1911

    Comprehensive Security Guide

    Comprehensive Security Guide NOTE: As of 1/1/2019 this guide is out of date. Until parts are rewritten, consider the below for historical reference only. i. Foreword The primary purpose of this guide is to offer a concise list of best-of-breed software and advice on selected areas of computer security. The secondary purpose of this guide is to offer limited advice on other areas of security. The target audience is an intermediately skilled user of home computers. Computer software listed are the freeware versions when possible or have free versions av
×
×
  • Create New...