Tue
23
Jan
John Lister's picture

T-Mobile Ranks Fastest Network for 2018

T-Mobile is the fastest, most reliable mobile broadband in the US according to a newly-published study. It seems some of its rivals struggled to cope with demand after switching to unlimited data plans. The good news is that speeds are increasing ... across the industry, with AT ... (view more)

Mon
22
Jan
Dennis Faas's picture

How to Fix: 'Access Denied' Folder on Mounted VMWare Virtual Disk

Infopackets Reader Ted G. writes: " Dear Dennis, Thank you for your pearls of wisdom! I have a question regarding VMWare Workstation . I recently virtualized a friend's PC which was facing numerous blue screens - I suspect his PC has a hardware ... error. After virtualizing the machine I mapped his drive in Windows Explorer; when I try to access c:\users\jim (his user folder), Windows keeps giving me an ' Access denied ' error. There does not seem to be any way to access his files using this method. For the record I have tried copying the files by networking his virtual machine to mine but it is ... (view more)

Fri
19
Jan
Dennis Faas's picture

How to Fix: 'This site can't be reached. The connection was reset.' Error

Infopackets Reader 'Emmy-Lou' writes: " Dear Dennis, I am having trouble accessing eBay. The error message I get is: 'This site can't be reached. The connection was reset.' Other times, it is 'This site can't be reached. eBay unexpectedly closed the ... connection'. On the page with the error message, it says to: 'Try: Checking the connection, checking the proxy and the firewall, and Running Windows Network Diagnostics'. The official error message is ERR_CONNECTION_RESET (but sometimes it is ERR_CONNECTION_CLOSED ). Can you help? " My response: Troubleshooting this error message can be rather ... (view more)

Thu
18
Jan
John Lister's picture

Chrome Extensions Labelled Rogue

A security firm says four malicious extensions for Google Chrome were downloaded a total of more than half a million times. It's asking why Google's vetting process didn't weed the malware earlier. Extensions in Chrome are similar to add-ons for ... other browsers - namely, third-party tools that improve the web browsing experience. Common examples include ad-blockers, password managers and tools for downloading videos from web pages (such as Youtube). Because extensions have some level of access to a user's Internet data (and even some control over their browsing), Google has some security ... (view more)

Wed
17
Jan
John Lister's picture

New Android Malware Most Powerful Yet

A newly discovered malware exploit offers hackers an incredible level of control and access. Fortunately the creators appear to be highly targeting their victims, though it's still a threat to ordinary users. Dubbed Skygofree, the malware affects ... users of the Android smartphone operating system. It is said to give the people behind the malware the ability to remotely carry out 48 different operations on an infected phone. These include targeted controls not previously seen, as well as more common malware exploitations. Some of the 'normal' options for the malware creators include the ability ... (view more)

Tue
16
Jan
John Lister's picture

Report: Google Home, Chromecast Break WiFi

Several Google devices such as the Google Home and Chromecast appear to be causing temporary WiFi outages on home routers. Google says it's working on the problem, but some critics believe it's a design flaw rather than a bug. Originally it appeared ... the problem was specifically restricted to one gadget, the Google Home Max, and affected only "Archer" brand routers. However, later reports have identified the problem in other models of the Google Home smart speaker, along with the Chromecast range that 'casts' Internet audio and video to a television set. WiFi Dropping Out Reports ... (view more)

Thu
11
Jan
John Lister's picture

Intel and IBM Demo Quantum Computer at CES 2018

Intel and IBM are battling to show off some of the most advanced 'quantum computers' ever made. It's a big step towards incredibly powerful computers that could even replicate the workings of a human brain. A quantum computer takes advantage of one ... of the most curious aspects of physics: that tiny particles can exist in two different states at the same time. This essentially allows a complete rewrite of the mathematics behind computing. Ordinary computers work by turning data into binary code: a string of 0s and 1s. In traditional computers, that involves a series of electronic 'gates' that ... (view more)

Wed
10
Jan
John Lister's picture

Samsung Unveils 'The Wall' - a Massive 146" MLED TV

Samsung has unveiled a massive 146" television, nicknamed " The Wall " (pic). While the size is clearly too large for most homes, it uses a new approach that could mean more choices about television set size in future. Most TV sets these days use ... liquid-crystal displays (LCD). In simple terms, these TV's shine light through tiny crystals that - depending on their electric charge - either pass through and color the light, or simply show a black background that's behind the screen. Samsung's new screen is currently a prototype only. It instead uses what calls a MicroLED ... (view more)

Tue
09
Jan
John Lister's picture

Investors Demand Apple Tackle Phone Addiction

Two of Apple's big investors want the company to tackle 'smartphone addiction' among younger users. They say failing to address the problem now could hurt the company's value in the long term. The call comes from investment management company Jana ... Partners, along with the managers of retirement plans for teachers in California. Between them they hold around $2 billion of Apple Stock, though that is only around one fifth of one percent of the entire company. (Source: bbc.co.uk ) They cited research that says using smartphones too much can mean students don't get enough sleep and pay less ... (view more)

Mon
08
Jan
Dennis Faas's picture

Can Malware (Spectre, Meltdown) Spy After Reboot?

In regard to last week's article on the Spectre and Meltdown CPU exploits, which affects 100% of all computers made since 1995, user 'rep' had the following question to ask: " Dear Dennis, [Being that this is a hardware exploit], am I right in ... thinking that any passwords, etc, which are stored in the CPU's memory are lost when the computer is shut down? If so, could I simply shut off the computer and reload it every time I want to use Internet banking and would that keep me safe from these exploits? " My response: I posted my original response in the comments section of Friday's article, but ... (view more)

Pages

Subscribe to www.infopackets.com RSS