Phoenix PCUG Master August 2017.Wps
Total Page:16
File Type:pdf, Size:1020Kb
Load more
Recommended publications
-
Microsoft and Cray to Unveil $25,000 Windows-Based Supercomputer
AAll About Microsoft: l lCodeTracker A monthly look at Microsoft’s codenames and what they Areveal about the direction of the company. b o u t M i c r o s o f t : All About Microsoft CodeTracker Keeping track of Microsoft's myriad codenames is an (almost) full-time occupation. I know, as I spend a lot of my work hours tracking down the latest names in the hopes of being able to better keep tabs on what's coming next from the Redmondians. Each month, I'll be releasing an updated, downloadable version of the CodeTracker. I'll add new codenames -- arranged in alphabetical order by codename -- of forthcoming Microsoft products and technologies. I also will note timing changes (date slips, the release of a new test build, the disappearance of a planned deliverable) for entries that are already part of the Tracker. Once Microsoft releases the final version of a product or technology I've been tracking, I will remove it from the Tracker. In that way, the CodeTracker will remain focused on futures. (An aside about the Tracker: A question mark in place of an entry means I have insufficient information to hazard even an educated guess about a particular category.) If you have suggested new entries or corrections to existing ones, please drop me an e-mail at mjf at microsofttracker dot com. Thanks! Mary Jo Foley, Editor, ZDNet's "All About Microsoft" blog This Month's Theme: Big iron needs love, too If you went by nothing but blog and publication headlines, you might think mobile phones and slates are where all the innovation is these days. -
Solarblizzard
Security Now! Transcript of Episode #800 Page 1 of 27 Transcript of Episode #800 SolarBlizzard Description: This week we open the New Year taking a longer look at fewer topics since the bad guys were apparently enjoying their New Year holiday, too. So we look at an interesting kludge that's been forced upon Chrome by ill-mannered antiviral scanners. We need to warn all enterprise users of Zyxel network border security products of another recently discovered built-in backdoor. We look at the rise in IoT compromise swatting attacks and a series of new flaws and vulnerabilities in the PHP Zend and Yii frameworks. We have a quick bit of miscellany to share, then I want to explain a lot about the value of trimming SSDs and newer SMR drives. And we'll conclude by catching up with what will hopefully be the last news, for a while at least, of the disastrous SolarWinds breach and intrusions. High quality (64 kbps) mp3 audio file URL: http://media.GRC.com/sn/SN-800.mp3 Quarter size (16 kbps) mp3 audio file URL: http://media.GRC.com/sn/sn-800-lq.mp3 SHOW TEASE: It's time for Security Now!. Steve Gibson is here with a defunct football; a very bad AV security practice that Chrome has had to do something maybe even worse to fix. We'll talk about the built-in password access in 100,000 Zyxel firewalls, VPN gateways, and access point controllers; an update on SpinRite 6.1; and a whole lot more. Security Now! is coming up next. -
Internet Safety: Keeping Your Computer Safe on the Internet
Copyright © 2003-2010 Puget Sound Software, LLC and Leo A. Notenboom 1 Internet Safety Keeping your Computer Safe on the Internet 3rd Edition by Leo A. Notenboom http://ask-leo.com Copyright © 2011 Puget Sound Software, LLC & Leo A. Notenboom All rights reserved. ISBN: 978-1-937018-03-0 Copyright © 2003-2010 Puget Sound Software, LLC and Leo A. Notenboom 1 Copyright and Disclaimer This book is protected by US and International copyright law, and is Copyright © 2011 by Leo A. Notenboom and Puget Sound Software, LLC, all rights are reserved. Having said that, the PDF electronic version (only) of this book is FREE. In fact, I encourage you to share this book with others as long as you share it: In its entirety (the book, the whole book and nothing but the book) In its original form (no changes made and no markups added) You may not charge for this book when you share it. Furthermore, you may not incorporate this book into any product or collection that is not free. (Drop me a line for pricing if you want to do something along those lines.) This book is based on my experience and anecdotal evidence. I've tried to ensure that everything written here is as accurate as possible at the time of publication, but I cannot assume any responsibility for mistakes or omissions. On top of that, I know nothing about your specific computer, your specific experience and your specific abilities to understand and act appropriately on the information herein. The bottom line is that you, and only you, are responsible for using this information appropriately, safely and as you see fit, and for any of the consequences of having done so. -
2013 Legal Apps for Android, Ipad/Mac & Windows 8 Users
2013 LEGAL APPS FOR ANDROID, IPAD/MAC & WINDOWS 8 USERS Information for lawyers on where to find apps, How To’s and more. Presented by: Atty Nerino J. Petro, Jr. Practice Management Advisor Practice411™ Law Office Management Assistance Program State Bar of Wisconsin Tablet Comparison Chart, Cont’d Contents Smartphone and Tablet Resource Links ......................................................................................... 4 For Android ..................................................................................................................................... 4 Android Online Resources .......................................................................................................... 4 Apple Mac Resources .................................................................................................................... 6 Mac Online Resources ............................................................................................................... 6 Apple iPhone and iPad ................................................................................................................... 7 iPhone and iPad Online resources: ........................................................................................... 7 BlackBerry ...................................................................................................................................... 8 Kindle Fire & Nook Tablet.............................................................................................................. 8 Windows 8 Resources -
SQRL: Anti-Phishing & Revocation
Security Now! Transcript of Episode #426 Page 1 of 30 Transcript of Episode #426 SQRL: Anti-Phishing & Revocation Description: After following-up on a week chockful of interesting security news, Steve and Leo continue with their discussion of SQRL, the Secure QR code Login system, to discuss two recent innovations in the system that bring additional valuable features. High quality (64 kbps) mp3 audio file URL: http://media.GRC.com/sn/SN-426.mp3 Quarter size (16 kbps) mp3 audio file URL: http://media.GRC.com/sn/sn-426-lq.mp3 SHOW TEASE: It's time for Security Now!. Steve Gibson has the latest - yes, another Java patch - and more information about Lavabit. More information about the NSA, too. What is a Ferret's Cannon? It's coming up next on Security Now!. Leo Laporte: This is Security Now! with Steve Gibson, Episode 426, recorded October 16th, 2013: SQRL, Anti-Phishing, and Revocation. It's time for Security Now!, the show that covers your privacy and security online. Somebody in the chatroom before we began the show today, Steve Gibson, Explainer in Chief, said we should call it "Insecurity Now!" since it really talks mostly about insecure. But not today. Today we're going to talk about better security. Steve Gibson: Well, yeah. Actually, this is one of those episodes where so much happened in the last week in security news that, I mean, we just - there's a whole bunch of really interesting stuff to talk about. And in the past when we've done that we've just said, okay, we're not going to have any major topic because too much happened. -
Podcast Industry Audience Rankings July 2016
PODCAST INDUSTRY AUDIENCE RANKINGS JULY 2016 2 INTRODUCTION With the growing popularity of podcasts, more and more brands and agencies are exploring the medium in search of opportunities that make the most sense for their brands. And publishers are making important content decisions about ways to expand or better serve their audiences across multiple shows. What is the most accurate measure of podcast audience size? An obvious place for advertisers to begin exploring podcast advertising is with understanding the relative audience sizes of podcast publishers and of podcasts individually. Podtrac has provided the leading measurement service for podcasts since 2005. In 2016, Podtrac introduced “Monthly Unique Audience” for the podcast industry. It's the same metric used for planning other types of digital media, and for the first time it's available for podcasts from Podtrac. Monthly Unique Audience from Podtrac is available: ● By podcast publisher across all of the podcast shows and episodes they produce ● By show for all of the podcast episodes they produce ● By global and U.S. audience counts “Monthly Unique Audience” is an important metric in digital media because it enables advertisers and publishers to consider monthly audience reach in addition to potential impressions served. And as with other media, the monthly unique audience metrics from Podtrac are consistent across publishers and shows whether the episodes post daily, twice a week, weekly, etc. Which podcasts are audiences listening to most? Podtrac produces a monthly Ranking Report showing the top publishers in the industry by US audience. Podtrac is in a unique position to produce this report, because of its podcast measurement technology and its 10+ years of measurement relationships with substantially all of the top publishers in the industry. -
700 & Counting
Security Now! Transcript of Episode #700 Page 1 of 27 Transcript of Episode #700 700 & Counting Description: This week we discuss Chrome getting spell check for URLs; a bunch of Linux news with reasons to be sure you're patched up; some performance enhancements, updates, additions, and deletions from Chrome and Firefox; more Facebook nonsense; a bold move planned by the Japanese government; Ubiquiti routers again in trouble; a hopeful and welcome new initiative for the Chrome browser; a piece of errata; a quick SQRL update; and some follow-up thoughts about VPN connectivity. High quality (64 kbps) mp3 audio file URL: http://media.GRC.com/sn/SN-700.mp3 Quarter size (16 kbps) mp3 audio file URL: http://media.GRC.com/sn/sn-700-lq.mp3 SHOW TEASE: It's time for Security Now!. Steve Gibson is here. Lots to talk about, including new systemd vulnerabilities. Linux users, listen up. We'll also talk a little bit about Chrome, a new feature giving us URL spell checking, and why TLS 1.0 and 1.1 are soon to hit the highway. It's all coming up next on Security Now!. Leo Laporte: This is Security Now! with Steve Gibson, Episode 700, recorded Tuesday, February 5th, 2019: 700 & Counting. It's time for Security Now!, the show where we cover the latest developments in the world of security and privacy, help you understand how computing works, and have a little fun along the way with this guy right here, Steve Gibson. He's the commander in chief of the good ship Security Now!. -
Ublock Origin
Security Now! Transcript of Episode #523 Page 1 of 27 Transcript of Episode #523 uBlock Origin Description: Leo and I catch up with the week's major security events. We then examine the ecosystem of web page advertising by comparing it to other "opportunistic advertising" such as that appearing on public transportation, highway billboards, broadcast television commercials and other public venues - which consumers have no obligation to consume. I eschew the implication that visitors to a web page have an obligation to retrieve third-party content, over which the website has little or no control, which consumes bandwidth, reduces online privacy, hinders performance, and potentially exposes visitors to malicious exploitation. And I believe this remains true even when a visitor's retrieval of such despicable third-party content would generate much-needed revenue for the visited site. Finally, I review the many operational features of uBlock Origin, my chosen HTML firewall, which effectively returns control to web users. High quality (64 kbps) mp3 audio file URL: http://media.GRC.com/sn/SN-523.mp3 Quarter size (16 kbps) mp3 audio file URL: http://media.GRC.com/sn/sn-523-lq.mp3 SHOW TEASE: It's time for Security Now!. Steve Gibson's here. This is the episode I've been waiting for all week. He's going to cover adblocking, why he thinks we need adblockers, and, I think, I'm guessing, his favorite ad blocker to date. Actually, I like it a lot, too. uBlock Origin, how it works, how to work it best, coming up next on Security Now!. -
Listener Feedback #236
Security Now! Transcript of Episode #566 Page 1 of 45 Transcript of Episode #566 Listener Feedback #236 Description: Leo and I catch up with a fun and interesting week of security happenings, including an expensive Windows update, a worrisome FBI hacking court decision, a fix for slow Windows 7 updating, more Comodo slime, JavaScript cryptomalware, yet another way to exfiltrate data from an air-gapped computer, a worrisome Netgear router flaw, the COOLEST brilliant new idea of the year, some miscellany, and questions and comments from our terrific listeners. High quality (64 kbps) mp3 audio file URL: http://media.GRC.com/sn/SN-566.mp3 Quarter size (16 kbps) mp3 audio file URL: http://media.GRC.com/sn/sn-566-lq.mp3 SHOW TEASE: It's time for Security Now!. It's been a busy week. I'm really glad to be back. Steve Gibson will have a rundown on the latest security news, including a way to speed up those updates on Windows 7. And then we'll answer 10 of your questions with 10 of Steve's answers. It works out well that way. Stay tuned. Security Now! is next. Leo Laporte: This is Security Now! with Steve Gibson, Episode 566, recorded Tuesday, June 28th, 2016: Your questions, Steve's answers, #236. It's time for Security Now!. I'm back, baby. And so is Steve Gibson of the GRC - what? Steve Gibson: I never left. Leo: You never left. You never left. Steve: I never left. Leo: In fact, by the way, first of all, thanks to Father Robert for filling in. -
Security Now! #560 051716 ZWave Goodbye
Security Now! #560 051716 ZWave Goodbye This week on Security Now! ● Steve's long love affair with Windows ● The Oracle/Google JAVA API lawsuit ● The pending registration of "burner" phones ● Surveillance microphones found in public areas ● John McAfee and team cracks WhatsApp encryption? ● The Ring Doorbell may need another update ● A securityrelated Kickstarter which Security Now listeners would never fall for. ● A controversial feature being removed from Windows 10 ● A worrisome and exploitable heap corruption in the popular 7Zip application ● ... and a look at the ZWave Home Automation system What was last week’s 3035583 refresh all about? Security News “Why does Steve hate Windows 10 so much?” ● Let’s get this straight, everyone: I LOVE WINDOWS. Source: https://analytics.usa.gov/ ● 83.60% = Win7/44.56% Win10/17.90% Win8.1/10.30% WinXP/7.46% Win8/3.38% ● My complaint is that Windows is a commercial, closedsource, profit center for a massive corporation which must keep finding ways to leverage Windows’ market share for its own profit. ● For me, Windows is not a curio, a toy, or a platform for instagram and social media. Windows is a tool. It is my chosen tool. But Microsoft needs to keep changing it, NOT TO MAKE IT BETTER, but only for the sake of making it new. ● So there is an inherent tension between Microsoft’s interests and my own. ● An operating system should manage file systems, manage the system’s memory, manage applications and services, provide I/O services… and more recently provide a comfortable and convenient desktop environment for its user. -
Building Your Cloud Infrastructure with Microsoft Azure
www.IGCM.com/eBook July 2015 Buildi ng Your Cloud Infrastructure with Microsoft Azure Five High Value IaaS Scenarios for Your Business Brian Bourne Building Your Cloud Infrastructure with Microsoft Azure Building Your Cloud Infrastructure with Microsoft Azure Five High Value IaaS Scenarios for Your Business An eBook by Brian Bourne, President, New Signature Canada Table of Contents 1. Introduction: Cloud and Infrastructure as a Service .......................................................... 3 2. Cloud Computing: State of the Union .................................................................................... 5 Defining Cloud ....................................................................................................................... 5 Public, Private and Hybrid Cloud ........................................................................................... 5 IaaS, PaaS and SaaS ............................................................................................................ 6 Benefits of Moving IT Infrastructure to the Cloud .................................................................. 7 Cost Comparison: IaaS and On-Premise .............................................................................. 8 Moving to a cloud-first business world ................................................................................ 11 3. Getting Started with Azure IaaS .......................................................................................... 12 Overview of Azure, Microsoft's cloud platform ................................................................... -
Microsoft and Cray to Unveil $25,000 Windows-Based Supercomputer
AAll About Microsoft: l lCodeTracker A monthly look at Microsoft’s codenames and what they Areveal about the direction of the company. b o u t M i c r o s o f t : All About Microsoft CodeTracker Keeping track of Microsoft's myriad codenames is an (almost) full-time occupation. I know, as I spend a lot of my work hours tracking down the latest names in the hopes of being able to better keep tabs on what's coming next from the Redmondians. Each month, I'll be releasing an updated, downloadable version of the CodeTracker. I'll add new codenames -- arranged in alphabetical order by codename -- of forthcoming Microsoft products and technologies. I also will note timing changes (date slips, the release of a new test build, the disappearance of a planned deliverable) for entries that are already part of the Tracker. Once Microsoft releases the final version of a product or technology I've been tracking, I will remove it from the Tracker. In that way, the CodeTracker will remain focused on futures. (An aside about the Tracker: A question mark in place of an entry means I have insufficient information to hazard even an educated guess about a particular category.) If you have suggested new entries or corrections to existing ones, please drop me an e-mail at mjf at microsofttracker dot com. Thanks! Mary Jo Foley, Editor, ZDNet's "All About Microsoft" blog This Month's Theme: OOF It’s the height of the summer here in the U.S., and summer holidays are in full swing for the Softies.