Reliable Answers - News and Commentary

Technology in the News

Technology is constantly changing and providing the casual user with challenges never dreamed of. Technology in the News is provided in an effort to assist you in getting the most out of your computer, while avoiding some of the pitfalls. Your computer really isn't out to get you. Why not learn to be friends?

      
 Title   Date   Author   Host 

theantimedia.org

by Reason:

December 1, 2015

The media widely proclaimed the NSA's bulk data collection of Americans dead as of last night. Here's the part of the story they forgot to mention.

Sunday marked the end of the NSA's highly contentious bulk data collection program, as widely reported by corporate media outlets. But for all intents and purposes, as the USA Freedom Act kicked off in its place on Sunday, this termination was a purely hollow, symbolic gesture. As Edward Snowden revealed two years ago, the National Security Agency implemented a program to vacuum up the metadata of essentially all domestic communications in the U.S. by liberally interpreting controversial provisions in the USA Patriot Act - which federal courts have since found unconstitutional. Under the transparent guise of fighting terrorism, the NSA argued in court its justification for casting such a broad net; but after an earlier reversal, District Court Judge Richard Leon ripped into the program in an epicly caustic ruling in favor of civilians.

realwaystoearnmoneyonline.com

November 24, 2015

Many readers over the years have asked me about ways to make money online doing research.

There's no question that being good at online research is a profitable skill, so if you're someone who is a master of Google, or the person everyone else goes to when they are looking for specific info and they know you can find it faster than they can, then you'll want to read this post.

kdvr.com

November 24, 2015

Are you one of 17 million Facebook users using the "Most Used Words" wordcloud the Facebook app? If so, you might want to delete the app as soon as possible.

According to Comparitech, a tech comparison and review website, the popular app is a "privacy nightmare." The app reportedly scans all posts in 2015 and is "harvesting a tranche" of personal information. Comparitech said app users must elect to "give up almost every private detail" about themselves to use the app.

naturalhealth365.com

November 22, 2015

Most people remain clueless about the real dangers of wireless technology.  Discover what the health experts are saying and how to protect yourself.

Wireless devices emit radio frequency radiation or microwave radiation at the rate of billions of cycles per second. Thousands of peer-reviewed studies point to the link between these exposures and a long list of adverse biological health effects and very serious diseases, including brain tumors, cancer and cardiovascular disease.

chrome.blogspot.com

by Marc Pawliger

November 10, 2015

Today, we're announcing the end of Chrome's support for Windows XP, as well as Windows Vista, and Mac OS X 10.6, 10.7, and 10.8, since these platforms are no longer actively supported by Microsoft and Apple.

Starting April 2016, Chrome will continue to function on these platforms but will no longer receive updates and security fixes. If you are still on one of these unsupported platforms, we encourage you to move to a newer operating system to ensure that you continue to receive the latest Chrome versions and features.

govtech.com

by Daniel Rothberg

November 2, 2015

Because of recent updates to the encryption on Google and Apple software, newly updated Androids and iPhones no longer can be unlocked -- even if law enforcement officers have a warrant.

It's the modern-day version of an age-old question criminal investigators face: What do you do with an unbreakable safe? That's the analogy Christopher Lalli, a Clark County assistant district attorney, uses to describe the situation detectives face when criminal investigations involve passcode-protected smartphones.

kc.mcafee.com

October 19, 2015

A specially crafted username can bypass SIEM ESM authentication (password is not validated) if the ESM is configured to use Active Directory or LDAP authentication sources. This can result in the attacker gaining NGCP (master user) access to the ESM.

McAfee Enterprise Security Manager (ESM), Enterprise Security Manager/Log Manager (ESMLM), and Enterprise Security Manager/Receiver (ESMREC) 9.3.x before 9.3.2MR19, 9.4.x before 9.4.2MR9, and 9.5.x before 9.5.0MR8, when configured to use Active Directory or LDAP authentication sources, allow remote attackers to bypass authentication by logging in with the username "NGCP|NGCP|NGCP;" and any password.

politico.com

by Jenny Hopkinson

October 15, 2015

TPP countries could release the final text of the agreement as soon as next Tuesday - the day after elections in Canada - where the trade deal has proven to be a politically charged issue.

The Canadian Broadcasting Corporation reported, citing unnamed Canadian officials, that Canada had requested a quick conclusion to the process of preparing the text for public release, but lawyers among the 12 governments were still haggling over the details.

twainhartetimes.com

by Annie

October 13, 2015

If life wasn't hard enough these days, beware the scam artist. Have you had the call yet?  The one where Microsoft is calling you, telling YOU that...

But really? Does PG&E call you at home, not unless they have scheduled and outage and even then, it's an automated recording, not a real person. They just don't call and ask for money. Period. We've had several clients and friends who have endured the humiliation, the financial lost and the frustration of being ripped of for hundreds, even thousands of dollars.

cbsnews.com

August 25, 2015

Of all the sinister things that Internet viruses do, this might be the worst: They can make you an unsuspecting collector of child pornography.

Heinous pictures and videos can be deposited on computers by viruses - the malicious programs better known for swiping your credit card numbers. In this twist, it's your reputation that's stolen. Pedophiles can exploit virus-infected PCs to remotely store and view their stash without fear they'll get caught. Pranksters or someone trying to frame you can tap viruses to make it appear that you surf illegal Web sites.

      
[ASP] - learn and discuss Active Server Pages

Take me to the top

Reliable Answers.com does not endorse any Google advertisers, these ads are managed by Google. They are here to pay for hosting expenses. If you notice an inappropriate ad, please contact Shawn with the domain of the offensive advertiser.


Take me to the top

Your Ad Here?

Contact our Marketing department for information about advertising on this domain.


Take me to the top

We invite you
to visit:

Professional Web Hosting and Design Services: 12 Point Design Local Homeschool provides the most up-to-date support group listings in a geographical and searchable index Budget Homeschool Kidjacked -- To seize control of a child, by use of force SaferPC dispels security misunderstandings and provides you with a solid understanding of viruses and computer security Reliable Answers - developer information, current news, human interest and legislative news Twain Harte Photo Gallery - Twain Harte, CA - The closest you can get to Heaven on Earth Cranial Laser & Neurolymphatic Release Techniques (CLNRT) - Experience dramatic pain reduction At Summit Chiropractic our mission is to improve your quality of life - We know that health is much more than just not feeling pain Visit UniveralPreschool.com to learn about your preschool options. Dave's Quick Search Deskbar
Reliable Answers.com/pc/news.asp AddThis Social Bookmark Button
Google