tag:blogger.com,1999:blog-212555252024-03-14T12:23:54.090+07:00Digital News UpdateUnknownnoreply@blogger.comBlogger324125tag:blogger.com,1999:blog-21255525.post-21505525335984224112019-07-06T14:33:00.002+07:002019-07-06T14:34:24.518+07:005G is going to be a shaky experience to make the leap with one more potential impact coming<div class="separator" style="clear: both; text-align: center;">
<a href="https://1.bp.blogspot.com/-aS0c6SxHZNQ/XSBOkZzTS8I/AAAAAAAAOdM/VwydzPWCkUgWUyatSp9gSV4O3_aUJpkagCLcBGAs/s1600/5g%2Bshaky%2Bexperience.jpg" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"><img border="0" data-original-height="525" data-original-width="700" src="https://1.bp.blogspot.com/-aS0c6SxHZNQ/XSBOkZzTS8I/AAAAAAAAOdM/VwydzPWCkUgWUyatSp9gSV4O3_aUJpkagCLcBGAs/s1600/5g%2Bshaky%2Bexperience.jpg" /></a></div>
<br />
5G, the next generation of wireless technology, promises to do a lot of things. It'll allow you to download big games and movies in a flash. It'll connect all sorts of devices around you, from street lamps to self-driving cars. It'll enable new fields such as streaming VR experiences and telemedicine.<br />
<br />
There's at least one more potential impact coming: a hit to your wallet. Wireless carriers rarely like to give anything away for free. And given the hype and excitement over 5G, it seems like a perfect time to tack another charge onto your mobile plan.<br />
<br />
Verizon, for instance, waived the $10-a-month fee for 5G for customers who bought 5G Moto Mod or Galaxy S10 5G -- a smart move considering how small a footprint is available. But the company should go the extra mile and eliminate the fee altogether.<br />
<br />
Sprint doesn't charge a fee, but requires you to sign up for its $80 "Unlimited Premium" plan.<br />
<br />
AT&T, which launched its 5G network for businesses in December but hasn't made it available to consumers, didn't provide specifics about the pricing plans for its business customers.<br />
<br />
5G is going to be a shaky experience for anyone looking to make the
leap, and we advise that you exercise a little patience before buying a
5G phone.<br />
<br />
Growing pains are inevitable as new networks spring up, and that's all the more reason for carriers to resist the urge to charge extra fees for the privilege of accessing 5G services. Early adopters shouldn't be taxed for the work-in-progress nature of these networks.<br />
<br />
Beyond fees, the carriers should remove the data limitations that call for throttling once you've consumed a certain amount of data. Under 4G, Verizon's $60-a-month "AboveUnlimited" plan, for instance, gives the carrier the right to limit you if you've hit 75 gigabytes of data. T-Mobile's $50 "Magenta Plus" plan has a throttling limit of 50B before the carrier can slow you down during heavy congestion periods. <br />
<br />
5G will serve as the catalyst for new services and applications. But in order to get to that bright future, we need to ensure a wide highway that's free of tolls. (<a href="https://www.cnet.com/profiles/rogercheng24/" target="_blank">Roger Cheng</a>)<br />
<br />
<br />
<br />
<br />
<br />
<br />
<br />
<br />
<br />
<br />Unknownnoreply@blogger.comtag:blogger.com,1999:blog-21255525.post-36493704346487020622019-07-04T13:47:00.000+07:002019-07-06T14:54:29.161+07:00The Most Useful Tools And Services For web developers<div class="separator" style="clear: both; text-align: center;">
<a href="https://1.bp.blogspot.com/-det2GUl1kcg/XR2gnVhFSTI/AAAAAAAAObc/J9RD-oqy97kEpkMnej3T3HmBaIiPBH_oACLcBGAs/s1600/tools%2Band%2Bservice%2Bfor%2Bweb%2Bdevelopers.jpg" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"><img border="0" data-original-height="1073" data-original-width="1600" src="https://1.bp.blogspot.com/-det2GUl1kcg/XR2gnVhFSTI/AAAAAAAAObc/J9RD-oqy97kEpkMnej3T3HmBaIiPBH_oACLcBGAs/s1600/tools%2Band%2Bservice%2Bfor%2Bweb%2Bdevelopers.jpg" /></a></div>
<br />
Life as a web developer may offer many rewards, but when project managers or clients are asking you to do more and more in less and less time, it can become frustrating. So it's always good to find tools and services that can make your work faster and more productive. <br />
<br />
Here we've gathered together some of the most useful tools and services that should be part of every web developer's toolkit. Whether you a building a simple "Hello World" app or a complex web application, these tools should make your coding easier and increase productivity.<br />
<br />
1. <a href="http://babeljs.io/repl"><b>Babeljs.io/repl</b></a><br />
Write your code in modern JavaScript and let Babel transform your code into JavaScript that is compatible with even older browsers.<br />
<br />
2. <b><a href="http://basecamphq.com/" target="_blank">Basecamp</a></b><br />
Developed by 37signals, Basecamp is a popular online tool to help you manage collaboration and project management with ease. It all runs in the cloud and most people working in web design and development will be familiar with it.<br />
<br />
3. <a href="http://blokkfont.com/" target="_blank"><b>BLOKK</b></a><br />
BLOKK is a fun-to-use font for "clients who do not understand Latin". In other words, it replaces all text with blocks to suggest generic text instead. That way you can create good looking mock-ups and wireframes without confusing people with Lorem Ipsem<br />
<br />
4. <a href="http://buildregex.com/"><b>Buildregex.com</b></a><br />
Construct regular expressions visually.<br />
<br />
5. <b><a href="http://bundlephobia.com/">Bundlephobia.com</a></b><br />
Quickly find the import cost (download size) of any package in the NPM registry. Or upload your package.json file to scan all dependencies in your project.<br />
<br />
6. <b><a href="http://codeply.com/">Codeply.com</a></b><br />
Quickly build frontend responsive layouts with frameworks like Bootstrap, Materialize CSS and SemanticUI.<br />
<br />
7. <a href="http://spritegen.website-performance.org/" target="_blank"><b>CSS Sprite Generator</b></a><br />
By reducing the number of HTTP requests, this tool aims at increasing the loading speed of your website. Images are combined into one larger image at defined X and Y coorindates. Having assigned this generated image to relevant page elements the background-position CSS property can then be used to shift the visible area to the required component image.<br />
<br />
8. <a href="http://devdocs.io/"><b>Devdocs.io</b></a><br />
API documentation for all popular programming languages and frameworks. Includes instant search and works offline too.<br />
<br />
9. <a href="http://fontello.com/" target="_blank"><b>Fontello</b></a><br />
This icon generator is truly one of a kind. Pick the icons you want and Fontello will compile them into customized web fonts. You can also edit and customize the symbol codes and names.<br />
<br />
10. <a href="http://foundation.zurb.com/" target="_blank"><b>Foundation</b></a><br />
Made by develpopers for developers at ZURB, this prototyping tool acts as a blueprint for your responsive design projects. Its latest version is an easy grid-structure that makes styling even more convenient and flexible. It works with both SASS and CSS.<br />
<br />
11. <a href="https://glitch.com/" target="_blank"><b>Glitch</b></a> <br />
Create your own web apps in the browser, import GitHub repos, use any NPM package or build on any popular frameworks and directly deploy to Firebase.<br />
<br />
12. <a href="http://httpie.org/"><b>httpie.org</b></a><span id="goog_364678112"></span><a href="https://www.blogger.com/"></a><span id="goog_364678113"></span><br />
A command-line tool that is useful for making HTTP requests to web servers and RESTful APIs. Almost as powerful as CURL and Wget but simpler.<br />
<br />
13. <a href="http://jex.im/regulex"><b>jex.im/regulex</b></a><br />
Write any regular expression into the editor and get a visual representation of how the pieces work.<br />
<br />
14. <a href="http://loadimpact.com/" target="_blank"><b>Load Impact</b></a><br />
A successful website is one that loads faster and quickly. Load Impact is a cloud-based service for load testing and website optimization that generates traffic load by simulating users. In other words it lets you test how your website, web app, mobile app or API will perform with up to 1.2 million concurrent users.<br />
<br />
15. <a href="https://www.pingdom.com/" target="_blank"><b>Pingdom</b></a><br />
Pingdom is a service that tracks the uptime, downtime, and performance of websites. Upload a full page in HTML and it will mimic the loading process of the entire website, incorporating all the elements (namely JavaScript, RSS, CSS and images), thereby enabling you to check and monitor the efficiency of your site.<br />
<br />
16. <a href="http://c9.io/" target="_blank"><b>Cloud9 IDE</b></a><br />
Cloud9 IDE is a tool to help you collaborate with others on big-scale code projects. Letting developers around the world edit the same code and chat together in realtime, it's fast emerging as one of the best browser-based IDEs. Features include code completion and editor, drop-document trees, smart drag and FTP integration.<br />
<br />
17. <a href="http://cloudcmp.co/" target="_blank"><b>Cloud Comp</b></a><br />
This lightweight and easy to use tool helps you share website and apps with others. It's been specifically built to give designers and developers a way to present comps to their clients inside of a realistic device shell.<br />
<br />
18. <a href="http://leaverou.github.io/prefixfree/" target="_blank"><b>Prefix-free</b></a><br />
This cool tool from Lea Verou lets you use unprefixed CSS properties. It essentially works behind the scenes, adding the current browser’s prefix to any CSS code, only when it’s needed.<br />
<br />
19. <a href="http://regexr.com/"><b>Regexr.com</b></a><br />
A good tool for testing your regular expressions in the browser.<br />
<br />
20. <a href="http://www.typetester.org/" target="_blank"><b>Typetester</b></a><br />
The Typetester is a browser tool for comparing different kinds of fonts, Choose the typeface you want to test out, along with your chosen size, tracking, colour etc, and Typetester applies it to a set piece of text so you can see what it will look like.<br />
<br />
21. <a href="http://validator.w3.org/" target="_blank"><b>W3c Markup Validation Service</b></a><br />
Validating web documents is an important step that can dramatically help improving and ensuring their quality. This free service from the W3C helps you to check the markup validity of different web documents, in HTML, SMIL, XHTML and MathML and more.<br />
<br />
(images: <a href="https://unsplash.com/@kobuagency" target="_blank">Kubo agency</a>)Unknownnoreply@blogger.comtag:blogger.com,1999:blog-21255525.post-36498158468666990962019-07-03T23:00:00.000+07:002019-07-03T23:01:07.456+07:00Microsoft Your Phone app; Sync, See and manage Android notifications on Your PC<div class="separator" style="clear: both; text-align: center;">
<a href="https://1.bp.blogspot.com/-A8Jr_djVSeM/XRzP0eZv3cI/AAAAAAAAObQ/CZH3ThSG6L0JEy_EXDw6HI-tZOh-idXsQCLcBGAs/s1600/microsoft%2Byour%2Bphone%2Bapp.jpg" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"><img border="0" data-original-height="720" data-original-width="1280" src="https://1.bp.blogspot.com/-A8Jr_djVSeM/XRzP0eZv3cI/AAAAAAAAObQ/CZH3ThSG6L0JEy_EXDw6HI-tZOh-idXsQCLcBGAs/s1600/microsoft%2Byour%2Bphone%2Bapp.jpg" /></a></div>
<br />
<br />
A new update to Microsoft's Your Phone app will be extremely useful for professionals who move between an Android phone and a Windows 10 PC for work or personal use. A new feature in the app allows users to get all of their Android phone notifications—or the ones they select—directly on their PC. <br />
<br />
Users will also be able to manage those Android notifications on their PC, responding to texts through the computer instead of the phone. You can also take a photo on your Android phone and see it on your computer immediately, which could be helpful for adding photos to a presentation or social media scheduling tool.<br />
<br />
The Your Phone app launched last year, with Microsoft continually testing and rolling out new features for Windows Insiders. The feature allowing users to sync app notifications from the phone to a connected Windows 10 PC began rolling out for Windows Insiders using the app back in April<br />
<br />
In May, Windows added updates to the app including the ability to send and receive MMS messages, images, and GIFs, as well as syncing over mobile data, and not just over WiFi.<br />
<br />
With the latest update, if someone messages you on WhatsApp, for example, you will be able to click the notification on your PC and it will open WhatsApp on your phone, and mirror the phone screen to your PC, allowing you to reply, Thurrott noted. <br />
<br />
Here's how to use Your Phone to receive and manage Android notifications on your Windows 10 PC: <br />
<br />
<ol>
<li>Link your Android phone to your computer in Windows Settings, or through the Your Phone app</li>
<li><a href="https://www.microsoft.com/en-us/p/your-phone/9nmpj99vjbwv?rtc=1#activetab=pivot:overviewtab" target="_blank">Download the Your Phone app from Microsoft</a> to your mobile phone (you must have Android 7.0 or later)</li>
<li>Follow the setup prompts </li>
</ol>
(<a href="https://www.techrepublic.com/meet-the-team/us/alison-denisco-rayome/" target="_blank">Alison DeNisco Rayome</a>) Unknownnoreply@blogger.comtag:blogger.com,1999:blog-21255525.post-90249339304233839762019-07-03T21:28:00.001+07:002019-07-03T23:16:32.310+07:00The Height and the letter of your name can impact your chances at success, Here is Why<div class="separator" style="clear: both; text-align: center;">
<a href="https://1.bp.blogspot.com/-Xaw2EcKiLEc/XRy7GwM3B8I/AAAAAAAAObE/tDKvBfBbHEQF_axpbY4Jtu_TrNqfmpQIQCLcBGAs/s1600/height%2Band%2Bname%2Bimpact%2Bchance%2Bat%2Bsuccess.jpg" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"><img border="0" data-original-height="936" data-original-width="970" src="https://1.bp.blogspot.com/-Xaw2EcKiLEc/XRy7GwM3B8I/AAAAAAAAObE/tDKvBfBbHEQF_axpbY4Jtu_TrNqfmpQIQCLcBGAs/s1600/height%2Band%2Bname%2Bimpact%2Bchance%2Bat%2Bsuccess.jpg" /></a></div>
<br />
A study from the <a href="http://www.jstor.org/stable/10.1086/679675" target="_blank">University of Chicago</a> found that height was key, and that "taller workers receive a substantial premium in earnings." Even the first letter of your name can impact your chances at success, according to a study by the <a href="http://www.colorado.edu/Economics/Zax/workingpapers/Alphabetism.pdf" target="_blank">University Of Colorado</a> Boulder.<br />
<br />
People with names that start with letters further down the alphabet experienced, "significant and substantial negative effects on outcomes in high school, educational attainment and first labor market experiences," likely due to "reduced opportunities in alphabetically-ordered searches."<br />
<br />
In an <a href="https://blog.linkedin.com/2011/04/27/top-ceo-names" target="_blank">analysis of names and careers</a> on its site, LinkedIn found that for men, one syllable names, like Bob and Jack, dominated the C-suite. The post cites an expert who suggests the shortened versions of names often "denote a sense of friendliness and openness."<br />
(<a href="https://twitter.com/Ali_Montag" target="_blank">Ali Montag</a>)Unknownnoreply@blogger.comtag:blogger.com,1999:blog-21255525.post-6030858345458661992019-07-03T10:28:00.001+07:002019-07-03T10:28:50.344+07:00The Next Billionaires Will Come From Asia And India Leads in Terms of Forecast UHNWI<table align="center" cellpadding="0" cellspacing="0" class="tr-caption-container" style="margin-left: auto; margin-right: auto; text-align: center;"><tbody>
<tr><td style="text-align: center;"><a href="https://1.bp.blogspot.com/-ncXKUOrFqr8/XRwgp4RAMEI/AAAAAAAAOa0/tzRWJofvXUADkowGL5SPQ89M1g_4DuTwgCLcBGAs/s1600/mukesh%2Bambani%2Bantilia%2Bmansion.jpg" imageanchor="1" style="margin-left: auto; margin-right: auto;"><img border="0" data-original-height="390" data-original-width="700" src="https://1.bp.blogspot.com/-ncXKUOrFqr8/XRwgp4RAMEI/AAAAAAAAOa0/tzRWJofvXUADkowGL5SPQ89M1g_4DuTwgCLcBGAs/s1600/mukesh%2Bambani%2Bantilia%2Bmansion.jpg" /></a></td></tr>
<tr><td class="tr-caption" style="text-align: center;">Pictures of Mukesh Ambani's $2 billion Mumbai residence 'Antilia' </td></tr>
</tbody></table>
As the fastest growing economic region, Asia is home to a large number of billionaires like Masayoshi Son, Mukesh Ambani, Jack Ma, Ma Huateng and others. And it seems there will be no slowing down in this trend.<br /><br />According to Knight Frank's Wealth Report Asia is the biggest hub for billionaires, with their number in the region set to rise above 1,000 by 2023, accounting for more than a third of the world’s billionaire population of 2,696.<br /><br />The report shows that India leads in terms of forecast UHNWI (Ultra-high net-worth individuals)($30m+) growth over the next five years, with an expected rise of 39 percent growth, followed by the Philippines (38%) and China (35%). Of the 59 countries and territories included in the wealth forecasts, eight of the top ten countries are from Asia.<br /><br />However, it is worth noting that some of these countries are starting from a low base. For example, Romania will have 278 UHNWIs by 2023, while Ukraine will have 485. The Philippines is forecast to have 296 UHNWIs by 2023, less than 2 percent of the ultra-wealthy population of Japan, the biggest Asian wealth hub with 20,570.<br /><br /><b>Asia Giving Tough Fight to Others</b><br /><br />"Equity markets, real estate markets and luxury investments all had a stellar year in 2017. Growth in 2018 has been good in some cases, but has not replicated the levels seen in 2017, and the outlook reflects more mixed conditions ahead," says Oliver Williams, head of GlobalData WealthInsight.<br /><br />Even so, 2019 marks the point when the number of people globally with $1 million or more in net assets – HNWIs – will exceed 20 million for the first time, according to GlobalData WealthInsight. Some 6.6 million of these individuals will be based in North America, with 5.9 million in Europe and a further 5.8 million in Asia.<br /><br /><b>Ease of Doing Business Proportionate to Wealth</b><br /><br />Williams highlights the link between entrepreneurialism and wealth creation.<br /><br />"The ease with which a business can be created affects the number of wealthy entrepreneurs in a country and also the spread of wealth," he says.<br /><br />Asia is the biggest hub for billionaires, with numbers in the region set to rise above 1,000 by 2023, accounting for more than a third of the world’s billionaire population of 2,696. China in particular has seen a sharp rise in the number of billionaires in the last five years, but growth looks set to moderate in the medium term.<br /><br />William adds, "The easier it is, the more equal wealth is among HNWIs. Countries where building a business is more challenging, whether due to regulation or culture, tend to have a higher concentration of wealth and therefore a disproportionate number of UHNWIs and billionaires."<br />
(<a href="https://twitter.com/Nidhi_March" target="_blank">Nidhi Singh</a>)Unknownnoreply@blogger.comtag:blogger.com,1999:blog-21255525.post-29722653780916916002019-07-02T17:06:00.001+07:002019-07-02T17:06:54.936+07:0022 Percent of The Worlds Wealthiest People Have Engineering Degrees and Born in Late September<div class="separator" style="clear: both; text-align: center;">
<a href="https://1.bp.blogspot.com/-v7R2WlAj_3U/XRsjAzwQLyI/AAAAAAAAOag/HQeLTfeDFHM26eoKEGxLSIrBVoytv8ZwQCEwYBhgL/s1600/world%2Bwealthies%2Bpeople%2Bare%2Bengineer.jpeg" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"><img border="0" data-original-height="467" data-original-width="700" src="https://1.bp.blogspot.com/-v7R2WlAj_3U/XRsjAzwQLyI/AAAAAAAAOag/HQeLTfeDFHM26eoKEGxLSIrBVoytv8ZwQCEwYBhgL/s1600/world%2Bwealthies%2Bpeople%2Bare%2Bengineer.jpeg" /></a></div>
<br />
Take a look at the background of the biggest billionaires. What does it take to become a billionaire?<br />
<br />
Forbes recently released its annual list of the richest people in the world. The publication noted that there are currently 2,153 billionaires, down 55 from 2018. Of the 250 that made it to the very top, many of the usual suspects, Jeff Bezos, Bill Gates and Warren Buffett are right where we left them last year.<br />
<br />
Website registry platform UK Domain did some research on the world's richest billionaires to identify some common threads among their backgrounds.<br />
<br />
With regard to education, there were 128 colleges that the 250 richest billionaires attended for undergrad. But the most common college degree for the billionaires was a lack of one, 17 people on the list dropped out of school. Following dropping out, most billionaires went to Harvard University (seven people), University of Pennsylvania (six people), Yale University (five people) and Sweden’s Lund University (five people).<br />
<br />
The top three degree subjects were engineering at 22 percent, business at 17.6 percent and economics and finance at 17 percent.<br />
<br />
And for something a little more whimsical and will not likely to have a ton of bearing on whether you add nine zeros to your bank account, apparently the top five astrological signs were Libra with 27 billionaires, Pisces with 22, and Cancer, Taurus and Leo all with 20 each.<br />
<br />
So if you're an Ivy League graduate with an engineering background that was born in late September/early October, perhaps you too can make the billionaire list someday :)<br />
(Nina Zipkins)Unknownnoreply@blogger.comtag:blogger.com,1999:blog-21255525.post-70340106938060057782019-07-01T00:01:00.002+07:002019-07-01T00:01:12.205+07:00AI Job postings Increased And Machine Learning Engineers Are The Most In-Demand<div class="separator" style="clear: both; text-align: center;">
<a href="https://1.bp.blogspot.com/-_B087hTtf1s/XRjqpiVDdEI/AAAAAAAAOZ0/osYqomc6_oIwT_Xegxqb_Zh_dPpAhSc_wCLcBGAs/s1600/Artificial%2Bintelligence%2Bjob%2Bmachine%2Blearning.jpg" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"><img border="0" data-original-height="1096" data-original-width="1600" src="https://1.bp.blogspot.com/-_B087hTtf1s/XRjqpiVDdEI/AAAAAAAAOZ0/osYqomc6_oIwT_Xegxqb_Zh_dPpAhSc_wCLcBGAs/s1600/Artificial%2Bintelligence%2Bjob%2Bmachine%2Blearning.jpg" /></a></div>
<br />
Artificial intelligence job postings increased in the past year, and those in the field can make over $100,000 in salary, according to job search site Indeed. <br />
<br />
Demand for artificial intelligence (AI) jobs grew 29% in the last year, though has begun to slow down from years prior, according to new data from job search site Indeed. With more open jobs than qualified candidates to fill them, many AI-related roles command large salaries, Indeed found. <br /><br />Machine learning engineers are the most in-demand AI job based on the number of job postings, and also are offered the highest paycheck on average. They are also the professionals with the largest boost in salary year over year, the data showed.<br /><br />Here are the five AI job titles with the highest salaries, according to <a href="http://blog.indeed.com/2019/06/28/top-10-ai-jobs-salaries-cities/" target="_blank">Indeed</a>:<br /><br /><b>1. Machine learning engineer</b><br />Average salary: $142,859<br /><br /><b>2. Data scientist</b><br />Average salary: $126,927<br /><br /><b>3. Computer vision engineer</b><br />Average salary: $126,400<br /><br /><b>4. Data warehouse architect</b><br />Average salary: $126,008<br /><br /><b>5. Algorithm engineer</b><br />Average salary: $109,313<br /><br />Machine learning engineers were the third-highest paying job in Indeed's previous two rankings. This year, it jumped in salary $8,409 over last year, or 5.8%, bringing it to the no. 1 spot. Algorithm engineer salaries also jumped $5,201 or about 5% over last year. Both of these increases are likely a result of companies spending more to attract talent to these roles in a competitive tech jobs market, Indeed noted. <br /><br />Similar to Indeed's ranking of the most in-demand AI jobs of 2019, those with the highest salaries demonstrate how the AI labor market is evolving, the data showed. More generalized positions that were found on last year's list of highest salaries, including director of analytics, data engineer, and computer scientist, but didn't make the list this year. <br /><br />In terms of the best cities to find an AI job based on the number of open positions, New York, San Francisco, and Washignton, D.C. topped the list, according to Indeed. (<i><a href="https://www.techrepublic.com/meet-the-team/us/alison-denisco-rayome/" target="_blank">Alison DeNisco</a>/photo:<a href="https://unsplash.com/photos/g29arbbvPjo" target="_blank">Franck V</a></i>)Unknownnoreply@blogger.comtag:blogger.com,1999:blog-21255525.post-1765543470387080342019-06-30T23:37:00.000+07:002019-06-30T23:37:31.297+07:0012 Companies That Offer Flexible Work Options, As Well As Financially Supported Vacation Time<div class="separator" style="clear: both; text-align: center;">
<a href="https://1.bp.blogspot.com/-o0ix_lobBaU/XRjkBt-1dCI/AAAAAAAAOZo/gkCO2qDcecoj0ChyGbAYGkYrQzoVsI1rQCLcBGAs/s1600/flexible%2Bwork%2Boptions%2Bremote%2Bjobs.jpg" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"><img border="0" data-original-height="1600" data-original-width="1280" src="https://1.bp.blogspot.com/-o0ix_lobBaU/XRjkBt-1dCI/AAAAAAAAOZo/gkCO2qDcecoj0ChyGbAYGkYrQzoVsI1rQCLcBGAs/s1600/flexible%2Bwork%2Boptions%2Bremote%2Bjobs.jpg" /></a></div>
<br />
Flexibility is becoming a necessity for many employees. Here are 12 companies that not only provide vacation time, but remote work options.<br /><br />The emergence of more teleconference capabilities and cloud computing has made flexible scheduling and remote work increasingly popular, perhaps even a new normal, according to a recent <a href="http://info.condecosoftware.com/the-modern-workplace-2019-20" target="_blank">Condeco Software report</a>. Nearly half of US employers already offer remote work options, the report found. <br /><br />Many remote work positions are in the gig economy, and independent contractors often aren't able to take paid time off (PTO) for vacations or personal reasons. However, even full-time employees aren't making use of their vacation time, taking shorter trips to not get too behind on projects.<br /><br />Companies are taking note of the unused vacation time, resulting in some actually helping workers take the much-needed time by financially supporting trips via discounts, stipends, and reimbursements, according to a report from Glassdoor and Business Insider. <br /><br />The report compiled a list of the top 12 companies that offer flexible work options, as well as financially supported vacation time. <br /><br />Here are the 12 organizations according to <a href="http://flexjobs.com/">flexjobs.com</a>: <br /><br /><b>1. AFAR Media</b><br />AFAR Media is a travel media brand that seeks to inspire global travel. The company has a magazine, along with a website that features travel guides and articles. According to a blog post posted by the company, full-time employees receive 30 days of vacation time and a $2,000 stipend to encourage them to travel to new places.<br /><br /><b>2. Airbnb</b><br />Airbnb was established in 2008 as an online hospitality marketplace for hosts and travelers to connect. Airbnb features listings for homes, rooms for rent, villas, boutique hotels, and more. It has served thousands of people through its 2 million worldwide listings. Employees receive $2,000 worth of travel coupons each year.<br /><br /><b>3. BambooHR</b><br />BambooHR is an HR software solutions company that seeks to help companies move beyond spreadsheets. It offers software to help with applicant tracking, employee onboarding, time-off management, employee database, and more. Located in Lindon, Utah, the company has hired for part-time and remote jobs in the area. BambooHR offers employees what they call “paid paid vacation“—$2,000 each year to travel as you please.<br /><br /><b>4. Basecamp</b><br />Basecamp, founded in 1999, is the creator of a popular project management tool of the same name. The distributed company has 50 employees working across 32 cities. According to Business Insider, employees who have worked with the company for one year or more get to choose from 16 different paid vacation packages each year. These trips are valued at $4,000-$5,000 each.<br /><br /><b>5. Evernote</b><br />Evernote is an all-encompassing app that allows users to capture, organize, and share notes in one place. Links, tables, audio messages, and more can be included in each note. Evernote is located in Mountain View, California, and has offered freelance jobs in the past. The company offers employees unlimited vacation days and a $1,000 yearly vacation stipend.<br /><br /><b>6. Expedia</b><br />As a well-known travel booking site, Expedia has served clients in more than 60 countries worldwide. Users of the site can book flights, hotels, rental cars, cruises, and even activities. As an employer, Expedia hires for freelance and telecommute positions. Employees of the company receive a travel reimbursement that ranges from $250-$750, depending on tenure. They also receive discounts on retail and travel packages purchased through the site.<br /><br /><b>7. FullContact</b><br />Another company that pays for your vacation, FullContact is a platform that helps businesses and individuals develop and maintain business relationships. It helps in the areas of identity resolution, contact management, profile enrichment, audience insights and development, fraud prevention, and customer care. FullContact provides $7,500 per year for employees to travel—and it’s required that they don’t work while on vacation!<br /><br /><b>8. Motley Fool</b><br />Motley Fool seeks to “make the world smarter, happier, and richer” through its business and investing advice. In addition to offering unlimited vacation time, the company also has a “Fool’s Errand” program where one employee’s name is drawn from a hat every month and awarded $1,500 towards a two-week vacation. The lucky winner has to take the trip before the next monthly meeting and is asked for no contact during their travels to ensure the ultimate in relaxation.<br /><br /><b>9. Moz</b><br />Moz is a software as a service (SaaS) company that develops software for inbound marketing, hosts vibrant communities of online marketers, and provides APIs for link data and social influence. The rundown of what Moz employees receive for vacation is: 21 days paid time off per year, seven days of sick leave, 10 paid holidays, and $3,000 per year vacation expense reimbursement.<br /><br /><b>10. Travelzoo</b><br />Travelzoo is a commerce site in business since 1998. It publishes travel deals from over 2,000 entertainment, travel, and local companies to an audience of 28 million members across the world. It also offers exclusive deals and rates to members who join the site. According to Glassdoor, employees of Travelzoo are offered a “$1,500 stipend and three extra days of PTO to ‘book a hotel stay, vacation package, cruise, or flight offer that we negotiate on behalf of our 28 million members worldwide,’ according to Michael Stitt, President of Travelzoo North America.”<br /><br /><b>11. TripAdvisor</b><br />As the world’s largest travel site, TripAdvisor serves more than 350 million users monthly. Users can book flights, hotels, vacation rentals, restaurants, and more. The site boasts a large database of user reviews to help customers make the right travel choices for their needs. As a company, TripAdvisor offers a travel reimbursement of $250 or more, depending on how long an employee has worked at the company. It also offers discounts on packages offered through the website.<br /><br /><b>12. United Airlines</b><br />Founded in 1926, United Airlines now hosts 4,500 flights every day to more than 335 airports on five continents. As one of the largest airlines in the world, United Airlines seeks to be an inclusive employer and was even named one of the “World’s Most Admired Companies” by Fortune magazine. The company offers discounted airline tickets and unlimited standby travel on any United flight to employees.<br /><br />If you’re one of the 54% of Americans who don’t take all of their vacation time, finding a company that encourages mental well-being and time away from the desk is key. These 12 companies that pay for your vacation and have flexible job opportunities can provide a great starting point for your search for a better way to work and live. (<a href="https://www.techrepublic.com/meet-the-team/us/macy-bayern/" target="_blank">Macy Bayern</a> - Techrepublic.com/photo: <a href="https://unsplash.com/photos/dwIHrac2sEA" target="_blank">Mohamed Ajufaan</a>)Unknownnoreply@blogger.comtag:blogger.com,1999:blog-21255525.post-85795853504216672422019-06-30T01:46:00.001+07:002019-06-30T01:46:46.556+07:00USB Software Bug Can Cause Delays To Shutdowns For Windows 10<div class="separator" style="clear: both; text-align: center;">
<a href="https://1.bp.blogspot.com/-l_mbBdkXRPA/XRexqqxADWI/AAAAAAAAOZc/vrxpvW_gHmAUMiZcmHeHQTt199RkYQepACLcBGAs/s1600/how-to-fix-windows-10-shutting-down.jpg" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"><img border="0" data-original-height="350" data-original-width="590" src="https://1.bp.blogspot.com/-l_mbBdkXRPA/XRexqqxADWI/AAAAAAAAOZc/vrxpvW_gHmAUMiZcmHeHQTt199RkYQepACLcBGAs/s1600/how-to-fix-windows-10-shutting-down.jpg" /></a></div>
<br />
If you're running Windows 10 version 1809 and have noticed that shutting down the system takes a long time, it could be due to a USB-C bug that Microsoft has now confirmed.<br />
Microsoft hasn't listed this bug as a known issue for version 1809 but instead has posted an FAQ on the Microsoft USB blog, outlining the issue. <br />
<br />
The bug is in Microsoft's implementation of Intel's USB Type-C Connector System Software Interface (UCSI) software in Windows 10, version 1809. Microsoft says it can cause a minute's delay if a user attempts to shut down when the UCSI software is working when a device is being connected or disconnected through the USB Type-C port. <br />
<br />
This can happen when devices, docks or chargers are being plugged in or unplugged during the power transition, according to Microsoft. Besides the slow shutdown, the quirk shouldn't affect the system or how USB Type-C works and everything should continue to work normally after a restart.<br />
<br />
"A bug in the USB Type-C Connector System Software Interface (UCSI) software implementation in Windows 10, version 1809 can cause a 60-second delay in the system sleep or shutdown process if the power-down happens while the UCSI software is busy handling a new connect or disconnect event on a USB Type-C port," explains Microsoft's Philip Froese. <br />
<br />
"Apart from the extra one minute the sleep or shutdown process takes in this circumstance, this bug does not affect normal functionality of USB Type-C on your machine. The system and the USB Type-C ports should continue to function properly after the next wake or restart of the system."<br />
<br />
This is resolved in Windows 10 version 1903, please update to the latest released build if you are impacted by this bug. The issue described only affects Windows 10 version 1809 (17763) and is fixed in 1903.Unknownnoreply@blogger.comtag:blogger.com,1999:blog-21255525.post-37351121504406360702019-06-29T21:28:00.000+07:002019-06-29T21:32:59.425+07:00Why is Mozilla Making A New Firefox Android App Called Firefox Preview?<br />
<div class="separator" style="clear: both; text-align: center;">
<a href="https://1.bp.blogspot.com/-1sMq3rSDPY8/XRd1DGMMGyI/AAAAAAAAOY8/4SokW8UhKyoKM-1BNoCzU1qWan9GZI3awCLcBGAs/s1600/firefox%2Bpreview%2B%2Bapp%2Bfor%2BAndroid.jpg" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"><img border="0" data-original-height="660" data-original-width="1200" src="https://1.bp.blogspot.com/-1sMq3rSDPY8/XRd1DGMMGyI/AAAAAAAAOY8/4SokW8UhKyoKM-1BNoCzU1qWan9GZI3awCLcBGAs/s1600/firefox%2Bpreview%2B%2Bapp%2Bfor%2BAndroid.jpg" /></a></div>
<br />
Mozilla is taking another stab at mobile browsing with a new version of Firefox on Android currently known as "Firefox Preview" and now we’re here to fill you in everything you need to know about it, how fast it is, how secure it is, and the best new features we’ve found.<br />
<br />
Firefox has a sizable niche carved out of the desktop browser market, but it remains woefully underrepresented in the mobile space. Part of that is because of Chrome’s default near-ubiquity on Android, but even Mozilla admits that Firefox mobile could be much better.<br />
<br />
Rather than attempt to drastically change the current mobile app’s course, Mozilla opted to start over with an all-new Firefox app. This new Firefox is built on the GeckoView open-source mobile browser software, which Mozilla claims makes Firefox Preview up to twice as fast as the previous Firefox Mobile version, and brings many of the same privacy-protecting features of the desktop version to mobile.<br />
<b><br />How Firefox Preview performs</b><br />
<br />
Firefox Preview’s core functionality is identical to any other mobile browser—you can open and juggle between multiple tabs, there’s a private mode, and you can perform quick searches in the URL bar from your preferred search engine (which can be set during setup and changed in the settings menu). Firefox veterans can sign in and sync their bookmarks, browsing history, and other settings (depending on your sync settings, of course), but the differences between Firefox Mobile and Firefox Preview quickly become apparent.<br />
<br />
<div class="separator" style="clear: both; text-align: center;">
<a href="https://1.bp.blogspot.com/-sPdn_s4oXn8/XRd14XodMQI/AAAAAAAAOZE/YgWYsVCCEJwXHj65kjXx80ao0iM-vxcHQCLcBGAs/s1600/mozilla%2Bfirefox%2Bpreview.png" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"><img border="0" data-original-height="1024" data-original-width="1024" src="https://1.bp.blogspot.com/-sPdn_s4oXn8/XRd14XodMQI/AAAAAAAAOZE/YgWYsVCCEJwXHj65kjXx80ao0iM-vxcHQCLcBGAs/s1600/mozilla%2Bfirefox%2Bpreview.png" /></a></div>
<br />
One thing everyone will notice is the sleeker interface. Firefox Preview has a much more trimmed-down and focused UI compared to Firefox Mobile. It’s much easier to jump immediately to a page, and the homepage is free of recommended articles and other clutter that make Firefox Mobile feel cramped. The new, trim navigation bar has been moved to the bottom of the app screen, and stays stays mostly out of the way while your scrolling and reading a page. It’s more like using a browser in reader-mode, in that regard.<br />
<br />
<b>Faster browsing</b><br />
<br />
Firefox Preview is also a much faster browsing experience, in general. One of Mozilla’s big claims for Firefox Preview is that it’s two times as fast as the current version of Firefox on Android. Firefox Preview certainly feels a bit faster, and the the Mozilla Kraken benchmark tool confirms that it is, in fact, a speedier browser overall.<br />
<br />
To speak more specifically about features, here are some new functions Firefox Preview will offer, partially enabled by GeckoView:<br />
<ul>
<li><i>Faster than ever:</i> Firefox Preview is up to 2x faster than previous versions of Firefox for Android.</li>
<li><i>Fast by design: </i>with a minimalist start screen and bottom navigation bar, Preview helps you get more done on the go.</li>
<li><i>Stay organized: </i>Make sense of the web with Collections, a new feature that helps you save, organize, and share collections of sites. Quickly save and return to tasks like your morning routine, shopping lists, travel planning and more.</li>
<li><i>Tracking Protection on by default: </i>Everyone deserves freedom from invasive advertising trackers and other bad actors so Firefox Preview blocks trackers by default. The result is faster browsing and fewer annoyances.</li>
</ul>
<br />
<b>Light or Dark Mode Locked</b><br />
<br />
Another cool feature worth pointing out is dark mode. Plenty of apps have a dark mode, but it’s absent in the current Firefox Mobile browser, so it’s a welcome upgrade. Firefox Preview can be locked to either its light or dark mode, or set it to dynamically swap the theme based on your phone’s display settings. Personally, I prefer to keep dark mode on all the time whenever possible, and Firefox Preview’s slightly purple tinge to its dark mode is a nice visual difference from the dark modes of other apps.<br />
<br />
<b>How to get Firefox Preview on Android</b><br />
<br />
Anyone with a compatible Android device can download the latest version of Firefox Preview from one of the following locations:<br />
<ul>
<li><a href="https://play.google.com/store/apps/details?id=org.mozilla.fenix&hl=en_US" target="_blank"><b>Google Play Store</b></a></li>
<li><a href="https://www.apkmirror.com/apk/mozilla/firefox-fenix/" target="_blank"><b>APK Mirror</b></a></li>
</ul>
Mozilla also says it will continue to optimize and update Firefox Preview for the rest of the year, and that the final version scheduled to release in fall will have even more new features and upgrades compared to this early preview build.Unknownnoreply@blogger.comtag:blogger.com,1999:blog-21255525.post-83079412557722948192019-06-29T20:46:00.000+07:002019-06-29T20:46:45.894+07:00How To Install Windows 10 On Multiple Computers At Once<div class="separator" style="clear: both; text-align: center;">
<a href="https://1.bp.blogspot.com/-CXZiM7smOiU/XRdqECrSFeI/AAAAAAAAOYw/bvrQvqlGy1EWFlYZnpV1KEmmCcVo9LOugCLcBGAs/s1600/install%2Bwindos%2B10%2Bto%2Bmultiple%2Bcomputers.jpg" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"><img border="0" data-original-height="1067" data-original-width="1600" src="https://1.bp.blogspot.com/-CXZiM7smOiU/XRdqECrSFeI/AAAAAAAAOYw/bvrQvqlGy1EWFlYZnpV1KEmmCcVo9LOugCLcBGAs/s1600/install%2Bwindos%2B10%2Bto%2Bmultiple%2Bcomputers.jpg" /></a></div>
<br />
The simplest way to do this is to use the <b><a href="https://go.microsoft.com/fwlink/?LinkId=691209">Windows Media Creation Tool</a></b> to slap a Windows 10 image on a flash drive (or several), and use those to install the OS. Unless you're talking about eight other PCs that are pretty far away from one another, it shouldn't be that much of a burden to go from system to system, installing the OS on one while you're running through the basic configuration steps on the other.
<br />
<br />
Assuming all of these systems are the same, you could also set up and configure one (without activating Windows), image the drive, and then clone that image onto the drives of your other systems. I haven't done this process, but I know you'll have to run Windows' <b><a href="https://docs.microsoft.com/en-us/windows-hardware/manufacture/desktop/audit-mode-overview">Sysprep tool</a></b>, available via Audit Mode to first generalize the image (which will then allow you to have a unique computer security identifier, or "SID," for each machine). You'll then need to capture the image and use that to clone Windows on your other systems.
<br />
<br />
What I would probably do is everything up until the "capturing the image" portion of that paragraph. I'd then use a tool like Clonezilla, <b><a href="https://clonezilla.org/clonezilla-live.php">Clonezilla Live</a></b> technically, to image the drive and clone that image onto your other systems. I believe you'll then be able to boot into a regular version of Windows 10 when you power up those systems.
<br />
<br />
Again, with only eight systems to process, the time you spend fussing with this is probably equal to (or greater than) the time it takes to go the manual installation route via a flash drive. But let's keep going. There are two other options you can try to install Windows on other systems from a centralized point (another PC, I'm assuming).
<br />
<br />
Clonezilla has a <b><a href="https://clonezilla.org/clonezilla-SE/">server edition</a></b> that you can play with (as a Live CD), and you can use this to install Windows to a networked system. If I'm correct, the Live CD only works best for one-to-one installations, not one-to-many. I'm assuming you're fine with the former setup, as you'll instead need to install and configure Clonezilla's server edition of on a Linux desktop if you're looking to deploy Windows to multiple systems concurrently. (And you'll want to make sure your client machines support <a href="https://networkboot.org/fundamentals/"><b>network booting</b></a> via the BIOS, or else this entire process will be a wash.)
<br />
<br />
If you're having trouble, or you want alternatives, you can try using <b><a href="https://fogproject.org/">FOG</a></b> or <b><a href="http://clonedeploy.org/">CloneDeploy</a></b>. I like CloneDeploy, especially since its <a href="http://clonedeploy.org/docs/">documentation is easy to follow</a>, you're going to need to do some reading to set everything up properly. You can also set up your clients (the systems receiving Windows) using Live CDs or flash drives, which is useful if network-boot process (PXE) is too confusing. (<a href="https://kinja.com/thedavidmurphy?_ga=2.194811309.1878060447.1561807758-598171198.1561807758" target="_blank">David Murphy</a> - lifehacker.com)Unknownnoreply@blogger.comtag:blogger.com,1999:blog-21255525.post-64745995442240573402019-06-29T14:42:00.004+07:002019-06-29T14:42:53.803+07:00Spider-Man: Far From Home Realme X Special Edition Confirm to Launch<div class="separator" style="clear: both; text-align: center;">
<a href="https://1.bp.blogspot.com/-1YrOoiE982w/XRcV35_PZHI/AAAAAAAAOYY/KiG2nzx12vYNaplEZhUsuGzAZcc-O7exQCLcBGAs/s1600/Spider-Man%2BFar%2BFrom%2BHome%2Brealme%2Bx%2Bspecial%2Bedition.jpg" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"><img border="0" data-original-height="690" data-original-width="1600" src="https://1.bp.blogspot.com/-1YrOoiE982w/XRcV35_PZHI/AAAAAAAAOYY/KiG2nzx12vYNaplEZhUsuGzAZcc-O7exQCLcBGAs/s1600/Spider-Man%2BFar%2BFrom%2BHome%2Brealme%2Bx%2Bspecial%2Bedition.jpg" /></a></div>
<br />
The recently launched Realme X smartphone has given quite a huge popularity for the company in its home country China. The brand made its debut in China by launching Realme X and Realme X Youth Edition (rebranded Realme 3 Pro). The company has now partnered with “Spider-Man: Far From Home” movie that released in China today. With the partnership, Realme is bringing exclusive “Spider-Man: Far From Home” themed case, theme, icons, wallpaper and special packaging.<br /><br />The Realme X special edition is confirmed to launch on July 9 in China, but fans can make reservations on the official website starting today. The special edition smartphone comes in 8GB + 128GB storage option and Super Steam White color. Rest of the specifications remain the same. The device is priced at CNY1799 in China which translates to INR 18,500 or $260.<br />
<br />
<br />
<div class="separator" style="clear: both; text-align: center;">
<a href="https://1.bp.blogspot.com/-bxcX2dRE5Rg/XRcV93VQTrI/AAAAAAAAOYc/KWpzm5LzgZg2oPzmVg2fIIqFDiO4Tx13gCLcBGAs/s1600/Spider-Man%2BFar%2BFrom%2BHome%2Brealme%2Bx%2Bspecial%2Bedition--.jpg" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"><img border="0" data-original-height="1223" data-original-width="1600" src="https://1.bp.blogspot.com/-bxcX2dRE5Rg/XRcV93VQTrI/AAAAAAAAOYc/KWpzm5LzgZg2oPzmVg2fIIqFDiO4Tx13gCLcBGAs/s1600/Spider-Man%2BFar%2BFrom%2BHome%2Brealme%2Bx%2Bspecial%2Bedition--.jpg" /></a></div>
<br /><br />
To recap, the Realme X is powered by a Snapdragon 710 processor, dual rear camera setup consisting of a 48MP wide-angle camera, 5MP depth sensor. There’s a Motorized pop-up 16 MP camera for taking amazing selfies. The device sports a 3765 mAh battery with support for 20W VOOC 3.0 fast charging technology.<br /><br />The Realme X along with “Spider-Man: Far From Home” special edition is confirmed to launch in India as well. The launch event is likely to take place in mid-July. (<a href="http://indiashopps.com/">indiashopps.com</a>)Unknownnoreply@blogger.comtag:blogger.com,1999:blog-21255525.post-25128881720395650212018-05-04T23:48:00.000+07:002019-06-29T01:42:36.048+07:00Best Royalty-Free Music Sites Every Youtuber And Video Creator Should Know<div class="separator" style="clear: both; text-align: center;">
<a href="https://3.bp.blogspot.com/-XRHr1t8okWk/WuyObN-QTRI/AAAAAAAAMk8/8jH8t6m_qIoF1rz4jiLo6gabKrSlei9HQCLcBGAs/s1600/youtube%2Broyalti%2Bfree%2Bmusic.jpg" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"><img border="0" data-original-height="1067" data-original-width="1600" src="https://3.bp.blogspot.com/-XRHr1t8okWk/WuyObN-QTRI/AAAAAAAAMk8/8jH8t6m_qIoF1rz4jiLo6gabKrSlei9HQCLcBGAs/s1600/youtube%2Broyalti%2Bfree%2Bmusic.jpg" /></a></div>
<br />
Finding free, legal music for your online videos can be difficult. As an online video creator you want the perfect soundtrack for your video masterpieces, but you also want to make sure that you don't break any copyright laws. After all, there's nothing more frustrating then working hard on a video only to have YouTube take it down because of a music copyright violation. Luckily there are some great sources online where you can find the perfect music for your video project.<br />
<br />
There's a difference between free music for YouTube videos and royalty free music. Free music is where you can just download the music for free, but it's not necessarily free to use. You might face copyright issues. Whereas copyright free music means it's just free of any royalty fees. You have to just once, to buy it, or get it free from other resources. Once you buy/get the track, you can use it for free in a video, without being charged for the music per a number of views.<br />
<br />
Basically, free royalty free music online resources offer music that is:<br />
<ul>
<li>Completely free to download and use.</li>
<li>No licenses to purchase.</li>
<li>You can use for commercial purpose.</li>
</ul>
As you can monetize your video, and make money off their music for free. Though some sources require you to credit their music in the video description or the end slate.<br />
<br />
We have listed down sites that offer you:<br />
<ul>
<li>Free royalty free tracks</li>
<li>A searchable music library</li>
<li>Easy attribution process</li>
<li>A plethora of-of tracks, genres, and moods to choose from.</li>
</ul>
So here are the 10 best sites to download royalty free Music for youTubers and videos creator.<br />
<br />
<b><a href="http://www.beatpick.com/player/index" target="_blank">Beatpick</a></b><br />
Beatpick offers a great selection of licensed music and if you are using it in a non-commercial or non-profit production it's free. Once you've chosen a song that you want to use, click on "License Song" and choose "Non Commercial projects."<br />
<br />
<b><a href="http://ccmixter.org/" target="_blank">ccMixter</a></b><br />
ccMixter is a community music site where you can find tons of music that falls under the Creative Commons license. The site lets you listen to music, sample music, create mashups and more. Just keep in mind that some creative commons licenses may require that you give credit to the source within your video.<br />
<br />
<b><a href="http://www.danosongs.com/" target="_blank">DanoSongs</a></b><br />
Dan-O is a composer that offers his original songs for free download at DanoSongs.com. You can use his songs for free in your project provided you link to his site or credit him in your video.<br />
<br />
<b><a href="http://www.freesoundtrackmusic.com/" target="_blank">Free Soundtrack Music</a></b><br />
FreeSoundtrackMusic.com provides exactly what it advertises – royalty-free tracks for use in films, YouTube videos, games or other multimedia productions. Some of the music on the site does cost money. However, a lot of it is labeled as "FREE" and can be easily downloaded and added to your video production.<br />
<br />
<b><a href="http://incompetech.com/m/c/royalty-free/" target="_blank">Incompetech</a></b><br />
Incompetech is one of go-to places for great royalty free music. The site was created by composer Kevin MacLeod and has tons of music, categorized by genre and feel. In the site's FAQ you'll see that the music on the site is free to use for your video soundtrack. Kevin just asks that you place a credit within the video.<br />
<br />
<b><a href="http://www.musopen.org/" target="_blank">Musopen</a></b><br />
Musopen is another free site that, like Public Domain 4U, provides music that has the copyright expired. On the site's about page they say, "We provide recordings, sheet music, and textbooks to the public for free, without copyright restrictions." At Musopen you can browse music by composer, performer, instrument, period or form. Musopen is great, especially if you are looking for classical music for your video.<br />
<br />
<b><a href="http://www.mobygratis.com/film-music.html" target="_blank">Moby Gratis</a></b><br />
If you want to use music by a well-known artist without paying licensing fees then check out Moby Gratis. At MobyGratis.com, Moby provides doe of his music for free download and use. The music is free to use, provided your film is non-commercial or non-profit.<br />
<br />
<a href="http://www.pacdv.com/sounds/free-music.html" target="_blank"><b>PacDV</b></a><br />
PacDV offers free music and sound effects. The tracks are free to use in your video, film, audio and multimedia projects. All they ask is that if you use their tracks you link back to their site or list them in your credits.<br />
<br />
<b><a href="http://www.partnersinrhyme.com/" target="_blank">Partners In Rhyme</a></b><br />
Partners In Rhyme has got all sorts of great stuff, from free music loops to sound effects, midi files and more. Some of the royalty free music on Partners In Rhyme costs money, but they've got a selection of free music loops and full-length tracks for free download as well.<br />
<br />
<b><a href="http://www.publicdomain4u.com/" target="_blank">Public Domain 4U</a></b><br />
When content falls into the public domain it means that there are no longer any intellectual property rights attached to them, either because the rights have expired or been forfeited. Public domain music, video and other content can be used in any way, including in your online videos. Public Domain 4U is a great site for finding public domain music downloads. A lot of the music is old (music from the early 1900s is now in the public domain if copyright was never renewed), but there is also more modern music that is free with artist permission.<br />
<br />
<b><a href="https://www.youtube.com/audiolibrary/music" target="_blank">YouTube Audio Library</a></b><br />
Most popular source for getting audio files from YouTube’s free music library.Music, sound effects that can be added straight away to your videos on YouTube, or download them to work offline.<br />
Hundreds of royalty-free music tracks and sound effects, searchable and can be filtered by genre, instrument, mood, duration, and attribution.<br />
Make sure you check if attribution is required. If it is then credit the artist in your video description.<br />
<br />
Photo by <a href="https://unsplash.com/photos/GiwH8SU1S7c" target="_blank">Michael Weibel</a> on UnsplashUnknownnoreply@blogger.comtag:blogger.com,1999:blog-21255525.post-5310062178358180792018-01-31T10:30:00.003+07:002018-01-31T10:30:25.662+07:00Facebook is banning cryptocurrency advertising on its social network<table align="center" cellpadding="0" cellspacing="0" class="tr-caption-container" style="margin-left: auto; margin-right: auto; text-align: center;"><tbody>
<tr><td style="text-align: center;"><a href="https://2.bp.blogspot.com/-KAvP7f1vj4M/WnE36OlpEmI/AAAAAAAAMNs/yvc2xYLEs5sXaKS9PaUIQJPMkUerBCscwCLcBGAs/s1600/facebook%2Bbanned%2Bbitcoin%2Bads.jpg" imageanchor="1" style="margin-left: auto; margin-right: auto;"><img border="0" data-original-height="400" data-original-width="630" src="https://2.bp.blogspot.com/-KAvP7f1vj4M/WnE36OlpEmI/AAAAAAAAMNs/yvc2xYLEs5sXaKS9PaUIQJPMkUerBCscwCLcBGAs/s1600/facebook%2Bbanned%2Bbitcoin%2Bads.jpg" /></a></td></tr>
<tr><td class="tr-caption" style="text-align: center;">(c). themerkle.com</td></tr>
</tbody></table>
<br />
There are two things that are certain about cryptocurrencies: Lots of people are talking about them right now, and lots of people don't really understand them.<br />
<br />
In the meantime, Facebook is banning cryptocurrency advertising on its social network. The company announced the new policy on Tuesday, which includes barring ads for bitcoin and initial coin offerings, or ICOs.<br />
<br />
The reason is ads for those things are "frequently associated with misleading or deceptive promotional practices," Rob Leathern, product management director for Facebook ads, said in a blog post. He added that many companies advertising cryptocurrencies "are not currently operating in good faith."<br />
<br />
The ban isn't permanent. Leathern said the policy is "intentionally broad" while Facebook figures out how to better detect deceptive and misleading ads and ramps up enforcement. "We will revisit this policy and how we enforce it as our signals improve," he said.<br />
<br />
The new policy not only applies to Facebook, but its other platforms, including Instagram and its Audience Network, where the company places ads on third-party websites.<br />
<br />
Meanwhile, there's been a lot of buzz around Facebook and cryptocurrency. CEO Mark Zuckerberg name-checked it in a post detailing his annual challenge for the year -- a broad strokes announcement on how he'd fix some of Facebook's biggest issues, like misinformation and harassment.<br />
<br />
Regarding cryptocurrency, he said he's interested in that kind of technology. "But they come with the risk of being harder to control," he wrote. "I'm interested to go deeper and study the positive and negative aspects of these technologies, and how best to use them in our services." (Richard Nieva/cnet.net)Unknownnoreply@blogger.comtag:blogger.com,1999:blog-21255525.post-23795987871146943012017-10-25T15:59:00.002+07:002017-10-25T15:59:31.289+07:00Bug Bounty Hunter, make thousands of dollars on the side hunting bugs<table align="center" cellpadding="0" cellspacing="0" class="tr-caption-container" style="margin-left: auto; margin-right: auto; text-align: center;"><tbody>
<tr><td style="text-align: center;"><a href="https://1.bp.blogspot.com/-ZzbaK3-Q-Lw/WfBSNtIyNWI/AAAAAAAALIU/Cm5vHvNWKw0SDEwIGsJPV2F0bTYFCM56gCLcBGAs/s1600/bug%2Bhunter.jpg" imageanchor="1" style="margin-left: auto; margin-right: auto;"><img border="0" data-original-height="410" data-original-width="600" height="436" src="https://1.bp.blogspot.com/-ZzbaK3-Q-Lw/WfBSNtIyNWI/AAAAAAAALIU/Cm5vHvNWKw0SDEwIGsJPV2F0bTYFCM56gCLcBGAs/s640/bug%2Bhunter.jpg" width="640" /></a></td></tr>
<tr><td class="tr-caption" style="text-align: center;">(c). betanews.com</td></tr>
</tbody></table>
Are you a coder or white-hat hacker looking to make some money on the side? Bug bounty hunting might be the perfect gig for you.<br /><br /><b>What Is Bug Bounty Hunting?</b><br /><br />Bug bounty hunting is being paid to find vulnerabilities in software, websites, and web applications. The security teams at major companies don't have enough time or manpower to squash all the bugs they have, so they reach out to private contractors for help. Basically, you use your tools to break things (or break into things), write up a vulnerability report to the company who's issued the bounty, then get paid. Some hackers make tens of thousands of dollars a year on the side just hunting bugs.<br /><br />To do it, however, you'll need to at least know some basic coding and computer skills. Fortunately, we've got tons of great resources to help get you started, and coding is pretty easy to teach yourself. That said, if you have no idea what any of this stuff means as you read on, bug bounty hunting probably isn't for you.<br /><br /><b>Do Some Research and Get Your Tools</b><br /><br />Once you've got a grip on basic coding, you need to take a deep dive into web applications and how they work. Lucky for you, there's tons of great resources out there that can point you in the right direction. Start by reading:<br /><br />
<ul>
<li>The Web Application Hacker's Handbook ($30)</li>
<li>OWASP Testing Guide v4</li>
</ul>
Then get the right tools. You'll need:<br />
<ul>
<li>Kali Linux (free)</li>
<li>Burp Suite ($349 a year, but very popular)</li>
<li>OWASP Zap (free alternative to Burp Suite)</li>
</ul>
Then check out the OWASP WebGoat lab, where you can practice finding bugs and vulnerabilities in web applications, and take a look at the Google Bughunter University as well. They have lots of great information bug hunting and how to write solid vulnerability reports that will get you paid. Sites like Bugcrowd and HackerOne can help with that aspect as well. (Patrick Allan/lifehackers.com)<br /><br />Unknownnoreply@blogger.comtag:blogger.com,1999:blog-21255525.post-3907387817417444082017-10-23T22:04:00.000+07:002019-06-28T17:17:38.324+07:00Cisco Acquire BroadSoft, a US cloud PBX in a deal worth $1.9 billion<div class="separator" style="clear: both; text-align: center;">
<a href="https://4.bp.blogspot.com/-SKkW8h56NDM/We4EzU4ILgI/AAAAAAAALH0/80WvKzAGKyQmM8b6YUiAtTkdi7tWY6v5gCLcBGAs/s1600/cisco%2Bacquire%2Bbroadsoft.jpg" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"><img border="0" data-original-height="440" data-original-width="680" src="https://4.bp.blogspot.com/-SKkW8h56NDM/We4EzU4ILgI/AAAAAAAALH0/80WvKzAGKyQmM8b6YUiAtTkdi7tWY6v5gCLcBGAs/s1600/cisco%2Bacquire%2Bbroadsoft.jpg" /></a></div>
<a href="http://www.zdnet.com/topic/cisco/">Cisco</a> has announced its intention to acquire BroadSoft in a deal worth $1.9 billion.<br />
<br />
On Monday, <a href="https://newsroom.cisco.com/press-release-content?type=webcontent&articleId=1887125">the networking giant said</a>
the companies have entered into a definitive agreement over the buyout,
which has also been approved by both the Cisco and BroadSoft boards of
directors.<br />
<br />
Cisco says that <a href="http://www.broadsoft.com/">BroadSoft</a>,
a US cloud PBX, unified communications, team collaboration, and contact
center solutions company will be utilized to offer enterprise clients a
wider range of enterprise-based collaboration tools and solutions.<br />
<br />
Cisco will pay $55 per share in cash in exchange for each BroadSoft share to finalize the $1.9 billion deal.<br />
<br />
"Together,
Cisco and BroadSoft will deliver a robust suite of collaboration
capabilities across every market segment," said Rowan Trollope, senior
vice president and general manager of Cisco's Applications Business
Group. "We believe that our combined offers, from Cisco's collaboration
technology for enterprises to BroadSoft's suite for small and medium
businesses delivered through Service Providers will give customers more
choice and flexibility."<br />
<br />
<br />
<br />
<section class="sharethrough-top" data-component="medusaContentRecommendation" data-medusa-content-recommendation-options="{"promo":"promo_ZD_recommendation_sharethrough_top_in_article_desktop","spot":"dfp-in-article"}">
</section> Until the acquisition is complete, Cisco and
BroadSoft will continue to operate independently. Once the buyout is
finished, BroadSoft employees will join Cisco's Unified Communications
Technology Group, under the Applications Group.<br />
<br />
The buyout is expected to close in Q1 2018, following regulatory approval. (<a href="http://zdnet.com/">ZDNet.com</a>) Unknownnoreply@blogger.comtag:blogger.com,1999:blog-21255525.post-12857773748260073602017-10-22T14:30:00.002+07:002017-10-22T14:34:20.240+07:00TruePlay, Windows 10 anti-cheat protection system for games<div class="separator" style="clear: both; text-align: center;">
<a href="https://2.bp.blogspot.com/-wJwrReZe2Uw/WexIttE4SVI/AAAAAAAALHY/8liXpsPp5DA8n_PzQhy99ndjv-kAnUIrQCLcBGAs/s1600/windows%2B10%2Btrueplay.png" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"><img border="0" data-original-height="448" data-original-width="793" height="360" src="https://2.bp.blogspot.com/-wJwrReZe2Uw/WexIttE4SVI/AAAAAAAALHY/8liXpsPp5DA8n_PzQhy99ndjv-kAnUIrQCLcBGAs/s640/windows%2B10%2Btrueplay.png" width="640" /></a></div>
<br />
<blockquote>
Gaming is more fun when everyone plays fairly. -TruePlay</blockquote>
Microsoft has switched on its <a href="https://blogs.windows.com/windowsexperience/2017/07/26/announcing-windows-10-insider-preview-build-16251-pc-build-15235-mobile/#ooo0kyeQkxzYKEij.97">previously</a> teased <a href="https://msdn.microsoft.com/en-us/library/windows/desktop/mt808781(v=vs.85).aspx?ranMID=24542&ranEAID=TnL5HPStwNw&ranSiteID=TnL5HPStwNw-Q9EHugqiSrYBuIMwm29JRg&f=255&MSPPError=-2147217396&ranMID=24542&ranEAID=TnL5HPStwNw&ranSiteID=TnL5HPStwNw-rdQVB0AxTjCvKZbXwlQo1g&tduid=(8159455522c12df3b99319477b0f61e4)(256380)(2459594)(TnL5HPStwNw-rdQVB0AxTjCvKZbXwlQo1g)()">TruePlay</a>
feature, which promises to protect against "common" cheats in Universal
Windows Platform games. Titles that take advantage of the safeguard
will both run in a protected mode and trigger a background service that
watches for typical cheating behavior. If they find anything amiss,
they'll send data to the developer. You can switch off TruePlay if
you're nervous about Windows <a href="https://www.engadget.com/2017/04/05/microsoft-explains-windows-10-data-sharing/">transmitting your data</a>, but companies can limit what you're allowed to do (playing online, for example) if you don't have it enabled.<br />
<br />
"A game enrolled in TruePlay will run in a protected process, which
mitigates a class of common attacks," Microsoft explained.
"Additionally, a Windows service will monitor gaming sessions for
behaviors and manipulations that are common in cheating scenarios. These
data will be collected, and alerts will be generated only when cheating
behavior appears to be occurring."<br />
<br />
Functionally, in a very general sense, TruePlaysounds similar to <a data-component="Inline links" data-count="4" data-index="3" data-track-type="click" href="http://www.pcgamer.com/more-than-40000-steam-users-were-banned-the-day-after-the-summer-sale/">Valve Anti-Cheat</a>, but it only works with Universal Windows Platform (UWP) games. That fits with Microsoft's desire to <a data-component="Inline links" data-count="4" data-index="4" data-track-type="click" href="http://www.pcgamer.com/phil-spencer-interview-we-have-work-to-go-do-on-improving-the-windows-store-uwp/">carve out a place </a>for
itself in the world of PC gaming, but it also puts a pretty tight leash
on its utility. It never hurts to have more tools at your disposal, but
it'll likely be awhile before this one sees much use.(sources: pcgamer.com/engadget.com)Unknownnoreply@blogger.comtag:blogger.com,1999:blog-21255525.post-65571551111045314222017-10-18T16:51:00.003+07:002017-10-18T16:52:27.627+07:00How to use Google Advanced Protection and Personalized Google Security Checkup<div class="separator" style="clear: both; text-align: center;">
<a href="https://2.bp.blogspot.com/-oUmhY9pxPdk/Wecjjng397I/AAAAAAAALFg/H3IGoa9GEtssw-DoEtVfJvgjAWO5iZ8JwCLcBGAs/s1600/google-advanced-protection-.gif" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"><img border="0" data-original-height="869" data-original-width="1595" height="217" src="https://2.bp.blogspot.com/-oUmhY9pxPdk/Wecjjng397I/AAAAAAAALFg/H3IGoa9GEtssw-DoEtVfJvgjAWO5iZ8JwCLcBGAs/s400/google-advanced-protection-.gif" width="400" /></a></div>
To use Google Advanced Protection, you will need two Universal 2nd Factor (U2F) security keys, which have been approved by the FIDO Alliance. That means you will need a U2F USB key for your computer and one that can authenticate over Bluetooth for your mobile devices — phone, table and laptop.<br />
<br />
For example, Google suggests purchasing a Yubico FIDO U2F security key and a Feitian MultiPass FIDO security key. Once you have two U2F keys approved by the FIDO Alliance, you can turn on Advanced Protection.<br />
<br />
<div class="separator" style="clear: both; text-align: center;">
<a href="https://3.bp.blogspot.com/--pPRGfVWSxw/WecjoSrg9SI/AAAAAAAALFk/ag1DvHJ7gwE6paP5cf3sZljpddX65qoPACLcBGAs/s1600/How-to-use-Google-Advanced-.jpg" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"><img border="0" data-original-height="904" data-original-width="644" src="https://3.bp.blogspot.com/--pPRGfVWSxw/WecjoSrg9SI/AAAAAAAALFk/ag1DvHJ7gwE6paP5cf3sZljpddX65qoPACLcBGAs/s1600/How-to-use-Google-Advanced-.jpg" /></a></div>
<br />
Once Advanced Protection is on, your Google life will change. 2FA verification codes sent to your phone and the Google Authenticator app will no longer grant access to your account. If you accidentally fall for a phishing scam and enter your password, the attacker or social engineer can’t get into your account without the U2F keys.<br />
<br />
If an attacker tries impersonation and uses the "forgot password" route, there are added steps for an Advanced Protection user to verify his or her identity. Google doesn’t specify what those extra steps will be other than "additional reviews and requests for more details about why you’ve lost access to your account."<br />
<br />
Furthermore, "if you ever lose access to your account and both of your Security Keys, these added verification requirements will take a few days to restore access to your account."<br />
<br />
Additionally, to prevent third-party malicious apps from gaining access your account, Google will automatically limit access to your Gmail and Drive to specific apps — especially its own for now. If you want to access your Gmail, then you have to use Chrome or the Gmail app. You will also have to use Chrome if you want to access your Photos or other signed-in Google services.<br />
<b><br />Personalized Google Security Checkup</b><br />
<br />
To celebrate Cybersecurity Awareness Month, Google said it intends to launch a series of security announcements this week.<br />
<br />
Yesterday, <a href="https://www.blog.google/topics/safety-security/new-security-protections-tailored-you/" target="_blank">Google announced</a> the launch of its revamped <a href="https://myaccount.google.com/intro/security-checkup" target="_blank">Security Checkup</a>, which provides "personalized guidance to help you improve the security of your account." Hopefully, you will see a green check mark next to each item in the list. If not, then you need to take care of the items marked with yellow or red exclamation points. The new and improved Security Checkup will evolve as new threats arise.<br />
<br />
Google is also testing new predictive phishing protections in Chrome. If you input your Google password into a suspected phishing site, you might see a warning that states something similar like this: "This site may have just stolen your password."<br />
<br />
The company added, "We plan to expand predictive phishing protection to all other passwords you’ve saved in Chrome’s password manager, and [we plan to] enable other apps and browsers that use Safe Browsing technology, like Safari, Firefox and Snapchat, to use it as well." (<a href="https://www.csoonline.com/author/Ms.-Smith/" target="_blank">Mrs. Smith, csonline.com</a>)Unknownnoreply@blogger.comtag:blogger.com,1999:blog-21255525.post-7076952821018868532017-10-18T16:21:00.001+07:002017-10-18T16:27:50.021+07:00Google Advanced Protection Program, The strongest defense against phishing and hacks<div class="separator" style="clear: both; text-align: center;">
</div>
<div class="separator" style="clear: both; text-align: center;">
<a href="https://3.bp.blogspot.com/-FCdlQ3zTbH8/WeceYR0r3tI/AAAAAAAALFQ/iEY31j7860Qicm5L6Hc2ahkR3_7W3vR4wCLcBGAs/s1600/google-advanced-protection-.gif" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"><img border="0" data-original-height="869" data-original-width="1595" height="348" src="https://3.bp.blogspot.com/-FCdlQ3zTbH8/WeceYR0r3tI/AAAAAAAALFQ/iEY31j7860Qicm5L6Hc2ahkR3_7W3vR4wCLcBGAs/s640/google-advanced-protection-.gif" width="640" /></a></div>
<div class="separator" style="clear: both; text-align: center;">
</div>
Instead of focusing on all users, Google set its sights on the minority who need the strongest security measures and today announced the launch of its Advanced Protection Program. The program goes beyond two-step verification by requiring a physical piece of hardware as a key to access your Gmail and other Google accounts; those who enroll will be trading convenience for added security.<br />
<br />
Google rolled out the new security measure for the minority of its users who are at an elevated risk of cyberattack. In the <a href="https://www.blog.google/topics/safety-security/googles-strongest-security-those-who-need-it-most/" target="_blank">company’s words</a>:<br />
<br />
<blockquote>
We took this unusual step because there is an overlooked minority of our users that are at particularly high risk of targeted online attacks. For example, these might be campaign staffers preparing for an upcoming election, journalists who need to protect the confidentiality of their sources, or people in abusive relationships seeking safety. Sometimes even the most careful and security-minded users are successfully attacked through phishing scams, especially if those phishing scams were individually targeted at the user in question.</blockquote>
<br />
<br />
If you have a personal Google Account, you can enroll using Chrome -and only Chrome, at least for now-, as it supports the U2F standard and has done so since 2014. After enrolling, Google promises to "always use the strongest defenses that Google has to offer" and to "continually update" those security measures. (csoonline.com)<br />
<br />
<b>Visit <a href="https://landing.google.com/advancedprotection/" target="_blank">Google Advanced Protection Program here.</a></b><br />
<br />
If you're not ready for Advanced Protection, you can still take steps to make your account safer by turning on <b><a href="https://myaccount.google.com/signinoptions/two-step-verification/enroll-welcome" target="_blank">2-Step Verification here.</a></b>Unknownnoreply@blogger.comtag:blogger.com,1999:blog-21255525.post-82402166226688036412017-10-18T15:15:00.004+07:002017-10-18T15:15:56.283+07:00Windows 10 Fall Creators Update Offers 6 New Ways to Better Manage Security Settings<div class="separator" style="clear: both; text-align: center;">
<a href="https://3.bp.blogspot.com/-MU_MpQrxVEk/WecNjuZlAoI/AAAAAAAALEs/O9ATnmhVWDsD0E9r0RZ6Mz7fpPHPLOLcwCLcBGAs/s1600/logo%2Bwindows%2B10%2Bbaru.jpg" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"><img border="0" data-original-height="869" data-original-width="1595" height="348" src="https://3.bp.blogspot.com/-MU_MpQrxVEk/WecNjuZlAoI/AAAAAAAALEs/O9ATnmhVWDsD0E9r0RZ6Mz7fpPHPLOLcwCLcBGAs/s640/logo%2Bwindows%2B10%2Bbaru.jpg" width="640" /></a></div>
Among the new features that the Windows 10 Fall Creators Update offers are six new ways to enhance or better manage security settings. They include options to limit app access to your personal data and the ability to better protect folders, devices and executables, The step-by-step instructions below show how to make the best use of the new security features.<br /><br /><b>1. Cortana</b><br />The settings for Microsoft's intelligent agent have been relocated to the Settings app.<br />
(When you click the Settings icon on the Cortana tool's panel, it now jumps to the Settings app.)<br /><br />Under the Cortana settings category, click "Permissions & history" to manage how Cortana accesses your personal information as you're using Windows 10 and Microsoft online services.<br /><br /><b>2. Exploit guard</b><br />EMET (Enhanced Mitigation Experience Toolkit) was a Microsoft tool which would prevent malicious code from exploiting security flaws in Windows systems. Microsoft retired it, but has implemented several of its features into the Fall Creators Update. Most of the tools of Exploit Guard are turned on by default. To see what they are and to adjust them individually, launch the Windows Defender Security Center app. (It's listed on the app list in the Start menu.) Click "App & browser control."<br /><br />
Under "System settings," you can turn off or on six exploit protection tools: control-flow guard, data execution prevention, force randomization for images (mandatory ASLR), randomize memory allocations (bottom-up ASLR), validate exception chains (SEHOP), validate heap integrity.<br /><br />Under "Program settings," you can add an executable/program to tweak its functionalities to prevent it from being exploited by malware or intrusions. The 21 settings include the six under "System settings" and others such as block remote images, disable Win32k system calls, and validate API invocation.<br /><br /><b>3. Phone</b><br />This is another new category in the Settings app, and it addresses a possible security issue. For example, your Android phone running certain Microsoft apps (like the Android app version of Cortana) can send notifications to your Windows 10 computer that you've authorized to receive from this phone.<br /><br />Under the "Phone" category, the Fall Creators Update adds an "Unlink this PC" function. You can click this to quickly cut off your Windows 10 computer from a linked phone.<br /><br /><b>4. Protected folders</b><br />To thwart ransomware or other malware from hijacking your files, the Fall Creators Update lets you restrict chosen folders so only apps that are considered safe by Microsoft, or that you have whitelisted, can access them. These apps will also be able to access and change documents (and other files) in these folders. You could lock down the Documents folder so that only Microsoft Word can access it.<br /><br />To use this feature, launch the Windows Defender Security Center app. Click "Virus & threat protection" and in the next panel "Virus & threat protection settings."<br /><br />You'll have to scroll down to see "Controlled folder access." Click to switch this on.<br /><br />Click "Protected folders" to open a list of folders that can be set for restricted access. By default, the Desktop, Documents, Favorites, Music, Pictures, and Video folders appear here. You can add other folders to this list by clicking "Add a protected folder."<br /><br />When you turn on the controlled folder access switch, the Fall Creators Update automatically decides which apps are safe to allow access to the folders you've designated as protected. However, if this feature blocks a particular app that you know is safe, you can let it through by clicking "Allow an app through Controlled folder access."<br /><br /><b>5. Reset Microsoft account password from the lock screen</b><br />If you use a Microsoft account (like an email account from Outlook.com) to sign in to your Windows 10 computer, and you forget this account's password, you can now recover it from the lock screen. (Previously, you could only do this from another browser capable computer or mobile device.)<br /><br />From the lock screen, click "I forgot my password." This loads a recovery tool app. The email of the Microsoft account you used to sign in to your Windows 10 computer will be listed. (But you can enter in place of it another Microsoft account of yours to reset its password.) After passing the captcha, you can choose either to have a password reset number sent by text messaging to a phone or emailed to a recovery email address that you previously assigned to the Microsoft account.<br /><br />If you selected PIN entry under "Sign-in options," then you'll see an "I forgot my PIN" option on the lock screen instead. You'll be prompted to enter the password of your Microsoft user account that you used to originally sign in to this Windows 10 system. After this, you'll be sent a text message or email with a code you can enter in this tool to reset your PIN.<br /><b><br />6. Web browse more safely with Edge inside a virtual machine</b><br />This feature is only in the Enterprise edition of Windows 10, and your computer's processor must be able to support Hyper-V, Microsoft's virtual machine tool. If your system meets both requirements, the Fall Creators Update lets you open an Edge browser window that runs inside a virtual machine. If malicious code attacks the browser, it will be contained within the virtual machine and not spread to your computer's main operations.<br /><br />This option for Edge isn't available by default. The Microsoft Tech Community post "Windows Defender Application Guard Standalone mode" shows you how to turn it on.<br /><br />Author: Howard Wen.<br />
Howard Wen reports for several technology publications. His website can be found at <a href="http://www.howardwen.com/" target="_blank">www.howardwen.com</a>.Unknownnoreply@blogger.comtag:blogger.com,1999:blog-21255525.post-24209495919957781232017-10-17T21:56:00.001+07:002017-10-18T16:30:29.285+07:00Research paper behind the Krack Attack "Key Reinstallation Attacks: Forcing Nonce Reuse in WPA2"<table align="center" cellpadding="0" cellspacing="0" class="tr-caption-container" style="margin-left: auto; margin-right: auto; text-align: center;"><tbody>
<tr><td style="text-align: center;"><a href="https://1.bp.blogspot.com/-ZvxDDA0yTkk/WeYXt9mWfNI/AAAAAAAALEQ/y-ac5MfL_4AOnXdh2ytoZ1iP15fxoruXACLcBGAs/s1600/crack%2Battack%2Bwifi%2Bvurnerability.jpg" imageanchor="1" style="margin-left: auto; margin-right: auto;"><img border="0" data-original-height="640" data-original-width="960" height="426" src="https://1.bp.blogspot.com/-ZvxDDA0yTkk/WeYXt9mWfNI/AAAAAAAALEQ/y-ac5MfL_4AOnXdh2ytoZ1iP15fxoruXACLcBGAs/s640/crack%2Battack%2Bwifi%2Bvurnerability.jpg" width="640" /></a></td></tr>
<tr><td class="tr-caption" style="text-align: center;">(pic via <a href="https://pixabay.com/en/users/andibreit-2748383/" target="_blank">andibreit/pixabay</a>)</td></tr>
</tbody></table>
Key Reinstallation Attacks, Breaking WPA2 by forcing nonce reuse discovered by <a href="https://twitter.com/vanhoefm" target="_blank">Mathy Vanhoef</a> and Frank Piessens of <a href="https://distrinet.cs.kuleuven.be/" target="_blank">imec-DistriNet</a>, KU Leuven;<br />
<blockquote>
We introduce the key reinstallation attack. This attack abuses design or implementation flaws in cryptographic protocols to reinstall an already-in-use key. This resets the key’s associated parameters such as transmit nonces and receive replay counters. Several types of cryptographic Wi-Fi handshakes are affected by the attack.<br />
<br />
All protected Wi-Fi networks use the 4-way handshake to generate a fresh session key. So far, this 14-year-old handshake has remained free from attacks, and is even proven secure. However, we show that the 4-way handshake is vulnerable to a key reinstallation attack. Here, the adversary tricks a victim into reinstalling an already-in-use key. This is achieved by manipulating and replaying handshake messages. <br />
<br />
When reinstalling the key, associated param eters such as the incremental transmit packet number (nonce) and receive packet number (replay counter) are reset to their initial value. Our key reinstallation attack also breaks the PeerKey, group key, and Fast BSS Transition (FT) handshake. <br />
<br />
The impact depends on the handshake being attacked, and the data-confidentiality protocol in use. Simplified, against AES-CCMP an adversary can replay and decrypt (but not forge) packets. This makes it possible to hijack TCP streams and inject malicious data into them.<br />
<br />
Against WPA-TKIP and GCMP the impact is catastrophic: packets can be replayed, decrypted, and forged. Because GCMP uses the same authentication key in both communication directions, it is especially affected.<br />
<br />
Finally, we confirmed our findings in practice, and found that every Wi-Fi device is vulnerable to some variant of our attacks. Notably, our attack is exceptionally devastating against Android 6.0: it forces the client into using a predictable all-zero encryption key.</blockquote>
<br />
The research paper behind the attack is titled <a href="https://papers.mathyvanhoef.com/ccs2017.pdf" target="_blank"><b>Key</b> <b>Reinstallation Attacks: Forcing Nonce Reuse in WPA2</b></a> and will be presented at the Computer and Communications Security (CCS) conference on Wednesday 1 November 2017 in Dallas, Texas. The paper <a href="https://papers.mathyvanhoef.com/ccs2017.pdf" target="_blank"><b>can be found here</b></a>.Unknownnoreply@blogger.comtag:blogger.com,1999:blog-21255525.post-80771608221533013952017-10-17T20:34:00.002+07:002017-10-17T20:34:27.048+07:00Apple confirms fix against "KRACK Attack" WPA-2 exploit but...<div class="separator" style="clear: both; text-align: center;">
<a href="https://1.bp.blogspot.com/-ciJMPheH09U/WeYGOUuswOI/AAAAAAAALD8/RATpU_mOouIoC3y50qpJZ9BX5wquu-XOwCLcBGAs/s1600/apple%2Bairport%2Brouters.jpg" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"><img border="0" data-original-height="467" data-original-width="830" height="360" src="https://1.bp.blogspot.com/-ciJMPheH09U/WeYGOUuswOI/AAAAAAAALD8/RATpU_mOouIoC3y50qpJZ9BX5wquu-XOwCLcBGAs/s640/apple%2Bairport%2Brouters.jpg" width="640" /></a></div>
Following the recent "KRACK Attack" Wi-Fi WPA-2 exploit, Apple has
cited that it has addressed the issue in its macOS, iOS, tvOS and
watchOS betas, but has yet to officially state as to whether a patch is
en route for its AirPort series of routers.<br />
<br />
Sources within the company have stated that the patch to remove
hardware susceptibility was included in a "previous" beta of the current
range of operating systems, indicating a release before Monday’s batch.
<br />
<span id="more-72482"></span><br />
Given that the most recent firmware update for the AirPort routers was
released in December of 2016, it's presently unknown as to whether Apple
would release a patch for the KRACK exploit for its AirPort routers.<br />
<br />
The KRACK exploit itself takes advantage of a four-way handshake
between a router and a connecting device to establish the encryption
key. Properly executed, the third step can be compromised, resulting in
the re-use of an encryption key —or in some cases in Android and Linux,
the establishment of a null key.<br />
<br />
Security researchers have claimed that the attack vector has been
opened up in Android 6.0 or later devices. Other operating systems,
including iOS and macOS are less impacted, but "a large number of
packets" can still be decrypted from all.<br />
<br />
The attack uses one or more of 10 different exploits. The details of
the exploit were submitted for review on May 19th, and a conference
presentation will be delivered on November 1st.<br />
<br />
Stay tuned for additional details as they become available. (via <a href="http://www.powerpage.org/apple-confirms-fix-against-krack-attack-wpa-2-exploit-in-macos-ios-tvos-and-watchos-betas-has-yet-to-comment-on-airport-firmware/" target="_blank">Chris Barylick/powerpage.org</a>)Unknownnoreply@blogger.comtag:blogger.com,1999:blog-21255525.post-3510526652441358502017-10-17T00:20:00.001+07:002017-10-17T00:20:20.549+07:00Krack Attack Wi-Fi attack: Who is affected and what can be done to mitigate the damage<table align="center" cellpadding="0" cellspacing="0" class="tr-caption-container" style="margin-left: auto; margin-right: auto; text-align: center;"><tbody>
<tr><td style="text-align: center;"><a href="https://2.bp.blogspot.com/-1xElupsw6mk/WeTqLl9s4MI/AAAAAAAALDs/DEnjjHHvahcMRrb3rQ3A9wqxTh0U5hg8wCLcBGAs/s1600/krack%2Battack%2Bhacks.jpg" imageanchor="1" style="margin-left: auto; margin-right: auto;"><img border="0" data-original-height="391" data-original-width="696" height="358" src="https://2.bp.blogspot.com/-1xElupsw6mk/WeTqLl9s4MI/AAAAAAAALDs/DEnjjHHvahcMRrb3rQ3A9wqxTh0U5hg8wCLcBGAs/s640/krack%2Battack%2Bhacks.jpg" width="640" /></a></td></tr>
<tr><td class="tr-caption" style="text-align: center;">pic via windowslatest.com</td></tr>
</tbody></table>
A vulnerability in the WPA2 protocol allowing attackers to read encrypted information transmitted over Wi-Fi was discovered by <a href="https://twitter.com/vanhoefm" target="blank">Mathy Vanhoef</a>, a post-doctorate researcher at <a href="https://distrinet.cs.kuleuven.be/" target="blank">KU Leuven</a>. Vanhoef's paper on this vulnerability, <a href="https://papers.mathyvanhoef.com/ccs2017.pdf" target="blank"><em>Key Reinstallation Attacks: Forcing Nonce Reuse in WPA2</em></a> was submitted for review on May 19, 2017. It will be presented at the <a href="https://www.sigsac.org/ccs/CCS2017/" target="blank">Computer and Communications Security conference</a> on November 1, 2017.<br />
<br />
<div class="sharethrough-article" data-component="medusaContentRecommendation" data-medusa-content-recommendation-options="{"promo":"promo_TR_recommendation_sharethrough_top_in_article_desktop","spot":"dfp-in-article"}">
</div>
Vanhoef first notified vendors with products he
personally tested and found to be vulnerable "around" July 14, 2017.
After determining that this was a vulnerability of the protocol, not of a
vendor-specific implementation, Vanhoef approached <a href="https://cert.org/" target="blank">CERT/CC</a>, which in turn notified product vendors on August 28th.<br />
<br />
<b>Who is affected</b><br />
<br />
Practically any device capable of
sending or receiving a Wi-Fi signal is affected. Because of the nature
of the attack, the client device is the target and is, therefore, the
highest priority for patching.<br />
<br />
In Vanhoef's proof of concept against a phone running Android
6.0, the behavior of wpa_supplicant—a Wi-Fi library used in Android and
various Linux distributions—causes the encryption key to be erased from
memory after being installed the first time. As such, if an attacker
retransmits part of the handshake, the library will reinstall the
cleared key, effectively replacing the key with a blank one.<br />
<br />
According to Vanhoef, "This makes it trivial to intercept and
manipulate traffic sent by these Linux and Android devices." He also
noted that 41% of Android devices <a href="https://developer.android.com/about/dashboards/index.html" target="blank">run Android 6.0 or above</a>, where this behavior was introduced. At press time, a patched wpk_supplicant is <a href="https://bodhi.fedoraproject.org/updates/FEDORA-2017-60bfb576b7" target="blank">in testing for Fedora</a>, though no patch has yet been introduced for Ubuntu.<br />
<br />
<a href="https://www.kb.cert.org/vuls/byvendor?searchview&Query=FIELD+Reference=228519&SearchOrder=4" target="blank">CERT provides a list of vendors with products affected by this vulnerability</a>,
with information from individual vendors about the status of their
plans to patch or otherwise mitigate this issue.<br />
<br />
For enterprise Wi-Fi
deployments, <a href="https://www.kb.cert.org/vuls/id/CHEU-AQNN6B" target="blank">Ubiquiti</a>
noted that UniFi access points on firmware 3.9.3 and above are not
affected by WPA2 key issues, but that fast BSS transition is still
affected, though that feature is in beta. <a href="http://www.zyxel.com/support/announcement_wpa2_key_management.shtml" target="blank">Zyxel has posted a page</a> detailing the rollout of patches to address this issue, projected to begin next month. Aruba <a href="http://www.arubanetworks.com/assets/alert/ARUBA-PSA-2017-007.txt" target="blank">has posted a memo</a> and updated firmware to address this issue.<br />
<br />
<b>What can be done to mitigate damage</b><br />
<br />
For mobile,
particularly Android devices, avoiding connecting to Wi-Fi networks in
public places—even if they are protected networks.<br />
<br />
It is
possible to patch devices in a backward-compatible manner, though
distribution of these patches is likely to take time. Check with your
product vendors to see if a patch is available or necessary. (<a href="http://techrepublic.com/">techrepublic.com</a>)Unknownnoreply@blogger.comtag:blogger.com,1999:blog-21255525.post-45113065331602978272017-10-17T00:01:00.001+07:002017-10-17T00:01:33.478+07:00"Krack Attack" WPA2 protocol Wi-Fi attack: This is how the attack works<table align="center" cellpadding="0" cellspacing="0" class="tr-caption-container" style="margin-left: auto; margin-right: auto; text-align: center;"><tbody>
<tr><td style="text-align: center;"><a href="https://1.bp.blogspot.com/-msfmKwD8x9k/WeTlyzp5yvI/AAAAAAAALDg/zchBw0OgsowsoLoZr42PyBG9Hr6pxCtJQCLcBGAs/s1600/krack%2Battack%2Bwifi%2Bsecurity%2Bshredded.jpg" imageanchor="1" style="margin-left: auto; margin-right: auto;"><img border="0" data-original-height="520" data-original-width="860" height="386" src="https://1.bp.blogspot.com/-msfmKwD8x9k/WeTlyzp5yvI/AAAAAAAALDg/zchBw0OgsowsoLoZr42PyBG9Hr6pxCtJQCLcBGAs/s640/krack%2Battack%2Bwifi%2Bsecurity%2Bshredded.jpg" width="640" /></a></td></tr>
<tr><td class="tr-caption" style="text-align: center;">(c). bankinfosecurity.com</td></tr>
</tbody></table>
A vulnerability in the WPA2 protocol allowing attackers to read encrypted information transmitted over Wi-Fi was discovered by <a href="https://twitter.com/vanhoefm" target="blank">Mathy Vanhoef</a>, a post-doctorate researcher at <a href="https://distrinet.cs.kuleuven.be/" target="blank">KU Leuven</a>.
Due to a flaw in the design of the protocol itself—not a specific
vendor implementation—attackers can capture part of the handshake
message, and use modified versions of that to trick devices into
installing a blank encryption key, a process called "key reinstallation
attacks," or KRACKs by Vanhoef.<br />
<br />
<b>How the attack works</b><br />
<br />
Because of the depth and nuance of this vulnerability, <a href="https://www.kb.cert.org/vuls/id/228519" target="blank">collectively KRACK has 10 CVE identifiers assigned to it</a>.
The lynchpin of the vulnerability is the four-way handshake used when a
client device attempts to join a protected network. After verifying the
Wi-Fi password for the network itself, the encryption key for the
session is negotiated. These handshake messages can be captured and
manipulated by an attacker, and rebroadcast to a device which proceeds
to reinstall the encryption key.<br />
<br />
The WPA2 handshake design
permits for the possibility of a dropped packet during handshake.
Therefore, the third step of the four-way handshake—in which the
encryption key is negotiated—may be rebroadcast to the client if the
access point has not received an acknowledgement. Per protocol design,
the client may receive the encryption key multiple times, and is
expected to reinstall that key, resetting the incremental packet transit
number ("nonce") and receive reply counter. Attackers can take
advantage of this behavior to replay, decrypt, or forge packets.<br />
<br />
Naturally, this ability extends to TCP SYN packets, making it
possible for attackers to hijack TCP connections, in functionally the
same way attackers inject data on unprotected Wi-Fi networks.<br />
<br />
Of note, this attack does not allow attackers to recover the network password. (<a href="http://www.techrepublic.com/meet-the-team/us/james-sanders/" target="_blank">James Sanders, techrepublic.com</a>)<br />
Unknownnoreply@blogger.comtag:blogger.com,1999:blog-21255525.post-38053483358622603942017-10-16T23:46:00.000+07:002017-10-16T23:49:38.644+07:00"Krack Attack", a key flaw that could allows hackers to steal credit cards and more<div class="o-article_block pb-15 pb-5@m- o-subtle_divider">
<div class="grid@tl+">
<div class="grid@tl+__cell col-8-of-12@tl+">
<div class="article-text c-gray-1">
<div class="separator" style="clear: both; text-align: center;">
<a href="https://2.bp.blogspot.com/-_Rk1Ec7TSlQ/WeTh8IGaUBI/AAAAAAAALDU/GdGOXWjJUuQrdKB8x9FsiukwB0pF16GvwCLcBGAs/s1600/krack%2Battack.jpg" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"><img border="0" data-original-height="639" data-original-width="960" height="425" src="https://2.bp.blogspot.com/-_Rk1Ec7TSlQ/WeTh8IGaUBI/AAAAAAAALDU/GdGOXWjJUuQrdKB8x9FsiukwB0pF16GvwCLcBGAs/s640/krack%2Battack.jpg" width="640" /></a></div>
Researchers have discovered a key flaw in the <a href="https://www.engadget.com/2008/10/13/elcomsoft-uses-nvidia-gpus-to-crack-wpa2/">WPA2 WiFi</a>
encryption protocol that could allow hackers to intercept your credit
card numbers, passwords, photos and other sensitive information. The
flaws, dubbed "<a href="https://www.krackattacks.com/">Key Reinstallation Attacks</a>,"
or "Krack Attacks," are in the WiFi standard and not specific products.
That means that just about every router, smartphone and PC out there
could be impacted, though attacks against Linux and Android 6.0 or
greater devices may be "particularly devastating," according to KU
Leuven University's <a href="https://twitter.com/vanhoefm">Mathy Vanhoef</a> and Frank Piessens, who found the flaw.<br />
<br /></div>
</div>
</div>
</div>
Here's how it works. Attackers find a vulnerable WPA2 network, then
make a carbon copy of it and impersonate the MAC address, then change
the WiFi channel. This new, fake network acts as a "man in the middle,"
so when a device attempts to connect to the original network, it can be
forced to bypass it and connect to the rogue one.<br />
<br />
Normally, WPA2
encryption requires a unique key to encrypt each block of plain text.
However, the hack described in the Krack Attack paper forces certain
implementations of WPA2 to reuse the same key combination multiple
times.<br />
<br />
The problem is made worse by Android and Linux, which,
thanks to a bug in the WPA2 standard, don't force the client to demand a
unique encryption key each time. Rather, they allow a key to be cleared
and replaced by an "all-zero encryption key," foiling a key part of the
handshake process. In some cases, a script can also force a connection
to bypass HTTPS, exposing usernames, passwords and other critical data.<br />
<br />
The
system takes advantage of a flaw in the "handshake" method to direct
users to the malicious network. Neither WiFi passwords nor secret keys
can be obtained, the researchers say, as the hack works by forging the
entire network. As such, it can't be used to attack routers, but hackers
can still eavesdrop on traffic, making it particularly dangerous for
corporations.<br />
<br />
<br />
<iframe allowfullscreen="" frameborder="0" height="500px" src="https://www.youtube.com/embed/Oh4WURZoR98" width="100%"></iframe>
<br />
<br />
<br />
As shown above, the researchers did a proof-of-concept attack on
Android, and were able to decrypt all the victim's transmitted data.
They point out that this will "not work on a properly configured HTTPS
site," but will work on a "significant fraction" that are poorly set up.
Other devices, like those running MacOS, Windows, OpenBSD and other
operating systems, are affected to a lesser extent. "When attacking
other devices, it is harder to decrypt all packets, although a large
number of packets can nevertheless be decrypted," say the researchers.<br />
<br />
After earlier, more limited hacks, the WPA2 protocol has been <a href="https://www.alexhudson.com/2017/10/15/wpa2-broken-krack-now/">suspect</a>
for a while, so many security folks were already bracing themselves for
something bad. If you still doubt the seriousness of it, <a href="https://www.alexhudson.com/2017/10/15/wpa2-broken-krack-now/">Alex Hudson</a>,
for one, is actually advising Android users to "turn off WiFi on these
devices until fixes are applied." He adds that "you can think of this a
little bit like your firewall being defeated."<br />
<br />
As such, you can
protect yourself to a great extent by sticking with sites that have
solid, proven HTTPS security. And of course, the attack won't work
unless the attacker is nearby and can physically access your network.<br />
<br />
The
problem should be relatively easy to fix. A firmware change can force
routers to require a dedicated certificate for each handshake, instead
of relying on the one already generated. And, as the security
researchers who discovered it say, "implementations can be patched in a
backwards-compatible manner."<br />
<br />
That means if you patch your Android
device and not your router, you can still communicate and be safe, and
vice-versa. Nevertheless, they also advise to patch all your devices as
soon as security updates are available. For more details about the hack,
check this <a href="http://www.arubanetworks.com/assets/alert/ARUBA-PSA-2017-007_FAQ_Rev-1.pdf">very detailed FAQ</a> from Aruba Networks. (<a href="https://www.engadget.com/about/editors/steve-dent/" target="_blank">Steve Dent</a>, engadget.com)Unknownnoreply@blogger.com