Jumat, 02 Oktober 2015

Stupid Geek Tricks: 6 Ways to Open Windows Task Manager

How-To Geek Newsletter
Did You Know?

The aptly named bloodwood tree “bleeds” a dark red sap when the bark is cut and it pools and coagulates over bark damage much like human blood seals over wounds.

Geek Trivia

Nevermind, A Psychological Horror Video Game, Uses What Technique To Increase Game Difficulty?
Pupil Dilatory Response →
Random Controller Inversion →
Binaural Beat Audio →
Heart Rate Monitoring →


Advertisement
Download Exclusive Enterprise Security Kit (a $26.99 value) FREE for a limited time!
Kit includes "Enterprise Security: A Data-Centric Approach to Securing the Enterprise" plus 3 other resources to help you understand how to secure enterprise data. Click here to download
Thoughts from the Geek

This is a daily column written by Lowell Heddings, the founder and owner of How-To Geek. If you prefer, you can read this column in a web browser instead.

Experian Hacked, T-Mobile Customer Data Stolen

Today, credit reporting and marketing company Experian announced they were the victim of a data breach that affects approximately 15 million U.S. consumers, including any T-Mobile customer who went through a credit check for service or device financing.

This information includes names, dates of birth, addresses, and Social Security numbers (or alternate forms of ID like drivers' licenses), as well as other information that may have been used in T-Mobile's credit assessment.

Their solution to leaking all of your personal information is to give you two years of credit monitoring for free. Yes, that’s right. First, they lose all of your data. Then they offer to monitor your data for free. Of course, in order to do that you have to sign up and give them your social security number, which you may not have given them in the first place.

Credit monitoring is ridiculous. They are effectively saying “Pay us to monitor your file or we’ll let somebody open up an account in your name.”

The really messed up thing here is that most of the people that sign up for the 2 years of free credit monitoring will end up probably decide to pay. So in the long run, Experian might get more customers out of this.

And that’s why I don’t want to participate in this system. But do you have any option? Nope. You’re automatically enrolled, and then they are legally allowed to sell some of your information to other companies, which is how you get all those credit card offers in the mail. Do they verify it’s really you when giving out your credit report? Nope. These days you can get a credit card by just filling out an application with some information and a social security number.

Luckily there is one way that you can opt out — instead of putting a fraud alert on your credit, you can completely freeze it so nobody can access it.

A billion Android phones are vulnerable to new Stagefright bugs

There’s a new round of Stagefright vulnerabilities that allows attackers to execute malicious code on more than one billion phones running ancient as well as much more recent versions of Google’s Android operating system.

The fact that most Android phones don’t get patches regularly is starting to catch up to Android. At this point if you aren’t using a Nexus device where patches are provided directly from Google, you probably are going to be vulnerable.

Seems to me that it is only a matter of time before a worm infects millions of phones.


Geek Comic
2015-10-02-(sleep-mode)
Today's Tech Term

Pagejacking

Pagejacking is the process of stealing (illegally copying) content from one website and posting it to another in order to replicate parts (or all) of the original so that it can siphon search traffic to the false website for a variety of reasons (i.e. ad views, malware, etc.).

What We're Reading from Around the Web

How to Use the Ink Equation Feature in Office 2016 to Write Equations

One of the new features in Office 2016 is "Ink Equation". This feature allows you to insert equations into Word, Excel, and PowerPoint by handwriting them. Ink Equation is designed to be used with a tablet pen on a tablet PC.

Read This Article →


How to Run Malwarebytes Alongside Another Antivirus

Malwarebytes Anti-Malware is a great security tool that’s particularly effective against “potentially unwanted programs (PUPs)” and other nasty software traditional antivirus programs don’t deal with. But it’s intended to be used alongside an antivirus and doesn’t replace one entirely.

Read This Article →


Stupid Geek Tricks: 6 Ways to Open Windows Task Manager

Bringing up Windows Task Manager is not much of a task itself, but when a virus disables Ctrl+Alt+Del and takes it hostage, how else are you going to open task manager? Or maybe you're just looking for some diversity in your life, so here are 6 different ways to open Windows Task Manager.

Read This Article →


How to Prevent Identity Thieves from Opening Accounts in Your Name

Everybody is getting hacked left and right. Anthem lost 80 million records. The US government got hacked and lost personal data for millions, all the way down to fingerprint data. Now Experian, a credit bureau got hacked. So how can you protect yourself from criminals opening accounts in your name?

Read This Article →


What are These Special Folder Names and How do They Work?

When you hear of folder names like {4234d49b-0245-4df3-B780-3893943456e1}, references to a ‘god mode’ folder, and more, it can definitely arouse your curiosity and make you want to learn all about them. With that in mind, today’s SuperUser Q&A post has the answer to a curious reader’s questions.

Read This Article →


How to Automatially Hide or Show the Menu Bar in OS X El Capitan

Windows users have the ability to hide the Taskbar, but the menu bar in OS X is a constant presence. This isn’t necessarily bad because the menu bar doesn’t really take up that much room. If you want to hide it, however, you now can.

Read This Article →


How to Add a Self-Hosted Email Account to an iOS Device

It's easy to add email accounts, such as iCloud, Google, Yahoo, or Outlook.com, to an iOS device. However, what if you have a self-hosted email account with a custom domain? No worries. That's just as easy.

Read This Article →


The 5 Best Free iPhone Games (That Are Actually Free)

Lampooned in the South Park episode "Freemium Isn't Free", games like Simpsons: Tapped Out were put on blast for actively and knowingly creating Skinner box scenarios wherein players could play a game for "free", only to find that their ability to level up or add new items was locked under a paywall for in-game currencies.

Read This Article →


How to Quickly Resize, Convert & Modify Images from the Linux Terminal

ImageMagick is a suite of command-line utilities for modifying and working with images. ImageMagick can quickly perform operations on an image from a terminal, perform batch processing of many images, or be integrated into a bash script.

Read This Article →


Advertisement
Download Salary & Skills Roundup for Today's IT Professional
This exclusive kit will teach you how to make more money in your career as an IT professional. Click here to download

Tidak ada komentar:

Posting Komentar