| Index | Recent Threads | Unanswered Threads | Who's Active | Guidelines | Search |
| World Community Grid Forums
|
| No member browsing this thread |
|
Thread Status: Active Total posts in this thread: 303
|
|
| Author |
|
|
mikaok
Senior Cruncher Finland Joined: Aug 8, 2006 Post Count: 489 Status: Offline Project Badges:
|
I already use similar ideas to mix high and low case letters and numbers for important passwords. Some of my passwords are over 15 characters. Sometimes I do mess up if I do not use them regularly but I manage to recover them by rebuilding them through a logical process. I also change them from time to time. ![]() Sounds like a good invention. Maybe I'll come up with my own ![]()
to infinity and beyond
![]() |
||
|
|
Former Member
Cruncher Joined: May 22, 2018 Post Count: 0 Status: Offline |
If you accidentally erase photos from your memory card, immediately stop using that card. Google “memory card file recovery,” download a program, and you can undelete them.
|
||
|
|
Former Member
Cruncher Joined: May 22, 2018 Post Count: 0 Status: Offline |
Earlier this week Apple activated its much anticipated iTunes Match service. The service, which comes with a price tag of $25 per year, allows users to store their iTunes purchases in the cloud, as well as matching and backing up all tracks not purchased through iTunes.
So how does it work? iTunes Match will take time to search for your library and match up your files with songs that are already in the iTunes store. This means you can play music at high quality, even if your current files are lower quality. Existing iTunes store purchases are also thrown into the mix. The songs that aren’t found in the iTunes store (such as that polka/jazz/heavy metal demo CD from the guy down the street) can then be uploaded to the cloud, making them available from any iTunes or iOS device. You can then either stream or download these songs to your computer or mobile device. iTunes Match is limited to 25,000 non-iTunes tracks. If you have a supermassive music library, Match may not be a good choice for you. |
||
|
|
mikaok
Senior Cruncher Finland Joined: Aug 8, 2006 Post Count: 489 Status: Offline Project Badges:
|
If you accidentally erase photos from your memory card, immediately stop using that card. Google “memory card file recovery,” download a program, and you can undelete them. Piriform Recuva will have my vote. It's free. ![]()
to infinity and beyond
![]() |
||
|
|
Former Member
Cruncher Joined: May 22, 2018 Post Count: 0 Status: Offline |
good
Cyber Security: 25 Worst Passwords of 2011 If the word "password" stands as the password between your online information and cyber criminals, you are the most vulnerable person to be hacked. Yes, it is the worst password one can possibly choose, according to a study. Password management application provider SplashData has released its annual list of worst internet passwords. The list includes "Password", "123456" and, weirdly, "monkey" among the 25 worst passwords of the year. The list was prepared from files containing millions of stolen passwords posted online by hackers. It also included series of contiguous numbers or letters on the keyboard like "qwerty" and "123456," and common names like "ashley" and "Michael." Below is the complete list of 25 worst passwords of 2011..... |
||
|
|
Former Member
Cruncher Joined: May 22, 2018 Post Count: 0 Status: Offline |
Reminder From Google: 2-Step Verification Protects You From Hackers Video
Did you know that Google offers 2-step login verification for Gmail accounts? The feature has been around a while, and now Google has written a reminder for all users who need an extra layer of security for their Gmail account and other services connected to it. In addition to logging into Gmail with your email and password, with 2-step verification you’ll have to go through the added trouble of entering a code Google will send to your phone. This will “approve” the computer you’re currently logging in from for 30 days, so you don’t have to do this every time you log in. If you have a smartphone, you can also generate the code on your phone using the Google Authenticator app Yes, entering an additional code is somewhat of a nuisance, but it would also greatly complicate matters for anyone who has gotten a hold of your password. To successfully log into your Gmail account, that person would also need to obtain your phone. In its blog post Google emphasizes that this reminder is just “general security advice, not an indication of an attack or compromise,” but one has to wonder if the Redmond giant is seeing an increased number of complaints from users whose Gmail accounts have been compromised. To enable 2-step verification for Gmail, go here |
||
|
|
sk..
Master Cruncher http://s17.rimg.info/ccb5d62bd3e856cc0d1df9b0ee2f7f6a.gif Joined: Mar 22, 2007 Post Count: 2324 Status: Offline Project Badges:
|
Useful tool; http://www.comodo.com/home/support-maintenance/programs-manager.php
Can be used to 'completely remove unwanted software' like corrupt Boinc installs, and dodgy video drivers (really a must here). 'Detects and removes remnants of failed and partial uninstalls' 'Built-in scanner warns you if you are about to install malware' Suggest people use this as soon as they do a clean operating system installation, but still very useful on existing operating systems. |
||
|
|
Former Member
Cruncher Joined: May 22, 2018 Post Count: 0 Status: Offline |
Nice thanks
Tropical Glen, a jukebox site that plays the Top 100 hits of years from 1950 to 1989. Plus, they offer many channels of specific music styles. |
||
|
|
nanoprobe
Master Cruncher Classified Joined: Aug 29, 2008 Post Count: 2998 Status: Offline Project Badges:
|
FWIW I would be very wary of any Comodo product after their certificate verification fiasco. JMHO.
----------------------------------------
In 1969 I took an oath to defend and protect the U S Constitution against all enemies, both foreign and Domestic. There was no expiration date.
![]() ![]() |
||
|
|
Former Member
Cruncher Joined: May 22, 2018 Post Count: 0 Status: Offline |
Don't want to take this off topic, but I guess you read about the 'elephant in the room' sized false licensing security cert issues. Anyway, the 'cert fiasco' is much, much bigger than Comodo; Some primaries have revoked sub-licensing to whole global areas.
Back on topic, 100 best ever free PC system tools - beat that ![]() |
||
|
|
|