Oh boy, for a while one company had in their terms and conditions that the first person to email a certain address with a certain subject line would receive $1000 from them.
It took months for anyone to find it.
EDIT: Source and some other hilarious clauses.
My wife always puts her phone on silent and then forgets about it and will go for hours without answering her phone or text messages. So I set up Tasker to let me send her a text message to turn the sound back on.
Tasker helps me fix my wife's inadequacies.
He intentionally dressed it up to make it sound like he's some kind of genius science fiction artist, when really he just used a fairly well known app/plugin.
The "AI" is this, and "working with it" consisted of feeding it two images. I guess he really did create it by accident, so his title is accurate as far as that is concerned.
People interested in more examples of this sort of thing in action (and some discussion of the technique) can check out the subreddit here.
Mac OS has a really good built-in summarise tool. Use it on large texts to get the general gist of the article. I use it heaps for research papers and articles.
http://www.makeuseof.com/tag/summarize-text-using-hidden-mac-tool/
That must be a joke. Websites don't have access to your browser history.
Or it could be a supercookie and this nag screen should disappear when you clear your cookies.
Pro-tip: An easy way for Windows users to make sure that metadata is removed before you share a photo is to right-click the file and select "Properties", then the "Details" tab, then near the bottom click "Remove Properties and Personal Information". More info here.
Something a lot of people should do, is install the browser extension for like:dislike previews. It shows you how much a video is liked/disliked on the thumbnail, so you don't have to click it first:
http://www.makeuseof.com/dir/ytshowrating-view-youtube-video-ratings-streaming/
The other thing on this topic, is I don't feel these videos should be "taken down" for too many dislikes - they should just stop appearing in the related videos though. Likes should be more important than views in ranking videos.
Well considering you still have that number you could engage in one of my favorite pastimes when it comes to calls like this, randomly feeding their number into prank call auto-dialers. Only works if you have a legit callback number for them, but I like returning the favor when I can. Also another fun one if they ask you for a contact number is to give them (202) 326-2222, which is the phone number for the FTC Office.
These are just stretches really. It's not like you're lifting weights. Also it's easy to tell when part of your article is stolen when the other part is poorly written. http://www.makeuseof.com/tag/5-reasons-working-with-computers-is-bad-for-you-how-to-stay-healthy/ Both 2nd paragraphs are almost identical except Tina Sieber wrote hers 2 years ago.
EDIT: period
I don't see how your life is fucked at all, but rather I see it as that you're at a pivotal point in your life right now and YOU should avoid fucking it up.
You go to university, have a job, and have 8k in the bank. This is a lot better than some!
You're also aware of the problems and they can be resolved. Leave your father's house, learn to cook, stop drinking sugar, and get busy or suffer the consequence.
These might help you out: http://www.makeuseof.com/tag/10-motivational-ted-talks-to-help-you-chip-away-at-your-mental-blocks/
Edit: I just read your other posts and you should definitely leave. Don't ever live for a religion and what makes you think you'll never see your family again?
Get on the centrelink if you leave as you get decent money for studying.
There's a way to block those ads if you know from where they are coming.
Since Skype has an ads endpoint you can simply block them with the hosts file or inside the internet options menu: http://www.makeuseof.com/tag/block-advertisements-skype-customize-chat-interface/
To everyone suggesting that this should be done by earthquake-monitoring systems, <strong>it is already available from USGS</strong>.
It's free and has worldwide coverage. Create an account, add whatever email you prefer, or by text messages (via your phone provider's SMS gateway), and sign up for whatever regions you want.
For instance, any earthquake over 6.0 worldwide causes me to receive an email, and anything over 5.0 in my region is also sent to my phone, but that config is easily changed.
Use uBlock Origin. Adblock Plus got bought out, plus I found this while looking for a source for that.
I liked the one where a kid and her mom were under witness protection, and the dad used the "ah lost ma kid" routine on FB to find them. It worked.
makeuseof.com is kinda similar. Focus is slightly different, but might be what you want.
(Declaration of interest: I know a couple of people who write for them.)
Edit: They had a poll which listed a few other alternatives. (Poll results, if you're interested).
I'm all for consumer rights but a 1gb/mth limit for Whatsapp (before the introduction of video calls) sounds reasonable to me. What's more, assuming the user does nothing but video calls, he needs to video call for 200 mins to reach the 1gb limit. (5mb/min for 4g users, see here) Again, sounds reasonable to me, in the interest of other users.
It isn't a mattress store, it is a furniture and mattress store.
Look at photo 2 in your set. Style 632 Burg.
http://www.meridianfurnitureusa.com/sitefiles/product-641/632BURG.html
The picture matches exactly.
Looks like a pretty shitty furniture store though. The pictures on the walls are just posters and the walls have a terrible paint job in that they go around all of the electrical conduits.
But if these are in your drop box see if you can extract location data from them.
http://www.makeuseof.com/tag/exif-photo-data-find-understand/
Actually to an extent a virtual machine could be able to tell how slow it's running and that its actually virtual machine. Software exists to be installed specifically onto virtual machines (VirtualBox Guest Additions for example) giving the virtual machine greater capability, performance, and reliability. Basically it's a program that taps the VM on the shoulder and says "FYI... You're a VM. You're running in a window right now IRL."
This might help, Note if you're running home version that many policies can be done using a registry entry.
Here's the thing, Fuck them for believing automatic driver updates would ever be beneficial to the end user. I've upgraded probably 15 machines and I've had 5 with failed drivers due to them installing their "best fit"
I spent more time figuring out what happened than it would have taken to just leave me some nice Yellow Exclamations in the device manager. I'd rather know it's fucked up than them to report everything's peachy and the device not work.
This is what happens when Microsoft tries to be Apple.
edit: spacing
I got my copy of Windows 8.1 from Dreamspark, and I haven't received a notification for reserving Windows 10. Is there a way to force it?
EDIT: I found out that you have to have an update installed to get the notification. It's an optional update, so I had to go into Windows Update and install it manually. I still haven't gotten a notification, but I'm trying out some things. I used this tutorial
My guess is that he is monitoring traffic over the router.
The best solution I advise is approaching him about it in a calm manner, don't blame or point fingers, and state what have observed and how it makes you feel uncomfortable.
EDIT: In the event that you would like to keep your data secure, you can encrypt it. (Also, just so the mods know, I wasn't offering relationship advice. Just a simple solution of user action.)
Here's a very simple explanation of encryption.
Encryption is like putting a massive wall with a huge steel door around your information. Only you would be able to access it, as you'd have the only key. The ONLY way he'd be able to gain your information again is if he used on of his forensic/security tools, which you said you're confident that he wouldn't use them.
Here are some simple(slightly) articles on encryption of the devices you mentioned.
iPhone This will encrypt your data stored on your phone.
Mac This will do the same for the data on your Mac.
Unfortunately I don't believe there is a way you can keep him from monitoring your traffic over the monitor, short of locking him out of it.
EDIT: I'm so stoked right now! My first relatively high rated fix!
You can never really be sure if producer is not pulling some shit.
Lenovo, for example, was found installing malicious programs on their hardware several times.
--
Quickly found sources, but I'm sure you can find it in various places:
https://thehackernews.com/2015/09/lenovo-laptop-virus.html
http://www.makeuseof.com/tag/now-three-pre-installed-malwares-lenovo-laptops/
If you plan to use it as a tablet with any regularity, get the Touch Me Gesture Studio and set up a gesture to launch task switcher as well as a gesture to close the current window. (For me, 2 finger swipe up for app switcher, 2 finger swipe down to close current window.) You'd be surprised how much this simplifies things, giving it a very iPad-like feel.
Do NOT put any kind of Anti-Virus on it.
Make sure you set up your power and other settings to maximize battery life.
If this is your first time on Windows 10, learn how to optimize your Windows 10 experience.
http://www.makeuseof.com/tag/quick-look-plugins-make-file-browsing-os-x-even-better/
Also, it's open, as in any dev. can make a plugin to support their app's content:
Let me point you in the right direction: Here
It's on you mate. it's your decision to leave this hell hole. Why not give yourself a 6 month trial. Go shave off your head, actually hit the gym and eat healthy and try to socialize as best you can.
Come back in 6 months and update us.
If you manage to change for the better, you will always know you've left this place and can do it again. If it doesn't get better, you're back to square one and nothing has changed so it doesn't matter at all.
Was your Mac set up so that you need to enter a password each time you wake it? If not, you may still be sighing too soon. This person used your computer and you don’t know what he did.
First, do this right now: In the “Utilities” folder, open “Console”. In the search field, type “wake reason”. You’ll see a list of times that the Mac has woken up recently. If one of them was while your family was out of the house, that’s when the intruder started using your Mac. That info might be useful for the police, so take a screenshot before the log expires.
Next, follow the rest of the steps on MakeUseOf’s “Who’s been using your Mac?”. In particular, if “Recent Items” (step 2) contains any app that you don’t recognize — or if your webcam’s green light ever comes on unexpectedly — the intruder may have installed spying software and it’s not safe to keep using it. Reinstall everything, or take the Mac to an expert who can.
Finally, follow Apple’s instructions on dealing with a compromised Apple ID.
É ironico pensar que o cara do Spotify era o mesmo por trás do uTorrent?
Então dá pra ver que o código do Spotify é realmente fraco e talvez tão malicioso quanto do uTorrent.
I'm sure most companies do it to cover their hineys, but there are some crazy EULAs out there.
http://www.makeuseof.com/tag/10-ridiculous-eula-clauses-agreed/
Some highlights:
This was in Chrome's first EULA, but it has since been removed: "[…] you give Google a perpetual, irrevocable, worldwide, royalty-free, and non-exclusive license to reproduce, adapt, modify, translate, publish, publicly perform, publicly display and distribute any Content which you submit, post or display on or through, the Services."
Far Cry 2's, though... wow: "It is not permitted [...] to use it contrary to morality or the laws in force.". Yes. Morality.
Correct, Mozilla did not do anything to implement support. Mozilla partnered with Adobe to have them write it and they wrote it only for Windows users.
Firefox for Linux has shit flash and no HTML5 EME at all with absolutely no word about when if ever they will.
I wrote an article about this if you'd like a link. (It got edited though because I expressed my hated for Adobe and the publisher didn't like that I guess)
http://www.makeuseof.com/tag/current-state-video-streaming-services-linux/
OP posted this on a forum on a different site as well, and there he or she stated that the daughter used the ipad app Ink Pad. After reading the following article, I think it's plausible that an intelligent, artistically inclined 11 year old could have created this. Kids are raised from a very young age using complex technology that you or even I (at 27) could not have fathomed using at age 11.
http://www.makeuseof.com/tag/free-ipad-vector-drawing-app-inkpad-might-turn-designer-yet/
Although I don't use it, Annotations on the Kindle appears to be just that, although there must be more serious comments than humorous.
Personally, I prefer un-marked up. Annotations by readers make me feel like I'm being told how to feel/think about something (not necessarily true, but I feel that way).
Open notepad
Paste there 1st script and save it as:
select Save as type: all files
and as name use whatever*.bat* (.bat part is important)
(example)
http://cdn.makeuseof.com/wp-content/uploads/2016/11/save_as_bat.png?x92042
and do same thing with 2nd script (remember about saving it with different name)
Then if you want to run it, you just double click like normal .exe file
Random tutorial: http://www.makeuseof.com/tag/write-simple-batch-bat-file/
That's awesome progress. $11 for a tube burger is almost within the realm of sanity.
The big thing is going to be that the price shouldn't fluctuate once its mass-market.. I imagine that beef prices won't be close to steady, and many major companies would rather take the entity with less volatility.
Edit: Its below $9/lb as of mid 2015: http://www.makeuseof.com/tag/lab-grown-burger-now-costs-less-10-00/
"Experience"... fuck.
Alien Isolation has a functional VR mode for the Oculus Rift that can be unlocked with one line of code change, so it should not be too hard to make it work on PSVR.
I'm sure that none of us would mind too much if the resolution or effects have to be dropped a bit for it to work.
Heck, I'd even be happy just for VR support of the Ellen Ripley DLC campaigns -- or be willing to pay DLC price for a full VR patch.
How people 'feel' about the economy is irrelevant to the actual functioning of the economy. U.S. GDP has grown by 2.9% last quarter. Employment is up and unemployment is down.
The economic reality is that there will always be some areas that are worse off than others for a large variety of reasons. In the next five years, over 1.4 Million people might lose their jobs due to autonomous vehicles. It's very difficult to fix these structural issues because the people who find themselves in a bad place as the result of structural shifts in the economy require education, re-training, and re-location but they are usually pretty resistant to these things.
This is what is going on right now. Many people want the economy to structurally resemble the economy of 35 years ago, but that is not really possible. This has nothing to do with Keynesian economics or anything else - it's a simple matter of technological evolution and trade policy over the last 50 years.
METADATA!
The location of the file, the camera you used etc is generally stored by default and you can wipe it. But these days what is worse is that smartphones, they will GPS tag your photos with the location they were taken (as well as GPS smart cameras). Wipe it before you put it on the internet. I wrote a big blog post about it but unfortunately it was a work blog.
http://www.makeuseof.com/tag/how-to-remove-the-metadata-from-your-photos-windows-only/
Last Easter my husband and I were driving through a neighborhood where we used to live. "Look honey, they turned that old hotel into a drug treatment center!"
Bam, an hour later ads for drug addiction centers appear as ads right here on reddit!
The comments on the article are more examples.... http://www.makeuseof.com/tag/your-smartphone-listening-or-coincidence/
Adams changed the story based off the medium in which it was to be portrayed. I wouldn't be upset if say Eoin Colfer was the script writer for a new miniseries, but to keep it exactly as the book would be contrary to Adams vision of his own property.
http://www.makeuseof.com/tag/hitchhikers-guide-changing-stories-mediums/
If you can get a nice clear image of the woman's face, you could try one of the facial recognition search engines in this article and see if you get anything back. Although now that I'm reading it, the Google images search is the only one of the 3 likely to work. I think you can also try a few different apps to search on facebook, or try to upload a picture and see if it 'tags' someone in. If this is an older woman, she may not think about or be tech-savvy enough to lock down her account so you might get a hit. . .
“Genuine love is rarely an emotional space where needs are instantly gratified. To know love we have to invest time and commitment...'dreaming that love will save us, solve all our problems or provide a steady state of bliss or security only keeps us stuck in wishful fantasy, undermining the real power of the love -- which is to transform us.' Many people want love to function like a drug, giving them an immediate and sustained high. They want to do nothing, just passively receive the good feeling.” ― Bell Hooks
Brilliant idea!
EDIT: Not as good, but also good: http://rejectionline.com/ Rejection Online
Some funny ones here: http://www.makeuseof.com/tag/7-prank-phone-numbers-to-hand-a-bad-date-at-the-end-of-the-night/
> I get assholes, but not really thieving... it's their patent, and their protecting it legally.
right...
you know, when you buy a car, you're allowed to use third-party/aftermarket components. the manufacturer can't forbid you or force you to use original parts, or void your warranty for using aftermarket parts (unless the aftermarket part directly caused the failure). that's actually the law.
so why is this different for the coffee machine? you buy a coffee machine and the manufacturer forces you to use their coffee? what legitimate right do they have to do this?
and what exactly did keurig invent? what is their patent?
they didn't invent the capsule coffee machine, those have existed for decades, and there's no patent on the cups or requirement to get manufacturer-approved cups from either the competition, or even from keurig on their original machine.
they're simply doing it because they can and because they thought the consumer would be stupid enough to swallow this shit.
except it kinda backfired
http://www.makeuseof.com/tag/great-k-cup-backlash-every-tech-company-learn/
http://www.bloomberg.com/news/articles/2015-02-05/keurig-s-new-brewer-is-a-big-disappointment
Here's a list:
http://www.makeuseof.com/pages/best-windows-software
Here's another:
http://www.neowin.net/forum/topic/934274-freeware-alternative-list/
For Linux:
Wikipedia has asked for donations ever December since I was first using them in middle school, always saying they might have to "shut down" if they don't receive donations, but from what I've read, they don't need that money at all. They receive a ton of donations every single year. Furthermore, the Wikimedia Foundation doesn't use every cent of your donation towards Wikipedia. One article posted today says that 54% goes towards other ventures in the Wikimedia portfolio. There are a bunch of articles like these next few which seem to support the notion that Wikimedia is doing fine:
http://www.theregister.co.uk/2012/12/20/cash_rich_wikipedia_chugging/
http://www.makeuseof.com/tag/wikipedia-millions-bank-beg/
http://wikipediocracy.com/2014/09/21/wikipedia-keeping-it-free-just-pay-us-our-salaries/
And the thing is that yeah, it's great that the site is ad-free. And it's great that Jimmy Wales isn't whoring the site off to become a billionaire, because he could easily do that in his position. But if you're really struggling to get by every single year, and you anticipate on struggling in the December of 2016 as well, then just turn on ads for a little while. It's not that big of a deal in this day and age. Don't act like if you don't get donations, you're going to have to completely delete one of the top 10 most popular sites on the internet.
You'd probably want to host it yourself or find a .onion host that accepts bitcoin. Here's a tutorial for hosting yourself. And yes, I'm sure there are occult groups on Deep Web.
I don't know why everyone is bashing the cloud/chromebook, at least in this scenario. I am sure there are valid reasons to bash both, but in this situation it was all OPs fault. There are other devices OP could have used. He could have used someone's phone or he could have used a pad of paper, for starters, and then there are apps that do not require internet connectivity on the chromebook that can make local text files. http://www.makeuseof.com/tag/four-best-text-editors-chromebook/
Smartphone & Laptop Searches: Know Your Rights
Flying To The United States Of America
No surprises here: according to a 2008 ruling made in a federal court, customs agents at U.S. airports can inspect the contents of passengers’ laptop computers. They don’t even need any evidence to do so. The Ninth US Circuit Court of Appeals in San Francisco declared a computer to be no different to a suitcase, car or any other property subject to search at an international border.
The above ruling also applies to tablet computers and smartphones. If it switches on and you can store things on it, it’s fair game.
There have been numerous challenges to the TSA’s rights to search your electronic devices. The most recent one was brought by Pascal Abidor, whose laptop had undergone a deep forensic search when crossing the border from Canada in 2010. His challenge was summarily dismissed earlier this year.
The Bottom Line
Whenever you fly abroad, you give your implicit consent for someone to inspect your belongings. The all-seeing rubber-glove of airport security can go through your phone, laptop or tablet, and there’s absolutely nothing you can do about it.
They wouldn't be wrong, at this stage of the market for USB-C devices. As a Nexus 5X owner, finding quality USB-C chargers, cables and batteries that correctly implement the standard without buying directly from Apple or Google is pretty difficult. There are some roundups that help steer people towards standards compliant chargers, but you can't just pick up anything off the shelf without risk.
http://www.makeuseof.com/tag/best-usb-c-chargers-whats-safe-whats-dangerous/
When registering websites like this you should not run it through GoDaddy ffs lol. Unless you actually do want to be arrested, especially considering that you live in the USA.
I was able to find your first/last name and home address within seconds, as well as your email address and phone numbers. It's right there in the open and any background check will see this.
If you actually want to host a website like this host it through tor or don't bother hosting it at all, especially if you live in the USA. Thepiratebay was located in Sweden and they still got raided, and you have a very similar site architecture to them in terms of the service you provide. Your "legal policy" will not prevent you from getting sued into the ground at all.
I would personally advise you to take this site down before it attracts any actual attention, maybe store a copy of the site/search index locally for you to use for yourself.
PS:
http://www.makeuseof.com/tag/create-hidden-service-tor-site-set-anonymous-website-server/
Is quick guide if you do want to host something like this through TOR.
Also be sure to keep in mind that even TOR is not 100% safe as the US Govt. runs several major tor nodes.
I actually just wrote an entire article about how to strip formatting when pasting text. There are a few different ways depending on what you prefer.
http://www.makeuseof.com/tag/5-ways-strip-formatting-copy-paste-text/
As an ex Facebook Employee, here are the things that you need to do:
Retrieve the hotmail account... this is obvious, if it's not possible, though...
You can still retrieve your facebook account though: http://www.makeuseof.com/tag/recover-facebook-account-longer-log/
After doing that, lock down the account hardcore:
Account Settings -> Security
This means that you will get an SMS on new logns to the account, and if the device is not recognized it will require an SMS authentication as well.
>Web of Trust
Just stop using it.
http://www.pcworld.com/article/3139814/software/web-of-trust-browser-extensions-yanked-after-proving-untrustworthy.html
http://lifehacker.com/web-of-trust-sells-your-browsing-history-uninstall-it-1788667989
http://www.makeuseof.com/tag/uninstall-web-of-trust-right-now/
Yes, they are. You, as well as everyone else on the planet who has talked to a Facebook user, have a "shadow profile."
> How Can Facebook Have A Shadow Profile For Me? ...[A]ll you need is one friend to search for friends using their email account or one friend to install an app on their phone. There’s your Facebook shadow profile with your phone number and email addresses kept together to identify you later... If you have a Facebook account using your email or phone number, they will be linked together with information Facebook already has about you... Facebook says they don’t collect information about non-users. Do we believe that? Not really.
I really recommend reading the article (or another article on the Internet about it if you don't like the website.)
Also for more reasons to dislike Facebook see: https://www.reddit.com/r/AntiFacebook/wiki/index
Also, if you want to create more RSS feeds to add (so many of these sites don't have proper unique contributor feeds), here's how to use Kimono to do that.
Not trying to be super self-promoting, but I see a lot of people talking about other SMS-and-PC apps. I recently did a writeup on some big names and compared them, so if you're interested, give it a look and let me know what you think!
http://www.makeuseof.com/tag/send-text-messages-pc-best-services-compared/
They've also done some stuff in the name of security that really, really make things difficult for developers and hackers (of the good variety).
I was trying to install some unsigned drivers for a SDR device, couldn't do it without going through a long, involved, undiscoverable process. You need to go through this process every time you update the driver, which is still in development and updated often.
http://www.makeuseof.com/tag/how-can-i-install-hardware-with-unsigned-drivers-in-windows-8/
I eventually gave up and just ended up going back to another Windows 7 machine to play with anything experimental.
To any future RPDR prospect drag queens who lurk these threads to read about themselves being talked about, I hope hookers all know that there are multiple ways to automate your social media accounts when you're away from it. You're welcome.
I disagree. It's way over-engineered. He could make do with 1 arduino, a clock module, a dimmer setup, and some simple code. This would reduce the price by like 50%
Mobile games on Android, and to a lesser extend iOS, already have a stupidly high piracy rate. It's far worse than PC game piracy ever was. Looking at the landscape, it's hard for me to blame Nintendo here, honestly. Most people just don't want to pay for apps for the phones they paid hundreds of dollars for.
http://www.makeuseof.com/tag/piracy-android-how-bad-is-it-really/ (just one source, but there's a lot more)
No need to imagine - in last quarter of 2015 it's happened a number of times with Chinese laptops with preinstalled Windows.
ie: http://www.makeuseof.com/tag/now-three-pre-installed-malwares-lenovo-laptops/
It is possible, even trivial for your employer - or someone outside to be using the machine as a recorder without your direct knowledge.
HowToGeek on disabling webcams ; poorly written article on WebCam spying ; Tinfoil hats actually get most of it right with FBI using webcams for surveillance ... and more you could look up.
"Skype" is just one piece of software that can access the microphone & camera. It could be that someone has co-opted that program , or any of dozens of other programs could be there.
If you are concerned about this, take steps to actively block or disable the machine (unplug it from power and network), or the parts (cover, unplug the parts).. and get a 'white noise' generator to cover your conversations.
Also, "sleep" is not "off". There still needs to be power in the machine in order to keep certain devices from totally powering off, and to allow that quick resume. Don't use sleep mode unless you absolutely have to.
These guys do a good cover of it. There were other smaller forums/blogs talking about this since 2011, but these guys were the first big group that wasn't afraid to talk about it.
You do realise that any device on a network reports the IMEI once you put a SIM card in it....right? http://www.makeuseof.com/tag/phones-imei-makeuseof-explains/
Simply put, an IMEI does also say what type of device you have, so from a logistical standpoint, T-Mobile can easily tell you have a Tablet. Systems like this were the reason that AT&T was able to crack down on people on old MediaNet plans who had unlocked smartphones that they didn't put onto their plans. AT&T read what device was accessing their network and was able to update the system.
I don't mean to be impolite, but both computers and mobile phones have tools to make screenshots, which will make your image much cleaner next time:
http://windows.microsoft.com/en-us/windows-10/open-snipping-tool-and-take-a-screenshot
https://support.apple.com/en-us/HT200289
http://www.makeuseof.com/tag/6-ways-to-take-screenshots-on-android/
MacKeeper? No way.
Seriously, do not use this garbage-ware. It is utterly unnecessary and can lead to speed hits and system instability.
http://www.makeuseof.com/tag/mac-really-need-tools-like-mac-keeper/
http://www.imore.com/avoid-mackeeper
http://www.thesafemac.com/ongoing-mackeeper-fraud/
EDIT: apparently there was supposed to be sarcasm here.
shouldn't they be named this way instead?
"01 REWARD.txt"
"02 IF FOUND.txt"
"03 PLEASE CALL.txt"
"04 111-222-3333.txt"
"05 THANK YOU.txt"
Depending on the files in the main directory, I think you'd like to make sure they show up first. If it's on a camera, the files might be in a folder or they might just be named via the time/date-stamp when taken in the root folder.
Excellent tip by the way. I have my owner information on the lock screen of my phone to protect it but make it recoverable for others to find me. HowTo. For my flash drive I use: geek.menu. There's bunch of settings to tweek where you can enter owner information that displays on "unknown computers". You can also encrypt your files and do a bunch of other things. Lifehacker article on it
> so instead we a left with clever tricks to make it look good?
I mean if you even want to call that a "clever trick"... It's just 1080p in my opinion.
"optimizes all those available pixels by ‘filling in the blanks’ and stretching the image across the entire screen. It typically works using an interpolation (inferring new data by extracting from known elements) algorithm, and tells pixels what to do based on what those surrounding it are displaying, and then duplicating them."
You're not making the quality better, just filling up the rest of the screen...
Zip files work by a system of "lossless compression". Nothing in this is lost, however, the system works by the removal of redundant information.
http://www.makeuseof.com/tag/how-does-file-compression-work (This is a good article describing the concept.)
Quick explaination:
You have a file. The data represented shows:
>11111111111111111111112222222222222222222223333333333333333333 This is my text.
The set of numbers, contain repeated redundant information that can be squeezed down and represented in another format.
>1x10, 2x12, 3x11, This is my text.
This is my text. is a set of unique information, that wont need redundancy removal, so it would be left alone.
Again, no data is destroyed, simply recompiled into less redundant and more compact packages.
Sorry but the term 'build' hardly applies here. He put a TV and an NES console into a backpack, possibly with some sort of mobile energy source.
Here are some examples of people who have actually 'built' their mobile console
Edit- on second look, thats not even a NES in the backpack, looks like some sort of NES computer
Eh, good luck with that, app stores are here to stay and Windows is hardly the only desktop OS borrowing the concept from mobile: macOS' predates Windows' by a year and though Linux distros don't use the term because they don't charge for the content within package managers these days are for all intents and purposes essentially app stores.
Answered: I fixed it!!!!! Turns out it was Windows 10 Creator update. I made a new post about it. I'll copy and paste it here:
I went from being able to play PoE fine to getting 5 FPS (a whopping 19 FPS with all graphics turned way down), and I blamed PoE 3.0 for it, BUT my Windows 10 upgraded to Creator the same day I developed problems and after trying everything else, and I do mean everything, I rolled back to an earlier version of Windows 10. I'm back to 60 FPS, and everything is just dandy again.
Here's a link that will tell you how to roll it back:
http://www.makeuseof.com/tag/regret-update-windows-10-revert-version/
You can't stop Window updates anymore, so Creator may show up again, but I took the additional step of instructing Windows not to update any drivers when it loads, since that may have changed settings that caused the problems in the first place. Here's a link telling you how to do that:
https://www.cnet.com/how-to/stop-windows-10-from-automatically-updating-your-pc/
But you can perhaps take this last bit with a grain of salt. I'm no expert. It took me a week to fix this. But the roll back definitely made all the difference in the world.
I'm not saying any of this will help with the disconnects and lag people are experiencing in certain areas or maps, and with some effects and monsters. That's GGG. I'm saying I was getting 5 FPS standing still in town and this took care of that problem, and thus far I'm personally running fine again in the first few Acts.
It has been said time and again that electronic devices like your phone are literally spying on people and pushing ads based on what they hear , even though the companies all deny it.
So you're not just getting the normal number of "coincidences" that most people get with broadcast TV and radio, you're also getting the intentionally targeted stuff.
While just about no one else on this subreddit will agree with me, the fact that SOE never came out and said that SWG was to be considered freeware, it is still, technically speaking, illegal to download it if you do not already own a copy of it.
http://www.makeuseof.com/tag/what-is-abandonware-and-is-it-legal/
True. Full RAM uses the same amount of power than low RAM, and since RAM is a lot faster than the phone's flash memory, the OS and apps will try to use it to store information that they need to access regularly (a.k.a. "caching"). As soon as an app needs more RAM than what's available, the OS will automatically remove some of the cached data to make room for the app, so it doesn't harm the phone's functionality.
If you manually clear your RAM, then the cached data dissappears and apps will have to load everything from the slower flash memory, so it basically just slows down your phone.
Here are 2 articles about it, in case anyone is interested:
http://www.makeuseof.com/tag/ram-boosters-task-killers-bad-android/
There's no included free option to disable these either. Here's a way to remove them.
Edit: changed stuff
They're having ongoing business practices of pre-installed backdoors and malware. http://fortune.com/2015/12/08/lenovo-solution-center-hack/ http://www.makeuseof.com/tag/security-failings-demonstrate-avoid-lenovo/
SSDs have more blocks available than they present to the user at any one moment, for wear-levelling purposes. If you write zeros to every visible sector, there can still be gigabytes of your private data left alone in sectors the drive had rotated out for wear-levelling. These can then be read out by an attacker by rewriting the wear-levelling map, or by connecting to the storage chips directly (bypassing the controller).
Many SSDs have special erase commands available which should erase all data, including spare blocks, but it's hard to verify the correct operation of these.
http://www.makeuseof.com/tag/securely-erase-ssd-without-destroying/
You're making an awful lot of assumptions. You're assuming that everybody online only ever interacts with each other once; that somebody's screenname isn't susceptible to the same repeated attacks that somebody's real identity is; that people online don't hold their online personae as dear as their real-world social personae. And most importantly, you're assuming that "free speech" and its use on the anonymous internet is limited to just verbal insult rather than, say, the dissemination of personal information (including financial, geographical, social, psychological, etc.), the widespread and easily-publicized dissemination of somebody's pictures, the release of passwords, the sharing of intellectual property. There are so many new and wonderful ways to hurt somebody in front of large audiences- all made possible by modern technology.
But if I take all of your premises at face value, I'd still disagree. I think it depends on the person. On either end. If somebody is good enough with words, or suggests something damaging in a way that tricks a stranger into taking their advice, that's incredibly dangerous. If somebody on the receiving end is particularly vulnerable, either emotionally or intellectually, they can take the same damage from words from a stranger online as they would in real life. Words are really, really powerful.
Read their privacy statements to get some loose idea as to what data they are collecting, and what they are doing with it. By looking at when you toggle lights, they can infer when you go on vacation and that you tend to stay out late on thursday nights. This can be coupled with the location and usage info they're gathering from their mobile app you may run, and you can easily build up a rather valuable collection of info. Advertisers pay good money for this, for example.
Then there's the malicious use of info.. would-be burglars who happen to have access to this data, either legitimately by being employees or illegally by compromising the incredible weak security practices that these companies tend to deploy, can tell when you are home or not, and use that information however they want. Same goes for stalkers, bullies, etc. You may think you don't have to worry about this, but other people do, and by using/paying for these services you encourage their proliferation which can harm folks who would benefit from not spewing personal info all over the internet.
You might say "that's all hypothetical, hatperigee", to which I would respond: nope, it's real. People collect this data for a variety of reasons, whether you agree with it or not. You can strongly disagree by refusing to use services that insist on being the gatekeeper for your personal usage information.
No CMYK support. It's useless if you want to print anything. The UI isn't as good. If you're going to learn to use one program, why not learn photoshop? The tools and filters aren't as good.
See here for a list.
Also, they've been working on their next generation engine GEGL for 17 years now. It was added to the development version 11 years ago. It's supposed to bring all the new functionalities that are missing, but it seems stuck in a black hole of never-ending development.
put a totally white background and search for dark pixels, do the same with a totally black one looking for bright pixels...
you can use one of these tools to calibrate the monitor
http://www.makeuseof.com/tag/5-online-tools-calibrate-monitor/
I didn't care for it. This article covers it nicely, but long story short:
It's possible that your computer isn't compatible, for some reason. You might find an answer here: http://superuser.com/questions/922441/why-don-t-i-have-the-get-windows-10-icon or http://www.makeuseof.com/tag/windows-10-upgrade-notification-enable/
FYI you can do this without DDG in Firefox or Chrome.
For Firefox what you want to do is add "http://www.carry.gg/na/%s" (if you are in NA) as a bookmark. Then you want to edit that bookmark and add a keyword, for example carry.
Now, whenever you type "carry feedl0rd" in your adress bar it will take you to http://www.carry.gg/na/feedl0rd
It's pretty neat, I have similar setups for subreddits (r leagueoflegends takes me to this sub) and op.gg, champion.gg and others.
For chrome you can follow this guide: http://www.makeuseof.com/tag/create-custom-search-engines-google-chrome/
Absolutely do not reformat the drive in any way shape or form. Do not write anything to it. Reformatting it again will just scramble it more. Writing to it will destroy data. Even putting it in your system to look at it can cause data to be written to it. Look at this article http://www.makeuseof.com/tag/how-to-scan-reformatted-hard-drive-to-recover-files/
Secondly, professional recovery services may not be as expensive as you think. Contact a few and get a price estimate. A friend recently had a hard drive that died and the recovery price was surprisingly affordable.
http://www.makeuseof.com/tag/easily-bypass-youtubes-regional-filter/
their video player is pretty weird though, but its actually a youtube video (incase its just weird, but still not working i gave you the above link)
Doing a quick Google on "Nexus 9 hot back behind camera" seems like I'm not the only person:
It's a dual core processor that has to work very hard at times when rendering web pages and such.
I read this in Google Speaks for a class project.
Not that this is a very credible source but you can see the same information here.
Skins used can be found here
http://www.makeuseof.com/tag/organized-desktop-rainmeter/
Also check out my actually good skin that I put time and effort into instead of stealing a gif from a website
It's a complicated matter, but let me try to break it down for you.
API is short for application programming interface, and APIs do what the name suggests: They provide interfaces for applications, so they can interact with each other, ultimately allowing the accessing person to automate something, be it pulling data from the service or pushing their own content onto it.
Essentially, person (a)'s application provides a service. Person (b) likes the service and wants to use the service in their own application. If (a)'s application has a public API, (b) can simply look up how to use it and .. well, use it. That's prone to abuse though, and thus fairly rare, especially once the services become bigger.
If it's a private API, (b) has to ask (a) for permission first. (a) then gives (b) a key which allows him to interact with the service, but (b) needs to show this key every time he does anything with the API. That way, (a) always knows who did what with their service.
For an example that's a bit easier to grasp, imagine the following: your PC is the service, and you are the person/program trying to access it - your mouse and keyboard would be the API. APIs (and interfaces in general) are simply toolsets which allow two systems to interact as simple as possible. Mouse and keyboard are called "Human Interface Devices", by the way.
I hope at this point it becomes clearer what the main problem is, if you read the OP this submission links to: The "DDoS attack" (an attack that aims to overload a server, causing it to crash and shut down) the FCC claims hit them was done via their own API, which requires such a key. They knew who "attacked" them and could have prevented it by simply revoking the key, rendering it useless. They did not do so.
Further reading:
- https://en.wikipedia.org/wiki/Application_programming_interface
- http://www.makeuseof.com/tag/api-good-technology-explained/
Ei minun mielestä ole foliohattuilua. 15v sitten kuulosti foliohattuilulta se tietojen kerääminen mikä nykyään mobiililaitteiden appsien osalta on arkipäivää.
Esimerkiksi terveystiedot ovat jo käyttäjien tietämättä aika hyvin kaupan: http://www.makeuseof.com/tag/health-apps-probably-selling-data/
Jantusen autokorjaamo voi jo kysellä työntekijän terveystietojen perään.
Identify which protocol you want to use. By and large, smart appliances speak only one built-in language, and you need to understand that compatible devices can be limited. I have a wi-fi thermostat made by Honeywell, and it will not talk to anything running the Caseta Wireless system. Read this about the different protocols:
So probably the way to go is to look at buying a hub first, and then get products that are compatible with your choice:
http://www.makeuseof.com/tag/smart-hubs-solution-going-automate-home/
Indeed it does. See the Monitor for Activity/Silence options. Here's a good article on some of it's features.
-- edit - I don't post URLS enough on R.
I maintain this is a bad idea. In order to support that kind of scale, you're going to need to throw things under the bus that you really, really want. Furthermore, while I know this is the minority opinion, I think history will bear me out on this: having a billion people in the same virtual world is a dumb idea. Being confronted by an unfiltered firehose of randoms is less valuable than having a system that's aware of your social network and can instance intelligently to reflect that social graph. Crowds aren't pleasant in real life. There's absolutely no reason you'd want to reproduce them in VR.