Tag Archives: blog

How to Spring Clean Your Digital Clutter to Protect Yourself by https://is.gd/x8RFXN

You’re using strong and unique passwords. You’re on the lookout for phishing emails. And you’ve set up two-factor authentication on every account that offers it. Basically, you’re acing Personal Cybersecurity 101.

But with new threats popping up all the time, you may be looking for other proactive steps you can take to protect yourself. Here’s an easy one: Clean up your digital junk.

from https://is.gd/x8RFXN

Selected by Galigio via Computer Borders

That Nasty Samba Vulnerability Is Now Patched in All Supported Ubuntu Releases by https://is.gd/suMzeI

that-nasty-samba-vulnerability-is-now-patched-in-all-supported-ubuntu-releases

You might have read the news this morning about a wormable code-execution bug discovered in the Samba free software re-implementation of the SMB/CIFS networking protocol, which existed in Samba for more than 7 years.

The Samba team managed to quickly patch the critical vulnerability that was discovered to affect over a hundred thousand Linux and UNIX machines running Samba, which is usually used to provide file and printing sharing services, allowing users to connect to Windows shares on a network.

The Samba 4.6.4, 4.5.10 and 4.4.14 patched versions have been released, and are available for download from the official website or via ours if you want to compile it on your GNU/Linux distribution. Canonical already patched Samba in all supported Ubuntu releases, and other GNU/Linux distributions will soon receive the patch.

from https://is.gd/suMzeI

Selected by Galigio via Computer Borders

How to build your own AI system with Google and Raspberry Pi by http://bit.ly/2rL2lEY

google-assistant-for-iphone-100723633-large

Imagine a future when you can tell your coffee machine to make coffee with the sound of your voice or tell the lights to switch on in any room of your house just by talking.

That kind of automation once required hundreds of dollars of investment in new gear, but Google is bringing that future to everyone.

The recent release of the tech company’s first open source hardware project is opening doors for ‘makers’ the world over looking to create their own voice assistants, just like Amazon’s Alexa and Apple’s Siri. Google’s Voice Kit comprises a natural language recognizer powered by a Raspberry Pi that can be paired with the Google Assistant to create your own personal Amazon Echo, all in the size of a small cube.

from http://bit.ly/2rL2lEY

Selected by Galigio via Computer Borders

Never Miss an Email Again: Gmail Notification Extension for GNOME Shell by http://bit.ly/2qvWajl

Looking for an easy way to get Gmail notifications on the GNOME desktop? Well, you needn’t look any further.

The Gmail Message Tray GNOME Extension does exactly what you want: shows you notifications of emails in the GNOME message tray (aka ‘notification centre’ aka ‘date/time indicator’).

One of the main reasons I use a desktop email client such as Thunderbird or Geary is the ability to receive notifications on the desktop as and when new email arrives.

from http://bit.ly/2qvWajl

Selected by Galigio via Computer Borders

Firefox 54: more multi-process content processes by https://is.gd/7xLhyI

firefox-multiple-content-processes

Mozilla plans to increase the number of content processes of Firefox’s multi-process architecture to four (from one) with the release of Firefox 54.

Some Firefox installations are still not eligible for Firefox’s multi-process architecture. This includes systems with accessibility tools or settings enabled. Multiple processes won’t be enabled for users with extensions either, regardless of whether those are legacy add-ons, or WebExtensions.

Mozilla ran its memory test again to determine the right number of content processes. An increase in the number of content processes for the browser always goes along with an increase in memory usage.

from https://is.gd/7xLhyI

Selected by Galigio via Computer Borders

Hands On With Google And Microsoft Authenticator Apps by https://is.gd/74oK1a

One of the primary vehicles used by bad guys to access our systems is stealing log-in credentials in order to impersonate real users. All the security processes and tools in the world are circumvented when someone has your username and password.

That’s where two-factor authentication (2FA) comes into play. 2FA works by adding another authentication challenge to the equation. It’s not just about what you know – your password, it’s also about something you have. That’s where the authenticator apps from Microsoft and Google come into play.

from https://is.gd/74oK1a

Selected by Galigio via Computer Borders

Here comes Treble: A modular base for Android by https://is.gd/aZM0QN

On the Android team, we view each dessert release as an opportunity to make Android better for our users and our ecosystem partners. One thing we’ve consistently heard from our device-maker partners is that updating existing devices to a new version of Android is incredibly time consuming and costly.

With Android O, we’ve been working very closely with device makers and silicon manufacturers to take steps toward solving this problem, and we’re excited to give you a sneak peek at Project Treble, the biggest change to the low-level system architecture of Android to date.

from https://is.gd/aZM0QN

Selected by Galigio via Computer Borders