03 December 2015

Tired of those "Update to Windows 10" pop-ups? Try this.

How to Get Rid of Windows 10 Upgrade Notification in Windows 7 & 8

Written by Christian Cawley
June 15, 2015

Windows 10 is coming, and don’t you know it!? If it isn’t in your email inbox (thanks Microsoft), in your news feed, a reminder on Twitter and Facebook or on the news, it’s there, on your desktop.

Microsoft’s popup reminder about Windows 10 is an aggressive marketing campaign that has the signs of a malware infection, and while the get Windows 10 message is not a virus it is certainly annoying.

So much so that it inspired one developer to release a tool to remove Windows 10 upgrade notifications.

Why Is Windows 10 Being Pushed So Hard?

Before we take a look at how you can get rid of the Windows 10 notification, let’s take a step back for a moment. Windows 10 is coming, that much we know. But why is Microsoft promoting its future operating system so heavily to its existing users?

Read the rest of the article...

30 November 2015

Avast & Avira Appear to be Good Windows 8 Antivirus Options / Avast y Avira parecen ser buenas opciones de antivirus en Windows 8

According to tests run by these magazines - http://www.evernote.com/l/AFxIouw0q8xNqoQDqsr2tKRc3yomhr3qVCY/ - there is a variety of good options for free antivirus. I was looking only for Avira, Avast, and NOD 32.

Avira and Avast consistently receive high marks, so I suspect that both are solid choices.

NOD 32 did not appear in any of the comparisons I found, so I can't say whether it's good or bad.

Según las pruebas hechos por estas varias revistas -- http://www.evernote.com/l/AFxIouw0q8xNqoQDqsr2tKRc3yomhr3qVCY/ -- hay un surtido de buenas opciones para antivirus gratis. Estuve buscando sólo para Avira, Avast, y NOD 32.

Avira y Avast consistentemente reciben calficaciones altas, entonces me imagino que ambos son buenas opciones.

NOD 32 no apareció en ningunos de las comparaciones que encontré, entonces no puedo decir si es bueno o malo.

19 August 2015

Microsoft issues emergency patch for all versions of Windows

This is the second "critical" out-of-band patch issued in as many months.

By Zack Whittaker for Zero Day | August 18, 2015
Source: ZDNet

It's all Internet Explorer's fault -- again.

Microsoft has released an emergency out-of-band patch for a "critical"-rated security vulnerability, affecting all supported versions of Windows.

The software giant said in an advisory Tuesday that users visiting a specially-crafted website can lead to remote code execution on an affected machine.

The zero-day flaw (classified as CVE-2015-2502) works by exploiting a flaw in how Internet Explorer handles objects in memory. If successfully exploited, an attacker could "gain the same user rights as the current user," the advisory said. Those running administrator accounts are particularly at risk, it said.

Simply put: this flaw could allow an affected Windows machine to be taken over by an attacker.

It does not appear that the vulnerability is currently being exploited by hackers.

Microsoft's new Edge browser, which lands in Windows 10, is not affected by the vulnerability. The patch is available over Windows Update or through Microsoft's website.

Google security researcher Clement Lecigne was credited with finding the flaw.

This latest critical patch comes a week after the company's scheduled monthly roundup of security fixes were released to customers.

Whether or not, however, this sets a trend for Microsoft remains to be seen. This is the second month in a row the company has issued an out-of-band update.

Last month, just days after its usual monthly round of security updates, the software giant released an out-of-band patch for a critical flaw that, if exploited, could allow a hacker to effectively take over an affected machine.

A Microsoft spokesperson said in a statement: "Windows is the only platform with a customer commitment to investigate reported security issues, and proactively update impacted devices as soon as possible."

"We recommend customers use Windows 10 and the Microsoft Edge browser for the best protection. Today, Microsoft released Security Bulletin MS15-093 to further protect customer devices from security vulnerabilities affecting Internet Explorer. Microsoft Edge was not affected. Customers who have Windows Update enabled and applied the August Security Updates, are protected automatically," the spokesperson added.

12 August 2015

Attackers can access Dropbox, Google Drive, OneDrive files without a user's password

The so-called "man-in-the-cloud" attack is said to be a common flaw in most cloud-based file synchronization services.

By Zack Whittaker for Zero Day | August 6, 2015

Hackers don't even need your password anymore to get access to your cloud data.

Newly published research, released at the Black Hat conference in Las Vegas on Wednesday by security firm Imperva, shows how a "man-in-the-cloud" attack can grab cloud-based files -- as well as infecting users with malware -- without users even noticing.

The attack differs from traditional man-in-the-middle attacks, which rely on tapping data in transit between two servers or users, because it exploits a vulnerability in the design of many file synchronization offerings, including Google, Box, Microsoft, and Dropbox services.

This is not just an issue for consumers, but also businesses, which increasingly use cloud-based services to share sensitive customer and corporate data.

The report by Imperva, which has a research unit as well as having a commercial stake in the security space, said in some cases "recovery of the account from this type of compromise is not always feasible."


24 April 2015

Mobile-Friendly Web Pages Get Higher Ranking on Google Search

By Jaikumar Vijayan  |  Posted 2015-04-22 | eWeek.com

A Web page's mobile features will determine how highly it gets ranked in Google searches on mobile devices.

Web pages that have not been specifically optimized for viewing on smartphones, tablets and other mobile devices began receiving a lower ranking on Google Search on April 21.

The company has tweaked its search engine algorithms to include a Web page's mobile friendliness as a measure when returning results in response to search queries. Google will continue to also look at multiple other factors when considering Web page ranking.

The intent of the search query will still play a major role in the manner in which results are displayed. So even a Web page that is not ranked as being very mobile-friendly by Google could still end up being ranked highly simply by virtue of its content quality and relevancy. But mobile friendliness will be a big factor.

The change specifically affects Google searches on mobile devices in all languages globally. It does not affect desktop or laptop searches. The impact of the change will take about a week to be fully felt by Website owners.

The goal is to make it easier for mobile device users to find content that does not have to be tapped, zoomed or horizontally scrolled on their mobile device in order to read it, Google said in a blog post announcing the news.

Importantly, the new rules apply only to Web pages, not entire Websites. "For instance, if ten of your site's pages are mobile-friendly, but the rest of your pages aren't, only the ten mobile-friendly pages can be positively impacted," the company explained.

Google's decision to tweak its algorithm will likely have little impact on Website owners who have been proactive about making their site mobile-friendly, said Charles King, an analyst at Pund-IT. Mobile commerce and payment processing firms, for instance, have already embraced the fundamental changes on consumer behavior that Google is working to address with its latest change.

"However, businesses that are approaching the Internet more passively or are using their company Websites as little more than online placeholders could find themselves increasingly marginalized," King cautioned.

"It isn't unlike the dynamics of local shopping where some stores or locales become more popular, busy and profitable than established and complacent retailers," he said.

Google's new ranking system for mobile searches was expected. Several weeks ago, the company announced that June 21 would be the day when it cut over to the new system, and it has been urging Website owners to be more proactive for several months.

Over the past several weeks and months, the company has published several pointers and tips for Webmasters looking to mobile-enable their site but are unsure where to begin. The guides offer advice on a wide range of topics, such as how Website owners can customize a site that uses a content management system like Joomla, how they can customize home page and site navigation, and how to enable easier form entry on a mobile device.

Several weeks ago, Google published a list of mistakes that Website owners tend to make when serving up content to mobile devices. Included in the list are such common problems as faulty redirects, mobile-only error messages and blocked images. The company also offers Website owners an opportunity to quickly test their site to see how it measures against Google's definition of a mobile-friendly site.


20 March 2015

Swifty, app para aprender a programar en Swift, el reciente lenguaje de Apple

Fuente: http://wwwhatsnew.com/2015/03/20/swifty-app-aprender-programar-en-swift-reciente-lenguaje-apple/

Swifty es una aplicación para iPad con centenares de lecciones interactivas para aprender a programar en Swift, el lenguaje de programación que Apple lanzó el año pasado para permitir una mejor experiencia en la creación de aplicaciones para iOS y Mac OS X, incluso más cómoda que la ofrecida por Objetive C.


Aunque la misma Apple ha tratado de brindar las herramientas suficientes para dominar todo lo que el lenguaje presenta, y decenas de terceros -tan importantes como Stanford quien lanzó un curso online- han creado sus propias guías sobre el tema, Swifty es de los pocos que se vale de un entorno intuitivo, novedoso e interactivo para introducir al público general en el aprendizaje de Swift.

Y no es casualidad que sea desde un iPad donde trabaja Swifty pues, a pesar de que no es muy cómodo trabajar tecleando montones de líneas de código desde tal dispositivo, sus ilimitadas opciones han hecho posible el diseñar más de 200 lecciones interactivas en las que el usuario puede ir aprendiendo los temas generales que envuelven a Swift (desde el control de variables hasta el uso de funciones y clases) respondiendo a lo presentado en pantalla como si de un quiz se tratara.

Así pues, se brindan los conocimientos básicos sobre el lenguaje y en simultáneo se lanza al ruedo al usuario quien puede ir completando las líneas de código presentadas por la aplicación de tal manera que al responder correctamente podrá ver la ejecución del código en simultáneo y asimismo aprender. Claro, muchas características trabajan de forma predeterminada, pero al igual que cursos como los de servicios como CodeSchool -como muestra, Try R-, suelen ser tan útiles y a veces hasta superar lo conseguible mediante los típicos y aburridos recursos.

Swifty ya se encuentra en la App Store y se puede descargar de forma gratuita, eso sí, las primeras lecciones son ofrecidas también gratis -para echarle un primer vistazo- pero para “jugar” con más hará falta pagar por paquetes de ellas comprándolas dentro de la app; Sus precios oscilan entre los 0.99 y los 2.99 dólares.

Enlace: Swifty en la App StoreSitio web

24 February 2015

Lenovo devices shipped with dangerous adware

Until Superfish fix, Lenovo devices can't be trusted for secure work

Summary: Enterprise customers are said not to be affected, but millions of consumers and bring-your-own-device users are likely using compromised machines.

By Zack Whittaker | February 19, 2015 in ZDNet

Millions of Lenovo machines potentially at risk from Superfish adware (Image: CNET/CBS Interactive)
Millions of Lenovo owners are being warned to not use their desktops and laptops for "any kind of secure transaction," amid concerns that the company installed adware on their machines.

Lenovo-branded devices sold between September 2014 and January 2015 through consumer online and retail stores, like Best Buy and Amazon.com, are likely affected by the Superfish adware, which hijacks secure internet traffic.

Defcon security chief and security researcher Marc Rogers, who detailed the scope and scale of the adware problem on his blog, told ZDNet that consumers should immediately check to see if their machines are affected.

"If they are affected, they should not use their laptop for any kind of secure transactions until they are able to confirm [the adware] has been removed," he said.

As many as 16 million Lenovo desktops and notebooks shipped in the fourth calendar quarter, according to recent IDC figures and Gartner figures.

Enterprise owners, who bought the device through a business channel, are said not to be affected.


14 January 2015

Is Slack the Right Integration Tool for You? Maybe.

The following email was sent to a client who is researching project management tools. After writing it, it occurred to me that it might be helpful to others researching similar PM and collaboration tools. Feel free to chime in with comments if you have constructive information to add to the discussion, as I'm not an expert on any of the apps mentioned in this post.

Hi, J --

After sending the Slack link to you, I noticed that the list of integrations for Slack is currently more pointed at software developers than anything else, so I'm not sure if it's the right tool for a publishing concern like yours. Still, it might be appropriate.

You mentioned that you are looking at Basecamp, but that is a different kind of tool. Basecamp isfor project management, whereas Slack is meant to integrate existing tools (including Basecamp competitors Asana, Jira, and Trello) to make collaboration faster and smoother.

For project management we use Jira, an extremely powerful (and proportionately complicated) application that is geared mostly toward software and web development. I would not recommend Jira to your company, as I think it's too complicated and not designed for the kind of PM you need to do. By the same token, I believe that Basecamp is too non-developer-oriented for our company and does not provide the agile management tools that Jira does.

While Basecamp is still not on Slack's list of integrations, Jira is, which is one reason that Slack looks like an appealing app to use. If you really think you want to use Slack and you're open to consideration of PM tools other than Basecamp, Slack has existing integrations for Asana and Trello.

We used Trello before moving to Jira six months ago and were generally impressed with it. It's a very simple and effective task manager that turns what are essentially glorified to-do items into structured lists on topical boards for ease of tracking and management. It's a lot like using post-it notes on a wall to track progress, but more sophisticated. One big advantage of Trello is that it's free. The main reason we left Trello is that it was too basic for us. We needed an app designed for agile management with the ability to control task "flow" through the system in order to make sure that issues don't fall through the cracks, as sometimes happens on Trello if you have lots of tasks.

Asana is a head-to-head competitor with Basecamp that you may want to consider, if you haven't already. I recommend googling "Asana Basecamp review" to compare/contrast them.

If your mind is set on using Basecampe, there is potential for using Zapier to connect Basecamp and Slack, but be sure to research it thoroughly before you go that route. In the past I've found integrators like Zapier and IFTTT to be too rudimentary without API access to the features we really wanted to customize. IFTTT allow two apps to talk to each other, but their abilities to go deep enough into the apps to access the data you want is limited, and they proved to be insufficient for our integration needs in the past.

There is a home-grown integration called Slackcamp on Github "which finds new activity from Basecamp and posts it to a specified Slack channel." I don't know if it provides enough detailed access to the APIs to make it worthwhile, but you might want to look at it.

Finally, there is a new service in beta (by invitation only) called Cloudpipes that claims to be able to "pipe" data back and forth between the two apps. Intriguing, if it works.

Good luck with your search for a better project management system. I hope you find this information helpful.


Periods in Gmail addresses are ignored / Los puntos de direcciones de Gmail se ignoran

google logo

In the category of Good to Know

I just learned, after 8+ years as a Gmail user, that the periods in my Gmail address are superfluous, and I can log into Google accounts and receive email using the same address without the periods. For example, if my email address were john.q.public@gmail.com, I could use johnqpublic@gmail as my email address and as a log-in ID for Google services.


En la categoría de "Bueno a saber"

Me acabo de enterar, después de 8 años como usuario de Gmail, que los puntos en mi dirección de Gmail son superfluos, y yo puedo acceder a cuentas de Google y recibir correo electrónico utilizando la misma dirección sin los puntos. Por ejemplo, si mi dirección de correo electrónico fuera john.q.public@gmail.com, podría utilizar johnqpublic@gmail.com como mi dirección de correo electrónico y como un inicio de sesión de identificación para los servicios de Google.

05 January 2015

CryptSync Keeps Folders in Sync and Encrypts One of Them

Source: http://lifehacker.com/cryptsync-keeps-folders-in-sync-and-encrypts-one-of-the-1546338804/all

by MelaniePinola

Windows: Here's an incredibly clever and useful utility, particularly if you use online storage services like Google Drive or Dropbox. CryptSync syncs two folders while encrypting one of them, so you can have files that you work with and a secure backup of them at the same time.

The open source program, developed by Stefan Kung, encrypts the folder using 7-Zip, so as a bonus you get not only encryption but also compression, saving you precious drive space. As Kung describes the tool:

CryptSync works by synchronizing folder pairs. One folder is called the original folder: that's where your unencrypted files are stored and where you work with your files. The second folder of such a pair is the encrypted folder which is where the files get copied from the original folder and encrypted. The encrypted folder is usually located somewhere inside your cloud storage sync folder.
It's ideal for encrypting files and automatically syncing them to your cloud storage folders, but you could also use the program to encrypt and copy files from, say, your desktop PC to your laptop or from your computer to an external drive.

CryptSync encrypts each file individually, and you can have the filenames encrypted as well. You can also run CryptSync from the command line and specify whether or not you want changes to the encrypted files to be synced back to the source folder.

All in all, such a handy tool.

CryptSync | Stefan's Tools