Day: September 13, 2022

Software

Download XMPlay – MajorGeeks

XMPlay is an audio player that supports OGG / MP3 / MP2 / MP1 / WMA / WAV / AIFF / CDA / MO3 / IT / XM / S3M / MTM / MOD / UMX audio formats, PLS / M3U / ASX / WAX / CUE playlists, and ZIP archives.

More formats are also supported via Winamp plugins if desired. When XMPlay was first released in 1998, only the XM format was supported, hence the name “XMPlay.” It includes аll thе familiar audio рlауеr fеаturеѕ. It is displayed from а slim organized UI that hаѕ multiple vіѕuаlіzаtіоnѕ available and it requires no installation – simply unZIP where you want and go.

XMPlay features 32/24-bit & multi-channel output that provides the ability to play audio the way nature intended, and you can also take advantage of supporting hardware for ultimate quality. There is Gapless output/playback of all supported formats, crossfading, interpolation & volume/pan ramping, DSP; automatic gain control (and Replaygain), nine band equalizer, reverb, and net streaming is permitted with all supported file types (including MODs and archives) can be streamed from FTP and HTTP servers like Shoutcast/Icecast/Icecast2). You can optionally write a copy to disk; FTP directories and HTML web pages can also be scanned for playable files.

XMPlay Features:

Track information:

  • Displays file/format information, messages/tags, and instrument/sample texts, open webpages from the texts

    Title formatting:

  • You decide how you want the track titles to look, title updating from ‘net streams and CUE sheets

    Library:

  • A database of your tracks, with directory monitoring, for quick and easy access to the tracks you want to play

    Saved/preset settings:

  • Save settings (DSP/etc) to be automatically used each time specific tracks or filetypes are played, save presets for quick application at any time

    Disk writing:

  • Write 8/16/24/32-bit WAV files, use external encoders
  • Read more Read More
    Software

    Download GSA Proxy Scraper – MajorGeeks

    GSA Proxy Scraper enables quick and easy proxy scraping capable of mining and testing numerous proxies.

    This type of tool can be useful in cutting down on search time as well as the costs involved in searching for a viable proxy. It quickly finds and harvests proxies from all corners of the web and will continue to generate them until you have what you need.

    You have access to a multitude of useful tools like a Port Scanner that allows GSA Proxy Scraper the power to locate proxies from places that other similar software may have been unsuccessful in finding to bolster your options for anonymity further. You also have Smart-Tagging for quickly creating custom proxy tags, which automatically filter proxies based on user-defined criteria. (like proxy must work with Youtube, Facebook, Etsy, etc.). Enjoy simple exporting and filtering configuration options that allow Google to pass proxies to a specific location like an email, FTP upload, local destination, or even a web upload. All you need to do is select the export interval and location to export the proxies, and the app will automatically manage and execute it.

    GSA Proxy Scraper Features:

  • Powerful Harvester: Built-in proxy harvester goes above and beyond the competition by having the unique ability to scrape proxies from almost any site! The proxy harvester is so powerful it can harvest proxies from sources other proxy tools can’t touch
  • Test Proxies: Automatically test newly scraped proxies against websites such as web 2.0’s, social accounts, email providers, search engines, and even your own custom URL’s
  • Smart Tags: Proxy tags allow you to easily tag/group specific types of proxies which can later be used for different tasks
  • Proxy Types: GSA Proxy Scraper currently has support for The Web, Connect, and Socks4/5 proxy types
  • Port Scanner: A powerful, multi-threaded port
  • Read more Read More
    Software

    Download PrivaZer – MajorGeeks

    Privazer is designed to help you secure your tracks after using your PC, whether at home or work, on the internet, or performing a simple download, as well as freeing up disk space. Video tutorial available.

    PrivaZer is available as an installer or a portable app.

    When you run PrivaZer the first time, you should take five minutes to do the step-by-step set up to decide what you want to be deleted. The first run will also take longer than the next time. Registry backups are created automatically and stored in a subdirectory.

    You can choose from Basic or Advanced users to assist you in getting the most from PrivaZer. There are 12 steps for Basic users and 14 steps for Advanced users.

    Categories include:

  • #Pre-analysis
  • #Traces in MFT
  • #Traces in free space
  • #Traces in USN Journal
  • #Traces in $LogFile
  • #Internet browsing
  • #Cookies, Super/Evercookies
  • #Index.dat & WebCache
  • #Messengers
  • #Windows history
  • #Registry
  • #Indexing
  • #Memory
  • #Start,JumpLists,Quick Access
  • #System
  • #Copy, burning
  • #Downloaders
  • #Video, music software
  • #Photo, web software
  • #Other software

    PrivaZer is easily one of, if not the best, drive cleaners available. Don’t believe it? Check out our video tutorial below and the comparison between CCleaner and Wise Disk Cleaner.

    Video tutorial:

    Best Drive Cleaner? CCleaner VS Wise Disk Cleaner VS PrivaZer?

    PrivaZer is free, but a Donors Version is available, giving you the latest updates first and a few additional features; however, there’s so much included that purchasing is truly optional and an excellent way to say thanks. Donations start at only $10.

    Similar:

  • How to Use Cleanup Recommendations in Windows 11
  • Best Drive Cleaner? CCleaner VS Wise Disk Cleaner VS PrivaZer
  • Use Storage to Find and Free up Space in Windows 10 & 11
  • How to Analyze Drive Space With Microsoft DiskUsage
  • How to Delete Locked or Undeletable Files or
  • Read more Read More
    Software

    How BIPOC employees are impacted by workplace digital

    Earlier this year, Loom surveyed more than 3,000 working adults in the US and UK about their experiences and opinions surrounding digital communication tools at work. The report sheds light on how these tools — from traditional email to modern video messaging — impact team connection, employee engagement, productivity, and more.

    Modern office workers want to forge genuine connections with colleagues and be seen, heard, and understood at work — regardless of whether they’re fully remote or in-person. As a McKinsey report put it earlier this year, “it’s not about the office, it’s about belonging.”

    New tools have a demonstrated ability to unlock greater visibility, improve self expression, and address pervasive communication challenges in the remote/hybrid workplace. However, it’s important to avoid lumping all employees together as a homogeneous unit. Keeping this in mind, we took a closer look at Loom’s recent ‘Building Connection in the Post-Modern Workplace’ report  data and found the ways in which BIPOC (Black, Indigenous, and people of color) employees reported different experiences with workplace communication. 

    Shouldering the added burden of (over)explaining yourself

    Ninety-one percent of all modern office workers have had their digital messages — emails, instant chat, Slack messages, etc. — misunderstood or misinterpreted by their coworkers. 

    Our data shows that these all-too-common misunderstandings feel even more prevalent for Black employees. The data revealed that Black employees are spending an average of two minutes longer than their white colleagues overthinking each of their digital communications interactions. They’re also more likely to add in extra punctuation and casual phrases (like ‘lol‘ or ‘haha‘) to clarify their tone or the intent behind their messages.

    This echoes the long-reported data and experience of Black workers receiving extra scrutiny from managers and recent data about the prevalence of implicit bias in remote workspaces.  

    Resolving

    Read more Read More
    Software

    The critical link for Airbnb, Netflix and Uber

    The modern data stack (MDS) is foundational for digital disruptors. Consider Netflix. Netflix pioneered a new business model around video as a service, but much of their success is built upon real-time streaming data.

    They’re using analytics to push highly relevant recommendations to their viewers. They’re monitoring real-time data to maintain constant visibility to network performance. They’re synchronizing their database of movies and shows with Elasticsearch to enable users to quickly and easily find what they’re looking for.

    This has to be in real time, and it has to be 100 percent accurate. Old-school extract, transform, load (ETL) is simply too slow. To fill this need, Netflix built a change data capture (CDC) tool called DBLog that captures changes in MySQL, Postgres and other data sources, then streams those changes to target data stores for search and analytics.

    Netflix required high-availability and real-time synchronization. They also needed to minimize the impact on operational databases. CDC keys off of database logs, replicating changes to target databases in the order in which they occur, so it captures changes as they happen, without locking records or otherwise bogging down the source database.

    Data is central to what Netflix does, but they’re not alone in that regard. Companies like Uber, Amazon, Airbnb and Facebook are thriving because they truly understand how to make data work to their advantage. Data management and data analytics are strategic pillars for these organizations, and CDC technology plays a central role in their ability to carry out their core missions.

    The same can be said of just about any company operating at the top of their game in today’s business environment. If you want your company to operate as an A-player, you need to modernize and master your data. Your competitors are definitely already doing it.

    Sub-Second Integration Is

    Read more Read More
    Technology Business

    Gas-powered car bans won’t work without infrastructure

    Credit: Pixabay/CC0 Public Domain

    California lawmakers have passed a measure cracking down on the future sales of new gasoline cars. The rules call for the ban of new gas-powered cars by 2035, with target guidelines to phase out the cars in increments. It is the first ban of its kind, and states nationwide are expected to enact similar policies.

    David Popp is a professor in the Public Administration and International Affairs Department in Syracuse University’s Maxwell School. Popp’s research interests are in environmental policy and the economics of technological change. Much of his research focuses on the links between environmental policy and innovation, with a particular interest in how environmental and energy policies shape the development of new technologies that may be relevant for combatting climate change.

    Popp says, “While I support efforts to increase the use of electric vehicles, I worry that an all-out ban on gasoline-powered vehicles would be going too far. Electric vehicles are great for day-to-day commutes, for example, but many consumers are still concerned about the lack of range batteries have for a family road trip. The California policy appears to provide some leeway by allowing hydrogen powered vehicles. But hydrogen vehicles are still an expensive option and fueling stations are limited.

    “Whether manufacturers will work to improve the viability of hydrogen vehicles is not clear. The cost of producing hydrogen fuel is a limiting factor, which requires investments from energy producers as well. Automakers have already committed to producing more electric vehicles. A mandate like this helps reassure them that there will be a market for these vehicles. Improvements are likely, but limits on range and charging time may be difficult technical challenges to overcome. It does appear that plug-in hybrid vehicles would be allowed under the California regulation. If so, that could provide

    Read more Read More
    Construction Industry

    Planning granted for new 160,800 sq ft warehouse on the

    The construction of a new speculative 160,800 sq ft industrial warehouse on the site of the former Weetabix factory on the Earlstrees Industrial Estate in Corby has been given the green light by councilors. 

    Copley Point Capital – on behalf of its Block Industrial program and Pembury Real Estate Ltd – submitted a planning application to North Northamptonshire Council earlier this year having purchased the eight-acre site on one of the town’s prime industrial parks.  This application has just been approved by local councilors at a planning committee meeting. 

    The demolition of the existing building is close to being completed and the construction of the new unit will commence shortly with a view to delivering a new best-in-class facility by Q3-2023.  The unit will be BREEAM Very Good rated and will feature a 12.5m minimum clear eaves height, 16-dock and two-level access doors, together with a 50m yard. 

    Copley Point Capital, Director, Nimit Oberoi, said: “We’re very pleased to have obtained planning permission for ‘Earlstree160’ just seven months after our acquisition.  This is a testament to the hard work of our team and the positive and pragmatic attitude of North Northamptonshire Council.” 

    “The development is in an excellent location where there is very little supply of new, high-specification industrial units. Earlstree 160 is best placed to help satisfy the strong demand for Grade A urban logistics and industrial space that there is for businesses operating locally, regionally and nationally.” 

    Prop-Search, Cushman & Wakefield and Potter Learoyd have been appointed as marketing agents and Richard Baker, a Director of Prop-Search, added: “We are already encouraged by the level of enquiries we have received. The appetite for ‘A’ grade warehouse space in the region remains high and this development will further support local economic growth and offer new job opportunities.” 

    Read more

    Read More
    Technology Business

    A computer scientist explains proof-of-stake for

    Credit: Pixabay/CC0 Public Domain

    Proof-of-stake is a mechanism for achieving consensus on a blockchain. Blockchain is a technology that records transactions that can’t be deleted or altered. It’s a decentralized database, or ledger, that is under no one person or organization’s control. Since no one controls the database, consensus mechanisms, such as proof-of-stake, are needed to coordinate the operation of blockchain-based systems.

    While Bitcoin popularized the technology, blockchain is now a part of many different systems, enabling interesting applications such as decentralized finance platforms and non-fungible tokens, or NFTs.

    The first widely commercialized blockchain consensus mechanism was proof-of-work, which enables users to reach consensus by solving complex mathematical problems. For solving these problems, users are commonly provided stake in the system. This process, dubbed mining, requires large amounts of computing power. Proof-of-stake is an alternative that consumes far less energy.

    At its core, blockchain technology provides three important properties:

    1. Decentralized governance and operation—the people using the system get to collectively decide how to govern and operate the system.
    2. Verifiable state—anyone using the system can validate the correctness of the system, with each user being able to ensure that the system is currently working as expected and has been since its inception.
    3. Resilience to data loss—even if some users lose their copy of system data, whether through negligence or cyberattack, that data can be recovered from other users in a verifiable manner.

    The first property, decentralized governance and operation, is the property that controls how much energy is needed to run a blockchain system.






    Proof-of-work and proof-of-stake compared.

    Voting in blockchain systems

    Blockchain systems use voting to decentralize governance and operation. While the exact mechanisms for how voting and consensus are achieved differ in each blockchain system, at a high level, blockchain systems allow each user to vote on how the

    Read more Read More
    Software

    NirLauncher – 100+ portable system utilities

    I have been using this for years. This is for power users. It is a bit tricky to install but once you get this launcher and all of the utilities installed it is awesome! It can be used to install both the NirSoft and the Microsoft Sysinternals suite of utilities. Many of these utilities will trigger security warnings but this is because the small applications are VERY powerful and could be installed by hackers and used nefariously. The warnings are there as an overabundance of caution. If you are a power user then this launcher and the utilities it supports is a MUST have program!


    Review details

    I just wish, since there are maybe 100 tiny utilities in this package, that Nir Sofer would tell us which one(s)he’s updated in him monthly dump. That said…
    In case for any reason your brain or browser doesn’t remember your credentials (brand new browser?) this is your rescue. Just know that many anti-malware programs will ID and quarantine the password stuff in this. So you better know how to whitelist inside your security programs.


    Review details

    Invaluable apps, small in size. I never knew I needed them, but now I can’t do without! False positives from virus scanners are a minor inconvenience, but you can’t make the proverbial ‘omelette without breaking a few eggs’


    Review details

    Read more Read More
    Technology Business

    Decarbonizing the energy system by 2050 could save trillions

    Credit: Pixabay/CC0 Public Domain

    Transitioning to a decarbonized energy system by around 2050 is expected to save the world at least $12 trillion, compared to continuing our current levels of fossil fuel use, according to a study by Oxford University researchers, published in the journal Joule today.

    The research shows a win-win-win scenario, in which rapidly transitioning to clean energy results in lower energy system costs than a fossil fuel system, while providing more energy to the global economy, and expanding energy access to more people around the world.

    The study’s fast transition scenario shows a realistic possible future for a fossil-free energy system by around 2050, providing 55% more energy services globally than today by ramping up solar, wind, batteries, electric vehicles, and clean fuels such as green hydrogen (made from renewable electricity).

    Lead author Dr. Rupert Way, postdoctoral researcher at Oxford’s Smith School of Enterprise and the Environment, says, “Past models, predicting high costs for transitioning to zero carbon energy, have deterred companies from investing, and made governments nervous about setting policies that will accelerate the energy transition and cut reliance on fossil fuels. But clean energy costs have fallen sharply over the last decade, much faster than those models expected.

    “Our latest research shows scaling up key green technologies will continue to drive their costs down—and the faster we go, the more we will save. Accelerating the transition to renewable energy is now the best bet not just for the planet, but for energy costs too.”

    The researchers analyzed thousands of transition cost scenarios produced by major energy models and used data on: 45 years of solar energy costs, 37 years of wind energy costs and 25 years for battery storage. They found the real cost of solar energy dropped twice as fast as the most ambitious

    Read more Read More
    Software

    Dir – multi-pane file explorer

    1. Opportunity to compare two folder structures so that it is possible to see having there latest
    2. file compare


    Review details

    This is my updated post on this utility. This utility has come a long way. It is flexible, stable, has a lot of features. I like the layout of the windows along with the tool icons per window. This may confuse people but once you poke around a little it all makes sense. Great utility and kudos on it still supporting older version of Windows 98. I still us 98 on a couple test systems and this make it easier to get things done then having to open multiple explore windows. So Thanks!!!

    I give it Two-Thumbs Up!
    Get it, use it, rate it! – Thanks again for this great program.


    Review details

    EXCELLENT program. I use it regularly. Be aware of one issue however. Within Q-Dir if you select “As default browser for all” under the “Extras”, “Q-Dir as default browser” option and then uninstall Q-Dir at a later date, it will totally mess up your program associations. You will end up with the error ” This file does not have a program associated with it for performing this action….” None of the online recommendations will work for fixing this. I found the solution. You must reinstall Q-Dir and then deselect the “As default browser for all” option as mentioned above. You can then safely remove Q-Dir. The “This file does not have…..” issue will go away.
    Read more Read More
    Software

    find files on your computer

    This application is very cool… Like it!


    Review details

    This is how you can achieve being able to navigate to a folder, and let NirSoft SearchMyFiles search that particular folder. It is faster and much better than Windows search.
    You simply go into main menu, click on Options.
    Click to enable “Explorer Context Menu”.
    That is it.
    The next time you are in Windows Explorer or Total Commander;
    place your cursor on any folder, then
    simply right click on mouse and choose SearchMyFiles from CVontext Menu.
    Nirsoft SearchMyFiles will open with that folder already input into the “Base Folders” of the Search Options window.
    You can input whatever search criteria you wish.
    The two window pane system is in fact superior.
    It lets you control search criteria in window 1 and the search results in the other window 2.
    You can press F9 to open any search result file; or choose in Options to Open File On Double Click.
    The software remembers your last Base folder and the next time you run the software, it defaults to your last used base folder.
    If you have many base folders; it remembers them too.
    Just select from a scroll list.
    Overall an excellent search software. Portable and FREE.


    Review details

    The biggest thing is to find a search too which will scan network drives. Most only look at local attached media but SearchMyFiles works without question on any drive or remote media. The interface seems busy at first but once you examine
    Read more Read More
    Technology Business

    Testimonial Videos Made Simple – Technology Business Video

    The ideal testimonial is a story about how someone like you solved a problem like yours. But good video testimonials are rare, despite their obvious value in an era of digital selling. Why? Because, however much they truly value a product or service, customers see little benefit in a not-entirely work-related project that will probably require legal department sign-off. And sales reps are reluctant to ask their customers to put in the effort needed to make a good video testimonial.

    Testimonial video “based a true story”

    Some of the best recent entertainment in film and TV has claimed to be ”based on a true story.” Viewers understand this to imply a mixture of truth, glossed-over details, and “composite” characters introduced to help to propel the story.

    If you think about it, except for the composite characters, much the same could be said of the content B2B buyers value most highly when they are researching their needs.

    Source: https://www.marketingcharts.com/cross-media-and-traditional/content-marketing-225508

    You rarely encounter an interesting character with a compelling story in any of the content types shown in the chart. Dull storytelling is one reason why most of this content takes a good deal of patience and mental work to absorb.

    Being real about business

    You can use video to turn reports, case studies, and similar content into stories people will be interested in. All you need to do is

    • develop composite characters with jobs like those in your target audience — maybe based on personas already developed by the marketing team
    • give these characters credible stories to relate

    No one will mistake animated characters for “real” people, but a competent voice actor can make your character sound credible. If what they are saying rings true, people will listen.

    This doesn’t require Disney-quality animation. Your character doesn’t need any

    Read more Read More
    Software

    Public cloud security gaps expose business critical assets

    The public cloud has been widely adopted by organizations of all sizes, but a new report from Orca Security reveals some alarming shortcomings in security.

    Among the key findings, 72 percent of organizations have at least one Amazon S3 bucket that allows public read access, and 70 percent have a Kubernetes API server that is publicly accessible.

    In addition 36 percent have unencrypted sensitive data, including secrets and PII, on their cloud assets.

    Compiled by the Orca Research Pod, the report includes key findings from analyzing cloud workload and configuration data captured from billions of cloud assets on AWS, Azure and Google Cloud scanned by the Orca Cloud Security Platform from January 1st until July 1st, 2022.

    Another significant finding is that the average attack path is only three steps away from a valuable asset, which means an attacker only needs to find three connected and exploitable weaknesses in a cloud environment to steal data or hold an organization to ransom.

    “The security of the public cloud not only depends on cloud platforms providing a safe cloud infrastructure, but also very much on the state of an organization’s workloads, configurations and identities in the cloud,” says Avi Shua, CEO and co-founder, of Orca Security. “Our latest State of the Public Cloud Security report reveals that there is still much work to be done in this area, from unpatched vulnerabilities and overly permissive identities to storage assets being left wide open. It is important to remember, however, that organizations can never fix all risks in their environment. They simply don’t have the manpower to do this. Instead, organizations should work strategically and ensure that the risks that endanger the organization’s most critical assets are always addressed first.”

    Many basic security measures such as multi-factor authentication, least-privilege permissions, encryption, strong passwords, and

    Read more Read More
    Technology Business

    As data centers proliferate, neighbors knock the noise

    In a universe of cloud computing, northern Virginia might be in a perpetual fog.

    More of the data centers that feed the cloud are clustered in the region outside the nation’s capital than anywhere else in the world.

    As cloud computing—which enables data storage and other services to be delivered over the internet—continues its exponential increase, the appetite for new data centers continues to grow. And increasingly, communities that abut the centers are complaining about their new neighbors, mostly about the noise from constantly whirring fans needed to cool the computers and servers warehoused within.

    “It’s just a constant whir at a frequency that’s obnoxious,” said Dale Browne, president of the Great Oak Homeowners Association. Residents there led a protest recently outside a nearby data center in Prince William County, newly built to support Amazon Web Services.

    Browne said he preferred the quarry that used to occupy the land over the data center. And he’s worried that the noise will only get worse in winter, when a line of trees that provides something of a buffer sheds its leaves.

    Speakers at the protest said they fear Prince William County is on the verge of joining its neighbor, Loudoun County, which is known as the data center capital of the world.

    “We are the canary in the coalmine,” Browne said.

    Northern Virginia has been a tech hub since the formation of the internet, and now hosts more data centers than the next five largest U.S. markets combined, according to the Northern Virginia Technology Council.

    Collectively, the northern Virginia data centers demand about 1,900 megawatts of power, said Josh Levi, president of the Data Center Coalition, an industry trade group. That’s roughly equivalent to the entire output of Dominion Energy’s nuclear reactors at its North Anna power plant.

    Browne and his neighbors

    Read more Read More
    Software

    DShutdown – shutdown network machines

    After reviewing this program I did not know the logic and assortment of options that needed to perform a customized shutdown. I can say that this program seems to cover them all. You can schedule it for today or in the future. You can taylor it to your needs an situation. I have tested it on a couple of machine using different options and it did the job based on my selections. Very well done!


    Review details

    I tried using DShutdown to hibernate or shut down my PC after some downloads finished. Instead, it shut down while the downloads were in progress.


    Review details

    I use this application (no install) on a few computers with no problems – just read author’s suggestions for system setup. Gives XP a quick and neat desktop shortcut for shutdown and anything thing else with no hangups, etc. Just walk away…


    Review details

    Read more Read More
    Technology Business

    Why Twitter’s former security head is testifying

    Tesla CEO Elon Musk introduces the Cybertruck at Tesla’s design studio Thursday, Nov. 21, 2019, in Hawthorne, Calif. Peiter Zatko, the former Twitter security chief who’s accused the company of negligence with privacy and security in a whistleblower complaint, will testify before Congress on Tuesday, Sept. 13, 2022. Zatko’s accusations are also playing into Musk’s battle with Twitter to get out of his $44 billion bid to buy the company. Credit: AP Photo/Ringo H.W. Chiu, File

    Peiter Zatko, the former Twitter security chief who’s accused the company of negligence with privacy and security in a whistleblower complaint, will testify before Congress on Tuesday.

    Zatko is well-respected in the cybersecurity space, which gives his complaints extra weight. But so far he has little documentary support for his claims—unlike the Facebook whistleblower, Frances Haugen, whose complaint last year included troves of internal documents from the company now called Meta.

    Zatko’s accusations are also playing into Tesla CEO Elon Musk’s battle with Twitter to get out of his $44 billion bid to buy the company. The Delaware judge overseeing that case has ruled that Musk can include new evidence related to Zatko’s allegations in the high-stakes trial set to start Oct. 17.

    Twitter calls Zatko’s description of events “a false narrative.”

    WHO IS PEITER ZATKO?

    Better known by his hacker handle “Mudge,” Zatko is a highly respected cybersecurity expert who first gained prominence in the 1990s and later worked in senior positions at the Pentagon’s Defense Advanced Research Agency and Google.

    He joined Twitter at the urging of then-CEO Jack Dorsey in late 2020, the same year the company suffered an embarrassing security breach in which hackers broke into the Twitter accounts of world leaders, celebrities and tech moguls—including Musk—in an attempt to scam their followers out of bitcoin. Zatko served as Twitter’s

    Read more Read More
    Software

    DTaskManager – enhanced task manager

    While it is definitely more advanced, setting it as default task manager does not work, at least for me. I get NO task manager at all so I warn others on Win 7 X64, in case it happens where you need task manager and nothing comes up. If this was fixed, I would give it a 5.


    Review details

    Wish it had command line or hot keys to trim RAM to all processes. If anyone knows how please share. Overall the best Task Manager replacement I have ever used.


    Review details

    I’ve relied on DTaskManager for months and liked it. Now I’m ready to find a TaskManager with more capabilities. In the description above is listed the ability to ‘batch set priorities’, I never saw anything in the program to do that. I did use the ‘optionally be configured to replace’ the regular Task Manger.


    Review details

    Read more Read More
    Technology Business

    Twitter whistleblower brings his critiques to Congress

    A screen shows the price of Twitter stock at the New York Stock Exchange, Sept. 18, 2019. Peiter Zatko, the former Twitter security chief who’s accused the company of negligence with privacy and security in a whistleblower complaint, will testify before Congress on Tuesday, Sept. 13, 2022. Credit: AP Photo/Mark Lennihan, File

    A former security chief at Twitter will appear before Congress Tuesday with alarming allegations that the social platform misled regulators about its cyber defenses and efforts to control millions of fake accounts.

    Peiter “Mudge” Zatko, a respected cybersecurity expert, will appear Tuesday before the Senate Judiciary Committee to lay out his concerns. Zatko’s claims could also affect Tesla billionaire Elon Musk’s attempt to back out of his $44 billion deal to acquire the social platform. Musk claims that Twitter has long underreported spam bots on its platform and cites that as a reason to nix the deal he struck in April.

    Zatko was the head of security for the influential platform until he was fired early this year. He filed a whistleblower complaint in July with Congress, the Justice Department, the Federal Trade Commission and the Securities and Exchange Commission. Among his most serious accusations is that Twitter violated the terms of a 2011 FTC settlement by falsely claiming that it had put stronger measures in place to protect the security and privacy of its users.

    The Judiciary Committee chairman, Illinois Democrat Sen. Dick Durbin, called Zatko’s accusations “serious business.”

    “If it’s anywhere along the lines that (he) suggested, I think it’s a matter of grave personal-privacy concern,” Durbin told reporters Monday. “The question is whether information gathered by Twitter has been used for purposes which we’re not aware of.”

    Many of Zatko’s claims are uncorroborated and appear to have little documentary support. Twitter has called Zatko’s description

    Read more Read More
    Software

    McAfee Stinger – portable anti-virus scanner

    This seems to update practically every day, taking up precious screen and mental turf. Why can’t it update itself as so many other utilities do? Or just prompt the user that an update is available? This almost spoils the Snapfiles experience.


    Review details

    Stinger may provide help, getting rid of specific malware. And the specific malware threats are listed. But beware. Setting the “GTI” sensitivity to high or very high will lead to a lot of false positives (malware you won’t see on the threat list). If you set the sensitivity to high or very high, MAKE SURE stinger is set to “report” (not “remove” or “repair”). Being a novice, I reloaded my OS on the first false positive. After a series of false positives, I decided to do a little research on how the program works and no longer use highvery high sensitivity scans.


    Review details

    Be aware that that tool scans only for a limited number of viruses and variants but it do it well. Fast but need a lot of system resources. No sufficient upgrades, so for the well-know viruses this is ok but for the rest …


    Review details

    Read more Read More
    Technology Business

    Cryptocurrency must be made less energy intensive to protect

    Credit: CC0 Public Domain

    Cryptocurrency mining must be less energy intensive to limit the impact on the climate, according to a new report from the Imperial College London Business School.

    Despite the financial benefits of cryptocurrencies, such as their potential to offer a financial system that is safe from bankruptcy or crisis, continued investment in more energy intensive cryptocurrency is likely to increase the probability of a global climate crisis, according to the report “Damage Limitation: Cryptocurrencies and Climate Change.”

    The report is authored by Carmine Russo, a visiting researcher at the Centre for Climate Finance & Investment at Imperial College Business School, who is also a Ph.D. researcher at the University of Naples Federico II.

    In the report, Russo argues that the main pollution caused by cryptocurrency is generated by its mining procedures. The majority of cryptocurrencies are mined using the Proof PoW approach, an energy intensive process that makes cryptocurrency mining environmentally unsustainable.

    The mining process is a “race” among the miners in solving complex algorithms through high performance machines to track the source of the money spent, checking for double-spending, and unlocking the new coins.

    According to Russo, only the fastest miner who can solve the puzzle receives the rewards, whilst the others are just polluters. The more powerful the machines are, the more energy they need, which increases the environmental cost. In 2021, the energy usage to mine the most popular PoW cryptocurrencies, Bitcoin (BTC) and Ethereum (ETH), was higher than the overall energy usage of the UK as well as Italy in 2020.

    Cryptocurrencies are often used as a safe haven asset—a type of investment that is expected to retain or increase in value during times of market turbulence. However, Russo warns that ignoring the environmental damage created by the mining process would be “a

    Read more Read More
    Construction Industry

    Bringing life to the desert with biophilic design

    In this timely article, Bruce Kennedy,  Architect Director at BDP, talks about the use of biophilic design for the Heriot Watt campus in Dubai.

    When visitors cross the threshold of Heriot Watt’s new university campus in Dubai, they leave behind the searing heat of the desert for climate-controlled comfort, where diffused lighting offers relief from the harsh glare of the sun.

    In such an extreme environment, where summer temperatures can reach 50C, this alone would create a sense of ease, but it is just the first in a series of subtle features and carefully considered themes that run like a green thread through every level of the campus.

    The redevelopment of a seven-storey office block overlooking the Arabian Gulf into a unified vertical campus for a Scottish university, has been realised using biophilic principles. Here, human affinity with nature has informed the orientation of learning spaces; the choice of materials for walls, floors and furniture; the flow of air, and even hanging felt screens that absorb sound and provide privacy in open-plan staff areas.

    Biophilic design has been shown to enhance wellbeing, and it’s not just about plants although, as in Heriot Watt’s Dubai Campus where interior green walls run through all levels, these can form an important part of the design. It is also about textural elements, a rich variety of patterns, the choice of natural over synthetic materials and the inclusion of ‘biomimicry,’ which in this case includes carpets that recall stone, moss and grass.

    The human brain has been programmed over millennia to detect subtle differences in the natural environment, allowing us to feel the breeze on our skin and sense the light change as the day progresses. Indoor environments, by contrast, are more static and it’s that disconnect with nature that biophilic design seeks to redress.

    Read more Read More
    Software

    Download RogueKiller – MajorGeeks

    RogueKiller is an anti-malware app for advanced users capable of removing stubborn malware based on a list of signatures and heuristic analysis. Command line version available.

    It is thus able to detect and remove a broad range of known and unknown malware. Its capabilities make it an outstanding tool to eliminate the most resistant infections, like rootkits.

    Therefore, using RogueKiller is particularly recommended for malware removal, but it can also be used to ensure the operating system’s integrity. Indeed, no risk of conflict with an existing antivirus is to be expected.

    Roguekiller is a popular and useful tool to remove some stubborn malware, but be warned; you better know what you’re doing. Malwarebytes is better suited for the home user. While many more popular tools will only scan and delete for you, this tool will show you everything it finds that is a possible problem. You need to know what to remove and what not to remove, or you could delete something you want or need. Your results may vary, but use caution and do your homework before removing anything or ask someone who is computer savvy.

    If you were looking to scan your computer to look for problems, we have plenty of free, safe alternatives like Malwarebytes, for example.

    In other words, RogueKiller is typically used by advanced users and techs.

    Similar:

  • Which Anti-Malware App Is Best and Can It Run Alongside My Antivirus
  • What’s the Best Antivirus and Is Windows Defender Good Enough?
  • How to Tell the Difference Between a Virus and a False Positive
  • What to Do When Your Norton or McAfee Antivirus Expire


  • Version History for RogueKiller:
    https://www.adlice.com/download/roguekiller/


    Limitations:
    You can list and manipulate items, but essentially the program is now crippled without purchasing a license for $32.

    Read more

    Read More
    Technology Business

    Airlines count on business travelers to keep recovery going

    People wait in a TSA line at the John F. Kennedy International Airport in New York, Tuesday, June 28, 2022. With summer vacations winding down, airlines are counting on the return of more business travelers to keep their pandemic recovery going into fall 2022. Air travel in the United States, bolstered by huge numbers of tourists, has nearly recovered to pre-pandemic levels. Business travel, however, remains about 25% to 30% below 2019 levels, according to airlines and outfits that track sales. Credit: AP Photo/Julia Nikhinson, File

    With summer vacations winding down, airlines are counting on the return of more business travelers to keep their pandemic recovery going into the fall.

    Air travel in the United States, bolstered by huge numbers of tourists, has nearly recovered to pre-pandemic levels—even topping 2019 numbers over the Labor Day weekend.

    Inflation—and especially this year’s sharp rise in airfares—raises concern about how long vacationers can afford to keep flying at their current pace. Airlines say they see no signs of a slowdown in leisure travel.

    Business travel, however, remains about 25% to 30% below 2019 levels, according to airlines and outfits that track sales.

    And it is not clear when—or if—road warriors will return to their old travel habits.

    “The whole challenge for the industry is around the return of the corporate traveler, and whether he is going to come back in enough volume and frequency that is going to help these airlines,” says John Grant, an analyst with travel-data provider OAG.

    The Global Business Travel Association recently predicted that corporate travel won’t fully return until mid-2026, 18 months later than the trade group had previously forecast.

    Business travelers generally pay higher fares, so their absence has an outsized impact on airline revenue and profit.

    Business travel is slower to return because it is more

    Read more Read More
    Construction Industry

    Reducing carbon emissions in construction and building

    In recent years there has been a focus on producing more efficient buildings that will reduce operational emissions. As it stands it is estimated that 39% of all global energy related carbon emissions comes from the built environment with 28% coming from operational emissions (ie heating, cooling and power) and the other 11% from embodied carbon emissions (from the construction of the building). 

    As the population of the world quickly approaches 10bn, the global building stock is expected to double in size. 

    But now, we are starting to see a coordinated action to tackle embodied carbon, with the World Green Building Council promoting a bold new vision: 

    • by 2030, all new builds, infrastructure and renovations will have at least 40% less embodied carbon, and all new buildings should be net zero operational carbon, and;
    • by 2050, new buildings, infrastructure and renovations will have net zero embodied carbon and all buildings, including existing buildings, must be zero operational carbon. 

    Closer to home, to help meet embodied carbon benchmarks, there is increasing pressure for London’s large scale projects to prioritise retaining existing buildings over demolition. For example, under updated planning guidance published by London Mayor, Sadiq Khan in March 2022, as part of the London Plan: “Retention should be seen as the starting point,” and “Retaining existing built structures for reuse and retrofit, in part or as a whole, should be prioritised before considering substantial demolition, as this is typically the lowest-carbon option.” 

    Where refitting is not possible, Parliament’s Environmental Audit Committee has recommended more effective use of low-carbon building materials, including recycled steel and timber or using second-hand materials such as brick, metal, wood and even broken concrete. 

    While there is a degree of political consensus on the issue, this position is perhaps supported more strongly by the Labour Party and

    Read more Read More