Advertisement

There's no such thing as a stupid question, but they're the easiest to answer.
Login
Search
Main Menu
Tech Support Guy
  -   Welcome Guide
  -   Forums < Free Help!
  -   List Server
  -   Mobile
  -   Newsletter
  -   Rules
About Us
  -   History
  -   Recognitions
How To Help
  -   Advertise
  -   Link to Us
  -   Donate!

Tech Support Guy
Celebrating 15 Years of Tech Support Guy! Welcome to Tech Support Guy!

If you're looking for free technical support, you've found it! This site is run completely by volunteers and paid for completely by donations and sponsors. There is no charge to you (although we do appreciate donations). To get started, check out the Tech Support Guy Forums. We hope you will return frequently!

"There's no such thing as a stupid question, but they're the easiest to answer!"

What's going on around here?
Here's how it works!
First, you might want to try searching for your answer. Chances are, someone else has already had the same problem you are! If you can't find what you're looking for by searching, you can post your question in our Forums, where other users will try to answer your question.

We highly recommend that you print a copy of our:
GUIDE FOR NEW MEMBERS


Computer America Radio Show
We are proud to be the Official Tech Support Forums of the Computer America Radio Show!

You can listen to the Computer America radio show every week night nationwide on the Business TalkRadio Network, or listen live on the Internet at www.ComputerAmerica.com.
Computer America Radio Show

New mobile-malware detection technique uses gestures
Mar 28, 2015 - 8:52 PM - by TechSocial
TechSocial's Avatar Mobile malware is a growing problem, but researchers from University of Alabama at Birmingham have figured out a new way of detecting when shady mobile apps get up to no good, such as trying to call premium-rate numbers unbeknowst to a phone’s owner.
The technique relies on using the phone’s motion, position and ambient sensors to learn the gestures that users typically make when they initiate phone calls, take pictures or use the phone’s NFC reader to scan credit cards.
Some mobile malware programs already abuse these services and security researchers expect their number will only increase.


Read More
0 Replies | 75 Views
Toshiba Develops World's First 48-layer BiCS (Three Dimensional Stacked Structure Fla
Mar 27, 2015 - 11:19 AM - by ekim68
Quote:
TOKYO-Toshiba Corporation (TOKYO: 6502) today announced development of the world’s first 48-layer*1 three dimensional stacked cell structure flash memory*2 called BiCS, a 2-bit-per-cell 128-gigabit (16 gigabytes) device. Sample shipments of products using the new process technology start today.
More
0 Replies | 65 Views
Researchers figured out how to hack computers using heat
Mar 25, 2015 - 2:40 PM - by TechSocial
TechSocial's Avatar Heat has always been a problem for computers, but now there’s more to worry about than smoking a CPU or GPU. Researchers have figured out how to hack into computers using heat.

Researchers at Ben-Gurion University have created a new piece of malware called BitWhisper. It’s not the kind of thing that organized cybercriminals would ever use to attack your home computer. BitWhisper is the kind of crazy hacking tool that you read about in a sci-fi novel — only it’s very real.

Read More
1 Reply | 104 Views
Rx av361 yamaha receiver
Mar 24, 2015 - 9:17 AM - by fragkia
hi guys i need your help please and sorry for my english.I have RX AV361 YAMAHA RECEIVER and i want to connect it with my laptop lenovo g50-30 so receiver's speakers will play the music.I want you to tell me what cable will i need and how i have to connect it.thank you guys!!!
1 Reply | 108 Views
At least 700,000 routers given to customers by ISPs are vulnerable to hacking
Mar 20, 2015 - 10:38 AM - by ekim68
Quote:
More than 700,000 ADSL routers provided to customers by ISPs around the world contain serious flaws that allow remote hackers to take control of them.

Most of the routers have a “directory traversal” flaw in a firmware component called webproc.cgi that allows hackers to extract sensitive configuration data, including administrative credentials. The flaw isn’t new and has been reported by multiple researchers since 2011 in various router models.
More
0 Replies | 183 Views
» Online Users: 1,686
21 members and 1,665 guests
BratDawg, Cernoma, chrisb1978march, chron104, crcook84, DaMaN182, DanielLim, donetao, DSTM, ekim68, geek117, hobbes105, JohnWilson, LauraMJ, norsuhaida, Phoenix1111, poochee, pvk21, rokfreelance, SazzyUK, Terryw92
Most users ever online was 16,218, 08-Feb-2012 at 12:15 PM.




Google
Web TSG
Powered by vBadvanced CMPS v3.2.3
You Are Using: Server ID
Trusted Website Back to the Top ↑