There's no such thing as a stupid question, but they're the easiest to answer.
Main Menu
Tech Support Guy
  -   Welcome Guide
  -   Forums < Free Help!
  -   List Server
  -   Mobile
  -   Newsletter
  -   Rules
About Us
  -   History
  -   Recognitions
How To Help
  -   Advertise
  -   Link to Us
  -   Donate!

Tech Support Guy
Celebrating 15 Years of Tech Support Guy! Welcome to Tech Support Guy!

If you're looking for free technical support, you've found it! This site is run completely by volunteers and paid for completely by donations and sponsors. There is no charge to you (although we do appreciate donations). To get started, check out the Tech Support Guy Forums. We hope you will return frequently!

"There's no such thing as a stupid question, but they're the easiest to answer!"

What's going on around here?
Here's how it works!
First, you might want to try searching for your answer. Chances are, someone else has already had the same problem you are! If you can't find what you're looking for by searching, you can post your question in our Forums, where other users will try to answer your question.

We highly recommend that you print a copy of our:

Computer America Radio Show
We are proud to be the Official Tech Support Forums of the Computer America Radio Show!

You can listen to the Computer America radio show every week night nationwide on the Business TalkRadio Network, or listen live on the Internet at
Computer America Radio Show

The 'Fingerprinting' Tracking Tool That's Virtually Impossible to Block
Jul 21, 2014 - 7:25 PM - by TechSocial
The 'Fingerprinting' Tracking Tool That's Virtually Impossible to Block

A new, extremely persistent type of online tracking is shadowing visitors to thousands of top websites.

The type of tracking, called canvas fingerprinting, works by instructing the visitor’s web browser to draw a hidden image, and was first documented in a upcoming paper by researchers at Princeton University and KU Leuven University in Belgium. Because each computer draws the image slightly differently, the images can be used to assign each user’s device a number that uniquely identifies it.

Like other tracking tools, canvas fingerprints are used to build profiles of users based on the websites they visit — profiles that shape which ads, news articles or other types of content are displayed to them.

Read More
0 Replies | 106 Views
Chrome's been eating your laptop's battery for years, but Google promises to fix it
Jul 19, 2014 - 12:01 AM - by ekim68
Google is just now responding to a bug in Chrome for Windows that may have been sapping users' batteries for years.

Chrome's battery drain problem was brought to wider attention by Forbes contributor Ian Morris, who noticed that Chrome for Windows was using considerably more power than other browsers.

The issue, he wrote, is that Chrome doesn't return the system's processor to an idle state when it's not doing anything. Instead, Chrome sets a high “system clock tick rate” of 1 millisecond, and leaves it at that rate, even if the browser's just running the background.
0 Replies | 180 Views
Apple and IBM Team Up to Push iOS in the Enterprise
Jul 15, 2014 - 11:21 PM - by ekim68
Apple and IBM today announced a broad partnership to help companies deploy wireless devices and business-specific applications to run on them.

The combination brings together two historical competitors — who decades ago struggled to dominate the nascent market for personal computers — on the next wave of computing in business: Mobile devices with access to complex data running in the cloud.
1 Reply | 227 Views
Critical design flaw in Microsoft's Active Directory could allow password change
Jul 15, 2014 - 10:48 AM - by TechSocial
Microsoft’s widely used software for brokering network access has a critical design flaw, an Israeli security firm said, but Microsoft contends the issue has been long-known and defenses are in place.

Aorato used public information to craft a proof-of-concept attack that shows how an attacker can change a person’s network password, potentially allowing access to other sensitive systems, said Tal Be’ery, its vice president of research.

“The dire consequences we are discussing—that an attacker can change the password—was definitely not known,” said Be’ery in a phone interview Tuesday.

About 95 percent of Fortune 500 companies use Active Directory, making the problem “highly sensitive,” Aorato wrote on its blog.

The company’s research focuses on NTLM, an authentication protocol that Microsoft has been trying to phase out for years. All Windows versions older than Windows XP SP3 used NTLM as a default, and newer Windows versions are compatible with it in combination with its successor, Kerberos.

Read More
0 Replies | 159 Views
Bell Labs celebrates net speed record over copper lines
Jul 09, 2014 - 10:55 PM - by ekim68
A team of researchers has announced it has transmitted data over traditional copper telephone lines at a record speed of 10 gigabits per second (Gbps).

Bell Labs said it used two pairs of 30m (98.4ft)-long standard phone cables to achieve the speed in its laboratory.

It suggested the tech could eventually be adapted to offer 1 Gbps in real-world uses.

That could reduce the amount of expensive fibre optic cable needed to boost internet speeds in cities.
9 Replies | 382 Views
» Online Users: 2,968
19 members and 2,949 guests
BlessingPanther, blueridge142, etaf, Evolvation, geodripp, gjdmcwzv, gjmawkvr, gjuwbipd, Golden_, hobbes105, Khazoids, knj, muds, odconnect, OneClick, PSCO2007, Searchmo, tmexyaukh
Most users ever online was 16218, 08-Feb-2012 at 01:15 PM.

Powered by vBadvanced CMPS v3.0 RC2
You Are Using: Server ID
Trusted Website Back to the Top ↑