Advertisement

There's no such thing as a stupid question, but they're the easiest to answer.
Login
Search
Main Menu
Tech Support Guy
  -   Welcome Guide
  -   Forums < Free Help!
  -   List Server
  -   Mobile
  -   Newsletter
  -   Rules
About Us
  -   History
  -   Recognitions
How To Help
  -   Advertise
  -   Link to Us
  -   Donate!

Tech Support Guy
Celebrating 15 Years of Tech Support Guy! Welcome to Tech Support Guy!

If you're looking for free technical support, you've found it! This site is run completely by volunteers and paid for completely by donations and sponsors. There is no charge to you (although we do appreciate donations). To get started, check out the Tech Support Guy Forums. We hope you will return frequently!

"There's no such thing as a stupid question, but they're the easiest to answer!"

What's going on around here?
Here's how it works!
First, you might want to try searching for your answer. Chances are, someone else has already had the same problem you are! If you can't find what you're looking for by searching, you can post your question in our Forums, where other users will try to answer your question.

We highly recommend that you print a copy of our:
GUIDE FOR NEW MEMBERS


Computer America Radio Show
We are proud to be the Official Tech Support Forums of the Computer America Radio Show!

You can listen to the Computer America radio show every week night nationwide on the Business TalkRadio Network, or listen live on the Internet at www.ComputerAmerica.com.
Computer America Radio Show

New World IPv6 Launch Measurements – Comcast over 30%, AT&T over 20%
Jul 24, 2014 - 10:49 PM - by ekim68
Quote:
The World IPv6 Launch measurements for July 2014 are out and among the top 10 networks in terms of volume Comcast has now crossed over the 30% mark for IPv6 deployment:
More
0 Replies | 22 Views
The 'Fingerprinting' Tracking Tool That's Virtually Impossible to Block
Jul 21, 2014 - 7:25 PM - by TechSocial
The 'Fingerprinting' Tracking Tool That's Virtually Impossible to Block

A new, extremely persistent type of online tracking is shadowing visitors to thousands of top websites.

The type of tracking, called canvas fingerprinting, works by instructing the visitor’s web browser to draw a hidden image, and was first documented in a upcoming paper by researchers at Princeton University and KU Leuven University in Belgium. Because each computer draws the image slightly differently, the images can be used to assign each user’s device a number that uniquely identifies it.

Like other tracking tools, canvas fingerprints are used to build profiles of users based on the websites they visit — profiles that shape which ads, news articles or other types of content are displayed to them.

Read More
0 Replies | 188 Views
Chrome's been eating your laptop's battery for years, but Google promises to fix it
Jul 19, 2014 - 12:01 AM - by ekim68
Quote:
Google is just now responding to a bug in Chrome for Windows that may have been sapping users' batteries for years.

Chrome's battery drain problem was brought to wider attention by Forbes contributor Ian Morris, who noticed that Chrome for Windows was using considerably more power than other browsers.

The issue, he wrote, is that Chrome doesn't return the system's processor to an idle state when it's not doing anything. Instead, Chrome sets a high “system clock tick rate” of 1 millisecond, and leaves it at that rate, even if the browser's just running the background.
More
0 Replies | 204 Views
Apple and IBM Team Up to Push iOS in the Enterprise
Jul 15, 2014 - 11:21 PM - by ekim68
Quote:
Apple and IBM today announced a broad partnership to help companies deploy wireless devices and business-specific applications to run on them.

The combination brings together two historical competitors — who decades ago struggled to dominate the nascent market for personal computers — on the next wave of computing in business: Mobile devices with access to complex data running in the cloud.
Here
1 Reply | 253 Views
Critical design flaw in Microsoft's Active Directory could allow password change
Jul 15, 2014 - 10:48 AM - by TechSocial
Microsoft’s widely used software for brokering network access has a critical design flaw, an Israeli security firm said, but Microsoft contends the issue has been long-known and defenses are in place.

Aorato used public information to craft a proof-of-concept attack that shows how an attacker can change a person’s network password, potentially allowing access to other sensitive systems, said Tal Be’ery, its vice president of research.

“The dire consequences we are discussing—that an attacker can change the password—was definitely not known,” said Be’ery in a phone interview Tuesday.

About 95 percent of Fortune 500 companies use Active Directory, making the problem “highly sensitive,” Aorato wrote on its blog.

The company’s research focuses on NTLM, an authentication protocol that Microsoft has been trying to phase out for years. All Windows versions older than Windows XP SP3 used NTLM as a default, and newer Windows versions are compatible with it in combination with its successor, Kerberos.

Read More
0 Replies | 185 Views
» Online Users: 2,959
23 members and 2,936 guests
BlessingPanther, blueridge142, Chris7631, DaveBurnett, EAFiedler, foxidrive, gjdmcwzv, gjmawkvr, gustere, joel7689, LiquidTension, marhuf, Mark1956, OBP, OneClick, osamaanjum, pcatrocity, tompatrick, TulsaRose, tutorials
Most users ever online was 16218, 08-Feb-2012 at 01:15 PM.




Google
Web TSG
Powered by vBadvanced CMPS v3.0 RC2
You Are Using: Server ID
Trusted Website Back to the Top ↑