‘The Snappening’: Snapchat images flood the internet after SnapSaved.com hack | Naked Security


How to create mapped drives in Group Policy

To create a new Mapped Drive preference item

  1. Open the Group Policy Management Console . Right-click the Group Policy object (GPO) that should contain the new preference item, and then click Edit .
  2. In the console tree under User Configuration , expand the Preferences folder, and then expand the Windows Settings folder.
  3. Right-click the Drive Maps node, point to New , and select Mapped Drive .
  4. In the New Drive Properties dialog box, select an Action for Group Policy to perform. (For more information, see “Actions” in this topic.)
  5. Enter drive map settings for Group Policy to configure or remove. (For more information, see “Drive map settings” in this topic.)
  6. Click the Common tab, configure any options, and then type your comments in the Description box. (For more information, see Configure Common Options.)
  7. Click OK . The new preference item appears in the details pane.

Automatically mute background tabs in Chrome

http://www.cnet.com/news/automatically-mute-background-tabs-in-chrome/ Automatically mute background tabs in Chrome

30+ Awesome Responsive Education WordPress Themes 2014


How to block outgoing SMTP with IPCOP

Edit the /etc/rc.d/rc.firewall.local file and add our new SMTP blocking rules. Open the file with vi or nano, then look for the line “## add your ‘start’ rules here” and put your new rules under it.


# allow smtp from some allowed ips
/sbin/iptables -A CUSTOMFORWARD -p tcp -i eth0 -s –dport 25 -j ACCEPT
# log stuff that is not the mail server
/sbin/iptables -A CUSTOMFORWARD -p tcp -i eth0 -s ! –dport 25 -j LOG –log-prefix “SMTP”
# block all other outgoing SMTP traffic
/sbin/iptables -A CUSTOMFORWARD -p tcp -i eth0 -s ! –dport 25 -j REJECT

Disable Firewall on users using group policy in server 2008, 2012

Computer Config > Administrative Templates > Network > Network connections > Windows Firewall > Domain Profile  > Windows Firewall: Protect all network connections = Disabled

After that go to client machine;

Start > Run > CMD > Gpupdate /force


How To Enable Remote Desktop Via Domain Group Policy Windows Server 2012 / 2008 R2 / 2008

Open the Group Policy Management and create a new GPO, and edit.

1 – Computer Configuration > Policies > Administrative Templates > Network > Network Connections > Windows Firewall > Domain Profile > “Windows Firewall: Allow Inbound Remote Desktop Exception”

2 –  Computer Configuration > Policies > Administrative Templates > Windows Components > Remote Desktop Services > Remote Desktop Session Host > Connections > enable the policy “Allow Users to connect remotely using Remote Desktop Services” Note: this used to be  > Windows Components > Terminal Services > “Allow users to connect remotely using Terminal Services”

3 Ways Your Data Plan Gets Devoured


To deploy printers to users or computers by using Group Policy

To deploy printer connections to users or computers by using Group Policy, you must add the printer connections to a Group Policy object (GPO) as described in the procedure.

To deploy printers to users or computers by using Group Policy

  1. Open Print Management.
  2. In the left pane, click Print Servers, click the applicable print server, and click Printers.
  3. In the center pane, right-click the applicable printer, and then click Deploy with Group Policy.
  4. In the Deploy with Group Policy dialog box, click Browse, and then choose or create a new GPO for storing the printer connections.
  5. Click OK.
  6. Specify whether to deploy the printer connections to users, or to computers:
    • To deploy to groups of computers so that all users of the computers can access the printers, select the The computers that this GPO applies to (per machine) check box.
    • To deploy to groups of users so that the users can access the printers from any computer they log onto, select the The users that this GPO applies to (per user) check box.
  7. Click Add.
  8. Repeat steps 3 through 6 to add the printer connection setting to another GPO, if necessary.
  9. Click OK.

Ten CSS One-Liners to Replace Native Apps ∙ An A List Apart Blog Post


5 essential elements of a successful 404 error page | Webdesigner Depot


5 essential elements of a successful 404 error page | Webdesigner Depot


USA TODAY: Bose sues Beats for noise cancellation patent infringement

Bose sues Beats for noise cancellation patent infringement

Bose is suing recent Apple acquisition Beats Electronics claiming the headphone maker infringed on its noise cancellation patents. In a suit filed Friday in U.S. District Court in Delaware, Bose claims that Beats By Dr. Dre Studio and Studio Wireless headphones infringe on five of Bose’s patents for noise cancelling headphones Bose also filed a complaint with the U.S. International Trade Commission over the issue. In May, Apple announced that it was paying $3 billion to acquire Beats Electronics and Beats Music, the streaming music service that launched in January. It hopes to gain approval for the deal in September, CEO Tim Cook said earlier this week.


USA TODAY: Snowden: NSA snoops shared sextings, pics

Snowden: NSA snoops shared sextings, pics

Former National Security Agency contractor Edward Snowden says the analysts who monitored the texts and e-mails of millions of Americans would sometimes share intercepted nude photos and sex texts with colleagues. Snowden, in a lengthy interview with The Guardian published this weekend, said he and his colleagues sometimes doubted the ethics of what they were doing. “Many of the people searching through the haystacks (of information) were young, enlisted guys, 18 to 22 years old,” Snowden told the publication. “In the course of their daily work, they stumble across something that is completely unrelated in any sort of necessary sense – for example, an intimate nude photo of someone in a sexually compromising situation. But they’re extremely attractive. So what do they do?


Facebook, Google and others push net neutrality


USA TODAY: Got a rash? Nickel in tech devices may be cause

Got a rash? Nickel in tech devices may be cause

Some personal electronic devices including Apple’s iPad are being linked to skin rashes likely caused by an allergic reaction to nickel. A report in Pediatrics details an increase in allergic contact dermatitis, a type of skin irritation, among kids. One of the most common sources is contact with nickel, which is sometimes found in laptops and cell phones. The Pediatrics report details the case of an 11-year-old treated for allergic contact dermatitis. After doctors learned the boy had been using a first-generation iPad, they found it tested positive for nickel and advised him to use a case to limit exposure. The boy’s rash “significantly improved,” read the Pediatrics report.


Change Windows password in Remote Desktop

CTRL-ALT-END is the key combo to send a CTRL-ALT-DEL to the remote RDP desktop. Useful for changing passwords on workstations and servers remotely.

The new plague: Computer viruses that extort you

The new plague: Computer viruses that extort you

USA TODAY: FTC complaint over Facebook study

FTC complaint over Facebook study

SAN FRANCISCO — A privacy watchdog group filed a formal complaint with the Federal Trade Commission claiming Facebook broke the law when it conducted a study on the emotions of its users without their knowledge or consent. The Electronic Privacy Information Center filed the complaint on Thursday. The complaint alleges Facebook deceived users by secretly conducting a psychological experiment to explore if seeing positive or negative updates in their news feeds would sway their emotions. “At the time of the experiment, Facebook did not state in the Data Use Policy that user data would be used for research purposes. Facebook also failed to inform users that their personal information would be shared with researchers,” the complaint says.


USA TODAY: Q and A: Best way to keep passwords safe

Q and A: Best way to keep passwords safe

Q. I’m currently using an SD card to store my passwords. When I want access to a program, I plug it in and copy and paste my passwords accordingly. Is this safe? A. The short answer is no, there’s more you can do to protect your passwords. If you keep your passwords on an SD card, anyone can walk away with them. So you want to make sure they’re encrypted. A password manager like KeePass is a good way to do this. You have to put in a master password every time you want to use it, so it keeps hackers out. Of course, with a program like that you can put it on your computer and just use the SD card as a backup in case your computer is damaged.


USA TODAY: Cut cable and get sports, news and shows

Cut cable and get sports, news and shows

The Supreme Court recently dealt a huge blow to on-demand TV viewing. It ruled that a company called Aereo is breaking copyright law by retransmitting over-the-air broadcasts. If you haven’t heard of Aereo, it acts like a super digital video recorder. For a few dollars per month, you could watch any broadcast show in your area on your TV, computer or mobile gadget whenever you wanted. But now Aereo is no more. This is just another in a long string of setbacks for TV consumers. Like you, I just want to watch what I want when I want, and I don’t want to juggle five services or mortgage my house to do it. To get a better sense of the problem, let’s look at what’s currently available. We’ve got cable, satellite and over-the-air broadcasts. For online video streaming, there’s Apple’s iTunes Store, Google Play, Netflix, Hulu, Amazon Instant Video, YouTube and a dozen others.


How to set NTP on Windows Server 2012

This is all you need if you want to keep it simple. Run using PowerShell as admin:

w32tm /config /manualpeerlist:pool.ntp.org /syncfromflags:MANUAL
Stop-Service w32time
Start-Service w32time

If the machine is a VM inside Hyper-V, you have to disable time sync. Open VM settings -> Management -> Integration Services and uncheck Time Synchronization.

Hackers show how to protect your iPhone

Hackers show how to protect your iPhone

Making Internet Privacy Easy | www.clarkhoward.com


USA TODAY: Facebook’s Slingshot app is here

Facebook’s Slingshot app is here

SAN FRANCISCO — Facebook hopes its new Slingshot app will get people talking. The widely anticipated mobile app is being released today in the U.S. for iPhones and Android phones. It’s part of Mark Zuckerberg’s ambitious strategy to create a new constellation of mobile apps to compete in the smartphone era. The goal: to be at the center of every social interaction, whether that interaction takes place on Facebook or not. In the case of Slingshot, over time Facebook wants to siphon some of the growing popularity of Snapchat and appeal to teens who are glued to their phones. Slingshot lets you instantly share what you are doing with a group of friends. First you shoot a photo, short video or a selfie, add some text or an emoticom or draw on it, then “sling” it to a friend or friends.


USA TODAY: How to boost home WiFi for PCs and more

How to boost home WiFi for PCs and more

Sometimes Wi-Fi doesn’t seem to make any sense. You’re trying to connect to your home network but you’re getting a stronger signal from the neighbor’s router than your own router. Inconsistent coverage is one of Wi-Fi’s big problems. It always seems to stop just short of where you need it. Even when you do connect, the signal is spotty and unbearably slow. Fortunately, there are several tricks to boost a Wi-Fi signal. Even better, most of these tricks are free. Choose the right location Most Wi-Fi antennas are omni-directional: the signal goes every direction equally. So if you put the router along an outside wall, you’re wasting half your signal outside. In fact, many times that’s why you get such a strong signal from your neighbors. They’re making the same mistake.


Eight key features of iOS 8

Eight key features of iOS 8

Apple fans holding out hope they’d see the company’s next great gadget on Monday were disappointed. At the keynote address for the company’s annual Worldwide Developers Conference, software was king.

For owners of the 800 million iPhones, iPads and iPods that run the company’s iOS operating system, the biggest news may have been the rollout of its latest version, iOS 8.

Due to be released this fall, the new system will update lots of existing features and add some new ones. So, here’s a first look at eight key features of iOS 8….

Big changes coming to iPhone messaging

• Apple’s iOS 8 will bring big changes for how iPhone users send and receive messages

• Apple is borrowing features from popular messaging platforms like Snapchat and WhatsApp

Big changes coming to iPhone messaging

Suspicious Twitter DMs | Online Security – Consumer Reports


Apple acknowledges iMessage problems

Apple acknowledges iMessage problems

Hackers locking iPhones, demanding ransoms

Hackers locking iPhones, demanding ransoms

FCC should support an open Internet


FBI:Black shades infected over half million computers


USA TODAY: Own a tablet? Grab these 5 accessories

Own a tablet? Grab these 5 accessories

You probably love your tablet for multiple reasons: It’s thin and light; using your fingertips is intuitive; it’s fun to read e-books on it; and there’s no shortage of downloadable apps that are free or close to it. Even with all the benefits — especially compared to your aging laptop — you can still squeeze more functionality out of your slender mobile companion with a few smart accessories. Whether it’s for typing reports, extending battery life, enjoying your music or protecting your investment, here are a handful of hardware add-ons that can help you get more out of your tablet. KEYBOARD, PLEASE Mobile workers or on-the-go students who really want to travel light might consider picking up an iPad mini (from $299)and the Logitech Ultrathin Keyboard Folio ($89.99; logitech.com).


USA TODAY: How to fix pokey WiFi at home

How to fix pokey WiFi at home

Q. The WiFi in our home is so slow, it’s faster to look up things over my phone’s 3G connection. How can we speed it up? A. This question came from a relative who lives in Brooklyn, so I did some firsthand research during a visit to New York. She lives in a dense neighborhood that abounds in both gadgets and babies, which is a good combination for the future of the electronics industry and the human race but not so good for WiFi. Too many laptops, tablets and other mobile devices leads to congested WiFi airwaves. A baby boom makes that situation worse: Many baby monitors transmit over the same 2.4 Ghz frequencies used by WiFi. Microwave ovens and cordless phones can also contribute to the din in those airwaves.


Happy Mothers Day!

Happy Mothers Day to all mothers! You do a wonderful job!

NCOL Supporting Relay for Life


FREE SHIPPING with orders over $25


How to log off/sign out of Server 2012

Go to the Start “screen”, click on your user account picture/name in the upper-right hand corner of the screen, and select “Sign out”.2012logoff 


How To Give Windows Server 2012 Users a Traditional User Experience


Windows Server 2012 is here, and like many of you who have downloaded it and tested it, I have been messing around with the new operating system for a while now. I’ve been exploring new features and capabilities, some of which I like, and others I don’t care for all that much. All in all, however, I think both Windows 8 and Windows Server 2012 will be successful over time and I say that because the user experience will take some getting used to.

Once you install the new OS, many will be taken aback and will find navigating and finding old tools and utilities a bit of a challenge. I expect many administrators will be looking for a way to change the new Metro style and trade it in for the traditional Windows Start Menu. The good news is that we can tweak the user interface in Windows Server 2012 to get really close to what a Windows Server 2008 would look like, with the caveat that you will not get everything back. I think Microsoft is trying to push everyone to adopt the new interface and it will be successful over time in accomplishing this, especially if the upcoming Surface tablets takes off.

Let’s take a look at what we need to do in order to make the changes:

  1. Install the Desktop Experience
  2. Restart the Server
  3. Pin icons and useful tools and utilities to the desktop
  4. Disable Server Manager from automatically starting
Roles and features wizard
Figure 1. Roles and features wizard. (Click image to view larger version.)

Let’s tackle the Desktop Experience. First, in order to gain access to icons like My Computer, Control Panel and many of the traditional features we have been using for years (and keep in mind that when I say gain access, I mean gain access the traditional way — all the tools still exist; you simply have to learn to access them the new way), follow these steps:

  1. Launch Server Manager from the taskbar (if it is not started already) and click on Add roles and features.
  2. Go through the wizard until you get to a screen similar to Fig. 1; make sure to select Features on the left node and scroll down to User Interfaces and Infrastructure.
  3. Click the arrow to expand this feature and select Desktop Experience.
  4. Click Next and follow the wizard to completion, which will require a restart of the server.

Even a simple power operation like restart takes some getting used to, so in order to restart your server follow these steps:

  1. Hover your mouse to the top right-hand corner of the screen and select the Settings icon.
  2. Now click on the Power icon and restart the server.

Once the server comes back up, you can right-click on your desktop and click on Personalize in order to configure our icons. Select Change desktop icons and add the icons you want to your desktop.

If Server Manager is annoying you every time Windows starts and you want to prevent it from automatically starting, do the following:

  1. Launch Server Manager.
  2. On the top right menu, select Manage.
  3. Select Server Manager Properties.
  4. Check the box next to “Do not start Server Manager automatically at logon”.

At this point your desktop will look pretty close to what what you’re used to in Windows Server 2008. I recommend creating shortcuts for some of your favorite tools and utilities and adding them to the desktop. For those of you who like the simplicity of the traditional Start Menu and user interface, in future blogs I will walk through further customizations that will make Windows Server 2012 a bit more friendly.

How to max out your phone battery

How to max out your phone battery

Facebook and Google security flaw


How to store your digital photos safely


USA TODAY: 3 ways to lower your Internet bills

3 ways to lower your Internet bills

A few years ago, a cable technician was working on the lines outside my house. When I mentioned I was paying for the company’s top-tier Internet service, he snorted and said, “You can’t get that tier of service with these lines.” It was a lesson to me: We have to always be on guard in dealing with these large cable and Internet companies. (In this case, after I raised heck, the company ended up running a dedicated line to my house.) There are big legal battles in the news these days between these companies; and when there are big legal battles, it means big bucks are at stake. Let’s remember that we the customers are the ones generating those big bucks, and we have to be smart about what we’re paying and why.


Dude, where’s my car? Google Now knows – CNET


A consumer’s guide to streaming TV devices

A consumer’s guide to streaming TV devices

USA TODAY: Protect your debit card from ‘skimmers’

Protect your debit card from ‘skimmers’

Q. I’m worried about all the ATM machines running on Windows XP, and I’ve also heard about “skimmers” that can leave my debit card vulnerable. What steps can I take to protect my debit card? A. Criminals have gotten good at installing “skimmers” over the card reader on an ATM to snag your account data when you swipe your card. Then, a small camera over the ATM keypad records your pin number when you punch it in. Your best defense is to stay away from remote ATMs; get your cash from a teller or an ATM in a restricted-access foyer. You should also hold your hand over the keypad when you enter your PIN. This blocks a camera from seeing what you’re doing.


Facebook unveils anonymous login

Facebook unveils anonymous login

Facebook unveils anonymous login

Facebook unveils anonymous login

Google Releases Security Updates for Chrome

Google has released security updates to address multiple vulnerabilities in Chrome. Some of these vulnerabilities may lead to memory corruption or arbitrary code execution.

Updates available include:

  • Chrome 34.0.1847.131 for Windows and Mac.
  • Chrome 34.0.1847.132 for Linux.
  • Chrome 34.0.1847.134 for Chrome OS devices, except HP Chromebook Pavillion.

Users and administrators are encouraged to review the Google Chrome release blog entries and apply the necessary updates.