Welcome to Atheist Discussion, a new community created by former members of The Thinking Atheist forum.

Thread Rating:
  • 0 Vote(s) - 0 Average
  • 1
  • 2
  • 3
  • 4
  • 5
The IT Thread
#51

The IT Thread
(10-08-2019, 10:45 PM)Gawdzilla Sama Wrote: Some of that was in English.

https://www.windowscentral.com/how-chang...windows-10

....
You can always use more private and reliable DNS servers, and in this guide we'll show how to change these settings on Windows 10.
...

If you use Windows and I suspect you do, here is how to set up using static DNS servers.  I suggest Cloudflare's DNS server at 1.1.1.1 which has done far better for me that ATT ever did.  Google's DNS server is 8.8.8.8 which is a good backup DNS server.
I am a sovereign citizen of the Multiverse, and I vote!


Reply
#52

The IT Thread
For any Australians out there who want to try a static DNS server set up, you may want to google for the best Australian static DNS servers. That should work better than a server on the other side of Earth.

https://www.dnsaustralia.net.au/


Fast & Secure Public DNS Servers Australia | Ultra Fast DNS Resolution | High Speed Links

Speed Up Your Internet Browsing For Free. Secure your Internet Connection With DNS Australia
Australian DNS Servers | Fastest DNS Servers In Australia With Content Filtering & DNS Firewall.
Recursive DNS Servers
I am a sovereign citizen of the Multiverse, and I vote!


The following 1 user Likes Cheerful Charlie's post:
  • SYZ
Reply
#53

The IT Thread
A new COVID-19-themed malware has been reported as spreading through Emails.

Microsoft says the email contains an Office file that uses the aging Excel 4.0 macros,
which—in turn—deploy, when opened, a remote access tool named NetSupport Manager.
Both are legitimate tools redeployed by hackers to fulfill different malicious goals.

The emails purport to come from The Johns Hopkins Coronavirus Resource Center
bearing the header "WHO COVID-19 SITUATION REPORT".

The Excel files open w/ security warning and show a graph of supposed coronavirus
cases in the US. If allowed to run, the malicious Excel 4.0 macro downloads and runs
NetSupport Manager RAT.

Once the NetSupport Manager RAT is deployed, further files are downloaded, including
a few .dll, .ini, and other .exe files, a VBScript, and an obfuscated PowerSploit-based
PowerShell script. When the procedure is complete, it connects to a Command and Control
center to await further commands.
I'm a creationist;   I believe that man created God.
Reply
#54

The IT Thread
nevermind
2+2=4
The following 1 user Likes leerob's post:
  • skyking
Reply
#55

The IT Thread
Lately I've been having an issue with PostImage.

When taking a screenshot, the boundaries of the image region you select sometimes shift
when you download them.  They often move inwardly so that a part of the chosen image is
cropped out, and seems to be happening randomly from image to image.

My posting today about David Wanker clearly shows this at the right-hand edge, and the lower edge.

Any thoughts?  Anybody else here use PostImage, or is there better image capture software?

Huh
I'm a creationist;   I believe that man created God.
Reply
#56

The IT Thread
I use Postimage, but I hadn't encountered that. Is it happening when you take the screenshot or when you post it to Postimage? I wasn't aware Postimage was involved in screenshots.
[Image: sea-stones-whimsy-7-sm.jpg]
Reply
#57

The IT Thread
I'm not concerned about this spyware.  No way it can corrupt my phone.

[Image: E6rd0KlVUA0YxUk?format=jpg&name=medium]

A major journalistic investigation has found evidence of malicious software being used by
governments around the world, including allegations of spying on prominent individuals.
Reports thus far allude to a surveillance effort reminiscent of an Orwellian nightmare, in
which the spyware can capture keystrokes, intercept communications, track the device
and use the camera and microphone to spy on the user.

Usually, rooting [allowing users of the Android mobile operating system to attain privileged
control  on an Android device] is done by the user to install applications and games from
non-supported app stores, or re-enable a functionality that was disabled by the manufacturer.

Illegal rooting removes the security controls embedded in an Android operating system, and
is typically a combination of configuration changes and a "hack" of core elements by the
spyware in order to run modified code.
I'm a creationist;   I believe that man created God.
The following 2 users Like SYZ's post:
  • Alan V, Dom
Reply
#58

The IT Thread
(05-16-2021, 02:35 PM)SYZ Wrote: Lately I've been having an issue with PostImage.

When taking a screenshot, the boundaries of the image region you select sometimes shift
when you download them.  They often move inwardly so that a part of the chosen image is
cropped out, and seems to be happening randomly from image to image.

My posting today about David Wanker clearly shows this at the right-hand edge, and the lower edge.

Any thoughts?  Anybody else here use PostImage, or is there better image capture software?

Huh

No problems with it here...
[Image: color%5D%5Bcolor=#333333%5D%5Bsize=small%5D%5Bfont=T...ans-Serif%5D]
The following 1 user Likes Dom's post:
  • SYZ
Reply
#59

The IT Thread
(07-22-2021, 06:48 AM)SYZ Wrote: I'm not concerned about this spyware.  No way it can corrupt my phone.

[Image: E6rd0KlVUA0YxUk?format=jpg&name=medium]

A major journalistic investigation has found evidence of malicious software being used by
governments around the world, including allegations of spying on prominent individuals.
Reports thus far allude to a surveillance effort reminiscent of an Orwellian nightmare, in
which the spyware can capture keystrokes, intercept communications, track the device
and use the camera and microphone to spy on the user.

Usually, rooting [allowing users of the Android mobile operating system to attain privileged
control  on an Android device] is done by the user to install applications and games from
non-supported app stores, or re-enable a functionality that was disabled by the manufacturer.

Illegal rooting removes the security controls embedded in an Android operating system, and
is typically a combination of configuration changes and a "hack" of core elements by the
spyware in order to run modified code.

I hardly ever use mine and it isn't synched with anything. All they will find on it is the number of the power company (I call when there is an outage), the doc, pharmacy and the like. I also don't use the number online ever for anything. Go knock yourselves out with it.
[Image: color%5D%5Bcolor=#333333%5D%5Bsize=small%5D%5Bfont=T...ans-Serif%5D]
Reply
#60

The IT Thread
(07-22-2021, 07:28 PM)Dom Wrote: I hardly ever use mine and it isn't synched with anything. All they will find on it is the number of the power company (I call when there is an outage), the doc, pharmacy and the like. I also don't use the number online ever for anything. Go knock yourselves out with it.

Yep... same here.  I'd be lucky to make one mobile call a week, and on a busy
week I might get two or three SMSs.  Mine is a so-called "seniors" phone; no
apps, no internet access, no touch screen, no Bluetooth, no nuthin' LOL.

[Image: Model302-telephone_p22.jpg]

This is the type of phone we used when I was a kid.  Was never hacked—the line's
impedance was monitored by the telco and any abnormalities such as tapping were
reported.
I'm a creationist;   I believe that man created God.
The following 2 users Like SYZ's post:
  • Cavebear, Dom
Reply
#61

The IT Thread
(07-23-2021, 05:39 AM)SYZ Wrote:
(07-22-2021, 07:28 PM)Dom Wrote: I hardly ever use mine and it isn't synched with anything. All they will find on it is the number of the power company (I call when there is an outage), the doc, pharmacy and the like. I also don't use the number online ever for anything. Go knock yourselves out with it.

Yep... same here.  I'd be lucky to make one mobile call a week, and on a busy
week I might get two or three SMSs.  Mine is a so-called "seniors" phone; no
apps, no internet access, no touch screen, no Bluetooth, no nuthin' LOL.

[Image: Model302-telephone_p22.jpg]

This is the type of phone we used when I was a kid.  Was never hacked—the line's
impedance was monitored by the telco and any abnormalities such as tapping were
reported.

And it couldn't be broken even if someone threw it across the room. LOL!
Atheist born and when I die, still an atheist... Being of sound mind and body now, I intend and expect to to die an atheist.
The following 2 users Like Cavebear's post:
  • Dom, SYZ
Reply




Users browsing this thread: 1 Guest(s)