Latest Technology News

Terminals: A remote desktop client for (almost) anyone

Windows remote desktop, VNC, telnet, SSH -- there are many ways to access a remote computer, and using them all can require a whole library of networking tools.

Fortunately, there are alternatives. The open source Terminals not only handles a lengthy list of protocols -- RDP, VNC, ISA, SSH, Telnet, RAS, HTTP, HTTPS -- but a tabbed interface means you’re able to open and manage multiple connections simultaneously.

Continue reading

How to protect yourself from the Shellshock Bash bug

A worrying new security vulnerability has muscled its way onto the Internet, and world-leading security experts are saying it's even worse than this year's Heartbleed fiasco. Called "Bash" or "Shellshock", the security flaw is inherent to a computer's shell. This is the user interface that accesses operating systems like Command Prompt, and means that many Linux, UNIX, and some BSD systems (including Apple's OS X) are vulnerable. Worryingly, the ubiquitous nature of the bug means that a large percentage of software is engaged in constant interaction with the shell. Consequently the bug can infiltrate software in a number of different ways.

So what can you do to protect yourself against this frightening new bug, and how can you avoid Shellshock? Well, the answer is basically the same as it's always been. There's no special tool or patch that'll keep you protected from Shellshock. It's just pure, common-sense cyber security.

Continue reading

European airlines to allow the use of phones during flights

European airlines to allow the use of phones during flights

The European Aviation Safety Agency (EASA) has decided that mobile phones are completely safe to use in-flight, including during take-off and landing. Previous rules required passengers to either switch off phones, or flip them into airplane mode. The EASA's latest decision does not mean that there is an automatic right of mobile use afforded to fliers, but airlines now have the option to permit handset use on their flights. So if you've splashed out on an iPhone 6, bendy or otherwise, you can show it off to your fellow fliers.

While airplane mode blocks the ability to send and receive calls and messages, many passengers have found that they are asked to switch off entirely and refrain from using their handset in any way. The new ruling will arm passengers with more ammunition if they want to argue their case, but it's likely that many European flights will quickly bow to popular demand and permit the use of phones.

Continue reading

Thom Yorke of Radiohead releases new album as BitTorrent Bundle

As someone who was in high school during the 90s, alternative rock was a very important part of my life. Bands such as Nirvana and Smashing Pumpkins made big impacts, but Radiohead was the true soundtrack to many of our lives. Whether you were depressed, or just wanted to emote, their music was sure to help, as it conjured emotions from the soul.

The frontman of Radiohead, Thom Yorke, released his debut solo album, The Eraser, in 2006, and it was just as magical as his prior group efforts. Since then, fans have been eagerly awaiting a new album from the artist. Today, BitTorrent announces that his new album is being released digitally as an exclusive paid torrent "Bundle".

Continue reading

Best Windows 8 apps this week

One-Hundredth in a series.  Welcome to this week's selection of the best apps and games that were published to Microsoft's Windows Store.

This week saw some strong releases, mostly games though, such as the excellent strategy game Cloud Raiders, the car game Asphalt Overdrive or the football game Fifa 15: UT.

Continue reading

Shellshock bug is bad and could take years to eradicate say experts

Ever since yesterday’s news of the Shellshock Bash bug broke cyber security experts have been lining up to make clear how bad it really is.

Unlike Heartbleed, which affected mainly servers, Shellshock leaves a whole host of systems vulnerable including Apple OSX systems and many internet of things devices with embedded code that’s based on Unix or Linux.

Continue reading

Want a free Samsung Galaxy Note 8? Here's how

Want a free Samsung Note 8? Here's how...

There are lot of ways to get your hands on a free tablet -- stick it on your birthday wishlist, win one in a competition, steal one. But there's also another option: get yourself to university. At least this is a path to a free tablet -- a Samsung Galaxy Note 8 specifically -- if you happen to be a first year student at the University of East London. 4,000 students will be handed a brand new Samsung Galaxy Note 8 when they start their studies. The venture will cost the university £2 million (around $3.25 million), but the vice-chancellor thinks that it is money well-spent.

It might not be the newest tablet on the market, but few students are likely to turn their noses up at the freebie. Professor John Joughin said, "We are delighted to be putting support directly in the hands of our students and providing them with a state-of-the-art learning platform for the duration of their studies", explaining that equipping students with the tablets will create a "level playing field for all of our students".

Continue reading

What a shocker! FBI head complains about Apple and Google's encryption practices

Apple and Google do not want the US Government to be able to access your private data, even when search warrants are involved. It's a bold stand they're taking, which has been applauded by privacy advocates and, quite probably, criminals as well. But, guess what? That does not sit well with the authorities. FBI Director James Comey is troubled by the idea that the all-mighty agency that he runs can be stopped dead in its tracks when trying to see your intimate photos, videos and whatnot. Imagine that.

Here's what the fuss is all about. If encryption is turned on, the encryption key, that is needed in order to access the data that is stored on an Android or iOS 8 device, is in the user's control, instead of Google's or Apple's. As such, this allows the companies to be unable to comply with search warrants. It's clever: you can't give what you don't have.

Continue reading

Private cloud deployments lead to better quality of enterprise IT

Private secure cloud

According to an IDG survey commissioned by information management specialist CommVault, private cloud adoption can lead to better IT services, greater agility and reduced risk for businesses.

In order to help companies make the most of these advantages CommVault is introducing a Private Cloud Services Design product that means customers can build a service-centric approach for data management supporting the private cloud in approximately six weeks.

Continue reading

Apple tests the iPhone 6's durability using Windows XP

Apple has been under fire this week over claims that the iPhone 6 and 6 Plus bend when carried around in a tight jeans pocket, or someone making a YouTube video exerts a lot of force on the device. In an effort to counter this bad press, the tech giant has announced that just nine customers (to date) have contacted Apple with a bent iPhone (out of ten million), and it even went so far as to give CNBC an exclusive look inside its testing labs.

Anyone worried about how rigorously Apple tests its phones will have been calmed by the news that the iPhone 6 was exhaustively tested 15,000 times before being released, and the video showing that Apple uses only state-of-the-art equipment when testing for endurance and durability was reassuring too. Although CNBC then tweeted a picture from the labs revealing test results being recorded on a less-than state-of-the-art Windows XP system.

Continue reading

Shellshock Bash -- What every business needs to know

A worrying new security vulnerability means that all Apple Mac computers, about half of all websites, and even internet connected home appliances are all vulnerable to hackers. Security experts are saying it's even worse than this year's Heartbleed fiasco. But what is Shellshock exactly, and what does it mean for the security of your business?

Shellshock exploits a vulnerability in Bash. Bash, an acronym for Bourne Again Shell, is a command-line shell used by many UNIX computers. UNIX is an operating system on which many others are built, such as Linux and Mac OS. So if any part of your business runs on a Unix-based operating system, it could be vulnerable.

Continue reading

CCleaner's free edition gains Active System Monitoring

Piriform Ltd has released CCleaner 4.18 and CCleaner Portable 4.18, the latest versions of its popular Windows cleanup tool.

This time the big addition is a limited version of Active System Monitoring, a smart feature previously reserved for the commercial CCleaner Professional. Turn it on and CCleaner monitors your system, checking for junk, and lets you know when it’s time to clean up.

Continue reading

The Ryder Cup is the most technologically advanced golf event ever

This year's Ryder Cup in Scotland is one of the most technologically advanced golfing events, thanks to the introduction of Radio Frequency Identification Technology (RFIT).

Spectators receive a special wristband with their tickets which allows them to take part in various activities around the course, such as the BMW car display, the Ryder Cup Experience with Standard Life Investments and the 'Walk the Course' competition from Active Scotland.

Continue reading

ACDSee 18 and Pro 8 deliver smarter, easier photo editing

ACD Systems has unveiled the latest versions of its flagship photo editors, ACDSee 18 ($79.99, $39.99 upgrade) and ACDSee Pro 8 ($199.99, $59.99 upgrade).

Both editions include a new Explorer extension, PicaView, which previews an image from its context menu and launches ACDSee with a click.

Continue reading

Bye bye, Facebook. Hello, Ello?

Bye bye, Facebook. Hello, Ello?

It's very easy -- some would say fun -- to bash social networks. MySpace was a very easy target, and Twitter comes in for criticism from time to time, but it's Facebook that tends to bear the brunt of people's ire. Mark Zuckerberg's social (advertising) network hits the headlines quite frequently, but it's been on the lips of many in recent weeks after starting to aggressively implement its "real name" policy. It's something that initially upset drag artists around the world but it's also something that affecting musicians and other artists who have opted to use a stage name. In recent days another name has bubbled to the surface. It's not brand new, but Ello has been hard to avoid over the last few days. What’s going on?

It's clear that the fallout from the drag artist incident that social network users have been seeking out new homes where they are free to be whatever they want to be. This is something that Ello seems to offer. If you want to hide behind a pseudonym, adopt a different online persona, run multiple account under different names, pretend to be someone else, or just smirk at the fact you can call yourself Farty McPoopButt if you feel so inclined, you're onto a winner here.

Continue reading

© 1998-2025 BetaNews, Inc. All Rights Reserved. About Us - Privacy Policy - Cookie Policy - Sitemap.