Play multiplayer Tron in a Windows or Linux terminal window
If you copy large files from one location to another in Windows you can now play Lunar Lander in the copy dialog box.
If you prefer to play multiplayer Tron (or single-player Snake) you can do so through a Windows or Linux terminal. Microsoft gives users a choice of command-line shells, but this game runs just fine in anything including Command Prompt, PowerShell or Terminal, although you’ll need to make sure you’re running it in Administrator mode.
Distractions means 36 percent of tech workers only do the bare minimum for security at work
In a year of international events that has been dubbed a 'permacrisis', 46 percent of tech industry workers say that distractions from world events make it hard to care about their jobs.
More worrying is that 36 percent of tech industry workers say they only do the bare minimum when it comes to security at work -- compared to 11 percent of employees in other industries.
Bad bot traffic up 50 percent as fraudsters target Black Friday
New research from Kasada shows a 50 percent jump in bad bot activity during Black Friday week, with bot operators using customized open-source development tools, headless browsers, and new Solver Services to conduct their attacks at scale.
The report also shows a six times spike in automated gift card lookups this holiday shopping season, a key indicator that fraudsters are using bots to identify and steal gift card balances.
Would you bet your chocolate on preventing a breach?
While 97 percent of business leaders and security professionals say their organization is as prepared or more prepared to defend against cybersecurity attacks than they were a year ago, one in five wouldn't bet a chocolate bar that they could prevent a damaging breach.
Ivanti surveyed 6,500 executive leaders, cybersecurity professionals, and office workers to understand their perception of today's cybersecurity threats and find out how companies are preparing for future threats.
What dangerous security vulnerabilities can access control systems have?
Modern access control systems can recognize employees by their faces. This is very convenient. People do not need to wear a badge with an RFID chip around their necks all the time and use the card with every closed door. It seems that the future has come. Employees can walk around the office with their heads held high, and the doors will open by themselves.
But it turns out that many access control systems that use facial recognition technology have security vulnerabilities. In this article, you will read about the most dangerous problems.
Microsoft completely ends support for Windows 7 and Windows 8 in under a month; now really is the time to move on
It is no secret that the uptake of Windows 11 is rather slow. Microsoft may be unlikely to publicly say as much, but the company will no doubt be extremely disappointed at the number of people who have made the leap to the latest version of its operating system.
All this could change in 2023, however. There are many people and businesses who have hung on to Windows 7 or Windows 8, despite the fact that mainstream supported ended back in 2020. But when January 10, 2023 rolls around, Microsoft will no longer even offer paid-for Extended Security Updates. And with the likes of Edge and Chrome no longer supporting the aged OSes, the time really has come to switch to Windows 11.
When disaster strikes, having the proper business continuity and emergency preparedness technology can ensure enterprise resiliency within healthcare organizations
Even when a disaster or critical incident occurs, hospitals and healthcare organizations must be able to continue to provide assistance to existing patients, while also preparing for a surge of new ones. With many hospitals operating at nearly full capacity, even during periods of relative calm, business downtime of any duration will significantly impact both profitability and patient health outcomes; ensuring business continuity during any situation is critical, particularly in a times of limited resources.
While readiness for crises and critical incidents is essential for conducting resilient business operations in any industry, for healthcare providers, the stakes are higher. Threats like communicable disease outbreaks, weather disasters, and cyberattacks not only disrupt business-as-usual -- they also put individual lives and community well-being in jeopardy.
How fraudsters attack blockchain technology and how it can be prevented
The global financial crisis of 2008-09 resulted in the development of the Bitcoin whitepaper which introduced the world to the idea of blockchain technology and cryptocurrency. Within blockchain, information is stored in several databases (blocks) that are linked together chronologically through cryptographic hashes to form a distributed network (chain). Since its inception the global blockchain market is expected to hit $67.5 billion by 2026.
Within the realm of banking, financial services, and insurance (BFSI) the evolution of cryptocurrencies as an asset class for investors has furthered the commercialization of blockchain technology through decentralized finance (DeFi) services. As of 2021, there are over 6,000 cryptocurrencies being traded freely with global cryptocurrency market capitalize reaching $990 billion. Serving investors' needs are exchanges, lenders, asset managers, custodians, cross-border payment applications, and clearing & settlement houses that all benefit from the surge in blockchain use-cases.
The opportunities and risks of the metaverse
We know that not many consumers actually care about the metaverse, but that hasn't stopped tech giants investing heavily in preparing for it.
A new report from Tenable, based on a study of 1,500 professionals representing roles in cybersecurity, DevOps and IT engineering, shows 68 percent of respondents plan to do business in the metaverse within the next three years, with 23 percent having already begun initiatives in the past six months.
Budget and momentum are key to cybersecurity automation maturity -- and CISOs are feeling left behind
As cyber threats intensify and the human and financial resources available to deal with them remain limited, there is a growing need for automation in cybersecurity.
The intelligent automation of key cybersecurity processes can significantly improve an organization's posture and at the same time support under-pressure employees by reducing reliance on manual processes. But in what is a relatively new approach, how far have organizations progressed along the cybersecurity automation maturity curve and is everyone on the same journey?
Why your security strategy needs to be pre-emptive [Q&A]
As cyberattacks become more sophisticated, so traditional security techniques may no longer be up to the task of protecting systems.
What's needed is an approach that can spot the routes an attacker may use and help close them down. We spoke to Todd Carroll, CISO at CybelAngel and with over 20 years previous experience in the FBI's cyber, counter intelligence, and counter terrorism branches, to discuss the need for a pre-emptive attitude to cybersecurity and how such an approach can work.
Open Source video editor OpenShot 3.0 now available for Windows, Mac, and Linux
One of the big reasons some people don't switch to Linux is a lack of video editors. While it's true there are more video editing programs on macOS and Windows, there are some great options on Linux too, such as Kdenlive and DaVinci Resolve.
Another popular video editing application that runs on Linux is the open source OpenShot. This cross-platform video editor can run on Windows and macOS too, meaning you can try it on one of those platforms to see if it meets your needs before switching to Linux. And now, OpenShot has reached a new major milestone -- version 3.0. The developers brag that it includes over a thousand changes.
IT infrastructure challenges echo a rapidly changing digital landscape
Against a background of major macroeconomic shocks, political uncertainty, and continuing social change, businesses must adapt fast as they aim to deliver trusted value and exceptional experiences for customers, partners, and employees. In a digital world, the responsibility for driving this evolution lies largely with IT leaders as they seek to provide a technology infrastructure with the flexibility, performance, and reliability required in a fast-paced, volatile environment.
To gauge how IT decision-makers are approaching this challenge and understand the issues they are facing, WSO2 recently surveyed 200 IT decision-makers from the UK and Ireland. We found a sector that needs to overcome some significant short-term challenges, but is also aware of longer-term issues that will persist if they are not addressed. At the same time, as digital transformation continues, some of the key technologies powering it are proving harder to integrate into infrastructure than others.
To get verified on Twitter, you just need a phone number -- and between $8 and $11
Starting Monday 12 December, Twitter is relaunching Twitter Blue and giving users the opportunity to pay for the blue checkmark of verification.
Since Elon Musk took over at Twitter, the decision to open up verification to anyone willing to pay was one of the more controversial decisions. The scheme was paused last month, but now the paid-for blue tick is opening up once again. This time around, however, things are a little different, with iOS users getting a worse deal.
Transcend announces MTE250H PCIe 4.0 M.2 SSD with aluminum heatsink
Back in October, we told you about the MTE250S -- a PCIe 4.0 M.2 solid state drive from Transcend. While that SSD is fast, it is missing something that many computer users insist upon -- a heatsink. You see, heat can negatively impact both the performance and longevity of an M.2 SSD, and a heatsink can help cool it down. However, some laptops and desktops can't fit an M.2 SSD with a heatsink, so it makes sense not to include such a cooling accessory with every model.
With all of that said, Transcend has now unveiled the MTE250H, which is an all-new SSD. While it is technically a new product, the reality is, it is merely the previously announced MTE250S with a heatsink bolted on. Other than the heatsink, the MTE250S and MTE250H seem to be identical.
© 1998-2024 BetaNews, Inc. All Rights Reserved. Privacy Policy - Cookie Policy.