Browsing Category
Guide and Tips
Platinum: The hacker group that crazy Microsoft
The Microsoft security researchers are hunting for a group of hackers who have long work against NGOs and intelligence agencies, hiding their tracks and using a feature found in some versions of Windows.
The Windows Defender Advanced…
How to convert a Word file into PDF with Mac
The Word files are the kind of documents that are created when you use the same name Microsoft Office program. This program allows you to create infinite length texts and use all types of fonts to your liking. In addition, you can change it…
How to configure an Outlook account on your Mac
Outlook is a Microsoft program, very useful for managing your mail. In addition to organizing the address book, Outlook provides a calendar and agenda of activities. It lets you mark notes and reminders, and activate a personal diary, with…
How to configure your iMac
It is the first time that you turn on your iMac. You'll want to figure out how to configure your device to start using it in the best way. With this simple guide able to understand all the steps you take to initialize your device. All…
Opera browser now with integrated free VPN
Opera 38 (Developer) introduces native support for VPN. Surfing protecting personal information (or overcoming regional restrictions) becomes possible without resorting to third-party solutions.
Browsing mode VPN (Virtual Private…
FireFox: Vulnerability can be shared between the extensions
Extensions for Firefox are not isolated: an add-on written specifically could exploit the vulnerabilities of other extensions to conduct attacks with high probability of success.
NoScript, Firebug and other popular Firefox extensions can…
Petya: New ransomware is installed on the boot record and locks the hard drive
A new ransomware is able to take root in the MBR system and prevent it from starting. To protect themselves simply run the usual procedures.
We have said many times, the ransomware are probably the moment of malware. The reason is…
USB Thief: A new invisible malware that steals information
It spreads via USB drives and has a self-protection mechanism that makes the identification extremely difficult. The Thief USB malware seems more a precision instrument that a threat broad spectrum.
Discovered by security researchers a…
How to add keyboard on iOS devices
Starting with version 5.0 of the operating system iOS can be added to the normal keyboard present in the device to factory settings, international keyboards. Version 8.0 introduces a further possibility: that you download from the App Store…
How to reset the SMC on Mac
Who owns a MAC, it can happen that I need to reset the SMC. However not everyone knows how to do in these cases. You can follow this simple guide which explains how to fix the problem in just a few steps.
We begin by explaining that the…
How to convert a video from MPG to MOV on Mac OS X
Convert video from MPG to MOV on Mac OS X is a pretty simple task that requires a few steps. MPG is one of the most popular extensions of files to MPEG-1 or MPEG-2 (computer file); QuickTime is a program that supports playback of MPG file.…
How to use an Apple Remote
Fans of modern technologies, and especially of the Apple brand, will be surely aware of the fantastic new invention of the US manufacturer. This is the Apple Remote, a remote control that can make it simpler and easier to use certain…
Android N here is how will the windowing mode in Windows style
Android N has a windowed mode in Windows style. It is not easy to turn on, there is who is able and has reported the first observations on the new interesting features.
The main functionality of Android N is native support two always-on…
Million at risk Android smartphone: New exploit for Stagefright
A recent NorthBit report highlights a new vulnerability of Stagefright, the component of the Android operating system that had been much talked about in the course of 2015, for similar security problems.
Stagefright returns to be talked…