Saturday, May 20, 2017

How to Get Netflix to Stop Asking If You're 'Still Watching' | Mental Floss

How to Get Netflix to Stop Asking If You're 'Still Watching' | Mental Floss



We've all been there: You're camped out on the couch with your laptop, a cornucopia of snacks, and a silenced smartphone. You get several episodes into a full-season Netflix binge session and then ... a message pops up to ask if you're still watching. It takes five seconds to click yes, but that's five seconds you can't get back!



Use Chrome Extensions!!!



Original image



Flix Assist and Super Browse!
ACS Publications



Surface water from 38 streams nationwide was assessed using 14 target-organic methods (719 compounds).
Designed-bioactive anthropogenic contaminants (biocides, pharmaceuticals) comprised 57% of 406 organics detected at least once.
The 10 most-frequently detected anthropogenic-organics included eight pesticides (desulfinylfipronil, AMPA, chlorpyrifos, dieldrin, metolachlor, atrazine, CIAT, glyphosate) and two pharmaceuticals (caffeine, metformin) with detection frequencies ranging 66–84% of all sites.

Saturday, May 13, 2017

QuickMap of the Moon!



QuickMap

The Nearly Invisible Wires That Enclose Nearly All Major Cities of The World | Amusing Planet

eruv-string-5

The wires mark the boundary of a ritualistic enclosure called an eruv, within which observant Jews can perform certain duties that they are not allowed to outside of home, during Sabbath. These duties are often mundane, like carrying house keys, tissues, medicines, or using strollers to push babies around, but essential enough to function in life.



The Nearly Invisible Wires That Enclose Nearly All Major Cities of The World | Amusing Planet

Thursday, May 11, 2017

Beware! Built-in Keylogger Discovered In Several HP Laptop Models

Keylogger Found Pre-Installed in HP Audio Driver

According to researchers, the flawed code (CVE-2017-8360) written by HP was poorly implemented, that not just captures the special keys but also records every single key-press and store them in a human-readable file.

This log file, which is located at the public folder C:\Users\Public\MicTray.log, contains a lot of sensitive information like users' login data and passwords, which is accessible to any user or 3rd party applications installed on the computer. Therefore, a malware installed on or even a person with physical access to a PC can copy the log file and have access to all your keystrokes, extracting your sensitive data such as bank details, passwords, chat logs, and source code.

"So what's the point of a keylogger in an audio driver? Does HP deliver pre-installed spyware? Is HP itself a victim of a backdoored software that third-party vendors have developed on behalf of HP?" Modzero researchers question HP.

Beware! Built-in Keylogger Discovered In Several HP Laptop Models

Saturday, May 06, 2017

What is Proof of Work? | CryptoCompare.com

"To some people this has meant Bitcoin has lost some of its distributed charm, as its no longer run by individuals throughout the world on their personal computers. This is where Litecoin and Scrypt coins came to the fore where it was thought that there was no possibility of allowing large mining corporations to usurp network power."



What is Proof of Work? | CryptoCompare.com