Sometimes you try to empty a folder or delete a file only to find out you can’t because something else is using it. XKCD pictures it like this:
Sometimes you think you have everything closed yet you still get this message. You may need to restart your PC to make sure all instances that may have been previously connected to it are now disconnected. Another thing you can try is a program called LockHunter. Once it’s installed, you right click on a folder or file and you will see “What is locking this folder?” or “What is locking this file?”
After you click that, you will see what is locking the file or folder. I right clicked on a Pictures folder and clicked “What is locking this folder?” After that, this came up:
I can now find out what is locking the folder and take the actions I need to try to remove it.
Maybe you love, maybe you hate it but social media is here to stay. Many people used it as their lifeline during the past storm in Texas, known as Harvey. Many used Twitter or Facebook or Instagram to let people know they were in stuck and needed to be rescued. Still others used social media to let people know they were able to help.
The U.S. Coast Guard preferred for people to call them or 911 but people had trouble getting through. People even turned to Airbnb to offer their homes as shelters for those in need. The Hurricane Harvey Texas Rescue Facebook group offered ways to help those trapped or in need of rescue.
The Amazon and Whole Foods deal going through today is leaving its mark in a lot of different ways. Whole Foods prices are going down on a lot of items in an effort to allow more people to enjoy the benefits of organic foods. You may start seeing some Amazon devices on Whole Food shelves and Whole Food items on Amazon’s website.
Prices have been slashed on many items already. For example in New York it was reported that organic fuji apples went from $3.49/lb to $1.99/lb, avocados dropped $0.80 per lb, organic rotisserie chicken dropped $4.00/lb, and organic bananas went from $0.99 to $0.69 per lb.
The Amazon devices like Echo and Echo dot found in the Whole Foods stores are the same discounted prices found on their website right now.
The Victor crew plans to shop at one later this week and will report back any other findings.
See SpotMini run! In this TedTalk by Marc Raibert of BostonDynamics gives a demo of how far robotics have come. He talks about dynamic mobility, balance, and mobile manipulation. He has a few demonstrations on video and live to show some things they have done to meet the goals of using robots.
In one demonstration, they show some examples of what might challenge the robots if faced with some obstacles keeping them from what they are trying to do. For his live demonstration he shows the different movements of SpotMini – a dog-like robot. He shows on the screen what the dog robot is seeing and how the robot plans where and how it will step.
It is important to keep all software you use up to date. There are updates for a reason – most likely some of the code used was found to be vulnerable to attacks.
This past week, a popular extension was hijacked. The developer of the Web Developer for Chrome extension had his own account hijacked. The hijackers phished his Google account, then modified the code in his account and pushed it out to users. The version of Web Developer for Chrome that was pushed out is 0.4.9. You need to make sure you have the updated version 0.5 installed NOW!
The version the hijackers uploaded can force ads on pages, capture passwords, or other unreported problems. Consider changing passwords to pages visited during the time of the compromise. The date was August 2. The developer himself admits he fell for a phishing attack that started this. This effected over one million users.
The developer details the events in his blog. The bottom line is anyone can click on a bad link and it is important to have two-factor verification in place.
If you are looking for a password, you can check to see if the password you want to use has ever been used. Just go to the Have I Been Pwned website and look at the Passwords link. They now have a list of the passwords that have been breached. You can test your password against it and it will tell you if it’s been breached but it will also tell you it may not be a good password even if it’s not been breached.
Here is what you get if your password has been used before and found on a breach list:
So what is a bliki? The Victor crew came across this work and wondered. Well, in short terms it is a mashup of BLOG and WIKI. Blog is already a shortening of weB LOG. WIKI is a Hawaiian word meaning quick. So let’s look at all these terms.
What is a blog?
A blog is posts put on a site diary-style. People use them to report news, rant, keep journals, etc. They are quite popular. If you have a blog, you are probably the only who posts on it. Some blogs may have guest authors contributing or employees if it is a news blog. There are many popular blog softwares out there such as WordPress, Blogger, Typepad. In the case of WordPress, you can either use their blog at wordpress.com or download the software at wordpress.org and install it yourself using your own domain.
What is a wiki?
A wiki is usually run on wiki software. It generally doesn’t have just one owner or leader but rather is open to the public to edit or to a group of users to edit. This is not as carefully planned out since anyone can contribute. There may be misspellings, poor grammar, etc. Wikipedia is probably the most popular wiki. Wikis may also not be reliable as to its actual content as we are all humans and have our own opinions and experiences that may influence our contributions.
What is a bliki?
So now we come to explaining this. Some explanations are that it is a blog with wiki support, or a blog that allows others to edit and contribute. This goes beyond the usual comments only you would find on a regular blog. There are wiki plugins for WordPress.
iPhones bring many people joy. Their prices vary in different regions. They happen to be cheaper in Hong Kong than mainland China, due to taxes and levies, so people try to get them there. A woman was recently caught by customs trying to smuggle in 102 iPhones strapped to her body. She was also smuggling 15 luxury watches. The added weight came to about 44 pounds.
Unsure of what types she was carrying, if they all were the iPhone 7 Plus, she would have had over $78,438 in USD at the very least. For the full capacity iPhone 7 Plus, it would have come to $98,838 at $969 each.
It seems this is an ongoing thing in China. In January 2015, a man was arrested at customs for smuggling 94 iPhones. Just two months later in March 2015, another man was caught trying to smuggle 146 iPhones. Most people are caught with up to a dozen or so. Sometimes they are caught with more, but this number made international news. It’s easier to smuggle in colder weather because they can wear heavier jackets.
By now, many have already chosen to update to the newest Creators Update for their Windows 10 machine. You can see what version you are running by going to Start >> Settings >> System >> About. The newest version is 1703. Before installing this version, you will be asked to review your privacy settings so you are not giving out any information you don’t want to. They will bring up a page of privacy settings to review. The privacy settings don’t go into effect until you actually install the Creators Update.
You can always visit your privacy settings after the update to further set your privacy preferences by going to Start >> Settings >> Privacy.
Here are some nice features you can only use with the Microsoft Edge Browser:
You can save tabs for later
You can pin tabs to your start menu
You can preview all open tabs either all at once or one at a time
You can sweep all your open tabs aside to use later
You can pin pages to open next time you come back
Are there times when you aren’t sure you are getting the speed from your ISP that you pay for? Running a simple test on your computer will tell you. First you need to know that the speed you receive via a computer connected through an ethernet cable may be closer to what your ISP says you have and connections through Wi-Fi will be lower.
Why would you need to do these tests? Well if you are streaming and run into a lot of buffering problems or connection problems, you might want to take a look at your speeds. Are others in your household doing things that require more bandwidth such as streaming or gaming?
Here are a few sites you can test (we are supposed to have 75 mbps up and down with FiOS):
Many ISPs have a speedtest if you want to try them – in some cases you just the need the url of your ISP then add /speedtest/ to the end of it.
You’ve heard the term megapixel many times especially with regards to digital cameras. But what does the term actually mean and is bigger better? That’s what the Victor crew wants to know. Here is what we found out.
Early digital cameras had a poor resolution and didn’t compare to regular film cameras when they first came out. Some were only about one-third to half a megapixel. So a single megapixel is one million pixels. If you are using a one megapixel camera, you will have one million pixels in the image. So what is a good size? It depends on what you are going to do with the photos. If you are only going to view them online, one to three megapixels is fine. If you want 6×4 prints, you will need at least 2 megapixels. For larger 10×8 prints you would need to go to five megapixels and even larger 14×11 prints you will need to bump that up to seven megapixels.
How do you get away with a smaller size on a computer? Most monitors aren’t usually more than 2000×1000 pixels so that is only two megapixels. If you have a 4K monitor, that is eight megapixels. So you can get away with about a 6 megapixel camera in most cases. More pixels, however will give you cropping room. You do not have to turn in your camera for more pixels.
Imagine your sitting on a blanket on the grass with your family nearby. You get ready to watch the Fourth of July drones? Ha! So some are re-imagining see the Fourth of July with drones. So what’s the upside of this? No smoke. No explosions. No air pollution. Maybe you can hear the music they could be flying to. May be even cheaper to run drones than to blow up 30 tons of fireworks for an eighteen minute display. The drones can be choreographed into amazing displays.
Now maybe instead of “Intel Inside” we can see “Intel Outside” as they develop this. Find out more.
Nothing gives a more sinking feeling than losing your keys. You’ve searched and searched and still can’t find them. Well, there are small finders that will help you find them. Just add these small trackers to your key ring and download the app to your phone and you’re good to go.
There are several on the market. Some work better with iOS than Android so you need to be careful of what you choose. Some even have a backward function where you can push a button on the tracker to find your phone. Some come in multiple sets and different colors.
You can find them on amazon.com as well as your local stores such as Best Buy. There are so many brands out there you will have to read the reviews and decide for yourself.
There are a lot of ways these days to listen to music these days. There are many streaming services these days. Most people stream or use their mp3 players. There are also home devices like Amazon Echo, Google Home, or coming soon, the Apple HomePod.
The Victor crew even knows someone who still orders CDs to play in their car? But what will happen when he buys a newer car? Many newer cars are starting to abandon them. It has been predicted that up to 46% of new cars will not have CD players by 2021.
You can use a lot of data if you stream from your car (if you don’t have a Wi-Fi service) so you’ll have to rely on your mp3 player, satellite radio, or built-in radio. If you insist on a CD player, you can purchase a portable one that could plug in with your auxilliary cable. Perhaps you can purchase a new car kit with a CD player.
We sure have come a long way from just AM radio. Next came FM. Remember the 8-track players of the 70s? Then they went away to make way for the cassette. Then the piles of cassettes were replaced by piles of plastic discs. Life is getting simpler where you don’t have to store all the discs, cassettes, or 8-tracks anymore.
Don’t you just love it when you go to a website and you have all these things pop up, music blaring, or you’re reading something and along comes an annoying ad blocking you. There are two sides to this. Some people make their living from these ads. But for the user, it’s no picnic.
Google has joined the Coalition for Better Ads. This coalition has guidelines that should be followed when designing ads for a website. They plan on building a new Chrome browser with this ad-blocking built in. It won’t block all ads and you may only get the most annoying ads from showing.
The up side: maybe you will see fewer annoying ads.
The down side: someone will be making money from this. On the Google post, they mention Funding Choices where publishers can show a customized messages to people who are using ad blockers on their browsers. They can either enable ads or pay for removing the ads on that site through a new Google Contributor program.
So how does Google Contributor work? You buy a $5 pass for a particular website. The site has a per-page fee of their choosing (some are $0.01 per page, some $0.03 per page.) Every time you visit a page without ads, it deducts from the pass. You can add or remove sites from your pass at any time. This is still in beta at this time. They plan the rollout some time in 2018.
The Victor crew found an article on PCMag.com about some things that you can do with Google Maps mobile app that not everyone may know about. From this app, you can add stops, you can hail a ride (taxi or Uber, for instance), travel through time in Street View, create a private map, remember where you parked. These are just a few of the tips listed along with short videos.
The Victor crew has heard a lot of news lately about a cyber attack nicknamed WannaCry using ransomware. Ransomware is holds an infected computer hostage until a ransom is paid, usually in bitcoin, money that is virtually untraceable. This latest attack has caused global problems. In the UK, hospitals have been attacked. In the US, FedEx fell victim. If you use a Macintosh computer you are most likely safe as these attacks are targeted at PC users. If you are still running Windows XP you are even more vulnerable as there are no more patches being made for these systems.
Here are some things you can to do to prevent this from happening to you:
Keep your computer up to date. Do the patches for your operating system.
Make sure to do security updates for your security service.
Only open attachments from the person you know and trust.
Be careful of programs or other items you may want to download.
Back up your computer to an external hard drive.
Keep copies of your files on cloud services.
If you do get infected and don’t want to pay the ransom, which has been about $300-$600, you will have to flatten your machine (reinstall your OS). If you have kept your files on a cloud service or on an external hard drive, you will have defeated them. You will need to reinstall all your programs if you haven’t backed up the entire system.
The predictions are that today there will be even more as people turn on their computers if they haven’t been kept up to date.
If you get the Science Channel, you might already know about the Outlaw Tech program. They explore the different ways tech is used to commit crimes. Be it heists sort of like Ocean’s Eleven, counterfeiting, or identity theft, they may cover it.
They have six hour-long episodes showing how banks, museums, casinos can be hacked. During the episodes, they show how people have defeated have cracked sensors, codes, ATMs, and computers to get what they want.
The Jody Victor crew ran across an article that is truly disturbing.
A flaw in Microsoft Office given the ID CVE-2017-0199 has quite a history. This vulnerability allowed remote attackers to use Microsoft products to execute arbitrary code and take over computers. Ryan Hanson found the flaw last year. He spent some time to see if it could be made more deadly before contacting Microsoft in October 2016. Microsoft did not patch this right away. If they told people of a change in Word settings that would fix the flaw, then word would be out that there was a flaw with more ramifications.
They decided to release a fix in a later update. However, they sat on it and took their time. They started working on a solution in January but attacks had already begun. Through links in email, computers were infected with software that allowed eavesdropping. McAfee saw some attacks on April 6 of this year and blogged about it April 7. April 9, a program was for sale underground for hackers to exploit the flaw. On Tuesday, April 11, the flaw was finally patched in an update.
They don’t know how many computers were hacked or how much money was stolen before this exploit was patched. If you don’t automatically patch your PC, please do so now!
A few weeks ago 60 Minutes aired a segment called Brain Hacking. The Victor crew was surprised by some of the information.
Tristan Harris, a former Google product manager, compares smartphones to slot machines. Every time you pick it up and check on it, you are looking to see “what you get.” The person being interviewed, said that techniques are used to cause people to keep checking their phones and apps.
In another part of the segment, we find Ramsay Brown, a programmer who understands how the brain works and writes code accordingly. Co-founder of Dopamine Labs, tries to write apps based on the pleasure and desire in our brains. They try to find ways to keep people using apps longer or more often. For instance, he says Instagram may hold back some of your “likes” and release them in a sudden burst. They even try to figure out when the best moment to release them is. You don’t pay for social media like Facebook – advertisers do. He says it’s “your eyeballs are what’s being sold there.”
The Victor crew came across an urgent matter. If your browser is Chrome or Firefox, be aware of a new phishing attack. An attacker can send you an email with a link to a malicious website. You could visit a site that will either infect your computer or make you think you are signing in with your credentials as they trick you into thinking you are accessing the correct site.
The people from Wordfence, a security plugin for WordPress found this last Friday, April 14, 2017. They set up a demo site to show what is happening. It is well worth it to check their article and see if you are affected and what to do. They have set up a demo using a medical site, epic.com, so you can test your browser and browser settings. You can visit their demo site here in Chrome or Firefox. To compare the demo site with the real site they faked for comparison, you can click here to visit the real site here.
This does not affect Windows or Safari browsers. Currently there is a fix for Firefox browsers. Here is what you do:
Open your Firefox browser
Type about:config in the address bar
Search for ‘puny’ (without quotes)
You should see network.IDN_show_punycode set for ‘false’
Double click it to make it ‘true’
So you get a new iPhone, Android phone, iPad, tablet, iPod … Do you need to purchase a screen protector for it too? The Victor crew wanted to explore this after having seen a protector be the only thing that saved the phone of someone they know and talking to someone else who said they never get a screen protector.
To begin with, there are different types of protectors – plastic and glass. Glass is the pricier of the two. It can also be tempered glass. You’ll find all different type like anti-glare, carbon fiber, high definition, etc. Where do you begin?
Whether or not you get a screen protector is personal. It can help with scratches and longevity of the device. Are you hard on your device? Where do you usually keep your phone? Are you clumsy? If your phone is made with gorilla-glass you won’t have to worry.
Just be sure to get the right type. The cheaper ones may protect somewhat for scratches but maybe not as much if dropped. Thermoplastic is more durable but may not be as effective as a screen guard. Tempered glass has several layers and can absorb some shock. A glass cover may shatter on impact but your screen may still be protected. You may want to go further and find an anti-glare cover.
For those of us waiting for a new iPad, last week Apple announced the new iPad. It wasn’t really given a name and it isn’t an iPad Air. It has a 9.7-inch Retina display with an A9 processor. It comes in just 2 sizes: 32GB and 128GB. (We really wanted a 64GB but had to get the 128GB.) It has iOS 10.3 and Touch ID. It comes in silver, gold, or space gray and costs $29 for the 32GB Wi-Fi model and $459 for the 32GB Wi-Fi + Cellular model. For the 128GB model it’s $100 more each respectively.