Agregátor RSS

NFTs Not Dead? Škoda Auto oživuje digitální trendy včetně metaverza, jede na nich i Porsche

Živě.cz - 18 Červen, 2024 - 08:45
Vlastnictví nezaměnitelných tokenů sice za současné tržní konstelace nezní jako recept na zbohatnutí, přesto může majitelům přinést například pozvánku k vyzkoušení jednoho z modelů Porsche. „Koncern Volkswagen je v oblasti digitálních inovací jako NFT, metaverzum a rozšířená realita významným ...
Kategorie: IT News

VMware by Broadcom warns of two critical vCenter flaws, plus a nasty sudo bug

The Register - Anti-Virus - 18 Červen, 2024 - 08:08
Specially crafted network packet could allow remote code execution and access to VM fleets

VMware by Broadcom has revealed a pair of critical-rated flaws in vCenter Server – the tool used to manage virtual machines and hosts in its flagship Cloud Foundation and vSphere suites.…

Kategorie: Viry a Červi

Na Floridě bojují proti komárům pomocí dronů. Snadno se dostanou do nepřístupných oblastí

Živě.cz - 18 Červen, 2024 - 07:45
V okrese Broward County na jihovýchodním pobřeží Floridy se rozhodli nasadit do boje proti komárům moderní technologii. Od rozlehlých parků po mokřady a chráněné oblasti využívají k postřiku proti komárům v těžko přístupných místech drony. Podrobnosti přináší regionální deník South Florida Sun ...
Kategorie: IT News

Notebooky s Intel Lunar Lake a AMD Strix Point nebudou podporovat Copilot+ hned

CD-R server - 18 Červen, 2024 - 07:40
Funkce Windows 11 nazvaná Copilot+, která využívá NPU (AI akcelerátor) pro funkce operačního systému, nebude u procesorů Intelu a AMD dostupná hned při vydání, ale dorazí až později…
Kategorie: IT News

Tesla musela odložit dodávky Cybertrucků. Důvodem jsou problémy s obřím stěračem

Živě.cz - 18 Červen, 2024 - 06:45
Cybertruck disponuje obřím stěračem čelního skla, který se již dříve stal předmětem kritiky i různých vtipů. Ten vzhledem ke své délce (cca 157 centimetrů) potřebuje výkonný motorek. V poslední době však byla zaznamenána řada případů, kdy právě tento motorek selhal, v důsledku čehož se stěrač ...
Kategorie: IT News

Arm security defense shattered by speculative execution 95% of the time

The Register - Anti-Virus - 18 Červen, 2024 - 03:11
'TikTag' security folks find anti-exploit mechanism rather fragile

In 2018, chip designer Arm introduced a hardware security feature called Memory Tagging Extensions (MTE) as a defense against memory safety bugs. But it may not be as effective as first hoped.…

Kategorie: Viry a Červi

Rethinking WiFi and Router Security: A Deep Dive into the Recent ASUS Flaw and Secure Alternatives

LinuxSecurity.com - 18 Červen, 2024 - 02:42
At a time of rapid technological progress, the security of our digital tools - particularly WiFi routers - has become critical. Recent news from ASUS sent shockwaves through the cybersecurity community when multiple models of their routers were found with critical flaws that exposed an ongoing challenge of protecting networks against intrusions.Unpacking the Critical Flaw in ASUS RoutersAccording to an extensive report by RedPacket Security, ASUS recently resolved an authentication bypass vulnerability known as CVE-2024-3080, which scored 9.8 on the Common Vulnerability Scoring System scale, indicating its severity. This security hole allowed unauthenticated, remote attackers to access devices for unauthorized gains without authentication, granting them any legitimate privileges whatsoever.Another high-severity buffer overflow flaw, CVE-2024-3079, compounded this security hole by enabling remote attackers with administrative privileges to execute arbitrary commands remotely on devices with administrative rights. These vulnerabilities could constitute an exploit chain compromising all security protection on affected routers.ASUS routers such as the ZenWiFi XT8, RT-AX88U, RT-AX58U, and others were affected. ASUS quickly responded with software updates to address these vulnerabilities.This incident raises a fundamental issue regarding routers' reliance on proprietary software. While manufacturers frequently push out security patches, proprietary programs' closed nature means vulnerabilities remain unseen until a breach occurs, leaving users vulnerable.Embracing Open Source: A Route to Enhanced SecurityOpen-source firmware and operating systems offer an alternative to proprietary router software. Their publicly collaborative development processes make security flaws less likely to go undetected.OpenWRT {modal image="https://linuxsecurity.com/images/articles/features/resized/2560px-OpenWrt_Logo.svg_500x126.png" thumbnail-width="250" thumbnail-height="63" }{/modal}OpenWrt is one of the most widely used open-source router operating systems available. It provides highly configurable control over performance and security settings, surpassing what most stock router firmware allows. OpenWrt also features an innovative package management system that enables users to add or remove features as desired, making the operating system leaner and more cost-effective than others.Here are five of the best features of OpenWrt: Extensive Hardware Support: OpenWrt supports a wide range of devices, from home routers to professional-grade equipment, making it adaptable to various networking situations. Fully Writeable Filesystem: With its roots in Linux, OpenWrt provides a fully writeable filesystem. Users can modify, add, or delete any file, similar to a traditional Linux distribution, offering unparalleled flexibility. Customizable Packages: OpenWrt allows users to install and remove packages to customize the router for specific needs without bloating the system with unnecessary features. Advanced Network Capabilities: OpenWrt contains many out-of-the-box network features, including IPv6 support, VLANs, traffic shaping, VPN, and firewall configurations, allowing for detailed network management.\ Active Community and Development: The vibrant OpenWrt community and ongoing development mean the firmware is constantly updated. New features are regularly added, and security vulnerabilities are promptly addressed, enhancing your network's functionality and security.These features underscore OpenWrt's flexibility and capabilities, making it a powerful choice for users looking to maximize their router's potential.DD-WRT {modal image="https://linuxsecurity.com/images/articles/features/dd-wrt-firmware-screenshot.png" thumbnail-width="195" thumbnail-height="231" }{/modal}Like OpenWrt, DD-WRT is another Linux-based firmware that enhances routers by improving network stability, range expansion, and security features such as VPN integration and VLAN support. Furthermore, its community is quite active, providing resources and forums for help and advice regarding its usage. The five best features of DD-WRT include: Advanced Quality of Service (QoS): This technology enables intricate control over bandwidth allocation to prioritize traffic or devices for improved network performance. VPN Integration: Facilitates the integration of a Virtual Private Network directly within the router, securing all connected devices without individual configuration. Wireless Bridge and Repeater Modes: Allows routers to function as wireless repeaters or bridges, extending the wireless network's coverage or connecting wired devices to a wireless network. VLAN Support: Supports Virtual LANs for better network segmentation, enhancing security and management, and is especially useful for guest or separate IoT networks. DNS Caching: Stores DNS queries locally to speed up webpage loading times, resulting in a faster internet experience for all network users.Tomato {modal image="https://linuxsecurity.com/images/articles/features/freshtomato-firmware.png" thumbnail-width="257" thumbnail-height="122" }{/modal}Tomato firmware is known for its user-friendly interface and emphasis on real-time network monitoring, supporting many of the same models as DD-WRT while offering more secure security features than its stock counterpart.Here are five of the best features of Tomato firmware for routers: Bandwidth Monitoring: This allows users to monitor network traffic and bandwidth usage, making it easier to manage network resources effectively. Advanced Quality of Service (QoS) provides detailed settings to prioritize network traffic, which helps optimize performance for critical applications. Access Control: Offers robust options to manage and control access to the network, enhancing security by restricting unauthorized usage. Built-in OpenVPN Server/Client: Integrates support for OpenVPN, enabling secure VPN connectivity for enhanced privacy and secure remote access. IP/MAC Bandwidth Limiter: This tool enables setting bandwidth limits for specific IP addresses or MAC addresses, useful in managing bandwidth consumption per device.These features enhance network management, security, and performance, making Tomato firmware a valuable choice for users with compatible Broadcom-based routers.pfSense {modal image="https://linuxsecurity.com/images/articles/features/pfSense-2.4.5-Dashboard.jpg" thumbnail-width="190" thumbnail-height="143" }{/modal}While not specifically for routers, pfSense can transform an old computer into a powerful firewall and router. Based on FreeBSD and widely regarded as one of the safest and most flexible network administration solutions available today, pfSense handles everything from routing and firewalling to VPN provisioning easily. Here are the five best features of pfSense router firmware: Comprehensive Firewall Security: pfSense provides an advanced firewall with stateful packet inspection, anti-spoofing, and more, for robust network protection. Versatile VPN Support: It supports multiple VPN protocols, including IPsec, OpenVPN, and WireGuard, enabling secure and flexible remote access configurations. High Availability and Redundancy: This service offers features like CARP (Common Address Redundancy Protocol) and pfsync to ensure network uptime and reliability through failover and redundancy setups. Traffic Shaping and QoS: This allows detailed control over network traffic, enabling the prioritization of critical services to maintain optimal performance and reduce congestion. Extensibility with Packages: This can be extended with a wide range of packages for additional features, such as Snort for intrusion detection, Squid for web caching, and more, tailoring the system to specific needs.AsusWRT-Merlin: Custom Firmware Powering ASUS Routers {modal image="https://linuxsecurity.com/images/articles/features/asuswrt-merlin-IPTraffic_Stats.png" thumbnail-width="180" thumbnail-height="196" }{/modal}AsusWRT-Merlin is a third-party firmware developed for select ASUS routers by Eric Sauvageau to improve upon the original AsusWRT firmware without drastically altering its user experience or user interface. Retaining all original features while adding improvements, bug fixes, and occasional new ones;Eric Sauvageau leads the development of AsusWRT-Merlin with support from The Merlin Group, users, and developers who contribute to its ongoing maintenance and enhancement. Their efforts focus on stability, improved performance, and better customization possibilities across ASUS router models supported by this open-source firmware project.Using AsusWRT-Merlin can bring many advantages for users who appreciate open source's philosophy and its associated benefits: Improved Security: Regular updates from the Merlin Group may include security patches which make your router less susceptible to vulnerabilities discovered over time. Enhanced Features: The AsusWRT-Merlin includes additional features not found in its predecessor AsusWRT, such as DNS over HTTPS support (DoH), enhanced Quality of Service capabilities (QoS), and the option to monitor real-time bandwidth usage. Customizability Freedom: Fans looking to tailor their network according to specific needs will appreciate the various settings and tweaks available. Active Community Support: Our vibrant community works tirelessly on improvements and shares knowledge for troubleshooting and advanced configurations. Open Source Firmware Limitations AsusWRT-Merlin keeps users familiar with AsusWRT at ease since its GUI and overall design philosophy are the same as before, helping ease any learning curve. Open-source firmware such as this also comes with some restrictions users should be aware of: Warranty Concerns: Installing third-party firmware could void your device's manufacturer warranty; users should check their warranty terms before proceeding. Limited Support: While community support exists for using third-party firmware such as AsusWRT-Merlin, users will not receive official assistance from ASUS for issues caused by using such third-party solutions. Compatibility and Stability: Not all routers can support third-party firmware, and while open-source firmware tends to be stable, poorly executed updates or incompatible configurations could create stability issues. Learning Curve: For less tech-savvy, understanding all the additional features and configuration options may take more effort than familiarising themselves with stock firmware's user-friendly setups. No Guarantee of Features: Unfortunately, Merlin may not support all the proprietary features found in AsusWRT; some features present may also sometimes be removed if they pose significant bugs or security risks. Although open-source firmware such as AsusWRT-Merlin may have disadvantages, many advanced users find the advantages far outweigh them, particularly its enhanced control and security features. Individuals looking to maximize the potential of their router will discover that this version provides a robust upgrade from the original AsusWRT, offering both familiarity with stock firmware and access to more sophisticated capabilities of fully open-source solutions. Making the Switch to Open-Source Firmware for Enhanced Network Security Transitioning to open-source firmware like AsusWRT-Merlin can be an important strategic move for users who prioritize network security. However, this endeavor must be carefully prepared to ensure a successful transition. Before making the change, you must verify whether or not the open-source firmware you've selected is compatible with your router model. Not all routers support all firmware installations; installing incompatible ones could result in functional severe issues or even brick your device. Once compatibility has been confirmed, backing up existing router settings as a protective measure can prevent data loss and help ensure smooth transition processes. As installation processes can differ between router models, it is wise to refer to an after-installing guide tailored specifically for your router model for after-installation instructions and potential obstacles related to firmware upgrading processes. Such guides often offer step-by-step guidance and can help address common obstacles encountered during this process. The Bigger Picture The ASUS incident highlights the need for more proactive security measures in network hardware. By turning to open-source solutions, users can take advantage of collective approaches to security where vulnerabilities can be quickly identified and patched by an international community of developers. Transitioning to open-source software might initially appear daunting; however, spending the time and energy learning how to utilize these powerful tools can significantly boost both the security and efficiency of home or office networks. Open source network management represents more than software changes; it represents a wider trend toward transparency and community in cybersecurity''an essential aspect in today's increasingly interconnected society.
Kategorie: Hacking & Security

Shoddy infosec costs PwC spinoff and NMA $11.3M in settlement with Uncle Sam

The Register - Anti-Virus - 18 Červen, 2024 - 01:47
Pen-testing tools didn't work – and personal info of folks hit by pandemic started appearing in search engines

Updated  Two consulting firms, Guidehouse and Nan McKay and Associates, have agreed to pay a total of $11.3 million to resolve allegations of cybersecurity failings over their roll-out of COVID-19 assistance.…

Kategorie: Viry a Červi

Nechytáte se v práci u počítače? Zaměstnavatel vás může poslat na kurz, který proplatí stát

Lupa.cz - články - 18 Červen, 2024 - 00:00
Začínáte mít pocit, že v práci nestíháte držet krok s IT technikou a digitalizací? Zkuste požádat zaměstnavatele, ať vás přihlásí do vzdělávacího kurzu, stát mu proplatí náklady i část vaší mzdy.
Kategorie: IT News

Projekt py2many: transpiler Pythonu do dalších programovacích jazyků

ROOT.cz - 18 Červen, 2024 - 00:00
V dnešním článku se seznámíme se základními vlastnostmi projektu py2many, který dokáže překládat zdrojové kódy z Pythonu do dalších jazyků, včetně C++, Rustu, Go či jazyku Julia.
Kategorie: GNU/Linux & BSD

Poslat firmu do insolvence není jen tak. Pokud je to jen ze msty nebo odfláknuté, zaplatíte náhradu škody

Lupa.cz - články - 18 Červen, 2024 - 00:00
Za škodu způsobenou nepravdivým, nedůvodným, šikanózním, mstivým, zfalšovaným, zinscenovaným, ale i nesprávným insolvenčním návrhem odpovídá navrhovatel. Kdy musí údajného dlužníka odškodnit?
Kategorie: IT News

Zen 5 / Ryzen 9000 bude nejspíš levnější než Zen 4 / Ryzen 7000

CD-R server - 18 Červen, 2024 - 00:00
Nová generace procesorů velmi pravděpodobně vstoupí na trh s nižšími cenami než Ryzen 7000 před dvěma lety. Top model Ryzen 9 9950X by neměl přesáhnout $649…
Kategorie: IT News

Cihly Plaex z recyklovaného plastu jsou jako kostky Lego

OSEL.cz - 18 Červen, 2024 - 00:00
Chtěli byste si postavit dům jako ze stavebnice? Cihly Plaex nabízejí takový zážitek, tedy až v USA dokončí certifikace pro obytné budovy. Z 90 procent je tvoří recyklovaný plast a jsou asi o 35 procent lehčí než tradiční cihly stejné velikosti. Dům ze stavebnice by mohli ocenit ambiciózní kutilové nebo humanoidní robotičtí zedníci, kteří jsou už na spadnutí.
Kategorie: Věda a technika

Suspected bosses of $430M dark-web Empire Market charged in US

The Register - Anti-Virus - 17 Červen, 2024 - 22:13
Cybercrime super-souk's Dopenugget and Zero Angel may face life behind bars if convicted

The two alleged administrators of Empire Market, a dark-web bazaar that peddled drugs, malware, digital fraud, and other illegal stuff, have been detained on charges related to owning and operating the illicit souk.…

Kategorie: Viry a Červi

Adobe brings AI image generation to Acrobat

Computerworld.com [Hacking News] - 17 Červen, 2024 - 21:05

Adobe Acrobat users can now generate and edit images in PDFs via text prompts with the addition of Adobe’s Firefly AI image model.

The update gives Acrobat and Reader users access to some of the same image creation and editing capabilities available in Adobe design apps such as Photoshop, without the need to switch tools. This means it’s possible to create new images from scratch using Adobe’s latest Firefly Image 3 model — which Adobe claims will enable greater realism and more control over the images produced compared to previous models — or manipulate existing content with Generative Fill and Remove Background tools.

The Firefly image feature, announced Monday, is available for Adobe Acrobat Standard and Pro customers; they will receive 250 “generative credits” to use with the Edit Image and Generate Image features each month at no additional cost through January 2025 an Adobe spokesperson said. The price after that date point has yet to be determined. 

“Adobe has done workers a service by building technologies like the generative capabilities of Adobe Firefly and working to integrate them across a range of their applications and tools,” said Matt Arcaro, IDC research director for computer vision and AI. By building Firefly into familiar apps such as Acrobat, the level of friction involved in accessing a new technology is reduced, he said. 

Adobe has also added new features to the AI Assistant for Acrobat and Reader apps announced in February

The generative AI (genAI) assistant can now summarize information from multiple documents — including PDF, Word, PowerPoint, and other file formats — at the same time. That lets users identify common trends and generate an overview summary with citations that point to the source of information, Adobe said. Users can then direct the AI assistant to format the content for a specific purpose, such as turning it into an email that can be sent to colleagues. 

The ability to query multiple documents adds value to Adobe’s “document chat” tool, said Arcaro. “This creates a significant speed up for gathering key insights, but also to put together a more comprehensive perspective across multiple similar or different documents,” he said.

The Acrobat AI assistant can also be used to summarize the transcription of a Microsoft Teams meeting or webinar, or upload a “VTT” transcript file generated in another meeting app. 

The Acrobat AI Assistant is available for free until June 28, after which it will cost an additional $4.99 each month for individual Acrobat Standard and Pro subscribers under Adobe’s “early access pricing.” This pricing is available up to Sept. 4. 

Adobe didn’t respond to a request for pricing details after this date. 

Kategorie: Hacking & Security

Máte na počítači čtečku otisků nebo jiný biometrický senzor?

Živě.cz - 17 Červen, 2024 - 20:15
Mobil bez čtečky otisků nebo skeneru obličeje se už pomalu ani nedá koupit, ale na počítačích jsou pořád dost vzácnou funkcí. Máte už na notebooku nebo desktopu nějaký biometrický snímač? Máte na počítači čtečku otisků nebo jiný biometrický senzor? - Ano, mám - Ne, ale chtěl/a bych - Ne, ...
Kategorie: IT News

Blackbaud has to cough up a few million dollars more over 2020 ransomware attack

The Register - Anti-Virus - 17 Červen, 2024 - 19:45
Four years on and it's still paying for what California attorney general calls 'unacceptable' practice

Months after escaping without a fine from the US Federal Trade Commission (FTC), the luck of cloud software biz Blackbaud ran out when it came to reaching a settlement with California's attorney general.…

Kategorie: Viry a Červi

Emojis as Weapons: Dissecting DISGOMOJI's Malware Assault on Government Security

LinuxSecurity.com - 17 Červen, 2024 - 19:38
DISGOMOJI malware represents an innovative development in cyber espionage tactics, particularly its refined approach to targeting government agencies in India. Originating from altering an open-source cybersecurity project previously known as discord-c2, its appearance reinforces an emerging trend of adapting and evolving existing tools into intricate cyberespionage campaigns.DISGOMOJI's deployment is highly sophisticated. It employs Discord's widespread use to communicate command and control (C2) messages using emojis, effectively concealing malicious activities within seemingly innocent traffic and complicating efforts to detect and neutralize this threat.A recent analysis by cybersecurity firm Volexity reports that the DISGOMOJI malware appears to be targeting systems running the Linux distribution BOSS, which is widely utilized by Indian government entities. The attackers behind this initiative--identified by Pakistan-based threat actor UTA0137--is clearly intent on infiltrating and potentially breaching Indian government infrastructure.DISGOMOJI appears to gain entry through phishing attacks , an effective and common method for credential theft and malware delivery. What distinguishes DISGOMOJI is its persistent mechanism and use of emoji commands, like using a camera with the flash emoji to take screenshots or the Fox Emoji to zip all Firefox profiles on target devices. Such commands demonstrate its clever design and allow attackers to acquire sensitive data without leaving a trace on compromised systems.DISGOMOJI's open-source nature and adaptable design create a further risk; the malware can be adjusted and deployed against additional targets beyond India's government. Furthermore, its ability to bypass Discord's attempts at shutting down malicious servers by managing tokens to allow attackers to update client configuration easily demonstrates the difficulty of countering such an advanced threat.Additional ConsiderationsThe open-source nature of DISGOMOJI raises important issues about the duality of publicly available cybersecurity tools and projects. While open-source projects provide great resources for research, education, and legitimate defensive purposes, they also serve as blueprints that could be modified maliciously.Linux administrators and cybersecurity professionals, particularly in industries vulnerable to being targeted by espionage-focused malware, should view DISGOMOJI as an illustration of cyberspace's ongoing arms race. This would emphasize the necessity for constant vigilance, education on emerging threat vectors, and implementation of multilayered security measures that detect and prevent such targeted threats.DISGOMOJI malware targeting Linux systems marks a striking change in cyber threats targeting these environments. While traditional malware relies on textual-based command and control (C2) mechanisms, DISGOMOJI's use of emoticons for command transmission through Discord is both novel and alarming - bypassing security systems designed to monitor more conventional indicators of compromise thereby creating new difficulties for detection and mitigation.How Does DISGOMOJI Compare with Other Linux Malware and Ransomware?To better assess this threat, it would be useful to compare DISGOMOJI against other significant malware threats like other significant Linux malware and ransomware such as DISGOMOJI that has appeared lately. When comparing them side-by-side, several aspects stand out:Method of Communication: Most Linux-targeting threats, like Ebury botnet, employ traditional botnet communication methods like IRC channels or HTTP-based C2 infrastructures for command and control (C2). But DISGOMOJI stands out by employing popular, legitimate services for C2, making its traffic harder to distinguish from benign communications.Targeting and Sophistication: Where Mirai uses brute-force attacks against IoT devices to create large botnets for DDoS purposes, DISGOMOJI appears more focused on espionage with targeted attacks against specific government agencies - suggesting an even higher level of sophistication behind its operations that may include state actors.Stealth and Persistence: DISGOMOJI utilizes advanced stealth techniques, such as displaying a decoy PDF, to avoid detection while employing persistence mechanisms like cron jobs and XDG autostart entries, similar to those used by other sophisticated malware. This makes it more complex and more challenging for security analysts to detect and remove it, making it resistant to removal.How Concerned Should Linux and InfoSec Administrators Be?Linux and InfoSec administrators should view DISGOMOJI with great concern due to its unique C2 strategy, targeted nature, sophisticated deployment mechanisms, and sophisticated persistence mechanisms. Awareness and preparation can greatly reduce its threat; an understanding that Linux systems are susceptible to targeted attacks is paramount, so security posture adjustments must be made accordingly. mes Mitigation StrategiesAdministrators need to implement various mitigation strategies to protect themselves from threats such as DISGOMOJI:Enhance Monitoring and Detection : Employ advanced monitoring solutions capable of analyzing network traffic behavior and detecting anomalous patterns such as using legitimate services like Discord for potential C2 communications.Regular System and Patch Updates and Patching : Regular system and application updates help protect against vulnerabilities that could serve as entryways to infections, acting as initial infection vectors for hackers and cybercriminals.Phishing Awareness Training : Since DISGOMOJI utilizes phishing as the initial entryway into their network, training staff to identify and respond to any attempted phishing is an essential defense against infection.Segregation : By isolating critical networks and restricting access to essential services only, network segmentation helps contain any malware outbreaks should an infection arise.Application Whitelisting and Restricted Script Execution : Block any unapproved applications from running and restrict script execution capabilities to limit malware's ability to launch payload or establish persistence.Utilize Security Tools with Machine Learning Capabilities : For effective defense against new attack vectors, implement solutions that leverage machine learning for threat identification and blocking using behavioral analysis. This approach may be more successful in blocking threats with novel behaviors than traditional solutions.Improved Email Filtering : Email security measures must be strengthened with robust filtering rules to prevent phishing scams from succeeding.Discord Usage Policy : Organizations should implement policies to review and potentially restrict the use of Discord and similar platforms when necessary or monitor its usage on sensitive systems.Community Vigilance : As this open-source malware is spread widely through threat vectors, cybersecurity communities should remain vigilant in monitoring and sharing intelligence on variations of DISGOMOJI malware as a collective defense approach.While DISGOMOJI poses a substantial threat to Linux systems, increased awareness, advanced detection tools, and robust security practices can reduce its threat.
Kategorie: Hacking & Security

Pýcha musela stranou. Nejlepší procesor Intelu vyrobil jeho největší konkurent

Živě.cz - 17 Červen, 2024 - 18:45
První klasický procesor, jehož jádra si Intel nevyrobí sám • Lunar Lake chce zavařit AMD i nastupujícím armovým čipům • Novinka má být výkonná a také velmi úsporná
Kategorie: IT News

How to use iCloud with Windows

Computerworld.com [Hacking News] - 17 Červen, 2024 - 17:59

If you have an Apple ID, you can use iCloud with Windows, which means you can access your email, videos, photos, calendars, bookmarks, files and other iCloud data from your PC – useful when you’re at your desk or traveling without an Apple device, or if you are inside Boot Camp on your Mac.

How to use iCloud with Windows

There are two ways to use iCloud with Windows: via a browser or using a dedicated application called iCloud for Windows, but there are differences between the two:

The browser

On the surface, the most straightforward approach to using iCloud with Windows systems might appear to be accessing your iCloud account from your favorite web browser.

The app

That’s great up to a point, but to unlock the power of sync across all the devices you have logged into your iCloud account, including your Windows systems, it is far better to download and install Apple’s iCloud for Windows software on your PC. The software is available for free download directly from Microsoft’s app store.

Once installed and set up, you’ll be able to use iCloud to get to all your photos, documents and bookmarks on your Windows PC to update automatically across all your Apple devices, and vice versa, which is what you get when you use iCloud for Windows

Borrowed from One Drive

The most recently published version of iCloud for Windows uses Microsoft’s Cloud Files API, (One Drive’s Files On Demand feature) which makes the solution more robust and faster.

This means new assets will swiftly sync across all your devices, “enabling users to be more productive offline on mobile devices and quickly share files on iOS,” according to Microsoft Engineering General Manager Giorgio Sardo. In part, this is because the system is smart enough to just download a “breadcrumb” (around 1k in size) of each of your files, downloading the full item on request.

How does iCloud Drive work?

If you already use iCloud Drive, you’ll be familiar with what it does. If not, then the easiest way to understand the feature is as online storage for all the files and projects you are working on. Anything you save into any folder of the iCloud Drive will sync across all your Apple ID devices (it’s very like Dropbox in this). You will also be able to access items saved to iCloud Drive on your Mac, iPhone, or iPad within this folder on your PC using File Explorer. Fully searchable, the service also lets you share your files with others.

How do I access iCloud using a browser?

At those times when it makes sense to use the browser to access your iCloud data — such as when travelling and using a borrowed machine.  It’s easy: just navigate to iCloud.com using your browser and log in using your Apple ID and password. 

In a neat touch, any active Reminders you might have will appear at the top of the iCloud main page when you log in. You’ll also find an icon-based set of links to take you to your  iCloud apps and services, including your iCloud Drive.

  • Mail
  • Contacts
  • Calendar
  • Photos
  • iCloud Drive
  • Notes
  • Reminders
  • Find iPhone
  • Account Settings

You’ll also find fully functional online versions of Pages, Numbers and Keynote, which you can use to create documents compatible with both Mac and PC. You may also find News Publisher, if you have enabled that app.

NB: There are a small number of useful tasks you can only achieve using iCloud via your browser, such as creating rules to help improve email management across all your systems.

Accessing iCloud using a browser is especially useful on borrowed machines, during emergencies, while visiting Internet cafes or even using a machine you don’t own that you happen to have access to. Just remember to log out.

Of course, the beauty of iCloud is its ability to sync across all your devices, but to sync from a Windows system you need to install iCloud for Windows.

How to set up iCloud for Windows

Apple’s iCloud for Windows software should install automatically once downloaded. If it does not, open File Explorer, launch iCloud Setup and restart your PC. 

Setting up the app will create iCloud Photos and iCloud Drive folders on your Windows 10 device. These will sync with your iCloud account and connected devices, and should automatically appear in File Explorer’s Quick Access menu.

What are the system requirements?

The current iteration of iCloud for Windows requires that you are running at least Windows 10 and that you re signed into your Microsoft account. You’ll also need Outlook and a web browser (Microsoft Edge, Firefox, Chrome).

If you use Windows 7 or Windows 8, you can download compatible versions of iCloud for Windows directly from the Apple website. (Some iCloud services might work differently, as detailed here.)

Once the software is installed and open, you’ll be asked to enter your Apple ID to sign into iCloud, and you’ll then need to choose which iCloud features you want to use. To do this, you’ll be shown a window in which you check or uncheck each feature:

  • iCloud Drive,
  • Photos & videos, including sharing albums of images and videos.
  • Mail, Contacts, Calendars, Tasks
  • Bookmarks.

As you enable each of these categories, iCloud for Windows will create folders for those categories in File Explorer, so you can dive in to access or add to your iCloud content. You can also share and collaborate on files held in your iCloud Drive from within File Explorer, with edits synced across your devices.

Here is how to use each of these features:

How does iCloud Photos work?

When enabled, iCloud for Windows creates an iCloud Photos folder in File Explorer. Any images of videos you add to this folder will then be synced across all the devices you own that logged into this Apple ID. You can share galleries of images using iCloud Photo Sharing.

iCloud for Windows will keep lightweight copies of your images on your PC, only downloading full-res versions on request.

When you set yourself up with iCloud for Windows you’ll see an ‘Options’ item appear beside Photos. Tap this and you’ll find the following choices:

  • iCloud Photo Library: Enable this and any images/videos saved to the iCloud Photos folder on your Windows device will be stored in iCloud. You can also change which folders are used for photo and video sync.
  • My Photo Stream: Downloads all your most recent images from your devices to your Windows system.
  • Download new photos and videos to my PC: This option appears when you enable iCloud Photo Library, and is self explanatory.
  • Keep high-efficiency originals if available: Check this if you have plenty of drive space.
  • Upload new photos and videos from my PC: Disable this if you only want to view items captured by your other iCloud devices.
  • iCloud Photo Sharing: You can view items shared with you by others.
Mail, Contacts, Calendars, Tasks and Bookmarks

The final selection of iCloud items you can access using Windows. Once you enable this all your iCloud mail (typically sent to [email protected]) will be made available in the folder pane on Outlook. You’ll also find all your other calendaring data there, and bookmarks will be made available through your browser.

Apple recently made an extension available for the Chrome browser on Windows to ensure it remains compatible with iCloud and iCloud for Windows. Once the new version is installed, users should find a new “Passwords” section in the app with an iCloud Keychain logo.

Everything else

If you have any problems with these features, please refer to Apple’s extensive Support pages that should help you resolve them. (Don’t forget, you won’t receive email if you failed to create an iCloud email address when setting up your Apple ID).

There are some iCloud services that just don’t work on Windows: Find My iPhone, Back to My Mac, Backup, Notes and Reading List. All these require deeper OS integration, though in the case of Find My iPhone you will be able to track lost devices using iCloud in your browser.

However, if you have valuable data that you want to sync between your Macs, iOS devices and Windows PC, iCloud for Windows should help – though that 5GB of storage Apple supplies remains miserly at best.

(Find out more on how to synchronize iCloud — and what to do when it won’t sync.)

Can I use a Managed Apple ID?

Unfortunately, iCloud for Windows isn’t yet supported if you use a Managed Apple ID.

More useful iCloud tips

Here is a short collection of what may be useful tips for iCloud users on any platform, not just Windows:

Got a story? Please drop me a line via Twitter and let me know. I’d like it if you chose to follow me on Twitter so I can let you know about new articles I publish and reports I find.

Kategorie: Hacking & Security
Syndikovat obsah