International stories and articles from our Flipboard mag.

FEB
24

By using solar energy, these smartbenches give you charging ports and public WiFi throughout the year!

By using solar energy, these smartbenches give you charging ports and public WiFi throughout the year!
By using solar energy, these smartbenches give you charging ports and public WiFi throughout the year! | Yanko Design

By 02/24/2021

How many different ways can you say, “Do you have WiFi?” It’s my most-asked question when visiting new cities. In today’s world, having access to WiFi is essential if you plan on making the most of any trip abroad. But far too often have I thrown my money down the drain for a tiny cup of espresso just to use a cafe’s WiFi and charging port. Replacing this costly exchange with their interpretation of a city hub, the makers behind Kuube designed a smartbench for city centers, equipped with all the necessities that a modern-day traveler might need to comfortably move through any city. Moreover, given the fragile nature of our climate and our energy grid, these smartbenches could prove to be a highly valuable public utility during blackouts by providing free charging and WiFi to everyone.

Kuube comes in three different sizes, each of which offers the same services to varying degrees. The Kuube Nano, their mid-sized bench, is solar-powered and accommodates up to four people, complete with a WiFi hotspot, two USB chargers, two wireless Qi chargers, and a single display screen, which provides environmental information like weather, air quality, and UV index. For the makers behind Kuube, adapting their conceptual design process to help mitigate the current global climate crisis in micro mobile ways (i.e.; city bikes, electric scooters) was their top priority. On the choice to generate each smartbench with solar power, the designers behind Kuube say, “Living in the times of climate crisis we believe it is very important to achieve sustainability in as many ways as possible…Our goal is to achieve sustainable smart cities [through] micro-mobility.”

By collecting solar energy for Kuube’s operation, each smartbench is able to provide modern necessities like WiFi and charging ports for the traveler new to the city or resident in need of a ride home. In addition to its solar-powered operation, Kuube smartbenches are entirely constructed out of ethically sourced materials, like its easy-to-clean, recyclable aluminum body, tempered safety glass, and ash wood accents. The Kuube’s larger bench, called Plus, functions even more like a city meeting place, accommodating up to eight people. While their smallest bench, the Kuube Eco accommodates three people and could operate more like a portable WiFi-ready traveling companion.

Designer: Kuube

Continue reading
  8 Hits

Copyright

© Flipboard and it's respective authors

8 Hits
FEB
24

Apple fans are obsessed with this TikToker’s awesome iPhone hack

A newly unearthed iPhone hack shows how users can quickly rearrange multiple apps on their home screen all at once.The nifty trick makes it a lot easier for people to set up their iPhone exactly how they want.

As an avid iPhone user for more than a decade, I don’t typically come across iPhone tips and tricks that I haven’t encountered before. And sure, new tricks and workarounds inevitably bubble up to the surface every time Apple introduces a new iteration of iOS, but those discoveries are typically unearthed slowly but surely over the beta release period.

But every once in a blue moon, a new trick will appear out of nowhere and blow me away. And today, my friends, is one of those days. The most recent example comes to us via TikTok of all places. The trick in question provides for an incredibly efficient way for users to move apps en masse to a completely different phone screen. The tip is a lifesaver for anyone keen on reorganizing the layout of their iPhone or iPad.

Today's Top Deal FDA EUA-authorized KN95 masks are priced so low at Amazon, you won't believe it! Price:$21.60 ($2.16 / Count) Available from Amazon, BGR may receive a commission Buy Now Available from Amazon BGR may receive a commission

Say, for example, you want to move 8 applications from your home screen to the second page of apps on your device. Normally, you’d press down on an app and select the “Edit Home Screen” option from the contextual menu. Once the apps started wiggling, you’d manually drag each application, one by one, from the home screen to the second page of apps. Needless to say, this can quickly get tedious, especially if you’re trying to move apps from the home screen to, say, the fifth page of apps on your iPhone.

This iPhone trick, however, allows you to simultaneously select multiple applications and move them to another page all at once. Here’s how it works.

Continue reading
  8 Hits

Copyright

© Flipboard and it's respective authors

8 Hits
FEB
23

Windows 10’s Photos App Is Too Slow. Here’s the Fix

icon Stocker/Shutterstock.com, Microsoft

Windows 10’s Photos app is too slow. It was too sluggish the day Microsoft released Windows 10, and it still is. Follow our advice and your images will open three or four times as fast.

The Problem With Windows 10’s Photos App: It’s Slow!

The web is full of fixes for Windows 10’s Photos app. If Photos really does take 10, 20, or 30 seconds to open, you definitely have an unusual problem. You may want to reset the Photos app’s app data.

But most people, even when the Photos app is going as fast as it can, have a different problem. When you double-click an image in File Explorer, the Photos app just takes a little too long to open, possibly while also showing a black screen as it’s bringing up the image. For some images, you may see a blurry version of the image first before the Photos app loads a sharp version, which is the real image finally snapping into view.

You have a split second to wonder: Didn’t computers used to be faster than this? Why do images from the web load faster than images from my computer’s internal storage? Is all software doomed to get slower and slower over time?

There’s a better way. On our speedy desktop with a solid-state drive, our solution opened images three or four times as fast as Windows 10’s built-in Photos app.

Continue reading
  29 Hits

Copyright

© Flipboard and it's respective authors

29 Hits
FEB
22

How to tell if Silver Sparrow malware is hiding on your Mac

How to tell if Silver Sparrow malware is hiding on your Mac
Silver Sparrow could be in your M-series or Intel Mac. Here’s how to find out.
Graphic: Cult of Mac/Red Canary

Some of the first malware targeting both M-series and Intel Macs has affected thousands of computers. At this point, the malicious code — called “Silver Sparrow” — is not dangerous, and Apple may have pulled its teeth. But users of the latest macOS computers still might want to know if their device has it. And the same goes for owners of Intel-based Macs.

Here’s how to find out if your computer has been hit.

A brief background on Silver Sparrow

Silver Sparrow exploits a vulnerability in the macOS Installer JavaScript API as a way to execute dodgy commands. That said, the security pros at Red Canary say that the only payload is a couple of placeholder apps. The version for M-series Macs only displays a message that says, “You did it!”

But, as mentioned, it can affect both Intel and M-series Macs. And that makes it almost unique. Apple introduced the first Macs using its M1 processor in November 2021. They require software to be recompiled for the new architecture. And that includes malware. But hackers clearly weren’t phased, leading to the creation of Silver Sparrow.

For more information, read Cult of Mac’s news article from Monday, “Apple steps up fight against Silver Sparrow malware that targets M1 Macs.”

Continue reading
  8 Hits

Copyright

© Flipboard and it's respective authors

8 Hits
FEB
20

WhatsApp explains what happens if you don't bend to its will by May 15 | Pocketnow

WhatsApp explains what happens if you don't bend to its will by May 15 | Pocketnow

WhatsApp drew intense backlash earlier this year after updating its privacy policy which talks about sharing data with Facebook, essentially asking users to accept them and keep using the service, or risk losing their account by rejecting the changes. After widespread criticism and debates over privacy concerns, the company pushed the implementation of its new policy to May 15, and ever since, has been trying to educate and convince users about the changes. Now, WhatsApp has explained what happens to your account if you don’t accept the updated privacy policies after the May 15 deadline.

You won't be able to send messages or read the incoming texts

If you don’t accept the new privacy policies after May 15, you will lose some key functionality. Which ones exactly? “For a short time, you’ll be able to receive calls and notifications, but won’t be able to read or send messages from the app,” says the company on a new FAQ page titled What happens on the effective date?

As for the ‘short time’ in WhatsApp’s ominous announcement, it will last a few weeks (via TechCrunch). WhatsApp has reportedly started sending a communique detailing the aforementioned changes to its merchant partners, which are apparently business accounts that use the platform for commerce and pay a fee in exchange to the Facebook-owned company.

What are your options?

So, you’re now left with two options:

Continue reading
  9 Hits

Copyright

© Flipboard and it's respective authors

9 Hits
JAN
31

Build up Your Podcast Traffic With This Online Growth Tool

Build up Your Podcast Traffic With This Online Growth Tool

Drive more downloads and streams with Podsite

Image credit: Soundtrap/Unsplash

Let the business resources in our guide inspire you and help you achieve your goals in 2021.

January 31, 2021 2 min read

Disclosure: Our goal is to feature products and services that we think you'll find interesting and useful. If you purchase them, Entrepreneur may get a small share of the revenue from the sale from our commerce partners.

Continue reading
  140 Hits

Copyright

© Flipboard and it's respective authors

140 Hits
JAN
26

Signal is drama-free for now, but it should prepare for the worst

Technology journalist Casey Newton has a worrying revelation in the latest issue of his Platformer newsletter: amidst rapid growth, Signal is reportedly not ready for all the ways it could be misused.

The messaging app presently runs as a non-profit, and is funded by donations from users and a $50 million loan from WhatsApp co-founder Brian Acton.

Between its lack of vested business interests, its promise of end-to-end encryption via the open-source Signal protocol, and the recent changes to WhatsApp’s privacy policy that spooked its user base, Signal is now the new darling of the messaging world. The trouble is, it doesn’t yet have mechanisms to boot bad actors off its platform, like extremists who may seek to radicalize people by inviting them to private groups just by sharing a link to join.

Signal may also soon let people sign up without a phone number, to allay privacy concerns. Newton notes that could allow for impersonators on the service, and Signal doesn’t yet have a policy in place to tackle something like that.

Credit: Moxie MarlinspikeSignal CEO Moxie Marlinspike, a former cryptographer at Twitter, is going with a hands-off approach to content moderation on the messaging platform.

Employees at the company are vocalizing their concerns about these problems, but idealistic CEO Moxie Marlinspike seems keen to stick with a hands-off approach to policing content, as he believes the platform isn’t designed to amplify any content shared on it.

Continue reading
  58 Hits

Copyright

© Flipboard and it's respective authors

58 Hits
JAN
21

Pebble founder promises iMessage on Android and Windows with universal chat app

Pebble founder promises iMessage on Android and Windows with universal chat app

Beeper is a new universal chat app that’s an attempt to unify 15 different chat platforms into a single interface. The app is the work of a team that includes Eric Migicovsky, the CEO and founder of former smartwatch manufacturer Pebble, who announced its launch on Twitter. Beeper’s site notes that the project was previously known as NovaChat, and requires a $10 per month subscription.

Although Beeper integrates with world’s most popular messaging services like WhatsApp, Signal, Telegram, Slack, Twitter, Discord, Instagram, and Facebook Messenger, it’s the support for Apple’s iMessage that’s perhaps most interesting. iMessage is only officially available on Apple devices, and it’s often cited by users as something that prevents them switching to Android. Migicovsky says Beeper should allow iMessage to work on Android, Windows, and Linux, but admits that it’s “using some trickery” in doing so.

An FAQ on Beeper’s website gives a more in-depth explanation of exactly what this trickery involves. If you’ve got an always-online Mac, then you can install the Beeper Mac app to act as a bridge, similar to the approach AirMessage uses. But things get really wild if you don’t have access to a Mac, at which point Beeper says it’ll literally send each of its users a “Jailbroken iPhone with the Beeper app installed” in order to act as a bridge. At this point we should probably mention that using Beeper involves paying a $10 a month subscription, which may or may not include the cost of the iPhone.

Just in case you thought Beeper was joking, in a followup tweet, Migicovsky said that he currently has 50 old iPhone 4S’s at his desk, ready to be upcycled for use with Beeper.

If the workaround works as Beeper claims, then the result should be a universal chat app that works across MacOS, Windows, Linux, iOS, and Android, offering a unified inbox, and the ability to search across messages from each of the 15 services. It’s built on the open source Matrix messaging protocol (Migicovsky previously described NovaChat’s relationship to Matrix as akin to Gmail’s relationship with email), and although the client app itself isn’t open source, the bridges connecting it to other chat services are.

Continue reading
  69 Hits

Copyright

© Flipboard and it's respective authors

69 Hits
NOV
24

Twitter to Restart Verification Process (And Take Some Blue Checkmarks Away)

Twitter to Restart Verification Process (And Take Some Blue Checkmarks Away)

(Credit: Twitter)

Twitter will officially resume handing out verified badges to notable users early next year. But the company will also take some badges away. “We recognize that there are many verified accounts on Twitter who should not be,” the company wrote in a blog post.

On Tuesday, Twitter introduced the revamped policy that’ll guide the verification process after the program was somewhat frozen for three years. For now, the policy is simply a draft. “We want to ensure that, as an open service, our rules reflect the voices of the people who use Twitter,” Twitter says, so it’s soliciting feedback on the policy from now until Dec. 8. 

Why is the verified badge so important? The blue checkmark was created to indicate someone’s account is indeed real, and not an imposter. However, some people have viewed the badges as an endorsement from Twitter itself. This sparked a controversy in November 2017, when Twitter gave a verified badge to the organizer of a white supremacist rally in Charlottesville, Virginia. 

Facing outrage, the company hit pause on the verification program. Since then, Twitter has been quietly handing out badges to select users through backchannels. However, the public verification process was put on hold so the company could focus on securing the platform from election interference and misinformation. 

Continue reading
  157 Hits

Copyright

© Flipboard and it's respective authors

157 Hits
NOV
17

Council Post: Different Platforms, Different Purposes: The State Of Social Media Today

Council Post: Different Platforms, Different Purposes: The State Of Social Media Today

Marketing and Communications Manager at Moors & Cabot Investments.

getty

No one seems to be able to agree on who coined the term “social media.” According to a Forbes article, three people have attempted to claim that accolade, and although one of them insists that he used the term as early as 1994, the earliest online citation is reportedly from 1997. Social media as we know it, though, seems to have been “born” in 1997 with the launch of a site called SixDegrees.com.

Different platforms have sprung up from time to time, each with its own purpose. This year has been an unusual one (to put it mildly), and with so much of our time now spent in the virtual world with virtual connections, it’s prompted me to think about how much time I spend on each of the most popular platforms and why.

Popular Platforms: Then And Now

Continue reading
  105 Hits

Copyright

© Flipboard and it's respective authors

105 Hits
NOV
16

How to build a successful business model around open source software

Open source software is an increasingly important part of many organizations. Yet establishing sustainable business models to support open source development is a non-trivial problem because the underlying technologies are given away for free. 

But it’s still possible to build a successful business around open source software — I know, because my team already did it. KNIME has managed to establish a new business model for providing production-ready open source enterprise software, let explain how.

Unlike business models based on selling a proprietary version of an open source software application, we went for offering two separate but complementary pieces of software.

I’ve found this allows for a clear division between the open source application and the commercial offering so that individuals have the typical open source innovation climate, while the commercial software helps the organization productionize their results in a scalable and risk-mitigated way.

[Read: The new Chinese digital consumers your business needs to target]

Continue reading
  110 Hits

Copyright

© Flipboard and it's respective authors

110 Hits
NOV
16

How to set up a VPN on Windows 10

How to set up a VPN on Windows 10
Microsoft

If you're taking advantage of Black Friday laptop deals by picking up a new Windows 10 ($145 at Amazon) machine, you may be considering adding a virtual private network to protect your online privacy. The easiest way to get your favorite VPN up and running on your Windows 10 device is to simply download your VPN's app from the Microsoft Store and install it, just as you did on your previous device or version of Windows. Using a VPN's app is also the best way to use that VPN's bonus features -- from ad-blocking to automatically selecting the fastest connections. 

But for the tech-curious, another option is to test drive Windows 10's built-in VPN client. It may sound tricky, but the process takes about 15 to 20 minutes and can be broken down into two main components: creating a VPN profile, and then connecting to the VPN. Here's the step-by-step guide for setting up your VPN on Windows 10. 

Read more: How to download Windows 10 for free

What you'll need

VPN service: Even though you're using Windows 10 to manage your connection to a VPN, you'll still need to choose which VPN service to connect to. The service you choose will determine who's running the servers you're about to connect to. 

Check out our updated list of the best VPNs we've tested this year to get a quick idea of which provider might be best for you. You'll find lots of options, including the fastest VPNs, the best cheap VPNs, the best iPhone VPNs and the best Android VPNs. But no matter which service you choose, keep an eye out for any red flags that might indicate a less-than-private service

Continue reading
  138 Hits

Copyright

© Flipboard and it's respective authors

138 Hits
OCT
18

Does your YouTube channel feature products? You might be able to funnel shoppers to product pages

Adam Levy, The Motley Fool Published 7:00 a.m. ET Oct. 15, 2020

CONNECTEMAILMORE

Everybody's doing more online shopping these days, and that hasn't gone unnoticed by tech leaders. Facebook and Alphabet have expanded their shopping features over the last few months to capitalize on the trend.

After Facebook's early successes with social commerce, Google sees an opportunity to create similar features in YouTube. The push to get YouTube's two billion monthly active users to shop directly from the video sharing app could present a significant change to its business, accelerating revenue growth.

Shopping tags on YouTube

Instagram introduced shopping tags way back in 2016. The feature gives creators a way to link to pages where their audience can learn more about products featured in their photos and videos. It's since become a key piece of the FAANG stock's commerce strategy.

Continue reading
  104 Hits

Copyright

© Flipboard and it's respective authors

104 Hits
OCT
18

Why pay for Office and Photoshop when you can get these alternatives for free?

Why pay for Office and Photoshop when you can get these alternatives for free?
Top-quality software that costs nothing.We rely on expensive computer programs to edit photos and video, deal with office work, and protect our computers from malware. But they're not our only options. Often, commercial studios will offer the most basic versions of their products free of charge. In …
Original author: Nield
  100 Hits

Copyright

© Flipboard and it's respective authors

100 Hits
OCT
14

10,000 Vintage Recipe Books Are Now Digitized in The Internet Archive’s Cookbook & Home Economics Collection

10,000 Vintage Recipe Books Are Now Digitized in The Internet Archive’s Cookbook & Home Economics Collection

“Early cookbooks were fit for kings,” writes Henry Notaker at The Atlantic. “The oldest published recipe collections” in the 15th and 16th centuries in Western Europe “emanated from the palaces of monarchs, princes, and grand señores.” Cookbooks were more than recipe collections—they were guides to court etiquette and sumptuous records of luxurious living. In ancient Rome, cookbooks functioned similarly, as the extravagant fourth century Cooking and Dining in Imperial Rome demonstrates.

Written by Apicius, “Europe’s oldest [cookbook] and Rome’s only one in existence today”—as its first English translator described it—offers “a better way of knowing old Rome and antique private life.” It also offers keen insight into the development of heavily flavored dishes before the age of refrigeration. Apicus recommends that “cooks who needed to prepare birds with a ‘goatish smell’ should bathe them in a mixture of pepper, lovage, thyme, dry mint, sage, dates, honey, vinegar, broth, oil and mustard,” Melanie Radzicki McManus notes at How Stuff Works.

Early cookbooks communicated in “a folksy, imprecise manner until the Industrial Revolution of the 1800s,” when standard (or metric) measurement became de rigueur. The first cookbook by an American, Amelia Simmons’ 1796 American Cookery, placed British fine dining and lavish “Queen’s Cake” next to “johnny cake, federal pan cake, buckwheat cake, and Indian slapjack,” Keith Stavely and Kathleen Fitzgerald write at Smithsonian, all recipes symbolizing “the plain, but well-run and bountiful American home.” With this book, “a dialogue on how to balance the sumptuous with the simple in American life had begun.”

Cookbooks are windows into history—markers of class and caste, documents of daily life, and snapshots of regional and cultural identity at particular moments in time. In 1950, the first cookbook written by a fictional lifestyle celebrity, Betty Crocker, debuted. It became “a national best-seller,” McManus writes. “It even sold more copies that year than the Bible.” The image of the perfect Stepford housewife may have been bigger than Jesus in the 50s, but Crocker’s career was decades in the making. She debuted in 1921, the year of publication for another, more humble recipe book: the Pilgrim Evangelical Lutheran Church Ladies’ Aid Society of Chicago’s Pilgrim Cook Book.

As Ayun Halliday noted in an earlier post, this charming collection features recipes for “Blitz Torte, Cough Syrup, and Sauerkraut Candy,” and it’s only one of thousands of such examples at the Internet Archive’s Cookbook and Home Economics Collection, drawn from digitized special collections at UCLA, Berkeley, and the Prelinger Library. When we last checked in, the collection featured 3,000 cookbooks. It has grown since 2016 to a library of 10,600 vintage examples of homespun Americana, fine dining, and mass marketing.

Continue reading
  103 Hits

Copyright

© Flipboard and it's respective authors

103 Hits
OCT
07

Cut your monthly expenses by replacing Netflix, Hulu and more with free versions

Cut your monthly expenses by replacing Netflix, Hulu and more with free versions

Fall has arrived, and you might be looking to save some cash while staying entertained as the days get shorter and chillier. Luckily, you can swap out many of the services you pay for -- including Netflix, Hulu, Apple Music, DoorDash and Grubhub -- for free alternatives. The free choices may not get you the exact same thing, but can often get you pretty close, especially if you're one of the millions of people whose employment has been affected by the coronavirus pandemic, and you're looking to cut costs where you can.

Many of these free services operate with ads, unlike their paid counterparts. And the streaming services won't let you download stuff to watch or listen to offline. But some have decent free trials and deals that you can take advantage of now.

Here's how to replace all of the services you pay for with free ones. 

Peacock

Sarah Tew/CNET

Replaces: Hulu

Peacock, NBCUniversal's streaming service that debuted in July, offers a free, ad-supported tier with about 13,000 hours of content, including TV shows, movies, and some live news and sports. Standouts include Parks and Recreation, 30 Rock, The Bourne Identity and Premier League soccer highlights. You'll also get episodes of current NBC shows like This is Us the week after they air. In January 2021, The Office will also stream free with ads on Peacock. 

Continue reading
  213 Hits

Copyright

© Flipboard and it's respective authors

213 Hits
OCT
07

DHS warns that Emotet malware is one of the most prevalent threats today

DHS warns that Emotet malware is one of the most prevalent threats today

The malware known as Emotet has emerged as “one of the most prevalent ongoing threats” as it increasingly targets state and local governments and infects them with other malware, the cybersecurity arm of the Department of Homeland Security said on Tuesday.

Emotet was first identified in 2014 as a relatively simple trojan for stealing banking account credentials. Within a year or two, it had reinvented itself as a formidable downloader or dropper that, after infecting a PC, installed other malware. The Trickbot banking trojan and the Ryuk ransomware are two of the more common follow-ons. Over the past month, Emotet has successfully burrowed into Quebec’s Department of Justice and increased its onslaught on governments in France, Japan, and New Zealand. It has also targeted the Democratic National Committee.

Not to be left out, US state and local governments are also receiving unwanted attention, according to the CISA, short for the Cybersecurity and Infrastructure Security Agency. Einstein—the agency’s intrusion-detection system for collecting, analyzing, and sharing security information across the federal civilian departments and agencies—has in recent weeks noticed a big uptick, too. In an advisory issued on Tuesday, officials wrote:

Since July 2020, CISA has seen increased activity involving Emotet-associated indicators. During that time, CISA’s EINSTEIN Intrusion Detection System, which protects federal, civilian executive branch networks, has detected roughly 16,000 alerts related to Emotet activity. CISA observed Emotet being executed in phases during possible targeted campaigns. Emotet used compromised Word documents (.doc) attached to phishing emails as initial insertion vectors. Possible command and control network traffic involved HTTP POST requests to Uniform Resource Identifiers consisting of nonsensical random length alphabetical directories to known Emotet-related domains or IPs with the following user agent string (Application Layer Protocol: Web Protocols [T1071.001]).

Emotet’s success is the result of a host of tricks, a few of which include:The ability to spread to nearby Wi-Fi networksA polymorphic design, meaning it constantly changes its identifiable characteristics, making it hard to detect as maliciousFileless infections, such as Powershell scripts that also make post-infections difficult to detectWorm-like features that steal administrative passwords and use them to spread throughout a network“Email thread hijacking,” meaning it steals email chains from one infected machine and uses a spoofed identity to respond to trick other people in the thread to open a malicious file or click on a malicious link.

Below is a diagram showing some of the techniques employed by Emotet.

Continue reading
  110 Hits

Copyright

© Flipboard and it's respective authors

110 Hits
SEP
24

Ring’s new Always Home Cam is a surveillance drone for your home

We’ve all heard about surveillance drones, but those are usually matters of international espionage, not security for your home. Amazon‘s Ring wants to change that: the company today announced the Always Home Cam, a drone that helps you keep an eye on your home while you’re gone. It sounds like something out of a futuristic sci-fi movie, but it’s arriving next year for $250.

The drone is able to operate autonomously, though users can direct it to different rooms and paths. Like vacuum robots, it maps your home so you can tell it where to go without it bumping into too many things(the propellers are enclosed for protection, too).

The device is meant to allow you to survey your entire home without needing multiple cameras — something that could be particularly useful for people with large homes; suburban America comes to mind.

It films in 1080p, and can be can also be set to activate when Ring detects a disturbance or to travel along pre-set routes. I can see it being useful for monitoring your pets more closely (assuming it doesn’t freak them out) or checking to see if you left the stove on.

It is limited to indoor operation, however, so it won’t be able to keep an eye on, say, a large plot of land.

Continue reading
  108 Hits

Copyright

© Flipboard and it's respective authors

108 Hits
SEP
02

3 Things You Should Do Right Now To Set Boundaries While Working from Home

3 Things You Should Do Right Now To Set Boundaries While Working from Home

No matter what happens with the Covid-19 pandemic, one thing is clear: Working from home is going to be with us for a while. In some cases, companies have decided their employees can work from home forever. Others have given their employees the flexibility to work home for the next year, or more. If you love the flexibility of working remotely, that's great news.

For a lot of people, however, working from home has been a challenge. I understand. I've been working remotely for years, and it definitely requires a high level of planning and organization in order to be productive

Part of that means setting boundaries between work and everything else that happens at home. If you won't do that, no one else will. If you don't create boundaries and systems that help you stay focused on what matters most, you not only won't be productive, you'll end up burned out--not just in your work, but in your life.

Fortunately, there are a few things you can do to create boundaries that will help you be productive, and help you thrive during this challenging time.

1. Shut the Door

Easily the most difficult thing about working from home is that you don't have the same physical separation between life and work. When you go to an office, you know you're there to work. When you work from home, it all runs together, unless you create a dedicated space to work and go there when it's time to get things done. 

Continue reading
  97 Hits

Copyright

© Flipboard and it's respective authors

97 Hits
SEP
02

Hackers are exploiting a critical flaw affecting >350,000 WordPress sites

Hackers are exploiting a critical flaw affecting >350,000 WordPress sites

Hackers are actively exploiting a vulnerability that allows them to execute commands and malicious scripts on Websites running File Manager, a WordPress plugin with more than 700,000 active installations, researchers said on Tuesday. Word of the attacks came a few hours after the security flaw was patched.

Attackers are using the exploit to upload files that contain webshells that are hidden in an image. From there, they have a convenient interface that allows them to run commands in plugins/wp-file-manager/lib/files/, the directory where the File Manager plugin resides. While that restriction prevents hackers from executing commands on files outside of the directory, hackers may be able to exact more damage by uploading scripts that can carry out actions on other parts of a vulnerable site.

NinTechNet, a website security firm in Bangkok, Thailand, was among the first to report the in-the-wild attacks. The post said that a hacker was exploiting the vulnerability to upload a script titled hardfork.php and then using it to inject code into the WordPress scripts /wp-admin/admin-ajax.php and /wp-includes/user.php.

Backdooring vulnerable sites at scale

In email, NinTechNet CEO Jerome Bruandet wrote:

It's a bit too early to know the impact because when we caught the attack, hackers were just trying to backdoor websites. However, one interesting thing we noticed is that attackers were injecting some code to password-protect the access to the vulnerable file (connector.minimal.php) so that other groups of hackers could not exploit the vulnerability on the sites that were already infected.

Continue reading
  94 Hits

Copyright

© Flipboard and it's respective authors

94 Hits
Advertisement