If your WiFi router or cable modem drops off frequently and only comes back when you power cycle one of them, you might be interested in the WiFi ResetPlug. The device plugs into your outlet and then you plug your router, modem, or combination access point into the ResetPlug. Once you setup the WiFi ResetPlug, it will automatically detect if you have Internet access and WiFi … [Read more...]
Website BleepingComputer being sued for negative review of SpyHunter
BleepingComputer is a popular website for software utilities such as ComboFix and forums to assist with virus removal. Following a post to their forums where SpyHunter was recommended against, the company behind the software, Engima Software Group USA, LLC, filed suit against BleepingComputer. On February 1st, BleepingComputer posted an announcement to the community asking … [Read more...]
HP JetIntelligence optimizes toner for LaserJet printers
HP's latest LaserJet printers are using a feature that they are calling JetIntelligence. Changing the chemical make-up of toner, HP has been able to use their JetIntelligence toner cartridges in new LaserJet printers that get 33% more pages per cartridge while printing the first page 40% faster and using up to 53% less energy. The ability to get more prints at lower … [Read more...]
Apple event March 21 – “Let us loop you in.”
Apple will be giving a live keynote on March 21st at 10am PDT. The live page has the teasing tag line "Let us loop you in." Invites have gone out to the press. The teaser is unclear if the event will talk about Apple Watch bands, Apple's spaceship looking headquarters currently under construction, or something else for the iPhone. You can watch the keynote live … [Read more...]
Microsoft updates IE New Tab page to nag for Windows 10
March's Patch Tuesday includes a bad example of Microsoft abusing the security update cycle. KB3139929 is an actual security update. It resolves remote code execution vulnerabilities. This security update resolves several reported vulnerabilities in Internet Explorer. The most severe of these vulnerabilities could allow remote code execution if a user views a specially crafted … [Read more...]




