Information Avast Antivirus 23.1.7883
Posted by: harlan4096 - 44 minutes ago - Forum: Avast - No Replies

Quote:Avast Antivirus 23.1.7883:
 
Homepage
Changelog
Download | Free
Download | Premier
Download | avast! cleaner
Download | Android
Discussion Topic

Print this item

Information AVG Anti-Virus / Internet Security 23.1.7883
Posted by: harlan4096 - 45 minutes ago - Forum: Avast - No Replies

Quote:AVG Anti-Virus / Internet Security 23.1.7883:

Homepage
Changelog
Download | Internet Security
Download | AV Free
Download | Android

Print this item

Information Windows 10 continues to be preferred by PC gamers
Posted by: harlan4096 - 1 hour ago - Forum: Gaming News - No Replies

Quote:Microsoft's Windows 10 operating system continues to be the most popular desktop operating system for gamers. Valve Software's latest hardware survey on its Steam gaming platform highlights that 63.51% of all Steam users run the software on Windows 10 powered devices.

[Image: steam.png]

Microsoft's Windows 11 operating system runs on 30.33% of all devices; the operating system broke the 30% mark for the first time after its launch in October 2021.

Windows 10 usage dropped by 1.91% in the month of January overall, while Windows 11 usage gained the exact amount. Windows 11, being the newer operating systems of the two, benefits from a few effects that more or less guarantee that its share continues to grow.

Microsoft, for one, ended sales of Windows 10 on its website. There is no option anymore on the Microsoft website to purchase a Windows 10 license or a device with Windows 10. Other manufacturers continue to sell Windows 10 devices and this is not going to stop anytime soon, though.

Most new devices come with Windows 11. While computer users may purchase devices with Windows 10, manufacturers start favoring Windows 11 for a number of reasons, including that support is guaranteed for longer by Microsoft than October 2025, the end of support month for Windows 10.

Windows 11's usage share is gaining rapidly with gamers, at least when compared to the overall performance of the operating system. Usage share tracking company Statcounter, for example, sees Windows 11 at 18.12% of all Windows devices worldwide. Windows 10 dominates the chart with its 68.86% of all Windows PCs.

[Image: windows-steam-distribution.png]

The difference is explained by several factors. First, that both Valve and Statcounter do not provide exact numbers, but only a view of a certain percentage of the market. Statcounter, for example, analyzes web traffic, but only part of it. Valve asks Steam users to participate in the survey, but it is not mandatory. These systems are ideal for spotting trends.

As far as the difference is concerned, it is clear that gamers require more powerful systems than the average desktop user. These systems may be newer or equipped with better hardware. More of them may be compatible with Windows 11 as a consequence, and there may also be a tendency to run the latest version of an operating system.

Microsoft started to push Windows 11 upgrade prompts to more Windows 10 devices, but this should affect non-gamer and gamer systems alike. When the company launched Windows 11, it promised that the operating system was the best Windows version for gaming. While Windows 11 included support for a few gaming related features that Windows 10 did not support or less-good, some of these features were not used by any game until the recent release of Forspoken, the first PC game to make use of

Even the gaming changes of Windows 11 version 22h2 did not make a huge impact, even though they added Variable Refresh Rate support and optimizations for windowed games. All in all, Windows 11 game performance equals that of Windows 10 though in most cases.

Now You: do you play games on PC? Which operating system do you prefer?
...
Continue Reading

Print this item

Information Firefox: menu to remove Firefox Suggest address bar entries is coming
Posted by: harlan4096 - 1 hour ago - Forum: Browsers News & Tips - No Replies

Quote:Mozilla is working on a new usability feature in the Firefox web browser that improves the removal of Firefox Suggest entries in the address bar.

[Image: remove-firefox-suggest.png]

When Firefox users type in the address bar, Firefox displays a list of suggestions automatically. These come from a variety of sources, including the browsing history and bookmarks, but also from the default search engine, provided that it supports suggestions.

Sometimes, Firefox users may want to remove certain suggestions, especially if they come up regularly. While there is no option to remove search engine suggestions, other than turning off the feature, it is different when it comes to Firefox Suggest entries.

Experienced Firefox users know that they may remove these entries using the arrow-keys on the keyboard and the keyboard shortcut Ctrl-Delete (on Mac, Cmd-Delete). Executing the shortcut removes the selected Firefox Suggest entry from the history. It is deleted from history and won't be returned anymore after the removal.

The keyboard shortcut is not highlighted by Firefox and most Firefox users are probably unaware of it. Mozilla plans to change that by adding a new icon to entries that are pulled from the browsing history of the browser.

Hovering the mouse cursor over such an entry displays a three-dots icon. A click on that icon displays the "remove from history" option, which Firefox users may then activate using the mouse button.

The new option improves the visibility of the removal option and makes the feature accessible to more Firefox users as a consequence.

Managing the history in Firefox

Firefox users may also open the history manager of the browser to remove individual browsing history records. This is done with a click on the main menu, selecting History and then Manage History from the menu that opens.

[Image: firefox-history.png]

Firefox opens a new window that lists history records. A search is provided, and filters are provided to display only records of the day, month or other periods.

A right-click on an entry displays a larger context menu with two delete options. The first, delete page, removes the individual entry from the browsing history.

The second, forget about this site, removes any record of the site from the browsing history. Selection of the second option displays a confirmation prompt.

Unlike the removal of individual entries, it will also remove cookies, cache and content preferences linked to the selected site in question.

[Image: remove.png]

Selecting forget proceeds with the deletion. Firefox notes that passwords and bookmarks of the site remain, but that the other data is removed when forget is selected by the user.

Closing words

The new removal menu is available in Firefox Nightly only at this point. If things go well, it could land in Firefox 111 at the earliest, which will be released in March.

Now You: have you removed browsing history entries in the past?
...
Continue Reading

Print this item

Information Is Google Authenticator irreplaceable?
Posted by: harlan4096 - Yesterday, 09:25 - Forum: Kaspersky Security Blog - Replies (1)

Quote:How authenticator apps work and what alternatives there are to Google Authenticator.
 [Image: authenticator-apps-compatibility-featured-true.jpg]

Many online services allow (and sometimes even require) you to set up two-factor authentication (2FA) with one-time codes. Google Authenticator is the most well-known and widely used authenticator app that generates such codes. Almost all services are compatible with it, and some even provide a link to the app when you set up 2FA. But is Google Authenticator the only option, or should you give one of the many alternatives — like Microsoft Authenticator or Twilio Authy — a whirl?

Since these alternatives exist and clearly have a userbase, you might assume they could be full-fledged replacements for Google Authenticator. But what, if any, are the pitfalls? For those who have no time to read to the end, here’s the answer straight away: don’t worry, Google Authenticator is more than replaceable. But if you’re curious about the whats, whys, and hows — read on…

How authenticators work

Let’s start with how authenticator apps work in general. Several open standards for strong authentication have been created under the umbrella of the Initiative for Open Authentication (OATH). Authenticator apps are based on these standards (along with some other things, but which aren’t the topic of this post).

OATH HOTP

Way back in 2005, the OATH HOTP (hash-based one-time password) authentication standard appeared. This laid down the fundamentals of authentication using one-time codes that are synchronously generated on the client and server sides.

The idea is that both the app and the service you’re using — remember the same secret key. Next, a cryptographic algorithm is applied to generate a unique code based on this key and a counter value. A counter is essentially a number that increments each time a new one-time code is generated. The data for calculating this code is the same on both sides, so if everything goes according to plan, the two codes will be identical. What remains is to compare them: should the code you entered match the server-generated one, the authentication is successful.

After each request for a generation session, the counter value changes so that the code is one-time and unique. An algorithm is used that rules out performing reverse calculations and extracting the secret key from this code. So even if someone intercepts the one-time code, they won’t be able to calculate the secret key, reproduce the authenticator, and generate their own new codes.

There are two main issues with HOTP. First, the counter values easily get out of sync. For example, if you request the authenticator to generate a code but don’t use it, the client-side authenticator changes the counter value, while on the service side it remains the same. As a result, the generated codes no longer match.

Second, the code stays valid until the counter value changes — potentially giving an attacker time to use the intercepted code if they somehow manage to distract the victim.

OATH TOTP

In 2011, a new standard was unveiled — OATH TOTP (time-based one-time password), which uses the current time as a counter. The principle remains the same: a secret key known to both parties is used to calculate a one-time code with the same cryptographic algorithm. And because the counter is based on Unix time, the code automatically changes at regular intervals, regardless of whether or not it is used.

Any internet-connected device now knows the exact time, so there’s no need to worry about one-time codes being out of sync. And since the interval after which the code changes is set rather short (30 seconds by default), if a one-time code is intercepted, the attacker won’t have much time to use it.

Basic principles of authenticators

These two standards are used by authenticator apps. TOTP is the more common of course, simply because it’s better in every way, but HOTP can still be found in some prehistoric implementations.

When creating an authenticator, the client and the server must set a common standard and share the key — this is the absolute minimum required for the authenticator app to work. Additional parameters can also be set for creating tokens. How do the app and the service come to an arrangement? In most cases, by means of a QR code. And this leads us to the next question: how does these codes work?

Authenticator QR code content

As far as I know, this is not among the standards developed by OATH, but rather a voluntary adherence to the format set by Google Authenticator. But either way, app-based authentication systems tend to use QR codes, in which a link (strictly speaking, a Uniform Resource Identifier, or URI) containing all the necessary information is encoded. Here’s an example of what it looks like:
 
Code:
otpauth://totp/Google:alanna@gmail.com?secret=IN2XE2LPOVZSYIDBOJSW4J3UEB4W65J7&issuer=Google&algorithm=SHA1&digits=6&period=30

As you can see, a whole bunch of parameters are transferred in the QR code, indicating the following:
  • The purpose of the URI — creation of an authentication token (that’s what otpauth at the beginning is for)
  • The authenticator standard, HOTP or TOTP; in this case, TOTP
  • The token label to be displayed inside the app — in our example, Google
  • The username — in this case, alanna@gmail.com
  • The secret key from which the codes are generated (in Base32 format) — the most important part, a long string of random characters
  • The name of the service that created the URI — in our example, Google again
  • The algorithm used to generate the codes — in this case, SHA1
  • The length of generated codes — usually six characters as shown here, but other variants are acceptable
  • The period of time after which the code expires — usually 30 seconds, but other intervals can be set.
Here’s what the corresponding QR code looks like:

[Image: authenticator-apps-compatibility-qr-alanna-1.png]
QR codes can pass a whole bunch of authentication token parameters

In fact, as we mentioned above, many of these parameters can be omitted. The token label and the username can be arbitrary, while the name of the service isn’t required at all — this information has no impact on code generation, and is there mainly for convenience. Some other parameters also aren’t mandatory.

The authenticator uses the default code generation algorithm (SHA1) and produces a six-digit code with a 30-second update period unless encoded otherwise in the URI.

Essentially, the service and the authenticator only need to set the standard (HOTP or TOTP) and share the secret key. Thus, the following URI and QR code would yield exactly the same authentication token in functional terms as the previous pair:
 
Code:
otpauth://totp/Whenever:Wherever?secret=IN2XE2LPOVZSYIDBOJSW4J3UEB4W65J7
[Image: authenticator-apps-compatibility-qr-whoever-2.png]
Many QR code parameters can be omitted or set to arbitrary values; the main thing is to share the secret key and set a standard (HOTP or TOTP)

The bottom line is that most services that use app-generated codes for authentication operate with such QR codes. Any authenticator app, in turn, has support for reading such QR codes and converting them into authentication tokens, which, in turn, generate the one-time codes. So, instead of Google Authenticator, you can choose any of the dozens of alternatives that take your fancy.

A few exceptions: services that are incompatible with regular authenticators

For some reason that’s beyond me, not everyone in the IT industry follows the above standards: some prefer to come up their own. Here are some companies whose services and programs are not compatible with third-party authenticator apps (including Google Authenticator).
  • Apple. The guys at Cupertino have their own 2FA system, which uses no third-party apps at all. Instead, the one-time codes are generated by the operating system simultaneously on all devices linked to an Apple ID. That’s how they roll!
  • Valve и Blizzard. For security on Steam and Battle.net, the developers offer 2FA of their own creation: Steam Guard (built into Steam apps for both Android and iOS) and Battle.net Authenticator, respectively. As far as I know, there’s only one third-party authenticator app that supports these systems: WinAuth.
  • Microsoft. For Microsoft account authentication, you have to install Microsoft Authenticator. On the upside, there’s no need to enter any codes: just confirm login by tapping a button in the app. As a bonus, Microsoft Authenticator also generates standard authentication tokens, which makes it a solid alternative to Google Authenticator. Incidentally, you don’t need a Microsoft account to use it.
  • Adobe. The graphics software developer offers its own app for 2FA — Adobe Account Access — which works with similar logic to Microsoft Authenticator: login to your Adobe account is authenticated by tapping a button, not sending a code. In theory, the app also supports the creation of tokens for authentication in third-party services. However, to get Adobe Account Access to work, you must first link the app to your Adobe account, which, based on App Store and Google Play reviews, isn’t advised.
So, do I have to use Google Authenticator?

Not necessarily. All services that work with Google Authenticator will let you set up two-factor authentication using any alternative app. What’s more, many of them have significant advantages over Google’s creation.

Incidentally, we have a post about the most interesting authenticators for each popular operating system — Android, iOS, Windows, and macOS. And finally, if you’ve read this text in its entirety, then something tells us you might be interested in andOTP if you’re on Android, and OTP auth if you’re on iOS.

...
Continue Reading

Print this item

Information Google Revolution? Search, Maps, and AI Take Center Stage at February 8th Live Event
Posted by: harlan4096 - Yesterday, 09:20 - Forum: Software & Services News - No Replies

Quote:Google plans to hold an event on February 8, 2023, called Live from Paris, where it will share information about several of its core products, including Search and Maps.

[Image: google-live-from-paris.png]

The event will be streamed live on YouTube at 8:30 AM ET (which is 14:30 CET). The event description, as short as it may be, highlights that the event's focus is on the company's core products Search and Maps.
 
Quote:We're reimagining how people search for, explore and interact with information, making it more natural and intuitive than ever before to find what you need.

Join us to learn how we're opening up greater access to information for people everywhere, through Search, Maps and beyond.

The thumbnail that Google uses for the event features other Google products. References to Google Lens, Shopping, and Translate are found on it.

While not mentioned explicitly by Google, it is expected that Google will unveil its plans on integrating Artificial Intelligence technology into its products. Microsoft started to test an integration of ChatGPT, a popular language mode optimized for dialogue, in its Bing Search engine recently.

ChatGPT could become a serious threat to Google's dominance in search. Google Search has usage shares of over 90% in many regions of the world, both on desktop and on mobile. Microsoft Bing, second in search globally, has a usage share of less than 10% in most regions.

Alphabet, the parent company of Google, has gradually reduced its dependence on advertising revenue, but advertising still makes up almost 80% of the company's total revenue. Advertising is heavily dependent on Google Search, which contributes more than 50% to the total revenue, as well as YouTube and Google Network ads.

Google Core Read and Google's LaMDA response

Any threat to Google's core search business is taken seriously by the company because of that. It is no surprise that Google CEO Sundar Pichai declared a "code red" regarding the rise of artificial intelligence in competing search products.

Pichai revealed in Google's latest earnings call that the company had big plans for artificial intelligence, which it would reveal in the coming months. While Pichai did not provide any details on Google's plans during the call, he stated that Internet users would be able to use its "newest, most powerful language models as a companion to search".

One of the first products could be a ChatGPT competitor by the company's LaMDA team.  LaMDA, short for Language Model for Dialogue Applications, is built on Transformer, a "neural network architecture that Google Research invented and open-sourced in 2017". Like ChatGPT, LaMDA is trained specifically for dialogue.

Whether the event will indeed be about AI integration in Google core products, or just a teaser of things to come later in 2023 or 2024, remains to be seen.

Now You: what do you expect from Google's event?
...
Continue Reading

Print this item

Information Discover the Real Reason Behind Microsoft's Release of Office Sniffing Update KB50217
Posted by: harlan4096 - Yesterday, 09:16 - Forum: Microsoft Windows News - No Replies

Quote:Microsoft released the Windows update KB5021751 in mid-January via Windows Updates to collect data on unsupported Office installations on Windows systems.

[Image: unsupported-office-check-windows.png]

Windows systems with the "receive updates for other Microsoft products" setting enabled receive the update via the operating system's built in updating system.

The initial version of the support page revealed little details on the update, other than that it would help "Microsoft identify the number of users who are running out-of-support (or soon to be out-of-support) versions of Office, including Office 2013, Office 2010, and Office 2007".

Missing KB5021751 information addedAn update of the support page provides some of the missing details. According to the updated section, KB5021751 is gathering data from "registry entries and APIs" and won't leave traces behind after it has retrieved the information.

Microsoft claims furthermore that it would not collect data on licenses, users or third-party products using the update. As Microsoft states in the updated details for KB5021751, the company values, protects and defends its customers' privacy.

Microsoft emphasizes in the update description that old Office versions pose a potential security risk, and that old Office installations may "face performance and reliability issues over time". The company fails to provide specifics regarding the issues that users of Office 2007, 2010 or 2013 may encounter.

It is also unclear what Microsoft means when it states that it collects the data to "determine how best to support and service these systems". Office 2007 and 2010 are no longer supported by Microsoft, and Office 2013 reaches end of support in April 2023.

Microsoft could use the data to develop and publish critical security updates for out-of-support versions of Office, if the population is large enough to warrant that. Microsoft makes no such promise, on the other hand, and there are certainly other, less user-friendly possibilities regarding the data.

Microsoft could, for example, advertise Microsoft 365 to these users, or an upgrade to Office 2021 to stay supported.

Another thing that is unclear is whether Microsoft would limit the offers to still supported versions of Windows. Quite a few Office 2013 and earlier installations are run on Windows 8.1 or older versions of Windows. Upgrade offers to Microsoft 365 or Office 2021 would not help these customers, as their operating systems are no longer supported by Microsoft.

It is also unclear if Microsoft would limit security updates for out-of-support versions of Office to Windows 10 and newer systems.

Now You: what is your take on the development?
...
Continue Reading

Print this item

Information Chrome and Edge support NVIDIA RTX Super Resolution
Posted by: harlan4096 - 06 February 23, 09:25 - Forum: Browsers News & Tips - No Replies

Quote:NVIDIA unveiled a new technology in January 2023 that is capable of upscaling videos to 4K resolution on the company's most powerful graphics cards. Called RTX Video Super Resolution, it is designed specifically to upscale low resolution videos to higher resolutions.

[Image: nvidia-rtx-video-super-resolution.png]

NVIDIA explained that the technology upscales resolutions between 360p and 1440p with a frame rate of up to 144Hz.

The company published an introductory video on YouTube that showcases the new technology. In the video, NVIDIA compares 1080p upscaling to its RTX Video Super Resolution upscaling to 4K.

Designed to improve video streaming on devices with NVIDIA video cards, the technology "ses AI to improve the quality of any video watched in a browser by removing blocky compression artifacts and upscaling video resolution".

The upscaling technology should improve a video's sharpness and clarity, according to NVIDIA. It will also help people watch content on high resolution displays in native resolution.

RTX Video Super Resolution is only available on PCs that run an RTX-30 or RTX-40 series GPU. Upcoming graphics cards will support the feature as well, and NVIDIA's Product Line Manager for Content Creators, Gerardo Delgado, revealed that the feature will also come to RTX-20 series at a later point in time.

RTX Video Super Resolution depends on support in web browsers or other tools as well. Google added the feature to its Chrome Early Stable 110 browser and has enabled it by default in the browser. Chrome engineers who added the commit to the source of the browser noted that the feature is controlled in the NVIDIA Control Panel app. It is turned off by default at this point, and needs to be enabled manually by users first before it becomes available in Google Chrome. Microsoft plans to implement similar functionality in the company's Edge browser.

The technology  may become available in other web browsers and applications as well, but no plans have been announced so far regarding this.

NVIDIA RTX Super Resolution requirements
  • Video cards: NVIDIA RTX-30 or RTX-40 series. Later, RTX-20 series.
  • Apps: Google Chrome or Microsoft Edge. Other browsers or apps may follow at a later point.
  • Driver: A yet to be released NVIDIA driver that adds a preference for the feature to the Control Panel.
  • Display: A display suitable for displaying ultra high resolutions, e.g., 4K.
Now You: have you watched upscaled video in the past?
...
Continue Reading

Print this item

Lightbulb Improve KeePass security with this simple configuration change
Posted by: harlan4096 - 05 February 23, 09:34 - Forum: Security Discussions & Tips - No Replies

Quote:KeePass, like many other password managers, relies on a primary password that protects the entire database of passwords and information. If an attacker manages to obtain that single password, all other passwords and information is unlocked.

[Image: keepass.jpg]

The password manager stores its database locally, which means that users do not have to worry about server breaches that steal password vaults, like the recent LastPass incident. Some KeePass users host their password files in the cloud, which opens up the possibility of the password database being copied again through server-side attacks.

Brute force attacks are still very common when it comes to cracking encrypted password databases. Most attackers use dictionaries for that, which contain hundreds of thousands or even millions of common passwords. Real brute force attacks are expensive, as every combination of characters needs to be tested.

Considering that passwords may consist of uppercase and lowercase letters, digits and symbols, this soon gets way to expensive in most cases.

Increasing KeePass security

[Image: keepass-change-password-masterkey.png]

The primary key that unlocks the KeePass database is of utmost importance. If it is weak, chance is high that a potential attacker may be able to brute force or even guess it.

KeePass users have two main options at their disposal to increase the security of the account. The first is the master password itself. Increasing the length of the password improves the security exponentially.

While that means having to memorize a new password, it is the best option to improve the security of the password database.

To do so in KeePass Password Safe, unlock the password database with the master password and select File > Change Master Key using the menu at the top.
Type the new primary password in the master password and repeat password field and select OK to complete the process.

Note that it needs to be longer than the old to improve security. Also, using a combination of letters, digits and symbols is recommended.

The Key Derivation settings

[Image: keepass-key-derivation.png]

The second option that KeePass users have is to change the key derivation function and make changes to its number of iterations.

KeePass supports several, including Argon2d, Argon 2id and the classic AES-KDF.

If AES-KDF is selected, KeePass users may either want to increase the number of iterations from the default 60,000 to a higher value, or switch the function to Argon2d instead.

Higher iterations extend the time it takes to enter the password linear. While that may add a small delay to the user's own opening of the password database, it makes brute forcing attacks more expensive as it takes longer to test each password.

Select File > Database Setting and then Security to display the current configuration of the database that is open in KeePass.

The key derivation function lists the function that is used. AES-KDF displays just the number of iterations below, which users may want to increase to 600,000.

KeePass users may also switch to using Argon2d instead, which promises even better protection against brute force attacks.
...
Continue Reading

Print this item

Information Microsoft 365 ad blocks Windows 10 desktop access for some users
Posted by: harlan4096 - 05 February 23, 09:32 - Forum: Microsoft Windows News - No Replies

Quote:Several Windows 10 users reported that a banner for Microsoft 365 has prevented them from reaching the Windows 10 desktop on boot.

[Image: windows-ad-microsoft-365.png]

According to the reports, Microsoft displayed a fullscreen Microsoft 365 advertisement on the screen before the start of the operating system. The screen, similar to the dreaded Windows Experience screens, is displayed fullscreen.

Tip: Windows 10 users who do not want to see any out-of-box experience screens on Windows startup may disable "get tips and suggestions when using Windows" under System > Notifications to skip all of them. Another option that Windows users have to avoid these offers is to use a local account instead of a Microsoft account when using the operating system.

It stated "Access granted: We're giving you a free trial of Microsoft 365 Family. Below the title were listed some of the benefits of the subscription. Other users saw a different title, stating that they could save 50% on the first year of a Microsoft 365 Family subscription.

Two button were displayed on the page: Next and No, Thanks. Activation of Next should have opened the account setup page to accept the offer, while no, thanks, should skip the offer and load the desktop of the operating system

It appears, however that Microsoft has erroneously switched the links of the buttons. In other words: users who did not want to accept the offer were taken to the sign-up page when they selected the "no, thanks" option. Users who wanted to accept the offer, on the other hand, were taken to the desktop.

First reported by Bleeping Computer, the issue seems to have affected more than just a few users. One user uploaded a video of the issue to Reddit, stating "Windows tried to pull a fast one on me by switching buttons". At least one user reported that they signed-up for Microsoft 365 to get to the desktop. The user cancelled the subscription immediately after reaching the desktop though.

Windows 10 users who, in their desperation, signed-up for a Microsoft 365 account should sign-in to their Microsoft Account to cancel the subscription before Microsoft is charging the credit card.

The experienced issue is certainly a bug. One has to wonder though how something as obvious as this can slip through the cracks at Microsoft.
Now You: do you use Microsoft 365?
...
Continue Reading

Print this item

[-]
Welcome
You have to register before you can post on our site.

Username/Email:


Password





[-]
Recent Posts
Avast Antivirus 23.1.7883
Avast Antivirus 23...harlan4096 — 09:44
AVG Anti-Virus / Internet Security 23.1....
AVG Anti-Virus / I...harlan4096 — 09:43
Macrium Reflect 8.1.7367
Macrium Reflect 8....harlan4096 — 09:39
K-Lite Codec Pack 17.4.1 / 17.4.3 Update
Changes in 17.4.3 ...harlan4096 — 09:37
Google Chrome 110.0.5481.78
Google Chrome 110....harlan4096 — 09:33

[-]
Birthdays
Today's Birthdays
avatar (46)tsorenHievy
Upcoming Birthdays
avatar (44)hapedDow
avatar (43)komriwat
avatar (35)showercurtains
avatar (46)PeterWhink
avatar (47)neuthrusBub
avatar (43)myhotseeve
avatar (43)Edwinmub
avatar (43)dimaWeami
avatar (38)svoyaEnuct
avatar (36)TranoTymn
avatar (36)MezirLal
avatar (47)listfquoto
avatar (43)dima6sarPrave
avatar (35)Michaelaburi
avatar (43)dpascoal
avatar (48)Ronaldduh
avatar (36)legalgauch
avatar (41)Baihu

[-]
Online Staff
There are no staff members currently online.

>