Dismiss this notice
PureVPN Special COVID-19 Father's Day 2020 Giveaway - https://www.geeks.fyi/showthread.php?tid=11841

Information New Microsoft Edge gets option to navigate back and forward using Backspace
Posted by: harlan4096 - 33 minutes ago - Forum: Browsers News & Tips - No Replies

Quote:
[Image: microsoft-edge-backspace-navigate.png]

All modern web browsers keep track of a tab's history so that users may go back or forward in history easily. A click on the back or forward button opens the previous page or the next page that was open in the browser. Some browsers support additional functionality, e.g. a right-click feature to display the entire tab history in a menu to make jumping to a particular page more convenient.

Google changed the behavior of Chromium's back and forward behavior several times in recent years. The company has started to make use of caching to make the switching near instant, and it also removed the handy Backspace keyboard shortcut to load the previous page of a tab.

Users of the new Microsoft Edge web browser may soon be able to use the Backspace key for forward and backward navigation in the browser. Microsoft launched a new experimental flag in the Canary version of the browser which, when activated, enables the functionality in the browser.

Microsoft Edge Canary is the cutting edge version of the Edge browser; it is the least stable but gets features first. Most features introduced in Canary land in Edge Stable eventually; it is not clear if the feature will be enabled by default or if users need to enable it explicitly.

Here is how you enable the backspace shortcut in Microsoft Edge currently:
  1. Load edge://flags in the browser's address bar.
  2. Search for Backspace, the full title of the flag is Assigns the Backspace key to go back a page.
  3. Set the flag to enabled.
  4. Restart the web browser.
You may now use the Backspace key to go back in history or Shift-Backspace to go forward. The shortcut affects the active tab only, and works only if no form element is active on the page.

There is no option to go back or forward multiple pages at a time, but you can hit the Backspace key multiple times to achieve that. Edge users who prefer to use the keyboard whenever possible may find the new shortcut useful. It is unclear if this will land in Google Chrome or other Chromium-based browsers as well in the future.

Now You: How do you go back and forward in your browser of choice?
...
Continue Reading

Print this item

Lightbulb Linus Torvalds Wishes Intel's AVX-512 A Painful Death
Posted by: harlan4096 - 7 hours ago - Forum: Hardware News - No Replies

Quote:
[Image: yVZyrJmJGa7eL2z8Dn2UNV-970-80.jpg]

Death to AVX-512!

According to a mailing list post spotted by Phoronix, Linux creator Linus Torvalds has shared his strong views on the AVX-512 instruction set. The discussion arose as a result of recent news that Intel's upcoming Alder Lake processors reportedly lack support for AVX-512.

Torvalds' advice to Intel is to focus on things that matter instead of wasting resources on new instruction sets, like AVX-512, that he feels aren't beneficial outside the HPC market.

AVX-512 support debuted in Intel's Xeon Phi x200 (codename Knights Landing) processor in 2016. However, the instruction set later made its way into the chipmaker's other offerings, such as Skylake-SP, Skylake-X, Cannon Lake and Cascade Lake. Currently, Intel's both Cooper Lake and Ice Lake processors support certain AVX-512 subsets. While Alder Lake seemingly lacks AVX-512, the chipmaker has confirmed that Tiger Lake will exploit the instruction set.

We've included a copy of Linus Torvalds' opinion on AVX-512 below:
 
I hope AVX512 dies a painful death, and that Intel starts fixing real problems instead of trying to create magic instructions to then create benchmarks that they can look good on.

I hope Intel gets back to basics: gets their process working again, and concentrate more on regular code that isn't HPC or some other pointless special case.

I've said this before, and I'll say it again: in the heyday of x86, when Intel was laughing all the way to the bank and killing all their competition, absolutely everybody else did better than Intel on FP loads. Intel's FP performance sucked (relatively speaking), and it matter not one iota.

Because absolutely nobody cares outside of benchmarks.

The same is largely true of AVX512 now - and in the future. Yes, you can find things that care. No, those things don't sell machines in the big picture.

And AVX512 has real downsides. I'd much rather see that transistor budget used on other things that are much more relevant. Even if it's still FP math (in the GPU, rather than AVX512). Or just give me more cores (with good single-thread performance, but without the garbage like AVX512) like AMD did.

I want my power limits to be reached with regular integer code, not with some AVX512 power virus that takes away top frequency (because people ended up using it for memcpy!) and takes away cores (because those useless garbage units take up space).

Yes, yes, I'm biased. I absolutely destest FP benchmarks, and I realize other people care deeply. I just think AVX512 is exactly the wrong thing to do. It's a pet peeve of mine. It's a prime example of something Intel has done wrong, partly by just increasing the fragmentation of the market.

Stop with the special-case garbage, and make all the core common stuff that everybody cares about run as well as you humanly can. Then do a FPU that is barely good enough on the side, and people will be happy. AVX2 is much more than enough.

Yeah, I'm grumpy.
Linus

Torvalds, who was once an Intel user, recently saw the light and crossed over to the Red Team. His Ryzen Threadripper 3970X accelerated his workloads by threefold.
...
Continue Reading

Print this item

Information Microsoft appears to have fixed the Recovery Partition hell in Windows 10
Posted by: harlan4096 - 7 hours ago - Forum: Windows News - No Replies

Quote:
[Image: windows-partitions-recovery.png]

Windows 10 users who perform a fresh install of the operating system won't run into issues related to the creation of Recovery Partitions on the operating system anymore starting Windows 10 version 2004 according to reports.

The Recovery Partition is an essential part of the Windows installation; it may be used to restore the operating system if issues are encountered.

One of the main issues associated with the Recovery Partition on Windows was that it was often placed at the very beginning of the disk. The layout would start with the Recovery Partition and then the main partition with Windows itself.  The problem with that layout is that Windows cannot extend the Recovery Partition easily, e.g. when it lacks the space for the required data. Windows would then create another Recovery Partition on the disk; systems would end up with multiple Recovery Partitions and seemingly little options to detect or delete old ones.

Tip: read about the differences between GPT and MBR style partitions.

Diskpart and third-party partition tools can remove old recovery partitions from the operating system, and some tools may also help in adding the freed up space to an existing volume. Most computer users may not feel comfortable running these applications, especially considering that the amount of disk space that is gained is minimal.

The correct layout puts the Recovery Partition behind the operating system partition on the disk. Some manufacturers and Microsoft itself may do so already for devices that they sell. The following Disk Management screenshot is from a Surface Go device that I bought some time ago.

Microsoft itself recommends that manufacturers place the Recovery Partition right after the Windows partition on the drive on Windows.
 
Quote:We recommend that you place this partition immediately after the Windows partition. This allows Windows to modify and recreate the partition later if future updates require a larger recovery image.

Starting with Windows 10 version 2004, Windows will use the correct partition structure for new installations. The company has not officially confirmed the change, but Windows Latest reports that a Microsoft support member confirmed it to them when asked about it.

How to detect and delete old Windows Recovery Partitions

You can use Disk Management to display the list of partitions on the system. One option to open the interface is to use Windows-X to open the admin menu and select Disk Management from the menu that opens.

If you notice multiple recovery partitions, you may want to delete old ones. But how do you determine which partitions are old and which is the current one?
  1. Open an elevated command prompt, e.g. by opening Start, typing cmd.exe, holding down Shift and Ctrl, and selecting the Command Prompt result.
  2. Run the command reagentc /info, it displays which Recovery Partition, if any, is active.
  3. Open Start again, type PowerShell, hold down Shift and Ctrl, and select the result to open an elevated PowerShell window.
  4. Type get-partition, it displays information about the partitions including the partition number.
All that is left to do is compare the number of the active partition that you got under (2) with the partition numbers under (4).
...
Continue Reading

Print this item

Information Avast_Security_News: COVID-19 tracking apps are easy targets for hackers
Posted by: harlan4096 - Yesterday, 07:05 - Forum: Avast Blog News and Info - No Replies

Quote:
[Image: TVDumYE.png]

Plus more newsbytes of the week, including more TikTok security concerns and a major data breach affecting millions of online gamblers

In their haste to bring COVID-19 contact tracing apps to market, many developers around the world have skimped on security, giving hackers easy targets from which they can steal all kinds of sensitive information, such as the names of the sick, national ID numbers, location data, and more. Countries have been deploying the tracking apps in an effort to identify disease hotspots and limit the spread of the virus while they ease lockdown orders. Qatar, India, the U.K., and the Netherlands are just some of the nations who learned their tracking apps had security flaws only after they’d been put into use. 
 
The U.S. is just starting to use contact tracing apps, but instead of deploying one national app, each state must create their own. Working with low cybersecurity budgets, states are beginning to do just that but with mixed results. Politico reported that public debate centers on the question of who should have access to the collected information. The constant revelations of weak cybersecurity is only exacerbating the problem. Shortly after North Dakota released its Care19 contact tracing app, it was discovered that user location data was being shared with marketing service Foursquare. Members of Congress have started submitting bills focused on app legislation, covering data security and privacy, but this deeply divisive topic is still in its nascent stages on Capitol Hill. 

Avast security evangelist Luis Corrons feels that new app laws are beside the point. “The solution is already here,” Corrons said, “and there is no need for extra legislation. The success of these apps relies on the people using them.” As for the right software to use, Corrons points to the joint venture between two tech giants. “Apple and Google worked together to create an API that can create contact tracing apps. It requires user consent, works with Bluetooth, is anonymous, and does not store personal information on any server, protecting user privacy all the time. And it works for both Android and iOS.” It remains to be seen whether or not any of the states’ will put the Apple-Google API to use. 

This week’s stat
53

The number of countries that will soon be required to secure connected vehicles against cyberattacks under a new United Nations regulation.

TikTok iPhone app reads your clipboard

As security researchers were beta testing Apple’s iOS 14, they learned that the popular Chinese social media app TikTok can see whatever is saved on the user’s clipboard, that system-wide temporary holding location for any files that are cut and pasted. According to Computing, the researchers learned about the app’s secret spying due to a new security protocol in the upcoming iOS 14 that notifies users when any app accesses the clipboard. Earlier this year, researchers discovered that TikTok accessed the clipboard on Android devices, which the app developer claimed was unintentional and a mistake, a statement that now seems dubious. Some organizations such as the U.S. military has banned the use of the app, categorizing it as a security threat

Tech giants protest new anti-privacy law in Hong Kong

New legislation in Hong Kong is being seen as a measure to intimidate free speech, and in protest some of the largest online entities have banded together in unity to stop processing data requests from the Special Administrative Region (SAR) of China. The companies WhatsApp, Telegram, Facebook, Twitter, LinkedIn, and Zoom have all suspended cooperation with Hong Kong police until an international consensus on how to react has been reached. According to InfoSecurity, the vaguely-worded new law gives Chinese authorities the power to punish acts of “terrorist activities” and “subversion” with life imprisonment or death, as well as the right to search the premises of any property without a warrant. 

This week’s quote

"Details exposed from one breach could be re-used to compromise accounts used elsewhere. The message is simple – consumers should use different passwords for every account, and organizations should stay ahead of the criminals by tracking where the details of their employees and customers could be compromised,” warns Rick Holland, CISO at Digital Shadows, in relation to securing users against breached credentials. Read more here

Major card skimming scheme linked to North Korean hackers

Researchers believe the North Korean nation-state Lazarus group, also known as Hidden Cobra, is most likely the source of a wide-reaching credit card skimming scheme that has been going on for at least a year. Bleeping Computer reported that the code and domains associated with the scheme come straight from Hidden Cobra’s playbook, though it hasn’t been confirmed that the hacking group orchestrated the plan. The victimized online shops where the skimming malware was planted include Claires, Wongs Jewellers, Focus Camera, Paper Source, Jit Truck Parts, CBD Armour, and many others.  

Clubillion leaks personal data of millions of users

Casino app Clubillion suffered a massive data breach, as discovered by researchers doing a web mapping project when they stumbled upon an unsecured Elasticseach database hosted on Amazon Web Services (AWS). Not only did the database contain millions of user records, but it gained 200 million new records every day, sometimes considerably more, reported InfoSecurity. The records included every action taken by the players (winning, losing, updating account, etc.) as well as email addresses, private messages, IP addresses, and more. The researchers alerted Clubillion of the breach on March 23. A couple of weeks later, the open database was secured. 

This week’s ‘must-read’ on The Avast Blog

How does a banking Trojan manage to sneak by Google security so it can pose on the Google Play Store as a genuine app? Learn how the Cerberus banking Trojan did just that by pretending to be a currency converter and subsequently got downloaded over 10,000 times before Avast discovered and reported the malware to Google
...
Continue Reading

Print this item

Information Leaked AMD EPYC Milan Specifications Tease Possible 64 Zen 3 Cores At 3 GHz
Posted by: harlan4096 - Yesterday, 06:49 - Forum: Hardware News - No Replies

Quote:
[Image: NSngcxmDuHnvgx2MBHNQEZ-970-80.jpg]

Welcome to the Zen 3 cookout.

Igor's Lab has some new information on AMD's forthcoming EPYC (codename Milan) processors. The site claims that fresh server chips are slated to replace the EPYC 7002-series (codename Rome) later this year.

We already know from AMD's official disclosures that Milan, which probably adopts the EPYC 7003-series moniker, will undoubtedly debut with AMD's next-generation Zen 3 microarchitecture. Predictably, AMD will continue to tap TSMC's manufacturing abilities for Milan. Word around town is that the third-generation EPYC processors would benefit from the foundry's improved 7nm+ process node, but both the foundry and AMD have changed the name of the 7nm+ node on their respective roadmaps, so that remains up for debate.
 
According to the leak, despite being on a new microarchitecture, Milan will slot fine into the existing Socket SP3. However, Milan is the last wave of EPYC parts to grace the socket as its successor (codename Genoa) is expected to usher in the new Socket SP5. In regards to the primary leaked specifications, Milan shouldn't deviate much from Rome. The Zen 3 processors still max out at 64 cores, come with support for eight DDR4 memory channels, DDR4-3200 modules and high-speed PCIe 4.0 lanes.

The specifications from Igor's report are for the A0 stepping silicon, meaning these are early engineering samples. While we don't expect the core or thread count to differ, the clock speeds will likely improve with the final silicon. As with any leak, there's also the possibility the information is incorrect, but the details largely line up with our expectations for the EPYC Milan chips.

100-000000114-07 100-000000114-09 100-000000117-03

Revision A0 A0 A0
Design 8 x 1 x 8 8 x 1 x 8 4 x 1 x 8
Cores / Threads 64 / 128 64 / 128 32 / 64
Boost Clock (GHz) 2.2 3.0 3.0
L1 Cache (MB) 2 2 1
L2 Cache (MB) 32 32 16
L3 Cache (MB) 256 256 128
Memory Support DDR4-3200 DDR4-3200 DDR4-3200
TDP / Max TDP (W) 225 / 240 225 / 240 180 / 200*Specifications are unconfirmed.

The 64-core models (100-000000114-07 and 100-000000114-09) reportedly use a 8+1 design, meaning eight Zen 3 Core Complex Dies (CCDs) and one I/O die. The 32-core model's composition, on the other hand, comprises of four Zen 3 CCDs and one I/O die.

The 64-core SKUs apparently have 2MB of L1 cache, 32MB of L2 cache and 256MB of L3 cache. The 32-core part has halved of the 64-core's cache. At first glance, Milan has the same amount of cache as Rome. However, we already know from an official AMD presentation that the compnay has made significant improvements to the cache design on Zen 3 behind closed doors.

On Zen 2, each CCD consists of two Core Complexes (CCXs), and each CCX has four cores equipped with 16MB of L3 cache. For Zen 3, AMD revamped the CCX to eight cores that are linked to 32MB of L3 cache. The new design aims to help eradicate latency and improve overall instruction per cycle (IPC).

The 64-core and 32-core Milan ES samples allegedly boost up to 3 GHz. The clock speed isn't far off from Rome's maximum boost clock for 64-core and 32-core SKUs, which is 3.4 GHz. The combination of AMD's Zen 3 microarchitecture and TSMC's matured 7nm manufacturing process should give us Milan chips with equal or superior boost clock speeds in comparison to Rome.

According to AMD's roadmap, Milan will come with a similar 120W to 225W package as Rome. At the current rumored clock speeds, Igor's sources claim that the 64-core and 32-core parts could have a 225W and 180W TDP (thermal design power), respectively.

Milan might just be a simple refresh until Genoa lands at some point in 2021, however, it's a refresh done right.
...
Continue Reading

Print this item

Information AMD Ships Out Ryzen 5 3600 CPUs in Ryzen 3 3200G Packaging
Posted by: harlan4096 - Yesterday, 06:45 - Forum: Hardware News - No Replies

Quote:
[Image: mP6DCXEkf69vBqdwZrX8PD-970-80.jpg]

In China, AMD is shipping some Ryzen 5 3600 CPUs in packaging meant for weaker chips, according to a recent Facebook post from Chinese hardware site HKEPC.

In a Facebook post yesterday, Chinese hardware site HKEPC posted photos of a Ryzen 5 3600 they recently ordered that came in a Ryzen 3 3200G box. AMD had placed a sticker seal on the box indicating that the product inside was indeed the Ryzen 5 3600, but everything else on the packaging pointed to the weaker Ryzen 3 3200G.

A Hardware Times story from earlier today elaborates that this has affected a whole batch of Ryzen 5 3600 CPUs bound for customers in China. The story attributes the incorrect packaging to Ryzen 5 3600 sales figures breaking expectations during the recent Chinese mid-year sale in June, leading AMD’s Chinese team to use old packaging instead of waiting for additional, more accurate boxes to come in. Of course, it's also entirely possible that the situation is the result of a simple mistake during packaging.

Even though these boxes did have the processors they ordered, we have to imagine customers were pretty confused. It’s not uncommon for mix-ups to happen when ordering components online- I’ve had to return CPUs to Newegg twice in a row after they accidentally sent me the wrong parts- so this is just another reminder to always double check what’s in the box (and what your system reads as installed) before you wrap up your latest build.
...
Continue Reading

Print this item

Information Ryzen Threadripper Pro 3975WX Benchmarks Suggest Impending AMD CPU Launch
Posted by: harlan4096 - Yesterday, 06:42 - Forum: Hardware News - No Replies

Quote:
[Image: AcuEPHDeF5y24LN2amwNa5-970-80.jpg]

Ryzen Threadripper getting professional

We've seen rumors about an upcoming AMD Ryzen Threadripper Pro series before, but these new alleged benchmarks from a Ryzen Threadripper Pro 3975WX just made those all seem much more real. The 32-core processor (spotted via @TUM_APISAK) has surfaced in multiple Geekbench 5 submissions.

We'd expect Ryzen Threadripper Pro CPUs to use the same blend of the Zen 2 microarchitecture and TSMC 7nm FinFET process node that has worked wonders for AMD's other processors. The Ryzen THreadripper Pro 3975WX is the second chip to show up behind the Ryzen Threadripper 3995WX. Naturally, there could be a Ryzen Threadripper Pro 3965WX to complete the lineup.

The Ryzen Threadripper Pro 3975WX benchmarks point to a chip with 32 CPU cores, 64 threads and 128MB of L3 cache, just like the Ryzen Threadripper 3970X.

It's unknown if the Ryzen Threadripper Pro processors are compatible with the current TRX40 platform. Before its launch, there were mentions of the TRX80 and WRX80 chipsets in the USB Implementers Forum (USB-IF) registry. The two chipsets were rumored to bring more memory channels and enterprise-level features.

Surprisingly, the clock speeds on the Pro variant appear to be more conservative. The Ryzen Threadripper 3970X has a 3.7 GHz base clock and 4.5 GHz boost clock. Geekbench 5 reportedly picked up the Ryzen Threadripper Pro 3975WX with a 3.49 GHz base clock and 4.23 GHz boost clock. The submissions date back to last month and could have something to do with the Lenovo workstations arriving on July 14.  

AMD Ryzen Threadripper Pro Specifications
Processor Cores / Threads Base / Boost Clock (GHz) L1 Cache (MB) L2 Cache (MB) L3 Cache (MB) TDP (W)

AMD Ryzen Threadripper Pro 3995WX* 64 / 128 ? / ? 4 32 256 ?
AMD Ryzen Threadripper 3990X 64 / 128 2.90 / 4.30 4 32 256 280
AMD Ryzen Threadripper Pro 3975WX* 32 / 64 3.49 / 4.22 2 16 128 ?
AMD Ryzen Threadripper 3970X 32 / 64 3.70 / 4.50 2 16 128 280
AMD Ryzen Threadripper Pro 3965WX* 24 / 48 ? / ? 1.5 12 128 ?
AMD Ryzen Threadripper 3960X 24 / 48 3.80 / 4.50 1.5 12 128 280
*Specifications haven't been confirmed by AMD.

Given the time frame of the submissions, the Ryzen Threadripper Pro 3975WX sample should be the end product with final specifications. Assuming that the motherboard's power delivery subsystem and cooling weren't limiting factors in the benchmarks, the Ryzen Threadripper Pro processors seem like they might come with lower clock speeds in comparison to the non-pro counterparts.

The Ryzen Threadripper 3000-series (Castle Peak) processors come equipped with a 280W TDP (thermal design power) rating. If the Pro variants end up with lower clock speeds, they may operate within a lower thermal limit.

Early chatter about the Ryzen Threadripper Pro series involved support for eight memory channels. In case you've forgotten, the normal Ryzen Threadripper chips support four memory channels, and only AMD's Epyc parts can leverage eight memory channels. If the Ryzen Threadripper Pro processors take after the Epyc siblings, then consumers could enjoy up to 2TB of memory.

Unfortunately, these newly discovered Ryzen Threadripper Pro 3975WX submissions don't shed any light on the matter. The Ryzen Threadripper Pro 3975WX was paired with quad-channel memory in all of the Geekbench 5 entries, but that doesn't mean it couldn't support eight-channel memory. The Lenovo ws2020 systems may well be utilizing a motherboard with quad-channel memory.

Lenovo will take the lid off the brand's new workstations on July 14. It's reasonable to assume that's the launch day for AMD's Ryzen Threadripper Pro army as well. 
...
Continue Reading

Print this item

Lightbulb Quantum computers and cryptography for dummies
Posted by: harlan4096 - Yesterday, 06:36 - Forum: Kaspersky Security Blog - No Replies

Quote:
[Image: quantum-computing-vs-data-encryption-featured.jpg]

We explore how encryption protects your data and why quantum computers might shake things up.

Quantum computers are capable of very quickly solving very complex problems, such that even a supercomputer would be stumped for a long time. True, most of these problems are currently somewhat removed from real life, and quantum systems themselves are largely limited. But progress does not stand still, and this technology could one day take over the world. Here’s how that affects you and your data.

Data encryption at the heart of Internet security

At the heart of protecting data on computers and online lies encryption. Encrypting means using certain rules and a character set known as a key to transform the information one wants to send into a seemingly meaningless jumble. To understand what the sender wanted to say, the jumble has to be deciphered, also with a key.

One of the simplest examples of encryption is a substitution cipher whereby each letter is replaced with a number (say, 1 for A, 2 for B, and so on). In this example, the word “baobab” would become “2 1 15 2 1 2,” and the key would be the alphabet with each letter represented by a number. In practice, more complex rules are used, but the general idea remains more or less the same.

If, as in our example, all parties share one key, the cipher is said to be symmetric. Before communication can commence, everyone must receive the key to be able to encrypt their own and decrypt others’ messages. What’s more, the key has to be transmitted in unencrypted form (the receiving parties have nothing yet to decrypt it with). And if that happens over the Internet, cybercriminals might be able to intercept it and then read the supposedly secret messages. Not good.

To get around that problem, some encryption algorithms use two keys: one private to decrypt and one public to encrypt messages. The recipient creates both.

The private key is never shared with anyone, so it can’t be intercepted.

The second, public key is designed such that anyone can use it to encrypt information, but after that, decrypting the data requires the corresponding private key. For this reason, there is nothing to fear from sending the public key in unencrypted form or even sharing it for anyone on the Internet to see. This type of encryption is called asymmetric.

In modern encryption systems, the keys are usually very large numbers, and the algorithms themselves are built around complex mathematical operations involving these numbers. Moreover, the operations are such that reversing them is next to impossible. Therefore, knowing the public key is of no use in cracking the cipher.

Quantum cracking

There is a catch, however. Strictly speaking, cryptographic algorithms are designed so as to make cracking the cipher impossible in a reasonable amount of time.

That’s where quantum computers come in. They can crunch numbers far faster than traditional computers can.

Thus, the unreasonable amount of time a traditional computer would need to crack the cipher can become perfectly reasonable on a quantum computer. And if a cipher is vulnerable to quantum cracking, that negates the whole point of using the cipher.
...
Continue Reading

Print this item

Information Firefox's Multi-Account Containers add-on gets Site Isolation feature
Posted by: harlan4096 - Yesterday, 06:13 - Forum: Browsers News & Tips - No Replies

Quote:
[Image: firefox-containers-limit-to-site.png]

Containers is an interesting feature that Mozilla implemented in the Firefox web browser some time ago. It provides users with a way to separate sites from each other, and benefits of doing so are clear: less tracking, improved privacy, and the ability to sign-in to multiple accounts in a single browsing session.

The Mutli-Account Containers add-on adds configuration options to the feature. You use it to create and edit containers, and to assign sites to containers. The extension ships with the four default containers personal, work, banking and shopping, and users may add more containers, rename existing ones, or customize them with different colors or icons.

Up until now, it was possible to assign certain sites to specific containers. An assigned site would always be opened in that particular container in Firefox to separate it from others.

The new major Firefox Multi-Account Containers release that just landed on Mozilla AMO introduces another feature: site isolation. Besides assigning sites to containers, it is now possible to limit containers to particular sites.

You may use the improved functionality to isolate sites similarly to how standalone extensions such as Facebook Container isolate Facebook from the rest of the browsing session.

Usage is straightforward. Load a site or sites in a particular container in Firefox, e.g. facebook.com. Select the Multi-Account Containers icon in the toolbar and activate the manage containers option in the interface that opens.

Select the container that you added the site or sites to, and check the "limit to designated sites" box on the page that opens.

Last step in the process is to open the sites again in a new tab and check the "always open in container" option to make sure that the site is opened in that container whenever it gets loaded in the browser.

You may use the site isolation feature to limit sites to specific containers, and make sure that only the selected sites do get opened in these containers.

The feature works really well for search engines. Say you assign Google Search or Bing Search to a container and make sure that only the search engine is opened in that container. Run a search and click on a result, and you will notice that the result is opened in a new tab outside the container. The same can be done for sites that post links that point to third-party resources, e.g. Reddit, Facebook, Pinterest, any search engine, or Twitter.

Now You: Do you use Firefox's Containers feature?

...
Continue Reading

Print this item

Information Windows 10 May 2020 Update block may still not be removed for many Surface devices
Posted by: silversurfer - 11 July 20, 18:32 - Forum: Windows News - No Replies

Quote:Microsoft released the Windows 10 May 2020 Update on May 27, making it available for eligible users who wanted to update it through Windows Update or through the various other methods, such as using the Media Media Creation tool or the Update Assistant. However, the OS update did come with a bunch of known issues, which were interestingly never listed during the 15 months of testing that the version went through.
 
These issues and other undocumented incompatibilities resulted in the Redmond giant blocking the update for many users, including its own Surface devices. However, the company said that it removed the update block for Surface devices earlier this month after it fixed the issue affecting devices with ‘Always On, Always Connected’ feature. The affected devices included Surface Pro 7 and Laptop 3 devices. However, it looks like the update block is still in place for most users.
 
[Image: 1594399538_windows_10_may_2020_update_re..._story.jpg]

The original verbiage on the release information page has been recently updated (spotted by ZDNet’s Mary Jo Foley) to imply that the block is only removed for devices that may not have “any other safeguards” that affect the devices. This contrasts with the earlier statement suggesting that the “safeguard hold has been removed”. Additionally, Foley notes that in addition to the Pro 7 and Laptop 3, other devices like the Book 2 and Go 2 are also being blocked from updating to version 2004.

Read more: https://www.neowin.net/news/windows-10-m...ce-devices

Print this item

[-]
Welcome
You have to register before you can post on our site.

Username


Password





[-]
Recent Posts
New Microsoft Edge gets option to naviga...
All modern web ...harlan4096 — 13:51
GFYI [Official] PureVPN Special COVID-1...
TOP PRIZE ENTRY     ...jamred21 — 07:14
TinyWall 3.0.7
Changes in 3.0.7: ...harlan4096 — 06:57
Linus Torvalds Wishes Intel's AVX-512 A ...
Death to AVX-51...harlan4096 — 06:47
Microsoft appears to have fixed the Reco...
Windows 10 user...harlan4096 — 06:40

[-]
Birthdays
Today's Birthdays
No birthdays today.
Upcoming Birthdays
avatar (40)RidgeDimb
avatar (31)ipumaqar
avatar (45)tanliorsPeri
avatar (37)lapedDow
avatar (43)rituabew
avatar (31)omyjul
avatar (35)papedDow
avatar (44)ArnoldFum
avatar (32)yfaza
avatar (43)Kevensi
avatar (33)boineDon
avatar (34)Grompelbawn
avatar (35)vkseogaF
avatar (31)usogy
avatar (34)ywixazok
avatar (32)ixoqe

[-]
Online Staff
There are no staff members currently online.

>