Meltdown and Spectre vulnerabilities

Computer PC Tips - bits and bytes, News Items
Meltdown and Spectre vulnerabilities Recently, two critical vulnerabilities were discovered in modern processors. Dubbed "Meltdown and Spectre", these processor chip vulnerabilities are found on personal computers, mobile devices, and in the cloud. What is Meltdown Meltdown exploits a flaw in out-of-order execution, a performance feature found in many modern processor chips. The researchers who discovered it have confirmed that it affects every Intel processor since 1995 (with the exception of pre-2013 Intel Itanium and Intel Atom processors). However, they added that it remains unclear whether ARM and AMD processors are also affected by the vulnerability. If successfully exploited, an attacker can obtain a copy of the entire kernel address space, including any mapped physical memory, in other words, any data stored in memory at the time of the attack. What is…
Read More

Chances of making a successful mobile app

Computer PC Tips - bits and bytes, Software Events
Chances of making a successful mobile app Very sad news on the changes of making a successful mobile app to make you millions of dollars is next to nothing at this point.  Check the following web page with the similar concerns of getting the first cool million dollars.  The article is stating that most mobile developers are making next to poverty amounts. Now this is a sorry state of affairs that you cannot make an amount of cash that would help pay the mortgage. By 2015, 60 percent of app developers were earning under the poverty line, making profits of less than $500 per month. Older statistics indicate that 80 percent of developers don’t earn enough to turn their development into viable businesses. But things are improving; more money is being paid out, so…
Read More

How to purge Microsoft SQL email Items

Computer PC Tips - bits and bytes, SQL Tips
How to purge Microsoft SQL email Items There are times that housecleaning older mail in your database needs to be done.  A simple scheduled task can be done every month to purge what is no longer necessary.  SQL Server stores all mails and attachments in msdb database. To avoid unnecessary growth of msdb database you should remove these mail history unless it is required for auditing or other purposes. As always make sure you have your backups done prior to running any sort of removal in the event you did something incorrectly.  By purging you are reducing the amount of wasted space in the msdb database that could be used for other things activities. Simply running the following statement using T-SQL you can check the amount of database mails that have been processed from…
Read More

TechSmith Camtasia 9.1 is now available!

Computer PC Tips - bits and bytes, Software Releases
Camtasia 9.1 is now available The latest Camtasia is here with faster video rendering, free video assets, and new features that make it easy for anyone to create professional-looking videos.  One of the best video capturing software tools available to create webinars or technical videos for internal usage. The Camtasia product has gotten mature and better over the years. The latest upgrade has the features listed below but based on experience you can do so much with the software and a Blue Yeti Microphone. It is worth the investment if you have decided to bring your company's knowledge into a new realm of possible business.  There is a free trial that is available that you can use for 30 days.  This allows you to create a webinar to grasp what…
Read More

Hackers hid malware in CCleaner software

Computer PC Tips - bits and bytes
Hackers hid malware in CCleaner software Hackers have successfully breached CCleaner’s security to inject malware into the app and distribute it to millions of users. Security researchers at Cisco Talos discovered that download servers used by Avast (the company that owns CCleaner) were compromised to distribute malware inside CCleaner. CCleaner Version 5.33 being distributed by Avast also contained a multi-stage malware payload that rode on top of the installation of CCleaner.  CCleaner has been downloaded more than 2 billion times according to Avast, making it a popular target for hackers. CCleaner is a software utility that wipes out application leftover garbage, can view the registry for entries no longer wanted, remove applications, etc.   Piriform believes that all users are now safe but the real question is how was this even possible…
Read More