Webthingy.com has been online since 1998 serving the world. Currently this site is for my own entertainment and that of our my friends and family. I try to provide quick and easy access to information and other useful websites.
Please feel free to use this site and its information for your own purposes, however, Webthingy.com is not liable for any problems that may arise from this information or how you use it.
Spheresville - We provide photography and videography services to businesses. We specialize in high resolution photos, 360 photospheres, and 360 videospheres.
BlogThePhoto - Extraordinary Photography in Everyday Places. We provide Business, Real Estate, and Special Event Photography services in the Sacramento area.
Ransomware is known as the most malicious virus category and is believed to have originated in Russia. The very first examples of such viruses are known to have appeared at the end of the 20th century.
RANSOMWARE IS MALWARE that locks your keyboard or computer to prevent you from accessing your data until you pay a ransom, usually demanded in Bitcoin. The digital extortion racket is not new—it’s been around since about 2005
The most frightening type of Ransomware encrypts all your files demanding money to restore them for you. Many people think this is the best option, and in some cases it works, but it just rewards criminals for their evil deeds. Somtimes they only take your money and you do not get your files back.. and there is nothing to say they will not just infect you again.
There is only one known method of successfully fighting Ransomware and its name is prevention. This has always been the most effective choice. What you have to do is to make an effort to BACK UP all your important files as often as you can until doing so becomes a habit. Creating such habits may save you from all sorts of threats. Backing up your files does not mean just copy them to another folder. Your backup files need to saved somewhere else, the cloud, dvd, flash drive(not connected to you computer). I use Nas4Free on an old computer that I only turn on to backup my files...and I turn it off when I am done
Quad9 is a joint venture between IBM Security, Packet Clearing House (PCH) and the Global Cyber Alliance (GCA). It blocks malicious domains around phishing, malware, and exploit kit domains. (Bad domains are returned with NXDOMAIN.) Go here or here for more information
dfg sgsg sg
dfg sgsg sg
dfg sgsg sg
A mirrorless camera uses an image sensor to provide an image to the electronic viewfinder (EVF). It is called mirrorless since it does not have a movable mirror in the optical path such as a DSLR.
Mirrorless cameras are aimed at a population of people who are unsatisfied with the performance of their compact cameras, but don't like the size, heft and mirror mechanism that are often complex and noisy of digital SLRs.
Sony is one of the only companies that currently offer full-frame mirrorless cameras. These are the A7, A7ii and the new A9 cameras.
A7 - No other full frame, interchangeable-lens camera is this light or this portable. Features 24.3 MP of rich detail, a true-to-life 2.4 million-dot OLED viewfinder, Wi-Fi sharing and an expandable shoe system. It's all the full-frame performance you ever wanted in a compact size that will change your perspective entirely.
A7ii - Minimize blur in every shot with the world’s first in-body 5-axis image stabilization in a full-frame camera. Best of all, it works with your favorite lenses. With 24.3MP resolution, super-fast autofocus and a compact design, you’ll capture breathtaking imagery and video that is more stable than ever.
A9 - In one game-changing leap the revolutionary image sensor and high-speed processing of the α9 reaches performance levels far beyond the incremental improvements gained through decades of mechanical refinement.
We have a Twitter account that we try to post Tech news items as we come across them for our friends and family. If you come across a tech news item that you think should be on here , please direct message me so I can add it. - @ShowMeGeek
An Adobe Flash 0day is being actively exploited in the wild https://arstechnica.com/information-technology/2018/02/theres-a-new-adobe-flash-0day-and-up-and-coming-hackers-are-exploiting-it/ …
LOOK OUT: CHROME EXTENSION MALWARE HAS EVOLVED https://www.wired.com/story/chrome-extension-malware …
Found: New Android malware with never-before-seen spying capabilities https://arstechnica.com/information-technology/2018/01/found-new-android-malware-with-never-before-seen-spying-capabilities/ …
US Senate in Russian hackers' crosshairs: Cybersecurity firms http://abcnews.go.com/Technology/wireStory/cybersecurity-firm-us-senate-russian-hackers-crosshairs-52303914 …
Newly Detected Malware Mines Monero, Sends It To North Korean University https://cointelegraph.com/news/newly-detected-malware-mines-monero-sends-it-to-north-korean-university …
How to protect your PC against the major ‘Meltdown’ CPU security flaw https://www.theverge.com/2018/1/4/16848976/how-to-protect-windows-pc-meltdown-security-flaw ….
Intel’s processors have a security bug and the fix could slow down PCs https://www.theverge.com/2018/1/3/16844630/intel-processor-security-flaw-bug-kernel-windows-linux …
Six Cyber Threats to Really Worry About in 2018 https://www.technologyreview.com/s/609641/six-cyber-threats-to-really-worry-about-in-2018/ …
Unpacking, plugging in and configuring a new WiFi router is usually not among most people’s holiday highlights. But if a new wireless hub should be among the presents you take out of a box, spending a few extra minutes changing its default settings... https://www.usatoday.com/story/tech/columnist/2017/12/27/wifi-how-and-why-setting-up-new-router-securely/983720001/ …