This has no affect on Wi-Fi or cellular mobile broadband wireless devices like Airplane mode would.
This tutorial will show you how to set to show a single image or to shuffle images on the Photos tile on your Start screen in Windows 8.1 and Windows RT 8.1
Today I recorded one of the scam calls. For your listening pleasure:
This tutorial will show you how to back up your advanced appearance settings to be able to restore or apply to any user account in Vista, Windows 7, and Windows 8.
While Windows 8 and 8.1 doesn’t include advanced appearance settings anymore, you could back up your settings in Windows 7, then restore and apply them to a user account in Windows 8.
Read more at…
Iām all about the Connected Home (as the title of this blog implies). My Living Room Home Theater system up until yesterday consisted of a circa 2010 Samsung 52 inch TV, an ancient Sony 5.1 Receiver, an Xbox 360 used solely as a Media Center Extender, a WDTV Live Hub which I used for DLNA Play To streaming, a Netgear PTV3000 for Miracast, an Apple TV for You tube, Hulu, Netflix, etc., a cable DVR and a first generation Samsung Blu Ray player. Separately, I have a pair of Sonos Play 5 speakers. A few days ago, the ancient Samsung Blue Ray player started groaning and screeching and it was the final incentive to replace it with something newer.
I did some Internet research and decided that the Samsung BD-F5900 would certainly improve my movie experience several fold. I downloaded the user manual and was even more impressed. While Samsung is likely to have a replacement model any day now, the $99 on sale price (at Best Buy no less) and the local availability drove me out in the 2 degree weather to purchase the device.
My intention was to replace an aging Blu Ray player, but what I got was a whole lot more.
No where on the box, the device itself, or in the user guide does the term DLNA appear. The BD-F5900 works perfectly as a Play To target. HD movies even play across the network smoothly. I can now move the WDTV Live Hub out of my Living Room (it is still a great NAS device).
The user guide mentions Samsungās proprietary All Share multiple times, and mentions Miracast once.
Miracast works perfectly. My Netgear PTV3000 can move upstairs to the bedroom TV or travel with me.
I can also use my iPhone with the PlugPlayer App as a small remote controller (the manual refers to similar functionality only working with s Samsung branded phone).
Last but not least, I had been using the Apple TV as a device to watch YouTube, etc. and not for Airplay of late (since the arrival on Miracast on Windows 8.1). Iād been watching some Amazon Prime Instant Movies on my Surface and using Miracast to display on the TV, (and didnāt have any app direct on a device that accessed this). Amazon is one of the apps available (along with 100+ others including the other big names like Netflix, Hulu, etc.) on the BD-F5900. Streams at 1080p HD smoothly and looks great. Iāll put the Apple TV away for now.
Bottom line, Iāve now got one device that replaces three and have removed some of the clutter in my living room.
In related news, there is rumor of a Microsoft Surface branded Miracast dongle via an FCC filing. Interesting development to say the least. It will be interesting to see what price point this launches with (if it launches). Stand alone Miracast adapters like Netgearās PTV3000 and Actiontecās Screen Beam are selling for $65-70. I guess I feel really good having purchased the Samsung BD player for $99 and getting everything but the kitchen sink included.
In a earlier blogpost I mentioned, Dynamics NAV 2013 R2 can be installed on Windows Azure. Until recently you needed a Dynamics NAV ISO before installing it on a Virtual Machine. With the latest updates on the Windows Azure Platform Dynamics NAV 2013 R2 is added to the Windows Azure Virtual Machine Gallery.
Now it all became easier. Follow the steps in the Wizard and your Dynamics NAV 2013 R2 environment is ready. This is less than a quarter of an hour.
QUOTE: Lately, we have noticed an alarming trend in how Facebook scams are being spread among users. Scammers will exploit every method and medium to disseminate their malware and mayhem. We have seen like-jacking, click-jacking & tag-jacking attacks, rogue applications, the abuse of Facebook messages and chat, browser exploitsā¦you name it. The last couple of scams we have profiled use rogue browser extensions (sometimes called addons or plug-ins) to propagate on Facebook. This typically occurs by the scammer tricking users into downloading and installing what appears to be a theme, application or required plugin to watch an advertised video.
QUOTE: Phishing scams are widely popular on Facebook. Cyber criminals relentlessly pursue ways and means to obtain Facebook usernames and passwords. These compromised accounts often send out spam or scam messages virally across the platform. Scammers can also data mine these accounts and their network of friends. This information can be used for identity theft or other targeted attacks.
Login Approvals is a two-factor authentication feature employed by Facebook. Itās an added layer of security that requires a code to be entered to complete the login process if the device isnāt recognized by Facebook. To access this setting, click on the gear icon located in the top right hand corner and then click on the āSettingsā link. Next, click on the āSecurityā link located in the left hand column. You can also be taken directly to this screen by clicking here: https://www.facebook.com/settings?tab=security
Now all you have to do is click the āEditā link under Login Approvals and set everything up. If you use the Facebook mobile application, then you can also enable āCode Generatorā on this screen. Instead of sending you a text message with the secret code, the mobile Facebook application will generate a code for you to use.
QUOTE:Ā Facebook announced this week that it acquired popular messaging app WhatsApp for a stunning figure of $19 billion. The app is currently the most popular messaging app for smartphones, and boasts over 450 million users while adding an additional 1 million users every day. Of course, not everyone that uses WhatsApp is on Facebook, and some privacy advocates have expressed concern that Facebook will now have access to all of WhatsAppās user data.
āCurrently, WhatsApp can change terms and conditions at any time, without notifying users, which many people who use this service arenāt aware of. Meanwhile, Facebook already has a very broad copyright license on peopleās content and already shares your data with many other services,ā said St. John Deakins, the CEO of Citizenme, a group advocating for online privacy. āNow with Facebook buying WhatsApp, this could see more and more private information becoming part of Facebookās database. From a personal data standpoint, this is extremely worrying.ā
WhatsApp will be absorbed by Facebook and function as an autonomous unit within the company. Though itās easy to doubt the siteās motives, itās likely that Facebook simply saw the app as a massive growth opportunity. Facebook has obvious plans to expand its messaging services, and WhatsApp is a logical extension of their goals. However, for those WhatsApp users who arenāt comfortable living under the thumb of Facebook, it may be time to find another online messaging service.
QUOTE: More than one billion people nowadays use smartphones devices and this number is growing rapidly. With the growing numbers of mobile users accessing the internet on Android smartphones and tablets, and iOS iPhones and iPads, the number of mobile threats and attacks is rising progressively.Ā Mobile users store sensitive data, and engage in online banking operations, exposing devices to the modern mobile threads. You need constant protection. Not even these big names were immune from attack: German Chancellor Angela Merkelās smartphone was hacked; Rovio, creator of popular game Angry Birds, reported that the personal data of its customers might have been accessed by U.S. and British spy agencies;Ā and recent news of other leaky phone apps have caused people to look for ways to protect their private mobile communications.