As you work with various Linux distributions, you will need to install software repositories, including third-party repositories such as Ubuntu PPAs. In most cases, the installations will work out okay. However, you may encounter the “repository does not have a release file” error as you install some software. This tutorial details what the “repository does not have a release file” error means and shows you how to solve this oft-frustrating error. What the “repository does not have a release file” error means The “repository does not have a release file” error means the third-party PPA… Read more
There’s a new vulnerability in Windows 10 called “PrintNightmare.” It was revealed in early July 2021, and Microsoft is already rolling out an emergency security update to fix the problem. You should update as soon as you can.
Microsoft has released an emergency patch to address a critical flaw in the Windows Print Spooler service that bad actors are actively exploiting, as noticed by The Verge. A few days ago, the tech giant has published a security advisory to notify users about the flaw called PrintNightmare, though it didn’t name the bad actors currently using it to infiltrate victims’ computers.
Attackers taking advantage of the vulnerability can remotely run code with system-level privileges, giving them the ability to install programs in the victims’ computers, delete or change data and create new accounts with full user rights. The vulnerability impacts all versions of Windows, and the company advised users to disable Print Spooler to deactivate local and remote printing to prevent hackers from getting in. They can also disable just the inbound remote printing capability through Group Policy.
Now, after investigating the vulnerability, Microsoft has issued patches for several versions of the Windows Server, Windows 10, Windows 8 and even Windows 7 — security updates for this OS ended in January 2020 — platforms. The vulnerability has been classified as “Critical,” which means its “exploitation could allow code execution without user interaction.” Microsoft is asking users to install the updates immediately or to take steps towards protecting their systems if they can’t.
In the wee hours of Tuesday morning, a tech vendor named Fastly experienced a major outage that inadvertently broke some of the biggest sites on the web. And now, we know why. In a blog post published late yesterday, Fastly engineering VP Nick Rockwell explained the company “experienced a global outage due to an…
So I pulled my 2 year old DJI Mini (original version) out of the hanger for the first flight of the season today. I updated everything recently, and was expecting a normal flight. Never trust in your expectations.
I powered up hopefully, and opened up the Android flight app. Immediately a notification screamed that the GPS not working. OK. No idea why, but before I spent too much time worrying about it, the drone decided that it needed to calibrate it’s compass.
‘Ahh…THAT must be it’. I figured that could fix the GPS issue, so I proceeded to calibrate…but calibration failed. Wait, what?
After a frustrating couple of tries, I noticed a recommendation to calibrate at 1.5 m height…so, took 3 steps down, off the deck and SUCCESS! Prepare for takeoff!
Everything powered on. GPS lock. Home point updated and map position verified…but where’s the camera image? It records, takes photos, gimbal moves up and down but just a black screen and blank screen videos and pics. WTF?!?
Powered down. Rebooted everything. Cleared the cache. Nothing. There aren’t any updates and resetting the camera defaults failed. Finally in desperation, I tried uninstalling the Android app and reinstalling. BINGO! Back in business.
After resetting safety settings and a quick pre-flight, check, I took off from the picnic table, and had a perfect flight after that. But for awhile there I was sure some mysterious hardware failure had occurred during its winter in storage, and was freaking out that my drone might be broken. Luckily it was just a software glitch.
Just goes to prove the Tech Support Credo: If rebooting doesn’t fix it, reinstalling it will.
Hope this helps some other pilots out there who might be in the same hell-bound boat. ~Jamie
Much of today’s modern operating systems are arcane black boxes that no one but the most experienced computer users know. Not that most users know where to look or have access to some folders anyway. So when a system app silently fills up a hidden folder with trash files, most users might not know where to look. This recent incident … Continue reading
If you or anyone you know has a Dell computer, old or new, they should probably update it right away. Dell just released a security patch that addresses multiple vulnerabilities in hundreds of its computers dating back to 2009.
Since 2018, an almost endless series of attacks broadly known as Spectre has kept Intel and AMD scrambling to develop defenses to mitigate vulnerabilities that allow malware to pluck passwords and other sensitive information directly out of silicon. Now, researchers say they’ve devised a new attack that breaks most—if not all—of those on-chip defenses.
Spectre got its name for its abuse of speculative execution, a feature in virtually all modern CPUs that predicts the future instructions the CPUs might receive and then follows a path that the instructions are likely to follow. By using code that forces a CPU to execute instructions along the wrong path, Spectre can extract confidential data that would have been accessed had the CPU continued down that wrong path. These exploits are known as transient executions.
Since Spectre was first described in 2018, new variants have surfaced almost every month. In many cases, the new variants have required chipmakers to develop new or augmented defenses to mitigate the attacks.