Category Archives: Update

10 Useful Internet Tricks and Tips

Internet is a worldwide system of computer networks which is a common place for all that renders you number of flexibilities and opportunities like exploring a huge amount of information from the place you are sitting, communicating with number of people using online tools and utilities, and other communication facilities. Today, the Internet is a public, cooperative and self-sustaining facility which is being used by millions of people world-wide.  Here is a list of 10 useful internet tricks and tips included to improve your interaction with the internet or you are using the technology called internet.

10 Useful Internet Tricks and Tips

Avail advantage of tabbed browsing

Most of the users access the internet to browse a site and explore information. Almost all internet browsers allow taking full advantage of tabbed browsing. Often while reading an online document or web page, you come across relevant and useful links and you want to open them. Tabbed browsing is a feature that is useful when you need to open another link or page without leaving or disrupting the existing page.

To perform this trick, press the Ctrl key down and left-click the link. If you are using a mouse with wheel, depress the wheel instead of rolling it to click on the link. Using either of the methods opens a link in a new window. Press Ctrl + T at the same time if you want to open a new blank tab. If you are manually entering an internet address, there is no need of typing http:// or even www. in the address.

If you are visiting a .com address, to make things even quicker, you can type only the site name (for ex- abcd) and then press Ctrl + Enter to type out the full address.

Try other browsers

Most of the computer users use the default browser that comes pre-installed with their computer, for instance Microsoft Internet Explorer is the default browser if you are using Windows operating system. One thing that you need to know is, there are many excellent alternative browsers which are free to download and use. They also may have features that your existing browser may not have.

Know the shortcuts of your Internet browser

Using shortcut keys is always handy to use your browser efficiently. There are dozens of different shortcut keys that can be useful with your Internet browsers. Below a few of top suggestions are given that you can use as browser shortcuts:

  • Move the cursor into the address bar by pressing Alt + D or Ctrl + L.
  • Increase and decrease the size of text by pressing down the Ctrl key and press the + or – . Pressing the Ctrl + 0 will reset the text.
  • To go back a page, press the backspace key or press Alt key + left arrow.
  • To refresh or reload a web page, press F5 or Ctrl + R.
  • Make the Internet browser screen full screen, press F11 and to return to the normal view, press F11 again.
  • Open your Internet bookmarks by pressing Ctrl + B.
  • To search for text within the web page you are reading, open the find box by pressing Ctrl + F.

Use the full potential of Internet search engines

Get the relevant search result. If you are not able of finding what you are looking for, write the text in double quotes. For example, if you are searching for ‘online computer help’ without quotes, it will return results with “online”  “computer” and “help” anywhere on the page, but if you put the same search text in the double quotes, it will only return pages with “online”  “computer” and “help” next to each other.

Move quickly between the fields of a web page

If you are filling out the required field in an online form, e-mail, or somewhere else, press Tab key to quickly move between each of the fields, and  to move back a field, press Shift + Tab.

You can apply this tip to buttons also, if you press tab, it may also highlight the buttons and once a button is highlighted, push the button by pressing the spacebar or enter.

With a drop-down box that includes dozens of options, press the first letter to scroll down to that letter.

There is the autofill feature also that you can use to fill in common form fields.

Install plugins and add-ons

Most of the major internet browsers have a large community of volunteers who develop plugins and add-ons that may be added into the browser. Most of the browsers have hundreds of add-ons that are able of doing multiple things like changing browser window’s color, current weather in your browser window, and adding additional functionality.

Keep your browser and its plugins are up-to-date

Plugins are the tools of an internet browser that give it additional functionality. For example, Adobe Flash is a great multimedia software platform which brings movies and other animated content to the Internet. To maintain the stability and security of your computer, it is vital to keep these plugins up-to-date.

Use online services

There are multiple free online services which are helpful to make your interaction with your computer more productive, easier, and enjoyable. You can use these services to enjoy enhanced performance of your device.

If your browser is slow or you want to change its setting to get rid of any infection and need technically expert professionals, talk to the PCTECH24.COM.AU professionals to get support for all software applications and browsers.  

Dell Announced its New Range of Laptops

Dell is a renowned name in the list of PC developers and manufacturers and today it is one of the best PC brands in the world. Its devices are creatively designed and intelligently built which stay at the top of their performance for long. Recently Dell has made some impressive announcements in its laptop range.

Dell Latitude 2-in-1 business laptop

Ahead of CES 2017, Dell announced its new range of laptops including XPS 13 2-in-1, Latitude 2-in-1 business laptop, new Alienware and Inspiron 7000 Gaming laptops. In the event that will be held in Los Vegas, Dell has more in its lineup to showcase. Alongside a new Canvas device, it may unveil a range of new Latitude, OptiPlex, and Precision devices. Dell revealed the new Latitude 7285 2-in-1 detachable laptop, Latitude 7280 and Latitude 7480 models, OptiPlex 7050 desktop, Precision 5520 laptop, Precision 5720 all-in-one model, Precision 7720, and Dell Canvas.

Dell XPS 13 2-in-1

The company has expanded its all-new Dell Latitude 7000 Series and announced two more models of this series: Latitude 7280 and Latitude 7480. Both the Latitude models include touch finger print reader and sport optional multi-factor authentication options, FIPS 201 Smart Card Reader, and contactless smart card reader/NFC with Control Vault 2 FIPS 140-2 Level 3 certification. Display screen of the Latitude 7280 and Latitude 7480 laptop models will be featuring 12.5-inch and 14-inch screen sizes respectively. They will be in HD and full-HD screen resolution options and their top-end model will be featuring Corning Gorilla Glass. Seventh generation Intel Core vPro processors with DDR4L RAM up to 2133MHz will be empowering both the models and both of them will be available in non-backlit and backlit keyboard options.

Inspiron 7000

The Latitude 7280 and Latitude 7480 laptop will be having Intel’s Integrated HD Graphics GT2 GPU along with either Windows 10 or Ubuntu OS options. Dell has revealed the cost of the Latitude 7480 model which will start at $1,099, however, it hasn’t ponder light upon the cost of the new Latitude 7280 and Latitude 7480 models and it is promoting them as “premium business-class Ultrabooks” for commercial use case. Dell also revealed the new Latitude 7285 2-in-1 detachable laptop and the company claims that it will be the first wireless charging keyboard.

The new Latitude 7285 2-in-1 detachable laptop will be available with seventh generation Intel Core i and Core ivPro processors coupled with Intel HD 615 GPU and up to 8/16GB 1600MHz of RAM. Dell has integrated a 12.3-inch touch Sharp IGZO display with 2880×1920 pixels and Corning Gorilla Glass 4 on top. It includes an 8-megapixel rear camera and a 720p front-facing camera (with Infrared) and will be available with Windows 10 Home and Pro editions. The Latitude 7285 2-in-1 gives you options in 128GB, 256GB, and 512GB SSD and while will also come in 256GB SED (self-encrypting drive) option and it will also feature 2x USB Type C Thunderbolt 3 ports. There is no idea about the cost of the Dell Latitude 7285 2-in-1 and it will be available starting May.

Dell introduced its new OptiPlex 7050 desktop in three sizes: the tower, small form factor, and micro and the new OptiPlex 7050 desktop will be available with seventh generation Intel Core i7 processors. The new OptiPlex 7050 desktop will support Microsoft’s Windows 10 Home and Pro editions as well as Ubuntu operating system. The micro will include two DIMM slots and the tower and small form factor of the OptiPlex 7050 will pack four DIMM slots.  It will support hybrid disk drives and hard disk drives of up to 2TB. The Dell OptiPlex 7050 micro may be available at a starting price of $679 and may be available for buying from February 17. Dell has not disclosed prices for the tower and small form factor as of now.

Dell also announced Precision 5520 laptop and claims that it’s “world’s thinnest, lightest and smallest 15-inch mobile workstation in a stunning design.” This model will include the latest seventh generation Intel Core and Intel Xeon processors as well as Nvidia Quadro professional graphics card alongside 2400MHz DDR4 memory. Dell has integrated the higher capacity battery on the Precision 5520 laptop that may survive through day of use and it also supports up to 2TB SSD storage. The display screen of the Dell Precision 5520 laptop is of 15.6-inch UltraSharp full-HD IPS (1920×1080 pixels) with anti-glare LED-backlit along with in touch option. The company has been priced Dell Precision 5520 laptop at $1,399.

Dell also has expanded its Precision series and launched the Precision 5720 all-in-one model. This model will be featuring a 27-inch UltraSharp 4K Ultra HD (3840×2160 pixels) display with 100 percent Adobe RGB color gamut, with an optional touch display with articulating stand, and Dell PremiereColour. The AIO will also be featuring Jack Joseph Puig Signature Series powered by Waves MaxxAudio Pro audio solution sporting front and down firing speakers. The Precision 5720 AIO will be powered by seventh generation Intel Core and Xeon E3-1200 v6 series processors along with AMD Radeon Pro GPU. Moreover, this series will also be VR Ready. Windows 10 Pro and Ubuntu operating system options will be powering its performance. It will be available with up to 64GB 2133MHz Non-ECC DDR4 memory. The Dell Precision 5720 AIO will go on sale in April and may come at a starting price of $1,599.99.

Dell is promoting its Precision 7720 as the company’s first “VR-ready mobile workstation” which sports a 17.3-inch full-HD (1920×1080 pixels) UltraSharp IPS display with anti-glare backlit with up to 64GBDDR4 DDR4 2400MHz memory. It is available in two options with latest seventh generation Intel Core and Intel Xeon processors alongside gives you choice of choosing between NVIDIA Quadro or Radeon Pro graphics cards. This VR-ready model supports RAID and up to 4TB storage. The Dell Precision 7720 will go on sale next month and has been priced at $1,799.

Dell also unveiled the new Canvas system and the company is promoting it as a new horizontal “do” surface as this professional space can be used through touch interaction, a pen, and totems. The new Canvas system sports a 27-inch QHD Adobe RGB display with anti-glare Corning Gorilla Glass for durability and the has added a highly-precise pen which will be very convenient for sketching and drawing something, plus it also supports dual-handed productivity. For making it more easy-to-use, Dell Canvas 27 supports 20 points of touch recognition and the 27-inch IPS display comes with a screen resolution of 2560×1440 pixels. The Dell has priced Canvas at $1799 and will be available starting March.

Dell also revealed its first 32-inch 8K monitor with Dell PremierColor and the company claims that the 8K monitor can show content four times more than Ultra HD 4K resolution and 16 times more content than full-HD as it sports over 33.2 million pixels of resolution and a pixel density of 280ppi. Dell has been priced its first 32-inch 8K monitor at $4,999.99.

If you want to buy any of Dell device and configure it, but don’t know how to do that or want any other assistance related to your new Dell devices, you can ask PCTECH24.COM.AU for complete support for Dell computers.

Call 1800 83 24 24 to Get Complete Solution of All Your Dell Computer Related Issue

Dell is a big brand in designing and delivering high-end personal computers that look elegant, stylish, and perfectly mixed with performance. Dell is an American multinational that you can reckon as a brand which is dedicated to perfection.  Dell laptops are known for their great performance, designs and looks. Though it is piece of equipment to flaunt and make others envious, but what if it doesn’t give you desired performance or start showing technical issues.

How to fix Dell Computer Related Issue

If your Dell computer is showing some issues and you are also struggling to fix them, there is no need to be worries about, just dial the number 1800 83 24 24 to get instant technical support for Dell computers anywhere in Australia This number will directly connect you to the expert technicians at the same instant so that you get on-time solution. Computers are complex systems that may experience numerous technical issues ranging from booting complexities to BIOS related troubles. These are multiple issues which are difficult to handle and computer users cannot find the apt solutions of them.

If you are stuck in an annoying situation, don’t get panic over the issue as tech experts are available round the clock and you just need to connect to them for correct resolution of the problem that has encountered. They will provide you the solution on immediate basis.

Some common issues that users face:

System not Booting

Have you been trying to boot your system but getting nothing except a black screen and an error, then, your system is experiencing a booting issue. This is a situation which can be handled by the experts only. Call the Sony experts at Sony Computer Help Number for getting immediate relief from the issue.

BIOS Related Issues

BIOS is an interface between the software and hardware of your machine. Usually this issue arise if your system’s experiencing BIOS related issues or its BIOS has gone corrupt or has got outdated. These are complex issues and hard to handle for those users who don’t have expert skills. To handle such issues, it is better to call experts for reliable solution in minimum possible time.

Reinstallation of Windows OS is Taking Too Long and the Process is Aborting Abruptly

These days all the instructions to install or reinstall the OS are given and it has become easy as it requires just basic skills to do that. Although, installation or reinstallation of windows is a fairly simple procedure, but sometimes, it gets tough because of unknown reasons and may take hours or abort abruptly. If it is bothering you and taking hours to finish or getting aborted in between, you need to handover this task to the experts. As only they can find the cause of problem and fix it. For instant support for Dell devices, you should call experts at the same instant.

Apps and programs are Taking Too Long to Open

This problems encounter when your system’s hardware is not capable of performing accordingly or there are some programs which are hogging your system resources and not letting other program to function. Redundant applications running in the background slow down the overall performance of the system. A slow system is very annoying and you need to fix it as early as possible.

System issues seem very harassing and annoying especially when you are in the middle of some urgent work. A small issue may lead to frustration and if the work is too urgent, you cannot wait for long to get it resolved. In such situation, PCTECH24.COM.AU is your one stop solution to fix all such issues immediately as we are 24*7 available to help.

Types of Security Threats and Network Attacks and their Counter Measures

A security breaching attempt and network attack is defined as a threat. Most of the attacks including intrusion, denial of service or other on a network infrastructure analyze the entire network in order to gain the information. After gaining the required information, such attacks eventually cause your network to corrupt or crash. Different attackers may different types of network attacks as they might not be interested only in ‘exploiting software applications, but also get unauthorised access of your network and the devices connected to the same network.

Types of Security Threats and Network Attacks

Within an organization or at home also, unmonitored network devices are targeted by the attackers as the primary source of information leakage and breach. If your organizational network is not secure, the risk factor increases by multi-folds as every email message, user logon, web page request, and every transmittable file is handled by a network device. Under some setups, network devices also handle telephone service and voice messaging. It becomes very risky once the attacker is able of owning your network devices, as it allows them owning your entire network.

There are multiple types of network attacks cut across all platform types and categories of software and most of the common ones are as follows:




DoS and DDoS



Social engineering

Spoofing (Identity or IP Address Spoofing)

Any internet connected device sends IP datagrams which are internet data packets into the network. These datagrams carry application layer data and the sender’s IP address and if the attacker is able of getting the control over the software running on a network device, it gets easy for them to alter the device’s protocols and putting an arbitrary IP address into the data packet’s source address field. Spoofers do it so that it becomes difficult to find the actual host who sent the datagram.

Ingress filtering is the countermeasure of spoofing and routers usually perform this. Routers perform ingress filtering to check the IP address of incoming datagrams and try to find out if the source addresses which are to be known, to be reachable via that interface. Router discards the source address of the packets which are not in the valid range.

Hijacking (man-in-the-middle attack)

Hijacking is an attack technique where man-in-the-middle takes advantage of the way headers are constructed in a weakness in the TCP/IP protocol stack. Hijackers perform hijacking by actively monitoring capturing, and controlling your communication transparently when you are communicating with another person. The attacker may re-route a data exchange and while your computers are communicating at low levels of the network layer, they might not be able to find with whom they are exchanging data. Man-in-middle attacks takes the advantage of this technique as the person with whom you communicate will think that it is you (actual user) who has sent a message whereas the fact is, it is the hacker who actively responding on your behalf using your identity. So if you find anything unusual while having conversation with your friend of receiving any message from the unauthorized contact, avoid any kind of communication as this may be either a hacking attempt or hacker.


These are malicious programs that seem like legitimate software, but actually they when launched, they perform unintended or malicious activities behind the scenes. Most of the remote control spyware programs are of this type. A Trojan program file will look, operate, and appear to be the same size as the compromised system file.

To avoid the effects of such attacks, early use of a cryptographic checksum or binary digital signature procedure is the only protection.


Packet sniffing is a way of intercepting data packets travelling to a network. To capture all traffic travelling to and from internet host site, a sniffer program executes its functions at the Ethernet layer in combination with network interface cards (NIC). The sniffer program will collect all communication packets floating by anywhere near the internet host site if any of the Ethernet NIC cards are in promiscuous mode.

A sniffer placed on any inter-network link or backbone device or network aggregation point will therefore be in a state of monitoring the entire lot of traffic. There are multiple sniffers programs on the internet that are free and most of them are passive. Packet sniffers listen all data link layer frames passing by the device’s network interface and among them which are more sophisticated ones allow more active intrusion.

It is required to detect network interfaces that are running in promiscuous mode in order to detect packet sniffing. There are two ways of detecting sniffing:

Host-based: If the NIC is running in promiscuous mode, several software commands exist that can be run on individual host machines to tell the same.

Network-based: Sniffer programs consume a lot of running processed and log files, but there are solutions which tend to check for the presence of log files and running processes. However, sophisticated intruders almost always are able of hiding tracks by disguising the process and cleaning up the log files.

End-to-end or user-to-user encryption is the best countermeasure against sniffing.

Mapping (Eavesdropping)

Before attacking a network, attackers try to find out some important information like IP address of machines on the network, the operating systems that machines are using connected to a network, and the services that they offer. Using this information, attackers can be more focused on their attacks and it is less likely to cause alarm. The process of gathering all the information is known as mapping.

Strong encryption services that are based on cryptography only are its counter measures. Otherwise, it gets easy for attackers and others to read your data as it traverses the network.

Denial-of-Service attack (DoS) and Distributed-Denial-of-Service (DDoS)

A denial of service attack is a special kind of Internet attack on a network that is carried out at large websites. This attack is designed to perform on the network in order to bring it down to its knees by flooding it with useless traffic. Denial of Service can result if a system (like web server) if flooded with a huge number of illegitimate requests. This act makes the web server unable to respond on legitimate and real requests or tasks.

A Dos attack can be executed in a number of ways, but its three basic types of attacks are:

  • Consumption of computational resources, such as disk space, CPU time, and band width.
  • Disruption of configuration details, such as routing information.
  • Disruption of physical network components.

DoS attack may bring the following consequences:

  • Slow network performance.
  • Unavailability of a particular web site.
  • Inability to access a particular web site.
  • Dramatic increase of spam in your account.

Common forms of denial of service attacks are,

  1. a) Buffer Overflow Attacks simply send more traffic to a network address than the programmer’s expectation on size of buffers.
  2. b) In Smurf Attack, the perpetrator sends an IP ping request to a receiving site.
  3. c) SYN floods are a type of attack when a computer tries to make a TCP/IP connection to another computer.

To control DoS attack, only ingress filtering is the only counter measure and that too to a small extent.

Social Engineering

For attackers, social engineering is a way of deception in order to gain access to information systems. Attackers usually use a telephone or e-mail message medium for the same purpose.

The attacker usually pretends to be an authorised person of the company and pressure the help desk to give the toll-free number of the RAS server to dial. Sometimes, they use the same trick to get their password reset. The main aim behind social engineering is to sport the human element in the network-breaching loop and using it as a tool to perform breaching and hacking attempts.

Faked email sent by fake administrator to one or more users in a domain about resetting the password for a limited period of time. When user try to do so, hackers who keep on monitoring users activities exploit the user’s system.  Or the social engineer traps the users in a fictitious competition and tries to manipulate a group of users for participating in some fake competition to win a jackpot prize.

Another trick that social engineers play is they impersonate a user and pretend to forget their password and ask the helpful helpdesk to reset the password. In many cases the help desk change the user’s password over the phone and now when the hacker now a legitimate user name and password to work with, they misuse it.

If you are also victim of any such attempt and still haven’t applied counter measures, it’s high time to do that. Otherwise, you will repent for such a long delay. In case you are not sure what to do to stay safe and avoid any kind of infection and attack, comprehensive protection is required for your device as well as network. For the same purpose, you can hire tech experts who are experienced in handling all tech issues and provide tech support for Trend Micro.

How to Find Out the License Agreement for the Installed Version of Windows

While installing Windows, you are shown a screen that explains the Windows license agreement that includes all the information about all the legal language, the responsibilities of Microsoft, and what you can and cannot do with Windows. Users come across the license agreement at the point of installing Windows only and if you ask someone in general to see or show it again after installing your version of Windows, it will be tough for him/her. This is a veru usual case and may of the Windows users found it tough to see and read the license agreement again. So this is the guide to help the users like you who found it difficult to find license agreement for all editions of Windows you currently installed.

First of all you need to identify the version of Windows that is currently installed on your machine and if you already know the version of installed Windows, skip the instruction that explain how to identify what version of Windows you are using.




Windows 7 and Windows 8 users need to left-click on the Start Menu, then right-click on Computer, and then click on the option Properties. Windows 10 users need to right-click on the Start Menu and then left-click on the option System.

Following the above step will show the System control panel that will show you the detailed information on what version of Windows you are running as shown below:

If you need experts help for knowing which version of Windows you are using, call PCTECH24.CO.AU experts to get support for Windows 7 and support for Windows 10. Now when you know what version of Windows you are running, you may open the folder which contains all of the license agreements for your version of Windows. To open license agreements for your version of Windows, press Windows key, and while holding Windows key down, press the letter R key to open the Run dialog.

Copy and paste or type c:\windows\system32\en-US\Licenses\_Default in the blabl space of the run box and click or tap on OK button.

Clicking or tapping on OK button will open a folder that will show individual subfolders for every edition of the Windows version installed on your computer. Each of these folders have the respective license agreement for the version of Windows that is installed on your machine.

Scroll through the list of folders and click twice on the one that corresponds to the edition of Windows you have installed on your machine. When the folder opens, you will see a single file called license.rtf there and this file is the license agreement for your version of Windows.  Double-click on it to view  and read it in Wordpad or Word.

How to Remove the G-button from the Android Keyboard

If you are Android user and using the official Google Keyboard application (now called Gboard), you may have noticed that at the top of the keyboard, Google Keyboard application features a new G-button. Regardless of application you are in, you can run web searches directly in the keyboard interface just by tapping on G-button. Means if you are using WhatsApp or facebook or any other application, you can search for “funny image.”


Though it may be useful rarely, but often it is awfully distracting especially if you accidently tap on the G-button accidentally and it brings up the search interface. So if you often don’t use G-button, you can also remove it.  As you know that as you tap on the G-icon, it opens the search interface and Google shows suggestions and an option to type custom search queries. Results are always only a tap away and displayed in the interface, with weather searches and news.

If you don’t need the functionality, you don’t need the icon. It is the icon that provides you with or gets in your way. If you don’t need G-button, you may get rid of it from the keyboard. However, there does not seem e a way to remove the full line the G-icon is placed in.

How to remove the G-button:

  • Tap on the G-button in the chat interface and then tap on the preferences icon that displays next to other icons and the search interface.
  • On the Gboard keyboard settings page that opens up, choose Search.
  • Now search for options to hide the “G” button, and to disable predictive search.
  • The button itself is removed, if you toggle the Show “G” button switch. However the main issue is removing G-button will show a line there and it will be there as the button icon is replaced by an arrow icon.
  • If you tap on an arrow icon, it does not trigger the search interface directly, but it shows options to open the settings among other things and to run searches.
  • Right now, there does not seem to be an option to remove that line completely and you are left with dead weight in the keyboard layout that is of no use for you, but you can’t remove it.

There are many Android users who find the new Gboard “G” Button useful as it enables them to run direct searches without switching to another app. That’s why Google is pushing it with the update. There is no option to completely remove it, but you can avoid it technically by installing and using another keyboard app.

Flash Will Soon Be “Click-To-Run” in Microsoft Edge

Most of the browser makers are chipping away their dependency at the web’s Flash and Microsoft is also following the footsteps of others browser makers and announced that upcoming Edge browser versions will favor HTML5 by default over Flash.

Microsoft said on 14th December 2016 that sites that support HTML5 will default to a clean HTML5 experience and in this case users will have better performance, more security, and improved battery life as  Flash will not even be loaded.

On sites where Flash is required, users computer screen will show a pop up like one attached below and it will remember the user’s choice for subsequent visits.


Edge users will see the prompt shown above when accessing a website with Flash content

On Windows Insiders builds, Microsoft has already implemented these changes to Edge users. For regular Windows users, this update may be available in the coming weeks. Although, Microsoft has not announce the exact day when it will integrate the new default multimedia playback technology HTML5 in Edge, but it is certain that Flash will be demised.

Microsoft also announced that in the beginning, major websites that have millions of monthly visitors and still rely on Flash will be exempt for the click-to-run Flash popup. The spokes person of Microsoft said that in the coming weeks and months, we will actively monitor Flash consumption in Microsoft Edge and will then take a decision of shortening the list of automatic exceptions gradually. Microsoft explains the reason of doing this and said that by doing so, users will remain in control at the end of this process and we will be able to select Flash for any site user visit. Microsoft is expecting that major websites will have a clear clue that Flash’s death is coming at a fast pace so they will try to migrate their user experience to more modern technologies.

Google and Mozilla have done the same in the past and now Microsoft is advising web developers to focus on deploying new technologies such Encrypted Media Extensions, Media Source Extensions, Canvas, Web Audio, and WebRTC instead of Flash. In fact, it is advising to ditch Flash altogether. It is not only the Google, Mozilla, or Microsoft; Apple also has announced that its Safari browser will automatically disable old Adobe Flash versions because of increased security risks.

Mozilla made an announcement in July that Firefox would block certain Flash content that is not important to the user experience. For those websites where Flash is the only media playback solution, Google Chrome 55 already using HTML5 as the default multimedia content handler rather than Flash with a similar click-to-run popup.

Microsoft has clearly said that Windows 10 next release will default to HTML5 content if possible and it even won’t load Flash content in the background. If this happens, users will have better performance, battery life and security. If you access a website that relies on Flash, you need to actively choose if you want Flash to load via a prompt. To make user experience better while browsing something in the Edge browser, Edge will stop certain Flash content and ads which will not be central to sites and it may speed up the loading process of the site.

Microsoft isn’t clear about how long this transition may take, but it is good that Microsoft is putting its foot down against the scourge of the internet by making its browser more secure.

Hacking Forums and Dark Web are Advertising and Selling New Exo Android Trojan

Malware is a type of malicious program that cyber-criminals use to infect a computer or mobile device. Hackers use malware codes to advertise new infections and viral them from one machine to another or one network to another. Now hackers have found a new Android Trojan to trade on and advertise malicious infections. Malware coders are using new Android Trojan phishing attempts and stealing banking credentials, locking devices with a password (ransomware-like behavior), intercepting SMS messages (confidential), and more.


The new Trojan known as Exo Android Bot, or Exobot is being advertised and sold via Jabber/XMPP spam, via Dark Web marketplaces, hacking forums, and even on the public Internet via a dedicated website. This malware has infected and hacked a lot of Android running devices till the date and unraveled by the security experts this year in the month of June when its creator sold it and opened a topic on a Russian-speaking hacking forum.

Shortly after listing on Russian hacking forum, it was found listed on AlphaBay which is the largest Dark Web marketplace for illegal products. It was also noticed that someone had also registered a domain on the public Internet in the month of October, where the owner of the domain hosts a website, peddling the malware. In November, cyber security experts also came across Jabber/XMPP spam advertising Exo. Currently, the trojan is being sold at different prices on a weekly, monthly, or yearly basis, depending where you see its advertisement and what deal you have chosen.

Its developer(s) claim that Exo is worth its price. First of all, it works on Android versions 4, 5, and 6 and in some ads, it’s also advertised that it works on Android 7. However, it may be just false advertising, because all listings do not advertise this feature. Furthermore, the creators of Exo also boast that the Trojan doesn’t require root access to work so users can’t uninstall it manually. It means, to get rid of Exo, users need to do a complete phone reflashing.

A few other features that are taken from the AlphaBay listing are embedded as they were almost original text]:

  • SMS intercept (send the SMS content to admin panel in real time. If desired with jabber notifications too, can be configured for a target or by sender phone numbers)
  • Send SMS to a specified phone number
  • Hide/delete incoming SMS (this feature works up to android 4.4 versions)
  • USSD’ requests
  • Web injects (perform phishing over targeted app names to steal data, username, password, telepin whatever you want)
  • Custom injects could be made under customer request
  • CC Stealer (Steal CCs data Including VBV/MSC/SAFEKEY) (CCs stealer can target the desired apps. For instance: Whatsapp, Viber, the Google the Play Store)
  • Jabber notifications for incoming new CCs or Web inject data or the SMS from specified phone numbers Collected
  • Lock / unlock mobile device with a password / disable screen and phone use also can show a custom page on locked screen
  • Uninstall the bot manually (without the PC / cable) is impossible
  • Wi-Fi access / mobile data automatic enabler for stored Wi-Fi networks on range
  • Send bulk SMS to all contacts from the infected phone
  • too In case no internet access, control the bot with SMS
  • Exo Android Bot do not require Root privileges to work Correctly
  • Admin panel to manage your bots
  • Bot works from 2.3 to 6.0.1 Android versions

The same AlphaBay listing also has a short FAQ section that gives a hint on Exo’s origins [almost original text]:

  • we don’t install admin panel files outside our servers, the customer will need to provide us a vps/server root access to install frontend/proxy script
  • Customer must provide from 1 to 3 domains names where the bot be pointing to
  • we are noob friendly , means we may guide you to setup all the necessary stuff for a fast start on this Android scene
  • if you consider our product is expensive and no worth , is not our problem if you dont have money. Or dont have the intention to use our services and just want troll around
  • we are here to make happy our customers and be sure all the features which we are offering it works and continue working offering a good support
  • This project was made from scratch? answer : No, we purchased a base source code 4 months ago directly from developer before he vanish from internet, and we began our own project and development/improvements/new features
  • what if i rent your product and your dissapear? Answer : No definetly we are not going to disappear or run away least for the next year
  • what other features are planned for the incoming months? Answer: VNC/Geo Fencing / File Manager Browser and others
  • Why you are renting this if is stable and good as you say to be? Answer: Direct Financial to keep improving this project and be sure will be alive during many time, so we don’t need to use our parallels earnings to use on this.
  • Where can i contact you? Answer : you may contact us directly on our sales jabber id: [REDACTED] (Serious people with serious deal only, Haters. Time waster pls stay away)
  • we dont provide apk builder
  • Cleaning service? Answer : we delivery the apk file clenaed and include free cleaning 1 time monthly. for other cleaning services can be discussed

As you can notice that the Exo author is providing a control panel for organizing and managing infected bots, but buyers can access this only via a proxy client installed on their own servers.

Cyber security experts reached out to one of the contacts listed in many of the ads who admitted that he was only a reseller. It means that Exo already runs its own affiliate system. Exo’s creator had listed the times of day In the original hacking forum ad during which he wanted to be contacted: “14:00 — 20:00 MSK” (MSK stands for Moscow Time). Furthermore, Exo added a feature that stops the trojan from executing on devices from users based in former Soviet states, and the US. This filter is there so that the author may avoid being on the radar of Russian or US law enforcement agencies.

Windows 10 Insider Build 14986 Release to PC with Many Updates

windows-10-insider-build-14986On 7th of December, Microsoft released the Windows 10 Insider Preview Build 14986 for PC only to Insiders on the fast ring.  This build packs in a lot of new features and updates in Cortana, Game Bar, Windows Defender, Printing, and more.  All the new features that this Windows 10 insider build 14986 includes are listed below:

  • Controling music with Cortana
  • More supported games for using Game Bar in full screen.
  • Enterprise Cloud Printing
  • New Windows Defender Dashboard
  • Narrator Improvements
  • Improved Windows Update Experience
  • Registry editor improvements
  • Default to use the Microsoft USB Audio 2 class driver instead of hardware specific drivers.
  • Improved support for Windows 10 in Asia

To know more about each new feature, go through the corresponding section below:

What’s new in Build 14986?

Making Cortana brilliant:

Now Cortana can do a lot for you including turning it off, changing its volume with voice commands. Apart from this, Cortana can do things like shut down, lock, put it on sleep. Now you can use Cortana to control music playback while listening to music. Use your voice to control playback and volume.

Microsoft has added support for “What’s Playing” as many radio listeners wanted to know what that catchy tune is that has played a million times. It will work for the specific apps and may give you right answer of you say “Hey Cortana, What song is Playing?” Cortana has been smarter and it will remember your last played music app, means  you don’t need to say “on Groove” again and again. You just need to speak your desired app one time, something like “Play jazz music on iHeartRadio”; next time to repeat the same, you just need to say “Play rock music” and it will play on iHeartRadio.

Microsoft has added music recognition support to Chinese (Simplified) in Cortana, means it can now recognize music for customers in China.

Full screen when idle:

It is one of the major improvements to Cortana’s look when your PC is unlocked and idle and you say “Hey Cortana.” When your PC is in in unlocked and idle state and you ask something from Cortana, it will result in a stunning full-screen experience that is optimized for far field viewing!

Cortana sign-in using Azure Active Directory (AAD) identity:

This feature let you signing into Cortana with your work or school account instead of using your MSA, even if your organization does not support MSA. To sign in to Cortana using account other than MSA, go to Cortana’s Notebook and “About Me” and sign in.  Currently AAD join is only available on Windows 10 PCs.

Enterprise Cloud Printing:

The new Enterprise Cloud Printers discovery UI enables corporate users to detect corporate printers on Azure Active Directory joined devices while IT admin deploying and configuring the backend services under Settings > Devices > Printers & scanners.

Corresponding backend services (are not yet available) need to be working for this feature to work, so to discover and install printers in the interim, continue to use existing UI.

Windows Game Bar improved full-screen support:

Microsoft added support for six full screen games in Game Bar with the Windows 10 Anniversary Update. For the Windows 10 Creators Update, many more are added. In full-screen mode, Microsoft has added support for 19 additional games with Windows game bar. As always, to invoke Game Bar to capture a recording or screenshot, just hit WIN + G.

Taking users’ Windows Ink experience to the next level:

With the Creators Update, Microsoft has already announced and released few improvements for our pen and Windows Ink users and with this build a few more are announced.

Resuming previous screen sketches:

Users bring it in notice that it was too easy to accidentally lose their Screen Sketch, so Microsoft made a change with build 14986 and now you can resume previous sketches. By default, it will always open a new screenshot when you open Screen Sketch, but now you will be taken to the sketch you were working on by clicking on when Screen Sketch last closed the Resume button.

Updated Ink Flyout Visuals:

The Windows Ink pen, pencil and highlighter flyouts can show a preview to give you glimpse about how it would look like to color with the currently selected ink and width. Any app that uses Windows Ink with the Windows 10 Creators Update SDK will show these improvements visibly. Flyouts are also updated so that duplicate entries don’t appear in high contrast. To close the flyout, support using the Esc key, and returned the flyout to dismiss once you tap a color or change the width.

Better control over ruler rotation:

Updated the Windows Ink ruler that can rotate in sub-degree increments while moving it with touch. Now it is easier to line the ruler up with two points on the screen

Enhancing your inking experience:

To make you feel that you are creating something on paper using pen, the cursor will not be shown while you’re inking.

New Extensions in Microsoft Edge:

There are a few new extensions to share with Windows 10 users. Have a look at Ebates, Intel TrueKey, and Read & Write.

Updated Rendering Technology:

Rendering technology used for many types of UWP app content has been changed. If you notice any new visual glitches in UWP apps send your feedback to the Microsoft. Microsoft is widely using the same Windows.UI.Composition API that app developers have access to for XAML UWP app and shell rendering for additional context on this change.

Narrator improvements:

Microsoft’s aim is to make its products more and better performing. Narrator improvements are a big part of that including:

It has a new feature to provide additional information about colors, fonts, line spacing, margins and more.

Press Caps Lock + F to hear this information.  To cycle through nine categories of information, continue to press Caps Lock + F. To move through these categories in reverse, use Shift + Caps Lock + F.

Context Awareness, the default level for a Narrator feature is now set to 2.  As you move around areas such as the Start Menu, Office ribbon, etc. you will hear additional information.  To cycle through the different options, use Alt + Caps Lock + /.  Zero tells off for the feature.

The key to get advanced information about the item with focus has been changed from Caps Lock + F to Caps Lock + 0 in Narrator.

An issue is fixed from recent flights where Narrator only say “No item in view” when placing focus on the Start menu tiles.

New Windows Defender dashboard:

With the availability of a new dashboard coming in the Windows 10 Creators Update, Microsoft is making it easier for you to view and control Windows 10 device security with the health features available on your PC or tablet. Upgrade to this build to get a preview of the new experience. Insiders just need to restart their PC to see the preview. By searching for “Windows Defender” and clicking on the search result that says “Windows Defender/Trusted Windows Store app,” you can find can find the dashboard.  Remember, the dashboard is not fully functional just yet as it is in a work-in-progress state.

Registry Editor Improvements:

Considering users feedback, Microsoft has added the familiar File Explorer keyboard navigation shortcuts to Registry Editor to continue enhancing your registry experience. Now, you can easily go up (Alt+ Up arrow), backwards (Alt + Left arrow) or forwards (Alt + Right arrow) in the registry. To customize the font Registry Editor Uses, a new entry point in the View menu is also added.

The USB Audio 2 Class Driver and You:

To get more miles on the class driver, Microsoft is temporarily changing things as of 14986 to prefer the class driver over third-party drivers. It has been done to flush out device compatibility issues and other bugs in its own driver.

Improved Update Experience:

Windows developers always try to keep your devices secure, reliable and fast performing. In this space, build 14986 comes with two more improvements.

Improving Windows 10 in Asia

Along with Cortana’s new music recognition support for Chinese (Simplified) also made a few changes to improve the Windows 10 experience in Asia based on feedback.

Chinese Input Method Editor (IME) Improvements

  • New context menu for the IME mode
  • Microsoft Pinyin IME now supports importing and exporting self-learned phrases
  • Wubi IME has been updated to support user-defined phrases

Line Mode for Chinese (Simplified) Handwriting

Japanese Input Method Editor (IME) Improvements:

  • It’s now possible to remove text prediction candidates
  • Improving the Japanese IME conversion accuracy
  • Improved reliability and responsiveness

Other changes, improvements, and fixes for PC

  • Windows Hello face is improved which may require you to “Improve Recognition” to get recognized again. To enable this, go to Settings > Accounts > Sign-in Options and under “Windows Hello” and “Face Recognition”, then choose “Improve Recognition” to go through the Improve Recognition wizard.
  • The Taskbar’s context menu settings entry are update to now explicitly be called “Taskbar settings”, as that is where it pointed.
  • Fixed the issue where the Virtual Touchpad’s right and left buttons might not work on some devices. An issue where the Virtual Touchpad wouldn’t launch if the primary monitor was non-touch also fixed, and the Virtual Touchpad icon to the Taskbar settings is added where you can Turn system icons on or off.
  • The issue where apps such as Store, Photos, and People might launch on their own after PC had been inactive for long.
  • The issue where navigating to Settings > System > Battery would crash the Settings app is also fixed.
  • The default state of the Handwriting Panel that docked at the bottom of the screen is changed to be floating next to the text field. If you want to use it in docked-mode, select it by tapping the icon in the top right corner of the Handwriting Panel.
  • An issue is also fixed where using ~ to switch languages using the Thai keyboard might sometimes result in a hang while typing in Office apps, such as Outlook or Word 2016.
  • Migration logic is also updated to preserve unlock setting across upgrades when going forward from 14986 the default user’s.
  • An error is resolved where Microsoft Excel was crashed while double-clicking on an Excel document to open it from File Explorer.
  • An issue is also fixed where Windows Hello might get stuck “Looking for you”.
  • An issue Insiders with Surface Dial is also fixed that users were experiencing while rotating the Dial as it was making unexpected beeps.
  • A few things have moved around in Storage Settings like, “settings to change save locations” has moved to its own page. An issue of showing an unexpectedly high number for Storage Usage for the Other category is also fixed.
  • An issue is also fixed where the PowerShell entry in File Explorer’s File menu sometimes gets unexpectedly grey out.
  • An error is fixed where the Clock and Calendar flyout in the taskbar wouldn’t launch if the system was using the phonetic sorting method and the display language was set to Chinese (Traditional).
  • The full screen Settings search results are updated, now use smaller icons. It is expected that it will deliver an overall more polished feel because more search results will display on the page at a time.
  • An error where some notifications might draw too low or too high, and then be seen shifting itself to the correct position.
  • An issue is also fixed where the outline incoming notification toasts might still be seen even if notification banners as a whole for that particular app had been turned off.
  • An issue Insiders may have experienced where despite having items in the Favorites folder, the Favorites bar on desktop might appear empty is also fixed.
  • The issue of CPU throttling when idling on certain webpages with many looping videos or gifs in Microsoft Edge.
  • Insiders reported that sometimes pressing Alt + D was not being able to set focus to the address bar in Microsoft Edge, this issue is also fixed.
  • For Insiders with PCs that upgraded to builds 14926-14959, some default power settings may have been lost and not recovered on subsequent upgrades. The effect of this causes devices to potentially use more power, change the power button behavior on tablets, etc. Starting with 14986, an attempt to detect this issue and re-apply the power settings will be made during upgrade. This attempt is a temporary process to help address this issue for Insiders, and will be removed once we’re closer to the Creators Update release.
  • Windows Error Reporting logic is also updated so that online game play, video streaming, Skype calls, or other network-intensive activity don’t get interfered by uploading crash data.
  • An issue that result in potentially freezing at the splash screen on launch of Microsoft Studios games like Microsoft Sudoku, Jigsaw, Minesweeper, Taptiles, and Treasure Hunt.
  • An issue is also fixed where the task bar was visible on the Welcome screens after upgrading even if its location was set to be on top.

How to invade Cybersecurity Challenges

This is the digital age and everybody is connected through one or another technology performing many of their regular activities including personal as well as professional. There is a plethora of gadgets and automated workflows running on integrated platforms to function. With the increasing dependency on latest technologies and devices, cybersecurity challenges have forced the technocrats to work together in order to invade upcoming challenges. One of the best ways to handle cyber threats is work together for better outcomes.


More and more security designing organizations are connecting to each other to come up with a solution that can not only secure the users and businesses in the present scenario, but also in future. With the collective effort of them, feasible solutions are suggested and provided by the security software developing organizations. Many big player of the same vertical are aiming to win the trust of users. Although, security designing organizations always try to bring up a product or solution that doesn’t leave any scope for the hackers, but technologies are changing at every instant, it is user’s responsibility also to challenge their knowledge and skills. They need to abandon obsolete defense technologies and adopt the advanced techniques and hacks for a more secure world.

Staying safe in today’s scenario a big challenge as it is not only the matter of trust. One needs to invest time and money along with the trust to stay safe for longer duration. There are thousands of products having emphasis either only on user’s device security or the information it has. One needs to take innovative measures to strengthen their cyber culture and cyber infrastructure. Every key point in the cloud technology should be protected.  Users awareness at individual as well as professional level will helpful in addressing threats quickly using fewer resources.

Today, hackers are very smart and they have been quietly assembling themselves into hierarchies and complex criminal rings on the “Dark Web.” Doing so will help them in running extremely large, efficient and profitable operations in an illicit manner.  Today the ratio of cyberattcaks through crime rings have been increased more than 80 percent.  It is simply not enough having the basic protection like firewalls, antivirus software and logging. Breaches can lurk undetected in systems even if you have the basic protection. To prevent cyberattacks and advanced threats, businesses need to able of:

  • Performing advanced network and big data analytics.
  • Diagnosing and detecting both major as well as minor anomalies like repeated login attempts, traffic spikes on off hours across a huge range of data and network traffic.
  • Responding immediately if any security breach is detected.