Friday 29 June 2018

New Release- Free Thanatos Ransomware Decryption Tool

Some of the users are complaining that they are noticed that your computer system has been infected with Thanatos Ransomware and they are looking for a free ransomware decryption tool to unlock or decrypt their files. So there is good news for that users. Her they will get an amazing free tool to avoid this issue.
As per the report of security researchers, Cisco Talos have told about a weakness in the Thanatos ransomware code which is able to make possible to unlock their Thanatos encrypted files for without paying any ransom in cryptocurrencies means free of cost tool. As same of the ransomware risks, Thanatos encrypts data and asks the user to pay for payment in multiple cryptocurrencies, including Bitcoin Cash, to decrypt their files.
The researcher says that multiple versions of Thanatos have been leveraged by hackers indicating that it is an evolving threat. It can continue to be activities that are designed by threat actors with multiple versions. All are having been distributed in the wild.
Dissimilar to other ransomware regularly being disseminated, Thanatos does not request deliver installments to be made utilizing a solitary cryptographic money like bitcoin. Rather, it has been watched supporting payoff installments as Bitcoin Cash (BCH), Zcash (ZEC), Ethereum (ETH) and others.
Once tainted, all the encoded filename expansions on the influenced PC are changed too.THANATOS, and afterward a payoff note flies up at whatever point the client attempts to sign on to the framework, teaching them to send the payment cash to a hardcoded digital currency wallet deliver to unscramble the records.
Notwithstanding, since Thanatos utilizes diverse encryption keys to scramble each record on a tainted framework without putting away them anyplace, it is unimaginable for malware creators to restore clients’ information, regardless of whether the casualties pay the payment.

More about Free Thanatos Ransomware Decryption Tool:-

Cisco analysts broke down the malware code and found a proviso in the plan of the record encryption procedure utilized by Thanatos, utilizing which they built up a free ransomware decoding instrument that will enable casualties to unscramble their documents.
Named ThanatosDecryptor, to get the source for free ransomware decoding device you can be downloaded it from the GitHub site, which has as of late been procured by Microsoft for $7.5 billion, and works for Thanatos ransomware adaptations 1 and 1.1
Since the encryption keys utilized by Thanatos are inferred in view of the quantity of milliseconds since the framework last booted, it was feasible for scientists to figure out the rationale and re-produce the same 32-bit encryption key utilizing savage power assault and Windows Event Logs.
The researcher explained that, Since Thanatos are not able to modify the file creation dates on encrypted files, the key search space can be further reduced to approximately the number of milliseconds within the 24-hour period leading up to the infection.
In a recent research 100,000 brute-forces are attempts per second that was the baseline in a virtual machine used for testing, maximum it will take 14 minutes to retrieve the encryption key in these conditions completely.
To know more information about the Thanatos ransomware, you can move to the detailed blog post that is published by Cisco Talos, today.

How to Protect Yourself From Ransomware Attacks?

Most of the ransomware is spreading from the phishing emails, malicious adverts on websites, and third-party apps and software. However, it is Locky, CoinVault, Thanatos, TeslaCrypt, or any other ransomware malware, the protection measures are standard.
  • To secure yourself from these ransomware attacks, you need to be suspicious all of the unwanted files or documents sent in an email and always remember no need to click on the links inside those documents unless confirming their sources.
  • You need to check if any macros are disabled in your MS Office apps.
  • If you have got nothing then block macros from running in Microsoft Office files from the Internet.
  • Always have a tight grip on all of your private or essential documents.
  • You need to keep a good backup routine in place which makes copies of your files to an external storage device always that is not connected to your computer system.
Besides this, you need to make sure that you are running an active behavioral-based antivirus security program on your computer system that can detect and block such malware before it can infect your device, and always remember to keep them up-to-date.
Source Url - notronsetup.com

Switch Docked and Undocked play time is “About Even,” says Nintendo

Since Nintendo’s Switch was released in 2016, it has been offering two completely different play styles. Users can either play it as a handheld or as a console. According to an official Nintendo Switch research conducted in 2017, over fifty percent of Switch gamers play on the Switch in both handheld mode and docked to a big screen. Nintendo’s investor presentation also revealed that approximately 30 percent of Switch users primarily use the undocked mode over eighty percent of the time.
In a recent interview, Nintendo’s VP of Sales since 2015, told Ars Technica that Switch playtime divide between the two modes is “about even” with half in the dock and the remaining away from the dock. The undocked playtime portion consists of both tabletop mode as well as handheld mode. He added that Nintendo, at present, is not monitoring which specific play mode a user is using at a particular time.
Nintendo has collected the stats data via online Nintendo accounts. Therefore, it means that offline games are not included in the dataset. Children below the age of 12, who consist of 17 percent of Switch user base, most likely do not have access to the internet. Browser added that these statistics allow Nintendo to understand its markets and how users play the games. It helps them in creating digital marketing campaigns.


Google Executive Says it Lost Out to Microsoft Buying GitHub

A Google administrative has admitted that the search giant lost out on buying the GitHub.
Yesterday, speaking at a Fortune Magazine event, the Diane Greene Google’s head of cloud prepared an interesting admission that I wouldn’t have minded to buying them, but it was OK, said by the Greene, Bloomberg reports.
However, earlier rumors have suggested that the Google was trying to acquire GitHub, besides the Microsoft’s bids. Chris Wanstrath, the GitHub founder allegedly choose Microsoft only because of his relationship with the CEO Satya Nadella.
Now, GitHub is a very large code repository which was becoming very popular with developers and also companies to host the projects, documentation, and also the codes. Apple, Facebook, Amazon, Google, and many other big tech companies are using GitHub. There are almost 85 million of the repositories which are hosted on the GitHub, and almost 28 million developers who are contributing to them.
The Google earlier this month comment on whether it will remain to continue to use the GitHub, but one of the spokesperson said that we do not comment on any ongoing acquisitions across the industry. And the Facebook has committed to the GitHub, a spokesperson revealed the truth, as long as the GitHub always remains a great place to share projects and also work together with some open source community, and we will continue to use it.
Greene also repeated that similar concerns from the developers about the Microsoft buying the GitHub and its future. He really hopes that the Microsoft will keep them neutral. Most of the developers look to be waiting to see what will occur with the Microsoft’s acquisition. Several well-known developers on GitHub, some of them would have had worried even if Google had acquired the service. Now the Microsoft has been trying to cool the initial nerves, and later this year, the company is now expected to close its deal.

How to Install a Newer Version of OneDrive on Windows 10?

No doubt Windows 10 comes with advanced apps and software for the user’s comfort. Amongst all of them, one is OneDrive. If you want to add the latest version of OneDrive on your Windows 10 computer system, then it is possible that you have got a common error on your computer screen that is –“A newer version of OneDrive is installed; You need to uninstall it first before installing this version.” But you no need to worry about it because it is no0t so tricky issue. In this post, we will discuss what the mean of this issue is and how we can fix this problem efficiently?
If you are using the Windows 10, then OneDrive is already installed as a pre-installed app on your windows computer system. Microsoft has provided the Store edition of OneDrive in Windows 10 to make more comfort and use.
Although, if you are getting any issue while synchronizing the OneDrive, and you are trying to reinstall the OneDrive app on your Windows 10 computer system, then you can face an error as we have mentioned earlier. It will be annoying you from installing the newer version of OneDrive app on your computer system.

Steps to get a newer version of OneDrive are installed:-

  • To get rid an immediate with this issue and install an executable file of OneDrive then first you need to uninstall the preinstalled version of OneDrive app from your computer system.
  • So let’s start the Uninstallation of OneDrive from Windows Settings
  • Then open the Windows Settings on your Windows 10 machine.
  • After that, you need to press the Win + I keys both together to do that.
  • Then move to the Apps > Apps & features section.
  • You will get the Microsoft OneDrive is placed at the right-hand side.
  • Now, you should click on the Uninstall button twice to confirm your OneDrive app.
  • Now, you have done all of the steps.
  • This process will take few to finish the uninstallation process correctly.

How to Uninstall OneDrive using Windows PowerShell? 

  • To do this, you need to open the Windows PowerShell tool with administrator privilege and then run the below-given command: Get-AppxPackage –AllUsers
  • Then, you need to search the PackageFullName of Microsoft OneDrive.
  • In Windows PowerShell, you need to find it like Microsoft SkyDrive.
  • On that place, you need to enter the below-mentioned command: remove-AppxPackage PackageFullName
  • Then replace the PackageFullName with the Microsoft OneDrive original package name which you have copied from Windows PowerShell.
After completing the installation process, you will be able to download the latest version of OneDrive app and use the executable file without any issue on your computer system. If you do not want to get the executable file and want a simpler option, then you can open the Microsoft Store and download then OneDrive app from there directly.
We hope that the given simple process will help you to install the newer version of Microsoft OneDrive app on your computer system.

Thursday 28 June 2018

How to Install the Updated Python 3 in Mac OS?

As we know that, Python is a remarkable and popular programming language in the market. Beginners and longtime developers alike widely use it. The latest versions of Mac OS comes with Python 2.7.x installed or Python 2.6.1 if a previous version of Mac OS X, but some of the users Python are want to update Python in Mac OS in the latest version for example- Python 3.6.5.
In this article, we will discuss how you can get an updated Python 3 installation on your Mac with the help of two different ways to quickly and easily install Python 3 onto a Mac. The methods are given below:-

Steps to Install the Updated Python 3 in Mac OS?

It is the simplest way to install Python 3, and you can use it by using the Python package installer from python.org.
  • To do this, you need to go the Python.org downloads page and then download the updated Python installer package from here.
  • Then, you need to run the Python installer package and install the Python 3 on your Mac.
Please note- Python 3.6.x will requires at-least 100mb of disk space to install. The installation process is very easy, and you will have Python 3.x alongside Python 2.x on the Mac.
  • After completing the Python 3 installation process, you will see a Python 3 folder in your Applications directory of your Mac.
  • Besides this, you will find the simple IDE that is called IDLE within the or Applications/MacPython3/ directory.
  • It will provide you the same Python IDE you’d face if you ran ‘python3’ at the command prompt in Terminal.

The second way to Install the Updated Python 3 using Homebrew in Mac OS:- 

You can also install the Python 3.x on a Mac using Homebrew, and it is an effective way as a Homebrew user.
If you want to update the latest version of Python 3, then you are a right place. Homebrew is the simplest way to do this quickly. For that, you need for the Homebrew installation on your Mac, if you want to use the Homebrew method, but if you are interested in messing around with Python, then Homebrew will probably appeal to you anyway.
We supposed that you have already used the Homebrew. But if you don’t then no need to worry about it, you will get below a simple process to install Homebrew on Mac OS.
  • To install the latest version of Python 3 using Homebrew, need to use the below-given command string:
brew install python3
  • Once the updated Python 3 has been installed on your Mac, you can run it with:
Python3

Steps to Check What Version of Python is Currently Installed in Mac OS:-

  • If you want to know that what version of Python is installed then you ne4ed to go to the Terminal application and simply to type the following command:-
  • python –version
  • If you have MacOS, then you will get it’s typically Python 2.7.x or some variation, either 2.7.4 or 2.7.10 or similar.
  • When you have installed Python using Homebrew or with the package installer, then you will able to check the updated new version of Python with:
Python3 – version
  • As we have discussed before, both installation process of Python is very easy. You can save your time and efforts by using these.
Please note- Some of the aspects of Python are different in each version, and even features like the instant Python simple web server tip is different from version 2 to version 3. If you want to use something long term, or learning in general, you will be better off writing in Python 3.x rather than the previous releases of Python 2.x.
With this, you have completed all of the steps, and you have got the Python 3 installed. You are ready to use it on your Mac system.

Tuesday 26 June 2018

How to Find the EarTrumpet Volume Control App for Windows 10?

EarTrumpet is a UWP app hosted for Windows 10, it is available on the Microsoft Store. If you want to install this app, then you need to get a new redesigned Volume Mixer with one option, and you can get it from the system icons list. It does not matter what we are doing on our computer system, laptops or tablets or other devices, it involves the use of sound in some or in another way.
If you are a gamer or developer, or if you are using your computer system for office work or browsing the Internet then in certain situations you have to toggle volume on your Windows 10 computer system.
To beat this issue, Microsoft has been providing a standard volume control for a very long time in the system icons group. It is a master volume control that will always work for all the applications playing sounds. If you want to control the volume of these applications individually. But fortunately, Microsoft got you covered here as well.

How to Set Volume Mixer in Windows 10?

  • To do this, you need to do the right click on the Volume Control icon and then click on the Open Volume Mixer option.
  • Then you will see the Volume Mixer Control box will open up.
  • It will take few minutes to proceed.
  • However, with EarTrumpt application, you can do it with just a single click.
Suggestion- It is a UWP app so that you can get it from the Microsoft Store, it is free of cost app. You can get a full featured app and that too without any less of Advertisements, or limitations of services. Besides this, it is an open-sourced and hosted app on GitHub.

EarTrumpt for Windows 10:-

For windows 10 EarTrumpet will work on Windows 10 PCs running Windows 10 1803 and latest Windows 10.

What does this app do?

It has an additional Volume Control icon as default on Windows 10 Volume Control icon in the System Icons list. With the help of this you can get all the Volume Control Mixer controls in a latest Windows 10 Fluent Design and that too reachable with a single click.

Let’s find how the Volume Control center in the new design looks like?

Features in a nutshell:-

  1. Matches the look and feel of Windows
  2. Supports moving apps between playback devices
  3. Controls classic and modern app volumes
  4. Integrated with Feedback Hub.
  5. Controls default audio device with two clicks.
There is no doubt that this app is compatible with all the computing devices with a chip with an architecture of x86. It means, all the accessories such as- laptops, tablets and computer system running Windows 10 1803 will be compatible.
Besides that, some of the new low powered hybrid laptops and tablets that are powered by Qualcomm’s Snapdragon processors will be compatible because of x 86 emulation layers present in the operating system’s architecture.
According to the developer, this is the only device that is not some compatible with the app is the Surface Hub. But Rafael is doing work hard to bring it in compatibility to the Surface Hub as well.
If you want to download this impressive app to your computer system, you need to navigate to the Microsoft Store and then install it simply.

Monday 25 June 2018

Apple Revamp ‘Sticky’ Keyboards Issues on Some MacBook Pros & MacBooks

Finally, Apple has acknowledged defeat when it comes to its MacBook “butterfly switch” keyboards.
On Friday, the company said it would change “a small percentage of keyboards in definite MacBook and MacBook Pro models” whose characters or letters repeat surprisingly, characters or letters don’t emerge or whose keys feel “sticky” or not respond consistently.
Every model listed which is ranging from 2015’s 12-inch Retina MacBook to 2017’s 15-inch MacBook Pro and uses the butterfly switch design Apple first rolled out with its computer revamp in the year 2015. Both first and second generations of the butterfly switch design are covered in the service plan, and the MacBooks has covered under the repair plan which includes models with and without the Touch Bar option.
Apple, in a statement, said that, reiterate the limitations of the service program but doesn’t give more details about the number of devices impacted.
Apple or an Apple Authorized Service Provider will scrutinize the customer’s device to authenticate the eligibility and then also perform the service free of charge. Service might involve the replacement of one or more keys or might be the whole keyboard.
Apple also added that customers who have already paid for some repair associated issues to the service program could contact the company to get a refund for the service cost directly.
Apple rolled out some new keyboard design in 2015 which is an effort to make its laptops even lighter and thinner than in the past few years. The butterfly switch replaced the traditional “scissor” mechanism below each key and was meant to be more constant, comfortable and responsive.
But instantly, some of the users complained about the experience of the new keyboards and said that a fragment of dust could easily damage them. Some have said that they have had to go a week or more without their computer or devices while the Apple replaced not only the unresponsive key but possibly also considered part of their MacBook. And the fix is not as much cheap.
In any case, almost three proposed class action lawsuits have been filed against the Apple over the use of the butterfly switch.
Apple, in reply to the butterfly switch complaints, a year ago published a webpage that outlining how to clean the keyboard by using a can of compressed air. But some users have said that it doesn’t work properly. But now by launching a replacement program, Apple emerges to confess that the problem is worse than it earlier thought.
The program covers up the MacBook and MacBook Pros for almost four years after purchase. Apple also noted that the service program doesn’t widen the standard warranty of the computers.
Source Url - notron.com

New SamSam Ransomware Variant Needs Direct Attacker Involvement

Another variation of the SamSam ransomware family requires guide contribution from aggressors keeping in mind the end goal to execute its malware payload.
Revealed by Malwarebytes, new forms of SamSam expect aggressors to execute a clump document that is in charge of stacking up a .NET sprinter. They do as such by physically entering a secret word as the documents summon line parameter and without the utilization of a different record.
The password is then passed down the disease tie to the .NET sprinter, which uses it for decoding of a scrambled stub document keeping in mind the end goal to execute the primary malware payload.
This password makes it troublesome for scientists to break down the most recent variants of SamSam’s malware payload. They require the secret key to do as such, yet they can’t acquire it except if they catch it at the season of an attack. Without the secret word, there’s solitary so much they can find out about SamSam’s advancement, including whether there are any mistakes they can endeavor to build up a decryptor at some point later on.
Allan Liska, the Senior Solutions Architect at Recorded Future, revealed to Bleeping Computer that the expansion of the secret word focuses on the complexity of SamSam’s administrators.
That watchword gives off an impression of being set at assembly time, which implies each crusade may have an alternate secret word related to it. While, to the best of their insight, the SamSam amass isn’t a country state on-screen character, these strategies, shielding the code from security specialists and restricting the introduction of that apparatuses, are fundamentally the same as what country state on-screen characters do.
Up until now, those attackers have utilized their nearby control of SamSam to contaminate extensive associations like doctor’s facilities and government substances.
Given those attacks, human services suppliers need to ensure they find a way to secure their surroundings.

Sunday 24 June 2018

Zero-Day Exploits: Attackers Targets Microsoft Office

According to the latest report from Menlo Security Being one of the top choices as an attack vector is probably not a contest that any of the platforms want to win. Regrettably, for Microsoft, MS Office will not only persist to be the attacker’s vector of choice, but it will also be the platform for exploiting the vulnerabilities.
After the 360 Total Security blogged about the first Advanced Persistent Threat (APT) campaign that outlines its attack with an Office document embedding a newly discovered Internet Explorer 0-day exploit. The Menlo Security researchers required to understand why some of the attackers were using the malicious Office documents for endpoint the exploitation.
Malicious Microsoft Office documents have attached to emails as an attack delivery mechanism which is not new, but according to the report, Microsoft Office: The New Platform for Exploiting Zero-Days detailed the latest examples of the increasing complexity of methods which is being used and also highlighted the need for a more foolproof approach towards the security.
While the paper was being drafted, a latest zero-day exploit CVE-2018-5002 was automatically disclosed, though all two Flash zero-day vulnerabilities will continue to be exploited in the wild.
The report also stated that there is likely to be a boost in attacks through the malevolent email attachments by using the stealthily embedded, remotely hosted malicious mechanism that leverage applications and also the operating system vulnerabilities, both new and old.
However, researchers did find some new attack methods. One is the use of entrenched which remotely hosted the malicious components exploiting app and also OS vulnerabilities in the Word documents which delivering zero-day exploits.
Though the Microsoft Word is one of the leading cloud office-productivity platforms, and its popularity is likely to grow. It will most probably continue to be the attackers’ vector of choice and also the platform most often used to develop vulnerabilities.
In the latest report, the researchers initiate that nearly all recent zero-day attacks have been delivered through the Microsoft Word. With CVE-2018-8174 and CVE-2018-5002, the attackers leveraged Word as a vector to exploit the Adobe Flash Player and also the Internet Explorer. Since by using Word as the vector, the attackers were easily able to exploit a web browser, if it is not even the default browser, and also exploiting Flash, although Flash is blocked by most enterprises.
The report concluded that Microsoft is thus undoubtedly going to become the platform that some of the attackers leverage most only to deliver their zero-day exploits.

Thursday 21 June 2018

How to Open PowerPoint Slides in Microsoft Word?

We will provide you complete steps that will guide you in converting the PowerPoint presentation into a Microsoft Word document by easily using the “Create Handouts” feature on the PowerPoint for Windows operating system, or by exporting an RTF (Rich Text Format) file using PowerPoint for Mac operating system. The latest version of PowerPoint for Mac does not have any “Create Handouts” feature. RTF files are not able to convert the document accurately formatting of some PowerPoint features, many images and backgrounds might not be supported in the word.
Below we are describing the steps for both operating systems, such as Mac as well as Windows. But to avoid the trouble following the steps in ascending order and saves your time and efforts. The steps are mentioning below-

Steps to Open PowerPoint Slides in Microsoft Word

For Windows

  1. Click to open a PowerPoint presentation.
  2. Then, click on the PowerPoint presentation file which you want to convert
  3. Then, click to open the file
  4. Now, click on the file option, appears in the menu bar at the top of the screen.
  5. Then, click on the export option, given in the scroll-down menu.
  6. Click on the create handouts option
  7. Now, click to create handouts in Microsoft Word.
  8. Choose a layout for the Word document.
  • If you want that Word document to update automatically whenever the original PowerPoint presentation is changed, then click on the Paste link option.
  • If you want that the Word document to remain unchanged, whenever the original PowerPoint presentation is updated, then click on the Paste option.
  1. Finally, click on the OK button.
  2. Now, the PowerPoint presentation will open as a Word document.

For Mac

  1. Click to open a PowerPoint presentation.
  2. For properly open the PowerPoint presentation file, that you want to convert, then click on the File, Open and choose the file.
  3. Now, click the filein the menu bar option,
  4. Click on the Export option.
  5. Now, type a filename in the Export As a field, and a save location in the “Where” scroll-down menu.
  6. Click on the “File Format” scroll-down menu and choose the Rich Text Format (.rtf).
  7. Click on the Export option, so that the PowerPoint presentation will be saved as a Rich Text Format (.rtf) document in the specified location.
  8. Now, open Microsoft Word.
  9. Click to open the RTF file.
  10. Then, click on the File, then you need to open and select the RTF file that you just exported from the PowerPoint. It will open the RTF file in the Microsoft Word.
  11. Click on the File and then click on the Save As an option, it will open the Save window which will let you save the document or file as a Word file.
  12. Click on the “Format” scroll-down menu and select the Word Document (.docx).
  13. Click on the Save option.
  14. Finally, the PowerPoint presentation is now saved as a Microsoft Word document
Note: if in any case, the formatting and pagination will not match with the original PowerPoint presentation, and many backgrounds or pictures might not be supported by the RTF format in Mac. Ensure by going through the Word document and also adjust it to your liking.

Simple methods to fix hp Printer Drivers Unavailable Error

  If your printer doesn’t detect printer drivers it will display   hp printer drivers unavailable   message. Drivers are a sort of communica...