Wednesday, January 31, 2024

Jetico updates BCWipe Total WipeOut to meet the NIST hard drive wipe requirements

Jetico released an update of BCWipe Total WipeOut. Addressing concerns of meeting the NIST hard drive wipe requirements, the new version of the software allows users to erase hard drive data and follow the guidelines in a single click.

The update also supports the User Data Erase command, which ensures that data wiping meets the NIST Purge requirements for SSDs and NVMe drives.

“The NIST guidelines for media sanitization are widely accepted and followed internationally, but they are rather lengthy and can be overwhelming for businesses to unpack,” explains Jetico CEO Hannaleena Pojanluoma. “After careful examination of the guideline’s recommendations, Jetico’s team used their 20+ years of experience in data protection to turn BCWipe Total WipeOut into a one-click solution that makes following the NIST guidelines easier and more accessible for clients.”

Users of BCWipe Total WipeOut can now choose to erase data with a preconfigured wiping policy that follows the NIST SP 800-88 Guidelines for Media Sanitization requirements. The preconfigured wiping policy includes:

  • Implementation of hardware-level erasure techniques such as NVMe User Data Erase, which is particularly useful for meeting the NIST regulations for purging data.
  • A verification step to provide confirmation that data erasure has been successfully completed.
  • A notification system that informs whether the wiping process results in a Clear or Purge level of sanitization.
  • Tamper-proof wiping reports for auditing purposes.

In addition to automated adherence to NIST guidelines in a single click, this update to BCWipe Total WipeOut includes:

Wi-Fi support: Users now have the ability to remotely wipe devices via Wi-Fi connection, allowing for added flexibility and convenience. This feature is particularly useful for managing the latest generation of laptops and tablets that don’t include built-in Ethernet ports.

SMART status: BCWipe Total WipeOut now includes the ability to check the Self-Monitoring, Analysis, and Reporting Technology (SMART) status. This feature gives users the option to review the status of the drive, including details about its lifespan and degradation, which can be particularly useful for proactive maintenance and data protection.

Enhanced wiping reports: Wiping reports now include comprehensive data about hardware modules installed in the system, unique IDs and version numbers. These additions will be useful to IT Asset Disposition (ITAD) professionals and corporations for inventory management purposes. Furthermore, information about hardware diagnostic tests and SMART data analysis can now be included in reports. A simple checkbox system gives users flexibility to adjust these options to best suit their specific needs.

For over 20 years, BCWipe Total WipeOut has been trusted by the world’s top security organizations to erase the contents of traditional Hard Disk Drives (HDD), Solid-State Drives (SSD) and Solid-State Hybrid Drives (SSHD). Since 2016, Jetico’s data wiping solution has been certified by ADISA.


from Help Net Security https://ift.tt/ANn9uRs

Tuesday, January 30, 2024

Seven 'Home Improvements' You’ll Almost Certainly Regret

While most home improvement projects yield generally positive results—increased home values, more usable spaces, improved enjoyment of the property—there are never any guarantees a project will work out the way you hope. While bad execution—the wrong materials or finish, for example, or hiring the wrong contractor—doesn’t mean the project itself was a bad idea, there are a few so-called “improvements” that you will probably regret no matter how well-executed they are.

Touchless faucets

The appeal of touchless faucets is obvious: Instead of smearing dough or grease all over your nice fixture, you can just wave your hand imperiously and water magically pours out for you. Plus, there’s at least an hour-long period after you first install it when you’ll have the most fun you’ve had in a long time pretending to have magic powers.

The benefit of a touchless faucet is real, but it’s also minor—and they come with too many drawbacks:

  • You will accidentally turn it on all the time. You will also get caught in a loop of waving at it, getting impatient, and waving fruitlessly again.

  • These faucets require power, either from an outlet or a battery, which leaves the possibility of not being able to run your water in the event of a lengthy power outage.

  • If you need to adjust the temperature of the water, you’ll have to actually touch the faucet, negating its sole benefit.

Ceiling height cabinetry

It’s considered trendy to have kitchen cabinets soar all the way to your ceiling, and there are seemingly good arguments for it. For one thing, having your cabinets go all the way up eliminates the dusty wasteland that otherwise forms on top of your cabinetry, and, we’re told, tall cabinets look sleek and elegant and can make small kitchens look larger.

But those enormous cabinets also have one other feature: Uselessness. Unless you intend to have some sort of ladder permanently installed—or you don’t mind climbing up onto a kitchen chair on a regular basis—you will either never actually use those cabinets or risk your safety doing so.

Pot fillers

If you close your eyes right now and imagine a swanky, expensive kitchen, you’re probably including a pot filler in the vision. Pot fillers are the sort of little extra that just seems luxurious—imagine not having to carry a heavy pot to and from the sink! It’s exactly the sort of rich-person detail we love, because it costs a lot of extra money to eliminate a tiny amount of effort.

Actually, they barely do even that much, because you probably have to carry your pot of water back to the sink when you’re done cooking anyway, so it doesn’t eliminate the chore so much as cut it in half. And pot fillers have downsides you will regret:

  • They’re challenging to clean. Between cooking grease, food splatter, and dust, a pot filler can be tough to keep looking spiffy.

  • They provide one more place where water can betray you and ruin part of your home.

  • Depending on how often you use it and how hard your water is, they can rust and get clogged with mineral scaling.

Built-in tech

There’s something magical about having all the wires and ugly boxes involved with home entertainment systems and other technology hidden behind walls or inside custom installations. It can make your home feel cutting edge to have a TV rise out of a cabinet, or have surround-sound speakers wired in.

The regret comes later, when it’s time to upgrade. Custom installations may make it very hard to move up to a larger television, for example, and things like speaker systems that were current less than a decade ago can be useless with modern smart home systems. You can’t stop the march of progress, but updating your tech is a lot easier when you don’t have to open the walls or adhere to very specific specifications to replace components.

Enormous kitchen islands

If you watch home improvement television shows or follow renovation social media, you know that everyone is crazy for kitchen islands. So many folks on these shows walk into perfectly fine kitchens and lament the lack of an island; it’s easy to believe that a kitchen without an island is no kitchen at all.

And a kitchen island can be a perfectly useful and beautiful addition—if you have the space for it. And even if you have a large kitchen that could make good use of the extra counter and eating space an island provides, there are two ways to end up regretting your choice:

  • Too large. Having an island that’s too big will reduce the usability of your kitchen and make even a large kitchen feel small.

  • Inhibited workflow. Having an island that includes an oven, dishwasher, sink, and/or storage is great—unless they’re positioned on opposite sides and you have to run around it to accomplish anything.

  • Cleaning. A huge island may look impressive, but when you have to climb on top of it to clean that countertop, you will experience what scientists call regret.

Garage conversions

If you need more square footage in your home, a garage conversion can get it for you at a relatively low price. And you may be very happy with the new office, bedroom, or living space you create out of it. But even if you enjoy the new space, you’ll likely have some regrets later—especially when it’s time to sell:

  • Layout. Garages aren’t placed to be used as living spaces, so your new home layout is probably going to be a bit strange—like having a bedroom just off the kitchen.

  • Curb appeal. A sealed-up garage can look pretty awkward from the street, which can inhibit your ability to attract buyers when you want to sell the house.

  • Loss of ... garage. People like garages for their cars. That’s why homes with garages are worth more (on average about $23,000 more, but in some areas, like Chicago, that number doubles).

Spa/Jacuzzi tub

Another detail that gets house hunters excited on TV and social media channels is the spa tub. And in theory this makes sense: You can imagine yourself luxuriating in one as jets of warm water massage your aches and worries away.

But spa tubs are made for future regret. Even assuming you use it as much as you think you will (you probably won’t), there are several reasons you’ll probably regret installing one:

  • Price. These suckers can be expensive, with an average cost of $3,000 to install. As with all things, you can buy cheaper models ... but those come with their own set of regrets.

  • Durability. Unlike regular tubs, whose sole job is to fill with water and not leak, spa tubs are complex machines. They have all kinds of moving parts and other components, which means they require maintenance and upkeep that most tubs don’t.

  • Cleaning. Keeping your jetted spa tub clean is a constant battle. Aside from the usual issues of residue and rings left behind, you have to ensure the jets are kept clean to keep them working (and to stop mold from growing in them).

Of course, the real value of any home improvement is your enjoyment of the final result—if you love what you’ve done, you won’t have any regrets. But if you’re making improvements in response to trends or because you expect a bump in your home’s value, do a little digging (and introspection) before assuming it will all work out.


from LifeHacker https://ift.tt/5pQn2jX

Siren launches AI-Powered search with mobile access for front line officers

Siren has launched a new AI-Powered search with mobile access as part of its latest release and its Siren for Law Enforcement product bundle.

Siren provides a complete suite of investigation tools for contemporary challenges such as police vetting, “Smash and Grab” violence, VIP protection, trafficking, supply chain rime and maritime security.

Siren connects local classified information with external vendor data as well as data available from public sources (OSINT), to identify patterns, actors and events. Siren is now available on mobile devices to provide an additional layer of safety for front line officers.

The new AI-Powered search dramatically reduces the complexity in connecting disparate intelligence. Complex links can be made by anyone from any department, using a basic language based search and without the need for analytical skills. According to Siren’s research, it takes at least six months for a new analyst to become productive. The simple interface naturally distributes the workload.

Siren makes it possible for front-line officers to background check suspects, companies and properties from a mobile device prior to criminal interactions and site raids. The new Siren innovation offers an extra layer of security, reducing the risk of unexpected dangers and providing fast actionable leads.

“Simple is hard and that’s what we have achieved with Siren 14.” said John Randles, CEO of Siren. “Siren can now provide complex connected intelligence to Command Staff and Uniformed Police without data science training. It’s a simple search just like using the internet or shopping online.” he concluded.

“The new ability to search in Siren will push the control of basic investigations and safety checks back out into the hands of those who need it most.” said Siren customer, Kathleen Miles, Head of Client Relations, and Co-Founder of Ex Arca, an open-source research firm. “Siren mobile means that intelligence teams can focus on the work they are trained to do.” she added.

“Siren is now accessible to the whole department which is a complete game changer. Democratising intelligence like this is a change not seen in twenty years of technology.” commented Bob Griffin, Chairman of Siren.


from Help Net Security https://ift.tt/aV0WKtl

Monday, January 29, 2024

The Best Mesh Networking Systems to Buy in 2024

So, you've decided that mesh networking is right for your home. As such, you're going to want to pick the right mesh networking kit, rather than a traditional router setup. While there are plenty of kits on the market to choose from, it's not an easy decision, especially since these things get pricey fast. That said, these four options stand out to me as among the best of the bunch.

Vilo Mesh Wi-Fi System

Vilo mesh networking system
Credit: Vilo

If you're looking to give mesh networking a try but don't want to spend as much on a system, then the Vilo Mesh Wi-Fi System is a good place to start. It lists for around $115.99 on Amazon, though it can often be found for much cheaper during flash sales. This particular option gets you three devices, a main router and two satellites, and is one of the best budget options around.

These devices support up to 4,500 square feet of space when using all three, and come with three separate gigabit ethernet ports if you want to keep things wired and as fast as possible. There are also built-in parental controls, in case you need to control how much time your family spends on the internet.

The Vilo Mesh Wi-Fi System is available now for $115.99 on Amazon.

Eero 6+

eero 6 plus mesh networking system
Credit: Amazon / Eero

Built to make the most of Wi-Fi 6, Amazon's Eero 6+ is a great option for mesh network users who need an expandable system. These devices can get quite expensive if you're using multiple of them, but their ability to connect to Alexa allows you to take advantage of Amazon's built-in Smart Home Hub. And because they easily connect to other Eero devices, you can expand your setup however you see fit.

You won't be able to set up a true mesh network with a single Eero, but Amazon often runs deals on these devices. Plus, the more Eeros you buy, the less expensive each subsequent device is, at least on Amazon. Because the Eero 6+ supports Wi-Fi 6, it also provides an additional boost for wifi connections thanks to a 160 MHz radio channel. They're also easy to set up, and each device supports up to 1,500 square feet.

Purchase the Eero 6+ from Amazon for $139.99.

ASUS ROG Rapture GT6

ASUS ROG Rapture mesh networking system
Credit: ASUS

ASUS is one of my personal favorite brands when it comes to tech, and the company continues to deliver with the ROG RAPTURE GT6, which is a mesh networking system designed specifically with gamers in mind. It comes with two different devices, and supports up to 5,800 square feet of coverage, so it's perfect for larger homes, too.

One thing that makes the ROG Rapture GT6 stand out above other mesh networking systems, at least for gaming, is the triple-level game acceleration, which is meant to help you get the most out of your online connection when playing video games. There's also the included free lifetime internet security, and the built-in gaming-centric settings. The main downside, however, is the price: This is the most expensive option on this list.

You can purchase the ASUS ROG Rapture GT6 2-Pack on Amazon for $429.99.

ASUS ZenWifi AX XT8

ASUS ZenWifi mesh networking system
Credit: ASUS

Finally, I'm going to recommend another ASUS device. This Tri-band mesh networking system is a two-pack, and it typically runs for $399.99. That higher price tag gets you Wi-Fi 6 support, as well as OFDMA and MUMIMO tech, which ASUS says should provide more stable and faster transmissions.

This system is rated for up to 6,600 Mbps, and comes with a simple three-step setup. The included "lifetime" internet security could also a plus, and anyone looking to buy a mesh networking system should seriously consider this option. Although expensive, this pair is currently on sale, which is another plus.

Buy the ASUS ZenWiFi AX XT8 2-Pack on Amazon right now for $299.99.


from LifeHacker https://ift.tt/PBHlSRz

What's New on Prime Video and Freevee in February 2024

Prime Video's February slate is anchored by several romantically themed (or romance-adjacent) series and films. One highlight is the reboot of Brad Pitt and Angelina Jolie's 2005 action film Mr. and Mrs. Smith, except this time it's an eight-episode comedy series starring Donald Glover and Maya Erskine as two spies who knowingly pretend to be married as part of their assumed identities. All episodes are streaming on Feb. 2.

There's also Upgraded (Feb. 9), a true rom-com starring Camila Mendes as an art intern who finds love while traveling for work, and This Is Me...Now: A Love Story (Feb. 16), a musical film being released alongside J.Lo's newest studio album of the same name (with appearances from Ben Affleck, Trevor Noah, Kiki Palmer, Neil Degrasse Tyson, and Sofia Vergara, among others).

For those looking beyond love, there's Giannis: The Marvelous Journey (Feb. 19), a documentary film about NBA star Giannis Antetokounmpo; a new special from comedian Jenny Slate (Jenny Slate: Seasoned Professional, streaming Feb. 23); and season one of Japanese drama The Silent Service (Feb. 8), a live-action based on the popular manga series.

Here’s everything else coming to Prime Video and Amazon-owned, ad-supported Freevee in February, including library films like Will Ferrell's Strays (Feb. 6) and Bottoms (Feb. 13), starring Emmy and Golden Globe winner Ayo Edebiri.

What’s coming to Prime Video in February 2024

Arriving February 1

  • 12 Angry Men (1957)

  • All Dogs Go to Heaven 2 (1996)

  • Along Came A Spider (2001)

  • Annie Hall (1977)

  • Baseketball (1998)

  • Basic Instinct (1992)

  • Blades of Glory (2007)

  • Chorus Line (1985)

  • Cop Land (1997)

  • Eat Pray Love (2010)

  • Enron: The Smartest Guys in the Room (2005)

  • Event Horizon (1997)

  • Fiddler On the Roof (1971)

  • From Beyond (1986)

  • Gang Related (1997)

  • Get Out (2017)

  • Ghost World (2001)

  • Grown Ups (2010)

  • Grown Ups 2 (2013)

  • Hair (1979)

  • Halloween H20: 20 Years Later (1998)

  • Hot Fuzz (2007)

  • I Am Not Your Negro (2017)

  • In The Cut (2003)

  • Jeepers Creepers 2 (2003)

  • Just Friends (2005)

  • Kiss the Girls (1997)

  • Lady Chatterley's Lover (1982)

  • Life (2017)

  • Madagascar: Escape 2 Africa (2008)

  • My Left Foot (1990)

  • Quigley Down Under (1990)

  • Red Rocket (2021)

  • Remo Williams: The Adventure Begins (1985)

  • Riddick (2013)

  • Ride Along (2014)

  • Sarafina! (1992)

  • Scott Pilgrim vs. The World (2010)

  • Scream 2 (1997)

  • Shrek Forever After (2010)

  • Snake Eyes (1998)

  • Some Kind of Wonderful (1987)

  • Talladega Nights: The Ballad of Ricky Bobby (2006)

  • The Alamo (1960)

  • The Bounty (1984)

  • The Chronicles of Riddick (2004)

  • The Core (2003)

  • The Crocodile Hunter: Collision Course (2002)

  • The Elephant Man (1980)

  • The Great Train Robbery (1979)

  • The Little Girl Who Lives Down the Lane (1977)

  • The Peacemaker (1997)

  • The Secret of NIMH (1982)

  • The Sweetest Thing (2002)

  • The Vampire Lovers (1970)

  • Young Adult (2011)

Arriving February 2

  • Mr. & Mrs. Smith (2024)

Arriving February 6

  • Strays (2023)

  • Surrounded (2023)

Arriving February 8

  • The Silent Service (2024)

  • Home Again (2017)

Arriving February 9

  • St. Vincent (2014)

  • Upgraded (2024)

Arriving February 13

  • Bottoms (2023)

  • Five Blind Dates (2024)

  • Mission: Impossible - Rogue Nation (2015)

Arriving February 16

  • Dark Harvest (2023)

  • This Is Me…Now: A Love Story (2024)

Arriving February 19

  • Giannis: The Marvelous Journey (2024)

Arriving February 21

  • Teenage Mutant Ninja Turtles: Mutant Mayhem (2023)

Arriving February 23

  • Apartment404 (2024)

  • Jenny Slate: Seasoned Professional (2024)

  • Soltos em Salvador S4 (2024)

  • The Second Best Hospital in The Galaxy (2024)

Arriving February 29

  • Red Queen (2024)

  • Scouts Guide To The Zombie Apocalypse (2015)

What’s coming to Freevee in February 2024

Arriving February 1

  • A Soldier's Story (1984)

  • All Saints (2017)

  • Birthright Outlaw (2023)

  • Dog Days (2018)

  • How to Train Your Dragon (2010)

  • Life of Crime (2013)

  • Mortal Engines (2018)

  • National Champions (2021)

  • New in Town (2009)

  • Pokemon: Detective Pikachu (2019)

  • Space Jam: A New Legacy (2021)

  • The Current War (2017)

  • The Edge of Seventeen (2016)

  • The Marksman (2021)

  • The Wife (2017)

  • White Chicks (2004)

  • White House Down (2013)

Arriving February 7

  • A Piece of Cake (2019)

Arriving February 13

  • Candyman (2021)

Arriving February 14

  • Fruitvale Station (2013)

Arriving February 29

  • Warcraft (2016)


from LifeHacker https://ift.tt/jXHQVCs

How To Change the Wifi Password on Your Router

The password for your home wifi unlocks your gateway to the web. And since just about everything we own these days is internet-ready, you probably have your password memorized after hooking up dozens of devices. Your router comes with a default wifi network name (the Service Set Identifier or SSID) and password, often printed somewhere on the router itself or in the supplied instruction manual. However, for the sake of security, it's a good idea to change the password regularly.

The main benefit is it kicks off devices and users (hello neighbors!) that are hooked up to your wifi and shouldn't be. Sure, it's a bit of a pain to have to get everything reconnected again, but it's also an opportunity to reevaluate your network setup. If there are older devices that no longer need to be online, it frees up bandwidth for the others.

Changing your wifi password isn't difficult, but the process does vary depending on the make and model of your router. While we can't give you step-by-step instructions for every router out there, we can hopefully point you in the right direction. Note that to log into your router settings, either in an app or a web browser, you'll often need the router admin username and password, too. This is different than your wifi password, and again should be printed on the router or supplied with its documentation, though you may have changed it during setup.

If you're not sure what the login details are for your router, a quick web search for the defaults for your router make and model should turn up the information you need.

Changing your wifi password via an app

Eero app
Passwords for Eero networks can be changed in the app. Credit: Eero

Plenty of modern day routers come with apps attached to help you manage the device setup and configuration. If yours does, this is the best place to start looking for the option to change the wifi password.

If you have some Eero hardware set up at home, for example, you can change the password through the Eero app for Android or iOS. Tap the Settings gear icon (lower right), then pick Wi-Fi password and Edit password. Or, if you have a Netgear Nighthawk router, you'll have installed the Nighthawk app for Android or iOS when you were setting up the device for the first time. To change your wifi password, tap WiFi Settings from the main screen, then the network name.

We'll take you through the process in one more app, the Asus app for Android or iOS: In this case, you need to tap Settings, then choose WiFi, Wireless Settings, and Network Settings to find and edit the W-Fi password.

As you can see, if your router has a companion app, the option to change the Wi-Fi password should be somewhere fairly obvious. Try finding the settings screen or tapping through on the name of the network you're connected to.

Changing your wifi password via a web browser

AT&T router login
AT&T offers a simple web portal you can sign into. Credit: Lifehacker

Whether or not your router has an app attached, you should always be able to change the wifi password through a desktop browser tab. As with the apps, the details of the process vary, but generally speaking it's the same for every router.

With your desktop or laptop computer connected to the router via Wi-Fi or a wired connection, open a new browser tab and type in your router's address on the network: It will most commonly be something like "192.168.1.1" or "192.168.0.1". Some manufacturers use a friendlier URL, like "tplinkwifi.net" for TP-Link devices.

The address you need should be printed on the router or somewhere on the documentation that came with it. If not, a web search for the router make and model should reveal the address you need to type into the top of your browser. You'll then usually have to enter the admin username and password for the device.

With that done, it's simply a question of finding the right option: Look for a heading marked Wi-Fi or Security or something similar. In the case of Xfinity routers, for example, it's behind Gateway, Connection, and WiFi. On Linksys routers, it's Configuration, Wi-Fi, and Wireless Security.

On some routers, including those from AT&T and Verizon, you just need to sign into your account on the relevant support page on the web, which is straightforward enough. If all else fails, you can do a factory reset on your router, which will return you to the default credentials for accessing the router and the wifi.


from LifeHacker https://ift.tt/7oNJzag

Use These Apps to Stop AI From Stealing Your Art

The recent revelation that Midjourney AI's founders actively compiled stolen art to train the art generation tool is but the latest evidence of the unethical nature of GenAI art. But while legal and legislative cases are mounting against these AI tools, artists are left to fend for themselves until regulations are put in place protecting their work from being used to train AI models without proper permissions, attribution, and compensation. For a while, it seemed the only method of prevention was to simply not post your art online—a poor solution for artists who use social media and online portfolios to find clients. 

Now, though, researchers at the University of Chicago have released two free desktop apps for Windows and Mac that not only make it impossible for an AI model to read an image or use it to generate content, but which actively harm these models if they try to. 

The first, Glaze, adds digital "noise" to an image that makes it unreadable by GenAI art tools like Midjourney. The added noise is minimal—at worst, you might see some minor grain or artifacting, similar to what happens when you upload an image to Instagram or X (aka Twitter). The tool has already seen major improvements in minimizing the visual effects already, and it's safe to assume image clarity will continue improving as the team further iterates on the app.

The second tool, Nightshade, seeds the image with "poisoned" data that can confuse an AI model if it tries to use it. While some GenAI advocates argue this could be "illegal"—akin to spreading malware—it's actually closer to copyright protection measures that other forms of media use to prevent piracy, like the Digital Rights Management (DRM) publishers often place on an ebook. 

two images of the same digital illustration of a girl covered in white flowers. Image on right is unglazed, image on right is glazed with minor compression noticeable on the girl's face.
Example of Glaze noise artifacts. Screenshot via University of Chicago, original illustration by Jingha Zhang Credit: https://ift.tt/EBug2DY

Either of these apps is an effective defense against multiple AI tools, including Midjounrey, Stable Diffusion, and DALL-E, and so far no attempts to break or bypass Glaze and Nightshade have been successful. The effects remain intact even if you screenshot a "glazed" or "poisoned" image, or apply smoothing, sharpening, or blur filters in an attempt to "remove" the noise artifacts.

In other words, Glaze and Nightshade make it safe to post and share your art without fear someone will use it to generate AI art based on your original works. The only tradeoffs are the extra time needed to perform the poisoning and glazing processes, and the aforementioned minor potential compression grain.

You can read more about how Glaze and Nightshade work on the University of Chicago's official Glaze website. As for those who want to start using the tools on their own art, let's go over how to set up Glaze and Nightshade.

Download Glaze and Nightshade (or use WebGlaze)

Glaze and Nightshade are both large, resource-intensive programs, and running them locally on your PC will require some beefy hardware. So the first step is to figure out if your computer can run it. You may also need to download additional software for the apps to work on your machine, depending on your system's specs. 

Windows Glaze and Nightshade system requirements

  • Windows 11/10

  • An Nvidia GPU with at least 3.6GB of processing power (check this list of GPUs for compatible models. We have a guide for seeing which GPU your PC has if you don't know)

  • Nvidia CUDA Toolkit installed

  • 4GB of storage space

Note: There are non-GPU Windows versions that may work on other PCs that don't have the proper Nvidia GPU, provided your CPU is powerful enough.

Mac system requirements

Glaze:

  • Apple M1/M2 processor (Apple silicon version)

  • MacOS 13 (Intel CPU version)

  • 4GB of free storage space

Nightshade:

  • Apple M1/M2/M3 processor

  • 4GB free storage space

If your computer's specs meet the requirements, you can download Glaze here, and Nightshade here. They're large files, so the download will take some time. Jump to the next section when you're ready to set up the programs.

Use WebGlaze if your computer can't handle the apps

If your computer doesn't match those specs, fear not: There is a browser-based version of Glaze called WebGlaze that uses cloud computing instead of your PC hardware. It works on any browser app on Windows, Mac, Linux, iOS, or Android. However, you need to request access and create an account before you can use WebGlaze, so it's not immediately available to everyone. You will also need to prove that you're a real artist by submitting process photos or time-lapses of your artwork, along with other requirements.

That might seem like overkill, but it's to ensure that only real artists are using WebGlaze, and it's worth going through the hassle if you can't run Glaze on your computer or are intimidated by the installation and setup process. Note that there isn't a web-based version of Nightshade yet, but Glazing your art is the more important step. You can request access to WebGlaze here.

How to set up Nightshade and Glaze

Once you have Nightshade and Glaze downloaded to your computer, the next step is setting them up (WebGlaze users can skip this section):

  1. If you're using the Windows GPU version, make sure you download and install the Nvidia CUDA Toolkit first.

  2. Unzip the Nightshade and Glaze download files using a program like 7Zip.

  3. Open Glaze. The program will download the necessary files both Glaze and Nightshade need to process your images.

  4. Wait for the download to complete. Once it's done, you can start using both programs.

Hoe to Use Nightshade to poison your image (optional)

Now that everything is set up, you can now use the Nightshade and Glaze apps. Export the final version of the image you wish to glaze and "poison." Do any last-minute edits, crops, or resizing before using Nightshade and Glaze. When you're ready, start with Nightshade. Technically, "poisoning" your image with Nightshade is optional. You can skip this step if you're not using Nightshade or if you're using WebGlaze. However, Nightshade should always be used before Glazing.

  1. Open Nightshade

  2. Click "Select…" then open your image.

  3. Choose your desired intensity. A higher intensity will have a stronger effect against the AI, but will also result in more visual changes to the image.

  4. Adjust the render quality. Higher settings will result in better poisoning, but longer processing time. 

  5. Add or change the poison tag. Select one word that describes the main subject of the image. It's important to pick just one tag that accurately labels the image (check the official Nightshade user guide for more information).

  6. Click "Run" to perform the process.

  7. Once it's done, you can move on to the Glazing step.

Protect your images with Glaze

screenshot of Glaze windows app
Credit: Screenshot by Brendan Hesse


Finally, it's time to glaze your image. These steps work for all versions of Glaze, including WebGlaze. As mentioned above, Glazing should always be the final step in your process. Only do this when your final image is edited and exported, and (optionally) after you poisoned the image with Nightshade if you choose to. Be sure to check the official Glaze user guide if you run into any bugs or errors.

  1. Open Glaze.

  2. Click "Select…" and choose the image you want to glaze.

  3. Use the slider to select your desired Glaze intensity. Higher intensity will result in stronger protection but more noticeable noise and artifacting.

  4. Select your desired render quality. Higher settings will make the protection stronger, but will take longer to process.

  5. Click "Save As…" to select where your image will be exported.

  6. Click "Run Glaze" then wait for the image to render.

  7. Once the process is complete, you can now safely upload your glazed image online.


from LifeHacker https://ift.tt/YHExvWR

Sunday, January 28, 2024

Prioritizing cybercrime intelligence for effective decision-making in cybersecurity

In this Help Net Security interview, Alon Gal, CTO at Hudson Rock, discusses integrating cybercrime intelligence into existing security infrastructures.

Our discussion will cover a range of essential aspects, from the importance of continuous adaptation in cybersecurity strategies to practical advice for CISOs on enhancing threat detection and response capabilities. We’ll also explore the challenges of balancing intelligence gathering with privacy and legal considerations and look at strategies for prioritizing intelligence inputs in decision-making.

cybercrime intelligence

What advice would you give to a CISO that wants to integrate cybercrime intelligence into an existing security infrastructure to enhance threat detection and response capabilities?

⁤Cybercrime threats come in all shapes and forms, and cybercriminals are often highly motivated. ⁤⁤They dedicate substantial time and effort to infiltrate organizations for potential financial gains.

For a hacker, it only takes a single success to establish an initial attack vector against a company. Unfortunately, for us cybersecurity professionals, it takes succeeding at all times to fend off attacks.

⁤For holistic protection, CISOs should integrate various cybercrime intelligence solutions into their security infrastructure.⁤

⁤These solutions should include:

  • Providing ongoing cybersecurity training for all employees to increase awareness of common social engineering attacks used by cybercriminals.
  • Monitoring for compromised credentials that result from database leaks; these credentials are often used as an initial attack vector.

It is important to ensure proper access controls are set within the organization to limit who can access sensitive information.

  • Staying alert & implementing solutions against emerging trends such as AI and machine learning, which are becoming widely used among hackers.
  • Recently, there has been a significant increase in the use of Infostealer infections data by cybercriminals. Hackers can take advantage of the credentials and cookies found on compromised computers to perform various cyberattacks against organizations (e.g Airbus breach, Orange breach).

This poses a significant risk to organizations, and it is crucial to monitor whether the organization has infected the computers of employees, customers, and partners.

As cybercrime evolves, it is important to continuously integrate appropriate solutions to counter cybercrime trends. ⁤

With the vast amount of cybercrime data available, what strategies can security teams use to prioritize intelligence inputs for decision-making?

Given the vast amount of cybercrime intelligence data generated daily, it is crucial for security teams to effectively prioritize the information they use for decision-making. ⁤⁤

To do this, I recommend security teams conduct regular risk assessments that should consider the organization’s risk profile, considering historical data and similar companies in their industry. ⁤

⁤Once the risk profile is created, security teams can leverage the most suitable threat intelligence feeds and sources. ⁤

⁤Evaluation of these risks should not be static but rather a continuous process that allows teams to regularly review and update their priorities based on the evolving threat landscape. ⁤

How can organizations balance the need to gather cybercrime intelligence with privacy and legal considerations?

To have a balance between gathering cybercrime intelligence and respecting privacy and adhering to legal considerations, organizations need to follow strict legal compliance, including data protection laws.

Organizations should also minimise the collection of sensitive information and focus only on essential data, and establish clear ethical guidelines for their intelligence gathering activities.

What metrics or KPIs can CISOs use to measure the effectiveness of cybercrime intelligence in their cybersecurity strategy?

Two of the key metrics and KPIs that can be used by CISOs to evaluate the effectiveness of cybercrime intelligence in their cybersecurity strategy are:

  • Mean time to detect (average amount of time needed to detect a security threat or incident).
  • Mean time to respond (average time it takes for incident responders to control, remediate, and eradicate a threat after it has been identified).

Additionally, CISOs should also monitor false positive rates, phishing click rates, and assess their ability to detect and respond to emerging threats quickly.

What are your thoughts on enhancing international cooperation to overcome common obstacles in cybercrime investigations?

Enhancing international cooperation in cybercrime investigations is important due to the borderless nature of the internet and the sophistication of cyber criminals.

Recently, we’ve seen multiple successful operations such as the takedown of ransomware groups’ infrastructure (RagnarLocker) and illicit online marketplaces & forums (Operation Cookie Monster, Raidforums takedown).

The role of public-private partnerships are important as well, allowing for the integration of law enforcement with the advanced technological and intelligence resources of cybersecurity companies, as seen in operations like Operation Nervone and Night Fury.

I hope that in 2024 we will see the trend of international cooperation becoming even more prevalent.

Considering the current trends and challenges in cybercrime intelligence, what are your predictions for this field?

Considering the current trends and challenges in cybercrime intelligence, several predictions can be made for the field in the coming years:

  • AI and machine learning are likely to play a significant role in cybercrime intelligence, we’re already seeing some worrying trends such as sophisticated spear-phishing powered by AI and clever impersonation attacks.
  • Given the ease of monetization of ransomware attacks, I expect to see a continued rise in the number and the sophistication of attacks. Governments and organizations will need to work hard in order to enhance their response strategies.
  • Threat intelligence sharing will likely increase as more countries and organizations share intelligence in real-time to have quicker responses to emerging cyber threats.
  • Automated infiltrations using Infostealers data is a concerning development that represents a significant escalation in both the efficiency and scale of cyber attacks. I expect to see more breaches, ransomware attacks and account takeovers which originate from Infostealer infections to happen in 2024.

from Help Net Security https://ift.tt/V8jH7hu

Exploring the intersection of network security and modern technologies

Networks serve as the backbone of modern communication and business operations, facilitating seamless data exchange and connectivity. However, the increasing complexity of networks also brings forth heightened security challenges. Robust network security measures are essential to safeguard against cyber threats, ensuring the integrity, confidentiality, and availability of sensitive information.

In this Help Net Security round-up, we present segments from previously recorded videos in which cybersecurity experts discuss critical aspects of network security and its intersection with various technologies.

Complete videos


from Help Net Security https://ift.tt/rcSVeqO

Saturday, January 27, 2024

Five Ways Home Sellers Can Screw You Over After the Closing

Buying a house is rarely a fast, simple transaction. There’s a lot of money tied up for everyone involved, a lot of research and negotiation, and a lot of time—especially if you take the proper steps to protect yourself. When you finally find your dream home, you have it inspected, you make a good offer, and you hire a lawyer to ensure everything goes smoothly.

Closing on the house should be the end of all the stress and the beginning of the fun part—moving in and making the place yours. But if you’re not careful, move-in day could be a source of even more stress if the seller has played a dirty trick or two on you. Even if your home inspection went without a hitch and you had a great team of real estate and legal professionals on your side, home sellers sometimes try a few schemes to enhance their end of the deal.

Swapping appliances

Imagine this: You tour a potential new home, and you fall in love with the kitchen. It’s renovated beautifully, with gorgeous cabinetry and modern, new appliances.

Then you walk in after closing on the sale, and the appliances have all been replaced with cheap or used versions that are far from what you saw during the open house and subsequent visits. The seller has absconded with the pricey new stuff and left you with a broken-down kitchen. Or, just as bad, you discover that despite being new and high-quality, one or more of the appliances is broken or malfunctioning.

The law is a bit murky here; some experts will tell you that anything attached to the house, like an oven, is automatically part of the house, while others will tell you that appliances are considered possessions that aren’t automatically included in the sale.

To prevent this sort of situation, note whether the appliances are part of the home’s appraised value—if so, you have a strong case to force the seller to return them or compensate you. Make sure the appliances are specifically mentioned in the sale contract. Finally, insist on a final walk-through before closing—and take photos of everything for later comparison.

Dumbing down

Another dirty trick home seller play involves “smart” infrastructure like thermostats or door locks. These devices connect via the home network and offer rich functionality that can be controlled via smartphone apps.

If those “smart” features were part of your decision to buy this particular house, make sure you spell out in the contract that they stay put. Home sellers sometimes remove those pricey thermostats and other smart tech, replacing them with the dumb originals they removed when they upgraded. If you haven’t specified that they stay with the house, you may not have any way to get them back, even if you counted them as part of the value of the house when you made your offer.

Changing light fixtures

One common aspect of a home that people often assume will transfer to them when they buy it is the light fixtures—and even the bulbs. If you love the lighting that the current homeowners have installed, take photos and ask your real estate agent to make sure they’re explicitly mentioned in the contract. Otherwise you might not even notice that the fixtures have been swapped until it’s too late.

And check on those light bulbs, especially if the house has dynamic bulbs like Philips Hue. Those bulbs can cost as much as $50 each, so if the home is large and has a lot of lighting features you could be looking at a significant expense if the sellers swap those bulbs with cheaper versions—or simply remove the bulbs and leave you in the dark.

Leaving a mess

Moving house is a chaotic experience at the best of times. If the home you’re buying is occupied, consider asking the seller to stipulate in the contract the condition of the home you’ll be taking possession of. Otherwise, you might open the front door to find garbage left behind, scratched floors or walls from moving furniture, or even personal effects left behind the sellers might assume you’re willing to hold onto and return to them at some point.

Even if the home is unoccupied when you’re buying it, you should document the condition of the home when you do your final walk-through just in case the sellers decide to do anything that could leave behind a mess or cause damage to the property. If you do encounter a mess, there’s not much you can do unless it was contractually specified that the house be in a certain condition when you moved in, aside from contacting the previous owner and asking them to either clean it up or pay to have it done.

Hiding problems

Finally, remember that even the best home inspector may not catch everything. Home inspections are relatively brief and superficial, and are designed to catch obvious problems—which means an unscrupulous home seller can try to hide issues that are less obvious. Water damage in a ceiling? A patch-and-paint job a few days prior to an inspection can hide it—until you move in and the first heavy rain falls. Alternately, a home seller might employ cheap, temporary fixes to things, like clamps or rubber patches on damaged pipes or wood hardening agents on dry rot.

Although it’s illegal to hide what are known as “material defects” in a house up for sale, these sorts of tricks are harder to defend against because you typically can’t open up walls or crawl into every nook and cranny of a home to observe its infrastructure. What you can do is be aware of the common ways homeowners hide or obscure problems in the house and keep your eyes peeled for telltale signs like furniture in odd places, fresh paint (especially if it’s in just one small area), or the heavy use of air fresheners, which might be a sign of mold or other smelly problems in the house.

When you buy an expensive asset like a house, you have every right to expect it to be in the same condition as when you viewed it. Keep these dirty tricks in mind when you’re writing an offer on a new home, take lots of photos—and don’t hesitate to put everything in writing, no matter how obvious it might seem.


from LifeHacker https://ift.tt/Grz4cxI

A Parenting Coach Is More Useful Than People Think

George and Amal Clooney. Justin Timberlake and Jessica Biel. Emily Blunt and John Krasinski. What do these celebrity parents have in common? They've all used parenting coaches to assist them in raising their children. 

The concept of parents and caregivers seeking professional guidance to enhance their parenting skills has seen a significant rise in acceptance and popularity over the last two decades. This trend is prevalent in celebrity circles and among parents who aspire to lay a strong foundation of success for their family and have the means to pursue it. 

"We think we should have it all figured out, but sometimes getting a little outside perspective can make all the difference," says Chelsea Kunde, a professional coach and founder of Building Blocks Family, located in Scottsdale, Ariz. 

While parenting coaches may be a popular choice among celebrities, they might be able to positively impact your family, too.

What does a parenting coach do?

Kunde works with a child's parent(s) or caregivers to help them succeed in one or all of her three specialty areas: potty training, sleep, and discipline.

"My whole philosophy is that I want to work with families to create a home life that feels productive, happy, and like it's working well," Kunde says."That might look different for every family. I always say, 'What works in my house might not work in yours.'"

Another way Kunde helps parents is to enable them to get on the same page so their children see that they're working together. Most parents have the same overarching goals, so Kunde works to break things down to help parents find that common ground. 

"You're certainly not going to agree on every little aspect all the time," she says. "That's just normal. I do feel like it's common for everybody, even if you have a super solid partnership. It's going to present as a challenge at some point in child-rearing."

A parent herself, Kunde knows that raising children can be very vulnerable, and it's hard to ask for help, so she tries to put what she does in perspective for potential clients. 

"If my car were making a weird noise, I would get help for that," she says. "It doesn't mean that I have a horrible car. We might need some tweaking and extra help and support, and that's a good thing. Getting a little outside perspective can make all the difference."

If you think hiring a parenting coach will be like an episode of the reality show Supernanny, Kunde, who also has a Master's degree in marriage and family therapy, can tell you it doesn't quite work that way. 

"I think it's important to have goals with the families that you're working with that meet their needs," she says.

These goals are established in a consultation to develop trust and see where parents struggle. Each plan differs based on the information Kunde gathered about the family during their meeting and could include calls, texts, and emails as needed. 

"Typical consultations are about two hours in length," she says. "It's really collaborative. Some families add on and continue to work with me and have more one-on-one coaching. Some families say they need the two hours and are off and running on their own."

What should you look for in a parenting coach?

Kunde says parents looking for a coach should find one that aligns with their philosophy. You can look at testimonials on their website or check out their social media feeds to get a read of what services they offer, where their perspective is, and if they'd be a good fit for your family. 

Kunde will often talk with parents for a few minutes to assess the situation and explain her services, and if it doesn't look like she'll be a good fit for them, she will tell them and offer the family a referral. 

"It's just like picking a doctor or purchasing a house," she says. "I really do feel like it comes down to making sure you're compatible."

What if you can't afford a coach?

Parenting advice has come a long way since the days of Dr. Spock, and resources are more accessible now than they were back then. Coaches like Kunde offer group consultations, in-person classes, and plenty of content on social media and websites. Many coaches now provide an online option, as well, to get more bang for your buck.

"Sometimes you just need a little tip here or a little trick there," she says. "It's always helpful to know that you're able to access people that way." 


from LifeHacker https://ift.tt/LlY9nzw

You Can Create Your Own AI Art in Microsoft Paint

It's increasingly hard to get away from generative artificial intelligence at the moment, with the tech finding its way into many of the apps and devices we use regularly. Even Microsoft Paint is getting an AI upgrade.

The image editing tool, which has been a fixture in Windows since the very first version of the operating system in 1985, now includes a feature called Cocreator that is capable of generating AI images from just a few text prompts.

If you've been keen to dabble in AI art production, you can now use Paint to do so. Just make sure you've updated both Windows 11 and Paint (via the Library tab in the Microsoft Store app) to the latest versions to make sure Cocreator appears.

Getting started with Microsoft Cocreator

Microsoft Paint Cocreator
You've got several styles to choose from. Credit: Lifehacker

Load up Paint on your Windows 11 machine, and you'll find the Cocreator option on the right side of the top toolbar. This is still a preview version of the tool, so expect one or two bugs along the way. It's powered by the DALL-E image generator—the same tech you can find in Microsoft's other AI offerings (like Bing's AI art generator).

The first time you load up Cocreator, you'll have to click through a brief introduction before you can get started. The idea is the same as with most other AI image tools: You describe what the picture should show, like a path leading through a stormy wood, and you get a few image choices in return.

You can describe the type of picture you want—such as photo or something more abstract—in the text prompt, but Cocreator also offers a style drop-down menu underneath you can use to pick a particular style. Your options are Charcoal, Ink Sketch, Watercolor, Oil Painting, Digital Art, Photorealistic, Anime, and Pixel Art, so you've got a lot of options to play around with.

When you're happy with your prompt and style pick, click Create. After a few moments, you'll get three different variations to choose between: Click on any image to open it in Paint to edit it, or click the three dots on the thumbnail and choose Save image to save it to disk.

Like the AI art generation tools Microsoft makes available elsewhere in its products, each picture will cost you a credit—you're given 50 to get started with, and (as far as we can tell from reports from other users on the web) a limited but regular allocation after that. Microsoft doesn't officially say how many credits you get, but it's most likely a fluid system that's used to manage demand.

Doing more with your images

Microsoft Paint Cocreator
You can generate pictures of just about anything you like. Credit: Lifehacker

There aren't a huge number of options to play around with when it comes to Cocreator in Paint: It's not possible to change the dimensions or the aspect ratio of your images, for instance, so you have to settle for the default 1,024 x 1,024 squares that the tool outputs (though you can later stretch or crop these, of course).

As with other similar image generators, more detail in your prompt often helps generate better images. If you want a particular object in the picture, the image to have a particular vibe, or to use a particular color scheme, then say so—most of the time, Paint will understand what you mean, and produce something suitable.

Bear in mind your original prompt stays in place on screen even after you've clicked the Create button, so you can make adjustments to it based on the results you're seeing. However, it lacks the precision necessary to get something that's exactly to your requirements. Human beings are still required for that. 

Remember, too, that Paint is still Paint, and you still have its image editing capabilities to take advantage of. The Pencil and Fill options on the toolbar are perhaps the most useful when it comes to editing something that Cocreator has generated. Use the color picker to the side and the Brushes drop-down to change how your scribblings look on screen.

Microsoft Paint also now supports layers, which you're able to access through the icon to the far right of the top toolbar. Different AI images can be positioned on different layers—just select them from the sidebar on the right—giving you more ways to combine different artworks together. You can, for example, use the Eraser tool to remove part of a layer and reveal what's on the layer underneath.


from LifeHacker https://ift.tt/fAzvhgF

Friday, January 26, 2024

This TSA-Approved Fingerprint Lock Is on Sale for $45 Right Now

You can get this fingerprint-activated travel lock on sale for $44.99 right now (reg. $59.99). The TOKK lock is TSA-approved for travel and works on laptop cases, backpacks, luggage, and carry-on bags. You can program up to ten fingerprints on the lock, and it has a response time of about 0.5 seconds. The lithium-ion battery-powered lock can operate for up to three months on a 45-minute charge, and a 3-color LED indicator light shows its battery life.

You can get this fingerprint-activated travel lock on sale for $44.99 right now (reg. $59.99), though prices can change at any time.


from LifeHacker https://ift.tt/MVXYoaH

The Best Card Games for Couples to Play on Date Night

When you think of a night in with your significant other, watching a movie together or having sex might be the first thing that comes to mind. But what if intimacy and connection could be found via a card game? We're not talking about your average "Go Fish" or round of poker: These games are specifically meant to strengthen your relationship through a variety of questions and activities while also keeping things fun and playful.

Spending intentional, quality time with your partner not only helps create a strong foundation for your relationship —it also helps create positive memories. Not to mention, you'll get to know each other in deeper and more imaginative ways than you might have thought possible. Being vulnerable with one another isn't alway easy, and these games strive to make possibly tough talks and questions a little easier—and actually enjoyable.

Where Should We Begin?

Created by renowned relationship expert Esther Perel, godmother of emotional intimacy and connection and podcast host of "Where Should We Begin?", her first-ever relationship-focused game ($40) will help you connect with your partner through storytelling. The game comes with 200 story cards for new and playful inspiration and one six-sided die for endless variations on your favorite cards. Get ready to go deep.

We're Not Really Strangers

You'll won't feel like a stranger after playing this purpose-driven game ($24.99), which features three "carefully crafted levels of questions and wildcards." The first level is all about exploring first impressions and how well you know each other. Level two is focused on connection, and the third level requires some deep reflection. There are also some "Dig Deeper" cards that are bound to reveal unexpected responses.

Let's Fucking Date

Talk about getting straight to the point. This card game ($25), created by actress and influencer Serena Kerrigan, is perfect for people in the early stages of dating, who are brave enough to ask each other some serious ice breakers. The cards come in four categories: First Base, Second Base, Third Base, and Home Fucking Run. The rules are pretty straightforward: the higher the base, the hotter and more intimate the questions.

Sex Talk

No surprise here: This game is all about sex ($24). Each provocative question ("What does it mean to be good in bed?" for example) is designed to ramp up your attraction and bond, allowing you to have an open conversation about your needs and desires. If you play your cards right (pun intended), it can lead to some of the hottest sex you've ever had.

The Couples Game That's Actually Fun

If you feel you need a break from all the emotionally charged questions from the above games, then "The Couples Game That's Actually Fun" game ($13.29), as suggested by its title, promises some levity. It includes 150 fun questions ("If we threw a themed party, what theme would it be?" for example) spread across three categories: 1. MATCH, 2. BEST, 3. ME OR YOU that can be played either between you and your significant other or teamed up against other couples.

Drunk in Love: The Drinking Game for Couples

Created by a couple that couldn't find the "perfect drinking game" to play during quarantine, this game ($35) comes with 99 cards (no alcohol, though). If you draw an "Or Drink" card, you must do what it says ... or drink. If you draw a "Drink If" card, the card applies to both you and your partner, so whoever relates to it must drink. Questions and prompts include "who wears the pants?" or "give your partner a lap dance or drink twice." As always, drink and play responsibly.


from LifeHacker https://ift.tt/15TceQV

The Best New Shows to Stream on Amazon Prime This Week

Amazon’s Prime streaming service is dropping three original series this week. Expats is a serious drama—big budget, prestige TV starring Nicole Kidman. The high-energy music, comedy, and out-there premise of animated series Hazbin Hotel is definitely for a younger audience. Where Zorro is ... Zorro, a rip-roaring action adventure starring a character who has stood the test of time. But if three shows aren’t enough for you, I’m throwing in a couple of past Amazon original series that I think you’ll like, if you like things that are awesome and good. 

Expats

Nicole Kidman is the driving force behind this drama about a group of rich American expatriates in Hong Kong. Expats is a heavy, only-for-adults drama about loss, grief, class, and alienation as architect-turned-housewife Margaret (played by Kidman) tries to cope with the disappearance of her son while her expat friend deals with her own failing marriage. In the background is the uncomfortable fact that the troubled rich people's servants are expats of a different kind.

Hazbin Hotel 

Series creator Vivienne "VivziePop" Medrano financed the pilot for Hazbin Hotel largely through her Patreon followers, earning enough buzz to get a series on Prime. The not-for-little-kids cartoon series tells the story of the Princess of Hell, Charlie Morningstar, who builds the Hazbin Hotel to rehabilitate demons so they can go to heaven. Bright, colorful, and packed with memorable songs, Hazbin Hotel crackles with youthful energy and will appeal to every theater kid, goth, weirdo, and creative—my people!

Zorro

Zorro (the character) has been around since 1919, and the masked swordsman’s derring-do is still inspiring adaptations. This one finds Zorro in Los Angeles in the 1800s, dishing out justice to scoundrels of all types at the point of his shiny rapier. If classic cinematic heroics and good vs. evil storytelling turn your crank, check out Zorro.

The Tick (2016)

There have been three television adaptations of cult superhero-parody comic book The Tick. There was The Tick, a cartoon in the mid 1990s; The Tick, a Fox sitcom that aired for nine episodes in 2001; and The Tick, an Amazon original series from 2016. Created by and starring under-appreciated British comic genius Peter Serafinowicz, Amazon's The Tick manages to do something the other TV versions couldn't: It goes beyond weirdo superhero-satire and builds a plausible world that a big, blue, impossibly stupid superhero could live in. It's outlandish comedy, but it takes the genre and characters seriously enough to tell a compelling story.

I’m a Virgo (2023)

Boots Riley has been creating vital, confrontational Art since his criminally under-appreciated hip-hop crew The Coup dropped its first EP in 1991. Riley earned universal critical acclaim for the pointed social commentary and surrealism of his feature film debut, 2018’s Sorry to Bother You, and followed it in 2023 with I’m a Virgo, a strange, thoughtful, and politically uncompromising coming-of-age story. Cootie is a black teenager who is 13 feet tall. Hidden away by his well-meaning parents since birth, Cootie has grown too big to stay safe and protected, and his adventurers in the world capture the beauty and heartbreak of first friendship, first love, and first realization that the world is much different than they told you it would be.


from LifeHacker https://ift.tt/gRfKPsa

Thursday, January 25, 2024

How to Test Your Webcam and Mic Before Making a Video Call

If you regularly make audio or video calls on your computer, you've seen people appearing out of frame, or hunting for the unmute button, or otherwise trying to get their technical setup right—something that can take up several minutes at the start of every call, while all the participants get themselves sorted.

If you want to give yourself a head start, and avoid any potential embarrassment once the call starts, please test out your webcam and mic configuration before connecting. There are ways of doing this in Windows and macOS, and many video chatting apps have a built-in feature for this, too.

Testing your setup on Windows

If you want to see how you're looking on Windows, open up the Camera app from the Start menu. You'll immediately see what your webcam is currently seeing—if you have more than one camera connected, use the switch icon in the top right corner to cycle through the different devices.

In the top left corner is a gear icon, which will direct you to the settings for your webcam: You're able to adjust a few options here, including the resolution of the video that your webcam is beaming out across the internet, but bear in mind that your video calling app of choice may override these settings.

Windows Camera app
The settings available in the Windows Camera app. Credit: Lifehacker

When it comes to connected microphones, you need to head to Settings from the Start menu, then select System and Sound. Under Input, you should see your mic listed. If not, it's not hooked up properly. Select the microphone, then choose Start test: As you talk, you should see the volume slider respond to your voice. Click Stop test, and Windows will tell you how loudly your voice is coming across.

You can do a test recording before a call, if you want: Click on the Take video button on the right of the Camera app (it looks like a video camera) to record and save a clip, which will let you assess both video and audio quality. If you just want to record audio, there's a Sound Recorder app included in Windows that you can use.

Testing your setup on macOS

Over on Mac computers, both FaceTime and Photo Booth are applications that come with the desktop operating system, and you can use either to see what your webcam is currently seeing. If you have multiple webcams connected, you can switch between them via the Video menu in FaceTime or the Camera menu in Photo Booth.

To access the webcam settings, click the green video camera icon that shows up in the menu bar when the camera is active. From here you can adjust the various enhancements that macOS offers for webcam feeds. You can also enable or disable the Reactions feature, which triggers certain on-screen effects based on gestures you're using. (You like do not want these enabled for professional calls.)

macOS system settings window
Testing mic levels on macOS Credit: Lifehacker

When it comes to testing your microphone, open the Apple menu, then pick System Settings and Sound. Select Input, select your mic, and then start talking. If everything is working correctly, you'll see the input level bar start flickering as you speak, indicating that the audio is being picked up (and you can adjust the input volume here too, if needed).

To make absolutely sure that everything is working well and looking good, you can record a short test clip. Launch the QuickTime Player on macOS, then choose File and New Movie Recording or New Audio Recording. You'll be able to select your webcam or mic from the drop-down menu next to the red record button.

Testing your setup inside apps

As well as the options we've mentioned above, a lot of video-calling apps will also give you the opportunity to test out your hardware before getting connected. We can't cover them all here, but if the one you use isn't mentioned, have a dig around in the settings and the menus to see what you can find.

In Zoom, click your account picture (top right), then Settings. By opening up the Video or Audio tabs, you can see a preview of your webcam feed, test mic levels, and configure a variety of options for both video and audio. If you have more than one camera or mic connected, you can switch between them using the drop-down menus.

Zoom settings window
The video preview screen in Zoom Credit: Lifehacker

In Slack, click your account picture down in the lower left-hand corner, then choose Preferences and open up the Audio & video tab. You get a preview of your webcam feed (use the drop-down menu under the preview to change camera), and an input volume reading for the microphone (use the drop-down menu above the volume reading to change microphone).

In Google Meet, click the gear icon up in the top right corner to configure the Audio and Video settings, and to get a small preview of what your webcam is showing. In Google Meet, as with several other video-calling apps, you'll also be shown a preview of your video feed when you follow a link to a meeting. You can use this to make any final adjustments before joining the call.


from LifeHacker https://ift.tt/2bqGiAd

This 23.6-Inch HD Monitor Is on Sale for $100 Right Now

This budget 23.6-inch AOC monitor is on sale for $99.99 right now (reg. $169.99), and it’s an affordable option for remote workers, streamers, or gamers looking for basic features. It comes with 1920x1080p resolution, 250 cd/m² brightness, and a response time of 8ms. The AOC monitor also has a 3-sided borderless display, 12.5mm thickness, and HDMI ports that works with most multi-monitor workspaces and gaming consoles, so you can use it with your existing monitor or grab a pair to transform the way you work and game.

You can get this AOC 23.6-inch monitor on sale for $99.99 right now (reg. $169.99) right now, though prices can change at any time.


from LifeHacker https://ift.tt/VDSkx4M

Wednesday, January 24, 2024

Stack Identity expands its plaform with ITDR to tackle shadow access and shadow identities

Stack Identity has unveiled the expansion of the Identity Access Risk Management Platform with identity threat detection and response (ITDR) to tackle shadow access and shadow identities.

Stack Identity ITDR

Identity-centric attacks have exploded as the primary vector among cyberattacks, showcasing extreme gaps in traditional access management, IAM, IGA and identity provider platforms. Gartner predicts that by 2026, nine out of 10 businesses will use an embedded identity threat detection and response function from access management software as the first attempt to defend against such attacks.

Integrating ITDR is key in generating continuous, intelligent recommendations to support customers in making strategic decisions and remediate identity threats.

Stack Identity’s platform is powered by the industry’s first identity security data lake, which consolidates, correlates and contextualizes identity access risks and vulnerabilities across cloud and data estates. This allows enterprise customers to proactively assess, remediate and govern their identity and access risks, staunchly preventing unauthorized access, policy violations, incidents and data breaches.

“By leveraging the power of AI, our platform generates intelligent resolutions to effectively tackle identity access risks,” says Venkat Raghavan, CEO of Stack Identity. “We are committed to bridging the gaps in traditional IAM platforms that often overlook identity risks, which is why it is so important to expand our product to include identity threat detection and response.”

Stack Identity Access Risk Management Platform consists of:

Identity Threat Detection and Response (ITDR): ITDR continuously monitors identity threats across the enterprise population of identities for identity posture risks, account takeovers, insider threats and privileged access abuse. It lays out pathways by which identities can be exploited for ransomware and data exfiltration and detects identity threats targeted at enterprise assets – infrastructure, applications, cloud services, access management, IAM and IDP, databases, data platforms and software supply chains.

ITDR generates insights, recommendations and analytics to help decision workflows to prioritize, investigate, remediate and govern identity threats.

Cloud Identity Entitlements Management (CIEM): CIEM addresses the challenges of managing cloud permissions in today’s complex, multi-cloud and multi-SaaS landscape. With a foundation in the robust identity security platform, Stack Identity’s CIEM offers a unified platform for securing cloud environments by providing centralized visibility, granular access control, compliance support, risk reduction and automated workflows.

The solution aims to mitigate identity-related security incidents by up to 90%, improve operational efficiency by 50% and achieve 95% compliance with major security standards. Furthermore, it integrates seamlessly with Stack Identity’s ITDR and IGA solutions, offering a comprehensive defense against identity-based threats.

Identity and Access Governance (IGA): The IGA solution reshapes traditional practices, empowering managers with clear insights into user access. Real-time security measures proactively detect and address identity and access risks with automated workflows, ensuring continuous compliance and operational security. The Comprehensive Policy Catalog covers a range of risks from insider threats to privileged access abuse, our solution offers targeted access reviews for high-risk scenarios and user groups.

IGA streamlines workflows with automated notifications, recertifications, and SOC integration via Jira, Slack, PagerDuty and compatibility with SIEM and SOAR tools. Stack Identity’s IGA tool gains real-time data, knowledge and risk context, and continuously monitors, tracks and analyzes identity and access activities to databases in order to ensure integrity, confidentiality and security of valuable data.

“As identity threats surge, the prevalence of API applications introduces vulnerabilities like service accounts, API keys, tokens and secrets with perpetual access to sensitive assets. Stack Identity takes a bold step in tackling identity threat detection for this new attack vector,” says Al Ghous, CISO and investor. “The platform plays a pivotal role in filling significant gaps by providing profound visibility and robust lifecycle management for machine identities.”

“Identity threat detection and response is perhaps the most crucial gap in current identity and access solutions,” says Ken Foster, head of architecture at Adient. “While ITDR is a critical innovation, the key lies not just in technology, but in the intelligence that is available to make the best decisions with what is occurring in your business. Enterprises already have a myriad of tools to tell them how bad things are, but Stack Identity excels in constructing a reliable path to remediate and govern identity threats.”


from Help Net Security https://ift.tt/cwWoBXf