Logitech’s New Streamcam!

Logitech StreamcamThis camera looks pretty good, I am looking forward to trying it out! The software that comes with it, even hass some pretty decent switching and image insert features for multi-cam usage!

Logitech has a brand new webcam for streamers, and you can mount it vertically

PC Gamer – By: Joanna Nelius – “I’ve favored Logitech’s C920 for years for its simplicity and picture quality. It’s been my go-to webcam for both streaming and office meetings, but I’ve always found it annoying that I couldn’t mount it in a number of different positions on my monitor bezel. The new webcam Logitech launched today, the StreamCam, is everything the C920 is and more, but for a lot more money.

You can mount it either horizontally or vertically, rotate it on multiple axes, and tilt it down at a full 90-degree angle. It also comes with a second mount base should you want to mount the StreamCam to a tabletop tripod instead of your monitor, and is fully supported by XSplit and OBS. It also features auto-framing and image stabilization to reduce camera shake should you accidentally bump your knee into your desk.

That’s just the start of things to love about the StreamCam, but of course it doesn’t come cheap: $170, $100 more than the C920 and $70 more than the C922 and Razer’s Kiyo. (You do get a three-month XSplit premium subscription thrown in for free if you buy the StreamCam from Logitech’s website.)

Here’s a quick rundown of the specs:

  • Max resolution: 1080p/60fps in Mjpeg (motion jpeg)
  • Focus/Exposure: Smart Auto
  • FOV: 78 degrees
  • Connection: USB-C 3.1
  • Microphone: Stereo / Dual Mono
  • Lens: f/2.0 – focal length 3.7mm

Compared to the C920, C922, and Razer’s Kiyo, you can stream at a faster framerate and higher resolution—and of course the StreamCam has vertical video, a two axis mount, and the option to use the built in microphone in a dual mono mode, which the other webcams don’t.

But what stands out to here is the f-number. F/2.0 is a wide maximum aperture, so the StreamCam could be used in low light situations and still churn out a decent image. We were able to briefly test it under soft room lighting, and the resulting image looked well-lit and balanced.

However, you might want to think about getting a good secondary light source if you don’t already have one anyway. Unlike Razer’s Kiyo, the StreamCam does not have a built in light. Not having a good light source could cause a dip in framerate since the aperture needs to open wider to let more light in. If you care more about framerate over exposure, you might not get a perfect 60fps in super low light situations.

The StreamCam also opts for a USB-C connection instead of a USB-A. This isn’t a huge issue if you have a motherboard that was made in the last couple of years, as most come with a USB-C port, but if you don’t have one you can still use Logitech’s new webcam. You’ll just need a USB-C to USB-A 3.0 adapter, and you can usually find a two-pack for around $10.

While there is no 4K option like the Brio, it doesn’t always make sense to stream in 4K, which makes the StreamCam a good choice for anyone with a C920 or C922 looking for something with more features.

Logitech also revamped its Capture software to include a Dark Mode, new scene effects, and live text overlays. You can also adjust the white balance and other image settings, as well as prioritize frame rate or exposure in the software. To get access to some scene effects, however, you will need to create a free account via Logitech Capture and sign in. You can download the software for free here. (MacOS support is coming soon.)”

Get Rid of Netflix Autoplay!

NetflixDoesn’t it annoy you? How Netflix will autoplay thumbnails of shows? It did me! Now, there is a way to fix it!

1) Sign into your Netflix account on the web.
2) Click your profile photo in the upper right and choose “Manage Profiles.”
3) Choose the profile you want to disable autoplay on. Beneath the options for your profile name, language, and parental controls, you’ll see a section for autoplay controls.

Disable that sucker! Whew! Now, it won’t start running and there will be peace again!

Zorin OS

Zorin OS

Zorin OS

Your computer.
Easier. Better. More Secure. More Powerful.
Zorin OS is the alternative to Windows and macOS designed to make your computer faster, more powerful, secure, and privacy respecting.

Zorin OS is designed to be easy, so you won’t need to learn anything to get started. The Zorin Appearance app lets you change the desktop to resemble the environment you’re familiar with, whether it’s Windows, macOS or Linux.

Rock solid & reliable.
Built on an Ubuntu Linux foundation, Zorin OS runs on the same Open Source software that powers the U.S. Department of Defense, NASA, and more.

Resistant to viruses.
Thanks to Linux’s advanced security features, Zorin OS is resistant to viruses. Security patches and software updates are available for years to come.

The power to do anything.
From a full Microsoft Office-compatible office suite to professional photo editing software, Zorin OS comes with powerful apps out of the box. Countless more apps and games are available from the Software store and Steam.

Compatible.
Your office documents, music, videos and photos simply work. You can even run many Windows apps using Wine.

Flexible.
You can install Zorin OS alongside Windows or macOS, and choose which OS to use at boot-up.

Accessible.
Zorin OS is translated into over 50 languages and comes pre-loaded with assistive technologies.

Privacy
Your data belongs to you.
Zorin OS doesn’t collect personal data, so advertisers and governments can’t spy on your activity. Because Zorin OS is Open Source, anyone can view its source code to ensure its security. It also comes with a firewall, so you can stay safe from attempts to compromise your information.

Runs fast on computers old & new.
Zorin OS works lightning fast and doesn’t slow down with updates. The Lite edition runs snappy on computers as old as 15 years, so you can breathe new life into old PCs.

Zorin Lite runs on a minimal PC:

CPU 700 MHz Single Core – 64-bit or 32-bit
RAM 512 MB
Storage 8 GB
Display 640 × 480 resolution”

Bring those old clunkers back to life, and consider how fast it is on a modern PC!

Soon there will be NO Ports in Smartphones!

People don’t like not having a 1/8 inch jack in their phone, what would you think of NO jack of any kind in their phone?

Apple will reportedly release an iPhone without any ports in 2021

The Verge – By: Chaim Gartenberg – “Noted Apple analyst Ming-Chi Kuo has a new research note predicting Apple’s next two years of iPhones, and there’s a wild new detail: Apple’s 2021 flagship iPhone will reportedly kill off the Lightning port, but USB-C fans (like myself) shouldn’t get too excited. According to Kuo’s note, Apple won’t replace the proprietary port with USB-C; rather, it will rely on an entirely wireless experience for charging and syncing, via 9to5Mac.

The change would be a big one for Apple, which has relied on the Lightning port for all of its phones since it was first introduced on the iPhone 5 in 2013. And while modern-day iPhones are certainly less reliant on physically syncing data, going to a fully wireless model would have huge ramifications across the tech industry, with everything from charging cable companies to headphone manufacturers being impacted. Obviously, we’re still a long way out from 2021 — Apple’s 2020 iPhones aren’t even here yet — but Kuo does have a good reputation for predicting Apple’s plans, meaning it’s entirely possible that this is what the future of iPhones will look like.

Additionally, Kuo’s note goes into more details about what to expect from Apple’s 2020 lineup, which he notes will feature five new phones. First up is the long-rumored iPhone SE 2, which Kuo says will have a 4.7-inch LCD display and a form factor nearly identical to the iPhone 8.

The fall lineup of iPhones is where things get a little odder. Kuo’s note says that Apple is planning four OLED iPhones, all of which will have 5G. Similar to this year’s phones, there’s reportedly going to be a high-end triple-camera model (which will also feature ToF technology), which will come in two sizes: a 6.1-inch model and a 6.7-inch model. Presumably, these two are replacements for the existing iPhone 11 Pro and iPhone 11 Pro Max.

There’s also a lower-end dual-camera model, similar to the standard iPhone 11. But unlike the current lineup, that dual-camera model will also come in two sizes. According to Kuo, the new model (let’s call it the iPhone 12) will feature a 6.1-inch size, similar to the current iPhone 11, but it’ll also come in a smaller 5.4-inch size.”

A Great Discussion of the Future of Tech

You may not care for Glenn Beck, but ignore the source on this one. Whether you like the interviewer or not, the issues discussed are real and thought provoking. PLEASE take the time to watch the discussion all the way through. It is FASCINATING!

“Technology is advancing faster than ever, and it’s not slowing down. This decade was the era of smart phones, streaming, and the internet of things. But with 5G and AI on the rise, high-tech executive Jeff Brown believes 2030 will be a new world. Brown is an early-stage tech investor and analyst who’s seen the modern technological revolution firsthand. He describes quantum computing as a moon landing and 5G as game-changing. He predicts a near future full of artificial intelligence, self-driving cars, wireless surgeries, genetic healing, cryptocurrencies, and more! But with equal advances in encryption hacking and the AI tracking abilities of Google, Facebook, and even China, we must control our own data!”

Disney + User Account Info For Sale Already!

Disney PlusI just recently signed up for Disney +, and probably, so did you! Sigh. Watch out!

Thousands Of Disney+ Accounts Are Up For Sale On Hacking Forums

Forbes – By: Lee Mathews – “Disney’s hotly-anticipated streaming service Disney+ finally launched this week. Despite being open to the public for just a few days, hackers have already hijacked thousands of accounts and put them up for sale on the Dark Web.

Reporting for ZDNet, Catalin Cimpanu discovered several listings for Disney+ accounts on different underground hacking forums. The going rate for a hacked account appears to be somewhere between $3 and $5.

That’s three to four times more than the asking price for a hacked Netflix account. Logical enough, given the excitement around the Disney+ launch.

So how is it possible that these accounts – many of which are just a few days old – have already been taken over by hackers? I haven’t seen any reports confirming the root cause, but it seems likely that bad habits are to blame.

One bad habit in particular: password re-use.

You should never, ever use the same password for multiple websites or online services. Security professionals have been repeating this refrain for years.

One bad habit in particular: password re-use.

Their warnings often fall on deaf ears, unfortunately. To users creating yet another account, it can feel like too much trouble to come up with a unique password to protect it.

When you’re creating a new account – whether for a hot new service like Disney+ or any other – remind yourself that hackers are always lurking in the shadows and ready to attack.

They’re armed with billions of email addresses (likely including yours) and billions of previously-used passwords. Using automated brute-forcing tools they can quickly break into accounts en masse.

Recovering a compromised account can be tricky, too. Once a hacker has gained access they tend to move quickly. They revoke access to authorized devices and then change passwords to prevent users from logging back in. They’ll change the email address associated with an account, too, which stops users from using automated password reset tools to regain access.

If you’re getting ready to sign up for Disney+ – or any other service, for that matter – get yourself a password manager first. Use it to create a unique password and let it remember that password for you.

Otherwise you may find yourself fighting to regain access to your account before you even have a chance to enjoy what you’ve signed up for.”

Understanding the Difference Between Risk, Threat, and Vulnerability

Cyware.com: Understanding the difference between risk, threat, and vulnerability

  • Vulnerabilities refer to weaknesses in a system or program that can be exploited by threats to gain unauthorized access to an asset.
  • Cyber threats refer to cybersecurity circumstances or events that can result in harm to the target organization.
  • Terms like threats, vulnerabilities, and risks are often confused with each other when it comes to cybersecurity and cyber attacks.

    The post aims to define each term while highlighting the difference between them.

    Vulnerabilities

  • Vulnerabilities refer to weaknesses in a system or program that can be exploited by threats to gain unauthorized access to an asset.
  • They make threat outcomes possible and potentially even more dangerous.
  • Examples of common vulnerabilities are SQL Injection, Cross-Site Scripting, server misconfiguration, sensitive data transmit in plain text and more.
  • Cyber threats

  • Cyber threats refer to cybersecurity circumstances or events that can result in harm to the target organization.
  • For example, threat actors can exploit a vulnerability, intentionally, or accidentally and obtain, damage or destroy an asset.
  • Threats include organized crime, spyware, malware, adware, and disgruntled internal employees who start attacking the employers of the target organization.
  • Common threats are social engineering or phishing attack that leads to an attacker installing a trojan or stealing information from your applications or overloading the ISP of a data center with unwanted traffic.
  • Risks

  • Risk is a metric used to understand the loss (both in terms of finance and physical) caused due to loss, damage or destruction of an asset.
  • Usually, it is translated as Risk = threat probability * potential loss/impact.
  • To get a clear understanding, let’s take the example of a scenario involving SQL injection vulnerability:

  • SQL Injection is a vulnerability that can be exploited to steal sensitive data theft.
  • Financially motivated attackers are one of the threat actors that usually leverage the vulnerability.
  • The impact of sensitive data getting stolen will bear a significant financial cost to the business. It will also hamper the reputation of the business.
  • The probability of such an attack is high, given that SQL injection is an easy-access, widely exploited vulnerability and the site is externally facing.
  • Therefore the SQL injection vulnerability in this scenario is treated as a high-risk vulnerability.
  • Three Security Protocols and What They Mean

    Cyware.com: HTTPS, SSL, and TLS: How are they different from each other?

  • HTTPS is the ‘Secured’ version of HTTP which stands for ‘Hypertext Transfer Protocol’.
  • Secure Socket Layer (SSL) was created by Netscape Communications Corporation in 1994.
  • These above-mentioned three protocols are used between browsers and web servers for the safe exchange of data but the main difference lies in their functionalities. Let’s take a dive into what each one of them stands for and how they differ.

    HTTPS

  • HTTPS is the ‘Secured’ version of HTTP which stands for ‘Hypertext Transfer Protocol’.
  • It is used by different browsers and web servers to communicate and exchange information.
  • In other words, the exchanged data is encrypted with SSL/TLS; hence called HTTPS.
  • HTTPS-based websites are less vulnerable to cybercrimes. For example: If your online site is not secured with HTTPS, then bad actors can intercept the content of the website and then easily create the exact replica of the payment page to capture your credit card numbers and other personal details.
  • By default, HTTP uses port 80 and HTTPS uses port 443.
  • SSL

  • Secure Socket Layer (SSL) was created by Netscape Communications Corporation in 1994.
  • It was designed to create a secure internet communication via the Web.
  • It is a standard protocol that encrypts communication between the browser and the server, thus allowing easy and safe transfer of sensitive information like social security numbers, credit card details and login credentials.
  • It utilizes two types of keys: (1) Public keys – that are known to everyone; (2) Private keys – that is known only to the person receiving the message.
  • TLS

  • Transport Layer Security (TLS) – a renamed version of SSL 3.1 – came into existence in 1999.
  • TLS 1.3, released in March 2018, is the latest version of TLS.
  • It is a protocol that allows communication between the internet and client-server applications. It forms a secure communication via the Web for email, data transfer and faxing.
  • TLS has two distinct layers: TLS Record Protocol and TLS Handshake Protocol.
  • TLS Record Protocol establishes a secure connection with encryption methods like data encryption standard. On the other hand, the TLS Handshake Protocol allows authentication for servers and clients together.
  • 1 2 3 222