In some programs, you would have to make copies of that document to distribute to each folder.In the Drive window that pops up, select My Drive.This will bring up a list of all the folders and files stored in your Drive account.Drive s Details menu can help you keep track of which folders house a particular file.Then click the Details icon—it looks like a circle with an i in the center—in the upper-right of the toolbar.Select the Details tab to see information about the file, including when it was created and last modified and what folders it s currently in.
Jump to a section:ImagesBinghttp://www.bing.com/images?FORM Z9LH1Bing offers an image search engine that uses trending searches from across the web to create this stream of image results.GiphyGiphy is the largest online database and search engine for Gifs and it s the most popular choice for many users when looking for a Gif to support their content.Dailymotionhttp://www.dailymotion.com/gbA popular choice for video searching, attracting 300 million users from around the world who watch 3.5 billion videos monthly.Google videoshttps://www.google.com/videohp?hl enGoogle s video search may be an alternative to Youtube, as they don t seem to provide the same results for each query, helping users find what they re looking for without leaving the search platform.Radio-LocatorA searchable database of over 15,000 radio station web pages and 10,000 audio streams.And finally, check out our post: 14 search engine alternatives to Google.
The more bookmarks you save in Safari, the harder it is to find what you want.It was necessary back in the day, because you couldn t remember all those URLs, and browsers didn t auto-complete with addresses of your saved sites.Remember that site where you saw that really interesting article last month?Start by displaying your bookmarks in Safari Bookmarks Show Bookmarks .Next, move up a level in the Finder press Command-up-arrow , and drag that folder onto the bookmark list in Safari.In fact, Apple should allow Safari to display bookmarks in date order as well.
A reader wants to have a copy of his Photos Library on an external drive that looks like what he sees in the app.I read this question and almost replied, That s easy!However, Photos organizes images and video into chronological folders— nested by year, month, and day—inside Masters originals and Previews modified versions .Copy Moments, Albums, Smart Albums, and other organizational structures in the Photos app.I ve recommended PowerPhotos $30 before, a utility by Fat Cat Software that can merge, de-duplicate, and selectively copy Photos libraries, along with other tasks.Email yours to [email protected] including screen captures as appropriate.
However, as the web has grown, it s increasingly unusable.Efforts have been made to develop something called the semantic web, but much of that discussion has been technical and hierarchical and focused on taxonomies vs. ontologies and not on practical uses.The implications of this reality for marketers and anyone who produces web content are enormous.The impact of improved findability through categorization could have a substantial effect, particularly for small businesses with limited resources to dedicate to current search visibility.and Altavista became less useful as content proliferated, but replacing that visual directory with one based on categorization and taxonomy makes more sense than ever.Proposed: the web needs a subject-based taxonomy infrastructure much like the Dewey Decimal system, administered by the Internet Corporation for Assigned Names and Numbers ICANN .
OS X: Airmail, one of our favorite email apps on Mac, just got a slew of new features today, including smart folders to more easily sort your mail, VIP contacts and notifications, send later email queuing, and more.VIP contacts let you limit notifications to only those contacts that you deem worthy of an alert just like the recently updated iOS version , and can also sync with iCloud along with smart folders so you can choose your VIPs on any iOS device and have the desktop version in sync.Other new features include even more freedom to customize menus, gestures, and keyboard shortcuts, Asana and Trello integration, support for Gmail s Primary Inbox, and more.The update is free for current users and $9.99 if you re buying the app for the first time.Airmail 3 $10 Mac App Store
Crims watched Active Directory closely, then sprung their attack with off-the-shelf malwareSwiss defence contractor RUAG and the country's GovCERT have revealed the details of a 2014 network breach in which attackers got access to a stunning 23 GB of data.The breach was only discovered earlier this year, with to very little fanfare until earlier this month, when NZZ am Sonntag reported that the attackers used their access to RUAG to also gain access to the secret Swiss DRA10 special forces unit in English via Swissinfo here .The reason for publication, the organisation explains, is to provide insight and protection.We decided to publish this report to give organisations the chance to check their networks for similar infections, and to show the modus operandi of the attacker group .The SANS Institute's Rick Wanner notes that the attack doesn't seem to have been particularly stealthy or advanced.The latter ones never actually contacted any C servers, but instead received their tasks via named pipes from a communication drone, and also returned stolen data this way.
Desktop email clients are great for when you need to manage multiple accounts from various providers.The app has been updated with a boatload of handy new features.You ll now find that it offers smart folders, as well as the ability to allow notifications only from select contacts that you add to a list.In addition, you can schedule emails to be sent at a later time, and customize gestures as well as keyboard shortcuts and menus for greater control over the app.The app is available for $9.99 in the Mac App Store; existing users can upgrade to version 3.0 with all these new features for free.Read next: Why changing your app's logo can make a huge difference in engagement
At first glance, it looks like purely a stunt-attack, except for this: a phishing e-mail purporting to be from tech support could trick a victim into dropping a message into a terminal window and executing it – not realising that what's in the clipboard got changed on the way.In the simple proof-of-concept of Pastjacking here, you think you're copying the command echo not evil into the terminal, but what lands in the clipboard is echo evil \n.The newline appended to what lands in the clipboard means the user doesn't get the chance to review what appears on the terminal command line: as soon as they paste from the clipboard to the terminal, it executes.Dylan Ayrey, who published the exploit at GitHub, explains: If a user attempts to copy the text with keyboard shortcuts, i.e.ctrl c or command c, an 800ms timer gets set that will override the user's clipboard with malicious code .The victim appears to have the command they intended to copy, nicely pasted into the terminal , he writes.
Unlike the drive letter system used by Windows, Linux mounts everything in the same hierarchy.Add them together for each of the user types and you have a three-digit number that sets the permissions exactly there is no equivalent to or - with this method .The test option checks the integrity and lists the contents of the archive.While not as intuitive as Chromium or Firefox, it is worth knowing about in case you ever suffer graphics problems.But man pages are not limited to programs; they also cover configuration files.Man maintains a searchable database of pages, which is automatically updated by Cron, and has some other programs for working with it.
Yes, for example, the EU can say to services like Netflix and HBO that 20 per cent of their application directory must consist of European content. The proposal also opens up to the Member States can ask the video services on financial contributions to European works. With these new rules we will maintain diversity in the media, supervisory independence and make it clear that hatred has no place on the platforms for video sharing, we also want to ensure a leveled playing field, responsibly behavior, trust and fairness on platforms in the online environment. That's what we concludes with today's announcement, says Günther H Oettinger, European Commissioner for the digital economy and society. Read also: Leaked EU documents: Netflix can continue geoblockering In brief, the proposal means that similar services will have similar legislation and that the Commission will work to reduce the scope of existing laws. For example, this could mean providers of communications services on the network should have the same rules about confidentiality as traditional telecom operators.
Yes, for example, the EU can say to services like Netflix and HBO that 20 per cent of their application directory must consist of European content. The proposal also opens up to the Member States can request that video services will contribute financial support to European productions. With these new rules we will maintain diversity in the media, supervisory independence and make it clear that hatred has no place on the platforms for video sharing, we also want to ensure a leveled playing field, responsibly behavior, trust and fairness on platforms in the online environment. That's what we concludes with today's announcement, says Günther H Oettinger, European Commissioner for the digital economy and society. Read also: Leaked EU documents: Netflix can continue geoblockering In brief, the proposal means that similar services will have similar legislation and that the Commission will work to reduce the scope of existing laws. For example, this could mean providers of communications services on the network should have the same rules about confidentiality as traditional telecom operators.
View photosMoreHttps%3a%2f%2fblueprint-api-production.s3.amazonaws.com%2fuploads%2fcard%2fimage%2f98799%2fbf3b18b274a4425f8815aa57188f4c14The change started when websites started rating passwords as we were creating them, trying to get us to add some capital letters and symbols to boost their status from weak to strong.The passwords that are being dynamically banned across Microsoft services including Outlook, Skype, Xbox and more are pulled from the annual "Worst Password List" by SplashData.According to the blog, Microsoft's active directory service Azure AD will be banning the same passwords soon.It also cited the recent news of 117 million LinkedIn users having their usernames and passwords stolen, which caused the site to reset many users' passwords.To make it difficult for people to get into your account, use a mix of capital and lowercase letters, numbers and symbols.Google recently devised a plan to get rid of passwords in favor of face-recognition, location or fingerprint scanning.
You know the sort of passwords we mean – the ones which appear on the dumbest password lists that pop up frequently such as '123456' or the immortal 'password' – and these proved to be popular choices for hacked LinkedIn accounts despite their obvious glaring stupidity.Hence Microsoft has now banned such common passwords from the Microsoft Account and Azure AD Active Directory system, so if there does happen to be a hack or spillage of some kind, your encrypted password is guaranteed not to be one of these trivially guessable affairs.Alex Weinert, Group Program Manager of the Azure AD Identity Protection team, commented: "When it comes to big breach lists, cybercriminals and the Azure AD Identity Protection team have something in common – we both analyse the passwords that are being used most commonly."Bad guys use this data to inform their attacks – whether building a rainbow table or trying to brute force accounts by trying popular passwords against them.Millions of intrusionsWeinert's TechNet post further noted that Microsoft sees over 10 million accounts attacked every day, which provides a great deal of data about the passwords employed in these attempted intrusions, with that data being used to maintain a constantly updated list of blocked passwords.Of course, to further strengthen your password security it's a good idea to adopt two-factor authentication – across any account or online service that offers it – and Redmond notes that Azure AD admins should ensure that all users are properly configured for Azure multi-factor authentication.
Microsoft announces complete ban of simple or commonly used passwords from all of its accountsMicrosoft account holders are being forced to upgrade their passwords, after the company announced a ban for all simple or commonly used login credentialsThe move comes after a hacker placed 117 million LinkedIn account details including names, emails and passwords up for sale, forcing the professional business social network to invalidate affected passwords.The company said that has already activated this feature for regular Microsoft Account users and is holding a limited private preview for Microsoft Azure Active Directory services.Read More: to find out the top five password security tips for businesses.The most important thing to keep in mind when selecting a password is to choose one that is unique, and therefore hard to guess, said Alex Weinert, Group Program Manager of Azure AD Identity Protection team.We help you do this in the Microsoft Account and Azure AD system by dynamically banning commonly used passwords.He pointed that Microsoft is seeing more than 10 million accounts attacked daily.
Microsoft will not allow easy passwords Credit: MicrosoftIn the wake of last week's LinkedIn hack when 117m user credentials were leaked, Microsoft has announced it is tightening password security by banning easy passwords.According to Alex Weinert from Microsoft's Identity Protection Team, Microsoft fends off attacks to 10 million accounts on a daily basis and has been collecting all the passwords guessed by hackers.Microsoft will ask you to choose a harder passwordThe service, which will work on Microsoft Accounts including Outlook emails and cloud directory Azure AD, will then prevent you from using the most commonly used passwords, so you are less likely to get hacked.Microsoft can determine the risk associated with a specific login session where the person is logging in and what network they are using so they can lock out suspected intruders, but you can still login if you are doing so from your own device on an internet network you have used before.According to Weinert, password length requirements and regular password expiration like when your office network compels you to frequently change your password are all fallacies that actually make your password easier to crack.One ultra-secure one won't be any good if someone finds itWhile combining upper and lower case passwords with numbers to alter a memorable word - M4raD0na - is often advised, these are more easily cracked than you might thinkGood advice is to make a memorable, unusal sentence: "I am a 7-foot tall metal giant" is better than "My name is John", and use the first letter of each word with punctuation: "Iaa7-ftmg"Alternatively, you can use a password manager such as 1Password, which can generate secure passwords and store them onlineThe best way to protect yourself is to use two-factor authentication, which will send a text with a code or use an app to verify your log-in
EnlargeAs Microsoft pats itself on the back for its crackdown on easily cracked passwords, keep this in mind: a quick check shows users still have plenty of leeway to make poor choices.As a Microsoft program manager announced earlier this week, the Microsoft Account Service used to log in to properties such as Xbox Live and OneDrive Azure has been dynamically banning commonly used passwords during the account-creation or password-change processes.But the measure is most likely intended to thwart only so-called online password cracking.Still, the acceptance of "Pa$$w0rd1" by Google and Microsoft just goes to show that blacklisting has its limits, and there's only so much service providers can do to save users from their own poor habits.A move like that would quickly come to resemble the vexing CAPTCHAs that all too often are impossible to solve on the first few tries.Of course, there's a more effective measure: any account that stores even moderately sensitive information should be protected by a password that's randomly generated, contains numbers, symbols, and upper- and lower-case letters, is at least nine characters in length, and is unique for each account.
It seems that Google is working out an Android version of the mini-computer. Support for Android tend to be high on the wish list of new Raspberry Pi features, and perhaps Google is about to deliver. Just over a month since Google opened a directory for Raspberry Pi 3 on the Android Open Source Project, which attracted the attention of Android Police. So far, the catalog is not loaded with any code, so it is unclear how far Google arrived in development. With proper Android support would Raspberry Pi 3 get a boost as the platform for the Internet of Things and smart home. Several other short computers already have support for the operating system.
Top tips to improve performance of BlackBerry PrivIf your BlackBerry smartphone has become laggy and very slow, consider cleaning your handsets to boost its performance.If you own a BlackBerry Z30, use BlackBerry Link to backup and restore your data, but if you used a BlackBerry Priv use Android Backup Service.Clear cacheTry clearing the cache at frequent intervals, so that you can get a bit of memory as well as performance improvements.Also, delete the saved Wi-Fi networks, unless you use them regularly and try to manage your download folder, which is more like a dumping zone if it is not managed properly.Although, you can revoke permissions any time you want.Final touchOnce you set your device, notifications and customise other settings, consider installing any battery and memory saving apps which can be found inside BlackBerry World or Google Play Store.
Today I d like to share some of the data we gathered and insights of other Slack bot builders.Prior any marketing activity, your main goal should be understanding your target audience in order to serve them better.It is a well covered topic in many articles and books, but I will highlight the key points from domain experts:Ross Simmonds, Entrepreneur at getcrate.co, says:Ernest Oppetit, Product Manager at qubit.com shares similar insights:In addition to establishing contact with your target audience you may want to reach out to the influencers and talk with them about getting their feedback, help or just to get to know the community better.Once you prepare material and share it with others not only do you start promoting your brand but you build a community tied to your product.Alyx Baldwin, Co-founder and CTO at kipthis.com also advises to start publishing:While Alyx prefers Medium, we ended up hosting our blog on WordPress.According to Matty Mariansky, Co-founder, Product Designer at Meekan, we can see that the amount of traffic from Producthunt is almost the same comparing to Slack directory at the peak .Bahaa Galal, co-founder and CTO at notify.ly shares this advice:The first impression on Producthunt is critically important — so polish the website having a clear message on what do you do then run product tests with the help of early adopters and make sure everything is perfect as it can be.In the meantime, here s what other successful Slack bot builders have to say:Matthieu Varagnat, Entrepreneur and developer of smooz.io, writes about the key competitive advantage Slack bot builders get by engaging with the directory now, as opposed to when it grows bigger:Being listed in Slack s App Store https://www.slack.com/apps/ can bring a substantive amount of new teams every day.If your bot is great enough according to Slack, you might even be featured in the New and Noteworthy or Brilliant Bots categories.Good luck on getting new customers for your Slack bot.
More

Top