Skip to content

Archive for

10
Jan

Buy two Amazon Fire 7 kids edition tablets together and save $50


Designed for kids but designed for parents, too.

Buy two Amazon Fire 7 Kids Edition tablets for $149.98. Each tablet is $100 bought individually, so you’re saving $50 on the total. You can buy this bundle in Blue/Pink, Pink/Yellow, or Blue/Yellow. A different color for each tablet so your kids don’t get confused on which one is theirs.

amazon-kids-tablets.jpg?itok=-cS42kKm

The Kids Edition tablets have a special guarantee attached that protect you when your hyperactive kids smash the screens. They also have parental controls so you can see what they’re accessing and manage times.

Features include:

  • Not a toy, a full-featured Fire 7 tablet with a 7-inch IPS display, 16 GB internal storage, and up to 8 hours of mixed-use battery life.
  • 2-year worry-free guarantee: if they break it, return it and we’ll replace it for free. No questions asked.
  • One year of FreeTime Unlimited gives your kids access to 15,000 popular apps and games, videos, books, and educational content from PBS Kids, Nickelodeon, Disney, and more
  • Add even more content to your child’s profile in FreeTime to give them selected access to apps in your personal library, such as Netflix, YouTube, and Minecraft
  • Best-in-class parental controls allow you to manage usage limits, content access, and educational goals

You can expand the storage of the tablet with a microSD card up to 256GB. This Samsung Evo Select 128GB microSD card is only $40.

See on Amazon

10
Jan

Unknown Sources: Everything you need to know!


unknown-sources.jpg?itok=9aMzJP4d

The Unknown Sources setting isn’t the mystery — or the demon — it’s made out to be if you know a little bit about it.

To install apps that you downloaded from somewhere besides the “official” app store from Google or the company that made your phone, you need to enable the “allow unknown sources” setting. There has always been a bit of confusion about what it is exactly and how things work. We’re going to remedy that and talk through everything you need to know about unknown sources. Don’t worry, it’s gonna be fine.

What are ‘Unknown Sources’?

No, not people who leak government stuff to the press. The Android kind of unknown sources. It’s a scary label for a simple thing: a source for apps you want to install that is not trusted.

Unknown = not vetted directly by Google.

When we see the word “trusted” used this way, it means a little more than it usually would. In this case, trust means the same as it does for a web certificate and everyone involved on all sides will vouch for the source. Google says you can trust Google Play and Samsung Apps (for example) because they don’t require you to enable the installation of unknown (not in the circle of trust) sources to install apps from either. Samsung feels the same way and so does your carrier.

In short, a trusted source is one that the company you gave your money to, the company who built it, and the company who wrote the software all have vouched for.

Why is there even a setting for this?

Half the people reading this will think that no company should allow us to install apps they do not trust. The other half will think that nobody should be telling me what apps I can and can’t install. Having a setting in place is the only real solution.

It’s not really a good idea to just let any app from any place get installed on your phone. When you block app installs from places not in that trusted circle, random drive-by downloads can’t happen. Full stop. It’s insanely difficult to find an exploit that can force you to install an app you don’t want. It should be, because that sort of trickery is never done for a good reason. Going one step further and just outright blocking the darn things is the type of over-the-top phone security Google loves.

And Google doesn’t claim that apps from other places are a bad thing. It has a whole page that tells app devs how to go about offering apps without putting them in the Play Store. All Google has to say about the Unknown Sources setting is:

User opt-in for apps from unknown sources

Android protects users from inadvertent download and install of apps from locations other than Google Play (which is trusted). It blocks such installs until the user opts in to Unknown sources in Settings > Security on their device. Users need to make this configuration change before they download your apps to their devices.

Note that some network providers don’t allow users to install applications from unknown sources.

Google is cool with developers doing it and cool with you downloading and installing them. But they make sure you opt in for it before you do.

Are unknown sources a bad thing?

Nope. But enabling the setting for no good reason or leaving it on all the time is.

The internet is a big place. There are plenty of places to get apps that are as trustworthy as Google or Samsung or LG or any other company with their own on-device app store. You just need to do a tiny bit of poking around to make sure a place is trustworthy before you grab an app from it.

The Unknown Sources setting is like the stove: turn it off when you’re done using it.

Reading this article is a good start. Read other Android websites, too. We’re not afraid to tell you when you can trust something or some place. Here are two places I trust as much as anything from Google: Amazon and F-Droid. I use them both and am not afraid to tell you to use them if they have something you want. And everyone else here would say the same thing. In essence, Android Central trusts Amazon and F-Droid and thinks you can, too. But because of Google’s definition of trust, in this case, they can’t. Knowing that both Amazon and the folks running F-Droid scan all their files and are diligent about how they are distributing them isn’t enough for Google because they need to do those things themselves before they trust a source.

What is a bad habit is leaving the unknown sources box checked if you don’t need to. If an app you installed will run with the setting disabled, disable it until you need it again. If an app won’t run without it enabled, find out why before you install it.

You’re still protected

50-billion-scans.jpg?itok=0eoJk0XQ

Google wants to scan every single app you install right before you install it. It will ask you to let it do so and to let it do it in the future the first time you try. At Google I/O, we were told that Google scans 50 billion apps per day to ferret out any with malware, including the ones you are installing. And this doesn’t depend on having the latest version of Android. Every single phone with access to Google Play running Android 4 or higher has these protections built in through Google’s Play Services feature. While no type of scanning is going to be 100% foolproof, chances are someone else has installed that app before you and Google has looked at it, and they will look harder if it does anything fishy. Or has a hidden ability to do anything fishy.

Fifty. Billion. Every day. That’s a helluva lot of apps.

Google, Apple, Samsung, and every other company takes the integrity of their app store very seriously. Nothing makes them look worse than me telling you about bad apps that slipped through, so they do everything they can to keep it from happening. In this case, that benefit rolls over to apps you installed from elsewhere. Win all around!

Why don’t companies just put their apps in Google’s Play Store?

That’s a question with a big, convoluted answer that no two people will agree on. Let’s just say that Google places some restrictions on ways developers can make money. Not everyone is willing to accept those restrictions.

Of course, test apps and beta apps and project apps are better off being hosted locally and set to whoever needs them. But for big production ready apps, not everyone wants to use Google Play.

How do I turn Unknown Sources on?

Open the device settings. Look for a gear icon in the notification shade near the top left corner and tap on it.
Scroll down to the Security section and tap to open it.
Scroll down to the entry labeled Unknown sources and read the subtext because you should always read any and all subtext in a “security” section of settings.
Read the pop-up box that tells you Google isn’t responsible if you install apps from places they do not explicitly trust and click OK to enable the setting.

unknown-sources-warning.png?itok=42clwG2

You disable the setting the exact same way. Toggle the switch off and installation is once again blocked for apps downloaded outside of trusted app stores.

So should I enable the setting?

If you want to install an app that you trust — you know the source and are sure they aren’t pulling a fast one and that the app is exactly as the developers have written it, then you can enable it when you need it.

There are a lot of different ways to define trust, but we think that word of mouth is one of the best ones. Your friends, people in forums and comments, and your favorite Android blog can tell you whether or not they think you should trust a thing or place, and whoever is saying it should be willing to tell you why.

Most importantly, you don’t have to worry about temporarily enabling Unknown Sources if you trust a place that has an app you want to install.

I trust Amazon because it vets every app in its store and it is a popular source. That means if an app slips through, it will get caught quickly. I trust F-Droid because every app it offers has the full source code available and provides a checksum to make sure you’re downloading a verified copy that it compiled itself. Not everyone wants the source code. You don’t necessarily have to know either of these things because someone else has looked into it and the information is available. You should still do any personal vetting that you need to feel comfortable, but generally, a site that’s not trustworthy is going to be talked about even more.

Do a little bit of homework and you’re golden. Just be sure to turn the setting back off once you’re done installing your apps.

Wrapping it up

This is a simple breakdown to make sure everyone can understand what’s going on when asked to enable the Unknown Sources setting or when you see people warning against it. There are other more nerdy things like signing keys and heuristic scanning that could be talked about, but we feel that will muddy the water a little. If you’re the type of person interested in the minutiae, the Android Developers site has plenty of information about how Google Play works and what else Google does to make it safe. It’s great reading if you’re inclined.

For everyone else, just know that the Unknown Sources setting isn’t really a mystery or anything to be afraid of if you need it. And when you don’t make sure it’s turned off.

Stay safe!

Updated January 2018: With all the security worries lately, we’ve refreshed this piece to help you protect your devices and data.

10
Jan

How to get the most from your Chromebook touchpad


chromebook-trackpad.jpg?itok=wB5MtvHQ

It may only be one big button, but the multi-touch touchpad on your Chromebook can do just about anything you would ask of it.

Your Chromebook’s touchpad is simple to set up and use, and a couple of handy features make it more than just a way to move the mouse pointer. With multi-touch gestures, you’ll be able to navigate web pages and apps easier, as well as see everything you’re working on at a glance. And yes, you can move the mouse pointer, too.

The touchpad on current Chromebooks is a one-piece unit missing the buttons you might be used to with other laptops. Instead, the touchpad itself is a button, and multi-touch — being able to register multiple actions at once — takes care of the rest. Because you might be used to having buttons for right and left clicking, we’ll start with the basics.

How to adjust your touchpad settings

To begin, have a look at the settings page, and you’ll find where you can adjust the pointer speed and a section for touchpad settings where you can enable tap to click, swapping your primary mouse button and using Australian scrolling.

  • Tap to click is a setting that lets you tap your finger on the touchpad to do the same thing as a click would do on a regular button. If you want to use gestures you’ll want to keep this enabled.
  • Swap your primary mouse button does the same thing it would do with a mouse or a trackpad with actual buttons. It switches actions that need a left click into actions that need a right click, and vice versa.
  • Australian scrolling is having the screen scroll the opposite direction your fingers are moving on the touchpad. Traditional scrolling moves your view up the page when you scroll up, and Australian scrolling moves your view down the page when you scroll up.

When you’re done adjusting your settings, click OK to save them.

chromebook-trackpad-2.jpg?itok=9cW0dqgc

How to use the touchpad to control the cursor

Next, we’ll cover the basics of pointing, clicking and navigating. If you’re used to using a mouse, these will take a bit of time to get used to. Alternatively, you can use a mouse with your Chromebook if you would rather. It’s still worth learning how to use the touchpad for those times when your mouse batteries are dead and that drawer in the kitchen with a fresh or charged set seems miles away.

  • To move the pointer, move one finger across the trackpad in the direction you want the pointer to move.
  • To click on something, tap or press down on the lower half (the half closest to your body) of the touchpad with one finger.
  • To right click, tap or press down on any spot of the touchpad with two fingers.You can also right-click by pressing the Alt key then tapping or clicking with one finger.
  • To middle click, tap or press anywhere on the touchpad with three fingers.
  • To drag and drop, tap or press the thing you want to drag with one finger and move the pointer while holding down. Let go when your pointer is where you want to drop it. You can also press and hold with one finger then move the pointer with a second finger.

How to use gestures on your touchpad

Gestures are that little extra which can make an experience better. Some apps may have their own gestures, like a three-finger swipe left and right to skim through Chrome browser tabs, but there are three common ones that work with everything you do on your Chromebook.

  • To scroll, drag two fingers on the touchpad.
  • Scrolling right and left, acts as forwards and back buttons. The faster you swipe the faster you will navigate. This setting is universal and works anywhere you can move horizontally.
  • Scrolling up and down, moves the window content up and down. See Australian scrolling above for an option.
  • To see all open windows. swipe up or down with three fingers on the touchpad. If you have Australian scrolling enabled, swipe up. Otherwise, swipe down.

chromebook-trackpad-3.jpg?itok=XjMzoiIx

Most of these are along the lines for features you find in any laptop with a good touchpad or trackpad, with or without buttons. They’re not too revolutionary. They do make working with the touchpad on your Chromebook as easy as using a mouse!

Updated January 2018: Updated with fresh tips on how to use your Chromebook touchpad to its fullest.

Chromebooks

  • The best Chromebooks
  • Should you buy a Chromebook?
  • Google Play is coming to Chromebooks
  • Acer Chromebook 14 review
  • Join our Chromebook forums

10
Jan

Dell breaks down its new XPS laptops and jewelry debut


Dell’s new XPS 13 and XPS 15 laptops are promising additions to a popular series, but the company has continued to place the system’s webcams below the screen, making for awkwardly angled Skype calls. The company’s marketing director of the XPS products Donnie Oliphant explained that it’s because the display bezel is too thin to accommodate a camera on top. Hopefully, that will change in the future, as Oliphant said the goal is to ultimately place a camera inside the display. Check out the video above to see what else he had to say about the new XPS laptops, Dell’s future plans and its new e-waste recycling initiative with actor Nikki Reed.

Click here to catch up on the latest news from CES 2018.

10
Jan

NVIDIA GPUs weren’t immune to Spectre security flaws either


It’s not just your processor and operating system that are affected by the Meltdown and Spectre memory vulnerabilities — your graphics card is, too. To that end, NVIDIA has detailed how its GPUs are affected by the speculative execution attacks and has started releasing updated drivers that tackle the issue. All its GeForce, Quadro, NVS, Tesla and GRID chips appear to be safe from Meltdown (aka variant 3 of the attacks), but are definitely susceptible to at least one version of Spectre (variant 1) and “potentially affected” by the other (variant 2). The new software mitigates the first Spectre flaw, but NVIDIA is promising future mitigations as well as eventual updates to address the second.

Most of the updates are available now, although Tesla and GRID users will have to wait until late January.

There’s no mention of whether or not NVIDIA’s fixes will affect performance. Microsoft has warned that some Spectre fixes could bog down older PCs, but those are fixes for CPUs, not GPUs. NVIDIA had already promised updates for its Shield devices.

NVIDIA’s fixes are necessary given the severity of the flaw (an intruder could use speculative execution to swipe sensitive data from protected memory), but they also illustrate just how much of a headache Meltdown and Spectre have become. While they don’t affect absolutely every aspect of computing, they’re pervasive enough that it’s virtually certain you use something which requires an update.

Via: Reuters

Source: NVIDIA

10
Jan

CES 2018 recap: Day one


The CES show floor officially opened yesterday, and suffice to say Team Engadget was kept very busy. As the day began, we divided our time between all the big booths (think: Sony, Samsung, Intel, LG, etc.). But, we also had to leave the Las Vegas Convention Center and make our way over to the Sands, which is home to CES’s increasingly important startup section. That’s where we tend to find unexpected gems each CES. The above recap includes just a sliver of what we saw yesterday — you can find all our coverage here, and be sure to stay tuned in. After all, we still have two full days left on the show floor.

Click here to catch up on the latest news from CES 2018.

10
Jan

Telegram’s desktop update adds design tweaks and custom themes


Telegram offers several ways to access its encrypted message service on laptops and PCs: There’s the pared-down web version, a Mac offering, and the all-encompassing desktop app. Now, thanks to a major update, the desktop version is ready to supersede its counterparts.

The revamp brings with it a consistent material design, new animations, and custom themes (following on the heels of their introduction on iOS). The latter let you sprinkle some color on your messaging bubbles — much like Messenger’s web version — and include a third-party night mode for your after-dark convos.

As frequent users will be aware, Telegram offers server-client encrypted messaging and end-to-end encrypted private chats. The desktop app’s existing features include syncing messages from the mobile app, and the ability to switch between typing chats on your phone and desktop. Plus, you can send the usual barrage of attachments, including pics, documents, and videos.

How Telegram finds the time to implement these updates between all the wrangling it does with oppressive foreign regimes is anyone’s guess — recent aggressors include Iran and Afghanistan.

Source: Telegram

10
Jan

FBI chief says phone encryption is a ‘major public safety issue’


The FBI’s stance on phone encryption hasn’t changed even if the President fired former director James Comey. At a cybersecurity conference in New York, current chief Christopher Wray has reiterated that the agency failed to access the content inside 7,775 devices within the fiscal year that ended on September 30th, 2017 despite having the proper warrants. That’s over half the number of devices the FBI tried to crack open within that period, making encryption, according to Wray, a “major public safety issue.”

Wray urged the private sector to work with the government in finding “a way forward quickly,” insisting that the FBI isn’t interested in peeking into ordinary citizens’ devices. The bureau just wants access to the ones owned by suspects. That pretty much echoes Comey’s position during his time — if you’ll recall the FBI asked tech titans to create a backdoor into their software and phones in order to give authorities a way to open them during investigations. Apple chief Tim Cook said the request had “chilling” and “dangerous” implications, warning that companies wouldn’t be able to control how that backdoor is used.

Wray told the audience at the event that authorities face an increasing number of cases that rely on electronic evidence. He doesn’t buy companies claims that it’s impossible to find a way for encryption to be more law enforcement-friendly, so to speak. Not that the FBI can’t do anything if it absolutely has to: when Apple refused to cooperate with authorities to unlock the San Bernardino shooter’s iPhone, the agency paid a third party almost a million to get the job done.

Source: Reuters, The Washington Post

10
Jan

AAA is testing self-driving cars to see how safe they are


Fully autonomous cars won’t be allowed on the streets until they’re safe, but how will we know when that happens? The American Automobile Association (AAA) is trying to figure that out by testing self-driving cars powered by Torc Robotics “Asimov” system. The aim is to gather information and develop safety criteria that could be used by any company developing self-driving tech. “By creating a blueprint for automakers to follow, we hope to build public trust in technology,” said AAA Northern California, Nevada & Utah CEO Tim Condon.

A recent AAA survey found that 75 percent of Americans are skeptical of self-driving cars, and as a driver-focused, independent organization, the AAA feels its well-placed to help build up that trust. Torc Robotics, meanwhile, is one of the early pioneers of self-driving, having placed third in DARPA’s 2007 Urban Challenge — back when self-driving cars were a bit more bulky. The Asimov system has been cross-country tested in more than 20 states, it notes.

The non-profit AAA has historically weighed in on motorist rights and safety issues, supporting increased infrastructure spending, lower speed limits and gas tax increases. It’s aware that its business model is changing rapidly, however, with the arrival of EVs, self-driving cars and other tech. Autonomous cars, it believes, “have the potential to dramatically reduce traffic fatalities on our roadways.”

The AAA even launched its own one-way car-sharing service in the Bay Area recently. “We’re acknowledging that transportation habits are changing,” Condon said. “AAA is over a hundred years old, and we remain committed to continuously innovating in the area of traffic safety.”

10
Jan

Pokémon GO Soon Won’t Support iPhone 5, iPhone 5c, and Some Older iPads


Niantic on Tuesday announced that Pokémon GO will require an iPhone or iPad capable of running iOS 11 or later at the end of February.

The company plans to release an update for Pokémon GO around February 28, 2018 that will end support for older iPhone and iPad models incapable of updating to iOS 11, including the iPhone 5 and iPhone 5c.

The complete list of affected devices, released between 2011 and 2013:

  • iPhone 5
  • iPhone 5c
  • iPad (4th generation)
  • iPad (3rd generation)
  • iPad mini (1st generation)
  • iPad 2

After that date, players may no longer be able to access their Pokémon GO accounts on affected devices, or use their PokéCoins or other items in their bags. They will need to switch to a supported device to continue playing the game.

More specifically, players who attempt to access Pokémon GO using any of the devices listed above will no longer be able to sign in and will see a message stating that they need to switch to a supported device, suggesting server-side changes.

Niantic said the change is a result of improvements to Pokémon GO that push the game beyond the capabilities of previous iOS versions, likely including a new AR+ mode based on Apple’s ARKit for iPhone 6s and newer.

Related Roundup: iOS 11Tag: Pokémon GO
Discuss this article in our forums

MacRumors-All?d=6W8y8wAjSf4 MacRumors-All?d=qj6IDK7rITs