Why does Mac OS X need an Uninstaller?Have you ever unsuccessfully tried to get rid of a program and all the files that came with it?...
Showing results 1 to 20 of 232
In addition to showing media files and running games from the Google Play store, the micro-console can make use of Razer's new Cortex: Stream software to stream PC games -- but at an additional cost.
The software helps users move files from their Android, iOS, and Windows devices to an Intel-powered laptop running the Chrome OS.
"SynoLocker" malware infects through a vulnerability in older versions of their NAS software. The attack demands 0.6 BitCoins (about $350) to decrypt files.
A study by the Australian Communications and Media Authority (ACMA) showed there is a growing popularity among SMEs to use the cloud for emails, sharing files online, and accessing online software.
PowerPatent helps inventors and entrepreneurs organize the process of creating and filing a provisional patent application.
The Rename Manager is a program for renaming multiple files and folders at once. By configuring renaming methods the names can be manipulated...
Whether you're an artist, a software creator, a freelancer in the digital space, startup Instamojo's Web app simplifies the mechanics for buying and selling your files so you can focus on creating content.
ownCoud offers users greater control and allows organizations to integrate existing security, storage, monitoring and reporting tools with simplicity and flexibility.
This software offers a solution to users who want to create MPEG or AVI files from multiple FLV files. Simply drag and drop an entire...
The cloud-based agile software development company files for an initial public offering.
UK-based software company WANdisco has bought AltoStor for its big data expertise in a bid to break into the growing market.
Flaw in fingerprint reader software called "nothing but a big, glowing security hole." Vulnerability exposes all files, documents on PC.
As we create and carry around with us more and more digital detritus, is the maximum of 64GB of storage available on Windows RT tablets going to be enough once users start throwing software and files at it?
Virtual server environments can be very complex making it hard to know what is happening. Sumo Logic points out that the log files created by VMware's tools along with those created by other layers of software offer clues about performance and reliability issues.
Dubbed ACAD/Medre.A, malware targets AutoCAD software, steals and sends files to e-mail accounts located in China, says security vendor ESET, which is working with Chinese firms to prevent further harvesting of data.
Clouds based on open-source OpenStack software may not be as good at ingesting large amounts of data as those from Microsoft or Amazon, a study has found.The study evaluated Amazon Web Services, Windows Azure and Rackspace Cloud Files, and was released by cloud storage specialist Nasuni on Wednesday.
Antivirus vendor AVG files for IPO, offering shares sold by the company and shareholders, as it looks to cash in on demand for security software stocks, says report.
Microsoft has contributed source code under the GPLv3 to Samba, the file server software that enables Linux servers to share files with Windows PCs. No, I'm not making this up.
Adobe has put out a version of its PDF reader software for Apple's iOS, addressing devices including the iPad, iPhone and iPod Touch.The free and fully-featured Adobe Reader hit iTunes on Monday, allowing users to read PDF portfolios and password-protected PDF files.
While the Music app on smaller iOS devices may be acceptable, users of the new player software on the iPad say it's more than several big steps backward, especially when listening to large files such as audiobooks.
Social engineering has become the dominant method of distribution for fake antivirus software these days. Google Chrome puts you at risk: in my testing, malware broke through Chrome's defenses in four clicks. Internet Explorer 9 flags the exact same sites and files as suspicious. What's really going on?
Malicious hackers are using rigged Microsoft Excel files to exploit a zero-day flaw in Adobe's ubiquitous Flash Player software.