Google will teach the new Android language gestures

In the new version of the Android P operating system, Google integrated the management of gestures.

Google will teach the new Android language gestures

As reported by the media, the innovation is intended to replace the virtual button bar. Instead, there will be a thin translucent strip. A list of running programs will appear if you make a svayp up from it. At the same time, a virtual button will appear next to the strip.

It is also known, Android P will feature “Prevent a call.” It is activated by simultaneously pressing the lock button and increasing the volume.

News, Main, Incidents: In Astrakhan, a cloudy tornado was photographed

News, Main, Incidents: In Astrakhan, a cloudy tornado was photographedShare this

Residents of Astrakhan observed an interesting phenomenon – a tornado. Eyewitnesses immediately grabbed for smartphones and cameras and began to shoot this phenomenon on video.

The fact is that for this region a tornado is very rare phenomenon, in connection with which it began to be covered in the media.

However, nothing terrible in this phenomenon was not, but the hype it still raised. As eyewitnesses report, the tornado moved around the city and changed its shape, and its height was several tens of meters.

It is reported that the phenomenon observed by Astrakhans is a cloud tornado. It is worth noting that the whirlwind is most often observed on the territory of America.

Operative news, Ovesti.ru, news of politics, regions of Russia, news of economy, business news,

When registering an LLC, the applicant faces the need to notify state authorities on what will be …

5 errors when starting Windows 10, and what to do with them

5 errors when starting Windows 10, and what to do with them

This article contains the most common errors when you start Windows 10, and how to fix them. We hope this information will make life easier for those who switched to a new version of the system and suddenly found themselves between a hammer and an anvil.

1. Windows 10: “The computer is not running properly”

The first common problem when starting Windows 10 is that the system reports a certain critical error (CRITICAL_PROCESS_DIED, INACCESSIBLE_BOOT_DEVICE), and then displays the blue screen “Automatic Recovery” with the text “The computer is not running correctly”.

5 errors when starting Windows 10, and what to do with them

Automatic recovery: the computer is not running correctly

The reason for this error, in most cases, is the corruption and deletion of system files or entries in the registry. This can be caused by installing and uninstalling programs, or by using antivirus or utilities to clean the Windows registry.

The solution is to restore the files and registry entries that are corrupted:

  1. Click on the button Extra options on the blue screen, select Troubleshooting > Extra options > Boot Options.
  2. Click Reload.
  3. In the window Boot Options press the F6 key or the number 6 on the numeric keypad to start safe mode with command line support.
  4. The computer will reboot in safe mode, and the command line will automatically open. In it, enter:

sfc / scannow

dism / Online / Cleanup-Image / RestoreHealth

shutdown -r

The computer will restart and after that the Windows startup will be performed in normal mode.

2. Windows 10 does not load beyond the logo

Another known problem is that the system boots up to the Windows logo, after which the computer spontaneously shuts down. The cause of this error is also the damage to the system files, however, unlike the first case, the damage is so serious that the system can not start the recovery itself.

In this case, you will have to create an emergency Windows recovery disk on another PC with Windows 10:

  1. In the Windows 10 Control Panel, locate and select Recovery > Creating a Recovery Disk.
  2. In the displayed window, set the parameter Back up system files to the recovery disk and press DNext.
  3. Connect an empty USB drive to the computer. Select it in the recovery disk creation window and click Further > Create. Wait until the file is copied and press Done.
  4. Remove the USB drive from the computer, connect it to the one on which Windows 10 does not start, and enable the download from it in the BIOS.
  5. The Windows Recovery Environment starts. In it you need to choose Restore the system image, or item Command line, and then enter in it the commands from the instruction to solve the first problem.

5 errors when starting Windows 10, and what to do with themWindows Recovery Environment

You can also start the system recovery environment from the disk from which you installed Windows. To do this, you must boot from the installation disk, in the bootloader instead of Install press System Restore. In the menu that appears, select Troubleshooting > Extra options. The same options window as above will be displayed.

After recovery, the computer will be rebooted. Boot to the BIOS from the hard drive, and the system should start correctly.

3. Errors of “Boot Failure” and “An operating system wasn‘T found’

In some cases, when you start Windows 10, instead of loading the operating system, a black screen appears with one of two errors:

  1. Boot failure. Reboot and Select Proper Boot device or insert boot media in selected boot device.
  2. An operating system wasn‘T found. Try disconnecting any drives that do not contain an operating system. Press Ctrl + Alt + Del to restart.

The reasons for this error can also be two:

  1. Invalid boot device order in BIOS or UEFI. Verify that you are booting from the same drive on which Windows 10 is installed.
  2. Damage to the system loader. In this case, you will also need an installation disk or a recovery disk for Windows 10. After booting from it, in the recovery environment, you need to select the item Acronis Startup Recovery Manager and let the bootloader files be overwritten.

Also, the problem may be hardware damage to the hard drive from which the download is made.

5 errors when starting Windows 10, and what to do with them

Boot Failure Error

4. Windows 10 does not start: black screen

A common error when starting Windows 10 is a black screen with no signs of loading the desktop, with or without a cursor on the screen. This often happens as a result of incorrect installation of any drivers: after reboot the computer works, but the OS does not boot.

5 errors when starting Windows 10, and what to do with them

Windows 10: black screen

In most cases, the solution to the problem lies in the system rollback. This will also require an installation disk or a Windows 10 disaster recovery disk. After booting from it, you can try to select the item in the recovery environment System Restore.

This will allow the system to roll back to the state before the problem occurs. The system prompts you to select the recovery point to which the rollback will be made, and after the confirmation will execute it. As a rule, after a restart, the black screen disappears.

5 errors when starting Windows 10, and what to do with themWindows 10: System Restore

5. Long boot Windows 10 at power on

There is a situation when Windows 10 does not load, the waiting icon is spinning, and that’s it. In fact, most likely, nothing bad happens – the system simply installs the updates that it downloaded when you last used your computer.

5 errors when starting Windows 10, and what to do with themWindows 10 takes a long time to load

In this situation, it’s best to just wait. A similar state can last several hours depending on the number and volume of downloaded updates. It is recommended not to disconnect the computer, but leave it in the boot state for 1-2 hours.

To prevent this error from starting Windows 10 again, you can configure the computer to update on a schedule, and the system will not download updates without your knowledge. For information on how to edit update policies, see our instructions for setting the Windows 10 activity period.

Read also:

Photo: copyright, Windows Clan

Microsoft and Xiaomi will work together to create “smart” electronics

Xiaomi, which only a few years ago heard only the most zealous fans of Chinese electronics, today joined Microsoft for the joint development of artificial intelligence and machine learning technologies. This is reported by The Verge referring to the memorandum of cooperation signed by the parties.

According to the content of the document, both IT-giants decided to join forces for more effective development of artificial intelligence and neural networks and further production of hardware products using the obtained developments. In the long term, the parties are counting on the joint release of smartphones, smart speakers and other electronics with the support of the Cortana assistant.

In addition, as part of the signed agreement, Xiaomi gets unlimited access to the Microsoft Azure cloud platform, while Microsoft with Xiaomi more solidly strengthens its position on the Chinese market. First of all, the Redmond Corporation expects to start promoting branded services like Skype, Bing and the new Edge Web browser in the country.

Discuss the prospects for joint cooperation between Xiaomi and Microsoft in the official Telegram-chat AndroidInsider.ru.

Microsoft and Xiaomi will work together to create "smart" electronics

Chatterbox – a find for WikiLeaks: The FBI revealed an informant in the ranks of the CIA

Chatterbox - a find for WikiLeaks: The FBI revealed an informant in the ranks of the CIA

The US government suspects a former CIA employee in the transfer of top secret hacker software WikiLeaks.

Suspect was Joshua Adam Schulte, who worked in the engineering group of the CIA. It is assumed that in 2017 he gave WikiLeaks a series of secret documents "Vault 7" on the implementation of hacker attacks and e-surveillance agency, reports "Interfax"

The FBI searched the suspect’s apartment and confiscated his computers and personal records. However, the evidence was not enough to present Schulte’s accusations in an official manner. Now he is in the federal prison of Manhattan, but on another charge – in the storage and distribution of child pornography.

According to experts, data leakage in WikiLeaks was "one of the most destructive in modern history and included hacker tools that can be used against private companies".

The WikiLeaks resource is known for publishing classified information from anonymous sources or with its leaks. The organization published leaks of confidential documents of the CIA, correspondence from the election headquarters of French President Emmanuel Macron and US presidential candidate Hillary Clinton, as well as secret documents relating to the investigation of the Federal Intelligence Service of Germany.

WikiLeaks published its first document in December 2006. In October 2010, the organization, in cooperation with major publications, issued nearly 400,000 documents under the title "Iraqi dossier". In April 2011, WikiLeaks published about 800 secret files relating to prisoners detained in a detention center at Guantanamo. In 2012, WikiLeaks began publishing more than five million e-mails about the methods of work of one of the leaders in the field of private intelligence, Texas-based company Stratfor.

In 2017, WikiLeaks, based on data leaks by US intelligence agencies, reported that the CIA was developing malicious programs that allow people to follow their mobile phones, as well as technologies that can access smartphones around the world. They allow you to read audio and e-mail, including in popular instant messengers. In addition, the CIA and British counterespionage found a way to use multi-function TVs as a listening device.

Schulte is not the only functionary admitted to secret information, which was passed on to WikiLeaks. The other was Bradley Manning (now Chelsea, since he changed the floor): in 2013 he was sentenced to 35 years in prison for passing WikiLeaks secret documents. Another possible informant was Seth Rich, a member of the US Democratic Committee. In 2016, he was killed under mysterious circumstances.

In 2017, WikiLeaks, based on data leaks by US intelligence agencies, reported that the CIA was developing malicious programs that allow people to follow their mobile phones, as well as technologies that can access smartphones around the world. They allow you to read audio and e-mail, including in popular instant messengers. In addition, the CIA and British counterintelligence have found a way to use multi-function as a listening device.

Modern smartphones for the visually impaired can appear in the suburbs

Modern smartphones for the visually impaired can appear in the suburbs

RIAMO – May 11th. In the suburbs they can buy modern telephones for visually impaired people so they can not only call, but also use useful applications, said on Friday during a press conference at RIAMO, the human rights commissioner in the Moscow region Ekaterina Semenova.

“We recently talked about telephones for the visually impaired. They have been bought for a long time and now they do not meet modern conditions and it was expressed to buy a more modern device that would enable not only to simply turn on and make a call, but also to download an application in which disabled people could know where and what to buy “, – said Semenova.

She noted that this phone should also have applications for visual communication, for example, through FaceTime and Skype.

On the web appeared video comparison Leagoo S9 and iPhone X

The web appeared a small video, where they compared smartphones Leagoo S9 and iPhone X. Chinese smartphone is considered to be a copy of the iPhone of the latest model.

On the web appeared video comparison Leagoo S9 and iPhone X

In a short video, users were given the opportunity to compare two devices, similar in design. The bulk of people are familiar with the characteristics of the novelty of the Cupertino. What is one of the cheapest copies of the iPhone X, you can find out on the video.

A distinctive feature of the Chinese smartphone is the presence of a cutout at a low cost device. It contains a camera that works on the technology of Face Access, which allows the owner of the phone to unlock it in less than 0.1 seconds. Also Leagoo S9 is equipped with 5.85 inch display with a ratio of 19: 9. Many users call the device from China an iPhone android.

It is worth noting that Leagoo S9 is 10 times smaller than the iPhone of the latest model. Its market value is approximately 150 US dollars.

Author: Boni Dinara

What is incognito mode and how to enable it in different browsers

Everything that you do on the Internet can be used against you!

Often we do not even guess how much confidential information we trust the browser. And after all, behind his friendly face lies the espionage essence. He could give us up with the guts to anyone who has access to a computer, if no means …

This is an incognito mode that causes the web browser to “forget” the user’s network actions – do not save the history of visited sites, do not remember the entered data, do not display the names of the downloaded files. We’ll talk about how to enable incognito mode in the browser, when it will be useful to you, and in which cases it will not.

  • How to enable incognito mode in popular browsers

What can and can not be incognito

Incognito mode or private web browsing will keep your actions secret from people who have access to a computer other than you, for example, from family members or co-workers. Always use it to visit sites with authorization, if you visit them not from your personal PC, but on a visit or in a public place. So you avoid the leak of entered logins and passwords in the wrong hands.

In addition, when viewing privately:

  • disables third-party plug-ins and browser extensions that may interfere with the display of content on certain sites;
  • Do not collect data about your interests for displaying targeted advertising that can give out to other users what you want to hide;
  • the autodetection of visitors to the resource ceases to work, which will give you the opportunity to authorize on one website under different accounts (in normal mode – under one, in private – under another);
  • the counters of the user’s actions are not saved, that is, by closing and re-opening the private window, you can re-participate in the voting, put a few likes, instead of one, and so on.

However, note that incognito does not replace your IP address and does not provide anonymity on the Internet. With its help, you will not get to blocked web resources and do not secure confidential data during transmission over the network. In addition, created bookmarks and files that you downloaded in a private browser window, remain on your hard drive. If you do not take care of their concealment, they will be available to everyone who uses the computer with you.

How to enable incognito mode in popular browsers

Google Chrome

The privacy function (“New incognito window“) In the Google Chrome web browser is located in the main menu, which is opened by clicking on the” Settings and Management “button in the upper right corner. Or by pressing Shift +Control+N.

What is incognito mode and how to enable it in different browsers

The private window (reduced in the screenshot) has a characteristic dark background with “spyware” attributes:

Yandex browser

To open the private browsing window in the Yandex browser, click the “Yandex.Browser Settings” button in the form of three bars on the top panel. The necessary menu item is called – “Incognito mode“. In addition, it is opened by pressing the keys Shift +Control+N, as in Google Chrome.

The form of the private window also differs from the usual characteristic design:

Mozilla Firefox

The transition to incognito in Firefox is also done through the main menu, the button of which, like most web browsers, is on the upper right. The menu item is called “New private window“. Keyboard combination – Shift +Control+P (Latin).

The reduced private window of the “fiery fox” looks like this:

In it, among other things, there is a slider for disabling the trackers of websites that collect information about the actions of users on the network.

Opera

The peculiarity of the transition to privat in the Opera browser is only that its main menu opens not with the right, but with the left side. The required item is called “Create private window“. It also creates a combination of keys Shift +Control+N – as in Chrome and Yandex browsers.

What is incognito mode and how to enable it in different browsers

The smaller window looks like this:

For those who need even more privacy, the browser suggests using the built-in VPN service in combination with incognito.

Internet Explorer

The privacy mode in Internet Explorer is opened via the menu “Security“. The required item is named “Look inside InPrivate“. In addition, it opens the keyboard shortcut Shift +Control+P, as in Firefox.

What is incognito mode and how to enable it in different browsers

The InPrivate window looks like this:

What is incognito mode and how to enable it in different browsers

EDGE

In the EDGE browser, private mode is also called InPrivate. The transition to it, as you probably guessed, hides in the main menu.

What is incognito mode and how to enable it in different browsers

The form of the InPrivate window is almost the same as usual:

Safari

In the desktop version of the Safari web browser, the incognito mode is called private access. The private access window in Mac OS X opens from the menu “File“.

What is incognito mode and how to enable it in different browsers

The form of the private window differs from the usual blacked out address bar.

To exit incognito in any web browser, just close the private viewing window.

The site for the sale of diplomas was closed in Astrakhan

Thank you, the announcement is hidden.

The prosecutor’s office of the Ikryaninsky district monitored the Internet network and found the sale of diplomas on one of the sites, MK-Astrakhan informs.

On the resource was organized in free access the sale of diplomas and certificates of education. To get such a “lime” diploma, there was no need to go through the learning process.

Did the owners of the site know that for the production and acquisition of fictitious documents, both administrative and criminal liability are provided for?

Ikryaninsky district court recognized the information posted on the website, banned for distribution in the Russian Federation.

Currently, the site is blocked, the press service of the department

Read the latest news for today, May 16, and analytical materials of Free Press on social networks: Facebook, Twitter, VKontakte, Classmates, The world is small, and also Telegram.

User iCloud accused Apple of deception

User iCloud accused Apple of deceptionUser iCloud accused Apple  in deception

wikipedia.org/Mobius

Washington, May 13. The user iCloud accused the American corporation of Apple of deceit, because of which he lost important data.

The iCloud user has purchased a paid subscription for data storage, but since the time of the folder that he has not used for a long time, they were empty.

Citizen asked Apple technical support and explained the situation. However, representatives of the corporation said that it is impossible to restore the lost data. In addition, they do not intend to compensate for the loss of information on iCloud.

User iCloud accused Apple of deceptionUser iCloud accused Apple  in deception

The victim said that the paid expansion of the cloud storage assumes the guarantee of data retention. He accused Apple of deceit, the foreign media reported.

User iCloud accused Apple of deception