Shortcut Keys | Description |
---|---|
Alt+Home | Open your homepage. |
Alt+Left Arrow | Back a page. |
Alt+Right Arrow | Forward a page. |
F11 | Display the current website in full-screen mode. Pressing F11 again will exit this mode. |
Esc | Stop page or download from loading. |
Ctrl+(- or +) | Zoom in or out of a page, "-" will zoom out and "+" will zoom in. |
Ctrl+1-8 | Pressing Ctrl and any number 1 through 8 will move to the corresponding tab in your tab bar. |
Ctrl+9 | Switch to last tab. |
Ctrl+0 | Reset browser zoom to default. |
Ctrl+Enter | This combination is used to quickly complete an address. For example, type "computerhope" in the address bar and press Ctrl+Enter to get |
Ctrl+Shift+Del | Open the Clear browsing data window to quickly clear private data. |
Ctrl+Shift+B | Toggle the bookmarks bar between hidden and shown. |
Ctrl+A | Select everything on a page. |
Ctrl+D | Add a bookmark for the page currently opened. |
Ctrl+F | Open the "find" bar to search text on the current page. |
Ctrl+O | Open a file in the browser. |
Ctrl+Shift+O | Open the Bookmark manager. |
Ctrl+H | Open browser history in a new tab. |
Ctrl+J | Display the downloads window. |
Ctrl+K or Ctrl+E | Moves your text cursor to the omnibox so that you can begin typing your search query and perform a Google search. |
Ctrl+L | Move the cursor to the browser address bar and highlight everything in it. |
Ctrl+N | Open New browser window. |
Ctrl+Shift+N | Open a new window in incognito (private) mode |
Ctrl+P | Print current page or frame |
Ctrl+R or F5 | Refresh the current page or frame. |
Ctrl+S | Opens the Save As window to save the current page. |
Ctrl+T | Opens a new tab |
Ctrl+U | View a web page's source code |
Ctrl+W | Closes the currently selected tab. |
Ctrl+Shift+W | Closes the currently selected window. |
Ctrl+Shift+T | This combination reopens the last tab you've closed. If you've closed multiple tabs you can press this shortcut key multiple times to restore each of the closed tabs. |
Ctrl+Tab | Moves through each of the open tabs going to the right. |
Ctrl+Shift+Tab | Moves through each of the open tabs going to the left. |
Ctrl+Left-click | Open a link in a new tab in the background. |
Ctrl+Shift Left-click | Open a link in a new tab and switch to the new tab. |
Ctrl+Page Down | Open the browser tab to the right. |
Ctrl+Page Up | Open the browser tab to the left. |
Spacebar | Moves down a page at a time. |
Shift+Spacebar | Moves up a page at a time. |
Home | Go to top of page. |
End | Go to bottom of page. |
Alt+Down Arrow | Display all previous text entered in a text box and available options on a drop-down menu. |
Google Chrome shortcut keys
Shortcut Keys | Description |
---|---|
Alt+F | File menu options in current program. |
Alt+E | Edit options in current program. |
Alt+Tab | Switch between open programs. |
F1 | View help information (F1 is used by almost every Windows program to display help). |
F2 | Rename a selected file. |
F5 | Refresh the current program window. |
Ctrl+N | Create a new or blank document in some software, or open a new tab in most Internet browsers. |
Ctrl+O | Open a file in the current software. |
Ctrl+A | Select all text. |
Ctrl+B | Change selected text to be bold. |
Ctrl+I | Change selected text to be in italics. |
Ctrl+U | Change selected text to be underlined. |
Ctrl+F | Open find window for current document or window. |
Ctrl+S | Save current document file. |
Ctrl+X | Cut selected item. |
Shift+Del | Cut selected item. |
Ctrl+C | Copy selected item. |
Ctrl+Ins | Copy selected item |
Ctrl+V | Paste |
Shift+Ins | Paste |
Ctrl+Y | Redo last action. |
Ctrl+Z | Undo last action. |
Ctrl+K | Insert hyperlink for selected text. |
Ctrl+P | Print the current page or document. |
Home | Goes to beginning of current line. |
Ctrl+Home | Goes to beginning of document. |
End | Goes to end of current line. |
Ctrl+End | Goes to end of document. |
Shift+Home | Highlights from current position to beginning of line. |
Shift+End | Highlights from current position to end of line. |
Ctrl+Left arrow | Moves one word to the left at a time. |
Ctrl+Right arrow | Moves one word to the right at a time. |
Ctrl+Esc | Opens the Start menu. |
Ctrl+Shift+Esc | Opens Windows Task Manager. |
Alt+F4 | Close the currently active program. |
Alt+Enter | Open the properties for the selected item (file, folder, shortcut, etc.). |
PC shortcut keys for Special Characters
Many special characters can be created using keyboard shortcuts. Below are some of the more common and popular special characters and the keyboard shortcuts to create them.
Shortcut Keys | Special Character |
---|---|
Alt+0224 | Ã |
Alt+0232 | è |
Alt+0236 | ì |
Alt+0242 | ò |
Alt+0241 | ñ |
Alt+0228 | ä |
Alt+0246 | ö |
Alt+0252 | ü |
Alt+0248 | ø |
Alt+0223 | ß |
Alt+0198 | Æ |
Alt+0231 | ç |
Alt+0191 | ¿ |
Alt+0176 | ° (degree symbol) |
Alt+0177 | ± (plus/minus symbol) |
Alt+0153 | ™ |
Alt+0169 | © |
Alt+0174 | ® |
Alt+0128 | € (Euro currency) |
Alt+0162 | ¢ (Cent symbol) |
Alt+0163 | £ (British Pound currency) |
Alt+0165 | ¥ (Japanese Yen currency) |
Computer keyboard shortcut keys
Posted by : Admin
The US government has temporarily eased trade restrictions imposed last week on China's Huawei, a move aimed at minimising disruption for its customers but dismissed by its founder who said the tech firm had prepared for US action.
The US Commerce Department will allow Huawei Technologies Co Ltd to purchase American-made goods in order to maintain existing networks and provide software updates to existing Huawei handsets.
The world's largest telecommunications equipment maker is still prohibited from buying American parts and components to manufacture new products without license approvals that likely will be denied.
The US government said it imposed the restrictions because of Huawei's involvement in activities contrary to national security or foreign policy interests.
The new authorisation is intended to give telecommunications operators that rely on Huawei equipment time to make other arrangements, US Secretary of Commerce Wilbur Ross said in a statement on Monday.
"In short, this license will allow operations to continue for existing Huawei mobile phone users and rural broadband networks," Ross added.
The license, which is in effect until Aug 19, suggests changes to Huawei's supply chain may have immediate, far-reaching and unintended consequences for its customers.
"The goal seems to be to prevent internet, computer and cell phone systems from crashing," said Washington lawyer Kevin Wolf, a former Commerce Department official. "This is not a capitulation. This is housekeeping."
Huawei founder Ren Zhengfei on Tuesday said the temporary reprieve move bore little meaning for the company as it had been making preparations for such a scenario.
"The US government's actions at the moment underestimate our capabilities," Ren said in an interview with CCTV, according to a transcript published by the Chinese state broadcaster.
He said Huawei was at odds with the US government, not US firms, and that Huawei is capable of making the chips it buys from the United States though that does not mean it will stop buying American chips.
The US Commerce Department said it will evaluate whether to extend the exemptions beyond 90 days.
On Thursday, the Commerce Department added Huawei and 68 entities to an export blacklist that makes it nearly impossible for the Chinese company to purchase goods made in the United States.
The government tied Huawei's addition to the "entity list" to a pending case accusing the company of engaging in bank fraud to obtain embargoed US goods and services in Iran and move money out of the country via the international banking system. Huawei has pleaded not guilty.
Reuters reported Friday that the department was considering a temporary easing, citing a government spokeswoman.
The temporary license also allows disclosures of security vulnerabilities and for Huawei to engage in the development of standards for future 5G networks.
Reuters reported Sunday that Alphabet Inc's Google suspended business with Huawei that requires the transfer of hardware, software and technical services except those publicly available via open source licensing, citing a source familiar with the matter.
Google did not immediately respond to a request for comment on the new authorisation.
Out of $70 billion Huawei spent buying components in 2018, some $11 billion went to US firms including Qualcomm Inc, Intel Corp and Micron Technology Inc.
"I think this is a reality check," said Washington trade lawyer Douglas Jacobson. "It shows how pervasive Huawei goods and technology are around the globe and if the US imposes restrictions, that has impacts."
Jacobson said the effort to keep existing networks operating appeared aimed at telecom providers in Europe and other countries where Huawei equipment is pervasive.
The move also could assist mobile service providers in thinly populated areas of the United States, such as Wyoming and eastern Oregon, that purchased network equipment from Huawei in recent years.
John Neuffer, the president of the Semiconductor Industry Association, which represents US chipmakers and designers, said in a statement that the association wants the government to ease the restrictions further.
"We hope to work with the administration to broaden the scope of the license," he said, so that it advances US security goals but does not undermine the industry's ability to compete globally and remain technology leaders.
A report on Monday on the potential impact of stringent export controls on technologies found that US firms could lose up to $56.3 billion in export sales over five years.
The report, from the Information Technology & Innovation Foundation, said the missed opportunities threatened as many as 74,000 jobs.
Wolf, the former Commerce official, said the Huawei reprieve was similar to action taken by the department in July to prevent systems from crashing after the US banned China's ZTE Corp , a smaller Huawei rival, from buying American-made components.
The US trade ban on ZTE wreaked havoc at wireless carriers in Europe and South Asia, sources told Reuters at the time.
The ban on ZTE was lifted July 13 after the company struck an agreement with the Commerce Department that included a $1 billion fine plus $400 million in escrow and replacement of its board of directors and senior management. ZTE, which had ceased major operations as a result of the ban, then resumed business.
US eases restrictions on Huawei, founder says US underestimates Chinese firm
Posted by : Admin
For nearly three weeks, Baltimore has struggled with a cyberattack by digital extortionists that has frozen thousands of computers, shut down email and disrupted real estate sales, water bills, health alerts and many other services.
But here is what frustrated city employees and residents do not know: A key component of the malware that cybercriminals used in the attack was developed at taxpayer expense a short drive down the Baltimore-Washington Parkway at the National Security Agency, according to security experts briefed on the case.
Since 2017, when the NSA lost control of the tool, EternalBlue, it has been picked up by state hackers in North Korea, Russia and, more recently, China, to cut a path of destruction around the world, leaving billions of dollars in damage. But over the past year, the cyberweapon has boomeranged back and is now showing up in the NSA’s own backyard.
It is not just in Baltimore. Security experts say EternalBlue attacks have reached a high, and cybercriminals are zeroing in on vulnerable American towns and cities, from Pennsylvania to Texas, paralysing local governments and driving up costs.
The NSA connection to the attacks on US cities has not been previously reported, in part because the agency has refused to discuss or even acknowledge the loss of its cyberweapon, dumped online in April 2017 by a still-unidentified group calling itself the Shadow Brokers. Years later, the agency and the FBI still do not know whether the Shadow Brokers are foreign spies or disgruntled insiders.
Thomas Rid, a cybersecurity expert at Johns Hopkins University, called the Shadow Brokers episode “the most destructive and costly NSA breach in history,” more damaging than the better-known leak in 2013 from Edward Snowden, the former NSA contractor.
“The government has refused to take responsibility, or even to answer the most basic questions,” Rid said. “Congressional oversight appears to be failing. The American people deserve an answer.”
The NSA and FBI declined to comment.
Since that leak, foreign intelligence agencies and rogue actors have used EternalBlue to spread malware that has paralysed hospitals, airports, rail and shipping operators, ATMs and factories that produce critical vaccines. Now the tool is hitting the United States where it is most vulnerable, in local governments with aging digital infrastructure and fewer resources to defend themselves.
Before it leaked, EternalBlue was one of the most useful exploits in the NSA’s cyberarsenal. According to three former NSA operators who spoke on the condition of anonymity, analysts spent almost a year finding a flaw in Microsoft’s software and writing the code to target it. Initially, they referred to it as EternalBluescreen because it often crashed computers — a risk that could tip off their targets. But it went on to become a reliable tool used in countless intelligence-gathering and counterterrorism missions.
EternalBlue was so valuable, former NSA employees said, that the agency never seriously considered alerting Microsoft about the vulnerabilities, and held on to it for more than five years before the breach forced its hand.
North Korea was the first nation to co-opt the tool, for an attack in 2017 — called WannaCry — that paralysed the British health care system, German railroads and some 200,000 organisations around the world. Next was Russia, which used the weapon in an attack — called NotPetya — that was aimed at Ukraine but spread across major companies doing business in the country. The assault cost FedEx more than $400 million and Merck, the pharmaceutical giant, $670 million.
The damage didn’t stop there. In the past year, the same Russian hackers who targeted the 2016 US presidential election used EternalBlue to compromise hotel Wi-Fi networks. Iranian hackers have used it to spread ransomware and hack airlines in the Middle East, according to researchers at the security firms Symantec and FireEye.
“It’s incredible that a tool which was used by intelligence services is now publicly available and so widely used,” said Vikram Thakur, Symantec’s director of security response.
One month before the Shadow Brokers began dumping the agency’s tools online in 2017, the NSA — aware of the breach — reached out to Microsoft and other tech companies to inform them of their software flaws. Microsoft released a patch, but hundreds of thousands of computers worldwide remain unprotected.
Hackers seem to have found a sweet spot in Baltimore, Allentown, Pennsylvania, San Antonio and other local US governments, where public employees oversee tangled networks that often use out-of-date software. In July, the Department of Homeland Security issued a dire warning that state and local governments were getting hit by particularly destructive malware that now, security researchers say, has started relying on EternalBlue to spread.
The costs can be hard for local governments to bear. The Allentown attack, in February 2018, disrupted city services for weeks and cost about $1 million to remedy — plus another $420,000 a year for new defences, said Matthew Leibert, the city’s chief information officer.
He described the package of dangerous computer code that hit Allentown as “commodity malware,” sold on the dark web and used by criminals who don’t have specific targets in mind. “There are warehouses of kids overseas firing off phishing emails,” Leibert said, like thugs shooting military-grade weapons at random targets.
The malware that hit San Antonio in September infected a computer inside Bexar County Sheriff Office and tried to spread across the network using EternalBlue, according to two people briefed on the attack.
This past week, researchers at the security firm Palo Alto Networks discovered that a Chinese state group, Emissary Panda, had hacked into Middle Eastern governments using EternalBlue.
“You can’t hope that once the initial wave of attacks is over, it will go away,” said Jen Miller-Osborn, deputy director of threat intelligence at Palo Alto Networks. “We expect EternalBlue will be used almost forever, because if attackers find a system that isn’t patched, it is so useful.”
© 2019 New York Times News Service
Cities hijacked by tool stolen from the NSA
Posted by : Admin
Following a huge attack on one of the most popular messaging services, users are being advised to react.
News of the WhatsApp attack echoed around the world when it broke on Tuesday May 14.
It is understood that hackers found a “major vulnerability” on the messaging app. They were then able to remotely install surveillance software. This was done on phones and other devices.
WhatsApp has reportedly confirmed that “a select number” of users were targeted. The company, owned by Facebook, is also understood to believe the attack was conducted by “an advanced cyber-actor”.
Moreover, the Financial Times, along with others, is reporting that NSO Group, an Israeli firm, developed the surveillance software involved. It is thought that Journalists, lawyers, activists and human rights defenders were the most likely to be targeted.
According to the BBC a solution was rolled out on Friday May 10 . The following Monday all of WhatsApp’s 1.5 billion users were urged to update their apps.
This was largely thought to just be a precaution. Nevertheless, in this article we will explain just how you can make sure you have the right version and achieve complete peace of mind.
After all, WhatsApp is one of the leading messaging apps for a reason. We, like most media outlets, believe that there is absolutely no reason to ditch it now.
WhatsApp messages are end-to-end encrypted. This means that the sender or receiver’s devices should be the only place messages can be displayed in a legible form.
That’s why WhatsApp prides itself as being a “secure” communications tool. But unfortunately, as we have just seen, no app is safe from hackers in this day and age.
How can Android and iOS users update app after WhatsApp attack?
Don’t worry, this is really simple to do.
iOS
- Launch your App Store.
- Go to Updates (at the bottom of the screen).
- If recently updated it will appear with a button that says ‘Open’.
- If it hasn’t been updated, the button will say Update – hit that!
Android
- Go to your Play store.
- Tap the menu (at the top left of the screen).
- Then go to My Apps & Games.
- Same as iOS, if it has updated it will say Open.
- If it hasn’t, hit the button that says Update to run the install.
Final Thoughts
Don’t expect this to be the last WhatsApp attack article that we post. This story is still rumbling on and has posed so many questions for cybersecurity experts.
For further advice on keeping your devices secure, take a look at our packed library of products, reviews and advice features.
The Ultimate Antivirus Guide is a particular lifesaver if you’re not 100% clued up on cybersecurity.
WhatsApp attack!! What you need to know about the WhatsApp attack
Posted by : Admin
Product Description
With Bandicam screen recorder you can video record a certain area on a PC screen, or you can record a program which uses the DirectX/OpenGL graphic technologies.
Bandicam screen recorder works with a high compression ratio, whilst keeping the video quality close to the original and Bandicam provides performance far superior to other programs that provide similar functions.
Product details
- Bandicam game recorder can record DirectX/OpenGL programs, like Fraps.
- Because Bandicam compresses the file, the recorded file size is much smaller than the original.
- The recorded file can be uploaded to YouTube without any conversion in either 720p or 1080p full HD video.
- With the Auto Complete Recording function, you can record 24 hours of video.
- You can record high quality video at resolutions of up to 2560x1600.
Download Bandicam for Windows | Bandicam Screen Recorder 4.4.1.1539 Download
Posted by : Admin
Best WordPress hosting services 2020 in the table below. Logo Plan Price/ month Features Support View Full Review Basic $2.95/mo. 1...