Display: MacBook does not generate native resolution on monitor with a security device, but works with a different security device, even though the EDID outputs are exactly the same

I've gone crazy trying to figure this out, any help would be greatly appreciated.

Basically I have this 3440×1440 monitor and I bought that 8-in-1 usb-c hub to try and clean up my setup a bit. This is what I am experiencing.

  • With the Uni 8 in 1 hub (tested with power on and off):
    • My Macbook has a resolution of 2540×1440. Even with the option to click on system preferences, that's the highest resolution you get, when it should be 3440×1440.
    • A second laptop that I have to run Ubuntu works fine with this hub and the same cables. That is, it comes out correctly at 3440×1440
  • With apple usb-c adapter
    • Both laptops work well. The same HDMI cable used for this adapter and with the usb-c hub.

What I tried:

  • Comparing the EDID files on my Macbook with the Apple dongle and the USB-C hub. They were exactly the same
  • Reset NVRAM etc.
  • When trying EasyRes and SwitchResX4, neither had the proper 3440×1440 resolution.

Does anyone have any ideas for 3440×1440 to work with usb-c hub? If EDID files are exactly the same, shouldn't they work correctly? I would greatly appreciate any help!

Also another tidbit: IIRC worked a few times with the USB-C hub and my Macbook at 3440×1440, but once I plugged it in and my macbook made a loud screeching noise, and I think it may have changed to 2540×1440 after that. However, they could be wrong things

Security: What causes the delay when using applications in Windows Server 2016?

In our organization, we are using a Windows Server 2016 Datacenter as Azure VM. The server works fine but currently we face the following problems:

  • Each time applications on that server initially try to open a network connection (for example, to obtain a license from a license server) it takes around 20 seconds until the connection is established.
  • Each time applications on that server initially try to modify the contents of a database, it takes around 20 seconds until those changes have been written to the database.
  • Since the delay is so long, it often causes our tools to crash.
  • Also, it takes a long time for the installers to run after double-clicking on them.

At this time, the status is as follows:

  • Ordinary applications (Word, Excel, etc.) that do not open network or database connections work without delay
  • According to the machine settings, Antivirus, Windows Firewall and Windows Defender should be disabled (but I'm not sure if they really don't interfere in any way …)

We wondered if Microsoft Windows Security Audit (Windows Filtering Platform) could cause this problem.

Any suggestion would be highly appreciated.

Apache + JavaScript security cookie for a certain file

I have an Apache server with many WordPress installations, and I want to secure wp-login.php with a simple JavaScript cookie solution. I saw such … | Read the rest of https://www.webhostingtalk.com/showthread.php?t=1802982&goto=newpost

Security – How can I encrypt the Firefox db cookie?

As far as I know Firefox saves cookies in the local database, I suppose it is SQlite. Is there a way to encrypt it with a master password, like autocomplete data? It seems to be an important security feature for me (I can encrypt my passwords, but it is useless if an attacker can get my cookies and just use them). I've seen answers like this one that suggest logging out / not using the "Remember Me" feature, but these days it's pretty difficult since some form of 2FA is basically anywhere.

security: my wordpress website is suspended

I received a message from the host saying that the website was suspended due to security issues.

They named many files as malwares, I have removed all these files.

I noticed that there are a lot of random file names hidden in the main root of my website. They are all PHP files.

Now the host is not responding, I want to restore my website as fast as I can, what should I do?

security: can you check somehow a & # 39; marketing & # 39; ad Bitcoin & # 39; free & # 39 ;?

Total Bitcoin rookie here. I have no bitc, no wallet, and I'm not sure I want one. I've been intrigued for a while, but security is a great passion of mine …

Today, right now, YouTube brought me an interesting lecture by Bill Gates and others. (1) Apparently it was in the SF, CA exploratory in the & # 39; morning & # 39 ;, but that would not fit the current time zone if it is live. (That part just appeared at the end of the Bill Gates section a few minutes ago.)

This video is supposedly from Microsoft Europe, but the author only has this video.

There was a great image on the screen as Mr. Gates spoke at the "Village Global" event. You published free bitcoins if you send bitcoins for example they will send you 10 times more than you send 0.1-20 bitcoins.

The address for "Microsoft administrator" in the chat is: 1w1AQvpK4ixo9YQ3KHFYi4BgKHuDqg1hR

Online I searched for that (2) and found this:

Total Sent
0.00000000 BTC

I think that indicates that the ad is definitely a scam.
Did I understand correctly???

Are there other ways to check for scammers I don't know about?
Thank you!

(1) Bill Gates on Microsoft Future, Quantum Power, Bitcoin Evolution – YouTube: https://www.youtube.com/watch?v=oKzuP-Pljpw

(2) Blockchain Explorer – Search Blockchain | BTC | ETH | BCH: https://www.blockchain.com/btc/address/1w1AQvpK4ixo9YQ3KHFYi4BgKHuDqg1hR

Security: Can I lose my Bitcoin.com wallet if the company and website database are destroyed?

I am planning to convert a part of my fiat currencies to BTC. I see that the web wallet is a good balance between ease of use and security, since it prevents the breakage of a device, physical theft, etc.

However, I still have a question that website support couldn't clearly answer: what if the website and partner company are completely destroyed (bankrupt, whatever …)?

Will my 12 word passphrase still be useful for retrieving my BTC in another web wallet?

Thank you

Computer Architecture: Can anyone at Cyber ​​Security or IT help answer this basic question about changing malware today?

1.] Before, the most common types of malware were generally Trojans and various other types of viruses derived from your own email on a desktop. Given the time interval since those days, the game has changed. Today, the ways of violating a user's data have changed dramatically. What are the most frequent methods that an average person should know today?

Network: Does TLS (Transport Layer Security) protect against deliberate tampering or accidental corruption?

Stack Exchange Network

The Stack Exchange network consists of 175 question and answer communities, including Stack Overflow, the largest and most trusted online community for developers to learn, share their insights, and develop their careers.

Visit Stack Exchange

Programming Languages: Can someone in Computing, Cyber ​​Security, or IT help you answer these frequently asked questions about the changing field of online security?

I am composing an essay in English on the discord communities of computing and security and I wanted some honest and legitimate answers on the following topics. Don't be afraid to speak openly in the vernacular or lexicon of your field, these are quite open questions and the more detailed you are with your own experience and work, the better the content for this essay. Thank you!

1.] Before, the most common types of malware were generally Trojans and various other types of viruses derived from your own email on a desktop. Given the time interval since those days, the game has changed. Today, the ways of violating a user's data have changed dramatically. What are the most frequent methods that an average person should know today?

2.] Smartphones today are perhaps the most widespread and integrated mode of personal computers. In what main ways has cybersecurity changed with these devices? How are they easier to violate and how are they more difficult?

3.] Large-scale data breaches, such as notable examples with Sony and Marriott, have compromised confidential user data around the world. What are the risks that users run when registering their information online? How much trust can these data collecting organizations be given and what steps can a user take to protect themselves?

4.] Often, phishing attempts are successful in which a user gives their password and personal information to an attacker. When IT assistance is needed, how can you ensure a user is not working with an infamous attacker?

5.] Third-party software is an extremely common way to infect a user's device with malware. Since applications and software are downloaded by almost anyone on any device, how can a user know that the material they are downloading is safe? What are some checks a person can do on their devices to make sure they are free of malware?