Error message

  • Deprecated function: implode(): Passing glue string after array is deprecated. Swap the parameters in drupal_get_feeds() (line 394 of /home/cay45lq1/public_html/includes/common.inc).
  • Deprecated function: The each() function is deprecated. This message will be suppressed on further calls in menu_set_active_trail() (line 2405 of /home/cay45lq1/public_html/includes/menu.inc).

Feed aggregator

New forum topics

I tried the latest version of Zorin OS - here's what I thought of this Linux distro

TechRadar Reviews - Mon, 03/17/2025 - 04:06

This review first appeared in issue 354 of PC Pro.

Want a pretty OS? Look no further. Zorin comes as close as any operating system to rivalling Windows 11’s featherweight fluid design. We’re testing the free Zorin OS Core, but there are alternatives for older computers (Zorin OS Lite) and professional users (Zorin OS Pro).

Lite switches the highly customized Gnome 43 desktop environment for Xfce, while Pro, which costs £39 exc VAT, bundles installation support and additional software for image editing, 3D graphics, video editing, note taking and more. Pro can be installed on multiple computers with a single license, unless you’re a business or education user, in which case you’ll need a license for each machine.

Whichever version you choose, Zorin is based on Ubuntu, with the latest build running on the 6.2 kernel. Support runs until at least April 2027.

Linux Mint is often touted as the best Linux for Windows switchers, and certainly it takes very little time to become comfortable with its Cinnamon desktop. However, for our money, Zorin is better yet. The default UI has the taskbar and Start-style menu of both Windows and Mint, and the color scheme is immediately familiar. It’s supplemented by three other themes, with one adopting the traditional Gnome shell and another optimized for touch – and, if you upgrade to Zorin Pro, you get additional desktop styles, including more explicit Windows 11, macOS, Chromebook and Gnome 2 options.

You may be able to bring some of your Windows apps with you, with optional Windows App Support, which uses Wine and its graphical front end, PlayOnLinux. However, you can install these yourself on other distros (and Nitrix has it built in, in the form of Bottles), so they’re not a reason to choose Zorin in their own right – and Windows application support isn’t 100%, so don’t expect to be able to run everything you rely on today. That said, the one-click setup may well make this implementation a tempting one for less confident switchers.

The app store can use Zorin and Ubuntu repositories, Flathub and Snap Store (Image credit: Future)

Zorin introduced an upgrader with version 16.3, which was simultaneously rolled out to existing version 15 installations. This preserves your files, apps and settings when you make a full-point upgrade. Previously, such upgrades required a clean start and manual migration. It sits alongside a carefully curated selection of default software. LibreOffice 7.6.3 is preinstalled, but GIMP isn’t. The default browser is Firefox, and for email it’s Evolution. This is a good-looking alternative to Thunderbird, but with the latter receiving a significant brush-up in its 115 release, we’re inclined to switch, simply so we can run the same client on both Linux and Windows.

Both the Core and Pro builds include Zorin Connect, which maintains an encrypted local-network connection between your computer and an Android phone. You can sync notifications, share files, and control music and video playback across devices. You can also use it to turn your phone into a remote keyboard and mouse, or a controller for PC-based presentations. If you want the same features in an alternative distribution, check out KDE Connect (kdeconnect.kde.org).

You can download anything that’s not preinstalled from the integrated app store, which is set up to use Zorin and Ubuntu repositories, Flathub and Snap Store. This all makes for a friction-free environment for Linux newbies, and we were pleased to see that both printers on our network were recognized on first boot.

If you’re new to Linux and nervous about switching, then, Zorin could be just the distribution you’ve been searching for. It looks great, feels immediately familiar (even if you don’t pay for the Windows 11-style UI of Zorin Pro) and goes to significant lengths to simplify working with your mobile – so long as it’s running Android – and integrating (some) Windows applications. It feels like the best Linux distro for Windows switchers who want to quickly feel at home.

We also ranked the best privacy tool and anonymous browser.

Categories: Reviews

Wholesale egg prices are going down. How soon will it affect your grocery bill?

NPR News Headlines - Mon, 03/17/2025 - 04:00

Economists say the sharp decline in wholesale egg prices is a positive sign, with some anticipating lower prices at grocery stores in a few weeks.

(Image credit: Scott Olson)

Categories: News

How Alabama students went from last place to rising stars in math

NPR News Headlines - Mon, 03/17/2025 - 04:00

Alabama is the only state where 4th-grade math scores are higher now than they were in 2019, before the pandemic. This is the story of how the state pulled it off.

(Image credit: Charity Rachelle for NPR)

Categories: News

A Tesla protester targeted by Elon Musk speaks out: 'I have to protect myself.'

NPR News Headlines - Mon, 03/17/2025 - 04:00

"When one of the most powerful, if not the most powerful person in the world is saying you've committed a crime, it doesn't matter what the truth is," said Valerie Costa, an anti-Tesla protester.

(Image credit: Rodrique Ngowi)

Categories: News

Here are 4 ways parents can help their teens be smart with screen time

NPR News Headlines - Mon, 03/17/2025 - 04:00

With teens, it doesn't help to just say no to screen time. Instead, experts suggest teaching them to be smarter viewers of content, and learn to recognize how influencers and algorithms can manipulate them.

(Image credit: Daniel de la Hoz)

Categories: News

Why are the Israel-Hamas ceasefire talks stuck? An explainer on the latest

NPR News Headlines - Mon, 03/17/2025 - 04:00

Arab mediators are working to reach a new Israel-Hamas ceasefire deal that would secure the release of 12 living hostages out of the 24 still believed to be held alive by Hamas in Gaza.

(Image credit: Abdel Kareem Hana)

Categories: News

2 separate cases place the immigration lens on Boston

NPR News Headlines - Mon, 03/17/2025 - 04:00

Two legal immigrants who flew into Boston Logan International Airport have been denied re-entry into the United States after traveling abroad. One was deported in apparent defiance of a judicial order.

(Image credit: Joseph Prezioso)

Categories: News

I tried the WatchGuard Firebox - here's what I thought of this 5G appliance

TechRadar Reviews - Mon, 03/17/2025 - 03:50

This review first appeared in issue 354 of PC Pro.

WatchGuard’s family of Firebox security appliances offers an unbeatable range of desktop solutions, and the T45-CW brings 5G failover to the table. Ideal for businesses that need always-on internet access for remote sites, its multi-WAN features combine wired and 5G mobile connections in a single policy so if one goes down, the other seamlessly steps in and takes over.

The T45-CW’s quad-core 1.6GHz NXP CPU claims a high raw firewall throughput of 3.94Gbits/sec and 557Mbits/sec with all UTM services enabled. It has five gigabit ports for WAN, LAN plus DMZ duties and, unlike many table-top security appliances, it offers secure Wi-Fi 6 services.

The appliance delivers a wealth of security features, and it’s easy to choose the right subscription as WatchGuard offers two options. A Basic Security Suite subscription enables gateway antivirus, anti-spam, web filtering, HTTPS inspection, IPS, application controls, WatchGuard’s RED (reputation enabled defense) cloud-based URL filtering and network discovery.

The Firebox T45-CW has a wealth of security features (Image credit: Future)

We’ve shown the price for a three-year Total Security Suite subscription, which adds WatchGuard’s advanced persistent threat (APT) blocker with cloud sandboxing, DNSWatch for monitoring client DNS requests and blocking access to known malicious domains, IntelligentAV anti-malware services and ThreatSync XDR, which provides policy-based collection, correlation and automated responses for Firebox threat events.

Local management is simple. The web console runs a wizard to enable wired internet access, activate a basic security policy and create a wireless SSID. Our unit came with a Vodafone 5G SIM and, after enabling the internal modem, the SIM came online.

WatchGuard includes four SMA external aerials; LEDs on the front panel show the cellular signal strength, failover status and whether you have a 4G LTE or 5G connection. Configuring failover is a cinch: you use the multi-WAN feature to define primary and backup connections and decide how failback is handled.

In practice, it works perfectly. We set up a continuous ping to an external website and then pulled the wired internet cable. We saw a single ping timeout, after which it continued unabated, and when we plugged the WAN cable in again, the appliance swapped back to it without any ping timeouts being recorded.

Naturally, you can use 5G as your primary connection, and defining the modem as an external interface means all your security policies will be automatically applied to it. In fact, you can have both wired and 5G internet connections active and use multi-WAN round-robin weightings to determine how connections are distributed across them.

It can be managed locally or from the cloud (Image credit: Future)

For cloud management, we registered the appliance with our support account, allocated it to our site and chose the management and monitoring option. After reconfiguration, the T45-CW disables its local web interface, takes further settings from the cloud and provisions full access for remote configuration.

All security functions are easily accessible. From the portal’s content scanning page, you use a simple slider bar to enable the gateway AV, IntelligentAV, APT blocker and spamBlocker services. Anti-spam policies are available for SMTP, IMAP or POP3 traffic, where you allow, deny or tag spam messages in their subject line for ongoing local rule processing.

From the network blocking section, you can control botnet detection, IPS, custom blocked URLs and ports plus detection of Tor (The onion router) exit points. Web content filtering offers 130 URL categories for blocking or allowing, while WatchGuard’s application control service presents over 1,250 predefined app signatures.

The multi-WAN function is found in the device’s networks page where you select the Global WAN option, choose failover or round-robin operations and set the failback mode. Move to the portal’s monitoring page and you can see the status and strength of the 5G connection and view RSRP and RSRQ graphs.

Businesses that hate internet downtime will love WatchGuard’s Firebox T45-CW. It provides a wealth of top-class security services, can be easily cloud managed and delivers seamless 5G WAN failover.

We also rated the best document management software.

Categories: Reviews

I tested the latest Ubuntu Desktop release - read what I thought of this popular Linux distro

TechRadar Reviews - Mon, 03/17/2025 - 03:47

This review first appeared in issue 354 of PC Pro.

Debian-based Ubuntu is the jumping-off point for many other distributions, including Linux Mint and Zorin OS. The Desktop edition is available in at least two builds: the so-called LTS (Long Term Support) build, which receives support for a minimum of five years from release, and the bleeding-edge release, which comes with nine months of security and maintenance updates. In each case, the build number – 23.10 in the case of this review – denotes the year and month of release, so 23.10 will enjoy support until July 2024, and 22.04 LTS until April 2027. New releases appear every six months for the cutting-edge build, and every other year for the LTS edition.

Both 23.10 and 22.04.3 LTS require 4GB of memory, 25GB of drive space and a 2GHz dual-core processor, despite running on different kernels (6.5 versus 5.17) and desktop environments (Gnome 45 versus Gnome 41/42). Build 23.10 is also running more up-to-date versions of its default applications, Firefox, LibreOffice and Thunderbird. Of these, perhaps the most significant is Thunderbird, which sits at 91 in the LTS release and at 115.2 in 23.10. Thunderbird 115 introduced significant interface improvements and, even if you install the LTS release, we’d recommend updating Thunderbird to at least 115 yourself.

As well as the desktop edition, there are builds for server and IoT platforms, with the latter including Raspberry Pi. The Pi edition is available directly through the Raspberry Pi Imager. There’s also an immutable build, in which the core system files are protected against tampering.

None of the installer’s questions is too taxing. You don’t need to know what kind of security your network uses, as you do for openSUSE, and we didn’t need to play around with the partitioning of our drive to complete the process successfully.

Once up and running, you’re presented with a largely vanilla workspace. Although Ubuntu has its own style, it remains fairly faithful to Gnome’s default look and feel, rather than making a significant departure as Zorin does (or as Nitrux does from KDE Plasma). If you don’t like Gnome, you’ll find alternative builds with a little searching. Kubuntu (kubuntu. org) switches it out for KDE, while Ubuntu Budgie (ubuntubudgie.org) and Ubuntu Cinnamon (ubuntucinnamon.org) naturally use Budgie and Cinnamon respectively. Lubuntu (lubuntu.me), using Qt, and Xubuntu (xubuntu.org), using Xfce, are both Ubuntu-recognized ports for lower powered computers.

“Jump start your desktop” gives direct access to the most common apps (Image credit: Future)

Apps can be installed using the built-in App Center or via the Terminal using apt. The App Center, which gives access to both Debian and Snap packages, has been upgraded in 23.10, and certainly feels more engaging than the installer it replaced. There’s a handy “Jump start your desktop” at the top of the homepage that gives direct access to the most commonly installed apps, rather like the recommended software section in Raspberry Pi OS. Other named sections, including a Productivity section, make it easy to find essentials such as alternative browsers, Bitwarden and Slack. Neither Inkscape nor GIMP are preinstalled, but the versions available through App Center match the latest-edition version numbers available from their respective sites.

More good news? On first boot, both of the wireless printers on our network were successfully recognized and set up.

For many newcomers, Ubuntu may well be a byword for Linux, and it’s easy to see why. Installation is a breeze and, once complete, it just works. The new features in this latest release, including the updated App Center and Gnome 45, are subtle but welcome improvements over their predecessors, and the default interface is unflashy and provides few distractions.

Ubuntu was our Labs Winner last time around, and nothing changes here – so long as you’re happy running Gnome. If you aren’t, take a look at KDE-based openSUSE Tumbleweed or Cinnamon-based Linux Mint.

It’s not difficult to find an Ubuntu-based distribution running KDE, Budgie and several other desktop managers, although, as they’re not directly controlled by Canonical, the company behind Ubuntu itself, it’s fairer to consider them different products.

We also rated the best Linux PCs.

Categories: Reviews

I tried the latest version of Rocky Linux - read how it compares to other distros

TechRadar Reviews - Mon, 03/17/2025 - 03:38

This review first appeared in issue 354 of PC Pro.

Rocky Linux is one of the youngest distributions around, first appearing in mid-2021. It’s based on Red Hat Enterprise Linux, so in some ways is a natural home for anyone previously running CentOS, a community-supported version of Red Hat terminated in December 2020.

Rocky’s first release was version 8.3, reflecting the fact that it was based on the same version of Red Hat Enterprise Linux. The version-8 line remains current, despite 8.9 appearing two days after 9.3, which itself is based on Red Hat Enterprise Linux 9.3. That’s the version we’re testing here. Planned end of life for the Rocky 9 line is May 2032. For Rocky 8, it’s May 2029.

Red Hat Enterprise Linux uses Fedora source code in its development, so Fedora and Rocky naturally share several touch points. However, where Fedora 39 is built on the 6.6.3 kernel, Rocky Linux 9.3 is built on the same 5.14 Linux kernel as Red Hat 9.3. While this may look outdated, it shouldn’t be an issue, as Red Hat uses a system known as backporting to implement fixes and features within the existing kernel while maintaining compatibility with overlaying applications.

Installation is straightforward. There’s no media builder as there is for Fedora, so it’s a case of downloading the ISO and using balenaEtcher or similar to write it to a bootable thumb drive. The full DVD ISO is a hefty beast, tipping the scales at 9GB. However, there are lighter “boot” and “minimal” builds that can be used to enter rescue mode and install the OS from an alternative source, like an online repository. There are four processor builds, covering x86_64, ARM, PowerPC and IBM s390x servers (although only the first two of these are available for Rocky 8). Dig deeper and you’ll find a build specific to Raspberry Pi in the alternative images library.

Although Gnome is the default window manager, you can swap it out for KDE, Xfce, Mate or Cinnamon.

The software installer doesn’t always have the most recent version of apps (Image credit: Future)

We opted for the DVD ISO and, once up and running, were dropped into Gnome 40.4, which feels dated if you’re accustomed to Gnome 45. Aside from the operating system, we didn’t have much to show for our 9GB download. Firefox was pre-installed, but there was no email client, office suite or image editor. These are all available through the Software app, and we were glad to see that the version of Thunderbird available through the repository was 115 (which benefits from a significant redesign). However, LibreOffice, had we chosen to install it through the default repository, would have been version 7.1 (the latest build is 7.6), GIMP was one point behind the latest build, and Inkscape was at 1.1.1, while its latest stable release is 1.3.2.

Further hurdles: the two printers on our network hadn’t been recognized upon first booting and updating the system, and we needed to enter their IP addresses in the printer setup dialog to add them to the OS.

Less rocky was this distribution’s turn of pace. Rocky Linux 9.3 returned a respectable 1,097 in the single-core Geekbench test and 3,112 in the multicore test. Despite the different kernels, this was broadly similar to the scores we saw when testing under Fedora, which turned in 1,105 and 3,053 respectively. In either case, we would be surprised if this made a noticeable difference in day-to-day use.

It’s perhaps unsurprising that our verdict is so similar to that for Fedora, which was our runner-up to Ubuntu. They are, after all, the bread in a Red Hat sandwich, sitting at either end of the development chain. If you don’t want to run a Debian-based OS, either would be an excellent choice, being well supported and closely aligned to one of the pre-eminent commercial Linux distributions.

Of the two, we would opt for Fedora. There are three reasons why. First, it got us up and running more quickly. Second, for bundling Gnome 45. And third, for including a wider range of pre-installed default applications, each running a recent build.

We've also ranked the best Linux distro for privacy and security.

Categories: Reviews

I tried the Reskube Home Pro - see what I thought of this connectivity device for SMBs

TechRadar Reviews - Mon, 03/17/2025 - 03:33

This review first appeared in issue 354 of PC Pro.

As remote working continues to boom, there’s no shortage of solutions aiming to improve the resilience of your power or networking provision. However, Reskube’s Home Pro is the first device we’ve come across that promises to do both: it’s an uninterruptible power supply, offering up to 500W of backup power, and also provides fallback data connectivity through an integrated 4G LTE router. If the mains goes down, the Home Pro keeps its two forward sockets powered from the internal battery; if your internet connection is lost, it switches to the mobile data connection.

The design is basic but robust, with no controls aside from the power button. The front features two simple LED strips indicating battery life and current power output. At the back you’ll find the mains power input plus an FM12315 port for solar power, again rated at 500W. The rear is also home to two Ethernet ports, which handle incoming WAN and outgoing LAN connections, plus SMA connectors for two mobile antennas and RP-SMA connectors for two Wi-Fi antennas. Above these, you’ll find primary and secondary SIM trays.

Reskube claims the Home Pro is powerful enough to run a small office with five PCs or laptops, a switch and a printer. I’m not sure about that: it’s certainly not sufficient for larger laser printers, which can draw around 1kW during their warm-up phase. However, it should be fine for a couple of home workers or a limited mobile retail setup. I tested the Home Pro under a constant 500W load and found the battery lasted for a decent 1hr 22mins before giving out. Over this time it supplied a total of 633Wh of power, about 82% of its stated 768Wh battery capacity, which is competitive for a compact battery power bank.

It’s worth mentioning that, during the 500W load test, the Home Pro’s cooling fans ran continually at top speed. The noise was audible, but not as loud as the warning buzzer, which sounds constantly when you exceed a load of 475W. At a 200W load the fans were quieter, and the battery delivered a total of 595Wh – roughly 77% of its claimed capacity.

The fans are distinctly audible when recharging, too. This happens at a fixed 500W rate, tailing off shortly before the batteries are fully charged. I measured a total power consumption of 801Wh for a complete recharge, so assuming the batteries went from fully discharged to fully recharged, that equates to an impressive 96% efficiency.

Two simple LED strips on the front show battery life and current power output (Image credit: Future)

The Home Pro’s power failover function works brilliantly. When I cut the incoming power, it switched to battery power in less than 10ms – much faster than most general-purpose battery backups, and certainly quick enough to avoid any glitching on my IT equipment.

Internally the Reskube Home Pro uses lithium-iron phosphate batteries, which have safer charging characteristics than standard lithium-ion chemistry. They also have a longer service life: Reskube says they’ll maintain 100% capacity for 3,000 cycles, dropping to 60% after 5,000. That being the case, it’s disappointing that the standard warranty is only 12 months, especially when other power supply manufacturers offer five years.

The Home Pro’s networking capabilities are on the conservative side. The unit supports 4G at speeds up to 150Mbits/sec, carrier and signal strength permitting. For the best possible reception you can upgrade Reskube’s standard stubby antennas with cabled ones, but even then you shouldn’t expect best-in-class network performance: the Home Pro’s Wi-Fi network only supports 2.4GHz 802.11n Wi-Fi, and its Ethernet ports are limited to 100Mbits/sec.

Those limitations have a noticeable impact on network performance. My ISP line normally gives me download speeds of 100Mbits/sec, but that dropped to 62Mbits/sec over the Home Pro network. That’s a shame, as for maximum resilience you’ll want to keep your critical devices connected to the Home Pro. Still, there’s enough bandwidth here to be productive, and the switchover to LTE is impressively smooth: I measured around nine seconds of downtime when switching from my fixed line to mobile data – fast enough that a YouTube video kept playing without interruption.

The Home Pro’s web-based configuration interface is easy to use, and provides access to a huge range of configuration options. Oddly, though, you can’t check the battery status, or change any power-related settings, such as selecting a slower charge rate or modifying the warning buzzer threshold. Reskube also offers a remote management option for £39 a year. This adds a command-line interface and full online access to the web dashboard, making it ideal for supporting remote users without needing to go onsite or cause downtime.

The Reskube Home Pro is a simple concept, delivered well. It wouldn’t hurt if it were quieter and had faster network support, but it offers the core protections you need in a single box that’s easy to deploy and manage. It’s also surprisingly good value, costing £999 exc VAT – only a little more than you’d pay for a similarly specified backup power supply and a dual-WAN router. Alternatively, the Reskube Home Pro can be leased for £444 per year. This means you don’t have to worry about the stingy warranty, and it includes remote, telephone and online support. If you’re looking to back up your key business systems, that seems like a price that’s more than worth paying.

We've also rated the best small business website builders.

Categories: Reviews

I tested Progress WhatsUp Gold network monitoring software - read what I thought of it

TechRadar Reviews - Mon, 03/17/2025 - 03:31

This review first appeared in issue 354 of PC Pro.

Progress Software has been busy developing its flagship network-monitoring software, and WhatsUp Gold (WUG) 2023.1 introduces a raft of new features with ease of use given a high priority. Previously, you had to manually enable monitoring for every device, but you can now set a network discovery scan job to do this for you.

What’s more, the discovery process automatically collects SNMP and WMI device attributes and updates them in real-time, while WUG’s dynamic SNMP table monitor populates every instance, making it easier to monitor specific devices. The device properties page clearly shows which credentials are being used, access security has been tightened up with TLS 1.3 support, and SQL Server Express 2022 is now the default database.

Licensing is even more flexible. Along with the standard versions, perpetual licenses and points-based options, Progress has added three yearly subscription plans. The Business edition starts at around £715 per year for 50 devices and, unlike sensor- or element-based products, WUG doesn’t care how many CPUs are in a host or the number of ports a switch has.

The new NOC view provides a view of the network using slide decks (Image credit: Future)

This edition supports 1,000 devices and includes core functions such as network discovery, topology mapping, alerting and reporting, as well as cloud, wireless network and storage monitoring. The Enterprise edition has unlimited device support and enables virtualization host and application monitoring plus log management, while Enterprise Plus adds network traffic analysis and configuration management for switches, routers and firewalls.

Installation on a Windows Server 2019 host took around 30 minutes, and discovery is swift. A wizard helped conjure up the first scan and, after we’d added all our device credentials, it took ten minutes to deliver a complete list of all our network devices.

The WUG console is easy to use. It presents four menu options in its upper ribbon bar, and you can add frequently used views to the Favorites tab by clicking on the star icon at the top right of the console. It’s simple to create custom network discoveries, and you can pull up network topology views and maps.

Analysis dashboards are a great feature that allow you to design multiple custom views, add columns and choose the metrics you want to see. Anything WUG is capable of monitoring can be included, so you can create very detailed dashboards, and each device is assigned a colored icon for instant status views.

WhatsUp Gold Enterprise shows Flowmon data plus app availability (Image credit: Future)

The new network operations center (NOC) feature manages collections of views that rotate to a schedule for presenting support teams with a big heads-up live status display. To create them, you click the same star icon, choose the NOC option, add items to a slide deck, enter a display duration in seconds and pass the URL to support staff so they can access it directly.

Alert policies link device state changes with an extensive range of actions including running a program, restarting a service, sending emails and posting alert messages to Microsoft Teams users. The Alert Center presents even more information about disk utilization, and the device properties page has been updated so you can see which actions have been applied to it.

WUG is a great choice for businesses running the Progress Flowmon appliances as it can monitor them and include their traffic analysis in its dashboards. General reporting tools are in abundance, too, and they can now be emailed in HTML format so nontechnical users can appreciate them.

WhatsUp Gold 2023.1 is simple to deploy and offers an impressive range of network-monitoring tools. The choice of licensing plans makes it an affordable option for SMBs, and support teams will love its smart dashboard and NOC views.

We've also rated the best antivirus software.

Categories: Reviews

I tested the Paessler PRTG Network Monitor - see what I thought of it

TechRadar Reviews - Mon, 03/17/2025 - 03:26

This review first appeared in issue 354 of PC Pro.

Businesses concerned about the cost of add-on components and upgrades can rest easy with Paessler’s PRTG Network Monitor as everything is included in the price. Its sensor-based licensing means you just select the number you want and apply them to any device, individual hardware component, service or business application you choose.

Paessler offers a range of sensor packs. We’ve shown the price for a PRTG 1000 perpetual license, which includes one year of maintenance and should be sufficient to monitor up to 100 devices. You can easily upgrade to larger packs when required, and Paessler also offers a free version with 100 sensors.

Businesses with distributed offices may prefer the cloud-hosted version where they remotely monitor each network by installing PRTG probes in them. This is a subscription service, with a Hosted 1000 pack costing €229 per month.

We’ve been running PRTG problem-free in the lab for over eight years, with all updates automatically applied on their release. New users will find on-site installation undemanding: after loading the software it runs a wizard to assist with your first network discovery, taking around 45 minutes to scan a complete IP subnet.

PRTG’s sensors deliver a vast amount of useful information (Image credit: Future)

PRTG does all the legwork by assigning the most appropriate sensors to each device and applying a predefined set of alert triggers. The service has a sensor for every occasion, with Paessler currently offering nearly 300, and value looks even better since it includes options for monitoring all popular virtualization hosts.

Paessler estimates that most devices will use around ten sensors each, but it really depends on what type of hardware or system it is. Switches can be greedy, with our 24-port TP-Link Gigabit model awarded a total of 47 for its SNMP and RMON services, while our VMware ESXi 7 and Windows Server 2022 Hyper-V hosts plus all their VMs used up 79 sensors between them.

The good news is you can choose which components you want to monitor, delete those you don’t need and requisition them for use elsewhere, making PRTG more flexible than products that employ device-based licensing. Custom sensors can be added as required, and although those for Cloud HTTP, Google Analytics, Dropbox and Microsoft OneDrive monitoring have been discontinued, there’s still an incredible range to choose from.

PRTG’s web console provides a network overview showing the status of all sensors, and clicking on any of their icons next to the donut charts takes you to a filtered view. The devices view uses a tree structure, with all systems neatly organized into hierarchical groups that inherit settings such as login credentials and discovery schedules from their parent group.

The PRTG web console keeps you in the loop on sensor usage (Image credit: Future)

The view can be customized to suit your environment by adding new groups and moving monitored systems to them. It’s easy to identify problems as all sensors are assigned colors showing if they are up, down, paused or in a warning state, and selecting one takes you to a detailed overview with live graphs and charts showing activity for the past two days, month or year.

Plenty of alerting services are provided, as notification templates are available for services such as email, SMS, Syslog, SNMP traps, MQTT, Slack and Microsoft Teams. You can monitor PRTG on the move with Paessler’s excellent iOS and Android mobile apps and use the Windows and macOS desktop apps to view the same levels of information as the main web console.

You’ll need to keep an eye on consumption, but sensors make Paessler’s PRTG a highly versatile network-monitoring package. It delivers a wealth of information about pretty much anything on your network, and its all-inclusive price makes it a great choice for SMBs.

We've also ranked the best business computers.

Categories: Reviews

Why betting on Mac security could put your organization at risk

TechRadar News - Mon, 03/17/2025 - 02:40

The growing popularity of Macs and MacBooks in enterprises can in part be attributed to their “secure by design” reputation. And generally, macOS is considered a safe platform, a view widely shared across the tech community.

Although macOS is widely perceived as more secure than Windows, 2024 revealed a worrying trend – a notable increase in Mac-targeted threats. From infostealers like Amos Atomic and Poseidon to advanced nation-state campaigns like BeaverTail and RustBucket, threat actors are exploiting macOS design elements to compromise corporate environments.

An over-reliance on the security mechanisms built-in to macOS can leave organizations vulnerable to attacks, so it’s key for organizations to recognize these risks and understand how to mitigate them effectively.

The Rise of macOS crimeware

There is a growing concern about the presence of malware on macOS, a problem that was relatively minor ten years ago. One contributing factor is the increased prevalence of Macs in business environments, a significant shift from the late 2010s, that has made them more attractive to attackers.

Threat actors have realized there is money to be made from Mac users. As a result, cybercriminals are increasingly targeting them, recognizing the value of these devices for conducting malicious activities.

Additionally, there are more targeted attacks in business environments. Beyond general attacks, Mac users in business environments face targeted attacks from sophisticated threat actors who aim to steal sensitive company data or disrupt operations.

Today, there are more threats to Macs than ever before, but awareness of these threats remains low. In contrast, most Windows users are generally aware of the need for the best antivirus software. However, Mac users often believe their devices are safe by design, a misconception that needs to be reconsidered given the current threat landscape.

Mac myth-busting

While the myth that “Macs don’t get malware” has been thoroughly debunked, a lingering perception persists that macOS is inherently safer than other OSes. This belief stems from comparisons to Windows, which faces a staggering volume of malware, but it doesn’t mean that threat actors aren’t actively targeting Macs, too.

2024 saw a significant uptick in macOS-focused crimeware. Infostealers-as-a-service, such as Amos Atomic, Banshee Stealer, Cuckoo Stealer, Poseidon and others, represent a significant portion of these threats. These tools are designed for quick, opportunistic attacks, aiming to steal credentials, financial data, and other sensitive information in one fell swoop.

Amos Atomic, which reportedly began as a ChatGPT project in April 2023, has quickly evolved into one of the most prominent Malware-as-a-Service (MaaS) platforms targeting Mac users. Initially a standalone offering, Amos Atomic has splintered into multiple variants, including Banshee, Cthulu, Poseidon, and RodrigoStealer. These versions are now developed and marketed by competing crimeware groups, spreading rapidly and affecting businesses throughout 2024.

What sets this malware family apart is its shift in distribution tactics. Instead of focusing on cracked games or user productivity apps, it now spoofs a wide range of enterprise applications, significantly broadening its reach and posing a greater threat to corporate environments.

Safe – or unsafe – by design?

For convenience, Apple designed Macs so that a single password could be used to unlock the device and allow administrator functions. This means that by default, the same password is used for logging in, installing software, and unlocking the Keychain – the database built into macOS that stores other passwords, including online credentials saved in the browser, application certificates, and more.

In addition, a built-in AppleScript mechanism makes it easy for attackers to fake a legitimate-looking password dialog box. Malware that successfully spoofs a password dialog box to install a fake program is then able to access all the sensitive data stored in the Keychain.

This straightforward yet effective approach is widely adopted by the rash of infostealers currently plaguing macOS businesses and home users. Given how deeply these features are integrated into the system itself, this technique is unlikely to be mitigated by Apple any time soon.

Advanced adversaries: Staying hidden in plain sight

Rather than the quick-hit tactics of smash-and-grab infostealers, advanced adversaries such as nation-state actors also aim to persist on the device over time. Their goal is to maintain long-term access to compromised devices, often for espionage or other high-value objectives. With Apple introducing user notifications for background login items in macOS Ventura, attackers have adapted by exploring new ways to remain undetected.

Common techniques include trojanizing software, which consists of compromising popular or frequently used applications to ensure the malicious code runs regularly. This can involve infecting development environments such as Visual Studio and Xcode with malicious payloads.

Additionally, leveraging Unix components, threat actors are exploiting overlooked command line elements like zsh environment files (“.zshenv” and “.zshrc”), which execute whenever the user opens a new terminal session, granting the attacker persistent access to the system.

Such tactics underscore the importance of scrutinizing trusted applications, development tools, and the underlying command line environment.

Defensive strategies for organizations

To protect against the rising tide of macOS threats, organizations should implement proactive and comprehensive security measures. Key defensive strategies include:

  • Control user actions: Recognize that most malware on Macs comes through user interaction. Use device management to control what users can change and do on their devices and limit admin privileges to reduce the risk of malware installation.
  • User education: Educate employees on the risks of using Apple’s built-in Passwords app and Keychain for storing corporate credentials. Instead, mandate the use of trusted third-party password managers that provide stronger security and compartmentalization.
  • Ensure visibility: Implement software that provides visibility into the system to monitor changes and detect suspicious activities. Understand how to check for malware and what tools to use for confidence in the system's security.
  • Adopt robust security solutions: macOS’s built-in XProtect malware detection is updated infrequently and offers limited coverage. Organizations should deploy an advanced security solution that provides real-time threat detection and prevention.
Rethinking macOS security

The perception that macOS is inherently more secure can create a dangerous blind spot for organizations. Macs are not necessarily more “secure by design” than any other computing platform, and the evidence from 2024 demonstrates that threat actors are increasingly targeting them.

Organizations must treat macOS as a primary target in their security strategy, adopting a layered defense approach and educating users about the risks.

By recognizing and addressing these vulnerabilities, organizations can mitigate the risks of betting too heavily on macOS security – and avoid becoming sitting ducks for the next wave of attacks.

We list the best antivirus software for Mac.

This article was produced as part of TechRadarPro's Expert Insights channel where we feature the best and brightest minds in the technology industry today. The views expressed here are those of the author and are not necessarily those of TechRadarPro or Future plc. If you are interested in contributing find out more here: https://www.techradar.com/news/submit-your-story-to-techradar-pro

Categories: Technology

The Renault 5 Turbo 3E, the World’s First Electric Mini-Supercar, Looks as Bonkers As We Hoped

WIRED Top Stories - Mon, 03/17/2025 - 01:00
The electric return of Renault's iconic sports car has just taken a step closer to reality—and we got our first glimpse of it.
Categories: Technology

What to know about CECOT, El Salvador's mega-prison for gang members

NPR News Headlines - Mon, 03/17/2025 - 00:52

The mega-prison in El Salvador, where visitation, recreation and education are not allowed, has became the latest tool in President Donald Trump's crackdown on immigration.

(Image credit: AP)

Categories: News

Residents survey the aftermath of deadly weekend storms across the southern U.S.

NPR News Headlines - Sun, 03/16/2025 - 21:56

Officials are still assessing the scale of property damage in several states after an outbreak of twisters and dust storms hit the region over the weekend that left dozens dead.

(Image credit: Jeff Roberson)

Categories: News

Today's NYT Mini Crossword Answers for Monday, March 17

CNET News - Sun, 03/16/2025 - 21:27
Here are the answers for The New York Times Mini Crossword for March 17.
Categories: Technology

Today's NYT Connections: Sports Edition Hints and Answers for March 17, #175

CNET News - Sun, 03/16/2025 - 21:19
Hints and answers for the NYT Connections: Sports Edition puzzle, No. 175, for March 17.
Categories: Technology

March Madness brackets are set. The SEC dominates the men's with a record 14 teams

NPR News Headlines - Sun, 03/16/2025 - 18:26

In an all-time record, 14 of the 68 teams in the men's tournament all come from one conference — the SEC. In the women's, UCLA and South Carolina are top seeds. Games tip off this coming week.

(Image credit: Brandon Sumrall/Getty Images)

Categories: News

Pages

Subscribe to The Vortex aggregator