
Search results for '+computers' - Page: 14
| PC World - 7 Jan (PC World)You probably haven’t seen HP’s Z series of computers unless you’re working in an office with some “big iron,” packed with high-end hardware and specialized designs. But HP’s new Z2 Mini G1a, shown off at a pre-CES presentation, caught my attention in a big way. It’s a mini desktop PC with some of the most powerful parts available.
First, the chassis. This thing is almost a literal brick, at least in terms of size and weight, albeit a fashionable one. HP didn’t provide me with dimensions at the presentation, but it’s approximately the size of a two-drive NAS setup, or maybe one-third as small as the smallest Mini-ITX desktop I’ve seen. Much bigger than a typical “mini PC” sold to consumers, yet still a fraction of the size of a conventional desktop PC.
Michael Crider / IDG
That’s not all that impressive… until you learn what HP crammed inside this thing. It has AMD’s latest workstation laptop parts, maxing out with a Ryzen AI Max+ Pro 395 (a 16-core, 32-thread monster). You can get up to 128GB of RAM and 4TB of storage (or 8TB if you upgrade it yourself with the second M.2 slot). There’s no discrete graphics for these chips, but the integrated Radeon 8000S series should be enough to handle all but the most extreme needs, since you can assign up to 96GB of memory to the graphics in that maximum configuration.
The HP logo on the front rotates for horizontal and vertical use. Classy.HP
Most of the same capabilities are being built into this thing’s laptop counterpart, the ZBook Ultra 14 G1a. That comes with a 14-inch 2.8K OLED screen and a unified chip architecture for the CPU, GPU, and NPU. The only big difference from a capability perspective is that it’s limited to one M.2 slot. It’s a chunky laptop at 3.5 pounds, and HP didn’t provide an estimated life for its 74.5 watt-hour battery.
This laptop and mini PC are based on the same crazy-powerful AMD platform. Michael Crider/Foundry
Again, neither the laptop nor desktop are machines you’d buy for a standard user. The desktop is designed to act as a workstation or even mounted in a server rack, thanks to its integrated 300-watt power supply. It’s just as happy sitting on a desk, though. In fact, it’ll sit horizontally or vertically, and I was delighted to see that the HP logo on the front can rotate (just like ye olde PlayStation 2).
Want the price for the Z2 Mini G1a? Well, so do I. Ask your IT manager, but be prepared to provide a darn good reason that you need it. Read...Newslink ©2025 to PC World |  |
|  | | PC World - 7 Jan (PC World)Deep within your computer is a blueprint that specifies a certain “language” of machine instructions it can understand and execute. This blueprint (called the “instruction set architecture”) sits between your computer’s software and hardware.
In order for any given app to function properly on your computer, it needs to “speak” the same language — that way your computer can understand what it wants to do and perform the proper actions on the hardware.
Until now, different instruction set architectures have been proprietary and incompatible with each other (except via emulation, which is like real-time translation between blueprint languages). The x86 and Arm architectures are the best-known real-world examples.
But from 2025 onwards, you’ll be able to buy a computer where everything within is open and customizable. That’s thanks to RISC-V (pronounced “risk five”), an open instruction set architecture used in customized processors for a range of applications.
Framework plans to launch a laptop supporting a RISC-V-based motherboard in 2025. The product is so far aimed at technology enthusiasts and developers, but is expected to be the most user-friendly and refined RISC-V laptop yet, IEEE Spectrum reports.
RISC-V, unlike x86 and Arm, is completely open source and can be used without any licensing fees. This makes the technology more flexible, cheaper, and customizable for manufacturers. In fact, it’s already being used by hard drive manufacturer Western Digital.
RISC-V has the potential to make both hardware and software more accessible and coordinated, and 2025 could be the year when RISC-V computers pave the way towards a new standard. Read...Newslink ©2025 to PC World |  |
|  | | PC World - 7 Jan (PC World)As we head into 2025, now’s a good time to upgrade those old power strips that are hanging on by a thread. And if you’re going to upgrade, make sure you step up to one that has ample surge protection and ample room to connect all the devices you’d ever need plugged in.
Right now, this Anker power strip is available for only $22 on Amazon, a hefty 39 percent discount off its original $36 price.
This surge protector features a jaw-dropping 12 AC outlets (so there’s plenty of space for your computers, laptop chargers, monitors, smart devices, lamps, and whatever else) as well as two USB-A ports and one USB-C port. The USB-C port delivers 20W fast charging, so you’ll be able to bring your smartphone back to 100 percent in no time.
The power strip also has an optimized layout, making it easy to plug in bricks and plugs into all of the outlets without colliding and losing slots. It also has built-in safety features, protecting your devices against power surges and overloads. At this price, it’s an absolute bargain considering just how many devices you can protect at once.
Don’t miss out on this chance to get this 15-device Anker surge protector for $22 on Amazon! Note that this one has a 5-foot cable. Alternatively, you can opt for the 10-foot cable variant for $28.
Charge and protect 15 devices at once for just $22Buy now at Amazon Read...Newslink ©2025 to PC World |  |
|  | | PC World - 2 Jan (PC World)Virtual private networks, or VPNs, are one of the most effective ways to keep your data private and secure while online. They encrypt and hide our confidential web activity and are a key component in helping us to navigate safely while connected to the internet.
As VPN usage continues to increase globally these apps are quickly becoming a cornerstone of our online security. Due to this importance, it’s worth looking at what’s in store for the next-gen VPNs to see how they’ll continue to provide us privacy and security into the future.
From VPNs utilizing blockchain to new encryption standards even quantum computers can’t break—and maybe even anonymity for your smart appliances—here are the coming advancements in VPN tech I’m most excited for.
Further reading: Best VPN services 2024: Top picks for speed, price, privacy, and more
Blockchain technology is coming to VPNs
The decentralized node structure of a dVPN may be the way of the future.NordVPN
Decentralized VPNs, or dVPNs, offer a new twist on VPN technology and they are quickly growing in popularity. By distributing network functions across many nodes rather than routing traffic through one company’s centralized servers, they can theoretically afford better privacy and security to users.
A dVPN runs on a peer-to-peer network that leverages blockchain technology. Decentralized nodes, operated by volunteer hosts, eliminate single points of failure and ensure that no single entity has control over every user’s data. Due to a dVPN’s more democratic functioning, they are also seen as being more resistant to censorship and government data sharing.
Just over the last year or two, decentralized VPNs have started to gain traction in the global market. So does this mean crypto bros are about to take over your VPNs? Not likely. While dVPNs certainly seem like an attractive offer, more so with all of the hype surrounding everything crypto and blockchain nowadays, this decentralization doesn’t inherently mean a better experience.
With a traditional VPN, you have to put your trust in just one company. But this company, assuming you choose wisely, will run regular audits to prove it’s trustworthy, has a vested interest in keeping its network secure, and has the financial backing to continually make improvements to its applications.
Using a dVPN on the other hand means that you have to trust each volunteer node host. Depending on how the dVPN company operates, these hosts may not be required to prove their trustworthiness or the privacy of their nodes.
So, while dVPNs are sure to become a popular choice for those seeking decentralized privacy, there will still be a place for traditional VPNs in the future. What is most likely is that you’ll see two separate markets develop, one for dVPN services and another for traditional centralized VPN services. It will then be up to you as the user to choose which you believe is best suited to protect your data.
The post-quantum encryption revolution is upon us
Post-quantum encryption will become the new standard for VPNs in the near future.Pixabay
In August of this year, the National Institute of Standards and Technology (NIST) made history by releasing the first quantum-resistant encryption standards. Outside of a few overly enthusiastic cryptographers, this news might not have made a splash but it’s set to have huge implications for the future of online privacy and security.
Researchers and tech companies are racing to build quantum computers that will have the capability to crush the encryption standards of today’s machines in mere minutes—something currently impossible.
So, how does this relate to VPNs? Well, VPNs are heavily reliant on cryptographic protocols for securing communication on their networks. When you connect to a VPN, it encrypts your traffic by scrambling the data into an unreadable form, thereby preventing third parties from viewing and understanding that data. If a quantum computer with vastly greater computational power were to get ahold of this same encrypted data, it could decipher it with ease.
These new ‘post-quantum’ encryption standards will not only set the bar for VPN providers in the coming years, but also provide a roadmap to help them become more secure. “Post-quantum” encryption will become a selling point that VPNs will advertise and market to consumers.
For users, it might seem like a boutique feature now, but once quantum computers are up and running—most experts believe it could be within the next decade—you’ll absolutely want your VPN to be using these new standards.
We’re already seeing some VPN providers offer ‘post-quantum’ encryption. Just recently NordVPN took the initiative and launched an app with post-quantum support. Others such as ExpressVPN and Surfshark have also implemented their own versions as well. It’s only a matter of time before this becomes the new norm for all VPNs.
VPNs will soon protect your refrigerator, too
The all encompassing internet of things, or IoT, refers to a network of connected devices that communicate and share data with each other. For most people, this takes the form of smart home devices such as thermostats, TVs, lights, refrigerators, and home security systems. Thanks to IoT devices we now have more control over our environment than ever before.
When it comes to cybersecurity however, smart devices are generally some of the most vulnerable and least protected pieces on your home network. Cybercriminals love to exploit IoT devices and in many cases, simply hacking one device will give them access to everything else.
VPNs are out to change this in the near future. By providing fully integrated home network security, a VPN can encrypt and protect communications for all of your devices. Unlike the typical personal VPN that requires you to connect each individual device, IoT VPNs extend across an entire network to safeguard all devices. At home this can already be done via a router VPN.
Unfortunately, there are still a few drawbacks to using a router method. Many VPN providers still impose simultaneous device connection limits that can be taken up quickly by all of your IoT devices. Router VPNs also create a single point of failure meaning you need to make sure failsafes, such as an automatic killswitch, are set up correctly. This all requires a bit of technical know-how which the average layperson may not have.
Routers with built-in VPNs, like Aircove from ExpressVPN, are just one of the ways that next-gen VPNs will protect all of the devices on your home network.
ExpressVPN
VPN companies are working on new and innovative solutions for at-home IoT coverage. More and more services are switching over to unlimited device connection models. Others such as ExpressVPN have even started selling their own routers, ready to go right out of the box, with the VPN built into them.
VPNs are likely to begin offering configurable IoT options in their mobile apps as well. This will allow users to easily control which devices on their home network are connected through the VPN, all in a centralized hub. So in the future, even the AI-generated grocery list from your smart fridge will be encrypted and secure from prying eyes. Read...Newslink ©2025 to PC World |  |
|  | | PC World - 28 Dec (PC World)Do you like fiddling with computers and fancy the idea of taking on a more advanced project? Then I have a suggestion: Build your own router/firewall.
With a router running a more advanced operating system on more powerful hardware than standard consumer routers, a whole world of new possibilities opens up. Although there is a learning curve and can feel complicated at first, it actually becomes easier to do things that might be possible with a router from, for example, Asus, but are really complicated.
There are a number of operating systems to choose from, from Openwrt, which can also be installed on consumer routers, to various Linux-based systems such as Clear OS and IP Fire, to Unix systems such as PF Sense and Opnsense.
Yours truly’s little rat’s nest home lab. To the left, an Intel NUC that runs an Opnsense router, among other things. To the right a switch from Unifi.Anders Lundberg
The latter two seem to be the most popular, and I myself have had a router with Opnsense for a couple of years so for this guide I have chosen that system.
Other articles in this series:
How to choose a new router and get started with important settings
Solve your Wi-Fi problems with these smart router settings
Protect your home network with these essential router tweaks
More than Internet: 9 tips to maximize your home network
Get more from your home network: 5 advanced tips for the hardcore
Why build it yourself?
For many, it’s enough to answer: Because it’s possible and because it’s interesting and instructive. But you don’t have to be motivated by curiosity alone. There are several practical and technical advantages too.
Once you get started and learn the basics, it immediately becomes much easier to do things like set up multiple VLAN with different firewall rules (to prevent smart home gadgets from accessing the internet, for example), use dynamic DNS, run your own recursive DNS server, display a welcome message when guests connect to the wireless network, and much more.
Perhaps the biggest benefit, however, is security. Instead of relying on the manufacturer to release updates and keep the router secure, you get new updates almost weekly so that all parts of the system have the very latest security fixes. There are also add-ons that give the network more advanced protection than is normal in consumer products.
Hunsn
Choose the right hardware
You can reuse an old computer for Opnsense, in which case one or two network cards are all you normally need to buy. But such a computer is usually unnecessarily power hungry and a large piece of equipment that can be difficult to place in the home.
Opnsense is based on the Unix system Freebsd. This means that it is a little more fussy with the hardware compared to Linux. Above all, it is network cards that can be a problem. The system prefers and works best with Intel-based cards, so if you’re buying new, it might be worth checking that the computer you choose has Intel networking chips.
A mini PC with two Ethernet connectors may be a better choice, and in fact there are computers on sale designed specifically for use with Opnsense or PF Sense. For example, Amazon sells this model from Hunsn that costs just over $200 and has Intel networking chips. Since memory is cheap, I recommend 16 gigabytes from the start and at least 128 gigabytes of SSD.
In addition to the router computer, I strongly recommend a managed switch to connect, for example, your old router that you can set to work as an access point instead of a router, only for Wi-Fi. It is also needed if you want to start using virtual networks (VLAN).
Installing Opnsense
Start by downloading the latest version of Opnsense (click directly on the Download button with the preselected options). Also download and install Balena Etcher, a simple program for writing .iso and .img files to USB sticks.
Foundry
Unzip the downloaded .bz2 file so that you get an .img file. Plug in a USB stick, start Etcher, click on Flash from file and select that file. Select your USB stick as target and then click on Flash.
Once that’s done, you can eject the flash drive and connect it to the router computer, to which you’ll need to have a monitor and keyboard connected to begin with. Boot the computer from the USB stick via the boot menu or BIOS.
Foundry
The system starts with text only, which will scroll past for a while. When it is finished, you will be taken to a login prompt. Enter username installer and password opnsense. The installation program will now start.
Foundry
Select the language on the keyboard and move on. Select Install (ZFS) which is now the normal recommended method. Select Stripe and then use the space bar to select the target SSD. Go ahead and accept and it will format the disk and copy all the files. Once it’s done, you can select Complete Install (you can change root password easier in the next step).
Basic settings
When the router computer reboots, you can take out the USB stick and let it boot from the SSD. As before, a bunch of text will scroll by during boot, until you reach the login prompt.
I recommend that you start by changing the address of the LAN interface, so that Opnsense doesn’t mess with your old router if you want to be connected to both at the same time before you are ready to move the internet connection over to Opnsense.
Foundry
Log in with the username root and the password opnsense. Press 2 to change the IP address. Press the correct number for LAN (normally 1). Press return to choose not to use DHCP. Enter an appropriate address, for example 10.1.1.1, and then 24 to stick to addresses in the format 10.1.1.x. On the rest of the questions you can press return to accept the preselected option.
Before you can do anything else, you need to connect the Opnsense machine and your regular computer with a network cable, either directly or via a switch.
Open Settings on your regular computer and go to Network and Internet > Ethernet. You should have an address in the same format as Opnsense (for example 10.1.1.2), with the address you just chose as gateway and mask 255.255.255.0. If it has not appeared by itself, you can click on Edit to the right of IP assignment and fill in yourself.
Then open a browser and type in 10.1.1.1 and you should hopefully get a security warning about invalid certificate, which you have to click past to get to the Opnsense web interface. The username is root and the default password is opnsense.
Foundry
You will now be taken to the Opnsense guided basic settings. The first thing to do is DNS settings. Here I recommend leaving the dns servers fields blank, untick Override DNS and tick the three boxes under Unbound DNS.
The remaining steps you can click past until you get to a question about changing the password for the root account. Choose a new secure password and write it down.
Get on the internet
In order for Opnsense to access the internet and act as a router/firewall, you need to connect an Ethernet cable to it. You can either take the cable from the broadband socket of your old router and connect it to Opnsense instead. Alternatively, you can connect to a socket in the old router or a switch if you have one, but this will be a bit more complicated.
If you have regular broadband via fiber that connects with DHCP, Opnsense should automatically connect and get an external IP. You can check this by selecting Interfaces > Overview in the web interface.
Foundry
If the WAN has been given an address, you can test that everything works by checking for updates. Select System > Firmware > Status and click Check for updates. If it works, this is a good time to install the first of many upcoming updates.
Then try going to any website in your regular computer. If that works too, you have a working Opnsense router. Other settings in the system can be left as they are for now — the system has no unsafe default options.
Foundry
Learn the interface and understand the firewall
The Opnsense web interface is structured a little differently than most routers. On the left, there’s a hierarchical menu where you’ll find all the settings, divided into different categories. At the top right, there is also a search bar that works really well to find settings far down in the hierarchies.
The System menu mainly has settings for Opnsense itself, but also updates and installation of plugins — an important feature when you want to start building out the router with smart features.
Interfaces is about the different network interfaces, normally LAN and WAN but here you will also find VLAN, PPPoE if the internet operator requires login and interfaces for a VPN server.
Firewall is, of course, about rules for blocking and allowing traffic, but also about port forwarding. Under Aliases, you can create aliases for individual devices, for example, to make them easier to use in firewall rules.
The VPN menu is for both VPN servers for connecting from outside to your local network and for connecting the entire network to an external VPN service.
Services is a collection menu for other built-in functions such as DHCP and DNS (Unbound) and also functions from installed plugins.
VLAN without internet for the smart home
A common use case for a more advanced router like Opnsense is to place some connected devices on a separate network with different firewall rules. For example, a network for smart home gadgets that have no access to the internet and limited access to the rest of the network.
Foundry
To do so, start by opening Interfaces > Other Types > VLAN. Click on the plus button to create a new VLAN. Give it a short name, for example SMART and fill in a number for the VLAN tag between 1 and 4,094, I usually choose a ten, for example 10. Save.
Flundry
Now go to Interfaces > Assignments and fill in the same name under Description for the new interface. Click Add.
Foundry
Now click Interfaces > [SMART] and tick Enable Interface and Prevent interface removal. Select Static IPv4 under IPv4 Configuration Type. Scroll down to the bottom and fill in a suitable IP address and select 24 instead of 32 to the right of the address. If you have chosen to give the regular network the address 10.1.1.1, you can choose 10.1.10.1 for the VLAN network (I usually use the same number in the third group as the VLAN tag, so a guest network with the tag 20 gets the address 10.1.20.1 and so on). Save and apply the changes.
Foundry
Go to Services > ISC DHCPv4 > [SMART]. Tick Enable DHCP server… and fill in an address range, for example 10.1.10.100-10.1.10.254 (I usually leave addresses below 100 for devices that should have a fixed IP address). Save and apply the changes.
If you look in Firewall > Rules > SMART you will see that there are no rules, which means that all traffic is stopped. If you look at the rules for the LAN, you will see that Opnsense has automatically added rules to let through all traffic originating on that network. So if you want to allow internet for smart home gadgets, you need to create a rule for that.
Foundry
To actually use and connect gadgets to the VLAN network, you need a managed switch. In its settings, you can enable VLAN tagging for one or more ethernet connectors, and gadgets you connect to these connectors will then only “see” the VLAN network. In the adjacent image, you can see what it looks like with a switch from Unifi — other manufacturers such as D-Link and TP-Link have similar settings. If your Opnsense machine has more network connectors, you can “tag” these and use them instead.
Do you need help?
If you get stuck somewhere, there are many resources to help. The Home Network Guy blog has several guides on Opnsense, from installation to more advanced topics like VLAN. It also has a very good YouTube channel that I highly recommend. On Reddit, help is available in several groups, such as r/opnsense and r/homelab.
Foundry
Tip: Virtual router
If you want to try Opnsense and see how the interface feels, you can do it in a virtual machine instead of on a physical computer. You can do this with, for example, Virtualbox directly in Windows, just to familiarize yourself with the interface and how to set things up. You can also run the system more permanently on a server computer running Linux, usually the Proxmox variant. Home Network Guy has a good guide to that. Read...Newslink ©2025 to PC World |  |
|  | | PC World - 25 Dec (PC World)I have been working in the IT industry for over 30 years, for most of this time as an editor at PC-WELT (PCWorld’s German sister publication), specializing in security. I test antivirus software, give tips on how to make Windows more secure, am constantly on the lookout for the best security tools, and monitor the activities of cyber criminals.
Over the years, I have acquired a whole range of behaviors and principles that seem completely normal and sensible to me. However, when I observe other PC users, I often discover risky or at least less security-oriented behavior.
That’s why I’ve put together the 10 most important things I would never do as an IT security expert, with tips on what to do instead.
Further reading: Installing Windows 11 on old PCs is incredibly risky. Here’s why
1. Move instead of copy
You can hardly tell the difference in Windows Explorer: Here, photos and videos are moved instead of copied. This can worsen data security rather than improve it. IDG
Moving your own files instead of copying them immediately makes me feel uneasy. This includes, for example, photos or videos from the camera or audio recordings from a smartphone or audio recorder. If you move such files, which are usually unique, you run the risk of losing them as soon as you move them. Although this is very rare, it cannot be completely ruled out.
But even if the moving process goes smoothly: The data is then still only available once. If the hard drive in the PC breaks, the data is gone. If I make a mistake and accidentally delete the files, they are gone. These are risks that only arise if you start a move operation instead of a copy operation.
If you think “I need the space on the SD card for new photos,” then you should consider buying a second SD card. Your own data is always worth it.
And when do I release the space on the SD card? I do this as soon as my backup plan on the PC has backed up the copied data. In my case, this is done on a hard drive in the network that runs on a Raspberry Pi.
Important files are also automatically encrypted and uploaded to cloud storage.
Further reading: Best online backup services
2. Save my own data without a backup
I have set up an automatic backup for all important data. Because saving files I have created myself without a prompt backup is far too risky for me. This also includes all data that I enter into apps, for example, whether for Android, iOS, or Windows. Just because most apps don’t offer an easily recognizable backup function doesn’t absolve the user of responsibility for their data.
great windows backup software
Acronis True Image
Read our review
Best Prices Today:
$49.99 at Acronis
For example, at two grammar schools in Koblenz, Germany, several hundred school iPads were logged off the school network due to an error. The handwritten notes in the Goodnotes app used by the pupils were deleted. Many students had worked exclusively with the school’s own iPads and this app — in other words, there was no secondary copy of their notes. Around 500 of the total of 7,500 iPads were affected by the data loss by being connected to the school network at the time of the breakdown.
A cloud backup, as is usual for iPads, was deactivated for data protection reasons. No other form of data backup appears to have been used. The pupils concerned cannot be blamed here, but the system administrator responsible can.
3. Format storage without a thorough check
The drive management shows each connected drive with all partitions. You can usually clearly identify a partition based on its name and size. IDG
I would never make this mistake — because I have made it before. Therefore, I can only advise from experience: Only format a storage drive when you are sure that you have selected the correct drive.
For years, I used external USB hard drives to store my files. The folder structure on these hard drives was usually identical. There were the folders “My Documents,” “Videos,” “Temp,” “Virtual PCs,” and a few more. What’s more, all the hard drives were the same model, which I had once bought generously on a good deal. Some of these disks even had the same data carrier designation — namely “Data.”
That wasn’t very clever, because it made it too easy to mix them up. So I ended up confusing one of these hard drives with another one at a late hour and formatted the wrong one.
Since then, I have named and labelled my external hard drives and USB sticks very clearly and take another close look before formatting them.
First check, then format: Choosing the right drive before formatting is crucial to avoid unintentional data loss. In Windows Explorer, check which drive letter the hard drive or partition to be formatted has. This is often not immediately apparent on systems with multiple drives. Take the time to check, unplug other hard disks and drives to increase the overview. The name of the disk and its size will help you to identify it.
In addition, start Disk Management by entering Disk Management in the Windows search. All connected disks and their partitions will be displayed. Only start formatting when you are sure that you have found the correct hard drive, USB stick, or partition.
Related: How to prevent (or survive) a ransomware attack
4. Open links in emails
I don’t like to open a link in an email. And I never open a link if the email is supposedly from my bank or payment service provider. I don’t even open the link in the monthly email from PayPal, even though I know that this email actually comes from PayPal.
Why not? Nowadays it is very easy for an attacker to create a deceptively real copy of a bank email. I wouldn’t reliably recognize the difference between a phishing email and a real bank email — at least not in the short time I have to check my inbox.
Instead, I open online banking pages and other important pages via links I’ve saved in my browser, or retype the address into the browser each time. I log in to the site and check whether a new message has arrived in my customer account. If not, then the message in the email is either a fake or not important enough for the bank to enter this information in my customer account. That’s the end of the matter for me.
Tip: Change these 5 Windows settings to improve your data privacy
5. Opening suspicious files
The online sandbox Hybrid Analysis documents the behavior of a suspicious program with a screenshot. The service is free, but it is often overloaded and responds very slowly. IDG
If a file is suspicious, regardless of whether it’s a program or a document, I don’t open it. The risk is simply too great. As an IT editor, I am of course constantly downloading tools from the internet and quite a few of them are scanned by the virus scanner. That is one indication that makes a file suspicious.
Another is the source. Files from dubious websites are just as suspicious as files that are attached to an email or come from links in emails. If I can’t avoid opening or starting such files, I always check them first with the tool www.virustotal.com. The online service checks a file with more than 60 virus scanners.
If you want even more information about a suspicious file than www.virustotal.com provides, you can also upload suspicious files to an online sandbox. However, this is somewhat more complicated than a test at Virustotal. The services often require registration and are sometimes subject to a fee.
A free and uncomplicated online sandbox without registration is available at www.hybrid-analysis.com.
6. Give vouchers for payment of services
If you are asked to buy vouchers, you should listen carefully (at least if the request does not come from your children). This is how scammers who are after your money operate.
Foundry
Who would want to do this? An astonishing number of users! They are all victims of a social engineering attack. Social engineering uses psychological tricks to manipulate people into doing things that are not in their interests. Human characteristics such as trust, fear, or ignorance are exploited.
A popular trick goes like this: You are surfing the internet and suddenly a warning message appears that appears to come from Windows. Your PC has been hacked and you should call a support telephone number so that a Microsoft employee can fix your PC. When you call, you are told that your PC has actually been hacked. However, this costs money and is supposed to be paid for with voucher cards. The criminals demand these because voucher codes are much harder for the police to trace than a bank transfer.
The fact is: Nobody is immune to the tricks of social engineering. A well-prepared and skillful attacker can lure anyone into a trap. There are many examples of this — search “CEO fraud.” But the moment something as unusual as a voucher code for a service is requested, you can become suspicious and escape the trap. The same applies if you are told that someone is coming round to collect money from you.
See also: How do I remove malware from my PC?
7. Connect unknown external devices
A USB stick whose owner I don’t know. I’m not plugging it in. Fortunately, gone are the days when Windows’ autostart function immediately launched an EXE file from a connected USB stick. By default, Windows 10 and 11 only offer to start Windows Explorer to display the contents of the USB stick.
So that’s not the problem. But like everyone, I’m curious. Attackers take advantage of this and save malicious files with file names that you can’t resist opening.
For a long time, security experts said that if you wanted to break into a company network, all you had to do was leave a few infected USB sticks in the company parking lot. Some employee will grab a stick and connect it to their work PC.
The professional malware Stuxnet is also said to have reached the computers at the Iranian nuclear facility via a USB stick. It is only unclear whether this USB stick got into the plant via the parking lot trick or whether an insider smuggled it in. Stuxnet destroyed the centrifuges in the nuclear facility and thus delayed the production of fissile material for a nuclear bomb.
When you have to insert a foreign USB stick: The same rules apply as under point 5. Check the files on www.virustotal.com or start them in a sandbox.
8. Use default passwords
the best password manager overall
Dashlane
Read our review
Best Prices Today:
$4.99 at Dashlane
When I connect a new device that has default password protection, I immediately change the existing password. The same applies to online accounts that have given me a password.
Admittedly: It has become rare for a router to come with a default password. However, it is all the more important to act quickly in the remaining cases. This is because attackers know the default passwords and try to use them to log into the devices. A great password manager can help you create strong, unique passwords for every site and service you use.
9. Enable unnecessary network services
If you do not need remote access to the Fritzbox via www.myfritz.net, for example, you should not activate it. Every access point to your IT increases the attack surface for hackers.
IDG
Hardly a month goes by without a new security vulnerability in a NAS or webcam becoming known. These network devices are usually vulnerable via the internet and allow hackers to access the data on the NAS, the images on the webcam, or even the entire home network.
That’s why I don’t activate any network services that I don’t need. Remote access to my router — deactivated. Remote access to my smart lighting — deactivated. Access to my NAS and the robot vacuum cleaner is also deactivated.
10. Buy an expensive Plus version of antivirus
Most antivirus manufacturers offer three or more program versions. I wouldn’t buy the most expensive one. I don’t need their expensive additional functions.PCWorld
Antivirus software is usually available in three versions. Simple, good, and very good — or antivirus, internet security, and total security. I would never buy the third and most expensive version.
That’s purely a financial consideration: If I were rich, I would decide differently. But as long as money is tight, I only buy the middle variant, which is usually called Internet Security. It usually offers more than the free Microsoft Defender, but is not as expensive as the full version.
With the latter, I would be paying for services that I don’t necessarily need (metadata cleansing, social media monitoring) or that I can get cheaper elsewhere (VPN services, cloud storage).
As I said, the total versions offer more, but I don’t need that extra.
the best budget antivirus we`ve tested
AVG Internet Security
Read our review
This article was translated from German to English and originally appeared on pcwelt.de. Read...Newslink ©2025 to PC World |  |
|  | | PC World - 24 Dec (PC World)PCWorld executive editor Gordon Mah Ung, a tireless journalist we once described as a founding father of hardcore tech journalism, passed away over the weekend after a hard-fought battle with pancreatic cancer. Gordon was 58, and leaves behind a loving wife, two children, older sister, and mother. Please consider contributing to a GoFundMe campaign in support of Gordon’s family, which was left with considerable medical bills and financial strain.
With more than 25 years’ experience covering computer tech broadly and computer chips specifically, Gordon’s dogged reporting, one-of-a-kind personality, and commitment to journalistic standards touched many, many lives. He will be profoundly missed by co-workers, industry sources, and the PC enthusiasts who read his words and followed him as a video creator.
Gordon studied journalism at San Francisco State University and then worked as a police reporter for the Contra Costa Times in the late 1990s. In 1997, he joined Computerworld (a PCWorld sister publication) before I recruited him to join boot magazine (later re-launched as Maximum PC), where he would ultimately lead hardware coverage for 16 years.
At Maximum PC, Gordon developed his trademark voice that blended a hardcore passion for PC tech with non-sequiturs, deadpan humor, and occasional bursts of outrage. As a very early podcaster in the tech space, Gordon’s “Rant of the Week” segment on the Maximum PC pod became so legendary, someone made a soundboard of his best sound bytes. (Caution: It can get a bit NSFW in the finest Gordon tradition.) As I listened to his rants from my office, he always had me guessing, “Is he really that angry, or is he playing us?”
And that was part of Gordon’s genius. His number one commitment was to investigating the story, informing the public, and helping people make the best technology decisions. But layered on top of all of this was a master showman who effortlessly connected with like-minded enthusiasts.
During much of his time at Maximum PC, Gordon was the lead designer, builder and dreamer behind the magazine’s annual Dream Machine project, which entailed creating the most outrageous, high-performing PC possible. Throughout these building endeavors, he cemented his relationships with Intel, AMD, Nvidia, and other hardware manufacturers too numerous to mention.
Gordon’s goal was to get the newest, best, most high-performing parts before anyone else. And it didn’t end with CPUs and GPUs. If a piece of technology went into a PC build, Gordon had an encyclopedic knowledge about all of it—memory, storage, PSUs, cases, cooling, and beyond.
Gordon was also the unnamed author of Maximum PC’s consumer-advocate “Watchdog” column. As the mysterious Watchdog, Gordon responded to reader complaints about fly-by-night companies and failing products, and applied all his investigative skills to help readers reach a resolution. It was a perfect merger of consumer service, deep reporting and tech smarts that only Gordon could own.
Sort of like Star Trek’s Scotty who preferred sticking to his technical manuals, Gordon resisted taking the helm of Maximum PC, but eventually agreed to become Editor-in-Chief in 2014. Flash forward to later that year, when I once again asked for his help—this time to join PCWorld as executive editor in charge of hardware.
At PCWorld, Gordon immediately began imprinting his knowledge and personality on our articles and video. His deep-dive CPU reviews were epic, and continued a legacy of no-BS chip coverage that nonetheless earned the trust and respect of the companies he covered. Some of his first segues into video took the form of our Hardcore Hardware series where he married his deep wealth of knowledge with trademark Gordon theatrics.
Some of Gordon’s first forays into PCWorld video were for his “Hardcore Hardware” series, which was shot in the bowels of our San Francisco office space.
A master showman, Gordon always knew how to connect directly with his YouTube audience.
Gordon’s infectious personality always kept The Full Nerd crew in stitches. Here he’s leading the viewer Q&A segment, in which live stream participants lined up to tap Gordon’s deep wealth of PC knowledge.
But it wasn’t until we launched The Full Nerd video podcast in 2016, and set Gordon loose on many more video formats, did he come full circle as a creator. As the host of The Full Nerd, Gordon was able to deliver all his knowledge and analysis at a much faster pace—and if you’ve seen The Full Nerd, you know just how much he loved everything the PC scene has to offer.
Through his expanded presence on The Full Nerd, Gordon developed deep relationships with not only other YouTube creators, but also with dedicated followers. You could almost hear his fan base cheering him on via the comments feed during live shows. I have often thought that the way Gordon shared his reporting in print and on podcasts served as model for what PC hardware YouTube would become—unapologetically nerdy, opinionated, and full of attitude. But Gordon always delivered a crucial additional element: a legit journalism background and all the rigor it entails.
Gordon continued to shoot video and appear on The Full Nerd until weeks before his death. Talk about a commitment to beat coverage. He was following the story to the very end.
I met Gordon in journalism school and spent a lot of time with him in the trenches—sharing cubicle spaces, and hearing him riff. I’ll remember his endless debates with co-workers (his bob-and-weave rhetorical style was as maddening as it was entertaining). I’ll remember his two-hour long phone interviews with sources (he interrogated them like a pro, but played the long game in cultivating trust). I’ll remember his reliability in always asking about the TPS reports when some bureaucratic email landed in our inboxes. I’ll remember him slyly trolling me by calling the series “Star Track” even though I’m 99 percent sure he knew that’s not how it’s pronounced.
He might have been the staff curmudgeon, but he was also our most fun co-worker, bar none.
I’ve long held this romantic notion, maybe foolishly, that journalists are immortalized by their canon. And of all the tech journalists I’ve personally known, no one has a deeper canon, and has touched more followers, and has earned more respect from industry heavyweights than Gordon. From his earliest days on Maximum PC to his last days on PCWorld and the Full Nerd, Gordon touched people in a way I just haven’t seen anywhere else. He’s leaving a gaping hole in the hearts of those who loved him, but what he’s given us lives forever. – Jon Phillips, editorial director, PCWorld
Gordon Mah Ung, remembered
Here are more reflections from those who knew Gordon well. If you’d like to share some thoughts on what Gordon meant to you, please email Brad Chacos, PCWorld executive editor, at bchacos@pcworld.com. Unfortunately, we will not be able to add all submissions to this article.
‘The journalist and person I wanted to be when I grow up.’
Here’s something Gordon never knew. He was the beacon for my career before I even had my career. I was born in the early 80s. I was a wide-eyed teen when Gordon was blazing trails in boot and Maximum PC in the late 90s. This was my introduction to enthusiast PC culture, long before the Internet exploded.
After spending years unloading trucks and working in factories, I eventually took the plunge into tech journalism. I had $2,000 in the bank and a 6-month-old daughter, but I wanted to do what Gordon did. I ground out endless $15 articles on a content farm called Demand Media. I was eventually added to the tech vertical, which Salon syndicated. And those Salon clips got me a freelance gig with Maximum PC’s nascent Web Blog. YES!
The first time I got an email from Gordon with insights on something I was working on, I swooned—and listened, and hustled. Eventually I was fortunate enough to work alongside Gordon at PCWorld, then become his co-host on The Full Nerd, and loooong after that, his boss. (WUT!) I learned so much from him. Gordon always remained my inspiration; the journalist and person I wanted to be when I grow up. He still is.
He never knew that. I wish he did, because Gordon literally changed my life. Follow in the footsteps of greatness, kids. And Gordon was the GOAT. — Brad Chacos, PCWorld executive editor and Gordon Mah Ung stan
‘He remembered who came before him, and created space for those who would follow’
I may write for a living, but I can’t do justice to Gordon in words. But I know he would nudge me, as he always has, to go for it. See where it takes me.
PC building is what led me to cross paths with Gordon—I first met him while sneaking peeks at the wild and wonderful PC builds on the other side of my cubical wall. At the time, I was a video games journalist, covering a platform I’d later get mercilessly razzed about on The Full Nerd.
But I liked tech, and I liked learning about PC hardware. It was a trait that Gordon encouraged, nurtured, and transformed into an entire new branch of my career. Gordon was the kind of guy who did that casually, too. His deep love for PC hardware made him open and generous, always actively keeping seats open at the table for others. He remembered who came before him, and created space for those who would follow him.
In every capacity I’ve known him—boss, mentor, colleague—he taught me to stay humble, lead with curiosity, and remain fair in coverage. Combined with his laser-sharp precision and analysis, his example forever motivates me to think deeply and thoughtfully. The industry will not be the same without him. —Alaina Yee, PCWorld senior editor and Maximum PC alumni
‘He welcomed me in and let me know I belonged’
Newsrooms attract characters. Misfits, hopeless optimists, unrepentent goofballs, anti-establishment types, lovable weirdos, and willful contrarians. Gordon was all of those things, but most of all, he was kind.
He was always first in line to help a friend in need. When there was an emergency, he ran toward it. I don’t think he was a Boy Scout, but he was always prepared.
When I was the new guy at Maximum PC, I knew all about computers and nothing about magazines. Gordon didn’t care. He welcomed me in and let me know I belonged there. He answered all of my stupidest questions, helped me when I needed help, and let me make mistakes when I needed to mess up. And he made sure that we all got into good trouble on the reg.
He taught me that our job, as editors, is always to serve the reader. It didn’t matter that advertisers paid the bills; the people who trusted us to give them advice and guidance were always our number one priority. It was his guiding principle and he lived it every day. He was never afraid of speaking truth to power in service of the reader. And he taught so many young journalists to do the same.
I already miss my friend terribly, but I’m profoundly grateful that I got to share a small part of his journey with him. The world is a worse place without him. —Will Smith, Full Nerd regular and former Maximum PC editor-in-chief
‘Gordon was always at the center of it’
I hardly need to list Gordon’s many great attributes—he was a beloved legend in the PC community for a reason. But I’m among a smaller number of people who had the privilege of working with him day to day on a team, first at Maximum PC and then PCWorld. Despite being a larger-than-life figure for both of those brands, Gordon was the consummate team member—always willing to patiently explain something, always down to riff and collaborate, always kind and respectful of others. He seemed to genuinely thrive on the group effort.
My favorite work memories are of the Maximum PC bullpen where the staff would banter and laugh seemingly all day—it’s amazing we ever got anything done. Gordon was always at the center of it. He was a truly outstanding individual who I’m proud to have worked with and know as a friend. —Katherine Stevenson, PCWorld managing editor and Maximum PC alumni
‘Gordon was the newsiest nerd I’ve ever known’
It’s fair to say Gordon helped define what PCWorld is today, from our mission to especially our voice. I grew up in a newsroom, and Gordon was the newsiest nerd I’ve ever known: utterly dedicated to depth, accuracy, and context, but with a cynical, collegial sense of humor. He also cared deeply about understanding how tech worked and unearthing its deep, dark secrets that manufacturers glossed over. The man simply loved his job. We all loved him. – Mark Hachman, senior editor, PCWorld
‘We are fortunate to have had someone so genuine fighting for us’
Gordon Mah Ung is an irreplaceable force of good for this industry and for consumers. His background in police reporting and journalism afforded a strong foundation to his work and a unique perspective not found anywhere else in the computer reporting business. Like many others, Gordon’s work in Maximum PC inspired me long before I was ever in the industry.
Back when I was in high school, I would buy magazines Gordon wrote for every month. In particular, his “Watchdog” consumer advocacy columns inspired our own similar content. He knew when and how to push back to protect consumers, and Gordon served as a mentor for me.Gordon was kind enough to regularly listen to my rambling as I sought his advice and experience, navigating complicated issues of ethics and conflict. He always brought grounded, sobering advice. I still can’t believe that I have been fortunate enough to have worked alongside a hero of mine, and still cannot believe his passing.
Gordon and I got along from day one, and I will forever keep his perspective in mind. His presence at events will be greatly missed. Gordon Mah Ung has long been my favorite co-host in videos for his “real” demeanor and his candor; he is exactly who he presents himself as on camera, and we are fortunate to have had someone so genuine fighting for us in this industry. Gordon, thank you for everything you have taught me, and thank you for unwaveringly looking out for consumers. —Steve Burke, editor-in-chief, GamersNexus
‘If Gordon praised my system, it felt like I’d won an Oscar’
Gordon reviewed our PCs for 25 years, and he has written more kind words about my company than anyone. It’s a bittersweet honor to offer a few words about Gordon in return.
For the first decade I knew Gordon, I learned little about him personally. He was like a test we had to pass. At Maximum PC, he was the ultimate authority on whether the systems we were building were worth anyone buying. If Gordon praised my system, it felt like I’d won an Oscar. But he never let a missed detail get by him, and trying to impress Gordon has become a constant of my career. I would not be where I am today without Gordon’s approval.
But over the years I was fortunate enough to get to know Gordon a bit personally. I always felt privileged when he’d call me for long off-the-record talks about the latest PC industry intrigue, and we’d inevitably tangent off to talking about Aliens or Star Trek, or “the kids building PCs these days who don’t know how easy they have it.” Gordon was a kindred spirit: an O.G. sci-fi and computer nerd who loved tech, and always remembered the point of the hobby was having fun with cool toys.
But the biggest impression he made on me was when he and his family stopped by my shop a few years ago. Such wonderful people, and I was so impressed by his children: kind, smart and funny—exactly whom you’d expect Gordon to have made the world better with. Meeting them, I learned his legacy was not just in what he wrote, but in who he taught, and who he loved. Thank you, Gordon.—Kelt Reeves, Falcon Northwest
‘A truly inquisitive journalist, he sought the stories behind the stories’
Most of us know Gordon as a long-time tech journalist, as one of the best and the most passionate in the industry. Gordon was a truly inquisitive journalist, he sought the stories behind the stories by taking a real interest in the products, companies, and the people behind them.
I was lucky enough to know Gordon as a friend. We checked-in often with one another. I would ask about his health, and he would ask about my flying. Occasionally, we’d talk industry updates but most of our conversations were about family, friends, life, and the things that matter most. He was so proud of his family, not too long ago sending me Halloween Ghostbusters pics and the amazing photos his son took at an air show last year. I will miss our conversations and my friend. He was one of the best and forever will be. —Frank Azor, Chief Architect of Gaming Solutions, AMD, and Alienware co-founder
‘Any good work I do reflects at least in part on Gordon’
If you’ve ever done research on anything technical, chances are you’ve read something Gordon wrote. His keen intellect and razor-sharp wit helped him connect the dots on both the technology and the people that make up our modern world. His talent for investigation was honed over a long and storied career; he was a force in our industry. I will miss his advice and insight, as I am sure will many others.
Often one can infer a lot about a person from their writing, and while I’m sure a kind reasonableness comes through clearly in Gordon’s writing, his was a type of kindness and patience that is exceedingly rare. Gordon always loved to chat, find out what you were up to, and was always kind and thoughtful. While his writing and insights have become a part of computing history, any good work I do reflects at least in part on Gordon because of his positive influences. So, in that way, he will live on in the work of others.
I will forever have fond memories of our many chats, and while I’d love to have just one more chat, I am thankful that he is able to rest for a while. —Wendell Wilson, Level1Techs
‘Gordon was uncannily skilled at demystifying complex technology’
Gordon Mah Ung wasn’t just the most talented tech journalist of his generation; he was one of the best tech journalists of all time. Brutally honest, yet eminently humble, Gordon was uncannily skilled at demystifying complex technology for readers of every stripe. Both in writing and during live podcasts, Gordon schooled and entertained us with his wicked sense of humor. – Michael Brown, executive editor, TechHive and boot magazine alumni Read...Newslink ©2025 to PC World |  |
|  | | PC World - 24 Dec (PC World)USB Type-C is the most flexible connection for notebooks and smartphones. The most important of its many capabilities is as a charging socket for battery-powered devices. USB-C should finally make everything simple: One socket, one cable, one power supply for all devices – from computers to smartphones and tablets to headphones and other peripherals.
So much for the theory, which always sounds simple with USB. The reality is more confusing.
Not every USB-C power supply is suitable for every device. Not all Type-C ports can be used to charge devices quickly or at all. And not every Type-C cable ensures reliable power transmission.
This guide will give you an overview of the technical possibilities of Type-C charging and recommends suitable power supply units for all devices. If you’d like to avoid all the background and simply know which cords as worth your hard-earned money, be sure to check out our roundup of the best USB-C cables. We perform hands-on tests that go far deeper than most other sources on the web.
Further reading: Buying a USB-C cable? Look out for these 6 gotchas!
USB Type-C: The standard connection for charging
There are many symbols that identify a USB-C port on a laptop as a charging port. In practice, however, you will usually only find the Thunderbolt lightning bolt (at the bottom) on the housing. IDG
Almost all mobile devices can now be charged via USB Type-C: For smartphones, Apple was the last major manufacturer to switch from the proprietary Lightning connector to USB-C last year with the iPhone 15.
Apart from that, there are only very cheap bargain smartphones that still rely on micro USB as a charging port. The situation is similar for tablets, where market leader Apple already favored USB-C over Lightning three years ago with the iPad 9. You will also hardly find any devices without USB-C for headphones, ebook, readers, and mobile speakers.
Only laptops still have numerous models that do not use Type-C to charge the battery: These are often older model series from the entry-level range. More frequently, however, USB-C is not the main connection for charging.
Although powerful gaming and multimedia laptops have USB-C, they also have a dedicated power connection with a higher charging capacity that fits the power supply unit supplied. Business laptops with a USB-C port and power supply unit often still have the hollow plug connection so that companies can continue to use power supply units from decommissioned models.
A Type-C connection on a laptop also does not always handle power delivery. The only way to find out whether a Type C socket is capable of power delivery is to look at the technical data. A Type-C port with Thunderbolt supports charging in any case.
Further reading: We tested 43 old USB-C to USB-A cables. 1 was great. 10 were dangerous
Advantages of power delivery via USB-C
The triumph of Type-C is easy to explain, as the connection offers numerous advantages for users and manufacturers:
Cables can be connected quickly and easily because the symmetrical plug is twist-proof.
The socket takes up little space so that devices can be made lighter and flatter.
And as Type-C can handle data and video transmission as well as charging, ideally a single cable is all that is needed between the computer and peripherals, which keeps the desk tidy.
Whether a mobile device supports USB-C Power Delivery is usually stated in the technical data for the connections. If so, you can use a suitable power adapter for charging.
IDG
Devices can also be charged faster with USB-C: Power supply units for micro USB only deliver up to 10 watts, while chargers with a Type A connection usually deliver 15 to 18 watts. Type-C, on the other hand, supports the improved USB Power Delivery (PD) transmission protocol, which usually allows charging capacities of up to 100 watts and even up to 240 watts in the current version.
our favorite Usb-c Charging cable
Belkin BoostCharge 240-watt charging cable
Best Prices Today:
$14.99 at Amazon
However, this does not apply to all Type-C connections, devices, and cables: Although everything fits together mechanically, not every combination has to provide the optimum charging power — for example, because different levels of the Power Delivery standard are supported or devices and power supply units do not implement the standard correctly.
USB-C and Power Delivery: How the charging technology works
The technical basis for charging via USB-C is the USB Power Delivery (USB PD) standard. It specifies voltage levels of 5 to 48 volts and currents of 3 or 5 amps in so-called “power profiles” or “power rules.” Depending on the power supply unit, power cable, and device, charging capacities of between 10 and 240 watts are possible.
A typical smartphone power supply unit with 30 watts, for example, offers power profiles for a charging capacity of 15, 27, and 30 watts, while a laptop power supply unit also offers power profiles for 45, 60, 65, or 100 watts.
Before transmission begins, the power supply unit (source) and consumer (sink) agree on the required voltage and current: The power supply unit first checks the cable to see whether it can transmit up to 3 or 5 amps and provides a basic voltage of 5 volts.
It then tells the consumer what other voltages it can supply. The consumer answers which one it needs so that both can agree on a suitable power profile.
Some multiple power supply units, such as this one from Ugreen, use the semiconductor material gallium nitride (GaN): this allows them to be built very compactly despite their high charging power.
Ugreen
Ideally, any USB-C power supply will charge the device with a Type-C charging socket with optimum performance and as quickly as possible. Even if the power supply does not completely fulfil the requirements of the device, it should provide a minimum charging power, even if the charging process then takes longer.
Conversely, it does not speed up the charging process to use a power supply unit that offers a higher output than the device requires because the consumer cannot call it up.
Since version 3 of USB PD, the power supply unit and consumer can adjust the voltage and current more dynamically. To do this, both must support the optional standard extension PPS (Programmable Power Supply Protocol).
Best 3-port usb-C wall charger
Ugreen Nexode Pro 65W 3-Port GaN Fast Charger
Best Prices Today:
$55.99 at Amazon
The device can then request voltage and current from the power supply unit that deviate minimally from the prescribed power profiles: This speeds up the charging process, but can also ensure that the battery is less stressed during charging or that a smartphone or notebook receives the appropriate charging power in real time depending on the current system load.
Labels such as Fast Charge or Super Fast Charge 2.0 on Samsung smartphones and power supply units, for example, indicate support for PPS.
Further reading: Best USB-C PD laptop chargers 2024: More portable power
How to find out whether a power adapter fits the device
The easiest way to do this is to use the power adapter recommended by the manufacturer for charging. This is common for laptops, as new devices are supplied with a suitable power supply unit.
Smartphones and tablets now often do not come with a power adapter in the sales box: You can buy the right charger from the device manufacturer.
USB-C should make this investment superfluous and put an end to the confusion of power adapters that only fit one device. A power supply unit that can charge all your devices without any problems is therefore ideal.
To do this, the power supply and device must have a USB-C connection and support USB Power Delivery: You should be able to find this information in the technical data, often as an abbreviation such as “PD” or “PPS.” If the power supply unit or device does not support USB PD despite Type-C, charging can start, but only at 15 watts.
So that you can charge all devices with one power supply unit, it should have sufficient charging power for the most powerful device and suitable power profiles for devices with lower energy requirements.
A laptop is usually the device that requires the highest charging power: Ultra-mobile laptops usually need a power supply unit with 45 watts, standard laptops require 60 watts, and particularly powerful laptops 100 watts.
For smartphones, tablets, and portable speakers or headphones, on the other hand, 30 watts or less is sufficient.
Further reading: Don’t buy these dangerous USB-C accessories
To ensure that a USB-C power supply for the laptop charges other mobile devices, it should support power profiles for 15 and 27 watts via USB-PD.
With third-party power supplies, you will often find a list of other devices that can be charged with it in the technical data of a laptop power supply. If tablets such as Apple iPad Pro and smartphones — for example Samsung Galaxy S24 — are listed, the power supply is also suitable for smaller mobile devices.
If you want to use the power adapter that came with your laptop, check the manufacturer’s website for information on its output power: If you find information such as “9 volts – 3 amps,” the power adapter is suitable for smartphones and tablets. These values are usually also printed on the power supply unit under “Output.”
Conversely, notebooks can also be charged with a smartphone power supply unit: This is helpful when travelling if you only want to take the lighter mobile phone charger with you. The power supply unit should offer at least 27 watts of charging power and a voltage of 9 volts. This is sufficient for small and light laptops.
It is best to switch off the notebook when charging, because if it consumes more power during operation than the mains adapter supplies, the battery will be drained even when the charger is connected. However, many notebooks require 15 volts and most require 20 volts as the charging voltage. If your smartphone power supply delivers this, the notebook can also be charged with it – but usually only slowly.
The best cable for charging via USB-C
A good USB-C cable is crucial to ensure that the charging power from the power supply unit to the device is stable. The cables transmit a current of up to 3 amps as standard.
This is sufficient for mobile devices such as smartphones and tablets. Notebooks can also be charged with up to 60 watts using such cables – this is sufficient for small and lightweight laptops. For larger and more powerful laptops, however, charging will take longer depending on the battery size and operating load.
To charge these laptops at optimum speed via USB-C, you need a cable that can transfer 5 amps. The fast charging functions of some smartphones and tablets also require an appropriate cable – for example, Super Fast Charging from Samsung.
Many smartphones can be charged faster: However, you need the right power adapter and the right USB-C cable for this, both of which support the PPS standard or a higher current transfer of 5 amps.
IDG
These cables contain a chip, the so-called e-marker: It contains information about the capabilities of the cable, such as the maximum power supply capacity, voltage, and current values and supported charging protocols.
It outputs this information when the power supply unit and consumer negotiate the optimum charging power via USB-PD to ensure that the charger delivers the appropriate voltage and current values for the cable and the connected device.
Further reading: Samsung Galaxy owners: Buy this GAN charger for the fastest charges
Most manufacturers usually describe the corresponding cables as “100 watt cables.” You will also often find a reference to the e-marker chip in the technical data.
In addition to power transfer, USB-C also supports data and image transfer — if you want to use a cable for all applications, you must pay attention to this in its description: These multifunction cables are usually slightly more expensive than pure charging cables. Cables for Thunderbolt are guaranteed to support all USB-C transmission types.
Good value Usb-c charging cables
Anker New Nylon Series 3 USB-C to USB-C 2-pack
Best Prices Today:
$9.99 at Amazon
You can‘t tell how well a charging cable transmits data: In theory, longer cables are more susceptible to voltage loss and limit the flow of current due to a higher resistance. Thicker cables are supposed to ensure more stable transmission.
In practice, however, you cannot use this as a rule of thumb: The quality of a cable depends on its internal workmanship.
A basic tip: Buy cables for higher charging capacities from well-known suppliers such as Anker, Belkin, or Ugreen. They are reliable and usually cheaper than the corresponding offerings from the laptop or smartphone manufacturer.
Chargers with multiple ports: One power supply for all devices
A single power supply unit is usually not enough for a large number of devices: You often want to charge different devices at the same time via USB-C. This is why there are power supply units with several USB-C and USB-A ports, which can be used to charge a notebook, smartphone, and headphones in parallel, for example. This is also useful when travelling if you only have one socket available on the train, for example.
When making your choice, you should first consider how many devices you want to charge at the same time and on which ports: Multiple power supply units are available with numerous connection combinations, so you should always be able to find a suitable model.
Devices with two USB-C ports cost from around $20, while prices with three Type-C ports start at around $40. In most cases, the power supply units also have a charging port with a Type A connection in addition to the USB-C outputs.
You also need to decide what maximum charging power the multi power supply should have: Up to 45 watts is sufficient for a smartphone and headphones. If you also want to charge a laptop, at least 60 watts is recommended.
USB power supply units with multiple connections:
ManufacturerManufacturer ProductPrice (Euro)max. charging power (watts)Number of type CNumber of type AAnkerPrime (GaN)8010021Armature735 (Nano II)356521Armature735 Prime (GaN)506521Armature323203211BelkinBoost Charge Pro40652–UgreenNexode Pro Mini (GaN)10016031UgreenNexode (GaN)306521UgreenNexode (GaN)5510031UgreenNexode Pro Mini (GaN)456521
It is important to know how the power is distributed over the individual ports: The maximum charging power specified by the manufacturer usually applies to all ports together, only for the combination of certain ports or only if only one port is occupied.
For example, if you choose a 65-watt power supply because you also want to charge your laptop, it will usually only deliver this charging power if a single USB-C port is occupied. If you charge another device on the second Type-C port, the power is then divided between 45 watts on one port and 20 watts on the other – the laptop will then charge more slowly.
If all the ports on a three-port power supply are occupied by consumers, the power on a single port can drop even further. In addition, not all type C connections on the power supply unit have to deliver the same charging power: for example, the laptop may only receive up to 65 watts at port 1. If you connect it to port 2, it will only receive up to 45 watts.
best single-port usb-C charger
Anker 713 Nano II 45W Charger
Best Prices Today:
$27.99 at Amazon |
$27.99 at Best Buy
You should therefore look for the technical data for a model on the power supply provider’s website before buying: Well-known manufacturers such as Anker or Belkin list the charging power that the individual ports offer with single or multiple connections.
The desired power supply should definitely support USB-C Power Delivery and preferably also PPS!
Many manufacturers advertise more expensive models with the abbreviation “GaN”: This stands for the semiconductor material gallium nitride, from which, for example, the voltage converters in corresponding power supplies are made: They work very efficiently without overheating, which enables small power supply units with a high charging capacity.
This article was translated from German to English and originally appeared on pcwelt.de. Read...Newslink ©2025 to PC World |  |
|  | | PC World - 21 Dec (PC World)In recent years, the focus of crime has shifted. The increased security of our computers has made it harder to spread computer viruses and the absence of cash makes traditional robberies rare. Instead, a criminal’s new weapon is social engineering.
Further reading: Quishing and vishing: How to protect yourself from new security threats
A person calls you claiming to be a relative, a police officer, a bank official, or someone else you trust. They try to get you to pay money, give them your account details, or install programs on your computer. There’s always a rush — stress can make most of us do unthinkable things.
Today, real people make the calls, but they’re being replaced by AI voices that can work 24 hours a day. And even more frightening is the possibility of cloning existing voices with artificial intelligence. In other words, it really sounds like your sister calling from Rome.
According to the police, the number of scams using social engineering is increasing by 40 percent a year and they account for 60 percent of fraud crimes against the elderly. Fortunately, there are simple ways to protect yourself. Here are five vital tips:
Hang up the phone! Because scammers are experts at social engineering, any kind of conversation is risky.
Call back! If you’re not sure who’s calling, you can always call back. When you call back yourself, you have control over who you talk to.
Look up the number! Whether it’s a phone number or a website address, it’s important not to use the links you receive via email or text message, as they may be fake. Instead, search for the contact details via the official website.
Use code words! One way to counter social engineering is to agree on a secret code word with family and friends. By agreeing on a unique word to use in an emergency, you can be sure that it is not a fake AI voice calling.
Block it! Never reply to scam emails or text messages, as this confirms that the address and number are being used. However, you can use the Report Spam icon in your email service.
If we all follow this advice and pass it on to our friends and family, there is a chance that cyber fraud will soon become as rare as bank robberies are today. Read...Newslink ©2025 to PC World |  |
|  | | PC World - 20 Dec (PC World)As we head towards the end of the year, the Windows 11 24H2 update from October is still causing trouble for users. Microsoft has confirmed two new problems, and according to Neowin, one of them breaks audio output and the other breaks Auto HDR.
The audio issue occurs on computers “from one manufacturer” (Microsoft didn’t elaborate further on which manufacturer) with Dirac Audio and the cridspapo.dll, which processes audio for improved clarity and precision. The bug causes Windows 11 to no longer be able to output sound to integrated speakers, Bluetooth speakers, headsets, and other audio devices. There’s currently no workaround for those affected.
The other confirmed issue involves a bug in Auto HDR, a Windows 11 system feature that automatically converts SDR visuals to HDR for an improved experience. This bug causes glitches ranging from incorrect colors to full-blown crashes, and the only workaround at the moment is to disable the Auto HDR feature altogether.
Microsoft has since blocked the availability of Windows 11 24H2 on all affected systems, and the block will be lifted once the bugs are fixed.
You can learn more about these issues by checking out Microsoft’s official support notices: “Some devices that have Dirac Audio with cridspapo.dll might lose audio output” and “Auto HDR might cause games to stop responding or display incorrect colors.“
This isn’t the first time the Windows 11 24H2 update has been blocked for certain PCs, nor is it the first time gamers have run into problems after updating to Windows 11 24H2. If you’ve been blocked from updating, the silver lining is that you’re better off waiting several months for all the kinks to get ironed out before making the jump.
Further reading: What you need to know about Windows 11 24H2 Read...Newslink ©2025 to PC World |  |
|  |  |
|
 |
 | Top Stories |

RUGBY
Israel Adesanya has been honoured by the UFC More...
|

BUSINESS
Hamilton ratepayers have been hit with a double digit rate increase for the second year in a row More...
|

|

 | Today's News |

 | News Search |
|
 |