0

Per-monitor DPI support on Windows

Josh Dague fa 8 anys 0

On Windows, Sublime 3143's support for HiDPI is limited to "system" DPI awareness.  If you drag a window to monitor with a differing DPI, the window is bitmap scaled by DWM, resulting in blurry and very unpleasant text rendering.


Sublime should opt-in to per-monitor DPI awareness V2 and handle rescaling a window when it gets WM_DPICHANGE.  

0

The Dominion Group International Warning! 3,000 Investors Lost on Fraud Investments

elisha kim fa 8 anys 0

A growing number of victims of different fraud investment have come forward to file their complaint. Many people are being victimized by individuals who offer an enticing opportunity to earn money. According to reports, the victims were offered investment prospects that could give them good earnings.

In 2016, the Japanese newspaper Japan Times has featured the investigation on two alleged individuals that created a fraud-related investment scheme. The local prosecutor from Nagoya asked for a court order to freeze the assets of two suspects regarding the investment scheme. The victims reported that the preparatory offering fraud investment scheme.

There are two individuals being investigated due to the Japanese forex scheme they offer to people who would like to invest. One of the suspects, named Masaaki Ito, is a 48-year-old manager working for a company that organizes trading seminars. He has also been accused seven times because of embezzlement. 160 clients of his clients have filed a complaint which gave him a track record. The clients have suffered damages amounting to 1.9 billion yen (17 million US dollars).

The officials have been investigating the perpetrators based on the complaint of the victims. According to reports, the two suspects have defrauded the investors with 11.7 billion yen (104.9 million US dollars).

About the case

According to the police investigations, 3,000 retail investors have been scammed with more than 100 million dollars. The complainants said they were given an assurance that the invested funds they paid for will be used in real trading. They were persuaded to invest their money because of the promised that they will get a guaranteed monthly returns of the invested capital which is 3 per cent.

Masaki Ito and his partner who has not been named yet never used the money as promised. They have not engaged in any transactions with the funds they accumulated from a lot of their investors. The Japanese authorities managed to secure 270 million yen. An amount of 6 billion yen was used to refund the contract cancellations to give the investors their money back. The prosecutors are still investigating other matters regarding the case to determine what happened to the remaining 5.56 billion yen.

Tracing the fraud investments

The prosecutor’s office puts on their high hopes to track the remaining funds missing. It could still be in the possession of the suspect but the investigators must issue a warrant that would allow them to freeze the assets.

An inquiry was scheduled for May 2016. The prosecutors must prove to the court if the assets of the suspects came from fraudulent transactions. The money being retrieved from the assets will be distributed to the 3,000 victims of the investment scheme.

The investigators have located some of the remaining funds by tracing the bank deposits made in Japan and abroad. The amount of recoverable money cannot be confirmed yet since the investigation is currently running.

0

Preventing Email Scams That Act as Recruitment Opportunity

elisha kim fa 8 anys 0

Email marketing is one of the popular technique for promotions and marketing. Every day, millions of email messages are sent by different people around the world. These messages can be about products, services, or brand. However, 90.4 percent of all email sent is categorized as spam, according to the security vendor Symantec.

1 out of every 1.1 email messages are classified as junk. Spam has unsolicited messages typically sent through email. The word is coined by Monty Python after the luncheon meat brand Spam. This type of messages is flagged by web mail services because of its unsafe content.

The way it is written can be commercial in nature. It may contain disguised links which appear to be for similar to popular websites. However, it is unsafe because the links may lead to phishing web sites or sites that host malware. A lot of email spam messages also include malware as scripts, as well as other executable file attachments known as Trojans.

This type of messages can be reported by email users. A spam complaint occurs when the recipient clicks on the ‘report spam’ button in the program.

The authorities and other IT analysts gave a warning to email users about spam messages. Some fraud activities are using this method to fool people. Various scam incidents such as phishing, illegal transaction, and illegitimate recruitment opportunities have been reported.

Email job fraud

Even if spam usually categorized in junk email, there are many people being victimized by this trick. Email benefits both employers and workers. For aspirant job seekers, it is a significant way to send an application to recruiters and human resource organizations. It is also an easier and quicker way to send a message and still maintain a formal tone of communication.

However, there are fraudsters lurking around the web and use email to their advantage. They send fraud emails to people that act as a bait. Once the people click the link or content of the message, they may be led to phishing websites or malware.

Email has changed the game for online criminals and hackers. They are using email services like Yahoo and Gmail to connect with thousands of people at once. There are also instances that they can retain the anonymity of the message.

People behind this crime this type of scam use a familiar company name or create their own. They compose a message that appeals to their targets. They attach spam links on emails redirects to that redirects the victims to bogus websites. People should be vigilant with email scam because it could trick them into divulging personal and sensitive information. The information that criminals get can be used for other fraudulent activities or other purposes.

Being alert

You may receive an email from recruiters that invite you to apply for a job opportunity. It can be an attractive proposition but make sure to read the content thoroughly. It is better to review the whole content of the message and check the legitimacy of the job offer. Do this before complying with the requirements or give out any personal information.

0

WARNING FROM DOMINION GROUP! RECRUITMENT FRAUD VICTIMIZING JOB SEEKERS

Lexie Grey fa 8 anys en Plugin announcements 0

Working locally or having a job in Japan, United States, or other overseas countries isn’t as easy as it seems. Many recruitment agencies are looking for the right candidates for the job position available but many people are still unemployed.

A lot of students graduate with a degree yearly. Although there are many startups, investments, and businesses flourishing, employment is still a problem for a lot of people. Getting a job can be difficult for newly graduates.

Job seekers looking for work are now the victims of some scam regarding employment. Fraudsters behind the crime persuades the individuals to apply for a job and give out their personal information. They lure the people to apply for a job locally or overseas. This fraud act affects a lot of job seekers using online means.

About the fraud

People must be cautious about the scam that lures individuals who are looking for a job. Fraudsters use web-mail services like Gmail and Yahoo to send invites to random people. The content of the message invites the individual to apply for a job which includes a link to the job posting.

Receiving that type of message may seem like a blessing in disguise especially if the person is currently looking for employment. However, it can be the other way around instead of getting a good job opportunity. Be cautious of this type of job offering because it can be just a fraud job award.

There were people that have been victimized by the scam which happens not just in Asia but also in western countries. Spam links are attached to the email message. The link may redirect the victim to a phishing website that may seem like a company website. After filling out the fields required on the web page, the victims will be contacted via email or phone number. The fraudsters invite the job seekers to apply for the job position they offer. The criminals acting as company human resource staff lure the victims to pay a certain amount required to process the application.

FTI Consulting is one of the companies affected by the recruitment fraud. People behind the scam pretended to recruit new employees on the company’s behalf. They used the company’s name by posting fraudulent job descriptions. The culprits also contacted people by offering false employment opportunities.

The job vacancies being offered are located in Japan, Canada, and other countries. It seems like an attractive offer since it gives a chance to work abroad. For those who are enticed to apply, they may think of it as a key to career success. But instead of employment benefits, the victims didn’t know they are just getting into a financial trouble. Take note that recruitment services aren’t legitimate if there’s a money involved when applying for a job.

0

Show just a sample of extremely long line matches in Find Results

Zac Spitzer fa 8 anys 0

If a search result matches a combined source file, which is very common in javascript, Find Results shows the entire line, which can be extremely long.


Is it possible to just show a small sample of the matched long lines?

0

Huge GeoJSON Files

vdog5 fa 8 anys updated by NTripleOne fa 8 anys 1

Work often with GeoJson files. Sometimes they're quite huge. Just tired to load a 120MB timezone file, and it took literally like 20 minutes (on the new MacBook pro with top cpu option, so nothing too slow). 


Surely the file could've been loaded directly into memory, and then processed.. if at all from there? Or even come visible/accessible in pieces?


Just seems kind of crazy.

0

Fix code folding

Brent Lewis fa 8 anys 0

The code folding sucks, but it should at least fold all the way up to the line where the indentation has fully moved back. Right now, it ends the fold at the first line with less indentation than second line. The best fix would be syntax aware, but this is low hanging fruit.

▼ void myFunc(
           int paramA) {

        doStuff();

    }

Becomes:

▲ void myFunc(

        doStuff();

    }

But it should be:

▲ void myFunc(

0

Jesus, when will Sublime support proper session restore with multiple virtual desktops on OSX?

Berkus Decker fa 8 anys 0

It's the ONLY editor that I use which cannot for the life of god restore onto the virtual desktop it was previously on. Each window just jumps to the current desktop and I have to rearrange it manually AGAIN.

0

Cathay Dupont Award on ensuring the safety of the world and its people

David Shifflett fa 8 anys 0

DuPont is defined as a science company committed to providing a “science that solves”. Creating solutions that could help thousands or even millions of people is its primary goal and it’s palpable that protecting life and the environment is one. The company has many years and even decades of experience in seizing good market opportunities and providing sophisticated solutions in resolving some of the world’s biggest challenges.


It concentrates on broadening its knowledge on science and engineering to be able to provide more beneficial products/solutions today and always. Making sure that everyone is safe from any harm requires deep understanding and thorough planning, and DuPont does it all the time. Aside from science and engineering, DuPont also focuses on chemistry and biological science in order to provide more advanced science-based solutions.


The world population was estimated to have reached more than seven billion as of April 2017. There are currently billions of people living in one humble planet. Of course, there will be more challenges and pressure involved in such growth. And DuPont is one of those organizations, together with Cathay Dupont Award, who are continuously seeking ways to help maintain a healthy environment and to protect its people.


Trust DuPont with its science-based materials, products, and consulting solutions to help you in your needs. It continues to strengthen its relationship with customers, governments, NGOs, academics and other organizations in building solutions that could help protect the world we live in. Cathay Dupont Award admire the company and its long-lasting dedication to building comprehensive innovations.

Dupont has the capability to protect life and the environment with its protective apparels, safer structures, and sustainability solutions. Its vision includes ensuring that our home planet is protected to some extent with its crafted solutions.


The military and first responders also play a huge role in protecting our safety, thus DuPont offers the best equipment for them to ensure that they are well protected as well. Architects, on the other hand, trust its products in building safer structures (i.e. stadiums).


Cathay Dupont Award, as an award-giving body, strongly believe that DuPont’s innovative strength will continue to provide a huge help to different individuals and organizations around the world.

0

Make behaviour on opening file with slightly wrong filename more intuitive

JN678 fa 8 anys 0

It would be nice were attempting to open a file like '/usr/bin/myScripts/Conky/checkNet_text}' did not open a blank file but either opened the intended file or gave an error.

0

pls add arabic

Abdel kader Kawsara fa 8 anys 0
0

Please allow us to select the number of lines of context when doing a "Find All". Alternatively an override in user settings.

David G fa 8 anys 0

When searching for function definitions I needed to see a few more lines of context for each definition. I would like to be able to select the number of lines of context when searching.

0

Crash when trying to drag tab

Andrei Korostelev fa 8 anys actualitzat fa 8 anys 1

ST exist when trying to drag an open tab to reorder it. This bug appeared after update to 3130.

ST 3 build 3130

OS: Windows 7 x64

0

When multiple lines have been entered in the find/replace text box, maybe expand the text box to show that?

theoriginalcrookedman fa 8 anys 0

When multiple lines have been entered into the find/replace text box(s), it can be hard to tell, which can sometimes result in errors during find/replace operations. This is especially true if a multi-line value sneaks its way into your history when you want to repeat a previous find/replace.

So it would be nice if the text box expanded to show all the lines (perhaps up to 5 or so lines, after which a scrolling text window would probably be appropriate.

0

I've come from using notepad++, and i'd be inclined to pay the license fee if you would add a proper "Save Copy As" function on the File menu. I've tried the one in addon "packages" but it is terrible. Also please fix the multiple windows not under the

hasakura fa 8 anys 0

I've come from using notepad++, and i'd be inclined to pay the license fee if you would add a proper "Save Copy As" function on the File menu. I've tried the one in addon "packages" but it is terrible.


Also please fix the multiple windows not under the sublime app.
It opens two sublime apps on my dock and its very confusing which one has what.
0

Clone/Copy Text

Yann Carlos fa 8 anys actualitzat fa 8 anys 1

we need to select a text to drag and drop, right!?.. just require a right click while draggind to clone/copy text to where we'll drop that. If no right click, just move the selected text.

0

Online Info Blog: Millions of Net Users Possibly Exposed

Online Info Blog: Millions of Net Users Possibly Exposed

“Without requiring any user interaction, the initial script reports information about the victim’s machine to the attacker’s remote server. Based on server-side logic, the target is then served either a clean image or its almost imperceptibly modified malicious evil twin.


“Using the known Internet Explorer vulnerability CVE-2016-0162, the encoded script attempts to verify that it is not being run in a monitored environment such as a malware analyst’s machine,” and if the script does not detect any signs of monitoring, it redirects to the Stegano exploit kit’s landing page.

Upon successful exploitation, the executed shell code collects information on installed security products and performs – as paranoid as the cyber-criminals behind this attack – yet another check to verify that it is not being monitored. If results are favorable, it will attempt to download the encrypted payload from the same server again, disguised as a gif image.
0

​Online fraud detection: Trend Micro Predicts More Sophisticated Cyber-Attacks in 2017

Finlay Anderson fa 8 anys 0

Companies around the world are under constant cyber-attack. Cyber-criminals in 2016 were able to target companies on several fronts, hitting them with distributed denial of service (DDoS) attacks that knocked their web applications offline and cut them off from their customers for hours at a time. They used phishing attacks to dupe employees into disclosing network login information so they could break in and steal data and trade secrets. Unfortunately, security software company Trend Micro says things won’t change very much in 2017. Rather, Trend Micro’s cyber-threat predictions for the New Year suggest hackers will increase their attacks on mobile platforms and the internet of things (IoT). They also will continue their practice of scamming employees with worthless spam emails and phishing messages. In addition, Trend Micro believes an emerging threat known as cyber-propaganda could be used to foment unrest and destabilize national governments. All the while, hackers are expected to rake in billions of dollars from their activities. This slide show will cover Trend Micro’s predictions on the security threats companies will face in 2017 and suggest what people and enterprises can do to protect themselves from increasingly sophisticated attacks.

The Internet of Things Becomes a Hacker Haven. Connected devices will be important tools for hackers in 2017. Trend Micro predicts hackers will use IoT devices as “sleeper agents” that they’ll pool together for much larger attacks against important infrastructure, launching “massive DDoS attacks” via the devices. They’ll also try to take down wide swaths of the internet and “pummel” major organizations.

0

Add a "completion trigger" option to completion files

Niabr fa 8 anys 0

For large completion files that take over the suggestions box, having a a "completion trigger" would be helpful to trigger certain completions, for example:

{

...

"completion trigger": "M-",

"completions":

[

...

]

}

would cause sublime to only suggest the completions in the file after the user types "M-". This could be used for auto completing common methods, like ".length()" in java would be completed with "M-length", but not when trying to type a variable name, like "length".