COMPUTERS/INTERNET/SECURITY | WHAT REALLY HAPPENED


COMPUTERS/INTERNET/SECURITY

Nov 13 19:49

Can a mere domain name be defamation? Glenn Beck says yes

Hugely popular conservative talker Glenn Beck has sicced his lawyers on a satirical website that's been up for a week, but the attorneys may have a point on this one. The site, called glennbeckrapedandmurderedayounggirlin1990.com, toes the line on defamation—and may have stepped across it.

Nov 13 12:05

Liberals cry ‘unfair’ after Fox orders unbalanced YouTube purge

Liberal bloggers are accusing Fox News of launching an Internet war against them in a campaign to selectively remove Fox clips from YouTube.

On Wednesday, YouTube shut down the popular News1News channel, which featured news clips that many progressive bloggers and news sites would add to their stories.

Nov 13 11:49

Windows Marketplace's newest anti-piracy measures already thwarted

Yar, that was fast. Less than a day after Microsoft updated its Windows Marketplace for Mobile with new advanced anti-piracy measure, some apt xda-developers community member has managed to crack the new code -- in under two hours, according to Chainfire's posting.

Nov 13 11:34

N.J. official arrested in online child sex sting

An assistant Jersey City comptroller has been arrested on charges of trying to entice children online into having sex with him.

The children were really undercover police officers.

Webmaster's Commentary: 

There are some very sick people in government.

That being said, how is this NOT entrapment?

Nov 12 19:34

GCN links for WRH are wrong

Mike,

I wanted to be sure you got this. The GCN links for WRH On Demand and podcasts are for the WRONG DATES. For instance, this Thursday's podcast is a show broadcast last Friday. I sent you and e-mail about it.

REPLY: GCN is playing some earlier shows in my absence this week, so the dates for the podcasts are current, but the dates on te shows are, of course, repeats.

Nov 12 15:16

ACTA: Internet Users Guilty Until Proven Innocent

There's much more to this - read more (some of the things I *wish* I had said during the interview) & take action here:
http://bytestyle.tv/node/190

Nov 12 07:23

War beneath the web

Hacking websites used to be a way to show off. Now, as Charles Arthur reports in our series about online security, it's a lucrative crime – committed on an industrial scale.

Nov 12 07:09

Citizens On Patrol: The Blogosphere As Regulator

Najarian’s revelation was immediately followed by separate but equally incisive comments from some of the biggest and most influential market commentators out there. None of this was coordinated by a producer at CNBC nor was it orchestrated by the editorial staff at the Wall Street Journal.

Rather, it was an organic meme that spread around the financial web by means of Twitter, WordPress, Blogspot and Typepad.

The mainstream media picked up on this insider trading angle only AFTER the bloggers nailed it, at least from what I’ve seen based on the times of the articles and posts.

Nov 12 07:07

Blackout: Military Personnel Banned From H1N1 Vaccine Sites

If you want to draw attention to a problem, try hiding it. That's the strategy of several military bases when it comes to the H1N1 vaccine.

Shortly after the Pentagon announced that all Armed Services personnel would soon be facing a mandatory H1N1 vaccination program, I started receiving email from soldiers, airmen, marines and sailors because of a previous story I had written on the anthrax vaccine. Mandatory vaccine programs are a sensitive subject in the military, so it's not a huge surprise that swift and visceral reactions to the program gained speed.

Nov 11 15:41

Justice Dept. Asked For News Site's Visitor Lists

The subpoena (PDF) from U.S. Attorney Tim Morrison in Indianapolis demanded "all IP traffic to and from www.indymedia.us" on June 25, 2008. It instructed Clair to "include IP addresses, times, and any other identifying information," including e-mail addresses, physical addresses, registered accounts, and Indymedia readers' Social Security Numbers, bank account numbers, credit card numbers, and so on.

n/a

n/a
Nov 11 06:31

Call of Duty: Modern Warfare 2

Webmaster's Commentary: 

Getting the next generation ready for endless warfare?

Kids, there is no reset button on a real war. You die, you die. You don't start over. You don't pass go and collect $200. You don't go to heaven. Dead is dead. Dead is forever.

n/a
Nov 10 08:05

Framed for child porn — by a PC virus

Of all the sinister things that Internet viruses do, this might be the worst: They can make you an unsuspecting collector of child pornography.

Heinous pictures and videos can be deposited on computers by viruses — the malicious programs better known for swiping your credit card numbers. In this twist, it's your reputation that's stolen.

Nov 09 13:32

China's 'netizens' hold authorities to new standard

A severed finger sparked an online uproar that went viral. And very quickly, rattled authorities here took note.

The story of Sun Zhongjie, a 19-year-old driver who chopped off his finger to decry police entrapment, shows how the Internet has become an effective tool of public protest in this tightly controlled country

Webmaster's Commentary: 

We are trying to do the same thing here!

:)

Nov 09 09:38

Worm attack bites at Apple iPhone

The self-propagating program changes the phone's wallpaper to a picture of 80s singer Rick Astley with the message "ikee is never going to give you up".

Webmaster's Commentary: 

The iPhone operating system, OSX, is based on LINUX.

UPDATE: I am getting a ton of emails arguing over whether OSX is LINUX or BSD or SYSTEM 5, but the fact is that they are all flavors of UNIX. Even the Amigados was a UNIX derivative.

Put down the swords; we all begin with Abraham!

My point being that the chorus of windows bashers who scream that the hackers will never bother you if you switch to a MAC need to realize that it is not the computers that are the problem, but the criminals.

Nov 09 09:04

AP IMPACT: Framed for child porn — by a PC virus

An Associated Press investigation found cases in which innocent people have been branded as pedophiles after their co-workers or loved ones stumbled upon child porn placed on a PC through a virus. It can cost victims hundreds of thousands of dollars to prove their innocence.

Their situations are complicated by the fact that actual pedophiles often blame viruses — a defense rightfully viewed with skepticism by law enforcement.

"It's an example of the old `dog ate my homework' excuse," says Phil Malone, director of the Cyberlaw Clinic at Harvard's Berkman Center for Internet & Society. "The problem is, sometimes the dog does eat your homework."

Webmaster's Commentary: 

Planting child porn on a victim's computer has become a favorite trick of political operatives to destroy opponents.

One pro-Israel hacker up in Canada was breaking into the computers of Israel critics and planting child porn on them, then reporting them anonymously, but last I heard this backfired and the hacker got arrested, and the Canadians take child porn VERY seriously!

Nov 09 08:12

News Corp Sites 'To Be Removed From Google'

News Corp chairman Rupert Murdoch has suggested the company's online newspaper pages will be invisible to Google users when it launches its new paid content strategy.

Webmaster's Commentary: 

That will be a good thing since News Corp content tends to include the worst of the pro-war propaganda.

Nov 09 05:11

Giveaway: Win a Lynnfield Core i7 System

OK there is no Joke here
Do you need a new computer ?
this is NOT a sweepstakes like Pepsi, Coke and Frito-lay's dose where no one really wins!

this is From Anandtech.com the biggest and most trusted Internet computer hardware review site on the Internet !!!!

When he (Anand) Gives something away people really win it !!!!

SO ENTER TODAY AND WIN BY Friday !!!
Entries will be accepted from 11/4/09 - 11/11/09. The winner will be selected, at random, by 11/13/09.
You are only allowed to enter once. Multiple entries will disqualify you.
http://www.anandtech.com/cpuchipsets/showdoc.aspx?i=3670

Nov 08 09:48

Hitler bypasses Apple censors: Mein Kampf for your iPhone

An iPhone application that recently made its way into the Apple App Store has sparked some controversy - a digital version of Adolf Hitler's book Mein Kampf translated to Spanish.

Webmaster's Commentary: 

I've read Mein Kampf. It is not the "Necronomicon" it is made out to be. I think the reason that there is such an objection to it being made available is that if people actually read it, they will start to understand just how badly the history of Germany has been distorted over time.

n/a
Nov 07 13:35

Secret Anti-Piracy Treaty Turns ISPs into Pirates

A leaked draft of the Internet chapter of the controversial Anti-Counterfeiting Trade Agreement (ACTA) reveals that ISPs will be held liable for the infringements of their customers, unless they disconnect those accused. The draft aims to strengthen the power of the entertainment industries and other copyright holders, at the cost of the public.

n/a

n/a
Nov 06 06:36

CIA Buys Another Front Company

In-Q-Tel, the investment arm of the CIA and the wider intelligence community, is putting cash into Visible Technologies, a software firm that specializes in monitoring social media. It’s part of a larger movement within the spy services to get better at using “open source intelligence” – information that’s publicly available, but often hidden in the flood of TV shows, newspaper articles, blog posts, online videos and radio reports generated every day.

Webmaster's Commentary: 

AP is reporting that Maj. Nidal Malik Hasan's internet postings were being monitored by the US Government for 6 month's before yesterday's attacks and that the posts attributed to him were a "cause for concern."

Yet the shooting still happened!

The US Government insists that We The People go along with the loss of our civil rights, the reading of our emails, the tapping of our phones, the looting of our computers, and all with warrants, because it will make us safe.

What Maj. Nidal Malik Hasan did yesterday was prove that none of this tyrannical and costly spying on the American people can accomplish the stated goal. They were watching him. They were aware of some posts that caused concern. And still Maj. Nidal Malik Hasan was able to open fire on a crowd.

Just as the government climatologists blew the call on global warming, just as the government health authorities blew the call on "When Pigs Fly" flu, the government's state security apparatus totally failed in using all this data collected on Americans to prevent a mass killing.

Nov 06 06:18

Posthuman Nuclear Doomsday Maneuvers

We no longer worry about World War III. Our future nuclear exchanges will be skirmishes, yes, but the Internet is far more dangerous than anyone ever realized. It becomes something that eats the world defensively.

Nov 05 18:55

AP sources: Authorities had concerns about suspect

Federal law enforcement officials say the suspected Fort Hood, Texas, shooter had come to their attention at least six months ago because of Internet postings that discussed suicide bombings and other threats.

Webmaster's Commentary: 

So, what today's shooting demonstrates is that all the constant surveillance of our mails and internet postings is totally useless.

I mean, isn't the justification for the destruction of the Bill of Rights, the spying, the reading of our emails and net posts, the eavesdropping of our phone calls, based on the premise that we will be safe from acts of terror?

And doesn't today's shooting prove that none of it works?

Restore the Bill of Rights!

Nov 05 15:22

Ron Paul on Alex Jones Tv:Copenhagen Treaty & Cyber Security Act = Control Over The People!!

Dr. Ron Paul speaks on the U.N. trying gain global power through climate control and internet.

Nov 05 08:09

43% of Taxpayers Risk Identity Theft When IRS Makes Copies of Their Tax Returns

TIGTA today publicly released its audit report of the IRS's processing of taxpayer requests for copies of tax returns and transcripts.

TIGTA's audit concluded that the IRS needs to strengthen its controls over taxpayer requests for copies of tax returns and transcripts in order to prevent unauthorized disclosure of taxpayer information. Tax transcripts provide most of the information contained in a tax return. Taxpayers request copies of their tax returns or transcripts for many reasons -- to obtain a loan to start a business, to buy a home, to attend college or to verify income for child support. In addition, third parties such as financial institutions, insurance companies or universities could also submit requests for tax returns or transcripts to the IRS on behalf of taxpayers.

n/a
Nov 04 14:36

Our Dwindling Email Privacy

What sort of privacy do you expect when you send an email? As Americans increasingly rely on the Internet for communication, Justice Department lawyers increasingly argue that Americans have no right to privacy there—notwithstanding repeated congressional efforts to bolster these rights. A recent case out of Oregon shows how the privacy expectation associated with emails and other Internet communications is being frittered away.

Nov 04 14:10

DRM Breaker Reports Himself To Anti-Piracy Group

A citizen is so tired of his country’s copyright laws he has reported himself to an anti-piracy group. In his written confession, the ‘pirate’ admits to copying more than one hundred purchased movies and TV shows for his own use – legal in Denmark – but breaking DRM on the same is an act forbidden under Danish law.

Nov 04 10:08

Newly discovered Safari bug could mean big fees for some iPhone users

The flaw, as discovered by Estonian Apple Site AppleSpot: If the user visits a site which uses Motion-JPEG (most commonly used for security cams and live feeds) in Safari, Safari will continue to gobble up bandwidth even after Safari is closed. Safari is one of the few apps that Apple allows to process in the background, and Motion-JPEG streams appear to continue streaming, even if the stream is in another tab or in the “closed” application.

Nov 04 08:50

Secret copyright treaty leaks. It’s bad. Very bad.

Mandatory prohibitions on breaking DRM, even if doing so for a lawful purpose (e.g., to make a work available to disabled people; for archival preservation; because you own the copyrighted work that is locked up with DRM)

Webmaster's Commentary: 

Thanks a load, music pirates.

Nov 04 08:39

Leaked ACTA Internet Provisions: Three Strikes and a Global DMCA

Negotiations on the highly controversial Anti-Counterfeiting Trade Agreement start in a few hours in Seoul, South Korea. This week’s closed negotiations will focus on “enforcement in the digital environment.” Negotiators will be discussing the Internet provisions drafted by the US government. No text has been officially released but as Professor Michael Geist and IDG are reporting, leaks have surfaced. The leaks confirm everything that we feared about the secret ACTA negotiations. The Internet provisions have nothing to do with addressing counterfeit products, but are all about imposing a set of copyright industry demands on the global Internet, including obligations on ISPs to adopt Three Strikes Internet disconnection policies, and a global expansion of DMCA-style TPM laws.

Webmaster's Commentary: 

"Protect the money!"

Nov 03 15:36

Senate Bill Would Give President Obama Authority to Pull the Plug on Your Internet

CNET News has obtained a summary of a proposal from Senators Jay Rockefeller (D-W.V.) and Olympia Snowe (R-Maine) that would create an Office of the National Cybersecurity Advisor, part of the Executive Office of the President. That office would receive the power to disconnect, if it believes they’re at risk of a cyberattack, “critical” computer networks from the Internet.

Nov 03 09:33

iHacked: jailbroken iPhones compromised, $5 ransom demanded

Yesterday, a “Your iPhone’s been hacked because it’s really insecure! Please visit doiop.com/iHacked and secure your phone right now!” message popped up on the screens of a large number of automatically exploited Dutch iPhone users, demanding $4.95 for instructions on how to secure their iPhones and remove the message from appearing at startup.

Nov 03 08:24

Tone-deaf Unisys official on why cloud computing rocks

Here's Richard Marcello of Unisys extolling one of what he sees as the virtues of cloud computing yesterday at the Cloud Computing Conference and Expo in Santa Clara:

"We were able to eliminate a whole bunch of actually U.S.-based jobs and kind of replace them with two folks out of India."

Those actually U.S.-based jobs presumably were held by actual Americans trying to feed actual U.S.-based families.

Webmaster's Commentary: 

And Richard's bragging about this?

n/a

n/a
Nov 02 10:22

NSA To Build $1.5 Billion Cybersecurity Data Center

The NSA is building the facility to provide intelligence and warnings related to cybersecurity threats, cybersecurity support to defense and civilian agency networks, and technical assistance to the Department of Homeland Security, according to a transcript of remarks by Glenn Gaffney, deputy director of national intelligence for collection, who is responsible for oversight of cyber intelligence activities in the Office of the Director of National Intelligence.

Webmaster's Commentary: 

Isn't it cheaper to shoot the hackers?

Nov 01 10:24

Illegal downloaders spend MORE on music than those who obey the law

People who illegally download music spend more on official releases than anyone else, according to a new survey.

The study, published today by think-tank Demos, found those who admit to file sharing spent an average £77 a year on singles and albums - £33 more than those who claim never to have wrongly accessed music for free.

Researcher Peter Bradwell said the findings should force companies and politicians to 'wake up to the changing nature' of the music industry as the Government plans to disconnect illegal downloaders from the internet in a 'three strikes and you're out' rule.

n/a
Oct 31 11:32

Trick or Tweet? Malware Abundant in Twitter URLs

As many as one in every 500 web addresses posted on Twitter lead to sites hosting malware, according to researchers at Kaspersky Labs who have deployed a tool that examines URLs circulating in tweets.

The spread of malware is aided by the popular use of shortened URLs on Twitter, which generally hide the real website address from users before they click on a link, preventing them from self-filtering links that appear to be dodgy.

n/a

n/a

n/a

n/a
Oct 30 14:04

Israel's new online disinformation project pays bloggers for pro-Israel comments

"The Foreign Ministry unveiled a new plan this week: Paying talkbackers to post pro-Israel responses on websites worldwide. A total of NIS 600,000 (roughly $150,000) will be earmarked to the establishment of an “Internet warfare” squad.

Oct 30 09:27

ISP Threatens Legal Action Against UK Over Anti-Piracy Plans

Peter Mandelson confirmed yesterday that illicit file-sharers could have their Internet connections severed as part of the government’s aims to reduce piracy by 70% in 2 years. TalkTalk, the UK’s second largest ISP, is said to be dismayed at the decision and is now threatening legal action over what it claims is a breach of human rights.

Oct 30 09:00

Fake Security Software is present in millions of Computer

Symantec found 250 varieties of scam security software with legitimate sounding names like Antivirus 2010 and SpywareGuard 2008, and about 43 million attempted downloads in one year but did not know how many of the attempted downloads succeeded, said Weafer.

Oct 30 08:24

US-CERT warns of Blackberry snooping software

An application called PhoneSnoop can configure the phone's speakerphone function to enable a hacker to listen to surrounding conversations remotely. The software uses a Blackberry API to intercept incoming calls. Once the software is downloaded and installed, the software is triggered by a simple phone call, placing the device into speakerphone mode.

Webmaster's Commentary: 

The government spooks can do this for all speakerphone equipped phones, but I guess when ordinary people do it, it's a problem!

Oct 30 07:14

District Judge Concludes E-mail Not Protected by Fourth Amendment (But See Correction)

CORRECTION: In the course of re-reading the opinion to post it, I recognized that I was misreading a key part of the opinion. As I read it now, Judge Mosman does not conclude that e-mails are not protected by the Fourth Amendment. Rather, he assumes for the sake of argument that the e-mails are protected (see bottom of page 12), but then concludes that the third party context negates an argument for Fourth Amendment notice to the subscribers. I missed this because the reasoning closely resembles the argument for saying that the Fourth Amendment doesn’t apply at all, and I didn’t read the earlier section closely enough. That’s obviously a much narrower position, and I apologize for misunderstanding it the first time in the quick skim I gave it.

n/a
Oct 30 06:53

The New York Times’ Coming Jihad Against The Huffington Post

The copyright and fair use laws may be too ill-defined for old media to make a strong case. Worse, the laws may protect and further the cause of the aggregators. There is clearly no substantial precedent to help old media companies or they would have taken advantage of it long ago.

Oct 30 06:27

AT&T unable to fix broken iPhone voicemail

Webmaster's Commentary: 

I just discovered I was not getting voicemail on my iPhone following the upgrade to 3.1.2. The good news is that there IS a fix, but it varies from phone to phone so check your voicemail and if it is NOT coming through, then dial 611 and have tech support deal with it. When you get voicemail running again, all your messages will still be there.

n/a

n/a
Oct 29 19:02

Windows 7 beats Linux, not expectations

Amazon have said that Windows 7 was bigger than Harry Potter and the Deathly Hallows in pre-order sales. The difference is that people couldn’t wait to crack open and start reading about the latest adventures of the boy wizard as soon as it slid through the letterbox, but those Windows 7 disks seem to be staying on the shelf in rather large numbers.

Oct 29 18:32

District Judge Concludes E-mail Not Protected by Fourth Amendment

The Fourth Amendment protects our homes from unreasonable searches and seizures, requiring that, absent special circumstances, the government obtain a search warrant based on probable cause before entering. This is strong privacy protection for homes and the items within them in the physical world.

When a person uses the Internet, however, the user’s actions are no longer in his or her physical home; in fact he or she is not truly acting in private space at all.

Oct 28 18:13

NSA Supercenters to Store Americans' Private Data Permanently

The National Security Agency is building huge new storage facilities to store the unconstitutionally gained data on the American people's telephone calls and Internet traffic permanently, including new buildings in suburban Salt Lake City, Utah, and San Antonio, Texas.

Webmaster's Commentary: 

The good news; they are running on Windows 7!

Everyone start emailing transcripts from Jeff Dunham's "Achmed The dead Terrorist" to everyone on your email list. Tell "Achmed" jokes on the phones. That'll keep 'em busy!

Seriously, this is just another lame and pathetic attempt to trick Americans into going silent; staying isolated and emotionally dependent on the government.

The hard disk companies cannot make hard drives fast enough to store the daily accumulation of phone calls and messages generated every single day.

And even if they could, and could install them and get them online quickly enough, NSA would simply drown in the amount of data they are saving; unable to evaluate any of it.

Oct 28 12:45

Firefox 3.5.4 closes security holes

The six vulnerabilities potentially could let remote attackers take over the computer by running their own software on the machine. For details, check the Firefox security site.

Webmaster's Commentary: 

How about we just arrest the remote attackers?

I mean what with all this security the US Government is taxing us all into poverty to pay for and abandoning the Bill of Rights for, shouldn't we see some TANGIBLE results? I mean, isn't it more credible to arrest and jail some hackers, maybe waterboard their computers, than constantly entrapping patsies by giving them bombs and then arresting them for the headlines?

Or is the US Government as hopelessly inept at catching real criminals as it is in fixing the economy?

Oct 28 10:28

Army’s new bipedal robot walks, balances like a human

Robot-maker Boston Dynamics showed for the first time on Tuesday a new prototype robot that walks upright like a human.

Oct 28 08:35

Net pirates to be 'disconnected'

People who persistently download illegal content will be cut off from the net, Business Secretary Peter Mandelson has announced.

He confirmed that it would become government policy, following months of speculation.

It means persistent pirates will be sent two warning letters before facing disconnection from the network.

ISP TalkTalk said the plans were "ill-conceived" and said it was prepared to challenge measures "in the courts".

"What is being proposed is wrong in principle and won't work in practice," the firm said.

n/a
Oct 27 11:45

Takedown Hall of Shame

Recognizing that public shame is a potent weapon, the Electronic Frontier Foundation today launched a new Web site -- its "Takedown Hall of Shame" -- that will shine an unflattering spotlight on those corporations and individuals who abuse copyright claims to stifle free speech.

Oct 27 10:52

Homeland Security Could Block Websites During Swine Flu Pandemic

Webmaster's Commentary: 

"After all, you wouldn't want to catch a virus, right? BWAH HA HA HA HA, oh my stars; I am so @#%$ing funny! Flu? Virus? Get it? (sigh) You people have no sense of humor." -- Official White Horse Souse

Oct 27 09:34

Scareware launched from tech blog

Visitors to technology blog Gizmodo are being warned that they could have picked up more than tips about the latest must-have gadget.

According to security firm Sophos, the website was delivering advertisements "laced with malware" last week.

A statement on the Gizmodo website admits that it was tricked into running Suzuki adverts which were in fact from hackers.

It follows a similar problem on the New York Times website.

n/a

n/a
Oct 27 09:02

Microsoft Knew Windows 7 Upgrades Could Paralyze PC's Back In July

Some people who are upgrading their PC's from Windows Vista to Windows 7 are finding the upgrade paralyzes their computers, leaving them in a never ending rebooting cycle, unable to use either operating systems.

Many users started to post the problem in a forum on Microsoft's own website on Friday, one day after the highly touted new operating system was released. As of this afternoon, 3 days later, there are still people posting the same problem and no fix from Microsoft for most of the users.

...

To make matters worse, Microsoft was aware of this exact problem back in July, when it was posted on the Microsoft support website. The article is dated July 27th, 2009, or approximately 3 months before the public release of Windows 7, yet the problem wasn't fixed.

n/a

n/a

n/a
Oct 26 13:30

US Chamber Shuts off TheYesMen.org and Websites of Hundreds of Other Activist Groups

Hundreds of activist organizations had their internet service turned off last night after the US Chamber of Commerce strong-armed an upstream provider, Hurricane Electric, to pull the plug on The Yes Men and May First / People Link, a 400-member-strong organization with a strong commitment to protecting free speech.

"This is a blow against free speech, and it demostrates in gory detail the full hypocrisy of the Chamber," said Andy Bichlbaum of The Yes Men. "The only freedom they care about is the economic freedom of large corporations to operate free of the hassles of science, reality, and democracy."

Oct 26 12:39

Gaping security hole in Time Warner cable routers

A gaping security hole in cable modems distributed to Time Warner/Road Runner customers could potentially be exploited remotely to access private networks and possibly capture and manipulate private data.

Webmaster's Commentary: 

As long as a single hacker steals a single password, the United States Government has zero credibility in the "War on Terror." Nothing it does, not the searches, the naked X-rays, the fondling of our wives and daughters, the dropping of our laptops, means anything at all if a bunch of pimply-faced script-kiddies can continue to pillage the internet with impunity.

Oct 26 12:30

Swiss ministry was victim of cyber attack

Webmaster's Commentary: 

So were we ... just now!

Oct 26 08:32

Nation’s First Open Source Election Software Released

A group working to produce an open and transparent voting system to replace current proprietary systems has published its first batches of code for public review.

n/a

n/a
Oct 25 10:30

Internet users paid to spread Israeli propaganda

And they are working overtime this week.

Oct 24 15:48

NEW RULE: Mail Over 13 Ounces MUST Be Presented at a Retail Service Counter

[Any/all mail] weighing more than 13 ounces bearing only postage stamps as postage may not be deposited into a collection box, Postal
Service lobby drop, Automated Postal Center (APC) drop, Postal Service dock, customer mailbox, or other unattended location. These mailpieces are also precluded from pickup service. The sender must present such
items to an employee at a retail service counter in a Postal Service facility. The Postal Service will return improperly presented items to the sender for proper entry and acceptance.

Oct 24 07:45

Wait a year for Windows 7, warns consumer watchdog

Microsoft have launched the latest version of its Windows operating system in a bid to 'make it easier for people to do the things they want on a PC'.

But Matthew Bath, technology editor at consumer watchdog Which?, said there was a lot of confusion around the pricing, adding that Microsoft 'hasn't helped itself' by having six different editions.

He urged customers to wait before buying in order that early teething problems were ironed out.

n/a
Oct 23 19:46

From Security Perspective, Windows 7 Off To A Rocky Start

The global launch of Microsoft's next-generation Windows 7 operating system today was greeted with fanfare -- and some grumbling from security professionals who worry the new OS already has too many holes.

Oct 23 09:28

Apple: 'Windows 7 is antiquated technology'

The criticism comes from Brian Croll, vice president of Apple's Mac OS X worldwide product marketing. He said that Microsoft users were tired of the "headaches" caused by the Windows operating system, and expects some disillusioned Windows users to switch to Apple's Mac platform.

Webmaster's Commentary: 

After 7 hours of totally wasted non-billable time yesterday, I am one of them.

Oct 23 08:21

McCain introduces bill to block Net neutrality

Sen. John McCain (R-AZ) introduced a bill in the Senate on Thursday that would effectively allow Internet service providers to slow down or block Internet content or applications of their choosing.

Oct 23 08:02

Apple ad swings at Windows 7: 'Trust me, this time it's going to be different'

“Windows 7 is out, and it’s not going to have any of the problems my last operating system had. Trust me!”

Webmaster's Commentary: 

I got a huge, and I really mean HUGE email response to my tirade about Windows yesterday, so we will be covering Microblorch again today and maybe even tomorrow on the radio show, so feel free to call in with your complaints.

The Good News: The webcam is working (I think. Maybe. I hope.)

The Bad News: See the Japanese TV show below that tried to demo W7 and had it lock up on the air!

Oct 23 07:58

sillyConValley

Rob Argento launched the sillyConValley(); project after an exhilarating career in Silicon Valley spanning three decades. Working in Technical Publications for Valley heavyweights like Microsoft and Oracle he arrived during the Eighties a firm believer in the Information Revolution. But by the dawn of the new millennium he became increasingly dismayed by a steadily rising sense that Her Highness Technology was gradually turning a revolution all Her own. The Valley that once reviled Big Brother in 1984 was chillingly becoming His most loyal ally.

Oct 23 07:50

win7 demo (japanese tv show)

Webmaster's Commentary: 

I am SOOOOOOOOOOOOOOOOOOOOOOOOOO frickin' impressed!!!!!

n/a
Oct 21 14:01

Fake 'Conficker.B Infection Alert' spam campaign drops scareware

An ongoing spam campaign is once again attempting to impersonate Microsoft’s security team — the same campaign was first seen in April — by mass mailing Conficker.B Infection Alerts (install.zip), which upon execution drop a sample of the Antivirus Pro 2010 scareware.

SHARE THIS ARTICLE WITH YOUR SOCIAL MEDIA