31 August 2006
Business can benefit from Linux
Of course the obvious advantage for business is the cost or lack of cost of Linux. It is considerably cheaper for business, schools or anyone else for that matter to implement a Linux and open source system. Also businesses can change and configure the system to work in any way they like provided anyone who wants the code can get it freely.
Of course the security issue always comes into play. Linux has less viruses and vulnerabilities than Windows and with the direction Vista is going, it isn't likely to change anytime soon.
Of course the disadvantage is that it does require different knowledge than Windows systems but that is learnable and there are many places online to help Linux users and administrators.
The two most popular and useful pieces of software for all users of Linux include Samba which allows Linux and Windows machines to coexist in the same network. Samba is actually incredibly easy to set up with the hardest part of the setup being opening the firewall to allow it to connect to other computers. Apache provides a full functional professional web server which is the most popular currently.
Linux is one of the most powerful operating systems for businesses to use provided that there is someone who knows how to harness that power and use the system to the fullest for their needs.
Labels: apache, linux, os, OSS, samba, security
Strange Name, Useful Email Security System
This works with every email program and provider and allows people to take messages they have send back and certify that a message has been read without using a return receipt. Also you can send mail that self-destructs after it has been read and has the ability to prevent it from being forwarded to other people, printed, copied, etc.
I can't imagine most people would need such functionality, but for lawyers and business this can be a very good solution rather than putting a confidentiality clause in the emails.
30 August 2006
Legally download books free
My initial search of Alexandre Dumas came up very fruitful with results in several different languages as well. It should be able to reduce the cost for students studying classic literature at school. Good book, no copyright, why not download it and enjoy it. This brings some of the greatest writings into everyone's homes affordably.
Labels: books
Another site to offer answers for users
The questions can be related to any issue that people are interested in from technology and computers to entertainment and food. After posting a question, other users have 4 days to post an answer and vote on it.
Any sites that offer free help and advice for users are very useful and should be promoted.
Windoes Live QnA is very clear and easy to follow and allows people to put multiple tabs on their post to categorize it. Of course you do have to have a MSN ID from either Hotmail, Messenger, or Passport.
29 August 2006
Vista's potential IPv6 issues
Vista's Teredo tunneling mechanism is similar to 6to4, but not completely. Teredo uses UDP packets to send data which allows it to pass through firewalls without being screened. Unlike Vista's implementation of Teredo, 6to4 is usually used between hosts and not between individual computers. The normal implementation of 6to4 involves using it at an external contact and then having the internal router and firewall on the other side of it to actually provide the security while 6to4 does the conversion of an internal network of IPv6 to the external IPv4 network. With this feature on an actual computer it allows data exchange without actually being logged in a firewall, since Teredo packets are not able to be unpacked by most if not all firewalls.
If this turns out to be a valid flaw, people will have files viewed or taken without their even knowing and without their firewall being able to secure them at all. This is an implementation that should either be taken out or fixed and definitely not set as the default setting as it is. With many home users not knowing that much about networking to be able to secure the network, this is not a good feature to add to household computers.
Labels: microsoft, security, vista, vulnerability, windows
Not So Free Results
It seems that these free sites have a tendency to not be so free for users, even if the user doesn't realize it. Free games and screensavers have a tendency to have free spyware or adware included. Sites with free electronic cards can send your email address to other groups who will send free spam. Some sites will also attract you with some free things such as ringtones and then require you to have a paid subscription to actually get the ringtones for example.
When using the term "free screensavers", "free music", or "free ringtones" all return malicious sites while "free screensavers" has over half of its results leading to malicious files.
Firefox and Mozilla vulnerability in older versions
This exploit is accomplished with a nested anchor, the outer of which is from the trusted site while the inner is from an untrusted site which actually contains the download.
The only real protection and solution to this is to use the newest versions of Firefox and Thunderbird (1.5.0.6/1.5.0.5).
This is a good lesson as to why people need to keep their systems updated. This is sometimes the only patch for some problems which are fixed in later versions of a application.
Labels: firefox, thunderbird, vulnerability
28 August 2006
More trouble for AOL
The reason behind this status is that it installs additional software without letting the user know. It also forces the user to add components to Internet Explorer and a taskbar without actually telling the user what it's installing. The software has an automatic update that doesn't give the user the chance to know or control when it happens. Lastly, when a user tries to uninstall this software, it does not completely uninstall.
If I remember right, in the early days of AOL, when you tried to switch away from AOL to another ISP there were some problems for similar reasons and the dialer for AOL always wanted to come up until you did a lot of extra work to remove it.
For a full report on the issue go to stopbadware.org and read their report.
Labels: AOL
Drive Cleanup Utility
This program displays a tree structure of the drive and as well show a graphical representation of the files. A person can click on the graphic showing a large portion of the drive and see exactly what that file is. Also when a folder is selected in the tree view it highlights the area of the graphic that corresponds to that folder. This utility is designed to help a user clean their system, so from this display files are able to be deleted as well as viewed.
If you're looking for a fast way to see which files are taking most of your space to help you decide which to remove from your drive, this is a perfect application for you.
Labels: harddrive, linux, OSS, windows
Google creates online applications for business and schools
Currently it is in beta form and after providing Google with some information about your company, they will decide if you meet the requirements for testing the software.
Once chosen a person is directed to the control panel of the service where they can add and remove users and choose which services to use. Those services include Gmail, which has 2GB storage space available for each user, Google Talk, which allows users to contact other people in both instant messaging and voice conversations, Google Calendar, allowing for the creation of personal and public calendars which can all be viewed from the same page next to each other, and lastly is Google Page Creator, which is a WYSIWYG editor for web page creation and publishing.
There is also a version for education with the web page creator removed. This is designed to help students work together as well and could be useful on projects.
While this can be quite useful for businesses, it could be more useful with the addition of a word processoring and spreadsheet application. Those applications have the potential of being used a lot more in business than a web page creator. Some sort of office suite similar to Open Office or MS Office would be the best option as in combination with the existing applications in the service, it would provide an organization with almost every needed tool for daily business.
27 August 2006
Indian State's Schools to Switch to Open Source
India will be transitioning in the same way that a province of Spain has successfully done recently. They were convinced by Richard Stallman, a free software guru, who visited the state last week. The idea in the state started in 2004 when they decided to focus on open source systems, but never really followed through, giving the schools the option of using Windows or Linux to teach students. Now they have actually implemented the plans fully with the with the 8th class being implemented this year and by 2008 the 10th class will have been implemented.
The full story can be found here.
Labels: education, linux, os, windows
Not much time, Try helping out online
Any companies and organizations looking for volunteers can post their offers as well.
26 August 2006
Textbooks online for a discount.
Also located on the site is a place to purchase books for parents choosing to home school their children or for parents who want to add more to their child's education than they get in school. The books are both for children to learn from and to help parents teach their children.
Of course Amazon.com has textbooks for students of all ages from primary school children to university students and adults who want to enrich their knowledge.
Labels: books, education, online
Scrabble to help learn math?
This program of course would not be good for young children but children that can even do math at a fairly basic level could use this and improve their skills with equations looking like: 5 + 3 = 9 - 1. Of course multiplication and division are involved as well.
Advance graphing application
Gnuplot was made originally for scientists and students as a visualization tool, but has since advanced to be useful for everyone. It supports both 2D and 3D graphs using boxes, lines, points, contours and vectors and other specialized graphs. Most importantly this program will work on your computer no matter what OS you have, UNIX, Linux, Windows, Mac, DOS, and others.
The demos speak for themselves about the capabilities of this product and I encourage anyone interested to view them.
Labels: education, linux, Mac, math, os, windows
Personal Firewalls not so safe.
The safer method is still to have a dedicated system only working as a firewall. A personal computer running both a user's applications and trying to function as a firewall can be a bit too much even for modern processors.
The best advice for a standard users is too keep their computer as up to date as possible including their anti-virus, browser and software. Surfing habits are of course important as well. People need to be careful. Downloading files with trojans or rootkits in them is the easiest way for a system to be compromised. Personal firewalls can do little to protect a system when a user does such actions. Of course this also goes for files received in your email. Also most importantly, DO NOT log in as an administrator account. It may seem easy for when you have to install something or maybe your computer for some reason will not run a certain application without being logged on as administrator. Work with the permissions of that file until you get it working, but do not log on as an admin. because it's easier, it is also easier for viruses to gain complete control of your system. Javascript is something that should also be disabled, even if it is less convenient for users who would have to enable it only for trusted pages that require it.
25 August 2006
Many in the UK without Internet
With as widespread as the Internet is now, a person should have access to it in some way. With almost every business having a presence online, people can research companies and products. The Internet is the easiest way to research product that you want to buy to find the best price, whether it's online or you would prefer to buy it in a traditional store. The Internet is also the largest store of information available from encyclopedias and travel information to health and medical advice, granted not all of it can be trusted, but it's still there. Email is also a very useful part of the Internet with it being the fastest and most efficient way to communicate with friends who don't live so close and also with companies to ask questions. Rather than waiting days or weeks for a letter you can send and receive a response usually within the same day or the next day at worst.
In regard to not having enough knowledge, computers now have become so easy to use that even someone with no knowledge can set a computer up and have it connected to the Internet in an afternoon. There is very little actual technical knowledge needed as most computers will lead you through the process of setting it up and connecting it to the Internet. Even the manuals for the initial setup of hardware are easy to follow with very nice pictures and color coded cords and plugs. If someone is afraid of that I'm certain it would not be hard to find someone who would be more than happy to take 15 minutes of their day to set your computer up and another hour or two to show you how to use the Internet and get you feeling comfortable.
Having actually been in this situation with some people saying the same things, it's amazing how quickly they change their mind after seeing what is available on the Internet and how easy it is for them. Everyone has some interest, and that is definitely catered to on the Internet.
Labels: internet
24 August 2006
Virtual microscope available to learn about the world around us
This project allows you to view objects in a Scanning Electron Microscope or Light Microscope. Of course both of these are virtual and you're limited to a list of items that can be viewed, but the list is updated with 71 different samples currently and 1 to 2 added each week.
People can learn about the world around them in a way that is impossible without this technology. There is no other way that a high school student, for example, is going to be able to view martian dust for example through a microscope.
Labels: education, internet, science
Pictures of Websites
For those interested in seeing a graphical representation of a website, Websites as Graphs is the place to go. It uses a java applet to create a tree representation of the page using different colors for each HTML element. For example the root element is black while each link is blue. Tables are red, and images are violet. While it isn't very useful for most people it does show an interesting representation of a page that is nice to look at. And as it develops the image it is very interesting to watch the nodes flowering out.
If your interested in more information on a website than Websites as Graphs, you can try TouchGraph which will tell you about the links that a page has and will map the entire route of links that can be seen from one page. Interesting in quickly examining the scope of a page.
Labels: internet
People urged to boycott HD licensing terms
The first problem is that if you have an HDTV that doesn't have a HDMI port or HDCP compliant DVI port you will not be able to watch HD films in high definition, they will be the exact same quality as a standard DVD. Similarly if your computer doesn't have a HDCP compliant video card and monitor, you cannot watch Blu-ray or HD-DVD discs. Remember that compatable and compliant are two different words and compatable devices will not work.
Blue-ray and HD-DVD formats both use AACS (Advanced Access Content System). This DRM prevents open-source software from being able to use the formats or for that matter any computer not running MacOS or Windows.
Mandatory Managed Copy, which will be available on later generations of the readers, will allow you to make legal backups, but will require an active internet connection. This seems to remind me of the Sony BMG trojan that appeared earlier that had a recall on some CDs over privacy concerns.
The EU has already launched an unofficial investigation into Blu-Ray and HD-DVD regarding anti-trust issues in their licensing terms with Sony confirming that they have received a letter from the EU Commission regarding the issue. If the licensing terms are found to be disagreeable then a full anti-trust investigation can be expected.
The Free Software Federation openly supports a boycott on these technologies because of their attack on people's freedom and on the open-source community. They claim it is a "conspiracy to restrict technology" and should be illegal. The site also urges us to prohibit such technology in our homes if it is not illegal.
While the technology is interesting I would also encourage a boycott of these devices until they are available to everyone not just those using Windows or Mac. The only difference in the technology is that viewers of these high definition films will have a better resolution, but no better sound.
Trojan uses your money to install on your computer
While this trojan tries to get users upset enough to not be so cautious and install it without thinking, people should still try to be calm when reading their messages.
When users are reading spam and messages such as this one, they should always first think if something seems strange about this message. Why would a company be emailing you in this situation? Wouldn't they just call? If you have some message like this that you think might be true, but it's not your bank sending it, maybe you should contact your bank to see if they have any record of such an charge.
Secondly, when you see a message that seems to good to be true, it is. There are no such deals. In the lucrative world of spam and malicious sites and software, the most interesting or shocking messages get the most people to run it or go to the site and give their personal information.
And my last tip for email. Don't trust anything. You wouldn't let just anyone into your house. We've all heard of the person who claims to be from some utility or other company who gains access into your house and then robs your house. Well, consider strangers in email exactly like you would at your front door. It will keep you a lot safer.
Labels: email, safety, spam, trojan
23 August 2006
Software protection from keylogging in IE
People should remember though that while this does help protect them, that doesn't mean it's not impossible to decrypt the data. Users should still avoid risky actions that can cause the installation of a trojan or keylogger. Just because you have insurance protecting you if your car is stolen, doesn't mean you should leave the doors unlocked with your key in the ignition, think of your computer in the same way.
Easily manage a school's website and intranet
Site@School offers schools the ability to easily maintain a website without any special technical knowledge. Most of the editors look very much like a standard text editor or word processor. It allows both students and teachers to post personal web pages with teachers being able to view a student's web page before allowing it to be posted to prevent any inappropriate content. Teachers can set up an intranet to improve communication and sharing of ideas between teachers. Of course there are also other modules that can be included such as calendars and agendas, a photo albums, guestbook, or a newsletter and forum.
This is something worth looking into for people who are managing a schools website or network and who don't want to spend much money for such services.
Labels: education, internet, linux, networking, windows
Two choices for viewing the Earth at home
Both of these applications are unique in their own way. Google Earth lets you see more of the buildings and details of cities, where World Wind is a bit lacking last I used it.
On the other hand, World Wind is very good with topography and 3D images of the landscape at eye level. Also it has the ability to actually see weather events and other natural activities such as fires, dust storms and floods. In another section of the application users can see the globe artifically colored to display data such as that days temperature, rainfall or air pressure.
I've used both of these applications and both are very good depending on your interest. Google Earth is brilliant for seeing cities and gaining directions to places, while World Wind is very scientific in interest. They can both also be very good for students who want to add pictures in their reports. I've seen Google Earth used by people studying and working in architecture and landscape architecture to include pictures that can describe the area better than land based images could.
Still The Same Microsoft Security Troubles
Unfortunately for Microsoft and customers who are vulnerable, the release is not going to be released yet. There is another vulnerability in the patch that can cause a buffer overrun that can allow for someone to take over that computer. Fortunately, there haven't been any known cases of exploits, but it's only just been found and confirmed. There is the possibility that it will be exploited in the future.
Microsoft stated that it will release the update when it has fixed the flaw and to protect yourself, users with Service Pack 1 should disable the use of HTTP 1.0 protocol.
Labels: IE, microsoft, vulnerability
22 August 2006
Affordable 3D printing for your business
These printers are used to create plastic models of CAD images within a few hours. One printer even brags that it will be able to make a duplicate of itself minus the screws and electronics. Another website is expected to debut allowing children to create an action figure of their own design and then for about $25 have it created with this printer and shipped to the child.
More free learning for younger children
There are currently over 80 activities with more in development. Because of the software being open source, you can change and improve it and share it with other children.
Some of the activities involve learning to tell the time, learning how to use the computer keyboard and mouse, and mathematics, including algebra. Children can learn about science topics such as locks, water cycle, and submarines. There's a activity where children place countries on a map or practice reading.
This application supports Windows, MacOS and Linux and features very colorful screens to make children even more interested. Another bonus is that it covers most topics children up to 10 should know or learn about. There are even several schools using it in the States, Europe and Africa.
Labels: education, linux, Mac, OSS, windows
21 August 2006
More educational software
In the Education section on the site you can download many pages worth of software, the most popular of which include language translators and dictionaries, vocabulary trainers, typing practice, a periodic table application and drawing programs.
The site is not entirely education focused with many different topics of software to download including antivirus, business and internet applications, utilities, multimedia applications and any other type of software you can think of.
Be careful though some of the software is shareware and does have a registration fee. When you're browsing the site it does say which is free and which is shareware with a license so it is easy to tell which is which.
Labels: education, internet, safety, security
Three useful sites for parents and children
Kaboose itself is for parents and teachers providing resources, information and activities for children aged 3 to 11. There are more than 10000 pages related to parenting and educations and thousands of ideas and tips to involve the whole family in a child's learning on the Internet. Also included are ideas for easy to prepare dinners and personal care ideas for mothers/women. It is a all-encompassing site that is definately worth the visit.
Baby Zone focuses on pregnancy and parenting, bringing information and advice from doctors, child development specialists, writers and other parents to you. Of course you can also comment and give your advice to other parents making it an all-around parenting forum.
Fun School provides online games, activities, puzzles, and printable activities as well for children from preschool to sixth grade. These activities include matching shapes and numbers and geography, math and history activities for older children. The activities are categorized by grade level so it's easy for children and parents to find a suitable activity. The categorization actually involves having one page for older children and another for only preschoolers with general categories across the top with pictures and names that children will not directly associate with school and subjects there.
Labels: education, family, internet, safety
20 August 2006
Linus talks about Linux and Open Source
Read the story for information.
Labels: Linus, linux, os, OSS, Torvalds
Language Translation in your IM client
This is a great tool for being able to communicate with people from anywhere in the world, although I think most speak English at least to some level currently, but for people who don't or who often talk with people who don't speak their language this could be very useful. People do have to remember though that just because a program can translate your words for you, you still should know something about the culture of the people you're talking with in order to not offend anyone.
Labels: IM, internet, translate
Educational software for children without breaking the bank
First off KDE and the Linux community are working hard to provide ways for children to learn. KDE Edutainment has many different applications designed for learning. One section is devoted to languages with games like hangman and anagrams to the ability to create flashcards to help you study vocabulary and even programs to help study Latin, Spanish and Japanese.
Of course mathematics is also focused on with the ability to graph equations and work with geometry, fractions and percents.
Along with mathematics of course is science with programs related to astronomy and chemistry.
For younger children there is a Simon Says type game. There is also an application to practice touch typing, geography, and the LOGO programming language to help teach programming and logic.
For those without Linux there is Owl & Mouse Educational Software. Among the software they provide are programs to help children learn to read. These include software for phonics, games to learn the alphabet. Also there is a geography section to study countries of the world.
While learning to read children can play an adventure game. Children with this particular program can learn about 105 of the most common words and have to read sentences of up to 12 words. That being said they also progress at their own pace and can go back to previous parts whenever they like.
Other pieces of software here include making a farm or a village, print maps that can be colored or put together in a puzzle format, learn about coats of arms, build a castle, learn how letters sound and learn about medieval life.
Their software is either online-based or free with some currently costing a little but becoming free in the future.
Is your computer a statistic too?
On a brighter note there has been a drop in the number of viruses and worms over the last 15 months. Hopefully this translates to people getting less viruses and not to rootkits becoming better at hiding.
Also worthy of noting, hacker produced code has only been removed 10000 times while most of it was from other sources. For example the famous Sony BMG rootkit was removed 420000 times on 250000 computers.
Labels: adware, microsoft, spyware, windows
More Blu-Ray writers coming out
The capacity of these discs currently is up to 50 GB. This may sound like a lot of storage space and more than you would need, but think of backing up a hard drive, many of which are now 60 GB to 80 GB. Also the quality of sound and video can be a lot higher when you have more space to put them on. Think about the camcorders with the possibility of writing to such discs similar to the ones now that will write to a DVD.
LG's drive is able to use all previous optical disc format including DVD, DVD+R, DVD+RW and DVD-RAM. This allows any blank discs to be used in the drive. The drive is able to burn at 4x speed, while most are only recording at 2x.
Labels: blue-ray
HP's new innovation in digital photography
One very amazing product is a portable photo printer that will print 4x6 and 5x7 photos with the ability to store 4GB worth of photos in its internal memory. This printer includes an handle and optional battery so you can take it with you whereever you go. This is made possible with the HP Photosmart A716 Photo Printer. Similar but with even more features and even more amazing is the HP Photosmart A436 Portable Photo Studio Printer and Camera. This not only allows you to take pictures with its built in Photosmart M627 Digital Camera, but it also allows you to edit and print them.
Of course there also is the release of a couple more Photosmart printers including one All-in-One that can be expected in September. Also included in the new products is two 7.2 megapixel digital cameras - HP Photosmart R967 and R827.
To find out more about these products and others go here.
Labels: camera, HP, photography, printing
19 August 2006
Fake HSBC website asks for your deposits
If you have given any information to this site you should contact HSBC at 2 748 33 22 or the Commercial Crime Bureau at 2 860 50 12.
Labels: internet, phishing, safety
Protect your computer from rootkits
This software is able to detect and eliminate active rootkits which anti-virus usually cannot do. It also does not provide the user with a list of suspected objects so the non-technical person is able to use it without risking damaging anything. It also allows the user to still be using their computer while it is testing for rootkits without issuing any false positives.
This stand-alone application will only be available until 1 October 2006. After that you would have to purchase F-Secure Internet Security Suite.
F-Secure Internet Security Suite will cost you just under £39 and includes virus and spyware protection, a firewall and a spam filter. The virus protection is updated daily from AV-Test.org allowing for extremely fast protection from new viruses. It also can protect and prevent children from viewing certain Internet content and has the ability to prevent children from surfing the web for too long. Also this software can be set to allow only certain applications to access the Internet. This software supports all versions of Windows from 98 to XP except for server editions of Windows 2000.
Labels: rootkit, security, trojan
Create 3-D models with Google's SketchUp
SketchUp allows you to select a shape then by dragging your mouse you can modify the shape, creating your desired 3-D shape. Color and texture can be applied within the program as well as real-time shadows that allow you to see exactly how light would fall on your model. To save time you can select from thousands of shapes that have been pre-drawn to add into your design.
Users can also take part in a weekly 3D Challenge. Each week a new challenge will be posted by SketchUp requiring people to use only SketchUp with other restrictions to create some object. The current one for this week involves creating a logo for the SketchUp Wiki (SuWiki).
There is also a professional version approved of for commercial use that will cost you $495 and includes more features.
Labels: Google, images, sketch-up
Why you don't have to defragment Linux
You can find the information on:
OneAndOneIs2
18 August 2006
Copy a hard drive without spending a fortune for tools
There are some free tools for doing such actions that are worth looking into. DriveImage XML is one such tool. It allows you to backup a hard disk while it is still in use eliminating the need to choose a time when you are sure that the drive is not being used or taking the drive offline while backing it up. It also allows for the drive to be restored without a reboot, speeding the process considerably.
HD Clone is another tool with the only limitation being the transfer speed while copying data. It is also primarily for copying data from one hard drive to another of the same size or larger. It is very useful for people upgrading their hard drive and don't want to lose any of the data.
Ranish Partition Manager is a tool that works with Linux, Windows, FreeDOS and FreeBSD allowing people to create, copy, and resize the partitions on their hard drive. It works from a command line interface and a simulation mode that allows users to experiment before they actually change their drive's partition tables.
Labels: backup, harddrive, restore
Easy and cheap security for your computer.
The first and of course most obvious is to install an anti-virus and anti-spyware program. Of course you can pay for it, or you can get both of these applications free of charge. Their recommendations include AVG Anti-Virus and Avast 4 anti-virus programs. Personally I would add Avira AntiVir to that list as well. It works with Windows and Linux and virus definitions are updated several times a day. Ad-Aware, Spybot Search & Destroy, and Microsoft's Windows Defender are their choices for anti-spyware software. The first two are fairly good although I don't know much about Windows Defender.
Their next piece of advice includes testing your security. Their first choice I consider a very good choice having looked at a few. The advise going to Shields Up which will analyse you computer for multiple vulnerabilities and give you advice on how to solve the problems.
Their third tip goes into securing your wireless network by disabling SSID broadcast, filtering MAC addresses and changing your network name from the default. Which is very easy with most wireless devices, although they advise using Network Magic to make it even easier.
Next and probably as important as anti-virus in modern computing install a firewall. They advise using a free firewall including the one that is a part of Windows itself and Zone Alarm. While these are helpful and I especially like Zone Alarm (yes I know many will disagree with me, but it's the simplest to get working that I have seen), I would actually go out and spend the little bit of money for an actual NAT router with a firewall included. It protects you from anything unwanted actually making it to your computer so long as you configure it correctly.
Fifthly they advise encrypting any data that you don't want others reading. Their choice of progams is Cryptainer LE. It seems very easy and useful for most users. If you are looking for an ability to encrypt and decrypt data for sending or just storing on your system and aren't afraid of a command line interface, I'd advise GnuPG which allows you to create public and private keys and import other people's keys as well as sign your data.
The sixth point is protecting yourself from phishing. Their choice is the Google Toolbar or Netcraft Toolbar which will warn you if a site is being used for phishing.
The next point is to disable file sharing. When you do have to share files within your network never share an entire drive. Share only the folder that you actually need others to see.
Point number eight involves surfing the web anonymously. Their choice here is using the website The Cloak to surf through or to find an anonymous proxy server to connect through. The easier and one to think about the least is using a proxy server. It takes a minute or two to set up, but from there you don't have to worry about it unless the server stops working.
Also opt-out of cookies that track your surfing habits. There is a list provided in their article of places that allow you to place a cookie on your system that tells their cookie not to install and not to trace your habits.
Their last point is to protect yourself from scams on eBay. These scams involve someone buying something and then ask you to ship it overseas to someone else. They say that they will pay after you ship it or they will send you a fake confirmation of payment.
Don't be so quick to say goodbye to Windows Updates
Those testing Vista Beta should know that Microsoft does not post information about beta products on its security bulletins so it may be advisable to go to the following site to see which patches are released.
With this many bugs and vulnerabilities coming out so soon in the life of the OS, it does make one question the future security of Vista especially when some of the patches released recently for previous versions of Windows also apply to Vista.
Microsoft states that the beta version of Vista will no longer be supported when RC1 is released and the pre-release will not be supported when Vista is finally released.
For more information and other windows information go to the Windows Blog.
Labels: microsoft, update, vista, vulnerability, windows
17 August 2006
New Windows Worm for today
The best solution for this is the obvious one to of course keep your anti-virus programs updated and keep them monitoring your system.
Labels: IM, microsoft, vulnerability, windows
More security for the home or small office.
The Securespot Internet Security Adapter from D-Link connects between your modem and router and works with computers running Windows XP or 2000 or Mac OS X with Internet Explorer or Firefox.
All administration is done through web-based forms and the device is updated automatically as soon as new definition files are available to provide the most protection.
You will need to enter some billing information into the system as some of the features do have a cost. The device itself costs about $100 and includes a one-year license for up to 4 computers. The following years the users must pay $79.99/yr. for the license for the first 4 computers and $19.99 for each additional license. Not so expensive when you consider the cost of Norton or other security systems which are about the same or even a little more for each year's use. Also this device does more than just general security which would involve paying even more for similar features.
Labels: adware, antivirus, firewall, internet, safety, security, spam, spyware
Great research tool from Google
Simply by right clicking a section of text or an image a user can tell the software to remember that section. The source of the information will be displayed just below or at the end of the section. Later on the main page of your notebook you can view all of your notebooks and organize the articles within them just by dragging and dropping the information. There is a section to search your notebooks or to search for information in other people's notebooks and you can even publish your notebook page for others to view. This would be especially useful for people working together on a research project. They could share information without actually having to bring the information to one physical place. There is also the ability to add headings to sections of clips and of course to rename and delete your notebook.
With the extention users can open and close the notebook just by clicking a little icon on the status bar of their browser for the easiest accessability available. Also for all of us running Opera or Safari will have to wait for the extention as it is not currently available, but may be in the future.
I strongly encourage students to look into this. It seems to be one of the best options for storing information while doing online research. Also people working in offices and businesspeople should look into it as it should be very useful in storing information related to researching venues for meetings and conventions or any other daily business activity involving bringing information together. This product I will decrease the time required to gather any type if information and present it.
Labels: education, firefox, Google, IE, internet
16 August 2006
Lawyer suing Take-Two over their new game Bully
Of course the game that Jack has decided to attack is Bully from Rockstar Games. While Rockstar has a tendency of producing rather violent games (the GTA series), this one seems completely different. The trailer and screenshots show a rather comical environment that portrays a student in standard school situations involving being bullied. There is no blood involved and no killing just normal boyish pranks and fights that many of us have been involved in to some degree or another.
Jack seems to be under the demented impression that there is some huge conspiracy created by Rockstar Games and the screenshots and trailers show shots that are intentionally less violent than the game will be. He is demanding a pre-release copy of the game to review it and if he deems it inappropriate then to try to prevent it from being released. He is under the idea that the game poses a risk of copycat violence in schools and has been quoted referring to the game as a way to rehearse Columbine type events in schools.
Take-Two Interactive and Rockstar Games have so far completely ignored him so he has filed a suit in Florida Circuit court under Florida's nuisance law. In the complaint Jack has claimed that Take-Two has directed harassment against him, citing a call he received from Oregon that included death and sexual threats.
I guess Jack can't understand that his stupidity is being displayed on computer related sites around the world and that maybe someone would actually take it into his or her own accord to call him to express their opinion of him.
Jack's complaint can be viewed here.
The trailer and screenshots from Bully can be seen here.
Easy home encryption
Gnu Privacy Guard (GnuPG) is command line only although there is a GUI available for Windows. It completely implements PGP (pretty good privacy) and the algorithms used are completely unpatented. GnuPG will decrypt and verify PGP 5, 6, and 7. Also other algorithms can be easily implemented using modules.
This application allows for the creation of private and public keys and the import of public keys to enable a file to be encrypted for a specific person.
The different types of keys that are available are DSA and ElGamal, DSA, and ElGamal, the first of which is default. The size of the key can be anything above 768 bits and is recommended to be no more than 1048 bits. While larger keys are of course more secure, they also take longer to encrypt and decrypt.
Those interested in learning more about this application can go to the GnuPG website.
Labels: encryption, GNU, linux, Mac, OSS, windows
Crashes come with newest Microsoft patch.
Microsoft has a temporary fix for this issue, but the only way to get it is to call Microsoft support. For those who can wait, another patch to fix this problem is expected on August 22.
Labels: IE, microsoft, patch, update, windows
IBM, Transitive increase Linux software options
While Transitive will do all of the development on the software, IBM will handle the distribution, shipping it as a standard application on certain Power-based servers made by IBM.
Intel is also working with Transitive to let people port software from RISC chips to x86 chips.
Apple has built their Rosetta technology on this tool to allow older Mac software to run on their new Intel-based processors. Silicon Graphics as well uses it to help the migration process from older MIPS processors to Intel Itanium.
This software translates the software as it is loaded and run. To improve the speed some common instructions are stored in memory to prevent having to translate them every time they are needed. Of course working this way is not as fast as running it in the native environment. The most important aspect is still that it allows the software to actually run. So long as it isn't too slow, which seems that it's not as it is used in so many different situations even now.
With the combination of this and Wine, Linux should be able to run most any software. There goes the issue of people complaining that there isn't any software for Linux.
FDIC isn't going to email you for your bank information
There is a new scam to get your bank and other information by instructing you to file for the FDIC protection system. The email that you would receive also says that your bank sent them an application to secure your account.
Think about the situation for a moment, would the FDIC actually email you or would they send a formal letter? Secondly, if your bank sent the application why does the FDIC need you to complete another form? Lastly, as I recall banks in the US all are insured by the FDIC, if they weren't you probably would have chosen a different bank.
Labels: email, phishing, scam, spam
15 August 2006
Two Companies Sued for Spamming
RR Media and Data Stream Group both face up to $10,000 in fines and possibly other charges if found guilty.
The charges were brought up after an investigation involving complaints of inappropriate emails for alcohol and gambling being sent to address registered as belonging to children.
Parents living in Michigan can go to the Protect MI Child website where they can register their children's email address, instant message address and fax number or file complaints relating to the Michigan Child Protection Registry Act.
Let's hope more people start fighting against spam using whatever means available even if it's only sending messages to ISPs.
The Linux laptop has come
Lenovo will also provide Linux support for these computers in a complete solution for users. This will help make the switch between a Windows environment to Linux a lot easier.
Expect the official announcement from Lenovo at Linuxworld today and the computers should start shipping soon after that.
Labels: laptops, linux, os, suse
1 Terrabyte hard drives expected this year
I would ask what a person would need that much storage space for, but not that long ago I was thinking I would have difficulty in filling a 10 GB hard drive. That was full in less than two years. Currently with the creation of High Definition video, we have one way of filling such a drive.
Retail prices for hard drives are about 50 cents per GB of storage space so a TB drive should debut at around $500 unless the technology becomes cheaper to make.
This year is also marking the 50th birthday of the hard drive on September 13. In 50 years the hard drives have gone from a 24 inch wide monster weighing in at a ton to something that will fit in your hand and holds several GB's
Labels: harddrive
14 August 2006
Anticipated worm released. Now how much damage will it do?
Cuebot-L and Cuebot-M worms were discovered yesterday. These worms spread through chat programs and then through network shares on infected networks. Both of these live in the registry of Windows and allow outside computers to access the infected computers.
The good news is that if you have patched Windows after last Thursday there was a patch for the vulnerability this worm exploits, so those computers are safe.
Also most anti-virus programs are able to protect against it if they have been updated very recently. The problem is that not all anti-virus programs run constantly, which leaves the computer open to get the worm, but at least it should be able to be removed as well.
So the only thing to do is to wait and see if it affects many computers.
Labels: antivirus, microsoft, os, vulnerability, windows, worm
Spam for your computer, mobile phone, and dinner
Verizon Wireless says they are blocking about 50000 spam messages a day, while one California resident told Cingular to block all of his text messages because of spam.
For more information on the issue see this article.
OpenOffice too has its flaws, just lacks attackers
OpenOffice isn't nearly as popular as MS Office so most people don't focus on it to create viruses, making it safe while still having holes in its security. OpenOffice simply hasn't had people trying to break the security so the programmers working on the suite haven't noticed any errors.
The problems come from inadequate security checks and its extreme flexibility.
There is a bright side though, one of the flaws discovered has already been fixed and OpenOffice.org is working on other theoretical flaws that were discovered by the researchers.
Labels: openoffice, OSS, vulnerability
13 August 2006
Technology investment for children's education
For about $60, parents can purchase something similar to a Gameboy that teaches letters, phonics, spelling, numbers, math, etc. Another device that connects to a television provides similar learning practice for the same price. Even better though there are some services that are free via the Internet. Some notable websites include Toledo Public Schools (about 100 "learning resources") and Ohio Department of Education. Test Prep Review is for students preparing for the SAT and other tests. For about $70 parents can purchase Inspiration, which is a brainstorming application that can help with writing and organizing your thoughts. A program I would personally recommend though is Freemind which is a very good Open Source application that I have used myself. And don't forget to include Google and Wikipedia in your choices of learning materials. Wikipedia sometimes needs to be used with some judgment as not everything there is as useful as it should be, but for the most part it is very useful and accurate.
I personally believe very much in the power of technology for learning and have used a computer myself when I was young to learn. The main point is for parents to limit what the children do on the computer. I don't mean limit their access to things but make sure they are using it for learning more than for playing. Games are fine so long as there is some educational value in them. Also don't try to save money on the educational products. I don't say buy the must expensive, but buy something you can afford that will last for several years and will provide your child with good quality material. While I like the idea of the $60 and $70 products that Warren mentions I would encourage parents of children about 5 and above to save a bit and purchase an actual computer for the child. If you focus it only on education and not gaming the computer should be able to last the child five to eight or more years and still be ok for the child to use for school projects. There is an investment that has real value if you can keep it through a child's entire primary school time. There are very few other products that you can buy children that are so long lasting.
Labels: education, internet, OSS
Widespread Windows worm expected
nCircle warns that the worm could be on the scale of MSBlaster a few years ago and could come in two weeks or two hours. A worm which exploits this vulnerability most probably will be widespread,spreading very quickly and causing many networks to go down for some time.
For the full story read nCircle's press release.
If you don't know if you're protected eEye Digital Security has a application to test for the vulnerability.
Labels: microsoft, vulnerability, windows, worm
12 August 2006
One computer that broke the network's back
An investigation has begun into the inappropriate actions of the firemen and paramedics. What is interesting is that no investigation is being held as to how one computer with a virus could spread it to the entire city's network shutting it down. It seems a new system administrator should be the first thing that they look into, preferable one who knows what he's doing and how to actually secure a network to prevent such widescale damage.
Labels: internet, networking
11 August 2006
RNDR Spam increase seen between 1600% and 4000%
Spammers have changed their methods using RNDR (Reverse Non-Delivery Report).This method involves a spammer to send a spam to a fake account on their server and to address it from the actual intended recipient of the spam. Then when their server creates and sends the NDR it sends it to the victim. This bypasses most spam filters by making it seem that the message originated at the victim.
In the past email accounts would be harvested from the Internet and then used to send these spams, but currently there is a trend developing to create random strings to generate valid email addresses. The problem with this is that it can greatly overload an email server and can also be used as a DOS attack. This technique does successfully reach valid email accounts, but it creates a huge increase in email volume as well.
Aside from the extra messages and traffic, companies also run the risk of being blacklisted for generating spam that actually never really came from them.
Comply with Chinese rules or give people no services?
Labels: Google, internet, yahoo
Semantec has more concerns over Vista's security.
In short, this is yet another reason why Vista is not as secure as Microsoft would have you believe.
Labels: microsoft, security, vista, windows
First FREE phone to phone calling service being tested
VoiceOne is testing a service within the US that allows people to call land-lines and mobile phones free of charge using their own telephone. The only requirement is that you sign up. There are no other conditions. After signing up you will be able to send SMS messages, leave text messages on the system and send email to the person of your choice. You are also able to put a link on your webpages to allow people to call you directly free of charge just by clicking the link.
Some of the features related to the actual calling include being able to block numbers, receiving sms messages about missed calls and messages left on the system for you.
10 August 2006
Skype emails don't have to be from Skype
Currently there is one advantage that will prevent many people from falling victim, the email and page is in Turkish. That being said it would take no effort to change it into any other language. Most importantly is to be careful where you download Skype or any application from and to never trust emails asking you to download something.
Labels: adware, email, skype, spam, spyware
HSBC online banking flaw leaves customers at risk
It is guaranteed that a person using this method can access the account in 9 tries but will probably get in in 5.
On the bright side the bank says that they have not seen this method used and the bank has less fraud online then the average. The bad news is that now that it is publicly available it is more likely for someone to want to try to do this.
Labels: internet, security, vulnerability
09 August 2006
Hertz use of RFID cards for fast rentals
The process being tested involves people with the card being able to walk directly to the car that is reserved for them and use the card against the windscreen to open the door and after acknowledging that they have a driver's license they can start the car with a push button. This does leave very little challenge for someone who clones the RFID to call Hertz and ask to rent a car on the other person's name and then use that cloned card to access the car with no Hertz employees aware of the problem.
While I agree with the use of the RFID cards as an improvement, I also hope Hertz is prepared to address the possible issue of unauthorized use of the cars.
Labels: rfid
08 August 2006
New scam will tell you the secret of the JFK murder.
The best option is to ignore this message and any other similar type of message. The exact message can be found here.
07 August 2006
AOL's facelift seems impressive
Today's latest announcement is a free online anti-virus program. They are making this available to all internet users. This anti-virus is from Kaspersky Labs and updates hourly to protect users from viruses, spyware, trojans. It also features real-time scanning. Internet Explorer users will get yet another toolbar with this to add password manager and pop-up blocker features.
Yes this toolbar is a nice feature but it is one more thing to reduce the size of the viewing area of your webpages. I'm spending most of my time trying to get as much viewing area and as little toolbar area.
For those interested in this it can be downloaded here.
Also announced in a press release earlier this month, starting from September 5 GB of online space will be free for anyone. Also anyone interested in more space can purchase a 50 GB account, although it doesn't give the price of that. In addition they are offering free uploads and downloads from the storage space, a drag and drop interface between your computer and the online storage site, the ability to share the files and folders with others, and the ability to use AOL Pictures to print any photos on the drive. Anyone interested will have to have an AIM or AOL screenname.
AOL is also planning to release its e-mail, messaging, social networking applications and security features. The most impressive announcement is the intention of allowing people to have a local phone number with unlimited incoming calls free of charge. I admit I am not a fan of AOL but I will be looking into that feature.
Vista Already Hacked
We can be happy that this was found before the release of Vista and not after it, but that does leave the question as to whether other equally serious issues are hiding inside Vista.
I do have to congratulate Joanna Rutkowska from COSEINC for finding the hack. Has it even been a week since Microsoft challenged the hacking community to break Vista's security?
Here is what Joanna Rutkowska has to say about it.
Labels: blue pill, microsoft, vista, vulnerability, windows
06 August 2006
Cool Characters for Skype
You can find it and many other skype products here.
Is Vista really so secure?
The results of the testing has shown many bugs in many protocols some of which have been fixed in previous versions of Windows, only to show up again in Vista. There bugs included IP redirection attacks, the LLTD protocol for creating network maps was able to be decoded with very basic knowledge of how it actually worked. Microsoft has combined IPv4 and IPv6 support into the same stack, which is the first time it has been done in Windows, meaning this has never been tried in a real environment and also techniques used to protect IPv4 either don't exist or are very young for IPv6. This means we don't know how well they work. Several ports are configured in Vista that are not commonly used and sending data to some of them can cause the computer to either stop responding or crashes (this has been resolved). Some methods of attacking stacks from the past have successfully worked with the Vista stack that all other network stacks have solved. The current use of IPv6 also creates methods of gaining a connection to the computer.
I won't list all of the errors which have been found but with the errors that have it hints at a strong possibility that the network stacks have been rewritten and that more errors are probable than just the ones that have so far been found. It also raises questions about whether Vista is really as secure as Microsoft would like us to believe.
Symantec's full report can be found here.
Labels: microsoft, security, vista, vulnerability, windows
05 August 2006
Google and stopBadware.org team to create safer search
This should help many people avoid downloading malicious software. Although it may be useful to browse through stopbadware.org's reports to see if any information is located for sites that you regularly visit if there is a possiblity that they could contain such applications.
Labels: adware, Google, internet, spyware
Backdoor Trojan Warning
Aside from finding information about your computer, it can also download files to your computer, take files off your computer, run or end an application, reboot your computer and load web pages. A complete list of the commands and activities this trojan can do can be found here.
If this trojan is detected on your system make sure it is not only removed from the system but also that it is removed from the Windows Registry or it will just reload itself when you reboot.
Firefox vs. Opera
The current version of each has a lot of similarities. One feature I like more with Opera is the way they deal with the tabs. Opera has automatically a close button on each tab. With Firefox a similar feature can be gained with the installation of an extension which allows you to close the tab with a double click. Also still on the topic of tabs, Opera seems to have better support of their tabs and every window that opens will create a new tab unless you tell it to do different. So links that pop-up smaller windows still will but those windows will be directly linked to the tabs. Firefox has some difficulty in getting every window into a tab. The preview feature of the tabs in Opera is also very nice when you have a lot of tabs open. I would prefer the option of previewing links on web pages in Opera as one extension allows in Firefox.
Regarding extensions and widgets, Opera has some very nice widgets. Firefox has some as well and has the advantage of having a lot more extensions to offer. Many of the Firefox extensions are to give Firefox the same features as Opera, but a lot give it other very useful features as well.
Opera has one feature not found anywhere in Firefox that is exceptionally nice. I'm sure everyone has at one time or another closed either a tab or their browser by mistake. For users of Opera who close a tab accidentally there is a "trash" that holds the pages that you've visited to recover in that situation. It won't help you if you closed the browser, but if you use the feature of starting Opera where you left off the previous time, that won't be an issue as everything will already be there.
I encourage everyone to try both Firefox and Opera and see which one you like better. Both are very good browsers. Internet Explorer users might try Firefox first as it seems to me to be a kind of a step between IE and Opera. All web pages will look a lot closer to the way they do in IE and will behave the same way, while pages can sometimes behave strangely in Opera.
Labels: firefox, internet, opera
04 August 2006
More security flaws shown at Black Hat conference
Xerox has issued a patch for this in February. Only those with a Workcenter or Workcenter Pro 200 printer need to worry and only if you bought it between October '05 and June '06. The issue has been patched. There is a patch that addresses the issue that can be found at http://www.xerox.com/security.
Labels: printing
03 August 2006
Warning for those using wireless connections.
Intel has just the day before released a patch for their wireless cards to probably prevent this type of exploit. Hopefully other companies will do the same soon.
This probably will not be such a big risk to people who use wireless networking in their homes, but for people who like to visit cafes and other places with wireless internet access, this can be a very big security risk.
Labels: networking, security, vulnerability, wireless
02 August 2006
Firefox exploited
So far the attack is not very widespread containing itself mostly in Australia.
For the best protection, make sure you download only files you trust and keep up to date on the Firefox patches.
For more information look here.
Labels: firefox, vulnerability
01 August 2006
Photosynth
Seeing the video of the program in use, it seems like a very nice application and I would be willing to try it. If it works well it will be one of the better applications for creating panoramas.
You can find out more information from Microsoft here.
Labels: 3D, images, microsoft, photosynth
More to worry about
In the near future it is said that these sort of attacks with ransomware may be unable to be prevented. Also the problem arises when the "hackers" use the information from your computer to do more than just demand ransom for a key. With a key 660 characters long, it may be very hard to discover the key yourself.
To learn more go here.
Labels: adware, encryption, ransomware