Windows 7 Licensing a "Disaster" For XP Shops

Enterprise licensing for Windows 7 could cause major headaches and add more cost to the Windows 7 migration effort, InfoWorld reports. Under the proposed license, businesses that purchase PCs with Windows 7 pre-installed within six months of the Oct. 23 launch date will be able to downgrade those systems to XP, and later upgrade back to Windows 7 when ready to migrate users.

PCs bought after April 22, 2010, however, can only be downgraded to Vista — no help for XP-based organizations, which would be wise to wait 12 to 18 months before adopting Windows 7, so that they can test hardware and software compatibility and ensure their vendors' Windows 7 support meets their needs. XP shops that chose not to install Vista will have to either rush their migration process or spend extra to enroll in Microsoft's Software Assurance program, which allows them to install any OS version — for about $90 per year per PC.

Microsoft to Release Record Setting Number of Critical Security Updates

Microsoft today issued 10 security updates that patched a record 31 vulnerabilities in Windows, Internet Explorer, Excel, Word, Windows Search and other programs, including 18 bugs marked 'critical.' Of the 10 bulletins, six patched some part of Windows, while three patched an Office application or component, and one fixed a flaw in IE. The total bug count was the most patched by Microsoft in a single month since the company began regularly scheduled updates in 2003. The previous record of 26 vulnerabilities patched occurred in both August 2008 and August 2006.

'This is a very broad bunch,' said Wolfgang Kandek, CTO at Qualys, 'compared to last month, which was really all about PowerPoint. You've got to work everywhere, servers and workstations, and even Macs if you have them. It's not getting any better, the number of vulnerabilities [Microsoft discloses] continues to grow.'

Microsoft to Excel Users: Wiggle Your Mouse

I don't usualy post comical things on my blog, I try to keep it informative and helpful, but this is just too funny to pass up.

We've all heard of crazy "workarounds" as they're called - this one takes the cake.

This is a workaround for a data import function into Microsoft Excel. What is Microsoft's grand solution if it locks up while you're attempting this? Wiggle your mouse.

Method 2: Move Your Mouse Pointer

If you move your mouse pointer continuously while the data is being returned to Microsoft Excel, the query may not fail. Do not stop moving the mouse until all the data has been returned to Microsoft Excel.

NOTE: Depending on your query, it may take several minutes to return the results of your query to the worksheet.


Read more at: http://support.microsoft.com/kb/168702

Password Stealer Found on New Netbooks

An interesting development that Kaspersky Labs stumbled across.. They purchased a new M&A Companion Touch netbook in order to test a new anti-virus product targeted at the netbook segment, and discovered three pieces of malware on the factory-sealed netbook. A little sleuthing turned up the likely infection scenario — at the factory, someone was updating Intel drivers using a USB flash drive that was infected with a variant of the AutoRun worm.

"Installed along with the worm was a rootkit and a password stealer that harvests log-in credentials for online ... To ensure that a new PC is malware-free, [Kaspersky] recommended that before users connect the machine to the Internet, they install security software, update it by retrieving the latest definition file on another computer, and transferring that update to the new system, then running a full antivirus scan."


Gartner tells businesses: forget about Vista

IT analyst firm Gartner has told businesses to skip Vista and prepare to roll out Windows 7.

Companies have traditionally been advised to wait until the first Service Pack of an operating system arrives before considering migration.

However, Gartner is urging organisations that aren't already midway through Vista deployments to give the much-maligned operating system a miss.

"Skip Vista and target Windows 7," Gartner analysts Michael Silver and Stephen Kleynhans advise in a research paper. "Preparing for Vista will require the same amount of effort as preparing for Windows 7, so at this point, targeting Windows 7 would add less than six months to the schedule and would result in a plan that is more politically palatable, better for users, and results in greater longevity."

Even businesses that are midway through planning a Vista migration are urged to consider scrapping the deployment. "Consider switching to Windows 7 if it would delay deployment by six months or less," the pair advise. "The further you are withyour Vista plans, the more sense it makes to continue."

Companies who are in the midst of a deployment should carry on, the Gartner team says, although they should plan to move again to Windows 7 in "late 2010 or early 2011".

The Gartner experts say all companies should move off Windows XP by the end of 2012 to avoid problems with application compatibility.

Read more at http://www.pcpro.co.uk/news/252955/gartner-tells-businesses-forget-about-vista.html#



ARS TECHNICA: 2009 Flash Drive Roundup

From Ars: "When we last took an in-depth look at USB flash drives in 2005, the landscape was a bit different. A 2GB drive ran nearly $200, and speeds were quite a bit slower then. At the time, we noted that while the then-current crop of drives was pretty fast, they still were not close to saturating the bandwidth of USB2. To top it off, a good drive was still going to set you back $50 or $70—not exactly a cheap proposition. Since our first roundup, this picture has changed considerably, and it leads to a question: has the flash drive become an undifferentiated commodity, just like any other cheap plastic tsotschke that you might find at an office supply store checkout counter?

Consider the following factors:

  • The majority of flash drives sold are either 4GB or 8GB, which is more than plenty of storage for most people.
  • Most of the drives in this size range are under $20.
  • Accessories (like neck straps, USB extension cables, spare caps, etc.) are no longer included.

Normally, twenty dollars is not something that most of us would think twice about, but don't most of us still want to know that we are getting our money's worth? To test this commodity theory, we selected a cornucopia of mostly 4GB and 8GB USB flash drives ranging from $9 to $30 dollars (average: $19.00)

Read more on Ars website (www.arstechnica.com) ..

Microsoft's Life Cycle for Windows - The Death of 2000, and soon XP.

I've long recommended to my clients that they stay within Microsoft's life cycle with respect to their Windows operating systems. Most of them, even after explaining it, I suspect deep down they think it's a scheme to extort more money out of them to upgrade. Well, here's a perfect example to backup my claims.

This is why NO ONE should be running Windows 2000 or Millennium (ME) anymore (or earlier, i.e. 98, NT, 95, etc). The last sentence sums it up very nicely. Even with a current anti-virus subscription, you are NOT protected!

"Recently, the Conficker/Downadup worm infected several hundred machines and critical medical equipment in an undisclosed number of US hospitals. The attacks were not widespread; however, Marcus Sachs, director of the SANS Internet Storm Center, told CNET News that it raises the awareness of what we would do if there were millions of computers infected in hospitals or in critical infrastructure locations. It's not clear how the devices (including heart monitors, MRI machines and PCs) got infected. Infected computers were running Windows NT and Windows 2000 in a local area network (LAN) that wasn't supposed to be Internet accessible, but the LAN was connected to one with direct Internet access. A patch was released by Microsoft last October by November that fixes the problem, but the computers infected were reportedly too old to be patched."

Researchers Find Massive Botnet On Nearly 2 Million Infected Consumer, Business, Government PCs

More than 70 government-owned domains hit, and nearly half of the overall infections are in the U.S.

Researchers have discovered a major botnet operating out of the Ukraine that has infected 1.9 million machines, including large corporate and government PCs mainly in the U.S.

The botnet, which appears to be larger than the infamous Storm botnet was in its heyday, has infected machines from some 77 government-owned domains -- 51 of which are U.S. government ones, according to Ophir Shalltin, marketing director of Finjan, which recently found the botnet. Shalltin says the botnet is controlled by six individuals and is hosted in Ukraine.

Aside from its massive size and scope, what is also striking about the botnet is what its malware can do to an infected machine. The malware lets an attacker read the victim's email, communicate via HTTP in the botnet, inject code into other processes, visit Websites without the user knowing, and register as a background service on the infected machine, for instance. The bots communicate with their command and control systems via HTTP.

Botnet expert Joe Stewart says it appears to be similar to other downloader-type botnets. "It looks a lot like other downloader bots out there," says Stewart, director of malware research for SecureWorks. "It has a system for installing other malware and getting paid for it. The first stage is to get the bot piece onto the machine, and then they get paid to install other malware."

Finjan says victims are infected when visiting legitimate Websites containing a Trojan that the company says is detected by only four of 39 anti-malware tools, according to a VirusTotal report run by Finjan researchers.

"We don't have our hands on the actual [stolen] data, but we can tell a lot of what they [may be] doing with it by the malware," Shalltin says. "They can use it for spam, [stealing data], and almost almost anything."

Around 45 percent of the bots are in the U.S., and the machines are Windows XP. Nearly 80 percent run Internet Explorer; 15 percent, Firefox; 3 percent, Opera; and 1 percent Safari. Finjan says the bots were found in banks and large corporations, as well as consumer machines.

Shalltin says it appears that the botnet operators may be buying and selling bots or portions of their botnet based on a communique Finjan discovered on an underground black-hat hacker forum in Russia.



Conficker Launches April 1 (and no this isn't a joke)

It's lurking in millions of PCs around the world. It's incredibly sophisticated and resilient, with built-in p2p and digital code-signing technology. It revels in killing security software. On April 1, the Conficker worm will activate.

The scariest thing about the Conficker worm is that literally millions of infected Windows PCs could be linked together to do its bidding. The second scariest thing is that no one really knows what its creator is going to do with this virtual army on April 1, when it's scheduled to contact a server for instructions. It's so bad, Microsoft has a running $250,000 bounty for the author, dead or alive. (Well, they probably want him alive, but they hate his guts.)

The New York Times' John Markoff rounded up some of the more ingeniously evil possibilities in a compelling article, the most sinister being a "Dark Google," postulated by University of California at San Diego researcher Stefan Savage, that would let bad people scour zombie machines all around the world for data to sell to other bad people.

But let's back up a bit. Conficker—whose weird name is a combination of "configuration" and a slightly more polite word for f***er, according to Urban Dictionary—actually began life as a lowly, "not very successful" worm in November, says Vincent Weafer, VP at Symantec Security Response. Weafer told us it exploited a Microsoft remote server vulnerability that had already been announced and patched the previous month, so the only systems that were vulnerable were the ones that weren't up to date.

The B release, pushed in December, on the other hand, was "wildly successful," says Weafer, infecting millions of unpatched computers because it's an aggressive little bastard—the first worm in years on a scale like Blaster. It has built-in p2p capabilities, and brute forces its way into open shared folders or printers, so it can crawl an office network quickly. It also piggybacks onto USB flash and hard drives. On top of all that, it's designed to be incredibly resilient, killing security software, disabling Windows Update, and digging down deep.

The C release came out this past month. It doesn't go after new machines—it's actually a payload for computers already infected with B. It transformed Conficker from a sneezing pandemic into a seriously nasty plague. With C, its p2p powers are extended further, with digital code-signing, so it only accepts trusted code updates from itself. That means security experts can't simply inject code to neutralize it. The patch also made Conficker better at killing security software. And it expanded the scope of the domains it tries to contact for instructions from 250 to 50,000, completely neutralizing security experts' previous tactic of seizing the domains. There's effectively no way to the cut the head off of this demon snake. The stage is set: On April 1, Conficker will reach out for the millions-strong zombienet's next set of instructions.

So what will happen? Well, no one knows for sure. Conficker's creator can do whatever he wants with his army. Launch massive denial-of-service attacks, setup the "Dark Google" syndicate, target millions of new machines, or generate a tidal wave of spam that'll crash against servers all over the world.

Most likely though, Weafer told us, Conficker's creator is motivated by money—they'll rent it out. And if Conficker's used as a massive doomsday tool, they'll "quickly lose the ability to make money" with it. A low key operation harnessing the power of computers that are mainly located in developing nations may not have a big impact, though it would certainly set a terrible precedent: Whatever Conficker's results, they will lead others to develop this idea in frightening new directions.

Conficker's innovative approach that utilizes p2p, code-signing and a distributed domain setup will very possibly serve as inspiration to other malware writers, who Weafer said "you can bet" are watching Conficker's success very closely, just as Conficker's creators have clearly learned from past malware. It's like evil open source.

That doesn't mean April 1 will be a "digital Pearl Harbor." If your machine is patched and up to date, the Microsoft Report's Ed Bott tells us, you'll probably be totally fine. And yes, you can get rid of it if you happen to be infected. There is an outside chance Conficker could turn into a massive parallel computer that borders on self-aware, come April 1, but more than likely, the day will come and go without you noticing anything weird, just some extra spam in your box for some V@ltr3xxx.

Conficker Worm Gets an Evil Twin

The criminals behind the widespread Conficker worm have released a new version of the malware that could signal a major shift in the way the worm operates.

The new variant, dubbed Conficker B++, was spotted three days ago by SRI International researchers, who published details of the new code on Thursday. To the untrained eye, the new variant looks almost identical to the previous version of the worm, Conficker B. But the B++ variant uses new techniques to download software, giving its creators more flexibility in what they can do with infected machines.

Conficker-infected machines could be used for nasty stuff -- sending spam, logging keystrokes, or launching denial of service (DoS) attacks, but an ad hoc group calling itself the Conficker Cabal has largely prevented this from happening. They've kept Conficker under control by cracking the algorithm the software uses to find one of thousands of rendezvous points on the Internet where it can look for new code. These rendezvous points use unique domain names, such as pwulrrog.org, that the Conficker Cabal has worked hard to register and keep out of the hands of the criminals.

The new B++ variant uses the same algorithm to look for rendezvous points, but it also gives the creators two new techniques that skip them altogether. That means that the Cabal's most successful technique could be bypassed.

Conficker underwent a major rewrite in December, when the B variant was released. But this latest B++ version includes more subtle changes, according to Phil Porras, a program director with SRI. "This is a more surgical set of changes that they've made," he said.

To put things in perspective: There were 297 subroutines in Conficker B; 39 new routines were added in B++ and three existing subroutines were modified, SRI wrote in a report on the new variant. B++ suggests "the malware authors may be seeking new ways to obviate the need for Internet rendezvous points altogether," the report states.

Porras could not say how long Conficker B++ has been in circulation, but it first appeared on Feb. 6, according to a researcher using the pseudonym Jart Armin, who works on the Hostexploit.com Web site, which has tracked Conficker.

Though he does not know whether B++ was created in response to the Cabal's work, "it does make the botnet more robust and it does mitigate some of the Cabal's work," Support Intelligence CEO Rick Wesson said in an e-mail interview.

Also known as Downadup, Conficker spreads using a variety of techniques. It exploits a dangerous Windows bug to attack computers on a local area network, and it can also spread via USB devices such as cameras or storage devices. All variants of Conficker have now infected about 10.5 million computers, according to SRI.



Microsoft Slaps $250K Bounty On Conficker Worm

The spreading Conficker/Downadup worm is now viewed as such a significant threat that it's inspired the formation of a posse to stop it, with Microsoft leading the charge by offering a $250,000 reward to bring the Conficker malware bad guys to justice. The money will be paid for 'information that results in the arrest and conviction of those responsible for illegally launching the Conficker malicious code on the Internet,' Microsoft said today in a statement, adding it is fostering a partnership with Internet registries and DNA providers such as ICANN, ORG, and NeuStar as well as security vendors Symantec and Arbor Networks, among others, to stop the Conficker worm once and for all. Conficker, also called Downadup, is estimated to have infected at least 10 million PCs. It has been slowly but surely spreading since November. Its main trick is to disable anti-malware protection and block access to anti-malware vendors' Web sites.

The Microsoft Windows 7 Upgrade Program

With Windows 7 set for release in Dec. 09, Microsoft is getting ready with their free upgrade program, which allows Vista users to switch to Windows 7 when it arrives. The folks at TechARP have consistently scored accurate scoops on Microsoft software releases. They have now revealed Microsoft's upgrade plans, schedules and even screenshots of the upgrade process.

"Conficker" Infects 9 Million Over the Weekend

The Conficker malware outbreak has continued to spread among corporate PCs in what appears to be the biggest IT security breach in the past seven years.

Initially it was reported Conficker, or Downadup, focused on machines that weren't patched with a Microsoft emergency fix released last October (MS008-067).

However since then, the bug has evolved and is now able to spread to patched computers through portable USB drives.

Once in the machine, the worm can browse through the network the computer is connected to and copy itself to other machines, according to the article. This means users do not have to be at their computers or even logged on for the bug to spread.

Infected machines can potentially reveal users' personal and financial information, though it is unclear if that is the objective of the cybercriminals behind the attack. With the presidential inauguration scheduled for today, it's possible the cybercriminals may act then, since they traditionally like to coincide attacks with large events.

The Internet GateKeepers at Google

"With control of 63% of the world's Internet searches, as well as ownership of YouTube, the NY Times reports that Google is the most powerful and protean of the Internet gatekeepers, exerting enormous influence over who can find an audience on the Web around the world. Deciding what controversial material does and doesn't appear on the local search engines Google maintains in many countries — as well as on Google.com, YouTube, Blogger, Picasa, and Orkut — falls on the shoulders of Nicole Wong and her colleagues, who have arguably been given more influence over online expression than anyone else on the planet. Some find Google's gatekeeper role worrisome: 'If your whole game is to increase market share,' says Lawrence Lessig, 'it's hard to do good, and to gather data in ways that don't raise privacy concerns or that might help repressive governments to block controversial content.'"

Which Web Browser is King?

There's really only one sanity test for a browser: whether it runs fast for you. A slow-loading, incompatible browser is one thing, but most modern browsers work fine for both Ford.com and Fark.com. The real issue is whether a browser loads fast for the sites you frequently visit.

It's a highly debatable topic, one that tends to be subjective and fraught with inconsistencies. For example, latency on the Internet can dramatically affect browser speed. One day, Google Chrome can load IGN.com faster than butter on a banana, the next day (say, when a new Gears of War 2 review posts), latency can slow the site to a crawl, and Chrome seems like a dud. That's why, when you see speed tests for browser that claim "Chrome loads faster" it's important to ask a few questions: loaded when, over what broadband speed, with what other apps running, on what machine?


Google Chrome

Speed, of course, isn't everything. We ran into an interesting compatibility glitch or two completing some of our tests. If a browser can't finish a particular benchmark, it doesn't get a score.

What does it mean, ultimately? For the average user, it may not mean much. But for those of us who spend vast amounts of time on the Internet, for work and play, browser performance is a big issue. Waiting for sites to load is no fun when you're trying to get work done.

Let's dive into the testing methodology. Continued...



Microsoft Takes 7 Years to Release Security Patch

Back in March 2001, a hacker named Josh Buchbinder (a.k.a Sir Dystic) published code showing how an attack on a flaw in Microsoft's SMB (Server Message Block) service worked. Or maybe the flaw was first disclosed at Defcon 2000, by Veracode Chief Scientist Christien Rioux (a.k.a. Dildog). It was so long ago, memory is dim. Either way, it has taken Microsoft an unusually long time to fix. Now, a mere seven and a half years later, Microsoft has released a patch. 'I've been holding my breath since 2001 for this patch,' said Shavlik Technologies CTO Eric Schultze, in an e-mailed statement. Buchbinder's attack, called a SMB relay attack, 'showed how easy it was to take control of a remote machine without knowing the password,' he said.

Windows 7 Benchmarks Show Little Improvement On Vista

InfoWorld's Randall Kennedy examines Windows 7 from the kernel up, subjecting the 'pre-beta' to a battery of benchmarks to find any signs that the OS will be faster, more responsive, and less resource-intensive than the bloated Vista, as Microsoft suggests. Identical thread counts at the kernel level suggest to Kennedy that Windows 7 is a "minor point-type of release, as opposed to a major update or rewrite." Memory footprint for the kernel proved eerily similar to that of Vista as well.

"In fact, as I worked my way through the process lists of the two operating systems, I was struck by the extent of the similarities," Kennedy writes, before discussing the results of a nine-way workload test scenario he performed on Windows 7 — the same scenario that showed Vista was 40 percent slower than Windows XP.

"In a nutshell, Windows 7 M3 is a virtual twin of Vista when it comes to performance," Kennedy concludes. "In other words, Microsoft's follow-up to its most unpopular OS release since Windows Me threatens to deliver zero measurable performance benefits while introducing new and potentially crippling compatibility issues."

Recession Proof: Improving Your ROI during down periods

While consumer spending has slowed down since the financial meltdown last year, these trends provide an opportunity, as well as a challenge, for small businesses today. Since you're reading this newsletter,Ă‚  you're already savvy enough to appreciate the value of smart web marketing - online marketing channels allow you to target your audience with special offers, unique up-sells and value-add propositions that can help increase your revenue even while overall consumer spending is down.

In today's economy, there are no "one size fits all" offers - each consumer responds to a different message, price point and feature set before deciding on a purchase. Given the ease of comparison shopping, there are dozens of vendors within each industry vying for new business.Ă‚  Since you can segment your search ads, landing pages and product offerings for each type of consumer, it's possible to out flank your competition through improved targeting.

Suppose you're a dentist serving a college town and looking to expand new clients. Rather than just providing standard ads with your contact information you can offer specials such as free teeth whitening when you refer a friend or 50% off initial visits for new students. These types of offers resonate with the demographic you are targeting, and, when combined with the proper graphics, can result in higher conversion rates.

Intelligent web marketing can help you generate new business during a recession, since consumers are always looking to save or upgrade their vendors. By providing a cost-effective, intelligent set of features for your consumers, you can grow your bottom line even as the economy is shrinking.

Fake popup study sadly confirms most users are idiots

For most of us, security issues happen to "other people"—we block popup ads, we carefully examine dialog boxes and, for those of us on the Mac platform, we snicker when confronted with something that attempts to mimic a Windows system warning. But everyone knows that they are exceptional—what's the behavior of a more typical user like? Some researchers have tested how college students respond to fake dialog boxes in browser popup windows and found that the students are so anxious to get the dialog out of the way, they click right through obvious warning signs.

The authors, who work in the Psychology Department of North Carolina State University, crafted a set of four fake dialog boxes. All of them contained the following warning: "The instruction at '0x77f41d24 referenced memory at '0x595c2a4c.' The memory could not be 'read.' Click OK to terminate program." One of the warnings was indistinguishable from the standard Windows XP system dialog, but the remaining three were had a number of warning signs that should tip off users to potential malware.

In all cases, mousing over the "OK" button would cause the cursor to turn into a hand button, behavior more typical of a browser control; all dialogs also had minimize and maximize buttons, while a second added a browser status bar to the bottom of the window. Finally, the most blatant one alternated between black text and a white background and a white-on-black theme. All of these should metaphorically scream, "This is not safe!"

The researchers then created a Flash application that would mimic loading a series of medical websites. They told a panel of 42 college students that they were supposed to watch as the sites loaded and then would be asked a series of questions about the sites. Instead, the fake dialogs were loaded in a random order and the users' responses were tracked.

Of the 42 students, 26 clicked the OK button for the "real" dialog. But 25 clicked the same button for two of the fakes, and 23 hit OK on the third (the one with the status bar showing). Only nine of them closed the window—two fewer than had closed the real dialog. In all cases, a few of the users simply minimized the window or dragged it out of the way, presumably leaving the machine's next user at risk.

Even this warning might not have helped

The response time, which tracked how long it took the users to perform any action, was not significantly different among the different dialogs, indicating that there wasn't even any thought expended on evaluating the fakes.

Follow-up questions revealed that the students seemed to find any dialog box a distraction from their assigned task; nearly half said that all they cared about was getting rid of these dialogs. The results suggest that a familiarity with Windows dialogs have bred a degree of contempt and that users simply don't care what the boxes say anymore.

The authors suggest that user training might help more people recognize the risks involved with fake popups and the diagnostic signs of genuine Windows dialogs, but the fact that the students didn't appear to spend any more time evaluating the fake dialogs raises questions as to whether education is enough.

The study will appear in the Proceedings of the Human Factors and Ergonomics Society.



SmartBox Recommended Software

We're proud to announce that we are now reseller's of several flavors or anti-virus, anti-spyware, video & dvd tools, and compression utilities.

If you've been thinking about renewing your anti-virus subscription and getting up to date, or maybe about upgrading your computer with the latest version of PowerDVD, we've got great deals on them all.

If you have multiple computers that need protection, or want to get more than one year of protection at a time, take a look at our package deals. I don't think you can find a better price anywhere.

Best yet, when you buy your software through us, we'll offer you 50% Off an On-Site Service Call. Call Us Now for more details!

Meantime, checkout our pricing at http://software.smartboxllc.com.

All the Best,

Colin Receveur
colin@smartboxllc.com
(502) 741-1413
www.SmartBoxllc.com

Computer Repair 101 - Just Hold the Repairman Hostage

Halifax actress and playwright Carol Sinclair was arrested and is now facing criminal charges after a repairman says she threatened to hold him hostage until he fixed her Internet connection.

According to Halifax Police, Ms. Sinclair was enraged with Mr. Scott. "She told the technician, in a tirade, that he was not leaving until her Internet was working and she told him she was keeping him hostage," Constable Jeff Carr said.

"She implied that she had a gun, although he didn't see one."

The repairman told Ms. Sinclair he could fix her computer, but first had to retrieve a disc from his truck, according to the police version of events. Ms. Sinclair followed Mr. Scott downstairs, but he was able to run away and drive to the Aliant office.

Mrs. Sinclair denies the allegations and says that she merely stated, 'I don't want to hold you hostage, but would you mind hanging around until the other technician arrives so that the two of you can sort it out.' She was arraigned in Halifax Provincial Court Friday and is now free on conditions including that she have no contact with the repairman or any employee from her ISP.


Google Releases Own Browser - Chrome

Yesterday Google announced their very own browser project called Google Chrome — an announcement in the form of a comic book drawn by Scott McCloud, no less. Google says Google Chrome will be open source, include a new JavaScript virtual machine, include the Google Gears add-on by default, and put the tabs above the address bar (not below), among other things. 

An interesting statistic to note, independent researchers are confirming that in the past 48 hours, Chrome has already taken a 3% stake in the browser market.


Google Picasa 3.0 - Now With Facial Recognition

If you use Picasa (Google's photo sharing site), they have upgraded to 3.0 and are purportedly offering facial recognition. That's right, why tag photos of your friends when the software will group similar faces together for you? There's a new list of features including repairing old photographs by touching them up and even writing on your images. As expected, not everyone is 'ok' with Google automatically recognizing you in pictures."

A Good Reason To Go Full-Time SSL For Gmail

A tool that automatically steals IDs of non-encrypted sessions and breaks into Google Mail accounts has been presented at the Defcon hackers’ conference in Las Vegas.

Last week Google introduced a new feature in Gmail that allows users to permanently switch on SSL and use it for every action involving Gmail, and not only, authentication. Users who did not turn it on now have a serious reason to do so as Mike Perry, the reverse engineer from San Francisco who developed the tool is planning to release it in two weeks.

When you log in to Gmail the website sends a cookie (a text file) containing your session ID to the browser. This file makes it possible for the website to know that you are authenticated and keep you logged in for two weeks, unless you manually hit the sign out button. When you hit sign out this cookie is cleared.

Read more @ Hungry Hackers



Intel Releases USB 3.0 Specs


Intel has provided chipset makers with a draft specification for a USB 3.0 eXtensible Host Controller Interface (XHCI), making good a promise it made a couple of months ago.

You might have thought that was the job of the chipset makers, but Intel's taken on the task itself to ensure, it hopes, the rapid roll-out of USB 3.0 - aka SuperSpeed USB. To that end, it's making the draft spec available under a licence that requires no royalties to be paid.

USB 3.0 is set to deliver
data-transfer speeds of up to 5Gb/s, initially over tweaked connectors and wiring and, later, over optical links.

XP Still Killing Vista in Sales

Microsoft Distorts Vista Sales Figures

While Microsoft excitedly tries to sway public opinion by touting that Windows Vista License sales top 180 Million units, Hewlett-Packard (HP) was busy smacking Microsoft down -- reportedly shipping PCs with a Vista Business license but with Windows XP pre-loaded in the majority of business computers sold since the June 30 Windows XP execution date established by Microsoft -- casting a lot of doubt over how many copies of Vista have actually been sold.

In other words, Microsoft counts a sale for Windows Vista even though the computer manufacturer actually sold Windows XP. It's kind of ironic when you realize how desperate Microsoft has become to gain public acceptance for the dying operating system. Dell and other computer manufacturers are reportedly also shipping computers 'downgraded' to Windows XP.

Microsoft has told HP they won't be able to do that after January 2009, but HP is already discussing how to push that deadline back with Microsoft. Feedback from HP customers reveals that they hadn't had the time to do full compatibility testing of all their business applications with Vista and the high time and monetary costs of rebuilding system images wasn't worth it, especially in this economy.

Blu-Ray Bites The Dust Too

In other news, consumers do not want Blu-ray, says a research firm. A consumer survey done by ABI Research revealed that over half of the 1000 respondents had 'other priorities,' to buying a Blu-ray player, saying that they had no plans to purchase one; a further 23% are likely to buy, but not until sometime in 2009.

ABI Research principal analyst Steve Wilson said that there wasn't much value proposition seen in a Blu-ray player or in content "Consumers were happy to embrace standard DVD when that format arrived because the improvement in quality over VHS videotapes was dramatic. Standard DVD didn't require the purchase of a new TV either.

In contrast, while half of the respondents to our survey rated Blu-ray's quality as 'much better' than standard DVD, another 40% termed it only 'somewhat better,' and most are very satisfied with the performance of their current DVD players." Another reason cited was that a Blu-ray investment also dictates an HDTV purchase, something consumers are reluctant to do.



Why Power Failures Always Lead To Data Loss

You've taken every precaution against data loss. You do regular backups, which you've carefully planned (and even tested).

But, what happens to your precious data when there is a power outage?

Will your file system recover? Properly? Are you sure?

Will you have to resort to your backup, just to be safe?

Maybe you need a UPS. Then again, maybe not. Either way, reading this article will help you to make that decision.

Colin Receveur
SmartBox, LLC


Survival Time of an Un-Patched Windows Computer?

Interestingly enough, the SANS Institute's Internet Storm Center site is estimating the time to infection of an unpatched Windows machine on the Internet.. is currently about 4 minutes. This is based on an un-patched Windows machine that is not behind a firewall or router of any kind (directly connected to the internet).

As many of my current clients know, I've pushed routers (in conjunction with other security measures) upon all of them for security reasons. A few have called me paranoid, so it's nice to see a study backing up my paranoia! While they were more expensive several years ago, routers have come down to a point where even the simplest of home users can afford to have one protecting their computer system.

Concludes the ISC's Hutchinson: "While the survival time varies quite a bit across methods used, pretty much all agree that placing an unpatched Windows computer directly onto the Internet in the hope that it downloads the patches faster than it gets exploited are odds that you wouldn't bet on in Vegas."


Tweaking Your Windows Startup Routine

You probably have asked yourself before "What is all this crap that starts up when I turn my computer on?!"


You're not alone. 3rd party vendors load all kinds of junk software onto your computer. These programs all serve legitimate purposes, and are not intended to bog down your system, but they do. AIM, Antivirus programs, all of the little programs sitting in your task bar, and some programs you can’t see all contribute to the performance of your system.


Disabling unused Windows Startup Applications


The following steps will teach you how to remove programs and services from the startup sequence. Doing this will free up RAM memory, since those programs will not be running any more. It will also dramatically increase the time that your computer takes to turn on. To use this feature make sure you are logged in as an administrator.


  1. Click Start, then Run, and type msconfig in and press OK. A small System Configuration Utility dialog box will appear with many options like General, System.ini Win.ini, Boot.ini, Services, Startup and Tools. For now, we're going to ignore all of them except the Startup tab.

  1. Click on the Startup tab and uncheck the applications that you want to disable from your Windows startup sequence.

  1. Now click on Apply button to implement the changes, and restart your computer to put the changes into effect.

Go through the list and look for any familiar programs and disable those first, then go back and look at the unfamiliar programs and try to find out what application they belong to, Google the process name like ctfmon.exe and it should come up with a detailed use for the program in the listings and if it’s harmful or just a system program.


Voila! When your computer restarts, you will receive a notice that there were changes made to your startup sequence. This is normal. Check the "Do not show me this again" box and click OK!



Could You Imagine Still Being on Dial-Up Internet?

Oddly enough, according to a new study released shows that 62% of current dial-up users have NO interest in going to broadband!

When asked what it would take to tempt them to switch, 35% said the price of broadband would have to fall, while almost a fifth said that nothing would tempt them to upgrade, suggesting many die-hard dial-up users simply don't see the need for the higher speeds that are available.

About 3.5% of the visitors to our website are still on dial-up as well.

You can read more of this article over on PCPro


 
Google is a registered trademark of Google, Inc. This website is not associated, affiliated or endorsed by Google, Inc.