Topic: COMPUTER - on January 24, 2007 at 1:06:00 PM CET
BitTorrent is Doomed
The self-acclaimed guru of IPTV, Mark Cuban claims that P2P, and more specifically, BitTorrent is doomed. Apparently, “conflicting clients”, lack of knowledge, limited Internet plans, and “bandwidth premiums” are going to be jointly responsible for the death of BitTorrent.
... Link (0 comments) ... Comment
Topic: COMPUTER - on January 23, 2007 at 5:13:00 PM CET
Storm Trojan gang declare start of World War III
The virus writers behind last week's Storm Trojan outbreak showed off some neat tabloid headline-writing skills in a string of similar attacks over the weekend.
The original attack tried to trick users into executing malicious files containing Trojan horse code, posing as information about the inclement weather. The malware was distributed in messages with subject lines such as "230 dead as storm batters Europe", supplied with attachments containing the Small-DAM (AKA DwnLdr-FYD) Trojan. Attachments may contain one of the following filenames: Full Clip.exe; Full Story.exe; Read More.exe and Video.exe.
... Link (0 comments) ... Comment
Topic: COMPUTER - on January 23, 2007 at 5:08:00 PM CET
Cyber criminals move focus to web
Cyber criminals will increasingly turn their attention to the web and away from e-mail security in 2007, according to a new report.
Security firm Sophos found that the US hosts more than a third of websites hosting malicious code, as well as sending more spam than other nations.
... Link (0 comments) ... Comment
Topic: COMPUTER - on January 23, 2007 at 4:11:00 PM CET
30 Essential Pieces Of Free (and Open) Software for Windows
Recently, I received a fresh new laptop from Dell. Upon receiving it, I did the traditional “installation of Windows from scratch” on it to remove a lot of the garbage that is preinstalled on Dells. Then I got really busy installing tons of great software that takes care of pretty much every software need I have. Not only was all of the software free, every piece of it was open source, which means that the code is peer-reviewed; no spyware here!
... Link (0 comments) ... Comment
Topic: COMPUTER - on January 22, 2007 at 2:46:00 PM CET
The Man Who Invented Ctrl-Alt-Del
David J. Bradley (born 1949) was one of the twelve engineers who worked on the original IBM PC, developing the computer's ROM BIOS code. He is most famous for inventing the "Control-Alt-Delete" (also known as three-finger salute) key combination that was used to reboot the computer.
... Link (0 comments) ... Comment
Topic: COMPUTER - on January 22, 2007 at 1:37:00 PM CET
Ubuntu Studio Announced
Ubuntu has set up a page for the April release of the Ubuntu Studio. An ambitious project, it is described by Ubuntu as a 'multimedia editing flavor of Ubuntu for the Linux audio, video, and graphic enthusiast or professional who is already familiar with the Ubuntu-Gnome environment.
... Link (0 comments) ... Comment
Topic: COMPUTER - on January 19, 2007 at 4:37:00 PM CET
SeaMonkey 1.1 is here!
SeaMonkey 1.1 is now available. Powered by the same engine as Firefox 2 and the upcoming Thunderbird 2, SeaMonkey 1.1 includes numerous enhancements including more visible security indicators in the browser and enhanced phishing detection for e-mail, a new tagging system for e-mail that supersedes labels, support for multi-line tooltips in web pages, and previews images in tab tooltips.
... Link (0 comments) ... Comment
Topic: COMPUTER - on January 19, 2007 at 12:08:00 PM CET
Sealand Won’t be Sold to Pirates
Prince Michael, also known as Michael Bates, said the following about the activities of the popular BitTorrent tracker. “It’s theft of proprietary rights, it doesn’t suit us at all. In fact, I’ve written a book and Hollywood is making a movie out of it, so it would go right against the grain to go into the filesharing thing.”
... Link (0 comments) ... Comment
Topic: COMPUTER - on January 19, 2007 at 11:27:00 AM CET
Vista to be Downloadable (Legally)
"InfoWorld reports that Windows Vista will be available for legal download as of January 30th — the same day it will be available in retail stores. MS-NBC Online notes that, 'a relatively low number of computer users are likely to get Vista by downloading it from the Internet, but the mere availability indicates that Microsoft is fiddling with distribution methods for the extremely profitable franchise at the core of its business.
slashdot.org informationweek.com msnbc.msn.com arstechnica.com
... Link (0 comments) ... Comment
Topic: COMPUTER - on January 18, 2007 at 10:57:00 AM CET
Open source gets European boost
The European Commission has added its voice to the debate about the use of open source software.
A report funded by the Commission concludes that the software could offer considerable savings to organisations with little effect on their business.
... Link (0 comments) ... Comment
Topic: COMPUTER - on January 17, 2007 at 12:13:00 PM CET
The Twilight Years of Cap'n Crunch
Underneath a highway bisecting this Silicon Valley town, home to Google Inc. and other tech giants, John Draper crammed his bulky frame through the door of a friend's home: a battered 1978 Chevy diesel bus.
Radio parts, a wrench set, arthritis medication and a book on robotics cluttered the dashboard. A padded bench for sleeping and a greasy stove filled the back.
"What do you want for lunch?" asked Dave Bengel, a self-taught engineer.
"Salmon," responded Mr. Draper, 63, who has few teeth and wears the same clothes for days. He is better known in Silicon Valley as "Cap'n Crunch," a legendary figure who 25 years ago epitomized the freewheeling, prank-filled culture that gave birth to high tech.
... Link (0 comments) ... Comment
Topic: COMPUTER - on January 17, 2007 at 11:14:00 AM CET
Trojans fuel ID theft boom
Identity theft, both offline and online, is on the rise with keylogging Trojan software often forming the weapon of choice for would-be fraudsters, according to a new study by net security firm McAfee.
McAfee reckons the number of keylogging malware packages increased 250 per cent between January 2004 and May 2006. The number of phishing attacks tracked by the Anti-Phishing Working Group has multiplied 100-fold over the same period of time, it notes.
... Link (0 comments) ... Comment