®!!!Welcome To MyClanonline online 24/7!!!© Come & Join The Fun

Daily Technology News
Home
Daily Press Briefing
Special Ed Advocate
All Graphics suff on this page
Education Page
Parentes Page
For my clan on tech warrior
News
Sign up page
Sign in page
The Adventures of Sherlock Holmes
You stuff your way
New Stuff ever 2 weeks
Your TV Your Way
Chat Room
Game Room
What you need to know about everthing and anything this is the place to get it
Hurricane Season
Cleopatra
Three Series, Complete
stuff you well like
Bible Verses
Contact Me
Count up And Down Page 5
Cats & Dogs
Count up and Down Page 2
Clocks
Count up and down page
Missing Children Success Stories
Count up and down page 3
Download Page
Daily Technology News
Jokes
Health and Fitness
Travel
New Comic Books
Entertainment News
News
What a virus does when it is in your computer
Today's Vocabulary
History and Quotes
Polls Page for you to vote
Favorite Links
Weather
The PTA Parent
Maps For You
Parents
Book Reviews
Science & Technology
Trivia
New Books Newsletter
Automotive
New Comic Books
Horoscopes
Weird News
Sports Update
My Pictures
My Videos That You Can Which
Chat Room So You Can Talk To othere People That are on my page
Stuff you might like
Something New You Might Like
lyrics to the Jonas brothers song year 3000
For Sebastian River Middle School
My Blog
Gainesville
My Pets
My Resume
My Blog
Top news ...
Gas Prices And oil
https://jscala000.tripod.com/Terms of Use
Legal Notices
Terms of Service
Advertise
Online Privacy Policy for https://jscala000.tripod.com/
About Me and About Us

Daily Technology News
 
 

GM Aims for Global IP System

General Motors agrees to a $1 billion, five-year contract with AT&T to continue development of a global IP network.

Patrick Thibodeau, Computerworld

Wednesday, February 21, 2007 04:00 PM PST

General Motors Corp. has agreed to a US$1 billion, five-year contract with AT&T to help the auto maker continue development of a global IP network supporting voice, data, video and other services, the two companies said Wednesday.

The announcement renews an earlier five-year agreement between the two companies, but also expands on it by giving AT&T responsibility for managing GM's relationships with its other telecom providers, some 150 companies globally. The management role for AT&T is part of GM's overall goal to ensure that all of its IT providers work together and follow a consistent set of service and support practices.

"It follows the mindset that information technology providers have to work as one in a corporation," said Ralph Szygenda, GM's CIO and group vice president. "They can't work as a bunch of IT companies competing against each other inside your own company."

GM has already taken this approach in its IT contracts and is outsourcing some $15 billion in IT world over five years. GM began awarding contracts one year ago this month, with Electronic Data Systems Corp. continuing to have the largest share of the auto maker's IT services work, with contracts valued at about $1.4 billion annually.

AT&T now provides GM with a global virtual private network and has built an IP network based on Multiprotocol Label Switching (MPLS) technology, which allows network traffic management by priority.

"Now the next five years is really taking it to a totally different level," Szygenda said. The auto maker today runs operations on a global basis, with the capability to work with designers and suppliers no matter where they are located, he said. The company wants to continue to build out the capabilities of its MPLS network that will integrate voice, data and video, he said.

Ron Spears, executive vice president of AT&T global business sales, said the work at GM to integrate its communication platform, which includes (VOIP) voice over IP, is "in process and in progress" and will take some 18 months to reach the point "where they are running effectively a complete IP infrastructure environment on a global basis."

The goal of this IP-based system is to have a consistent experience for GM workers no matter where they are located. "At its simplest level, there will be a voice mail platform that will look the same to every General Motors employee around the world," said Spears, and that is not a trivial task. Historically, "it's been a hodgepodge of systems mostly built by the regional entities, and that's true in most enterprises today," he said.

Szygenda said company engineers and support staff work as teams, and the company can't have separate telecom and management systems supporting them. "That doesn't work when you are running a real-time global company," he said. "You don't want to have any differences."

Szygenda said GM's decision to go with MPLS technology as a "good bet" for the company when it was made about four years ago, and the "next thing now is to leverage all of it" and build out the capability and manage it as one system, he said.

"The real end goal is that every employee has the same type of capabilities no matter where they are in the world," Szygenda said, "and in fact, when they wake up they don't need to know where they are in the world. It just works."

 

Second Security Rival Knocks Microsoft Antispyware App

Another Microsoft security rival claims that Windows Defender blocked only some of the malware thrown at it.

Gregg Keizer, Computerworld

Wednesday, February 21, 2007 02:00 PM PST
 
 

Another Microsoft Corp. security rival posted results Wednesday of tests claiming that Windows Defender, Microsoft's antispyware software, blocked only a portion of the malware thrown at it.

The trials, conducted by Enex TestLab but paid for by Australia-based vendor PC Tools, concluded that Defender was able to sniff out and block 46.6 percent of the sample spyware set when running its quick scan, and 53.4 percent using the more time-intensive full scan. Defender ships as part of Windows Vista but is also available as a free download for Windows XP.

PC Tools' flagship product, Spyware Doctor, fared better, according to Enex, which said the software's quick scan blocked 83.3 percent of the spyware and its full scan stopped 88.7 percent.

Last month, Boulder, Colo.-based Webroot Software Inc. ran similar tests on Defender, using a spyware sample of its own creation, and claimed that the Microsoft title barred the door against just 16 percent of the sample malware.

PC Tools took aim at Webroot as well as Microsoft. "While we agree with the overriding conclusion that Vista security is lacking, [Webroot's] approach fundamentally contradicts the laws of statistical analysis, and clearly creates a bias result," Simon Clausen, PC Tools' CEO, said in a statement. "By hand-picking the sample set, it is easy to return results showing whatever you want. It would even be possible to show Vista had 0 percent blocking ability."

Clausen said that Enex Testlab, not PC Tools, choose the spyware and adware to throw against Defender and Spyware Doctor.

Over the past year, various analysts have pegged stand-alone antispyware software as a dead end, primarily because Microsoft gives away Defender and bundles it with Vista. Other factors accounting for the prediction include the move toward comprehensive suites from the likes of Symantec Corp. and McAfee Inc. that boast spyware detection as well as antivirus scanning.

Windows Defender recently came under increased scrutiny for a flaw in the malware-scanning engine that drives it and all other Microsoft security software. The bug, which was disclosed Feb. 13 in the month's regularly-scheduled patch update, was fixed for most users -- including those running Windows Vista -- by automatic upgrades that actually began arriving on PCs in late January.

A Microsoft spokesman could not be reached for comment.

Defender can be downloaded free of charge for Windows XP or Windows Server 2003 from the Microsoft Web site.

 

Pharming Attack Targeted Bank Customers Worldwide

A pharming attack that targeted online banking customers in the U.S., Europe and Asia-Pacific has been shut down.

Jeremy Kirk, IDG News Service

Thursday, February 22, 2007 06:00 AM PST
 
 

An attack this week that targeted online customers of at least 50 financial institutions in the U.S., Europe and Asia-Pacific has been shut down, a security expert said Thursday.

The attack was notable for the extra effort put into it by the hackers, who constructed a separate look-alike Web site for each financial institution they targeted, said Henry Gonzalez, senior security researcher for Websense Inc.

To be infected, a user had to be lured to a Web site that hosted malicious code exploiting a critical vulnerability revealed last year in Microsoft Corp.'s software, Websense said.

The vulnerability, for which Microsoft had issued a patch, is particularly dangerous since it requires a user merely to visit a Web site rigged with the malicious code.

Once lured to the Web site, an unpatched computer would download a Trojan horse in a file called "iexplorer.exe," which then downloads five additional files from a server in Russia. The Web sites displayed only an error message and recommended that the user shut off their firewall and antivirus software.

If a user with an infected PC then visited any of the targeted banking sites, they were redirected to a mock-up of the bank's Web site that collected their login credentials and transferred them to the Russian server, Gonzalez said. The user was then passed back to the legitimate site where they were already logged in, making the attack invisible.

The technique is known as a pharming attack. Like phishing attacks, pharming involves the creation of look-alike Web sites that fool people into giving away their personal information. But where phishing attacks encourage victims to click on links in spam messages to lure them to the look-alike site, pharming attacks direct the victim to the look-alike site even if they type the address of the real site into their browser.

"It takes a lot of work but is quite clever," Gonzalez said. "The job is well done."

The Web sites hosting the malicious code, which were located in Germany, Estonia and the U.K., had been shut down by ISPs as of Thursday morning, along with the look-alike Web sites, Gonzalez said.

It was unclear how many people may have fallen victim to the attack, which went on for about three days. Websense did not hear of people losing money from accounts, but "people don't like to make it public if it ever happens," Gonzalez said.

The attack also installed a "bot" on users' PCs, which gave the attacker remote control of the infected machine. Through reverse engineering and other techniques, Websense researchers were able to capture screenshots of the bot controller.

The controller also shows infection statistics. Websense said at least 1,000 machines were being infected per day, mostly in the U.S. and Australia.

 

Firefox Loses Browser Share, Safari Gains

Net Applications reports that Firefox lost share but Apple's Safari continued to gain ground.

Gregg Keizer, Computerworld

Wednesday, February 21, 2007 03:00 PM PST
 
 

Mozilla Corp.'s Firefox browser lost market share last month, Web metrics company Net Applications reported Wednesday. But Apple Inc.'s Safari continued to gain ground, an indicator of a slow but sure uptick in Macintosh sales.

In January, Firefox accounted for 13.7 percent of the browser usage market, Aliso Viejo, Ca.-based Net Applications said, down slightly from 14 percent the month before. The dip was the first since May 2006. Since then, Firefox's share has risen continually month to month.

"It appears to be a real dip," not a statistical anomaly, said Vincent Vizzaccaro, Net Applications' executive vice president of marketing and strategic relationships. "It's still bigger than November, though, as if Firefox had a little spike in December.

"Firefox has had minor setbacks like this before," said Vizzaccaro.

More conspicuous than Firefox's slip, however, has been Safari's steady march. The Apple browser, which is based in part on the open-source Konqueror, boosted its share to 4.7 percent in January from 4.2 percent in December. A year ago, Safari held 3.1 percent of the browser market.

"The more interesting trend is on the Safari side," said Vizzaccaro. "It looks like it's taking share away from browsers in the Windows environment."

Net Applications, which also tracks Web users' operating systems, said that the increase in Safari's share has been matched move for move by a climb in Mac OS X use. In January, the combined PowerPC- and Intel-based Mac OS X share was 6.2 percent, up from December's 5.7 percent. "Both Safari and Mac OS X are heading in the same direction -- up," Vizzaccaro said.

Windows XP still has an overwhelming lead in operating systems, however, with 85 percent. Microsoft's Internet Explorer accounted for 79.8 percent of the browser market in January.

Windows Vista, which debuted to businesses in November but only hit retail Jan. 30, had just 0.2 percent share by then, according to Net Applications.

 

Read RSS, Get Hacked

Web feed services such as Real Simple Syndication (RSS) and Atom may be sending you malicious code along with your favorite Web content.

Jaikumar Vijayan, Computerworld

Wednesday, February 21, 2007 02:00 PM PST
 
 

Users of Web feed services such as Real Simple Syndication (RSS) and Atom might want to make doubly sure they are not downloading malicious code along with their favorite Web content.

That's because the growing use of Web feed readers and the proliferation of content-aggregation sites are giving hackers a really simple way to deliver keystroke loggers, Trojan horses and other malware onto their computers, security analysts warn.

The feed-hacking threat is not particularly new. However, the severity of the problem could be rising as feed services begin moving into the mainstream, said Ray Dickenson, vice president of product management at Authentium Inc., a Palm Beach, Fla.-based security vendor. "Malware authors are just taking advantage of the interconnectedness of Web 2.0" to distribute their code more efficiently, he said.

Web feed services such as RSS allow Web content from multiple sources to be aggregated and automatically delivered to a desktop without requiring the user to actually visit any of the content-providing sites. Users simply subscribe to syndicated news and content feeds. Then, feed readers and content aggregators regularly check the feeds for updated content on the users' behalf -- and automatically push it out to the user when something new is found.

The security problem arises from the fact that many RSS and Atom-based feed readers and aggregators simply pull in the content from the source without first checking to see whether it might contain malicious code, said Michael Sutton, security evangelist at SPI Dynamics Inc., an Atlanta-based Web application security vendor.

"It is like any other Web application security problem," Sutton said. "It all stems from the problem that user input is widely accepted without any validation. It's a huge problem. The server side and the client side are assuming that people are going to be inputting stuff the developer expected them to."

In other words, feed readers assume that the content being pulled in is a story or a blog and make little attempt to sanitize the content, he said. That makes it easier for attackers to inject into a Web feed malicious JavaScript and other code for stealing passwords and data or for remotely controlling computers, said Jeremiah Grossman, founder and chief techology officer at WhiteHat Security Inc. in Santa Clara, Calif.

"Unfortunately, many of the applications that receive [feed] data do not consider the security implications of using content from third parties and unknowingly make themselves and their attached systems susceptible to various forms of attack," Robert Auger, formerly of SPI Dynamics, said in a white paper released last year.

As a result, the "potential for using Web-based feeds as an exploit deployment vector for both known and zero-day exploits is rather large," he said. The issue is amplified when a feed is resyndicated to other sites. "The potential exposed user base could be in the millions, making it an attractive method for worm deployment," Auger wrote.

One relatively easy way that hackers can take advantage of a feed is to plant a comment containing malicious JavaScript on a blog site that allows readers to leave comments. If the blog's RSS feed is set up to deliver comments as part of the feed, the malicious code gets distributed to subscribers, Dickenson said.

A hacker might also choose to distribute a tainted blog feed to a trusted content-aggregation site, from which the malicious code could get distributed to users who are subscribed to the aggregator's feeds, Grossman said.

Given the number of RSS readers being downloaded every day and the number of Web sites that aggregate and publish RSS feeds, it's easy to see why feed injection could become an even bigger nuisance than spam, Dickenson said.

An analysis of malware samples with embedded URL links showed that hackers are already turning to blog feeds in a big way, Dickenson added. Of the 60,000 malware samples studied by Authentium recently, more than 1,000 had URL links with the word "blog" in them, he said.

 

Google Says Diagnostics Don't Catch Many PC Drive Failures

Built-in disk drive diagnostics only predict about half the drive failures that occur, Google said after studying thousands of drives.

Chris Mellor, Techworld

Wednesday, February 21, 2007 01:00 PM PST
 
 

Google research has shown that built-in disk drive diagnostics only predict about half the drive failures that occur.

Modern disk drives have a built-in self-test and diagnostic facility termed Self-Monitoring, Analysis and Reporting Technology--SMART. The drive firmware monitors a range of drive parameters, things like the number of seek errors and the disk spin-up time. If these parameters degrade over time it may indicate the unit is heading for a breakdown. With advance warning of an impending disk failure you will have a chance to move files and/or replace the unit before you lose any data.

Google's study looked at more than one hundred thousand disk drives which were a combination of serial and parallel ATA consumer-grade hard disk drives, ranging in speed from 5400 to 7200 rpm, and in size from 80 to 400 GB. The observed range of annualized failure rates varied from 1.7 percent, for drives that were in their first year of operation, to over 8.6 percent, observed in their third year.

The paper (in PDF format) is called Failure Trends in a Large Disk Drive Population.

Diagnostic Tools Uneven

The Google researchers found that SMART diagnostics are not as useful as they are supposed to be. They note that there is little independent research into drive life and diagnostics, stating 'Most of the available information comes from the disk manufacturers themselves. Their data are typically based on extrapolation from accelerated life test data of small populations or from returned unit databases.'

They note 'detailed studies of very large populations (of hard drives) are the only way to collect enough failure statistics to enable meaningful conclusions. In this paper we present one such study by examining the population of hard drives under deployment within Google's computing infrastructure.' Google has 'built an infrastructure that collects vital information about all Google's systems every few minutes, and a repository that stores these data in time-series format (essentially forever) for further analysis.'

Google's Findings

The researchers mined this data and analyzed it looking for correlations between hard drive sensor and SMART readings and failure events. Their findings were:

-- Very little correlation between failure rates and either raised temperature or activity levels.

-- Some SMART parameters (scan errors, reallocation counts, offline reallocation counts, and probational counts) have a large impact on failure probability. Others do not. Out of all failed drives, over 56 percent of them had no count in any of these four strong SMART signals.

-- There was a lack of failure-predicting SMART signals on a large proportion of failed drives.

-- Taking all SMART signals and temperature readings into account they found about 36 percent of all failed drives had no predictive failure signals at all.

Their conclusion was that 'it is unlikely that an accurate predictive failure model can be built based on these signals alone." Further "models based on SMART parameters alone are unlikely to be useful for predicting individual drive failures."

The Future

Google's researchers hope that predictive models that 'use parameters beyond those provided by SMART could achieve significantly better accuracies. For example, performance anomalies and other application or operating system signals could be useful in conjunction with SMART data to create more powerful models.'

Google uses millions of drives so its findings should be taken seriously by the hard drive industry, also by customers implementing disk-to-disk backup systems who need to have better disk failure protection built into their D2D systems--meaning stronger RAID schemes, such as RAID 6 or DP, and more spare drives.

 

Apple, Cisco Settle iPhone Dispute

Apple and Cisco agree to share the iPhone name, explore interoperability.

Sumner Lemon, IDG News Service

Thursday, February 22, 2007 07:00 AM PST
 
 

Cisco and Apple have settled a dispute over rights to use the iPhone name. Under terms of the agreement, both companies have the right to use the name.

In addition, Cisco and Apple have agreed to "explore opportunities for interoperability" in security and communications technologies for consumers and business users, they said in a brief statement. Other terms of the agreement, which heads off a lawsuit filed by Cisco over rights to the iPhone trademark, were not disclosed.

Cisco sued Apple last month in the U.S. District Court for the Northern District of California for infringing its iPhone trademark with the announcement of a cellular handset that bears the same name. At that time, Cisco said it obtained rights to the iPhone name through its 2000 acquisition of Infogear, which had a product line called iPhone.

In addition, Cisco's Linksys division last year began selling a line of dual-mode cordless phones, called iPhone, that let users make Voice over IP calls.

Cisco's lawsuit against Apple came shortly after CEO Steve Jobs last month announced the company's own iPhone cellular handset at the Macworld Conference & Expo in San Francisco. That announcement was made without an agreement with Cisco to use the iPhone name, a company spokesman said at the time.

Prior to Jobs' iPhone announcement, Apple and Cisco had discussed terms of an agreement for Apple to use the name. Those discussions continued after the iPhone announcement and the filing of the lawsuit, ultimately resulting in the settlement.

 

iTunes Offering IFC's Indie Films

IFC 2007 Independent Spirit Award nominees among movies now available on iTunes.

Peter Cohen, Macworld

Thursday, February 22, 2007 06:00 AM PST
 
 
 

IFC Entertainment on Wednesday announced that it is offering independent films for sale and download through Apple's iTunes Store. The company is including all of its 2007 Independent Spirit Award nominees.

IFC Entertainment includes IFC Films and IFC Productions. The company also runs a cable television channel, the Independent Film Channel. Their recent productions include Wordplay, a documentary on New York Times crossword puzzle editor Will Shortz; and SherryBaby, a drama featuring Maggie Gyllenhaal. Past IFC Films work includes the Oscar-winning Hilary Swank film Boys Don't Cry and Touching the Void, a documentary about two climbers who came close to death in the Peruvian Andes.

The IFC Entertainment offerings added to the iTunes Store are full-length movies. The new collection includes a total of 13 films, six of which are nominated for the upcoming Independent Spirit Awards, which will be held on Feb. 24, 2007. All IFC films on iTunes cost US$9.99.

Cisco Backtracks on Open Source Promise

A Cisco official said today that the company has not made up its mind yet about the future of its CTA software.

Paul F. Roberts, InfoWorld

Wednesday, February 21, 2007 05:00 PM PST
 
 

After promising to turn the client software for its CTA (Cisco Trust Agent) into an open-source application, Bob Gleichauf, CTO of Cisco's Security Technology Group, said that the company has not made up its mind yet about the future of the software.

"Where I misspoke was speaking in terms of CTA going open source as if that's a given, and that was incorrect. That was my mistake," Gleichauf told InfoWorld last week. "It has been part of a discussion of a number of different options available to us, but it's not a viable option at this time," he said.

A more circumspect Gleichauf said that in earlier comments he was just speculating that CTA might be turned into an open-source component. "Open source was one thing that's a way of dealing with various components as work toward an integrated solution," he noted

He declined to discuss the pros and cons of going open source with the CTA client, a desktop software agent that is used to enforce security policies on machines that seek access to networks.

However, Gleichauf did say that he was concerned about the reaction of Cisco customers to comments he made to InfoWorld at the RSA Conference in early February, saying that Cisco would "open up" CTA within two months so it could devote development resources to other areas of NAC.

"We don't want partners and customers to think we're pursuing that. That was a mistake," he said. "Customers need to know how to prepare for any new initiative or technology or product. What I did a disservice to on everyone was stating something as a fact that wasn't a fact and that can affect planning, whether a funding decision or a build decision or a partner decision. "

As for the future of NAC, Gleichauf said that Cisco is looking for ways to tie Cisco's NAC appliance, formerly known as Cisco "Clean Access," with the company's NAC "framework," a larger NAC solution, which relies on Cisco routers and switches to do policy enforcement.

"Cisco's in the process of leveraging its best of breed product, which is Cisco Clean Access, and the framework product and migrating toward an integrated solution that gives customers a lot of choices. As we do that, we're going to be continually evaluating where the focus is and how we manage the investment in terms of the engineering," Gleichauf said.

Cisco's divided appliance and framework approaches are the most pressing issue for the company, not the CTA client, said Russell Rice, director of marketing in the Security Technology Unit.

"What we want to deliver to the market is the ability to have those be tied together technologically so that they use common components. That's what we don't have in the marketplace, and that's what our customers are asking us to achieve," Rice said.

Cisco is wrestling with the uncomfortable fact that adoption of the NAC framework lags far behind use of the NAC appliance, Rice said.

"We have 1,500 clients who we talk about using NAC. The majority of those have been going down the appliance route. A lot of people look at framework and say, 'There are a lot of features that are valuable, but how do you put these together?'" Rice said.

In the end, Cisco may end up throwing the CTA client open source as a way to differentiate itself from Microsoft's NAP technology, which is integrated in the Vista operating system, said Zeus Kerravala, an analyst at Yankee.

"Cisco's wondering 'how do we differentiate our own client?' Allowing application developers to experiment with it is one way, and the best way to do that is open source," Kerravala said.

The stakes for Cisco are low as only a handful of its customers have committed to the CTA, Kerravala said.

Adam Hansen, security manager at the law firm Sonnenschein, Nath & Rosenthal, LLP said that, in the scheme of things, open sourcing the CTA client  -- or not -- was of little importance. However, Cisco might derive considerable value from opening other elements of NAC framework and making it easier for third-party vendors to plug into it.

"You don't get value from NAC. You get value from systems that interoperate with NAC," Hansen said.

Thus far, however, Cisco's integration with other products -- especially those of competitors in the networking infrastructure space, is almost nonexistent, while the cost of implementing the NAC framework end to end is prohibitive, Hansen said.

Cisco's idea of enforcing policy at the infrastructure level may be superior to other solutions, such as Microsoft's NAP. However, NAP could end up winning out at companies by virtue of being less expensive and easier to deploy, Hansen said.

"Cisco's great at IOS and turning ports on an off, but they're late to the security game, and Microsoft may end up dominating it," he said.

Gleichauf acknowledged that customers want choice and that moving to an open-standards model could stimulate that, but he said that Cisco will have to work towards it incrementally.

"What we've discovered even using a lot of standards-based protocols is that you have to sort out a lot of moving parts, and that's not where you start. That may be where Cisco ends up with this technology, but in order to get something in customer hands that works, you've got to start picking pieces that you control and can shape and working towards an enterprise product," Gleichauf said.

 
 
 

GM Aims for Global IP System
General Motors agrees to a $1 billion, five-year contract with AT&T to continue development of a global IP network.
http://www.pcworld.com/article/129245-1/article.html?tk=nl_dnxnws

Second Security Rival Knocks Microsoft Antispyware App
Another Microsoft security rival claims that Windows Defender blocked only some of the malware thrown at it.
http://www.pcworld.com/article/129261-1/article.html?tk=nl_dnxnws

Pharming Attack Targeted Bank Customers Worldwide
A pharming attack that targeted online banking customers in the U.S., Europe and Asia-Pacific has been shut down.
http://www.pcworld.com/article/129270-1/article.html?tk=nl_dnxnws

Firefox Loses Browser Share, Safari Gains
Net Applications reports that Firefox lost share but Apple's Safari continued to gain ground.
http://www.pcworld.com/article/129246-1/article.html?tk=nl_dnxnws

Read RSS, Get Hacked
Web feed services such as Real Simple Syndication (RSS) and Atom may be sending you malicious code along with your favorite Web content.
http://www.pcworld.com/article/129262-1/article.html?tk=nl_dnxnws

Google Says Diagnostics Don't Catch Many PC Drive Failures
Built-in disk drive diagnostics only predict about half the drive failures that occur, Google said after studying thousands of drives.
http://www.pcworld.com/article/129238-1/article.html?tk=nl_dnxnws

Apple, Cisco Settle iPhone Dispute
Apple and Cisco agree to share the iPhone name, explore interoperability.
http://www.pcworld.com/article/129271-1/article.html?tk=nl_dnxnws

ITunes Offering IFC's Indie Films
IFC 2007 Independent Spirit Award nominees among movies now available on iTunes.
http://www.pcworld.com/article/129263-1/article.html?tk=nl_dnxnws

Cisco Backtracks on Open Source Promise
A Cisco official said today that the company has not made up its mind yet about the future of its CTA software.
http://www.pcworld.com/article/129247-1/article.html?tk=nl_dnxnws

Sony's Fast CD/DVD Recorder
Blazingly fast Sony DRX-830UL-T CD/DVD recorder won't leave you twiddling your thumbs.
http://www.pcworld.com/article/129264-1/article.html?tk=nl_dnxnws

Microsoft, AT&T Head to the Supreme Court
U.S. Supreme Court hears arguments in Microsoft v. AT&T patent case.
http://www.pcworld.com/article/129280-1/article.html?tk=nl_dnxnws

Spam Reaches an All-Time High
Most e-mail will be spam by the end of this year, researcher says.
http://www.pcworld.com/article/129272-1/article.html?tk=nl_dnxnws

Lenovo to Sell Thinkpads in Circuit City Stores
Lenovo said it will try to win even more U.S. small business customers by selling its laptops at the computer retailer's stores.
http://www.pcworld.com/article/129248-1/article.html?tk=nl_dnxnws

New Backup Recovery System for Small Businesses
Fujitsu Siemens has launched a fully automated backup recovery system for small to midsize businesses.
http://www.pcworld.com/article/129273-1/article.html?tk=nl_dnxnws

Google Patches Serious Desktop Flaw
A serious flaw in Google's desktop software could be used to wreak havoc on a victim's PC.
http://www.pcworld.com/article/129249-1/article.html?tk=nl_dnxnws

Canon Announces New Cameras, Camcorders
New Canon products include digital cameras, DVD camcorders, and photo printers.
http://www.pcworld.com/article/129274-1/article.html?tk=nl_dnxnws

Norton 360 to Ship Next Month
Symantec's next-generation desktop security software is set to ship in the middle of next month, according to Amazon.com.
http://www.pcworld.com/article/129266-1/article.html?tk=nl_dnxnws

Social Networks Key to 2008 Race
Social networking sites have changed the game for political candidates.
http://www.pcworld.com/article/129275-1/article.html?tk=nl_dnxnws

Microsoft's List of Verified Vista Applications
Microsoft has verified 800 applications to run bug-free on Windows Vista.
http://www.pcworld.com/article/129267-1/article.html?tk=nl_dnxnws

Microsoft, AT&T Patent Case Before Supreme Court
Arguments were heard today in a case whose outcome could require software companies to pay fines for patent-infringing software assembled in other countries.
http://www.pcworld.com/article/129259-1/article.html?tk=nl_dnxnws

Vista's UAC Warnings Can't Be Trusted, Symantec Says
Hackers can trick Windows Vista's User Account Control to hide malware, researcher found.
http://www.pcworld.com/article/129268-1/article.html?tk=nl_dnxnws

Google Apps Upgrade Threatens Office
Company's major upgrade of Google Apps poses serious competition to Microsoft Office.
http://www.pcworld.com/article/129278-1/article.html?tk=nl_dnxnws

Hurd Pressures HP Storage Sales Team
HP needs to invest in its storage sales force, says CEO Hurd.
http://www.pcworld.com/article/129279-1/article.html?tk=nl_dnxnws

A Tale of Many New Cell Phones
Cool gadgets from Asia this month also include a Toshiba laptop equipped for HD DVD-R.
http://www.pcworld.com/article/129101-1/article.html?tk=nl_dnxnws

Sleek BlackBerry 8800 Lacks Some Features
The mostly elegant BlackBerry 8800 smart phone is more mainstream than its predecessors but suffers from missing features.
http://www.pcworld.com/article/129260-1/article.html?tk=nl_dnxnws

Learning Software for Babies
Giggles Computer Funtime learning software is designed for babies aged 6 to 24 months.
http://www.pcworld.com/article/129236-1/article.html?tk=nl_dnxnws

 

___________________________________________________________________________________________

Spyware & Security and E-mail

 

Visit our Info Centers for the latest news in the fight against spyware and spam, and learn about the latest e-mail, IM, and VoIP technologies--and how to get the most out of them.

Spyware & Security Info Center

Communications Info Center

This Week in the Spyware & Security Info Center

February 22nd, 2007

If you're not paranoid already, this should get you started: PC World security expert Erik Larkin discovered that new "contactless" credit cards can broadcast your data to anyone with a RFID scanner. Go to our top story for details on the problem and how to avoid it. This week we've also got news on the latest Trojan horse making the rounds, a new technology that stops worm outbreaks 'within milliseconds,' and a warning to readers who haven't changed their home router password. Read on for links to those stories, plus bargain pricing on antivirus and security utilities.

Top Story

"New Credit Cards May Leak Personal Information":
Many 'contactless' credit cards can leak their owner's name and card number for reading at a distance.
PCW report

News

"'Storm Trojan' Ignites Internet Worm War":
The Trojan horse that pumped up spam volumes in January is at it again, researchers said, and is now spreading over instant messaging.
Computerworld report

"U.S. Researchers Claim New System Kills Worm Outbreaks":
Technique claims to be able to stop Internet worms within milliseconds of an outbreak.
Techworld report

"Drive-by Web Attack Could Hit Home Routers:
If you haven't changed the default password on your home router, do so now.
IDG News Service report

Shop for Antivirus and Security Tools

Antivirus Software:
PC World Shopping

Security Software:
PC World Shopping

 

You have visited my page for:

seconds!

This Website That I Made Is Powered By Trellix© and Powered By Tripod© And My Clan On TechWarrior©

RankStat.comkeyword ranking
web site monitoring

Hits Since 1/1/2006

Web Site Hit Counters
Website Hit Counter

The comments Below these Text is a comment Box For Which Page You visit the must so i can make that page more better for you and everbody else Thank You!!!
 
!!!Welcome To MyClanonline online 24/7!!! thst is my Home Page

stuff you well like

What you need to know about everthing and anything this is the place to get it

The Adventures of Sherlock Holmes

Cleopatra

Three Series, Complete

About Me

Bible Verses

Contact Me

Count up And Down Page 5

Cats & Dogs

Count up and Down Page 2

Clocks

Count up and down page

Missing Children Success Stories

Count up and down page 3

Download Page

Daily Technology News

Jokes

Health and Fitness

Travel

New Comic Books

Entertainment News

News

What a virus does when it is in your computer

Today's Vocabulary

History and Quotes

Polls Page for you to vote

Favorite Links

Weather

The PTA Parent

Maps For You

Parents

Book Reviews

Science & Technology

Trivia

Automotive

New Comic Books

Horoscopes

Weird News

Sports Update

My Pictures

My Videos That You Can Which

videos that you can which part 4

Videos you can which part 2

videos you can which part 3

Chat Room So You Can Talk To othere People That are on my page

Stuff you might like

Something New You Might Like

lyrics to the Jonas brothers song year 3000

You can put these html on your website the vidoes you put on you website will be like my page seen

My Videos You Can See 1

My Videos You Can See 2

My Videos You Can See 3

My Videos You Can See 4

My Videos You Can See 5

Game Page For You

Game Page For You Part 2

Game Page For You Part 3

Game Page For You Part 4

Game Page For You Part 5

For Sebastian River Middle School

My Blog

Gainesville

My Pets

My Resume

My Blog

Top news ...

Gas Prices And oil

 
 

 

 

Which page do you visit the must when you are at my site
  

arr_ani_04e.gif

  Read The Text That Is In Highlighted In Yellow below

flag.gif

™All Clan info are CopyRight © trademark By My Clan Is Online 2006 - 2007 All Rights Are Reserved™ Logos, Images, Java Applets, scripts and individual pages are Copyright ©  trademark By My Clan Is Online The collection of information provided by the site is Copyright © trademark By My Clan is online 2006-2007 You may not copy or modify those images, scripts, java applets or html-pages without permission. (Normal caching of content by web browsers and proxy servers is allowed, as long as the files are not being redistributed or modified).You may not use extraction tools or tools to download parts of site, or the entire site. You may not store pages permanently except for personal use.Exceptions and external copyrights/trademarks    Images, titles are CopyRight © 2006 - 2007 All Rights Are Reserved™ section of this site are generally copyrighted by the individual vendorsImages and links provided by advertisers are generally copyrighted by the advertisers Java is a Trademark of Sun Corporation  An My E-mails Address Are Not For Use By Othere People Only used for the owner and if anybody goes in my e-mails arddess i will tell my e-mails that is yahoo and lycos that there is someone in my e-mail Account and send me when i was last sign in my Account and tell them that do not let me sign in start 8:00 PM 9:00 AM ok
 
 
 
If you have any questions to these rules, please do not hesitate to send an email jscala00@lycos.com

OWNED AND OPERATED BY US https://jscala000.tripod.com/ !!!Welcome To MyClanonline online 24-7!!! and My Clan On Tech Warrior

flag.gif

spotlightright.gif

Read The Text That Is In Highlighted In Yellow above

spotlightleft.gif

top412.gif

Uptime Report

flag.gif

© https://jscala000.tripod.com/ is copyrighted and All Rights Reserved bythe law and if you copyright this you well go to pay $250,000 and go to jail for 1 year for doing that and signing up for stuff for my e-mail

 

OWNED AND OPERATED BY US https://jscala000.tripod.com/ !!!Welcome To MyClanonline online 24-7!!! and My Clan On Tech Warrior

flag.gif

Your screen's width:
Your screen's height:
Your screen's color Depth:
Your screen's pixel Depth:


Visitor Map
Create your own visitor map!