Pages

Wednesday, October 28, 2009

Microsoft Office 2010 Beta 2 Leaks, Public Beta Expected in November













After Microsoft announced yesterday that Visual Studio 2010 Beta 2 will be sent to testers this week, more exciting news comes from the Office 2010 section. Microsoft has announced that an Office 2010 public beta will be available sometime in November.
Office 2010 has be noted as a “hybridization” of applications. It’s available on your PC, in a web browser *Office Web Apps”, and in Windows Mobile as Office Mobile. Currently, only the
Office Web Apps are available; but to a select group.
According to the Wzor website, Office 2010 build 14.0.4514.1009 will be the build Microsoft will officially release as Beta 2 to attendees of the Tech-Ed Conference in Berlin, November 6, 2009.
Among things, this build features a new installation procedure, which requires you to enter a unique installation product key. Bad news for pirates.






Saturday, October 17, 2009

D-Roll






Modern gadgets apart from being stylish are getting smaller day-by-day. And the latest creation to catch our eye is the ‘next gen laptop design’ by Hao Hua. Dubbed “D-roll” or “digital roll,” the new device works like a regular laptop, but rolls up to be a side bag or even a backpack for easy transportation. Designed like an artist’s tube, the D-roll Laptop features a roll up OLED screen and a slide out keyboard, together with a mouse and a detachable webcam that can be worn on your wrist when not attached to the system. The mouse and web camera can also be used as the end caps for the laptop case, while the straps double as ports to plug in your USB devices.






Thursday, October 15, 2009

Delete Files in C:\Windows\Installer

I was shocked when found out free space in my C drive is only 94MB left. At first I thought it was because of a virus attack so I did run virus scan on my computer but got negative result. So I run disk space analyzer and here is the result.

As you can see, 7GB space has been occupied by Installer folder in my C drive. But is it safe to remove all those files from my system?
The answer is Yes! But in the future, you might having trouble when want to remove installed programs completely. This is because, C:\Windows\Installer contains a copy of changed system info when you install a program using the Windows installer. With this file, your system can restore back to its original condition when you remove the program using the Add/Remove Programs.
But in my situation, I don’t care with the problem or trouble or anything because what I want is the free space in my C drive. So what I did was,


1. I downloaded and installed Windows Installer CleanUp Utility.


2. Go to Start > Run and type,Add Image


“C:\Program Files\Windows Installer Clean Up\msizap.exe”


3. Click Ok.
Then I wait until Windows Installer CleanUp Utility finished doing its job. And here is the result,



I have 4GB of free space available in my C drive. Yay!

Warning! The command that I give here might corrupt your system and requires to reinstall or repair.

Monday, October 12, 2009

Microsoft’s U.K. Domain was Hacked!

Looks like the official Microsoft U.K. Domain was attacked and defaced by a hacker identified as rEmOtEr. Microsoft confirmed that the hack has been successful.

rEmOtEr altered a webpage in the Microsoft.co.uk domain with two images and multiple references to the kingdom of Saudi Arabia. The U.K. branch of the Redmond company managed to fix the problem, and the functionality of the website is back to normal parameters. The webpagehacked dealt with Microsoft events and can be found here. In the adjacent image you can see how the hacker defaced the page, courtesy of Zone-H.

Roger Halbheer, chief security advisor for Microsoft in Europe, the Middle East and Africa admitted that the hack was successful and revealed that the whole event was unfortunate. According to Microsoft, no sensitive information was compromised in the attack. This is a clear indication that the hack was done for show, rather than to actually cause any harm. Another argument that supports such a scenario is the fact that rEmOtEr took time to document the hack in two separate video fragments. You will be able to watch for yourselves the live hacking via the two “remoter_vs_microsoft.avi” files.
The hack was possible mainly because of the fact that the database was allowed to return error messages explained Halbheer, as cited by InfoWorld. The attack was possible through a technique referred to as SQL injection. This fact is also confirmed by the hacker in the two videos that were made available. Via Structured Query Language injection rEmOtEr was able to gain access to the database. In the video fragments you will be able to see how easy the hacker obtains both usernames and passwords for the database. Working his way from error message to error message, rEmOtEr finally could switch from SQL queries with an unexpected form to direct instructions to the database.

Hack into a Windows PC; with Winlockpwn.

A security consultant based in New Zealand has released a tool that can unlock Windows computers in seconds without the need for a password.
Adam Boileau first demonstrated the hack, which affects Windows XP computers but has not yet been tested with Windows Vista, at a security conference in Sydney in 2006, but Microsoft has yet to develop a fix.
Interviewed in ITRadio's
Risky Business podcast, Boileau said the tool, released to the public today, could "unlock locked Windows machines or login without a password ... merely by plugging in your Firewire cable and running a command".
Boileau, a consultant with Immunity Inc., said he did not release the tool publicly in 2006 because "Microsoft was a little cagey about exactly whether Firewire memory access was a real security issue or not and we didn't want to cause any real trouble".
But now that a couple of years have passed and the issue has not resolved, Boileau decided to release the tool on his
website.
To use the tool, hackers must connect a Linux-based computer to a Firewire port on the target machine. The machine is then tricked into allowing the attacking computer to have read and write access to its memory.
With full access to the memory, the tool can then modify Windows' password protection code, which is stored there, and render it ineffective.
Older desktop computers do not come equipped with Firewire ports, which are needed for the hack to work, but many recent models do. Most laptops made in the last few years include Firewire ports.
Paul Ducklin, head of technology for security firm Sophos, said the security hole found by Boileau was not a vulnerability or bug in the traditional sense, because the ability to use the Firewire port to access a computer's memory was actually a feature of Firewire.
"If you have a Firewire port, disable it when you aren't using it," Ducklin said.
"That way, if someone does plug into your port unexpectedly, your side of the Firewire link is dead, so they can't interact with your PC, legitimately or otherwise."
Ducklin also advised people to be careful when giving others physical access to their computer.
"I know people who'd think three times about asking passing strangers to take their photo in front of the Opera House in case they did a runner with the camera, yet who are much more casual with their laptop PC, as long as it's software-locked, even though the hardware alone is worth five times as much as the camera," he said.

Microsoft to Buy Yahoo Search and Then Facebook

Rumours from silicon valley this week point towards Microsoft purchasing Yahoo Search and then using $20 billion to get hold of Facebook. Microsoft picking up the Yahoo search business.

Word is that this deal will be done this week. While this is not surprising, it does bring to question the motives and plans of Microsoft.Techmeme is buzzing about the latest Microsoft Yahoo talks that has Microsoft buying the Yahoo Search business only. Here is Microsoft’s and Yahoo official statements.

Why would such a complicated transaction (just Yahoo search with all the headaches and all) be in the cards for Microsoft? After the failed bid for $40 plus billion for all of Yahoo, Microsoft’s intentions are clear. Buy the search business from Yahoo and take that team and go spend at least 20 billion for Facebook. Integrating the search team at Yahoo with Facebook puts a formidable army to take on Google.

A little bit of humour










Jumeirah Group IT

Friday, October 9, 2009

Apple Iphone OS 3.1.2.


Apple on Thursday released an update for the iPhone operating system, bringing the current version of the OS to 3.1.2.
According to notes accompanying the update, Apple fixed three bugs, which may not seem like a lot, but they are important. Among the changes is a fix for what Apple says is a "sporadic issue," where the iPhone would not wake up from sleep mode.
The update also resolves an issue that could interrupt the cell network until the phone is restarted. A bug that caused a crash during video streaming has been addressed in iPhone OS 3.1.2.
Apple said iPhone OS 3.1.2 is compatible with the iPhone, iPhone 3G, and iPhone 3GS. The update is available by plugging your iPhone into your computer and clicking on the update button in iTunes.
Once finished, your iPhone will restart and immediately alert you to a Carrier Settings update. This is a very small update that will be completed without needing to restart again.

Announcing Google Chrome OS


Google has moved from being just a search engine to being a software giant. With the release of Android and Chrome, Google has proven that they are not just a web giant. With Chrome being downloaded over 30 million times, Google has decided that they are going to work and build on it’s success with Chrome.
Today Google has announced that they will be working on a new Operating System called Google Chrome OS. Google Chrome OS is going to be a open source, lightweight operating system that will initially be targeted at netbooks. Later this year they will open-source its code, and netbooks running Google Chrome OS will be available for consumers in the second half of 2010.

The OS will run on both x86 and as well as ARM chips. Chrome OS has speed, simplicity and security is the key points for the Operating System. They are designing the OS to be fast and lightweight, to start up and get you onto the web in a few seconds. The user interface is minimal to stay out of your way, and most of the user experience takes place on the web.
Google Chrome OS is being created for people who spend most of their time on the web, and is being designed to power computers ranging from small netbooks to full-size desktop systems.
This all leads to the question though, like the Android, will it have a marketplace for the user’s to work with and how is it going to be better than Fedora or Ubuntu for a Linux distro? Looks like we will find out this fall together.

Download the Windows 7 RC EARLY!


Looks like the RC for Windows 7 has been let lose early! Microsoft has released the RC today on their own servers, no torrent! Download it before everyone (if you haven’t got the leaked version yet) and brag to others.
File Name: 7100.0.090421-1700_x86fre_client_en-us_Retail_Ultimate-GRC1CULFRER_EN_DVD.isoSize: 2.35GBMD5 Hash: 8867C13330F56A93944BCD46DCD73590
Welcome to Windows 7 Release Candidate (RC) testing. We’re on our way to Windows 7, and if you like trying out pre-release software, now’s your chance. You get to see what’s coming, and we get to see if our changes and fixes from the Beta testing are working correctly.
How do you test the software? You put it on your PC, and then do what you’d normally do. Your PC will automatically and anonymously send our engineers the information they need to verify the fixes and changes they made based on the Windows 7 Beta tests.

Intel’s New Core i5 and i7’s Offically Released.


Today on a computer hardware website named NewEgg.com released the new Intel Core i5 750 ($209.99) and the Intel Core i7 860 ($299.99)and 870 (at a whopping $579.99). This marks the official release of the new Intel Core i5 processors that use the 1156 socket type.
Intel’s plan is the Core 2 Duo/Quad series will disappear before Q1 next year, being replaced by Nehalem-based Core i7/i5/i3. In addition, some Pentium processors will also employ Nehalem architecture.
The Core i7 will target the high-end market, the Core i5 is designed for mid-range segment, and the Core i3 is aimed for entry-level market. Pentium is used for ordinary applications, Celeron for entry-level solutions, and Atom for netbooks and handheld devices.
Intel also have Lynnfield and Clarkdale products to offer. Lynnfield consists of Core i7-800 and Core i5-700. To be more exact, it includes Core i7-870, Core i7-860 and Core i5-750 models. Clarkdale is the Core i5-600 and Core i3-500 series, which has not released yet.


With the new releases, we should expect to see PC’s equipped with these processors soon and the Core 2 brand being phased out with cheaper prices.

Wednesday, July 29, 2009

How to boost Windows Vista speed

Windows 7 with its commendable performance improvements may be on the horizon. But for now, most of us have to live with Windows Vista, which can make even the fastest computer seem slow.
But you don't have to put up with Vista's sluggishness without a fight. In fact, most of what ails Vista when it comes to performance can be remedied by adjusting some settings and eliminating some features.
And the good news: The whole process need not take more than half an hour. Afterwards, you'll be rewarded a computer that feels a lot faster.
Vista went overboard with window animation -- the almost slow -- motion visual effect that occurs when you minimise or maximise an application. Whether you think the animation is cool or not, it's indisputable that it slows you down -- or at least it seems to.


Turn off window animation
Luckily, turning off window animation is possible, and doing so will not affect other types of interface animation that you may enjoy in Vista. Open the Windows Control Panel, click System and Maintenance, Performance Information and Tools, Advanced Tools from the task pane at the left, and then click "Adjust the appearance and performance of Windows". A user account control dialog box will prompt you, and you should click Continue. The Performance Options dialog box will open.
On the Visual Effects tab of the Performance Options dialog box, you have four choices: "Let Windows choose what's best for my computer", "Adjust for best appearance", "Adjust for best performance", and "Custom". "Custom" is followed by a list of individual check boxes that allow you to determine exactly which visual effects you would like to turn on or off.
To start, click "Custom", and then remove the check mark next to the "Animate windows when minimising and maximising". De-activating that option will make your applications and other windows snap into and out of view immediately rather than gradually. Changing this setting alone may be enough to make Vista feel snappier for you, and you could stop there and see how you like the change.


Go to 'Adjust for best performance'
If you're working on an underpowered or a really old machine and want to configure Vista's interface so that it uses a minimum of system resources, simply select the "Adjust for best performance" option. Doing so will remove virtually all of Vista's interface enhancements, but it will reduce the load on your computer.
If you want to get rid of all of Vista's fancy - but resource zapping - visual niceties, you can revisit the Performance Options dialog box and turn off a few more of the effects.


Turn off UAC (User account control)
User account control (UAC) is supposed to keep you safe from malicious software. But the penalty is that at every turn, you're prompted to provide Windows permission to carry out some action -- from deleting files to installing applications -- that you specifically requested.
It's an annoyance. You probably lived fine without UAC for many years. Plus you also likely run antivirus or anti-spyware software that keeps a lookout for possible harm. Then why not just turn UAC off?
It's easy enough to do. Open the Control Panel, and click User Accounts and Family Safety. Then click User Accounts. From the resulting User Accounts screen, click "Turn User Account Control on or off". On the next screen, remove the check mark from the box labelled "Use User Account Control (UAC) to help protect your computer". Click OK. You'll have to restart your computer, but once you do, those annoying UAC prompts will be gone.


Optimise indexing feature
Whether you like Vista's new indexing feature or not, you can optimise the way it works or disable it altogether. Open the Vista Control Panel, and click System and Maintenance, followed by Indexing
In the resulting Indexing Options dialog box, you can control which drives and folders get indexed by clicking the Modify button. Click Advanced to specify which file types are indexed.
Limiting the drives, folders, and file types that are indexed will reduce the amount of time that Vista spends indexing, and it will therefore reduce the overhead required by the indexing feature and consequently speed up your computer.
Making the few interface and operational tweaks here typically allows Vista to perform on a par with Windows XP. And for now, while the world waits for the even snappier Windows 7, that's probably good enough.

Wednesday, April 29, 2009

Office 2010 screenshots.

Office 2010, the next version of Microsoft's successful office programs suite, has been in closed testing for a while now. With a public beta expected later in the year, development is stepping up before the program, previously dubbed Office 14, is finally let out into the wild.


Here are some images of the new about screen of Office and screenshots of the new version of Outlook, including the ribbon toolbar. Click the images to enlarge where they are scaled down.






Gmail Redesigned 3.0 Focuses on Speed and Message Space










Gmail Redesigned, the dark-skinned theme that's part of the popular Google Redesigned Extension, has been released in a 3.0 version that adds more message space, reduces in size by half, and supports newer Gmail features.
Gmail Redesigned 3.0 isn't a major, uh, redesign of the all-encompassing skin, but it does try to address issues and irks that users have emailed and posted to Globex Designs. Chief among them is reducing the amount of vertical space taken up at the top by the logos, out-links, and other elements. There's also support for the newer pages orbiting Gmail, like the stand-alone Google Contacts, and full support for the "Older" (/faster) Gmail version. In addition, the design team states that they reduced the size of the pre-loading elements by around 50 percent, hopefully speeding up load times for users. Web designers, take note:
How are we able to make sure drastic reductions in size while adding so many new features? The biggest factor was the unification of many of the interface elements and further improvements of our compression algorithms. If you're interested in finding out more about our CSS compression, keep an eye out on our website as we will be releasing a brand new product called - CSS Compressor.
Enough code talk—let's take a look. The top picture on this post is the basic inbox view; here's how things look in a Compose window:



And look to the right for a compilation of sidebar widgets and a chat window with Gmail Redesigned 3.0.

Gmail Redesigned 3.0 will automatically update itself if you're using the Google Redesigned extension. Hit the link for details on the download, as well as the individual Gmail, Google Calendar, and Google Reader styles.

Windows Vista SP2 released to manufacturing



Microsoft has announced that SP2 for Vista has been released to manufacturing (RTM), which includes all the rolling updates and support for 'emerging hardware standards.'
Microsoft is keen to push people away from the concept of service packs as major upgrades, but people still remember the Windows XP SP which virtually rewrote half of the Operating System to make it more secure for internet use.
The rolling security updates and patches are now Microsoft's preferred method of updating PCs, but for manufacturers and IT staff it is important to have a complete package to put on computers.
Support for new standards
SP2 brings the likes of Windows Search 4.0, Bluetooth 2.1 support, Windows Connect Now functionality and the ability to record data onto Blu-ray media natively.

"Today we are announcing the Release to Manufacturing (RTM) of Service Pack 2 (SP2) for Windows Vista and Windows Server 2008. SP2 represents the latest step in Microsoft's commitment to continuous improvement, said Brandon LeBlanc in a blog post.
"It includes all updates that have been delivered since SP1, as well as support for new types of hardware and emerging hardware standards."
The public availability of SP2 is still pegged to Q2, the second quarter of the year.

Tuesday, April 28, 2009

Axxana Phoenix Is a Ruggedised SSD Array for Hardcore Data Backup


Because I'm paranoid about backing up files in multiple places, Axxana's Phoenix System, which features a multiple SSD array, looks pretty great. Especially considering it can withstand earthquakes, fire, water and "terror."

The storage capacity of the Phoenix System ranges between 72 and 300-gigabyte capacities. It can withstand 2000 degrees Fahrenheit for an hour, or 482 degrees for 6 hours. It would also survive under 40 G of shock, 30 feet of water pressure or 5000 pounds of force. On top of that, it has 3G and wi-fi antennas which allow you to access it's data if you cant connect directly, and batteries which support 6 hours of 3G transfer if power should be cut.
But Axxana Phoenix System isn't necessarily for the home—it stands 3 feet tall, is 2 feet wide and is 4 feet deep. Plus it weighs 436 pounds. Mentions of price are nowhere to be seen, but I'll leave that up to your imagination to figure out.

Monday, April 27, 2009

Oracle buys Sun for $7 billion

On April 20, 2009, Oracle announced it has entered into an agreement to acquire Sun Microsystems (Sun). The proposed transaction is subject to Sun stockholder approval, certain regulatory approvals and customary closing conditions. Until the deal closes, each company will continue to operate independently, and it is business as usual.
The acquisition combines best-in-class enterprise software and mission-critical computing systems. Oracle plans to engineer and deliver an integrated system—applications to disk—where all the pieces fit and work together so customers do not have to do it themselves. Customers benefit as their system integration costs go down while system performance, reliability and security go up.


Oracle will pay $9.50 a share for Sun, which values the high-end server and software maker at about $7.06 billion, based on 743 million shares outstanding as of the end of its second fiscal quarter on December 28, according to Sun. Sun had previously rejected IBM’s offer to pay up to $9.40 a share, according to sources with knowledge of the matter. Shares of Sun jumped 35.7 percent to $9.08 in morning Nasdaq trading, while Oracle shares fell 3.7 percent to $18.36. Shares of IBM, which did not immediately return calls for comment, fell 1.8 percent to $99.49 on the NYSE. Oracle President Safra Catz said on a conference call that Oracle intends to make the hardware division profitable. Sun’s top-selling products are high-end servers and storage equipment.

New Professional 3D Production System Comes From Panasonic

One of the biggest High Definition Technology companies Panasonic Corporation has announced a professional 3D Full HD Production system. This device claims the first in the industry, consists of a twin-lens P2 professional camera recorder and a 3D Compatible High definition display.Panasonic has decided to exhibit the concept of 3D system at its booth on NAB 2009, which is going to be held in Las Vegas today. This interesting 3D camera from Panasonic based on the actual and suiting P2 HPX170.

Faceless LED Watch With Stylish Body

The name of the designer of this watch is Hiranao Tsuboi. This eye attracting watch works with LED digits built into the elegant black brushed-metal wristband. It is expected to be available soon.

Microsoft gears up for Windows 8

Windows 7 might still not be officially complete. And Microsoft is laying people off. But the company's already gearing up to launch its next operating system: Windows 8.
Early job postings indicate at least one focus for Windows 8 will be systems and data management.

The company has
advertised for developers and testers to deliver "major improvements" in Windows' File Server.
Indications are Microsoft's looking to make management of files easier across wide area networks and the internet and to make WinFS capable of scaling to more machines than you get with Windows Server 2008 R2 and even with the as-yet unfinished Windows 7.
This would build on file sharing in applications such as Windows Live Messenger and the company's online meeting system Windows Meeting Spaces.
"We will also soon be starting major improvements for Windows 8 where we will be including innovative features which will revolutionize file access in branch offices," Microsoft said in an advert on its site for a lead test software development engineer.
In the ad for a software development engineer in testing, Microsoft hinted its current testing infrastructure does not meet the kinds of scalability it's got in mind for Windows 8. The new recruit will be tasked with building the new test suite with an eye on scalability and performance.

Separately, Microsoft's caught up to the internet age and enabling users to access MSN instant messenger without requiring users to have the messenger installer on their PC and without having to separately log into Windows Live Messenger. Users will get MSN as part of Hotmail, similar to Yahoo! Messenger in Yahoo! Mail and Gtalk in Gmail.
Microsoft was one of the first to offer free web mail with Hotmail, which it acquired, but the service has developed in fits and starts over the years. It has lagged on not de-activating unused accounts, search and giving a decent amount of storage.
The new web-based IM is being rolled out in phases. ®

Keeping mentally fit: the daily crossword is not enough

GERMANY - A man sits on a train solving a crossword puzzle, a woman broods over a Sudoku grid while an ad for an electronic memory game flashes across a television screen. There is no shortage of ways to improve the brain’s memory powers - after all, lots of people want to improve their mental abilities.
But are Sudoku, crosswords and other training games any good at improving memory? Are they really effective in training the mind or just a nice way of passing the time?
“If you train your brain, you can improve your performance,” says Carsten Brandenburg from Germany’s Memory Training Association. But not every exercise can radically change a person’s ability to remember things.
“If you repeat the same kind of exercise, your mind gets into a routine, and there is no challenge anymore,” says Brandenburg.
Sudoku is most effective in the initial stages. “The brain is not used to thinking in that manner and that’s why new connections are made between the individual nerve lains Brandenburg.
The chairwoman of the Professional Association of German Psychiatrists, Christa Roth-Sackenheim says, “We have recently come to understand that the human brain can make new connections and even new paths.”
That explains why Sudoku and computer memory games can have a positive effect on the brain’s memory performance. “You don’t just improve your concentration, you also practice strategic thinking and how to link different facts,” explains the psychiatrist. That ability can be useful in daily life.
The most effective puzzles are those that test more than your existing knowledge which excludes puzzles such as crosswords.
There are a number of books and games for electronic consoles that go in that direction, according to Brandenburg, who also works as a memory coach at Germany’s Memory Clinic in Essen.
“The best exercises are well designed and gradually become more challenging as they progress,” he says.
But computer games and electronic memory puzzles are not all-purpose weapons against memory loss, says psychiatrist Michael Rapp from Berlin’s Charite University Hospital.
“There is no exercise that can make a person more intelligent overall,” says the head of the clinic’s geriatric psychiatry working group.
You don’t need to buy expensive games to keep your brain fit. If you follow a few pointers every day, you will improve your memory or at the very least, keep it at the present level.
“Communicating is essential,” says Brandenburg, adding, “That’s how you learn to query things, gain new knowledge and grapple with questions.”
Another way of improving memory is to learn a new language, according to Roth-Sackenheim. Listening to music, doing domestic chores alone or pursuing a hobby can also help.
“Engaging in physical exercise is important for all age groups,” says Roth-Sackenheim. “That’s because sport trains the brain because you have to remember certain physical movements and practice your coordination.”
There is another alternative - keeping busy with your grandchildren. When elderly people try to understand young people’s lives, they also exercise their brains.


Source :KT

Saturday, April 25, 2009

Windows 7 to have an 'XP mode'

Microsoft is trying to make it easier to sway users of Windows XP onto the latest version of its operating system.
For some time now, the company has been quietly building a "Windows XP mode" that uses virtualization to allow Windows 7 to easily run applications designed for Windows XP. According to sources familiar with the product, the application compatibility mode is built on the Virtual PC technology that Microsoft acquired in 2003, when it
scooped up the assets of Connectix.
By adding the compatibility mode, Microsoft is aiming to address one of the key shortcomings of
Windows Vista: its compatibility issues with software designed for Windows XP and earlier versions of the operating system.
Details of the Windows XP mode, previously known as Virtual Windows XP, were
first published earlier Friday by the Windows SuperSite blog.
The technology has not been part of the beta version of Windows 7 or previously disclosed by Microsoft, but is expected to be released alongside the upcoming release candidate version. Microsoft said on Friday that it will
release it to developers next week and publicly starting May 5.
According to the SuperSite report, written by bloggers Paul Thurrott and Rafael Rivera, the XP mode won't come in the box with Windows 7, but will be made available as a free download for those who buy the professional, enterprise, or "ultimate" versions of Windows 7

Friday, April 24, 2009

Hackers Claim They Created 'Unfixable' Windows 7 Exploit

researchers at the Hack In The Box conference are claiming they found a way to gain access to any Windows 7 computer undetected. Their weapon of choice is a 3kb app named VBootkit 2.0.

According to network world, the researchers said the hack is unfixable, as it loads itself into the system memory during bootup, which virus scanners will struggle to detect. The exploit then gives the CYBERTERRORIST the ability to pretty much do whatever they want on whatever computer they're targeting. But don't panic—this can't be installed remotely, so they'd have to physically use your machine to pull this off.

Cheap security: Light makes it look like the TV is on!


Ever leave your stereo on when you're away so burglars hear voices and think someone's home? A new product called FakeTV takes that approach up a notch. The computer-controlled light automatically turns on when the lights go out, and flashes and dims so that from the outside it looks like a TV is on.

Within 9 months, Apple reaches 1 billion App Store downloads.

Within just 9 months, Apple has just reached 1 billion App Store downloads. It is phenomenal and results have shown, the iPhone and App Store have played an enormous role in Apple and AT&T’s recent earnings. iPod and iPhone sales have totaled 37 million units so far and their recent 2nd quarter earnings are the best in Apple history; $8.16B revenue, $1.33 profit per share.
Congratulations Apple, a job well done.

Wednesday, April 15, 2009

6 ways to protect your PC from rogue PDF files

Once they were just a convenient way to share documents with the widest possible audience. But PDF files have become increasingly popular as a way to distribute malware, according to a recent Microsoft security report, with attacks doubling almost every month in the second half of 2008.
Adobe has patched the vulnerabilities behind those particular problems, so if you're running the latest copy of Adobe Reader then you're not currently at risk. At least, that's the theory.
But what if there are other PDF security holes yet to be discovered? Just a few minutes spent tweaking your Adobe Reader settings could protect you from future attacks. Here's what you need to know.


1. Disable JavaScript
Some PDF files make use of Acrobat JavaScript to do smart things like perform calculations in form fields, change a documents appearance or work with a database. Unfortunately hackers sometimes use it to create exploits, so if your PDF files don't need that kind of power then it's worth turning JavaScript off. Click Edit > Preferences > JavaScript and clear the "Enable Acrobat JavaScript" box.

2. Block multimedia
PDF files may also include embedded audio or video content, a problem if that's been hacked to exploit a media player security flaw. If you don't need multimedia support in your PDF files then click Edit > Preferences > Multimedia Trust, and clear "Allow multimedia options" for both "Trusted documents" and "Other documents".

3. Beware file attachments
The authors of a PDF document can configure it to launch attachments embedded within the PDF file itself. There are obvious risks here, and so Adobe will always display an "are you sure you really want to do that"-type prompt - but that may not always be enough. If inexperienced users have access to your system, for instance, they may not fully understand the consequences of clicking "OK".
Even with the prompt, we think the dangers of this feature outweigh any benefits. If you agree, click Edit > Preferences > Trust Manager and clear the "Allow opening of non-PDF file attachments..." box.

4. Control your plug-ins
Adobe Reader comes with more than 20 standard plug-ins to handle everything from processing web links to playing videos or saving PDF files. Each one provides another potential attack point for a hacker, so removing unnecessary plug-ins should help make you more secure (and might help Adobe Reader boot more quickly, too).
Click Help > About Adobe Plug-Ins to get a feel for what's installed. If you scroll down to SaveAsRTF and decide you really don't need the ability to save PDF files in Rich Text Format, say, then make a note of the plug-in's file name: SaveAsRTF.api. Close Adobe Reader, navigate to the plug-ins folder (by default \Program Files\Adobe\Reader 8.0\Reader\plug_ins) and rename SaveAsRTF.api to SaveAsRTF.api.old. Restart Adobe Reader, click Help > About Adobe Plug-Ins again and you'll see SaveAsRTF has disappeared.
Repeat the process with other unwanted plug-ins, as required. And if you discover you need a particular plug-in, after all, then remove the .old from the file name and restart Adobe Reader to get it working again.

5. Tweak default settings
Adobe Reader has a few other security settings that are installed at their safest values by default, but it's wise to check your configuration occasionally to ensure they're still set correctly.
Click Edit > Preferences to begin, then choose the JavaScript category. The "Enable menu items JavaScript execution privileges" option here gives extra rights to scripts, so leave this off unless you've good reason to do otherwise.
Click Security and ensure "Verify signatures..." is checked, allowing Adobe Reader to check document signatures.
Then click Trust Manager > Change Settings to view the web sites that Adobe Reader is allowed to access. Make sure the program is not set up to use the riskiest "Allow all web sites" (unless you've set that yourself and understand the dangers), and that the My Web Sites list is either empty, or only contains sites that you trust.

6. Stay up-to-date
The best protection of all? Never view PDF files from untrusted sources, particularly spam. And ensure Adobe Reader is kept up-to-date with all the latest security patches. Allow the program to download updates just as soon as it alerts you to them, and click Help > Check For Updates occasionally just to confirm that you have the latest version.

Microsoft Targets First Half of 2010 for Next Office Release


Microsoft is going to announce its next productivity suite code-named Office 14, which will be branded as Office 2010. All the related applications will carry 2010 stamp and the suite will be released for public next year.
Apart from this, Microsoft will also be rolling out Service Pack 2 for its Office 2007 suite on April 28.
Microsoft Office 14 beta screenshots were leaked in earlier in January and later Microsoft CEO Steve Ballmer confirmed that the productivity suite will not be released this year.
Office 2010 will be ready and shipped to manufacturers in the first half of next year. Chris Capossela, senior vice president, Microsoft Office, said, after the productivity suite is shipped to manufacturers, it takes six weeks to four months or more to reach PC users. Of course, the availability of the Office 2010 suite will differ for consumers and enterprise segments as well for those who download it or purchase it via retail points.
Julia White, director of the Exchange product management team, said that technical previews of Office 2010 would be available in third quarter this year. Microsoft will release Exchange Server 2010 beta to enterprise users later today and the final version will be available for retail in second half of this year.
Evidence of Microsoft working to offer 64-bit versions of Office 2010 was pointed out by ZDNet blogger Ed Bott. Bott found imprints of 64-bit Office 2010 version in the code while beta testing the suite. Ars Technica received confirmation from Microsoft in which the spokesperson said: "Yes, Office will have two separate 32-bit and 64-bit versions. Office 2010 will be the first to do this."
Usage of 64-bit operating systems has become prevalent after Vista's release. Now, users running 64-bit Windows OS will be able to use 64-bit Office 2010 without emulating it as 32-bit version. It would be interesting to see any synchronization and symphony between Office 2010, Windows 7 and Windows Mobile 7 products from Microsoft.

What is Hyper-V server???

It's been a couple weeks now since Microsoft announced Hyper-V Server, but I wanted to take a minute and boil down what the product really does and doesn't do.

Ok, what does it do? Well, a couple of things:
· Loads a driver set and base OS that you host virtual machines on. No UI, no extra services. It only hosts VMs that you manage from another machine, either using the Hyper-V Management console or Virtual Machine Manager 2008.

· Host VMs. Windows VMs. Linux VMs. Host pretty much whatever VMs you can get to run.

· Comes to you free of charge. Yup, free download.

Ok, what doesn’t it do? Hey, what do you expect for the price of $0?
· Come with licenses. Every Windows VM you run needs a server license. By comparison, Server 2008 Standard comes with one free VM, Server 2008 Enterprise comes with 4, and Server 2008 Datacenter? Unlimited. As many as your hardware can run, all included.

· Clustering. Say you want to have virtual machines failover from one physical host to another. You need Windows Server 2008 Enterprise with Hyper-V.

Can’t you put all this info in a nice, easy to read chart? I could, but someone else already did it for me:


Microsoft supplies Interpol with DIY forensics tool

Interpol plans to distribute a Microsoft DIY computer forensics tool to its 187 member countries under an agreement announced Wednesday.
Cofee, short for Computer Online Forensic Evidence Extractor, is a thumb drive containing more than 150 investigative applications police can use to collect digital evidence at crime scenes. When Microsoft
announced the free tool last year, it said some 2,000 officers in 15 countries were using it.

The proliferation of cell phones, digital cameras, and other electronics devices means that even old-world crimes such as muggings and burglaries have the potential to be cracked by sifting through digital footprints inadvertently left behind by perpetrators. But collecting that evidence and preserving its integrity so it can be admitted into court trials isn't easy.
Cofee is designed to ease that burden by providing investigators with easy-to-use tools that allows them to collect electronic data on the fly. It also allows them to collect data without necessarily having to lug gear to headquarters first.


Not that Cofee has been well received by everyone. Some of the more conspiratorially minded posited that some of the password-cracking features worked by
exploiting backdoors secretly built into Windows. Microsoft has insisted Cofee is solely a collection of forensics tools. ®

Wednesday, April 8, 2009

Kisai denshoku led watch: how a cylon tells the time


Inspired by the neon lights of the flashy Shinjuku district of Tokyo, this new watch out of Japan is sure to draw plenty of attention when you check the time.
The Kisai Denshoku watch is crafted from aluminum and stainless steel, and tells time using a unique set of stacked orange LED bars.
A press of the rectangular display button starts an animated sequence that shows the time in three steps. First stage shows the hours, then the second displays ten minute intervals, followed by a third pass that displays the single minutes. Confused? Maybe this simple Flash animation will help illustrate how the Denshoku works.
There’s also an animation mode that lets turns on a lighting sequence once every minute for 12 minutes after checking the time. Why? Dunno. But it sure does look purty. You can even adjust the brightness of the LEDs to conserve battery life.
The Denshoku is available in either black or bright silver brushed metal finishes, and can be found over at TokyoFlash for appx. $236 (USD), including worldwide shipping.

Microsoft announces single-version Windows 7


Microsoft today announced that the forthcoming version of its operating system, Microsoft Windows 7, would come in just one single version, despite rumors that there would be five versions of the software.
The operating system will simply be called "Windows 7." The company found that offering multiple versions of Windows Vista confused customers, and generated what the company calls "unnecessary customer dissatisfaction." According to a study conducted by Microsoft, buyers of Vista Home Premium reported feeling that they were overcharged, while those purchasing Home Basic felt like they could be missing out on valuable features.
More importantly, however, the policy of multiple OS versions generated a lot of confusion. When asked to explain the differences between versions, only 3% of potential Vista buyers were able to do so. The multiple versions of Vista contributed to a public perception that, compared to Apple's Mac OS X, Vista was a "confusing, disjointed, bloated piece of crap that nobody could love" and that Microsoft was interested only in "squeezing every possible nickel out of every customer." Offering Windows 7 in just one version "is just common sense," said a Microsoft spokesman.
"Launching it in five versions could have compromised what would otherwise have been a very successful launch of a very important product." And that, he said.

Friday, April 3, 2009

Sex and Tech

Results from this new survey show that
21% of teen girls and 18% of teen boys have sent/ posted nude or semi-nude images of themselves.
What is going on with teens, tech, and sex?

Thursday, April 2, 2009

Happy Birthday, Gmail, You Cute Lil Five Year Old



It’s been five years since Google first launched Gmail, with its offer of a gigabyte of storage for free appearing to many as a joke on 1 April 2004.
It was no joke, and Gmail has taken the world of free webmail by storm, forcing others to boost their storage and improve their features. At first, Google’s mail service was available by invite only. To join up, someone with a Gmail account had to send you one of their limited number of invites. It was only opened up to the public in February 2007.
Despite being around for so long, Gmail is famously still listed as being a beta.
And, despite being part of the Google family, it holds far less market share than its rivals. As of last year, Yahoo Mail had 55 per cent of the market in the US, followed by Microsoft’s Windows Live at 26 per cent. Gmail had just six per cent, according to the Hitwise statistics. That said, comScore reported that Gmail saw growth of 43 per cent last year, so maybe one day it will eventually catch up.
“Google Mail was born out of an experimental project created by a few engineers at Google five years ago. From the beginning, we wanted Gmail to be a faster, cleaner and more intuitive solution for people's email," a Google spokesperson.
“Since 2004 we've continued to focus on making Google Mail easier and more fun by introducing additions like themes, video chat and Google Mail Labs. We're thankful that so many people have picked Google Mail over the past five years, and we're looking forward to providing them with more innovative features in the future.”



Google uncloaks once-secret server


Google is tight-lipped about its computing operations, but the company for the first time on Wednesday revealed the hardware at the core of its Internet might at a conference here about the increasingly prominent issue of data center efficiency.
Most companies buy servers from the likes of Dell, Hewlett-Packard, IBM, or Sun Microsystems. But Google, which has hundreds of thousands of servers and considers running them part of its core expertise, designs and builds its own. Ben Jai, who designed many of Google's servers, unveiled a modern Google server before the hungry eyes of a technically sophisticated audience.

Google's big surprise: each server has its own 12-volt battery to supply power if there's a problem with the main source of electricity. The company also revealed for the first time that since 2005, its data centers have been composed of standard shipping containers--each with 1,160 servers and a power consumption that can reach 250 kilowatts.
It may sound geeky, but a number of attendees--the kind of folks who run data centers packed with thousands of servers for a living--were surprised not only by Google's built-in battery approach, but by the fact that the company has kept it secret for years. Jai said in an interview that Google has been using the design since 2005 and now is in its sixth or seventh generation of design.
"It was our Manhattan Project," Jai said of the design.
Google has an obsessive focus on energy efficiency and now is sharing more of its experience with the world. With the recession pressuring operations budgets, environmental concerns waxing, and energy prices and constraints increasing, the time is ripe for Google to do more efficiency evangelism, said Urs Hoelzle, Google's vice president of operations.
"There wasn't much benefit in trying to preach if people weren't interested in it," said Hoelzle, but now attitudes have changed.
The company also focuses on data center issues such as power distribution, cooling, and ensuring hot and cool air don't intermingle, said Chris Malone, who's involved in the data center design and efficiency measurement. Google's data centers now have reached efficiency levels that the Environmental Protection Agency hopes will be attainable in 2011 using advanced technology.
"We've achieved this now by application of best practices and some innovations--nothing really inaccessible to the rest of the market," Malone said.


Why built-in batteries?
Why is the battery approach significant? Money.
Typical data centers rely on large, centralized machines called uninterruptible power supplies (UPS)--essentially giant batteries that kick in when the main supply fails and before generators have time to kick in. Building the power supply into the server is cheaper and means costs are matched directly to the number of servers, Jai said.
"This is much cheaper than huge centralized UPS," he said. "Therefore no wasted capacity."
Efficiency is another financial factor. Large UPSs can reach 92 to 95 percent efficiency, meaning that a large amount of power is squandered. The server-mounted batteries do better, Jai said: "We were able to measure our actual usage to greater than 99.9 percent efficiency."

The Google server was 3.5 inches thick--2U, or 2 rack units, in data center parlance. It had two processors, two hard drives, and eight memory slots mounted on a motherboard built by Gigabyte. Google uses x86 processors from both AMD and Intel, Jai said, and Google uses the battery design on its network equipment, too.
Efficiency is important not just because improving it cuts power consumption costs, but also because inefficiencies typically produce waste heat that requires yet more expense in cooling.

Costs add up
Google operates servers at a tremendous scale, and these costs add up quickly.
Jai has borne a lot of the burden himself. He was the only electrical engineer on the server design job from 2003 to 2005, he said. "I worked 14-hour days for two and a half years," he said, before more employees were hired to share the work.
Google has patents on the built-in battery design, "but I think we'd be willing to license them to vendors," Hoelzle said.
Another illustration of Google's obsession with efficiency comes through power supply design. Power supplies convert conventional AC (alternating current--what you get from a wall socket) electricity into the DC (direct current--what you get from a battery) electricity, and typical power supplies provide computers with both 5-volt and 12-volt DC power. Google's designs supply only 12-volt power, with the necessary conversions taking place on the motherboard.

That adds $1 or $2 to the cost of the motherboard, but it's worth it not just because the power supply is cheaper, but because the power supply can be run closer to its peak capacity, which means it runs much more efficiently. Google even pays attention to the greater efficiency of transmitting power over copper wires at 12 volts compared to 5 volts.
Google also revealed new performance results for data center energy efficiency measured by a standard called power usage effectiveness. PUE, developed by a consortium called the Green Grid, measures how much power goes directly to computing compared to ancillary services such as lighting and cooling. A perfect score of 1 means no power goes to the extra costs; 1.5 means that half the power goes to ancillary services.
Google's PUE scores are enviably low, but the company is working to lower them further. In the third quarter of 2008, Google's PUE was 1.21, but it dropped to 1.20 for the fourth quarter and to 1.19 for the third quarter of 2009 through March 15, Malone said.
Older Google facilities generally have higher PUEs, he said; the best has a score of 1.12. When the weather gets warmer, Google notices is that it's harder to keep servers cool.
Shipping containers
Most people buy computers one at a time, but Google thinks on a very different scale. Jimmy Clidaras revealed that the core of the company's data centers are composed of standard 1AAA shipping containers packed with 1,160 servers each, with many containers in each data center.
Modular data centers are not unique to Google; Sun Microsystems and Rackable Systems both sell them. But Google started using them in 2005.
Google's first experiments had some rough patches, though, Clidaras said--for example when they found the first crane they used wasn't big enough to actually lift one.
Overall, Google's choices have been driven by a broad analysis on cost that encompasses software, hardware, and facilities.
"Early on, there was an emphasis on the dollar per (search) query," Hoelzle said. "We were forced to focus. Revenue per query is very low."
Mainstream servers with x86 processors were the only option, he added. "Ten years ago...it was clear the only way to make (search) work as free product was to run on relatively cheap hardware. You can't run it on a mainframe. The margins just don't work out," he said.
Operating at Google's scale has its challenges, but it also has its silver linings. For example, a given investment on research can be applied to a larger amount of infrastructure, yielding return faster, Hoelzle said.

Tuesday, March 31, 2009

Skype For iPhone Now Available, Has VoIP over 3G With 3.0 Firmware


Apple's just about finished rolling out Skype for iPhone, and now you can go download the VoIP app for themselves.

Our quick test showed that voice quality is quite good—definitely on par or better than actual 3G calling over AT&T's network—and connects rather quickly. It's unfortunate that 2.2.1 doesn't have background notifications, so there's no way somebody could Skype you unless you had the app open all the time.
What's also interesting is that voice calling only works when you're on Wi-Fi in the 2.2.1 firmware, popping up a restriction message if you're on 3G, but
9to5Mac says it works just fine in the 3.0 firmware. Not sure whether that's because the 3.0 developer's beta is less locked down, but it's one pretty good reason to risk the upgrade.

Honda Asimo Creators Turning Your Brain into the Ultimate Robot Controller


You know what I think the worst thing about having a robot army is? You have to press buttons. It's much more satisfying to get every automaton to do your bidding by just thinking it.


Apparently, the people at Japan's Honda Research Institute had the same idea, because they've now partnered with ATR and Shimadzu Corp. to come up with a way to use your brain as a robot remote control.
Called BMI (Brain Machine Interface - not the acronym that tells you you're fat), the tech uses electroencephalography, which measures slight electrical currents, and near-infrared spectroscopy, which looks at brain blood flow. Putting the two together gives you up to 90% accurate robot control without the use of physical implants.
Unfortunately, you still have to strap yourself to this giant chair and ridiculous-looking cap that kind of makes you resemble Dark Helmet from Spaceballs. But one day, when your mobile minions appear suddenly in the horizon, wordlessly laying waste to your enemies with nary a peep from you... oh, how glorious a time it shall be.

xtensor gamer hand exerciser gets your button-mashing, joystick wiggling fingers in fighting shape

Do you play lots of video games? Here’s a great way to limber up your trigger fingers to get ready for some serious gaming action. Especially good for warming up for quick fret presses in music games like Guitar Hero and Rock Band, the Xtensor hand exerciser is perfect for getting your hands in shape for the big game.









Just strap the open-fingered glove around your wrist, put your digits through the fingerholes, and get to stretching the tiny elastic exercise bands. By stimulating hard to isolate finger extensor muscles and tendons in your hands, wrists and elbows, you’ll build up hand strength you never knew you had. All the better to kick your ass in Tekken 6 when it comes out this fall.

And even if you’re not constantly glued to your game console, the Xtensor can help you keep your hands, arms and wrists in shape whether you’re an avid golfer, tennis player, spend your days in front of the computer keyboard, or frequently use your hands for (um) something else (nudge, nudge).
So give your fingers a hand and grab an Xtensor hand exerciser over at
ThinkGeek for $39.99 (USD).

Monday, March 30, 2009

swiss army usb hub: brando’s rota-rota combo hub

Brando, sellers of some of the weirdest stuff I have ever seen in my life, are cutting back on absurdity with their latest gadgets. For example, their USB hub is functional and versatile. But still a bit weird.


















Brando calls it the “USB 3-in-1 Rota-Rota Combo Hub”. I think its named like that because each of the 3 USB ports can be turned up to 90°, but you never know with Brando. Also, I don’t see how having rotating USB ports is useful. Does it make it easier to remove a device that’s plugged into a port?

Aside from the rota-rota ports, the Rota-Rota is also a multi-card reader and can read SD, SDHC, Memory Stick Duo, MicroSD and M2 cards.



The miracle of modern China: fantastic fake eggs!


The production in China of fake phones, cars, designer accessories, sneakers and more is well known. But did you know they make fake eggs? The eggs have convincing shells, yolks and whites, and even hard-boil more or less like the real thing (or maybe they come that way). Of course, fake Chinese eggs are often toxic and can turn you into an "idiot," according to the post on the other side of this link. But, still, you've got to marvel at both the manufacturing prowess and sheer audacity of the counterfeiters. It's also amazing to me that a human being can make an egg cheaper than a chicken can. Check out this first-hand experience with fake Chinese eggs, along with video evidence.

Tactical assault throat mic now available for phones


Sanwa plans to ship a cell phone throat microphone based on the ones used by SWAT teams and military commandos. The mic design should improve calls in noisy environments.
Asbestos Cancer Asbestos Cancer