Tuesday, May 26, 2009
Sun has introduced the power of virtualization to hundreds of businesses of all sizes, including Wikipedia, eBay, SmugMug, and several other fast growing social networking sites. Learn how you too can save energy, time, and money, and improve scalability with this guide to virtualization success.
Download your free copy of Virtualization for Dummies.
Tuesday, April 07, 2009
PortableApps.com is the world's most popular portable software solution allowing you to take your favorite software with you. A fully open source and free platform, it works on any portable storage device (USB flash drive, iPod, memory card, portable hard drive, etc). With millions of users all over the world and a full collection of open source software as well as compatible freeware and commercial software and partners in the software and hardware industry, PortableApps.com is the most complete solution for life on the go.
Sunday, April 05, 2009
"It seems that this economy has inspired a lot of businesses to move to Linux, with Red Hat posting profits that beat everyone's expectations. There's a dark side to being a highly profitable company in a down economy, though — now there are talks of Citigroup and Oracle wanting to buy Red Hat. For a while now, we've been watching Yahoo fend off Carl Icahn and Steve Ballmer so that they could stay independent, but the fight seems to be a huge distraction for Yahoo, with lots of energy (and money) invested. Will Red Hat stay independent? What potential buyer would make for a good parent company?"
Posted by Soulskill on SD
Tuesday, March 31, 2009
Monday, March 30, 2009
In an event that hits the computer world only once every few years, security experts are racing against time to mitigate the impact of a bit of malware which is set to wreak havoc on a hard-coded date. As is often the case, that date is April 1.
Malware creators love to target April Fool's Day with their wares, and the latest worm, called Conficker C, could be one of the most damaging attacks we've seen in years.
Conficker first bubbled up in late 2008 and began making headlines in January as known infections topped 9 million computers. Now in its third variant, Conficker C, the worm has grown incredibly complicated, powerful, and virulent... though no one is quite sure exactly what it will do when D-Day arrives.
Thanks in part to a quarter-million-dollar bounty on the head of the writer of the worm, offered by Microsoft, security researchers are aggressively digging into the worm's code as they attempt to engineer a cure or find the writer before the deadline. What's known so far is that on April 1, all infected computers will come under the control of a master machine located somewhere across the web, at which point anything's possible. Will the zombie machines become denial of service attack pawns, steal personal information, wipe hard drives, or simply manifest more traditional malware pop-ups and extortion-like come-ons designed to sell you phony security software? No one knows.
Conficker is clever in the way it hides its tracks because it uses an enormous number of URLs to communicate with HQ. The first version of Conficker used just 250 addresses each day -- which security researchers and ICANN simply bought and/or disabled -- but Conficker C will up the ante to 50,000 addresses a day when it goes active, a number which simply can't be tracked and disabled by hand.
At this point, you should be extra vigilant about protecting your PC: Patch Windows completely through Windows Update and update your anti-malware software as well. Make sure your antivirus software is actually running too, as Conficker may have disabled it.
Microsoft also offers a free online safety scan here, which should be able to detect all Conficker versions.
Saturday, March 07, 2009
It's malware that actually removes other malware from its victims' PCs. And so far, nobody is exactly sure how it's being distributed.
Security experts this week are buzzing about a new Trojan called Tigger.A, also known as Syzor. The data-stealing malware has quietly claimed about 250,000 victims since it was first spotted by security intelligence company iDefense in November, according to a Washington Post report.
Tigger.A allows attackers to gain access to "administrator" privileges on Windows machines, even if the user himself doesn't have those privileges, according to the report. It takes advantage of a vulnerability (MS08-066) in Windows' "privilege escalation" feature that Microsoft revealed -- and patched -- in October.
"Tigger removes a long list of other..... More Here
Tuesday, March 03, 2009
Koobface Variant Hits Facebook -- Again
In this scam, detected by researchers at Trend Micro, users receive a message with a link, purporting to be from a friend from the user's contact list, along with a spoofed version of YouTube. Once users click the link, they are taken to a site supposedly hosting a video that appears to be from the alleged sender, containing the name as well as the photo of the user's "friend" from his or her Facebook profile. Here
Facebook Corporate Security
The range of security threats around social networking sites, including LinkedIn, MySpace, Facebook and others, ranges greatly, Amit said. Here
Facebook Turns Site into a Democracy:
In addition to "poking" former classmates and updating your status update with what you had for lunch today, Facebook will now allow you to vote on the site's terms of service. Here
Thursday, February 26, 2009

Microsoft Sues TomTom For Linux Patent Infringement.
Microsoft has gone and done it, they've filed suit in U.S. District Court claiming Linux violates their patents.
The case centers on portable GPS device maker Tomtom, which uses Linux in its device. Despite Microsoft claiming for years that parts of Linux infringe on its intellectual property, the case is believed to be the first time Microsoft has tried to prove a case against Linux in court.
Here
Wednesday, February 18, 2009
Silicon Valley has repeatedly urged Congress to raise the H-1B cap, which is currently set at 65,000 visas per fiscal year, but lawmakers have resisted, citing concerns over fraud in the H-1B program.
In October 2008, a USCIS report found that the H-1B program has more than a 20 percent violation rate. The fraud identified in the report included jobs not located where employers claimed, H-1B visa holders not being paid the prevailing wage, forged documents, fraudulent degrees and "shell businesses."
Even before the report was issued, Senators Charles Grassley of Iowa, Dick Durbin of Illinois and Bernie Sanders of Vermont were seeking reform of the H-1B visa program. A bill introduced in the 110th Congress by Grassley and Durbin would require employers to make a good-faith effort to hire American workers first. Employers would also have to show that the H-1B worker would not displace an American worker.
More Here

Vince at Facebook
Monday, February 16, 2009
Scientists are Afraid to Debate Global Warming for Fear of Losing Federal Grants..
"They’ve seen too many of their colleagues lose grant funding when they haven’t gone along with the so-called political consensus that we’re in a human-caused global warming."
Seventy global warming skeptics are going to speakat the International Conference on Climate Change next month. More Here
Vincent at Facebook

Saturday, February 07, 2009
With Google Latitude, you can:
* See where your friends are and what they are up to
* Quickly contact them with SMS, IM, or a phone call
* Control what your location is and who gets to see it
From your mobile phone - View your friends' locations and status messages and share yours with them.
From your computer - View your friends' locations and status messages on a full screen even without a compatible phone or data plan.
Link and Video Here
http://www.google.com/latitude/intro.html
http://www.google.com/mobile/default/latitude.html
Monday, February 02, 2009
Friday, January 16, 2009
A worm that spreads through low security networks, memory sticks, and PCs without the latest security updates is posing a growing threat to users.
The malicious program, known as Conficker, Downadup, or Kido was first discovered in October 2008.
Although Microsoft released a patch, it has gone on to infect 3.5m machines.
Experts warn this figure could be far higher and say users should have up-to-date anti-virus software and install Microsoft's MS08-067 patch.
According to Microsoft, the worm works by searching for a Windows executable file called "services.exe" and then becomes part of that code.
It then copies itself into the Windows system folder as a random file of a type known as a "dll". It gives itself a 5-8 character name, such as piftoc.dll, and then modifies the Registry, which lists key Windows settings, to run the infected dll file as a service.
Once the worm is up and running, it creates an HTTP server, resets a machine's System Restore point (making it far harder to recover the infected system) and then downloads files from the hacker's web site.
Most malware uses one of a handful of sites to download files from, making them fairly easy to locate, target, and shut down.
But Conficker does things differently.
Anti-virus firm F-Secure says that the worm uses a complicated algorithm to generate hundreds of different domain names every day, such as mphtfrxs.net, imctaef.cc, and hcweu.org. Only one of these will actually be the site used to download the hackers' files. On the face of it, tracing this one site is almost impossible.
Speaking to the BBC, Kaspersky Lab's security analyst, Eddy Willems, said that a new strain of the worm was complicating matters.
"There was a new variant released less than two weeks ago and that's the one causing most of the problems," said Mr Willems
"The replication methods are quite good. It's using multiple mechanisms, including USB sticks, so if someone got an infection from one company and then takes his USB stick to another firm, it could infect that network too. It also downloads lots of content and creating new variants though this mechanism."
"Of course, the real problem is that people haven't patched their software. If people do patch their software, they should have little to worry about," he added.
Technicians have reverse engineered the worm so they can predict one of the possible domain names. This does not help them pinpoint those who created Downadup, but it does give them the ability to see how many machines are infected.
"Right now, we're seeing hundreds of thousands of unique IP addresses connecting to the domains we've registered," F-Secure's Toni Kovunen said in a statement.
"We can see them, but we can't disinfect them - that would be seen as unauthorized use."
Microsoft says that the malware has infected computers in many different parts of the world, with machines in China, Brazil, Russia, and India having the highest number of victims.
Story from BBC NEWS:
http://news.bbc.co.uk/go/pr/fr/-/2/hi/technology/7832652.stm
Wednesday, January 14, 2009

The Venus Project presents a bold, new direction for humanity that entails nothing less than the total redesign of our culture. There are many people today who are concerned with the serious problems that face our modern society: unemployment, violent crime, replacement of humans by technology, over-population and a decline in the Earth's ecosystems.
The Venus Project is dedicated to confronting all of these problems by actively engaging in the research, development, and application of workable solutions. Through the use of innovative approaches to social awareness, educational incentives, and the consistent application of the best that science and technology can offer directly to the social system, The Venus Project offers a comprehensive plan for social reclamation in which human beings, technology, and nature will be able to coexist in a long-term, sustainable state of dynamic equilibrium.
For More Information: Click Here
Friday, January 09, 2009
IDIOT SIGHTING:
We had to have the garage door repaired. The Sears repairman told us that one of our problems was that we did not have a 'large' enough motor on the opener. I thought for a minute, and said that we had the largest one Sears made at that time, a 1/2 horsepower. He shook his head and said, 'Lady, you need a 1/4 horsepower.' I responded that 1/2 was larger than 1/4. He said, 'NO, it's not.' Four is larger than two..'
We haven't used Sears repair since.
IDIOT SIGHTING:
My daughter and I went through the McDonald 's take-out window and I gave the clerk a $5 bill. Our total was $4.25, so I also handed her a quarter. She said, 'you gave me too much money.' I said, 'Yes I know, but this way you can just give me a dollar bill back.' She sighed and went to get the manager who asked me to repeat my request. I did so, and he handed me back the quarter, and said 'We're sorry but they could not do that kind of thing.' The clerk then proceeded to give me back $1 and 75 cents in change.
Do not confuse the clerks at McD's.
IDIOT SIGHTING:
I live in a semi rural area. We recently had a new neighbor call the local township administrative office to request the removal of the DEER CROSSING sign on our road. The reason: 'Too many deer are being hit by cars out here! I don't think this is a good place for them to be crossing anymore.'
From Kingman , KS .
IDIOT SIGHTING IN FOOD SERVICE:
My daughter went to a local Taco Bell and ordered a taco. She asked the person behind the counter for 'minimal lettuce.' He said he was sorry, but they only had iceberg lettuce.
From Kansas City
IDIOT SIGHTING:
I was at the airport, checking in at the gate when an airport employee asked, 'Has anyone put anything in your baggage without your knowledge?' T o which I replied, 'If it was without my knowledge, how would I know?' He smiled knowingly and nodded,'That's why we ask.'
Happened in Birmingham , Ala.
IDIOT SIGHTING:
The stoplight on the corner buzzes when it's safe to cross the street. I was crossing with an intellectually challenged coworker of mine. She asked if I knew what the buzzer was for. I explained that it signals blind people when the light is red. Appalled, she responded, 'What on earth are blind people doing driving?!'
She was a probation officer in Wichita , KS
IDIOT SIGHTING:
At a good-bye luncheon for an old and dear coworker. She was leaving the company due to 'downsizing.' Our manager commented cheerfully, 'This is fun. We should do this more often.' Not another word was spoken. We all just looked at each other with that deer-in-the-headlights stare.
This was a lunch at Texas Instruments.
IDIOT SIGHTING:
I work with an individual who plugged her power strip back into itself and for the sake of her life, couldn't understand why her system would not turn on.
A deputy with the Dallas County Sheriffs office, no less.
IDIOT SIGHTING:
When my husband and I arrived at an automobile dealership to pick up our car, we were told the keys had been locked in it. We went to the service department and found a mechanic working feverishly to unlock the driver side door. As I watched from the passenger side, I instinctively tried the door handle and discovered that it was unlocked. 'Hey,' I announced to the technician, 'its open!' His reply, 'I know. I already got that side.'
This was at the Ford dealership in Canton, MS
And, the scary part is.... They VOTE and they REPRODUCE..
Sunday, January 04, 2009
Few types of transport require as much thinking per mile as sailing - the sailor has to measure the speed and direction of both the water and the wind, which can constantly change, and then manage an array of sails and underwater hydrofoils at the correct angles to create motion in the desired direction. Navigation is its own challenge too, as it's impossible to sail directly into the wind and boats must 'tack' forward in zigzag patterns to make progress. All of which makes it quite remarkable that a group of European enthusiasts have created a Linux-brained autonomous sailboat.
More Here
Sunday, December 28, 2008
"While that doesn't tell us much, the knowledge base article (or "KB") 960714 referenced does spill the beans.
"Fundamentally, it was discovered that program code -- of a malicious person’s construction -- be executed on your computer, if a user views a specially crafted web page with IE.
"In particular, a rogue script can allocate a block of memory (an array) then apparently release it without updating the array's length, meaning that the block of memory still remains preserved.
"Then, if data binding is enabled (which it is, by default), a rogue web page can take advantage of an incorrect handling of certain XML tags within IE to cause the browser to pass control to the supposedly free memory location."
More here