Wednesday, November 05, 2008

Kaspersky Mobile Security S60v3 v6.0

Kaspersky® Mobile security is a convenient and reliable solution that protects smartphones from malicious programs that target mobile platforms. Viruses, worms and Trojans have spread beyond personal computers. With the growing popularity of smartphones and communicators (that are essentially small computers), malicious programs for mobile devices are appearing in increasing numbers and diversity. For an in-depth look at how widespread mobile malware really is in the modern world, read our white paper, "Mobile Malware Evolution". In developing Kaspersky Anti-Virus Mobile we have combined the latest Kaspersky Lab technologies to protect mobile platforms with our long experience of working in the antivirus field. This solution offers effective protection for your smartphone and personal data from malicious programs. Functions: * On-demand scanning. You can launch a scan of your mobile at any time. Scanning the memory of a mobile device takes several minutes at most. It is possible to focus scanning on memory cards, individual folders and files. If an infected object is detected, it is stored in the quarantine folder or deleted. * On-access scanning All incoming or modified SMS, MMS and email items are automatically scanned for malicious programs. The product also monitors executable files arriving via Bluetooth and other connection channels. * On-schedule scanning. You can pre-set the best time for antivirus scanning (for example, at night). Kaspersky Anti-Virus Mobile removes any infected objects and stores suspicious objects in quarantine. You have the option of viewing reports on suspicious objects and making the final decision. * Antispam for SMS/EMS/MMS. Telephone numbers of spam sources can easily be added to a blacklist to ensure that such messages are always blocked. You can also add addresses from your contact list to a safe list. * Automatic updates. The Kaspersky Lab Virus Lab constantly updates databases on the server with new virus samples. Antivirus databases on the phone can be updated on schedule (at intervals set by the user). By default, the databases update automatically once a week. Updates are available via WAP / HTTP (GPRS, EDGE, 3G) or with the aid of a PC. There are English version & German version in zip file.

Tech Tips for the Basic Computer User

“One of these days, I’m going to write a book called, ‘The Basics.’ It’s going to be a compendium of the essential tech bits that you just assume everyone knows–but you’re wrong.

“(I’ll never forget watching a book editor at a publishing house painstakingly drag across a word in a word processor to select it. After 10 minutes of this, I couldn’t stand it. ‘Why don’t you just double-click the word?’ She had no clue you could do that!)”

Many readers chimed in with other “basics” that they assumed every computer user knew–but soon discovered that what’s common knowledge isn’t the same as universal knowledge.

I’m sure the basics could fill a book, but here are a few to get you started. All of these are things that certain friends, family or coworkers, over the years, did *not* know. Clip, save and pass along to…well, you know who they are.

* You can double-click a word to highlight it in any document, e-mail or Web page.

* When you get an e-mail message from eBay or your bank, claiming that you have an account problem or a question from a buyer, it’s probably a “phishing scam” intended to trick you into typing your password. Don’t click the link in the message. If in doubt, go into your browser and type “www.ebay.com” (or whatever) manually.

* Nobody, but nobody, is going to give you half of $80 million to help them liberate the funds of a deceased millionaire…from Nigeria or anywhere else.

* You can hide all windows, revealing only what’s on the computer desktop, with one keystroke: hit the Windows key and “D” simultaneously in Windows, or press F11 on Macs (on recent Mac laptops, Command+F3; Command is the key with the cloverleaf logo). That’s great when you want examine or delete something you’ve just downloaded to the desktop, for example. Press the keystroke again to return to what you were doing.

* You can enlarge the text on any Web page. In Windows, press Ctrl and the plus or minus keys (for bigger or smaller fonts); on the Mac, it’s the Command key and plus or minus.

* You can also enlarge the entire Web page or document by pressing the Control key as you turn the wheel on top of your mouse. On the Mac, this enlarges the entire screen image.

* The number of megapixels does not determine a camera’s picture quality; that’s a marketing myth. The sensor size is far more important. (Use Google to find it. For example, search for “sensor size Nikon D90.”)

* On most cellphones, press the Send key to open up a list of recent calls. Instead of manually dialing, you can return a call by highlighting one of these calls and pressing Send again.

* When someone sends you some shocking e-mail and suggests that you pass it on, don’t. At least not until you’ve first confirmed its truth at snopes.com, the Internet’s authority on e-mailed myths. This includes get-rich schemes, Microsoft/AOL cash giveaways, and–especially lately–nutty scare-tactic messages about our Presidential candidates.

* You can tap the Space bar to scroll down on a Web page one screenful. Add the Shift key to scroll back up.

* When you’re filling in the boxes on a Web page (like City, State, Zip), you can press the Tab key to jump from box to box, rather than clicking. Add the Shift key to jump through the boxes backwards.

* You can adjust the size and position of any window on your computer. Drag the top strip to move it; drag the lower-right corner (Mac) or any edge (Windows) to resize it.

* Forcing the camera’s flash to go off prevents silhouetted, too-dark faces when you’re outdoors.

* When you’re searching for something on the Web using, say, Google, put quotes around phrases that must be searched together. For example, if you put quotes around “electric curtains,” Google won’t waste your time finding one set of Web pages containing the word “electric” and another set containing the word “curtains.”

* You can use Google to do math for you. Just type the equation, like 23*7+15/3=, and hit Enter.

* Oh, yeah: on the computer, * means “times” and / means “divided by.”

* If you can’t find some obvious command, like Delete in a photo program, try clicking using the right-side mouse button. (On the Mac, you can Control-click instead.)

* Google is also a units-of-measurement and currency converter. Type “teaspoons in 1.3 gallons,” for example, or “euros in 17 dollars.” Click Search to see the answer.

* You can open the Start menu by tapping the key with the Windows logo on it.

* You can switch from one open program to the next by pressing Alt+Tab (Windows) or Command-Tab (Mac).

* You generally can’t send someone more than a couple of full-size digital photos as an e-mail attachment; those files are too big, and they’ll bounce back to you. (Instead, use iPhoto or Picasa–photo-organizing programs that can automatically scale down photos in the process of e-mailing them.)

* Whatever technology you buy today will be obsolete soon, but you can avoid heartache by learning the cycles. New iPods come out every September. New digital cameras come out in February and October.

* Just putting something into the Trash or the Recycle Bin doesn’t actually delete it. You then have to *empty* the Trash or Recycle Bin. (Once a year, I hear about somebody whose hard drive is full, despite having practically no files. It’s because over the years, they’ve put 79 gigabytes’ worth of stuff in the Recycle Bin and never emptied it.)

* You don’t have to type “http://www” into your Web browser. Just type the remainder: “nytimes.com” or “dilbert.com,” for example. (In the Safari browser, you can even leave off the “.com” part.)

* On the iPhone, hit the Space bar twice at the end of a sentence. You get a period, a space, and a capitalized letter at the beginning of the next word.

* Come up with an automated backup system for your computer. There’s no misery quite like the sick feeling of having lost chunks of your life because you didn’t have a safety copy.

Monday, November 03, 2008

Major in Computer Information Technology

The computer information technology major is designed to combine the benefits of a traditional college education with the benefits of hands-on training in state-of-the-art computer technology. Students become technically competent, but also learn to write well-organized and clear memoranda and reports. The computer information technology curriculum integrates technical skill with communication skills, superior general education requirements, and breadth of knowledge in the computer information technology field.

Objectives

The student who graduates with a major in computer information technology will be able to

  • Design and implement network and database administration solutions.
  • Produce effective proposals, reports, memoranda, briefings, and documentation.
  • Communicate effectively using oral and computer-based presentation techniques.
  • Apply effective information research techniques.
  • Discuss information technology from an international and historical perspective.
  • Apply ethical judgments to thinking critically and systematically about the impact of information technology on contemporary social, political, and economic issues.

Degree Requirements

A degree with a major in computer information technology requires the successful completion of 120 credits of coursework, including 33 credits for the major, 41 credits in general education requirements, and 46 credits in the minor, electives, and other degree requirements. At least 17 credits in the major must be earned in upper-level courses (numbered 300 or above), and 18 credits in courses designated CMIT.

The following course sequence will fulfill all the requirements for the BS in computer information technology. Since some recommended courses fulfill more than one requirement, substituting courses for those listed may make it necessary to take additional courses to meet degree requirements. Students should consult an advisor whenever taking advantage of other options. For information on alternate courses (where allowable) to fulfill general education requirements (in communications, arts and humanities, behavioral and social sciences, biological and physical sciences, mathematics, and interdisciplinary issues) click here. For cross-curricular requirements (in civic responsibility, historical, and international perspectives) click here.

Requirements for the Computer Information Technology Major

Coursework for a major in business administration includes the following:

  • Required foundation courses (12 credits): CMIS 102/102A (or prior programming experience and an additional supplemental course), 141/141A (or CMSC 130), and 310 and CMIT 265
  • Core courses (15 credits): Any upper-level CMIT courses
  • Supplemental major courses (6 credits): Any CMIS, CMIT, CMSC, CMST, and IFSM courses
  • Required related course (3 credits), which may be applied anywhere in the degree: MATH 107

Recommended Sequence

The following course sequence will fulfill all the requirements for the BS in computer information technology. Coursework for the major is indicated by ±. Since some recommended courses fulfill more than one requirement, substituting courses for those listed may make it necessary to take additional courses to meet degree requirements. Students should consult an advisor whenever taking advantage of other options. For information on alternate courses (where allowable) to fulfill general education requirements (in communications, arts and humanities, behavioral and social sciences, biological and physical sciences, mathematics, and interdisciplinary issues) click here. For cross-curricular requirements (in civic responsibility, historical, and international perspectives)

Information Technology Computer Degree Choices

Those considering earning a degree or certification in information technology (IT) will find many choices from which to choose. As adults considering an IT degree search the list of available options, they soon discover there are more than the traditional computer science degrees available today. The range of degree options has become varied and specialized.

This change was brought about employers who want their new IT employees to have more than the traditional education available in colleges and universities. Employers prefer graduates with the ability to apply their IT learning to complex, real world challenges, as well as projects that integrate problem solving, writing, and analytical reasoning skills [The Association of American Colleges and Universities, Survey of Employers 2008].

Traditional Information Technology Degrees

Traditional IT degrees are still available in colleges and universities and are typically located within specific departments of these schools, such as: business, engineering, art, and liberal arts. The following briefly describes these degrees:

  • Computer Science – a rigorous theoretical study of data structures, operating systems, and programming.
  • Information Systems – called management information systems which teach databases, programming, and computer applications.
  • Electrical and Computer Engineering – a study of software design, communication systems, digital circuits, and technical products.

Degrees in any one of these areas are perfect for those who want to design electronic products and programs or for those who want to design new and better integrated circuit chips and digital applications.

Practical Information Technology Degrees

Employers want employees who know the practical applications of IT, along with the ability to adapt to evolving computer technology uses, equipment, and programs. These are some of the new degrees with brief descriptions:

  • Game Development – programs focus on designing and creating new games for computers and gaming systems.
  • Interactive Media – programs focus on the creation of websites and digital media to allow more interactivity in cell phones, kiosks, MP3 players, Internet, and gaming systems.
  • Network Engineer – programs focus on the application of IT in databases, programming, and networks.
  • Human Computer Interaction – programs focus on the practical application how humans interact with technology and the development of new computer interfaces.
  • Software Engineering – programs focus on the engineering applications and practical approaches to software development.
  • Multimedia Specialist – programs focus on the practical applications of computer programs and software in various industries for presentation and professional development.
  • Education Technology – programs focus the practical applications of IT in educational settings.

These programs may appear under different names in colleges, universities, vocational, and technical schools; however the emphasis is the same. Some schools may require enrollment in a bachelor’s degree, associate’s degree, or certificate program to enroll in specific courses. Many schools offer these programs through distance education.

Information Technology Degrees

Because of the ever-evolving information technology available for businesses and education, employers are searching for employees who understand the practical applications of IT. Also, they are searching for employees who can use their practical knowledge to solve problems which arise in IT applications.

The advantage of earning a degree in one of the new computer degrees or certificates is their specialization. These degree programs focus on completing complex real world challenge and integrating problem solving skills with analytical reasoning skills, which employers seek in new employees.

The face of information technology is evolving and anyone can be a part of this world by continuing his education to focus on these new degree choices. Visit Changing Careers to be a Web Designer and How to Select a Trade School for additional information regarding information technology degree programs.

Computer Graphics Specialist

Computer graphics is a powerful medium. Increasingly, businesses, agencies and organizations communicate information and knowledge though visual means. In the last few years, computer graphics has found its way into the mainstream of society, from entertainment, and engineering design, to the web and virtually every industry imaginable.

New opportunities are unfolding for people with high visualization abilities, who can use computer graphics tools to visualize scientific concepts and for the analysis and manipulation of complex three-dimensional information. Computer graphics specialists are the experts who use computers and related technologies to create and manipulate electronic images.

They consult with managers and clients about projects, and create sketches or layouts of their ideas. Once they get a sketch approved by the clients, the specialist will begin using various computer programs to transfer the image from paper onto computer software. This can involve writing and designing programs from scratch, or applying existing programs to help them in their work.

These specialists apply their talents to three-dimensional cartoons, video games, television and film. They use CAD (computer-aided design) systems to design models of building, cars or entire environments. CAD systems can also be used when designing models for physicians, surgeons and scientists. Computer graphics specialists also create geographical, topographical, meteorological, and environmental impact maps; charts; tables; and graphs to organize information for businesses and organizations.

In the ever-changing world of computer technologies and design, computer graphics specialists must be on the cutting edge of both hardware and software developments. They are helping spread information globally, enabling business and organizations to share their knowledge and experiences with the international community.

Interests and Skills
Computer graphics specialists must be able to pay close attention to detail and maintain good hand-eye coordination when working on projects. They must possess the ability to visualize three-dimensional objects, should be good at math, and feel comfortable with computers. They should be methodical, patient, and accurate, as well as creative, and be able to work well under pressure. They should be good communicators, able to work with others, as well as possess the self-discipline and stamina to work in their own when necessary.


Typical Tasks

* Consult with management and staff on the project
* Make detailed cost estimates of different design options
* Write programs if necessary
* Develop and prepare designs and drafts from preliminary concepts and sketches
* Study drafts, information and instructions from the client or engineer
* Operate computer-aided design (CAD) programs
* Check and verify design drawings to conform to specifications and design data
* Make the necessary changes to the designs, drawings or specifications
* Write technical reports
* The typical day for a computer graphics specialist will involve working with computers, analyzing, developing and implementing programs. They will spend some of each day with others, brainstorming new design projects, looking into programs to help create designs, and pitching project ideas to clients and supervisors. The job doesn't allow for much travel, as most of the work can be done from home or a head office, unless they need to consult with colleagues at locations all over their community.

Workplaces, Employers and Industries

* Computer graphics specialists work in both the public and private sectors. Consulting and construction companies, utility, resource and manufacturing companies, private machine design firms, architectural and engineering consulting firms, electronic and software manufacturing companies and organizations in the petrochemical, food processing and energy industries employ CAD technologists. In the public sector, they work for all levels of government, and in hospitals and universities. They can also work independently, and contract out their business to different clients.
* They work regular hours in offices, or set their own hours and work from home, depending on the nature of their employer. They work alone, or in a small team of other programmers and computer staff.

Long Term Career Potential
Computer graphics specialists can specialize in other aspects of computer programming. They can get into software and web design. There are also jobs in administration, PC support and website maintenance. Graphics specialists can open their own businesses, or write a column or book about computer design for the general public. There is also IT instruction, at colleges and universities.


Educational Paths
Individuals wanting ot pursue a career as a computer graphics specialist should complete either a bachelor's degree in computer science or in another discipline with a significant programming and design components, such as mathematics, commerce or graphic design; or a college program in computer science. There are a number of three- and four-year degree programs, two-year diploma programs and one-year certificate programs in this field offered by universities, colleges, technical institutes and private vocational schools. They should also consider taking a few psychology and business management courses.

Some individuals might choose to pursue a certificate in CAD drafting or design engineering technology. These are available through associations of engineering or applied science technologists and technicians.

How Do I Know If My PC Is Infected With Spyware or Adware

Many people that are new to the Internet world are nervous about the potential of viruses, Spyware or Adware that can harm their computer, affect performance or make their very private information public to others.

Spyware programs can do a number of damaging things to your personal computer. Spyware infects your pc and hides in the background and can do many nasty things to the performance of your system. It can also do harmful things to you such as send out your personal information, your every keystroke and photo that resides on your hard drive, watch your surfing habits and shopping habits and annoy you with annoying pop-ups filled with advertisements and even pornography.

If you are experiencing any unusual changes in your computer's performance or have any unusual new pop-ups, changes to your toolbars or new icons on your desktop, you should run a system scan to find out if you have Spyware. Products exist on the market to help you combat this problem. Be sure to install software that you know is credible. Downloading freeware can often result in further Spyware existing on your computer. Spyware, Adware and Malware companies frequently fool users into sending pop-ups telling them that there's a problem with their computer and this in fact is further spyware. These errors can open your system up to future further problems by fooling people into thinking they're downloading fixes when really further spyware is being downloaded.

Watch your system's performance and at the sign of any unusual activity, realize that you are probably infected. Do something as soon as possible to protect your privacy. These programs don't discriminate and can launch themselves when you or your family members sit in front of the computer. Pornographic pop-ups can turn up whether it's an adult or a child using the computer. Protect your pc.

Antivirus alone isn't enough to combat this problem. Spyware sneaks into your system via executable files that you don't need to do anything to launch. They can sneak in as attachments that you download or by many other means. They're harmful and annoying but you can protect your computer and your privacy with the right software. This software needs to have an auto update for spyware definitions as new spyware definitions are being added daily. So a spyware removal program is a great compliment to your existing anti-virus software.

Total Innovations, Inc. specializes in developing award winning software programs designed to solve computer users needs. The spyware removal software, http://www.emailspy.com & http://www.folderhider.com are a few of the most recent. See full details at: http://www.spyblaster.com

Microsoft Delivers Hotmail Upgrade

Microsoft Corp. has closed the public testing period for Windows Live Hotmail and has begun a months-long process of migrating users to this major upgrade of its Hotmail Web mail service, the company will announce Monday. (To read a hands-on review of the new Microsoft Hotmail, check out our Today@PCWorld Blog: Microsoft Launches New Hotmail.)

Windows Live Hotmail, dubbed as the biggest Hotmail upgrade since the Web mail service's debut in 1996, has been tested by about 20 million users since Microsoft first allowed people outside the company to try it out in mid-2005, said Brooke Richardson, Microsoft group product manager for the popular e-mail site.

"It is safer, faster and has more features than Hotmail. It's definitely an advance for our current customers," she said. Windows Live Hotmail has a brand new code foundation which will let Microsoft add improvements quickly, something that had become a challenge with Hotmail's decade-old code base, she said. "It's a much more stable foundation for us to innovate," she said.

A major challenge for Microsoft will be to convince long-time Hotmail users that the upgraded version is worth switching to, said Van Baker, a Gartner Inc. analyst. "Consumers get accustomed to things they use on a daily basis, like their e-mail service," he said. "When you make changes, sometimes it's a challenging transition for consumers."

Microsoft will not autocratically move users to the new version. For now, Microsoft will give Hotmail users the option to continue using the old version if they don't want to switch to the upgraded version. However, at some point, everyone will be unilaterally migrated over to Windows Live Hotmail, she said.

New users will be automatically signed up for Windows Live Hotmail but, like any user of the new service, they will get to choose from two user interfaces: a "classic" layout that closely resembles the old Hotmail; or the new interface, which was designed to look like Microsoft's Outlook e-mail and calendaring desktop application, she said.

Later this month, Microsoft will release a free software for linking Windows Live Hotmail with Outlook, a capability the company previously charged for. With Microsoft Office Outlook Connector for MSN, users of the Web mail service will be able to access their account from Outlook, along with e-mail, contacts and folder synchronization for free. In the future, Microsoft will release a desktop client for Windows Live Hotmail called Windows Live Mail. Windows Live Mail will be the successor to Outlook Express and Windows Mail on Windows Vista.

But all these different names, brands and components leave Microsoft with a fragmented story in the Web mail market that could lead to consumer confusion, Gartner's Baker said. "Another big challenge is to manage this message," he said.

In terms of security improvements, each e-mail message carries a "safety bar" which indicates whether the message came from a known, unknown or potentially fraudulent sender. Spam protection has also been enhanced. Windows Live Hotmail also has a mobile version so that its estimated 280 million users can access the service from cell phones and handheld devices with a Web browser.

Fox Interactive Nears Deal to Buy Photobucket

Photobucket, a four-year-old, rapidly growing Web company, is in advanced talks to be acquired by Fox Interactive Media, a division of the News Corporation, a person briefed on the negotiations said Monday.

Photobucket allows its users to store photos and videos and then easily drop them into their pages on prominent sites like Facebook, eBay and particularly MySpace, which is also owned by the News Corporation.

The deal is not yet complete, but the parties have ironed out major issues and are focusing on finer points, according to this person, who said the price could be as high as $300 million. The person asked not to be further identified because of the sensitivity of the talks.

Representatives of MySpace, Fox Interactive Media and Photobucket all declined to comment.

News of the discussions was first reported earlier Monday on a Silicon Valley blog, Valleywag. Photobucket said last month that it had hired Lehman Brothers to explore a possible sale of the company.

Photobucket, which has offices in Denver and San Francisco, has catapulted over older sites to become the largest and fastest-growing photo-sharing service on the Web. Unlike rival photo sites such as Kodak Gallery, Shutterfly and Flickr, which is owned by Yahoo, Photobucket positioned itself as a tool for people using sites like MySpace, rather than a place to get prints made or to interact with other photographers.

The company has had the kind of booming growth that make larger media companies envious. A year ago, it said it had 14 million members. On its Web site on Monday, Photobucket cited 41 million users.

The site is free for basic use, but charges $25 a year for a premium subscription that includes extra storage space and the ability to store videos more than five minutes long. It also displays advertisements to users when they manage their accounts.

The company already has a symbiotic, if sensitive, relationship with MySpace. According to the research firm Hitwise, for the week ended Saturday, 60 percent of Photobucket traffic came from MySpace users who had placed their photos and videos on Photobucket. It was also the third-largest destination for people leaving MySpace, after Google and Yahoo.

“There’s clearly a synergy between these two sites,” says Bill Tancer, general manager of global research at Hitwise.

That close relationship has made MySpace uncomfortable in the past.

Last month, MySpace blocked slide shows and videos stored on Photobucket, saying the company was violating its terms of service by embedding its own advertisements in the media files. After a week of discussions, the two companies resolved their differences and MySpace removed the block.

Records hit by NHS computer error

Hundreds of inaccurate patient records have been created every day due to a fault on the controversial new NHS computer system, it has been claimed.

The problem affects patients in Greater Manchester who have hospital appointments booked via the online system.

NHS Connecting for Health, which is overseeing the £12.4 billion upgrade of the patient records system, stressed the fault would have no impact on patient care.

An article in Computer Weekly magazine revealed the problem arose after computer experts installed a software upgrade.

This caused the computer to automatically create a new blank patient record without checking if one already exists raising fears doctors may be presented with the wrong information.

A spokesman for NHS Connecting for Health said the problem was expected to be fixed in the next few weeks.

He said: "Although comprehensive testing is undertaken prior to the upgrades taking place, it is not unusual for these kinds of upgrades to identify teething problems in the early stages following implementation.

"We estimate that around 400 duplicate patient records might have been created each day. However, the system is being continually monitored throughout each day and where a duplicate is identified data is being merged to form one single record for each patient."

He added: "Prior to the application of the permanent fix, an interim solution has been put in place to identify the duplicate records and correct them. This has now been put in place with the full agreement of those organisations affected and will have minimal impact on the users of the system and no impact on the delivery of patient care."

Among the places affected by the problem are the University Hospital of South Manchester Foundation Trust and PCT Clinical Assessment Centres in Greater Manchester.

How to avoid getting your information stolen via wireless connections

Yesterday, I wrote about how the FBI is warning us that personal details can be stolen (i-jacked) when using public computers. This occurs using crimeware, previously installed on a public computer, logs the keys you are stroking and sends the information (electronically) to criminals.

It can be dangerous to look at any of your online financial information on these (public access) machines.

When writing about this phenomenon, I remembered that even using your personal computer at a public place with a wireless connection can expose a person's personal and sometimes, financial details.

Just the other day, Martin Bosworth, over at Consumer Affairs, wrote an excellent piece covering this danger, where he stated:

Sending unencrypted information over any unfamiliar network can turn your computer into an open book -- with pages full of your personal information.

Many of these connections are appear to be legitimate connections because they are spoofed (camouflaged to appear as if they are a trusted connection).

Spoofing a connection, or site isn't very hard to do. They simply copy and transpose pictures and statements (words) from legitimate sites to their own. The Artists Against website has a portal, where you can see fake websites that are up and running on the Internet, here.

Martin's article contains some excellent tips on how to navigate the murky waters of public hot spots, safely.

They can be viewed, here.

Interestingly enough, wireless technology, isn't only used to compromise individuals. In the recent TJX data breach, where some are saying 200 million records were stolen since 2003, reports are saying the data was stolen, using wireless technology.

It's being reported that this was accomplished from a car with a laptop. Driving around with a laptop, using other people's wireless connections, is sometimes referred to as "war-driving," which is my new word for the day.

Joseph Pereira (Wall Street Journal) wrote about this (courtesy of the Northwest Florida Daily News), here.

Principal Guilty in Microsoft Piracy Case

A court Monday found the principal of a village school guilty of using bootleg Microsoft software and ordered him to pay a fine of about $195 in a case that was cast by Russian media as a battle between a humble educator and an international corporation.

The trial of Alexander Ponosov, who was charged with violating intellectual property rights by using classroom computers with pirated versions of the Windows operating system and Microsoft Office software installed, has attracted wide attention.

Russian officials frequently allege that foreign governments, including the U.S., are meddling in Russia's internal affairs, and Russian media reports have portrayed the case as that of a Western corporation bringing its power to bear on one man -- in this case, a principal who also teaches history and earns $360 a month.

Microsoft, however, has said repeatedly it has nothing to do with the charges, which were brought by Russian prosecutors in the Ural Mountains region where Ponosov's school is located.

The case "was initiated by Russian authorities under Russian law," the company said in an e-mailed statement after the verdict. "Microsoft neither initiated nor has any plans to bring any action against Mr. Ponosov."

Prosecutor Natalya Kurdoyakova said in televised remarks that Ponosov knew he was violating the law "and illegally used these programs in computer classes."

Ponosov has maintained his innocence, saying that the computers at the school came with the software already installed.

"I had no idea it wasn't licensed," Ponosov told The Associated Press by telephone. He said that he planned to file an appeal.

"Prosecutors made a lot of mistakes starting from the moment they checked the computers," he said.

Ponosov was found guilty of causing $10,000 in damage to the company, RIA-Novosti quoted judge Valentina Tiunova as saying.

In February, the court in the Vereshchaginsky district of the Perm region threw out the case, saying Ponosov's actions were "insignificant" and presented no danger to society. Both Ponosov and prosecutors vowed to appeal in hopes of forcing a clear decision, with Ponosov saying he wanted a full acquittal.

In March, the regional court ordered Ponosov to stand trial a second time.

Despite government pledges to crack down on Russia's rampant piracy, the country remains the No. 2 producer of bootlegged software, movies and music after China.

In April, the Bush administration put Russia, China and 10 other nations on a "priority watch list," which will subject them to extra scrutiny and could eventually lead to economic sanctions if the administration decides to bring trade cases before the World Trade Organization.

The designation was made in an annual report the administration is required to provide to Congress each year that highlights the problems U.S. companies are facing around the world with copyright piracy. The report said that the United States will be closely watching to see how Russia fulfills the commitments it made to upgrading copyright protection as part of a U.S.-Russia accord reached last year which was seen as a key milestone in Russian efforts to join the WTO.

10 Things We Hate About Apple

It's high time we unloaded on the high-and-mighty Mac maker.
Narasu Rebbapragada and Alan Stafford, PC World

The company formerly known as Apple Computer and now called simply Apple, Inc. is unique in many ways--including in its ability to drive even folks who admire it positively batty. It makes great products (usually), yet its secretiveness about them borders on paranoia, and its adoring fans can be incredibly irritating. Of course, its fans have to put up with some irritations, too: Simply being a member of the club still means you must endure unending jabs from the other side of the socio-political-techno aisle. But do they have to wear their suffering as a badge of honor?

Today, we--that's us, Narasu and Alan, veteran Mac users both--are going to get some stuff off our chests. We've enumerated ten things we hate about Apple (or its followers, or simply about the experience of using its products). But in the interest of fair play (not to be confused with FairPlay, Apple's DRM technology) we're also publishing another list--Ten Things We Love About Apple.

Use the Comment link at the end of this article to add your own gripes about Apple--or to defend it.

And so, with protective helmets in place, off we go:

1: Free Speech, Anyone?
Even if you're no Apple fan, this particular issue might not rise to the top of your own personal gripe list--but hey, we're journalists. So sue us.

Er, that's probably not the right turn of phrase to use, considering that in December 2004, Apple filed a lawsuit against the AppleInsider, O'Grady's PowerPage, and Think Secret Web sites for posting information about upcoming technologies that Apple had shared with outsiders under nondisclosure agreements. In the case of O'Grady, the news was of a FireWire interface for GarageBand. In the words of O'Grady himself: "yawn."

Apple pressured the sites to reveal their sources, and even worse, pressured the sites' ISPs. In May 2006, a California court said no way, ruling that online journalists enjoy the same First Amendment rights as "legitimate" offline journalists. Seems silly in today's world, doesn't it? Recently, the court ordered Apple to pay the sites' legal fees--about $700,000.

2. More Secretive Than Homeland Security
Those feds are secretive, but they're no match for Apple reps' infuriating stock answer: "We don't comment on future product plans." Being an Apple adherent means never knowing for sure if the shiny new MacBook or iPod you just bought is about to be rendered obsolete by a Steve Jobs keynote.

Of course, Apple is merely the most famous secretive Silicon Valley company, not the only hush-mouthed one. And tight lips make for explosive buzz when the company does decide to drop a bombshell. But contrast Apple's secrecy with Microsoft's lack thereof--Bill Gates, Steve Ballmer, and company love to talk about their company's upcoming products, and they still get their fair share of buzz. Even though many of those plans have a tendency to not actually come true.

3. Ain't Too Proud to Blame
When Apple shipped iPods containing a worm last year, instead of issuing a humble mea culpa, Apple took a swipe at Microsoft, saying, "As you might imagine, we are upset at Windows for not being more hardy against such viruses, and even more upset with ourselves for not catching it." As you can imagine, that didn't fly with security experts. How about an apology to the folks who were unlucky enough to buy the infected iPods, period?

4. iHate iAnything
Apple first floated the idea of product names with a leading lowercase letter in 1994 with eWorld, an ill-conceived online service that went belly-up after a year and a half. But when it introduced the original iMac in 1998, it hit on a phenomenal success--and prompted hundreds of third-party manufacturers to follow with sickeningly cute Bondi Blue products with names that also began with a lowercase "i." Now dozens of Apple and third-party product names begins with "i." Their manufacturers are all jumping on the bandwagon, hoping that a single letter will sway us to buy their stuff. Meanwhile, you can't even start sentences with the products' names.

Is it any wonder that we're inclined to like Apple TV in part because it turned out not to be iTV? Or that we're kind of sorry that Apple was able to strike a deal with Cisco to share the name iPhone?

Computer running slow problems

Is your computer running slow? Does it take 15minutes to boot up? Computers can get people so frustrated when they don't do what you want them to do, computers that run slow are basically useless.

There are many reasons why computer run slow...

Spyware! What is it? What does it do to my computer?

A simple definition of Spyware: a general term used to describe software that performs certain behaviors such as advertising, collecting personal information, or changing the configuration of your computer, generally without appropriately obtaining your consent first.

Spyware is often associated with software that displays advertisements (called ad ware) or software that tracks personal or sensitive information. The most common type of spyware is pop up banners that never stop! You close them, and they keep returning. Im sure we have all had this problem once. Spyware in a nut shell, basically makes your computer run really slow. Once a computer is infected, the software usually uses your internet connection to download more.

Your computer 'Hardware' can be the problem!


This is probably not the problem with your computer, but it has to be mentioned because it could be the problem. After you have deleted the spyware and removed the virus you may have, if your computer still runs slow, then it is time to take your computer to a qualified technician to see if you are having hardware trouble. Check to see if you have at least 512meg of memory. This is the recommended ram specifications for windows Xp, some older systems have 256meg of memory and this is not enough if you run multiple programs. If you are running the new Windows Vista, i would recommend at least 1gig (1024meg) of ram.

Bad SEOs? What about Bad SEO Clients?

You hear all the time about bad SEOs. Bad SEOs are offering worthless services, failing to deliver on their internet marketing promises, polluting the search engine results?well, a lot of bad things. But how much ever gets said about bad SEOs' spiritual counterparts: bad SEO clients?

As an SEO, I can see things from the other side of the table. You see, despite trying hard to make it clear I'm a good, ethical, results-oriented, smarter marketing, white-hat SEO, I have gotten no end of inquiries from bad prospective SEO clients. Sure, no one who gets cheated is ever entirely to blame, and some cheated businesses are entirely blameless. But the bad SEOs would have too small a market to stay in business if it weren't for almost-as-bad clients.

Shades of Bad SEO Clients

First, let me make clear what I mean by "bad" SEOs. Bad SEOs are bad because they either do unethical things to get e-marketing results, or because they consistently fail to deliver results. A good SEO delivers results and does it without trampling over other people's rights (like submitting automated comments to their websites or trying to get good sites de-indexed).

A bad SEO client, in turn, is someone who will only be satisfied (albeit temporarily) with a bad SEO. Because they refuse to consider ethical web consultants or smarter marketing strategies, they are creating markets for the e-marketing charlatans and black-hats. There are two basic types of bad SEO clients: crooks and fool--oops, I mean, ethically challenged and judgmentally-challenged.

Ethically-Challenged SEO Clients

I haven't gotten so many inquiries asking for out-and-out unethical services. Still, I've been asked about blog-sp@mming software and other shady internet marketing tactics a couple times. A colleague shared this gem with me: "Have you thought about just scanning a book from the library and using it for web content? Or is that too high-risk?" (Seriously, someone asked him this.)

Of course, judging from the amount of comment sp@m and SEO-motivated hacking on the web, there is plenty of demand for this stuff.

Judgmentally-Challenged SEO Clients

A much larger group of bad SEO clients are simply those who insist on putting themselves in the way of fraud. Yes, that's right: I'm blaming the victim. Someone who goes looking for a $5 gold watch can't cry too long if the watch turns out to be fake or hot. With SEO, there are a few more nuances, but it's the same essential idea.

The overwhelming majority of these judgmentally challenged souls are private individuals whose only business is the business-in-a-kit variety. Yet they are also sometimes representatives of actual successful companies. The real businesspeople tend to be quicker to let their misconceptions go (after all, they can afford the real SEO alternatives), but not always. Let's look at some representative types of this group, straight out of my own inbox (note: these are inquiries from prospects, not actual clients).

1. Something-for-(Little More than)-Nothing Clients

Really, I tend to think these people should be in the ethically challenged group, but maybe that's just the remnant of my work ethic making me be mean There are actually two kinds of these clients:

- The ambitious but cheap client: "I'd like to get to the top of Google for the keyword, 'mortgage' so I can turn over $100,000/month in revenue. I can spend up to $1,000."

-The Adsense-is-my-business-plan client: you wouldn't believe the numbers of inquiries I get from people who only plan to make money off Adsense or other on-site advertising?they don't even have a plan for getting repeat traffic, nor do they have content to synergize with the SEO effort. By buying promotional services, they would essentially be buying advertising in order to make money off advertising?you see where that could be a problem?

Another way of looking at it: why wouldn't I just create a site myself and keep all the profit from my efforts? In fact, most SEOs do have their own project sites, which are often monetized by Adsense. The money we could otherwise get from Adsense is one very low baseline for pricing our services. Legitimate SEO clients are typically selling goods or services at a profit rate that works out to ten or more times what they could get from Adsense.

In addition to the greedy, I also see a few other kinds of less common, but still problematic prospective SEO clients:

2.SEO-Starry-Eyed Clients: "Search engine traffic is definitely the best way for me to get pet-sitting clients in my tiny Himalayan village."

3.The Little-Knowledge-Is-a-Dangerous-Thing Client: "Don't tell me about keyword research, content, anchor text, or natural linking strategy, just get me the PageRank (or links, keyword density, or whatever the fad is)."

4.Gullible-and-Not-Letting-Go Client: "I know of at least two services that will submit my site to thousands of search engines for $29.95. If you can't do that, I'll take my business elsewhere."

5.I-Will-Never-Trust-SEO-But-I'll-Consider-It-Anyway Client: "No one can guarantee a good search engine ranking so this is all pointless?I'll just go with that $29.95 search engine submission package someone just emailed me about. At least it's cheap."

In short, if you are going to find good SEO web consultants, you need: 1) realistic expectations; 2) a realistic budget; 3) solid information. Don't expect something for nothing, do a little reading, and it's much less likely you'll fall victim to bad SEOs.