tag:blogger.com,1999:blog-5348115841637883682024-03-13T21:59:53.366-07:00Latest Information Technology and Security NewsComputer Related,Information Security News,Software Downloads and News Updates.One Stop for Latest Tech Newsd`whohttp://www.blogger.com/profile/02210967167222299225noreply@blogger.comBlogger533125tag:blogger.com,1999:blog-534811584163788368.post-4614869698616999402010-09-17T08:53:00.001-07:002010-09-17T08:53:50.941-07:00Yahoo launches multi-media search revamp<h6 style="text-align: justify;"> <p><span style="font-size:85%;">Searches to yield articles, images, videos and tweets all on one page</span></p> </h6><div style="text-align: justify;"> </div><div style="text-align: justify;" class="articlebyline"><span style="font-size:85%;">Khidr Suleman, <a href="http://www.v3.co.uk/">V3.co.uk</a> 17 Sep 2010</span></div><div style="text-align: justify;"> </div><p style="text-align: justify;"><span style="font-size:85%;">Yahoo has redesigned its core functionality in an attempt to make searches more relevant and visually compelling as the firm tries to claw back market share from Google.</span></p><div style="text-align: justify;"> </div><p style="text-align: justify;"><span style="font-size:85%;">News searches will be more conveniently organised, with videos, images, articles and tweets appearing on a single page, the firm said in a <a href="http://www.ysearchblog.com/2010/09/16/yahoo-search-fall-preview/" target="_blank" title="Coming Soon: Let Yahoo! Search Entertain You">blog post</a>.</span></p><div style="text-align: justify;"> </div><p style="text-align: justify;"><span style="font-size:85%;">Searches for movies, music, artists or celebrities will also yield "richer content results" by combining images, news articles, videos, tweets, events and ratings.</span></p><div style="text-align: justify;"> </div><p style="text-align: justify;"><span style="font-size:85%;">The 'Trending Now' lists across the Yahoo network will be accompanied by slideshows later this year, allowing users to browse pictures from the entire Yahoo network without leaving the search results page.</span></p><div style="text-align: justify;"> </div><p style="text-align: justify;"><span style="font-size:85%;">"With more searches than ever for information-rich topics like music, movies and news, we'll be launching more visually compelling search results that let you discover information and be entertained all on one search result page," said Kaushal Kurapati, director of product management for emerging markets at Yahoo Search, and Caroline Tsay, director of product management at Yahoo Search. </span></p><div style="text-align: justify;"> </div><p style="text-align: justify;"><span style="font-size:85%;">Google unveiled its <a href="http://www.v3.co.uk/v3/news/2269566/fresh-look-google-instant" title="Google explains technology behind Instant search">Instant search feature</a> at the beginning of the month in an effort to make searching faster and more convenient.</span></p><div style="text-align: justify;"> </div><p style="text-align: justify;"><span style="font-size:85%;">Twitter is also rolling out a <a href="http://www.v3.co.uk/v3/news/2269818/twitter-revamps-site-richer" title="Twitter rolls out major multimedia revamp">redesigned site</a> in an effort to make it easier to share multimedia content and provide more information to about tweets.</span></p><div style="text-align: justify;"> </div><div style="text-align: justify;" id="permalink"><span style="font-size:85%;"> Permalink: <a target="_blank" href="http://www.v3.co.uk/v3/news/2269966/yahoo-search-gets-major">http://www.v3.co.uk/2269966</a></span></div><div style="text-align: justify;"> </div><span style="font-size:85%;">This article was printed from the <span class="bold">V3.co.uk</span> web site<br /><br /> © Incisive Media Ltd. 2009 Incisive Media Limited, Haymarket House, 28-29 Haymarket, London SW1Y 4RX, is a company registered in England and Wales with company registration number 04038503</span>d`whohttp://www.blogger.com/profile/02210967167222299225noreply@blogger.com1tag:blogger.com,1999:blog-534811584163788368.post-29248323450391393722010-09-17T08:51:00.000-07:002010-09-17T08:52:26.830-07:00Facebook Places launches amid continued privacy concerns<h6 style="text-align: justify;"> <p><span style="font-size:85%;">Geo-location tool allows users to 'check-in' each other</span></p> </h6><div style="text-align: justify;"> </div><div style="text-align: justify;" class="articlebyline"><span style="font-size:85%;">Phil Muncaster, <a href="http://www.v3.co.uk/">V3.co.uk</a> 17 Sep 2010</span></div><div style="text-align: justify;"> </div><p style="text-align: justify;"><span style="font-size:85%;">Facebook launched its Places geo-location feature in the UK today, but the social networking site is still fighting off criticism related to privacy concerns.</span></p><div style="text-align: justify;"> </div><p style="text-align: justify;"><span style="font-size:85%;">The company has made the functionality accessible to UK users via the Facebook iPhone application and on touch.facebook.com after the US launch last month.</span></p><div style="text-align: justify;"> </div><p style="text-align: justify;"> <span style="font-size:85%;"><a href="http://www.v3.co.uk/v3/news/2268400/facebook-getting-serious" title="Facebook getting serious on location with Places app">Facebook Places</a> essentially allows users to instantly log where they are via GPS, and display the results on Facebook in a manner very similar to Foursquare.</span></p><div style="text-align: justify;"> </div><p style="text-align: justify;"><span style="font-size:85%;">People using the Places application are also asked to tag any 'friends' that may be at the same location, as with Facebook Photo.</span></p><div style="text-align: justify;"> </div><p style="text-align: justify;"><span style="font-size:85%;">However, privacy concerns persist over the default settings associated with the new tool.</span></p><div style="text-align: justify;"> </div><p style="text-align: justify;"><span style="font-size:85%;">Rik Ferguson, senior security advisor at Trend Micro, noted that it is possible for people to tag friends in their own check-ins, meaning that an individual could be 'checked-in' without their consent.</span></p><div style="text-align: justify;"> </div><p style="text-align: justify;"><span style="font-size:85%;">Users can prevent this by altering their privacy settings, and are notified after the effect with the option to remove the tag. However, the default settings appear to enable checking in by friends, and represent a "risk to individual privacy", according to Ferguson.</span></p><div style="text-align: justify;"> </div><p style="text-align: justify;"><span style="font-size:85%;">"If Facebook persists in allowing check-ins by third parties it needs to ensure that the information is not made public until it has been agreed to by all people identified," he said.</span></p><div style="text-align: justify;"> </div><p style="text-align: justify;"><span style="font-size:85%;">"Otherwise it means that anyone with an interest in the location of their friends, colleagues, partners even ex-partners simply needs to become a friend of a friend, or just frequent the same places, and Facebook will do all the espionage for them."</span></p><div style="text-align: justify;"> </div><p style="text-align: justify;"> </p><span style="font-size:85%;"><img src="http://ivory.vnunet.com/assets/binaries/v3/news/2010/09/17/facebook-places-launches-amid/facebook-privacy-page.jpg" title="" border="0" hspace="5" vspace="5" /></span><div style="text-align: justify;"> </div><p style="text-align: justify;"><span style="font-size:85%;">The concerns echo those made by the American Civil Liberties Union of Northern California when the tool was launched in the US last month.</span></p><div style="text-align: justify;"> </div><p style="text-align: justify;"><span style="font-size:85%;">"Facebook makes it very easy to say 'yes' to allowing your friends to check in for you. But when it comes to opting out of that feature, you are only given a 'not now' option. 'No' isn't one of the easy options," said a statement from the organisation.</span></p><div style="text-align: justify;"> </div><p style="text-align: justify;"><span style="font-size:85%;">"And if you use Places yourself, you aren't even given a 'not now', you're just told that friends are able to check-in for you and left to discover for yourself that you can change this setting by digging into your privacy controls. "</span></p><div style="text-align: justify;"> </div><p style="text-align: justify;"><span style="font-size:85%;">Facebook <a href="http://www.facebook.com/video/video.php?v=697692691093" target="_blank" title="Facebook video">released a video</a> soon after the US launch of Places designed to teach people how to change their privacy settings to avoid being checked in by others. First time users also receive an alert asking whether they would like to be checked in. </span></p><div style="text-align: justify;"> </div><div style="text-align: justify;" id="permalink"><span style="font-size:85%;"> Permalink: <a target="_blank" href="http://www.v3.co.uk/v3/news/2269977/facebook-places-launches-amid">http://www.v3.co.uk/2269977</a></span></div><div style="text-align: justify;"> </div><span style="font-size:85%;">This article was printed from the <span class="bold">V3.co.uk</span> web site<br /><br /> © Incisive Media Ltd. 2009 Incisive Media Limited, Haymarket House, 28-29 Haymarket, London SW1Y 4RX, is a company registered in England and Wales with company registration number 04038503</span>d`whohttp://www.blogger.com/profile/02210967167222299225noreply@blogger.com0tag:blogger.com,1999:blog-534811584163788368.post-8540575810099658632010-09-17T08:43:00.000-07:002010-09-17T08:50:34.400-07:00VMware rumoured to buy Novell's Suse<div style="text-align: justify;"> </div><h6 style="text-align: justify;"> <p><span style="font-size:85%;">Virtualisation firm said to be keen to broaden its enterprise stack</span></p> </h6><div style="text-align: justify;"> </div><div style="text-align: justify;" class="articlebyline"><span style="font-size:85%;">Daniel Robinson, <a href="http://www.v3.co.uk/">V3.co.uk</a> 17 Sep 2010</span></div><div style="text-align: justify;"> </div><p style="text-align: justify;"><span style="font-size:85%;">Novell is in discussions to sell off its Suse Linux division to VMware, according to various reports on the web.</span></p><div style="text-align: justify;"> </div><p style="text-align: justify;"><span style="font-size:85%;">The rumours indicate that Novell is attempting to sell various parts of its business, including its Suse Linux subsidiary, which the company acquired in 2003.</span></p><div style="text-align: justify;"> </div><p style="text-align: justify;"><span style="font-size:85%;">Various sources, including <em>The Wall Street Journal</em>, <a href="http://online.wsj.com/article/SB10001424052748703440604575496053490383496.html?KEYWORDS=suse" target="_blank" title="VMware Is in Talks to Acquire Novell's Linux Software Unit">claim to have confirmation</a> that VMware is to be the buyer.</span></p><div style="text-align: justify;"> </div><p style="text-align: justify;"><span style="font-size:85%;">Neither company would comment on the story when contacted by <em>V3.co.uk</em>.</span></p><div style="text-align: justify;"> </div><p style="text-align: justify;"><span style="font-size:85%;">VMware is said to be interested in the acquisition in order to widen its product portfolio to offer a complete software stack, and better compete against rivals such as Red Hat and Microsoft.</span></p><div style="text-align: justify;"> </div><p style="text-align: justify;"><span style="font-size:85%;">Although VMware is currently the market leader in virtualisation, Red Hat in particular has been <a href="http://www.v3.co.uk/v3/news/2268768/red-hat-offers-cloud-api-open" title="Red Hat offers cloud API as an open standard">touting its portfolio</a> as offering a complete enterprise stack for customers, especially those planning for cloud computing.</span></p><div style="text-align: justify;"> </div><p style="text-align: justify;"><span style="font-size:85%;">VMware and Novell already have a partnership for development and support of ready-made virtual appliances based on Suse Linux to run on VMware infrastructure, so bringing Suse in-house would appear to make sense.</span></p><div style="text-align: justify;"> </div><p style="text-align: justify;"><span style="font-size:85%;">Other commentators have speculated that VMware could gain from acquiring the Unix intellectual property rights that Novell still owns, especially if it came to patent battles with rivals.</span></p><div style="text-align: justify;"> </div><div style="text-align: justify;" id="permalink"><span style="font-size:85%;"> Permalink: <a target="_blank" href="http://www.v3.co.uk/v3/news/2269975/vmware-rumoured-novell-suse">http://www.v3.co.uk/2269975</a></span></div><div style="text-align: justify;"> </div><span style="font-size:85%;">This article was printed from the <span class="bold">V3.co.uk</span> web site<br /><br /> © Incisive Media Ltd. 2009 Incisive Media Limited, Haymarket House, 28-29 Haymarket, London SW1Y 4RX, is a company registered in England and Wales with company registration number 04038503</span>d`whohttp://www.blogger.com/profile/02210967167222299225noreply@blogger.com0tag:blogger.com,1999:blog-534811584163788368.post-54070222458641996302010-05-02T09:19:00.000-07:002010-05-02T09:22:26.957-07:00Opera posts security update for Apple and Windows<span style="font-size:85%;"><br /></span><div style="text-align: justify;"><a onblur="try {parent.deselectBloggerImageGracefully();} catch(e) {}" href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEj7mgA6Vsm_UGGiRzoxeqx-9-rH7ZVN0QC-RhlwSzv2K2AcQlIuRRGv1nIBCKIgG8dJGTWYUJJ49Kuyb6Kj8OE6cLZ0_p91S_uVKq82reSjlF5BvDppRgYsA4uNcUAbjgVO5uuZ2X-9yRg/s1600/opera.jpg"><img style="float: right; margin: 0pt 0pt 10px 10px; cursor: pointer; width: 185px; height: 110px;" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEj7mgA6Vsm_UGGiRzoxeqx-9-rH7ZVN0QC-RhlwSzv2K2AcQlIuRRGv1nIBCKIgG8dJGTWYUJJ49Kuyb6Kj8OE6cLZ0_p91S_uVKq82reSjlF5BvDppRgYsA4uNcUAbjgVO5uuZ2X-9yRg/s400/opera.jpg" alt="" id="BLOGGER_PHOTO_ID_5466708771911420066" border="0" /></a><br /><span style="font-size:85%;"><span style="font-weight: bold;">Opera</span> Software has released an update for its namesake web browser.</span><br /><br /><span style="font-size:85%;">The company said that the 10.53 update would address security vulnerabilities in both the <span style="font-weight: bold;">Mac</span> and <span style="font-weight: bold;">Windows </span>version of the browser.</span><br /><br /><span style="font-size:85%;">Opera said that the update would address a vulnerability which the company classifies as "extremely severe."</span><br /><br /><span style="font-size:85%;">The company said that the vulnerability lies within a script that handles document files. An attacker could potentially modify a file to make multiple calls to the vulnerable component and cause an application crash. From there, a targeted system would be vulnerable to remote code execution.</span><br /><br /><span style="font-size:85%;">Users of both the <span style="font-weight: bold;">MacOS X</span> and Windows versions of the browser are being advised to install the update. Other versions of Operawere not listed as vulnerable to attack.</span><br /><br /><span style="font-size:85%;">The update comes as Opera is seeking to expand the reach of its browser business. The company has in recent weeks released an <span style="font-weight: bold;">iPhone</span> version of the browser and in March an updated version of Opera for the Android smartphone platform was debuted.</span><br /><br /><br /><a href="http://www.v3.co.uk/v3/news/2262361/opera-posts-security-update"><span style="font-weight: bold; font-style: italic;font-size:100%;" ><br />ReadFullStory>>>>>></span></a><br /><br /><br /><br /><br /><br /></div>d`whohttp://www.blogger.com/profile/02210967167222299225noreply@blogger.com0tag:blogger.com,1999:blog-534811584163788368.post-58241753215754766722010-05-02T09:17:00.000-07:002010-05-02T09:19:23.431-07:00Twitter reveals app for Android mobile phones<a onblur="try {parent.deselectBloggerImageGracefully();} catch(e) {}" href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEip7u5vs0TjCRePjEbVjDT_j3BrJXxn1HCYSHfqF09-_nB_iLsMK7vQvVOlumGsfRQbLHAZ6CP-zaWJsg3H6gAhfXLpP3dFx2JwIEnyJD-ydhfSjvdBEtTk3v6M8Fpf1jCHyyerDOfXkdI/s1600/twitter.jpg"><img style="float: right; margin: 0pt 0pt 10px 10px; cursor: pointer; width: 185px; height: 110px;" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEip7u5vs0TjCRePjEbVjDT_j3BrJXxn1HCYSHfqF09-_nB_iLsMK7vQvVOlumGsfRQbLHAZ6CP-zaWJsg3H6gAhfXLpP3dFx2JwIEnyJD-ydhfSjvdBEtTk3v6M8Fpf1jCHyyerDOfXkdI/s400/twitter.jpg" alt="" id="BLOGGER_PHOTO_ID_5466707929455297234" border="0" /></a><br /><span style="font-size:85%;"><br /></span><div style="text-align: justify;"><span style="font-size:85%;"><span style="font-weight: bold;">Twitter</span> has revealed a client for Android mobile phones that it developed with Google.</span><br /><br /><span style="font-size:85%;">The application, which was first promised by Twitter at its first annual conference Chirp a couple of weeks ago, will only be applicable to phones running Android 2.1 and above, such as the Droid, Desire, Incredible and Nexus One.</span><br /><br /><span style="font-size:85%;">Head of Twitter’s mobile user experience design team, Leland Rechis, described the application in the firm’s official blog as easy to use, and said it will offer users deep integration with Android mobile phones.</span><br /><br /><span style="font-size:85%;">“Sharing any link or photo is super simple too – just look for the share button in your favourite application and choose Twitter,” he said.</span><br /><br /><span style="font-size:85%;">“Reading tweets is easy in a bunch of places on your phone. Quickly access your timeline with the home screen widget, view a tweet location on a map, and see your friend’s latest tweet in your phonebook, <span style="font-weight: bold;">GoogleTalk</span> list or any application that uses Android’s <span style="font-weight: bold;">QuickContact bar</span>.”</span><br /><br /><span style="font-size:85%;">Rechis joined Twitter last year after working on Android user experience design at Google for four years, according to his LinkedIn profile details.</span><br /><br /><span style="font-size:85%;">Rechis said the Google Android team will open source the code used in the application in the near future.</span><br /><br /><span style="font-size:85%;">“We look forward to the amazing experiences developers will create using Twitter APIs in their upcoming Android apps,” he said.</span><br /><br /><span style="font-size:85%;">Twitter has recently started producing its own applications for mobile phones, rather than relying on third-party developers to do the work. For example, Twitter launched an official application for the BlackBerry under a month ago. The company has also bought Tweetie, the most popular Twitter client for the iPhone.</span><br /><br /><span style="font-size:85%;">The strategy coincides with statements made by Twitter investor Fred Wilson, principal of Union Square Ventures, who said third-party developers focused on the Twitter platform should consider more radical innovation, and the creation of "killer apps", rather than filling holes in the Twitter product.</span><br /><br /><br /><br /><a href="http://www.v3.co.uk/v3/news/2262365/twitter-reveals-app-andoid"><span style="font-weight: bold; font-style: italic;font-size:100%;" >ReadFullStory>>>>>></span></a><br /><br /><br /><br /><br /><br /></div>d`whohttp://www.blogger.com/profile/02210967167222299225noreply@blogger.com0tag:blogger.com,1999:blog-534811584163788368.post-14824973937683489112010-04-22T09:42:00.000-07:002010-04-22T09:47:41.281-07:00Blackhat SEO Techniques Could Lead To Scareware infections<a onblur="try {parent.deselectBloggerImageGracefully();} catch(e) {}" href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhTYoLNNuNsBD50SY0L2EDNjWmJxy1IBlLhys1CAUF3L8dPx3V03koofPWQm6sziR883aqKkmyMD3NKztR_-zeJ8UNTYjm5wvALc7nisrLRbK570USgDKbEIP3Yg14RmeM-jTE2p7gzaLY/s1600/black-hat-seo.jpg"><img style="float: right; margin: 0pt 0pt 10px 10px; cursor: pointer; width: 360px; height: 234px;" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhTYoLNNuNsBD50SY0L2EDNjWmJxy1IBlLhys1CAUF3L8dPx3V03koofPWQm6sziR883aqKkmyMD3NKztR_-zeJ8UNTYjm5wvALc7nisrLRbK570USgDKbEIP3Yg14RmeM-jTE2p7gzaLY/s400/black-hat-seo.jpg" alt="" id="BLOGGER_PHOTO_ID_5463003864137698130" border="0" /></a><br /><span style="font-size:85%;"><br /></span><div style="text-align: justify;"><span style="font-size:85%;"><span style="font-weight: bold;">Cyber criminals</span> quick to pounce on<span style="font-weight: bold;"> McAfee</span> crash story</span><br /><br /><span style="font-size:85%;"><span style="font-weight: bold;">Security</span> experts are warning users searching for information on the breaking McAfee systems crash story to beware of malicious links in search results that could contain scareware.</span><br /><br /><span style="font-size:85%;">Security giant McAfee caused widespread concern among users after it revealed that a problem with its anti-virus product caused some Windows XP systems to crash.</span><br /><br /><span style="font-size:85%;">However, cyber criminals have been first to react to the incident, by using <span style="font-weight: bold;">blackhat search engine</span> optimisation techniques to ensure that their malicious web pages are returned first in a search for information on the incident.</span><br /><br /><span style="font-size:85%;">Many of these will infect the user with malicious software designed to trick them into thinking they are infected and then paying a fee for 'anti-virus software' to alleviate the problem.</span><br /><br /><span style="font-size:85%;"><blockquote>"These poisoned pages are appearing on the very first page of search engine results, making it likely that many will click on them," </blockquote>said <span style="font-weight: bold;">Graham Cluley</span>, senior technology consultant at <span style="font-weight: bold;">Sophos</span>.</span><br /><br /><span style="font-size:85%;"></span><blockquote><span style="font-size:85%;">"If you visit the links you may see pop-up warnings telling you about security issues with your computer. These warnings are fake and designed to trick you into downloading dangerous software, which could result in hackers gaining control of your corporate computers or the theft of your credit card details."</span></blockquote><br /><br /><span style="font-size:85%;"><span style="font-weight: bold;">Rik Ferguson</span>, senior security advisor at <span style="font-weight: bold;">Trend Micro</span>, said that he is not surprised that the news had been hijacked by cyber criminals.</span><br /><br /><span style="font-size:85%;"><blockquote>"Unfortunately this is an ongoing trend, and we see it related to any newsworthy event," </blockquote>he said.</span><br /><br /><span style="font-size:85%;"></span><blockquote><span style="font-size:85%;">"People cannot afford to blindly trust the results offered by search engines, as abusing search trends has now become one of online crime's primary infection vectors."</span></blockquote><br /><br /><br /><a href="http://www.v3.co.uk/v3/news/2261839/cyber-criminals-quick-pounce"><span style="font-weight: bold; font-style: italic;font-size:100%;" ><br />ReadFullStory>>>>>></span></a><br /><br /><br /><br /><br /><br /></div>d`whohttp://www.blogger.com/profile/02210967167222299225noreply@blogger.com0tag:blogger.com,1999:blog-534811584163788368.post-61432245027402235642010-04-11T00:06:00.000-07:002010-04-11T00:18:02.547-07:00Google using speed to rank search results<a onblur="try {parent.deselectBloggerImageGracefully();} catch(e) {}" href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEg-1P4MrloTXIxpqBptupPmk3Kehk_J9PGGRgCTHtg_OJzUHnAFCZ6qVkx-N2QJ9Pmw49cdUL_3h9acjCLeVqLUMHmfPDVtKrhAPxrO5gzXeECfWE2WDWMKn7O-oGzJ8ETyxkdTGvJpMPo/s1600/google.JPG"><img style="float: right; margin: 0pt 0pt 10px 10px; cursor: pointer; width: 400px; height: 121px;" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEg-1P4MrloTXIxpqBptupPmk3Kehk_J9PGGRgCTHtg_OJzUHnAFCZ6qVkx-N2QJ9Pmw49cdUL_3h9acjCLeVqLUMHmfPDVtKrhAPxrO5gzXeECfWE2WDWMKn7O-oGzJ8ETyxkdTGvJpMPo/s400/google.JPG" alt="" id="BLOGGER_PHOTO_ID_5458774070763152226" border="0" /></a><span style="font-size:85%;"><br /><span style="font-weight: bold;">Google</span> is now using site speed as a consideration when ranking sites in its search results, giving webmasters yet more food for thought.</span><br /><div style="text-align: justify;"><br /><span style="font-size:85%;">In a <a href="http://googlewebmastercentral.blogspot.com/2010/04/using-site-speed-in-web-search-ranking.html">blog</a> post yesterday, Google fellow <span style="font-weight: bold;">Amit Singhal</span> and principal engineer <span style="font-weight: bold;">Matt Cutts</span> revealed the news, arguing that speeding up the response times of your site is important for both site owners and users.</span><br /><br /><span style="font-size:85%;"><blockquote>“Faster sites create happy users and we've seen in our internal studies that when a site responds slowly, visitors spend less time there,”</blockquote> they wrote.</span><br /><br /><span style="font-size:85%;"></span><blockquote><span style="font-size:85%;">“But faster sites don't just improve user experience; recent data shows that improving site speed also reduces operating costs. Like us, our users place a lot of value in speed — that's why we've decided to take site speed into account in our search rankings.”</span></blockquote><br /><span style="font-size:85%;">Singhal and Cutts recommended several tools webmasters can use to evaluate the speed of their sites. These include open source <span style="font-weight: bold;">Firefox</span>/<span style="font-weight: bold;">Firebug</span> add-on <span style="font-weight: bold;">Page Speed</span>, <span style="font-weight: bold;">Yahoo tool YSlow</span>, and a Google function in its Webmaster Tools section.</span><br /><br /><span style="font-size:85%;">However, the web giant did concede that site speed will not be taken into consideration as much as, say, relevance, when evaluating the search rankings of a particular site.</span><br /><br /><span style="font-size:85%;"><blockquote>“Currently, fewer than 1 per cent of search queries are affected by the site speed signal in our implementation and the signal for site speed only applies for visitors searching in English on Google.com at this point,”</blockquote> noted the blog post.</span><br /><br /><span style="font-size:85%;"></span><blockquote><span style="font-size:85%;">“We launched this change a few weeks back after rigorous testing. If you haven't seen much change to your site rankings, then this site speed change possibly did not impact your site.”</span></blockquote><br /></div><br /><br /><br /><a href="http://www.v3.co.uk/v3/news/2261101/google-speed-rank-search"><span style="font-weight: bold; font-style: italic;font-size:100%;" >ReadFullStory>>>>>></span></a>d`whohttp://www.blogger.com/profile/02210967167222299225noreply@blogger.com1tag:blogger.com,1999:blog-534811584163788368.post-85903306091633521912010-04-10T01:53:00.000-07:002010-04-10T02:07:56.290-07:00Twice in two week Glitch diverts net traffic through Chinese ISP<a onblur="try {parent.deselectBloggerImageGracefully();} catch(e) {}" href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhKazo0ZoB4puAqbs67eT7AZo7FVqulay2Q24IGxiF9kJU6ZAWZKXssB1hEccIFZ533AdCWXacUzzxPezi3eOFJ_KNsQ1poeMvLMqZd6hkVjlHHykIITbqBT_yjpnqEWwMsU-N3uCZ2zDo/s1600/china.gif"><img style="float: right; margin: 0pt 0pt 10px 10px; cursor: pointer; width: 400px; height: 264px;" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhKazo0ZoB4puAqbs67eT7AZo7FVqulay2Q24IGxiF9kJU6ZAWZKXssB1hEccIFZ533AdCWXacUzzxPezi3eOFJ_KNsQ1poeMvLMqZd6hkVjlHHykIITbqBT_yjpnqEWwMsU-N3uCZ2zDo/s400/china.gif" alt="" id="BLOGGER_PHOTO_ID_5458431622417470610" border="0" /></a><span style="font-size:85%;"><br /></span><div style="text-align: justify;"><span style="font-size:85%;"><span style="font-weight: bold;">Internet service providers</span> in <span style="font-weight: bold;">China</span> briefly tainted network routing tables on Thursday, marking the second time in two weeks operators in that country have done so, <span style="font-weight: bold;">IDG news<a href="http://www.computerworld.com/s/article/9175081/A_Chinese_ISP_momentarily_hijacks_the_Internet_again_"> reports</a></span>.</span><br /><br /><span style="font-size:85%;">The bad networking information originated from <span style="font-weight: bold;">IDC</span> <span style="font-weight: bold;">China Telecommunication</span> and was soon retransmitted by China's state-owned China Telecommunications. ISPs including <span style="font-weight: bold;">AT&T</span>, <span style="font-weight: bold;">Level3</span>, <span style="font-weight: bold;">Deutsche Telekom</span>, <span style="font-weight: bold;">Qwest Communications</span> and <span style="font-weight: bold;">Telefonica</span> soon incorporated the data into their tables as well, IDG said.</span><br /><br /><br /><span style="font-size:85%;">As a result, routing information for 32,000 to 37,000 networks was affected, potentially causing them to be redirected through IDC China instead of their path. Some 8,000 of the networks were located in the US, including those operated by <span style="font-weight: bold;">Dell</span>, <span style="font-weight: bold;">Apple</span>, <span style="font-weight: bold;">CNN</span>, and <span style="font-weight: bold;">Starbucks</span>. Networks in Australia, China and elsewhere were also affected.</span><br /><br /><span style="font-size:85%;">The incident comes two weeks after a similar networking anomaly caused people in Chile to be redirected to Chinese networks, potentially blocking websites such as <span style="font-weight: bold;">Facebook</span> and <span style="font-weight: bold;">YouTube</span>, which are banned in that country.</span><br /><br /><span style="font-size:85%;">The snafu underscores the fragility of the <span style="font-weight: bold;">Border Gateway Protocol</span>, which is used to route traffic over the internet. The core net underpinning remains susceptible to man-in-the-middle attacks that can divert traffic to impostor networks.</span><br /><br /><span style="font-size:85%;">At the 2008 <span style="font-weight: bold;">Defcon hacker</span> conference in Las Vegas, researchers demonstrated a BGP attack that allowed them to redirect traffic bound for the conference network to a system they controlled in New York. Also in 2008, large chunks of the internet lost access to YouTube when BGP tables inside Pakistan spread to other countries.</span><br /><br /><span style="font-size:85%;">It's unclear how widely felt Thursday's incident was outside of Asia, IDG said. Routers frequently subscribe to several BGP routes and follow the shortest path. That means networks physically located in the US, Europe and elsewhere may have ignored the tables that traveled through China.</span><br /></div><span style="font-size:85%;"></span><br /><span style="font-size:85%;">Internet service providers in China briefly tainted network routing tables on Thursday, marking the second time in two weeks operators in that country have done so, IDG news reports.</span><br /><span style="font-size:85%;"></span><br /><span style="font-size:85%;">The bad networking information originated from IDC China Telecommunication and was soon retransmitted by China's state-owned China Telecommunications. ISPs including AT&T, Level3, Deutsche Telekom, Qwest Communications and Telefonica soon incorporated the data into their tables as well, IDG said.</span><br /><br /><br /><br /><br /><a href="http://www.theregister.co.uk/2010/04/10/bgp_glitch/"><span style="font-weight: bold; font-style: italic;font-size:100%;" >ReadFullStory>>>>>></span></a><br /><br /><br /><br /><br /><br /><br /><span style="font-size:85%;"></span><br /><span style="font-size:85%;"></span>d`whohttp://www.blogger.com/profile/02210967167222299225noreply@blogger.com0tag:blogger.com,1999:blog-534811584163788368.post-65832038939741114232010-04-09T09:41:00.000-07:002010-04-09T09:46:36.683-07:00Twitter leaks details of major redesign<a onblur="try {parent.deselectBloggerImageGracefully();} catch(e) {}" href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEitWcFV_mx5Uq-cw7LMQG8wxXChqy7LkbEzf8FFhTLRjq-hI_bXHUDdl5Hk-otXJOtMNJSt0UEXXl8m2s-PRCfKBu9gxKzh-piSgtNyFlS1JQWVXyZks2gAMmQ6vMpeZ79soZdMAkZyXt0/s1600/twitter.jpg"><img style="float: right; margin: 0pt 0pt 10px 10px; cursor: pointer; width: 245px; height: 145px;" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEitWcFV_mx5Uq-cw7LMQG8wxXChqy7LkbEzf8FFhTLRjq-hI_bXHUDdl5Hk-otXJOtMNJSt0UEXXl8m2s-PRCfKBu9gxKzh-piSgtNyFlS1JQWVXyZks2gAMmQ6vMpeZ79soZdMAkZyXt0/s400/twitter.jpg" alt="" id="BLOGGER_PHOTO_ID_5458179575891583346" border="0" /></a><br /><div style="text-align: justify;"><span style="font-size:85%;"><span style="font-weight: bold;">Twitter</span> has released statistics which it claims prove the site is a "<span style="font-weight: bold;">global information network</span>", as it prepares for a radical overhaul.</span><br /><br /><span style="font-size:85%;"><span style="font-weight: bold;">Matt Sanford</span>, lead engineer for Twitter's international team, said in a blog post that over 60 per cent of new Twitter users have come from outside the <span style="font-weight: bold;">US</span> since the beginning of September.</span><br /><br /><span style="font-size:85%;">The news follows Twitter creative director <span style="font-weight: bold;">Doug Bowman's</span> leaking of a screenshot of the new design for the site, in which user profiles show more information, such as when they joined and how many tweets they post a day.</span><br /><br /><span style="font-size:85%;"><span style="font-weight: bold;">Fred Wilson</span>, principal of <span style="font-weight: bold;">Union Square Ventures</span>, which has invested in Twitter, has published a blog post indicating that the micro-blogging site could be about to undergo a major change.</span><br /><br /><span style="font-size:85%;">Wilson said that third-party developers focused on the Twitter platform may have to consider more radical innovation, and the creation of "<span style="font-weight: bold;">killer apps</span>".</span><br /><br /><span style="font-size:85%;">Wilson sits on Twitter's board of directors, and his views are likely to hold some weight. Twitter platform developer Doug Williams tweeted that Wilson's blog post was "<span style="font-weight: bold;">incredibly timely</span>", and that "<span style="font-weight: bold;">all Twitter developers should read it</span>".</span><br /><br /><span style="font-size:85%;"><blockquote>"Much of the early work on the Twitter platform has been filling holes in the Twitter product. Mobile clients come to mind. Photo sharing services come to mind. URL shorteners come to mind. Search comes to mind,"</blockquote> Wilson said.</span><br /><br /><span style="font-size:85%;"></span><blockquote><span style="font-size:85%;">"Twitter really should have had all of that when it launched, or it should have built those services right into the Twitter experience."</span></blockquote><br /><br /><span style="font-size:85%;">Williams warned that the time for developing applications that fill holes in Twitter's platform had passed, and that developers should now focus on areas such as social gaming, analytics and discovery.</span><br /><br /><span style="font-size:85%;">He also encouraged developers to focus on applications for vertical markets, like the Stockwits application for finance, and for enterprise use.</span><br /><br /><br /><br /><a href="http://www.v3.co.uk/v3/news/2261075/truly-global-twitter-set"><span style="font-weight: bold; font-style: italic;font-size:100%;" >ReadFullStory>>>>>></span></a><br /><br /><br /><br /><br /><br /></div>d`whohttp://www.blogger.com/profile/02210967167222299225noreply@blogger.com0tag:blogger.com,1999:blog-534811584163788368.post-18980846466673728462010-04-07T20:33:00.000-07:002010-04-07T20:39:29.769-07:00iPad hardware weighs in at $259, say analysts<span style="font-size:85%;"><br /></span><div style="text-align: left;"><a onblur="try {parent.deselectBloggerImageGracefully();} catch(e) {}" href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgjs_fL6tzg755RGcC-T3jLNnYWVTNkZpEBzOZjzDelwVs4-4Zis0ZTbORTWTDt1soZKbKLukPiz2J8UmTQbeEH0nyMxsURc6OhpJoFPbfhlpq8d12l5jsHJ8JhBrG28VewCj4AIonUP5U/s1600/steve.jpg"><img style="float: right; margin: 0pt 0pt 10px 10px; cursor: pointer; width: 218px; height: 129px;" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgjs_fL6tzg755RGcC-T3jLNnYWVTNkZpEBzOZjzDelwVs4-4Zis0ZTbORTWTDt1soZKbKLukPiz2J8UmTQbeEH0nyMxsURc6OhpJoFPbfhlpq8d12l5jsHJ8JhBrG28VewCj4AIonUP5U/s400/steve.jpg" alt="" id="BLOGGER_PHOTO_ID_5457605606490044658" border="0" /></a><div style="text-align: justify;"><span style="font-size:85%;">Analyst's teardown lauds "<span style="font-weight: bold;">game changing</span>" design</span><br /><br /><span style="font-size:85%;"><span style="font-weight: bold;">Industry</span> analysts praised the internal design of <span style="font-weight: bold;">Apple's iPad</span> in the first major "<span style="font-weight: bold;">teardown</span>" reports on the device.</span><br /><br /><span style="font-size:85%;">Research firm <span style="font-weight: bold;">iSuppli</span> took the iPad apart and found the hardware components and manufacturing costs for each 1<span style="font-weight: bold;">6GB Wi-Fi iPad</span> added up to around <span style="font-weight: bold;">$259.60</span> <span style="font-weight: bold;">per unit</span>. The cost for the <span style="font-weight: bold;">3G-enabled iPad</span>, expected to be released later this month, would be higher due to the additional components.</span><br /><br /><span style="font-size:85%;">The most expensive hardware on the iPad is the display. The company estimated that the screen and touch-sensing hard interface for the device costs come <span style="font-weight: bold;">$109.50</span>, roughly <span style="font-weight: bold;">44 per cent</span> of the total cost of the device.</span><br /><br /><span style="font-size:85%;">Meanwhile the casing for the iPad was estimated to cost <span style="font-weight: bold;">$32.50</span>, while the <span style="font-weight: bold;">lithium ion battery</span> was pegged at <span style="font-weight: bold;">$21</span>. The <span style="font-weight: bold;">NAND flash memory</span> for the iPad was also cited as major portion of the costs with its estimated <span style="font-weight: bold;">$29.50</span> price tag.</span><br /><br /><span style="font-size:85%;">The 16GB Wi-Fi iPad currently retails for <span style="font-weight: bold;">$499</span> in the US. International release is tentatively scheduled for the end of April.</span><br /><br /><span style="font-size:85%;">The firm said that the Apple tablet delivered a "game changing" design in the way it was constructed.</span><br /><br /><span style="font-size:85%;"><blockquote>"The iPad’s design represents a new paradigm in terms of electronics cost structure and electronic content," </blockquote>said iSuppli principal analyst and teardown services manager Andrew Rassweiler.</span><br /><br /><span style="font-size:85%;">The analyst explained that rather than start by designing a motherboard system to power the device and adding on peripherals such as touch screen or displays, the company used the screen and interface as the basis for the design and tailored the computing components to work with those systems.</span><br /><br /><span style="font-size:85%;"><blockquote>"Everything is human-machine-interface-centric, with the printed circuit board and integrated circuits all there to facilitate the display of content as well as user inputs," </blockquote>he said.</span><br /><br /><br /><br /><a href="http://www.v3.co.uk/v3/news/2260957/ipad-hardware-weighs-259-say"><span style="font-weight: bold; font-style: italic;font-size:100%;" >ReadFullStory>>>>>></span></a><br /><br /><br /><br /><br /><br /></div></div>d`whohttp://www.blogger.com/profile/02210967167222299225noreply@blogger.com0tag:blogger.com,1999:blog-534811584163788368.post-25562836127191165402010-04-07T01:05:00.000-07:002010-04-07T01:15:46.105-07:00Shadow Network busted Spies caught plundering secret Indian docs<span style="font-size:85%;"><br /></span><div style="text-align: justify;"><br /><span style="font-size:85%;">An <span style="font-weight: bold;">espionage gang</span> that infiltrated Indian government computer networks across the globe has been pilfering highly classified documents related to <span style="font-weight: bold;">missile systems</span>, <span style="font-weight: bold;">national security assessments</span> and the <span style="font-weight: bold;">United Nations</span>, according to researchers who tracked the intruders for eight months.</span><br /><br /><span style="font-size:85%;">The gang, dubbed the <span style="font-weight: bold;">Shadow Network</span>, was monitored by researchers from the <span style="font-weight: bold;">Munk School of Global Affairs</span> at the <span style="font-weight: bold;">University of Toronto</span> and the <span style="font-weight: bold;">SecDev Group</span>. With assistance from colleagues at the <span style="font-weight: bold;">Shadowserver</span> <span style="font-weight: bold;">Foundation</span>, the white hat hackers watched the spies as they systematically compromised computers in government offices on multiple continents.</span><br /><br /><span style="font-size:85%;">Shadow Network members also infiltrated the systems of <span style="font-weight: bold;">Indian embassies in Kabul</span>, <span style="font-weight: bold;">Moscow and Dubai</span>, <span style="font-weight: bold;">India's Military Engineer Services</span>, and several private companies. Reports they grabbed were frequently stamped with "<span style="font-weight: bold;">Secret</span>," "<span style="font-weight: bold;">Restricted</span>," and "<span style="font-weight: bold;">Confidential</span>" notices. The plundered documents also included a year's worth of personal email from the Dalai Lama.</span><br /><br /><span style="font-size:85%;">The researchers are the same ones who last year discovered another stealthy spy ring dubbed <span style="font-weight: bold;">Ghostnet</span>. That group also stole documents from the <span style="font-weight: bold;">Dalai Lama</span> and from governments and corporations in more than 103 countries.</span><br /><br /><span style="font-size:85%;">It was while following <span style="font-weight: bold;">Ghostnet</span> that the researchers stumbled onto the Shadow Network, which is believed to be a separate operation. By gaining access to the control servers Shadow Network spies used, the researchers were able to observe the theft of vast amounts of Indian government documents.</span><br /><br /><span style="font-size:85%;">To conceal their tracks and to build redundancy into their operation, the spies configured their control servers to work with a wide range of free internet services, including <span style="font-weight: bold;">Twitter</span>, <span style="font-weight: bold;">Google Groups</span>, <span style="font-weight: bold;">Baidu Blogs</span>, and <span style="font-weight: bold;">Yahoo Mail</span>. The free services allowed the attackers to maintain control of compromised computers even if they lost contact with the command and control servers, the researchers said.</span><br /><br /><span style="font-size:85%;">Following a trail of digital breadcrumbs, the researchers traced the attackers to China's Sichuan Province, though they noted it's hard to say conclusively that's where the individuals were located. Chinese government officials strongly denied the government was behind the attacks.</span><br /><br /><span style="font-size:85%;">Members of the Shadowserver Foundation said they have already reported Shadow Network operations to China's National Computer Network Emergency Response Technical Team and called on the Chinese government to shutter the spy network.</span><br /><br /><span style="font-size:85%;">The researchers' report, titled Shadows in the Cloud: An investigation Into Cyberespionage 2.0, is available here and there are additional details from The New York Times <a href="http://www.nytimes.com/2010/04/06/science/06cyber.html">here</a>.</span><br /><br /><br /><br /><a href="http://www.theregister.co.uk/2010/04/07/shadow_network_busted/"><span style="font-weight: bold; font-style: italic;font-size:100%;" >ReadFullStory>>>>>></span></a><br /><br /><br /><br /><br /><br /><br /></div>d`whohttp://www.blogger.com/profile/02210967167222299225noreply@blogger.com0tag:blogger.com,1999:blog-534811584163788368.post-24975287427079956372010-04-06T08:52:00.000-07:002010-04-06T08:57:22.479-07:00PDF security hole opens can of worms<span style="font-size:85%;"><br /></span><div style="text-align: justify;"><br /><span style="font-size:85%;">The security perils of <span style="font-weight: bold;">PDF</span> files have been further highlighted by new research illustrating how a manipulated file might be used to infect other PDF files on a system.</span><br /><br /><span style="font-size:85%;"><span style="font-weight: bold;">Jeremy Conway</span>, an application security researcher at <span style="font-weight: bold;">NitroSecurity</span>, said the attack scenario he has discovered shows PDFs are "<span style="font-weight: bold;">wormable</span>". <span style="font-weight: bold;">Computer viruses</span> are capable, by definition, of overwriting other files to spread. <span style="font-weight: bold;">Conway's research</span> is chiefly notable for illustrating how a benign PDF file might become infected using features supported by PDF specification, not a software vulnerability as such, and without the use of external binaries or JavaScript.</span><br /><br /><span style="font-size:85%;">The "<span style="font-weight: bold;">wormable PDF</span>" research comes days after another security researcher, <span style="font-weight: bold;">Didier Stevens</span>, showed how it was possible to both embed malicious executables in PDFs and manipulate pop-up dialog boxes to trick victims into running a malicious payload. Both <span style="font-weight: bold;">Adobe</span> and <span style="font-weight: bold;">FoxIT</span> are working on a fix against the security shortcomings in their respective PDF viewing packages illustrated by the research.</span><br /><br /><span style="font-size:85%;">Conway, who last week published an advisory and proof of concept video demo on wormable PDFs, said he was inspired to hunt for related vulnerabilities in the PDF specification by Stevens' research. A fix capable of blocking the security loophole discovered by Stevens ought to also prevent the possibility of 'worming' PDFs. </span><blockquote><span style="font-size:85%;">"If the vendors figure out a method to prevent Didier’s example this same fix will stop this proof of concept as well," Conway writes.</span></blockquote><br /><br /><span style="font-size:85%;">A follow-up blog post by Conway explains the implications of the security shortcomings of PDF files in greater depth.</span><br /><br /><span style="font-size:85%;"><blockquote>"I chose to infect the benign PDF with another, and launch a <span style="font-weight: bold;">hack</span> that redirected a user to my <span style="font-weight: bold;">website</span>, but this could have just as easily been an <span style="font-weight: bold;">exploit pack</span> and or <span style="font-weight: bold;">embedded Trojan binary</span>,"</blockquote> Conway explains. </span><blockquote><span style="font-size:85%;">"Worse yet this dynamic infection vector could be utilised to populate all PDFs for some new O-day attack, thereby multiplying an attackers infection vehicles while still exploiting user systems ('worm-able')."</span></blockquote><br /><br /><span style="font-size:85%;">An informative blog post by <span style="font-weight: bold;">Mikko Hypponen</span>, chief research officer at net security firm <span style="font-weight: bold;">F-Secure</span>, explains how all sorts of unexpected content is supported by the PDF specification.</span><br /><br /><span style="font-size:85%;"><span style="font-weight: bold;">Media files</span>, <span style="font-weight: bold;">JavaScript</span> and forms that upload data a user inputs to an external web server are all supported by the PDF specification in addition to <span style="font-weight: bold;">embedded executables</span>. These little-known features go a long way towards explaining both why PDF applications such as Adobe Reader takes ages to load and why the file format has become such a firm <span style="font-weight: bold;">favorite with hackers</span> over the last year or so, <span style="font-weight: bold;">Hypponen</span> notes.</span><br /><br /><br /><br /><a href="http://www.theregister.co.uk/2010/04/06/wormable_pdfs/"><span style="font-weight: bold; font-style: italic;font-size:100%;" >ReadFullStory>>>>>></span></a><br /><br /><br /><br /><br /><br /></div>d`whohttp://www.blogger.com/profile/02210967167222299225noreply@blogger.com0tag:blogger.com,1999:blog-534811584163788368.post-85201329704700036892010-04-06T07:45:00.000-07:002010-04-06T08:52:08.435-07:00China implicated in another major hacking attack<a onblur="try {parent.deselectBloggerImageGracefully();} catch(e) {}" href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiSpwNU9EeRFGNSXCsjKYs4YKnB_ZTO99D-ylmxwmqMSAY3a3cG0scQ_Q91VXS6ZhHyN3Nbja3m3lRs68OEHjpjdgQ0d96kykIbRzaarSwUlZFbNKJWkY7NwyqGCj4EBjcn-JckmFrvEk0/s1600/china.jpg"><img style="float: right; margin: 0pt 0pt 10px 10px; cursor: pointer; width: 185px; height: 110px;" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiSpwNU9EeRFGNSXCsjKYs4YKnB_ZTO99D-ylmxwmqMSAY3a3cG0scQ_Q91VXS6ZhHyN3Nbja3m3lRs68OEHjpjdgQ0d96kykIbRzaarSwUlZFbNKJWkY7NwyqGCj4EBjcn-JckmFrvEk0/s400/china.jpg" alt="" id="BLOGGER_PHOTO_ID_5457051008041607090" border="0" /></a><br /><span style="font-size:85%;">Security researchers in <span style="font-weight: bold;">Canada</span> have uncovered a new targeted malware network controlled by servers in <span style="font-weight: bold;">China</span> which has compromised computer systems in the <span style="font-weight: bold;">Office of the Dalai Lama</span>, <span style="font-weight: bold;">Indian government</span>, business and academic organisations and even the <span style="font-weight: bold;">United Nations</span>.</span><br /><div style="text-align: justify;"><br /><span style="font-size:85%;"><span style="font-weight: bold;">University of Toronto researcher Nart Villeneuve</span> highlighted the main findings of the new <span style="font-weight: bold;">Shadows in the Cloud report,</span> revealing a "complex and tiered command-and-control infrastructure".</span><br /><br /><span style="font-size:85%;"><blockquote>"The attackers misused a variety of services, including <span style="font-weight: bold;">Twitter</span>, <span style="font-weight: bold;">Google Groups,</span> <span style="font-weight: bold;">Blogspot</span>, <span style="font-weight: bold;">Baidu Blogs</span>, <span style="font-weight: bold;">blog.com</span> and <span style="font-weight: bold;">Yahoo Mail</span>, in order to maintain persistent control over the compromised computers,"</blockquote> he said in a blog post yesterday.</span><br /><br /><span style="font-size:85%;"></span><blockquote><span style="font-size:85%;">"This top layer directed compromised computers to accounts on free web hosting services, and as the free hosting servers were disabled, to a stable core of command-and-control servers located in China."</span></blockquote><br /><br /><span style="font-size:85%;">Any concrete link with the Chinese authorities is unproven, but the report has managed to link the network with two individuals living in <span style="font-weight: bold;">Chengdu</span> and to the underground hacking community in China.</span><br /><br /><span style="font-size:85%;">The report, which was compiled by <span style="font-weight: bold;">Shadowserver Foundation</span> and the <span style="font-weight: bold;">Information Warfare Monitor</span>, also claimed that the network had been involved in stealing countless documents marked '<span style="font-weight: bold;">secret</span>' or 'confidential', and that over 1,500 letters sent from the Dalai Lama's office last year had been compromised.</span><br /><br /><span style="font-size:85%;"></span><blockquote><span style="font-size:85%;">"The nature of the data stolen by the attackers does indicate correlations with the strategic interests of the Chinese state. But we were unable to determine any direct connection between these attackers and elements of the Chinese state," wrote Villeneuve.</span></blockquote><br /><br /><span style="font-size:85%;"></span><blockquote><span style="font-size:85%;">"However, it would not be implausible to suggest that the stolen data may have ended up in the possession of some entity of the Chinese government."</span></blockquote><br /><br /><span style="font-size:85%;">The new attack network bears several similarities to the <span style="font-weight: bold;">GhostNet system</span> uncovered by the same team of researchers about a year ago which heavily implicated China in cyber snooping activities.</span><br /><br /><span style="font-size:85%;">The Chinese government is reported to have issued a stock denial of any such activities, claiming that they had been "stirred up" to cause trouble.</span><br /><br /><span style="font-size:85%;"></span><blockquote><span style="font-size:85%;">"We resolutely oppose all forms of cyber crime including hacking," China foreign ministry spokeswoman Jiang Yu is reported to have told a press conference.</span></blockquote><br /><br /><br /><br /><a href="http://www.v3.co.uk/v3/news/2260858/china-implicated-massive"><span style="font-weight: bold; font-style: italic;font-size:100%;" >ReadFullStory>>>>>></span></a><br /><br /><br /><br /><br /><br /></div>d`whohttp://www.blogger.com/profile/02210967167222299225noreply@blogger.com0tag:blogger.com,1999:blog-534811584163788368.post-757140819312366822010-04-06T02:04:00.000-07:002010-04-06T02:08:08.202-07:00iPhone 4.0 to be introduced this week<span style="font-size:85%;"><br /></span><div style="text-align: justify;"><a onblur="try {parent.deselectBloggerImageGracefully();} catch(e) {}" href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjz95QKd8y1BAtgD-WPRsAQ8_k0nJoT59W85DQ2_kfUWqb23C61RLyIs9vVSEaGFlXG1NGlYzPQbYEBctOsPjF1c5LKDo7eOkFw6X9JIVeNetu4hoZPyTZr8sUkEjQ5OlpNQUbmamiSvtU/s1600/IPHONE.jpg"><img style="float: right; margin: 0pt 0pt 10px 10px; cursor: pointer; width: 186px; height: 110px;" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjz95QKd8y1BAtgD-WPRsAQ8_k0nJoT59W85DQ2_kfUWqb23C61RLyIs9vVSEaGFlXG1NGlYzPQbYEBctOsPjF1c5LKDo7eOkFw6X9JIVeNetu4hoZPyTZr8sUkEjQ5OlpNQUbmamiSvtU/s400/IPHONE.jpg" alt="" id="BLOGGER_PHOTO_ID_5456948424698878306" border="0" /></a><br /><span style="font-size:85%;"><span style="font-weight: bold;">Apple</span> is reportedly planning to outline the features for its next iPhone OS build this week.</span><br /><br /><span style="font-size:85%;">The company has begun informing media outlets that it will be holding a special event on its campus <span style="font-weight: bold;">Thursday 8 April</span> to introduce the <span style="font-weight: bold;">iPhone 4.0 firmware.</span></span><br /><br /><span style="font-size:85%;">Little information was given about the new <span style="font-weight: bold;">OS</span> or what features it will introduce, but early <span style="font-weight: bold;">rumours</span> have suggested that the update could allow <span style="font-weight: bold;">multi-tasking</span>, a feature which would allow more than one application to run on the handset.</span><br /><br /><span style="font-size:85%;">While the iPhone hardware is capable of multi-tasking, the feature is currently only accessible through '<span style="font-weight: bold;">jailbreaking</span>,' a process of removing security protections that Apple has repeatedly advised against. Such modified handsets commonly have trouble with firmware updates.</span><br /><br /><span style="font-size:85%;">The late winter to early spring period is commonly when Apple prefers to unveil its hardware and software updates for the iPhone, The new products are then released to the public later in the summer.</span><br /><br /><span style="font-size:85%;">The news comes just days after the company delivered what many consider to be the biggest product release since the original iPhone. Apple said that in its first day of availability, the new iPad tablet delivered some 300,000 units.</span><br /><br /><br /><br /><a href="http://www.v3.co.uk/v3/news/2260813/iphone-introduced"><span style="font-weight: bold; font-style: italic;font-size:100%;" >ReadFullStory>>>>>></span></a><br /><br /><br /><br /><br /><br /></div>d`whohttp://www.blogger.com/profile/02210967167222299225noreply@blogger.com0tag:blogger.com,1999:blog-534811584163788368.post-84762240048164698662010-04-06T01:45:00.000-07:002010-04-06T01:52:22.563-07:00iPad jailbroken in less than a day<div style="text-align: justify;"><a onblur="try {parent.deselectBloggerImageGracefully();} catch(e) {}" href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhYJHMefqGgbybDSToGnnzVEgrdWjwv9N-zCDZpSagMNHcv5uSTSwBj9c5OE1XmkC-qKgNgChxL2NhLG7Nm7yuRVP-1HWNiI3bYPlXic3inmLqIRHFXsU0JHUaeq9yj4uvr0ZpqnUS6fFU/s1600/ipad.jpg"><img style="float: right; margin: 0pt 0pt 10px 10px; cursor: pointer; width: 185px; height: 110px;" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhYJHMefqGgbybDSToGnnzVEgrdWjwv9N-zCDZpSagMNHcv5uSTSwBj9c5OE1XmkC-qKgNgChxL2NhLG7Nm7yuRVP-1HWNiI3bYPlXic3inmLqIRHFXsU0JHUaeq9yj4uvr0ZpqnUS6fFU/s400/ipad.jpg" alt="" id="BLOGGER_PHOTO_ID_5456944562225467938" border="0" /></a><br /><span style="font-size:85%;">Apple's <span style="font-weight: bold;">iPad</span> is selling well but hackers have been busy and the iPad has already been jailbroken, according to postings online.</span><br /><br /><span style="font-size:85%;">Yesterday <span style="font-weight: bold;">Twitter</span> user <span style="font-weight: bold;">MuscleNerd</span> posted a video and picture of what appears to be a jailbroken iPad, credited to hacker Comex. Comex is a member of the <span style="font-weight: bold;">iPhone</span> Dev team, who have also said that a jailbreak is possible but have yet to release it.</span><br /><br /><span style="font-size:85%;">Both attacks appear to depend on the use of a variant of the Spirit application that is used to crack iPhones.</span><br /><br /><span style="font-size:85%;">Apple is playing a continuing game of cat and mouse with those who seek to use their own software on the devices. In the past updates have rendered devices useless and it bans some users from its App Store.</span><br /><br /><br /><br /><span style="font-size:85%;"><a href="http://www.v3.co.uk/v3/news/2260812/ipad-jailbroken-less-day"><span style="font-weight: bold; font-style: italic;font-size:100%;" >ReadFullStory>>>>>></span></a></span><br /><br /><br /><br /><br /><br /></div>d`whohttp://www.blogger.com/profile/02210967167222299225noreply@blogger.com0tag:blogger.com,1999:blog-534811584163788368.post-2243204353564063792010-04-05T10:00:00.000-07:002010-04-05T10:07:34.882-07:00Microsoft cuts 'Series' lump from Windows Phone 7<span style="font-size:85%;"><br /></span><div style="text-align: justify;"><br /><span style="font-size:85%;">It's just two months old, but <span style="font-weight: bold;">Microsoft</span> has already renamed its next <span style="font-weight: bold;">operating system</span> for <span style="font-weight: bold;">Windows phones</span>.</span><br /><br /><span style="font-size:85%;">Microsoft's dropped the "<span style="font-weight: bold;">Series</span>" from the <span style="font-weight: bold;">Windows Phone 7 Series</span> - now the software will simply be called <span style="font-weight: bold;">Windows Phone 7</span>, according to a Microsoft team Tweet, below.</span><br /><a onblur="try {parent.deselectBloggerImageGracefully();} catch(e) {}" href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgVRQX_FzEthvEObUVy7YIDqLReMvieitVn9KJbditUk0JtoBCS4lNy13n9cHQ9B-x38pfijHrOYYtdo1_dcOaHahZYOvApA0XqFUdZiHyfHOoTUSGHjpdbLDWxC9UcNwfz6TgOs2fDaYI/s1600/windows_phone_tweet.jpg"><img style="float: right; margin: 0pt 0pt 10px 10px; cursor: pointer; width: 400px; height: 271px;" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgVRQX_FzEthvEObUVy7YIDqLReMvieitVn9KJbditUk0JtoBCS4lNy13n9cHQ9B-x38pfijHrOYYtdo1_dcOaHahZYOvApA0XqFUdZiHyfHOoTUSGHjpdbLDWxC9UcNwfz6TgOs2fDaYI/s400/windows_phone_tweet.jpg" alt="" id="BLOGGER_PHOTO_ID_5456700489783011842" border="0" /></a><br /><span style="font-size:85%;">The <span style="font-weight: bold;">Tweet</span> gave no explanation why Microsoft is dumping the clumsy appendage, but David Webster, chief strategy officer in the company's central marketing group, did try to explain to <span style="font-weight: bold;">TechFlash</span> the thinking for inserting "Series" into an otherwise perfectly acceptable name in the first place.</span><br /><br /><span style="font-size:85%;"><span style="font-weight: bold;"> Windows Phone</span> is an <span style="font-weight: bold;">OS</span>, it's not a phone. The idea was that we needed a handle to refer to the devices that ran Windows Phone 7 - the family, in essence. Now, in a lot of the coverage and a lot of the usage cases, that context, I think, got lost. People got to thinking that the software was <span style="font-weight: bold;">Windows Phone 7 Series</span>, when really that was just an effort to refer to the devices that would be running Windows Phone 7.</span><br /><br /><span style="font-size:85%;">No doubt the word "Series" made sense in some meeting of marketing drones who justify their existence on the value attached to the position of a comma in a sentence, or how people "<span style="font-weight: bold;">connect</span>" with a brand.</span><br /><br /><span style="font-size:85%;">That's the kind of thinking at Microsoft that has, over the years, given us <span style="font-weight: bold;">MSN</span> versus <span style="font-weight: bold;">Windows Live</span>, and <span style="font-weight: bold;">.NET</span> on everything then .NET on just some things.</span><br /><br /><span style="font-size:85%;">Here's to you Microsoft: keep sweating the message. </span><br /><br /><br /><br /><a href="http://www.theregister.co.uk/2010/04/02/windows_7_series_change/"><span style="font-weight: bold; font-style: italic;font-size:100%;" >ReadFullStory>>>>>></span></a><br /><br /><br /><br /><br /><br /></div>d`whohttp://www.blogger.com/profile/02210967167222299225noreply@blogger.com0tag:blogger.com,1999:blog-534811584163788368.post-21936084403911809762010-04-05T09:49:00.000-07:002010-04-05T10:00:00.760-07:00New Gmail launches for the iPad<a onblur="try {parent.deselectBloggerImageGracefully();} catch(e) {}" href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEii_rVVcf6B171jDWBivJ21gJPIpcNHLJTeomNPqsoR9QksjbsbMATHXJ7gq6NNags4QowEvqX61LZ0twTQYvnj_0pF-az8SijLfLvmePNMaAwHopleqEo9YTg0BONGAcu_Fdc-4ZnPFo8/s1600/ipad.jpg"><img style="float: right; margin: 0pt 0pt 10px 10px; cursor: pointer; width: 252px; height: 149px;" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEii_rVVcf6B171jDWBivJ21gJPIpcNHLJTeomNPqsoR9QksjbsbMATHXJ7gq6NNags4QowEvqX61LZ0twTQYvnj_0pF-az8SijLfLvmePNMaAwHopleqEo9YTg0BONGAcu_Fdc-4ZnPFo8/s400/ipad.jpg" alt="" id="BLOGGER_PHOTO_ID_5456698697294448274" border="0" /></a><br /><span style="font-size:85%;"><br /><span style="font-weight: bold;">Google</span> has announced an enhanced version of its popular email client <span style="font-weight: bold;">Gmail</span> designed for the <span style="font-weight: bold;">iPad</span>.</span><br /><span style="font-size:85%;"><br />In a blog posting, engineering manager <span style="font-weight: bold;">Alex Nicolaou</span> argued that Google’s work to optimise Gmail for touchscreen devices began when the first <span style="font-weight: bold;">iPhones</span> and <span style="font-weight: bold;">Android</span> handsets came onto the market.<br /></span><div style="text-align: justify;" class="content"><p><span style="font-size:85%;">He explained that this new version would take advantage of the iPad’s large touchscreen and tablet form factor to include “<span style="font-weight: bold;">an experimental two-pane user interface</span>”.</span></p><p><span style="font-size:85%;">The new interface will feature a user’s conversations down the left hand side and messages in the right column, he added.</span></p><p><span style="font-size:85%;">“All the features of the Gmail web app that you're used to, such as offline access and aggressive caching to reduce latency, are present in the iPad version,” Nicolaou explained.</span></p><p><span style="font-size:85%;">“Tablet devices are still very new, so expect changes as we continue to optimise for this new format.”</span></p></div><div> </div><div style="text-align: justify;" class="content"><p><span style="font-size:85%;">The iPad was finally launched to great fanfare in the <span style="font-weight: bold;">US</span> on Saturday, with a <span style="font-weight: bold;">UK</span> release date expected by the end of the month.</span></p><p><span style="font-size:85%;">Although it is being marketed, as the iPhone was originally, as primarily a consumer device, its enterprise credentials have been given a boost by the launch of a couple of new Citrix apps.</span></p><p><span style="font-size:85%;">The latest research seems to indicate <span style="font-weight: bold;">Apple</span> could be on to yet another winner after its success with the iPhone. A new survey from price comparison site <span style="font-weight: bold;">Kelkoo UK</span> last week found that <span style="font-weight: bold;">40 per cent </span>of consumers are ready to ditch their laptops for a tablet <span style="font-weight: bold;">PC</span> like the iPad.</span></p><p><br /></p><p><br /></p><p><br /></p><p><span style="font-size:85%;"><a href="http://www.v3.co.uk/v3/news/2260803/gmail-launches-ipad"><span style="font-style: italic;font-size:100%;" ><span style="font-weight: bold;">ReadFullStory>>>>>></span></span></a><br /></span></p><p><br /></p><p><br /></p><p><br /></p><p><br /></p><p><br /></p></div>d`whohttp://www.blogger.com/profile/02210967167222299225noreply@blogger.com0tag:blogger.com,1999:blog-534811584163788368.post-4015093558780294202010-04-04T08:53:00.000-07:002010-04-04T09:00:45.173-07:00A week in security: Apple and Microsoft patch numerous flaws<a onblur="try {parent.deselectBloggerImageGracefully();} catch(e) {}" href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgxgil9QKQuSyyLDrOT1hMGMPkcxbkAJ2TZguieVLY4x_W8opxd7k-MywcMBzLZFVCnTszTS-yKqNExaCQEmOBZN9cYKunHcVuzMQ0kbWrWCldxEh0LOS1JaQtrpTwc3sHoewnj2N702NY/s1600/medium.jpg"><img style="float: right; margin: 0pt 0pt 10px 10px; cursor: pointer; width: 279px; height: 189px;" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgxgil9QKQuSyyLDrOT1hMGMPkcxbkAJ2TZguieVLY4x_W8opxd7k-MywcMBzLZFVCnTszTS-yKqNExaCQEmOBZN9cYKunHcVuzMQ0kbWrWCldxEh0LOS1JaQtrpTwc3sHoewnj2N702NY/s400/medium.jpg" alt="" id="BLOGGER_PHOTO_ID_5456312311988268274" border="0" /></a><br /><div style="text-align: justify;"><span style="font-weight: bold;font-size:85%;" >A week in security: Apple and Microsoft patch numerous flaws</span><br /><br /><span style="font-size:85%;">It was a busy week this week for both <span style="font-weight: bold;">Apple</span> and <span style="font-weight: bold;">Microsoft</span>, after the two tech giants were forced to patch critical flaws in their products, while Google’s spat with <span style="font-weight: bold;">China</span> continued and social networks were found wanting once again.</span><br /><br /><span style="font-size:85%;">First, <span style="font-weight: bold;">Microsoft’s Internet Explorer</span> product was found wanting again, with the firm forced to issue an out-of-cycle patch for<span style="font-weight: bold;"> IE6</span> and <span style="font-weight: bold;">IE7</span>, the second time this year Redmond has had to release a patch outside its regular schedule.</span><br /><br /><span style="font-size:85%;"><blockquote>"The out-of-band security bulletin is a cumulative security update for IE and will also contain fixes for privately reported vulnerabilities rated 'critical' on all versions of IE that are not related to this attack,"</blockquote> said the company.</span><br /><br /><span style="font-size:85%;">On the same day, Apple issued major security updates for <span style="font-weight: bold;">Mac OS 10.5 (Leopard)</span> and <span style="font-weight: bold;">Mac OS 10.6 (Snow Leopard)</span>, as well as additional performance and stability updates for Snow Leopard. The security update includes 69 fixes for various components in <span style="font-weight: bold;">Leopard</span> and <span style="font-weight: bold;">Snow Leopard</span>, including nine vulnerabilities in <span style="font-weight: bold;">QuickTime</span> and four in the <span style="font-weight: bold;">ImageIO</span> component.</span><br /><br /><span style="font-size:85%;">There was more trouble for <span style="font-weight: bold;">Google</span> this week as the tit for tat battle between the web giant and the Chinese government continued.</span><br /><br /><span style="font-size:85%;">It emerged early in the week that some of Google’s mobile services were being blocked by China, while a senior Google security researcher argued that the attacks it suffered in January originating in the region represented a much wider threat to the internet.<br /><br /><br /><br /><a href="http://www.v3.co.uk/v3/news/2260793/security-apple-ie-patch"><span style="font-weight: bold; font-style: italic;font-size:100%;" >ReadFullStory>>>>>></span></a><br /><br /><br /><br /><br /><br /></span></div>d`whohttp://www.blogger.com/profile/02210967167222299225noreply@blogger.com0tag:blogger.com,1999:blog-534811584163788368.post-79477273954597661402010-03-28T06:57:00.000-07:002010-03-28T07:13:12.811-07:00Download Free Need For Speed 4 - High Stakes<a onblur="try {parent.deselectBloggerImageGracefully();} catch(e) {}" href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhnsRxr-HiMgBPWkfsIXgi2HTCIDRBY3vqGAArPIWP019s51SMmU1z8T4WiGnMC7hBPTZUG2VgCiIIjubHhwmq-ErSf16fUBSy2HENExIlTfhwps3L2cmdtDCDlNqN0cX4qZ3RdzIdtQOg/s1600/Need+For+Speed+4-+High+Stakes.jpg"><img style="float:right; margin:0 0 10px 10px;cursor:pointer; cursor:hand;width: 314px; height: 320px;" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhnsRxr-HiMgBPWkfsIXgi2HTCIDRBY3vqGAArPIWP019s51SMmU1z8T4WiGnMC7hBPTZUG2VgCiIIjubHhwmq-ErSf16fUBSy2HENExIlTfhwps3L2cmdtDCDlNqN0cX4qZ3RdzIdtQOg/s320/Need+For+Speed+4-+High+Stakes.jpg" border="0" alt="" id="BLOGGER_PHOTO_ID_5453687331650536610" /></a><br /><div style="text-align: justify; "><span class="Apple-style-span" style="font-size:small;"><b>Download Free Need For Speed 4 - High Stakes</b></span></div><div style="text-align: justify; "><span class="Apple-style-span" style="font-size:small;"><br /></span></div><div style="text-align: justify; "><span class="Apple-style-span" style="font-size:small;"><br /></span></div><div style="text-align: justify; "><span class="Apple-style-span" style="font-size:small;"><b>Need for Speed</b>: <b>High Stakes</b> (also known as<b>Need For Speed: Road Challenge in Europe and Brazil</b>) is a 1999 racing video game, developed by Ele<b>ctronic Arts Canada</b> and published by <b>Electronic Arts</b>. It is part of the Need for Speed series, once again featuring a host of exotic sport cars and tracks located in Western Europe and North America.</span></div><div style="text-align: justify; "><span class="Apple-style-span" style="font-size:small;"><br /></span></div><div style="text-align: justify; "><span class="Apple-style-span" style="font-size:small;"><b>Career Mode</b> has a chronological set of tournaments that challenges the player to complete a set of 8-car <b>races</b> for <b>trophies</b> to unlock bonus cars and tracks, incorporating a monetary reward system that allows a player to purchase vehicles, performance upgrades as well as repairs while earning cash by racing. In addition, each cup tournament requires that the player compete against one opponent in a "<b>High Stakes</b>" race (only in the PC version, and only after the first tournament). There are more tournaments on the PC version, and they are different from the console one - for example, the <b>PS version</b> separates the Career into two separate modes, <b>Tournament and Special Event</b>.</span></div><div style="text-align: justify; "><span class="Apple-style-span" style="font-size:small;"><br /></span></div><div style="text-align: justify; "><span class="Apple-style-span" style="font-size:small;"><b>High Stakes Mode</b></span></div><div style="text-align: justify; "><span class="Apple-style-span" style="font-size:small;">High Stakes race is a challenge, wherein the winner of the race will obtain the loser's car, while the loser obviously loses his car. On Playstation it is a separate 2-Player mode, which required 2 memory cards inserted and deleted the loser's car immediately after the race to prevent re-loading.</span></div><div style="text-align: justify; "><span class="Apple-style-span" style="font-size:small;">Hot Pursuit Mode,Classic,Getaway,Time racing.</span></div><div style="text-align: justify; "><span class="Apple-style-span" style="font-size:small;"><br /></span></div><div style="text-align: justify; "><span class="Apple-style-span" style="font-size:small;"><br /></span></div><div style="text-align: justify; "><span class="Apple-style-span" style="font-size:small;"><br /></span></div><div style="text-align: justify; "><span class="Apple-style-span" style="font-size:small;"><br /></span></div><div style="text-align: center;"><span class="Apple-style-span" style="font-size:medium;"><a href="http://downloadhubs.blogspot.com/2010/03/download-free-need-for-speed-4-high.html">Click Here To </a></span><b><span class="Apple-style-span" style="font-size:medium;"><a href="http://downloadhubs.blogspot.com/2010/03/download-free-need-for-speed-4-high.html">DOWNLOAD</a></span></b></div><div style="text-align: center;"><b><br /></b></div><div style="text-align: center;"><b><br /></b></div><div style="text-align: center;"><b><br /></b></div><div style="text-align: center;"><b><br /></b></div><div style="text-align: center;"><b><br /></b></div>d`whohttp://www.blogger.com/profile/02210967167222299225noreply@blogger.com0tag:blogger.com,1999:blog-534811584163788368.post-48449971091635751262010-03-28T06:46:00.000-07:002010-03-28T06:57:26.901-07:00Download Free Sony Sound Forge Pro 10.0 + Keygen<a onblur="try {parent.deselectBloggerImageGracefully();} catch(e) {}" href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEizMtjtcou-K28pk_WwnOcC1PU7ELIW2edrF1ykyFtbvzzQQtS7rLxrManAAqRjwYrcAaBWoM1j4EIJIoeEfOHg2U255ad5lWzMACOC90Ljk1wdoFv2VF4fB84a0wVL9jS4_XTm2ObKe3A/s1600/Sony+Sound+Forge+Pro+10.0.jpg"><img style="float:right; margin:0 0 10px 10px;cursor:pointer; cursor:hand;width: 308px; height: 320px;" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEizMtjtcou-K28pk_WwnOcC1PU7ELIW2edrF1ykyFtbvzzQQtS7rLxrManAAqRjwYrcAaBWoM1j4EIJIoeEfOHg2U255ad5lWzMACOC90Ljk1wdoFv2VF4fB84a0wVL9jS4_XTm2ObKe3A/s320/Sony+Sound+Forge+Pro+10.0.jpg" border="0" alt="" id="BLOGGER_PHOTO_ID_5453683187014697090" /></a><br /><div style="text-align: justify; "><span class="Apple-style-span" style="font-size:small;"><b>Download Free Sony Sound Forge Pro 10.0 + Keygen</b></span></div><div style="text-align: justify; "><span class="Apple-style-span" style="font-size:small;"><br /></span></div><div><div style="text-align: justify; "><span class="Apple-style-span" style="font-size:small;"><b>Sony Sound Forge Pro</b> <b>software</b> efficiently and reliably provides audio editors and producers complete control over all aspects of audio editing and mastering. Whether in the studio or field, it's the ultimate <b>all-in-one</b> production suite for professional audio recording and mastering, sound design, audio restoration, and <b>Red Book CD creation</b>. New features in Sound Forge Pro 10 include precise event-based editing, integrated disc-at-once <b>CD burning</b>, musical instrument file processing, and pristine audio conversion and time stretching.</span></div><div style="text-align: justify; "><span class="Apple-style-span" style="font-size:small;"><br /></span></div><div style="text-align: justify; "><span class="Apple-style-span" style="font-size:small;"><br /></span></div><div style="text-align: justify; "><span class="Apple-style-span" style="font-size:small;">Basic guidelines for anyone having issues:</span></div><div style="text-align: justify; "><span class="Apple-style-span" style="font-size:small;"><br /></span></div><div style="text-align: justify; "><span class="Apple-style-span" style="font-size:small;">1. <b>Download and Install Sound Forge</b>.</span></div><div style="text-align: justify; "><span class="Apple-style-span" style="font-size:small;">2. Open the <b>key gen</b> and make sure to "Run as Administrator" otherwise patching fails.</span></div><div style="text-align: justify; "><span class="Apple-style-span" style="font-size:small;">3. Select Sound Forge 10 from the list and click on the patch button</span></div><div style="text-align: justify; "><span class="Apple-style-span" style="font-size:small;">4. Locate the directory where you installed Sound Forge, probable in /program file(x86)/<b>sony</b>/<b>sound forge 10</b>/</span></div><div style="text-align: justify; "><span class="Apple-style-span" style="font-size:small;">5. Patch it.</span></div><div style="text-align: justify; "><span class="Apple-style-span" style="font-size:small;">6. Click generate button and copy the serial number.</span></div><div style="text-align: justify; "><span class="Apple-style-span" style="font-size:small;">7. Run Sound Forge for the first time, it will ask for serial, paste it in.</span></div><div style="text-align: justify; "><span class="Apple-style-span" style="font-size:small;">8. Click next until you see 'register from another computer', select that option, then save the htm file somewhere, click next until it asks for 'activation code'</span></div><div style="text-align: justify; "><span class="Apple-style-span" style="font-size:small;">9. Copy the activation code that was generated along with your serial number. Copy and paste.</span></div><div style="text-align: justify; "><span class="Apple-style-span" style="font-size:small;">10.Click Finish and it should work! Well it did for me at least, finally Good luck!</span></div><div style="text-align: justify; "><span class="Apple-style-span" style="font-size:small;"><br /></span></div><div style="text-align: justify; "><span class="Apple-style-span" style="font-size:small;"><br /></span></div><div style="text-align: justify; "><span class="Apple-style-span" style="font-size:small;"><br /></span></div><div style="text-align: justify; "><span class="Apple-style-span" style="font-size:small;"><br /></span></div><div style="text-align: center; "><span class="Apple-style-span" style="font-size: medium;"><a href="http://downloadhubs.blogspot.com/2010/03/download-free-sony-sound-forge-pro-100.html">Click Here To</a></span><b><span class="Apple-style-span" style="font-size: medium;"><a href="http://downloadhubs.blogspot.com/2010/03/download-free-sony-sound-forge-pro-100.html"> Download</a></span></b></div><div style="text-align: center; "><b><span class="Apple-style-span" style="font-size: medium;"><br /></span></b></div><div style="text-align: center; "><b><span class="Apple-style-span" style="font-size: medium;"><br /></span></b></div><div style="text-align: center; "><b><span class="Apple-style-span" style="font-size: medium;"><br /></span></b></div><div style="text-align: center; "><b><span class="Apple-style-span" style="font-size: medium;"><br /></span></b></div><div style="text-align: center; "><b><span class="Apple-style-span" style="font-size: medium;"><br /></span></b></div></div>d`whohttp://www.blogger.com/profile/02210967167222299225noreply@blogger.com0tag:blogger.com,1999:blog-534811584163788368.post-88407450433754297312010-03-27T09:01:00.000-07:002010-03-27T09:10:23.574-07:00Download Free Ashampoo ClipFisher 1.21<a onblur="try {parent.deselectBloggerImageGracefully();} catch(e) {}" href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEieGblCZcCVO1W0-JeF3a1wTl9YqKnJcCmc13f1GgUwScFX0QD05sCIji-yl8sAtS2sDZVon-R7InNEMxrDDWEgIUAcJtErA2ZPKt4_dVtEi8v96kYpt5g5AWODzslCEkREQArrRNndl-U/s1600/Ashampoo+Clipfisher.jpg"><img style="float:right; margin:0 0 10px 10px;cursor:pointer; cursor:hand;width: 320px; height: 274px;" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEieGblCZcCVO1W0-JeF3a1wTl9YqKnJcCmc13f1GgUwScFX0QD05sCIji-yl8sAtS2sDZVon-R7InNEMxrDDWEgIUAcJtErA2ZPKt4_dVtEi8v96kYpt5g5AWODzslCEkREQArrRNndl-U/s320/Ashampoo+Clipfisher.jpg" border="0" alt="" id="BLOGGER_PHOTO_ID_5453346613827277282" /></a><br /><div style="text-align: justify; "><b><span class="Apple-style-span" style="font-size:small;">Download Free Ashampoo ClipFisher 1.21</span></b></div><div style="text-align: justify; "><span class="Apple-style-span" style="font-size:small;"><br /></span></div><div style="text-align: justify; "><span class="Apple-style-span" style="font-size:small;"><br /></span></div><div style="text-align: justify; "><b><span class="Apple-style-span" style="font-size:small;">Download, Edit, Play and Convert Videos from YouTube, MyVideo, GoogleVideo, Metacafe, sevenload, MySpace, VideU and ClipFish</span></b><span class="Apple-style-span" style="font-size:small;">!</span></div><div style="text-align: justify; "><span class="Apple-style-span" style="font-size:small;"><br /></span></div><div style="text-align: justify; "><span class="Apple-style-span" style="font-size:small;">Thousands of videos have been made available via applicable online portals such as </span><b><span class="Apple-style-span" style="font-size:small;">YouTube, VideU, MyVideo, ClipFish and GoogleVideo</span></b><span class="Apple-style-span" style="font-size:small;">. They offer amusing fun videos, film trailers, snippets of cult movies and serious documentations. However, on the Net there is frequently a view-only policy – download not possible.</span></div><div style="text-align: justify; "><span class="Apple-style-span" style="font-size:small;"><br /></span></div><div style="text-align: justify; "><span class="Apple-style-span" style="font-size:small;">This has now been changed by the Ashampoo ClipFisher. All you need to do is to copy a video’s current http:// address from the web browser and paste it into </span><b><span class="Apple-style-span" style="font-size:small;">Ashampoo</span></b><span class="Apple-style-span" style="font-size:small;"> ClipFisher: immediately, the cunning tool will be flexing its download muscles and starting to transfer the film to your hard drive. In this way, compiling your own little (or big, for that matter) video library is no problem at all.</span></div><div style="text-align: justify; "><span class="Apple-style-span" style="font-size:small;"><br /></span></div><div style="text-align: justify; "><span class="Apple-style-span" style="font-size:small;"><br /></span></div><div style="text-align: justify; "><span class="Apple-style-span" style="font-size:small;"><br /></span></div><div style="text-align: justify; "><b><span class="Apple-style-span" style="font-size:small;">Highlights:</span></b></div><div style="text-align: justify; "><b><span class="Apple-style-span" style="font-size:small;"><br /></span></b></div><div style="text-align: justify; "><span class="Apple-style-span" style="font-size:small;">Transfers videos from <b>YouTube, MyVideo, ClipFish, Metacafe, sevenload, VideU, MySpace and GoogleVideo</b></span></div><div style="text-align: justify; "><span class="Apple-style-span" style="font-size:small;">Saves online videos in Flash format (<b>FLV</b>)</span></div><div style="text-align: justify; "><span class="Apple-style-span" style="font-size:small;"><b>Converts films to WMV format</b></span></div><div style="text-align: justify; "><span class="Apple-style-span" style="font-size:small;">Breaks down excessive-sized videos by splitting them into smaller units</span></div><div style="text-align: justify; "><span class="Apple-style-span" style="font-size:small;">Adjusts the videos’ size and quality to your individual requirements</span></div><div style="text-align: justify; "><span class="Apple-style-span" style="font-size:small;">Auto-aspect ratio maintains the correct proportions</span></div><div style="text-align: justify; "><span class="Apple-style-span" style="font-size:small;">All settings may be fine-tuned manually</span></div><div style="text-align: justify; "><span class="Apple-style-span" style="font-size:small;">Integrated player plays all videos straight away</span></div><div style="text-align: justify; "><span class="Apple-style-span" style="font-size:small;"><br /></span></div><div style="text-align: justify; "><span class="Apple-style-span" style="font-size:small;"><br /></span></div><div style="text-align: justify; "><span class="Apple-style-span" style="font-size:small;"><br /></span></div><div style="text-align: justify; "><span class="Apple-style-span" style="font-size:small;"><br /></span></div><div style="text-align: center; "><span class="Apple-style-span" style="font-size:medium;"><a href="http://downloadhubs.blogspot.com/2010/03/download-free-ashampoo-clipfisher-121.html">Click Here To</a><b><a href="http://downloadhubs.blogspot.com/2010/03/download-free-ashampoo-clipfisher-121.html"> DOWNLOAD</a></b></span></div><div style="text-align: center; "><span class="Apple-style-span" style="font-size:medium;"><br /></span></div><div style="text-align: center; "><span class="Apple-style-span" style="font-size:medium;"><br /></span></div><div style="text-align: center; "><span class="Apple-style-span" style="font-size:medium;"><br /></span></div><div style="text-align: center; "><span class="Apple-style-span" style="font-size:medium;"><br /></span></div><div style="text-align: center; "><span class="Apple-style-span" style="font-size:medium;"><br /></span></div>d`whohttp://www.blogger.com/profile/02210967167222299225noreply@blogger.com0tag:blogger.com,1999:blog-534811584163788368.post-27823384572719457562010-03-27T08:25:00.000-07:002010-03-27T08:55:42.256-07:00Download Free Modeling Autodesk 3ds Max 2010<a onblur="try {parent.deselectBloggerImageGracefully();} catch(e) {}" href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjLdUJDwyi2Yx-BgxosFpnDR3Ar8erkfqwVPgCy6J_Y9BnmnxB0ZLpOLyrSWhCM36RNfMrKPvATh-yhFeTalPClCQJULkRfC534idfkWvTz4VE3O8CSLg3Cq-qdN8Fl9AWahDkk-giTefg/s1600/3ds-max-2010.jpg"><img style="float:right; margin:0 0 10px 10px;cursor:pointer; cursor:hand;width: 190px; height: 320px;" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjLdUJDwyi2Yx-BgxosFpnDR3Ar8erkfqwVPgCy6J_Y9BnmnxB0ZLpOLyrSWhCM36RNfMrKPvATh-yhFeTalPClCQJULkRfC534idfkWvTz4VE3O8CSLg3Cq-qdN8Fl9AWahDkk-giTefg/s320/3ds-max-2010.jpg" border="0" alt="" id="BLOGGER_PHOTO_ID_5453342308487801986" /></a><br /><div style="text-align: justify; "><span class="Apple-style-span" style="font-size:small;"><b>Download Free Modeling Autodesk 3ds Max 2010</b></span></div><div style="text-align: justify; "><span class="Apple-style-span" style="font-size:small;"><br /></span></div><div style="text-align: justify; "><span class="Apple-style-span" style="font-size:small;"><br /></span></div><div><div style="text-align: justify; "><span class="Apple-style-span" style="font-size:small;">The world's most widely used professional <b>3D modeling software</b>.</span></div><div style="text-align: justify; "><span class="Apple-style-span" style="font-size:small;"><br /></span></div><div style="text-align: justify; "><span class="Apple-style-span" style="font-size:small;">Create rich and complex design visualization. Generate realistic characters for a top-selling game. Bring 3D effects to the big screen.</span></div><div style="text-align: justify; "><span class="Apple-style-span" style="font-size:small;"><br /></span></div><div style="text-align: justify; "><span class="Apple-style-span" style="font-size:small;"><b>Autodesk 3ds Max supports 3D modeling, animation, and rendering software helps design visualization professionals, game developers, and visual effects artists maximize their productivity by streamlining the process of working with complex scenes.</b></span></div><div style="text-align: justify; "><span class="Apple-style-span" style="font-size:small;"><br /></span></div><div style="text-align: justify; "><span class="Apple-style-span" style="font-size:small;"><b>Viewing and Handling of Large, Complex Scenes</b></span></div><div style="text-align: justify; "><span class="Apple-style-span" style="font-size:small;">3ds Max software delivers new viewport technology and optimizations that result in vastly improved interactivity of even the largest, most complex scenes. Common tasks and operations-selection, material assignment, transform, grouping, cloning, and many more-are now significantly faster, making 3ds Max the most streamlined version of the software ever. Plus, a new Scene Explorer makes managing large scenes-and interacting with hundreds or even thousands of objects-far more intuitive.</span></div><div style="text-align: justify; "><span class="Apple-style-span" style="font-size:small;"><br /></span></div><div style="text-align: justify; "><span class="Apple-style-span" style="font-size:small;"><b>Review Rendering</b></span></div><div style="text-align: justify; "><span class="Apple-style-span" style="font-size:small;">Produce stunning photo-real imagery, faster. With the release of 3ds Max, Autodesk unveils Review. This powerful new toolset supports iterative rendering workflows by delivering interactive previewing of shadows, the 3ds Max sun/sky environment, and mental ray Architectural and Design material settings. Based on the latest game engine technology, Review gives you the instant visual feedback you need to iterate rapidly.</span></div><div style="text-align: justify; "><span class="Apple-style-span" style="font-size:small;"><br /></span></div><div style="text-align: justify; "><span class="Apple-style-span" style="font-size:small;"><b>Support for Complex Pipelines and Workflows</b></span></div><div style="text-align: justify; "><span class="Apple-style-span" style="font-size:small;">Quickly extend 3ds Max or streamline multi-application workflows. The new MAXScript ProEditor provides you with an intuitive interface for working with MAXScript that will streamline the scripting workflow, making it easier to author scripts that automate and customize 3ds Max. Deeper support for the DWG and FBX file formats results in faster, more accurate importing of data from other popular Autodesk applications; plus, new features facilitate working with this imported data.</span></div><div style="text-align: justify; "><span class="Apple-style-span" style="font-size:small;"><br /></span></div><div style="text-align: justify; "><span class="Apple-style-span" style="font-size:small;"><b>Artist-Friendly Modeling</b></span></div><div style="text-align: justify; "><span class="Apple-style-span" style="font-size:small;">Enjoy a less menu-dependent modeling experience. 3ds Max gives you a more streamlined, artist-friendly modeling workflow through a collection of hands-on modeling UI options that let you focus more on the creative process.</span></div><div style="text-align: justify; "><span class="Apple-style-span" style="font-size:small;"><br /></span></div><div style="text-align: justify; "><span class="Apple-style-span" style="font-size:small;"><br /></span></div><div style="text-align: justify; "><span class="Apple-style-span" style="font-size:small;"><br /></span></div><div style="text-align: justify; "><span class="Apple-style-span" style="font-size:small;"><br /></span></div><div style="text-align: center;"><span class="Apple-style-span" style="font-size: medium;"><a href="http://downloadhubs.blogspot.com/2010/03/download-free-modeling-autodesk-3ds-max.html">Click Here To </a></span><b><span class="Apple-style-span" style="font-size: medium;"><a href="http://downloadhubs.blogspot.com/2010/03/download-free-modeling-autodesk-3ds-max.html">DOWNLOAD</a></span></b></div><div style="text-align: center;"><b><span class="Apple-style-span" style="font-size: medium;"><br /></span></b></div><div style="text-align: center;"><b><span class="Apple-style-span" style="font-size: medium;"><br /></span></b></div><div style="text-align: center;"><b><span class="Apple-style-span" style="font-size: medium;"><br /></span></b></div><div style="text-align: center;"><b><span class="Apple-style-span" style="font-size: medium;"><br /></span></b></div><div style="text-align: center;"><b><span class="Apple-style-span" style="font-size: medium;"><br /></span></b></div><div><span class="Apple-style-span" style="font-size:small;"><br /></span></div></div>d`whohttp://www.blogger.com/profile/02210967167222299225noreply@blogger.com0tag:blogger.com,1999:blog-534811584163788368.post-3284296824235300282010-03-24T00:10:00.000-07:002010-03-24T00:22:00.982-07:00Download Free Avira Antivirus Professional<span style="font-size:85%;"><a onblur="try {parent.deselectBloggerImageGracefully();} catch(e) {}" href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjpQMs3urJ26_DJCJilc_KppHgwd103riMN-zjuCg9JYoGk4pmHINoP5t69L-HAoaxg-xzzHEeIHdxAZf2nBPx90eA03LKGDxPOzduKSEYHerCau0qX2KbvgKl18b7X5dPmLzDXjdv2Jxw/s1600/avira.gif"><img style="float: right; margin: 0pt 0pt 10px 10px; cursor: pointer; width: 102px; height: 102px;" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjpQMs3urJ26_DJCJilc_KppHgwd103riMN-zjuCg9JYoGk4pmHINoP5t69L-HAoaxg-xzzHEeIHdxAZf2nBPx90eA03LKGDxPOzduKSEYHerCau0qX2KbvgKl18b7X5dPmLzDXjdv2Jxw/s400/avira.gif" alt="" id="BLOGGER_PHOTO_ID_5452094703088389522" border="0" /></a><br /></span><span style="font-size:85%;"><strong style="font-size: 15px;">Download Free Avira Antivirus Professional<br /><br /></strong></span> <p><span style="font-size:85%;">Virus protection for PCs – secure and efficient</span></p><p><span style="font-size:85%;"><span style="font-weight: bold;">Optimum security</span><br /></span> </p><ul class="arrow"><li><span style="font-size:85%;">Integrated, cross-platform virus and malware protection</span></li><li><span style="font-size:85%;">Reliable, extremely powerful AntiVir technology with leading multi-awardwinning detection performance</span></li><li><span style="font-size:85%;">Fast reaction to new dangers through in-house m</span><span style="font-size:85%;">al</span><span style="font-size:85%;">ware resea</span><span style="font-size:85%;">rch centers</span></li></ul> <span style="font-size:85%;"><br /><span style="font-weight: bold;">Low costs</span><br /></span> <ul class="arrow"><li><span style="font-size:85%;">Extremely low administration costs through automa</span><span style="font-size:85%;">ted workfl</span><span style="font-size:85%;">o</span><span style="font-size:85%;">ws and central management</span></li><li><span style="font-size:85%;">Intuitive operation without long, expensive training times</span></li><li><span style="font-size:85%;">All licenses incl. free updates, upgrades and 14 day installation support</span></li></ul> <span style="font-size:85%;"><br /><span style="font-weight: bold;">High investment security</span></span> <ul class="arrow"><li><span style="font-size:85%;">Fast, resource-saving scanning technology which reduces the load on servers and networks existing systems can therefore be used for a longer time</span></li><li><span style="font-size:85%;">Transparent licensing designed to meet requirements without hidden costs</span></li><li><span style="font-size:85%;">Free platform change to new or alternative operating systems</span></li></ul><span style="font-size:85%;"><br /></span><span style="font-size:85%;"><br /><span style="font-size:85%;"><a onblur="try {parent.deselectBloggerImageGracefully();} catch(e) {}"><br /></a></span></span><div style="text-align: center;"><a href="http://downloadhubs.blogspot.com/2010/03/download-free-avira-antivirus.html"><span style="font-size:100%;">Click Here To Download</span></a><br /><br /><br /><br /></div><span style="font-size:85%;"><br /></span>d`whohttp://www.blogger.com/profile/02210967167222299225noreply@blogger.com0tag:blogger.com,1999:blog-534811584163788368.post-18301042901491397332010-03-21T01:37:00.000-07:002010-03-21T01:46:41.903-07:00Download Free Avast Pro Antivirus 4.8.1296.0<span style="font-size:85%;"><a onblur="try {parent.deselectBloggerImageGracefully();} catch(e) {}" href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhFjh1HNdQpLklzF0pnsUtb5b8hjBBZW1pD6oU4eZGv-_Pbwj4TNDOyPm-z6Mt-6_mgponOX2mExN02nkP82HWJRCoNfe4Cs3qCBK1NBVaqo4-2EKD2pYl98fwR6GodhHdoFlouuNHPQRU/s1600-h/avast.jpg"><img style="float: left; margin: 0pt 10px 10px 0pt; cursor: pointer; width: 340px; height: 400px;" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhFjh1HNdQpLklzF0pnsUtb5b8hjBBZW1pD6oU4eZGv-_Pbwj4TNDOyPm-z6Mt-6_mgponOX2mExN02nkP82HWJRCoNfe4Cs3qCBK1NBVaqo4-2EKD2pYl98fwR6GodhHdoFlouuNHPQRU/s400/avast.jpg" alt="" id="BLOGGER_PHOTO_ID_5451003725478507010" border="0" /></a><br /></span><div style="text-align: left;"><span style="font-size:85%;"><span style="font-weight: bold;">Download Free Avast Pro Antivirus </span>4.8.1296.0<br /></span></div><span style="font-size:85%;"><br /></span><div style="text-align: justify;"><span style="font-size:85%;"><span style="font-weight: bold;">Avast 4 Professional Edition</span> is a complete ICSA & Checkmark certified antivirus, Checkmark certified anti-spyware & anti-rootkit software package for corporate and advanced home use. avast Professional Edition includes an on demand scanner with two user interfaces, a skinnable simple interface: just select what you want to scan and in which way and press the play button, an enhanced user interface: Outlook like UI allows users to set any feature of Avast, prepare and run tasks, store and check task results, on access scanner: special providers to protect: most available e-mail clients, instant messaging: ICQ or Miranda, network traffic: lightweight firewall, P2P protection for Kazaa, BitTorrent, Web shield: all HTTP traffic, script blocker. avast Professional Edition is available in 32 languages. Small, true incremental, updates are downloaded and installed automatically.</span><br /><br /><span style="font-size:85%;">* avast! now contains a built-in anti-rootkit protection</span><br /><span style="font-size:85%;">* avast! now comes with a built-in anti-spyware protection</span><span style="font-size:85%;">* new self-defense function to prevent active malware from terminating avast! processes as well as corrupting avast! files and registry items</span><br /><span style="font-size:85%;">* scanners now display a progress of current scan (percentage of work done)</span><br /><span style="font-size:85%;">* fixed a vulnerability in AavmKer4.sys kernel-mode driver (problem applies to Windows NT/2000/XP, 32-bit only); special thanks to Tobias Klein</span><span style="font-size:85%;">* improvements in boot-time scanner (detection & removal of hidden or hard to delete files)</span><br /><span style="font-size:85%;">* boot-time scanner will not start when booting into Safe Mode (the program was "invisible" in that case, no progress/messages could be seen)</span><br /><span style="font-size:85%;">* improvements in many unpackers</span><br /><span style="font-size:85%;">* ACE and RAR unpackers now work even in boot-time scanner</span><br /><span style="font-size:85%;">* IM Shield: added support for QQ</span><br /><span style="font-size:85%;">* improvements in handling of NTFS streams</span><span style="font-size:85%;">* Internet Mail provider now displays the name of the sending/receiving program in the tooltip of its taskbar icon</span><br /><span style="font-size:85%;">* implemented a protection against false positives in critical system files</span><br /><span style="font-size:85%;">* removed a small memory leak in one of avast! drivers (Windows Vista and XP 64-bit only)</span><span style="font-size:85%;">* added support for 64-bit WHS connector (available in WHS Power Pack 1)</span><br /><span style="font-size:85%;">* greatly improved performance of the updater, especially in cases where many increments are being downloaded (e.g. avast! installations with outdated virus definitions)</span><span style="font-size:85%;">* silent installation now also includes scheduled tasks, if any</span><br /><span style="font-size:85%;">* resolved a compatibility issue with Acronis TrueImage (XP 64-bit only)</span><br /><span style="font-size:85%;">* compatibility tests with Vista SP1 and XP SP3</span><br /><br /><br /><center><br /></div><div style="text-align: center;"><span style="font-size:85%;"><span style="font-size:85%;"><span style="font-size:85%;"><a onblur="try {parent.deselectBloggerImageGracefully();} catch(e) {}" href="http://downloadfreeanti-virus.blogspot.com/2010/03/download-free-avast-pro-antivirus.html"><br /><img style="display: block; margin: 0px auto 10px; text-align: center; cursor: pointer; width: 204px; height: 95px;" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiPRNq-i9zO_WXcYHf0eosQYBPo3-K06JSF2MjWd8b-Pv_urYr9HGUtmIlsvXy7GWJj7O-zWXGOr8SESoxMIP_hGvbCsGqo14x_9Im_2nPyii517b-fWqZy7KcnNMzHi1xMljWREz52VwM/s400/Download+Botton.JPG" alt="" id="BLOGGER_PHOTO_ID_5451004241804911666" border="0" /></a></span></span></span><br /></div><span style="font-size:85%;"><span style="font-size:85%;"><span style="font-size:85%;"><br /></center><br /></span></span></span>d`whohttp://www.blogger.com/profile/02210967167222299225noreply@blogger.com0tag:blogger.com,1999:blog-534811584163788368.post-72231997513498699302010-03-20T20:35:00.000-07:002010-03-20T20:44:09.911-07:00Windows Phone 7: Microsoft's exercise in self restraint<span style="font-size:85%;"><br /></span><div style="text-align: justify;"><br /><br /><span style="font-size:85%;"><span style="font-weight: bold;">Mix10</span> The key difference between <span style="font-weight: bold;">Windows Phone 7</span> and <span style="font-weight: bold;">Windows Mobile</span> is not <span style="font-weight: bold;">Silverlight</span>, the Windows Marketplace lock-in, nor the disallowing of native-code applications.</span><br /><br /><span style="font-size:85%;">Rather, Windows Phone 7 is Microsoft's best effort at creating a user-centric device, something that is actually a pleasure to use. Its existence has everything to do with <span style="font-weight: bold;">Apple</span> and the way it has stolen Microsoft's market - in music downloads, in high-end laptops, soon in tablet computers, and of course in <span style="font-weight: bold;">smartphones</span> themselves.</span><span style="font-size:85%;">And why has Apple succeeded? As Microsoft Research principal researcher <span style="font-weight: bold;">Bill Buxton</span> told The Reg three years ago, two words: industrial design. His mission in joining the company was to reform it into one that understood the importance of user experience.</span><br /><br /><span style="font-size:85%;">It does not come easy. Intellectually, Microsoft gets this message, but its culture and legacy is against it. The company's annual Mix conference held last week in Las Vegas, Nevada, is meant to be design-focused, but there was just as much developer content, such as detailed sessions on the <span style="font-weight: bold;">OData protocol</span>. Some attendees complained that it was too much like the <span style="font-weight: bold;">Professional Developers Conference</span> held four months earlier. Adobe has a design community, Microsoft has a developer community - and a transition is hard to pull off.</span><br /><br /><span style="font-size:85%;">Further, Microsoft has a problem with its core software products such as Office. There is no more hope of Outlook becoming user-centric than there was for the old Windows Mobile. It does not need a dollop of Office Ribbon, it needs complete reconstruction.</span><br /><br /><span style="font-size:85%;">Microsoft's dependency on <span style="font-weight: bold;">OEM</span> partners, the engine of its growth, also works against its design efforts. I was reminded of this recently when starting a <span style="font-weight: bold;">Windows 7 Toshiba Netbook</span> for the first time, fresh out of its box. Windows 7 is meant to be quieter, but the screen soon filled with ugly dialogs competing for attention, mostly from third-parties. It's this kind of thing that drives users to the Mac.</span><br /><br /><span style="font-weight: bold;font-size:85%;" >Lip service to innovation</span><br /><br /><span style="font-size:85%;">Here's what Microsoft chief executive <span style="font-weight: bold;">Steve Ballmer</span> said during the February press launch for Windows Phone 7: "We want to lead and take complete accountability for the end user experience ... have more consistency in the hardware platform, more consistency in the user experience, but still enable [partner] innovation."</span><br /><br /><span style="font-size:85%;">"Partner innovation" is generally a disaster for Microsoft.</span><br /><br /><span style="font-size:85%;">Ballmer makes a nod towards it as a matter of good public relations, but by locking down both hardware and software, the company is trying to minimize the extent to which OEMs can spoil the design effort.</span><br /><span style="font-size:85%;">During Mix10 last week I asked Buxton what influence he had on the design of Windows Phone 7. He said it was mostly the work of others, but it does show the ascendancy of design at Microsoft. "We kinda changed the water that we drink, in the sense that all through the design community within the company we talk, and we have a common goal in terms of trying to bring a certain change of sensibility," he said.</span><br /><br /><a onblur="try {parent.deselectBloggerImageGracefully();} catch(e) {}" href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjN5ZB6_B19V6pKKVCCgYSt3rsBhyphenhyphenJNIg6ioCkfU3QyZmF7bZo2pt6zrpABinoumIf6vVX-dUFfI5BEvqLua0RV80GlFVs-DZAKR-qjpamzBnfOoq0CHfkuYNpg6sR4eycwdy9Lr_VVZlk/s1600-h/toshiba_out_of_the_box.jpg"><img style="display: block; margin: 0px auto 10px; text-align: center; cursor: pointer; width: 320px; height: 188px;" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjN5ZB6_B19V6pKKVCCgYSt3rsBhyphenhyphenJNIg6ioCkfU3QyZmF7bZo2pt6zrpABinoumIf6vVX-dUFfI5BEvqLua0RV80GlFVs-DZAKR-qjpamzBnfOoq0CHfkuYNpg6sR4eycwdy9Lr_VVZlk/s320/toshiba_out_of_the_box.jpg" alt="" id="BLOGGER_PHOTO_ID_5450926984860870274" border="0" /></a><br /><span style="font-size:85%;">"For me it's not even about the phone, but what's interesting is that it's the first product in the company with critical mass that's embraced this ... it will have an impact on other parts of the company."</span><br /><br /><span style="font-size:85%;">Whether or not he was directly involved, Windows Phone 7 does seem to embody many of Buxton's principles, such as the attention given to transitions between states, with attractive flowing animations. "If you don't have as much detail in the transition as you do in the state, you're going to get it wrong," Buxton said at Mix09.</span><br /><br /><span style="font-size:85%;">The priority of design is one reason for the limited features in this release, and for that <span style="font-weight: bold;">Microsoft</span> is taking heat from developers. No native code, no multi-tasking, no socket support, no local <span style="font-weight: bold;">SQL,</span> no communication between applications - the list goes on. Such features may be opened up gradually in future versions, but only if resource usage and user control are protected.</span><br /><br /><span style="font-size:85%;">If users love the phone, these limitations will be forgiven. Microsoft is coming from behind though, and rivals including Apple and makers of Android phones will not be standing still while the company tries to catch up.</span><br /><br /><br /><br /><br /><span style="font-style: italic;font-size:78%;" >Source:http://www.theregister.co.uk/2010/03/20/windows_phone_7_design/</span><br /><br /><br /><br /></div>d`whohttp://www.blogger.com/profile/02210967167222299225noreply@blogger.com0