Explore topic-wise InterviewSolutions in .

This section includes InterviewSolutions, each offering curated multiple-choice questions to sharpen your knowledge and support exam preparation. Choose a topic below to get started.

1101.

Solve : UK considers ban on mobile phones like car key fobs?

Answer»

UK officials are considering banning the sale of small mobile phones designed to resemble car key fobs.

A government spokesman told the BBC that it was discussing the issue with the National Trading Standards Board and the Serious Organised Crime Agency.

In the meantime the NTSB has asked retailers to stop selling the products

The Times had reported some of the Chinese-made products were being advertised with prisoners in mind - having a mobile in JAIL is an offence.

The devices, in some cases marketed as the "world's smallest mobiles", are available from mainstream retail websites including eBay and Amazon.

They are designed to resemble the fobs used to transmit a signal to unlock vehicle doors, and feature logos from brands including BMW, Volkswagen, Bentley, Audi and Porsche.

A spokesman for the UK's Society of Motor Manufacturers and TRADERS said it believed the devices were being made without its members' permission.

The product description of one device sold via Amazon states that it features "very very very low metal contact badges [which] can be removed due to metal CONTENT alarm", while another says the fob is "easily concealable".

The Times said it had spotted one advertised elsewhere alongside a cartoon of a prisoner behind bars.

Full story: http://www.bbc.co.uk/news/technology-23782136He means a FOB like this:


Selling a real one as a replacement is not the issue. The OEM FOB radio has a range of maybe 100 meters or so, about 328 feet. Rather, the selling of a fake that has a more sophisticated radio inside with a range over 8 km or 5 miles. (My guess, Citation needed.r.)
Quote from: Geek-9pm on August 21, 2013, 03:30:58 PM

He means a FOB like this:

He means a very small cell phone the same SIZE and shape as an automobile remote key fob, and made to resemble one. We Brits call "cell phones" mobile phones.

1102.

Solve : Google and Microsoft agree measures to block abuse images?

Answer»

Leading search engine companies Google and Microsoft have agreed measures to make it HARDER to find child abuse images online.

As many as 100,000 search terms will now return no results that find illegal material, and will trigger warnings that child abuse imagery is illegal.

PM David CAMERON has welcomed the move but said it must be delivered or he would bring forward new legislation.

Child protection experts have warned most images are on hidden networks.

In July, Mr Cameron called on Google and Microsoft's Bing - which together account for 95% of search traffic - to do more to prevent people getting access to illegal images.

He said that they needed to ENSURE that searches which were unambiguously aimed at finding illegal images should return no results.
New software

Now both companies have introduced new algorithms [software instructions] that will prevent searches for child abuse imagery delivering results that could lead to such material.

Full STORY: http://www.bbc.co.uk/news/uk-24980765I figured most of this stuff was already sorted out with Google. I had no idea that people could still use Google to find illegal images of children.

Quote

Child protection experts have warned most images are on hidden networks.

This is true - blocking these images on Google will not change anything. These days, pedophiles use things like TOR to stay hidden, and it's much harder to catch these criminals.
1103.

Solve : Steve Ballmer to retire within a Year?

Answer»

Quote

MICROSOFT Corp. today ANNOUNCED that Chief Executive Officer Steve Ballmer has decided to retire as CEO within the next 12 months, upon the completion of a process to choose his successor. In the meantime, Ballmer will continue as CEO and will lead Microsoft through the next steps of its transformation to a devices and services company that empowers people for the activities they value most.

“There is never a perfect time for this TYPE of transition, but now is the right time,” Ballmer said. “We have embarked on a new strategy with a new organization and we have an amazing Senior Leadership TEAM. My original thoughts on timing would have had my retirement HAPPEN in the middle of our company’s transformation to a devices and services company. We need a CEO who will be here longer term for this new direction.”

The Board of Directors has appointed a special committee to direct the process. This committee is chaired by John Thompson, the board’s lead independent director, and includes Chairman of the Board Bill Gates, Chairman of the Audit Committee Chuck Noski and Chairman of the Compensation Committee Steve Luczo. The special committee is working with Heidrick & Struggles International Inc., a leading executive recruiting firm, and will consider both external and internal candidates.
More

56 Million to walk away...must be tough.
Poor Guy.
1104.

Solve : Microsoft Windows 8.1, maybe better with less.?

Answer»

The How-to-Geek claims MS will leave out some items in the NEW Windows 8.1
Quote

Windows 8.1 brings some GREAT new features, from a START button and boot-to-desktop option to SkyDrive integration and a much more ROBUST Modern interface. However, Microsoft is removing some features that were present in Windows 8.
http://www.howtogeek.com/167610/8-features-microsoft-removed-in-windows-8.1/
Thanks for the article..interesting to hear about libraries. It does say that the features MIGHT be added at the end though, so we might see them yet.
1105.

Solve : PayPal destroys Google Wallet?

Answer»

I also have a PayPal Debit MasterCard which works like a credit card when spending in you get 1% cash back on purchases. I end up with some mad money in my PP account a few times a year so it's convenient. Quote from: jackhammer on September 16, 2013, 10:47:08 PM

This is really interesting, PayPal is shrewd! Now that Google Wallet is on the scene, is a normal wallet even required? Pay without cash or charge card in hand, securely and safely.
I'm sure google would be more than happy to KEEP your Birth certificate. SIN number, and innumerable other personally identifiable documents "safe" for you.

Of course they might "accidentally" sell it to interested third PARTIES and stick it in a TOS.This is still a current topic. Here is a very recent blimp.
How PayPal Can Succeed Where Google Wallet Failed
The link is to Forbes. Denée Carrington says:
Quote
...
Today, PayPal launched a redesign of its mobile digital wallet in the US, Australia, Canada, China, Hong Kong, Japan and the UK. Although the digital wallet marketplace welcomes new or evolving competitors regularly, others – like Google Wallet- have gone back to the drawing board. To date, no third-party wallet provider has yet to achieve “broad-scale adoption” with both consumers and merchants, or, said differently, “success” with proximity or in-person mobile ....
The story was published a few days ago. Click link for the full blast.PayPal has rolled out a lot of changes this year. They are now a mix between a virtual retail business office, a credit card company and bank account. You can deposit checks directly into your PayPal account and take payments by credit/debit card with PayPal Here.

I had them send me the PayPal Here card reader since it's free and out of curiosity. Just install the PayPal Here app and your ready to swipe cards. Watch out though. When you swipe a card it finishes the transaction automatically. I swiped my bank debit card and lost 0.03 cents to the transaction fee. OOPS! Be very, very careful about anybody that deters your personal information.

In addition to fraudulent changes, there is the greater risk of identity theft. In the current state of things, you have to protect your own identity and recover it yourself. Current law does not give enough help to victims of identity theft.
In some places, you can get a free credit report without jeopardizing your credit information.But MAKING a new credit application may cause you harm. Before you make an application online, take to a real person in your community that is well informed on the subject.

I did have an issue with PayPal, but I still use them and I check my account from time to time. Avoid subscriptions, if possible.

Quote from: Geek-9pm on November 18, 2013, 07:52:40 PM
Be very, very careful about anybody that deters your personal information.

What does that mean?Quote from: Allan on November 19, 2013, 05:41:54 AM
What does that mean?
Sorry, MEANT to say do not give a lot of personal info to firms you do not know. An example of this is as site that claim simple information to help with security is requested. Such items might be:
What was the name of your High School?
What is the name of your pet?
What is the name of the hospital where your whee born?
Hos may APPEAR to be harmless questions, but the info may help criminals to form a profile for you.
Using a modern computer network, the simple info can be turned into a seed that goes in a different directions. The firm deters your information, in that they make it go in the opposite direction from what you thought.

Pardon my French. (Aurally, I don't speak French.)


Quote
Pardon my French. (Aurally, I don't speak French.)

Thank Goodness...Quote from: Geek-9pm on November 19, 2013, 11:08:40 AM
Pardon my French. (Aurally, I don't speak French.)

I tried speaking French aurally once but I just got butter in my ears.
1106.

Solve : New Malware Locks Files for Ransom?

Answer»

Interesting...

http://www.today.com/money/nasty-new-malware-locks-your-files-forever-unless-you-pay-8C11511655The malware isn't new at all. It has however been recently modified to extort more money from victims.

Ransomware demands additional payment to delete ‘criminal records’

- Don't go clicking on email attachments that are suspect. Especially shipping invoices. If you NEED your shipping information go to the shippers website and find it.
- Backup, backup, backup! Keep your personal files/folders backed up! Something as simple as using SkyDrive or Google Drive can make all the difference. Just because the malware can be removed is no guarantee that it will not do major damage in the process.
- Keep your AV updated and trust it when it says there is a problem. Curiously killed the cat!Well, shall we wait here for somebody to say that is unreal?
Someone might say you need to go to control panel and uninstall the last program you got and that solves the problem.

Really, the story is being picked on other SITES. It is a real thing.
http://www.wtop.com/256/3504095/Vicious-virus-locks-files-then-demands-ransomI have no idea what the 1ST part of your reply means...Quote from: evilfantasy on November 13, 2013, 01:37:33 PM

Curiously killed the cat!

I 'curiously' botched my security rant...Quote from: evilfantasy on November 13, 2013, 05:23:04 PM
I 'curiously' botched my security rant...

Sorry... that was meant for Geek's reply above...which i just re-read and i stick to my reply...I knew it was to Geek

I compulsively re-read my replies. It's nearly a sickness at times...Quote from: patio on November 13, 2013, 04:54:39 PM
I have no idea what the 1st part of your reply means...
Pardon my babel.
My intent was to say the threat is very real. But so often somebody claims it is easy to fix the problem. It is not easy to fix. As Evil Fantasy said, you have to have backups and even a backup plan. It requires forethought.
Here is a short list of PC Backup Plans
Single Computer or Personal Backups
The idea is that the backup has to be separate from your computer and has to be updated frequently.
Also, search for Free Cloud Storage.The exception of SugarSync that list of backups is crap. IMO MyPC Backup should be considered malware. I had the pleasure of removing it from a PC last week.Quote from: evilfantasy on November 14, 2013, 06:22:10 AM
The exception of SugarSync that list of backups is crap. IMO MyPC Backup should be considered malware. I had the pleasure of removing it from a PC last week.

Agreed.

Crashplan is my cloud backup of choice.

That aside, I read about this malware the other day, nasty stuff but easily avoided considering real shipping notifications aren't usually a double extension (fake) PDF in a zip file.CryptoPrevent is a tiny utility to lock down any Windows OS to prevent infection by the Cryptolocker malware or ‘ransomware’, which encrypts personal files and then offers DECRYPTION for a paid ransom.

1107.

Solve : Key Lime Pie? Nope!?

Answer»

Google has announced the name of it's next OS and the widely rumored Key Lime Pie isn't even CLOSE to being accurate.

Kit Kat statue joins the crew at Google HQ

Quote

Does this MEAN what we think it means? Apparently it does, as it has been announced that Android Kit Kat is the next name for Android. We've got a live page already, and the folks who make the candy bars are getting in on the action and offering Android limited-edition versions that may contain coupons for a Nexus 7 or Google Play credit. Major props for pulling off the LICENSING on this one, Google.

http://www.android.com/kitkat
Kit Kat is giving you the chance to win a Nexus 7 or Google Play credit. Just look for specially branded Kit Kat candy bars featuring the Android robot in a store near you. Promotion starts September 6th 2013.

http://www.hersheys.com/kitkat.aspx

This is all kind of puzzling to me when I think of the partnership details, which I honestly know very little about. Hersheys was getting ready for the news of the Android/Kit Kat partnership. The Kit Kat Facebook page was created modified on Aug 20th 2013. Google approached Hersheys for licensing but in the end I wonder who will be paying who? Google will likely just use the Kit Kat name and nothing more but Hersheys gets access to the Google Android name and mascot. BUT! The Android robot and name can already be used for free as long as you follow the Android Brand Guidelines.

I think Hersheys stands to gain much more than Google even without Google paying royalties. I'd have gone with Snicker's myself...Maybe when the S comes up. We still get to day DREAM about what the L,M,N,O,P,Q and R names will be...

Lemon DROP anyone?
1108.

Solve : Windows 8.1 Mouse issues in games?

Answer»

Windows 8.1 - MOUSE Control Issue and no fix as of yet from Microsoft. Played World of Warcraft for about a half hour last night and noticed that my mouse felt off as if it was trailing my movement ever so slightly to be annoying. Just did a search on google to see if there are any known Windows 8.1 bugs and SURE enough I found this one that I believe I am EXPERIENCING. Figured I'd share this here in case OTHERS have gaming issues with Windows 8.1 mouse controls.

http://www.pcworld.com/article/2060460/windows-81-creates-mousecontrol-problems-for-gamers.html

The good thing is that in addition to this new ASUS Laptop running Windows 8.1, I also have my gaming desktop to use with Windows 7 and no problems. So I guess I will be gaming on my desktop with Windows 7 until Microsoft fixes this issue. But for ANYONE who may have just 1 computer running Windows 8.1 and wanting to game. I can see this problem being extremely frustrating !

1109.

Solve : Online pornography to be blocked by default, UK PM announces?

Answer»

Someone didn't read the whole Thread...This issue can be resolved, if people really want it.
Here are some rules of decency that are self-evident.
A. It is wrong to lie to get an unfair advantage over another person.
B. It is wrong to steal from another person just because they are weak.
C. It is wrong to corrupt other people to be criminals.
D. It is wrong to bastardize anarchy (e.i., lawlessness.)
E. It is wrong to destroy a working society because you don't like it.

Some who promote 'free speech' will claim they have the right to ignore the above rules. Do they don't. Nobody has the right to harm others, whether by wicked deeds, false representations or things like that.



Quote from: Geek-9pm on September 03, 2013, 01:35:13 PM

Here are some rules of decency that are self-evident.
But they have exceptions. You are trying to essentially declare that morality can be reduced to black and white. I've never personally been convinced of this. Is it always wrong to lie? No. I can consider all sorts of scenarios where lying is not wrong. Imagine a bank Robbery. The Silent alarm is triggered. One of the robbers suspects that the alarm had been triggered, so grabs a nearby toddler, puts a gun to their HEAD, and asks one of the tellers if they triggered to silent alarm. If they say "No"- and thus lie- is it wrong? If they say "Yes" and the Robber kills the Toddler, should the Teller still feel good because they stuck to their principles and refused to lie even though it would have saved a life? These might seem like extrapolated or derived situations but this type of thing happens all the time, just not to the same degree. A Mugger on the street asks for your wallet. You give it to him. You are a quarter mile from the nearest ATM machine. They ask for your PIN number at gunpoint. Is it wrong to not tell them the correct Number? If so, why? Why is it more morally upstanding to tell them the correct PIN Number in order for them to pilfer what belongs to you than it is to tell them the wrong number and not be able to do so?

I've had things stolen from me by people I know. So I took them back. When I told the story- (and these things were undoubtedly mine) the counter is that "two wrongs don't make a right". That makes no sense. If Person A steals a bicycle from Person B, and Person B finds their Bicycle in Possession of Person A (and that bicycle is quite clearly Person B's bicycle without a doubt). Is it "stealing" to take it back? Why? Why is that morally wrong? And if so, isn't this a case of two wrongs making a right? If that is possible, surely the platitude is a generalization that cannot be relied upon, because like many platitudes with regards to morality, it relies heavily on this idea of moral objectivity and black and white.

Quote
It is wrong to corrupt other people to be criminals.
Here is the problem though. What is a criminal?

Again, we are left with the same issue of black and whiteness. If somebody PERFORMS a crime, they are, by definition, a criminal. Therefore, any person 'corrupted' into performing a crime, by this logic, is wrong.

But doesn't that depend on the "crime"?

Imagine there is an accident in an intersection. This intersection doesn't allow for left turns, and has clear signage indicating that, according to traffic law, such an action is illegal. Since it's against the law, it is criminal to do so. The police officers on the scene need to direct traffic to allow for the Emergency crews to do their Job. If the police direct traffic to perform a left turn, are they wrong? Is this an "evil" action? Few people would say yes. Again, it's not a case of black and white but evaluating shades of gray.

Consider speeding laws. It is against the law to go faster than the speed limit. Therefore exceeding that Speed Limit is criminal. (in some States in the U.S it is even a felony to exceed the speed limit).

A Woman is pregnant and goes into labour. So the Father drives her to the hospital. He speeds to get there. Who is responsible? is this wrong? is it the woman forcing him to go faster than the speed limit and turn him into a criminal? Is it the newborn? Should the newborn be considered morally wrong for trying to be born? This isn't really contrived, it happens everyday and people are just fine with it, even though it fits the exact criteria you mentioned.

Quote
D. It is wrong to bastardize anarchy (e.i., lawlessness.)
uh.. It is wrong to corrupt anarchy? What does that mean, exactly?


Quote
It is wrong to destroy a working society because you don't like it.
Doesn't this depend on one's definition of a working society? Doesn't the society in 1984 "work"? Doesn't Winston work against it because he doesn't like it?

Quote
Some who promote 'free speech' will claim they have the right to ignore the above rules. Do they don't. Nobody has the right to harm others, whether by wicked deeds, false representations or things like that.
I'm not even certain your stance on this issue, actually. It's difficult to tell based on what you've said.A lie well placed in a situation of duress is a falsehood...not a true lie...so i agree on that premise.

Stealing something back that was or happened to be originally stolen is still stealing...other approaches could have been taken...so i disagree BC on this one.


Quote
It is wrong to corrupt other people to be criminals.

This one makes absolutely zero sense as you cannot corrupt others to be criminals...free will and choice decides who becomes a criminal or not....i could no way shape or form "corrupt" you onto commiting a crime the same way as you could not convince me to jump off a bridge...ridiculous statement.

As far as the last 3 innacurate statements i'll both defer to and agree with BC's responses as they are spot on...Quote
Doesn't this depend on one's definition of a working society? Doesn't the society in 1984 "work"? Doesn't Winston work against it because he doesn't like it?

On a side note "Atlas Shrugged" also comes to mind...along with many other Novels.Quote
I have 2 girls, 10 and 14 years old. Being a parent isn't a burden.

I agree that being a parent isn't a burden too, I have a 9 yr old daughter. As far as content control, she has her own computer and I have a filter that keeps her in safe territory when she surfs and uses google. The only website that we have had some issues with is youtube in which she would look up sponge BOB and find some disturbing edits that people have posted.Quote from: patio on September 03, 2013, 06:39:45 PM
A lie well placed in a situation of duress is a falsehood...not a true lie...so i agree on that premise.
A lie is by definition any statement that is intentionally false. A falsehood is a false statement, regardless of the intent when it is delivered. A lie includes intent to deceive; a falsehood does not. The fact is that in my analogy there is an intent to deceive, but that intention is for good reasons. It's still a lie, my point is that saying that "lying is always wrong" is simply too black and white. And trying to assign semantic differences just to avoid tagging something a lie to keep that black and white definition doesn't really make a lot of sense to me.

Quote from: patio on September 03, 2013, 06:39:45 PM
Stealing something back that was or happened to be originally stolen is still stealing...other approaches could have been taken...so i disagree BC on this one.

I don't really think this makes any sense. Theft is essentially taking something that doesn't belong to you. Following that, let's do another experiment like the above:

1. Thomas has a Truck. His truck is red, and it has his company logo on it's mudflaps. He has fuzzy dice hanging from his rear-view mirror. He keeps a slip of his business cards in the middle of the dash.

2. Thomas is leaving for work. But darn, he forgot his tools! So he drives back, and leaving his truck idling in the driveway, runs inside to grab them. When he comes back outside, his truck is gone.

Curses.

A few days later, Thomas is walking along and sees a Red Truck in a parking lot. He get's closer. It has the same fuzzy dice. It has his company logo on the mudflaps, and his Business cards are SITTING in the dash. the truck belongs to him. Therefore, him running home and grabbing is spare keys and driving the truck home is not stealing the truck. It's his truck. It would probably be a better idea to phone the police, not because the police have a magic wizard staff that let's you take your own posessions from a thief without it being theft, but because you probably want to make sure the person that stole it has to answer for doing so.

Arguably, you can just wait until they come outside. Probably best not to just punch them in the face though since the thief may have sold it to somebody who has no idea, or lent it to a friend or something.

of course, that's for cars. In my case, it was a bicycle. There was the same number of distinctions. After it was stolen, I saw another bike that was exactly the same. There was no doubt about it; every single detail was the same- in particular the slip of paper I had put within seat with my name on it. I had owned the bike for a few years prior and had become rather familiar with it. Even then I didn't trust it which is why I stuck the piece of paper inside- just to be sure if anything happened to it. It got stolen, one of my friends stumbled upon a bike that he said looked like mine, I went where he was, Everything looked exactly the same. Many specific details were the same as mine, including a slightly bent rear rim and a tear in one of the suspension covers. Even so, I took the seat off (which itself used another addition of mine involving a quick-release seat that was the same one I had on mine) and found the piece of paper with my full name on it. At this point, how can it even be considered "stealing' to take it?

That bicycle was mine. Personally everything else clinched it, the reason I put the paper in the seat was because while the others could by some bizarre coincidence be on another bike, only mine is going to have a piece of paper with my name on it.

I just don't see how anybody can- even subjectively- consider this "wrong".

1110.

Solve : GTA 5 - PC Download - 18GB Virus Bundle...LOL?

Answer»

Found this article on Facebook wall today and had a laugh. But 18GB download would look like the real thing I suppose.

http://www.eteknix.com/thousands-idiots-download-gta-v-pc-installer-guess-happened-next/That's what you get for trying to illegally download a game that hasn't even been announced, never mind RELEASED. Karma at work.

The stupidity of some people is mind boggling...then again I suppose it could've just been desperation as Rockstar screw over their PC fanbase again - you know, the customers who helped get Rockstar where they are today Quote from: Calum on October 23, 2013, 11:27:59 AM

You know, the customers who helped get Rockstar where they are today

Every one of their titles has been released for a Console either first or exclusively, usually with at last a year before a PC Port, though.

Also in this case GTA5 is more or less another "killer app"; SOMETHING that it's possible some players may actually buy the console just to play. Though that seems to affect Sony more than it would Rockstar.Quote
Also in this case GTA5 is more or less another "killer app"; something that it's possible some players may actually buy the console just to play. Though that seems to affect Sony more than it would Rockstar.

I have to state that good games are what caused me to buy my consoles of the past.

Atari 2600 = Many Titles and saving money not feeding quarters into the button bandits when 25 cents was worth more than it is today.

Nintendo = Super Mario Brothers which came with the bonus of Duck Hunt, and then bought almost 80 games before getting SNES.

SEGA Genesis = Sonic the Hedgehog, Altered Beast, and GoldenAxe, and about 7 other titles.

SNES = DonkeyKong Country, Mortal Kombat, Clay Fighter, and a bunch of others but games were pricey so only like 30 games bought.

Nintendo 64 = GoldenEye 007, although didnt buy many other games.

PlayStation 1 = Twisted Metal series, Medievil, Test Drive 4 & 5, Driver 1 & 2, and Crash Bandicoot series.

----------------------- But then in the late 1990s early 2000s I switched to being a PC Gamer Mostly --------------------------

*Although I bought a PS2 and PS3 second hand and have a hand full of games for each + PS1 games play on PS2, so my PS1 is in storage.

Only problem with being a PC Gamer is that stores are stocking less and less PC Game titles and more and more console games. 99% of the games I buy today I get online with about 5% of them through Steam. When given a choice, I'd rather have the game disc and box vs an online download as for I have run into issues with downloaded games when for example my ISP changed from Adelphia to Comcast and games registered under Adelphia e-mail I no longer have access to this e-mail address so when it comes to confirmation of ownership for the license I have been declined by many vendors for this inability to confirm ownership by e-mail. For some games I printed the invoice out and still had the activation info, while others I would have to buy a 2nd copy of a title to play it again and I simply gave up on trying to get access to those games back when even credit card info doesnt go far enough back to point out a purchase years ago . Had I bought the software and had the disc and key I would have been all set.Quote from: BC_Programmer on October 23, 2013, 02:19:01 PM
Every one of their titles has been released for a Console either first or exclusively, usually with at last a year before a PC Port, though.

GTA was released on the PC before Playstation or Gameboy.
GTA London was released on the PC before Playstation.
GTA 2 was released pn the PC before Playstation and Dreamcast.
So, yes, customers buying the games on PC did help Rockstar get where they are today, because without those PC sales they probably wouldn't exist.
From there, the GTA games have been ported to PC after a console release - GTA 3 was released to PC about 6 months after the Playstation and the Xbox a year and a half or so after that, Vice City was released on PC 6 months after Playstation and Xbox 6 months later, and San Andreas had a gap of 6 months after being released on the Playstation before it was released on PC and Xbox at the same time.
All of those were generally decent ports and there's not a huge gap, plus I believe it was generally known that the PC release would be coming. GTA 4 on the other hand was a terrible port.

Quote
Also in this case GTA5 is more or less another "killer app"; something that it's possible some players may actually buy the console just to play. Though that seems to affect Sony and Microsoft more than it would Rockstar.

Added Microsoft to your quote as it's not a PS3 exclusive. That may WELL be the case, I am still hopeful they will port GTA 5 (properly) as I have no interest in paying effectively £300+ for a game that won't even look or play like a modern game as it's running on 7 year old hardware.

Also, Dave - apart from really old games, I buy all my games through digital download services nowadays, the exceptions are games not available in that format which I tend to buy second hand for 10p-£1 which I have about 20 of. On Steam, Origin, GMG, GOG and a few others, I think I have in excess of 400 games. I have nowhere to store 400 cases Quote from: Calum on October 24, 2013, 03:13:40 AM
GTA was released on the PC before Playstation or Gameboy.
GTA London was released on the PC before Playstation.
GTA 2 was released pn the PC before Playstation and Dreamcast.
Ahh, yes. True enough.
Quote
So, yes, customers buying the games on PC did help Rockstar get where they are today, because without those PC sales they probably wouldn't exist.

GTA2 released on the PS1 one month later than the Windows Version. GTA1 released on the PS1 2 months after the MS-DOS version, with the expansion packs being a month as well. It's unlikely the sales made in that window were particularly awesome; besides, DMA Design had already released the arcade hit "Lemmings" which sold tens of millions of copies.
Quote
From there, the GTA games have been ported to PC after a console release - GTA 3 was released to PC about 6 months after the Playstation and the Xbox a year and a half or so after that, Vice City was released on PC 6 months after Playstation and Xbox 6 months later, and San Andreas had a gap of 6 months after being released on the Playstation before it was released on PC and Xbox at the same time.
Also, ironic here is that you consider a gap for GTA1 and GTA2 of 2 and one month respectively before the Console version was released as somehow being more significant to the success of DMA Design (which had already released Lemmings which made them craptons of money) than the 6 months that those games were PS2 exclusives. Particularly since it's difficult to fathom a situation where any one of those newer releases would not sell more in those 6 months than GTA and GTA2 combined during their fleeting month or two of exclusivity on MS-DOS and Windows.

Quote
That may well be the case, I am still hopeful they will port GTA 5 (properly) as I have no interest in paying effectively £300+ for a game that won't even look or play like a modern game as it's running on 7 year old hardware.
IF you ask me they ARE porting it, but they don't want to release ANY details about it. They probably have to pretty much redo the work done porting GTAIV to "start over" effectively, since GTAV runs on the same core engine. Another reason that I think is high on their reasoning is piracy; if they don't announce a PC port, some gamers that might otherwise holdout to download a pirated version might buy it. Of course that setup disadvantages otherwise legitimate paying customers on that platform but that's just the way it works now. It wasn't a problem back with GTAIII/VC/San Andreas simply because Downloading a DVD's worth of information wasn't something you could do on most home connections at the time. Not to mention DVD Writers were not exactly super-commonplace either, so they could afford to make announcements.

If I had to guess further I'd surmise they are not announcing it because when they announced GTAIV being ported to the PC they might have observed a coincident drop in the sales of the released version, so they want to ride the hump as long as possible before they cause that.

Quote
If I had to guess further I'd surmise they are not announcing it because when they announced GTAIV being ported to the PC they might have observed a coincident drop in the sales of the released version, so they want to ride the hump as long as possible before they cause that.

Interesting concept that they might be holding out to create a non-competing platform scenario ... ride out the first success hump on consoles and then when they start to see a slump, saturation of the game on the market causing a slowdown of sales, they then can release the PC ported version and re-light the fire under the title to ride a second hump in sales. Some people who already own the console version may buy a PC version so they make 2x as much money off of those people as well as they are priming the PC GTA5 market for immediate strong sales because with the title out there for consoles and its popularity, those who dont have the console to run the game will jump right away to get it for PC to be able to finally play it on their own computer SYSTEM vs a friends console.

Looking on youtube of VIDEOS of footage GTA5 looks awesome. I hope to add it to my collection when it is available for PC, which it should become available in time. It would be foolish not to release a PC version and not tap into the PC Gamer market.Quote from: DaveLembke on October 24, 2013, 02:08:59 PM
Interesting concept that they might be holding out to create a non-competing platform scenario
As far as PC I figure it's been last for a lot of developers for a while now simply because of Piracy. It's fair to say that PC games are pirated a LOT more than Console games, because in comparison, pirating a PC title is almost trivial in terms of what a user has to do compared to pirating a Console title. so it's difficult to try to rationalize that a company should somehow ignore how that might affect their bottom line, especially if they have sales figures that seem to substantiate the idea.

1111.

Solve : Mega' phone is huge, almost 7 inch.?

Answer»

A new Android phone comes in at 6.3 inches. It is made by Samsung.
Here is the link:
http://finance.yahoo.com/news/review-mega-phone-huge-limited-040219973.html
Quote

The Mega gives you many of the benefits of tablets. With the larger screen, I can read SMALL print on websites without zooming in, and I make fewer mistakes when trying to click on buttons and links. For e-books, I get a screen size that feels closer to a paperback. I see slightly more content when checking EMAIL or Facebook. I don't see a whole LOT more, though. Typically, text and images simply get larger to fill out the additional screen space.
But he laments that it does not fit WELL in tight jeans.

Maye Levi Strauss will make a Mega Jeans nine for big Smart PHONES?
Even if not, I still I want one!
I have had the Samsung Galaxy S4 for less than a week now (awesome device!). I could have bought the new Samsung Galaxy Note 8 for around the same price but after picking it up I thought no way!

I can hardly stand my car keys in my pocket. The S4 will be hard enough for me to accept. That thing... no way!!!

It is pretty cool and I would like to have it for the novelty factor. But that's about it.
1112.

Solve : Asus jumping ship on Windows RT?

Answer»

More bad news for MS. Asus JUMPING ship on Windows RT
Quote

On Friday, Asus announced that it was pulling out of the Windows RT market. This follows the withdrawal of Samsung, HP, Lenovo, and HTC, leaving Dell as the sole third-party Windows RT OEM.
Kinda funny it just hit the media...read it in an ASUS newsletter about 7 WEEKS ago.An indication of how much people are paying attention to Surface...Scarface?
What Surface?
--Dell abandons Windows RT

Quote from: MajorGeeks/Timothy Weaver
According to media reports this week, Microsoft may be the last device maker to still be manufacturing devices running its Windows RT operating system. As of last MONTH, Dell appeared to be the last one standing with the XPS 10, though that device could only be found online.
There is more.. Just now.
Dell just jumped ship.
Keywords: "Dell DROPS Windows RT"
Over a dozen hits on Google.
Are you ready for a Nokia Lumia tablet running Windows RT 8.1? Microsoft Snaps Its Fingers, And Presto! Nokia Is Making Tablets

Quote from: ReadWrite.com
Today at a Nokia World event in Abu Dhabi, Nokia is unveiling six new devices, three of which are running Windows. The biggest, quite literally, of the bunch is Nokia's first tablet to use Windows. The Nokia Lumia 2520 is a 10.1-inch tablet running Microsoft’s Windows RT 8.1 operating system on a quad-core Qualcomm Snapdragon 2.2 GHz processor with a 6.7 megapixel camera. The Lumia 2520 will RETAIL at $499 and will ship this quarter.

Nokia/Windows phones are not doing too bad but the numbers are still way behind Samsung and Apple devices and continue to shrink.

8 million Nokia Lumia smartphones sold in Q3 of 2013

Quote from: Inferse.com
Comparing the figures to the same period last year that was pegged at 2.9 million, Nokia more than doubled its sales. Last quarter, the Nokia Lumia smartphones posted sales of 7.4 million.
We just started investing in Windows phones on a fairly large scale, to replace Blackberries. They seem pretty well suited to our needs so far, could imagine the tablets being decent too.Combining the Nokia and Surface designs could produce a cool looking tablet. I like the way the Nokia smart phones look and I don't think the Surface tablets look bad either.
1113.

Solve : LyricXeeker is a virus, say many posts?

Answer» LyricXeeker (also known as LYRIC Xeeker) is a potentially unwanted program or browser add-on application. Not yet reported in mass media; this has been reported in the last week by many posters on the Internet.

Here is a recent list:


WARNING. I have not personally checked all of these. Some just attempts to get you to buy there software. Don't buy anything! There is free software out there that will find it ans warn you; bunt it may not be able to remove it.
Please report what you find., thanks.

Links Removed...
The only credible link in your post is the last one...sophos...
And the alleged threat dates to 2003...
Hardly news...and has probably been handled by now with most protection apps.Quote
Hardly news...and has probably been handled by now with most protection apps.
Respectfully disagree.
It is news. If your virus definition is over a week old, it won't find nit if your get it.Well it seems you in fact are the one that's mis-informed...all those links EXCEPT Sopho's link to a SpyHunter download removal tool...
They are far from the most reputable outfit on the Planet out there...

But thanx for the info.

BTW SpyHunter once RAN will eventually ask for $$ to remove infections...the very thing you are stating should be avoided.Thanks Patio. I did not check out the sties. But the threat is real. I found it with a scan from MALWAREBYTES and Avast.

I checked out Spy-hunter* . It is a scam. How do I know? Because it says it is not. it says it is not a scam; therefore it must be. Understand my logic?

Whoever they are, they must be using some kind of SEO thing with Google to make sure their phoney WEB sites come up when I try to check it out with a Google search.

So, IGNORE THE LINKS I GAVE.
The whole think is a scam.

* Spy Hunter is also the name of a game. The game is cool.
This is a retraction.

The first post I made is wrong. I was stupid. I was sucked into a big ploy to sell bogus AV software. My only excuse is that I did not do it on purpose.

Moderator: Do whatever with the first post.
1114.

Solve : List of software blocked or disabled during Windows 8.1 upgrade?

Answer»

Credit: List of software that may be blocked or disabled during Windows 8.1 upgrade
Quote from: [emailprotected]

Microsoft has also released a list of software that may be AFFECTED during the BEHAVIOR.

Software like SuperNova, Searchqu Toolbar, ZoneAlarm, Expression STUDIO, Visual Studio may change behavior during or after the upgrade process.

McAfee AV Products, Trend Micro Titanium, Panda Security, Outpost Antivirus Pro, Outpost Security Suite Pro are some of the antivirus software that may get disabled during the Windows 8 to Windows 8.1 upgrade.

For complete details check out KB2882342.

Source: Compatibility update for the web and media upgrade experience is available for Windows 8.1 and Windows Server 2012 R2
Quote from: Microsoft Support
A compatibility update for the web and media upgrade experience is available. This update improves the web and media upgrade experience when you upgrade to the latest version of Windows 8.1 and Windows Server 2012 R2. Additionally, this update offers the latest compatibility status of the applications, devices, and drivers that are already installed on your computer.
The horror stories i'm seein are overblown in my opinion...
However to MS's fault they did rush this release to market so they deserve the criticism as i see it...
It's a much shorter list then what I expected. Not surprised to see multiple over priced, over bloated security suites though.Quote from: patio on October 22, 2013, 07:12:25 PM
However to MS's fault they did rush this release to market so they deserve the criticism as i see it...
Windows 8.1 went through several preview releases- the Developer Preview and the Consumer Preview, at the very least; as well as a 8.1 RC made available on MSDN. This occured over a much faster cadence than would occur for a new OS release, but it was also fundamentally a 'update' release that was designed to REWORK some of Windows 8.

If Microsoft releases software this quickly, people say it's Rushed. If they wait three years between releases, they call them big and slow.


Looking at the article, we see that some of the affected applications/apps will not be brought forward because they simply don't work on Windows 8.1. (SuperNova and Searchqu Toolbar) Most likely they only worked on 8.0 by coincidence, and they used undocumented behaviour and tried to exploit it in some manner and that undocumented behaviour changed in 8.1.

Otherwise it seems like most of the affected software is AV programs. It should surprise nobody that AV software would be disabled given the fact that such AV software would probably detect the update process as malicious since it's basically rewriting all the system files. Some of the applications just get updated automatically to resolve possible issues they might have running under 8.1. The fact that the update actually does these things is a proactive action- if it didn't apply these updates and disable some software, the update would either fail (the AV software) or Applications wouldn't work properly.
1115.

Solve : We should have invested in Bluetooth technology...?

Answer»

Who knew that SOMETHING seemingly so obscure for all of these years would suddenly become so popular?

Half of the Bluetooth Enabled Devices Shipped in 2013 will be Smart or Smart Ready, Says ABI Research

Quote

The growth of Bluetooth v4.0 (Smart and Smart Ready) devices has been phenomenal, from zero shipments in 2010 to over 1 billion shipments in 2013. This speaks to the desire for ultra-low power wireless technology across the industry.

The total Bluetooth enabled device market is expected to go beyond 4 billion devices shipped annually in 2017 and as the market EXPANDS it's increasingly being driven by devices that are v4.0 enabled. It's clear that the development of ultra-low power Bluetooth has, and will continue, to keep Bluetooth as a relevant technology in the burgeoning Internet of Everything market.

Reminds me of an old Radio Shack commercial. "WHAT is Bluetooth? I don't know but I want it!"
1116.

Solve : Microsoft unveils the new Bing?

Answer»

Quote
Bing.com redesigned

You will start to notice some changes coming to Bing.com. We're updating EVERY day to make your SEARCH experience FASTER and better. If you're on a PC, Mac or Surface you can take a look at the latest work using most browsers.

http://www.bing.com/preview
1117.

Solve : Windows 8.1 Download Available.?

Answer»

News from ABC and shown om 'Good Morning America' TV Oct. 17
Full Story
But reading then story I didn't see the link.
It's in the App Store thing. Real pain in the *censored*, because there was no option to delay the shutdown (only to ignore it) and it took ages before my computer finally booted back up completely. Microsoft pulls Windows update after problems reported

Quote

Microsoft has pulled a Windows update from its website after it caused problems on some customers' devices.

The company didn't give details about the problems but says it's investigating. It removed the RT 8.1 update from the Windows Store during the weekend.

In place of the update, Microsoft posted an apology for the problem and said it's trying to resolve the situation quickly. The company says it will give updates as soon as possible. It says the problem affected only a limited number of users.

The company says RT 8.1 is an operating system for tablets and light, thin personal computers. It only runs built-in apps or apps downloaded from the Windows Store.

Just wondering. Is it to hard to have a
revert to stable release bottom?
Or could they have an AUTOMATIC update downstream undo function?
Just thinking. You are installing a new OS so no.

They warn you before starting to backup anything important before beginning the update.

Quote from: Geek-9pm on October 21, 2013, 12:38:46 AM
Or could they have an automatic update downstream undo function?

Windows 8.1 automatically saves your personal files/folders and desktop settings to Skydrive. I thought that was a nice addition.Quote from: evilfantasy on October 21, 2013, 12:00:24 AM
It removed the RT 8.1 update from the Windows Store during the weekend

"Microsoft has apologized to the 5 people this affected"Quote from: BC_Programmer on October 21, 2013, 01:00:45 AM
"Microsoft has apologized to the 5 people this affected"



My friend said Windows 8.1 took 6 hours to install...I said that's approximately 5 hours 45 minutes too long EVEN for an OS installation. Lots of tears have been shed over this update/SP/new OS, whatever the correct term is - I find it hard to believe that it truly is a disastrous release of such epic proportions so I'm coming to the conclusion that there's a healthy dose of PEBCAK going on somewhere.Quote from: Calum on October 21, 2013, 02:23:20 AM
My friend said Windows 8.1 took 6 hours to install...I said that's approximately 5 hours 45 minutes too long even for an OS installation.

A very recent article at The Register... (If you are unfamiliar with The Register, they have a very dry British sense of humour and they often call tablets "fondleslabs".)

Quote
Wait for it, waaiiit for it: We update an Atom tablet to Windows 8.1 Pro

[...]

If you own an Atom tablet and you’re pondering on upgrading to Windows 8.1 now it’s out in the wild, then there’s good news and bad news. The good news is that it installs fairly smoothly in my experience. That said, I would advise to send out for pizza and rent an epic movie, the longer the better, as the update takes an age to install on a Windows 8 Pro fondleslab.

[...]

It has a 1.8GHz Intel Atom Z2760 CPU and 2GB of RAM. It’s fairly typical of a Windows 8 tablet, although there are a number of Core i series models out there too, mostly pretending to be Ultrabooks.

[...]

2hrs and 45minutes on, as Windows 8.1 reports that while it’s “Installing your apps” that it’s also “Taking care of a few things”.

Read the whole depressing story here

http://www.theregister.co.uk/2013/10/19/updating_an_atom_tablet_to_windows_81_pro/

He says that he was 45 minutes in when a message popped up to say he needed to uninstall HP Protect Tools Security manager and a couple of RELATED apps, including drive encryption, before he could continue. I guess if someone thought it would all proceed unattended and walked away at the start then the time before they found any hitches like this would ADD to to the total install duration experience.

I could see it taking that long (discounting any prompts as mentioned) on a slow as molasses Atom, sure, but is that also the case on a real PC?
Sounds like the installation procedure wasn't thought out too well though if prompts to uninstall software etc are given that far into the process, they should really be right at the beginning.

Edit: from reading the article, sounds like it would've been quicker to install 8.1 from scratch rather than updating from 8 to 8.1...much like Vista's service packs which also take an age to install.I updated from 8.0 to 8.1 during the Developer Preview, and I don't recall it taking any longer than I would have thought. Don't know about the final release though (or on WinRT for that matter) because Upgrading to the release version from the developer preview or consumer preview was not supported, so I did a clean install for that.It was about an hour for me. HP Pavilion laptop and I had no errors or prompts during the download/install.

Once complete the only issues were it disabled a few of my Startup programs and wanted me to update (through Windows Update) my graphics driver to an outdated version. I fixed my Startup programs and set Windows Update to forget the outdated update. Not a big deal for me but the graphics driver could cause problems for the unsuspecting. As I said, it took me a long time to install it on my new laptop...rough guess says that for about 3/4 of Freddy vs. Jason my computer was completely unusable because it was "Taking care of a few things". Luckily, I had a movie to keep me busy, but still.Definition of PEBCK on Jeopardy.

http://www.youtube.com/watch?v=lRPiNhLGGm8It's PEBKAC.
1118.

Solve : Wall Street watching early iPhone sales nervously?

Answer»

Alistair Barr, USA TODAY 8:06 p.m. EDT September 19, 2013
Quote

Analysts expect Apple to sell between five MILLION and 7.75 million new iPhones over this coming weekend.

SAN FRANCISCO — When Apple launches new products, Wall Street always watches closely. But this weekend, there's more on the line.

With questions swirling about the company's strategy and rising competition, investors will be scrutinizing every data point more than usual — including the length of every line OUTSIDE Apple stores — as two new iPhones go on sale Friday.

"This launch is more important than the past COUPLE because of the fall in Apple's stock price," said Brian Colello, an equity analyst at Morningstar. "During virtually every other launch, the outlook for the company has been more optimistic than what we see today."

When Apple LAUNCHED the iPhone 5 a year ago, the stock was trading above $700. Since then, it has slumped by a third and closed at $472.30 Thursday.
More Here[/b]
I demand an explanation! 5 million to 7.75 million is a lot to sell. Sure you will have some buying them for the very first time and others wanting upgrades, but it seems like the market is reaching a saturation point between people who already have the prior iPhones and those who are using other than Apple products. I am thinking that like 3.5 million may be a more realistic figure for actual sales with the REST of them sitting in boxes until sold later.
1119.

Solve : $100 Android tablets coming, says Intel?

Answer»

Could we be in the beginning of a major manufacturer price war or is this just generating buzz for the upcoming holiday season of spending?

$100 Android tablets with new chip coming, says Intel

Quote

Future Android tablets with Intel inside will approach two-digit pricing, packing a new -- as yet unannounced -- chip, Intel said Tuesday.

Upcoming Atom-based tablets will appear at the $100 price point, Chris Walker, GENERAL manager for tablet processors at Intel, told CNET today. Walker was echoing comments made earlier in the day by CEO Brian Krzanich.

My question. Are these aimed at "serious" users or are they going to be stripped down tablets heavily bundled with OEM software? I'm not totally against OEM software bundles. Without it we would not see what is considered to be low prices now on higher end tablets and phones. I just don't see 4 or $500 models dropping down to $99.

I sense lower end tablets with the best available HARDWARE. That's good but it's probably not going to appeal to someone who is already willing to spend upwards of $350. They might make good "on-the-go" tablets. Leave your expensive rig at home and carry around the cheap but functional model. I am interested in one of these if it doesnt use an ARM processor but instead Intel Atom able of running Windows to play around with. I have been looking for a small low power use system/device that can run as a server which does not need to be powerful, but the project wont work with an ARM based processor.

I have been looing at this mini computer for the server. http://www.newegg.com/Product/Product.aspx?Item=N82E16856101118

I will probably go with the mini computer instead since the storage capacity and processing power of such a tablet may require an embedded stripped down OS to run on it though, and the minicomputer makes more sense. But I like to tinker around and test the limits of hardware so I would pick one up for $100 to mess around with and see if turning one into a mini server device works for a server that has mostly idle time and little local network traffic.

Currently I have a old Pentium 3 laptop doing this, but I dont like that it runs hot even when at idle and even when telling the bios to operate 100mhz less in green mode at 500mhz vs 600mhz and the fans are all working, I opened it up thinking maybe a fan wasnt spinning, but its a Dell Pentium 3 LapWarmerThey also recently announced you will be able to OC SSD HDD's...
Intel will do anything to keep itself on Page One of Tech journals...and i don't see either happening soon...Quote from: patio on September 11, 2013, 03:36:27 PM
Intel will do anything to keep itself on Page One of Tech journals...

I kinda got that feeling also.I already have a "$100 Android tablet". It has an ARM cpu and plays 1080 video.
I don't get it.
Why would a $100 Intel Android be something anybody would want?
Why would you not like an ARM design? Quote from: Geek-9pm on September 23, 2013, 10:35:03 PM
Why would a $100 Intel Android be something anybody would want?
The CPU architecture probably doesn't make a huge difference in this case (unlike in the case of say Windows RT) because Android Applications are not native Applications but Are Java applications that run on the Dalvik VM.
Quote
Why would you not like an ARM design?
ARM Processors typically use less power, but as a result are a bit slower. So you get longer battery life, but depending on the specifics of the tablet you might encounter performance issues. Usually this isn't an issue since Tablets don't generally run a bunch of programs at the same time anyway.

Intel CPUs use a bit more power but their CPUs have traditionally been built with Performance as an up-front consideration.

Interestingly, ARM Holdings doesn't actually manufacture chips- they design chips and license out the chip design and their Instruction set to other vendors. One could presume that this could introduce minor inconsistencies between different ARM chips; this may be why you sometimes need a specially-compiled version of an OS for certain models.

One of the biggest reasons for Android tablets to use ARM processors is because ARM-based processors can have accelerated Java bytecode execution- this executes Java bytecode instructions directly on the ARM CPU, which will no doubt make Android Applications run loads faster when fully implemented, and would probably eliminate any speed advantage x86/x64 would have otherwise.
Quote from: BC_Programmer on September 24, 2013, 06:21:29 AM
ARM Holdings

A British company. The name was originally an acronym for Acorn RISC Machine and after the name Acorn was dropped, Advanced RISC Machine. Acorn were the people behind the BBC Micro and the 1987 Acorn Archimedes which used the first production chip design, the ARM2.
Thank you both, Salmon Trout and BC_Programmer.

I think this means that INTELL is struggling to get ahead in the current TEND toward smaller, more personal devices.

The last point BC made is something I wanted to express, but he said it better. Namely, when you have a good byte-code language with a large number of developers, you can eventually modify the hardware to favor the software. BC said it this way:
Quote
One of the biggest reasons for Android tablets to use ARM processors is because ARM-based processors can have accelerated Java bytecode execution- this executes Java bytecode instructions directly on the ARM CPU, which will no doubt make Android Applications run loads faster when fully implemented, and would probably eliminate any speed advantage x86/x64 would have otherwise.

Also of interest and within the range of this topic:
Quote
Apple's New 64-Bit ARM CPU
Apple's "Cyclone" processor core is the very first publicly launched 64-bit ARM processor. That's right. Apple beat everybody - even folks like Applied Micro (AMCC) in the server space - to the punch with a 64-bit design. While the benefits of moving to "64 bit" may not be immediately obvious in today's workloads, tests at Anandtech showed that ARM's new 64-bit ISA (which is actually a clean-slate, separate ISA from its 32-bit one) adds a number of neat instructions (particularly for AES), doubles the number of FPU and Integer registers (these are very fast pieces of memory on-board the chip), and does a bunch of other goodies that leads to improved performance.
http://seekingalpha.com/article/1699962-apples-new-64-bit-arm-a7-chip-is-absolutely-amazing
IMO, the writing is on the wall.
1120.

Solve : Li-Fi to replace Wi-Fi in China?

Answer»

Chinese scientists have successfully developed a new cheaper way of getting connected to internet by using signals sent through light bulbs instead of radio frequencies as in Wi-Fi, a move expected to radically change process of online connectivity.

Full StoryNot really anything new as for IR was an ability to send print jobs between an old laptop I had an a printer many years ago.

If they place the Transmit on one spectrum and Receive on another spectrum you can have full duplex communications without cross talk using filters at the receivers to only allow passage of a certain spectrum of light through which the photo transistors pick up on at the Access Point and the Computer.

BUT the biggest issue with this LI-FI which was also the failure for IR was that you need a clear shot between the computer and the device communicating with the computer.

BUT ALSO, the security risks of using LI-FI to me seems far less secure than WI-FI !!!, since a person miles away could have two telescopes ( 1 for each spectrum to pick up on the TX/RX ) pointed at your home with a receiver on each one with a filter for each spectrum, using basically an optical tap, and able to pick up the transmission, and RECORD it for later processing, or decipher it on the fly and be able to piece together the data contained in the strobed communication. *To me a place like China would love for this ability to optically tap with no traces that the tap ever took place!Quote

... a place like China would love for this ability to optically tap with no traces that the tap ever took place!...
What does that mean?

From the article:
Quote
The term Li-Fi was coined by Harald Haas from the University of Edinburgh in the UK and refers to a type of visible light communication technology that delivers a networked, mobile, high-speed communication solution in a similar manner as Wi-Fi.

Making any comparison with the now forgotten IR thing is not fair. The Chinese innovation can replace Wis-Fri *in public areas.

*Firefox spell check prefers Wis-Fri instead of the other spelling. I was told to spell check my posts, so don't blame me., talk to the Firefox people.

Firefox does NOT suggest wis-fri...period.

Now your inventing things...It is the Firefox spell checker..

Now, about in venting thins. Where does this idea that Light signals can not be traced? Then article is about using light for distribution over an area in place of using radio signals. The communication has to be INTER active. It has the same underlining technology as the Wi-Fi equipment.

The reason fort using light, says the article, is to reduce costs. LEDs are super cheap. Certifiable 802.11 devices are not so cheap. To assume that the LEDs hide the identity of the recipient is pure pulp fiction. It has t o be two-way communication. It is called full duplex, if you need a label.

Anyway, it is a real innovation, but not really a discovery. Using visible light means it will really be line-of-sight. Literally. Still, a one-watt LED can be very bright. Potentially a wide area could be covered by two or three transceivers. Perhaps a public library. An Airport, train station, rice paddy or fish market.

Will it be useful here? Not if it is free.


It's an interesting idea but I can't really see it being practical.

I remember years ago my family had a Sony Handycam Hi-8 camcorder that could send the video to the TV via Infra-red light (With the help of a little receiver) - While this worked it was pretty unreliable e.g. if someone walked in front or the alignment got knocked off the picture would fail. And transferring data will be a lot more prone to issues like this compared to composite video from the old camcorder.

I really can't see how this could be more practical than WiFi in any way - As soon as you move the machine between locations your link will LIKELY drop out. I can't see it being cheaper either as the price of mass-produced WiFi gear is so low nowadays.

I don't really see an issue security wise though - The link would likely still be encrypted in some way so in that respect it would offer the same security as WiFi.

Interesting to see that it came from the University of Edinburgh (Where I study) though - I hadn't seen anything about it.

To me, this sounds like a 'research' type project to see what is possible.etc and has maybe been misinterpreted as to it being a technology that is about to come into the consumer market, while it is pretty amazing to see data at that speed transmitted over visible light without issues with interference, I can't see it taking over from RF communications - Mobile phones/PDAs moved from IR to Bluetooth and later WiFi for a reason!Quote
Interesting to see that it came from the University of Edinburgh (Where I study) though - I hadn't seen anything about it.

You should talk to your professers more...camerongray, your point is a valid argument. Until the real technical details are GIVEN, there is to easy way to know it is anything other that wishful thinking.rough.

A quick search shows many 'experts' making commentates about this item as if nit was a real breath of fresh air in the the world of wireless. Yes, line-of-sight and moving objects are real limitation of super-high frequency communications.

Here is an article NOT directly related. But it prides a background of what the issues are in sending a lot of data from one point to another.
http://en.wikipedia.org/wiki/Advanced_Extremely_High_Frequency
The article shows why the military have an interest in this form of radio communication. It also shows why line-of-sight is not the absolute limit.

Now back to topic. It is not impossible for the researches to have made a real discovery. We already know that Gama radiation will penetrate objects like the human body. But the Chinese said it was visible light. Or did they? Are there discreet wavelengths that penetrate in the visible spectrum? Conventional wisdom says 'No, only X-rays do that, never visible light.'

What abo0ut the professor from the UK?
Here is a video of him earlier this year.
http://www.nutshell-videos.ed.ac.uk/harald-haas-d-light/
IMO he is areal ENGINEER doing real research.
He admits to the moving object issue. But pay attention his answer to the obvious question.


1121.

Solve : Blackberry going private.?

Answer»

Bloomberg and others are talking about a deal to make Blackberry a privately held company. About five years ago it was worth about 7 billion. Look at this starry:
http://www.bloomberg.com/news/2013-09-23/blackberry-gets-tentative-4-7-billion-deal-to-go-private.html
News for blackberry on Bloomberg

Quote

...
The group led by FAIRFAX Financial Holdings Ltd. (FFH) would offer $9 a SHARE in cash, according to a statement today -- a 3.1 percent premium over BlackBerry’s closing price last week. The consortium is STILL seeking financing for the offer, which will be subject to due diligence and further negotiation.
BlackBerry, the one-time smartphone leader, was forced to seek buyout offers this year after a new operating system failed to fuel a comeback. For the next six weeks, a Fairfax-led group will scrutinize the device maker’s books while BlackBerry CHIEF Executive Officer Thorsten Heins and a special board committee see if there are any alternative proposals.
...
How can you explain this?An INTERESTING fact. Prem Watsa - The founder, chairman, and chief executive of Fairfax Financial Holdings who is intent on buying RIM used to be on the RIM board of directors. He stepped down from RIM last month to avoid conflict of interest in the buyout.

Quote from: Geek-9pm on September 23, 2013, 09:10:58 PM
How can you explain this?

It's not necessarily the company they want but rather the patents. Patents are where the money is.
1122.

Solve : USA Judge dismissed a class-action lawsuit against Google.?

Answer» WASHINGTON: A federal judge in the United States has dismissed a class-action lawsuit against Google.
The MOVE COMES after the judge FOUND that the WEB giant's browser cookie tracking practices had not caused them any harm.

Full Story

1123.

Solve : Google pulling the plug on Reader?

Answer»

I'm surprised that they didn't attempt to integrate it into Google Plus. Makes me wonder if Google Plus will be in the next round of spring cleaning.Google Plus is gone this YEAR...forget where i read it...most likely TechSpot.Sounds good to me. Never liked it to start with.Looks like a favorite is emerging. Feedly adds bandwidth, picks up over 500,000 Google Reader users in 48 hours

Quote

To keep the service up, we 10x our bandwidth and added new servers.

I checked out Feedly before starting this topic and it was slooow, maybe due to the Google announcement. I might have to revisit it now that they are beefing up the servers.I am really missing the Google Reader. Even though i have other options.After running RSSOwl along with Google Reader for a few WEEKS I have come to an uncomfortable realization. I should have dumped it long ago. Some feeds never even show up in Google Reader. It may be 1% or even far less but that's still too many.

Quote from: evilfantasy on March 15, 2013, 08:32:57 AM
I'm thinking about going to a desktop application instead of a browser based one this time.

I think I'll STICK with RSSOwl. Too many of the others are not really FEED READERS. They are bloated applications or web pages with features having nothing to do with RSS.Feed Demon and Sharp Reader are worth a looksee...FeedDemon's main function is to synchronize with Google Reader so when GR is gone so is FeedDemon.The more i dig...the more confusing it becomes...

RSS alive in Chrome...

Go figure.Revisiting this for a moment.

Quote from: evilfantasy on March 14, 2013, 08:57:21 AM
Update: with Google Reader's demise, FeedDemon's developer has announced FeedDemon's death as well.

FeedDemon was given a final update and the release was actually the Pro version but is now free including no ads. The FeedDemon Support pages are still active...

Quote from: evilfantasy on April 10, 2013, 07:01:32 AM
I think I'll stick with RSSOwl...

Ultimately the bugs and stability issues got to be too much and I removed RSSOwl from my computer earlier in the week. I've been running FeedDemon for 4 or 5 days now and while I like the RSSOwl features a little more, FeedDemon is much more stable.
1124.

Solve : Windows 9?

Answer»

Found this an interesting read in my e-mail today: http://www.infoworld.com/t/microsoft-windows/theres-reason-hope-windows-9-will-be-better-227587?source=IFWNLE_nlt_daily_pm_2013-09-26Quote

Windows 8 (and 8.1) is one of the largest disasters in Microsoft's history.

People keep echoing this and ignoring EVIDENCE that says the EXACT OPPOSITE. WinRT? Yeah, maybe. That certainly didn't make inroads. But Windows 8 and 8.1? Nope. THREE weeks after release Windows 8 had 4% market share. In three weeks of Windows 7's release, it had 3%, and Vista took several months to get to that value. Right now it has 8%, which is still more than all Linux and OSX combined.

Worst of all is Gabe Newell. He really likes to spread FUD about Windows 8, and he hates it so much he's guided the entire company of Valve in the direction of Linux. It's funny- they could starte development on a game that is guaranteed to gross unprecedented revenue (Half-life 3) but they decide, 'nah, lets make a crappy Linux distribution' Worse still is Gabe's comment that he "make Windows a viable gaming PLATFORM" Which is nonsense. Half-Life didn't even release until late 1998, LONG after Gaming had moved from DOS to Windows. Hubris-filled MORON who has been spending too much time getting stuck in doorways and not enough time doing anything useful.Quote from: BC_Programmer on September 27, 2013, 08:46:34 AM
spending too much time getting stuck in doorways
BC mocks Gabe...HALF LIFE 3 CONFIRMED!

I find it amazingly ironic that not even 2 days after I made that post, Valve submitted a trademark for Half Life 3.
1125.

Solve : Google Shared Endorsements in Ads?

Answer»

Do you have an active Google+ account? If yes then Google Shared Endorsements in Ads will affect you!

Google, sadly, has taken a page out of Facebooks all invasive anti-privacy standards and are allowing themselves to use your Google+ profile information for 'Shared Endorsements in Ads' without users direct consent. What does that mean? Recent changes to the Terms of Service agreement include, by default (for most but not all), permission for Google to use your Google+ profile information in ads. They can and will use your name, profile picture, user ratings, reviews, recommendations and endorsements in ADVERTISEMENTS beginning November 11 2013. Furthermore they do not include the fact that you can opt-out. Not cool.

Thankfully there is an easy way to opt-out as described in an article I found on TechCrunch. Google is planning to using your face and name for the sake of advertisements
Quote from: Greg Kumparak - TechCrunch

  • Click this link. (And, if necessary, log in to the Googles. I promise that’s a link to actual Google, not fake Google that steals your password and uses it to order handbags.)
  • Uncheck the checkbox. UNLESS it’s already unchecked — in which case, leave it unchecked. Oddly, some people are saying they’re opted out by default; others say they find it checked. tl;dr: check = bad.
  • Hit save!
And you’re done*.
[* Until there's another TOS change, in which case, get ready for another rousing game of find the checkbox!]

Opt-out of Google Shared Endorsements in Ads: Shared Endorsements in Ads
How to secure your Google+ profile: Google+ Privacy and Security Settings
Keep Gmail but delete your Google+ profile: Delete your Google+ profile

Secure your Facebook account: 5 Things You Can Do NOW To Secure Your Facebook Account & Make It Recoverable
How to delete your Facebook account: How do I permanently delete my account?I saw no opt out option at any of those links...i'm hoping this means my account is setup properly.Bottom of the page here? https://plus.google.com/settings/endorsements?hl=en

Should be a check box next to "Based upon my activity, Google may show my name and profile photo in shared endorsements that APPEAR in ads."

Some are saying that it was already unchecked but I haven't found where anyone has said the check box is not there at all.A little more reading and this Shared Endorsements in Ads thing may not be quite as SINISTER as it sounds. Kind of like what you see on websites that use Facebook social plug-ins.

Policies & Principles - Overview > Terms of Service > Updates > November 11, 2013 > Summary of changes > Terms of Service update October 11, 2013

First. An insult from Google.

Quote
Because MANY of you are allergic to legalese, here’s a plain English summary for your convenience.

Yea, if you don't have a law degree Google just called you stupid...

Anyway. It's not a long read and to me this is the important part.

Quote
How your Profile name and photo may appear (including in reviews and advertising) We want to give you – and your friends and connections – the most useful information. Recommendations from people you know can really help. So your friends, family and others may see your Profile name and photo, and content like the reviews you share or the ads you +1’d. This only happens when you take an action (things like +1’ing, commenting or following) – and the only people who see it are the people you’ve chosen to share that content with. On Google, you’re in control of what you share. This update to our Terms of Service doesn’t change in any way who you’ve shared things with in the past or your ability to control who you want to share things with in the future.

You can control whether your image and name appear in ads via the Shared Endorsements setting.Am I understanding it correctly, that if one doesn't have a Google+ account, there's nothing changing here?
I followed the link in your quote but get taken to a page to set up a Google+ account.Yes you need an activated G+ account to be included in the Shared Endorsements in Ads.Cool, thanks for clarifying My first post is a little mis-informed but by the time I figured it out I couldn't go back and edit it. I will ask a moderator to edit it for me. I hate mis-information. No worries, I just wanted to be sure nothing was changing for me as I don't have G+. Want me to add that info in, or trust those concerned by this to read down the page? Check your PMs in a minute.Sorted Thanks!
1126.

Solve : LoveINT’:NSA Employees are Cyber-Stalkers says ABC?

Answer»

ABC NEWS reported this. The news network reports a super USA GOVERNMENT agency has allowed some employees to use Super CYBER technology to track love interests.
The article tends to downplay the ENORMITY of the issue by calling it just a courtship gesture.
Yeah. Sure
OK, you read it for yourself

Given Immense Powers, NSA Employees Super Cyber-Stalked Their Crushes

By Lee Ferran @leeferran Sep 27, 2013
Quote

In nearly a dozen incidents over the last decade that take the term “cyber-stalking” to a whole new level, NSA employees broke NSA rules to enter phone NUMBERS or email addresses associated with their romantic interests, in one case an ex, into vast databases to see to whom they were talking, according to the agency’s Inspector General.
Also look at a related item. (Also ABC News.)
The NSA’s Rules for Accidentally Spying on You
1127.

Solve : New proof-of-concept: malware hiding in graphics cards?

Answer»

Full title is:
New proof-of-concept tool detects stealthy malware hiding in graphics cards
Source: PCWord magazine Sep 27, 2013

Note to Moderator:This is mot not paranoid fear. It is hard fact. Many video cars have firmware. The firmware has been compromised.

Full Stormy Story Here...

Standard FUD, standard fare for PCWorld.

Quote

Peripheral-based malware is particularly difficult to detect, because it doesn’t have to rely on a weakness in your computer’s operating system, according to Stewin. Instead, it takes advantage of the processing power already present in peripherals like graphics cards that may not be expecting an attack.
In order to get into the peripheral, the malware would have to exploit a weakness somewhere. Firmware updates to a Graphics Adapter typically require pure DOS operation, and flashing tools will require certain Security keys within that Firmware package to check out or it will refuse to flash the hardware with that firmware. Therefore the only alternative would be for a malicious user to create a new Firmware package installer. The Technical details of flashing the Video BIOS are not exactly well documented, however; and often have minor nuances between versions. a 9800GT may require one thing, and even a 9800GTX+ will require some other thing. NVidia and the various manufacturers know how their hardware works and can make generalized solutions since they have all the important information. But outside of that information bubble all there is is guesswork.

Quote
Graphics cards, sound cards, and other PC components can process data using direct memory access (DMA). Instead waiting to receive data processing via a PC’s CPU, a graphics card can bypass the CPU to access and process graphical data directly from memory.
What it fails to mention is that the Video BIOS, which is the only flashable component (even with the above limitations) is ACTUALLY replaced quite early in the boot process by the 32-bit Drivers., which typically even take over the VESA 3.0 capabilities, making the Video BIOS no longer actually execute for anything (the BIOS itself is masked into system RAM for system initialization but is otherwise dormant.

Quote
Once infected, DMA attacks can do all sorts of damage, such as copying encryption keys or installing other types of malware for identity theft
DMA access of a peripheral means it access memory directly. This means that the device doesn't have the advantage of understanding the virtual memory address layout of the system. This paired with ASLR makes it impossible to fathom how such a device would be able to use DMA to access System Data, particularly since DMA access is restricted to certain memory locations. In fact, the CPU is the one that invokes a DMA transfer, and EFFECTIVELY locks the portions of Memory that can be accessed. A n-memory Texture can be transferred to the Video Card VRAM but this transfer is invoked by the CPU and the Application, which will essentially restrict the memory access possible in that transfer to that section of Memory. Therefore even ignoring the fact that such a piece of hardware-based malware wouldn't know where to look in the entire physical Memory for such data (and certainly couldn't scan all of it without causing a DMA timeout), it cannot access beyond what the DMA controller gives it access to. It's called "Direct Memory Access" but it still has to go through the Memory Controller.


The Paper has no Citations and has been cited zero times. It READS more like an advertisement of BARM than any serious research paper, and the parts that might count as experiment read more like a narrative.BC, thanks for reading the article
The PCworld article is none of the worst I have ever used. The point being made is the firmware infection is known to exist. There are many documented cases of firmware infection. I posted this as a news item due to is timely relevance to to the 2013 security congress. That detail makes it newsworthy, even tho it was badly written for technical detail.

Yest another link:

HP fix for network card weakness.


Quote
Conference Proceeding
A Primitive for Revealing Stealthy Peripheral-Based Attacks on the Computing Platform's Main Memory
Patrick Stewin
10/2013; In proceeding of: 16th International Symposium on Research in Attacks, Intrusions and Defenses, Volume: 16

BC, do you understand un-time polymorphism?When the malware gets into your firmware, it does not wave a red flag ans say 'here I am'. It uses resources hidfe its presence. Source code that does this has been already published some time ago.


Here are names of people. No, not mentioned in the article, but deeply involved in research about malware threats to PCs and other devices.

Giorgos Vasiliadis
FORTH-ICS, Greece
[emailprotected]

Michalis Polychronakis
Columbia University, USA
[emailprotected]

Sotiris Ioannidis
FORTH-ICS, Greece
[emailprotected]

Moderator: These people published emails in an article about how a GPU can help a malware do its thing. Take out the e-mail if you want, but it can be found here.
http://dcs.ics.forth.gr/Activities/papers/gpumalware.malware10.pdf

For the average user, knowing how it does it evil work is not the issue. People need to know the researches are finding the malware is worse that what sone might think. Really, Intel and AMD 386 code does NOT have some magical barrier that keeps out evil intent.

Another detail. This is about a book.
Quote
Rent 1st edition today, or search our site for Salvatore textbooks. Every textbook comes with a 21-day "Any Reason" guarantee. Published by Springer.
Another link.
http://www.raid-symposium.org/

I could go on and provide more links. Such links are not light reading. But it is a real topic. Dull reading for most of us. But the danger is real.
For more, search http://www.raid-symposium.org/
Soon detention programs will be available.
Here is a good read from Gizmo's. But it was two years ago. Times have CHANGED. http://www.techsupportalert.com/content/next-generation-malware-attacks-pcs-firmware-hardware-devices.htm
If you are still SKEPTICAL, read the Gizmo page.

Yes, my writing skills are weak. But the message is strong.
1128.

Solve : IE 7 complete?

Answer»

Quote

I installed it about 8 hours ago and my computer hasn't blown up. Haven't used it a lot yet, since I do have Firefox, but I would say it's much improved over IE6.

As in it WORKS? As in it is secure?
Quote
Quote
I installed it about 8 hours ago and my computer hasn't blown up. Haven't used it a lot yet, since I do have Firefox, but I would say it's much improved over IE6.

As in it works? As in it is secure?
maybe sometimes... and ms doesnt understand that wordFunny how not even 24 hours after release, a research company found a big security hole connected with Outlook Express... The hole allows confidential information to be leaked. Should we be suprised?

FlameAny security problems with Outlook Express would be unrelated to a IE7. Outlook Express was not included with IE in this latest version of IE. So, after installing IE7, I still have OE6.Quote
Quote
I installed it about 8 hours ago and my computer hasn't blown up. Haven't used it a lot yet, since I do have Firefox, but I would say it's much improved over IE6.

As in it works? As in it is secure?
Oh, it definitely works. Is it secure? Well, it's surely more secure than IE6. I have absolutely no security concerns about using it. But then, I used IE exclusively until about three weeks ago when I installed Firefox, and I had no security concerns about using IE6. With a NAT router, a software firewall, anti-virus, and anti-spyware tools in my arsenal, I had no concerns whatsoever about using IE6, and still would not if I were still using it.
I've had this on my comp for a week and i have to say i haven't had any problems with it at all in that time.

Quote
Any security problems with Outlook Express would be unrelated to a IE7. Outlook Express was not included with IE in this latest version of IE. So, after installing IE7, I still have OE6.


Hold it right there cowboy.

Redmond (WA) - Microsoft is blaming a recently reported Internet Explorer 7 VULNERABILITY on Outlook Express. Internet Explorer 7 was released a few days ago, but it took less than 24 hours for Secunia, a security research company, to announce a vulnerability. The vulnerability could allow hackers to gain confidential information by redirecting web traffic to other sites.

You can read the Secunia's advisory here. According to Secunia, the vulnerability affects fully patched Windows XP systems with Service PACK 2.

Christopher Budd from the Microsoft Security Response Center responded to the announcement by blaming the problem on Outlook Express. "The issue concerned in these reports is not in Internet Explorer 7 (or any other version) at all. Rather, it is in a different Windows component, specifically a component in Outlook Express," said Budd.

Thomas Kristensen, Secunia's CTO, DISAGREES with Budd and said that the vulnerability is "fully exploitable" through IE7 and adds that IE7 is "the primary attack vector, if not the only attack vector."

You can download Internet Explorer 7 from Microsoft's website here.

http://www.tgdaily.com/2006/10/20/microsof...outlookexpress/
but do you want to?/ if yo get this message then that might mean it can screw ur computer up??? i just tried to install cuz im reformatting oon anyways but i decided not too..
\
\

plus how could it be outlook it cant browse the net:-? unlovedwarrior, what's the point of your POSTING that image? That's a standard message that everyone sees when downloading and installing IE7. Nothing unusual about that. In fact, the procedure recommended there is a good practice when installing any software.i say nay.... but on well i will remove.. i put that up to show it could screw your comp upQuote
Hold it right there cowboy.

Aww, Flame you've become such a big boy! I'm so proud of you! *snickers*
1129.

Solve : Mozilla Launches Firefox 2.0   (10-23-06)?

Answer»

Man I'm quick! lol

http://www.betanews.com/article/print/Mozilla_Launches_Firefox_20_Browser/1161617884that you are... im going to dl it when i get homeHonvetops I have a request...
How about posting the first couple of paragraphs of the links you put up?
Just enough to allow your viewers to decide if they should click on the link to read on.
It's a dialup thing. Quote

The Mozilla Corporation on Monday posted to its download site the final release of Firefox 2.0, the second-generation release of the POPULAR alternative Web browser. An official announcement is expected Tuesday.

New features in Firefox 2.0 include ENHANCEMENTS in security, tabbed browsing, performance, and EXTENSIONS. The browser update also includes a built-in spell checking and an anti-phishing feature, much like Microsoft's INTERNET Explorer 7, which launched last week.



i gotacha this time lol..

smart idea fedi have installed it.
and all the pages seen to load twice as fast then before
i like itQuote
Honvetops I have a request...
How about posting the first couple of paragraphs of the links you put up?
Just enough to allow your viewers to decide if they should click on the link to read on.
It's a dialup thing.

[highlight]sounds like a PLAN! ~ 10-4 [ 10-24-06 9AM E.S.T] [/highlight]
1130.

Solve : Apples Ipod code > "cracked"  update?

Answer»

[highlight]this guy kinda looks like Rob's brother [/highlight]

Now Johansen claims he's mastered the inner workings of the iPod and its FairPlay encryption technology, allowing him to remove MANY of the restrictions Apple places on its users.


http://www.theage.com.au/news/digital-music/apples-ipod-code-cracked/2006/10/24/1161455702584.html
[highlight]**update BELOW**[/highlight]

Hacker To License iPod Code
Parmy Olson, 10.26.06, 3:00 AM ET

London -
Just months after Apple Computer was found guilty of breaking Norwegian law with its iTunes downloading service, a native of the nippy European country has just returned the favor.

John Lech Johansen, a 22-year-old hacker known to those of his ilk as "DVD Jon," claims to have cracked the code that Apple uses to tie iTunes files exclusively to iPod players.

He has typically posted license-circumventing codes on the Internet free of charge, having most infamously release a software system that scrambled DVD licensing codes when he was 15. Seven years later, it seems the young techie has caught the capitalist bug.

Johansen intends to license the code to media distribution companies, allowing their songs and videos to by-pass the iTunes online store, but still be played on an iPod.

DoubleTwist Ventures, a tiny, San Francisco-based company which Johansen joined in June of this year, TOLD The Associated Press that an unnamed client was already due to use the technology.

The company has already consulted attorneys about licensing the code and believes that while Apple could give it a "certain amount of trouble," it won't be able to put a stop to things.

In a nutshell, Johansen has reverse-engineered the Digital Rights Management system that resides in Apple's iPods, known as FairPlay. Rather than remove the copy protection, however, his code applies FairPlay to other music and videos files, making them "fool" the iPod into playing them.

Other outfits like RealNetwork's RealPlayer Music Store, have already tried to dodge Apple's copy-protection technology, but haven't gained much traction.

Ovum technology analyst John Arber believes that Johansen's attempt will, like its predecessors, prove to be a flash in the pan. "Apple will stamp on any anything that might ALLOW competitors like Yahoo!'s Yahoo! Music, Rhapsody and Napster, to TAKE a bite out of its revenue," he said. "And whether any of them even take Johansen up on this offer is a different matter, because the legal status is unclear."

Even if Johansen doesn't get dragged into court by Apple, the Cupertino, Calif.-base company could simply end up releasing a patch or software update for iTunes that stops the program, Arber said. "I would have thought they have some kind of contingency plan for this."

that upset my stomach... with EXTREME joy ive been waiting for something like thisIf you have a NEW Ipod, check it out carefully. Some were released that were already infected with a virus.lol mines an old minihow were they already affected by a virus? and what does the virus do?Another example not to buy an iPod. Also yea how did they manage to infect them with viruses?!


Chris


Edit: A bit of googling returned this. http://www.macworld.com/news/2006/10/18/ipodvirus/index.php?lsrc=mwrss

1131.

Solve : AMD plans "Fusion"  of their CPU?

Answer»

Advanced Micro Devices plans to make chips integrating its x86 with a graphics processor on a single piece of silicon by early 2009. The announcement came as AMD completed its $5.4 billion merger with graphics chip manufacturer ATI Technologies on Wednesday.
The project, code-named "Fusion," will lead to chips for a broad range of applications, from laptops to servers, AMD said.
PC manufacturers can already put a graphics processor next to the main processor on a PC's motherboard, rather than adding a dedicated graphics card in a PCI SLOT, allowing them to reduce the cost -- and SIZE -- of their computers.

Packaging the main processor and graphics processor on one chip will take this integration further, and lead to a jump in power efficiency, AMD said. The Fusion chips could even show up in consumer electronics gadgets and products for emerging markets, where low cost and low power consumption are often important.
AMD won't shut the door on developers of coprocessors such as physics accelerators or high-end graphics chips for gamers: the Fusion chips will continue to support such EXTERNAL devices over the PCI Express bus, the company said.

Although AMD said it will take until late 2008 or early 2009 to build the Fusion chips, other fruits of its merger with ATI will show up sooner.
From 2007, AMD plans to DELIVER versions of its Turion 64 mobile processor more closely integrated with an external graphics processor, resulting in extended battery life for notebook computers, it said.
Sounds good. When I first started reading your post, I was wondering whether that would preclude use of add-on video cards. I think that could limit their market potential. But, then you said, "AMD won't shut the door on developers of coprocessors such as physics accelerators or high-end graphics chips for gamers: the Fusion chips will continue to support such external devices over the PCI Express bus, the company said." That's good.Yes. A scary thought that you couldn't constantly be spending to upgrade your system.

On the other hand that could resolve some issues if there were standardized hardware and OEM's didn't tweak their little components, for better or worse.my newbie opinion to me is this is to maximize and lower the energy consumption somewhat but can't understand why integrating on the cpu rather than just keeping the chip on the mobo will be "that" much of a better thing?
Maybe with the speed aspects/ ram ?
:-/
Space...But can it make coffee?or at least come with a built on cup holder lol

1132.

Solve : ATI Rival Nvidia Asserts Independence?

Answer»

SANTA CLARA, Calif., Oct 24 (Reuters) - Nvidia Corp. is confident it can stay independent despite the recent takeover of its main rival, and it sees big growth opportunities in areas such as mobile, where it expects sales to double annually, executives said on Tuesday.
Nvidia has been the target of merger speculation since Advanced Micro Devices Inc., the No. 2 maker of computer processors, announced it would buy Canadian graphics chip maker ATI Technologies Inc. for $5.6 billion.
Some analysts
Some analysts have suggested Nvidia could end up being bought by No. 1 chip maker Intel Corp., or at least being forced to strike some sort of in-depth partnership like a licensing deal.
Mike Hara, Nvidia's vice president of investor relations, reiterated his company's determination to stay independent.
"It reinforces our philosophy that we don't want to be tied up," Hara told Reuters when asked about the ATI deal.
"I don't think anything changes. In fact, what we've already felt and seen I think gives us the energy to push faster. While AMD and ATI figure out what their FUTURE looks like, we know what ours looks like," Hara said.
Nvidia and ATI are also big suppliers of chipsets—the collection of secondary chips and INTERFACES that sit next to a PC's main processor. AMD gets about half its chipsets from Nvidia, and both companies say they expect that relationship to continue even after ATI is folded into its new parent.
Hara said AMD and Intel, which are battling it out for supremacy in the PC processor market, still need Nvidia as much as ever.
"We've become the necessary evil for both companies because they can't compete with each other using their own technologies," Hara said.
With sales of $2.4 billion last year, Nvidia has been trying to expand beyond its core desktop computer market, and has its eye on the fast-growing market for mobile devices, which is dominated by ATI.
The Santa Clara, California-based company expects sales of its graphics and video chips for mobile phones to double this year to more than $100 million, and believes it can maintain that pace for several years, another executive said.
"Last year we did $55 million, this year we'll double that, and as far out as I can see we'll continue to double that," said Michael Rayfield, general manager of Nvidia's wireless media processor business.
"I can see out toward north of a billion (dollars) by that doubling process," Rayfield told Reuters in an interview.
The total market for such mobile chips is expected to reach $7 billion in 2011, compared with less than $1 billion now, Rayfield said. 8-)
umm... i wonder when ms is goingto try to start buying things?? lolThey own all of them already. What MS don't own and can't buy, they steal. therer trying to still my soulQuote

therer trying to still my soul


Well put.Quote
Quote
therer trying to still my soul


Well put.

Very poetic.Be still my soul...just cuz i cant spell right DONT mean you guys have to pick onn me...Quote
just cuz i cant spell right dont mean you guys have to pick onn me...

What makes you think we're picking onn you?

By the way, does anyone else think the ATI website is darn ugly? I typed in the adress and got confused, I wasn't expecting something that looks like breath mints..lol i noQuote
lol i no

LOL. I know.Quote
Quote
lol i no

LOL. I know.

Get 'em GX1....
1133.

Solve : Seagate to encrypt data on HD?

Answer»

Seagate Technology LLC hopes its new security system for the hard drive will become the most formidable barrier between COMPUTER data and thieves.

The world's largest hard drive maker says its DriveTrust Technology, to be announced MONDAY, automatically encrypts every bit of data stored on the hard drive and requires users to have a key, or password, before being able to access the disk drive.

Technology that protects the hard drive _ the computer's storehouse of data _ differs from most security products launched in the past several years. Such products typically put firewalls around computer networks, encrypt data files or defend the operating system from invasions.

Protecting the hard drive itself offers another layer of protection and might stop thieves from purloining confidential information from lost or stolen laptops. Errant notebook computers have cost government agencies and corporations millions of US dollars and put sensitive data _ including customer credit cards or social security numbers _ on the street, possibly in criminal hands.

"I believe other companies will be FOLLOWING suit and it will become an industry standard," said John Monroe, a research vice president at Gartner Inc.

Laptop computers with DriveTrust-based hard drives would prompt users to TYPE in a password before booting up the machine. Without the password, the hard drive would be useless, Seagate officials said.

Even data-recovery specialists would not be able to help if the assigned password somehow gets lost, said Scott Shimomura, a senior product marketing manager at Seagate.

"That's the trade-off: Anytime you introduce backdoors or holes to circumvent the security, then you've created vulnerability," Shimomura said.

Seagate said it has already implemented the technology into one of its drives for laptops and another for digital video recorders.

Though DriveTrust is proprietary, Seagate may eventually allow other storage companies to integrate it into their own products. Seagate will offer development tool SETS for other companies to create additional security layers to work with DriveTrust.

"We believe the entire industry will benefit from it," Shimomura said.
I can allready see the million of idio... I mean, people, who accidently encrypt their HDD and can't get their files off anymore. So much for data recovery for free.I see us having a new Help section titled Encryption Woes...Can You Help ? ?

1134.

Solve : 3rd grader  "mentality" IBM Einsteins?

Answer»

Boffins at IBM have developed a technique for managing the temperature of chips that they claim can double cooling efficiency.

At the BroadGroup Power and Cooling Summit in London this week, Big Blue tackled the increasingly urgent need to REMOVE the large amount of heat released by today's more powerful processors with a technique called 'high thermal conductivity interface TECHNOLOGY'.

As chip performance continues to progress according to Moore's Law, efficient chip cooling has become one of the most vexing problems for designers.

The approach used by IBM addresses the connection point between the hot chip and the various cooling components used today to draw the heat away, including heat sinks. Special particle-filled viscous pastes are typically applied to this interface to guarantee that chips can expand and contract owing to the thermal cycling. This paste is kept as thin as possible in order to transport heat from chip to the cooling components efficiently. Yet, squeezing these pastes too thin between the cooling components and chip would damage or even crack the chip if the conventional technologies are used.

IBM researchers developed a chip cap with a network of tree-like branched channels on its surface so that when pressure is applied, the [highlight]paste spreads much more evenly and the pressure remains uniform across the chip,[/highlight] allowing the right uniformity to be obtained with nearly two times less pressure, and a 10 times better heat transport through the interface.

IBM said it borrowed the design from biology, where it is found in tree leaves, roots, or the HUMAN circulatory system.

"Electronic products are capable of amazing things, largely because of the more powerful chips at their heart," said Bruno Michel, manager of the Advanced Thermal Packaging research group at IBM's Zurich lab. "We want to help electronics makers keep the innovations coming. Our chip-cooling technology is just one TOOL at our disposal to help them do that."

[highlight]**wonder how many millions $$ were spent on this wacky theory ummmm be carefull !!! **[/highlight]
it sounds decent if they can get it to work and make it cheap for normal usersQuote

Boffins at IBM have developed a technique for managing the temperature of chips
I just blow on 'em. Simple but effective.








You probably have to be British to understand that gag.i guess so, is that something like the british comedy where they run around chasing each the whole time..>Chips<.


Yummy.You know, if you eat too many of those "chips" it turns your hair white and enlarges the "head"! Quote
You know, if you eat too many of those "chips" it turns your hair white and enlarges the "head"!

What Head? :-?
1135.

Solve : AVG Free 7.1 Discontinued?

Answer»

LUCKILY, you can GET AVG FREE 7.5 here:

http://free.grisoft.com/doc/5390/lng/us/tpl/v5
1136.

Solve : ummmm... interesting?

Answer» http://www.dailytech.com/article.aspx?newsid=4445

i still like you dellI would never buy Dell products.

If I were to shop for a laptop it'd either be a HP or an Acer.

I'd never-ever consider buying ANYTHING that carries the name Dell. Unless it came for free, ofcourse. In which case I wouldn't be buying it.Quote
y dont you like dell

Because they have strange standards like PSU's that don't always fit, you can't buy them in stores and getting replacement parts is probably a pain too. Just like with Compaq replacement parts, except that Compaq made some nifty machines.On the other hand I would not hesitate to suggest Dell to anyone not capable of building their own machine. I do, however, prefer the business models over the strictly consumer lines, that is Optiplex over Dimension, Latitude over Inspiron, etc. I have had nothing but excellent equipment, STELLAR service, and tech support in English. i get choppy english every once in while but i got crappy english so i can kinda understand themQuote
i get choppy english every once in while but i got crappy english so i can kinda understand them

You should definitely record one of your tech support sessions for US to listen to at CH!Quote
how do i do that

Be creative. Well, this is a response to a month OLD post, but not all Dells are bad, any more than all Acers, Compaq, etc. are not bad. The low end models for any company are LIKELY to be less finely constructed, and I'll bet that was a low end Dimension you had.
1137.

Solve : Microsoft to support Linux platform !?

Answer»

They KNEW they were GOING to be BED PARTNERS LATER.

1138.

Solve : YouTube wins Time's 'Invention of the Year'?

Answer» YOUTUBE wins Time's 'Invention of the Year'
Video site beat out a vaccine and a hug-simulating shirt for the honor
The Associated Press
Updated: 4:45 p.m. ET Nov 6, 2006
NEW YORK - YouTube, the video-sharing Web site recently acquired by Google Inc. for $1.65 billion, beat out a vaccine that prevents a cancer-causing sexually transmitted disease and a shirt that simulates a hug to grab top honors as Time magazine's "Invention of the Year for 2006."

Time magazine, owned by media conglomerate Time Warner Inc., wrote in an article that YouTube's scale and sudden popularity have changed the rules about how information — along with fame and embarrassment — gets distributed over the Web.

YouTube, which had 27.6 million unique visitors in September, according to Nielsen NetRatings, came along at just the right time, according to Time: social-networking Web sites were hot, camcorders were cheap and do-it-yourself media was expanding beyond text-based blogs.

YouTube inherits the tiara from Snuppy, a cloned puppy and winner of the magazine's 2005 award.
Considering YouTube didn't actually "invent" something i think the people at Time are either getting lazy or following the WINDS that blow...something THATS kinda stupid won over something that can save lifes... ummm whats this world coming to. Relax. That's just the Mainstream Media doing their THING...the World is in much better hands than they will ever allude to.I'm just sayingAs was i...Quote
As was i...

i know... oh well its the money talking
1139.

Solve : Email Etiquette > needed ??

Answer»

LEWIS' RULES OF THUMB

Don't write when you're angry: If a message makes you angry, walk away and clear your HEAD before firing off an angry response. Ask yourself, "Will I be able to live with what I wrote a week from now?" The "unsend" button is one of the most popular features on AOL mail for good reason: PEOPLE often say things over e-mail they wouldn't have the guts to say in person.

Don't use all upper case: This is commonly regarded as shouting, so don't be surprised if people think you've sent them an angry message.

Don't over-reply: Resist the urge to over-reply. Endless cc's are annoying and clutter your in-box.

Use clear subject lines, and keep e-mails short: A clear subject will help people decide whether to read the e-mail now or later. And a message that is succinct saves people time. We're all busy. Your correspondent will appreciate your thoughtfulness.
Don't give away everyone's e-mail address: People may not appreciate being copied on mass e-mails that give other recipients access to their e-mail address. Use the bcc (blind carbon copy) FEATURE to keep recipients addresses private.

Remember the "Rule of Three": If it takes more than three e-mail exchanges to sort out an issue, it's better to call.

WHAT ARE SOME OF THE MOST ANNOYING E-MAIL HABITS?

Clicking "send" too fast: Re-reading every e-mail before you send it will help you catch typos, spelling errors and missing words. Spell checkers don't catch everything. People will judge you subconsciously on mistakes, especially in a business setting.

Unnecessary copying and forwarding: Copying the boss on every e-mail you send could take you out of his or her good graces, and sending along chain e-mails and jokes clutters people's in-boxes and leads to instant aggravation, especially if you're forwarding an attachment that could potentially infect someone's computer with viruses or spyware.

Getting in the last word: Again, the "Rule of Three" of applies: Avoid responding to e-mails with "Thank You" or other one word phrases. It clutters people's already full inboxes. If you really need to say something, just pick up the phone.

E-mailing on the go: Some people call it multitasking, but firing off e-mails from your BlackBerry or similar device during a business meeting, dinner with the family, or in the car while DRIVING is rude. It sends the message that you've tuned out and are not engaged in the matter at hand.

OTHER COMMON E-MAIL MISTAKES:


FORGETTING the attachment

Sending to the wrong person

Using only one e-mail address^^^ "keep in mind*" the above article was written by a woman so it will make little sense to us males!! Can you spot the oxymoron here?

A woman with common senseSome of those rules apply to forum posts as well.oxymoron :Intelligent Democrat

Intelligent Republican


Sylvester/PeckerWood :-?


Beware the intelligent idiot. :-? Quote

oxymoron :Intelligent Democrat

Intelligent Republican


Sylvester/PeckerWood :-?


Beware the intelligent idiot. :-?


u have a pocket protecter right !

honvetops, excellent advise there. Just wondering, can you give an example of how "Using only one e-mail address" is an email mistake?
1140.

Solve : New Microsoft Vista "sounds"?

Answer»

How Microsoft Chose New Windows SOUNDS

SEATTLE, Nov. 10, 2006

(AP) Some musicians spend 18 months working on a whole album. At Microsoft Corp., that's how long it took to perfect just four seconds of sound.

Of course, this isn't just any four-second clip. It's the sound — a soft da-dum, da-dumm, with a lush fade-out — that millions of computer users will hear every day, and perhaps thousands of times in total, when they turn on computers running Microsoft's forthcoming Windows Vista operating system.

To set the right tone — clean, simple, but with "some long-term legs," according to Microsoft's Steve Ball — the software maker recruited musician Robert Fripp.

Fripp, best known for his work with the '70s rock band King Crimson, recorded hours of his signature layered, guitar-driven sound for the project, under the close direction of Ball and others at Microsoft. Then, it was Ball's job to sort through those hours of LIVE recordings to suss out just the right few seconds.

--------------------------------------------------------------------------------
Listen to the new sounds of Vista in Larry Magid's report.
--------------------------------------------------------------------------------
[highlight]Link- to PAGE with "good link" to hear the new sounds.......[/highlight]http://www.showbuzz.cbsnews.com/stories/2006/11/10/music/main2172953.shtml

Fripp's involvement is not surprising. His occasional collaborator, Brian Eno, recorded sounds for Windows 95. Also, Ball, the Microsoft group program manager for WAVE — Windows Audio Visual Excellence — has in the past been Fripp's student and business partner.

Ball, a self-proclaimed renaissance man who is both an engineer and a musician, considered the work of about 10 musicians for the project. Some of those people were influential in the final four seconds as well.

Microsoft seriously debated several other sounds before settling on the final startup sound about three weeks ago. The rejects included a longer, lusher clip and a quick, techno-sounding piece. While many people liked an upbeat ditty with a clapping rhythm, it was eventually nixed for sounding too much like a commercial. Ball said the hand-clapping also seemed like too "human" a sound when paired with the new graphic for Vista.

"There's nothing that's especially human about our new Windows animation," he said.


The short startup clip that was eventually chosen is meant to evoke the rhythm of the words "Win-dows Vis-ta!" and Ball hopes the sound will serve as a calling card for the operating system. It also consists of four chords — one for every color in the new Windows graphic that appears as the sound plays. It's no coincidence that it's also four seconds long.

There are a total of 45 Vista sounds that Microsoft has spent the last year and a-half perfecting, including the dings you hear when you get a new e-mail, receive an error message, or log off your computer. Generally, these are more muted, less jarring variations of the prompts familiar to Windows XP users.

If it seems like overkill to go to all that trouble for a few seconds of sound, consider this: Microsoft estimates that the clips such as the e-mail alert will be played trillions of times in years to come. That's a lot of opportunity to annoy, offend — or, if the job is done right — please or appease computer users the world over.

One major CONCERN was that the startup sound not grow grating after a time.

"You want a sound that people will love the first time they hear it, but it's a paradox to also say, 'Oh and by the way, we need people to love it the tenth, or the hundredth, or the thousandth time they hear it,"' Ball said.

That's one reason he was glad to have 18 months to choose the clips.

"We had time to live with the music," Ball said.

Still, for all the time Ball has spent on the sounds, he says one measure of success would be if people noticed them very little, if at all.

Ball is the first to admit that the percussive beeps in past Windows versions could be jarring enough to bother nearby workers or interrupt others in a meeting. With the number of intrusive sounds from cell phones, handheld devices and other gadgets only increasing, that's something Ball and his colleagues were keen to avoid with Vista.

"We want you to know they're there, and you would miss them if they were gone, but we would like them to be just barely noticeable, almost like they are part of the environment or part of your wallpaper," he said. "We want them in the background, RATHER than the foreground."

Interesting. I never would have guessed so much time is spent developing those sounds, but I can understand why the reasoning behind it.

I visited the link you posted and listened to the sound. I like it better than Windows XP's startup and shutdown sounds.

By the way, I my Win XP startup sound is not the standard sound; when I installed software with my sound card, that got changed, to my surprise, but I like it better.

1141.

Solve : Microsoft produces a real command shell at last!?

Answer»

Since the original thread has been hit by the ex-member bug...

In case you've not heard, Microsoft has been working on a replacement for the command prompt (and before that, the DOS prompt) for quite a while. It USED to be codenamed "Monad" (just one letter removed from "gonad", for reasons best known to Microsoft). Anyway, it has been finalised, renamed with characteristic machismo "Windows PowerShell" and released. It is available from the official PowerShell website, >here<.

I'm definitely going to be checking it out. If I ever want to do scripting tasks, I tend to use PHP on Windows (slow for filesystem operations) or bash/zsh on Linux. But much as it pains me to admit it, PowerShell provides some interesting functionality not available to either. It's available for Windows OSES from XP upwards and looks very interesting INDEED for power users - especially those who have so far resisted Windows Scripting.

Monad becomes PowerShell

Introducing Windows PowerShellwho's the ex member?

1142.

Solve : Seagate Owns Maxtor?

Answer»

I know it's old news, and many newsreaders (like Honventops) know it, but Seagate owns Maxtor, so if you bad mouth Maxtor and say you'd rather have a Seagate or vice versa....

http://www.eweek.com/article2/0,1895,1904471,00.asp

I didn't add a poll, but comments are encouraged.just because they are owned by the same company does not mean they are equal. i dont know the facts but i would GUESS seagate hard drives are alot different then maxtor hard drives. just like Wendy's and Tim Hortens, and The Brick and United FURNITURE Warehouse. both owned by the same companies but very different.Quote

just because they are owned by the same company does not mean they are equal. i dont know the facts but i would guess seagate hard drives are alot different then maxtor hard drives. just like Wendy's and Tim Hortens, and The Brick and United Furniture Warehouse. both owned by the same companies but very different.

Like Adam and Eve? :-?

I think Maxtor will wind up ruining Seagate.[highlight]Gate-Tor [/highlight]maybe they will name it [highlight]Gator[/highlight].

Then Bubba can say"Hay,Give me one-uh thoz Gay-ders.Mine got kilt.

Seagate has always been my favorite.

I don't know PERPENDICULAR recording sounds interesting in the link Gx1_Man provided though.Oh, I never said they were equal. Quote
Oh, I never said they were equal.

Who?Adam and Eve.
Quote
just because they are owned by the same company [highlight]does not mean they are equal[/highlight]. i dont know the facts but i would guess seagate hard drives are alot different then maxtor hard drives. just like Wendy's and Tim Hortens, and The Brick and United Furniture Warehouse. both owned by the same companies but very different.

Yes, them too.

I have used a LOT of Maxtors and never had any problems with them. You get the occasional failed drive from any maker. I do like the Seagate CURRENT 5 year warranty on many models HOWEVER, and got a few of those lately. Yes,I have an old Connor 10-12 years old,a Western Digital 8 years old, a Fujitsu 9 years old ,they all still work fine. :-?

Lemons come and go but, all brands seem to hang in there.The old 40
MB Seagate I still have from a 386 still works but, my they were noisy.

Sounded like an old typewriter.

In your opening statement you say you did not add a poll ......

Did you mean POLE? . LOL, Just goofing around with Dilbert
he is a really smart guy.Lucky thing we have him available.He
is a top of the line Eradicator. ;DI loved his rants it was like being
there. Quote
Oh, I never said they were equal.


i could have sworn you implied it, but if not, i apologize for my misconception.I didn't imply, but you may have inferred it. Quote
... Seagate owns Maxtor, so if you bad mouth Maxtor and say you'd rather have a Seagate or vice versa....
I can see how it could be inferred, even though that may not have been your intent.

Anyway, I wonder whether the aquisition actually resulted in any manufacturing changes for Maxtor drives, or whether other factors, such as lowering of distribution costs, were the driving force behind the acquisition.

Edit: after reading the article, it seems the aquisition will have some manufacturing impact on one or the other or both drive brands. I'm not saying the two brands will become identical from a manufacturing and design standpoint, but the aquisition does seem to have some implications for manufacturing, if I understand the article correctly.I have found in my experience through the years that people's hatred of HDD manuf. is directly proportional to the type of backup strategy they had in place at the time...

Heck i still have a Quantum BigFoot and a 528MG Seagate in my arsenal that run fine when i get nostalgic.
1143.

Solve : Firefx2 & IE7 fake logins= beware?

Answer»

**been asleep for awhile ! ;-0 ** 8-)

Firefox, IE vulnerable to fake login pages?
11 / 22 / 06 |

Mozilla's Firefox 2 and Microsoft's Internet Explorer 7 are vulnerable to a flaw that could allow attackers to steal passwords.
Dubbed a reverse cross-site request, or RCSR, vulnerability by its discoverer, Robert Chapin, the flaw lets hackers compromise users' passwords and usernames by presenting them with a fake login form. Firefox Password Manager will automatically enter any saved passwords and usernames into the form.

The data is then automatically sent to an attacker's computer without the user's knowledge, according to the Chapin Information Services site.

An exploit for this flaw has already been seen on social-networking site MySpace.com, and it could affect anyone using a blog or forum that allows user-generated HTML code to be added, according to Chapin.

"Users of both Firefox and Internet Explorer need to be AWARE that their information can be stolen in this way when visiting blog and forum Web sites at trusted ADDRESSES," Chapin said.

According to security company Netcraft, which discovered the exploit being used on MySpace, a fraudulent login page was hosted on the company's own servers.

As the page did not exhibit any signs of external content, such as cross-site scripting (XSS) or open redirects, it is "convincing, and even security-conscious users are at risk of becoming victims," CIS said.

The attack was launched from a profile page, and it used specially crafted HTML to hide the genuine MySpace content from the page and instead display its own login form.

According to Chapin, an RCSR attack is much more likely to succeed than an XSS attack because neither Internet Explorer nor Firefox is designed to check the destination of form data before the user submits them. The browser doesn't sound an alarm because the exploit is conducted at the trusted Web site.

Two weeks ago, CIS reported to Mozilla that the Firefox Web browser will automatically fill saved usernames and passwords into RCSR forms. Attacks are more likely to succeed in Firefox because Internet Explorer will not automatically fill in saved usernames and passwords, unless the RCSR form appears on the same page as a legitimate login form.

No fix had been issued by Mozilla at the time of writing, though a bug report has been filed. The organization is reportedly working on a fix for Firefox 2, but it's not clear whether earlier VERSIONS are also affected. Security company Secunia has advised users to disable the "Remember passwords for sites" option in Firefox preferences.

To take advantage of the flaw, a malicious hacker would have to create a fake login form on a trusted Web site. CIS has recommended that all Webmasters review their server code for the possibility of XSS and RCSR injections, especially operators of ENCRYPTED Web sites.

"These attacks could be highly effective against firewalled local network servers and HTTPS addresses that are not otherwise accessible because the attacker does not need direct access," the CIS site said.

[highlight]Great Thanksgiving to all my Friends and those over seas!! [/highlight]
You know what's stupid? FF never remembers passwords anyway. Thanks, honvetops. That's gotta be useful to everyone who uses blogs/myspace. One more reason, however, that abstaining from blogging/MySpacing is a good thing. If one becomes infected with a backdoor trojan, all saved passwords are easily EXTRACTED. No fake log-ins or fake sites needed. I have done this on my own machines several times without using a trojan. If you want details, the answer is an ABSOLUTE NO!![highlight]If you want details, the answer is an ABSOLUTE NO!![/highlight]

[size=14]Hummmmmmm , there seems to be a echo in here.[/size]


dl65 Quote

You know what's stupid? FF never remembers passwords anyway.
:-? Does for me.
1144.

Solve : "don't"  google  this!!?

Answer»

[highlight]Google Video Blog Apologizes For E-Mailing Kama Sutra Worm [/highlight]

Google announced that a member of its video team had sent the worm, which wipes out files, to members of a Google Video Blog discussion list.

By K.C. JONES
InformationWeek

Nov 9, 2006 12:48 PM

Google sent out about 50,000 e-mails with the Kama Sutra worm this week.

Google announced that a member of its video team had sent the worm, W32/[emailprotected], to members of a Google Video Blog discussion list. The worm wipes out files.

"On Tuesday evening, three posts were made to the Google Video Blog-group that should not have been posted," the company announced through a written statement. "This has now been addressed and fixed. Still, some of these posts may have contained a virus called W32/[emailprotected] mass mailing worm. If you think you have downloaded this virus from the group or an email message, we recommend you run your antivirus program to remove it."

The company linked to free Norton AntiVirus software from the Google pack, APOLOGIZED for the gaffe, and promised to take action to prevent similar mistakes in the future.

The company declined to explain how the link was posted. Last month, hackers posted a FAKE entry on the company's blog.

**[highlight]KINDA makes you feel all fuzzy inside[/highlight]**
Google makes viruses . Now why on earth can google be doing with a virus.i was writing on my blog and trying to post on myspace... and got "hit" by 3 trojans at once!! Never before did that happen, kinda weird!

See, it's for reasons like this I try to stay away from Myspace, Blogs, etc. . They REALLY can hurt you. then you should stay away from the internet. it would surely kill you then after a whileQuote

Quote
See, it's for reasons like this I try to stay away from Myspace, Blogs, etc. . They really can hurt you.

Does natural light hurt u !! "it burns" lol [smiley=2vrolijk_08.gif]
it does methis is rediculos
1145.

Solve : for all you Wikipedia haters?

Answer» http://arstechnica.com/news.ars/post/20061127-8296.html

A new salvo has been FIRED in the perennial war over Wikipedia's accuracy. THOMAS Chesney, a Lecturer in Information Systems at the Nottingham University Business School, published the RESULTS of his own Wikipedia study in the most recent edition of the online journal First Monday, and he came up with a surprising conclusion: experts rate the ARTICLES more highly than do non-experts.

This less-than-intuitive finding is the conclusion of a study in which Chesney had 55 graduate students and research assistants examine one Wikipedia article apiece. Each participant was randomly placed into one of TWO groups: group one read articles that were in their field of study, while group two read randomly-assigned articles. Respondents were asked to identify any errors that they found.

Pretty small test group i'd say...ask 55 people who the Secratary of State of and see how many accurate replies you will get.
1146.

Solve : all programmers or wanta be programmers?

Answer» http://www.jubling.com/ten-reasons-why-every-programmer-should-learn-c.html

Every programmer should learn C during their programming career. Its BENEFITS are to numerous to ignore. Not only will it open many more job opportunities, but it will teach you more about computers as a whole.

1) C is lower level then other programming languages (C++, Java). Programming at a lower level allows you to further your understanding of computers, as a whole.

2) Device drivers and OPERATING systems are written exclusively in C. Now, you may never write a device driver or an operating system, but what if you are ever REQUIRED to modify one?

3) What if you ever want to get a job programming microcontrollers? They are programmed in C. Are you going to limit your possible list of jobs because you didn't want to learn a new language?
1147.

Solve : linux commands?

Answer» http://truehacker.blogspot.com/2006/11/200-linux-commands-for-newbbies.html

About 200 Linux commands for serious newbies. To get more examples on how each command is used, use this command:

#&GT;man COMMANDNAME

Where commandname is an command you pick from the table below. If no manual exist, then that command is most LIKELY UNAVAILABLE for your Linux distro. Ignore it and proceed with other commands.


alias Create an alias
awk Find and Replace text, database sort/validate/index
break Exit from a loop
builtin Run a SHELL builtin
cal Display a calendar
case Conditionally perform a command
cat Display the contents of a file
cd Change Directory
1148.

Solve : 20 must reads for linux users?

Answer» http://www.foogazi.com/2006/11/24/20-must-read-howtos-and-guides-for-linux/
1149.

Solve : How to structure large CSS files?

Answer» http://friendlybit.com/css/how-to-structure-large-css-files/

Many methods exist to structure your CSS. This article tries to describe the method I use. I CALL it the “Tree method”, SINCE it structures the CSS like… that’s right, a tree structure. I want to stress that it isn’t my invention; I just describe and give reasons for its rules.

EVERYONE that has built a bigger site has had to DEAL with the mess CSS so easily BECOME. There are ids and classes all over the place, and to find where a certain class is defined you usually need to use some search feature in your editor. Matching the other way, from the CSS to the HTML is even harder; you don’t even know what file a certain class is defined in. It’s a mess.

The Tree method tries to structure the CSS into logical blocks; blocks taken from the HTML. It also aims to be easy to understand for anyone. No secret codes or difficult ordering schemes.
A nice idea in theory; the trouble is that sometimes you are obliged to use a certain order to achieve certain advanced effects. Good commenting in the CSS file is essential.
1150.

Solve : BSOD Screensaver???

Answer»

Haha, it's good to know that the boys at Microsoft have a sense of humor.

http://www.microsoft.com/technet/sysinternals/Miscellaneous/BlueScreen.mspxim going to use that to trick my family...Huh. No idea how that happened. Quote

Huh. No idea how that happened.
Its because its jike software. Oh well, it sounded cool... anyone want to post screen shots?I can't get it to -- pressing the Print Screen button, or any other button -- deactivates the screensaver. But it looks like your standard BSOD. Then it reboots, going to the Windows splash screen of your OS. Then, it gives another BSOD... and so on...

EDIT: "jike" software? This was made by Microsoft, you know.Quote
I can't get it to -- pressing the Print Screen button, or any other button -- deactivates the screensaver. But it looks like your standard BSOD. Then it reboots, going to the Windows splash screen of your OS. Then, it gives another BSOD... and so on...

EDIT: "jike" software? This was made by Microsoft, you know.
Sorry, now I am inventing new words. Jike was a typo, I meant JokeOH, I thought "jike" meant something like "warez" or whatever. Quote
OH, I thought "jike" meant something like "warez" or whatever.
Lol

(then again, Jike is much more unpleasant, its kind of a spiny word. Joke, however, isn't. Joke is too friendly to describe something that can be harmful to your COMPUTER and your mental abilities)Quote
Quote
OH, I thought "jike" meant something like "warez" or whatever.
Lol

(then again, Jike is much more unpleasant, its kind of a [highlight]spiny [/highlight]word. Joke, however, isn't. Joke is too friendly to describe something that can be harmful to your computer and your mental abilities)

acanthophorus
Hares a joke I teach the yearbook class at an middle school and played the greatest prank of all times I put my plan in motion a week ahead of time. I told the class that the backups of the server have been canceled because of some other reason I cant remember and it would be this way for two weeks. I created a screen SIMILAR to that except it talked also about how you also crashed the sever and all data was lost. I told the class I had to use the restroom and that the TA was in charge. I used a program I had to remotely control there computers and went to another room on one computer I had a video feed from a web CAM I set up an on another was the control software. It was deadline day and one our main computer I initiated the screen then the next and the next and the one until all 30 were reading this screen I conveniently walking in the room to find this the scared and dazed kids were running around and screaming bloody murder. I went running out of the room and then switch all the screens to the "HAHAHAHAHAHAH I got you all. Happy Friday" What do you guys THINK of that.thats jacked Good thing I wasnt there, I would have gone all "computer-geeky" on everyoneWhat remote control program did you use ? ?Quote
What remote control program did you use ? ?
I am rather curious to know that too, now that I think of it.

(SOUNDS like a very neat trick)