Explore topic-wise InterviewSolutions in .

This section includes InterviewSolutions, each offering curated multiple-choice questions to sharpen your knowledge and support exam preparation. Choose a topic below to get started.

1251.

Solve : TrendMicro goes beyond anything you can imagine...?

Answer» http://esupport.trendmicro.com/support/viewxml.do?ContentID=EN-1035951&id=EN-1035951

Quote
What programs do I need to remove before installing Trend Micro Internet Security?

Solution ID: 1035951
Product: Trend Micro Internet Security - 2008
Operating System: Windows Vista, Windows XP - SP2
Published: 12/19/07 10:16 AM

Solution:

You need to remove any of the following programs that may be installed in your computer. Having these products installed together with Trend Micro products could result to loss of Internet connection or slow computer performance.


Symantec Products


Norton Anti Virus 2005


Norton Anti Virus 2006


Norton Anti Virus 2007 32-bit /64-bit


Norton Internet Security 2005


Norton Internet Security 2006


Norton Internet Security 2007 32-bit /64-bit


Symantec Antivirus Corporate Edition 10


Symantec Antivirus Corporate Edition 10.2 Client Only for Vista32


Symantec Antivirus Corporate Edition 10.2 Client Only for Vista64


Norton 360


Norton 360 64bit


Norton AntiVirus 2002


Norton AntiVirus 2003


Norton AntiVirus 2004


Norton AntiVirus 2002


Norton AntiVirus 2003


Norton AntiVirus 2004


Norton AntiSpam 2005


Norton Personal Firewall 2002


Norton Personal Firewall 2003


Norton Personal Firewall 2004


Norton Personal Firewall 2005


Norton Personal Firewall 2006


Norton Internet Security 2008 Beta 32-bit /64-bit


Norton AntiVirus 2008 Beta 32-bit /64-bit


Norton AntiBot Beta 32-bit /64-bit


McAfee Products


McAfee Internet Security Suite 2005


McAfee Internet Security Suite 2006


McAfee Internet Security Suite 2007


McAfee VirusScan 2005


McAfee VirusScan 2006


McAfee VirusScan 2007


McAfee Total Protection 2007


McAfee Virus Scan ENTERPRISE 8.0


McAfee PC Protection Plus 2007


McAfee Virus Scan Enterprise 8.5i 32-bit /64-bit


McAfee Inernet Security 5.02 (En) Retail


McAfee Internet Security Suite 2004 Ver6.


McAfee.com Inernet Security Super


McAfee.com VirusScan Online


McAfee VirusScan 2004 Ver8.0


McAfee VirusScan 3.x/4.x for Win9x


McAfee.com SecurityCenter (Ja) Retail


McAfee AntiSpyware 2005/2006


McAfee.com SpyKiller2005


McAfee Personal Firewall Plus (Ja) Retail/2005/2006


McAfee Firewall 4.02 (En) Retail


McAfee Internet Security Suite 2007 32-bit /64-bit


McAfee VirusScan 2007 32-bit /64-bit


McAfee Total Protection 2007 32-bit /64-bit


McAfee PC Protection Plus 2007 32-bit /64-bit


McAfee Total Protection 2.0 Beta 32-bit /64-bit


Trend Micro


Trend Micro AntiSpyware 3.x


Trend Micro House Clean


Trend Micro AntiVirus


Trend Micro Internet Security 2005


Trend Micro Internet Security 2006


Trend Micro Internet Security 2007


Trend Micro OfficeScan 5.5


Trend Micro OfficeScan 6.5


Trend Micro OfficeScan 7.0


Trend Micro OfficeScan 7.8


Trend Micro PC-cillin 2002


Trend Micro PC-cillin 2003


Trend Micro PC-cillin Internet Security 2004


TrendMicroPCC15_TAV


Trend Micro Internet Security VBSE


Trend Micro Anti-Spyware Client


Trend Micro Anti-Spam ToolBar OE


Trend Micro Anti-Spam ToolBar OL


Other Security Vendors


Ad-Aware SE Personal 1.06


Ad-Aware SE Plus


Ad-Aware SE Professional


Ad-Aware 2007 Free/ Pro



Spybot 1.4



CA Anti-Virus 2007 32-bit /64-bit


CA Internet Security Suite 2007


CA Antispyware 2007


CA Internet Security Suite 2007 32-bit /64-bit


CA Personal Firewall 2007 32-bit /64-bit


CA Anti-Spam 2007 32-bit /64-bit



Windows Live OneCare 1.5


Microsoft Windows Defender



e-frontier VirusKiller2003 Firewall 1.2.1 (Ja) Retail


e-frontier VirusKiller2005 Personal Firewall


e-frontier VirusKiller2003


e-frontier Virus Killer 2005



eTrust Antivirus r7


eTrust Antivirus r8


eTrust EZ ARMOR 2005


eTrust PestPatrol AntiSpyware 5.0


eTrust PestPatrol AntiSpyware 8.0



Kaspersky Anti-Virus Personal


Kaspersky Anti-Virus Personal Pro


Kaspersky Personal Security Suite


Kaspersky Anti-Virus 2006 32-bit/64-bit


Kaspersky Internet Security 2006 32-bit/64-bit


Kaspersky Anti-Virus Personal (EN) ver.5.0.388


Kaspersky Anti-Virus 7.0 Beta


Kaspersky Internet Security 7.0 Beta



Panda PLATINUM Anti Virus 2005 with TRUEPREVENT


Panda PLATINUM Internet Security 2005 with TRUEPREVENT


Panda Titanium 2006 Antivirus + Antispyware


Panda Titanium 2006 Antivirus + Antispyware


Panda Internet Security 2007


Panda Antivirus + Firewall 2007


Panda Antivirus 2007


Panda Anti-Virus with firewall 2008


Panda Internet Security 2008


Panda Anti-Virus 2008



Tiny Personal FireWall 4.5


Tiny Personal FireWall 5.0


Tiny Firewall 64


Tiny Personal FireWall 2005


Tiny Personal FireWall 2005 Pro



ZoneAlarm Internet Security Suite


ZoneAlarm with Antivirus


ZoneAlarm Pro 2.x & 3.x & 4.x


ZoneAlarm Pro Plus 3.x


Zone Alarm Anti-Spyware 2006


Zone Alarm Anti-Virus 2007 32bit


Zone Alarm Internet Security 2007 32bit


ZoneAlarm Security Suite 7.1.078.000 (Beta VERSION for Vista-32bit)


Zone Alarm Anti-Spyware 2007


Zone Alarm Pro 2007



INTERMUTE AdSubtract PRO


INTERMUTE SpySubtract PRO



AVG AntiVirus\Anti-Malware\Internet Security 2007 32bit


AVG AntiVirus\Anti-Malware\Internet Security 2007 64bit


AVG Anti-Spyware 7.5



BitDefender Internet Security 10


BitDefender Anti-Virus Plus v10 32bit


BitDefender Anti-Virus v10 32bit


BitDefender Internet Security v10 32bit


BitDefender Total Security 2008 Beta 1



F-Secure Anti-Virus 2007


F-Secure Internet Security 2007


F-Secure Internet Security 2006


F-Secure Anti-Virus 2006



Avast! 4 Pro/Home 32bit


Avast! 4 Pro/Home 64bit



NOD 32 Anti Virus 32bit


NOD 32 Anti Virus 64bit


ESET(NOD32) Smart Security Beta 1a



Spy Sweeper 5.0


Spy Sweeper 5.2


Spy Sweeper 5.3


Spy Sweeper 5.2 with Anti-Virus


Spy Sweeper 5.3 with Anti-Virus



Kerio Personal Firewall 2.1


Kerio Personal Firewall 4


Kerio WinRoute Firewall 6



CYBERsitter 9.0



PC Tools AntiVirus 3.0 for Windows


PC Tools AntiVirus 3.1 for Windows 32bit


PC Tools AntiVirus 3.2 for Windows 64bit



Sophos Anti-virus 6.0/6.5 32bit


Sophos Anti-virus 6.5 64bit



Virus Doctor 2004


Virus Doctor Ver.9



Virus Protector V4 Retail


Virus Security 2004 / 2005


VirusSecurity2006



Virus Protector V4 Retail


Virus Security 2004 / 2005


VirusSecurity2006



V3 VirusBlock InternetSecurity 2005


V3 VirusBlock InternetSecurity 2006



Spyware Killer Pro


Spyware Blaster 3.5


Spyware Hunter 2.7



Sygate Personal Firewall 5.5


Sygate Personal Firewall Pro 5.5


Sygate Personal Firewall Pro 5.6



BlackICE 3.6


BlackICE PC Protection



Spy Catcher 2006


Spy Sweeper 4.5



PCGATE Personal 2.6 (Ja) Retail


Outpost Personal Firewall Free & Pro & Pro v2.7.493.416


SG Anti!SPY(trial)


Norman Personal Firewall 4.0


Outpost Firewall Pro 4.0


Folder Lock5.7.5


K7 Total Security


NEC Inter Channel v3 Virus Block Internet Security


Final Security 2.5


Earthlink's Parental Controls2005


Kingsoft Internet Security 2006 (JA)


Pest Patrol 4.2


Virus Chaser Retail


Digiturbo VirusDoctor


FortiClient Host Security


Dr.Web for Windows (version 4.33)


Avira AntiVir PersonalEdition Classic 7.0


The following Products were included on the competitor list starting December 21, 2007.



Kingsoft Internet Security 2007 32bit


Kingsoft Internet Security 2007 64bit


Norton Antivirus Corporate edition


Norton Confidential 2008


Symantec Client Security 10


Spybot Search and Destroy 1.5 32bit


Spybot Search and Destroy 1.5 64bit


V3 VirusBlock Internet Security 2007


V3 VirusBlock Internet Security 2007 Platinum


SpyZero 2007


The following applications has been removed from our competitor list.



Spy Doctor


Note: The Trend Micro Internet Security 2008 installer file cannot automatically remove the softwares listed below. Trend Micro recommends that you uninstall them manually through the Add/Remove programs OPTION before you install Trend Micro Internet Security 2008.





Norton Confidential




Spybot Search and Destroy 1.5.1

For Spybot, it is necessary to undo the changes made by the Immunize function of Spybot before you uninstall the product.
OH MY F###ING GOD!! THAT'S ONE HUGE LIST!!Yeah, but something tells me Trend isn't the only company with a long list.

I just upgraded from '07 to '08 PCcillin Internet Security with no problems what-so-ever. But then again I dont have XP SP3, I have Vista.
1252.

Solve : Apple Launches New 16GB iPhone - Available Now?

Answer» HERE

Cellular News is reporting that Apple have just launched a BRAND new iPhone, with double the memory capacity, at 16 gigabytes. The new iPhone is available through all outlets, INCLUDING Apple STORES, AT&T stores, and Apple online. The new version retails for $499 (the 8GB version sells for $399).

Said Greg Joswiak, Apple’s vice president of iPhone PRODUCT Marketing, “”For some users, there’s NEVER enough memory. Now people can enjoy even more of their music, photos and videos on the most revolutionary mobile phone and best Wi-Fi mobile device in the world.”

There are no reports yet of any additional feature enhancement to the new 16GB iPhone, other than the increased memory.
1253.

Solve : Shutdown day?

Answer»

I definitely will not be participating in this global event, but still it's interesting. Apparently this Saturday is global shutdown day. An experiment to see if people can live without their computer for a full day.

http://www.shutdownday.org/Quote

An experiment to see if people can live without their computer for a full day.
Duh - no!I'm willing to GIVE it a whirl...especially since we talked you into this board change...the timing might be perfect! !

i will admit, i cannot live without my computer this time of year.I hate things like that. If they want money, they should just ask. Don't make such a fuss about it.When my girlfriend's visiting, I'm not even allowed to look at the computer...Quote
When my girlfriend's visiting, I'm not even allowed to look at the computer...

further proof that you cannot live with women, but you cant live without them either.No computer for a day, gives me a headache thinking about it
I mean, if i am out all day doing random stuff like extra school activities or going to a carnival or something, I can stand not using the computer for the day but sitting at home doing NOTHING, It's like tortureBy the way since Patio is the only one who WANTED to try this, did you try it and how did it go?I had no problem at all...CH was down !


( Actually if you check the LOGS i did try here a 1/2 dozen times throughout just cause i was so excited about gettin up and running again. Other than that i didn't even check my mail that day. )
1254.

Solve : OpenOffice.org 2.2 released.?

Answer»

I may be a LITTLE late here, but I thought I'd LET you know that OpenOffice.org 2.2 has been released.
Get it here - http://www.openoffice.org.
The new version includes MANY improvements, which you can read about here - http://development.openoffice.org/releases/2.2.0.html.
If you've never used it, I recommend that you try it.
OpenOffice is a fully featured office suite that rivals Microsoft Office for free.
Be aware that it is a large download (93Mb) and suitable for most operating systems.
Check the download page before downloading to make sure you meet the requirements.Everyone may want to hold of on the download their server is getting hammered I THINK. Been downloading for the last two hours with an estimated time left of three hours on a 4MB connection.I got it through Bittorrent.
I always do with downloads like this, because it's so large and I don't want to spend over an hour downloading it and then discovering it's been corrupted.
Also, if their servers are slow, Bittorrent is much faster.
Good ADVICE though, if you want to download it it's best to hold off or use Bittorrent.I use a WiFi, so I'm going fast for me... 189 KB/s.

1255.

Solve : File sharing speeds to increase up to 500%?

Answer»

Movies and music could be SHARED faster over the NET thanks to a system pioneered by researchers in the US.

http://news.bbc.co.uk/2/hi/technology/6544919.stm

Would be AMAZING if you could get a 500% increase in speed.Finally BT will become a viable SOURCE for porn! woot woot

1256.

Solve : "Windows Vista Capable" gets Microsoft sued....?

Answer»

I'm neither a lawyer nor a lover of lawsuits, but I gotta admit I'm neither totally startled nor immediately distressed by today's news of a class-action lawsuit against Microsoft, charging that its marketing practices for PCs sold in the months before Windows Vista's release were deceptive.

The crux of the matter seems to be the "Windows Vista Capable" sticker that was slapped on relatively low-end machines (including one I bought in February of this year). All the sticker SIGNIFIED is that the machines could run Windows Vista Basic--the stripped-down edition that lacks much of what makes Vista Vista, including the slick "Aero" user interace.

As I blogged a few weeks back, the Vista Capable seal is so meaningless that Dell's site says that PCs that carry it are "great for" booting up Vista--but that they might not let you perform advanced tasks such as, er, running any software at all. Great, huh?

http://blogs.pcworld.com/techlog/archives/004000.html

Annoying, eh?
Before this was finalised, my laptop rolled off the assembly line with a Vista Capable sticker.
However, I know it's more than that, it could easily run any version of Vista.
It CAUSES confusion for all INVOLVED when this sort of thing happens, especially to the less tech-savvy.The problem with class action lawsuits is by the time they finish paying off all the attorneys and split up the money even those that got burned all get 87 cents...That'll teach you not to look up the requirements of Vista before going out to buy a machine. Or asking an 'expert'.
By expert . . . you mean the salesmen in computer stores?
They make me laugh.
And . . . was that addressed to me personally, or anyone in general?Quote from: Calum on April 14, 2007, 10:52:06 AM

By expert . . . you mean the salesmen in computer stores?
They make me laugh.
And . . . was that addressed to me personally, or anyone in general?

I hate salesmen. So far every sales person I spoke to has sold me crap. Apart from the optician, but he has a degree in.. uhm.. opticianism... So he could be considered an expert.

Just addressed in general. Ever participated in the sport known as idiot computer salesmen baiting?
It's fun, you should try it sometime.
Ask them for their best gaming rig, and proceed to pick it apart.
As you should, when they offer you a P4 3GHz, 512Mb of RAM and a Radeon X600 - to play BF2142 and Oblivion at the highst settings.
Ridiculously overpriced to boot.
But it was Vista Capable, and that's the ONLY thing that matters.
LOL.Actually, I was forced to become the sales man at one point. I didn't sell a lot of computers.. COL
I can see it now.

Customer: "Is this a good computer?"
Raptor: "No. It sucks. Go away before I HIT you with it."
Customer: ". . . *runs*"

I was considering trying for a Saturday job as one for a while but then I figured that there'd always be someone who would be really awkward and then I'd get fired and/or arrested for assault.Customer walks into store
Customer: Hi, this computer looks nice, is it Vista?
Sales man: Yes it is windows vista
Customer: Do you think it's a good computer?
Sales man: Yes, i think it is a great computer
Sales man leans closer to customer
Sales Man: These aren't my words, pretent to consider this offer and then walk away, it isn't worth itI wasn't very good, I got fired actually. Partially because I was never there, and I refused to show up in jeans. Refused to show up in . . . they made you wear jeans?
Why is that a bad thing?
(Stop thinking everyone wears the same as you, Calum)
So they fired you because you wore, what, a suit or something?
Or just didn't wear jeans, not necessarily wore something else? If you get what I mean.Apparently, jeans are the new standard for reputable business men.. I only wear baggy CLOTHES. Or nothing at all. Ha-ha.
Fair enough, I never knew that.
And as for the part about wearing nothing . . . let's just not go there.thats what microsoft gets for trying to cheap ppl out
1257.

Solve : Alienware's 'Area 51' game> New hard drives hold terabyte of data?

Answer»

Hitatchi drive lives in Alienware's 'Area 51' game-oriented machines

Updated: 7:51 p.m. ET April 9, 2007

Just when you got used to hard drives with hundreds of gigabytes (hundreds of billions of bytes) they do it: make one with a terabyte (a trillion bytes).

YES, you can now get a terabyte hard drive on a desktop PC. Breaking the ice with a Hitachi drive was Dell, with “Area 51” game-oriented machines from its Alienware subsidiary. The 1T option initially costs $500.

In CASE you’re wondering, as printed text a terabyte would occupy 100 million reams of paper, consuming some 50,000 trees. It is enough to hold 16 days (not hours) of DVD-quality video, or a million pictures, or almost two years worth of continuous music.

ou might not have any songs that last for two years, but that’s irrelevant, indicated Henry Baltazar, storage analyst for The 451 Group, a technology analyst firm in San Francisco. “There will be a demand for it, since a lot of people have digital media, like movies, pictures and music,” Baltazar told LiveScience.

“Larger devices will BECOME more commonplace, and we will see the same kind of transition from gigabyte to terabyte drives as we previously saw from megabyte to gigabyte drives—in fact, the move from 500 gigabytes to a terabyte has taken longer than expected.”

The leap from 500G to 1T required a breakthrough in “areal density” (how tight the bytes are packed on the surface of the disk), according to Doug Pickford, a marketing executive at Hitachi Global Storage Technologies. The trick, he explained, was to move to Perpendicular Magnetic Recording (PMR), where each BIT is a perpendicular rather than a linear magnetized spot on the disk—as if the bits were standing up rather than lying down.

Currently, areal density is growing at about 35 to 40 percent per year, and the techniques used to create the 1T drive are expandable to make a 5T drive, Pickford said. More work will be needed to surpass the 5T hurdle, but he foresaw no physical limitations until drives reach a capacity of at least 50T. ( there is a picture of the Alienware case on this link, thats about it)

http://www.msnbc.msn.com/id/18025952/

How long would it take to defrag? I suppose, once a year, you could start the defrag then go on vacation. or reformat the buggerWith a SATA 500GB HDD it doesn't seem to take more than a few hours to defrag / format. I would *assume* that a 1TB drive would be 5-9 hours. Once someone gets a 1TB drive he/she will need to let us all know.

Pretty amazing that we're already getting into the 1TB range. Few more years and we'll be saying how amazing it is that we're into the 1PB (Petabyte) range. By that time at it's current rate maybe Windows well require 1TB of disk space. lol most likely if they arent already working on it right now as we speakI can't wait for "yaddabites"... I literally choked when I read this article. Yottabytes will be cool, but I don't forsee that coming unless you have a hard drive the size of an old mainframe. I don't recall Hitachi as being the most trustworthy brand to ever be conceived. Including Toshiba.

1258.

Solve : Sony says to sell ultra-thin OLED TVs this year?

Answer»

Sony CORP. said on THURSDAY it planned to start selling ultra-thin TVs using organic light-emitting diode (OLED) technology this year, aiming to BECOME the first to market with a TV using the promising next-generation display.

LinkThat pic is rather- COOL .........

I saw this story and will admit didn't read it, once I saw the word organic I WANTED to throw-up.... I figured it had something to do with global warming and helping the environment, too much politically correct junk for me!

Maybe you can use it as compost when it dies in under a year?

1259.

Solve : Free Antivirus Download Roots Out Rootkits?

Answer»

Rootkits have become a severe threat in comparison to traditional malware because they are often overlooked by CONVENTIONAL antivirus systems. They execute by embedding applications within the operating system, so it is important to correctly distinguish between malicious rootkits and legitimately hidden processes.

Grisoft Software, the developer of AVG Internet security Barracuda Spam Firewall Free Eval Unit - Click Here products, introduced Tuesday a free product aimed at detecting and removing rootkits.

Rootkits, a specific malware type which hides in other applications or in a computer's operating system Forge ahead and stay on budget with simple to install HP server technology. kernel, allow malicious applications to collect PASSWORDS and sensitive data from the infected computer without user knowledge. This collected personal information can be used to create spam from the infected computer as well as other criminal activities.

"Rootkits are the latest and greatest threat [to computer security]. We felt it was important to develop this free product now. We have a reputation for doing this," Richard Carlson, managing director of Grisoft, told TechNewsWorld.

Rootkit Threat

Rootkits have become a severe threat in comparison to traditional malware because conventional antivirus systems often miss the hidden rootkit. They execute by embedding applications within the operating system, which is also an essential application to many necessary programs including antivirus protection, so it is important to correctly distinguish between malicious rootkits and legitimately hidden processes.

Grisoft conducted six months of open beta program testing to ensure AVG Anti-Rootkit is able to protect users and operating systems without the confusion and hassle of false alarms.

Rootkits were originally used by hackers to cover their tracks after unauthorized access to computers. Today, these techniques have been redesigned in order to mask the presence of malicious software used to gather and exploit personal information such as credit card numbers and social security numbers, creating a serious threat to users.

"Rootkits are computer code that attempt to hide their ACTIONS and processes, making the job of detecting the code and the harmful processes very difficult," explained Larry Bridwell, vice president of Global Security STRATEGIES for Grisoft. "AVG Anti-Rootkit is DEVELOPED to detect and destroy rootkits effectively, without bothering users with false alarms."

How It Works

Users must download the stand-alone rootkit detection software to run locally on their computers. It does not make sense to run this type of operation from a Web application, said Carlson.

Grisoft's root kit detection application compares a user's Windows kernel with detailed snapshops of uninfected systems. If anomalies are detected, the software makes changes to correct the problems.

"We take a snapshot of how the file system on a computer should look. The devil is in the details with this process. It has taken us a lot of time to develop a baseline model," said Carlson. "Once we identify what should be present, we can map out the results to compare them to the user's system."

The baseline model is able to show various conditions Grisoft engineers have found to be affected by rootkit installations, said Carlson. Regular updates of the detection engine are needed to keep current with the frequent changes to the Windows kernel and other system files that Microsoft (Nasdaq: MSFT) Free 30-Day Trial. Seamlessly Integrate UNIX & Linux systems with Active Directory. Latest News about Microsoft issues.

Full Article

http://www.technewsworld.com/story/bY5Yh9sE4IQq7s/Free-Antivirus-Download-Roots-Out-Rootkits.xhtmlthnx for the info

1260.

Solve : Blogger posts Windows Vista SP1 fixes on Web site?

Answer»

Quote from: steelegbr on April 08, 2007, 04:10:05 PM

Now I have no source to quote, but I have heard this rumour before. The idea is that in Vista as the placement to data into RAM is random, it is harder for a malicious piece of code to FIND the Vista back end stuff and screw it up. I'm sure (if this is TRUE) there will be some system tracking the location of the different pieces of data (as the OS should anyway) so performance should not be affected much if at all.

www.snopes.com to check out rumors.

Quote
Now I have no source to quote, but I have heard this rumour before. The idea is that in Vista as the placement to data into RAM is random, it is harder for a malicious piece of code to find the Vista back end stuff and screw it up. I'm sure (if this is true) there will be some system tracking the location of the different pieces of data (as the OS should anyway) so performance should not be affected much if at all.

If it's being tracked, then malicious code will find the tracking and be ABLE to modify any memory address it wants to, nullifying any security bonus.
1261.

Solve : Google 411?

Answer»

Free phone info SERVICE being tried out by GOOGLE. Pretty interesting and seemed to work pretty good for my attempts. However, only CURRENTLY works for US in English.

http://labs.google.com/goog411/index.html

1262.

Solve : How fast can you type the alphabet??

Answer» W00T 4.67 secondsWhen i do it in ORDER i'm up to 49.2 seconds...is that good ? ?Cheated and got: High score: 0.63 s had an autocomplete script so when I typed abcd it auto completed ABCDEFGHIJKLMNOPQRSTUVWXYZ.

However, after a lot of attempts without cheating I did manage to get down to: High score: 4.06 s Quote from: COMPUTER Hope Admin on April 08, 2007, 10:23:37 AM
Cheated and got: High score: 0.63 s had an autocomplete script so when I typed abcd it auto completed abcdefghijklmnopqrstuvwxyz. <grin>

However, after a lot of attempts without cheating I did manage to get down to: High score: 4.06 s

nice
1263.

Solve : Homeland Security wants master key for the Internet?

Answer»

THE US Department of Homeland Security is insisting that Verisign hand over the master keys of the Internet.

If it succeeds, the US will be able to track DNS Security Extensions (DNSSec) all the way BACK to the servers that represent the name system's root zone on the Internet.

Full storyMore ways to be SPIED on. Oh what fun!

If Homeland Security were any good, they would have the key by now. They possibly do and are using this as a cover so that should they get FOUND out they can say they got the key legitimately. Who knows? Hummmmmmmm, didn't something like this TAKE place in the last "Arnold" MOVIE!!
geese, what a crock ~I'm just waiting for the media to hear about this, so it can be overblown the way wire-tapping was.

1264.

Solve : Google TiSP?

Answer»

Love Google! Seems like every April Fools they do something creative. Introducing Google TiSP:



http://www.google.com/tisp/Haha!
Lots of COLs at that one!
Loving Google and April Fools.
The WORRY is how many people will believe it . . .Doesn´t MATTER; there´s no link to sign up. The FAQ is hilarious...And Here...Quote from: Dilbert on April 01, 2007, 11:57:18 PM

Doesn´t matter; there´s no link to sign up.
If only there was . . .
LOL at the PAST Google April Fools by the way, very nice.
BTW, patio, you're a Prodigy all of a sudden.
Nice.I miss being a hacker , but thanx !Looks like Rob Pomeroy has taken your place for now.I just installed TiSP and my initial flush rates are off the CHARTS...i highly recommend this to everyone.

patio. Quote from: patio on April 03, 2007, 01:25:31 PM
I just installed TiSP and my initial flush rates are off the charts...i highly recommend this to everyone.
My toilet doesn't meet the requirements. It crashed while i tried to install it. Now i have to replace my toilet Lol, what the heck is Google GULP?
http://www.google.com/googlegulp/

And this is hilarious

http://www.google.com/technology/pigeonrank.htmlSign up for the Lunar Development team...one of my favorites.
1265.

Solve : Look What's Cooking in Mozilla's Lab (Firefox)?

Answer»

** I love this browser, 2 days and I fell in love with it !! **
been using about 7 months now...........

It's experimenting with ways to incorporate popular features, like social networking applications, into the Firefox browser

After breakneck growth during its first two years on the market, Firefox has BECOME the Web browser of choice for about 15% of PC users. Not BAD, but if the open-source software project hopes to expand its appeal beyond tech-industry insiders and programming geeks, it may need to innovate even faster.

Mozilla's Firefox exploded in popularity after its 2004 release by jazzing up a software category that seemed stale. It packed in features like easy-to-manage bookmarks, tabbed browsing, and an effective pop-up ad blocker. But Microsoft (MSFT), whose ubiquitous Internet Explorer browser hadn't been updated in years, last October released version 7 of its browser, essentially matching Firefox feature for feature and showing how quickly technical advantages can dissipate on the Web. "It's hard to sustain long-term advantage in browsers," says Chris Beard, vice-president of products at Mozilla.

A More Social Firefox

To help regain its edge—and potentially introduce Firefox to a larger audience—Mozilla has started experimenting with ways to fold features of popular Web sites right into its browser. At the same time, the company, a subsidiary of the nonprofit Mozilla Foundation, has opened more early-stage technologies to feedback from developers under a program launched in March called Mozilla Labs.

On April 2, the company announced one of the effort's early fruits: The Coop. The add-on software lets users share favorite Web site links with friends by dragging a page right onto a photo of the person. Internet buddies who inhabit the virtual coop (Mozilla's blog entry on the project features a close-up of a cackling chicken) arrive courtesy of social networking site Facebook. It's just one way Mozilla's engineers envision computer users interacting with one another through their favorite community Web sites—all within the confines of its browser.

"We didn't even chew off all the use cases that we wanted," says Basil Hashem, a senior director of product management at Mozilla. Also in the works are ways to share photos from Yahoo's (YHOO) Flickr site and videos from Google's (GOOG) YouTube, and a tool that lets users update their online status so Facebook friends know whether they're available to chat.

Yahoo's (YHOO) Flickr site and videos from Google's (GOOG) YouTube, and a tool that lets users update their online status so Facebook friends know whether they're available to chat.
How to Monetize?

Along with The Coop, Mozilla has released three other test programs on its Mozilla Labs site, where the company solicits suggestions from software developers about features before they enter the production PIPELINE. Mozilla has tested other social networking applications, such as a version of Firefox that includes tools for posting photos to Eastman Kodak's (EK) Kodak Gallery site, and software called Operator that lets users post contact information or calendar entries to a Web page in a way that desktop software and other Web sites can import. If they stick, the features could inform version 3 of Firefox, which Mozilla is testing now.

What's up for debate is whether embedding social networking tools in browsers is something that a broad swath of Web users will demand. "It's inevitable—it's a natural sort of progression for the browser to do that," says Scott Kveton, CEO of software company JanRain, who used to work closely with Mozilla when he headed an open-source development lab at Oregon State University. Mozilla "has a rapport with a large number of users," he adds (see BusinessWeek.com, 8/30/06, "Mozilla Goes Mainstream"). "If they say, 'We're going to go in this direction,' there are a large number of users and developers who will follow."

Andy BEAL, an Internet marketing consultant at Marketing Pilgrim, which advises companies on promoting themselves via search engines and blogs, says he's used social Web sites like StumbleUpon, which lets users categorize Web pages and vote on their appeal, to promote clients such as travel Web sites. "Everybody's in a scramble to promote social networks, but very few have figured out how to monetize them," he says.

FULL text:

http://www.businessweek.com/technology/content/apr2007/tc20070405_395663.htm?chan=technology_technology+index+page

1266.

Solve : Alcatel-Lucent Achieves a World Record 25.6 Terabit/s Optical Transmission?

Answer»

Alcatel-Lucent
(Euronext Paris and NYSE: ALU) today announced in a post deadline paper accepted at the OFC/NFOEC conference in Anaheim, California, that combined research teams from the United States and France SUCCESSFULLY TRANSMITTED a WORLD record 25.6 Terabits per second (Tb/s) of optical data over a single fiber strand, using 160 Wavelength-Division Multiplexed (WDM) channels - enough bandwidth to TRANSMIT the data from more 600 DVDs per second.

Link


Sign me up...We all have to make sacrifices, I guess I'll have to sign up as a tester . . . it's a hard job but someone has to do it . . .

1267.

Solve : Vista taken down by animated cursor?

Answer»

In what could be the most embarrassing exploit to impact Windows Vista since its commercial launch in January, SECURITY engineers at McAfee's Avert Labs confirmed today - and posted the video to prove - that the operating SYSTEM can be caused to enter an interminable crash-restart-crash loop, by means of a buffer overflow triggered by nothing more than a malformed animated cursor file.

http://www.betanews.com/article/Vista_Can_Be_Taken_Down_by_an_Animated_Cursor/1175201875This reminds me of:
McAfee reports that Windows Accessibility Feature "sticky keys" is an exploit that was never fixed in the release of Vista. Someone could trick a user into downloading a replacement file for the sticky key program, and get them to enable it, making certain keys trigger events.
(this was a summary)
A summary reply to a member of the news article provider stated that the same thing could be accomplished by replacing any .exe file in the Windows folder. (Eg: Lets just remove notepad.exe and replace it with our own virused version)

Malfunctioning... yeah right.
This is an equivelant of the following:
lets all find win.com in the Windows directory
open it with Notepad
and take a whole chunk of the CODE out
restart the computer, and see what happens!!!


In my own personal OPINION, McAfee and some other antivirus companies are throwing a tantrum.
Microsoft is considering closing off kernal.exe to all applications. (Including Antivirus)
McAfee doesent like this... they wouldent be able to "protect" the ALREADY locked to everything Kernal.exe file. (If its protected, then why would a virus infect it?!?!)

http://www.msnbc.msn.com/id/17915077/

Microsoft issuing security patch-

Attacks using the flaw related to cursor animation files used by Windows

1268.

Solve : Broadband Providers Cap Monthly Usage?

Answer» http://www.pcworld.com/article/id,146752/article.html?tk=nl_cxablg

Unlimited isn't what it used to be, as providers test monthly caps, with Sprint's mobile broadband service being the latest to restrict monthly transfers.



At one time, the word "unlimited" meant unlimited. Sprint's mobile broadband service is the latest to abandon the term and the principle in favor of a monthly cap designed to keep their heaviest users from overwhelming their network. But Sprint isn't alone: its two 3G competitors also cap usage, and two wireline broadband operators are testing explicit caps as well.

In the earliest days of broadband, service was either heavily capped, with ridiculously low limits--I recall DSL plans that had 1 GB monthly downstream limits for business-grade offerings--or totally uncapped. As Internet bandwidth has become laughably cheap, most of the caps came off. But that was before YouTube, peer-to-peer file sharing, and digital movie downloads hit.

Now, the idea of capped service with metered rates, stern warnings, or cancellations above a monthly limit are fully in fashion. For the last few years, companies like Comcast and Verizon's wired broadband division have warned users about excessive downloads, degraded their service, or canceled their accounts, often with little recourse, and sometimes denying it all the while. Enough states' attorneys general and FCC staff and commissioners have been involved that what was implicit has become explicit, but with the related effect that caps have become much lower than what they were in the ad hoc days before these changes.

Driving all this is not scarcity, because there's plenty of headroom out there on the Internet, but two interrelated ISSUES: service providers always dramatically oversell their service, and some users are ACTUALLY abusers.

On the first issue, if an ISP has 500 people connected to a central office DSLAM (a DSL aggregator) with a total downstream bandwidth of 2 Gbps, there's no universe in which a phone company makes available 2 Gbps to that location. Rather, they allot a fraction of that, which works when traffic is bursty, not continuous. Many people downloading or streaming a lot impact everyone in the same grouping. (I've seen this at home when I complained about my 3 Mbps DSL dropping to 500 Kbps at night. A Qwest technician explained I was lumped with heavy users, and with about 20 minutes of waiting on the phone, regrouped my line to another, less used pod of users, and my service has been fine since. The nice part is that was a logical change; no one had to walk over to a cage and move my wires around.)

The second issue has provoked a lot of debate. It's clearly true that some users abuse broadband. It's likely true that the 20/80 rule applies to broadband: 20 percent of users likely consume 80 percent of bandwidth. But there's also something like the 3/80 rule: perhaps 3 percent or fewer of subscribers on a system consume 80 percent of that 80 percent. Many of those users are engaged in P2P file sharing of illegally copied material, according to many of the studies of bandwidth use.

But without explicitly labeling the limits on a service, a subscriber can't technically abuse it. If you know when you sign up for Comcast that they limit your use to 10 GB and provide tools to monitor as well as an understanding of what that bandwidth would allow you to "consume" each month, it's a very different matter than "all you can eat."

Verizon had long promised unlimited BroadbandAccess for their 3G EVDO mobile broadband service. But it was well documented that unlimited had fairly strict limits. After an investigation by the New York attorney general's office, Verizon agreed to change its disclosures, pay some costs to the state, and refund money to some subscribers. The company now fully discloses its 5 GB per month limit for combined upstream and downstream data.

Verizon charges you 49 cents per MB ($490 per GB) when you cross that limit, and the company says that they use email, SMS, and a live data usage display in their connection manager to keep you apprised. Note that a single high-definition movie download might consume nearly 5 GB.

AT&T, likewise, has a 5 GB cap each month on LaptopConnect, its 3G cell data offering, with unspecified behavior when you top that amount--additional charges may apply, but clarity would be helpful. They note in their PDF-only terms and conditions: "The parties agree that AT&T has the right to impose additional charges if you use more than 5 B in a month.�� Prior to the imposition of any additional charges, AT&T shall provide you with notice and you shall have the right to terminate your service."

Sprint has joined this club with first the leaked news and then official confirmation that starting July 13, 2008, its 3G service would also have a 5 GB cap. A SPOKESPERSON told me that off-network roaming--ostensibly with Verizon or Alltel, the only other major providers of 3G in the US using the EVDO flavor--is capped at 300 MB per month.

Now these are all 3G providers, who have limited spectrum over which they have to make sure all contending users in each cell get approximately the same kind of EXPERIENCE. They can't afford one user sucking down all bandwidth. However, we're seeing the same kinds of limits start to be tested for cable-based broadband.

Comcast is testing delaying traffic--slowing down packet tranmission to throttle the bandwidth rate--in two Eastern cities they cover for the heaviest users of their service. This is an effective cap, rather than a cutoff. (Comcast has been delaying BitTorrent P2P traffic for all its users prior to this; this change affects all traffic, not just BitTorrent, and is being announced, instead of sub rosa.)

In a town in Texas, Time Warner Cable is experimenting with offering different speed packages each of which is coupled with a monthly limit on usage. The lowest-priced package offers a ridiculous 768 Kbps downstream and 1 GB per month for $30 per month; the highest-priced is 15 Mbps downstream with a more reasonable 40 GB per month limit. Charges are $1 per GB above that.

With cable companies traditionally and telephone companies newly offering television programming, premium channels, and on-demand video, the caps are another tool to prevent competition from over-the-Internet sources of things to watch.

In a situation in which a few carriers control all the pieces, it's unclear whether rate caps can stick. If both telcos and cable companies decide to impose such limits and restructure their networks, who do you turn to? People with broadband are unlikely to cancel it. In a monopoly or duopoly market, you can't switch brands.

There has to be a happy middle--a role that the FCC may help to negotiate. A 40 GB cap switched to 400 GB might serve precisely the right purpose without PENALIZING average users who have no other market choice. With Time Warner Cable charging a buck a gigabyte above their monthly limits in their test market, but with Amazon's S3 service delivering it retail for as little as a tenth that, it's not hard to see that carriers are looking to caps to solve network problems and make a little scratch on the side.
This reminds me of what happened in little New Zealand...

Telecom offered unlimited Broadband Downloads, at high speeds.
We got it right at the end of this "service" (one of the last people in the whole country I believe, we bought it the day before it went under)

However, New Zealands ancient copper network was not sufficent for the abuse the unlimited plans were giving it, meaning that in the two months it was offered, the speed dropped from about 3mbs to almost 200kbps (at least thats what it came to at our house)

The service stopped, but to the surprise of everyone, users were given a choice. They could either switch to a different plan, or stay on the unlimited and hope it got better...

We stayed...

Most of the users left...

Now we get 2mbs with an unlimited plan!

Awesome, innit?
1269.

Solve : “Gmail” Outlawed in Germany?

Answer» HERE

Google had its Gmail tail handed to it on a platter when a German court held - not once, but twice (in preliminary and final orders) - that it COULD not use the name “Gmail” in Germany, as it infringed on a prior user of that name.

As a result, Google is banned from using the Gmail name in Germany, and German Gmail users and others in Germany who wish to access the Google email service are banned from accessing the service via the Gmail domain (gmail.com). Instead they must use an alternate URL.

German Gmail users were greeted with the following starting at the end of last week:

“We can’t provide service under the Gmail name in Germany; we’re called Google Mail here instead. If you’re traveling in Germany, you can access your mail at http://mail.google.com. Oh, and we’d like to LINK the URL above, but we’re not allowed to do that EITHER. Bummer.”

The issue arose because German citizen Daniel Giersch has a paper mail service called “G-mail”, which he founded in 2000, as much as four YEARS before Google launched Gmail. Gmail was launched in 2004.

In addition to being told in no uncertain terms that it could not use the Gmail name in Germany, the German courts have banned Google from any further attempts to grab the Gmail name for itself in Germany.What has the internet turned into?!! In "dot-com" times, I had a client in Redwood City, CA, who owned "work.com" domain. Shortly before "dot-coms" went down, he sold his domain to, I believe BofA, for something close to 1 mil. After that, I constantly saw him SITTING at his swimming pool, reading a paper, and enjoying life....ehhhh.
1270.

Solve : Infected Websites Replace Email as Main Source of Infection?

Answer» HERE

The Web has become decidedly more dangerous in the past year, as a wave of SQL injection and other types of attacks has compromised hundreds of thousands of LEGITIMATE websites, according a new report released by ScanSafe researchers.

Comparing MAY 2007 to last month, the volume of threats facing Internet USERS increased 220%, researchers at the San Mateo, Calif.-based managed Web security company said. At the same time, the risk of exposure to exploits and compromised websites increased 407% while backdoor and password-stealing malware shot up 855%
.

During the past six months, a flood of attacks have compromised websites and loaded them with malicious scripts and iframes that infect visitors' computers with backdoors and password stealers. While SQL injection attacks have been the most severe, other attacks have used stolen FTP credentials and cross-site scripting, said Mary Landesman, ScanSafe senior security researcher. Many of the attacks trace back to China.

"It was a different world just a year ago," she said. "The advice has always been to avoid unknown and bad sites and to STICK with known, trusted sites. In this current environment, the site that's likely to harm you is that known, legitimate site."

The availability of automated and often free attack tools is largely to blame for the surge in website compromises, Landesman said.

"It's the financial opportunity of a lifetime for would-be attackers. They get the tools for free, compromise sites with no coding skills required, and deposit backdoors and password stealers onto people's systems," she said, adding that attackers then auction off the stolen information.

ScanSafe based its report on malware it blocked for corporate customers. Landesman said for normalization purposes, the analysis studied the same set of customers for May 2007 and May 2008. The data provides perspective on the actual risk because it is based on sites that corporate users are visiting, she added.

Some pages of retail giant Wal-Mart's website were among the latest victims in the latest round of SQL injection attacks. In a blog posting Tuesday, Landesman said that a visitor shopping for an inexpensive art print could have encountered a malicious Shockwave Flash (SWF) file exploiting Adobe Flash Player vulnerabilities. Wal-Mart quickly fixed the pages, she said.

"When you have a site that's as large as Wal-Mart from a corporate standpoint, it really underscores the susceptibility that all sites have to these attacks," she added. Other sites compromised this year include the United Nations, Nature.com, and Honda Thailand.

An unusual aspect in the attacks affecting Wal-Mart is the number of malicious domains involved – at least 20 and most registered on May 28 and 29, she said. Instead of just referencing a single malware host, the attacks might embed references to multiple malware domains.

In April, researchers at antivirus company Sophos released a report that showed a DRAMATIC increase in Web-based threats this year. In the first quarter, Sophos researchers discovered a newly infected Web page every five seconds, three times more than last year. Seventy-nine percent of the sites were legitimate ones that were hacked.
1271.

Solve : Firefox Download Day - Help Set a Record?

Answer»

I think North Korean's dictatorship has something against Internet, as a WHOLE...

Quote from: Broni on June 18, 2008, 03:59:03 PM

I really missed Tab Mix Plus

From here.

Quote
Click the link to INSTALL Tab Mix Plus in FIREFOX 3

http://tmp.garyr.net/tab_mix_plus-dev-build.xpi

Quote
Does North Korea have something against Firefox? Nobody downloaded firefox from there or Timor-leste

North Korea has something against everybody! They probably have it censored/blocked along with other 3/4 of web pages they block.



Thanks evil, but I still have some other add-ons not compatible with FF3, so I'll wait for few more weeks, before full switch.I saw a documentary on North Korea and the majority of the population doesn't even know what the Internet is heck most of the GENERAL public don't even have telephones and mobile phones are banned; TVs are also all government CONTROLLED. The government likes to keep it people oppressed as much as possible. Really sad and unfortunate. I still have a lot of fears about what's going to happen when Kim Jong-il dies, since a lot of the people are so brainwashed that they think of him like a God.

I think this satellite image pretty much tells the whole story of the condition of North Korea:

http://www.globalsecurity.org/military/world/dprk/dprk-dark.htm

1272.

Solve : AMD's latest FireStream processor hits 1 teraflop?

Answer»
Advanced Micro Devices previewed on Monday the LATEST version of its high-PERFORMANCE chip package, the FireStream 9250, which is due later this year.

Chips in the FireStream line offer much faster performance for MATHEMATICAL calculations than other processors. FireStream can TAKE a single instruction and execute it using multiple sources of data in parallel.

Link

1273.

Solve : The Brain Mouse Goes on Sale?

Answer»

Yes it does but its for the better. Remember yk2? In the first few months about 25% percent of the world population would be gone, know if we started using this product we might reach another y2k. Then what how would we survive? Cause we dont need to do the stuff we used too we done away with it. Would be cool for chess games an such but nothing more. Which defeats the use of me getting it. When you play a game its you against pc code. If you use thought your gaining more of an advantage an the game looses its difficulty, cause part of a good game is having people not win right away but have to work at it. Not mean in the FF series even thought there good just really long.Y2k was related to a minor oversight concerning the interpretation of the year portion of a short date. The assumption that the year 2000 was so far away brought on the use of SIMPLE prepending 19 to the short date. IE, 01/01/98 becomes 1998. However, after the year flipped to 2000, that dates year would become 00, or 1900. Thus the problem. really minor- however, the media escalated it (as they tend to do with otherwise ho-hum computer related stories) essentially giving all computers everywhere a conscious knowledge of existence, and (apparently) when the year rolled over computers would "know" that things aren't supposed to EXIST and/or that no planes are scheduled to fly, and make a conscious effort to make them fall down. Ludicrous- yes.

the next Y2k crisis isn't until 2038. MFC 's CDate will hopefully not be used anymore....

Quote from: squall_01 on JUNE 15, 2008, 03:03:32 PM

Then what how would we survive?

by adapting.Exatly but not EVERY one would be able too.
1274.

Solve : Google preps net neut dowser?

Answer»
In an effort to IDENTIFY traffic discrimination by American ISPs, Google is prepping a suite of network analysis tools for EVERYDAY broadband users.

"We're trying to develop tools, SOFTWARE tools...that allow people to detect what's happening with their broadband connections, so they can let [ISPs] know that they're not happy with what they're getting - that they think certain services are being tampered with," Google senior policy director Richard Whitt said this morning during a panel discussion at Santa Clara University, an hour SOUTH of San Francisco.

Linki want it! i wanna make shure my isp isnt being retarted again!Nice. I can finally see who's using up all my internet bandwith. My Online Haloing or my brother's downloading... Google should promote network NEUTRALITY. This is a good step.
1275.

Solve : Introducing Java SE 6 update 10 Beta?

Answer» Introducing Java SE 6 Update 10 Beta

Quote
Don't be fooled by its unassuming name: the upcoming Java SE 6 update 10 (currently in beta release) is a very different animal than the updates that preceded it. Java SE 6u10 pushes the envelope by adding more new features and functionality than in any previous Java PROGRAMMING language update release, including many that have been a long time coming.
Officially, a "Java update release" is a release in which only the fourth version number (the 10 in 1.6.0_10) changes. Unlike major releases, update releases are not allowed to add, remove, or change any public APIs, and generally this has limited update releases to only containing bug fixes. 6u10 likewise contains no new or changed public APIs -- but despite that restriction, we still managed to squeeze in some incredible new features.
Quote
New Plug-In ADVANTAGES:

  • IMPROVED reliability
  • Improved JavaScript communication
  • Per-applet control of JRE command-line arguments
  • Per-applet control of JRE memory settings, larger maximum heaps
  • JNLP support
  • Per-applet JRE version selection
  • Improved Vista support
Much more information about the new plug-in can be found in the release notes.
Thanx for the Heads Up ! !

GOOD to see Java is finally cuttin you a check now and then...
I just wonder where update 7, 8 and 9 went

Maybe the final is going to be version 7.Just cash the checks daily and don't give it a second thought....

Heh....I nearly got in trouble doing that once

Just kidding Nice $$ smiley. But I think Java would be the last thing I'd want to beta TEST.
1276.

Solve : Malware Knows Your Router Passwords!!!?

Answer» HERE

Quote
This thread was triggered by the APPEARANCE of a new threat to wireless home networks, though it applies to wired routers too. Home networks are simple to set up. That's the problem! Take it out the box, plug it in, reboot, and presto! You are surfing the Internet. With Ethernet (wired) routers, someone would actually have to physically connect to your network to gain access - using the default passwords was (sadly) not perceived as a big threat.

But today, with wireless access every where, it is paramount users change, at the very least, the administrator password from the factory defaults to a strong (letters, numbers, and special characters) password. Sadly, many don't. That makes those networks "easy pickin's" for bad guys because the default passwords are common KNOWLEDGE, posted all over the Internet, and in your owner's manual.

So bad guys and wannabe hackers know all the default names, and now, as reported here (http://blog.washingtonpost.com/securityfix/2008/06/malware_silently_alters_wirele_1.html), a new variant of the Zlob Trojan does too!

There are a couple basic things that everyone should do to secure your router, and your wireless network, whether through a wireless router, or a wireless access point (WAP).

1. Change the default password and, and if allowed, the administrator user name - the defaults are common knowledge.

2. Change the default SSID or Network Name - same story.

3. Disable SSID Broadcasting - many routers come with SSID Broadcasting enabled. This allows anybody, including the badguy to drive down your street and see your network. Why advertise you have a wireless network unless you run a wireless cafe?

4. Use MAC Address Filtering - every network device, such as a network interface card, router, cable modem, etc. has (is supposed to have) a unique MAC address - by using MAC address filtering, you instruct your router to only let that device through.

5. Enable encryption - use the highest level that all your devices SUPPORT.

6. Use Ethernet - most wireless routers include a 4-port Ethernet switch - use that for your fixed (not portable) networked computers. This also ensures you will have access to your router's security settings should wireless access fail.

Will these steps eliminate all risks? NO! But locks are to keep honest people honest. If a bad guy wants in, he's coming in - depending on his tools and skills - and demeanor. But like all bad guys (except for the PURE pros) they seek opportunities for easy pickings. Keep your garage door open at night with no lights on and someone is GOING to see that as easy pickings. Keep the door closed, locked and well lit, 99.9% of the badguys are going to move on. They certainly are not going to park in a strange car out front and point an antenna at you or your neighbor's house without attracting unwanted attention.
Changed SSID and default password when I set my network up. I use both MAC filtering and encryption.

Heck, I've got this thing set up so well that sometimes even I can't get on my own network. Quote
I've got this thing set up so well that sometimes even I can't get on my own network.
LOOOOOOOOL
1277.

Solve : Firefox 3 Release Date Announced?

Answer» Mozilla Developer News Blog Archive Coming Tuesday, June 17th: Firefox 3

Quote
Coming Tuesday, June 17th: Firefox 3

Whenever we’re asked “when is Firefox going to be released” we ENDEAVOR to answer to the best of our abilities, but the truth of the matter is that we’ll only EVER ship “when it’s ready”. We have a lot of indicators that help us understand when the product is ready for release: feedback from our pre-release milestones, EXCITEMENT in the community and the press, availability of compatible Add-Ons, and a large ACTIVE beta community helping us ensure that the release is compatible with all the various sites on the Internet.
After more than 34 months of active development, and with the contributions of thousands, we’re PROUD to announce that we’re ready. It is our expectation to ship Firefox 3 this upcoming Tuesday, June 17th. Put on your party hats and get ready to download Firefox 3 — the best web browser, period.
Quote
the best web browser, period.
I think we'll judge that our selves Quote from: Carbon Dudeoxide on June 13, 2008, 10:41:28 PM
Quote
the best web browser, period.
I think we'll judge that our selves

Well Firefox 2 was IMHO way better than anything else, and FF 3 is way way better than FF 2, so I agree with that quote.
1278.

Solve : Mozilla Firefox Beta (Gran Paradiso) 3.0 RC2?

Answer» Releases/Firefox 3.0rc2/ - MozillaWiki

|MG| Mozilla Firefox Beta (Gran Paradiso) 3.0 RC2Installed and running on main computer. So far looks good. I REALLY like the fact that all my plug-ins appear to be working too.Yeah, not bad.Installed it, used it for 5 mins, uninstalled it, went back to 2.0.0.14. Can't run Greasemonkey, so none of my scripts work, it won't run Noscript, so I LOSE that protection, it "found" an old SET of bookmarks from about 6 months ago, I could GO on... I'll wait for the final release and then a bit longer, till all my addons are fixed.
Dias do you have MR Tech Local Install ? ?
This allows most extensions to run fine after updates are released...after updates have been released... but at the moment they haven't.

I meant the Browser updates...
If you install it and USE it to re-install the non-updated extensions you will find that most of them will run fine on newer FireFox builds...Next.

Mozilla Firefox Beta (Gran Paradiso) 3.0 RC3It's too bad the update in RC2 doesn't detect and update it to RC3. In any case I've downloaded this and plan on trying later tonight.I have bitten the bullet and gone over to version 3.0 RC3. I am very pleased that I did. One thing that seems to have gone away, thank God! is that well known awful bug where, without warning, you suddenly could not navigate in web pages or within text input dialogs (like the one I am typing in right now) using the Home/End/Page Up/Page Down or arrow keys. Or highlight text with the mouse. The cure was to empty the browser cache. Also it loads a lot faster. I had a peeve which was that RC2 said that none of my addons were compatible. Well, I took a hard look at them and uninstalled all except about 4, and these ones seemed to be updated by the time RC3 came out. I even found a beta of Greasemonkey from June 08 that works too, so I am happy. Next Tuesday I will be downloading the release version.
1279.

Solve : Bits from Bill?

Answer»

Bill Pytlovany - WinPatrol creator

This is a pretty neat blog entry.

Quote

Things Microsoft Did That MADE Me Happy
Monday, June 09, 2008
I was very surprised recently when someone suggested I HATE Microsoft. They had read my comments about Vista and auto updates and actually thought I might be a closet Mac lover. I don’t currently have a Macintosh but I have in the past........I’ll tell you a few of my favorites.

http://billpstudios.blogspot.com/Though I'm not a fan of Vista because it's such a hardware HOG, I must say I really enjoyed reading that, and intend to visit in the future.Quote from: Aegis on June 11, 2008, 06:33:46 PM
Though I'm not a fan of Vista because it's such a hardware hog, I must say I really enjoyed reading that, and intend to visit in the future.
There are more reasons for me why I don't like but that is ONE of them.

Nice Read though.
1280.

Solve : Are Torrent website listings coming to an end??

Answer»

Quote from: CBMatt on May 29, 2008, 03:02:22 AM

As soon as you explain to me what's so dangerous about going to this particular bank. Is this Oregon Trail II?

OK now I am REALLY confused Then no cake for you I'm afraid...Quote from: BC_Programmer on May 29, 2008, 08:46:49 AM
Quote from: CBMatt on May 29, 2008, 03:02:22 AM
As soon as you explain to me what's so dangerous about going to this particular bank. Is this Oregon Trail II?

OK now I am REALLY confused

Well, according to the PASSERBY, it's apparently dangerous to go to the bank alone, which is why he gave the Robber a gun. I'd like to know what's so dangerous about going to the bank, aside from being attacked by Natives from Oregon Trail II.It's not really that dangerous- the passerby just thought he was actually on a mission to recover the pieces of the triforce (he was JUST released from the institute...). Also he was an old man wearing red, and often made such statements and gave out wooden weapons to people, unless they had sufficient heart to handle his more powerful inventory items. Of course I can't at this POINT explain the reference to marmots...It makes perfect SENSE now.
1281.

Solve : Mozilla: Final Firefox 3 expected in June?

Answer»
Firefox fans looking for a MAJOR update to the open-source WEB browser probably will GET a final version of it next month.

"We're looking for final ship sometime in June," said Mike Schroepfer, Mozilla's vice president of engineering, in an interview Wednesday. Mozilla, which was spun out of AOL more than 10 years ago, oversees the Firefox programming project.

Link
1282.

Solve : Windows UI Taskforce: your help wanted - by Long Zheng?

Answer» http://www.istartedsomething.com/20080531/windows-ui-taskforce-your-help-wanted/

Quote
Most of us who use Windows Vista have probably come across a couple of user-interface quirks during our times - some of which irritate you more than OTHERS, some are more obvious than others. With the development of Windows 7 speeding full-steam ahead, I thought this might be an opportunity as good as ever to make these PROBLEMS known to Microsoft and hopefully get them all resolved.

Instead of going at it alone, I thought this is the perfect opportunity to harness the wisdom of the CROWD. Therefore I’m asking you to submit any UI quirks you know of in Vista and I’ll help compile a list of them together, including but not limited to legacy icons, legacy styles and malformed layouts. INCLUDE with it a brief description of the problem (and possible alternative if appropriate).

I can’t promise you that all bugs will be fixed but I will push them to someone at Microsoft who has been said to “get things done”. Without a further ado, I’ll kick it off with a couple of examples.

I understand the FONTS dialog using Win 3.1 dialogs (I had a giggle when I went to install fonts in XP- heck, I thought it was funny in 95...) but, the second one is kind of silly- Oh my god NO! it uses a icon from a previous version of windows! They probably didn't update it because they didn't need to. And is this "Previous Versions" Tab a Vista feature or a feature installed by some other app?
1283.

Solve : Apple Repairs Five QuickTime Flaws?

Answer»
APPLE released five security fixes COVERING vulnerabilities for its QuickTime application today, all of which repair errors that could allow remote hackers to launch an attack on affected computers.

Link

I also UPDATED the System info script yesterday to contain this new INFORMATION so users running this will know they're out-of-date.

Quicktime? Who uses quicktime? Well regardless if you use it or not. Having an older un-updated version on your system is a security vulnerability.
1284.

Solve : A piece of VUNDO history?

Answer»

Quote

Nobody expected it to still be alive now and used as a component of chain infection.

Uncovering VUNDO | Malware Blog - by Trend MicroGood INFO...Thanx !Probably impossible but it would be interesting to know how many $$$ have been made (scammed) from it.I'm sure if it's still going they're making some good money. HOWEVER, is it going to be ENOUGH to pay LAWYER fees and other related fees when a company such as Microsoft or the government goes after the writers, others proliferating it, or those making money from it?
1285.

Solve : U.S. Government Sought Customer Book Purchasing Records from Amazon.com?

Answer»

This is pretty disturbing IMO..

Recently UNSEALED court records shed more light on the federal government's ATTEMPTS to secure the online BOOK purchase records of 24,000 Amazon.com customers.

Quote

"The subpoena is troubling because it permits the government to peek into the reading habits of specific individuals without their knowledge or permission," Crocker wrote in his ruling. "It is an UNSETTLING and un-American scenario to ENVISION federal agents nosing through the reading lists of law-abiding citizens while hunting for evidence against somebody else."

Link

Maybe instead of the Pledge of Allegiance, we should have to recite the Gettysburg Address every day. All together now:

...and that government of the people, by the people, for the people, shall not perish from the earth."Yeah, and in my case, he's saying, "What a maroon!"
1286.

Solve : Military Supercomputer Sets Record?

Answer»
An American military supercomputer, assembled from components originally DESIGNED for video GAME machines, has reached a long-sought-after COMPUTING milestone by processing more than 1.026 QUADRILLION calculations per second.

Link1.026 quadrillion calculations per second....that sounds very appealing..
1287.

Solve : Norton zaps China?

Answer»

OOPS

More fuel for the Norton bashers.

Symantec serves up blue screen of DEATH in China


stupid norton I will NEVER buy their products again. I liked Norton Antivirus 2002.I thought it was OKAY too until I GOT rid of it and found tons of viruses after downloading and installing avast so norton didn't do very well it was so bad that I had to buy a new hard drive and reinstall windows.

1288.

Solve : Elude Your ISP's BitTorrent Blockade?

Answer» http://www.pcworld.com/article/id,145786/article.html?tk=nl_cxanws

More and more Internet service providers are blocking traffic to the peer-to-peer file-sharing service. Find out whether you've been targeted, and learn how to get around the restrictions.

I'm a fan of live music and a patron of online communities such as eTree.org, where music junkies swap copyright-free music. So I was stung when I recently tried to download a live recording of a Dave Matthews concert only to discover that my BitTorrent client was dead in the water.

My system and Net connection checked out fine, so paranoia immediately set in: Was my Internet service provider, RCN, blocking BitTorrent? I called RCN and the TECH I spoke to confirmed my suspicions, telling me that the ISP had added BitTorrent to its list of prohibited programs because many people use the software to download COPYRIGHTED material. The fact that the concert I was trying to download was copyright-free didn't sway him.

Later I called RCN's press department as a reporter, and the story changed. The ISP's spokesperson told me that the customer support rep I had talked to earlier misspoke. RCN has never intentionally blocked peer-to-peer traffic, the spokesperson said, and it supports the principles behind Net neutrality. Within 24 HOURS, my bandwidth-related problems with BitTorrent vanished.

Of course, most people can't call their ISP and (honestly) identify themselves as professional journalists. But that doesn't mean you have no recourse if your ISP starts blocking your file-sharing activities. A number of tips and tools can help you determine whether you're facing a BitTorrent blockade and, if so, help you get around it.

Vuze, a company that makes peer-to-peer software and uses the platform to distribute content, published a study in April in which it concluded that all U.S. broadband providers--including AT&T, Cablevision Systems, CHARTER Communications, Comcast, Cox Communications, Qwest, Time Warner Cable, and Verizon--disrupt peer-to-peer traffic. Vuze asserted that these ISPs regularly send "false reset" messages to the Vuze software with the aim of slowing file transfers.

AT&T has flatly denied this claim. Subsequently, Vuze has softened its charge against ISPs, stating that "Our data collection was credible and transparent, but not conclusive," in the words of Jay Monahan, Vuze general counsel.

Other ISPs have acknowledged imposing some limitations on peer-to-peer traffic. Comcast first denied but now admits to interrupting access to file-sharing programs such as BitTorrent. Comcast executive vVice president David L. Cohen explained at a Federal Communications Commission hearing last February that disrupting BitTorrent traffic was a reasonable method of traffic management during busy usage periods.

Time Warner Cable spokesperson ALEX Dudley says that his company takes reasonable steps to manage its network, including limiting bandwidth to applications such as peer-to-peer software.

More at the above link....

...and test your ISP using this: http://broadband.mpi-sws.mpg.de/transparency/My Comcast tested fine...Good article and looks like a good online tool. Unfortunately was busy when I tried it so I was unable to try my connection.Cablevision (Optimum Online) tested fine.

Telus tested fineMy Comcast tested fine as well.
1289.

Solve : NASA Scientists Make Magnetic Fields Visible, Beautiful?

Answer»
Magnetic fields are invisible, at least USUALLY. But Scientists from NASA's Space Sciences Laboratory have made them visible as "ANIMATED photographs," using sound-controlled CGI and 3D compositing. It makes the fields, as explained by the scientists, dance in an absolutely gorgeous movie called Magnetic Movie. You don't want to miss this one, which is the coolest video that you'll see all week, guaranteed. You can't argue with a COMBO of beautiful effects and amazing science.

Link
1290.

Solve : Microsoft to Limit Capabilities of Cheap Laptops?

Answer»

From PCWorld.com through Yahoo! News:

Partial quote (see link for complete article):
Quote

Microsoft is launching a program to promote the use of its Windows OS in ultra low-cost PCs, one effect of which will be to limit the hardware capabilities of this type of device, IDG News Service has learned.

Microsoft plans to offer PC makers steep discounts on Windows XP Home Edition to encourage them to use that OS instead of Linux on ultra low-cost PCs (ULPCs). To be eligible, however, the PC vendors that make ULPCs must limit screen sizes to 10.2 INCHES and hard drives to 80G bytes, and they cannot offer touch-screen PCs.
Good LUCK Microsoft... Going to really be hard to compete with *nix when they limit and put restrictions on their own OS as a substitute.I smell more anti-trust legislation...i think the Legal division is the only one turning a profit in Redmond SINCE the Vista release so they're willing to try anything.Quote
Microsoft is launching a program to promote the use of its Windows OS in ultra low-cost PCs
Hmmm, I thought, it's been in WORKS already....Vista computers with 1GB of RAM, XP computers with 256MB of RAM, etc.And they insist that the manufacturers install a root-kit that communicates with microsoft headquarters, so they can um- "improve the customer experience". One way to do that would have been to concentrate some effort on improving malware protection in Vista rather then making sure that nobody can copy a single frame of their HD movie to any media.
1291.

Solve : Intel Business Practices Face Investigation?

Answer» http://www.boston.com/business/articles/2008/06/07/intel_business_practices_face_investigation?mode=PF

Quote
Intel business practices face investigation

By Bloomberg News | JUNE 7, 2008

SAN FRANCISCO - The Federal Trade Commission opened a formal investigation into Intel Corp.'s business practices, heightening worldwide scrutiny of the tactics the chip maker uses to dominate the $31 billion computer processor market.

Intel received a subpoena from the FTC on June 4, ACCORDING to the Santa Clara, Calif., COMPANY. The FTC started an informal probe in 2006.

The action adds to investigations in Europe and Asia after Advanced Micro Devices Inc. accused Intel of using illegal practices to stop computer makers from buying AMD chips. Intel had about six times AMD's revenue last year, and the two companies account for almost all personal computer chip sales.

"The government is getting serious about this stuff," said David Wu, an analyst at Global Crown Capital in San Francisco.

Intel said its practices are WELL within US law and that there is fierce competition with AMD. Processor prices fell 42 percent from 2000 to 2007, Intel said.

"Both companies agree that this is an innovative market, and both companies agree that prices are falling," Intel general counsel Bruce Sewell said. "What's the problem?"

Intel shares have slumped 14 percent this year. AMD, based in Sunnyvale, Calif., declined 35 cents, or 4.5 percent, to $7.43 on the New York Stock Exchange.

AMD, founded a year after Intel in 1969, is the only remaining challenger in a market that once included chip makers such as Motorola Inc. Intel chief executive Paul Otellini fended off advances by AMD in 2005 and 2006 by revamping Intel's chips last year, while Advanced Micro delayed new products.

The European Commission, the 27-nation bloc's executive branch overseeing antitrust regulations, accused Intel in July 2007 of abusing its dominance. A judgment is pending in that case.

This week, South Korean regulators fined Intel about $25 million for offering what it said were illegal discounts. The company is appealing. In 2005, Japan forced Intel to remove contract clauses restricting Japanese computer makers from using other chip suppliers.

In the first quarter, Intel had 78.5 percent of the processor market, down from 80.5 percent a year ago, according to Cave Creek, Ariz.-based Mercury Research. AMD had almost all the rest.
© Copyright 2008 The New York Times Company

Anyone remember Cyrix?
1292.

Solve : Jack Thompson: Judge Recommends 'Guilty' on 27 Counts?

Answer»

For those not familiar with who Jack Thompson is, he's the lawyer and one of the biggest critics against violent video games.

--

Lawyer Jack Thompson has long been more famous for practicing publicity stunts than law. But now it seems that Thompson's discipline has finally caught up with him.

Game Politics reports that the Florida Bar issued a 38-page complaint against Thompson in early 2007, and the resulting trial concluded late last year. Now the decision is in, and Judge Dava Tunis has recommended a guilty verdict for 27 of the 31 charges, including "knowingly making a false statement of material fact or law to a tribunal" and "using means that have no PURPOSE other than to embarrass, delay, or burden a third person." ACCORDING to Law.com, Thompson filed a motion Tuesday to strike the recommendations as being too vague.

Link

Good. How many lawyers are left?

If these people had the same attitude when SMB was released, they would have thrown a fit. I mean, "Mario is eating MUSHROOMS and he gets bigger. This will cause children to GO out and do drugs and be prostitutes and maybe even kill people...." I move that Nintendo stop publishing this filth and give me a million dollars for no reason.

Wasn't he the lawyer that kept defending those stupid kids and used games as an EXCUSE?


WARNING: scenes occuring in your prison CELL may be too graphic for anybody.Quote from: BC_Programmer on May 20, 1970, 11:32:09 PM

Wasn't he the lawyer that kept defending those stupid kids and used games as an excuse?

Yep.
1293.

Solve : FBI wants widespread monitoring of 'illegal' Internet activity?

Answer»
The FBI on Wednesday called for new legislation that would allow federal police to monitor the Internet for "illegal ACTIVITY."

The suggestion from FBI Director Robert Mueller, which came during a House of Representatives Judiciary Committee hearing, appears to go beyond a current plan to monitor traffic on federal-government networks. Mueller seemed to suggest that the bureau should have a broad "omnibus" authority to conduct monitoring and surveillance of private-sector networks as well.

LinkI THINK its already in action

Oh my Gosh!!!!!!! In the world we live in today, I'm inclined to think such monitoring is quite needed to protect U.S. citizens from terrorist attacks. As long, as they don't touch my computer.I STOPPED the foolish notion of expecting Privacy on the Web at least 6 years ago....
It simply does not exist anymore WITHOUT using some drastic precautions...or the use of 1 simple program

god forbid they actually go after the serial killers and stuff...

FBI: PUT your hands up!

Killer: Oh- hey there- uhhh

FBI: drop your weapon!

Killer: this is covered in ketchup! I swear!

FBI: Drop it! put your hands on your head!

Killer: Hey look! Over there! some young kid downloading music!

FBI: Take this you scum! *starts shooting in that direction*

Killer: Ha! I fooled you! It was just your partner!

FBI: NOOOOO! why was he downloading music!

Killer: *sigh* (runs off)
1294.

Solve : Time Warner To Try Bandwidth Caps, $1/GB Overage Fees?

Answer» http://www.insidetech.com/news/2235-time-warner-to-try-bandwidth-caps-1gb-overage-fees

Quote
Time Warner to Try Bandwidth Caps, $1/GB Overage Fees

Associated Press / AP Online

June 02, 2008

NEW YORK – You’re used to paying extra if you use up your cell phone minutes, but will you be willing to pay extra if your home computer goes over its Internet allowance?

Time Warner Cable Inc. customers – and, later, others – may have to, if the company’s test of metered Internet access is successful.

On Thursday, new Time Warner Cable Internet subscribers in Beaumont, Texas, will have monthly allowances for the amount of data they upload and download. Those who go over will be charged $1 per gigabyte, a Time Warner Cable executive told the Associated Press.

Metered billing is an attempt to deal fairly with Internet usage, which is very uneven among Time Warner Cable’s subscribers, said Kevin Leddy, Time Warner Cable’s executive vice president of advanced technology.

Just 5 percent of the company’s subscribers take up half of the capacity on local cable lines, Leddy said. Other cable Internet service providers report a similar distribution.

“We think it’s the fairest way to finance the needed investment in the infrastructure,” Leddy said.

Metered usage is common overseas, and other U.S. cable providers are looking at ways to rein in heavy users. Most have download caps, but some keep the caps secret so as not to alarm the majority of users, who come nowhere close to the limits. Time Warner Cable appears to be the first major ISP to charge for going over the limit: Other companies warn, then suspend, those who go over.

Phone companies are less concerned about congestion and are unlikely to impose metered usage on DSL customers, because their networks are structured differently.

Time Warner’s tiers will range from $29.95 a month for relatively slow service at 768 kilobits per second and a 5-gigabyte monthly cap to $54.90 per month for fast downloads at 15 megabits per second and a 40-gigabyte cap. Those prices cover the cable portion of subscription bundles that include video or phone services. Both downloads and uploads will count toward the monthly cap.

A possible stumbling block for Time Warner Cable is that customers have had little reason so far to pay attention to how MUCH they download from the Internet, or know much traffic makes up a gigabyte. That uncertainty could scare off new subscribers.

Those who mainly do Web surfing or e-mail have little reason to pay attention to the traffic caps: a gigabyte is about 3,000 Web pages, or 15,000 e-mails without attachments. But those who download movies or TV shows will want to pay attention. A standard-definition movie can take up 1.5 gigabytes, and a high-definition movie can be 6 to 8 gigabytes.

Time Warner Cable subscribers will be able to check out their data consumption on a “gas gauge” on the company’s Web page.

The company won’t apply the gigabyte surcharges for the first two months. It has 90,000 customers in the trial area, but only new subscribers will be part of the trial.

Billing by the hour was common for dial-up service in the U.S. until AOL introduced an unlimited-usage plan in 1996. Flat-rate, unlimited-usage plans have been credited with encouraging consumer Internet use by making billing easy to understand.

“The metered Internet has been tried and tested and rejected by the consumers overwhelmingly since the days of AOL,” information-technology consultant George Ou told the FEDERAL Communications Commission at a hearing on ISP practices in April.

Metered billing could also put a crimp in the plans of services like Apple Inc.’s iTunes that use the Internet to deliver video. DVD-by-mail pioneer Netflix Inc. just launched a TV set-top box that receives an unlimited stream of Internet video for as little as $8.99 per month.

Bend Cable Communications in Bend, Ore., used to have multitier bandwidth allowances for Internet customers but abandoned them in favor of an across-the-board 100-gigabyte cap. Bend charges $1.50 per extra gigabyte consumed in a month.


Same whiny refrain the providers have had for the last fifteen years! I seriously think we should ALL UNPLUG for a few months -- then we'd see what tune they sing! Yes, I know infrastructure costs money, but we've paid and paid. What happened to all the so-called spare bandwidth from the dot-com boom?

I suppose one could say they're trying to restrict the high-volume users, but I still think it's the same old song...I'm with you 100%% on this one...
You should start an Unplug for a Month crusade...I'd also be with you, but there is no way I'm unplugging my connection for a month. I've thought about it, but I don't think I'd get enough takers...I haven't had internet at home for three months. Impossible! Certainly unusual! In the context of this thread, good for you!I'm in.
I'm in always, REGARDLESS of subject, if some suckers have to be thought a lesson.This is actually very similar to the pricing scheme they used in Thailand until a few years ago. The government used to tax every minute of the internet (dial-up, DSL, and cable), but they stopped this a few years back.

Now, dial-up is still pay-per-minute, but DSL is unlimited per month. For DSL now, you pay for speed with prices ranging from 590 baht (approx. US$18) per month for 512kb down/256kb up to 3000 baht (approx. US$90) per month for 5mb down/512kb up.Pretty steep prices...What's the average pay in Thailand?http://www.asiamarketresearch.com/news/000243.htm
Article about six years old...


http://www.payscale.com/research/TH/Country=Thailand/Salary
Bar graph...


http://www.d-trac.org/en/average_thai_wages
Table about two years old.


The average Thai probably makes 12,000-20,000 (US$375-$625) baht per month, depending on qualifications. Some people get paid even less. Farmers, fisherpersons (politically correct fishermen? haha), laborers, etc. make even less than that.

But yeah, the prices on internet are still pretty steep, not as BAD as they used to be, but still too much. And you don't really get what you paid for. Internet here is crappy and unreliable. Those speeds are only guaranteed within Thailand and not for international connections, and even locally they only guarantee you 80% speed. So as long as your connection to the ISP's servers reaches 80%, it doesn't matter what your connection to websites located outside Thailand is.

There are also only 4 international connections in Thailand, and if one of those goes down you might as well forget about accessing anything that's not hosted in Thailand (which happens about once a month).

-=EDIT=-
One of the links Aegis made actually brought up a good point.

The figures I've stated are only for Bangkok. There are people in rural areas that make even less. To be honest, comparing Bangkok to rural areas is like comparing apples to oranges... two completely different things.

But for the point of my original post, statistics for Bangkok and other hubs (Chiang Mai, Phuket, Pattaya) are the only really important ones. A lot of rural areas don't have access to computers or high speed internet or even telephone lines for that matter... but they all have cell phones, believe it or not.So, when the heck are you coming back?Waiting for my girlfriend's visa to finish, which could be anywhere from 6 months to a year. As soon as that's finished, we're heading there.Quote
which could be anywhere from 6 months to a year
WOW!
1295.

Solve : Hong Kong's websites the world's riskiest?

Answer»

From AFP through Yahoo! News:

Whole article:
Quote

HONG KONG (AFP) - Hong Kong websites are the most likely to hit visitors with unwanted ads, viruses and spam, research from an Internet security company has found.

More than 19 percent of websites using the ".hk" domain name pose a security threat to visitors, the research by United States software firm McAfee found.

China-based sites are the second most risky with 11 percent, while those from Finland and Japan are the two SAFEST. Romanian and Russian sites were also a threat to web users.

Last YEAR, the survey ranked Hong Kong as only the 28th most risky Internet location.

"Just like the real world, the virtual threats and risks are constantly changing. As our research shows, websites that are safe today can be dangerous TOMORROW," said Jeff Green, senior vice president at McAfee.

"Surfing the Web based on conventional wisdom is not enough to avoid risk online."

The study looked at 9.9 million well-visited websites in 265 countries and ranked them by the amount of adware, spyware, viruses, spam, excessive pop-ups, browser exploits or links to other PROBLEM sites.

The generic domain name ".info" was considered the most problematic, the survey found, while ".gov" was the safest.

Hong Kong and China are often cited as the source of much of the world's spam -- unwanted email messages that fill computer users' inboxes.
Never experienced spam here before. Although the only .hk site I look at is our Hong Kong Observatory

http://www.hko.gov.hk/contente.htm

Then again, there is .gov in it.

Currently Amber rain warning, AKA 30 millimetres an hour. Been raining since yesterday.
1296.

Solve : Comcast To Trial New Network Management Technique?

Answer»
Starting this week, Comcast are RUNNING trials in three US local markets of a new method to manage traffic on its fiber broadband network. Comcast have recently come under fire for filtering and blocking P2P data on its network, causing both legal and ILLEGAL torrents to stop working or have their speeds reduced to a crawl. Comcast have responded to the criticism by publishing a new network management policy along with new tools to assist them in the task of managing bandwidth usage.

LinkSounds to me like all they have done is create a built-in excuse for the slowdowns that i believe will become more prevelant...

Another company, which doesn't want to deliver what we pay for?
We can always consider 1 MONTH of abstinence, proposed in another thread.
Comcast BETTER reads computer forums....hehehe Honestly I don't think the whole Internet abstinence thing would work. Unless of COURSE with that abstinence you also stopped paying them. Yes! My other post was imprecise. The ISP's need to be flooded with requests for disconnection of service!My friend does it all the time, and they give him better deals....LOLMy sister has done the same with Comcast...they seem to be able to extend the "introductory rates" just fine.

I know they're separate servers, and some infrastructure issues with connection with long distance phone networks, etc., but I think even the service bundle should be a buck a day. Phone, internet, basic cable...a dollar a day.
1297.

Solve : Safari Flaw Worse Than First Thought, Microsoft Warns?

Answer»
Microsoft is warning that a previously disclosed FLAW in Apple's Safari browser could have dire consequences for Windows users.

The Safari bug, originally disclosed on MAY 15 by security RESEARCHER Nitesh Dhanjani, allows attackers to litter a victim's desktop with executable files, an attack known as "carpet bombing."

LinkApple is just jealous.So, in Ballmer-ese, it's SOMETHING like: INTERNET Explorer leverages its synergies with Safari to create a more enriched end user experience.

whats the easiest way to get connected with macQuote from: bam2 on June 03, 2008, 03:09:27 PM
whats the easiest way to get connected with mac

huh?
1298.

Solve : Court Finds Dell Guilty of Fraud?

Answer»

Quote from: Aegis on June 01, 2008, 12:48:21 AM

I am reminded (TEMPORARY hijack), Dias, that I made a reference to Zarathrustra which wasn't as funny as I thought it was, and take this moment to apologize.

Don't worry, I don't actually remember, but I'm sure you didn't mean any harm.

Quote
The signature in QUESTION was previous to Quaxo's current signature, and made an association with our president and terrorism.

Sounds right on the button.
So gee, how about them folks at Dell... the #### sure seems to have hit the fan, EH?

What wants to bet that this will be FORGOTTEN in month, too?Yes, Q, it will be forgotten in a month or so, because Lindsay will be back in rehab, or Britney will shave her hair, or the media will present us will some variation of, "Hey! Look over there!" and too many of us will turn our heads.

(I, of course, never get distrac -- hey! What's that?)Quote from: Aegis on June 01, 2008, 12:27:36 PM
(I, of course, never get distrac -- hey! What's that?)

haha Quote
(I, of course, never get distrac -- hey! What's that?)

Heh. Love it! Reminds me of a comic (I thought penny-arcade) I saw, but after a LOT of searching couldn't come up with it. I'm sure I saw that somewhere.

I prefer not to think of it as plagiarism. I prefer to call it homage.
1299.

Solve : How to buy the right laptop PC for your needs?

Answer»

From USAToday through Yahoo! News:

A fairly long article, but a good read for those of you out there who know little to nothing about computers.

Partial quote (see link for complete article):
Quote

DUBLIN, Calif. - Lori Jantulovich stands in the middle of Best Buy's computer section, flagging down a sales clerk. She's trying to buy a laptop for her nephew. "I have no clue," she says.

Jantulovich, 51, is SURROUNDED by displays touting the merits of dozens of similar-looking PCs. "Superior performance with 3 GB of system memory," ONE says. "Powerful discrete graphics," another advertises. "Blazing fast performance with a next-generation Intel Core 2 Duo Processor." "On-the-go multi-tasking." "Limitless performance and response."

"For the average person, this is a lot to dissect," she says.

Computer buying used to be relatively easy. Shoppers generally bought the PC with the fastest processor, or computer "brain," they could afford. That wasn't tough, since most were numbered. (A 486 was faster than a 386.)

Now, "The story has changed," says tech analyst Richard Shim at researcher IDC. Processors aren't numbered like that, and other components, such as memory and graphics cards, have BECOME far more important. "It's definitely hard now" for non-technologists to IDENTIFY the desktop or laptop that best meets their needs, says Glenn Jystad, a senior manager at PC maker Gateway.
One way to compare or research laptops and their attributes is to subscribe to article feeds/e-mail subscriptions from sites in the relevant categories like PC World and About Com. I have received many comparison articles of laptops...
1300.

Solve : Personal Online Medical Storage - Google Health Starts Up?

Answer»

Just got a news FEED from PC World Com - Article on Google HEALTH about Google Health (Requires Gmail account) - Where you can store your medical records, prescriptions, etc, to use as a personal health information center.

Maybe a good thing? I have masses of health RELATED paper documents - minor surgery, appointments, and general documents for my family, and I have always thought about GETTING direct records from my doctor to store on my PC in a database.

Anyone here store/record their medical records (e.g. via email, server upload, or disc copy, etc) directly from their local doctor or health agency? Would their be issues involved in getting personal records from your doctor? Are their internet based medical DATABASES for personal storage?