Mar 31 2009

60 Minutes: The Internet is infected

The Internet is infected. Malicious computer hackers have been creating more and more weapons that they plant on the Internet. They call their weapons viruses and worms – they’re creepy, crawly toxic software that contaminate our computers without our ever knowing it.

Share

Mar 29 2009

Canadians find vast computer spy network

Canadian researchers have uncovered a vast electronic spying operation that infiltrated computers and stole documents from government and private offices around the world, including those of the Dalai Lama, The New York Times …

Share

Mar 28 2009

Vast Spy System Loots Computers in 103 Countries

Researchers said that the spying, which infiltrated the offices of the Dalai Lama, was controlled from computers based almost exclusively in China.

Share

Mar 28 2009

Vast Electronic Spying Operation Discovered

homesalad writes “Researchers in Toronto have discovered a huge international electronic spying operation that they are calling ‘GhostNet.’ So far it has infiltrated government and corporate offices in 103 countries, including the office of the Dalai Lama (who originally went to the researchers for help analyzing a suspected infiltration). The operation appears to be based in China, and the information gained has been used to interfere with the actions of the Dalai Lama and to thwart individuals seeking to help Tibetan exiles. The researchers found no evidence of infiltration of US government computers, although machines at the Indian embassy were compromised. Here is he researchers’ summary; a full report, ‘Tracking “GhostNet”: Investigating a Cyber Espionage Network’ will be issued this weekend.” A separate academic group in the UK that helped with the research is issuing its own report, expected to be available on March 29. Here is the abstract. They seem to be putting more stress on the “social malware” nature of the attack and ways to mitigate such techniques.

Read more of this story at Slashdot.

Share

Mar 28 2009

3 Steps to Your First Development Board

Computer systems are essentially split in two categories. The first and most obvious category is that of personal computers. The second one is that of embedded computers. Even if every house has al least 10 embedded computers, this last category is far less obvious…

Share

Mar 27 2009

3D-Based CAPTCHAs Become a Reality

mateuscb writes “A new way of creating a CAPTCHA using 3D objects has become a reality. The idea was thought up independently by blogger Taylor Hayward and by the folks at YUNiTi.com. ‘Similar to Hayward’s idea, this new technology relies on our ability to identify objects in 3D instead of using alphanumeric characters. YUNiti’s 3D Captcha, however, has three objects in the challenge and extends the list of images to any object, not limiting it to animals as in Hayward’s idea. This increases the challenge’s level of complication to prevent computers from successfully making the correct guesses.’ I, for one, welcome the thought of not having to read more and more complex CAPTCHA. Lately, I’ve been having a hard time getting CAPTCHA to work the first time.”

Read more of this story at Slashdot.

Share

Mar 26 2009

Want a PC With 192 GB of RAM?

ericatcw writes “Do you love the smooth, silky performance of a multi-core PC loaded to the gills with the fastest RAM? Take a look at Dell’s new Precision T7500 desktop. According to Computerworld, the T7500 will come with 12 memory slots that can accommodate 16 GB of PC-106000 (1333 MHz) DDR3 RAM for a total of 192 GB. Dell’s not the only one — Lenovo, Cisco (with blade servers reportedly up to 384 GB in memory) and Apple are all bringing out computers that leverage Intel’s new Nehalem architecture to enable unprecedented amounts of RAM. But beware! Despite the depressed DRAM market, loading up on memory could see the cost of RAM eclipse the cost of the rest of your PC by 20-fold or more.”

Read more of this story at Slashdot.

Share

Mar 26 2009

Blockbuster OnDemand Comes To TiVo

MojoKid writes “Netflix isn’t the only company that sees that streaming is the future of movie rental distribution. Blockbuster, which always seems to be playing catch-up with Netflix, will start making its on-demand rental and purchase content available on TiVo DVRs. Blockbuster OnDemand has only been available as a streaming service on Windows PCs or streaming to TVs via the 2Wire MediaPoint device. Meanwhile, Netflix streaming is available on far more platforms, such as on Windows and Mac computers, TiVo, the Roku Digital Video Player, LG and Samsung Blu-ray players, the Xbox 360, as well as a number of video portal software applications, like Boxee and ZeeVee’s Zinc. Blockbuster’s partnership with TiVo is yet another indication of the coming revolution of on-demand media available to TVs — that is, if the revolution hasn’t already started.”

Read more of this story at Slashdot.

Share

Mar 26 2009

Companies Waste $2.8 Billion Per Year Powering Unused PCs

snydeq writes “Unused PCs — computers that are powered on but not in use — are expected to emit approximately 20 million tons of CO2 this year, roughly equivalent to the impact of 4 million cars, according to report by 1E and the Alliance to Save Energy. All told, U.S. organizations will waste .8 billion to power 108 million unused machines this year. The notion that power used turning on PCs negates any benefits of turning them off has been discussed recently as one of five PC power myths. By turning off unused machines and practicing proper PC power management, companies stand to save more than per desktop PC per year.”

Read more of this story at Slashdot.

Share

Mar 24 2009

How Do You Deal With Pirated Programs At Work?

LoneAdminOK writes “I started working for a small company in the middle of January as their IT Manager. I am the first actual ‘IT Guy’ that they have had; before me it was someone that performed another job within the company and just handled the IT on the side. The problem that I am running into is that most of the software I am finding on the network and on people’s computers isn’t owned by the company. The person before me would just get it from ‘somewhere’ and install it on the computers as needed. This is putting me in a bad position when I have to reinstall the program or find it to install on someone else’s computer. Often, I am telling people that we don’t have it or we have to buy another license, and they get mad at me because the other guy said that we had it. I can’t even tell where the versions of Windows Server that they are running came from. The only one I know is legit is the one that is installed on an HP server with the OEM sticker on it. How have any of you handled a situation like this? I don’t install ‘borrowed programs’ in a production environment because I know that if the BSA got wind of this, it would all fall on me when they stormed in.”

Read more of this story at Slashdot.

Share