Skip to main content

Posts

Showing posts from October, 2012

Microsoft's Big Gamble Could Be Linux's Big Shot

Microsoft's Big Gamble Could Be Linux's Big Shot "I think there is an opening, but it may close quickly," said Google+ blogger Kevin O'Brien. "People who try Windows 8 on a desktop or laptop will hate it, but that is what will be pre-loaded. If they want Windows 7, they will have to actually purchase it, which most of them have never done. That is where Linux has an opening." Now that Windows 8 has made its long-awaited and widely trumpeted debut, there seems to be a fresh air of excitement and purpose here in the Linux blogosphere. This, of course, is not to say that many of us here are particularly excited about Microsoft's new OS, per se. Quite the opposite, in fact: Many of us are excited about the opportunity Win 8 means for Linux. "In the past the Linux has failed to capitalize on Microsoft's errors and capture new users," explained the TuxRadar crew in a new Open Ballot poll, for example. "We want to know what you thin

New Latest Technology

New Latest Technology  

Iceland: Where Citizens Govern via Facebook

Iceland: Where Citizens Govern via Facebook Iceland has involved its citizens in many forms of crowdsourced government, said Icelandic journalist Paul Fontaine. "Apart from the National Assembly, which is definitely an example of crowdsourcing, there is also Better Reykjavik, and that is a very literal example of crowdsourcing. Suggestions are invited from the general public on this website about changes they would like to see to the city." Iceland recently drafted a new constitution, a noteworthy event (a) because new constitutions aren't all that common and (b) because citizens were invited to participate via social networking sites. While not Iceland's most pure example of crowdsourcing, the constitutional update made extensive use of public input. In fact, Iceland has responded to the current financial crisis -- which hit the small nation hard -- by inviting the public to take part in a number of initiatives to improve government. In this TechNewsWorld podcas

Google's Neverending Big Adventure

Google's Neverending Big Adventure   Why would Google want to send its Street View cameras into a vast crack in the Earth where there's nary a street to be found? It can't be as simple as "because it can." There must be some financial motive. Perhaps -- but monetization "is not how Google typically thinks about it," said tech analyst Greg Sterling. "This is part of the logic of Google's mission to map the real world in a complete way." In its ongoing effort to create the perfect map of the world at ground level, Google took a trek into the Grand Canyon this week. Although this is part of its Google Maps Street View project, there are of course no streets in the national park. Google Street View Product Manager Ryan Falor Google Street View Product Manager Ryan Falor controls the Trekker with his Android device. Earlier this month, Google announced that it had doubled the number of special collections in its Street View catalo

Asus Puts Its Windows 8 Lineup on the Top Shelf

Asus Puts Its Windows 8 Lineup on the Top Shelf        The high end of the market is Asus's stomping ground, and without the enterprise connections of competitors such as Dell, it's well advised to try to appeal to individuals looking for distinctive yet powerful devices, said Forrester analyst Dave Johnson. "Their best bet is to continue to appeal to premium consumers." Asus unveiled its slew of new products Tuesday, showing off touch-capable PCs, hybrids, tablets and convertible Ultrabooks optimized to run on Microsoft's new Windows 8 operating system. Asus Taichi The Asus Taichi, one of a new line of Windows 8 systems announced by Asus Windows is getting a radical redesign, and many of Asus's new products follow suit, featuring dramatic differences from previous PC and tablet models. One example is the Taichi, a dual-screen laptop with two 1080p IPS screens. The convertible Ultrabook can be used in laptop mode or with the lid closed, like a tablet. T

Open Source Ammo for the SMB Security Arsenal

Open Source Ammo for the SMB Security Arsenal   In many cases, open source security software can fill the gap when funding for heavy, commercially supported, closed-source security tools is hard to come by. For SMBs, having a few open source security tools in their back pocket to meet specific security challenges can be a godsend. Technology professionals who work in and around SMBs know that sometimes bringing up information security in a smaller IT shop can be a tough sell. In many cases, SMBs feel that they don't present an attractive or large enough target for hackers to be interested in them. For example, a small community bank or credit union might believe that only a large bank needs to worry about fraud; a small local retailer might think only the big chains need to worry about security. In practice, nothing could be farther from the truth. Not only are SMBs actively attacked, they're also in some categories attacked more often (or at least more successfully) th

The Revolution from Cyber Terrorist attack to Indian Cyber Security

The Revolution from Cyber Terrorist attack to Indian Cyber Security Cyber attack has put our lives in danger every second. The cyber attacks are becoming the root cause of the mishappenings around us every other day. As the next generation wars are increasing depending on robust and secure information systems networks, it is imperative for a country to invest in building a reliable infrastructure. As the next generation wars are increasing depending on robust and secure information systems networks, it is imperative for a country to invest in building a reliable infrastructure. Increasing attacks on cyberspace in India has brought several professionals and experts from the Industry, in support with the last week, India’s Defense Minister, AK Antony, announced an additional $1.3 Billion will be invested in the project making the grand total to a $3.1 Billion. It is observed that many Electronic Notification is usually sent before a major terrorist attack, followed by defacement of g

To India, - From Anonymous

To India, - From Anonymous   Related Videos: Did you know? Technology. Crazy Multi-Input Touch Screen CRISC is the Certification for Risk Professionals THE COMPUTER FUTURE TECHNOLOGY!   Life In A Day

Did you know? Technology.

Did you know? Technology.  

Red Alert: Chinese Telecoms and Cyberattack Jitters

Red Alert: Chinese Telecoms and Cyberattack Jitters "Since so much of our economy is driven by the use of telecommunications and Internet providers and whatnot, I think that's why people are getting really, really nervous about a company where we have a strained relationship with their home country," said author Brian Proffitt. The House Intelligence Committee's investigation into Chinese telecommunications giants Huawei and ZTE climaxed last week, concluding, essentially, that the Chinese firms aren't to be trusted. That set off a spate of stories, including on-the-record denials from Huawei and reports that, for the last year, U.S. telecoms have waged a campaign against their Chinese competitors. That U.S. Defense Secretary Leon Panetta announced that a "cyber Pearl Harbor" could be on the horizon only fanned the cybersecurity storyline. Listen to this week's podcast about cybersecurity in general -- and China in particular -- featuring Brian

Cream from cow's milk can protect against HIV

Cream from cow's milk can protect against HIV  MELBOURNE: Cow's milk can be potentially developed into affordable creams that can help protect humans against HIV, a study has claimed. Lead scientist from University of Melbourne Marit Kramski found that when pregnant cows were vaccinated with an HIV protein, the first milk produced by the cow after giving birth, called colostrum, produced high antibodies to protect its newborn against disease. Researchers were now planning to test the effectiveness and safety of the milk before turning it into a cream which will hopefully allow women to protect themselves against contracting the virus during sex, without relying on men. Moon rocks fetch $330,000: A pair of lunar rocks, which originated on far side of the Moon, has sold for $330,000 at a meteorite auction in New York. The auction is estimated to have netted more than $1million from the sale of meteorites. The Moon slabs, each weighing around 907 grams, were the most expensive

US Authorities : Iranian Hackers are Becoming a Real Pain

US Authorities : Iranian Hackers are Becoming a Real Pain The U.S. have admitted they believe a series of cyber attacks on domestic banks and some foreign oil companies carried out over the last year are the handy work of a group of hackers linked to the Iranian government. Defence Secretary Leon Panetta said the cyberthreat from Iran has grown, and declared that the Pentagon is prepared to take action if America is threatened by a computer-based assault. The hackers are apparently part of a group of less than 100 computer security specialists from Iranian universities and network security firms, according to an unnamed US government official. American officials have said they are able to discover the source of the recent cyberattacks. We do welcome this and announce our readiness for any international cooperation to find the source of the attacks. The Iranian official said Tehran has already offered help to boost the companies cybersecurity, as Iran has itself rec

Secure User Authentication: Might Makes Right

Secure User Authentication: Might Makes Right   User authentication is the most basic form of security. The logic behind it is pretty simple - user authentication gives you the ability to prove your identity and allows you to access the information and resources you are entitled to use. If your authentication is weak, it doesn't matter how strong your encryption is, there may as well be no encryption at all. While the benefits of adopting Bring Your Own Device as your mobile policy are appealing -- from increased productivity to lower costs -- a BYOD policy can also leave your corporate network more vulnerable than ever. The breaches regularly featured in the news remind us that all networks, no matter how large or small, risk being exposed to unauthorized users every day. Whether it's one device or multiple devices, companies must put a security policy in place to help prevent these breaches and take action once they do occur. While security plans need to be customized

Crazy Multi-Input Touch Screen

Crazy Multi-Input Touch Screen ddsddddddd Related Articles HP and the Uncertain Science of Corporate Rebirth Big Businesses Walloped With Climbing Cybercrime Costs Grumbling Begins Over Facebook's Promoted Post Scheme Microsoft Piracy Pleas Fall on Deaf Ears in China IT Security Police: 'Step Away From That IE'

Google Ireland and yahoo Domains Hijacked

Google Ireland and yahoo Domains Hijacked Irish websites Google.ie and Yahoo.ie went offline on Tuesday afternoon after their DNS servers were apparently hijacked to point to those of a third party, resulting in visitors being redirected to an 'allegedly fraudulent' address - farahatz.net. That site has now been taken offline, but it is not known whether the site could have been created with malicious intent. A short note on the homepage of the IE Domain Registry said the move followed a "security incident on Tuesday 9th October, involving two high profile .ie domains that has warranted further investigation and some precautionary actions on the part of the IEDR." The IE Domain Registry have requested assistance from the Garda Bureau of Fraud Investigation. There was an unauthorised access to one registrar’s account [MarkMonitor] which resulted in the change to the DNS nameserver records for the two .ie domains. The IEDR worked with the registrar to ensure

2 New Slingboxes Give TV Junkies Anytime, Anywhere Fix

2 New Slingboxes Give TV Junkies Anytime, Anywhere Fix For dedicated TV viewers who don't want to sit in a hotel room without their own customized lineup of shows, there's an answer: Slingbox. Two new and improved models let users view their must-see TV whenever and wherever they like -- and on pretty much whatever gadget they choose. There are some drawbacks though, like spending a few hundred dollars for a Slingbox on top of that pricey cable bill. While they actually appeared on store shelves weeks ago, the Slingbox 350 and Slingbox 500 officially launched on Wednesday. These devices are the latest in Sling Media's revolutionary line of set-top boxes that allow users to connect their TV source to the Internet, and enable remote streaming to a computer, tablet or smartphone. The new units will support full HD 1080p video streaming online, but neither device supports an ATSC tuner. The Slingbox isn't meant as a replacement for a cable or satellite box --

CRISC is the Certification for Risk Professionals

THE COMPUTER FUTURE TECHNOLOGY!

Hacker group RedHack faces up to 24 years in prison for terrorist crimes

Hacker group RedHack faces up to 24 years in prison for terrorist crimes As part of an investigation launched by Başsavcıvekilliği in Ankara on March 20 arrested seven people, including college students. 13 of the indictment prepared by the prosecutor's office in Ankara Was adopted by the High Criminal Court.  Court has accepted an indictment against RedHack, a Turkish hacker group, seeking prison sentences of 8.5 to 24 years for its members as “members of a terrorist group.”  The suspects include three held under arrest  - Duygu Kerimoğlu, Alaattin Karagenç and Uğur Cihan Oktulmuş, under arrest for the past seven months. The suspects stand accused of membership in an armed terrorist organization, illegally obtaining confidential documents and personal information and accessing information systems without permission. Scope of the assessment: "Hierarchical and structured in order to be organized as a terrorist organization, titling, and postin