April 09, 2010

Microsoft will remove 25 vulnerabilities

Both Windows, Office and Exchange are affected.
Windows
Microsoft will this coming Tuesday with eleven security bulletins and associated security. These will remove a total of 25 vulnerabilities in Microsoft software.
Microsoft provides that five of the security updates are critical. All affects Windows products, but it's only Windows 2000 is affected by all five.

iPhone gets advertising network

New ad system can be gold mine for Apple.

Apple is moving into new and unfamiliar territory. Yesterday, they presented their brand new IAD network.
iphone
This is Apple's big inroads into the mobile advertising industry, a market that is predicted enormous growth of the experts.

AMD processors are "turbo mode"

Do as Intel, but with a simplified solution.

Intel introduced the Company's Nehalem architecture, which first was used by the Core i7 processors, a technology called "Turbo Boost". This brief goes out on that by turning of some cores in the processor, other kernels work with higher clock speed than when all cores are active. This should be done within the same maximum power requirement that the processor would otherwise have had.
amd processors
Now it appears that AMD also seems such a solution is a good idea. Site AnandTech presents a solution called "Turbo Core", which should be taken in the use of AMD's upcoming Phenom II X6 processor, which is six cores processors for desktop PCs. They are also known under the code name "Thuban. The first models can be expected during this quarter, probably in late April, to a highly unofficial price of between 200 and 300 dollars.


April 08, 2010

Will remove common browser error from Firefox

Can reveal the user's surfing habits.

Most browsers logs the URLs a user has visited. This history is taken care of in a period which in many cases, the user can decide the length of. This can in many ways be practical for the user, especially when entering URLs in the address field. If you have visited the site before, your readers may fill out the rest of the URL once the user has entered the first part.firefox fix 
But the content of Web pages can be influenced by history. Links to web pages you have visited before, is often shown with a different color or style than non-visited links. How do the links look like, can be determined using a stylesheet (CSS).
The problem in most browsers is that the information about whether the links have been visited or not, is available via the Web site that links are displayed. Such information can be gathered using the JavaScript functions that getComputedStyle ().
Challenges is that you can not simply turn off this option without the users lose function.
Mozilla has been clear over the issue since 2002, when a notice was posted to Bugzilla.

Office 2010 comes without full OOXML support

Unable to create documents according to ISO standard.

Microsoft has committed to implement the ISO standard edition of Office Open XML (OOXML), as approved in November 2008. It has been expected that this would happen in Office 2010.office 2010
Office 2010 will be launched in a month, but tests of the beta version shows that OOXML support is in place. That is, there is support for the original ECMA version, but this was initially rejected by ISO. Only when a number of changes were in place, the OOXML approved as an ISO standard (ISO / IEC 29500).
This writes Alex Brown, leader of the ISO subcommittee for information descriptive language (WG 1) in a blog post.

April 07, 2010

Watch out for spam

E-mail with malicious code abound.

90.7% of global email is spam (junk mail). Most spam is type annoying, but some are downright dangerous and can cause your computer becomes part of a botnet.
stop_spam
90.7% of all emails worldwide are spam. Hungary (95.7%), Denmark (94.9%) and Italy (94.7%) are the three countries that tops the list, the March report from Symantec.
Spam mail can often be divided into three categories:

Finally DirectX 11-support from Nvidia

Launches lightning-fast, hot and expensive graphics flagship.

Nvidia has suffered heavily in recent years, both with technology and economy, which has its main competitor AMD a significant lead in graphics processors.
obj.phpi
Now, Nvidia ready to roll out the first consumer products company Fermi series. In the first instance we are talking about the new top model GeForce GTX 480 and GeForce GTX 470 Nvidia partners will provide video based on these processors from mid-April.
In a few months the series will expand with simpler and cheaper models based on the same technology.

April 06, 2010

Monitoring employees use of social services

A U.S. service Alerts automatically when employees violate the rules.

Teneros is an American company that offers net cloud related to disaster preparedness and communication, including by "disaster recovery as a service" for Microsoft Exchange.
obj.phpi
Last week, Teneros announced a new service, named "Social Sentry, which monitors employee use of social services, and alerts automatically when it detects violations of company rules for the use of these services.
Among the motives for companies to monitor employees' use of social services is to prevent the spread of sensitive information, ensure proper hiring processes, prevent legal risks and prevent damage to your brand.

More than doubles Blu-ray capacity

Equips the discs with multiple recording layers.

Blu-ray Disc Association announced this weekend that the specification BDXL and IH-BD (Intra-hybrid) can be expected during a few months.
blue-ray
BDXL targeted commercial segments such as broadcasting, medicine and other businesses that create large amounts of data. These will benefit from that BDXL be open to writable discs with a capacity of 100 or 128 gigabytes, and rewritable discs with a capacity of 100 gigabytes. This is achieved by applying three or four recordable layer on the discs.

It should also be a consumer version of BDXL.

Intra-Hybrid Blu-ray Disc (IH-BD) takes on its side using a single BD-ROM layers and a single BD-RE-layer so that the user can see, but not overwrite the data on one part of disc, while the other portion of the disc can be used to store personal data. Both teams will have a capacity of 25 gigabytes.
BDXL and IH-BD will require entirely new equipment for both recording and playback. These future devices will however work with current BD format, which can accommodate up to 50 gigabytes of data.

April 05, 2010

10 steps to a secure PC

Batten down the hatches and protect you from both new and old threats. I show you how.
Each new wave of computer viruses, spyware and spam can get you to consider brushing the dust off the old typewriter. You need not go so far - it is possible to achieve good PC security, without having to feel like a chore. If you follow our 10 steps for better PC security, you will be protected against both current and future security threats.
secure pc 
1. Automatic patching. Make sure that Windows is configured to update itself. In Windows XP with Service Pack 2, click Start, Control Panel, Security Center. Then click the Automatic Updates, and turn on the updates to happen automatically. Do not have Service Pack 2 installed, you should go to Windows Update and install this as soon as possible.

2. Do not wait for Windows. If your PC has been switched off for more than a day, not wait for the automatic update in Windows to get going. Leave a visit to Windows Update site will be the first thing you do after you've turned on your PC. It may also be a delay between when a security update is available and when Windows Update delivers it to you. Microsoft releases security patches on the second Tuesday of each month, so to be sure you should check manually for updates with a couple of weeks. And do not forget to set the antivirus and antispyware programs to update themselves automatically!