Avoid Poison Web Sites With Free Firefox Add-on Search Engine Security – Firefox add-on Search Engine Security guards against online attacks that start with poisonous results from Bing, Google or Yahoo.
Linux: 10 KDE tools you need to try – KDE 4.5 offers some impressive tools for all types of Linux users. This list will point you toward the best ones to check out.
A closer look at Chrome 7 – Now into its second year, Google Chrome has begun to mature from a lightweight and fast browsing alternative into an innovative browser on the precipice of a potential revolution with the pending ChromeOS. The software saw another minor rev recently, so we decided to give it an even closer look for a review update. The browser that people can use today, Chrome 7, offers highly competitive features, including synchronization, autofill, and maintains Google’s reputation for building one of the fastest browsers available.
The best tools and methods to track down suspect IP addresses and URLs – Jack Wallen provides some basic recon tools and methods for finding IP addresses and URLs that you may need to track down for purposes of blocking, contacting, or satisfying simple curiosity.
Spam and virus trends according to Google – Postini, the spam engine that powers Google’s e-mail security and archiving services – handles some 3 billion e-mails per day, so it’s fair to say that the statistics derived from the data it aggregates show a rather accurate picture of spam and virus trends.
How do I make Windows 7 desktop gadgets visible on mouse-over only? – Jack Wallen shows you how to set Windows desktop gadgets to 0% opacity which will then revert to 100% upon mouse-over.
Avalanche spam gang uses ZeuS to boost earnings – Reports that the world’s most prolific phishing gang have diversified their operations over from conventional phishing emails to distributing the ZeuS Trojan is another sign that hackers are becoming incredibly sophisticated, says Imperva.
How do I… Create holiday cards in Microsoft Word? – Holiday greeting cards are a great way to recognize and remember business contacts, friends, and family that you’d rather not buy gifts for, but do want to wish a Merry Holiday and Happy New Year. Nicole Bremer Nash shows you how to add a personal touch by making your own holiday cards — no special software required. Microsoft Word has everything you need to make create, charming greeting cards for the holidays.
Apple resolves FaceTime security flaw – A flaw in the beta version of Apple’s FaceTime for Mac which was presented on Wednesday, has apparently allowed potential hackers to gain access to and modify a user’s iTunes account settings from the software – without asking for a password.
Samsung Fascinate ruined by Verizon meddling – The Samsung Fascinate could have been one of the top Android devices, but Verizon sabotaged it by manipulating it for the carrier’s own gain. See how.
Windows 8 Coming in 2012? – Just as you were getting comfortable with Windows 7, it looks like Windows 8 is coming in the next two years. In a post celebrating the one-year anniversary of Windows 7 — the fastest selling OS in history — Microsoft’s Dutch Web site briefly mentioned the construction and release of its successor:
Adobe AIR 2.5 Goes Mobile – Adobe extends its AIR application AIR beyond the confines of desktop Windows, Mac and Linux PCs to multiple new platforms including BlackBerry Tablet OS, Android and even TVs.
Off Topic (Sort of):
Interview: Wireless security considerations – Brad Haines is chief researcher of Renderlab.net and a noted expert in the field of wireless security. Brad has spoken at many international conferences and taught several classes on free wireless assessment tools.
Lifehacker: How to Crack a Wi-Fi Network’s WEP Password with BackTrack – You already know that if you want to lock down your Wi-Fi network, you should opt for WPA encryption because WEP is easy to crack. But did you know how easy? Take a look.
Jesus and Mo – A Quiz for Atheists from a Creationist (submitted by Michael F.)
12-year-old finds critical Firefox flaw, earns $3,000 bounty – The security researcher who found and reported this critical buffer overflow and memory corruption vulnerability in Mozilla’s Firefox browser is none other than Alex Miller, a 12-year-old boy who earned a $3,000 bounty for his discovery.
Wild Dolphins tail-walk on water – A wild dolphin is apparently teaching other members of her group to walk on their tails, a behaviour usually seen only after training in captivity. (submitted by Michael F.)
“It is a great ability to be able to conceal one’s ability.”
- Francois de La Rochefoucauld
Today’s Free Downloads:
Dexpot – If you want maximum control over organizing your programs and windows, check out Dexpot. This full-featured utility allows for distributing your running programs among distinct virtual desktops.
Taskbar Items Pinner – Ever wish you could pin more than just programs to the Windows 7 Taskbar? With Taskbar Items Pinner, you can: it lets you add a wealth of extra goodies to the Taskbar, everything from your Pictures folder and Printers menu to individual files, folders, and even Web sites.
If you found this article useful, why not subscribe to this Blog via RSS, or email? It’s easy; just click on this link and you’ll never miss another Tech Thoughts article.