Tech Thoughts Daily Net News – November 22, 2012

Holiday travel: How to keep your PC connected on the road – Weird cranberry sauce recipes, rambling stories from drunken uncles, and crowded freeways aren’t the only perils of traveling away from home for the Thanksgiving holiday. Finding a working Wi-Fi connection can be a pain even in these widely web-enabled times, and that holds true even if you’re walking around a major metropolitan area. Indeed, you can’t even be sure your relatives will have a wireless router.

How to Get Rid of a Virus (Even When Your Computer Won’t Boot) – So you’ve contracted a virus that’s taken over your computer, and you can’t even boot up to try and troubleshoot the problem. The solution: Create a rescue CD, boot into a safe environment, and rid your PC of any nefarious software while it sleeps. Here’s how to do it with minimal effort.

The FBI locked your computer? Watch out for new spins on ransomware – The FBI locks your computer. Can they do that? Or is it fake? How does one know? Michael Kassner asks an expert for help with the latest forms of ransomware.

How to spot bogus Black Friday deals – Black Friday can be a bargain hunter’s bonanza, but smart shoppers know the biggest over-hyped shopping day of the year can also be treacherous. Not only can things get downright nasty between shoppers fighting over low-priced toaster ovens, but retailers pull out dirty sales tricks you will want to avoid as well.

Tech Thoughts Daily Tech News 2

Skype updates Android app, adds support for popular tablets – Skype for Android 3.0 now supports the “most popular” Android tablets, including Samsung’s Galaxy Tab 2, Google’s Nexus 7, Acer’s Iconia Tab, Asus’ Transformer Prime, Sony’s Tablet S and Motorola’s Xoom.

Seven fresh reasons to try Linux Mint 14 ‘Nadia’ – Just a month or so after the widely trumpeted release of Ubuntu 12.10 “Quantal Quetzal,” the Linux Mint project on Tuesday unveiled its own latest update, Linux Mint 14 “Nadia.” Linux Mint 14 is actually based on Canonical’s newly released Ubuntu 12.10. Ready for a quick run-down? Here are seven key new reasons you should give it a try.

Five of the better desktop ebook readers – Jack Wallen reveals his picks for desktop versions of ebook readers – one is bound to suit your needs.

Download and install the Windows 8 Media Center Pack for free – Greg Shultz explains how to download and install the free Windows 8 Media Center Pack in Windows 8 Pro, including some caveats.

Slaying the Cable Monster: Why HDMI Brands Don’t Matter – For the vast majority of HDTV owners, a $5 HDMI cable will provide the same performance as a $100 one.

Microsoft accidentally gifts pirates with free Windows 8 Pro license key – In an amusing twist that undoubtedly spells the end of some hapless manager’s career, Microsoft has accidentally gifted pirates with a free, fully-functioning Windows 8 license key.

U.S. denies hacking computers in the Élysée Palace – U.S. cyber spies have allegedly hacked a string of computers inside the official residence of the President of the French Republic during the last days of Sarkozy’s tenure and have stolen confidential information by using the Flame malware. The claim has been made on Tuesday by French paper L’Express.

Security:

With shopping scams on the rise, watch for these threats – Whether you’re trying to take advantage of online deals on Black Friday, or fighting the online “crowds” on Cyber Monday, your Web browser is a primary target for holiday cyber attacks.

Bogus Chase Paymentech notification carries malware – If you receive an email seemingly coming from payment processing company Chase Paymentech, think twice about opening the attachment it carries. The email purportedly delivers an electronic Merchant Billing Statement to the recipient. Unfortunately, the attached file is nothing of the sort, but a piece of information-stealing malware.

What’s the most coveted target for cyber attackers? – Despite repeated warnings, organizations are still failing to lock down the primary target of most cyber-attacks – privileged access points. Cyber-attackers continue to breach the corporate perimeter through common means – including phishing attacks, malware infected attachments, social media viruses, and other methods. Once inside, cyber-attackers infiltrate privileged access points to gain access to additional servers, databases and other high value systems.

Info about 0-day SCADA flaws offered for sale – Following in the footsteps of French Vupen Security, Malta-based start-up ReVuln has also decided to sell information about zero-day vulnerabilities to companies and governments instead of sharing it with the developers of the flawed software and hardware.

Attackers Had Access for Months in South Carolina Data Breach – Attackers had two months of unfettered access to South Carolina’s Department of Revenue systems in a classic targeted attack that began with a phishing email and ended with the loss of electronic tax return data, and payment card and personal information on 3.8 million filers, possibly dating back to 1998.

Company News:

NTSB to Ditch BlackBerrys, Cites ‘Unreliability’ – Struggling Research in Motion received another vote of no confidence this week with the news that the U.S. National Transportation Safety Board plans to drop BlackBerry smartphones in favor of Apple’s iPhones.

AMD refutes Kaveri cancelation rumor, claims ‘big cores’ still a priority – AMD is hitting back at claims that it has canceled its next generation of mainstream desktop and laptop APUs; company spokespeople have stated that these parts remain on track.

Dell Curates a Cloud for Small Business Apps – Is choice overrated? Dell wants to help small businesses hit the ground running with a business app ecosystem that focuses on “best-of-breed” cloud apps.

Report: Microsoft Prepping ‘Xbox TV’ Set-Top Box – Microsoft reportedly plans to introduce a set-top box that is basically an Xbox 360 without the gaming option

Webopedia Daily:

Enterprise Storage – In data storage it is the phrase used to describe a centralized storage system used by a large business or organization to manage data. Enterprise storage also indicates processes for data sharing and connectivity. Enterprise storage is different from consumer or home computer storage in terms of the size of the storage system, the amount of data handled by the system, the number of users accessing the system, and also the technology used to create the storage system. Enterprise storage systems usually focus on providing the networking and management operations for data storage, backup, disaster recovery, and archiving.

Off Topic (Sort of):

LinkedIn endorsements: I’m not sure I approve – Social media can be very effective and very positive. But there’s a fine line between networks moving things forward and simply devaluing the currency – or even putting your reputation at risk.

FCC might make carriers say how well they performed in disasters – The U.S. Federal Communications Commission may seek to make carriers reveal how well their networks withstood major natural disasters so that consumers can compare rival providers.

World’s oldest original digital computer is turned back on after 61 years – The world’s oldest original still-working digital computer has been unveiled at the National Museum of Computing in Bletchley Park, the home of the United Kingdom’s Second World War encryption and codebreaking efforts, where, among other luminaries, Alan Turing and co famously broke the German Enigma cipher.

Battles over online information control to escalate – The year ahead will feature new and increasingly sophisticated means to capture and exploit user data, escalating battles over the control of online information and continuous threats to the U.S. supply chain from global sources.

NYC Turning 250 Payphones Into Touch-Screen Kiosks – New York has approved a plan to turn 250 city payphones into touch-screen information kiosks.

Today’s Quote:

“Excess on occasion is exhilarating. It prevents moderation from acquiring the deadening effect of a habit.”

-       W. Somerset Maugham

Today’s Free Downloads:

Wise Registry Cleaner 7.54 – Wise Registry Cleaner scans the Windows registry and finds incorrect or obsolete information in the registry. By fixing these obsolete information in Windows registry, your system will can work better and more quickly.

Sticky Password Free – Stay safe online and save time by letting Sticky Password fill in website forms and passwords automatically. Each license also includes the portable version and installs easily on your USB device or flash memory stick.

About these ads

4 Comments

Filed under downloads, Internet Security Alerts, Tech Net News

4 responses to “Tech Thoughts Daily Net News – November 22, 2012

  1. Fred

    “Wise Registry Cleaner 7.54″
    Bill,
    Is this possibly something that I could use, however I remember you warning me on several occasions that some of the software featured is more advanced than a user like me can effectively use.
    In other words: IS THIS IDIOT PROOF?
    Fred

    • Hi Fred,

      It’s fair to say that Wise Registry Cleaner is one of the few such applications that could be labelled “idiot proof” – keeping in mind, that “idiots” seem to find new ways to screw things up. :)

      Some registry cleaners, on the other hand, are very aggressive and mark entries for deletion which should be assessed only by those who are technically competent.

      BTW, if you’re running CCleaner, then use its built-in registry cleaner instead – it’s also “idiot proof.”

      Best,

      Bill

  2. ‘LinkedIn endorsements: I’m not sure I approve’
    Hey Bill,
    Thanks to Cochrane and you for exposing this. Now I don’t have to pursue LI endorsements anymore lol