Tech Thoughts Daily Net News – December 20, 2010

Vendor creates malware to sell its anti-malware product – Chinese antivirus software companies seem to have a unusual strategy for keeping its services and products in demand – secretly developing threats themselves and unleashing them online, then turning around and making their products detect and remove them.

Show off and Share Your Digital Photos – Don’t just leave your digital photos sitting in folders on your hard drive; that’s nothing more than the digital equivalent of storing all those memories in a shoebox somewhere. Dust off your favorite photos and share them with friends, turn them into a slideshow, make a photo book, or become the star of your own comic book. These eight downloads make all of that–and more–possible.

Comparing Google Docs with Office Web Apps – Back in June of this year Microsoft launched a free version of Office Web Apps meant to compete with Google Docs. In this article I compare the two. Which is the better? What are they exactly? How are they different? Which, if either, should you decide to use?

Tech Thoughts Daily Tech News 2

7 Scams to Avoid from Cyber-Scrooges – The holiday scam season is upon us. Here’s a reminder to be wary; these scams are making the rounds.

Recent Email Breaches Demonstrate Cloud Breach Ripple Effect – McDonald’s, others suffer ‘Russian doll’ effect in series of service provider email breaches under investigation.

Smartphone Specs Demystified – Ever wonder what “capacitive touchscreen,” “MicroSD” and “HSPA+” mean? We provide real definitions for the specs most commonly used to describe what’s under the hood in today’s smartphones.

The 10 Best Bluetooth Headsets – Whether you’re in the car or just need both your hands, you need a solid Bluetooth headset; here are the top 10 we’ve tested.

Facebook Adds Facial Recognition to Photo Tagging – Facebook this week made the process of tagging multiple photos a bit easier by adding facial recognition technology.

WikiLeaks Supporters Behind Operation Payback Traceable – A new paper by researchers at the University of Twente in the Netherlands shows the tool being used in denial-of-service attacks does not hide users’ IP addresses.

Company News:


Google’s Best and Worst Offerings in 2010 – 2010 was a banner year for Google in terms of new products and features introduced with plenty to be proud of, along with a bomb or two. eWEEK takes a look back at Google’s best and worst products and features of 2010, starting with the best of the batch and ending with the duds.

RIM PlayBook May Release Later than Expected – RIM may release its PlayBook tablet PC after February 2011, later than expected by some pundits and analysts. Can the PlayBook compete against the next-generation iPad?

Proposed Standard Would Tie Powerline, Wi-Fi, Ethernet – The IEEE said this week that it has given the green light for the development of P1905.1, a standard which would unify Wi-Fi, Ethernet, MoCA, and the IEEE 1901 Broadband over Powerline (BPL) technology.

Microsoft Adds Facebook ‘Likes’ to Bing Search Results – Microsoft has announced a swathe of updates to, including Facebook-liked URLs in search results, and an events vertical where people can search and purchase tickets directly through Bing.

Off Topic (Sort of):


30 Most Anticipated Tech Products of 2011 – From Windows 8 to the iPhone on Verizon to Mass Effect 3, here are 30 tech products we’re looking forward to seeing in 2011.

My 5 Reasons to Upgrade to Windows 7 in 2011 – Still hanging onto XP? I really think it’s time to look at your upgrade options. Here are five reasons why.

The 7 Most Overrated Games of 2010 – Not the worst or most mediocre games of 2010, but a list of games that probably scored higher than they deserved to.

Today’s Quote:


Never refuse any advance of friendship, for if nine out of ten bring you nothing, one alone may repay you.”

–    Madame de Tencin

Today’s Free Downloads:


Encrypt Sensitive Data for Free with Cryptainer LE – Cryptainer LE is simple and easy, but you must access it every time you want to mount a drive. Cryptainer LE encrypts your data and stores it in a large file that, once you’ve provided a password, mounts as a virtual drive. You may use the virtual drive as just as you would any other drive under Windows: drag and drop, copy, delete, move, and so on. Cryptainer LE also provides a program interface to configure the program and enable the drives.

My-spambox – My-spambox uses a JavaScript application to generate a temporary e-mail address that will function normally for 24 hours and then stop working. It’s perfect for signing up to forums and Web sites that require an e-mail address.

If you found this article useful, why not subscribe to this Blog via RSS, or email? It’s easy; just click on this link and you’ll never miss another Tech Thoughts article.

Comments Off on Tech Thoughts Daily Net News – December 20, 2010

Filed under Internet Security Alerts, Tech Net News

Comments are closed.