20 awesome cloud services you’ve never heard of – Web services are quickly replacing desktop programs for routine tasks such as image editing, spreadsheet creation, and more. Here are 20 such services that we think are worth your time.
iPhone 5: What it means for business professionals – For those who use the iPhone for business, here are the nine most important things you need to know about the redesigned iPhone 5.
Make your Facebook news feed default to Most Recent – If Facebook is stubbornly switching your feed to Top Stories without your permission, this simple trick will force it to show Most Recent instead — every time.
U.S. House Votes to Extend Surveillance Under FISA – The U.S. House of Representatives has voted to approve the extension by five years of a controversial law, that its critics claim allows for the warrantless surveillance of electronic communications like email and phone calls of not only foreigners but U.S. citizens.
Microsoft SkyDrive – With Web, Android, iPhone, Mac, and Windows clients, and a nifty “fetch” feature, Microsoft’s cloud solution, SkyDrive, is one of the most complete offerings of its type.
A Web Browser Optimized For The 10 Inch Tablet PC – Maxthon Tablet is specifically optimized for the 10 inch tablet. Note: Actually the specs on the Google Play site indicate that Maxthon Tablet is optimized run on an Android based tablet 7.7 inches or greater tablet (7.7, 8.9, 10.1). What I am finding is that Maxthon has done really a super job on this browser. I find browsing with Maxthon Tablet, on my Toshiba Thrive tablet, gives me the same experience I have with the browser on my desktop computer.
Privacy Manager Puts Every Privacy Setting at Your Fingertips in Google Chrome – If you tweak Chrome’s privacy settings pretty often (like cookies, autofill, history, and others), Privacy Manager puts every single on of those settings in a simple dropdown, with on/off toggles for each one. It doesn’t give you any new privacy settings, per se, but it’s a lot easier to tweak them from the extension’s dropdown than it is to go into Chrome’s settings all the time.
Apple vs. A.pl: Tech company sues online Polish grocer over logo – Apple is demanding that the trademark of an online Polish grocer be revoked.
Five things that the private cloud is not – Ongoing hype around private cloud computing is creating misperceptions about private cloud, according to Gartner, Inc. To help reduce the hype and identify the real value of private cloud computing for IT leaders, Gartner explains five common misconceptions about private cloud.
FootieFox – Stay up-to-date on football matches around the world with this free Firefox add-on.
Aging OSes like XP still getting hit big-time with old exploits, new data shows – Fortinet’s FortiGuard Labs mapped out a snapshot of OS attacks this year that showed 47 million attack attempts using exploits against vulnerabilities that were first discovered back in 2003. And the majority of the attacks were against XP systems, says Derek Manky, senior security strategist with Fortinet’s FortiGuard Labs. Manky says the Windows 7 and Windows 8 transition period leaves existing XP systems increasingly in the bull’s eye for attack.
Five new features in Ubuntu 12.10 ‘Quantal Quetzal’ Beta 1 – Of particular interest to business users is support for whole disk encryption.
Set up email accounts in Simple Groupware – Jack Wallen provides all the information your SMB needs to start setting incoming and outgoing email for all the users on your Simple Groupware server.
Go Daddy claims internal problems, not an attack, took it down – The popular and controversial Web domain and services company says it was internal problems, and not an outside attack, that took the site down on September 10th.
How to Buy an SSD – If you want the fastest storage you can get for your PC, then you want a solid-state drive (SSD). But don’t try to buy one the way you would a hard drive.
Infographic: Thwarting cyberspace invaders – Florida Tech University illustrates the need for trained IT and security professionals to combat the rise of cybercrime.
Botnet operators hide C&Cs in the Tor network – The advantages are many – the server is anonymous and can’t point to the botnet owners’ identity, and by the same token, can’t be taken down easily. The traffic to and from the server is encrypted by Tor, so IDS solutions can’t block it. In fact, blocking Tor traffic in general is not usually done, because there are a lot of legitimate uses for it. Finally, the bot creator does not have to create a custom protocol but, as it is in this particular case, can use the existing and reliable IRC protocol.
Attackers Using Anime Character to Spread Malicious Android App – Symantec is warning Android users of a new malicious application posing as a famous Anime character that steals personal contact information stored on the device and sends it to a third party.
Microsoft Patches Two for September. What’s Missing? – With one of the lightest security patches in months, some security researchers wonder if Microsoft is leaving some bugs unpatched.
Black Hole Exploit Kit 2.0 Released – The developer behind the notorious Black Hole exploit kit has released a new version of the software, adding in several new features designed to prevent security researchers from getting access to new exploits or reverse-engineering the kit’s inner workings. Conveniently, the pricing for Black Hole has stayed the same, so hackers get more value for the same amount of money. Black Hole is one of a number of readily available exploit kits distributed in the cybercrime underground that make it simple for attackers of all skill levels to exploit a wide variety of vulnerabilities.
Cisco delivers new security solutions – Cisco introduced a set of security solutions designed to fortify data centers against the threats they face in moving toward more consolidated and virtualized environments, while also enabling businesses to take advantage of new cloud-based models.
Microsoft axes many of its Forefront enterprise security products – Microsoft is ceasing development of many of its Forefront products, choosing, instead to integrate more security capabilities into a number of its other products and services.
Apple by the numbers: 84M iPads, 400M iOS devices, 350M iPods sold – At today’s Apple event in San Francisco, CEO Tim Cook and other execs offered up plenty of stats. Here are key ones, plus specs of new products.
Wave Endpoint Monitor detects anomalous behavior – Wave Endpoint Monitor captures verifiable PC health and security metrics before the operating system loads, by utilizing information stored within the Trusted Platform Module (TPM), a security chip located on the motherboard of all business PCs. If anomalies are detected, IT is alerted immediately with real-time analytics.
Intel preps tiny ‘Next Unit of Computing’ for October ship – Intel builds a 4-by-4-inch board with a full Core i5 CPU and enough I/O to build fully functional PCs barely bigger than a deck of cards.
IBM’s Connections Network Pulls in Facebook, Twitter – IBM today announced plans to boost its Connections social network for enterprise with linkups to Facebook and Twitter. Connections merges activity streams, calendars, wikis, blogs, email, and more, while allowing instant social collaboration, according to IBM.
Mobile Device Management (MDM) – Mobile device management (MDM) is a type of security software used by an IT department to monitor, manage and secure employee’s mobile devices that are deployed across multiple mobile service providers and across multiple mobile operating systems being used in the organization. Mobile device management software is often combined with additional security services and tools to create a complete mobile device and security management solution.
Off Topic (Sort of):
Facebook becomes gang’s stomping ground — and demise – New York Police discovered two gangs using the social network to threaten, taunt, and grandstand each other — giving them evidence to arrest 49 members who are now facing murder charges.
Google Draws Fire From Australian Sex Party Over Ad Refusal – Google is facing two complaints filed in Australia and the U.S. by the Australian Sex Party, an upstart political party that was denied running AdWords for a July political campaign until a day before the election.
My First Trip To A Glacier May Be My Last – Although I’ve spent a lot of time in the mountains, including some pretty icy and snowy places, I’d never walked on an actual glacier before. All of that was about to change for me. (recommended by Michael F.)
Computers in a grain of sand: How ‘speckled’ computing will change the world – The advent of increasingly low-power processors is ushering in an age where computing power is routinely embedded in the world around us. TechRepublic looks at some pioneering research into this area in the UK.
Apple’s Passbook Will End Up Costing You – Over the next few days, until the new iPhone 5 actually ships, people will analyze the device to death, reporting on whether it is as good as expected and whether it is worth buying. The feature I’ll be following closely is the electronic wallet because I’ve earmarked it for nearly 20 years as the chief evil of smartphones. The e-wallet—or maybe e-purse might be a better moniker?—is the future of these phones.
Infographic: Live TV Loses Ground to Consoles, DVRs – In the first quarter of 2012, Americans spent almost 35 hours a week watching video via a variety of platforms, including tablets, smartphones, and gaming consoles.
Intel Bets on Moore’s Law for Another Decade – Chip giant sees a path all the way to 5-nanometer process technology but getting there may require some ‘exotic’ solutions, according to Intel Senior Fellow Mark Bohr.
Apple’s dock connector change is awful, don’t kid yourselves – Apple’s decision to use a smaller dock connector instead of Micro-USB is consumer-unfriendly, bad for the environment, and offers few, if any, obvious tech benefits.
“All truth passes through three stages. First, it is ridiculed. Second, it is violently opposed. Third, it is accepted as being self-evident.”
– Arthur Schopenhauer
Today’s Free Downloads:
Parted Magic – Format internal and external hard drives. Move, copy, create, delete, expand & shrink hard drive partitions. Clone your hard drive, to create a full backup. Test hard drives for impending failure. Test memory for bad sectors. Benchmark your computer for a performance rating. Securely erase your entire hard drive, wiping it clean from all data. Gives access to non-booting systems allowing you to rescue important data. Runs from the CD, no install required.
Avira AntiVir Rescue System – The Avira AntiVir Rescue System a linux-based application that allows accessing computers that cannot be booted anymore. Thus it is possible to repair a damaged system, to rescue data or to scan the system for virus infections.