Anonymous Launches Op to Take Down Revenge Porn King – Hunter Moore promises the follow-up to IsAnyoneUp? will allow jilted exes to ‘stalk’ the objects of their obsession and the hacktivist collective is not amused.
EnhanceMy8 Is Packed with Tweaking Tools and Customization Options for Windows 8 – If you’ve upgraded to Windows 8 but would love a tool that makes it easier to tweak the OS to your liking or puts some of Windows’ most common options at your fingertips, EnhanceMy8 will do the trick.
Mozilla Adds Facebook Messenger to Firefox 17 – Mozilla today announced that is has incorporated Facebook Chat into Firefox 17. Those with the most updated version of Firefox can visit the Messenger for Firefox page and select “Turn On” to activate the feature.
Essential tools for hardcore PC builders and upgraders – While you probably can build a PC with just that single screwdriver, the time you’ll take and the roadblocks you’ll encounter will lead to unnecessary frustration. With the right tools, however, you can shave hours off your assembly time, and turn that PC building or upgrading project into a truly enjoyable experience.
How to print from a mobile device with Google’s Cloud Print – Just because you’re on a smartphone or tablet doesn’t mean you can’t print. In a few easy steps, you can set up Google Cloud Print to print from just about any mobile device.
Remove ransomware with ease using HitmanPro.Kickstart – SurfRight, announced HitmanPro.Kickstart, a solution that enables users to easily remove ransomware that holds their computer hostage. HitmanPro.Kickstart is available now as a free addition to all new and existing users of the HitmanPro solution.
How to test-drive Windows 8 for free in VirtualBox – Want to dip your toes in Microsoft’s modern UI before plunging head-first into Windows 8? You can do it for free, without uninstalling your current OS.
How To: Advanced Photo Enhancements – Learn how to “photoshop” your photos with red-eye and blemish removal, and special effects like bokeh, tilt-shift, and HDR enhancements.
How to Find the Perfect Way to Build Your Web Site (for Coders and Non-Coders Alike) – Building a great web site takes work, whether you love to code or don’t know the first thing about it. Several tools attempt to help you solve that problem, but no one option fits the needs of everybody. Here, we’re going to look at the best popular approaches so you can find the one that suits you best.
Digital-storage basics, part 3: Backup vs. redundancy – CNET editor Dong Ngo goes over the basics of digital-storage devices for home users.
Cloud showdown: Amazon vs. Rackspace vs. Microsoft vs. Google – It wouldn’t be a mischaracterization to equate the cloud computing industry to the wild, wild west. In its latest Magic Quadrant report, research firm Gartner lists 14 infrastructure as a service (IaaS) companies, but Network World looked at four of the biggest names to compare and contrast: Amazon Web Services, Rackspace (and OpenStack), Microsoft and Google.
Best Products of 2012: Business and Productivity – We wrap up our week-long coverage of the best products of 2012 with a look at the business and productivity category. And there’s plenty to chew on, starting with Microsoft’s entrely new operating system and ending with—interestingly enough—software that enables musicians to use ethernet networks in a completely new way.
Tumblr Worm Spreads Fake, Racist Post – Tumblr today was hit by a worm that posted a racist message to users’ blogs without their permission. Tumblr is encouraging users who have viewed the post to “immediately” log out of any browsers that might be using Tumblr.
Reveton impersonates FBI, claims to record users’ illegal activities – The deadly combination of the Citadel malware and the Reveton ransomware is still widely used to steal information and money from uninformed users, the Internet Crime Complaint Center (IC3) warns. The Citadel malware – a banking Trojan that is based on Zeus Trojan’s source code and whose creators have adopted a Software-as-a-Service approach when it comes to the modifications of the crimeware kit that produces its variants – lures users to websites that deliver Reveton via drive-by download.
Social sign-ins at third-party sites begin to get thumbs down – It’s common for websites requiring registration to offer a social-sign-in option. That allows the consumer to use their credentials from a social networking site, such as Facebook or Twitter, at the new site, thus avoiding the need for creating yet another username and password to remember. On some sites, though, social-sign-in isn’t an option but a requirement—a requirement that some of those sites have started reconsidering.
Three out of every four malware infections are caused by Trojans – PandaLabs analyzed the IT security events and incidents from July through September 2012. The third quarter of the year has seen an increase in the number of hacking attacks on major companies aimed to gain access to confidential and personal information. Trojans constituted 72.58 percent of all new malware, while viruses constituted 14.47 percent and worms 10.53 percent.
Apple vs. Samsung: Bad blood in the smartphone wars – Apple and Samsung Electronics just don’t seem to be able to get along. Apple under Tim Cook has become choosier about picking its fights, but the company shows no signs of wanting to settle with Samsung as they continue to battle over smartphone and tablet buyers.
Microsoft wins big one in Motorola patent infringement suit – A district court judge has ruled that the software giant’s Xbox and Windows cannot be banned from sale.
Android Still Leads iOS in U.S. Despite iPhone 5, comScore Finds – Despite recent stats that crowned iOS as the top U.S. mobile OS, comScore found that Google’s Android was still the most popular operating system at the end of October.
Sendmail and Mimecast partner on hybrid-cloud email security – This partnership allows global enterprises to combine the on-premises Sentrion Email Integration Platform with Mimecast’s in-cloud Unified Email Management in a hybrid-cloud architecture for complete email security, archiving and business continuity with any on-premises or in-cloud email system.
Predictive Merchandising – Also called automated merchandising or personalized product recommendations, in electronic commerce it is a search technology that integrates data and predictive analytics to generate site merchandising. While exact features of predictive merchandising services differ from vendor to vendor, there all have some common functions. Usually tracking tags are used in a merchant’s e-mail and on-site that capture and analyze key information at each point in the online shopping process. Web site visitor’s preferences are tracked and the system is able to analyze that data in order to automate product offers to other customers with similar behavior on the site. Other aspects of automated merchandising include cross-sell and up-sell of related products, the capability for shoppers to compare related products, and the ability to show returning customers products they previously showed an interest in.
Off Topic (Sort of):
Where Is Windows 8.1? – As predicted, Windows 8 is neither setting the world on fire nor getting much sympathy from the critics. Microsoft must now make a bold move: release a version 8.1 as soon as possible.
Google Warns UN Not to Censor Web at Dubai Meeting – Google Internet evangelist Vint Cerf posts a public critique of the United Nations meeting designed to revise the rules of the Internet.
Why isn’t a program malware if it installs additional, unwanted software? – Because they’re legal, and because, annoying as they are, they’re not anywhere near as bad as real malware. True, installing one program and getting two or three more feels like a violation, but these unwanted programs don’t hide their existence. Nor do they, as far as I know, do anything illegal. And they can all be uninstalled.
Employees use file sharing services despite bans – Large numbers of employees use Dropbox and other consumer file sharing services for sensitive work-related data, even if they know that their employer has a specific policy banning the use of such services, according to Nasuni.
Social Media Use Exploded in 2012, Led by Pinterest – Nielsen and NM Incite released the 2012 Social Media Report, pointing to a growing mobile Web and app social network
“We are all travelers in the wilderness of this world, and the best we can find in our travels is an honest friend.”
– Robert Louis Stevenson
Today’s Free Downloads:
EverNote – Evernote allows you to easily capture information in any environment using whatever device or platform you find most convenient, and makes this information accessible and searchable at any time, from anywhere.
System Mechanic Free – System Mechanic Free is a complete suite of powerful system repair and maintenance tools. The 7 core tools included in System Mechanic Free are designed to boost speed, fix problems, and instantly improve PC performance.