Browsers Beat Security Software in Phishing Protection Test – A report released today by Austin-based NSS Labs reveals a surprising result: your browser alone is most likely better at phishing protection than your security suite.
How to monitor and manage your PC from any smartphone or tablet – It’s 2013, and computing has entered a new age of mobility. If you’re still wasting time trudging over to your PCs to perform routine maintenance, check for software updates, and power down every night, you haven’t gotten with the program.
Dice Will Troll the Social Media Profiles of Prospective Employees – Launched today as a beta tool for recruiters already signed up to Dice, the tool combs through a candidate’s online social media presence in order to generate a comprehensive, and more personal, profile of the person a company is considering hiring. According to Dice, the service will scour up to 50 different social networks, including tech-centric sites like Stack Overflow and GitHub, as well as mainstream sites like Facebook, Twitter, and Google+, essentially delivering the most detailed profile a recruiter could hope for, all in one place.
Bang with Friends sex app is on fire – Bang With Friends (BWF) is a sex app that allows users to anonymously hook up with their Facebook friends. And yes, this particular app is on fire as its popularity quickly increases. How does it work? Well, first you sign in with Facebook, pick the friends you want to “bang,” message each other, and then, voila!
Faster, better, stronger: Get your PC in tip-top shape – With regular maintenance and a bit of effort, it’s possible to keep a Windows system relatively clean and performing at its peak. Some of the things we’re going to cover here may be second nature to long-time PC aficionados, but these tips should come in quite handy for casual users. At the very least they’ll help you keep your system clean, updated, and better protected from potential threats.
Governments increasingly strong-arm Twitter for data – Given that Twitter is based in San Francisco, California, it’s not surprising that most government requests for data originate in the US. In fact, during the second half of 2012, 81% of all information requests worldwide – that’s 815 requests – came from the US. Japan was a distant second, with a total of 62 requests. Brazil was third, with 34 requests. The UK asked for information 25 times.
Mozilla to Require ‘Click to Play’ on Firefox Plugins – Mozilla announced this week that it will require “Click to Play” for all third-party plugins on Firefox, except the most current version of Flash. What that means is that whenever you hit a third-party plugin via the Firefox browser, you will – by default – have to grant the browser permission to access it.
Comodo Firewall – It’s completely free, and it includes a wide range of features beyond the expected. Comodo’s 2013 edition has gotten a serious makeover, with top-to-bottom streamlining of its user interface.In addition to a brand-new interface, the latest version of Comodo Firewall has toned down the behavior blocking popups found in previous versions. It offers a wealth of bonus features including a hardened browser, sandboxing, and secure DNS lookup. Super-techie users will love it; ordinary folks may be a bit overwhelmed.
Fleksy Is an Alternative Keyboard Even the Blind Can Use – iOS: Fleksy is an alternative keyboard with unprecedented predictive text skills. You can type a word completely wrong and it’ll still figure out what you meant. That’s because Fleksy was designed with the blind in mind. The keyboard not only fixes your grievous typing errors, but speaks back the word to you so you know what it thinks you typed. The keyboard only consists of letters, however.
Five network management tools for admins – No matter what your level of expertise, and your network needs, one of these tools should make the gathering of information about your network a simple task. Whether you need a simple, ncurses-based tool, or a full-blown, full-featured GUI, you can find what you’re looking for and not have to spend a single penny.
Google Maps, Street View, and privacy: Try harder, Google – Google has seemingly been decent at maintaining the privacy of passers-by and license plates appearing in Google Maps Street View images, but how good is their privacy algorithm really? Questionable, according to my recent research.
Set up Windows 8 as a home server – Set up your PC as a home or small business server to save time, money and storage space while sharing your data across multiple PCs and mobile devices.
Security:
Hacker blackmailed 350 women into stripping on their webcams, FBI says – The FBI has arrested a 27-year-old man, who they claim hacked the accounts of Facebook users, and coerced hundreds of women into stripping while he watched via Skype.
New Ransomware Encrypts Victim Data – An unusual new strain of ransomware makes good on its threat, doing what the majority of other varieties only claim to do. The Trojan actually encrypts data on infected machines, effectively rendering certain files inaccessible to users on compromised computers in order to block removal.
How to fix the UPnP security holes – The US Department of Homeland Security is urging everyone to disable the common networking Universal Plug and Play (UPnP) protocol. This is being done because Rapid7 security researchers have found that tens of million devices worldwide are wide open to attack because of flaws in the network protocol and its implementations.
Google Offers Phone Notifications for Suspicious Activity, Here’s How to Enable Them – If a hacker gets access to your Gmail account, the results could be disastrous. Google has long notified users via email if their account passwords have been changed or there’s a suspicious login attempt, but now you can also set up phone alerts. You’ll find this recently added feature under your Accounts > Security page. To get the text message alerts, add your mobile phone number and just check the two notification boxes. You’ll get a one-time verification code on your phone to finish setting this up.
Printers join fray in network vulnerability landscape – Printers are not the typical paths cybercriminals take into corporate networks. Nevertheless, the devices have become a concern among experts who see them as an ignored weakness in network defenses. Andrew Howard, a U.K. mobile app developer, recently raised the issue of printer security by showing that a “quick, well-crafted Google search” could return 86,800 results for publicly accessible Hewlett-Packard printers.
Malware controls 620,000 phones, sends costly messages – A new discovered malware is potentially one of the most costly viruses yet discovered. Uncovered by NQ Mobile, the “Bill Shocker” (a.expense.Extension.a) virus has already impacted 620,000 users in China and poses a threat to unprotected Android devices worldwide.
New York Times breached by Chinese hackers over four months – Chinese hackers accessed e-mails of reporters and stole employee passwords, with the timing of attacks coinciding with an investigative report on the wealth of Chinese premier Wen Jiabao’s relatives.
Company News:
Fujitsu develops new data transfer protocol that is 30 times faster than TCP – There are two main data transfer protocols — Transmission Control Protocol (TCP) and User Datagram Protocol (UDP). If you only had to know one fact about each protocol, it’s that TCP is slower because it takes time to check for errors, and UDP is faster because it doesn’t check for errors as much. Obviously, as shown by both protocols, having to vigorously check for errors limits the speed of a transfer protocol, but Fujitsu has announced that it has found a way to add error-checking into a UDP-like protocol and keep the higher speed.
Goodbye Research In Motion, hello BlackBerry – Research In Motion is changing its name to BlackBerry, a move it hopes will signify a fresh start for the company. The surprise name change, which takes effect immediately, was announced by CEO Thorsten Heins at an event in New York to launch the company’s new BlackBerry 10 operating system and smartphones.
File-sharing site Mega fields 150 copyright infringement warnings – The file-sharing service Mega has fielded 150 copyright warnings since its recent launch as founder Kim Dotcom grows a risky new business while under indictment by U.S. prosecutors for running Megaupload.
Tumblr avoids porn label and adds mature rating to iOS app – After Apple pulled the 500px photo app from iTunes over a porn controversy, it seems Tumblr is doing what it can to avoid the same fate by adding a 17+ age warning to its iPhone and iPad app.
Webopedia Daily:
Server farm – Also referred to as server cluster, computer farm or ranch. A server farm is a group of networked servers that are housed in one location. A server farm streamlines internal processes by distributing the workload between the individual components of the farm and expedites computing processes by harnessing the power of multiple servers. The farms rely on load-balancing software that accomplishes such tasks as tracking demand for processing power from different machines, prioritizing the tasks and scheduling and rescheduling them depending on priority and demand that users put on the network. When one server in the farm fails, another can step in as a backup.
Off Topic (Sort of):
Who’s liable when a self-driving car self-crashes? – States ponder how to write regulations. Automakers offer suggestions on who’s not at fault (guess).
The case against Aaron Swartz: Why we should be concerned – Patrick Lambert looks as the charges facing Internet activist Aaron Swartz before his death. Why were the penalties so severe and how easy would it be for others to get in the same kind of legal trouble?
Physicists create world’s first multiverse of universes in the lab – Researchers at the University of Maryland, College Park and Towson University are reporting that they have created multiple universes inside a laboratory-created multiverse — a world first. Now, you should wonder if any of those universes are real, or are just some sort of simulation.
Check Out Facebook’s NFL Fan Loyalty Map – If you’re an NFL fan in Nassau County, chances are you support the New York Jets. The bad news is that the western tip of Long Island is the only strip of turf in the country where you make up the majority and you’re surrounded on all sides by a sea of Giants, Patriots, Steelers, and Eagles fans.
iPhone users pay highest phone bills – New data shows that 59 percent of iPhone users spend more than $100 per month on their carrier bill, while 56 percent of Windows phone users and 53 percent of Android users pay that much.
New Year’s Day was the biggest ever for Facebook – Users uploaded 600 million photos in one day — the most ever for the social network.
Today’s Quote:
“People will forget what you do. People will forget what you say. But people will never forget how you made them feel.”
– Charlie Coffey
Today’s Free Downloads:
ScanNow for UPnP – The free scanner checks whether your network-enabled devices might be vulnerable to attack through the UPnP protocol. Find out if you might be one of the millions of users at risk through these vulnerabilities and what steps you can take to reduce risk.
EASEUS Todo Backup Free Edition – Protect your PC with EASEUS Todo Backup Home by just a few quick steps. If you lose any files you like or need to go back to an earlier version, don’t worry, you can recover them in time.
Midget Lesbian Porn, Trannies With Knives, and Other Assorted Spam Comments
There’s not much that’s funny about comment spam. Comment spam has the potential to be dangerous – if it’s allowed to be blindly posted. I’ve written a number of articles dealing with the hows/whys of comment spam in the past, so I won’t belabor the point. If you wish you can checkout – Comment Spam Is Dangerous BS!
Over and above the danger it may pose to Internet travellers, by its very nature, comment spam is a pain in the patootie for bloggers who have to deal with it. Here on this site – every morning I’m forced to deal with upwards of 300+ pieces of comment spam. This morning for example – 358. These numbers do not include the 200 or more spam comments, that will arrive throughout the day.
Not a big problem you might think – just hit “delete all spam.” Done – over with – on to the next thing. Except, the downside to the quick erase method is; some genuine comments that may have a link/attachment (which will trigger the spam filter), get lost in the flush.
Recently, for example, a reader made the point that I had not posted his previous comment and questioned, if I intended to handle his current comment in the same way. Since I do not filter genuine comments, I could only assume that this reader’s prior comment had fallen victim to the “flush it down the toilet” method. An apology, of course, was in order. So, a pain in the patootie? You bet.
Even so, hard as it is to imagine – there is a bit of a silver lining to comment spam. Sure, I had to dig deep to find it – but, I have to admit – there are those rare moments when I get my morning coffee up my nose, when the unintentional humor of a spam comment catches me unaware.
Now, I don’t mean any disrespect to those who consider Midget Lesbian Porn to be the height of eroticism …………………….. (no, I better not write what I really want to say). But, the following brought tears to my eyes – tears of laughter, that is.
Midget lesbian porn – dominican-republic-travelxxxxxx/ x
hflrzwnxko@vkukou.com
Lolita midget porn videos – dominican-republic-travelxxxxxx
Midget asian porn http://dominican-republic-travel-dealsxxx
Hard core midget porn pics, QzpMldJ.
All of the links actually resolve to – http:midgetporntube4u.com/?act=public_html/dominican-republic-travel-deals.net/&
Travelling to the site – if you’re running WOT – would pop up the following warning. Just a quick question for WOT though – why would “Child safety” be unrated?
But lets move on to the following. Both of these put a cramp in my sense of how to comment, in this post, gracefully. So, I’ll just say – WHAT?
Ticked off trannies with knives (referral link removed).
Penis enlargement bible free download (referral link removed).
But the best, the spam comments that leave me in stitches, are the Google Translate fails. One would think, that if a spammer went to all the trouble of writing a complex spam comment, he’d a least get it right. Here’s a few recent examples.
So you see – even comment spam has an upside. Sort of.
A quick note: In the 20 minutes it took to write this short piece, I’ve become the ungrateful recipient of another 118 spam comments. These guys just never give up.
Share this:
16 Comments
Filed under Comment Spam, Porn, WOT (Web of Trust)
Tagged as Bill Mullins, comment spam, fails, Google Translate, Tech Thoughts