<?xml version="1.0" encoding="UTF-8" standalone="no"?><?xml-stylesheet href="http://www.blogger.com/styles/atom.css" type="text/css"?><rss xmlns:itunes="http://www.itunes.com/dtds/podcast-1.0.dtd" version="2.0"><channel><title>IT Syslog</title><description>information is a commodity</description><managingEditor>noreply@blogger.com (Unknown)</managingEditor><pubDate>Fri, 1 Nov 2024 04:53:30 -0700</pubDate><generator>Blogger http://www.blogger.com</generator><openSearch:totalResults xmlns:openSearch="http://a9.com/-/spec/opensearchrss/1.0/">18</openSearch:totalResults><openSearch:startIndex xmlns:openSearch="http://a9.com/-/spec/opensearchrss/1.0/">1</openSearch:startIndex><openSearch:itemsPerPage xmlns:openSearch="http://a9.com/-/spec/opensearchrss/1.0/">25</openSearch:itemsPerPage><link>http://itsyslog.blogspot.com/</link><language>en-us</language><itunes:explicit>no</itunes:explicit><itunes:subtitle>information is a commodity</itunes:subtitle><itunes:owner><itunes:email>noreply@blogger.com</itunes:email></itunes:owner><item><title>yahoo messenger doesn't show what i write?</title><link>http://itsyslog.blogspot.com/2010/10/yahoo-messenger-doesnt-show-what-i.html</link><author>noreply@blogger.com (Unknown)</author><pubDate>Tue, 19 Oct 2010 09:50:00 -0700</pubDate><guid isPermaLink="false">tag:blogger.com,1999:blog-5748480205419307697.post-7136174729208446316</guid><description>&lt;div class=Section1&gt;  &lt;p class=MsoNormal&gt;&lt;span class=apple-style-span&gt;&lt;font size=2 color="#333333" face=Verdana&gt;&lt;span style='font-size:10.0pt;font-family:Verdana;color:#333333'&gt;If you you cannot see text in Instant Messages at all, not even your own after you click Send then read below. Yahoo does have a limit on the number of characters that can be posted at once in an IM, I am not sure what that limit is though.&lt;/span&gt;&lt;/font&gt;&lt;/span&gt;&lt;font size=2 color="#333333" face=Verdana&gt;&lt;span style='font-size:10.0pt;font-family: Verdana;color:#333333'&gt;&lt;br&gt; &lt;br&gt; &lt;span class=apple-style-span&gt;CAN&amp;#8217;T SEE TEXT IN INSTANT MESSAGES?&lt;/span&gt;&lt;span class=apple-converted-space&gt;&amp;nbsp;&lt;/span&gt;&lt;br&gt; &lt;span class=apple-style-span&gt;If you cannot see text in instant messages, not even your own after you click Send or Press Enter, this is an issue that is cropping up more and more. If just a new problem try exiting Yahoo Messenger and then relaunching it. Even try rebooting your computer. If both those fail to solve your problem then try the suggestions below. This is actually an Internet Explorer scripting problem. Yahoo Messenger relies on Internet Explorer to work even if you have a different default browser. So when IE has a problem, Yahoo Messenger can as well.&lt;/span&gt;&lt;br&gt; &lt;br&gt; &lt;span class=apple-style-span&gt;1) The first thing to check is to make sure you have scripting enabled in Internet Explorer. Internet Explorer is integrated into Yahoo Messenger so things that go wrong with IE can affect Yahoo Messenger. Here is the yahoo help page about that:&lt;a href="http://help.yahoo.com/l/us/yahoo/messenger/messenger8/messenger/messenger-27.html"&gt;&lt;font color="#006699"&gt;&lt;span style='color:#006699'&gt;http://help.yahoo.com/l/us/yahoo/messeng&amp;#8230;&lt;/span&gt;&lt;/font&gt;&lt;/a&gt;&lt;/span&gt;&lt;br&gt; &lt;br&gt; &lt;span class=apple-style-span&gt;2) In the Start Menu click on Run. Type, without the quotes, &amp;#8220;regsvr32 jscript.dll&amp;#8221; and then click OK. Next, repeat the process but this time type in the Run box &amp;#8220;regsvr32 vbscript.dll&amp;#8221; and click OK. Please note, if you are using Windows Vista temporarily disable the User Account Control (UAC). You can easily turn it back on. On the Control Panel (Category View) choose User Accounts and Family Safety, next choose User Accounts, and then click Turn User Account Control on or off.&lt;/span&gt;&lt;br&gt; &lt;br&gt; &lt;span class=apple-style-span&gt;3) If the above does not fix your problem and you are using Windows XP, you can update your Windows Script to version 5.7. In my experience helping others, this is the step that has helped the most people. Exit all browser windows and chat programs including Yahoo Messenger before installing. Here is link from Microsoft to update that:&lt;/span&gt;&lt;br&gt; &lt;span class=apple-style-span&gt;&lt;a href="http://www.microsoft.com/Downloads/details.aspx?familyid=47809025-D896-482E-A0D6-524E7E844D81&amp;amp;displaylang=en"&gt;&lt;font color="#006699"&gt;&lt;span style='color:#006699'&gt;http://www.microsoft.com/Downloads/detai&amp;#8230;&lt;/span&gt;&lt;/font&gt;&lt;/a&gt;&lt;/span&gt;&lt;br&gt; &lt;br&gt; &lt;span class=apple-style-span&gt;Or you can do an internet search for Windows Script 5.7 and choose the Microsoft link.&lt;/span&gt;&lt;br&gt; &lt;span class=apple-style-span&gt;This version of Window Script is already included with &lt;st1:place w:st="on"&gt;Vista&lt;/st1:place&gt; so you would not use that link. There is also a Windows Script 5.7 released for Windows 2000 and you can find that here:&lt;/span&gt;&lt;br&gt; &lt;span class=apple-style-span&gt;&lt;a href="http://www.microsoft.com/downloads/details.aspx?familyid=C03D3E49-B40E-4CA1-A0C7-CC135EC4D2BE&amp;amp;displaylang=en"&gt;&lt;font color="#006699"&gt;&lt;span style='color:#006699'&gt;http://www.microsoft.com/downloads/detai&amp;#8230;&lt;/span&gt;&lt;/font&gt;&lt;/a&gt;&lt;/span&gt;&lt;br&gt; &lt;br&gt; &lt;/span&gt;&lt;/font&gt;&lt;font size=2 face=Verdana&gt;&lt;span style='font-size:10.0pt; font-family:Verdana'&gt;&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/font&gt;&lt;/p&gt;  &lt;/div&gt;  </description><thr:total xmlns:thr="http://purl.org/syndication/thread/1.0">0</thr:total></item><item><title>Microsoft attacks openoffice</title><link>http://itsyslog.blogspot.com/2010/10/microsoft-attacks-openoffice.html</link><author>noreply@blogger.com (Unknown)</author><pubDate>Sun, 17 Oct 2010 09:36:00 -0700</pubDate><guid isPermaLink="false">tag:blogger.com,1999:blog-5748480205419307697.post-7637803613463657272</guid><description>&lt;DIV&gt;&lt;FONT face=Arial size=2&gt;&lt;SPAN class=Apple-style-span  style="WORD-SPACING: 0px; FONT: medium 'Times New Roman'; TEXT-TRANSFORM: none; COLOR: rgb(0,0,0); TEXT-INDENT: 0px; WHITE-SPACE: normal; LETTER-SPACING: normal; BORDER-COLLAPSE: separate; orphans: 2; widows: 2; webkit-border-horizontal-spacing: 0px; webkit-border-vertical-spacing: 0px; webkit-text-decorations-in-effect: none; webkit-text-size-adjust: auto; webkit-text-stroke-width: 0px"&gt;&lt;SPAN  class=Apple-style-span  style="FONT-SIZE: 12px; COLOR: rgb(51,51,51); LINE-HEIGHT: 20px; FONT-FAMILY: Verdana, Arial, Helvetica, sans-serif; TEXT-ALIGN: left"&gt; &lt;P  style="PADDING-RIGHT: 0px; PADDING-LEFT: 0px; PADDING-BOTTOM: 0px; MARGIN: 10px 0px; PADDING-TOP: 0px"&gt;&lt;SPAN  onmouseover=_tipon(this) onmouseout=_tipoff()&gt;The truth is that open source  software support is lacking, and when it exists, is made live tests.&lt;/SPAN&gt;&lt;SPAN  class=Apple-converted-space&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN onmouseover=_tipon(this)  onmouseout=_tipoff()&gt;That's why we never see big fail than links from major  software vendors do not release after release and that the bug  appeared.&lt;/SPAN&gt;&lt;SPAN class=Apple-converted-space&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN  onmouseover=_tipon(this) onmouseout=_tipoff()&gt;And here I think the fix for  WordPress, which is an open source software that updates have brought with them  the security problems in some major cases.&lt;/SPAN&gt;&lt;/P&gt; &lt;P  style="PADDING-RIGHT: 0px; PADDING-LEFT: 0px; PADDING-BOTTOM: 0px; MARGIN: 10px 0px; PADDING-TOP: 0px"&gt;&lt;SPAN  onmouseover=_tipon(this) onmouseout=_tipoff()&gt;This time as a software maker  Microsoft Money comes and dissolves into a commercial idea free office software,  which does not offer anything for people who need office  solutions.&lt;/SPAN&gt;&lt;/P&gt;&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/FONT&gt;&lt;/DIV&gt;</description><thr:total xmlns:thr="http://purl.org/syndication/thread/1.0">0</thr:total></item><item><title>Google Operating System, Chom + Linux = Love</title><link>http://itsyslog.blogspot.com/2010/10/google-operating-system-chom-linux-love.html</link><author>noreply@blogger.com (Unknown)</author><pubDate>Sun, 17 Oct 2010 09:36:00 -0700</pubDate><guid isPermaLink="false">tag:blogger.com,1999:blog-5748480205419307697.post-5934823508216153723</guid><description>&lt;DIV&gt;&lt;FONT face=Arial size=2&gt;&lt;SPAN class=Apple-style-span  style="WORD-SPACING: 0px; FONT: medium 'Times New Roman'; TEXT-TRANSFORM: none; COLOR: rgb(0,0,0); TEXT-INDENT: 0px; WHITE-SPACE: normal; LETTER-SPACING: normal; BORDER-COLLAPSE: separate; orphans: 2; widows: 2; webkit-border-horizontal-spacing: 0px; webkit-border-vertical-spacing: 0px; webkit-text-decorations-in-effect: none; webkit-text-size-adjust: auto; webkit-text-stroke-width: 0px"&gt;&lt;SPAN  class=Apple-style-span  style="FONT-SIZE: 12px; COLOR: rgb(51,51,51); LINE-HEIGHT: 20px; FONT-FAMILY: Verdana, Arial, Helvetica, sans-serif; TEXT-ALIGN: left"&gt; &lt;P  style="PADDING-RIGHT: 0px; PADDING-LEFT: 0px; PADDING-BOTTOM: 0px; MARGIN: 10px 0px; PADDING-TOP: 0px"&gt;&lt;SPAN  onmouseover=_tipon(this) onmouseout=_tipoff()&gt;&lt;A  style="FONT-WEIGHT: 800; COLOR: rgb(80,119,211); TEXT-DECORATION: none"  href="http://translate.googleusercontent.com/translate_c?hl=ro&amp;amp;ie=UTF-8&amp;amp;sl=ro&amp;amp;tl=en&amp;amp;u=http://googleblog.blogspot.com/2009/07/introducing-google-chrome-os.html&amp;amp;prev=_t&amp;amp;rurl=translate.google.ro&amp;amp;usg=ALkJrhgC5Q4zbbXcZpiWFRzWf_8tet7gWA"  target=_blank&gt;Google&lt;/A&gt;&lt;SPAN class=Apple-converted-space&gt;&amp;nbsp;&lt;/SPAN&gt;gave it  one last night saying that working on the operating system will be called -  height - Chrome. OS will be based on a Linux kernel, over the coming  applications, mainly web.&lt;/SPAN&gt;&lt;/P&gt; &lt;P  style="PADDING-RIGHT: 0px; PADDING-LEFT: 0px; PADDING-BOTTOM: 0px; MARGIN: 10px 0px; PADDING-TOP: 0px"&gt;&lt;SPAN  onmouseover=_tipon(this) onmouseout=_tipoff()&gt;Linux know how on what programs  work and what applications do, or who can very well be limitations to anticipate  this on Google's.&lt;/SPAN&gt;&lt;SPAN class=Apple-converted-space&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN  onmouseover=_tipon(this) onmouseout=_tipoff()&gt;But Google offers up to a point  everything needed for an office-type computer.&lt;/SPAN&gt;&lt;SPAN  class=Apple-converted-space&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN onmouseover=_tipon(this)  onmouseout=_tipoff()&gt;We have a video player (YouTube), audio (google), messenger  (gTalk) + pdf document editing (google docs), mail clients (Gmail), browser  (chrome), calendar / ogranizer (Google Calendar), pictures (picasa) May be  something?&lt;/SPAN&gt;&lt;SPAN onmouseover=_tipon(this) onmouseout=_tipoff()&gt;Yes, I  think a Twitter client, but it's not a problem to make it faster.&lt;/SPAN&gt;&lt;/P&gt; &lt;P  style="PADDING-RIGHT: 0px; PADDING-LEFT: 0px; PADDING-BOTTOM: 0px; MARGIN: 10px 0px; PADDING-TOP: 0px"&gt;&lt;SPAN  onmouseover=_tipon(this) onmouseout=_tipoff()&gt;Would there be something in  addition to the operating system does Google do  it?&lt;/SPAN&gt;&lt;/P&gt;&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/FONT&gt;&lt;/DIV&gt;</description><thr:total xmlns:thr="http://purl.org/syndication/thread/1.0">0</thr:total></item><item><title>Linux integrates with Microsoft</title><link>http://itsyslog.blogspot.com/2010/10/linux-integrates-with-microsoft.html</link><author>noreply@blogger.com (Unknown)</author><pubDate>Sun, 17 Oct 2010 09:36:00 -0700</pubDate><guid isPermaLink="false">tag:blogger.com,1999:blog-5748480205419307697.post-2460461787507575624</guid><description>&lt;DIV&gt;&lt;FONT face=Arial size=2&gt;&lt;SPAN class=Apple-style-span  style="WORD-SPACING: 0px; FONT: medium 'Times New Roman'; TEXT-TRANSFORM: none; COLOR: rgb(0,0,0); TEXT-INDENT: 0px; WHITE-SPACE: normal; LETTER-SPACING: normal; BORDER-COLLAPSE: separate; orphans: 2; widows: 2; webkit-border-horizontal-spacing: 0px; webkit-border-vertical-spacing: 0px; webkit-text-decorations-in-effect: none; webkit-text-size-adjust: auto; webkit-text-stroke-width: 0px"&gt;&lt;SPAN  class=Apple-style-span  style="FONT-SIZE: 12px; COLOR: rgb(51,51,51); LINE-HEIGHT: 20px; FONT-FAMILY: Verdana, Arial, Helvetica, sans-serif; TEXT-ALIGN: left"&gt; &lt;P  style="PADDING-RIGHT: 0px; PADDING-LEFT: 0px; PADDING-BOTTOM: 0px; MARGIN: 10px 0px; PADDING-TOP: 0px"&gt;&lt;SPAN  onmouseover=_tipon(this) onmouseout=_tipoff()&gt;She started humming that Microsoft  wants to be net of interoperabiliteze with Linux.&lt;/SPAN&gt;&lt;SPAN  class=Apple-converted-space&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN onmouseover=_tipon(this)  onmouseout=_tipoff()&gt;I mean, as Microsoft sees them as Linuxu steal clients,  wants to remove software that looks like, or use the Linux platform and be quite  good.&lt;/SPAN&gt;&lt;/P&gt; &lt;P  style="PADDING-RIGHT: 0px; PADDING-LEFT: 0px; PADDING-BOTTOM: 0px; MARGIN: 10px 0px; PADDING-TOP: 0px"&gt;&lt;SPAN  onmouseover=_tipon(this) onmouseout=_tipoff()&gt;That, I think that Microsoft's  first move after Uncle Bill Gates, who's to blame for all the world's blue  screen, has announced his retirement from the  company.&lt;/SPAN&gt;&lt;/P&gt;&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/FONT&gt;&lt;/DIV&gt;</description><thr:total xmlns:thr="http://purl.org/syndication/thread/1.0">0</thr:total></item><item><title>Linux Adventures</title><link>http://itsyslog.blogspot.com/2010/10/linux-adventures.html</link><author>noreply@blogger.com (Unknown)</author><pubDate>Sun, 17 Oct 2010 09:36:00 -0700</pubDate><guid isPermaLink="false">tag:blogger.com,1999:blog-5748480205419307697.post-8830189280014269266</guid><description>&lt;DIV&gt;&lt;FONT face=Arial size=2&gt;&lt;SPAN class=Apple-style-span  style="WORD-SPACING: 0px; FONT: medium 'Times New Roman'; TEXT-TRANSFORM: none; COLOR: rgb(0,0,0); TEXT-INDENT: 0px; WHITE-SPACE: normal; LETTER-SPACING: normal; BORDER-COLLAPSE: separate; orphans: 2; widows: 2; webkit-border-horizontal-spacing: 0px; webkit-border-vertical-spacing: 0px; webkit-text-decorations-in-effect: none; webkit-text-size-adjust: auto; webkit-text-stroke-width: 0px"&gt;&lt;SPAN  class=Apple-style-span  style="FONT-SIZE: 12px; COLOR: rgb(51,51,51); LINE-HEIGHT: 20px; FONT-FAMILY: Verdana, Arial, Helvetica, sans-serif; TEXT-ALIGN: left"&gt; &lt;P  style="PADDING-RIGHT: 0px; PADDING-LEFT: 0px; PADDING-BOTTOM: 0px; MARGIN: 10px 0px; PADDING-TOP: 0px"&gt;&lt;SPAN  onmouseover=_tipon(this) onmouseout=_tipoff()&gt;The new kernel hell.&lt;/SPAN&gt;&lt;SPAN  class=Apple-converted-space&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN onmouseover=_tipon(this)  onmouseout=_tipoff()&gt;I mean it's good when you appear as a new Kernel  version.&lt;/SPAN&gt;&lt;SPAN class=Apple-converted-space&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN  onmouseover=_tipon(this) onmouseout=_tipoff()&gt;I'm starting to think that these  are the same as the Windows updates, you gotta do in deh ..&lt;/SPAN&gt;&lt;SPAN  onmouseover=_tipon(this) onmouseout=_tipoff()&gt;unless your name is not PC  anymore.&lt;/SPAN&gt;&lt;SPAN class=Apple-converted-space&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN  onmouseover=_tipon(this) onmouseout=_tipoff()&gt;So I did and now ... ... ... itaa  surprise, I began to go wireless will.&lt;/SPAN&gt;&lt;/P&gt; &lt;P  style="PADDING-RIGHT: 0px; PADDING-LEFT: 0px; PADDING-BOTTOM: 0px; MARGIN: 10px 0px; PADDING-TOP: 0px"&gt;&lt;SPAN  onmouseover=_tipon(this) onmouseout=_tipoff()&gt;I mean, I'm glad to one and a half  after its launch have done linuxuri drivers that are compatible with and  function.&lt;/SPAN&gt;&lt;SPAN class=Apple-converted-space&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN  onmouseover=_tipon(this) onmouseout=_tipoff()&gt;Little late but it is  beautiful.&lt;/SPAN&gt;&lt;SPAN class=Apple-converted-space&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;BR&gt;&lt;SPAN  onmouseover=_tipon(this) onmouseout=_tipoff()&gt;Hard part is ... I do not go yet  one thousand sound card on linux although I did some updates on  there.&lt;/SPAN&gt;&lt;SPAN class=Apple-converted-space&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN  onmouseover=_tipon(this) onmouseout=_tipoff()&gt;So, I commend me to display  nothing nice with the desktop rotates megabitilor and other wonders of video  memory, as long as you do not hear anything.&lt;/SPAN&gt;&lt;SPAN  class=Apple-converted-space&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;BR&gt;&lt;SPAN onmouseover=_tipon(this)  onmouseout=_tipoff()&gt;At least if I understand something of what Youtubele unfold  before my eyes ... but nothing, not a computer makes me so fast, i can still  fight him&lt;/SPAN&gt;&lt;SPAN class=Apple-converted-space&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;IMG  class=wp-smiley alt=:)  src="http://www.piticu.ro/wp-includes/images/smilies/icon_smile.gif"&gt;&lt;/P&gt; &lt;P  style="PADDING-RIGHT: 0px; PADDING-LEFT: 0px; PADDING-BOTTOM: 0px; MARGIN: 10px 0px; PADDING-TOP: 0px"&gt;&lt;SPAN  onmouseover=_tipon(this) onmouseout=_tipoff()&gt;Update: it's wireless on Linux,  it's really nice.&lt;/SPAN&gt;&lt;SPAN class=Apple-converted-space&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN  onmouseover=_tipon(this) style="BACKGROUND-COLOR: rgb(230,236,249)"  onmouseout=_tipoff()&gt;Do not think of anything else, it's the same Intel 3945ABG  adapter, but muult moves better than the windows and goes waaaay  further.&lt;/SPAN&gt;&lt;SPAN class=Apple-converted-space&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN  onmouseover=_tipon(this) onmouseout=_tipoff()&gt;So there's access point to blame  here other donkeys.&lt;/SPAN&gt;&lt;/P&gt;&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/FONT&gt;&lt;/DIV&gt;</description><thr:total xmlns:thr="http://purl.org/syndication/thread/1.0">0</thr:total></item><item><title>How to stay away from Internet dangers</title><link>http://itsyslog.blogspot.com/2010/10/how-to-stay-away-from-internet-dangers.html</link><author>noreply@blogger.com (Unknown)</author><pubDate>Sun, 17 Oct 2010 05:33:00 -0700</pubDate><guid isPermaLink="false">tag:blogger.com,1999:blog-5748480205419307697.post-5214624233448333926</guid><description>&lt;DIV&gt;&lt;FONT face=Arial size=2&gt;&lt;SPAN class=Apple-style-span  style="WORD-SPACING: 0px; FONT: medium 'Times New Roman'; TEXT-TRANSFORM: none; COLOR: rgb(0,0,0); TEXT-INDENT: 0px; WHITE-SPACE: normal; LETTER-SPACING: normal; BORDER-COLLAPSE: separate; orphans: 2; widows: 2; webkit-border-horizontal-spacing: 0px; webkit-border-vertical-spacing: 0px; webkit-text-decorations-in-effect: none; webkit-text-size-adjust: auto; webkit-text-stroke-width: 0px"&gt;&lt;SPAN  class=Apple-style-span  style="FONT-WEIGHT: bold; FONT-SIZE: 15px; COLOR: rgb(46,46,46); LINE-HEIGHT: 21px; FONT-FAMILY: Tahoma, Geneva, sans-serif"&gt;&lt;SPAN  onmouseover=_tipon(this) onmouseout=_tipoff()&gt;The fact that the Internet brings  great value to our lives no one can challenge it and the benefits of its use are  numerous and not getting into the discussion.&lt;/SPAN&gt;&lt;SPAN  class=Apple-converted-space&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN onmouseover=_tipon(this)  onmouseout=_tipoff()&gt;But always there is also a reverse side.&lt;/SPAN&gt;&lt;SPAN  class=Apple-converted-space&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN onmouseover=_tipon(this)  onmouseout=_tipoff()&gt;There is danger everywhere and enjoy the benefits of the  Internet must know and how to protect yourself.&lt;/SPAN&gt;&lt;SPAN  class=Apple-converted-space&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN onmouseover=_tipon(this)  onmouseout=_tipoff()&gt;Security of personal data and privacy is reason enough to  learn to avoid capacanele that you are exposed every  day.&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/FONT&gt;&lt;/DIV&gt; &lt;DIV&gt;&lt;FONT face=Arial size=2&gt;&lt;SPAN class=Apple-style-span  style="WORD-SPACING: 0px; FONT: medium 'Times New Roman'; TEXT-TRANSFORM: none; COLOR: rgb(0,0,0); TEXT-INDENT: 0px; WHITE-SPACE: normal; LETTER-SPACING: normal; BORDER-COLLAPSE: separate; orphans: 2; widows: 2; webkit-border-horizontal-spacing: 0px; webkit-border-vertical-spacing: 0px; webkit-text-decorations-in-effect: none; webkit-text-size-adjust: auto; webkit-text-stroke-width: 0px"&gt;&lt;SPAN  class=Apple-style-span  style="FONT-WEIGHT: bold; FONT-SIZE: 15px; COLOR: rgb(46,46,46); LINE-HEIGHT: 21px; FONT-FAMILY: Tahoma, Geneva, sans-serif"&gt;&lt;SPAN  onmouseover=_tipon(this) onmouseout=_tipoff()&gt;&lt;SPAN class=Apple-style-span  style="WORD-SPACING: 0px; FONT: medium 'Times New Roman'; TEXT-TRANSFORM: none; COLOR: rgb(0,0,0); TEXT-INDENT: 0px; WHITE-SPACE: normal; LETTER-SPACING: normal; BORDER-COLLAPSE: separate; orphans: 2; widows: 2; webkit-border-horizontal-spacing: 0px; webkit-border-vertical-spacing: 0px; webkit-text-decorations-in-effect: none; webkit-text-size-adjust: auto; webkit-text-stroke-width: 0px"&gt;&lt;SPAN  class=Apple-style-span  style="FONT-SIZE: 12px; COLOR: rgb(46,46,46); LINE-HEIGHT: 18px; FONT-FAMILY: Tahoma, Geneva, sans-serif"&gt; &lt;DIV&gt;&lt;SPAN onmouseover=_tipon(this) onmouseout=_tipoff()&gt;Those from  CyberDefender, security providers for the Internet, have studied the problem and  came up with some solutions, namely things that you should NOT do when you surf  in the virtual world.&lt;/SPAN&gt;&lt;/DIV&gt; &lt;DIV&gt;&lt;/DIV&gt; &lt;DIV&gt;&lt;SPAN onmouseover=_tipon(this) onmouseout=_tipoff()&gt;I extracted some of  them that we face every day without to give them great importance:&lt;/SPAN&gt;&lt;/DIV&gt; &lt;DIV&gt;&lt;/DIV&gt; &lt;DIV&gt;&lt;SPAN onmouseover=_tipon(this) onmouseout=_tipoff()&gt;&lt;STRONG  style="FONT-WEIGHT: bold"&gt;1.&lt;/STRONG&gt;&lt;/SPAN&gt;&lt;SPAN  class=Apple-converted-space&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN onmouseover=_tipon(this)  onmouseout=_tipoff()&gt;&lt;STRONG style="FONT-WEIGHT: bold"&gt;How to protect yourself  when using a computer other than your own staff.&lt;/STRONG&gt;&lt;/SPAN&gt;&lt;/DIV&gt; &lt;DIV&gt;&lt;/DIV&gt; &lt;DIV&gt;&lt;SPAN onmouseover=_tipon(this) onmouseout=_tipoff()&gt;NO never check the  "Keep me sign in" if you use a computer to which others have been denied  access.&lt;/SPAN&gt;&lt;/DIV&gt; &lt;DIV&gt;&lt;/DIV&gt; &lt;DIV&gt;&lt;SPAN onmouseover=_tipon(this) onmouseout=_tipoff()&gt;Be careful with your  office computer.&lt;/SPAN&gt;&lt;SPAN class=Apple-converted-space&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN  onmouseover=_tipon(this) onmouseout=_tipoff()&gt;You feel like it's yours for the  work on it every day, but so well can use and other colleagues in your  absence.&lt;/SPAN&gt;&lt;SPAN class=Apple-converted-space&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN  onmouseover=_tipon(this) onmouseout=_tipoff()&gt;Can I make a very simple thing, to  send their address on all mail you received.&lt;/SPAN&gt;&lt;SPAN  class=Apple-converted-space&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN onmouseover=_tipon(this)  onmouseout=_tipoff()&gt;They can also see all your history very simple sites  accessed.&lt;/SPAN&gt;&lt;/DIV&gt; &lt;DIV&gt;&lt;/DIV&gt; &lt;DIV&gt;&lt;SPAN onmouseover=_tipon(this) onmouseout=_tipoff()&gt;If you are logged on a  website, do not forget when you leave and deloghezi site!&lt;/SPAN&gt;&lt;/DIV&gt; &lt;DIV&gt;&lt;/DIV&gt; &lt;DIV&gt;&lt;SPAN onmouseover=_tipon(this) onmouseout=_tipoff()&gt;Delete visited sites  history of browser you use when you have finished using that  computer.&lt;/SPAN&gt;&lt;/DIV&gt; &lt;DIV&gt;&lt;/DIV&gt; &lt;DIV&gt;&lt;SPAN onmouseover=_tipon(this) onmouseout=_tipoff()&gt;NO never save passwords  to access different sites other than your personal computer, because then other  users can access your accounts on these sites.&lt;/SPAN&gt;&lt;/DIV&gt; &lt;DIV&gt;&lt;/DIV&gt; &lt;DIV&gt;&lt;SPAN onmouseover=_tipon(this) onmouseout=_tipoff()&gt;&lt;STRONG  style="FONT-WEIGHT: bold"&gt;2.&lt;/STRONG&gt;&lt;/SPAN&gt;&lt;SPAN  class=Apple-converted-space&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN onmouseover=_tipon(this)  onmouseout=_tipoff()&gt;&lt;STRONG style="FONT-WEIGHT: bold"&gt;How to protect yourself  on social networks like Facebook&lt;/STRONG&gt;&lt;/SPAN&gt;&lt;/DIV&gt; &lt;DIV&gt;&lt;STRONG style="FONT-WEIGHT: bold"&gt;&lt;BR&gt;&lt;/STRONG&gt;&lt;/DIV&gt; &lt;DIV&gt;&lt;SPAN onmouseover=_tipon(this) onmouseout=_tipoff()&gt;Use settings to protect  personal data (privacy settings).&lt;/SPAN&gt;&lt;SPAN  class=Apple-converted-space&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN onmouseover=_tipon(this)  onmouseout=_tipoff()&gt;Do not let free access to "friends of friends" to see even  birth date or phone number.&lt;/SPAN&gt;&lt;SPAN  class=Apple-converted-space&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN onmouseover=_tipon(this)  onmouseout=_tipoff()&gt;These data can be used and you can wake up with no money in  the account.&lt;/SPAN&gt;&lt;SPAN class=Apple-converted-space&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN  onmouseover=_tipon(this) onmouseout=_tipoff()&gt;Many banks, when you contact them  by phone or contact for various issues related to your account, just do a simple  check to ensure that talk-ask the account holder date of birth.&lt;/SPAN&gt;&lt;/DIV&gt; &lt;DIV&gt;&lt;/DIV&gt; &lt;DIV&gt;&lt;SPAN onmouseover=_tipon(this) onmouseout=_tipoff()&gt;&lt;STRONG  style="FONT-WEIGHT: bold"&gt;&lt;SPAN&gt;3. Do&lt;/SPAN&gt;&lt;SPAN  class=Apple-converted-space&gt;&amp;nbsp;&lt;/SPAN&gt;not use the same password for multiple  accounts&lt;/STRONG&gt;&lt;/SPAN&gt;&lt;/DIV&gt; &lt;DIV&gt;&lt;/DIV&gt; &lt;DIV&gt;&lt;SPAN onmouseover=_tipon(this) onmouseout=_tipoff()&gt;It's hard to remember  multiple passwords so that many of us use the same password for all accounts  they have on various sites.&lt;/SPAN&gt;&lt;SPAN  class=Apple-converted-space&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN onmouseover=_tipon(this)  onmouseout=_tipoff()&gt;The problem is that once you are 100% exposed discovered  password.&lt;/SPAN&gt;&lt;/DIV&gt; &lt;DIV&gt;&lt;/DIV&gt; &lt;DIV&gt;&lt;SPAN onmouseover=_tipon(this) onmouseout=_tipoff()&gt;As a preferred solution  is to have different passwords for different types of accounts.&lt;/SPAN&gt;&lt;SPAN  class=Apple-converted-space&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN onmouseover=_tipon(this)  onmouseout=_tipoff()&gt;For example, for email accounts and logging on the computer  uses certain passwords and service for all sorts of sites and other social  networking passwords.&lt;/SPAN&gt;&lt;/DIV&gt; &lt;DIV&gt;&lt;/DIV&gt; &lt;DIV&gt;&lt;SPAN onmouseover=_tipon(this) onmouseout=_tipoff()&gt;Some browsers have a  function of great help in this case - "master password".&lt;/SPAN&gt;&lt;SPAN  class=Apple-converted-space&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN onmouseover=_tipon(this)  onmouseout=_tipoff()&gt;Under this unique password you can save various other  passwords you use for different accounts.&lt;/SPAN&gt;&lt;SPAN  class=Apple-converted-space&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN onmouseover=_tipon(this)  style="BACKGROUND-COLOR: rgb(230,236,249)" onmouseout=_tipoff()&gt;When we look  only need to insert in the tool that "your master password'' and there you will  find the rest of  passwords.&lt;/SPAN&gt;&lt;/DIV&gt;&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/FONT&gt;&lt;/DIV&gt;</description><thr:total xmlns:thr="http://purl.org/syndication/thread/1.0">0</thr:total></item><item><title>Star Trek or reality? Computers without a mouse and keyboard and intelligent exhibition games in Tokyo! VIDEO</title><link>http://itsyslog.blogspot.com/2010/10/star-trek-or-reality-computers-without.html</link><author>noreply@blogger.com (Unknown)</author><pubDate>Sun, 17 Oct 2010 05:32:00 -0700</pubDate><guid isPermaLink="false">tag:blogger.com,1999:blog-5748480205419307697.post-1252700219013507981</guid><description>&lt;DIV&gt;&lt;FONT face=Arial size=2&gt;&lt;SPAN class=Apple-style-span  style="WORD-SPACING: 0px; FONT: medium 'Times New Roman'; TEXT-TRANSFORM: none; COLOR: rgb(0,0,0); TEXT-INDENT: 0px; WHITE-SPACE: normal; LETTER-SPACING: normal; BORDER-COLLAPSE: separate; orphans: 2; widows: 2; webkit-border-horizontal-spacing: 0px; webkit-border-vertical-spacing: 0px; webkit-text-decorations-in-effect: none; webkit-text-size-adjust: auto; webkit-text-stroke-width: 0px"&gt;&lt;SPAN  class=Apple-style-span  style="FONT-WEIGHT: bold; FONT-SIZE: 15px; COLOR: rgb(46,46,46); LINE-HEIGHT: 21px; FONT-FAMILY: Tahoma, Geneva, sans-serif"&gt;&lt;SPAN  onmouseover=_tipon(this) onmouseout=_tipoff()&gt;Farewell mouse, keyboard  goodbye!&lt;/SPAN&gt;&lt;SPAN class=Apple-converted-space&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN  onmouseover=_tipon(this) onmouseout=_tipoff()&gt;At the museum with  you.&lt;/SPAN&gt;&lt;SPAN class=Apple-converted-space&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN  onmouseover=_tipon(this) onmouseout=_tipoff()&gt;It seems ...&lt;/SPAN&gt;&lt;SPAN  class=Apple-converted-space&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN onmouseover=_tipon(this)  onmouseout=_tipoff()&gt;Digital Content motto exhibition, in Tokyo.&lt;/SPAN&gt;&lt;SPAN  class=Apple-converted-space&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN onmouseover=_tipon(this)  onmouseout=_tipoff()&gt;Here you can find all sorts of gadgets to radically change  human-computer interaction.&lt;/SPAN&gt;&lt;SPAN  class=Apple-converted-space&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN onmouseover=_tipon(this)  onmouseout=_tipoff()&gt;So much that you start to wonder where it ends where the  human mind and artificial intelligence begins.&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/FONT&gt;&lt;/DIV&gt; &lt;DIV&gt;&lt;FONT face=Arial size=2&gt;&lt;SPAN class=Apple-style-span  style="WORD-SPACING: 0px; FONT: medium 'Times New Roman'; TEXT-TRANSFORM: none; COLOR: rgb(0,0,0); TEXT-INDENT: 0px; WHITE-SPACE: normal; LETTER-SPACING: normal; BORDER-COLLAPSE: separate; orphans: 2; widows: 2; webkit-border-horizontal-spacing: 0px; webkit-border-vertical-spacing: 0px; webkit-text-decorations-in-effect: none; webkit-text-size-adjust: auto; webkit-text-stroke-width: 0px"&gt;&lt;SPAN  class=Apple-style-span  style="FONT-WEIGHT: bold; FONT-SIZE: 15px; COLOR: rgb(46,46,46); LINE-HEIGHT: 21px; FONT-FAMILY: Tahoma, Geneva, sans-serif"&gt;&lt;SPAN  onmouseover=_tipon(this) onmouseout=_tipoff()&gt;&lt;SPAN class=Apple-style-span  style="WORD-SPACING: 0px; FONT: medium 'Times New Roman'; TEXT-TRANSFORM: none; COLOR: rgb(0,0,0); TEXT-INDENT: 0px; WHITE-SPACE: normal; LETTER-SPACING: normal; BORDER-COLLAPSE: separate; orphans: 2; widows: 2; webkit-border-horizontal-spacing: 0px; webkit-border-vertical-spacing: 0px; webkit-text-decorations-in-effect: none; webkit-text-size-adjust: auto; webkit-text-stroke-width: 0px"&gt;&lt;SPAN  class=Apple-style-span  style="FONT-SIZE: 12px; COLOR: rgb(46,46,46); LINE-HEIGHT: 18px; FONT-FAMILY: Tahoma, Geneva, sans-serif"&gt; &lt;DIV&gt;&lt;SPAN onmouseover=_tipon(this) onmouseout=_tipoff()&gt;After the mouse and  keyboard, the next screen is really threatened.&lt;/SPAN&gt;&lt;SPAN  class=Apple-converted-space&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN onmouseover=_tipon(this)  onmouseout=_tipoff()&gt;What you need it, when you can project images in front of  you?&lt;/SPAN&gt;&lt;SPAN class=Apple-converted-space&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN  onmouseover=_tipon(this) onmouseout=_tipoff()&gt;A Franco-Japanese company into  reality an idea that you've already seen in the movies.&lt;/SPAN&gt;&lt;SPAN  class=Apple-converted-space&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN onmouseover=_tipon(this)  onmouseout=_tipoff()&gt;The "Airstrike" allows you to move pictures with bare  hands, thanks to a stereo cameras installed on the floor.&lt;/SPAN&gt;&lt;/DIV&gt; &lt;DIV&gt;&lt;/DIV&gt; &lt;DIV&gt;&lt;SPAN onmouseover=_tipon(this) onmouseout=_tipoff()&gt;&lt;EM  style="FONT-STYLE: italic"&gt;"Chambers acts like a man's eyes, watching the  movements of the arms. The computer then processes the information submitted by  chambers. Thus you can move images on the screen with your hands from a  distance, as you do with a mouse,"&lt;/EM&gt;&lt;SPAN  class=Apple-converted-space&gt;&amp;nbsp;&lt;/SPAN&gt;said&lt;SPAN  class=Apple-converted-space&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;STRONG  style="FONT-WEIGHT: bold"&gt;Yumiko Misaki,&lt;/STRONG&gt;&lt;SPAN  class=Apple-converted-space&gt;&amp;nbsp;&lt;/SPAN&gt;director of LM3LABS .&lt;/SPAN&gt;&lt;/DIV&gt; &lt;DIV&gt;&lt;/DIV&gt; &lt;DIV&gt;&lt;SPAN onmouseover=_tipon(this) onmouseout=_tipoff()&gt;A similar mechanism  also uses a virtual game.&lt;/SPAN&gt;&lt;SPAN  class=Apple-converted-space&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN onmouseover=_tipon(this)  onmouseout=_tipoff()&gt;Camera-projector is mounted above the monitor which serves  as a chess board and pieces move according to the movements of  hands.&lt;/SPAN&gt;&lt;SPAN class=Apple-converted-space&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN  onmouseover=_tipon(this) onmouseout=_tipoff()&gt;Attempt to make players focus on  the screen may appear and other fast-moving images.&lt;/SPAN&gt;&lt;/DIV&gt; &lt;DIV&gt;&lt;/DIV&gt; &lt;DIV&gt;&lt;SPAN onmouseover=_tipon(this) onmouseout=_tipoff()&gt;Here's something that  seems to be a musical instrument came directly from the future.&lt;/SPAN&gt;&lt;SPAN  class=Apple-converted-space&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN onmouseover=_tipon(this)  onmouseout=_tipoff()&gt;It's called "touch table" and is a kind of platform game  for multiple users.&lt;/SPAN&gt;&lt;SPAN class=Apple-converted-space&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN  onmouseover=_tipon(this) onmouseout=_tipoff()&gt;It is so intelligent, that we  recognize without fail on each player.&lt;/SPAN&gt;&lt;/DIV&gt; &lt;DIV&gt;&lt;/DIV&gt; &lt;DIV&gt;&lt;SPAN onmouseover=_tipon(this) onmouseout=_tipoff()&gt;&lt;EM  style="FONT-STYLE: italic"&gt;"I stand seat that is equipped with sensors that  transmit electricity. When someone reaches the mass, electric current is passed  from his hand on the table and form a closed loop between the player and body  weight through the seat,"&lt;/EM&gt;&lt;SPAN  class=Apple-converted-space&gt;&amp;nbsp;&lt;/SPAN&gt;says Professor&lt;SPAN  class=Apple-converted-space&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;STRONG  style="FONT-WEIGHT: bold"&gt;Masaichi Furuichi.&lt;/STRONG&gt;&lt;/SPAN&gt;&lt;/DIV&gt; &lt;DIV&gt;&lt;/DIV&gt; &lt;DIV&gt;&lt;SPAN onmouseover=_tipon(this) onmouseout=_tipoff()&gt;Both gadgets are, for  now, only prototypes.&lt;/SPAN&gt;&lt;SPAN class=Apple-converted-space&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN  onmouseover=_tipon(this) onmouseout=_tipoff()&gt;But inventors put their hand in  the fire that we see in stores before  long.&lt;/SPAN&gt;&lt;/DIV&gt;&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/FONT&gt;&lt;/DIV&gt;</description><thr:total xmlns:thr="http://purl.org/syndication/thread/1.0">0</thr:total></item><item><title>IBM shows fastest CPU: 5.2 GHz</title><link>http://itsyslog.blogspot.com/2010/10/ibm-shows-fastest-cpu-52-ghz.html</link><category>IBM</category><category>new processor</category><category>the fastest processor</category><author>noreply@blogger.com (Unknown)</author><pubDate>Sun, 3 Oct 2010 06:50:00 -0700</pubDate><guid isPermaLink="false">tag:blogger.com,1999:blog-5748480205419307697.post-8846103053537781010</guid><description>&lt;span class="Apple-style-span" style="font-family: Georgia; font-size: 11px; color: rgb(51, 51, 51); line-height: 16px; "&gt;&lt;p&gt;&lt;span&gt;The IBM is proud of their new processor that would praise you reach a speed of 5.2 GHz, which makes it the fastest CPU available on the market today, reports hothardware.com.&lt;/span&gt;&lt;/p&gt;&lt;p&gt;&lt;span&gt;Hardware specialists would jump immediately saying that burned and other processors have reached such speeds, even surpassed it.&lt;/span&gt; &lt;span&gt;Nothing really, but those processors needed complex systems based on liquid nitrogen cooling.&lt;/span&gt; &lt;span&gt;IBM's new processor is just fast and do not need such complicated systems.&lt;/span&gt;&lt;/p&gt;&lt;p&gt;&lt;span&gt;Those who think to make upgrades in the PC should turn its attention to other solutions, at least temporarily, because the 5.2 GHz processor will not be available to the public in the near future.&lt;/span&gt; &lt;span&gt;September 10, IBM will make available new toy for premium customers and users.&lt;/span&gt;&lt;/p&gt;&lt;p&gt;&lt;span&gt;IBM representatives say that the new processor speed is not just to keep pace with the technological needs of the times in which we live.&lt;/span&gt; &lt;span&gt;Speed is vital to any company, continuous information flows and increasing of reaching a limit determined by storing information globally.&lt;/span&gt;&lt;/p&gt;&lt;/span&gt;</description><thr:total xmlns:thr="http://purl.org/syndication/thread/1.0">0</thr:total></item><item><title>Google ME appears this fall</title><link>http://itsyslog.blogspot.com/2010/10/google-me-appears-this-fall.html</link><category>Google Me</category><category>search engine</category><category>social networking</category><author>noreply@blogger.com (Unknown)</author><pubDate>Sun, 3 Oct 2010 06:46:00 -0700</pubDate><guid isPermaLink="false">tag:blogger.com,1999:blog-5748480205419307697.post-412697735913312722</guid><description>&lt;span class="Apple-style-span" style="font-family: Verdana; font-size: 11px; line-height: 15px; "&gt;&lt;p&gt;&lt;span class="Apple-style-span" style="font-family: Georgia; line-height: 16px; color: rgb(51, 51, 51); "&gt;&lt;/span&gt;&lt;/p&gt;&lt;p&gt;&lt;span&gt;Eric Schmidt, Google CEO, confirmed rumors conformcarora, this fall we could see a new social network, competition for Facebook, Google ME, reports &lt;strong&gt;&lt;a href="http://translate.googleusercontent.com/translate_c?hl=ro&amp;amp;sl=ro&amp;amp;tl=en&amp;amp;u=http://www.zdnet.com/blog/google/google-me-coming-this-fall/2458&amp;amp;rurl=translate.google.com&amp;amp;twu=1&amp;amp;usg=ALkJrhjAwSNxPgd1sOBCvAtCq3E5gGs1fg" target="_blank" style="text-decoration: none; color: rgb(51, 51, 51); "&gt;ZDNet&lt;/a&gt;&lt;/strong&gt; .&lt;/span&gt;&lt;/p&gt;&lt;p&gt;&lt;span&gt;Google ME will not be a classic social network but an application that integrates social elemenete in helping the search.&lt;/span&gt; &lt;span&gt;At least so say the rumors that circulate around Google ME.&lt;/span&gt; &lt;span&gt;This application aims to attract 500 million users of social networks which will make them competitive.&lt;/span&gt;&lt;/p&gt;&lt;p&gt;&lt;span&gt;Our employees are only guesses since no one outside of Google's, does not know exactly what and how will it be ME.&lt;/span&gt; &lt;span style="background-color: rgb(230, 236, 249); "&gt;Going to sit quietly and wait the big launch.&lt;/span&gt;&lt;/p&gt;&lt;/span&gt;&lt;p&gt;&lt;/p&gt;</description><thr:total xmlns:thr="http://purl.org/syndication/thread/1.0">0</thr:total></item><item><title>PlayStation Move has not sold well</title><link>http://itsyslog.blogspot.com/2010/10/playstation-move-has-not-sold-well.html</link><category>controller</category><category>Move</category><category>Playstation</category><category>Sony</category><author>noreply@blogger.com (Unknown)</author><pubDate>Sun, 3 Oct 2010 06:44:00 -0700</pubDate><guid isPermaLink="false">tag:blogger.com,1999:blog-5748480205419307697.post-8243673354331951752</guid><description>&lt;span class="Apple-style-span" style="font-family: Verdana; font-size: 11px; line-height: 15px; "&gt;&lt;p&gt;&lt;span&gt;On 15 September, Sony launched its motion controller &lt;a href="http://translate.googleusercontent.com/translate_c?hl=ro&amp;amp;sl=ro&amp;amp;tl=en&amp;amp;u=http://www.arenait.net/2010/03/14/sony-prezinta-controller-ul-move.html&amp;amp;rurl=translate.google.com&amp;amp;twu=1&amp;amp;usg=ALkJrhiFzzKcUsqlAl4E-XktnjICmVm9Wg" target="_blank" class="liinternal" style="color: rgb(74, 83, 88); "&gt;Move&lt;/a&gt; , for the PlayStation 3.&lt;/span&gt; &lt;span&gt;It will follow in the footsteps of the Wiimote, and will compete (up to a point) Kinect from your Xbox 360.&lt;/span&gt; &lt;span&gt;But Sony did not praised as Microsoft did with Kinect.&lt;/span&gt; &lt;span&gt;It gave him a holy aura.&lt;/span&gt;&lt;span id="more-20915"&gt;&lt;/span&gt;&lt;/p&gt;&lt;p&gt;&lt;span&gt;And she's not sure that the launching had to have a sufficient number of games compatible to attract potential buyers.&lt;/span&gt; &lt;span&gt;Barely managed to gather any evidence of a second.&lt;/span&gt; &lt;span&gt;In part because their strategy is to transform the old games in titles Move.&lt;/span&gt; &lt;span&gt;But just who will return to play, to experience the new perspective.&lt;/span&gt;&lt;/p&gt;&lt;p&gt;&lt;span style="background-color: rgb(230, 236, 249); "&gt;Microsoft has thought of launching its own controller much better.&lt;/span&gt; &lt;span&gt;Move And in those cases sold below expectations.&lt;/span&gt; &lt;span&gt;Price did not help either.&lt;/span&gt; &lt;span&gt;Wand Home for $ 50, but if we must give full package $ 100.&lt;/span&gt;&lt;/p&gt;&lt;/span&gt;</description><thr:total xmlns:thr="http://purl.org/syndication/thread/1.0">0</thr:total></item><item><title>Intel is investigating as stated protocol HDCP anti-piracy</title><link>http://itsyslog.blogspot.com/2010/10/intel-is-investigating-as-stated.html</link><category>Intel</category><author>noreply@blogger.com (Unknown)</author><pubDate>Sun, 3 Oct 2010 06:42:00 -0700</pubDate><guid isPermaLink="false">tag:blogger.com,1999:blog-5748480205419307697.post-3449818441641318953</guid><description>&lt;span class="Apple-style-span" style="font-family: Verdana; font-size: 12px; color: rgb(0, 93, 206); -webkit-border-horizontal-spacing: 2px; -webkit-border-vertical-spacing: 2px; "&gt;Intel is investigating as a master key was published online anti-piracy protocol or High-Bandwidth Digital Content Protection (HDCP).&lt;/span&gt;&lt;div&gt;&lt;span class="Apple-style-span" style="font-family: Verdana; font-size: 12px; color: rgb(0, 93, 206); -webkit-border-horizontal-spacing: 2px; -webkit-border-vertical-spacing: 2px; "&gt;&lt;span class="Apple-style-span" style="color: rgb(0, 0, 0); font-family: 'Times New Roman'; font-size: medium; "&gt;&lt;p align="Justify"&gt;&lt;span&gt;&lt;span class="text" style="font-size: 12px; color: rgb(0, 0, 0); font-family: Verdana; "&gt;The protocol is used to protect video and audio content as it is transmitted between devices through encryption, and check if the device is licensed to share content.&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;&lt;span class="text" style="font-size: 12px; color: rgb(0, 0, 0); font-family: Verdana; "&gt;&lt;/span&gt;&lt;br /&gt;&lt;span&gt;&lt;span class="text" style="font-size: 12px; color: rgb(0, 0, 0); font-family: Verdana; "&gt;Intel confirmed last week that the master key that the original was published online and are now investigating whether it was stolen or crack-look.&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;&lt;span&gt;&lt;span class="text" style="font-size: 12px; color: rgb(0, 0, 0); font-family: Verdana; "&gt;In HDCP key establishes a shared secret key, using public and private keys of the devices, and will be used to encrypt communications between two devices.&lt;/span&gt;&lt;/span&gt; &lt;/p&gt;&lt;p align="Justify"&gt;&lt;span&gt;&lt;span class="text" style="font-size: 12px; color: rgb(0, 0, 0); font-family: Verdana; "&gt;But everyone knows and can see the master key can break HDCP key encryption key, according to Ed Felten, director of the Center for Information Technology Policy at the University of Princeton.&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;&lt;span style="background-color: rgb(230, 236, 249); "&gt;&lt;span class="text" style="font-size: 12px; color: rgb(0, 0, 0); font-family: Verdana; "&gt;"HDCP not guarantee that the participating devices are licensed, unlicensed devices because the manufacturer can use a keygen to create public and private key pairs correct," he wrote in a blog post.&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;&lt;span class="text" style="font-size: 12px; color: rgb(0, 0, 0); font-family: Verdana; "&gt;&lt;/span&gt;&lt;br /&gt;&lt;span&gt;&lt;span class="text" style="font-size: 12px; color: rgb(0, 0, 0); font-family: Verdana; "&gt;After nearly a decade, Danish cryptographer Niels Ferguson claimed to have found a way to avoid HDCP.&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;&lt;/p&gt;&lt;p&gt;&lt;/p&gt;&lt;p align="Justify"&gt;&lt;span&gt;&lt;span class="text" style="font-size: 12px; color: rgb(0, 0, 0); font-family: Verdana; "&gt;"If this master key is ever published, HDCP will provide no protection. Flaws in HDCP are not hard to find."&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;&lt;span&gt;&lt;span class="text" style="font-size: 12px; color: rgb(0, 0, 0); font-family: Verdana; "&gt;At that time, Ferguson said he has no intention to publish discoveries made because of fear of starting legal action against him.&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;&lt;span class="text" style="font-size: 12px; color: rgb(0, 0, 0); font-family: Verdana; "&gt;&lt;/span&gt;&lt;br /&gt;&lt;span&gt;&lt;span class="text" style="font-size: 12px; color: rgb(0, 0, 0); font-family: Verdana; "&gt;Intel says it will not be easy for anyone to use cheiele in practice, but said he would bring legal action, if necessary, to defend its intellectual property.&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;&lt;p&gt;&lt;/p&gt;&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;</description><thr:total xmlns:thr="http://purl.org/syndication/thread/1.0">0</thr:total></item><item><title>Interpol chief admits theft of identity on Facebook</title><link>http://itsyslog.blogspot.com/2010/10/interpol-chief-admits-theft-of-identity.html</link><category>Facebook</category><author>noreply@blogger.com (Unknown)</author><pubDate>Sun, 3 Oct 2010 06:39:00 -0700</pubDate><guid isPermaLink="false">tag:blogger.com,1999:blog-5748480205419307697.post-3756547539418211746</guid><description>&lt;span class="Apple-style-span" style="font-family: Verdana; font-size: 12px; color: rgb(0, 93, 206); -webkit-border-horizontal-spacing: 2px; -webkit-border-vertical-spacing: 2px; "&gt;The head of Interpol, Ronald Noble, has acknowledged that criminals have stolen their identity by creating two accounts in his name up.&lt;/span&gt;&lt;div&gt;&lt;span class="Apple-style-span" style="font-family: Verdana; font-size: 12px; color: rgb(0, 93, 206); -webkit-border-horizontal-spacing: 2px; -webkit-border-vertical-spacing: 2px; "&gt;&lt;span class="Apple-style-span" style="color: rgb(0, 0, 0); font-family: 'Times New Roman'; font-size: medium; "&gt;&lt;p align="Justify"&gt;&lt;span&gt;&lt;span class="text" style="font-size: 12px; color: rgb(0, 0, 0); font-family: Verdana; "&gt;Noble made the disclosure in the inaugural Interpol Information Security Conference in Hong Kong.&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;&lt;span&gt;&lt;span class="text" style="font-size: 12px; color: rgb(0, 0, 0); font-family: Verdana; "&gt;Given the anonymity of cyberspace, it might actually be one of the most dangerous threats we face, "said Noble.&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;&lt;/p&gt;&lt;p align="Justify"&gt;&lt;span&gt;&lt;span class="text" style="font-size: 12px; color: rgb(0, 0, 0); font-family: Verdana; "&gt;Interpol Incident Response Team discovered that one of the criminals use fake account to obtain information on a recent global operation led by Interpol.&lt;/span&gt;&lt;/span&gt; &lt;span&gt;&lt;span class="text" style="font-size: 12px; color: rgb(0, 0, 0); font-family: Verdana; "&gt;Operation Infra Red, which led to 130 arrests, was aimed at discovering criminals who fled from national jurisdictions.&lt;/span&gt;&lt;/span&gt; &lt;/p&gt;&lt;p align="Justify"&gt;&lt;span style="background-color: rgb(230, 236, 249); "&gt;&lt;span class="text" style="font-size: 12px; color: rgb(0, 0, 0); font-family: Verdana; "&gt;Analysts said the case shows the ease with which criminals can forge the identities of others in all forms of social media sites to steal information.&lt;/span&gt;&lt;/span&gt; &lt;/p&gt;&lt;p&gt;&lt;/p&gt;&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;</description><thr:total xmlns:thr="http://purl.org/syndication/thread/1.0">0</thr:total></item><item><title>Club3D grab sources</title><link>http://itsyslog.blogspot.com/2010/10/club3d-grab-sources.html</link><category>Club3D</category><category>power</category><category>PSU</category><author>noreply@blogger.com (Unknown)</author><pubDate>Sun, 3 Oct 2010 06:37:00 -0700</pubDate><guid isPermaLink="false">tag:blogger.com,1999:blog-5748480205419307697.post-7238218148131314387</guid><description>&lt;span class="Apple-style-span" style="font-family: Verdana; font-size: 11px; line-height: 15px; "&gt;&lt;p&gt;&lt;span&gt;Lately, more and more video cards and integrators have expanded.&lt;/span&gt; &lt;span&gt;And found motherboard and very good sources that addressed segments.&lt;/span&gt; &lt;span&gt;The last company to make such a move is Club3D.&lt;/span&gt; &lt;span&gt;They put the new series called sources Switching Power Supply, which began to be composed of five different models.&lt;/span&gt;&lt;span id="more-20928"&gt;&lt;/span&gt;&lt;/p&gt;&lt;p&gt;&lt;span&gt;They have power of 400 W, 600 W, 700 W, 850 W and 1000 W. The two sources that the smallest are cooled by a fan 120 mm, yellow LEDs, have modular design, are designed to work with one video card, and certified as 80 + power efficiency.&lt;/span&gt;&lt;/p&gt;&lt;p&gt;&lt;span&gt;The others are 80 + Bronze certificates have modular design, and are cooled by fans of 135 mm, blue for the top of the range (which can handle without problems up to three video cards) and green the rest (enough for two GPUs ).&lt;/span&gt;&lt;/p&gt;&lt;p&gt;&lt;span&gt;All protect any electrical anomaly, and offers two or four 12 V rail links and recommended prices remain but the exact date of launching a secret.&lt;/span&gt;&lt;/p&gt;&lt;/span&gt;</description><thr:total xmlns:thr="http://purl.org/syndication/thread/1.0">0</thr:total></item><item><title>PlayStation 3 Firmware 3.50</title><link>http://itsyslog.blogspot.com/2010/10/playstation-3-firmware-350.html</link><category>PlayStation 3</category><category>Sony</category><author>noreply@blogger.com (Unknown)</author><pubDate>Sun, 3 Oct 2010 06:34:00 -0700</pubDate><guid isPermaLink="false">tag:blogger.com,1999:blog-5748480205419307697.post-2998547122939031871</guid><description>&lt;span class="Apple-style-span" style="font-family: Verdana; font-size: 11px; line-height: 15px; "&gt;&lt;p&gt;&lt;/p&gt;&lt;p&gt;Sony has completed a new firmware 3.50 for their PlayStation 3 console. The most important additive is its support for Blu-Ray 3D. But the paucity of such content, quite expensive and compatible TVs will cancel almost completely the value of the firmware.&lt;/p&gt;&lt;p&gt;But besides 3D, 3.50 comes with a full integration of Facebook, which some game developers will be able to exploit their turn. Thus, the personal account can receive automatic updates of the game, such as new scores or records, screen shots, or whatever else you think of them. &lt;/p&gt;&lt;div&gt;&lt;br /&gt;&lt;/div&gt;&lt;p&gt;&lt;/p&gt;&lt;span&gt;&lt;br /&gt;&lt;/span&gt;&lt;/span&gt;</description><thr:total xmlns:thr="http://purl.org/syndication/thread/1.0">0</thr:total></item><item><title>XC Verbatim SecureDigital Memory Card 64GB Class 10</title><link>http://itsyslog.blogspot.com/2010/10/xc-verbatim-securedigital-memory-card.html</link><category>Verbatim</category><author>noreply@blogger.com (Unknown)</author><pubDate>Sun, 3 Oct 2010 06:29:00 -0700</pubDate><guid isPermaLink="false">tag:blogger.com,1999:blog-5748480205419307697.post-6772160085989523029</guid><description>&lt;span class="Apple-style-span" style="font-family: Tahoma; font-size: 12px; color: rgb(67, 67, 67); line-height: 15px; "&gt;&lt;span&gt;Verbatim is the next step in the Flash memory card with the new class SDXC 10 with a storage capacity of 64GB, according to a press release issued to the editor.&lt;/span&gt; &lt;span&gt;New Flash Card SDXC (SD Extended Capacity) is designed to menevra large amounts of data at incredible speeds and provides users with a fast and portable storage medium for their electronic devices such as mobile phones, camcorders, cameras or portable consoles.&lt;/span&gt;&lt;br /&gt;&lt;span&gt;"Users of digital cameras can do more shots per second than was possible before using this technology so that a shot at the gate in football can now be captured with a more advanced level of detail. In addition, users of cameras that moves towards the professional sector may find these cards SDXC perfect opportunity to record video at exactly the desired quality, "said Hans-Christoph Kaiser, Business Development Manager Verbatim Flash EUMEA.&lt;/span&gt;&lt;br /&gt;&lt;span&gt;&lt;b&gt;Compatible with host SDXC products&lt;/b&gt;&lt;/span&gt;&lt;br /&gt;&lt;span&gt;SDXC Verbatim 64GB memory card class 10 is compatible with Windows 7, Vista and XP and works in products enjoy the latest technology SDXC.&lt;/span&gt; &lt;span&gt;While SD and SDHC cards can be used SDXC slots, cards may be used only SDXC profusele SDXC compatible host.&lt;/span&gt; &lt;span style="background-color: rgb(230, 236, 249); "&gt;For PC or laptop, users must download a compatible driver SDXC SD slot available from Microsoft Download Center.&lt;/span&gt;&lt;/span&gt;</description><thr:total xmlns:thr="http://purl.org/syndication/thread/1.0">0</thr:total></item><item><title>About the actual safety of children in a digital world</title><link>http://itsyslog.blogspot.com/2010/10/about-actual-safety-of-children-in.html</link><category>children safety</category><author>noreply@blogger.com (Unknown)</author><pubDate>Sun, 3 Oct 2010 06:24:00 -0700</pubDate><guid isPermaLink="false">tag:blogger.com,1999:blog-5748480205419307697.post-6716727161361421691</guid><description>&lt;span class="Apple-style-span" style="font-family: Arial, Tahoma, Verdana, Helvetica, sans-serif; font-size: 12px; color: rgb(78, 78, 78); "&gt;&lt;p style="clear: both; float: none; margin-bottom: 10px; text-align: justify; "&gt;&lt;span style="display: block; border-top-style: none; border-right-style: none; border-bottom-style: none; border-left-style: none; border-width: initial; border-color: initial; "&gt;Currently, more and more children are masters of using the Internet, a world that started out as designed by adults for adults.&lt;/span&gt;&lt;span style="display: block; border-top-style: none; border-right-style: none; border-bottom-style: none; border-left-style: none; border-width: initial; border-color: initial; "&gt;How about this twist?&lt;/span&gt;&lt;/p&gt;&lt;p style="clear: both; float: none; margin-bottom: 10px; text-align: justify; "&gt;&lt;span style="display: block; border-top-style: none; border-right-style: none; border-bottom-style: none; border-left-style: none; border-width: initial; border-color: initial; "&gt;Most researchers, professionals and ordinary users say without second thoughts: Yes, let's leave the children on the Internet.&lt;/span&gt;&lt;span style="display: block; border-top-style: none; border-right-style: none; border-bottom-style: none; border-left-style: none; border-width: initial; border-color: initial; "&gt;They are sure that such things can teach us, it will develop and master the art of virtual communication.&lt;/span&gt;&lt;span style="display: block; border-top-style: none; border-right-style: none; border-bottom-style: none; border-left-style: none; border-width: initial; border-color: initial; "&gt;All this resulted in the creation of an Internet "child", which is considered "safe" - a dedicated area, similar to a play area specially designed real world, where they can talk to their friends and where they can play together.&lt;/span&gt;&lt;span style="display: block; border-top-style: none; border-right-style: none; border-bottom-style: none; border-left-style: none; border-width: initial; border-color: initial; "&gt;Similarly, there are sites online versions of books for kids: stories, poems, educational books and even coloring books can be found on the "shelves" virtual library.&lt;/span&gt;&lt;/p&gt;&lt;p style="clear: both; float: none; margin-bottom: 10px; text-align: justify; "&gt;&lt;span style="display: block; border-top-style: none; border-right-style: none; border-bottom-style: none; border-left-style: none; border-width: initial; border-color: initial; "&gt;I think we should all ask ourselves some basic questions: Is the Internet really safe for children?&lt;/span&gt;&lt;span style="display: block; border-top-style: none; border-right-style: none; border-bottom-style: none; border-left-style: none; border-width: initial; border-color: initial; "&gt;Parents can trust the developers that guarantees safety web pages they have created for them?&lt;/span&gt;&lt;span style="display: block; border-top-style: none; border-right-style: none; border-bottom-style: none; border-left-style: none; border-width: initial; border-color: initial; "&gt;Whatever the answers, we must have regard to the threats which threaten both the children and their parents, even when browsing the Internet supposedly secure pages.&lt;/span&gt;&lt;/p&gt;&lt;p style="clear: both; float: none; margin-bottom: 10px; text-align: justify; "&gt;&lt;span style="display: block; border-top-style: none; border-right-style: none; border-bottom-style: none; border-left-style: none; border-width: initial; border-color: initial; "&gt;Here's a typical situation: let your child play alone in special places that you know him so well.&lt;/span&gt;&lt;span style="display: block; border-top-style: none; border-right-style: none; border-bottom-style: none; border-left-style: none; border-width: initial; border-color: initial; "&gt;After several hours, crying and no favorite toy back that was stolen by a person devoid of any civic sense.&lt;/span&gt;&lt;/p&gt;&lt;p style="clear: both; float: none; margin-bottom: 10px; text-align: justify; "&gt;&lt;span style="display: block; border-top-style: none; border-right-style: none; border-bottom-style: none; border-left-style: none; border-width: initial; border-color: initial; "&gt;Attackers may even be fellow child, older children or teenagers bent on bad jokes.&lt;/span&gt;&lt;span style="display: block; border-top-style: none; border-right-style: none; border-bottom-style: none; border-left-style: none; border-width: initial; border-color: initial; "&gt;Unfortunately, none of the digital world of social networks is less protected from such antisocial behavior.&lt;/span&gt;&lt;span style="display: block; border-top-style: none; border-right-style: none; border-bottom-style: none; border-left-style: none; border-width: initial; border-color: initial; "&gt;A rude word's "wall", an insulting message on a homepage, these are all minor inconvenience that can easily upset a baby. Is all the worse when an adult person who is offended. Social networks, forums and chats are ideal platforms for pedophiles posing as respectable members of society and whose victims are children.&lt;/span&gt;&lt;/p&gt;&lt;p style="clear: both; float: none; margin-bottom: 10px; text-align: justify; "&gt;&lt;span style="display: block; border-top-style: none; border-right-style: none; border-bottom-style: none; border-left-style: none; border-width: initial; border-color: initial; "&gt;It is often a child to trust his friends more virtual than real ones.&lt;/span&gt;&lt;span style="display: block; border-top-style: none; border-right-style: none; border-bottom-style: none; border-left-style: none; border-width: initial; border-color: initial; "&gt;This can result in specific meetings with the "best friends", without parents even knowing about it. This fits like a glove for pedophiles - they try to gain the trust of the child in order to establish a meeting with him without parents or family to know.&lt;/span&gt;&lt;/p&gt;&lt;p style="clear: both; float: none; margin-bottom: 10px; text-align: justify; "&gt;&lt;span style="display: block; border-top-style: none; border-right-style: none; border-bottom-style: none; border-left-style: none; border-width: initial; border-color: initial; "&gt;&lt;strong&gt;Warning!&lt;/strong&gt;&lt;/span&gt;&lt;span style="display: block; border-top-style: none; border-right-style: none; border-bottom-style: none; border-left-style: none; border-width: initial; border-color: initial; "&gt;&lt;strong&gt;Crazy ideas!&lt;/strong&gt;&lt;/span&gt;&lt;/p&gt;&lt;p style="clear: both; float: none; margin-bottom: 10px; text-align: justify; "&gt;&lt;span style="display: block; border-top-style: none; border-right-style: none; border-bottom-style: none; border-left-style: none; border-width: initial; border-color: initial; "&gt;Sometimes, the children of the most wacky ideas regarding what they want to do or buy.&lt;/span&gt;&lt;span style="display: block; border-top-style: none; border-right-style: none; border-bottom-style: none; border-left-style: none; border-width: initial; border-color: initial; "&gt;No wonder that they ask parents and money to implement them.&lt;/span&gt;&lt;/p&gt;&lt;p style="clear: both; float: none; margin-bottom: 10px; text-align: justify; "&gt;&lt;span style="display: block; border-top-style: none; border-right-style: none; border-bottom-style: none; border-left-style: none; border-width: initial; border-color: initial; "&gt;Many sites do not give children back from receiving income from banners placed in different social networks.&lt;/span&gt;&lt;span style="display: block; border-top-style: none; border-right-style: none; border-bottom-style: none; border-left-style: none; border-width: initial; border-color: initial; "&gt;One of the four sites containing child Banner "Ads by Google." Ads can focus on any word on a page, the most popular being those relating to "education" and in this way, criminals can hope that convince children that they need an education grant for non-existent or that can learn, for example, about hypnosis, buying a CD "with only $ 50.&lt;/span&gt;&lt;/p&gt;&lt;p style="clear: both; float: none; margin-bottom: 10px; text-align: justify; "&gt;&lt;span style="display: block; border-top-style: none; border-right-style: none; border-bottom-style: none; border-left-style: none; border-width: initial; border-color: initial; "&gt;In addition to banners, children's sites may contain advertisements and other spam, for example, a message to a user who just registered on site or at a guess where this is possible.&lt;/span&gt;&lt;span style="display: block; border-top-style: none; border-right-style: none; border-bottom-style: none; border-left-style: none; border-width: initial; border-color: initial; "&gt;Usually, these messages contain an external link that leads to dangerous or pornographic websites.&lt;/span&gt;&lt;br /&gt;&lt;span style="display: block; border-top-style: none; border-right-style: none; border-bottom-style: none; border-left-style: none; border-width: initial; border-color: initial; "&gt;Of course, children's forums, social networks and blogs have moderators whose job is to monitor the content.&lt;/span&gt;&lt;span style="display: block; border-top-style: none; border-right-style: none; border-bottom-style: none; border-left-style: none; border-width: initial; border-color: initial; "&gt;However, this is not a solution - moderators can not check every message.&lt;/span&gt;&lt;/p&gt;&lt;p style="clear: both; float: none; margin-bottom: 10px; text-align: justify; "&gt;&lt;span style="display: block; border-top-style: none; border-right-style: none; border-bottom-style: none; border-left-style: none; border-width: initial; border-color: initial; "&gt;&lt;strong&gt;"Microbes" should be kept apart&lt;/strong&gt;&lt;/span&gt;&lt;/p&gt;&lt;p style="clear: both; float: none; margin-bottom: 10px; text-align: justify; "&gt;&lt;span style="display: block; border-top-style: none; border-right-style: none; border-bottom-style: none; border-left-style: none; border-width: initial; border-color: initial; "&gt;Dirt touching an open wound on the finger of a child may cause tetanus.&lt;/span&gt;&lt;span style="display: block; border-top-style: none; border-right-style: none; border-bottom-style: none; border-left-style: none; border-width: initial; border-color: initial; "&gt;Similarly, the Internet, in general, and sites for children, in particular, can cause "infection" of all kinds.&lt;/span&gt;&lt;/p&gt;&lt;p style="clear: both; float: none; margin-bottom: 10px; text-align: justify; "&gt;&lt;span style="display: block; border-top-style: none; border-right-style: none; border-bottom-style: none; border-left-style: none; border-width: initial; border-color: initial; "&gt;Daily, our detectors identify the virus about 20 sites for children infected with malware.&lt;/span&gt;&lt;span style="display: block; border-top-style: none; border-right-style: none; border-bottom-style: none; border-left-style: none; border-width: initial; border-color: initial; "&gt;Some of these sites offer goods to children, but most educational sites or games, more than 100 hits daily.&lt;/span&gt;&lt;/p&gt;&lt;p style="clear: both; float: none; margin-bottom: 10px; text-align: justify; "&gt;&lt;span style="display: block; border-top-style: none; border-right-style: none; border-bottom-style: none; border-left-style: none; border-width: initial; border-color: initial; "&gt;If your PC is not protected by a security solution, you put your child in danger by giving them permission to surf the Internet.&lt;/span&gt;&lt;/p&gt;&lt;p style="clear: both; float: none; margin-bottom: 10px; text-align: justify; "&gt;&lt;span style="display: block; border-top-style: none; border-right-style: none; border-bottom-style: none; border-left-style: none; border-width: initial; border-color: initial; "&gt;Warning of the existence of pedophiles and child in the way they operate is the main way to protect them from danger.&lt;/span&gt;&lt;span style="display: block; border-top-style: none; border-right-style: none; border-bottom-style: none; border-left-style: none; border-width: initial; border-color: initial; "&gt;However, that does not guarantee assistance in the event of malware: abuse may enter the system through any software vulnerabilities.&lt;/span&gt;&lt;/p&gt;&lt;p style="clear: both; float: none; margin-bottom: 10px; text-align: justify; "&gt;&lt;span style="display: block; border-top-style: none; border-right-style: none; border-bottom-style: none; border-left-style: none; border-width: initial; border-color: initial; "&gt;It is important to keep in mind that any site can be looted by hackers, which means that any security solution installed on your PC must be enabled, even when seemingly innocuous baby visiting resources.&lt;/span&gt;&lt;/p&gt;&lt;p style="clear: both; float: none; margin-bottom: 10px; text-align: justify; "&gt;&lt;span style="display: block; border-top-style: none; border-right-style: none; border-bottom-style: none; border-left-style: none; border-width: initial; border-color: initial; "&gt;&lt;strong&gt;Conclusions&lt;/strong&gt;&lt;/span&gt;&lt;/p&gt;&lt;p style="clear: both; float: none; margin-bottom: 10px; text-align: justify; "&gt;&lt;span style="display: block; border-top-style: none; border-right-style: none; border-bottom-style: none; border-left-style: none; border-width: initial; border-color: initial; "&gt;Therefore, we allow children to surf the Internet?&lt;/span&gt;&lt;span style="display: block; border-top-style: none; border-right-style: none; border-bottom-style: none; border-left-style: none; border-width: initial; border-color: initial; "&gt;Whatever one says, the answer must be yes, because children need to know about how to communicate in the virtual world, as well as the real one.&lt;/span&gt;&lt;span style="display: block; border-top-style: none; border-right-style: none; border-bottom-style: none; border-left-style: none; border-width: initial; border-color: initial; "&gt;In addition, opportunities to gain knowledge about the world and the amount of information available on the Internet are endless.&lt;/span&gt;&lt;span style="display: block; border-top-style: none; border-right-style: none; border-bottom-style: none; border-left-style: none; border-width: initial; border-color: initial; "&gt;Preventing child to surf the Internet, adults are not only deprive him of access to the largest information resource in the world.&lt;/span&gt;&lt;/p&gt;&lt;p style="clear: both; float: none; margin-bottom: 10px; text-align: justify; "&gt;&lt;span style="display: block; border-top-style: none; border-right-style: none; border-bottom-style: none; border-left-style: none; border-width: initial; border-color: initial; background-color: rgb(230, 236, 249); "&gt;A fairer question would be: "You should leave them unsupervised children to surf the Internet?" Who should be the first to help their first experience in this world? Parents, of course! We did not allow us to let children wandering alone in a big city, because we are aware of the dangers that threaten them. So we should proceed and the Internet, "one world" even more than the real and whose borders are entirely absent.&lt;/span&gt;&lt;span style="display: block; border-top-style: none; border-right-style: none; border-bottom-style: none; border-left-style: none; border-width: initial; border-color: initial; "&gt;In general, we are with our children only when their first steps on this land.&lt;/span&gt;&lt;span style="display: block; border-top-style: none; border-right-style: none; border-bottom-style: none; border-left-style: none; border-width: initial; border-color: initial; "&gt;But the minute we realize that they are doing, we think that our mission is closed.&lt;/span&gt;&lt;span style="display: block; border-top-style: none; border-right-style: none; border-bottom-style: none; border-left-style: none; border-width: initial; border-color: initial; "&gt;However, this is only the beginning - the children are very naive and gullible, can not properly assess situations and, moreover, are very easily hurt.&lt;/span&gt;&lt;span style="display: block; border-top-style: none; border-right-style: none; border-bottom-style: none; border-left-style: none; border-width: initial; border-color: initial; "&gt;If I browse online with our children, we put an end to many problems.&lt;/span&gt;&lt;span style="display: block; border-top-style: none; border-right-style: none; border-bottom-style: none; border-left-style: none; border-width: initial; border-color: initial; "&gt;But we must regard that a boy or a girl of 10-12 years now wants a little privacy during the communication with virtual friends.&lt;/span&gt;&lt;span style="display: block; border-top-style: none; border-right-style: none; border-bottom-style: none; border-left-style: none; border-width: initial; border-color: initial; "&gt;Therefore, more recently, the burden of our parents, is to help and support them in difficult situations.&lt;/span&gt;&lt;span style="display: block; border-top-style: none; border-right-style: none; border-bottom-style: none; border-left-style: none; border-width: initial; border-color: initial; "&gt;Children will be glad to know how to surf safely online, how to avoid the dangers, but most importantly, they feel protected knowing that there will be someone ready to answer their questions when they need it.&lt;/span&gt;&lt;span style="display: block; border-top-style: none; border-right-style: none; border-bottom-style: none; border-left-style: none; border-width: initial; border-color: initial; "&gt;And this support must come from our parents&lt;/span&gt;&lt;/p&gt;&lt;/span&gt;</description><thr:total xmlns:thr="http://purl.org/syndication/thread/1.0">0</thr:total></item><item><title>Stuxnet a sophisticated cyber attack and unique in the world</title><link>http://itsyslog.blogspot.com/2010/10/stuxnet-sophisticated-cyber-attack-and.html</link><category>exploits</category><category>Kaspersky</category><category>Stuxnet</category><author>noreply@blogger.com (Unknown)</author><pubDate>Sun, 3 Oct 2010 06:18:00 -0700</pubDate><guid isPermaLink="false">tag:blogger.com,1999:blog-5748480205419307697.post-2532225324452793406</guid><description>&lt;div&gt;The latest worm attack Stuxnet has generated much discussion and speculation concerning the purpose, intent, origins, and - most importantly - the identity of the attacker and the target.&lt;/div&gt;&lt;div&gt;Kaspersky Lab has no evidence to identify the attackers or their target, but experts can confirm that this company is a very sophisticated attack and unique in the IT industry, prepared by a team of cyber criminals with extensive knowledge of SCADA technology. Kaspersky Lab believes that this type of attack can not be achieved without the support of state officials. &lt;/div&gt;&lt;div&gt;"I think we have reached a turning point because we face a new world, a new approach to cyber crime," said Eugene Kaspersky, CEO and co-founder of Kaspersky Lab. "Cyber criminals in the past were only now realize with fear as we approach an era of cyber terrorism, sophisticated weapons and cyber warfare," he completes. &lt;/div&gt;&lt;div&gt;In a speech at the event Kaspersky Security Symposium in front of journalists in Munich, Germany, E. Kaspersky Stuxnet compared with the opening of Pandora's Box. &lt;/div&gt;&lt;div&gt;"This malicious program was not designed to steal money, send spam or steal personal data, but to sabotage the production enterprise to destroy the industrial system. Note that this is the beginning of a new era. The '90s were marked by cyber vandalism, the 2000s decade meant cyber crime, and now we approach the cyber terrorism and wars, "Kaspersky added. &lt;/div&gt;&lt;div&gt;Kaspersky Lab researchers independently discovered that Stuxnet worm exploits vulnerabilities four zero-day "in Microsoft Windows. Two of these security breaches were reported directly to Microsoft, Kaspersky Lab experts collaborating extensively with the U.S. software maker to create and release security patches for your operating system. &lt;/div&gt;&lt;div&gt;Besides the exploitation of four vulnerabilities Stuxnet used two valid digital certificates, stolen from Realtek and JMicron, who helped cybercriminals to hide this malware in the system for a long time. &lt;/div&gt;&lt;div&gt;The worm tries to access and reprogram the industrial control systems, aiming systems SCADA (Supervisory Control and Data Acquisition) Siemens products, namely Simatic WinCC. They are used to monitor and manage infrastructure and production. Similar systems are widely used on oil rigs, power, communication range of platforms in airports, on ships and even the military. &lt;/div&gt;&lt;div&gt;Advanced knowledge of industrial control systems, sophisticated attack on several levels, the use of vulnerability "zero-day" and theft of digital certificates valid and have led experts to declare that Stuxnet Kaspersky Lab was created by a team of highly professional experience, who possess vast resources and financial support. &lt;/div&gt;&lt;div&gt;target attack and geographical location in which he appeared (initially Iran) suggests that it was not initiated by any group of cyber criminals. Additionally, Kaspersky Lab experts who analyzed the worm's claim that the main purpose was spying Stuxnet infected systems, but to initiate an act of sabotage. All these indications show that Stuxnet worm development was supported by officials of a State which has powerful and valuable information. &lt;/div&gt;&lt;div&gt;Kaspersky Lab believes that cyber weapons Stuxnet is a prototype, which will lead to the creation of new tools very dangerous attack. This time, the world is facing a cyber arms race. &lt;/div&gt;&lt;div&gt;&lt;br /&gt;&lt;/div&gt;</description><thr:total xmlns:thr="http://purl.org/syndication/thread/1.0">0</thr:total></item><item><title>After attacks, Microsoft is rushing to fix the bug ASP.net</title><link>http://itsyslog.blogspot.com/2010/10/after-attacks-microsoft-is-rushing-to.html</link><category>ASP</category><category>Microsoft</category><author>noreply@blogger.com (Unknown)</author><pubDate>Sun, 3 Oct 2010 06:11:00 -0700</pubDate><guid isPermaLink="false">tag:blogger.com,1999:blog-5748480205419307697.post-3921276121528003925</guid><description>&lt;div&gt;Microsoft rushes to release a solution for a flaw in Windows Web server that has begun to be exploited in online attacks.&lt;/div&gt;&lt;div&gt;Patch fix a bug in Windows ASP.net technology used in Microsoft's servers. Microsoft says it has seen limited exploitation of online attacks escape, but the problem is serious enough that the company decide to speed up launch of resolution, before or regular update scheduled for October 12. &lt;/div&gt;&lt;div&gt;ASP.net is used to build Web applications and bug gives hackers a way to gain access to protected files or read encrypted data sent by a server application ASP.net. Earlier this month, researchers have demonstrated how an attack can be used to steal session cookies, or possibly encrypted user names and passwords on websites. &lt;/div&gt;&lt;div&gt;Microsoft occasionally updates issue such out-of-band when he discovers a serious security problem, but this release is different. For starters, Microsoft will launch initially only patch Microsoft Download Center - generally used by large organizations that want to test patches before installing them manually within the company. &lt;/div&gt;&lt;div&gt;"It allows them to get the update as soon as possible, allowing administrators and end users who want to manually install this security update, to test him and to update their systems immediately," Microsoft said in a posting Monday blog announcing the update. "We encourage these customers to visit the Download Center to download the update, to test their environment and apply it as soon as possible." &lt;/div&gt;&lt;div&gt;For most of the customers who rely on automatic updates, the patch will be released in a few days. Consumers are not vulnerable to this bug, unless you run a web server on their computers. &lt;/div&gt;</description><thr:total xmlns:thr="http://purl.org/syndication/thread/1.0">0</thr:total></item></channel></rss>