go to sections menu

The Technology blog and podcast

This is for the technology blog and podcast Commentary, articles, and podcasts

header picture for Ingegno theme

You are here: February 2012

Go to Homepage [0], contents or to navigation menu



Oops! HTML5 Does It Again

This is quite interesting. Never heard of this company or technology that is discussed in this article. I’d be interested in whether it would work. Check this article out, and leave your thoughts.

Oops! HTML5 Does It Again.

Comments Off on Oops! HTML5 Does It Again

French Court Fails Digital Economics; Claims Free Google Maps Is Illegal | Techdirt

French Court Fails Digital Economics; Claims Free Google Maps Is Illegal | Techdirt.

Comments Off on French Court Fails Digital Economics; Claims Free Google Maps Is Illegal | Techdirt

KPN: The stolen data that wasn’t and the 8 year-old that was to blame. » CounterMeasures

KPN: The stolen data that wasn’t and the 8 year-old that was to blame. » CounterMeasures.

Comments Off on KPN: The stolen data that wasn’t and the 8 year-old that was to blame. » CounterMeasures

VTT tests talking product packaging • NFC World

The only question I have on the following article is which phone(s) will this work with? This article didn’t say, but interesting concept.

VTT tests talking product packaging • NFC World.

Comments Off on VTT tests talking product packaging • NFC World

Tribler Makes BitTorrent Impossible to Shut Down | TorrentFreak

The talk of torrents and what will happen if more sites go off line has been in the news as of late, especially after mega upload’s forced shut down. I’m a few days behind on torrent freak’s RSS feed and saw this at the top of the feed that i have. What do you guys think of this? I think it is an interesting idea. A link for a download is provided within this article.

Tribler Makes BitTorrent Impossible to Shut Down | TorrentFreak.

Comments Off on Tribler Makes BitTorrent Impossible to Shut Down | TorrentFreak

Technology podcast 167 for February 12, 2012: three kinds of attack, anonymous, and more

RSS


The technology blog and podcast, podcast 167 for February 12, 2012: has several different segments for you.

  1. Three kinds of attack by Mikko Hypoen: a great video as usual, and quite interesting.
  2. The Hacker is Watching Every online scam begins more or less the same—a random e-mail, a sketchy attachment. we read the whole article and talk about with my segment.
  3. anonymous takes down the CIA this is quite interesting. I can’t believe what these guys are doing.
  4. The blog: what has been posted and contact information to round this out.

This is a great podcast, lasting an hour 20 minutes. Feel free to comment on what you hear by contacting me.

Comments Off on Technology podcast 167 for February 12, 2012: three kinds of attack, anonymous, and more

Iran government cuts off internet access as hardline regime makes a stand | Mail Online

Don’t these people learn that shutting off the Internet isn’t the solution? They learned that with Egypt, because telephone lines were used to dial in and tweet that way. Technology is going to win in things like this, if people are not happy, then we should do what it takes to tell government. Government doesn’t like that too much. Check this story out.

Iran government cuts off internet access as hardline regime makes a stand | Mail Online.

Comments Off on Iran government cuts off internet access as hardline regime makes a stand | Mail Online

Microsoft Ruining Valentine’s Day with Nine Security Bulletins | PCWorld Business Center

Well, here’s something to ruin Valentine’s Day if you are in to this kind of thing. 9 updates isn’t bad, but its been worse. Check this artiecle from Tony out, and get educated.

Microsoft Ruining Valentine’s Day with Nine Security Bulletins | PCWorld Business Center.

Comments Off on Microsoft Ruining Valentine’s Day with Nine Security Bulletins | PCWorld Business Center

Window-Eyes 7.5.3 is now available!

Greetings,

GW Micro is proud to announce the release of Window-Eyes 7.5.3. This version includes a number of stability improvements, native support for QT-based programs, support for the new Braille Edge display from HIMS, and Windows Live Mail and Thunderbird improvements. For a detailed list of all Window-Eyes 7.5.3 features and enhancements, visit http://www.gwmicro.com/Window-Eyes/Latest_Features/.

If you own a copy of Window-Eyes 7.5, 7.5.1, or 7.5.2, you may download an upgrade to Window-Eyes 7.5.3 for FREE. To get started, select the Check for Updates option from the Help menu in the Window-Eyes control panel. Alternatively, you can open a web browser and navigate to http://www.gwmicro.com/upgrade, enter your serial number in the edit box provided, and select the Check for Upgrades button.

If you prefer to obtain a CD version of Window-Eyes 7.5.3 for $20 (free shipping with US postal mail), you may do so by contacting our orders department at 260-489-3671, or via email at orders@gwmicro.com.

All Retail, Dongle, Everlock, Payment Plan, and Evaluation versions of Window-Eyes 7.5, 7.5.1, and 7.5.2 (for both 32-bit and 64-bit operating systems) can be upgraded to Window-Eyes 7.5.3.

Upgrade pricing information for older versions of Window-Eyes can be found at http://www.gwmicro.com/Catalog/Upgrades/.

Be sure to follow us on Twitter (http://twitter.com/#!/GWMicro) and Facebook (http://www.facebook.com/pages/GW-Micro-Inc/63367531676) for the latest news and updates.

Enjoy!

Comments Off on Window-Eyes 7.5.3 is now available!

Cars’ high-tech gadgets vulnerable to hacking

I saw a bit on this car hacking thing last year, but this article is right, if they start with the CD infecting stuff, anything can happen if the hackers put their minds to it.

Cars’ high-tech gadgets vulnerable to hacking.

Comments Off on Cars’ high-tech gadgets vulnerable to hacking

Infostealer.Offsupload: 20,000+ Archives Containing Stolen Data Uploaded to Third Party File-Sharing Site | Symantec Connect Community

Interesting blog post here folks, something to be aware of.

Infostealer.Offsupload: 20,000+ Archives Containing Stolen Data Uploaded to Third Party File-Sharing Site | Symantec Connect Community.

Comments Off on Infostealer.Offsupload: 20,000+ Archives Containing Stolen Data Uploaded to Third Party File-Sharing Site | Symantec Connect Community

A broadband company wanting to make a difference, isn’t it about time?

Hey! Someone wanted to pass along a site called o2broadband which by the looks of it, wants to make broadband affordable, and worth while. This looks like it is a U.K. based company, contact information is available on the site. The site is reasonably accessible, and they have contact information for everyone. If you’re still on dialup, and you’re looking for a btroadband choice, give this company a look. Thanks for visiting.

Comments Off on A broadband company wanting to make a difference, isn’t it about time?

Malicious Mobile Apps Found in Server Hosted in Germany | Malware Blog | Trend Micro

We will not see the end of this, but see this post from Trend Micro about this latest one.

Malicious Mobile Apps Found in Server Hosted in Germany | Malware Blog | Trend Micro.

Comments Off on Malicious Mobile Apps Found in Server Hosted in Germany | Malware Blog | Trend Micro

Microsoft offloads some speech-focused assets, employees to 24/7 | ZDNet

You don’t hear too much about tell me, so here is some news that might interest some of you. Since this goes out to my twitter feed through WP Tweeter, I assume I’ll get some retweets of this. Hopefully, some comments. If you want them aired, E-mail me at tech at menvi dot org, and I look forward to your responses. Register for the blog and comment if you wish.

Microsoft offloads some speech-focused assets, employees to 24/7 | ZDNet.

Comments Off on Microsoft offloads some speech-focused assets, employees to 24/7 | ZDNet

Elite Anti-Terror Police Went After Megaupload’s Kim Dotcom | TorrentFreak

This is getting stranger by the day. Check this article out.

Elite Anti-Terror Police Went After Megaupload’s Kim Dotcom | TorrentFreak.

Comments Off on Elite Anti-Terror Police Went After Megaupload’s Kim Dotcom | TorrentFreak

You Can’t Copyright Porn, Harassed BitTorrent Defendant Insists | TorrentFreak

This is just right stupid. No proof of fact, should be thrown out, check this out.

You Can’t Copyright Porn, Harassed BitTorrent Defendant Insists | TorrentFreak.

Comments Off on You Can’t Copyright Porn, Harassed BitTorrent Defendant Insists | TorrentFreak

Defendant Ordered to Decrypt Laptop May Have Forgotten Password | Threat Level | Wired.com

This article is interesting, and raises some interesting questions. What do you think of this?

Defendant Ordered to Decrypt Laptop May Have Forgotten Password | Threat Level | Wired.com.

Comments Off on Defendant Ordered to Decrypt Laptop May Have Forgotten Password | Threat Level | Wired.com

GW Micro Announces “How Do I Do That?” Series

GW Micro Announces “How Do I Do That?” Series

Feb-6-2012

FOR IMMEDIATE RELEASE

Fort Wayne, Indiana (February 6, 2012) – GW Micro, Inc. (www.gwmicro.com) announced a new “How To” series of free video tutorials entitled “How Do I Do That?” These high quality tutorials are designed to be concise, informative and fully accessible to a blind or visually impaired computer user as all of the instructional content is available via audio.

To enable sighted trainers, teachers, friends, family, IT professionals, colleagues, and others to be able to better utilize Window-Eyes or to assist Window-Eyes users, the videos also contain special effects to help sighted individuals better understand how to interact with Window-Eyes as well as to visually highlight what the audio is describing on the computer screen. For example, when a hotkey combination is pressed, the video portion of the production will display the hotkey combination making it easier for sighted individuals to follow along with the tutorials.

The audio portion of How Do I Do That? is completely accessible to a blind user, and is designed to help a blind or visually impaired person easily follow along with each step of the tutorial. Typically, each How Do I Do That? production is less than ten minutes and typically focuses on one specific skill or concept. This free educational series will allow anyone who is interested to quickly find the skill they are interested in, and then learn about how to perform that skill by watching the step-by-step tutorial.

The How Do I Do That? series begins with the release of the first production, which demonstrates how to attach a file to an email in Outlook 2010 using Window-Eyes. Please stay tuned as more tutorials will be coming soon. The How Do I Do That? series of video tutorials can be accessed at http://www.gwmicro.com/Training/Tutorials/.

Contact:
Jeremy Curry, Director of Training
jeremy@gwmicro.com
(260) 489-3671

###

Comments Off on GW Micro Announces “How Do I Do That?” Series

Twitter users targets of social spear phishing

Going through the backlog, and found this to be of interest to you guys. Comments are welcome.

Twitter users targets of social spear phishing.

Comments Off on Twitter users targets of social spear phishing

Technology podcast 166 for February 2, 2012: freshbooks, the blog, and defcon 19: the history of viruses

RSS feed of the podcast for your convenience.

Technology podcast 166, February 2, 2012, deals with three items today.

  1. Freshbooks and their support system in regards to your account
  2. Blog update including Hims news for the sense notetakers version 6.2
  3. The History and the Evolution of Computer Viruses a facinating talk by Mikko Hypoen of fsecure

    who has been in the security news for many many years.

We hope you enjoy the podcast, which is 87 minutes. Please stay tuned for more content right here, when we do another podcast coming soon.

Comments Off on Technology podcast 166 for February 2, 2012: freshbooks, the blog, and defcon 19: the history of viruses

« Newer PostsOlder Posts »

go to sections menu


navigation menu

go to sections menu