Sunday, April 15, 2007

Weekend Reading

Who's behind the criminal botnet networks ?

They have infected perhaps 100 million computers with viruses, turning the PCs around the world into an army of willing criminal assistants known as “bots.” They are using those PCs to send out billions of spam e-mails and make millions of dollars by attacking Web sites and extorting their owners. They have even attacked the core computers that keep the Internet running smoothly. Who are they?

Take a look HERE.
==================================================================
Windows XP OS is really quite a crock

It's amazing that Microsoft built-in a disk defragger into Windows XP, but it didn't get around to building an operating system defragger.

After a while, XP starts to get slow as programs accumulate and finally you're left wondering why it takes a couple of minutes to boot up, with other times watching the hard disk start thrashing around as it swaps between processes.

Take a look HERE.

==================================================================
Harvesting Teenagers

Tagged is one in a flood of new social networking sites targeting teenagers. They're all MySpace wannabees, and perhaps some of them are harmless, but I'm going to focus on Tagged. It first got my attention several weeks ago when I got about six e-mails in rapid succession from her. They were obviously auto-generated invites to join a site and said :

Take a look HERE.

==================================================================
Is the 'Web OS' just a geek's dream?

A decade-old concept of moving a desktop computer's everyday tasks onto the Web is gaining steam. The idea of treating the Web like an operating system--and loosening dependence on Windows desktop applications--dates back to the Netscape browser's debut in the mid-1990s.

Take a look HERE.

==================================================================
Better, More Accurate Image Search

By modifying a common type of machine-learning technique, researchers have found a better way to identify pictures. Researchers at the University of California, San Diego (UCSD), have developed a new image-search method that they claim outperforms existing approaches "by a significant margin" in terms of accuracy and efficiency.

Take a look HERE.

==================================================================
Why Microsoft is under assault

Why is it that very few large IT players are immune from antitrust attack? Are they simply unable to comport themselves with the law? Or is this regulatory trend indicative of governmental lack of faith in the very engine that has created sustained economic growth and innovation in the IT sector: the free market?

Take a look HERE.

==================================================================
Underground Hacking in Australia

This subject is both near and dear to my heart. I just finished reading this online book about the Hacking community in Australia and around the world. It mostly covers Australia but also America and England.

Take a look HERE.

==================================================================
Critical WiFi Bug Found on Linux


A researcher from France Telecom has discovered the first remotely exploitable 802.11 WiFi bug on a Linux machine. The kernel stack-overflow bug, which is in the open-source MadWiFi Linux kernel device driver, lets an attacker run their malicious code remotely on an infected machine -- and the infected machine doesn't even have to be on a WiFi network to get "owned."

Take a look HERE.

==================================================================
The future of high end PC cooling revealed

Many younger readers might not be aware that, once upon a time, there was such a great, environment-friendly age when even the fastest PC CPUs didn't have any fans. Not even heat sinks even when running full blast. Well, that golden or rather green age ended with Intel's 486DX2.

Take a look HERE.

==================================================================
The Myth of Apple's Insecurities

If an OS is built on shaky ground, everything layered on top will suffer. This is the position that Microsoft is in now. Apple was in this very position at the end of the last century. They decided to start over, providing a clear upgrade path and supporting legacy applications on the new platform.

Take a look HERE.

0 Comments:

Post a Comment

<< Home