Category: software piracy?
04/26/06 07:26 - 47ºF - ID#21550
Microsoft to nag pirate WinXP users
I wonder how many people who thought they had legal copies of WinXP will find out that their copy is actually pirated. Only time will tell.
for more info including descriptions of the actual nags from Microsoft Support check out:
--Walt
Permalink: Microsoft_to_nag_pirate_WinXP_users.html
Words: 115
03/25/06 08:57 - 32ºF - ID#21549
ajaxwrite
Ajaxwrite is a web-based word processor that is written in AJAX with some XUL. It is claimed that it is MS Office compatible.
I've tested it with some old .doc and .wpd files and it read them ok.
Micheal Robertson, the person responsible for mp3.com, Linspire (Lindows), SIPphone, etc, is behind ajaxwrite.
To me the funniest thing about ajaxwrite is that as of right now it only works on Firefox 1.5 and other browsers based on that version of the gecko rendering engine.
In other words, it doesn't work on MSIE. Supposedly MSIE and Safari compatiblity is in the works.
Permalink: ajaxwrite.html
Words: 122
Category: web
02/23/06 10:33 - 30ºF - ID#21548
Disabling the nasty clipboard reader
1. Under the Tools menu, select Internet Options
2. Click on the Security tab.
3. In the box labelled, "Security level for this zone", click on Custom Level
4. Scroll all the way down to the Scripting heading
5. Under "Allow paste operations via script" choose the Disable button.
6. Click OK and confirm that Yes you do want to change security settings for this zone.
Permalink: Disabling_the_nasty_clipboard_reader.html
Words: 119
Category: security
02/17/06 03:05 - 26ºF - ID#21547
Windows IE security issue with clipboard
--paul
Permalink: Windows_IE_security_issue_with_clipboard.html
Words: 96
Category: browsers
02/16/06 05:47 - 40ºF - ID#21546
Camino 1.0 released
Camino 1.0 brings you a heavily-updated version of the only native Mac OS X browser using Mozilla's Gecko rendering engine. Thousands of bugs were fixed in Gecko 1.8, providing users with improved web page compatibility.
more info:
Permalink: Camino_1_0_released.html
Words: 41
Category: web
01/31/06 03:05 - 33ºF - ID#21545
Microsoft Developer Toolbar
Permalink: Microsoft_Developer_Toolbar.html
Words: 60
01/31/06 12:05 - 39ºF - ID#21544
face the nation
Does anyone else get nostalgic for "vintage" [inlink]twisted,296[/inlink] computer memorabilia? I wish I had screenshots of some of my old desktops.
Permalink: face_the_nation.html
Words: 25
Category: privacy
01/30/06 09:47 - 39ºF - ID#21543
Internet Privacy
I think that for the vast majority of internet users, privacy is just an illusion. Even if you use a firewall, http (Hyper Text Transfer Protocol) sends all sorts of data about you, your computer, your browser and even your monitor's screen resolution to the websites that you surf.
Your IP
When you surf the internet, your connection is uniquely identified by an IP (internel Protocol) number. If you are on a LAN (Local Area Network) you may share that IP with others on the same network.
In general terms for people who surf the 'net at home, knowing a user's IP is enough to find him or her. But . . .
The above is a screenshot with firefox on the left running tor (more about that later in this journal) and konqueror on the right. Both browsers show the ipchicken website which shows my old Linux box's IP. Notice that two different IPs are being returned at the same time.
Privacy at an Internet Cafe?
That's why some people go to internet cafes to surf the 'net. But even that can be problematic since the IP can be traced back to the cafe and computers can be forensically examined - most computers retain much data related to surfing the net - cookies, cached data, etc.
And that is why some people get online at internet cafes using "live cd" operating systems that boot and run entirely from the cd without writing any data to the hard drive. Some good Linux live cds that I have used are SimplyMepis Knoppix Kanotix PCLinuxOS Ubuntu and Slax
But that still does not solve the IP problem. There are also several live cds that are designed for getting online anonymously and privately including Anonym.OS (an OpenBSD distrobution) and Phantomix
Tor - privacy at home?
The Electronic Frontier Foundation recommends the use of Tor
Your traffic is safer when you use Tor, because communications are bounced around a distributed network of servers, called onion routers. Tor's technology aims to provide Internet users with protection against "traffic analysis," a form of network surveillance that threatens personal anonymity and privacy, confidential business activities and relationships, and state security.
I installed and set up tor and firefox on my old Linux box this evening, and it seems to work as promised. Given the nature of how tor works browsing even on a broadband connection is slower.
Permalink: Internet_Privacy.html
Words: 447
Category: vnc
01/19/06 08:18 - 38ºF - ID#21542
tunneling VNC through putty
Here you can see my mac desktop on my windows desktop
You can download a VNC server and client here or at the original hoem of realVNC
Unfortunately, it is not the most secure thing out there. Yes, ytou can buy expensive versions that are highly encrypted but the easiest thing to do, is to tunnel your VNC connection through an SSH client such as putty.
This for example lets me visually control my linux server from afar. In a home network this would allow you to use one computer from a window on another to say change msuci on the computer downstairs.
So anyways if you are using VNC client on windows to view you other desktop, it is easy and freee to pipe it over putty.
Here is how you would do it I copied the info here to so that in case that link goes down you can still find it here.
If the VNC Server is running on a Linux machine or it is running on a Windows machine that is also running sshd, then setup a tunnel from client machine to server machine with: (The following instructions are for PuTTY , adjust accordingly.)
* After entering the address of the client machine, go to the "Tunnels" section under SSH.
* Enter 5901 in the "Source port" box under the "Add new forwarded port" section.
* Enter "localhost:5901" in the "Destination" box
* Make sure that the "Local" radio button is selected
* Click the "Add" button and the information should appear in the "Forwarded ports:" box.
* One can now initiate the connection by pressing the "Open" button
* Once the connection is established, the VNC client can be started from the Windows menu (use display 1)
Permalink: tunneling_VNC_through_putty.html
Words: 391
Category: windows
12/30/05 12:39 - 28ºF - ID#21541
Windows Security Flaw is "Severe"
Source:Unlike with previously revealed vulnerabilities, computers can be infected simply by visiting one of the Web sites or viewing an infected image in an e-mail through the preview pane in older versions of Microsoft Outlook, even if users did not click on anything or open any files. Operating system versions ranging from the current Windows XP to Windows 98 are affected.
This flaw exploits the Windows Graphics Rendering Engine and is reported to affect Internet Explorer, Outlook, and Outlook Express, as well as Firefox and Opera.
editorial aside: Since it is has suggested by an e-peep or two that the "Lib" media can not be trusted, I'm certain that all you Windows users have nothing to worry about since the Washington Post is reporting this. ;-)
Another source of information about this flaw is that purveyor of "Trustworthy Computing" -- Microsoft.
Based on our investigation, this exploit code could allow an attacker to execute arbitrary code on the user's system by hosting a specially crafted Windows Metafile (WMF) image on a malicious Web site. Microsoft is aware that this vulnerability is being actively exploited.
Microsoft has determined that an attacker using this exploit would have no way to force users to visit a malicious Web site. Instead, an attacker would have to persuade them to visit the Web site, typically by getting them to click a link that takes them to the attacker's Web site. In an e-mail based attack, customers would have to be persuaded to click on a link within a malicious e-mail or open an attachment that exploited the vulnerability. In both the web and email based attacks, the code would execute in the security context of the logged-on user.
A possible workaround has been reported a word of warning: improperly changing the .dll settings of a computer can cause serious problems.
* Click on Start > Run.
* Type:
regsvr32 /u shimgvw.dll
* Click OK
* Click OK again when the dialog appears.
Note that this can have an effect on the display of some thumbnails in Windows.
Addendum: to reregister (undo the workaround) the .dll use this command: regsvr32 shimgvw.dll
Permalink: Windows_Security_Flaw_is_quot_Severe_quot_.html
Words: 386
Author Info
Category Cloud
More Entries
After This
My Fav Posts
- This user has zero favorite blogs selected ;(