Tuesday, October 19, 2010

yahoo messenger doesn't show what i write?

If you you cannot see text in Instant Messages at all, not even your own after you click Send then read below. Yahoo does have a limit on the number of characters that can be posted at once in an IM, I am not sure what that limit is though.

CAN’T SEE TEXT IN INSTANT MESSAGES? 
If you cannot see text in instant messages, not even your own after you click Send or Press Enter, this is an issue that is cropping up more and more. If just a new problem try exiting Yahoo Messenger and then relaunching it. Even try rebooting your computer. If both those fail to solve your problem then try the suggestions below. This is actually an Internet Explorer scripting problem. Yahoo Messenger relies on Internet Explorer to work even if you have a different default browser. So when IE has a problem, Yahoo Messenger can as well.

1) The first thing to check is to make sure you have scripting enabled in Internet Explorer. Internet Explorer is integrated into Yahoo Messenger so things that go wrong with IE can affect Yahoo Messenger. Here is the yahoo help page about that:http://help.yahoo.com/l/us/yahoo/messeng…

2) In the Start Menu click on Run. Type, without the quotes, “regsvr32 jscript.dll” and then click OK. Next, repeat the process but this time type in the Run box “regsvr32 vbscript.dll” and click OK. Please note, if you are using Windows Vista temporarily disable the User Account Control (UAC). You can easily turn it back on. On the Control Panel (Category View) choose User Accounts and Family Safety, next choose User Accounts, and then click Turn User Account Control on or off.

3) If the above does not fix your problem and you are using Windows XP, you can update your Windows Script to version 5.7. In my experience helping others, this is the step that has helped the most people. Exit all browser windows and chat programs including Yahoo Messenger before installing. Here is link from Microsoft to update that:
http://www.microsoft.com/Downloads/detai…

Or you can do an internet search for Windows Script 5.7 and choose the Microsoft link.
This version of Window Script is already included with Vista so you would not use that link. There is also a Windows Script 5.7 released for Windows 2000 and you can find that here:
http://www.microsoft.com/downloads/detai…

Continue Reading »

Sunday, October 17, 2010

Microsoft attacks openoffice

The truth is that open source software support is lacking, and when it exists, is made live tests. That's why we never see big fail than links from major software vendors do not release after release and that the bug appeared. And here I think the fix for WordPress, which is an open source software that updates have brought with them the security problems in some major cases.

This time as a software maker Microsoft Money comes and dissolves into a commercial idea free office software, which does not offer anything for people who need office solutions.

Continue Reading »

Google Operating System, Chom + Linux = Love

Google gave it one last night saying that working on the operating system will be called - height - Chrome. OS will be based on a Linux kernel, over the coming applications, mainly web.

Linux know how on what programs work and what applications do, or who can very well be limitations to anticipate this on Google's. But Google offers up to a point everything needed for an office-type computer. We have a video player (YouTube), audio (google), messenger (gTalk) + pdf document editing (google docs), mail clients (Gmail), browser (chrome), calendar / ogranizer (Google Calendar), pictures (picasa) May be something?Yes, I think a Twitter client, but it's not a problem to make it faster.

Would there be something in addition to the operating system does Google do it?

Continue Reading »

Linux integrates with Microsoft

She started humming that Microsoft wants to be net of interoperabiliteze with Linux. I mean, as Microsoft sees them as Linuxu steal clients, wants to remove software that looks like, or use the Linux platform and be quite good.

That, I think that Microsoft's first move after Uncle Bill Gates, who's to blame for all the world's blue screen, has announced his retirement from the company.

Continue Reading »

Linux Adventures

The new kernel hell. I mean it's good when you appear as a new Kernel version. I'm starting to think that these are the same as the Windows updates, you gotta do in deh ..unless your name is not PC anymore. So I did and now ... ... ... itaa surprise, I began to go wireless will.

I mean, I'm glad to one and a half after its launch have done linuxuri drivers that are compatible with and function. Little late but it is beautiful. 
Hard part is ... I do not go yet one thousand sound card on linux although I did some updates on there. So, I commend me to display nothing nice with the desktop rotates megabitilor and other wonders of video memory, as long as you do not hear anything. 
At least if I understand something of what Youtubele unfold before my eyes ... but nothing, not a computer makes me so fast, i can still fight him :)

Update: it's wireless on Linux, it's really nice. Do not think of anything else, it's the same Intel 3945ABG adapter, but muult moves better than the windows and goes waaaay further. So there's access point to blame here other donkeys.

Continue Reading »

How to stay away from Internet dangers

The fact that the Internet brings great value to our lives no one can challenge it and the benefits of its use are numerous and not getting into the discussion. But always there is also a reverse side. There is danger everywhere and enjoy the benefits of the Internet must know and how to protect yourself. Security of personal data and privacy is reason enough to learn to avoid capacanele that you are exposed every day.
Those from CyberDefender, security providers for the Internet, have studied the problem and came up with some solutions, namely things that you should NOT do when you surf in the virtual world.
I extracted some of them that we face every day without to give them great importance:
1. How to protect yourself when using a computer other than your own staff.
NO never check the "Keep me sign in" if you use a computer to which others have been denied access.
Be careful with your office computer. You feel like it's yours for the work on it every day, but so well can use and other colleagues in your absence. Can I make a very simple thing, to send their address on all mail you received. They can also see all your history very simple sites accessed.
If you are logged on a website, do not forget when you leave and deloghezi site!
Delete visited sites history of browser you use when you have finished using that computer.
NO never save passwords to access different sites other than your personal computer, because then other users can access your accounts on these sites.
2. How to protect yourself on social networks like Facebook

Use settings to protect personal data (privacy settings). Do not let free access to "friends of friends" to see even birth date or phone number. These data can be used and you can wake up with no money in the account. Many banks, when you contact them by phone or contact for various issues related to your account, just do a simple check to ensure that talk-ask the account holder date of birth.
3. Do not use the same password for multiple accounts
It's hard to remember multiple passwords so that many of us use the same password for all accounts they have on various sites. The problem is that once you are 100% exposed discovered password.
As a preferred solution is to have different passwords for different types of accounts. For example, for email accounts and logging on the computer uses certain passwords and service for all sorts of sites and other social networking passwords.
Some browsers have a function of great help in this case - "master password". Under this unique password you can save various other passwords you use for different accounts. When we look only need to insert in the tool that "your master password'' and there you will find the rest of passwords.
Continue Reading »

Star Trek or reality? Computers without a mouse and keyboard and intelligent exhibition games in Tokyo! VIDEO

Farewell mouse, keyboard goodbye! At the museum with you. It seems ... Digital Content motto exhibition, in Tokyo. Here you can find all sorts of gadgets to radically change human-computer interaction. So much that you start to wonder where it ends where the human mind and artificial intelligence begins.
After the mouse and keyboard, the next screen is really threatened. What you need it, when you can project images in front of you? A Franco-Japanese company into reality an idea that you've already seen in the movies. The "Airstrike" allows you to move pictures with bare hands, thanks to a stereo cameras installed on the floor.
"Chambers acts like a man's eyes, watching the movements of the arms. The computer then processes the information submitted by chambers. Thus you can move images on the screen with your hands from a distance, as you do with a mouse," said Yumiko Misaki, director of LM3LABS .
A similar mechanism also uses a virtual game. Camera-projector is mounted above the monitor which serves as a chess board and pieces move according to the movements of hands. Attempt to make players focus on the screen may appear and other fast-moving images.
Here's something that seems to be a musical instrument came directly from the future. It's called "touch table" and is a kind of platform game for multiple users. It is so intelligent, that we recognize without fail on each player.
"I stand seat that is equipped with sensors that transmit electricity. When someone reaches the mass, electric current is passed from his hand on the table and form a closed loop between the player and body weight through the seat," says Professor Masaichi Furuichi.
Both gadgets are, for now, only prototypes. But inventors put their hand in the fire that we see in stores before long.
Continue Reading »

Sunday, October 3, 2010

IBM shows fastest CPU: 5.2 GHz

The IBM is proud of their new processor that would praise you reach a speed of 5.2 GHz, which makes it the fastest CPU available on the market today, reports hothardware.com.

Hardware specialists would jump immediately saying that burned and other processors have reached such speeds, even surpassed it. Nothing really, but those processors needed complex systems based on liquid nitrogen cooling. IBM's new processor is just fast and do not need such complicated systems.

Those who think to make upgrades in the PC should turn its attention to other solutions, at least temporarily, because the 5.2 GHz processor will not be available to the public in the near future. September 10, IBM will make available new toy for premium customers and users.

IBM representatives say that the new processor speed is not just to keep pace with the technological needs of the times in which we live. Speed is vital to any company, continuous information flows and increasing of reaching a limit determined by storing information globally.

Continue Reading »

Google ME appears this fall

Eric Schmidt, Google CEO, confirmed rumors conformcarora, this fall we could see a new social network, competition for Facebook, Google ME, reports ZDNet .

Google ME will not be a classic social network but an application that integrates social elemenete in helping the search. At least so say the rumors that circulate around Google ME. This application aims to attract 500 million users of social networks which will make them competitive.

Our employees are only guesses since no one outside of Google's, does not know exactly what and how will it be ME. Going to sit quietly and wait the big launch.

Continue Reading »

PlayStation Move has not sold well

On 15 September, Sony launched its motion controller Move , for the PlayStation 3. It will follow in the footsteps of the Wiimote, and will compete (up to a point) Kinect from your Xbox 360. But Sony did not praised as Microsoft did with Kinect. It gave him a holy aura.

And she's not sure that the launching had to have a sufficient number of games compatible to attract potential buyers. Barely managed to gather any evidence of a second. In part because their strategy is to transform the old games in titles Move. But just who will return to play, to experience the new perspective.

Microsoft has thought of launching its own controller much better. Move And in those cases sold below expectations. Price did not help either. Wand Home for $ 50, but if we must give full package $ 100.

Continue Reading »

Intel is investigating as stated protocol HDCP anti-piracy

Intel is investigating as a master key was published online anti-piracy protocol or High-Bandwidth Digital Content Protection (HDCP).

The protocol is used to protect video and audio content as it is transmitted between devices through encryption, and check if the device is licensed to share content.

Intel confirmed last week that the master key that the original was published online and are now investigating whether it was stolen or crack-look.
In HDCP key establishes a shared secret key, using public and private keys of the devices, and will be used to encrypt communications between two devices.

But everyone knows and can see the master key can break HDCP key encryption key, according to Ed Felten, director of the Center for Information Technology Policy at the University of Princeton.
"HDCP not guarantee that the participating devices are licensed, unlicensed devices because the manufacturer can use a keygen to create public and private key pairs correct," he wrote in a blog post.

After nearly a decade, Danish cryptographer Niels Ferguson claimed to have found a way to avoid HDCP.

"If this master key is ever published, HDCP will provide no protection. Flaws in HDCP are not hard to find."
At that time, Ferguson said he has no intention to publish discoveries made because of fear of starting legal action against him.

Intel says it will not be easy for anyone to use cheiele in practice, but said he would bring legal action, if necessary, to defend its intellectual property.

Continue Reading »

Interpol chief admits theft of identity on Facebook

The head of Interpol, Ronald Noble, has acknowledged that criminals have stolen their identity by creating two accounts in his name up.

Noble made the disclosure in the inaugural Interpol Information Security Conference in Hong Kong.
Given the anonymity of cyberspace, it might actually be one of the most dangerous threats we face, "said Noble.

Interpol Incident Response Team discovered that one of the criminals use fake account to obtain information on a recent global operation led by Interpol. Operation Infra Red, which led to 130 arrests, was aimed at discovering criminals who fled from national jurisdictions.

Analysts said the case shows the ease with which criminals can forge the identities of others in all forms of social media sites to steal information.

Continue Reading »

Club3D grab sources

Lately, more and more video cards and integrators have expanded. And found motherboard and very good sources that addressed segments. The last company to make such a move is Club3D. They put the new series called sources Switching Power Supply, which began to be composed of five different models.

They have power of 400 W, 600 W, 700 W, 850 W and 1000 W. The two sources that the smallest are cooled by a fan 120 mm, yellow LEDs, have modular design, are designed to work with one video card, and certified as 80 + power efficiency.

The others are 80 + Bronze certificates have modular design, and are cooled by fans of 135 mm, blue for the top of the range (which can handle without problems up to three video cards) and green the rest (enough for two GPUs ).

All protect any electrical anomaly, and offers two or four 12 V rail links and recommended prices remain but the exact date of launching a secret.

Continue Reading »

PlayStation 3 Firmware 3.50

Sony has completed a new firmware 3.50 for their PlayStation 3 console. The most important additive is its support for Blu-Ray 3D. But the paucity of such content, quite expensive and compatible TVs will cancel almost completely the value of the firmware.

But besides 3D, 3.50 comes with a full integration of Facebook, which some game developers will be able to exploit their turn. Thus, the personal account can receive automatic updates of the game, such as new scores or records, screen shots, or whatever else you think of them.



Continue Reading »

XC Verbatim SecureDigital Memory Card 64GB Class 10

Verbatim is the next step in the Flash memory card with the new class SDXC 10 with a storage capacity of 64GB, according to a press release issued to the editor. New Flash Card SDXC (SD Extended Capacity) is designed to menevra large amounts of data at incredible speeds and provides users with a fast and portable storage medium for their electronic devices such as mobile phones, camcorders, cameras or portable consoles.
"Users of digital cameras can do more shots per second than was possible before using this technology so that a shot at the gate in football can now be captured with a more advanced level of detail. In addition, users of cameras that moves towards the professional sector may find these cards SDXC perfect opportunity to record video at exactly the desired quality, "said Hans-Christoph Kaiser, Business Development Manager Verbatim Flash EUMEA.
Compatible with host SDXC products
SDXC Verbatim 64GB memory card class 10 is compatible with Windows 7, Vista and XP and works in products enjoy the latest technology SDXC. While SD and SDHC cards can be used SDXC slots, cards may be used only SDXC profusele SDXC compatible host. For PC or laptop, users must download a compatible driver SDXC SD slot available from Microsoft Download Center.
Continue Reading »

About the actual safety of children in a digital world

Currently, more and more children are masters of using the Internet, a world that started out as designed by adults for adults.How about this twist?

Most researchers, professionals and ordinary users say without second thoughts: Yes, let's leave the children on the Internet.They are sure that such things can teach us, it will develop and master the art of virtual communication.All this resulted in the creation of an Internet "child", which is considered "safe" - a dedicated area, similar to a play area specially designed real world, where they can talk to their friends and where they can play together.Similarly, there are sites online versions of books for kids: stories, poems, educational books and even coloring books can be found on the "shelves" virtual library.

I think we should all ask ourselves some basic questions: Is the Internet really safe for children?Parents can trust the developers that guarantees safety web pages they have created for them?Whatever the answers, we must have regard to the threats which threaten both the children and their parents, even when browsing the Internet supposedly secure pages.

Here's a typical situation: let your child play alone in special places that you know him so well.After several hours, crying and no favorite toy back that was stolen by a person devoid of any civic sense.

Attackers may even be fellow child, older children or teenagers bent on bad jokes.Unfortunately, none of the digital world of social networks is less protected from such antisocial behavior.A rude word's "wall", an insulting message on a homepage, these are all minor inconvenience that can easily upset a baby. Is all the worse when an adult person who is offended. Social networks, forums and chats are ideal platforms for pedophiles posing as respectable members of society and whose victims are children.

It is often a child to trust his friends more virtual than real ones.This can result in specific meetings with the "best friends", without parents even knowing about it. This fits like a glove for pedophiles - they try to gain the trust of the child in order to establish a meeting with him without parents or family to know.

Warning!Crazy ideas!

Sometimes, the children of the most wacky ideas regarding what they want to do or buy.No wonder that they ask parents and money to implement them.

Many sites do not give children back from receiving income from banners placed in different social networks.One of the four sites containing child Banner "Ads by Google." Ads can focus on any word on a page, the most popular being those relating to "education" and in this way, criminals can hope that convince children that they need an education grant for non-existent or that can learn, for example, about hypnosis, buying a CD "with only $ 50.

In addition to banners, children's sites may contain advertisements and other spam, for example, a message to a user who just registered on site or at a guess where this is possible.Usually, these messages contain an external link that leads to dangerous or pornographic websites.
Of course, children's forums, social networks and blogs have moderators whose job is to monitor the content.However, this is not a solution - moderators can not check every message.

"Microbes" should be kept apart

Dirt touching an open wound on the finger of a child may cause tetanus.Similarly, the Internet, in general, and sites for children, in particular, can cause "infection" of all kinds.

Daily, our detectors identify the virus about 20 sites for children infected with malware.Some of these sites offer goods to children, but most educational sites or games, more than 100 hits daily.

If your PC is not protected by a security solution, you put your child in danger by giving them permission to surf the Internet.

Warning of the existence of pedophiles and child in the way they operate is the main way to protect them from danger.However, that does not guarantee assistance in the event of malware: abuse may enter the system through any software vulnerabilities.

It is important to keep in mind that any site can be looted by hackers, which means that any security solution installed on your PC must be enabled, even when seemingly innocuous baby visiting resources.

Conclusions

Therefore, we allow children to surf the Internet?Whatever one says, the answer must be yes, because children need to know about how to communicate in the virtual world, as well as the real one.In addition, opportunities to gain knowledge about the world and the amount of information available on the Internet are endless.Preventing child to surf the Internet, adults are not only deprive him of access to the largest information resource in the world.

A fairer question would be: "You should leave them unsupervised children to surf the Internet?" Who should be the first to help their first experience in this world? Parents, of course! We did not allow us to let children wandering alone in a big city, because we are aware of the dangers that threaten them. So we should proceed and the Internet, "one world" even more than the real and whose borders are entirely absent.In general, we are with our children only when their first steps on this land.But the minute we realize that they are doing, we think that our mission is closed.However, this is only the beginning - the children are very naive and gullible, can not properly assess situations and, moreover, are very easily hurt.If I browse online with our children, we put an end to many problems.But we must regard that a boy or a girl of 10-12 years now wants a little privacy during the communication with virtual friends.Therefore, more recently, the burden of our parents, is to help and support them in difficult situations.Children will be glad to know how to surf safely online, how to avoid the dangers, but most importantly, they feel protected knowing that there will be someone ready to answer their questions when they need it.And this support must come from our parents

Continue Reading »

Stuxnet a sophisticated cyber attack and unique in the world

The latest worm attack Stuxnet has generated much discussion and speculation concerning the purpose, intent, origins, and - most importantly - the identity of the attacker and the target.
Kaspersky Lab has no evidence to identify the attackers or their target, but experts can confirm that this company is a very sophisticated attack and unique in the IT industry, prepared by a team of cyber criminals with extensive knowledge of SCADA technology. Kaspersky Lab believes that this type of attack can not be achieved without the support of state officials.
"I think we have reached a turning point because we face a new world, a new approach to cyber crime," said Eugene Kaspersky, CEO and co-founder of Kaspersky Lab. "Cyber criminals in the past were only now realize with fear as we approach an era of cyber terrorism, sophisticated weapons and cyber warfare," he completes.
In a speech at the event Kaspersky Security Symposium in front of journalists in Munich, Germany, E. Kaspersky Stuxnet compared with the opening of Pandora's Box.
"This malicious program was not designed to steal money, send spam or steal personal data, but to sabotage the production enterprise to destroy the industrial system. Note that this is the beginning of a new era. The '90s were marked by cyber vandalism, the 2000s decade meant cyber crime, and now we approach the cyber terrorism and wars, "Kaspersky added.
Kaspersky Lab researchers independently discovered that Stuxnet worm exploits vulnerabilities four zero-day "in Microsoft Windows. Two of these security breaches were reported directly to Microsoft, Kaspersky Lab experts collaborating extensively with the U.S. software maker to create and release security patches for your operating system.
Besides the exploitation of four vulnerabilities Stuxnet used two valid digital certificates, stolen from Realtek and JMicron, who helped cybercriminals to hide this malware in the system for a long time.
The worm tries to access and reprogram the industrial control systems, aiming systems SCADA (Supervisory Control and Data Acquisition) Siemens products, namely Simatic WinCC. They are used to monitor and manage infrastructure and production. Similar systems are widely used on oil rigs, power, communication range of platforms in airports, on ships and even the military.
Advanced knowledge of industrial control systems, sophisticated attack on several levels, the use of vulnerability "zero-day" and theft of digital certificates valid and have led experts to declare that Stuxnet Kaspersky Lab was created by a team of highly professional experience, who possess vast resources and financial support.
target attack and geographical location in which he appeared (initially Iran) suggests that it was not initiated by any group of cyber criminals. Additionally, Kaspersky Lab experts who analyzed the worm's claim that the main purpose was spying Stuxnet infected systems, but to initiate an act of sabotage. All these indications show that Stuxnet worm development was supported by officials of a State which has powerful and valuable information.
Kaspersky Lab believes that cyber weapons Stuxnet is a prototype, which will lead to the creation of new tools very dangerous attack. This time, the world is facing a cyber arms race.

Continue Reading »

After attacks, Microsoft is rushing to fix the bug ASP.net

Microsoft rushes to release a solution for a flaw in Windows Web server that has begun to be exploited in online attacks.
Patch fix a bug in Windows ASP.net technology used in Microsoft's servers. Microsoft says it has seen limited exploitation of online attacks escape, but the problem is serious enough that the company decide to speed up launch of resolution, before or regular update scheduled for October 12.
ASP.net is used to build Web applications and bug gives hackers a way to gain access to protected files or read encrypted data sent by a server application ASP.net. Earlier this month, researchers have demonstrated how an attack can be used to steal session cookies, or possibly encrypted user names and passwords on websites.
Microsoft occasionally updates issue such out-of-band when he discovers a serious security problem, but this release is different. For starters, Microsoft will launch initially only patch Microsoft Download Center - generally used by large organizations that want to test patches before installing them manually within the company.
"It allows them to get the update as soon as possible, allowing administrators and end users who want to manually install this security update, to test him and to update their systems immediately," Microsoft said in a posting Monday blog announcing the update. "We encourage these customers to visit the Download Center to download the update, to test their environment and apply it as soon as possible."
For most of the customers who rely on automatic updates, the patch will be released in a few days. Consumers are not vulnerable to this bug, unless you run a web server on their computers.
Continue Reading »