Tuesday, December 27, 2011
Monday, December 19, 2011
Sunday, December 18, 2011
Friday, December 16, 2011
Thursday, December 15, 2011
Monday, November 14, 2011
Saturday, November 5, 2011
Recently there has been lots of stuff coming out of Cupertino regarding a few bugs that have been plaguing users of the new IPhone 4s and IOS 5. According to many users, there is a serious flaw with the battery and how long it lasts. Apple released a statement saying that they are aware of a bug that is causing the issue and have a plan in place to fix the issue. A second beta of IOS 5.0.1 has been released, and Apple says that it will release the update in a few weeks to fix the problem. Is this something that you expected or is this a surprise to the FAN-BOY world of apple. As an apple man, I can say that I expected the new IOS to have problems. As a general rule I never run out and grab the newest in Apples lineup until it is necessary for me to upgrade, or at least I wait for a couple of months. This way I am ensured that at least the biggest problems are worked out of any device. Do you follow the same rule or do you run out and grab the newest and greatest right away??
Saturday, October 29, 2011
For al of us that follow the tech industry, read the blogs, and watch the live streams of the release events, we hear the phrase "The future of computing" very often. But what does that mean for us, in the trenches swiping and tapping on our ipads, opening our laotops i nthe coffee shops and diners? Do you see yourself ditching you laptop for an ipad or just a smart phone? For those that do video editing, or image manipulation, or data crunching the answer is definately no( at least for me) there is absolutely no way that I could function with only an ipad and a smart phone. Could I use an iphone instead of a webcam and my laptop on the car seat to film in the car, yes, but I still need my Macbook Pro to edit it. The future image you see in the movies is still a long way out. So for those that dream of a Star Trek type of everyday computing life style, sorry you will have to wait, maybe a LONG time.
Powered by Qumana
Tuesday, October 18, 2011
Swiftly approaching the 1 year mark of officially making the switch to MAC and the list of apps that i can't live without has grown a little…well ok it has grown a lot.
Previously i mentioned 7ZIP. Good program, I found a better one, on that i use at least two or three times a day.
It is called Unarchiver http://wakaba.c3.cx/s/apps/unarchiver this app integrates seamlessly into OS X. When you click in a compressed archive, the unarchiver takes over automatically and does the hard work for you. Zip, Tar-GZip, Tar-BZip2, RAR, 7-zip, LhA, StuffIt and many other old and obscure formats. There is a complete listing of the formats at the link above.
Another great app that has quickly found its way into my heart, not to mention a firm planting onto my dock, APPZAPPER has been one of the most instrumental apps in keeping my compy clean and fresh. Fire up the app and drop what you want deleted onto the window, click zap and all the associated files for that item are sent to the trash bin. then just empty the trash. Easy as that!! Nuff said, here is the link for more information http://appzapper.com/ Stay tuned for more great apps and "STUFF" to make life on a mac AWESOME!!
Monday, October 17, 2011
There are a ton of new features, 250 of them to be exact. Most of them you don't see or know about. But the ones that you do notice, have so far been pretty darn cool. Like for example, spaces. Who knew that the multiple desktops would be as useful as they are. Granted, Linux has been using this feature for years, but somehow Apple does it with a little panache. It come in handy when you are filling out a job application for example. You have the Application on one space, on another you have your resume, another one has you email, and the last one has Itunes. Wait you need more than that? No worries, just pop open the dashboard and throw another one in there and you're good to go. A_MA_ZING!
How about the Shiny new finish and polish that they put into Lion. Instead of being more round and bubbly that squared off the corners, made the buttons a little smaller, even the progress bars got a little more geometric. Not what we have all come to know and love but, never the less, gives OS X a feel of maturity.
The biggest change (And in my opinion the best change apple made since touch screens) Shows itself in the COMPLETELY revamped version of mail. When they were designing the changes for this OS they put a great deal into mail, it is cleaner, easier to use and the use of full screen apps that Apple has sprinkled into every corner of Lion, makes mail My number one pick For the best updates in Lion.
There are a ton of new Features to talk about, so stay tuned for the next Round of updates. Until next time, keep it real!!
Monday, June 20, 2011
Sunday, May 29, 2011
Tuesday, May 24, 2011
Friday, May 13, 2011
So Microsoft jsut recently bought Skype for a cash value amount of of 8 Billion dollars. Many of you would be wondering why would Microsoft bother with buying Skype? There are a few VERY good reasons why. First, the user base is mind boggling. 683 million in Q4 of 2009 and it has only gotten larger since then. Another big selling point for Microsoft was the accessability to Facebook. It will allow Microsoft to place even more ads on Facebook, as well as within the actual Skype application. For many MAC users that use Skype, this merge means that microsoft will have even more access to our cloud of OS X. I have seen Microsoft compared to SKYNET. So who knows what the future holds for Skype and MAC in the near future. Let me know what you think....
Tuesday, February 1, 2011
The Security Attacks Most People Have Never Heard OfSmishing: Smishing or "SMS phishing" refers to a phishing attack that specifically targets mobile phones. The victim would receive an SMS with a hyperlink wherein a malware automatically finds its way in your phone or leads the user to a phishing site formatted for mobile screens. The term was brought on by David Rayhawk in a McAfee Avert Labs blog.
Botnet (Zombie PCs): A portmanteau of the words "Robot" and "Network," a Botnet is any number of internet computers that inconspicuous to their owners; forward e-mails (any of which include spam, malware, or viruses) to other computers on the internet. These infected computers are also known as "zombies". DoS attacks (Denial of Service) often rely on thousands of zombie PCs.
BlueBugging: A craze originally jumpstarted by a Malaysian IT Professional, bluebugging (not to be confused with bluesnarfing) allows a more skilled person to illegally access a cellular phone via Bluetooth wireless technology. This act often times goes unnoticed without any proper notification or alerting to the phone's user. A vulnerability such as this allows phone calls, SMS messages to be read and sent, phonebook contacts to be erased, phone conversations to be tapped, and other malicious activities. But much to the hacker's dismay [I think the hacker knows the limitations… perhaps the point is that widespread impact is minimized because of the range…], access is only attainable within a 10 meter range of the phone.
Pod Slurping: Coined by US security expert Abe Usher; Pod Slurping is when your iPod or any portable USB storage device begins to surreptitiously copy large amounts of files from your computer to its hard drive, it's engaged in something called "Pod Slurping". Pod slurping is becoming an increasing security risk to companies and government agencies. Typically, access is gained while the computer is unattended, and this process can occur in as little as 65 seconds.
Ransomware: A program that makes a computer near unusable then demands payment in order for the user to regain full access. It "kidnaps" the computer! Ransomware is also commonly referred to as a "cryptovirus" or "cryptotrojan." Examples of Ransomware include Gpcode.AK, Krotten, and Archiveus. Ransomware was originally a with a trojan called PC Cyborg, created by a Dr. Joseph Popp.
Scareware: Scareware is software that tricks people into downloading or purchasing it, under the guise of fixing their computer, when in reality the faux anti-virus program is the real problem. Scareware programs often run a fictitious or careless system scan, and then present the user with a list of malicious programs that must be corrected, always leaving itself off of the list. The scareware then informs that in order to fix these "problems" it will require the user to pay a fee for a "full" or "registered" version of the software. Examples of scareware include: System Security, Anti-Virus 2010, and Registry Cleaner XP.
Sidejacking: Sidejacking is a hacking technique used to gain access to your website specific accounts. Websites typically encrypt your password so it cannot be stolen, but then send you an unencrypted "session-id". The session-id is either some random data in the URL, or more often, random data in a HTTP cookie. A hacker who finds the session-id can then use it to gain access to the respective account. Thus enabling the hacker ability to read your email, look at what you've bought online, or control your social network account, and so on. Robert Graham, who pulled together a variety of known and new vulnerabilities and packaged them into an automated session snatcher, was responsible for this term.
Black Hat: "Black Hat" hackers are those people who specialize in unauthorized breaching of information systems, often times attacking those containing sensitive information. They may use computers to attack systems for profit, for fun, or for political motivations. Attacks often involve modification and/or destruction of data which is done without authorization. They also may distribute computer viruses, internet Worms and deliver spam through the use of botnets.
White Hat: A "White Hat" hacker describes an individual who identifies a security weakness in a computer system or network but, instead of maliciously taking advantage of it, exposes the weakness, and repairs the vulnerability protecting the network from unwarranted intrusions or attacks. The term is taken from old western films, where the white hat cowboy is portrayed as the hero, and the black hat as the villain.
The Attacks Everyone Sort of UnderstandsWorm: Originating in a Xerox Palo Alto Research Center 1979 by engineers, a "Computer Worm" was originally designed to make programs run more efficiently, then later corrupted to be a destructive computer virus that can alter or erase data on computers. Often times, they leave files irretrievably corrupted or slow the PC down to a crawl.
Trojan Horse: A long time and common infection found amongst even the newest of computers, this destructive program disguises itself as a harmless application. Although Trojans are incapable of self-replication, they are still just as destructive as a computer virus. In an act similar to its Greek origin, often times a Trojan horse opens up a backdoor to your computer enabling potential viral infections and allowing hackers to control the PC. Origins trace back to MIT hacker turned NSA spook, Dan Edwards.
Phishing: Originated by hackers who were stealing America On Line accounts by scamming passwords from unsuspecting users, "phishing" is the age-old crime of taking ownership of sensitive information from third parties (phishing scam victims). Information includes usernames, passwords, banking information, and credit card numbers. This is typically accomplished from sending someone an e-mail fraudulently claiming to be a legitimate company, or redirecting someone to a website that looks legitimate but isn't. More often than not, the direct result of being phished is your identity being stolen.
Script Kiddies: A term originated by Marcus Ranum to describe white hats who had no idea what they were doing, a script kiddy (sometimes plural as kiddies) is a derogative term, used by more skilled hackers of computer security systems, to describe young or less experienced hackers who still can be just as much a threat or annoyance. Utilizing cheap techniques, pre-written scripts and sometimes with assistance, the average script kiddy can exploit a weakness with computer networks. The difference is that these untrained hackers are often unaware of the potential consequences of their actions.
Keylogging: Originally designed by Perry Kivolowitz for a Usenet news group in 1983, Keylogging for the most part has become increasingly common, not to mention dangerous. It involves the recording of any keyboard input via internet connection. Not every instance of keylogging is necessarily illegal. It's sometimes done as a way to monitor teens and children.
Social Engineering: Brought into common knowledge by Kevin Mitnick (a hacker popular back in the day), Social Engineering involves obtaining or attempting to obtain private data by illegally persuading an individual to reveal otherwise secure information. The Information released by victims is often then used to attack a computer network. One common example would be when an employee at a large company is convinced to give out his employee identification, and then it is manipulated to gain further access to the said company's network, often sensitive information.
Crapware: Originally coined and reported by Marc Orchant on his ZDNet blog, Crapware is comprised of programs that use valuable resources on a computer's hard drive, such as memory or RAM, which are not necessary and are unused by the computer owner. Crapware can range from software loaded onto the system prior to sale to programs that are downloaded from the internet without the knowledge or consent of the user. One of the more common examples of Crapware is AOL being installed on PCs by the PC manufacturer.
Got a favorite we did or didn't mention—or a term you've made up yourself? Let's hear it in the comments.
Sunday, January 16, 2011
Ok so after a long stint of using ONLY Ubuntu Linux I can honestly say that I love it but it still has a bit to go before it can honestly over take Windows for the title of “Primary OS’. Now I didn’t just run it on a virtual machine for an hour. I ran it as my main OS for over six months. During this time, I have compiled a list of points both good and bad.
First and foremost is the factor that Linux(depending on which distribution you use) requires a lot of setup of components, ie: sound card, dvd playback, and audio playback. Though with a little patience, and some help from the forums.
The next thing that I noticed is that the flash plugin did not perform as it did on Windows, considering that Windows is a paid software, this is to be expected. However while navigating various sites I found it to be choppy. The games on facebook were very choppy also.
On the other side of the coin, All of the software is completely free. The whole operating system is much faster than Windows. I would say that it is about 30-40% faster. It feels much more confortable to work around in. For now that is all I have for you guys. Im going to keep writing about this, and keep you updated in the future.
Tuesday, January 11, 2011
So the Iphone is going to verizon. Are you going to switch to verizon or stay with AT&T? There are questions about how the Iphone is going to be able handle the LTE network? There are also questions about the life cycle of the Iphone on AT&T vs on Verizon. What are you going to do, switch now or wait until june when the Iphone 5 is expected to be released?