Posts belonging to Category TJ News



Main Jailed Over Facebook ‘Friend’ Requests

Published August 17, 2010| FoxNews.com

It’s not a crime to make friends on Facebook, but one Florida man found that the rules are a bit different when the person you’re trying to “friend” has a protective order against you.

The man, 54-year-old Harry Bruder, was arrested for allegedly sending his soon to be ex-wife requests to “friend” him on Facebook, which police said violated the protective order, MyFoxOrlando.com reported.

A police report posted on thesmokinggun.com shows Bruder admitting he contacted his wife twice last month on the popular social networking site — and admitting that he changed the password to his wife’s e-mail account. The couple has been separated for two years.

Bruder violated a domestic violence injunction obtained by his wife, officials say. Bruder allegedly lashed out because he was upset over having to attend court-ordered counseling sessions.

For more, visit Foxnews.com

Apple says it has patch for remote attack on iPhone, iPad

Apple is quietly wrestling with a security conundrum. How the company handles it could dictate the pace at which cybercriminals accelerate attacks on iPhones and iPads. Apple is hustling to issue a patch for a milestone security flaw that makes it possible to remotely hack —or jailbreak — iOS, the operating system for iPhones, iPads and iPod Touch.

The patch is completed, Apple spokeswoman Natalie Kerris said in an interview. But Kerris said on Friday that she was not able to give a time frame for its public release. Jailbreaking refers to hacking iOS to download Web apps not approved by Apple. This used to be difficult. This spring, a website came along called JailbreakMe.com that made it trivial to jailbreak your own iPhone or iPad. Last week, a technique for remote jailbreaking appeared on the site. It’s now possible to access the operating system of an iPhone or iPad owned by someone else.

An attacker would get “fairly complete control of affected devices,” says Michael Price, an operations manager for McAfee Labs. No such attacks are known to have happened yet, he says. For the moment, the most visible concern for Apple has been pranksters going into Apple and Best Buy retail stores and jailbreaking display models, according to tech blog Engadget. Yet, the security and privacy issues are serious.

Security experts expect the pattern that has come to dominate the PC world to begin to permeate smartphones. Bad guys continually flush out new security flaws in PCs, then tap into them to launch malicious attacks. Good guys, meanwhile, scramble to patch and block.

Now, cybercriminals are rapidly adapting PC hacking techniques to all smartphone platforms, including Symbian, Google Android, Windows Mobile, RIM BlackBerry and Apple iOS.

“It’s a brand new game with new rules,” says Dror Shalev, chief technology officer of DroidSecurity, which supplies protection for Google Android phones. “We’re seeing rapid growth in threats as a side effect of the mobile Web app revolution.”

IPhones, in particular, have become a pop culture icon in the U.S., and now the iPad has grabbed the spotlight. “The more popular these devices become, the more likely they are to get the attention of attackers,” says Joshua Talbot, intelligence manager at Symantec Security Response.

Apple’s problem is singular. The company has made a big deal about hiding technical details of iOS, allowing only approved Web apps to tie in. This tight control initially made it easier to keep iOS secure. But now Apple may have to share iOS coding with anti-virus firms, says Sorin Mustaca, development manager for anti-virus firm Avira.

Read more here…

Tech Jives is proudly sponsored by the worlds leader in IT certification training, CED Solutions!

Microsoft Launches PC v. Mac Website And Talks Some Serious Smack

By Alex Wilhelm Follow Alex Wilhelm on twitter on August 9th, 2010

It may be long overdue, but Microsoft is finally coming out swinging against the rise of OS X. Apple has long played the underdog against the giant, writing Microsoft off as stodgy, technologically backward, and problematic. Microsoft let them do it, focusing more on promoting their efforts than denigrating Apple’s products.

This stance confused some, why didn’t they bite back? It was on a long past episode of Diggnation that Alex Albrecht summed it up, saying in short that Microsoft didn’t even want to acknowledge Apple as a competitor. Doing that would give Cupertino market credibility. Now it seems that enough is enough, and Microsoft is finally fighting back.

Redmond has launched a website to discuss Mac versus PC that deals some serious blows to Apple, whether or not they are valid is up to you. Roughly broken into large sections, Microsoft says this

Having Fun: Macs Might Spoil Your Fun

Simplicity: Macs Can Take Time To Learn

Working Hard: Macs Dont Work As Well At Work Or At School

Sharing: Macs Don’t Like To Share

Compatibility: Macs Might Not Like Your PC Stuff

Choice: Macs Don’t Let You Choose

Read further here…

Tech Jives is proudly sponsored by CED Solutions!

Game designer legend Al Lowe creator of Leisure Suit Larry and many other hit games will be LIVE on Tech Barbarians TONIGHT 6pm PST / 9pm EST!

Come join Chris Pope and Mark Eoff this Saturday LIVE for what is sure to be an exciting episode of Tech Barbarians!

When? 9PM(Eastern Time) / 6PM (Pacific Time)

Where? http://watch.techjives.net

Prizes? OH HECK YES!!

1. $25 Best Buy Gift Certificate courtesy of the world leading computer certification training company CED Solutions

2. Multiple autographed 5.25 inch original Leisure Suit Larry 5 floppy disks!

3. A signed Sierra On-Line game manual

4. Possibly even more to be announced signed items! (Keep an eye on Chris Pope’s Twitter feed to find out more about prizes!)

Check out this recent interview with Al!

“In-Depth: Al Lowe Talks Early-Days Adventure Genre Challenges In New Book”

Winner of the lifetime Achievement Apple Moofie Awards!

Want to know more about Al Lowe?

“I was born a poor black child in Gumbo, Missouri…” –that’s how Al Lowe usually opens his résumé. And although it is not true (say what?), it’s an excellent introduction for a man whose passion is humour. “The world’s oldest computer games designer” (Lowe on Lowe) not only spent well over a decade writing funny games, he might well have introduced humour to computer games at all — with the creation of Leisure Suit Larry.

Not that Al Lowe wouldn’t have tried to practise an honest profession. He worked as High School Music Teacher for 15 years. During that time, he got his hands on an Apple II, taught himself to program, and figured that it was time for a career change. So a very talented (and yet unspoiled) Al Lowe spent his nights on creating his first programs — educational software for children. When the publisher Sierra bought the rights to these titles in 1982, it took the man as well.

Lowe was employed as to his qualifications, and humour was not yet considered one of them. Instead, Lowe continued to work on edutainment titles. When Sierra acquired a license to some Disney characters, he helped create programs like “Winnie Pooh in the Hundred-Acre Woods,” “Mickey’s Space Adventure” and “Donald Duck’s Playground.” Being something of a jack-of-all-trades, he filled in various positions on various projects: lead programmer (King’s Quest III and IV, Police Quest I), composer (King’s Quest II, Space Quest II), even interface designer on Sierra’s very own database program “HomeWord Filer.” He is also one of the fathers of The Sierra Network (1991). By 1984, Lowe got the chance to write, design and program his own graphic adventure game, “The Black Cauldron.”Target audience: still kids. But that was to change in 1987.

In 1987, Al Lowe gave birth to the most notorious, single-minded game character there is: Larry Laffer. A born loser constantly on the look-out for women, Larry instantly conquered the hearts (and certain other organs) of gamers everywhere. Besides being daringly explicit for its time, “Leisure Suit Larry in the Land of the Lounge Lizards” was also full of humour. These two major innovations–being the first adult graphic adventure and the first comedy game–made LSL 1 a classic and (probably more important for Al) a best-seller. See the trivia section of the game entry for an extensive quote on the development of Leisure Suit Larry.

After that, Al Lowe spent most of his years continuing the saga of Larry Laffer. He created five additional games for a total of six, ending with episode seven. Puzzled? Check out the trivia section for Leisure Suit Larry 5 to unravel the mystery of the missing adventure. Between episodes, he managed to design the western comedy“Freddy Pharkas: Frontier Pharmacist” (1993) and the parents-plus-children fantasy adventure, “Torin’s Passage” (1995). By 1999, plans were made to send Larry Laffer into his eighth game. Puzzled again? “Larry’s Casino,” a hybrid of Larry’s humour and Hoyle’s games, came out in 1998. But “Leisure Suit Larry 8: Lust in Space” was not meant to be.

As the 90s were nearing their end, so were traditional “flat” adventure games. If there was to be a Leisure Suit Larry 8, it had thus to be in 3D. Games like “Grim Fandango” had already taken the first step into the new dimension. Al Lowe was ready to go, too; however, Sierra was not. The company had just suffered through a year of bad sales. As the costs for each project were growing in the millions, the meagre earnings were far from sufficient to cover the expenses — even for the titles already in production. Without the necessary money, the decision to fund a Larry 8 was delayed several times. Finally, the debts grew too high. The costs had to be cut — severely. In February 1999, Sierra not only closed its Yosemite Studios, it laid off Al Lowe. After 16 years of working for one company, Lowe was ready for retirement.

Al Lowe is since enjoying his private life. Completely unlike his creation, the ever-searching Larry Laffer, Lowe is a family man; he’s living in Seattle with his wife Margaret and his two children, Brian and Megan. He is known to be an excellent saxophonist; he regularly plays in several Seattle jazz bands. For a sample of his skill, listen to the title theme of Leisure Suit Larry 7 (see also Larry 1 trivia on the origin of the song). Lowe is also known to be an enthusiastic golf player. In his free time (i.e. most of the day), he tends to his own website, www.allowe.com, which you should definitely pay a visit if you’re interested in the history of Leisure Suit Larry. Lowe also tries to make the world a happier place by managing the mailing list CyberJoke 3000™. That he’s qualified for this job should be proven by the following excerpt from an interview with “The Armchair Empire,” which I just can’t help to quote:

Q: If you knew you had ten minutes to live, how would you use the time?

A: Borrowing money.

Q: How would you want your obituary to read?

A: “That guy owed everybody!”

Sophos Security Threat Report Mid-2010

By Graham Cluley at Sophos.com

Sophos has today published the mid-year update to its 2010 Security Threat Report, revealing the latest trends and findings from the world of cybercrime.

Read the official press release here.

I’m doing my bit to promote the report’s findings, having been transported into the oasis of cool known as the Soho Hotel in London, a short hop and a skip from media companies such as Momentum Films, 20th Century Fox and Paul McCartney’s MPL Communications.

Sadly my glamorous career doesn’t extend as far as making a cameo performance in a Bruce Willis disaster movie or playing the piccolo on Macca’s next album – instead, I’m esconsed in a comfy chair discussing SEO poisoning, fake anti-virus, and state-sponsored cybercrime.

Here are some of the topics we explore in the latest report:

As was mentioned in today’s press release about the report, when we look back over the last six months it’s clear that state-sponsored cybercrime has become a particularly hot topic.

For the rest of the threat report, visit Graham Cluley’s blog at Sophos.com

‘StarCraft II’ sales top 1.5 million in first 48 hours

Blizzard Entertainment says their highly-anticipated strategy title StarCraft II: Wings of Liberty sold 1 million copies within the first 24 hours of its release.

In a statement issued Tuesday, the studio revealed 1.5 million copies of the game were scooped up in the first 48 hours, making it the fastest-selling strategy title ever.

“We’re pleased that so many people around the world have already picked up a copy of the game, and we look forward to welcoming even more players to Battle.net in the weeks and months ahead,” says Blizzard co-founder and CEO Mike Morhaime in a statement.

For more, visit USA Today’s Game Hunters

5 ways to use bootable Linux live discs

Live CDs, DVDs or USB drives let you run Linux without actually installing it. Here are five reasons why you should.

By Logan Kugler – July 20, 2010 06:00 AM ET

Computerworld – In the almost 20 years since Linux was first released into the world, free for anyone to use and modify however they like, the operating system has been put to a lot of uses. Today, a vast number of servers run Linux to serve up Web pages and applications, while user-friendly versions of Linux run PCs, netbooks, and even Android and WebOS phones.

One incredibly useful way that Linux has been adapted to the needs of modern computer users is as a “live CD,” a version of the operating system that can be booted from a CD (or a DVD or, in some cases, a USB drive) without actually being installed on the computer’s hard drive. Given the massive RAM and fast CPUs available on even the lowest-end computers today, along with Linux’s generally lower system requirements compared to Windows and Mac OS X, you can run Linux quite comfortably from a CD drive.

Live discs allow you to radically transform the nature of the machine you’re working on — without modifying the installed operating system and software at all. There are a number of reasons you might want to do this. The most obvious is to test a new version or different distribution of Linux before deploying it, saving yourself the surprise of incompatible software or nonfunctional hardware after installation. But even if your business does not plan to deploy Linux as a desktop or server operating system, there are still good reasons to have a live Linux CD or two on hand.

Live CDs are great for system diagnosis and recovery when disaster strikes; they’re also useful for securing and testing your network. And for road warriors, the ability to boot up a familiar, customized operating system on any machine, anywhere in the world, has an obvious attraction — as do specialized live distributions designed to provide security and anonymity for workers with sensitive data or communications to protect.

Live discs are read-only, which means they’re quite secure, since malware can’t make any changes to the core system. If you do get an infection, it disappears as soon as you reboot.

Here are five ways to use live Linux in your business, as well as pointers to distributions best suited to each particular task.

1. Test-drive Linux

Over the years, Linux has developed from a usability nightmare into a fairly straightforward desktop operating system. With professional-quality productivity tools like OpenOffice.org for creating documents, spreadsheets and presentations and GIMP for image editing, as well as versions of familiar applications such as Firefox, Thunderbird, Adobe Reader and Flash, most common business tasks can be done pretty easily on a Linux system.

You can see how well adapted Linux is to your business by running several of the most popular desktop distributions from a live CD. Perhaps the most refined and user-friendly desktop system available right now is Ubuntu, which includes just about every application you could ever ask for, from business productivity apps to programs for multimedia editing, Web design, running databases, serving up Web pages and chatting online.

Ubuntu, one of the most popular desktop Linux distros available, comes preloaded with the open-source office suite OpenOffice.org.

Ubuntu’s installation disk is itself a live CD, so if you decide to install the system later you can just run the installer from the Ubuntu desktop.

2. Recover aging hardware

Linux in general has lower system requirements than other contemporary operating systems, but there are a few distributions that are specially designed to take advantage of old, even ancient, computer hardware, letting you squeeze a few more years of life out of systems you wouldn’t even think of running Windows on — including machines with broken hard drives.

Both Damn Small Linux (DSL) and Puppy Linux are designed for older systems, requiring only a Pentium 486 or equivalent CPU and 128MB of RAM to run well. DSL can even run with just 64MB of RAM. Both launch a usable, if somewhat stripped down, user interface that’s perfect for tasks like sending and receiving e-mail, creating documents and surfing the Web — in other words, basic administrative tasks.

Puppy Linux (upper left) and Damn Small Linux are optimized for older hardware, turning ancient machines into functional workstations.

For the rest of Mr. Kugler’s excellent post, visit Computerworld.com

10 types of system administrators you’ll encounter in the field

  • Date: July 17th, 2010
  • Author: Justin James

The world of IT is filled with interesting characters. System administrators are human just like the rest of us, and some have such standout personalities that we remember them for a long time. Here is a humorous look at 10 types of sys admins you may encounter in the wild. You might even find yourself on the list.

Note: This article is also available as a PDF download.

1: Over-caffeinated Man

We all know that IT departments require caffeine as a critical resource. It’s right up there with electricity and paychecks in terms of getting things done. But a few system administrators take this a bit too far. They drink so much coffee they’re constantly changing from an unstoppable ball of energy to a morose sack of caffeine withdrawal. This type is easily spotted by the innumerable brown stains on their shirts (soda or coffee) and their wild, bloodshot eyes.

2: Rebel Without a Clue

Ever meet the administrator who acts as if the company is the enemy instead of the employer? I know I’ve met a few. These admins treat the spare parts shelf as a treasure trove to be raided whenever their personal PC breaks down. They constantly work around the rules when they don’t like them. And they badmouth management to anyone who will listen. Trying to get a project done with them makes you feel like being a character in a Hunter S. Thompson book: You keep expecting something to explode or to be deported. While it can be fun watching them at work for a few minutes, spending more than five minutes with these rebels can possibly get you fired.

3: Your Data Is My Gossip Mill

Yes, the system administrator has access to all of the data on the network. But one kind of sys admin delights in actually taking a look at data all over the network, looking for juicy tidbits to start rumors. You’ll know if there is one of these around pretty quickly. They will start using phrases from your reports and emails in conversations with you to let you know that they know what you have been doing with your PC. Your best defense is either to be fastidiously proper in your use of company resources or to embark on a ruthless campaign of disinformation aimed at exposing these admins to others for the snakes they are. Planting false evidence in a file named Super-Secret Merger Plans should do the trick.

4: The Otaku

“Otaku” is Japanese for someone who is obsessive about a particular item. It’s like a geek gone to the ultimate degree, but specialized on one particular topic. Many sys admins take the geek trait of curiosity too far and end up deep into Otaku-land. Otakus are increasingly difficult to spot. As IT becomes more and more assimilated into mainstream corporate culture, the Otakus have a harder time expressing themselves in the workplace.

5: Flower Power

An increasingly rare breed of system administrators still thinks it is 1967. And it shows. These men and women come to the office wearing bell-bottom jeans, tie-dyed shirts, and patchouli oil. Chances are, they became interested in computers sometime around the Moon Race. They can be a ton of fun to be around, with far-out stories and knowledge of the history of computers, as only someone who was there can tell it. Sadly, these hippies-turned-geeks are retiring now, and their wealth of knowledge will soon be lost for good.

For the rest of the list, visit TechRepublic.com

Create a 3-D Hologram With Your iPad

N-3D DEMO from aircord on Vimeo.

Screw video conferencing. Toss out those 3-D glasses. We just got one step closer to making portable holographic videos a reality (something we’ve all been waiting for ever since the first Star Wars flick came out back in 1977). This new demo from Japan-based creative team Aircord labo uses nothing more than a glass prism (with “special film”), a projector, and an iPad to create a 3-D display that runs on OpenFrameworks and MaxMSP (you can download the program files here). Think that’s pretty badass? So do we. But wait, there’s more! With an installed application, the program can also respond to sound, making the 3-D holovid display interactive.

The simplicity and accessibility of this design is what makes it most exciting to us. We can’t wait to see what happens when the OpenFrameworks community takes hold of this thing and takes it for a joy ride. How long do you think it’ll be before holovids are on the iPhone? We give it 5 years.

[via CreativeApplications.net]

Wired How-To: Software Licensing Audit

The following steps describe how to:

1. Identify what software is installed on every node in your network;

2. Match all that software to licenses;

3. Get the audit reports.

  1. You need to download the trial version of Network Inventory Advisor: http://clearapps.com/download/network_inventory_advisor.exe (please copy-paste this link into your browser and start the download).  Trial version of NIA is available 15 days and allows to scan up to 25 nodes in your network. (You can use the coupon code to get a full version of NIA with 20% OFF, it is still valid: TWNBH-PIA9 🙂
  2. Install the latest build of Network Inventory Advisor and launch the application. Follow a Scanning Wizard and after several minutes you will discover all software installed in your network.
  3. To view network software licensing audit data go to “Network Summary” at the left tree menu. After, click “All software” tab and you will get clear report about installed software licenses on each PC in your network.

Now you can easily identify what is installed where, control software installations & lower the costs of licensing by finding gaps between software on your nodes and the licenses possessed; or re-using unused software licenses.

This page was last modified 11:48, 17 July 2010 by kellyroberts.