Posts belonging to Category Social Media



Court orders LimeWire to cease file-sharing business

P2P software maker had been accused by music industry of enabling massive piracy

by Jaikumar Vijayan

Oct 26, 2010 07:15 pm | Computerworld

In a major victory for the music industry, a New York federal judge has ordered embattled P2P software maker LimeWire to immediately and permanently stop distributing and supporting its file-sharing software.

In a 17-page injunction (PDF document) issued on Tuesday, Judge Kimba Wood of the U.S. District Court for the Southern District of New York ordered LimeWire to cease the searching, downloading, uploading, file trading and file distribution functionality of LimeWire’s P2P file-sharing software.

The injunction instructed LimeWire to immediately communicate the court’s decision to all users of the software and to all of the company’s employees, principals and other stakeholders. It gave the company 14 days to report back to the court on the steps LimeWire has taken to comply with the order.

A spokeswoman for the company today stressed that the court’s order does not mean that LimeWire is shutting down and said that it only prevents LimeWire from distributing or supporting its P2P software.

It does not prohibit the company from going ahead with its previously announced plans to launch a subscription based music service and neither does it prohibit the company from operating its online store, the LimeWire spokeswoman said.

“While this is not our ideal path, we hope to work with the music industry in moving forward,” the spokeswoman said by e-mail. “We look forward to embracing necessary changes and collaborating with the entire music industry in the future.”

The court injunction is a huge victory for the Recording Industry Association of America (RIAA), which has been trying to get the court to shut down LimeWire for quite some time.

The RIAA and the music labels it represents have accused LimeWire and its chief executive, Mark Gorton, of willfully enabling widespread copyright infringement.

For more, visit Computerworld.com

Four New Ways to Customize Your LinkedIn Profile

Customization and variety are key to making your LinkedIn profile stand out and get you recognized by recruiters. Check out these four new profile sections that do just that.

By Kristin Burnham – Wed, October 20, 2010

CIO — With more than 80 million registered users worldwide, making your profile stand out among LinkedIn’s crowd can be difficult. That’s why the professional social network has rolled out a number of features to help you get noticed: LinkedIn Apps give hiring managers a better peek into your work life; reordering your profile sections gives you more control over what you deem is important; and Company Follow gives you an inside look at companies’ business opportunities and job leads.

Now, LinkedIn has added an element to its site with a handful of new profile sections you can selectively add to your profile. Among those in the “Add Sections” part of LinkedIn are Publications, Languages, Skills and Certifications.

“These are most valuable for job seekers, passive candidates open to new opportunities, and consultants,” says Nathan Kievman, owner of the LinkedIn group Linked Strategies and host of weekly LinkedIn webinars. “Variety in a profile provides you the opportunity to stand out and showcase your talents that otherwise may not come up in everyday conversations, business dealings or interviews.”

Kievman also notes that LinkedIn is possibly rolling out these features to benefit recruiters. “It will provide more search results for recruiters to enhance their search for qualified clients. This is LinkedIn’s number-one revenue stream, so it makes sense that they would push these tools out there,” he says.

[Want more LinkedIn tips, tricks and analysis? Check out CIO.com’sLinkedIn Bible.]

To find the new profile sections, choose Profile > Edit Profile. Below your main profile box will be the “Add sections” button. The new profile sections will appear after your work experience. [Click here to learn how to reorder your profile sections.] Read on for a look at four of the new profile sections.

1. Certifications

LinkedIn is including a new section specifically to highlight any certifications you might have earned—ITIL, Six Sigma or PMP certifications, for example. You’ll be required to include the name of the certification in the form; you can also add the certification authority, license number and expiration date, too, if you want.

For the rest of the list, visit CIO Online

When IT is asked to spy

IT managers are being put in the awkward position of monitoring fellow employees.

By Tam Harbert – October 11, 2010 06:00 AM ET

Computerworld – It’s 9:00 in the morning, or 3:00 in the afternoon, or even 10:00 at night. Do you know what your users are up to? More than ever, IT managers can answer, “Oh, yes.”

As corporate functions, including voice and video, converge onto IP-based networks, more employee infractions are happening online. Employees leak intellectual property or trade secrets, either on purpose or inadvertently; violate laws against sexual harassment or child pornography; and waste time while looking like they’re hard at work.

In response — spurred in part by the need to comply with stricter rules and regulations — organizations are not only filtering and blocking Web sites and scanning e-mail. Many are also watching what employees post on social networks and blogs.

They’re collecting and retaining mobile phone calls and text messages. They can even track employees’ physical locations using the GPS feature on smartphones.

More often that not, IT workers are the ones asked to do the digital dirty work, primarily because they’re the people with the technical know-how to get the job done, says Nancy Flynn, executive director of The ePolicy Institute, a Columbus, Ohio-based consultancy that helps companies establish Internet and computer usage policies.

Statistics are hard to come by, but Flynn and other industry observers agree that monitoring and surveillance are becoming a bigger part of IT’s job.

Michael Workman, an associate professor at the Florida Institute of Technology who studies corporate IT security and employee behavior, estimates that monitoring responsibilities take up at least 20% of the average IT manager’s time.

Yet most IT professionals never expected they’d be asked to police their colleagues and co-workers in quite this way. So, how do they feel about this growing responsibility?

For the rest of this article, visit Computerworld.com

Interview with Jet Set Games, the makers of “Highborn” and “Who’s Buying?” on Tuesday Oct. 12, 2010

The Apptastic iGame Review will be interviewing Jet Set Games on Tuesday Oct. 12, 2010! Jet Set Games are the makers of some very popular titles dominating the Apple App store right now!

Come join Amy Elk, Chris Pope, and Justin Laura as we welcome Jet Set on our show! These guys have also graciously agreed to give away some promo codes while on the show with us! Rade Stojsavljevic and Joseph Hewitt will be hanging with the Apptastic crew for the interview.

Rade Stojsavljevic
Co-founder & President

Joseph Hewitt
Creative Director

You fans of awesome mobile games out there might known them as the makes of one of the be turn based games on the market, “Highborn

Highborn is a casual, turn-based strategy game, perfect for gaming on the go, or for anyone looking for an intelligent, tactical experience without the frenetic play of a traditional real-time strategy game.

Another really fun game published by Jet Set is a game called “Whos Buying?

Who’s Buying™ features three multiplayer games of skill and chance that determine who coughs up the cash to pay for your swingin’ lifestyle.

With a style and soundtrack straight from the South Pacific, Who’s Buying may even inspire a round of Mai Tais or Piña Coladas.


Main Jailed Over Facebook ‘Friend’ Requests

Published August 17, 2010| FoxNews.com

It’s not a crime to make friends on Facebook, but one Florida man found that the rules are a bit different when the person you’re trying to “friend” has a protective order against you.

The man, 54-year-old Harry Bruder, was arrested for allegedly sending his soon to be ex-wife requests to “friend” him on Facebook, which police said violated the protective order, MyFoxOrlando.com reported.

A police report posted on thesmokinggun.com shows Bruder admitting he contacted his wife twice last month on the popular social networking site — and admitting that he changed the password to his wife’s e-mail account. The couple has been separated for two years.

Bruder violated a domestic violence injunction obtained by his wife, officials say. Bruder allegedly lashed out because he was upset over having to attend court-ordered counseling sessions.

For more, visit Foxnews.com

Apple says it has patch for remote attack on iPhone, iPad

Apple is quietly wrestling with a security conundrum. How the company handles it could dictate the pace at which cybercriminals accelerate attacks on iPhones and iPads. Apple is hustling to issue a patch for a milestone security flaw that makes it possible to remotely hack —or jailbreak — iOS, the operating system for iPhones, iPads and iPod Touch.

The patch is completed, Apple spokeswoman Natalie Kerris said in an interview. But Kerris said on Friday that she was not able to give a time frame for its public release. Jailbreaking refers to hacking iOS to download Web apps not approved by Apple. This used to be difficult. This spring, a website came along called JailbreakMe.com that made it trivial to jailbreak your own iPhone or iPad. Last week, a technique for remote jailbreaking appeared on the site. It’s now possible to access the operating system of an iPhone or iPad owned by someone else.

An attacker would get “fairly complete control of affected devices,” says Michael Price, an operations manager for McAfee Labs. No such attacks are known to have happened yet, he says. For the moment, the most visible concern for Apple has been pranksters going into Apple and Best Buy retail stores and jailbreaking display models, according to tech blog Engadget. Yet, the security and privacy issues are serious.

Security experts expect the pattern that has come to dominate the PC world to begin to permeate smartphones. Bad guys continually flush out new security flaws in PCs, then tap into them to launch malicious attacks. Good guys, meanwhile, scramble to patch and block.

Now, cybercriminals are rapidly adapting PC hacking techniques to all smartphone platforms, including Symbian, Google Android, Windows Mobile, RIM BlackBerry and Apple iOS.

“It’s a brand new game with new rules,” says Dror Shalev, chief technology officer of DroidSecurity, which supplies protection for Google Android phones. “We’re seeing rapid growth in threats as a side effect of the mobile Web app revolution.”

IPhones, in particular, have become a pop culture icon in the U.S., and now the iPad has grabbed the spotlight. “The more popular these devices become, the more likely they are to get the attention of attackers,” says Joshua Talbot, intelligence manager at Symantec Security Response.

Apple’s problem is singular. The company has made a big deal about hiding technical details of iOS, allowing only approved Web apps to tie in. This tight control initially made it easier to keep iOS secure. But now Apple may have to share iOS coding with anti-virus firms, says Sorin Mustaca, development manager for anti-virus firm Avira.

Read more here…

Tech Jives is proudly sponsored by the worlds leader in IT certification training, CED Solutions!

Microsoft Launches PC v. Mac Website And Talks Some Serious Smack

By Alex Wilhelm Follow Alex Wilhelm on twitter on August 9th, 2010

It may be long overdue, but Microsoft is finally coming out swinging against the rise of OS X. Apple has long played the underdog against the giant, writing Microsoft off as stodgy, technologically backward, and problematic. Microsoft let them do it, focusing more on promoting their efforts than denigrating Apple’s products.

This stance confused some, why didn’t they bite back? It was on a long past episode of Diggnation that Alex Albrecht summed it up, saying in short that Microsoft didn’t even want to acknowledge Apple as a competitor. Doing that would give Cupertino market credibility. Now it seems that enough is enough, and Microsoft is finally fighting back.

Redmond has launched a website to discuss Mac versus PC that deals some serious blows to Apple, whether or not they are valid is up to you. Roughly broken into large sections, Microsoft says this

Having Fun: Macs Might Spoil Your Fun

Simplicity: Macs Can Take Time To Learn

Working Hard: Macs Dont Work As Well At Work Or At School

Sharing: Macs Don’t Like To Share

Compatibility: Macs Might Not Like Your PC Stuff

Choice: Macs Don’t Let You Choose

Read further here…

Tech Jives is proudly sponsored by CED Solutions!

Game designer legend Al Lowe creator of Leisure Suit Larry and many other hit games will be LIVE on Tech Barbarians TONIGHT 6pm PST / 9pm EST!

Come join Chris Pope and Mark Eoff this Saturday LIVE for what is sure to be an exciting episode of Tech Barbarians!

When? 9PM(Eastern Time) / 6PM (Pacific Time)

Where? http://watch.techjives.net

Prizes? OH HECK YES!!

1. $25 Best Buy Gift Certificate courtesy of the world leading computer certification training company CED Solutions

2. Multiple autographed 5.25 inch original Leisure Suit Larry 5 floppy disks!

3. A signed Sierra On-Line game manual

4. Possibly even more to be announced signed items! (Keep an eye on Chris Pope’s Twitter feed to find out more about prizes!)

Check out this recent interview with Al!

“In-Depth: Al Lowe Talks Early-Days Adventure Genre Challenges In New Book”

Winner of the lifetime Achievement Apple Moofie Awards!

Want to know more about Al Lowe?

“I was born a poor black child in Gumbo, Missouri…” –that’s how Al Lowe usually opens his résumé. And although it is not true (say what?), it’s an excellent introduction for a man whose passion is humour. “The world’s oldest computer games designer” (Lowe on Lowe) not only spent well over a decade writing funny games, he might well have introduced humour to computer games at all — with the creation of Leisure Suit Larry.

Not that Al Lowe wouldn’t have tried to practise an honest profession. He worked as High School Music Teacher for 15 years. During that time, he got his hands on an Apple II, taught himself to program, and figured that it was time for a career change. So a very talented (and yet unspoiled) Al Lowe spent his nights on creating his first programs — educational software for children. When the publisher Sierra bought the rights to these titles in 1982, it took the man as well.

Lowe was employed as to his qualifications, and humour was not yet considered one of them. Instead, Lowe continued to work on edutainment titles. When Sierra acquired a license to some Disney characters, he helped create programs like “Winnie Pooh in the Hundred-Acre Woods,” “Mickey’s Space Adventure” and “Donald Duck’s Playground.” Being something of a jack-of-all-trades, he filled in various positions on various projects: lead programmer (King’s Quest III and IV, Police Quest I), composer (King’s Quest II, Space Quest II), even interface designer on Sierra’s very own database program “HomeWord Filer.” He is also one of the fathers of The Sierra Network (1991). By 1984, Lowe got the chance to write, design and program his own graphic adventure game, “The Black Cauldron.”Target audience: still kids. But that was to change in 1987.

In 1987, Al Lowe gave birth to the most notorious, single-minded game character there is: Larry Laffer. A born loser constantly on the look-out for women, Larry instantly conquered the hearts (and certain other organs) of gamers everywhere. Besides being daringly explicit for its time, “Leisure Suit Larry in the Land of the Lounge Lizards” was also full of humour. These two major innovations–being the first adult graphic adventure and the first comedy game–made LSL 1 a classic and (probably more important for Al) a best-seller. See the trivia section of the game entry for an extensive quote on the development of Leisure Suit Larry.

After that, Al Lowe spent most of his years continuing the saga of Larry Laffer. He created five additional games for a total of six, ending with episode seven. Puzzled? Check out the trivia section for Leisure Suit Larry 5 to unravel the mystery of the missing adventure. Between episodes, he managed to design the western comedy“Freddy Pharkas: Frontier Pharmacist” (1993) and the parents-plus-children fantasy adventure, “Torin’s Passage” (1995). By 1999, plans were made to send Larry Laffer into his eighth game. Puzzled again? “Larry’s Casino,” a hybrid of Larry’s humour and Hoyle’s games, came out in 1998. But “Leisure Suit Larry 8: Lust in Space” was not meant to be.

As the 90s were nearing their end, so were traditional “flat” adventure games. If there was to be a Leisure Suit Larry 8, it had thus to be in 3D. Games like “Grim Fandango” had already taken the first step into the new dimension. Al Lowe was ready to go, too; however, Sierra was not. The company had just suffered through a year of bad sales. As the costs for each project were growing in the millions, the meagre earnings were far from sufficient to cover the expenses — even for the titles already in production. Without the necessary money, the decision to fund a Larry 8 was delayed several times. Finally, the debts grew too high. The costs had to be cut — severely. In February 1999, Sierra not only closed its Yosemite Studios, it laid off Al Lowe. After 16 years of working for one company, Lowe was ready for retirement.

Al Lowe is since enjoying his private life. Completely unlike his creation, the ever-searching Larry Laffer, Lowe is a family man; he’s living in Seattle with his wife Margaret and his two children, Brian and Megan. He is known to be an excellent saxophonist; he regularly plays in several Seattle jazz bands. For a sample of his skill, listen to the title theme of Leisure Suit Larry 7 (see also Larry 1 trivia on the origin of the song). Lowe is also known to be an enthusiastic golf player. In his free time (i.e. most of the day), he tends to his own website, www.allowe.com, which you should definitely pay a visit if you’re interested in the history of Leisure Suit Larry. Lowe also tries to make the world a happier place by managing the mailing list CyberJoke 3000™. That he’s qualified for this job should be proven by the following excerpt from an interview with “The Armchair Empire,” which I just can’t help to quote:

Q: If you knew you had ten minutes to live, how would you use the time?

A: Borrowing money.

Q: How would you want your obituary to read?

A: “That guy owed everybody!”

Probably the greatest Internet story we’ve heard in some time.

By Brad McCarty – on July 4th, 2010

By now you’ve probably realized the immense power that social media can have. However, it isn’t often that we’re witness to exactly what can happen when a direct mission is undertaken by a single site. In this case, the mission was to repair a reputation, and the site is Reddit.

As a back story, a popular Reddit user named CarlH was the victim of an Internet smear campaign after a business deal gone wrong. For five years he had dealt with losing clients and eventually his company.  A couple of weeks ago, he turned to the users of Reddit to clear his name.

In a post to the popular social news site, he stated his case and then made his plea to the other users.  His sole question was whether or not anything could be done.  In answer, the users of Reddit went to work.  Posts were put up, around the Internet, linking to legitimate information about CarlH and his business.  Within 12 hours, the #1 listing in Google (which happened to be the misinformation about CarlH) had been replaced by a real, relevant site.

How powerful was the force behind this movement?  Apparently,  it held enough weight to place the user’s name into the 5th most searched term on Google, on June 30th.  According to a follow-up post by the user:

Enough searches were done to result in the automated creation of over 200,000 new web-pages containing my name.  And here we are on July 4th and finally, after five years, that lie is completely gone from the first 5 pages of search results on Google and all other search engines, and it seems to be dropping more every day. Further, many other pages containing my name now rank high on Google, including automatically generated pages that have nothing to do with me, as well as pages about other individuals who share my name. Nothing negative therefore stands out against me.

Read the rest of this blog at The Next Web

AppRiver Threat Landscape



AppRiver Threat Landscape: Quarter 1 and 2, 2010

By N DePofi June 29th 2010

AppRiver, the Gulf Breeze Florida based web security and email company, has issued a new report titled “AppRiver notes: Threat & Spamscape report Special 6-Month Edition: June 2010,” briefly covering online threats the company has monitored over the last six months.

Highlights of the report include the one-year anniversary of the Conflicker worm, phishing and spear phishing attacks based on natural disasters, carbon credits, lawsuits, the IRS and the FIFA World Cup.  The report includes a breakdown showing the origin of the 26 billion spam emails blocked by AppRiver in the first half of 2010, and the source region of both spam and malicious email messages, with the United States topping the spam chart at 2.5 billion spam emails, and Europe topping the Malware chart with 44.7%.

Virus activity has also been heavy for the six months reported, with AppRiver noting that more than 45 million virus messages had been blocked in the thirty days prior to the reports publication, or more than one out of every ten emails scanned.

In March, AppRiver blocked over five thousand emails purporting to contain information regarding a lawsuit with a link to a file named complaint.rtf, the link led to another file called complaint_docs.pdf, which actually contained a  Trojan.Dropper.

Scams masquerading as IRS messages utilized tokens to customize emails based on the recipient contained a link to a page with a download link to an .exe file. The file actually installed ZeuS, a phish-kit that is used to steal banking information.

” The Zeus crimeware toolkit has been around now for some time and is well established in the underground economy as being an easy-to-use and powerful tool for stealing personal data from remote systems. Initially linked to a group of criminals known as the “Rock Phish” group and targeting worldwide financial institutions, the toolkit has since become widely available both for sale and for free on underground forums.” (Peter Coogan “Zeus, King of the Underground Crimeware Toolkits” August 25th, 2009)

Other attacks that used ZeuS in the first half of 2010 included FaceBook, MySpace, UPS, DHL, the Royal Mail in the UK, and the Canada Post. ZeuS was prolific enough that US-CERT released a bulletin on March 17th, 2010.

One variation of an older attack style, named the ‘419 scam’ after Article 419 of the Nigerian Criminal Code (Advanced Fee Fraud), also known as the Nigerian Prince scam, started in January 2010 and targed FIFA World Cup fans.  These attacks claim that the recipient has won the Online Web Lottery held in South Africa in support of the World Cup, with a prize of one million dollars. The email contained a link to what looked to be an online gaming site, though most of the links were merely images, the ‘live help’ link led to a form asking for personal details. These details could be used to aid criminals in stealing the user’s identity.