You are here: > Resources > Computers & Information Technology

Computers & Information Technology

Categories underneath Computers & Information Technology:

Search only Computers & Information Technology, and everything underneath:

Articles and Resources

199 Articles and Resources. Go to:  [Previous 50] [Next 50]   [End]

Date Resource Read it at:
May 22, 2007 Mr. Know-It-All: Shopping on eBay, Kosher Downloading, Fibbing on IM

QUOTE: When I'm shopping on eBay, is it OK to use a "sniping" service — automated ware that swoops in to place my (winning) bid in the last few seconds?

May 18, 2007 Net Censorship on the Rise: Twenty-five out of 41 governments studied block or filter Net content, says a survey by the university-backed OpenNet Initiative (ONI)

QUOTE: Twenty-five out of 41 governments studied block or filter internet content, according to a survey carried out by OpenNet Initiative (ONI), which is made up of groups at Cambridge University, Harvard Law School, Oxford University and the University of Toronto. This compares to just a few countries filtering content five years ago, said the researchers. The governments are not just blocking websites but also services and applications such as Google Maps or Skype.

May 18, 2007 Salesforce Ignores Office Compatibility Issue

QUOTE: Customers migrating to Vista and Office 2007 are bound to run into the occasional compatibility problem with their existing applications. But while that's to be expected, one reader has been flabbergasted to find that seems to have no inclination to fix a compatibility problem that he and other customers have encountered between Salesforce and Office 2007.

May 17, 2007 Sales Practices at Dell Draw New York Suit

QUOTE: Mr. Cuomo said the suit, which was filed in Albany County Supreme Court, accuses Dell of using bait-and-switch financing methods and of failing to provide customers with adequate support and repair services. More specifically, he said, Dell failed to provide repair service to customers who bought contracts for onsite and expedited service.

New York Times
May 10, 2007 College Kid Learns Lesson About Dell's Warranty

QUOTE: What is it about Dell and schools? Last year we had a story (see "Dell Gets a Failing Grade in School") about the failure rate of Dell computers in a high school. Now our recent discussions about useless extended warranties prompted another reader to relate his experience with a Dell intended for use at college.

May 09, 2007 Court: Googling an employee's name is not a federal offense: Fired employee said his right to 'to fundamental fairness' was violated

QUOTE: In his appeal, Mullins contended that Valeria Capell, the Commerce Department official who was assigned to investigate the allegations against him, violated his "right to fundamental fairness" by using information about his prior work history that was gleaned from a Google search on Mullins' name. Information from the search engine showed that Mullins had been fired from the Smithsonian Institution and from a civil service job with the U.S. Air Force.

May 07, 2007 Yar! Why Web Pirates Can't Be Touched

QUOTE: Based in Stockholm, The Pirate Bay serves as a massive worldwide hub for copyright infringement but is shielded by its home country's lax copyright laws. The site lives in a comfortable legal loophole, one of many available to Web sites that offer users copyrighted content.

May 07, 2007 Paid Verizon Bills Don't Always Stay Paid

QUOTE: It's a good idea to check your monthly phone and Internet bills to make sure the vendor isn't running up too many gratuitous charges. This apparently goes double with Verizon, as two different readers have recently discovered that Verizon's bogus charges can include bills that you've already paid.

May 04, 2007 Banned From YouTube?: Conservatives Perceive YouTube Bias, Launch New Video-Sharing Site

QUOTE: Railing against YouTube, two Republican White House veterans have launched QubeTV as a conservative alternative. ... [They insist] YouTube banned a video by conservative blogger Michelle Malkin about radical Islamists.

May 02, 2007 Digg Embroiled In HD DVD Controversy: The posting of a code that decrypts HD DVD format DRM caused plenty of uproar at the social news site when Digg administrators took down posts and banned accounts

QUOTE: The final word on the HD DVD encryption key on Digg comes from its most well-known Digger, co-founder Kevin Rose: But now, after seeing hundreds of stories and reading thousands of comments, you’ve made it clear. You’d rather see Digg go down fighting than bow down to a bigger company. We hear you, and effective immediately we won’t delete stories or comments containing the code and will deal with whatever the consequences might be. If we lose, then what the hell, at least we died trying.

May 02, 2007 Digg's Dilemma

QUOTE: Encryption codes like the one revealed on Digg are covered by the 1998 Digital Millennium Copyright Act, a notoriously murky piece of legislation. Complicating the issue is the question of whether Digg should be treated as a publication, responsible for content uploaded by users, or simply as a platform for their speech.

Apr 30, 2007 Googling For Grand Larceny

QUOTE: Here's how the potential crime was supposed to work: Searches for business- and car-related words produced ads next to search results for legitimate pages like and the Better Business Bureau's Web site. But when users clicked on those ads, Exploit Prevention says they were first redirected to a Russian site called That site would download a program onto the user's machine before sending them on to their destination site. When users later visited one of a hundred major banking sites the software was designed to target, the program would spy on them using a "post-logger," a program that inserts fake entry fields into Web sites and records passwords.

Apr 30, 2007 Phone Taps in Italy Spur Rush Toward Encryption

QUOTE: What has spurred encryption sales is not so much the legal wiretapping authorized by Italian magistrates — though information about those calls is also frequently leaked to the press — but the widespread availability of wiretapping technology over the Internet, which has created a growing pool of amateur eavesdroppers.

New York Times
Apr 30, 2007 How Safe Is That Free Wi-Fi Connection?: "Hotspots" Are Handy but They're Not Always Safe

QUOTE: As wireless networks and "hot spots" for free wireless Internet service become mainstays of life, so does the likelihood of hackers "spoofing" wireless network nodes to take advantage of unsuspecting users. Sending unencrypted information over any unfamiliar network can turn your computer into an open book -- with pages full of your personal information.
Apr 30, 2007 Condemned To Google Hell

QUOTE: Google Hell is the worst fear of the untold numbers of companies that depend on search results to keep their business visible online. Getting stuck there means most users will never see the site...And getting out can be next to impossible--because site operators often don't know what they did to get placed there.

Apr 24, 2007 Spy Act Only Protects Vendors and Their DRM

QUOTE: Here we go again. Congress has decided it needs to protect us from spyware, but - surprise, surprise - the bill they are most seriously considering actually offers no help in that regard. What's worse, the bill seems designed to make it harder for you to legally go after those who spy on you, particularly if they are doing so to determine if you're authorized to use a software product.

Apr 19, 2007 Advocates Sue Yahoo In Chinese Torture Case

QUOTE: A human rights group sued Yahoo on Wednesday, accusing the Internet giant of abetting the torture of pro-democracy writers by releasing data that allowed China's government to identify them.

Washington Post
Apr 18, 2007 Police target the hacker next door

QUOTE: They hunch over laptops in their cars on neighbourhood streets, tapping into other people's wireless broadband connections for some free time online, and are fast becoming criminals of the internet age.

Guardian Unlimited
Apr 18, 2007 Open Wi-Fi blamed in child porn case (Police Blotter)

QUOTE: In a worst-case scenario, it isn't hard to imagine someone using another person's unsecured wireless connection to send child porn to the FBI, and then watch the agents show up and seize the target's computers and perhaps arrest the person in the process.
Apr 16, 2007 Comcast Silently Terminates Broadband Customers

QUOTE: Cable giant Comcast continues its practice of cutting off service -- often without warning -- when high-speed Internet customers exceed an unstated download limit. But while Comcast tries to stay mum about these terminations, its customers are making more and more noise to try to force the company to explain what its policies really are.

Apr 12, 2007 Massive spam shot of 'Storm Trojan' reaches record proportions

QUOTE: Arriving with subject headings touting Worm Alert!, Worm Detected, Spyware Detected!, Virus Activity Detected!, the spam carries a ZIP file attachment posing as a patch necessary to ward off the bogus attack. The ZIP file, which is password protected -- the password is included in the message to further dupe recipients -- actually contains a variant of the "Storm Trojan" worm, which installs a rootkit to cloak itself, disables security software, steals confidential information from the PC and adds it to a bot army of compromised computers.

Apr 10, 2007 A Macro Vision of Defective DRM

QUOTE: What do you when Digital Rights Management (DRM) keeps you from using a product that you legitimately purchased? Who can help you figure out how to make it work - the publisher of the material, the manufacturer of the playing device, or the DRM supplier? Those were the questions one reader had after he discovered that three DVDs that couldn't all play in his computer were all "protected" by Macrovision DRM.

Apr 09, 2007 Cybereye | Should DHS get the keys to the kingdom?

QUOTE: The issue of who holds signing keys has until recently been pretty much an academic one. DNSSEC has been around since 1999, but — largely because of scalability problems — it had been impractical to deploy until a revised version of the scheme was approved in 2006. DHS has a program to encourage the use of DNSSEC, but the Internet community has been slow to adopt it. A good part of the problem is the chicken-and-egg conundrum. DNSSEC has to be widely deployed before there is any advantage to it, and there is no incentive to deploying it if there is not an immediate advantage. But that might be changing, with the U.S. government leading the way, as DNSSEC becomes a requirement under the Federal Information Security Management Act.

Federal Citizen Information Center (FCIC)
Apr 09, 2007 Mexican Drug Cartels Leave a Bloody Trail on YouTube

QUOTE: Elizalde's narco-ballad video and its aftermath highlight a new surge of Internet activity by Mexican drug cartels, whose mastery of technology gives them a huge advantage over law enforcement agencies. Following the model of terrorist groups such as al-Qaeda, the cartels have discovered the Web as a powerful means of transmitting threats, recruiting members and glorifying the narco-trafficker lifestyle of big money, big guns and big thrills.

Washington Post
Apr 09, 2007 A Call for Manners in the World of Nasty Blogs

QUOTE: The conversational free-for-all on the Internet known as the blogosphere can be a prickly and unpleasant place. Now, a few high-profile figures in high-tech are proposing a blogger code of conduct to clean up the quality of online discourse.

New York Times
Apr 05, 2007 No privacy in home PC brought to work (Police blotter)

QUOTE: City treasurer in Oklahoma protests warrantless search of his personally owned computer after a police inspection allegedly discovered child pornography. Outcome: Appeals court rules in favor of police search of computer brought into the office, and the treasurer is sentenced to more than six years in federal prison.
Mar 26, 2007 China's Latest Export Scare: Spam: In the No. 1 junk e-mailing country in Asia, mainland business can't afford not to fight. Here's the latest on the battle to control it

QUOTE: the Chinese government and its affiliated agencies have been proactive and are working with Spamhaus to stem the spam tide, but many of the same problems persist.

Mar 20, 2007 Licensing Logjam Holds Back Veritas Customer

QUOTE: As we've seen, many of my readers harbor some resentment for what Symantec has done with the Norton product line over the years. But now one reader is wondering if the same won't someday be the case with Symantec's acquisition of Veritas, particularly after the licensing fiasco he's just experienced with Backup Exec.

Mar 19, 2007 Bad Bots Breeding at Blogger?

QUOTE: According the security firm Fortinet, Google’s is being used extensively in both phishing attacks and to propagate malware. In some cases the traffic to the sites is being driven by “a variant of the Stration mass mailer” worm a Fortinet security note warns.

Mar 16, 2007 How Secure Is Your Domain?: Problems at shed light on loose oversight of Net addresses

QUOTE: Now a messy fight...for control has brought RegisterFly to its knees and prompted angry calls for better oversight of the Web registry industry.

Mar 15, 2007 A Stray Gateway Lemon

QUOTE: Just like with cars, sometimes a computer will turn out to be a lemon. While computer manufacturers rarely handle that situation very well, the experience one reader is having right now with a bad Gateway eMachines desktop is deserving of special attention. Not only is Gateway failing to fix it, they can't even seem to find it long enough to send it back to her.

Mar 14, 2007 Cyber-Criminals Getting Bolder

QUOTE: Online crime is easier, in part because tools for carrying out attacks are readily available and harder to purge from computers. Moreover, for consumers like Hoyler, there is often no surefire way to know how or what information has been stolen. Notifying individual victims is time-intensive and expensive, and law enforcement agencies and credit bureaus say it's not their job.

Washington Post
Mar 14, 2007 Computer logs as alibi in wife's death (Police blotter)

QUOTE: Douglas Plude, convicted of his wife's murder, says computer logs provide an alibi. Plude, who lived in Wisconsin, claims his expert had insufficient time before trial to review them.
Mar 13, 2007 SueTube?

QUOTE: Viacom alleged that YouTube only blocks specific clips and that it makes no effort to block slightly altered copies of the same videos...

Mar 12, 2007 Surf At Your Own Risk

QUOTE: McAfee says more than 10% of all Web sites registered out of Tokelau, identifiable by the ".tk" at the end of their Web address, will expose users to spam, viruses and spyware.

Mar 09, 2007 Music Industry Lobbies Colleges: Campus Network Access Targeted

QUOTE: The recording industry is dusting off an old tactic in its never-ending effort to crack down on pirated music: Target the college kids.

Washington Post
Mar 08, 2007 Adobe Tackles Photo Forgeries

QUOTE: The push follows a media scandal over a doctored war photograph published by Reuters last year. The news agency has since announced that it's working with both Adobe and Canon to come up with ways to prevent a recurrence of the incident.

Mar 04, 2007 U.S. Royalty Rates Hit Webcasting

QUOTE: On Friday, which is generally accepted in public relations circles as the best day of the week to release controversial news, the United States Copyright Royalty Board (image to the right) announced new royalty rates for webcasts, effective from 2006 to 2010.

Mar 02, 2007 Prepay and Pay More With Earthlink

QUOTE: When you pay an Internet provider for a year's worth of service in advance, you would expect that would mean you'd wind up paying less. But one reader recently discovered that using Earthlink's prepay option worked out to a much higher rate than advertised.

Feb 28, 2007 Patently Bad Move Gags Critics

QUOTE: Guess what? Radio frequency identification tags are insecure. But don't demonstrate the technology's problems at a security conference. If you do, HID Global, a manufacturer of access-control devices, might sue you for patent infringement.

Feb 28, 2007 Lawmakers Tout DMCA Killer

QUOTE: The Boucher and Doolittle bill, called the Fair Use Act of 2007, would free consumers to circumvent digital locks on media under six special circumstances. Librarians would be allowed to bypass DRM technology to update or preserve their collections. Journalists, researchers and educators could do the same in pursuit of their work. Everyday consumers would get to "transmit work over a home or personal network" so long as movies, music and other personal media didn't find their way on to the internet for distribution.

Feb 22, 2007 10 Things Your Blogger Won't Tell You

QUOTE: Bloggers don't just use links to promote themselves; they can also manipulate search results to make their enemies look bad.

Smart Money
Feb 22, 2007 Glossary of Internet scam terms

QUOTE: Here are 14 words the [Internet] scammers don't want you to know.
Feb 22, 2007 10 ways to guard against cybercriminals

QUOTE: stay-safe security tips that will help protect you -- and your computer -- from thieves hunting your money and personal information.
Feb 22, 2007 Malware will spread through instant messaging

QUOTE: Threats via instant messaging will hit the spotlight in 2007...
Feb 22, 2007 Attacks using Web 2.0 will increase

QUOTE: Cybercrooks can hide malicious content in legitimate-appearing downloads, lure users off-site through fake profiles and links or create worms...
Feb 22, 2007 Cybercriminals use 'bots' to scam

QUOTE: Bot programs can perform automated tasks on users' computers without their knowledge.
Feb 22, 2007 Top Internet scams to watch for in 2007

QUOTE: cybercriminals can profit off consumers in a host of ways whether they're stealing money or information.
Feb 20, 2007 A conversation with … Diana DeGarmo

QUOTE: Teenage "American Idol" contestant Diana DeGarmo worked hard to prepare herself for success in show business. Unfortunately, one less ambitious fan decided to help herself to DeGarmo's bank account the easy way: by stealing her identity.
Jan 30, 2007 Apple Ordered To Pay Legal Fees For Bloggers: A California court made it clear to Apple that if the company wanted to find out who leaked details of an in-development product to bloggers...

QUOTE: The case brought up several important questions related to the status of the blogosphere: Do bloggers qualify as journalists? Can blogs be considered news sites? Does a private company have the right to suspend the protection of journalistic sources guaranteed by the First Amendment?


199 Articles and Resources. Go to:  [Previous 50] [Next 50]   [End]