Why "Verified By Visa" System Is Insecure
My Chase MC and Visa required this to be setup and crazy passwords too, which I can't recall. I rarely use my Chase cards anymore as a result.
Broadband Rights & the Killer App of 1900
Had he the money to run that wire, perhaps he should have bought up the land near it first. If I buy a house because of the view, I know that the view could change quickly if I do not know the property. Even if I do, imminent domain can still change it.
Also, doesn't DirecPC, Hughesnet, and others cover like 99.9% of the entire USA with Internet? The exception being where you can't get line of site with the satellites?
Method To Repair Damaged Adult Nerves Discovered
So does this go beyond repair? Can the nerves be enhanced? For example, not everyone is built the same...down...there... Not everyone is as sensitive as the other. So could this technology be used to create new nerves?
Just image a new wave of spam!
Lifecycle Energy Costs of LED, CFL Bulbs Calculated
So it is winter where I live. Normally the heat from all my incandescent lights heat up my place a bit. This is where a lot of the waste is of the incandescent lights.
Most of the lights I have are now CFL. So while it is true the CFL is using less power, am I not compensating by using more power at my electric furnace?
Does the net power difference (savings) take into consideration that fact?
Netbooks Have Higher Failure Rate Than Laptops
Many notebooks had failures related to faulty nVidia chips, including Mac's. I wonder if that is inflating these stats?
Feds Bust Cable Modem Hacker
Doesn't it seem that one should place the bandwidth controls at the central office, and not at the customers site?
You have less control of the uplink (from someones home to the Internet) by placing bandwidth restrictions it at the central office, however you would also have tighter control of the bandwidth from the Internet to the customer. You also remove the issue where the customer an circumvent your controls because the hardware is in their hands.
Seems this would also help assist in the problem previously mentioned here about allowing Torrents to use more local bandwidth by allowing more bandwidth between an ISP's customers.
An Inbox Is Not a Glove Compartment
Doesn't Echelon already index all SMTP traffic anyway? I understand that this is yet another government agency trying to get at e-mail. Wasn't the DHS to allow the sharing of such information though?
Companies To Invade Your Retinas As Soon As Next Year?
A girl I knew over 10 years a go had a 3D set of these hooked to her computer. I walked around her house during a party with them on, playing Doom in 3D. You turned your head to control your movement.
It was pretty cool seeing Doom in 3D projected in the room in front of me.
So how is this new technology? What's new about it? That this version is not 3D? That the resolution is 800 wide and not 320 pixels wide?
Of Encrypted Hard Drives and "Evil Maids"
For that matter, the guys video taping the room to sell you and your wife's activities to that voyeur site aims the camera at your laptop, watches your keystrokes, and boom - he has all you passwords you type in. Banking? PayPal? E-Mail.
You really need to use both a password and a physical device. Such as RSA tokens. My bank offers this for online banking. I have several for different things.
EU Paves the Way For Three-Strikes Cut-Off Policy
This would pave the way to mesh networking. No ISPs. Right now, mesh is in it's infancy. 10 years from now, people will be rolling their own mesh inter-network to get to these resources.
Affordably Aggregating ISP Connections?
We use BGP to combine multiple circuits into a single bound circuit. We have outbound and inbound traffic working over this.
We have the routers set to not cache routing. But you can't expect to turn two 1.5Mb/s T1's into the same thing as true 3Mb/s connection. It is close, but a single video stream is only going to traverse one of the two T1's. A P2P download will use all 3Mb/s.
If all you really want is to speed up outbound connections (not inbound to a webserver for example) you can use something like a ZyXel 100 or 50. They have load balancing built in;
EFF Warns TI Not To Harass Calculator Hobbyists
Ok, so what's likely really going on is that the device has a fixed cost and they sell the same device with different feature sets (software) at different prices.
Hobbyist have figured out how to buy the cheaper device and load the more expensive software, right?
If not, then WTF? TI's making the same profit on the device weather it was tinkered with or not. Learn from LinkSys. The WRT54G was being hacked to install DDWRT. LinkSys saw the value in this. When they released a new version of the WRT54G which no longer had the capacity for DDWRT, they released the WRT54GL aimed specifically at loading up DDWRT.
Embrace you customers, don't sue them! I realize suing them looks good on the books, and the 1 year term CEO can take the bonus and run before the long term results hit. But thinking like that will destroy a company.
Revisiting the Original Reviews of Windows Vista
I disagree. We are on XP now, however we plan to move to Windows 7 EE as we roll out new machines.
With the EA including App-V in the MDOP, most anything which will not run in Windows 7 should run through App-V. We are finding that more of our applications work under Windows 7 without modification than did under Vista. Windows 7's system requirements are less than that of Vista. Add a 2008 R2 server and you get branch cache. There are no compelling reasons to stay with XP on a new PC now, however there features in Windows 7 which would be quite beneficial.
Comcast's War On Infected PCs (Or All Customers)
One way to partially address this issue, with users approval, is to offer a cheaper Internet connection which only allows for outbound connections.
Many customers have no need for inbound communications to their PC. As an option, provide them with an RFC1918 aka 192.168.x.x address, and let them save $5/mo.
This traffic would pass through the ISP's NAT firewall and would not support UPNP.
This would free up some IPv4 space for re-use by the ISP, and this would eliminate some BOTNET C&C. Obviously not all.
Another piece to this is to offer an alternate DNS service. Something like what OpenDNS and DynDNS are offering. Perhaps rebrand one of those services. These service track malware DNS and block them.
It's doesn't solve all the problems with Malware, but it does address several issues. It does place your non P2P customers into a separate offering, allowing you to bill P2P customers more. P2P customers would never go for this offering.
Using Aluminum Oxide Paint To Secure Wi-Fi
Where I am there is some WIFI (hidden or not) on every channel. There are large broadcast towers about half a mile from me which have various Internet over 802.11B from service providers.
My WIFI in my home has a hard time with all this. This paint would be a good way for me to improve my in home signal. A lot of my equipment doesn't support the new 5Ghz of 802.11N, so while I have 802.11N APs they do not help much.
How To Save $1 Trillion a Year With Open Source
That is true as of this moment, in my opinion. However, if everyone switched to open source then the open source movement would have a lot more money infused in it (open source is not free) and things would quickly change. More people would get certifications, more people would learn to support it through college courses.
In the long term, things would be different than they are now.
Up To 9% of a Company's Machines Are Bot-Infected
We have an eSafe gateway with the antimalware/antispam piece which does stop communications with known malware sites and botnet controllers. I point that out as a solution to this problem. There are others.
Published Google Docs To Appear In Search Engines
A large number of the e-mail viruses I see have links to a Google Groups site, which then play a video or have other embedded content that utilizes and exploit to try and load malware. Often, XP Antivirus and the variants. Many of these are showing up in Google results too.
What do you think are the odds that exploited documents will be published to these documents too?
$2,000 Bribe Bought Password To DC P.O. System
Do you have remote access capabilities onto your Network? VPN, Citrix, not blocking GotomyPC? Has anyone at your company done the same thing, offering the competition direct access to your systems?
The Perils of Ramming Products Down IT's Throat
We run VMWare ESX in cluster mode with vMotion. We also have Citrix's XEN on a couple of boxes. We also have Microsoft's Hyper-V. Each has their pros and cons.
I'm not sure why using Hyper-V is a horrible decision. There are some excellent benefits to using it. For example, if you purchase 2008 Datacenter edition, you can run unlimited Windows 2008 guests on that one physical server. It is licensed per core, so load it with 6 way cores. You can end up with a very inexpensive solution to server consolidation, relatively speaking.
With Xen and VMWare you have to purchase each server guest a license. Microsoft doesn't allow the licensing benefits to flow into VMWare or Citrix XEN. In fact, you basically can't run SQL Server in VMWare ESX due to the insane license requirements of Microsoft. For example, if you go with SQL per processor license and give the VM Guest 1 of 20 cores on the server, you still have to license all 20 cores in your per processor license to be legal. Until recently, vMotion required each Windows Server guest to have a Windows Server license for each physical host, even if it on only one at a time.
Vendor lock in, baby.
ACMENEWSLLC has no journal entries.