Wednesday, April 04, 2007
intel vPro
Kodak's cheap inkjet claims all talk?
HP to launch new PC brand this year
Friday, February 02, 2007
Install Any SATA Hard Drive Into The PS3 (Because You Can?)
Japan's Kurouto Shikou insists that the 60GB hard drive found in the PS3 is too small. (It's from Japan, of course it's small.) To that end they've designed a SATA and eSATA slot for the system that lets you install third-party hard drives. You have to remove the built-in hard drive before installing the slot, but afterward your options are limited to however much you can spend on hard drives. (They're fairly cheap, by the way.)
Will the PS3 recognize all that extra storage space (unlike the Xbox 360, which can only access 20GB per hard drive, despite the latest hacks), and does it make sense to go to all that trouble to install a larger hard drive in the first place? Maybe if you're dumping Blu-ray movies left and right, otherwise, right now, this looks to be more trouble than it's worth. – Nicholas Deleon
Product Page (in Japanese) [Kurouto Shikou via Akihabara News]
How to Crack a Windows Password With a Live CD
Adam over at Lifehacker has a problem. His wife locks up all his porn on a Windows machine that only she knows the password to. That's why Adam came up with a guide to easily crack a Windows password using the Ophcrack Live CD.
It's extremely simple. All you have to do is stick in the CD, pick the account you want to crack, and it'll start churning away. Useful if you have to break into a departed co-worker/wife/child/lover's machine. Or your own machine if you're an idiot and forget your password.
p.s. I made up that story about Adam. He keeps his porn on his own machine. – Jason Chen
Screenshot Tour: How to crack a Windows password with Ophcrack Live CD [Lifehacker]
Lets eat less
If you grow weary of those cumbersome USB flash drives you've been lugging around (most weigh about 10g), here's one that sheds nearly all of its weight. The Transcend JetFlash T2K weighs just 2 grams, and is available in your choice of capacities from 1GB ($15.90) to 4GB ($48.30).
Judging from the size of microSD cards the size of a baby's fingernail, we knew this was coming. The T2K isn't so small you would lose it in your pocket, but it's not big, either—it's just 1.6 inches tall and a mere 3mm thick. Can they get smaller than this? Probably. – Charlie White
Product Page [Transcend, USA]Nba Sidekick
If you're a fan of NBA sensation Dwyane Wade of the Miami Heat, you might be interested in D-Wade's limited-edition Sidekick 3 that he designed himself. He's been an avid user of the Sidekick since 2004, and designed this Sidekick 3 to look like the interior of a luxo-sport automobile, further personalizing it with his own number 3 showing up on the 3G smartphone in glittering gold.
It has the innards of the stock Sidekick 3, but D-Wade has chosen a swank white, tan and gold exterior with a special basketball-textured back for easy gripping. Just don't slam-dunk it, D-Wade. No pricing information was available, but this looks like it would command a sizable premium over an ordinary Sidekick 3.
It's got back, too. Take a jump shot for a gander at its basketball-like dorsal side:Free Wi-Fi for Vista users
Looking for a reason to make the leap to Windows Vista? If you spend your days sipping lattes while surfing the Net, this deal may push you toward early adoption. T-Mobile is offering three free months of Wi-Fi access for Vista users at any of its HotSpot locations. (Hot spot operator The Cloud is running a similar promotion in the U.K.) If you are paying month to month for Wi-Fi at your local Starbucks or Borders, it amounts to a savings of $120 over the three months (the offer ends April 30). That's half the sticker price of Windows Vista Home Premium.
Disclaimer: Spending more time at Starbucks may result in spending more money given Starbucks prices.
Update: Engadget did a little searching and found a way to glom onto T-Mobile's free trial without having to pony up for Vista first. Unfortunately, Google has yet to spit out the answer for knocking back a Venti mocha latte without first paying $8.
Apple Making Future iPods Hot Unpluggable
Monday, January 22, 2007
The Linux Foundation forms, issues call to arms
Read- Press release [Via TG Daily]
Read- NY Times coverage [Via ZDNet]
Apple planning to charge Tiger users for Boot Camp?
[Via Slashdot]
Parallels to turn it around, help Mac OS onto generic PC boxen
Srorm Worm
The Trojan, named "Storm Worm" by antivirus vendor F-Secure, first started to spread on Friday as extreme storms engulfed Europe. The e-mail claimed to include breaking news about the weather, in an attempt to get people to download an executable file.
Over the weekend there were six subsequent waves of the attack, with each e-mail attempting to lure users into downloading an executable by promising a topical news story. There were e-mails that purported to carry news of an as-yet-unconfirmed missile test by the Chinese against one of its weather satellites, and e-mails reporting that Fidel Castro had died.
Each new wave of e-mails carried different versions of the Trojan horse, according to F-Secure. Each version also contained the capability to be updated, in an attempt to stay ahead of antivirus vendors.
"When they first came out, these files were pretty much undetectable by most antivirus programs," said Mikko Hypponen, director of antivirus research at F-Secure. "The bad guys are putting a lot of effort into it--they were putting out updates hour after hour."
As most businesses tend to strip executable files out of e-mails they receive, Hypponen said he expected that companies would not be overly affected by the attacks.
However, F-Secure said that hundreds of thousands of home computers could have been affected across the globe.
Once a user downloads the executable file, the code opens a backdoor in the machine which that it to be remotely controlled, while installing a rootkit that hides the malicious program. The compromised machine becomes a zombie in a network called a botnet. Most botnets are currently controlled through a central server, which--if found--can be taken down to destroy the botnet. However, this particular Trojan horse seeds a botnet that acts in a similar way to a peer-to-peer network, with no centralized control.
Each compromised machine connects to a list of a subset of the entire botnet--around 30 to 35 other compromised machines, which act as hosts. While each of the infected hosts share lists of other infected hosts, no one machine has a full list of the entire botnet--each has only a subset, making it difficult to gauge the true extent of the zombie network.
This is not the first botnet to use these techniques. However, Hypponen called this type of botnet "a worrying development."
Antivirus vendor Sophos called Storm Worm the "first big attack of 2007," with code being spammed out from hundreds of countries. Graham Cluley, senior technology consultant for Sophos, said the company expected more attacks over the coming days, and that the botnet would most likely be hired out for spamming, adware propagation, or be sold to extortionists to launch distributed denial-of-service attacks.
The recent trend has been toward highly targeted attacks on individual institutions. Mail services vendor MessageLabs said that this current malicious campaign was "very aggressive," and said that the gang responsible was probably a new entrant to the scene, hoping to make its mark.
None of the anti-malware companies interviewed said they knew who was responsible for the attacks, or where they had been launched from.
Tom Espiner of ZDNet UK reported from London.
Cisco fesses up to iPhone WIP300 GPL failings, is "taking steps"
[Via The Inquirer]
Read - Cisco's iPhone violates GPL, expert says
Read - Cisco responds