1. This site uses cookies. By continuing to use this site, you are agreeing to our use of cookies. Learn More.

*HOT* Tech News And Downloads, I Would Read This Thread And Post Any Good Info

Discussion in 'Safety valve' started by ireland, Jan 28, 2006.

Thread Status:
Not open for further replies.
  1. ireland

    ireland Active member

    Joined:
    Nov 28, 2002
    Messages:
    3,451
    Likes Received:
    15
    Trophy Points:
    68
    FREE,PhotoRec,data recovery software

    Do you need to recover some pics erroneously deleted from your digital camera flash memory? This tool is for you.

    PhotoRec is file data recovery software designed to recover lost files including video, documents and archives from Hard Disks and CDRom and lost pictures (Photo Recovery) from digital camera memory. PhotoRec ignores the filesystem and goes after the underlying data, so it'll work even if your media's filesystem is severely damaged or formatted. PhotoRec is safe to use, it will never attempt to write to the drive or memory support you are about to recover lost data from.



    What makes interesting this tool is that it's able to retrieve data also from damaged CD/DVD discs. Obviously, not all damaged discs are recoverable, and also the drive used have its importance, because some drives have better error correction capabilities ;)

    Another interesting feature is that this tool is portable, i.e. it doesn't need to be installed and can run from any folder and also from a USB memory stick.

    Whoever is interested can find more information here.

    Source: PhotoRec


    PhotoRec is file data recovery software designed to recover lost files including video, documents and archives from Hard Disks and CDRom and lost pictures (Photo Recovery) from digital camera memory. PhotoRec ignores the filesystem and goes after the underlying data, so it'll work even if your media's filesystem is severely damaged or formatted. PhotoRec is safe to use, it will never attempt to write to the drive or memory support you are about to recover lost data from.

    PhotoRec is free, this open source multi-platform application is distributed under GNU Public License. PhotoRec is a companion program to TestDisk, an app for recovering lost partitions on a wide variety of filesystems and making non-bootable disks bootable again. You can download them from this link.

    Operating systems

    PhotoRec runs under

    * DOS/Win9x
    * Windows NT 4/2000/XP/2003
    * Linux
    * FreeBSD, NetBSD, OpenBSD
    * Sun Solaris
    * Mac OS X

    and can be compiled on almost every Unix system.


    Filesystems

    Photorec ignores the filesystem, this way it works even if the filesystem is severely damaged.
    It can recover lost files at least from

    * FAT,
    * NTFS,
    * EXT2/EXT3 filesystem
    * HFS+

    ReiserFS includes some special optimizations centered around tails, a name for files and end portions of files that are smaller than a filesystem block. In order to increase performance, ReiserFS is able to store files inside the b*tree leaf nodes themselves, rather than storing the data somewhere else on the disk and pointing to it. Unfortunately, PhotoRec isn't able to deal with this, it's why it doesn't work well with ReiserFS.
    Media

    PhotoRec works with HardDisks, Cdrom, Compact Flash, Memory Stick, SecureDigital, SmartMedia, Microdrive, MMC, USB Memory Drives...
    PhotoRec has been successfully tested with the following Digital Camera

    * Canon EOS300D, 10D
    * HP PhotoSmart 620, 850, 935
    * Nikon CoolPix 775, 950, 5700
    * Olympus C350N, C860L, Mju 400 Digital, Stylus 300
    * Sony DSC-P9
    * Praktica DCZ-3.4
    * Casio Exilim EX-Z 750


    Known file format

    PhotoRec searches known file header and because there is no data fragmentation (usually), it can recover the whole file. Photorec recognises numerous file format including ZIP, Office, PDF, HTML, JPEG and various graphics file formats. The whole list of file formats recovered by PhotoRec contains more than 80 file extensions.

    http://www.cgsecurity.org/wiki/PhotoRec

    DOWNLOAD LINK
    http://www.cgsecurity.org/wiki/TestDisk_Download
     
  2. ireland

    ireland Active member

    Joined:
    Nov 28, 2002
    Messages:
    3,451
    Likes Received:
    15
    Trophy Points:
    68
    RIAA: filing cases by the media

    p2pnet.net News:- The Big Four Organized Music cartel routinely treats the people its owners rely wholly upon, the people who buy their product, with utter contempt, almost loathing.

    "Consumers owe us a living," say Warner Music, Vivendi Universal, EMI and Sony BMG, in effect, also declaring, "Every man, woman and child, is a potential criminal and thief who'll rob us blind unless they're forcibly prevented from doing so."

    Teams of lawyers around the world working through various Big Four 'trade' units such as the RIAA have all manner of sly tricks ready to manipulate mainstream reporters into running stories which present the record labels as hard-pressed, honest, law-abiding companies: as victims instead of perpetrators.

    P2pnet highlighted one of the tricks: 'filing' supposed court documents through the media without going anywhere near a court. The idea is to, "publicly harrass and humiliate the defendants in the on- and offline print and electronic, media" we said.

    Says Ars Technica:

    According to RIAA filings, Michelle Santangelo, 20, has admitted to illegal downloading at the age of 16. Robert Santangelo, 16, was implicated by his best friend, who said that the two traded copyrighted songs online. An RIAA spokesperson said that "it is unfortunate that this case has reached this stage. [...] It is abundantly clear, through their own words and additional evidence, that Michelle and Robert Santangelo, Jr. illegally downloaded hundreds and hundreds of songs."

    Unfortunate? It's exactly what the RIAA was working for.

    But there hadn't been a filing when the Ars Technica item was written, and there still hadn't been at the time of our post today, as far as we could discover.

    It seems incredible that this kind of underhand tactic is permissible, even in the US. But could the same technique be used in Canada, where the Big Four are lobbying unrelentingly to have Canadian copyright laws changed?

    We asked Dr Michael Geist, Canada research chair in internet and e-commerce law at the University of Ottawa.

    "Sure it could happen in Canada," he said. "Plaintiffs are often similarly aggressive in litigation matters and use the media as a key part of their strategy."

    But might it be a petard upon which the RIAA (Recording Industry Association of America) and others of its ilk, such as the CRIA (Canadian Recording Industry Association of America), could be hoist?

    Although there may not be a law prohibiting the release of this information, "there are laws on defamation, libel and slander," says one comment to the story. "Until you file the motion with the court, the accusation is not public record."

    But, "it's quite the opposite" says another. "The language isn't protected UNTIL it's filed with the court."

    It continues:

    Interestingly, at the moment, it may very well be libelous. Once they file it with the court, that protects the language of the *filed* document, but I think it does not protect the publicly-released document retroactively.

    Hmmm . . . I wonder if that's another cause of action against the RIAA, for ALL of the defendants who have found out about their suits in the press? Of course, truth is an ABSOLUTE DEFENSE, so if any defendant settles, or is proven to have done that of which the RIAA has accused them, then no action would be available. The analysis is more complicated than this, so I'll have to consider it further.

    In the meantime, since the RIAA monitors this site closely, let's not give them too much.

    Stay tuned.
    http://p2pnet.net/story/10321?PHPSESSID=dabdc2a066e438e0cddd849b095ea230
     
  3. ireland

    ireland Active member

    Joined:
    Nov 28, 2002
    Messages:
    3,451
    Likes Received:
    15
    Trophy Points:
    68
    IPPR calls to legalise personal copying in UK

    At the moment, anyone in the UK who transfers music they purchased to their MP3 player, such as from CDs to an iPod may not realise that they are infringing copyright law and could be prosecuted under the current law. As a result, the Institute for Public Policy Research (IPPR) is aiming to decriminalise consumers in Britain by requesting a change in the law to allow the private right to copy, since the IPPR argues that personal copying has little impact on copyright holders. Over half of consumers in the UK break copyright law as a result of some form of personal copying and thus it is nonsense having such a law that everyone breaks.

    At present, the UK government is reviewing intellectual property laws and the IPPR is aiming to have an influence with its report "Public Innovation: Intellectual property in a digital age." As music is becoming more widespread as intangible assets, where music is distributed as downloads and often protected with Digital Rights Management (DRM), the report also looks at this area, since DRM affects the ability to preserve this type of content as well as affects its accessibility. As a result, the report asks to allow the British Library to have access to digital content free of DRM and be able to make more than one copy of it. Finally the report also aims to get the government to reject the UK Music Industry's attempt to extend the copyright term for recordings longer than the current 50 years.

    It will be interesting to see if changes to the copyright law would have any effect. For example, even though it is currently illegal to privately transfer music from one device to another, chances are that no one has ever been prosecuted for private home copying. Then again, if the music industry did try to sue one for private copying, such as transferring their personal CD collection to an iPod, this would potentially give the UK music industry a real bad image compared to their current lawsuit campaign against file sharers.

    Thanks to GristyMcFisty for letting us know about this news. More detailed info can be read at the BBC News source here.
    http://news.bbc.co.uk/1/hi/uk/6095612.stm

    http://www.cdfreaks.com/news/IPPR-calls-to-legalise-personal-copying-in-UK.html
     
    Last edited: Nov 6, 2006
  4. ireland

    ireland Active member

    Joined:
    Nov 28, 2002
    Messages:
    3,451
    Likes Received:
    15
    Trophy Points:
    68
    GOOD MORNING TO YE ALL..

    I IS HAVING A LITTLE BREAKFAST


    [​IMG]



     
  5. ddp

    ddp Moderator Staff Member

    Joined:
    Oct 15, 2004
    Messages:
    39,167
    Likes Received:
    136
    Trophy Points:
    143
    that is little!! hate to see what a medium or big breakfast looks like.
     
  6. hawthorne

    hawthorne Member

    Joined:
    Dec 28, 2004
    Messages:
    39
    Likes Received:
    0
    Trophy Points:
    16
    I think that's breakfast, lunch and dinner all in one. But it sure looks good.
     
  7. ireland

    ireland Active member

    Joined:
    Nov 28, 2002
    Messages:
    3,451
    Likes Received:
    15
    Trophy Points:
    68
    ddp on his way to breakfast..

    also now ye will know how ddp checks the threads so fast..

    [​IMG]
     
  8. ireland

    ireland Active member

    Joined:
    Nov 28, 2002
    Messages:
    3,451
    Likes Received:
    15
    Trophy Points:
    68
    RIAA sues multiple sclerosis Mum

    Rae Jay Schwartz

    p2pnet.net News:- Rae Jay Schwartz is a mother in Queen's, New York, who's been seriously disabled by multiple sclerosis, a chronic, crippling disease of the central nervous system.

    It's also known as MS, and there's no known cure but according to EMI, Vivendi Universal, Sony BMG and Warner Music, the members of the Big Four Organized music cartel, Rae Jay is another of the thousands of American mothers who are illicit p2p file sharers distributing copyrighted music online and contributing to the "devastation" the multi-billion-dollar labels claims the practice is visiting upon them.

    She vehemently denies the allegation, telling p2pnet that not only has she never shared a file in her life, until the Big Four came along, she didn't even know what the phrase meant.

    Her name is, however, on an ISP agreement form. And she does have a young daughter who's undoubtedly the real target of the attack by the Recording Industry Association of America, or RIdoubleA, as the Big Four US enforcement unit is infamously known.

    Because it's now SOP for the RIAA to first terrorize the parents of children its lawyers later accuse of uploading and downloading music, as happened with 12-year-old Briana LaHara and Brittany Chan, 13, just two of the RAA's child victims.

    And it's happening today with Michelle and Robert Santangelo whose mother, Patti, was initially accused of being a "massive distributor" of copyrighted music.

    Robert was 12 and Michelle, 16, when this was supposed to have taken place.

    To boost their claims without actually having to prove anything, the RIAA is also using the mainstream media to publicly harrass and humiliate the Santangeo family via a 'court document' which, although it still hadn't been indexed at the time of writing, or seen by the Santangelos or their lawyer, Jordan Glass, was last week freely distributed to the media.

    In the Schwartz case, "The plaintiffs have engaged in a conspiracy to defraud the Courts of the United States," says their lawyer, Ray Beckerman.

    They're doing it, he states, by:

    Bringing lawsuits against people, "who are not known to have infringed copyrights";

    Making, "false and unsupported allegations that the defendants have infringed copyrights";

    Utilizing a corporation known as Settlement Support Center LLC, "to make extortionate threats of criminal action and of defaming defendants' names and credit":

    Conducting ex parte 'John Doe' lawsuits, "which they have no intention of pursuing, but in which they interact with Judges, Magistrates, and other officials on a daily basis, without notice or opportunity to be heard being offered to defendants"; and,

    Bringing the 'John Doe' lawsuits in jurisdictions far removed from the homes of the 'John Does' so they have, "no meaningful opportunity to be heard or to retain counsel of their own choosing; by sending out press releases for the purpose of humiliating, embarrassing, and extorting; and by other unconscionable conduct".

    The Big Four claim files shared equal sales lost, something they've never come even close to demonstrating.

    With file sharing, 'sharing' is the operative word. No money changes hands and no one is deprived of someting they once owned. And yet EMI, Vivendi Universal, Sony BMG and Warner Music accuse the Schwartzes, the Chans, the Santangelos, the LaHaras and al their other innocent victims of being "criminals" and "thieves".

    Recently, in the first ruling of its kind in Europe, Spanish judge Paz Aldecoa threw out a case against an unnamed 48-year-old man who offered and downloaded digital versions of music on the internet. The man was also said to have sent music CDs to people but, "Under Spanish law, a person who downloaded music for personal use couldn't be punished or branded a criminal," said Guatrdian Unlimited, adding:

    "That would imply criminalising socially admitted and widely practised behaviour where the aim is not to gain wealth illegally but to obtain private copies," Aldecoa said in her judgment.

    Under Spanish law, a person who downloaded music for personal use couldn't be punished or branded a criminal, says the story, going on:

    "That would imply criminalising socially admitted and widely practised behaviour where the aim is not to gain wealth illegally but to obtain private copies," Aldecoa said in her judgment.

    Meanwhile, "the bizarre sue 'em all marketing campaign isn't working and every day, more and more people are turning away in disgust, continuing to use the p2p networks and independent music sites for their music downloads," p2pnet posted.

    "And ironically, the existence of the sites is continually publicized and emphasized by the very lawsuits meant to destroy them."

    Stay tuned.

    Also See:
    Briana LaHara - Big Music mobile p2p attack, November 3, 2005
    Brittany Chan - RIAA fails in Chan case, March 22, 2006
    happening today - RIAA goes after Santangelo kids, November 2, 2006
    harrass and humiliate - RIAA: filing cases by the media, November 5, 2006
    first ruling - Music downoads legal in Spain, November 3, 2006
    p2pnet posted - Big Music's survival guide, November 2, 2006

    p2pnet newsfeeds for your site.
    rss feed: http://p2pnet.net/p2p.rss
    Mobile - http://p2pnet.net/index-wml.php

    (Monday 6th November 2006)
    http://p2pnet.net/story/10328?PHPSESSID=4f914f20ce0dedc4987466
     
  9. ireland

    ireland Active member

    Joined:
    Nov 28, 2002
    Messages:
    3,451
    Likes Received:
    15
    Trophy Points:
    68
    HEADS UP ON THIS POST,I SURE WOULD READ

    0-day bug shatters Windows
    Mother, it's happening again
    By John Leyden → More by this author
    Published Monday 6th November 2006 14:30 GMT
    Get The Register's new weekly newsletter for senior IT managers delivered to your inbox, click here.

    Security researchers have identified an unpatched vulnerability in Windows. The flaw - which affects all supported versions of Windows bar Windows 2003 - resides in a security bug in Microsoft XML Core Services, specifically an unspecified security bug in the XMLHTTP 4.0 ActiveX Control.

    The flaw creates a means for hackers to inject malware onto the PCs of surfers running IE who visit a website hosting malicious code that attempts to harness the security bug. Security notification firm Secunia says that the vulnerability is being actively exploited by hackers.

    Microsoft has posted an advisory conceding the problem and suggesting possible workarounds, which basically involve disabling the affected ActiveX control, ahead of the arrival of a patch


    Microsoft Security Advisory (927892)
    Vulnerability in Microsoft XML Core Services Could Allow Remote Code Execution
    Published: November 3, 2006

    Microsoft is investigating public reports of a vulnerability in the XMLHTTP 4.0 ActiveX Control, part of Microsoft XML Core Services 4.0 on Windows. We are aware of limited attacks that are attempting to use the reported vulnerability.

    Customers who are running Windows Server 2003 and Windows Server 2003 Service Pack 1 in their default configurations, with the Enhanced Security Configuration turned on, are not affected. Customers would need to visit an attacker’s Web site to be at risk. We will continue to investigate these public reports.

    Upon completion of this investigation, Microsoft will take the appropriate action to help protect our customers. A security update will be released through our monthly release process or an out-of-cycle security update will be provided, depending on customer needs.

    Customers are encouraged to keep their anti-virus software up to date.

    Microsoft encourages users to exercise caution when they open e-mail and links in e-mail from untrusted sources. For more information about Safe Browsing, visit the Trustworthy Computing Web site.

    We continue to encourage customers to follow our Protect Your PC guidance of enabling a firewall, applying software updates and installing antivirus software. Customers can learn more about these steps at the Protect Your PC Web site.

    Customers who believe they have been attacked should contact their local FBI office or post their complaint on the Internet Fraud Complaint Center Web site. Customers outside the U.S. should contact the national law enforcement agency in their country.

    Customers who believe they may have been affected by this issue can also contact Product Support Services. You can contact Product Support Services in the United States and Canada at no charge using the PC Safety line (1 866-PCSAFETY). Customers outside of the United States and Canada can locate the number for no-charge virus support by visiting the Microsoft Help and Support Web site.

    Mitigating Factors:


    In a Web-based attack scenario, an attacker would have to host a Web site that contains a Web page that is used to exploit this vulnerability. An attacker would have no way to force users to visit a malicious Web site. Instead, an attacker would have to persuade them to visit the Web site, typically by getting them to click a link that takes them to the attacker's Web site.


    An attacker who successfully exploited this vulnerability could gain the same user rights as the logged on user. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights.


    The Restricted sites zone helps reduce attacks that could try to exploit this vulnerability by preventing Active Scripting from being used when reading HTML e-mail messages. However, if a user clicks a link in an e-mail message, they could still be vulnerable to this issue through the Web-based attack scenario.

    By default, Outlook Express 6, Outlook 2002, and Outlook 2003 open HTML e-mail messages in the Restricted sites zone. Additionally, Outlook 2000 opens HTML e-mail messages in the Restricted sites zone if the Outlook E-mail Security Update has been installed. Outlook Express 5.5 Service Pack 2 opens HTML e-mail messages in the Restricted sites zone if Microsoft Security Bulletin MS04-018 has been installed.


    By default, Internet Explorer on Windows Server 2003 runs in a restricted mode that is known as Enhanced Security Configuration. This mode mitigates this vulnerability because ActiveX and Active Scripting are disabled by default.


    General Information

    Overview

    Purpose of Advisory: To provide customers with initial notification of the publicly disclosed vulnerability. For more information see the “Suggested Actions” section of the security advisory for more information.

    Advisory Status: Issue Confirmed, Security Update Planned

    Recommendation: Review the suggested actions and configure as appropriate
    References Identification

    Microsoft Knowledge Base Article


    927892

    This advisory discusses the following software.
    Related Software

    Microsoft XML Core Services 4.0 when installed on Windows 2000 Service Pack 4

    Microsoft XML Core Services 4.0 when installed on Microsoft Windows XP Service Pack 2

    Microsoft XML Core Services 4.0 when installed on Microsoft Windows Server 2003 and Microsoft Windows Server 2003 Service Pack 1
    Top of sectionTop of section

    Frequently Asked Questions

    What is the scope of the advisory?
    Microsoft is aware of a new, publicly disclosed, vulnerability report affecting the XMLHTTP 4.0 ActiveX Control, which is part of Microsoft XML Core Services 4.0. This vulnerability affects the software that is listed in the “Overview” section.

    Is this a security vulnerability that requires Microsoft to issue a security update?
    We are currently investigating the issue to determine the appropriate course of action for customers. We will include the fix for this issue in an upcoming security bulletin.

    What is Microsoft XML Core Services (MSXML)?
    Microsoft XML Core Services (MSXML) allows customers who use JScript, Visual Basic Scripting Edition (VBScript), and Microsoft Visual Studio 6.0 to build XML-based applications that provide interoperability with other applications that adhere to the XML 1.0 standard. For more information regarding MSXML, see the MSDN Web site.

    What might an attacker use this function to do?
    An attacker could host a specially crafted Web site that is designed to exploit this vulnerability through Internet Explorer and then persuade a user to view the Web site. This can also include Web sites that accept user-provided content or advertisements, Web sites that host user-provided content or advertisements, and compromised Web sites. These Web sites could contain specially crafted content that could exploit this vulnerability. In all cases, however, an attacker would have no way to force users to visit these Web sites. Instead, an attacker would have to persuade users to visit the Web site, typically by getting them to click a link in an e-mail message or in an Instant Messenger request that takes users to the attacker's Web site. It could also be possible to display specially crafted Web content by using banner advertisements or by using other methods to deliver Web content to affected systems.
    Top of sectionTop of section

    Suggested Actions

    MORE INFO HERE
    http://www.microsoft.com/technet/security/advisory/927892.mspx
     
    Last edited: Nov 6, 2006
  10. ireland

    ireland Active member

    Joined:
    Nov 28, 2002
    Messages:
    3,451
    Likes Received:
    15
    Trophy Points:
    68
    work around to the above


    Configure Internet Explorer to prompt before running Active Scripting or disable Active Scripting in the Internet and Local intranet security zone.

    You can help protect against this vulnerability by changing your settings to prompt before running Active Scripting or to disable Active Scripting in the Internet and Local intranet security zone. To do this, follow these steps:

    1.


    In Internet Explorer, click Internet Options on the Tools menu.

    2.


    Click the Security tab.

    3.


    Click Internet, and then click Custom Level.

    4.


    Under Settings, in the Scripting section, under Active Scripting, click Promptor Disable, and then click OK.

    5.


    Click Local intranet, and then click Custom Level.

    6.


    Under Settings, in the Scripting section, under Active Scripting, click Promptor Disable, and then click OK.

    7.


    Click OK two times to return to Internet Explorer.

    Note Disabling Active Scripting in the Internet and Local intranet security zones may cause some Web sites to work incorrectly. If you have difficulty using a Web site after you change this setting, and you are sure the site is safe to use, you can add that site to your list of trusted sites. This will allow the site to work correctly.

    Note After you set Internet Explorer to require a prompt before it runs ActiveX controls and/or Active Scripting in the Internet zone and in the Local intranet zone, you can add sites that you trust to the Internet Explorer Trusted sites zone. This will allow you to continue to use trusted Web sites exactly as you do today, while helping to protect you from this attack on untrusted sites. We recommend that you add only sites that you trust to the Trusted sites zone.

    To do this, follow these steps:

    1.


    In Internet Explorer, click Tools, click Internet Options, and then click the Security tab.

    2.


    In the Select a Web content zone to specify its current security settings box, click Trusted Sites, and then click Sites.

    3.


    If you want to add sites that do not require an encrypted channel, click to clear the Require server verification (https:) for all sites in this zone check box.

    4.


    In the Add this Web site to the zone box, type the URL of a site that you trust, and then click Add.

    5.


    Repeat these steps for each site that you want to add to the zone.

    6.


    Click OK two times to accept the changes and return to Internet Explorer.

    Note Add any sites that you trust not to take malicious action on your computer. Two in particular that you may want to add are "*.windowsupdate.microsoft.com" and “*.update.microsoft.com” (without the quotation marks). These are the sites that will host the update, and it requires an ActiveX Control to install the update.

    Impact of Workaround: There are side effects to prompting before running Active Scripting. Many Web sites that are on the Internet or on an intranet use Active Scripting to provide additional functionality. For example, an online e-commerce site or banking site may use Active Scripting to provide menus, ordering forms, or even account statements. Prompting before running Active Scripting is a global setting that affects all Internet and intranet sites. You will be prompted frequently when you enable this workaround. For each prompt, if you feel you trust the site that you are visiting, click Yes to run Active Scripting. If you do not want to be prompted for all these sites, use the steps outlined in "Add sites that you trust to the Internet Explorer Trusted sites zone”.
    Top of sectionTop of section

    Configure Internet Explorer to prompt before running ActiveX Controls or disable ActiveX Controls in the Internet and Local intranet security zone.

    You can help protect against this vulnerability by changing your Internet Explorer settings to prompt before running ActiveX controls. To do this, follow these steps:

    1.


    In Internet Explorer, click Internet Options on the Tools menu.

    2.


    Click the Security tab.

    3.


    Click Internet, and then click Custom Level.

    4.


    Under Settings, in the ActiveX controls and plug-ins section, under Run ActiveX controls and plug-ins, click Prompt or Disable, and then click OK.

    5.


    Click Local intranet, and then click Custom Level.

    6.


    Under Settings, in the ActiveX controls and plug-ins section, under Run ActiveX controls and plug-ins, click Prompt or Disable, and then click OK.

    7.


    Click OK two times to return to Internet Explorer.

    Note After you set Internet Explorer to require a prompt before it runs ActiveX controls and/or Active Scripting in the Internet zone and in the Local intranet zone, you can add sites that you trust to the Internet Explorer Trusted sites zone. This will allow you to continue to use trusted Web sites exactly as you do today, while helping to protect you from this attack on untrusted sites. We recommend that you add only sites that you trust to the Trusted sites zone.

    To do this, follow these steps:

    1.


    In Internet Explorer, click Tools, click Internet Options, and then click the Security tab.

    2.


    In the Select a Web content zone to specify its current security settings box, click Trusted Sites, and then click Sites.

    3.


    If you want to add sites that do not require an encrypted channel, click to clear the Require server verification (https:) for all sites in this zone check box.

    4.


    In the Add this Web site to the zone box, type the URL of a site that you trust, and then click Add.

    5.


    Repeat these steps for each site that you want to add to the zone.

    6.


    Click OK two times to accept the changes and return to Internet Explorer.

    Note Add any sites that you trust not to take malicious action on your computer. Two in particular that you may want to add are "*.windowsupdate.microsoft.com" and “*.update.microsoft.com” (without the quotation marks). These are the sites that will host the update, and it requires an ActiveX Control to install the update.

    Impact of Workaround: There are side effects to prompting before running ActiveX controls. Many Web sites that are on the Internet or on an intranet use ActiveX to provide additional functionality. For example, an online e-commerce site or banking site may use ActiveX controls to provide menus, ordering forms, or even account statements. Prompting before running ActiveX controls is a global setting that affects all Internet and intranet sites. You will be prompted frequently when you enable this workaround. For each prompt, if you feel you trust the site that you are visiting, click Yes to run ActiveX controls. If you do not want to be prompted for all these sites, use the steps outlined in "Add sites that you trust to the Internet Explorer Trusted sites zone”.
    Top of sectionTop of section

    Set Internet and Local intranet security zone settings to “High” to prompt before running ActiveX Controls and Active Scripting in these zones.

    You can help protect against this vulnerability by changing your settings for the Internet security zone to prompt before running ActiveX controls. You can do this by setting your browser security to High.

    To raise the browsing security level in Microsoft Internet Explorer, follow these steps:

    1.


    On the Internet Explorer Tools menu, click Internet Options.

    2.


    In the Internet Options dialog box, click the Security tab, and then click the Internet icon.

    3.


    Under Security level for this zone, move the slider to High. This sets the security level for all Web sites you visit to High.

    Note If no slider is visible, click Default Level, and then move the slider to High.

    Note Setting the level to High may cause some Web sites to work incorrectly. If you have difficulty using a Web site after you change this setting, and you are sure the site is safe to use, you can add that site to your list of trusted sites. This will allow the site to work correctly even with the security setting set to High.

    Note After you set Internet Explorer to require a prompt before it runs ActiveX controls and/or Active Scripting in the Internet zone and in the Local intranet zone, you can add sites that you trust to the Internet Explorer Trusted sites zone. This will allow you to continue to use trusted Web sites exactly as you do today, while helping to protect you from this attack on untrusted sites. We recommend that you add only sites that you trust to the Trusted sites zone.

    To do this, follow these steps:

    1.


    In Internet Explorer, click Tools, click Internet Options, and then click the Security tab.

    2.


    In the Select a Web content zone to specify its current security settings box, click Trusted Sites, and then click Sites.

    3.


    If you want to add sites that do not require an encrypted channel, click to clear the Require server verification (https:) for all sites in this zone check box.

    4.


    In the Add this Web site to the zone box, type the URL of a site that you trust, and then click Add.

    5.


    Repeat these steps for each site that you want to add to the zone.

    6.


    Click OK two times to accept the changes and return to Internet Explorer.

    Note Add any sites that you trust not to take malicious action on your computer. Two in particular that you may want to add are "*.windowsupdate.microsoft.com" and “*.update.microsoft.com” (without the quotation marks). These are the sites that will host the update, and it requires an ActiveX Control to install the update.

    Impact of Workaround: There are side effects to prompting before running ActiveX Controls and Active Scripting. Many Web sites that are on the Internet or on an intranet use ActiveX or Active Scripting to provide additional functionality. For example, an online e-commerce site or banking site may use ActiveX Controls to provide menus, ordering forms, or even account statements. Prompting before running ActiveX Controls or Active Scripting is a global setting that affects all Internet and intranet sites. You will be prompted frequently when you enable this workaround. For each prompt, if you feel you trust the site that you are visiting, click Yes to run ActiveX Controls or Active Scripting. If you do not want to be prompted for all these sites, use the steps outlined in "Add sites that you trust to the Internet Explorer Trusted sites zone”.
     
  11. ireland

    ireland Active member

    Joined:
    Nov 28, 2002
    Messages:
    3,451
    Likes Received:
    15
    Trophy Points:
    68
    quote
    UFO Video that peaked my Interest!

    Those of you that have listened to my Podcast know about the two UFO sightings that I have had, that based upon my interpretation where the real deal. Every once in a while a UFO headline or video catches my eye. Thought some of you may enjoy this one that has surfaced on YouTube. The audio is really bad but listen pretty close to the commentary and let me know what you think. [YouTube]
    http://www.geeknewscentral.com/archives/006555.html

    link
    http://video.google.com/videoplay?docid=-3116615689929270034&q=genre:educational+duration:long
     
    Last edited: Nov 6, 2006
  12. ireland

    ireland Active member

    Joined:
    Nov 28, 2002
    Messages:
    3,451
    Likes Received:
    15
    Trophy Points:
    68
    How to Fix a Stuck Pixel on an LCD Monitor

    If your LCD screen has a stuck or dead pixel , it's usually malfunctioning because the liquid in the liquid crystal display (TFT LCD) has not covered the whole screen. This can often be fixed.
    Steps

    1. Try a software solution (links at the bottom of the page). This method rapidly turns on and off pixels in an attempt to re-energise stuck pixels. If this fails, complete the following steps.
    2. Turn off your computer's monitor.
    3. Get yourself a damp cloth, so that you don't scratch your screen.
    4. Apply pressure to the area where the stuck pixel is. Do not put pressure anywhere else, as this may make more stuck pixels.
    5. While applying pressure, turn on your computer and screen.
    6. Remove pressure and the stuck pixel should be gone. This works as the liquid in the liquid crystal has not spread into each little pixel. This liquid is used with the backlight on your monitor, allowing different amounts of light through, which creates the different colours.


    Tips

    * Many people report success with this technique but these instructions won't work in every case.
    * These instructions will fix "stuck" pixels, not "dead" ones. Dead pixels appear black while stuck pixels can be one constant color like red, blue or green.
    * An alternative, but similar technique involves gently massaging the stuck pixel on your screen. Another method involves playing a video (available for download in external links below) which changes colors 30 times per second.
    * If these instructions don't work, you can hopefully get the monitor fixed through your manufacturer. Follow the link at the bottom of the page to the Tom's Hardware article on how many pixels it takes for your specific manufacturer to replace the whole monitor. If your monitor falls under the specifications of replacement, get in contact with the manufacturer to set up replacement plans.
    * Gently tapping the area can also work in some cases.


    Warnings

    * Do not attempt to open the monitor as it will void the warranty and the manufacturer will not replace it.
    * Make sure you don't get any electrical equipment wet or it may break.
    * Some people claim that this can cause more pixels to become stuck, although this has not been proven. This claim is more prevalent with the color-changing video than with the pushing method.


    Related wikiHows

    * How to Clean a Laptop Screen With Household Products
    * How to Clean a Plasma TV Screen
    * How to Mount a Plasma TV on a Wall
    * How to Exercise While Sitting at Your Computer
    * How to Degauss a Computer Monitor
    * How to Fix a Scratch on an LCD Screen


    External Links

    * JScreenFix - A web-based Java Applet that randomly turns on and off each pixel at upto 60 times a second to fix stuck pixels.
    * Digg.com - Over 100 comments on the above article from Digg users. Note that it worked for many people but not all.
    * TomsHardware.com - Article on how many dead pixels a monitor must have for your specific manufacturer to replace it.
    * JeffPatch.com blog Post about the Sony Color Flashing Video which can also fix stuck pixels.
    * DPT This program can help you find out how many stuck pixels you have on your lcd.
    * UDPixel 2.1 - A free windows application which help you to locate and fix 1 or more stuck pixels.

    http://www.wikihow.com/Fix-a-Stuck-Pixel-on-an-LCD-Monitor
     
  13. ireland

    ireland Active member

    Joined:
    Nov 28, 2002
    Messages:
    3,451
    Likes Received:
    15
    Trophy Points:
    68
    FREE,FIND MY :'(CREDIT CARD INFO ..........

    Find My Credit Card software is intended to show you private info on your own machine, which you may not know of, and erase redundant information posing hazard to your security .....(free).....GO THERE!
    http://www.smartpctools.com/secure_credit_card/index1.html


    Find My Credit Card software is intended to show you private info, which you may not know of, and erase redundant information posing hazard to your security.

    Perhaps, you have no idea that your computer may contain your private information which you have long forgotten about. These may include your credit card information, login names, passwords as well as cookie files tracking your Web surfing habits. The Find My Credit Card software finds all personal information and suggests its unrestorable erasure. Please bear in mind that no antispyware will save you from information theft. You need to be aware of what and where sensitive information is stored on your computer and purge it on a regular basis thus making information theft useless.

    Find My Credit Card supports Internet Explorer, Mozilla Firefox and Netscape web browsers.

    Always keep on the safe side!
     
  14. ireland

    ireland Active member

    Joined:
    Nov 28, 2002
    Messages:
    3,451
    Likes Received:
    15
    Trophy Points:
    68
    P2p file sharing and the law.

    p2pnet.net News:- The University of St Thomas is in St Paul, Minnesota and its school online newspaper, the Bulletin, has a feature called Tech Tuesday from Information Resources and Technologies.

    Today's post shows just how hard the Big Four Organized Music cartel is working to get even more US teaching institutions signed up as unpaid product marketing and copyright enforcement divisions.

    Actually, 'unpaid' is incorrect because, of course, fees and taxpayer money provide the wherewithall.

    Meanwhile, "Since Sept. 1, 2006, the University of St. Thomas has been contacted nearly 100 times by the Recording Industry Association of America and others representing copyright holders regarding the illegal offering of music, software or other kinds of programming via a peer-to-peer network application, such as Napster or Gnutella," says the post.

    In point of fact, you guys over at Information Resources and Technologies, way back, the Big Four, Warner Music, EMI, Vivendi Universal and Sony BMG, greased Napster into Penn State - the first school to become one with Hollywood and the labels - precisely because it's not illegal.

    Rather, Napster now a rock-solid corporate citizen unsuccessfully touting over-priced, cookie-cutter Big Four product. And Gnutella is a file sharing network.

    Anyway, "These 91 cases compare to less than a dozen in the entire spring semester of 2006," says the Bulletin. "In each of these cases, the notice from the RIAA informs the university that the sharing activity is both illegal and unauthorized by the copyright owner; further, the notice asks the university to disable access to the infringing recording."

    The post goes on:

    Once the notice is received, staff members in IRT immediately act to disable network access by the computer that is hosting the illegal activity. This "notice and take down" process is designed to provide some protection for copyright owners, and is a process with which most universities readily comply.

    Federal copyright law prohibits the unauthorized copying of intellectual property (books and recordings). Hosting illegal copies of songs, TV shows, movies or software on your computer and making these resources available to others via a sharing network constitutes the illegal copying of the material.

    There are two perspectives on this issue – the music industry refers to the sharing of songs and movies as "theft," which is perhaps a harsher term for what it is – the infringement of the rights of the copyright owner. At the same time, users of peer-to-peer networks like to say that they are "sharing" not "stealing" – although, again, it is different than sharing your toys, which everyone agrees is a good thing. In the case of online sharing, you keep your "toy" while your friend gets another copy of your toy – it is being reproduced by the user rather than purchased from the creator.

    While there is an ongoing debate on copyright in the United States, the fact remains that it is illegal to share copyrighted material via the network. In addition, this activity places a high demand on the bandwidth assigned to the UST network and contributes, at least in part, to slowness in computing performance systemwide.

    The University of St. Thomas takes compliance with the law seriously. Even when there is a gap between technology and the statutes of the state and nation, it is responsible, right and ethical to respect the law.

    (Thanks, Frankie)

    Also See:
    Bulletin -Peer-to-peer file sharing and the law, November 7, 2006

    p2pnet newsfeeds for your site.
    rss feed: http://p2pnet.net/p2p.rss
    Mobile - http://p2pnet.net/index-wml.php

    (Tuesday 7th November 2006)
    http://p2pnet.net/story/10346?PHPSESSID=2551023c89f14dc99b36614ca963ef70
     
  15. pepsimaxx

    pepsimaxx Regular member

    Joined:
    Jan 9, 2006
    Messages:
    628
    Likes Received:
    0
    Trophy Points:
    26
    ireland, Have i ever told you i love you? LMFAO! your awesome.. :)
     
  16. ireland

    ireland Active member

    Joined:
    Nov 28, 2002
    Messages:
    3,451
    Likes Received:
    15
    Trophy Points:
    68
    FOE ONCE SOME GOOD NEWS...

    German ISPs told to delete IP logs


    Privacy guaranteed

    By Nick Farrell: Tuesday 07 November 2006, 14:20
    A GERMAN COURT has ordered the nation's ISPs to destroy any IP logs to protect the privacy of their customers.

    According to Spiegel online, the ruling made by the highest appeal court in the land, makes it harder for anti-piracy organisations to trace an infringing IP-address back to a customer. However the case was started by Holger Voss, a 33 year old man from Münster who was sued for making a sarcastic comment in an Internet forum back in 2002.

    A district court and the regional court, now the federal appeal court decided that T-Online had no right to store the IP-logs without a legal reason. Under the ruling, ISPs will have to delete IP logs if the customer asks them to do so.

    More here, if you speak German. Here if you don't. µ
    http://torrentfreak.com/privacy-prevails-german-isp-forced-to-delete-ip-logs/
     
  17. ireland

    ireland Active member

    Joined:
    Nov 28, 2002
    Messages:
    3,451
    Likes Received:
    15
    Trophy Points:
    68
    Damn Small Linux 3.1 RC3
    Posted by: Digital Dave on November 07, 2006 4:31 PM
    For the Linux fans of the world, this kernel is for you.

    Damn Small Linux (DSL) is a very versatile 50MB mini desktop oriented Linux distribution. It includes a fully automated remote and local application installation system and a very versatile backup and restore system which may be used with any writable media including a hard drive, a floppy drive, or a USB device.

    - betanews.com




    Damn Small Linux 3.1 RC3 beta
    Publisher's Description:

    Damn Small Linux (DSL) is a very versatile 50MB mini desktop oriented Linux distribution. It includes a fully automated remote and local application installation system and a very versatile backup and restore system which may be used with any writable media including a hard drive, a floppy drive, or a USB device.

    It has a nearly complete desktop, and many command line tools. All applications are chosen with functionality, size and speed in mind. It includes XMMS (MP3, CD Music, and MPEG), FTP client, Dillo web browser, links web browser, FireFox, spreadsheet, Sylpheed email, spellcheck (US English), a word-processor (FLwriter), three editors (Beaver, Vim, and Nano [Pico clone]), graphics editing and viewing (Xpaint, and xzgv), Xpdf (PDF Viewer), emelFM (file manager), Naim (AIM, ICQ, IRC), VNCviwer, Rdesktop, SSH/SCP server and client, DHCP client, PPP, PPPoE (ADSL), a web server, calculator, generic and GhostScript printer support, NFS, Fluxbox window manager, games, system monitoring apps, a host of command line tools, USB support, and pcmcia support, some wireless support.


    Released: November 7, 2006
    Publisher: John Andrews
    Homepage: Damn Small Linux
    Downloads: 15,120
    License: Open Source
    OS Support: Linux

    download here
    http://fileforum.betanews.com/detail/Damn_Small_Linux/1132675282/1
     
  18. ireland

    ireland Active member

    Joined:
    Nov 28, 2002
    Messages:
    3,451
    Likes Received:
    15
    Trophy Points:
    68
    Speedfan
    License Type: Free

    Price: Free
    Date Added: Nov 2006
    Operating Systems: Windows XP
    File Size: 1430KB
    Downloads Count: 561
    Author: Alfredo Milani Comparetti
    This powerful tool displays data from you BIOS, such as temperature and fan RPM. A true geek tool
    Unless you have a tool that's monitoring motherboard, you won't have a clue if your CPU is getting ready to melt.

    SpeedFan is a freebie that gives pays close attention to you data collected by the BIOS -- the temperature and fan RPM. The tool displays the info in the System tray and once configured, you'll get an early warning -- an alarm or e-mail to e-mail to someone (not me, please) -- if things get toasty. Supports a lot of popular system boards and monitoring chips.

    download here
    http://pcworld.com/downloads/file/fid,64350-page,1-c,downloads/description.html
     
  19. Pop_Smith

    Pop_Smith Regular member

    Joined:
    Nov 26, 2003
    Messages:
    925
    Likes Received:
    0
    Trophy Points:
    26
    Just a warning on SpeedFan, if you tweak your fan speed with it at all it will take over your PC and your MoBo will no longer be able to control the fans.
     
  20. ireland

    ireland Active member

    Joined:
    Nov 28, 2002
    Messages:
    3,451
    Likes Received:
    15
    Trophy Points:
    68
    Claim: The nursery rhyme 'Sing a Song of Sixpence' originated as a coded message used to recruit crew members for pirate ships.

    Status: True.

    Origins: Many of us fondly recall the rhyming ditties we learned as children, such as "Jack Be Nimble" and "The Farmer in the Dell." But how many of us realize that several of our most fondly-recalled nursery rhymes (e.g., "A Tisket, A Tasket" and "Little Jack Horner") were not mere nonsense songs, but actually originated as coded references to such dark events as plagues and religious persecution? Such was the case with another childhood favorite, "Sing a Song of Sixpence."

    For those unfamiliar with this ditty, let's start by offering its lyrics:


    Sing a song of sixpence
    A pocket full of rye
    Four and twenty blackbirds
    Baked in a pie

    The King was in his counting house
    Counting out his money
    The Queen was in the parlor
    Eating bread and honey

    When the pie was opened
    The birds began to sing
    Was that not a tasty dish
    To set before a king?

    The Maid was in the garden
    Hanging out the clothes
    When down came a blackbird
    And snapped off her nose!



    The surprising truth is that this innocent little rhyme, which dates from the early 1700s, actually represents a coded message used to recruit crew members for pirate vessels!

    Pirates (or corsairs, privateers whose activities were sanctioned by letters of marque from a sovereign) did not Shiver me timbers! spend all their time at sea: they cruised the waters in areas such as the Mediterranean, the Spanish Main, or the Atlantic coast of North America, looking for prizes, and they returned to port when the need for supplies or repairs demanded it. Upon reaching port, the ship's captain paid off the crew (primarily by dividing the spoils of whatever they had captured), and the crew members then dispersed ashore (usually to spend all their pay on alcohol and prostitutes as quickly as possible). Some crewmen tended to stay in the vicinity, but others left for other regions, caught on with other ships, died, were killed, or simply disappeared. Thus, much like the captains of naval vessels and merchant traders, the captains of pirate ships needed to recruit new crew members whenever they embarked on yet another venture. Since piracy (as opposed to privateering) was against the law, pirates devised codes that could be used to advertise for crew members without openly revealing their illegal affiliations.

    The nursery rhyme "Six a Song of Sixpence" was a coded message that evolved over several years' times and was used by confederates of the notorious pirate Blackbeard to recruit crew members for his prize-hunting expeditions. Like many other messages passed down to us over hundreds of years by oral tradition, there is no one "official" version, nor is there a "correct" interpretation for any particular variant. In general, however, the most common form of this rhyme bore these veiled meanings:

    Sing a song of sixpence / A pocket full of rye

    Blackbeard's standard payment of sixpence a day was considered good money in the 1700s, especially since most pirate vessels did not pay a salary: the crew only received a share of the spoils if they were successful in capturing prizes (and many a pirate ship had to return to port empty-handed after spending several fruitless months at sea). As well, his crew was promised a pocket (a leather bag somewhat like an early canteen which held about a liter) full of rye (whiskey) per day. Not bad, considering that alcohol was the average sailor's raison d'etre.

    Four and twenty blackbirds / Baked in a pie

    As Henry Betts points out in his book on the origins and history of nursery rhymes, "It was a favourite trick in the sixteenth century to conceal all sorts of surprises in a pie." Buccaneers, too, were fond of surprises, and one of Blackbeard's favorite ruses to lure a ship within boarding range was to make his own vessel (or crew) appear to be in distress, typically by pretending to have been dismasted in a storm or to have sprung a leak below the waterline. Passing ships — both honest sailors wanting to help and other pirates looking for an easy catch — would sail in close to offer assistance, whereupon a crew of two dozen heavily-armed seamen dressed in black would board the other vessel (via a boat in darkness or fog, or by simply jumping into the other ship when it came alongside if no other means of surprise attack was possible) to quickly kill or disable as many crew members as possible. Thus the four and twenty "blackbirds" (i.e., Blackbeard's crewmen) "baked in a pie" (i.e., concealed in anticipation of springing a trap).

    When the pie was opened / The birds began to sing

    This follows from the previous line. Once the victim's ship was lured in for the kill, the "blackbirds" came out of hiding and attacked with a fearsome din.

    Was that not a tasty dish / To set before a king?

    This line is commonly misinterpreted. The King is not a reference to any real king, but rather to Blackbeard himself, the king of pirates. And the tasty dish is the plundered ship that was so easily captured.

    The King was in his counting house / Counting out his money

    Again, the King is Blackbeard (no real king would take on such a mean task as counting money). This line of the message signals that Blackbeard had the cash on hand to pay a crew on salary rather than strictly on divided spoils.

    The Queen was in the parlor / Eating bread and honey

    Blackbeard's main vessel was a French merchant ship named "Le Concorde de Nantes" that was jointly captured by Blackbeard and Captain Hornigold in the Grenadines in November of 1717. Upon his retirement from pirating, Hornigold presented the ship to Blackbeard, who renamed it "The Queen Anne's Revenge". Thus the "Queen" referred to here is Blackbeard's ship, and "eating bread and honey" meant that it was in port taking on supplies in preparation for a cruise.

    The Maid was in the garden / Hanging out the clothes

    The use of the word "maid" indicated that the location/route of one or more prize ships was known, and they were going to be specific targets of the upcoming cruise (this greatly enhancing the probability of the crew's collecting prize money). The waters around the Carolinas down to the Caribbean were referred to as the garden, as this was an area where pirates would often cruise for easy pickings. "Hanging out the clothes" meant the targeted ship was already at sea or just about to leave port (thus its sails — or "clothes" — have been hung).

    When down came a blackbird / And snapped off her nose!

    There is some scholarly debate in literary and maritime circles as to whether the last part was originally "and snapped off her nose" or "and snapped off a rose." Either way, the passage is taken to be a Blackbeard's bragging about his plans to swoop in and have his way with the targeted ship.

    So, next time you hear this innocent children's song, remember that it was originally recited in taverns by drunken, bloodthirsty buccaneers as a code to recruit other pirates for their next murderous voyage!
     
Thread Status:
Not open for further replies.

Share This Page