UPDATE FIXES VERIZON IPHONE 5 DATA GLITCH; CUSTOMERS WON'T BE CHARGED FOR OVERAGES

Verizon iPhone 5 customers may have noticed an issue wherein their phones gobbled up extra cellular data when they were theoretically connected to Wi-Fi networks. Those customers now have two bits of good news: There’s a special software update that fixes the problem, and they won’t be responsible for unexpected charges related to unintended network overages related to the issue that spurred the carrier update in the first place.

10 HOT IT SKILLS FOR 2013

The number of companies planning to hire tech professionals continues to grow, with 33% of the 334 IT executives who responded to Computerworld's 2013 Forecast survey saying they plan to increase head count in the next 12 months..

APPLE WARNS ICLOUD USERS OF LOOMING STORAGE LOSS

Apple on Monday began reminding some iCloud users that they will soon lose the 20GB of free storage they'd received when they migrated from MobileMe.

Nook Video set for fall premier

Barnes and Noble Tuesday announced that Nook Video will premiere this fall in the U.S. and UK. The service will offer access to movies and TV shows for streaming and download.

Eight simple steps to make the upgrade to iPhone 5 easier

A little planning can save time - and voice messages - when you upgrade to the new iPhone 5

Sunday, January 31, 2010

update status facebook via kantor pos, kalkulator, telepon umum, blueberry, kaskus

Trik update status facebok via kalkulator, blackberry, blueberry, telepon umum, wartel, kaskus, hati sampai update fb via hp pinjaman.

kemarin wall FB gw di posting something ama kwn gw, tapi yg bikin gw ngakak ntu.. tu posting statusx via telepon umum.. gimana ga bikin ngakak coba.. wkwkwkwkwkwk. Namun yang dimaksud update dari telepon umum bukan langsung menggunakan telepon umum yang ada dijalan-jalan itu hehe(yg seperti gw ama loh2 pikirin). akan tetapi cuman statusnya saja via telepon umum namun updatena tetap menggunakan komputer.

Disini saya kasih contoh update status facebook via blueberry, caranya sama dengan update menggunakan blackberry kita tinggal pasang app-facebook sajah.

1. login Facebook anda di www.facebook.com
2. pasang applikasi apps-blue-berry klik disini
3. ikutin langkah selanjutnya atau lihat gambar dibawah ini

Nb : lihat gambar no 4, disitu ada berbagai tipe update status facebook via blueberry, wartel, kalkulator, sampai dengan kaskus dan hati

update status facebook via (Kumpulan applikasi update status fb):

caranya sama tinggal pasang applikasinya nanti status facebook update via…? bagaimana anda suka mana update fb via laptop kredit atau via nokia 3315 yang jadul....... hihihihihi

Saturday, January 30, 2010

And the best Linux desktop distro of all is...

When it comes to Linux, there is no one size fits all answer. But, unlike other desktop operating systems, Linux doesn't try to squeeze you into a system's that's too large or too small. Instead, Linux offers a wide variety of distributions and one of them is likely be the right one for you.

Linux, you see, is a family of operating systems. They share the same father, but each distribution has its own personality and its own audience. For example, if you really wanted to, you can have a Linux distribution that looks and act like Windows XP, but which underneath its Microsoft-like surface is actually running Ubuntu Linux. Or, if that doesn't strike your fancy, you can always make the popular Ubuntu distribution into a Mac OS X look-alike.

[ How to give Linux a try ]

Better still, you can find a Linux that will do what you want it to do. After all, despite silly tales of how you have to be some kind of technical wizard who chants "awk, grep, sed" at a shell command prompt to use Linux, anyone can run Linux these days. The default Linux desktop KDE or GNOME graphical interfaces may not look quite like the ones you're used to but they're every bit as easy to use and as powerful. Yes, once in a blue moon you may need to modify a configuration file by hand, but you'll need to do it no more often than a Windows user has to do the exact same kind of thing with the regedit command.

The real question isn't, "Can I run Linux?" It's "which Linux is best for me?" Here's my guide to help you find the right one for you.

I just want to play with it and see what Linux is like

No problem. There's a variety of ways to tinker with Linux and never have to buy or install anything permanently. For that matter, you may already have Linux on your present PC and never have realized it. Many laptops come with an instant-on setting that lets you browse the Web and check e-mail without ever booting up. If your notebook does that, chances are you're already running an instant-on Linux like DeviceVM's SplashTop.

If not, there are many other ways to give Linux a try without any trouble. For more on these check out my earlier feature, How to give Linux a try.

I just want it to run. Period.

OK, what you need to do then is to buy a netbook, laptop, or PC that already has Linux installed on it. Once upon a time that was hard to do. These days it's no trouble at all to find vendors that offer Linux already installed and ready to go.

The best known major vendor that wants to sell you a computer with desktop Linux ready to go is Dell. Dell usually offers three to four systems with Ubuntu already installed. The mix always includes at least one netbook and one laptop. At the moment, my favorites of their selection is the Mini 10v, a nice little netbook, and the Studio XPS 13, a powerhouse laptop.

These are easy-to-use, handy systems for both individuals and SOHO (Small Office/Home Office) users. But, say you're an engineer and you want a heavy-duty system with a business class operating system, what then? Dell has you covered again with its Dell Precision Workstations with Red Hat's RHEL (Red Hat Enterprise Linux) WS 5.3.

You don't have to go with Dell though. Other major hardware vendors like HP and Lenovo also offer pre-installed Linux on desktop systems. I'm loath to recommend them though because, frankly, they make it very hard to find their Linux-powered systems. Your better choice is to go with a smaller company that stands behind its Linux PCs like Los Alamos Computers, system76, or ZaReason. For a more comprehensive list of companies that sell computers with Linux ready to go see LXer's Pre-Installed Linux Database.

I want an easy to use Linux

Ubuntu is the default answer for anyone looking just for an easy-to-use desktop Linux with a huge, friendly user community who are ready to help. It has that reputation for a reason: Ubuntu really is easy.

What Ubuntu doesn't come with, by design, is some popular proprietary programs such as Adobe Flash or Reader. If you want those programs, but you don't want to bother tracking them down and installing them with the Ubuntu Software Center, what you want is a Linux distribution that comes with these programs either already installed or makes it really easy to install them.

If that's you, what you want is Mint or Novell's openSUSE. Mint is based on Ubuntu but includes most of the more popular proprietary goodies. I've used Mint a lot and I've grown quite fond of it. Indeed, for users who just want something that's simple to use and comes ready to work with Flash, PDFs, and the like, it's probably your best choice.

OpenSUSE is also an old favorite of mine, but it's more of a business desktop distribution, which reminds me...

I want a Linux desktop for my business.

Red Hat has a business desktop, but Novell puts more effort behind making their Linux desktops work and play well in corporate offices. If you want an official, fully-supported business Linux desktop then Novell's SLED (SUSE Linux Enterprise Desktop) is the one for you.

I've been using SLED for years and, as far as I'm concerned, it, not Windows, is my business desktop of choice. It's easy to manage, simple to upgrade, and far more secure than Windows will ever be. Besides, it also fits in nicely with Windows Server-based networks so you can slowly migrate your way from Windows to SLED while keeping your existing AD (Active Directory) network infrastructure.

Another plus in SLED's favor is that you can always try its community-based little brother, openSUSE first. I use openSUSE myself both on desktops and servers and I've always liked it. If it works for you too, you can then move up to full corporate support with SLED.


I hate, hate, proprietary software.

If you spit when you hear Bill Gates on TV and think Novell is a traitor to Linux for partnering with Microsoft, then there are several Linux distributions just for you. The one I've used the most is gNewSense. A variation of gNewSense is also RMS' (Richard M. Stallman), free software's founder, preferred Linux distribution.

I'm not crazy about proprietary software, but what I really want is cutting edge Linux.

Sound like you? Then, chances are you're already using Fedora. This, Red Hat's community distribution, is both an outstanding Linux in its own right and takes Linux about as far as you can go without being a Linux kernel developer.

What's that? You want to be a Linux kernel developer? Well, the other distribution you might want to look at is Gentoo. This source-code based distribution lets you gets your hands dirty with every aspect of the Linux experience. It is, in no way, shape, or form, a distribution for beginners. But, if you really want to know Linux from the inside out, it's the operating system for you. You'll also want to check out the Linux Foundation's free training Webinars to see how the real pros of Linux go about building Linux.

I've got computer troubles and I've heard Linux can help.

You've heard right. There are several Linux distributions that are designed to help you bring dead PCs back to life no matter what operating system they're running. I have two favorites in this line: Damned Small Linux, which will run on almost any 486 or newer PC, and SystemRescueCD. With both, I've brought PCs back from fried hard drives, corrupt memory, and innumerable cases of Windows malware crud. If you ever do computer repair, you must have at least one of these in your repair kit. They're incredibly powerful and useful.

OK, so what do you use?

Who? Me? After more than a decade in Linux, I use several Linux distributions on a daily basis. These include Fedora 12, openSUSE 11.2, and Ubuntu 9.10. For work-a-day desktop work I tend to stick with openSUSE and one distribution I haven't mentioned yet: MEPIS.

MEPIS is relatively unknown and that's a pity. What I like about it is that it combines ease of use and great stability. Linux systems are known for running for weeks and months without problems, but MEPIS is exceptional even by those exacting standards. I'm sure I rebooted my main desktop sometime last fall, just don't ask me which month!

In addition to those virtues, this Debian-based distribution provides a nice blend of cutting edge software with old favorites and it also includes access to the most important proprietary programs. If it wasn't such a small operation—it has only one developer—I'd recommend without reservation as a business desktop. Some day, I hope some venture capitalist will realize what a diamond in the rough MEPIS is, and give it the kind of support it needs to become a major Linux player. In the meantime, if you know some Linux and you want an outstanding distribution with a KDE interface, may I recommend you give MEPIS a try. You'll like it.

So, did I miss your situation? Drop me a note here in the comments and I'll see if I can find just the right distribution. In the meantime, I'd also like to know what distributions you've found to be your perfect fit and why.

Now, with all that being said, get on and give Linux a try. You'll be glad you did.

Read more about operating systems in ITworld's Operating systems section


source : ITworld.com

Saturday, January 9, 2010

Forecast 2010: 6 hottest skills for 2010

Pent-up demand for new projects. Veteran employees leaving the company. Who could complain about such pressures in the waning months of 2009, when the year was spent under a cloud of economic misery?

Certainly not Shane Kilgore, IT director at Randall-Reilly Publishing Co. in Tuscaloosa, Ala. He was dismayed to see two talented software developers give notice recently. One had five years under his belt and the other had 10, but Kilgore took their departures as a sign that the economy is taking its first steps toward recovery. He plans to hire a few new developers this year, not only to replace the ones who left, but also to work on new products that will be in demand when -- as many economists predict -- the recovery gains headwind this year. (Read more about the outlook for IT compensation and hiring inComputerworld's Salary Survey.)

"Things have been frozen because of the economy," Kilgore says. "But if we don't get new products out there, we won't have enough places for customers to put their money."

Still, with signs pointing to recovery and even job growth in 2010, companies such as Randall-Reilly are planning to hire only in key areas, and even then, they will favor people with skills that span multiple disciplines. In many cases, companies will still resist bringing on full-time employees, says Tom Silver, senior vice president for North America at Dice Holdings Inc., which operates Dice.com and other careers Web sites. "One thing we see companies do is bring people in on a project basis, and then as business comes back, they hire them full time," Silver says.

According to Computerworld's 2010 Forecast survey, this year's hiring plans certainly aren't at 2009 levels. Less than 20% of the 312 IT executives polled said they plan to increase IT head count in the next 12 months, compared with 26% in the previous year. And nearly 20% said they plan to decrease their IT head count.

For IT professionals who are either looking to get back into the workforce or mulling moves to greener pastures, here are the six types of skills most in demand among survey respondents who said they expect to hire IT workers in 2010.

1. Programming/Application Development

Among companies that plan to hire, the top reason for doing so is to meet demand for new systems and projects. That could be why programming/application development is the skill set that's most in demand, by far, according to Computerworld's survey.
"We're actually seeing new projects get the green light," says Dave Willmer, executive director of IT staffing firm Robert Half Technology. Quite possibly, he says, these were projects that were canceled at the end of 2008, only to be revived for 2010. The wave of new projects is also leading to demand for application developers who can double as business analysts and project managers, Willmer says. (Read Willmer's recent column, "IT hiring poised for skills-driven rebound.")

Specifically, companies will look for developers with knowledge of .Net, Java, Web development, open source and portal technologies such as Microsoft Corp.'s Sharepoint, says Willmer, who is a Computerworld columnist.

Demand is growing for people who know specialized programming languages like Ruby on Rails and AJAX, Silver notes. There aren't many jobs that require those skills, he says, but the number of openings has increased since January 2009.

Kilgore says he would like to find a "hybrid" software developer who can also serve as a business analyst. "We need someone who can talk to the business and be a requirements gatherer, project manager and software developer, all rolled into one," he says. He also needs developers with open-source expertise -- a rare talent, he says -- as well as professionals familiar with Microsoft tools for the ERP and marketing intelligence sides of the business.

Willmer says it makes sense that companies are looking for developers with skills in other areas, such as business analysis or even quality assurance, since employers are concerned about the cost of talent. "They're making sure they get the most out of their resources," he says.

Computerworld's Forecast survey respondents said they also need developers to build homegrown applications in an effort to save money. That's the case for James Sullivan, manager of information services at Covidien, a global health-care company in Mansfield, Mass.

Sullivan soon hopes to add three or four business-savvy programmer/analysts with Java or .Net backgrounds and an understanding of SQL databases. That represents a 25% increase in his usual hiring levels, he says, and it's a departure from previous years when he looked for programming skills alone.

One of Covidien's 2010 projects is to migrate from third-party custom-built applications to commercial off-the-shelf applications or bring them in-house. This, Sullivan says, would reduce spending on vendors and consultants, as well as enable his group to provide the support and turn around business-driven changes more quickly. This dovetails with a growing trend at Covidien to better leverage existing resources. "If something takes 10 hours today, we're asking how we can make it take one-tenth of that," Sullivan says.

At Scottrade Inc., the recession didn't affect hiring, according to Ian Patterson,CIO at the online financial services company. He hired more than 150 IT professionals in 2009 and plans to hire up to 200 this year to meet demand for new internal and customer-facing applications, and to keep up with changes and expansions. He says he's mainly looking for people with C++, Java and C# skills and notes that the company is also implementing a Siebel CRM system for the call center.

Energy Northwest, a power supplier in Richland, Wash., also saw continued growth in 2009. CIO Keith Cooke is looking for computer and electrical engineers with Java, Web and .Net skills to help fully Web-enable an internal system that is partially Web-based but still uses a terminal-based interface. Initially, he didn't want to retrain staff to use a browser-based interface. Now, however, "we're bringing on people who can help us adapt our legacy system to the new workforces coming in," Cooke says.

2. Help Desk/Technical Support

It's no surprise that there will be strong demand for the people who make the help desk hum in 2010, Silver says. The need for support technicians tends to reflect general business conditions, he says. "As the business starts to improve, companies hire more people, which increases demand for help desk staff," Silver explains.

Willmer says he's already seeing a rise in demand for help desk and support skills, especially among companies that cut too deeply in this area in 2009. "They can get away with it for a certain time period, but it eventually catches up and affects revenue," he says. Instead of offering full-time positions, however, some companies are hiring on a project basis, he adds.

3. Networking

The demand for networking professionals, Willmer says, is likely connected to the growing complexity of networks and to the stresses placed on them by virtualization and newly popular approaches to application delivery, such as cloud computing and software as a service.

Cooke says the network will be a big area of focus in the coming year. Energy Northwest is making increasing use of video and voice over its IP network, so it will need network, voice and radio engineers to handle upgrades and ensure compliance with new federal mandates. One of those mandates requires the company to move from wideband to narrowband radio frequencies.

Patterson sees Scottrade dabbling with a converged infrastructure in the next 12 months, driving a need for people with a mix of server, software and networking skills to support networked storage and server devices contained in a single chassis. "This will change the market for the type of people we need," he says. "It won't be just a guy who knows EMC and Hitachi storage, but [one] who knows server, storage and networking all in one device. We'll need a guy who says, 'The network has a problem here,' but when he traces it down, the problem is due to a lock on a table in the storage device."

4. Project Management

Silver sees project management as an area that is growing in importance and a good avenue for technology professionals interested in building up their careers. "Professionals who understand technology and how it fits in the overall business strategy are the ones who add the most value, get paid more and have the most fulfilling careers," he says.

5. Security

Willmer sees a relationship between demand for security skills and the still-shaky economy. "The biggest threat to companies is breaches by their own staff," he says. "When you throw in changes to the staff and disgruntled employees losing their benefits or facing the threat of being laid off, you increase the chances of network fraud or security infringement."

Meanwhile, Cooke is concentrating on hiring people with cybersecurity skills. "Ten years ago, we didn't worry -- as leaders in our companies -- about things like passwords," he says. "Now we're making sure we support complex passwords. That's just a new reality."

Energy Northwest is looking for recent graduates who studied computer engineering and digital controls to help upgrade its manufacturing systems from analog to digital. "They need to understand how those systems should be protected, given the security world we're operating in," Cooke says, citing new federal regulations and threat warnings emanating from the Department of Homeland Security.

Patterson thinks the trend toward including security features in network and storage devices will also affect the skills professionals need in this realm. "I can't believe in the long term that you won't see companies like EMC or Cisco not embedding security into their devices," he says. "We're going to need people who understand not just how to run things from a server or storage or network perspective, but also the security implications."

Security is an evergreen skill, according to Silver. "If you know how to help keep your company's information secure, there will be a home for you forever," he says.

6. Business Intelligence

Computerworld's survey respondents ranked business intelligence skills as No. 6 in importance; for Kilgore, however, BI is a higher priority. "Being a smaller midsize organization, we're late to the game in BI," he says. "We don't have the budget to do a year's worth of R&D; we have to be effective with it out of the gate."

Sullivan would like to find a data architect to help with Covidien's conversion from a nonstandard business intelligence system and miscellaneous reporting tools to an enterprise standard. More important than a BI expert, though, are programmer/analysts who can relate the nitty-gritty of data tables, database joins and data structure to business requirements. "That's what I'm finding is more valuable to us at this stage in getting BI established and used by the business," Sullivan says.

Meanwhile, at Scottrade, Patterson sees BI intertwined with Web 2.0. Whereas BI has traditionally been understood as a system that collects historical data and provides tools to analyze it, he says, he's now more interested in real-time BI that relies, for instance, on people entering competitive data into a wiki and providing that information almost instantaneously via a portal.

Intel unveils new microprocessors

Netbook app store also previewed.
Intel released a flurry of new computer chips as it seeks to maintain its dominance over rival AMD and prepare for an expected rise in demand.

The new microprocessors, designed to power desktop and laptop PCs, are the first of a new generation of chips featuring smaller transistors that Intel said will juice performance and improve energy efficiency.

At the Consumer Electronics Show in Las Vegas, Chief Executive Paul Otellini said the company hopes to capitalize on new opportunities presented by a world of hyper-connected products of every stripe.

"Every electronic device will eventually connect to the Internet," he said.

Otellini demonstrated advances in 3D movies, consumer electronics and personal computers, and plugged the forthcoming "Moorestown" platform for smartphones and mobile devices.

"We're on the cusp of a new era in computing," he said. "An era of personal computing essentially where we have many devices for every person, where computing is increasingly integrated into every aspect of our lives."

He also unveiled a test version of an application store aimed at netbooks, the Intel AppUp Center. Apps in a variety of categories can be downloaded for free or bought through an Intel website, and the company plans to expand it to other products such as PCs, smartphones and TVs.

Intel released new chips ahead of arch-foe AMD, which is not due to field chips featuring the smaller 32-nanometer circuits until 2011.

"The juggernaut is rolling on, if you will," said David Kanter, an analyst with Real World Technologies. "It's important because it's their first 32 nanometer products, but if you're looking at what they're releasing in notebook and desktop, this is where they already have a lead over AMD."

Intel, the world's No. 1 chipmaker, had an 81.5 percent share of the PC and server microprocessor market in the third quarter, according to Mercury Research. AMD had 17.8 percent.

The introduction of the new processors come on the heels of the release of Microsoft's new Windows 7 PC operating system software, which Intel expects will prompt consumers and businesses to upgrade to more powerful PCs.

The new processors are the first to include basic graphics capabilities, which the company said will support high-definition video playback and more casual 3D games.

Typically, computers are sold with basic graphics capabilities designed onto separate cards.

Intel also said it is producing chips targeted at automated teller machines as well as medical and communications and other equipment, as the company continues its bid to extend the reach of its chips into new markets.

Google confirms release of Nexus One handset

Google has announced its first foray into the smartphone market with the launch of the Nexus One handset but Australia isn't among the three countries to get first access to the device.

At an event today at its Mountain View headquarters Google released the handset, which it says is part of an ongoing Nexus program, although it declined to say when new models are planned.

“Nexus One is an exemplar of what's possible on mobile devices through Android — when cool apps meet a fast, bright and connected computer that fits in your pocket,” said Mario Queiroz, vice president of Product Management at Google.

“The Nexus One belongs in the emerging class of devices which we call " superphones." It's the first in what we expect to be a series of products which we will bring to market with our operator and hardware partners and sell through our online store.”

The Nexus One uses a 3.7 inch OLED screen, 1GHz Snapdragon processor, supports Wi-Fi and Bluetooth, is 11.5mm thick and weighs less than a standard Swiss Army knife.

It also comes with GPS, a five megapixel camera with flash, a proximity sensor and accelerometer and has removable storage via MicroSD.

On the software side the company demonstrated the 3D graphics capability of the phone, has built in noise cancelling technology and has software to convert speech to text so that messages can be spoken rather than typed on the phone’s virtual keyboard.

The handset runs Android 2.1, codenamed Éclair, but Andy Rubin, Google’s vice president of engineering who has led the Nexus project, said that not all handsets currently using the Android would be using the new operating system.

He explained that some handsets couldn’t handle the new operating system, in much the same way that his old laptop couldn’t run Windows 7.

Gradual rollout planned

In the US the phone will be sold running on the T-Mobile 3G network with a two year plan for US$179 or without a contract for US$579. A version using Verizon’s network is expected this year.

Customers in the UK, Singapore or Hong Kong can also buy an unlocked phone now but Vodafone will be selling the phone with a data plan in Europe once negotiations are complete.

"We want to gradually roll out the Nexus One to different countries in order to gain user feedback internationally and ensure the ordering process works smoothly," a Google spokesman told iTnews.

"The Nexus One also had to undergo certification in all countries we sell the phone in, and we wanted to ensure that the import regulations didn't make the phone prohibitively expensive."

The spokesman said Google hoped "to allow people in other countries to purchase the Nexus One and future phones from Google soon."

IT staff back in demand

Network engineers with security clearances wanted.
Help desk candidates and network engineers with security clearances were among the those most in demand this year, said recruiter Hays Information Technology.

Its latest quarterly report said that managed services businesses wanted help desk workers with "excellent communication skills and appropriate security clearances" to work on client sites.

"Following signs of increased government project activity, private companies are also seeking network engineers with clearance, preferably at the secret or above level," the report said.

Business analysts, infrastructure team leaders, project managers, system engineers and senior .NET developers rounded out those employers wanted.

Hays believed Australian employers were "repopulating teams" after a year when departing staff were rarely replaced.

"For many employees, the last few months have meant coping with extra work and employers realise they risk losing those dedicated employees if they don't feel recognised, rewarded and, most of all, supported," the recruiter's regional director Peter Noblet said.

Source : www.itnews.com.au

Watchdog issues spam warning to real estate agent

Targets real estate sector.
The communications watchdog has issued a "formal warning" to Elders Real Estate Wollongong following an investigation that found the agency breached the Spam Act.

The Australian Communications and Media Authority said the real estate agent breached the Act by sending commercial electronic messages without an unsubscribe facility.

ACMA said it contacted "more than forty" head offices of real estate franchisors and companies last year to inform them of "key obligations" and "consequences of non-compliance" with anti-spam laws.

"This is the first enforcement measure taken against a real estate agent since an ACMA awareness campaign about unsolicited communications targeted at the real estate sector," said Chris Cheah, acting chairman of the ACMA.

Penalties of up to $1.1 million per day may be imposed by the Federal Court for repeat offenders of the Spam Act, ACMA said.

Essential Windows Tricks

Whether you run Windows 7, Vista, or XP, these 25 tricks will make your PC faster, safer, and even more fun to work with.
PCWorld - The verdict is in: Windows 7 is Microsoft's best operating system ever. It's stocked with genuinely handy interface upgrades (hello, Aero Snap), long-overdue networking improvements (we love you, homegroups), touchscreen support (long live tablet PCs), and the best Windows Media Center experience yet (ClearQAM support at last).

Like every operating system, though, Windows 7 can benefit from a few tweaks here, some add-ons there, and a smattering of OS-enhancing apps and utilities. We've rounded up 27 of them, each one designed to make Windows 7 faster, easier, safer, or more fun. And because we know that many people still run Windows XP or Vista, we've identified the tips that work with those versions as well.

Make It Faster

Is Windows 7 really speedier than Vista or XP? Different Windows 7 performance tests have yielded varying results, but ultimately it depends on your hardware and the apps you run. Of course, with a few simple tricks, you can wring better performance from any system.

Go 64-Bit

Works in: Vista, 7 The old saw still holds true: Windows loves RAM. The more memory that you supply, the less the OS has to rely on the comparatively poky hard drive. But if you want Windows to address more than 3GB of memory, you have to run the 64-bit version. If you're buying Windows 7 as an upgrade, you should find a 64-bit installation disc in the box; ignore the 32-bit disc entirely. In addition to recognizing more RAM, 64-bit Windows makes better use of your PC's processor, giving you the best Windows experience possible.

Boot More Quickly

Works in: XP, Vista, 7 Does Windows 7 really boot more rapidly than other versions of Windows? Yes, a little. But the more programs you install, the slower your system will start (something that's true of all Windows editions). Many apps force Windows to run them at startup--a situation not unlike a dozen cars trying to merge into one lane.

Chrome sets browser security standard, says expert

Dino Dai Zovi urges browser makers to follow Google's lead
All browser makers should take a page from Google's Chrome and isolate untrusted data from the rest of the operating system, a noted security researcher said today.

Dino Dai Zovi, a security researcher and co-author of The Mac Hacker's Handbook, believes that the future of security relies on "sandboxing," the practice of separating application processes from other applications, the operating system and user data.

In a Wednesday entry on Kaspersky Labs' ThreatPost blog, Dai Zovi described sandboxing, as well as the lesser security technique of "privilege reduction," as "[moving] the bull (untrusted data) from the china shop (your data) to the outside where it belongs (a sandbox)."

The idea behind sandboxing is to make it harder for attackers to get their malicious software onto machines. Even if an attacker was able to exploit a browser vulnerability and execute malware, he would still have to exploit another vulnerability in the sandbox technology to break into the operating system and, thus, get to the user's data.

"Sandboxing raises the bar significantly enough that attackers will have to turn to other [types of attacks], like rogue anti-virus software," Dai Zovi said today in a telephone interview.

The pervasiveness of Web-based attacks calls for browser sandboxing, Dai Zovi argued. "It's crucially important because, in my opinion, the browser will become the OS," he said. "Google is the first to realize that the browser is the operating system, and Chrome is a huge leap forward with its ground-up rewrite."

Chrome has included sandboxing since its September 2008 debut. And while Dai Zovi considers it easily the leader in security because of that, other browser have, or will, make their own stabs at reducing users' risks.

For example, Microsoft's Internet Explorer 7 (IE7) and IE8 on Vista and Windows 7 include a feature dubbed "Protected Mode," which reduces the privileges of the application so that it's difficult for attackers to write, alter or destroy data on the machine, or to install malware. But it's not a true sandbox as far as Dai Zovi is concerned.

Currently, Mozilla's Firefox, Apple's Safari and Opera Software's Opera lack any sandboxing or privilege reduction features. "Apple, for example, has implemented some sandboxing in Snow Leopard, but [although] security researchers were hoping to see some of that technology used in Safari, that hasn't happened," Dai Zovi said.

Mozilla is working on Chrome-like sandboxing for Firefox -- the project's dubbed "Electrolysis" -- but the feature probably won't make it into the browser until Firefox 4.0, which is now slated to ship in late 2010 or early 2011.

Dai Zovi sees browser sandboxing as an answer to the flood of exploits that have overwhelmed users in the past year. "This isn't perfect, but it's the direction we should be heading in," he said. "The idea of fixing every vulnerability is clearly not working. We can't always win the race to patch."

But sandboxing, or at the least, reducing the browser's ability to affect the rest of the OS, may be the way to block most attacks. "It adds more defense-in-depth and impedes attackers," Dai Zovi said.

Mozilla ships Firefox 3.6 release candidate, nears final

Barring problems, RC1 will turn into final as early as Jan. 18
Mozilla on Friday shipped a release candidate build of Firefox 3.6 that, barring problems, will become the final, finished version of the upgrade.
irefox 3.6 Release Candidate 1 (RC1), which followed a run of betas that started in early November, features nearly 100 bug fixes from the fifth beta that Mozilla issued Dec. 17. The fixes resolved numerous crash bugs, including one that brought down the browser when it was steered to Yahoo's front page.

Another fix removed a small amount of code owned by Microsoft from Firefox. The code was pointed out by a Mozilla contributor, and after digging, another developer found the original Microsoft license agreement. "Amusingly enough, it's actually really permissive. Really the only part that's problematic is the agreement to 'include the copyright notice ... on your product label and as a part of the sign-on message for your software product,'" wrote Kyle Huey on Bugzilla, Mozilla's bug- and change-tracking database. Even so, others working the bug said the code needed to be replaced with Mozilla's own.

RC1 may be the last preview before Mozilla declares the edition done. "Should everything run smoothly during testing this is what will be released to our users as the official version after a beta period," noted a page on the Mozilla wiki dedicated to Firefox 3.6 RC1 testing.

If past practice is any clue, the final of Firefox 3.6 could be ready for downloading as early as Jan. 18. Last summer, Mozilla delivered the release candidate of Firefox 3.5 on June 20, then launched the browser 10 days later. In 2008, the window between the last release candidate of Firefox 3.0 and the final was 13 days.

RC1 was once slated for release in October 2009, with a final Firefox 3.6 scheduled for the following month. But Mozilla delayed Firefox 3.6 as it struggled to make deadlines, then decided Dec. 17 to issue a fifth beta rather than push for a release candidate. Even so, Mozilla maintained that it would get RC1 out by the end of 2009.

Mozilla has had trouble making its development schedules. In 2008, the company originally shot for a late-2008 release of Firefox 3.5, but eventually postponed the ship date to mid-2009 in order to add features and quash troublesome bugs in the then-new TraceMonkey JavaScript engine.

Among the new features in Firefox 3.6 are built-in support for the scaled-down browser skins dubbed "Personas;" warnings of out-of-date plug-ins; support for new CSS, DOM and HTML 5 technologies; support for full-screen video embedded with the video HTML tag; and support for the Web Open Font Format (WOFF).

TraceMonkey has also been refreshed to boost JavaScript performance, something Mike Shaver, Mozilla's chief engineer, bragged about last week on Twitter. "I am excited about upcoming JS [JavaScript] engine work, and I don't care who knows it," Shaver tweeted.

As is usual for a Firefox preview, not all of the available browser's add-ons are compatible with the release candidate. According to Mozilla, about 75% can be used with Firefox 3.6.

Firefox controls about 25% of the global browser market, according to the most recent data from U.S.-based metrics company Net Applications. But while Firefox's usage share remained flat last month, Google's Chrome surged into third place, pushing Apple's Safari into the No. 4 slot for the first time.

Firefox 3.6 RC1 can be downloaded from Mozilla's Web site for Windows, Mac and Linux. Users running a beta of Firefox 3.6 should see upgrade notices shortly if they haven't already.

More flash drive firms warn of security flaw; NIST investigates

The drives were certified to meet NIST standards
SanDisk Corp. and Verbatim Corp. have joined Kingston Technology Inc. in warning customers about a potential security threat posed by a flaw in the hardware-based AES 256-bit encryption on their USB flash drives.

The hole could allow unauthorized access to encrypted data on a USB flash drive by circumventing the password authorization software on a host computer.

"It's really onerous. It's a stupid crypto mistake and they screwed up, and they should be rightfully embarrassed for making it," said cryptographer and computer security specialist Bruce Schneier.

Verbatim warned that the security flaw exists in its Verbatim Corporate Secure and Corporate Secure FIPS Edition series of USB flash drives; SanDisk revealed a threat related to its Cruzer Enterprise series of USB flash drives. Both companies issued online application upgrades to address the issue.

According to SanDisk and Verbatim, the security issue only applies to the application running on the host system; it doesn't apply to the drive itself or the drive's firmware. Computerworld reported earlier this week that Kingston had recalled its DataTraveler secure USB flash drives so it could update the devices because of the same issue. The Kingston models affected include the DataTraveler BlackBox, DataTraveler Secure-Privacy Edition and DataTraveler Elite-Privacy Edition.

All three companies claimed their USB drives had met security criteria set by the Federal Information Processing Standard (FIPS) 140-2. FIPS is a U.S. government standard used to accredit devices with encryption algorithms. The standard was developed by the National Institute of Standards and Technology and includes both hardware and software components. FIPS 140 covers four levels of security.

"There are lots of certifications out there, and they mean very different things," Schneier said. "These certifications are far more about marketing than they are about real security."

Storage companies tout FIPS 140-2 certification as part of their marketing materials, stating that their devices are secure enough for use by government agencies. Because of security problems in the past, however, the government has banned the use of removable flash media devices by its employees.

"What does the NIST certification mean? Is it a good standard or a bad standard? That certainly is the issue here," Schneier said. "If you look at the NIST certification, all it means ... is there's some level of tamper resistance in the hardware. Does it mean it's any good? No."

German security company SySS GmbH found the flaw when it tested the drives' security and designed code for each device that modifies the software running in the computer's memory, telling it to always authorize the password -- no matter who enters it or what it is.

Schneier said NIST will likely have to revamp its certification standards to cover the hardware-based encryption flaw found by SySS.

In a response to a Computerworld inquiry, NIST said it is aware of the vulnerability involving several FIPS 140-2-validated USB drives and is now reviewing information on the flaw.

According to NIST, the FIPS 140-2 certification only covers cryptographic modules, which scramble data into an encrypted format that is indecipherable. The data is then decrypted and retrieved only by entering the correct password, key or other means of authentication processed by the module.

"From our initial analysis, it appears that the software authorizing decryption, rather than the cryptographic module certified by NIST, is the source of this vulnerability," a statement read. "Nevertheless, we are actively investigating whether any changes in the NIST certification process should be made in light of this issue."

According to Fountain Valley, Calif.-based Kingston, the security flaw involves the way the drives process passwords. According to Kingston, "a skilled person with the proper tools and physical access to the drives may be able to gain unauthorized access to data contained on" its DataTraveler encryption-enable USB drives.

A Kingston spokesman said the company would not comment on any specifics surrounding the security flaw, because "anything we say [could give] other hackers fuel and clues" as to how to break into the drive's security features.

The security flaw appears to be in the password authentication process in the host computer's memory. When a new USB flash drive from one of the companies is used for the first time, software on the device tells the computer it's a CD-ROM, allowing it to automatically ask for a password to unlock data on the device after a password is established. While the user's password is stored on the USB drive, the authentication code runs on the PC or a server's CPU.

Ultimately, that host system's authentication password for each company is the same on all of its devices.

"So if a hacker is able to find those default set of characters, all they need to do is return those and they will have access to encrypted data on the drive," said David Jevans, CEO of high-end USB manufacturer IronKey Corp. IronKey makes USB drives using higher-cost single-level cell NAND flash memory, compared with the more typical multilevel cell NAND flash that most other manufacturers use.

Jevans agreed that FIPS certification, which IronKey also touts, is to some extent marketingspeak that's needed to sell to government agencies and private corporations. But "there's more value to it," he said.

"We don't want people implementing proprietary cryptographic algorithms, which are almost always shown to be flawed," Jevans said. "That's one benefit: FIPS specifies that you will use well-known cryptographic algorithms, and AES went through a long and detailed public evaluation."

When Kingston, SanDisk and Verbatim issued their warnings, IronKey was among a number of companies to issue statements reassuring customers that their devices were safe from the same attacks. Jevans said that's because the password and authentication process is contained on the USB drive itself and has nothing to do with the host system.

"We don't trust the computer at all," he said. "The computer could have malware on it or have hackers accessing it. In our security design, we said we have to assume the computer is completely untrustworthy. That's where we started our threat modeling."

Jevans said FIPS doesn't tell vendors how to build a secure product but assumes that the manufacturer knows what it's doing. "When I talk to our FIPS analysis guys who helped write the standard, they said they've known about this problem for a long time."

The reason current FIPS standards don't defend against the vulnerability is because in a corporate environment, being able to unlock and manage hundreds of USB flash drives with a single administrative password is useful, Jevans noted, "which is effectively what this vulnerability is."

The device password, which is unlocked by a user password, is built into the software that resides on all of the USB drives.

"You can see why, in a data center environment, that makes sense. But that's very different from millions of users walking around with these things," he said. "That's not currently contemplated with the FIPS standards and where I think they're going to be evolving it."

White House calls for IT boost to fight terrorism

Better technology needed to 'connect the dots' on terror-related data, says Obama report
The White House report on the failed bombing attempt of a U.S airliner on Christmas Day highlights the challenges U.S intelligence agencies face in correlating terrorism-related information gathered from multiple databases and sources.

The review, released yesterday, identified an overall failure by intelligence agencies to "connect the dots," despite having enough information at their disposal to have potentially disrupted the botched attack.

The problem, according to the report, was not a lack of information sharing between government agencies but a failure by the intelligence community to "identity, correlate and fuse into a coherent story all of the discrete pieces of intelligence held by the U.S. government."

In listing the various causes for this failure, the report noted that information technology within the counter-terrorism community "did not sufficiently enable the correlation of data that would have enabled analysts to highlight the relevant threat information."

Nigerian citizen Umar Farouk Abdulmutallab attempted to detonate an explosive device while onboard an international flight from Amsterdam to Detroit on Dec. 25. Though the plane landed safely, the incident sparked widespread concern over the intelligence lapses that led to his being allowed on the flight in the first place.

Prior to his having boarded the flight, Abdulmutallab's father had expressed concerns about his son's radicalization to U.S. embassy officials in Nigeria. Various other agencies had gathered information about Abdulmuttalab's visiting Yemen and meeting with operatives from an Al Qaida-affiliated terror group.

The report called on the director of national intelligence to "accelerate information technology enhancements" in areas such as knowledge discovery, database integration and cross-database searches. It also called for improved capabilities for linking biographic information with terrorism-related intelligence.
Computers that don't talk to each other

The report identifies what's been a challenge for some time within the intelligence community, said James Lewis, director and senior fellow at the Center for Strategic and International Studies (CSIS). The office of the Director of National Intelligence, one of the agencies responsible for analyzing and integrating terrorism-related intelligence gathered by the U.S. government, has been struggling for years to accomplish its mission, Lewis said.

"In the past, the director of the National Counter Terrorism Center had 11 different computers because none of the computers could talk with each other," said Lewis, who led a CSIS-led group that submitted a set of cybersecurity recommendations to President Obama last January.

The DNI has been trying to address the issue by standardizing its technology acquisition, but the task still remains a work in progress, Lewis said. in this particular case, "the dots were in several different places and we haven't brought them to a single place."
The incident also highlights an intelligence culture that emphasizes secrecy over information sharing, said John Pescatore, a former analyst at the National Security Agency who is now an analyst at research firm Gartner Inc.

The State Department and intelligence agencies, including the NSA, the FBI and the CIA, all have their own processes for handing raw intelligence data that they gather, Pescatore said. Often this raw information is filtered before being passed or shared with other agencies, which results in an incomplete picture of an unfolding scenario, such as the attempted Christmas Day bombing, he said.

"The first issue isn't tools, it is what you would do with the information the tool might discover," Pescatore said. The intelligence community was developed to gather information about opponents that was to be used in attacking the opponent, he said. "Defending against kamikaze pilots, suicide bombers or airplane terrorists is not the same thing by a long shot."

Handling terrrorist threats will require intelligence agencies to be more proactive in sharing information, he said. And rather than relying on threat information, the Transportation Security Administration and other consumers of intelligence information need to have a more direct role in analyzing intelligence data, he said,
Fix the culture first

More than eight years after the terrorist attacks of Sept 11, 2001, the biggest challenge for U.S. counter-terrorism efforts continues to be cultural issues rather than technology issues, said Bruce Schneier, a noted security expert and chief security technology officer at BT Group PLC.

"The intelligence community has been optimized to fight the cold war where secrecy was paramount," Schneier said. "That kind of secrecy doesn't make sense any more. You need more openness and collaboration and sharing," Schneier said. While it is conceivable that IT enhancements could boost data correlation abilities, the fundamental issue that needs to be overcome is cultural, he said.

Unlike Cold War foes such as the Soviet Union, Al Qaida and other adversaries are decentralized and poorly funded. "Our intelligence organizations need to trade techniques and expertise with industry, and they need to share information among the different parts of themselves," Schneier said.

"Today's terrorist plots are loosely organized ad hoc affairs, and the dots that are so important for us to connect beforehand might be on different desks, in different buildings, owned by different organizations," he said. "What we need is an intelligence community that shares ideas and hunches and facts on Facebook, Twitter, and wiki. I'm not advocating that the CIA and NSA open its networks to everyone, but they need to bring Web 2.0 tools into their own classified networks

Wireless power group sees standard within 6 months

The group developing a standard for wireless charging expects to complete its first specification within six months, opening the door for makers of cell phones, digital cameras and other devices to bring compatible products to market.

Wireless charging lets consumers place gadgets on a mat that plugs into a wall outlet, and have the devices recharge automatically without needing to plug in each one. Apart from the gee-whiz factor, it's supposed to make life more convenient by letting people walk into their home or office, toss their gadgets onto a mat to recharge and forget about them.

There are still questions about when standardized products will come to market and how they'll be received, but the Wireless Power Consortium aims to finish its first standard before the middle of the year, said Menno Treffers, a Philips executive who is chairman of the consortium. If it's not ready by then, "I will eat my hat," he told a group of vendors at the Consumer Electronics Show in Las Vegas on Friday.

The consortium has 27 members including Nokia, Research In Motion, Philips, Sanyo, Samsung Electronics, Energizer and Hewlett-Packard, as well as component and wireless-power technology companies such as Texas Instruments and Fulton Innovation.

The standard is for a technology called magnetic induction, in which power is transferred between metal coils built into the device and the charging mat when they are placed close to each other. The standard is for delivering up to 5 watts of power, which covers most smaller devices. A further standard will be needed for laptops and larger products. "We want to start on that as soon as possible, but for now we don't want to dilute our engineering efforts," Treffers said.

Consumers will know which products are compliant because they'll carry the consortium's "Qi" logo (pronounced "chee" after the Chinese for life force). Initial products are likely to come bundled with a small charging mat of their own, but if the technology takes off other companies are likely to sell mats that can charge multiple devices at once.

Several wireless power products are already in the market, including a Nintendo accessory from Energizer for recharging Wii game controllers, a Dell Latitude Z business laptop that can be recharged by placing it on a stand, and products from Powermat for charging phones and other devices. Bosch has shown power tools that are recharged by laying them on a workshelf.

But a standard is seen as important to wider adoption because it ensures that devices will interoperate. Until it arrives, some vendors won't release any further products. "We're done for now until the standard is complete," said Serge Traylor, brand manager for charging and rechargeable systems with Energizer. When the standard is done, Energizer will release a mat for charging as many as two devices, for about $100, and charging sleeves for iPhone and Blackberry devices, for $30 to $40, he said.
The standardization effort faces several challenges, though. Powermat, one of the leading wireless power companies, has not joined the consortium and is selling products using its own technology, which Treffers acknowledged could create confusion in the market.

Some of the most popular gadget makers also are not on board, including Apple. "I have not heard from them," Treffers said.

He admitted also that the public may have concerns about safety, although vendors insist any concerns are unfounded, and there have been no big problems reported with products on the market. The consortium hopes regulators will classify the products as "home appliances" and vouch for their safety.

The consortium also needs to establish testing bodies to certify products as standards-compliant, and it's not prepared to say yet when the first qualifying products will appear.

Companies seem keen to get products out quickly, however. Those selling charging units today say they charge as quickly as plugging devices into a wall outlet. There is some loss in the system, however, and the technology being standardized is only about 70 percent efficient, Treffers said, meaning it is not a particularly green way to charge devices.

"We're not selling this as a solution to global warming," he said, "it will appeal to consumers because it is magical." The standard will conform to regulatory requirements for efficiency, however, and the group will try to get it approved under Energy Star guidelines. He added that manufacturers can make their products more energy-efficient with additional technology investments.

Charging mats will recognize when a device is fully charged and then consume a trickle of energy in standby mode, Treffers said. "We have demonstrated standby power in the micro-watt range," he said, displaying a slide that showed standby consumption of 0.0001 watts. The coils can be made small enough to fit inside a Bluetooth headset.

Treffers was involved in the standards-setting process for Blu-ray, which took several years to complete. He said he learned lessons from that experience and is determined the wireless power effort will go more smoothly.

"If we get the standard done, that will give [wireless power] the most market appeal," he said. "Otherwise it will be something that's nice for geeks and users with specialized needs."