Wednesday, September 29, 2010

cookies-cause-bitter-backlash: Personal Finance News from Yahoo! Finance

Tools that track users' whereabouts on the Web are facing increased regulatory and public scrutiny and prompting a flurry of legal challenges. Read more...

20 essential PC shortcuts

What I've always liked about Windows is that there are many ways to perform popular tasks. Say you want to print something; you could navigate to the file menu and select print, or you can press the Ctrl button and the letter P. Ctrl+P is just one example of a keyboard shortcut. Shortcuts are combinations of two or more keys that perform a particular function when you press them together.

I prefer to use shortcuts whenever possible. They're easy and they save a lot of time and mouse-clicking. Here are my top 20 shortcuts that you may not know about—but should.

How to choose a PC: netbook, laptop, or all-in-one?

It used to be simple. If you wanted a computer, you chose from one of the many desktop varieties available. With all the improvements in computing technology, it feels like you need to be an expert to figure out what type of computer you need. Do you need a laptop? A netbook? Or maybe an all-in-one computer, that can be used as your TV as well? And, when it comes down to it, what exactly are the differences between them?

The video shows examples of several types of computers and provided some of the benefits of each.

Windows PC, Notebook, and Laptop Scout: Get Help Finding the Right Laptop or PC#tour

Microsoft's interactive guide will recommend just the right PC. They'll fill you in on laptop basics, and match your needs against a pool of PCs recommended by the experts at Windows.

Tuesday, September 28, 2010

Teraflop Troubles: The Power of Graphics Processing Units May Threaten the World’s Password Security System | Georgia Tech Research Institute

It's been called revolutionary - technology that lends supercomputer-level power to any desktop. What's more, this new capability comes in the form of a readily available piece of hardware, a graphics processing unit (GPU) costing only a few hundred dollars.

Georgia Tech researchers are investigating whether this new calculating power might change the security landscape worldwide. They're concerned that these desktop marvels might soon compromise a critical part of the world's cyber-security infrastructure - password protection. Read more...

Monday, September 27, 2010

The 17 Most Dangerous Places on the Web - PCWorld

You've been warned that the Internet is something of a security minefield--that it's easy to get in trouble. You can do everything you can think of to protect yourself and still be taken by a malware infection, a phishing scam, or an invasion of on­­line privacy. We'd like to provide a little help. Here are some of the hazards you may encounter, how dangerous they are, and what you can do to stay out of harm's way.

Malicious HTML in E-Mail Increases - PCWorld

Using a number of search engine optimization-driven subject lines, the latest campaign tries to get recipients to click on "harmless" HTML attachments which launches an obfuscated Javascript attack that sends users to a variety of websites peddling everything from bogus CODECS to pharmacy. Read more...

Friday, September 24, 2010

Smart Computing Article - Windows 7

If you’ve shopped for an office PC in the last year, you’ve likely been looking at systems running a 64-bit version of Windows 7. The use of 64-bit systems has increased in office computers (and home computers) because PCs running a 32-bit version of Windows cannot access more than around 3.5GB of RAM. In this article, we’ll examine what you’ll gain when buying a 64-bit Win7 computer. Read more...

Smart Computing Article - Recycle Your Gadgets

Sometimes gadget breakdowns are irreparable, and you’re forced to look for a new device. Additionally, rapid advances in the technology behind consumer electronics have made frequent upgrades the norm. Maybe you’re looking for a new HDTV, office computer, digital camera, or cell phone. Regardless of the gadget you choose, have you considered what you’ll do with the old one? Read more...

Wednesday, September 22, 2010

How Secure Is My Password?

See how secure your password really is.

Tuesday, September 21, 2010

The 10 Best IT Certifications: 2010

The certification landscape changes as rapidly as the technologies you support. Here's an updated list of certs that currently offer the most value and validity for IT pros.

Thursday, September 16, 2010

Apple TV vs. Google TV: How do they differ? - Yahoo! Shopping

The smartphone brawl between Apple and Google just crashed through a fence and onto your television set. But is Apple TV vs. Google TV a fair fight? Here’s whyApple TV and Google TV are significantly different approaches to digital entertainment

Internet Explorer 9 beta review: Microsoft reinvents the browser | ZDNet

Microsoft officially unveiled Internet Explorer 9 today. It is, without question, the most ambitious browser release Microsoft has ever undertaken, and despite the beta label it is an impressively polished product.

Monday, September 13, 2010

How to Foil Web Browser 'tabnapping' - PCWorld

A new, incredibly sneaky identity-theft tactic surfaced earlier this week when Mozilla's Aza Raskin, the creative lead of Firefox, unveiled what's become known as "tabnapping." Stated simply, tabnapping -- from the combination of "tab" and "kidnapping" -- could be used by clever phishers to dupe users into giving up passwords by secretly changing already-open browser tabs. All of the major browsers on Windows and Mac OS X are vulnerable to the attack.Because most people keep multiple tabs open, often for long periods, and because they trust that the contents and label of a tab are immutable, tabnapping could become the next big thing in identity theft. Read more...

How to Sell Your PC (and Other Gadgets) - PCWorld

It's not your fault they keep making faster processors, slicker smartphones, and bigger TVs. You didn't ask them to invent an HD camcorder that fits in your pocket. The important part is, they made 'em, and you want 'em. But the growing pile of old gadgets in your desk drawer and closet are making you feel a little guilty, and you can't always afford to lay down more cash for the newest, shiniest stuff. Don't worry--we'll walk you through what you can sell and how you can get the best price possible, so you can turn your tech antiques into 2010's latest and greatest.

How to Set Up Multiple Monitors - PCWorld

Adding a second monitor can seriously boost your productivity, especially if you work with large images or spreadsheets. It's also extremely simple. See how to do it in this step-by-step guide.

Guess What, You Don’t Own That Software You Bought | Threat Level |

A federal appeals court said Friday that software makers can use shrink-wrap and click-wrap licenses to forbid the transfer or resale of their wares, an apparent gutting of the so-called first-sale doctrine.

The first-sale doctrine is an affirmative defense to copyright infringement that allows legitimate owners of copies of copyrighted works to resell those copies. That defense, the court said, is “unavailable to those who are only licensed to use their copies of copyrighted works.”

The 3-0 decision by the 9th U.S. Circuit Court of Appeal, if it stands, means copyright owners may prohibit the resale of their wares by inserting clauses in their sales agreements.


Wednesday, September 1, 2010

iTunes Scam: How to Protect Yourself - PCWorld

In recent weeks, more and more iTunes users have been reporting fraudulent activity on their Apple accounts, reporting hundreds or even thousands of dollars worth of bogus purchases. With the reports of this type of fraud on the uptick in recent weeks, many users have been quick to blame Apple or PayPal, as many of the affected iTunes accounts were linked to PayPal accounts. Read more...

Facebook Places: How to Adjust Your Privacy Settings - PCWorld

Watch out, Facebook users: the social network debuted a new location-sharing feature on Wednesday. As usual, this means it's time to make sure your privacy settings are configured the way you want them to be.