YouTube Opens its APIs

March 12, 2008 – 7:30 AM

SAN FRANCISCO (Reuters) – YouTube, Google Inc’s popular video-sharing site, is giving away tools that let Web developers tap the underlying database functions of YouTube, in effect allowing users to build their own YouTubes.

The Silicon Valley-based video-sharing site said on Wednesday that it is providing wholesale access to YouTube’s extensive video library, global audience, and the underlying video hosting and streaming network that powers YouTube.

The move goes significantly beyond the current access to YouTube videos in which any Web user can copy and embed selected videos onto their own Web pages.

Read the rest of this story…

The Best Laptops Under $1000

March 12, 2008 – 5:38 AM

These days, $1000 lands you a pretty well rounded budget laptop. You can easily get 2GB of memory, 120GB or more of hard disk space, 802.11b/g wireless networking, and dedicated multimedia shortcut keys that let you watch DVDs or view documents without booting into Windows. The Acer and Dell laptops in our list even sported HDMI connections, extras we didn’t expect at this price point. See the next slide for our Best Buy.

Click here to continue…

Nortel to quadruple network speeds

March 11, 2008 – 3:22 PM

Nortel Networks said Tuesday that it has developed new optical networking gear that can quadruple the capacity on telecommunications networks.

The new technology is designed to help network operators deal with bandwidth-gobbling applications like high-definition Internet video.

Nortel, the largest supplier of telephony gear in North America, plans to announce Wednesday that it has developed gear that can shuttle traffic across the Internet backbone at speeds of 40 gigabits per second, according to news wire service Reuters.

Read the rest of this story…

TrueCrypt 5.1 Is Out

March 11, 2008 – 10:29 AM

TrueCrypt is a software system for establishing and maintaining an on-the-fly-encrypted volume (data storage device). On-the-fly encryption means that data are automatically encrypted or decrypted right before they are loaded or saved, without any user intervention. No data stored on an encrypted volume can be read (decrypted) without using the correct password/keyfile(s) or correct encryption keys. Entire file system is encrypted (e.g.., file names, folder names, contents of every file, free space, meta data, etc). Files can be copied to and from a mounted TrueCrypt volume just like they are copied to/from any normal disk (for example, by simple drag-and-drop operations). Files are automatically being decrypted on-the-fly (in memory/RAM) while they are being read or copied from an encrypted TrueCrypt volume. Similarly, files that are being written or copied to the TrueCrypt volume are automatically being encrypted on-the-fly (right before they are written to the disk) in RAM.

Read the rest of this story…

Hacking Backdoor in G-Archiver Found!

March 11, 2008 – 10:23 AM

A serious Gmail account hacking backdoor, has been found in the popular Gmail archiving software G-Archiver. This application, in all its innocence, allows you to download and backup all emails from your GMail account. But apparently the developer included the code to send an email to his email ID with all usernames and passwords!

G-Archiver has posted this explanation of what happened: “It is urgent that you remove the current version of G-Archiver from your computer, and change your Gmail account password right away. What happened was that a member of our development team had inserted coding used for testing G-Archiver in the debug version and forgot to delete it in the final release version.”

Hopefully, G-Archiver will release a new version very soon.

Source…