Saturday, March 8th, 2008
Years ago, in a strip drawn by the great cartoonist Walt Kelly, the characters were following a set of mysterious footprints through the swamp in which they lived. Finally, one of the characters, Pogo, a little opossum, realized that the footprints were their own. That's when he made his much ...
Posted in Hardware, Internet, Networking, Privacy, Security | No Comments
Saturday, March 8th, 2008
RA and M4A are container formats for music used by Real Networks and Apple, respectively, in their downloads. The actually formatting of the music is done with AAC, which stands for Advanced Audio Coding. AAC, for these two brands, has taken the place of MP3s.
Many feel AAC will supplant MP3s. ...
Posted in Internet, Software | No Comments
Saturday, March 8th, 2008
Wondering if your favorite peer-to-peer file-swapping program has spyware bundled into it? Chances are good that it does.
The information on this page is believed to be accurate. However, if any program is listed under the wrong section, please let me know immediately. If you know of a file sharing ...
Posted in Internet, Privacy, Security, Software | No Comments
Saturday, March 8th, 2008
I now have even greater sympathy for people suffering a spyware infection than ever before. I spent the better part of Tuesday night fighting off the worst spyware infection I have ever seen or heard of.
Someone was kind enough to donate a copy of VMWare for me to use ...
Posted in Internet, Privacy, Security | No Comments
Saturday, March 8th, 2008
For the last three years, I?ve been meaning to put to rest once and for all the urban legends and myths on wireless LAN security. Every time I write an article or blog on wireless LAN security, someone has to come along and regurgitate one of these myths. If that ...
Posted in Internet, Networking, Privacy, Security | No Comments