Wednesday, February 24, 2010

Youtube says bye bye to IE6!!

Read Original @ http://wutyouneed2know.blogspot.com/2010/02/youtube-says-bye-bye-to-ie6.html

Youtube or we can say google will no longer support IE6 after 13 March 2010. Some people might be freaking out and i believed many other will say "Do i give a damn!!?".


Google first announced the Docs, their browser-based productivity service, will drop support for version 6 of Microsoft’s browser in a couple weeks. Now YouTube has joined and stated that as of 13 March they too will no longer support the browser.[link]


Read more related sources here.


Photobucket

Monday, February 22, 2010

Zattoo - Watch Online TV for free

Zattoo - Watch Online TV for free

Read Original @ http://wutyouneed2know.blogspot.com/2010/02/zattoo-watch-online-tv-for-free.html

Zattoo has developed a software program that allows you to watch TV on your computer. All you need is a broadband connection and a current operating system (Windows XP or Vista, Mac OS X, or Linux). The service is legal and free of charge.

Where can I use Zattoo?

Zattoo is currently available in Denmark, France, Germany, Spain, Switzerland, and the UK.

Is Zattoo really free of charge?

Yes. You can download the Zattoo Player for free, and it also doesn’t cost you anything to use Zattoo to watch TV.

Install Zattoo client in ubuntu

First you need to download zattoo client from here

Minimum System Requirements

* Ubuntu 8.04 or newer
* Intel Pentium 4 2.33GHz, AMD Athlon™ 64 2800+ processor (or equivalent)
* 512 MB RAM
* 64MB of VRAM
* Broadband Internet connection
* Hardware accelerated video card recommended (with OpenGL)

Currently we only provide 32-bit packages. Some users have been able to get these to work in 64-bit distributions after installing the correct 32-bit compatibility libraries.
Installing

1. Download .deb package
2. Install the .deb package
3. Download and install the Adobe Flash plugin via Synaptic

List of available TV channels check from here





Photobucket

Digsby update brings Windows 7 features

Read Original @  http://wutyouneed2know.blogspot.com/2010/02/digsby-update-brings-windows-7-features.html


by Seth Rosenblatt

A recent update to Digsby, a controversial multiple-protocol instant-messaging client, focuses on enhancements specific to Windows 7 and tweaks several social-networking features.

Trending news comes on by default in the latest version of Digsby, shown on the left. On the right, one of Digsby's Windows 7 skins.
(Credit: Screenshot by Seth Rosenblatt/CNET)


 
Given the problem it had last year with its CPU cycle-grabbing shenanigans, one would think that Digsby would hold back from adding another service requiring those who don't want it to go through a post-installation opt-out process. But Digsby build 76 beta, released February 11 and announced broadly on Thursday, does just that with a OneRiot trending-news service it automatically added to users' social feeds. Users can disable the service in the General & Profile menu under Preferences.


The Windows 7 features include jump-list access to basic tasks, such as initiating a new instant message, setting your global status, and accessing Preferences. Interestingly, it also will add your most frequently messaged buddies, based on the size of their chat log. Notifications and unread conversation counts are also accessible in the taskbar.

The Windows 7 skins are a series of themes designed to work with the default Aero colors. These basically match the background of the friend pane to the Windows toolbar color. Somewhat annoyingly, Digsby has mapped the CTRL+S hot key combo to bring up the skins pane, though it's the default for saving in nearly every other program in existence.

Social-networking changes in this build of Digsby include adding a "dislike" button to Facebook, bringing commenting to updates from MySpace friends, and revamping Facebook notification pop-ups. In the blog post discussing the changes in this update, Digsby revealed that the next public build will include per-character formatting so that users can italicize or make bold selected parts of an IM, not just the whole thing, as well as group chat. The company also acknowledged that it will be spending more time on porting the program to Mac and Linux, which has been discussed for several years.

taken from CNET

Photobucket

Monday, January 25, 2010

AllFaceBook - 8 Most Useful Firefox Plugins For Facebook Users

Read Original @    http://wutyouneed2know.blogspot.com/2010/01/allfacebook-8-most-useful-firefox.html  


By Guest Writer

-Firefox Icon-Last week we discussed 5 Social sharing add-ons for Firefox and how you can use them to share links, news and updates with your network. Today we take at a look at specific Firefox add-ons that are built for the world’s largest social platform: Facebook. The open-source developer community at Firefox has built more than 170 of these add-ons for Facebook which are apparently also filling the gaps in Facebook’s features & functionality. For all Facebook & Firefox fans, we’ve compiled a list of the 8 most useful Firefox plugins.

Facebook Toolbar

This feature rich Facebook toolbar lets you access your favourite social networking site with ease and pops an alert whenever you receive a new message from your friends. It has quick links, photo upload function & its search-box makes it super easy to search for friends and you can also share a page from your profile. If you are one of those heavy Facebook addicts this add-on would certainly make life easier for you. You can install the Facebook Toolbar from here.

Boost for Firefox

As the name suggests, with the Boost Firefox add-on, you can completely enhance & customize your Facebook browsing experience. For e.g. it shows you a larger version of photos on doing a mouse-over, helps you to get rid of that silly ‘confirmation’ box when you poke a friend and also change the look-and-feel of your navigation bar skin.

Facebook Dislike

While you do not hesitate to click on the ‘Like’ button when you enjoy your friend’s status, there are some occasions when you think otherwise. This Firefox plug-in lets a user dislike feed stories or the news posted in fan pages. Although the visibility of dislike action is limited to the users who have installed this add-on, it has received immense popularity with over 586,034 downloads till date.

AdBlock Plus

Do you feel irritated by those big banner Facebook ads that appear in the side column? Thanks to the Adblock Plus plug-in, you can choose to now disable all the ads that you see in Facebook. There are two ways in which you can control the appearance of ads: By either enabling the filter subscription list which will block 99% of the ads or selectively disable the ads by doing a right-click on the ad and choosing the Adblock image option. While Adblock Plus may not be in compliance with Facebook’s Terms, it is an extremely popular plug-in and has been downloaded 68,924,364 times.

Yoono

Yoono has been developed as a one stop hub to manage all your social networking hangouts. Using a single interface, you can send status update to multiple social networks. Multi-network focus doesn’t mean that there is less emphasis on Facebook. Yonoo for Facebook has a slick design, doesn’t consume your CPU memory and provides complete control over Facebook through the sidebar.

FacePad

How many times have you felt like downloading your friend’s party album on Facebook and simply let it go because it is a time consuming process. The solution lies in FacePad with which you can download all pictures in the selected album by simply doing a right-click on the album and choosing ‘Download with FacePad’.

Firefox Universal Uploader

Firefox Universal Uploader which resembles a FTP (File transfer protocol) utility, helps you to upload multiple files in one go. You can manage multiple Facebook accounts and choose to upload a single file or an entire directory at once.

Firefox Facebook Video

While YouTube is the preferred public video sharing platform, many of us Facebook for uploading our personal videos. To manage the video downloading hassles, Firefox Facebook Video plug-in can be used. With it you can download videos, convert them to different file formats and embed them outside Facebook.

Are you a Firefox fan ?  Do you use a Facebook extension which is missing from the above list?

Taken from All Facebook

Photobucket

Sunday, January 24, 2010

Looking for old software? Version Download come to the rescue!!

Read Original @    http://wutyouneed2know.blogspot.com/2010/01/looking-for-old-software-version.html  

hey, sometime old one is better and faster than the new one. admit it!
Version download quote the following:-

Did you click 'OK' to that recommended update on programs like iTunes, Adobe Reader, or Yahoo Messenger, only to realize that the older version ran faster or had better features?
You will be able to get the old version of softwares from different categories such as browsers, Audio Video, Security, File Compression, File Sharing and even IM software.

If you are still looking for your old workable software for your machine, then it might worth to stop by to http://www.versiondownload.com/. They even still have winamp 0.2!!!




Photobucket

Saturday, January 23, 2010

Skype 2.1 Beta 2 Puts Screen Sharing in Linux.

Read Original @   http://wutyouneed2know.blogspot.com/2010/01/skype-21-beta-2-puts-screen-sharing-in.html




Linux: Skype doesn't update its Linux beta too often, but good things arrive when it does. This go-round, screen sharing gets added to the mix, interfaces can be styled, and a lot of annoyances were chopped down.
Image by Kabatology.


If you were irked about being unable to quote IM sections from Skype conversations, that got fixed in Skype 2.1 Beta 2. If you're amazed at how irksome it is connecting Skype through PulseAudio, the default audio engine in Ubuntu and a few other distributions—you're not getting much help here. With that out of the way, your Linux-friendly editor will point out the big list of improvements and fixes in this release.

Skype for Linux 2.1 Beta 2 is a free download for Linux systems only. If you've discovered a few smart Skype fixes on your Linux system, or want to see something else fixed up, tell us about it in the comments.



Taken from LifeHacker


Photobucket

Firefox 3.6 is now available.

Read Original @   http://wutyouneed2know.blogspot.com/2010/01/firefox-36-is-now-available.html  






What's new? The video above provides the highlights, but the talking points are:
  • Instant themes: Point 3.6 at the Personas gallery, and you can hover over a theme to see how it would look in your browser. Click to apply it, and it's your browser skin. You can then manage your Personas from the Add-Ons menu.
  • Out-of-date plugins notifier: Start your browser up with an outdated, and potentially virus-friendly, Adobe Flash or other plugin, and Firefox will tell you and provide an update link.
  • Full-screen "open" video: If you're looking at a video streaming in Ogg or another free format, Firefox can play it full screen.
  • WOFF support: More intriguing for developers than users, but, still, Firefox now accepts and downloads smaller-sized Web Open Font Format fonts, allowing sites to more quickly show you their text the way they intended.
  • Faster, faster, faster: Mozilla promises better JavaScript, startup time, and rendering speeds.





Source Lifehacker, Mozilla

Photobucket

Thursday, January 21, 2010

Bill Gates Surpasses 100,000 Twitter Followers in 8 Hours

Read Original @ http://wutyouneed2know.blogspot.com/2010/01/bill-gates-surpasses-100000-twitter.html

By Ben Parr



Eight hours ago, Microsoft founder Bill Gates joined Twitter. Five hours ago, Twitter’s Caroline Mizumoto tweeted about it. And moments ago, @BillGates broke 100,000 Twitter followers.

If you’re looking for the breakdown, that’s about 12,500 Twitter followers per hour, or ~208 new tweeps per minute. In reality though, Bill’s follower count escalated after Caroline’s tweet, meaning his real rate of growth is about 20,000 new followers per hour.

The last time we’ve seen a new Twitter user with this kind of momentum was Oprah when she first joined. Mr. Gates is not only the world’s richest man, but one of its most popular it seems. His legacy as an entrepreneur and a philanthropist are far from forgotten.

Welcome to the Twitterverse, Bill Gates.


Taken from Mashable.com

Photobucket

Wednesday, January 20, 2010

Blogspot @ Blogger introduce Pages

Read Original @ http://wutyouneed2know.blogspot.com/2010/01/blogspot-blogger-introduce-pages.html



Blogger pages let you to publish static information on stand-alone pages linked from your blog. For example, you can use pages to create an About This Blog page that discusses the evolution of your blog, or a Contact Me page that provides directions, a phone number, and a map to your location.

This is similar to the one in wordpress (if you have one). We definitely think that this will make a lot blogspot user happy ;).

More Info




Photobucket

2,000 Wintek workers go on strike over bonus payments, may affect Nokia and iPhone production.

by Richard Lai

Read Original




As the Year of the Tiger approaches (February 14th this year), Chinese workers look forward to their week-long holiday -- a nightmarish time for foreign vendors who'll struggle to get hold of anyone in the country. Sadly, this wasn't the case for Wintek -- screen supplier for Nokia, Huawei and Apple. The Taiwanese company's East China factory ground to a halt last Friday morning, while about 2,000 of its 10,000 workers went on a five-hour protest over a rumored bonus cancellation for the second year in a row. On top of that, workers also criticized Wintek for using n-hexane -- a banned substance used for cleaning LCDs -- which they claim caused the death and paralyzation of several workers last year. Factory officials and Chinese health authorities don't deny that n-hexane was used, but they say it wasn't responsible for either the deaths or the paralyzations. Now, the good news: Wintek has promised that workers will get their bonuses, and further said that the factory hasn't used n-hexane since August -- complete with proof that current n-hexane levels are lower than safety regulations require. Let's hope things get better between management and workers from now on. One more picture and video of the protest after the break.

Taken from engadget


Photobucket

Tuesday, January 19, 2010

Reuters: Yahoo Knew of Google Attacks, Kept Quiet

Read Original


SAN FRANCISCO (Reuters) - Yahoo Inc knew it had been a target to sophisticated Chinese cyber attacks on U.S. corporations before Google alerted the company to them, a source familiar with the matter said, but chose to remain silent after its bigger rival went public.

The two Internet search and email providers had discussed a highly coordinated attack originating in China prior to Google's high-profile announcement on Tuesday, the person said.

Google said the hackers' primary goal was to access Gmail accounts of human rights activists, and that at least 20 other large companies had been targeted. It was unclear whether the attacks on Yahoo were also aimed at grabbing information off emails, or if they had been successful.

Google got in touch with Yahoo "to share knowledge"—after determining through its own investigations that Yahoo had also fallen victim to cyber attacks—and Yahoo then confirmed to Google it "was already aware of similar issues on their side," the person said on condition of anonymity.

Yahoo said on Friday it does not generally disclose information about attacks on its systems, but the company takes security very seriously and takes appropriate action in the event of any kind of breach. Google said it would not comment on specific companies involved.

Google said it would no longer censor its Internet search results in the country, and might even pull out altogether.

Thus far, technology heavyweights like Microsoft Corp, Intel Corp and Cisco Systems Inc have shown little inclination to rock the boat or express solidarity with Google.

Analysts say many foreign multinationals in fact may occasionally bend over backwards to appease Beijing, coveting the vast potential market in what will soon be the world's second-largest economy.

Since Google reported the attacks, only Adobe Systems Inc, Juniper Networks Inc and Rackspace Hosting Inc have acknowledged experiencing similar incidents. But the majority of victims have remained silent.

Analysts have said many companies choose not to publicize cyber attacks out of fear of exposing technological vulnerabilities and, in this case, of upsetting business relations with China.

"They don't want to get any noses out of joint in Beijing," said Clyde Prestowitz, president of the Washington-based Economic Strategy Institute.

Microsoft, normally keen to discuss business opportunities with the press, is no longer answering basic questions about China and declined to comment on Friday.

Chief Executive Steve Ballmer said Thursday the software giant had no plans to pull out of China. Microsoft is chiefly interested in getting Beijing to crack down on intellectual property rights, and has no desire to ruffle relations, analysts said.

"I don't understand how that helps anything. I don't understand how that helps us and I don't understand how that helps China," Ballmer said.

Most of the company's software in China is pirated, and effective policing would potentially add billions of dollars in revenues for its Windows and Office software business.

For Yahoo, protecting the personal information of users in China is a particularly touchy subject.

In 2007, Yahoo outraged human rights activists after accusations that the Internet giant had handed over the mail, data on online activity and Internet addresses of suspected dissidents to Chinese officials. Though Yahoo eventually settled the lawsuits brought by lawyers acting on behalf of jailed dissidents.

The suit, advanced by the Washington D.C.-based World Organization for Human Rights USA, maintained that Yahoo had benefited financially by working with Chinese authorities.

Yahoo also no longer maintains its own Internet site in China. In 2005, Yahoo handed over exclusive rights to the "Yahoo China" brand name and folded its Chinese mail, messaging and other operations into the Alibaba Group, in a $1 billion deal that gave Yahoo a 40 percent stake in Alibaba.

(Additional reporting by Bill Rigby in Seattle, editing by Edwin Chan; editing by Andre Grenon, Bernard Orr)

© Thomson Reuters 2009. All rights reserved. Users may download and print extracts of content from this website for their own personal and non-commercial use only. Republication or redistribution of Reuters content, including by framing or similar means, is expressly prohibited without the prior written consent of Reuters. Reuters and the Reuters sphere logo are registered trademarks or trademarks of the Reuters group of companies around the world.

taken from pcMag

Photobucket

Notebook user, a battery bar for u by Osiris Development

Read Original




With Battery Bar you won't ever have to guess how long your laptop's battery will last. Battery Bar always shows you exactly how much time your laptop's battery will run. Battery Bar uses the most accurate time prediction algorithm on the market today. It also displays the current percentage of battery power left. Battery Bar is intelligent, the more you use Battery Bar the more accurate it gets. Battery Bar continuously displays status icons so that you can always tell if your battery is on AC, charging, battery power, or if your battery is low. Battery Bar will also let you specify a battery percentage level that when reached Battery Bar will shut down the computer. Battery Bar has the ability to run on top of all other programs so that it is always visible. Battery Bar is small so that you have plenty of screen space for other programs.

BatteryBar Features (Free and Pro Edition comparison):-


Download Now

Taken from download.com and Osiris Software.
Photobucket

Opera 10.5 Beta Adds Private Browsing and Excellent Windows 7 Integration

Read Original

by The How-To Geek. photos by Lifehacker.com



Windows only: The latest beta version of the Opera browser adds total Windows 7 integration, with Jump Lists, Aero Peek, and a beautiful Aero Glass interface—and we've got a quick tour of all the new features.

The first thing you'll notice after installing the 10.5 beta is that the interface has been completely re-done with Aero Glass for Windows 7 or Vista users. The menu bar has been rolled up into a single button similar to the way Office 2007 works, with easy access to all common functions all from one place.



Windows 7 users can now hover their mouse over the taskbar button and see previews of each of the open tabs, and moving your mouse over a specific tab will enable the Aero Peek effect and show the Opera window with the contents of that particular tab—just the way Internet Explorer 8 does. You can even middle-click on the thumbnail preview to close a tab.





The Jump List menu shows the items from your Speed Dial, lets you open a new tab, or start a new private browsing session in a separate tab. Once you've opened a new private tab—which you can also do by right-clicking on the new tab button on the right of the tab bar—the icon in the tab will change to indicate that you are in a private browsing session.

You can choose to open a separate window for private browsing, but being able to include that private tab without requiring a new window is a nice feature that you can't currently do in any of the other mainstream browsers.

Opera 10.5 beta is a free download for Windows only; Unix and Mac builds will be available later this week.
Opera 10.5 Beta [Opera Desktop Team]



Photobucket

How to Protect Your Privacy with Facebook’s New Privacy Settings in 17 Easy Steps

Read Original

by Sara Inés Calderón.(Insidefacebook.com)

Facebook’s new, more public privacy settings are here to stay. And there are a lot of details that you should make sure you’re clear about. Otherwise, you may be exposing (or not exposing) the information you intend to.

The company has spent a lot of time communicating about the changes, and it has also been working to upgrade its help pages so people can find exactly what they’re looking for. You may already be familiar with the settings and the changes. But this comprehensive, step-by-step guide to 17 key settings might help you quickly spot what changes Facebook has made, and what changes you should make as a result.

If you haven’t been following the changes, here’s a quick explanation of what Facebook is doing. Facebook has always had pretty strict privacy rules by default. The service originally started on college campuses, and gradually branched out and grew. Today, more than 350 million people are active on Facebook each month around the world. The company’s methods of managing privacy have changed, as well — you used to need to use your college’s email address to join, for example, and you used to need register with a regional network. Both of those features, and others, have been removed or heavily altered as the company has grown. Facebook’s overall strategic direction has been, for several years, to become more open. The latest changes pushed users to share their information more widely. Every single person on the site was asked to go through a step-by-step review of their privacy settings in early December, as we covered, with some features, like status updates marked to be open to more people than what users have have previously designated them.

Facebook also changed some information, like friends and some demographic information, to be public by default. Developers and marketers stand to benefit by being able to access Facebook data, because they can do things like tailor applications and campaigns to specific types of users. Real-time search companies, for example, could use Facebook status updates to show the latest news and the biggest trends. But users need to make all this information publicly accessible for the rest of the web to benefit.

The company has seen other companies, like Twitter, benefit from open data services, and it intends to make itself a key part of the entire web. But it needs users to make more of their data open to access this value, hence the changes. At the same time, it needs to try to preserve the privacy that many users have long found to be a key part of their reason for using Facebook in the first place. This is a monumental problem to try to solve. Facebook’s efforts have been criticized by some members of the press and privacy groups. They believed Facebook pushed too much data open without appropriate consent from users.

So here’s our list of the 17 steps to make sure you have your settings set right.

1. Editing My Privacy Settings

There are two ways to get to your privacy settings. In the upper right-hand corner of your Facebook page there’s the Settings drop-down menu that allows you to edit your Account Settings, Privacy Settings and Application Settings. Privacy may be accessed by selecting that option on this drop-down menu or clicking Manage on the Account Settings option for Privacy.

How you choose to set your Privacy Settings depends largely on who you are and how you want others to know you. For many professionals, or aspiring ones, keeping private thoughts and moments of bad judgment out of the claws of the Internets’ cache is extremely important. Whereas for others, either meeting people or getting your name out to as many people as possible is more important than privacy. In either case, Facebook’s new privacy settings are capable of serving your needs in very specific ways, with some fine-tuning.

2. What’s Not Private

It’s important to understand what information Facebook considers public, according to their new privacy policy, “Certain categories of information such as your name, profile photo, list of friends and pages you are a fan of, gender, geographic region, and networks you belong to are considered publicly available to everyone, including Facebook-enhanced applications, and therefore do not have privacy settings.”

Facebook points out that, with your Privacy Settings, you can limit how easy this information is to find.

However, minors are automatically restricted by Facebook, and allowed only to share with friends, friends of friends and verified networks.

3. My Profile Information

You do control who sees other things, such as: Status updates, Website, Education and Work, Videos, Links, Photos, About me, Birthday, Hometown, Religious and political views. It’s really personal preference what you make public here, although you might want to uncheck birthday to safeguard against things like credit card fraud, as your birthday is often part of the security questions for your bank, credit card and phone accounts. Just select your preferences by checking or checking the boxes and saving your changes.

To protect your Profile Information, select Privacy Settings from the Settings drop-down menu on your homepage and then click to the Profile Information section.

Once there, you have the option to alter the privacy settings of the About Me, Personal Info, Birthday, Religious and Political Views, Family and Relationship, Education and Work, Photos and Videos of Me, Posts by Me, Posts by Friends and Comments on Posts.

Your choices for privacy settings are: Everyone (literally everyone, including Google and other search engines), Friends and Networks, Friends of Friends, Only Friends and Customize. The Customize option allows you to include or exclude particular networks, or people, which could be particularly useful if you’re in a situation where you share Facebook with co-workers or family.

4. My Contact Information

The Contact Information section gives you the option to limit who can see you: IM Screen Name, Mobile Phone, Other Phone, Current Address, Website, Hometown, Add me as a friend, your email address and who can message you on Facebook. Depending on your needs, select whether you want to share with Everyone or Only Friends.

Account Settings, on the Settings drop-down menu, gives you the option to change everything from your contact information, to what networks you’re in, to what notifications you receive from Facebook and even how you make payments on the site.

5. Who Can See Me?

The Settings tab includes all your basic info; you can control who sees your name on a Facebook search by clicking on Name, where you can decide to enter an Alternate Name, show only part of your name or display your name in your profile and search results. If you don’t want your name shown, uncheck the box.

6. My Email and Linked Accounts


Which email you use is another option on this page, depending on your privacy needs, it might be savvy to use an email you don’t mind sharing with the world to, or one that you want everyone to have. You may also sync your Facebook account with your other accounts in the Linked Accounts section here.

7. Ads with My Name and Photo

Finally, the Facebook Ads tab in this section is another area for you to gain better control over your identity by deciding whether or not Facebook and third party platforms may use your name, actions and likeness in ads within Facebook to people in your network.

There are two places you can choose to opt out of this.

At the top of this page is a drop-down menu asking you to “Allow ads on platform pages to show my information to,” prompting you to choose whether you want to do so to only your friends or no one. Facebook explains to you here that, as of now, the site does not allow third party applications or ad networks to use your name or picture in their ads. The selection you are making here, either No one or Only my Friends, will be used if and when this is allowed. After making a selection, save changes.

Another drop-down box further down the page asks you elect whether or not you want Facebook to use your name and likeness in Facebook ads, which it explains are sometimes paired with social actions (like becoming a fan of something), but it points out that these ads are only displayed to your confirmed friends. If your photo is used, it will be your profile photo, and Facebook points out that they don’t sell your information to advertisers. Your options here are Only my friends and No one, once you make a selection, save your changes.

8. My Photos

Profile photos were part of Facebook’s new privacy changes, as they were made public by default under the new policy, but you may select different privacy settings for each of your photo albums, photos, and videos you’ve been tagged in by selecting Privacy Settings from the main drop-down menu and selecting Profile Information.

Settings range from everyone to only your friends to your network friends of friends, and here you change your settings according to your privacy needs in the drop-down menu and save them.

Some users have noted what appears to be a bug where photo albums are made more publicly accessible than users had set them to.

9. My Wall


Allowing friends to post to your Wall is another personal choice, easily made by checking or unchecking the indicated box, and gain added control by creating lists (see below).

10. Hiding My Friends

One of the outcries after Facebook’s new privacy setting went into effect was the inability to keep your list of friends off of your profile. Consequently, Facebook modified the policy and as of December 10, 2009 there’s an option to hide your friends so they “won’t appear on your profile regardless of whether people are viewing it while logged into Facebook or logged out.”

To hide your friends, click on the pencil icon in the top right corner of the Friends box on your profile, uncheck the “Show my friends on my profile” box to prevent your list from appearing on your profile.

11. Making Lists to Restrict Access

Another way Facebook has previously given users control over who sees your information is the creation of friend lists. You can create lists and restrict access to your page to people on a given list. To do so, click on the Friends menu at the top of your home page and either click on the Create link on the left-hand side of the screen or the Create New List button at the top of your list of Friends. A pop-up window appears asking you to select the friends to add to the list and also name it.

To take this list and restrict access to its members, select Privacy Settings under the Settings drop-down menu, click on Profile Information and then select Customize as an option for one of the options, type in the name of your list in the box that says “Hide this from,” and you’ve restricted the entire list from seeing your information.

12. Blocking People From My Profile

Of course if there’s a person you don’t want to see your Facebook page at all, you can always block them completely by selecting Privacy Settings from the Settings drop-down menu and clicking on Block List. Note, though, that while friendships/relationships on Facebook will be removed when you block someone, they may still use some apps that you do, be fans of the same things, etc., so you may still have some communication with them that way.

13. What My Friends Share About Me

Some of the worst privacy breaches can happen when your friends share information about you on Facebook. But, there is a way to control for this with Facebook’s privacy settings.

To change this, go to the Applications and Websites options under the Privacy Settings menu, where you have the opportunity to check or uncheck boxes which delineate your boundaries allowing your friends to publish information about you on Facebook. Again, depending on your professional, friendship or familiar preferences, this is a chance for you to gain greater control over your online persona.

Under the Notifications tab you have a chance to be notified when others post photos or videos of you, or comment on them. If you’re concerned about this being done without your knowledge, you can elect to be notified about it, along with other notifications such as if someone confirms you as a friend or comments on a link you posted by checking or unchecking the corresponding boxes and saving your changes.

14. Searching for Me on Facebook and the Internet

If you’d like to take your control over who can find you on Facebook to the next level, you may also decide who on Facebook, as well as the world — as in Google — can see about you. The Search options under the Privacy Settings menu allow you to opt-out of public searches on services like Google by checking a box and adjust your privacy settings within Facebook via a drop-down menu ranging from Everyone to Only Friends.

You have the option to see a preview of what your information looks when you allow yourself to be searched.

15. My App Privacy

Editing the privacy settings of the apps on your Facebook profile is another way to protect your privacy, given that most apps access the information on your profile as a condition of use. Select Application Settings from the Settings dropdown menu or go to the Applications and Websites section of Privacy Settings in the same dropdown menu to edit these settings.

As with most privacy settings on Facebook, when you click on Edit Settings of a particular application you may decide who you want to see your activity within that app, which in this case includes items like your Notes and Wall. To edit SuperPoke, for example, click on Edit Settings and decide who you want to see your activity there: Everyone, Networks, Friends of Friends, Friends or Only Me.

In the Applications and Websites menu under Privacy Settings you can click on the Learn More button to find out what Facebook says you share with, potentially, the world when you access and app or other web sites.

Specifically, “When you visit a Facebook-enhanced application or website, it may access any information you have made visible to Everyone as well as your publicly available information. This includes your Name, Profile Picture, Gender, Current City, Networks, Friend List, and Pages. The application will request your permission to access any additional information it needs.”

The page prompts you to edit your privacy settings after reading.

16. Blocking an App

On this page you may also Edit Blocked Applications, which essentially does what it says: blocks apps from your page. This is an option than can also be accessed on the Requests page, and comes in handy on the twenty-seventh request to join Mafia Wars, for example.

In this vein, if you have a friend who uses every single app on Facebook and wants you to as well, you have the option to Ignore Application Invites from certain friends, an option also available on the Requests page, located in the upper right-hand side of your homepage.

17. Deactivating Your Account

And for those of you who are done with Facebook — literally — there’s the Deactivate option for your account, found under Account Settings, although simply clicking on deactivate will not erase your account.

First, Facebook will beg you to stay, reminding you with photos and requests that you have friends who will “miss you” and ask you to send them a message before erasing your account. There’s also a survey asking you what your dissatisfaction with the service was.

Conclusion

To conclude, the privacy settings on Facebook are somewhat confusing, in part because there are multiple places to edit the same settings. But, it’s also worth noting that Facebook continually redesigns its interface and likely will re-arrange some of the locations for privacy settings.

It’s worth taking a look to ensure that you’re getting exactly what you want out of Facebook— whatever that may be.


Photobucket

Facebook to charge user is a HOAX, finally!

Read Original

by Nick O'Neill

-Pay Here Image-The ongoing thread that Facebook will soon begin charging for their site doesn’t appear to be slowing. The other night I was having dinner with a family friend who told me about a scoop he had that Facebook would soon begin charging for the site and proceeded to explain why he would pay. While it’s great that Facebook has provided value to his life and millions of others, the company will not charge users to access the site.

Just two weeks ago we wrote that Facebook will not charge users, however millions of users continue to be deceived. One Facebook group, “300,000 MEMBERS NEEDED TO STOP FACEBOOK FROM CHARGING £/$14.99 A MONTH”, has successfully attracted over 474,000 users. Another group claims Facebook will begin charging on July 1st, but it’s a flat out lie used as a way to drive thousands of users to the group.

While Facebook has systematically shut down groups spreading this false information one at a time, I’d expect the company to create a filter to prevent these groups from being created in the first place. As I wrote in December, “Facebook didn’t become the most popular site in the U.S. on Christmas by charging for their service, and they aren’t going to become the largest site in the world by charging for their service.”

This is an ongoing rumor which Facebook continues to deny, stating that their service is ad supported. To all the users who think Facebook will start charging for their service, this article is for you. It never happened before, and while Facebook could generate billions by charging for their site, it’s not going to happen. All the groups stating that Facebook will charge are nothing more than flat out lies.

source from allfacebook.com

Photobucket

Haiti before and after from satellite

Read Original





Read Original

from google blog:-

With relief efforts underway, many displaced Haitians and their friends and families around the world are deeply concerned about the safety and whereabouts of loved ones. In response to the Haitian earthquake, a team of Googlers worked with the U.S. Department of State to create an online People Finder gadget so that people can submit information about missing persons and to search the database.



You'll find this gadget on our Haiti earthquake response website as well as on the State Department website. In order to prevent the proliferation of multiple missing persons databases (a big problem during Hurricane Katrina), we've made the People Finder gadget standards-based and easily embeddable on any website (see here for instructions). The gadget is currently available in English, French and Creole.

We're also helping families in the U.S. stay connected with their loved ones in Haiti by offering free calls to Haiti for the next two weeks via Google Voice. If you don't have a Google Voice account already, request an invitation at www.google.com/voice.

For anyone interested in viewing updated imagery in Google Earth, we've now included GeoEye's shots from Wednesday in the Historical Imagery feature. Now you can view the imagery without downloading the KML file and can use the time slider to easily compare the stark before-and-after images, such as those below. To help relief organizations, GeoEye has made professional-quality files of their recent satellite imagery of Haiti downloadable via our earthquake response website. We hope the imagery in this format will be valuable to GIS organizations and aid workers.


We have also made Haiti Map Maker data publicly available for download for non-commercial use and attribution. Data can be used by relief workers to do things such as create offline maps, combine data sets and run analysis, all of which we hope will help with their efforts on the ground. Please help improve Haiti maps with Google Map Maker.

News and user footage continues to roll into YouTube. Oxfam and the American Red Cross are even responding to donations by uploading videos that show viewers exactly where their contributions are making a difference.

Posted by Jacquelline Fuller and Prem Ramaswami for the Google Crisis Response Team


Photobucket

PDFMyURL convert any website to PDF for free.

Read Original


If you just want a PDF of a given URL at a certain time, PDFmyURL gets the job done with no fuss, no muss. You can also grab the bookmarklet from the front page to pull off the conversion at any time.

1. Open PDFmyURL


2. Enter website URL, Click P button


3. Your PDF is ready


Click the "Advanced Options" on the right, though, and you'll learn how to pull off PDF production without even visiting the site, embed advanced options, and even run PDFmyURL from your own server. Neat, free stuff, and a great public service.

Create your PDF now PDFmyURL



Photobucket

Avast 5 - a new look

Read Original

by Seth Rosenblatt

Freeware antivirus Avast 5 debuts today with several new features, but longtime fans are most likely to notice that the old interface has gone to wherever interfaces go when they die. Along with the new interface, Avast Free, Avast Professional, and the new Avast Internet Security introduce an overhauled feature set that keep the suite highly competitive. Arguably, the free version provides the most complete free antivirus on the market.


The new, clean look of Avast.

(Credit: Screenshot by Seth Rosenblatt/CNET)
Before detailing the new features, the importance of this interface change can't be understated. Gone is the music player default look, which was skinnable but confusing. In its place is a sleek UI that new users should find far more manageable. The gray and orange color scheme stands out well on the screen, and the tab-based navigation on the left makes it much easier than before to navigate between features. Highlighted with the familiar security colors of green for safe and red for dangerous, the Summary tab gives up-to-date info on shield status, auto-updates, virus definitions, the program version, and whether the new silent/gaming mode is on. There's also an unobtrusive ad to Avast Internet Security.

The Summary tab contains a second sub-menu, Statistics. If you're curious to see how Avast's shields have been performing against threats, here's where you can get your math geek on. For each shield, it tells you how many files were scanned and when, and presents the data in a concise graph.

The scans live in the second tab, where you can choose and adjust six default scan types plus a custom scan option. What useful about Avast's layout here is that you can adjust all Avast-related scans from this tab. This includes the expected Quick and Full scans, but also encompasses the Removable media scan, Folder scan, Scans initiated from Windows Explorer, and the Screen Saver scan. Once you initiate a scan, you're not locked into that pane. Exploring the program interface while a scan runs doesn't kill the scan.

You can also schedule a boot-time scan and access scan logs from the scan tab. While running a scan, Avast will tell you not only how long the scan has taken and how many files have been examined, but also how much data has been tested and how fast it's being tested. As with the summary graphs, there's a lot of data that Avast exposes.


The old look of Avast 4.8 and its settings window.

(Credit: Screenshot by Seth Rosenblatt/CNET)
The Real-Time Shields live in the third tab, and again the clean interface comes into play here as navigating what could be a mess of options and tweaks is instead dead simple. Click on a shield to reveal a real-time chart of what it's been defending you against, with a Stop button and settings options at the top of the window. Another button at the top takes you to the advanced settings for that shield, while links at the bottom expose the shield's history as a graph and export a log file.

The last tab, Maintenance, contains the virus chest and manual update buttons. On the top right of the interface live the Help Center and the Settings, from which you can get much more granular control of Avast. This includes everything from toggling the system tray icon, to managing updates, to password-protecting Avast access. This is also where you can un-involve your anonymously-submitted data from Community IQ, the Avast crowd-sourced behavioral detection engine. The new Avast interface is also Aero-friendly, with Explorer-style backward and forward navigation buttons in case you can't remember where you tweaked a particular setting. If the interface turned you off before, Avast 5 is worth another look just to see how much it's improved.

The basic free version, formerly known as the Home Edition, includes an attractive and obviously affordable set of features. The antivirus, antispyware, and heuristics engines form a security core that also includes multiple real-time shields. Mail and file system shields join the pre-existing behavior, network, instant messaging, peer-to-peer, and Web shields. Other new features include a silent-gaming mode and an "intelligent scanner" that only looks at changed files after establishing a baseline.

The behavioral shield is a common-sense feature, as security software publishers leverage their large user bases to detect threats early and warn others. Avast's user base is interesting in that they're heavily involved in the support of the software, and the company claims that their mostly volunteer-run support forums see 100,000 daily visitors. This isn't surprising, though, given that Avast passed the 100 million user mark at the end of 2009.


There are several features that are only available in both the Professional and Internet Security versions. The Pro version, which comes with a single-computer license for $39.95, offers a script shield and a sandbox for isolating and testing suspected threats, without having to worry about infection. The Internet Security version gives users three licenses for $59.95, and includes a firewall and antispam measures along with the sandbox and script shield.

Efficacy testing of antivirus programs is becoming trickier as threats mutate beyond what the tests have been designed to check, but some testing is better than none. In the Whole Product Dynamic Test by independent efficacy tester AV-Comparitives in December 2009, which tested a beta version of Avast 5, the program earned an Advanced rating. Although it shared that score with six others, including Eset and the free programs from Microsoft and Avira, only two programs scored higher: Norton and Kaspersky.

In November 2009, Avast 4.8 and Microsoft Security Essentials were the only freeware to score Advanced+ in the Retrospective/Proactive Test done by AV Comparatives. It's also the only program that tested faster than Norton AntiVirus 2010, and was tied with Microsoft for second place in fewest false positives detected. The detection score was also high, at 98 percent. That's worse than Avira, but Avast noted far fewer false positives. Avast 5 Free lacks features in the paid upgrade including antispam measures, a testing sandbox, a Script shield, and a firewall. Even without those, Avast Free 5 probably the strongest, free antivirus currently available.

CNET Labs is currently performing its own tests, which will be updated here when the results are in. In an empirical real-world test, though, the Quick scan took 13 minutes, 52 seconds, while a Full scan ran about 90 minutes.

Users should also note that along with offering an opt-in to Google Chrome when installing Avast, the free version was also chosen last week to be part of the Google Pack in Europe.

While it's clear that the paid versions of Avast represent a good value, albeit not the best value, the efficacy, feature set, and ease-of-use of Avast Free make it a must-have security suite.

taken from download.com

Photobucket

Thursday, January 14, 2010

New IE hole exploited in attacks on U.S. firms

Read Original


from Download dot com by Elinor Mills

Attackers targeting Google and a host of other U.S. companies recently used software that exploits a new hole in Internet Explorer, Microsoft said Thursday.





"Internet Explorer was one of the vectors" used in the attacks that Google disclosed earlier this week, Microsoft said in a statement. "To date, Microsoft has not seen widespread customer impact, rather only targeted and limited attacks exploiting IE 6," the statement said.

The vulnerability affects Internet Explorer 6, IE 7, and IE 8 on Windows 7, Vista, Windows XP, Server 2003, Server 2008 R2, as well as IE 6 Service Pack 1 on Windows 2000 Service Pack 4, Microsoft said in an advisory on Thursday afternoon.

Google disclosed the attacks targeting it and other U.S. companies on Tuesday and said the attacks originated in China. Human rights activists who use Gmail also were targeted, Google said.

Source code was stolen from some of the more than 30 Silicon Valley companies targeted in the attack, sources said. Adobe has confirmed that it was targeted by an attack, and sources have said Yahoo, Symantec, Juniper Networks, Northrop Grumman, and Dow Chemical also were targets.

Microsoft said the vulnerability in IE exists as an invalid pointer reference and that it could allow an attacker to take control of a computer if the target were duped into clicking on a link in an e-mail or an instant message that led to a Web site hosting malware. "It could also be possible to display specially crafted Web content using banner advertisements or other methods to deliver Web content to affected systems," Microsoft said in the statement.

Microsoft is working on a fix but could not say whether it would address the issue as part of its next Patch Tuesday scheduled for February 9 or before.

Keeping the IE Internet zone security setting on "high" will protect users from the vulnerability by prompting before running ActiveX Controls and Active Scripting, Microsoft said. Customers should also enable Data Execution Prevention (DEP), which helps mitigate online attacks, the company said. DEP is enabled by default in IE 8 but must be manually turned on in earlier versions.

Microsoft acknowledged Google, Mandiant, Adobe Systems, and McAfee for working with the company and providing details on the attack.

Operation Aurora
Earlier on Thursday, McAfee CTO George Kurtz detailed the vulnerability in a blog post.

"As with most targeted attacks, the intruders gained access to an organization by sending a tailored attack to one or a few targeted individuals. We suspect these individuals were targeted because they likely had access to valuable intellectual property," Kurtz wrote. "These attacks will look like they come from a trusted source, leading the target to fall for the trap and clicking a link or file. That's when the exploitation takes place, using the vulnerability in Microsoft's Internet Explorer."

Many targeted attacks involve a "cocktail" of zero-day vulnerabilities combined with social engineering, he said. "So there very well may be other attack vectors that are not known to us at this time," he wrote.

Initially, security researchers investigating the attacks believed that a hole in Adobe Reader was a culprit, but Adobe has said that it has no evidence to suggest that a vulnerability in its technology was an attack vector.

McAfee believes the internal name attackers gave to the operation was "Aurora," which the code indicated was the directory name on the computer where the code was compiled into an executable file, said Dmitri Alperovitch, vice president of threat research at McAfee.

The attack was notable for its level of sophistication, using obfuscation techniques not typically seen in attacks on corporations, he said. It dropped about 10 different malicious files with different capabilities that were used at different stages of the infection and used crypto and other techniques to avoid detection, he added.

"The exploit itself was a piece of JavaScript code that encrypted itself and had multiple layers of encryption that got you to the executable binary code, which phoned home and then pulled an encrypted file from an external server," Alperovitch said. "That file used multiple keys for encryption and once it was decrypted it turned into an executable that dropped various modules onto the infected system."

One of the modules was a back door that phoned home to a different server and established an encrypted channel designed to avoid detection by masquerading as an Secure Sockets Layer protocol, he said. "That allowed the hackers to connect to the machine and basically take it over remotely. From then on they had a beachhead to explore the rest of the network for reconnaissance."

Asked what what type of data or areas of the network the code was programmed to look for or access, Alperovitch said "We saw the backdoor, but we did not see the capability in the malware to scan networks and locate things."

The attacks lasted about three weeks, from mid-December until January 4 and were most likely timed to coincide with the holiday season when offices would be closed or lightly staffed, he said.

In early January the command-and-control channels that the code used to receive instructions from the attackers were shut down, he said, adding, "So, we could not verify where the data was going or whether there were links to China."

He said he does not know why the command-and-control servers were shut down. They were located in Taiwan and in Texas and Illinois, he said.

"We believe this attack is a watershed moment," Alperovitch said. "We've never seen this level of sophistication on attacks targeting commercial companies that aren't affiliated with a government or the defense industrial base."

Wired initially reported the IE hole earlier on Thursday, citing an unnamed source.

Updated 7:10 p.m. PST with more details from McAfee and 3:30 p.m. PST with Microsoft advisory and details and 2:33 p.m. PST to clarify that Google, not McAfee, said attacks came from China and 1:05 p.m. PST with Microsoft comment and more details from McAfee's George Kurtz.

Click Here for Original Source
Originally posted at InSecurity Complex

Photobucket