Reliable Answers - News and Commentary

Technology in the News

Technology is constantly changing and providing the casual user with challenges never dreamed of. Technology in the News is provided in an effort to assist you in getting the most out of your computer, while avoiding some of the pitfalls. Your computer really isn't out to get you. Why not learn to be friends?

      
 Title   Date   Author   Host 

thepatriotnation.net

January 7, 2014

Facebook, the popular social network with over a billion users world wide, has just been hit with a class-action lawsuit.

The allegations, revealed in the FT, are that Facebook systematically scans the content of private messages so it can sell the data to third parties such as advertisers. Facebook's entire business model is based on the fact that it monitors what users write, like and up-load in order to sell this information on to others. I have covered some of the concerns about this in my articles 'How Facebook Exploits Your Private Information' and 'How Facebook Likes Reveal Your Intimate Secrets'. In principle, there is nothing wrong with Facebook using our data to make commercial gains. In the end, the service is free and Facebook has to make money somehow. However, my biggest concern is that the data mining activities are not as transparent as they should be.

Business Wire (CA)

July 16, 2011

Work Begins on First-Ever Web-Based Child Immunization Registry in Orange County; Orange County is Only County in So. California Without a County-Wide Registry

An immunization registry is a web-enabled information system that functions as a source for providers of complete patient immunization histories and serves to assess patients' immunization needs, reminds patients, parents and providers when immunizations are due, and allows providers to view the patients' histories from any medical clinic facility.

Hot Air

by Allahpundit

July 30, 2014

I'm as surprised as you are. Who could have guessed that someone who "joked" about working for OFA might not like grassroots righties?

There's an important lesson to be learned here, my friends. When you're arranging for your hard drive to be "scratched," make sure it's scratched deeply enough that stuff like this can't be recovered. No wonder she wanted to take a closer look at tea-party nonprofits. They're run by terrorists 'n stuff.

OpenDNS Blog

by Opendns Security Research

July 10, 2012

What is the "Blackhole" Exploit Kit?

A very popular and customizable kit to exploit a range of client vulnerabilities via the Web. Hackers license the kit (or rent an already exploited site) to cyber criminals. Cyber criminals compromise Web pages and embed an invisible iFrame. Potential victims visit a compromised Web page and are redirected to the hosted exploit. If the victim has one of the targeted client vulnerabilities, their device is infected. OpenDNS's enforcement is device-, application-, protocol- and port-agnostic so all our users are protected.

Google-Blog

by Dirson

August 3, 2005

Since yesterday, "Blogger Developers Network" is cracked. This blog is a space where Blogger team publishes projects and code related with the blogging tool. You can see the original appearance of the blog on this screenshot or through Google cache.

The cracker, who changed the title ("Downloading..99%") and the design with another one inspired by 'Matrix' movie (view screenshot 1 and screenshot 2), claims that the attack was possible due to a vulnerability of Blogger, which allows any member who is invited to this blog become into admin.

Smashing Magazine

by Lea Verou

November 3, 2011

Frequently, when I discuss CSS3 with other developers, the issue of stubborn clients comes up.

They tell me that even though they personally don't think a website should look the same in all browsers and they're eager to try all of these new techniques, their clients insist that their website should look the same, so the developers are stuck with the same Web development techniques that we used five to ten years ago. Their clients just don't "get" graceful degradation. Is this really the issue? Are our clients incapable of understanding these things?

Commtouch Cafe

by Lordian Mosuela

August 18, 2011

RIGHT TO LEFT OVERRIDE (RLO) is a unicode control character (U+202E) that reverses the character reading order from the traditional left-to-right, to right-to-left.

We reported this trick last year but it has resurfaced extensively in the past week to trick users into opening malware executables. Malware uses RLO to reverse the direction of text in a filename. This can make an "exe" file appear to be a harmless "doc" file. These new variants of the Bredolab virus are distributed via emails that have a subject line similar to "inter-company invoice".

mattcutts.com

by Matt Cutts

August 2, 2012

One of the most tenacious blackhat webspam techniques we continue to see is hacked sites.

I wanted to remind site owners that our free "Fetch as Google" tool can be a really helpful way to see whether you've successfully cleaned up a hacked site. For example, recently a well-known musician's website was hacked. The management firm for the musician wrote in to say that the site was clean now. Here's the reply I sent back...

mrconservative.com

by Kristin Tate

May 17, 2013

A local Seattle bookshop quickly transformed into what appeared to be a crime scene all because of a ... granola bar wrapper. Yes, you read that correctly.

Around 7 a.m. on Wednesday, police and a bomb squad were called to Mystery Bookshop to investigate a "suspicious package". Officers reached the scene to discover an inflated granola bar wrapper and a computer modem card attached by a phone cord, all placed on top of a piece of white paper. After a mere five minutes, the bomb squad determined that the granola bar wrapper and computer modem were just that- a harmless granola bar wrapper and computer modem on a piece of paper. Amber, an employee at the bookshop, wrote on the store's website that she appreciated the police's response to the call. "In this day and age, you cannot be too careful," she wrote. Good grief.

f-secure.com

June 21, 2010

For the past 12 hours, over 1000 Twitter accounts have been hacked with an unknown method.

      
[Kidjacked] - learn and discuss Social-Political events and Family issues

Take me to the top

Reliable Answers.com does not endorse any Google advertisers, these ads are managed by Google. They are here to pay for hosting expenses. If you notice an inappropriate ad, please contact Shawn with the domain of the offensive advertiser.


Take me to the top

Your Ad Here?

Contact our Marketing department for information about advertising on this domain.


Take me to the top

We invite you
to visit:

Professional Web Hosting and Design Services: 12 Point Design Local Homeschool provides the most up-to-date support group listings in a geographical and searchable index Budget Homeschool Kidjacked -- To seize control of a child, by use of force SaferPC dispels security misunderstandings and provides you with a solid understanding of viruses and computer security Reliable Answers - developer information, current news, human interest and legislative news Twain Harte Photo Gallery - Twain Harte, CA - The closest you can get to Heaven on Earth Cranial Laser & Neurolymphatic Release Techniques (CLNRT) - Experience dramatic pain reduction At Summit Chiropractic our mission is to improve your quality of life - We know that health is much more than just not feeling pain Visit UniveralPreschool.com to learn about your preschool options. Dave's Quick Search Deskbar
Reliable Answers.com/pc/news.asp AddThis Social Bookmark Button
Google