Category Archives: Featured Posts

  • 0

How to bypass security code on IPhone

In the video below, a Brazilian iPhone customer demonstrates the quick method to circumvent an iPhone’s passcode-protected lock screen: tap the “Emergency Call” button, then enter three pound signs, hit the green Call button and immediately press the Lock button. That simple procedure gives a snoop full access to the Phone app on the iPhone, which contains the address book, voicemail and call history.

http://player.vimeo.com/video/16179929

Bug no iOS 4.1 from Salomão Filho on Vimeo.


  • 0

LimeWire Ordered To Shut Down

LimeWire Ordered To Shut Down! A federal judge has issued an injunction against LimeWire that essentially puts the music file-sharing site out of business, five months after it lost a copyright-infringement suit filed by the record industry.

U.S. district judge Kimba Wood in New York issued the permanent injunction Tuesday, ordering LimeWire to disable the “searching, downloading, uploading, file trading, and/or file distribution functionality” of the software it distributed to users to access and share files through the peer-to-peer service. In addition, the judge said in the 17-page ruling that LimeWire must notify its workers, investors, and customers of the injunction. Wood also ordered the site to file a progress report in meeting all conditions of the order within 14 days.

The injunction essentially shut down the site, which on Tuesday posted on its homepage a legal notice saying that it had been ordered to stop distributing and supporting its file-sharing application. “Downloading or sharing copyrighted content without authorization is illegal,” the post warned.

In a statement, LimeWire called the decision a “sad occasion.”

“Naturally, we’re disappointed with this turn of events,” chief executive George Searle said in a statement.

However, Searle said the injunction only applied to the company’s file-sharing product and said, “Our company remains open for business.” However, what it would do was not clear. Searle said the company remained “deeply committed” to working with the music industry and was working on a new music service.

In a statement obtained by The New York Times, the Recording Industry Association of America, which represented the 13 record companies that sued the site, said the injunction “will start to unwind the massive piracy machine that LimeWire and (founder and chairman Mark) Gorton used to enrich themselves immensely.”

While the injunction closed down the site, it did not put an end to the case. Both sides will appear before Wood in January to begin arguments on how much LimeWire and Gorton should pay in damages, according to the RIAA statement.

LimeWire now joins other high-profile file-sharing sites, namely Grokster and Napster, in being shut down through a lawsuit filed by entertainment companies. LimeWire, launched in 2000, was one of the largest remaining commercial peer-to-peer services left on the web. The company claimed to have more than 50 million monthly users downloading 3 billion songs a month, according to the court.

Wood in May ruled that LimeWire was liable for the use of its software to illegally download copyrighted music. In issuing the ruling, the judge referred to the Grokster case in which the Supreme Court ruled in 2005 that the file-sharing service was liable when customers used it to swap songs and movies illegally. The ruling stemmed from a lawsuit filed by MGM Studios.

The record companies that sued Lime Wire included Arista, Atlantic, BMG Music, Capital, Elektra, Interscope, LaFace, Motown, Priority, Sony BMG, UMG, Virgin, and Warner Brothers.


  • 0

Norton Says Renew now or “Beg for Mercy”

Instead of Symantec’s Norton Anti-Virus removing all adware and keeping your PC safe, the pop-up for when the subscription expires says “Maybe things will be ok for a while longer, Then again, maybe cybercriminals are about to clean out your bank account. The choice is yours: Protect yourself now or beg for mercy.” Sounds more like malware extortion to me.


  • 0

BlackBerry Playbook to Battle IPad

The PlayBook’s specs are impressive on paper. A 1GHz dual-core ARM processor, and multitasking based on RIM’s QNX technology.

By touting these specs, Research In Motion is obviously trying to execute some serious one-upmanship vis-a-vis the iPad–even when allowing for the fact that the PlayBook won’t appear until the first quarter, when Apple could potentially deliver a better iPad. Vaporware? Yes, at the moment. And building a large library of apps for the PlayBook is also problematic. But it’s nonetheless an interesting exercise to speculate on it, since the PlayBook is garnering a lot of attention.

My first question is, will Apple have a dual-core iPad by then? A second core may seem like a trivial spec to some, but it can make a big difference (just witness the leap in performance that PCs made when Intel went dual-core).

Read more: http://news.cnet.com/8301-13924_3-20018366-64.html?part=rss&subj=news&tag=2547-1_3-0-20#ixzz11KMPNZkd


  • 0

Facebook trying to trademark the word “face” and “book”

When businesses become big, some decide to act big too. They walk into the legal saloon, swagger up to the bar and expect plaudits and favors to come streaming their way.

Sometimes it is for good reason, for they fear that others might trade off the back of their bigness. Sometimes, though, it is just an attempt to live large.

What, then, might one think of the news that Facebook is reportedly not merely attempting to trademark the word “book,” but also the word “face”?

The patent application, seems to seek a rather broad coverage.

TechCrunch reports that Aaron Greenspan, a classmate of Facebook’s Mark Zuckerberg at Harvard and someone who may or may not have been a participant in the company’s founding, has already laid an objection to the trademark application.

Greenspan has a company called ThinkComputer and a mobile payment app called FaceCash. He has therefore reportedly asked the U.S. Patent and Trademark Office for an extension to fully form his discomfort.

I will admit not to have been entirely au fait with FaceCash’s possibilities.

However, who could not have enjoyed some kind of relationship with a thing called FaceTime, Apple’s very nice video chatting telecommunication feature of the iPhone 4? Apple already owns the trademark to FaceTime, yet it is very fond of creating subbrands that have a very close verbal identification with each other.

What if Apple wants to create new versions of FaceTime, called, say, FaceIT, through which you could be grilled face-to-face by your most trusted IT professional anywhere in the world? Would that be suddenly verboten?

Yes, I know that not everyone wants to talk to an IT professional face-to-face. Of course I don’t expect such a feature to suddenly appear on iPhone 5. (It’s just a little too niche.)

But surely the question is whether Facebook can prevent any new product, especially one that might already carry some fame with it (like FaceTime), appearing in the vaguely technologically communicative sphere with the word “face” at the beginning of its name.

I have contacted Apple for comment and will update with the company’s reply.


  • 0

Movie Studios sue Shops with Pirated Materials

Movie studios are extending their efforts to take down sites that offer pirated material, with a new lawsuit targeting an advertising company that provides services to such sites. As first reported by The Hollywood Reporter, Warner Bros. and Disney have teamed up to sue Triton Media, accusing the company of both contributory and induced copyright infringement because Triton helps to keep the sites alive by providing them with advertising and referral income.

Warner and Disney say that Triton has relationships with at least nine sites that they consider to be “one-stop-shops” for illegal copies of the studios’ work. The list is made up of mostly no-name sites, such as free-tv-video-online.info, watch-movies-links.net, and thepiratecity.org. According to the complaint, Triton and the nine sites basically had a symbiotic relationship—both sides allegedly profited from the distribution of pirated works, and Triton made it possible by offering “material assistance” to the websites.


  • 0

Naked Pics of Dell Tech Support customer posted online

Strange things can happen when you call tech support.

But perhaps not quite as strange as what allegedly happened to Tara Fitzgerald. According to News10 in Sacramento, Calif., Fitzgerald wanted to send some pictures of herself to her boyfriend, but she couldn’t find them on her Dell computer.

Her urgent need to find these pictures drove her, quite naturally, to call Dell tech support. Her call was answered, she said, by a gentleman in Mumbai, India, named Riyaz Shaikh.

Shaikh, who, by the time you finish this tale, might not turn out to be a gentleman, after all, offered to remotely access her computer so that he could find the pictures for her. Fitzgerald said she watched him as he located her snapshots.

It was another fine day in the helpful history of tech support. However, this success was ruined somewhat, when Fitzgerald allegedly received an e-mail from an unidentified source telling her that her pictures were now freely available for anyone to see on the Web. They were on a site called “bitchtara.”

Perhaps I omitted to mention that many of these pictures depicted Fitzgerald in the nude. And the Web site, as well as clearly violating her privacy, unfortunately offered lewd descriptions of her proclivities that were not in line with reality.

http://c.brightcove.com/services/viewer/federated_f9/52409490001?isVid=1

When Fitzgerald contacted Shaikh again, he suggested that it was, indeed, her boyfriend who had created the site, and he allegedly offered to help take it down. He needed, though, a laptop on which he could work on this vexing problem from home, she said. So–and this is a very painful part of the story–she shipped him one.

“My conscience is talking to me, saying, ‘Tara, don’t send this. Are you crazy?’ I sent it anyway,” she told News10. This part of the tale occurred in January 2009. This is particularly notable, given that the site featuring her pictures was still active, News10 reported, as of last Wednesday.

Indeed, Fitzgerald claimed that her repeated attempts to solve this problem through official channels, both through Dell and the police, were entirely unsuccessful. It was only by turning to the media, she said, that she managed to finally get Dell’s attention.

In the intervening period between sending the computer to India and this week, Fitzgerald discovered that Shaikh had allegedly used her credit card details to spend $802 on a computer and router for a woman in Tennessee.

Finding no way to reverse the alleged evildoings, Fitzgerald said she maintained contact with Shaikh through his personal e-mail account and his official Dell account. As late as this week, she said, he was still offering to pay for the charges and, she believed, still working for Dell.

However, once News10 contacted Dell, it received the following reply: “We investigated the issue, which involved a technical representative at one of Dell’s vendors. We contacted the vendor about the allegation and can confirm that the representative no longer handles Dell calls. We’ve been in contact with Ms. Fitzgerald regarding this issue and continue to investigate her claims to best assist in a resolution.”

One can, of course, accuse Fitzgerald of some considerable naivete in this matter. She had to break the whole story this week to her 14-year-old daughter. However, it seems that if her allegations are, indeed, substantiated by the facts that News10 says it has at its disposal, she might deserve some considerable restitution from Dell itself.

Tech support is a powerful position. It does give those occasionally supercilious anonymous voices at the end of a telephone, whether in India or elsewhere, peculiar access to people’s inner workings.

Fitzgerald’s accusations suggest that the inner workings of one or two people in tech support might deserve closer examination too.


  • 0

How to fix your McAfee crippled computer

McAfee pushed out a malformed security patch early on Wednesday that wound up crippling computers running Windows XP, but there is a fix available. Users should note that it’s labor-intensive and must be applied manually to each computer. If you’re running Windows Vista or Windows 7, your computer shouldn’t be affected by the bad update.

As of 3 p.m. PDT, McAfee had yet to link on its front door to a fix for a false positive update with disastrous consequences that went out Wednesday morning.

If your computer is shutting down automatically, you must address that before you can fix anything else.

  • Step 1: Open a command prompt: Start menu, Run, then type cmd and hit Enter
  • Step 2: Type shutdown -a, which will prevent the shutdown from occurringMcAfee has revealed two fixes for the problem. Each one requires multiple steps, and can be confusing. If you’re not comfortable with advanced computer fixes, you should get help with this.For the first fix, go to the McAfee interface through the Start menu, and disable Access Protection and On-Access Scanner.
  • Step 1: Click Start, Programs, McAfee, and then VirusScan Console
  • Step 2: Right-click “Access Protection”
  • Step 3: Select “Disable”If you have Internet access, download the EXTRA.ZIP file provided by McAfee and unzip the EXTRA.DAT within. (Note that Nai.com is a safe site maintained by McAfee, for those who were wondering.) Once EXTRA.DAT has been extracted:
  • Step 1: Click Start, Run, then type services.msc and click “OK”
  • Step 2: Right-click the McAfee McShield service and select “Stop”
  • Step 3: Copy EXTRA.DAT to “Program FilesCommon FilesMcAfeeEngine”
  • Step 4: Then restart the McAfee McShield service by right-clicking on it and choosing “Start” from the context menu
  • Step 5: Re-enable access protection by going back to the VirusScan Console
  • Step 6: Right-click “Access Protection”
  • Step 7: Select “Enable”
  • Step 8: In the VirusScan Console, go to the Quarantine Manager Policy
  • Step 9: Click the Manager tab
  • Step 10: Right-click on each file in the Quarantine and choose “Restore”There is, of course, one massive hang-up with this McAfee-recommended solution: More likely than not, you don’t have Internet access on your McAfee-borked computer. In fact, it’s highly unlikely that you have access to much of anything, since deleting SVCHOST.EXE prevents key Windows 32-bit sub-system processes from functioning at all. To get the EXTRA.DAT on your computer, you’ll probably have to download it on an unaffected computer, then copy it to either a USB drive or a CD-ROM and use the command prompt to copy it over to your C: drive.The second workaround requires that you apply the EXTRA.DAT fix as detailed above before beginning and that you have access to a second, unaffected Windows XP computer. On that computer, go to C:WINDOWSsystem32 and copy SVCHOST.EXE to a network location or a removable media device such as a USB stick. Then copy the SVCHOST.EXE from the unaffected computer to the affected computer, and restart the McAfee-afflicted computer. There are details on applying the EXTRA.DAT via ePolicy Orchestrator at McAfee’s fix on Nai.com.Severe problems caused by buggy or false positive security updates are rare, but not unheard of. Recent instances include an update from Avast that marked hundreds of legitimate files as threats in December 2009, Computer Associates flagging a Windows system file as a virus in July 2009, and AVG marking ZoneAlarm as malware in October 2008.

    McAfee did not immediately responded to a request for comment.

    Updated at 5 p.m. PDT with additional information.

    McAfee Executive Vice President of Technical Support and Customer Service Brian MacPherson has written a blog post and a follow-up commenting on the situation, although neither addresses how the bad update made it past quality-control testing in the first place.


  • Call Now Button