access

Thu
07
Oct
Dennis Faas's picture

Microsoft Security: Infected PCs Should be Banned

Viruses get their name because, like human diseases, they can spread and multiply quickly. Now, Microsoft believes some of the tactics used to protect public health should be applied to the world of technology. Computer Virus Prevention is Key to ... Deterring Further Infections The idea comes from Scott Charney, a senior figure in Microsoft's security team. He's just published a paper named "Collective Defense: Applying Public Health Models to the Internet." In Charney's paper, he argues that while preventing individual machines from getting infected -- for example through security software -- ... (view more)

Thu
22
Jul
Dennis Faas's picture

Sandboxing

In computer security, "sandboxing" is a security term used to describe the separation of running programs on an operating system. A sandbox, as it is also referred to, is often used to execute untested computer programs to ensure that they do not ... overstep their boundaries and cause harm to the system. The sandbox typically provides a tightly-controlled set of resources for guest programs to run in, such as scratch space on disk and memory. Network access and the ability to inspect the host system or read from input devices are usually disallowed or heavily restricted. In this sense, sandboxes ... (view more)

Wed
16
Jun
Dennis Faas's picture

Google Operating System to Run Windows Apps

Google's forthcoming Chrome operating system (OS) will be able to run applications from other operating systems, such as Microsoft Windows. The procedure is a relatively simple technical solution, though one which has practical limitations. The ... Chrome operating system, which has been released in a form developers can experiment with works in a different way than most web browsers. It's designed to run when the computer is online and is, to a major extent, a souped-up version of Google's Chrome web browser. Chrome OS Goes Easy on Old PCs Instead of standalone applications on the computer, most ... (view more)

Thu
22
Apr
Dennis Faas's picture

Government Considers New Approach Over Net Neutrality

A former presidential advisor has called for the US government to reclassify the legal status of the Internet. It follows concerns that the Federal Communications Commission (FCC) may not have the statutory authority to enforce "net neutrality" ... principles or to go ahead with proposed plans to expand Internet access. The FCC has historically sought to uphold the idea of net neutrality. This is the principle that, with the exception of illegal material, all Internet traffic should be treated equally by carriers. This would mean, for example, that an Internet service provider couldn't charge ... (view more)

Fri
18
Dec
Dennis Faas's picture

Free WiFi Coming to Your Local McDonald's

Got to get your fix for a Big Mac but can't stop writing that report? Then you'll be happy to know that fast food goliath McDonald's will soon be unveiling free WiFi Internet access at about 80 per cent of its U.S. locations. Thanks to a new pact ... signed with AT ... (view more)

Tue
08
Dec
Dennis Faas's picture

Windows 7 Hidden Bonus: Ad-Hoc Networking

A Windows blogger has discovered that a feature supposedly removed from the starter edition of Windows 7 is in fact simply hidden. Thus, users of the new operating system (OS) can easily access the ability to run so-called ad-hoc networks. An ad-hoc ... network, also sometimes known as a computer-to-computer network, is a way of wirelessly connecting two computers directly rather than through a router. For example, you might use this when the main computer in a home is connected to the Internet through a cable modem rather than a router, with the ad-hoc network then allowing laptops to share data ... (view more)

Tue
08
Dec
Dennis Faas's picture

Migrating to Win7: How to Mount Your XP Drive Image

I've decided to put together step-by-step instructions on how to use Acronis True Image 2010 to migrate from Windows XP to Windows 7. I'm doing this for two reasons: 1. We currently have a sale on Acronis True Image on our website at 25% off . The ... proceeds will go directly to support our site. 2. Most folks will have time during the holidays to perform the Windows XP to Windows 7 upgrade . It will take a few days to do because it will require you to do a fresh install of Windows. But before that you need to backup what you have and then be able to access the data later after Windows 7 is ... (view more)

Thu
19
Nov
Dennis Faas's picture

'Create Private Torrents', and 'Access Linux Files From Windows'

Create Private Torrents This article explains how to share large files with either your friends privately or with anyone publicly using Bittorrent and uTorrent. Creating Torrents and sharing files can be a risky business, so it's important you're ... prepared. http://www.bootstrike.com Access Linux Files From Windows Want to know how to get safe and quick access to alternative file systems? DiskInternals Linux Reader is a new easy way to do this. This program plays the role of a bridge between your Windows and Ext2/Ext3 Linux file systems. This easy-to-use tool runs under Windows and allows you ... (view more)

Thu
05
Nov
Dennis Faas's picture

'Dataminer', and 'Disable Last Access Timestamp'

Dataminer This program recovers lost files from a damaged optical disc (CD or DVD). Use it to rescue your important files from a scratched disc or even an accidentally overwritten rewriteable disc. The program can heuristically recognize various ... kinds of files, such as .BMP, .ICO, .CUR, .ANI, .AVI, .CDA, .WAV, and more. http://greenfish.extra.hu Disable Last Access Timestamp Speed up your sluggish Windows XP operating system by disabling automatic file timestamps. It's a handy little method to squeeze every little bit of juice out of an old, ailing system. NOTE: this will only work on NTFS ( ... (view more)

Mon
27
Jul
Dennis Faas's picture

Sandbox (Sandboxing)

In computer security, a sandbox is a security mechanism for separating running programs. It is often used to execute untested code, or untrusted programs from unverified third-parties, suppliers and untrusted users. A sandbox in computing terms ... (also referred to as "sandboxing") provides a tightly-controlled set of resources for guest programs to run in, such as 'temporary' space on disk and memory. In such a scenario, network access and the ability to inspect the host system or read from input devices are disallowed or heavily restricted. In this sense, sandboxes are a specific example of ... (view more)

Pages

Subscribe to RSS - access