Clear and to the Point

14 February, 2010

Microsoft pulls patch that caused “blue screen of death”

Filed under: computers — monado @ 12:13
Tags: ,

Microsoft patches

Microsoft has pulled a security patch that caused the “blue screen of death” on Windows XP computers.

I think that’s what happened to my old computer: I bought a new computer because my old one suddenly became unreliable and subject to blue-screening. Funny, I never even thought of calling either Microsoft or Dell Computers for support.

13 February, 2010

Virus protection software

Filed under: computers — monado @ 11:52

My latest computer keeps pushing a McAfee subscription, so I’m looking into what is actually the best and most reliable. Comments are welcome.

7 September, 2009

DMCA claims made simple

Filed under: online resources,Web — monado @ 09:43
Tags: , , ,

Sendspace, a free file hosting service, has explained clearly and simply who can make a claim of copyright infringement under the Digital Millennium Copyright Act (DMCA) and who can not:

You MUST provide the following information:

  1. Identify yourself as either:
    • The owner of a copyrighted work(s) or
    • A person “authorized to act on behalf of the owner of an exclusive right that is allegedly infringed.”
  2. Provide contact information that is reasonably sufficient to permit the service provider to contact the complaining party, such as an address, telephone number, and, if available, a valid electronic mail address.
  3. State that you have a good faith belief that use of the material in the manner complained of is not authorized by the copyright owner, its agents, or the law.
  4. State that the information in the notification is accurate and, under penalty of perjury, that the complaining party is authorized to act on behalf of the owner of an exclusive right that is allegedly infringed.

(For more details on the information required for valid notification, see 17 U.S.C. 512(c)(3).)

You should be aware that, under the DMCA, claimants who make misrepresentations concerning copyright infringement may be liable for damages incurred as a result of the removal or blocking of the material, court costs, and attorneys fees.

Unfortunately, their privace policy does not assure users that the content of their submitted files will not be read, reviewed, examined, combed over, analyzed, used for marketing research, aggregated, nor sold. That is a serious security omission for anyone with confidential information and makes me unwilling to use the service until I hear back from them about it.

30 March, 2009

Malware: beware the Conficker worm

Filed under: communication,Web — monado @ 11:22
Tags: , , ,

This computer worm has been quietly worming its way into Windows computers around the world. It’s scheduled to go off on April 1st. But that doesn’t mean it’s just an April Fool’s Day joke. The Conficker worm can take over computers and monitor keystrokes. You’re probably safe if you use Firefox, if you have strong passwords and updated virus-protection software, if you don’t open unsolicited attachments, including from your friends.

I for one am seriously thinking of not turning on my computers at all tomorrow.

20 December, 2008

Internet Explorer is too vulnerable — time to change browsers!

Filed under: Web — monado @ 00:12
Tags: ,

Users of Internet Explorer have been warned to stop using it and switch to Mozilla Firefox or Opera. Merely visiting the wrong site can infect your computer.

The flaw in IE allows criminals to gain control of computers that have visited a website infected with malicious code designed to exploit it. While restricting web surfing to trusted sites should reduce the risk of infection, the malicious code can be injected into any website. Users do not have to click or download anything to become infected, merely visiting an infected website is sufficient.

Antivirus software specialists Trend Micro believe as many as 10,000 sites have been hacked to exploit the flaw. Sites that have been compromised so far, however, are mostly Chinese and the attackers seem intent on stealing people’s computer game passwords in order to sell them on the black market rather than looking for personal details such as bank accounts.

It is known as a “zero-day” attack because it exploits a security vulnerability on the same day that the vulnerability became generally known.

Blog at