Archives for Computer technologies - Page 5
iWork productivity software targets Microsoft’s Office
San-Francisco - Apple Computer announced its iWork '05 productivity software suite as part of a cavalcade of products putting it on a collision course with Microsoft and its Office chief…
Troy-horses infects Windows Media files?
Video files appear that download malicious application when they are run. These files are .wmv files infected by and , two Trojans that take advantage of a new technology incorporated…
Taiwan police seize 60,000 suspect AMD CPUs
Based on tips provided by Advanced Micro Devices (AMD) Taiwan, the police Friday raided an electronics company located in Tainan, southern Taiwan, and seized a total of 60,000 suspect AMD…
Has Microsoft gone soft on piracy?
Users of illegitimate Windows XP copies will be allowed to download and install Microsoft's upcoming security patch -- Service Pack 2 (SP2), according to one Microsoft executive. This wasn't the…
Legal software in Ukraine: Problems of the making Computer piracy in Ukraine is prosecuted
The orientation of the software market towards disposing of counterfeit products is inadmissible for the civilized state. The use of unlicensed software is a serious obstacle in the way of…
Five Myths About Software Copy Protection
1. Software piracy is a victimless crime. 2. Software copy protection makes software more expensive. 3. Software copy protection gets in the way of the legitimate user. 4. Inexpensive software…
Standards for Evaluating Software Protection Systems
If you or your company has decided to protect your software, you will probably be evaluating hardware-based security solutions, commonly called "dongles." What should you look for in a software…
Software Computer Piracy and Your Business
Small Business Administration The personal computer (PC) has become a necessity for today's successful small business operations. These increasingly powerful machines use sophisticated software programs for a variety of applications.…
Software Piracy: What You Should Know
Whether you call it borrowing, copying, sharing or "fair use," software piracy is illegal and puts Cornell's students, faculty and staff, as well as the university itself, at risk for…
IDC: 3 future technologies
According to IDC's recently published research, we have top 3 technologies for the Information and Communications Technology (ICT) market."The current ICT industry structure is inefficient and highly fragmented with numerous…
Gamer buys $26,500 virtual land
A 22-year-old gamer has spent $26,500 (£13,700) on an island that exists only in a computer role-playing game (RPG). The Australian gamer, known only by his gaming moniker Deathifier, bought…
Windows XP SP2 Firewall shows your files and printers to every Internet user
After you set up Windows Firewall in Microsoft Windows XP Service Pack 2 (SP2), you may discover that anyone on the Internet can access resources on your computer when you…
phpBB Attachment Mod: new vulnerabilities discovered
Due to two new discovered vulnerabilities and the release of phpBB a new attachment mod version has been update your Attachment Mod to version as soon as possible. You are…
Preventing Virus Problems
Back up essential files! Keep a log of what you do to learn which applications are most important to you. Although you can restore them from their installation CDs, that…
avast! Virus Cleaner
avast! Virus Cleaner is available free for every user. This tool will help you remove selected worm infections from your computer. Free virus & worm removal tool If, despite all…
Computer Virus Help
All About Viruses, Worms, & Trojans What is a Computer Virus? A computer virus is a program that requires a host in order to make copies of itself on computer…
e-Mail Viruses („Worms”) & Junk („Spam”)
Computer Virus Help by Henri Delger e-Mail Viruses ("Worms") As the Internet has grown in popularity, e-mail has evolved from a convenience enjoyed by a few to a necessity for…
Trojans, Viruses & Worms
Angelina, AntiCMOS, AntiEXE, Azusa, Back Orifice, Bones, Boot-437, Brain, Bubbleboy, Bupt9146, Byway Angelina virus is a variant of Stoned, and like Stoned, it spreads to a hard disk when an…
JPG (JPEG) Viruses
JPG (JPEG) -- a "Proof of Concept" Virus What is a "Proof of Concept" virus, and should you be worried about this one? A "Proof of Concept" virus is one…
Multiple vulnerabilities within PHP <= 4.3.9, PHP5 <= 5.0.2
Advisory: Multiple vulnerabilities within PHP 4/5 Release Date: Application: PHP4