Symantec website rating tool called Norton Safe Web is now undergoing beta trial and will complement its upcoming Norton Internet Security 2009 and Norton Antivirus 2009 security tools, also in beta. Norton Safe Web will blow the whistle on malicious websites just like other website rating tools that are currently available. The Safe Web beta can be downloaded once you have already signed-up for the Norton Internet Security 2009 beta. If you don't intend to download the tool then you can check any website’s rating on the web-based version of Safe Web, which is essentially a community website that also allows users to rate websites based on the perceived security threat.
What are you playing right now? FPS? RTS? Peggle? Who developed it? Do you even care?
I imagine you do; as a presumably-hardcore gamer, you've likely cultivated a few brand alliances here and there. But what happens when we change the question up a little? Do you think your favorite developer cares about you?
No, I don't mean on an individual, person-to-person basis. What I'm asking is: do you think those oh-so-dreamy devs slave over games for their fans, or for themselves? Yes, yes, gaming is a business, and there's certainly money involved. But at the end of the day, do you think the aforementioned designers look at themselves in the mirror and nod in satisfaction because they created a game for you, or because they calmed the cries of their wild inner artist? Sound off in the comments section. Let's start a discussion that doesn't involve sarcasm and commas (though both are certainly allowed)!
Anyway, today's Roundup shines the spotlight on developers of both breeds, though some trumpet their allegiance louder than others. If you'd like to find out who's who, what's what, and which of them might soon end up in the pit of Microsoft's belly, read on.
You've been told money can't buy you love, but for $1,300, you can buy a Trojan guaranteed to screw the recipient without them ever knowing it's there. Apparently not completely fool proof, security company Prevx discovered the supposedly undetectable super virus now known as Limbo 2 and reports that hackers are selling custom variations of the Trojan. If a variation gets detected, the Trojan can be tweaked to fly under the radar without changing its payload.
Once infected, Limbo 2 not only logs your keystrokes, but it will set a trap by generating spoofed information boxes when victims navigate to certain login pages. Keystrokes, credit card information, and any other personal data it manages to harvest from the hard drive then gets transmitted back to Botnet Central.
These types of Trojans aren't new, but it's Limbo 2's speed and customization that has security vendors concerned. On a broader scale, it's all part of a seedy underground economy driven by stolen data. It's become so prevalent that hackers have had to lower prices and look for new types of stolen data to sell for bigger profits, including health care information and corporate emails.
A decade ago, owning a 56K V.92 PCI modem used to mean you were the baddest Netizen on the block, but now it's just lame. Even Aunt Mabel has a broadband connection, and according to a new Gartner study, so will 77 percent of U.S. households by 2012. That only leaves 23 percent still living in the digital Stone Age.
Today just over half of all U.S. households surf at high speed, but Gartner expects that number to jump significantly in the next three years. According to Amanda Sabia, a Gartner principal research analyst, one of the biggest factors in the broadband adoption rate will be 4G wireless services like WiMAX, Long Term Evolution, and others that are expected to launch in the coming years.
Broadband also looks to do well worldwide, where 60 percent of the population in 17 countries will have high speed connections in 2012, whereas only 5 countries could make that same claim in 2007. Leading the way is South Korea, who is expected to jump from 93 percent to 97 percent of households having a broadband subscription in 2012. Gnarly.
And as a full-featured Windows replacement, no other Linux distribution comes close to Ubuntu, which features a full suite of pre-loaded desktop applications and an easy to use installer. Ubuntu contains many unique and innovative qualities designed to make it less intimidating the average Windows user who may be looking for a change. One of these features is called Live CD. Once you have downloaded and burned a copy of the Live CD ISO, you will have the ability to launch a fully functional copy of the Ubuntu to test out driver compatibility and to sample the user interface, all without installing a single file to your PC. This guide will walk you through testing your hardware and installing a dual boot setup all without formatting or repartitioning your hard drive.
The Federal Communications Commission is now going to reign in on Comcast’s controversial practice of hampering peer-to-peer internet traffic. Out of the five FCC commissioners, three have voted, thus far, on whether Comcast is liable for punishment for filtering internet traffic. And all of them want the cable company to be punished, but the punitive order will officially be executed once the remaining members have voted – a mere formality. The FCC doesn’t intend to fine Comcast but merely wants it to abstain from internet traffic filtering altogether.
Comcast has been in the eye of the “network neutrality” storm since August, 2007, when TorrentFreak revealed that the leading cable company was filtering internet traffic. It is rumored that the company utilizes Sandvine hardware for warding off P2P traffic but Comcast has not even acknowledged that it indulges in such practices. Comcast is currently busy defending itself in a class-action suit which alleges that the company’s actual services betray its promises, for it restricts internet access despite promising unshackled service.
This being such a contentious issue, that has invited intense reactions from all corners, you all are expected to set the comments section afire.
Why are you a PC gamer? Why did you choose to support a less convenient, less unified machine even in the face of Microsoft, Sony, and Nintendo's pickup-and-play offerings? Do you like the customizability the PC affords? The constantly evolving technology -- to gaze down from a heap of cast-aside PC parts and proclaim the superiority of your uber-machine? Or is the community? Do you relish being a member of a tightly-knit underdog pack, a group that's not afraid to bellow "We'll prove you wrong" to the gaming community at large?
How would you react if everyone suddenly acknowledged PC gaming's strength? If people turned around and realized that PC gaming isn't dying, would you still be so gung-ho about it?
Well, today, we have -- among other things -- one more outlet prostrating itself before the PC. How long before the unwashed masses follow suit?
Additionally, we have a treat for Trekkies, EA's Riccitiello admitting to another one of his company's screw-ups, and the longest hypothetical game title evar. Please insert disc titled "Read more" to continue.
Rainbow Six Vegas 2 looks and plays like a rehash of last year’s original. Put both action shooters side by side and you’d be hard-pressed to distinguish between them. This doesn’t mean Vegas 2 is terrible—the first game was a righteous shoot-’em-up that melded quick pacing with exciting firefights. The follow-up fleshes out the story and completes the plot lines left unfinished in the last go-round, but it falters from the same tiresome action sequences that are more frustrating than challenging.
Not surprisingly, malware infections are at an all-time high, but what's shocking is just how fast the infection rate has risen. According to antivirus vendor Sophos, the company says it detects one webpage containing malicious content every 5 seconds, a rate that represents a whopping 300 percent jump from 2007.
That breaks down to over 16,000 malicious sites each day, most of which are victims of SQL-injection attacks. One of the more common tricks entails using SQL-injection to place a dirty 1x1 pixel element on an infected page. And because many of the sites are legitimate, security vendors are having a tough time keeping up with blocking the sites.
There also exists a fair number of illegitimate sites, and Sophos claims Google-owned Blogger accounts for nearly 2 percent of all malware hosts, making it an unflattering number one offender.
Responding to the report, a spokesperson for Google said "Google takes the security of our users very seriously, and we work hard to protect them from malware. Using Blogger, or any Google product, to serve or host malware is a violation of our product policies. We actively work to detect and remove sites that serve malware from our network."