Intel, who last year showed it was really serious about netbooks when it purchased the netbook.com domain (probably much to the chagrin of Psion), just got a little bit more serious. The chip maker is working on its own netbook OS called "Moblin," which reached its first alpha release earlier this week.
Based on Linux, Moblin's alpha code is available for free to test the core Linux OS, boot processo, a new "Fastboot" feature, connectivity and networking, and more. To run it, you'll need an Intel Atom or Core 2 CPU with SSE3 instructions, integrated Intel graphics (915/945/965 - GMA-500 not supported), and one of a specific set of wired/wireless network adapters. So far, Intel said it has tested Moblin on a handful of popular netbooks, including the Acer Aspire One, Dell Mini 9, and the ever popular Asus Eee 901.
Intel did say to expect a heavy does of cosmetic changes to the UI between now and the final release, so what you see is not necessarily what you'll get. The company also warned "3D performance is known to be slow."
Learn more details and grab your download here, then hit the jump and tell us what you think about Intel making its own netbook OS.
ATI has just released its Catalyst 9.1 driver package, bringing full OpenGL 3.0 support to the table, a feature which was made available to Nvidia videocard owners for the first time a month ago. While Direct3D has emerged as a front runner for Windows gaming, it should be noted that OpenGL 3.0's features can be enabled on both XP and Vista, and also Linux and Mac OS.
As can be expected are a number of bug fixes with the new driver, but perhaps surprisingly to some, ATI's Catalyst 9.1 shares the love with Linux, an area long considered a weak spot. ATI says the new driver introduces support for Ubuntu 8.10, while also enabling Hybrid CrossFireX. Also in the driver's bag of open-source tricks is MultiView support, which can be enabled using single or multiple GPU configurations.
(*And a conclusion that, I guess, could be considered a fifth thing, but that’d really be reaching.)
Fallout 3: Operation Anchorage is the first drop in an irradiated stream of DLC that Bethesda has planned for its fantastic revamp of the Fallout universe. It sees your wastelander – presumably, by this point, an Iron Man-esque mishmash of cutting-edge weaponry, cold steel, and a 40’s-era radio – stripped right out of his/her tin can and flung (via simulation) into the future’s past that’s still technically our future. Once there, it’s your job to play border patrol for Alaska, keeping China’s Communist government from nabbing Democracy’s swank American job. And make no mistake, son – this is war. But is it a war worth fighting? Well, yes and no. Here’s why.
1. Installing it is like giving birth – Er, not that I’d know what giving birth is like, but I’ve installed Fallout 3: Operation Anchorage, which I’ve heard is a comparable experience. So here’s the rundown: Remember when you feverishly chucked GFW Live into computer limbo because, right after buying Fallout 3, you just wanted to play Fallout 3? Well, that’s actually important now. In order to purchase and subsequently install Operation Anchorage, you must rent out a portion of your precious hard drive to GFW. Then, if you don’t have a GFW or Xbox Live account, you have to snooze your way through some paper work too. Next up, purchasing Microsoft Points. No, your hard-earned dollars are about as worthless as bottle caps here, so you’ll need to have them irreparably mangled into Microsoft Points. After passing Microsoft’s battery of trials (note: I still haven’t said “finally”), you’ll be deemed worthy of downloading Operation Anchorage. Oh goodness, what’s this? Why, has this amount of ridiculous hoop-jumping necessitated a paragraph break – the first in “Five, or Four, or Whatever Things About’s” history?
Jump past the break to, er, find out? Really though, I think the answer's kind of obvious.
Spam senders suffered a few temporary setbacks in 2008, including an FTC bust on HerbalKing, one of the largest global spam networks allegedly responsible for sending billions of unsolicited emails, and the shuttering of web host McColo Corp, who the FTC said was responsible for roughly 75 percent of the world's spam. It may have taken a few months, but spam levels have now risen back up to 150 percent, according to Postini Message Security.
"As spammers fill the void left by McColo, it's reasonable to anticipate a decreasing rate of growth as spam reaches November 2008 levels," wrote Amanda Kleha of the Google message-security team on the company's blog. "However, since the November levels weren't even the peak for the year, and since spammers appear to be quickly recovering, the question remains: Where will spam volume top out in 2009? Will it be near the November 2008 level? The April 2008 level? Or higher?"
Symantec also notes a concerning rise in spam, noting that it has seen spam volumes return to within 5 percentage points of the pre-McColo shutdown numbers. In other words, the break is over and barring another bust, spam levels could rise even higher than what they were before a series of crackdowns took place.
If you followed David Murphy's path to building a budget PC with a cardboard chassis, then why not compliment it with your own homebrewed Surface, also with a cardboard exterior?
Microsoft technology evangelist Paul Foster posted a YouTube video showing how you can build a functioning multi-touch surface using budget parts. Items you'll need are paper, scissors, picture frame with glass, tape, cardboard box, a webcam, and multi-touch software such as Touchlib.
From start to finish, it takes Foster less than four minutes to complete the project and run a short demonstration. Of course, that's with a cardboard box - skilled modders will want to invest a bit more time coming up with custom enclosure.
Google's rap sheet when it comes to goofy exploits gives us pause to wonder if the company might be spending too much time concentrating on Cloud computing and not enough on security fundamentals. Back in July of last year, a SecurTeam blog exposed a Google Calendar flaw which made it possible to expose any Gmail user's real name with minimal effort. More recently, an exploit in Gmail allowing hackers to redirect your email was discovered. Now someone has stumbled onto an interesting vulnerability in Google's Chrome browser.
When you visit a site with an http password protected directory -- or try logging into your router, such as 192.168.1.1 for Linksys owners -- an Authentication Required pop-up appears asking for your for your login credentials. Your password should look something like ••••••••, but according to NeoBlog user tekmosis, if you let Chrome save your credentials to auto-fill the form, the next time you log in, copying and pasting the hidden password into a plain text application will reveal the actual ASCII characters.
We put tekmosis' discovered exploit to the test and as it turns out, you don't even need to have Chrome save anything. We tried logging into our router, typed our password, and it was immediately revealed when we copied/pasted it into Notepad.
While it might take a little work on the part of a hacker to take advantage of this vulnerability, it's one that should never have existed in the first place. You could make an argument that all exploits should never have existed, but this one just seems like a particularly glaring oversight.
Malware is everywhere. You can't browse on any Internet tech forum without someone mentioning this word (with disdain), usually in search of a remedy after being infected with spyware. No matter how careful you are, we’re guessing that many of you have had malware inadvertently installed on your system and may have even ended up reformatting your computer as a last resort. While that may have been the most thorough solution, it is in a sense admitting defeat. Or worse yet, you took your computer to get cleaned and was charged anywhere from $50-300 -- a high price for humiliation. But don't fret, because you can actually purge your system of malicious software for free! Just follow our comprehensive guide.
Activision Blizzard, aka gaming’s Death Star lurking in a system of Alderaans, is about the only game company to avoid placing hundreds of jobs on the chopping block in order to fuel rapidly waning economic fires, and there’s a reason for that: World of Warcraft.
According to Stern Agee analyst Arvind Bhatia, WoW subscriptions likely made up about half of Acti-Blizz’s earnings during its previous fiscal year. This means that World of Warcraft was responsible for earnings per share of around 30 cents out of a total 60 cents. The bottom line for those who don’t follow @thestockmarket on Twitter: Activision Blizzard pulled in $400 million from a four year-old game about orcs, elves, and cow people. Say what you will about Blizzard’s games, but they have some serious staying power.
So then, after all these years, do you still play WoW? You know what? Actually, that’s a dumb question. How about this: why are you still playing WoW, and do you see yourself continuing your genocidal rampage through Azeroth over the next year – even knowing that Blizzard probably won’t release another expansion until 2010?
Microsoft has released the source code for its Sandbox virtualization technology, offering Web developers a new method for protecting the contents of a Web page from malicious exploits and code injections. The project has been released under the Apache 2.0 license, a source no doubt familiar to Microsoft, as the company began sponsoring the Apache Software Foundation to the tune of $100,000 annually last July.
While the Apache Software Foundation isn't sponsoring or endorsing Sandbox--Microsoft's just using the software license--the move is nevertheless the second time Apache and Microsoft are tangling up this year. Microsoft announced its intentions to donate code to Apache's Stonehenge project on January 19.
We've explored Microsoft's increased interest in the world of open-source solutions before. Click the jump to find out why the software giant is so interested in letting everyone else play in its Sandbox for free.
As it turns out, those of us responsible enough to have a computer generally aren’t responsible enough to keep ourselves safe online. Sure, we might get Norton or McAfee at checkout, but that’s generally the easiest step to take. When it comes to surfing the net, if the browser doesn’t update automatically, we probably won’t take the time to update it on our own.
At least, that’s what a study by a pair of Swiss academics and a Google employee revealed. The study, which ran Google results from January 2007 to April 2008, revealed that as a general whole PC users are reluctant to swap software. The swap from IE6 to 7 came gradually, with a primary boost from sales of new PCs with Windows Vista (and IE7) preinstalled. Mac users “seemed more willing to live on the cutting edge, as the Safari 3 beta release was accompanied by a major jump.”
To security conscious users Mozilla’s Firefox came out on top. Its self-updating nature made it a favorite, opposed to others like Opera, which have an update that basically functions as a manual download followed by a new install.
The analysis suggests that most users of web browsers aren’t filled with thoughts of Internet security, but rather with thoughts of convenience. If you’re interested in checking out the study for yourself, you can be sure to check it out in its entirety, here.