---- Like this Blog? Use CTRL-D to Bookmark it! ----

Saturday, December 09, 2006

Guide for Xmas gifts: Suunto T3 Watch

A Smart-Looking Exercise Watch With Tons of Features:
Sleek and stylish, the Sunnto T3 excersise watch helps you keep track of your workouts and makes sure you look good doing it.

The Suunto T3 is a portable exercise statistician hidden inside a highly designed black polished wristwatch. The device interacts with an included heart rate monitor to measure loads of vital information that gives instant feedback on the aerobic benefit of a workout.
The face allows you to customize what data is shown in large, easy-to-read smooth digits and has a great green back light for those evening runs. The glossy strap appears to be black polished metal but is a very comfortable plastic material that often turns heads.
The Suunto T3 is a smart-looking watch with tons of features for those who like to know their exercise is paying off or at least that they look good while thinking of working out.
The black polished Suunto T3 watch with heart monitor retails for $169.
(from abcNEWS)

Guide for Xmas gifts: Apple iPod nano

(AP photo )
Just when the iPod seems to have gotten as small and as cute as it could possibly be, Apple manages to make it smaller and cuter. This year they rolled out a new and improved Nano- in various flavors (silver, lime green, hot pink, ice blue and the traditional Model-T black) and sizes (2G, 4G and 8G). If you've been a big fan of the iPod Nano from version 1.0, there's not much different from the last update. The casing (previously in plastic), which many complained was too easily scratched is now in anodized aluminum which makes it far more resistant to nicks. The screen is brighter and clearer— a necessary update given the tiny size.

The battery life is expanded, reaching up to 24 hours (as I discovered, this is estimate is dependent on your use of the backlight), accomplished in part by the steady state memory that (unlike the traditional iPod) has no moving parts for a hard drive and is therefore more energy efficient and immune to skipping. Best of all, however, is the diminished cost. The 2G model costs only $149.00, and the 4G only $199.00 making it the perfect "cool" gift for the 4th grader on your list who is more than prone to leaving things on the bus. The downside? Only the 4G comes in the multiple colors, which is a must have for most kids and there's no video playback- which may be a godsend as trying to watch "Project Runway" on the mini-screen is liable to kill your eyes.

Price: $149.00 for 2G; $199.00 for 4G; $249.00 for 8G

(from abcNEWS)

Pirates work around Vista's activation feature

Hackers are distributing a file that spoofs the KMS activation tool process

By Nancy Gohring, IDG News Service
December 08, 2006

Hackers are distributing a file that they say lets users of the corporate version of Microsoft's Windows Vista operating system get around the software's anti-piracy mechanisms.

Windows Vista must be "activated," or authorized by Microsoft, before it will work on a particular machine. To simplify the task of activating many copies of Vista, Microsoft offers corporate users special tools, among them Key Management Service (KMS), which allows a company to run a Microsoft-supplied authorization server on its own network and activate Vista without contacting Microsoft for each copy.

The software Microsoft.Windows.Vista.Local.Activation.Server-MelindaGates lets users spoof that KMS process, allowing them to activate copies of the enterprise editions of Vista, its creators say. The hacked download is available online on sites including The Pirate Bay and other file sharing sites.

Microsoft's official KMS offering is available to customers with 25 or more computers running Vista. The machines activate the software by connecting to the KMS server, and must reactivate every six months.

KMS is not the only option that enterprises have for volume activation of Vista: they can also call Microsoft by phone or connect over the Internet to activate the software.

The MelindaGates hack allows users to download a VMware image of a KMS server which activates Windows Vista Business/Enterprise edition, its creators claim.

Microsoft did not respond to requests for comment on the hack.

Vista is the first Windows operating system that requires volume users to activate each product. The new activation processes are aimed at reducing piracy.

While one security expert said he isn't surprised that KMS has been cracked, he said the MelindaGates hack offers some insight into piracy.

"This also shows how piracy is not just about kids swapping games," said Mikko Hypponen, chief research officer of F-Secure. "The only parties that would need a KMS crack would be corporations with volume licensing."

Great funny show: Karatedo

See, enjoy imagining!

Friday, December 08, 2006

PS3 vs. Wii

A little fun ^^

RSA's Coviello making good on billion-dollar promise

Former RSA CEO says the honeymoon's still on at EMC

By Paul F. Roberts
December 01, 2006


It's been more than two months since EMC officially exchanged rings in the $2.1 billion courtship of RSA Security, but former RSA chief Art Coviello says the honeymoon's still going on, and that he's happy to take a step down from the CEO's post …for now.
In a wide-ranging discussion with reporters over dinner in Boston on Wednesday, Coviello, the charismatic chief of RSA for more than a decade, said that he expects to stay on at EMC for at least the next few years, as he makes good on a promise to EMC CEO Joe Tucci to grow RSA into a $1 billion a year company by 2009.

Tight integration with EMC's product line is a key element of that plan, such as embedding RSA's access management technology into EMC's Documentum content management system.

"Customers are craving integrated solutions" he said.

EMC pushed RSA along towards meeting that goal by acquiring security event management vendor Network Intelligence on the same day that it closed its acquisition of RSA. Together with RSA's traditional strength in data encryption, the Network Intelligence software will be a key element of the EMC Common Security Platform, which will integrate core services authentication, auditing and authorization across EMC's product line.

That $175 million buy would have been beyond the means of RSA, which reported total revenue of $181 million through the first half of 2006, especially after the Cyota and PassMark acquisitions. Network Intelligence will add around $20 million in revenue to the RSA division's bottom line this year, and double that next year, Coviello said.

Coviello is also banking on strong growth in demand for consumer facing "adaptive authentication" technology that RSA acquired from Cyota in December, 2005, and PassMark Security in April.

That business has been growing at about 100 percent annually, from $11 million last year to around $30 million this year, and Coviello expects that growth trend to continue for a least a couple more years, as banks and other financial institutions get in line with guidance from the Federal Financial Institutions Examination Council (FFIEC) to beef up user protections in online banking portals.

Coviello is also looking to expand the value of those acquisitions with
offerings like a risk assessment service that could be sold to banks and
financial services companies and that leverages the phishing and online crime
intelligence collected by RSA's Cyota team in Israel. RSA researchers are also
working on applying fraud intelligence, like that used by Cyota, to data flows
within an organization in an effort to spot anomalies that may reveal insider
threats, Coviello said.
But the former CEO said he's seeing opportunity everywhere these days, as the EMC name opens doors that were previously shut to accounts across verticals, but especially in banking and financial services. Executives who saw RSA as a secure token vendor a year ago now see the company's technology as a strategic investment, when coupled with EMC, he said.

Those accounts were hard to win before EMC entered the picture, and Coviello admitted that RSA's PassMark acquisition was more about getting a foot in at major financial institutions like Bank of America than about the PassMark technology.

Reflecting on the first quarter since 1992 that he hasn't had to face Wall St. analysts for an earnings call, Coviello said that he felt as if he had "traded nine board members for one (Tucci)." "In some ways, I'm more independent than when I was CEO and had a board of directors, where there's a lot more scrutiny of operating costs and profitability," he said.

Coviello claims that he's been given free reign to use the RSA division to develop security solutions independent of EMC's product lines, even while it leverages EMC's infrastructure, customer support and professional services groups -- not to mention the company's $6 billion war chest for future acquisitions.

And with that kind of bankroll, future acquisitions are definite possibility. Coviello estimated he spent around 30 percent of his time vetting possible purchases, and that another mega-purchase along the lines of RSA weren't out of the question, though they'd have to be "compelling."

But, once a CEO always a CEO. Asked whether he could be happy staying on as an Executive Vice President at EMC, Coviello said he "didn't know about that," but waxed philosophical.

"When I was 30, my goal was to be a CEO by the time I was 40. I don't think like that now. I know what I'm going to be doing for the next couple years."

Al-Qaeda threatens cyberattack on U.S. banks

US-CERT cautions US banks and financial institutions about possible threat to Web sites

By Grant Gross, IDG News Service
December 01, 2006


The U.S. Computer Emergency Readiness Team (US-CERT) has warned U.S. banks and financial institutions of a threatened cyberattack by the al-Qaeda terrorist organization.
The group called on allies to attack the Web sites of U.S. financial institutions in December in retaliation for the U.S. holding suspected terrorists at the Guantanamo Bay, Cuba, prison camp, according to a U.S. government source.

US-CERT, part of the U.S. Department of Homeland Security (DHS), sent out the alert Thursday, but it has "no information to corroborate the threat," said Joanna Gonzalez, a DHS spokeswoman. The alert was "really sent out of an abundance of caution," she added.

Such alerts are "not uncommon," Gonzalez said, although she declined to give details about how often US-CERT issues the alerts. Asked if al-Qaeda has the ability to carry out such a threat, Gonzalez said she didn't have that information.

2006: The year in security

A look at the Top 5 security stories of the year, including cybercrime, phishing, and spam

By Jeremy Kirk and Robert McMillan, IDG News Service
December 07, 2006


Though Internet-crippling virus attacks now seem to be a thing of the past, PC users didn't feel a lot more secure in 2006. That's because online attacks have become more sneaky and professional, as a new breed of financially motivated cybercriminals has emerged as enemy No. 1.

Microsoft patched more bugs than ever and whole new classes of flaws were discovered in kernel-level drivers, office suites, and on widely used Web sites. Vendors' chatter about security is at an all-time high, but the bad guys are still finding lots of places to attack.

And, oh yes, spam is back.

Following are five of the top computer security stories in 2006.

Cybercrime dividends

Hackers teamed with professional criminal gangs in increasingly sophisticated computer crime operations aimed purely for profit. Much of the trouble centered on phishing, a type of attack where fake Web pages are constructed to harvest log-in details, credit card numbers, or other personal information. Credit card numbers are often sold online to others for illicit gain.

In May, 20,000 phishing complaints were reported, a 34 percent increase over the previous year, according to U.S. Department of Justice report. The U.S. hosts the largest percentage of phishing sites, it said.

But law enforcement agencies are getting more organized and cooperating better, particularly in international investigations. At least 45 countries participate in the G8 24/7 High Tech Crime Network, which requires nations to have a contact available 24 hours a day to aid in quickly securing electronic evidence for trans-border cybercrime investigations.

The private sector has also helped. Microsoft filed dozens of civil suits and gave information to law enforcement for criminal cases in Europe, the Middle East, and the United States against alleged phishers throughout 2006.

It's a brand new 0day

With automatic software updates now the norm, hackers have been forced to look a little harder for ways to put their malicious software on unsuspecting victims' PCs. In 2006 they turned to zero-day attacks as never before.

These attacks take advantage of previously unreported flaws in software, and in 2006 they became a top concern, according to the SANS Institute. In fact, hackers kicked off the new year in 2006 by releasing zero-day attack code based on a flaw in the way Internet Explorer handled WMF (Windows Meta File) documents.

This was followed, later in the year, by a rash of very targeted online attacks that exploited unpatched flaws in Microsoft's Office software. In fact, Microsoft warned of the latest such attack -- this one targeting a flaw in Word -- just this Tuesday.

To underline the scope of the zero-day problem, security researchers launched widely publicized "Month of Kernel Bugs" and "Month of Browser Bugs" projects, during which they exposed a new, unpatched vulnerability in browsers and operating systems every day for a month.

Spam avalanche

Microsoft's Chief Software Architect Bill Gates predicted two years ago that spam would be gone by 2006. He should check his in-box.

Rising volumes of junk mail nagged IT administrators throughout 2006. Up to 90 percent of all e-mail was spam, depending on the vendor recording the statistics. Spammers found creative ways to circumvent security software. Image-based spam, where individual messages appear to be unique by subtracting or adding pixels, foiled some security techniques.

Spammers also put messages in the images themselves, a tougher challenge to stop since it requires processor-intensive optical character recognition (OCR) techniques. Spam remained the delivery vehicle for other malicious software such as keystroke loggers and rootkits in addition to promoting links to phishing sites, which often aim to steal financial data or log-in credentials.

Web 2.0 gets Hacked 1.0

MySpace.com may be a poster child for Web 2.0, but from a security perspective, it hasn't been looking so pretty. That's because the popular social networking site was hit hard this week by a password-stealing worm that exploited a scripting vulnerability on the Web site. And this was not even the first worm to hit MySpace. In October another more benign worm, called Samy, automatically added a Los Angeles teenager's name to visitors profiles, quickly making him appear to be the most popular member of the MySpace community.

Security experts say that the kind of cross-site scripting attack used in the recent MySpace worm has become much more prevalent in the past year, as hackers have discovered just how much can be done with these attacks. These bugs can be used to do far more harm than many people realize, security experts say, including forcing PCs to download illegal content, hack other Web sites or send e-mail.

Vista lockout irks vendors

Microsoft rankled security vendors by saying it wouldn't allow their software to access the kernel of the 64-bit version of Windows Vista. Patch Guard, Microsoft's kernel security technology, blocks access to prevent unauthorized modifications by malicious software.

Vendors, led by Symantec and McAfee, argued they needed access to the kernel to detect malicious software such as rootkits, which burrow deep into the OS. After a flurry of public statements and pressure from the European Commission, Microsoft agreed to make APIs (application programming interfaces) available.

The APIs will allow host intrusion prevention technologies used by vendors to function without hooking the kernel. But Microsoft said the APIs wouldn't be ready until the release of Service Pack 1 for Vista.

Wednesday, December 06, 2006

Why Men Cheat?

Posted by David Zinczenko

Of course, we all know that while men and women are both capable of cheating, it's often the guys who have the biggest problem keeping their belts firmly buckled. And we all know that no matter who it's with, why it's done, or where the after-hours canoodling takes place, cheating is-most of the time-the ultimate relationship death sentence. But instead of dwelling on what happens after the cheating takes place, one of the ways to perhaps prevent infidelity is by knowing a little bit about why men stray. I'm not offering them as excuses, merely explanations as to what happens in that brain (and other body parts) of his-in hopes that you might be able to prevent it. Here, the top reasons why men cheat:

To Fulfill His Biology: You know the old anthropological tale. A man's main job, besides killing the saber-tooth, is to spread his seed in order to ensure the survival of his genetic legacy. It's a man's biology to want to wander. Does that mean he should, or that he can't help it? Of course not. But it does mean that a man is going to have strong-extremely strong-biological urges to knock on the doors of neighboring huts. I have had this argument/discussion/conversation with dozens of men and women: Are men predestined to cheat? My answer is no, they're not-despite their biology. But often times, they do have to fight it. Especially after a pitcher and two shots of Jack.

To Get the Attention: News flash: Sure, some guys cheat because, well, maybe the sexual frequency has slowed a bit, and maybe hot-and-heavy happens at home about as often as Rob Schneider gets nominated for an Oscar. But the truth is that plenty of men who are having regular sex with their partner are also having sex with someone else. Why? Because cheating isn't just about the sex. Just as a woman who cheats may be seeking more affection than what she's getting at home, a man often cheats because he's seeking the attention that he no longer gets at home. Part of the allure of the mysterious woman isn't just to find out what she looks like naked; it's that the woman showers the man with flirtations, with seduction, with advances that make him feel like he's worthy of more than just fixing dents in the drywall.

To Get Out: I know lots of guys who simply don't have the strength to end it. They may try ("I'm just not happy"), or they may take other tactics to drive a woman away. A lot of guys simply have trouble breaking off relationships because they don't want to be perceived as that bad guy, the jerk, the insensitive lout who ended something good. So they tiptoe around the issue in hopes that she'll get so frustrated that she'll back out first. Well, if that doesn't work, then a man knows that the only way out is to commit the relationship sin that drives a woman away for good. It's not right, but it's what happens.

To Change Up His Play List: Think about what's on your iPod. You have your favorite songs you play over and over, but every once in a while, you're in the mood to hear something you haven't played in a long time. You don't need to hear it but once every month or so, but still, you appreciate the changeup. Relationships need to be like good iPods lists. You're comfortable with your routine and you like your routine, but it's always nice to change things up. What men really want in relationships (and what I suspect women also want) is to be able to take comfort in the routine of a long-term commitment, as long as there are some surprises that make it feel like a new relationship every once in a while. In order to keep the relationship strong, you've got to change the songs every once in a while. That goes for in the bedroom and out.

Microsoft Windows Timeline

Well, I stress on some big chances of Microsoft OS ^^ (client only)

June 1998 - Windows 98


October 2001 - Windows XP


January 2007


(pics from Digg.com)

BitDefender Internet Security 10.3 Beta 1 for Windows Vista

Give a try on No.1 Antivirus Software in 2005 with its new version

BitDefender provides security solutions to satisfy the protection requirements of today's computing environment, delivering effective threat management to over 41 million home and corporate users in more than 200 countries.

BitDefender Internet Security 10 covers all the security needs of an Internet-connected family. It provides essential protection against viruses, spyware, spam, scams, phishing attempts, intruders and objectionable web content.

BitDefender 10 is designed to place as little burden as possible on its users and on the host system, while providing state-of-the-art defense against current Internet threats.

Download Here

Adobe Reader 8.0.0 Final

Adobe Reader is free software that enables business professionals and home users to reliably share information using intelligent PDF FILES. You can easily view, print, and search PDF files using a variety of platforms and devices.

Download:
Adobe Reader for Windows XP/Vista 8.0.0

Tuesday, December 05, 2006

XP Media Center Edition - Royale Theme

Have you ever heard XP Media Center Edition?
Try its theme - Royale - it's so great!

Link Download

Have fun!

Xmas is coming - Wallpaper gifts

Make up your desktop ^^



AJAX tools deliver GUI goodness

Backbase, Bindows, JackBe, and Tibco toolkits bring fat AJAX features to enterprise Web applications.

More Info of these tools

* So sad, No free features T.T like I think

Microsoft supports developers of mobile mashups

By Sumner Lemon, IDG News Service
December 04, 2006


Microsoft on Monday took the wraps off a new service, called Connected Services Sandbox, that offers developers tools and support needed to produce Web-based applications for mobile phones that combine APIs (application programming interfaces) from different sources with telecommunication services.

Connected Services Sandbox was established to help developers produce applications for mobile devices, allowing operators to offer "mashups" -- the term for Internet applications that combine services from different sources -- to mobile handsets.

Mashups created using Connected Services Sandbox can help generate new sources of revenue for operators, while also helping to attract new subscribers and retain existing users, Microsoft said. The company unveiled the service, which is based on its Connected Services Framework, at the International Telecommunication Union's (ITU's) Telecom World 2006 conference and exhibition in Hong Kong.

Developers can access a range of services on the Connected Services Sandbox Web site, including Windows Live components and offerings from Google, eBay, Amazon.com, and Yahoo. Other services that are available for Connected Services Framework include offerings from Xbox Live, Microsoft TV, Microsoft FlexGo, and Microsoft Solution for Enhanced VOIP (voice over Internet Protocol) services, among others..

In addition, Microsoft Connected Services Framework and other tools are available for download from Connected Services Sandbox, Microsoft said.

Telecom World runs through Friday, December 8.

Sunday, December 03, 2006

The Great Circle of Vietnam



The Great Circle of Vietnam
Original: Nối vòng tay lớn (Trịnh Công Sơn)


Translate from Vietnamese
:
Mountain, forests link with distant sea
We go, hands' ring broadens to tie our land (together) Infinite ground, our brothers come back
Gather happily like a haboob (is) whirling (the) wide sky
Our hands connect, encircle our Viet Nam

Flags tie wind, gay nights tie day
Bloodstream links our fellows' hearts
Raising human love in new days
Cities link with very-far villages
The deads link holy with life
And smiles go on lips (*)
From North to South, tie together our hands
We go from desert fields, cross mountains
Cross perilous falls, our hands cross hills (**) Poor villages to city, hands tie together
Blue seas, silk rivers connect a death-life circle

* I love this song, love it too much! If you hear it once, you'll never forget the feeling you have.

Malaysia's 'Snake King' Killed by Cobra

Recent Incidents Raise Question of Why Animals Attack
By LINDSAY HAMILTON

Dec. 2, 2006 — Ali Khan Samsuddin was known as the "King of the Snakes" until one ferocious cobra decided it was time for a coup.

Malaysia's most famous snake charmer put on daring shows, going so far as to kiss his deadly reptiles. Over the years, many snakes sank their fangs into him. He suffered his first king cobra bite when he was 21 years old. His last king cobra bite happened on Tuesday. He died three days later at Kuala Lumpur Hospital at age 48.

When it came to working with dangerous creatures, Samsuddin liked pushing the limits. He set records few would even want to attempt — living in a glass case with 5,000 scorpions for 21 days, and living with 400 snakes for 40 days.

Dangerous Business

Samsuddin's death comes just days after a trainer at Sea World was dragged underwater by an orca, and months after a sting ray killed Australia's beloved "Crocodile Hunter," Steve Irwin.

The high-profile animal incidents beg the question: Just when and why do animals attack?

Dan Stockdale, an animal trainer and leadership guru who has worked with exotic creatures since 1978, says most animal attacks stem from three causes — food, fear and sex.

Regarding the recent attacks, Stockdale says it is important to look at each as an individual case.

Irwin's death was mostly a matter of coincidence. The popular Animal Planet host was known for getting alarmingly close to dangerous crocodiles, but it was a stingray that took his life. He was filming for his daughter's TV show when the ray's barb pierced his chest.

"That happened out of the fear response, the stingray was startled by his presence," Stockdale says. "That tail response was involuntary. Steve and his body happened to be in the wrong position at the wrong time."

Jack Hanna, shocked by Irwin's death, said "it's like me getting killed by a poodle."

(Read More...)

PCW: How-To"s Update

DIET & FITNESS

CANCER

!!! THIS IS KENDO !!!