Saturday, August 11, 2007

Emma


Title: Emma
Mangaka: Kaoru mori
Group scans:
Genre: Historical, romance, slice of life
Status:complete
Volume: 7
Description: Emma has spent most of her life as house maid to an old lady. Now her employer receives a visit from a young man, William Jounse, to whom she was once governess. The meeting between William and Emma is the beginning of a romance that crosses all social boundaries.
Download:
volume 01
volume 02
volume 03
volume 4 part 1 volume 5 part 2 BAT FSI
volume 05
volume 06
volume 07a
volume 07b

Thursday, June 28, 2007

MARS

Title: MARS
Mangaka: SOURYO Fuyumi
Genre: Drama Josei Psychological Romance Shoujo Slice of Life
Description: Kira, a shy high school student, lives only for her art. Rei, An arrogant, rebellious and violent playboy, wears his delinquency like a badge of honor. They are exact opposites in every way, but when Kira sees Rei kissing a statue of Mars, she overcomes her fears and asks him to model for her. And, to everyone's surprise, Rei agrees.
Group Scanlation:Eternal Blue Syndicate The Furry Triangle
Status: 15 Volumes (Complete)

Volume 1
Volume 2
Volume 3
Volume 4
Volume 5
Volume 6
Volume 7
Volume 8
Volume 9
Volume 10
Volume 11
Volume 12
Volume 13
Volume 14
Volume 15 (End)

Sunday, June 24, 2007

Majin Devil



Mangaka: Oh! Great

Genre:
Action Ecchi Shounen

Groups Scanlating: SnoopyCool

Sơ lược: Kazuya Idetora is a very calm and collected young genius. His nickname is Decoppa. A strange rumor is going around at Decoppa's school when strange creatures called "demons" begin to appear and forever change his life. These demons increase in number due to the spread of a virus and wreak havoc on the entire world. Decoppa, who has an IQ of 200, manages to kill one of these demons - a "spider guy" who attacks his classmate Tomoe Ashihara. Harry, the "squirrel man" hears about this and approaches Decoppa, and Decoppa gets deeply involved with the demons simply by trying to help Harry. A mysterious scar filled with dark secrets appears on Decoppa's forehead. The story is filled with interesting characters: a strange scientist called "the Professor," who studies and mass-produces the demons.

Download:
Volume 1
Volume 2

Monday, June 18, 2007

Lilim Kiss



Title: Lilim Kiss

Author: Kawashita Mizuki

Genre: comedy, ecchi, romance

Groups Scanlating: ChiZeTo / Manga Coalition / Solaris-SVU

Status: completed (2 volume)

Description: Saiki Takaya, a guy who is easily misunderstood, one day finds a flask containing the succubus Lilim. She is very attractive but, she also has the tendency to drain the life force out of people. She surprises the life out of him (literally) when she kisses him unconscious. The girl, Lilim, turns out to be a succubus who gains energy by kissing guys. Lilim then flies off for more "food," but returns later, saying that Takaya's life-energy was the "tastiest." From then, Lilim is accepted by Takaya's parents as a live-in girlfriend of sorts, and Takaya's heart seems to start wavering towards this voluptuous devil.

Volume 1
Volume 2

Thursday, June 14, 2007

Flame of Recca



Author: Anzai Nobuyuki
Genre: Adventure, Comedy, Fantasy, Shounen
Description: Recca is a ninja. At least in his own mind. When he one day meets and saves the young girl Yanagi he pledges to be her ninja, defending her with his life. She shows him that she has the power of healing and in return he shows her his secret power of creating fire with his hands. But soon evil powers start reaching for them. Some wanting Recca’s ability to use fire and others wanting eternal life through experiments with Yanagi’s body, something that Recca and his friends definitely can’t allow.
Volumes: 33 vol
Status: completed
Groups Scanlating: SnoopyCool

Vol 1
Vol 2
Vol 3
Vol 4
Vol 5
Vol 6
Vol 7
Vol 8
Vol 9
Vol 10
Vol 11
Vol 12
Vol 13
Vol 14
Vol 15
Vol 16
Vol 17
Vol 18
Vol 19
Vol 20
Vol 21
Vol 22
Vol 23
Vol 24
Vol 25
Vol 26
Vol 27
Vol 28
Vol 29
Vol 30
Vol 31
Vol 32
Vol 33

Friday, June 8, 2007

Miyuki



Author: Míturu Adachi
Genre: Drama, Romance, Shounen
Description: From:Wakamatsu Masato lives with his step-sister, Miyuki, whom he does not have blood relationship with. Their father is always working oversea (in fact, he has not appeared in the manga at all...) and left the two of them living by themselves in Toukyou. Miyuki is cute, nice, sensitive and very popular among guys around Masato. Masato has a girlfriend at school whose name is Kajima Miyuki, who is pretty and gentle, the ideal dream of every highschool boy. It took years for Masato and his sister to realise whom they love and care most after a lot of events. The manga is very nicely written, with excellent layout, interesting story and character developments, refreshing art style and filled with youth and emotion. It also shows the dramatic improvement of the author's skill.
Volumes: 12 vol
Status: completed

Vol 1
Vol 2
Vol 3
Vol 4
Vol 5
Vol 6
Vol 7
Vol 8
Vol 9
Vol 10
Vol 11
Vol 12

Tuesday, June 5, 2007



Title: Death Note

Author: Tsugumi Ooba
Artist: Takeshi Obata
Genre: shounen, magic, action
Groups Scanlating:
Aku Tenshi
Ice-Master Scanlations
KEFI
OrangeTangerine
Shannaro
The Ones Who Never Lie
Toriyama's World
We, The Fans
pedobears
gto0o


Download

Volume 01
Volume 02
Volume 03
Volume 04
Volume 05
Volume 06
Volume 07
Volume 08
Volume 09
Volume 10
Volume 11
Volume 12

Saturday, June 2, 2007

Derayd


Title: Derayd
Mangka:Clamp
Genre:Fantasy
Scanlator:Be with you scans
Description:Kenichi is a high school guy who wakes up in a magical land. Together with a fairy and a swordsman, he must recover two magical items to save the magical world as well as his own.
Status:Complete
Volumes:1
chapter01
chapter02
chapter03
chapter04
chapter05
chapter06

Saturday, May 26, 2007

Battle Royale



Japanese title: Batoru Rowaiaru
English title: Battle Royale

Story & Original creator: Koushun Takami
Art: Masayuki Taguchi

Genre: Adventure, Drama, Horror, Science Fiction

Groups Scanlating: Illuminati-Manga / Manga-Sketchbook / Nezumi scans

Plot: In a world where teenagers are roaming wild, the Japanese government decides to hold "lotteries" where 9th graders enter and are picked to "battle it all out" on an island with other students. An island where even your best friend will become your worst enemy.
(vimanga.ru)

Status: 15 vol Complete

Download

vol1
vol2
vol3
vol4
vol5
vol6
vol7
vol8
vol9
vol10

Thursday, May 24, 2007

Nine



Author(s)
ADACHI Mitsuru

Description: High school sports (mainly baseball) and romance story. 3 TV movies were made. The work that established his name in Japan as mangaka. Katsuya and Susumu join the Seishu baseball team. They've never played baseball before but they don't want to disappoint Yuri, a girl Katsuya recently met for the first time. Surprise: Yuri is the coach's daughter. Katsuya loves Yuri, and vice versa. But Yukimi too falls in love with Katsuya and causes trouble... Who will end up with who, and will Seishu team have success?

Genre
Comedy Romance Shounen Sports

Groups Scanlating: Manga Downloads

Download

Volume 01
Volume 02

Wednesday, May 23, 2007

Black Cat


Japan title: Black Cat
English title: Black Cat
Story & Art: Kentaro Yabuki
Status: Complete
Genre: Adventure, Shounen, Comedy

Groups Scanlating: Akatsuki Manga / Chronos' Time Guardians / Illuminati-Manga / Manga-Heaven / MeowMix / Sushi Bar Manga

Plot: Ex-assasin Train Hartnett and his partner, Sven, are bounty hunters, living a somewhat normal life. That is, until Train's ex-co-worker, the leader of a group of merciless villains with special abilities, decides to recruit him into their crime ring and change the world to their control.

Volume 1
Volume 2
Volume 3
Volume 4
Volume 5
Volume 6
Volume 7
Volume 8
Volume 9
Volume 10
Volume 11
Volume 12
Volume 13
Volume 14
Volume 15
Volume 16
Volume 17
Volume 18
Volume 19
Volume 20

Akkan Baby

Now, I will upload Manga!



Title: Akkan Baby

Mangaka: MIYAUCHI Saya

Genre: Comedy, Drama, Ecchi, Shoujo

Groups Scanlating: Tsuzuku Jinsei o...

Description: High schoolers Yuki and Shigeru aren't dating, but still enjoy a highly active sexual relationship. Naïve and still very child-like in the way they think, it comes as a great shock to them when Shigeru discovers she's pregnant. The two are confronted with the decision of aborting the baby and wounding Shigeru, or to keep it and face great opposition from their parents and high school, and *gasp* miss their beloved Conflict concerts!

Status: Completed

Download:

Volume 1
Volume 2
Volume 3

Lotus Notes gets a facelift: Version 8 beta review and visual tour

Computerworld has been a Notes shop for more than a decade, but I've yet to come across a colleague who's said "I love Notes!" or even "I like Notes a lot." Instead, I usually hear frustration -- and occasional swearing.

Which is a failure of execution, since the concept is a good one. IBM's Lotus Notes is one of those software packages that should make your life easier. It corrals white-collar must-haves such as e-mail, calendar and contacts into one coherent place, while offering some reasonably powerful database offerings.

But Notes has always come with annoyances. For instance, in Version 6.5, which we use at Computerworld, wrong names pop into e-mail "To:" fields based on, say, the first "Sharon" who shows up alphabetically in a directory. The recipient isn't simply suggested; Notes autocompletes the address unbidden. For those who hit Send without checking, messages head off to unintended recipients. Numerous e-mails meant for me have ended up in the in-boxes of other Sharons. And I've misdirected my own fair share.

Notes also has a well-deserved reputation for being somewhat user-hostile. Built-in help can be Byzantine, and customization tools are so scattered that it can be tough to find how to make a change even if you've seen an option several times before. Where was that "change the color of an incoming e-mail" tool? Is it in Mail > Tools > Rules? Or Tools > Preferences > Mail? Or File > Preferences > User Preferences > Mail?

That's why we pricked up our ears when IBM announced the public beta of Notes 8 for Windows and Linux, featuring an overhauled user interface. Lotus Domino 8 server is also in public beta, but our IT department didn't have the capacity to set up a test environment on short notice. Because I didn't have access to the full Version 8 server install, some of Notes' new features were unavailable to me. However, I was able to give the Notes beta a test drive as an e-mail and calendaring client.

I was eager to see whether Lotus Notes 8 built on the good and fixed the bad. Is there finally a decent UI to match its feature lineup?

Friday, May 4, 2007

Windows Live Hotmail to debut Monday

Monday will finally bring its completely revamped version of its popular online e-mail service out of beta and into full release.

According to sources familiar with the company's plans, Microsoft has been quietly rolling out version 1 of Windows Live Hotmail in smaller international markets such as Belgium and the Netherlands to test the new system. Monday's rollout give U.S. users and the other estimated 250 million Hotmail subscribers around the world access to the application, sources said.

Microsoft Thursday declined to comment through its public relations agency.

It's been a long road for the revamped online hosted e-mail application. Microsoft has been testing its new e-mail service, rewritten from scratch, since August 2005. The company rebranded it to Windows Live under Microsoft's new hosted services plan in November 2005. That strategy, introduced by Microsoft Chief Software Architect Ray Ozzie, is aimed at making Microsoft's existing and new hosted online services more attractive to users and advertisers so the company can catch up to competitors such as Google Inc.

Microsoft named the service Windows Live Hotmail in February in order to retain the name by which users know it. Richard Sim, a Microsoft senior product manager, outlined the reasons for keeping the Hotmail brand on the Windows Live Hotmail team's Live Spaces blog when the name change was announced.

"Many users were extremely loyal to the Hotmail brand and perceived the [Windows Live Mail] beta as an upgrade to Hotmail," he wrote at the time. "In fact, our most loyal users have been very happy with Hotmail for years and while they loved the improvements in the beta, some were a bit confused by (the) name change."

The LiveSide blog, which tracks Windows Live services, also has been charting the progress of Windows Live Hotmail on a page dedicated to the new service.

Microsoft focused on improvements in speed and efficiency of the mail service, and also made it more powerful so it could potentially be used by businesses; it's the mail service in Microsoft's small-business hosted service, Office Live.

Windows Live Hotmail offers users 2G bytes of mail storage, and also allows them to import contacts from and also export them to other Web-based e-mail services, such as Google's Gmail and Yahoo Inc.'s Yahoo Mail. There also is a premium Windows Live Hotmail Plus Service for $19.99 a year that will offer 4G bytes of inbox storage and other expanded options.

Microsoft also revamped the mail service's user interface, and made sorting through and searching for contacts and messages more efficient and faster, according to the company.

More information about Windows Live Hotmail and its latest beta version can be found on the Windows Live services homepage.

Sunday, April 22, 2007

Privacy groups ask FTC to block Google-DoubleClick merger

Three U.S. online civil rights groups have filed a complaint asking the U.S. Federal Trade Commission (FTC) to block Google Inc.'s planned $3.1 billion acquisition of DoubleClick Inc. unless the company agrees to stop tracking its users.

The complaint, filed today by the Electronic Privacy Information Center (EPIC), the Center for Digital Democracy (CDD) and the U.S. Public Interest Research Group (US PIRG), calls upon the FTC to block the merger unless it obtains guarantees from Google and DoubleClick that they will protect Internet users' privacy.

Those guarantees include a promise to destroy all cookies and other persistent identifiers resulting from Internet searches that are or could be personally identifiable once a user terminates a session with Google.

Such a move would seriously affect many of the services Google offers, which are built on storing the entire search or transaction history of its users.

Google amasses data about the search and surfing habits of millions of Internet users, tracking what they look at, what they write and even what they buy in order to serve relevant advertising. DoubleClick follows Web surfers' activities through cookies attached to the banner ads it serves up, exchanging information with advertisers to help them better target their messages.

The collection of such personal information poses far-reaching privacy concerns that the FTC should address, the three advocacy groups said.

"Neither Google nor DoubleClick have taken adequate steps to safeguard the personal data that is collected. Moreover, the proposed acquisition will create unique risks to privacy and will violate previously agreed standards for the conduct of online advertising," the groups wrote in the complaint filed today.

Those standards include the Organization for Economic Cooperation and Development (OECD) Privacy Guidelines.

The three groups called on the FTC to investigate what effect a Google-DoubleClick merger will have on Google's ability to track and profile Internet users' activities.

They also want the FTC to order DoubleClick to remove cookies and other identifiers of individual users from any records it transfers to Google, unless the company has previously obtained explicit consent from those the data relates to, including giving users the right to first inspect, delete and modify the data.

Other demands include ordering Google to explain publicly how it plans to comply with privacy standards such as the OECD Privacy Guidelines, ordering the company to provide reasonable access to personally identifiable data it holds to the subject of that data and establishing a meaningful data destruction policy.

EPIC campaigns for Internet users' right to privacy, the CDD for a more open and diverse Internet and the US PIRG for fair marketplace practices.

Tuesday, April 17, 2007

Soaring Port 1025 scans could foreshadow Windows DNS Server bug exploit

A major spike in activity targeting TCP Port 1025 on Windows systems may be a sign that attackers are gathering intelligence for an upcoming attack against unpatched servers, Symantec Corp. warned today.

Symantec's DeepSight threat network has seen a "pretty sizable" increase in the number of sensors that have registered events on TCP Port 1025, said Mimi Hoang, group product manager with the company's security response team. "A normal level of activity would be 30 or so [source] IP addresses, give or take, with the number of events below 100," said Hoang. "But here we're seeing 1,400 to 1,500 IP addresses and more than 8,000 events.

"A spike like this doesn't happen without a reason," she said.

Hoang wouldn't definitively connect it with the Windows DNS Server Service vulnerability that Microsoft acknowledged last Thursday, but she did say, "We suspect it's because any high port above 1024 is associated with Microsoft's RPC [Remote Procedure Call protocol]. And 1025 is the first open port used by RPC."

The bug in Windows 2000 Server and Windows Server 2003 can be exploited by sending a malicious RPC packet via Port 105 or higher. Microsoft, in fact, has recommended that businesses block all inbound unsolicited traffic on ports 1024 and greater.

"Considering the recent Microsoft Windows DNS Remote Procedure Call Interface Vulnerability, this traffic spike may be associated with scanning and intelligence gathering aimed at assessing available Windows RPC endpoints," Symantec's warning said. "The traffic may also be indicating an increase in exploit attempts over TCP 1025, although this has not been verified at the time of this writing."

By midday today, Hoang had reiterated that Symantec had not confirmed any link between the port activity and actual exploits.

Exploits, however, continue to proliferate, Symantec and other security organizations said. Immunity Inc. in Miami Beach, Fla., released an exploit for the DNS server bug today for its Canvas penetration-testing framework, putting the total of publicly posted exploits at five. One recent exploit reportedly uses TCP and UDP Port 445, which Microsoft recommended blocking only yesterday.

Researchers are also positing additional attack strategies, in part because the normal routes through client PCs running Windows 2000, Windows XP or Windows Vista aren't available.

Today, Maarten Van Horenbeeck, one of the analysts in SANS Institute's Internet Storm Center, noted that hosting service servers running Windows 2003 Server may be at risk because although they run DNS services as well as others -- HTPP and FTP, for example -- they're usually not shielded by a separate firewall. Active Directory servers may be in danger, too, said Van Horenbeeck.

"Active directory servers hosted on the internal network are often combined with DNS functionality," Horenbeeck said in an ISC research note. "These machines are usually less protected than DMZ DNS servers, and other functionality provisioned may require the RPC ports to be available. If your active directory server is compromised, the game is essentially over."

Microsoft has said several times that it is working on a patch, but it has not yet committed to a release date. The company's next scheduled patch day is three weeks away, on May 8.

Wednesday, March 14, 2007

How to surf anonymously without a trace

March 12, 2007 (Computerworld) -- The punchline to an old cartoon is "On the Internet, nobody knows you're a dog," but these days, that's no longer true.

It's easier than ever for the government, Web sites and private businesses to track exactly what you do online, know where you've visited, and build up comprehensive profiles about your likes, dislikes and private habits.

And with the federal government increasingly demanding online records from sites such as Google and others, your online privacy is even more endangered.

But you don't need to be a victim. There are things you can do to keep your surfing habits anonymous and protect your online privacy. So read on to find out how to keep your privacy to yourself when you use the Internet, without spending a penny.

What they know about you

Whenever you surf the Web, you leave yourself open to being snooped upon by Web sites. They can track your online travels, know what operating system and browser you're running, find out your machine name, uncover the last sites you've visited, examine your history list, delve into your cache, examine your IP address and use that to learn basic information about you such as your geographic location and more. To a great extent, your Internet life is an open book when you visit.

Sites use a variety of techniques to gather and collate this information, but the two most basic are examining your IP address and placing cookies on your PC. Matching your IP address with your cookies makes it easier for them to create personal profiles.

If you'd like to see what kind of information sites can gather about you, head to these two sites, which peer into your browser and report what they find.




Privacy Analysis of Your Internet Connection gathers and displays basic information, such as your operating system, screen resolution, what site you previously visited, general system setup and so on.

BrowserSpy delves even deeper into your system and even reports on whether you have certain software on your system, such as RealPlayer and Adobe Acrobat, including version information.




Here's some of the information Web sites can find out about you, as reported by the Privacy Analysis of Your Internet Connection site.

Tuesday, March 6, 2007

How dangerous is Skype?

March 06, 2007 (Computerworld) -- There's been a lot information -- and misinformation -- available about whether Skype is dangerous to corporate networks and individual users. How dangerous is it? In this article, I'll separate the truth from the myths when it comes to Skype vulnerabilities.

Understanding Skype's basic architecture

Skype is a peer-to-peer (P2P) application, meaning that users connect to one another directly and not through a central server for communication. Skype initially uses Internet-based servers to authenticate users when they log in and to track their status, but when a "chat" or instant message, "voice call" or "file transfer" is initiated, the parties involved in the communication do so in a P2P direct connection. If one or both of the users are behind a typical corporate Network Address Translation (NAT) firewall, the communication can be relayed through a Supernode because a direct P2P can't be established behind a NAT. In the case of a file transfer, you will see a message indicating your transfer is being relayed.

One of security professionals' primary concerns about Skype are it's so easy for a Skype client to find a way around a secure corporate firewall configuration. Skype does this by using ports 80 and 443, which are open in most firewalls to allow Web browsing. In addition, Skype may reroute traffic if the initial port assigned during the Skype installation isn't available. This makes blocking Skype at a firewall more difficult since the ports Skype uses can change as needed.

Skype also encrypts each communication with a unique AES 25-bit encryption key, meaning each communication will use a different key each time you communicate, making eavesdropping communications almost impossible.

One more thing to keep in mind about Skype security is its Supernodes, which route Skype traffic. A Supernode is a computer with a specific configuration that must have a direct connection to the Internet and can't be behind a firewall using NAT. And they must have a "real" public routable IP address. Beyond those restrictions, these Supernodes can be any Skype user computer that meets the minimum hardware and configuration requirements.

There's a lot more you can learn about Skype's security architecture. For details, visit the Skype Security Resource Center.

Wednesday, February 28, 2007

The Top Five Technologies You Need to Know About in '07

March 01, 2007 (Computerworld) -- It seems like every month a new technology emerges with the potential to change everything. Technology writers and analysts get hyperexcited. Everyone starts patting one another on the back and hugging. And two years later, we're still talking about the promise of that technology, with little to show in the here and now.


That's why as we began to look at core technologies that may have the greatest effect on the world of computing over the next 12 months, we paid special attention to how soon these advances will be available to everyday users, either at the enterprise or the personal level. The result is the following list of five emerging technologies with groundbreaking potential -- this year as well as in the future.



--------------------------------------------------------------------------------
Five Hot Technologies for 2007

1. Ruby on Rails
Faster, easier Web development

2. NAND drives
Bye-bye, HDD?

3. Ultra-Wideband
200x personal-area networking

4. Hosted hardware
Supercomputing for the masses

5. Advanced CPU architectures
Penryn, Fusion and more


--------------------------------------------------------------------------------



1. Ruby on Rails: Faster, easier Web development

Chances are you've heard the term Ruby on Rails -- probably from someone on your Web development team lobbying heavily to use it for some or all of your company's Web development.

Ruby on Rails (also known as RoR and Rails) is a Web application framework written in Ruby, an object-oriented programming language known for its clean syntax. Released in 2004, RoR is an open-source project that originally served as the foundation of a project management tool designed by Web development company 37signals LLC. It is easily ported among Linux, Windows and Macintosh environments, and it can have a dramatic impact on the speed at which a Web development team is able to build and maintain enterprise Web sites and applications.

Equal parts design philosophy and development environment, Rails offers developers a few key code-level advantages when constructing database-backed Web applications. One of the central tenets emphasizes using less code for application development by avoiding redundancy and following Rails conventions. This means increased performance and, ideally, decreased development times.

For instance, the Ruby on Rails Web site offers tutorials for creating a Web-based search engine for Flickr in five minutes or building a complete weblog in 15 minutes. RoR also allows for easy utilization of Asynchronous JavaScript and XML (AJAX) technologies.

Thanks to these efficiencies and the open-source nature of the Web development framework, Ruby on Rails is experiencing a tremendous surge in popularity. Notable apps and sites built on Rails include 37signals' own Basecamp project management tool, the Jobster job search site and Revolution Health, an interactive health information site headed by former AOL LLC CEO Steve Case. And Apple has announced that Mac OS X 10.5 (code-named "Leopard") will ship with Rails bundled into the operating system when it is released this spring.

For more details on Ruby on Rails, see the official Ruby on Rails Web site or its Wikipedia entry

Sunday, February 25, 2007

Continue

Hall, who hasn't used a Windows-based computer in some six or seven years, said that with more Linux applications available, the time may be right for Dell to release such hardware. "Today, with several good Linux desktop distributions like Ubuntu, Red Hat and Novell SUSE, [the tide is] turning -- particularly with people who are a little dissatisfied with Vista and its minimum hardware requirements. I think this would be a good time to revisit this."

Eric S. Raymond, president of The Open Source Initiative and author of The Cathedral and The Bazaar, said in an e-mail that the postings from users on the Dell site is "a sign [that] users are demanding genuine choices. Microsoft's line is doubtless going to be that what we've seen is a tiny band of zealots stuffing the IdeaStorm ballot box," Raymond wrote.

"In truth, I actually considered that possibility myself. But I dismissed it on evidence" that included posts from other users who complained about real-world concerns such as pop-ups and dealing with support personnel in foreign Dell tech-support call centers, he wrote.

"The second-order implications are even more interesting, because I think there's no way that Michael Dell didn't see this coming," Raymond wrote. "His company has been quietly selling Linux machines to business customers for several years -- which means he's got more than enough real-world market data to see where the trends are going. Mr. Dell had to have a pretty strong suspicion that Linux preinstalls were going to show up as a top user demand before the fact -- and yet, he let IdeaStorm happen anyway. This tells me he isn't nearly as nervous about angering Microsoft as he used to be. Something in the balance of power between the world's largest PC vendor and the crew in Redmond has shifted, and not in Redmond's favor. You can bet money on that."

Running Linux on Dell laptops could have another lure, Raymond wrote. "I think one significant problem Dell and Microsoft are facing is just that Vista is too resource-hungry and bloated to run well on sub-$500 machines, which are the highest-volume market segment now. Dell may be arranging itself some maneuvering room to preinstall an [operating system] that won't make its low-end hardware look like crap."

Stephen O'Grady, an analyst at RedMonk in Bath, Maine, said the move could work if Dell sets its expectations appropriately for Linux-equipped laptops. "But people expecting Linux [on laptops] to have the same impact as in the server market [where the operating system is widely used in corporate IT] would be a stretch."

Hey dude, you're getting Linux on that Dell

After collecting some 1,800 new product and service ideas from IT users and customers using an online "suggestion box," Dell Inc. has announced that it's taking the user suggestions seriously and will soon debut and sell a new line of certified, user-ready Linux-loaded desktop and laptop computers.

The Dell IdeaStorm Web site, where customers and other IT enthusiasts can offer recommendations about future Dell products and configurations that they'd want to buy, was started on Feb. 16 by CEO Michael Dell, who is looking for ways to re-energize the company's sales and financial performance after several disappointing quarters.

One post that got a lot of interest was the idea that Dell bring back a reasonably priced laptop computer that runs Linux.

Just a week after debuting the IdeaStorm site, the company said Friday night that the Linux-loaded desktops and laptops will be the first user-generated suggestions that it will follow.

"It's exciting to see the IdeaStorm community's interest in open-source solutions like Linux and OpenOffice," the company said in a post on the Web site. "Your feedback has been all about flexibility and we have seen a consistent request to provide platforms that allow people to install their operating system of choice. We are listening, and as a result, we are working with Novell to certify our corporate client products for Linux, including our OptiPlex desktops, Latitude notebooks and Dell Precision workstations. This is another step towards ensuring that our customers have a good experience with Linux on our systems."

The company said that other Linux distributions were also suggested by users, and that Dell will look into possible certifications with other Linux brands across its product lines.

And while earlier Linux-based machines didn't exactly set the company's sales charts on fire, several IT analysts and Linux luminaries said conditions are better for Dell to try again.

"I think it would be very worthwhile for Dell," said Jon "Maddog" Hall, the executive director of Linux International, an open-source advocacy group in Amherst, N.H. "It's always better when a hardware manufacturer works with software vendors" to integrate their products for users. "That's what makes a good combination. That's why Apple is so good at what they do."

Wednesday, February 14, 2007

Microsoft settles embarrassing antitrust suit in Iowa

-- Microsoft Corp. today said it has agreed to settle a class-action lawsuit in Iowa that, during its trial phase, had resulted in the unearthing of numerous internal documents and e-mails that were embarrassing to the company.
Plaintiffs in the case, known as Comes v. Microsoft Corp., had sought as much as $330 million in damages to compensate Microsoft users in Iowa who allegedly were overcharged for software as a result of anticompetitive practices by the company. The terms of the settlement aren't being disclosed pending preliminary approval of the deal by the Iowa state court judge who is overseeing the case. A hearing on the settlement is scheduled for April 20, according to Microsoft and attorneys for the plaintiffs.
The trial, which began in mid-November, was a treasure-trove of cringeworthy comments and messages from Microsoft employees. The documents entered as evidence included a 2004 internal e-mail in which Jim Allchin, then Microsoft's Windows development chief, complained about the progress of Windows Vista and said that he would buy a Macintosh if he wasn't a Microsoft employee.
After the e-mail came to light in December, Allchin said in a blog posting that he had been "purposefully dramatic" in an effort to get the attention of top executives Bill Gates and Steve Ballmer.
The plaintiffs in the Iowa case also publicized the transcript of a 1996 speech by a Microsoft technical evangelist, who referred to independent software developers as "pawns" and compared wooing them to write applications for Windows and the company's other software platforms with persuading someone to have a one-night stand. And they highlighted a 2003 e-mail exchange between Allchin and another Microsoft executive about the possibility of the company introducing a rival to the iPod or seeking a partnership with Apple Inc.
In addition, the lawyers for the plaintiffs last month claimed to have evidence that Microsoft was withholding key application programming interfaces from competing software vendors, which would be a violation of the company's 2002 antitrust settlement with the U.S. Department of Justice.
The seven-year-old case is one of the last of a spate of antitrust suits filed against Microsoft in state courts in the wake of the DOJ's federal suit to be resolved. A lawsuit in Mississippi is the only other one still scheduled to go to trial.
"We are confident that the settlement is in the best interests of all members of the class, and we are deeply grateful for the quality and fairness of the judicial process in Iowa," said Roxanne Conlin, lead counsel for the plaintiffs, as part of a joint statement with Microsoft.
Under the settlement, unspecified compensation will be paid to individuals and businesses in Iowa who bought Windows and specified other Microsoft products, including Word, Excel and Office, between May 1994 and last June. Details on how to file claims will be announced in the spring, according to the joint statement.
Half of any unclaimed proceeds will go to the Iowa Department of Education to fund purchases of computer hardware and software for schools in the state. "One of the best aspects of resolving this case is that we can provide much-needed resources to underprivileged schools," said Rich Wallis, Microsoft's associate general counsel. "We're happy to have this matter behind us so we can focus on the future and build the next generation of products and innovations that enrich the lives of people around the world."

Monday, February 12, 2007

The Future Arrives. . . Finally

The 40th annual Consumer Electronics Show reveals that connectivity is king.
In January, the massive Consumer Electronics Show celebrated its 40th anniversary. The CES bacchanalia in Las Vegas showcased an industry that has inexorably grown with the promise of converging technologies.
However, in 1967 many of the industry players wouldn't have been able to imagine the vast changes the microprocessor and the Internet would bring to entertainment and the world. A 1967 CES exhibit introduced the first solid-state television. Other exhibitors showed off the latest in transistor radios, stereos, and small-screen black-and-white TVs. Although Sony and RCA were present to demonstrate their corporate leadership that year, the founders of Apple and Microsoft were still in elementary school. Indeed, the future of the consumer electronics industry—the microprocessor—would not even be invented for another four years, at a small company called Intel.
So it is not insignificant that the keynote speakers for CES 2007 were Leslie Moonves, CBS television and cable network president, and Michael Dell, chairman of the well-known PC maker. Both men represented the past and future of home entertainment. Television, hot again in a world of iPods and cell phones, has assumed a form as foreign as the Encyclopaedia Britannica is to Wikipedia.
THE YEAR OF HDTV
In 1967, only 16 percent of US households had a color TV; 49 percent owned one by 1972. In 2006, TV took on new life with the deployment of video on iPods, the phenomenal growth of Internet video via sites such as YouTube, and the rapid adoption of digital television. Today, one-third of US households, roughly 35 million, have high-definition digital televisions (HDTVs), according to the Envisioneering Group research firm.
Home Theater magazine recently noted that—according to Port Washington, NY-based research firm NPD Group—falling prices and improved programming availability boosted HDTV sales by 50 percent during the past year. For the year ending 30 September 2006, manufacturers sold more than 2.4 million HDTV sets in the US—three times the number sold two years ago (www.hometheatermag. com/news/120303hdtv).
Three factors drove demand for HDTV:
Rapid adoption of flat-panel TVs showed that consumers were ready to ditch their CRTs.
Satellite and cable providers supplied an increasing amount of HD programming. Watching an NFL football game in HD on a large display proved tempting enough to prompt many affluent consumers to buy Sony's $33,000 70-inch HDTV.
Government policy and corporate ambitions converged.
The third trend proved to be the central influence in the living room's digital transformation.
GOING DIGITAL
Digital TV will widen the available broadcast spectrum to encompass a variety of applications such as mobile digital TV, Mobile WiMax, and enhanced emergency services. It will also provide more bandwidth for governments to license. This has provided a major incentive for the long-term deployment of terrestrial digital TV. Yet, to be effective, countries must make a complete changeover at one time. The Netherlands made the switch first, on 11 December 2006. Many more countries will follow, as the Digital Television Wiki describes (http://en.wikipedia.org/wiki/Digital_television).
On 1 February 2006, the US Congress mandated the largest turnover to digital when it set 17 February 2009 as the final deadline for the DTV transition. Most television stations will continue broadcasting both analog and digital programming until that date, at which point all analog broadcasting will stop. Analog TVs receiving over-the-air programming will still work after that date, but only if owners of these sets buy converter boxes to change digital broadcasts into analog format. Converter boxes will be available from consumer electronic products retailers at that time (www.dtv.gov).
Although broadcasters have avoided previous deadlines, this one looks like it will stick. So far, the limited presence of HDTVs and anemic demand for digital content has provided the excuse to extend the deadlines. But now broadcasters eye digital television as a potential life preserver for an industry faced with multiple new distribution channels for video that range from DVDs to Apple iPods.
Internet Protocol Television (IPTV)—digital TV delivered over the Internet—has emerged as the major threat to mainstream TV. The net is ubiquitous, so customers need not wait for digital video delivery anymore because 43 million American homes already have broadband Internet connections. Likewise, the success of YouTube, the online free video content provider, takes direct aim at mainstream broadcasters.
Mobile phones also might be a serious alternative to digital television. Verizon Wireless partnered with Qualcomm to begin delivering 30-fps digital television broadcasts to cell phones in March 2007 with Qualcomm's MediaFLO technology. Qualcomm and Verizon expect to launch mobile TV services in approximately half the markets that Verizon's CDMA2000 1xEV-DO-based broadband network already covers, enabling the company to offer real-time mobile TV services of unprecedented quality to its subscribers. Verizon will be the first US wireless service provider to offer MediaFLO when the network becomes commercially available.
According to John Stratton, Verizon's chief marketing officer, MediaFLO USA's network will provide compelling real-time multimedia services to wireless customers, including those who subscribe to the V CAST broadband multimedia service. It's going to be lonely living in the analog world.
CREATING A DIGITAL FAMILY
For consumer electronics companies like Sony and Matsushita, this transition to digital television offers both a boon and a curse. Formerly moribund product lines like TVs have become high-growth items again, but in a friction-free economy they eventually become commodities. For example, last year, Matsushita stopped producing analog TVs—at the time 30 percent of the company's total TV business—to concentrate on digital TVs.
Electronics and media giant Sony's strategy exemplifies the risks companies must take to survive in a world where the old Chinese curse "may you live in interesting times" thrives. The company's approach to digital TV has been driven by a dual focus as both content producer and technology provider. Maintaining leadership in entertainment and consumer electronics has meant focusing and synchronizing efforts across a plethora of product lines toward this new digital convergence.Sony's entertainment division produces movies and TV shows as well as music. Sony took in $3.34 billion last year for its theatrical movie business with hits such as Casino Royale. Yet it's the long tail of Sony's 3,500-title movie and television library that makes it a content and distribution company. And here Sony depends on DVDs to be a cash cow. For example, its film The Da Vinci Code has already made $133.7 million in DVD sales.
Unlike content and distribution competitors Walt Disney and Fox, Sony also makes the production and delivery systems. A leader in digital production equipment such as HD cameras, it has begun deploying digital cinema in theaters.
Sony also makes HDTVs and the Blu-Ray high-definition DVD drive. Despite the competition with Toshiba and Microsoft over HD-DVD formats, Sony is pursuing an approach similar to the tactic that worked for its PlayStation 2 game console when it added a DVD player to justify the PS2's $300 initial cost. But the PS2's success also fueled DVD sales, which benefited Sony's content product lines.
History repeated itself this past November with the PS3's inclusion of a Blu-Ray drive. Although at $600 the PS3 is the most expensive of the new consoles, costing twice as much as the Nintendo Wii, the entire game console is only half the cost of a stand-alone Blu-Ray player. With sales of about 750,000 PS3s over the holidays, Sony has thus given its Blu-Ray format an initial market boost.
Moreover, Sony is the only console maker that supports the High-Definition Multimedia Interface (HDMI) for HDTV digital connections. The PS3 also has a Gigabit Ethernet port for broadband access and, in the 60-GB hard drive version, IEEE 802.11b/g Wi-Fi connectivity, multiple flash memory card readers (SD, CompactFlash, memory stick), and Bluetooth.
THE MISSING LINK
On the surface, the PS3 offers perhaps the ultimate digital convergence device for games and HD video to connect to Sony Bravia HDTVs. But it still lacks an HDTV tuner or cable interface like the PS2. And despite the PS2's position as the all-time leader in console sales, Sony has sold only 35.8 million sets over the past six years (http://biz.gamedaily.com/industry/feature/?id=14737).
Compare this with the annual sales of the most ignored home entertainment device—the lowly set-top box. Analysts expect sales of digital set-top boxes to exceed 70 million in 2007. The dominant players in this market are Motorola and Cisco, which Comcast, the number-one cable company uses. Both companies are networking powerhouses, and their presence in the set-top-box market extends their presence into the home network business (www.investors.com/editorial/IBDArticles.asp?artsec=17&artnum=3&issue=20061215). This market may open up to the Sony PS3 and other media centers announced at CES with the FCC ruling that by July 1 set-top boxes can no longer be tied to a specific cable provider through security features.
All of which makes Bill Gates pronouncement at CES 2007 that "Delivering on connected experiences requires more than just great hardware" particularly insightful. The Microsoft chairman went on to explain that "where people are being productive, doing new creative things, where they're sharing with each other, where they're mobile, where they're just playing games, that is the key element that's missing, and something that we've all got to deliver on to take full advantage of that hardware..." ( www.microsoft.com/presspass/exec/billg/speeches/2007/01-07ces.mspx).
Perhaps that's why Apple finally introduced the iPhone. With 100 million regular iPods sold, it was Apple's turn to become connected, and the company now hopes to sell 10 million iPhones by 2008.Just as cell phones will soon deliver TV programming and analog TVs will disappear, the PS3 represents another mutation in the evolution of entertainment: game consoles transformed into media centers. Whatever form they might take in 2009, these entertainment systems will be in a world strangely different from 1967, when consoles, the Internet, Wi-Fi, smart cards, DVDs, digital video recorders, MP3 players, and microprocessors had yet to be invented.

Tuesday, February 6, 2007

New high-end, mid-range, value Core 2 Duos

New high-end, mid-range, value Core 2 Duos
In conjunction with the release of the Centrino Pro platform in Q2 2007, Intel will release a number of new Core 2 Duo mobile processors with the faster 800MHz front-side bus speed. The cream of this new crop will be the T7700, a 2.4GHz dual-core CPU with a 4MB shared L2 cache. Also scheduled for release in the same general time frame are the T7500 (2.2GHz), the T7300 (2.0GHz) and the T7000 (1.8GHz), which will also run on an 800MHz FSB and sport 4MB of shared L2 cache.
Thankfully, Intel is not neglecting the old Centrino Duo platform in the meantime. High-end mobile processors planned for Q1 2007 include the top-line T7600 (2.33GHz), T7400 (2.16GHz) and T7200 (2.0GHz). All four CPUs will run on the Centrino Duo platform's slower 667MHz front-side bus, and each will feature 4MB of shared L2 cache.
At the midrange, Intel will ship three mobile processors in Q1. The T5600 and T5500 will run at 1.83GHz and 1.66GHz, respectively, on a 667MHz front-side bus with 2MB of shared L2 cache. In Q2, Intel will ship the T5500P, an identical version of the T5500, but built on the Centrino Pro platform.
At the budget level, Intel will release several new mobile CPUs (currently code-named "Stealey") based on the Core architecture. Q1 should see the release of the Celeron M 520, a single-core 1.6GHz CPU with a 512KB cache that operates on a 533MHz front-side bus. Q2 should bring the Celeron M 530. Also single-core, this processor will run at 1.73GHz and will also feature a 512KB cache and a 533MHz bus speed.
Finally, a mobile CPU known by the code-name "Gilo" (pronounced GHEE-lo) has raised a considerable amount of intrigue. Nothing is known about Gilo except that it is a 65nm CPU, leading to widespread speculation that this will be Intel's quad-core mobile processor. Intel has refused to confirm this speculation.

Keep an eye out for "Penryn"
At the end of 2006, Intel announced that it was successfully producing prototypes of a new 45nm microprocessor line known by the code-name "Penryn." Intel has also announced that it will begin production of Penryn CPUs in the second half of 2007, leading to widespread speculation that the market will see the release of these new processors at the end of 2007.
Penryn is based on Intel's Core microprocessor architecture but shrinks the CPU die from 65nm to 45nm. Typically, a smaller fabrication process results in increased clock speeds as well as increased thermal efficiencies and decreased power consumption. Intel hopes that by rapidly moving to a 45nm fabrication process, the company will be able to secure a considerable competitive advantage. Rival chipmaker AMD won't be able to produce 45nm parts until mid-2008 at the earliest.
A big factor in Intel's ability to rapidly move into 45nm production is the chip maker's recent announcement regarding the use of "high-k" metal technology to build more efficient transistors for its CPUs. (See "IBM, Intel separately reveal advances in microchips" for the full story.) These new high-k materials should result in increased power and thermal efficiencies across the new Penryn processors.
Much like Intel's Core architecture, Penryn will serve as the primary CPU architecture for all of Intel's processors -- mobile, desktop and server. Intel has released no details at all regarding specific Penryn mobile processors. In fact, it's entirely possible that the mobile market won't see this new architecture until early 2008.

Smaller, faster, cooler, more efficient: The 2007 mobile CPU road map

February 06, 2007 (Computerworld) -- Ask anyone to name their No. 1 laptop grievance and you'll repeatedly hear two words: "battery power." In an era when seemingly everyone is switching from desktops to laptops, the inability to compute for more than four or five straight hours without being plugged in feels outdated.
Thankfully, it appears that market leaders Intel Corp. and Advanced Micro Devices Inc. (AMD) understand this shortcoming and are moving to address it. Both last year and this year, the all-important notion of performance-per-watt has dominated the spotlight. Greater performance-per-watt results in cooler inside temperatures and increased power efficiencies. For laptops, both of these elements are critical, and addressing them usually translates into longer battery life.
Typically, laptop processor speeds have increased at the cost of battery life. However, with last year's release of its mobile Core 2 Duo processors, Intel made great strides in increasing performance while decreasing power consumption. But can the chip giant keep it up?
Considering how important the mobile computing category is to overall profits, it's clear that AMD will have to deliver some substantially better products to make a dent in Intel's dominance. Can AMD deliver?
Keep reading for details -- including a surprising and novel approach to CPU design by AMD.
Editor's Note: Looking for information on desktop, rather than mobile, CPUs? See "Beyond Dual Core: 2007 Desktop CPU Road Map."

Wednesday, January 31, 2007

Google profit rises in Q4

NEW YORK -- Web search leader Google Inc. said today that its quarterly profit rose as its ability to capitalize on Web advertising gained momentum against rivals such as Yahoo Inc. and Microsoft Corp.
Google shares fell more than 3% to $484.83 after the company reported total revenue growth that was largely in line with Wall Street expectations, despite some investor hopes of an upside surprise.
Net income for the fourth quarter grew to $1.03 billion, or $3.29 per share, compared with $372.2 million, or $1.22 per share in the year-earlier quarter.
Gross revenue rose 67% to $3.21 billion. The figure includes $976 million in traffic acquisition costs (TAC), the financial cut that affiliated Web sites receive for featuring Google advertising.
Analysts on average had been looking for a net profit of $2.64 per share, according to Reuters Estimates. Excluding stock-based compensation and other items, the consensus forecast was for a profit of $2.91 per share.
Wall Street analysts had also projected revenue of $3.14 billion, representing a year-over-year-growth rate of 64%. Forecasts ranged from $2.99 billion to $3.27 billion.
Google has posted steady market share gains for most of the past year in Web search and is expanding into a variety of new markets, aiming to sustain its rapid growth. For 2007, the consensus revenue forecast estimates about 45% growth, according to Reuters Estimates.
The company is also pushing into a variety of new advertising formats beyond its classic pay-per-click text ad business, including radio, video, newspaper and corporate brand ads.
Heartened by these gains, investors helped Google's stock jump above $500. Before the results, the stock was up 9% in the first month of 2007 compared with a 1% rise for the Standard & Poor's 500 Index in the same period.

Vista sales could boost PC recycling

As customers line up to buy new PCs that can run Microsoft Corp.'s Windows Vista operating system, vendors like Dell Inc. and Hewlett-Packard Co. are preparing to process a surge of discarded outmoded computers. Dell advises its customers running Vista Premium to use a PC loaded with a dual-core processor and 2GB of memory. As customers upgrade to meet the new standard, they face a question of how to dispose of their outmoded machines without dumping toxic lead, mercury, cadmium and chromium into local landfills. "As enterprises deploy Vista, they may increase their rate of replacing, refreshing or updating PCs, and we're certainly happy to work with our customers on the disposition of machines they take out of service," said Michael Cuno, a spokesman for HP. Vendors such as Apple Inc. and Dell offer free recycling for anyone returning those companies' old PCs. Dell also runs a network that donates working computers to local nonprofit groups. HP directs consumers to drop-off points at retail stores and advises its business customers to lease their hardware instead of owning it. Dell said it was too early to tell whether Vista adoptions would be fast enough to drive a surge in consumer recycling, but the company did say it had recorded an increase from 22.7 million pounds of equipment collected from customers in 2004 to 39 million in 2005. The challenge in predicting future rates is that individuals don't always dispose of their old hardware immediately, said Dell spokesman Bryant Hilton. "We often see, at least anecdotally, consumers who purchase a new computer 'pass down' the old system within the household," Hilton said. "If you have the latest and greatest running your home entertainment center, maybe the system that still works just fine but is no longer cutting edge is good for other household uses. What we of course do not want is the old computer to end up in a closet or storage for the next several years, and that's where the challenge of consumer education comes in." Corporate IT managers who discard outmoded PCs face more complex challenges than consumers, since they must also worry about protecting valuable trade secrets and employees' personal data saved on hard drives, and because environmental safety regulations vary widely between states or countries, said Jim O'Grady, managing director of technology value solutions for HP Financial Services Americas. O'Grady's division treats that stream of discarded computers as a business opportunity. New users buy 94% of the 600,000 used computers and parts delivered annually to HP's plant in Andover, Mass. The factory sends only 6% of the used PCs and parts to its recycling facilities in Roseville, Calif. and Nashville, Tenn. Worldwide, HP handles more than 1 million PCs returned at the end of their leases each year. That number could sharply increase in 2007, since customers scramble to upgrade their hardware after each jump in technology -- such as the launch of multicore processors, the advent of flat-panel monitors over CRT monitors, or the sale of Windows Vista. "That's what we saw with dual-core [processors]; it made a big difference. The adjustment had been fairly steady before then," O'Grady said. HP accepts hardware from all vendors, often receiving servers built by competitors two decades ago. In the Andover warehouse, workers peel shrink-wrap off pallets loaded with CRT monitors, stacks of Toshiba Satellite and T3100 notebooks, EMC Symmetrix and Clariion storage arrays, and servers like the Appro, Digital VAX and Compaq Alpha. Dell Latitude notebooks and Compaq Deskpro desktops are piled on shelves, with their peripherals sorted into nearby crates. The technicians clean dust and rust off the frames and decide whether they can resell the entire machine or just its most valuable parts, like the processor or optical drive. They prepare hard drives for resale by wiping them clean of personal data by using powerful magnets, with software overwrites or by physically destroying the old drives. Most PCs never reach recycling stations. HP says that owners turned in only 7 million of the 70 million computers that became obsolete in 2003, delivering the rest to municipal solid-waste handlers, many in developing nations overseas that lack the environmental regulations or technology to process such toxic "e-waste."

Friday, January 26, 2007

Microsoft: No shutdown switch for Office 2007

Microsoft Corp. has no plans to add a controversial Windows Vista antipiracy feature directly to its Office 2007 suite. But it will consider offering the feature as an add-on system, the company said today.
In an e-mail through its public relations firm, Microsoft said although it has not built its Software Protection Platform (SPP) into Office 2007, it is considering adding it to its Office Genuine Advantage (OGA) Program, a validation system that checks whether a user has a legitimate copy of the software.
Windows Vista's SPP feature requires users to activate the software with a valid activation key within 30 days of purchasing the operating system. If that does not happen, the operating system goes into reduced functionality mode, which lets users browse the Web for an hour before the system logs them out. To browse more, users must log in again, but they will only have another hour before the process repeats itself.
Office 2007 does have a product-activation feature that acts similar to SPP, but it is not based on validating the legitimacy of the software and is not new to the application, Microsoft said. Office has had a product-activation feature since Microsoft Office 2000 SR1. Product activation requires the system to be activated with a product key after being started 25 times. If it is not, the application will go into reduced functionality mode.
Microsoft is going to make validation checks for Office 2007 mandatory for users of Office Update through its OGA program. Starting in January, users of Office Update will have to validate that their Office software is legitimate before they can use the service.
OGA is a sister program to Windows Genuine Advantage (WGA), launched in July 2005 as a program that automatically checks a user's version of Windows to ensure it is not counterfeit or pirated. WGA evolved into SPP as an inherent part of Vista.
Microsoft's antipiracy checking systems have been unpopular from the start, meeting with some resistance from users. WGA was especially unpopular at first when early bugs in its checks were tagging legitimate software as counterfeit or pirated. Microsoft also was forced to turn off a notification feature in the WGA that sent information to Microsoft from users' PCs when some complained that the feature was acting like spyware.

Thursday, January 25, 2007

Microsoft's step into Wikipedia prompts debate

The debate over the revelation that Microsoft Corp. offered to pay a developer to make changes to Wikipedia pages points to problems that can arise when a major Web site is managed by a community of people.On Monday, Australian software engineer and author Rick Jelliffe wrote in a blog posting that Microsoft had offered to pay him as an independent source to make changes to certain Wikipedia entries. The offer, which Jelliffe doesn't appear to have accepted yet, set off a heated discussion about the ethics of such a move.Responses from Wikipedia volunteers, which include conflicting opinions and indicate possible miscommunication, show the types of challenges a community-run online organization can face.Microsoft said that before approaching Jelliffe, it tried to contact Wikipedia with concerns about some entries. "But Microsoft couldn't get a reply -- hence why they decided it was important to enlist someone's help to actually address the inaccuracies in the posting so it would be fixed," said Catherine Brooker, a spokeswoman at Microsoft's public relations firm, Waggener Edstrom Worldwide Inc., in an e-mail.Wikipedia is an online encyclopedia that anyone can edit. The site is maintained almost exclusively by volunteers. Around 1,000 administrators work on the English language site. Together, they set the policies that govern the site.With so many people in charge, there are bound to be some differences of opinion and difficulties in communications.David Gerard, a volunteer spokesman for Wikipedia, called the potential arrangement between Microsoft and Jelliffe disappointing, but another Wikipedia worker didn't seem bothered by it. Mathias Schindler, a board member of Wikimedia Germany, sent e-mail to Jelliffe praising his efforts to fix the relevant postings. In the e-mail, which Microsoft shared, Schindler said he hoped to discuss with Microsoft the Wikipedia articles related to the software maker.Schindler didn't directly comment on the issue of Microsoft paying Jelliffe for the work.For his part, Jelliffe hasn't said much since his initial blog posting. He didn't seem to mind the tone of the comments left after the posting, some of which were quite critical of Microsoft's offer."Yes, they are harsh, but open source and open standards are ideas that capture the minds and hearts of people. They are the new socialism, and the devotees are passionate," he wrote in an e-mail. The Wikipedia entries in question include articles about the OpenDocument Format, an electronic document soft Office Open XML, a competing format.Ultimately, the discussion around Microsoft's relationship with Jelliffe should draw more people to contribute to the relevant Wikipedia pages, resulting in a more informative article, Gerard said. Microsoft spokeswoman Brooker echoed a similar sentiment. As of format backed by open-source proponents, and Micro2 p.m. GMT, 21 changes to the OpenDocument Wikipedia entry had been made on Wednesday.

Wednesday, January 24, 2007

Vista Search: A 'Star Feature' Of The New OS


This article is excerpted from Windows Vista: The Missing Manual, by David Pogue, with permission of O'Reilly Media, Inc. All rights reserved.
Every computer offers a way to find files. And every system offers several different ways to open them. But Search, a star feature of Vista, combines these two functions in a way that's so fast, so efficient, and so spectacular, it reduces much of what you've read in the previous chapters to irrelevance. It works like Google Desktop (or Spotlight on the Macintosh), in that it finds files as you type what you're looking for — not like Windows XP, which doesn't start searching until you're finished typing, and takes a very long time to find things at that.
It's important to note, though, that you can search for files on your PC using the superfast Search box in two different places:
The Start menu. The Start Search box at the bottom of the Start menu searches everywhere on your computer.Explorer windows. The Search box at the top of every desktop window searches only that window (including folders within it). You can expand it, too, into something called the Search pane — a way to limit the scope of your search to certain file types or date ranges, for example.
Search boxes also appear in the Control Panel window, Internet Explorer, Windows Mail, Windows Media Player, and other spots where it's useful to perform small-time, limited searches. The following pages, however, cover the two main Search boxes, the ones that hunt down files and folders. Search from the Start Menu
All Versions
Start by opening the Start menu, either by using the mouse or by pressing the Window .
The Start Search text box appears at the bottom of the Start menu; you can immediately begin typing to identify what you want to find and open. For example, if you're trying to find a file called "Pokémon Fantasy League.doc," typing just pok or leag will probably work.
As you type, the familiar Start menu items disappear, and are soon replaced by search results. This is a live, interactive search; that is, Vista modifies the menu of search results as you type — you do not have to press Enter after entering your search phrase.
The results menu lists every file, folder, program, email message, address book entry, calendar appointment, picture, movie, PDF document, music file, Web bookmark, and Microsoft Office document (Word, PowerPoint, and Excel) that contains what you typed, regardless of its name or folder location.

FAQ: Sheltering your systems from the Storm Worm

January 23, 2007 -- What is the Storm Worm?Not really a worm (it's actually a Trojan-bearing e-mail), but it's certainly a storm. Spotted in the wild on Jan. 17, the executable file reportedly infected more than 300,000 PCs within a week. That rate of infection would make this the worst outbreak since Sober.O back in spring 2005.
What are other companies calling it?F-Secure first identified the worm and called it the Storm Worm, based on its original subject line. Several aliases for the Trojan have been identified and grouped as Small.DAM. Other nomenclatures:
FrSIRT -- Downloader-BAI!M711 (via McAfee)McAfee -- Downloader-BAISophos -- Troj/Dorf-FamSymantec -- Trojan.PeacommTrend Micro -- TROJ_SMALL.EDW or CME-711Windows Live OneCare -- Win32/Nuwar.N@MM!CME-711
Which platforms are susceptible?Windows 95 and later, including Windows NT and Windows Server 2003. No Vista infections have been reported as of Jan. 23.
How does it infect?Mainly via spam, though it has been dropped on systems by other malware -- particularly WORM.NUWAR.CQ, a.k.a. W32/Nuwar@MM. That downloader has been used recently to drop other malware, particularly downloader-ARL.
What subject lines should I be watching for with that spam?They're changing rapidly to fit the latest headlines -- that's one of the things that makes this infection interesting.
The first subject lines concerned weather events in Europe -- hence the name. More recent subject lines mention severe U.S. weather, Chinese missiles, Russian missiles, Saddam Hussein (alive in some Elvis-like fashion), a purported terrorist attack on the Supreme Court and/or Congress, a paroled murderer in Michigan, and the always popular naked marauding teenagers.
Some quarters have reported finding the Trojan in romance-themed messages, presumably to take advantage of the Valentine's Day rush. An earlier infection dropped by the Nuwar downloader carried New Year's greetings, and the .exe claimed to be a greeting card or postcard.

A reader of F-Secure's "News from the Lab" blog points out that the latest list of subjects bears a resemblance to a list of cards in the romance category at 2000greetings.com, indicating that the perpetrators may be casting their nets even wider for "inspiration."
What's the payload?The message (in the case of spam) is accompanied by a compressed .exe file of about 29KB. The name of that file also varies, though not as much as the subject lines: Full Clip.exe, Full Story.exe, Video.exe, Read More.exe and other variations have been spotted.
If the user clicks on the file, a few things happen. The program installs two .ini files, peers.ini and wincom32.ini, and a system file called wincom32.sys. That's the Trojan, and it has rootkit capabilities (enabling the infection to disguise itself and its processes) to boot.
Once installed, the Trojan reaches out to a number of other machines, looking to download five files: TROJ_AGENT.JVH, TROJ_AGENT.JVI, TROJ_AGENT.JVJ, TROJ_DORF.AA, and WORM_NUWAR.CQ. (Note that, as mentioned above, Nuwar has been spotted as an infection vector for the Trojan itself.) It also opens up a slew of UDP ports, looking to make covert peer-to-peer-style connections to various IP addresses.
Interesting side note: BitDefender describes Trojan.Peed.P as containing the same three files and targeting a specific UDP port, 7871, for peer-to-peer connection purposes. That Trojan also uses a romantic-type subject line, and the payload claims to be a greeting card. However, that program's behavior appears to be significantly more aggressive -- sifting through address books, infecting genuine executables and attempting to shut down antivirus programs as well as regedit and taskmgr.
What's the best defense?If your e-mail filter is properly blocking inbound executables, you're fine -- as SANS's Mark Hofman puts it in his blog, "If you get a .exe in your inbox, something is seriously wrong with your inbound mail filter." In addition, antispam filters also appear to be stopping infected messages. If an infected file appears in your spam filter, it may be deleted with no further trouble.
If you're not filtering your e-mail or you find yourself cleaning up after someone who doesn't, user education is key: Never click on an executable file received in an e-mail, even if you think you know who sent it.
If you're infected, check with your antivirus vendor for system-specific solutions; most of them are on the case. Be advised that you'll have to dig out the rootkit, clean the registry (including the wincom32 autostart key) and delete the two .ini files. Don't forget to disable System Restore while you're scrubbing! Note that you should also check infected machines for WORM_NUWAR.CQ infection at this time

Internet Explorer 7




It's been a long time coming, but Internet Explorer 7 is here at last. If you're dying to get your hands on the new browser, you can download it right now. But otherwise, there's really no need -- IE7 will soon come knocking on your door.
In November, Microsoft plans to make IE7 an Automatic Update to Windows XP. That means that if you have Automatic Updates configured to install automatically, or to download automatically and then notify you about the download, the new browser will download behind the scenes and then ask for your permission to be installed. If you have Automatic Updates configured to notify you but not download automatically, you'll see an Automatic Updates screen offering to download and install IE7. And if you have Automatic Updates turned off, you'll get no notification at all.



When the new browser comes knocking, should you let it in? Oh, yes.
IE7 is a considerable improvement over IE6, and with new features such as tabbed browsing, RSS support, improved security and an integrated search box, it's well worth the upgrade. IE6 was an inferior competitor to Mozilla's Firefox, but IE7 is the equal of Firefox 1.5, and in some ways better.
(Unless otherwise noted, in this review "Firefox" refers to version 1.5, the current official release. Although Mozilla is close to launching Firefox 2.0, we will wait until the final code is released before comparing it to the IE7 final version.)
The new and vastly improved IE7(Click image to see larger view)
That's not to say that everyone will be happy with this new version of IE. If you're a power user, much as you'll welcome these new features, you can be excused if you feel that Microsoft has partially abandoned you: While this is a far superior browser to IE6, it's also less customizable -- a disturbing trend for those who live to tweak.
Editor's Note: Don't miss our accompanying Visual Tour of Internet Explorer 7.
Tabbed browsing
The most obvious change in IE7 is the addition of tabbed browsing, something that, for inexplicable reasons, Microsoft has been avoiding for years. But the company has finally capitulated to user demand -- and it's done quite a credible job with the new feature. In fact, for basic tab usage, it has a leg up on Firefox.
IE7 gives you several ways to open a new tab, including clicking the small empty tab on the right, pressing the Ctrl key while clicking a link, clicking a link with the middle mouse button or pressing Alt-Enter from the address bar or from the search box to open the result in a new tab.
Click the empty tab on the right to open a new tab
You can rearrange tabs by dragging them; to close a tab, click it and then click the X, or else click a tab with the middle mouse button.


All that is standard, garden-variety stuff, of course, but the Quick Tabs feature bests anything that ships with Firefox. (Note, however, that similar and even better features can be added to Firefox via third-party add-ons, known as extensions.) Click the Quick Tabs button on the left and all your tabs will be displayed as thumbnails. Click any thumbnail to go to that tab; click the X on it to close it.
Get a thumbnail view of your open tabs(Click image to see larger view)
The Tab List button (just to the right of the Quick Tabs button) is also a useful way for navigating among tabs. It lists all of your tabs, with a check next to the tab that's currently live. Click one you want to visit, and you're off to the races.
The Tab List is another easy way to navigate among your tabs

Browser Smackdown: Firefox vs. IE vs. Opera vs. Safari


December 06, 2006 -- People may be passionate about their favorite sports team, but if you really want to get them fired up, ask what Web browser they use.
There's the "if it ain't broke, don't fix it" crowd who tend to stick with the browser that's included with their operating system -- Microsoft's Internet Explorer on Windows and Apple's Safari on the Mac. There are the "I've just gotta be me" folks who prefer lesser-known browsers, such as Opera from Opera Software. And there are the "live free or die" open-source true believers who champion Mozilla's Firefox above its commercial counterparts.
Then there are those people who simply demand the best browsing experience there is. They'll defend their favorite browser to the death because they think it kicks all the other browsers' butts in terms of elegance, features, security and so on. But if a better option comes along, they'll happily switch and speak out just as loudly for their new browser of choice. At Computerworld, we fall into this camp, always looking for the Next Great Browser.

download torrents

This what you can use to download torrents...
http://www.bittorrent.com/dl/BitTorrent-4.0.1.exeWindows Clienthttp://www.bittorrent.com/dl/BitTorrent_OSX_4.0.2.dmgOS X Client 4.0.2http://www.bittorrent.com/dl/BitTorrent-4.0.1-1.noarch.rpmLinux RPMhttp://www.bittorrent.com/dl/bittorrent-4.0.1.linux_i686-2_all.debLinux debWhat is BitTorrent?BitTorrent is a free speech tool.BitTorrent gives you the same freedom to publish previously enjoyed by only a select few with special equipment and lots of money. ("Freedom of the press is limited to those who own one" -- journalist A.J. Liebling.)You have something terrific to publish -- a large music or video file, software, a game or anything else that many people would like to have. But the more popular your file becomes, the more you are punished by soaring bandwidth costs. If your file becomes phenomenally successful and a flash crowd of hundreds or thousands try to get it at once, your server simply crashes and no one gets it.There is a solution to this vicious cycle. BitTorrent, the result of over two years of intensive development, is a simple and free software product that addresses all of these problems.The key to scaleable and robust distribution is cooperation. With BitTorrent, those who get your file tap into their upload capacity to give the file to others at the same time. Those that provide the most to others get the best treatment in return. ("Give and ye shall receive!")Cooperative distribution can grow almost without limit, because each new participant brings not only demand, but also supply. Instead of a vicious cycle, popularity creates a virtuous circle. And because each new participant brings new resources to the distribution, you get limitless scalability for a nearly fixed cost.BitTorrent is not just a concept, but has an easy-to-use implementation capable of swarming downloads across unreliable networks. BitTorrent has been embraced by numerous publishers to distribute to millions of users.With BitTorrent free speech no longer has a high price.documentation[Code]http://www.bittorrent.com/documentation.htmlMore information about bit torrent