This week’s edition of WIG is filled with news link goodness covering topics such as Mozilla’s work on a Metro version of Firefox for Windows 8, how Google and other advertising companies tracked Safari users, reverse smudge engineering can foil Android unlock security, and more.
Image courtesy of Estamos Apanados blog.
Weekly News Links
Image courtesy of Estamos Apanados blog.
- Google Public DNS prevails as the world’s largest service
With more than 70 billion DNS requests each day, the search engine’s public DNS service is now the most used on earth.
- Mozilla building Metro version of Firefox for Windows 8
Mozilla developers are planning to build a dramatically different version of Firefox for Windows 8, a change necessitated by Microsoft’s use of the touch-friendly “Metro” user interface for PCs and tablets.
- First look: Mozilla’s Boot2Gecko mobile platform and Gaia UI
Mozilla launched a new project last year called Boot2Gecko (B2G) with the aim of developing a mobile operating system. The platform’s user interface and application stack will be built entirely with standards-based Web technologies and will run on top of Gecko, the HTML rendering engine used in the Firefox Web browser.
- The fourth maintenance update, Ubuntu LTS 10.04.4, released
The fourth and last maintenance update to Ubuntu 10.04 LTS Lucid Lynx, 10.04.4, is available for download with numerous security updates and bug fixes, covering server, desktop, alternate installation CD, DVD for i386 and amd64 architectures.
- Ubuntu 12.04 LTS Is in Feature Freeze
Canonical, through Kate Stewart, has announced that the upcoming Ubuntu 12.04 LTS (Precise Pangolin) operating system is now in Feature Freeze state.
- Fedora puts back Btrfs deployment yet again
The Fedora Project has put back plans to make Btrfs its default filesystem. It will now take over the role in Fedora 18, rather than in version 17 as originally planned.
- Senators introduce new cybersecurity bill
Under proposed legislation, DHS would decide what firms are “critical infrastructure” and require them to meet security standards.
- Win 8 security won’t replace antivirus vendors
The upcoming Microsoft’s Windows 8 offers a pre-installed security suite, bringing convenience to customers but market watchers note that it will not render third-party antivirus software redundant due to their constant innovation and customer loyalty.
- Message to Certificate Authorities about Subordinate CAs
This past Friday Mozilla sent an email to all certificate authorities in the Mozilla root program to clarify their expectations around certificate issuance. In particular, they made it clear that the issuance of subordinate CA certificates for the purposes of SSL man-in-the-middle interception or traffic management is unacceptable.
- How Google Tracked Safari Users
Google and other advertising companies have been following iPhone and Apple users as they browse the Web, even though Apple’s Safari Web browser is set to block such tracking by default.
- Mobile malware growing, led by Android
Mobile malware hit a record number last year increasing 155 percent across all platforms. Google Android, in particular, attracted much attention as cybercriminals found new ways to exploit consumer behavior.
- Smartphone botnet allegedly pulls in millions with premium text messages
Symantec has once again discovered a widespread Android trojan. This time, it’s a bot that has reportedly already affected more than 140,000 smartphones in China.
- ‘Reverse smudge engineering’ foils Android unlock security
Greasy finger traces can potentially reveal the pattern used to unlock Android devices. Typing a PIN is better, a Googler concludes.
- Researchers find flaw in key generation with popular cryptography
Small percentage of public keys in sample found online were not randomly generated as they should be, paper says.
- DDoS attacks spread to vulnerable IPv6 Internet
The next-gen Internet, still immature, is now a pathway for Net attacks, a study finds. Also, ideology has become the primary reason for DDoS attacks.
- New Kernel Vulnerabilities Affect Ubuntu 11.04 and 10.10
This past Monday Canonical issued new versions of the Linux kernel packages for the Ubuntu 11.04 (Natty Narwhal) and Ubuntu 10.10 (Maverick Meerkat) operating systems, fixing vulnerabilities found recently in the official Linux kernel packages.
- Nortel hacked for years but failed to protect itself, report says
The company didn’t try hard enough to stop a 10-year incursion by hackers likely working from China, says a former Nortel exec cited by the Wall Street Journal.
- Stock exchange sites suffer DoS attack
Stock exchange operators Nasdaq and BATS saw their Web sites attacked for over 24 hours on Tuesday, blocking access to sites although trading was not affected, report said. Security watcher noted such denial-of-service (DoS) attacks “impossible” to prevent, though.
- Cryptome.org hacked–and inadvertently spreads infection
Infected files on the site were downloading exploits from the Blackhole Toolkit that target Windows.
- Malware masquerades as police message to extort money
The Metropolitan Police’s Central e-crime Unit (PCeU) has issued a warning that malicious software is purporting to be from law enforcement agencies in an attempt to extort money.
Random TinyHacker Links
- The Complete Series about Usernames and Passwords Stored by Windows
Do you want to know where Windows stores all the user names and passwords you enter while using it? Are you interested about how secure they are, how to backup this data and then export it to another Windows computer? This series of articles will help you clarify all these things and more.
- Which Windows Passwords are the Easiest to Crack?
Find out from this article.
- The Best Software Updater Tool
According to this article, Ninite Updater is a great tool for keeping your software up-to-date, with as few clicks and hoops as possible.
- Using the Google+ app on Android to its full capabilities
If you are using Google+, utilizing it on an Android phone is the way to get the absolute most out of the social network on the go.
- Spray on Nano Particle Antenna
A video about Chamtech’s new spray on antenna technology.
- Infographic – The life of an attachment
You’ve probably got plenty of cooler things to do than sending attachments all day!
Super User Questions
- Are Linux commands interchangeable with Unix?
- How to undo an accidental drag and drop?
- How can I return a Microsoft License delivered with a Dell computer?
- Which Operating System should my elderly parents use to check their webmail?
- How important is it to keep an LCD computer monitor well-ventilated?
How-To Geek Weekly Article Recap
- Make a Super Hidden Folder in Windows Without any Extra Software
- Desktop Fun: Valentine’s Day 2012 Wallpaper Collection [Bonus Edition]
- 3 Simple Ways to Improve Low Resolution Images (and Typography)
- The Best Articles for Learning How to Virtualize Operating Systems
- How To Combine All Your Email Addresses into One Gmail Inbox
- Win Over Your Geek Love With More Hilarious Geek Valentines
- Control Your Android from a Browser with AirDroid
- Ask HTG: Connecting to Multiple Wi-Fi Nodes at Once, Changing the GRUB Boot Order, and Speeding Up the Kindle Fire’s Browser
- How to Find Which Tab is Making a Noise in Google Chrome and Mute It
- How To Preserve Your Jailbreak Apps and Settings Between iOS Upgrades
Geeky Goodness from the ETC Side
- How Different People View Tech Support [Humorous Image]
- Download 128 Ready to Use Pre-Made Windows 7 Shortcuts for Your Computer
- The Internet Lover’s 24 Hour Clock Chart [Funny Image]
- Persistence always Pays Off [Funny Image]
- The Ultimate Mac Hard Drive Repair Tool [Humorous Image]
- How to Custom Dye Your Electronics
- All the Stars Above [Wallpaper]
- Turn an Old Book into a Custom Tablet Cover
- Clippy’s New Career after Microsoft Office [Funny Image]
- The Life of an Attachment [Infographic]
One Year Ago on How-To Geek
- Should You Delete Windows 7 Service Pack Backup Files to Save Space?
- How to Enable User-Specific Wireless Networks in Windows 7
- How to Monitor the Bandwidth Consumption of Individual Applications
- Here’s a Super Simple Trick to Defeating Fake Anti-Virus Malware
- How to Recover that Photo, Picture or File You Deleted Accidentally
How-To Geek Comics Weekly Roundup
- Why He Started Freelancing
- Why They Call Them Remotes
- Old School PlayStations
- A Hard Transition
- Back Ups will not Help
- An Offer You Can Refuse
- Gone Where?!
How-To Geek Weekly Trivia Roundup
- Where Were Scenes For The Star Wars Planet Tatooine Filmed?
- What Quick Spreading Virus Relied On Recipient’s Curiosity To Propagate?
- What Is The Largest Spacecraft to Perform an Autonomous Earth Orbit and Reentry?
- What Was The First Multiple Player Internet Game?
- What Is The Most Expensive Video Game In The World?
- Published 02/19/12