Our first edition of WIG for April is filled with news links covering topics such as a U.S. based credit card processor for VISA and MasterCard has suffered a major breach, specs for a real Linux-powered Star Trek tricorder have been published, an FBI assistant director says that U.S. is not winning the war with hackers, and more.
Original, unmodified clipart image courtesy of Open Clip Art Library.
Weekly News Links
Original, unmodified clipart image courtesy of Open Clip Art Library.
- Windows 8 Start button isn’t coming back, but there will be a tutorial
The Start button won’t be coming back, no matter how much detractors of Windows 8′s new user interface would like it to. But to make the new operating system easier to understand for mouse and keyboard users, it will contain a tutorial to explain how things work.
- Windows 8 Release Candidate rumored for June, retail release in October
Windows 8 will enter the Release Candidate stage in late May or early June, according to a post made by winunleaked.tk over the weekend. This would mesh with an earlier rumor from Bloomberg that the software will be finished in the summer, with retail availability in October.
- Firefox survives first round of surgery
After years of tough competition from dominance-seeking Google Chrome and Internet Explorer, Mozilla faces a second year in a row of forced adaptations. Its aggressive Firefox 2012 development plan calls for surgeries both minor and radical to integrate many new pieces into the browser, but it may not survive post-op. At least, not as you know it.
- Adobe Releases Last Linux Version Of Flash Player
Adobe has released Flash Player version 11.2 with many new features. This is the last and final Flash Player release for the Linux platform and going forward there will be only security and bug fix updates.
- LibreOffice collaboration over instant messaging demonstrated
LibreOffice developers have demonstrated a proof-of-concept implementation of collaboration between office suite users over instant messaging, following some weeks of steady work by Eike Rathke and a week of intensive collaboration in Cambridge.
- Red Hat: The first billion dollar Linux company has arrived
Red Hat didn’t just break a billion dollars in annual earnings, it smashed its way pass a billion bucks with a fiscal year gross revenue of $1.13 billion, up 25% year-over-year.
- How Linus Torvalds Helped Bust a Microsoft Patent
Linus Torvalds just can’t help but be a thorn in Microsoft’s side. First, he created an open source project that completely upset Microsoft’s business model. And now, he has helped shoot down an important Microsoft patent in Redmond’s crusade to wring licensing dollars out of Google Android and other versions of Linux.
- How I went 24 hours without tech (and lived to tell about it)
The National Day of Unplugging has come and gone. Did Crave’s chief correspondent survive her 24-hour tech detox or buckle under the pressure? Read on to find out.
- Researcher publishes specs for real Linux-powered Star Trek tricorder
The Star Trek tricorder has become a reality, thanks to the hobby project of a cognitive science researcher. Dr. Peter Jansen has developed a handheld mobile computing device that has a number of sophisticated embedded sensors. The device is modeled after the distinctive design of the 24th-century tricorder.
- Social analytics for recruitment inaccurate, breaches privacy
The use of social analytics to assess job candidates is unreliable as it does not show the candidate’s full personality traits and may be deemed an intrusion on an individual’s personal life, social and recruitment experts point out. They advise that such tools should be used in conjunction with other recruitment tactics.
- Protecting your Facebook privacy at work isn’t just about passwords
If your employer gets to control the software on your computer it could be snooping on you at all times.
- Report: Foursquare shuts off API for Girls Around Me app
An app that employed Foursquare and Facebook data to show the real-time location of women has raised an uproar and is making people think about how social media exposes them.
- U.S. ‘not winning’ war with hackers, says FBI bigwig
Shawn Henry, executive assistant director at the FBI, says that the current methods used to stop hacking are “unsustainable.”
- Security companies and governments conspire to discover and hide software vulnerabilities that can be used as spyware vectors
The Electronic Frontier Foundation’s Marcia Hoffman writes about security research companies that work to discover “zero day” vulnerabilities in software and operating systems, then sell them to governments and corporations that want to use them as a vector for installing spyware.
- Report details successful China-based cyber-espionage
Online security company Trend Micro releases report uncovering ongoing campaign of infiltrating industrial sites in Japan and India and also targeting Tibetan activists.
- Sophos warns of Twitter scam involving Draw Something
New scam offers Draw Something fans a chance to win a nonexistent prize. The Pictionary-type game Draw Something is so popular it was only a matter of time before online scammers jumped on the bandwagon
- Apparent Groupon hole exposes customer data
At least one customer logs in and sees someone else’s credit card information and address.
- MasterCard, VISA Warn of Processor Breach
VISA and MasterCard are alerting banks across the country about a recent major breach at a U.S.-based credit card processor. Sources in the financial sector are calling the breach “massive,” and say it may involve more than 10 million compromised card numbers. Article includes multiple updates with new additional information.
- New Java Attack Rolled into Exploit Packs
If your computer is running Java and you have not updated to the latest version, you may be asking for trouble: A powerful exploit that takes advantage of a newly-disclosed security hole in Java has been rolled into automated exploit kits and is rapidly increasing the success rates of these tools in attacking vulnerable Internet users.
- MacControl Trojan Being Used in Targeted Attacks Against OS X Users
Welcome to the age of targeted attacks, Mac users. Perhaps having grown tired of owning Windows machines around the world for the last few years, attackers in China now have taken up the challenge of going after Macs with the same kind of targeted attack tactics that have served them so well in the Windows world.
Random TinyHacker Links
- Solutions for Copying a DVD, CD or Blu-Ray
This article shares a good overview of the best solutions available for making a copy of any kind of disc: CD, DVD or Blu-Ray.
- How to work with the Event Viewer in Windows
Do you want to learn more about Event Viewer and its uses in Windows 7? Check these great tutorials!
- Windows 8 is going to be BIG!
A very interesting opinion article.
- The Microsoft Touch Mouse – Is it worth your money?
Microsoft launched its Touch Mouse with lots of fanfare and media coverage. The concept looks interesting but…is it any good? Does it work well in real-life computing scenarios?
- Free Cone Day ! (Ben & Jerry’s)
Burlington’s finest Ben & Jerry’s annual Free Cone Day is just around the corner and it’s worldwide! Check the link for a scoop shop near you.
Super User Questions
- How to prevent dual booted OSes from damaging each other?
- What is the proper way of debugging a slow Windows installation?
- How long is a version of OSX supported for security updates?
- If I write all zeroes or ones to a hard disk, does that effectively and securely wipe it?
- Clean Chrome profile
- How to disable HTML5 video on YouTube with Firefox?
How-To Geek Weekly Article Recap
- What’s the Difference Between Sleep and Hibernate in Windows?
- How to Own Your Own Website (Even If You Can’t Build One) Pt 1
- How to Remotely Shut Down or Restart Windows PCs
- Desktop Fun: Castles Wallpaper Collection
- The Best Articles for Playing, Customizing, and Organizing Your Media
- From the Tips Box: Free Shipping with Amazon Filler, Repairing Ethernet Cables, and Emergency Stickers
- How To Be Your Own Personal Clone Army (With a Little Photoshop)
- Screenshot Tour: XBMC 11 Eden Rocks Improved iOS Support, AirPlay, and Even a Custom XBMC OS
- How to Create a Custom Ubuntu Live CD or USB the Easy Way
- How to Knock into Your Network, Part 2: Protect Your VPN (DD-WRT)
Geeky Goodness from the ETC Side
- What the Computer Keyboard of the Future will Look Like [Humorous Image]
- No Rush, Defragging that Drive can Wait [Humorous Image]
- Pac-Man Hiding Spot Makes High Scores a Snap
- A Creative (And Satisfying) Way To Deal With A Computer Freezing Up [Humorous Comic]
- The Internet from a 1990s Point of View [Video]
- Stormtrooper Wins! [Wallpaper]
- Bullet Time in Real Life: Impacts Slowed Down with High Speed Cameras
- Grandfather’s Tales – Why You Always Plug Directly into the Modem [Humorous Comic]
- Make Your Desktop an Aquarian Paradise with the Blue Water Theme for Windows 7
- Movie Posters Revised as 8-Bit Masterpieces
One Year Ago on How-To Geek
- How to Save Cash, Ink, and Paper by Printing More Efficiently
- How to Save Paper by Highlighting and Commenting on PDFs
- From the Tips Box: Easy Selective Printing, Lightening Your Wallet by Scanning, and Scroll Wheel Zooming
- From the Tips Box: Recording Windows, Extending Battery Life, and Supercharging CCleaner
- From the Tips Box: Simple IE-to-Firefox Syncing, Easy Windows Toolbars, and Identifying USB Cables
How-To Geek Comics Weekly Roundup
- Inventions versus Patents
- Catchy Store Name
- Long-Term Streaming
- Expensive Startup
- Brand Building
- High Bounce Rate
- Just Like the Website
How-To Geek Weekly Trivia Roundup
- Which Game Console Was Designed to Discourage Drink-Related Damage?
- Bubble Wrap Was Originally Invented To Serve As What?
- Which Computer Was The First To Ship With A Mouse?
- What Computing Rule of Thumb Predicts The Doubling of Computing Power Every Two Years?
- What Creature Was First Used In Space Flight Tests?
- What Was The First Computer Generated TV Show?