Archive for May, 2005

Stabilizing Windows ME

Tuesday, May 31st, 2005

I forgot to mention the other day that this tweak to run Internet Explorer as a separate process really helps with stability of the operating system.

Bagle variants everywhere

Tuesday, May 31st, 2005

Looks like there's a whole new raft of Bagle worm variants as one of the sites that the worm monitors for updates goes online.

Check for updates for your anti-virus - most of the major AV companies have released updates today!

Protecting gear outdoors

Tuesday, May 31st, 2005

I like gadgets! Many of my gadgets are ones that I like to take outdoor (such as my GPS, digital camera and iPAQ). Problem is, the outdoors is wet and the outdoors is dirty. That's the way I like it but it's not what electronic gear likes.

And it's not just the dampness and dirt either - things get a lot of knocks and bumps too.

My solution - an Otterbox! This is the case that I have - it's the Otter 6510 (the largest they make). It's big enough to hold my iPAQ, digital camera, portable weather station, GPS, spare memory and batteries and a lot more. Everything is kept safe and secure inside the case using "pick-and-pluck" foam (which is tremendous fun to cut to shape!).

This is a great waterproof and dustproof case that is capable of taking an incredible battering while at the same time keeping the contents safe!

ITsafe Bulletin 2005/006

Tuesday, May 31st, 2005

ITsafe Bulletin 2005/05

What is it?
A significant number of reports are being received of a new mass-mailing
Trojan-type worm, that seems to be a variant of the "Bagle" family. It is
being referred to by a number of different names, including "Bagle.AR", "Bagle.BO", "Bagle-Q" or "Troj.Tooso.B".

What does it affect?
Most computers that use Microsoft Windows

What does it do?
The worms will arrive by email, and will :

* Try to turn off anti-virus applications
* Try to delete files from the computer
* Download additional code from the internet

How do I protect myself?
As always, exercise care when opening attachments to email messages, as detailed at

How do I fix it?
Keep your Anti Virus Software Anti Virus Software updated with the latest
signatures from your supplier. If you suspect that you have been
infected, your supplier's website should contain instructions as to how you can disinfect your computer.

1. ITsafe Bulletins are issued by e-mail when significant risks have been
identified that are likely to affect the majority of ITsafe users.
2. As our advice is that you should not click on URLs ("links") in any
e-mail, we actually recommend you follow good practice, and type in the website name yourself in the box at the top of your browser window to see our detailed advice, rather than clicking on any links.
3. This Bulletin is based in part on information supplied to ITsafe by
Outpost 24

ITsafe Team
Making IT safe for You
The UK Alerting and Advisory Service for Information and Communications Technologies (ICT) Security

Make sure that your AV software is up-to-date and take care when opening email attachments.

GPS “snooper” clothing

Tuesday, May 31st, 2005

I like technology but there are times when I think that technology goes too far and gives people the capabilities to do things that perhaps they shouldn't be able to do. This is what I call the dark side of technology.

Here's the latest example of such "dark" technology - forget-me-not panties. These are GPS-equipped clothing that can track the wearer. Not only do these garments contain a GPS tracker/transmitter but they also monitor their heart rate and body temperature of the wearer and can plot movements on an online map.

Not only are there huge ethical and moral considerations with making such spying and tracking capabilities available to the general public (personally, I can't help but feel that this is technology aimed at weirdos, and if you don't feel that this kind of technology is wrong, how would you feel about others collecting such data about you - maybe someone already is!), there are huge privacy issues revolving around who would have access to the data collected. Remember, if you have access to the data, then others do too!