Archive for February, 2010

The Life and Times of IE6

Friday, February 12th, 2010

The Life and Times of IE6 ... in cartoon form!

Average iPhone user consumes 273MB of data every month

Thursday, February 11th, 2010

iPhone users sure do know how to suck on the data teat:


According to the data provided Consumer Reports, the average iPhone user consumes 273MB of data per month. Compare this to the average Blackberry user who only consumes 54MB of data each month. The data also showed that 12% of iPhone users use 500MB per month of bandwidth, while some manage to eat over 1GB of data per month.

Microsoft outlines risks of downloading dodgy software

Thursday, February 11th, 2010

What could possibly go wrong?

So, what are the risks of activation exploits? Searching for, downloading, or installing activation exploits or counterfeit software on the Internet is risky, because sites that advertise these pirated products often contain malware, viruses, and Trojans, which are found bundled with or directly built into the activation exploit or counterfeit software. A study by research firm IDC, The Risks of Obtaining and Using Pirated Software, shows that one in four Web sites offering counterfeit software attempted to install unwanted or malicious code upon downloading. And this rate is rising. Media Surveillance, an anti-piracy solutions company based in Germany, recently downloaded more than five hundred pirated copies of Windows 7 (and Windows activation exploits) and found that 32% contained malicious code. These are very disturbing figures – especially when considering that resellers may be using these downloads to claim that the PCs they sell include genuine Windows. Buyers of new PCs should always check for the Certificate of Authenticity (COA) to verify that the PC they are purchasing contains only genuine Windows. A quick visit to our How to Tell website tells buyers what a genuine COA should look like.

Good advice on Patch Tuesday installation schedule

Thursday, February 11th, 2010

Over on Sunbelt Software's blog, Research Center Manager Tom Kelchner offers some sound advice on how to schedule the installation of patches:

Possibly a good strategy would be phased updates especially for enterprise systems:

-- Immediately install just the patches that fix vulnerabilities with in-the-wild exploits if you are running the vulnerable applications, modules, plug-ins, etc.

-- Wait three days for all others

-- Wait a week for non-critical (no reported exploits) updates to less-used flavors of Windows and less-used applications.

Meanwhile, have someone keep an eye on the security news sources to spot problems like this one.

Good medicine, and I think that this advice would work well for home and small office users too.

Awesome Alien vs. Predator video

Thursday, February 11th, 2010

Awesome! Can't wait for this game to come out!