Don´t you hate all the different video and audio formats, all those codes and tools you need to play them all ? The VLC media player is able to play many formats including (MPEG-1, MPEG-2, MPEG-4, DivX) as well as DVD, (S)VCD and various streaming types. The player is available for various systems including windows, macintosh and linux. It can also act as a server and send streams through the network, with optional support for audio and video.
Ghacks is running on a linux rootserver. It should be fairly secure but there is always a chance that someone might get access to it and comprimise the system. One of the biggest threats is the installation of a root kit which will be used to access the system at a later time and clean tracks of logins that might have occured.
Jamendo is a community website that lets you discover a growing collection of currently 1010 free music albums released under Creative Commons using latest p2p technology.That´s right, you are free to download everything using bittorrent. But that´s not all Jamendo is about. They have a very active community that reviews albums, rates and tags them and offers personal recommendations.
One of the great features of Azureus is its plugin capability which is widely used by developers. Today more than 50 plugins are available for Azureus, zeropaid took a look at the most useful ones, let us take a look at the plugins they mention. The plugins mentioned can be categorised to belong either to cosmetic changes, statistics, security, communication and time management.
We all know that CDs and DVDs don´t last forever, some expert estimate that self recorded CDs and DVDs last only for the short period of 2-5 years before they become unusuable. Many factors play a role here, some of them are the type of disk, the recording speed and handling and storage. So, what could you do if you have a medium that you can´t read / copy anymore ?
Is this my USB story week, lot´s of articles about USB drives already and more come out faster than I can type. So, I´ve found this article at watchyourend about "hacking" applications that can be run independently on usb drives. I prefer to name them security applications, all of those applications can be used for good or bad, means security IMHO fits better than hacking.
If you happen to run a webserver that uses linux or happen to run linux as your operating system for the computer you work with you should know the basics of the shell. Sometimes you quickly have to find your way into the shell and a site like linuxcommand helps you alot doing so.
It is sometimes a good choice to disable USB drives and still use other USB hardware. This is especially true for computers and notebooks that are publically accessible from time to time. So, to disable USB Drives you simply fire up regedit and browse to the following key:
The avi bug which makes it impossible to delete avis in windows xp by chosing delete from the menu or hitting del at your keyboard is caused by Explorer reading the .avi file to determine file information as soon as you move the mouse over the file. This causes 'permission denied' errors when trying to simply move, copy or delete these files as they cannot be changed while Explorer has an open handle on them.
This little open source application might come in handy for some of you. The input is a simple image which is then cut into pieces which are then saved as pdf files and can be printed out and assembled as posters. This is a great way to produce posters, the application is able to read lots of formats from digital cameras and the usual ones of course like jpg and psd.
It seems that the method that I previously posted is not working really well. If you rename the files windows will try and install the update again. Therefor one has to find another way to disable this, what we do is disable the execute bit on wgalogon.dll. That way, winlogon can't call it as a notification package at boot, and since WgaLogon is responsible for running and maintaining WgaTray.exe, no more tray popups either.
Microsoft Windows users who are living in the U.S., U.K., Malaysia, Australia or New Zealand have to deal with Microsofts next step in their fight against piracy. A user who opted for automatic security updates will recieve the new anti-piracy tool which will install and ask for a reboot. After that reboot the license of your windows operating system is checked. You might see the following message:
Users have many passwords that they have to remember, not only for website logins but also for credit cards, bank cards and the like. Many of them force you to use a different password because they have certain restrictions how the password has to look like. (for example 6 digits, a minimum of 8 chars aso.) That means, the trick to have only one password for everything is not working that well, besides being really insecure.
It´s wise to check your system components when you first start your new computer. It does not matter if you build it yourself or purchased a prebuild computer. It´s always a good idea to check if everything is working as intended. MemTest 3.4 tests your systems memory to make sure it is not damaged. It´s also a great way to test it when you overclock your computer / ram. This way you can ensure that it´s still reliable and does not produce errors.
To get Yahoo Mail Beta, just switch your content preference to Germany, Frence or UK. Then you will be asked if you want to join the beta when you log into your Yahoo Mail. Say yes, and join the beta. Then from the options menu, change your content preference what it was before. Then go to Yahoo Mail again. You should still see Yahoo Beta. If you don’t see it, go to options and click “Try Beta�? button. That’s all.
This little list might be helpful for some windows users. It is a detailed listing of windows keyboard shortcuts that most people don´t use because they simply don´t know about them. I´am not using many as well except maybe Ctrl+C to copy, Ctrl+V to paste the copied content and Alt+F4 to close a window. Shortcuts are a great way to work faster. The list is not complete but contains about 40 shortcuts.
You probably read my article about the bank heist in London where the robbers used a hardware keylogger to recieve sensitive information that allowed them to perform wireless transfers. The bank made the decision to super glue every cable to the back of the personal computer making it impossible to add the keylooger between the keyboard and the computer
The study "password security: what users know and what they actually do" was conducted by the department of psychology from the Wichita State University. The study investigated the common password generation practices of online users. All participiants took part in a survey querying (1) the types and number of different password protected accounts maintained; (2) actual practices used in generating, storing and using passwords; (3) practices believed they should use in generating and storing passwords; and (4) general demographic information.
Ghacks is a technology news blog that was founded in 2005 by Martin Brinkmann. It has since then become one of the most popular tech news sites on the Internet with five authors and regular contributions from freelance writers.