Introduction About Site Map

XML
RSS 2 Feed RSS 2 Feed
Navigation

Main Page | Blog Index

Archive for December, 2005

Microsoft Continue to Imitate Google

Big brother
Has Google become Microsoft’s Big Brother as well as ours?

LET us assemble and review at a list of ideas where Microsoft have been claimed to imitate rather than innovate. Most of all, they appear follow Google’s footsteps, rather anxious about the looming threats .

By embarking on projects which have been recently proposed, Microsoft simply make an inimitable Google appear highly inspirational. All are implementations, which have been within their capabilities for years. These were ignored until Google initiatives surfaced or when innovative value was finally realised. It seems as though brainstorming is suppressed in Redmond. Examples:

There must be more, but I cannot think of any at the moment.

Microsoft Come Under Pressure

Small clock
The clock ticks for Microsoft while their competition evolves

MAKERS of Windows are expected to ship its next version in line with their promises. Release dates get postponed time after time while immature products develop and skip the conventional testing cycle. Having had to re-build Windows Vista from scratch, this becomes worrisome. More worrisome if the fact that a million users migrated from Windows to Apple Mac last year alone. With a flow of critical, and yet unpatched flaws, one wonders: why has Microsoft not fixed them all?

Almost 4 years after the launch of Trustworthy Computing, I found myself wondering why am I staying up till 4:00 AM to deliver an emergency set of instructions (Home and Enterprise) to my readers because Microsoft felt it unnecessary to patch a flaw six months ago that was originally low risk but mutated in to something extremely dangerous.

Timely link: Novell: Vista to Drive User to Linux

Internet Addiction

Laptop

THE effect of the Internet on everyone’s life intensifies. With higher-speed connections and rendering capabilities that grip a vivid reality, more and more people get entangled in a world of fascination — a world more worthy than the mundane at times. As some recent studies indicate, Internet addiction can become very severe.

Up to 10 per cent of internet users in the United States have a dependency that could be as destructive as alcoholism and drug addiction, it has been claimed.

Internet addiction disorder is being treated by some therapists in the same way as a chemical addiction.

The Proctor Hospital in Illinois is admitting patients to recover from obsessive computer use, according to the New York Times.

Experts told the newspaper that they see similar signs of withdrawal to those found in alcoholics or drug addicts – including profuse sweating, severe anxiety and paranoia.

On other unhealthy effects of the Internet:

Hidden Options – Pros and Cons

Locked safe

More options and parameters to fine-tune

FFirefox has hidden options, which can be unveiled and altered by entering about:config in the address bar. For example, the browser can be configured to better exploit pipieling or put an end to the most stubborn pop-ups. What is this good for? Avoidance of arbitrary choices of values which are otherwide hard-coded and this immutable. Hidden options are allowing these to be changed, using some loose UI or commands syntax, shall that ever become a necessity.

Hidden options are an excellent idea in principle. Thunderbird enables you to enter a variety of statements into JavaScript files, thereby customising the mail client quite endlessly (introduction phrase, symbols, etc.). Whether these hidden option are implication of an advanced option that is not yet implemented, I can’t tell. Either way, it is a selling point to anyone who feels passionate about hacking or even requires certain customisations.

For example, I know I would be deterred by a client that does not handle exectutable/dynamic signatures and I also feel uncomfortable having no control over the X-headers. I currently use 3 mail clients in tandem (KMail, Thunderbird, Horde) because none offers all the required features. Thunderbird with its hidden options and plug-ins is yet the most powerful/flexible.

As regards hidden options in general, the only issue I can think of is increased complexity in the code. Many conditional statements and more parameters/values which are not hardcoded make code flow harder to keep abreast of. Support for multiple languages has a similar effect. Having said that, since broadly speaking, those to ever look at the code know what they are doing, I think it is balanced by the positive points, if not overwhelmed by them. Many would disagree nonetheless.

Internet Explorer Trojan

Plastic troops
The Trojan horse effect

News headlines refer to this recent critical flaw, which affects Windows users (as Internet Explorer can never be uninstalled).

The security bug, exploited by the Trojan downloader, was originally reported in May

[...]

The vulnerability puts computers running Windows 98, Windows Millennium Edition, Windows 2000 and Windows XP at risk. An attacker could gain complete control of vulnerable systems by hosting malicious code on a Web site. Once an IE user visits the site, the malicious program would run without any user interaction.

Sounds re-assuring. In the mean time, until a patch gets released, Internet Explorer users are discouraged from clicking ‘stuff’ or strongly advised to disable necessary functionality. Otherwise, the Internet may continue to suffer from the existence of Windows zombies, which persistently carry out Denial of Service (DoS) attacks.

Related items:

Retrieval statistics: 18 queries taking a total of 0.146 seconds • Please report low bandwidth using the feedback form
Original styles created by Ian Main (all acknowledgements) • PHP scripts and styles later modified by Roy Schestowitz • Help yourself to a GPL'd copy
|— Proudly powered by W o r d P r e s s — based on a heavily-hacked version 1.2.1 (Mingus) installation —|