Mark Zuckerberg has a grand vision that Facebook will help citizens in developing countries decide their own governments. It's a lofty and partially attainable goal. While Egypt probably won't let citizens vote for their next president with a Like, it is theoretically possible to use Facebook to crowdsource expertise. Governments around the world are experimenting with radical online direct democracy, but it doesn't always work out.
The fabled Apple television set is still a fable, lo these many years after it first was whispered into the waiting ear of an analyst or blogger, but today Apple has secured a new patent (via AppleInsider) which could renew interest in rumors of Apple's television plans, since it describes an iPhone-based remote control system for completely setting up a home theatre system tailored to specific types of content, moods and themes.
- Linux Mint 15 KDE Screenshot Tour (news.softpedia.com)
- Bolstering Your Digital Defenses - A Security Audit Checklist for the Linux Desktop (ranous.wordpress.com)
Tor Urges Users to Leave Windows
In a critical security advisory issued over the weekend, the Tor Project told its users that they should seriously consider migrating out of Microsoft’s Windows operating system.
BREACH Compression Attack Steals HTTPS Secrets in Under 30 Seconds
Homeland Security released an advisory on the BREACH attack, a side-channel compression attack similar to CRIME, except that it steals secrets from HTTPS responses.
Pinterest Closes Hole That Allowed Anyone to View Users’ Email Addresses
A security researcher has discovered a vulnerability in Pinterest, the rapidly growing social network, that enables an attacker who knows a target’s username or user ID to discover that user’s email address. The bug is quite simple to exploit and could give an ambitious attacker a huge target list for phishing attacks.
Hand of Thief also includes a mechanism to prevent users from accessing anti-virus sites. This seems to work by manipulating Internet Domain Name System (DNS) addresses within memory rather than doing some obvious such as changing records in your hosts file.
Its developer claims “it has been tested on 15 different Linux desktop distributions, including Ubuntu, Fedora, and Debian. As for desktop environments, the malware supports 8 different environments, including Gnome and KDE.” The attack specifically targets common Web browsers Firefox, Google Chrome, as well as several other that others that are often found on Linux such as Chromium, Aurora, and Ice Weasel. http://www.zdnet.com/linux-desktop-trojan-hand-of-thief-steals-in-7000019175/?
What happens when XP is no longer supported as it has been for the last 12 years, well next year we will all begin to find out! My personal choice is to opt for Windows 7 as Windows 8 is still ironing out the bugs! In providing computer services to various people l found that many people opt for the latest incarnation, but eventually drop back to the previous version.
As so many new versions of Windows is now moving faster toward the Apps market, and most of the people are still coming to terms ,with how to use them Microsoft needs to look to its laurels ,as the rise of Open Source companies like Linux and Ubuntu are hot on their heels!