Technology Information: 08/08/09

FREE 1 Year Dr. Web Antivirus Genuine License Key Worth $30 for EVERYONE

Finally, I am able to use the word EVERYONE in a freebie post because here is a promotion by Dr Web and they are giving out free 1 year antivirus genuine license to each and everyone one of you. Some of the impressive feature found in Dr.Web antivirus is FLY-CODE. This is new feature of Dr.Web 5.0 which is a universal decompression technology that allows detecting viruses disguised by means of packers unknown to Dr.Web. Just like other top antivirus, Dr.Web also has a unique non-signature detection technology called Origins Tracing that has also been brought to a new level in Dr.Web 5.0. It has already proven its efficiency during epidemics that caused data losses to a large number of customers of other vendors. Other than that, it can detect spam-bots, scans virus in email, automatic updating and etc.
free dr.web antivirus serial number
Dr.Web Antivirus normally cost 21,84 EURO for 1 user valid for 1 year but it’s free for a limited time. If you wish to get your personalized genuine license for Dr.Web Antivirus v5 valid for one year, just follow the simple instructions below. Best part is this license can also be used on Dr.Web anti-virus for Windows Mobile. Get it FAST before this offer expires!
1. Go to this page registration

2. Click the button at the bottom to go to the next step.

3. Enter your name, valid email address, age and again click the red color button on the right. It is advisable to use Hotmail or Yahoo because Gmail seems to have problems.

4. You can enter anything in the box that has asterisk and click the button on the right.

5. Check the email that you entered in step 2 and you should get an email from public@drweb.com.cn with the subject containing Chinese characters. Note down the 16 digit product key. If you didn’t get any email, you should check your junk/spam folder.

6. Download the latest version of Dr.Web Antivirus v5 and install.

7. During installation, Dr.Web will ask for license key file. Select “Receive key file during installation” and click next.


8. On the registration step 1 window, click “Obtain a license key file”. At step 2, type in the 16 digit OEM serial number and click Next. Step 3 just click Next. Now provide your user information to register yourself as Dr.Web customer and click Next. Finally it will verify your serial number and generate a key file drweb32.key.

Alternatively you can also go to this page http://buy.drweb.com/register/ to generate your Dr.Web key file based on your serial number.

Dr.Web Antivirus v5 for Windows takes up around 46MB of memory during idle when Windows has just been booted up and it increases whenever it is working. If you are using Vista/7, you shouldn’t worry about that because it the OS itself has the ability to clean up memory. A big part of the memory usage is taken by the spidermail module which is used to scan for viruses in emails. You can disable it if you do not use Outlook or any POP3 email clients. Right click on the Dr Web icon at the notification area, SpIDer Mail > Settings. At the Scan tab, uncheck Load at start.

Dr.Web is definitely better than Vexira in terms of virus detection because it detected every virus that I drop in to my test computer. Dr.Web Antivirus runs on Windows 95/98/Me/NT/2000/XP/Vista 32bit only. Thanks to my_immortalize and collapse@Doctus for “sharing”. I hope this time I “credited” the right person.

DDoS Attackers Continue Hitting Twitter, Facebook, Google

The distributed denial-of-service (DDOS) attacks that knocked out Twitter for hours and affected other sites like Facebook, Google's Blogger, and LiveJournal on Thursday continued all day Friday and may persist throughout the weekend.In its latest update, posted to a discussion forum of its third-party developers at 11 p.m. U.S. Eastern Time on Friday, Twitter reports it's still fighting the attacks.

"The DDoS attack is still ongoing, and the intensity has not decreased at all," wrote Chad Etzel, from Twitter's application development platform support team.

This means that Twitter will maintain a set of defensive measures that have allowed it to keep the site up but that also have affected the interaction of third-party applications with the site via its API (application programming interface). "At this point, removing any of those defenses is not an option," Etzel wrote.
Recovery Elusive

The real bad news for developers of affected Twitter applications and for their users? Twitter has no idea when it will be able to switch its application platform back to normal. "There is no ETA on fixing any of this," Etzel wrote, adding that Twitter staff plans to work around the clock this weekend to deal with the DDOS attack.

"Things will continue to be rocky as long as this attack continues. They may get worse, they may get better. That should not be read as 'we don't care about fixing it' or 'we're not going to fix it until everything blows over' but instead as 'we can't promise when things will be back to normal, but in the meantime we are working on fixing ASAP,'" Etzel wrote.
Other Sites Struggle
As was the case on Thursday, Twitter wasn't the sole target of the DDOS attacks on Friday. Google's Blogger blog publishing service felt the sting of the attacks on Friday afternoon as well. "A small percentage of Blogger users have experienced error messages this afternoon as the result of what appears to be an ongoing distributed denial of service attack aimed at multiple services across the web," a Google spokesman said via e-mail.

"Google has a variety of systems in place to help counteract these types of attacks, and we believe the majority of affected users can now access their blogs. We're continuing to work to minimize the impact to affected Blogger users. No other Google products have been affected," the spokesman said on Friday afternoon.

facebookFacebook, whose site experienced some performance problems on Thursday due to the attacks, acknowledged on Friday afternoon that the attacks had continued. "The requests from the botnet continue but we have been able to isolate them and provide normal levels of service to our legitimate users," a Facebook spokesman said via e-mail on Friday afternoon.

According to news reports and information from companies affected, the attacks appear directed at silencing a blogger in the country of Georgia who has been critical of Russia's actions and policies toward that neighboring country.

Microsoft’s SharePoint Thrives in the Recession

Hang around at Microsoft’s Redmond, Wash., headquarters for five or ten minutes and someone dressed in khaki pants and a blue shirt is bound to tell you about the wonders of SharePoint — one of the company’s most successful and increasingly controversial lines of software.

Think of SharePoint as the jack-of-all-trades in the business software realm. Companies use it to create Web sites and then manage content for those sites. It can help workers collaborate on projects and documents. And it has a variety of corporate search and business intelligence tools too.

Microsoft wraps all of this software up into a package and sells the bundle at a reasonable price. In fact, the total cost of the bundle often comes in below what specialist companies would charge for a single application in, say, the business intelligence or corporate search fields.

It can’t do everything. Executives at Microsoft will readily admit that the bits and pieces of SharePoint lack the more sophisticated features found in products from specialist software makers.

“We don’t claim we do everything,” said Chris Capossela, a senior vice president at Microsoft. “If we do 50 percent of the functions that these other companies do, but they’re the ones customers really want, that’s fine. The magic is that end users actually like to use the software.”

This strategy seems to have worked even during the recession.

While Microsoft’s Windows sales fell for the first time in history this year, its SharePoint sales have gone up. Microsoft declines to break out the exact sales figures for the software but said that SharePoint broke the $1 billion revenue mark last year and continued to rise past that total this year, making it the hottest selling server-side product ever for the company.

Companies like Ferrari, Starbucks and Viacom have used SharePoint to create their public-facing Web sites and for various other tasks. All told, more than 17,000 customers use SharePoint.

In many ways, SharePoint mimics the strategy Microsoft took with Office by linking together numerous applications into a single unit. This approach appeals to customers looking to save money and also represents a real threat to a variety of business software makers.

Many of these specialists like Cognos, a business intelligence software maker, and Documentum, a content management software maker, have been gobbled up by larger players looking to create their own suites. I.B.M., for example, bought Cognos, while EMC bought Documentum. Other companies like Autonomy, a maker of top-of-the-line corporate search software, remain independent.

Crucially, Microsoft has found a way to create ties between SharePoint and its more traditional products like Office and Exchange. Companies can tweak Office documents through SharePoint and receive information like whether a worker is online or not through tools in Exchange. These links have Microsoft carrying along its old-line software as it builds a more Internet-focused software line.

“SharePoint is saving Microsoft’s Office business even as it paves the way for a new era of Microsoft lock-in,” said Matt Asay, an executive at Alfresco, which makes an open-source content management system. “It is simultaneously the most interesting and dangerous Microsoft technology, and has largely caught its competitors napping.”

Along these lines, Steve Ballmer, Microsoft’s chief executive, has talked about SharePoint as the company’s next big operating system.

Microsoft has managed to undercut even the panoply of open-source companies playing in the business software market by giving away a free basic license to SharePoint if they already have Windows Server. “It’s a brilliant strategy that mimics open source in its viral, free distribution, but transcends open source in its ability to lock customers into a complete, not-free-at-all Microsoft stack - one for which they’ll pay more and more the deeper they get into SharePoint,” Mr. Asay said.

A number of smaller software companies have been eager to piggyback on SharePoint’s success. Based in San Diego, Sharepoint360 provides consulting services and software development help around the product. The company started after employees at a construction company built some Sharepoint applications and decided to market the software to other construction firms.

The start-up has helped construction companies create systems for managing projects, allowing various people to check-in on the progress of a building and keep track of documents tied to the site. It has also expanded beyond the construction area doing work for NASA, Nestle and Toshiba, according to Paul West, a co-founder of SharePoint360.

The company offers to host SharePoint applications for customers. Microsoft too wants to host more software for companies as it moves toward the cloud computing model.

Mr. West recognizes that Microsoft may begin stepping on its partners’ toes. “It may certainly come to pass that they pull the switch,” he said. “That would have implications for us.”

In the meantime, however, Microsoft subsidizes training courses and consulting work for companies like Sharepoint360.

By Ashlee Vance

Next year, Microsoft plans to release a new version of the software packed full of more advanced features, including stronger ties to the corporate search technology it acquired in the $1.2 billion purchase of Fast Search and Transfer, a Norwegian start-up.

Best Buy uses the Fast technology today to provide on-the-fly pricing information to customers performing product searches on its Web site.

By making these more sophisticated tools available to customers, Microsoft thinks it can keep pushing niche software makers out of the way and give business people, rather than just the tech folks, a way to work with business applications.

“We believe customers can turn off some of these point solutions,” said Kirk Koenigsbauer, a general manager in Microsoft’s business software group. “With SharePoint, we can deliver a very, very approachable application to end users.”

Taking FOSS Security Seriously


Developers of open source software projects should be just as concerned about security as anyone developing a proprietary app. However, the nature of the two development processes can be very different at times, and debate still rages about which is inherently more secure -- a secret code kept by a company, or a public one that all eyes can see. Just as important is how each community reacts once a problem is spotted.


VCs Speak Out: Where the Tech Investments Are Going
Venture capitalists are still looking for investments, but anything that hints of frivolity is out. What's in? Realism. The trick is to infuse your rock-solid proposal with enough creative sparks to set it apart. [Download PDF: 6 pgs | 606k]

Code hunters are spotting with greater frequency defective coding that could open security holes in free and open source (FOSS) software.

The Open Source Report 2008 and the Architecture Library Report, conducted by Coverity for the U.S. Department Homeland Security Cybersecurity Open Source Hardening Project, shows more than 10,000 defects fixed since project launch in March 2006.

The report, delivered in July at the OSCON 2009 (Open source Convention) gathering, used the same analysis tools and configurations as the Scan Benchmark 2006. The results are based on analysis of over 55 million lines of code from more than 250 open source projects that represent 14,238 individual project analysis runs. All totaled, nearly 10 billion lines of code were analyzed.

By understanding possible code execution paths, defects are identified and eliminated by open source developers, according to the report's author, David Maxwell, Open Source Strategist for Coverity. The code analysis used Coverity Prevent, a static code analysis tool that delivers path simulation, data flow analysis and false path pruning.

"It is the responsibility of everyone who works in software system to investigate testing and security issues. People with an engineer's mindset want to break down security. Security is a physical problem by nature. You have to analyze the whole thing," Maxwell told LinuxInsider.
Report Findings

Overall, code testers found that defect density dropped 16 percent over the past two years. Defect density is the number of defects per 1,000 lines of code. For example, a defect density of 1.0 means one defect in 1,000 lines of code. A defect density of 0.5 means one defect in 2,000 lines of code.

As many as 314 defects were found in one particular code base. How often the same code defect occurs may be directly related to the frequency of the type of operations the code runs. For example, a NULL Pointer Deference was tracked in 6,448 incidents for 27.95 percent frequency. A resource leak occurred in 5,852 defects for a frequency of 25.73 percent.

False positives involved a reasonably small percentage of the results. Currently, false positives are below 14 percent.
Security View Varied

Not everyone involved in building software weighs security factors with the same intensity. In fact, there is quite a variety of how seriously security is received, according to Maxwell.

For instance, some project leaders restrict access to security staff only. Others have a wide-open review process. Some projects use huge tests of the software before releasing, he explained.

"When dealing with open source projects, some security issues are handled free-form. Others are based on maintaining a built-up community reputation," said Maxwell.
Fluid Standards

In order to spot defective code that can lead to security issues, those checking the code have to be intent on finding a problem. Many similarities in security exist with both open source and proprietary software products.

Engineers who follow one set of standards during their day jobs for proprietary firms might follow those same principles at night while developing their own software. The major difference stems from the case manager who has to follow a set company line, said Maxwell.

"The 'more eyes' theory is often valid. More people can participate, but not all do it. There needs to be enough people with a level of interest to look for security flaws," said Maxwell.
Testing Key?

The issue of software security is present on both sides of the software industry -- proprietary and open source. However, the amount of testing done and who does it tends to be more manifest in the open source community.

"[Testing's] obviously critical, and it's growing in importance. What's changed is that testing used to be almost exclusively the domain of testers who, by definition, aren't that close to the code. Now, developers are seen to have equal responsibility for security and are expected to pursue rigorous verification of their code before it's ever given to a test team. That's a big paradigm shift for many development teams, but definitely a healthy change where security becomes an organizational responsibility and not just the purview of the test team," Gwyn Fisher, CTO of Klocwork, told LinuxInsider. Klocwork develops static code analysis technology used by software developers and quality assurance (QA) organizations

Security testing should not be the sole approach to getting better code writing. In fact, security testing should not take the place of good security-focused design techniques, noted Dave Roberts, vice president of strategy Download Free eBook - The Edge of Success: 9 Building Blocks to Double Your Sales for Vyatta. The company develops open source router and security products.

"It's easier to design more secure software using a better design methodology than it is to avoid thinking about security up front and try to find problems through testing. There are a variety of libraries and tools in common use that make it easier for developers to write secure software from the start and avoid issues altogether. The libraries and tools are not perfect, however, and so you still need to look for subtle problems once the software is complete, but they do avoid the blatant gaffes," Roberts told LinuxInsider.
Apples Vs. Oranges?

Security experts still bicker over whether open source or proprietary code is more secure. The answer depends on some guess work, as well as a measure of religious fervor.

"The honest answer is that nobody knows, and if anybody tells you otherwise, they're just guessing. There have been some studies that attempt to characterize one being more secure than another. But most of those are provided by security vendors with an agenda," suggested Fisher.

Of course, security is important for both open source and proprietary software. But with proprietary software, there may be a little more control because people can be held accountable, noted Mandeep Khera, CMO for Web application security vendor Cenzic.

"You can also provide security training for your developers, but for open source, it's a wild game. You have to be extra careful," Khera told LinuxInsider.

However, the more-eyes-on-the-code reasoning carries considerable influence in the debate. Open source produces more secure software than proprietary development, proffers Chander Kant, the CEO of Zmanda. Zmanda is an open source backup and recovery software developer.

"The fact that any security issue can be seen by thousands of eyes, in fact, makes it easy to find and fix security issues. If you got proprietary software, just because the security vulnerability may not be seen in the open doesn't make the code more secure," Kant told LinuxInsider.
Wrong Question

Asking security experts to debate the merits of security between the species may be missing the point. In fact, Roberts thinks asking which one is more secure is the wrong question, period. A better question to ask, he said, is how the community handles things once a problem is discovered. On that one point you see a big difference between the open source community and proprietary companies.

"There is no reason to think that either open source software or proprietary software is better than the other when it comes to the fundamental development process. While everybody likes to pick on Microsoft's (Nasdaq: MSFT) Apple Store Discount on Office 2008 for Mac - Home and Student Edition . Click here. More about Microsoft security problems on the proprietary side of things, the reality is that developers have intellects that look like a bell curve. The developers working on open source are no smarter, on average, than the proprietary developers, and both sets of developers will introduce unintended security flaws into the respective code bases," said Roberts.
Tell-Tale Difference

The primary distinguishing criteria between proprietary and open source software is the latter's commitment to finding, fixing and discussing security issues with its user base, Roberts said. There is a sense that there is nothing to hide. Problems happen, you fix them, you make users aware that a fix exists, and then you move on, he said. Not so for proprietary code.

"The same thing can't be said of proprietary software manufacturers, on average. While proprietary companies are finding that they must get better about dealing with security issues, there are many cases we have seen where the companies will wait months after an exploit is brought to their attention to develop and adequate fix," he said.

Other than that, the topic of which software flavor is more secure is oftentimes enough to start quite a heated argument, agreed Sampo Nurmentaus, technical director at Movial. The company develops Linux-based mobile devices.

For him, the openness of open source leads to better, more secure software. Open source developers have a totally different attitude toward the program code.

"An open source developer is like a sculptor that is hired to create a statue to be placed the middle of the city. Since everybody will see it, it needs to be something he or she can be proud of. This attitude toward code quality reduces the traditional overflow vulnerabilities dramatically," Nurmentaus told LinuxInsider.
By Jack M. Germain

Speculation Sizzles Over Google's On2 Buy


When Google drops a hundred million to acquire a company, it doesn't usually set the tech industry buzzing. Its acquisition of On2 Technologies is a different story, though. Google is keeping mum on its motives, but others are talking. One popular hypothesis is that it's buying the video compression technology just so it can open source it.


Enjoy redefined power and flexibility in meeting your mobility needs with the BlackBerry® Enterprise Server v5.0. High availability, powerful admin features, advanced management and security, efficient upgrade process and ability to grow with your company. Learn more.

Google (Nasdaq: GOOG) More about Google will be acquiring video compression technology provider On2 Technologies in a stock deal Apple Store Discount on Office 2008 for Mac - Home and Student Edition . Click here. valued at US$106.5 million. The deal, which requires On2 shareholder and regulatory approval, is expected to close in Q4.

Google did not respond to the E-Commerce Times' request for an interview in time for publication.

It does not appear that Google is offering any details on the acquisition beyond those provided in its announcement of the deal, in any case.

"We'll update everybody when we're able to share more information," said Jeremy Doig, engineering director - video, and Mike Jazayeri, group product manager, in a blog post. "In the meantime, nothing will change for On2 Technologies' current and prospective customers."

That cheery sign-off did nothing to stem the rampant speculation as to Google's plans for the On2 technology.
Competitive Play?

If nothing else, the acquisition will allow Google to control video storage costs -- costs that will surely skyrocket as YouTube More about YouTube moves to high def, Ken Saunders, principal of Search Engine Experts, told the E-Commerce Times.

"On2's software also optimizes video for mobile -- that too will become more and more important to Google as more users demand video for their handsets," he said.

The On2 acquisition could also be a competitive play against Hulu, Saunders suggested, which is based on On2 technology and is grabbing users for longer periods of time. YouTube, by contrast, is still largely the go-to domain for short viral videos.

"Adding on2 will allow YouTube to process longer videos more efficiently," noted Saunders.
Open Source

News of the deal has spurred speculation that Google may intend to open source the On2 technology.

There's a good rationale for that move, said David Naffis, principal with Intridea.

Between its Android and Chrome OS products, Google needs a standard format for mobile videos, he told the E-Commerce Times.

"On2's encoders allow users to encode for various mobile devices," he said.

An industry push to develop a video tag for the HTML 5 standard hasn't been resolved either, Search Engine Experts' Saunders pointed out.

"If Google releases the technology into the open source realm, it will force other competing platforms -- such as Apple (Nasdaq: AAPL) More about Apple -- to adopt the technology as well," he said.

It may also give Chrome OS a leg up -- at least initially, until other browsers follow suit, added Saunders.
No Idea

In truth, the market has no idea what Google intends -- even starting with the premise that it wants to save on video storage costs, maintained Dan Rayburn, a principal analyst in Frost & Sullivan's More about Frost & Sullivan digital media practice.

"Everyone is making statements and guessing -- but in truth we have no idea what Google intends," he told the E-Commerce Times.

Rayburn skewered some of the widespread myths surrounding the deal in a blog post.

One bet Rayburn is willing to make, though, is that the deal will not kill Adobe (Nasdaq: ADBE) More about Adobe Flash -- a competing platform.

"This is not going to disrupt the industry," he insisted. "The deal hasn't even closed yet -- and when it does, Google still has to do the integration. There are still too many unknowns -- and potential product uses for the technology -- for people to be jumping to these conclusions."

Also, Rayburn wants to puncture the theory that just because Google acquires a company that will automatically crown it king of its space.

"One acquisition doesn't make Google the default provider," he said.
By Erika Morphy

Rivals bid to snatch green domain

Rival environmental groups are lining up supporters to try to take control of a new net domain aimed at green groups.

At least two consortiums are known to be preparing bids to control .eco.

In March this year, former US vice president Al Gore backed a bid by the California group Dot Eco to operate the so-called "top level domain" (TLD).

But now a Canadian environmental group known as Big Room has launched a competing bid to manage the TLD, which is similar to .com or .uk.

Both firms plan to apply to Icann - the regulatory body that oversees domain names - for the creation of .eco early in 2010.

"We're two different applicants with two different business ideas," Minor Childers, co-founder of Dot Eco, told BBC News.

"Ours is to sell domain names to raise funds for organisations who can affect change."

He said the group had already entered into contracts with its supporters - such as the Sierra Club and the Alliance for Climate Protection - to give away 57% of its profits from sales.

"We could be one of the biggest contributors to environmental causes anywhere in the world," said Mr Childers.

'Sole focus'

Big Room also plans to generate money from the sale of .eco domain names to fund "sustainability projects around the world".

However, the consortium, which includes WWF International and Green Cross, also believe that .eco could be used as a labelling system to endorse companies with green credentials.

".eco should mean something and it should be about something more than just another domain," Trevor Bowden told BBC News.

Companies and organisations that apply for .eco domains through Big Room would have to meet certain criteria to be granted a web address.

For example, the company may have to measure and publish its carbon footprint to apply.

"This could evolve over time - this is not about us deciding what is green and what is not," said Mr Bowden.

The criteria would be drawn up with the help of international organisations, he said.

Mr Bowden envisages that the companies would use the .eco sites to publish all of their green information.

"We think transparency is a really powerful tool," he said.

Mr Childers said that his scheme would also require applicants to prove their green credentials but would probably not be as strict.

"It's unrealistic to think that you will get a lot of sign-ups if you're too restrictive," he said.

"I think our websites should give the opportunity for the 13-year-old environmentalist to have a website as well as a business," he said.

Despite having differences about a model for .eco, Mr Childers said that both groups would "definitely have to sit down" together at some point.

"My only problem is that I think labelling is a really poor use of this opportunity," he said.

The .eco domain has been made possible because of a relaxation on Icann's strict rules on top-level domain names.

The decision, made last year, means that companies could turn brands into web addresses, while individuals could use their names.

As a result, either group could apply for a different domain.

However, for the moment, both sides have one goal.

".eco is our sole focus," said Mr Bowden.

by :Jonathan Fildes

Enter your mail address:
Template by - ADMIN | HiTechvnn Template