How Can I Shorten Long Website Addresses?

On occasion, you will need to copy a website address into an email, or even worse, into Twitter. I say worse because Twitter only allows 140 characters and some website addresses that you want to share can take up most of that. As for pasting a website address into an email, depending on where you put it, it could wrap onto a second line and then when the recipient clicks on the shared link, it doesn’t pick up the entire link and they don’t get to benefit from the fantastic page you wanted to share.

When those situations arise, there are a couple of sites that will take the long address (URL) and shorten them. The one I use is called TinyURL. Just paste the website address in the top box,  click on the make tinyurl button, and then copy the resulting short url into Twitter or your email.  SnipURL is another site that does the same thing. is another that is really popular with Twitter and Facebook users. Definitely look at it as well.

Once you start using these programs to shorten your website addresses, you’ll find other reasons to use them besides sharing email links and Twitter.

Google fixes severe Chrome security hole | Webware – CNET

Google released a new version of its Chrome browser Thursday to fix a high-severity security problem.

The problem affects Google’s mainstream stable version of Chrome and is fixed in the new version (download). Google has built Chrome so it updates itself automatically with no user intervention, though the software must be restarted for the new version to run.

The security problem, reported April 8 by Roi Saltzman of the IBM Rational Application Security Research Group, allowed cross-site scripting attacks. Such methods can make a Web browser process unauthorized code such as JavaScript, enabling a variety of attacks, including impersonation or phishing.

Mark Larson, Google Chrome program manager, described the problem this way in a blog posting Thursday:

An error in handling URLs with a chromehtml: protocol could allow an attacker to run scripts of his choosing on any page or enumerate files on the local disk under certain conditions.

If a user has Google Chrome installed, visiting an attacker-controlled Web page in Internet Explorer could have caused Google Chrome to launch, open multiple tabs, and load scripts that run after navigating to a URL of the attacker’s choice. Such an attack only works if Chrome is not already running.

via Google fixes severe Chrome security hole | Webware – CNET.

Learn a Foreign Language 10 Words at a Time

Have you ever wanted to learn a foreign language but can’t find the time to take a class or listen to CD’s? At you can have 10 new foreign words and their english translation sent to your email every day. Learning 10 new words a day will build your vocabulary very quickly. You can choose from: Arabic, Chinese, Czech, Danish, Dutch, English, French, German, Hindi, Italian, Japanese, Korean, Norwegian, Polish, Portuguese, Russian, Spanish, Swedish, Turkish & Welsh.

Dell and HP balk at replacing bad Nvidia chip

Dell and HP balk at replacing bad Nvidia chip

By Michael Lasky

An old urban myth claims that the microprocessors used in PCs and other consumer electronics are designed to fail within days or weeks of their warranty expiration.

For tens of thousands of people who bought Dell and HP notebooks whose motherboards fried — often a few weeks after their warranty expired — there’s nothing mythical about it.

The cause of the machines’ fried motherboards is an overheating Nvidia graphics chip. The failure rate is so huge that Nvidia had to take a $196 million charge against earnings in the second quarter of its 2008 fiscal year in anticipation of the reimbursements that would result from the faulty GPU.

What’s particularly scandalous, though, is how HP and Dell first handled the deluge of complaints from customers with notebooks that failed after their warranties expired. The companies either charged the customers (victims?) for repairs or refused service because the systems were past the warranty period.

Even worse, HP and Dell continued to sell notebooks with the same Nvidia chip long after the companies were aware of the problem. (Ultimately, Nvidia released a new version of the GPU that didn’t cause overheating.)

Unwary consumers who purchased the affected notebooks — no doubt based in part on the heady reputations of the vendors — were left in the lurch when their PCs failed, which usually occurred after 18 months or so. The purchasers had no recourse except to yell and scream at clueless tech-support reps.

When the heat from consumer complaints became as hot as the faulty Nvidia chip, HP and Dell relented and published a list of defective model numbers on their Web sites. Dell extended the standard one-year warranty to two years for the systems they identified as having the problem. HP offered a 24-month warranty extension for the specific issue.

However, instead of issuing a recall — as you would expect in such a clear case of a defective part — the vendors instead merely offered a BIOS upgrade. The “patch” for the affected notebooks made their fans run continuously in an attempt to lower the GPU-induced heat, which was cooking the motherboards onto which the chips were soldered.

This “fix” merely extended the time before the motherboards finally burned out while simultaneously devouring the machines’ battery life — sort of like putting a Band-Aid on a coronary. Of course, notebook purchasers became further inflamed by the power drain on their systems due to the constantly running fan.

via Dell and HP balk at replacing bad Nvidia chip.

To see if your Dell laptop could have this issue and is eligible for the extended warranty, click here

To see if your HP laptop could have this issue and is eligible for the extended warranty, click here

Easter Eggs

A virtual Easter egg is an intentional hidden message or feature in an object such as a movie, book, CD, DVD, software, web page or video game. The term draws a parallel with the custom of the Easter egg hunt, but actually is derived by the practice of the last Russian imperial family’s tradition of giving elaborately jeweled egg-shaped creations by Faberge which usually contained hidden gifts themselves.

A few years ago, software and operating systems contained a lot of hidden Easter eggs. Because of security concerns, you won’t find many these days. However, movies are famous for having Easter eggs. You can find reference to them at several sites, such as and on the letters on top to get to the list).

Take a look at some of them and then load your movies and see if you can find them. A lot of them come up only when playing the movies on your pc but try your DVD remote and see what happens. Happy Easter.

Changes to Apple’s iTunes prices take effect

Apple Inc., on Tuesday, began selling some of its most-downloaded songs for $1.29 apiece.

Apple said in January that it would stop selling all individual songs for 99 cents each and begin offering three tiers: 69 cents, 99 cents and $1.29.

Recording companies pick the prices. The main iTunes page advertised collections of 69-cent songs that included “London Calling” by The Clash and “Monkey” by George Michael.

Other songs from the same albums and artists remained at 99 cents.

Apple also did away with copy-protection technology known as digital-rights management, or DRM, allowing customers to play more songs on devices other than Apple’s own iPods.

Without DRM, the songs can be copied to any number of CDs, computers and music players, as long as those devices support the AAC encoding format Apple uses.

Fear of viruses could be causing PC attacks: report by Reuters: Yahoo! Tech

Computer users’ growing fear of worms and viruses could be behind a recent spike in attacks on PCs via bogus security software, according to a Microsoft Corp report published on Wednesday.

As the Conficker worm and other malicious software — known as malware — have grabbed headlines, more computer users have been looking for security programs online, some of which turn out to be agents for viruses themselves.

Out of hundreds of millions of PCs monitored by the world’s largest software maker for its twice yearly Security Intelligence Report, seven of the 25 top security threats came in the form of fake security programs.

In the last six months of 2008, Microsoft said it cleared 4.4 million PCs of the most successful bogus security program, which goes under the name of Win32/Renos.

That is a 67 percent increase over the first half of 2008, said George Stathakopoulos, head of product security at Microsoft’s Trustworthy Computing Group.

Fear of Conficker “could be a part of it,” said Stathakopoulos, explaining the sudden jump in attacks from what Microsoft calls “rogue” security software, or “scareware”.

According to the report, more security-conscious consumers are being tricked by insistent or alarming pop-up warnings into paying for protection which, unknown to them, is actually malware designed to steal personal information.

The phenomenon of “scareware” is a headache for bona fide security software makers such as Symantec Corp, McAfee Inc and Trend Micro Inc.

But these companies in turn have played a role in raising fears about malware such as Conficker, and have reaped a windfall from worried computer users buying their products.

Conficker, a program that works its way into a PC and allows it to be controlled remotely, is believed to have infected millions of PCs, but no significant disruption has yet occurred.

The report, and guidance on how to avoid viruses, is available at

via Fear of viruses could be causing PC attacks: report by Reuters: Yahoo! Tech.