Chrome is up in the air, in the clouds, literally

By Paula Rooney | November 8, 2010, 7:59am PST

Google has teamed up with three major airlines to make Chrome and the Internet available free on flights through the holidays.

On Monday, the web services giant’s browser team said it has deals in place with AirTran, Delta and Virgin American to provide Gogo inflight Internet access at no cost to passengers from Nov. 20 through Jan 2, 2011.

The service — which will reportedly allow passengers to check e-mail and surf the web –n will be available on more than 700 planes.

I’d give this a 9.5 on the PR campaign scale. Business passengers have dreamed of in flight access for years and consumers are now just as hooked. Nearly every surfer knows about Internet Explorer and Firefox (the reincarnated Netscape Navigator) and Chrome has made a huge dent over the past year. This will only heighten awareness of the open source browser.

http://www.zdnet.com/blog/open-source/chrome-is-up-in-the-air-in-the-clouds-literally/7738?tag=nl.e550

 

Recuva – Remarkable

What a day. In front of me was a computer that was booting to nowhere. It was just a continual loop back to the statement that there were not boot files available. Then, as I got closer, I heard the tell-tale clicking of the hard drive. The good news was that it was still spinning. The bad news was that there were some critically important files on the drive that hadn’t been backed up (no, it wasn’t my drive). Option #1 – call in a data recovery company to recover the data, at a cost of about $1000. Option #2, plug it into an external enclosure and hope. The first couple of computers I plugged the drive into didn’t see it at all. Not looking good. Finally found one that recognized the drive. Looking better. Looked at the properties of the drive. 120 GB drive, 120 GB available. Really not looking good.

Enter Recuva. Recuva is software from the same company that puts out ccleaner, one of my favorite clean-up programs. So, I downloaded Recuva and ran it against the drive. Well, lo and behold, after a couple of hours, I was able to recover the critical files. Not all files were recoverable, but it did a great job, was easy to use, and did I mention that it is free? Some the features of Recua:

Undelete files on your computer

Deleted a file by mistake? Recuva brings lost files on your computer, USB drive, camera or iPod.

Recovery from damaged or formatted disks

Even if you’ve formatted a drive so that it looks blank, Recuva can still find your files on it.

Recover deleted E-Mails

Emptied your email trash and need it back? Recuva’s got you covered with full support for Microsoft Outlook Express, Mozilla Thunderbird, or Windows Live Mail.

Recover deleted iPod music

Deleted music from your iPod or MP3 player? No problem, Recuva will get this back for you along with any additional track data.

Restore unsaved Word documents

Did Microsoft Word crash or did you forget to save that important Word document. No problem with Recuva! As it can intelligently rebuild Word documents from their temporary files.

Quick-start Wizard

If you need your files back right away without fiddling with options, Recuva’s Quick-Start Wizard is the answer.

Deep Scan

Recuva can find most files within a minute. Or, set the Deep Scan to look for more deeply-buried results.

Securely delete files you want to erase forever

Want to protect your deleted files? Recuva also allows you to permanently erase any traces of deleted files.

Portable Version

Take Recuva with you wherever you go with the portable version.

Full OS support and many languages

Recuva has support for every modern version of Windows and 37+ languages.
Download it here – http://www.piriform.com/recuva

iTunes – Authorizing and Deauthorizing

Ran into a situation where I had to install a new hard drive in my computer. When I went to authorize iTunes, I was told that I had reached my limit of 5 authorizations. I realized that over the past couple of years, I had authorized several computers that I no longer had. Since I couldn’t authorize my new installation, I had to find a way to deauthorize  some of the other ones.  I found that I could log into the iTunes Store and Deauthorize All my systems and then reauthorize the one’s I’m actively using.

To deauthorize a computer

  1. Open iTunes.
  2. Choose Store > Deauthorize Computer (In earlier versions of iTunes, access this option from the Advanced menu).
  3. Select “Deauthorize Computer for Apple Account” and enter your Apple ID and password.

Make sure you deauthorize your computer before you upgrade your RAM, hard disk or other system components, or reinstall Windows. If you do not deauthorize your computer before you upgrade these components, one computer may use multiple authorizations.

To deauthorize all computers associated with your account

If you find you have reached 5 authorizations, you can reset your authorization count by clicking Deauthorize All in the Account Information screen.

  1. Click iTunes Store in the menu on the left side of iTunes.
  2. If you’re not signed in to the store, click the Account button, then enter your account name and password.
  3. Click the Account button again (your ID appears on the button), enter your password, and then click View Account.
  4. In the Account Information window, click Deauthorize All.

Note: You may only use this feature once per year. The Deauthorize All button will not appear if you have fewer than 5 authorized computers, or if you have used this option within the last 12 months.

The Proper Care and Feeding of Your HDTV, Phone, and Camera

One of the things I’m asked quite frequently is how to clean the screens of computers and laptops. There are specials cleaning materials you can purchase at office supply stores that will clean both your computer screens and your TV screens. You can also make your own cleaning solution by mixing distilled water (make sure it’s distilled) and white vinegar in equal proportions into a spray bottle.

To clean your screen, start with a dry, microfiber cloth. Move it in circular motions. Be gentle, but apply slight pressure on particularly stubborn spots.

If that doesn’t clean the screen, use your cleaning solution. Turn off your laptop. Spray the cleaner lightly onto the, not onto the monitor. Wipe as described above, then wait ten minutes before booting up.

You can find additional tips on cleaning your other electronics by clicking on the following link.

The Proper Care and Feeding of Your HDTV, Phone, and Camera.

HP Expands Recall of Notebook Computer Batteries Due to Fire Hazard

WASHINGTON, D.C. – The U.S. Consumer Product Safety Commission, in cooperation with the firm named below, today announced a voluntary recall of the following consumer product. Consumers should stop using recalled products immediately unless otherwise instructed. It is illegal to resell or attempt to resell a recalled consumer product.Name of Product: Lithium-Ion batteries used in Hewlett-Packard and Compaq notebook computersUnits: About 54,000 70,000 units were previously recalled in May 2009Importer: Hewlett-Packard Co., of Palo Alto, Calif.Hazard: The recalled lithium-ion batteries can overheat, posing a fire and burn hazard to consumers.Incidents/Injuries: Since the May 2009 recall, HP has received 38 additional reports of batteries that overheated and ruptured resulting in 11 instances of minor personal injury and 31 instances of minor property damage.Description: The recalled lithium-ion rechargeable batteries are used with various model series of HP and Compaq notebook computers. The chart below includes all notebook model numbers associated with batteries recalled to date. The computer model number is located at the top of the service label on the bottom of the notebook computer. Not all batteries matching the bar codes are being recalled.

via HP Expands Recall of Notebook Computer Batteries Due to Fire Hazard.

Legal experts: LimeWire likely doomed | Media Maverick – CNET News

A federal court judge has likely dealt a death blow to LimeWire, one of the most popular and oldest file-sharing systems, according to legal experts.

Mark Gorton, LimeWire’s founder, could see a federal court decision force his company to shut down operations possibly very soon.

On Wednesday, CNET broke the news that U.S. District Judge Kimba Wood granted summary judgment in favor of the Recording Industry Association of America (RIAA), which filed a copyright lawsuit against LimeWire in 2006. In her decision, Wood ruled Lime Group, parent of LimeWire software maker Lime Wire, and founder Mark Gorton committed copyright infringement, induced copyright infringement, and engaged in unfair competition.

“It is obviously a fairly fatal decision for them,” said Michael Page, the San Francisco lawyer who represented file sharing service Grokster in the landmark case, MGM Studios, vs. Grokster and also represented Lime Wire’s former CTO in the company’s most recent copyright case. “If they don’t shut down, the other side will likely make a request for an injunction and there’s nothing left but to go on to calculating damages.”

With an injunction, the RIAA can force LimeWire to cease file-sharing operations.

via Legal experts: LimeWire likely doomed | Media Maverick – CNET News.

Laptop Scandal School’s Own Law Firm: Aside From Those 58,000 Spy Photos, There’s No Evidence Of Spying | Techdirt

A law firm employed by the Pennsylvania school district caught using student laptop webcams to spy on students at home has released a 72-page report pdf on the incident after a 10-week investigation. Most of the report’s findings aren’t too surprising; it exonerates most higher-level school officials like any wealthy school district’s in-house investigation should, concluding that there’s no evidence indicating that anybody above the IT level “knew how TheftTrack worked or understood that it could collect large quantities of webcam photographs or screenshots.” The report also confirms reports that the system took some 58,000 images — a far cry from the 42 images the school originally claimed.Aside from those 57,958 extra photos and screenshots, e-mails alleging that school administrators found the spy technology entertaining — and the fact the system was only unearthed in the first place because a student’s at-home behavior was spied on — the study concludes that “we found no evidence that District personnel used TheftTrack to “spy” on students.” Still, at least the report slams the school district for being “overzealous” in their use of the technology, and for having a complete disregard for student privacy:

Although there is no forensic method to determine with certainty how often images stored on the LANrev server were viewed, we found no evidence that any District 3 personnel surreptitiously downloaded images from the LANrev server. Rather, the collection of images from laptops while they were in the possession of students resulted from the district’s failure to implement policies, procedures and recordkeeping requirements, and the overzealous and questionable use of technology by IS personnel without any apparent regard for privacy considerations or sufficient consultation with administrators.

By and large the study places the lion’s share of the blame on school IT folks, most of whom were already forced to retire. It does seem rather convenient that the district was allowed to hire their own law firm to investigate (at least when lawyers weren’t working with plaintiffs to allegedly help keep evidence out of the hands of federal investigators). That’s of course the first thing the lawyer for the district’s former IS director Virginia DiMedio complained about. While the IT folks certainly appear oblivious and culpable, there seems to be plenty of incompetence to go around. Hopefully higher level administrators aren’t entirely immune to the ultimate fallout, given they failed to pay any attention to the fact their district was busily building a little Macbook surveillance state with little to no accountability.

via Laptop Scandal School’s Own Law Firm: Aside From Those 58,000 Spy Photos, There’s No Evidence Of Spying | Techdirt.

Adobe Issues Workaround for Security Issue

Adobe has issued a security warning in regard to PDF files that have other files attached to them. Security researchers have found new ways for common PDF documents to release malicious code without the knowledge of the person opening them.

As Adobe investigates this, you must use the following method to disable this risk.

Open up Adobe Reader. Click on Edit on the upper menu bar and then click on the Preferences option at the bottom of the drop down. Click on “Trust Manager” in the left pane. Clear the check box “Allow opening of non-PDF file attachments with external applications”  Click Ok to exit the screen.

For Mac users, the Preferences option can be found under the Adobe Reader name on the upper menu bar.

FIFA World Cup themed malware campaign spreads malicious PDF files | Zero Day | ZDNet.com

For all of you World Cup Soccer fans:

Researchers from Symantec are reporting on an ongoing targeted malware campaign using a FIFA World Cup 2010 theme, in an attempt to trick end users into executing a malicious PDF file, exploiting a recently patched flaw in Adobe Reader.More details on the campaign:The attackers have downloaded Greenlife’s PDF document, and changed it to include malicious code. They then attempted to email the malicious PDF to a user in a major international organization that brings together governments from all over the world. We should emphasize that downloading the PDF from the Greenlife website is perfectly safe at the time of writing this blog.The attack makes use of a recently patched vulnerability in Adobe Reader – CVE-2010-0188. The patch for this critical rated vulnerability was released by Adobe on February 16, 2010. Since then we have observed a large number of targeted attacks attempting to exploit this vulnerability. Proof-of-Concept exploit code is available in the Internet which is contributing to the large number of observed attacks. The exploit makes use of a flaw in the TIFF file parsing in Adobe Reader. In particular, a stack overflow is caused by inserting a TIFF image into the PDF with a specially crafted “DotRange” tag.

According to recent reports, malicious PDF files not only comprised 80 percent of all exploits for 2009, but also, represent the preferred infection vector for targeted attacks in general, for the first time ever surpassing the use of malicious Microsoft Office files.

Users should not just update their Adobe products, or perhaps even consider an alternative PDF reader, if truly paranoid. They should take a comprehensive approach when dealing with all the 3rd party applications and browser plugins, currently installed.

via FIFA World Cup themed malware campaign spreads malicious PDF files | Zero Day | ZDNet.com.

LifeLock Settles FTC Charges For $12 Million — InformationWeek

I was thinking about using them. With the ease of identity theft, there must be something that can be used…Common sense?

The FTC complaint alleged that the firm’s identity theft protection and data security claims were false.By Thomas ClaburnInformationWeekMarch 10, 2010 11:19 AMThe Federal Trade Commission on Tuesday announced that identity theft protection company LifeLock has agreed to pay $12 million to the FTC and 35 state attorneys general to settle charges that its service doesn’t work as advertised.The agency says the payment represents one of the largest FTC-coordinated settlements on record. The settlement forbids company principals from making further deceptive claims and requires the company to take measures to protect customer data.

“While LifeLock promised consumers complete protection against all types of identity theft, in truth, the protection it actually provided left enough holes that you could drive a truck through it,” said FTC Chairman Jon Leibowitz in a statement.Since 2006, LifeLock has been charging customers $10 per month to protect them against identity theft. The company rose to prominence as a result of its advertising campaign involving the public display of CEO Todd Davis’s social security number on the side of a truck, ostensibly as proof that its identity theft protection service worked.

The FTC charged that the fraud alerts LifeLock placed on customer accounts weren’t effective against most types of identity theft, that its service claims were false, and that its data protection claims were false.

In 2008, LifeLock was sued in a civil lawsuit that made claims similar to the FTC’s allegations. That lawsuit alleged that “the statements by LifeLock’s CEO regarding the ability of LifeLock to protect his own identity are deceptive because his identity was stolen while he was a customer…”

via LifeLock Settles FTC Charges For $12 Million — InformationWeek.