Friday, May 27, 2005

A new kind of guarantee to protect against malware

IST Results : "Mobile programs � computer software that travels from one computer to another, typically a mobile phone or a smartcard � promise many opportunities, but just as many security risks. MRG has developed a generic system for protecting against malicious software. "

Know Your Website

Technique

Some great advice from a friend...
Know Your Website
by Steve Plunkett

When you search online for your company name or your trademarked products, are you at the top of the search engines? On the first page? On the second page?

Are those $0.50 per click visitors to your site looking to purchase or just looking?

Is having the top listing for a particular keyword on Pay Per Click Advertising the best thing you can do for your website?

Internet marketing involves more than just building a website. It requires building a great website using qualified keywords and phrases as part of your website copy. It also means using elements within your website to boost your rankings in search results without using unethical strategies or techniques such as cloaking, hidden keywords or multiple pages with no unique content.

Soft-drink firm offers suborbital space trip

Cosmic Log: A new zero-G giveaway - Cosmic Log - MSNBC.com

I just might start drinking 7UP... how cool woul this be??? TechGirl

May 26, 2005 | 9 p.m. ET
The latest zero-G giveaway: When SpaceShipOne won the Ansari X Prize last October, the marketers behind the Diet 7UP soft drink said they would give away the "first free ticket to space" — and this week, the contest has begun.

To take part in the promotion, you go to 7UP.com (actually, a linked Web site) and enter 15-character codes that are printed on a variety of 7UP, Sunkist, A&W Root Beer and Canada Dry bottle caps and 12-packs, sometime between now and Sept. 15. Codes are also available by mail. Check out the official rules for details.

Take My Wi-Fi, Please!

WebCPA | Tools and Resources for the Electronic Accountant
By Robert Scott, Editor-in-Chief, Accounting Technology

To the wireless network owner somewhere in New Jersey: thanks for letting us tap into your system.

That thank you letter is not going to be written, but it could be. For while killing two hours in a pediatrician's office, I was able to be productive via the world of the wireless.

Part of this was based on advice from California CPA Dave Cieslak who suggested that if I really how wanted to see how bad wireless security is, just sit in a hotel lobby and see how many networks are unprotected. In this office, the answer was two, and I quickly got online and began browsing the Web. (I am assuming that the pediatricians do not provide Wi-Fi service to customers the way Starbucks does.)

Thursday, May 26, 2005

Phone Hijacking Becomes Illegal

Wired News: "New York lawmakers unveiled a bill, the first in the nation, to target modem hijacking, a practice in which thieves tap into people's computer modems to make international phone calls.
If passed, the law would allow telephone companies to bring lawsuits against modem hijackers."

What Search Sites Know About You

Wired News: "For most people who spend a lot of time online, impulsively typing queries into a search engine has become second nature.
Got a nasty infection in an embarrassing spot? Look up a treatment on your favorite search site. Obsessing about an ex? Try Googling his or her name. Chances are the queries will unearth some enlightening information. "

Octogenarian Pizza "Coot" Busted - May 25, 2005

Octogenarian Pizza "Coot" Busted - May 25, 2005

Security's weakest links

Computerworld | Security's weakest links
Not a month has gone by in 2005 without a far-reaching computer security breach making the nightly news hour. Headliners compelled to walk the plank of shame include Bank of America -- the nation's second-largest bank -- Ameritrade, Polo Ralph Lauren, and LexisNexis.

Going, going, gone are the days when gross security breaches can be shielded from public scrutiny. The Australian Privacy Act and similar legislation elsewhere across the globe requires state agencies and businesses that collect personal information disclose certain security lapses or face severe penalties. Is it out of bounds to call it a sad state of affairs when politicians have to move in to protect what sterling IT outfits can't seem to stay on top of?

Health agency demotes staffer after breach

Rocky Mountain News: Local
A state health department worker who took medical records home and left them overnight in a car - which was then stolen - has been demoted.

Colorado's chief medical officer, Dr. Ned Calonge, said the employee violated department rules by taking the laptop computer home for the weekend.