Archive for the 'Internet' Category

Jan 30 2008

Amazon to rollout MP3 store to the rest of the world

Published by under Internet

In a move which is by the far the most credible threat to Apple’s dominance of the online music scene, Amazon will start rolling out it’s online music store to countries outside of the USA over the course of 2008.

From the press release:

Amazon to Begin International Rollout of Amazon MP3 in 2008

SEATTLE–(BUSINESS WIRE)–Jan. 27, 2008–Amazon.com (NASDAQ:AMZN) today announced that in 2008 the company will begin an international rollout of Amazon MP3, Amazon’s DRM-free MP3 digital music store where every song is playable on virtually any digital music-capable device, including the PC, Mac(R), iPod(R), Zune(R), Zen(R), iPhone(TM), RAZR(TM), and BlackBerry(R). Amazon MP3 is the only retailer to offer customers DRM-free MP3s from all four major music labels as well as over 33,000 independent labels.

The music tracks available for download are unencrypted MP3 files encoded at 256kbps and work on all MP3 players. This is big news and I can’t wait for the service to arrive in NZ.

No responses yet

Jan 10 2008

Check your flight status with Google

Published by under Internet

I first heard about this a while back but haven’t needed to use it yet. If you type a flight number into Google, the first result is the departure/arrival times with a link to track the flight using a service from www.flightstats.com

I thought that this would only work for the big airlines in countries like America, or the UK, but even an Air NZ flight from Tauranga to Wellington is correctly found:

google-flight-status

Very impressive – beats trying to navigate the Air NZ site.

No responses yet

Dec 22 2007

Stalker alert

Published by under Internet

You too can stalk all of your contacts’ online movements through a new service called Spokeo. I found out about this on Guy Kawasaki’s blog and he explains how it works:

Spokeo finds information about your friends—long-lost or not—and then tracks their online activities as they make updates. These friends don’t have to “invite” you, approve your friend “request,” or be a member of Spokeo. Spokeo is able to, for example, monitor their Facebook notes and shares, YouTube videos, Amazon wishlists, Flickr and PhotoBucket photos, Pandora favorites, MySpace updates, Twitter tweets, personal websites, and blogs.

You have to try it for yourself to find out how freaky this is. You log in to the site by providing you Gmail, Hotmail, Yahoo Mail login details and Spokeo scans your address book, and displays all the online activity from your contacts. This is the list of services that Spokeo can monitor:

  • Amazon
  • Bebo
  • Blogger
  • Buzznet
  • dailymotion
  • deviantART
  • Digg
  • Facebook Notes & Shares
  • Flickr
  • Fotolog
  • Friendster
  • Hi5
  • imeem
  • Last.fm
  • LinkedIn
  • LiveJournal
  • MySpace
  • Netlog
  • Pandora
  • PhotoBucket
  • Picasa
  • PictureTrail
  • Slide
  • Stumbleupon
  • Twitter
  • Veoh
  • Vox
  • WebShots
  • Windows Live Spaces
  • Xanga
  • Yahoo! Videos
  • Yelp
  • YouTube

So even contacts who you may have just emailed once or twice, appear in your list and you can see everything they have been up to online. Including products they have reviewed or commented on through Amazon, playlists created on Pandora, Bebo posts, Flickr photos.

It’s really bizarre and feels a bit seedy – almost like you’re spying on your contacts without their knowledge. Of course, everything you do online is in the public domain so there’s nothing dodgy going on (I don’t think…)

UPDATE: There are two interesting pages on the Spokeo blog which discuss privacy issues and you should read them both: Your Privacy, and, My Content Privacy.

No responses yet

Dec 16 2007

Google’s confusing profiles

Published by under Internet

The Google Operating System blog have posted about the new Google profiles that are being implemented. I edited my profile a couple of weeks ago when I was creating a custom map on Google Maps. I didn’t really see any significance in this at the time as I thought it was just tied into the Maps service.

But it appears to be getting integrated into a few more Google services now such as Google Reader. I’m still not sure what’s planned for the profiles but here’s the publicly accessible link to mine: http://www.google.com/s2/sharing/stuff?user=111714085513520620955.

The weird thing is that my public profile doesn’t have any of my shared Reader items or my custom Google maps. Perhaps that’s just teething problems, as I can’t seem to find anything to make that stuff appear in the profile automatically.

The profile widgets can be embedded into web pages, and here’s how mine looks for the time being:

Anyway, tracking this with interest…

No responses yet

Dec 14 2007

Google 2007 Zeitgeist Report

Published by under Internet

The Google Blog report that the 2007 Zeitgeist report has been released. This shows trends and top searches for Google search terms over the course of the year.

Here are some of the highlights:

Fastest Rising (global)

  1. iphone
  2. badoo
  3. facebook
  4. dailymotion
  5. webkinz
  6. youtube
  7. ebuddy
  8. second life
  9. hi5
  10. club penguin

Fastest Rising (U.S.)

  1. iphone
  2. webkinz
  3. tmz
  4. transformers
  5. youtube
  6. club penguin
  7. myspace
  8. heroes
  9. facebook
  10. anna nicole smith

Fastest Falling (global)

  1. world cup*
  2. mozart
  3. fifa
  4. rebelde*
  5. kazaa
  6. xanga
  7. webdetente
  8. sudoku
  9. shakira
  10. mp3

Who, What, How

No responses yet

Dec 14 2007

New stats package for Flickr Pro

Published by under Internet

Flickr have just released a stats package for Flickr Pro subscribers, and it’s quite awesome. It shows trends of visitors and commenting activity, as well as top photos, and referrers.

I wouldn’t have thought that this photo would have been our top-viewed, but it’s the one we used when we sold that car, so it makes sense.

Here’s a couple of other popular photos…

Deb in Vanuatu:

And the Wagamama in Sydney Airport:

No responses yet

Dec 13 2007

Stuart does not have to say is anymore

Published by under Internet

I have just changed my Facebook status to: ‘Stuart does not have to say “is” anymore’.

That’s right – looks like Facebook have finally listened to the requests of users and have removed the requirement to have to start your status message with the word “is”.

And I’ve just checked Google Reader again and nobody else has mentioned this yet. Could it be that I’m the first blogger to scoop this?

No responses yet

Dec 13 2007

Microsoft bloggers with a sense of humour

Published by under Infrastructure,Internet

I subscribe to lots of blogs written by Microsoft bloggers, and my favourites are from those who aren’t afraid to poke a little fun at themselves and their employer. Here’s a post from The Sean Blog making fun of the fact that when you right click a removable drive in Windows Vista, the kind “Safely remove” and the destructive “Format” commands are 1/8 inch apart. (image leeched below)

These are the bloggers that are helping Microsoft to gain more of a people-friendly reputation, rather than the monopolistic, evil empire that we all love to hate. If you’re a Microsoft blogger, please don’t just regurgitate press-releases and sales pitches – have the guts and sense of humour to poke a bit of fun at yourself sometimes. We’ll like you more for it.

Safe and destructive

No responses yet

Dec 11 2007

Safe computing for your home

Published by under Infrastructure,Internet

On the TV1 Breakfast show this morning, Paul Henry was interviewing Peter Griffin about security software for home computers. In my previous field engineer roles, and my current role as "IT guy" for my extended family, I’ve got a lot of experience setting up and securing home computers as well as small business computers (ones that are not managed by a central server.) I’ve also had a lot of experience fixing computers that have been infected with viruses, trojans and other nasties.

So naturally I have strong opinions on the topic and I tend to disagree on some of the points that Peter was recommending. So here is my advice on securing a home computer running Windows. (See note at the end if you’re running a Mac or Linux.)

Note: This turned into a rather long article – I encourage you to read the whole post, but if you’re in a rush, at least read the summary at the bottom.

Operating System

Starting at the bottom of the stack, if you’re buying a new computer get Windows Vista. I have lots of gripes about Vista, but it is far more secure than Windows XP, and will be supported for the next 5 years. If you’ve already got a computer you should be running Windows XP with service pack 2. If you’re not running service pack 2 on Windows XP, your computer is vulnerable to attacks. If you’re running any operating system prior to Windows XP, such as Windows 2000, Windows ME, Windows 98, etc, your computer is extremely vulnerable and you should probably just upgrade to a new computer running Vista. (Again, see note at the end if you’re running a Mac or Linux.)

You can check your operating system and service pack version by clicking on Start, then Run, and typing: "winver" (without quotes) and pressing enter.

Automatic Updates

Now that we’ve decided on the operating system, you need to make sure that it is kept up to date. This is one of the most important parts of maintaining your computer. As soon as Microsoft release updates to the operating system, hackers start creating malware that targets the vulnerabilities. It’s effectively a race between you and the hackers, which is why I recommend always installing updates as soon as they are released – and rebooting once they are installed.

There is a fear that updates can break your computer if you install them straight away, and there have been some cases in the past where this has been true, but you are far more likely to be infected by a virus by not updating, than you are of having a new update break your computer.

Windows makes it very easy to keep your computer up to date – just go to the Control Panel through the Start Menu, then find the Automatic Updates icon (or Windows Updates icon in Vista) and select "Automatic" which is labelled as the recommended option.

Most other software you install on your computer will also have some mechanism for keeping it up to date. Adobe (Acrobat Reader), Apple (Quicktime, iTunes), Sun (Java) all provide update mechanisms that usually use a scheduled task to check for updates. All of this software is also vulnerable to bugs and attacks so it’s important to let the software notify you when there is an update to install.

This is especially true of your Internet browser of choice. Whether you use Internet Explorer, Firefox, Safari, Opera, etc, it’s important to keep it up date as this is the software that you use the most to interact with the Internet. My personal favourite is Firefox and this is the most secure browser to use in my opinion. Running Internet Explorer on Vista with User Account Control (UAC) enabled has the added benefit of running as a limited user so is also less vulnerable to attack.

Firewall

The single most important security software on a computer is the firewall – in fact, I can’t imagine ever running a home computer without a firewall. If you’re only going to take one piece of advice from this post, then make it the firewall.

If you have Windows XP or Windows Vista then you have a firewall built in, and you need to check that it’s turned on. Head back into the Control Panel, open the Windows Firewall icon, and turn it on. It’s that simple.

More advanced users running Windows XP, should use a third party firewall such as Zone Alarm, as you have more granular control about what comes in and goes out. But for home users not needing to allow any inbound traffic, then the Windows XP firewall is fine.

If you’re running Windows Vista, there’s no need to run any other firewall as the one provided by Vista is superb and has been greatly improved upon since Windows XP. Advanced users on Vista can tweak the firewall to their heart’s content by using the Windows Firewall MMC snap-in which you can get to through the Administrative Tools.

The benefit to using the Windows firewall instead of a third party firewall, is that Microsoft have designed it to hook in to the networking aspects of your computer. So if you enable file and print sharing, then Windows will open the necessary firewall ports.

Antivirus Software

If you’ve followed the previous three steps, then you’re in pretty good shape already. You’re running a supported operating system, your computer software is patched and up to date, and you have a firewall protecting you from network attacks. However, this does not prevent you from downloading a virus from the Internet, or opening a virus-infected attachment from your emails.

This is where antivirus software comes in – it runs in the background on your computer, monitoring all of the activity going on, looking for viruses that it knows about and also looking out any other suspicious behaviour.

There are lots of different antivirus products available today, some free, most of them not. I don’t recommend using the free software to home users, as you have no guarantees that the software will be kept up to date. I also don’t recommend buying ‘suites’ of software – such as the ones from Symantec/Norton, or McAfee. These suites try to take over whole your computer with their own recommended settings, and you get showered with cryptic alerts, slow performance, and unreliable behaviour from your computer.

My current recommendation is to install Trend Micro Internet Security 2008. This is by far the best antivirus software I have used to date, for the following reasons:

  • It’s lightweight and won’t slow down your computer
  • It’s easy to use
  • It’s easy to configure
  • And you aren’t forced into using all of their settings

During installation of the software, you are asked if you want to install the firewall – I always say no, as I’m quite happy with either the Windows XP or Vista firewall. And once the software is installed, step through each section and turn it off – apart from real-time virus monitoring. All you want antivirus software to do, is to protect you against viruses – anything else will just get in your way and annoy you. If you’re using a desktop email client like Outlook, Outlook Express, Windows Mail, Thunderbird, etc, then you also need to select the antivirus option to scan your emails.

Antispyware Software

Antispyware software generally comes in two types – the basic editions require you to run a scan over your computer so that it can find all the nasties, and the more advanced editions run as a service on your computer like the anti-virus software and constantly monitors your system. Most antivirus software products today have at least some basic antispyware functions that can be enabled.

If you’re running Windows Vista, then you already have Windows Defender installed and running and you need to do nothing else. Defender runs in the background monitoring your computer and updates to the software are delivered through Windows Updates.

If you’re running Windows XP, then you can download and install Windows Defender for free, which you can’t go wrong with. More advanced users may want to use several different versions of antispyware software at the same time, tweaking each one to suite their needs, but an average home user will be well protected with Windows Defender.

Phishing Filter

A phishing filter monitors the web sites you visit and looks out for sites that attempt to deceive you into thinking that you are visiting another site. A common example is a site that looks just like your Internet banking site but is actually a site created by hackers to encourage you to give up important financial information like your account names, passwords, pin numbers, etc.

Hackers use clever techniques by crafting web addresses that are long and confusing to tell whether it is a valid address or not. Phishing filters attempt to identify these dodgy addresses and warn you that the site is not legitimate.

Unfortunately, phishing filters are not yet as advanced as antivirus scanners and lots of dodgy sites don’t get picked up. This means you can’t rely solely on the phishing filter as a means of defence. But Internet Explorer 7 and Firefox 2 both have phishing filters built-in and should be enabled for an added layer of defence.

Common Sense and Dancing Pigs

The last layer of defence should be your common sense. Don’t rely purely on the security software on your computer from protecting you. Don’t trust any attachment that is sent to you – even if it comes from someone you don’t know such as friends or family. Don’t forget that if a friend’s computer gets infected with a virus, there is a chance that the virus may email itself to that friend’s entire address book, making it look as if your friend sent you a joke email.

This is where the Dancing Pigs comes in. In computer security circles, dancing pigs refers to how users will always choose dancing pigs over computer security. Bruce Schneier explains the phenomenon as follows:

If J. Random Websurfer clicks on a button that promises dancing pigs on his computer monitor, and instead gets a hortatory message describing the potential dangers of the applet — he’s going to choose dancing pigs over computer security any day. If the computer prompts him with a warning screen like: "The applet DANCING PIGS could contain malicious code that might do permanent damage to your computer, steal your life’s savings, and impair your ability to have children," he’ll click OK without even reading it. Thirty seconds later he won’t even remember that the warning screen even existed.

If this sounds like something that you do on a daily basis – beware. But take heart in the fact that it’s not your own fault – software developers have made us ambivalent towards security messages over the years, as we get so damn many of them – most of which are safe to ignore, most of the time…

A classic example of this is Windows Vista’s new User Account Control (UAC) feature which is enabled by default on Microsoft’s new operating system. The theory behind this is that you are forced to run as a limited-rights user so that you aren’t able to do any accidental damage to your computer (like running dancing pigs applets.) This is a great idea, and is already implemented on both Macs and Linux, but the implementation of UAC was so poor, that from the first time you turn on your computer, you are bombarded with warning messages for even performing the most trivial of tasks. This forces you to become numb to the messages, and you just get into a routine of clicking "yes" for everything that pops up.

Microsoft won’t admit to UAC being a poor implementation, but they are changing the amount of alerts you receive in service pack 1, which is going through testing at the moment. So they must be aware of the problem.

Backups

Although backups aren’t strictly related to computer security, ensuring that have a good backup system could be priceless should your machine get so terribly broken from a virus that it can’t even boot up and needs to be reinstalled.

How many of you have your only copy of your digital photos sitting on the hard drive of your computers? Imagine how you would feel if that hard drive broke, or the contents got erased, or your computer got stolen.

I recommend a three-pronged approach to backing up your important data:

  • Keep your important data cleanly organised  on your computer and set up a backup routine either manually or using software such as the built-in backup software in Windows.
  • Backup all your important files to a separate, external hard drive, or DVDs/CDs, or to another computer or server in your house.
  • Then create another backup of your important files offsite – i.e. not in your house or possibly even your neighbourhood.

The third step seems a bit over the top at first, but keeping a backup of your photos on DVDs is no good if your house burns down or gets flooded. The best way to backup your photos to just upload them to a photo sharing site like Flickr – you get the added bonus of being able to show off your photos to friends and families. And if disaster ever strikes, your photos are preserved online and can be downloaded again in the future. For other important files, there are various online backup companies starting up but prices do vary so it’s worth shopping around.

In Summary

To summarise, here’s a check-list for safe computing:

  • Make sure you’re running a supported operating system. Windows Vista or Windows XP with service pack 2. Nothing earlier.
  • Make sure that your operating system is up to date with Windows Updates, and make sure that all other software is kept up to date too.
  • Use a firewall! The Windows built-in firewall is fine, only use a third party one if you know what you’re doing.
  • Use antivirus software – but don’t let it take over your whole system, this just causes more problems. Disable the bits you don’t want to run.
  • Use antispyware software – Windows Defender is good.
  • Use the phishing filter built into your browser, but don’t depend on it to be 100% accurate.
  • Use your common sense – treat all email attachments with caution.

Apart from purchasing antivirus software (Trend Micro Internet Security 2008 costs about $100), everything mentioned above is already built into your operating system or web browser and costs nothing extra to use.

Using a Mac or Linux

This post has focused on Windows only, but most of the same principals can be applied to either Macs or Linux computers. Historically there have been very few viruses found in the wild for either operating system, but as both Linux and Macs gain in popularity (as they are now) there will no doubt be more hackers targeting them. Don’t sit back and think that you’re secure just because you’re not running Windows.

No responses yet

Nov 28 2007

XeroBank Browser

Published by under Internet

I thought that Xero had released a Firefox extension when this showed up in a search for Xero:

But it’s a version of Firefox with integrated plugins that provide additional security and privacy features.

No responses yet

« Prev - Next »