These look great as part of my Ubuntu desktop.
Author: Ron Shank
Is an Iphone Secure?
One of the things stopping me from getting an Iphone is what appears to be a lack of secure email (at least in my preliminary research). For example, I think an OpenPGP is great and I use it often in thunderbird (more on that here). But If I send a PGP encrypted email to someone who would otherwise be able to open the email with OpenPGP/Enigmail setup on Thunderbird, they won’t be able to read it on thier Iphone.
Any of you have experience with Iphone email security? Please share your thoughts in the comment section.
Video not working with Logitech QuickCam 4000
I wish someone at skype would fix this.
[#SCL-250] Video not working with Logitech QuickCam Connect – DevZone Jira.
If someone knows of a fix, please let me know. Video works everywhere else.
Ubuntu Linux really is a good choice for most computer users.
I had just said this very thing to a guy not 2 hours ago. Ubuntu is perfect for the average person online today.
For example, in a desktop environment in which users just need a simple Web interface, basic word processing and a spreadsheet, an open source package like Ubuntu running Open Office would be perfect. These users don’t need the bells and whistles of a Microsoft Office.
At the other end of the scale, for a SME that is growing and has constantly changing needs – it may need to implement CRM or workflow management and be able to build this up over time or adapt it to enable changes in the business strategy – then open source is absolutely the way to go. Open source allows for rapid change, customisation and greater flexibility.
Trojan Horse SHeur.bzpu is a backdoor trojan
We thought it might be an AVG false positive, but thanks to a helpful comment from Martyn (here) we now know that’s not the case.
SHeur.bzpu is a backdoor trojan
http://www.microsoft.com/security/portal/SearchResults.aspx?query=SHeur.bzpu
Backdoor:Win32/Nuwar.gen!D
Aliases: SHeur.BCFX (AVG)
Description: Backdoor:Win32/Nuwar.gen!D is a generic detection for a backdoor trojan that allows unauthorized access to an infected computer. The trojan receives commands indirectly from a remote attacker via its connection to a malicious peer-to-peer network. This trojan also contains advanced stealth…
Published Date: 06/16/2008
Severity Rating: Medium