When it comes to software piracy, it is hard to find a more complicit, competent, and friendlier ally than Google, assuming you are a pirate. Google owns the popular blogging site “Blogspot.com”. If you want to know how to illegally gain access to software, blogspot is probably one of the premier resources on the internet
The Register today ran a story about the phishing attack spread by the Google Talk instant messaging system, which uses TinyURL to conceal the real name of the link. John Leyden’s story (quoting Graham Cluley at some length) makes several good points about reducing your exposure to the threat, and Graham’s blog makes some more.
An IT/business magazine called Information Age, apparently aimed at executives with interest and responsibilities in IT, hit my letterbox this morning. That’s an actual magazine with real paper pages: remember those? Seeing as it’s Saturday, I took it back to bed with me to look through while I had the first coffee of the day, and
When it comes to computers, there is no such thing as a little bit different. Consider the following. “0010 1111” is how a PC identifies a forward slash “/”. Each one and zero represents a bit. Eight bits, as you may know, is a byte. 0010 1110 is one little bit different from 0010 1111,
En estos días, y luego de las campañas de SEO llevadas adelante por los atacantes, hemos estado observando algunos casos de páginas web que se comportan distinto dependiendo del sitio que los referencie. Este es el caso de algunas páginas que son visualizadas correctamente si se tipea la URL en el navegador pero, si se
I was recently quoted at http://www.internetnews.com/search/article.php/3798021 regarding Google ad words. Actually, ad words matter to advertisers and to some of the bad guys, but I don’t think the average user pays much attention to whether the result is an ad or what the industry calls an “organic” hit, which is anything but organic and is