- Welcome Guest
- Sign In
Microsoft's .NET Passport, one of the largest online authentication services in operation, has more than 200 million active accounts and handles more than 4 billion authentications per month. As a whole, Microsoft's .NET Passport service is a collection of Internet-based technologies designed to mak...
Sending the unwanted e-mail solicitations known as spam to Californians likely will become a lot more expensive, thanks to a new law that will fine spammers and advertisers as much as $1 million per incident. Described as the toughest law in the country, California's rule has been signed into law by...
Microsoft has announced it is releasing a beta version of Windows XP for AMD's new 64-bit processor. That's both good news and bad news for AMD. The good news is that Microsoft is showing significant support for the new processor by making a version of XP for it. The bad news is that Microsoft won't...
Internet search leaders Overture and Google both are testing services that deliver local results as they seek to bolster the already burgeoning market for Web searches. Earlier this month, Overture became the first major search engine to begin testing a service that incorporates the geographic locat...
Is it an urban myth, or is it really true that NASA sent the first men to the moon with less computing power than what sits inside today's average desktop? The answer largely depends on how you define "computing power." But however you define it, today's typical PC packs more punch than a 1960s main...
Linux remains overmatched in the 32-bit world on the desktop. There is just too large a base of Windows users and related applications for Linux to dominate the market in a reasonable period of time. However, transitions breed change, and the industry is about to take a big step into the 64-bit worl...
Beneath all the noise generated by the latest security holes in Microsoft's Windows operating system, experts have warned of two open-source security flaws that could allow intruders to corrupt memory, take control of systems and launch a denial-of-service (DoS) attack. Software affected by the most...
Consternation over VeriSign's plan to redirect mistyped or nonexistent domain name requests has progressed to a call from the International Corporation for Assigned Names and Numbers to suspend the service and a $100 million lawsuit from a company claiming damages from it. VeriSign's new "wildcard" ...
Technology's global impact is hardly limited to Internet communication and speedier business cycles. One uncelebrated truth about the information age is that hundreds of thousands of electronic items are disposed of daily -- and not always properly. Unfortunately, in spite of growing awareness regar...
The Swen computer worm is turning out to be a bigger problem than previously expected, using a brief head start on computer antivirus defenses, as well as complex abilities and an effective masquerade, to infect Windows machines and spread via e-mail to many users. The worm, also known as "Gibe" or ...
Similar to the action toys of two decades ago, prototype ThinkPad notebooks from IBM can be transformed from the traditional notebook form factor to a disconnected desktop with a more comfortable keyboard and separate monitor. While the models, which Big Blue showed off at a trade show this week, ar...
Despite the recent success of computer worms, such as Blaster, that have pounced on newly discovered vulnerabilities, a new threat that looks remarkably like a legitimate security e-mail from Microsoft is using a two-year-old vulnerability to infect thousands of computers. Known as "Swen" or "Gibe,"...
Computer hobbyists for years have tweaked their computers' innards to squeeze out extra bits of performance. Known as overclocking, the practice has long been a holy grail to users who demand maximum performance from their systems. But overclocking a system poses hazards to the hardware, making the ...
At a hearing of the U.S. Senate Commerce Committee yesterday, Big Music squared off with ISPs on a bill that would modify how copyright owners can pursue digital pirates through the courts. The bill would require copyright holders to file a civil lawsuit before obtaining a subpoena to gather persona...