Archive

Microsoft has announced it is releasing a beta version of Windows XP for AMD's new 64-bit processor. That's both good news and bad news for AMD. The good news is that Microsoft is showing significant support for the new processor by making a version of XP for it. The bad news is that Microsoft won't...

Internet search leaders Overture and Google both are testing services that deliver local results as they seek to bolster the already burgeoning market for Web searches. Earlier this month, Overture became the first major search engine to begin testing a service that incorporates the geographic locat...

Is it an urban myth, or is it really true that NASA sent the first men to the moon with less computing power than what sits inside today's average desktop? The answer largely depends on how you define "computing power." But however you define it, today's typical PC packs more punch than a 1960s main...

OPINION

Linux, Microsoft and the 64-Bit Decade

Linux remains overmatched in the 32-bit world on the desktop. There is just too large a base of Windows users and related applications for Linux to dominate the market in a reasonable period of time. However, transitions breed change, and the industry is about to take a big step into the 64-bit worl...

Beneath all the noise generated by the latest security holes in Microsoft's Windows operating system, experts have warned of two open-source security flaws that could allow intruders to corrupt memory, take control of systems and launch a denial-of-service (DoS) attack. Software affected by the most...

Consternation over VeriSign's plan to redirect mistyped or nonexistent domain name requests has progressed to a call from the International Corporation for Assigned Names and Numbers to suspend the service and a $100 million lawsuit from a company claiming damages from it. VeriSign's new "wildcard" ...

Technology's global impact is hardly limited to Internet communication and speedier business cycles. One uncelebrated truth about the information age is that hundreds of thousands of electronic items are disposed of daily -- and not always properly. Unfortunately, in spite of growing awareness regar...

The Swen computer worm is turning out to be a bigger problem than previously expected, using a brief head start on computer antivirus defenses, as well as complex abilities and an effective masquerade, to infect Windows machines and spread via e-mail to many users. The worm, also known as "Gibe" or ...

Similar to the action toys of two decades ago, prototype ThinkPad notebooks from IBM can be transformed from the traditional notebook form factor to a disconnected desktop with a more comfortable keyboard and separate monitor. While the models, which Big Blue showed off at a trade show this week, ar...

Despite the recent success of computer worms, such as Blaster, that have pounced on newly discovered vulnerabilities, a new threat that looks remarkably like a legitimate security e-mail from Microsoft is using a two-year-old vulnerability to infect thousands of computers. Known as "Swen" or "Gibe,"...

TECHNOLOGY SPECIAL REPORT

The Insider’s Guide to Overclocking

Computer hobbyists for years have tweaked their computers' innards to squeeze out extra bits of performance. Known as overclocking, the practice has long been a holy grail to users who demand maximum performance from their systems. But overclocking a system poses hazards to the hardware, making the ...

At a hearing of the U.S. Senate Commerce Committee yesterday, Big Music squared off with ISPs on a bill that would modify how copyright owners can pursue digital pirates through the courts. The bill would require copyright holders to file a civil lawsuit before obtaining a subpoena to gather persona...

DB2 Holes Offer Root Access

IBM's widely used DB2 database software, which often stores critical data such as credit card information, has flaws that would be "trivial" for attackers to exploit. The holes, uncovered by Core Security, a network security firm, involve simple stack-based buffer overflows and are triggered by send...

The Internet community is failing to see the value of domain giant VeriSign's SiteFinder service, which redirects users to a VeriSign site instead of producing the traditional error message for mistyped or nonexistent Internet addresses. The service, known as "wildcard" functionality, is fouling eff...

Following the same pattern of predictions as the one that led to last month's devastating Blaster worm, security analysts have begun to focus on the new crop of Microsoft Windows vulnerabilities and the attack tools created to take advantage of them -- all of which could indicate that a potential ne...


Technewsworld Channels