Contents Pages by Subject

Technology: Software

Subject Photo
Article Image

InfoWars.com

THE USA GOVERNMENT'S cryptologic organisation, the National Security Agency, has admitted that it is behind some of the security changes to Microsoft's operating system Vista.

Article Image

ScientificAmerican.com

While everyone was busy crapping on the late and over-hyped Windows Vista (it didn't break down during the demonstration, thankfully) Microsoft was busy invading your living room, and it's a two-pronged attack:

Article Image

CNet News

Anyone who hates Microsoft has been lapping up the news that the company sent fancy-schamncy Acer Ferrari laptops preloaded with Windows Vista to about 90 bloggers. The story began surfacing last week.

Article Image

PC World

Technical Mujahid, a 64-page electronic magazine, began circulating last week on jihadist discussion forums. The purpose is "to help prevent acts of aggression against Muslims [in cyberspace], and to assist the mujahideen in their efforts,"

Article Image

Washington Post

A hacker who as a teen cracked the encryption on DVDs has found a way to unlock the code that prevents iPod users from playing songs from download music stores other than Apple Computer Inc.'s iTunes, his company said.

Article Image

New York Times

A consortium of major universities, using Homeland Security Department money, is developing software that would let the government monitor negative opinions of the United States or its leaders in newspapers and other publications overseas.

Article Image

PC magazine

McAfee, Symantec and other security software companies argue Microsoft's new Vista operating system will make it more difficult to protect customers because for the first time, they have been denied access to the core of the operating system.

Article Image

Network World

Governments seeking inexpensive technology to warn of tsunamis could be interested in a free software application that monitors vibrations in the hard disks of computers in an attempt to detect the undersea earthquakes that cause tsunamis.

Article Image

Hacker proves Vista can be intercepted

In spite of claims by Microsoft Corp. that its forthcoming Windows Vista is a secure version, a researcher at the Black Hat hacker conference last week demonstrated how the system can be hacked.

Article Image

PC World

Nuance Communications says the latest version of its speech-recognition software can achieve--with some speakers--99% accuracy out of the box, without a "training" session to familiarize the software with how a particular person talks. It w

Article Image

Reuters

New York Attorney General Eliot Spitzer, who last year struck a settlement with America Online regarding its customer service policies, will meet with AOL to discuss if the Internet services giant still blocks customers from canceling their accounts.

Article Image

PC magazine

Robotics has captured the minds and imagination of those inside and outside the technology market, but as a market unto itself, robotics can barely get its act together. Microsoft announced a set of development tools to help this market.

Article Image

LiveScience.com

Hyperactive Bob, the kitchen production management computer system from Hyperactive Technologies, is now being licensed to Zaxby's, a fast-food restaurant chain. This artificially intelligent computer system gives orders to employees

Article Image

PC magazine

Yahoo! Answers, an online community where people can ask and answer questions on any topic, has kicked off an "Ask the Planet" campaign to herald the service's graduation from beta testing.

Article Image

TG Daily

Google released an updated version of its Google Earth satellite imagery application. The company says that more than 20 percent of the landmass of the entire globe is now covered with high-resolution satellite imagery, allowing about one third of th

Article Image

Associated Press

Before 1979, when Bricklin released the first spreadsheet, known as VisiCalc, personal computers still mainly were programming toys for hobbyists. VisiCalc changed that. By allowing businesses and households to automate their financial management

Article Image

Associated press

Symantec Corp.'s leading antivirus software suffers from a flaw that lets hackers seize control of computers to steal sensitive data, delete files, or implant malicious programs, researchers said. Symantec said it was investigating the issue,

Article Image

UPI

The International Data Corp. says that, despite court battles in the United States between the SCO Group and major Unix users, Chinese banks and industry are rapidly replacing SCO Unix installations with Linux, Shenzhen Daily reported Thursday.

Article Image

Associated Press

A corporate-backed watchdog group that monitors software for deceptive and abusive practices named a widely used file-sharing program, Kazaa, and 3 other applications as violators of its guidelines.

Article Image

eWeek

"Share Across Computers" feature stores Web browsing history, Microsoft Office documents, PDF and text files on Google's servers to allow a user to run remote searches from multiple computers and presents a lucrative target to malicious

Article Image

Associated Press

Google Inc. and eBay Inc.'s Skype are investing in a startup that plans to help hotspot owners charge for Wi-Fi access, a plan that could face significant opposition from Internet service providers.