Sunday, November 29, 2009

Roll Your Own TV Guide With FreeGuide



There are plenty of online TV listing services that detail what programs are showing in your area. Then again, you probably don't care what's on every single channel. Create a personalized TV guide with FreeGuide and skip The Flossing Network.
FreeGuide grabs data on only the channels you're interested in and displays them in a list or grid format. You enter your region, ZIP code, and time zone while setting up the software, as well as whether you'll be using a free or paid channel listing guide, and FreeGuide sets up your personalized listing window. You can search for shows by channel, time, title, or sub-title, and highlight favorites so you can find them quickly in listings in the future.
FreeGuide is available as a free download for Windows, Mac OS X, and Linux. It requires at least the Java 2 Runtime Environment v1.6 or higher to work, and Mac users will also need to grab XMLTV

FreeGuide

The Mac Lover's Bedroom



Putting your workspace in your bedroom is a gamble. Do it poorly and you invite a clutter magnet into your sleeping space. Do it well, and you can put your bedroom's extra space to stylish, productive use.
Today's featured workspace pulls off the office-as-bedroom tact without introducing clutter or bulk into the bedroom. Tucked neatly in the corner and with dual monitors to boot, reader ryopang can get work done in style in his bedroom office. You can click on the picture above for a closer look or the pictures in the gallery below.



Tuesday, November 24, 2009

iTiVo Downloads Shows to Your Mac for On-the-Go Viewing



Mac OS X: If you like to watch shows from your TiVo with a handheld device—like an iPhone or PSP—when you're on the go, free, open-source application iTiVo converts them to a portable format with a few simple clicks.
iTiVo connects over your wireless network to your Series 2, Series, 3, or TiVoHD DVR and collects information on shows stored on the device's hard drive. iTiVo will let you know what non-copyrighted shows can be transfered to your Mac, along with episode and files-size information. Queue up the items you want to transfer, and iTiVo takes care of the rest.
This free, open source application converts shows to MPEG-2, MPEG-1, H.264, or decrypt-only, so you can play them right on your iPhone, iPod, or PSP. You can even plunk the files onto your Apple TV, Xbox 360, or Playstation 3.
You can schedule iTiVo to perform regular downloads, and likewise schedule it to perform an iTunes sync with a connected device. The tool also has optional commercial removal and supports subtitles for closed captioning data, so if you're a Mac user with a TiVo, downloading this one is a no-brainer.

The Lightsaber and LEDs Workspace



What has three screens, a couple test servers, and a lightsaber? Possibly a remote rebel-sponsored code farm, but also today's featured workspace.
Lifehacker reader cGarst has put together a simple and uncluttered workspace for himself. A combination of dark colors—green on the walls and black for the work surface, chair, and file cabinet—combined with downlighting provided by some inexpensive IKEA LED pucks makes for a dramatic workspace.
You can click on the photo above or this one below to get a closer look. If you want additional information about things in the picture check out the photo notes on his Flickr stream at the link below

If you have a workspace of your own to show off, throw the pictures on your Flickr account and add it to the Lifehacker Workspace Show and Tell Pool. Include some details about your setup and why it works for you, and you just might see it featured on the front page of Lifehacker.



Remains of the Day: The Declaration of Google Wave Edition

The Declaration of Independence hits Google Wave, Firefox CPU problems are causing some laptops heating issues, and a brilliant little application may someday your webcam into an impressive 3D scanner.

Diagnose and Protect Your iPhone from Worms

There's been a lot of talk about malicious software on jailbroken iPhones lately, but if you haven't been paying close attention, tech site Network World has a breakdown of the worms running wild and how to eradicate them from your device.
As of right now, there are a total of three known iPhone worms, some more harmful than others. You're only vulnerable if you've jailbroken your iPhone and enabled SSH without changing the default password, though, so if you're still running on factory settings, fear not. If you do fall into the jailbreaker crowd, though, read on to make sure you're not infected, and then scroll to the bottom for steps on how to re-secure your device.
The first worm is the Ikee worm, which merely changes your wallpaper to a picture of Rick Astley (of Rickroll-meme fame). If you're familiar with Rickrolling, you may proceed to feel embarrassed. It's pretty easy to tell if you have this worm, unless your wallpaper was already a picture of Rick Astley, in which case check the top of the wallpaper, which, if installed by the worm, says "Ikee is never going to give you up."
The other two worms (the first called iPhone/Privacy.A and the second being unnamed at the moment) are more dangerous, as they collect personal information from your iPhone. If you have the second, unnamed worm, it will direct Dutch bank customers to a fake phishing site in hopes of collecting your bank information. An infection of the unnamed worm exhibits low battery life as a symptom, as it's running a background process to spread itself to other iPhones via WiFi. It also changes your default SSH password to keep you from easily deleting it.
The iPhone/Privacy.A worm is harder to detect, as it doesn't leave anything on the iPhone itself—it uses computers to steal information from iPhones connected to nearby wireless networks. You should, however, have no problem identifying if it's made its way to your computer as long as you have antivirus software (and yes, you're vulnerable even if you're running OS X or Linux, so pick up some antivirus software to make sure you aren't spreading this stuff around!).
If you think you may be infected, hit the link to get directions on how to remove them from your device. Also, whether you have a worm or not, make sure you protect yourself by changing your iPhone's default root password. It also might be a good idea to install SBSettings from Cydia so you can turn SSH off when you don't need it—no sense in having your iPhone more vulnerable than it needs to be.

Sending Mass Emails Using Gmail? Don’t Get Locked

The holiday season is near and you want to send personalized email greetings to all your friends, family members and customers using the standard Gmail (or Google Apps with Gmail) service.

How to Send Bulk Emails using Gmail

Since the web interface of Gmail doesn’t support personalized emails, you should connect your Gmail account with Microsoft Outlook (via POP3 or IMAP) and also import the Gmail address book into your Outlook Contacts.
Now you can use the mail merge feature of Outlook to send personalized messages to every single Gmail contact from the desktop.
This may sound like an easy plan but there’re strict sending limits and, if you aren’t careful, Google may even block your Gmail account temporarily for up to 24 hours and you’ll neither be able to send nor receive any emails during that lock-out period.

Email Sending Limits in Google Apps

If you are using Gmail with Google Apps, you cannot send messages to more than 500 unique email addresses per day.
For instance, if you send one email to Person A and another one is addressed to Person B and C, you have already exhausted three slots (out of 500) even though only two messages left your Inbox.

Email Sending Limits for Gmail users

If you want to send bulk mails using a regular Gmail account, the rules are similar.
You can only send out emails to a maximum of 500 recipients during a 24 hour* period but if you are using a desktop client (like Outlook), that limit is reduced to 100 messages in a day.
[*] The Gmail help site mentions this limit as 500 recipients per message but a Google employee on the Gmail support site has confirmed that this cap is not just per message but per day.
Workarounds for sending mass emails
With all these limitations in place, Gmail is obviously not the best option for reaching out to a very large customer base. However, if you have no other option, it may be a good idea to plan well in advance.
For Gmail: Distribute the mail merge process over 2-3 days so that you never exceed that 100 messages per day quota.
For Google Apps:  You can either upgrade to a Premier edition or create multiple accounts in Google Apps as each will have its own 500-recipients limit.

[brainw4re]

The First Desktop Application to have AdSense Ads is Google Earth

Google Earth is probably the first and only desktop application to have AdSense Ads. These ads are is now showing in at least two different places inside the application:
Figure A: When you search for a location or business, the ads are displayed in the search results itself.

Figure B: When you click a placemark (any red pin on the map), the ads are displayed next to the review /address of that location


Google makes an exception
I find this interesting because Google policies strictly don’t allow software developers to integrate AdSense ads in their desktop applications. If that policy changes, we could see more and more of Office 2010 Starter or FeedDemon like applications that are completely free to the end-user but supported by web advertising.

[brainw4re]

An Image Editor and Screen Capturing Tool for your USB Drive



PicPick is an useful Windows utility that includes a decent screen capture program, a Paint like image editing software and a whiteboard tool to help you draw freehand on the desktop using your mouse (handy when you are giving presentations).
During screen capture, you can select the "Capture Window Control" mode and capture objects that extend multiple screens (like a long Word document or a lengthy web page). And like SnagIt, PicPick can send screenshot images directly to another programs after capture or it can automatically upload them to an FTP server.

Portable Image Editor



The image editor included with PicPick sports an Office 2007/2010 like ribbon interface and supports tabs so you can edit multiple screenshot images / photographs from the same window.
If you are a web designer, you can use the built-in crosshair tool to determine the coordinates of any point on the desktop screen or for capturing the exact dimensions of an object (in pixels).
And since the software doesn’t require installation, you can put it on a USB drive and use it on any computer.

Write Your Own eBooks in the Browser with Acrobat.com

If you looking for an online service that will let you write and publish your own ebook in a format that is compatible with most ebook readers (including Sony Reader, Nook and Amazon’s Kindle), check out Adobe Buzzword at the new Acrobat.com.

Adobe Buzzword, if you are new, is an online word processor (like Google Docs but "more beautiful") that you may use to create and edit documents in any web browser. The service supports collaborative editing so multiple authors can work simultaneously on the same document from their respective location.
Now if you are looking to write an ebook in the browser, Buzzword can be a great choice as the service can export documents directly as EPUB files, a format that is supported by all popular ebook readers including apps like Stanza that let you read ebook on a mobile. Simply compose a document inside Buzzword, export it as an ePUB file and then import it in your ebook reader.
Other than creating new ebooks from scratch, you may also use the Buzzword application to convert your existing Word (.doc and .doc), or Open Office (.odt) documents into the ePUB format without requiring any desktop applications.

[brainw4re]

Create Screencasts in Linux with Screenr

Screenr, which is probably the best web-based screencasting application, can now be used for recording screencast videos in Linux as well in addition to Windows and Mac machines.
Video: Screenr running on 32-bit Ubuntu Linux

With Screenr, you can create HD-quality screencasts of up to 5 minutes in length using any web browser that has the Java plug-in installed. The published screencast is available as a Flash video (for embedding in web pages) and as a Quicktime (MP4) movie so anyone catch watch your screencasts on mobile devices like the iPhone.
The only downside is that everything you record with Screenr becomes available in public by default and there’s no option to create private or password-protected screencast videos.

Run Classic DOS Games on any Computer



If your computer is running a fairly new operating systems, such as Windows XP, Vista or even Mac OS X, chances are that it won’t be able to play any of the old DOS games that were originally designed for 16-bit systems.
There are however simple workarounds that will help you play your favorite DOS games on any modern computer just the way they worked on old 486 machines of the 90’s. The other good part is that you can download most popular DOS games from the web for free and legally.

Play Old DOS Games on your Computer

The easiest way to run DOS games on your computer is through DOSBox.

 DOSBox, in simple English, is a free program that emulates an X86 based DOS environment on your new computer including speaker sounds, video graphics and other hardware. DOSBox is available for Windows, Linux and Mac OS X so you can practically use it to run DOS games on practically every computer.

You can simply install DOSBox via the command line but if that sounds too technical, there are graphical frontends for DOSBox that will let you run DOS programs through a simple GUI.

One of the most popular GUI frontends for DOSBox is D-Fend Reloaded. You can install this program like any other Windows application and it is ready for use immediately after the installation. To install a DOS game, simply use the import wizard or drag-and-drop the zip archive file (that contains the DOS program) into the D-Fend Reloaded window.

D-Fend Reloaded also offers game packages, containing both freeware and shareware DOS games, that you may install on your computer at once using a simple installer. You can play these classic games using DOSBox without having to configure anything.

Build an MS-DOS Virtual Machine for Playing Games
 If the requirements are such that DOSBox emulators are unable to run your favorite DOS game, you can try running DOS inside a virtual machine using virtualization software like Windows Virtual PC, VMWare Player, or VirtualBox from Sun – they are all free solutions.

Microsoft offers a free copy of MS-DOS operating system that you may convert into a virtual machine or you can download the FreeDOS program from the Internet which is just like MS-DOS and completely free.

Once you have a virtual machine running DOS, you need a way to install DOS programs into the virtual machine. This can be done by burning a CD image of the DOS games and then attaching that CD image to the virtual machine.

Play DOS Games Online in the Browser
The installers for DOS games were initially distributed on floppy disks and the game authors may have never envisioned that people would be playing these games though the Internet without installation but that is exactly what you can do today.

JPC is a Java-based x86 emulator that can run some DOS programs on any modern browser with the Java plugin.  The JPC site hosts a couple of popular DOS games including DOOM and Mario Brothers but for a more extensive collection, you should check out Classic DOS Games. The sites currently has 169 different games that you can play directly in any web browser that has the Java plugin installed.

JPC based DOS games may not run as fast as their DOSBox counterparts but there’s one advantage – you can try a game online before deciding if you want to download a copy to your hard drive.

Download DOS Games from the Internet
Now that you have everything in place to run DOS games on the computer, you are most definitely looking for some great games to play with.

Here are some popular sites where you can find and download most of your favorite DOS games, but since too many choices can be confusing, check this search engine that will help you search all the popular PC games’ websites from one place.

1. DOS Games – With over 500 classic titles, DOSGames.com is a great place to look for your favorite DOS games. You can run these games using the free DOSBox emulator discussed above. The site is actively updated so it is likely that more games will be added over time.

2. DOS Games Archive – DOS Games Archive is another useful site with a very large collection of DOS games. The sites provides screenshots of the DOS games, user ratings, violence ratings, cheat codes and you can also find out if a particular game is supported on DOSBox. Many of the games listed on the site were commercial games that were later released for free by the game publisher.

3. D-Fend Game Packages – If you chose to install D-Fend Reloaded with DOSBox, then you can easily access hundreds of classic DOS games using this easy installer. Each game package contains a collection of about a dozen or so games of the same category and you can have them all on your machine with a click.

4. Classic DOS Games – This site also contains a wide range of DOS games categorized by their Genre, Company, Year Released, etc.  All DOS games listed on this site are freely distributable because they are shareware, freeware, or because the copyright holder has officially and legally released all rights to the public domain.

5. Good Old Games – This site specializes at re-releasing classic commercial games for modern PCs at reasonable prices.  Their selection includes many popular DOS-based games that are packaged with DOSBox for a seamless game experience on Windows Vista and XP.  If your looking for a commercial game that has not been released as freeware, this may be the best place to look for it.

6. Abandonia – As the title suggests, this site has a very collection of games that are under the category of “abandonware” or titles that are no longer sold /developed by the authors.

7. Home of the Underdogs – One of the most popular abandonware sites with reviews of over 5,300 games for DOS and Windows. Other than game binaries, the sites also offers manuals for a number of games that are no longer commercially available.

For offline reference, you may download this catalog of DOS games from Wikipedia that possibly includes every DOS title that has been released till date.

Sunday, November 22, 2009

Build Your Own 3D Camera Rig with Two Hacked Canon Cameras


You don't need to spend a mint on the new 3D-capable camera from Fuji. You can throw two basic Canon point-and-shoot cameras together with $20 worth of parts and make your own for 3D fun.

You'll need a pair of matching Canon PowerShot cameras that have modified firmware—the CHDK (Canon Hack Development Kit) we shared with you last year. You need two cameras in order to simulate the view from the left and right eye.

In addition to the two cameras you'll need about $20 worth of hardware that includes a simple bracket made with basic hardware store parts and a USB trigger button with dual outputs. The USB trigger will take a tiny bit of electronics know-how but if you can wire a lamp you can turn an Altoids tin and a simple circuit board into a dual-trigger for your 3D camera rig.

Once you've got the camera and trigger assembled you're in business on the taking-the-pictures side of things. On the post-processing side of things you'll need to offset the image with proper coloration for 3D glasses—the most popular tool is a free application called StereoPhoto Maker. Using StereoPhoto Maker you can combine and tweak your images for maximum 3D effect. Check out the full tutorial at MaximumPC for a detailed build guide and lots of photos.

How to Build Your Own 3D Camera Rig for Under $20

[brainw4re]

Thursday, November 19, 2009

iTablet Gains OLED Display, Delayed Until Late 2010



If an unannounced product exists solely in the minds of speculative journalists and know-nothing analysts, can it be “delayed”? If so, then the fabled Apple tablet has just seen a setback to its non-existent launch date, pushing it to the second half of 2010.
The source? Component manufacturers for the iTablet, who, according to Digitimes, say that Apple has changed its mind on the product range (partway through production, it would seem) and decided to confuse customers with a split product launch.
Instead of the usual Apple strategy of launching one product, letting it run for a few years, and only then adding more lines (think iPod, which was on sale for two years before the Mini joined it, and iPhone, which is still the only iPhone), Digitimes’ sources claim that there will be two tablets at launch. One with a TFT screen will measure 10.6-inches and one with an OLED screen will measure 9.7-inches.
The sources have even worked out the prices of the tablets. Going on current prices of OLED screens and the percentage of the product budget they normally occupy, the price is estimated to be between $1,500 and $1,700. That’s not the sale price but the cost. Add a conservative 30 percent on top  of that for Apple’s famously fat profit margins and you get to around $2,200. That’s almost as much as the 17-inch MacBook Pro.
Due to the imaginary delay, these prices are expected to drop to a more reasonable $1,200-1,500 by launch, as the prices of OLED screens drop. Digitimes also points out that “The price could be more flexible if bundled with telecom providers’ 3G services.” Extrapolating from the iPhone, which costs AT&T around $600 and sells for $200 on a two-year contract, the iTablet would need a four-year contract to bring it into the necessary price range between the iPhone and the MacBook, around $700.
Why would Apple, a company famous for its pared down, easy-to-understand product lineup, introduce two models of a new device not only almost exactly the same size, but with confusing differences in screen technology? And why would it sabotage the recent and aggressive price cutting across all product lines by launching a big iPhone at a price higher than many of its pro-level notebooks?
This is a truly bewildering story. One day, we will see an Apple Tablet, I’m sure. But until it is officially announced, the only place to get one will be in the Atlantis Apple Store, which is staffed by unicorns.
Apple tablet PC reportedly delayed until 2H10, with OLED model now included

[brainw4re]

Would You Buy a Data-Only Cellphone?

There's an eyebrow-raising rumor that Google's toying with a cellphone that could work on any data network and make phone calls through its Gizmo5/Google Voice package. Are you ready to leave standard voice channels behind for the wireless data frontier?

There are a handful of clues that, strung together, seem to point toward Google offering its own phone-like VoIP services. The Google Voice project and its Gizmo5 acquisition, the Android phone OS, of course, and a deal that lets them re-sell wireless data. Then again, regardless of whether Google's ready to jump in, some phone provider could, at some point, make this kind of offer—unlimited domestic voice calling, cheap international calls, and a data-friendly a phone that works with any data contract.

If Google or some other firm offered a (presumably) subsidized, affordable phone with an internet calling package and any data package you want, would you nibble? Or is the difference between data and voice coverage big enough to enjoy having a backup?

[brainw4re]

ECOBOT Tracks Your Carbon Footprint


Mac: Wondering what kind of impact your power and fuel consumption have on the environment? ECOBOT helps you figure it out.
ECOBOT is a free, open-source application that calculates how much fuel, paper, and power you use during the course of a day to help keep you aware of how you can reduce your carbon footprint. The app tracks wireless networks you access to learn how much you're traveling, and logs how much paper you use whenever you use your printer. ECOBOT also automatically calculates how much energy your computer uses, and you can manually add other appliances like video games and televisions.
ECOBOT runs on Adobe AIR but, strangely enough, can only be used on a Mac right now. Developers say a PC version will probably be developed "soon."
Got a favorite tip for keeping your energy consumption in check? Let's hear it in the comments.


[brainw4re]

Wednesday, November 18, 2009

Microsoft Office 2010 Beta Now Available for Download

You’ve seen all the new features of Office 2010 and now its time to try them on your own computer.
The first public beta of Microsoft Office 2010 is now available as a free download on microsoft.com/office. And other then Office, you can also download Visio 2010 beta and Project 2010 beta for your Windows computer.



This is the Microsoft Office Professional Plus 2010 edition so you get to experience Publisher and Infopath 2010 as well in addition to the regular Word, Excel, PowerPoint, OneNote and Outlook applications.
The Office installer weighs around 700 MB in size but you need around 3 GB of free space on your hard drive for the installation.
You can either upgrade your current version of Microsoft Office to Office 2010 Beta or select the Customize option during installation and set your current version of Microsoft Office to coexist with Office 2010 Beta.
All products require online activation after installation. In case of Office 2010, you can enter the serial number inside Word 2010 and it will automatically activate all other Office applications. Project and Visio will require separate activation since they use a different set of keys.
The beta version of Office 2010 will expire in October 2010. And other than English, Office 2010 is available for download in Chinese, French, German, Japanese, Russian and Spanish.

Growl for Windows Updates to 2.0


 
Windows only: Open source notification system Growl for Windows has finally hit the 2.0 milestone, and with it comes a ton of new features that let you further customize the way you receive your pop-in corner notices.
Among the new features are images in notifications, playing sounds when notifications are received, keyboard shortcuts, history, and notification summaries. There is also support for pushing notifications to iPhone, email, and Twitter, as well as pulling notifications from other machines on your network (whether they are PCs or Macs). There are more applications that can integrate with Growl for Windows, with more being added all the time, so the real benefits of this upgrade depend on the enthusiasm of developers.
Growl for Windows is a free download, Windows only.

[brainw4re]

Tuesday, November 17, 2009

How to Connect Two Computers Without a Router

Let’s assume you have two computers at home and you want to connect them together so that you can easily share an internet connection between the two machines or transfer photos, music and other files from one computer to another. How do you do this?
Connect Two Computers Directly

There are two options – you can either buy a router or, if you are looking for something more simple and don’t want to spend money on new networking hardware, you can connect the two computers using a commonly-available cable. The latter method doesn’t involve any complicated network settings and you will still be able to share files, internet connection, and even printers between computers.

Things you need:

To set up this basic wired home network, all you need is an inexpensive Ethernet crossover cable and the other requirement is that network cards* (also known as LAN or Ethernet cards) should be installed on each of you computers.

[*] This should not be an issue because network cards are available on most newer machines by default but if you are working with a very old computer, you can either attach an internal LAN card to your computer’s motherboard or go for a USB Network adapter that will turn a USB port into an Ethernet (RJ45) port.

An Ethernet crossover cable looks like a standard Ethernet cable but the internal wiring is a little different. You can purchase crossover cables at Amazon.com or from your local computer store. If you have trouble finding them, you can purchase an inexpensive crossover adaptor and that will let you use any standard Ethernet cable as a crossover cable.
Connect Computers with an Ethernet Crossover Cable

Before connecting the two computers with a physical cable, make sure that both machine are using the same workgroup*. Here is step-by-step guide that explains how you can change the workgroup of your computers.

Changing workgroup in Windows XP – From the Start menu, right-click “My Computer.” Select Properties in the drop-down menu, and then select the second tab that says “Computer Name” from the System Properties window. Now click the “Change…” button, enter a unique Workgroup name and reboot your computer.

 

Changing workgroup in Windows 7 or Vista – Open the Control Panel, type “Workgroup” in the search box, and select the entry that says “Change Workgroup Name.” Click the “Change…” button, enter a Workgroup name and restart the computer. Windows 7 users can skip one step; simply type “Workgroup” in the search box in the start menu, and select the first entry, then proceed as above.

 

Now that the workgroups are same for both computers, connect the two computers together using the Ethernet crossover cable. Simply plug-in one end of the crossover cable into the network adapter of Computer A and connect the other end of the cable to the network adapter of Computer B.

Windows will automatically recognize the new network, and you can now easily view files and folder that the other computer has shared. Simply open Networks from the Start Menu (or the Control Panel), and you should see the other computer by its name. You can then browse any shared files on the other computer, and can even utilize shared printers.

Troubleshooting – If you do not see the other computer under Networks, you probably have a prompt at the top of your Network window saying that Network discovery is turned off (screenshots below). Select “Turn on Network Discovery and File Sharing.”  In the next prompt, select “No, make the network I am connected to a private network.”  Now you should see the other computer on the home network.

[*] While it is possible to share files between two computers connected with a crossover cable without making them part of the same workgroup, the method will only work if both computers have this network set as a private network, and may still cause problems. It is therefore advisable to have both computers on the same workgroup before sharing files and printers.
Share an Internet Connection Between Two Computers

There are scenarios where you may want to share the same internet connection between two computers. For instance:

Situation A - You have setup a Wi-Fi network at home but your old desktop computer doesn’t have a wireless network card. In that case, you can use the laptop to connect to the internet wirelessly and then share that same connection with the desktop over a crossover Ethernet cable.

Situation B – You have a netbook with a built-in cellular data connection. You can share that connection with any another computer at home through the crossover Ethernet cable.

Situation C – You use a (slow) Wireless USB modem with your laptop computer while your desktop is connected to an ADSL Broadband line and there’s no router at home. For any bandwidth intensive tasks, like when you want to backup photos from your laptop to an online service, you can connect the laptop to the desktop and things will happen much faster.

OK, let’s look at the steps required for sharing an Internet connection.

First, if you only wish to share internet connection and not files, both computers need not belong to the same workgroup. All you need to do is to connect the two computers with the Ethernet crossover cable, and then turn on Internet connection sharing in the computer that already has an Internet connection. The instructions vary for different versions of Windows:

For Windows XP – Select “Network and Internet Connections” from the Control Panel and click “Network Connections.”


Right-click on the network connection you wish to share (the one connected to the internet), select Properties, click on the “Advanced” tab, and then check the box that says “Allow other network users to connect through this computer’s Internet connection.”  Click OK, and the second computer that you have connected to this computer with the Crossover Cable should have internet access now.

For Windows 7 and Vista – Open Control Panel, enter “network connections” in the search box on the top right and select “View Network Connections.”


Right-click on the network connection you wish to share (this must be the one connected to the internet) and select Properties. Select the "Sharing" tab and then check the option that says “Allow other network users to connect through this computer’s Internet connection.” Click OK, and the other computer you have connected to this Windows 7 or Vista computer should have internet access now.

[brainw4re]

MyPorts Gives You Detailed Information on Open Ports


Windows only: We've talked about ways to portscan your computer before, but if you're looking for a simpler solution to secure your connection, free utility MyPorts shows you what open ports are being actively used and which may be unnecessary.

Generally, open ports can be pretty easily associated with a specific program or running process that is connecting to the internet, such as your browser, IM client, or mail client. When these programs close, so do the ports. However, if some ports are open and have no purpose at that moment, they can be a security risk. MyPorts helps you check whether there are any unnecessarily open ports that could be used by malicious users.

At startup, the program gives you a list of all open ports on your computer, along with detailed information about each port, such as its state, local and remote IP address, local and remote port number, and the application currently using it. Most are fairly straightforward—the port will say it is in use by iTunes, Thunderbird, or some other running application. Others are less obvious—they may be in use by Windows or some other background service, and if you're having problems (or are just suspicious about your security at that moment), you may want to do some research and find out which of these are actually necessary to have open.

Of course, this program is also useful if you're having trouble with certain programs connecting. If you have an especially slow BitTorrent connection, for example, you can always check what port you're using and look to see if it comes up in MyPorts

MyPorts is a free download, Windows only.
MyPorts




[brainw4re]

Adobe Flash 10.1 Beta Brings Hardware Acceleration to Web Videos [Downloads]



Windows/Mac/Linux: Adobe is offering up a "prerelease" of its inescapable Flash software, adding in GPU acceleration for H.264 video in Windows, multi-touch support, and bug fixes. Anyone with Adobe AIR apps can also grab a 2.0 prerelease of that platform.
Yes, you read right—only Windows gets the graphics-card-powered HD acceleration for now. Even though that matches up nicely with YouTube's expected 1080p HD roll-out, it's a shame that Mac and Linux users get left out in the wilds of jerky video. All platforms get support for multi-touch, however, and tweaks that presumably make Flash a tad bit less of a resource hog.
Adobe AIR 2.0 beta, meanwhile, adds in a whole bunch of native computer functionality, including USB access, better networking compatibility, the ability to open a link or file with its native application (making awkward TweetDeck hacks less necessary), and a faster native WebKit browser, among other improvements.
Both Flash 10.1 prerelease and AIR 2.0 beta are free downloads for Windows, Mac, and Linux systems. Tell us what you're seeing improved, or broken, by the new releases in the comments.
Flash Player 10.1 [Adobe Labs]

[brainw4re]

Sunday, November 15, 2009

Vitamin D Turns Your Web Cam into a Security Camera


 
If you've been thinking about setting up a web surveillance camera but were put off by the expense or hassle, Vitamin D makes it easy to turn your web or networked camera into an easy-to-use monitoring tool.
One of the downsides to many camera monitoring applications available in the same price range as Vitamin D—free!—is that their detection algorithms are too primitive and overly sensitive. You don't need a notification image sent to your cellphone every time the wind blows or a squirrel runs across your front lawn.
Vitamin D allows you to specify the size of objects that will trigger events and set up detection windows to only monitor activity in specified areas of the video frame. Using a simple wizard-style selection process, you can give a set of instructions to Vitamin D, like wanting a door to be monitored for people leaving, or a parking lot to be monitored for vehicles arriving.

Vitamin D supports email and cellphone notifications and has a "highlights reel" function to allow you to quickly review the activity triggers from the day. Vitamin D is free and available for Windows and Mac operating systems. Have a favorite tool for monitoring activity with your web cam? Let's hear about it in the comments.
 

Replace Your Mac Mini's IR Receiver for Non-Apple Remotes



If you're using a Mac Mini as a media center and want to use a non-Apple remote control with it, this tutorial can help you keep your Mini's sleek form factor and avoid ugly IR receiver dongles.
This hack involves a tiny bit of soldering and a very small modification to the metal shielding on the inside of your Mini. Other than that, it's extremely simple to perform this tweak, and well within the realm of an electronics beginner.
When you're done with the mod, you'll be able to use remotes besides the Apple remote—the modder who created the tutorial preferred using a Microsoft Media Center remote. Have a media center hack to share?

Replace the IR Unit on a Mac Mini

[brainw4re]

Celestia Brings Interstellar Exploration to Your Desktop



If you enjoyed playing with Stellarium, the open-source planetarium software we shared with you earlier this year, but felt strangely tied to an earth-bound perspective, you'll definitely want to fly through space with Celestia.
Celestia picks up where Stellarium leaves off. With Celestia you can zoom through the known universe, flying through star clusters and swooping in to examine far off galaxies. On its own Celestia is a really fun tool to play with but on top of the expansive star map included in Celestia there is a bustling community of astronomy hobbyists creating hundreds of add-ons for the application.
You can get add-ons for everything, from detailed maps of galaxies to extremely detailed surface maps of planets which allow you to zoom down onto the surface and get a closer look. You can even find fictional star maps and objects. In other words, if you've ever wanted to fly through the space of the Star Wars universe, this is your chance. Check out the available add-ons at The Celestia Motherlode and read up on how to use add-ons with this handy guide.
Celestia is open-source and available for Windows, Mac, and Linux operating systems. You can find a portable version for Windows here. Have some experience with Celestia? Have a favorite add-on to share? Let's hear about it in the comments.


[brainw4re]

Saturday, November 14, 2009

This Week's Most Popular Posts


This week we taught you how to get started teaching yourself to code, rounded up five of the most popular antivirus apps on the block, and helped you out with some clever DIY fixes for your broken stuff.

    * Programmer 101: Teach Yourself How to Code
      You've always wanted to learn how to build software yourself—or just whip up an occasional script—but never knew where to start. Luckily, the web is full of free resources that can turn you into a programmer in no time.
    * Five Best Antivirus Applications
      Computer viruses are increasingly sophisticated and pervasive. If you can't afford to run your computer without some sort of antivirus software installed, check out these five popular options to protect your PC.
    * Stop Paying for Windows Security; Microsoft's Security Tools Are Good Enough
      When it comes to keeping your Windows PC secure, all of the scare tactics and overblown virus stories out there make it hard to feel safe online. The fact of the matter is that you don't need to pay for Windows security.
    * Top 10 Clever Fixes for Your Broken Stuff
      Buying a replacement at Target isn't always the necessary solution when your stuff goes on the fritz. Fix common problems or altogether broken gear with these clever repair methods.
    * The Gaia Desktop
      Reader Sweetshop Union's Windows 7 desktop has been completely transformed with the Gaia09 skin for Rainmeter, complete with widgets, wallpaper, and a visual style to match.
    * Paint.NET Releases Big Update, Still a Killer Photoshop Alternative
      Windows only: Paint.NET is a free, fast, and powerful image editor for Windows. It's a giant leap above Microsoft Paint, and a serious alternative to bigger, bloated (for most users, at least) image editors like Photoshop or GIMP.
    * Tom's Planner Is an Impressive, Intuitive Project Scheduling Tool
      If your work life's all laid out in Gantt charts but you're not happy with the tool you're using, check out Tom's Planner, a web-based project scheduling and collaboration tool.
    * Grab the MacHeist nanoBundle for Free
      If you're a fan of the free OS X software offered at MacHeist, you'll want to scoot over there to grab some free software before their software giveaway expires.
    * Best Antivirus Application: AVG
      Last week we asked you to share your favorite antivirus application and then we rounded up the five most popular candidates for your review and a final vote. We're back with the results, and this was one very close race.
    * Happy Birthday: A Look Back at Five Years of Firefox
      Five years ago, an open-source browser called Firefox—one that didn't ship with your computer—was available as a 1.0 download. To say it's changed the world's web experience is understatement.
    * Dual-Boot Windows 7 and Ubuntu in Perfect Harmony
      Windows 7 and Ubuntu, despite their opposing missions, can get along like best pals on a single computer. Here's how to set up a dual boot system that lets you enjoy the best of both worlds in perfect harmony.

Thursday, November 5, 2009

Windows 7 vulnerable to 8 out of 10 viruses

Now that we in the northern hemisphere have had some time to digest the Windows 7 hype and settle in for the coming winter, we thought we would get some more hard data regarding Windows 7 security.
On October 22nd, we settled in at SophosLabs and loaded a full release copy of Windows 7 on a clean machine. We configured it to follow the system defaults for User Account Control (UAC) and did not load any anti-virus software.
We grabbed the next 10 unique samples that arrived in the SophosLabs feed to see how well the newer, more secure version of Windows and UAC held up. Unfortunately, despite Microsoft's claims, Windows 7 disappointed just like earlier versions of Windows. The good news is that, of the freshest 10 samples that arrived, 2 would not operate correctly under Windows 7.

User Account Control did block one sample; however, its failure to block anything else just reinforces my warning prior to the Windows 7 launch that UAC's default configuration is not effective at protecting a PC from modern malware.

Lesson learned? You still need to run anti-virus on Windows 7. Microsoft, in the Microsoft Security Intelligence Report released yesterday, stated that "The infection rate of Windows Vista SP1 was 61.9 percent less than that of Windows XP SP3."

But let's not get complacent. Microsoft seems to be saying that Vista is the least ugly baby in its family. You can be sure the next report will highlight its even less ugly younger sibling, Windows 7.

Why do I say this? As of October 31st www.netmarketshare.com states that Windows Vista has a 19% market share against Windows XP's 70.5% and Windows 7's 2%. Approximately 1 in 5 Windows users is using either Vista or Windows 7. These users often have newer computers, automatic patching, and firewalls and anti-virus software in place.

With millions of hosts still infected with Conficker, ZBot and Bredo, it is obvious a lot of unprotected machines are still out there, and it is no surprise that most of those are XP.

As the chart above shows, Windows 7 users need not feel left out. They can still participate in the ZBot botnet with a side of fake anti-virus. Windows 7 is no cure for the virus blues, so be sure to bring your protection when you boot up.

Google launches Dashboard privacy controls

Google has created a new 'dashboard' control panel to enable people to more easily adjust their privacy settings. 


he Google Dashboard aggregates all of a user's Google service accounts – for sites such as Blogger, the blogging platform, and Picasa, the photo-sharing site – in to a single interface, providing one-click access to privacy settings and account-management tools.
Google said the dashboard was designed to give people "greater transparency and control" over personal account data stored by Google. "You can see in one place a summary of the data in all the Google products you use," said the search giant in a statement. "You can also manage this data and change settings easily and quickly."
The dashboard gives one-click access to a number of Google products and services, including recent search history, sent and received emails, and attachments and chat conversations in Gmail.
"The Dashboard brings together this data in one easy to manage format, giving you an unprecedented level of visibility and control over that data," said Google.
Google said that it would allow users to rediscover long-forgotten accounts on platforms such as Blogger, and make a decision about whether to resurrect the blog, or to delete it entirely.
"We think of this as a great step towards giving people transparency and control over their data, and we hope this helps shape the way the industry thinks about these issues," said Alma Whitten, software engineer on privacy and safety at Google.
"It's important for people to be aware of what data they have online and to be able to manage that data."


 

Tuesday, November 3, 2009

More Awesome Italian Excess From Lamborghini


Lamborghini couldn’t leave well enough alone after unleashing the insane Reventón. Always eager to squeeze just one more model from every car in its lineup, the boys in Sant’Agata chopped the top off the super-Lambo to create a mighty mean roadster.

The Italian automaker is pretty much the poster child for never leaving well enough alone. It always has been known for its excesses. Excessive styling, excessive horsepower, excessive prices. It defines the term.

And the latest definition of excess? The Lamborghini Reventón Roadster.


Let’s just get the numbers out of the way right now, shall we? That’s all anyone really cares about when talking about an Italian V-12 supercar. The 6.5 liter, 12-cylinder mill puts out 662 horsepower. The car does 0 to 62 mph in 3.4 seconds. It tops out at 205 mph. But the most important number is 20. As in that’s precisely how many Lamborghini will build.

“The Reventón is the most extreme car in the history of the brand,” says Stephan Winkelmann, president and CEO of Automobili Lamborghini. “The new Roadster adds an extra emotional component to our combined technological expertise — it unites superior performance with the sensual fascination of open-top driving.”

Like the Reventón Coupé, you can have your Reventón Roadster in any color you like so long as it’s Reventón Grey, which Lambo claims is a slightly different shade of gray than Reventón Coupé. It still looks like primer gray to us, but as long-time hot rodders, we’re used to it.

Naturally the wheels are extra-special, too. Painted in a two-tone matte-and-glossy paint scheme, each spoke features a small crescent-shaped wing of matte-finished carbon fiber. Lamborghini says it provides “an unusual visual impact, [and] also a turbine effect that further improves cooling of the mighty ceramic brake discs.” Mighty? Well, we our pleased with ourselves, aren’t we?

All this stylish power hits the road through an all-wheel drive system and a running-gear layout Lamborghini says is “from motorsport;” which is funny, because Lamborghini doesn’t do much racing. (That’s one reason the guys in Maranello snicker when someone mentions Lamborghini.) The engine is mounted longitudinally amidships, with the transmission ahead and beneath the center tunnel, meaning 58 percent of the weight sits on the rear axle. Luckily (for your insurance carrier), there’s a viscous-traction, permanent all-wheel-drive that puts all 662 ponies to the ground through all four wheels. Yes, the torque split is variable and automatic, meaning you can more or less point the car, mash the pedal and hang on. Just make sure you aim carefully.

Price? About 12 times what your kidney would fetch on the open market. The Reventón Roadster will go for 1.1 million Euros before taxes (about $1.6 million at today’s exchange rate). Deliveries are being made now, so call your black-market “doctor” for an appointment.

Photos: Lamborghini

 

Mossad Hacked Syrian Official’s Computer Before Bombing Mysterious Facility


Agents of Israel’s Mossad intelligence service hacked into the computer of a senior Syrian government official a year before Israel bombed a facility in Syria in 2007, according to Der Spiegel.

The intelligence agents planted a Trojan horse on the official’s computer in late 2006 while he was staying at a hotel in the Kensington district of London, the German newspaper reported Monday in an extensive account of the bombing attack.

The official reportedly left his computer in his hotel room when he went out, making it easy for agents to install the malware that siphoned files from the laptop. The files contained construction plans for the Al Kabir complex in eastern Syria — said to be an illicit nuclear facility — as well as letters and hundreds of detailed photos showing the complex at various stages of construction.

    At the beginning — probably in 2002, although the material was undated — the construction site looked like a treehouse on stilts, complete with suspicious-looking pipes leading to a pumping station at the Euphrates. Later photos show concrete piers and roofs, which apparently had only one function: to modify the building so that it would look unsuspicious from above. In the end, the whole thing looked as if a shoebox had been placed over something in an attempt to conceal it. But photos from the interior revealed that what was going on at the site was in fact probably work on fissile material.

Early in the morning of September 6, 2007, Israeli fighter jets bombed the complex, located in the desert near the Euphrates river about 80 miles from the Iraq border. The attack, dubbed “Operation Orchard,” seemed to come out of nowhere and was marked by a resounding silence from both Israel and the United States afterward.

Israel claimed the incident never occurred. The United States claimed ignorance, but a State Department official suggested the target was nuclear equipment obtained by “secret suppliers.”

The Syrians were said to have been building the reactor with help from North Korea. The Israeli military’s intelligence unit, known as 8200, was reportedly tipped off to this by the U.S. National Security Agency, which intercepted conversations between Syrian officials at the reactor and North Koreans.

Israel’s concern about the facility really kicked into gear when it discovered that Iranian President Mahmoud Ahmadinejad traveled to Syria in 2006, according to der Spiegel. The paper alleges that Ahmadinejad promised the Syrians more than $1 billion to hasten their progress.

In early 2007, Iran’s former deputy Minister of Defense defected to Turkey and told the CIA that Iran was funding a top-secret nuclear facility in Syria in conjunction with North Korea. Days before the Israeli attack on Al Kabir, a ship from North Korea arrived in Syria loaded with uranium materials, according to the Mossad.

Israel’s attack on the facility commenced late in the evening of September 5, when 10 Israeli jets departed from a base in Northern Israel around 11 p.m. and headed west over the Mediterranean. Seven of them turned east to Syria, flying low, and took out a radar station with their missiles. About 20 minutes later they released their bombs on Al Kabir.

Afterward, Israeli Prime Minister Ehud Olmert reportedly sent a message to Syria through Turkey saying no further hostilities were planned.

    Israel, Olmert said, did not want to play up the incident and was still interested in making peace with Damascus. He added that if Assad chose not to draw attention to the Israeli strike, he would do the same.

    In this way, a deafening silence about the mysterious event in the desert began. Nevertheless, the story did not end there, because there were many who chose to shed light on the incident — and others who were intent on exacting revenge.

Syrian President Bashar Assad maintains that the facility was a conventional military installation. But Der Spiegel reports that in June 2008, a team of experts from the International Atomic Energy Agency analyzed soil at Al Kabir taken after the bombing and found traces of uranium that were “of a type not included in Syria’s declared inventory of nuclear material.” Assad says the Israelis dropped the samples from the air when they bombed the facility in order to frame Syria.

Photo: Aug. 5, 2007 satellite image of suspected nuclear reactor site in Syria a month before it was bombed. (AP Photo/DigitalGlobe)