• October 20, 2012

    Street Fighter Mame Cabinet

  • October 19, 2012

    Google’s Data Centers

    As everyone knows Google takes the security, and secrecy of their data centers very seriously.  Secure in its dominant position, along with the companies willingness to help businesses learn from their experience in a struggling economy.  Google has shared knowledge with administrators, and businesses to help them go green, and run data centers more efficiently.  Google has become one of the most open internet companies, in terms of revealing the secrets that make its data centers so efficient over the years. Google has posted a site dubbed called Google Data Centers.  Which can be found here The pages are filled with stunning photos, employee profiles, information on energy, and efficiency.  This introduces the public to some of Google’s thousands of data center and the professionals who run and, operate them on a daily bases. To commemorate its $600M USD Lenoir, North Carolina data center Google is offering a street view and walk threw in Google Maps.  Navigate to Google Maps and type in this location. Google Data Center, Lynhaven Drive, Lenoir, NC There is a picture gallery available showing pictures of the inside of 8 datacenters. The data centers represent Google’s nerve center, although none are located near the company’s headquarters in Mountain View, Calif.  Initially, Google just wanted enough computing power to index all the websites on the Internet and deliver quick responses to search requests. As Google’s expanded into other markets, the company had to keep adding more servers to store videos, photos, email and information about their users’ preferences. Google studies Internet search requests and Web surfing habits in an effort to gain a better understanding of what people like and search for on a regular basis to target ads.  Advertising accounts for virtually all of Google’s revenue, which totaled nearly $23 billion through the first...
  • October 18, 2012

    Microsoft Surface Tablet

    You can now preorder Microsoft’s 10.6-inch Surface tablet to at With prices starting at $499 for the 32GB model and $699 for the 64GB model. Both tablets are Wi-Fi only with VaporMg magnesium casing and a kickstand, and runs on the Windows 8 operating system.  The Microsoft surface is only 9.30mm thick, and weighs 1.5 pounds. There are two models to choose from, the Windows RT model which you can pre order, and the Windows 8 Professional model which is still not released. Windows RT Surface Operating System – Windows RT (Windows 8) Battery – 31.5 W-h (About 8 hours) Processor – NVIDIA T30 quad-core processor Display – 10.6-inch multi-touch display with resolution of 1366 x 768 16:9 RAM – 2GB of RAM Storage – 32 or 64GB storage options (expandable) Camera – 720p rear and front-facing cameras Ports – Stereo speakers, Full-size USB 2.0, microSDXC card slot, Headset jack, HD video out Not much difference in the professional model a thickness of 13.5mm, and weighs a little more at 2.0 pounds.  You get a little better display, battery life and bigger hard drive if you choose the 128 gig. Windows Professional Surface Operating System – Windows 8 Professional Battery – 42 W-h (About 10 hours) Processor – Intel third-generation Core Display – 10.6-inch multi-touch display with resolution of 1920 x 1080 16:9 RAM – 2GB of RAM Storage – 64 or 128GB Camera – 720p rear and front-facing cameras Ports – Stereo speakers, Full-size USB 2.0, microSDXC card slot, Headset jack, HD video out
  • October 17, 2012

    Google Lawsuit For Reading Emails

    There is no denying the power of the Google AdSense Advertising Network. Interest-Based Advertising, often known by its more modest name, “behavior targeting,” gives advertisers a way to deliver ads to users who have shown interest in related items. Google tracks your online movements threw almost everything Droid Mobile Apps Chrome YouTube Google Docs Pretty much anything Google creates collects tracking data and builds a collection of “interests” based on which websites you visit. For business owners, bloggers, internet marketers, and other online business analytical data is vital to daily operations and useful in SEO ranking. Google does create an advertising program based on your Gmail account. But a new lawsuit targets Google for reading e-mails to target ads. But the issue isn’t that Google is reading e-mails from registered users; rather, the company is using e-mails sent from other services to Google users to target ads as well. Google does not hide the fact they use email content to serve context-based ads to its Gmail users. Gmail users agree in the terms of service which explicitly states that users’ e-mail content determines what ads they see. The lawsuit is on behalf of “all persons in the province of British Columbia who have sent email to a Gmail account” and demands statutory damages for breach of copyright of $500 per e-mail that Google has used for ads. The lawsuit also seeks an injunction against Google’s use of e-mails going forward. Being a non-Gmail user, you never agreed to the terms of service, so the legality of what Google is doing seems murky. I am not sure how this will stand in court. In this case if you know Gmail is doing this do not send to Gmail accounts. The other issue is Google hosts services for business, government and state...
  • October 16, 2012

    Google Mobile Malware

    Is Google planning on integrating an antivirus scanner into Android? A just-released Google Play store app update, as well as the company’s recent acquisition of VirusTotal seem to hint that yes, Google is looking into it. Google yesterday started rolling out an update to its Google Play Store app version 3.8.17 from August was bumped to version 3.9.16 in October.  The update to the phone has two parts.  The first thing called App Check would apparently allow Google to inspect apps you’ve already downloaded and a second feature would warn you if an app you’re trying to install is suspicious. Google already has a server-side Play Store malware checker called Bouncer. The automated antimalware system removes malicious apps uploaded to the Play Store and is meant to prevent repeat-offender developers. Yet what is being described here is a client-side antimalware system, which would be particularly useful for apps not on the Play Store that Android users are installing from various sources. This is not the first time Google has worked on removing and preventing malicious software in July Google has to remove 25 malicious apps which forced them to put Bouncer in place.  There are third party anti virus apps available buy almost every AntiVirus vendor like AVG Zoner Avast Nortain Webroot Mcafee Trendmicro But this move by Google shows that they are preparing to make some security changes and add possible a built in AntiVirus product on the client side. With the recent FBI warning to consumers about mobile malware Google is adding better security features and possibly a built in AV on its latest Android mobile OS Jelly Bean 4.1 to avoid future security issues.  With Jelly Bean’s design, Google hopes to defend against hacks that install viruses, along with other malware.
  • October 15, 2012

    Amazon E-Book Refund

    Owners of’s Kindle e-readers will receive refunds on past e-book purchases from April 2010 thru May 2012.  Refunds will be between 30 cents and $1.32.  Amazon sees e-book prices drop if a judge approves legal settlements with publishers accused of fixing prices, according to the Internet retailer. Amazon told Kindle owners in emails on Saturday that they could receive a refund if the books were published by three publishers who have agreed to settle a lawsuit that accused them of inflating e-book prices. Hachette Harper Collins Simon & Schuster The settlements are subject to court approval, and a hearing is scheduled for February.  If approved, the settlements would also limit the publishers’ ability to set future e-book prices, which should lead to lower costs for Kindle users, according to Amazon. If the court approves the settlements, the publishers will pay for e-book refunds that will be applied automatically to the accounts of eligible customers. Customers can use the refunds to purchase Kindle books or print books or request a check for the amount of the refund. Amazon made a point to say “We think these settlements are a big win for customers and look forward to lowering prices on more Kindle books in the future” With 5 major book sells involved in this lawsuit Amazon not being one of the them it will be interesting to see how this plays out in the coming months.
  • October 14, 2012

    Antenna Repair In The Sky 540m

    Antenna Repair In The Sky 540 Meter Antenna A friend of mine found this video and sent it to me though this was worth posting for all you radio enthusiasts.
  • October 12, 2012

    Google and Yahoo Irish Domains Hijacked

    Google and Yahoo‘s Irish domains went offline on Tuesday, following an unauthorised change to their registrar’s account.  The domains and were Domain hijacked. Domain hijacking can be done in several ways, generally by social engineering.  The most common tactic used by a domain hijacker is to use acquired personal information about the actual domain owner to impersonate them and persuade the domain registrar to modify the registration information and/or transfer the domain to another registrar.  (This is another form of identity theft) Once this has been done, the hijacker has full control of the domain they can change their DNS records to point to a server of there own or sell the domain. In this case the DNS records were changed to foward to when or where entered into a web browser or search engine.  The Irish Domain Registry released an official statement stating: “As you may be aware, there was a security incident on Tuesday 9th October, involving two high profile .ie domains that has warranted further investigation and some precautionary actions on the part of the IEDR. There was an unauthorised access to a Registrar’s account which resulted in the change to the DNS nameserver records for the two .ie domains. The IEDR worked with the Registrar to ensure that the nameserver records were reset and corrected promptly. Simultaneously, the IEDR commenced an investigation and analysis, with the assistance of external security experts. Based on the results of the investigation and the recommendation of security experts, the IEDR has temporarily brought external web-based systems off-line in order to perform additional analysis.” Serious questions are being raised about how this breach occurred but nothing has been confirmed it’s all speculation. Other high profile sites are part of this domain registry which are not affected like eBay,...
  •   Dell revealed three new touch-enabled Windows 8 PCs designed for three different kinds of customers.  Shipping on October 26, 2012. XPS 12 Ultrabook / Tablet Hybrid – Price $1,199.99  – Specs are 12-inch display, 1920 x 1080 resolution, Intel Core i5 processor, 4GB of RAM, 128GB SSD and Intel HD 4000 graphics card.  Ultrabook/tablet hybrids will uses a unique flip hinge design XPS One 27 – Price $1,599.99 – Specs are 27-inch Quad Hi-Def touchscreen display, 2560 x 1440 resolution which has tilted 60-degree angle option, 3.20 GHz third-generation Intel Core i5 processor, 6GB of RAM, a 1TB hard drive, Intel Integrated HD graphics. XPS 13 Ultrabook – Price $999.99 – Specs are thin and mini aluminum and carbon fiber base keeps it weight at just under three pounds, 13.3-inch 720p display, third-generation Intel Core i5 processor, 4GB of RAM, Intel HD 4000 graphics and 128GB of SSD.
  • October 11, 2012

    5 Ways To Secure Cloud Computing

    1. Secure data transfer – Always make sure you data is encrypted this is very important.  Always make sure your data is traveling over a secure encrypted and authenticated channel.  Always make sure to use FTP, SSH or SSL when transferring files. 2. Secure software interfaces – Know how any cloud provider you’re considering integrates security throughout its service, from authentication and access control techniques to activity monitoring policies.  Know how or if they notify you in the case of a compromised server.  Make sure to read the terms of service. 3.  Secure stored data – Your data should be securely encrypted when it’s on the provider’s servers and while it’s in use by the cloud service.  Make sure you know there Data disposal procedures before you put your faith in there services.  Where is the server your data is located on stored?  Where are the backups stored?  How do they get rid of the old backup media?  Make sure the cloud provider assure protection for data. 4. User access control – Who has access to there data centers and servers?  Make sure all your security permissions are setup properly before uploading sensitive data.  Remember you have no control over the cloud providers employees touching your server or seeing your data.  You will also have no way of monitoring if they do. 5. Data separation – Attacks have surfaced in recent years that target the shared technology inside Cloud Computing environments.  Every cloud-based service shares resources, namely space on the provider’s servers and other parts of the provider’s infrastructure.   Remember servers have many virtual containers on the same server and accidents can happen.