Looking for something?
Thursday, March 01, 2007
My Geeky Faves
I love gadgets especially the ones with attitude. I always go for the usually more expensive ones because whatever you buy, "you always get what you pay for". But what good is a sophisticated gadget if it's not backed by powerful applications. Right? Nada...of course.
What I usually do when I buy a gadget is to experiment and attempt to make use of its full potentials as soon as I get it. I have a very short attention span so normally I'll do the experimentation within 48 hours of acquiring the gadget or it's gonna sit in the corner for a while until I find some meaningful reason to bring it back to life. And by the way, I hate to read the manuals. The only thing that gets ample exposure in front of my eyes is the quick start guide. Who would want to read a 90-page user manual? By the time you're done reading, that gadget will be obsolete. It's like watching a tv commercial--as soon as you understand the picture, the picture fades away. That's how fast technology goes!
In fact, by the time I'll finish writing this blog, there'll be about twenty more technology releases. Isn't that crazy?
To cut to the chase, here's what happened. I got a pocket pc/cellphone that runs on Windows Mobile 5.0. And since I said in my profile that I am a non-conformist, I don't just settle for what is packaged in the gadget. You see, I like a cellphone, that spews "Woman In Chains" or "Dancing Queen" or "I Want To Break Free" as soon as I get a call. In other words, I want a cellphone that allows you to freely customize your ringtone by uploading a wav, mp3 or a midi file, whichever is compatible. I'm just so used to the Motorola phones that are easy to customize with respect to its ringtones.
This one, since it runs on Windows Mobile, a different OS, it offered a different degree of difficulty. There really is no way for you to tweak it using its own set of applications. So before I could run out of patience, I immediately proceeded to search the internet--help forums here, help forums there, but none offered hope. I didn't give up until I solved my dilemma. So how did I do it? I just downloaded the RESCO registry editor and bingo, tweaking my pocket pc's registry was a walk in the park. Adding the files through RESCO was just as quick and easy as copy and paste. If you ever have the same concern, I suggest you take a look at it. It's really good. Best of all, you don't have to buy it. Just download the trial version. You'll be amazed at how easy it is to use.
Another favorite of mine is the AvantGo service. It's really a good add-on to any mobile device. It lets you add your favorite channels like Allrecipes.com, CNETnews, PCWorld, PowerQuotes and many more. You can even download and play Sudoku for free. My personal favorite is--"Words of the Month" by V.J. Singal. And you don't even have to pay to make use of this service--just opt for the free version.
It's also worth mentioning that I really like the cellphone skins to dress up my cellphone. I particularly enjoy the cellphone skins for Motorola V3. I think it's an ingenious creation. As you change the skin, you change the look as if you're sporting another new phone.
And before I forget, do you love e-books? I do. I started to like them when I had my palm-based PDA and I could read books using the Adobe pdf reader. Then when I had my Windows-based pocket PC, I can just open the Microsoft Reader and I'm on to browsing my mobile library of e-books. Best place to get it--I signed for a one-time registration at ebookmall and it's a lifetime registration actually that allows you to download anything from their library in any format that suits your device's reader software--from The Holy Bible, to any classic e-books. They actually have a vast array of choices. How about downloading the Art of War by Sun Tzu.
Do you have anything to add? E-mail me.
Tuesday, February 27, 2007
Site Advisor: An Internet User's Indispensable Tool
I was lazily browsing the net, until I ended up on one website wherein several pages loaded one after another. Right away, it raised a red flag on my geek meter. The pages that loaded were mostly bogus ad sites. Bogus because I never requested for those web pages. They just popped out of nowhere. Then the confirmation came. My anti-virus software sitting in my desktop immediately prompted me about an infected file and the trojan name was "exploit byte-verify". Most low threat viruses that gets into your PC can be cleaned right away by most anti-virus software, but this one cannot be cleaned and cannot be deleted completely as well. I attempted to delete the file but apparently it didn't work because the bug has a read-only attribute. So I left it sitting in my PC while I scoured the net for answers. There were do-it-yourself solutions to removing the bug, but I didn't bother to experiment on them instead, I just downloaded a more updated and powerful virus protection software, and that did the trick, at a price of course.
Well, I was more concerned about how did I end up in a mal-infested web site in the first place and how could that be possible. All the while we thought that certain websites like pornographic sites, free sites, share ware sites are the sites that are typically infested by the dirty net bugs and that for us long as we don't go that way we are perfectly safe. Not anymore! Why?
In the older days, spamming used to be the trick until internet users learned to ignore unsolicited e-mails. Definitely these bad guys needed another way to victimize unsuspecting users, and that is how they learned to attack users through the net in a much easier fashion.
But how? Simply by "web defacement". Web defacement does not necessarily change the way a website looks. It is carried out by implanting and alien code into a website and is not visible by a user in a browser. It can also be carried out by injecting an alien link which maybe visible or invisible. This attack is possible if the attacker has access to the website or if the attacker can hack into it. Defacement targets so called remote-root vulnerabilities brought about by the lack of recent security patches and bad management and/or practices like weak passwords, guest accounts, open shares or vulnerabilities in applications. Defacement can also be carried out by hacking into a web proxy though the original website may still look perfect. Popular websites are more carefully maintained thus attacks are less likely to succeed. On the other hand, many sites over the internet do not observe the same amount of security measures or periodic site checking or maintenance, thus, even if they maybe already a victim of defacement, they remain unaware for a while and it is the unsuspecting internet users that are diverted to malicious websites at the attacker's choice to be victimized by their malicious codes. Take note, that subtle modifications made to a hacked website can go unnoticed for a very long time and unless regular integrity checking is performed on the website by the webmaster there is no way to find unauthorized modifications into the hacked site.
So how do we protect ourselves from falling prey into the traps of these malicious attackers? Prevention is better than cure. Would it be nice if we can go about the web and someone can provide us a site map of which websites are safe, which ones are vulnerable and which ones are we supposed to stay away from? It is only after I was victimized of this malicious attack that I learned that there are effective tools you can use to protect yourself from this kind of attack. One that is worth trying is the McAfee SiteAdvisor which you can download for free. As soon as you perform a search from a search engine, the site advisor provides a clue on which sites are safe, which sites have potential malicious codes based on their own site tests, and even shows you which sites have not yet been tested. To me this is an indispensable tool because it empowers you being the user to choose the sites at your own risk. At least you have been pre-warned so whatever happens next is entirely up to you.
Now, I have my site advisor sitting and waiting for me to trek the net, and as soon as I set off to go into the internet highway, it flashes green, red, yellow or gray to forewarn me. Protect yourself now. It costs absolutely nothing.
Subscribe to:
Posts (Atom)