The PC Radio Show WBAI New York Announcements and Upcoming Shows Search our site by entering a keyword or phrase: |
For a full list of all archived shows, see the
Archives page.
WBAI is suffering financial problems. As a result we again offered our Gold
Card for a year of technical support from the guys on the show. Normally,
the Gold Card is only offered during WBAI fund raising drives. We thank those of
your who pledged to WBAI during the show. The financial problems at the station
could result in the show going off the air. There are five new bugs in Internet Explorer and there are no fixes available
for them. The bugs were made public without Microsoft being informed first and
apply to all current versions of Internet Explorer. As a result of these bugs,
an attacker can run a program on your computer which would let them do anything
they wanted to. The work-around is to
disable "active scripting". Michael felt this was difficult to
implement and would make the web browser all but useless as many web sites
depend on these features. If you are familiar with the Security Zones feature of
IE, it can be used to control which web sites are allowed to use "active
scripting" and which are not. The best work-around for the time being is to
use another web browser such as the free Mozilla
browser. There is no date, or even an estimated date, as to when Microsoft will
fix these bugs. Eugene Kleiner, founder of Fairchild Semiconductor and co-founder of the firm now known as Kleiner Perkins Caufield & Byers,
died Thursday
of heart failure at his Los Altos Hills home. He was 80. Fuji is raising prices on CDs and DVDs on January 1st. Hank speculated that
everyone else will follow suit and suggested stocking up on shiny round discs
now. Joe offered another reason to buy discs now - newer discs may not work with
older CD burners. He has an external USB 1.1 CD burner that needs 1x to 4x
discs. The House and Senate both passed anti-spam bills. They are not the same and
it is going to committee. Joe said the bill requires that the recipient of spam
be able to opt-out of getting any more. In addition, spam messages will have to
have something in the subject line to indicate that it is an advertisement. One
big problem is that you have to opt out for each company that sends you spam and
there are many many such companies. Dell is moving some technical support for Optiplex desktop PCs and Latitude
notebooks from India back to the U.S. The reason? The technical support stunk.
In fact, in Ed Foster's Hall
of Shame Dell is the company most complained about and the number one
complain is "poor offshore support". These changes, for the most part,
only effect corporate customers. Home users of Dell computers will continue to
be supported out of India. This is a minor change however, it is not a change in
the way Dell does business. They remain "committed" to India and are
not reducing head count there at all. Currently Dell employs almost 3,000 people
in India. ZDNet Australia reported that the reason for the switch was the
volume of calls to India was greater than expected. All other reports however,
said the reason was poor support and complaints by customers. Is Dell even an American company any more? They have 44,300 employees. 46%
are in the U.S., 54% are overseas. Joe recently had a good experience with
Dell's technical support. Update: The New York Times wrote about this on December 8, 2003. Learning Lessons About Overseas Support
Quoting: In Dell's case, some of its most coveted business customers complained to management that Indian technical support workers relied too heavily on scripted answers and were unable to handle more complex computer problems. While most questions phoned in by home computer users tend to be fairly
straightforward ... greater expertise is needed to respond to corporate network problems." You can't make this stuff up: There were no listener questions this week. An interesting question came in
from a listener named Gary via email: I recently received about 10 emails that all had large attachments, from
1.7 to 5.8 megabytes. The attachments were all saved to my desktop, then the messages that contained those
attachments were deleted in Outlook Express. Then I emptied the items from the Deleted Items folder
and there's nothing in there now. When I look in my Outlook Express folder "C:\WINDOWS\Application Data\Microsoft\Outlook Express" the Deleted Items.DBX file is
42 MB. Why is this file still so large? The problem is that deleting a message from a folder in Outlook Express does not get the entire job done, unfortunately.
You need to choose File, Folder, then Compact All Folders. This will then free up the space that had been taken up by messages that you have since deleted. Some
programs will do this automatically, while others force the user to do it as an extra step. Outlook Express is one of those programs that requires you to start the The show was pre-empted this week. All WBAI programs were pre-empted today
for special fund raising. The issue of using Windows 98 with lots of RAM has cropped up on the show
often. PC Magazine addressed this recently: A listener emailed:
The Internet Tax Moratorium will expire this month. For more about this see www.noemailtax.com. The product Alfred was impressed with for recovering files from a damaged
CD-ROM disc was CD X Rescue
from 321 Studios. He called it "a
very cool product". It is a sector reader for CDs. The November bug fixes from Microsoft were just released After January there will be no more patches from Microsoft for Windows
98. Napster to give students music
November 6, 2003, CNET News.com. The newly re-launched Napster music service announced a deal with Pennsylvania State University on Thursday to give students access to music funded by student fees, in an attempt to replace campus file swapping with legal listening. Our guest was Tony Vincent of Symantec discussing security on the
internet. He is the lead global security architect at Symantec. Every six months
Symantec analyzes data and issues the Symantec Internet Security Threat Report.
The latest one came out in October 2003 and is 57 pages. Data comes from both
corporate and home users. In a nutshell, things are getting worse on the Internet. In the first half of
this year, attacks are up 19% vs. the previous six months. There are many types
of malicious code such as back door programs. Attacks are getting more
sophisticated, the term used is "blended" to describe an attack that
uses multiple avenues of attack. They found 17 new back door programs in the
first half of 2003 and almost that many since the report was issued. In addition to an anti-virus program, Tony said you need a firewall and
intrusion detection software. Instant Messaging and Peer-to-peer networks such
as KaZaA are vulnerable to attacks. Both can used to transfer a file to your
computer, with a peer-to-peer network the file transfer can be
transparent. Hank mentioned that in addition to prevention, the remedy for Internet
attacks is backups. The report is available from the Symantec
Knowledge Library. Symantec Internet Security Threat Report
October 2003. This edition of the Symantec Internet Security Threat Report is the most comprehensive analysis of cyber security activities available. Its findings are based upon over 20,000 sensors worldwide monitoring network activity in 180 countries, as well as data from more than 500 Symantec Managed Security Services customers. This new report clearly shows that the risk of blended threats and attacks is rising. Other potential threats are identified, such as the rise in peer-to-peer attacks (including instant messaging), mass mailers (like
SoBig), the general trend toward theft of confidential information, and the rapid increase in the number of Windows 32 (Win32) threats. What is an octet stream in an attachment? An octet stream is a type of
attached file under the MIME standard and it is probably an executable
program. A keystroke logger (a.k.a. sniffer) is a program implanted on someone's
computer that tracks every key hit on the keyboard. Periodically it sends out
this information to the person who implanted the program. It is often used as
part of identity theft, to capture userids and passwords, but can also be used
by suspicious spouses. Alley warned that KaZaA is full of Spyware but that you can also get a
program called KaZaA Light that does not have Spyware. Also, be aware that an
anti-virus program does not necessarily deal with Spyware or keystroke logging
programs. VOIP = Voice Over IP where IP = Internet Protocol the standard for
communication on the Internet. VOIP means talking over the Internet, normally
using the speakers in your computer to listen and adding a microphone to talk
into. Joe said it is not a good as a land-line phone call but in most cases it's
adequate. Sometimes though, there is a latency. In a short period of time the
phone company will convert many long distance calls to VOIP. Hank said that if a
phone card is three cents a minute, then why bother with VOIP? Update: SBC offers businesses new VoIP service
November 21, 2003 San Jose Mercury News. SBC Communications jumped into the Internet phone business
unveiling a service that will allow businesses to manage all calls through a Web portal.
Available immediately in 18 markets, the service uses voice over Internet protocol technologies to carry calls over a data network, instead of traditional phone networks. Kirin was getting an error while installing Morpheus - that it was not a
valid Win32 application. The advice was to download the program again. Robert complained that AOL blocks email from dynamically assigned IP
addresses. He read this at postmaster.info.aol.com
where it is documented as part of their white list policy. AOL does this to
prevent spam. They are a magnet for spam, blocking millions and millions of spam
messages every day. Part of their fight against it, is only accepting email from
known email servers. This is because spammers can and do run an email server
program on their individual computer and send out millions of spam messages. If
you send email through the email server of your ISP, this should not be an
issue. Rick downloaded Bonzai Buddy and now he can't open JPEG files. Bonzai Buddy
is Spyware. In Windows 98 you can change the program used to open a file when
you double click on it this way: We thank everyone who contributed to our fund raising show on October 29th. Hank and Joe felt that the patent on transmitting sound and video over the
Internet was ridiculous. It is going to trial. Feds admit error in hacking conviction
CNET News.com October 16, 2003. Federal prosecutors asked a San Francisco appeals court this week to reverse
a computer-crime conviction that punished a California man for notifying a company's customers of a flaw in the company's e-mail service.
The one-time system administrator has already served his 16 month
sentence.
Microsoft sets up virus-hunting fund CNET News.com
November 5, 2003. Microsoft will work with law enforcement to track down writers of worms, viruses and other malicious code, and is ponying up $5 million to fund the search.
This is the first time a company has offered money for information about the identity of the
cybercriminals. The initiative's first two bounties will be for information leading to the arrest and conviction of the people responsible for releasing the MSBlast worm and Sobig virus, both of which wreaked havoc online over the summer.
China's Linux Plans Taking Shape
November 6, 2003. AtNewYork.Com. A top Chinese official is indicating the government will invest in developing a domestic software industry based around Linux, a move that could minimize Microsoft's
position in the world's largest market. The Xbox used to run on a processor from AMD. Now it runs on an Intel
processor. Microsoft just announced that the next generation Xbox will run on
the IBM PowerPC, the same chip powering the latest Macintosh machines from
Apple. It is also used by Nintendo and is expected to be used in the next Play
Station from Sony.
Joe mentioned RoboForm. It is a
password manager program that also fills in forms on web pages and generates
passwords. The free version supports up to 15 passwords, the paid version is
$15. If you are registered at a web site and can't remember the userid and
password, RoboForm will. Joe found that it even worked when running off a USB
keychain storage device (aka pen drive). Amazingly, it did not have to be
installed to the hard drive of the computer. Alfred spoke about the design of the cheapest printers. He coined the term
"Win Printer" much in line with the existing "win modem"
term. Win modems (or Windows modems) depend on the computer for their processing
requirements. Regular modems include their own processor for handling incoming
and outgoing data and thus are more efficient (from the perspective of the
computer) and more expensive. The same is true with printers. Most printers include a processor for
rendering pages based on instructions from the computer. However, the cheapest
printers omit the processor and depend instead on the computer for the heavy
lifting. The term used to describe this is "host based printing" and
it uses a protocol called GDI. The rendering of the page image is done by
Windows, not the printer. With host based printing, the image of the printed page is created and
buffered in the RAM of the computer and then squirted across the wire to the
printer. This a much larger data stream compared to a printer that has
its own processor. In that case, the computer only sends commands to the printer
in the language that the printer understands. Depending on your computer, you may or may not notice a slowdown when
printing to a "Win printer". Alfred suggested that a computer
processor slower than 1 GHz would probably slow down. One way to determine if a specific printer is "Win Printer" is to
look at the printer command languages that it supports. A printer that supports
PCL or Postscript is not a win printer, one that supports GDI only, is. Also, if
the printer can be used from DOS, it is not a "Win Printer". Chances
are that a printer with only a USB interface to the computer is a "win
printer". Update: The main factor in determining if a printer is a "Win
Printer" is its support of GDI. Like "real" printers, Win
Printers include a processor and ram, however their processing and buffering
needs are much less. For example, the Samsung ML1710
Black/White Laser Printer is a Win Printer. The specs show it to have a 90 MHz Samsung
Processor and 8 MB of
RAM. The give-away is that it is said to support the Samsung Printer Language
via "Language Simulation". A check on the Samsung
web site shows that the printer language is actually GDI. The free anti-virus program that was mentioned on the air is AVG from Grisoft.
It is free for personal use only. Bill has an old IBM ThinkPad with two PCMCIA slots and USB 1.1. His Ethernet
adapter is a PCMCIA card that occupies both slots leaving him only USB 1.1 to
use with an external CD burner. He asked about options for using a fast external
CD burner, which requires USB 2.0. One option is to get a USB 2.0 PCMCIA card
that occupies a single slot. Then his Ethernet could either come from a single
slot PCMCIA adapter or from an external USB 1.1 Ethernet adapter. Hank pointed
out that everything advertised as USB 2.0 is not, some devices are just USB 2.0
"compliant". To be sure, check the transfer rate of the device. Paul has an HP 1100 printer with what he thought was a built in SCSI port.
Every time he hooked it to a computer, the machine froze. Alfred said it is not
a SCSI port at all. At one point HP tried to get people to convert from the
standard fat parallel printer port to a different type of printer port. This
different type of printer port is what Paul has and if he gets the right cable,
it should plug into a standard printer port on a computer. Steven has a laptop computer and he would like to black out the screen while
downloading large files. Alfred suggested using the Function (FN) keys on the
keyboard to direct the video output to an external monitor. All laptops can send
video output to either the built-in screen, an external monitor or both. This is
controlled by special Function keys on the keyboard. It will not hurt the
machine to send video output to a monitor that does not exist. He will have to
check the manual for the computer to see which Function keys control this, there
is no standard. A caller asked about buying the cheapest flat panel monitor. Alfred warned
that the cheapest are not the best and advised against buying the cheapest
models. They will be less bright and have more viewing angle problems. He also
said not to count on using the speakers that are built into flat panel monitors.
Even the cheapest ten dollar speakers at Radio Shack will sound much
better. |