Der 2007FP von Dell ist eine Alternative zu den vielen Breitbildmodellen am Markt. Er besitzt eine Bildschirmdiagonale von 20 Zoll und erreicht die maximale Auflösung von 1600 x 1200 Bildpunkten. Damit ...
Manager, die manipulierte Geschäftsberichte präsentieren, nutzen oft das Personalpronomen "Wir" und machen sich damit verdächtig. Auch wenn Chefs Floskeln in Reden und Präsentationen einbauen, sollte ...
Windows bietet eine Funktion, mit der sich Dateiordner als Laufwerk im Dateiexplorer anzeigen lassen. Damit lässt sich auf regelmäßige benötige Verzeichnisse sehr schnell zugreifen.
Wer ein preiswertes und sehr kompaktes mobiles System sucht, wird bei den Netbooks fündig. Inzwischen haben die kleinen Geräte zwar mit Konkurrenz aus Notebook- und Tablet-Lager zu kämpfen, als mobile ...
Beim Anschluss eines Cardreaders zeigt Windows 7 jedes leere Laufwerk im Explorer an. Je nach Reader können das verwirrend viele zusätzliche Optionen sein. Auf Wunsch können diese leeren Datenträger ausgeblendet ...
Es gibt eine Aktualisierung für den Yahoo Messenger 11.x, die eine gefährliche Schwachstelle aus der Welt schafft.
Auf einem USB-Stick lassen sich Daten zusammen mit den passenden Anwendungen transportieren. Einstecken und loslegen - und alles ist dabei, was Windows-Nutzer unterwegs zum Arbeiten in vertrauter Umgebung ...
Ist eine Datei zu groß zum Brennen, Kopieren oder Verschicken, dann kann WinSplit helfen. Die Software zerteilt das File in mehrere Bestandteile. Erzeugte Teildateien können auch ohne WinSplit wieder ...
Eine Schwachstelle im Apache HTTP Server könnte sich zur Umgehung von Sicherheitsrichtlinien ausnutzen lassen.
Testen Sie Ihr IT-Wissen! Jeden Tag finden Sie bei TecChannel eine Frage aus dem IT-Bereich, deren richtige Antwort Sie als IT-Experte kennen sollten. Machen Sie kostenlos mit und erweitern Sie Ihre IT-Kenntnisse!
Statt lauter Kritik helfen oft subtile Signale, das Verhältnis zum Vorgesetzten zu verbessern. Ein Anfang ist, über seine schlechten Witze einfach nicht mehr zu lachen. Wir haben ein paar Tipps für Sie ...
AppBoy Pro ist quasi das Schweizer Taschenmesser unter den Apps. Es bietet eine Vielzahl an Funktionen in nur einer App: Kalender, Währungsrechner, Newsreader, Übersetzer und vieles mehr.
Little Snitch ist eine Sicherheitsanwendung für Mac OS. Das Tool protokolliert sämtliche ausgehenden Verbindungen und warnt, wenn Programme unautorisiert Kontakt mit dem Internet aufnehmen wollen. Die ...
Drei Viertel (74 Prozent) der Internetnutzer in Deutschland sind einer Forsa-Studie für den Branchenverband BITKOM zufolge in mindestens einem sozialen Online-Netzwerk angemeldet. Zwei Drittel nutzen ...
Als kleines Extra-Geschenk erhalten alle Leser von TecChannel-Premium das über 240 Seiten starke eBook "IPv6 - Das Praxisbuch" vom MITP-Verlag als kostenlosen Download.
Eine Schwachstelle im Linux-Kernel könnte sich für so genannte Denial-of-Service-Angriffe ausnutzen lassen.
Der neue Router WNDR4700 von Netgear hat zwei TByte integrierte Speicherkapazität und verfügt unter anderem über USB 3.0, Backup- und Cloud-Funktionen. Das Gerät soll im Herbst dieses Jahres verfügbar ...
Diese Drucker haben die TecChannel-Leser 2011 am meisten interessiert! Ob Farbdrucker oder monochromer Laser, professionelle Drucker sind häufig unabdingbarer Bestandteil der IT-Infrastruktur. Mehrheitlich ...
Die Freeware PowerGUI des Unternehmens Quest ermöglicht die Zusammenstellung von PowerShell-Befehlen in einer übersichtlichen grafischen Oberfläche. Per Editor lassen sich darüber hinaus sehr effizient ...
Ab sofort stehen Wireshark 1.4.11 und 1.6.5 zur Verfügung. Darin sind kritische Schwachstellen bereinigt.
Mit dem kostenlosen Tool FormatFactory lassen sich Filme, Musik und Bilder in sehr viele Formate konvertieren. Neben einer Ripping-Funktion für CDs und DVDs bietet FormatFactory auch vordefinierte Konvertierprofile ...
Mit dem Siegeszug von Tablets und Smartphones stehen WLANs wieder im Fokus. Dabei ändern sich die Anforderungen in Sachen Sicherheit und Ausleuchtung. Längst genügt es nicht mehr einige Besucher-Inseln ...
Die App Droid Blocker hilft Ihnen dabei Sich vor unliebsamen Anrufen und Störungen zu schützen. Per Blacklisten verwalten Sie Kontakte, von denen Sie keine Anrufe oder SMS wünschen. Auf Wunsch sind die ...
Mit dem Primergy MX130 S2 bietet Fujitsu einen kleinen, energieeffizienten und leisen Server an. Das mit einer Athlon-CPU bestückte System soll eine gute Performance zu einem günstigen Preis liefern. ...
Das HTC Sensation XE ist eine Weiterentwicklung des Oberklasse-Smartphone HTC Sensation. Die XE Variante kommt mit einem speziellen Audio-Prozessor von Beats by Dr. Dre. Dieser soll ein besonders intensives ...
bonch writes "Author Susan Cain argues that modern society's focus on charisma and group brainstorming has harmed creativity and productivity by removing the quiet, creative process. 'Research strongly suggests that people are more creative when they enjoy privacy and freedom from interruption. And the most spectacularly creative people in many fields are often introverted, according to studies by the psychologists Mihaly Csikszentmihalyi and Gregory Feist. They're extroverted enough to exchange and advance ideas, but see themselves as independent and individualistic. They're not joiners by nature.'"
New submitter smithz writes "Bloomberg is reporting that the U.S. Federal Trade Commission is expanding its antitrust probe of Google Inc. to include scrutiny of its new Google+ social networking service. Google this week introduced changes to its search engine so that results feature photos, news and comments from Google+. The changes sparked a backlash from bloggers, privacy groups and competitors who said the inclusion of Google+ results unfairly promotes the company's products over other information on the Web. Before expanding the probe, FTC was already investigating Google for giving preference to its own services in search results and whether that practice violates antitrust laws. The agency is also examining whether the company is using its control of the Android mobile operating system to discourage smartphone makers from using rivals' applications. Google is facing similar investigations in Europe and South Korea."
eefsee writes "The White House today responded to two petitions with a statement titled 'Combating Online Piracy while Protecting an Open and Innovative Internet.' They note that 'We must avoid creating new cybersecurity risks or disrupting the underlying architecture of the Internet.' In particular, they cite manipulation of DNS as problematic. But overall the statement is clearly supportive of anti-piracy efforts and lays down this challenge: 'So, rather than just look at how legislation can be stopped, ask yourself: Where do we go from here? Don't limit your opinion to what's the wrong thing to do, ask yourself what's right.' So, what's right?"
Hugh Pickens writes "Robert Wright says that if you had asked him a few days ago — before news broke that American soldiers had urinated on Taliban corpses — if such a thing were possible, he would have said 'probably.' After all if you send 'young people into combat, people whose job is to kill the enemy and who watch as their friends are killed and maimed by the enemy, ... the chances are that signs of disrespect for the enemy will surface — and that every once in a while those signs will assume grotesque form.' War, presumably, has always been like this, but something has changed that amounts to a powerful new argument against starting wars in the first place. First, there's the new transparency of war as battlefield details get recorded, and everyone has the tools to broadcast these details, so 'it's just a matter of time before some outrageous image goes viral — pictures from Abu Ghraib, video from Afghanistan,' that will make you and your soldiers more hated by the enemy than ever. The second big change is that hatred is now a more dangerous thing. 'New information technologies make it easier for people who share a hatred to organize around it,' writes Wright. 'And once hateful groups are organized, they stand a better chance than a few decades ago of getting their hands on massively lethal technologies.' It used to be that national security consisted of making sure all foreign governments either liked you or feared you; now it requires that as few people as possible hate you. 'I think we should reflect on that before we start another war.'"
New submitter nwf writes "Ars Technica reports that three of copyright troll Righthaven's company lawyers, including CEO Steve Gibson, are the subject of a Nevada State Bar investigation. Details of the inquiry aren't public, but judges have been blasting Righthaven's legal team so strongly in court that the move is hardly a surprise."
New submitter zzyvits writes "With smartphones becoming more and more common, the push for employees to work after hours is becoming greater. Would the push be as hard if the employers had to pay for it? A law recently passed in Brazil makes it possible for employees who answer emails after normal work hours to claim overtime pay."
An anonymous reader writes "An Indian court given the green light for the prosecution of '21 social networking sites.' The list features 10 foreign-based companies, and could affect websites provided by Facebook, Google, Microsoft, Yahoo, and YouTube. The recent development is part of an ongoing argument between the companies and India over whether content should be regulated (read: censored) in the country. The approval was actually made on December 23, 2011, but was only revealed yesterday. India warned these websites it can block them just like China can."
New submitter Microlith writes "Microsoft has updated their WHQL certification requirements for Windows 8, and placed specific restrictions on ARM platforms that will make it impossible to install non-Microsoft operating systems on ARM devices, and make it impossible to turn off or customize such security. Choice quotes from the certification include from page 116, section 20: 'On an ARM system, it is forbidden to enable Custom Mode. Only Standard Mode may be enabled' — which prevents users from customizing their security, and in section 21: 'Disabling Secure MUST NOT be possible on ARM systems' to prevent you from booting any other OSes."
mwolfam writes with this pointed excerpt from a piece at the Huffington Post by Los Alamos National Laboratories post-doc researcher Michael Ham, who makes a slightly different case than most for the reasons that SOPA and PIPA should be stopped: "Simply put, The Stop Online Piracy Act (SOPA) and the Protect IP Act (PIPA) currently under development in Congress will provide a rapid way to sentence websites to death without the need for pesky things like trials and juries. Much to the surprise of nobody who understands how the Internet works, these two Acts will have absolutely no effect on digital piracy, but they will create an environment where freedom of speech could be severely curtailed, large companies can execute competitors, and scientific data can be hidden from the public."
joabj writes "The ISC is seeking some open source magic for the next version of the widely used BIND. Although the BIND is already open source, most of the work thus far done on the DNS server software has come from contractors, the government and Unix vendors. 'The goal is to move away from having BIND a heavily sponsored corporate product,' said BIND 10 manager Shane Kerr. Kerr is hoping that more eyes will equal fewer bugs, and that more users will go ahead and implement the features they've been requesting themselves. BIND 10, due by the end of the year, features a new modular architecture, one designed to circumvent many of the security woes that have bedeviled BIND 9."
cylonlover writes "Until recently, DNA decoding machines — fitting in the US$500,000 to $750,000 price range — would take weeks or even months to sequence a human genome, and the whole procedure would cost $5,000 to $10,000. That could be about to change, however, as Life Technologies introduces the Benchtop Ion Proton Sequencer — a machine that may finally deliver the power of genetics into the hands of ordinary doctors thanks to its $149,000 price tag and ability to decode a human genome in one day at a cost of $1,000."
mikejuk writes with an interesting look at what coders can get around to after a few years of creating a free office suite: dealing with many thousands of lines of deprecated code: "Thanks to the efforts of its volunteer taskforce, over half the unused code in LibreOffice has been removed over the past six months. It's good to see this clean-up operation but it does raise questions about the amount of dead code lurking out there in the wild. The scale of the dead code in LibreOffice is shocking, and it probably isn't because the code base is especially bad. Can you imagine this in any other engineering discipline? Oh yes, we built the bridge but there are a few hundred unnecessary iron girders that we forgot to remove... Oh yes, we implemented the new chip but that area over there is just a few thousand transistors we no longer use... and so on." Well, that last one doesn't sound too surprising at all. Exciting to think that LibreOffice (which has worked well for me over the past several years, including under the OpenOffice.org name) has quite so much room for improvement.
An anonymous reader writes with the recent news that, in line with its goal to provide secure phones to government employees in various domains, "The NSA has released a set of security enhancements to Android. These appear to be based on SELinux, which was also originally created by the NSA."