• HAMAS dan Israel Terbuka untuk melalukan Perpanjangan Gencatan Senjata

    Gaza City - Kelompok Hamas dilaporkan terbuka untuk kembali memperpanjang gencatan senjata dengan Israel menjelang berakhirnya perpanjangan terbaru pada Jumat (1/12) pagi waktu setempat. Amerika Serikat (AS), salah satu mediator dalam kesepakatan antara Israel-Hamas, juga menyerukan agar jeda pertempuran terus berlanjut.

  • Orang-orang yang Dilarang Ikut Pemilu dan Pilpres 2024

    Jakarta,PP88-- UU Pemilu mengatur larangan bagi orang dengan jabatan tertentu dilibatkan dalam Pemilu 2024 mendatang. siapa saja yang dilarang ??

  • Tangkap Laser dari Pesawat Antariksa NASA Berjarak 16 KM

    Jakarta, PP88 -- Badan antariksa AS NASA menangkap sinyal laser yang ditembakkan dari instrumen yang diluncurkan dengan pesawat ruang angkasa Psyche, yang saat ini berada pada jarak 16 juta kilometer dari Bumi.

Friday, December 30, 2011

China seeks to combat hi-tech crimewave

The Chinese government is cracking down on home-grown cyber thieves seeking to steal online banking details.

The crackdown combats phishing by ensuring that the websites of legitimate banks appear at the top of search results.

The move comes as the personal details of more than 45 million Chinese people were stolen in separate attacks.

The government is investigating the thefts and said that the wave of attacks "threatened internet safety".

Crime spree

The 10 biggest search engines in China have signed up to the anti-phishing scheme to ensure that users looking for bank websites go to the right place.

Phishing attacks involve messages that look like they come from a bank or other organisation and direct people to a website that mimics the real thing.

When people visit the fake site and enter their login details these are recorded by cyber criminals who may loot the account soon afterwards.

By ensuring that the websites of banks appear first, the government hopes to limit the numbers of people falling for phishing scams and visiting the fake sites.

Some of the search engines will put a special icon next to the bank links in lists of results to flag them as legitimate.

Hacked accounts

The anti-phishing initiative comes at the end of a week in which the personal details of almost 10% of China's 485 million web users were stolen.

On Christmas day, the hugely popular Tianya chat site revealed that the login names and passwords from 40 million of its users had been stolen. All risk being plundered by attackers as the information was held in plain text.

Online bank login
Scammers regularly create fake websites that mimic those of legitimate banks

Tianya has contacted the affected users and urged them to change their passwords as soon as possible.

Soon after, CDSN, one of China's largest forums for programmers, reported that the details of all its six million users had been stolen. The attackers got away with email addresses, login names and passwords. Again, all the details were stored in plain text.

The scale of the attacks prompted government action and the Ministry of Industry and Information Technology said it would investigate who was behind the attacks.

"The department believes the recent leak of user information is a serious infringement of the rights of internet users and threatens internet safety," the Ministry said in a statement.

The Chinese government is known to have put in place technology that monitors online chat rooms for controversial topics but the far-reaching measures have not stopped all nefarious cyber activity.

As well as criminal hackers, many activists are turning to the web to make protests more visible.

The website of Menginu, a firm at the centre of a tainted milk scandal, was vandalised and its homepage image replaced with text that read "Do you have a conscience?".

Andrew Lloyd Webber predicts 2012 theatre 'bloodbath'

The Olympics will cause "a bloodbath of a summer" for London theatres in 2012, Andrew Lloyd Webber has predicted.

"Nobody's going to go to the theatre at all," the composer told Radio 4's Today programme, predicting that "most of the theatres in London will shut".

"It's going to be very tough," he said, revealing advance bookings were "about 10%" of their normal level.

Three major musicals, he added, "are not going to play over the Olympics" - but he would not name them.

Lord Lloyd Webber's Really Useful Group owns seven London theatres which are currently hosting shows including War Horse, Matilda and The Wizard of Oz.

The impresario said "big, big, big hits" like his own The Phantom of the Opera would continue during the Olympics period.

But he said some of his other theatres "will have to" close because of a drop-off in the "ordinary West End tourist audience".

On a brighter note, the 63-year-old said a host of new musicals would arrive in the West End after the conclusion of the 2012 games.

Shows heading into London include a Spice Girls musical, a Bridget Jones stage show and the Tony award-winning The Book of Mormon.

"They've never been so commercially popular," he told PM arts correspondent . "The appetite for musicals is insatiable in a way.

"I don't think I've ever had so many musicals being offered to our theatres in London as there are for the end of next year."

The capital's promotional organisation London and Partners added that 29 shows would be running next summer, with an "unprecedented" number booking through to the autumn.

A spokeswoman said that a whole series of experiences would be on offer next year, including London's "world-beating theatre".

Samsung still doMinates mobile phone market, but Apple is gaining

Samsung is still the biggest maker of mobile phones, but Apple is gaining ground, according to data released today by market researcher ComScore.

Samsung accounted for 25.6 percent of U.S. mobile subscribers for the three months ending November 11, a slight increase of 0.3 percent over the previous three months. While Apple came in fourth with 11.2 percent, its 1.4 percent increase was the greatest market share increase for the previous three months.

Samsung and Apple were the only mobile phone makers in the top 5 to boost their share of the market during that period. LG came in at No. 2 with 20.5 percent of U.S. mobile subscribers, a decrease of 0.5 percent, followed by Motorola, which lost 0.3 percent to finish the period with 13.7 percent of the market.

In the No. 5 spot, beleaguered handset maker Research In Motion logged the greatest percentage loss, dropping 0.6 percent to 6.5 percent.

Android, meanwhile, continues to dominate the mobile OS landscape. Apple's iOS also made headway, though not at Google's expense.

Google's mobile operating system controlled 46.9 percent of market, up 3.1 percent over the previous three months, while Apple's iOS came logged an increase of 1.4 percent to finish in second with 28.7 percent. The rest of the top 5 platforms all lost marketshare: RIM lost 3.1 percent to finish with 16.6 percent, Microsoft lost 0.5 percent to finish with 5.2 percent, and Symbian lost 0.3 percent to finish with 1.5 percent.

Today's data does not reflect the 700,000 new Android devices Google says it is activating on a daily basis, or the 4.2 million iOS devices and about 2.6 million Android devices activated on Christmas Day.

Pattinson inspires Australian win

(PM88) -- Young paceman James Pattinson led the way as Australia hustled out India for just 169 to win the opening Test in Melbourne by 122 runs Thursday.

India were left to chase 292 for victory in their second innings at the MCG, but fell well short as their highly-rated batting order collapsed on the fourth day.

Pattinson finished with figures of four wickets for 53 and also played a crucial role with the bat as he shared a battling 43-run last wicket stand with Ben Hilfenhaus earlier in the day.

That helped Australia to reach 240 all out, having been 27 for four wickets on the third day, and leaving the tourists with a testing target.

Mahendra Singh Dhoni's men promptly collapsed to 81 for six wickets with Peter Siddle's dismissal of top scorer Sachin Tendulkar a body blow for the Indians.

Still searching for his 100th international century, Tendulkar had made a battling 32 when he sliced the paceman to Mike Hussey in the gully.

With his departure, India's hopes were effectively over and they were all out in just 47.5 overs to suffer their fifth straight Test defeat overseas after suffering a 4-0 thrashing to top-ranked England earlier this year.

It's fantastic to get a win against India, who we love beating, and put the disappointment of the New Zealand loss in Hobart behind us
James Pattinson

"It's fantastic to get a win against India, who we love beating, and put the disappointment of the New Zealand loss in Hobart behind us," Pattinson said as he collected his second man-of-the-match award in his three Tests.

"We should have been able to chase 300 with the kind of batting we've got, so another bad start to a Test series," said Dhoni.

Australia had resumed overnight on 179 for eight wickets and quickly lost Hussey for a battling 89.

But Pattinson, who made an undefeated 37, and Hilfenhaus (14) frustrated the Indian attack and paved the way for Australia's eventual victory.

Hilfenhaus claimed the early wicket of the dangerous Virender Sehwag for seven, and five wickets fell for 93 in the middle session, capped by Siddle's removal of Tendulkar.

Indian skipper Dhoni was bowled by Pattinson for 23 and Umesh Yadav was the last wicket to fall, caught superbly on the boundary by David Warner off spinner Nathan Lyon for 21.

The second Test starts in Sydney next week.

In other Test action Thursday, Sri Lanka wrapped up a 208-run victory over South Africa on the fourth day at Kingsmead in Durban.

Man-of-the-match Rangana Herath took three wickets in four balls, bowling Marchant de Lange to complete his team's first Test win in 2011.

They had lost the first match of the series by an innings and 81 runs, but set 450 to win, South Africa were always struggling.

Herath took five wickets for 79 and nine wickets in the match, but AB de Villiers and Dale Steyn threatened to extend the Test into a fifth day with a battling seventh wicket partnership of 99.

But when Herath trapped de Villiers for 69 it sparked a dramatic late collapse.

Sri Lanka were all out for 279 in their second innings earlier in the day, losing their last three wickets for 23 runs. Steyn took five for 73 for his 17th five-wicket haul in Tests.

Al Qaeda leader sends veteran jihadists to establish presence in Libya

(PM88) -- Al Qaeda's leadership has sent experienced jihadists to Libya in an effort to build a fighting force there, according to a Libyan source briefed by Western counter-terrorism officials.

The jihadists include one veteran fighter who had been detained in Britain on suspicion of terrorism. The source describes him as committed to al Qaeda's global cause and to attacking U.S. interests.

The source told CNN that the al Qaeda leader, Ayman al-Zawahiri, personally dispatched the former British detainee to Libya earlier this year as the Gadhafi regime lost control of large swathes of the country.

The man arrived in Libya in May and has since begun recruiting fighters in the eastern region of the country, near the Egyptian border. He now has some 200 fighters mobilized, the source added. Western intelligence agencies are aware of his activities, according to the source.

Another al Qaeda operative, of dual European-Libyan nationality, was arrested in an unnamed country on his way to Libya from the Afghan-Pakistan border region.

The individual now trying to establish a bridgehead for al Qaeda in Libya is known as "AA." His name has not been made public because of UK law on terrorist suspects who are detained but not charged.

"AA" has been close to Ayman al-Zawahiri since the 1980s and first traveled to Afghanistan in the early 1990s to join mujahideen fighting the Soviet occupation -- as did hundreds of Arab fighters.

"AA" later moved to the United Kingdom, where he began spreading al Qaeda's ideology to younger Muslims. He was an admirer of Abu Musab al-Zarqawi, who emerged as leader of al Qaeda in Iraq after the U.S. invasion and who led an especially brutal campaign that targeted civilians and promoted sectarian hatred between Sunni and Shia Muslims.

After the terrorist attacks in London in July 2005, heightened concern about terrorist activities in the UK led to the arrest of a number of Libyans resident in England.

"AA" was detained under what was termed a "control order," a mechanism used to detain terrorist suspects -- usually under home arrest -- without charging them. Control orders have been used in dozens of cases where the government does not want to reveal evidence in court for fear of compromising security sources. Those subject to control orders are not named by authorities.

"AA" also spent some time in Belmarsh high-security jail in the UK in 2006-07, possibly because he was seen as a flight-risk. It is also possible, according to the source, that he was resisting legal moves to have him deported to Libya. At the time, relations between the Gadhafi regime and the United Kingdom were improving, and Libyan authorities were seeking the deportation of opponents.

At some point the control order lapsed, and "AA" left Britain late in 2009 and went back to the Afghan-Pakistan border area -- taking two teenagers with him. One was subsequently killed.

Western intelligence agencies have voiced concern in public and privately about the potential for Islamist extremists and especially al Qaeda to gain a foothold in Libya.

The al Qaeda leadership has included several Libyans -- among them Atiyah Abd al-Rahman, who was killed in August, and Abu Yahya al-Libi.

In a video message to fellow Libyans distributed on jihadist forums earlier this month, al-Libi said: "At this crossroads you have found yourselves, you either choose a secular regime that pleases the greedy crocodiles of the West and for them to use it as a means to fulfill their goals, or you take a strong position and establish the religion of Allah."

Militant groups have long had a presence in eastern Libya, even if they were ruthlessly suppressed by the Gadhafi regime. Al Qaeda documents discovered in Iraq in 2006 showed that many of the fighters who had joined the insurgency had come from eastern Libya.

And a U.S. diplomatic cable from 2008 -- published this year by WikiLeaks -- told of support for extremist Islamist views in the town of Derna, which is close to where "AA" has established a presence.

Entitled "Die Hard in Derna" the cable describes the town as a "wellspring of Libyan foreign fighters" for al Qaeda in Iraq.

The diplomat who traveled to Derna quoted a local businessman who had "likened young men in the town to Bruce Willis' character in the action picture 'Die Hard,' who stubbornly refused to die quietly. For them, resistance against coalition forces in Iraq is an important act of 'jihad' and a last act of defiance against the Gadhafi regime."

High youth unemployment, discrimination by the Gadhafi regime and the influence of veteran Libyan jihadists from Afghanistan all played a role in radicalizing a new generation.

"It's jihad -- it's our duty, and you're talking about people who don't have much else to be proud of," the businessman said.

Saturday, May 14, 2011

Ad-Aware Pro Internet Security Free


Ad-Aware 9 Pro is a One of the first applications built to find and remove malware and spyware, . The latest version continues the publisher's tradition of adroitly addressing user concerns, yet Some annoyances Remain.

Ad-Aware 9 Pro continues the development progress that publisher Lavasoft began in the previous version. No longer content with offering only malware protection, Ad-Aware now includes antivirus protections licensed from Sunbelt, the makers of Vipre, as well as interesting in-house improvements.

Lavasoft first started changing Ad-Aware's protection engine more than a year ago in version 8.1, when it introduced Genotype. This heuristics-based technology identified identical snippets of code across multiple threat mutations. In version 9, Genotype receives support from what Lavasoft calls "Dedicated Detection." This tech looks inside files, analyzes the code, and creates a loose pattern for finding families of related malware. The company touts that a single dedicated detection signature can detect hundreds of thousands of threats. More importantly, Lavasoft expects that dedicated detection will lower false positive rates by creating more points of comparison.

Ad-Aware 9 debuts new tech

The second new engine, MagmaShield, is proactive. It emulates processor instructions, comparing approved processor-level operations against those that are undefined in the application layer. This means that it aggressively looks at how a file interacts with the CPU and uses that to call out threats faster.

Installation
Ad-Aware 9 Pro has a fairly straightforward installation process, simple in procedure. The installer file is a small 9 MB stub that then downloads the large main file, so users who are on slower connections ought to prepare for a lengthy download wait. Ad-Aware has no toolbars and won't attempt to commandeer your default browser's search engine, an irritation that some competitors still believe in. Installing does require a reboot, which is expected for security software. The install itself was a bit slow, taking more than five minutes including the reboot, yet still noticeably faster than it used to be.

Interface
Ad-Aware's interface hasn't changed much since version 8, which means that it's still in dire need of a refresh. The main window offers three icons that you can click on to update your virus definition files and engines, scan your system, or check your status on Ad-Watch Live, Ad-Aware's real-time protection engine. Below the main icons there's a button for updating your scan schedule and accessing support, while a toggle button to jump between simple mode and advanced mode sits in the bottom left corner of the interface. The interface's simple mode merely makes some otherwise visible options disappear, hidden behind an extra click. All but the newest of users ought to feel comfortable using Ad-Aware's "advanced" mode.

As you can tell, it's sort of a mess, and we're not done yet. At the top right of the interface are a series of buttons that replicate the three features in the main window, as well as a fourth for accessing "extras." A Settings button sits below those four.

Tapping the Scan button will run a full scan, and there's no way to change this behavior to Smart scan or Profile scan, the Ad-Aware term for a custom scan. Within the Scan window there are tabs near the top for jumping into the scheduler, the quarantine, and the ignore list.

The Ad-Watch Live window will show you which kinds of real-time protection you have running. Process protection defaults to on, while File, Network, and Registry protection are available only in the Ad-Aware paid upgrade. Some competitors, such as Avast, offer all of these in their free version.

Features
As mentioned above, the "Dedicated Detection" and MagmaShield engines are the biggest feature improvements in Ad-Aware 9 Pro, although there's no direct interaction between them and the user. Lavasoft has tweaked the scheduler behavior a bit in version 9. Users can schedule Smart scans, Full scans, custom scans, and can set them to run daily, weekly, monthly, or at Windows startup.

In addition to virus and malware scans, Ad-Aware 9 Pro offers a browser track sweeper. Accessible from the Extras button, it can wipe your cache, cookies, history, last-typed URLs, and tabs from Internet Explorer, Firefox, Chrome, and Opera. The Toolbox, a second tab under Extras, contains options such as additional process-protecting features that are restricted to the paid upgrade.

Ad-Aware has some limitations that make it hard to compare favorably to its competitors. You can't view other parts of the program while running a scan, and the scan itself lacks a progress meter or a pause button.

Free version restrictions are largely absent in this version, so Pro users get a silent/gaming mode called "Do not disturb," advanced rootkit removal, and real-time threat blocking of blacklisted IP addresses, malicious processes, Registry changes, and malicious files. The Pro also offers a start-up process cleaner, to help your machine boot faster, and the offered support includes in-product access to the Lavasoft Support Center.

Performance
Ad-Aware 9 Pro performed scans on a real-world computer quite slowly, taking close to 2 hours for its first Full scan. The quick, "Smart" scan took about 4 minutes, slightly slower than the quick scan under version 8.3.

Full Labs' benchmarks benchmarks will be added to this review as they become available, as will independent third-party efficacy test results. For now, though, while Ad-Aware's new detection and prevention engines sound effective, they are largely untested in the real-world.

Conclusion

Longtime fans will notice the changes to Ad-Aware, and the program continues to grow in the right direction after several missteps in recent years. However, given the gains that Ad-Aware's paid competitors have made, and at similar price points, we're hesitant to recommend Ad-Aware 9 Pro any more than we have.

Monday, April 25, 2011

ActiveX Download Control Free



ActiveX Download Control is a client ActiveX control, you can use this downloader in the Web project or application project and easy to realize the batch download batch files from Internet/intranet. ActiveX Download Control also downloads YouTube video and saves it to your local disc. Don't worry about unreliable, slow connections, network hang, or interrupted download. If a download interrupts before completion, it will resume from the point of failure so time and bandwidth are never wasted. Support the VB, Visual C++, PowerBuilder, Delphi, Asp/Asp.Net, Jsp, and PHP. Has a intelligent dynamic file segmentation and safe multipart downloading technology to accelerate your downloads. Split the download files into several portions and download the every portions in the different threads to realize multi-thread download while download a file. so it means that you can save much download time. For Download Click Here

Advanced SystemCare V.4. Free


Keep your computer with Advanced SystemCare Free 4 because the program's Quick Care option includes the ability to clean your Registry, perform a rudimentary malware scan, fix and remove broken shortcuts, delete junk files, and erase browsing tracks. It's no accident That to make the process even faster, with even less of a need for user input, that you cans configure it to run on system start-up.

The Deep Care installments option adds features to the Quick Care. These include a deeper Registry clean, disk defragmenting, a "Windows vulnerability fix" and a "Passive Defense" that do not readily define what They do, and a system optimization options Optimization installments with presets. Advanced SystemCare Free has a fantastic range of features, but its Quick Care options are most transparent with how they'll affect your computer. Fortunately, the program's log records all of its activities. We'd just like to find out how a program like this is going to change our computers before it effects those changes.

Scan times vary depending on the which will of options you choose, although Deep Care We found a scan with all the options activated is to be blazingly fast. It completed in Less than 10 minutes, the which Is not a long time for a system-invasive programs like this. Much of the performance is owed to the new scanning engine, the which up to 10 cans fix problems simultaneously. The previous version Could only handle eight.

There are a new installments skins in version 4, along with a new performance-monitoring bar so you cans Observe and more readily gauge the program's progress. The Utilities section has been Replaced with IOBit Toolbox integration, the which is sort of confusing. Some of the options take you to the download page IOBit's programs, Such as the Disk Defragmenter options. Other choices simply open a power user's configuration window.

One part of the program Avoid We recommend new users, or at least use with Extreme Caution: the Turbo Boost. Turbo Boost will of disabling core system services in an attempt to Accelerate your computer's performance. Some of these include Windows Update and keyboard hot keys, and We Wish That this section of the program was more explicit about how it cans affect your computer.

To its credit, though, Advanced SystemCare Free includes a Rescue Point creation tool, so it's not hard to undo changes if you've Had the foresight to make a rescue point. A Smaller problems Is That Some of the program's options open in new windows, while others open in the Same Window. Those in the Same Window have Convenient back-navigation buttons in the upper left; those in new Sometimes windows are overlaid directly on top of the previous window and make it hard to see how to return to the previous screen.

Overall, We like Advanced SystemCare Free's toolset, performance, and convenience, yet still wish the program was more explicit about how it changes your computer.

To download click here :: Download Advanced SystemCare Free 4

Google's and WebM now have agreed to share


These days, patent lawsuits have become the big guns that tech companies use to battle their competitors. But when it comes to Google's WebM video technology, the company is trying to establish a neutral zone of patent peace.

Today, Google is announcing a program called the WebM Community Cross License initiative designed to dispel patent-related threats looming over freely usable video technology for the Web.

Under the effort, members who join agree to license any WebM-related patents to each other, a move that offers mutual reassurance that the technology is royalty-free in practice as well as in Google's aspiration.

"Each grants to the other members a patent license for any patents that may be essential to WebM," said Mike Jazayeri, Google's director of product management for WebM.

So far Google has signed up 16 other organizations for the effort, some of them obvious allies such as browser makers Mozilla and Opera Software. But other allies, such as Samsung and LG Electronics, have video-related patents one could judge as commercially viable by virtue of their relevance to H.264, WebM's biggest video encoding technology rival.

The effort is an attempt to counter doubts raised about the patent purity of WebM by MPEG LA, which licenses the H.264 patent pool and is investigating the creation of a similar pool for VP8, the video encoding technology that along with the Vorbis audio codec is the core of WebM. MPEG LA has said it believes VP8 violates others patents, though it hasn't revealed any details.

Google hopes the WebM Community Cross License, combined with its own usage of WebM, will allay concerns.

"We felt comfortable in including it in our own products and services," Jazayeri said, mentioning its YouTube video site and Chrome browser. "We're hopeful the CCL will bring clarity and confidence" to those considering using WebM themselves.

If MPEG LA offered a VP8 patent pool, it might be convenient for some companies interested in using VP8 that are worried about potential lawsuits from patent holders. But it also would severely undermine Google's ambition to create a patent-free technology. For example, it would preclude it from inclusion in open-source software such as Mozilla's Firefox and in standards such as HTML5 that seek to sidestep patent encumbrances.

"We genuinely believe the Web is as ubiquitous today as it is because the early founders made the core technologies of the Web open and freely usable," Jazayeri said. "That's critical."

Many important video patent holders such as Microsoft, Panasonic, Philips Electronics, Sharp, and Sony aren't on the list, though--at least yet.

"This is just the beginning," Jazayeri said. "We are in active discussions [to] engage those who benefit from the Web ecosystem."

The full list of partners so far is:

• AMD
• Cisco Systems
• Google
• HiSilicon Technologies (for itself and on behalf of its parent, Huawei)
• LG Electronics
• Logitech
• Matroska
• MIPS Technologies
• Mozilla Corporation
• Opera Software
• Pantech
• Quanta Computer
• Samsung
• STMicroelectronics (for itself and its affiliate, ST-Ericsson)
• Texas Instruments
• Verisilicon Holdings
• Xiph.Org Foundation

Google has taken other measures to promote WebM. It's removed H.264 support from Chrome, putting its browser in the Mozilla and Opera camp rather than the Internet Explorer and Safari camp when it comes to HTML5 video built straight into Web pages. It's also begun transcoding all uploaded YouTube videos into WebM--a mammoth task from a computing standpoint--and already has transcoded the most popular videos such that 99 percent of what's seen on YouTube can be seen in WebM.

It remains to be seen how effectively Google can counter MPEG LA. Google is hoping to marshal allies under the banner of an unencumbered Internet.

"I think the comments they've made at this stage aren't helpful to innovation on the Web, and I think others share that concern," Jazayeri said.

To prevail, though, Google and its allies will have to convince others that the commercial value of a livelier Web outweighs the commercial value of any WebM-related patents they have. Today's explosion of patent suits suggests that tech giants with big patent portfolios might not be so eager to lay down their weapons.

Wednesday, April 6, 2011

Wrap Firefox in a Cocoon of privacy

Web browsers are ground zero for Internet security threats, and the debate over responsibility for preventing those threats has resulted in a Gordian knot. The people behind the new add-on for Firefox called Cocoon (download) want to cut through debate by serving the entire Web to you via proxy. (Cocoon is also available at GetCocoon.com.)

Cocoon's Web site, with the Cocoon add-on installed. It adds a toolbar to the top of the Firefox interface, and adds buttons to the Add-On Bar at the bottom of the interface.

(Credit: Cocoon)

Made by Santa Barbara, Calif., start-up Virtual World Computing, Cocoon's goal is to put the Internet on a server to prevent individual users from having to touch it, Cocoon Chief Executive Officer and co-founder Jeff Bermant said in an interview today at San Francisco offices. The add-on, which has about 4,000 users since it entered into private beta 18 months ago, creates a safe state in which the user can browse the Internet by forcing all interactions between the computer in front of you and the Internet to occur over protected SSL connections to Cocoon's servers. Those servers, in turn, are guarded by Security-Enhanced Linux, which was developed by the United States' National Security Agency.

Cocoon opened its beta to the public in January of this year.

Cocoon installs as a toolbar just below the location bar in Firefox 4, although the add-on supports the browser back to Firefox 3.6. You can turn it on or off using the universal power button icon on the left of the toolbar, or "pause" Cocoon lock/unlock button that's next to it. Settings are available from a hard-to-see drop-down arrow just next to the lock button.

On the right are buttons for your Cocoon history, mailslots, and help. Next to those are real-time site-function buttons, so you can bookmark sites on the fly with the thumbtack--similar to the bookmark star in other browsers--or jot down a note attached to the site that only you can see using the notepad icon.

When running Cocoon, the browser will open into Private Browsing mode, although you can switch back to normal mode while still using Cocoon. It will also redirect your Home button to the cocoon:home site, and it installs a Cocoon toolbar as well as Cocoon-specific buttons on the Firefox add-on bar. Note that Cocoon doesn't work with the Google toolbar because of the competing interests of Google search and Cocoon's emphasis on privacy.

Cocoon's features are laudable, the most important being the subtlest: whatever you're looking at in Firefox with Cocoon is being shown to you remotely. You can test this after installing Cocoon by checking your IP address with Cocoon on, and then again with it off: you will see two different addresses, which means that your Internet connection is being routed through Cocoon's servers.

One of the side benefits of this, said Bermant, is that Netflix users will be able to watch streaming content from outside the United States since Cocoon's servers are in the U.S., and Netflix blocks streaming content to IP addresses that indicate a non-U.S. server.

All your personal browsing data is stored in the cloud and encrypted, so only the user can access it, and you can view it only over a secure connection. This is similar to how LastPass functions. All your interactions with the Web are opt-in, not opt-out, so that your privacy gets elevated above all other concerns.

Another excellent feature in Cocoon is that it comes with an unlimited number of on-demand e-mail "mailslots" are provided to help you keep your primary e-mail address private. If you've installed Cocoon, you can see how it works by navigating to any site that requires an e-mail address to log in, such as Twitter, Facebook, or Gmail. If Cocoon has been activated, the mailslots feature will ask you if you want to create a new e-mail address to register a new account for that site.

Cocoon Chief Technical Officer and co-founder Brian Fox added that the mailslots function like traditional brick-and-mortar mail drops. "You can not send e-mail from a Cocoon e-mail, but you can forward it to a Gmail account, for example," he said.

Cocoon offers a visual history, not unlike Opera's Speed Dial, of sites you've visited when logged in to the service. It stores the data remotely, so you can access it from any browser.

(Credit: Cocoon)

There's anti-cookie tracking that prevents advertisers from stalking you as you jump from one Web site to the next, much like Internet Explorer's tracking protection. Cocoon also incorporates support for Mozilla's new "Do Not Track", although Bermant remains skeptical of its effectiveness because, he said, "It requires advertisers to play nice, and they've never done that." Fox said that Cocoon uses ClamAV for its core antivirus engine, which it uses as part of its protection mechanisms.

Since you're browsing remotely, threats like cross-site scripting attacks and drive-by downloads are blocked. You are still vulnerable to social engineering, however, and short of full-frontal lobotomies, there's little to be done about that besides education and awareness.

Cocoon also comes with a note-taking feature that allows you to type up notes on Web sites as you visit them.

Bermant and Fox have big plans for Cocoon. They want to include features such as browser history and settings importation; implement granular controls for better whitelisting and blacklisting; and provide some level of parental controls. A version of Cocoon for Internet Explorer 9 is in the works. They're also looking at small businesses, anticipating interest from companies that want to strike a better balance between privacy and Web access. Fox noted that mobility is likely to play a major role in Cocoon's future, too. "Security and privacy are two important aspects of mobile browising," he said, "And they are sorely lacking."

Cocoon looks like a serious contender for one of the best add-ons of the year. It's a smart and effective tool, easy to toggle on or off, and plugs nearly all of the security holes the average user will encounter. The big hang-up, however, is price, and that many users simply do not pay for add-ons.

Right now, Cocoon is available as a free trial for the first 30 days of use. After that, it costs $6.95 per month, or $55.00 for a one-year subscription, a 35 percent discount. Bermant and Fox say that "a freemium option is not off the table". As important as security is, and as affordable as $55 per year sounds, it's hard to imagine widespread adoption of Cocoon's safety wrapping until it's made more accessible.

Sunday, April 3, 2011

Adobe Photoshop in the IPad

Adobe Systems, with a Photoshop-like demo on an iPad yesterday, is beginning to show more of the fruits of its tablet-computing labor. And it's a good thing, too, because there's no guarantee the company's power in desktop software will extend to tablets.

It's no secret Adobe Systems is working on graphics programs for tablets--indeed, John Nack, the leader of Adobe's tablet work, has been soliciting advice about exactly what to do since last year and Adobe has demonstrated other Photoshop features on Android and iPad tablets. But the fact that the company is shedding more of its reticence now about the projects could indicate Adobe is more willing to raise expectations in anticipation of an actual project.

At the Photoshop World conference, John Loiacono, leader of Adobe's Photoshop and other Creative Suite software, showed some of what his company has in mind. Specifically, he demonstrated an iPad-flavored incarnation of a flagship Photoshop feature, layers, that arrived on personal computers with Photoshop 3.0 in 1994.

Loiacono was quick to call it just "technology we're looking at," and to not commit to shipping anything, but it's clear Adobe is getting closer to offering something besides the somewhat stripped-down Photoshop Express application for phones and tablets. Photography Bay caught video of Loiacono's demo.

Clearly Adobe is moving from concept toward reality. What's also clear is that a huge number of upstarts also are staking claims in the new tablet realm, where new arrivals have a chance to unseat entrenched players from the PC era.

At the casual end of the spectrum, programs such as Hipstamatic, FX Photo Studio, Instagram, and Picplz let people play with their photos and share them, becoming embedded into people's online lives. For those with a more serious creative bent, Zen Brush, Brushes, Inspire Pro, and Inkpad provide a wealth of imaging options. And for the even more serious, applications like LRpad and Photosmith have the potential to step into serious photographers' lives.

Photosmith is designed to let photographers sort, label, check focus, and add keywords before importing images to Lightroom.

Photosmith is designed to let photographers sort, label, check focus, and add keywords before importing images to Lightroom.


It's not clear yet how far tablets will encroach onto the turf of personal computers, especially when it comes to heavy-duty computing jobs, but it is clear that tablets are finding a prominent place in many people's electronic lives and that their hardware is becoming less feeble.

Layers, which require a lot more memory and processing power, are a staple of photo editing.

They can be used to merge elements of different photos or to adjust the degree to which effects are applied across an image. Parts of one layer can be made selectively transparent, revealing the contents of the layer below, an approach that enables sophisticated and adjustable compositing.

Loiacono showed just that in his demonstration, using, of course, a touch interface. He also showed an image being rotated and scaled quickly with multitouch, though it wasn't clear how large the original image was.

"This is just a concept about how do we take technologies we found in Lightroom and Photoshop and actually extend those to these devices as they become more important to your workflows," he said.

It's good to see Adobe producing something that could bring some of the company's image-editing clout to a mobile-device world world more characterized by quick-effect apps such as Hipstamatic and Picplz. Full-fledged Photoshop or Lightroom is an impossibility today, given the constraints on the processing, memory, and storage of current tablets and phones.

But these devices are growing up, and a host of software companies are finding something useful to do with them even if they're not an eight-core workstation with a dozen gigs of RAM.

One example is LRpad, a $10 app that essentially offloads some Lightroom controls to an iPad's touch controls. It connects over Wi-Fi to a PC that's the brains of the operation.

LRpad, connected to a PC running by Wi-Fi, acts as an auxiliary control panel for Adobe Lightroom.

LRpad, connected to a PC running by Wi-Fi, acts as an auxiliary control panel for Adobe Lightroom.

(Credit: LRpad)

Another example of innovation around Adobe is Photosmith, in beta testing now. With it, photographers can do some of the Lightroom photo management chores before they bring photos into a PC.

"Photographers can take their pictures in the field, download them to the iPad, and use Photosmith to review their images, add to custom collections, filter by certain criteria, assign metadata, and filter by that data. Photosmith also fills a critical gap in the photographer's current mobile workflow, allowing full 1:1 zoom of even 21-megapixel raw images," the developers say of the application.

Taking photos an extra round trip through a tablet sounds a bit like extra work to me, even with Apple's Camera Connection Kit and the arrival of CompactFlash and SD memory card readers for the iPad, but perhaps it need not be such a hassle. Tethering--in which photos are sent directly to a computer rather than to a memory card--is getting more sophis

ticated as computers get integrated into photography work patterns. And Wi-Fi and Bluetooth are becoming more common in devices, as well. With this sort of technology, a tablet could perhaps become an automatic way station rather than a side trip.

One profound change, of course, is that tablets use a touch screen. That can provide artists a more direct connection to their work, but it also misses the precision of something like a relatively expensive screen-enabled Wacom Cintiq tablet that uses a pen. Even there, though, options exist, such as Ten One Design's Pogo Sketch stylus to improve tablet precision beyond the finger-painting level.

In addition, for travelers for whom weight is a problem, a tablet could be a lighter but still capable alternative to a laptop for screening photos--not to mention the fact that it's more useful for e-mail, apps, and Web use than a portable hard drive that merely stores your photos until you get to a computer.

I'm expecting Adobe to bring more than one product to this market--not a more grown-up alternative to Photoshop Express, but more. What exactly the company will come up with remains to be seen, but Nack has hinted there's work afoot.

One person earlier this year remarked of Photosmith, "It's tough not to ask why this wasn't something Adobe created."

Nack responded, "Indeed, but the time is not yet right to answer." With all the challengers to Adobe's stronghold, it looks to me like now would be a good time to supply that answer.


Tuesday, March 15, 2011

The White House will be revised Copyright Law

The White House worried about copyright law in the U.S., so that today the White House proposes to revise and make sweeping against copyright law in the U.S. Including making "illegal streaming" of audio or video a federal felony and allowing FBI agents to wiretap suspected infringers .

In a 20-page white paper (PDF), the Obama Called on the U.S. administration Congress to fix "deficiencies That Could Hinder enforcement" of intellectual property laws. Victoria Espinel, the first Intellectual Property Enforcement Coordinator, with Vice President Joe Biden During an event last year

The report was Prepared by Victoria Espinel, the first Intellectual Property Enforcement Coordinator, WHO received Senate confirmation in December 2009, and represents a broad tightening of many forms of intellectual property law, Including That ones deal with Counterfeit pharmaceuticals and overseas royalties for copyright holders.

Some of the highlights:

• The White House is Concerned That "illegal streaming of content" May not be Covered by criminal law, saying "questions have arisen about whether streaming constitutes the distribution of copyrighted works." To resolve That ambiguity, it wants a new law to "clarify That infringement by streaming, or by means of other similar new technology, is a felony in Appropriate circumstances."

• Under federal law, wiretaps May only be conducted in Investigations of serious crimes, a That list was expanded by the 2001 Patriot Act to include offenses Such as the material support of terrorism and use of weapons of mass destruction. The administration is proposing to add copyright and trademark infringement, arguing That move "Would assists U.S. law enforcement agencies to effectively investigate those offenses."

• Under the 1998 Digital Millennium Copyright Act, Generally it's illegal to distribute hardware or software - Such as the DVD-decoding Handbrake software available from a server in France - that can "circumvent" copy protection technology. The administration is proposing That if Homeland Security seizes circumvention devices, it be Permitted to "inform rightholders," "Provide samples of Such devices," and assists "Bringing Them in civil actions."

The term "fair use" does not Appear anywhere in the report. But it does mention Web sites like The Pirate Bay, the which is hosted in Sweden, Pls warning That "foreign-based and foreign-controlled Web sites and Web services raise particular concerns for U.S. enforcement Efforts." (See previous coverage of a Congressional hearing on overseas sites.)

The usual copyright hawks, Including the U.S. Chamber of Commerce, applauded the paper, the which grew out of a so-called joint strategic plan That Vice President Biden and Espinel Announced in June 2010.

Rob Calia, a senior director at the Chamber's Global Intellectual Property Center, said we "strongly support the white paper's call for Congress to clarify That criminal copyright infringement through unauthorized streaming, is a felony. We know both the House and Senate are looking at this issue and encourage Them to work closely with the administration and other stakeholders to combat this growing threat. "

In October 2008, President Bush signed into law the so-called Pro IP ACT, the which created Espinel's position and Increased penalties for infringement, after expressing its Opposition to an Earlier Version.

Unless legislative proposals - like one Nearly a decade ago implanting strict copy controls in digital devices - go too far, digital copyright tends not to be a particularly partisan topic. The Digital Millennium Copyright Act, near-universally disliked by programmers and engineers for its anti-circumvention section, was approved unanimously in the U.S. Senate.

At the Same time, Democratic politicians tend to be a bit more enthusiastic about the topic. Biden was a close Senate ally of copyright holders, and President Obama picked the copyright industry's top lawyers for Justice Department posts. Last year, Biden warned That "piracy is theft."

No Less than 78 percent of political contributions from Hollywood Went to Democrats in 2008, the which is broadly consistent with the trend for the last two decades, According to OpenSecrets.org.

Internet Explorer 9 for windows 7

For those of you who use Windows XP, you will not be able to use Internet Explorer 9 because Internet Explorer will not support on Windows XP and the only support in Windows 7.

Microsoft's official explanation for why Internet Explorer 9 does not support Windows XP, the operating system runs on an Estimated That 40 percent to 50 percent of the world's computers, Is That the graphics card-powered hardware acceleration that helps the browser loads pages faster doesn 't work properly with the device drivers on Windows XP. However, at least one other browsers, Firefox 4 release candidate 1, offers full hardware acceleration across multiple operating systems, Including Windows XP.

The lack of support for Windows XP aside, Internet Explorer 9 is a fantastic browser Pls compared with its predecessors, and competitive against its toughening Rivals. The browser offers Some great new features, Such as pinned sites, a revamped search box, and add-on performance impact notifications.

Pinned sites create a tighter integration Between the browser and desktop by creating site-specific browsers. Drag a tab onto the desktop Windows 7 taskbar, and depending on the site developer's coding cans you get the jump site-specific lists, unread e-mail notifications, or streaming media player controls. Other major sites have pinned That integration include Groupon, CNN, Pandora, Hulu, Slacker, Facebook, Twitter, and eBay.
Meanwhile, the new unified search box manages to include all the functionality of the old search box, such as changing search providers on the fly, while introducing on-the-fly searching so that as you type you see a relevant list of Web results, bookmarks, and browsing history.

The add-on performance notification is a small but useful feature that warns you when an add-on is slowing down the browser. You can customize what level of impact is warned for, too.

The performance of the browser itself has been lauded since last year when Microsoft rolled out developer's previews. Over the course of the following year, the developer's previews, betas, and release candidate version of IE 9 were downloaded more than 25 million times, and amounted to around 2 percent of all installed versions of Internet Explorer on Windows 7 by the time the release candidate was published.

Thursday, February 10, 2011

Verizon iPhone New Gadget from Apple



After waiting a long time Apple finally released the iPhone Verizon Wireless, and the day will also be immediately available at retail stores
Apple and Verizon Wireless stores, along with Best Buy and selected Wal-Mart stores, will from from the Verizon start selling iPhones at 7 pm local time. And even with a high of 28 degrees forecast for New York City, eager iPhone fans are expected to line up around the block at stores Throughout the city.

It's unclear how many iPhones will from from today be available. Apple and Verizon Quickly sold out of the initial batch of iPhones That the resource persons were the resource persons made available through a presale to Verizon customers last week. In fact, Verizon said that demand for the iPhone surpassed any other previous four launch smartphone on its network, Including the hotly anticipated Motorola Droid and Droid X, as well as the HTC Incredible.

In an effort to move the sales process along more Quickly, Apple has been taking online reservations for customers buying the phone in its retail stores. Customers with reservations pick up Cans reserved Their after-noon iPhones in Apple stores.

But Some people, of course, just like the Thrill of waiting in line. That's why many journalists is sending out a crew of Reporters and photographers to document the Occasion. I'll be on location at the Apple Cube on Fifth Avenue in New York City, updating a blog with pictures and snippets from the crowd. Also I'll be in front of the camera putting together a story this rberita fo.

Daniel Terdiman be Earnest Also contributing to the blog from the West Coast, he will from of Nowhere Provide commentary from the Apple scene in San Francisco. For the latest news and pictures from the Verizon iPhone launch, bookmark this page and be sure to check back early Thursday morning and Throughout the day.

The Apple store on Fifth Ave. in New York City the morning of the Verizon iPhone 4 launch.

New York 6:50 a.m. ET: It's 18 degrees here in New York City, and there are now eight people in line at the Fifth Ave. Apple store. Queens resident Akira Sawada, 32, is first in line--he arrived at 5 a.m. There are more Apple employees inside the Apple store than there are outside.


Apple Store, Manhattan, early a.m.

Chilly scenes of winter at the Apple store in Manhattan, shortly before the doors open.

(Credit: Wilson Tang/CNET)

New York 7:07 a.m. ET: People are in the Apple store. The line of about 10 people was quickly ushered in at 7 a.m. We are now waiting to talk to people who are walking out of the store.

New York 7:30 a.m. ET: Apple is not letting press into the store. But I went in as a "shopper." It was filled with at least a hundred Apple employees in blue shirts, who were on hand to help customers buying and activating their new phones. Apple is not allowing any photography inside the Apple store.

Apple had more staff on hand than there were customers for the Verizon iPhone 4 on launch day.

(Credit: CNET/Sarah Tew)

New York 8:05 a.m. ET: The first Verizon iPhone customers started trickling out of the store about 20 minutes after the doors opened. I talked to Rominel Peguero of Manhattan. He was fourth in line and stood in line for about a half hour before the doors opened. He said he has never in stood in line for anything before. But he was afraid that Verizon and Apple would run out of phones, since they sold out during the pre-sale last week. He said he was going out of town tonight and wanted to make sure he got his new phone today.

The 10 or so customers who were waiting in line to buy the Verizon iPhone 4 head into the store at 7 a.m. ET in New York City.

New York 8:15 a.m. ET I apologize for not updating this blog more frequently. It's about 20 degrees in New York City. And my fingers have been so cold that I wasn't able to type for very long. Also, as I mentioned there were only a handful of people in line at the store, so there wasn't much to report. But I am now in a warm diner a few blocks from the Fifth Avenue store. My fingers are warm now, so I'm able to type once again. Apple clearly was expecting more of a crowd this morning. As I mentioned earlier, the Apple staff way out-numbered actual Verizon iPhone 4 customers. I guess we finally have the answer to the question: What will keep people from standing in line for a new iPhone on launch day? It looks like 20 degree temperatures.

CNET reporter Maggie Reardon was blogging about the Verizon iPhone 4 launch outside the Apple store in New York City on Fifth Avenue in freezing temperatures.

New York 9:00 a.m. ET: I'm officially warmed up and ready to brave the cold city streets again. I will be moving uptown to the Apple store on the Upper West Side. I'll also check out some Verizon stores here in New York City to see how the crowds are. My colleague Daniel Terdiman will also provide updates from San Francisco. So stay tuned. We'll see if the Verizon iPhone frenzy is bigger in a warmer climate.

San Francisco 6:40 a.m. PT: Well, here at the flagship Apple Store in San Francisco, you'd have to say it's not just cold weather that's keeping people from lining up to buy the Verizon iPhone. Upon arriving here about five minutes (before the 7 a.m. opening of the store), there were literally more Apple Store employees, police officers and reporters--each--than people in line to buy iPhones.

Few people were waiting in line for the Verizon iPhone in San Francisco on Thursday morning. And the weather cannot be blamed.

Indeed, there were only two people in line when I arrived.

Justin Roi, a 27-year-old San Francisco resident was first in line, and he got here just 50 minutes before the store's opening. In fact, he assumed he'd be in line for quite a while--he brought a chair to sit in while the line would presumably work its way slowly into the store.

This, of course, is quite a turn of events from the usual Apple product launch, where there are usually tons of people lined up to be among the first to buy whatever Steve Jobs and Co. have to offer.

In Roi's case, this is his first iPhone--AT&T or Verizon. "I was [waiting for Verizon]," Roi said. "I've had a lot of crappy phones from Verizon. Now I'll be moving up to iPhone."

But Roi also said he was surprised at the lack of people in line--thus his chair. Actually, he said, as he rounded the corner near the Apple Store and saw very few people waiting, he thought that all the iPhones were already sold out.

But, that's not the case. As in New York, the lines were short, but Apple can't blame frigid weather here.

On the other hand, we've heard that the Verizon store nearby has a bit longer line--so I'm going to head over there right now and see if there's more of a scene. If not, or even if there is but it's significantly smaller than the usual Apple product launch line, I think we'll be able to say that the hype surrounding the Verizon iPhone may, for perhaps the first time in recent Apple launch memory, have been just that--hype.