Enterprise E-mail Governance – Best Practices for Retention and Discovery
ISACA Denver September Meeting September 21, 2006
... Enterprise Email Governance is a set of best practices to ensure companies are taking "best and reasonable efforts" to manage risks and costs. The process is simple: consider email usage, archiving, and threats and then assess, educate, enforce, and repeat.
“You love the company. You want to work harder. You will ask for a cut in pay.”
Subliminal Spam Using an Animated GIF
Posted by kdawson on Monday September 04, @03:47PM from the you-are-getting-sleeeeepy dept. Spam
JohnGrahamCumming writes "Everyone's noticed the recent flood of image spam (including the SpamAssassin developers who are working on an OCR-extension to beat it), but take a look at this spam containing a subliminal message flashed every 17 seconds to try to entice you to buy the stock being pumped. Does this work? Warning: link shows the actual spam; don't blame me if you lose money on this stock!"
This has possibilities... Will you be able to scan the Google books and convert the PDFs to text?
Google Releases Tesseract as Open Source
Posted by ScuttleMonkey on Monday September 04, @11:27PM from the bit-rot dept. Google Software
An anonymous reader writes "Google recently released Tesseract as open source. Originally developed at the HP Labs from 1985-1995, it has been touted as one of the most accurate Optical Character Recognition (OCR) programs available. Having sat on the shelf gathering dust for so many years, Google cleaned up some of the more outdated portions of the code and released it for general consumption. You can download Tesseract over at Sourceforge.
Remember, boneheadedness is catching...
Canadian Copyright Group Seeks To License the Net
Posted by ScuttleMonkey on Tuesday September 05, @03:42AM from the everyone-wants-a-piece dept. The Internet
An anonymous reader writes "A new Toronto Star article from Michael Geist not only describes why Canadian Ministers of Education are pushing a copyright proposal that will harm Internet access, but also reveals how a copyright group is seeking to create a new license for Internet content. Access Copyright, a copyright collective, wants to use a new international text standard to license everything from books to blogs. Geist outlines in his blog how Canadians can fight back against these bonehead proposals."
Got something to say?
Free Podcasting Program Hectic but Fun
By John P. Mello Jr. TechNewsWorld 09/05/06 4:00 AM PT
If you're looking to try your hand at podcasting, WildVoice's intriguing combination of next-gen Web presence and entertaining software provides a delightful way to start. The studio program is geared toward real time mixing. That means you're mixing sound as you talk. That can get kind of hectic, but when you get the hang of it, it's a lot of fun.
So all this hype about podcasting has tickled your curiosity, but you haven't a clue where to start. Try WildVoice.
WildVoice, currently in beta, is a Web site designed for creating and hosting podcasts.
Not only can you create podcasts directly at the site, but WildVoice offers free audio mixing software to produce shows from your desktop that later can be uploaded to the Web.
Web Site Gratis
When you register with the service, a Web site is produced automatically for you. Among its features are a profile page, home page and blog.
Adobe upgrading e-learning presentation software
Captivate 2 boasts workflow
By Paul Krill September 04, 2006
Adobe Systems on Tuesday is announcing Adobe Captivate 2, an upgraded version of its Flash-based software for developing computer-based demonstrations and interactive simulations.
Geared to e-learning professionals, trainers, and others who provide computer-based instruction, Captivate 2 generates interactive content in Flash and does not require users have programming knowledge or multimedia skills, Adobe said.
... Available on October 5, Adobe Captivate 2 costs an estimated $599. Registered users can upgrade for an estimated price of $299.
Panasonic recalls laptop batteries
Recall begins in Japan of around 6,000 battery packs because problems with their latch could lead to overheating
By Martyn Williams, IDG News Service September 05, 2006
Matsushita Electric Industrial Co. (Panasonic) is recalling several thousand laptop computer battery packs because mechanical problems with the pack's latch could lead to overheating of the battery.
The recall applies to around 6,000 battery packs that were shipped with its CF-W4G Let's Note W4 laptop computers in April and May of 2005, the company said Tuesday. The recall only applies to machines shipped in Japan.
The problems arise if the owner sometimes drops the machine or sets it down on a table very roughly, said Akira Kadota, a spokesman for the company in Tokyo. On such occasions the small spring in the latch can penetrate the battery pack and cause a short circuit that leads to overheating, he said. Panasonic has documented two cases to-date of this happening with the battery packs under recall.
"This is very different from the Sony case," he said referring to recent recalls by Dell and Apple Computer of almost 6 million battery packs containing Sony-made cells. Sony said the presence of metallic particles inside the battery meant there is a chance that the cells could overheat and catch fire under certain circumstances.
The cells in the batteries under recall were not made by Sony or Panasonic, said Kadota. He wouldn't name the battery maker.
Panasonic has posted details of the recall on the Internet in Japanese at: http://askpc.panasonic.co.jp/info/info_w4.html.
September 04, 2006
Researchers Announce "Phoolproof Phishing Prevention"
Press release: Carnegie Mellon CyLab researchers create new system to address phishing fraud [ZDNet]
Phoolproof Phishing Prevention - Bryan Parno, Cynthia Kuo, Adrian Perrig: "Phishing attacks exploit a user’s inability to distinguish legitimate websites from spoofed websites. Unfortunately, humans are ill-suited for performing the security checks necessary for secure site identification. Phoolproof Phishing Prevention uses a trusted device to perform mutual authentication that eliminates reliance on perfect user behavior, thwarts Man-in-the-Middle attacks after setup, and protects a user’s account even in the presence of keyloggers and most forms of spyware."
Just a brief note En passant...
gwjc submitted by gwjc 9 hours 16 minutes ago (via http://www.chesscorner.com/tutorial/learn.htm )
Nice collection of tutorials for beginner and intermediate players.
Most have far broader implications...
digitalgopher submitted by digitalgopher 11 hours 9 minutes ago (via http://www.eskimo.com/~hottub/software/programming_quotes.html )
Here's a compilation of several programming-related quotes.
[I want the following quotes on T-shirts...
It's hard enough to find an error in your code when you're looking for it; it's even harder when you've assumed your code is error-free. Steve McConnell Code Complete
Once a new technology starts rolling, if you're not part of the steamroller, you're part of the road. Stewart Brand
Computers are good at following instructions, but not at reading your mind. Donald Knuth
The trouble with the world is that the stupid are cocksure and the intelligent are full of doubt. Bertrand Russell
Programmers are in a race with the Universe to create bigger and better idiot-proof programs, while the Universe is trying to create bigger and better idiots. So far the Universe is winning. Anon
Another nasty, hiding in plain sight.
Codec promises video, delivers nasties
By Matthew Broersma, Techworld 04 September 2006
Users looking for the latest and greatest video software may not just be in danger from media lawyers. Security firm Panda Software last week warned that zCodec, which claims to offer "up to 40 percent better (video) quality", is in fact an adware program that can install Trojans, rootkits and other malicious software.
zCodec is freely available online and, as of Monday afternoon, was easy enough to find, offering downloads from its own website - zcodec.com.