Category: Internet/Web

Could Your Computer Be Infected by Blackshades? 0

Could Your Computer Be Infected by Blackshades?

I recently saw Miss Teen USA Cassidy Wolf’s interview on CNN. She was among the half million people around the world who fell victim to the Blackshades malware, also known as “Creepware.” This malware...

How to Configure Your Windows Server to Use an External Time Source 0

How to Configure Your Windows Server to Use an External Time Source

Having the same time on all your Windows servers is extremely important. Microsoft Exchange, SQL Server, and Active Directory all rely on the Time Service (W32Time). The Kerberos authentication protocol in Windows also relies...

City of Seattle to develop an ultra high-speed fiber network 0

City of Seattle to develop an ultra high-speed fiber network

Seattle’s Mayor Mike McGinn just announced to the public that the City of Seattle will develop an ultra-fast broadband network. This is exciting news for both Seattle’s businesses and residents. The City of Seattle...

Maritime VSAT Connectivity Solution 0

Maritime VSAT Connectivity Solution

How do you connect to the rest of the world when you are out on the sea in the middle of nowhere? Well, vessels at sea can now operate as remote offices and enjoy...

List of Web Sites That are Inaccessible in Internet Explorer 8 0

List of Web Sites That are Inaccessible in Internet Explorer 8

Internet Explorer 8 (IE), which is the default browser in Windows 7,  has been reported by the general public as one of the most problematic versions of browser in years. People are reporting that...

General resources and tips for IT Pros 0

General resources and tips for IT Pros

My students are often looking for good technical resources and tools for troubleshooting. In general, here are my recommendations when it comes to looking for answers on the Web, especially if you are a...

Google Chrome is a Security Nightmare 0

Google Chrome is a Security Nightmare

You may have heard about Google’s new browser called Chrome. I thought about installing it so I can evaluate it. But then I thought about all the privacy violations that Google has been criticized...

Goodbye Google, Hello Live Search! 2

Goodbye Google, Hello Live Search!

In July I wrote an article Microsoft Surges with TechNet/MSDN Search. In that article I documented my observations, talked about some cool features and listed the areas that needed improvement. Microsoft has been making...

IRS finds unauthorized Web servers connected to its networks 0

IRS finds unauthorized Web servers connected to its networks

NextGov has reported on the security issue that concerns not just the folks at the Internal Revenue Service (IRS) but all of us who pay taxes in the U.S. “The Internal Revenue Service found...

How to Change the Host Header of a MOSS Site 3

How to Change the Host Header of a MOSS Site

If you’ve configured your SharePoint site with a specific URL (host header), e.g. http://webportal and then later decided that you want to change it to another URL, such as sharepoint.seattlepro.com, you can use the...

World Wide Telescope from Microsoft Research 0

World Wide Telescope from Microsoft Research

Okay, so you know all about World Wide Web (WWW) or else you won’t be reading my blog but have you heard about World Wide Telescope (WWT) from Microsoft Research? Microsoft defines WWT as...

Google excluding controversial sites 0

Google excluding controversial sites

Google, the world’s most popular search engine, has quietly deleted more than 100 controversial sites from some search result listings. Absent from Google’s French and German listings are Web sites that are anti-Semitic, pro-Nazi...

Make free long distance calls anywhere in USA and Canada with magicJack 6

Make free long distance calls anywhere in USA and Canada with magicJack

I recently ordered this new gadget called magicJack that can be used to make free long distance calls anywhere in USA and Canada without a phone service or even a telephone set. You do,...

Peer-to-Peer File-Sharing and Copyright Infringement: Are You Vulnerable? 0

Peer-to-Peer File-Sharing and Copyright Infringement: Are You Vulnerable?

Here’s some useful information posted by the University of Washington regarding peer-to-peer file-sharing issues. 1. Peer-to-Peer File-Sharing: What is the risk? Every day, millions of computer users share files online. Whether it is music,...

Compressing GIF or JPEG Graphics in Photoshop CS3 0

Compressing GIF or JPEG Graphics in Photoshop CS3

If you are working with graphics on your Web site, it is a good idea to compress them so they will be smaller in size and will load quickly in the browser. Author John...

Still Driving to a PO Box? Get Your Mail Online! 0

Still Driving to a PO Box? Get Your Mail Online!

A Seattle-based company called Earth Class Mail is offering individuals and businesses an interesting mail service. Currently people in more than 100 countries are using their service. The company calls the online postal service...

Privacy International Ranks Google as “hostile to privacy” 0

Privacy International Ranks Google as “hostile to privacy”

Privacy International (PI), a human rights research and campaign organization, prepared a report following a six-month investigation into the privacy practices of key Internet-based companies. The following companies listed in alphabetical order were included...

How to Edit a Web Site on a 64-bit Windows Server 2003 Using Expression Web 2

How to Edit a Web Site on a 64-bit Windows Server 2003 Using Expression Web

Can’t edit a Web site on a 64-bit Windows Server 2003 using Microsoft Expression Web (EW)? Microsoft has replaced FrontPage with EW. Many administrators who were running FrontPage server extensions on 32-bit Windows Server...

The “File Download – Security Warning” dialog box opens when you try to open Internet Explorer 7 0

The “File Download – Security Warning” dialog box opens when you try to open Internet Explorer 7

On May 10, I discussed a problem with opening Internet Explorer. Microsoft has posted a KB article that discusses the possible solution. Microsoft has confirmed that the problem is caused by the May 2007...

What is Strider “HoneyMonkey”? 0

What is Strider “HoneyMonkey”?

The Strider HoneyMonkey Exploit Detection System, as the research project is code-named, was created to help detect attacks that use Web servers to exploit unpatched browser vulnerabilities and install malware on the PCs of...