Apple’s New MagicMouse
The Next Generation Of Mouse Is Here
The new “Touch” (aka “Multi-touch”) technologies are all the rage, letting people use multiple fingers to zoom, pinch and manipulate objects on their computer screen.
About a week or so ago, an alert reader sent me a heads up on recent developments in Multi-touch technology, and how Microsoft had several prototype Multi-touch mouse designs in development. I posted an article on this, which included a video, so you could see how a multi-touch mouse might work (see, The Next Generation Of Mouse).
But clearly the fact that I deal primarily with Windows computers was showing, as Apple has a multi-touch mouse out already — called the MagicMouse ($69) and I must say, it is very “kewel”. This video shows it in operation…
I believe it safe to say that this is the future of mice…and Mac users needn’t wait to get the latest thing in PC peripherals and cool gadgets — it’s here now.
Copyright 2007-9 © Tech Paul. All rights reserved. post to jaanix
Share this post : | ![]() |
![]() |
![]() |
![]() |
![]() |
![]() |
![]() |
![]() |
![]() |
![]() |
The Next Generation Of Mouse
The Next Computer Mouse *May* Use “Touch” Technology
Well folks, it’s good to be back after WordPress “had some issues” (the first real problem in over 2 years).. Today, I am going to post a video which was brought to my attention by an alert reader. I found it quite interesting as the PC mouse has not changed much in decades, and one doesn’t think of “mouse” when they think of “revolutionary”.. at least, I didn’t.
The video features 5 prototype mice being developed at Microsoft Research; and it gives us a possible glimpse into the future — a future with no ‘clicking’ apparently. The mice are being used to determine how to best bring Touch Technology to us “average computer users”.. as some of us are going to resist the idea of touching our PC monitors (me, for one).
“Touch” (aka “Multi-touch”) technologies are all the rage, letting people use multiple fingers to zoom, pinch and manipulate objects on screen in everything from the iPhone to Microsofts upcoming Windows 7.
Copyright 2007-9 © Tech Paul. All rights reserved. post to jaanix
Share this post : | ![]() |
![]() |
![]() |
![]() |
![]() |
![]() |
![]() |
![]() |
![]() |
![]() |
Watch How a "clickjacking attack" Works
Folks, how would you feel about an invisible element planted on a webpage being used to infect your machine? Steal your logins? Turn on your webcam and surreptitiously snap pics of you?
Does that sound far–fetched? Well, it isn’t science fiction. It is the cybercriminal attack called “clickjacking“. This video from TechRepublic demonstrates a “clickjack”, how easy it is for the hacker, and what you can do to protect yourself.
Vodpod videos no longer available.
Yes. They really are doing this.
Today’s free link: To learn more about online dangers and how to protect yourself (and your machine) while you surf the Web, please see, Don’t Know These Basic Computer Security Precautions? -You’re In Trouble.
Today’s free download: (Today’s is a service, not a download) Monkey On Your Back is your to-do list for things that you want other people to do. Create a monkey for each task you want to delegate to someone else. We’ll send that person email reminders about the task, and email you a reminder when the deadline for the task has expired.
Copyright 2007-9 © Tech Paul. All rights reserved. post to jaanix
Share this post : | ![]() |
![]() |
![]() |
![]() |
![]() |
![]() |
![]() |
![]() |
![]() |
![]() |
Video Demonstration of Poisoned Search
Cybercriminals are manipulating the Internet to cause their poison websites to appear at the top of search results.
When people click the link, a bogus “scareware” window opens, as I have warned about in several prior articles.
(please see Security Alert — An Infection Has Been Detected!)
This installs a “rogue” anti-malware application. This video from security firm Panda Security shows exactly how this is done, and in this case, the criminal is trying to install MS Antispyware 2009.. which is just one of the thousands of these “rogues”.
I highly recommend that you watch it, as it is showing you two (increasingly common) attacks.. and exactly how a “rogue” looks and acts.
Vodpod videos no longer available.
Please note: I have one, MAJOR, complaint about this video: it pretty much says that if you have an up-to-date anti-malware (such as an antivirus) on board, you’ll be protected from these things. WRONG! Once you click the links, ignore the the warnings, and click “Run”.. you’re hosed. (And you did it to yourself.)
Telling your machine to ‘run it’ bypasses all your protections.. even Vista’s annoying UAC.
Today’s free link: ErrorRepairTOOL Computer Infection? – Blame Your Search Engine!
Today’s free download(s): The best defense is to NOT click “Run” when you’re not sure. But there are tools you can add to your web browser to help you detect and avoid these poisoned websites in the first place — known as “anti-phishing”. I suggest installing both:
WOT: (Web Of Trust) is a free Internet security add-on for your browser. It will help keep you safer from online scams, identity theft, spyware, spam, viruses and unreliable shopping sites. WOT warns you before you interact with a risky Website. It’s easy and it’s free.
Link Scanner Lite: Automatically inspect search results for exploits, hacked sites, fraud/crimeware, and other online threats. Includes right-click, on-demand scanning of any URL you choose.
Copyright 2007-9 © Tech Paul. All rights reserved. post to jaanix
Share this post : | ![]() |
![]() |
![]() |
![]() |
![]() |
![]() |
![]() |
![]() |
![]() |
![]() |
Security Alert — An Infection Has Been Detected!
Online crime is bigger than the global drugs trade¹. The Internet shadow economy is worth over $105 billion. No country, no person, no business and no government is immune from CyberCrime.
Currently there is an epidemic of fake anti-malware software on the Internet– which is collectively called “rogue anti-malware“ and/or “scareware”. Marketed under hundreds of different names, such as VirusRemover 2008 and Antivirus XP 2009, this type of rogue software scares people by giving false alarms, and then tries to deceive them into paying for removal of non-existing malware. [update: some of the newer ones are now encrypting your files, and requiring a ‘ransom’ for the key. Don’t pay. There is help online.]
This video shows what happens when a legitimate Website gets infected and redirected to one of these bogus anti-malware scams.
Yes, folks, legitimate websites are being ‘hacked’. (It’s called “poisoned”.)
The people behind this scourge use many different ways to try to entice you to click – realistic looking pop-up windows appear, offers of “free trials” arrive in e-mail, and “free scan” buttons on legit-looking ‘fight malware’ websites.. the means are quite varied!
As this video shows, the user is tricked into (scared into, really) providing their credit card # to clean infections that weren’t there before they clicked and aren’t really there now.
* The ‘false positives’ are not “cleaned” BUT, more adware and spyware is installed.
* A good percentage of my calls at Aplus Computer Aid are folks needing help with getting rid of these rogues. Because these clever programs use the latest techniques to combat removal, and it can be quite tough — if not impossible — to truly remove them.. without formatting your hard-drive.
* For more, please read Is that anti-spyware program really spyware?
* One Website dedicated to combating this epidemic is Spyware Warrior. It has a pretty good list of known rogues, and much more detailed information. Another excellent resource is Bleeping Computer.
* I have written several How-To’s on protecting yourself from malware, and how to clean your machines as well. Click here to see those titles.
¹ From a recent MessageLabs whitepaper. (This eye-opening report provides a disturbing look into the ‘dark’ world of cyber-crime. This link is the online version.. you need to scroll a bit..)
Today’s free download: WOT (Web Of Trust) is a free Internet security add-on for your browser. It will help keep you safer from online scams, identity theft, spyware, spam, viruses and unreliable shopping sites. WOT warns you before you interact with a risky Website. It’s easy and it’s free.
- Ratings for over 22 million websites
- Downloaded over 4 million times
- The WOT browser addon is light and updates automatically
- WOT rating icons appear beside search results in Google, Yahoo!, Wikipedia, Gmail, etc.
- Settings can be customized to better protect your family (new “Parental Control” setting blocks access to Web sites with a poor child safety rating and no rating at all)
- WOT Security Scorecard shows rating details and user comments
Copyright 2007-9 © Tech Paul. All rights reserved. post to jaanix
Share this post : | ![]() |
![]() |
![]() |
![]() |
![]() |
![]() |
![]() |
![]() |
![]() |
![]() |
Financial Phishing Attacks On The Rise
Cyber-criminals have been capitalizing on the global financial crisis in the past several weeks by increasing the volume of phishing and spam messages being sent.
These emails are not much different from older attacks, but because they are topical and look authentic, nervous consumers are at risk for falling for the scam.
Internet users should be on alert for fake emails that look as if they have come from an authentic financial institution. These phishing messages are seeking personal information – account numbers, passwords and Social Security numbers – which cyber-criminals will use to empty out accounts, and then sell on the underground market.
These e-mails (usually) contain links which take you very legit-looking login websites, which in fact are created by the crook. This short video from the good folks at WOT demonstrates how this works.
Tip of the day: Follow these security tips to get protection from phishing attacks:
- Review your financial account statements as soon as you receive them
- Financial institutions never require customers to give account information via email. If you receive an email requesting this data, don’t reply.
- Use anti-virus and anti-spyware software and update them regularly.
- Use a firewall.
- Use WOT as preventative protection against online threats to avoid spyware, browser hijacking, identity theft, phishing and other Internet scams.
- Always be suspicious of e-mail, and never click the link.
Today’s free download: Yes, this is a repeat; but if you haven’t downloaded the WOT browser plug-in, maybe today you’ll go ahead and give it a try. Why not? It’s light-weight, effective, easy to understand, and free!
Copyright 2007-8 © Tech Paul. All rights reserved. post to jaanix
Share this post : | ![]() |
![]() |
![]() |
![]() |
![]() |
![]() |
![]() |
![]() |
![]() |
![]() |
![]() |