Drop by the forums, but don't miss the Eastern Conference final!

Subject: Editorial, General Tech | May 27, 2011 - 10:41 PM |
Tagged: friday, forum

Our Tech Talk Forum is a great place to hang out and discuss general technology questions, such as the eternal question of which screwdriver to use, since we can't get hold of a working Sonic Screwdriver, do you have a preferred electric screwdriver or do you prefer the traditional one like mpulliam and I do?  Perhaps you are more interested in moving to SoCal where NewEgg is apparently opening up a pick up location

Head over to the Processor Forum for speculation on Bulldozer, since the recent leaks have given us a bit more information; or maybe a laugh at the Apple fanatics and the price they pay for the same hardware we use?  Especially considering that while some of their designs are nice, they can never match the imagination of a dedicated modder

There is a lot more inside, take a walk through the forums and see what you can find or even better ... what you can offer!  For a more laid back way to catch up on the latest tech news you should catch the new PC Perspective Podcast, #156 even has Ryan in it!

Interview with Pete Graner, Manager of the Ubuntu Kernel Team

Subject: Editorial | May 27, 2011 - 05:52 PM |
Tagged: ubuntu, linux, kernel, interview, hardware

In a continuation of our effort to embrace and report on the open-source community, PC Perspective has contacted another very interesting Open-Source project. This week we selected Ubuntu and their Manager of the Ubuntu Kernel Team, Pete Graner

 

logo.png

Image courtesy of Ubuntu

The self-described beginning of Ubuntu:

Linux was already established as an enterprise server platform in 2004. But free software was still not a part of everyday life for most computer users. That's why Mark Shuttleworth gathered a small team of developers from one of the most established Linux projects – Debian - and set out to create an easy-to-use Linux desktop, Ubuntu.

The vision for Ubuntu is part social and part economic: free software, available free of charge to everybody on the same terms, and funded through a portfolio of services provided by Canonical.

If you would like to learn more about Ubuntu please click here.

Ubuntu also lists its features as the following:

  • A fresh look

The launcher: Get easy access to your favourite tools and applications with our lovely new launcher. You can hide and reveal it, add and remove apps and keep track of your open windows.
The dash: Our new dash offers a great way to get to your shortcuts and search for more apps and programs. So you can get fast access to your email, music, pictures and much more.
Workspaces: Our handy workspaces tool gives you a really easy way to view and move between multiple windows and applications.

  • Secure

You can surf in safety with Ubuntu – confident that your files and data will stay protected. A built-in firewall and virus protection come as standard. And if a potential threat appears, we provide automatic updates which you can install in a single click. You get added security with AppArmor, which protects your important applications so attackers can’t access your system. And thanks to Firefox and gnome-keyring, Ubuntu helps you keep your private information private. So whether it’s accessing your bank account or sharing sensitive data with friends or colleagues, you’ll have peace of mind when you need it the most.

  • Compatible

Ubuntu works brilliantly with a range of devices. Simply plug in your mp3 player, camera or printer and you’ll be up and running straight away. No installation CDs. No fuss. And it’s compatible with Windows too! So you can open, edit and share Microsoft Office documents stress-free.

  • Fast

Ubuntu loads quickly on any computer, but it's super-fast on newer machines. With no unnecessary programs and trial software slowing things down, booting up and opening a browser takes seconds. Unlike other operating systems that leave you staring at the screen, waiting to get online. And Ubuntu won’t grow sluggish over time. It’s fast. And it stays fast.

  • Accessible

Accessibility is central to the Ubuntu philosophy. We believe that computing is for everyone regardless of nationality, race, gender or disability. Fully translated into 25 languages, Ubuntu also includes essential assistive technologies, which are, of course, completely free. We recommend the Ubuntu classic desktop experience for users with particular accessibility requirements.

 

ubuntu-small.png

(Image courtesy of Distrowatch)

I have used Ubuntu almost as long as I have been using Fedora. Ubuntu has been my go to Linux distrobution since Wartty Warthog. I have installed Ubuntu on laptops, family members computers, and I even went 100% Ubuntu for a year. In my experience, any and all of my questions could be answered by Documentation, Community, and Launchpad.

Now that you have a brief idea about Ubuntu, lets get to the interview:

(Hit that Read More link for the details!!)

Podcast #156 - AMD FirePro V7900 and V5900, MSI R6970 Lightning, Intel i7-990x and more!

Subject: Editorial, General Tech | May 26, 2011 - 06:04 PM |
Tagged: R6970, podcast, nvidia, Intel, firepro, amd, 990x, 990fx

PC Perspective Podcast #156- 5/26/2011

This week we talk about the AMD FirePro V7900 and V5900, MSI R6970 Lightning, Intel i7-990x,Viewer questions and more!

You can subscribe to us through iTunes and you can still access it directly through the RSS page HERE.

The URL for the podcast is: http://pcper.com/podcast - Share with your friends!

  • iTunes - Subscribe to the podcast directly through the iTunes Store
  • RSS - Subscribe through your regular RSS reader
  • MP3 - Direct download link to the MP3 file

Hosts: Jeremy Hellstrom, Josh Walrath and Allyn Malventano

This Podcast is brought to you by MSI Computer, and their all new Sandy Bridge Motherboards!

Program length: 1:02:44

Program Schedule:

Apple Defender: for better and for worse

Subject: Editorial, General Tech | May 26, 2011 - 01:22 AM |
Tagged: Malware, apple

Apple users have been dealing with a bad bout of malware over the last few weeks ironically called Mac Defender. Its modus operandi involves scaring the Apple user with claims of malware in a phony file browser and giving them a magical option to remove all problems. That option is actually the malware, but since the users are convinced they are downloading anti-malware they will often allow it to happen and provide their admin password. At that point, they are prompted to provide their credit card number to actually remove the now-present infection. Apple was actively quiet about the whole experience but has now gone vocal about the experience. Also, a new revision of Mac Defender just got substantially harder to avoid.

 
23-keyboard3.jpg
The most insecure part of your computer.
 
Apple received criticism recently for demanding that their technical support staff would not be able to assist customers suffering from the Mac Defender bug. That stance was apparently leading up to a recent announcement from Apple for how to remove Mac Defender and its known variants as well as a promise to release a software update which will remove and prevent clean users from installing known variants of the malware. This was then offset by the news that a more recent version of Mac Defender, known as Mac Guard, can install without requiring the input of the admin password.
 

It should be noted that admin password or not; Apple or not; patch or not; this form of malware strikes the most vulnerable point of any system: the user’s complacency. It does not matter how good of an antivirus solution you have, or how protected your operating system and programs are (though in many cases both of those are lacking as well) you need to be cautious about what you do with any device that accepts information that is not yours. Food for thought: software that can jailbreak an iPhone steal admin privileges from Apple and give it to you. Even in a locked down system such as an iPhone where the user does not have admin rights, what would have happened had you not been the recipient of the admin privileges?

Source: Ars Technica

PCPer v4.0 Giveaway: ASUS GeForce GTX 570 DirectCU II Graphics Card

Subject: Editorial, General Tech, Graphics Cards | May 23, 2011 - 01:16 AM |
Tagged: gtx 570, giveaway, contest, asus

As you can no doubt tell, PC Perspective got a HUGE and much needed facelift recently to what we are internally calling "PC Perspective v4.0".  I know there are still some kinks to work out and we are actively addressing any feedback from our readers in this comment thread.  

But we want to celebrate the launch of the new site in style!!  Some of our site sponsors have very generously offered up some prizes for us to give out throughout the coming days...

The tenth (!!) prize is a wicked ASUS GeForce GTX 570 DirectCU II card that is a triple-slot design and that supports 3D Vision Surround out of the box!

gtx570cuii.png

What do you have to do to win this wonderful piece of hardware?

Couldn't be easier: post a comment in this post thanking ASUS for its sponsorship of PC Perspective as well as what feature in a graphics card you would most like to see in the future.  Be creative! You should probably have a registered account or at least be sure you include your email address in the appropriate field so we can contact you!

Source: ASUS

Interview with Jared Smith, Fedora Project Leader

Subject: Editorial | May 22, 2011 - 12:41 AM |
Tagged: Red Hat, open-source, open source, linux, Fedora

In a continuation of our effort to embrace and report on the open-source community, PC Perspective has contacted another very interesting Open-Source project. This week we selected Fedora and their Project Leader Jared Smith.

fedora.png

(Image courtesy of Fedora)

Fedora is self-described as:

Fedora is a Linux-based operating system, a collection of software that makes your computer run. You can use Fedora in addition to, or instead of, other operating systems such as Microsoft Windows™ or Mac OS X™. The Fedora operating system is completely free of cost for you to enjoy and share.

The Fedora Project is the name of a worldwide community of people who love, use, and build free software from around the globe. We want to lead in the creation and spread of free code and content by working together as a community. Fedora is sponsored by Red Hat, the world's most trusted provider of open source technology. Red Hat invests in Fedora to encourage collaboration and incubate innovative new free software technologies.

Fedora also lists its features as the following:

  • 100% Free & Open Source: Fedora is 100% gratis and consists of free & open source software.
  • Thousands of Free Apps!: With thousands of apps across 10,000+ packages, Fedora's got an app for you.
  • Virus- and Spyware-Free: No more antivirus and spyware hassles. Fedora is Linux-based and secure.
  • Worldwide Community: Built by a global community of contributors, there's a local website for you.
  • An Amazingly Powerful OS: Fedora is the foundation for Red Hat Enterprise Linux, a powerful enterprise OS.
  • Share it with Friends!: Fedora is free to share! Pass it along to your friends and family, no worry!
  • Beautiful Artwork: Compute in style with many open & beautiful wallpapers and themes!
  • Millions of Installations: Fedora has been installed millions of times. It's a large community to join!

 

fedora-small.png

(Image courtesy of Distrowatch)

I have used Fedora since it was Fedora Core, which has been almost eight years now. Fedora is a community-supported distrobution that is sponsored by Red Hat. Fedora is known for being on the leading edge of technology at the time of shipment. Their release cycle is every 6 months and they are very transparent as to what will be included and excluded. Fedora has a huge community and tries to involve everyone and encourages participation. If you need any help with using Fedora or have any questions, they can be answered by; Frequently Asked Questions (FAQ), Documentation, IRC, and Mailing Lists.

Now that you have a brief idea about Fedora, lets get to the interview:

(Hit that Read More link for the details!!)

PC Perspective Podcast #155 - MSI GT680R Notebook, Corsair 650D chassis, VIA Nano Quad Core and more!

Subject: Editorial, General Tech | May 19, 2011 - 07:24 PM |
Tagged: pcper, podcast, msi, VIA, Nano, quad core, corsair, 650d, Intel

PC Perspective Podcast #155 - 5/19/2011

This week we talk about the MSI GT680R Notebook, Corsair 650D chassis, VIA Nano Quad Core and more!

You can subscribe to us through iTunes and you can still access it directly through the RSS page HERE.

The URL for the podcast is: http://pcper.com/podcast - Share with your friends!

  • iTunes - Subscribe to the podcast directly through the iTunes Store
  • RSS - Subscribe through your regular RSS reader
  • MP3 - Direct download link to the MP3 file

Hosts: Jeremy Hellstrom, Josh Walrath and Allyn Malventano

This Podcast is brought to you by MSI Computer, and their all new Sandy Bridge Motherboards!

Program length: 43:49

Program Schedule:

Source:

Epic Games updates indie developers with May 2011 UDK

Subject: Editorial, General Tech, Mobile | May 14, 2011 - 02:34 AM |
Tagged: udk, ios, game

Indie videogame developers have a great challenge keeping up with the industry. Technology is advancing quickly, the skills required to output games with the quality of the greatest developers keep diversifying, and the time required to detail each part keeps exploding. Though it is highly unlike that the next Call of Duty will come from a single person there are tool developers aiming to decrease the burden for projects of all sizes.

14-UDK.png

Do you think that was an onomatopoeia said by indie devs?

Epic Games released UDK in November 2009 to help developers make their own 3D PC games without needing to develop their own engine and associated toolset or needing to pay a hefty license fee up front. Since then, Epic has added support for iOS development to allow developers to create games for the iPhone, iPad, and iPod Touch. New versions have come out on an approximately monthly basis and May is no different.

This release is incrementally better than previous builds with a few usability tweaks like grouping objects and modifying them together, the ability to copy and paste vertex coloring, and performance importing art assets. As usual a few dozen documentation pages were updated to reflect changes in the game engine. While UDK does not remove the pain of making a good game, it does soften the blow a lot, which is all we got thus far.

Source: UDK

Tidbits from NVIDIA's Q1 conference call

Subject: Editorial, General Tech, Graphics Cards, Processors, Mobile | May 13, 2011 - 10:49 PM |
Tagged: nvidia, conference call

NVIDIA made their quarterly conference call on May 12th which consisted of financial results up to May 1st and questions from financial analysts and investors. NVIDIA chief executive officer Jen-Hsun Huang projected that future revenue from the GPU market would be “flattish”, revenue from the professional market would be “flattish”, and revenue from the consumer market would be “uppish”. Huang did mention that he believes that the GPU market will grow in the future as GPUs become ever more prevalent.

13-1.jpg

How's the green giant doing this quarter? Read on for details.

For the professional market, NVIDIA discussed their intention to continue providing proof-of-concept applications to show the benefit of GPU acceleration which they hope will spur development of GPU accelerated code. Huang repetitively mentioned that the professional market desires abilities like simultaneous simulation and visualization and that a 10% code-rewrite would increase performance 500-1000%, but current uptake is not as fast as they would like. NVIDIA also hinted that GPUs will be pushed in the server space in the upcoming future but did not clarify on what that could be. NVIDIA could simply be stating that Tesla will continue to be a focus for them; they also could be hinting towards applications similar to what we have seen in recent open sourced projects.

For consumers, Huang made note of their presence in the Android market with their support of Honeycomb 3.1 and the upcoming Icecream Sandwich. Questions were posed about the lackluster sales of Tegra tablets but Huang responded stating that the first generation of tablets were deceptively undesirable due to cost of 3G service. He went on to say that the second wave of tablets will be cheaper and more available in retail stores with Wi-Fi only models more accessible to consumers.

13-2.jpg

nVihhhhhhhhhdia. (Image by Google)

The bulk of the conference call was centered on nVidia’s purchase of Icera though not a lot of details were released being that the purchase is yet to be finalized. The main points of note is that as of yet, while NVIDIA could integrate Icera’s modems onto their Tegra mobile processors, they have no intention of doing so. They also stated they currently have no intention of jumping into the other mobile chip markets such as GPS and near-field communications due to the lesser significance and greater number of competitors.

13-3.jpg

I think the new owners like the color on the logo.

The last point of note from the conference call was that they expect that Project Denver, NVIDIA’s ARM-based processor, to be about 2 generations away from accessible. They noted that they cannot comment for Microsoft but they do reiterate their support for Windows 8 and its introduction of the ARM architecture. The general theme throughout the call was that NVIDIA was confident in their position as a player in the industry. If each of their projects works out as they plan, it could be a very well justified attitude.

Source: NVIDIA

Did you know there are 17 year olds who've never seen Johnny Carson live on TV?

Subject: Editorial, General Tech | May 13, 2011 - 10:31 PM |
Tagged: sorry, PC Perspective Forums, friday

After a few weeks hiatus from the Friday Forum Post, as work has been trying to kill me the past few Fridays, we return you to your regularly scheduled link fest.

In the Tech Talk Forum you can peruse a variety of topics, from decent printers to electric screwdrivers.  The Networking & Security folks are researching suspicious problems on a modem while the Hardware Leaderboard Forum is attracting suggestions from readers as well as comments about the Leaderboards its self.  Suggestions for PC builds is not the only user generated content on the Forums, though some posts are longer than others.

If you want to see how you rate against others, there is now a thread in the Overclocking Forum to post your PCMark 7 scores.  Try it out and see if you should be giving pointers or keeping an eye out for hints you can apply, assuming your GPU will cooperate

Even if you have been ridiculously busy that is no reason to neglect the Trading Post, where not only do you get a chance to pick up great kit at even better prices from your fellow PCPers there is the Great Give and Take thread to consider ... or for a completely different kind of give and take, The Lightning Round is still blowing up a storm that you can jump right into!

Interview with Kris Moore, Founder and Lead Developer at PC-BSD

Subject: Editorial | May 13, 2011 - 06:06 PM |
Tagged: pc-bsd, open source, freebsd, bsd

In an effort to embrace the open-source community and to bring to light some of the latest up and coming projects and their advances, PC Perspective has attempted to reach out. We have contacted some of the hottest and most interesting Open-Source projects out there with the intentions of trying to find out more. This week we selected PC-BSD and their Lead Developer and Founder Kris Moore.

 

pcbsd_8_2_webbanner.jpg

(Image courtesy of PC-BSD)

 

PC-BSD is a FreeBSD based Unix-like distribution that has been made very easy to install with lots of software pre-installed like Flash and an easy to install package called, pbi's. PBI's can be installed just like a Microsoft Windows EXE files, by using a click to install.

The PC-BSD is self described as:

PC-BSD is a complete desktop operating system, which has been designed with the "casual" computer user in mind. It offers the stability and security that only a BSD-based operating system can bring, while at the same time providing a comfortable user experience, allowing you to get the most out of your computing time. With PC-BSD you can spend less time working to fix viruses or spyware and instead have the computer work for you.

Installing the system is simply a matter of a few clicks and a few minutes for the installation process to finish. Hardware such as video, sound, network and other devices will be auto-detected and available at the first system start-up. Home users will immediately feel comfortable with PC-BSD's desktop interface, with KDE 4.x running under the hood. Software installation has also been designed to be as painless as possible, simply double-click and software will be installed.

PC-BSD also lists the features as the following:

  • Fully functional desktop operating system, running FreeBSD 8.x® under the hood.
  • Optional 3D desktop effects and acceleration
  • Graphical system installer, makes the system installation process effortless.
  • Support for many native languages.
  • Stability & Performance that only UNIX offers.
  • Safe from Viruses and Spy-ware that plague other systems.
  • Self-Installing software packages, makes loading programs a snap!
  • Graphical tools for system administration and support.
  • Professional E-mail and Phone Support from iXsystems available.
  • Friendly and helpful support community.
  • Online Update Manager - Downloads and installs updates for your operating system, without touching your installed programs.

 

pcbsd.png

(Image courtesy of Distrowatch)

 

I have personally used PC-BSD for a little over a year now and can say that the operating system is very stable, with a few minor hiccups along the way that is not unlike any other distribution. The community is very gracious and courteous and any questions that you may have can either be answered by the forums, via the handbook, or by their IRC (Internet Relay Chat)[#pcbsd].

Now that you have a brief idea of what PC-BSD is lets get into our interview:

(Hit that Read More link for the details!!)

Piracy costs the industry $59 Billlion, BSA reports

Subject: Editorial, General Tech | May 12, 2011 - 11:40 PM |
Tagged: piracy, bsa

Piracy is a sore spot for the entire intellectual property production industry. The infinitely reproducible nature of information creates real challenges for collecting revenue particularly if taken from the mindset of a time where content was much more difficult to copy and theft had to occur for content to be in someone else’s possession.

Slightly NSFW, and Monty Python wouldn't have it any other way.

The Business Software Alliance released last year’s report on software piracy through 2010 and found that piracy has reached the highest level yet. Their report, based on a survey of 15,000 business and consumer PCs (servers were excluded from this survey), claimed that the difference between sales and estimated total dollar value of installed software was $59 Billion.

The sharp increase in piracy shows just how impossible it is to survive in the current mindset of acquiring content for free. Piracy affects content creators both big and small. Analysts fear that a continued mindset of acquiring content for free will devaluate the amount spent on content.

The biggest hurdle towards tackling piracy is confusion between revenue and control. Control is a resource that is not free and implicitly paid for by potential market share. A business model that limits your market without increasingly monetizing the control you gain with that model is a total loss. An unfortunate consequence of this confusion is that lost revenue as attributed to a lack of control rather than a superabundance of it. As Gabe Newell discussed with Tippecanoe Valley High School, businesses need to experiment with their business models because theory cannot necessarily be grafted to any given situation. If you are not seeing what you are expecting, it might be because your expectations are incorrect and you should test the market to determine what you should expect.

Source: PCMag

Podcast #154 - Intel Z68 Chipset release, Intel SRT SSD caching technogy, OCZ Agility 3 and Solid 3 and more!

Subject: Editorial, General Tech | May 12, 2011 - 06:30 PM |
Tagged: z68, ssd, srt, solid, smart response technology, smart response, podcast, ocz, Intel, agility

PC Perspective Podcast #154 - 5/12/2011

This week we talk about the Intel Z68 Chipset release, Intel SRT SSD caching technogy, the OCZ Agility 3 and Solid 3, Viewer Questions and more!

You can subscribe to us through iTunes and you can still access it directly through the RSS page HERE.

The URL for the podcast is: http://pcper.com/podcast - Share with your friends!

  • iTunes - Subscribe to the podcast directly through the iTunes Store
  • RSS - Subscribe through your regular RSS reader
  • MP3 - Direct download link to the MP3 file

Hosts: Jeremy Hellstrom, Josh Walrath and Allyn Malventano

This Podcast is brought to you by MSI Computer, and their all new Sandy Bridge Motherboards!

Program length: 1:15:39

Program Schedule:

Source:

The Unity Linux GUI Controversy and Linux Mint's Decision to Stick With Gnome 2

Subject: Editorial, General Tech | May 10, 2011 - 01:06 AM |
Tagged: OS, linux, GUI

With the release of Ubuntu 11.04, a new desktop environment called Unity was released. Unity promised to revamp the Linux operating system’s desktop GUI to be more user friendly and intuitive. There are a multitude of noticeable changes that Unity brings to Ubuntu’s GUI compared to the classic Gnome environment. A new Windows 7 like task bar stretches along the left side of the screen where small icons of running and pinned applications reside. This new application dock is used instead of the traditional Gnome task bar that ran along the bottom of the screen. Also present is a new Ubuntu button that acts as an application launcher where installed programs can be sorted and searched for. Further, there are improvements to the workspace switcher and changes in window management with new hover-to-reveal scroll bars and each application’s (context sensitive) file menus being relocated to the top of the screen. These and other minor changes in the latest Ubuntu release have caused a flood of controversy among both reviewers and users alike.

Pictured:  Unity GUI (Insert:  Ubuntu Classic GUI)

On the positive side of the issue, there are a number of new and long time users of Ubuntu that have embraced the new GUI for it’s new features and design. Many people migrating from Windows 7 or Mac OS will become accustomed to the interface quickly as it works in much the same manner. Further, users of convertible tablet PCs have an easier time of navigating to applications and windows thanks to the larger icons. Touch and digitizer controls on the Dell Latitude XT worked well out of the box without a need to much with drivers, for example.

In contrast, as a newly developed desktop environment, it is less customizable from a user standpoint than the traditional Gnome GUI. Because of this (at the time of writing) restriction on customizability, many self-proclaimed power users have called Unity a step backwards in the aspects that make Linux a desirable OS--the ability to customize. Mainly, they dislike the constraints that Unity places on their ability to customize the operating system to their liking.

Read on for more...

Netflix Employee Terminated For Accessing Customers' Credit Card Information

Subject: Editorial, General Tech | May 6, 2011 - 03:31 AM |
Tagged: Netflix, Customer Data, Corporate theft

It seems as though this Spring season is just a bad time for customers' personally identifiable information. Especially in the wake of the Sony PSN and SOE attack fiasco, to have yet another large corporation found to be involved in compromised customer data is rather disheartening for customers who trust companies with their private information.

Update:  LastPass has also reported a data breach, resulting in customers' emails being compromised.  Luckily; however, users' passwords were salted and hashed so users accounts on other sites should not be compromised in contrast to the Sony case where the passwords were compromised.

netflixlogo.png

Fortunately, in the case of Netlfix, they have determined who the responsible party was and have moved swiftly to address the issue. Maximum tech reports that an un-named call center employee for Netlfix was terminated for accessing customers' information without permission.  On April 4, 2011 Netflix discovered that one of their call center employees had been accessing confidential information of a number of customers that he had spoken with over the phone.  He was found to have accessed the name and credit card information of two customers in New Hampshire.

According to the article, Netflix is now in the process of notifying the two customers in question.

The amount of private data that customers entrust will be kept private by the companies that they do business with everyday is rather daunting.  When large corporations like Sony and Netflix run into problems with keeping information secure, one has to wonder how much compromised information goes under the radar of the majority of people.  While there is not much one can do to stop others accessing their data without permission once information has been lost in a data breach or as a result of corporate theft, people do have control over what information is given to compainies to begin with.  

It may seem rather paradoxical for me to quote Sony of all people; however, they have definitely seen the consequenses and thus can assuredly recommend that customers stay vigilant and protect themselves from fraud.  Using one time credit card numbers (if your bank/card provider offers this) or reloadable visa debit cards with just enough money on them fro the desired transactions can help to protect you from data breaches such as this.  Further, only provide the minimum amount of information necessary for a transaction, especially if it's to a company that you're unsure about.  While various forms of fraud protection can help, preventing yourself from ever needing to use fraud protection in the first place is the best thing you can do for yourself and your private data.  "Remain vigilant."

Source: Maximum Tech

Podcast #153 - Dell UltraSharp U3011 monitor, AMD Phenom II X4 980, 3D transitors and more!

Subject: Editorial, General Tech | May 6, 2011 - 02:58 AM |
Tagged: ultrasharp, u3011, podcast, Phenom II X4 980, Intel, dell, amd

PC Perspective Podcast #153 - 5/05/2011

This week we talk about the Dell UltraSharp U3011 monitor, AMD Phenom II X4 980, 3D transitors and more!

You can subscribe to us through iTunes and you can still access it directly through the RSS page HERE.

The URL for the podcast is: http://pcper.com/podcast - Share with your friends!

  • iTunes - Subscribe to the podcast directly through the iTunes Store
  • RSS - Subscribe through your regular RSS reader
  • MP3 - Direct download link to the MP3 file

Hosts: Jeremy Hellstrom, Josh Walrath and Allyn Malventano

This Podcast is brought to you by MSI Computer, and their all new Sandy Bridge Motherboards!

Program length: 1:23:01

Program Schedule:

Source:

Recent Study Finds Students In US Are Not Properly Prepared To Protect Themselves Online

Subject: Editorial, General Tech | May 5, 2011 - 12:35 PM |
Tagged: Internet, Education, Cyber Security

 Microsoft recently posted a press release detailing the results of its sponsored study by the NCSA (National Cyber Security Alliance). The study sought to determine whom people believe bears the responsibility for teaching children how to protect themselves on the Internet, as well as what the current situation is as far as K-12 students’ level of preparedness and education. The executive director of the NCSA, Michael Kaiser, had this to say:

“Just as we would not hand a child a set of car keys with no instruction about how to drive, we should not be sending students out into the world without a solid understanding of how to be safe and secure online."

According to Microsoft, the NCSA advocates for a “comprehensive approach” to teaching children from K-12 how to stay safe and secure online. While the consensus seems to be that students do need educated in Internet security, people are divided on exactly who bears the primary responsibility for teaching children. Children’s teachers, parents, and even government leaders and law enforcement have all been raised as possible responsible parties. The majority of teachers (80 percent) and school administrators (60 percent) surveyed are proponents of parents being responsible for teaching their kids about “digital safety, security, and ethics.” On the other hand, more than 50 percent of the IT coordinators surveyed believe that teachers are the ones that bear the most responsibility of educating kids. From the survey, one area where all groups do seem to agree is on the question of government responsibility in educating kids. Microsoft states that less than one percent believe law enforcement and government officials should bear the responsibility.

chart_1_responsibility.png

While cyber security is important for students to learn, as 97 percent of school administrators believe schools should have courses and an educational plan for students throughout their K-12 grades, only 68 percent of administrators “believe their schools or school districts are doing an adequate job of preparing students...”

The situation of adequate education looks even bleaker when teachers where surveyed. When asked whether they feel prepared to teach students adequately, 24 percent believed they were adequately prepared to talk about and educate kids on protecting personal information on the Internet, and 23 percent are comfortable teaching the risks of cyberbullying. Further, only one-third of teachers surveyed believe they are prepared to educated students on basic Internet security skills “such as password protection and backing up data.” The low numbers are attributed to the lack of professional development training that teachers are receiving. Microsoft states that “86 percent received less than six hours of related training.” Microsoft quotes Kaiser in saying that “America’s schools have not caught up with the realities of the modern economy. Teachers are not getting adequate training in online safety topics, and schools have yet to adopt a comprehensive approach to online safety, security and ethics as part of a primary education. In the 21st century, these topics are as important as reading, writing and math.”

In all of this, there is a ray of hope. Comparing the 2010 study to the NCSA’s 2008 study which you can read here, an increasing number of teachers believe cyber security and professional development training is a priority.More than 60 percent of school officials and teachers are interested in pursing further security training. This interest in training among teachers is up to 69 percent from 55 percent in 2008. IT coordinators and administrators are also becoming more interested in revamping the educational curriculum to better teach their students and workers.  Further improvements in interest among educators pursuing further security training can be seen between the 2010 and the 2011 NCSA study.  Also, slightly higher percentages exist across the board for teachers who have tought aspects of security in their classrooms compared to both the 2010 and 2008 studies.

On the other hand, while interest in training is increasing for teachers, from 2010 to 2011, security topics taught in clases have actually dropped.  This is in addition to a decrease in teachers' beliefs that they bear responsibility in educating kids.

chart2.PNG

A comparison paper between the 2008 and 2010 study can be downloaded here (PDF).

What are your thoughts on this issue; who bears the primary responsibility in educating children on the importance of Internet safety?

 

Image 1 courtesy 2011 NCSA study.  Image 2 courtesy 2008 to 2010 NCSA comparison study.  Material is copyright NCSA, and used according to fair usage guidelines for the purpose of commentary and reporting.

Source: Microsoft

U.S. Judge Makes Landmark Ruling That an IP Address Does Not Equal a Person

Subject: Editorial, General Tech | May 4, 2011 - 05:36 PM |
Tagged: Law, Copyright, Bit Torrent

This past year has seen a surge of copyright infringement cases where copyright holders have brought suits against not one, but hundreds or even thousands of defendants. These kinds of wide sweeping cases are highly controversial, and, according to TorrentFreak opponents have even gone so far as to call these types of cases as "extortion".

copyright_symbol.jpg

The main reason for the controversy is that rights-holders are acquiring lists of IP addresses that connect to, download, and/or share illegal files that they own the original copyright for. They are then bringing lawsuits against the so called John Does listed in the IP addresses, and using legal subpoenas to force ISPs to release personal information of the account holder(s) connected to that IP at the times the IP address was logged downloading and/or sharing their files. While many may not realize the flaw in this logic, it seems as though a District Court judge by the name of Harold Baker has questioned the legality and implications of assuming an IP address is grounds enough to obtain further personal information.

The issue of connecting solely an IP address to a person is that while a log with an IP address along with specific dates and times can be connected to an ISP’s subscriber and their Internet connection, there is no way to know that it was that particular person who represented that IP address in that matter. It could just as easily have been another person living in the household, a friend or visitor who used the wireless connection, or a malicious individual piggy-backing on that subscriber’s Internet connection (and thus the IP address).

TorrentFreak reports that “Judge Baker cited a recent child porn case where the U.S. authorities raided the wrong people, because the real offenders were piggybacking on their Wi-Fi connections.” They also state that Judge Baker believes that these types of cases, particularly when it involves adult entertainment, assuming an IP address is enough material to subpoena for further personally identifiable information could obstruct a “‘fair’ legal process.” This is because, bringing a suit against someone by connecting them to solely an IP address, especially when it involves adult entertainment, could irreparably defame an innocent persons character.

Judge Baker goes on to say that rights-holders could potentially use the delicate issue of the accusation of allegedly sharing adult material to encourage even innocent people to settle out of court. TorrentFreak reports that “Baker conlcudes [sic] by saying that his Court is not supporting a “fishing expedition” for subscribers’ details if there is no evidence that it has jurisdiction over the defendants.”

There is no question that Judge Baker’s ruling could potentially change the landscape of bit torrent related lawsuits throughout the United States. Rights-holders are no doubt going to aggressively combat this ruling; however, civil rights groups and countless innocent people are rejoicing at the knowledge that it may very well be the beginning of the end for John Doe bit torrent lawsuits in the Unite States.

Image courtesy MikeBlogs via Flickr (creative commons 2.0 w/attribution).

 

Source: TorrentFreak

Eli Pariser Cautions Web Users of the Filter Bubble

Subject: Editorial, General Tech | May 3, 2011 - 01:40 PM |
Tagged: Internet, Information, Filtering

TED talks are very similar to the motivational speeches that kids everywhere have had to endure throughout their junior high and high school years. The only real difference is that the talks are made available online to millions of people instead of a few thousand at a time. That said, if you are at all interested in the technology world, TED talks are usually both enlightening and relevant to present issues in the industry. 

If that preface has not already scared you off of this article, I encourage you to watch this particular TED talk (which is embedded below), where Eli Pariser demonstrates just what a "filter bubble" is, and what repercussions the once ever-interconnected Internet world faces as more and more websites make personalization take priority over discovery.

Eli uses a search on Google for the subject "Egypt" to show that the results two people get can be drastically different. In an even more "close to home" example, by being a part of a social network like Facebook, you may already be inside a filter bubble and not even know it! This filter bubble is in the form of the "news feed" on Facebook. If you have not talked to, as an example, your best friends from college or high school in a few months, it likely will appear to you that according to their lack of any posts showing on your news feed, they have dropped off the face of the planet and have not updated their Facebook status since the last time you talked to them. More than likely; however, you are part of a filter bubble and simply were not aware of it.

Facebook has somewhat recently modified the way its news feed shows statuses of your Facebook friends to show only statuses of friends with whom you have a certain number of interactions with. This may seem like a good thing at first, as it leaves more room for the people that you talk with most often. Think for a second; however, if you missed your little brother or only nephew's first winning football game score status and photos of him during the winning play because you haven't talked to them in a few weeks. While that may be something you would consider to be big news and something that you would likely want to know about, Facebook's computer algorithms may just decide the exact opposite for you.

In practice, filter bubbles and personalization on the web are likely to be more subtle occurrences. Eli Pariser's talk does beg the question of whether or not filter bubbles are the right for the Internet and its users in any capacity. Is individual personalization worth people giving up the freedom to stumble upon new information and the opportunity to get the same exposure to the world as everyone else if they so choose? Do you see the personalized web as a positive or a negative thing for the world? What are your thoughts on users being led into a "web of one" as Eli cautions?

Source: TED

PCPer v4.0 Giveaway: Corsair Gaming Audio Series SP2500 2.1 Speaker System

Subject: Editorial, General Tech | May 2, 2011 - 05:47 PM |
Tagged: speakers, giveaway, corsair, contest

As you can no doubt tell, PC Perspective got a HUGE and much needed facelift recently to what we are internally calling "PC Perspective v4.0".  I know there are still some kinks to work out and we are actively addressing any feedback from our readers in this comment thread.  

But we want to celebrate the launch of the new site in style!!  Some of our site sponsors have very generously offered up some prizes for us to give out throughout the coming days...

The ninth (!!) prize is a set of Corsair Gaming Audio Series SP2500 2.1 Speakers!!

corsairsp2500.png

What do you have to do to win this wonderful piece of hardware?

Couldn't be easier: post a comment in this post thanking Corsair for its sponsorship of PC Perspective as well as an interesting feature or addition you would like to see in future speaker sets.  Be creative! You should probably have a registered account or at least be sure you include your email address in the appropriate field so we can contact you!

Source: Corsair