As part of its steamrolling list of updates, Google recently released a new build of Chrome. For those who want to keep up with the browser's latest features, Chrome Canary is where it's at. This version of the software, aimed at testers and developers, will be updated every time there is a successful nightly build. Users who want to stick with the stable version of Chrome can expect updates to come more frequently as well.
Today, the last Friday of July is SysAdmin day and we appreciate them even more because they came through during the live show and got us back online. We also talk about David Pogue's new movement to "take back the beep." And we need to watch out for pandas. Listen and you'll find out why. Special guests: The hosts of Hak5.Subscribe with iTunes (audio) Subscribe with iTunes (video) Subscribe with RSS (audio) Subscribe with RSS (video) EPISODE 1031
Apple to fix iPhone security flaw http://news.bbc.co.uk/2/hi/technology/8177755.stm
The truth about the iPhone virus / vulnerability thing http://www.businessweek.com/technology/ByteOfTheApple/blog/archives/2009/07/the_truth_about.html
Elinor: Researchers attack my iPhone via SMS http://news.cnet.com/8301-27080_3-10299378-245.html
David Pogue wants to take back the beep http://tech.slashdot.org/story/09/07/30/1955255/David-Pogue-Wants-to-Take-Back-the-Beep
Bootkit bypasses Truecrypt full-disk encryption http://www.h-online.com/security/Bootkit-bypasses-hard-disk-encryption–/news/113884
Hackers: We can bypass San Francisco e-parking meters http://news.cnet.com/8301-1009_3-10300233-83.html
HP researchers reveal details of browser-based darknet http://www.h-online.com/security/HP-researchers-reveal-details-of-browser-based-darknet–/news/113873
Shock threat to shut Skype http://www.smh.com.au/technology/biz-tech/shock-threat-to-shut-skype-20090731-e3qe.html
CU prof’s iPhone app lets users snoop out surroundings http://www.dailycamera.com/news/2009/jul/29/iphone-app-hoozat-cu-boulder-professor-richard-han
Cash for Clunkers cars get lethal injections http://www.thetruthaboutcars.com/cash-for-clunkers-trade-ins-must-be-crushed-shredded/ http://money.cnn.com/2009/07/31/autos/cash_for_clunkers_update/index.htm
Fewer than 10 ET civilizations in our galaxy? http://science.slashdot.org/story/09/07/31/1244235/Fewer-Than-10-ET-Civilizations-In-Our-Galaxy
Police: Texting, talking NY trucker hits car, pool http://tech.yahoo.com/news/ap/20090731/ap_on_hi_te/us_tow_truck_in_pool… Read more
The ultimate open-source encryption program, TrueCrypt is loaded with powerful features that those concerned with protecting their data from thievery should want--and have.
It offers 11 algorithms for encrypting your private files in a password-protected volume. You can store your encrypted data in files (containers) or partitions (devices). TrueCrypt works hard to offer powerful data protection, recommending complex passwords, explaining the benefits of hidden volumes, and erasing telltale signs of the encryption process, including mouse movements and keystrokes. Though the interface may not be immediately intuitive, its powerful, on-the-fly encryption for no cost still earns the freeware security tool a … Read more
You don't have to pay a cent to keep your computer secure against the bad guys. Watch this discussion on best practices and best apps between CNET TV's Tom Merritt and Download.com's Seth Rosenblatt. When you're done, head on over to our Security Starter Kit to check out must-haves for both newbies and power users.
TrueCrypt has been the standard for file and folder encryption since 2004, and it doesn't hurt that it's open-source freeware, either. The latest update includes the power to do more than protect the mere output of your work: you can now encrypt and hide an entire operating system using the program's wizard.
As the step-by-step guide points out when you start it, one of the reasons you might want to create a hidden OS is in case of extortion. A little paranoia doesn't hurt, either. So, when you create the hidden OS, it also creates signposts … Read more
No, not death, but close to it. The race is on for who has the most expensive iPhone plan in the world! Plus Microsoft finally gives us a date for XP SP3, sort of. And we have some security news for you as well as a recap of the digital TV transition. So listen up! Listen now: Download today's podcastEPISODE 761
FAQ: iPhone 3G launch day is Friday http://news.cnet.com/8301-13579_3-9983810-37.html
iPhone Jonny: world’s first iPhone 3G owner (in waiting) http://www.engadget.com/2008/07/08/iphone-jonny-worlds-first-iphone-3g-owner-in-waiting/
Spat with Rogers leaves Canadian Apple … Read more
Anyone who has shared a computer with a roommate, family member, or co-worker knows it's pretty hard to keep everything organized. But beyond having separate user accounts or personal folders, some data you have on your hard drive just isn't meant to be seen by other users. Whether it's your personal account numbers, journal entries, or other private files, a secure place to store items on your shared computer is necessary for your privacy.
USB Flash drives are great. Securing them, however, is not so great. They are easily lost and the more you use one, the more likely it will contain files you consider sensitive. Corsair recently came out with a product that takes an entirely new approach to securing flash drives.
Seeing as this is a Defensive Computing blog, it goes without saying that my personal flash drives are secure. I use a free, open-source program called TrueCrypt. There are however, three problems with this approach:The hassle of installing TrueCrypt and learning how to use it. There is a portable version … Read more