Windows 7 Nears
Microsoft has been cleverly trying to turn the subject away from Vista and
toward...well, toward just about anything else! Vista TV commercials mention
Mojave more than the V-word, and the new, big Redmond word is "cloud."
On the desktop, Microsoft isn't shy about promoting Windows 7 and making it
seem this OS is right around the corner. And it is -- at least in beta form.
It looks like the first beta will be out
this January. An alpha (I call it that, even though Microsoft has its own
odd nomenclature) is already in the hands of developers who find it pretty solid.
One thing is pretty clear: Windows 7 is an extension of Vista. This means the
hardware makers must build super-fast machines to give proper performance, that
peripheral vendors must work with Microsoft on good drivers, and that Microsoft
must clean up its code. If all three happen, Windows 7 could be a big success.
Now, let's see how they all do!
Malware Messes with the Military
I avoid fighting people that are bigger and better trained than me (which means
I'll have to stop fighting my two sons pretty soon). So I would certainly never
want to irritate an organization with 3 million people, many of whom are armed,
and a huge complement of planes, bombs, tanks and guns.
But that's just what some idiotic hackers are doing by releasing
malware aimed at U.S. Defense Department computers.
Fortunately, military defenses kept the attacks from reaching deep into the
network, but the malware did infect a range of computers in Afghanistan and
elsewhere. If they found the source of these attacks, a little shock and awe
is clearly in order.
2009: Tough for the Economy, Tough
Symantec just released
a study claiming that as of now, software authors are writing more malware
apps than legitimate, useful programs. And the company says next year will be
First, a little caveat. Symantec sells security software, so it's in the company's
interest to scare us. That said, Symantec has always been honest with me so
I must take it at its word.
Here's what Symantec thinks we're in for in 2009: There will be more malware
spread through social networking, more attacks on virtual machines and more
What are your biggest security headaches? Send 'em to email@example.com.
Mailbag: How Safe Is Wi-Fi?, IE 8, More
On Tuesday, Fred
posed a question to fellow Redmond Report readers -- what should he do to
keep his home WEP Wi-Fi connection secure? Here are your responses:
Regarding Fred's question on wireless: WEP is commonly defeated in under
10 minutes, so if someone decides to target your network, any available resource
will be open to them. I'd worry less about the man next door than I would
about the boy next door, who might try to break into your network just for
the 'fun' of doing so. Another worry with WEP is having a stranger gain Internet
access through your network and then use it for criminal activity, which would
trace back to your IP address.
If you don't share anything on your computer, including hidden shares,
a hacker can get access to the Internet only. The harm here is that they can
capture your Internet traffic, but this would be very unlikely in a home environment.
Even if they do capture Internet traffic, https sites are safe because of
encryption. For example, your username and password for most Web-based e-mail
is safe because it is encrypted; the log in page is usually https://something.
However, the e-mail packets themselves are probably not encrypted and can
be captured. You can configure Firefox to encrypt all Gmail traffic, but this
is an exception. If you use e-mail handlers like Outlook or Thunderbird, your
SMTP port is 25 and your POP port is 110, your mail transmissions can be easily
captured. Hackers can also use peer-to-peer file transfers and slow down your
Internet connection (the odds against this happening are astronomical).
I can hack 128-bit WEP encryption in 10 minutes if I am close enough
to the access point, usually within 100 feet. The farther away, the more time-consuming
the hack. Right now, the average hacker would not bother with any WPA because
WEP is easy and plentiful. Almost all wireless routers and network cards can
be configured with WPA. If you really want to be safe, use WPA-2 with AES
and more than 20 characters in the encryption key. Also, keep potential hackers
more than 300 feet away. This is almost as safe as a wired network.
Once again, if you don't have anything shared, including hidden shares,
and you don't have sensitive e-mails, there is not much to worry about from
Have you tried the IE 8 beta? A few of our readers have and their responses
I have used IE 8 on Vista SP1 for four or five months without any issues.
One problem I've had with the IE 8 beta is when I tried to uninstall it,
it completely hosed my system, basically reverting it back to the factory
default programs and settings. I had to use System Restore to restore my system
the way it had been, including the beta version of IE 8. I'm using Window
Vista Ultimate with 4GB RAM and a 2.20 gigahertz Intel Core2 Duo processor.
Joseph thinks the open source business model isn't necessarily "broken,"
analyst said; it might just be suffering from a perception problem:
Making money from 'free' software is not anything new. There are hundreds
of VARs out there that sell products at near-cost to get the implementation
contract. The problem is marketing -- when I had my own consulting business,
I put on a "free" seminar at a local community college and hardly
anyone showed up. I raised the "price" to $99 for the same seminar
and got an overwhelming response from businesses. There is a price-point at
which people perceive "cheap" to be valueless.
And finally, "cloud" might be Microsoft's new buzzword, but Alan
isn't buying into it:
I do not need the cloud, and I do not care about it. It is insecure at
Tell us what you think! Leave a comment below or send an e-mail to firstname.lastname@example.org.
Doug Barney is editor in chief of Redmond magazine and the VP, editorial director of Redmond Media Group.