Podcast #82: “The $2.00 Pistol Edition!” (Audio)

Dr. Bill Podcast – 82 – (03/31/07)
Click on the “Streaming MP3” badge below to play Streaming Audio of this Podcast.
Streaming MP3 Audio
 Download MP3
(Right-Click on the Link Above and Choose “Save” to Save the MP3 file locally on your PC.)

Click on the “Streaming Ogg” badge below to play Streaming Ogg Vorbis Format Audio of the Podcast.
Streaming Ogg Audio
 Download Ogg Vorbis Format
(Right-Click on the Link Above and Choose “Save” to Save the Ogg Vorbis file locally on your PC.)

Big things – including a new sponsor – GoToMyPC! Virtual Headphones from Microsoft?!? Vista E-mail security problem! Geek Culture: “Hi, I’m Linux!” New Techpodcasts Web Site! New DirCaster with great new features! Is Apple TV the cheapest Mac Mini? Geek Software of the Week: CPU-Z! Gamemaster Segment: Two Reviews and a tip!

Video Netcast Show Notes:
A video demo: Installing Freespire Linux, and and introduction to Freespire. The demo was running under VMware on Windows XP, and recorded via CAMstudio Open Source. Unfortunately, some problems with overhead on the system created a few audio problems.


Podcast #82: “The $2.00 Pistol Edition!” (Video Netcast #8)

Dr. Bill Podcast – 82 – (03/31/07)
Click on the “Streaming MP3” badge below to play Streaming Audio of this Podcast.
Streaming MP3 Audio
 Download MP3
(Right-Click on the Link Above and Choose “Save” to Save the MP3 file locally on your PC.)

Click on the “Streaming Ogg” badge below to play Streaming Ogg Vorbis Format Audio of the Podcast.
Streaming Ogg Audio
 Download Ogg Vorbis Format
(Right-Click on the Link Above and Choose “Save” to Save the Ogg Vorbis file locally on your PC.)

Big things – including a new sponsor – GoToMyPC! Virtual Headphones from Microsoft?!? Vista E-mail security problem! Geek Culture: “Hi, I’m Linux!” New Techpodcasts Web Site! New DirCaster with great new features! Is Apple TV the cheapest Mac Mini? Geek Software of the Week: CPU-Z! Gamemaster Segment: Two Reviews and a tip!

Video Netcast Show Notes:
A video demo: Installing Freespire Linux, and and introduction to Freespire. The demo was running under VMware on Windows XP, and recorded via CAMstudio Open Source. Unfortunately, some problems with overhead on the system created a few audio problems.


Geek Software of the Week: CPU-Z

CPU-Z is a freeware that gathers information on some of the main devices of your system. Have you ever needed info on what motherboard you have, what CPU? Planning an upgrade, but don’t want to “crack the case” to find out exactly what you are running? Well, here you go!

CPU-Z Utility

“CPU-Z does not need to be installed. Just unzip the files in a directory and run the .exe. In order to remove the program, just delete the files, and that’s it. The program does not copy any file in any Windows directory, neither writes in the registry. CPU-Z uses a configuration file, cpuz.ini, that allows to set several parameters for the program. The cpuz.ini file must be in the same directory as cpuz.exe.”

Try it… you’ll like it!

A Video of Windows Vista Getting KILLED by Dragging a File to the Desktop!

Wow! “Super-secure” Vista going into a perpetual crash loop because somebody drops an malformed .ani file to the desktop? Yep! A McAfee engineer demonstrates it in this video!

Windows Vista Suicide, Courtesy of McAfee

How embarrassing!

“Windows Vista, Microsoft’s extensively applauded most secure Windows platform to date can be taken down by nothing more than a mere animated cursor. I have seen this piece of news spreading, following a security advisory posted by the Microsoft Security Response Center. But what is the real deal behind this information? Microsoft has warned that it is aware of limited and targeted attacks impacting a critical vulnerability in Microsoft Windows Animated cursor handling. At the basis of the zero-day vulnerability is insufficient format validation, before cursors, animated cursors, and icon rendering. Security company Symantec informed that in the eventuality of a successful exploit, the attacker will be able to perform remote arbitrary code execution on the victim’s machine. There are two vectors for this kind of attack, one is the Internet browser and the other is the desktop email client. ‘In order for this attack to be carried out, a user must either visit a Web site that contains a Web page that is used to exploit the vulnerability or view a specially crafted e-mail message or email attachment sent to them by an attacker,’ according to Microsoft Security Advisory (935423).”

Is Apple TV Really the Cheapest Mac Mini?

Apple TV is Apple’s first venture into the new, exciting IPTV world. But, people are already modding it with all kinds of hacks. Is it really just a smaller, cheaper Mac Mini?

Apple TV – the cheapest Mac mini ever?

“Sometimes, it looks to me like you do not have to buy your Mac Mini, because Apple TV can be quickly turned into a ‘special version of Mac Mini.’ You just have to tweak the hardware a bit and you can run your new Mac Mini for $299. As a bonus – you get a really fast WI-FI connection and cables for your digital TV for $20. As a bonus – the power supply is inside the computer, not outside and it is so silent, you cannot hear it. When you have time, it can be used as a game console sitting next to your TV set. Just go to your local Apple store, buy Apple TV, download this piece of software from the Internet and turn your Apple TV into ‘Mac Mini Apple TV.’ Without a need to switch between a computer and the TV.”

There are all kinds of Apple TV hacks, check them out here:

Apple TV Hacks

I hear it runs REALLY hot though… as in real heat! They say that you can actually pop corn on the top of the console it is so hot! I know they want it quiet with no fan… but come on!

New Techpodcasts.com Website!

As you may know, we are a proud member of the Techpodcasts Network. And, they have just released a new, and very cool “Web 2.0-like” web site! Check it out, and look for the “Dr. Bill – The Computer Curmudgeon” show, as well as “Dr. Bill.TV“… all the folks on Techpodcasts Network have committed to good, clean, informative tech shows! It is a pleasure to be associated with this great group of “up-and-comers” in the podcasting world! By the way, I am listed under the “Tech Chat” category!

The Techpodcasts Network

The Techpodcasts Network is now a part of the Raw Voice Media Group as well… so big things are coming! Stay tuned!

Vista’s Successor to Outlook Express Has a Security Issue

Outlook Express security was bad… in fact, you could say, “What security?” Vista’s big claim to fame is security… SECURITY! Yep. But… you knew there would be a “but.” It turns out the first big security issue with Vista Windows Mail has surfaced, and it is a doozy!

First vulnerability in Vista’s Windows Mail discovered

“The successor to Outlook Express links seamlessly with its predecessor’s dubious reputation in matters of security. Just a few months after its official release, the first significant security problem has been uncovered: under certain circumstances, simply clicking on a link in an email can cause a program to be launched on the local computer. A hacker going by the pseudonym Kingcope has reported on a security mailing list that this can be achieved by simply embedding a link to a local program in an email. If a directory with the same name as the executable program exists, the program will be executed by Windows Mail when the user clicks on the link without requiring any confirmation. A brief test at heise Security confirmed this. After creating a folder called calc in C:\Windows\System32\, clicking on a link to c:/windows/system32/calc? launched the calculator without any further user interaction. Up until to now, there has ben no real attack scenario to exploit this, and so the concrete danger is fairly low. Kingcope has listed two Windows programs, winrm and migwiz, for which the required directory already exists. But he admits that it was not possible to pass parameters to the programs, which significantly reduces the potential for targeted activities. But the simple fact that under certain circumstances clicking on a straightforward URL in an email can be sufficient to launch a local program without requiring confirmation from the user leaves an uncomfortable feeling. Many dangerous vulnerabilities in Outlook Express and Internet Explorer initially appeared to be similarly innocuous. And Microsoft will now be judged against the grandiose promises it made with regard to the security of Vista.”

Would You Use “Virtual Headphones?”

I sure would! I use headphones at work so as not to disturb folks around my cubicle. But what if I needed to hear ambient noise and conversation? Wouldn’t it be great to be able to listen to music, or informational podcasts… without headphones, yet not disturb others at work? Well, Microsoft, of all companies… is working on it!

Microsoft developing virtual headphone algorithm

“Considering that Vista isn’t exactly getting perfectly positive praise, it looks like Microsoft is looking into other ways to bring cashflow to Redmond. While we already know the firm is diving head first into the VoIP handset market, it looks like it’ll also be involved with a new virtual headphone. In an effort to allow VoIP / computer-based communications to be handled without tethering yourself to your PC and also allow you to hear ambient conversations around the office, researchers at Microsoft have ‘developed an algorithm that adjusts the timing of sound waves emitted from each speaker in an array, creating a focused beam of sound that acts as virtual headphones.’ Essentially, the speakers would create a ‘sweet spot’ so that computer users could hear the audio perfectly, while individuals just inches away from the sound zone wouldn’t hear much more than a peep. Furthermore, the focused wave technology could even bleed over into the tracking realm, which could actually allow the tones to follow one around as they move. Ideally, the creators want to conjure up a beamforming system that is easy to configure and relatively inexpensive, but we’re hearing (ahem) that it’ll be at least three years before these aural luxuries break into the corporate sphere.”

1 2 3 4