Can anybody tell me what business Novell is in? This approach seems way of course to me and hardly a real threat to Msft.
Novell drives nail into Microsoft Office coffin
By Stan Beer
Tuesday, 06 March 2007
The news that Novell has released an Office Open XML (OOXML) translator for OpenOffice.org is yet another nail in the coffin of the office productivity franchise known as Microsoft Office. However, if the open source crowd is really serious about denting Microsoft’s dominance in this space, what is needed is a little Evolution.
With the translator, Microsoft cannot hold customers captive to Office 2007. OpenOffice.org users don’t have to worry about receiving a Microsoft Word (and hopefully soon Excel and Powerpoint) file they can’t read. Now the onus is on Microsoft to update Office 2007 to include open document format (ODF) capability, which OpenOffice.org already has and is being increasingly recognized as a global standard.
Source: iTWire – Novell drives nail into Microsoft Office coffin
Finally, LiveWriter support for FireFox. Gotta love it.
Blog This for Firefox 2.0 now available on Windows Live Gallery
The Windows Live Writer Blog This extension for Firefox has been updated to officially support Firefox 2.0 (in addition to Firefox 1.5.x).
The Blog This for Firefox extension adds a button to Firefox which starts a new Windows Live Writer blog post prepopulated with content and title from the current web page. Blog the whole page, or just selected snippets. Interacts with other registered plugins to parse and structure web content where appropriate. Blog quickly when you find something of interest on the web.
Developer, Windows Live Writer
Source: Writer Zone
The Monkey on WordPress does a walkthrough on using Edgeio for list classifieds on you web page. I am impressed.
Edgeio was launched last year and was hyped as being the craigslist killer. While it’s uncertain if this new company can uproot the foothold that craigslist has managed to maintain right now in the online classifieds arena, over time we may see a significant shift in where people place their classified ads on-line thanks to edgeio’s marketplace tool.
Source: A Look At The Edgeio Marketplaces Beta – Full Walkthrough, Advice and Review « Monkey on WordPress
I had better luck. It recognized me singing “Danny Boy.” But failed on the other two James Taylor songs. I will try this some more though. I have been searching for a few songs that I can’t remember the artist’s name and that makes it hard to find on iTunes.
New startup Midomi, a voice-based music search engine with a social network bolted on, launched earlier today. If you have a microphone connected to your computer, just sing or hum a few seconds of any song. In theory, Midomi will return a link to the original song for partial playback or purchase, and will also return results from other users who’ve recorded themselves singing that song.
I’ve been testing this all morning. And I cannot come up with a single match. Not one. I think that my voice is to blame, though, as others testing it seem to have good results. In my last attempt I tried to sing part of Amazing Grace since it’s fairly slow and they use it in the demo video to explain how the site works. My top match came back as a user clip rapping part of a Notorious B.I.G. song. I swear I am not making this up.
The social network aspect to this is what will make it popular, and the search engine will help people group songs that they all sing and compare. Users have a profile page and can add friends, fans, etc. Others rate their recordings. kSolo (acquired by Fox) and SingShot have dabbled in this space successfully.
Source: Midomi Names That Tune, But Not For Me
Ok, I know this is old, but US is moving to RFID passports Jan1, I don’t even own a hammer.
UK RFID Passports Cracked Already
from the feeling-safer? dept
There’s been an odd rush by governments to move to RFID passports, even though there are serious concerns about how secure they really are. Over in the UK, where many RFID passports are already in use, a security researcher and a reporter were able to crack some aspects of the passport. It is, admittedly, a limited crack, but it could potentially be used to make a clone RFID chip for a counterfeit passport. While the UK government claims this crack is no big deal, you’d have to think that it shouldn’t take long for other problems to show up as well. What seems pretty clear from the description is that the implementation was done without all that much thought given to the security side of the equation. We’re not as down on RFIDs as some people are — but with all the questions about security and privacy issues, you would think that officials would have been extra careful before sticking them in something such as a passport. Apparently not.
Source: Techdirt: UK RFID Passports Cracked Already
It’s a privacy issue. I would never recommend anyone do this. My passport just expired. What to do…oops, I dropped it.
All passports issued by the US State Department after January 1 will have always-on radio frequency identification chips, making it easy for officials – and hackers – to grab your personal stats. Getting paranoid about strangers slurping up your identity? Here’s what you can do about it. But be careful – tampering with a passport is punishable by 25 years in prison. Not to mention the “special” customs search, with rubber gloves. Bon voyage!
1) RFID-tagged passports have a distinctive logo on the front cover; the chip is embedded in the back.
2) Sorry, “accidentally” leaving your passport in the jeans you just put in the washer won’t work. You’re more likely to ruin the passport itself than the chip.
3) Forget about nuking it in the microwave – the chip could burst into flames, leaving telltale scorch marks. Besides, have you ever smelled burnt passport?
4) The best approach? Hammer time. Hitting the chip with a blunt, hard object should disable it. A nonworking RFID doesn’t invalidate the passport, so you can still use it.
Source: Wired 15.01: START
Yikes. I haven’t played with this yet. But I’m telling you, the name a password paradigm we know is just plain dead.
I would really appreciate feedback about this article. Please register to the forum and comment on it! Thanks and use with caution.
The following is an instructional tutorial. I hope to show how easy it is to sniff people’s passwords in plain-text form on virtually any wired network. Common applications for this would be on a university, school or otherwise large network. This has only been tested on a Windows machine, but can be used to sniff passwords from any operating system.
Step 1: Download, install and run Cain & Abel at http://www.oxid.it/cain.html
Step 2: Click “Configure” in the top bar.
Step 3: In the “Sniffer” tab, click the adapter which is connected to the network to be sniffed, then click “Apply”, then “OK”.
Step 4: Click the “Sniffer” tab in the main window.
Step 5: Click the network card in the top bar (2nd icon from the left).
Step 6: Click the “+” button in the top bar.
Step 7: Select “All hosts in my subnet”, click “OK”. Entries should appear in the main window under the “IP address”, “MAC address” and “OUI fingerprint” headings.
Step 8: From the “Sniffer” tab, click “APR” in the bottom tab.
Step 9: Click the top right pane in the main window. Click the “+” button in the top bar.
Step 10: Click on the router in the left pane. The router is generally the entry which has the lowest final IP value (xxx.xxx.xxx.*). Highlight the IP addresses to sniff in the right pane. Click “OK”.
Step 11: Click the ARP icon in the top bar (3rd icon from the left). Wait until other users have logged into websites on other computers. Depending on the size of the network and the traffic which this network receives, this can range from minutes to hours.
Step 12: After some time has passed, click “Passwords” in the bottom tab.
Step 13: In the left pane, select the bolded entries. The right pane should show the time, server, username, password (in plaintext) and site accessed.
Please use this tutorial with caution as most private institutions, as well as countries, have strict rules and laws against network sniffing and could lead to expulsion from an institution, as well as critical litigation! This tutorial is for educational purposes only and should only be used to demonstrate the security weaknesses of common networking infrastructures.[/b]
Source: The Antiriddle Forum :: The Hardest Riddle on the Net :: View topic – How to sniff plain-text passwords in 13 steps