What Vista Brings To The Table

Filed under: — Aviran Mordo

As Windows Vista release is getting closer, Microsoft releases more details on the ways Vista will work, here are some details on the fetures Vista brings to consumers.

For home users

Digital Photos - With Windows Vista operating system, consumers will have a simpler yet richer digital memories experience, with greater ability to enjoy, find, and share personal photos and video.

  • Built-in support for the most common photo-editing tasks helps consumers produce great looking prints and videos.
  • Easier backup tools and next-generation storage products will help them keep their memories safe.
  • With Windows Vista Home Premium, consumers can view and show photos on their TVs and around their homes when their PCs are connected to the TV through a wireless router or Media Center Extender.

With the Windows Vista operating system, consumers can use their PCs to make the most of their digital music collections.

  • With Windows Media Player 11, itโ€™s easier to find and organize music content on a PC, a portable device, or even from an online service, with rich, contextual browsing and instant search.
  • Windows Vista offers better playback with improved codecs for clearer sound quality.
  • Users can utilize Windows Media Player or the Windows Vista Sync Center to synchronize their music with their portable music devices or portable media centers for maximum enjoyment on the go.
  • Safeguarding content with Windows Backup is simple and automatic, with easier CD and DVD archival, and support for archiving to PCs and networked devices.

TV & Movies
With Windows Vista Home Premium and Windows Vista Ultimate, users will find itโ€™s easier than ever before to find, watch, record, and save all of their favorite TV shows and movies on their PCs. Users can engage and view their content throughout their homes from Windows Vista Home Premium, on their TVs, through other Windows Media Center Extender devices, or on the go with a mobile PC.

  • Users can watch live TV content or video-on-demand content through the Windows Media Center Online Spotlight.
  • Users can view their favorite content on Windows Vista Home Premium, on a mobile device with synced content, or streamed through a Windows Media Center Extender device to their TVs or another PC anywhere in their homes.
  • Users can easily back up content on recordable DVDs or on mass storage devices, protecting precious home movies, beloved TV shows, or whatever content they wish to keep safe.

New features in the Windows Vista operating system, when coupled with partner offerings, will enrich the overall gaming experience.

  • Locate all their games in one easy location.
  • Link to game sites as well as other gamers.
  • Exercise control over which games their children choose to play.

With new and improved communications tools and platforms, the Windows Vista operating system lets consumers enjoy services to share with each other more easily and securely, whether at home or on the go.

  • Windows Internet Explorer 7 lets users keep tabs on information from a variety of sources, with improved browsing, searching from multiple Internet search providers, and really simple syndication (RSS) subscriptions to their favorite Web sites.
  • Windows Vista enables centralized syncing and storage across a wider range of devices and external hard drives, while simplifying the process of setting up a home network over a wireless router with Easy Networking.
  • With Windows Defender and Windows Internet Explorer 7, users can confidently browse the Web while enjoying the multiple levels of security enhancements within Windows Vista, including spyware and malware protection; identity, data, and computer protection; and anti-phishing support.

The Windows Vista operating system offers additional ways for users to be more productive, providing them with simple tools to organize their information and perform common tasks.

  • Users are able to conduct quick, extensive, contextual searches right from the Start Menu with Instant Search.
  • Contacts make it easier for consumers to manage their personal connections, tasks, and appointments.
  • Windows Vista features improved Web browsing and easily integrates with any online search provider, putting all the information users want at their fingertips.
  • Windows Vista provides family safety settings that protect children from inappropriate Web sites and games and help prevent security breaches that result from computer misuse.


Microsoft Is Taking WGA To The Next Level

Filed under: — Aviran Mordo

Since the Windows Genuine Advantage debut as a pilot on 9/2004 Microsoft is slowly making the program more annoying and intrusive.

In the beginning the WGA was an opt-in feature, and then slowly it became mandatory. Users who choose not to validate their copy of Windows can not download updates from Windows update (they still can download critical security updates via automatic update feature in Windows).

On Tuesday Microsoft will make WGA more intrusive and will use scare tactics to make users validate and purchase a legal copy. On 4/25/06 Microsoft will start WGA Notification in the US, UK, Australia, NZ and Malaysia. The WGA notification has been running as a pilot in several countries such as Norway, Taiwan, Sweden, Israel, Denmark, Poland and other countries.

The new WGA notification campaign will have a new logo for OEM and system builders, as seen here exclusively for the first time.

WGA Logo
The new Windows Genuine Advantage Logo



The New Office 2007 File Formats

Filed under: — Aviran Mordo

Office 2007 is due to be released sometimes on 2007. Office 2007 will have two major changes to the office file format. For the first time Microsoft will have file extensions with more than 3 characters, but more importantly it will move from the well know .doc, .xls and .ppt file extensions for the popular Office documents.


Search Engines Don’t Know What They Are

Filed under: — Aviran Mordo

Today Iโ€™ve decided to conduct a simple experiment. I wanted to know if search engines know what they are. This is not a scientific experiment but the results I got where very interesting.

To find if search engines know what they are I simply typed the phrase โ€œsearch engineโ€? in the leading search engines, which maintain their own index and running their own web crawler (No Meta search engines where tested). I expected that they will list the leading search engines on the first result page, but the results where surprising.

Starting with the leading search engine Google: the query โ€œsearch engineโ€? resulted with searchenginewatch.com as the first result follows by AltaVista, DogPile, Lycos, WebCrawler, Excite and other meta search engines, but no where on the first page I could find the leading search engines like Google itself, MSN, Yahoo and ASK. These leading search engine where only on the second page.


Secure And Anonymous File Sharing Applications

Filed under: — Aviran Mordo

In the wake of recent activities by the RIAA and MPAA, many P2P users are trying to find a more secure P2P application.

Just yesterday two of the oldest P2P vendors closed down due to legal threats from the RIAA lawyers.

After the fall of Napster P2P developers saw that it is very easy to shut down a network that is based on centralized server, so the next logical step was decentralized network pioneered by Kazaa.

Now when decentralized networks are not enough the next phase in the war to get free content is anonymous and secure networks.

Although currently there are many small networks that are trying to grab attention, they did not swap many followers (mostly because of their small size and lack of content). But that is going to change as more and more users are being sued.

To those of you who are looking for an anonymous and encrypted P2P network Iโ€™ve listed below some of the better known networks.

  • FileTopia (Recommended)โ€“ One of the oldest encrypted file sharing networks around (not full anonymity)
  • Freenet - Encrypted network that allows anything from building web sites to running file sharing application
  • MUTE - Open source peer-to-peer network that provides easy search-and-download functionality while also protecting your privacy
  • ANts P2P (Recommended) - ANts P2P Open source java based third generation P2P net.
    It protects your privacy while you are connected and makes you not trackable, hiding your identity (ip) and crypting everything you are sending/receiving from others.
  • Kdrive - Secure global virtual hard drive
  • ProxyShare P2P - Using internet proxy servers to hide your IP
  • WASTE - WASTE is a software product and protocol that enables secure distributed communication for small (on the order of 10-50 nodes) trusted groups of users.

Note: These networks are relatively small, compare to other non encrypted networks so do not expect to find large amounts of files there. But they are growing every day and probably one of them will reach the critical mass and will be the next file sharing king.

If you know of other good anonymous file sharing networks please write a comment to let other know.


Social Bookmarking A Threat To Privacy

Filed under: — Aviran Mordo

Social bookmarking websites such as Digg.com and del.icio.us are growing rapidly in popularity and with it also the privacy concern of these sites users.

Social bookmarking sites are sites in which users submit links to pages they found around the web, and other users are voting in one way or another for the popularity of that link. The more votes a link gets the more popular and interesting the page is.

Better than spyware:
One of the most prominent reasons for the existence of spyware is the ability to spy on user surfing habits and to compile a user profile. Using this profile advertisers can display ads that are in close relevance to the userโ€™s interests.

In the case of social bookmarking web sites, the users themselves unknowingly creating their own profile. By voting for a site or news item, the users saying โ€œThis is of interest to meโ€?. Having enough votes one can build a user profile, knowing what is interesting for that user.

The voting history (diggs) is already publicly available in most sites. Going to any user profile, you can see all the stories that user voted for. From there you can assume what interests that user.

Some of these sites have privacy policy noting they will not sell private information, but on others there is no privacy policy and they are free to do whatever they want with this valuable information.

Large search engines and big portals that can collect this kind of personal information are under heavy public scrutiny regarding the safe guard of this kind of data, but social bookmarking sites stayed under the radar.

Collecting this valuable information, which by the way can be associated with the user’s IP address, is done automatically by the servers. Having access to this kind of information is very useful to advertisers, which can run targeted ads according to the user’s profile. If the sites owners will not sell this info I will not be surprised if some black hat hackers will try to obtain and sell this information to the highest bidder. Thus social bookmarks sites have to to be very careful about securing their database and also to provide a clear privacy policy in order for the users to know what information is being collected and sold to third parties.

So until you see a clear privacy policy, stating that the site will not sell your personal data, and the security measures the site employs, be very careful of what you digg. One more advice: If you value your privacy, use an anonymous proxy when using these sites, so you can not be associated with an IP address.


Why Microsoft Introduced WGA Now

Filed under: — Aviran Mordo

In the past weeks Microsoft introduced Windows Genuine Advantage, which checks userโ€™s computers for illegal copies of the popular operating system. One can wonder why WGA and why now? Why not starting WGA together with the future release of Windows Vista?

Although Microsoft incorporated product activation in many of its products, such as Windows XP, it did not stop hackers from cracking the activation process, and illegal copies of Windows were soon circulating around the net, and especially in P2P networks.

Users who are found to have pirated copies of Windows are encouraged to buy a legal copy at a discounted rate. In addition Microsoft cut Windows prices around the world and selling the operating system at deep discount.

These steppes by Microsoft made me think why Microsoft lowering prices, creating cheap trimmed down versions of Windows XP and fighting piracy with new tools other than product activation. Well the conclusion I could come with is Microsoft is making a clearance sale before the release of Windows Vista.


802.11n (MIMO) Will Revolutionize Wireless Networking

Filed under: — Aviran Mordo

Wireless technology is becoming main stream in recent years. When home users considering building a home network a lot of them, if not most of them end up choosing Wi-Fi network, i.e. 802.11b or the latest 802.11g, since wireless networks have become fast and easy to install especially with the help of Windows zero configuration feature.

Wireless networks are also taking a major step in to business with a growing number of companies deploying hotspots across corporate offices.

With current Wi-Fi technology, wireless networks are limited to connecting to the Internet or to the local network using computers. Multimedia devices that use wireless technology to stream video and audio are not very popular, mostly due to the limited range and bandwidth of 802.11b. Even 802.11g is not fast enough to fulfill the high bandwidth requirements of video streaming.

A new emerging technology promises to overcome the limitation of current wireless standards. The new technology, called 802.11n or MIMO (pronounced My-moh), which stands for Multiple Input โ€“ Multiple Output. IEEE has not yet set the standard specs, which are expected to be finalized sometimes next year, but that is not stopping companies to come out with 802.11n products based on the draft proposal submitted to IEEE.
Today’s Wi-Fi radios use 20-MHz of analog baseband bandwidth to transmit information across the two frequencies used by 802.11b/g, and 802.11a. Moving to 802.11n will require approximately 100 MHz of bandwidth.

The IEEE 802.11n standard is currently deadlocked between the TGN Sync proposal, which Intel supports, and the competing WWiSE proposal. TGn Sync has proposed using 40-MHz channels in the 5-GHz spectrum band used by 802.11a, while WWiSE’s proposal involves using 20-MHz channels in the 2.4-GHz band used by 802.11b/g radios.


Working With XML In Java Using DOM

Filed under: — Aviran Mordo

XML technology is very popular with software development. One of the most common ways to work with XML files is using the ch is part of Java API for XML Processing. Although DOM gives you the basic functionality to work with XML files, simple operation it can be tedious if you donโ€™t have several utility classes to work with DOM objects.
In this article weโ€™ll write some useful utility methods that you should have in your arsenal when working with DOM objects.

The first method weโ€™ll need in our arsenal is one to load an XML file and create a DOM object. In order to be as generic as we can weโ€™ll use InputSource as our input.
Note in this method weโ€™ll be using a default EntityResolver which is a good idea to have one. Iโ€™ll leave the implementation of getDTDResolver() and your own EntityResolver to you.

* Creates and returns a Document from the given input source.
* @param inputSource the source of the document
* @param validating true if the parser should validate
* @param namespaceAware true if the parser should be namespaceAware
* @param errorHandler errorHandler for the DocumentBuilder
* @param coalescing true if the parser produced will convert CDATA
* nodes to Text nodes and append it to the adjacent (if any) text node; false otherwise.
* @param entityResolver the entity resolver
* @return the parsed and loaded DOM document.
* @exception XMLException if an error was encountered loading and parsing the file
public static Document fromInputSource(InputSource inputSource, boolean validating, boolean namespaceAware, ErrorHandler errorHandler, boolean coalescing, EntityResolver entityResolver) throws XMLException
   DocumentBuilderFactory dbFact;
   Document doc;
     dbFact = DocumentBuilderFactory.newInstance();
     DocumentBuilder db = dbFact.newDocumentBuilder();
     if (errorHandler != null)
     if (entityResolver != null)
       db.setEntityResolver(new EntityResolverDelegate( new EntityResolver[] { entityResolver, getDTDResolver() }));
     doc = db.parse(inputSource);
   catch (IOException e)
     throw new XMLException("An error in parsing the input source", e);
     catch (ParserConfigurationException e)
     throw new XMLException("An error in parsing the input source", e);
   catch (SAXException e)
     throw new XMLException("An error in parsing the input source", e);
   return doc;

Next it is a good idea to have some convenience methods to load your XML file such as fromInputSource, fromFile and fromString, in these methods just call the fromInputSource method we created.


The Ultimate Portable Media Player

Filed under: — Aviran Mordo

Imagine a new portable device that can play mp3, display pictures, record and display video (PVR), surf the internet, write and receive emails, have a calendar, notes and a phone book. A device that you can play games with it, has a 40GB drive and you can install any other application that you want. All that at a price range of $300-$400.



Blogs - Spam’s next battleground

Filed under: — Aviran Mordo

It seems like spammers have set a goal to their selves to invade and ruin every good aspect of the internet.

Spam has started with email, sending millions of email messages every day; spam mail is responsible for most of the email traffic in the world. But spam email is not the only form of spam.

Spamming instant messages networks is growing strong and increasing from day to day, but most instant messages software have the ability to block messages from people who are not in your buddy list.

Crackdowns on spammers has just begun with companies like America Online, EarthLink, Yahoo and Microsoft suing spammers trying to reduce the amount of spam, causing damages of millions of dollars in lost time, bandwidth and server expenses.
The increate in popularity of anti spam software, and anti spam systems integrated in the mail servers forced the spammers to find new ways to infect the internet with unwanted ads.

In the recent months another and new form of spam is getting more popular with spammers.

With the increase in popularity of Blogs, and content sites enabling comments and talk back sections, spammers found a new ground for polluting the internet. Zombie machines, infected with malware are posting spam messages to the comments sections on websites, usually containing links to or drugs, gambling or porn web sites.


ื”ื?ื? ื’ื•ื’ืœ ืžื”ื•ื•ื” ื?ืช ื”ืกื›ื ื” ื”ื’ื“ื•ืœื” ื‘ื™ื•ืชืจ ืœืคืจื˜ื™ื•ืชื ื•

Google ื”ื™ื? ื?ื—ืช ื”ื—ื‘ืจื•ืช ื?ืฉืจ ื”ืฉืคื™ืขื” ื•ืฉื™ื ืชื” ื?ืช ืคื ื™ ื”ื?ื™ื ื˜ืจื ื˜ ื›ืคื™ ืฉื?ื ื• ืžื›ื™ืจื™ื? ื?ื•ืชื• ื›ื™ื•ื?. ื?ืš ื”ื—ื‘ืจื” ื”ื?ื”ื•ื‘ื”, ืžื—ื–ื™ืงื” ื‘ื™ื›ื•ืœื•ืช ื?ื“ื™ืจื•ืช ื?ืฉืจ ื’ื•ืจืžื™ื? ืจื‘ื™ื? ืžื•ื›ื ื™ื? ืœืฉืœื? ื”ืจื‘ื” ืžื?ื“ ื›ืกืฃ ื‘ื›ื“ื™ ืœืงื‘ืœ ื’ื™ืฉื” ืœืžื?ื’ืจ ื”ืžื™ื“ืข ืฉืžื—ื–ื™ืงื” Google. ื?ืžื ื? ื”ื—ื‘ืจื” ืžืฆื”ื™ืจื” ื‘ื”ืฆื”ืจืช ื”ืคืจื˜ื™ื•ืช ื›ื™ ื”ื™ื? ื?ื™ื ื” ื?ื•ืกืคืช ืžื™ื“ืข ื?ื™ืฉื™ ืœืœื? ื”ืกื›ืžืช ื”ืžืฉืชืžืฉื™ื? ื•ืœื? ืžืฉืชืคืช ื?ื•ืชื• ืขื? ื’ื•ืจืžื™ื? ื?ื—ืจื™ื? ืœืœื? ื”ืกื›ืžืชื›ื? ื?ืš ื”ืคื•ื˜ื ืฆื™ื?ืœ ื•ื”ื™ื›ื•ืœืช ืœื?ืกื•ืฃ ืžื™ื“ืข ื›ื–ื” ืฆืจื™ืš ืœื”ื“ืœื™ืง ื ื•ืจื•ืช ื?ื“ื•ืžื•ืช ืœื›ืœ ืžื™ ืฉืคืจื˜ื™ื•ืชื• ื—ืฉื•ื‘ื” ืœื•. ื‘ื›ืชื‘ื” ื”ื‘ื?ื” ื?ืฆื™ื’ ืœืคื ื™ื›ื? ื?ืช ื”ืคื•ื˜ื ืฆื™ื?ืœ ื”ื˜ืžื•ืŸ ื‘ืžื ื•ืข ื”ื—ื™ืคื•ืฉ ื”ื?ื™ืžืชื ื™ ื•ื›ื™ืฆื“ ื™ื›ื•ืœื” ื”ื—ื‘ืจื” ืœื’ืœื•ืช ืžื™ ื?ืชื? ื•ืœื“ืขืช ืคืจื˜ื™ื? ืจื‘ื™ื? ืขืœ ื?ื•ืจื— ื—ื™ื™ื›ื?.


ื‘ืกืคื˜ืžื‘ืจ 1998 ืœื?ืจื™ ืคื™ื™ื’’ ื•ืกืจื’ื™ ื‘ืจื™ืŸ ื™ืกื“ื• ื—ื‘ืจื” ืงื˜ื ื” ื?ืฉืจ ืฉืžื” ืœื” ืœืžื˜ืจื” ืœืขืฉื•ืช ืกื“ืจ ื‘ืจืฉืช ื”ื?ื™ื ื˜ืจื ื˜ ื•ืœื”ืงืœ ืขืœ ื”ื’ื•ืœืฉื™ื? ื‘ื—ื™ืคื•ืฉ ื?ื—ืจ ืžื™ื“ืข ื”ืžืฆื•ื™ ื‘ืจื—ื‘ื™ ื”ืจืฉืช. ื›ืš ื ื•ืœื“ื” ืžืคืœืฆืช ื”ืจืฉืช ื•ืฉืžื” Google.
ืขื“ ื”ืงืžืช Google ื—ื‘ืจื•ืช ืจื‘ื•ืช ื›ืžื• Yahoo, Lycos, Altavista ื•ื?ื—ืจื•ืช ื”ืฆื™ืขื• ืžื ื•ืขื™ ื—ื™ืคื•ืฉ ื‘ืจืฉืช, ื?ืš ื”ื—ื™ืคื•ืฉ ื‘ื”ื? ืœื? ื”ื ื™ื‘ ืชื•ืฆื?ื•ืช ืžืกืคืงื•ืช ื•ืžืฆื™ื?ืช ื”ืžื™ื“ืข ื”ื™ื” ื›ืจื•ืš ื‘ื ื™ืกื™ื•ื ื•ืช ืจื‘ื™ื? ื•ื’ื–ืœ ื–ืžืŸ ืจื‘. Google ืคื™ืชื—ื” ื?ืœื’ื•ืจื™ืชื? ื—ื™ืคื•ืฉ ืžื”ืคื›ื ื™ ื?ืฉืจ ื“ื™ืจื’ ื?ืช ืจืœื•ื•ื ื˜ื™ื•ืช ื”ืขืžื•ื“ ืœืคื™ ืžืกืคืจ ื”ื“ืคื™ื? ื”ื?ื—ืจื™ื? ื”ืžืงื•ืฉืจื™ื? ื?ืœื™ื•. ื?ืœื’ื•ืจื™ืชื? ืžื”ืคื›ื ื™ ื–ื” ื”ืขืœื” ื?ืช ื”ื—ื‘ืจื” ื”ืงื˜ื ื” ืœืจื?ืฉ ืžื ื•ืขื™ ื”ื—ื™ืคื•ืฉ ื•ื”ืคื›ื” ื?ื•ืชื” ืœืฉื? ื ืจื“ืฃ ืœื—ื™ืคื•ืฉ ืžื™ื“ืข.
ืขื? ื”ื–ืžืŸ ื™ื•ืชืจ ื•ื™ื•ืชืจ ื?ื ืฉื™ื? ื”ืคื›ื• ื?ืช Google ืœืžื ื•ืข ื”ื—ื™ืคื•ืฉ ื”ืขื™ืงืจื™ ืฉืœื”ื? ื‘ืจืฉืช ื•ื›ื™ื•ื? ืจื‘ื™ื? ื?ืคื™ืœื• ืœื? ืžืชื?ืžืฆื™ื? ืœื—ืคืฉ ื‘ืžืงื•ืžื•ืช ื ื•ืกืคื™ื? ื?ื? ื”ื? ืœื? ืžื•ืฆื?ื™ื? ื?ืช ืžื‘ื•ืงืฉื? ื‘Google.
ืžื›ื™ื•ื•ืŸ ืฉ-Google ื”ื•ื? ืขืกืง ืœืžื˜ืจื•ืช ืจื•ื•ื— ื”ื—ื‘ืจื” ื”ื™ื™ืชื” ืฆืจื™ื›ื” ืœื™ื™ืฆืจ ื”ื›ื ืกื•ืช ื•ื”ื™ื? ืขื•ืฉื” ื–ื?ืช ื‘ื?ืžืฆืขื•ืช ืคืจืกื•ืžื•ืช.

Powered by WordPress