Language Selection

English French German Italian Portuguese Spanish

Microsoft

Circumventing Microsoft

Filed under
Microsoft

Notwithstanding the fact it will be many years before very many corporate users might be able to work in a "Microsoft-free" environment, there appears to be significant effort being put forth to make it a reality. From the geekiest tech pubs, like the Java Developer's Journal to august ones such as The Wall Street Journal, circumventing Microsoft is a hot topic.

Will Longhorn be short on features?

Filed under
Microsoft

While Microsoft continues raising Longhorn, rivals are seizing the operating system's extended adolescence to develop competing feature sets of their own.

The already scaled-back version of Longhorn is still roughly 18 months from shipping, and with the expected technical advances by Linux competitors during that time, Microsoft's estimable industry influence to sell the product as currently constituted will be severely tested.

After cable recall, Xbox's still frying

Filed under
Microsoft

14 million games console owners are still at risk of waking up to find their Xbox has become an ex-box. For when Microsoft issued a safety advisory for Xbox customers last month, it failed to address the underlying problem.

$5m daily fine beckons for bad boy Microsoft

Filed under
Microsoft
Legal

Although the European Commission's statements are diplomatic to the point of opacity, there's no mistaking what it thinks of the latest turn in the Microsoft antitrust saga. The Commission doesn't think Microsoft's trying hard enough, and it has canvassed widespread industry support to bolster its position. From a Microsoft document unearthed by ZDNet, and still available here [PDF 450kb], we can see why even long time Redmond partners are losing their patience.

Windows Media Player Digital Rights Management Spy

Filed under
Microsoft
Security

This is something really nasty in the XP filing system... it's in Windows Media Player, and it not only has all the information about Digital Rights Management, it also has all the information about your local police force..... QED... Not only is microsoft spying on you, they are also telling the cops what you have got on your system....

MSN TV hacker jailed

Filed under
Microsoft
Legal

A Louisiana man has been sent to prison for six months for sending a malicious e-mail to Microsoft MSN TV customers.

The e-mails the convicted man sent out contained an attachment that the mails claimed would re-set their TV’s display colours when opened. Instead, the attachment contained script that re-programmed customers’ TV boxes to dial 911 instead of a local phone number to access Microsoft’s servers.

Microsoft's PUMA to prevent theft of audio data

Filed under
Microsoft

At the end of April at the WinHEC 2005 developers´ conference Microsoft intends to furnish further details on the copy protection functions of the successor to Windows XP Longhorn, which is planned for 2006.

Microsoft Monopoly Will Wane, Experts Say

Filed under
Microsoft

Microsoft's Explorer browser is already losing market share. It recently fell below the 90 percent mark because of competition from such rivals as the Firefox open-source browser. The Massachusetts Institute of Techology's Thomas Malone said he wouldn't predict how much Microsoft's dominance might fall.

Don't dump your stocks in the software giant, experts warn.

Microsoft's Sun server fetish revealed

Filed under
Microsoft
Humor

Shocking pictures leaked by a careless Microsoft blogger reveal a love that dare not speak its name. The photos from the Redmond campus are, in fact, so raunchy and audacious that a special Register editorial meeting was held to discuss whether or not they should even be discussed in an open forum. In the end, we decided to go ahead with the photos. It seemed like the right thing to do.

Syndicate content

More in Tux Machines

More GNU/Linux Games and CodeWeavers Joins The Khronos Group

Get Fresh Wallpaper Everyday Using Variety in Ubuntu/Linux

Variety is a cool utility available for Linux systems which makes your dull desktop look great, every day. This free wallpaper changer utility replaces your wallpaper in your desktop in an interval. You can set it to change wallpaper in every 5 minutes also! Read more

Today in Techrights

Security Leftovers

  • The Internet of Torts

    Rebecca Crootof at Balkinization has two interesting posts:

    • Introducing the Internet of Torts, in which she describes "how IoT devices empower companies at the expense of consumers and how extant law shields industry from liability."
    • Accountability for the Internet of Torts, in which she discusses "how new products liability law and fiduciary duties could be used to rectify this new power imbalance and ensure that IoT companies are held accountable for the harms they foreseeably cause.

    Below the fold, some commentary on both.

  • Password Analyst Says QAnon’s ‘Codes’ Are Consistent With Random Typing

    “The funny thing about people is that even when we type random stuff we tend to have a signature. This guy, for example, likes to have his hand on the ends of each side of the keyboard (e.g., 1,2,3 and 7,8,9) and alternate,” Burnett wrote in his thread.

  • Uber taps former NSA official to head security team

    Olsen, who served as the counterterrorism head under President Obama until 2014, will replace Joe Sullivan as the ride-hailing company's top security official.

    Sullivan was fired by Uber CEO Dara Khosrowshahi over his handling of a massive cyber breach last year that happened during former CEO Travis Kalanick’s tenure.

  • Malware has no trouble hiding and bypassing macOS user warnings

    With the ability to generate synthetic clicks, an attack, for example, could dismiss many of Apple's privacy-related security prompts. On recent versions of macOS, Apple has added a confirmation window that requires users to click an OK button before an installed app can access geolocation, contacts, or calendar information stored on the Mac. Apple engineers added the requirement to act as a secondary safeguard. Even if a machine was infected by malware, the thinking went, the malicious app wouldn’t be able to copy this sensitive data without the owner’s explicit permission.

  • Caesars Palace not-so-Praetorian guards intimidate DEF CON goers with searches [Updated]
  • Amazon Echo turned into snooping device by Chinese hackers [sic]

    Cybersecurity boffins from Chinese firm Tencent's Blade security research team exploited various vulnerabilities they found in the Echo smart speaker to eventually coax it into becoming an eavesdropping device.