happygeek 2,411 Most Valuable Poster Team Colleague Featured Poster

I wouldn't even give him one, having had the misfortune to have heard some of his output escaping from the bedroom of my 10 year old daughter (pretty much the exact target market I imagine).

But, that said, there is no denying he is popular. I posted a news story last night which reveals that Justin Bieber has overtaken Lady Gaga to have the most viewed YouTube video of all time with his 'Baby' song.

If you are not quite interested enough to click the link and read the full story, the Bieber video had been watched a staggering 247,991,181 at the time of writing, which was less than 12 hours ago.

happygeek 2,411 Most Valuable Poster Team Colleague Featured Poster

In the previous example one of our volunteer mods was kind enough to go through the code and change the URLs that were causing the problem to a generic example.com instead. However, that is different to deleting all the html/css from your code and deleting the images.

In any case, editing the code to remove links is, as I say, something that a friendly moderator might volunteer to do but it's entirely at their discretion in cases such as this.

happygeek 2,411 Most Valuable Poster Team Colleague Featured Poster

Teen pop sensation Justin Bieber has already conquered Twitter, and now it would appear he has become the undisputed King of YouTube after knocking Lady Gaga off of the 'most viewed video ever' spot. According to a posting on Twitter by YouTube, Bieber first overtook Lady Gaga on Thursday night but was soon beaten down again as Gaga fans viewed the Bad Romance video by the thousand.

biebervideo001.jpg However, within 48 hours the inevitable weight of Bieber fans has taken its toll and the Baby video has now pulled well clear with 247,991,181 views compared to 'just' 246,609,606 views for Lady Gaga. To put this in to some kind of perspective, the third most viewed YouTube video of all time is 'Charlie bit my finger - again' featuring a cute kid and his baby brother with 210,601,397 views.

Lady Gaga has, so far, remained quiet about the YouTube battle. Not so Bieber who commented via Twitter http://twitter.com/justinbieber that "what is goin on with the BABY video on youtube is crazy...i started on youtube so the support...well i just need to say thank u" and later added "someone just showed me and i just need to say that @ladygaga is an incredible artist who have great respect 4. and her vid is incredible".

Of course, not everyone will be pleased to see Bieber grab the record for having the most viewed YouTube video of all time. We have already seen the development of the

happygeek 2,411 Most Valuable Poster Team Colleague Featured Poster

The co-CEOs of BlackBerry developers Research In Motion, Mike Lazaridis and Jim Balsillie, have accused Steve Jobs of unacceptable behaviour and Apple of avoiding responsibility for its design mistakes. "RIM's customers don't need to use a case for their BlackBerry smartphone to maintain proper connectivity" they say. Meanwhile Nokia insists that it will "prioritize antenna performance over physical design" every time, in a clear dig at the iPhone development process.

appleant01.jpg It was only a matter of time before the sticky stiff hit the fan following the Apple iPhone 4 press conference yesterday during which Steve Jobs first claimed all phones had antenna weak spots and demonstrated this using a BlackBerry, before handing out free cases and then declaring there was no problem with the iPhone antenna design at all.

Steve Jobs was plainly angered by the media reaction to consumer complaints regarding signal loss, and keen to demonstrate how the way you hold a handset can impact upon the reception you get. Apple even has a whole section of the website devoted to comparing signal strength of handsets, complete with photos and videos by way of 'proof' that this is not just an iPhone 4 issue. But there is no doubt that Jobs also finished yesterday on an up, with the general media coverage being positive and welcoming of the free bumper case and offer of a refund.

It didn't take long for RIM co-CEOs Mike Lazaridis and Jim Balsillie to respond

happygeek 2,411 Most Valuable Poster Team Colleague Featured Poster

His English teacher at school must be so proud...

happygeek 2,411 Most Valuable Poster Team Colleague Featured Poster

Considering a couple of emails I have had regarding this story already, maybe I should clarify a few points:

Yes, of course I am happy that Apple is doing something to resolve consumer issues with the iPhone 4.

No, I do not think the use of a bumper case is an elegant solution. If you have to physically cover the antenna then surely the fact it comes 'naked' makes it a design fault and the iPhone should be recalled.

Yes, I am hugely confused by the Steve Jobs position which appears to be something along the lines of 'all phones have these signal problems, updating the OS will help, adding a bumper case will help, the iPhone 4 has no signal problem'.

happygeek 2,411 Most Valuable Poster Team Colleague Featured Poster

Apple has been holding a highly unusual press conference to clam fears about the iPhone 4 and the 'death grip' problems some users have experienced. Unfortunately, Steve Jobs seems to be in two minds about what message to get across. On the one hand he says there is no problem, on the other he's giving away free cases to solve it...

The iPhone 4 may have sold more than any other iPhone in the shortest period, but it has also brought with it the most bad press and a wave of consumer anger courtesy of the now infamous problem with reception when held in a certain way. Known as the iPhone 4 death grip, unfortunately this method is the most common when holding a touchscreen smartphone device such as the iPhone. Even more unfortunately, Steve Jobs himself angered consumers after reportedly telling one buyer who complained 'not to hold it like that then'. Now Jobs has been forced into backtracking and doing something that Apple is not used to, holding an unscheduled 'on-campus' press conference to try and fire-fight the growing media bad publicity storm and calm the consumer ill feeling and concern. That press conference is just now coming to an end, and DaniWeb can reveal exactly what Apple and Steve Jobs have done to solve the iPhone 4 reception problem.

iphone4fix.jpg After playing a spoof 'fanbois' video Steve Jobs took to the stage and, standing in front of a banner announcing 'we're not perfect' …

happygeek 2,411 Most Valuable Poster Team Colleague Featured Poster

Viral videos are usually a great laugh, which is why they spread so quickly and the reason they get called viral in the first place. But the laughter soon stops when the bad guys use the lure of a viral video to launch a clickjacking attack.

coke.jpg Security researchers at Sophos are warning that scammers have struck on Facebook with a message that is spreading fast by proclaiming "I am part of the 98.0% of people that are NEVER gonna drink Coca Cola again after this HORRIFIC video" and which includes a link.

What makes this particular attack stand out from recent clickjacking exploits, is the fact that the bad guys ensure that people will pass the message to their Facebook friends by telling them that in order to actually view the video they have to share it with at least seven members.

Of course, it doesn't actually matter how many times that link is shared because there is no video to play. It looks like there is, with a thumbnail of a video showing a Cola bottle and the words 'Coke can't hide its CRIMES' but it's just a thumbnail and nothing more. The social engineering psychology comes into play by including a link which says "Click here To Skip Posting and Reveal The Content" instead of continually checking to see if you've passed the link to enough people. coke2.jpg If you hit this link, you get taken to a survey section which …

happygeek 2,411 Most Valuable Poster Team Colleague Featured Poster

Windows is, according to just about any security expert you ask, the operating system most vulnerable to attack. Unless the security expert happens to be from Microsoft, that is. So it was quite refreshing to see Microsoft admitting to a spike in attacks on Windows this week.

windowsattack.jpg According to a posting by Holly Stewart on the Microsoft Malware Protection Center Threat Research & Response Blog Windows XP and Windows 2003 are officially under attack. Russia has seen ten times as many attack attempts than the global average, and the UK has witnessed a "surge" in the words of Microsoft.

Referring to the vulnerability that was patched by a Microsoft critical update and described in Security Bulletin MS10-042 which can allow remote code execution through the Windows Help and Support Center, Stewart states "As of midnight on July 12 (GMT), over 25,000 distinct computers in over 100 countries/regions have reported this attack attempt at least one time". The spike in attack attempts over this last weekend was really quite dramatic, and comes after Microsoft announced the timetable for releasing the fix.

Stewart says "these attack attempts have continued to expand and some new attack patterns have come into play" adding that the attacks witnessed in the wild "work only on Windows XP" and not Windows 2003. Of course, that hasn't stopped people from trying to exploit the vulnerability on versions of Windows that are not susceptible to it. Indeed, Microsoft says it has …

happygeek 2,411 Most Valuable Poster Team Colleague Featured Poster

1. Keep it pleasant. Resorting to immature name calling is no way to make a point, well not if you expect anyone to take you seriously dude.

2. DaniWeb does not delete accounts, nor does it delete posts unless they break the rules. If you no longer wish to be a member, simply stop posting and don't login again.

happygeek 2,411 Most Valuable Poster Team Colleague Featured Poster

OK folks, time to calm down before the ugly tattooed admin with the big stick (erm, that would be me) comes along and bashes this thread into submission by closing it.

The Founder: you broke the rules, you were warned for breaking the rules by our Super Moderator Sanjay, the clever money would be on someone learning from their mistakes and moving on from this rather than acting like a troll with all the 'I've got more money than you' nonsense.

Everyone else: stop feeding the fire and fanning the flames.

Lusiphur commented: Point taken :twisted: +0
happygeek 2,411 Most Valuable Poster Team Colleague Featured Poster

There's certainly an opportunity for some Chatroulette advertising there. I would have thought :)

happygeek 2,411 Most Valuable Poster Team Colleague Featured Poster

Security researchers reveal ways that willy-waving Chatroulette users might be leaving themselves open to much more than accusations of just being dirty perverts as privacy attack scenarios are explored.

chatr.jpg If you have ever been tempted, like so many male Chatroulette users, to show complete strangers the contents of your trousers new security research might persuade you not to join in this offensive nonsense. Video chat services such as Chatroulette enable random strangers to get virtually connected, but the lure of perceived anonymity and a somewhat ironic assumption of privacy has meant that it has attracted a somewhat unsavoury crowd of what a few years ago we would have called flashers or perhaps more correctly perverts.

I have tried using Chatroulette myself, and every single time have been greeted with the sight of some bloke playing with his erect penis within seconds or minutes at the longest. Word of this kind of behaviour quickly spreads and, when coupled with an apparent inability of the site operators to prevent it, attracts more willy-waving perverts until things inevitably reach the point where people use the service just to look at these members, if you'll excuse the pun.

Indeed, according to one analysis of Chatroulette traffic 1 in 8 sessions resulted in something R-rated or worse, and 89% of users were male - you are more likely to connect to nobody at all than a single female apparently. Chatroulette itself has tried to combat this misuse by …

happygeek 2,411 Most Valuable Poster Team Colleague Featured Poster

Indeed, it's just a visual representation of the Internet circle of life :)

Visit a fake Twitter URL, end up at a zombie host, get spammed with email offering sex and drugs.

Or something...

happygeek 2,411 Most Valuable Poster Team Colleague Featured Poster

If you were asked to paint a verbal picture of the Internet in just five words, would they be porn, drugs, spam, Twitter and zombies? After analyzing an amazing two billion emails a day for three months, that's the image arrived at by one research outfit.

commtouchimage.jpg The latest Internet Threat report from Commtouch , released today, contains little in the way of surprise: unless those five words have been off your security risk radar that is.

Based upon the analysis of more than two billion email messages every day, and apparently that is the correct figure, as well as the GlobalView URL database within the company's cloud-based network the Commtouch report is nothing if not extensive in reach. As far as the quarter two report that has been published today is concerned, the real story is the ever increasing use of blended attacks by the cybercriminal fraternity. Combining general messaging with Web-based and social engineering elements the bad guys hope to increase their success rates.

They tend to use email, or search engines for that matter, to lure their victims onto mainly genuine but compromised websites which are being covertly used to host spam advertising, malware, or phishing scams. I say covertly, as the honest owners of the majority of these compromised sites have absolutely no idea that they are being used for these nefarious purposes. Of course, the sad fact of the matter is they also have no idea about IT security …

happygeek 2,411 Most Valuable Poster Team Colleague Featured Poster

Sit rep update :)

Davey is, as mentioned in various moderator forum threads, still working on it but having trouble (as Dani predicted when we spoke about this in New York) coming up with a re-write that deals with signature spam in any meaningful way.

We cannot, and indeed will not, have a rule which forbids people from saying, in effect, 'I agree' or similar. Otherwise we'd have to have a rule which banned people from saying I disagree, and then it's a slippery slope to no discussion whatsoever. OK, I exaggerate, but you see where I am going with this.

Equally, the management consensus of opinion is that signatures are here to stay (albeit not visible to guests - which has reduced the number of sig spammers in my opinion) so there will be no direct ban.

So it all comes down to an appropriate wording which allows posts that are 'in context' and 'add value' but which does not alienate new posters, and which is not subjective in any way. Past experience suggests that the rules work best when subjectivity is taken out of the equation, so they need to be clear cut for both members and mods. This is very important, as can be seen by the fact that currently different people have very different ideas as to what is and isn't sig spam!

However, I am working on it as time allows. Unfortunately this has been in shorter supply than usual …

happygeek 2,411 Most Valuable Poster Team Colleague Featured Poster

Glad to have you back!

happygeek 2,411 Most Valuable Poster Team Colleague Featured Poster

Before I get Apple-bashed too much for this one, can I just point to the last paragraph which states: "many people will simply find it hard to believe somehow, or anyhow for that matter, that Apple is a bigger security risk than Microsoft" and "As part of the bigger security picture though I'm just not sure that the evidence stacks up to support Apple being repositioned as public enemy number one".

happygeek 2,411 Most Valuable Poster Team Colleague Featured Poster

Most people seem to think that Microsoft is the most insecure vendor while Apple reigns supreme at the top of the good security league. However, a new security report would appear to turn that assumption on its head, claiming that when it comes to the vendor with the most vulnerabilities Apple has consistently ranked higher than Microsoft and, indeed, now ranks number one in that particular bad guy top ten.

applesecurity.jpg As the new Secunia Half Year Security Report 2010 is released, will Monday 12th July be remembered as the day Apple became the bad guy? The report reveals the evolution of the security threat that has been posed by the presence of vulnerabilities across the previous five years, as well as giving an outlook for the remainder of 2010 based upon the first six months of data so far. And things aren't looking too great for Apple.

Perhaps most surprising of the revelations contained within the Secunia report is the finding that a relatively small group of just ten vendors, including the likes of Adobe, Apple, Cisco, IBM, Microsoft and Oracle actually account for a staggering 38% of all the vulnerabilities that are disclosed on a yearly basis.

Well, that and the claim that, when ranked by the number of vulnerabilities found across the entire product ranges, Microsoft is only bad guy number three. Oracle, which has been ranked at number one for four of the last five years, has slipped to …

happygeek 2,411 Most Valuable Poster Team Colleague Featured Poster

Stand up if you like paying your income tax. To all of you who have remained seated, which I will assume is indeed all of you, I have some more bad news: the bogus tax collectors want your money as well, and now they have botnets helping them.

taxman.jpg According to a recent analysis by financial malware protection specialist Trusteer of just one botnet, specific to the UK market, it was actively looking for login information for users of the HM Revenue & Customs site where people can pay their income tax and VAT online. This botnet had details of more than 10,000 victims and included both full login credentials and passwords for the HMRC site. This is important, especially at this time of year, as in the UK there is a 31st July deadline for the self-employed to submit their second-instalments of income tax for the year. In a double whammy, those on low incomes also have to submit their tax credit claim renewals by the same date, and for many businesses it's also a filing date for quarterly VAT returns for good measure.

Connect the dots and the fact that botnets are actively targeting HMRC login data and the 31st July deadline is fast approaching is truly worrying. What it means is that there is likely to be an increase in the number of carefully targeted email phishing attacks on people whose login information has been compromised, as opposed to …

happygeek 2,411 Most Valuable Poster Team Colleague Featured Poster

cool cant wait to see

Erm, can't wait to see what, exactly?

As I've said before, scroll up a couple of posts, this is the new look!

happygeek 2,411 Most Valuable Poster Team Colleague Featured Poster

I am Davey "Brokeback Burrito" Winder and I claim my five pounds. Actually, it felt like a five pound burrito, come to think of it...

happygeek 2,411 Most Valuable Poster Team Colleague Featured Poster

Unless you have been living in a cave you cannot have failed to spot that the iPhone 4 is with us, 'don't hold it like that' antenna problems and all. But what about the iPod Touch 4? Traditionally, the new iPod is launched in September and the new feature set is kept pretty secret. Well, as secret as it can be when you consider that it is inevitably based around the upgraded iPhone handset that has gone a few months before it. But this year, according to UK gadget site Pocket Lint at least, the new features cat is out of the Apple bag courtesy of a man by the name of Rob Hennessey.

ipodtouch4.jpg Hennessey is the audio and telecomms buyer for UK retailer John Lewis, and during an event in London where he presented a sneak preview look at what the retail chain would be stocking this Christmas he included a slide entitled 'Apple iPod refresh in September' complete with photos and feature descriptions. You can see that slide featuring what is claimed to be the new Apple iPod Touch 4 here .

According to Hennessey, whose information is said to come direct from the suppliers, the major new features of the iPod Touch 4 will include:
5-megapixel camera with flash
720p HD video
Gyroscope
FaceTime video chat over Wi-Fi

Hennessey also suggested that the iPod Touch 4 will be marketed first and …

happygeek 2,411 Most Valuable Poster Team Colleague Featured Poster

Why are weapons such a taboo subject in the UK? Seriously, you guys are afraid of having pointed ends on a kitchen knife.

We've seen the mess they've made in the USA and would rather our murder rate didn't get that high, thanks very much.

happygeek 2,411 Most Valuable Poster Team Colleague Featured Poster

But how come all the British and French gangbangers don't buy a bunch of guns in the U.S. and take them back. I've never understood the lack of gun crime in Europe. Illegal guns must cost way more over there and the thugs simply can't afford them?

Getting guns into the UK is a lot more difficult than you might imagine, especially in these days of heightened terrorist alerts.

Most of the guns used in gun crime over here would appear to be 'recommissioned' weapons that were previously deactivated (blank firers, converted for use as air pistols/rifles, collectors items etc).

That said, as I understand it, many of the gangbangers here simply hire an illegal firearm (for a relatively low cost) from underground sources for a day or two - just long enough to do a robbery or threaten/kill a rival.

happygeek 2,411 Most Valuable Poster Team Colleague Featured Poster

And it has been demonstrated over and over again, time after time, that crime INCREASES when guns are restricted or banned.

Not in the UK it hasn't. Over here, where guns have always (in recent history at least) been restricted, we are finding that as guns become easier to get hold of so gun crime increases. That, it seems to me, is a pretty obvious conclusion to draw.

happygeek 2,411 Most Valuable Poster Team Colleague Featured Poster

New research carried out on behalf of Get Safe Online , a national Internet security awareness initiative backed by the UK Government and the Serious Organised Crime Agency, has revealed that 30 percent of Internet users are putting themselves at risk when they book a holiday online.

getsafeonline.jpg Get Safe Online and ABTA, the UK travel industry association, are now warning holidaymakers not to ignore basic online fraud-prevention measures when looking for a holiday bargain on the Web and suggesting that some might be handing over hard-earned cash for dream holidays that simply do not exist.

The survey of 1000 British adults suggests that 1 in 3 of them did not bother to confirm the authenticity of a travel provider before giving their payment details when making travel arrangements. Just to rub salt into this insecure wound, 1 in 5 didn't bother the check if the payment page was secure either.

The findings are particularly worrying when you discover that 26 percent of users admitted they were driven primarily by price when choosing an online break, as compared to a meagre 4 percent that thought good service came first. Only 11 percent went directly to a 'known operator' in the travel business, with 31 percent going wherever their search engine took them instead.

Basic fraud-prevention measures are being overlooked, it would appear, with 67 percent of those asked unaware of holiday rental scams and 68 percent unaware that bogus holiday sites existed. Yet …

happygeek 2,411 Most Valuable Poster Team Colleague Featured Poster

Opting to have a family 'Man vs Food' challenge for dinner last night. The burrito was just too big but I still ate it, and finished first. Hey, they might be kids but it was still a competition :)

Trouble is, bloating, gut-ache and an afternoon full of meetings really don't mix that well...

happygeek 2,411 Most Valuable Poster Team Colleague Featured Poster

Now that's clever. Damn spammers :)

happygeek 2,411 Most Valuable Poster Team Colleague Featured Poster

This IS the new look :)

happygeek 2,411 Most Valuable Poster Team Colleague Featured Poster

Despite the ongoing signal strength problems displayed by the new iPhone 4 , there can be no denying that the latest Apple gadget has been a runaway success. With Apple claiming 1.7 million units sold in just the first three days it would be hard to argue. One of the not often discussed implications of that kind of sales surge is what happens to the previous model? It can now be revealed that Apple users are environmentally friendly types, you could call them green Apple users I guess. The iPhone 3G is now officially the most recycled mobile phone in the UK.

greenapples.jpg I was recently checking out what kind of recycling value my iOS 4 upgraded iPhone 3GS had, just in case I felt the urge to get an iPhone 4 when that signal problem gets sorted, and couldn't help but notice that the iPhone is far and away the most often recycled handset at most of the online sites that deal in such things. At the mobile recycling comparison site Compare and Recycle iPhones occupy the first, second and fourth most recycled positions as I write. The iPhone 3G 8GB is first, followed by the iPhone 3G 16GB and the iPhone 3GS 16GB. Only the Nokia 5800 prevents an Apple one-two-three.

I'm not actually sure that Apple users are being green out of any desire to be environmentally friendly to be honest. In fact I'm pretty sure that the …

happygeek 2,411 Most Valuable Poster Team Colleague Featured Poster

Agreed. Have just spent some time in the Reported Posts forum and it is, indeed, a mess right now.

Have alerted Dani to the ongoing solved/unsolved problem.

happygeek 2,411 Most Valuable Poster Team Colleague Featured Poster

There was a database problem yesterday which should be resolved now, as I understand it.

happygeek 2,411 Most Valuable Poster Team Colleague Featured Poster

A new poll into Operating System popularity by a British computer magazine has revealed that an incredible 37 percent of respondents are still using Windows XP. That's more than Windows 7 which managed to woo 30 percent of the folk taking part, and Vista could only garner a pretty poor 16 percent of support. This being a PC magazine it should come as no great surprise to see Linux being used by 8 percent of respondents and Mac OS by 7 percent. However, what was surprising was the sheer number of people who refuse to let Windows XP die.

XP.jpg Was it really over three years ago now that I penned a story here on DaniWeb entitled Windows XP 2001-2008 R.I.P in which I suggested a suitable epitaph might be good riddance to insecure rubbish? mind you, some 18 months later the doubts were starting to stir and I even went as far as calling Windows XP the invincible OS and suggested that perhaps Microsoft just didn't have the stomach to kill off this dinosaur of the Windows world.

Microsoft could best be described as killing XP gently, I guess, and the first real twist of the knife happens on July 13th when Windows XP SP2 reaches the end of its life . What that means is Microsoft will stop releasing security updates, hotfixes and other updates from that date. Which could be problematical when you consider that …

Lorele commented: Windows XP was the bridge between all the prototypes after Windows 3.1 until 2000... What about 2000 NT? +0
happygeek 2,411 Most Valuable Poster Team Colleague Featured Poster

Hackers have targeted Justin Bieber videos on YouTube, exploiting a cross-site scripting vulnerability which enabled them to bombard viewers with pop-up messages and redirect them to porn sites. The hack attack lasted for the best part of two hours before Google was able to isolate the problem and apply a fix.

bieber.jpg As well as using Justin Bieber video clips as the bait for the attack, the hackers also took the opportunity to leave abusive and obscene comments about the popular teen idol singer. A number of banner messages even appeared beneath the most popular Bieber videos proclaiming that he was dead. A Google spokesman told The Telegraph that the YouTube hack had been dealt with swiftly , claiming "Comments were temporarily hidden by default within an hour, and we released a complete fix for the issue in about two hours. We’re continuing to study the vulnerability to help prevent similar issues in the future."

Meanwhile, security expert Graham Cluley points out that this is a big target with millions of visitors a day and hopes that YouTube will be investigating what went wrong with their processes , as well as "explore if they are reviewing code properly before it is made live to ensure that loopholes aren't left in their code in future."

This isn't the first time that Justin Bieber has found himself at the centre of an online controversy. DaniWeb has previously reported how Twitter tweaked its trending …

happygeek 2,411 Most Valuable Poster Team Colleague Featured Poster

I thought the photo caption error was Amiga Format magazine? I remember the issue quite clearly, as I was writing for a couple of Amiga magazines at the time including another in the Future Publishing stable.

happygeek 2,411 Most Valuable Poster Team Colleague Featured Poster

Attachments are generally no problem as most of the ones I get, or at least get and want/need to view, or straightforward images or PDF/Word docs.

iPhone keyboard isn't too bad, although I prefer not to write more than I have to with it :)

happygeek 2,411 Most Valuable Poster Team Colleague Featured Poster

I am told, by those who follow the sport, that the Netherlands soccer team stands a pretty good chance of lifting the FIFA 2010 World Cup trophy. The bad news for any Netherlands fans is that their side has already been defeated by India, in the World Cup of security that is.

secureworks02.jpgA SecureWorks study analysed the locations of attempted cyber attacks on its global client-base between January and June this year, and then compared this with the total number of active PCs in each country to produce a league table that determines which of the top 16 countries based on active computer counts had the lowest number of attempted cyber attacks originating from within its borders. The results might surprise you.

India were the clear winners with just 52 attacks per 1000 computers originating from within its borders. The Netherlands came in second with 57 attacks, just beating off some stiff competition from Germany (78) and Brazil (89) with all other countries not managing to break the under one hundred attacks barrier. France came fifth with 106 while the UK was sixth on 107, but the USA put in a shameful performance to finish at the bottom of the table on an astonishing 1,660 attempted attacks per thousand computers. China is often seen as one of the bad guys when it comes to launching cyber-attacks , but only finished tenth with just 201 attacks per 1000. Meanwhile Russia, the other infamous …

happygeek 2,411 Most Valuable Poster Team Colleague Featured Poster

I forgot to mention the fact that I have boxes full of ZX80s, ZX81s, Spectrums, Dragon 32/34s etc (working and non-working for spares)...

We are beyond help, methinks.

G_Waddell commented: Love the ZX +0
happygeek 2,411 Most Valuable Poster Team Colleague Featured Poster

What if I were to wear a wig and a dress, would that help? :)

happygeek 2,411 Most Valuable Poster Team Colleague Featured Poster

Any other collectors of vintage video game consoles on DaniWeb? Or am I really the only person sad enough to have more than 1000 of the things in my house? My collection has even been loaned to a museum for a special history of video gaming exhibition before now.

To give you an idea of just how dedicated/fantastic/obsessed/sad (delete as appropriate) I am about my collection, I have no less than three examples of the very first home video games console: the Magnavox Odyssey from 1972. All of them are boxed, complete, original and in full working order. I ended up with three as I was offered a second complete and original example for a good price and simply couldn't resist it, and the third is a rare example of a unit sold in the UK (complete with the UK distributor documents, original bill of sale etc) which again the nerd in me could not resist.

Other stuff here ranges from a wheelbarrow-full of Nintendo Game and Watch devices, loads of truly amazing yet bizarre things such as the Vectrex with its vector graphics for example.

Hey, everyone needs a hobby, right?

happygeek 2,411 Most Valuable Poster Team Colleague Featured Poster

Lost you the first time while scanning for good looking chicks who are into programming. ;)

Surprised you didn't spot me standing next to Dani then! >:)

happygeek 2,411 Most Valuable Poster Team Colleague Featured Poster

Social networking can also be private, or at least as private as unencrypted webmail let's say, if you use something like the Twitter Direct Message function rather than posting to the entire world.

But, as I say, I find only a very few people make use of this.

What I am finding myself doing more and more is reading, rather than creating/sending, email on my iPhone using the standard iOS Mail client combined with Gmail. At the same time I almost instinctively check my Twitter feed. In fact the two are pretty much joined at the hip in my psyche now, and iOS 4 multi-tasking has been the glue :)

So in my case it would be more apt to say that the iPhone is wounding, if not actually killing, desktop email.

happygeek 2,411 Most Valuable Poster Team Colleague Featured Poster

Have you ever wanted to write your own code to create software for the Mac, iPhone or even the iPad but have never actually programmed on a Mac platform? Great, then this new book by Tim Isted is for you. Tim has been coding for the Mac for 15 years, and now he's sharing that knowledge with a wider audience of Mac coding newbies through the Beginning Mac Programming book.

macprogbook.jpg Insisting that he will take the reader on the fastest and easiest route to releasing software, even if they have never written a single line of code before, Tim is obviously not scared of making bold promises. Thankfully, by adopting a 'code as you learn' approach to teaching, he is more than capable of walking the programming tutorial walk. Indeed, by just the second chapter of the book the reader starts to develop their very first program. "We’ll be jumping headfirst into creating applications on the Mac that look and behave like the other Mac applications you’re used to" Isted says, adding that as well as learning general programming principles the reader will put them "into practice in real-world situations, right from the start".

I found the hand-holding without patronizing approach to be perfectly suited to the target reader, that is the Mac or iPhone user without a computer science degree but with a love and understanding of the hardware itself. Indeed, non-coding power users will love this book because it constantly assures the reader, …

happygeek 2,411 Most Valuable Poster Team Colleague Featured Poster

Hey Wolfy, how the heck are you? I was the bald one with all the tattoos, by the way :)

happygeek 2,411 Most Valuable Poster Team Colleague Featured Poster

"The more we communicate the less likely we are to denigrate"

I like it :)

happygeek 2,411 Most Valuable Poster Team Colleague Featured Poster

Best thing about iOS 4 after using it in anger, and joy, since the day of release? Not multi-tasking, although being able to do something else while listening to streaming radio via my 3GS in neat, but the folders. I simply love them, a really great improvement to the iOS in my opinion. Should have been there from day one!

happygeek 2,411 Most Valuable Poster Team Colleague Featured Poster

Any comment on this?
http://www.talkandroid.com/4501-iphone-4-reception-solution-dont-hold-it-that-way/

Not really Peter as that is an iPhone 4 problem rather than an iOS 4 one, and this review is about the latter rather than the former :)

That said, looks like Apple is trying to shift the blame away from the hardware implementation and onto the software algorithm for calculating signal strength and in turn onto the user for believing it. Sigh.

happygeek 2,411 Most Valuable Poster Team Colleague Featured Poster

It's an interesting question, and one that's being raised by Gartner which is predicting that the number of wireless e-mail users will reach an incredible one billion , worldwide, by the end of 2014. A number that's not too hard to accept, given that earlier this year global business wireless e-mail accounts were being estimated in the region of 80 million, and that's equivalent to around 60 million individual users.

email.jpg Monica Basso, research vice president at Gartner, points to how the productivity gains achieved with using wireless e-mail are driving adoption beyond the purely executive reach and reveals that "in 2010, enterprise wireless e-mail is still a priority for organizations, whose mobile workforces are up to 40 per cent of the total employee base. Most midsize and large organizations in North America and Europe have deployed enterprise wireless e-mail already, but on average, for less than five percent of the workforce."

The really interesting stuff starts as wireless e-mail begins to integrate more completely with social networking. There is no doubt that social networking is starting to complement e-mail already as far as interpersonal business communications are concerned. But Gartner is going further, and predicting that courtesy of standardisation, interoperability and the increasing commoditization of mobile email services, vendors are looking to pursue a differentiation into the cloud and into collaborative services. As a result, Gartner says, that social networking services "will replace e-mail as the primary vehicle for interpersonal communications" at least for …

happygeek 2,411 Most Valuable Poster Team Colleague Featured Poster

Page is displaying OK here in Chrome following that link (only browser I have access to at this precise moment)