“The problem with malware being served through advertisements is starting to become a serious one, with attackers seeming to enjoy it more and more because websites are not rushing to take steps to prevent it.”
Lucian Constantin, Clipboard Hijack Spreads Panic
This particular attack is copying a link to the computer clipboard, which seems to be persistent and cannot be removed by simple means, in most cases a computer reboot being necessary. The link in question redirects the user to a website that promotes a rogue antivirus program that is itself a spyware application.
So what can you do if your clipboard has been hijacked? Shut down your computer immediately and wait 30 seconds before rebooting.
|Previously, www.business.com, an online resource that has been very popular for many years and that has over 600,000 web pages in its root index was banned and penalized in Google, simply because it was using the wrong kind of redirect method. Getting a site banned in a search engine because of the wrong class of redirect happens more often than some people think.
Serge Thibodeau, The Rundown on 301 and 302 Redirects
Serge provides a good overview of the problems bad redirects can cause — and how to make sure your redirects are the kind Google tolerates.
|PON (Passive Optical Network) and Active Ethernet have falsely been cast as competitive technologies when, in fact, they are complementary.
David Russell, marketing director at Calix
Increasingly, GPON and Active Ethernet are being viewed as complementary technologies based on the application. GPON is ideal for mass residential and small business deployments, while Active Ethernet is sometimes preferred for larger businesses that demand dedicated fiber access.
|Individual blogs are not very interesting in themselves. What is important is how they link to each other to create a massive network.
Professor Henry Farrell, as quoted in In which I muse about what “Oracle blogging” means
|Microsoft really is losing it. I can’t help but notice that the evil empire keeps making one business mis-step after another since Bill has left. May I suggest firing Ballmer once more? It really is for your own good.
Steven J. Vaughan-Nichols, You can put lipstick on a pig but it’s still Vista
Have you ever wanted to make up a word? Now’s the time. Just make sure it has something to do with a cloud. Play a little Rolling Stones and get those neurons firing (Hey, hey, hey, hey — get off of my cloud)
I just want to jot these down before I forget. Seems like every day I stumble across more newly-coined cloud terms. Did you know how cloud computing got its name? From flow charts, where a cloud is used to represent the Internet.
cloud app – a software application that is never installed on a local machine — it’s always accessed over the Internet.
cloud arcs – short for cloud architectures. Designs for software applications that can be accessed and used over the Internet. (Cloud-chitecture is just too hard to pronounce.)
cloud bridge – running an application in such a way that its components are integrated within multiple cloud environments (which could be any combination of internal/private and external/public clouds).
cloudcenter – a large company, such as Amazon, that rents its infrastructure.
cloud client – computing device for cloud computing. Updated version of thin client.
cloud enabler – vendor that provides technology or service that enables a client or other vendor to take advantage of cloud computing.
cloud envy – used to describe a vendor who jumps on the cloud computing bandwagon by rebranding existing services.
cloud OS – also known as platform-as-a-service (PaaS). Think Google Chrome.
cloud portability – the ability to move applications and associated data across multiple cloud computing environments.
cloud provider – makes storage or software available to others over a private network or public network (like the Internet.)
cloud service architecture (CSA) – an architecture in which applications and application components act as services on the Internet
cloud storage – (just what it says) Sometimes compared to leasing a car – you’ll have monthly payments but hopefully you’ll always have the lastest/greatest technology. You’ll never own the technology though.
cloudburst – what happens when your cloud has an outage or security breach and your data is unavailable.
cloud as a service (CaaS) – a cloud computing service that has been opened up into a platform that others can build upon.
cloud-oriented architecture (COA) – IT architecture that lends itself well to incorporating cloud computing components.
cloudsourcing – outsourcing storage or taking advantage of some other type of cloud service.
cloudstorm – connecting multiple cloud computing environments. Also called cloud network.
cloudware – software that enables building, deploying, running or managing applications in a cloud computing environment.
cloudwashing – slapping the word “cloud” on products and services you already have.
external cloud – a cloud computing environment that is external to the boundaries of the organization.
funnel cloud – discussion about cloud computing that goes round and round but never turns into action (never “touches the ground”)
hybrid cloud – a computing environment that combines both private and public cloud computing environments.
internal cloud – also called a private cloud. A cloud computing-like environment within the boundaries of an organization.
personal cloud – synonymous with something called MiFi, a personal wireless router. It takes a mobile wireless data signal and translates it to wi-fi. It’s pronounced ME-fi, as in “the personal cloud belongs to me — but if you’re nice I’ll let you connect.”
private cloud – an internal cloud behind the organization’s firewall. The company’s IT department provides softwares and hardware as a service to its customers — the people who work for the company. Vendors love the words “private cloud.”
public cloud – a cloud computing environment that is open for use to the general public.
roaming workloads– the backend product of cloudcenters.
vertical cloud – a cloud computing environment optimized for use in a particular vertical industry
virtual private cloud (VPC) – similar to VPN but applied to cloud computing. Can be used to bridge private cloud and public cloud environments.
Have you run into a cloud word that’s not on this list or have an addition/correction to my notes above? Drop a comment below or write to me — mrouse at techtarget dot com.
|The CX1 is Cray’s new personal supercomputer. The unit is small — it’s meant to fit beside a desk — and it can be plugged into a wall socket on standard office power.
Ian Miller, as quoted in Cray Unveils Personal Supercomputer
Lots of buzz about the Cray CX1 this week, although the idea of an office supercomputer is nothing new. NEC is probably the leader on that front. What’s different about this announcement is that Cray teamed up with Microsoft and these little babies come pre-installed with Windows HPC Server 2008.
|The single most depressing thing for me in IT is how many applications are really just Mainframe data processing solutions with better screens.
Steve Jones, CRUD is Crap
Looking at the latest raft of .NET, Ruby, Java and the like CRUD “tools” really is pretty depressing, not so much that they are bad (they aren’t) but because people seem to be still insisting on coding this dull and uninteresting crap and looking for yet more ways to “optimise” their code for a task that should be tooled.
Doug Justice posted something interesting (and positive) on CRUD tools.
|NBAR is a very powerful application-layer firewall that you may already have installed on your Cisco router. While traditional firewalls can only recognize traffic based on IOS Layers 3 or 4, Cisco’s NBAR can go all the way to Layer 7.|
|Take a look at the Terms and Conditions for the “Chromium” project up on Google Code. There are 24 different bits of third party software involved in making Chrome work, and one of them is WTL, the Windows Template Library, which was released as Open Source in 2004.|