Monday, December 29, 2008

Epson Printers, Fleecing Consumer Pockets. The Ink Gimmick.

Beware Of Epson Printers.
This is a very important piece of information that you should all be aware off. We were amazed that we fell for this cheap gimmick played by a reputed company like EPSON. It is sad that even an experienced I.T team like ours could fall for this gimmick. We purchased an Epson C110 printer and used it for a while, after a while the ink in the printer flagged low levels and we needed to add a new catridge. Nothing wrong so far as this was a normal thing to do. We went to the reputed I.T store where the Epson C110 was purchased from and requested for the ink catridges. The price was a whooping 45 U.S$ !!!! This was robbery since the new Epson C110 printer was purchased for a little over 100 U.S$.
As is the normal practice, we requested for a compatible set of catridges for the C110 printer. Printer users normally use this option as these catridges are very much cheaper than the Epron ink catridges brand. We were told that the ink catridges for the Epson C110 have an embedded chip that cannot be duplicated. As a result of this no other ink catridge manufacturer could make compatible catridges for the Epson C110 printer. This is downright robbery on the part of Epson and you can see a better explanation below.
In the normal course there is a price difference of 40% to 60% between compatible ink catridges and ink catridges sold by Epson. Regarding Epson's claim that compatibles are of inferior quality, we need to let the consumer decide price over quality. It is now known that Epson will start this chip insertion for ink catridges used in all Epson printers to come. So dear customers, it is time that we gave Epson the boot and stopped buying Epson printers.
Here are a few interesting facts that need to be analyzed:
(a) Mitsubishi makes CD drives, they however do not force consumers to buy only CD disks branded as Mistubishi.
(b) Kodak makes film and cameras, they do not force you to use Kodak film on Kodak cameras.
(c) Nikon sells high end cameras and lenses. There are any number of compatible lenses that can be fitted on Nikon cameras. These compatibles cost a fraction of what original Nikon lenses sell for.
(d) ASUS is one of the most popular manfucturers for PC computer mainboards and advanced graphic cards. They do not tie you to their product when assembling a computer by putting together componets from various brands.
Epson is cheating consumers by starting this trend. Thousands of buyers use compatible ink catrdiges each year and know what is good and bad for them. We don't need Epson to tell us what is good and then charge 1/3 the printer cost for the ink catridge. Please spread the word around at stay out of the clutches of this technological fraud.

Wednesday, October 29, 2008

Why Do MP3 Music Files Consume Very Little Space.

A normal audio CD would store around 8 to 12 songs or music scores. Take a CD with a similar storage capacity (as the audio CD) and try to pack in around 80 to 100 MP3 music tracks. It is most likely that the CD would accomodate these tracks. Now, listen to the MP3 music and you will see that each of those tracks are complete and have not been cut short. If you wondered how this would be possible, understanding the concept of MP3 recordings would would help you. Conventional audio recorded files are converted to the MP3 format by running them through a special conversion program. The programs that create MP3 type audio files are referred to as rippers. You might have come across the term, ripping an audio file. This actually means that the audio file is being converted to the MP3 format.

The process of ripping audio files works on the principle that, many of the audio frequencies that are present in an audio file are not heard by the human ear. The ripper (program that rips) takes off content that is in these unheard frequencies, this obviously reduces the physical size of the file. Another thing that you should know is that, special devices are required to play back MP3 music files. You could play MP3 files on most computers by using a special program. Your computer will need a pair of speakers or a headset to let you listen to the MP3 music files. Portable MP3 players are today available in small convenient sizes. Infact some of these MP3 music players could be easily hung around your neck. A pair of headphones or a small set of external speakers can be used to listen to the MP3 files recorded on these MP3 players. Technology has made such MP3 players very affordable, you could get a MP3 player that holds upto 300 music tracks or songs in MP3 format for under 50 U.S$. This might sound unbelievable but you can see the impossible right here at: http://www.gizmocentral.com/

Thursday, September 18, 2008

AntiVirXP08, Spyware NOT Anti Virus Software Beware Of Anti Vir XP 08

Beware Of AntiVirXP08, It Is Not An Anti Virus Software
This is not an anti virus software, it shows a big count for viruses present on your computer. You are even given the option to buy the licence for AntiVirXP08 by using your credit card online. This is a spyware and will most probably hijack your credit card information and misuse it. Similar malware has spread before by the names of XP AntiVirus and WinAntiVirusPro. There are a number of malware and trojans that come bundled into this code, you will need to get rid of all of them when cleaning up your system. Most solutions suggest that you remove the AntiVirXP08 manually, get expert help if you are not technically qualified. There is a possibility of using valid data and information from the computer during the process of cleaning the AntiVirXP08.
The main steps involved in cleaning your computer for the Anti Vir XP 08 infection are:
(a) Unregister related DLL files.
(b) Stopping AntiVirXP08 processes.
(c) Finding and deleting AntiVirXP08 related files.
(d) Removing AntiVirXP08 registry values.
The infection is triggered when a user clicks a link, for this reason avoid clicking unknown links. It is also possible that certain websites are infected (knowingly or unknowingly) with this malware. Accessing those sites might increase the chances of you receiving and clicking a link.

Monday, July 7, 2008

Will The Spread Of Mobile Internet Reduce Traffic?

Few cities have reported an ease in traffic congestion after the rise in oil prices. It appears that, most people love to drive. The grumbling about traffic jams and high oil prices has not reduced in any way though. A few technical gurus are now on a major 'think trip'. They feel that providing high speed internet access in public buses and trains might pull people off the car. The time that you spend behind the wheel in traffic snarls and waiting for the signals to change colors could be better utilized. Hand held devices fed with high speed internet could allow you to get a lot done, only if you did not have to be engaged behind the steering wheel. You could read emails, answer emails, work on price quotes, check the latest stock values and ofcourse even watch the news on the television. Devices are today available in a compact size to do all this and more, all that they need is a continuous connection to a high speed internet service.

It is felt that people might choose to use public transport instead of being engaged in tedious driving routines. This might happen in a few cities where a large number of people drive to work. The expenses to hire a professional driver are high in the U.S and most European countries. As far as Asian countries like Thailand are concerned, the use of the Internet to do serious business transaction or development is still in it's infancy. Look at the public transport bus and train services in any metropolitan city of India, and you will realize that the overcrowded conditions would really not allow any cool internet surfing. And remember that people who drive a car don't carry just only a pocket sized berry to work. Feeling comfortable with all these in a public transport service might take some time to adjust. So most people would continue to drive to work, they would continue to grumble regarding the traffic but life would go on.

Thursday, June 19, 2008

Hacking And Malware Victim Almost Goes To Jail, The Bad Guy Gets Away.


In early 2007, Michael Fiola was fired from his job. His I.T Department found some really bad material on his computer, these included child pornography images. No one really likes such a man, family and friends abandoned him. Legal proceedings would start soon and Michael would most certainly spend over a dozen years in jail. Michael denied any wrong doing and caused many observers to comment that it was typical for a child pornographer to behave that way. His wife was the only one who believed his story and stood by him during those terrible moments. It took the services of an extremely talented and hard working forsenic investigator, to bring out the truth. As it turned out, the images on the laptop were pretty bad and would prove to be juicy proof in the legal hearing. However it was not Michael who downloaded them, the images appeared on the machine without his knowledge and without any action on his part.

It turned out that the Massachusetts state service that gave Michael the computer was to blame. The I.T department of this office had issued him a laptop that was not well protected. This caused the laptop to be infested with several malware program all without the knowledge of Michael! The story ended well for Michael but it is quite likely that many other computer users could be faced with a similar program. A hacked computer could have it's security compromised and become a puppet, controlled by pranksters and probably fraudsters. The public in general and the legal system in particular has no sympathy for victims like Michael. With the rapid spread of computer and internet usage, frauds related to this technology have managed to keep pace too.

Frightening possibilities exist, a terrorist organization could spread propoganda by sending emails through a computer which had it's security compromised! The U.S could then have the innocent victim rotting in a high security torture prison in the many islands and nations that allow it to open such prisons. Losing a job or being shunned by family members, would be very light as compared to facing systematic physical and mental torture by state investigators. It is unlikely that any lessons will be learned in such cases. The perpetuators of Internet crimes are rarely caught. Special deals with law makers often leave the few that are caught with a light sentence.

There is a very interesting view point that the author of this article would like to make. When you buy a licensed software like MS Windows or MS Office, you do not become the owner of the software. The amount you pay for the licence is something like a rental charge for using the software. It would be illegal to reverse code the software and make any changes to it even if, you are an expert. The reasoning is that, you do not own the software (just rented it) and therefore cannot make any modifications to the software. At the same time, the software publisher (eg. Microsoft) can at any time stop supporting the software and return nothing to you. Given this scenario, it would mean that any security loopholes in the rented software, are the responsibility of Microsoft. The responsibility should not be limited to Microsoft publishing a patch on their website and hoping that you will download it. The resulting damage caused by the security bug should also be compensated for, wait a moment before you criticize this comment. Software publishers are always raising hell regarding piracy and are quick to point out that a software is intellectual property, much like a pen, book, car or house. If this is so let's compare this to renting a house. Let's assume that there was a secret door in the house that you rented, the landlord never informed you regarding this secret door. A thief enters through that door and burgles your house, would the landlord not be held responsible. So let's treat a security loophole in a software as the publisher's (landlord's) respobsibility. The ensuing damages caused by a fraudster exploiting the security loophole should be compensated for by the software publishers. If this is done, the software houses would make a desperate dash to get hold of the fraudsters and the internet would become a safer place to browse, learn, transact and relax in.

Monday, June 16, 2008

Smaller Storage Devices Bring Bigger Data Security Problems

If you have been staying updated with the latest in storage devices, few issues are glaring. The first is that storage devices are growing smaller, thumbdrives have today become lighter, smaller and slimmer. The second thing is that, the storage capacity on these small storage devices is increasing. And ofcourse, all this is happening with a fall in price too. All this sounds great to the tech guys but wait a minute, there are several dangers too. Whether you are a personal computer user or working as an I.T manager in a huge organization, the problems posed by these small storage devices are real and they (problems) are growing.

Losing one such small storage device means that, a lot of your data could fall into alien hands. There was a very interesting and alarming news report a couple of years ago. The report mentioned that, a local town market in Afghanistan had vendors selling used thumb drives! A small investigation by the mighty and powerful U.S army in the vicinity revealed something quite unbelievable. These thumb drives infact belonged to the U.S army and had information stored by army personnel. The data was probably outdated and they decided to discard the thumb drives. These landed in dustbins and the garbage collectors innocently sorted out the garbage and tried to sell them in the local market.

Office computers face another threat from these small storage devices. It is very easy for staff to bring in a thumb drive and load confidential information into the drive. The devices are so small that they can be hidden in shoes, waterbottles etc. A leading jeweler in Asia once faced a situation where one of their designers actually copied the companies designs on to a thumb drive. She then slipped the thum drive into her high ankle shoes and tried to pass security. High security in a jewelry factory ensured that the incident was quickly caught and reported. However, you surely cannot expect this level of security to be maintained in all industries.

Finally, mobile phones with cameras equipped with high capacity small storage devices continue to pose severe security threats. Video clips and images of confidential documents, products and even office and factory layouts can be recorded on these phones. The information can either be carried home in the device or, emailed through the device right out of the office. These phones have their own internet connections and need not tresspass on company networks.

Warning: Information leaked through mobile phones is not easy to detect. Most organizations check belongings of staff only when they leave office. This is not done when staff enters the office. The staff can safely get in a mobile phone equipped with a camera and audio recording facility. The confidential information recorded can include data files, images, video clips and even voice recordings. Once done, the information can be emailed out of the office right from the desk of the staff. The internet connection used is not related to the company network so cannot be intercepted. The staff can then erase the information and leave the mobile phone in the office when going home. A security check at the gate will not find the mobile phone and the information would have left the office without anyones knowledge!!!.

Thursday, June 5, 2008

Skype Exposes A HUGE Internet Explorer Farce

Here is something that most techies already know but will easily go down as one of the greatest farces of our time. If you have made attempts to block out skype usage from your computer or network you would already be a victim of this cheap loophole in Microsoft Internet Explorer. Firstly, activate the built in firewall in windows, then specifically choose to block the Skype program on your computer. Save the firewall settings and once again check back to make sure that the firewall settings are as you wished them to be.

Now start skype, try to login and wow, Bill opens the Gates for the skype program. You will be able to successfully login to your skype account and do a normal usage. Now back to the windows firewall settings, here is the surprise. The firewall would have selected Skype as one of the programs that CAN run on your system. And who ever gave skype the authority to do this, well Bill Gates was probably so busy buying and taking over companies that he never knew when he would pocket Skype. So... he allowed that program to conveniently open up the firewall for itself.

We have news that many other programs have the ability to do this trick and play havoc with your firewall. We also heard that microsoft actually helps softwared developers learn how to do this neat 'trick' at your expense. In our opinion this is downright cheating and manipulation as the user of the windows software was never told that the owner of windows might allow certain softwares to overwrite your firewall settings. In pure technical terms this would be hacking, but in terms of business microsoft refers to these software developers as business partners or value added retailers!!!.