<?xml version="1.0" encoding="UTF-8" standalone="yes"?><oembed><version><![CDATA[1.0]]></version><provider_name><![CDATA[Bill Mullins&#039; Weblog - Tech Thoughts]]></provider_name><provider_url><![CDATA[https://billmullins.wordpress.com]]></provider_url><author_name><![CDATA[Bill Mullins]]></author_name><author_url><![CDATA[https://billmullins.wordpress.com/author/billmullins/]]></author_url><title><![CDATA[Tech Thoughts Daily Net News &ndash; September 26,&nbsp;2009]]></title><type><![CDATA[link]]></type><html><![CDATA[<p><strong><a href="http://blogs.techrepublic.com.com/helpdesk/?p=1023&amp;tag=nl.e103" target="_blank">How to troubleshoot a computer problem</a></strong> &#8211; What steps do you go through in order to diagnose a computer problem? There&#8217;s more than one correct answer, of course, but here&#8217;s one way to work through the troubleshooting thought-process.</p>
<p><strong><a href="http://blogs.channelinsider.com/cloud_computing/content/service_delivery_quality_and_reliability/gmail_outages_facebook_errors_conditioning_users_to_expect_poor_quality_of_service.html?kc=TCIBESTOF09252009STR3" target="_blank">Gmail Outages, Facebook Errors Conditioning Users to Expect Poor Quality of Service</a></strong> &#8211; After the second e-mail service outage this month, Google is fending off growing user complaints about the stability of its platform and the reliability of its business-class services.</p>
<p><strong><a href="http://blogs.channelinsider.com/secure_channel/content/malware_worms_viruses/password_id_stealing_malware_volume_jumps_400.html?kc=TCIBESTOF09252009STR1" target="_blank">Password, ID Stealing Malware Volume Jumps 400%</a></strong> &#8211; Trojans, worms, viruses and rootkits the likes of Clampi, Sinowal and StealthMBR are now the masters of the malicious code. McAfee’s Avert Labs released a new report that shows the volume of password-stealing and keystroke logging malware jumped nearly 400 percent between 2007 and 2008.</p>
<p><a href="https://billmullins.files.wordpress.com/2009/09/techthoughtsdailytechnews224.jpg"><img style="border-bottom:0;border-left:0;display:inline;border-top:0;border-right:0;" title="Tech Thoughts Daily Tech News 2" src="https://billmullins.files.wordpress.com/2009/09/techthoughtsdailytechnews2_thumb24.jpg?w=474&#038;h=117" border="0" alt="Tech Thoughts Daily Tech News 2" width="474" height="117" /></a></p>
<p><strong><a href="http://www.darkreading.com/insiderthreat/security/client/showArticle.jhtml?articleID=220200118&amp;amp;cid=nl_DR_DAILY_T" target="_blank">Up To 9 Percent Of Machines In An Enterprise Are Bot-Infected</a></strong><strong></strong> &#8211; Most are members of tiny, unknown botnets built for targeting victim organizations.</p>
<p><strong><a href="http://www.darkreading.com/blog/archives/2009/09/i_stopped_using.html?cid=nl_DR_DAILY_T" target="_blank">Debit Or Credit? Neither</a></strong> &#8211; I stopped using my debit card altogether a couple of years ago out of an intense fear that I would never recoup the losses if my card were skimmed in the grocery-store line or compromised at TJ Maxx.</p>
<p><strong><a href="http://blogs.zdnet.com/security/?p=4451&amp;tag=nl.e539" target="_blank">Malware affiliate bounty: Infect a Mac, earn 43 cents</a></strong> &#8211; A new malware affiliate program has been discovered offering 43cents for every infected Mac machine.</p>
<p><strong><a href="http://blogs.zdnet.com/security/?p=4447" target="_blank">Microsoft says Google Chrome Frame doubles IE attack surface</a></strong> &#8211; Google’s decision to introduce a plug-in that runs Google Chrome inside Microsoft’s Internet Explorer isn’t sitting well with the folks at Redmond.</p>
<h4>Off Topic:</h4>
<p><strong><a href="http://www.webuser.co.uk/news/top-stories/398510/musicians-agree-don-t-cut-off-pirates" target="_blank">Musicians agree: don&#8217;t cut off pirates</a></strong> &#8211; Prominent musicians have agreed that written warnings and slowing down the web connections of suspected pirates is the best way to deal with file-sharing.</p>
<p><strong><a href="http://www.webuser.co.uk/news/top-stories/398635/shower-radio-tops-worst-gadget-poll" target="_blank">Shower radio tops worst gadget poll</a></strong> &#8211; A survey of more than 3,000 women has found that shower radios, electric candles and electric nail files are the worst gadgets of all time.</p>
<p><strong><a href="http://blogs.zdnet.com/BTL/?p=24946&amp;tag=nl.e539" target="_blank">How Internet surveillance, IT sleuth work helped indict suspected terrorist Zazi</a></strong> &#8211; The indictment of suspected terrorist Najibullah Zazi, charged with acquiring and preparing bombs similar to the ones deployed in the 2005 London subway attacks, rides on Zazi&#8217;s Internet surfing habits. Here&#8217;s a look at the key linchpins where IT crossed paths with detective work.</p>
<p><strong><a href="http://www.smartplanet.com/business/blog/smart-takes/scientists-find-evidence-of-water-on-the-moon/1115/" target="_blank">Scientists find evidence of water on the moon</a></strong> &#8211; Scientists have found evidence that water exists on the moon, a discovery that reignites the possibility of human colonization.</p>
<h4>Today’s Quote:</h4>
<p><em>“An armed society is a polite society. Manners are good when one may have to back up his acts with his life.”</em></p>
<p>&#8211; <strong>Robert A. Heinlein</strong></p>
<h4>Today’s Free Downloads:</h4>
<p><a href="http://www.majorgeeks.com/download3375.html?2009-09-24" target="_blank"><strong>WinXP Manager 6.0.7</strong></a> &#8211; This utility lets you optimize, tweak, tune up, and clean up your Windows XP. It bundles more than 30 different utilities in one. Get access to hundreds of hidden options to improve system&#8217;s performance and security, clean registry, junk files and defrag Registry, optimize network to speed connection, uninstall program smartly, and manage startup items.</p>
<p><strong><a href="http://www.linuxliveusb.com/" target="_blank">Linux Live USB Creator</a> &#8211; </strong>free and open source software for Windows that allows you to create a portable and bootable USB stick running Linux. Also offers an exclusive option of automatic virtualization to launch directly Linux in Windows without any configuration nor installation.<strong></strong></p>
<p>If you enjoyed this article, why not subscribe to this Blog via RSS, or email? It’s easy; just click on <a href="http://feeds.feedburner.com/wordpress/TVcE">this link </a>and you’ll never miss another Tech Thoughts article.</p>
]]></html><thumbnail_url><![CDATA[https://billmullins.files.wordpress.com/2009/09/techthoughtsdailytechnews2_thumb24.jpg?fit=440%2C330]]></thumbnail_url><thumbnail_width><![CDATA[]]></thumbnail_width><thumbnail_height><![CDATA[]]></thumbnail_height></oembed>