Monday, December 27, 2010 Hits One Million Mark in Matter of Months

/PRNewswire/ --, the audio-based Bible app created by Faith Comes By Hearing, has reached one million downloads in just 5 months. Faith Comes By Hearing has established its app as an expression of their Digital Bible Project (DBP). The DBP is a platform like none other in the world, combining the latest technology with the world's largest digital library of both Bible text and audio recordings.

The free app is offered on iPhone, iPad, iPod Touch and Android devices. It is marked by its unique combination of text and audio as well as the large number of languages offered to listeners, with more being added regularly.

The ministry reports that people from 166 countries have engaged in God's Word through, with a remarkable average listening time of 36 minutes per person.

"I am new to the whole 'techy' thing," wrote a mobile app user, "But, I love that you can read and listen at the same time. You can have your very own Bible study anytime, anywhere."

Another user commented, "It is almost impossible to find an Audio Bible app for Mandarin! Praise the Lord He brought this app to me."

Clearly the streaming audio, available in numerous languages, is a distinction that sets apart – which is by design. Providing audio keeps with Faith Comes By Hearing's mission to record Audio Bibles for every nation, tribe, language and people.

"While the apps are great at home, in church and on-the-go, we really see them as a part of a larger strategy to fulfill the Great Commission," said Troy Carl, the ministry's national director and architect of the DBP. "We are excited by this rapid growth, and especially the worldwide reach this technology has produced."

The ministry is optimistic that this rapid start will only increase as the app is localized into other languages. Localization refers to the language used when downloading and navigating within the app. Until recently, that language was English. However, the ministry has just released a Spanish version and other major language adaptations are currently under way.

The ministry believes this technology will eventually allow every people group to listen to God's Word in their own language.

Currently, the ministry has Scripture recordings in 500 languages, with a goal of 2,000 by 2016.

Community News You Can Use
Click to read MORE news:
Twitter: @gafrontpage & @TheGATable @HookedonHistory
Twitter: @artsacrossga, @softnblue, @RimbomboAAG
Twitter: @FayetteFP

Monday, December 20, 2010

U.N., FCC intensify efforts to regulate electronic speech

by Jerome Coursi
(c) 2010 
-used with permission

The United Nations is now joining Obama administration and Democratic commissioners on the FCC in an attempt to regulate the Internet.

The U.N. is reacting to concerns of member governments, including the United States, that the Internet has made companies like WikiLeaks possible, while the FCC is more concerned about conservative news outlets on the Internet that are increasingly undermining government attempts to control the news through sympathetic mainstream media outlets.

What is at stake is the future of electronic free-speech rights, as governments around the world realize how much less control government authorities have with a robust and critical press able to operate freely on the Internet.

U.N. efforts to regulate Internet

Last week, in Australia, reported that the U.N. is considering whether to set up an inter-governmental working group to "harmonize" global efforts by policymakers to regulate the Internet.

The U.N. claims authority to regulate the Internet under a U.N. Economic and Social Council resolution passed in July that invited the U.N. secretary-general to begin discussions on coordinating government efforts to regulate the Internet on a global basis.

Obviously, the U.N. is uncomfortable with anything like the Internet that the globalists cannot control.

FCC moves to regulate the Internet

The FCC is preparing in its Dec. 21 meeting this week to vote on a proposal called "net neutrality."

The Obama administration likes to portray the proposed 85 pages of "net neutrality" rules as a way to ensure no user will be shut out of Internet access because of the user's content.

In other words, under the leadership of Chairman Julius Genachowski, an Obama administration Democrat, the FCC plans to use free expression arguments to set up a structure where the FCC would be the ultimate arbiter of who gets broadband Internet access and who does not.

In proceeding to regulate the Internet, the FCC, under Genachowski's direction, is choosing to ignore a unanimous ruling of the U.S. Court of Appeals for the District of Columbia Circuit last April that ruled the FCC lacked the authority to regulate the Internet.

Congress seeks to block FCC on net neutrality rules

Last week, Sen. Kay Bailey Hutchison, R-Texas, the ranking member of the Senate Commerce, Science and Transportation Committee, filed an amendment to an appropriations bill aimed at blocking the FCC from adopting net neutrality, the Washington Post reported.

Hutchison's amendment would stop the FCC from using public money to implement any rule that would regulate Internet traffic, according to Reuters.

Republicans are concerned that the FCC's net neutrality proposal is an attempt to get the FCC's foot in the door to wide-ranging government control, extending over not just Internet operating procedures, but ultimately over Internet content.

Incoming House Commerce Chairman Fred Upton, R-Mich., along with Communications Chairman Greg Waldren, R-Or., and Vice Communications Chairman Lee Terry, R-Neb., wrote to the FCC last week with their concerns that the FCC has not been transparent about its effort to regulate the Internet, the Hill reported.

They demanded Genachowski release all 85 pages of his net neutrality proposal before the FCC votes on the rules this week.

On Wednesday, a group of 29 Republican senators wrote their own letter to Genachowski, warning him that if the FCC goes ahead to vote net neutrality, they will actively work to repeal the rules in the next Congress, according to the Daily Caller.

"You and the Commission's general counsel have admitted in published statements that the legal justification for imposing these new regulations is questionable and has 'serious risk of failure in court,'" the letter said.

The letter went on to stress that Congress has not granted the FCC the specific statutory authority to regulate the Internet, stating, "Whether and how the Internet should be regulated is something that America's elected representatives in Congress, not the Commission, should determine."

ABOUT THE AUTHOR: Jerome R. Corsi received a Ph.D. from Harvard University in political science in 1972. He is the author of the #1 New York Times bestselling books THE OBAMA NATION: LEFTIST POLITICS AND THE CULT OF PERSONALITY and the co-author of UNFIT FOR COMMAND: SWIFT BOAT VETERANS SPEAK OUT AGAINST JOHN KERRY. He is also the author of AMERICA FOR SALE, THE LATE GREAT U.S.A., and WHY ISRAEL CAN'T WAIT. Currently, Dr. Corsi is a Senior Managing Director in the Financial Services Group at Gilford Securities as well as a senior staff writer for

Friday, December 17, 2010

Keep Your Phone Working and Your Connection Warm in the Cold Outdoors: Tips From Verizon Wireless

/PRNewswire/ -- With wintry weather making an early and frigid debut across the nation, Verizon Wireless, owner and operator of the nation's largest and most reliable 3G network, offers the following tips to help consumers use their wireless phones when it's cold outside:

* Keep your phone fully charged. Cold temperatures can run down the phone's battery charge more quickly. Use a car charger to keep the phone's charge if you get stranded or stuck in traffic on icy or snowy roads. Think about an extra battery as backup.
* Handle your phone with care. The display screen can become brittle when exposed to cold temperatures for long periods of time.
* Keep your phone in a warm place; avoid leaving it in an outside pocket or backpack or in the car overnight. When outside in the cold weather, carry your phone in an inside jacket pocket, keeping it close to your body for warmth.
* Remember you can't dial or access the keyboard on a touch screen with gloves, so consider adding finger flip gloves to your winter holiday wish list.
* Download free winter apps to your phone from Android Market™ such as:
o Winter Weather Outlooks – Allows you access to the National Weather Service Winter Weather Outlooks, so you'll know what kind of winter weather is headed your way.
o How Cold Is It? – A wallpaper that changes color depending on the outside temperature – deep red when it's hot and icy white when it's freezing.
o ShoppeHUB – This app allows you to make secure purchases on cold weather gear, including winter clothing.
o Coffee Recipes – Choose from more than 90 easy coffee recipes that will be sure to keep you warm.

Community News You Can Use
Click to read MORE news:
Twitter: @gafrontpage & @TheGATable @HookedonHistory
Twitter: @artsacrossga, @softnblue, @RimbomboAAG
Twitter: @FayetteFP

Thursday, December 16, 2010

16-year old Launches Top 25 iPhone App

/PRNewswire/ -- In the style of Bill Gates and Mark Zuckerberg, 16-year old computer whiz kid William LeGate takes the Apple App Store by storm. With the launch of a new free App for iPhone through his company Imagination Research Labs, LeGates' Game Giveaway enjoyed overnight success. Each day Game Giveaway gives away a high quality paid game for free. Game Giveaway allows users to download a paid game for free everyday and developers to promote their games.

With over 300,000 game applications available for iPhone users, Game Giveaway gained instant popularity in just weeks on the market. With 100,000 downloads of Game Giveaway in just 24 hours, the App quickly rose to number two on the Top 25 Free iPhone applications with a 4.5 out of 5 star rating.

The first game promoted by Game Giveaway, Paper Ninja soared to number one in the App store creating a whirlwind of enthusiasm for game developers to promote their games through the App.

"It's basically a Groupon for the mobile gaming environment except that it's completely free," said developer William LeGate.

Game Giveaway provides a high quality game for free each day to users of the free Game Giveaway iPhone App. For 24-hours the Giveaway of the Day is available for users to download and keep forever.

Community News You Can Use
Click to read MORE news:
Twitter: @gafrontpage & @TheGATable @HookedonHistory
Twitter: @artsacrossga, @softnblue, @RimbomboAAG
Twitter: @FayetteFP

Tuesday, December 14, 2010

YouTube Becomes 'National Security Issue'

Conducting interviews on this topic is the news editor of, the largest independent Internet news service in the U.S., Bob Unruh.

Forum called 'leading website' for online jihad

By Bob Unruh
(c) 2010 WorldNetDaily

A new report from the Middle East Media Research Institute charges that YouTube has emerged as "the leading website for online jihad," replacing and surpassing even websites that the jihadists themselves are running.

The in-depth report, with dozens of examples, links and illustrations, documents that MEMRI already has briefed members of the U.S. government and Congress on the issue, and has offered its expertise to YouTube directly to identify videos that "incite violence and terrorist acts for possible removal.'

The report by Steven Stalinsky, the executive director of MEMRI, a donor-supported organization that monitors and reports on media issues from the Middle East, calls the use of the video-sharing service by terrorists worldwide "a grave national security issue."

The report was published only days ago, but is part of a series of analyses of the issue that MEMRI has been documenting for some time. And in fact the LA Times reported just yesterday that YouTube has created a new option that users now can flag a video for removal because of its promotion of terrorism.

Sen. Joe Lieberman, the Independent senator from Connecticut, called the protocol a "good first step toward scrubbing mainstream Internet sites of terrorist propaganda," according to the Times.

It was several weeks ago when YouTube banished from its servers videos - numbering in the hundreds - that featured the American-turned-fugitive Anwar al-Awlawki. His videos, however, still can be fouind on the site.

YouTube officials did not comment when WND asked for confirmation that the investigation produced its policy change, but they told the Times that they are committed to making sure the site isn't used to spread "terrorist propaganda or incite violence."

MEMRI said it has investigated thoroughly the issues of YouTube, especially relating to al-Awlaki, and in fact, has reported on the videos he posted, those who watched them, the YouTube work of the Taliban as well as the expanding jihadi base committed to using YouTube.

The newest chapter documents the posting of videos of American soldiers being killed by improvised explosive devices and snipers in Afghanistan and Iraq.

"While YouTube should be applauded for adding new staff and a new function to identify and remove jihadi videos, this is only a beginning," MEMRI reported. "The removal of content is one part of the problem; the other part is keeping these videos from being posted in the first place - as shown by the recent removal of hundreds of Anwar al-Awlaki videos that were quickly reposted to other pages.

"It is no exaggeration to say that hundreds of thousands of assorted jihadi videos can be found on YouTube They include sermons by terrorist leaders, training videos by terrorists, footage of terrorist attacks, songs (nasheeds) to inspire terrorists, and much more. These videos are not only in English, but in dozens of other languages."

The report said the YouTube action followed the reporting that over the last few months, "numerous followers of Anwar al-Awlkai have been found guilty of involvement in terrorism. They all have one thing in common - they were incited by viewing him on YouTube."

Cited as an example was a video from "WachdogofAllah1" who posted a message on Nov. 4, warning of looming violence in Iraq, Egypt and "other countries."

"You have among us hundreds of thousands of followers, and hundreds of churches," the video warned, "and they will all be our targets if you do not respond."

Another video, the report said, praised Nidal Hassan, accused of killing more than a dozen at Fort Hood in Texas, as "a wonderful example."

MEMRI said among those who have been inspired to jihad by YouTube videos, had have subsequently been arrested, include:

* Zachary Adam Chesser, 02, from Virginia, who was arrested in July 2010 attempting to carry out jihad with al-Qaida in Somalia.

* Abdel Hameed Shehadeh, 21, who was arrested in Hawaii on October 21, 2010, for making false statements in a terrorism case.

* Paul and Nadia Rockwood, Alaska, a converted couple who pleaded guilty in July 2010 after being accused of creating a hit list of local media, religious officials, and military who "desecrated Islam."

* Mahmood Alessa and Carlos Eduardo Almonte, New Jersey, arrested in June 2010 en route to join al-Qaida forces in Somalia, hoping to kill U.S. troops.

"Al-Qaida and its affiliates use YouTube to spread propaganda online and to train followers for various actions," the report said. "Most jihadi websites now post links of major terrorist videos directly to YouTube."

Further, the jihadi-promoting videos include disturbing images of U.S. soldiers being killed in IED attacks as well as U.S. soldiers being shot and images of a decapitated soldier.

One YouTube Channel is marked "mujahidRPG's Channel" and features video after video after video of coalition vehicles disappearing into a a flash of flame and black smoke.

"In addition to clips of jihad against the West and the Jews, YouTube also has clips by Islamist groups calling for jihad against Christians. In one recent example, dated November 4, 2010, YouTube user 'WachdogofAllah1' posted a 'message from the soldier of the martyr battalion to the Christians in Egypt,'" the report said.
Community News You Can Use
Click to read MORE news:
Twitter: @gafrontpage & @TheGATable @HookedonHistory
Twitter: @artsacrossga, @softnblue, @RimbomboAAG
Twitter: @FayetteFP

Thursday, December 9, 2010

GFI Software Announces Top 10 Malware Threats for November

(BUSINESS WIRE)--GFI Software, a leading IT solutions provider for small and medium-sized enterprises, today announced the top 10 most prevalent malware threats for the month of November 2010. The report, compiled from monthly scans performed by GFI's award-winning anti-malware solution, VIPRE® Antivirus, and its antispyware tool, CounterSpy®, is a service of GFI Labs™.

As in recent months, Trojans dominated the threat landscape in November. ThreatNet data revealed that seven of the top 10 malware threats were classified as Trojans. The number-one detection, Trojan.Win32.Generic!BT, is a Trojan comprising over 20 percent of the ThreatNet detections.

Tom Kelchner, GFI Software communications and research analyst said, “There is another picture in the top-10 numbers. Three of them go after applications or server software that hasn’t been patched. The number six detection, Exploit.PDF-JS.Gen (v), tries to exploit a security flaw in PDF files with embedded JavaScript. That’s aiming at Adobe products. It often installs downloaders that pull down other malware from remote Web sites.”

Worm.Win32.Downad.Gen (v,) the Downadup worm (also called Conficker and Kido) in the number seven spot, is a worm that spreads across a network by taking advantage of a vulnerability in Windows Server service which allows remote code execution when file sharing is enabled. This vulnerability was patched some time ago.

Trojan.ASF.Wimad (v), in the number nine spot, is a VIPRE detection for a group of Trojanized Windows media files that exploit an old vulnerability in Windows Media Player. It redirects the victim’s browser to a web site to download malicious files. This is also is an old vulnerability that’s been fixed.

“If this malcode is still circulating, it means that the malcode writers are seeing a landscape with lots of unpatched and vulnerable machines. The conclusion is pretty clear for both enterprises and consumers: update Windows operating systems (including servers), browsers, Adobe products and media players and keep them updated,” said Kelchner.

ThreatNet is GFI Lab’s monitoring system that retrieves real-time data from VIPRE installations. Statistics come from tens of thousands of machines running VIPRE.

Top 10 detections for November
1. Trojan.Win32.Generic!BT Trojan 22.44
2. Trojan-Spy.Win32.Zbot.gen Trojan 3.88
3. Trojan.Win32.Generic.pak!cobra Trojan 3.53
4. Trojan.Win32.Generic!SB.0 Trojan 3.46
5. INF.Autorun (v) Trojan 1.83
6. Exploit.PDF-JS.Gen (v) Exploit 1.45
7. Worm.Win32.Downad.Gen (v) Worm.W32 1.42
8. Trojan.Win32.Malware.a Trojan 0.83
9. Trojan.ASF.Wimad (v) Trojan 0.76
10. Trojan.Win32.Meredrop Trojan Downloader 0.68

Community News You Can Use
Click to read MORE news:
Twitter: @gafrontpage & @TheGATable @HookedonHistory
Twitter: @artsacrossga, @softnblue, @RimbomboAAG
Twitter: @FayetteFP

Wednesday, December 8, 2010

From rogue AV to fake disk clean-up utilities

Security researchers are reporting a surge in fake disk clean-up utilities reporting PC errors and demanding an activation fee to fix these problems.

Thursday, December 2, 2010

Could This Be the Answer? The Answer Parents, Teachers, Judges, Prison Officials, Government Agencies and Even DOT Secretary LaHood are Searching For? Try Safety First Believes It Is

/PRNewswire/ -- Try Safety First (TSF) has invented new technology which promises a free solution to save lives, create jobs, improve education, reduce taxes, eliminate prison contraband, add $1.7 billion per year toward reducing the federal deficit and save the U.S. up to $450 billion each year.

Sounds sort of like a campaign promise and, in essence, it could be. Try Safety First (TSF) has developed a new set of wireless protocols for which they are seeking a congressional mandate. And various members of Congress have asked them for endorsement letters to show support for their technology. So if this applies to you, a respectful reply of an email, letter or phone call is being requested. A link to your congressman is provided below.

According to TSF, most people including many of our congressional leaders simply are not aware of the number or the magnitude of problems today's wireless technology presents. John Fischer, President and CEO of Try Safety First, says he usually begins by asking the following questions:

1. What piece of technology is the #1 smuggled prison contraband followed by heroin, cocaine and meth?
2. What piece of technology is the #1 cause of roadway accidents, the #1 killer of teens and, according to the World Health Organization, is costing the U.S. as much as three percent of its GDP?
3. What piece of technology is the #1 disruption in middle schools, high schools and colleges across the U.S.?
4. What piece of technology is the #1 cause of mistrials in court systems throughout the U.S.?
5. What piece of technology do terrorists use to detonate more than 60% of their IEDs?

Answer: the cell phone, but you already knew that. There is one simple solution to answer all of these problems and TSF claims to have it. That answer is to include in the operating system of each wireless device a standardized set of protocols expressly directing specific behavior whenever the phone is in a matching protocol limited range environment. In other words, the phone understands how to behave as such:

1. In a prison, the phone becomes disabled. Exception: guard is wearing matching protocol sensor disablement tag or in a common area where cell use is allowed.
2. In a vehicle, within one meter of the driver's seat, the texting and email features will be inhibited while allowing passengers' full use of their phones.
3. In a classroom, the teacher receives a remote classroom protocol switch which encourages use of the phone as a teaching tool, yet affords partial disablement when giving a quiz. All emergency 911 functionality remains intact along with two parental protocols.
4. In a courtroom or high security building, a judge/employer can silence all pedestrian phones and/or disable all juror phones. Again, all emergency 911 functionality remains intact.
5. In the line of fire, bomb experts can disable protocol enabled IEDs, making it increasingly more difficult for a terrorist to use a standard cell phone to detonate a roadside bomb.

When asked if TSF technology is just a tad bit too much government intrusion, Fischer responded emphatically NO. Use of a cell phone is not a right but a privilege, and we must respect it for everything that it is and realize we are not somehow magically immune to its dangers. The cell phone is much greater than a simple toy capable of doing some really cool things. Fischer believes the cell phone may be one of the greatest inventions ever known, but he says it was never envisioned to be smuggled contraband, facilitate massive cheating and disruption among students, cause an accident every 47 seconds or be a terrorist's best friend. Unfortunately, it has become the key ingredient in many disastrous recipes and we must not let good judgment be overtaken by our addiction to these cool gadgets. Fischer is certain the problems will only get worse unless we increase the functionality of our mobile devices to include a simple set of standard safety protocols.

Fischer is looking to start several grassroots efforts among various groups (parents, teachers, judges, prison officials, military personnel, homeland security and governors) to show support for these protocols. Anyone can write an email or make a phone call. Simply tell your congressional representative you support TSF safety protocol adoption. Your congressional representative link is: Fischer is also requesting a copy of your endorsement be sent to

Community News You Can Use
Click to read MORE news:
Twitter: @gafrontpage & @TheGATable @HookedonHistory
Twitter: @artsacrossga, @softnblue, @RimbomboAAG
Twitter: @FayetteFP

Tuesday, November 30, 2010

Free Report Reveals Why WikiLeaks Backlash is the Beginning of Controversy to Come

/PRNewswire/ -- The WikiLeaks controversy will prove to be the first minor skirmish of an epic battle over unregulated Internet and relinquished freedoms, according to a free report now available from The Socionomics Institute. Researchers at the Georgia-based think tank observe that social polarization and conflict increase during financial bear markets. Their research shows that the WikiLeaks releases are expressions of the rising anger and opposition that accompanies declining stock prices and economic activity.

In a May 2010 report, available now for free, researcher Alan Hall predicted that WikiLeaks would become a lightning rod of conflict. Since then, the whistleblower website has twice published the largest-ever leaks of classified U.S. documents. The latest release embarrasses world leaders. France said the transparency threatens "authority and democratic sovereignty" and Secretary of State Hillary Clinton called the release an attack on America's foreign policy interests.

The Socionomics Institute studies social behavior as it relates to the financial markets. Researchers use the financial markets and other indicators of social mood to forecast monumental changes in society.

Hall forecasts that as prevailing mood sours and financial markets turn south, governments will increase their efforts to regulate and control the Internet. He observes, "A government that feels threatened by its citizens usually clamps down on the information flow. This makes the Internet a prime battleground." Follow this link to access your complimentary report on WikiLeaks and authoritarianism:

Community News You Can Use
Click to read MORE news:
Twitter: @gafrontpage & @TheGATable @HookedonHistory
Twitter: @artsacrossga, @softnblue, @RimbomboAAG
Twitter: @FayetteFP

Digital Bible Project Expands with Redesign of Site

/PRNewswire/ -- The Digital Bible Project (DBP), introduced in March of this year by Faith Comes By Hearing, is today announcing the launch of the recently redesigned web site. Originally home to information on the ministry's free Bible apps, the revamped site now allows users to read, listen to and even share their favorite verses via social networks like Facebook and Twitter, right from their computer.

The site currently offers the Scripture in 96 languages, with more being added regularly. This keeps with Faith Comes By Hearing's mission to use heart-language Audio Bibles to "make disciples from every nation, tribe, language and people."

The same functionality has been available through free Bible apps on iPhone, iPad, iTouch and the Android operating system since this summer. While the ministry continues to develop their app for other smartphones and mobile devices, the site allows anyone with an Internet connection to immediately access God's Word in both text and audio.

Scripture in audio continues to be the ministry's primary focus as they attempt to reach out to the 50% of the world's population who are illiterate.

"With half of the world unable to read – not to mention those who interact and get their daily news and information orally by choice – we must continue to provide the Gospel message in a format that engages the listener and keeps their attention," stated Troy Carl, Faith Comes By Hearing's national director.

Carl helped create the DBP for the ministry and he currently oversees the development and implementation of the project. Since its initial release, the average listening time on the audio-based Bible apps has been 37 minutes.

While the redesigned site is an important event for Faith Comes By Hearing, Carl is looking down the road to every language recording done by the ministry being available on the site and through their Bible apps.

"Advancements in smartphones and satellite technology make this an exciting time to be working toward fulfilling the Great Commission," says Carl. "We live in a time that could see the vast majority of the world with the potential to hold the Word of God in the palm of their hand."

The ministry has recorded Audio Bibles in 500 languages. Their goal is to complete 2,000 language recordings by 2016. The average cost to record the New Testament in a people's heart language is $25,596.

Community News You Can Use
Click to read MORE news:
Twitter: @gafrontpage & @TheGATable @HookedonHistory
Twitter: @artsacrossga, @softnblue, @RimbomboAAG
Twitter: @FayetteFP

Monday, November 29, 2010

Delta to Add Inflight Wi-Fi to 223 Delta Connection Jets

PRNewswire -- Delta Air Lines (NYSE: DAL) today announced it will add onboard Wi-Fi to 223 regional jet aircraft operated by Delta Connection carriers, expanding by 40 percent the number of Delta aircraft featuring Gogo Inflight Internet service. Delta will be the first domestic carrier to deploy Wi-Fi across its entire mainline and regional aircraft fleets with two classes of service.

Delta completed installing Wi-Fi on all mainline domestic aircraft earlier this month.

"Adding Wi-Fi capabilities to our two-class regional jets marks another milestone in our efforts to invest more than $2 billion to enhance our airport facilities, aircraft fleet and onboard services for customers through 2013," said Tim Mapes, Delta's senior vice president – Marketing. "We continue to make significant progress in aligning the products and services offered by our regional airline partners so that Delta customers have an experience consistent with that available aboard Delta's mainline fleet."

Installations of Wi-Fi on Delta Connection jets will begin in January and will be complete by the end of 2011. Once complete, customers flying on all Delta domestic flights with a First Class cabin will enjoy Wi-Fi access, including service on every Delta Shuttle flight between New York-LaGuardia and Boston, Chicago-O'Hare and Washington, D.C.

Delta began installing Wi-Fi on domestic mainline aircraft in 2008, becoming the first airline to announce plans for inflight Internet service on all domestic aircraft. With 549 mainline aircraft and the addition of 223 regional jets to the Wi-Fi program, more than 80 percent of Delta's domestic fleet – or 772 aircraft – will feature Gogo Inflight Internet access.

Delta Connection aircraft featuring First Class cabins include Embraer 175, Bombardier CRJ700 and Bombardier CRJ900 models operated by Delta Connection. The aircraft feature between nine and 12 seats in First Class and between 56 and 64 seats in Economy.

In addition to Wi-Fi, Delta has taken a number of steps to fully align service on Delta Connection and mainline flights. Recent improvements have included adding First Class cabins to 66 additional CRJ700 jets; introducing meal service in First Class on regional jets; adding china, linen and silverware to Delta Connection First Class cabins and installing more jetbridges at Delta hubs to reduce ground-level boarding of regional jets.

Delta Air Lines serves more than 160 million customers each year. With an industry-leading global network, Delta and the Delta Connection carriers offer service to 351 destinations in 64 countries on six continents. Headquartered in Atlanta, Delta employs more than 75,000 employees worldwide and operates a mainline fleet of more than 700 aircraft. A founding member of the SkyTeam global alliance, Delta participates in the industry's leading trans-Atlantic joint venture with Air France-KLM and Alitalia. Including its worldwide alliance partners, Delta offers customers more than 13,000 daily flights, with hubs in Amsterdam, Atlanta, Cincinnati, Detroit, Memphis, Minneapolis-St. Paul, New York-JFK, Paris-Charles de Gaulle, Salt Lake City and Tokyo-Narita. The airline's service includes the SkyMiles frequent flier program, the world's largest airline loyalty program; the award-winning BusinessElite service; and 50 Delta Sky Clubs in airports worldwide. Customers can check in for flights, print boarding passes, check bags and review flight status at

A portion of travel for some itineraries may be on the Delta Connection carriers: Atlantic Southeast Airlines, Comair, Compass Airlines, Mesaba, Pinnacle Airlines, Shuttle America dba Delta Shuttle, and SkyWest.

Terms and Conditions

Additional restrictions may apply. Offers subject to change. Use of the Gogo Inflight Internet service is subject to terms of use available at

Community News You Can Use
Click to read MORE news:
Twitter: @gafrontpage & @TheGATable @HookedonHistory
Twitter: @artsacrossga, @softnblue, @RimbomboAAG
Twitter: @FayetteFP

Friday, November 19, 2010

TV industry beginning 'second digital switchover'

Conference hears that growth of video-on-demand is causing problems for cable operators in the US, and the same trend is coming to the UK. Read more:

Saturday, October 30, 2010

Clayton State Student Help Desk Wins Video Contest at USG Computing Conference

Members of the Clayton State University’s IT student help desk, The HUB, have proven equally skilled in the video arena as they are in the information technology arena.

At the University System of Georgia’s recent 39th Annual Computing Conference at the Rock Eagle 4-H Center in Eatonton, Ga., the HUB won first place in the 2010 Video Contest with their LANDesk Man entry.

“LANDesk Man is our very own resident warrior against evil and viri!” exclaims Shannon Thomas, Clayton State director of Client Services. “LANDesk Man is capable of exterminating the nastiest, most frustrating forms of virtual infections with little effort nor stress to your computer's performance. LANDesk Man is as capable of vanquishing malicious programs within the blink of an eye.”

The HUB staff who created the winning video included Sherry Paul, Corey Wagner, Courtney Pipkins, Chris Baldwin, Simeon Payne, Ryan Belom, Daniel Stone and Broderick McNeal, along with help from the University’s Center for Instructional Development.

The Computing Conference provides the opportunity for technology professionals and technology users throughout the System to exchange information with their peers and gain an accurate picture of the current and future state of technology.

The HUB’s winning video can be seen at; For more HUB videos, visit their YouTube page at

Friday, October 29, 2010

New Trojan Program Attacks Macintosh Computers

The following article is from Eastman's Online Genealogy Newsletter and is copyright by Richard W. Eastman. It is re-published here with the permission of the author. Information about the newsletter is available at 

Windows users have been plagued for years with viruses, keyloggers, Trojan horse programs, and other forms of malware (malevolent software). During this time, Macintosh users have simply smiled as their computers were safe and secure. Most Mac users don't even bother purchasing anti-virus programs as they have never had a need for such things. This complacency may be ending, however.

A newly discovered Trojan horse spreading through social networking sites, such as Facebook, MySpace and Twitter, targets Apple's Mac OS X operating system, including the latest version, 10.6 Snow Leopard, by baiting users into clicking a link. Computers become infected when someone visits a social networking site and sees a message that reads, "Is this you in this video?" Clicking the infected link loads an infected file into your computer.

Antivirus firm Intego issued a notice Wednesday suggesting that the Trojan, a Mac version of the "Koobface" worm, carries a "low risk." The security firm said that the current Mac OS X implementation is flawed, though it admitted the threat exists and is likely to become a more legitimate concern in the future. Apple is expected to soon release an operating system update that will block the new Trojan.

The program, called trojan.osx.boonana.a, runs a Java applet that attempts to download files to any Macintosh system. It then automatically launches an installer that modifies system files and allows remote access to all files on the system. It also checks in with control servers to report information from the infected system. The Trojan also automatically runs in the background at startup, and attempts to hide its activities across multiple files. The thieves who write this malware are then free to remotely connect to your computer and copy any files they wish.

If your computer becomes infected, it is easily cured. SecureMac has released a FREE removal tool to eliminate this threat, which can be downloaded by visiting  or downloaded directly from

Intego's VirusBarrier X6 and X5 at sells for $49.95 and will detect and remove the malware. It also offers ongoing protection to block future viruses and Trojans, unlike the free SecureMac program that only removes existing problems.

Luckily, the new Trojan is easily avoided. The safest course of action is to not use social networking sites (Facebook, MySpace and Twitter). However, if you insist on using such sites, never click on any messages or links, even if those messages and links that claim to be from people you know. Your friends' names and email addresses are easily forged by malware programs. The message "Is this you in this video?" is an obvious trap but future versions of this malware could easily use different messages.

Users can further protect themselves from infection by turning off Java in their web browser, although this will also block many legitimate web sites. Java can be turned off in Safari by clicking the Security tab under Safari Preferences, and making sure the "Enable Java" checkbox is unchecked. Firefox, Opera, Camino, and other web browsers also can run without Java.

Finally, use the security features built into OS X. Turn on the built-in firewall, especially when a computer is shared by multiple users. Instructions for turning it on may be found on a number of web sites, including at

Again, the simplest and safest solution is to not visit web sites where viruses and Trojans are known to exist. At this time, the highest risk is on the social networking web sites.

Linux computers are not affected by the new Macintosh Trojan or by the various Windows viruses and Trojans.

Community News You Can Use
Click to read MORE news:
Twitter: @gafrontpage & @TheGATable @HookedonHistory
Twitter: @artsacrossga, @softnblue, @RimbomboAAG
Twitter: @FayetteFP

Thursday, October 21, 2010

24-Hour Johnny Cash Internet Radio Station Launches

/24-7/ -- Johnny Cash fans around the world can now tune in to Johnny Cash Radio, a new venture launched by Bill Miller who, along with the late Johnny Cash, founded the official Johnny Cash website 14 years ago.

The station,, streams Johnny Cash music and content 24 hours a day, seven days a week. "Johnny Cash Radio is a dream come true for Johnny's millions of fans around the globe. We are the source for all things Cash, and our lineup includes programming hosted by Johnny's own family members, friends, former band members and others in the music industry," said Miller.

Among the family members who host their own shows is the wife of John Carter Cash (Johnny Cash and June Carter Cash's only son), Laura Cash, and Johnny's youngest sister, Joanne Cash Yates. The programs range from DJ-style shows to documentaries featuring interviews with Cash friends and associates to rare vintage performances by the Man in Black spanning his five decades strong career.

Miller and his wife Shannon host the weekly webcast, The Johnny Cash Radio Show, which features guests such as Kris Kristofferson, Graham Nash, Merle Haggard, Rosanne Cash, Jane Seymour, Charlie Daniels, The Oak Ridge Boys and friends, family members and associates who knew Cash.

"There are few other entertainers whose body of work could sustain a 24 hour, seven days a week radio stream. With Johnny Cash's five decades of writing and recording, our station is always fresh and relevant," Miller said.

Johnny Cash began his career in music in 1954 and has sold over 100 million records. He is the only entertainer in history to be inducted into the Country Music, Rock & Roll and Songwriter's Halls of Fame. His life story was chronicled in the 2005 blockbuster film Walk the Line which starred Joaquin Phoenix and Reese Witherspoon as Johnny Cash and June Carter.

The Johnny Cash Radio stream is powered by Live365.Com

JohnnyCash.Com and JohnnyCashRadio.Com serve fans of the Man in Black from around the world. For further information, please contact Bill Miller at

Community News You Can Use
Click to read MORE news:
Twitter: @gafrontpage & @TheGATable @HookedonHistory
Twitter: @artsacrossga, @softnblue, @RimbomboAAG
Twitter: @FayetteFP

Wednesday, October 20, 2010

Fraud Advisory for Consumers: Involvement in Criminal Activity through Work from Home Scams

Consumers continue to lose money from work-from-home scams that assist cyber criminals move stolen funds. Worse yet, due to their deliberate or unknowing participation in the scams, these individuals may face criminal charges.

Work-from-home scam victims are often recruited by organized cyber criminals through newspaper ads, online employment services, unsolicited emails or “spam”,¹ and social networking sites advertising work-from-home opportunities. Once recruited, however, rather than becoming an employee of a legitimate business, the consumer is actually a “mule” for cyber criminals who use the consumer’s or other victim's accounts to steal and launder money. In addition, the consumer’s own identity or account may be compromised by the cyber criminals.

Example of a Work-From-Home Scheme:

• An individual applies for a position as a rebate or payments processor² through an online job site or through an unsolicited email.
• As a new employee, the individual is asked to provide his/her bank account information to his/her employer or to establish a new account using information provided by the employer.
• Funds are deposited into the account that the employee is instructed to wire to a third (often
international) account. The employee is instructed to deduct a percentage of the wired
amount as their commission.
• However, rather than processing rebates or processing payments, the individual is actually
participating in a criminal activity by laundering stolen funds through his/her own account or a newly established account.

In February 2010, the U.S. Federal Trade Commission (FTC) coordinated with state law enforcement officials and other federal agencies to announce a sweeping crack down on job and work-from-home fraud schemes fueled by the economic downturn. Individuals who are knowing or unknowing participants in this type of scheme could be prosecuted.

Protect Yourself:

• Be wary of work-from-home opportunities. Research the legitimacy of the company through the Better Business Bureau³ (for US-based companies) or WHOIS/Domain Tools⁴ (for international companies) before providing personal or account information and/or agreeing to work for them. In addition, can help you identify companies that may be maliciously sending spam based on the volume of email sent from their Internet Protocol (IP)⁵ addresses. See also the FTC’s recommendations⁶.
• Be cautious about any opportunities offering the chance to work from home with very little work or prior experience. Remember: if it looks too good to be true, it usually is.
• Never pay for the privilege of working for an employer. Be suspicious of opportunities that require you to pay for things up front, such as supplies and other materials.
• Never give your bank account details to anyone unless you know and trust them.
• If you think you may be a victim of one of these scams, contact your financial institution
immediately. Report any suspicious work-from-home offers or activities to the Internet Crime Complaint Center (IC3)⁷ at

For more information, visit:
•, a nonprofit organization dedicated to protecting job seekers fromfraudulent job offers.
• Sponsored by the FTC, this site provides practical tips from the
federal government and the technology industry to help you be on guard against Internet
fraud, secure your computer, and protect your personal information.
• Better Business Bureau,

¹ Cyber criminals may also spoof a legitimate business to entice you into opening the email, which may contain a fraudulent application for information or malware.
² Other common job titles for these schemes include trading partner or currency trader.
⁵An IP address identifies the company’s website host or network interface and location.
⁷The IC3 is a partnership between the Federal Bureau of Investigation (FBI), the National White Collar Crime Center (NW3C), and the Bureau of Justice Assistance (BJA).

Community News You Can Use
Click to read MORE news:
Twitter: @gafrontpage & @TheGATable @HookedonHistory
Twitter: @artsacrossga, @softnblue, @RimbomboAAG
Twitter: @FayetteFP

Friday, October 8, 2010

President Obama Signs Historic Technology Access Bill

/PRNewswire/ -- Today, joined by disability-rights advocates and tech industry representatives, President Obama signed into law the 21st Century Communications and Video Accessibility Act. The legislation requires smart phones, television programs and other modern communications technologies to be accessible to people with vision or hearing loss.

"This law is life-changing for the millions of us with disabilities who are too often unable to take advantage of new technologies," said Paul Schroeder, Vice President of Programs & Policy at the American Foundation for the Blind (AFB). "It opens the door to the digital age, and gives Americans with visual or hearing impairments equal access to smart phones, emergency broadcast information, the menus and controls on televisions and cable TV guides, and much more."

Signed into law during National Disability Employment Awareness Month, this legislation is expected to create more opportunities in the work place, the classroom, and everyday life. "It will help Americans with disabilities work more productively, respond to emergencies more effectively, and participate even more in society and culture," said Mark Richert, Director of Public Policy at AFB and a principal negotiator with the communications and TV industries.

"This law builds on the spirit of the Americans with Disabilities Act and ensures people with disabilities can fully participate in the 21st century," said Carl R. Augusto, AFB's President & CEO. "We applaud the many advocates and lawmakers who fought tirelessly to make this law a reality."

The legislation gives individuals with vision or hearing loss improved access to television programming, smart phones, the Internet, menus on DVD players, program guides on cable TV, and more. Specifically, it:

* Mandates mobile phone companies to make web browsers, text messaging, and e-mail on smart phones fully accessible.
* Restores and expands requirements for video description of television programs, in addition to requiring cable companies to make their program guides and selection menus accessible to people with vision loss.
* Ensures people with vision loss have access to emergency broadcast information.
* Provides $10 million in funding each year for assistive technology for deaf-blind individuals.
* Ensures that Internet-enabled mobile phones are hearing aid compatible.

The 21st Century Communications and Video Accessibility Act passed Congress with bipartisan support. A number of members played a key role in moving the legislation forward. In the U.S. Senate, the bill was championed by Senator Pryor (D-AR), with the support of Senator Kerry (D-MA), Senator Rockefeller (D-WV), Senator Hutchison (R-TX), and Senator Ensign (R-NV). In the U.S. House, it was championed by Rep. Ed Markey (D-MA), with the support of Rep. Henry Waxman (D-CA), Rep. Rick Boucher (D-VA), Rep. Joe Barton (R-TX), and Rep. Cliff Stearns (R-FL).

The American Foundation for the Blind (AFB) is a national nonprofit that expands possibilities for people with vision loss. AFB's priorities include broadening access to technology; elevating the quality of information and tools for the professionals who serve people with vision loss; and promoting independent and healthy living for people with vision loss by providing them and their families with relevant and timely resources. AFB is also proud to house the Helen Keller Archives and honor the more than forty years that Helen Keller worked tirelessly with AFB. For more information visit us online at

Community News You Can Use
Click to read MORE news:
Twitter: @gafrontpage & @TheGATable @HookedonHistory
Twitter: @artsacrossga, @softnblue, @RimbomboAAG
Twitter: @FayetteFP

Thursday, October 7, 2010

Fake iTunes Bill Can Drain Your Bank Account

The following article is from Eastman's Online Genealogy Newsletter and is copyright by Richard W. Eastman. It is re-published here with the permission of the author. Information about the newsletter is available at 

I received one of these email messages a few days ago. Luckily, Gmail placed it in my spam folder so I didn't see it until today when I went looking for it. You have to hand it to these scam artists: they certainly are clever at devising methods of stealing your money.

I wrote a couple of days ago at about a "trojan" email message that steals your user IDs and passwords to your online banking account. This new scam is a different Trojan message with a very clever delivery method.

The new scam sends a fake "iTunes receipt" email message to millions of people. The message appears to be completely authentic, except for the price shown in your bill. The message I received was for nearly $1,000. That's part of the trap.

Most people are likely to take action when seeing an "incorrect amount" appear on their bill. (I didn't do that because I never saw the "bill" in my spam folder until I went looking for it later, after reading about the new scam.)  Most people will click on the "report a problem" link that is included in the email message. However, that link takes you to a rogue web page that downloads the same Zeus trojan malware as described in the earlier article to your Windows computer. (Linux and Macintosh computers will not be affected.)

The program then waits for the user to log onto a list of targeted banks and financial institutions, and then steals login credentials and other data which are immediately sent to a remote server hosted by cybercriminals. It can also modify, in a user’s browser, the genuine web pages from a bank’s web servers to ask for personal information such as payment card number and PIN, one time passwords, etc.

Panda Labs released a statement explaining the infection process:
"After clicking the link, the victim is asked to download a fake PDF reader. Once installation is complete, the user is redirected to an infected web page containing the Zeus Trojan, which is specifically designed to steal personal data."
Here is the full announcement from Panda Labs:
Massive Phishing Attack Uses iTunes as Lure to Steal Bank Details, Reports PandaLabs

ORLANDO, Fla., Oct. 4 -- PandaLabs, Panda Security's antimalware laboratory, has discovered that Apple's popular iTunes platform has become a major target for hackers looking to steal credit card data from the service's millions of users. 

Victims receive a cleverly-crafted email informing them that they have made an expensive purchase on iTunes. The user, having never made the purchase to begin with, is concerned by the email and naturally tries to resolve the problem – in this case by clicking on the proffered (fake) link. An example of this fraudulent iTunes receipt can be seen here:

After clicking the link, the victim is asked to download a fake PDF reader. Once installation is complete, the user is redirected to an infected Web page containing the Zeus Trojan, which is specifically designed to steal personal data. This phishing attack was uncovered shortly after a similar phishing attack targeting LinkedIn users appeared last week, which appears to have originated in Russia.

"Phishing is nothing new," said Luis Corrons, Technical Director of PandaLabs. "What never ceases to surprise us is that the techniques used to trick victims continue to be so simple, but the design and content is so very well-orchestrated. It's very easy to fall into the trap. When using services such as iTunes, it is absolutely crucial that users never go to the website via email, but rather from the platform itself where they can verify their account status." 

This technique has been reported to the Anti-Phishing Working Group, which has started to block some of the Web addresses linked to in the fake email. 

PandaLabs advises all users to be wary of any emails related to iTunes, regardless of how genuine they seem. Users who think they may have been affected are urged to scan their computers thoroughly to locate and remove any possible active threats. [Windows] Users who do not have an antivirus installed can use Panda Cloud Antivirus, a free security service available at

More information is available in the PandaLabs Blog.

About PandaLabs

Since 1990, its mission has been to detect and eliminate new threats as rapidly as possible to offer our clients maximum security. To do so, PandaLabs has an innovative automated system that analyzes and classifies thousands of new samples a day and returns automatic verdicts (malware or goodware). This system is the basis of collective intelligence, Panda Security's new security model which can even detect malware that has evaded other security solutions.

Currently, 99.4 percent of malware detected by PandaLabs is analyzed through this system of collective intelligence. This is complemented through the work of several teams, each specialized in a specific type of malware (viruses, worms, Trojans, spyware, phishing, spam, etc.), who work 24/7 to provide global coverage. This translates into more secure, simpler and more resource-friendly solutions for clients.

More information is available in the PandaLabs blog:

Community News You Can Use
Click to read MORE news:
Twitter: @gafrontpage & @TheGATable @HookedonHistory
Twitter: @artsacrossga, @softnblue, @RimbomboAAG
Twitter: @FayetteFP

Wednesday, October 6, 2010

EarthLink Demonstrates Comcast-NBCU Merger Will Increase Prices of Comcast's Broadband Service

/PRNewswire/ -- EarthLink, Inc. (Nasdaq: ELNK), one of the nation's leading Internet service providers, has presented an economic report to the Federal Communications Commission on the proposed merger of Comcast Corp. and NBC Universal. The findings demonstrate that control of NBC Universal's content and assets will result in Comcast raising the prices that consumers pay for standalone broadband service. This report was prepared by Professor Simon J. Wilkie, Former Chief Economist of the Federal Communications Commission, and is available at

The report shows that an increase in the price of standalone broadband service will harm consumers in several ways. In response to higher prices, existing subscribers may be forced to drop their broadband service subscription and new subscribers may not be able to afford Comcast's broadband service. Further, Comcast customers who wish to "cut the cord" from the higher-priced Comcast cable television subscription in order to access lower-cost online video and voice services via standalone broadband or simply "break the bundle" and subscribe only to broadband services will face increased charges. As a result, the market for innovative online video services will be stifled and the nation's goals of ubiquitous broadband adoption and usage will be dampened.

In June, EarthLink asked the FCC to deny the merger or adopt a condition requiring Comcast to offer wholesale standalone broadband access service to independent Internet service providers. Professor Wilkie determined that allowing consumers to have a choice for broadband services will allow consumers to "break the bundle," promote and discipline Comcast's pricing and protect the development of online video. This remedy will impose little or no costs on Comcast while at the same time generating significant benefits.

"Professor Wilkie has confirmed through substantial findings that the Comcast-NBCU transaction will result in a real and significant harm to consumers," said EarthLink General Counsel Samuel R. DeSimone, Jr. "The FCC must step in to ensure that consumers have access to affordable standalone broadband service."

Community News You Can Use
Click to read MORE news:
Twitter: @gafrontpage & @TheGATable @HookedonHistory
Twitter: @artsacrossga, @softnblue, @RimbomboAAG
Twitter: @FayetteFP

Tuesday, September 14, 2010

Damballa Discovers New Wide-Spread Global Botnet Offering ‘Commercial’ DDoS Services

(BUSINESS WIRE)--Damballa Inc., the company transforming the fight against cyber threats, today announced the discovery of a new botnet that offers pay-for-delivery Distributed Denial of Service (DDoS) attacks. The ‘IMDDOS’ Botnet, named after the commercial name on the botnet website, has grown to be one of the largest active global botnets in less than four months from initial testing. According to Damballa, the infected hosts used in the DDoS attacks have become unwitting participants in the botnet and are widespread. The vast majority of infected hosts are in China, with the United States being in the top 10 countries affected. Internet Service Providers (ISPs) worldwide were affected, including the majority of North American ISPs, and a number of major corporate networks are hosting bot agents for the IMDDOS Botnet.

“The commercial nature of this botnet and the rapid growth and ultimate size are what make this discovery interesting”

The IMDDOS Botnet offers a commercial service for delivering DDoS attacks against any desired target. Hosted in China, this publicly available service is available for lease to anyone willing to establish an online account, input the domain(s) they wish to attack, and pay for the service. Throughout the Damballa period of study, the botnet grew large very quickly. Following testing by the criminal operators in April 2010, it reached a production peak of activity with 25,000 unique Recursive DNS (RDNS) lookups per hour attempting to resolve to the botnet’s command-and-control (CnC) servers. Damballa is currently working with ISPs and law enforcement officials to contain and nullify the threat.

A 16-page analysis of the discovery can be viewed at: This analysis includes details of the technical infrastructure of the botnet and associated malware as well as an animated illustration of the IMDDOS Botnet’s global growth and impact from early testing stage to peak activity rendered in hourly increments.

A Denial of Service (DoS) attack is a technique used to overwhelm a website/domain in an effort to reduce its responsiveness or completely eliminate its ability to respond to new connection attempts. DoS attacks have historically been used to ‘take down’ political sites, abuse sites, commercial business websites and even military command centers as part of a coordinated targeted campaign.

A DDoS attack utilizes multiple PCs or servers to initiate a coordinated attack against a targeted system. The more assets involved in the attack, the larger the flood of requests and data that can be targeted at the victim. To create a very large army of assets that can launch DDoS attacks, botnets are used to rally and command unwitting victim machines into participating in the attacks.

“The commercial nature of this botnet and the rapid growth and ultimate size are what make this discovery interesting,” stated Gunter Ollmann, vice president of research for Damballa. “The public website hosting the DDoS service offering, with various ‘plans’ and attack options, speaks to the ease with which anyone can leverage criminal infrastructure. The malware used is simplistic, yet it was successful in spreading rapidly. And while it appears to be primarily a DDoS delivery platform, the size of the botnet reached impressive proportions, certainly large enough to wreak major havoc on any victim organization should it be pointed in the right direction.”

This discovery was made possible due to a global array of Damballa sensors, which provide worldwide visibility into CnC activity, combined with the understanding and quantification of statistical heuristics that can explain, and most importantly, quickly detect, the malicious nature of this botnet operation. Damballa tracks thousands of botnet operators and their growing cache of botnets every day. Each criminal botnet building campaign is observed, analyzed, automatically catalogued and categorized using a sophisticated array of clustering and machine learning systems. As the criminal botnet operators attempt to grow the botnet, their investments and modifications to their CnC hosting infrastructure are tracked and used as markers for eventual attribution. Damballa customers benefit from this advanced knowledge of the threat, being alerted to the presence of the malware and being able to terminate the CnC communications.

“Botnets are recognized by industry experts as being the delivery mechanism of choice for the vast majority of today’s cyber threats that plague corporate and ISP networks,” said Val Rahmani, CEO of Damballa. “Botnets and other cyber threats are attacking corporate networks and service providers at an alarmingly high rate and are causing security teams around the world to reevaluate their security investments. Damballa leads the security industry in delivering solutions that detect and terminate botnets and cyber threats, and our research and product teams are constantly innovating and bringing more powerful and automated weapons to the war against cybercrime.”

Community News You Can Use
Fayette Front Page
Georgia Front Page
Follow us on Twitter:  @GAFrontPage

Monday, September 13, 2010

First-Ever Study of Google's Impact on Internet, Economy, Pricing & Jobs

/PRNewswire/ -- Today Precursor LLC released a first-of-its-kind research study on the impact of the largest and most powerful Internet company, Google Inc., on the Internet, economy, pricing and jobs. Google Inc. is expanding beyond its search monopoly to dominate other parts of the Internet at such an alarming rate that Google Inc. increasingly is the Internet for most consumers.

Precursor President Scott Cleland said:
-- "There is no net-economic growth or job creation from Google's 'free'
Internet sector model, only a deflationary price spiral, negative
growth, property devaluation, and hundreds of thousands of job losses
in over 20 industries. Consumers don't win long term from a
monopoly-gatekeeper of 'free' information access and distribution."
-- "Many will be amazed to learn that when Google rebrands its current
YouTube-Double-Click video advertising business as 'Google TV' this
fall, it already will own an Internet video-streaming monopoly with
80% of the Internet audience, almost a billion viewers, 2 billion
daily monetized views, and 45 billion ads served daily."
-- "Lax antitrust merger enforcement is responsible for tipping Google to
monopoly and facilitating its monopolization of consumer Internet
media. If antitrust authorities do not wake up soon, a wide swath of a
trillion dollar sector with millions of jobs - i.e. video, maps,
books, analytics, travel, etc. - will suffer the same fate as the
music and newspaper industries."
-- "While I expect the study to generate a healthy debate over whether
Google's behavior is pro or anti-competitive, pro or anti-consumer,
and pro or anti-innovation, any rigorous analysis of the facts will
lead to the same conclusion of this study - that Google's exercise of
its market power is spreading to many other industries and spreading
at an alarming rate."

The core recommendation of the study is that the U.S. Department of Justice's Antitrust Division and the European Commission's Competition Directorate should sue Google for monopolization.

About the study's author:

The study was conducted over the last few months by Scott Cleland, President of Precursor LLC, a leading techcom research and consulting firm. (See:

-- Formerly, Cleland was an Institutional Investor Magazine top
independent telecom analyst in 2004 and 2005.
-- He has a high-profile track record of being first to spot big
anomalies involving the Internet.
-- In late 2000, Cleland was the first analyst to expose that
Internet traffic was in reality growing 90% slower than what the
market assumed, heralding the bust of the bubble that
wiped out $4 trillion in market capitalization.
-- In 2002, Cleland was the first analyst to discern that WorldCom's
model did not add up and to predict its bankruptcy.
-- In 2007, Cleland was the first analyst to predict that Google's
acquisition of DoubleClick would tip Google to monopoly; an
assessment the DOJ affirmed in 2008 in blocking the Google-Yahoo
ad agreement via a threatened monopolization case.
-- A leading expert on Google, Cleland publishes two Google watchdog
sites and, and he has
testified before both House and Senate subcommittees on Google.

The views expressed in the Googleopoly VI study are solely those of the author and not the views of any Precursor LLC clients.

Community News You Can Use
Fayette Front Page
Georgia Front Page
Follow us on Twitter:  @GAFrontPage

Thursday, September 9, 2010

GSLO: Turn Your Apple iPod Touch Into a Smartphone

(BUSINESS WIRE)--Does your iPod Touch suffer from iPhone Envy? Not for long: GoSolarUSA Inc. (PinkSheets:GSLO) announced a deal today with innovative Chinese developer Yosion to bring that company’s cutting-edge Apple Peel 520 product to the United States.

“We see the Apple Peel 520 as a stunning breakthrough in mobile technology, and we’re proud to work with Yosion to develop this product for the U.S. market.”

Both companies signed a funding option agreement last week. Under the agreement, GoSolarUSA will work with Yosion to develop the Apple Peel 520, file for a U.S. patent and distribute it in the U.S.

When used with Apple’s (NASDAQ:AAPL) iPod Touch, the Apple Peel 520 functions as a protective skin that adds mobile voice and text messaging capabilities to the touch-screen media player. The startling new technology represents a more affordable alternative to purchasing Apple’s pricier iPhone, and with 275 million iPods already on the market, the Apple Peel could be an instant hit. Yosion announced last week that September’s initial manufacturing run is already sold out.

“We are so pleased to have reached this agreement with Yosion,” said Tyson Rohde, President of GSLO. “We see the Apple Peel 520 as a stunning breakthrough in mobile technology, and we’re proud to work with Yosion to develop this product for the U.S. market.”

The Apple Peel 520 is the creation of 22-year-old Chinese programmer Pan Yong. The gadget slips over the iPod Touch’s case and includes a battery, dock connector and SIM card. Once the proper software is installed, the Apple Peel adds the ability to make voice calls and text messages using the iPod Touch. When fully charged, the Apple Peel’s 800mAh battery offers nearly five hours of talk time and 120 hours of standby use.

The Apple Peel 520 first made waves online in the U.S. last month when it was featured on [] and earned positive buzz from [], among other Web sites.

“For right around $60, this device really does transform the iPod Touch into a smartphone,” Rohde said. “If there is a hotter iPod accessory anywhere in the world, we certainly haven’t seen it.”

The option agreement signed by both companies on Wednesday requires that both parties negotiate in good faith to reach terms on a profit-sharing agreement. It has been filed as a material contract with GSLO’s public filings.

GoSolarUSA is dedicated to aggressively acquiring, developing and marketing promising and potentially profitable technology. The iPod Touch and the iPhone are products of Apple Inc., which competes in the global smartphone market against the Google (NASDAQ:GOOG) Android and Research in Motion’s (NASDAQ:RIMM) BlackBerry line.

For more information, please visit

Community News You Can Use
Fayette Front Page
Georgia Front Page
Follow us on Twitter:  @GAFrontPage

Friday, September 3, 2010

GFI Software Announces Top 10 Malware Threats for August

(BUSINESS WIRE)--GFI Software, a leading IT solutions provider for small and medium-sized enterprises, today announced the top 10 most prevalent malware threats for the month of August 2010. The report, compiled from monthly scans performed by GFI's award-winning anti-malware solution, VIPRE® Antivirus, and its antispyware tool, CounterSpy®, is a service of GFI Labs™.

“Our research group is analyzing new rogues too, but what we’re seeing through ThreatNet indicates that VIPRE is preventing these rogue downloads.”

GFI VIPRE ThreatNet™ statistics for the month of August show that GFI customers were under attack throughout the month primarily by the same Trojan horse programs that have persisted for several months. In fact, the top four threats were unchanged in order from the month of July. Trojans detected as Trojan.Win32.Generic!BT were still the chief detection, slightly down to 25.11 percent of total detections. This particular Trojan detection has been in the top spot for some time: in July with 29.08 percent and in June with 27.16 percent of the total detections.

The number two detection, Trojan-Spy.Win32.Zbot.gen is a detection of password-stealing Trojans with many versions. The third largest detection, Trojan.Win32.Generic.pak!cobra, is a generic detection for a variety of malware that can infect 32- and 64-bit Windows installations.

“Detections of this malicious code indicate that botnet operators continue to try to infect machines and use them in their spamming networks,” said Francis Montesino, manager of the malware processing team, GFI Labs. “Our ThreatNet detections for the month also agree with other reports we’ve heard in the last few weeks that have found a high level of traffic in rogue security products. These are often referred to as scareware. We’re seeing a multitude of detections of the downloaders and installers that are associated with the rogues.

Montesino continued, “Our research group is analyzing new rogues too, but what we’re seeing through ThreatNet indicates that VIPRE is preventing these rogue downloads.”

The top 10 results represent the number of times a particular malware infection was detected during VIPRE and CounterSpy scans that report back to ThreatNet, GFI’s community of opt-in users. These threats are classified as moderate to severe based on method of installation among other criteria established by GFI Labs. The majority of these threats propagate through stealth installations or social engineering.

The top 10 most prevalent malware threats for the month of August are:
1. Trojan.Win32.Generic!BT 25.11%

2. Trojan-Spy.Win32.Zbot.gen 4.23%

3. Trojan.Win32.Generic.pak!cobra 3.61%

4. INF.Autorun (v) 3.27%

5. Trojan.Win32.Generic!SB.0 2.01%

6. BehavesLike.Win32.Malware (v) 1.04%

7. Worm.Win32.Downad.Gen (v) 0.96%

8. Trojan.Win32.Malware.a 0.93%

9. Trojan.Win32.Meredrop 0.92%

10. Exploit.PDF-JS.Gen (v) 0.84%

Community News You Can Use
Fayette Front Page
Georgia Front Page
Follow us on Twitter:  @GAFrontPage

Wednesday, September 1, 2010

FCC Terminates AWS-3 Rulemaking to Auction Spectrum with Free Broadband Requirement; Breaks National Broadband Plan Commitment

/PRNewswire/ -- On Friday, August 27, 2010, the Federal Communications Commission (FCC) notified M2Z Networks, Inc. (M2Z) and its Silicon Valley investors including Kleiner Perkins, Charles River Ventures, and Redpoint Ventures, that it has terminated the AWS-3 spectrum (2155-2180 MHz) public interest rulemaking, thereby closing off the possibility of providing free nationwide broadband service in the United States for the foreseeable future. The FCC has been considering M2Z's proposal for a free nationwide broadband network using AWS-3 since 2006. This decision reverses the FCC's National Broadband Plan commitment to finalize the AWS-3 spectrum rulemaking in the fourth quarter of 2010 and for the spectrum to be auctioned by the second quarter of 2011.

The FCC's AWS-3 rulemaking, pending since 2007, consisted of three key issues:

-- A requirement that the AWS-3 licensee provide free broadband service
to at least 95% of the U.S. population in order to address the digital
-- A requirement that the AWS-3 licensee adhere to Net Neutrality
principles of open access (end-user access to all lawful content) and
open platforms (end-users to have the choice of devices);
-- An enforceable requirement on the AWS-3 licensee to build-out a
national broadband network covering 50% of the population in 4 years
and 95% in 10 years.

According to the FCC's own National Broadband Plan, 28 million Americans today cannot afford to subscribe to broadband. A free nationwide broadband service using the AWS-3 spectrum band would have addressed this persistent digital divide. While campaigning for the White House in 2008, President Obama told the U.S. Conference of Mayors, "Every American should have broadband access - no matter where you live, or how much money you have. We'll connect our schools and libraries and hospitals. And we'll take on the special interests to realize the potential of wireless spectrum for our safety and connectivity."

There continues to be considerable support from the public for a free nationwide broadband service. The FCC record shows that during the pendency of the AWS-3 rulemaking, more than 50,000 Americans signed a petition supporting the proposed rules while the FCC and members of Congress received over 20,000 letters and emails in support of the proposed rules. Government officials outside of Washington--faced with a growing digital divide and a poor economy--also saw merit in this innovative private sector solution. The FCC record shows that over 300 local, state and federal officials from all 50 states wrote to the FCC in support of the proposed AWS-3 rules.

"The FCC's decision to delay the use of this valuable spectrum forgoes the consumer welfare and economic stimulus that would result from putting new spectrum into the marketplace," said John Muleta, CEO of M2Z Networks. "A new nationwide broadband entrant that provided a free broadband service would have created tens of thousands of direct and indirect jobs throughout the country while giving all Americans an equal opportunity to participate in the digital economy. Despite the spectrum crisis facing the U.S. as documented by the FCC's National Broadband Plan, the AWS-3 spectrum will continue to lie fallow providing no economic value to American consumers."

Community News You Can Use
Fayette Front Page
Georgia Front Page
Follow us on Twitter:  @GAFrontPage

Friday, August 27, 2010

Facebook Accused of Misappropriating Likenesses of Teens for Profit

/PRNewswire/ -- A class action lawsuit was just filed in Los Angeles County Superior Court, Central Division, alleging that Facebook is misappropriating the names and pictures of minors for profit.

David Cohen, a minor, by and through Robin Cohen as Guardian ad Litem; Shelby Orland, a minor, by and through Marcia J. Orland as Guardian ad Litem; for all others similarly situated v. Facebook, Inc., a Delaware corporation, and DOES 1 through 100, Inclusive (Case #BC444482), alleges that Facebook encourages the participation of teenagers on its social network. Without any attempt to obtain parental consent, Facebook sells the names and likenesses of those minors for use by advertisers as an endorsement of the advertisers' products or services.

"When a teenager sees that their Facebook friends 'Like' an ad, it piques their curiosity, making them more likely to click the ad or visit the page," says Los Angeles plaintiff attorney John Torjesen of John C. Torjesen & Associates. "We believe it is a clear case of exploitation of children for the sake of profits."

"The consent of the minor for this commercial use of his or her name and likeness is not obtained by Facebook," says plaintiff attorney and co-counsel Antony Stuart of Stuart Law Firm. "Under California law, the minor's consent cannot be obtained without the consent of the parent or guardian. Facebook makes no effort to obtain parental consent."

The class action lawsuit is filed on behalf of all California residents who are or were under the age of 18 and members of Facebook from Aug. 26, 2007 to Aug. 26, 2010 whose likenesses or names were used in a Facebook advertisement or landing page.

"Facebook's actions violate the inalienable right to privacy guaranteed by the California Constitution," says Torjesen. "It derives illegal profits by charging advertisers for the use of children's names and photographs. As the father of a teenager, I view this to be exploitation of children."

Community News You Can Use
Fayette Front Page
Georgia Front Page
Follow us on Twitter:  @GAFrontPage

Monday, August 23, 2010

Tech Industry Opposes Possible FM Chip Mandate for Mobile Devices

/PRNewswire/ -- A coalition of six technology industry associations sent a letter today to the Chairmen and Ranking Members of the U.S. House and Senate Judiciary Committees urging them to resist efforts to include an FM technology mandate for mobile devices in any legislation addressing an unrelated conflict between the broadcast and recording industries over royalties.

"Calls for an FM chip mandate are not about public safety but are instead about propping up a business which consumers are abandoning as they avail themselves of new, more consumer-friendly options," the associations wrote. "It is simply wrong for two entrenched industries to resolve their differences by agreeing to burden a third industry - which has no relationship to or other interest in the performance royalty dispute - with a costly, ill-considered and unnecessary new mandate."

The proposed imposition of an FM chip mandate is not necessary for resolution of the dispute between performance artists and broadcasters and, if adopted, it would be bad policy for several reasons:

-- Mandating that every wireless device include an FM chip would require
consumers to pay more for a function that they may not desire or ever
-- The groups that are parties to the discussions over the performance
rights royalty issue lack any expertise in the development of wireless
devices and are in no position to dictate what type of functionality
is included in a wireless device.
-- Development by the technology industry and government of a mobile
broadcast emergency alerting system makes the requirement unnecessary.

The following Presidents and Chief Executive Officers of CTIA-The Wireless Association®, the Consumer Electronics Association (CEA)®, the Information Technology Industry Council, the Rural Cellular Association, TechAmerica and the Telecommunications Industry Association signed the letter.

Community News You Can Use
Fayette Front Page
Georgia Front Page
Follow us on Twitter:  @GAFrontPage

Friday, August 20, 2010

EarthLink Files Reply in Comcast-NBCU Merger; Urges FCC to Require Wholesale Standalone Broadband Access Condition

/PRNewswire/-- EarthLink, Inc. (NASDAQ:ELNK) , one of the nation's leading Internet service providers, on August 18 filed at the Federal Communications Commission a response to the opposition of applicants to conditions proposed in the Comcast-NBCU merger. In June, EarthLink asked the FCC to deny the merger or adopt a condition requiring Comcast to offer wholesale standalone broadband access to independent Internet service providers.

EarthLink urged the FCC to adopt the condition to ensure the merger does not result in anti-competitive activity that will reduce consumer choice, restrict content diversity, and interfere with Internet competition. In addition to providing consumers a choice for broadband access service, the condition would allow consumers to "break the bundle" and take advantage of video programming available on the Internet without subscribing to cable television service, thereby encouraging broadband investment, competition and adoption.

"The Comcast-NBCU transaction raises the substantial risk that Comcast will use its market power to stifle competition, growth and innovation of online video and other broadband content," said EarthLink General Counsel Samuel R. DeSimone, Jr. "The access condition proposed by EarthLink is a cost-effective solution to these concerns and will benefit U.S. consumers."

Community News You Can Use
Fayette Front Page
Georgia Front Page
Follow us on Twitter:  @GAFrontPage

Vice President Biden Announces Recovery Act Investments in Broadband Projects to Bring Jobs, Economic Opportunity to Communities Nationwide

Vice President Biden today (August 18) announced 94 Recovery Act investments in broadband projects that will create jobs and expand economic opportunities within 37 states.  These investments in high-speed Internet infrastructure will help bridge the technological divide in communities that are being left in the 20th century economy and support improvements in education, healthcare, and public safety.  Today’s announcement, an investment totaling $1.8 billion, is part of a nearly $7 billion Recovery Act initiative.

“Today's (August 18) investment in broadband technology will create jobs across the country and expand opportunities for millions of Americans and American companies. In addition to bringing 21st century infrastructure to underserved communities and rural areas, these investments will begin to harness the power of broadband to improve education, health care, and public safety,” said Vice President Biden. “The awards are another great example of how the Recovery Act is creating jobs upfront, while also building a foundation for sustainable job creation and global competitiveness.”

The projects receiving funds today are part of a program – administered by the Department of Commerce’s National Telecommunications and Information Administration (NTIA) and the Department of Agriculture’s Rural Utilities Service (RUS) – to expand broadband access and adoption across the country.

“The broadband investments announced today(August 18) are going to put people to work in the near term, but they also will lay the groundwork for sustainable economic growth down the road,” U.S. Commerce Secretary Gary Locke said. “These projects will connect Americans who have for too long been without the full economic, educational and social benefits of high-speed Internet access – access central to success in the 21st Century.”

“The broadband projects announced today(August 18) will give rural Americans access to the tools they need to attract new businesses, jobs, health care and educational opportunities,” Secretary of Agriculture Vilsack said. “The Obama Administration understands that bringing broadband to rural America provides a gateway for businesses and key anchor institutions – such as libraries, schools, public safety and community centers – to provide services to thousands of Americans. These projects will create jobs building these networks, and the completed systems will provide a platform for rural economic growth for years to come.”

Today’s(August 18) announcement includes 66 grants awarded by the Commerce Department for projects to deploy broadband infrastructure and connect community anchor institutions to broadband, create and upgrade public computer centers, and encourage the sustainable adoption of broadband service.  It also includes 28 awards from USDA for broadband infrastructure and satellite projects that will provide rural residents in 16 states and Native American tribal areas access to improved service.

The Department of Commerce awards also contain grants for public safety broadband networks that will improve response times and communication at the scene of emergencies.   These projects constitute a critical set of demonstration projects and a head start on President Obama’s commitment to support the development of a nationwide, interoperable public safety wireless broadband network.  

According to an analysis released by the National Economic Council last year, overall Recovery Act investments in broadband are expected to create tens of thousands of jobs in the near term and expand economic development and job opportunities in communities that are being left behind in the new knowledge-based economy. Recovery Act broadband projects help bring down the cost of private investment, attract Internet service providers to new areas, improve digital literacy among students and workers, and help create new opportunities in employment, education, and entrepreneurship by wiring homes and businesses. With new or increased broadband access, communities can compete on a level playing field to attract new businesses, schools can create distance learning opportunities, medical professionals can provide cost-efficient remote diagnoses and care, and business owners can expand the market for their products beyond their neighborhoods to better compete in the global economy.

Funding is contingent upon the recipient meeting the terms of the loan, grant or loan/grant agreement.  A complete list of projects receiving Recovery Act broadband grant awards today(August 18) can be viewed in full.

President Obama signed The American Recovery and Reinvestment Act of 2009 into law on February 17, 2009. It is designed to jumpstart the nation’s economy, create or save millions of jobs, and put a down payment on addressing long-neglected challenges so that the country can thrive in the 21st century. The Act includes measures to modernize our nation’s infrastructure, enhance energy independence, expand educational opportunities, preserve and improve affordable health care, provide tax relief, and protect those in greatest need.

Community News You Can Use
Fayette Front Page
Georgia Front Page
Follow us on Twitter:  @GAFrontPage