tag:blogger.com,1999:blog-8828655542562091002024-03-13T16:16:11.449-04:00GFP Web and TechGeorgia Front Page.comhttp://www.blogger.com/profile/18248749393644673382noreply@blogger.comBlogger240125tag:blogger.com,1999:blog-882865554256209100.post-27251801829711621002012-04-02T16:17:00.000-04:002012-04-02T16:17:37.963-04:00Via Infowars: Arizona Passes Sweeping Internet Censorship BillThe state legislature of Arizona has passed a bill that vastly broadens
telephone harassment laws and applies them to the Internet and other
means of electronic communication.<br />
More: http://www.infowars.com/arizona-passes-sweeping-internet-censorship-bill/Georgia Front Page.comhttp://www.blogger.com/profile/18248749393644673382noreply@blogger.com0tag:blogger.com,1999:blog-882865554256209100.post-17641054577792917562011-07-19T19:08:00.000-04:002011-07-19T19:08:07.661-04:00Sixteen Individuals Arrested in the United States for Alleged Roles in Cyber Attacks<i>More Than 35 Search Warrants Executed in United States, Five Arrests in Europe as Part of Ongoing Cyber Investigations</i><br />
<br />
Fourteen individuals were arrested today by FBI agents on charges related to their alleged involvement in a cyber attack on PayPal’s website as part of an action claimed by the group “Anonymous,” announced the Department of Justice and the FBI. Two additional defendants were arrested today on cyber-related charges. <br />
<br />
The 14 individuals were arrested in Alabama, Arizona, California, Colorado, the District of Columbia, Florida, Massachusetts, Nevada, New Mexico, and Ohio on charges contained in an indictment unsealed today in the Northern District of California in San Jose. In addition, two individuals were arrested on similar charges in two separate complaints filed in the Middle District of Florida and the District of New Jersey. Also today, FBI agents executed more than 35 search warrants throughout the United States as part of an ongoing investigation into coordinated cyber attacks against major companies and organizations. Finally, the United Kingdom’s Metropolitan Police Service arrested one person and the Dutch National Police Agency arrested four individuals today for alleged related cyber crimes. <br />
<br />
According to the San Jose indictment, in late November 2010, WikiLeaks released a large amount of classified U.S. State Department cables on its website. Citing violations of the PayPal terms of service, and in response to WikiLeaks’ release of the classified cables, PayPal suspended WikiLeaks’ accounts so that WikiLeaks could no longer receive donations via PayPal. WikiLeaks’ website declared that PayPal’s action “tried to economically strangle WikiLeaks.” <br />
<br />
The San Jose indictment alleges that in retribution for PayPal’s termination of WikiLeaks’ donation account, a group calling itself Anonymous coordinated and executed distributed denial of service (DDoS) attacks against PayPal’s computer servers using an open source computer program the group makes available for free download on the Internet. DDoS attacks are attempts to render computers unavailable to users through a variety of means, including saturating the target computers or networks with external communications requests, thereby denying service to legitimate users. According to the indictment, Anonymous referred to the DDoS attacks on PayPal as “Operation Avenge Assange.” <br />
<br />
The defendants charged in the San Jose indictment allegedly conspired with others to intentionally damage protected computers at PayPal from Dec. 6, 2010, to Dec. 10, 2010. <br />
<br />
The individuals named in the San Jose indictment are: Christopher Wayne Cooper, 23, aka “Anthrophobic;” Joshua John Covelli, 26, aka “Absolem” and “Toxic;” Keith Wilson Downey, 26; Mercedes Renee Haefer, 20, aka “No” and “MMMM;” Donald Husband, 29, aka “Ananon;” Vincent Charles Kershaw, 27, aka “Trivette,” “Triv” and “Reaper;” Ethan Miles, 33; James C. Murphy, 36; Drew Alan Phillips, 26, aka “Drew010;” Jeffrey Puglisi, 28, aka “Jeffer,” “Jefferp” and “Ji;” Daniel Sullivan, 22; Tracy Ann Valenzuela, 42; and Christopher Quang Vo, 22. One individual’s name has been withheld by the court. <br />
<br />
The defendants are charged with various counts of conspiracy and intentional damage to a protected computer. They will make initial appearances throughout the day in the districts in which they were arrested. <br />
<br />
In addition to the activities in San Jose, Scott Matthew Arciszewski, 21, was arrested today by FBI agents on charges of intentional damage to a protected computer. Arciszewski is charged in a complaint filed in the Middle District of Florida and made his initial appearance this afternoon in federal court in Orlando, Fla. <br />
<br />
According to the complaint, on June 21, 2011, Arciszewski allegedly accessed without authorization the Tampa Bay InfraGard website and uploaded three files. The complaint alleges that Arciszewski then tweeted about the intrusion and directed visitors to a separate website containing links with instructions on how to exploit the Tampa InfraGard website. InfraGard is a public-private partnership for critical infrastructure protection sponsored by the FBI with chapters in all 50 states. <br />
<br />
Also today, a related complaint unsealed in the District of New Jersey charges Lance Moore, 21, of Las Cruces, N.M., with allegedly stealing confidential business information stored on AT&T’s servers and posting it on a public file sharing site. Moore was arrested this morning at his residence by FBI agents and is expected to make an initial appearance this afternoon in Las Cruces federal court. Moore is charged in with one count of accessing a protected computer without authorization. <br />
<br />
According to the New Jersey complaint, Moore, a customer support contractor, exceeded his authorized access to AT&T’s servers and downloaded thousands of documents, applications and other files that, on the same day, he allegedly posted on a public file-hosting site that promises user anonymity. According to the complaint, on June 25, 2011, the computer hacking group LulzSec publicized that they had obtained confidential AT&T documents and made them publicly available on the Internet. The documents were the ones Moore had previously uploaded. <br />
<br />
The charge of intentional damage to a protected computer carries a maximum penalty of 10 years in prison and a $250,000 fine. Each count of conspiracy carries a maximum penalty of five years in prison and a $250,000 fine. <br />
<br />
An indictment and a complaint merely contain allegations. Defendants are presumed innocent unless and until proven guilty beyond a reasonable doubt in a court of law. <br />
<br />
To date, more than 75 searches have taken place in the United States as part of the ongoing investigations into these attacks. <br />
<br />
These cases are being prosecuted by Assistant U.S. Attorneys in the U.S. Attorneys’ Offices for the Northern District of California, Middle District of Florida, and the District of New Jersey. The Criminal Division’s Computer Crime and Intellectual Property Section also has provided assistance. <br />
<br />
Today’s operational activities were done in coordination with the Metropolitan Police Service in the United Kingdom and the Dutch National Police Agency. The FBI thanks the multiple international, federal, and domestic law enforcement agencies who continue to support these operations.Georgia Front Page.comhttp://www.blogger.com/profile/18248749393644673382noreply@blogger.com0tag:blogger.com,1999:blog-882865554256209100.post-10928488537909076042011-05-19T09:36:00.000-04:002011-05-19T09:36:44.900-04:00New cell phone app allows beachgoers to report marine debrisWith summer around the corner, millions worldwide will head to pristine beaches and waterways. However, with items such as bottles, cans and other debris washing up on U.S. shores each year, the University of Georgia and the National Oceanic and Atmospheric Administration, or NOAA, have teamed up to create a new, innovative cell phone reporting mechanism to combat the marine debris problem.<br />
<br />
The Southeast Atlantic Marine Debris Initiative, or SEA-MDI, housed at UGA and a critical part of a partnership with the NOAA Marine Debris Program, hopes to empower citizens in protecting their beaches and coastal waters through a newly launched mobile application that tracks where debris is accumulating.<br />
<br />
The tool is important for engaging with beachgoers and stakeholders and is geared at giving the public another way to be a part of the marine debris solution globally, said Jenna Jambeck, assistant professor of environmental engineering in the UGA Faculty of Engineering and one of the app’s developers.<br />
<br />
Available through iTunes and the Android Market, the easy-to-use Marine Debris Tracker app can be downloaded for use on iPhones and Android phones. The simple tool allows users to report and record the type and location of debris through GPS features pre-installed on a cell phone. The data submitted is posted on an interactive website (www.marinedebris.engr.uga.edu) that allows data to be viewed and downloaded for users to design plans to prevent marine debris.<br />
<br />
Jambeck said the app is one way the initiative is trying to reach people and raise awareness of marine debris. “If you are noticing marine debris, you are also much less likely to litter,” she said. “While this app collects data, one of its primary goals is to educate the public about marine debris and its harmful impacts.”<br />
<br />
“We are very excited about the innovative products that have resulted from our partnership with the University of Georgia,” said David Holst, acting director of the NOAA Marine Debris Program. “This app brings the issue into the forefront and empowers the public to take a proactive step in mitigating the problem.”<br />
<br />
Marine debris kills wildlife through ingestion and entanglement. It also can have an economic impact on the tourism industry and other coastal businesses by affecting the aesthetics of beaches and waterways. Jambeck and co-developer Kyle Johnsen, assistant professor of computer systems engineering in the UGA Faculty of Engineering, hope that the Marine Debris Tracker tool will help officials make decisions about how to mitigate marine debris, from supplying more comprehensive waste management, such as trash cans, to providing recycling and disposal opportunities for fishing gear.<br />
<br />
SEA-MDI (http://sea-mdi.engr.uga.edu/) is a new regional partnership between the NOAA Marine Debris Program and a consortium of organizations in Georgia, South Carolina and North Carolina. The initiative aims to create collaborative regional strategies that address marine debris prevention, reduction and mitigation.<br />
<br />
For more information on NOAA’s Marine Debris Program, see http://marinedebris.noaa.gov/.<br />
<br />
-----<br />
<br />
Community News You Can Use<br />
Click to read MORE news:<br />
<a href="http://www.GeorgiaFrontPage.com/">www.GeorgiaFrontPage.com</a><br />
Twitter: @gafrontpage & @TheGATable @HookedonHistory<br />
<a href="http://www.ArtsAcrossGeorgia.com/">www.ArtsAcrossGeorgia.com</a><br />
Twitter: @artsacrossga, @softnblue, @RimbomboAAG @FayetteFPGeorgia Front Page.comhttp://www.blogger.com/profile/18248749393644673382noreply@blogger.com0tag:blogger.com,1999:blog-882865554256209100.post-77299389258624293262011-05-10T16:35:00.000-04:002011-05-10T16:35:31.875-04:00Microsoft to Acquire Skype/PRNewswire/ -- Microsoft Corp. (Nasdaq: "MSFT") and Skype Global S.a r.l today announced that they have entered into a definitive agreement under which Microsoft will acquire Skype, the leading Internet communications company, for $8.5 billion in cash from the investor group led by Silver Lake. The agreement has been approved by the boards of directors of both Microsoft and Skype.<br />
<br />
The acquisition will increase the accessibility of real-time video and voice communications, bringing benefits to both consumers and enterprise users and generating significant new business and revenue opportunities. The combination will extend Skype's world-class brand and the reach of its networked platform, while enhancing Microsoft's existing portfolio of real-time communications products and services.<br />
<br />
With 170 million connected users and over 207 billion minutes of voice and video conversations in 2010, Skype has been a pioneer in creating rich, meaningful connections among friends, families and business colleagues globally. Microsoft has a long-standing focus and investment in real-time communications across its various platforms, including Lync (which saw 30 percent revenue growth in Q3), Outlook, Messenger, Hotmail and Xbox LIVE.<br />
<br />
Skype will support Microsoft devices like Xbox and Kinect, Windows Phone and a wide array of Windows devices, and Microsoft will connect Skype users with Lync, Outlook, Xbox Live and other communities. Microsoft will continue to invest in and support Skype clients on non-Microsoft platforms.<br />
<br />
"Skype is a phenomenal service that is loved by millions of people around the world," said Microsoft CEO Steve Ballmer. "Together we will create the future of real-time communications so people can easily stay connected to family, friends, clients and colleagues anywhere in the world."<br />
<br />
Skype will become a new business division within Microsoft, and Skype CEO Tony Bates will assume the title of president of the Microsoft Skype Division, reporting directly to Ballmer.<br />
<br />
"Microsoft and Skype share the vision of bringing software innovation and products to our customers," said Tony Bates. "Together, we will be able to accelerate Skype's plans to extend our global community and introduce new ways for everyone to communicate and collaborate," Bates said.<br />
<br />
"Tony Bates has a great track record as a leader and will strengthen the Microsoft management team. I'm looking forward to Skype's talented global workforce bringing its insights, ideas and experience to Microsoft," Ballmer said.<br />
<br />
Speaking on behalf of the investor group that sold Skype to Microsoft, Egon Durban, managing director of Silver Lake, said: "We are thrilled with Skype's transformation during the period of our ownership and grateful for the extraordinary commitment of its management team and employees. We are excited about Skype's long-term future with Microsoft, as it is poised to become one of the world's most dynamic and comprehensive communications platforms."<br />
<br />
Founded in 2003, Skype was acquired by eBay in September 2005, and then acquired by an investment group led by Silver Lake in November 2009. Skype has made impressive progress over the past 18 months under Silver Lake's leadership, increasing monthly calling minutes by 150 percent, developing new revenue streams and strategic partnerships, acquiring the intellectual property powering its peer-to-peer network, and recruiting an outstanding senior management team. <br />
<br />
Other members of the selling investor group led by Silver Lake include eBay International AG, CPP Investment Board, Joltid Limited in partnership with Europlay Capital Advisors; and Andreessen Horowitz.<br />
<br />
The acquisition is subject to regulatory approvals and other customary closing conditions. The parties hope to obtain all required regulatory clearances during the course of this calendar year.<br />
<br />
-----<br />
<br />
Community News You Can Use<br />
Click to read MORE news:<br />
<a href="http://www.GeorgiaFrontPage.com/">www.GeorgiaFrontPage.com</a><br />
Twitter: @gafrontpage & @TheGATable @HookedonHistory<br />
<a href="http://www.ArtsAcrossGeorgia.com/">www.ArtsAcrossGeorgia.com</a><br />
Twitter: @artsacrossga, @softnblue, @RimbomboAAG @FayetteFPGeorgia Front Page.comhttp://www.blogger.com/profile/18248749393644673382noreply@blogger.com0tag:blogger.com,1999:blog-882865554256209100.post-59437170703895316232011-05-03T21:32:00.000-04:002011-05-03T21:32:08.665-04:00Malicious Software Features Usama bin Laden Links to Ensnare Unsuspecting Computer UsersThe FBI today warns computer users to exercise caution when they receive e-mails that purport to show photos or videos of Usama bin Laden’s recent death. This content could be a virus that could damage your computer. This malicious software, or “malware,” can embed itself in computers and spread to users’ contact lists, thereby infecting the systems of associates, friends, and family members. These viruses are often programmed to steal your personally identifiable information.<br />
<br />
The Internet Crime Complaint Center (IC3) urges computer users to not open unsolicited (spam) e-mails, including clicking links contained within those messages. Even if the sender is familiar, the public should exercise due diligence. Computer owners must ensure they have up-to-date firewall and anti-virus software running on their machines to detect and deflect malicious software.<br />
<br />
The IC3 recommends the public do the following:<br />
<br />
* Adjust the privacy settings on social networking sites you frequent to make it more difficult for people you know and do not know to post content to your page. Even a “friend” can unknowingly pass on multimedia that’s actually malicious software.<br />
* Do not agree to download software to view videos. These applications can infect your computer.<br />
* Read e-mails you receive carefully. Fraudulent messages often feature misspellings, poor grammar, and nonstandard English.<br />
* Report e-mails you receive that purport to be from the FBI. Criminals often use the FBI’s name and seal to add legitimacy to their fraudulent schemes. In fact, the FBI does not send unsolicited e-mails to the public. Should you receive unsolicited messages that feature the FBI’s name, seal, or that reference a division or unit within the FBI or an individual employee, report it to the Internet Crime Complaint Center at www.ic3.gov.<br />
<br />
-----<br />
<br />
Community News You Can Use<br />
Click to read MORE news:<br />
<a href="http://www.GeorgiaFrontPage.com/">www.GeorgiaFrontPage.com</a><br />
Twitter: @gafrontpage & @TheGATable @HookedonHistory<br />
<a href="http://www.ArtsAcrossGeorgia.com/">www.ArtsAcrossGeorgia.com</a><br />
Twitter: @artsacrossga, @softnblue, @RimbomboAAG @FayetteFPGeorgia Front Page.comhttp://www.blogger.com/profile/18248749393644673382noreply@blogger.com0tag:blogger.com,1999:blog-882865554256209100.post-13250370829131493032011-05-03T14:52:00.000-04:002011-05-03T14:52:18.766-04:00Use Your Mobile Phone to Receive Alerts on Approaching Storms/PRNewswire/ -- With the South still reeling from the devastating effects of last week's tornados, the need for effective and actionable communication during a storm has never been more apparent.<br />
<br />
Global Alert Network (GAN) is the first-ever hands-free audio alert application for mobile phones. The app is free to download and is currently available on BlackBerry and Android devices through AppWorld and Android Market.<br />
<br />
Scott Hughes, President of Global Alert Network, stated "While weather radios are essential for every home in tornado alley, there are times when you're just not around it to hear the warning. The one device that is with people everywhere they go now is their mobile phone. Our alerts are literally with you wherever you are, delivering up to date important local weather warnings and emergency information."<br />
<br />
More than 1,500 alerts were sent out to the southern part of the country last week warning residents of the impending tornados. Global Alert Network works with content provider AccuWeather.com, a company that provides users all over the world with the best possible weather forecasts and warnings.<br />
<br />
"What makes this application unique is that it initiates automatically – much like a ringtone – and plays the alert without the need for the consumer to interact with his or her mobile phone," continued Mr. Hughes. "Alerts are geo-targeted to the user's location to provide timely, accurate information about weather, traffic conditions and certain emergency alerts." <br />
<br />
Traffic, weather and emergency notifications are the channels that are currently available on the Global Alert Network platform. The Company plans to expand its content channels to include entertainment, sports and news. <br />
<br />
-----<br />
<br />
Community News You Can Use<br />
Click to read MORE news:<br />
<a href="http://www.GeorgiaFrontPage.com/">www.GeorgiaFrontPage.com</a><br />
Twitter: @gafrontpage & @TheGATable @HookedonHistory<br />
<a href="http://www.ArtsAcrossGeorgia.com/">www.ArtsAcrossGeorgia.com</a><br />
Twitter: @artsacrossga, @softnblue, @RimbomboAAG @FayetteFPGeorgia Front Page.comhttp://www.blogger.com/profile/18248749393644673382noreply@blogger.com0tag:blogger.com,1999:blog-882865554256209100.post-12643925568937725202011-04-15T10:43:00.000-04:002011-04-15T10:43:09.629-04:00Georgia DOT Re-Launches Improved NaviGAtor 511 Travel Information System: Features New Technology, Smart-Phone App & Sponsorship Partners(BUSINESS WIRE)--The Georgia Department of Transportation, home of one of the most popular, heavily used real-time traveler information systems in the country, today unveiled the next generation of Georgia NaviGAtor 511. The new system brings new features and, through a public-private partnership, new sponsors, allowing the Department and its 511 provider, Meridian Environmental Technology, Inc., an Iteris company, to operate and maintain the system at no cost to Georgia taxpayers.<br />
<br />
“People are very mobile and need to know traffic and road conditions before and during their trip”<br />
<br />
This is the first major upgrade of the Georgia NaviGAtor 511 system since its inception for the 1996 Olympic Games and is part of a federal effort to establish traveler information services nationwide. The new platform creates a foundation for many new traveler information enhancements planned for the future, such as statewide congestion reporting and 511 services in Spanish.<br />
<br />
PepsiCo, and its blockbuster-selling brand, Mountain Dew, is the first nationally-recognized brand to sponsor the state’s new Georgia NaviGAtor 511 system. Company promotions will lead the system’s sponsorship program, complete with Mountain Dew truck-back artwork and sponsor messaging on 511 services.<br />
<br />
“By engaging sponsorship opportunities, we can continue to provide vital services to travelers in a time of unprecedented funding challenges,” said Georgia DOT Commissioner Vance C. Smith, Jr. “Our ongoing mission is to keep travelers safe and informed and to provide for their mobility throughout the state. The Department is recognized as a national leader in traveler information services and this represents a natural growth and progression of that innovation.”<br />
<br />
One feature new to the NaviGAtor 511 system is the 511 App, the official traveler information mobile phone application of Georgia. It provides real-time, location-based traveler information on Georgia’s highways, digital coupons and promotions as well as other special offers of interest to travelers.<br />
<br />
“The original Georgia NaviGAtor system served the state well for many years, but it was limited relative to what we can offer with today’s technology,” said Mark Demidovich, Assistant State Traffic Engineer. “We’ve retained most of the features that our users favored; added a mobile app with special offers for travelers; and established a robust foundation for future NaviGAtor and 511 expansions.”<br />
<br />
The integrated Georgia NaviGAtor 511 sponsorship program includes four program components:<br />
<br />
* The 511 phone system, developed by Meridian, which has received over 5 million calls since inception in August 2007 and is being expanded to accommodate brief sponsor messages and future concierge-style services;<br />
* The main Georgia NaviGAtor website, 511ga.org, redesigned and developed by Meridian, Iteris, and partners,<br />
* The mobile app, developed by 511Live, LLC, now available as a free download for iPhone users (Blackberry and Droid apps coming soon); and,<br />
* Signs on the state right-of-way to promote the 511 program and its sponsors, managed by Revelation Outdoor, LLC.<br />
<br />
**Georgia NaviGator, 511 App and integrated sponsorship programs, promoted and managed by 511Live, LLC.<br />
<br />
“People are very mobile and need to know traffic and road conditions before and during their trip,” said Leon Osborne, president and CEO of Meridian Environmental Technology, Inc. “The new NaviGAtor website and mobile app will make it easier to plan trips, avoid problem areas, and reach destinations more quickly and safely."<br />
<br />
To demonstrate the power of the system, the new applications, and the special offers available, Georgia 511 is planning a major summer promotion to coincide with the summer travel and construction season.<br />
<br />
The Georgia Department of Transportation is committed to providing a safe, seamless, and sustainable transportation system that supports Georgia’s economy and is sensitive to both its citizens and its environment. For general information on the Georgia DOT, please visit www.dot.ga.gov. <br />
<br />
-----<br />
<br />
Community News You Can Use<br />
Click to read MORE news:<br />
<a href="http://www.GeorgiaFrontPage.com/">www.GeorgiaFrontPage.com</a><br />
Twitter: @gafrontpage & @TheGATable @HookedonHistory<br />
<a href="http://www.ArtsAcrossGeorgia.com/">www.ArtsAcrossGeorgia.com</a><br />
Twitter: @artsacrossga, @softnblue, @RimbomboAAG @FayetteFPGeorgia Front Page.comhttp://www.blogger.com/profile/18248749393644673382noreply@blogger.com0tag:blogger.com,1999:blog-882865554256209100.post-26424924723186519712011-04-08T09:57:00.000-04:002011-04-08T09:57:03.587-04:00Verizon Wireless Launches 'Know It Forward' in Georgia to Raise Awareness of Sexual Assault Among Young Adults/PRNewswire/ -- Verizon Wireless announces today (April 4) the launch of "Know It Forward," a social media campaign aimed at increasing awareness of sexual assault, particularly among college students and young adults, for Sexual Assault Awareness Month (SAAM).<br />
<br />
Throughout the month of April, Verizon Wireless is joining colleges and universities across Georgia to educate students about the prevalence of sexual assault on college campuses and encourage them to visit www.KnowItForward.com to find out how to reduce the risk and discover ways to share the information with their personal network through Facebook, Twitter, YouTube and other social channels.<br />
<br />
"Because of our strong relationships with universities across Georgia as well as nonprofits that focus on sexual assault and domestic violence, we feel this program provides a real opportunity to reach young people and help educate them on this important issue," said Jeff Mango, president – Georgia/Alabama Region for Verizon Wireless. "Our goal is to facilitate and promote peer-to-peer discussions and provide facts and information in a way that is impactful, memorable and easy to share with friends and family."<br />
<br />
College-age women are four times more likely to be sexually assaulted than the general public, with an estimated one in four female college students becoming victims of sexual assault during their college career, according to studies from the U.S. Department of Justice. As such, sexual assault is an issue of significant concern on college campuses throughout the state, with the majority actively providing resources to educate students and the public about sexual assault prevention and awareness.<br />
<br />
"At VSU, we strive to prepare our students not only academically, but also through awareness and prevention efforts. Along with Sexual Assault Awareness events held in April, we provide various opportunities throughout the year for students to learn how to keep themselves safe on campus and in the community," notes Holly Wright, health educator and RAD (Rape Aggression Defense) coordinator for Valdosta State University.<br />
<br />
In support of collegiate SAAM efforts throughout the state, Verizon Wireless is working with various student organizations and awareness/prevention programs at Augusta State, Clark Atlanta, Kennesaw State, Mercer, South Georgia College, Spelman, University of Georgia and Valdosta State to bring the campaign to students through campus-specific efforts and by joining scheduled campus events.<br />
<br />
Know it. Forward it. KnowItForward.com. For information on national sexual assault statistics, awareness and prevention tips, and regional assistance programs, visit www.KnowItForward.com; then share the website, videos and factsheets with friends and family.<br />
<br />
A recognized corporate leader in the prevention and awareness of domestic and sexual violence issues through its HopeLine program (www.verizonwireless.com/hopeline), Verizon Wireless is launching a variety of regional sexual assault awareness initiatives across the country this April.<br />
<br />
-----<br />
Community News You Can Use<br />
Click to read MORE news:<br />
<a href="http://www.georgiafrontpage.com/">www.GeorgiaFrontPage.com</a><br />
Twitter: @gafrontpage & @TheGATable @HookedonHistory<br />
<a href="http://www.artsacrossgeorgia.com/">www.ArtsAcrossGeorgia.com</a><br />
Twitter: @artsacrossga, @softnblue, @RimbomboAAG @FayetteFPGeorgia Front Page.comhttp://www.blogger.com/profile/18248749393644673382noreply@blogger.com0tag:blogger.com,1999:blog-882865554256209100.post-27926897086395502602011-04-01T08:51:00.000-04:002011-04-01T08:51:41.889-04:00Warning: New Email Scam for Japan Relief ExposedAnother scam to expose has just landed in my email inbox. Apparantly, a "good citizen" of Malaysia is asking for western union money transfers so he can go help the victims of the recent earthquake in Japan.<br />
<br />
If you want to help the victims, please don't do it this way. Instead, contact a reputable charity like the American Red Cross to make your donation.<br />
<br />
Otherwise, your wire transfer is just a donation to the scam artist.<br />
<br />
Community News You Can Use<br />
Click to read MORE news:<br />
<a href="http://www.georgiafrontpage.com/">www.GeorgiaFrontPage.com</a><br />
Twitter: @gafrontpage & @TheGATable @HookedonHistory<br />
<a href="http://www.artsacrossgeorgia.com/">www.ArtsAcrossGeorgia.com</a><br />
Twitter: @artsacrossga, @softnblue, @RimbomboAAG @FayetteFPGeorgia Front Page.comhttp://www.blogger.com/profile/18248749393644673382noreply@blogger.com0tag:blogger.com,1999:blog-882865554256209100.post-80254928291674416732011-03-30T16:23:00.000-04:002011-03-30T16:23:55.388-04:00FTC Charges Deceptive Privacy Practices in Google's Rollout of Its Buzz Social Network/PRNewswire/ -- Google Inc. has agreed to settle Federal Trade Commission charges that it used deceptive tactics and violated its own privacy promises to consumers when it launched its social network, Google Buzz, in 2010. The agency alleges the practices violate the FTC Act. The proposed settlement bars the company from future privacy misrepresentations, requires it to implement a comprehensive privacy program, and calls for regular, independent privacy audits for the next 20 years. This is the first time an FTC settlement order has required a company to implement a comprehensive privacy program to protect the privacy of consumers' information. In addition, this is the first time the FTC has alleged violations of the substantive privacy requirements of the U.S.-EU Safe Harbor Framework, which provides a method for U.S. companies to transfer personal data lawfully from the European Union to the United States.<br />
<br />
"When companies make privacy pledges, they need to honor them," said Jon Leibowitz, Chairman of the FTC. "This is a tough settlement that ensures that Google will honor its commitments to consumers and build strong privacy protections into all of its operations."<br />
<br />
According to the FTC complaint, Google launched its Buzz social network through its Gmail web-based email product. Although Google led Gmail users to believe that they could choose whether or not they wanted to join the network, the options for declining or leaving the social network were ineffective. For users who joined the Buzz network, the controls for limiting the sharing of their personal information were confusing and difficult to find, the agency alleged.<br />
<br />
On the day Buzz was launched, Gmail users got a message announcing the new service and were given two options: "Sweet! Check out Buzz," and "Nah, go to my inbox." However, the FTC complaint alleged that some Gmail users who clicked on "Nah..." were nonetheless enrolled in certain features of the Google Buzz social network. For those Gmail users who clicked on "Sweet!," the FTC alleges that they were not adequately informed that the identity of individuals they emailed most frequently would be made public by default. Google also offered a "Turn Off Buzz" option that did not fully remove the user from the social network.<br />
<br />
In response to the Buzz launch, Google received thousands of complaints from consumers who were concerned about public disclosure of their email contacts which included, in some cases, ex-spouses, patients, students, employers, or competitors. According to the FTC complaint, Google made certain changes to the Buzz product in response to those complaints.<br />
<br />
When Google launched Buzz, its privacy policy stated that "When you sign up for a particular service that requires registration, we ask you to provide personal information. If we use this information in a manner different than the purpose for which it was collected, then we will ask for your consent prior to such use." The FTC complaint charges that Google violated its privacy policies by using information provided for Gmail for another purpose - social networking - without obtaining consumers' permission in advance.<br />
<br />
The agency also alleges that by offering options like "Nah, go to my inbox," and "Turn Off Buzz," Google misrepresented that consumers who clicked on these options would not be enrolled in Buzz. In fact, they were enrolled in certain features of Buzz.<br />
<br />
The complaint further alleges that a screen that asked consumers enrolling in Buzz, "How do you want to appear to others?" indicated that consumers could exercise control over what personal information would be made public. The FTC charged that Google failed to disclose adequately that consumers' frequent email contacts would become public by default.<br />
<br />
Finally, the agency alleges that Google misrepresented that it was treating personal information from the European Union in accordance with the U.S.-EU Safe Harbor privacy framework. The framework is a voluntary program administered by the U.S. Department of Commerce in consultation with the European Commission. To participate, a company must self-certify annually to the Department of Commerce that it complies with a defined set of privacy principles. The complaint alleges that Google's assertion that it adhered to the Safe Harbor principles was false because the company failed to give consumers notice and choice before using their information for a purpose different from that for which it was collected. <br />
<br />
The proposed settlement bars Google from misrepresenting the privacy or confidentiality of individuals' information or misrepresenting compliance with the U.S.-E.U Safe Harbor or other privacy, security, or compliance programs. The settlement requires the company to obtain users' consent before sharing their information with third parties if Google changes its products or services in a way that results in information sharing that is contrary to any privacy promises made when the user's information was collected. The settlement further requires Google to establish and maintain a comprehensive privacy program, and it requires that for the next 20 years, the company have audits conducted by independent third parties every two years to assess its privacy and data protection practices.<br />
<br />
Google's data practices in connection with its launch of Google Buzz were the subject of a complaint filed with the FTC by the Electronic Privacy Information Center shortly after the service was launched.<br />
<br />
The Commission vote to issue the administrative complaint and accept the consent agreement package containing the proposed consent order for public comment was 5-0, with Commissioner J. Thomas Rosch issuing a separate concurring statement. Commissioner Rosch concurs with accepting, subject to final approval, the consent order for the purpose of public comment. The reasons for his concurrence are described in the attached separate statement.<br />
<br />
The FTC will publish a description of the consent agreement package in the Federal Register shortly. The agreement will be subject to public comment for 30 days, beginning today and continuing through May 1, 2011, after which the Commission will decide whether to make the proposed consent order final. Interested parties can submit written comments electronically or in paper form by following the instructions in the "Invitation To Comment" part of the "Supplementary Information" section.<br />
<br />
Comments in electronic form should be submitted using the following web link: https://ftcpublic.commentworks.com/ftc/googlebuzz and following the instructions on the web-based form. Comments in paper form should be mailed or delivered to: Federal Trade Commission, Office of the Secretary, Room H-113 (Annex D), 600 Pennsylvania Avenue, N.W., Washington, DC 20580. The FTC is requesting that any comment filed in paper form near the end of the public comment period be sent by courier or overnight service, if possible, because U.S. postal mail in the Washington area and at the Commission is subject to delay due to heightened security precautions.<br />
<br />
<span style="font-size: x-small;"><i>NOTE: The Commission issues an administrative complaint when it has "reason to believe" that the law has been or is being violated, and it appears to the Commission that a proceeding is in the public interest. The complaint is not a finding or ruling that the respondent has actually violated the law. A consent agreement is for settlement purposes only and does not constitute an admission by the respondent that the law has been violated. When the Commission issues a consent order on a final basis, it carries the force of law with respect to future actions. Each violation of such an order may result in a civil penalty of up to $16,000.</i></span><br />
<br />
----- <br />
Community News You Can Use<br />
Click to read MORE news:<br />
<a href="http://www.georgiafrontpage.com/">www.GeorgiaFrontPage.com</a><br />
Twitter: @gafrontpage & @TheGATable @HookedonHistory<br />
<a href="http://www.artsacrossgeorgia.com/">www.ArtsAcrossGeorgia.com</a><br />
Twitter: @artsacrossga, @softnblue, @RimbomboAAG @FayetteFPGeorgia Front Page.comhttp://www.blogger.com/profile/18248749393644673382noreply@blogger.com0tag:blogger.com,1999:blog-882865554256209100.post-10428918740220421272011-02-23T13:41:00.000-05:002011-02-23T13:41:05.754-05:00Free Smartphone Application Takes Hassle out of Universal Orlando® Vacation(BUSINESS WIRE)--Undercover Tourist, an Orlando, Florida-based discount travel company, is launching a free iPhone and Android application that cuts the wait time for theme park rides at Universal Orlando®.<br />
<br />
App users receive a simple, real-time traffic light feature, equating a green with fast access, yellow with short waits and red with long lines for theme park rides. Data is compiled from over 460,000 wait time data points enhanced by real-time user’s submissions.<br />
<br />
To help visitors plan their day and create a ride schedule, the new app will feature detailed theme park ride descriptions, including photos, ratings and height and age requirements.<br />
<br />
“We want to help visitors to Universal Orlando save time on their vacation, this new app is that tool and it doesn’t cost anything to download and use,” said Ian Ford, president and co-founder, Undercover Tourist.<br />
<br />
Leveraging Undercover Tourist’s leading-edge app, users can easily create a tour plan of Universal Orlando® and sort every ride by distance to a current position. The iPhone version takes it a step further and allows users to actually bookmark and sort through their favorite attractions. Without the ability to incorporate favorites, the Android app currently will rank all rides by distance to a user.<br />
<br />
App users will also be able to purchase discount tickets to a variety of theme parks through Undercover Tourist, the most trusted name in attraction tickets. Undercover Tourist is contracted, licensed, and an official authorized ticket broker for Universal Orlando®, Walt Disney World®, SeaWorld Orlando® and other theme parks.<br />
<br />
The new app was developed exclusively for Universal Orlando's Islands of Adventure® and Universal Studios Florida®. It can be used with any iPhone that has network coverage, including offline capabilities for iPod Touches, pertaining to ride information. On the Android, the app is fully functional with version 2.0 or higher.<br />
<br />
The new application can be downloaded for the iPhone at the Apple Store and, for the Android, users can find it at the Android Market store by searching for ‘Phunware’. The Undercover Tourist App is not an official app of Universal Orlando®.<br />
<br />
-----<br />
Community News You Can Use<br />
Click to read MORE news:<br />
<a href="http://www.georgiafrontpage.com/">www.GeorgiaFrontPage.com</a><br />
Twitter: @gafrontpage & @TheGATable @HookedonHistory<br />
<a href="http://www.artsacrossgeorgia.com/">www.ArtsAcrossGeorgia.com</a><br />
Twitter: @artsacrossga, @softnblue, @RimbomboAAG @FayetteFPGeorgia Front Page.comhttp://www.blogger.com/profile/18248749393644673382noreply@blogger.com0tag:blogger.com,1999:blog-882865554256209100.post-65635474977158334892011-02-14T13:33:00.000-05:002011-02-14T13:33:46.024-05:00Internet Crime Complaint Center's (IC3) Scam AlertsThis report, which is based upon information from law enforcement and complaints<br />
submitted to the IC3, details recent cyber crime trends and new twists to previously-existing<br />
cyber scams.<br />
<br />
Social Network Misspelling Scam<br />
<br />
During December 2010, the IC3 discovered misspellings of a social network site being<br />
used as a social engineering ploy. Misspelling the domain name of this site would<br />
redirect users to websites coded to look similar to the actual website. The website<br />
users were redirected to answer three or four simple survey questions. Upon answering<br />
those questions, users were offered a choice of three free gifts. Multiple brands<br />
were observed as being offered as gifts, including gift cards to retail stores and<br />
various brands of laptops.<br />
<br />
After clicking on one of the gifts, users were further redirected to other websites<br />
claiming to give free gifts for completing surveys. The surveys typically asked<br />
for name, address, phone number, and e-mail address. A user could spend hours filling<br />
out multiple surveys and never receive any of the gifts advertised.<br />
<br />
Fake Online Receipt Generator Targets Unsuspecting Online Marketplace Merchant<br />
<br />
A new scam aims to swindle online marketplace sellers by generating fake receipts.<br />
This Receipt Generator is an executable file that has been circulating on hacking<br />
forums recently. This is a particularly interesting scam - because it does not target<br />
regular PC users, it targets the sellers on online marketplace websites. This is<br />
what the would-be social engineer sees when running the program:<br />
<br />
<div class="separator" style="clear: both; text-align: center;"><a href="http://3.bp.blogspot.com/-tn-LpSzO0qU/TVl0ejRM7rI/AAAAAAAAEJY/7rCTXLJCiPc/s1600/110214-1.jpg" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"><img border="0" height="320" src="http://3.bp.blogspot.com/-tn-LpSzO0qU/TVl0ejRM7rI/AAAAAAAAEJY/7rCTXLJCiPc/s320/110214-1.jpg" width="272" /></a></div><div class="separator" style="clear: both; text-align: center;"></div><br />
<br />
The social engineer can fill in a variety of information, including item name, price,<br />
and the date the order was taken. Additionally, it allows them to choose between<br />
the .com, .co.uk, .fr, and .ca marketplace portals. When they hit "Generate," an<br />
HTML file is created in the program folder which looks like this:<br />
<br />
<br />
<div class="separator" style="clear: both; text-align: center;"><a href="http://2.bp.blogspot.com/-kN2drCyTYJc/TVl0glPHPfI/AAAAAAAAEJc/NN8PrUkzI8A/s1600/110214-2.jpg" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"><img border="0" height="320" src="http://2.bp.blogspot.com/-kN2drCyTYJc/TVl0glPHPfI/AAAAAAAAEJc/NN8PrUkzI8A/s320/110214-2.jpg" width="225" /></a></div><br />
<br />
The program produces what appears to be a genuine marketplace receipt and a copy<br />
of the "Printable Order Summary," similar to the documents resulting from legitimate<br />
marketplace purchases. Note the small details, such as "Total before tax," "Sales<br />
tax," and other particulars that make the receipt convincing.<br />
<br />
Many sellers on these markets will ask the buyer to send them a copy of the receipt<br />
should the buyer run into trouble, have orders go missing, lose the license key<br />
for a piece of software, and so on. The scammer relies on the seller to accept the<br />
printout at face value without checking the details. After all, how many sellers<br />
would be aware someone went to the trouble of creating a fake receipt generator?<br />
<br />
Sellers must remain ever vigilant about this scam, which has been a popular topic<br />
in recent hacker forums. The VirusTotal detection rate is currently 1/43 – detected as Hacktool.Win32.Amagen.A.<br />
<br />
Malicious Code In .gov E-mail<br />
<br />
A recent malware campaign, disguised as a holiday greeting from the White House,<br />
targeted government employees. The recipient received the below e-mail with links<br />
to what masqueraded as a greeting card, but when they clicked on the link, it attempted<br />
to download a file named "card.exe." The executable program proved to be an information-stealing<br />
Trojan, which would disable the recipient’s computer security notifications, software<br />
updates, and firewall settings. The malware also installed itself into the computer’s<br />
registry, enabling the code to be executed every time the computer was rebooted.<br />
At the time of review, this particular malicious code sample had a low antivirus<br />
detection rate of 20%, with only 9 out of 43 antivirus companies reporting detection.<br />
<br />
<i>From: sender@whitehouse.gov [mailto: sender@whitehouse.gov]<br />
Sent: Wednesday, December 22, 2010 10:33 PM<br />
To: recipient's name<br />
Subject: Merry Christmas, recipient's name</i><br />
<i>Recipient’s name here,<br />
<br />
As you and your families gather to celebrate the holidays, we wanted to take a moment<br />
to send you our greetings. Be sure that we're profoundly grateful for your dedication<br />
to duty and wish you inspiration and success in fulfillment of our core mission.<br />
<br />
Greeting card:<br />
<br />
hxxp://xtremedefenceforce.com/card/<br />
hxxp://elvis.com.au/card/<br />
<br />
<br />
Merry Christmas!<br />
<br />
___________________________________________<br />
<br />
Executive Office of the President of the United States<br />
The White House<br />
1600 Pennsylvania Avenue NW<br />
Washington, DC 20500</i><br />
<br />
<br />
<br />
<br />
<br />
<span style="font-size: x-small;"><i> Source: FBI, February 2011 </i></span> <br />
<br />
<br />
-----<br />
Community News You Can Use<br />
Click to read MORE news:<br />
<a href="http://www.georgiafrontpage.com/">www.GeorgiaFrontPage.com</a><br />
Twitter: @gafrontpage & @TheGATable @HookedonHistory<br />
<a href="http://www.artsacrossgeorgia.com/">www.ArtsAcrossGeorgia.com</a><br />
Twitter: @artsacrossga, @softnblue, @RimbomboAAG @FayetteFPGeorgia Front Page.comhttp://www.blogger.com/profile/18248749393644673382noreply@blogger.com0tag:blogger.com,1999:blog-882865554256209100.post-64227017715304774492011-02-11T11:47:00.000-05:002011-02-11T11:47:25.349-05:00Landmark 'Do Not Track Me' Bill to Block Unwanted Spying on the Internet, Says Consumer Watchdog/PRNewswire/ -- "Do Not Track Me" legislation introduced in Congress today by Rep. Jackie Speier, D-CA, will let consumers block unwanted tracking of their information online, said the nonprofit Consumer Watchdog at a press conference today with the bill author and consumer and privacy advocates.<br />
<br />
The bill authorizes the Federal Trade Commission to enact and enforce regulations that would give consumers a right to block companies from tracking their activities as they use the Internet. The concept is analogous to the popular "Do Not Call" list that prevents advertisers from calling consumers who do not wish to be disturbed by telemarketing.<br />
<br />
"Consumers should have the right to choose if their private information – from shoe size, to health concerns, to religious beliefs – is collected, analyzed and profiled by companies tracking activities online. Do Not Track is the simple way for consumers to say 'no thanks' to being monitored while they surf the web," said Carmen Balber, Washington director for Consumer Watchdog.<br />
<br />
Rep. Speier's bill is the first in Congress to explicitly provide for a Do Not Track mechanism.<br />
<br />
"Right now much of the online advertising market is based on unauthorized spying on consumers," said John M. Simpson, director of Consumer Watchdog's Inside Google Project. "A Do Not Track mechanism would give consumers better control of their information and help restore their confidence in the Internet. That's a win-win for consumers and business. What kind of lasting business can be built on snooping on your customers?"<br />
<br />
A poll by Consumer Watchdog last summer found that 80% of Americans support a Do Not Track option. A USA Today/Gallup poll released this week found that most Americans are worried about their privacy and security when they use Facebook and Google.<br />
<br />
Read Consumer Watchdog's poll here: http://insidegoogle.com/2010/07/consumer-watchdog-poll-finds-concern-about-googles-wi-spy-snooping/<br />
<br />
Read the USA Today poll here: http://www.usatoday.com/tech/news/2011-02-09-privacypoll09_ST_N.htm<br />
<br />
Consumer Watchdog noted that Do Not Track legislation does not solve all online privacy issues, but must be an option for consumers to have a fundamental right to privacy online.<br />
<br />
Online privacy is one of the few issues that appears to have bipartisan backing in Congress, said Consumer Watchdog, and urged members to approve Do Not Track legislation this year.<br />
<br />
Interest in Do Not Track legislation increased after the FTC issued a report in December backing the concept. David Vladeck, director of the FTC's Bureau of Consumer Protection testified to Congress that a Do Not Track mechanism was both feasible and enforceable. FTC Chairman Jon Leibowitz recently wrote:<br />
<br />
"We also believe, as do most American businesses, that no company loses by respecting the wishes of its customers. Do Not Track will allow the Internet to continue to thrive while protecting our basic right to privacy when we travel in cyberspace."<br />
<br />
Other legislators are working on privacy legislation. In the House Rep. Bobby Rush, D-Il., introduced a general online privacy bill Thursday and Rep. Cliff Stearns, R-Fl., is expected to offer legislation soon. In the Senate, Sen. John Kerry, D-Ma., is working on a bill, while Sen. Mark Pryor, D-Ar. has been considering offering Do Not Track legislation.<br />
<br />
Comments on the FTC's report on privacy, "Protecting Consumer Privacy in an Era of Rapid Change: A Proposed Framework for Businesses and Policymakers," are due next Friday, Feb. 18.<br />
<br />
Consumer Watchdog has been working to protect consumers' online privacy rights and educate them about the issues through its Inside Google Project. The goal has been to convince Google of the social and economic importance of giving consumers control over their online lives. By persuading Google, the Internet's leading company, to adopt adequate guarantees, its policies could become the gold standard for privacy for the industry, potentially improving the performance of the entire online sector.<br />
<br />
-----<br />
Community News You Can Use<br />
Click to read MORE news:<br />
<a href="http://www.georgiafrontpage.com/">www.GeorgiaFrontPage.com</a><br />
Twitter: @gafrontpage & @TheGATable @HookedonHistory<br />
<a href="http://www.artsacrossgeorgia.com/">www.ArtsAcrossGeorgia.com</a><br />
Twitter: @artsacrossga, @softnblue, @RimbomboAAG @FayetteFPGeorgia Front Page.comhttp://www.blogger.com/profile/18248749393644673382noreply@blogger.com0tag:blogger.com,1999:blog-882865554256209100.post-78630809798494678922011-01-20T11:01:00.000-05:002011-01-20T11:01:19.158-05:00E-mails Containing Malware Sent To Businesses Concerning Their Online Job PostingsRecent FBI analysis reveals that cyber criminals engaging in ACH/wire transfer fraud have targeted businesses by responding via e-mail to employment opportunities posted online.<br />
<br />
Recently, more than $150,000 was stolen from a US business via unauthorized wire transfer as a result of an e-mail the business received that contained malware. The malware was embedded in an e-mail response to a job posting the business placed on an employment website and allowed the attacker to obtain the online banking credentials of the person who was authorized to conduct financial transactions within the company. The malicious actor changed the account settings to allow the sending of wire transfers, one to the Ukraine and two to domestic accounts. The malware was identified as a Bredolab variant, svrwsc.exe. This malware was connected to the ZeuS/Zbot Trojan,<br />
which is commonly used by cyber criminals to defraud US businesses.<br />
<br />
The FBI recommends that potential employers remain vigilant in opening the e-mails of perspective employees. Running a virus scan prior to opening any e-mail attachments may provide an added layer of security against this type of attack. The FBI also recommends that businesses use separate computer systems to conduct financial transactions.<br />
<br />
For more information on this type of fraud and prevention tips, please refer to previous Public Service Announcements by clicking the links below:<br />
<br />
* http://www.ic3.gov/media/2010/CorporateAccountTakeOver.pdf<br />
* http://www.ic3.gov/media/2010/WorkAtHome.pdf<br />
* http://www.ic3.gov/media/2009/091103.aspx<br />
<br />
Anyone who believes they have been a target this type of attack should immediately contact their financial institutions and local FBI office, and promptly report it to the IC3's website at www.IC3.gov. The IC3's complaint database links complaints together to refer them to the appropriate law<br />
enforcement agency for case consideration. The IC3 also uses complaint information to identify emerging trends and patterns.<br />
<br />
<span style="font-size: x-small;"><i>Source: IC3 </i></span><br />
<br />
-----<br />
Community News You Can Use<br />
Click to read MORE news:<br />
<a href="http://www.georgiafrontpage.com/">www.GeorgiaFrontPage.com</a><br />
Twitter: @gafrontpage & @TheGATable @HookedonHistory<br />
<a href="http://www.artsacrossgeorgia.com/">www.ArtsAcrossGeorgia.com</a><br />
Twitter: @artsacrossga, @softnblue, @RimbomboAAG @FayetteFPGeorgia Front Page.comhttp://www.blogger.com/profile/18248749393644673382noreply@blogger.com0tag:blogger.com,1999:blog-882865554256209100.post-17637638180789824312011-01-20T09:55:00.000-05:002011-01-20T09:55:21.846-05:00Clayton State to Host Google Interactive WorkshopFor the first time, Google is coming to Georgia. <br />
<br />
Although Georgia (and Georgians) may well be used to going to Google, here's the first chance to learn how Google tools can help small businesses, without leaving the state. In partnership with the Georgia Small Business Development Center and the Clayton State University School of Business, Google will be bringing a three-hour interactive workshop to Clayton State on Wednesday, Feb. 2. The workshop will run from 4 p.m. to 7 p.m. in the ballroom of the Clayton State Student Activity Center <br />
<br />
In this workshop, participants will be shown how Google tools can help reach more customers, understand what customers are searching for, and operate more efficiently. <br />
<br />
“We are delighted that we have this opportunity to partner with Google, one of America’s most technologically innovative companies,” says Dr. Alphonso Ogbuehi, dean of the Clayton State School of Business. <br />
<br />
The workshop will cover online marketing best practices, including how to: <br />
<br />
• Claim your business on Google Maps and create a Google Place Page; <br />
• Reach the right audience using Google AdWords and boost your ad performance by choosing the right keywords and writing compelling ads; <br />
• Use Google Analytics to track online traffic and optimize your website. <br />
<br />
Receive half off each additional person with the purchase of the Google Interactive Workshop at full price, $49. All registrations must be made at the same time in order to receive discount. This discount can not be combined or used with any other discount or coupon. For more information, please call (678) 466-5100 or email <a href="mailto:morrow@georgiasbdc.org">morrow@georgiasbdc.org</a>. <br />
<br />
Space is limited, so interested parties are urged to sign up soon for this dynamic opportunity. <br />
<br />
A unit of the University System of Georgia, Clayton State University is an outstanding comprehensive metropolitan university located 15 miles southeast of downtown Atlanta.<br />
---<br />
Community News You Can Use<br />
Click to read MORE news:<br />
<a href="http://www.georgiafrontpage.com/">www.GeorgiaFrontPage.com</a><br />
Twitter: @gafrontpage & @TheGATable @HookedonHistory<br />
<a href="http://www.artsacrossgeorgia.com/">www.ArtsAcrossGeorgia.com</a><br />
Twitter: @artsacrossga, @softnblue, @RimbomboAAG<br />
Facebook: <a href="http://facebook.com/ArtsAcrossGA">http://facebook.com/ArtsAcrossGA</a><br />
<a href="http://www.fayettefrontpage.com/">www.FayetteFrontPage.com</a><br />
Twitter: @FayetteFPGeorgia Front Page.comhttp://www.blogger.com/profile/18248749393644673382noreply@blogger.com0tag:blogger.com,1999:blog-882865554256209100.post-28898549626182690452011-01-12T12:17:00.000-05:002011-01-12T12:17:48.463-05:00AMBER Alert Program Expands to Facebook/PRNewswire/ -- Life-saving AMBER Alerts are now available to the millions of people on the social networking service Facebook. Effective today, Facebook users are able to sign up to receive AMBER Alert bulletins for their state which will be sent to them through the Facebook "News Feed" feature. A total of 53 new AMBER Alert Pages have been created, one for each state, Puerto Rico, U.S. Virgin Islands and the District of Columbia. Facebook users will also be able to share the AMBER Alerts with their friends. <br />
<br />
There are more than half a billion users of Facebook. The new Facebook AMBER Alert pages represent an important expansion of the national AMBER Alert program. <br />
<br />
"Everyone at Facebook feels a responsibility to help protect children and, as a former federal prosecutor and a father of two, I am particularly proud that we are now part of the AMBER Alert program," said Chris Sonderby, Facebook Lead Security and Investigations Counsel. "Our hearts go out to the families of the missing and our gratitude goes to the officers, volunteers, and other AMBER Alert partners who work tirelessly to bring them home. We are hopeful that today's announcement offers these dedicated officials another useful tool to find and safely recover abducted children." <br />
<br />
Information about the new initiative was announced today by Facebook, the U.S. Department of Justice and the National Center for Missing & Exploited Children (NCMEC). The announcement was made the day before the 15th anniversary of the abduction and murder of 9-year-old Amber Hagerman, namesake of the national AMBER Alert Program. <br />
<br />
"As the National AMBER Alert Coordinator, I am pleased to see the growth of the program's national network. I would like to thank NCMEC and Facebook for working together to develop another way the public can join with us to bring home missing and abducted children. We each can play our part by being aware and responsive to AMBER Alert postings that we will now see on Facebook," said Laurie O. Robinson, Assistant Attorney General, Office of Justice Programs. <br />
<br />
An estimated 800,000 children are reported missing every year. AMBER Alert is a voluntary partnership involving law-enforcement agencies and broadcasters. An urgent AMBER Alert bulletin is issued by law enforcement in the most serious child-abduction cases that meet specific criteria. The goal of an AMBER Alert is to instantly galvanize the entire community to assist in the search for and safe recovery of the child.<br />
<br />
"Average people doing average things but paying attention are saving lives and reuniting families," said Ernie Allen, President of NCMEC. "With more than 500 million Facebook users this bold initiative will help us mobilize many more people and bring more missing children home."<br />
<br />
All Amber Alerts on Facebook press materials can be found at http://scr.bi/fbAMBER. The Facebook Amber Alert page is http://on.fb.me/AMBERalertFB.<br />
<br />
-----<br />
Community News You Can Use<br />
Click to read MORE news:<br />
<a href="http://www.georgiafrontpage.com/">www.GeorgiaFrontPage.com</a><br />
Twitter: @gafrontpage & @TheGATable @HookedonHistory<br />
<a href="http://www.artsacrossgeorgia.com/">www.ArtsAcrossGeorgia.com</a><br />
Twitter: @artsacrossga, @softnblue, @RimbomboAAG @FayetteFPGeorgia Front Page.comhttp://www.blogger.com/profile/18248749393644673382noreply@blogger.com0tag:blogger.com,1999:blog-882865554256209100.post-84336758110445808072011-01-11T08:14:00.000-05:002011-01-11T08:14:13.649-05:00Stuttering Therapy App Launches After a Year of Clinical Testing/PRNewswire/ -- Following a year of clinical trials, Hollins Communications Research Institute (HCRI – www.stuttering.org), a non-profit center for stuttering research and treatment, has introduced a sophisticated stuttering therapy application that runs on iPhones, iPads, and iPod Touch devices. Featuring proprietary voice monitoring technology, the app serves as a fluency training and home-practice tool for HCRI therapy program participants. <br />
<br />
The new app evaluates, scores, and provides immediate feedback on physical speech behaviors taught during HCRI's 12-day stuttering treatment program. During the program, participants learn how to replace faulty muscle contractions that cause stuttering with new muscle behaviors that generate fluent speech. <br />
<br />
When therapy participants use the app in daily situations, such as a visit to a shopping mall or in a business setting, fluency measurements for each utterance are displayed in real time on the device screen. Having this data immediately available makes speech practice more effective and enhances long-term fluency outcomes. The net effect is that the user becomes more aware of what he or she is doing in order to become and remain a fluent speaker.<br />
<br />
In addition, the app records every speech sample as an on-board file for later transmission to HCRI. This information enables the Institute's therapists to provide more detailed and precise feedback to clients, as they learn to apply new speech skills in everyday situations.<br />
<br />
"We developed the stuttering therapy app to help program participants more easily transfer skills learned in the clinical setting to real world environments," said HCRI Founder and President Ronald L. Webster, Ph.D. "Along with being an excellent tool in the context of therapy, the app helps clients stay on track with their new fluency capabilities once they return home."<br />
<br />
During the testing period, the application was only used during HCRI therapy so it could be closely monitored for effectiveness, accuracy, and user appeal. With the release, program participants continue to use the app in therapy and also have it installed on their devices for home-practice purposes. Former HCRI therapy participants can get the iPhone/ iPad/ iPod Touch app by emailing app@stuttering.org for downloading times and instructions.<br />
<br />
-----<br />
Community News You Can Use<br />
Click to read MORE news:<br />
<a href="http://www.georgiafrontpage.com/">www.GeorgiaFrontPage.com</a><br />
Twitter: @gafrontpage & @TheGATable @HookedonHistory<br />
<a href="http://www.artsacrossgeorgia.com/">www.ArtsAcrossGeorgia.com</a><br />
Twitter: @artsacrossga, @softnblue, @RimbomboAAG @FayetteFPGeorgia Front Page.comhttp://www.blogger.com/profile/18248749393644673382noreply@blogger.com0tag:blogger.com,1999:blog-882865554256209100.post-59509195117330405672011-01-11T08:03:00.000-05:002011-01-11T08:03:58.616-05:00Christmas and Holiday Sales Were Attack Targets According to December Top 10 Malware List(BUSINESS WIRE)--GFI Software, a leading IT solutions provider for small and medium-sized enterprises, today revealed continuing high levels of Trojan and rogue malware circulating during December, with data revealing a surge in activity, boosted by themed activity around the Christmas and New Year holiday period. The top 10 data is compiled from monthly scans performed by GFI's award-winning anti-malware solution, VIPRE® Antivirus, and its antispyware tool, CounterSpy®, as a service of GFI Labs™.<br />
<br />
Users were targeted with a variety of infected email, web links and other delivery mechanisms promising festive information, discount offers, Christmas e-cards and free software. The month also saw the big movie release of the season, Disney’s TRON Legacy, targeted by a wide array of SEO poisoned links, unwanted installs and other malware fakery, while a spate of fake iTunes emails caught several people off-guard, resulting in users running afoul of a malicious script that took advantage of a known Java exploit. GFI researchers also uncovered an Amazon receipt generator scam aimed at fooling retailers into honoring fraudulent receipts during the busy holiday shopping season.<br />
<br />
December once again saw significant activity from Trojan threats, which continue to dominate the overall malware landscape. Seven of the top 10 malware detections were Trojans, with those seven accounting for almost 35% of all malware detections for the month. In addition to a range of Trojans, Worms also created major problems during December. Most significant was Worm.Win32.Downad.Gen (v), appearing at number seven in December's top 10, a detection for the Downadup worm, otherwise known as Conficker and Kido.<br />
<br />
Taking advantage of a vulnerability in Windows Server service which allows remote code execution when file sharing is enabled, the Worm spreads across networks as well as removable drives, taking advantage of weak administrator passwords along the way. It commonly turns off some system services and anti-malcode protection, exposing infected systems to additional infection from other malware.<br />
<br />
“Following on from the increased themed threat traffic we saw in November around Thanksgiving, Black Friday and Cyber Monday, criminals once again attempted to take advantage of Christmas and the holiday season with themed attacks designed to drive users towards infected sites and to trick them into opening infected email and executables. Themed attacks, along with themed SEO poisoning and fake application installs, are firmly established as a successful means for malware creators to distribute malcode and create disruption for organizations and families alike,” said Tom Kelchner, communications and research analyst for GFI Software.<br />
<br />
“December is a challenging month for computing security, with many businesses shut for a prolonged period and consumers at home for the holidays. Casual computer use rises and vigilance can drop, creating opportunities for malware infection that would otherwise not happen the rest of the year. The top 10 serves as a stark reminder that IT security should not be taken for granted at any time,” Kelchner added.<br />
<br />
The problem of fake software was highlighted by FraudTool.Win32.FakeVimes!delf (v), number nine on this month’s top 10. This is a heuristic detection for files associated with the FakeVimes family of rogue security products, illustrating the continued growth of fake and compromised security applications as a means to circulate and covertly install malware onto PCs.<br />
<br />
ThreatNet is GFI Lab’s monitoring system that retrieves real-time data from VIPRE installations. Statistics come from tens of thousands of machines running VIPRE.<br />
<br />
<table cellspacing="0" class="bwtablemarginb"><tbody>
<tr><td class="bwpadl0 bwnowrap bwpadr0 bwvertalignt bwalignl"><div class="bwcellpmargin"> <b>Top 10 detections for December</b> </div></td> <td> </td> <td> </td> <td> </td> <td> </td> <td> </td> <td> </td> <td> </td> <td> </td> <td> </td> <td> </td> <td> </td> <td> </td> <td> </td> <td> </td> <td> </td> <td> </td> <td> </td> <td> </td> <td> </td> </tr>
<tr> <td class="bwpadl0 bwvertalignt bwalignl"> <div class="bwcellpmargin"> <b>Detection</b> </div></td> <td> </td> <td> </td> <td> </td> <td class="bwpadl0 bwvertalignt bwalignl"> </td> <td> </td> <td> </td> <td> </td> <td class="bwpadl0 bwvertalignt bwalignl"> <div class="bwcellpmargin"> <b>Type</b> </div></td> <td> </td> <td> </td> <td> </td> <td class="bwpadl0 bwvertalignt bwalignl"> </td> <td> </td> <td> </td> <td> </td> <td class="bwpadl0 bwnowrap bwpadr0 bwvertalignt bwalignl"> <div class="bwcellpmargin"> <b>Percent</b> </div></td> <td> </td> <td> </td> <td> </td> </tr>
<tr> <td class="bwpadl0 bwvertalignt bwalignl"> Trojan.Win32.Generic!BT </td> <td> </td> <td> </td> <td> </td> <td class="bwpadl0 bwvertalignt bwalignl"> </td> <td> </td> <td> </td> <td> </td> <td class="bwpadl0 bwvertalignt bwalignl"> Trojan </td> <td> </td> <td> </td> <td> </td> <td class="bwpadl0 bwvertalignt bwalignl"> </td> <td> </td> <td> </td> <td> </td> <td class="bwpadl0 bwnowrap bwpadr0 bwvertalignb bwalignr"> 21.93 </td> <td> </td> <td> </td> <td> </td> </tr>
<tr> <td class="bwpadl0 bwvertalignt bwalignl"> Trojan-Spy.Win32.Zbot.gen </td> <td> </td> <td> </td> <td> </td> <td class="bwpadl0 bwvertalignt bwalignl"> </td> <td> </td> <td> </td> <td> </td> <td class="bwpadl0 bwvertalignt bwalignl"> Trojan </td> <td> </td> <td> </td> <td> </td> <td class="bwpadl0 bwvertalignt bwalignl"> </td> <td> </td> <td> </td> <td> </td> <td class="bwpadl0 bwnowrap bwpadr0 bwvertalignb bwalignr"> 3.79 </td> <td> </td> <td> </td> <td> </td> </tr>
<tr> <td class="bwpadl0 bwvertalignt bwalignl"> Trojan.Win32.Generic.pak!cobra </td> <td> </td> <td> </td> <td> </td> <td class="bwpadl0 bwvertalignt bwalignl"> </td> <td> </td> <td> </td> <td> </td> <td class="bwpadl0 bwvertalignt bwalignl"> Trojan </td> <td> </td> <td> </td> <td> </td> <td class="bwpadl0 bwvertalignt bwalignl"> </td> <td> </td> <td> </td> <td> </td> <td class="bwpadl0 bwnowrap bwpadr0 bwvertalignb bwalignr"> 3.14 </td> <td> </td> <td> </td> <td> </td> </tr>
<tr> <td class="bwpadl0 bwvertalignt bwalignl"> Trojan.Win32.Generic!SB.0 </td> <td> </td> <td> </td> <td> </td> <td class="bwpadl0 bwvertalignt bwalignl"> </td> <td> </td> <td> </td> <td> </td> <td class="bwpadl0 bwvertalignt bwalignl"> Trojan </td> <td> </td> <td> </td> <td> </td> <td class="bwpadl0 bwvertalignt bwalignl"> </td> <td> </td> <td> </td> <td> </td> <td class="bwpadl0 bwnowrap bwpadr0 bwvertalignb bwalignr"> 2.78 </td> <td> </td> <td> </td> <td> </td> </tr>
<tr> <td class="bwpadl0 bwvertalignt bwalignl"> Exploit.PDF-JS.Gen (v) </td> <td> </td> <td> </td> <td> </td> <td class="bwpadl0 bwvertalignt bwalignl"> </td> <td> </td> <td> </td> <td> </td> <td class="bwpadl0 bwvertalignt bwalignl"> PDF Exploit </td> <td> </td> <td> </td> <td> </td> <td class="bwpadl0 bwvertalignt bwalignl"> </td> <td> </td> <td> </td> <td> </td> <td class="bwpadl0 bwnowrap bwpadr0 bwvertalignb bwalignr"> 1.79 </td> <td> </td> <td> </td> <td> </td> </tr>
<tr> <td class="bwpadl0 bwvertalignt bwalignl"> INF.Autorun (v) </td> <td> </td> <td> </td> <td> </td> <td class="bwpadl0 bwvertalignt bwalignl"> </td> <td> </td> <td> </td> <td> </td> <td class="bwpadl0 bwvertalignt bwalignl"> Trojan </td> <td> </td> <td> </td> <td> </td> <td class="bwpadl0 bwvertalignt bwalignl"> </td> <td> </td> <td> </td> <td> </td> <td class="bwpadl0 bwnowrap bwpadr0 bwvertalignb bwalignr"> 1.63 </td> <td> </td> <td> </td> <td> </td> </tr>
<tr> <td class="bwpadl0 bwvertalignt bwalignl"> Worm.Win32.Downad.Gen (v) </td> <td> </td> <td> </td> <td> </td> <td class="bwpadl0 bwvertalignt bwalignl"> </td> <td> </td> <td> </td> <td> </td> <td class="bwpadl0 bwvertalignt bwalignl"> Worm </td> <td> </td> <td> </td> <td> </td> <td class="bwpadl0 bwvertalignt bwalignl"> </td> <td> </td> <td> </td> <td> </td> <td class="bwpadl0 bwnowrap bwpadr0 bwvertalignb bwalignr"> 1.27 </td> <td> </td> <td> </td> <td> </td> </tr>
<tr> <td class="bwpadl0 bwvertalignt bwalignl"> Trojan.ASF.Wimad (v) </td> <td> </td> <td> </td> <td> </td> <td class="bwpadl0 bwvertalignt bwalignl"> </td> <td> </td> <td> </td> <td> </td> <td class="bwpadl0 bwvertalignt bwalignl"> Trojan </td> <td> </td> <td> </td> <td> </td> <td class="bwpadl0 bwvertalignt bwalignl"> </td> <td> </td> <td> </td> <td> </td> <td class="bwpadl0 bwnowrap bwpadr0 bwvertalignb bwalignr"> 0.77 </td> <td> </td> <td> </td> <td> </td> </tr>
<tr> <td class="bwpadl0 bwnowrap bwpadr0 bwvertalignt bwalignl"> FraudTool.Win32.FakeVimes!delf (v) </td> <td> </td> <td> </td> <td> </td> <td class="bwpadl0 bwvertalignt bwalignl"> </td> <td> </td> <td> </td> <td> </td> <td class="bwpadl0 bwnowrap bwpadr0 bwvertalignt bwalignl"> Fake App 0.73 </td> <td> </td> <td> </td> <td> </td> <td> </td> <td> </td> <td> </td> <td> </td> <td> </td> <td> </td> <td> </td> <td> </td> </tr>
<tr> <td class="bwpadl0 bwvertalignt bwalignl"> Trojan.Win32.Meredrop </td> <td> </td> <td> </td> <td> </td> <td class="bwpadl0 bwvertalignt bwalignl"> </td> <td> </td> <td> </td> <td> </td> <td class="bwpadl0 bwvertalignt bwalignl"> Trojan </td> <td> </td> <td> </td> <td> </td> <td class="bwpadl0 bwvertalignt bwalignl"> </td> <td> </td> <td> </td> <td> </td> <td class="bwpadl0 bwnowrap bwpadr0 bwvertalignb bwalignr"> 0.72 </td> <td> </td></tr>
</tbody></table><br />
-----<br />
Community News You Can Use<br />
Click to read MORE news:<br />
<a href="http://www.georgiafrontpage.com/">www.GeorgiaFrontPage.com</a><br />
Twitter: @gafrontpage & @TheGATable @HookedonHistory<br />
<a href="http://www.artsacrossgeorgia.com/">www.ArtsAcrossGeorgia.com</a><br />
Twitter: @artsacrossga, @softnblue, @RimbomboAAG @FayetteFPGeorgia Front Page.comhttp://www.blogger.com/profile/18248749393644673382noreply@blogger.com0tag:blogger.com,1999:blog-882865554256209100.post-32888277303915224022011-01-01T17:38:00.000-05:002011-01-01T17:38:15.091-05:00Tech support sucksI tried to come up with a better title, one that didn't sound so... so... crude. But there's just no two ways about it, tech support sucks these days.<br />
<br />
I've been with a hosting company for well over 12 years and have had as many as 30 sites with them at times. They've been gobbled up a couple of times and now I'm dealing with the newest incarnation. They outsource their tech support to India, like many, many others. I know the on-hold music and know which tunes mean I'll be speaking to Sam or Frank in India or Susan in the good-ol-USA. I tried hanging up repeatedly until I got the 'right' music but soon learned that doesn't work.<br />
<br />
A few days ago I called and asked for a simple website change. I've done it with them before, it wasn't a problem back in the days when I talked with someone state-side. This time I wasn't talking to Susan or Sandy, I was talking to someone across the ocean. It turned into a complete fiasco. It's still spiraling and tumbling.<br />
<br />
First we had the communication problem. I'd say what I wanted, Sam would say he understood, would repeat it back and have it backwards. I'd say no, and try to explain in a different way. He'd say he understood with some frustration, repeat it back and have it wrong. It's a dance that aggravated both of us. It's one that made a 30-second sentence into a 15-minute ordeal.<br />
<br />
Needless to say, he never understood and they totally screwed everything up. My site was down for two days. They opened the ticket, then would say they fixed it, close the ticket... I'd call and want to know why they closed the ticket since the site was still down... we didn't dance, we politely battled. I know well enough to know that if I show my anger they get snippy and punish me somehow.<br />
<br />
We finally got it resolved after 7 (seven) different phone calls and multiple ticket re-openings. THEN, I got up this morning and the other site that was involved, which was working when I went to bed last night was down.<br />
<br />
I made an 8:30 call, was promised it would be up within four hours. I knew better but hoped for the best. 5 p.m. and the site's still down. Called again. Now they're doing something which will take up to 24-hours to fix.<br />
<br />
One site is working, one isn't.<br />
<br />
I'm looking for a new hosting company. The problem I think I'm going to run into is that I have a pretty good monetary deal with these guys. I could switch to Go Daddy, but I've heard their tech support isn't any better.<br />
<br />
I really don't expect miracles from tech support. I used to work as a liaison between tech support, back end coders and the end users. I have a pretty good grasp of all the problems that can arise. However, if you're not able to communicate it really doesn't matter whether a problem is simple, it can explode into craziness, like my simple request seems to have done.<br />
<br />
I'm one of a million, zillion, who gripe about tech support being outsourced to other countries. I can understand why it's done, especially with hosting which really is a fairly simple thing to deal with. I guess since 'everyone' is now doing it we, the end users, are stuck. Where do we go when everyone is outsourcing to the same place?<br />
<br />
Now, my final questions... I want to know how they ended up moving my domain registration to another company that I've never heard of... and how come they took the site down and then said they couldn't do anything about it as it must be something to do with the software I use to build my sites... and how they managed to get a band of words at the top of my down site that they say they didn't do and I know I didn't do... and... and...<br />
<br />
Oh, um, happy new year to everyone except my hosting company and their tech support staff.Georgia Front Page.comhttp://www.blogger.com/profile/18248749393644673382noreply@blogger.com0tag:blogger.com,1999:blog-882865554256209100.post-69245824132585485192010-12-27T14:15:00.000-05:002010-12-27T14:15:30.927-05:00Bible.is Hits One Million Mark in Matter of Months/PRNewswire/ -- Bible.is, the audio-based Bible app created by Faith Comes By Hearing, has reached one million downloads in just 5 months. Faith Comes By Hearing has established its Bible.is app as an expression of their Digital Bible Project (DBP). The DBP is a platform like none other in the world, combining the latest technology with the world's largest digital library of both Bible text and audio recordings.<br />
<br />
The free app is offered on iPhone, iPad, iPod Touch and Android devices. It is marked by its unique combination of text and audio as well as the large number of languages offered to listeners, with more being added regularly.<br />
<br />
The ministry reports that people from 166 countries have engaged in God's Word through Bible.is, with a remarkable average listening time of 36 minutes per person.<br />
<br />
"I am new to the whole 'techy' thing," wrote a Bible.is mobile app user, "But, I love that you can read and listen at the same time. You can have your very own Bible study anytime, anywhere."<br />
<br />
Another user commented, "It is almost impossible to find an Audio Bible app for Mandarin! Praise the Lord He brought this app to me."<br />
<br />
Clearly the streaming audio, available in numerous languages, is a distinction that sets Bible.is apart – which is by design. Providing audio keeps with Faith Comes By Hearing's mission to record Audio Bibles for every nation, tribe, language and people.<br />
<br />
"While the Bible.is apps are great at home, in church and on-the-go, we really see them as a part of a larger strategy to fulfill the Great Commission," said Troy Carl, the ministry's national director and architect of the DBP. "We are excited by this rapid growth, and especially the worldwide reach this technology has produced."<br />
<br />
The ministry is optimistic that this rapid start will only increase as the app is localized into other languages. Localization refers to the language used when downloading and navigating within the app. Until recently, that language was English. However, the ministry has just released a Spanish version and other major language adaptations are currently under way.<br />
<br />
The ministry believes this technology will eventually allow every people group to listen to God's Word in their own language.<br />
<br />
Currently, the ministry has Scripture recordings in 500 languages, with a goal of 2,000 by 2016.<br />
<br />
-----<br />
Community News You Can Use<br />
Click to read MORE news:<br />
<a href="http://www.georgiafrontpage.com/">www.GeorgiaFrontPage.com</a><br />
Twitter: @gafrontpage & @TheGATable @HookedonHistory<br />
<a href="http://www.artsacrossgeorgia.com/">www.ArtsAcrossGeorgia.com</a><br />
Twitter: @artsacrossga, @softnblue, @RimbomboAAG<br />
<a href="http://www.fayettefrontpage.com/">www.FayetteFrontPage.com</a><br />
Twitter: @FayetteFPGeorgia Front Page.comhttp://www.blogger.com/profile/18248749393644673382noreply@blogger.com0tag:blogger.com,1999:blog-882865554256209100.post-48980699329830783872010-12-20T08:13:00.000-05:002010-12-20T08:13:26.403-05:00U.N., FCC intensify efforts to regulate electronic speech<i>by Jerome Coursi</i><br />
<i>(c) 2010 RedAlert.WND.com</i><i> </i><br />
<i>-used with permission</i><br />
<br />
The United Nations is now joining Obama administration and Democratic commissioners on the FCC in an attempt to regulate the Internet.<br />
<br />
The U.N. is reacting to concerns of member governments, including the United States, that the Internet has made companies like WikiLeaks possible, while the FCC is more concerned about conservative news outlets on the Internet that are increasingly undermining government attempts to control the news through sympathetic mainstream media outlets.<br />
<br />
What is at stake is the future of electronic free-speech rights, as governments around the world realize how much less control government authorities have with a robust and critical press able to operate freely on the Internet.<br />
<br />
U.N. efforts to regulate Internet<br />
<br />
Last week, itNews.com in Australia, reported that the U.N. is considering whether to set up an inter-governmental working group to "harmonize" global efforts by policymakers to regulate the Internet.<br />
<br />
The U.N. claims authority to regulate the Internet under a U.N. Economic and Social Council resolution passed in July that invited the U.N. secretary-general to begin discussions on coordinating government efforts to regulate the Internet on a global basis.<br />
<br />
Obviously, the U.N. is uncomfortable with anything like the Internet that the globalists cannot control.<br />
<br />
FCC moves to regulate the Internet<br />
<br />
The FCC is preparing in its Dec. 21 meeting this week to vote on a proposal called "net neutrality."<br />
<br />
The Obama administration likes to portray the proposed 85 pages of "net neutrality" rules as a way to ensure no user will be shut out of Internet access because of the user's content.<br />
<br />
In other words, under the leadership of Chairman Julius Genachowski, an Obama administration Democrat, the FCC plans to use free expression arguments to set up a structure where the FCC would be the ultimate arbiter of who gets broadband Internet access and who does not.<br />
<br />
In proceeding to regulate the Internet, the FCC, under Genachowski's direction, is choosing to ignore a unanimous ruling of the U.S. Court of Appeals for the District of Columbia Circuit last April that ruled the FCC lacked the authority to regulate the Internet.<br />
<br />
Congress seeks to block FCC on net neutrality rules<br />
<br />
Last week, Sen. Kay Bailey Hutchison, R-Texas, the ranking member of the Senate Commerce, Science and Transportation Committee, filed an amendment to an appropriations bill aimed at blocking the FCC from adopting net neutrality, the Washington Post reported.<br />
<br />
Hutchison's amendment would stop the FCC from using public money to implement any rule that would regulate Internet traffic, according to Reuters.<br />
<br />
Republicans are concerned that the FCC's net neutrality proposal is an attempt to get the FCC's foot in the door to wide-ranging government control, extending over not just Internet operating procedures, but ultimately over Internet content.<br />
<br />
Incoming House Commerce Chairman Fred Upton, R-Mich., along with Communications Chairman Greg Waldren, R-Or., and Vice Communications Chairman Lee Terry, R-Neb., wrote to the FCC last week with their concerns that the FCC has not been transparent about its effort to regulate the Internet, the Hill reported.<br />
<br />
They demanded Genachowski release all 85 pages of his net neutrality proposal before the FCC votes on the rules this week.<br />
<br />
On Wednesday, a group of 29 Republican senators wrote their own letter to Genachowski, warning him that if the FCC goes ahead to vote net neutrality, they will actively work to repeal the rules in the next Congress, according to the Daily Caller.<br />
<br />
"You and the Commission's general counsel have admitted in published statements that the legal justification for imposing these new regulations is questionable and has 'serious risk of failure in court,'" the letter said.<br />
<br />
The letter went on to stress that Congress has not granted the FCC the specific statutory authority to regulate the Internet, stating, "Whether and how the Internet should be regulated is something that America's elected representatives in Congress, not the Commission, should determine."<br />
<br />
ABOUT THE AUTHOR: Jerome R. Corsi received a Ph.D. from Harvard University in political science in 1972. He is the author of the #1 New York Times bestselling books THE OBAMA NATION: LEFTIST POLITICS AND THE CULT OF PERSONALITY and the co-author of UNFIT FOR COMMAND: SWIFT BOAT VETERANS SPEAK OUT AGAINST JOHN KERRY. He is also the author of AMERICA FOR SALE, THE LATE GREAT U.S.A., and WHY ISRAEL CAN'T WAIT. Currently, Dr. Corsi is a Senior Managing Director in the Financial Services Group at Gilford Securities as well as a senior staff writer for WorldNetDaily.com.Georgia Front Page.comhttp://www.blogger.com/profile/18248749393644673382noreply@blogger.com0tag:blogger.com,1999:blog-882865554256209100.post-24285039928004498212010-12-17T14:59:00.000-05:002010-12-17T14:59:26.082-05:00Keep Your Phone Working and Your Connection Warm in the Cold Outdoors: Tips From Verizon Wireless/PRNewswire/ -- With wintry weather making an early and frigid debut across the nation, Verizon Wireless, owner and operator of the nation's largest and most reliable 3G network, offers the following tips to help consumers use their wireless phones when it's cold outside:<br />
<br />
* Keep your phone fully charged. Cold temperatures can run down the phone's battery charge more quickly. Use a car charger to keep the phone's charge if you get stranded or stuck in traffic on icy or snowy roads. Think about an extra battery as backup.<br />
* Handle your phone with care. The display screen can become brittle when exposed to cold temperatures for long periods of time.<br />
* Keep your phone in a warm place; avoid leaving it in an outside pocket or backpack or in the car overnight. When outside in the cold weather, carry your phone in an inside jacket pocket, keeping it close to your body for warmth.<br />
* Remember you can't dial or access the keyboard on a touch screen with gloves, so consider adding finger flip gloves to your winter holiday wish list.<br />
* Download free winter apps to your phone from Android Market™ such as:<br />
o Winter Weather Outlooks – Allows you access to the National Weather Service Winter Weather Outlooks, so you'll know what kind of winter weather is headed your way.<br />
o How Cold Is It? – A wallpaper that changes color depending on the outside temperature – deep red when it's hot and icy white when it's freezing.<br />
o ShoppeHUB – This app allows you to make secure purchases on cold weather gear, including winter clothing. <br />
o Coffee Recipes – Choose from more than 90 easy coffee recipes that will be sure to keep you warm.<br />
<br />
-----<br />
Community News You Can Use<br />
Click to read MORE news:<br />
<a href="http://www.georgiafrontpage.com/">www.GeorgiaFrontPage.com</a><br />
Twitter: @gafrontpage & @TheGATable @HookedonHistory<br />
<a href="http://www.artsacrossgeorgia.com/">www.ArtsAcrossGeorgia.com</a><br />
Twitter: @artsacrossga, @softnblue, @RimbomboAAG<br />
<a href="http://www.fayettefrontpage.com/">www.FayetteFrontPage.com</a><br />
Twitter: @FayetteFPGeorgia Front Page.comhttp://www.blogger.com/profile/18248749393644673382noreply@blogger.com0tag:blogger.com,1999:blog-882865554256209100.post-73630438836522114722010-12-16T10:07:00.000-05:002010-12-16T10:07:22.898-05:0016-year old Launches Top 25 iPhone App/PRNewswire/ -- In the style of Bill Gates and Mark Zuckerberg, 16-year old computer whiz kid William LeGate takes the Apple App Store by storm. With the launch of a new free App for iPhone through his company Imagination Research Labs, LeGates' Game Giveaway enjoyed overnight success. Each day Game Giveaway gives away a high quality paid game for free. Game Giveaway allows users to download a paid game for free everyday and developers to promote their games.<br />
<br />
With over 300,000 game applications available for iPhone users, Game Giveaway gained instant popularity in just weeks on the market. With 100,000 downloads of Game Giveaway in just 24 hours, the App quickly rose to number two on the Top 25 Free iPhone applications with a 4.5 out of 5 star rating. <br />
<br />
The first game promoted by Game Giveaway, Paper Ninja soared to number one in the App store creating a whirlwind of enthusiasm for game developers to promote their games through the App. <br />
<br />
"It's basically a Groupon for the mobile gaming environment except that it's completely free," said developer William LeGate. <br />
<br />
Game Giveaway provides a high quality game for free each day to users of the free Game Giveaway iPhone App. For 24-hours the Giveaway of the Day is available for users to download and keep forever.<br />
<br />
-----<br />
Community News You Can Use<br />
Click to read MORE news:<br />
<a href="http://www.georgiafrontpage.com/">www.GeorgiaFrontPage.com</a><br />
Twitter: @gafrontpage & @TheGATable @HookedonHistory<br />
<a href="http://www.artsacrossgeorgia.com/">www.ArtsAcrossGeorgia.com</a><br />
Twitter: @artsacrossga, @softnblue, @RimbomboAAG<br />
<a href="http://www.fayettefrontpage.com/">www.FayetteFrontPage.com</a><br />
Twitter: @FayetteFPGeorgia Front Page.comhttp://www.blogger.com/profile/18248749393644673382noreply@blogger.com0tag:blogger.com,1999:blog-882865554256209100.post-91932893875211765172010-12-14T14:40:00.000-05:002010-12-14T14:40:50.046-05:00YouTube Becomes 'National Security Issue'<i>Conducting interviews on this topic is the news editor of WND.com, the largest independent Internet news service in the U.S., Bob Unruh.<br />
<br />
Forum called 'leading website' for online jihad</i><br />
<br />
By Bob Unruh<br />
(c) 2010 WorldNetDaily<br />
<br />
A new report from the Middle East Media Research Institute charges that YouTube has emerged as "the leading website for online jihad," replacing and surpassing even websites that the jihadists themselves are running.<br />
<br />
The in-depth report, with dozens of examples, links and illustrations, documents that MEMRI already has briefed members of the U.S. government and Congress on the issue, and has offered its expertise to YouTube directly to identify videos that "incite violence and terrorist acts for possible removal.'<br />
<br />
The report by Steven Stalinsky, the executive director of MEMRI, a donor-supported organization that monitors and reports on media issues from the Middle East, calls the use of the video-sharing service by terrorists worldwide "a grave national security issue."<br />
<br />
The report was published only days ago, but is part of a series of analyses of the issue that MEMRI has been documenting for some time. And in fact the LA Times reported just yesterday that YouTube has created a new option that users now can flag a video for removal because of its promotion of terrorism.<br />
<br />
Sen. Joe Lieberman, the Independent senator from Connecticut, called the protocol a "good first step toward scrubbing mainstream Internet sites of terrorist propaganda," according to the Times.<br />
<br />
It was several weeks ago when YouTube banished from its servers videos - numbering in the hundreds - that featured the American-turned-fugitive Anwar al-Awlawki. His videos, however, still can be fouind on the site.<br />
<br />
YouTube officials did not comment when WND asked for confirmation that the investigation produced its policy change, but they told the Times that they are committed to making sure the site isn't used to spread "terrorist propaganda or incite violence."<br />
<br />
MEMRI said it has investigated thoroughly the issues of YouTube, especially relating to al-Awlaki, and in fact, has reported on the videos he posted, those who watched them, the YouTube work of the Taliban as well as the expanding jihadi base committed to using YouTube.<br />
<br />
The newest chapter documents the posting of videos of American soldiers being killed by improvised explosive devices and snipers in Afghanistan and Iraq.<br />
<br />
"While YouTube should be applauded for adding new staff and a new function to identify and remove jihadi videos, this is only a beginning," MEMRI reported. "The removal of content is one part of the problem; the other part is keeping these videos from being posted in the first place - as shown by the recent removal of hundreds of Anwar al-Awlaki videos that were quickly reposted to other pages.<br />
<br />
"It is no exaggeration to say that hundreds of thousands of assorted jihadi videos can be found on YouTube They include sermons by terrorist leaders, training videos by terrorists, footage of terrorist attacks, songs (nasheeds) to inspire terrorists, and much more. These videos are not only in English, but in dozens of other languages."<br />
<br />
The report said the YouTube action followed the reporting that over the last few months, "numerous followers of Anwar al-Awlkai have been found guilty of involvement in terrorism. They all have one thing in common - they were incited by viewing him on YouTube."<br />
<br />
Cited as an example was a video from "WachdogofAllah1" who posted a message on Nov. 4, warning of looming violence in Iraq, Egypt and "other countries."<br />
<br />
"You have among us hundreds of thousands of followers, and hundreds of churches," the video warned, "and they will all be our targets if you do not respond."<br />
<br />
Another video, the report said, praised Nidal Hassan, accused of killing more than a dozen at Fort Hood in Texas, as "a wonderful example."<br />
<br />
MEMRI said among those who have been inspired to jihad by YouTube videos, had have subsequently been arrested, include:<br />
<br />
* Zachary Adam Chesser, 02, from Virginia, who was arrested in July 2010 attempting to carry out jihad with al-Qaida in Somalia.<br />
<br />
* Abdel Hameed Shehadeh, 21, who was arrested in Hawaii on October 21, 2010, for making false statements in a terrorism case.<br />
<br />
* Paul and Nadia Rockwood, Alaska, a converted couple who pleaded guilty in July 2010 after being accused of creating a hit list of local media, religious officials, and military who "desecrated Islam."<br />
<br />
* Mahmood Alessa and Carlos Eduardo Almonte, New Jersey, arrested in June 2010 en route to join al-Qaida forces in Somalia, hoping to kill U.S. troops.<br />
<br />
"Al-Qaida and its affiliates use YouTube to spread propaganda online and to train followers for various actions," the report said. "Most jihadi websites now post links of major terrorist videos directly to YouTube."<br />
<br />
Further, the jihadi-promoting videos include disturbing images of U.S. soldiers being killed in IED attacks as well as U.S. soldiers being shot and images of a decapitated soldier.<br />
<br />
One YouTube Channel is marked "mujahidRPG's Channel" and features video after video after video of coalition vehicles disappearing into a a flash of flame and black smoke.<br />
<br />
"In addition to clips of jihad against the West and the Jews, YouTube also has clips by Islamist groups calling for jihad against Christians. In one recent example, dated November 4, 2010, YouTube user 'WachdogofAllah1' posted a 'message from the soldier of the martyr battalion to the Christians in Egypt,'" the report said. <br />
---<br />
Community News You Can Use<br />
Click to read MORE news:<br />
www.GeorgiaFrontPage.com<br />
Twitter: @gafrontpage & @TheGATable @HookedonHistory<br />
www.ArtsAcrossGeorgia.com<br />
Twitter: @artsacrossga, @softnblue, @RimbomboAAG<br />
Facebook: http://facebook.com/ArtsAcrossGA<br />
www.FayetteFrontPage.com<br />
Twitter: @FayetteFPGeorgia Front Page.comhttp://www.blogger.com/profile/18248749393644673382noreply@blogger.com0tag:blogger.com,1999:blog-882865554256209100.post-7940256822041851782010-12-09T09:34:00.000-05:002010-12-09T09:34:22.080-05:00GFI Software Announces Top 10 Malware Threats for November(BUSINESS WIRE)--GFI Software, a leading IT solutions provider for small and medium-sized enterprises, today announced the top 10 most prevalent malware threats for the month of November 2010. The report, compiled from monthly scans performed by GFI's award-winning anti-malware solution, VIPRE® Antivirus, and its antispyware tool, CounterSpy®, is a service of GFI Labs™.<br />
<br />
As in recent months, Trojans dominated the threat landscape in November. ThreatNet data revealed that seven of the top 10 malware threats were classified as Trojans. The number-one detection, Trojan.Win32.Generic!BT, is a Trojan comprising over 20 percent of the ThreatNet detections.<br />
<br />
Tom Kelchner, GFI Software communications and research analyst said, “There is another picture in the top-10 numbers. Three of them go after applications or server software that hasn’t been patched. The number six detection, Exploit.PDF-JS.Gen (v), tries to exploit a security flaw in PDF files with embedded JavaScript. That’s aiming at Adobe products. It often installs downloaders that pull down other malware from remote Web sites.”<br />
<br />
Worm.Win32.Downad.Gen (v,) the Downadup worm (also called Conficker and Kido) in the number seven spot, is a worm that spreads across a network by taking advantage of a vulnerability in Windows Server service which allows remote code execution when file sharing is enabled. This vulnerability was patched some time ago.<br />
<br />
Trojan.ASF.Wimad (v), in the number nine spot, is a VIPRE detection for a group of Trojanized Windows media files that exploit an old vulnerability in Windows Media Player. It redirects the victim’s browser to a web site to download malicious files. This is also is an old vulnerability that’s been fixed.<br />
<br />
“If this malcode is still circulating, it means that the malcode writers are seeing a landscape with lots of unpatched and vulnerable machines. The conclusion is pretty clear for both enterprises and consumers: update Windows operating systems (including servers), browsers, Adobe products and media players and keep them updated,” said Kelchner.<br />
<br />
ThreatNet is GFI Lab’s monitoring system that retrieves real-time data from VIPRE installations. Statistics come from tens of thousands of machines running VIPRE.<br />
<br />
<table cellspacing="0" class="bwtablemarginb"><tbody>
<tr><td class="bwpadl0 bwvertalignt bwalignl" colspan="7"><div class="bwcellpmargin"> <b>Top 10 detections for November</b> </div></td> </tr>
<tr> <td class="bwpadl0 bwvertalignt bwalignl" colspan="3"> <div class="bwcellpmargin"> <b>Detection</b> </div></td> <td> </td> <td class="bwpadl0 bwvertalignt bwalignl"> <div class="bwcellpmargin"> <b>Type</b> </div></td> <td> </td> <td class="bwpadl0 bwvertalignt bwalignl"> <div class="bwcellpmargin"> <b>Percent</b> </div></td> </tr>
<tr> <td> </td> <td> </td> <td> </td> <td> </td> <td> </td> <td> </td> <td> </td> </tr>
<tr> <td class="bwpadl0 bwnowrap bwpadr0 bwvertalignb bwalignl"> 1. </td> <td> </td> <td class="bwpadl0 bwvertalignt bwalignl"> Trojan.Win32.Generic!BT </td> <td> </td> <td class="bwpadl0 bwvertalignt bwalignl"> Trojan </td> <td> </td> <td class="bwpadl0 bwnowrap bwpadr0 bwvertalignb bwalignl"> 22.44 </td> </tr>
<tr> <td class="bwpadl0 bwnowrap bwpadr0 bwvertalignb bwalignl"> 2. </td> <td> </td> <td class="bwpadl0 bwvertalignt bwalignl"> Trojan-Spy.Win32.Zbot.gen </td> <td> </td> <td class="bwpadl0 bwvertalignt bwalignl"> Trojan </td> <td> </td> <td class="bwpadl0 bwnowrap bwpadr0 bwvertalignb bwalignl"> 3.88 </td> </tr>
<tr> <td class="bwpadl0 bwnowrap bwpadr0 bwvertalignb bwalignl"> 3. </td> <td> </td> <td class="bwpadl0 bwvertalignt bwalignl"> Trojan.Win32.Generic.pak!cobra </td> <td> </td> <td class="bwpadl0 bwvertalignt bwalignl"> Trojan </td> <td> </td> <td class="bwpadl0 bwnowrap bwpadr0 bwvertalignb bwalignl"> 3.53 </td> </tr>
<tr> <td class="bwpadl0 bwnowrap bwpadr0 bwvertalignb bwalignl"> 4. </td> <td> </td> <td class="bwpadl0 bwvertalignt bwalignl"> Trojan.Win32.Generic!SB.0 </td> <td> </td> <td class="bwpadl0 bwvertalignt bwalignl"> Trojan </td> <td> </td> <td class="bwpadl0 bwnowrap bwpadr0 bwvertalignb bwalignl"> 3.46 </td> </tr>
<tr> <td class="bwpadl0 bwnowrap bwpadr0 bwvertalignb bwalignl"> 5. </td> <td> </td> <td class="bwpadl0 bwvertalignt bwalignl"> INF.Autorun (v) </td> <td> </td> <td class="bwpadl0 bwvertalignt bwalignl"> Trojan </td> <td> </td> <td class="bwpadl0 bwnowrap bwpadr0 bwvertalignb bwalignl"> 1.83 </td> </tr>
<tr> <td class="bwpadl0 bwnowrap bwpadr0 bwvertalignb bwalignl"> 6. </td> <td> </td> <td class="bwpadl0 bwvertalignt bwalignl"> Exploit.PDF-JS.Gen (v) </td> <td> </td> <td class="bwpadl0 bwvertalignt bwalignl"> Exploit </td> <td> </td> <td class="bwpadl0 bwnowrap bwpadr0 bwvertalignb bwalignl"> 1.45 </td> </tr>
<tr> <td class="bwpadl0 bwnowrap bwpadr0 bwvertalignb bwalignl"> 7. </td> <td> </td> <td class="bwpadl0 bwvertalignt bwalignl"> Worm.Win32.Downad.Gen (v) </td> <td> </td> <td class="bwpadl0 bwvertalignt bwalignl"> Worm.W32 </td> <td> </td> <td class="bwpadl0 bwnowrap bwpadr0 bwvertalignb bwalignl"> 1.42 </td> </tr>
<tr> <td class="bwpadl0 bwnowrap bwpadr0 bwvertalignb bwalignl"> 8. </td> <td> </td> <td class="bwpadl0 bwvertalignt bwalignl"> Trojan.Win32.Malware.a </td> <td> </td> <td class="bwpadl0 bwvertalignt bwalignl"> Trojan </td> <td> </td> <td class="bwpadl0 bwnowrap bwpadr0 bwvertalignb bwalignl"> 0.83 </td> </tr>
<tr> <td class="bwpadl0 bwnowrap bwpadr0 bwvertalignb bwalignl"> 9. </td> <td> </td> <td class="bwpadl0 bwvertalignt bwalignl"> Trojan.ASF.Wimad (v) </td> <td> </td> <td class="bwpadl0 bwvertalignt bwalignl"> Trojan </td> <td> </td> <td class="bwpadl0 bwnowrap bwpadr0 bwvertalignb bwalignl"> 0.76 </td> </tr>
<tr> <td class="bwpadl0 bwnowrap bwpadr0 bwvertalignb bwalignl"> 10. </td> <td> </td> <td class="bwpadl0 bwvertalignt bwalignl"> Trojan.Win32.Meredrop </td> <td> </td> <td class="bwpadl0 bwvertalignt bwalignl"> Trojan Downloader </td> <td> </td> <td class="bwpadl0 bwnowrap bwpadr0 bwvertalignb bwalignl"> 0.68 </td></tr>
</tbody></table><br />
------<br />
Community News You Can Use<br />
Click to read MORE news:<br />
<a href="http://www.georgiafrontpage.com/">www.GeorgiaFrontPage.com</a><br />
Twitter: @gafrontpage & @TheGATable @HookedonHistory<br />
<a href="http://www.artsacrossgeorgia.com/">www.ArtsAcrossGeorgia.com</a><br />
Twitter: @artsacrossga, @softnblue, @RimbomboAAG<br />
<a href="http://www.fayettefrontpage.com/">www.FayetteFrontPage.com</a><br />
Twitter: @FayetteFPGeorgia Front Page.comhttp://www.blogger.com/profile/18248749393644673382noreply@blogger.com0