Sunday, March 6, 2011

The Big 12 Basketball Tournament Schedule 2011

After the Big 12 basketball Tournament action today, Colorado 12 # 5 seed in the tournament and was held ... What Iowa, to face the third time will Buffs. Believe it or not, bad as Missouri played down the stretch, I was hoping to Iowa, the Tigers would play songs. I win money in Iowa, but my part in this game gives the cubic Iowa feels like it, and it's difficult to lose twice in a row that a team.

What are your thoughts? You see who and how to play Iowa and Colorado, do you like about their chances?

We get closer to the game in this game more. Wednesday, 9 14:00 tip-off games will be 3 months, CT

Big 12 basketball tournament bracket 2011 is set to stone. No. 1 seed, he took a while to back up, but first, the Kansas governor's 2011 Big 12 basketball Tournament tournament is scheduled to lead. It's a bit of time
 Texas looked like a painter in the Field House after the Jayhawks will stand. Longhorns, but what ties them - Jayhawks rest not on findings from the finish line. The reason the Big 12 basketball tournament bracket 2011 NCAA No. 1 seed Kansas, the other a chance to block, and another conference crown.

Boston College (noon, ESPN3) Wake Forest at: BC probably in the NCAA tournament this season is over now, but if they lose at Wake Forest a terrible team, they will. For the victory of Christ here is to block all of the items is not enough. At least in the ACC tournament to win a game. They are already locked in last place in the ACC - Wake Forest is nothing to your self-esteem.

Big 12 Conference basketball tournament schedule announced after the last day of work. Kansas, Missouri, taking down at home after winning the Big 12 basketballTournament  title at the end of the other ranks number two. .

In Minnesota, Penn shares (13:00 Big ten Network): Penn State all in the vicinity of the Holocaust makeseoitda bubble, was moved on Saturday, but they can still do many things. Here's victory over Minnesota despite their large heat the remaining work must be done in competition. As for Minnesota, they are, but a stronger non-conference stand out any bubbles are likely to resume their 6-11 record of ten is a killer. Expand its scope and the jury, even if a weak bladder, 7-11 Big ten team's hard to see adopted. Of course, the air bubbles in Minnesota bujihal life to the hope that they'll be able to win here. Penn State beats the big ten tournament, big ten tournament seeded 6-7 at the end of one of the seeds can be more.

Wednesday, March 2, 2011

Selena Gomez Punched in The Face When leaving Justin's 17th birthday party

Selena Gomez claims has received online threats (email)from fans who adore her boyfriend, Justin Bieber, but have haters taken things a step further?

Rumors started on Twitter Wednesday that Selena Gomez punched in face by a fan after photos surfaced of the Disney star covering her face and what appeared to be a fat lip. The topic #sorryjustin started trending on Twitter, and in no time, word quickly spread that Gomez was hit by a jealous Bieber fan.

Justin Bieber makes girls go crazy and scream. According to recent internet rumors, some of his fans may have gone a little too crazy.

After receiving threats from Bieber fans, the pop idol's girlfriend, Selena Gomez, was also rumored to have been punched in the face by one, reports People magazine.

The rumors stemmed from paparazzi photos showing Gomez covering what appears to be a fat lip.

However, a rep for Gomez told People that there is "absolutely no truth" to the rumors.

Who Punched Selena Gomez?

Who punched Selena Gomez? Watch the picture and photo below, Selena Gomez gets punched in the face when leaving Justin Bieber 17th birthday party at Maggiano’s Restaurant. So who punched Selena Gomez? The suspect is believed as one of Justin Bieber fans..

March 2nd, Texas Independence Day

Today March 2nd, 201. 175 years ago, Texas officially declared itself independent from Mexican rule. In 1845, Texas became an official US State. I have only been to Texas once but I can tell you that is a beautiful part of this country and is home to a fabulous cuisine. The influence of Mexican flavors is widely evident on menus and in home cooking around the state which is where the term Tex-Mex comes from. Texan food with a Mexican flair. We have a whole bunch of delicious Tex-Mex recipes at The Family Kitchen and they are perfect for any Texas Independence Day celebration. I am also sure there are a lot of Tex-Mex recipes we haven’t written about yet.

A handwritten document proclaiming Texas was freeing itself from rule by Mexico is 175 years old.

Wednesday was Texas Independence Day. It was March 2, 1836, when historians believe the original and five copies of the declaration were made and signed.

Only the original remains. The pages are on a now rare public display into April at the Texas Archives and Library in Austin.

Texas became a U.S. state in 1845.

Tuesday, March 1, 2011

Windows Internet Explorer PCs have been under siege for 20 years of innovative Windows malware


Ingenuity to nefarious ends: The evolution of groundbreaking Windows malware sheds light on what's to come

   Windows PCs have been under siege for 20 years. What a difference those two decades make.

Back when Windows was young, viruses scampered from system to system, when Windows was young.Occasionally deleting files, which could almost always be retrieved and putting up dialog boxes with inscrutable contents, like the numeral 1. Nowadays, Windows malware locks up your data and holds it for ransom. It manipulates your PC into launching attacks, mines files for credit card numbers and passwords, and sets nuclear centrifuges to whirl with wild abandon nasty stuff.

" Windows 7 is making huge inroads into business IT. But with it comes new security threats and security methods. InfoWorld's expert contributors show you how to secure the new OS in the "Windows 7 Security Deep Dive" PDF guide. "

Along the way, Windows malware has spawned several billion-dollar antivirus companies, inspired enough articles to fill the Library of Alexandria, created jobs for many tens of thousands of security professionals, and caused more than half a billion king-size headaches.

These pesky programs didn't morph from toddler to kickfighter overnight. There's been a clear succession, with the means, methods, and goals changing definitively over time. As with any technology, innovative thinking points the way forward. Here's a look at how ingenuity to nefarious ends has transformed Windows hacking into a multi-billion-dollar industry, and where the Windows mailware trail points to the future.

The early rogue's gallery

Some of the most innovative and (still) pervasive malware techniques arrived at the dawn of Windows, with the years leading up to Windows 3.0 setting a strong foundation for Windows-specific malware to come.

Take, for example, VirDem, the first virus to infect an executable file. Ralf Burger created the virus in Germany in 1986 by sticking a self-replicating program at the front of a COM file and moving the original instructions to the end. This was soon followed by Cascade, which appeared in 1987 as the first virus that used encryption to disguise itself. Unfortunately, the encrypting routine was the same in all infected files, so scanners picked it up easily. #Fail.

GhostBalls (the code states proudly "Product of Iceland / Copyright © 1989") combined two infection techniques, creating the first multipartite or blended threat virus. GhostBalls attaches itself to COM files and spreads by copying itself to other COM files, but it also looks for a diskette in the A: drive and, if found, copies a modified boot sector virus onto the diskette.

Overcoming Cascade's congenital defect, in 1990 Mark Washburn came up with 1260, the first polymorphic virus. Polymorphic viruses change each time they're encrypted -- often altering the encrypting routine itself -- making detection considerably more difficult.

Flying below the radar was the modus operandi of two other viruses launched in 1990, Frodo and Whale, which both became known as stealth viruses because they took great care to hide themselves. Frodo made Windows lie about the size of infected COM files so that they appeared as if they weren't infected. Whale -- at 9KB, the largest virus to date -- used the Frodo technique to hide its size and the 1260 shtick to change itself. Neither program infected much of anything, but both excelled at staying hidden.

Twenty years later, the Windows malware pantheon runs chock-full of infected executables, multipartite, polymorphic, and stealth techniques.

The rise of Microsoft macro viruses

Windows 3.0 hit the ground running on May 22, 1990, and soon the platform would go gangbusters. With the exception of Michelangelo, a garden-variety boot sector virus that took out Windows machines, injected the phrase "computer virus" into almost every language on earth, and helped substantiate the lucrative antivirus industry, virus innovation stagnated. Then in the summer of 1995, an epiphany: Somebody -- we still don't know who -- wrote a very simple macro virus using WordBasic, the macro language behind Microsoft Word.

Documents infected with this virus, when opened using Word 6, add four macros to Word's default template, NORMAL.DOT, which then infects any subsequent Word document you save. The macro has a harmless payload, which displays an odd dialog box with the numeral 1. The macro code contains the text "That's enough to prove my point" -- thus, the name Concept.

The floodgates burst. In late August 1995, several Microsoft employees told me that more than 80 percent of all PCs on Microsoft's Redmond campus were infected by Concept, which spread across the world in a matter of weeks. Antivirus companies scrambled, trying to protect against this completely new attack vector, and virus writers, aided by macro virus construction kits widely distributed in 1996, had a field day. Word took the initial beating, but then Excel spreadsheets came under attack, first with Laroux, then with a deluge of more than 1,000 macro viruses.

Microsoft shored up security in Office 97, but virus writers quickly figured out how to get around the controls, and many old viruses automatically converted over to the new system, using Microsoft's automatic upgrade tools. The tide didn't shift until antivirus vendors started to get the upper hand, primarily by brute force, and Microsoft finally made infection more difficult in Office 2000. Even so, Word and Excel macro attacks remained an omnipresent part of the malware landscape until Microsoft finally changed the default file formats in Office 2007.

The end of the century: Communications attacks

Windows-specific malware entered the big time when a Taiwanese programmer, Chen Ing Hau, created CIH (aka Chernobyl), thereby taking stealth infection to a new height.

Using the vagaries of the Portable Executable file format, CIH tucked itself into the parts of an EXE file between the major sections, infecting files without changing their size. Those unlucky enough to have these interstitial infections on Windows 95, 98, or ME systems woke up on April 26, 1999, with bricked PCs. CIH was a devastating virus, but it didn't spread readily.

Email emerged as a potent delivery mechanism -- a point not missed by miscreants whose Good Times hoax ("if you read a message with the subject 'Good Times' your hard drive will be destroyed") scared millions.

The next big jump in malware technology arrived as fireworks, emblazoned on a window entitled "Happy New Year 1999!" Happy99, aka SKA, infects by hijacking a Windows program, taking over the communications program Wsock32.dll. If you send a message from an infected machine, the bogus Wsock32.dll delivers the message, but then shoots out a second, blank message to the same recipient with an attached file, usually called Happy.exe. If the recipient double-clicks on the file, they're greeted with a fireworks display -- and a nasty infection.

Prior to Happy99, other malware hooked into Windows using the same sort of technique, but Happy99 had the foresight to take over the communications routine; thus, it spread prolifically. Adding to the potency: Microsoft stopped showing filename extensions starting with Windows 95, so most users receiving the Happy99.exe file only saw the name "Happy99" -- and all too frequently clicked on it.

David L. Smith, of New Jersey, wrote Melissa, a Word macro virus that scans an infected PC's Outlook address book and sends copies of itself to the first 50 entries. It was the first successful incarnation of many Windows spam-generating viruses.

Melissa was so prolific it brought down Exchange Servers all over the world on March 26, 1999. CERT says that one server received 32,000 copies of Melissa in 45 minutes. Mr. Smith served 20 months in a federal prison for his efforts. Several months later, another destructive virus, ExploreZip, also used the Outlook address book to propagate; it had a nasty habit of deleting Office documents by overwriting them.

The end of the 20th century saw malware writers take advantage of Visual Basic Script running the Windows Script Host, a combination that would become wildly successful in ensuing years.

The BubbleBoy virus presented the first generally successful drive-by attack. If someone sent you an infected message -- no attached file necessary -- and you opened the message in Outlook or previewed it in Outlook Express, you got zapped. BubbleBoy took advantage of HTML and Outlook's propensity to run embedded Visual Basic scripts without warning.

The root of the problem? In those days, Outlook used Internet Explorer to display HTML-based emails. Even though you never saw IE in action, it was there, lurking in the background, running VBS programs without permission. Years later, the Klez worm used the same approach, but with a different security hole.

On May 5, 2000, the ILOVEYOU worm hit, and PCs will never be the same. A remarkably effective demonstration of social engineering techniques that drive malware today, the infected file arrived attached to a message. The message's subject: ILOVEYOU, and the attachment was called LOVE-LETTER-FOR-YOU.TXT.vbs. Since Windows hid the .vbs filename extension, many people (including, it's rumored, one very senior Microsoft executive) double-clicked on what appeared to be a TXT file and shot themselves in the foot -- the same fatal flaw that took many by surprise with the Happy99 worm.

ILOVEYOU overwrites many different kinds of files and then rifles the Outlook address book, sending copies of itself to every address, much like Melissa. It started spreading on May 4, 2000. By May 13, 50 million PCs were infected.

Several hugely successful malware attacks followed in ILOVEYOU's technological footsteps. In 2001, the Anna Kournikova worm arrived in an email attachment called AnnaKournikova.jpg.vbs. Sircam grabbed a Word or Excel file on the infected PC and sent out infected versions of the file using the same technique. Many confidential files went out to unexpected recipients. Sircam also spread by copying itself onto network shares.

Beginning of the botnet

Not content to merely distribute malware over the Internet, enterprising programmers started working on ways to control Windows PCs directly using the Internet.

In December 1999, a Brazilian programmer who uses the name Vecna unleashed a new Trojan called Babylonia. While incorporating CIH-style interstitial infection and Happy99-style Winsock replacement, Babylonia brought an important new capability to the malware gene pool: It phoned home, once a minute, and updated itself if a newer version is available.

While its authors claim BackOrifice wasn't invented to subvert systems, it certainly offered that capability on Windows 95 and 98 systems. Much like today's botnet controllers, BackOrifice provides remote control -- the ability to run one PC from another, over the Internet. BackOrifice isn't a virus; rather, it's a payload waiting to be deposited by a virus or a Trojan.

The Sobig worm created the first commercially successful spam-generating botnet, and it did so through infected email attachments. At one point, 1 out of 20 email messages on the Internet contained a Sobig.f infected attachment. Sobig harvested email addresses from files on the infected computer.

Cracking into Windows

By 2001, most malware spread by sending infected files over the Internet or by dropping infected files on network shares. That year, malware writers expanded their horizons by aiming directly for security holes in Windows itself. They also jumped up several levels in sophistication. No longer intent on destroying data or playing pranks, some malware writers turned their considerable talents to making money.

CodeRed infamously infected more than 300,000 Windows Servers, using a buffer overflow to take control of IIS and deface websites on the infected server. CodeRed-infected machines send out buffer overflow packets to random machines on the Internet in a spray attack. Microsoft patched the hole a month before CodeRed appeared, but admins didn't apply the patches quickly enough. A complete rewrite, CodeRed II, not only engaged in spray attacks, it also attacked local machines.

Then Nimda took the cake. It used five different infection vectors: a blended threat of the first degree. Nimda infects with email attachments. It infects unprotected network shares. It tries to take down websites. It goes after servers in CodeRed-style. And it can use backdoors left behind by CodeRed.

SQL Slammer ricocheted across the Internet in 2003, infecting 75,000 machines in its first 10 minutes, knocking out wide swathes of the Internet. The worm exploited a security hole in SQL Server and SQL Desktop Engine, which had been patched six months previously. It doesn't put a copy of itself on a hard drive, preferring to simply stay memory resident: Reboot an infected machine, and it isn't infected any more.

Like SQL Slammer, Blaster (aka Lovsan) zoomed across the Internet at a breakneck pace by scanning machines connected to the Internet and passing itself around. Like Slammer, it used an exploit that had already been patched. Unlike Slammer, Blaster attacked every Windows XP and Windows 2000 computer. The payload tried to take out Microsoft's windowsupdate.com site with a DDoS attack.

Where the money goes today

Botnets formed years ago are still in operation -- a fact that isn't lost on the folks who bankroll the now highly lucrative malware industry.

The professionals behind these programs don't take kindly to competition. Sobig was followed by Mydoom, another email-attachment botnet generator, and a malware war broke out between Mydoom, Netsky, Sasser (which took out thousands of companies), and Bagel, each of which attempted to clobber the other. An 18-year-old computer science student in Germany was convicted for creating Sasser and the Netsky.AC variant.

The Zlob Trojan took a new tack by disguising itself as a video codec, deemed necessary to run video files of uncertain pedigree. Zlob has seen dozens of incarnations, most of which are notorious for pimping rogue antimalware, a moneymaking pastime. Zlob has morphed over time and emerged to notoriety five years later as the Alureon rootkit.

In 2007, Storm Worm started as yet another email-attachment botnet generator, but one with a difference: Instead of operating the botnet through a single server, Storm Worm borrowed peer-to-peer technology to disperse control. More than 1 million Windows PCs were infected. The Storm/Waledac botnet was largely broken up in late 2008, but it woke up and started spamming again last month, according to Symantec. Waldec's handlers are gathering steam for a big Round Two.

Many other botnets have come and gone in the past few years, most of them taken down or severely attenuated by breaking lines of communication and blocking compromised servers. A few remain problematic, most notably ZeuS, a do-it-yourself botnet kit designed to pick up passwords, account numbers, and the like on infected machines, then send them to the chosen drop zone, as well as Conficker, a botnet considered dormant but not completely eradicated.

Spam-generating botnets, such as Waledac, are getting hit hard by Microsoft's lawyers. Last October, one of the largest spam botnets, Bredolab, was decimated (although not completely eliminated) by the Dutch National Crime Squad.

Where malware is heading

As Windows XP machines die and get replaced by Windows 7, Windows is getting more difficult to crack by orders of magnitude. Little malware players have been squeezed out of the market, and the big players, looking for new opportunities, are finding few low-hanging fruit.

Still, Windows zero-day vulnerabilities are worth a lot of money, and those who find them these days are much less likely to use them to make funny dialog boxes with the number 1.

Because of this, we can expect Windows malware to continue evolving in innovative ways. One prominent trend is the rise of attacks outside of Microsoft-land. Koobface, for example, runs on Windows, but it's used to harvest information from Facebook and MySpace, convince Facebook users to install rogue antimalware programs, and otherwise turn social networking information into lucre. Nart Villeneuve provides an excellent PDF overview.

Another trend will likely revolve around industrial espionage. Whether or not you believe the Stuxnet worm was designed to break Iranian nuclear enrichment centrifuges, there's no question that a very capable team constructed a breathtaking array of zero-day Windows cracks and Siemens Step 7 code. Expect motivated organizations to blend innovative threats to get what they want.

As for malware construction kits, ZeuS looks to be only the beginning. By democratizing the construction of malware, sufficiently talented kit creators can make a decent living, at much reduced risk. With kits for sale, the creators don't have to worry about disseminating the malware without getting caught, keeping drop sites working, or turning information into money. Recently, Brian Krebs reported that ZeuS and SpyEye have apparently joined forces, and the latest ZeuS source code can be purchased for a paltry $100,000. With source code in hand, you can create and sell your very own customized ZeuS construction kits. Think of it as a malware multilevel marketing scheme.

But the most prolific vector for malware innovation will likely reside in social engineering. After all, while it's getting harder to crack Windows programs, it's as easy as ever to attack the weakest link: the one between users' ears. Look for more cons, more fake "Windows tech support" calls, and more bewildered users who will gladly give out sensitive information to anyone who claims they can help fix things.

Windows malware has changed a lot in the past 20 years. People haven't.

Woody Leonhard writes computer books, primarily about Windows and Office. He's senior editor at Windows Secrets Newsletter and a frequent contributor to InfoWorld's Tech Watch blog. A self-described "Windows victim," Woody specializes in telling the truth about Windows in a way that won't put you to sleep.

Join the CIO Australia group on LinkedIn. The group is open to CIOs, IT Directors, COOs, CTOs and senior IT managers.

    *
      Bookmark this page
    *
      Share this article
          o facebook
          o slashdot
          o digg
          o Reddit
          o stumbleupon
          o linkedin
          o twitter
    *
      Got more on this story? Email CIO
    *
      Follow CIO on twitter

More about: CERT, etwork, Excel, ExploreZip, Facebook, Microsoft, National Crime Squad, Siemens, Symantec
References show all

    * More evidence arises that Stuxnet was created to attack Iran : Malware - InfoWorld
    * The InfoWorld expert guide to Windows 7 security : Security Central - InfoWorld
    * Threat Description: Virdem
    * Cascade
    * GhostBalls
    * 1990 - Securelist
    * Concept
    * The Portable Executable File Format - Abstract
    * Good Times - Email and virus hoax information
    * VBS.BubbleBoy : Symantec
    * Klez
    * Building Anna Kournikova: An Analysis of the VBSWG Worm Kit : Symantec Connect
    * Threat Description: Worm:W32/Sircam
    * Threat Description:Babylonia
    * 20 years of innovative Windows malware : Security - InfoWorld
    * 20 years of innovative Windows malware : Security - InfoWorld
    * Worst Case Scenario
    * W32.Sobig.F@mm : Symantec
    * Examples and descriptions of various common vulnerabilities - Securelist
    * Net-Worm.Win32.Nimda - Securelist
    * Threat Description: Worm:W32/Slammer
    * Threat Description: Net-Worm:W32/Lovsan
    * Grumpy old botnets survive and thrive : Malware - InfoWorld
    * 20 years of innovative Windows malware : Security - InfoWorld
    * Virus Top Twenty for April 2004 - Securelist
    * Threat Description: Trojan-Downloader:W32/Zlob
    * Four-year-old rootkit tops the charts of PC threats : Malware - InfoWorld
    * Storm in Segments
    * Return from the Dead: Waledac/Storm Botnet Back on the Rise : Symantec Connect
    * Waledac botnet poised for a comeback with stolen credentials : Security Central - InfoWorld
    * Next-generation banking malware emerges : Security Central - InfoWorld
    * hit hard by Microsoft's lawyers
    * decimated
    * Download the Windows 7 Deep Dive Report : Windows - InfoWorld
    * Facebook tools to help data thieves : Data security - InfoWorld
    * provides an excellent PDF overview
    * Stuxnet attack more effective than bombs : Malware - InfoWorld
    * 20 years of innovative Windows malware : Security - InfoWorld
    * ZeuS Source Code for Sale. Got $100,000? — Krebs on Security
    * Fraudsters hone their attacks with spear phishing : Security Central - InfoWorld
    * AskWoody.com
    * Microsoft Windows XP, Vista, 7, Internet Explorer (IE), Firefox, Windows Update
    * InfoWorld Tech Watch's blog - InfoWorld

Comments
Post new comment
Name
Email address
The content of this field is kept private and will not be shown publicly.
URL
Comment
If you enter anything in this field your comment will be treated as spam
Users posting comments agree to the CIO comments policy.
Login or register to link comments to your user profile, or you may also post a comment without being logged in.

    * Share
      Share this article
          o facebookfacebook
          o slashdotslashdot
          o diggdigg
          o RedditReddit
          o stumbleuponstumbleupon
          o linkedinlinkedin
          o twittertwitter
    * print
    * email
    * Bookmark

Related Coverage

    * PayPal CISO: DDoS one big security threat among many
    * Facebook security more important as e-mail spam levels drop
    * Intel and McAfee set to take security beyond the PC
    * SSD firmware destroys digital evidence, researchers find
    * PHP user group lauds Microsoft's open source contributions

Related Whitepapers

    * PCI Basics: What it Takes to Be Compliant
    * Take the Guesswork Out of Online Security. VeriSign Guide: Move Beyond Traditional SSL to Establish Trust
    * A Universal Approach to Greater File System Efficiency
    * The Top 7 Capabilities Required to Restore Firewall Effectiveness
    * High Availability with Oracle Database 11g Release 2

Latest Stories

    * HSBC downplays local data centre costs
    * Marist College unifies admin, moves to SharePoint
    * Government media review committee to be formed soon
    * NSW Libs pledge ICT revolution
    * Greens to block telco interception bill

Community Comments

    *
      "When Americans are the losers they will come out with all this ..."
      Chinese 'driving ICT agenda' in Africa: Wikileaks
    *
      "You should probably check this one : http://wordpress.org/extend/plugins/wats/ Very easy to setup ..."
      Five open source help desk apps to watch
    *
      "If Yesterday's technology is selling like mad (Office 2010 1 copy a ..."
      Can the Nokia deal save Microsoft?
    *
      "In case anyone missed this point, the Townsville first-release site used mostly ..."
      NBN to go live in Armidale in April
    *
      "@lantana, +1 Not only will the good news testimonies of the 90%+ ..."
      NBN to go live in Armidale in April

Tags: security, Microsoft, malware
Whitepapers

    * Take the Guesswork Out of Online Security. VeriSign Guide: Move Beyond Traditional SSL to Establish Trust
      This paper explores new developments in website security that online businesses should be implementing to build confidence in their sites, protect valuable brands and safeguard customers’ sensitive information, not to mention improving their bottom line.
      Learn more »
    * FOUR COMMON ERP IMPLEMENTATION MISTAKES
      In the process of implementing an enterprise application suite like enterprise resources planning (ERP) or enterprise asset management (EAM), an almost infinite number of things can go wrong. Read on.
      Learn more »
    * What's New: HP Business Process Testing (BPT)
      Find out more.
      Learn more »

All whitepapers
Books
More Books

    * Windows 7 for Seniors for Dummies® Windows 7 for Seniors for Dummies®
    * Excel 2007 All-In-One Desk Reference for Dummies Excel 2007 All-In-One Desk Reference for Dummies
    * Computers for Seniors for Dummies, 2nd Edition Computers for Seniors for Dummies, 2nd Edition
    * Microsoft Office Microsoft Office
    * Office 2007 All-In-One Desk Reference for Dummies Office 2007 All-In-One Desk Reference for Dummies
    * Windows 7 for Dummies® Dvd+book Bundle Windows 7 for Dummies® Dvd+book Bundle
    * Teach Yourself Visually Windows 7 Teach Yourself Visually Windows 7
    * MYOB Software for Dummies 6E Australian Edition MYOB Software for Dummies 6E Australian Edition
    * Windows 7 for Dummies® Windows 7 for Dummies®


CIO Members get exclusive access to:
Username: *
Password: *
or Sign up
Featured Whitepapers
Download Whitepaper
Fraud Alert: The Latest Phishing Tactics and Potential Business Impact

This fraud alert will help you understand the latest methods employed by cyber criminals, the potential impact on your business and how you can avoid being compromised.

    * Case Study: APX Alarm
    * The Mainframe and the Cloud
    * Reducing Costs Through Better Server Utilisation

    * Latest
    * Events
    * Podcasts
    * CSO
    * News

    *
      Marist College unifies admin, moves to SharePoint
    *
      HSBC downplays local data centre costs
    *
      ITU, IETF push dueling standards on MPLS features
    *
      Government media review committee to be formed soon
    *
      NSW Libs pledge ICT revolution

Join CIO and your peers - CIOs of Australia’s top corporate organisations for the most prestigious CIO networking event of 2010.

Be whisked away on a private luxury charter across Sydney Harbour to the fabulous Mosman Gunners Barracks for an evening of fine food, cocktails & peer-to-peer networking.

Your host: Georgina Swan - CIO Editor

Special guest & keynote: George Negus - renowned author, journalist and former SBS TV presenter

Supporting Speaker: Richard Bailey - VP HP Imaging & Printing Group South Pacific

5-10pm, Wednesday, October 27th 2010
Pick-up at Aquarium Wharf, Wheat Road, Darling Harbour. Guests will be transported back to various central locations on departure.
Attire: Lounge/cocktail

George will talk about the challenge of our rapidly and monumentally changing world, providing personal insight, historical perspective and political edge for business, educators and governments grappling with the dilemmas of contemporary society - the world that has become George Negus’s oyster.

Guests will receive a signed pre-released issue of “The World from DownUnder?”

RSVP by calling Karen Pemberton on (02) 9902 2748. Attendance is limited to CIOs in organisations of 500+ employees.

    * +
      CIO Industry Insight Podcast #9: Tim Ayling, Chief Executive Officer, Platform46 06 August, 2010 09:22:40
      CIO Australia editor, Georgina Swan, talks with Platform46 CEO, Tim Ayling, about collaboration in the enterprise.
      [ MP3 (2.06 MB) | Windows Media (2.09 MB) ]
    * +
      Special Report: Green and Sustainable IT in the Enterprise 15 April, 2010 11:58:23
      Despite all the hype surrounding Green IT, many CIOs and senior IT executives are unsure about the best way to start their organisations on the green journey. In this special edition podcast, CIO Australia editor Matt Rodgers speaks to Sundeep Khisty, Green Practice Leader, HP Enterprise Services, Asia Pacific & Japan, about how CIOs can best guide IT to become a core part of a company's sustainability strategy.
      [ MP3 (4.13 MB) | Windows Media (4.20 MB) ]
    * +
      CIO Industry Insight Podcast #9 Scott Dawes, VP of Applications Business Unit, Oracle ANZ 03 March, 2010 10:26:28
      CIO Australia Editor Matt Rodgers catches up with Scott Dawes, VP of Oracle's Applications Business Unit in A/NZ, about the role supply chain and logistics software plays in keeping global businesses moving.
      [ MP3 (3.27 MB) | Windows Media (3.33 MB) ]
    * +
      CIO Industry Insight Podcast #8: Michael Sentonas, Chief Technology Officer for McAfee Australia 25 February, 2010 11:26:51
      CIO Australia Editor Matt Rodgers talks with McAfee Australia CTO Michael Sentonas about the findings of McAfee's latest critical infrastructure protection report, In the Crossfire: Critical Infrastructure in the age of Cyberwar as well as the new security threats CIOs face in today's Web 2.0 world.
      [ MP3 (5.20 MB) | Windows Media (5.28 MB) ]
    * +
      CIO Industry Insight Podcast #7: Peter Thomas, Senior Director for Exadata Solutions & Architecture, Oracle ANZ 17 February, 2010 10:01:02
      CIO Australia Editor Matt Rodgers talks with Peter Thomas, Oracle's Senior Director for Exadata Solutions and Architecture, about the company's latest high-end database and storage system.
      [ MP3 (2.74 MB) | Windows Media (2.79 MB) ]

    * More >

    *
      Greens to block telco interception bill
      The Greens will seek to block the federal government’s proposed Telecommunications Interception and Intelligence Services Legislation Amendment Bill 2010, communications spokesperson, Scott Ludlum has told the Senate.
    *
      Facebook security more important as e-mail spam levels drop
      Spammers are moving on from mass e-mail blasts to targeted attacks using social networking sites like Facebook and LinkedIn, Cisco security executive Tom Gillis said Monday.
    *
      Intel and McAfee set to take security beyond the PC
      Intel's acquisition of McAfee -- originally announced last August -- has passed regulatory hurdles and is now official. The question now is: "What does the future hold with the combination of one of the leading chip manufacturers and one of the leading security vendors?"
    *
      SSD firmware destroys digital evidence, researchers find
      A technology built into many new solid state drives (SSDs) to improve their storage efficiency could inadvertently be making forensic analysis at a later date by police forces and intelligence agencies almost impossible to carry out to legally safe standards, researchers have discovered.
    *
      Google patches 19 Chrome bugs week before Pwn2Own hacking contest
      Google on Monday patched 19 vulnerabilities in Chrome, paying nine researchers $14,000 in bug bounties for reporting the flaws.

    * More >

    *
      Marist College unifies admin, moves to SharePoint
    *
      HSBC downplays local data centre costs
    *
      ITU, IETF push dueling standards on MPLS features
    *
      Government media review committee to be formed soon
    *
      NSW Libs pledge ICT revolution

    * More >

Most Popular Whitepapers
ESSENTIAL GUIDANCE FOR GREENNOVATORS - Green IT Sustainability Around Eco-Printing Solutions : Where Does Your Organization Stand in Australia?
Download Whitepaper

    * The Pathways ICT Leadership Development Program Overview And 2011 Course Curriculum


Recent comments

    * "When Americans are the losers they will come out with all this ..."
      on Chinese 'driving ICT agenda' in Africa: Wikileaks
      by steven | 3:17PM, 2nd March, 2011
    * "You should probably check this one : http://wordpress.org/extend/plugins/wats/ Very easy to setup ..."
      on Five open source help desk apps to watch
      by Jessie | 11:45PM, 1st March, 2011
    * "If Yesterday's technology is selling like mad (Office 2010 1 copy a ..."
      on Can the Nokia deal save Microsoft?
      by Larry | 4:35PM, 1st March, 2011
    * "In case anyone missed this point, the Townsville first-release site used mostly ..."
      on NBN to go live in Armidale in April
      by Francis | 4:19PM, 1st March, 2011
    * "@lantana, +1 Not only will the good news testimonies of the 90%+ ..."
      on NBN to go live in Armidale in April
      by Francis | 4:14PM, 1st March, 2011

HP and IDG news, product videos and resources
Media Releases

    *
      How to avoid those secure file transfer blind spots 2:51PM, 2nd March, 2011
    *
      FileMaker Developer Conference 2011 Features Over 60 FileMaker Sessions and New FileMaker Go for iPad and iPhone Track 12:18PM, 2nd March, 2011
    *
      PROSTEP IVIP AND SIEMENS PLM SOFTWARE INITIATE PROCESS TO ESTABLISH JT DATA FORMAT AS ISO INTERNATIONAL STANDARD 5:16PM, 21st February, 2011
    *
      Jabra launches Jabra™ 410 enterprise speakerphone – first product on the market to offer true 360-degree conferencing for businesses 11:03AM, 2nd March, 2011
    *
      Verizon Is Double Winner in Metro Ethernet Awards Competition 10:42AM, 2nd March, 2011

    * More >

Sign up as a CIO Member to get your FREE issue of CIO magazine today! Check out CIO's Quick Introductions to Technology Topics
Zones
HP Business Efficiency - Money Payback Guarantee Resource Centre

Offers you a wealth of customer case studies,reference guides, IDC and Gartner research pieces, market landscape, videos and podcasts. As of November 1st this Resource centre will also feature the photos, slide show and interviews from the 1st ever CIO HP Cocktail Networking event.
HP Application Lifecycle Management Resources

Provides you with the latest news, executive viewpoint, downloads, whitepapers and resources on application lifecycle management.
HP Data Protection Zone

Provides you with the latest software downloads, video, whitepapers and news on how you can keep your business data safe.
Upcoming Industry Events

    * McAfee FOCUS 2010 – MelbourneVIC - Melbourne | 16/09/2010 | Hosted by McAfee
    * World Computer CongressQLD - Brisbane | 20/09/2010 | Hosted by Australian Computer Society
    * Dell ON Demand Webcast EventOnline | 21/09/2010 | Hosted by Dell
    * Scenario Planning: Looking into the FutureWA - Perth | 29/09/2010 | Hosted by Stratatel
    * Scenario Planning: Looking into the FutureSA - Adelaide | 30/09/2010 | Hosted by Stratatel
    * Complimentary Polycom Community Breakfast Series: Achieving true productivity through the UC Intelligent Core and the Connected OrganisatioNSW - Sydney | 07/10/2010 | Hosted by Polycom

more
CIO Industry Insight Podcast #9: Tim Ayling, Chief Executive Officer, Platform46
Listen to the latest edition of CIO Live which is now available for download.
Listen to the podcast
Sign up to the CIO Live email
Videos

  

Charlie Sheen Twitter is Blowin Up

Charlie Sheen Twitter

Charlie Sheen twiteer is blowin up.Twitterverse went wild as the troubled 2 and a Half Men actor joined the web’s leading microblogging website — Twitter.com — and gained nearly 90,000 followers in under 2 hours.There are over 300,000 people that are interested in seeing what this unemployed star is doing. The 40+ year old actor has drawn a lot of attention lately. Charlie Sheen twitter is blowing up.

Charlie Sheen twitter was used to allow his fans and friends to follow what he was doing. He also made sure to follow one of his many porn star girlfriends. You have probably seen this guy all over th talk shows the last couple of days. Now this Charlie Sheen twitter, he is loving the attention.

His former boss said that he wished that he would have been as excited to go on talk shows and try to get an Emmy. It seems that Sheen has plenty of time on his hands and he is living the big life – while it lasts. I wonder how long he is going to survive floating around with the sharks. The Charlie Sheen twitter stream should be interesting to watch.

Christina Aguilera and Matthew Arrested For Public Intoxication

Christina Aguilera and Matthew Arrested For Public Intoxication
Singer arrested when boyfriend was pulled over on suspicion of DUI.

According to TNZ Christina Aguilera and her boyfriend Matthew Rutler drawn on drunk driving early this morning in Los Angeles and was arrested for public intoxication. Aguilera is charged with the book, and law enforcement officials told TMZ that she has appeared, "You can not take care of themselves."

The singer on suspicion of driving under the influence of her boyfriend, after police dragged to the misdemeanor charge of public intoxication arrests in Los Angeles on Tuesday morning, when Kristina public Fix (1 March) continued.

Los Angeles County Sheriff's Office spokesman, officers, and they 45 2:00 Tuesday that he was under the influence bunjjeumui Aguilera's 25 year old boy believed to have Len and observations were identified as driving Rutler Mashu. Aguilera was the passenger in the vehicle that the sheriff's office spokesman, 30 year old singer's West "Can not she take care of myself," what became the public face, was arrested on a misdemeanor drunken state, said allegations.

West Sheriff's Station is scheduled Aguilera is $ 250 bail. Singer's publicist at the press may not be able to get comments. $ 30,000 to the arrest report Rutler relief, the West Hollywood station just before 3:00 jailed for drunken driving charges and charges that the said book. Rutler does not bail, was not known at press.

If an anonymous source, "the driver was arrested for drunk driving, Christina] is never a problem," he said, other unnamed sources tell TMZ Ziza aide to the singer near her rehab facility for several weeks that the site is trying to get playing are talking to.

Aguilera's personal life and career of the date, the United States to sell only 25 million albums in her huropeuro Nick is starting to slide year. It was carried out in a hurry to clear the US tour. Therefore, the "humor" in her big screen debut and her husband Jordan Bratman for a divorce in return to be disappointed.

In this case, the Super Bowl in February and the national anthem of her infamous flubbing and that she had abandoned the party's hands in the week after tabloid reports fall in the Grammy stage, continues.

March 1, 2011, IHOP National Pancake Day

    Tuesday, March 1, 2011, 7 days a child to participate in the Haute-not spray! - 22:00 on National Pancake receive a free short stack of flapjacks free return * jjirudorenjeumirakurunettowaku we left something in the hospital while urging other local charities to specify. Thanks to the generosity of our customers, not spray Haute kids than last year is $ 2,100,000 to procure. Children not spray Haute National Pancake Day, which started in 2006, and later jjirudorenjeumirakurunettowaku hospitals and other local charities for more than $ 5.35 million to 10.1 million in financing and butter pancakes will be given away.

March 1, 2011: National Pancake day

Congratulations short rokaruahyihotppuseutatku is free.

  New
You need to know today, 5 have not been patjji Viru Kata scan. Patches
Photos (1)
You need to know today, 5 to scan the catalogs have been patjji Viru. New patch for http://o4.aolcdn.com/dims-shared/dims3/PATCH/resize/273x203/http: / / hss-prod.hss.aol.com/hss/storage/patch/9863165ae492d6dc95ffd5708a610310
Add photos & videos
Section sponsored by

1. Today, according to a report of the Korea Meteorological Administration, 36, is near the high fine.

2. This is National Pancake. Ahyihotppu handing out free short stacks are celebrating. Instead, they make a donation to the hospital jjirudorenjeumirakurunettowaku you ask to review. IHOPs near the Bloomfield, nyuinton, if in Springfield, Massachusetts Click here for directions.

3. Council of Audrey chenbajeu manseuhwirudotaunkaunsirueun 18:30 betkumyunisipparubirudinggu will hold a special meeting. People associated with the building project to address the Commission will have the chance. The committee at this point to introduce to the public and is expected to agree on the options.

4. 8:30 a.m. with water in your morning fitness class can lead them to the top of the マンスフィールドコミュニティセンター. The session pool using the edge of the deep and shallow water exercise class is run in various combinations of the $ 59 - $ 64 Members: $ 79-86 U.S. dollars non-member.