BuyLow.com News - Current Events, News, History
 

Pi Computation Record

Fabrice Bellard, a French mathematician, claims to have set a new record for calculating Pi. Not only is it the longest, it was also done on a regular computer.
“I am pleased to announce a new world record for the computation of the digits of Pi.”
The following number of digits were computed:
[...]

Read More About - Pi Computation Record »

Ghost Rats And Zombies

For quite some time, the Internet security community has been aware of computers being compromised and taken over as part of a “Zombie Army” or “Botnet”. (See the FTC’s article)
Now, a far reaching cyber espionage networks using Ghost RAT has been uncovered. A RAT is a Remote Access Trojan that takes over the host [...]

Read More About - Ghost Rats And Zombies »

Computer Internet Security Alerts

Get the latest security updates.
* Apple QuickTime Updates for Multiple Vulnerabilities
Attackers may be able to exploit these vulnerabilities to execute arbitrary code or cause a denial of service.
*Microsoft Windows Does Not Disable AutoRun Properly
Microsoft Windows includes an AutoRun feature, which can automatically run code when removable devices are connected to the computer. AutoRun (and [...]

Read More About - Computer Internet Security Alerts »

Microsoft To Lay Off 5,000 Employees

The price of Microsoft stock fell to a 20 year low as their proprietary opperating system, Vista, continues to have trouble.
Here is an email from the CEO:
From: Steve Ballmer
Sent: Thursday, January 22, 2009 6:07 AM
Subject: Realigning Resources and Reducing Costs
In response to the realities of a deteriorating economy, we’re taking important steps to realign Microsoft’s [...]

Read More About - Microsoft To Lay Off 5,000 Employees »

Is your company keeping information secure?

Federal Trade Commission
Are you taking steps to protect personal information? Safeguarding sensitive data in your files and on your computers is just plain good business. After all, if that information falls into the wrong hands, it can lead to fraud or identity theft. A sound data security plan is built on five key principles:
Take stock. [...]

Read More About - Is your company keeping information secure? »

Protect Your Computer

Microsoft
Microsoft Security
4 steps to protect your computer
Step 1. Keep your firewall turned on
What is a firewall?
A firewall helps protect your computer from hackers who might try to delete information, crash your computer, or even steal your passwords or credit card numbers. Make sure your firewall is always turned on.
• How to turn on your [...]

Read More About - Protect Your Computer »

New in-session phishing attack could fool experienced users

By Joel Hruska | Published: January 13, 2009 – 11:15AM CT
Another year, another form of phishing. This one, I have to admit, is pretty good in terms of potentially fooling a user. Unlike most phishing attack vectors, it doesn’t rely on the victim being ignorant and/or moronic. The new technique has been dubbed “in-session” [...]

Read More About - New in-session phishing attack could fool experienced users »

Online Verification: Who Can You Trust in the Virtual World?

BusinessWeek reader and full-time law student Stephanie Dube writes that the Web offers free tools to help identify and thwart potential scammers
By Stephanie Dube
Plano (Tex.)-based BusinessWeek.com reader Stephanie Dube is full-time law student and freelance writer. You can find out more about her at www.StephanieDube.com/Twitter.
Kaylee was struggling. Diagnosed with a heart condition and cancer, she [...]

Read More About - Online Verification: Who Can You Trust in the Virtual World? »