Archive for April, 2006


Hmmm, Office Genuine Advantage does seem to be broken!

Friday, April 28th, 2006


In the last post I blogged about the new Office Genuine Advantage feature that Microsoft seem to be testing.  Well, it's broken. 

Sorry Microsoft, but this copy is:

Legal
Activated
Not a counterfeit
Installed by me
Working properly

Customers who have spent good money on products are going to be annoyed about being called lies, cheats or thieves.  Even though I [...]

Microsoft Genuine Office Validation/Office Genuine Advantage makes an appearance

Friday, April 28th, 2006


Microsoft have started to roll out Genuine Office Validation (Office Genuine Advantage) to work alongside their Windows pirate detector.  Currently it's only applied to an old download  for Office but expect this to become more widespread soon.  If you try to download this and you've been naughty you can expect to see a message that [...]

Kathie’s Spittin’ chips about Amazon

Friday, April 28th, 2006


Kathie's spittin' chips  about Amazon.co.uk in her latest blog post.  It seems that Amazon has started to dish out family-unfriendly/workplace-unfriendly (depending on your family or workplace I guess) items onto the front page through the "This is the Page You Made" feature.  She's dubbed this new Amazon feature "Ama-porn".
I did a little investigating of my own and [...]

Definitions - P2P

Friday, April 28th, 2006


P3P
Peer-to-Peer
Whatis.com  - Wikipedia.org 

New phishing tricks highlight the weakness of Web security

Friday, April 28th, 2006


A recent post by Ed Bott  has highlights a new phishing scam targeting American Express customers.  It appears to be powered by a Trojan and when customers visit the AmEx site they are greeted by a pop-up window asking them for security details.

This issue must be pretty bad because it has prompted AmEx to issue a [...]

Troj/Ransom-A

Thursday, April 27th, 2006


Troj/Ransom-A  is an interesting Trojan (in a nasty sort of way).  This is another example of malware that demands a ransom from the user.
When first run, Troj/Ransom-A creates the file called winstart.exe which is placed in the Windows Startup folder.  To make it harder to find and remove it is set as hidden.
This file also create [...]

Pages (24) : « 1 [2]3 4 » ... Last »

Creative Commons License
This work is licensed under a Creative Commons Attribution-NonCommercial-ShareAlike 2.5 License.