Archives 2012

450K Yahoo passwords online now: Is yours?

Takeaway: Hackers have posted 450K Yahoo email addresses and passwords online, and hint Gmail, Hotmail, other services are next. How can you check if your users’ accounts are among them?

Hackers posted more than 400,000 Yahoo Voice and email names and passwords and the posting might not be over yet.

Yahoo reps say they are working on the compromised system–not great timing for a beleaguered company enduring what Yahoo chair Alfred Amoroso called a “tumultuous” time for the company. The firm apologized in an online statement and did not comment further at this writing.

Not a Yahoo user? IT pros and security experts worry this most recent hack on Yahoo – allegedly perpetrated by a group calling itself d3dd3 – is likely “way bigger than Yahoo,” said Marcus Carey, in a Reuters report. Hotmail, MSN, Live, Gmail and other personal services are at risk, too, he said.

NOTE: If you want to check your own or other users’ Yahoo emails to see if they are part of the current leak, there’s an easy way to check here at Sucuri Malware Labs. Just type in the email address and search.

Plan for next time

Change passwords. Consider training customers on utilities like Lastpass. IT pros we interviewed across the board said users in enterprises who use open cloud-based email services, or other non-enterprise communication methods like Skype or Google Groups, should, at the very least, be using such utilities, which provide more control and protection in case of events like this one.

With so much data potentially compromised via users relying on such BYOD services as these, “the process (to avoid future attacks) is much easier if (users) have Lastpass,” said John Livingston, a tech pro for the American Red Cross in Savannah, Georgia. “Time to change your Yahoo, Google, Hotmail, and AOL passwords. And with LastPass, each site and service has a unique password, which limits damage if the password does get out. Changing passwords then is quick and easy. Plus if you’re a manager you don’t have to worry about remembering a new password.”

“Once this clears, I will be changing the passwords for Gmail, even though there’s no confirmation on that (hack) yet,” said Brian Geniesse, who works the IT tech desk at his firm in Monominee, Michigan. “Also be careful. Password managers can be hacked just the same.”

Yahoo is to blame ultimately, most IT pros we interviewed told us.

“Shame on Yahoo for not running normal security audits on (its) networks – and services that would have detected the SQL injection vulnerability (reportedly) used in the attack,” adds Dan Phillips, an IT pro in Cambridge, Ontario, Canada.

Geniesse expanded on that with a message that will resound with most IT pros and CTOs. Most people use weak passwords–see below.

“You can preach the use of LastPass and the like until you are blue in the face but users will never change their habits unless you force them,” Geniesse said. And “Yahoo needs to force some kind of password complexity to help protect their users.”

So many folks are checking the hack post, the hackers allegedly responsible are having trouble maintaining traffic load. Due to high traffic on this group’s site, the page with the Yahoo hacked emails and passwords is going up and down. We caught part of it in a cut and paste.

When it was up earlier today, it read in part:

We hope that the parties responsible for managing the security of this subdomain will take this as a wake-up call … not as a threat …

There have been many security holes exploited in webservers belonging to Yahoo … ?that have caused far greater damage than our disclosure (today). Please do not take (the posting) lightly. The subdomain and vulnerable parameters have not been posted to avoid further damage …

The author quotes author Jean Vanier from his book, Becoming Human: “Growth begins when we begin to accept our own weakness,” Vanier wrote.

If you’re a Star Wars, Star Trek or comic book fan, just change your passwords right away, other observers add. And talk your users into it to. Check this out: CNET’s Declan McCullagh wrote a program to analyze the most frequently used passwords using data from the post of 450K email addresses and passwords. He listed:

  • 2,295: The number of times a sequential list of numbers was used, with “123456? by far being the most popular password. There were several other instances where the numbers were reversed, or a few letters were added in a token effort to mix things up.
  • 160: The number of times “111111? is used as a password, which is only marginally better than a sequential list of numbers. The similarly creative “000000? is used 71 times.
  • 780: The number of times “password” was used as the password. Apparently, absolutely no thought went into security in these instances.
  • 233: The number of times “password” was used in conjunction with a few numbers behind it. Apparently, the barest minimum of thoughts went into security here.
  • 437: The number of times “welcome” is used. With a password like that, you’re just asking to be hacked.
  • 333: The number of times “ninja” is used. Pirates, unfortunately, didn’t make the list.
  • 137,559: The number of Yahoo credentials that were leaked.
  • 106,873: The number of Gmail credentials that were leaked. Hotmail, which was the next most frequently cited e-mail service, had fewer than half the number of users hit.
  • 161: The number of times “freedom” is used, suggesting a lot of patriotic users. “America” was used 68 times.
  • 161: The number of times the f-word is used in some combination. There are a lot of angry people out there.
  • 133: The number of times “baseball” appears as a password. It’s the most popular sport on the list, proving that it is indeed America’s national pastime. It just may not be the best password.
  • 106: The number of times “superman” is used as a password. That’s nearly double the amount of times “batman” is used and triple the frequency of “spiderman.”
  • 52: The number of times “starwars” is used. The force is not with this password.
  • 56: The number of times “winner” is used.32: The number of times “lakers” appears. It tied with “maverick,” although fortunately “the_heat” or “celtics” weren’t on this list.
  • 27: The number of times “ncc1701? is used as a password. For those of you who aren’t trekkies, that’s the designation code for the Starship Enterprise. “startrek” is used 17 times, while “ncc1701a,” the designation for the Enterprise used in later Star Trek movies, is used 15 times.

Microsoft Offers $40 Windows 8 Pro Upgrade

We set out to make it as easy as possible for everyone to upgrade to Windows 8. Starting at general availability, if your PC is running Windows XP, Windows Vista, or Windows 7 you will qualify to download an upgrade to Windows 8 Pro for just $39.99 in 131 markets. And if you want, you can add Windows Media Center for free through the “add features” option within Windows 8 Pro after your upgrade.

When you use Windows.com to purchase an upgrade to Windows 8 Pro, the Windows 8 Upgrade Assistant makes upgrading simple by walking you through the upgrade process step-by-step from purchase to download and then of course installation.

The Windows 8 Upgrade Assistant will check to make sure your PC is ready for Windows 8. It will provide a detailed compatibility report that lets you know of anything you may have to address before or after the upgrade and outlines actions to take.

It will also inform you of any application or device compatibility issues. It will ask you what you want to keep from your current Windows installation. You will be able to upgrade from any consumer edition of Windows 7 to Windows 8 Pro and bring everything along which includes your Windows settings, personal files, and apps. If you are upgrading from Windows Vista, you will be able to bring along your Windows settings and personal files, and if you are upgrading from Windows XP you will only be able to bring along your personal files. Of course, if you want to start fresh, you can choose to bring nothing along. Or if you prefer to format your hard drive as part of your upgrade experience, you can do so as long as you boot from media and then format your hard drive from within the setup experience for installing Windows 8, not prior to it.

Once you purchase your upgrade, the Windows 8 Upgrade Assistant kicks off your download. It has a built-in download manager that allows you to pause and continue your download at any time as well as a check to ensure your download completes successfully.

After your download finishes, you can choose to proceed with the upgrade (“Install now”) or install later either from your desktop or by creating your own media. If you choose to create your own media, you will be able to create your own bootable USB or .ISO file which can be burned onto a DVD for upgrade and backup purposes. If you prefer, you also have the option of purchasing a backup DVD for $15 plus shipping and handling.

We believe that your upgrade experience in Windows 8 will be a breeze by offering a faster experience, a single upgrade path, and compatibility from prior versions of Windows. We’ve continued to listen to our customers and have expanded the ability to download to over 100 countries and 37 languages. We have simplified the Windows upgrade experience with the Windows 8 Upgrade Assistant which supports you during your upgrade with everything from selecting your language to pausing your download to built-in compatibility checks – it’s seamless. And if you’re an enthusiast you will have the flexibility to download and control how you upgrade.

If you prefer to shop at a local store, a packaged DVD version of the upgrade to Windows 8 Pro will be available for $69.99 during this promotion.

This upgrade promotion for Windows 8 Pro both online and at retail runs through January 31st, 2013.

Oh, and by the way – if you’re not upgrading from a prior version of Windows and are building your own PC or installing Windows 8 in a virtual machine or a separate partition, you will be able to purchase and install the Windows 8 and Windows 8 Pro System Builder product.

Business Case For Supporting Employee Use of Social Media

What’s your company’s policy on employees using social media in the workplace?

Many companies today are still fearful of employees using social media, especially while at work. Employer concerns range from loss of productivity, industry espionage, confidentiality breaches, and public complaints about the company and/or its managers. As a result, some companies have requested access to employee (or potential employee) Facebook profiles, as well as blocked access to social networking sites while at the office.

In contrast, other companies — for example RingCentral — encourage employee engagement on social media. There are multiple benefits to embracing employees using social media in the workplace, as illustrated by the below infographic from SilkRoad, a cloud-based social talent management solution. At RingCentral, we prefer that employees get involved with our social media channels, and we encourage them to share news about the company through their personal social networks. To prevent any confusion, we implemented a social media corporate policy that clarifies the dos and don’ts of participating in social networks as a RingCentral employee. The net net? The benefits of employees on social networks far outweigh the negatives.

Is your company supportive of employees using social media?

Changes to SSL Certificates Industry Wide

SSL Certificate Industry Change

There’s a pretty big change coming for SSL Certificates. And, we think it’s really important to keep you in the loop on these changes.

The biggest change you need to be aware of: if you have an active SSL certificate with an intranet name (e.g.’server1?, ‘mail’, ‘www’, ‘server2.local’, etc.), or a reserved IP address, it’s going to be revoked by October 1, 2016.

Also, on July 1, 2012, customers will no longer be able to purchase, renew, rekey, or manage their SSLs with intranet names or IP addresses that expire past November 1, 2015.

This is an industry-wide decision, not one specific to our company.

For more information on the Certification Authorities Browser Forum guidelines, go here.

For more information on which IPv4 Addresses are reserved, go here. We do not support any certificates using IPv6.

Our highly trained, courteous support staff is waiting to take your call. Whatever time it takes to assist you, that’s the time you’ll receive. We’ll resolve any issue to your complete satisfaction.

Call (888) 505-1532 to get started now

Would You Trust Facebook With Your Money?

These days, brick and mortar businesses displaying some kind of signage saying “Like us on Facebook,” are nearly as common as those displaying Visa and MasterCard logos. That’s worth considering, when you think about using Faceabook as a way to pay for goods and services in the physical world.

Of course, Facebook users have developed some trust issues with the site over the years. It would be quite interesting to see if a PayPal-like service from Facebook would be widely adopted. It’s one thing to trust a third party with your status updates and photos. It’s another to trust them with your money.

Would you trust Facebook to handle your money?

Last week, Facebook announced that it is getting rid of Facebook Credits, in favor of real money. Facebook users will start paying for virtual goods using their native currencies: Dollars, Pounds, Yen, etc. This represents the beginning of users being able to treat their Facebook account like a bank account, or at least like a PayPal account and paying online. I’m not sure if Facebook is FDIC insured.

While Facebook did not say anything about using currency to pay for things in the physical world, one can simply connect the dots. For one, Facebook has over 900 million users. Many of them carry it around in their pocket all day long. Now, consider that Facebook recently acquired Tagtile, described as “your universal loyalty card,” for which you can “visit local stores, tag the Tagtile Cube with your phone, and get rewarded for being an awesome customer.”

If Facebook is going to offer a digital loyalty card to use at stores, and Facebook is going to have user account balances based on actual money, it seems only logical that users will simply be able to pay with their Facebook accounts, as long as businesses adopt the technology.

Of course it would give Facebook yet another way to compete directly with Google.

Plink co-founder Peter Vogel wrote at TechCrunch, “Last year, 15 million people bought Facebook Credits, according to their S-1 filing, so it’s assumed Facebook has close to 15 million credit cards on file. By the end of this year, once paid apps are added to Facebook’s App Center, it wouldn’t be surprising if 50 million people, or about five percent of Facebook’s users are purchasing apps and other digital good, like movies, music and TV episodes, which means Facebook would have a pool of 50 million people who have entrusted it with their credit card information.”

“At that point it’s a very short distance to a ‘Pay with Facebook’ blue box showing up every time you make an online purchase (on web sites everywhere, not just on Facebook),” he adds. “Why re-enter your credit card number when you already trust Facebook to handle the transaction and bill your card? For Facebook users this could be seen as more convenient and safer than entering their credit card number on multiple sites. Facebook is PayPal on steroids, with the strength of a billion members.”

That’s an incredibly good point. Think about how the Facebook sign-in option already works for many sites in the web (and especially from mobile devices). It is so much more convenient to simply tap the button to sign in with Facebook than having to enter a whole other account name or email address and password. Paying this way could save a lot of time and hassle.

This already exists, you know:

 

 

If Facebook can get people paying online regularly, people may start putting more of their money into Facebook accounts, which will make them a lot more likely to pay for things offline.

The Trust Factor

That trust factor could be a major obstacle for Facebook, however. Privacy issues have been rampant with the the social network’s dealings for years. Last year, as the result of a settlement with the Federal Trade Commission, regarding privacy, Facebook had to agree to regular third-party audits to make sure it remains in compliance. This all came after Facebook was found to have not kept its promises, by not warning users of privacy changes or getting their approval in advance. Essentially, changes were made an an opt out basis, rather than users opting in.

Just this week, the company switched default email addresses of users to Facebook email addresses without warning. This isn’t exactly a privacy issue, but it’s another change being made to users’ personal accounts for them. Things like this tend to irk users, and don’t do much to make users more comfortable with how the company is handling their accounts. A Lifehacker article even goes into all the reasons why the switch to a Facebook user email address is less than beneficial.

Another big Facebook story this week is about a feature that Facebook rolled out called “Find Friends Nearby,” which was quickly pulled after the CEO of Friendthem claimed Facebook has stole their idea, and threatened to sue. If you’ve seen The Social Network or read book it was based on, you’ll know that Facebook has a long history of being accused of such things. That’s not to say whether or not these things have merit, but public perception is a valuable thing. Some people already have a hard enough time trusting banks with their money.

Side note: It’s unclear, by the way, if the Friendthem situation was directly related to Facebook pulling the feature. The company claims it was only a test, and not a formal roll-out anyway. It does appear to be based on the company’s acquisition of social discovery app Glancee.

Another question worth considering is whether or not people want one company to have so much control over their lives. Do you want to keep so much personal information, photos, videos, and money all under one Internet-based account. There are major hacking stories in the news frequently these days, and many may be hesitant based on that very fact.

This month, another prominent social network, LinkedIn, fell victim to a password leak. LulzSec hackers managed to gain access to 10,000 Twitter accounts via a vulnerability in a third-party app. Consider how many third-party apps are connected to Facebook. According to the company, as of March, over 9 million apps and websites were integrated with Facebook users. How much bigger of a target would Facebook be with more people keeping their money tied up in their accounts.

Of course, people are already keeping some amount of money tied up in Facebook, on a much smaller scale than what the future may very well hold.

“People can store their payment information on Facebook in a trusted environment and then make purchases across a range of apps – without having to re-enter their payment information in each app,” Facebook says about its current Payments offering. “Payment options include credit and debit cards, PayPal, mobile payments, gift cards and numerous local payment options around the world.”

If Facebook makes a significant transition to the offline, non-app world (like its peers are also trying to do), will you make the transition along with them? Will you use your Facebook account to buy burgers, gas or other every day items?

Five Must-Have Apps For Your USB Stick

Takeaway: Don’t get caught out in the field without the tools you need. A USB stick equipped with a few essential apps might just save the day.

Ah, the USB stick — one of the IT admin’s best friends. It travels with you and helps you rescue machines, work magic, and make end users sigh with relief. Some of these USB apps you copy to the hard drive and install; others can be run from the USB stick itself. A few of them are full-blown operating systems that can help you completely recover a corrupted or infected platform.

Whatever the style and purpose, there are plenty of portable apps for the USB stick that can be hard to live without. Here are five tools I deem must-haves.

1: SystemRescueCD

SystemRescueCD  is the Linux distribution to have if you’re going to carry one around on a USB stick. With this distribution, you can recover partitions, recover data, image a disk, test a hard disk, edit configuration files, burn a disk, check for rootkits, run an antivirus scan, securely wipe a hard drive, and much more.

2: Portable Firefox

Portable Firefox is there when you need it. Sometimes, a Web browser is a necessity for solving a problem. But when the browser on the desktop won’t run, what do you do? You break out your portable edition of Firefox. This version of Firefox has all the great features you’re used to. In fact, some will be hard-pressed to figure out that Firefox is running from a USB stick.

3: ComboFix

ComboFix makes almost every recovery tool list for me. No admin kit is complete without this powerhouse. It is my go-to tool when I encounter some of the nastier viruses and rootkits. Almost without fail, if an antivirus can’t catch it, ComboFix can. Unlike common antivirus and anti-malware applications, ComboFix will display (upon completion of running) a detailed report of exactly what it took action on. Note: To run ComboFix, you’ll need to copy the .exe over to the computer and install it.

4: FileZilla Portable

FileZilla Portable is the one and only FTP client to carry around with you. Why would you need an FTP client? There will be times when you must load a file from a troubled computer to another machine. The easiest way to do this (when all other methods fail) is by using a portable FTP client. This is especially crucial when the file is too large to fit on a USB drive or if the file must be loaded to a remote machine you do not have physical access to. This application is run directly from the USB drive and isn’t installed on the PC.

5: Explorer++ Portable

Explorer++ Portable is a file manager with all the usual features you’ve grown to expect from a file manager. But why should you carry a file manager with you? Have you ever had to repair a machine where Explorer won’t run? Makes for a major challenge. Having a portable file manager gets around that issue with ease. And why not have a file manager with features like tabs, keyboard shortcuts, a customizable UI, drag-and-drop support, and merging and splitting? In the end, the file manager is one of the most important tools on a PC. Without it, a machine can easily become crippled.

6: PortableApps

You might have noticed some of these apps link directly to the PortableApps site. That is a tool designed to make your life much easier. You can install PortableApps on your USB drive and then have a user-friendly system to add and remove apps to and from that USB drive with ease. I highly recommend this application for any and all IT admins.

Microsoft Surface: iPad knockoff for enterprise?

As I’ve said many times, I barely have any use for the new iPad. Most technologists I know feel the same way about tablets. However, most of us understand that we’re an anomaly. For tens of millions of people, using a tablet like the iPad is infinitely easier and less frustrating that dealing with a Windows laptop. That’s why tablets are eating the bottom out of the PC market, and the trend is accelerating.

Microsoft knows this. It also knows that an alarming number of companies are allowing their employees to use iPads and some are even running trials to hand out the new iPads to lots of highly mobile employees. What’s even worse for Microsoft is that most of these employees are loving it and are gladly chucking their Windows laptops aside.

 

While a lot of these employees will still periodically use Windows machines for some of their work, they’re using them less frequently and that means slower PC upgrades and less urgency to jump to Microsoft Windows 8. We’re still only talking about a fraction of the market — iPad will sell 60 million units in 2012 versus 400 million PCs, according to Gartner. Nevertheless, it has Microsoft freaked out because it’s been just a little over two years since the iPad debuted.

That’s a lot of disruption in a short period of time.

Of course, that brings us to the announcement of the Microsoft Surface tablet this week. Microsoft turned a lot of heads by revealing that it is going to build its own line of Microsoft Windows 8 tablet devices, à la Zune and Xbox. The hardware design for the Surface that Microsoft showed off on Monday was impressive enough to pique the interest of the tech press and the public.

The tablet itself looks a lot like the new iPad and many of the high-end Android tablets, but there were a pair of features that stood out. The first was a sturdy built-in kickstand that stealthily pops out from the back of the tablet. The second is the magnetic cover that doubles as a keyboard and touchpad. When you put these two features together you suddenly have a tablet that easily doubles as a laptop. That eliminates the need for someone to have two devices.

Sure, the hardware of the Microsoft Surface Tablet echoes the iPad. But, Microsoft did use a special magnesium body that makes it light, thin, and durable. Sure, the cover of the Surface is a copy of the iPad’s Smart Cover, but Microsoft did innovate by adding a keyboard on the inside.

There’s plenty about the Microsoft Surface Tablet that screams, “iPad knockoff!” and the failure of Android tablets and the tablet debacles at RIM and HP show that trying to build an iPad competitor for the enterprise can be a brutal business.

Still, the Microsoft Surface Tablet has something going for it that the BlackBerry PlayBook, HP TouchPad, and the parade of Android tablets don’t — it’s going to automatically drop into the Windows networks that most Fortune 500 companies as well as a lot of small and medium businesses already have in place. That’s going to mean a lot fewer worries about compatibility, security, and data protection. In other words, it means a lot less work for IT on the backend and a smoother transition for many users

That doesn’t mean the Microsoft Surface Tablet is a slam dunk. There is still a big question about whether users are going to find the Windows 8 interface as easy to use as the new iPad. And, will spyware and malware become a big problem on the Surface since it’s running the full version of Windows? Above all, how much is it going to cost? The Pro version of the Microsoft Surface Tablet that most businesses are going to want is expected to cost about the same price as an Ultrabook — in the $800-$1000 range.

Ultimately, if you want to think of the Microsoft Surface Tablet as an iPad knockoff with a few key innovations and additions that make it a legitimate option for businesses, that’s fine. A lot of companies will be happy to pay a premium for an iPad look-alike that automatically fits into their current networks and is guaranteed to work with their existing applications.

To View Full Article Click Here

Go Daddy Posts Workaround for 60-Day Lock


I just found out from fellow domain blogger Kevin Murphy of DomainIncite that domain registrar Go Daddy has finally posted a workaround to their 60-day lock. Apparently their doing this is a response to the modified ICANN transfer policies taking effect since June 1, 2012.

One of the most common complaints I’ve encountered about domain registrar Go Daddy is their arbitrary 60-day transfer lock. In case you just came in, Go Daddy can prevent your domain name from being transferred to another domain registrar for 60 days if a certain condition is met.

All domain registrars have a rule wherein you can’t move your domain name to another registrar if it’s within its first 60 days of registration or recent transfer-in from elsewhere. Go Daddy is currently the only one who puts in another 60-day transfer lock on top of those.

Initially, Go Daddy’s 60-day transfer lock kicks in if the registrant or administrative contact’s name or contact details is changed. Go Daddy since evolved their 60-day lock to only if the registrant name is changed for whatever reason.

Before I describe the workaround, it might be important to know what ICANN’s recent policy change is, and how this affected Go Daddy.

ICANN mostly made just some language changes in their transfer policy among registrars, but there is one major change relevant to this. Namely:

Upon denying a domain transfer request for any of the following reasons, the Registrar of Record must provide the Registered Name Holder and the potential Gaining Registrar with the reason for denial. The Registrar of Record may deny a domain transfer request only in the following specific instances:

Express objection to the transfer by the authorized Transfer Contact. Objection could take the form of specific request (either by paper or electronic means) by the authorized Transfer Contact to deny a particular transfer request, or a general objection to all transfer requests received by the Registrar, either temporarily or indefinitely. In all cases, the objection must be provided with the express and informed consent of the authorized Transfer Contact on an opt-in basis and upon request by the authorized Transfer Contact, the Registrar must remove the lock or provide a reasonably accessible method for the authorized Transfer Contact to remove the lock within five (5) calendar days.

I bolded the portion starting from “a general objection” to indicate ICANN’s recognizing Go Daddy’s 60-day lock. However, they’re also requiring the registrar to allow the “authorized Transfer Contact” a means to do away with that within five calendar days.

In short, Go Daddy is being allowed to maintain their 60-day thing, yet allow the domain’s registrant or so a way to get around that if ever. The wording can be argued either way, but all this is a means of balancing competing interests.

I bolded the portion starting from “a general objection” to indicate ICANN’s recognizing Go Daddy’s 60-day lock. However, they’re also requiring the domain registrar to allow the “authorized Transfer Contact” a means to do away with that within five calendar days.

In short, Go Daddy is being allowed to maintain their 60-day thing, yet allow the domain’s registrant or so a way to get around that if ever. The wording can be argued either way, but all this is a means of balancing competing interests.

Domain Name Wire also has more from Go Daddy’s director of policy planning James Bladel:

“We understand our 60 day lock has been controversial,” said James Bladel, Director, Policy Planning for Go Daddy. “What is boils down to is, while it’s a very good tool for intercepting and preventing hijacking…we recognize that our efforts to address that problem shouldn’t be a hindrance to legitimate users of domain names that want transfers to be a little more simple.”

Kevin quotes Bladel’s rationale further:

“The bad guys are not going to call and ask us to take a second look at this,” he said. “The bad guys want it to happen under the radar.”

Bladel explains the lock can be lifted after a human review unless they suspect a hijacking is going on. Additionally, the domain name’s WHOIS information is changed to its original state.

I think that second part is going to pose some problems, particularly on ownership changes after a recent sale. Time will tell how this goes, and Go Daddy is surely going to adjust to that if need be.

So step by step, here’s how it goes:

1. If you change your domain name’s registrant name at Go Daddy, it turns on their 60-day transfer lock. They do post notices of this before you make the change, and they do email about it. (unless caught by your spam filter, knock on wood…)

2. You’ll get an email with an email address to contact a team at Go Daddy to appeal the lock.

I’m sure some of you wish it’s a way to call that team directly instead. Would be nice if Go Daddy accomodates that, though I also know they “need” to control that if ever.

I wish they thought of this sooner rather than have to inconvenience a lot of people unnecessarily because of this, though I know some people want this done away instead. Like I said, it’s a matter of balancing competing interests.

In any case, at least there’s now an option to go around their 60-day lock. 

To View Full Article Click Here

Our highly trained, courteous support staff is waiting to take your call. Whatever time it takes to assist you, that’s the time you’ll receive. We’ll resolve any issue to your complete satisfaction.

Call (856) 745-9990 to get started now or click here

The Microsoft Surface, Windows 8 Tablet From Microsoft

“It embodies hardware and software working together. People want to work and play,” Steve Ballmer said today amid much fanfare at Milk Studios in downtown Los Angeles. Microsoft has officially entered the ring with the Apple IPad. Microsoft views the Windows 8 Surface Tablet  as a “stage for Windows 8.” It’s 9.3mm thin, has full size USB 2.0 ports, a massive kickstand and weighs only 1.5 lbs. The casing is made out of magnesium (specifically, a material Microsoft calls VaporMg) and screen is covered in the Gorilla Glass 2 and optically bonded, a feature for the Microsoft Windows 8 Surface Tablet brags was specifically made for the Surface Tablet. The Microsoft Windows 8 Surface Tablet is directly aimed at consumers, and with that, the iPad.

Windows 8 is at the core of  Microsoft’s Surface Tablet. As such, it’s Metro device but also has access to all the Windows, not to mention Xbox features. Microsoft Surface Tablet is clearly the product Microsoft had in mind when it announced the Xbox SmartGlass feature at E3 earlier in the month.

Microsoft also announced several accessories for the Microsoft Surface Tablet including a clever 3mm thick cover that features a full (albeit super-slim) keyboard. Since it’s held on by magnets, it will likely be called a copy of the iPad’s SmartCover, too. The backside of the Surface even features a massive, unit-wide kickstand.

There will be two hardware options for Microsoft’s Surface Tablet, with both an ARM option and, for the full Windows experience, an Intel chip.

But like most hardware, it’s nothing without the right software. Ballmer was very clear at the beginning of the announcement event that the Microsoft Surface Tablet’s strength is the Windows ecosystem. This tablet runs Windows 8, and with that, both Metro and the traditional desktop environment. Every application that runs on Windows, save perhaps Skyrim and the like, should run on a x86 Surface.

Still, if Microsoft is attempting to take on Apple, it will need to court a new crop of developers. The iPad’s strength comes from its legions of small 3rd party devs that for the most part completely ignore all things Microsoft. Up until this product, there wasn’t another tablet platform with the same sort of penetration numbers as the iPad. But with the Surface Tablet, Microsoft is essentially giving developers a massive user base as the applications will hit both mobile and desktop units — and Metro’s dedication to the touchscreen makes the deal even sweeter.

The new Windows RT-powered Surface Tablet will sport either 32 or 64GB of storage depending on the purchaser’s preference, while the more traditional Intel variant will come with either 64 or 128GB. Microsoft declined to dive into specifics about their new tablet’s release, though they were quick to note that the Surface tablets would be priced “competitively” when they make it to market.

 

To View Full Article Click Here

4th Generation Web Hosting Is Here

See the difference for yourself!

Fast, affordable and easy-to-use, 4th Generation Hosting is advanced without being complicated, making it the perfect choice for everyone.

Description:

  • Hosted across multiple servers with proprietary Dynamic Traffic Management. Easy-to-manage and affordable. It’s the next generation of Web Hosting.
Is my site hosted on a cluster of multiple servers with real-time load-balancing?
  • YES
When faced with large increases in traffic, will my site continue to load quickly at no additional cost?
  • YES, capacity automatically scales at NO additional cost.
If my server crashes, will my site stay up with zero interruption?
  • Yes, our proprietary Dynamic Traffic Management keeps your site up and running.
Can I use this even though I’m not a rocket scientist?
  • Yes, 4GH is designed for everyone.
Do I pay more if I use more bandwidth?
  • No, we won’t punish you for your success.
Am I protected against URL spoofing?
  • Yes, Premium DNS protects your domain. (with Ultimate plan)
Do I get a free SSL certificate with fixed IP?
  • YES (with Ultimate plan)
Will my site be scanned for malware vulnerabilities?
  • YES, every day (with Ultimate plan)
Will my server be protected against DoS (Denial-of-Service) and other malicious attacks?
  • YES
What level of intrusion prevention is offered?
  • Two levels. 4GH provides network AND server-level intrusion prevention.

All Plans Include

Our highly trained, courteous support staff is waiting to take your call. Whatever time it takes to assist you, that’s the time you’ll receive. We’ll resolve any issue to your complete satisfaction.

Call (888) 505-1532 to get started