Metadata Analyzer – MS Office Metadata, Document Integrity: “Metadata Analyzer is an analytical tool for checking MS Office documents: Microsoft Word, Microsoft Excel, Microsoft PowerPoint for unauthorized private information disclosure. The software application inserts information about an initial name, (previous) authors, corporate name(s), number of saves and other built-in & custom properties, which can infringe your privacy. Metadata Analyzer shall advise you of this information. Be professional in your office work and don’t allow unauthorized disclosure of your private information!”
UserHealth Official Homepage!
UserHealth Official Homepage! This free software is the perfect program for all computer users that spend several hours in front of the computer without breaks or pauses. It is also ideal for everybody that has difficulties in going to bed in time, like me 🙂
The purpose of this program is to be your silent health and sleep supervisor! What UserHealth actually will do is provide you with regular health, pause, and go to bed messages. The messages can be displayed like small popup windows in the right corner (Almost like a MSN login popup) or if you prefer a topmost window or just sound feedback. The messages will contain suggestions about pauses and small exercise that the user can do to stimulate the body. But the main purpose is to draw attention to the user that he or she has been using the computer for a long time and maybe need to take a break.
SMS-it !
SMS-it !: “SMS-it! allows you to send a short message (SMS = Short Message Service) to a mobile phone using your computer. SMS-it supports Picture messages, Caller Group Graphic, Operator Logo, Ringtones and Flash SMS. The messages can be sent through an attached modem, through an internet connection or directly through an attached mobile phone. If a mobile phone is attached to the computer (IE through the IR port), the contents of the inbox can be downloaded and stored in folders. The phonebook can also be downloaded and synchronized with SMS-it!.”
SourceForge.net: Project Info – hotspot-zone
SourceForge.net: Project Info – hotspot-zone: “Use hotspot-zone to turn your Linksys WRT54g access point into a WLAN hotspot. No PC needed!. It supports a captive portal and RADIUS accounting & billing with a web based backend. Ready to flash firmware for Linksys WRT54g (EWRT) others in future.”
Apple to ditch IBM, switch to Intel chips | CNET News.com
Apple to ditch IBM, switch to Intel chips | CNET News.com: “Apple has used IBM’s PowerPC processors since 1994, but will begin a phased transition to Intel’s chips, sources familiar with the situation said. Apple plans to move lower-end computers such as the Mac Mini to Intel chips in mid-2006 and higher-end models such as the Power Mac in mid-2007, sources said.
The announcement is expected Monday at Apple’s Worldwide Developer Conference in San Francisco, at which Chief Executive Steve Jobs is giving the keynote speech. The conference would be an appropriate venue: Changing the chips would require programmers to rewrite their software to take full advantage of the new processor.”
Go Apple!!!
Brazil adopts open-source software
BBC NEWS | Business | Brazil adopts open-source software: “The scene is much like any other modern office: an open-plan work space crammed with desks, telephones and computers.
But there’s one big difference. The word ‘Microsoft’ is nowhere in sight.”
Microsoft vs. Linux: Execs Talk Detente
Microsoft vs. Linux: Execs Talk Detente: “NEW ORLEANS—The often-hostile relations between Microsoft and the open-source community are thawing, and new dialogues appear to be opening between senior officials in both camps.”
How to turn your dual-monitor PC into a dual mac-PC system : Lifehacker
How to turn your dual-monitor PC into a dual mac-PC system : Lifehacker: “I have what I believe is my dream setup. My office desk has one keyboard and mouse in the middle, and two monitors above. On the left, I have OS X running from my powerbook and on the right, I have Windows XP running on my HP desktop. There’s one mouse pointer and I can move it back and forth across the monitors just like I was on a single system. While I can’t drag windows from one monitor to the other, I can copy and paste text across and move files easily with mapped desktop drives on both ends.”
SQL Injection Attacks by Example
SQL Injection Attacks by Example: “SQL Injection Attacks by Example: “SQL Injection” is subset of the an unverified/unsanitized user input vulnerability (“buffer overflows” are a different subset), and the idea is to convince the application to run SQL code that was not intended. If the application is creating SQL strings naively on the fly and then running them, it’s straightforward to create some real surprises.”
smash’s world 6.8c: My Favorite Mac OS X Hacks and Tips –_ the offical homepage of Ben Guild (smash)
smash’s world 6.8c: My Favorite Mac OS X Hacks and Tips –_ the offical homepage of Ben Guild (smash): “My PowerBook just got back from AppleCare after almost a month due to a parts shortage… usually it’s back in like 1 or 2 days, this was the first time I’d been a bit upset! Anyway, so today I’ve been getting things set back up to my liking and I have a few tips for Mac users… some I just learned about and some that are simply overlooked.”
