Monday, November 07, 2005

OpenOffice is a suite price

Caught in the Web
Don't give Bill Gates any money
OpenOffice is a suite price

www.open office.org

This column first raved about OpenOffice almost five years ago. Now as the project celebrates its fifth anniversary the full 2.0 version of the free, full-featured office suite is available and it looks better than ever. Supported mainly by Sun Microsystems, OpenOffice gives you everything youd expect from Microsoft Office and then some. It comes with its own equivalent of Word, PowerPoint, Access and Excel, as well as separate programs for graphics and math calculations. As always, it is cross-platform compatible whether youre using Windows, Mac, Linux or Solaris and import and convert documents from Word, Word Perfect and other programs and formats. Best of all you can download it for free ideal for anyone on a budget or who just resents making Bill Gates even richer. More than 50 million users cant be wrong but some reviewers claim that OpenOffice is too bloated and can be a serious drain on your PCs resources. For free, what do you have to lose


http://bermudasun.1upsoftware.com/main.asp?SectionID=9&SubSectionID=230&ArticleID=27475&TM=60964.77

Saturday, November 05, 2005

“Phishing”-Trojan

“Phishing”
Definition: Phishing is a type of attack aimed at obtaining a user's personal or confidential information. It typically involves some sort of spam email designed to lure a user to a spoofed web site.

Also Known As: Phishing Attack, Phishing Scam
...................................................
Definition: A Trojan is a program that appears to be legitimate, but in fact does something malicious. Trojans were responsible for the Distributed Denial of Service (DDoS) attacks suffered by Yahoo and EBay in the latter part of 1999. In fact, Trojans are often used to gain backdoor access - that is to say remote, surreptitious access, to a user's system. Trojans do not replicate as viruses do, nor make copies of themselves as worms do.

There are several different types of Trojans: Remote Access Trojans (RATs), Backdoor Trojans (backdoors), IRC Trojans (IRCbots), and Keyloggers. Many of these different types can be employed in one Trojan. For example, an Keylogger that also operates as a backdoor or RAT may commonly be hidden inside game hacks. IRC Trojans are often combined with Backdoors and RATs to create collections of infected computers known as botnets.