<?xml version="1.0" encoding="UTF-8"?>
<rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>ComputerFitness.com</title>
	<atom:link href="http://www.computerfitness.com/blog/feed/" rel="self" type="application/rss+xml" />
	<link>http://www.computerfitness.com/blog</link>
	<description>Business Technical Support: Desktop, Laptop, Servers, Routers, and Security</description>
	<lastBuildDate>Sat, 21 Jul 2012 16:14:44 +0000</lastBuildDate>
	<language>en</language>
	<sy:updatePeriod>hourly</sy:updatePeriod>
	<sy:updateFrequency>1</sy:updateFrequency>
			<item>
		<title>How to Increase the Security for Your Website</title>
		<link>http://www.computerfitness.com/blog/2011/11/how-to-increase-the-security-for-your-website/</link>
		<comments>http://www.computerfitness.com/blog/2011/11/how-to-increase-the-security-for-your-website/#comments</comments>
		<pubDate>Fri, 18 Nov 2011 20:18:52 +0000</pubDate>
		<dc:creator>Dustin</dc:creator>
				<category><![CDATA[Firewall]]></category>
		<category><![CDATA[Information Security]]></category>
		<category><![CDATA[Web Development]]></category>
		<category><![CDATA[business website]]></category>
		<category><![CDATA[protection]]></category>
		<category><![CDATA[secure]]></category>
		<category><![CDATA[secure website]]></category>
		<category><![CDATA[website]]></category>

		<guid isPermaLink="false">http://www.computerfitness.com/blog/?p=1331</guid>
		<description><![CDATA[<div class="wp_twitter_button" style="float: right; margin-left: 10px;">
					<a href="http://twitter.com/share?counturl=http%3A%2F%2Fwww.computerfitness.com%2Fblog%2F2011%2F11%2Fhow-to-increase-the-security-for-your-website%2F" class="twitter-share-button" data-url="http://www.computerfitness.com/blog/2011/11/how-to-increase-the-security-for-your-website/" data-count="vertical" data-via="" data-lang="de" data-text="How to Increase the Security for Your Website &#187; ComputerFitness.com #business website #Firewall #Infor [...]">Tweet</a><br />
					
				</div>
<p style="text-align: left;">The security of your business’s website should be one of your highest priorities. A secure website is one of the best ways that you can establish trust with your customers. The security of your website will directly impact your number of visitors and has the potential to hinder or boost your sales. With the massive number of website intrusions this year alone, hacking has become a major concern for most online shoppers. Whether it is to protect your website or your customers personal or financial data, a secure website is a must have. The following are some tips for creating a strong and secure website environment for your consumers.  <a href="http://www.cdtek.com/blog/wp-content/uploads/2011/11/Securing-Your-Website.jpg"><img class="alignright" title="Securing Your Website" src="http://www.cdtek.com/blog/wp-content/uploads/2011/11/Securing-Your-Website.jpg" alt="Securing Your Website" width="191" height="205" /></a></p>
<p><strong>Use a Strong Administrative and Database Password: </strong></p>
<p>Creating a <a title="strong administrative and database password" href="http://www.computerfitness.com/blog/2010/12/strong-passwords-major-elements-that-every-password-should-include/" target="_blank"> strong administrative and database password</a> will prevent hackers from accessing the admin interface and from taking over your entire online business. If a hacker does gain entry to your website’s administration panel they can pretty much do whatever they please from defacing your website to committing fraud by pretending to be you or your company. To learn more about creating strong passwords visit <a title="Elements of a Strong Password." href="http://www.computerfitness.com/blog/2010/12/strong-passwords-major-elements-that-every-password-should-include/" target="_blank"> Elements of a Strong Password.</a></p>
<p><strong>Secure Admin Email Address </strong></p>
<p>An admin email address is used to login to your web server, CMS, database. It should be kept private and different from the one that you have on your contact page.</p>
<p><strong>Make sure you have Firewalls Implemented: </strong></p>
<p>Configuring a <a title="firewall" href="http://searchsecurity.techtarget.com/definition/firewall" target="_blank"> firewall</a> will help prevent unauthorized access to your site and acts as a filter for the information that is sent to and from your website. You should configure your firewall to the highest security preferences so that it will deter hackers from attempting to gain entry to your site.</p>
<p><strong>Update Your Antivirus Program Regularly: </strong></p>
<p>New malicious programs are created and discovered every day so&#8230; <a href="http://www.computerfitness.com/blog/2011/11/how-to-increase-the-security-for-your-website/" class="read_more">Read the rest</a></p>]]></description>
		<wfw:commentRss>http://www.computerfitness.com/blog/2011/11/how-to-increase-the-security-for-your-website/feed/</wfw:commentRss>
		<slash:comments>1</slash:comments>
		</item>
		<item>
		<title>Apple Resolves the Issue Plaguing the Battery Life of Their iPhones . . . . Maybe</title>
		<link>http://www.computerfitness.com/blog/2011/11/apple-resolves-the-issue-plaguing-the-battery-life-of-their-iphones%e2%80%a6-maybe/</link>
		<comments>http://www.computerfitness.com/blog/2011/11/apple-resolves-the-issue-plaguing-the-battery-life-of-their-iphones%e2%80%a6-maybe/#comments</comments>
		<pubDate>Fri, 11 Nov 2011 16:51:11 +0000</pubDate>
		<dc:creator>Dustin</dc:creator>
				<category><![CDATA[Electronics]]></category>
		<category><![CDATA[SmartPhone]]></category>
		<category><![CDATA[Apple]]></category>
		<category><![CDATA[battery life]]></category>
		<category><![CDATA[iOS]]></category>
		<category><![CDATA[IOS 5]]></category>
		<category><![CDATA[iOS 5 update]]></category>
		<category><![CDATA[Iphone]]></category>
		<category><![CDATA[iPhone bug]]></category>
		<category><![CDATA[iPhone update]]></category>

		<guid isPermaLink="false">http://www.computerfitness.com/blog/?p=1326</guid>
		<description><![CDATA[<div class="wp_twitter_button" style="float: right; margin-left: 10px;">
					<a href="http://twitter.com/share?counturl=http%3A%2F%2Fwww.computerfitness.com%2Fblog%2F2011%2F11%2Fapple-resolves-the-issue-plaguing-the-battery-life-of-their-iphones%25e2%2580%25a6-maybe%2F" class="twitter-share-button" data-url="http://www.computerfitness.com/blog/2011/11/apple-resolves-the-issue-plaguing-the-battery-life-of-their-iphones%e2%80%a6-maybe/" data-count="vertical" data-via="" data-lang="de" data-text="Apple Resolves the Issue Plaguing the Battery Life of Their iPhones . . . . Maybe &#187; ComputerFitness.co [...]">Tweet</a><br />
					
				</div>
<p>Shortly after the release of the iPhone 4S and the iOS 5 software update many users began experiencing major problems with the life of their iPhone batteries. In our last blog post we addressed these issues and even provided some <a title="tips for conserving your iPhone's battery" href="http://www.computerfitness.com/blog/2011/11/tips-for-conserving-your-iphones-battery-life/" target="_blank">tips for conserving your iPhone&#8217;s battery</a>. In the article we discussed how Apple had announced that their iOS 5 update was at fault and that they were working hard to bring an update to resolve the issue as soon as possible.</p>
<div class="wp-caption alignright" style="width: 283px"><a href="http://www.cdtek.com/blog/wp-content/uploads/2011/11/full-iPhone-battery.jpg"><img title="full iPhone battery" src="http://www.cdtek.com/blog/wp-content/uploads/2011/11/full-iPhone-battery.jpg" alt="full iPhone battery" width="273" height="148" /></a>
<p class="wp-caption-text">Image of the iPhones Full Battery Icon</p>
</div>
<p>Yesterday, <a title="Apple" href="http://www.apple.com/" target="_blank">Apple</a> released the new iOS 5.0.1 software update for the iPhone,  iPad and iPod Touch, the update is supposed to fix the battery problems that a number of users have reported with iOS 5 over the last few weeks. Along with a fix for the bugs that were affecting the battery life, the latest update also added multitasking gestures for the original iPad, resolved bugs with documents in the cloud, and improved voice recognition for Australian users using the dictation feature.</p>
<p>The update is now available in iTunes or also available with the over-the-air function for existing iOS 5 users. Users with the previous iOS 5 can update by going into Settings&#62;General&#62;Software Update to update their device over-the-air. Using the update OTA provides a much faster experience due to the smaller size of the update file. For users who are not operating on iOS 5 they can update their operating system the traditional way by plugging in their device into <a title="iTunes" href="http://www.itunes.com/" target="_blank"> iTunes</a>.</p>
<div class="wp-caption aligncenter" style="width: 310px"><a href="http://www.cdtek.com/blog/wp-content/uploads/2011/11/iOS-5.01.jpg"><img title="iOS 5.0.1 update" src="http://www.cdtek.com/blog/wp-content/uploads/2011/11/iOS-5.01-300x137.jpg" alt="iOS 5.0.1 update" width="300" height="137" /></a>
<p class="wp-caption-text">Image of iOS 5.0.1 update</p>
</div>
<p>Although the update has only just been released it has been reported at <a title="PCWorld" href="http://www.pcworld.com/article/243611/apples_ios_5_update_no_battery_drain_fix.html" target="_blank">PCWorld</a> that some users are still experiencing a slightly faster battery depletion rate. One user posted on&#8230; <a href="http://www.computerfitness.com/blog/2011/11/apple-resolves-the-issue-plaguing-the-battery-life-of-their-iphones%e2%80%a6-maybe/" class="read_more">Read the rest</a></p>]]></description>
		<wfw:commentRss>http://www.computerfitness.com/blog/2011/11/apple-resolves-the-issue-plaguing-the-battery-life-of-their-iphones%e2%80%a6-maybe/feed/</wfw:commentRss>
		<slash:comments>0</slash:comments>
		</item>
		<item>
		<title>Tips for conserving your iPhone&#8217;s Battery life</title>
		<link>http://www.computerfitness.com/blog/2011/11/tips-for-conserving-your-iphones-battery-life/</link>
		<comments>http://www.computerfitness.com/blog/2011/11/tips-for-conserving-your-iphones-battery-life/#comments</comments>
		<pubDate>Fri, 04 Nov 2011 13:23:00 +0000</pubDate>
		<dc:creator>Dustin</dc:creator>
				<category><![CDATA[Electronics]]></category>
		<category><![CDATA[SmartPhone]]></category>
		<category><![CDATA[Apple iPhone]]></category>
		<category><![CDATA[battery]]></category>
		<category><![CDATA[battery life]]></category>
		<category><![CDATA[IOS 5]]></category>
		<category><![CDATA[Iphone]]></category>
		<category><![CDATA[iPhone 4S]]></category>
		<category><![CDATA[iPhone battery]]></category>
		<category><![CDATA[iPhone settings]]></category>
		<category><![CDATA[iPhone update]]></category>

		<guid isPermaLink="false">http://www.computerfitness.com/blog/?p=1308</guid>
		<description><![CDATA[<div class="wp_twitter_button" style="float: right; margin-left: 10px;">
					<a href="http://twitter.com/share?counturl=http%3A%2F%2Fwww.computerfitness.com%2Fblog%2F2011%2F11%2Ftips-for-conserving-your-iphones-battery-life%2F" class="twitter-share-button" data-url="http://www.computerfitness.com/blog/2011/11/tips-for-conserving-your-iphones-battery-life/" data-count="vertical" data-via="" data-lang="de" data-text="Tips for conserving your iPhone&#8217;s Battery life &#187; ComputerFitness.com #Apple iPhone #battery #bat [...]">Tweet</a><br />
					
				</div>
<p style="text-align: left;">A couple weeks ago <a title="Apple" href="http://www.apple.com/" target="_blank">Apple</a> released the <a title="iPhone 4S" href="http://www.apple.com/iphone/" target="_blank">iPhone 4S</a> which is their latest mobile device. Along with the 4S, Apple also released their latest mobile operating system upgrade. The iOS 5 comes standard on the iPhone 4S but is also available as a free download to all compatible iPhone users. Since the release, a small but significant number of users have reported a drastically shortened battery life.</p>
<div class="wp-caption alignright" style="width: 138px;"><a href="http://www.cdtek.com/blog/wp-content/uploads/2011/11/iPhones-Low-Battery-Display.jpg"><img title="iPhone's Low Battery Display - Tips for conserving your iPhone&#38;rsquo;s Battery life" src="http://www.cdtek.com/blog/wp-content/uploads/2011/11/iPhones-Low-Battery-Display.jpg" alt="iPhone's Low Battery Display - Tips for conserving your iPhone&#38;rsquo;s Battery life" width="128" height="167" /></a>
<p class="wp-caption-text">iPhone&#8217;s Low Battery Display</p>
</div>
<p>According to <a title="The Loop’s Jim Dairymple" href="http://www.loopinsight.com/author/jim-dalrymple/" target="_blank">The Loop’s Jim Dairymple</a> on Wednesday November 2, 2011 <a title="Apple Confirms Battery Issues" href="http://www.loopinsight.com/2011/11/02/apple-confirms-battery-life-issues-in-ios-5/" target="_blank">Apple confirmed that the battery issues were due to a bug in the iOS 5</a> software update. According to the article Apple reassured users that they have found a few bugs that are affecting battery life and will release a software update to address them in a few weeks to help conserve your iPhone&#38;rsquo;s battery life.</p>
<p>In light of the recent problems surrounding the iPhone’s battery we thought it would be beneficial to discuss some methods for conserving your phones battery life. Although this particular problem was a result of a bug in the software we feel that these tips will still be tremendously useful because iPhones already have a natural short battery life due to its powerful performance and crisp display. The suggestions below for saving your phones battery are applicable to all iPhone models and are designed to ensure that you have the juice when you need it the most.</p>
<ul>
<li><strong>Close Background and Inactive Applications</strong> – Double tap the home button to access the list of running applications. Similar to how you would move the apps hold your finger down on the application for a couple seconds and then select close when the app begins to shake.</li>
</ul>
<ul>
<li><strong>Use the Auto Brightness Feature</strong> – Access the settings folder,</li></ul><p>&#8230; <a href="http://www.computerfitness.com/blog/2011/11/tips-for-conserving-your-iphones-battery-life/" class="read_more">Read the rest</a></p>]]></description>
		<wfw:commentRss>http://www.computerfitness.com/blog/2011/11/tips-for-conserving-your-iphones-battery-life/feed/</wfw:commentRss>
		<slash:comments>0</slash:comments>
		</item>
		<item>
		<title>Google Abruptly Changes a Longtime Search Command</title>
		<link>http://www.computerfitness.com/blog/2011/10/google-abruptly-changes-a-longtime-search-command/</link>
		<comments>http://www.computerfitness.com/blog/2011/10/google-abruptly-changes-a-longtime-search-command/#comments</comments>
		<pubDate>Thu, 27 Oct 2011 16:06:29 +0000</pubDate>
		<dc:creator>Dustin</dc:creator>
				<category><![CDATA[Google]]></category>
		<category><![CDATA[Search Engines]]></category>
		<category><![CDATA[boolean search]]></category>
		<category><![CDATA[command]]></category>
		<category><![CDATA[google]]></category>
		<category><![CDATA[google search]]></category>
		<category><![CDATA[quotation mark operation]]></category>
		<category><![CDATA[search]]></category>
		<category><![CDATA[search command]]></category>

		<guid isPermaLink="false">http://www.computerfitness.com/blog/?p=1301</guid>
		<description><![CDATA[<div class="wp_twitter_button" style="float: right; margin-left: 10px;">
					<a href="http://twitter.com/share?counturl=http%3A%2F%2Fwww.computerfitness.com%2Fblog%2F2011%2F10%2Fgoogle-abruptly-changes-a-longtime-search-command%2F" class="twitter-share-button" data-url="http://www.computerfitness.com/blog/2011/10/google-abruptly-changes-a-longtime-search-command/" data-count="vertical" data-via="" data-lang="de" data-text="Google Abruptly Changes a Longtime Search Command &#187; ComputerFitness.com #boolean search #command #goog [...]">Tweet</a><br />
					
				</div>
<p>Saying that <a title="Google" href="http://www.google.com/" target="_blank">Google</a> changed the +Search command may not be the best way to describe Google’s actions. Instead of announcing that they were going to be replacing the +search command they quietly pulled the rug out from under its users and completely removed the <a title="Boolean + search command" href="http://www.cdtek.com/blog/2010-12/not-the-results-you-wanted-how-to-search-the-internet-more-efficiently/" target="_blank">Boolean + search command</a>. Google is now ignoring the + symbol without so much as a blog post to let people know.</p>
<p><a href="http://www.cdtek.com/blog/wp-content/uploads/2011/10/+command.jpg"><img class="alignright" title="+command" src="http://www.cdtek.com/blog/wp-content/uploads/2011/10/+command-300x42.jpg" alt="" width="300" height="42" /></a></p>
<p>Although Google has decided to ignore searches with the + command they have expanded the role of the quotation marks to incorporate the + command functionality. After years of performing searches with + commands it will probably take time for some users to get used to the new way of searching.</p>
<p><strong> Old Way: Keyword + Keyword + Keyword </strong></p>
<p><strong> </strong></p>
<p><strong> New Way: Keyword “Keyword” “Keyword” </strong></p>
<p>On a <a title="Google Help Forum" href="http://www.google.com/support/forum/p/Web%20Search/thread?tid=151ef6cf0a761b74&#38;hl=en" target="_blank">Google Help Forum</a>, Kelly an employee from Google offered the following explanation.</p>
<p style="padding-left: 30px;">“ We&#8217;ve made the ways you can tell Google exactly what you want more consistent by expanding the functionality of the quotation mark operator. In addition to using this operator to search for an exact phrase, you can now add quotation marks around a <em>single</em> word to tell Google to match that word precisely. So, if in the past you would have searched for [magazine +latina], you should now search for [magazine "Latina"].&#8221;</p>
<p style="padding-left: 30px;">&#8220;We&#8217;re constantly making changes to Google Search &#8211; adding new features, tweaking the look and feel, running experiments, &#8211; all to get you the information you need as quickly and as easily as possible. This recent change is another step toward simplifying the search experience to get you to the info you want.”</p>
<p>Google may have stated that they have made these improvements to help users get to the information quicker and easier but it doesn’t really seem to benefit anyone but them. Some online&#8230; <a href="http://www.computerfitness.com/blog/2011/10/google-abruptly-changes-a-longtime-search-command/" class="read_more">Read the rest</a></p>]]></description>
		<wfw:commentRss>http://www.computerfitness.com/blog/2011/10/google-abruptly-changes-a-longtime-search-command/feed/</wfw:commentRss>
		<slash:comments>0</slash:comments>
		</item>
		<item>
		<title>Sharing Business Resources without Using Microsoft Exchange</title>
		<link>http://www.computerfitness.com/blog/2011/10/sharing-business-resources-without-using-microsoft-exchange/</link>
		<comments>http://www.computerfitness.com/blog/2011/10/sharing-business-resources-without-using-microsoft-exchange/#comments</comments>
		<pubDate>Fri, 21 Oct 2011 21:11:45 +0000</pubDate>
		<dc:creator>Dustin</dc:creator>
				<category><![CDATA[Desktop - Workstation]]></category>
		<category><![CDATA[Networking]]></category>
		<category><![CDATA[Storage]]></category>
		<category><![CDATA[cloud]]></category>
		<category><![CDATA[collaboration]]></category>
		<category><![CDATA[file sharing]]></category>
		<category><![CDATA[microsoft]]></category>
		<category><![CDATA[microsoft exchange]]></category>
		<category><![CDATA[Microsoft Outlook]]></category>
		<category><![CDATA[server]]></category>
		<category><![CDATA[Zimbra]]></category>

		<guid isPermaLink="false">http://www.computerfitness.com/blog/?p=1289</guid>
		<description><![CDATA[<div class="wp_twitter_button" style="float: right; margin-left: 10px;">
					<a href="http://twitter.com/share?counturl=http%3A%2F%2Fwww.computerfitness.com%2Fblog%2F2011%2F10%2Fsharing-business-resources-without-using-microsoft-exchange%2F" class="twitter-share-button" data-url="http://www.computerfitness.com/blog/2011/10/sharing-business-resources-without-using-microsoft-exchange/" data-count="vertical" data-via="" data-lang="de" data-text="Sharing Business Resources without Using Microsoft Exchange &#187; ComputerFitness.com #cloud #collaboratio [...]">Tweet</a><br />
					
				</div>
<p style="text-align: left;">File sharing is the storing and distribution of digitally stored information. File sharing has quickly become an integral part of most businesses. With file sharing, companies and their employees can easily share resources such as computer applications, multimedia content, and documents.</p>
<p><strong>Companies utilize a file sharing environment to: </strong></p>
<div class="wp-caption alignright" style="width: 246px"><a href="http://www.cdtek.com/blog/wp-content/uploads/2011/10/Zimbra.jpg"><img title="Zimbra" src="http://www.cdtek.com/blog/wp-content/uploads/2011/10/Zimbra.jpg" alt="Zimbra" width="236" height="208" /></a>
<p class="wp-caption-text">from http://www.zimbra.com/products/desktop_features.html, Oct 2011</p>
</div>
<ul>
<li style="text-align: left;">Save time</li>
<li>Cut costs</li>
<li>Increase productivity</li>
<li>Organize and centralize information for easy retrieval</li>
<li>Make content sharing faster</li>
<li>Share of hardware</li>
<li>Protect data and make backups</li>
<li>Increase the performance of existing PC equipment</li>
</ul>
<p>File sharing can occur in a couple of different ways, the two most popular being a centralized server on a network and a collaborative cloud based service. Recently more and more businesses have been moving more towards the cloud based services, which is why we decided to look into some of the most popular collaborative cloud applications. The one that stood out the most was <a title="Zimbra Collaboration Server" href="http://www.zimbra.com/products/zimbra-open-source.html" target="_blank">Zimbra Collaboration Server</a>. Zimbra is advertised as the leader among open source email and collaboration systems. Zimbra uses a cloud infrastructure as its primary storage as opposed to using the desktop or a network server like <a title="Microsoft Exchange and Outlook" href="http://www.mircosoft.com/" target="_blank">Microsoft Exchange and Outlook</a>.</p>
<p>Zimbra is a browser based enterprise class open source email, calendar, and collaboration platform that is designed for portability over private and public clouds. Along with its mobility it is also simpler to manage and more cost effective to scale. Zimbra keeps you organized and productive because your information is always assessable.</p>
<p>The <a title="Zimbra Collaboration Server" href="http://www.zimbra.com/products/network-collaboration-server.html" target="_blank">Zimbra Collaboration Server</a> offers rich email, contact management, group calendars, Tasks, sharing and document management, mobility, desktop sync, archiving and discovery, and powerful administrative tools. With the free <a title="Zimbra" href="http://www.zimbra.com/products/desktop.html" target="_blank">Zimbra</a> desktop client you are able to combine both online and offline services. The desktop client enables users to store and&#8230; <a href="http://www.computerfitness.com/blog/2011/10/sharing-business-resources-without-using-microsoft-exchange/" class="read_more">Read the rest</a></p>]]></description>
		<wfw:commentRss>http://www.computerfitness.com/blog/2011/10/sharing-business-resources-without-using-microsoft-exchange/feed/</wfw:commentRss>
		<slash:comments>0</slash:comments>
		</item>
		<item>
		<title>Simple Tips to Securing Your Laptop</title>
		<link>http://www.computerfitness.com/blog/2011/10/simple-tips-to-securing-your-laptop/</link>
		<comments>http://www.computerfitness.com/blog/2011/10/simple-tips-to-securing-your-laptop/#comments</comments>
		<pubDate>Fri, 14 Oct 2011 21:08:12 +0000</pubDate>
		<dc:creator>Dustin</dc:creator>
				<category><![CDATA[Information Security]]></category>
		<category><![CDATA[computer]]></category>
		<category><![CDATA[Laptop]]></category>
		<category><![CDATA[laptop protection]]></category>
		<category><![CDATA[laptop security]]></category>
		<category><![CDATA[password]]></category>
		<category><![CDATA[theft protection]]></category>

		<guid isPermaLink="false">http://www.computerfitness.com/blog/?p=1283</guid>
		<description><![CDATA[<div class="wp_twitter_button" style="float: right; margin-left: 10px;">
					<a href="http://twitter.com/share?counturl=http%3A%2F%2Fwww.computerfitness.com%2Fblog%2F2011%2F10%2Fsimple-tips-to-securing-your-laptop%2F" class="twitter-share-button" data-url="http://www.computerfitness.com/blog/2011/10/simple-tips-to-securing-your-laptop/" data-count="vertical" data-via="" data-lang="de" data-text="Simple Tips to Securing Your Laptop &#187; ComputerFitness.com #computer #Information Security #Laptop #lap [...]">Tweet</a><br />
					
				</div>
<p>Back in 2005 the FBI reported that the losses due to laptop theft were estimated around $3.5 million. They also identified that the average cost associated with a lost company laptop was around $32,000. Since 2005 the number of laptop users has dramatically increased and it has been assessed that one in ten laptops have or will be stolen. Laptop protection has become a major concern for many laptop users. The threat that laptop thieves pose is more than just concern for our expensive devices, it triggers our fear that someone could have access to our stolen and vital personal information.</p>
<div class="mceTemp">
<dl id="attachment_1523" class="wp-caption alignright" style="width: 291px;">
<dt><a href="http://www.internetbeacon.com/blog/wp-content/uploads/2011/10/laptoplock.jpg"><img title="Kensington Laptop Cable Lock" src="http://www.internetbeacon.com/blog/wp-content/uploads/2011/10/laptoplock.jpg" alt="Kensington Laptop Cable Lock" width="281" height="219" /></a> </dt>
<dd>From http://www.kensington.com/kensington/us/us/s/1386/clicksafe%c2%ae-laptop-locks.aspx , Oct 2011</dd>
</dl>
</div>
<p>Laptop theft is a significant and serious threat. Thieves will often target laptops because they are small, easy to grab, easy to conceal, there is a market for them, and they are a quick way to get cash. Most of these criminals target laptops because they know that a property theft charge is a better alternative to a personal robbery charge. Once stolen, a laptop can then be sold to a used computer store or pawn shops for as much as half the original retail costs.</p>
<p>What can you do to secure your laptop? There are two components to laptop security, the physical side and the virtual. Physical protection refers to instinctual protection like keeping your laptop with you, keeping it out of sight as well as purchasing protection devices such as cable locks, laptop safes, and motion detector alarms. Virtual security on the other hand implies defenses such as software protection programs, passwords, and tracking safeguards.</p>
<p>The following guide is intended to identify security techniques and tools to protect you from being a victim of a laptop theft. The tips will cover practical security methods, virtual defense techniques, and physical protection devices. For the best protection it is recommended that you use a&#8230; <a href="http://www.computerfitness.com/blog/2011/10/simple-tips-to-securing-your-laptop/" class="read_more">Read the rest</a></p>]]></description>
		<wfw:commentRss>http://www.computerfitness.com/blog/2011/10/simple-tips-to-securing-your-laptop/feed/</wfw:commentRss>
		<slash:comments>0</slash:comments>
		</item>
		<item>
		<title>Alternative Defragmentation Software May Not Be the Best Solution</title>
		<link>http://www.computerfitness.com/blog/2011/10/alternative-defragmentation-software-may-not-be-the-best-solution/</link>
		<comments>http://www.computerfitness.com/blog/2011/10/alternative-defragmentation-software-may-not-be-the-best-solution/#comments</comments>
		<pubDate>Thu, 06 Oct 2011 20:25:35 +0000</pubDate>
		<dc:creator>Dustin</dc:creator>
				<category><![CDATA[Desktop - Workstation]]></category>
		<category><![CDATA[PC]]></category>
		<category><![CDATA[PC Maintenance]]></category>
		<category><![CDATA[data]]></category>
		<category><![CDATA[defragment]]></category>
		<category><![CDATA[defragmentation software]]></category>
		<category><![CDATA[file]]></category>
		<category><![CDATA[files]]></category>
		<category><![CDATA[fragmentation]]></category>
		<category><![CDATA[Software]]></category>
		<category><![CDATA[system]]></category>

		<guid isPermaLink="false">http://www.computerfitness.com/blog/?p=1274</guid>
		<description><![CDATA[<div class="wp_twitter_button" style="float: right; margin-left: 10px;">
					<a href="http://twitter.com/share?counturl=http%3A%2F%2Fwww.computerfitness.com%2Fblog%2F2011%2F10%2Falternative-defragmentation-software-may-not-be-the-best-solution%2F" class="twitter-share-button" data-url="http://www.computerfitness.com/blog/2011/10/alternative-defragmentation-software-may-not-be-the-best-solution/" data-count="vertical" data-via="" data-lang="de" data-text="Alternative Defragmentation Software May Not Be the Best Solution &#187; ComputerFitness.com #data #defragm [...]">Tweet</a><br />
					
				</div>
<div class="wp-caption alignright" style="width: 214px;"><a href="http://www.cdtek.com/blog/wp-content/uploads/2011/10/Defraggler.jpg"><img title="Defraggler" src="http://www.cdtek.com/blog/wp-content/uploads/2011/10/Defraggler.jpg" alt="Defraggler" width="204" height="205" /></a>
<p class="wp-caption-text">from http://www.piriform.com/defraggler, October 2011</p>
</div>
<p><a title="Defragmentation" href="http://www.wisegeek.com/what-is-defragmenting-a-computer.htm" target="_blank">Defragmentation</a> is a process that mitigates and reverses fragmentation. File system fragmentation occurs when the system is unable to maintain the data in a sequential order. During fragmentation data that is in memory is broken into pieces and dispersed throughout the system. One of the major problems that occur with fragmented data is an increase in the time it takes for the system to access files and programs.</p>
<p>Files on a drive are commonly known as blocks or clusters. These files are stored on a file system and are positioned one next to another. When files are added, removed, or changes the amount of space between these files is altered and the system no longer has enough room to hold the entire file. The system will then fill in these small spaces with portions of new files or files that have been adjusted, causing data to become separated from the rest of the file. This separation creates a delay in <a title="Seek Time" href="http://www.pcguide.com/ref/hdd/perf/perf/spec/posSeek-c.html" target="_blank">Seek Time</a> and Rotational Latency. Seek Time is the time that it takes the head assembly to travel to the portion of the disk where the data will be read or written. The Rotational latency is the delay waiting for the rotation of the disk to bring the required disk sector under the head assembly.</p>
<p>The primary purpose of a defragmentation tool is to sort, organize, and compact similar blocks of data in order to reduce wasted space as well as to speed up access time. Windows operating systems come pre-installed with their own “<a title="Disk Defragmenter" href="http://windows.microsoft.com/en-US/windows-vista/Improve-performance-by-defragmenting-your-hard-disk" target="_blank">Disk Defragmenter</a>” utility. This utility is designed to increase access speeds by rearranging files contiguously. Many users feel that the pre-installed defragger isn’t the best on the market and have considered using alternative defragging tools. For the most part defragmentation software all does the same thing but it is&#8230; <a href="http://www.computerfitness.com/blog/2011/10/alternative-defragmentation-software-may-not-be-the-best-solution/" class="read_more">Read the rest</a></p>]]></description>
		<wfw:commentRss>http://www.computerfitness.com/blog/2011/10/alternative-defragmentation-software-may-not-be-the-best-solution/feed/</wfw:commentRss>
		<slash:comments>0</slash:comments>
		</item>
		<item>
		<title>How to Protect Yourself from Online Identity Theft</title>
		<link>http://www.computerfitness.com/blog/2011/09/how-to-protect-yourself-from-online-identity-theft/</link>
		<comments>http://www.computerfitness.com/blog/2011/09/how-to-protect-yourself-from-online-identity-theft/#comments</comments>
		<pubDate>Fri, 23 Sep 2011 21:31:41 +0000</pubDate>
		<dc:creator>Dustin</dc:creator>
				<category><![CDATA[Information Security]]></category>
		<category><![CDATA[Internet]]></category>
		<category><![CDATA[account protection]]></category>
		<category><![CDATA[computer security]]></category>
		<category><![CDATA[credit report]]></category>
		<category><![CDATA[identity]]></category>
		<category><![CDATA[identity theft]]></category>
		<category><![CDATA[online identity theft]]></category>
		<category><![CDATA[theft]]></category>

		<guid isPermaLink="false">http://www.computerfitness.com/blog/?p=1267</guid>
		<description><![CDATA[<div class="wp_twitter_button" style="float: right; margin-left: 10px;">
					<a href="http://twitter.com/share?counturl=http%3A%2F%2Fwww.computerfitness.com%2Fblog%2F2011%2F09%2Fhow-to-protect-yourself-from-online-identity-theft%2F" class="twitter-share-button" data-url="http://www.computerfitness.com/blog/2011/09/how-to-protect-yourself-from-online-identity-theft/" data-count="vertical" data-via="" data-lang="de" data-text="How to Protect Yourself from Online Identity Theft &#187; ComputerFitness.com #account protection #computer [...]">Tweet</a><br />
					
				</div>
<p>Identity theft is when a criminal illegally obtains and uses an individual’s personal information such as their social security number and driver&#8217;s license number, for fraudulent purposes. Once Identity theft criminals gain access to this private information they will pose as that person usually to acquire credit, merchandise, or services.</p>
<p>There are two main types of identity theft, account takeover and true name ID theft. Account takeover identify theft is when a thief uses the stolen personal data to gain access to existing bank accounts. True name identity theft they will use the personal information to open new accounts, credit cards, and services.</p>
<p>The Internet provides these types of criminal with a perfect hunting ground. It’s extremely easy to target Internet users because of the vast accumulation of information as well as the effortlessness of performing a transaction without verification. Although recently the number of database hacking attacks has dramatically increased, most identity thieves still obtain our information from spying over our shoulders or digging through our trash.</p>
<p>According to a recent survey from <a title="Javelin Research and Strategy" href="https://www.javelinstrategy.com/research/Brochure-209" target="_blank">Javelin Research and Strategy</a></p>
<p><em>“In 2010, identity theft and fraud claimed fewer victims than in any other period since Javelin began conducting surveys in 2003. Driving that decrease was the reduced rate of existing account fraud, although incidents of all types of fraud dropped from 2009. Meanwhile, consumer costs, the average out?of?pocket dollar amount victims pay, increased, reversing a downward trend in recent years. This increase can be attributed to new account fraud, which showed longer periods of misuse and detection and therefore more dollar losses associated with it than any other type of fraud.”</em></p>
<p>The survey also identified account takeover, friendly fraud, and improper use of privacy settings on social media networks to be the growing problems. Several other issues include people not shredding important documents, using weak online passwords, and neglecting to use anti-malware software. The survey found that 48%&#8230; <a href="http://www.computerfitness.com/blog/2011/09/how-to-protect-yourself-from-online-identity-theft/" class="read_more">Read the rest</a></p>]]></description>
		<wfw:commentRss>http://www.computerfitness.com/blog/2011/09/how-to-protect-yourself-from-online-identity-theft/feed/</wfw:commentRss>
		<slash:comments>0</slash:comments>
		</item>
		<item>
		<title>Tips for Increasing Productivity by Keeping a Clean and Organized PC</title>
		<link>http://www.computerfitness.com/blog/2011/09/tips-to-increase-productivity-by-keeping-a-clean-and-organized-pc/</link>
		<comments>http://www.computerfitness.com/blog/2011/09/tips-to-increase-productivity-by-keeping-a-clean-and-organized-pc/#comments</comments>
		<pubDate>Fri, 09 Sep 2011 16:00:19 +0000</pubDate>
		<dc:creator>Dustin</dc:creator>
				<category><![CDATA[Desktop - Workstation]]></category>
		<category><![CDATA[Email]]></category>
		<category><![CDATA[PC Maintenance]]></category>
		<category><![CDATA[Storage]]></category>
		<category><![CDATA[computer maintenance]]></category>
		<category><![CDATA[files]]></category>
		<category><![CDATA[folders]]></category>
		<category><![CDATA[increase productivity]]></category>
		<category><![CDATA[Maintenance]]></category>
		<category><![CDATA[media content]]></category>
		<category><![CDATA[Organization]]></category>
		<category><![CDATA[pc]]></category>

		<guid isPermaLink="false">http://www.computerfitness.com/blog/?p=1248</guid>
		<description><![CDATA[<div class="wp_twitter_button" style="float: right; margin-left: 10px;">
					<a href="http://twitter.com/share?counturl=http%3A%2F%2Fwww.computerfitness.com%2Fblog%2F2011%2F09%2Ftips-to-increase-productivity-by-keeping-a-clean-and-organized-pc%2F" class="twitter-share-button" data-url="http://www.computerfitness.com/blog/2011/09/tips-to-increase-productivity-by-keeping-a-clean-and-organized-pc/" data-count="vertical" data-via="" data-lang="de" data-text="Tips for Increasing Productivity by Keeping a Clean and Organized PC &#187; ComputerFitness.com #computer m [...]">Tweet</a><br />
					
				</div>
<p style="text-align: left;">It is critical to perform <a title="routine maintenance on your PC" href="http://www.computerfitness.com/blog/2010/12/is-your-computer-running-slower-than-normal-how-to-regain-your-computers-speed/" target="_blank">routine maintenance on your PC</a> in order to preserve its performance level. Computers can quickly get bogged down with too much data and the inability to quickly locate your important documents can lead to frustration. The same organizational skills that you practice in the real world should translate over into the virtual space of your computer. Keeping your PC clean and organized will not only help to keep your files easily accessible but it can also reduce your stress and save some time. The following are some simple tips to follow when it comes to organizing your PC files. <a href="http://www.cdtek.com/images/business-productivity.jpg"><img class="alignright" title="PC organization" src="http://www.cdtek.com/images/business-productivity.jpg" alt="PC organization" width="210" height="187" /></a></p>
<ul>
<li><strong>Clear up your Desktop: </strong></li>
</ul>
<p>The desktop is the first thing that a user encounters and should be the starting point for cleaning up your computer. Remove the files or programs that you do not use, leaving only the programs that you use frequently. Attach the most frequently used programs to the <a title="desktop toolbar" href="http://www.friedbeef.com/5-super-productive-ways-to-organize-your-desktop/" target="_blank">desktop toolbar</a>. Create labeled folders and group the files or applications appropriately. The typical icon layout will group the desktop icons along the right side of the computer screen however these icons can be grouped and moved elsewhere if beneficial. Based on their level of usage arrange your icons and folders in an order that makes the most sense to you. Additionally you can use desktop wallpaper that displays a grid so you can group and move icons into particular sections or categories.</p>
<p><strong> </strong></p>
<ul>
<li><strong>Organize your media content: </strong></li>
</ul>
<p>Keep your music with music, photos with photos, and movies with movies. Typically your computer will have preset folders for your media content, however over time it’s easy for these files to be unintentionally scattered and saved in other locations. You can also create your own media folder which holds separate folders for each type&#8230; <a href="http://www.computerfitness.com/blog/2011/09/tips-to-increase-productivity-by-keeping-a-clean-and-organized-pc/" class="read_more">Read the rest</a></p>]]></description>
		<wfw:commentRss>http://www.computerfitness.com/blog/2011/09/tips-to-increase-productivity-by-keeping-a-clean-and-organized-pc/feed/</wfw:commentRss>
		<slash:comments>0</slash:comments>
		</item>
		<item>
		<title>Tips for Properly Cleaning Your Computer and Peripheral Devices</title>
		<link>http://www.computerfitness.com/blog/2011/09/tips-for-properly-cleaning-your-computer-and-peripheral-devices/</link>
		<comments>http://www.computerfitness.com/blog/2011/09/tips-for-properly-cleaning-your-computer-and-peripheral-devices/#comments</comments>
		<pubDate>Fri, 02 Sep 2011 21:25:28 +0000</pubDate>
		<dc:creator>Dustin</dc:creator>
				<category><![CDATA[PC Maintenance]]></category>
		<category><![CDATA[cleaning]]></category>
		<category><![CDATA[computer]]></category>
		<category><![CDATA[computer maitenance]]></category>
		<category><![CDATA[computer tips]]></category>
		<category><![CDATA[CPU]]></category>
		<category><![CDATA[Peripherals]]></category>

		<guid isPermaLink="false">http://www.computerfitness.com/blog/?p=1238</guid>
		<description><![CDATA[<div class="wp_twitter_button" style="float: right; margin-left: 10px;">
					<a href="http://twitter.com/share?counturl=http%3A%2F%2Fwww.computerfitness.com%2Fblog%2F2011%2F09%2Ftips-for-properly-cleaning-your-computer-and-peripheral-devices%2F" class="twitter-share-button" data-url="http://www.computerfitness.com/blog/2011/09/tips-for-properly-cleaning-your-computer-and-peripheral-devices/" data-count="vertical" data-via="" data-lang="de" data-text="Tips for Properly Cleaning Your Computer and Peripheral Devices &#187; ComputerFitness.com #cleaning #compu [...]">Tweet</a><br />
					
				</div>
<p>In our past blog postings we have talked about computer maintenance issues like performing backups, removing unwanted files or programs, and increasing the speed of your computer. In our posts <a title="for helpful hints to extending the life of your computer" href="http://www.computerfitness.com/blog/2011/02/helpful-hints-to-extending-the-life-of-your-computer/" target="_blank">for helpful hints to extending the life of your computer</a> we have also briefly mentioned external conditions that can impact your computer but we have yet to address how to clean the actual PC and its peripheral components.</p>
<p>Keeping your computer and work environment clean is critical to the operations of your system and it can drastically extend the life of your PC. Dust is a common cause of overheating and the deterioration of important computer components. Computers may have advanced significantly but dust and dirt can still present major issues and glitches for internal elements. It is estimated that up to 70% of computer hardware problems can be attributed to dust and improper maintenance. Computers and external equipment should be cleaned routinely in order to prevent unnecessary problems caused by dust.</p>
<p>Although the fans of a computer are vital for the ventilation and cooling of the system they also provide a perfect opening for dust. Along with the cooling fans any small openings on monitors, keyboards, or any other devices are also dust gateways. In short the dust can settle on internal components and prevent the release of heat, causing the computer to short and overheat.</p>
<p>When everyday household items aren’t enough there are many products to choose from that are designed specifically for PC maintenance. Some of the available products include microfiber cleaning clothes, CD/DVD lens cleaners, anti-static monitor wipes, LCD cleaning solutions, aerosol duster, anti-static dust vacuums, wet wipes, and screen protectors.</p>
<p><strong> </strong></p>
<p><strong>Basic tips that you should know before cleaning: </strong></p>
<ul>
<li> Clean the area surrounding the computer before cleaning.</li>
<li> Always spray the cleaning solutions on a rag first, never apply directly to</li></ul><p>&#8230; <a href="http://www.computerfitness.com/blog/2011/09/tips-for-properly-cleaning-your-computer-and-peripheral-devices/" class="read_more">Read the rest</a></p>]]></description>
		<wfw:commentRss>http://www.computerfitness.com/blog/2011/09/tips-for-properly-cleaning-your-computer-and-peripheral-devices/feed/</wfw:commentRss>
		<slash:comments>1</slash:comments>
		</item>
		<item>
		<title>Facebook&#8217;s New Privacy and Sharing Features Done the Right Way</title>
		<link>http://www.computerfitness.com/blog/2011/08/facebook%e2%80%99s-new-privacy-and-sharing-features-from-done-the-right-way/</link>
		<comments>http://www.computerfitness.com/blog/2011/08/facebook%e2%80%99s-new-privacy-and-sharing-features-from-done-the-right-way/#comments</comments>
		<pubDate>Thu, 25 Aug 2011 15:14:55 +0000</pubDate>
		<dc:creator>Dustin</dc:creator>
				<category><![CDATA[Social Networking]]></category>
		<category><![CDATA[Facebook]]></category>
		<category><![CDATA[Information Security]]></category>
		<category><![CDATA[post]]></category>
		<category><![CDATA[posting]]></category>
		<category><![CDATA[privacy]]></category>
		<category><![CDATA[social networking]]></category>

		<guid isPermaLink="false">http://www.computerfitness.com/blog/?p=1224</guid>
		<description><![CDATA[<div class="wp_twitter_button" style="float: right; margin-left: 10px;">
					<a href="http://twitter.com/share?counturl=http%3A%2F%2Fwww.computerfitness.com%2Fblog%2F2011%2F08%2Ffacebook%25e2%2580%2599s-new-privacy-and-sharing-features-from-done-the-right-way%2F" class="twitter-share-button" data-url="http://www.computerfitness.com/blog/2011/08/facebook%e2%80%99s-new-privacy-and-sharing-features-from-done-the-right-way/" data-count="vertical" data-via="" data-lang="de" data-text="Facebook&#8217;s New Privacy and Sharing Features Done the Right Way &#187; ComputerFitness.com #Facebook # [...]">Tweet</a><br />
					
				</div>
<p>Tuesday August 23, 2011 <a title="Facebook" href="http://www.facebook.com" target="_blank">Facebook</a> made several announcements, the majority of which addressed the upcoming sharing and privacy improvements. In addition Facebook addressed smaller topics like the phasing out of the mobile only “Facebook Places” and the renaming of a long time Facebook attribute.</p>
<div class="wp-caption alignright" style="width: 236px;"><a href="http://www.cdtek.com/blog/wp-content/uploads/2011/08/facebooksharing.jpg"><img title="Facebook Sharing" src="http://www.cdtek.com/blog/wp-content/uploads/2011/08/facebooksharing.jpg" alt="Facebook Sharing" width="226" height="148" /></a>
<p class="wp-caption-text">from http://blog.facebook.com/blog.php?post=10150251867797131, August 2011</p>
</div>
<p>Privacy and security have always been a major concern for Facebook users. In response to these worries Facebook has made multiple changes to the process for sharing posts, photos, tags, and other any other content. The new set up focuses on making the policies of concern more assessable and understandable to all users. The following <a title="Profile Control" href="http://www.facebook.com/about/control" target="_blank">Profile Control </a>changes are expected to begin rolling out sometime this week, at that time users will encounter a prompt to tour the new <a title="Facebook Profile Features" href="http://blog.facebook.com/blog.php?post=10150251867797131" target="_blank">Facebook Profile Features</a>. (August 25, 2011)</p>
<p>The primary adjustment to the new profile is the new location for the privacy and sharing controls. The sharing controls are now available directly on a user’s profile page. These controls were previously only available on the settings pages. The aim for this redesign is to present users with a clearer and more consistent sharing experience. The new inline drop down menus that are now located next to the content posting area can enable a user to instantly adjust who has permission to view the content. Whether it be your thoughts, images, or videos each user will be able to see who can view their content and allow them to grant or deny access with one simple click. Additionally, since many of the settings options have been compiled into these smaller inline menus the previous settings page has also been simplified.</p>
<p>Also launching with the new profile sharing controls is the following sharing, tagging, and privacy policies.</p>
<ul>
<li><strong>Control who can view your post while posting </strong></li>
</ul>
<p>With&#8230; <a href="http://www.computerfitness.com/blog/2011/08/facebook%e2%80%99s-new-privacy-and-sharing-features-from-done-the-right-way/" class="read_more">Read the rest</a></p>]]></description>
		<wfw:commentRss>http://www.computerfitness.com/blog/2011/08/facebook%e2%80%99s-new-privacy-and-sharing-features-from-done-the-right-way/feed/</wfw:commentRss>
		<slash:comments>0</slash:comments>
		</item>
		<item>
		<title>HP Explores their Options and Puts an End to their webOS Devices</title>
		<link>http://www.computerfitness.com/blog/2011/08/hp-explores-their-options-and-puts-an-end-to-their-webos-devices/</link>
		<comments>http://www.computerfitness.com/blog/2011/08/hp-explores-their-options-and-puts-an-end-to-their-webos-devices/#comments</comments>
		<pubDate>Fri, 19 Aug 2011 20:53:03 +0000</pubDate>
		<dc:creator>Dustin</dc:creator>
				<category><![CDATA[Electronics]]></category>
		<category><![CDATA[Hardware Overview]]></category>
		<category><![CDATA[SmartPhone]]></category>
		<category><![CDATA[consumer electronics]]></category>
		<category><![CDATA[device]]></category>
		<category><![CDATA[HP]]></category>
		<category><![CDATA[hp touch pad]]></category>
		<category><![CDATA[mobile device]]></category>
		<category><![CDATA[smartphone]]></category>
		<category><![CDATA[webOS]]></category>

		<guid isPermaLink="false">http://www.computerfitness.com/blog/?p=1207</guid>
		<description><![CDATA[<div class="wp_twitter_button" style="float: right; margin-left: 10px;">
					<a href="http://twitter.com/share?counturl=http%3A%2F%2Fwww.computerfitness.com%2Fblog%2F2011%2F08%2Fhp-explores-their-options-and-puts-an-end-to-their-webos-devices%2F" class="twitter-share-button" data-url="http://www.computerfitness.com/blog/2011/08/hp-explores-their-options-and-puts-an-end-to-their-webos-devices/" data-count="vertical" data-via="" data-lang="de" data-text="HP Explores their Options and Puts an End to their webOS Devices &#187; ComputerFitness.com #consumer elect [...]">Tweet</a><br />
					
				</div>
<p style="text-align: left;">Thursday August 18, 2011 Hewlett-Packard confirmed both their recent discussion with <a title="Autonomy Corporation" href="http://www.autonomy.com/" target="_blank">Autonomy Corporation</a> regarding a possible offer for the company as well as the upcoming discontinuation of their webOS devices. In a <a title="press release" href="http://www.hp.com/hpinfo/newsroom/press/2011/110818b.html" target="_blank">press release</a> HP expressed their plans to discontinue production for <a title="webOS" href="http://www.brighthand.com/default.asp?newsID=18078&#38;news=HP+webOS+Palm+RIM" target="_blank">webOS</a> devices including the recently released HP Touch Pad. HP also reported that its board of directors had approved the exploration of strategic alternatives and that they will be considering a wide range of options such as full or partial separation of the Personal Systems Group from HP through a spin-off or other transaction.</p>
<div class="wp-caption alignright" style="width: 159px;"><a href="http://www.internetbeacon.com/blog/wp-content/uploads/2011/08/hplogo.jpg"><img title="HP Logo" src="http://www.internetbeacon.com/blog/wp-content/uploads/2011/08/hplogo.jpg" alt="HP Logo" width="172" height="155" /></a>
<p class="wp-caption-text">from http://www.hp.com, August 2011</p>
</div>
<p>This decision follows only 2 months after HP latest product launch, the HP Touch Pad. The HP Touch Pad was initially thought to be a major competitor for the <a title="Pad" href="http://www.apple.com/ipad/" target="_blank">iPad</a>. However, following a rocky launch that included an announcement of a better model just days after the initial release, drastic price changes, and <a title="bad PR" href="http://www.macrumors.com/2011/08/17/best-buy-seeing-hp-touchpad-sell-through-rate-of-under-10/" target="_blank">bad PR</a> it was clear that HP had fumbled the release and the HP Touch Pad didn’t stand a chance against the iPad or other competitors.</p>
<p>Along with the dwindling release sales for their new tablet HP was also far behind their mobile competitors. Although the fastest growing consumer electronics are mobile devices according to HP’s chief financial officer Cathy Lesjak “the webOS would require significant investments over the next five years, generating a risk without clear rewards”. HP webOS users currently only account for 3% of the market while Android occupies a steady 40% and Apple controlling fewer than 30%.</p>
<p>HP also faced struggles obtaining developers to build applications for their devices. The more developers there are usually means more applications and more importantly more customers. However because the platform with the most developers usually attracts the most&#8230; <a href="http://www.computerfitness.com/blog/2011/08/hp-explores-their-options-and-puts-an-end-to-their-webos-devices/" class="read_more">Read the rest</a></p>]]></description>
		<wfw:commentRss>http://www.computerfitness.com/blog/2011/08/hp-explores-their-options-and-puts-an-end-to-their-webos-devices/feed/</wfw:commentRss>
		<slash:comments>0</slash:comments>
		</item>
		<item>
		<title>Give Your Site a Speed Boost with the New Google Page Speed Service</title>
		<link>http://www.computerfitness.com/blog/2011/08/give-your-site-a-speed-boost-with-the-new-google-page-speed-service/</link>
		<comments>http://www.computerfitness.com/blog/2011/08/give-your-site-a-speed-boost-with-the-new-google-page-speed-service/#comments</comments>
		<pubDate>Fri, 12 Aug 2011 17:07:09 +0000</pubDate>
		<dc:creator>Dustin</dc:creator>
				<category><![CDATA[Google]]></category>
		<category><![CDATA[Web Development]]></category>
		<category><![CDATA[Web Tips]]></category>
		<category><![CDATA[google]]></category>
		<category><![CDATA[Google Page Speed]]></category>
		<category><![CDATA[load time]]></category>
		<category><![CDATA[page speed]]></category>
		<category><![CDATA[page speed service]]></category>
		<category><![CDATA[service]]></category>
		<category><![CDATA[speed]]></category>
		<category><![CDATA[speed boost]]></category>

		<guid isPermaLink="false">http://www.computerfitness.com/blog/?p=1196</guid>
		<description><![CDATA[<div class="wp_twitter_button" style="float: right; margin-left: 10px;">
					<a href="http://twitter.com/share?counturl=http%3A%2F%2Fwww.computerfitness.com%2Fblog%2F2011%2F08%2Fgive-your-site-a-speed-boost-with-the-new-google-page-speed-service%2F" class="twitter-share-button" data-url="http://www.computerfitness.com/blog/2011/08/give-your-site-a-speed-boost-with-the-new-google-page-speed-service/" data-count="vertical" data-via="" data-lang="de" data-text="Give Your Site a Speed Boost with the New Google Page Speed Service &#187; ComputerFitness.com #google #Goo [...]">Tweet</a><br />
					
				</div>
<p style="text-align: left;">A couple weeks ago Google announced a new <a title="Page Speed Service" href="http://googlewebmastercentral.blogspot.com/2011/07/page-speed-service-web-performance.html" target="_blank">Page Speed Service</a> which is currently available to only a limited number of webmasters. The new Page Speed service follows many previous speed assessment products that Google has released over the years, releases that include the <a title="Page Speed Browser Add-ons" href="http://code.google.com/speed/page-speed/docs/extension.html" target="_blank">Page Speed Browser Add-ons</a> and <a title="Page Speed Online" href="http://pagespeed.googlelabs.com/" target="_blank">Page Speed Online</a>. These previous releases focused on scoring a websites speed performance and providing users with suggestions or feedback to increase their speed score.</p>
<div class="wp-caption alignright" style="width: 168px;"><a href="http://www.internetbeacon.com/blog/wp-content/uploads/2011/08/pagespeed.jpg"><img title="page speed logo" src="http://www.internetbeacon.com/blog/wp-content/uploads/2011/08/pagespeed.jpg" alt="page speed logo" width="137" height="108" /></a>
<p class="wp-caption-text">from http://code.google.com/speed/pss/index.html, August 2011</p>
</div>
<p>The new <a title="Page Speed" href="http://code.google.com/speed/pss/index.html" target="_blank">Page Speed </a> is a service that doesn’t analyze your website’s speed but instead automatically increases it. The new service retrieves your content from the website server, rewrites the website using their specified guidelines, and then delivers it the site visitor even faster using their servers.</p>
<p>While using the Page Speed Service a website can expect to see a 25%-60% improvement however the exact amount of speed depends on a number of different factors. These factors include the amount of content on your pages, the browser, geographical location, bandwidth and more. Visit the <a title="web page test" href="http://www.webpagetest.org/compare" target="_blank">web page test</a> to analyze your website and determine the exact speed increase that the new page speed service can produce for your website.</p>
<p>The test works by simply visiting your site and then repeating the same test by substituting your website into the Page Speed Service. The test takes only minutes to perform and once complete the user is presented with a chart that details the load time from the original server, the load time from the Page Speed Service, the load time for repeat visits from both servers, the percentage of the speed increase, and multiple links to test details. The results also provide a visual rendering for the&#8230; <a href="http://www.computerfitness.com/blog/2011/08/give-your-site-a-speed-boost-with-the-new-google-page-speed-service/" class="read_more">Read the rest</a></p>]]></description>
		<wfw:commentRss>http://www.computerfitness.com/blog/2011/08/give-your-site-a-speed-boost-with-the-new-google-page-speed-service/feed/</wfw:commentRss>
		<slash:comments>0</slash:comments>
		</item>
		<item>
		<title>Google Spam Report Page Gets Revamped</title>
		<link>http://www.computerfitness.com/blog/2011/08/google-spam-report-page-gets-revamped/</link>
		<comments>http://www.computerfitness.com/blog/2011/08/google-spam-report-page-gets-revamped/#comments</comments>
		<pubDate>Fri, 05 Aug 2011 21:04:05 +0000</pubDate>
		<dc:creator>Dustin</dc:creator>
				<category><![CDATA[Google]]></category>
		<category><![CDATA[google]]></category>
		<category><![CDATA[google spam report]]></category>
		<category><![CDATA[spam]]></category>
		<category><![CDATA[spam report]]></category>
		<category><![CDATA[webmaster guidelines]]></category>
		<category><![CDATA[webmaster tools]]></category>

		<guid isPermaLink="false">http://www.computerfitness.com/blog/?p=1185</guid>
		<description><![CDATA[<div class="wp_twitter_button" style="float: right; margin-left: 10px;">
					<a href="http://twitter.com/share?counturl=http%3A%2F%2Fwww.computerfitness.com%2Fblog%2F2011%2F08%2Fgoogle-spam-report-page-gets-revamped%2F" class="twitter-share-button" data-url="http://www.computerfitness.com/blog/2011/08/google-spam-report-page-gets-revamped/" data-count="vertical" data-via="" data-lang="de" data-text="Google Spam Report Page Gets Revamped &#187; ComputerFitness.com #google #google spam report #spam #spam re [...]">Tweet</a><br />
					
				</div>
<p style="text-align: left;">According to a recent <a title="Tweet" href="http://www.twitter.com" target="_blank">Tweet</a> from Matt Cutts, Google has released their <a title="biggest spam report form refresh" href="https://twitter.com/#!/mattcutts/statuses/98892346783051777" target="_blank">biggest spam report form refresh</a> in roughly ten years. Along with their own attempts <a title="Google" href="http://WWW.GOOGLE.COM" target="_blank">Google</a> also relies on individual users to help combat websites that are spamming their index. As a part of Google’s continuous effort to improve the quality of search results, they ask that you submit a spam report if you come across a site that isn’t following the webmaster guidelines or acceptable practices. Google users can submit spam reports using their <a title="Webmaster Tools" href="https://www.google.com/accounts/ServiceLogin?service=sitemaps&#38;passive=true&#38;nui=1&#38;continue=https://www.google.com/webmasters/tools/spamreport?hl%3Den&#38;followup=https://www.google.com/webmasters/tools/spamreport?hl%3Den&#38;hl=en" target="_blank">Webmaster Tools</a>. <a href="http://www.computerfitness.com/images/spam.jpg"><img class="alignright" title="Spam" src="http://www.computerfitness.com/images/spam.jpg" alt="Spam" width="162" height="125" /></a></p>
<p>The previous spam report form was only a single page and had simple check boxes for users to identify the type of spam that was encountered. The new spam center however has a main page that provides a user with 8 different links. Each of the 8 links is for a different type of spam. The links include paid links, objectionable content, malware, other Google products, copyright, legal issues, personal/private, phishing, and other. These links will each direct a user to a separate spam complaint section where the user can then report the web address and express their concerns in full details.</p>
<p>Google depends on their “webmaster quality guidelines” as well as these detailed spam reports to help them generate scalable spam solutions. Instead of struggling against spam one by one they are always seeking new information to enhance their algorithm and combat large bodies of spam. Google’s quality guidelines express the various forms of deceptive or manipulative behaviors and describe how websites can avoid the misleading practices. The basic quality guidelines established by Google are as follows:</p>
<ul>
<li>Design pages for users, not for the search engines. Don&#8217;t deceive your users or present different content to search engines than you display to users (cloaking).</li>
</ul>
<ul>
<li>Don’t use tricks that</li></ul><p>&#8230; <a href="http://www.computerfitness.com/blog/2011/08/google-spam-report-page-gets-revamped/" class="read_more">Read the rest</a></p>]]></description>
		<wfw:commentRss>http://www.computerfitness.com/blog/2011/08/google-spam-report-page-gets-revamped/feed/</wfw:commentRss>
		<slash:comments>0</slash:comments>
		</item>
		<item>
		<title>WordPress:  How to Downgrade to a Previous Version Using a Backup</title>
		<link>http://www.computerfitness.com/blog/2011/07/wordpress-how-to-downgrade-to-your-previous-version-from-a-backup/</link>
		<comments>http://www.computerfitness.com/blog/2011/07/wordpress-how-to-downgrade-to-your-previous-version-from-a-backup/#comments</comments>
		<pubDate>Fri, 29 Jul 2011 21:15:42 +0000</pubDate>
		<dc:creator>Dustin</dc:creator>
				<category><![CDATA[Software]]></category>
		<category><![CDATA[backup]]></category>
		<category><![CDATA[downgrade]]></category>
		<category><![CDATA[restore]]></category>
		<category><![CDATA[Update]]></category>
		<category><![CDATA[wordpress]]></category>
		<category><![CDATA[wordpress 3.2]]></category>
		<category><![CDATA[wordpress downgrade]]></category>

		<guid isPermaLink="false">http://www.computerfitness.com/blog/?p=1167</guid>
		<description><![CDATA[<div class="wp_twitter_button" style="float: right; margin-left: 10px;">
					<a href="http://twitter.com/share?counturl=http%3A%2F%2Fwww.computerfitness.com%2Fblog%2F2011%2F07%2Fwordpress-how-to-downgrade-to-your-previous-version-from-a-backup%2F" class="twitter-share-button" data-url="http://www.computerfitness.com/blog/2011/07/wordpress-how-to-downgrade-to-your-previous-version-from-a-backup/" data-count="vertical" data-via="" data-lang="de" data-text="WordPress:  How to Downgrade to a Previous Version Using a Backup &#187; ComputerFitness.com #backup #downg [...]">Tweet</a><br />
					
				</div>
<p style="text-align: left;">Earlier this month the <a title="WordPress" href="http://www.wordpress.org/" target="_blank">WordPress</a> version 3.2 update was released. <a title="Version 3.2" href="http://wordpress.org/news/2011/07/gershwin/" target="_blank">Version 3.2</a> is the first WordPress update that requires PHP 5.2.4 or greater and MySQL version 5.0 or greater. WordPress made the announcement concerning the <a title="discontinued use of PHP 4 and MySQL 4" href="http://wordpress.org/news/2010/07/eol-for-php4-and-mysql4/" target="_blank">discontinued use of PHP 4 and MySQL 4</a> a year prior its release to give users ample time to prepare for these changes. WordPress provides several resources for upgrading WordPress but despite the extra preparation many users have encountered bugs in the recent software. Since the release most of the issues have been resolved with the 3.2.1 update however some users continue to experience problems.</p>
<p>Before we began upgrading our own WordPress we first made certain that we met the required specifications. After completing the version 3.2 update we began to experience some problems on our <a title="Internet Beacon" href="http://www.internetbeacon.com/blog/" target="_blank">Internet Beacon</a> blog. The issue we encountered didn’t impact our blog but rather our recent blog PHP script that is located on the bottom of our <a title="Internet Beacon home page" href="http://www.internetbeacon.com/" target="_blank">Internet Beacon home page</a>. This section would normally list some of our latest blog but following the update it stopped generating content.</p>
<div class="wp-caption alignright" style="width: 452px;"><img class="aligncenter" title="Recent Post PHP" src="http://www.computerfitness.com/images/recentpost.jpg" alt="Recent Post PHP" width="442" height="208" />
<p class="wp-caption-text">from http://www.internetbeacon.com/, July 2011</p>
</div>
<p>Unaware of how to rectify this issue we consulted with the WordPress community and various chat boards. This matter also spurred us to write the blog <a title="WordPress 3.2 is Available: Are you ready for the Upgrade?" href="http://www.internetbeacon.com/blog/2011-07/wordpress-3-2-now-available-are-you-ready-to-upgrade/" target="_blank">WordPress 3.2 is Available: Are you ready for the Upgrade?</a> In this blog we informed readers of the buggy nature of 3.2 and detailed how to be prepared for the upgrade as well as how to make certain you can reverse the upgrade process. During the weeks following this post we were still unable to resolve our problem. We did however recently determine&#8230; <a href="http://www.computerfitness.com/blog/2011/07/wordpress-how-to-downgrade-to-your-previous-version-from-a-backup/" class="read_more">Read the rest</a></p>]]></description>
		<wfw:commentRss>http://www.computerfitness.com/blog/2011/07/wordpress-how-to-downgrade-to-your-previous-version-from-a-backup/feed/</wfw:commentRss>
		<slash:comments>0</slash:comments>
		</item>
		<item>
		<title>US Government Continues Plan to Shutdown 40%  of their Data Centers by 2015</title>
		<link>http://www.computerfitness.com/blog/2011/07/us-government-continues-plan-to-shutdown-40-of-their-data-centers-by-2015/</link>
		<comments>http://www.computerfitness.com/blog/2011/07/us-government-continues-plan-to-shutdown-40-of-their-data-centers-by-2015/#comments</comments>
		<pubDate>Thu, 21 Jul 2011 17:18:38 +0000</pubDate>
		<dc:creator>Dustin</dc:creator>
				<category><![CDATA[Server]]></category>
		<category><![CDATA[Storage]]></category>
		<category><![CDATA[Campaign to cut waste]]></category>
		<category><![CDATA[cloud]]></category>
		<category><![CDATA[data]]></category>
		<category><![CDATA[data center]]></category>
		<category><![CDATA[government]]></category>
		<category><![CDATA[shutdown]]></category>
		<category><![CDATA[storage]]></category>

		<guid isPermaLink="false">http://www.computerfitness.com/blog/?p=1151</guid>
		<description><![CDATA[<div class="wp_twitter_button" style="float: right; margin-left: 10px;">
					<a href="http://twitter.com/share?counturl=http%3A%2F%2Fwww.computerfitness.com%2Fblog%2F2011%2F07%2Fus-government-continues-plan-to-shutdown-40-of-their-data-centers-by-2015%2F" class="twitter-share-button" data-url="http://www.computerfitness.com/blog/2011/07/us-government-continues-plan-to-shutdown-40-of-their-data-centers-by-2015/" data-count="vertical" data-via="" data-lang="de" data-text="US Government Continues Plan to Shutdown 40%  of their Data Centers by 2015 &#187; ComputerFitness.com #Cam [...]">Tweet</a><br />
					
				</div>
<p style="text-align: left;">On Wednesday July 20, 2011 the <a title="Obama Administration" href="http://www.whitehouse.gov/administration/president-obama" target="_blank">Obama Administration</a> announced their plan to close 800 of their 2,000 data centers over the next four years. The Federal Government initially scheduled the shutdown of 137 data centers by the end of this year. However, currently the process is ahead of schedule with already 81 sites closed so they now expect the closure of 195 facilities. In addition to the revised figure of 195 data centers for 2011 the <a title="White House" href="http://www.whitehouse.gov/administration" target="_blank">White House</a> also announced that nearly 200 complexes will be closed by the end of 2012, making the accumulative shutdowns just shy of 400 data centers.</p>
<div class="wp-caption alignright" style="width: 222px;"><a href="http://www.computerfitness.com/images/Data Center Shut Down.jpg"><img title="Data Center Shutdown Graph" src="http://www.computerfitness.com/images/Data Center Shut Down.jpg" alt="Data Center Shutdown Graph" width="212" height="157" /></a>
<p class="wp-caption-text">from http://www.whitehouse.gov/blog/2011/07/20/shutting-down-duplicative-data-centers, July 2011</p>
</div>
<p>Since 1998 the <a title="United States Government" href="http://www.whitehouse.gov/our-government" target="_blank">United States Government</a> has quadrupled their amount of data centers. Throughout the years the development of software that allows for multiple platform access has enabled the government to become more efficient and reduce their need for most data centers. It is reported that many of these sites operate only using 27% of their computing power even though taxpayers continue to pay for the entire infrastructure (land, facilities, equipment, cooling processes and special security elements).</p>
<p>According to the plans of the United States Government, the elimination of these data centers will help them be more efficient during this time of deficit. Over the next four years the shutdowns will allow for more real estate and a drastic reduction in unnecessary spending. The data centers that are marked for termination range in size with some occupying over 200,000 square feet and others residing on only 1,000 square feet of land. The geographic locations of these data centers also vary with locations scattered throughout 30 states. Due to the special equipment contained within these data centers the average power consumption can be 200 times more than regular office buildings and is&#8230; <a href="http://www.computerfitness.com/blog/2011/07/us-government-continues-plan-to-shutdown-40-of-their-data-centers-by-2015/" class="read_more">Read the rest</a></p>]]></description>
		<wfw:commentRss>http://www.computerfitness.com/blog/2011/07/us-government-continues-plan-to-shutdown-40-of-their-data-centers-by-2015/feed/</wfw:commentRss>
		<slash:comments>0</slash:comments>
		</item>
		<item>
		<title>Facebook Users Face Off Against Several New Scams That Exploit Recent Headlines</title>
		<link>http://www.computerfitness.com/blog/2011/07/facebook-users-face-off-against-several-new-scams-that-exploit-recent-headlines/</link>
		<comments>http://www.computerfitness.com/blog/2011/07/facebook-users-face-off-against-several-new-scams-that-exploit-recent-headlines/#comments</comments>
		<pubDate>Wed, 13 Jul 2011 19:46:46 +0000</pubDate>
		<dc:creator>Dustin</dc:creator>
				<category><![CDATA[Information Security]]></category>
		<category><![CDATA[Social Networking]]></category>
		<category><![CDATA[casey anthony scam]]></category>
		<category><![CDATA[charlie sheen scam]]></category>
		<category><![CDATA[Facebook]]></category>
		<category><![CDATA[google+ scam]]></category>
		<category><![CDATA[scam]]></category>
		<category><![CDATA[social network]]></category>
		<category><![CDATA[spam]]></category>
		<category><![CDATA[spammer]]></category>
		<category><![CDATA[spamming]]></category>

		<guid isPermaLink="false">http://www.computerfitness.com/blog/?p=1143</guid>
		<description><![CDATA[<div class="wp_twitter_button" style="float: right; margin-left: 10px;">
					<a href="http://twitter.com/share?counturl=http%3A%2F%2Fwww.computerfitness.com%2Fblog%2F2011%2F07%2Ffacebook-users-face-off-against-several-new-scams-that-exploit-recent-headlines%2F" class="twitter-share-button" data-url="http://www.computerfitness.com/blog/2011/07/facebook-users-face-off-against-several-new-scams-that-exploit-recent-headlines/" data-count="vertical" data-via="" data-lang="de" data-text="Facebook Users Face Off Against Several New Scams That Exploit Recent Headlines &#187; ComputerFitness.com  [...]">Tweet</a><br />
					
				</div>
<p style="text-align: left;">Scams, viruses, and <a title="Facebook Frauds" href="http://www.internetbeacon.com/blog/2011-05/top-4-facebook-frauds-and-how-to-avoid-them/" target="_blank">Facebook Frauds</a> that prey on the curiosity of unsuspecting users are nothing new for the popular social network. <a title="Facebook" href="http://www.facebook.com/" target="_blank">Facebook</a> and social networking sites alike create a perfect environment for spammers to instantly reach millions and rapidly spread their lucrative scams. Although the majority of users have learned how to <a title="Spot and Avoid Facebook Scams" href="http://www.support.com/blog/post/how-avoid-scams-facebook" target="_blank">Spot and Avoid Facebook Scams</a>, there are some creative and devious scams that continue to attract the attention of many users. These scams are extremely misleading and publicize something that is either too good to be true or reel users in by taking advantage of the recent headlines.</p>
<div class="wp-caption alignright" style="width: 207px;"><img title="Facebook Scams" src="http://www.computerfitness.com/images/facebookscam.jpg" alt="Facebook Scams" width="197" height="155" />
<p class="wp-caption-text">from http://www.facebook.com/group.php?gid=9874388706&#38;v=wall, July 2011</p>
</div>
<p>These scams are usually created to generate some kind of financial gain for spammers and to further spread their spam. Often the fraudulent posting will advertise one thing and then direct a user to a completely unrelated page. Previous Facebook scam such as the “Free iPad scam” and the “See who is viewing your profile scam” have been used as a spamming technique called <a title="ClickJacking" href="http://www.wisegeek.com/what-is-clickjacking.htm" target="_blank">ClickJacking</a>.</p>
<p>ClickJacking presents a page to the user with a seemingly harmless action button, unbeknownst to the user there is usually a transparent layer with an alternative button positioned directly on top. In other words, when the user thinks that they are clicking the one button they are really clicking the hidden button. The hidden button is usually something that a user would probably avoid if given prior knowledge. For example the button could initiate an unauthorized purchase, an adjustment to your social profile, a twitter follow, or the spamming of your Facebook contacts.</p>
<p>New spam scams are created each day, this week alone we have already seen three new Facebook scams that draw in users by exploiting popular news headlines. Among the scams that appeared this&#8230; <a href="http://www.computerfitness.com/blog/2011/07/facebook-users-face-off-against-several-new-scams-that-exploit-recent-headlines/" class="read_more">Read the rest</a></p>]]></description>
		<wfw:commentRss>http://www.computerfitness.com/blog/2011/07/facebook-users-face-off-against-several-new-scams-that-exploit-recent-headlines/feed/</wfw:commentRss>
		<slash:comments>1</slash:comments>
		</item>
		<item>
		<title>Media Industry Leaders Collaborate In an Effort to Combat Piracy</title>
		<link>http://www.computerfitness.com/blog/2011/07/media-industry-leaders-collaborate-in-an-effort-to-combat-piracy/</link>
		<comments>http://www.computerfitness.com/blog/2011/07/media-industry-leaders-collaborate-in-an-effort-to-combat-piracy/#comments</comments>
		<pubDate>Fri, 08 Jul 2011 18:45:41 +0000</pubDate>
		<dc:creator>Dustin</dc:creator>
				<category><![CDATA[Legal]]></category>
		<category><![CDATA[Piracy]]></category>
		<category><![CDATA[Software]]></category>
		<category><![CDATA[content]]></category>
		<category><![CDATA[copyright]]></category>
		<category><![CDATA[copyright alert system]]></category>
		<category><![CDATA[digital download]]></category>
		<category><![CDATA[digital media]]></category>
		<category><![CDATA[media industry]]></category>
		<category><![CDATA[piracy]]></category>

		<guid isPermaLink="false">http://www.computerfitness.com/blog/?p=1131</guid>
		<description><![CDATA[<div class="wp_twitter_button" style="float: right; margin-left: 10px;">
					<a href="http://twitter.com/share?counturl=http%3A%2F%2Fwww.computerfitness.com%2Fblog%2F2011%2F07%2Fmedia-industry-leaders-collaborate-in-an-effort-to-combat-piracy%2F" class="twitter-share-button" data-url="http://www.computerfitness.com/blog/2011/07/media-industry-leaders-collaborate-in-an-effort-to-combat-piracy/" data-count="vertical" data-via="" data-lang="de" data-text="Media Industry Leaders Collaborate In an Effort to Combat Piracy &#187; ComputerFitness.com #content #copyr [...]">Tweet</a><br />
					
				</div>
<p style="text-align: left;">According to the Recording Industry Association of America (<a title="RIAA" href="http://www.riaa.com/newsitem.php?content_selector=newsandviews&#38;news_month_filter=7&#38;news_year_filter=2011&#38;id=2DDC3887-A4D5-8D41-649D-6E4F7C5225A5" target="_blank">RIAA</a>) several industry leaders from music, movie, television and broadband services have teamed up to educate consumers and diminish online content theft. Among the organizations volunteering are Walt Disney Studios Motion Pictures, Paramount Pictures Corporation, Sony Pictures Entertainment, Twentieth Century Fox Film Corporation, Warner Bros. Entertainment Inc, Universal Music Group Recordings, Warner Music Group, Sony Music Entertainment, EMI Music North America, AT&#38;T, Comcast Corp, and Verizon. These companies and more have all come together to create the foundation for the new Copyright Alert System.</p>
<div class="wp-caption alignright" style="width: 301px;"><a href="http://www.computerfitness.com/images/DigitalMediaSites.jpg"><img title="digital download sites" src="http://www.computerfitness.com/images/DigitalMediaSites.jpg" alt="digital download sites" width="291" height="185" /></a>
<p class="wp-caption-text">from http://www.riaa.com/toolsforparents.php?content_selector=legal-music-services July 2011</p>
</div>
<p><a title="Piracy" href="http://www.wisegeek.com/what-is-internet-piracy.htm" target="_blank">Piracy</a> is a major problem and even with the increased prevention and restrictions it continues to plague the various entertainment industries. For most individuals downloading protected media is often viewed as a minor crime, if one at all. When compared to other illegal activities it does seem minor however when considering the worldwide accumulation of pirated material obtained without compensation the loss and industry devastation is in the millions. The impact of piracy is felt by all parties involved in the media creation process and not only does it affect jobs but the future production of the content we enjoy. As the volume of pirated content continues to increase the amount of revenue continues to decrease and even with digital sales the earned revenue isn’t enough to make up the loss.</p>
<p>P2P file sharing programs like <a title="LimeWire" href="http://www.limewire.com/" target="_blank">LimeWire</a> are illegal as you can tell upon visiting their court ordered deactivated website. Organizations like the RIAA continually monitor these applications and focus their resources on disbanding them. Fortunately for users there is a ton of legal alternatives for low cost digital content. Some of these programs include <a title="Amazon" href="http://www.amazon.com/" target="_blank">Amazon</a>, <a title="iTunes" href="http://www.itunes.com/" target="_blank">iTunes</a>, <a title="Napster" href="http://www.napster.com/" target="_blank">Napster</a>, <a title="Pandora" href="http://www.pandora.com/" target="_blank">Pandora</a>, and <a title="AOL Music" href="http://music.aol.com/" target="_blank">AOL Music</a>.</p>
<p>According to&#8230; <a href="http://www.computerfitness.com/blog/2011/07/media-industry-leaders-collaborate-in-an-effort-to-combat-piracy/" class="read_more">Read the rest</a></p>]]></description>
		<wfw:commentRss>http://www.computerfitness.com/blog/2011/07/media-industry-leaders-collaborate-in-an-effort-to-combat-piracy/feed/</wfw:commentRss>
		<slash:comments>0</slash:comments>
		</item>
		<item>
		<title>Google Improves the User Experience with More Design Changes</title>
		<link>http://www.computerfitness.com/blog/2011/07/google-improves-the-user-experience-with-more-design-changes/</link>
		<comments>http://www.computerfitness.com/blog/2011/07/google-improves-the-user-experience-with-more-design-changes/#comments</comments>
		<pubDate>Fri, 01 Jul 2011 15:43:15 +0000</pubDate>
		<dc:creator>Dustin</dc:creator>
				<category><![CDATA[Google]]></category>
		<category><![CDATA[Search Engines]]></category>
		<category><![CDATA[design]]></category>
		<category><![CDATA[google]]></category>
		<category><![CDATA[Google experience]]></category>
		<category><![CDATA[Search Engine]]></category>
		<category><![CDATA[usability]]></category>
		<category><![CDATA[user experience]]></category>

		<guid isPermaLink="false">http://www.computerfitness.com/blog/?p=1116</guid>
		<description><![CDATA[<div class="wp_twitter_button" style="float: right; margin-left: 10px;">
					<a href="http://twitter.com/share?counturl=http%3A%2F%2Fwww.computerfitness.com%2Fblog%2F2011%2F07%2Fgoogle-improves-the-user-experience-with-more-design-changes%2F" class="twitter-share-button" data-url="http://www.computerfitness.com/blog/2011/07/google-improves-the-user-experience-with-more-design-changes/" data-count="vertical" data-via="" data-lang="de" data-text="Google Improves the User Experience with More Design Changes &#187; ComputerFitness.com #design #google #Go [...]">Tweet</a><br />
					
				</div>
<p style="text-align: left;">It was only a year ago that<a title="Google" href="http://www.google.com/" target="_blank"> Google</a> implemented a new visual design that focused on providing users with a visual refresh and a convenient sidebar navigation tool. The June 2010 updates also introduced a time based search feature that enables users to search during a period of time such as the last 24 hours, the past year, or a custom range. During <a title="Google's Spring Metamorphosis" href="http://googleblog.blogspot.com/2010/05/spring-metamorphosis-googles-new-look.html" target="_blank">Google&#8217;s Spring Metamorphosis</a> last year they had mentioned that they are always working on improving the design and experience of Google which has led to many of their latest changes. Users may have noticed that on Tuesday June 28, 2011 that some changes had taken place in an effort to evolve the design and Experience of Google. Not only did Google modify its search engine but that same day Google had also announced the <a title="Google+ Project" href="http://www.internetbeacon.com/blog/2011/06/google-gears-up-to-launch-its-new-social-network-google/" target="_blank">Google+ Project. </a></p>
<div class="wp-caption alignright" style="width: 266px;"><a href="http://www.computerfitness.com/images/Googles New look.jpg"><img class=" " title="Google's New Look" src="http://www.computerfitness.com/images/Googles New look.jpg" alt="Google's New Look" width="256" height="178" /></a>
<p class="wp-caption-text">from http://www.google.com July 2011</p>
</div>
<p>The clean, spacious, and simple design of <a title="Google+" href="https://plus.google.com/up/start/?sw=1&#38;type=st" target="_blank">Google+</a> coordinate with the new look of Google and are already carrying over to the other Google services like <a title="Gmail" href="http://gmailblog.blogspot.com/2011/06/preview-of-gmails-new-look.html">Gmail</a>. The new Google home page has even gone through its own changes. Now with a smaller logo and the links moved to the top and bottom edges, the page has a cleaner and more intuitive feel. Additionally Google now has a universal toolbar that is located at the top of the page and is also consistent across each page and service.</p>
<p>According to Google, “The way people use and experience the web is evolving, and our goal is to give you a seamless and consistent online experience—one that works no matter which Google product you’re using or what device you’re using it on”</p>
<p>In their <a title="Google Blog" href="http://googleblog.blogspot.com/2011/06/evolving-google-design-and-experience.html" target="_blank">Google Blog</a>, Google mentions that their new design was based on 3 principles focus, elasticity,&#8230; <a href="http://www.computerfitness.com/blog/2011/07/google-improves-the-user-experience-with-more-design-changes/" class="read_more">Read the rest</a></p>]]></description>
		<wfw:commentRss>http://www.computerfitness.com/blog/2011/07/google-improves-the-user-experience-with-more-design-changes/feed/</wfw:commentRss>
		<slash:comments>0</slash:comments>
		</item>
		<item>
		<title>10 iPad2 Security Tips to Help Protect Your Investment</title>
		<link>http://www.computerfitness.com/blog/2011/06/10-ipad2-security-tips-to-help-protect-your-investment/</link>
		<comments>http://www.computerfitness.com/blog/2011/06/10-ipad2-security-tips-to-help-protect-your-investment/#comments</comments>
		<pubDate>Tue, 21 Jun 2011 19:36:17 +0000</pubDate>
		<dc:creator>Dustin</dc:creator>
				<category><![CDATA[Information Security]]></category>
		<category><![CDATA[Mac]]></category>
		<category><![CDATA[iPad]]></category>
		<category><![CDATA[Apple]]></category>
		<category><![CDATA[device]]></category>
		<category><![CDATA[Ipad]]></category>
		<category><![CDATA[iPad security]]></category>
		<category><![CDATA[iPad2]]></category>
		<category><![CDATA[password]]></category>
		<category><![CDATA[protect]]></category>
		<category><![CDATA[protection]]></category>

		<guid isPermaLink="false">http://www.computerfitness.com/blog/?p=1091</guid>
		<description><![CDATA[<div class="wp_twitter_button" style="float: right; margin-left: 10px;">
					<a href="http://twitter.com/share?counturl=http%3A%2F%2Fwww.computerfitness.com%2Fblog%2F2011%2F06%2F10-ipad2-security-tips-to-help-protect-your-investment%2F" class="twitter-share-button" data-url="http://www.computerfitness.com/blog/2011/06/10-ipad2-security-tips-to-help-protect-your-investment/" data-count="vertical" data-via="" data-lang="de" data-text="10 iPad2 Security Tips to Help Protect Your Investment &#187; ComputerFitness.com #Apple #device #Informati [...]">Tweet</a><br />
					
				</div>
<p><strong><br />
</strong></p>
<p>Earlier this month Apple held its annual <a title="Worldwide Developers Conference" href="http://www.internetbeacon.com/blog/2011/06/apple-icloud-rumors-to-be-confirmed-at-the-annual-wwdc-on-june-6-2011/" target="_blank">Worldwide Developers Conference</a>, during the event Apple unveiled the new features of <a title="iOS 5" href="http://www.computerfitness.com/blog/2011/06/apple-introduces-ios-5-and-all-the-new-features/" target="_blank">iOS 5</a> which is set to arrive later this fall . Although the much anticipated release of the <a title="iPad2" href="http://www.apple.com/ipad/" target="_blank">iPad2</a> had come and gone back in March, the news of the newest iOS  has seemed to spur iPad2 sales. At a price range set from $499-$829, these devices are definitely an investment that is worth protecting. The following are ten tips to help ensure the safety and protection of iPad devices. The list covers both physical and virtual security so that customers can hopefully prolong the life of their device and be able to take full advantage of the upcoming iOS improvements.</p>
<div id="attachment_1094" class="wp-caption alignright" style="width: 242px;"><a href="http://www.computerfitness.com/blog/wp-content/uploads/2011/06/ipad-Passcode.png"><img class="size-medium wp-image-1094" title="ipad Passcode screen" src="http://www.computerfitness.com/blog/wp-content/uploads/2011/06/ipad-Passcode-232x300.png" alt="ipad Passcode screen" width="232" height="300" /></a>
<p class="wp-caption-text">from http://www.apple.com/ipad/features/, June 2011</p>
</div>
<ul>
<li><strong>Use a Case: </strong></li>
</ul>
<p>The <a title="iPad Smart Cover" href="http://www.apple.com/ipad/smart-cover/" target="_blank">iPad Smart Cover</a> isn’t a customer’s only choice however it seems to offer the most protection along with usability. In addition to providing protection, the Smart Cover can also be transformed into an iPad stand with various positions, activate the sleep mode when covered, wake the device when uncovered, grip the iPad using built in magnets, comes in a number of colors and is available in two different materials. Users can also choose to use full shell cases for heavy duty protection or portfolio and envelope cases for the professional environment.</p>
<ul>
<li><strong>Screen Protection: </strong></li>
</ul>
<p>A case or cover doesn’t necessarily mean the screen is fully protected. Screen or scratch protectors are well worth the purchase and not only do they prevent scratches but they have also been known to prevent the screen from shattering on impact. Prior to the release of the iPad2, Apple had stopped selling all anti-glare and screen protection film as what was thought to be a way&#8230; <a href="http://www.computerfitness.com/blog/2011/06/10-ipad2-security-tips-to-help-protect-your-investment/" class="read_more">Read the rest</a></p>]]></description>
		<wfw:commentRss>http://www.computerfitness.com/blog/2011/06/10-ipad2-security-tips-to-help-protect-your-investment/feed/</wfw:commentRss>
		<slash:comments>1</slash:comments>
		</item>
		<item>
		<title>Hackers Gone Wild, Where&#8217;s the Security When You Need It?</title>
		<link>http://www.computerfitness.com/blog/2011/06/hackers-gone-wild-where%e2%80%99s-the-security-when-you-need-it/</link>
		<comments>http://www.computerfitness.com/blog/2011/06/hackers-gone-wild-where%e2%80%99s-the-security-when-you-need-it/#comments</comments>
		<pubDate>Wed, 15 Jun 2011 13:28:33 +0000</pubDate>
		<dc:creator>Dustin</dc:creator>
				<category><![CDATA[Information Security]]></category>
		<category><![CDATA[anonymous]]></category>
		<category><![CDATA[cyber attack]]></category>
		<category><![CDATA[hack]]></category>
		<category><![CDATA[hacker]]></category>
		<category><![CDATA[Hackers]]></category>
		<category><![CDATA[lulze security]]></category>
		<category><![CDATA[network access]]></category>
		<category><![CDATA[system vulnerabilites]]></category>

		<guid isPermaLink="false">http://www.computerfitness.com/blog/?p=1078</guid>
		<description><![CDATA[<div class="wp_twitter_button" style="float: right; margin-left: 10px;">
					<a href="http://twitter.com/share?counturl=http%3A%2F%2Fwww.computerfitness.com%2Fblog%2F2011%2F06%2Fhackers-gone-wild-where%25e2%2580%2599s-the-security-when-you-need-it%2F" class="twitter-share-button" data-url="http://www.computerfitness.com/blog/2011/06/hackers-gone-wild-where%e2%80%99s-the-security-when-you-need-it/" data-count="vertical" data-via="" data-lang="de" data-text="Hackers Gone Wild, Where&#8217;s the Security When You Need It? &#187; ComputerFitness.com #anonymous #cybe [...]">Tweet</a><br />
					
				</div>
<p style="text-align: left;"><strong> </strong>It’s hard to miss all of the news headlines about hacker groups and security intrusions. These attacks now seem to be unavoidable even for <a title="Government agencies" href="http://www.montrealgazette.com/Hackers+break+into+Senate+computers/4943643/story.html" target="_blank">Government agencies</a>. For weeks now the public has been following the <a title="Sony Incident" href="http://www.computerfitness.com/blog/2011/04/playstation-network-attack-what-sony-is-doing-what-you-should-do-to-protect-yourself/" target="_blank">Sony Incident</a>, which now appears to have been only the tip of the iceberg. Even the State Senate computers have fallen victim to a group of hackers known as <a title="Lulze Security" href="http://www.huffingtonpost.com/2011/06/13/lulzsec-hackers-senate-computers_n_876304.html" target="_blank">Lulze Security</a>.</p>
<div id="attachment_1081" class="wp-caption alignright" style="width: 178px;"><a href="http://www.computerfitness.com/blog/wp-content/uploads/2011/06/Anon-Logo.png"><img class="size-full wp-image-1081 " title="Anon Logo" src="http://www.computerfitness.com/blog/wp-content/uploads/2011/06/Anon-Logo.png" alt="Anon Logo" width="168" height="156" /></a>
<p class="wp-caption-text">Anonymous</p>
</div>
<p style="text-align: left;">In the past week both the Lulze Security group as well as the cyber group “<a title="Anonymous" href="http://www.huffingtonpost.com/2011/06/13/anonymous-demands-fed-chairman-resign_n_876269.html?ir=Technology" target="_blank">Anonymous</a>” have taken responsibility for several attacks. Lulze Security have claimed responsibility for the attacks on the Sony Picture’s website, PBS.com, Fox.com, and the DDoS attacks on game company Bethesda.  According to thier <a title="LulzSec Twitter Page" href="http://twitter.com/#!/LulzSec" target="_blank">LulzSec Twitter Page</a> they are now apparently taking hacking request through a messaging hotline. As for Anonymous they have claimed to be responsible for the Bank of America attack, the Spanish Police Department attack, and are thought to be behind the <a title="Sony PSN" href="http://us.playstation.com/" target="_blank">Sony PSN</a> disaster. To prove their infiltration on the Senate network Lulze Security has posted a list of files online along side their other postings. However, it was said that none of the data taken from the Senate’s network contained sensitive information. Although it’s not completely clear whether or not sensitive files were actually obtained, the intrusion itself displays the group’s capabilities and malicious intent.</p>
<p>Compared to last couple months, it seems that these types of attacks have changed direction moving from the acquisition of personal information to the infiltration of high powered and influential organizations. Besides gaining access to personal or financial information, perhaps these attacks are based on retaliation, display of power, or reputation. Speculation aside what’s truly concerning is the lack of security or the&#8230; <a href="http://www.computerfitness.com/blog/2011/06/hackers-gone-wild-where%e2%80%99s-the-security-when-you-need-it/" class="read_more">Read the rest</a></p>]]></description>
		<wfw:commentRss>http://www.computerfitness.com/blog/2011/06/hackers-gone-wild-where%e2%80%99s-the-security-when-you-need-it/feed/</wfw:commentRss>
		<slash:comments>0</slash:comments>
		</item>
		<item>
		<title>Apple Introduces IOS 5 and All the New Features</title>
		<link>http://www.computerfitness.com/blog/2011/06/apple-introduces-ios-5-and-all-the-new-features/</link>
		<comments>http://www.computerfitness.com/blog/2011/06/apple-introduces-ios-5-and-all-the-new-features/#comments</comments>
		<pubDate>Wed, 08 Jun 2011 18:39:09 +0000</pubDate>
		<dc:creator>Dustin</dc:creator>
				<category><![CDATA[Mac]]></category>
		<category><![CDATA[Software]]></category>
		<category><![CDATA[Apple]]></category>
		<category><![CDATA[iCloud]]></category>
		<category><![CDATA[IOS 5]]></category>
		<category><![CDATA[Ipad]]></category>
		<category><![CDATA[iPod]]></category>
		<category><![CDATA[mac]]></category>
		<category><![CDATA[mobile device]]></category>
		<category><![CDATA[Operating Systems]]></category>
		<category><![CDATA[OS X Lion]]></category>

		<guid isPermaLink="false">http://www.computerfitness.com/blog/?p=1067</guid>
		<description><![CDATA[<div class="wp_twitter_button" style="float: right; margin-left: 10px;">
					<a href="http://twitter.com/share?counturl=http%3A%2F%2Fwww.computerfitness.com%2Fblog%2F2011%2F06%2Fapple-introduces-ios-5-and-all-the-new-features%2F" class="twitter-share-button" data-url="http://www.computerfitness.com/blog/2011/06/apple-introduces-ios-5-and-all-the-new-features/" data-count="vertical" data-via="" data-lang="de" data-text="Apple Introduces IOS 5 and All the New Features &#187; ComputerFitness.com #Apple #iCloud #IOS 5 #Ipad #iPo [...]">Tweet</a><br />
					
				</div>
<p style="text-align: left;"><strong> </strong>This week major companies have taken to the stage to introduce their new and future products. Having the <a title="E3 Expo" href="http://www.e3expo.com/" target="_blank">E3 Expo</a> and the <a title="Worldwide Developers Conference" href="http://developer.apple.com/wwdc/" target="_blank">Worldwide Developers Conference</a> scheduled for the same week certainly provided a week full of exciting news and entertainment for customers. At E3 companies like <a title="Sony" href="http://us.playstation.com/" target="_blank">Sony</a>, <a title="Microsoft" href="http://www.xbox.com/en-US/" target="_blank">Microsoft</a>, and <a title="Nintendo" href="http://www.nintendo.com/" target="_blank">Nintendo</a> all provided insight into their latest developments that included PlayStation Vita, Nintendo 3DS, and Nintendo Wii U. Apple was the first to publicly display their future software products at the Worldwide Developers Conference that took place on June 6, 2011.</p>
<div id="attachment_1072" class="wp-caption alignright" style="width: 258px;"><a href="http://www.computerfitness.com/blog/wp-content/uploads/2011/06/ios5.png"><img class="size-full wp-image-1072" title="Apple iOS5" src="http://www.computerfitness.com/blog/wp-content/uploads/2011/06/ios5.png" alt="Apple iOS5" width="248" height="244" /></a>
<p class="wp-caption-text">from http://www.apple.com/ios/ios5/, June 2011</p>
</div>
<p style="text-align: left;">
</p><p style="text-align: left;">There had been a lot of talk leading up to Apple&#8217;s announcements, even more so than usual since this year they went so far as to provide an outline of key topics prior to the conference. Among the announcements made by Apple was the new iCloud, <a title="OS X Lion" href="http://www.apple.com/macosx/" target="_blank">OS X Lion</a>, and IOS 5. We have been hearing rumors for some time now about Apple’s new iCloud product which for the most part have all been confirmed. To learn more about iCloud you can visit our “<a title="Apple iCloud Rumors to Be Addressed at the 2011 WWDC" href="http://www.internetbeacon.com/blog/2011/06/apple-icloud-rumors-to-be-confirmed-at-the-annual-wwdc-on-june-6-2011/" target="_blank">Apple iCloud Rumors to Be Addressed at the 2011 WWDC</a>” blog post and to learn more about OS X Lion check out <a title="9 Things to Know about Apples latest OS" href="http://www.huffingtonpost.com/2011/06/06/mac-osx-lion-wwdc-2011_n_871962.html#s287979&#38;title=FullScreen_Apps" target="_blank">9 Things to Know about Apples latest OS.</a> Bringing us back to IOS 5, like OS X Lion this software version introduces a ton of new features. Here is a round-up of some of the key features that IOS 5 will have to offer when it becomes available later this year.</p>
<p><a title="IOS 5" href="http://www.apple.com/ios/ios5/" target="_blank">IOS 5</a> will offer over 200&#8230; <a href="http://www.computerfitness.com/blog/2011/06/apple-introduces-ios-5-and-all-the-new-features/" class="read_more">Read the rest</a></p>]]></description>
		<wfw:commentRss>http://www.computerfitness.com/blog/2011/06/apple-introduces-ios-5-and-all-the-new-features/feed/</wfw:commentRss>
		<slash:comments>0</slash:comments>
		</item>
		<item>
		<title>Sony PSN Update: The PlayStation Store Is Now Up and Running but Will it Stick?</title>
		<link>http://www.computerfitness.com/blog/2011/06/sony-psn-update-the-playstation-store-is-now-up-and-running-but-will-it-stick/</link>
		<comments>http://www.computerfitness.com/blog/2011/06/sony-psn-update-the-playstation-store-is-now-up-and-running-but-will-it-stick/#comments</comments>
		<pubDate>Thu, 02 Jun 2011 16:34:16 +0000</pubDate>
		<dc:creator>Dustin</dc:creator>
				<category><![CDATA[Information Security]]></category>
		<category><![CDATA[hack]]></category>
		<category><![CDATA[PlayStation]]></category>
		<category><![CDATA[PlayStation Network]]></category>
		<category><![CDATA[PlayStation Store]]></category>
		<category><![CDATA[PSN]]></category>
		<category><![CDATA[Sony]]></category>
		<category><![CDATA[Sony PlayStation]]></category>
		<category><![CDATA[Sony PSN]]></category>

		<guid isPermaLink="false">http://www.computerfitness.com/blog/?p=1050</guid>
		<description><![CDATA[<div class="wp_twitter_button" style="float: right; margin-left: 10px;">
					<a href="http://twitter.com/share?counturl=http%3A%2F%2Fwww.computerfitness.com%2Fblog%2F2011%2F06%2Fsony-psn-update-the-playstation-store-is-now-up-and-running-but-will-it-stick%2F" class="twitter-share-button" data-url="http://www.computerfitness.com/blog/2011/06/sony-psn-update-the-playstation-store-is-now-up-and-running-but-will-it-stick/" data-count="vertical" data-via="" data-lang="de" data-text="Sony PSN Update: The PlayStation Store Is Now Up and Running but Will it Stick? &#187; ComputerFitness.com  [...]">Tweet</a><br />
					
				</div>
<p style="text-align: left;">It has been over a month since <a title="Sony" href="http://www.sony.com/index.php" target="_blank">Sony</a> announced that the reason for the shutdown of their <a title="PlayStation Network" href="http://us.playstation.com/psn/" target="_blank">PlayStation Network</a> service on April 20, 2011 was due to an external intrusion. On May 4, 2011 Sony had confirmed that the <a title="PSN Attack" href="http://www.computerfitness.com/blog/2011/04/playstation-network-attack-what-sony-is-doing-what-you-should-do-to-protect-yourself/" target="PSN Attack">PSN Attack</a> was able to obtain the personal information from over 100 million users. Following the hack, Sony remained confident and projected a short downtime for the network. Although Sony initially stated that they would fully restore their services by the end of the week, the recovery process experienced unforeseen problems.</p>
<p style="text-align: left;">
<div id="attachment_1062" class="wp-caption alignright" style="width: 213px;">
<p><a href="http://www.computerfitness.com/blog/wp-content/uploads/2011/06/psnlogo.png"><img class="size-full wp-image-1062" title="PlayStation Network Logo" src="http://www.computerfitness.com/blog/wp-content/uploads/2011/06/psnlogo.png" alt="PlayStation Network Logo" width="203" height="210" /></a></p>
<p class="wp-caption-text">from http://us.playstation.com/psn/, June 2011</p>
</div>
</p><p>After being disabled for approximately 23 days, on May 15, 2011 the Sony PlayStation Network began restoring parts of their service country by country. At this time the sign-in for the PSN/Qriocity services, online gameplay, rental content, third party services, friends list, and chat functionality were all restored. Missing from the services that were brought back online was the <a title="PlayStation Store" href="http://us.playstation.com/psn/playstation-store/index.htm" target="_blank">PlayStation Store</a>. Once back online the network again faced an issue concerning the password reset page. It was discovered that the password reset process was enabling unauthorized users to change the passwords of other users provided that they had knowledge of their email address and date of birth. After the discovery of this exploit the network disabled the password reset pages and resumed working to restore the PlayStation Store.</p>
<p>Sony announced that they will be offering customers free content as a part of a “<a title="Welcome Back Program" href="http://blog.us.playstation.com/2011/05/16/details-for-playstation-network-and-qriocity-customer-appreciation-program-in-north-america/" target="_blank">Welcome Back Program</a>”. The free customer appreciation content will be available sometime shortly after full restoration. Sony has also stated that the cost of the network outages and restoration was $171 million which includes the costs of security enhancements, customer reimbursements, and loss of content sales.&#8230; <a href="http://www.computerfitness.com/blog/2011/06/sony-psn-update-the-playstation-store-is-now-up-and-running-but-will-it-stick/" class="read_more">Read the rest</a></p>]]></description>
		<wfw:commentRss>http://www.computerfitness.com/blog/2011/06/sony-psn-update-the-playstation-store-is-now-up-and-running-but-will-it-stick/feed/</wfw:commentRss>
		<slash:comments>0</slash:comments>
		</item>
		<item>
		<title>How to Avoid and Remove the MacDefender Malware</title>
		<link>http://www.computerfitness.com/blog/2011/05/how-to-avoid-and-remove-the-macdefender-malware/</link>
		<comments>http://www.computerfitness.com/blog/2011/05/how-to-avoid-and-remove-the-macdefender-malware/#comments</comments>
		<pubDate>Fri, 27 May 2011 18:06:21 +0000</pubDate>
		<dc:creator>Dustin</dc:creator>
				<category><![CDATA[Information Security]]></category>
		<category><![CDATA[Internet]]></category>
		<category><![CDATA[Mac]]></category>
		<category><![CDATA[mac]]></category>
		<category><![CDATA[MacDefender]]></category>
		<category><![CDATA[MacDefender Malware]]></category>
		<category><![CDATA[malicious software]]></category>
		<category><![CDATA[Malware]]></category>
		<category><![CDATA[malware removal]]></category>
		<category><![CDATA[phishing]]></category>
		<category><![CDATA[virus removal]]></category>

		<guid isPermaLink="false">http://www.computerfitness.com/blog/?p=1024</guid>
		<description><![CDATA[<div class="wp_twitter_button" style="float: right; margin-left: 10px;">
					<a href="http://twitter.com/share?counturl=http%3A%2F%2Fwww.computerfitness.com%2Fblog%2F2011%2F05%2Fhow-to-avoid-and-remove-the-macdefender-malware%2F" class="twitter-share-button" data-url="http://www.computerfitness.com/blog/2011/05/how-to-avoid-and-remove-the-macdefender-malware/" data-count="vertical" data-via="" data-lang="de" data-text="How to Avoid and Remove the MacDefender Malware &#187; ComputerFitness.com #Information Security #mac #MacD [...]">Tweet</a><br />
					
				</div>
<p>Recently the <a title="MacDefender Malware" href="http://arstechnica.com/apple/news/2011/05/apple-acknowledges-mac-defender-malware-promises-software-update.ars" target="_blank">MacDefender Malware</a> has created a lot of concerns for <a title="Mac" href="http://www.apple.com/mac/?cid=OAS-US-DOMAINS-mac.com" target="_blank">Mac</a> users all around the world. Quickly spreading, the MacDefender Malware is a phishing scheme that presents  a message that informs users that their system has been corrupted. The ploy goes on to tell Mac user that the only way to remove the viruses is to utilize the MacDefender app. The MacDefender <a title="malware" href="http://www.wisegeek.com/what-is-malware.htm" target="_blank">malware</a> can also appear as MacProtector and MacSecurity. The malware does not infect a user&#8217;s machines with viruses or monitor keystrokes. Their sole purpose is to frighten and persuade users to purchase the MacDefender application thus gaining access to the customer’s credit card information.</p>
<div id="attachment_1027" class="wp-caption alignright" style="width: 230px;"><a href="http://www.computerfitness.com/blog/wp-content/uploads/2011/05/apple-logo1.png"><img class="size-full wp-image-1027 " title="apple logo" src="http://www.computerfitness.com/blog/wp-content/uploads/2011/05/apple-logo1.png" alt="apple logo" width="220" height="189" /></a>
<p class="wp-caption-text">from http://www.Apple.com, May 2011</p>
</div>
<p>Mac has estimated that between 60,000 and 125,000 Mac users have already been exposed to this malware. Most users have encountered this problem through poisoned Google images. When users access a poisoned link, a page will launch and display a virus scan. After being transferred to the infected webpage the software begins to download and informs users of an infection. Previously the malware required permission to install but despite the efforts made by Mac a newer version of the malware has been created, which no longer needs the user’s permission. This MacDefender version automatically installs on a machine during the fake scan process.</p>
<p>Mac has yet to take action against the initial malware but has stated they will have a resolution with their next <a title="OS X Update" href="http://support.apple.com/kb/ht4650" target="_blank">OS X Update</a>. Mac states that they will “deliver a Mac OS X software update that will automatically find and remove Mac Defender malware and its known variants. Mac however has not addressed the new version of the malware and has also informed their support staff <a title="Not to assist users with MacDefender removal" href="http://www.zdnet.com/blog/bott/apple-to-support-reps-do-not-attempt-to-remove-malware/3362?tag=nl.e539" target="_blank">Not to assist users with MacDefender removal</a>. Although&#8230; <a href="http://www.computerfitness.com/blog/2011/05/how-to-avoid-and-remove-the-macdefender-malware/" class="read_more">Read the rest</a></p>]]></description>
		<wfw:commentRss>http://www.computerfitness.com/blog/2011/05/how-to-avoid-and-remove-the-macdefender-malware/feed/</wfw:commentRss>
		<slash:comments>0</slash:comments>
		</item>
		<item>
		<title>Potential Government Regulation Means More Upsetting News for Facebook</title>
		<link>http://www.computerfitness.com/blog/2011/05/potential-government-regulation-means-more-upsetting-news-for-facebook/</link>
		<comments>http://www.computerfitness.com/blog/2011/05/potential-government-regulation-means-more-upsetting-news-for-facebook/#comments</comments>
		<pubDate>Fri, 20 May 2011 14:24:25 +0000</pubDate>
		<dc:creator>Dustin</dc:creator>
				<category><![CDATA[Information Security]]></category>
		<category><![CDATA[Social Networking]]></category>
		<category><![CDATA[Facebook]]></category>
		<category><![CDATA[government]]></category>
		<category><![CDATA[government regulation]]></category>
		<category><![CDATA[Networking]]></category>
		<category><![CDATA[privacy]]></category>
		<category><![CDATA[privacy policy]]></category>
		<category><![CDATA[regulation]]></category>
		<category><![CDATA[social networking]]></category>

		<guid isPermaLink="false">http://www.computerfitness.com/blog/?p=1012</guid>
		<description><![CDATA[<div class="wp_twitter_button" style="float: right; margin-left: 10px;">
					<a href="http://twitter.com/share?counturl=http%3A%2F%2Fwww.computerfitness.com%2Fblog%2F2011%2F05%2Fpotential-government-regulation-means-more-upsetting-news-for-facebook%2F" class="twitter-share-button" data-url="http://www.computerfitness.com/blog/2011/05/potential-government-regulation-means-more-upsetting-news-for-facebook/" data-count="vertical" data-via="" data-lang="de" data-text="Potential Government Regulation Means More Upsetting News for Facebook &#187; ComputerFitness.com #Facebook [...]">Tweet</a><br />
					
				</div>
<p style="text-align: left;"><a href="http://www.computerfitness.com/images/congress.jpg"><img class="alignleft" title="congress" src="http://www.computerfitness.com/images/congress.jpg" alt="congress" width="219" height="143" /></a>In case it wasn’t bad enough that <a title="Facebook" href="http://www.facebook.com/" target="_blank">Facebook</a> was discovered to be behind the recent <a title="Google" href="http://www.google.com/" target="_blank">Google</a> smear campaign they now have to also deal with looming government regulations. Although it has only been a couple of days since it was announced that Facebook hired PR firm <a title="Burson-Marstellar" href="http://www.burson-marsteller.com/default.aspx" target="_blank">Burson-Marstellar</a> to smear Google’s name, both companies have teamed up to take on the Social Networking Privacy Act (<a title="SB 242" href="http://info.sen.ca.gov/pub/11-12/bill/sen/sb_0201-0250/sb_242_bill_20110502_amended_sen_v98.html" target="_blank">SB 242</a>). Along with Google and Facebook, <a title="Twitter" href="http://www.twitter.com/" target="_blank">Twitter</a> and <a title="Skype" href="http://www.skype.com/" target="_blank">Skype</a> were also mentioned to have cosigned a letter strongly opposing the new bill.</p>
<p>This isn’t the first time that we have heard of the bill that was introduced by California Senate Majority Leader Ellen M. Corbett. The bill previously addressed the privacy and security for users under 13 but has since been amended to incorporate all users after initially facing heavy opposition. The motivation behind the legislation was to protect underage users, it’s estimated that although the Facebook age limit is set at 13, over 7.5 million users are under that age and 5 million of those users are even under the age of 10. <a title="The Polly Klaas Foundation" href="http://www.pollyklaas.org/" target="_blank">The Polly Klaas Foundation</a> found that over 42% of teens post personal identifiable information on social media sites which provides a solid foundation to Corbett’s concerns.</p>
<p>The Social Networking Privacy Act would require users to select and acknowledge their privacy settings before submitting their user registration. The default privacy setting would list only a user name and city of residence until that user decides to adjust their user settings. In Senate Majority Leader Corbett’s words &#8220;you shouldn&#8217;t have to sign in and give up your personal information before you get to the part where you say &#8216;please don&#8217;t share my personal information.”</p>
<p>Facebook CEO <a title="Mark Zuckerberg" href="http://www.facebook.com/markzuckerberg" target="_blank">Mark Zuckerberg</a> states that “making personal data public is&#8230; <a href="http://www.computerfitness.com/blog/2011/05/potential-government-regulation-means-more-upsetting-news-for-facebook/" class="read_more">Read the rest</a></p>]]></description>
		<wfw:commentRss>http://www.computerfitness.com/blog/2011/05/potential-government-regulation-means-more-upsetting-news-for-facebook/feed/</wfw:commentRss>
		<slash:comments>1</slash:comments>
		</item>
	</channel>
</rss>
