Google opens update software to scrutiny

June 15, 2009
In an attempt to better show what its software is up to, Google has released the source code of its Google Update software, a project code-named Omaha that can automatically install new versions of programs, including the Chrome browser and Google Earth.

"Some users can be surprised to find this program running, and at Google, we don't like disappointing our users. We've been working hard to address these concerns, and releasing the source code for Omaha is our attempt to make the purpose of Google Update totally transparent," Myles Jordan of Google's software engineering team and Michael Smith of its product management team said in a blog post Friday.

Google believes in automatic updates of software so security vulnerabilities can be patched quickly, and Google Update is the tool that permits automatic downloading and installation of a new version in the background so it's ready to run the next time the program is launched.

Sharing source code can allay concerns about what exactly software is up to, but Google also hopes that others will be able to use Omaha.

"Keeping software up-to-date is hard. So if you're thinking of developing your own auto-updater, or have already started, we hope that the code we are releasing today will be helpful to you," the Google employees said.

The company also released an Omaha developer guide for those wishing to use the software. Omaha is governed by the Apache License 2.0, Google's preferred open-source software license.
 

Yahoo shares up on news of Microsoft ad deal talks

June 15, 2009

Yahoo shares rose in intraday trading Monday on reports that the company is in preliminary talks for an advertising partnership with Microsoft.

Yahoo's stock was up as much as 7.6 percent to $14.49 in early morning trading, a level it hasn't seen since early October. Yahoo's gains also went against the tide of the broader markets, which were down in morning trading.

The bump in Yahoo's share price follows reports on Friday that the Internet search pioneer has had discussions with Microsoft recently about such a deal.

Microsoft's CEO Steve Ballmer reportedly remains focused on a search advertising deal with Yahoo, but one that only goes so far and falls short of his previous attempts to acquire the entire company.

Nonetheless, investors apparently were pleased at the notion the two companies are at least sitting down and speaking with each other about a search advertising deal or partnership.

The reported talks come at a time when Microsoft and Yahoo are seeking ways to narrow the gap with Google, who has a substantial lead over its competitors.

Google's slice of the U.S.paid search advertising market is expected to perform on par or better than Wall Street expects when it reports its first quarter results on Thursday, according to a research report released Monday by an Oppenheimer & Co. analyst.

In his research report, analyst Jason Helfstein notes:

We believe the Street expects U.S. paid clicks to decline; however, third-party data suggests first quarter U.S. paid clicks increased 10 percent year over year, and coupled with recent cost initiatives, should result in upside to our and Street estimates.

Helfstein noted he expects Google to report a five percent year-over-year decline in first quarter paid click revenues, while third-party data indicates a 10 percent increase in year-over-year paid click revenues.

Shares of Google rose a modest 1.8 percent to $379.10 a share in intraday trading Monday, while the broader markets remained under pressure.

 

Twitter cleans up after weekend worm attacks

June 15, 2009
Twitter security engineers were cleaning up on Monday following a series of worm attacks over the weekend, including at least two credited to a bored 17-year-old.

In the first attack, which began early on Saturday, four new accounts began spreading a worm, compromising about 90 accounts, Twitter co-founder Biz Stone wrote in a posting on the Twitter blog.

The worms appeared to do no damage other than spread to infected users' followers and modify profile pages. You can get infected just by clicking on the name or image of someone whose account was infected.

Later that afternoon, about 100 accounts were compromised in a second wave, followed by another wave on Sunday morning, he wrote. Nearly 10,000 tweets that could have spread the worm were deleted, according to Stone.

Late on Sunday and into Monday morning, Twitter fended off another attack, he said. "Once again, we secured the compromised accounts and deleted any material that would further propagate the worm," he wrote. Stone declined an interview request from CNET News, saying he didn't have time.

The worms exploit a common vulnerability in Web applications called cross-site scripting, which allows someone to inject code into Web pages others are viewing.

In this instance, Twitter users who clicked on the name or image of anyone sending the worm messages would get infected and then send the message on to all that person's followers. Anyone viewing an infected user's profile would also get infected and pass the worm on.

Interviewed by CNET News on Sunday after the first two iterations circulated, Michael Mooney, a 17-year-old living in Brooklyn, said he created the worms out of boredom. The messages in the first outbreak included a link to rival microblogging site, Stalkdaily.com, which Mooney owns.

Mooney said in the interview that he did not plan on releasing any more worms targeting Twitter. He could not be reached for comment on Monday.

The first worm messages warned people not to go to the StalkDaily site, which would infect a Twitter user's account if they visited the site. The second worm message contained the phrase "Mikeyy" and the third referred to removing the Mikeyy worm but used "bit.ly" to add shortened URLs to messages, said Andy Hayter, anti-malcode program manager for ICSA Labs, which provides third-party validation for security products.

The most recent attack involved a message saying "Hire Mikeyy" and included Mooney's phone number, according to Graham Cluley, a senior technology consultant with security firm Sophos.

"What we're seeing was it was possible for codes to be embedded, small pieces of JavaScript, into people's profiles. This should be fairly elemental to filter out," he said.

While the attacks were mostly a nuisance, they could have been dangerous if spyware or other malware had been downloaded onto Twitter users' computers, Cluley said.

To avoid such JavaScript-based attacks, you can turn off JavaScript in your browser. Instructions for doing this are here. You can also use utilities such as NoScript, an open-source Firefox extension, Hayter recommended.

Users of infected Twitter accounts should also request a password reset and go to the settings page and delete any profile or other information that may have been added during the attack. To reset colors go to the profile design page.

Twittercism has detailed instructions on how to tell if you are infected and how to remove the worm.

And just like e-mail users should be careful what e-mail attachments they open, be careful who you follow on Twitter, Hayter said.
 



Best Communitation Website
Which communication website is best?

Myspace
Facebook
Twitter
Furry-paws
Youtube


Make a free website with Yola