17/05/2007

Researcher Reveals 2-Step Vista UAC Hack

The technique uses social engineering to trick the victim into downloading an innocent-looking file that includes a Trojan horse attack.

Microsoft: Hardware Trends Create 'Perfect Storm'

Microsoft is moving to 64-bit server operating systems after Windows Server 2008, company execs say at WinHEC, praising the increased performance and security of the new hardware.

Desktop Virtualization Is Starting to Expand

With virtualization fairly well established in the data center as a way to squeeze more out of x86 servers, top vendors, industry watchers and customers have started to turn more attention to getting that same type of potential ...

Broadcom N Router Gets Draft 2.0 Certification

Semiconductor company Broadcom announced today that its line of Intensi-fi routers has received certification for Draft 2.0 of the 802.11n spec by the Wi-Fi Alliance.

Google Marches Toward Universal Search

Beginning today, Google is starting down a path toward integrating search information from previously disparate sources like books, Web sites, video, maps, news, and more.

Scientists seek useful traits in wild cottons

If you have Mom's smile, Dad's eyes and Grandpa's laugh, you might wonder what other traits you picked up from the genealogic fabric of the ol' family tree. Scientists at the Texas A&M University System Agricultural Research ...

page 4 from 5