Despite Google’s best attempts at getting people to switch to Google Docs, much of the world still works in Microsoft Office. It may be a while before Google can win the format wars; but in the meantime, it will make sure Chrome users stay in Chrome when opening Microsoft documents.
Google announced that Chrome Beta for desktop can now open Microsoft Office documents directly in the browser. In other words, all of your Microsoft Word, Excel and Powerpoint files can be accessed in the browser without having to open Microsoft Office.
You could interpret this as Google firing a warning shot across Microsoft’s bow, but Google says it’s only watching out for its users:
In addition to saving you time, the Chrome Office Viewer also protects you from malware delivered via Office files. Just like with web pages and PDFs, we’ve added a specialized sandbox to impede attackers who use compromised Office files to try to steal private information or monitor your activities.
If you want to start viewing Microsoft Office files in Chrome, you’re going to first need the Chrome Beta. You can grab that here. Next up, you’re gonna need the Chrome Office Viewer which is also in beta. Google reminds users to help them squash any remaining bugs in the Office Viewer by submitting bug reports whenever things go wrong.
SFC /scannow is a super-useful command you can use in any Windows version since Windows 2000. When the SFC (System File Checker) command is used with the /scannow switch, the tool will scan all of the important Windows files on your computer and replace them as necessary.
Missing and corrupt operating system files (like many DLL files) are arguably the biggest cause of major Windows issues. Considering that, plus the fact that SFC /scannnow is completely automatic and very easy to use, the tool should usually be one of your first troubleshooting steps.
try to doing a file repair.
Start > run > type in “sfc /scannow” without the quotes. WIndows will usually ask you to pop in the installation disc. It will repair all the dll files, and finish on it’s own.
Open Command Prompt as an administrator, often referred to as an “elevated” Command Prompt.
Important: For the sfc /scannow command to work properly, it must be executed from an elevated Command Prompt window in Windows 8, Windows 7 and Windows Vista. This is not required in previous versions of Windows.
Once Command Prompt is open, type the following command and then press Enter.
Note: There’s a space between sfc and /scannow.
Important: If you’re trying to use System File Checker from the Command Prompt available from Advanced Startup Options or System Recovery Options, see Tip #1 at the bottom of the page for some changes in how you execute sfc /scannow.
System File Checker will now verify the integrity of every protected operating system file on your computer.
Note: In some situations, especially in Windows XP and Windows 2000, you may also need access to your original Windows installation CD or DVD.
Restart your computer if sfc /scannow did actually repair any files.
Note: System File Checker may or may not prompt you to restart but even if it doesn’t, you should restart anyway.
Repeat whatever process caused your original problem to see if sfc /scannow corrected the issue.
When running sfc /scannow from outside of Windows, like from the Command Prompt available when you boot from your Windows disc or flash drive, or from your System Repair Disc or Recovery Drive, you’ll have to tell the sfc command exactly where Windows exists, as in this example:
sfc /scannow /offbootdir=d:\ /offwindir=d:\windows
The /offbootdir= option specifies the drive letter, while the /offwindir= option specifies the Windows path, again including the drive letter.
Note: Depending on how your computer is setup, the Command Prompt, when used from outside of Windows, doesn’t always assign drive letters in the same way that you see them from inside Windows. In other words, Windows might be at C:\Windows when you’re using it, but D:\Windows from the Command Prompt in System Recovery Options.
In most installations of Windows 8 and Windows 7, C: usually becomes D: and in Windows Vista, C: is usually still C:. To check for sure, look for the drive with the Users folder on it – that will be the drive Windows is installed on, unless you have multiple installations of Windows on multiple drives.
I owned a few 8 bit machines, this was the very first model of computer i owned that was manufactured by Amstrad. I obtained it as a load of parts that someone had tried to fix the keyboard & couldn’t, it also had an azimuth problem (which i later fixed with a special program) so loading games meant you had to drop some weight onto the tape deck lid.
I fixed the machine & learned a few things about it on the way. It was powered by a Zilog Z80 processor clocked at 4MHz, with 64K RAM built in, It also had 32K ROM containing the operating language and BASIC, and with a built-in cassette drive unlike it’s bigger brother the 6128 which had the 3″ Amstrad locosoft disc drive as did the rare 664 machine. It also had a stereo audio output which was via a small jack in the back, sadly you needed an amplifier of some description, or some modern day PC speakers to get any sound out of it as headphones were useless.
Upon bolting the machine back together i noticed on the main board there were some solder pads which were left open, later research lead me to believe this was how the machine was changed identity.. for example by soldering a wire bridge across the pads you could change the word “Amstrad” on the welcome screen to say “Schneider” or “Orion” depending on which 2 pads to bridge.
This was the 1st machine to be sold as a complete package, in the box it came with a colour or mono monitor – the “mono” monitor was green which for some reason 70’s & 80’s business machines always seemed to use green text on black backgrounds. I have to say i was not keen on the idea of a bespoke system when it 1st came along complete because if for example 1 part broke such as the tape deck this rendered much of the system useless, i much prefered seperate systems, although this was the 1st machine i had that didn’t mean i had to plug into the family colour TV or the old black & white portable in my bedroom to use as it had it’s own monitor although an add-on was an RF modulator.
The machine spec was very similar to the 48k Spectrum i found, with the graphics being more or less the same although the sprites were coloured improving from rather blocky cartoon like sprites with coloured halo’s & the machine had much better sound, although at the time i still owned & a spectrum & found myself sometimes buying 2 copies of the same game or buying the game for the spectrum & leaving the CPC for more business like purposes such as programming my own programs or games in BASIC.
A cyber attack described as the largest in history is currently underway, and it’s apparently all because of an argument over some spam.
The Spamhaus Project, based in both London and Geneva, produces lists of email addresses and servers that are known to send out things that most people won’t want, from penis enlargement scams to malware and viruses. Its decisions are incredibly influential, and it seems as though someone isn’t too happy about being blocked, since right now, a vast cyber attack is directed right at Spamhaus, threatening the internet’s core infrastructure.
The distributed denial of service (DDoS) attacks are so large that, currently, they’re peaking at a reported 300gb/s (that’s three hundred gigabits a second) of data. For comparison, that’s roughly a sixth the practical functioning capacity of one of the major transatlantic cables, TAT-14. Most people are judging this to be the largest DDoS attack in the history of the internet. Spamhaus’s Vincent Hanna confirmed that this was the largest such attack aimed at Spamhaus so far, and confirmed that it could “certainly” affect internet traffic elsewhere.
He said: “Core internet infrastructure may get overwhelmed by the amount of traffic involved in an attack. When this happens other traffic may get impacted too. Compare it to a big highway: If the traffic jam gets big enough the onramps will slow down and fill up, and the roads to the onramps will fill up too.”
According to a blog on the site of web security company Cloudfare (we were directed to it by Hanna), the first attack happened on 18 March. It said: “The attack was large enough that the Spamhaus team wasn’t sure of its size when they contacted us. It was sufficiently large to fully saturate their connection to the rest of the internet and knock their site offline. These very large attacks, which are known as Layer 3 attacks, are difficult to stop with any on-premise solution. Put simply: if you have a router with a 10Gbps port, and someone sends you 11Gbps of traffic, it doesn’t matter what intelligent software you have to stop the attack because your network link is completely saturated.”
The attacks have been continuing since then, growing larger and larger in size. For most people, there’s one main suspect. Last month, Spamhaus added the servers of Cyberbunker to its spam lists. Cyberbunker is a server company based in a decommissioned Nato bunker in the Dutch town of Kloetinge. Outside of the bunker live dozens of rabbits; inside are servers which host everything “except child porn and anything related to terrorism”, according to its website.
The sheer quantiy of spam emanating from Cyberbunker’s servers (showing as the address “cb3rob.net”) led Spamhaus to block all of its traffic, a decision which infuriated many people. Cyberbunker has been linked with criminal gangs from Russia and other Eastern European nations, contributing to Spamhaus’s decision to block its traffic.
This isn’t the first large attack on Spamhaus — as you might expect, an organisation dedicated to stopping spam and scammers isn’t going to be popular with some shady people — but it is remarkable in it scale.
Hanna said: “Some people online claim that we are not accountable and can just ‘censor’ anything we want. This is obviously not the case. Not only do we have to operate within the boundaries of the law, we are also accountable to our users. If we started advising our users not to accept mail from certain places where they actually do want email from, they would be very quick to stop using our data because it’s obviously not working right for them.”
The attacks coincide with the launch of a new initiative by the British government to help businesses and law enforcement agencies better share information on cyber attacks, which has been rather optimistically likened to a “secure Facebook”. Cyber crimes units are currently looking into the Spamhaus attacks.
Original article – http://www.wired.co.uk/news/archive/2013-03/27/biggest-cyber-attack-spamhaus