I was selling computers at retail when I heard of Gary Kildall’s death. We had a few copies of Wordstar for Windows and someone asked about it. I said it was easier to remember the keyboard shortcuts in Wordstar than Wordperfect.
“You sound like a CP/M guy,” said someone who overheard me. “Did you hear that Gary Kildall died last month?”
I hadn’t, and he wasn’t surprised. I was curious, so I went to the library and found a whole lot of nothing. A month or two later, I found a mention in a computer magazine column that Kildall had died in a barroom fight but it gave no specifics.
I got e-mail the other day from Turbotax saying someone had filed my taxes for me. Obviously a cause for concern, right? Here’s how I determined the message was fake in about three minutes. You can spot phishing e-mails with Outlook the same way.
Some people will tell you not to even open a message like this, but if you’re a computer professional, at some point someone is going to want you to prove the message was fake. I think this is something every e-mail administrator, desktop support professional, security professional, and frankly, every helpdesk professional ought to be able to do.
So here’s how you can get the proof. And generally speaking, Outlook 2010’s default configuration is paranoid enough that this procedure will be safe to do. If you want an extra layer of protection, make sure you have EMET installed and protecting Outlook.
The most infamous Microsoft patch of all time, in security circles at least, is MS08-067. As the name suggests, it was the 67th security update that Microsoft released in 2008. Less obviously, it fixed a huge problem in a file called netapi32.dll. Of course, 2008 was a long time ago in computing circles, but not far enough. I still hear stories about production servers that are missing MS08-067.
Last week, Microsoft took a look back at MS08-067, sharing some of its own war stories, including how they uncovered the vulnerability, developed a fix, and deployed it quickly. It’s unclear who besides Microsoft knew about the problem at the time, but one must assume others were aware of it and using it. They certainly were after the fall of 2008.
It was on August 24, 1995 that Windows 95 was released, amidst much anticipation. It was the most widely anticipated Windows release of all time, and the runner up really isn’t close. The idea of people lining up for blocks for a Microsoft product sounds like a bit of a joke today, but in 1995 it happened.
I received a free copy of it because I worked at Best Buy in the summer of 1995 and I aced Microsoft’s test that demonstrated sufficient aptitude to sell it. A few weeks later I landed my first desktop support gig, ending my career in a blue shirt, which means I probably never actually talked anyone into buying a copy of it.
I got plenty of Win95 experience over the next couple of years though.
Many years ago, I wrote something titled Memory Buying Secrets. That post is lost to history, thanks to migrations in this site’s early years, but there are a number of things you need to know when you’re buying memory that can save you money and frustration, so I figured I would revisit that topic today. Here are my tips for buying computer memory, based on decades of experience. Read more
So, if you haven’t heard by now, last year Lenovo experimented with preloading its cheapest laptops with spyware that subverts HTTPS, allowing a third party to inject ads on any web page, and providing a convenient place for an attacker to hide behind while messing with your secure transactions.
By the end of the day yesterday, Lenovo had apologized, sort of, and after several sites had provided removal instructions, Lenovo provided its own. After spending much of the day downplaying the security concerns, by the end of the day they were at least reluctantly acknowledging them.
This was really bad, and I’ll explain why in a second, and I’ll also try to explain why Lenovo did it.
Growing up in Missouri, a lot of my Christmas gifts when I was young came from a catalog showroom called Dolgin’s. One of my earliest memories is going to Dolgin’s with my mom and aunt, who showed me some Tonka trucks and asked me which ones I liked best.
I know a lot of people remember going through Sears and Montgomery Ward catalogs, but I remember Dolgin’s catalogs the best. Read more
A rather hastily written and sloppily edited piece showed up on Slashdot yesterday morning that caught my attention, because it was about the Amiga 2000. The Amiga 2000 is a dear machine to me; in 1991, our family upgraded to one from a Commodore 128. I still have both machines, and there isn’t much that I know today that I didn’t first experience on one of those two machines.
Although I think the piece was little more than a used computer store’s effort to unload some hard-to-move inventory, I do agree with the premise. For a machine that had a tremendous impact on the world as we know it today, the A2000 is criminally unknown. Read more
A team of digital archaeologists recovered a series of images off floppy disks from Andy Warhol’s estate, including a number of experimental images created by Warhol himself. Judging from the comments in the various places that covered the discovery, the Internet is unimpressed.
Yes, these images appear to be the result of Warhol messing around. In many ways, they’re not all that different from what anyone might produce today messing around with a digital camera and a simple paint program with a fill pattern.
I’m not sure how many of the critics realize Warhol created this stuff in 1985 or perhaps even late 1984, using preproduction, prerelease hardware and software. All of it was likely buggy. And, as much as I like the Amiga, none of it was anywhere near today’s standards at that point. The stuff he had to work with was nowhere near 1989 standards–the Amiga in its early days was notoriously finicky.