Find Which Applications Phone Home with VirusBarrier X6
Worried about rogue applications or spyware "phoning home" with your private data? Turn on VirusBarrier's Anti-Spyware feature, and it will alert you to applications that attempt to connect to remote servers. Once you know which apps are phoning home, you can block or allow each individually, and you can even block or allow specific ports for each application, to ensure that your private data stays private.
Last week's quiz sparked interest in a murky topic: what is the best encoding method to use when sending email attachments to Windows users? In response, Adam dons his hip waders to explain why the correct answer was the runner-up, and why the most common response wasn't necessarily wrong either. We also look at Keyspan's Digital Media Remote, release old versions of the Internet Starter Kit on the Web, and note the release of the SETI@home 2.0 client.
E.T. Search Continues with SETI@home 2.0 -- The SETI (Search for Extraterrestrial Intelligence) project has updated its SETI@home client to version 2.0, adding security features, improving proxy support, and fixing bugs to the software that utilizes distributed computer processing power to analyze data from the Arecibo radio telescopeShow full article
Old Starter Kits Now Online -- Last week a reader commented that he couldn't find the online versions of my Internet Starter Kit books (3rd edition Mac, 2nd edition Windows 3.1) at Macmillan Computer Publishing's site due to yet another reorganizationShow full article
Poll Preview: They Come in Colors -- Next week we'll be looking at Canvas 7, the latest version of Deneba's popular Swiss Army knife of graphics programsShow full article
My family has always liked remote controls. Many years ago - long before every television came with a remote - my parents had a device they called a bleeperShow full article
Okay, we may have confused a few people with last week's quiz, where we asked "What's the best encoding to use when sending a file to a Windows user via email?" I'll get to the correct answer shortly, but first let me explain the confusion. Terminology -- As I explained in "Macintosh Internet File Format Primer," in TidBITS-445, there are usually two actions that take place for Macintosh files to be transferred via email: binary packaging and transfer encodingShow full article