Similar Posts
The .ru Substitutions for .cn Domains
In the month of January, we reported a drop in .cn spam. This was due to changes in the domain registration process introduced by CNNIC. In the first week of February, the .cn spam volume fell further and fluctuated between 0 and 4 percent of total URL spam. Another interesting trend was observed during this period….
Yahoo Chairman Steps Down
Mashable: Yahoo‘s chairman of the board, Roy Bostock, is leaving the company. Bostock has been chairman since 2008. Bostock revealed the news to shareholders in a long letter describing the company’s recent re-strategizing. A far cry from a resignation letter, Bostock is upbeat about Yahoo’s future and its recent moves, saying that, since the company…
Chrome Bookmarks Integrate with Google Search
Google Operation System: Until recently, Google Bookmarks and Chrome Bookmarks were two separate features that didn’t speak the same language. Even if you could save your Chrome bookmarks to a Google account, they weren’t saved to Google Bookmarks. For some reason, your bookmarks are available in a special Google Docs folder. Chrome bookmarks have a…
Looking for a good time? New scheduling tool in Calendar
Scheduling meetings is tough, but rescheduling is even harder. We all know how frustrating it can be to try to find just the right time that accommodates everyone’s availability and preferred working hours. Throw in different time zones and conference rooms and it goes from painful to excruciating. We’d rather schedule dental appointments. On the…
Avira receives AV-Test.org certificate
Avira TechBlog: Great news – our Avira Premium Security Suite received the next AV-Test.org certificate, this time for the first quarter of 2011! So far the suite thus achieved all available AV-Test.org certificates since the beginning of the certification process. The certificate approves the tested products a good quality in detection, repair and usability. This…
How to rescue files encrypted by Data Doctor 2010?
We have a tool available to do just that. Click Here. How to use dd2010_decrypter.exe to do batch processing: Place the encrypted files in a directory (i.e. c:\encrypted_files\) Copy dd2010_decrypter.exe into another directory and FROM THAT DIRECTORY, run the following command: for %f in (“c:\encrypted_files\.”) do dd2010_decrypter.exe %f %f.decrypted All files in the encrypted_files folder…