
<?phpxml version="1.0" encoding="utf-8"?>
<rss version="2.0" 
xmlns:content="http://purl.org/rss/1.0/modules/content/"
xmlns:wfw="http://wellformedweb.org/CommentAPI/"
xmlns:dc="http://purl.org/dc/elements/1.1/"
>
<channel>
<title>Haaze.com / Trerryerono / All</title>
<link>http://www.haaze.com</link>
<description>Test Web 2.0 Content Management System</description>
<pubDate>Tue, 31 May 2011 07:10:17 +0000</pubDate>
<language>en</language>
<item>
<title><![CDATA[Apple replacing MacBook bottom case]]></title>
<link>http://www.haaze.com/story.php?title=apple-replacing-macbook-bottom-case</link>
<comments>http://www.haaze.com/story.php?title=apple-replacing-macbook-bottom-case</comments>
<pubDate>Tue, 31 May 2011 07:10:17 +0000</pubDate>
<dc:creator>Trerryerono</dc:creator>
<category>Mobile &amp; Electronics</category>
<guid>http://www.haaze.com/story.php?title=apple-replacing-macbook-bottom-case</guid>
<description><![CDATA[There is a case issue with some MacBooks.(Credit:CNET)Apple has started replacing the bottom case of MacBooks sold over the last year and a half.According to the company, some MacBooks have a problem in which the rubber surface on the bottom of MacBooks separates from the underside of the computer. The issue affects MacBooks shipped between October 2009 and April 2011.Apple is offering three free ways to fix the problem.Apple said that it will replace the bottom case on affected MacBooks at the Genius Bar at any of its retail stores. In addition, consumers can choose to work with an Apple authorized service provider to get the new bottom case.If those options aren't possible, consumers can opt to order a replacement bottom case kit on their own. According to Apple, MacBook owners can order the kit over the Web. The company will then send users a new bottom case, as well as a Phillips screwdriver, screws, and instructions on how to replace the part.Apple is offering the free replacement for an indefinite amount of time. Those whose MacBooks might have been produced between October 2009 and April 2011 but aren't seeing the rubber surface separate from the case are not eligible to receive the new part.Further reading:Apple MacBook Spring 2010 review<br/><br/>0 Vote(s) ]]></description>
</item>

<item>
<title><![CDATA[Adios, offline Gmail on Chrome--for now]]></title>
<link>http://www.haaze.com/story.php?title=adios-offline-gmail-on-chrome-for-now</link>
<comments>http://www.haaze.com/story.php?title=adios-offline-gmail-on-chrome-for-now</comments>
<pubDate>Wed, 25 May 2011 07:10:03 +0000</pubDate>
<dc:creator>Trerryerono</dc:creator>
<category>Mobile &amp; Electronics</category>
<guid>http://www.haaze.com/story.php?title=adios-offline-gmail-on-chrome-for-now</guid>
<description><![CDATA[(Credit:Google)Google has shut down the ability to use Gmail with Chrome while not connected to the network, the last vestige of an older approach to offline Google Apps and Google Docs that the company is replacing.To enable the offline feature, Google had been using a browser plug-in called Gears that could store data on a person's computer then sync with the Gmail server once a connection was re-established. Google phased out Gears, though, and yesterday was the last day offline Gmail worked with Chrome, which had Gears built in.&quot;As we move the Gmail Offline capability to a Chrome web app, we will deprecate the Google Gears-based Gmail Offline...As a result, Google Gears-based Gmail Offline will no longer work with the Chrome browser as of Tuesday May 24, 2011,&quot; Google said on a support page.IE8 andFirefox 3.6 users still can use the offline feature for now, but Google isn't making any promises. &quot;Please note that updates to these versions of Internet Explorer and Firefox browsers may affect Gears support, and therefore Gmail offline access,&quot; Google said.Google already had shut down offline support, such as it was, for Google Docs' word processor, spreadsheet, and presentation apps. It never was complete with Gears, though' for example, people couldn't edit spreadsheets while offline.Google employees have been using a new version of offline Google Docs that uses HTML standards. Google had hoped to release it early in 2011, but now the company plans to issue it this summer--in time to make its Chrome OS browser-based operating system more useful when people lack a network connection.In the meantime, some people may be left in the lurch.&quot;We realize that there will be a temporary gap in Gmail offline access via Chrome, and we are working hard to deliver offline capabilities through a new Gmail Offline Chrome web app as quickly as possible,&quot; Google said.<br/><br/>0 Vote(s) ]]></description>
</item>

<item>
<title><![CDATA[Avast update blocks legitimate Web sites]]></title>
<link>http://www.haaze.com/story.php?title=avast-update-blocks-legitimate-web-sites</link>
<comments>http://www.haaze.com/story.php?title=avast-update-blocks-legitimate-web-sites</comments>
<pubDate>Tue, 12 Apr 2011 07:10:30 +0000</pubDate>
<dc:creator>Trerryerono</dc:creator>
<category>Technology</category>
<guid>http://www.haaze.com/story.php?title=avast-update-blocks-legitimate-web-sites</guid>
<description><![CDATA[An update rolled out yesterday to Avast's antivirus product contained a bug that flags legitimate Web sites as malware infected.In a blog post late yesterday, Avast acknowledged the false positive glitch in an update known as 110411-1, which was automatically rolled out to Avast AV users earlier that day. The error has specifically affected versions 4.x, 5.x, and 6.x of Avast's antivirus software.In an e-mail to CNET, an Avast spokesman said today that the update was downloaded by around 5 million users, mostly on the Western Hemisphere due to the time in which it was launched.In-house sensors discovered the problem just a few minutes after the buggy update was released, and Avast workers managed to create and release a fix within 45 minutes, according to the company.Known as 110411-2, the fix must be manually installed. Avast is advising all users to update their antivirus definitions by right-clicking the Avast taskbar icon (the orange (a) ball), then selecting Update, and then selecting Engine and Virus Definitions.The Avast spokesman said the problem was caused by a bug in the company's URL normalizer library, which is used to modify a Web site's address into a standard format. Avast apologized for the &quot;inconvenience,&quot; saying that since only remote sites and not local files were affected, the fix should completely resolve the problem. Despite Avast's solution, some of the more than 200 users commenting to the blog post are complaining that certain local files were in fact quarantined, forcing them to now restore those files.The Avast spokesman said that for most users, the faulty update solely blocked access to certain sites. But if someone ran the software's on-demand scan of the hard drive, then any HTML files stored locally could have been quarantined. That scan was performed by some people when Avast first revealed the problem. But the spokesman expressed hope that these people have since been able to restore the files from the quarantine after the problem was resolved.Some commenters criticized Avast for not communicating about the problem more effectively. An Avast employee responding to those complaints acknowledged that the company is trying to determine how it can better communicate in the future. Although it did spread work about the error through its Twitter stream and its Facebook page, Avast said its main focus was on fixing the problem as quickly as possible.Other commenters on the blog post and on Facebook took the opportunity to praise Avast for its quick response and communication.Updated at 10:00 a.m. PTwith more details from Avast.<br/><br/>0 Vote(s) ]]></description>
</item>

<item>
<title><![CDATA[Adobe: Zero-day attacks targeting Flash Player hole]]></title>
<link>http://www.haaze.com/story.php?title=adobe-zero-day-attacks-targeting-flash-player-hole</link>
<comments>http://www.haaze.com/story.php?title=adobe-zero-day-attacks-targeting-flash-player-hole</comments>
<pubDate>Mon, 11 Apr 2011 07:10:29 +0000</pubDate>
<dc:creator>Trerryerono</dc:creator>
<category>Technology</category>
<guid>http://www.haaze.com/story.php?title=adobe-zero-day-attacks-targeting-flash-player-hole</guid>
<description><![CDATA[Adobe today warned of a critical hole in Flash Player that is being exploited in the wild to take control of computers or cause them to crash. &quot;There are reports that this vulnerability is being exploited in the wild in targeted attacks via a Flash (.swf) file embedded in a Microsoft Word (.doc) file delivered as an email attachment, targeting the Windows platform,&quot; the company said in an advisory. &quot;At this time, Adobe is not aware of any attacks via PDF targeting Adobe Reader and Acrobat. Adobe Reader X Protected Mode mitigations would prevent an exploit of this kind from executing.&quot;  Adobe said it is &quot;finalizing a schedule&quot; for releasing updates for Flash Player 10.2.x and earlier versions for Windows, Macintosh, Linux, Solaris and Android, Adobe Acrobat X (10.0.2) and earlier 10.x and 9.x versions for Windows and Macintosh, Adobe Reader X (10.0.2) for Macintosh, and Adobe Reader 9.4.3 and earlier 9.x versions for Windows and Macintosh.  Since Adobe Reader X Protected Mode would prevent an exploit of this kind from executing, the company said it will address the issue in Adobe Reader X for Windows with the next quarterly security update, scheduled for June 14.Last month, Adobe fixed a different critical vulnerability in Flash Player that affects Adobe Reader and Acrobat and which reportedly had been exploited in attacks via Flash files embedded in Excel files distributed via e-mail. Attackers exploited that hole to target employees at RSA and get access to data related to the SecurID authentication tokens, prompting RSA to warn customers that their systems may be weakened as a result. <br/><br/>0 Vote(s) ]]></description>
</item>

</channel>
</rss>
