My dogs occasionally rush at jump at the TV when they see other animals. Luckily the TV is far enough back on the TV stand that they haven't reached it, yet. This channel will not work in my household.
New submitter RockoW writes "A few years ago, Apple sold defective computers of the MacBook Pro line. They had the defective Nvidia 8600M GT GPU. In this case Apple refused to take the computer back and issue me a refund. Instead, they promised to replace the 8600M GT boards when they failed, up to four years from the date of purchase. Three years later, the MacBook Pro failed and they refused to replace it. This guy took them to the court and won by their own means."
An anonymous reader writes "In what can only be described as a case of the pot calling the kettle black, Zynga has launched and settled a lawsuit against Brazilian game developer Vostu after accusing Vostu of copying their games. The settlement resulted in the loss of jobs for many Vostu employees. How Zynga managed to carry out such actions while keeping a straight face after dealing with similar allegations remains to be seen."
I was on their site last weekend, looking for a new BIOS and drivers. Their support web server was completely down. I called up to complain, and their tech support told me that they are aware of it, and have been having problems with it for a couple weeks now as they are changing their infrastructure. A couple weeks!!! Even their tech support couldn't access it, or even tell me what the BIOS version number was. This compromise is probably a result of an incorrectly configured server, which is a result of incompetent admins. All this results in them losing me as a customer. Good riddance Asus.
An anonymous reader writes "Washingtonpost.com is running a story about a number of botnets and keylogger operations being controlled by Web-sites with point-and-click type front-end software interfaces. The sites mentioned in the story look like fairly slick PHP pages designed to sort through password data from keylog victims and update infected computers with new code or instructions. From the story: 'The hacking software also features automated tools that allow the fraudsters to make minute adjustments or sweeping changes to their networks of hacked PCs. With the click of a mouse or a drag on a pull-down menu, users can add or delete files on infected computers.'"