topbanner_forum
  *

avatar image

Welcome, Guest. Please login or register.
Did you miss your activation email?

Login with username, password and session length
  • Wednesday April 24, 2024, 8:02 pm
  • Proudly celebrating 15+ years online.
  • Donate now to become a lifetime supporting member of the site and get a non-expiring license key for all of our programs.
  • donate

Show Posts

This section allows you to view all posts made by this member. Note that you can only see posts made in areas you currently have access to.


Messages - Ehtyar [ switch to compact view ]

Pages: prev1 2 3 4 5 [6] 7 8 9 10 11 ... 50next
126
Living Room / Re: Tech News Weekly: Edition 45-09
« on: November 08, 2009, 04:48 AM »
You just beat me, was about to msg you the URL for the news, and to say how much I LOVE that acronym!!!!

Ehtyar.

127
Living Room / Tech News Weekly: Edition 45-09
« on: November 08, 2009, 04:12 AM »
The Weekly Tech News
TNWeekly01.gifHi all.
Enjoy :)
As usual, you can find last week's news here.


1. Dutch Hacker Holds Jailbroken IPhones "hostage" for €5
Spoiler
http://arstechnica.com/apple/news/2009/11/dutch-hacker-holds-jailbroken-iphones-hostage-for-5.ars
We all knew it was gonna happen at some point; a Dutch gentleman has taken advantage of users with jailbroken iPhones who have no changed their root password but left the SSH service active. He changed the home screen background to an image resembling an iPhone message box demanding €5 in exchange for a fix.

Though jailbreaking an iPhone certainly opens up opportunities to add functionality that Apple doesn't approve of, it can also make an iPhone less secure. Several Dutch iPhone users found that out the hard way after a hacker attacked a number of vulnerable phones on T-mobile Netherlands and tried to extort €5 from them.

It appears one enterprising Dutch hacker used port scanning to identify jailbroken iPhones on T-mobile Netherlands with SSH running. Enabling SSH is a common procedure for jailbroken iPhones, allowing a user to log in via Terminal and run standard UNIX commands. Unfortunately, iPhones all have a default root password that many forget to change after jailbreaking, leaving their phone as vulnerable as a Lamborghini parked on a public street with the windows down, the doors unlocked, and the keys in the ignition.


2. Google Gives You A Privacy Dashboard To Show Just How Much It Knows About You
Spoiler
http://www.techcrunch.com/2009/11/05/google-gives-you-a-privacy-dashboard-to-show-just-how-much-it-knows-about-you/
A bit of a cynical headline even for me, but this story is kind of amusing in that respect. Google have made available a "privacy dashboard" that, in addition to showing you how much Google knows about you, lets you manage your Google info. from a central location.

The more Google products you use, the more data it collects about everything you do online—your search history, your emails, the blogs and news sites you read, which videos you watch on YouTube, your news alerts, tasks ,and even shopping lists. For some of these, you need to explicitly grant Google permission to keep track of data associated with your profile.

But it’s hard to keep up with everything Google is tracking.

So now the company is launching a Google Dashboard, which will give you a high-level summary of everything Google knows about you by virtue of the Google products you use. This might include how many emails are in your inbox, recent subject lines, which YouTube video you’ve watched lately (yes, all of them), appointments on your calendar, and more.


3. Bizarre Legal Defense After EMI Sues Over Beatles MP3 Sales
Spoiler
http://arstechnica.com/tech-policy/news/2009/11/about-those-beatles-songs-its-weirder-than-you-thought.ars
A recent addition to the web, BlueBeats.com, was selling Beatles tracks online for a good chunk of this week, claiming it owned the copyright. It caused a big stir across the net, (the tracks in question have never been made available online) as the tracks were available for just 25 cents each.

When the news broke earlier this week that the so-famous-you've-never-heard-of-it BlueBeat.com was both streaming and selling The Beatles remasters—and for 25¢ a track—we speculated that an entertainingly weird legal theory was at the root of this behavior.

We just had no idea how weird it was.


4. Competition is Gouging Phone Users (For the Aussies - Thanks 4wd)
Spoiler
http://www.theage.com.au/opinion/politics/competition-is-gouging-phone-users-20091101-hrjx.html
Normally I wouldn't post an editorial here, but this is a terrific article from the Aussie paper TheAge, discussing the impact the Australian national fiber network (or FUCK - Future Unilateral Countrywide KevNetTM 4wd) will have on Australian consumers.

WE MUST be mad. Telstra is obliged under the universal service obligation to offer telephone customers a basic telephony service for $30 a month. The Rudd Government wants to replace this with a new service - the national broadband network - which on the most favourable assumptions will cost customers $60 to $70 a month for a basic telephone service.

And to ensure customers will take up the new service, the Telstra copper wires that enable the $30 a month service will be ripped up.

This is called levelling the playing field for fair competition. But this is not the end of the gouging of Australian telephone users.


5. TLS Negotiation Flaw Published
Spoiler
http://www.cgisecurity.com/2009/11/steve-dispensa-and-marsh-ray-have-published-a-paper-describing-a-weakness-in-the-tls-negotiation-process-from-the-whitepaper.html
A flaw in the renegotiation procedure of TLS (the successor to SSL) could allow an attacker to inject a certain amount of chosen plaintext into a GET request as part of a MITM attack. Fortunately, that's where the vulnerability ends, however it is easily significant enough to have prompted a rethink of the entire procedure.

"Transport Layer Security (TLS, RFC 5246 and previous, including SSL v3 and previous) is subject to a number of serious man-in-the-middle (MITM) attacks related to renegotiation. In general, these problems allow an MITM to inject an arbitrary amount of chosen plaintext into the beginning of the application protocol stream, leading to a variety of abuse possibilities. In particular, practical attacks against HTTPS client certificate authentication have been demonstrated against recent versions of both Microsoft IIS and Apache httpd on a variety of platforms and in conjunction with a variety of client applications. Cases not involving client certificates have been demonstrated as well. Although this research has focused on the implications specifically for HTTP as the application protocol, the research is ongoing and many of these attacks are expected to generalize well to other protocols layered on TLS.

There are three general attacks against HTTPS discussed here, each with slightly different characteristics, all of which yield the same result: the attacker is able to execute an HTTP transaction of his choice, authenticated by a legitimate user (the victim of the MITM attack). Some attacks result in the attacker-supplied request generating a response document which is then presented to the client without any certificate warning or other indication to the user. Other techniques allow the attacker to forward or re-purpose client certificate authentication credentials."


6. Web Open Font Format Backed by Mozilla, Type Foundries
Spoiler
http://arstechnica.com/web/news/2009/11/web-open-font-format-backed-by-mozilla-type-foundries.ars
Some news web typography awesomeness is making its way into the next version of Firefox in the form of the Web Open Font Format. The format will enable the use of metadata stored in OpenType fonts to modify their appearance. See the video included in the article for more info.

Efforts to bring advanced typography to the Web have reached an important milestone. Type designers Tal Leming and Erik van Blokland, who had been working to developing the .webfont format, combined forces with Mozilla's Jonathan Kew, who had been working independently on a similar format. The result of the collaboration is called Web Open Font Format (WOFF), and it has the backing of a wide array of type designers and type foundries. Mozilla will also include support for it in Firefox 3.6.

WOFF combines the work of Leming and Blokland had done on embedding a variety of useful font metadata with the font resource compression that Kew had developed. The end result is a format that includes optimized compression that reduces the download time needed to load font resources while incorporating information about the font's origin and licensing. The format doesn't include any encryption or DRM, so it should be universally accepted by browser vendors—this should also qualify it for adoption by the W3C.


7. Complete Genomics Produces a Cheap—well, $5,000—human Genome
Spoiler
http://arstechnica.com/science/news/2009/11/complete-genomics-produces-a-cheapwell-5000human-genome.ars
Very awesome (if utterly terrifying); a company called Complete Genomics has managed to repeat a "reasonably complete" human genome for just under $5000, incredibly cheap when compared to the millions it might have cost a few years ago.

With the newest DNA sequencing technology starting to reach the market, we're seeing a bit of a bifurcation. Some of the methods can do long reads, covering hundreds of bases, and provide data that's appropriate for assembling a genome that's never been sequenced before. Others produce lots of shorter reads, which can only be aligned to a genome that we know the sequence of already. What good is repeating a completed genome? Potentially quite a lot, if that genome happens to be human and, more particularly, yours, since it can provide information on medically relevant issues like disease risks and drug efficacy. The goal here is to make this so cheap that sequencing a person's genome could be routine.

A big step in that direction may have been taken by a company called Complete Genomics, which describes the methods it used to sequence three human genomes in a paper that will be released by Science today. The system described in the paper combines some clever variants of well known molecular biology techniques to read massive amounts of DNA fragments that are, in total, about 65 bases long. But, because the materials used for the reactions are so common, even the enzymes can be purchased cheaply. That allows Complete Genomics to bring an entire human genome in while spending less than $5,000 on materials. All that, plus an error rate of less than one base in 100,000.


8. Secret Knock Detecting Lock
Spoiler
http://www.youtube.com/watch?v=zE5PGeh2K9k
We usually have funny videos at the end of the Tech News, I know, but this week we have a video made of pure awesomeness. Details can be found here

onion.jpg



Ehtyar.

128
Living Room / Re: Tech News Weekly: Edition 44-09
« on: November 01, 2009, 01:07 PM »
Thanks House Man. Fixed.

Ehtyar.

129
Living Room / Tech News Weekly: Edition 44-09
« on: November 01, 2009, 05:17 AM »
The Weekly Tech News
TNWeekly01.gifHi all.
Enjoy :)
As usual, you can find last week's news here.


1. 'We Have Broken Speed of Light'
Spoiler
http://www.telegraph.co.uk/science/science-news/3303699/We-have-broken-speed-of-light.html
Using quantum tunnelling, German researchers are claiming to have propelled particles faster than the speed of light.

A pair of German physicists claim to have broken the speed of light - an achievement that would undermine our entire understanding of space and time.

According to Einstein's special theory of relativity, it would require an infinite amount of energy to propel an object at more than 186,000 miles per second.


2. MI5 Comes Out Against Cutting Off Internet Pirates
Spoiler
http://www.timesonline.co.uk/tol/news/uk/crime/article6885923.ece
This one is just for laughs... British intelligence agency MI5 has come out in opposition of a proposed three-strikes law in the UK because they fear it will induce broader adoption of encryption online.

The police and intelligence services are calling on the Government to drop plans to disconnect persistent internet pirates because they fear that this would make it harder to track criminals online.

Lord Mandelson, the Business Secretary, has vowed to use the Government’s forthcoming Digital Economy Bill to introduce new measures to fight illegal file-sharing of music and films. He has also proposed that persistent pirates should have their internet connections suspended temporarily.


3. Xerox Develops Silver Ink for Wearable Or Throwaway Electronics (Thanks Hertz Man)
Spoiler
http://digital.venturebeat.com/2009/10/26/xerox-developers-a-silver-ink-that-can-be-used-to-wearable-or-throwaway-electronics/
Xerox have developed a conductive "ink" that could be used to "write" circuits onto flexible plastic boards. Etching FTL!!

Xerox researchers have invented a kind of ink that can conduct electricity and be used to put electronic circuits on top of plastics, film, and textiles. That means in the coming years we’ll be able to wear or bend our electronics. You could even print out your electronic gadget on plastic sheets, as if you were printing a document.

Silicon chips have long been too expensive or heavy to use in devices that are extremely lightweight. The Xerox team solved this fundamental problem with lighter materials, and it plans to sell the new materials to other businesses that could make wearable electronics.


4. With, Not Without U2, YouTube Saw 10 Million Streams Sunday Night
Spoiler
http://www.techcrunch.com/2009/10/29/with-not-without-u2-youtube-saw-10-million-streams-sunday-night/
The recent U2 concert, the first by a major music group to streams online, saw 10 million streams on YouTube during the broadcast. The slightly less awesome part: the stream wasn't on YouTube; it was was hosted by Akamai.

Initial reports said that hundreds of thousands of people watched YouTube’s Live U2 concert on Sunday night. Then reports yesterday raised the estimate to 2.5 million. Double that, and then double it again. 10 million is the real number of live streams that YouTube did that night, according to Variety.

That’s massive, and it’s obviously the biggest live streaming event YouTube has ever done. But even more impressive is just how smoothly it went. I watched about half of the two and a half hour show, and if there were any interruptions, I didn’t see any. I didn’t even see any hiccups, it was that good. I had the show running full screen on my desktop computer, and it was pretty great picture quality for live streaming video.


5. Gang Rips Out 1km of Phone Cable
Spoiler
http://news.bbc.co.uk/2/hi/uk_news/england/sussex/8333774.stm
More laughs. An alleged gang of "thieves" "stole" a kilometer of phone cabling right out of the ground in the UK this week, cutting off 800 homes and businesses. The government then managed to spend £45,000 fixing it.

Sussex Police said the 6in to 8in cable was cut and removed from the area near Drusilla's roundabout in Alfriston in the early hours of Wednesday.

BT said telephone services to up 800 homes and businesses in Berwick were restored on Thursday evening.

The estimated cost of repairing and replacing the cable was £45,000.


6. Say Hello to .كوم As Domain Names Go Truly Global
Spoiler
http://arstechnica.com/web/news/2009/10/domain-extensions-go-global-goodbye-com-welcome.ars
ICANN has approved the "Internationalized Domain Name Fast Track Process" which will see TLDs available in Chinese, Korean, Arabic, Hindi, and more next year.

Before now, typing http://clinteckergoa...bonedbyhisnewbicycle.كوم into a Web browser and actually arriving at a working domain was impossible. But thanks to a vote by the Internet Corporation for Assigned Names and Numbers (ICANN) Friday morning, it could become a reality sometime in 2010. The organization approved the "Internationalized Domain Name Fast Track Process," allowing a plethora of non-Latin characters to be used in domain name extensions and opening more doors to Internet users who don't speak Western languages.

The Fast Track Process, which begins in November, will enable countries to apply for new domain name extensions (such as .com or .net) in their own national language. This means that full domains will soon be available in Chinese, Korean, Arabic, Hindi, and more. Previously, ICANN allowed the registration of domain names with non-Latin characters—so, for example, http://clintecker他的新自行车骨骼山羊.com—but the extension had to remain in Latin characters. Now, instead of being limited to the Latin alphabet, domain extensions will utilize some 100,000 new characters.


7. Android 2.0 Phones Get New Google Nav App
Spoiler
http://www.linuxinsider.com/story/68496.html
Google have now added turn-by-turn navigation to their existing map application on Android. You can read more about the implications in a thread by Lash Man here.

Google on Wednesday announced the beta release of a GPS navigation application for Android 2.0 devices.

The application is part of Google Maps for mobile. Android version 2.0 will appear on the upcoming Droid handset from Motorola and Verizon, and other manufacturers also plan to release handsets carrying the updated, Google-backed mobile OS.


8. School Answering Machine
Spoiler
http://www.youtube.com/watch?v=J7eJE6B49M4
Not the longest or most topical vid ever, but hopefully good for a laugh :)

onion.jpg



Ehtyar.

130
Living Room / Re: Google vs. the rest: Is it fair?
« on: October 29, 2009, 08:32 PM »
Nice article Lash Man, thanks!

Ars also posted a story on Google recently with some interting points (if a little sensationalist). You can find it here.

Ehtyar.

131
Perhaps, but that gives me no further reason to trust their code. Has anyone had a look at it?

Ehtyar.

132
Do we know what's in the compiled code in those addons? I'm always a little suspicious of addons that can't do what they need to with XUL and/or XPCOM.

Ehtyar.

133
General Software Discussion / Re: Surprised by Win7
« on: October 29, 2009, 05:46 PM »
I would have to agree that the obfuscation as it were of configuration and troubleshooting interfaces is extremely frustrating, you're definitely not alone in that. I find that oftentimes the command line is the best way to get around it, though you frequently need 3rd party utilities or resource kits to get as deep as you'd like.

I have no experience configuring Windows 7 networking in a home environment, so I cannot speak to your issues there.

Ehtyar.

134
General Software Discussion / Re: Redirect screen output to clipboard
« on: October 28, 2009, 08:08 PM »
I really don't like releasing anything 0.5f done
Epic nerd-humor creds there, I had to think for a second wtf you were talking about :Thmbsup:

Ehtyar.

135
Perl / Re: Is Perl still being used?
« on: October 28, 2009, 05:30 AM »
The issue is simply that Python is natively supported on Windows, and it has been made clear that Windows support is something that the Python community has a vested interest in. Even Unladen Swallow are hoping to be able to keep their port supporting Windows, despite that goal being almost in direct contradiction of their primary goal.

Perl, however, is not built for Windows by the Perl development community. There is a nasty hack release called ActivePerl, which is overflowing with non-standard nonsense and barely maintained, and Strawberry Perl, a much cleaner distro but still does not have a complete standard distribution, not to mention Rakudo on Windows is no different (though that could change). I can certainly understand a newbie wanting the stability and assurance they'd get from using Python over Perl.

Ehtyar.

136
Perl / Re: Is Perl still being used?
« on: October 27, 2009, 09:01 PM »
I :-* Perl as a language, but the lack of progress on the interpreter and the standard library is truly astonishing. By the time Perl 6 is ready, no one's gonna know what it is. However, Perl can be used for just about anything a sysadmin needs to do (Goth Man will probably back me up there), so I use it very often. As a novice or dedicated Windows user, you *may* want to consider Python over Perl, but otherwise Perl still rules the roost IMHO.

Python is probably the closest thing to a "competitor" you can have as far as programming languages go. It's similar to the vim/emacs debate in that respect. Ruby seems to be coming up from behind there too...

Ehtyar.

137
+1 for uTorrent. Can we please not use the word "bloat" when referring to software that comes as a single executable with only features pertaining to the programs primary purpose, no matter how abundant those may be?

Stop using uPNP please people (I'd rather not hijack this thread, so hopefully this simple example will be enough).

Tuxman, nice of you to recommend a client that you've never been able to get working whilst criticizing what is so far the most highly recommended client, then to criticize our use of the word "uTorrent", without providing the keystroke to type it correctly, whilst completely disregarding the fact that the use of "uTorrent" is more common than "µTorrent" precisely due to the complexity involved in typing it. Thanks for all your help in this thread...

Ehtyar.

138
Living Room / Tech News Weekly: Edition 43-09
« on: October 25, 2009, 05:04 AM »
The Weekly Tech News
TNWeekly01.gifHi all.
Well, either this week was a really sucky news week or I suck at finding it. Either way, I've got two funny videos this week in the hopes you'll all forgive me :-[
As usual, you can find last week's news here.


1. Mozilla Disables Vulnerable Microsoft Plugin for Firefox
Spoiler
http://arstechnica.com/open-source/news/2009/10/mozilla-disables-vulnerable-microsoft-plugin-for-firefox.ars
We all knew it was going to happen, sneaking extensions into users' Firefox installations can't be a good thing. Mozilla has had to disable Microsoft's .NET Framework Assistant Firefox extension due to the possibility it would assist users in getting hacked after a vulnerability was disclosed that effected it.

Mozilla has temporarily disabled Microsoft's WPF plugin for Firefox in order to protect users from a security vulnerability that was recently uncovered in the component. The vulnerability can be exploited when users visit malicious Web pages that contain specially crafted XAML content.

Microsoft issued an Internet Explorer patch to fix the vulnerability through its Windows Update mechanism on Tuesday. The IE patch is said to fully resolve the vulnerability for Firefox users in addition to users of Microsoft's own browser. Mozilla is concerned, however, that not all users have performed the Windows update yet. In order to protect users who are not yet patched, Mozilla has added Microsoft's plugin to its add-on blocklist, causing it to be automatically disabled by the browser.


2. Prepare for Disconnection! French "3 Strikes" Law Now Legal
Spoiler
http://arstechnica.com/tech-policy/news/2009/10/french-3-strikes-law-returns-now-with-judicial-oversight.ars
The French authorities now have the least forgiving three-strikes policy in the world at their full disposal.

France's Création et Internet law didn't pass muster the first time around, as the country's Conseil Constitutionnel ruled that major portions of the scheme violated the 1789 Rights of Man. The first draft of the bill tended too much toward "guilty until proven innocent," and it threatened a major sanction (Internet disconnection and a national blacklist on access) without judicial oversight.

The French government, bent on passing the law, retooled it and rammed it through the legislature a second time. It was promptly reported to the Conseil by the Socialists, but the Conseil today ruled (PDF, French) that the bill largely addresses its earlier concerns.


3. PSA: Voyeurs, Encrypt Your Spy Videos!
Spoiler
http://tech.yahoo.com/blogs/null/153661
Ridiculous headline I know, but it's so fun! So...yay Aussies? An Australian man has skipped out on going to prison for surreptitiously recording his flatmates through holes in the wall, because he had full disk encryption on the laptop he was using to make the recordings and refused to give up his password.

Rohan James Wyllie of Australia doesn't sound much different than your average voyeur intent on capturing a little secret video of his female roommate unawares. He drilled holes in the walls and ceilings, installed cameras, and created an elaborate network of surveillance equipment so he could keep tabs on the girl from the comfort of his bedroom.

After his roommates noticed suspicious lights and buzzing in August 2007, Wyllie was arrested. Eventually he pleaded guilty to charges of attempting to visually record the woman in question in a private place without her consent. Open and shut case, right? Not quite: Wyllie is now going free without a jail sentence.


4. Gaping Security Hole Turned 64,000 Time Warner Cable Modems Into Hacker Prey
Spoiler
http://www.networkworld.com/news/2009/102109-security-hole-time-warner-cable.html
Yay for ISP standard-issue equipment. 64,000 Time Warner subscribers's cable modems were open to full remote administrative access, no password required, until earlier this week.

Time Warner says that within the past week it has patched the problem until the manufacturer can provide a permanent fix, but before that it had allowed administrative access to the routers. Attackers could then run a variety of programs against these routers, says David Chen in his blog Chenosaurus.

Because the vulnerability let anyone anywhere on the Internet take over control of the router, they could launch attacks from within Time Warner customers' homes.


5. Metasploit Project Sold To Rapid7
Spoiler
http://www.darkreading.com/vulnerability_management/security/management/showArticle.jhtml?articleID=220800067
Massively popular, open source penetration testing toolkit Metasploit has been sold to Rapid7, an information security company. They will employ the project's founder and primary maintainer, HD Moore, and 5 others to work on the project full time.

Vulnerability management vendor Rapid7 has purchased the popular open-source Metasploit penetration testing tool project and named Metasploit founder HD Moore chief security officer of the company.

Moore, who is synonymous with the Metasploit Project , will continue as chief architect of Metasploit in his new role at Rapid7. He'll have an initial team of five Rapid7 researchers dedicated to the open-source project, some of whom already have been regular contributors to Metasploit. Financial terms of the deal were not disclosed.


6. Random Users Google Voice Mail is Searchable by Anyone?
Spoiler
http://www.boygeniusreport.com/2009/10/19/random-users-google-voice-mail-is-searchable-by-anyone/
Earlier this week it was discovered that Google itself was actually indexing non-private Google Voice voicemails. The issue has since been dealt with, but a few of the funnier ones are still linked to from TechCrunch here.

Holy crap. It seems that Google is going to have some pretty serious explaining to do this morning, as one of our readers has sent us in a tip that reveals a major security flaw involving Google Voice. After entering “site:https://www.google.com/voice/fm/* ” into Google, our reader was shocked and discouraged to be greeted by 31 voice mail messages belonging to random Google Voice accounts. Clicking on each revealed not only the audio file and transcript of the call, but it also listed the callers name and phone number as it would if you were checking your own Google Voice voice mail.  We’re not too sure if this flaw is something new or if it has been around since Google Voice started, and could just be test messages, but needless to say the matter has to be fixed if it’s legit.


7. U.S. Spies Buy Stake in Firm That Monitors Blogs, Tweets
Spoiler
http://www.wired.com/dangerroom/2009/10/exclusive-us-spies-buy-stake-in-twitter-blog-monitoring-firm
Looks like the authories in the US like to have someone else doing the dirty work when it comes to poking around public message archives, sinking investment dollars into a firm that monitors all manner of social media websites including blogs and Twitter.

America’s spy agencies want to read your blog posts, keep track of your Twitter updates — even check out your book reviews on Amazon.

In-Q-Tel, the investment arm of the CIA and the wider intelligence community, is putting cash into Visible Technologies, a software firm that specializes in monitoring social media. It’s part of a larger movement within the spy services to get better at using ”open source intelligence” — information that’s publicly available, but often hidden in the flood of TV shows, newspaper articles, blog posts, online videos and radio reports generated every day.


8. There Goes the TV...


9. Peter Russell Clarke - Swearing Aussie Chef [NSFW]
Spoiler
http://www.youtube.com/watch?v=VmH9IHJ6ZtQ
Ever wonder what an Aussie TV chef might say if he f**ked up a line ya p**ck?

onion2.jpg



Ehtyar.

139
If you're using Firefox, you need to enter about:config and create a new boolean preference with the name 'browser.download.manager.skipWinSecurityPolicyChecks' and set it to 'true'.

After some quick searching I was unable to find an appropriate method of disabling the dialog box globally. However, if you're attempting to run the offending executable as part of a script, try setting the 'SEE_MASK_NOZONECHECKS' environment variable to '1' prior to executing the application.

Ehtyar.

140
Don't get me wrong, I totally agree that usability (or lack thereof) is an issue on Linux, but until it improves, what's a newbie to do? I'm a user level sysadmin myself. I can't imagine a tenth of my users using Linux...nor would I imagine anyone would tolerate the productivity loss.

I'd like to clarify that I've never actually said "If you can't do this, then Linux isn't for you", that just happens to be the most direct way of expressing yourself (though it also makes you sound like an elitist dick). I have, on ocassion, conveyed to friends that perhaps Linux isn't what they were searching for in terms of an alternative to Windows.

Needless to say, that was all it took to get everybody else onboard. 8)
I'm not sure how that applies to the Linux Wi-Fi debate, Atheros is still the only major chipset maker with native Linux drivers since how long...?

Ehtyar.

141
I'll give you that wireless is far from perfect on Linux, but I think that that, in-and-of itself, is why troubleshooting wireless on Linux is one of the better documented aspects of it.

It takes almost no searching skillz to determine that atheros chipsets are what you want on Linux, and then as I pointed out above you should have little if any trouble finding yourself a wireless adapter. If you can manage it, have a poke around the web to determine if there are any pre-existing issues with your distro regarding that specific adapter (assuming your distro and adapter are popular enough to have likely been used together in the past) and you should be set. (clearly, I'm no proponent of trying to get devices with no foss drivers to work on Linux)

If a newbie can't suffer though issues of this nature, they're in for a world of hurt when something breaks later on (what are they gonna do with a python backtrace when one of the thousand front-ends coded in it inevitably goes bottom-up, for example). My point being, wireless may be a bitch to get going, but I think it's the random nonsensical failures or difficulties that you'll encounter later on (and on an alarmingly frequent basis) that are really the desktop Linux killers.

I suppose my overall point, after re-reading your last post Hertz Man, is that if you're unwilling or unable to spend copious amounts of time searching for solutions to the multitude of issues you'll face as a desktop Linux user, then desktop Linux probably isn't what you're after. Linux just isn't for the elementary computer user. A Linux "beginner" should be a PC user with a few years worth of experience under his/her belt.

Note: I really hate giving the "Linux isn't for you" speech, I've heard it several times myself from some elitist doucherocket it some Linux chatroom who's there to troll, not help, but at some point, with a user lacking a certain level of experience, and/or amount of time, it is simply the case.

Ehtyar.

142
Get a USB adapter with an Atheros chipset and stop being such a jackass blaming Linux for vendor failures. Simple, no?


No. Especially not for a newbie.  :)

Most manufacturers don't willingly provide information about which chipsets they use. Many vendors also periodically switch chipsets, occasionally doing so within a given product model's lifecycle.

I can't speak for the rest of the World, but in the US, Broadcomm chipsets (which are not at all  Linux friendly) make up about 75% of what gets installed or is readily available.

IMHO, the major distros have two basic options for dealing with all the wifi hassles. They either need to figure out a way to resolve their stalemate with the manufacturers over getting workable drivers; or they can "bring the battle to their opponent's doorstep" by manufacturing their own affordable wifi hardware.

I'll bet if Shuttleworth (and some other NIX heavyweights) announced they intended to put some serious money into doing just that, the bulk of the hardware vendors would soon fall in line. Especially if said 'penguin-friendly' NICs also came with drivers for Windows.

Just a thought! 8)

[rant]
This page is the first result in Google for "wireless adapter chipset", give me a break...

My last wireless adapter was a TP-Link w/ an atheros chipset (confirmed at the aforementioned website I might add), which cost me I think $29AU *in* Australian (where prices for just about everything are typically inflated out the wazoo), I really can't see a lack of affordable USB Wi-Fi adapters myself...
[/rant]

Ehtyar.

143
Get a USB adapter with an Atheros chipset and stop being such a jackass blaming Linux for vendor failures. Simple, no?

Ehtyar.

144
Living Room / Re: GhostNet - The Facts
« on: October 19, 2009, 02:30 PM »
You'd rather they sent you a Keynote file april? :P

Ehtyar.

145
Living Room / Re: Tech News Weekly: Edition 42-09
« on: October 19, 2009, 05:20 AM »
Two typos in as many weeks, oh noes!! Ty 4wd :)

Ehtyar.

146
Living Room / Tech News Weekly: Edition 42-09
« on: October 18, 2009, 05:50 AM »
The Weekly Tech News
TNWeekly01.gifHi all.
Enjoy :)
As usual, you can find last week's news here.


1. Google Shares Malware Samples With Hacked Site Admins
Spoiler
http://www.theregister.co.uk/2009/10/13/google_webmaster_malware_notification/
Hopefully this won't result in too many heart attacks among dc members, but this is a pretty cool move by Google. In order to aid webmasters in the cleanup of infected websites, Google are now providing samples of material they find objectionable on a website.

Google has rolled out a feature that provides webmasters of compromised sites with samples of malicious code and other detailed information to help them clean up.

The search giant has long scanned websites for malware while indexing the world wide web. When it detects outbreaks, it includes language in search results that warns the site may be harmful and passes that information along so the Google Chrome, Mozilla Firefox, and Apple Safari browsers can more prominently warn users. Google also provides administrators a private list of infected pages so they can be cleaned up.


2. EFF Challenges Texas Instruments Over Calculator Mods
Spoiler
http://arstechnica.com/tech-policy/news/2009/10/bloggers-fight-tis-dmca-takedown-over-calculator-hack.ars
Ever since their code signing keys were broken a few months back, TI have been watching out for anyone posting them as the hacking community gets to work. In a spectacular display of misunderstanding, TI have sent DMCA takedown notices to a handful of bloggers linking to the keys. Bad TI, bad!

Texas Instruments has been making programmable calculators for longer than most companies have been making computers, and the company's current line of calculators uses a chip—the Zilog Z80—that once appeared in personal computers. So it's not surprising that a modding community has taken up the task of replacing the OS that runs the calculators. TI isn't pleased by the modders' efforts, though, and the company recently sent DMCA takedown notices to a group of bloggers who linked to information about the encryption keys needed to validate a new OS. But unfortunately for TI, it appears that the DMCA does not apply, since the keys aren't used to protect the existing OS.


3. Wi-Fi Direct Protocol to Ease Peer-to-peer WiFi Connections
Spoiler
http://arstechnica.com/hardware/news/2009/10/wi-fi-direct-protocol-to-ease-peer-to-peer-wifi-connections.ars
I really don't understand what all the fuss is about here, but apparently this is big news. The Wi-Fi Alliance have announced a new standard that will permit devices to communicate between one another to be called "Wi-Fi Direct". Seems to me this space is already covered either by ad-hoc wireless connections or bluetooth (quite effectively I might add), but we'll see.

The Wi-Fi Alliance has announced a new way for WiFi-enabled devices to connect to one another, even in the absence of a WiFi base station. The new protocol, dubbed "Wi-Fi Direct," will allow any device that implements the standard to connect directly to another device to send and receive data.

Previously codenamed "Wi-Fi peer to peer," the technology allows any device with WiFi to easily connect to another, such as a cell phone or camera to a printer, or even a keyboard or mouse to a computer. Devices can connect one-to-one or in a group. According to the Wi-Fi Alliance, devices implementing the new standard will even be able to connect to legacy WiFi devices in most cases.


4. Secret ACTA Treaty Can't Be Shown to Public, Just 42 Lawyers
Spoiler
http://arstechnica.com/tech-policy/news/2009/10/these-42-people-are-shaping-us-internet-enforcement-policy.ars
I actually thought we'd heard the end of the Anti-Counterfeiting Trade Agreement, but apparently not. It seems that the lack of the possibility for public scrutiny of the legislation will be offset by the investigation of the document by 38 corporate and 4 public interest lawyers.

Turns out that the Anti-Counterfeiting Trade Agreement (ACTA) will include a section on Internet "enforcement procedures" after all. And how many people have had input on these procedures? Forty-two.

ACTA has worried outside observers for some time by threatening to delve into issues not normally covered by "trade agreements." Topping the list are concerns about ACTA's possible use as a Trojan horse to shove tough Internet controls onto countries like the US at the behest of Big Content. It's been hard to tell exactly what ACTA will include, though, because the process has taken place in such secrecy and even when information has been released, the section relating to the Internet has been empty.


5. Microsoft's Danger SideKick and Cloud Computing (Thanks 40hz)
Spoiler
https://www.infosecisland.com/articleview/1409-Microsoft%27s-Danger-SideKick-and-cloud-computing.html
CLOUD FAIL! (disclaimer: this statement in no way implies that I give any credence whatsoever to the term "Cloud Computing") A Microsoft subsidiary "Danger" made a whoopsie in the "cloud" this week, losing the address book data (which is apparently stored only in the "cloud") for each and every user of a SideKick mobile device. They've since made some headway in recovery of the data. I found it most interesting how MS was so happy to release details of the faul, blaming Oracle databases and Sun hardware/OS.

Microsoft has demonstrated that the dark side of cloud computing has no
silver linings. After a major server outage occurred on its watch last
weekend, users dependent on the company have just been informed that their
personal data and photos "has almost certainly been lost."

While occasional service outages have hit nearly everyone in the business,
knocking Google's Gmail offline for hours, plunging RIM's BlackBerrys into
the dark, or leaving Apple's MobileMe web apps unreachable to waves of
users, Microsoft's high profile outage has impacted users in the worst
possible way: the company has unrecoverable lost nearly all of its users'
data, and now has no alternative backup plan for recovering any of it a week
later.


6. Illegal Downloads 150x More Profitable Than Legal Sales
Spoiler
http://torrentfreak.com/illegal-downloads-150x-more-profitable-than-legal-sales-091009/
Torrent Freak certainly can't be considered impartial in this arena, but this could be an interesting insight into why the RIAA so readily backpedaled on their "we won't sue" policy.

TorrentFreak has reported before how pirates have been turned into cash cows by the copyright mafia. However, reliable statistics on how much money the entertainment industry and anti-piracy outfits make from illicit downloads have not yet been disclosed, until now.

The German-based anti-piracy outfit DigiRights Solutions (DRS) recently published an interesting PowerPoint presentation (in German) which shows how copyright holders can make millions from pirates. The document reveals some rather shocking statistics that show how illicit downloads are more profitable than legal downloads.


7. Facebook Now Has 30,000 Servers
Spoiler
http://www.datacenterknowledge.com/archives/2009/10/13/facebook-now-has-30000-servers/
Wow, that's some pretty sweet hardware there Facebook.I found it most illuminating where, toward the end, the article mentioned Facebook generated approximately 25 terabytes of logfiles...daily.

How many servers does Facebook have? For some time now, the stock answer has been “more than 10,000 servers,” a number the company began using in April 2008. Facebook has continued to use that number, even as it has soared past 300 million users and dramatically expanded its data center space.

We now have an update: Facebook has 30,000 servers supporting its operations. That number comes from Jeff Rothschild, the vice president of technology at Facebook, who discussed the company’s infrastructure in a presentation last week at UC San Diego.


8. Judge: Ringtones Aren't Performances, So No Royalties
Spoiler
http://arstechnica.com/tech-policy/news/2009/10/judge-ringtones-arent-performances-so-no-royalties.ars
Fortunately we got a judge with half an ounce of sense. So far, at least, ringtones will not be considered a "performance", and thus will not require the player to pay royalty fees.

If you have been blessing everyone around you with cell phone "performances" of Beyoncé's "Single Ladies," rest assured that your cell phone provider won't have to pay royalties on it. A federal court has ruled that ringtones played aloud in public are not infringing on the content owners' copyrights because they don't constitute a true performance. (In other news, children are still allowed to sing songs without paying royalties.)

Joking aside (actually, that's less of a joke than you might think), the ringtone argument was made by the American Society of Composers, Authors, and Publishers (ASCAP) earlier this year when it sued certain mobile carriers in the US in an attempt to force them to fork over royalties every time a customer's ringtone is played. Even though the carriers were already paying for download rights to the songs, ASCAP argued that each ring was a "performance" and therefore those download payments weren't enough.


9. Checking Twitter/Facebook: the New Post-coital Cigarette?
Spoiler
http://arstechnica.com/web/news/2009/10/checking-twitterfacebook-the-new-post-coital-cigarette.ars
This can hardly be called "news", but I thought it might illicit a few LOLs from DC.

That was good for me—was it good for you? Hang on, I need to tweet this.

If you have heard or uttered some variation of the above phrase anytime recently, you might be a social media user under the age of 35. Shopping site Retrevo.com recently investigated the grip that sites like Twitter and Facebook have on Internet users' lives and found that the under-35 crowd in particular is on the verge of needing social media rehab.

Retrevo discovered that those under 35 took the opportunity to tweet, text, and post to Facebook at times that might be considered inappropriate to an older generation. The most amusing statistic from this is, of course, the "after sex" column—36 percent of under-35 users admitted to checking Twitter/Facebook/texts immediately after getting it on, while only 8 percent of those over 35 fell into this category.


10. WarGames: Alternate Ending
Spoiler
http://www.youtube.com/watch?v=vIkfq1kEUBw
A very un-newsy clip to end this week, but good for a laugh I hope :)

onion.jpg



Ehtyar.

147
Living Room / Re: GhostNet - The Facts
« on: October 16, 2009, 06:35 PM »
I am a minion. However, even minions are aware that a firewall gets you just about nowhere against a determined attacker...

Ehtyar.

148
Living Room / Re: Can someone remind me why are we using email ?
« on: October 14, 2009, 07:53 PM »


Ehtyar.

149
Living Room / Re: Can someone remind me why are we using email ?
« on: October 14, 2009, 06:48 PM »
This kind of question is really tired IMHO. Come up with something better or more appropriate, and we'll start using it plzkthxbye.

Ehtyar.

150
A single plain text file is perhaps a little too free-form I think.

Ehtyar.

Pages: prev1 2 3 4 5 [6] 7 8 9 10 11 ... 50next