avatar image

Welcome, Guest. Please login or register.
Did you miss your activation email?

Login with username, password and session length
  • Saturday February 27, 2021, 10:09 pm
  • Proudly celebrating 15+ years online.
  • Donate now to become a lifetime supporting member of the site and get a non-expiring license key for all of our programs.
  • donate

Show Posts

This section allows you to view all posts made by this member. Note that you can only see posts made in areas you currently have access to.

Messages - Ehtyar [ switch to compact view ]

Pages: prev1 2 3 4 [5] 6 7 8 9 10 ... 50next
Living Room / Re: Google execs may go to prison!
« on: November 26, 2009, 07:18 PM »
*sigh* I thought the circus was supposed to come to town periodically, not take up permanent residence.


Living Room / Re: Tech News Weekly: Edition 47-09
« on: November 26, 2009, 05:24 PM »
Aww thanks Mouse Man. Unfortunately, for the first time ever ETNW will not be posted for 5 weeks when I head to the US for Christmas. :(


Living Room / Re: Tech News Weekly: Edition 41-09
« on: November 26, 2009, 05:22 PM »
None that I'm aware of I'm afraid, sorry tomos.


General Software Discussion / Re: Chrome OS preview looks pretty cool
« on: November 25, 2009, 11:55 PM »
Yes, poor wording. Chrome OS is Google *focused*, but not Google exclusive as my working implied. Sorry about that.

Found out from my boss that you log into the *OS* with your Google account. What's up with that?


General Software Discussion / Re: Chrome OS preview looks pretty cool
« on: November 25, 2009, 10:05 PM »
Internet only OS ? No way  :down:
Why they have no plan for offline people or software in mind ?
That's the whole idea of Chrome OS, to cater only for online Google stuff. If you want an offline OS you can chose literally any other OS :P

Don't get me wrong, I find it as screwy as you do, but that is the general thinking behind it.


General Software Discussion / Re: Chrome OS preview looks pretty cool
« on: November 25, 2009, 08:59 PM »
The OS does not support hard drives, just SSDs (solid state devices)
Sounds like a preeeeetty arbitrary and artificial limit, considering that SSDs use exactly the same connectors and protocol as standard hard drives...  :huh:
It's an Apple-like limitation, to ensure it runs really snappy I imagine.

You can run ChromeOS from a usb stick now. Boss tried it this morning and had two total system freezes in 10 mins.


so, where is the script for updating my scripts?  :tellme:

- without such a script feature, I cannot be too impressed with Greasemonkey itself.
Most of the frequently (recently) updated scripts contain code to notify you of updates. The Download From YouTube script april mentioned is a good example.

Still, I can't quite understand how lack of an automatic update feature makes GreaseMonkey itself any less impressive, many scripts don't require such functionality at all (autocomplete on, linkify, tinyurl decoder etc).


General Software Discussion / Re: DNS logger & firewall for Win32
« on: November 25, 2009, 03:50 PM »
But purely in order to prove your DNS is being tampered with, it's the perfect solution. BIND is very reasonable with memory, despite what others may say about it...


General Software Discussion / Re: DNS logger & firewall for Win32
« on: November 24, 2009, 06:50 PM »
If they're tampering with the actual traffic on port 53, as opposed to just records from their own DNS servers (the impression I got), then you could probably prove it by using DNSSEC (will only work for certain TLDs though, .org is probably easiest).


I keep hearing about the mess and mistakes made by traditional media in the digital age (to which they seem so inexplicably unaccustomed a decade on) and just keep wondering when they will stop committing acts of mass stupidity and join the rest of the planet in a time beyond the 1980s.

Then, I come across stories such as this. All I can say is "good riddance to bad...toilet paper?".


Living Room / Re: Tech News Weekly: Edition 47-09
« on: November 23, 2009, 03:57 PM »
Aw shucks, thanks guys :-[


Living Room / Tech News Weekly: Edition 47-09
« on: November 22, 2009, 01:33 PM »

The Weekly Tech News
TNWeekly01.gifHi all.
I've decided to take a new approach to the news. Instead of going through the week's news of a Sunday and picking out what I consider to be the most relevant headlines, this week's news is a collection of what I found most interesting from news articles I came across throughout the past week. Please let me know what you think over the next few weeks :)
As usual, you can find last week's news here.

1. Want To Try Out Google Chrome OS For Yourself? Here’s How.
TechCrunch has made a guide showing you where to get a copy of a compiled Chrome OS, and how to run it in a VM.

The public debut of Google Chrome OS today has the press abuzz over the potential of the new web-based operating system. And now that it’s open sourced, you have the chance to try it out for yourself. Unfortunately, most people aren’t ready to undertake the daunting task of actually taking Google’s recently open-sourced code and turning that into a bootable computer. So we’ve put together a step-by-step guide to doing this, for free, in around 15 minutes (depending on how long it takes to download the OS itself). No, this won’t get your computer booting Chrome OS natively (and frankly, you probably wouldn’t want to yet anyway). But it will get it up and running in a virtual machine using the free software VirtualBox, which is available for Macs, PCs, and Linux.

2. Hacked Darwin Kernel Available for 10.6.2 On Atom Netbooks
The final release of the latest version of Mac OS had Atom support removed. An Apple fan took the new Kernel and hacked it to bring back Atom compatibility for those running it on Netbooks.

First the 10.6.2 update to Snow Leopard wasn't compatible with Intel Atom processors. Then it was. Then it wasn't again when it was finally released to the masses. Fortunately for the netbook-loving Mac OS X fans out there, the OSx86 scene is only too happy to offer a patched version of mach_kernel to enable booting 10.6.2 on netbooks once more.

The kernel is the deep-down part of Mac OS X that generally handles direct communication between the OS and hardware. Speculation swirled that Apple was actively trying to keep Mac OS X from being installed on inexpensive Atom-based netbooks. However, chances are it was more likely a result of optimizations that didn't take into account Atom processors, since Apple doesn't use them in any shipping products.

3. The One Instruction Wonder
Really interesting. Describes a new chip architecture called TTA (Transfer Triggered Architecture). The chip has only one instruction, an analog to 'mov', and moving memory around on the chip triggers the remaining functionality.

One of the original "Star Trek" television episodes involves patients at a facility for the criminally insane. One of the inmates quotes some lines from Shakespeare and announces that she wrote it yesterday. Another character tells her that it had been written by the bard in the past. The woman replies, "Which does not alter the fact that I wrote it again yesterday!"

I suppose in the computer industry it is particularly difficult these days to have a truly original idea, even if you arrive at your idea independent of prior work. I had that experience several years ago. I had just finished a 16-bit CPU design based loosely on Caxton Foster's Blue machine in his excellent (albeit dated) book Computer Architecture. (Yes, I do have strange hobbies.) Like Foster's original, my machine has what I think of as a 1970's minicomputer architecture -- its very similar to a DEC or DG or HP machine from that era. I was contemplating starting a new project using some sort of RISC (Reduced Instruction Set Computer) architecture. RISC's advantages are well known. Simplifying the CPU core by reducing the complexity of the instruction set allows faster speeds, more registers, and pipelining to provide the appearance of single cycle execution. RISC has been so popular that even your PC today probably uses a RISC core that is emulating a non-RISC processor!

4. Modern Warfare 2 Breaks Sales Records Across Entertainment Industry
Modern warfare 2 has broken all records for both movies and video games in its first 5 days of availability.

Despite a bit of controversy in Russia, Infinity Ward's Modern Warfare 2 has taken the video game world by storm, and now it is breaking sales records across the entire entertainment industry. The title reportedly generated $550 million in sales during the first five days available, beating all other video game launches and raking in more cash than any movie in the same timeframe.

By comparison, the current worldwide box-office record-holder is Harry Potter and the Half-Blood Prince, which earned $394 million in its first five days. The Dark Knight holds the US box-office record with $203.8 million. The title has even successfully trounced Grand Theft Auto IV, which pulled in $500 million over the first five days of sales.

5. Pirate Bay Says Tracker Tech is So Yesterday, Man
TPB is no longer running its tracker, instead allowing DHT to track their torrents for them. This alleviates a good portion of TPB's liability in any further court cases.

The Pirate Bay has kyboshed its tracker technology and replaced it with a decentralised peer-to-peer network that all modern clients can hook up to.

The so-called distributed hash table (DHT) allows freeloaders to circumnavigate use of a tracker in order to download torrents. Instead, they connect to a DHT network to find other peers.

The Pirate Bay said today it had adopted the DHT option because a more decentralised system of handling tracking and distributions of torrent files means that "BitTorrent will become less vulnerable to downtime and outages."

6. Civilian Supercomputer Shatters Nuke Simulator’s Speed Record
And to think my boss couldn't understand why I wanted to run my own datacenter... Be sure to watch the video in link 2, I want his thermal paste applicator, and his screwdriver (in case anyone is considering christmas presents ;)).

The retooled Jaguar supercomputer blew away the competition on the latest list of the 500 fastest computers in the world, clocking an incredible 1.759 petaflops — 1,759 trillion calculations per second.

The machine, housed at the Department of Energy’s Oak Ridge National Laboratory in Tennessee, added two more cores with the aid of almost $20 million in stimulus spending. With the new processors, the Cray XT5 plowed past the Top500 competition. It’s more than 69 percent faster than the previous record holder, Los Alamos National Laboratory’s IBM Roadrunner, and is more than twice as powerful as the third-fastest computer on the list.

7. Never-before-seen 'Star Trek' Pilot Found
They've found the second Star Trek pilot and will be releasing it to DVD next month!!!

"Star Trek" fans know there were two pilots for the original series.

The first, "The Cage," was rejected by NBC for being "too cerebral" (ah, some things never change).

The second, "Where No Man Has Gone Before," replaced the actor who played the captain with William Shatner and was more action driven. That pilot had an alternate version which was largely lost and has never aired. Apparently, a film collector in Germany acquired the print and "recently brought it to the attention" of CBS/Paramount. CBS is now releasing this version on Blu-ray Dec. 15. 

8. Early Christmas! DEF CON 17 Video and Audio Now Online!
The entire repository of video and audio from this year's DEFCON is now available online.

That's right kids! Whether you've been naughty or nice, all of the audio and video from DEF CON 17 is now available for download! You can get it by heading to the DEF CON 17 Archive Page, and check out all of the awesome talks you want.

9. Grand Theft Auto Vs. Frogger
A short and sweet one this week :)





Living Room / Re: Tech News Weekly: Edition 46-09
« on: November 16, 2009, 10:54 PM »
In the USA, our government has discovered that it can get around its constitutional "checks and balances" by allowing (possibly encouraging) private entities* to perform actions and collect information the government is not allowed to legally collect on it's own.
The moment I read that, I understood. Sorry for the confusion Hertz Man.

I usually read stories I come across involving the telco immunity mess in the states. Were I in your position, that would piss me off.

To be perfectly honest, I don't know what the legal implications are in this country of the government attempting to bypass security systems in software. The cynic in me says that given we're even more of a fascist state than the US, they can do whatever they damn-well please, but the realist in me tells me to check before I shoot my mouth off.

At this point, however, I'm not entirely sure where to check. Given that Australia has a populace that could largely be described more as sheeple than people (as justification for this comment, refer to the general apathy displayed regarding the Great Aussie Firewall), our laws are typically not scrutinized nearly as well as yours. If I manage to determine the status of this in the near future, I'll be sure to let you know.


Living Room / Re: Tech News Weekly: Edition 46-09
« on: November 16, 2009, 07:50 PM »
Although I can understand what you're saying Hertz Man, I can't agree. Whether some total drongo cop has access to the information this tool can present, or only the NSA does, the simple fact is that this information can be gotten.

The fact that the information exists, and can be gotten is what bothers me, not how or by whom it can be retried.


Living Room / Re: Tech News Weekly: Edition 46-09
« on: November 16, 2009, 05:48 PM »
#7 - Nice to see Microsoft has developed their very own backdoor exploit for Windows.

I know I'll sleep better at night knowing such a thing exists. Especially since it will only be made available to duly authorized members of the law enforcement community - whom experience has shown we can completely trust to never abuse such technologies.
From what I heard from people who took a look at this, it's mostly a collection of SysInternals tools and a frontend - big f'ing deal. Haven't bothered to look at it myself though (considering that I don't exactly have legitimate access to it), so it could be worse.
Sorry Hertz Man, I must have missed your post. F0d Man is indeed correct, it is basically a collection of freely available tools with a front-end so that some cop who can barely operate a computer can collect "forensic" evidence in the field and cart it back to someone who knows what the f they're doing. Really very disappointing :(

#5 is nice - thumbs up to anything giving twitter a bad name :P
I don't know that I'd go that far, but definitely a thumbs-up to anything that highlights Twitter's security holes.


Living Room / Re: Tech News Weekly: Edition 46-09
« on: November 16, 2009, 04:03 PM »
Hahaha, Rafe Needleman from CNET is calling it that. He mentioned it a few episodes ago on BOL, but I think that may have been just because he thought it sounded better.

Still, I don't quite see how this will help Google harvest our infoz (except for the sheeple that will adopt Chrome just to use it). Provided the other browsers catch on early enough (how long will it before someone decides the SSL requirement isn't necessary?), this should be a good thing IMHO.


Living Room / Tech News Weekly: Edition 46-09
« on: November 15, 2009, 04:54 AM »
The Weekly Tech News
TNWeekly01.gifHi all.
Enjoy :)
As usual, you can find last week's news here.

1. Truly Malicious IPhone Malware Now Out in the Wild
No doubt the first of many. Earlier this last week an Iphone "virus" was tracked in Australia, targeting jailbroken iPhones with ssh enabled using the default root password. It would change the background to a picture of Rick Astley, then shut down sshd to prevent reinfection. Someone apparently cottoned on, and has launched a variant that sends private data (contacts, emails, SMSs etc) back to the machine running the control app.

If you didn't heed previous warnings to secure your jailbroken iPhone, you may be in for some serious trouble. Computer security firm Intego has identified the first known truly malicious code which targets jailbroken iPhones with default root passwords.

The latest in a string of recent attacks, iPhone/Privacy.A uses a technique similar to previous hacks. The malware scans for phones on a given network with an open SSH port, then attempts to log in using the default root password that is the same on all iPhones. Unlike the previous versions, which merely replaced the wallpaper image to alert users that they have been cracked, the new version silently copies personal data—"e-mail, contacts, SMSs, calendars, photos, music files, videos, as well as any data recorded by any iPhone app." It then sends the data back to the machine running the software.

2. SPDY: Google Wants to Speed Up the Web by Ditching HTTP
Some really interesting stuff here from Google. In their never-ending quest for improved web performance and security (so that they, and only they, can harvest your dataz), Google has concocted a replacement for HTTP over TCP called SPDY (read: speedy) which will be built into a future version of Chrome and hopefully other browsers.

On the Chromium blog, Mike Belshe and Roberto Peon write about an early-stage research project called SPDY ("speedy"). Unhappy with the performance of the venerable hypertext transfer protocol (HTTP), researchers at Google think they can do better.

The main problem with HTTP is that today, it's used in a way that it wasn't designed to be used. HTTP is very efficient at transferring an individual file. But it wasn't designed to transfer a large number of small files efficiently, and this is exactly what the protocol is called upon to do with today's websites. Pages with 60 or more images, CSS files, and external JavaScript are not unusual for high-profile Web destinations. Loading all those individual files mostly takes time because of all the overhead of separately requesting them and waiting for the TCP sessions HTTP runs over to probe the network capacity and ramp up their transmission speed. Browsers can either send requests to the same server over one session, in which case small files can get stuck behind big ones, or set up parallel HTTP/TCP sessions where each must ramp up from minimum speed individually. With all the extra features and cookies, an HTTP request is often almost a kilobyte in size, and takes precious dozens of milliseconds to transmit.

3. Intel and AMD Bury the Hatchet Under $1.25 Billion in Cash
Intel and AMD have called it quits on all legal battlefronts, with Intel paying AMD $1.5 billion in cash and agreeing to change unspecified business practices.

Intel and AMD are fierce competitors in the world of chipmaking, but in recent years they've taken the fight to the courtroom. AMD has sued Intel for antitrust violations (allegations that have been picked up by a number of governments), while Intel fired back by claiming that AMD had violated a licensing agreement for x86 technology. This morning, however, the two companies made a surprise announcement: they've reached an agreement that settles all legal issues between them.

The statement is short on information; both companies will flesh out the details during press/analyst calls later this morning. However, it does have a few eye-popping details, first and foremost among them a cash payment: Intel will be handing $1.25 billion over to AMD. The agreement also includes limits on Intel's business practices; these aren't specified in the statement, but undoubtedly limit the rebates and bulk buying agreements that Intel has used in the past to keep OEMs from jumping ship to AMD.

4. Wikipedia Sued for Publishing Convicted Murderer's Name
A German man is suing Wikipedia in an attempt to have them remove his name from every article pertaining to his murder of a man in 1999. According to German law, he should no longer be associated with the crime 10 years after it was committed. The question is, does this right apply to the entire Internet? The German wikipedia is already in full compliance with the law.

A man who served 15 years for the gruesome murder of a famous German actor is taking legal action against Wikipedia for reporting the conviction.

Attorneys took the action on behalf of Wolfgang Werlé, one of two men to receive a life sentence for the 1990 murder of Walter Sedlmayr. In a letter sent late last month to Wikipedia officials, they didn't dispute their client was found guilty, but they nonetheless demanded Wikipedia's English language biography of the Bavarian star suppress the convicted murder's name because he is considered a private individual under German law.

5. Attackers Conceal Exploit Sites With Twitter API
I loves me a unique virus design!! Malicious scripts being used to cause drive-by downloads on infected websites are generating their destination domain names from the second character of each of the top-30 trending twitter topics. This ensures that the resulting domains cannot be calculated in advance, making it very difficult to lock out the necessary domains, as was the approach with the well known Conficker virus.

Drive-by exploit writers have been spotted using a popular Twitter command to send web surfers to malicious sites, a technique that helps conceal the devious deed.

The microblogging site makes application programming interfaces (APIs) such as this one available so legitimate websites can easily plug into the top topics being tweeted. As the concerns and opinions of Twitter users change over time, so too will the so-called top 30 trending topics.

6. Microsoft Defends Hotmail's Cookie Requirement
Whoops. Microsoft is now requring Hotmail users to accept 3rd-party cookies in order to log out of their accounts. They're claiming it "improves security", though how that is the case is anyone's guess.

Microsoft has said its new policy of requiring users to accept third party cookies to log out of Hotmail improves security.

Some readers who contacted El Reg said it raises the risk that accounts will be compromised on public machines, while others who do not allow third party cookies simply found the error message when they tried to log out irritating.

7. MS Forensics Tool Leaks Onto the Web
Another whoops. Microsoft's "Computer Online Forensic Evidence Extractor" has leaked onto the Internet via BitTorrent, letting anyone see the innards of a controversial tool designed to automagically extract evidence from computers seized by police.

Microsoft's point-and-click "computer forensics for cops" tool has leaked onto the web.

COFEE (Computer Online Forensic Evidence Extractor) is designed to allow law enforcement officers to collect digital evidence from a suspect's PC without requiring any particular expertise. Using the technology - which recovers a list of processes running on an active computer at the scene of an investigation - involves inserting a specially adapted USB stick into a computer.

Grabbing data from a PC without interfering with the machine is no substitute for a detailed examination by experts where something amiss is discovered, but still attractive to the computer crime authorities. It allows police to search a computer's internet history, analyse systems and data stored and even decrypt passwords, without having to transport the machine to a lab. It does this in a fraction of the time the process would normally require.

8. Using Photosynthesis to Power Hydrogen Production
This is just too cool!! Why are there no hydrogen cards available to the public!!!

The processes we use to obtain fuel, from pumping fossil fuels up from beneath the ocean to harvesting crops to turn into ethanol, create many environmental and practical concerns. These types of fuel work fine with the current generation of cars, but hydrogen has sometimes been touted as the fuel of the future. A publication in Nature Nanotechnology describes how researchers have found a way to use the photosynthetic machinery of a bacteria to produce the hydrogen equivalent of up to 79 gallons of gas per-acre, per-day. Their technique involved capturing the electrons produced during photosynthesis and binding them to some strategically placed protons.

The production of fuel has accelerated lately, from waiting millions of years for fossil fuels to waiting a few days or weeks for biomass-derived fuels such as ethanol. However, biomass fuels still present some difficulties: the fuel produced relative to the land area required is pretty small (the equivalent of a little more than a gallon of gas per acre), the conversion to ethanol requires a distilling period, and all the materials for making the fuel must be harvested, handled, and transported, all of which requires a significant energy expenditure.

9. Christopher Walken Performs Lady Gaga's Poker Face
You just gotta love Christopher Walken. Be sure to check out the awesome mashup with the real song here.



Developer's Corner / Re: Google Go
« on: November 12, 2009, 04:58 AM »
I haven't taken a look at the language yet, but i think it's a bad sign that it has such a pretentious and, worst of all, search-engine-unfriendly name.  That name virtual guarantees you would have an extremely difficult time searching for help on the language (unless of course the company that controls the dominant search engine can bias search results.. oops.. conflict of interest anyone?)  Seriously though, that is an extremely stupid and spoiled-brat-like decision to make regarding naming a language.
I have to say Mouse Man that I totally understand where you're coming from. Having installed Windows 7 at RC as my primary desktop OS, I have suffered greatly at the hands of those who would create a product that doesn't handle searches well. I feel your pain!!

It is an interesting choice to release a language with compilers available for only Linux and OS X .. I would have expected a Windows installer to be the first thing they would make sure to offer :D.
Agreed, though porting it from gcc to MinGW will probably be a bitch. Since they already had it for gcc I suppose they expect to (or someone to) port it now anyway.

I have been working on a programming language, also called Go, for the last 10 years. There have been papers published on this and I have a book.
I would appreciate it if google changed the name of this language; as I do not want to have to
change my language!"
very interesting find rgdot.  now the normal way big corporations deal with such problems is just to throw money and job offers at the people they infringe on and then just keep on truckin'.  let's see if google is any different..
If that. I'd imagine Google could easily get away with not giving a crap, there was a project called "go" on Google Code when they chose the name after all.

On an unrelated note, does anyone think this language is distinctive enough to be worth breaking away from C for? (assuming you're still using C, no comments in that vein plzkthx)


Developer's Corner / Google Go
« on: November 11, 2009, 07:35 PM »
We'll dispense with the unnecessary "Google is evil, despite what they say" diatribe and get right to the good stuff: Google have opened up a new programming language that they're calling Google 'Go'. It's based heavily on C but it looks to me like it's a little more "functional" in terms of syntax. Their goals were apparently faster compile times (were they thinking of C or C++?) and a more expessive syntax (hence the "functional" bit I guess).

Ars (as usual) has a good write-up here, and the official site is here. I haven't had a chance to try it myself, but if anyone else has please let us know what you thought.

A Google TechTalk has been posted here.



Living Room / Re: How would you improve a standard PC keyboard?
« on: November 10, 2009, 11:43 PM »
Ahahaha, apparently neither of us read the entire thread :S

* Ehtyar sorry


Living Room / Re: How would you improve a standard PC keyboard?
« on: November 10, 2009, 07:08 PM »
Why not turn the left caps-lock key into an enter key? (for those who don't have a problem randomly hitting it by accident)


Living Room / Re: Legal Insanity
« on: November 10, 2009, 06:38 PM »
You'll be pleased to know that in Aussie Land you will be expected to *strictly* abide by the road laws; look out for those speed cameras, red light cameras, and 40kph school zones on highways...


Living Room / Re: I'm Going to HELL! Please feel sorry for me... :(
« on: November 09, 2009, 06:13 PM »
Ahahaha, nice one Hertz Man.

Renegade, if you're gonna be in Sydney you're welcome to cry on my shoulder (just be sure a funnel web doesn't sneak up on you while you're blubbering, k?) :P


Living Room / Re: How would you improve a standard PC keyboard?
« on: November 08, 2009, 10:57 PM »
+1 for both of your suggestions tranglos.

I'm also very into a block of programmable keys similar to the numpad but with no functionality other than what you assign them, and a small LCD display just for convenience functions (like when using fullscreen apps etc). Something similar to the relatively well known Logitech G15 that's not ugly would be nice.

Also, why the *frack* have peripheral manufacturers still not made a mouse with a wheel that supports side scrolling *as-well-as* non-retarded right-click?


Pages: prev1 2 3 4 [5] 6 7 8 9 10 ... 50next