topbanner_forum
  *

avatar image

Welcome, Guest. Please login or register.
Did you miss your activation email?

Login with username, password and session length
  • Thursday April 18, 2024, 7:25 pm
  • Proudly celebrating 15+ years online.
  • Donate now to become a lifetime supporting member of the site and get a non-expiring license key for all of our programs.
  • donate

Show Posts

This section allows you to view all posts made by this member. Note that you can only see posts made in areas you currently have access to.


Messages - Ehtyar [ switch to compact view ]

Pages: prev1 ... 5 6 7 8 9 [10] 11 12 13 14 15 ... 50next
226
General Software Discussion / Re: 2 Speed tips for FF-gHacks
« on: July 28, 2009, 07:01 PM »
f0dder, how do we defragment our sqlite files?

Ehtyar.

227
This is Jet (aka The Jetster, Jetski, Jetski Bibbles, or even just Bibbles). 'Walk' must be spelled around Miss Bibbles (we're pretty sure she's catching on to that as well  :tellme:), for fear of the destruction of the back door, and you daren't utter the words 'bye-bye car-car' unless you intend to take her out on the town (you can get away with B-B-C-C though).

She was rescued from the local shelter, and has the sweetest disposition you've ever seen in an animal. She enjoys pizza crusts, and liver treats (aka doggie-crack). Unfortunately, she belongs to the other half, but you can rest assured I'll be hanging around as long as she's here ;)

And now finally, the pics:

RIMG0024.JPGRIMG0151.JPG
Her magesty, miss Jet (notice the paws)Jet after Christmas dinner
RIMG0160.JPGRIMG0235.JPG
Jet eying the Christmas turkeyJet at New Years

Ehtyar.

228
In order that you might avoid the same outdated language issue that you're currently effected by, might I suggest a more heavily used language than VB.NET? Developers are fleeing VB.NET in droves for the power, consistency and familiarity of C#.

Where code maintainability and longevity are of primary concern, it can be advantageous to go with the more... dare i say, popular, languages.

Ehtyar.

229
General Software Discussion / Re: Firefox 3.5?
« on: July 27, 2009, 06:24 PM »
I just thought the rule was that no major new version was to be offered through auto-update just like one couldn't auto-update to v3 from v2, but v2.x upgrades were still offered to v2.x users.
Nope. See here.

Ehtyar.

230
General Software Discussion / Re: Firefox 3.5?
« on: July 27, 2009, 03:51 PM »
Firefox 3.5 will not be offered via automatic update until Mozilla considers the browser and the update procedure to be very stable. Until then, the onus is on the user to manually update their Firefox installations.

Ehtyar.

231
Living Room / Tech News Weekly: Edition 30-09
« on: July 26, 2009, 05:59 AM »
The Weekly Tech News
TNWeekly01.gifHi all.
Enjoy :)
As usual, you can find last week's news here.


1. Researcher Raids Browser History for Webmail Login Tokens
Spoiler
http://www.theregister.co.uk/2009/07/20/csrf_token_hijacking/
To see it in action: http://securethoughts.com/2009/07/hacking-csrf-tokens-using-css-history-hack/
The scary bit about this one ('coz CSRF is pretty old hat at this stage...) is that they're finding the token, and with just css :S

In a disclosure that has implications for the security of e-commerce and Web 2.0 sites everywhere, a researcher has perfected a technique for stealing unique identifiers used to prevent unauthorized access to email accounts and other private resources.

Websites typically append a random sequence of characters to URLs after a user has entered a correct password. The token is designed to prevent CSRF (cross-site request forgery) attacks, which trick websites into executing unauthorized commands by exploiting the trust they have for a given user's browser. The token is generally unique for each user, preventing an attacker from using CSRF attacks to rifle through a victim's account simply by sending a generic URL to a website.


2. Network Solutions Breach Exposed 500k Card Accounts
Spoiler
http://www.theregister.co.uk/2009/07/25/network_solutions_ecommerce_breach/
I've been trying to avoid posting data breaches, since they're so common now-a-days, but this one is particularly large, and probably relevant to a lot of DCers. Basically, Network Solutions' CMS was hacked, and the baddies got all your c4rdz0r.

A breach at Network Solutions has exposed details for more than 500,000 credit and debit cards after hackers penetrated a system it used to deliver e-commerce services and planted software that diverted transactions to a rogue server, the hosting company said late Friday.

The unauthorized software was in place from March 12 to June 8 and affected transactions Network Solutions processed on behalf of 4,343 merchant websites that mostly belonged to small businesses, spokeswoman Susan Wade said. While the company discovered the software in early June, it waited until the close of business Friday to disclose the breach. Wade said it took until July 13 for forensics investigators to crack the code and understand how it worked.


3. Palm Plays Cat-and-mouse With Apple, Reenables ITunes Sync
Spoiler
http://arstechnica.com/gadgets/news/2009/07/palm-plays-cat-and-mouse-with-apple-reenables-itunes-sync.ars
Seems like Palm has decided to start a game of cat and mouse with Apple. They've modified the Pre to again work with iTunes, after Apple locked them out in their last update.

Palm passive-aggressively fired back at Apple in its 1.1.0 update to the Pre's webOS Thursday night. Among the handful of changes that came with the point update, the software restores syncing functionality with iTunes after Apple unceremoniously "fixed" the "problem" last week. The move is the latest in this high-profile cat-and-mouse game between Apple and Palm, and Palm seems to be willing to keep poking the fate bear—but to what end?

webOS 1.1.0 isn't all about iTunes compatibility. Among other things, it contains a number of useful updates to the Pre, including better timezone support in the Clock application, improved syncing with Google when you edit a Google contact, and the addition of emoticons in text, multimedia, and instant messages. The software also gained some enterprise features in the form of Exchange ActiveSync (EAS) support that allows for remote wipe, PIN/passwords, inactivity timeouts, and improved certificate handling.


4. Wireless Power System Shown Off
Spoiler
http://news.bbc.co.uk/2/hi/technology/8165928.stm
A wireless power transfer system has been unveiled at the latest TED conference. It exploits resonant frequency between the charging station and appliance to transfer the power in a substantially more efficient manner.

The technique exploits simple physics and can be used to charge a range of electronic devices over many metres.

Eric Giler, chief executive of US firm Witricity, showed mobile phones and televisions charging wirelessly at the TED Global conference in Oxford.

He said the system could replace the miles of expensive power cables and billions of disposable batteries.

"There is something like 40 billion disposable batteries built every year for power that, generally speaking, is used within a few inches or feet of where there is very inexpensive power," he said.


5. Microsoft Caves to EU Pressure, Will Offer Browser Ballot
Spoiler
http://arstechnica.com/microsoft/news/2009/07/microsoft-caves-to-eu-pressure-will-offer-browser-ballot.ars
Sketchy on the details as of yet, but it looks like MS has finally caved, and will ask the user which browser they'd like to use in Windows 7...in the EU at least.

Although Intel may have been hit with a bigger fine, the multi-year saga of Microsoft's fight with the European Union's Competition Commission may have run up larger legal bills, given its longevity. The most recent point of contention between Redmond and Europe has been the browser; Microsoft bundles its own with its operating systems, but the EU views that as using monopoly power to the detriment of potential competitors.

Earlier this month, word came out that Microsoft was looking to make this matter go away, and it may have succeeded; the European Commission has just announced that Microsoft has agreed to proposed EU remedies and is willing to offer a "browser ballot" to new users.


6. Microsoft Aims at VM Market With Linux Kernel Code Offering
Spoiler
http://arstechnica.com/microsoft/news/2009/07/microsoft-aims-at-vm-market-with-linux-kernel-code-offering.ars
Microsoft looks to be seeking dominance in the virtualization market, after it made code available to the Linux Kernel that would improve its performance on Hyper-V.

Microsoft is contributing approximately 20,000 lines of source code to the Linux kernel with the aim of improving support for running the Linux operating system in virtualized environments on Windows servers. The move is part of a broader trend at Microsoft towards collaboration with the open source software community.

Prominent Linux kernel developer Greg Kroah-Hartman announced the code submission today in a message posted to the Linux kernel mailing list. He says that the new drivers contributed by Microsoft will soon land in the staging tree where they will undergo some refinement before they are merged directly into the mainline kernel. Microsoft is making the code available under the terms of GNU's General Public License (GPL), the open source software license that is used by the Linux kernel.


7. Intel's New 34nm SSDs Cut Prices by 60 Percent, Boost Speed
Spoiler
http://arstechnica.com/hardware/news/2009/07/intels-new-34nm-ssds-cut-prices-by-60-percent-boost-speed.ars
Intel's SSDs are getting cheaper people, there may yet be hope they'll be affordable before you buy your next machine.

Intel has announced two new solid state disk drives made on its leading-edge 34nm process. The two new SSDs are X25M SATA parts weighing in at 80GB and 160GB, and they're meant to replace Intel's existing X25M drives in those capacities, but at 60 percent less cost and with better performance. The 80GB X25-M is $225 in lots of 1,000 (down from $595), and the 160GB is $440 (from $945). That's some serious discounting, and it may well drive even more SSD uptake in the coming quarters despite the ongoing IT spending crunch.

So what do you get for 60 percent less? In a word, speed. The new drives boast a 25 percent reduction in read latency, which was already about 60x the speed of an average hard disk; write performance has also doubled with this new generation.


8. EFF's New Lawsuit, and How the NSA is Into Social Networking
Spoiler
http://arstechnica.com/tech-policy/news/2009/07/effs-new-lawsuit-and-how-the-nsa-is-into-social-networking.ars
A sensationalist headline, to be sure, but it's good to know the EFF is watching our backs...

The government could be building a giant map of social networks using Facebook and Twitter, scraping MySpace pages, or mining the metadata associated with cellular phone calls in order to look for communication patterns. On the other hand, all of that computer power that the NSA is aggregating at the datacenters that are coming online could just be for the limited purpose of snooping voice calls and e-mail coming into and out of the US, but such narrow use is unlikely.

What the NSA is doing with its massive and growing capabilities is still a secret, but it's probably an extension of DoD efforts at mapping social networks that extend back to the early part of the decade. A new EFF lawsuit filed this week could finally shed at least a little more light on the nature of these classified activities, so that we can know for sure whether some descendent of John Poindexter's Total Information Awareness program lives on at the NSA.


9. Hackers Scoffing at IPhone 3GS' Hardware Encryption
Spoiler
http://www.engadget.com/2009/07/24/hackers-scoffing-at-iphone-3gs-hardware-encryption/
Looks like the encryption offered in the iPhone 3GS isn't really encryption at all.

There were other features taking higher billing in the iPhone 3GS' announcement than its hardware-level encryption -- hell, even the magnetic compass was getting more play -- but it's there, and Apple's actively marketing the bit-scrambling capability to enterprise clients. Problem is, hackers are apparently having a field day with it, rendering it useless in all but name.


10. [NSFW] Saturday Night Live - Cork Soaker
Spoiler
http://www.143pinoy.com/watch/saturday_night_live_cork_soaker
Don't know how many of you will have seen this -- but oh-my-god so funny.

onion.jpg



Ehtyar.

232
Living Room / Re: Post Your Funny Videos Here [NSFW]
« on: July 23, 2009, 06:24 AM »
Loved the PSAs app!!!

Ehtyar.

233
Developer's Corner / Re: Hidden Features Series
« on: July 22, 2009, 09:30 PM »
YVW Eóin :)

ROFL Tin Man, great laugh :D I see you managed to find a healthy middle ground there, thanks for the $1 cody currency ;)

Ehtyar.

234
Developer's Corner / Hidden Features Series
« on: July 22, 2009, 07:42 PM »
A series of threads has been started on StackOverflow that I think every coding nerd/geek at heart would greatly enjoy reading. They're basically just a list of all the unusual and underused features of various languages for people to preuse. They exist for the following languages currently:

A few of my favorites:
C++c++.jpgc++2.jpg
Cc.jpgc2.jpg
HTMLhtml.jpghtml2.jpg
JavaScriptjs.jpgjs2.jpg
Perlperl.jpgperl2.jpg
PHPphp.jpgphp2.jpg
Warning: As someone who is familiar with almost all of these languages, I will warn you: you can spend a lot of time reading these. Also, keep in mind you have a daily vote limit of 30 :-[

Ehtyar.

235
Living Room / Re: a box arrives and out pops Baby Cody
« on: July 21, 2009, 09:23 PM »
*applause applause*

Ehtyar.

236
Living Room / Re: Apollo conspiracy's doom
« on: July 20, 2009, 07:10 AM »
Nor how they got the cameras to operate so well under the conditions on the moon...

Ehtyar.

237
Living Room / Tech News Weekly: Edition 29-09
« on: July 19, 2009, 04:56 AM »
The Weekly Tech News
TNWeekly01.gifHi all.
Enjoy :)
As usual, you can find last week's news here.


1. Oz Cops Turn to Wardriving to Fight Wi-Fi 'jackers
Spoiler
http://www.reghardware.co.uk/2009/07/17/oz_plod_wardriving/
In an apparent plea for some meaningful work, police officers in the Australian state of Queensland will soon commence searching for unsecured wireless networks in city suburbs, warning residents at risk of attack.

Police in the Australian state of Queensland are to go on the hunt for unsecured wireless networks.

Claiming that "the crooks are out there driving around trying to identify these [open] networks", Queensland Police Detective Superintendent Brian Hay told local site ITnews that the Boys in Blue will now do the same.

Folk found to be in possession of an un-WEPed WLAN will be warned of the dangers they face, as will wireless router owners who enabled security but retained the default password.


2. Clever Attack Exploits Fully-patched Linux Kernel
Spoiler
http://www.theregister.co.uk/2009/07/17/linux_kernel_exploit/
While I find this headline to be outrageously sensationalist, this is an interesting story. Due to the way a certain optimization procedure is performed by gcc, pieces of the Linux Kernel have become vulnerable to null pointer dereference bugs. Devs, remember to check for NULL *before* assignment...who knew?

A recently published attack exploiting newer versions of the Linux kernel is getting plenty of notice because it works even when security enhancements are running and the bug is virtually impossible to detect in source code reviews.

The exploit code was released Friday by Brad Spengler of grsecurity, a developer of applications that enhance the security of the open-source OS. While it targets Linux versions that have yet to be adopted by most vendors, the bug has captured the attention of security researchers, who say it exposes overlooked weaknesses.


3. Facebook 'breaches Canadian law'
Spoiler
http://news.bbc.co.uk/2/hi/americas/8155367.stm
It looks as though someone has finally found the balls to question Facebook on the way it handles user data (read: keeps user data forever).

An investigation by Canada's privacy commission found the US-based website also gave "confusing or incomplete" information to subscribers.

Facebook says it is aiming to safeguard users' privacy without compromising their experience of the site.

More than 200 million people actively use Facebook.

They include about 12 million in Canada, more than one in three of the population.


4. Why Amazon Went Big Brother On Some Kindle E-books
Spoiler
http://arstechnica.com/tech-policy/news/2009/07/amazon-sold-pirated-books-raided-some-kindles.ars
Discussion started by nosh: https://www.donationcoder.com/forum/index.php?topic=19218.0
Kindle users who had purchased copies of George Orwell's 1984 or Animal Farm found via email that their purchases were being refunded, then upon connecting to Amazon with their Kindles, found the books were automatically deleted.

Amazon.com shocked customers yesterday when it reached out to hundreds, if not thousands of Kindles and simply deleted texts that users had not only purchased, but had started to read. A literary coitus interruptus, Amazon spoiled the readers' descent into Orwellian masochism with nary a warning or apology.

Sometime on Thursday, users had an eerie feeling that they were being watched, receiving emails stating that their purchases were being refunded. When they connected to the Kindle's WhisperNet, the purchases in question were automatically deleted. Some could only wonder: how often could this happen? Perhaps the Thought Police Amazon Customer Service team could cut off your books whenever they wanted to.


5. Mozilla Design Challenge Showcases New Browser Tab Concepts
Spoiler
http://arstechnica.com/open-source/news/2009/07/mozilla-design-challenge-showcases-new-browser-tab-concepts.ars
Discussion started by mouser: https://www.donationcoder.com/forum/index.php?topic=18379.0
The winners of Mozilla's tab improvement challenge have been announced.

Earlier this year, Mozilla's design gurus began exploring the possibility of improving on the principle of tabbed browsing. They launched a discussion about various ways to transcend the limitations imposed by the current tab system.

To encourage broader community participation in this discussion, Mozilla Labs launched a competition and called for designers to submit mockups and concept art that depicted new ideas and interfaces for tabbed browsing. The results of the Summer Design Challenge were announced this week and Mozilla has published the best entries.


6. Researchers To Release Tool That Silently Hijacks EV SSL Sessions
Spoiler
http://www.darkreading.com/security/app-security/showArticle.jhtml?articleID=218500176
Apparently, in much the same manner the regular SSL doesn't mean much anymore, EV SSL is pretty useless as a new MITM attack on EV SSL will be presented at the July BlackHat conference.

If you think you're safe from man-in-the-middle (MITM) attacks as long as you're visiting an Extended Validation SSL (EV SSL) site, then think again: Researchers will release a new tool at Black Hat USA later this month that lets an attacker hack into a user's session on an EV SSL-secured site.

Mike Zusman and Alex Sotirov -- who in March first demonstrated possible MITM attacks on EV SSL at CanSecWest -- will release for the first time their proxy tool at the Las Vegas conference, as well as demonstrate variations on the attacks they have discovered. The Python-based tool can launch an attack even with the secure green badge displaying on the screen: "It doesn't alert the user that anything fishy is going on," says Zusman, principal consultant at Intrepidus.


7. BlackBerry Update Bursting With Spyware
Spoiler
http://www.reghardware.co.uk/2009/07/15/o2_tg01_virus/
BlackBerry users of the Etisalat network in the United Arab Emirates were delivered a software update from their carrier that, when activated, would forward messages to an Etisalat server. It was only noticed thanks to a customer who reverse engineered the update after noticing excessive battery drain due to a glitch.

An update pushed out to BlackBerry users on the Etisalat network in the United Arab Emirates appears to contain remotely-triggered spyware that allows the interception of messages and emails, as well as crippling battery life.

Sent out as a WAP Push message, the update installs a Java file that one curious customer decided to take a closer look at, only to discover an application intended to intercept both email and text messages, sending a copy to an Etisalat server without the user being aware of anything beyond a slightly excessive battery drain.


8. Glitch Hits Visa Users With More Than $23 Quadrillion Charge
Spoiler
http://www.cnn.com/2009/US/07/15/quadrillion.dollar.glitch/index.html
In their haste to create an inflation-poof credit system, Visa apparently forgot to add a sanity check to credit card purchases, charging several customers $23 Quadrillion in a single transation, on top of which went a $15 overdraft fee.

A technical snafu left some Visa prepaid cardholders stunned and horrified Monday to see a $23,148,855,308,184,500 charge on their statements.
Josh Muszynski noticed the 17-digit charge while making a routine balance inquiry.

That's about 2,007 times the size of the national debt.

Josh Muszynski, 22, of Manchester, New Hampshire, was one Visa customer aghast to find the 17-digit charge on his bill. Adding insult to injury, he had also been hit with a $15 overdraft fee.


9. Twitter's Underwear Exposed After Google Apps Hack
Spoiler
http://www.theregister.co.uk/2009/07/15/twitter_hack_exposes_data/
Twitter has yet again trumpeted its immaturity to the world after documents were obtained from a Google Apps breach that held intimate details of the companies financials.

An unidentified hacker has exposed confidential corporate and personal information belonging to microblogging site Twitter and its employees after breaching electronic accounts belonging to several people close to the company.

The episode is the latest reminder that the convenience of cloud-based services that store spreadsheets and other information online cut both ways. While they make it easy to access personal notes from anywhere in the world, they also open up the information to theft - especially when the owners are highly public individuals who didn't take due care to safeguard the data in the first place.


10. Hand in Liquid Nitrogen
Spoiler
http://www.collegehumor.com/video:1917191
Pretty awesome video explaining how one can put ones hand into a pool of liquid nitrogen and pull it out without causing any harm.

onion.jpg



Ehtyar.

238
If they sold something that wasn't theirs to sell, then I'm not sure that anyone can say that it is wrong for the items to be 'returned' and the money paid back to them.
Utterly disgusting behavior from Amazon.

[rant]
On the other hand...anyone who bought into Kindle probably agreed to some outrageous TOS that they didn't read or understand and are now being bitten in arse by it. Maybe this will cause people to use some common sense before they buy their next gadget.

Ehtyar.

P.S. STOP BUYING PUBLIC DOMAIN WORKS FOR THE LOVE OF GOD!! YOU ALREADY PAID FOR PRIVILEGE OF HAVING YOUR KINDLE, DO YOU REALLY NEED TO PAY TO GET FREE STUFF ONTO IT??
[/rant]

239
I think I could be comfortable with FaviTabs, but I'm not really a fan of the rest. I don't know who they let vote for the users choice...*shudder*

Ehtyar.

240
Git on Windows is still pretty rough around the edges. If you're going to be committing from Windows, I would recommending using a service that supports SVN.

Ehtyar.

241
Living Room / Re: Tech News Weekly: Edition 28-09
« on: July 14, 2009, 07:06 AM »
Fair enough.

Really I'm not sure how the free email services manage to keep a viable business model going after enabling POP3/IMAP/SMTP. Is it possible to have your CompuServe email forwarded to your Gmail/Yahoo account?

Ehtyar.

242
Living Room / Re: Post Your Funny Videos Here [NSFW]
« on: July 13, 2009, 11:58 PM »
Nice one Tin Man  :Thmbsup:

YT - Balls In Your Face

YT - Wii For Christmas

YT - Tetris Jerk

What would this thread be without a few Aussie beer ads:

YT - Big Ad
YT - VB Orchestra
YT - Hahn Bath Bomb

and indeed, without this one:

YT - Achmed The Dead Terrorist

Ehtyar.

243
Living Room / Re: Tech News Weekly: Edition 28-09
« on: July 13, 2009, 03:53 PM »
CompuServe isn't exactly gone.  It's changed into another Webmail system, i.e. supply your own ISP instead of using CompuServe itself.  There's no option for POP3 that I can see, which is a pity as most of the alternatives I've tried do have POP3.
That's gone if you ask me, they're just letting everyone keep their email addresses (assuming someone somewhere still holds one).

Ehtyar.

245
Living Room / Re: Tech News Weekly: Edition 28-09
« on: July 12, 2009, 07:31 PM »
Thanks guys :)

Ehtyar.

246
Living Room / Tech News Weekly: Edition 28-09
« on: July 12, 2009, 05:05 AM »
The Weekly Tech News
TNWeekly01.gifHi all.
Enjoy :)
As usual, you can find last week's news here.


1. Boffins Guess Social Security Numbers Via Public Data
Spoiler
http://www.theregister.co.uk/2009/07/07/ssn_guessing_algorithm/
http://arstechnica.com/tech-policy/news/2009/07/social-insecurity-numbers-open-to-hacking.ars
I don't imagine it's quite as easy as it sounds, but it looks like making SSNs the defacto form of identification it is now has come back to bite the US in the backside. Take heed rest of the world.

Predicting a person's social security number is a lot easier than previously thought, according to new scientific research that has important implications for identity theft.

Armed with publicly available information about where and when an individual was born, researchers from Carnegie Mellon University were able to guess the first five digits of a SSN on the first try for 44 percent of people born after 1989. The success rate balloons to as high as 90 percent for individuals born after 1989 in less populous states such as Vermont. Success rates also rise when the researchers got more guesses. The first five digits for six of 10 SSNs can be identified with just two attempts.


2. Apache Attacked by a "Slow Loris" (Thanks 40hz)
Spoiler
http://lwn.net/Articles/338407/
This story has been floating around for a while, and I've been dismissing it, but it's now pretty apparent that Apache aren't interested in doing anything about, and since Hertz Man brought it to my attention I thought it was worth posting. Apache is vulnerable to an attack vector that would allow an attacker to effectively DoS a server with only a single moderate-speed connection.

The slow loris is an exotic animal of southeast Asia that is best known for its slow, deliberate movements. This characterizes the technique used by a new Denial of Service (DoS) tool that has been named after the animal. Slowloris was released to the public by security researcher "RSnake" on June 17. Unlike previously utilized DoS methods, slowloris works silently. Still, it results in a quick and complete halt of the victim's Apache web server.


3. Teen Cuffed for Bomb Threat Webcam Pay-per-view
Spoiler
http://www.theregister.co.uk/2009/07/09/swatting_indictment/
In a story that makes you wonder what they're cutting the hard stuff with these days, a US 16 year old has been arrested for making prank calls to trigger an emergency response, then charging people to observe via live webcam feed.

A North Carolina teenager has been arrested and accused of phoning in bomb threats to schools and universities so he could charge admission for people to watch in real time over webcams as police responded.

Ashton C. Lundeby, 16, of Oxford, North Carolina took part in a group that used VoIP, or voice over IP, software and online gaming services to pull off the public stunts, which attracted hundreds of spectators, according to documents filed in federal court in Indiana Wednesday. Lundeby made bomb threats against 13 colleges or schools from the middle of 2008 through early March, prosecutors allege.


4. US [And Korean] Websites Buckle Under Sustained DDoS Attacks
Spoiler
http://www.theregister.co.uk/2009/07/08/federal_websites_ddosed/
http://news.bbc.co.uk/2/hi/asia-pacific/8142282.stm
I'm not aware of any apparent relation between these two attacks, but it seems the US and Korea are both suffering prolonged DDoS attacks against several high importance sites.

Websites belonging to the federal government, regulatory agencies and private companies have been struggling against sustained online attacks that began on the Independence Day holiday, according to multiple published reports.

At time of writing, most of the targets appeared to be afloat. Nonetheless, several targets have buckled under the DDoS, or distributed denial of service, attacks, which try to bring down a website by bombarding it with more traffic than it can handle. FTC.gov was experiencing "technical issues" on Monday and Tuesday that prevented many people from reaching the site, spokesman Peter Kaplan said.


5. Antisec Hackers Replace All Imageshack Images
Spoiler
http://www.cgisecurity.com/2009/07/antisec-hackers-replace-all-imageshack-images.html
Given that I never made a claim of objectivity when I started this weekly news cycle, I have no compunction in calling these people absolute scum-of-the-earth douche bags. These absolute scum-of-the-earth douche bags took it upon themselves to use a publicly published exploit to replace all the images on ImageShack to one protesting...public publishing of exploit code. Congratulations on revealing yourselves to be absolute scum-of-the-earth douche bags to the world Anti-Sec.

Thousands (Millions?) of sites img src'ing from imageshack are now displaying this hacked image. Certainly one of the largest pwnages I've seen in a long time. This is also the same group which recently hacked Astalvista.


6. NSA to Build Huge Facility in Utah
Spoiler
http://www.sltrib.com/ci_12735293
http://arstechnica.com/tech-policy/news/2009/07/r2e-nsas-power--and-money-sucking-datacenter-buildout-continues.ars
The NSA are propping up their massive computing infrastutre by building a massive branch in Utah.

Hoping to protect its top-secret operations by decentralizing its massive computer hubs, the National Security Agency will build a 1-million-square-foot data center at Utah's Camp Williams.

The years-in-the-making project, which may cost billions over time, got a $181 million start last week when President Obama signed a war spending bill in which Congress agreed to pay for primary construction, power access and security infrastructure. The enormous building, which will have a footprint about three times the size of the Utah State Capitol building, will be constructed on a 20


7. Goodbye, CompuServe! (We Thought You Already Died)
Spoiler
http://arstechnica.com/telecom/news/2009/07/goodbye-compuserve-we-thought-you-had-already-died.ars
In a blast-from-the-past, AOL has announced it is (finally?) killing off CompuServe, a company familiar to those who used the 'net in its infancy, most of whom probably thought it had been dead for some time...

A little piece of Internet history has now been laid to rest, as CompuServe was shut down for good just before this Fourth of July weekend. After some 30 years of service, CompuServe's new owner has finally pulled the plug, leaving us to reminisce about the days when the Internet was young and we were still using modems whose speed was measured in baud.

Most of us remember CompuServe fondly as one of the main Internet services from the 80s and 90s, and associate it with some of our first dabblings in the online world. Along with Prodigy, CompuServe offered a data connection to people across the globe, a connection that few had previously had at home. It set an early example for companies like AOL and even Apple's eWorld that launched in the early-to-mid 90s.


8. Goldman's Secret Sauce Could Be Loose Online; Markets Beware
Spoiler
http://arstechnica.com/tech-policy/news/2009/07/goldmans-secret-sauce-could-be-loose-online-markets-beware.ars
http://www.darkreading.com/insiderthreat/security/cybercrime/showArticle.jhtml?articleID=218400579
Investment bank Goldman Sachs has had data stolen by an ex-employee that could lead to publication of code that runs their automated trading desk, the heart of their business.

A Russian programmer named Sergey Aleynikov was picked up this past Friday by the FBI for allegedly stealing and passing along code that, if circulating out in the wild, could expose US markets to manipulation and cost Aleynikov's former employer, Goldman Sachs, millions. Bloomberg quotes assistant US Attorney Facciponti saying that "there is a danger that somebody who knew how to use this program could use it to manipulate markets in unfair ways. The copy in Germany is still out there, and we at this time do not know who else has access to it."

So how could a 32MB compressed source code archive pose a threat to markets and to America's most powerful investment bank? The story is actually less complex than it may sound.


9. Google Discloses Plans For New Malware-Resistant OS
Spoiler
http://www.darkreading.com/securityservices/security/app-security/showArticle.jhtml?articleID=218401111
Google has announced it is working on "Chrome OS", an operating system based on Linux that will help protect against common Internet-based attack vectors by building tighter operating-system-level security around the browser.

Google is building its own operating system aimed at eliminating malware problems at the consumer's desktop.

The company late yesterday announced its work on the new Google Chrome OS, a lightweight OS that sits atop a Linux kernel and will run on X86 and ARM chips.

"We are going back to the basics and completely redesigning the underlying security architecture of the OS so that users don't have to deal with viruses, malware," blogged Google's Sundar Pichai, vice president for product management, and Linus Upson, engineering director. "Most of the user experience takes place on the Web."


10. New Live Poll Allows Pundits To Pander To Viewers In Real Time (Thanks mouser)
Spoiler
http://www.theonion.com/content/video/new_live_poll_allows_pundits_to
The ONN has installed a new live polling system that allows panelists to see viewer reaction to their discussion in real-time. Keep your eye on the tracker as the conversation goes on ;)

onion.jpg



Ehtyar.

247
Living Room / Good Video Blogs?
« on: July 10, 2009, 07:25 AM »
Hey all,

I've been enjoying some random video blog posts that have been flying around work lately, and while I didn't enjoy any of them to the point where I'd watch them frequently (they were all one-time funnies) I quite liked the format.

So does anyone have any suggestions on some good video blogs? Naturally I'd be predisposed to enjoy the geekier/nerdier ones, but post anything you like in here for everyone to see :)

Thanks guys, Ehtyar.

248
electronixtar: niiiiice :Thmbsup:

Ehtyar.

249
I can recommend nginx and mongoose. I've had more experience with nginx, and it's quite a widely used, but little known web sever. Let us know what you decide on and if you run into trouble.

Ehtyar.

250
Living Room / Tech News Weekly: Edition 27-09
« on: July 06, 2009, 06:54 AM »
The Weekly Tech News
TNWeekly01.gifHi all.
Not sure if anyone was caught by the bug in which only 3 stories were visible last week, but this should be fixed from now on. Pleeeeease let me know if it happens again, thanks guys.
Sorry for being late people, had a (sober mind you) 21st yesterday. Laser tag is fuuuuuun!!  8)
As usual, you can find last week's news here.


1. Researchers Claim First "Real" Quantum Processor (Thanks 40hz!)
Spoiler
http://www.dailytech.com/article.aspx?newsid=15544
Researchers at Yale University claim that they have created the world's first true quantum processor.

Quantum computing has the potential to easily crack current cryptography systems, simulate chemical and nanochemical quantum systems, and speed up the search for solutions of certain types of math problems called NP Complete problems.  Many have raced to create the world's first quantum processor.

In 2007 D-Wave, a Canadian firm, claimed to have created the world's first quantum computing chip.  Debate about whether the chip is a true quantum computer has raged, while the company has continued to release claims of improved "quantum chips" -- with the latest being a 128 qubit chip.  Researchers, though, are skeptical of these claims.

Now, researchers at Yale University claim that they have created the world's first solid state quantum processor.  The new chip, at the very least is the first processor to be officially reported in a peer-reviewed journal.  The research appears in the journal Nature's June 28 advanced publication listing.


2. Researcher Barred from Demoing ATM Security Vuln
Spoiler
http://www.theregister.co.uk/2009/06/30/atm_talk_canceled/
A less than surprising turn of events has seen a much anticipated presentation at Black Hat pulled from the line-up.

A talk demonstrating security weaknesses in a widely used automatic teller machine has been pulled from next month's Black Hat conference after the machine vendor placed pressure on the speaker's employer.

Juniper Networks, a provider of network devices and security services, said it delayed the talk by its employee Barnaby Jack at the request of the ATM vendor. The talk promised to "explore both local and remote attack vectors, and finish with a live demonstration of an attack on an unmodified, stock ATM," according to a description of the talk pulled from the Black Hat website in the past 24 hours.

"Juniper believes that Jack's research is important to be presented in a public forum in order to advance the state of security," the company said in a statement. "However, the affected ATM vendor has expressed to us concern about publicly disclosing the research findings before its constituents were fully protected. Considering the scope and possible exposure of this issue on other vendors, Juniper decided to postpone Jack's presentation until all affected vendors have sufficiently addressed the issues found his research."


3. Boomerang Attack Against AES Better Than Blind Chance
Spoiler
http://www.theregister.co.uk/2009/07/02/aes_crypto_attacks/
A theoretical attack against Rijndael (AES) has been proposed that could provide a faster alternative to brute force attacks against the algorithm.

Cryptographic researchers have uncovered a chink in the armour of the widely used AES algorithm.

The attacks pose no immediate threat to the security of AES, but they do illustrate a technique for extracting keys that is better than simply trying every possible key combination.

Instead of such a brute force approach, the researchers have derived a technique based on "finding local collisions in block ciphers and enhanced with the boomerang switching techniques to gain free rounds in the middle". Collisions in cryptographic happen when two different inputs produce the same output.


4. Cablevision Remote DVR Stays Legal: Supremes Won't Hear Case
Spoiler
http://arstechnica.com/tech-policy/news/2009/06/cablevision-remote-dvr-stays-legal-supremes-wont-hear-case.ars
The Supreme Court has declined to hear a case brought by the content makers that would prevent the content providers from offering recording services to their customers.

The US Supreme Court this morning refused to hear a final appeal in the Cablevision remote DVR case, thereby bringing the years-long litigation to a close. Despite the continued objections of broadcasters, video providers like Cablevision will be allowed to offer "box less" DVR service to customers.

The central question in the case might seem an arcane one: does it matter where a hard drive lives? Cablevision said no, and prepared to launch a service in which all of the digital video recorder's hardware lived in the cable company's central office. Subscribers would still have to choose which shows to record, how long to keep them for, and when to view them, using their television sets and cable boxes as a front-end to the system. Cable companies would no longer need to service and distribute hundreds of thousands of DVRs to customer homes.

To broadcasters, though, this was an unacceptable blurring of the line between a cable company and a rights holder. In their view, Cablevision had no right to archive and retransmit Their programming at its discretion. They sued.


5. Pirate Bay Sold, to Become More Like Carnival Cruise Lines
Spoiler
http://arstechnica.com/tech-policy/news/2009/06/pirate-bay-sold-going-legit-music-biz-cautiously-optimistic.ars
ThePirateBay has been sold for almost $8 million, and not the kind of people you might think...

The Pirate Bay has been sold—and the new owners plan to make it a legal service that allows "content providers and copyright owners [to] get paid for content that is downloaded via the site."

Global Gaming Factory X AB, a Swedish firm that runs Internet cafes and game centers, plans to buy The Pirate Bay for 60 million kronor, twice the fine that was slapped on The Pirate Bay defendants by a Stockholm court earlier this year.


6. Scientists Find a Black Hole That's "Just Right"
Spoiler
http://arstechnica.com/science/news/2009/07/a-black-hole-that-is-just-right.ars
Typically, black holes are either enormous, or extremely small. Scientists believe they've found one that is somewhere in the middle.

Some black holes are too big. Some black holes are too small. A letter appearing in this week's edition of Nature describes how astronomers may have found one that is just right.

The letter, written by a team of British and French astronomers, does not state that they have found an intermediate mass black hole—one that could be termed just right—but that they have found an object where most other explanations fail to explain its behavior.

The object, 2XMM J011028.1-460421 or (more conveniently) HLX-1, is a source of ultraluminous X-rays near the spiral galaxy ESO 243-49. These X-rays have been postulated to be the product of an intermediate mass black hole, one between 100 and 10,000 solar masses, but to date no candidate object has been widely accepted.


7. New Linux Patch Could Circumvent Microsoft's FAT Patents
Spoiler
http://arstechnica.com/open-source/news/2009/07/vfat-linux-patch-could-circumvent-microsofts-patent-claims.ars
A patch has been applied to the Linux Kernel that could see Linux dodging Microsoft's patent on the FAT filesystem.

Microsoft's recent lawsuit against TomTom, alleging infringement of filesystem patents, has left many questions unanswered about the legal implications of distributing open source implementations of Microsoft's FAT filesystem. A new Linux kernel patch that was published last week offers a workaround that might make it possible to continue including FAT in Linux without using methods that are covered by Microsoft's patents.

The patent dispute erupted in February when Microsoft sued portable navigation device maker TomTom. Microsoft claimed that TomTom's Linux-based GPS products infringe on several of its patents, including two that cover specific characteristics of FAT, a filesystem devised by Microsoft that is widely used on removable storage devices such as USB thumb drives and memory cards. The dispute escalated when TomTom retaliated with a counter-suit, but it was eventually settled in March when TomTom agreed to remove the relevant functionality.


8. China Hits Pause On Mandatory Filtering Software
Spoiler
http://arstechnica.com/software/news/2009/06/china-hits-pause-on-mandatory-filtering-software.ars
Contrary to last week's news report, PC makers shipping their goods to China will not, as yet, be required to ship it with the Green Dam Youth Escort as the Chinese Government has backed off on the requirement that it be shipped with each new PC starting July 1.

The Chinese government has decided to delay the implementation of its controversial client-side filtering software, Green Dam Youth Escort. The deadline for PC makers to preinstall or package the software was originally set for July 1, but it has now been pushed back to an unspecified date.

A representative from the Ministry of Industry and Information Technology (MIIT) confirmed to Xinhua that the deadline had been moved at the request of some computer makers. As a result, the deadline of July 1 won't be enforced for PC makers, though the ministry still plans to provide free downloads of Green Dam for schools and Internet cafes as of that date. "The ministry would also keep on soliciting opinions to perfect the preinstallation plan," wrote Xinhua.


9. Jeff Goldblum Will Be Missed
Spoiler
http://www.colbertnation.com/the-colbert-report-videos/220019/june-29-2009/jeff-goldblum-will-be-missed
For anyone familiar with Australian Mass Media, this won't come as a surprise. For anyone unfamiliar with it...experience the horror...

onion.jpg



Ehtyar.

Pages: prev1 ... 5 6 7 8 9 [10] 11 12 13 14 15 ... 50next