topbanner_forum
  *

avatar image

Welcome, Guest. Please login or register.
Did you miss your activation email?

Login with username, password and session length
  • Monday November 10, 2025, 6:44 pm
  • Proudly celebrating 15+ years online.
  • Donate now to become a lifetime supporting member of the site and get a non-expiring license key for all of our programs.
  • donate

Recent Posts

Pages: prev1 ... 10 11 12 13 14 [15] 16 17 18 19 20 ... 50next
351
Living Room / Re: ZDNET: Have we arrived in the post-Windows era?
« Last post by Ehtyar on April 20, 2009, 10:33 PM »
I'm sorry F0d Man, but seriously...I think when someone lists reasons for upgrading, they would be reasons someone somewhere actually gives two craps about (no, that's not meant to be taken literally, but you do get my point). That's not to mention that any improvement in Vista came along with utterly horrifying performance (yeah sure you might not have experienced that, but you can be certain the majority of users did), outrageously high requirements, and constant unnecessary hard disk usage.
[end rant]
Unfortunately, Microsoft still has a strangehold on the PC market, and no one has, as yet, came up with a model that provides enough advantages over Windows, and is a widely known, that the average Joe would consider switching.

Ehtyar.
352
General Software Discussion / Re: Google Chrome - What Will It Take
« Last post by Ehtyar on April 20, 2009, 06:08 PM »
LOL. Sounds good. Petition to have Mozilla bash Chrome on their front page anyone? :D

Ehtyar.
353
+1 for PStart.

Ehtyar.
354
General Software Discussion / Re: Google Chrome - What Will It Take
« Last post by Ehtyar on April 20, 2009, 03:41 PM »
I've used Iron from time to time (i think it's mentioned elsewhere in this thread) but frankly, Chrome just...sucks. I'm pleased that Google released the source of the updater, but I'm disappointed that I have one less thing to bitch about :P

Ehtyar.
355
Ehtyar, thanks for the explanation.  That cleared things up for me.  So it sounds like i would probably use a combination of my regular portable programs, and for ones that aren't portable, hopefully they are on portableApp...like Firefox.
Yep. There are also a lot of instructions on the PortableApps forums for apps that aren't actually built as portable. You can also usually search for an app with "portable" appended (like "FARR portable") and you will find instructions for it.

Ehtyar.
356
PortableApps has several apps available that are not portable by nature. The apps you see there that available as portable by the original authors are there for their integration with the PortableApps menu system.

Personally, I get any portable apps I can from the author, and go to PortableApps where they aren't available. You'll often find that the modifications made by John Haller in his PortableApps can be made without the use of the PortableApps loader, except where the registry is used without option.

Ehtyar.
357
Living Room / Re: GhostNet - The Facts
« Last post by Ehtyar on April 18, 2009, 08:33 PM »
ROFL. By that logic most DC regulars are safe (no offence guys/gals) ;). Still, I'm not sure any of us are quite important enough to be targeted in the first place :P

Ehtyar.
358
Living Room / GhostNet - The Facts
« Last post by Ehtyar on April 18, 2009, 08:09 PM »
In much the same way as they handled Conficker, the mass media have had a field day spreading sensationalism regarding the so-called "GhostNet". For those of you interested in a more factual report, give this and read and let me know what you think.

GhostNet was discovered by a research outfit called Infowar Monitor (IWM), who represent a joint venture between two Canadian entities, the Secdev Group and the Citizen Lab at the University of Toronto to follow the use of cyberspace as a strategic domain. IWM had been working with the Tibetan government in exile, who suspected that their computer network had been infiltrated.

Over the course of a 10 month long investigation, IWM managed to trace infections across 103 countries. GhostNet seems to mark high-profile political and economic targets (known as whaling or spearphishing, as opposed to standard phishing) for infection, accomplishing their goal via social engineering techniques which they use to convince the victim to open an infected email attachment.

During their investigation of GhostNet, IWM determined that the attackers, and the infection itself originated from Chinese IP addresses geographically located on the island of Hainan. It is perhaps worth mentioning that Hainan is home to the Lingshui signals intelligence facility and the Third Technical Department of the Chinese People’s Liberation Army. IWM also determined one of the servers used to coordinate the infection was stationed at a Chinese Government run facility.

The Remote Access Trojan/Tool (RAT) used in GhostNet is known as gh0st. It is open source software, and can be obtained in full with a quick internet search. A machine infected by gh0st RAT can be controlled and/or viewed in almost any manner by the attacker. gh0st RAT is fitted with remote desktop, webcam and microphone monitoring, and keylogging capabilities. gh0st RAT reports back from the infected machine to what's known as "command and control" servers, which send instructions to, and receive data from the Trojan.

In the specific case of GhostNet, the infection is spread via social engineering, which is a method used by potential attackers to gain the trust of the target such that they are convinced to follow the attackers directions. The attackers monitor email or verbal communication between two parties, one of which is already infected thus making said monitoring possible. The attackers monitor the exchanges until an opportunity presents itself for the attackers to pass themselves off as the infected party. At this point, the attackers craft an email to the uninfected party, posing as the infected party, containing material that appears relevant to the original exchange. Attached to the email is (usually) a PowerPoint presentation which, once opened, infects the previously uninfected party with gh0st.

Despite a substantial lack of evidence to implicate the Chinese government in the operation of GhostNet, some reports have taken the standpoint that they are behind it. It could be argued that, given the press this story has received, and the high profile of the victims, that the Chinese Government is perhaps complicit with the acts of those running GhostNet.It is also possible that they're being fed valuable confidential information retrieved via GhostNet. There have been reports of people held in Chinese custody being shown transcripts of private email conversations by Chinese officials. None of these possibilities have, or can be, confirmed.

Sources:
http://en.wikipedia.org/wiki/GhostNet and source reports
http://www.f-secure....rchives/ghostnet.pdf
http://www.cl.cam.ac...s/UCAM-CL-TR-746.pdf
http://en.wikipedia....wiki/Infowar_Monitor
http://en.wikipedia.org/wiki/Ghost_Rat

Ehtyar.
359
General Software Discussion / Re: What are Your Top Tech/Software Podcasts?
« Last post by Ehtyar on April 18, 2009, 07:42 PM »
I know this is old, but great thread guys. Thanks :Thmbsup:

Ehtyar.
360
Living Room / Tech News Weekly: Edition 16-09
« Last post by Ehtyar on April 18, 2009, 06:49 PM »
The Weekly Tech News
TNWeekly01.gifHi all.
Nothing to mention this week, enjoy :)
As usual, you can find last week's news here.


1. EBay Plans Skype Public Listing
Spoiler
http://news.bbc.co.uk/2/hi/business/7999268.stm
http://arstechnica.com/telecom/news/2009/04/four-years-later-skypes-founders-looking-to-buy-back-skype.ars
Just four years after purchasing Skype for US$2.6bn, Ebay is planning an IPO for next year, which could see the original owners regain control of Skype for less than half the price they were originally paid for it.

EBay said Skype was a "great stand-alone" firm but had "limited synergies" with the online auction firm.

When eBay bought Skype for $2.6bn (£1.7bn) in October 2005, many analysts thought the price was too high.

Skype's software lets PC users talk to each other for free and make cut-price calls to mobiles and landlines.


2. PIN Crackers Nab Holy Grail of Bank Card Security
Spoiler
http://blog.wired.com/27bstroke6/2009/04/pins.html
It has come to light that it's now possible hackers to obtain encrypted PIN numbers as they travel between ATMs and banking mainframes and decrypt them, allowing the attackers to make cash withdrawals from ATMs without the use of skimming hardware or cameras.

Hackers have crossed into new frontiers by devising sophisticated ways to steal large amounts of personal identification numbers, or PINs, protecting credit and debit cards, says an investigator.  The attacks involve both unencrypted PINs and encrypted PINs that attackers have found a way to crack, according to an investigator behind a new report looking at the data breaches.

The attacks, says Bryan Sartin, director of investigative response for Verizon Business, are behind some of the millions of dollars in fraudulent ATM withdrawals that have occurred around the United States.


3. Evidence Suggests First Zombie Mac Botnet is Active
Spoiler
http://arstechnica.com/apple/news/2009/04/evidence-suggests-first-zombie-mac-botnet-is-active.ars
http://www.theregister.co.uk/2009/04/16/new_ibotnet_analysis/
The trojan distributed with pirated copies of iWork and Photoshop over bittorrent last year appears to be developing into botnet.

If you let yourself get tempted into installing the pirated versions of iWork or Photoshop CS4 that circulated on Bit Torrent earlier this year, you may have unwittingly turned your Mac into a zombie. Security researchers for Symantec have turned up evidence that these zombie machines are being used to create a Mac-based botnet.

Botnets are used to perform DDoS attacks on systems, gather sensitive personal information, and send out a majority of the spam that clogs up the 'Net. While commonly made out of infected Windows computers, this is the first known attempt to create one from Macs.


4. They're Gone! After Outcry, Time Warner Uncaps the Tubes
Spoiler
http://arstechnica.com/tech-policy/news/2009/04/theyre-gone-after-outcry-time-warner-uncaps-the-tubes.ars
US ISP Time Warner has succumbed to public pressure and stopped their trial of monthly download caps on high speed Internet connections.

Time Warner Cable said repeatedly that it wanted to hear from the public as it expanded its Internet data caps, and the public has roared back its response: metered billing should exist in some non-obscene ratio to cost and to competitors' pricing. In response, TWC will shelve the trials "while the customer education process continues."

The plan to expand the test into North Carolina and New York survived in public for two weeks, and not even TWC's decision to dramatically boost the caps a week into the fracas could stop the anger. Not that the company believes anything about the plan was fundamentally misguided; as CEO Glenn Britt put it today, "There is a great deal of misunderstanding about our plans to roll out additional tests on consumption based billing."


5. The Pirate Bay Verdict: Guilty, With Jail Time
Spoiler
http://arstechnica.com/tech-policy/news/2009/04/the-pirate-bay-verdict-guilty-with-jail-time.ars
The owners of The Pirate Bay bittorrent website have been found guilty of assisting copyright infringement. The Swedish district court handed down a US$3.5 million fine and a year's jail time. It's reported they will appeal the decision.

The Pirate Bay "spectrial" has ended in a guilty verdict, prison sentences for the defendants, and a shared 30 million kronor ($3.5 million) fine. According to the Swedish district court, the operators of the site were guilty of assisting copyright infringement, even though The Pirate Bay hosted none of the files in question and even though other search engines like Google also provide direct access to illegal .torrent files.

These two points formed the basis of The Pirate Bay's defense, but the court found them ultimately unpersuasive in its 107 page verdict. "By providing a site with, as the district court found, sophisticated search functions, easy upload and storage, and a website linked to the tracker," the defendants were guilty of assisting copyright infringement, the court said.


6. Attack Sneaks Rootkits Into Linux Kernel
Spoiler
http://www.darkreading.com/security/vulnerabilities/showArticle.jhtml?articleID=216500687
It appears Linux is vulnerable to kernel memory manipulation via the /dev/mem device. This is not a new attack vector, but code soon to be released will allow attackers to leverage the vulnerability more easily.

Kernel rootkits are tough enough to detect, but a researcher this week has demonstrated an even sneakier method of hacking Linux.

The attack attack exploits an oft-forgotten function in Linux versions 2.4 and above in order to quietly insert a rootkit into the operating system kernel as a way to hide malware processes, hijack system calls, and open remote backdoors into the machine, for instance. At Black Hat Europe this week in Amsterdam, Anthony Lineberry, senior software engineer for Flexilis, will demonstrate how to hack the Linux kernel by exploiting the driver interface to physically addressable memory in Linux, called /dev/mem.


7. Wikipedians to Vote On Creative Commons License Adoption
Spoiler
http://arstechnica.com/open-source/news/2009/04/wikipedians-to-vote-on-creative-commons-license-adoption.ars
Wikipedia participants will soon be able to vote for the adoption of a different license for Wikipedia. The shift from the GNU Free Documentation License to the Creative Commons Atribution Share-Alike License will make reusing content from Wikipedia more permissable.

The Wikimedia Foundation, the organization behind the popular Wikipedia website, has called for the project's contributors to vote on a proposal which calls for the adoption of the Creative Commons Atribution Share-Alike (CC-By-SA) license. This change would lower the barriers for repurposing content from the Internet encyclopedia.

Wikipedia content is currently made available under the terms of the GNU Free Documentation License (GFDL), which was devised by the Free Software Foundation to govern the distribution of technical documentation that was produced by the GNU project. The license was adopted for Wikipedia early in the project's existence. When Wikipedia participants submit content, the editing page currently includes a notice which informs them that they must irrevocably agree to release their contributions under the terms of the GFDL.


8. Microsoft Owns Up to "E74" 360 Errors, Expands Warranty
Spoiler
http://arstechnica.com/gaming/news/2009/04/microsoft-owns-up-to-e74-360-errors-expands-warranty.ars
Microsoft has expended its three-year "red rings of death" warranty to include the well known "E74" error which arose more recently than the red rings, but indicates simply a "general hardware failure".

While Xbox 360 systems may be known more for the dreaded "red ring of death" than any other hardware failure, one gaming blog has been tracking the rise of the "E74" error, an issue that causes the console to crash and show a multi-language kill screen. You'll also get a single red section on your system's power button. Microsoft is aware of the problem, and has since amended it's three-year warranty to cover the error.

The story began when Joystiq started to receive complaints concerning the error. The site decided to gather some data, and found that complaints of the error increased after the release of the New Xbox Experience, or NXE. "One oddity is that there is no correlation between the dates on which the systems in question were purchased and when they went belly up," Joystiq writer Justin McElroy reported. "The error usually occurred after anywhere from 12 to 36 months of use, with many of you claiming that trouble arose on consoles that have already been repaired for Red Ring of Death. Whatever modifications Microsoft has made to the console to improve its reliability in the past years seems to have no bearing on the likelihood of E74."


9. How To Make A Baby
Spoiler
http://www.collegehumor.com/video:1908036
College Humour shows us where babies come from.

onion.png



Ehtyar.
361
General Software Discussion / Re: Google Chrome - What Will It Take
« Last post by Ehtyar on April 18, 2009, 05:29 PM »
I'm posting to begrudgingly credit Google for releasing the source for their Google Updater application which has been one of the primary gripes about using Google Chrome. The build requirements are a bit much, and dissimilar to the requirements to build Chrome, but the source is there for perusal if you're interested.

Ehtyar.
362
Living Room / Re: WIkileaks: My Life In Child Porn
« Last post by Ehtyar on April 18, 2009, 09:17 AM »
You're most welcome nosh. Indeed the social parts of the text almost made him sound like a victim of an unfair system (I suppose you might've expected that given the subject matter), but I found the technical aspects intriguing. Makes you wonder where governments get off recommending Internet censorship.

Ehtyar.
363
Developer's Corner / Re: Python newbie question
« Last post by Ehtyar on April 15, 2009, 05:38 PM »
You're going to need to use a console that at least supports control codes kartal. I did ask if you were using the Windows console to which you did not respond.

Ehtyar.
364
Developer's Corner / Re: Python newbie question
« Last post by Ehtyar on April 15, 2009, 04:03 PM »
kartal, Python's print() automatically appends a newline to each statement. Add a comma to the end of your call to print() to prevent it.

Code: Python [Select]
  1. a=0
  2. while (1):
  3.     a=a+1
  4.     if a>20:
  5.         break
  6.     print str(a)+'\r',

Ehtyar.
365
Developer's Corner / Re: Python newbie question
« Last post by Ehtyar on April 15, 2009, 02:15 AM »
I'm on same version, and it definitely works. Windows console?

Ehtyar.
366
Developer's Corner / Re: Python newbie question
« Last post by Ehtyar on April 15, 2009, 01:42 AM »
I wrote the demo code I posted and tested it myself. What version of Python are you using?

Ehtyar.
367
Developer's Corner / Re: Python newbie question
« Last post by Ehtyar on April 14, 2009, 11:18 PM »
That's certainly true CWuestefeld, but I think in many cases the console is superior when debugging an application.

Ehtyar.
368
Developer's Corner / Re: Python newbie question
« Last post by Ehtyar on April 14, 2009, 12:40 AM »
I apologize in advance to Tin Man for treading on toes.

A little Googling would have found you the answer:
Code: Python [Select]
  1. import time
  2.  
  3. def PrintStatic(a_string=''):
  4.         print '\b%s%s'%(a_string,'\b' * len(a_string)),
  5.  
  6. PrintStatic("1")
  7. time.sleep(5)
  8. PrintStatic("2")
From this ActiveState recipe, comment 4.

Ehtyar.
369
Living Room / Re: Tech News Weekly: Edition 15-09
« Last post by Ehtyar on April 12, 2009, 08:54 PM »
You're absolutely right, that's what's so horrifying.

I believe you are already an honorary member of the tin foil hat brigade ;)

Ehtyar.
370
Living Room / Re: Tech News Weekly: Edition 15-09
« Last post by Ehtyar on April 12, 2009, 08:41 PM »
OH
MY
GOD
How did I not think of that? *crawls in a hole and dies*.

Ehtyar.
371
Living Room / Tech News Weekly: Edition 15-09
« Last post by Ehtyar on April 12, 2009, 03:14 AM »
The Weekly Tech News
TNWeekly01.gifHi all.
Hope you're all having a good Easter :)
As usual, you can find last week's news here.


1. Vandals Slash Silicon Valley Fiber Optic Cable (Thanks 40hz)
Spoiler
http://www.maximumpc.com/article/news/vandals_slash_silicon_valley_fiber_optic_cable
Vandals slashed fiber optic cable in California cutting service to over 50,000 residents and businesses. Some of the lines had previously been declared "National Critical Infrastructure" and AT&T have posted a $100,000 reward for information leading to the arrest of the perpetrators.

Things turned semi-chaotic yesterday in Santa Clara, Santa Cruz, and San Benito counties in California when it was discovered that ten fiber optic cables were purposely cut by vandals. At leaston one of the lines that were cut belongs to AT&T, whose lines were declared national Critical Infrastructure following the September 11, 2001 terrorist attacks. That means whoever is responsible for the vandalism is in violation of both federal and state laws, and to help make sure that they're caught, AT&T is offering a $100,000 reward for information leading to the arrest and conviction of whoever did it.

More than 50,000 landline customers lost service as a result of the cuts, including both residential and business customers, as well as connections for ATMs, internet, and bank card transactions. Hospitals, stores, banks, police and fire departments who rely on 911 calls, computerized medical records, and more were all affected.


2. P2P Eavesdrop 'Guilt by Association Attack' Developed
Spoiler
http://www.theregister.co.uk/2009/04/09/p2p_guilt_by_association_attack_countermeasure/
http://arstechnica.com/tech-policy/news/2009/04/through-bittorrents-randomness-communities-emerge.ars
http://www.physorg.com/news158419063.html
Researchers have found that, although the BitTorrent protocol was designed specifically to prevent it, the possibility of identifying communities of torrenters does exist.

US engineering researchers say they have identified a new privacy threat to users of peer-to-peer (P2P) networks such as BitTorrent and (perhaps) Skype. Obligingly, however, they have freely released a protective plugin designed to work with a popular torrent client.

According to Fabián Bustamante, computer science prof at Northwestern Uni, BitTorrent users - without realising it - form identifiable "communities" over time, in which their computers connect much more often to certain other users' machines.


3. Conficker Botnet Stirs to Distribute Update Payload
Spoiler
http://www.theregister.co.uk/2009/04/09/conficker_botnet_update/
http://arstechnica.com/security/news/2009/04/conficker-self-updates-launches-false-infection-alert.ars
http://www.networkworld.com/news/2009/040909-conficker-cashes-in-installs-spam.html?hpg1=bn
http://news.cnet.com/8301-1009_3-10217386-83.html
http://news.bbc.co.uk/2/hi/technology/7991422.stm
Everyone's getting excited (see above) about the latest Conficker update. The update was distribibuted through Conficker's p2p update mechanism, and downloads additional unwanted software thought to be related to the Storm worm.

The Conficker superworm is stirring, with the spread of a new variant that spreads across P2P and drops a payload. It is thought to update machines infected by earlier strains of the worm.

Conficker-E (the latest variant) offers potential clues on the origins of the worm, because of possible links to other malware. Trend Micro reports that the new Downadup/Conficker variant is talking to servers associated with the Waledac family of malware, in order to download further unwanted items.


4. Court: Congress Can't Put Public Domain Back Into Copyright
Spoiler
http://arstechnica.com/tech-policy/news/2009/04/court-congress-cant-put-public-domain-back-into-copyright.ars
A US Federal Court has ruled that Congress was acting beyond its authority when, in 1994, it put several works back under copyright despite their copyright previously having expired.

In 1994, Congress jammed a batch of foreign books and movies back into the copyright closet. They had previously fallen into the public domain for a variety of technical reasons (the author hadn't renewed the rights with the US Copyright Office, the authors of older works hadn't included a copyright notice, etc.) and companies and individuals had already started reusing the newly public works. Did Congress have the right to put a stop to this activity by shoving the works back into copyright? On Friday, a federal court said no.


5. Shocker: Aussies to Build Own Open-access Fiber Backbone
Spoiler
http://arstechnica.com/tech-policy/news/2009/04/shocker-aussies-to-build-own-open-access-fiber-backbone.ars
The Australian government has announced it will build a national fiber network to deliver high speed internet across the country, with open access to all ISPs. Anyone who hasn't had dealings with Australia's national ISP, Telstra, will tell you this insanity. Anyone who has, mind you, is jumping for joy. Let's see how long it takes them to decide it's too expensive and sell it to Telstra.

In a surprising announcement today, Australia kicked off its AUS$43 billion "National Broadband Network," which it calls the "single largest national-building infrastructure project in Australian history." Not only will the fiber network reach all the way to 90 percent of Australia's homes, but it will also be open access and available for use by any ISP.

The National Broadband Network (NBN) scheme has been progressing for some time, but when we last looked in on it in 2008, it was a fiber-to-the-node plan that would offer Australians 12Mbps minimum connections. It was also going to be built by a private company, but incumbent telcos like Telstra (which was government-owned into the 1990s) quickly began to make noise about the open access rules—such conditions might not offer enough of a return on investment.


6. French "3 Strikes" Law Suffers Shocking Defeat
Spoiler
http://arstechnica.com/tech-policy/news/2009/04/french-3-strikes-law-suffers-shocking-defeat.ars
http://news.bbc.co.uk/2/hi/europe/7992262.stm
In a bit of a political blunder for the French government, their graduated response plan for Internet pirates has been voted down in parliament.

The French certainly have a flair for the dramatic, what with the recent kidnapping of bosses and the near-constant succession of transport and farmers' strikes. Even last night's "graduated response" vote featured its share of parliamentary theatrics, as the controversial Création et Internet law went down to a shocking 21-15 defeat.

That's right—"three strikes" has struck out in France. At least for now.


7. Sun Holds Its Breath But Doesn't Turn Blue
Spoiler
http://www.linuxinsider.com/story/66737.html
Sun's stock price took a dive when it announced it had declined IBMs offer to purchase it for $US7 billion.

Sun Microsystems has rejected IBM's offer to acquire it for US$7 billion, a move that took the tech industry by surprise and sent Sun stock plummeting.

Speculation is rampant as to why Sun Microsystems spurned the offer -- a move critics view as downright foolish in this economy -- as well as what the two companies may do next, and who else might have pockets deep enough to take IBM's place at the negotiating table.


8. Worm Infiltrates Twitter
Spoiler
http://news.cnet.com/8301-1009_3-10217681-83.html
A virus is apparently infecting Twitter profiles after StalkDaily.com was allegedly infected. Users are being urged to steer clear of the site.

A worm apparently infected Twitter on Saturday.

The worm may originate with the StalkDaily.com site, and Twitter warned people against visiting the site or linking to it.

"If you have been locked out of your acct due to the StalkDaily issue, pls do a p/w reset; we may have reset your p/w for safety," Twitter informed its users on Saturday afternoon.


9. Study: Children Exposed to Pornography May Expect Sex to Be Enjoyable [NSFW]
Spoiler
http://www.theonion.com/content/video/study_children_exposed_to
The Onion is reporting that a study has found that children exposed to pornography may mistakenly expect sex to an enjoyable experience.

onion.png



Ehtyar.
372
Living Room / Re: Conficker - The Facts
« Last post by Ehtyar on April 10, 2009, 10:34 PM »
Indeed. This part I don't quite understand though. It seems like a poor choice of avenues to make money, and for anyone on their toes it completely reveals the infection. I expected them to try spamming or something.

Ehtyar.
373
Living Room / Re: Conficker - The Facts
« Last post by Ehtyar on April 10, 2009, 05:05 PM »
I am getting timeouts / "...cannot display web page".
Could be my security software/settings... trying to determine.
Thought I would confirm the links were valid first.

that itself might be a sign of Conficker infection.. the fastest way to check for infection is to get Sysinternals' "Process Explorer" and try to run it on your PC. Conficker would shut it down immediately, though it allows Windows' Task Manager.
Of course if you're infected, you won't be able to get to Microsoft.com...

Ehtyar.
374
Living Room / Re: Conficker - The Facts
« Last post by Ehtyar on April 09, 2009, 07:14 AM »
Indeed. CNET has slightly more information here, but the lack of available information is pretty staggering really. Once I learn more I'll post an update.

Ehtyar.
375
Living Room / Re: new programmer possibly
« Last post by Ehtyar on April 09, 2009, 12:43 AM »
iPhone dev does require using Apple's Mac OS X operating system and knowledge of the Objective-C programming language. You also need the iPhone SDK from Apple, which is a free 1.7 GB download, though to put apps on the store will set you back USD$99.

As for where to where to start with programming, there are many threads already on this which can be located using the search function, although most of the regulars are more than happy to have the discussion again.

Good luck :Thmbsup:

Ehtyar.
Pages: prev1 ... 10 11 12 13 14 [15] 16 17 18 19 20 ... 50next