topbanner_forum
  *

avatar image

Welcome, Guest. Please login or register.
Did you miss your activation email?

Login with username, password and session length
  • Monday November 10, 2025, 11:09 pm
  • Proudly celebrating 15+ years online.
  • Donate now to become a lifetime supporting member of the site and get a non-expiring license key for all of our programs.
  • donate

Recent Posts

Pages: prev1 ... 13 14 15 16 17 [18] 19 20 21 22 23 ... 50next
426
Living Room / Re: How to get data from dead flash drive?
« Last post by Ehtyar on March 16, 2009, 05:49 PM »
I've rescued two dead drives in the office since I started working here. My advice is try to mount it on a Linux machine.

Ehtyar.
427
General Software Discussion / Re: Quicktime only available with iTunes
« Last post by Ehtyar on March 16, 2009, 12:01 AM »
Universal Extractor is always the best app for this sort of thing. WinRAR/7-Zip will often work though.

Ehtyar.
428
General Software Discussion / Re: Quicktime only available with iTunes
« Last post by Ehtyar on March 15, 2009, 07:47 PM »
Meh. For me, so long as it works I don't care. Anything to keep QuickTime itself off my machine.

Ehtyar.
429
I do like the sound of that utility rjbull, thanks for recommending it. However, the problem is no longer a problem, as I found the solution. I was complaining about the lack of documentation regarding the Windows console. Perhaps my searching skills failed me, but if you have to resort to guessing the syntax of any language, the documentation is in pretty poor shape.

Ehtyar.
430
General Software Discussion / Re: Quicktime only available with iTunes
« Last post by Ehtyar on March 15, 2009, 07:19 PM »
WHYYY would you both jumping through hoops trying to find an old version of this useless piece of crap when you can use QuickTime Alternative as mentioned by Zeno Systems with your favorite media player? Insanity!!

Ehtyar.
431
General Software Discussion / Re: Official players - What is the big deal?
« Last post by Ehtyar on March 15, 2009, 05:46 PM »
Software that installs additional programs and adware without customer consent is not worth a second chance (Real Player). QuickTime was, and is a bloated, slow piece of junk. It has gained a userbase purely through the same avenues that gave IE a market share: bundling.

I'm perfectly happy with VLC + Real Alternative + QuickTime Alternative. Together, they play any format you care to throw at them.

Futhermore, I'm not into supporting unnecessary proprietary formats. With any luck, those players will eventually become so obsolete that no one will encode to their formats anymore.

Ehtyar.
432
*sigh*, life would indeed be easier if Windows came with a posix-compatible shell or Strawberry Perl, but alas, here I am passing around utilities that others would've had on almost any other operating system. I think, however, that this is a debate for another day.

kalos, would you let us know how it goes please?

Ehtyar.
433
Living Room / Re: Tech News Weekly: Edition 10-09
« Last post by Ehtyar on March 15, 2009, 02:36 PM »
Wow, what did I do wrong in this week's news that last week's is still getting all the attention? :P

I agree that the judge in No 2 is a dickhead (you may have said it more eloquently...) but I find it disconcerting that he manage to justify that order, whether it is overturned on appeal or not.

Ehtyar.
434
Developer's Corner / Re: Cross-platform Coders Editor
« Last post by Ehtyar on March 15, 2009, 05:04 AM »
Well, it looks like jEdit, of all apps, is winning at the moment, gvim was just too far outside my comfort zone. I probably haven't explored it to it's fullest yet, but it seems like Notepad++ with proper regex and more powerful macros to me. The only thing that bugs me is that you can't select lines of text from the gutter, and from a feature request I read that won't be happening at all due to a conflict it would cause with the way code folding works (ironically I don't use code folding at all, though I probably should). Anyway, I'll keep this thread updated if my path changes.

Ehtyar.
435
I really don't see how many could possibly argue against Microsoft including a run-once utility with Windows that lets you choose a browser to download, install and use. And just to dispense with this crap about common controls, wininet, mshtml etc being a part of IE...why are those components a part of IE when they could exist just as well (many may argue better) without it? Not to mention, the whole Windows Update infrastructure could operate entirely independent of IE if Microsoft simply let you run the automatic update applet manually (this is only an issue in XP of course).

The simple, unfortunate fact is, none of these possibilities will ever come to pass.

Ehtyar.
436
Living Room / Re: WIkileaks: My Life In Child Porn
« Last post by Ehtyar on March 14, 2009, 11:12 PM »
That repetition appears in the original article. It is only one paragraph (not an entire quote). I'll remove it. Thanks ewe.

Ehtyar.
437
Living Room / WIkileaks: My Life In Child Porn
« Last post by Ehtyar on March 14, 2009, 10:11 PM »
An anonymous individual recently posted this account of his/her involvement in the child pornography industry to the public. The account was not in english, but has since been translated and posted to Wikileaks. It has revealed a wealth of information to the general public about the inner workings of child pornography as an industry/business model.

This thread should be about the technical aspects of this story only, with no political or personal undertones. As such, I've made quotes of the more technical portions below. It is a long account, but I encourage everyone to read the quotes made here (the 3rd one in particular), and those of you with stronger personal conviction to read the entire article (via: Schneier on Security).

As the Internet age in the '90s began, pictures were initially exchanged via specific NNTP newsgroups.
...
In addition to NNTP, forums emerged as a social meeting place and as a means to exchange plenty of files and links. From 2002 LS Studios was founded - a group of Ukrainian businessmen and professional photographers.
...
The models were even recruited through TV and newspaper ads. The photo quality and professionalism exceeded anything previously published. LS Studios published over half a million images and hundreds of videos on dozens of websites. In 2004, under the pressure of and with the help of the FBI, LS Studios was closed. The prosecution was discontinued and there was no one convicted.

As the real Internet business emerged in the late 90s, it was very easy to enter into this business. I remember the people of Site-Key.com from St. Petersburg that did much business in 2000. They had a Delaware Corporation in the United States, a Visa and MasterCard merchant account with Card Service International in California, and they ran all the payments via the U.S. through a gateway link from Linkpoint. But there were not only Site-Key but still a lot of other vendors. One of them provided services particularly for the distributors of hardcore child pornography.
...
This second company (IWest) had their headquarters in Israel and did their billing through Israeli banks which were aware of the scheme (until Visa withdrew the license from some Israeli banks, some have even settled for CCBill for whom it did not matter what was paid for, the main focus being that money was moving. Some Russian / Israeli citizens were never particularly choosy...). There was no problem to bill for any kind images, and the hosting of nude images was not a particular problem for these companies - let alone for the Non Nude Models. At this time almost 100% of the websites were hosted in the United States because it was the only place where it was affordable. The Web sites have generated such traffic, that a human being can hardly imagine how big the interest really is. I have the 2001 statistics of a website containing naked pictures of children and adolescents. During the month of June 2001, a total of 200 million visits to the site took place (this is not page views, but unique visitors but on a daily scale - it is likely that a good part of visitors this month visited the site on many days and have been counted multiple times. My estimate is that there were about 15 million unique visitors during this month). The ratio between visitors and buyers, however, is very small. The same site in June 2001 a turnover of approximately U.S. $ 60,000 made at a price of about $ 30 which is approximately 2000 customers.

An essential part of today's commercial child pornography is now hosted in Germany and distributed from Germany. If this is for you a shock, then I will explain how this works, and the authorities can do absolutely nothing except for the stupid ideas people muck:

Today's schemes are technologically very demanding and extremely complex. It starts with the renting of computer servers in several countries. First the Carders are active to obtain the credit cards and client identities wrongfully. These data are then passed to the falsifiers who manufacture wonderful official documents so that they can be used to identify oneself. These identities and credit card infos are then sold as credit card kits to operators. There is still an alternative where no credit card is needed: in the U.S. one can buy so-called Visa or MasterCard gift cards. However, these with a certain amount of money charged Visa or MasterCard cards usually only usable in the U.S.. Since this anonymous gift cards to buy, these are used to over the Internet with fake identities to pay. Using a false identity and well-functioning credit card servers are then rented and domains purchased as an existing, unsuspecting person. Most of the time an ID is required and in that case they will simply send a forged document. There is yet another alternative: a payment system called WebMoney (webmoney.ru) that is in Eastern Europe as widespread as PayPal in Western Europe. Again, accounts are opened with false identities. Then the business is very simple in Eastern Europe: one buys domains and rents servers via WebMoney and uses it to pay.

As soon as the server is available, a qualified server admin connects to it via a chain of servers in various countries with the help of SSH on the new server. Today complete partitions are encrypted with TrueCrypt and all of the operating system logs are turned off. Because people consider the servers in Germany very reliable, fast and inexpensive, these are usually configured as HIDDEN CONTENT SERVERS. In other words, all the illegal files such as pictures, videos, etc. are uploaded on these servers - naturally via various proxies (and since you are still wondering what these proxies can be - I'll explain that later). These servers are using firewalls, completely sealed and made inaccessible except by a few servers all over the world - so-called PROXY SERVERs or FORWARD SERVERs. If the server is shut down or Someone logs in from the console, the TrueCrypt partition is unmounted. Just as was done on the content servers, logs are turned off and TrueCrypt is installed on the so-called proxy servers or forward servers. The Russians have developed very clever software that can be used as a proxy server (in addition to the possibilities of SSL tunneling and IP Forwarding). These proxy servers accept incoming connections from the retail customers and route them to the content Servers in Germany - COMPLETELY ANONYMOUSLY AND UNIDENTIFIABLY. The communication link can even be configured to be encrypted. Result: the server in Germany ATTRACTS NO ATTENTION AND STAYS COMPLETELY ANONYMOUS because its IP is not used by anyone except for the proxy server that uses it to route the traffic back and forth through a tunnel - using similar technology as is used with large enterprise VPNs. I stress that these proxy servers are everywhere in the world and only consume a lot of traffic, have no special demands, and above all are completely empty.

Networks of servers around the world are also used at the DNS level. The DNS has many special features: the refresh times have a TTL (Time To Live) of approximately 10 minutes, the entries usually have multiple IP entries in the round robin procedure at each request and rotate the visitor to any of the forward proxy servers. But what is special are the different zones of the DNS linked with extensive GeoIP databases ... Way, there are pedophiles in authorities and hosting providers, allowing the Russian server administrators access to valuable information about IP blocks etc. that can be used in conjuction with the DNS. Each one who has little technical knowledge will understabd the importance and implications of this... But what I have to report to you is much more significant than this, and maybe they will finally understand to what extent the public is cheated by the greedy politicians who CANNOT DO ANYTHING against child pornography but use it as a means to justify total monitoring.

But how, specifically, child pornography is sold? As the operators cannot resort to door to door knocking and market their sites this way, they had to work out other ways to sell. There used to be links in forums, toplist, advertisements in newsgroups, etc. Today, the answer is SPAM. The revenue from the child porn business are divided into 40-60% for the payment processor and the bank (percentage rate will depend on how hard the material is), 20% of the operator and 20% of the marketers (in this case, spammers). Spammers use millions of email addresses of interested people - the lists of earlier payment processors they have. But hackers have also obtained huge client lists of large companies and sold the email addresses to spammers.In order to send spam trojan-infected (zombie) computers are used. But zombie computers have yet another use: it will be used in a targeted fashion to steal identities. They even use the computer of the user whose identity is stolen to conduct credible transactions such as purchase of domains, etc. But that is not everything: the installed Trojans are sometimes used as a SOCKS proxy to upload CP. The Russians have even worked out a schema to use infected computer as a network combing these infected computers (each computer would be part of a huge, redundant cluster) as a kind of huge, distributed and remote servers can be (a kind of Freenet Project, however, by using infected computers as the nodes). I want to make one thing clear: if you have an email address, there is a possibility that there is child pornography on your computer because you have received CP advertising. And if your computer is not 100% safe against Trojans, viruses and rootkits, there is the possibility that your computer is part of the vast child pornography network.

Same as for the content servers, logging is turned off on the proxy and forwarding servers, residing in Truecrypt containers. The Russians have developed very clever software for proxy servers (in addition to the possibility of SSL tunneling and IP Forwarding). This proxy accepts incoming connections from the customers which are then tunneled to the Content Server in Germany - completely anonymous and unidentifiable. The link can even be configured for encryption. Result: the server in Germany NEVER APPEARS PUBLICALLY AND STAYS completely anonymously because he never appears with its IP except to the proxy servers that are configured to send the traffic back and forth like through a tunnel - using similar technology like large enterprise VPNs. I stress that this proxy servers are installed everywhere in the world and only consume a lot of traffic, have no special demands, and above all are completely unused.

At the DNS level there also is a network of servers around the world. The DNS has many special features: the refresh times have a TTL (Time To Live) of approximately 10 minutes, the entries usually have multiple IP entries in a round robin procedure, and at each request rotates the visitor to any of the forward proxy server. But the real specials are the different zones of the DNS with extensive GeoIP databases linked to it ... Also, there are pedophiles in authorities and hosting providers, allowing the Russians server administrators access to valuable information about IP blocks that was built into the DNS database. For everyone with a little technical knowledge it is extremely important to understand the implications of this... But what I will have to report is much more significant than this, and maybe they will finally say to what extent the public is being twitted and cheated by the greedy politicians against child pornography that can not do anything about it, but make into the means to an end, justifying State surveillance.

...

In recent years I have watched as authorities - due to a lack of knowledge (and motivation) - and judges (due to ignorant shirtsigtedness) have wrongly suspected and very often also convicted thousands of people. There were fathers destroyed, families ruined, and people event committed suicide. Masses of accused people have even admitted guilt (although innocent) in order to avoid public humiliation in a court and additional damages resulting from it. One of the first big story was the alias of Landslide Operation Ore case. Allegedly 70,000 users had purchased child pornography from Landslide. The only ones that were really pleased were the Russians. Landslide had nothing to do with child pornography. But because Landslide developed a portal where also money was transferred, the Russian operators had opened accounts frequently and then tried to sell child pornography under these accounts. The manager of Landslide was extremely naive and did not have enough control over the accounts, payment processing and fraud. He did not notice that several credit cards were charged more than once, that client IPs did not match with the issuing bank, etc. - the CEO of Landslide was himself the victim of a gigantic fraud. The fact is that the CP operators had made a deal with the Russian Carders who got their credit cards and identities from the U.S. mafia (more specific information is given in the accompanying article from PC Pro). Under these CP accounts thousands of scammed and stolen (with the help of a trojan) credit cards were used so they brought the company Landslide insane revenues. But they were all stolen credit cards. Since it was already too late for Landslide and for thousands of innocent people, this meant the end of family life, loss of employment and even the end of any hope that led to a subsequent suicide. Much worse is that the U.S. police manipulated the website of Landslide AFTERWARDS (this is best described in PCPro).

But it gets worse: the New York state prosecutor Cuomo has started negotiations with the private company Media Defender (Anti-P2P Piracy Solutions) in California to look for people that exchange child pornography via the P2P networks. The aim, therefore, is to give the task of evidence collection and denunciation of Internet users to a company in the private sector. According to U.S. law, the company itself is not allowed to search specifically for child pornography, but this does not bother the U.S. prosecutor - ultimately it is for a good cause, isn't it? Media Defender is also a company with strong connections to film and music industry - it is the same company that pushed the conviction of children downloading music illegally on the Internet.

SOURCE: http://www.wired.com...mediadefender_police

Based on my descriptions so far it should be clear to anyone sensible reading this that filtering and censorship make absolutely no sense. The Russians are well-informed about countries such as Denmark and Sweden and know which sites are on the blacklists and how the filtering systems work. A few weeks ago, a strictly secret blocking list appeared on the Internet at: http://scusiblog.org...e_15012009txt.sorted

It is the blacklist of 15 January 2009 from Denmark. As you can see, these lists are very confidential ... If you are looking for child pornography is, you should send the Danish police a thank-you letter for the hot tips. But what is immediately obvious is that this list does not contain only illegal child pornography sites. I have not, of course, checked all domains. Most of these have been defunct since times immemorial (but they are still listed - this will surely make next owner of the domain happy if the domain is ever purchased again). It is worth noting that some sites with flat-chested adult models are blocked. Even some gay sites are listed, or sites that have adult models that look young (even sites participating in a proof-of-age program and operating within the EU). I wonder, therefore, on what legal basis these adult sites with verifiably adult (but young-looking) models are put on the blocklist and even more how the discrimination of these models as adults is justified. Since it is not justifiable, only mendacious arguments can be used: A job for the anti-constitutional Mrs. von der Leyen, Mr. Schaeuble or Schünemann. They use the tax money for this purpose and to pay themselves big fat pensions in the future.

As I have written so far, the whole promotion of child pornography is done via spam (or publisheded list of domains blocked by the police :-). The spam mails sometimes also come with images. Even if you do not read the emails and everything ends up in junk folders there is still the possibility that child pornography images are saved on the hard drive. A different situation is when the computer has become infected and is a zombie - then all doors are, so to speak, open and the computer can even be used for the active dissemination of child pornography. Those who buy child pornography find links in the spam ads - most of them will lead to portals. On these portals, but also in forums and newsgroups, there will be advertisements for security solutions that enable you to evade tracing AND FILTERING. There are commercial offerings for foreign, uncensored DNS servers but also for VPN solutions (eg www.strongvpn.com). In these VPN solutions an encrypted tunnel is established between the client and a server without logs, and under a false identity somewhere in the world - the connection may even go through more countries. Even if the (impossible) suggestion of Mr. Schünemann was implemented, there would be absolutely simple methods to circumvent it. Since Server 2008 Microsoft came out, there is virtualization. There are commercial offers where no child pornography is actually bought but a virtual workstation is a leased on which there is a great gift: a workstation full of videos and files ... The connection can be established very quietly via Windows Remote Desktop or VNC. No files are trasmitted between the computer of the customer and the server - only keyboard commands and screen content - usually in encrypted form and without the slightest trace about what you have viewed. Since the screen of a computer located e.g. in Russia can be displayed on a PC in germany, the customer will automatically bypass any filtering, censorship and surveillance by the German government. Well, the distributors of child pornography can even calmly sell virtual machines - against which Visa and MasterCard certainly will have nothing ... When the customer then connects to the virtual computer, he finds a nice file that is nothing else than a TrueCrypt Container for which he also received the password to open it. The container can also calmly sit on his home computer after transfer and because nobody knows what it is, he remains just a user like millions of others. The Russians have been producing complete solutions for about 4 years. In these case the business will not run dry. But the German government will spend the money of taxpayers and the economy for the irrational and expensive systems.

If you still haven't noticed: Technology is not the solution to child pornography. No filters, no censorship and no total monitoring can change this.
438
Living Room / Re: Tech News Weekly: Edition 11-09
« Last post by Ehtyar on March 14, 2009, 09:54 PM »
I think it's made even funnier by the fact that the scenario it presents is vaguely familiar to most of us in one way or another.

Ehtyar.
439
Living Room / Tech News Weekly: Edition 11-09
« Last post by Ehtyar on March 14, 2009, 09:30 PM »
The Weekly Tech News
TNWeekly01.gifHi all.
No meta-news this week. Enjoy :)
As usual, you can find last week's news here.


1. Russian Youth Organization Cops to 2007 Estonian Cyberattacks (Thanks 40hz)
Spoiler
http://arstechnica.com/security/news/2009/03/russian-youth-organization-cops-to-2007-estonian-cyberattacks.ars
Another: http://www.theregister.co.uk/2009/03/11/russian_admits_estonian_ddos/
A group of young Russian's have claimed responsibility for the cyber attack against Estonia almost two years ago. If the claims are verified, then the question becomes whether or not they were acting autonomously.

In May 2007, the websites of a number of prominent Estonian politicians were attacked and crippled for several weeks. The attacks came at a time when Estonian/Russian relations were already chilly, thanks in part to the Estonian government's plan to move a Russian war memorial statue from the city center and into a cemetery. Ars has covered the issue since the attacks began, including the arrest of an Estonian student last year in connection with the prolonged DDoS siege. The arrest of 20-year-old Dmitri Galushkevich in January, 2008 raised doubts as to whether he was solely responsible for weeks of disruptions. On Wednesday, January 11, the doubters were victorious; comments from Konstantin Goloskokov, a commissar with the Russian youth movement Nashe, has admitted that the group organized and masterminded the Estonian barrage.

The Baltic Business News quotes Goloskokov defending the group's actions as necessary in order to defend Russian interests. "I wouldn't have called it a cyber attack; it was cyber defense," Goloskokov said. "We taught the Estonian regime the lesson that if they act illegally, we will respond in an adequate way." Note that the commissar does not characterize his own group's actions as illegal—on the contrary, it was actually Estonia's fault that it couldn't handle the impact of the DDoS assault. "We just visited the various Internet sites, over and over, and they stopped working... We didn't block them: they were blocked by themselves because of their own technical limitations in handling the traffic they encountered."


2. Obama Administration Declares Proposed IP Treaty a 'National Security' Secret
Spoiler
http://blog.wired.com/27bstroke6/2009/03/obama-declares.html
Another: http://arstechnica.com/tech-policy/news/2009/03/were-not-releasing-acta-docs-says-us-again.ars
The Obama Administration is keeping the details of the so-called 'Anti-Counterfeiting Trade Agreement' a secret under the guise of 'National Security'.

The White House this week declared the text of the proposed treaty a "properly classified" national security secret, in rejecting a Freedom of Information Act request by  Knowledge Ecology International.

"Please be advised the documents you seek are being withheld in full," wrote  Carmen Suro-Bredie, chief FOIA officer in the White House's Office of the U.S. Trade Representative.

The national security claim is stunning, given that the treaty negotiations have included the 27 member states of the European Union, Japan, South Korea, Canada, Mexico, Australia, Switzerland and New Zealand, all of whom presumably have access to the "classified" information.


3. EBay Scammers Work Unpatched Weaknesses in Firefox, IE
Spoiler
http://www.theregister.co.uk/2009/03/08/ebay_scam_wizardy/
Hackers are using the XBL implementation of Firefox and IE to defraud users of eBay and hide their work.

The evil genius behind the eBay scheme managed to pull off what amounts to an XSS, or cross-site scripting, attack that injected forbidden javascript elements stored on third-party websites. That allowed the eBay pages to contain outside email links and other unauthorized code while still evading toolbars designed to detect fraudulent listings.

In addition to injecting a link that automatically prompts users to email the seller at an aol.com address, the scam used a random number generator to change the item number each time the page was loaded. Item numbers are supposed to be unique and are used to report fraudulent listings. Changing the number made it harder for eBay's fraud busters to remove bogus auctions.


4. BBC Botnet Investigation Turns Hacks Into Hackers
Spoiler
http://www.theregister.co.uk/2009/03/12/bbc_botnet_probe/
The BBC has been accused of breaking British cybercrime law after it purchased and used a botnet of ~22,000 nodes to spam its own Hotmail and Gmail addresses, and flood a server of a consenting their party.

BBC Click got its hands on a botnet of 22,000 compromised PCs from an underground forum. It used these machines to send spam to two accounts it had established with Gmail and Hotmail. The programme also used these zombie machines to show how they might be used in a denial of service attack.

After getting permission from security firm Prevx, which commented on camera but did not otherwise participate in the investigation, BBC Click used the compromised machines to flood a backup site run by the security firm with junk traffic.


5. Norway's Public Broadcaster Launches BitTorrent Tracker
Spoiler
http://arstechnica.com/tech-policy/news/2009/03/norways-public-broadcaster-nrk-receives.ars
Norwegian national broadcaster NRK has launched a BitTorrent tracker of its very own to provide its audience with DRM-free television via p2p.

Norway's public broadcaster NRK receives 94 percent of its revenue from a license fee paid by TV-owning households in the country, and it's charged not with making money, but with getting its content in front of as many people as possible. To do that, NRK has just launched its own BitTorrent tracker to distribute its TV shows—DRM-free, of course. NRK takes its distribution mission so seriously that it's even providing subtitle files so that non-Norwegians can translate the shows easily.

Given what the Norwegians have been up to recently, this isn't surprising. NRK started distributing shows via BitTorrent in early 2008 and said that the experiment was a great success. (Canada's CBC did a similar but smaller-scale BitTorrent trial.)


6. SSDs Likely to Help 6.0Gbps SATA3 to Reach Speed Potential
Spoiler
http://arstechnica.com/hardware/news/2009/03/ssds-likely-to-help-60gbps-sata3-to-reach-speed-potential.ars
Solid State Drives may yet help 6 Gbps SATA 3.0 become a reality.

AMD and Seagate have jointly demonstrated the first SATA3 hard drive in public, and are promising compatible chipsets and shipping hard drives by the end of 2009. SATA3 will maintain full compatibility with SATA and SATA2—all current motherboards and drive cables should flawlessly support SATA3 drives, though you'll need a SATA3-compatible chipset in order to take advantage of the new standard's 6Gbps throughput.

In the past, the raw throughput gained by moving from one hard drive standard to another has been relatively unimportant. An announcement that theoretical drive bandwidth had doubled from 1.5Gbps (SATA) to 3Gbps (SATA2) makes for great copy, but anyone familiar with the mechanics of a hard drive knows that standard HDD throughput typically couldn't saturate SATA, much less SATA2. The real benefit of new drive standards has typically come from those features that take second billing—thinner cables, smaller connectors, hot swappability, Native Command Queuing (NCQ), and improved power management.


7. Hypocrisy Or Necessity? RIAA Continues Filing Lawsuits
Spoiler
http://arstechnica.com/tech-policy/news/2009/03/hypocrisy-or-necessity-riaa-continues-filing-lawsuits.ars
Despite an earlier promise to discontinue the practice of filing suit against individual file sharers, the RIAA is continuing to do just that.

When the music labels unearth a file-sharer to prosecute, they apply the thumbscrews gently at first. The accused infringer receives a letter asking him or her to settle, usually for $3,000 to $4,000. That's a lot, but those who don't settle face much worse.

Now, exposing oneself to certain kinds of new music might actually be worth that outrageous fee, but the people that the RIAA fingers generally turn out to have truly execrable taste in music—or perhaps the lawyers simply pluck out horrible songs on purpose to make the legal process as embarrassing as possible.


8. Google's New Behavioral Ads Already Raising Privacy Worries
Spoiler
http://arstechnica.com/web/news/2009/03/googles-interest-based-ads-try-to-address-privacy-worries.ars
Another: http://news.bbc.co.uk/2/hi/technology/7937201.stm
The second half of this headline is a given really with any new Google service. Anyway, it seems Google will now be using all that data it holds on your browsing habbits to deliver targeted advertisements.

Google's newest advertising strategy, behavioral targeting, has finally arrived. The strategy, referred to as "interest-based" advertising, will go beyond current targeted advertising practices and track your Internet usage habits in order to serve an ad that the search giant hopes is better suited for you. This means that, instead of visiting a music site and simply getting music-related ads, you might visit a music site and getting ads for the newest "Cats Meowing Christmas Carols" album—because Google knows you spend 95 percent of your Internet time at Catster.

The company announced today that it's launching a beta test of the interest-based system today on its partner sites and YouTube, eventually allowing other advertisers to join the program in April. Advertisers have long been asking for a way to behaviorally target ads, the company said, but Google also says that it will benefit end-users by showing them ads they're genuinely interested in. "We believe there is real value to seeing ads about the things that interest you," Google's VP of Product Management Susan Wojcicki wrote on the Official Google Blog.


9. Latest Conficker Worm Gets Nastier
Spoiler
http://news.cnet.com/8301-1009_3-10196122-83.html
Another: http://www.darkreading.com/security/vulnerabilities/showArticle.jhtml?articleID=215900041
Conflicker.C has hit the shelves folks. It sports a significantly improved domain generation algorithm and better self-protection mechanisms.

Conficker.C shuts down security services, blocks computers from connecting to security Web sites, and downloads a Trojan. It also is programmed to begin connecting to 50,000 different domains on April 1 to receive updated copies or other malware, as opposed to connecting to 250 domains a day as previous versions are doing, Ben Greenbaum, senior research manager for Symantec Security Response, said on Friday.

The authors of the code are "strengthening their hold on their collection of infected machines at the same time they are attempting to strengthen their ability to control those machines by moving to 50,000 domains," he said.


10. Experts Agree: Giant, Razor-Clawed Bioengineered Crabs Pose No Threat
Spoiler
http://www.theonion.com/content/video/experts_agree_giant_razor_clawed
The Onion is reporting that a fleet of giant crabs could solve a good portion of societies ills.

onion.png



Ehtyar.
440
General Software Discussion / Re: Firefox 3.1 [BETA 3]
« Last post by Ehtyar on March 14, 2009, 07:57 PM »
BETA 3 has been released (as per the modified subject). Ars has an interesting article here that details some interesting things going on at Mozilla. The portable version is available here, see here for instructions on how to run it concurrently with another running instance.

Ehtyar.
441
Well, I now despise Windows for having such a totally sucky console, but I managed to get this working.

As an exercise for myself I compiled GNU grep myself. It required a couple of patched but all-in-all relatively simple. If you're not capable of this yourself, you can get an only slightly outdated binary from UnxUtils (I've included my build in the attached zip). Converting the shell script to batch was a huuuge pain in the ass because (again) the Windows console sucks, and doesn't honor piping symbols in a for loop in the same way it would as a standalone command (you have to enclose your command in parens prior to the >, < or | symbol). God help you trying to find that in Google (I ended up randomly guessing it). Finally, grep on Windows converts CRLF line endings to plain LF (for internal operational reasons), so we need the todos utility to convert them back again.

So here you are, give it a try and let me know how it goes.

Ehtyar.

[edit]
Er...should this not be moved to the coding snack new request forum?
[/edit]

[edit2]
If you have cygwin, you can do this under windows as well.
MSYS will manage it also, minus the enormity of Cygwin.
[/edit2]
442
Post New Requests Here / Re: GIMP script to batch split + rotate TIFF images
« Last post by Ehtyar on March 14, 2009, 03:58 PM »
No probs guys. I ran across it when I started using PHP, ImageMagick does a much better job than GD. The way GraphicsMagick talks itself up is interesting, I can't imagine all their claims can be justified as easily as they're spoken.

Nice job Nod5.

Ehtyar.
443
Post New Requests Here / Re: GIMP script to batch split + rotate TIFF images
« Last post by Ehtyar on March 13, 2009, 05:56 PM »
Perhaps if you supplied a sample image we'd be more able to help you with actual command lines.

Ehtyar.
444
Post New Requests Here / Re: GIMP script to batch split + rotate TIFF images
« Last post by Ehtyar on March 12, 2009, 11:46 PM »
GIMP is not the place for batch image processing. I would recommend you try something like ImageMagick.

Ehtyar.
445
Living Room / Re: Funny song clip about system administrators
« Last post by Ehtyar on March 11, 2009, 04:31 PM »
I only sleep like 7 hours, and I'm even online at work :-\ Can you stay online for longer than 10 minutes next time? :P

Ehtyar.
446
Living Room / Re: Funny song clip about system administrators
« Last post by Ehtyar on March 11, 2009, 12:40 AM »
Thanks Jotolian!!

I love this one from the related content: http://www.youtube.c.../watch?v=_y36fG2Oba0

Ehtyar.

P.S. GET ON IRC JOTOLIAN AFORE I HAVE TO COME AND GET YOU!!
447
I haven't had a single malware issue that wasn't due to a user just clicking "install". That is not IE's fault. IE provides a mechanism which provides great functionality. What we really need, rather than removing IE from Windows, is to educate the userbase so they know better. That is what I do and 9 times out of 10, I never have the same user back for the same problem.
What we really need, is a browser that properly informs users when they're about to install potentially harmful software (AcitveX - should never have been available in the first place), and a provider that's willing to take responsibility for their software (Mozilla anyone?).

Ehtyar.
448
Ray, what is getting IE off going to do? Do you know how many people that would confuse and annoy than it would help anything? Sure us techies would be good to go, but then the average consumer would be raped by companies like best buy and other services which would then charge users for a service call when they cannot "open the internet". Microsoft should be free to include IE in IT's product. They made it a part of the OS and it has proven that a good majority actually enjoy the functionality that this allows.
That would be why Windows still comes with IE Joshua. Though I certainly wouldn't go so far as to say the majority enjoys IE, perhaps a more accurate description would be they find IE adequate for their needs (in many cases simply because it's what they're familiar with or because they're unaware of an alternative). Until of course you end up with malware on your machine thanks to it. There is a reason Firefox's market share is increasing at the rate it is.

Ehtyar.
449
Most of the apps Haller makes available can be run portably without those bogus NSIS launchers which significantly reduce startup times (an example). I also use PStart out of personal preference.

Ehtyar.
450
I'm far more tired of IE itself than of anything Opera has ever done. I don't really care how it's accomplished, getting IE off the Windows platform is a win for everyone IMO.

Ehtyar.
Pages: prev1 ... 13 14 15 16 17 [18] 19 20 21 22 23 ... 50next