topbanner_forum
  *

avatar image

Welcome, Guest. Please login or register.
Did you miss your activation email?

Login with username, password and session length
  • Tuesday November 11, 2025, 12:29 am
  • Proudly celebrating 15+ years online.
  • Donate now to become a lifetime supporting member of the site and get a non-expiring license key for all of our programs.
  • donate

Recent Posts

Pages: prev1 ... 17 18 19 20 21 [22] 23 24 25 26 27 ... 50next
526
General Software Discussion / Re: WINDOWS 7 THREAD (ongoing)
« Last post by Ehtyar on February 03, 2009, 03:50 AM »
Had they published "Windows Media Player Corrupts Your MP3s", you'd be accusing them of the same. The headline they currently have is the most accurate without being redundant IMO.

Ehtyar.
527
General Software Discussion / Re: Every Site is Unsafe According to Google
« Last post by Ehtyar on February 03, 2009, 03:48 AM »
Surely people around here know better...
Most people around here probably do, but most of us aren't regular users.
Then it's safe to post that tip on here no? :P

I'm fairly confident NoScript will immunize me from active online threats, and suffice it to say I won't be running any PDFs in a javascript enabled reader, or executing a download I didn't initiate etc etc.

Ehtyar.
528
General Software Discussion / Re: Make Firefox 3 load faster
« Last post by Ehtyar on February 02, 2009, 04:00 PM »
IPV6 delaying DNS queries was a known bug in older versions of Firefox. AFAIK is has been fixed for some time.

IMO Mozilla needs a warning when you install addons that warn they may significantly slow Firefox. I'm SOOOO tired of people whining about Firefox being slow, only to discover they're using 50 addons.

Ehtyar,
529
Clipboard Help+Spell / Re: clipboard manager for Palm OS 5?
« Last post by Ehtyar on February 02, 2009, 04:37 AM »
I used ClipPRO on my Tungsten|E for quite some time and was very happy with it.

Ehtyar.
530
Living Room / Re: Tech News Weekly: Edition 05-09
« Last post by Ehtyar on February 01, 2009, 04:09 PM »
My pleasure, as always.

Yeah it's usually bullying by the industry overlords that brings ISPs into the mess. They can't attack every single pirate, so they go after those that provide them with the means to commit it. Very underhanded and a very good way to make a lot of enemies.

Ehtyar.
531
General Software Discussion / Re: Every Site is Unsafe According to Google
« Last post by Ehtyar on February 01, 2009, 01:19 PM »
Surely people around here know better...

Ehtyar.
532
Developer's Corner / Re: The D programming language - an interview with the author
« Last post by Ehtyar on February 01, 2009, 02:05 AM »
I guess they better hurry then, or they'll have to rename it to C++1x :)
That's a good point. Are we to assume that C++0x will be finalized this year?...I think not :(

Ehtyar.
533
Living Room / Tech News Weekly: Edition 05-09
« Last post by Ehtyar on January 31, 2009, 08:24 PM »
The Weekly Tech News
TNWeekly01.gifHi all.
Sorry guys, no funny this week 'coz the Onion videos sucked. If anyone has a place they'd suggest I check please reply.
As usual, you can find last week's news here.


1. Hacking Programmable Road Signs (Thanks Deozaan)
Spoiler
http://news.cnet.com/8301-13772_3-10149229-52.html
We'll start this week's news with a little something light hearted. It seems instrument panels have been left unlocked and default passwords left unchanged on many large roadside electronic billboards which has given rise to Road Sign Hacking.

We see them everywhere these days, digital signs by the side of the road telling us about road conditions or that we should prepare to stop or that our local bridge might be closed next Tuesday from noon to midnight. And if you're like me, you've always just assumed that the message on the signs is legitimate and properly authorized.

But what if the sign, instead of reading something like "Ice Ahead" was flashing the message, "Zombies Ahead"?


2. Hard Drive Manufacturers Back New Disk Encryption Standard
Spoiler
http://arstechnica.com/hardware/news/2009/01/hard-drive-manufacturers-unveil-disk-encryption-standard.ars
The major storage manufacturers have agreed to a standardized form of disk encryption based on 128 or 256 bit AES.

The Trusted Computing Group (TCG) has released three final specifications for hardware-level data encryption, and virtually all the major storage manufacturers have declared that they intend to adopt the new standards in the near future. Self-encrypted disks are already available on the market— Seagate has been actively pushing its DriveTrust technology for several years—but there was no central standard for drive encryption developers to refer to. The two new encryption standards provide a blueprint for desktop, laptops, and enterprise-level protection, while the third (dubbed the Storage Interface Interactions Specification) details how self-encrypted drives should interact with various communication protocols.

These new encryption methods do not require the presence of a Trusted Platform Module (TPM), but it's hard to imagine why an OEM would bother to build a system using self-encrypting hard drives and not include one. The TCG expects self-encrypting drives (and presumably TPM modules) to become ubiquitous across the enterprise/business market over the next few years. "With 48 states and many countries enforcing data protection laws, it has become crucial for enterprises to protect all data to avoid fines, lawsuits or even being put out of business. Encryption with authentication directly in the drive or enterprise storage devices as outlined in the Trusted Computing Group specifications is one of the most effective ways to ensure data is secure against virtual and physical attacks,” noted Jon Oltsik, senior analyst, Enterprise Strategy Group.


3.  CT Legislator Moves to Protect Online Student Speech
Spoiler
http://arstechnica.com/tech-policy/news/2009/01/ct-legislator-moves-to-protect-online-student-speech.ars
In relation to the case of Avery Doninger (here and here) who was denied certain rights at school due to a post on her LiveJournal labeling school administrators "douchebags", a member of Conneticut's General Assembly has proposed laws to spell out the rights of students and educators regarding free speech on the Internet.

Thursday, we checked in on the case of Avery Doninger, the former Connecticut high school student who was barred from seeking reelection to her student council seat after calling school administrators "douchebags" in a LiveJournal post. As we noted, a federal court has ruled that, given the fuzzy state of the law concerning the scope of school authority over online student speech, Doninger can't press her First Amendment claim for damages against those who punished her. She plans to appeal that decision, but one state legislator has already declared his intention to introduce a bill establishing separation of blog and state.

According to the Journal-Inquirer, a local paper, former high school teacher Gary LeBeau, who sits on the state's General Assembly, will seek to create a "bright line" between speech produced on school computers or sent over school networks—which falls within the school's disciplinary purview—and private speech merely concerning the school. The court had found such a line lacking because "
  • ff-campus speech can become on-campus speech with the click of a mouse."


4. Microsoft Asks Open Source Developers to Play in Web Sandbox
Spoiler
http://arstechnica.com/microsoft/news/2009/01/microsoft-asks-open-source-developers-to-play-in-web-sandbox.ars
Microsoft has released its Web Sandbox technology under the Apache License 2.0, enabling its use in open source projects.

Microsoft has announced plans to release the code of its Web Sandbox project under the open source Apache Software License. This move reflects Microsoft's growing interest in contributing to interoperable standards-based Web technologies and also demonstrates the company's willingness to adopt well-established open source licenses for its own projects.

The Web Sandbox project aims to mitigate some of the security risks that are associated with building Web mashups that mix in untrusted content from third-party sources. The task of isolating untrusted code poses some complex technical challenges. Web Sandbox is one of several ongoing research projects that are implementing experimental solutions. It is similar in function to Google's Caja project.


5. "Digital Britain" to Legislate Graduated Response for ISPs
Spoiler
http://arstechnica.com/tech-policy/news/2009/01/digital-britain-will-legislate-graduated-response-for-isps.ars
Britain is preparing legislation that will require ISPs to install a graduated response system to reports of piracy.

The UK has officially announced its intention to legislate a "graduated response" system for P2P copyright infringement, though it sounds remarkably balanced compared to some proposals; the government insists that the "availability of legal content in the forms that consumers want" is actually the most important step content owners can take to address the problem. Disconnection of users without a court order appears not to be on the table, either.

The government's long-awaited interim Digital Britain report has just been released. It's a lengthy document that lays out UK thinking about universal broadband, spectrum reform, and digital radio, but nestled right in the middle of the report is one of the most controversial ideas: a mandatory "code" for ISPs to follow, and the creation of a government "Rights Agency" to help stakeholders deal with the issue of civil copyright infringement online.


6. Gears of War DRM Screwup Makes PC Version Unplayable
Spoiler
http://arstechnica.com/gaming/news/2009/01/pc-gears-of-war-drm-causes-title-to-shut-down-starting-today.ars
In a stunning example of how DRM comes back to bite the legitimate consumer in the proverbial backside, the PC game Gears Of War was rendered unplayable for legitimate owners on the 28th when the certificate used in the registration process expired.

Gamers who tried to play Gears of War on the PC Thursday ran into a slight snag: it seems that the digital certificate that allows the game to run expired on January 28, 2009. Basically that means if you keep your PC's clock up to date, you can no longer play the game. The official Epic forum is ablaze with complaints about this issue, as the still-kicking community becomes enraged.

"I had this problem this evening, I had to change the date and time (from PM to AM) and I am able to get in just fine," one frustrated gamer posted. "I also changed it back to the current date and time and it didn't work. Change it back to yesterday AM and it works fine... EPIC games won't be on my list anytime soon...."


7. Judge's Ruling That WoW Bot Violates DMCA is Troubling
Spoiler
http://arstechnica.com/gaming/news/2009/01/judges-ruling-that-wow-bot-violates-dmca-is-troubling.ars
The popular 'Glider' bot for World of Warcraft was ruled to be a 'circumvention device' under the DMCA and that the founder of the company who produced it was personally liable for the actions of the company.

Blizzard notched another victory in its legal campaign against World of Warcraft bots when a judge on Wednesday ruled that a leading bot violates the Digital Millennium Copyright Act. MDY Industries LLC, the firm that develops and sells the Glider bot, already suffered a major setback last summer when the judge granted Blizzard summary judgment on several key issues. This week's decision deals with the issues the judge believed could not be decided until the conclusion of this month's trial. The judge ruled that Glider violated the DMCA's ban on "circumvention devices," and he also found that MDY's founder, Michael Donnelly, was personally liable for the actions of his firm.

As we've noted before, Blizzard's legal arguments, which Judge David G. Campbell largely accepted, could have far-reaching and troubling implications for the software industry. Donnelly is not the most sympathetic defendant, and some users may cheer the demise of a software vendor that helps users break the rules of Blizzard's wildly popular role playing game. But the sweeping language of Judge Campbell's decision, combined with his equally troubling decision last summer, creates a lot of new uncertainty for software vendors seeking to enter software markets dominated by entrenched incumbents and achieve interoperability with legacy platforms.


8. Meet Son of Storm, Srizbi 2.0: Next-gen Botnets Come Online
Spoiler
http://arstechnica.com/security/news/2009/01/meet-son-of-storm-srizbi-2-0-next-gen-botnets-come-online.ars
I would normally consider stories like this to be sensationalist, but it does include some interesting tidbits about the next generation of botnets.

As notable as the sustained fall-off in spam levels has been, we've all known it's only a matter of time before botnets began to worm their way back into the the Internet. It turns out that part of the reason spam levels may have stayed lower these past months is that the same authors who might have normally spent time resurrecting their dead botnets on new servers were instead writing new botnets altogether. The new malware networks aren't just rehashes of what's come before; many of them incorporate advanced techniques to render themselves harder to detect/remove.

First the good news: SecureWorks reports that Storm is dead, Bobax/Kraken is moribund, and both Srizbi and Rustock were heavily damaged by the McColo takedown; Srizbi is now all but silent, while Rustock remains viable. That's three significant botnets taken out and one damaged in a single year; cue (genuine) applause.


9.  ICANN Tries to Tackle Botnet-friendly Fast Flux Hosting
Spoiler
http://arstechnica.com/tech-policy/news/2009/01/icanns-fast-flux-report-open-for-comments-short-on-data.ars
Domain registrars are concerned about efforts by ICANN to determine what can be done about the use of Fast Flux hosting for illegal purposes.

Fast flux and double flux hosting present both registrars and registrants with a thorny problem. These two hosting methods are not classified as attack methods in and of themselves, but are often employed by spammers and malware botnets.

At "best," fast flux hosting obfuscates and delays security personnel working to shut down an attack; a particularly sophisticated double flux hosting system could allow a botnet to grow and remain active long enough to establish itself as a threat of Storm-worthy proportions. That last mention isn't an accident; fast flux hosting was a prominent Storm tactic.


10. Verizon: We've Been Having a Little Database Trouble
Spoiler
http://arstechnica.com/telecom/news/2009/01/verizon-weve-having-a-little-database-trouble.ars
US ISP Verizon have "lost" 3,400 database records pertaining to customers who chose to opt-out of their marketing campaign.

Verizon seems to have run into a glitch with one of its customer databases, losing thousands of  records. Here's the background: in compliance with Federal Communications Commission rules, the company has established a system to permit consumers to "opt out" of letting Verizon use their phone records for marketing campaigns.

The wireless giant hires a vendor to handle these requests. Verizon then integrates this data, or "customer proprietary network information" (CPNI), into a database, which it says it checks prior to launching a campaign. CPNI usually includes calling records and the services that consumers use, such as voicemail or call forwarding. The opt out system caused quite a stir in late 2007, when the FCC beefed up its CPNI security rules, but it has more or less faded into the background auto flow of telecom policy since then.


11. Irish ISP Agrees to Disconnect Repeat P2P Users
Spoiler
http://arstechnica.com/telecom/news/2009/01/irish-isp-agrees-to-disconnect-repeat-p2p-users.ars
An Irish ISP has settled a court case with the music industry by agreeing to a graduated response plan to target repeat offenders in online piracy.

One of Ireland's largest ISPs, Eircom, has capitulated to the major music labels and agreed to implement a full "graduated response" program—complete with disconnections. Users get two warnings regarding file-sharing, and a third violation brings down the banhammer. The music industry has already said that it intends to pursue the same agreement with Ireland's other ISPs.

The dispute began some time ago when the Irish branches of EMI, Warner, Universal, and Sony filed suit against Eircom. They charged that the ISP was essentially aiding and abetting piracy by doing things like advertising its services on The Pirate Bay, and the labels believed they could get a judge to force the ISP to install network monitoring equipment.


12. Cox Ready to Throttle P2P, Non "time Sensitive" Traffic
Spoiler
http://arstechnica.com/tech-policy/news/2009/01/cox-opens-up-throttle-for-p2p-non-time-sensitive-traffic.ars
US ISP Cox is preparing to throttle "non time-sensitive" traffic across its network.

It takes guts—or perhaps something a bit further down the anatomy—to wait until Comcast has been smacked down for singling out P2P, the Obama administration has come to power, and Democrat Michael Copps (temporarily) heads the FCC to roll out a new Internet traffic management system that delays only some kinds of content during moments of congestion.

But that's exactly what Cox Cable, the third largest cable system in the US, has just announced.

According to the announcement made Tuesday night, Cox will trial the system in Kansas and Arkansas first, expanding it to the rest of its territory later in the year if all goes well.


13. 390,000 to Access Child Database
Spoiler
http://news.bbc.co.uk/2/hi/uk_news/education/7850871.stm
The British "Child Protection Database", containing contact details for every under-18 year old in England will be accessible to 390,000 people, and parents will not be permitted to have their child removed from the database, it has been revealed.

The ContactPoint database is intended to improve information sharing between professionals working with children.

Children's Minister Baroness Morgan said parents would not be allowed to remove their children from the list.

The Conservatives attacked the £224m database as "another expensive data disaster waiting to happen".

The Liberal Democrats have also previously opposed what they called an "intrusive and expensive project".



Ehtyar.
534
Developer's Corner / Re: Lets talk about GUIs.
« Last post by Ehtyar on January 31, 2009, 06:54 PM »
Can't say I tried it to be honest. the GPL limitation was an instant turn off.
Ditto.

Also in addition I don't tend to really like these all-encompassing frameworks.
I have to say I once held the same opinion, until I realized that it's fairly pointless having a cross platform GUI framework, and then relying on the standard library for everything else. There is really just too many differences between the various platforms to code a large complete app without a complete framework.

Ehtyar.

[edit]
Since it seems we weren't discussing cross-platform here, I'll be shutting up now :S
[/edit]
535
General Software Discussion / Re: Every Site is Unsafe According to Google
« Last post by Ehtyar on January 31, 2009, 04:32 PM »
Disabling 'safebrowsing' is one of the first things I do with a fresh install of Firefox. I don't need Google to tell me which sites they consider to be "dangerous", nor do I need them to know which of those warnings I choose to heed or ignore.

To do so yourself, set browser.safebrowsing.enabled and browser.safebrowsing.malware.enabled to 'false'.

Ehtyar.

[edit]
700th post, yay me! :P
[/edit]
536
General Software Discussion / Re: The New (And Improved?) VLC
« Last post by Ehtyar on January 31, 2009, 01:46 AM »
Perhaps the most annoying bug, which should be easily fixed and has existed since .94, is the fact that the windows version will not remember the last used folder so you have to constantly browse to the last used folder everytime you choose file - open
Oooooh, yes please!!

Ehtyar.
537
Developer's Corner / Re: The D programming language - an interview with the author
« Last post by Ehtyar on January 30, 2009, 10:23 PM »
If C++0x were to be released today, it would be named C++09 in a similar fashion to the 1999 revision of C being named C99. the 0x is simply a placeholder for the abbreviated year of release.

Ehtyar.
538
Living Room / Re: New scamsites!
« Last post by Ehtyar on January 30, 2009, 10:10 PM »
What an utterly pathetic joke. ICANN really needs to get a hard kick in the arse for this >:(

Ehtyar.
539
Developer's Corner / Re: The D programming language - an interview with the author
« Last post by Ehtyar on January 30, 2009, 03:29 AM »
Forgive me for resurrecting an old thread - I found it in the "Best of 2008". I wouldn't have replied except I didn't check the date, and now it seems rather silly to discard my post simply due to that. I wonder, in the last six months has anyone's opinion changed?

The thing that really turned me off D was the fiasco with the "standard library", otherwise known as a mishmash of Tango and it's piddly little forerunner, Phobos. Once the two are completely integrated, I'd be interested in using D, but from where I'm sitting at the moment, there really isn't enough incentive to move from C++ which is far more widely used, supported and exemplified.

Ehtyar.
540
Developer's Corner / Re: Cross-platform Coders Editor
« Last post by Ehtyar on January 30, 2009, 03:16 AM »
Well....being that both the first and second replies mentioned the unspeakable, I guess i need to open my mind a little more. Perhaps, if I suspend the spontaneous fire-catching, someone would be willing to tell me what specifically they like about Emacs?

Ehtyar.
541
Developer's Corner / Cross-platform Coders Editor
« Last post by Ehtyar on January 30, 2009, 12:33 AM »
Hi all.

Off the bat, I'm not looking for an IDE (for anyone who is I recommend Code::Blocks).

What I'm looking for is a text editor that is friendly to code, you know..syntax hilighting, regex, maybe code folding, scripting (yay perl!), command line piping etc etc. Notepad++ for Windows and Linux if you will (I so don't care about Mac compatibility). ATM it looks like gvim is the winner (if anyone mentions emacs, your shoes will spontaneously catch fire), but I wanted to check things out before I commit myself. All suggestions are appreciated guys, and IDE comments are welcome, though that's not what I am after.

Thanks, Ehtyar.
542
Living Room / Re: Cube Craft - Very Cool
« Last post by Ehtyar on January 30, 2009, 12:08 AM »
The website is cubeecraft. The concept is Cube Craft. Cubeecraft say the extra e comes from 'easy'.

Ehtyar.
543
Living Room / Re: Cube Craft - Very Cool
« Last post by Ehtyar on January 29, 2009, 09:50 PM »
Well here he is ladies and gents:
vader.png
(the fullsize version takes a while to load)

It was a little tedious folding him up (and cutting him out as you might imagine), but I think overall it was worth it...he's just so cute!!

Ehtyar.
544
oh wow  :o

without this newsletter the best of 2008 would have gone past me! And I have another 10 tabs open on various threads on DC. I cannot stress enough the importance of these newsletters. :up:
Same!! And I even read Mouse Man deciding whether or not to do it this year on IRC :tellme:

Great newsletter as always Mouse Man. Not sure how the "Firefox not safe at all" thread got in there, but I'll forgive ya, just this once ;)

Ehtyar.
545
Living Room / Re: MS takes evil to new level; ruins birthday cake
« Last post by Ehtyar on January 28, 2009, 09:06 PM »
What's proprietary about "<!--"? That's a standard HTML comment.
Indeed. I'm the first to bash Microsoft when they put proprietary shit in the wrong place, but I can't see a problem here...except with the recipient's email client (please don't be using Thunderbird <repeat>).

Ehtyar.
546
Looking for something like this?

I've been using portable firefox exclusively for over a year now. It is a olittle slower to start up than it might on an internal HD, but I'm still perfectly happy with the performance.

Ehtyar.
547
Best Virtual Machine Tool / VirtualBox - Top of the Lot
« Last post by Ehtyar on January 28, 2009, 04:11 AM »
I understand why there has been no mention of VirtualBox around these parts yet - there are virtually (no pun intended) no good reviews of the product anywhere.

Fortunately, I found this rather comprehensive overview on Ars Technica. It's for Mac, but that doesn't particularly matter as VirtualBox is virtually (really, no pun intended) identical on every supported platform.

VirtualBox has been mentioned on DC in the past, but not since it became a real-world contender in the world of virtualisation. There are two threads here and here.

Personally, I would recommend VirtualBox above any other virtualisation solution available, paid or free.

Ehtyar.
548
Living Room / Cube Craft - Very Cool
« Last post by Ehtyar on January 27, 2009, 05:32 AM »
There's a thing going round work atm (some of us get a little spare time every now and then OK? :P) and I'm having quite some fun with it. It's called Cube Craft. Basically you get prints off a website, you print them out on your standard color laser and cut them out and fold them up. There are images of all your favorite nerdy characters from Star Wars to Family Guy, and they're all in a cube (or more accurately, rectangular prism) shape.

The website I'm into is cubeecraft.com. Here are a few samples, click on them to download their pattern:

         

Let us know which ones you make, and give us some photos if you can. I'll post back once I've completed my Vader :)

Ehtyar.
549
JOTO'S BAAAAAAAACK!!!!!!
JOTO'S BAAAAAAAACK!!!!!!
JOTO'S BAAAAAAAACK!!!!!!
 :-* :-* :-* :-* :-* :-*

Ehtyar.

P.S. Come visit the IRC channel to say hi ;)
550
Living Room / Tech News Weekly: Edition 04-09
« Last post by Ehtyar on January 24, 2009, 05:44 PM »
The Weekly Tech News
TNWeekly01.gifHi all.
Not much news this week guys. Honestly, I'd prefer to have fewer articles than inflate the list with boring junk.
As usual, you can find last week's news here.


1. New Paint Promises Low-cost Wi-Fi Shielding
Spoiler
http://www.itworldcanada.com//Pages/Docbase/ViewArticle.aspx?ID=idgml-80c6f4f0-b11e-461c-bb03-6fd5712d3d16&RSS=1&UID=B82BC1BD-28FF-4AEE-9A3A-B2C4D89EE233
Of course any organisation using a proper certificate-based authentication system isn't gonna care, but it's still cool...right?

IT managers should start familiarising themselves with a new security tool, the paint brush, as Japanese researchers have come up with a paint that they say will block high-speed wireless signals, giving businesses a cheap option to protect their wireless networks.

The problem of securing wireless networks has been an issue for a while now. Wi-Fi LANs with no encryption or running the obsolete WEP system, run the risk of having hackers outside the building eavesdrop on wireless LAN traffic, or simply stealing bandwidth. However, there are a number of solutions, besides encryption, for companies wishing to secure their networks.


2. Mac Malware Piggybacks On Pirated IWork
Spoiler
http://www.theregister.co.uk/2009/01/22/mac_trojan_attack/
Be careful Mac users, downloading a pirated copy of iWork could see you with a copy of OSX.Trojan.iServices.A bouncing around your machine with root privileges.

Malware masquerading as part of Apple's iWork 09 productivity suite is targeting unsuspecting Mac users foolish enough to install pirated software downloaded on warez sites.

Once installed, iServices.A has unfettered root access, which it promptly uses to connect to a remote server over the internet, according to Intego, which sells anti-virus software for Macs. A secondary download installs malware that makes victims part of a botnet that's attacking undisclosed websites.


3. Newly-discovered Mac Exploit to Be Detailed at Black Hat
Spoiler
http://arstechnica.com/journals/apple.ars/2009/01/22/newly-discovered-mac-exploit-to-be-detailed-at-black-hat
Seemingly unrelated to post No. 2, researchers have discovered a memory injection vulnerability in standard Apple hardware that could allow an attacker to run code on an Apple box without any indication to the user whatsoever. The exploit will be presented at the next Black Hat scheduled to begin in mid-February.

A student who researches malware and intrusion detection systems at the University Politecnico di Milano in Italy will be making a presentation next month at the upcoming Black Hat conference in Washington D.C. The briefing, as Black Hat refers to it as, will deal with a memory injection technique specific to Apple hardware, which subsequently allows a piece of code to be run from memory.

While it may sound like the RAM Disk feature from the days of OS 9 and before, the technique is nowhere near as benign. What makes the memory injection technique particularly attractive to would-be hackers is that no traces are left on the hard drive and a new process is not created, making it what the experts call an "anti-forensic technique." What is run in memory is up to the attacker; it can range from code snippets to complete applications.


4. Superworm Seizes 9m PCs, 'stunned' Researchers Say
Spoiler
http://www.theregister.co.uk/2009/01/16/9m_downadup_infections/
The Conficker/Downadup worm has reached staggering number of infections, almost 9 million according to security firm F-Secure. The massive spike has been attributed to the worm's ability to propagate across an entire network via a single infection.

Downadup, the superworm that attacks a patched vulnerability in Microsoft Windows, is making exponential gains if estimates from researchers at F-Secure are accurate. They show 6.5 million new infections in the past four days, bringing the total number of machines it has compromised to almost 9 million.

The astronomical growth stunned some researchers, although others cautioned the numbers could be inflated since the counting of infected computers is by no means an exact science. Most agreed F-Secure's estimate was certainly plausible and if it proved to be correct, represented a major development in the world of cyberthreats.


5. Judge: 17,000 Illegal Downloads Don't Equal 17,000 Lost Sales
Spoiler
http://arstechnica.com/news.ars/post/20090119-judge-17000-illegal-downloads-dont-equal-17000-lost-sales.html
A US district court judge (finally, one with some form of logic) has ruled that each illegal download in a piracy case is not equivalent to a lost sale.

Record companies cannot collect restitution for every time a song has been illegally downloaded, a US District judge has decided. Judge James P. Jones gave his opinion on United States of America v. Dove, a criminal copyright case, ruling that each illegal download does not necessarily equate to a lost sale, and that the companies affected by P2P piracy cannot make their restitution claims based on this assumption.

Daniel Dove was originally found guilty of criminal copyright infringement for running a torrent group called "Elite Torrents" between 2004 and 2005. The jury in the case had found Dove guilty of reproduction and distribution of copyrighted works, as well as conspiracy to commit criminal copyright infringement. At the time, Judge Jones sentenced Dove to 18 months in prison for each count, plus a special assessment of $200 and a $20,000 fine ($10,000 per count).


6. Microsoft Contributes Code to Apache Interoperability Effort
Spoiler
http://arstechnica.com/journals/linux.ars/2009/01/23/microsoft-contributes-code-to-apache-interoperability-effort
Microsoft have contributed source code to Apache's Stonehence project aimed at interoperation of projects built on different programming platforms.

Microsoft has contributed source code to Apache's Stonehenge project, an open source effort that collects sample implementations of applications that are built with Service Oriented Architecture (SOA). The aim of the project is to test and demonstrate interoperability between application implementations that are built on different underlying technology.

The project was launched in November under the aegis of the Apache Incubator, a pool of nascent community-driven projects that are working their way into the Apache ecosystem. According to Stonehenge participant Paul Fremantle, this is the first Incubator podling that has received direct involvement from Microsoft.


7. The Plot to Kill Google
Spoiler
http://www.wired.com/techbiz/it/magazine/17-02/ff_killgoogle
As anyone who knows me well will likely expect, I'm not a fan of the headline, though this article is an excellent read if you're interested in the gory details of how the Yahoo/Google deal went south.

When Google's lawyers entered the smooth marble hallways of the Department of Justice on the morning of October 17, they had reason to feel confident. Sure, they were about to face the antitrust division—an experience most companies dread—to defend a proposed deal with Yahoo. But they had to like their chances. In the previous seven years, only one of the mergers that had been brought here had been opposed. And Google wasn't even requesting a full merger. It just wanted the go-ahead to pursue a small deal that it was convinced would benefit consumers, the two companies, and the search-advertising market as a whole. Settling around a large oval table in the conference room, the attorneys from Google and Yahoo prepared to make their arguments. Google wanted to serve its ads for certain search terms on Yahoo's pages in exchange for a share of the revenue those ads generated. It already had similar arrangements with AOL, Ask.com, and countless other Web sites. And the deal wasn't exclusive or permanent.

Tom Barnett, assistant attorney general for antitrust, took his seat at the table and called the meeting to order. The Yahoo lawyers kicked things off by describing their negotiations with DOJ staff; they had already suggested limiting the length of the deal and capping the amount of money in play. Barnett seemed unimpressed. "Staff," he proclaimed, "is irrelevant." He made the decisions around there.


9. YouTube Contest Challenges Users To Make A 'Good' Video
Spoiler
http://www.theonion.com/content/video/youtube_contest_challenges_users
Youtube has challenged users to create a video that "is actually worth watching".

onion.png



Ehtyar.
Pages: prev1 ... 17 18 19 20 21 [22] 23 24 25 26 27 ... 50next