topbanner_forum
  *

avatar image

Welcome, Guest. Please login or register.
Did you miss your activation email?

Login with username, password and session length
  • Tuesday November 11, 2025, 6:21 am
  • Proudly celebrating 15+ years online.
  • Donate now to become a lifetime supporting member of the site and get a non-expiring license key for all of our programs.
  • donate

Recent Posts

Pages: prev1 ... 20 21 22 23 24 [25] 26 27 28 29 30 ... 50next
601
Official Announcements / Re: DC-IRLDD Champaign, IL - New Years
« Last post by Ehtyar on January 07, 2009, 02:43 AM »
R
O
F
L

I wonder if even Cody, as a bird, would believe that Mouse Man :P

Ehtyar.
602
Living Room / Re: Apple Wheel macbook - revolutionary
« Last post by Ehtyar on January 06, 2009, 05:19 PM »
I most enjoyed the end where the announcer suggested it wouldn't be taken up in the workplace because people actually work there instead of just dicking around.  :-*

Ehtyar.
603
Living Room / Re: Tech News Weekly: Edition 01-09
« Last post by Ehtyar on January 03, 2009, 02:51 PM »
Seems .gb and .au are competing for the most surveilled society. Good for them. </sarcasm>

Ehtyar.
604
Living Room / Tech News Weekly: Edition 01-09
« Last post by Ehtyar on January 03, 2009, 02:19 PM »
The Weekly Tech News
TNWeekly01.gifHi all.
Happy New Year everyone :) Enjoy the news.
As usual, you can find last week's news here.


1. Hackers Create Rogue CA Certificate Using MD5 Collisions
Spoiler
http://blogs.zdnet.com/security/?p=2339
Another: http://www.theregister.co.uk/2008/12/30/ssl_spoofing/
Another: http://www.securityfocus.com/news/11541
A group of hackers have used 200 PS3s and a weak SSL certificate (timing prediction and MD5 collision) to create a rogue CA which they used to forge SSL certificates for severval major websites. Certificates validated by the rogue CA will be valid for 2004 only to prevent misuse, though browsers will be blacklisting the rogue CA in their next updates.

Using computing power from a cluster of 200 PS3 game consoles and about $700 in test digital certificates, a group of hackers in the U.S. and Europe have found a way to target a known weakness in the MD5 algorithm to create a rogue Certification Authority (CA), a breakthrough that allows the forging of certificates that are fully trusted by all modern Web browsers.

The research, which will be presented today by Alex Sotirov (top left) and Jacob Appelbaum (bottom left) at the 25C3 conference in Germany, effectively defeats the way modern Web browsers trust secure Web sites and provides a way for attackers to conduct phishing attacks that are virtually undetectable.


2. Cybersecurity Attracts Boeing, Rival Lockheed
Spoiler
http://seattletimes.nwsource.com/html/boeingaerospace/2008575662_cybersecurity31.html
U.S. military contractors Boeing and Lockheed Martin have drastically increased the capacity of their cyber-security divisions anticipating higher demand in 2008.

Lockheed Martin and Boeing, the world's biggest defense companies, are deploying forces and resources to a new battlefield: cyberspace.

The military contractors, eager to capture a share of a market that may reach $11 billion in 2013, have formed business units to tap increased spending to protect U.S. government computers from attack.

Boeing set up its Cyber Solutions division in August "because of a realization by the company that it's a very serious threat," said Barbara Fast, vice president of the unit.


3. CA Issues No-questions Asked Mozilla Cert
Spoiler
http://www.theregister.co.uk/2008/12/29/ca_mozzilla_cert_snaf/
A security researcher successfully procured an SSL certificate for Mozilla.com after identifying a CA that did not check the credentials of the entity making the request, highlighting the primary weak point in SSL: the CA.

Security researchers have uncovered weaknesses in low-assurance digital certificates that create a means for miscreants to mount more convincing man-in-the-middle (MITM) attacks.

MITMs involve a hacker planting himself between two parties in a dialogue, relaying messages between them and effectively controlling the conversation. The approach might be used, for example, to trick a user into handing over online banking login credentials in the mistaken belief that they are talking directly to a financial institution.

Normally untrusted certificates from an unknown issuer are used by fraudster sites in these kind of scenarios. This would generate error messages or warnings that flag up possible problems, at least to the more internet-savvy.


4. DECT Wireless Eavesdropping Made Easy
Spoiler
http://www.theregister.co.uk/2008/12/31/dect_hack/
In yet another Epic Fail of security by obscurity, your household cordless phone is likely vulnerable to eavesdropping, even with the standard encryption scheme enabled.

Conversations relayed through cordless household phones might be far easier to snoop upon than previously suspected.

A new attack against phones based on DECT (Digital Enhanced Cordless Telecommunication) technology - demonstrated during the Chaos Communication Congress in Berlin earlier this week - might be carried out cheaply using off-the-shelf kit, together with a little know-how. A modified $30 VoIP laptop card running on a Linux portable were used to demonstrate the attack, which relies on using specially outfitted equipment to impersonate legitimate wireless base stations.


5. Windows Media Player Flaw Denied
Spoiler
http://www.theregister.co.uk/2008/12/30/wmp_bug_spat/
Microsoft have denied that a flaw in WMP uncovered by researchers is capable of enabling remote code execution.

Researchers reckon a security bug in Windows Media Player creates a means for hackers to inject hostile code onto vulnerable systems. However Microsoft has denied this, saying that the bug only creates a means to crash the software without posing a more damaging security risk.

The WMP integer overflow bug reportedly kicks in when the media player attempts to process maliciously constructed WAV, SND, or MIDI files. Security researchers have created proof of concept code demonstrating the vulnerability, the SANS Institute's Internet Storm Centre reports.


6. FBI Issues Code Cracking Challenge
Spoiler
http://www.networkworld.com/community/node/36704
Code: http://www.fbi.gov/headlines/code.swf
The FBI has issued another code cracking challenge.

The FBI today challenged anyone in the online community to break a cipher code on its site.  The code was created by FBI cryptanalysts. The bureau invited hackers to a similar code-cracking challenge last year  and got tens of thousands of responses it said.


7. UK: Private Firm to Guard Database of Every Phone Call, E-mail
Spoiler
http://arstechnica.com/news.ars/post/20090101-uk-private-firm-to-guard-database-of-every-phone-call-e-mail.html
Another: http://news.bbc.co.uk/2/hi/uk_news/politics/7805610.stm
The UK is considering contracting out the maintenance of its national call and email database.

A contentious proposal to create a massive database of communications metadata in the United Kingdom has just become even more controversial. According to reports in the British press, a "consultation paper" laying out the plan, slated for release in January, contemplates outsourcing the maintenance of the database to private-sector firms. The proposal has already come under fire from civil liberties groups, the European human rights commissioner, and former public officials.

Initially included in Britain's Communications Data Bill as part of a sweeping Interception Modernisation Programme, the surveillance proposal was dropped from the legislation in September, but it was not abandoned. The database is projected to cost some £12 billion ($17.5 billion US), and would contain metadata about every phone call placed, every e-mail or text message sent, and every Web site visited in the UK, reports say. Such "metadata" would include routing information, such as the sender and recipient of an e-mail, as well as times and dates.


8. FCC Okays DTV "Analog Nightlight" Rules
Spoiler
http://arstechnica.com/news.ars/post/20081228-fcc-oks-analog-nightlight-rules.html
The FCC has okay'd a proposal to keep analogue TV running for 30 days after digital TV broadcasting becomes compulsory. Broadcasters will be able to show critical news and update instructions to those without a DTV tuner.

On the night before Christmas, the Federal Communications Commission proposed rules that would let some full-power TV stations continue streaming a bare-bones analog signal for 30 days after the DTV transition. The "Analog Nightlight" program will allow those stations to keep their analog broadcast going "for the limited purpose of providing public safety and digital transition information," the FCC says. Meanwhile a key member of the House of Representatives is warning Congress that it may need to rush more money to the government's analog converter set top box program.

The analog nightlight rule means that couch potatoes who, as of February 17, still haven't figured out that their old analog sets can't receive digital broadcasts won't be left completely in the dark. After that day, all full-power stations must go digital. The nightlight system will permit eligible full-power license holders to continue to broadcast emergency news and information in analog using both English and Spanish. They can also transmit information about the transition and where to get help—at for roughly a month after DTV Day.


9. 30GB Zunes Killing Themselves In Droves
Spoiler
http://blog.wired.com/gadgets/2008/12/30gb-zunes-kill.html
Another: http://news.bbc.co.uk/2/hi/technology/7806683.stm
Discussion thread by CWuestefeld: https://www.donationcoder.com/forum/index.php?topic=16414.0
Microsoft's Zune MP3 player has been effected by a leap-year bug that cases it to crash around the end of 2008. Exhausting the battery should solve the issue.

The internet is awash with reports that the 30GB Zune is committing suicide across the planet. Not just one of them, either. It seems that some weird bug is simultaneously causing the music players to kill themselves, like lemmings leaping from a cliff.

While the Zune is a distant also-ran in the MP3 market, which is dominated by Apple's, the Microsoft-made device has gained critical approbation with its most recent, version 3.0 models, whose features are quite competitive with the iPod line. Many users appreciate the player's built-in FM radio and "Zune Social" features, which facilitate the communal sharing and discovery of new music.


10. Final Rewind: The VHS Tape Has Breathed Its Last
Spoiler
http://www.crn.com/retail/212501855
JVC, the last of the VHS manufacturers, has finally ceased production.

Remember the days when VHS tapes were so ubiquitous that every video store you knew had the slogan, "Be kind, rewind?" We bring you this bit of pressing nostalgia not because VHS has suddenly slowed its long decline, but because the last distribution holdout for VHS tapes this week announced it's finally cutting the format from its inventory.

According to the Los Angeles Times, Distribution Video Audio in Burbank, Calif., shipped its final truckload of VHS tapes in October -- the last time it plans to make VHS shipments, and the last major VHS distributor in the country to do so.



Ehtyar.
605
Living Room / Re: Why Windows Rules: the QWERTY phenomenon?
« Last post by Ehtyar on January 02, 2009, 06:38 PM »
I used to have a RAZR (never again) and the predictive text was utterly tragic. Most everyone who knows me knows I don't do SMS, but since I got my new Nokia 6300, SMS is almost a pleasure to write (I'll never get into them big time, they're a complete ripoff, but they're handy on the rare ocasion). The predictive text even heightens the order in which common words you use are typed. Nokia has struck gold IMO with their predictive text.

Ehtyar.
606
Developer's Corner / Re: How to remove CRC check from a exe?
« Last post by Ehtyar on January 02, 2009, 03:35 PM »
megatron, you'll need to explain what it is you're trying to accomplish in more detail so that we can determine you're not engaging in piracy before we help you. Be as forthcoming as you possibly can.

Ehtyar.
607
Living Room / Re: Thumb trackball wanted
« Last post by Ehtyar on January 02, 2009, 01:34 AM »
I'm head over heels in love with my Logitech Trackman. Not only is it the awesomest mouse ever, but it also does an excellent job of keeping the family away from my PC should I ever forget to lock it ;)
The only complaint I have is the cleaning, but really who cares when you have the awesomest mouse ever?!?
It's comforting to know Logitech are still making them should mine ever fail (three years or so and going strong).

Ehtyar.
608
Living Room / Re: Beware the Google Threat - Big Fat Ass Brother (BFAB)
« Last post by Ehtyar on January 02, 2009, 01:24 AM »
You misunderstood my meaning. What I meant by what I said was that the reason I suspect I didn't find Customize Google useful was that most of its main usability point are already implemented by other browser addons I use.

Ehtyar.
609
Living Room / Re: Why Windows Rules: the QWERTY phenomenon?
« Last post by Ehtyar on January 02, 2009, 01:09 AM »
I started reading this thread about 10 minutes, so please forgive my dated replies.
I'm afraid I can't subscribe to this IE/FF metaphor gentlemen. As a sysadmin, I'm bound to windows as a part of my job.
I am, however, free to choose my browser. Why? Because my browser is not nearly as central to the use of my machine as my operating system is. Nor does it create nearly the level of compatibility problems using Linux in a Windows workplace would (fortunately most webmasters have had the foresight to steer clear of ActiveX in-browser).

Nor can I concur with the comparison to QWERTY/DVORAK. If you have a problem with Linux, you search for a solution and you fix it. If you don't know how to do something in Linux, you search for instructions and you follow them.
If you move to DVORAK, you're completely on your own. Not only that, but if you've been typing 50 WPM in QWERTY, how do you then function typing 20 WPM in DVORAK?
On a more personal note, there's a gentleman where I work that uses DVORAK on his work laptop. Since I've been there (almost 3 months now) I've had to reset his password 4 times. That does not include any occasion when my boss has done it. I've not yet had to reset the password of any other member of staff more than once.

Ehtyar.

P.S. Yay 40hz and Edvard :Thmbsup: :Thmbsup: :Thmbsup:
610
Living Room / Re: Beware the Google Threat - Big Fat Ass Brother (BFAB)
« Last post by Ehtyar on January 01, 2009, 11:40 PM »
Most of those features are rendered moot by cookie blocking, NoScript and POPS with Thunderbird. It occurs to me though that you use Customize Google to prevent clicktracking and removal of UID. Why would you be concerned only about Google and no other corporate entity? Google may have amassed the largest database but they're also likely to be under the most intense scrutiny at any given time.

Ehtyar.

P.S. Stop being so damn paranoid Kartal, you're embarrassing me :P
611
Living Room / Re: Beware the Google Threat - Big Fat Ass Brother (BFAB)
« Last post by Ehtyar on January 01, 2009, 10:04 PM »
I think Kartal should be President actually, he's way too paranoid to be an Honorary Member :P
WTF? I'm easily equally paranoid, shutup :P

If you're going to deal with Google then at least deal with them on your terms and use Customize Google.
I tried it and wasn't too impressed. Which features do you find most valuable?

Ehtyar.
612
Living Room / Re: Beware the Google Threat - Big Fat Ass Brother (BFAB)
« Last post by Ehtyar on January 01, 2009, 02:12 PM »
**Ehtyar boots f0d man out of the tin-foil-hat-brigade and inducts kartal as an honorary member.
I also use NoScript and cookie blockers.

And tbh, if I have to watch ads, I'd rather have ads that might actually interest me - so yay google analytics.
You're confusing adsense with the service Google provides to webmasters to analyze their traffic. That should be scary enough.

Chrome was the last nail in Google's coffin for me. I still have a Gmail for websites i expect to send spam, but I imagine you'll find it difficult to find a free email provider that isn't datamining your emails, Google was just up front about it. I won't discuss Chrome, I think pretty much everyone on here knows my opinion on it (and are probably sick of reading it ;)).

My primary concern is simply that modern day society will soon become a surveillance society, and living in Australia no matter what you say is a legitimate concern.
613
Living Room / Re: HAPPY NEW YEARS DC!!!
« Last post by Ehtyar on December 31, 2008, 11:25 PM »
Oh this is horrifying. I'm more obnoxious than Joshua. Someone put me out of the misery I bestow upon others!

Ehtyar.
614
Living Room / Re: HAPPY NEW YEARS DC!!!
« Last post by Ehtyar on December 31, 2008, 11:18 PM »
You are so 11 minutes ago!
HAPPY NEW YEARS DC!!!
« on: Today at 12:11:48 AM »

Just kidding. Happy new years!
Try 16 hours...He's so fired!

Ehtyar.

P.S. Happy new year everyone :P
615
Living Room / Re: Tech News Weekly: Edition 52
« Last post by Ehtyar on December 30, 2008, 03:44 PM »
Hehe, np man :)

Ehtyar.
616
Living Room / Re: Tech News Weekly: Edition 52
« Last post by Ehtyar on December 28, 2008, 06:44 PM »
No that's Ehtyar retarded ;) Fixed now, ty :)

Ehtyar.
617
General Software Discussion / Re: Firefox 3.1 [BETA 2]
« Last post by Ehtyar on December 28, 2008, 03:45 PM »
I was using almost 50 extensions when 3.0 came out. At the end of two weeks I was missing only two, and neither of them was ever upgraded, so I did it myself.

Ehtyar.
618
Living Room / Re: Tech News Weekly: Edition 52
« Last post by Ehtyar on December 28, 2008, 01:59 PM »
9. Windows XP Allowed to Live Again
But now Microsoft has put in place a scheme that will allow the hardware firms to get hold of XP licences until 30 May 2009.

Previously Microsoft extended XP's life until 2010
-
I presume the 2010 date was for support of xp - otherwise article contradicts self (I think :-\)


:) thanks as ever Ethyar  :up:
You skipped the end of that quote tomos. Windows XP can be installed on netbooks and low cost machines until 2010, presumably because MS didn't want to loose that space to Linux as vista is far too resource hungry to be used on those types of machines.

Ehtyar.
619
Living Room / Tech News Weekly: Edition 52
« Last post by Ehtyar on December 28, 2008, 04:48 AM »
The Weekly Tech News
TNWeekly01.gifHi all.
Well guys, it's the end of another year. I hope you all had a wonderful Christmas (Giftmas for those in the know ;)) and will have a most enjoyable new year :)
As usual, you can find last week's news here.


1. CastleCops, No More
Spoiler
http://www.castlecops.com/
Popular online threat fighting website CastleCops is no more. Recently their website began displaying a message on their homepage explaining to users that the site would no longer be available. There are (entirely unsubstantiated as yet) rumors that the sites owner, Paul Laudanski, has closed the site due to pressure from his employer of 7 months, Microsoft, though most suspect it is due to the costs of running a site that was constantly under cyber attack.

You have arrived at the CastleCops website, which is currently offline. It has been our pleasure to investigate online crime and volunteer with our virtual family to assist with your computer needs and make the Internet a safer place. Unfortunately, all things come to an end. Keep up the good fight folks, for the spirit of this community lies within each of us. We are empowered to improve the safety and security of the Internet in our own way. Let us feel blessed for the impact we made and the relationships created.

With respect to the server marathon, by March 17 2009 CastleCops will refund contributions made through PayPal that were specifically designated for servers. Unfortunately, server donations made via check cannot be returned because we do not have the addresses for the donating entity. Unless instructed otherwise, CastleCops will re-allocate these funds as a donation to the Internet Systems Consortium (ISC.org). This organization sponsored our hosting environment for approximately the past 2 years. Please contact us [cc at laudanski dot com] before March 17, 2009, if you would like a return of your server marathon donation. Otherwise, we would like to thank the ISC for their unfettered support.


2. Subway Fare Hackers to Partner With Transit Agency
Spoiler
http://www.wjla.com/news/stories/1208/579813.html
Another link: http://news.cnet.com/8301-1009_3-10128632-83.html
The Massachusetts Bay Transportation Authority has backflipped, and asked the MIT Subway Hackers to work with them to secure their ticketing system from potential fraudsters.

A trio of Massachusetts Institute of Technology students who found a way to hack into the Boston subway system's payment cards have agreed to partner with transit officials there to make the system more secure. The Electronic Frontier Foundation announced the agreement Monday, two months after the Massachusetts Bay Transportation Authority dropped a lawsuit against the students, who were represented for free by the EFF, a civil-liberties group that frequently takes up cases involving security researchers and computer hackers.

The transit agency had sued to stop the students from presenting findings at a computer-security conference.

The students - Zack Anderson, R.J. Ryan and Alessandro Chiesa - have argued all along they were trying to help the MBTA by giving it advance notice of their planned talk last summer and keeping specific details of their hack secret.


3. MS (finally) Confirms Unpatched SQL Server Flaw
Spoiler
http://www.theregister.co.uk/2008/12/23/sql_server_0day_latest/
Microsoft have fessed up that a recently exposed remote code execution in various versions of their SQL Server software is a real threat.

Microsoft came clean and admitted its SQL Server database software is vulnerable to code injection attacks. It's not a new flaw but the same bug in the database software that emerged around the time of Microsoft's monthly Patch Tuesday update earlier this month.

In an advisory, Redmond's security gnomes confirmed that code has been produced that exploits a security bug affecting Microsoft SQL Server 2000, Microsoft SQL Server 2005 and Windows Internal Database, in certain configurations.


4. URL Redirects Open Scareware Loophole at Major Sites
Spoiler
http://arstechnica.com/news.ars/post/20081224-url-redirects-open-scareware-loophole.html
A hacker has found that using redirect pages as a jumping point for malware distribution is a worthwhile endeavor.

URL redirect notifications are often meant to serve as security measures, but at least one malware blackhat is exploiting these services and redirecting site visitors from the website they think they are about to visit to a spyware-infested haven. That's bad enough on its own, but the as-yet-unknown assailant has also used search engine optimizations to push the polluted redirectors higher in Google's search rankings.

Part of the problem—a significant part—is that many companies/websites use open redirects that will cheerfully redirect incoming traffic to whatever URL they're asked to send it to, even if that traffic didn't originate within the host site. When MySpace or Microsoft inform you that you're about to be redirected off their site, they don't perform any sort of check to see if that's a good place for you to be going.


5. Firefox Halting 2.x Security Patching/Support
Spoiler
http://tech.blorge.com/Structure:%20/2008/12/17/mozillas-security-warning-upgrade-to-firefox-3-today/
Firefox 2 is dead as of now. It is highly recommended anyone still using v2 upgrade to v3 now.

Mozilla has told Firefox users that it will no longer be updating version 2 of the browser and they should upgrade to version 3 right away. The warning came alongside a security update patching ten problems, four of them critical.

The critical problems involve cross-site scripting. That’s a serious concern as it allows the unauthorized transfer of data that a user sends to one site (such as a legitimate online bank) to another site (such as one used by hackers to harvest information).


6. No More Lawsuits: ISPs to Work With RIAA, Cut Off P2P Users
Spoiler
http://arstechnica.com/news.ars/post/20081219-no-more-lawsuits-isps-to-work-with-riaa-cut-off-p2p-users.html
The RIAA will no longer be pursuing indivuals it believes to have engaged in piracy after signing voluntary agreements with many ISPs aimed at cutting off repeat offenders.

In a stunning turn of events, the US music industry has ceased its long-time litigation strategy of suing individual P2P file-swappers. Instead, with New York Attorney General Andrew Cuomo acting as a broker, the RIAA has signed voluntary "graduated response" agreements with major Internet service providers. Those currently on the receiving end of an RIAA lawsuit, though, will have to see it through to the (very) bitter end.


7. IPodhash Project Moves to Wikileaks Following DMCA Notice
Spoiler
http://arstechnica.com/journals/apple.ars/2008/12/22/ipodhash-project-moves-to-wikileaks-following-dmca-notice
The code made available by the iPodHash project has been moved to WikiLeaks in response to Apple's DMCA takedown notice.

When you think of Wikileaks, things like government secrets and Sarah Palin's private e-mail come to mind. However, there's a decent amount of technology-related information on the site as well. The fact that it's nearly impossible to get content removed from Wikileaks could lead to its use as a haven for controversial technology projects, too. It turns out that the code related to the iPodhash project was posted to Wikileaks shortly after the project's BluWiki page was taken down in response to a legal notice from Apple's lawyers.

The project received a DMCA anticircumvention notice in the middle of November, and operator of BluWiki removed the content that Apple didn't like until the legal notice could be scrutinized. Since then, the Electronic Frontier Foundation has agreed to represent iPodhash, and the project's owner has come forward with a few comments, but the original project information is still unavailable, as the various legal machinations continue. Just a few days after the takedown notice was received, however, the code generated by iPodhash thus far was posted to Wikileaks, once again making the information publicly available.


8. Australian 'Net Filters - What's Being Blocked?? and Chinese Espionage
Spoiler
http://arstechnica.com/news.ars/post/20081222-australian-net-filter-testing-set-will-include-p2p.html
Another link: http://www.theregister.co.uk/2008/12/18/huawei_optus_ties_nbn_security_concerns/
The Australian government are insisting on rolling out tests of their widely criticized internet "filtering" system, and are defending it to the last in public communication medium. Australian citizens will not be able to view the content of the filter list, and it seems there is some concern regarding relations between a bidder for the contract and a Chinese technology firm.

Australia's Minister of Broadband, Communications, and the Digital Economy (BCDE), Stephen Conroy, appears to have recognized that his country's plan to install mandatory content filters at the ISP level is causing a public backlash. Conroy has set up several FAQs that describe the program in detail, and has even started defending the program on the departmental blog. But neither the backlash nor an apparent lack of preparation will stop him from putting the system in operation, as live tests on Internet traffic are set to begin any day now—even though the ISPs that want to participate aren't sure what's happening.

First, the practicalities. Initial lab tests of web filtering equipment suggested that the current generation of hardware had appreciable rates of false positives (filtering legal content) and false negatives (allowing illegal content through), and several models caused severe degradation of the network's performance. This isn't much of a surprise; as we described in detail, filtering content is a difficult challenge. The Australian government's own FAQ also recognizes that anyone with sufficient technical expertise can also evade the filters.


9. Windows XP Allowed to Live Again
Spoiler
http://news.bbc.co.uk/2/hi/technology/7795302.stm
Microsoft have yet-again extended the sell life of Windows XP, this time to May 2009.

The cut off date for PC makers to obtain licenses for the software was 31 January 2009.

But now Microsoft has put in place a scheme that will allow the hardware firms to get hold of XP licences until 30 May 2009.

Previously Microsoft extended XP's life until 2010 - provided it was installed on netbooks and low-cost laptops.


10. EU's New Online Library Reopens
Spoiler
http://news.bbc.co.uk/2/hi/entertainment/arts_and_culture/7798789.stm
The EU's online library, Europeana, is back online after having its server capacity quadrupled since it crashed last month just hours after opening due to high demand.

The European Union's huge digital library Europeana, which crashed last month just hours after its launch, is back online.

The website's server capacity has been quadrupled to cope with demand, European Commission spokesman Martin Selmayr told reporters.

But the homepage - at www.europeana.eu - warns that "the user experience may not be optimal in this test phase".

The site gives multilingual access to cultural collections across the EU.


Being that this will be last Tech News Weekly for 2008, I just had to throw in a few best-of lists for the year, enjoy :)
11. Top 10 New Organisms of 2008
Spoiler
http://www.wired.com/science/planetearth/multimedia/2008/12/YE8_organisms
A interesting look at some newly discovered organisms this year.

The world's smallest snake, a prehistoric ant and microbes that may be 120,000 years old: These are just a few of the species revealed to the world in the last 12 months.

With animals going extinct at rates unseen since the dinosaurs disappeared, it's nice to be reminded that some species haven't even been discovered.

As Smithsonian Institute ornithologist Brian Schmidt said after finding the olive-backed forest robin: "It is definitely a reminder that the world still holds surprises for us."


12. 2008 Foot-in-Mouth Awards
Spoiler
http://blog.wired.com/business/2008/12/2008-foot-in-mo.html
Have a good laugh at the expense of those who gaffed on technical subject matter this year.

In 2008, scientists turned on the Large Hadron Collider without ending the world as some had feared, but they did not come up with a cure for foot-in-mouth disease.

In fact, the disease led quite a healthy existence this year, thanks in part to the never-ending presidential campaign.

But Yahoo CEO Jerry Yang topped all political gaffes to become this year's winner (or biggest loser) for his comments defending his decision to turn down Microsoft's $44 billion offer for the perpetually lost-in-the-woods troubled internet venture....


620
Living Room / Re: site:donationcoder.com [your username]
« Last post by Ehtyar on December 26, 2008, 08:40 PM »
3690 hits to Mouse Man's 77000. I've got some catching up to do  ;)

Ehtyar.

This is what I get

Results 1 - 10 of about 73,300 from donationcoder.com for mouser, and
Results 1 - 10 of about 3,730 from donationcoder.com for Ehtyar

Did you search through google.com.au maybe? I get slightly different results when doing the search from google.com.hk page.

Very interesting, you're right. I wonder how that's supposed to work :S

Ehtyar.
621
Living Room / Re: site:donationcoder.com [your username]
« Last post by Ehtyar on December 26, 2008, 07:28 PM »
3690 hits to Mouse Man's 77000. I've got some catching up to do  ;)

Ehtyar.
622
General Software Discussion / Re: Firefox 3.1
« Last post by Ehtyar on December 26, 2008, 06:24 PM »
I've just discovered Firefox 3.1 BETA 2 portable (release notes) is out, so I just had to go and test (Follow the instructions here to run the beta concurrently to your 3.0 installation).

As most people are likely aware, Firefox 3.1 will include a new private browsing mode (known to many as "porno mode") which will see your browser forget everything that you did while it was enabled. This feature is now available in BETA 2. From the tools menu, select "Private Browsing". Firefox will revert back to your current session when you're finished.

Many will be thanking the gods that 3.1 now includes preliminary support for Web Workers. That is, multithreading support in the javascript engine. This will see the departure of days where you browser would lock up if it encountered a particularly nasty script somewhere that required more computation than your machine could provide in a reasonable amount of time.

TraceMonkey, Firefox's new and improved javascript engine, is enabled by default so you should see some added zippyness™ when visiting Gmail et al.

They've removed the new tab switching behavior shown here in post 1 due to negative user feedback.

The support for HTML 5 elements is now completely stable (as far as my experience goes). Give them a try yourself here.

Ehtyar.
623
N.A.N.Y. 2009 / Re: NANY 2009 teaser: Notepad++ plugins
« Last post by Ehtyar on December 25, 2008, 07:44 PM »
Yay npp plugins :Thmbsup:, :-* f0dder.

Ehtyar.
624
Developer's Corner / Re: SpiderMonkey
« Last post by Ehtyar on December 23, 2008, 04:00 PM »
jslibs - zlib, SQLite, NSPR, ode, libpng, libjpeg, libffi, (...) libraries for SpiderMonkey

I've used this myself once or twice, very very impressive. April has a friend who knows a lot more about it than I.

TriXUL - XML-based GUI toolkit embeds SpiderMonkey, using JavaScript to implement logic behind its GUI, supporting calls from JavaScript to C++ objects.

Is this not a little redundant when you consider XULRunner?

Ehtyar.
625
Living Room / Re: George Carlin - I am impressed .
« Last post by Ehtyar on December 22, 2008, 05:27 PM »
Such a shame he's no longer with us. He was indeed an awesome commedian, made us all look at the silly side of life.

Ehtyar.
Pages: prev1 ... 20 21 22 23 24 [25] 26 27 28 29 30 ... 50next