topbanner_forum
  *

avatar image

Welcome, Guest. Please login or register.
Did you miss your activation email?

Login with username, password and session length
  • Tuesday November 11, 2025, 10:46 am
  • Proudly celebrating 15+ years online.
  • Donate now to become a lifetime supporting member of the site and get a non-expiring license key for all of our programs.
  • donate

Recent Posts

Pages: prev1 ... 23 24 25 26 27 [28] 29 30 31 32 33 ... 50next
676
Living Room / Re: R.I.P. Michael Crichton
« Last post by Ehtyar on November 07, 2008, 05:29 AM »
Read about this yesterday in the newspaper, very sad.

Ehtyar.
677
Living Room / Tech News Weekly: Edition 45
« Last post by Ehtyar on November 06, 2008, 06:05 PM »
The Weekly Tech News
TNWeekly01.gifHi all.
As most of you who frequent the IRC channel will know, this week has been my first as the Junior IT Administrator at Amnesia Razorfish. The reason I mention this is that from next week onward I will no longer be able to post the news at the usual time. It will likely be posted a day or two later than usual (though no less regularly). Hopefully I be able to determine a set time within the next fortnight.
Also, thanks to Mouse Man and Darwin for their kind words about the weekly tech news in this months newsletter.
As usual, you can find last week's news here.


1. Microsoft and Google to Offer OpenID
Spoiler
http://dev.live.com/blogs/devlive/archive/2008/10/27/421.aspx
http://google-code-updates.blogspot.com/2008/10/google-moves-towards-single-sign-on.html
Google and Microsoft plan to offer OpenID services from their current sign-on mechanisms.

Currently users are required to create individual passwords for many websites they visit, but users would prefer to avoid this step so they could visits websites more easily. Similarly, many websites on the Internet have asked for a way to enable users to log into their sites without forcing them to create another password. If users could log into sites without needing another password, it would allow websites to provide a more personalized experience to their users.


2. Programming Tools for Cracking Mifare Published
Spoiler
http://www.heise-online.co.uk/security/Programming-tools-for-cracking-Mifare-published--/news/111807
Practical tools for cracking the Mifare RFID chip have been released onto the internet.

A hacker using the pseudonym Bla has published an open source tool called Crapto1 for cracking the encryption of the Mifare Classic RFID chip, as used in the Oyster Card. Besides an implementation in C of the vulnerable Crypto1 algorithm, the archive also contains the C source code for an attack that has been described in a paper by Dutch security researchers at Radboud University.

Using the tool it is said to be possible to calculate the access code of a Mifare Classic card within around two seconds. All an attacker requires is a live recording of an encrypted radio communication between the card and a legitimate reader, as well as a little programming knowledge. The access code then allows him not only to decode the encrypted data, but also to manipulate the card's content virtually without limit and to clone it to obtain services fraudulently.


3. Adobe Acrobat 8 Critically Vulnerable
Spoiler
http://www.net-security.org/secworld.php?id=6715
Acrobat 8 has a vulnerability allowing a maliciously crafted PDF file to gain unauthorized access to the systems it's running on and assume the rights of the user running it via javascript.

Core Security Technologies issued an advisory disclosing a vulnerability that could affect millions of individuals and businesses using Adobe’s Reader PDF file viewing software. Engineers from CoreLabs determined that Adobe Reader could be exploited to gain access to vulnerable systems via the use of a specially crafted PDF file with malicious JavaScript content. Upon making the discovery, CoreLabs immediately alerted Adobe to the vulnerability and the two companies have since coordinated efforts to ensure that a patch could be created and made available to protect users of the program.


4. AT&T Imposes Monthly Bandwidth Caps
Spoiler
http://www.datastronghold.com/index.php/tech-news/1480-atat-imposes-monthly-bandwidth-caps
AT&T is trialing new monthly bandwidth caps in certain areas with the monthly limit based on the speed of a user's connection (read: based on the amount of money they're paying).

Bad news off the wire for AT&T broadband customers, as AT&T has announced the fact that they are now imposing bandwidth limits in certain test areas.  Currently this market trial was started November 1 in Reno and users will get between 20 GB and 150 GB a month depending on their speed tier.  Unlike the bandwidth limitations that were imposed by companies like Time Warner and Comcast, there were only applied to new users this bandwidth cap will be applied to all users including current ones.

It seems like the long feared bandwidth caps are going to be the norm and no longer the exception to the rule when it comes to Broadband providers and home users.  My personal opinion is that bandwidth caps are not an attempt for broadband companies to provide greater service to their customers, it is an attempt for them to start charging either broadband content providers or customers for accessing broadband content.  The cable companies have seen the writing on the wall and they know that the future is TV and video being sent over Internet lines to customers houses and they want a piece of the pie.


5. Virtual Heist Nets 500,000+ Bank, Credit Accounts
Spoiler
http://voices.washingtonpost.com/securityfix/2008/10/virtual_bank_heist_nets_500000.html
http://www.theregister.co.uk/2008/10/31/sinowal_trojan_heist/
RSA's FraudAction Research Lab has uncovered a massive cache of stolen banking details accrued since 2006 via the Sinowal/Torpig/Mebroot trojan.

A single cyber crime group has stolen more than a half million bank, credit and debit card accounts over the past two-and-a-half years using one of the most advanced strains of computer spyware in existence, according to research to be published today. The discovery is among the largest stolen data caches ever recovered.

Researchers at RSA's FraudAction Research Lab unearthed the massive trove of purloined data while tracking the activities of a family of spyware known as the "Sinowal" Trojan, designed to steal data from Microsoft Windows PCs.


6. Man Gets 21 Months for Recording Movies in Theatre With Camcorder
Spoiler
http://www.piracyisacrime.org/In-The-Courtroom/man-gets-21-years-for-recording-movies-in-theatre-with-camcorder.html
A man has been found guilty of filming up to 100 movies in movie theatres in Washington DC and sentenced to 21 months in prison. He was caught via the use of "A Covert Anti-Camcording System" installed by the MPAA.

Michael Logan, 31, of Maryland was sentenced today in federal court in the District of Columbia for filming with a camcorder in theatres, "28 Weeks Later", “Enchanted” and maybe up 100 more movies over the last few years according to the MPAA.

Prosecutors wrote that Logan's voice could be heard on a pirated version of the film "28 Weeks Later," which MPAA investigators purchased on the streets of New York on May 11 and May 15 of last year. Investigators believe that Logan recorded that film May 11 at the Regal Cinemas, prosecutors wrote.


7. Google Abandons Deal With Yahoo
Spoiler
http://news.bbc.co.uk/2/hi/business/7711429.stm
Google has abandoned their advertising deal with Yahoo to avoid the legal rammifications.

The deal involved Google providing some of the advertising around Yahoo's search results and would have been worth $800m (£494m) a year to Yahoo.

It was originally announced in June but has faced anti-trust objections.

Yahoo said in a statement it was disappointed that Google had decided not to fight for the deal in court.


8. Yahoo Tells Microsoft: 'Buy Us'
Spoiler
http://news.bbc.co.uk/2/hi/technology/7712298.stm
Yahoo's CEO Jerry Yang has commented that Microsoft would still benefit from acquiring the company. His comments come on the tail of Google pulling out of the ad deal with them.

The internet portal's co-founder and CEO Jerry Yang made the comment despite the fact Yahoo rejected a $33 (£21) a share offer from Microsoft back in May.

Mr Yang's suggestion also came hours after Google pulled out of an internet advertising partnership with Yahoo.

"To this day the best thing for Microsoft to do is buy Yahoo," said Mr Yang.


9. French Pirates Face Net Cut-off
Spoiler
http://news.bbc.co.uk/2/hi/technology/7706014.stm
Anyone caught sharing pirated digital media in France will receive warnings before having their internet connection terminated under new legislation.

The French Senate voted overwhelmingly in favour of the law, which aims to tackle ongoing piracy of music, movies, and games online.

Those caught illegally sharing digital media will get warnings e-mailed and posted to them before having their net connection terminated.


10. Fire Fear Sparks Battery Recall
Spoiler
http://news.bbc.co.uk/2/hi/business/7701348.stm
Discussion by app103: https://www.donationcoder.com/forum/index.php?topic=15546
Devices containing batteries manufactured by Sony over a period of almost a year will be recalled by the likes of HP, Toshiba and DELL due to overheating fears.

Sony said the recall came after 40 instances of overheating, including four cases where users had minor burns.

The recall affects around 74,000 HP laptops, 14,400 from Toshiba, and small numbers from Dell, Acer and Lenovo.

Sony said the affected batteries were caused by a production line problem between October 2004 and June 2005.


11. British Tax Website Shut Down After Data Breach
Spoiler
http://www.dailymail.co.uk/news/article-1082402/Tax-website-shut-memory-stick-secret-personal-data-12million-pub-car-park.html
http://news.cnet.com/8301-1009_3-10081737-83.html
A memory stick found in a pub car park contating the tax details of 12 million people has forced the british goverment to shut down a taxation-related website.

Ministers have been forced to order an emergency shutdown of a key Government computer system to protect millions of people's private details.

The action was taken after a memory stick was found in a pub car park containing confidential passcodes to the online Government Gateway system, which covers everything from tax returns to parking tickets.

An urgent investigation is now under way into how the stick, belonging to the company which runs the flagship system, came to be lost.


12. WPA Wi-Fi Encryption is Cracked
Spoiler
http://www.itworld.com/security/57285/once-thought-safe-wpa-wi-fi-encryption-cracked
http://news.cnet.com/8301-10789_3-10083861-57.html
WPA has taken a huge security hit as attackers use a protocol weakness and a mathematical breakthrough to break TKIP keys in order to read and/or forge data being sent from an access point to a client machine.

Security researchers say they've developed a way to partially crack the Wi-Fi Protected Access (WPA) encryption standard used to protect data on many wireless networks.

The attack, described as the first practical attack on WPA, will be discussed at the PacSec conference in Tokyo next week. There, researcher Erik Tews will show how he was able to crack WPA encryption, in order to read data being sent from a router to a laptop computer. The attack could also be used to send bogus information to a client connected to the router.


13. Porn Breath Tests for PCs Heralds 'stop and Scan'
Spoiler
http://www.theregister.co.uk/2008/11/05/smut_tests_for_pcs/
New software developed by an Australian University will allow officials to quickly identify illicit images on PCs.

Technology that claims to pick up traces of illicit images on PCs has attracted the interest of Australian cops. The software, developed in an Australian University, might eventually be used to screen PCs for pr0n during border inspections.

Compared to breath test tools used by the police in a different context, the software - developed at Perth's Edith Cowan University in association with local police from Western Australia - is undergoing beta testing.


14. Hackers Jailbreak T-Mobile's Googlephone
Spoiler
http://www.theregister.co.uk/2008/11/05/google_android_jailbreak/
The Googlephone has already been broken by a hacker who determined you can acquire root privileges in Android by telneting to the device.

Hackers have managed to jailbreak T-Mobile's new G1 phone by exploiting a gaping loophole in Android, the open source operating system supplied by Google.

The hack, which was posted to this XDA-Developers forum, is a straight-forward process that allows Linux geeks to gain root access in about one minute. It involves using the widely available PTerminal application to telnet to the device's IP address. Presto, you now have root.


15. Fake Site Punts Trojanised WordPress
Spoiler
http://www.theregister.co.uk/2008/11/06/trojanised_wordpress/
Wordpress hacker are at it again with a website offering an upgrade to the software which includes a Trojan. The website has spread via a vulnerability in older Wordpress versions which allows an attacker to redirect visitors to another website.

Fraudsters have set up a fake site featuring a backdoored version of the WordPress blogging application as part of a sophisticated malware-based attack.

The fake Wordpresz.org site offered up what purports to be version 2.6.4 of the open source blogging tool. In reality all but one of the files are identical to the latest pukka (2.6.3) version of WordPress.


16. National ID Cards Compulsory for U.K. Airport Staff
Spoiler
http://news.cnet.com/8301-1009_3-10083732-83.html
Airport staff in the U.K. will be required to carry one of the new National Identity cards at two airports trialing the new system.

A pilot program of the U.K.'s national identity card plan will be compulsory at one of the two participating airports.

Workers will be required to enroll in the program at London city airport, the Home Office said Thursday. The move comes despite repeated assurances from the Home Office that U.K. citizens will not be compelled to have an ID card or enter their biometric details onto the National Identity Register.

Also on Thursday, the government said that retailers, post offices, and banks can apply to become biometrics enrollment sites for the cards.


17. Remote Buffer Overflow Bug Bites Linux Kernel
Spoiler
http://blogs.zdnet.com/security/?p=2121
A buffer overflow vulnerability in a common Linux Kernel wireless driver could permit an attacker to remotely execute code with Kernel privileges, or cause a denial of service condition.

A remote buffer overflow vulnerability in the Linux Kernel could be exploited by attackers to execute code or cripple affected systems, according to a Gentoo bug report that just became public.

The flaw could allow malicious hackers to launch arbitrary code with kernel-level privileges.  This could lead to complete system compromise or, in some cases if an exploit fails, result in denial-of-service attacks.


18. EndNote Reverse-engineering Case Looks Headed to Courtroom
Spoiler
http://arstechnica.com/news.ars/post/20081104-endnote-reverse-engineering-case-looks-headed-to-courtroom.html
EndNote has accused the open source Firefox extension Zotero of illegally reverse engineering their proprietary .ens file format.

As anyone who works in academia knows, writing and publishing papers involves frequently citing the existing literature. When you're working on a paper with 30 or more references, keeping track of them all can be a downright pain, which is where reference-managing software like Thomson Reuters' EndNote comes in. EndNote is the market leader in this field, but recently it has been facing competition from the open source Zotero, which is a Firefox plugin that lets you manage your bibliographic library and insert references into papers. Right now though, EndNote and Zotero are locked in a legal battle over claims by Thomson Reuters that the developers of Zotero have illegally reverse-engineered aspects of EndNote.


19. FCC White Spaces Decision Kicks Off the Next Wireless Revolution
Spoiler
http://blog.wired.com/gadgets/2008/11/fccs-decision-t.html
The FCC will permit transmissions over unused "white space" spectrum which will allow cheaper wireless.

The Federal Communications Commission's decision to open up the 'white spaces' spectrum to unlicensed devices could usher in a new telecom revolution, say analysts.

Like WiFi, the availability of free, unregulated spectrum could create new technologies and new markets, bringing superfast wireless connectivity to the masses. Unlike WiFi, it could also put pressure on wireless carriers.

"All the PR spin and FUD (fear, uncertainty and doubt) failed in the face of physics and the ground reality of engineering," says Sascha Meinrath, research director of the wireless future program at the New America Foundation, a non-partisan public policy think-tank.


20. Firefox Hits 20% Browser Share Worldwide (yay!)
Spoiler
http://www.webmonkey.com/blog/Firefox_Hits_20PERC_Browser_Share_Worldwide
Adoption of Mozilla's Firefox browser has hit 20% across the globe.

Mozilla is reporting that Firefox topped 20% of the worldwide market share for web browsers for the first time ever in October, 2008. Firefox broke the 20% mark twice last month, once during the week of October 5, and once again during the week of October 26. During the other two weeks, its share was around 19.8%, putting the average for the month just above below the 20% mark at 19.9%


Ehtyar.
678
Developer's Corner / Re: XULRunner question
« Last post by Ehtyar on November 04, 2008, 01:51 PM »
That is the correct behavior, as any introductory tutorial/documentation would tell you. XPIs should be installed via 'xulrunner.exe --install-app drive:\path\to\package.xpi drive:\path\to\install\to', then xulrunner should be invoked on the resulting application.ini.

Ehtyar.
679
You'll want to declare the instance of the ffmpeg class outside of the functions (in a global context), then make use of it within the functions. To show you how this would work we'd need to see more of your code.

Ehtyar.
680
Living Room / Re: Why social networks are a threat to life as some know it
« Last post by Ehtyar on November 01, 2008, 05:56 AM »
I won't get into f0dder vs. kartal, but one of my biggest concerns is that websites like Facebook do what most people would probably consider unscrupulous things with their data, and despite the fact that their TOS mentions it, most people are likely entirely unaware of it. It's similar in a way to 3rd party tracking cookies, it's plain as day that it happens, but no one's concerned about it ('cept probably kartal and I). Anyway, I digress, my concern is that this sort of veiled underhandedness (please don't pounce on that phrase, I use it simply because I'm not sure what else to call it) is becoming more and more common, and people seem to be more and more accepting of it. I worry how soon it will be unavoidable in every day life (think credit cards).

Ehtyar.
681
Developer's Corner / Re: Making a process and then changing its priority
« Last post by Ehtyar on October 31, 2008, 03:19 PM »
proc.PriorityClass = ProcessPriorityClass.BelowNormal;
Documentation for PriorityClass class here and documentation for the ProcessPriorityClass enum here.

Hope this helps, Ehtyar.
682
Living Room / Re: Tech News Weekly: Edition 44
« Last post by Ehtyar on October 31, 2008, 06:34 AM »
Thanks everyone as always for your kind words, they're what makes this worth doing  :-*
Great job on this weeks news.  :Thmbsup: I liked the 'Security-on-a-Stick' to Protect Consumers and Banks. But what banks support it?
I've read that most major banks support dongle technology for their corporate customers, but I'm not aware of any that supply the technology to private account holders.
Could somebody briefly explain what "Fourth Amendment Search" means? I have a feeling that this could actually be one of the more important newsletter items.
For the long winded version, see the wiki article. (tomos and f0d man read in) The short version is that the fourth amendment requires that officers of the law present probable cause and obtain a search warrant for any form of search they wish to undertake. Since the digital age has come upon us with legislation lagging so far behind it, it has been for the judge to decide what constitutes "search" of a digital medium. Until now, taking a hash of a file on someone's PC was not considered a "search" as per the fourth amendment, and thus required there to be no probable cause in order to do so. Until now, the authorities have used (read: abused) this loophole in order to "search" a suspects files by hashing any suspicious files, and comparing the hash to that of content known to them (in this case, kiddy porn pics) and hoping for a match, thus avoiding the requirement of a warrant and probable cause.
Indeed this is quite the important article.
great stuff.
small bug: clicking on the links now serves no purpose.
Hehe, thanks mouse man :) (assuming I took that comment the right way)

Ehtyar.
683
Living Room / Re: Why social networks are a threat to life as some know it
« Last post by Ehtyar on October 31, 2008, 06:16 AM »
Sure, it's data-mined to hell and beyond, but you do choose yourself how much information you wish to expose.
You may be able to choose how much information you expose to the public, but you don't gt to choose how much you expose to Facebook.
I'm not really one who would do such things as Kyle or this woman, but it's reasons like these that I like my anonymity on the internet. :-)
Couldn't have said it better myself Deo.

Ehtyar.
684
Living Room / Re: Why social networks are a threat to life as some know it
« Last post by Ehtyar on October 30, 2008, 08:37 PM »
It's made the print edition of the Daily Telegraph at least twice in the past fortnight, and there seems to be a lot more stories available in the online edition. Though I really must say...this guy is epic stupid: 1. Having a facebook account, 2. Having it publicly accessible, and 3. is so obvious even Kyle himself might be able to guess it.

Ehtyar.
685
Living Room / Re: Tech News Weekly: Edition 44
« Last post by Ehtyar on October 30, 2008, 07:02 PM »
Thanks guys :) Sometimes I do go a little off-track indeed, I just thought it was interesting and worthy of inclusion. Actually, what does everyone think about those slightly off-topic articles?

Ehtyar.
686
Living Room / Tech News Weekly: Edition 44
« Last post by Ehtyar on October 30, 2008, 06:38 PM »
The Weekly Tech News
TNWeekly01.gifHi all.
No meta-news this week, enjoy :)
As usual, you can find last week's news here.


1. NIST Competition To Replace SHA Complete
Spoiler
http://csrc.nist.gov/groups/ST/hash/sha-3/index.html
Via: http://www.schneier.com/blog/archives/2008/10/the_skein_hash.html
The NIST competition for a replacement for the SHA-2 hash family closes today. Unfortunately it doesn't seem that the list of candidates is available yet. Please post a reply if you happen to come by it. Keep your eyes peeled for info.

NIST has opened a public competition to develop a new cryptographic hash algorithm, which converts a variable length message into a short “message digest” that can be used for digital signatures, message authentication and other applications.  The competition is NIST’s response to recent advances in the cryptanalysis of hash functions. The new hash algorithm will be called “SHA-3” and will augment the hash algorithms currently specified in FIPS 180-2, Secure Hash Standard. Entries for the competition must be received by October 31, 2008.


2. Security Flaw Is Revealed in T-Mobile’s Google Phone
Spoiler
http://www.nytimes.com/2008/10/25/technology/internet/25phone.html
The first flaw has been uncovered in Google's Android platform.

Just days after the T-Mobile G1 smartphone went on the market, a group of security researchers have found what they call a serious flaw in the Android software from Google that runs it.

One of the researchers, Charles A. Miller, notified Google of the flaw this week and said he was publicizing it now because he believed that cellphone users were not generally aware that increasingly sophisticated smartphones faced the same threats that plague Internet-connected personal computers.


3. E-mail Attachment Malware Soars 800 Per Cent in 3 Months
Spoiler
http://www.itbusiness.ca/it/client/en/home/News.asp?id=50510
According to Sophos, E-mail malware has made a substantial comback in the previous quarter of this year.

The volume of malware attacks conducted via e-mail attachments increased about 800 per cent over the past three months as this low-grade hacking method was brought back from the grave, according to a U.K.-based security vendor.

This reverses an earlier trend. Previously, malware trends indicated hackers were moving away from sending infected attachments. Most attacks were carried out by embedding links to viruses or Trojans right into the e-mail.


4. Koobface Returns
Spoiler
http://www.computerworld.com.au/index.php/id%3b509001956%3bfp%3b4194304%3bfpid%3b1
http://news.cnet.com/8301-1009_3-10078353-83.html
The infamous Koobface Facebook threat is back, and is using Google's website to bypass Facebook protection (blacklisting is to 1990's).

Hackers initially unleashed Koobface in late July, but Facebook's security team soon slowed its spread by blocking the Web sites that were hosting the malicious Trojan software.

That has prompted the criminals to change tactics, according to Guillaume Lovet, a senior research manager with Fortinet. In this latest attack they have hosted files that appear to be YouTube videos on Picasa and Google Reader and used Facebook to send them to victims.

The links appear safe because they go to Google.com Web sites, but once the victim arrives on the Google Reader or Picasa page, he is invited to click on a video or a Web link. The victim is then told he needs to download special codec decompression software to view the video. That software is actually a malicious Trojan Horse program, which is blocked by most antivirus programs, according to Facebook.


5. 'Security-on-a-Stick' to Protect Consumers and Banks
Spoiler
http://www.physorg.com/news144519988.html
IBM have developed a USB-sized device that can be used to thwart attempted online banking fraud.

The "security-on-a-stick" solution — a handy USB-sized device with a display, a smart card reader and buttons — protects a user's e-banking transactions from even the most malicious attacks. With the new device, developed by an expert team at IBM's Zurich Research Lab, a user sees exactly what transaction data the banking server receives. Moreover, he or she can approve or cancel each transaction directly with the banking server using the buttons on the device.


6. New Address Spoofing Flaw Smudges Google's Chrome
Spoiler
http://www.theregister.co.uk/2008/10/26/google_chrome_address_spoofing/
Chrome is subject to yet another major vulnerability allowing websites to impersonate other websites.

Google's Chrome browser has been marred by yet another vulnerability, this one allowing attackers to impersonate websites of groups like the Better Business Bureau, PayPal or, well, Google.

Researcher Liu Die Yu of the TopsecTianRongXin research lab in Beijing says the spoofing vulnerability is the result of faulty code inserted by programmers from the Mountain View, California search behemoth.


7. Opera Scrambles to Quash Zero-day Bug in Freshly-patched Browser
Spoiler
http://www.theregister.co.uk/2008/10/27/zero_day_opera_bug/
In similar news, Opera's most recent browser patch has led to an easily-exploited RCE vulnerability.

Just a few days after Opera Software patched critical vulnerabilities in its browser, researchers have identified another serious bug that allows attackers to remotely execute malicious code on the machines of people running the most recent version of the software. Opera has vowed to fix the flaw soon.

Among the bugs squashed in Opera 9.61 was a stored cross site scripting (XSS) vulnerability that allowed attackers to view victims' browsing history. That attack is no longer possible, but now researchers have discovered an even more serious exploit that's based on the same weakness.


8. ATO Loses CD With Private Details
Spoiler
http://news.cnet.com/8301-1009_3-10078353-83.html
The Australian Taxation Office has misplaced a disk containing the unencrypted tax details of 3122 trustees, and has failed to notify them of the breach until 3 weeks later. Interestingly enough, Australia still has no laws governing the handling or reporting of corporate data breaches. Yay for incompetent government!

The ATO admitted that the CD was not encrypted and victims were only notified three weeks later.

The disk contained the name, address and super fund tax file numbers for 3122 trustees and was being couriered to the ATO, but failed to reach the department.

The Tax Office was notified about the missing CD on October 3 but only sent out letters to the victims on October 24, offering to re-issue the tax file numbers for their super funds.


9. Court Rules Hash Analysis is a Fourth Amendment "search"
Spoiler
http://arstechnica.com/news.ars/post/20081029-court-rules-hash-analysis-is-a-fourth-amendment-search.html
The long-contested idea that using hashes to determine the content of computer files is classified under the Fourth Constitutional Amendment as a "search" has been upheld in court for the first time, though appeal is likely.

A good coder has as many uses for hash functions as George Washington Carver did for peanuts—but law enforcement is fond of these digital fingerprinting techniques as well, because they allow reams of data to be rapidly sifted and identified. Legal scholars, however, have spent a decade puzzling over whether the use of hash value analysis in a criminal investigation counts as a Fourth Amendment "search." A federal court in Pennsylvania last week became the first to rule that it does—but one legal expert says an appeal is very likely.


10. Windows 7's Streamlined UAC
Spoiler
http://arstechnica.com/journals/microsoft.ars/2008/10/30/arspdc-windows-7s-streamlined-uac
Although they're keeping that fugly UI, it seems Microsoft will be overhauling UAC in Windows 7.

One feature of Vista that came under more criticism than most was User Access Control. The feature, designed to make Windows more secure by both limiting the rights of Administrators and making it easier for regular Users to gain Administrator rights only when necessary, was deemed to be annoying and intrusive. As a result, some 10-15% of Vista users turn it off.

Vista SP1 smoothed a few of the more annoying UAC wrinkles, but retained the same fundamental mechanics. The two main problems with UAC:the screen going black momentarily whenever a confirmation prompt was displayed, and the need to reaffirm explicit user actions.

With Windows 7, Microsoft has tried to tone down UAC to make it less invasive while still affording the same protection.


11. Ubuntu 8.10 Intrepid Ibex Released
Spoiler
http://www.downloadsquad.com/2008/10/30/ubuntu-8-10-intrepid-ibex-released/
Bang-on-target Intrepid Ibex has gone final today, with many impressive new features.

Ubuntu 8.10 is available for download today. And because Ubuntu Linux is open source software and we've been following its development for the last 6 months, there aren't a ton of surprises. But that doesn't mean you shouldn't download it if you're running Ubuntu 8.04 or if you're looking for a new Linux distro to try. Because it does include a number of tweaks, bug fixes, and improvements. Here are just a few:

    * Improved support for connecting to 3G wireless networks
    * A utility for loading a fully working Ubuntu installation on a USB disk
    * There's a new System Cleaner utility that will help identify abandoned software packages (which could address one of my biggest pet peeves about most Linux distributions)
    * The Nautilus file manager now supports tabs


12. Tivo Set to Stream Netflix Movies by Christmas
Spoiler
http://blog.wired.com/business/2008/10/tivo-set-to-str.html
It appears TiVo and Netflix have finally pulled their fingers out and are testing their system for streaming Netflix movies directly to TiVo subscribers.

Four years in the making, the Tivo/Netflix streaming partnership is finally ready for prime time. Tivo began testing software Thursday and expects to have the entire Netflix streaming collection available to subscribers of both services by early December.

The companies originally announced plans to serve Netflix movies-on-demand to Tivo boxes in 2004 but shelved plans due to a lack of available content.


Ehtyar.
687
Living Room / Re: High Capacity Portable MP3 Player
« Last post by Ehtyar on October 30, 2008, 04:04 PM »
Sony I refuse to support ever since the Sony-BMG-rootkit debacle (so on principal basically). Apple has twice screwed over iPod users in my country and I'm not interested in being one of them.
I think for the moment at least I'll have to go without, unless I get something with a small capacity to hold me over until the Aussie dollar is worth diddly-squat again, but I'd more than welcome any alternative suggestions.

Ehtyar.
688
Living Room / Re: High Capacity Portable MP3 Player
« Last post by Ehtyar on October 29, 2008, 06:32 AM »
Perhaps the idea is to have a decent music base to select from, rather than hearing the same tracks over and over - or having to transfer new music all the time? :)
Correct.

Ehtyar.
689
Living Room / Re: High Capacity Portable MP3 Player
« Last post by Ehtyar on October 28, 2008, 11:30 PM »
Honestly, even were it released in this country, it would not have been priced on par with the US version, regardless of the value of the Australian dollar. If I were to buy it, it would be through an American friend.
Word Man tells me the Australian Federal Reserve is buying up Australian currency, so perhaps I'll be able to buy one at a reasonable price in a decade or so :-\

Ehtyar.
690
Living Room / Re: High Capacity Portable MP3 Player
« Last post by Ehtyar on October 28, 2008, 11:03 PM »
The Zune has not been released in Australia.

Ehtyar.
691
Living Room / Re: Why do so many fruits and vegetables look like human genitalia?
« Last post by Ehtyar on October 28, 2008, 10:11 PM »
In the time it would have taken you to be banned from 3 supermarket chains, untreated priapism would most likely have killed you, not to mention that it is not associated with any known neurological conditions. Please elaborate on your condition or remove your post.

Ehtyar.
692
Living Room / Re: High Capacity Portable MP3 Player
« Last post by Ehtyar on October 28, 2008, 08:23 PM »
I considered building my own, though the MP3 player would be for train travel, not car travel, so neither this option, nor the other I've seen would work for me. Thank you for the suggestion though.

Ehtyar.
693
Living Room / Re: High Capacity Portable MP3 Player
« Last post by Ehtyar on October 28, 2008, 07:31 PM »
don't these eeePCs from Asus(tek?) have a large harddisk? maybe a different subnotebook will do and be cheaper as well...
Not a bad idea..not ideal, but I may end having to get one regardless, thanks House Man.
I'm not sure exactly how much you want to spend, but the Zune 120 might be a possibility.  It's priced around $240 USD.  It has a rated battery life of approximately 30 hours, however your mileage may vary.  I have one of the old Zune 30s, and I love it.  I also pay for the Zune Pass, so I always have tons of music to access for a single monthly fee.

C
This is PERFECT :Thmbsup:, not quite sure how I missed it, though it may be because it's not released in my country yet. Unfortunately, I completely forgot to take into account the utterly pathetic Australian dollar at the moment. You thought $240 was bad, here that converts to somewhere around the $450 mark, while keeping in mine that two months ago we were 10c away from parity with the US dollar. Still, if the situation improves, this one will be mine. Some cody-currency to you, thanks cthorpe.
I'm guessing that the Archos line is guilty of premium pricing for the screen...?
'Fraid so Darwin, thanks for the suggestion though.

Ehtyar.
694
Living Room / High Capacity Portable MP3 Player
« Last post by Ehtyar on October 28, 2008, 04:28 PM »
Hi all.
For the past hour or so I've been looking on the net for a high capacity MP3 player, and I've yet to find something that matches my needs (hard to believe right?). My criterion are below:
  • Capacity >= 100GB
  • NOT by Apple
  • NOT by Sony
  • Not priced for the huge screen
That's pretty much it really, I'd like batter life to be >10 hours on unprotected audio playback, but I'm willing to overlook poor battery life if necessary. If Sony and Apple are my only choices, then I'll go without, though I almost can't comprehend that no decent company is competing against the horrendous tech sold by these companies.
Please leave a reply if you know of something that might match what I'm after  :-*

Thanks, Ehtyar.
695
Living Room / Re: Tech News Weekly: Edition 43
« Last post by Ehtyar on October 26, 2008, 11:45 PM »
the intention isnt to post the newsletter in both formats each time is it? it was just this time you posted both so we could compare.
in future idea would be to only post the compact version, right?
Yeah. I guess that's the part Deo was missing.
It was intentional. Have a read of the comments of last week's news.

Ehtyar.

I realize it was intentional. What I'm saying is that I'm one of the people who isn't heaping praises on it. I don't like it and I think it's pointless.

But that's just my opinion. If people really like it then keep it. I'll just continue to ignore it like I did this time.
Neither do I, but since the news is posted for everyone BUT myself, and since you're the only person to express distaste, I guess I don't have much of an option.

Ehtyar.
696
Living Room / Re: Tech News Weekly: Edition 43
« Last post by Ehtyar on October 26, 2008, 09:25 PM »
It was intentional. Have a read of the comments of last week's news.

Ehtyar.
697
Living Room / Re: Tech News Weekly: Edition 43
« Last post by Ehtyar on October 26, 2008, 04:56 PM »
Thanks zridling :)

Ehtyar.
698
Developer's Corner / Re: Where to start with computer programing
« Last post by Ehtyar on October 26, 2008, 03:33 PM »
OH
MY
GOD
Tin Man got a life. I don't recall issuing permission for that :huh: *cough*i'mnotjealous*cough*

Ehtyar.
699
Developer's Corner / Re: Where to start with computer programing
« Last post by Ehtyar on October 26, 2008, 03:26 PM »
Good lord, have you been sick Tin Man? I was starting to wonder what python-related song we could play at your funeral... *cough*getyourarseintotheircchannel*cough*

Ehtyar.
700
Living Room / Re: Why no screensaver?
« Last post by Ehtyar on October 25, 2008, 05:39 PM »
I had this problem...probably about two installs ago. I never ended up finding out how to fix, and since I was only a month of so from my next install cycle I gave up after probably a cumulative hour of googling. It was good in a way; it got me in the habit of turning my monitor off when I left my computer. Sorry I can't offer anything more helpful.

Ehtyar.
Pages: prev1 ... 23 24 25 26 27 [28] 29 30 31 32 33 ... 50next