Keyword: computers

Brevity: Headers | « Text »
  • No, it’s not always quicker to do things in memory (computer)

    03/26/2015 8:27:11 PM PDT · by Utilizer · 58 replies
    ITworld ^ | March 25, 2015 | Phil Johnson
    It’s a commonly held belief among software developers that avoiding disk access in favor of doing as much work as possible in-memory will results in shorter runtimes. The growth of big data has made time saving techniques such as performing operations in-memory more attractive than ever for programmers. New research, though, challenges the notion that in-memory operations are always faster than disk-access approaches and reinforces the need for developers to better understand system-level software. These findings were recently presented by researchers from the University of Calgary and the University of British Columbia in a paper titled When In-Memory Computing is...
  • SSL/TLS Suffers 'Bar Mitzvah Attack'

    03/26/2015 10:43:03 AM PDT · by Citizen Zed · 5 replies
    Dark Reading ^ | 3-26-2015 | Kelly Jackson Higgins
    SSL/TLS encryption once again is being haunted by an outdated and weak feature long past its prime:  a newly discovered attack exploits a weakness in the older, less secure RC4 encryption algorithm option in SSL/TLS that's still supported in many browsers and servers. Itsik Mantin, director of security research with Imperva, at Black Hat Asia in Singapore today will detail how an attacker could sniff credentials and other information during an SSL session in an attack he named the "Bar Mitzvah Attack" after 13-year-old weaknesses in the algorithm it abuses. The attack is a glaring reminder that the RC4 algorithm,...
  • BitWhisper turns up heat on air-gap security

    03/24/2015 9:46:52 AM PDT · by Patriot777 · 4 replies
    © 2015 Tech Xplore, Phys.org ^ | March 24, 2015 - 5 hrs ago | Nancy Owano
    Ben Gurion University reported Monday that researcher Mordechai Guri, assisted by Matan Munitz and guided by Prof. Yuval Elovici, uncovered a way to breach air-gapped systems—that's quite something considering that air-gapped systems, said the Daily Mail, are among the most secure computers on the planet, used in high security settings such as classified military networks, payment networks processing credit and debit card transactions for retailers, and industrial control systems for critical infrastructure. The research initiative was given the name BitWhisper, part of research on the topic of air-gap security at the Cyber Security Research Center at Ben-Gurion University. Dudu Mimran,...
  • No love lost: Microsoft tries to block Linux on Windows machines

    03/24/2015 7:52:28 AM PDT · by ShadowAce · 37 replies
    Linuxveda ^ | 21 March 2015 | Paul Hill
    Remember the most talked about story of 2014? It was Microsoft loves Linux. It looks like Microsoft’s love for Linux is more like Mark Wahlberg’s love for Reese Witherspoon as we saw in the movie Fear.If reports are to be trusted Microsoft’s survival mechanism may kick in again, with the new release of Windows. The legacy software maker may resort to ‘secure boot’ to block alternative operating systems on Windows PCs.At Microsoft’s hardware conference WinHEC, new slides were shown which could mean bad news for Linux users. Machines shipping with Windows 10 may see OEMs enforcing Secure Boot without an option...
  • Trouble with Firefox and Java

    03/23/2015 2:07:45 PM PDT · by lafroste · 23 replies
    me | 3/23/15 | lafroste
    Last week I had a very wierd computer glitch. It screwed up my text fonts, desktop icons and other stuff. At any rate I have gotten things mostly back under control, except for one thing. Java scripts refuse to run in Firefox. I have updated Firefox, I have update Java, I have gone through everywhere I can think of to enable Java script, but it still will not run. Does anyone have any suggestians on how to fix this or what the problem might be? It has me flummoxed. Any help is appreciated. Thanks!
  • Italian Researchers Expect 3D Printed Eyes by 2027, Providing Enhanced Vision & WiFi Connection

    03/21/2015 8:34:15 PM PDT · by 2ndDivisionVet · 12 replies
    3D Print ^ | March 20, 2015 | Bridget Butler Millsaps
    There’s one thing you may have begun to notice about digital design and 3D printing: whatever you think might happen in the future is probably going to advance far beyond whatever you envisioned or thought might be a cool idea. And literally, one day you may be envisioning your entire world, and recording it as well, through completely artificially constructed, 3D printed eyeballs. You may be able to say goodbye to prescription glasses and contact lenses — and even your camera, as your original retina is replaced by a new and digital network contained inside your head, and even able...
  • Ransomware: Pay it or fight it?

    03/21/2015 9:30:33 AM PDT · by xzins · 50 replies
    Network World ^ | Mar 16, 2015 | Colin Neagle
    Ask security experts what to do when hit with ransomware – the sophisticated malware that infects a device or network, uses military-grade encryption to restrict access, and demands payment for the decryption key – and you'll typically get the same answer: "never pay the ransom." But for many, that's simply not an option. For example, last November an employee in the Sheriff's Department in Dickinson County, Tenn., accidentally clicked on a malicious ad and exposed the office network to the infamous CryptoWall ransomware. Detective Jeff McCliss told local News Channel 5 that CryptoWall had encrypted "every sort of document you...
  • Ethereum, IT Dreamed Up By a Wunderkind 19 y.o. That Could One Day Transform Law, Finance & Society

    03/19/2015 11:50:14 PM PDT · by 2ndDivisionVet · 16 replies
    Reason Magazine's Hit & Run Blog ^ | March 19, 2015 | Jim Epstein
    Ethereum, the brainchild of wunderkind software developer Vitalik Buterin, who was just 19 when he came up with the idea, is the most buzzed-about project right now in the cryptocurrency community. It has attracted an all-star team of computer scientists and raised $18.4 million in a crowdfunding campaign—the third most successful of all time. And now, according to the official Ethereum blog, it's on the verge of being rolled out to the public. Ethereum's developers use a rolling ticker tape of bold tag lines to describe what they're creating, including a “Social Operating System for Planet Earth,” and “the Upcoming...
  • Classic FPS Descent to be rebooted by Star Citizen alums

    03/19/2015 6:45:45 PM PDT · by Utilizer · 17 replies
    Ars Technica | Mar 18, 2015 4:30am PDT | Lee Hutchinson
    For those of you who remember such classic computer games such as Descent (a Doom-type First Person Shooter) and Descent II, ars technica has an article posted about how some alums of the game are attempting a reboot of the game for PC/MAC called "Descent Underground". Another source states that a Linux version is planned but no reference is found in this article. More info, history, and some nice graphics are at the website.
  • Why Does Laptop Keep Going Out When I Watch Video?

    03/17/2015 9:08:00 PM PDT · by onedoug · 38 replies
    Personal ^ | 17 MAR 2015 | onedoug
    My computer shuts down completely upon watching certain video. For example, the earlier posted Tom Cotton speech. When I clicked onto it, I was able to watch essentially the introduction, then, BLANK. The thing just shuts off. FR, or stuff like my library account, or the weather forecasts, etc, are fine. But the minute I switch to a video format, or try to watch a CD...blank. It suddenly shuts down completely. Is it my system, or is there a fix that I'm unaware of? I know there are many knowledgeable herein. Thank you all in advance.
  • Microsoft Is Phasing Out Internet Explorer

    03/17/2015 8:18:12 AM PDT · by lbryce · 46 replies
    Atlantic Monthly ^ | March 17, 2015 | ZACH WENER-FLIGNER
    The end is finally in sight for Microsoft’s long-fraught Internet Explorer. At the Microsoft Convergence conference yesterday in Atlanta, Georgia, Chris Capossela, Microsoft’s head of marketing, said that the new flagship browser for Windows, which was announced in January and is codenamed Project Spartan, will not be associated with the Internet Explorer brand. While Internet Explorer will still exist on Windows 10 for compatibility purposes, it will take a back seat to the new browser.
  • FBI’s Plan to Expand Hacking Power Advances Despite Privacy Fears

    03/16/2015 8:14:08 PM PDT · by Citizen Zed · 2 replies
    National Journal ^ | 3-16-2015 | DUSTIN VOLZ
    A judicial advisory panel Monday quietly approved a rule change that will broaden the FBI's hacking authority despite fears raised by Google that the amended language represents a "monumental" constitutional concern. The Judicial Conference Advisory Committee on Criminal Rules voted 11-1 to modify an arcane federal rule to allow judges more flexibility in how they approve search warrants for electronic data, according to a Justice Department spokesman. Known as Rule 41, the existing provision generally allows judges to approve search warrants only for material within the geographic bounds of their judicial district. But the rule change, as requested by the...
  • Help with Sending Mass E mailings

    03/13/2015 8:19:14 PM PDT · by hsmomx3 · 19 replies
    self
    I am doing some clerical work for an insurance adjustor and he has asked that I assist in setting up a system where one email would be sent to 50 recipients. He does not want it done in BCC format as he claims those on the BCC list would be able to discover who the email was sent to. I do not want to make this more difficult than it has to be. He said an email blast program may be the way to go but I know nothing about these. Your advice/assistance is most appreciated.
  • Ransomware victims pay cybercriminals to save family photos

    03/11/2015 10:42:15 AM PDT · by rickmichaels · 27 replies
    CBC News ^ | March 11, 2015 | David Common
    Theresa and Billy Niedermayer paid an $800 ransom to get precious family photos of their three young boys back from cybercriminals. Their home computer had been seized by one of the more malicious malware programs spreading fast around the world. Ransomware takes computer files hostage. Cybercriminals target photos, videos, spreadsheets, documents, slide presentations — anything that someone will pay to recover. The initial infection takes seconds. In some cases, the malicious software encrypts the files so their owners can no longer read them. The data isn't compromised or removed, just locked down and inaccessible. Try to access them and a...
  • DevMountain. The Coding Factory

    03/07/2015 5:47:12 PM PST · by 2ndDivisionVet · 4 replies
    Startup Hook ^ | November 19, 2014 | Staff
    IÂ’ll be honest, when it comes to coding IÂ’m just about the last person anyone would consider asking advice from. DonÂ’t get me wrong, I find what programmers do to be both extremely interesting, and (of course) integral to our continued push for innovation in a digitized world, but studying the developers at my day job is like monitoring a team of archaeologists making sense out of hieroglyphics. There are countless people who feel the same way, which is unfortunate since development is a potentially rewarding career path, and one thatÂ’s constantly expanding. One of the stumbling blocks, as mentioned...
  • Battling the bloatware blight

    03/06/2015 5:25:59 AM PST · by george76 · 28 replies
    Globe ^ | March 04, 2015 | Hiawatha Bray
    Many new devices are cluttered with programs that you never installed, never requested, and many not want. There’s nothing like the fresh, clean feeling of unboxing a brand-new computer or smartphone. Too bad the feeling usually comes to an end the moment you hit the power button. ... Bloatware isn’t all bad — you might end up buying that antivirus program. But it can also slow down your machine and waste valuable storage space. And every now and then, these unwanted programs will even threaten your privacy. Late last month, the Chinese computer maker Lenovo admitted that a bit of...
  • Audible ads on web pages......

    03/03/2015 11:27:56 AM PST · by leopardseal · 39 replies
    This is turning into a curse. I'm getting ads which come up making all kinds of noise and racket ten or twenty minutes after I've had a website open and if I've had ten or fifteen sites open, it can be all but impossible to figure out which one is even causing the trouble. Do any of the current browsers offer any way to block audible ads?
  • The computer of the future

    03/01/2015 8:28:02 PM PST · by leopardseal · 47 replies
    It might actually be that something like this would be possible with today's technology or it may be more like five or ten years out, but this is the computer I'd like to have. The thing would look like two Iphones held together face to face with magnets or snaps of some sort and fit in a shirt pocket. You'd take it out of your pocket, take the two halves of the thing apart, and set the one half on any flat surface to be the mouse. The other half would sit on the same surface and somehow generate a...
  • HACKED HARDWARE COULD CAUSE THE NEXT BIG SECURITY BREACH

    02/24/2015 5:08:22 AM PST · by Not gonna take it anymore · 4 replies
    Popular Science ^ | February 17, 2015 | By P.W. Singer
    Sinister Circuit Board Peter Shanks via Flickr CC By 2.0 In late summer of 2006, the Japanese division of McDonald’s decided to run a new promotion. When customers ordered a Coca-Cola soft drink, they would receive a cup with a code. If they entered that code on a designated website and were among 10,000 lucky winners, they would receive an MP3 player pre-loaded with 10 songs. Cleverly constructed, the promotion seemed destined for success. Who doesn’t like a Coke and a free MP3 player? But there was one problem the marketers at McDonald’s could not anticipate: In addition to 10...
  • Lenovo Has Been Selling Laptops with Malware Pre-Installed

    02/19/2015 11:58:24 AM PST · by Wolfie · 51 replies
    Yahoo Tech ^ | Feb. 19, 2015
    Lenovo Has Been Selling Laptops with Malware Pre-Installed Computer maker Lenovo has been shipping laptops prepackaged with malware that makes you more vulnerable to hackers — all for the sake of serving you advertisements. Made by a company called “Superfish,” the software is essentially an Internet browser add-on that injects ads onto websites you visit. Besides taking up space in your Lenovo computer, the add-on is also dangerous because it undermines basic computer security protocols. That’s because it tampers with a widely-used system of official website certificates. That makes it hard for your computer to recognize a fake bank website,...
  • Destroying your hard drive is the only way to stop this super-advanced malware

    02/17/2015 7:03:37 AM PST · by BenLurkin · 51 replies
    pcworld.com ^ | Feb 17, 2015 5:40 AM | Jeremy Kirk
    The malware reprograms the hard drive’s firmware, creating hidden sectors on the drive that can only be accessed through a secret API (application programming interface). Once installed, the malware is impossible to remove: disk formatting and reinstalling the OS doesn’t affect it, and the hidden storage sector remains. “Theoretically, we were aware of this possibility, but as far as I know this is the only case ever that we have seen of an attacker having such an incredibly advanced capability,” said Costin Raiu, director of Kaspersky Lab’s global research and analysis team, in a phone interview Monday.
  • Alan Turing and the New Emergentists

    02/18/2015 5:46:00 AM PST · by Heartlander · 38 replies
    Evolution News and Views ^ | February 18, 2015 | Erik J. Larson
    Alan Turing and the New Emergentists Erik J. Larson February 18, 2015 4:29 AM | Permalink The acclaimed Alan Turing biographical film The Imitation Game is up for multiple Oscars on Sunday. It is a tale of Turing as a tragic hero and misunderstood genius, irascible, certainly idiosyncratic, who insinuates himself into a job interview at Bletchley Park as a self-proclaimed mathematical genius, which later is born out as true. He "invents" the digital computer to solve the decryption challenge posed by the German Enigma machines, and thus saves the Allied powers from Hitler.  The film is a human-interest story,...
  • Researchers stumble across Arab-speaking cybercriminal group

    02/18/2015 6:43:23 AM PST · by Ernest_at_the_Beach · 3 replies
    tweaktown.com ^ | Posted: 2 hours, 35 mins ago | Michael Hatamoto
    The Operation Arid Viper campaign has successfully stolen more than 1 million files with current malware campaigns underway, though it's not the usual suspects, according to Kaspersky Lab and Trend Micro. The Arab-speaking group, with ties to Gaza, have targeted foreign government offices, critical infrastructure, military, universities, and other high-profile targets. The attacks likely occurred starting in mid-2013 and a full investigation into their actions is underway.   "Whoever the real culprits are, it is clear that they are part of the Arab world, evidence of a budding generation of Arab hackers and malware creators intent on taking down their...
  • Google's Vint Cerf warns of 'digital Dark Age'

    02/18/2015 3:31:11 AM PST · by SoFloFreeper · 22 replies
    BBC ^ | 2/13/15 | Pallab Ghosh
    Vint Cerf, a "father of the internet", says he is worried that all the images and documents we have been saving on computers will eventually be lost. Currently a Google vice-president, he believes this could occur as hardware and software become obsolete. He fears that future generations will have little or no record of the 21st Century as we enter what he describes as a "digital Dark Age".
  • Russian researchers expose breakthrough U.S. spying program

    02/16/2015 11:44:44 PM PST · by Dallas59 · 23 replies
    reuters.com ^ | Feb 16, 2015 | reuters.com
    (Reuters) - The U.S. National Security Agency has figured out how to hide spying software deep within hard drives made by Western Digital, Seagate, Toshiba and other top manufacturers, giving the agency the means to eavesdrop on the majority of the world's computers, according to cyber researchers and former operatives.
  • Authorities investigating triple homicide in Kentucky (Parents took away teens computer privileges)

    02/15/2015 7:51:10 PM PST · by PROCON · 95 replies
    apnews.myway.com ^ | Feb. 15, 2015 | ADAM BEAM and BRUCE SCHREINER
    CORBIN, Ky. (AP) — A 16-year-old boy killed in a shootout Saturday with police in Maryland, prompted the search of his home over 500 miles away in Kentucky, where authorities found the bodies of his parents and younger sister. Friends and relatives of Jason Hendrix were struggling to understand how the boy, a faithful churchgoer who was baptized just two months ago, could end up as the suspect in the slayings. Hendrix, a Kentucky high school ROTC student and active church member, was angry at his parents for taking away his computer privileges when he's suspected of killing his family...
  • Bank of America having system issues for six days now (vanity)

    02/07/2015 8:10:44 PM PST · by ColdSteelTalon · 29 replies
    Looks like Bank of America is down. I was just told to call back on Monday to pay my credit card bill. WOW.
  • 5000 times more conductive 3D printer ink for parts with embedded functional electronics and wiring

    02/06/2015 2:13:19 AM PST · by 2ndDivisionVet · 14 replies
    Next Big Future ^ | January 13, 2015 | Brian Wang
    Voxel8, creator of the world’s first multi-material 3D electronics printer and backed by Braemar Energy Ventures, announced pre-order availability of its initial product – the Voxel8 Developer’s Kit. Voxel8 also announced its partnership with Autodesk to develop a new design tool called Project Wire for creating 3D electronic devices printed on Voxel8’s platform. Together, Voxel8 and Autodesk are enabling designers and engineers to create three-dimensional parts with embedded circuitry for the first time. Rapidly design novel devices, such as 3D printed antennas, electromagnetic coils, or stack ICs in ways that were previously impossible. Eliminate wire harnesses by combining them with...
  • Utah's massive NSA data center using more water

    02/04/2015 9:08:53 PM PST · by Colofornian · 42 replies
    WRAL ^ | February 2, 2015 | Associated Press
    <p>Records show the National Security Agency data center in Utah used more water in 2014, though the usage is still far lower than expected. The water usage peaked at 6.6 million gallons for the month of August.</p>
  • Gas Stations Urged To Secure Internet-Exposed Fuel Tank Devices

    01/30/2015 1:18:58 AM PST · by Citizen Zed · 8 replies
    Dark Reading ^ | 1-26-2015 | Kelly Jackson Higgins
    Some 5,800 automated tank gauges, which monitor for fuel leaks and other problems with the tanks as well as fuel levels, recently were found sitting wide open on the Internet without password protection, leaving more than 5,000 gas stations in the US vulnerable to attackers who could remotely alter the alarm thresholds to simulate a leak, disrupt the fuel tank operations, and worst-case, wreak havoc by shutting down the gas stations altogether, researchers say. Rapid 7 chief research officer HD Moore says his team scanned for the vulnerable devices after getting a heads up from Jack Chadowitz, president and CEO...
  • Tech’s High Barrier to Entry for the Underprivileged

    01/28/2015 8:54:11 PM PST · by 2ndDivisionVet · 17 replies
    Medium's Backchannel ^ | January 25, 2015 | Gerard O'Neill
    For many people who didn’t grow up in or around New York City, there are a few things that come to mind when they hear the name “Brooklyn.” Many automatically think of hipsters and indie rock concerts. Some think of artsy lofts and farmers markets. Others think of “brownstone Brooklyn,” where one can potentially afford a cute home and raise a middle-class family without the distance and suburban-like qualities of Queens. What people typically don’t think about are the underprivileged communities that exist here, many of which have become home to people priced out of their old homes in brownstone...
  • FBI Seeks To Legally Hack You If You're Connected To TOR Or a VPN

    01/25/2015 11:15:40 PM PST · by LibWhacker · 55 replies
    Slashdot.org ^ | 1/20/15
    The investigative arm of the Department of Justice is attempting to short-circuit the legal checks of the Fourth Amendment by requesting a change in the Federal Rules of Criminal Procedure. These procedural rules dictate how law enforcement agencies must conduct criminal prosecutions, from investigation to trial. Any deviations from the rules can have serious consequences, including dismissal of a case. The specific rule the FBI is targeting outlines the terms for obtaining a search warrant. It's called Federal Rule 41(b), and the requested change would allow law enforcement to obtain a warrant to search electronic data without providing any specific...
  • Adobe acknowledges critical remote vulnerability in Flash, exploits already in the wild

    01/25/2015 9:08:43 PM PST · by Swordmaker · 67 replies
    AppleInsider ^ | Sunday, January 25, 2015 | By AppleInsider Staff
    Adobe on Saturday released an updated version of its Flash player software that patches an undisclosed vulnerability which could allow remote attackers to take control of Macs or PCs, urging users to update as the problem is being actively exploited by malicious actors. Flash versions up to and including 16.0.0.287 on OS X and Windows and 11.2.202.438 on Linux are susceptible to the attack, the cause of which has yet to be detailed. Mac users with Adobe's automatic update feature enabled should begin receiving updates to version 16.0.0.296 immediately, and the company is preparing a standalone patch for manual installation...
  • Google drops three OS X zero-day vulnerabilities on Apple

    01/24/2015 1:41:55 AM PST · by Swordmaker · 7 replies
    MacDailyNews ^ | Friday, January 23, 2015
    “Don’t look now, but Google’s Project Zero vulnerability research program may have dropped more zero-day vulnerabilities—this time on Apple’s OS X platform,” Dan Goodin reports for Ars Technica. “” “In the past two days, Project Zero has disclosed [three] OS X vulnerabilities,” Goodin reports. “At first glance, none of them appear to be highly critical, since all three appear to require the attacker to already have some access to a targeted machine.” ‘Still, the exploits could be combined with a separate attack to elevate lower-level privileges and gain control over vulnerable Macs,” Goodin reports. “And since the disclosures contain proof-of-concept...
  • What 'MacKeeper' is and why you should avoid it

    01/21/2015 10:23:51 PM PST · by Swordmaker · 54 replies
    iMore ^ | Wednesday, Jan 21, 2015 | By Peter Cohen
    Literally every time I work in the computer store, we'll get a customer whose Mac is plagued with problems they don't understand: Their Mac is acting slow. It crashes. And more. And in more cases than not, we find that they've installed a program called MacKeeper. Removing MacKeeper fixes the problem. So what is MacKeeper and why should you avoid it? MacKeeper was originally developed by a company called Zeobit and was sold a couple of years ago to another firm called Kromtech. The software purports to be a suite of more than a dozen individual utilities that are actually...
  • Windows 10 isn’t just a step back to the desktop, it’s a step up

    01/21/2015 6:27:53 PM PST · by smokingfrog · 95 replies
    digital +rends ^ | 1-21-15 | Matt Smith
    Today’s Windows event was the flashiest to grace Redmond in years. The company pulled a number of projects, like HoloLens, out of its skunk works in an effort to convince finicky geeks it isn’t out of ideas. Whether this gambit was successful is hard to say (the Twittersphere seems impressed), but in a few weeks it will also be irrelevant. Microsoft’s problem has always been execution, not imagination. Kinect, Courier and even Windows 8.1 are examples of ideas getting ahead of reality. Yet this event wasn’t entirely about concepts and prototypes. Alongside holograms and room-sized tablets, the company also displayed...
  • End of the Windows XP effect sends desktop sales tumbling, but laptop sales jump

    01/20/2015 10:09:38 AM PST · by smokingfrog · 27 replies
    ZD Net ^ | 1-20-15 | Steve Ranger
    Despite predictions to the contrary, it seem there is still plenty of life left in the PC market. PC shipments across Europe, the Middle East, and Africa (EMEA) reached 25.5 million units in the fourth quarter of 2014, a two percent increase on the same quarter a year ago, according to calculations by IDC. It said strong consumer demand during the holiday season meant the PC market racked up a third consecutive quarter of growth - albeit modest and patchy. PC sales across the region grew by 5.5 percent across the year, with 93.3 million PCs shipped. But the researchers...
  • The Digital Arms Race: NSA Preps America for Future Battle

    01/18/2015 5:03:16 AM PST · by LibWhacker · 8 replies
    Spiegel ^ | 1/17/15 | Jacob Appelbaum, Aaron Gibson, Claudio Guarnieri, Andy Müller-Maguhn, Laura Poitras, Marcel Rosenbac
    The NSA's mass surveillance is just the beginning. Documents from Edward Snowden show that the intelligence agency is arming America for future digital wars -- a struggle for control of the Internet that is already well underway. Normally, internship applicants need to have polished resumes, with volunteer work on social projects considered a plus. But at Politerain, the job posting calls for candidates with significantly different skill sets. We are, the ad says, "looking for interns who want to break things." Politerain is not a project associated with a conventional company. It is run by a US government intelligence...
  • Why You Should (or Shouldn't) Switch to Each Leading Linux Desktop

    01/15/2015 10:30:48 AM PST · by ShadowAce · 26 replies
    Datamation ^ | 13 January 2015 | Bruce Byfield
    The perfect desktop is undoubtedly the one you would design yourself. However, lacking the necessary time and expertise, many users hop instead from desktop to desktop desktop with the same enthusiasm as others hop between distros, hoping to find the ideal distribution.In many cases, they never find their ideal, and for good reason -- even the simplest Linux desktop is a mixture of advantages and disadvantages.Here, for example, are some core reasons for both accepting and rejecting the seven leading desktops of today:Cinnamon Leading Advantage: Like MATE, Linux Mint's other desktop, Cinnamon is a classic desktop for GNOME-based applications. However,...
  • Anonymous Vows Revenge And Destruction Upon Al-Qaeda And ISIS

    01/09/2015 6:58:11 PM PST · by God luvs America · 53 replies
    Truth Revolt ^ | Jan 9th, 2015 | Yehuda Remer
    "You will not impose your Sharia law in our democracies. We will not let your stupidity kill our liberties and our freedom of expression." The hacktivist group known as Anonymous has officially declared war on Al-Qaeda and ISIS. A new video by the hackers' Belgian branch is calling to avenge the killings at satirical newspaper Charlie Hebdo, with the new operation being called #OpCharlieHebdo. (Watch the video here with English translation.) "We will track you down - every last one - and will kill you,” says an individual wearing a Guy Fawkes in French. "You allowed yourselves to kill innocent...
  • ‘Super Cookies’ Track Your Private Web Browsing — Apple Users Can't Get Rid Of Them

    01/08/2015 3:04:25 PM PST · by Swordmaker · 42 replies
    Business Insider ^ | JAN. 8, 2015, 8:30 AM | ROB PRICE
    A security flaw means that users of almost every modern web browser can be surreptitiously tracked online without their knowledge, Ars Technica reports, even when they make use of “private browsing.” Apple users are particularly vulnerable, as their devices do not have a function that lets users delete super cookies from their browsers. Most websites place what’s called a “cookie” on visitors’ computers, which is used to track them and record their preferences. It’s how websites can remember your password, for example. Like your web-browsing history, cookies are easy to delete. If you use your browser’s “private browsing” mode, they’re...
  • Extra 'Leap Second' Will Be Added to Clocks June 30 [Ruh-roh!]

    01/08/2015 10:03:45 AM PST · by Red Badger · 31 replies
    www.ibtimes.com ^ | January 05 2015 9:25 PM or thereabouts | By Catherine Dunn
    Sometimes even the rotation of the Earth falls behind schedule. Come June 30, our planet's timekeepers will compensate by adding a "leap second" to clocks. The International Earth Rotation and Reference Systems Service (IERS) announced the change Monday at the Paris Observatory, in a bulletin addressed to the "authorities responsible for the measurement and distribution of time." The bulletin advises authorities the extra second will be introduced to Coordinated Universal Time (UTC) during the final minute, of the final day of June. That means that right after the clock hits "23h 59m 59s," it will strike "23h 59m 60s" UTC....
  • This year, I resolve to ban laptops from my classroom

    01/05/2015 5:58:02 AM PST · by C19fan · 54 replies
    Washington Post ^ | December 30, 2014 | Tal Gross
    I settled on my New Year’s resolution while giving a lecture to 85 masters students. It was one kid who unintentionally suggested the idea. He was sitting in the back row, silently pecking away at his laptop the entire class. At times, he smiled at his screen. But he rarely looked up at me. I had a choice. I could disrupt the class to single him out. Or I could do what most teachers in higher education do: just ignore it. After all, these students are adults, and they have to take a final exam. Do I have to be...
  • Flight 8501 Poses Question: Are Modern Jets Too Automated to Fly?

    01/04/2015 5:39:05 AM PST · by C19fan · 42 replies
    Daily Beast ^ | January 4, 2014 | Clive Irving
    Too many computers and not enough “hands-on” flying mean most pilots would have fallen victim to the weather that brought down AirAsia 8501. As searchers close in on what appears to be the main wreckage of AirAsia Flight 8501 the retrieval of the airplane’s flight data and cockpit voice recorders should soon follow. The wreckage lies no more than around 100 feet down in the Java Sea. Although there are strong currents and poor visibility, compounded by the high seas generated by stormy weather, divers should be able to locate the rear end of the fuselage where the flight data...
  • It’s a beautiful time to be alive and educated

    01/02/2015 7:39:17 AM PST · by 2ndDivisionVet · 27 replies
    Your Story ^ | January 2, 2015 | Vivek Wadhwa
    I grew up watching Star Trek and believing that by the time I became an adult we would all be using communicators, replicators, tricorders, and transporters. I was optimistic that the world would be a much better place: that we would have solved humanity’s problems and be exploring new worlds. That’s why my first career choice was one of astronaut. I thought it would best prepare me for Starfleet Academy. Needless to say, I was disappointed. I grew up into a world filled with hunger, poverty, and disease—in which we fight wars over dwindling natural resources. It is a world...
  • A Favicon Question,,mystery,,

    12/31/2014 4:10:35 PM PST · by MeshugeMikey · 6 replies
    MeshugeMikey | December 31m 2014 | self
    A Favicon. for the "non initiated " that tiny little icon that displays in the address bar whenever a web site provides a the proper file for same. One of my browsers doesnt display a favicon for the drudge report...one has chosen to "adopt" a YAHOO Icon for that site. While I dont necessarily view this ias problematic...it is somewhat of a mystery. anyone have any ideas?
  • The Most Futuristic Predictions That Came True In 2014

    12/31/2014 5:52:51 AM PST · by Mellonkronos · 6 replies
    io9 ^ | December 29, 2014 | George Dvorsky
    [Most of these, except for a couple, are very positive achievements. Let’s work for more in 2015, Happy New Year!] The Most Futuristic Predictions That Came True In 2014 By George Dvorsky As 2014 comes to a close, it's time to reflect on the most futuristic breakthroughs and developments of the past year. This year's crop features a slew of incredible technological, scientific, and social achievements, from mind-to-mind communication to self-guiding sniper bullets. Here are 15 predictions that came true in 2014. Technologically-assisted telepathy was successfully demonstrated in humans For the first time ever, two humans exchanged thoughts via mind-to-mind...
  • Comcast says I need a new Docsis 3.0 modem in January 2015. .....But I am skeptical (vanity)

    12/29/2014 2:00:12 PM PST · by dennisw · 34 replies
    Dec 2014 | self
    Freeper tech gurus I have a Motorola surfboard that has served me well for 8 years. It is probably Docsis 2.0...... I am topping out at 30 mbps which is good enough. Some internet reports say I can double this speed with a newer Docsis 3.0 modem I get phone calls from Comcast saying I will need this newer type modem or will have trouble with reception due to them upgrading where I am to a docsis 3.0 system. So I need the compatible modem Do I really need the newer 3.0 modem? THANKS!
  • There Are Signs That Someone Has Launched A Cyberattack Against North Korea

    12/22/2014 12:19:28 PM PST · by blam · 33 replies
    BI ^ | 12-21-2014 | James Cook
    James Cook December 22, 2014 North Korea appears to be suffering from a cyberattack that has brought down the country's internet connection. North Korea Tech is reporting, via Vox, that there were frequent outages on North Korea's internet network over the weekend. This chart from Dyn Research shows that North Korean websites have been going through regular outages: North Korea internet outagesDyn Research/North Korea Tech Internet connection issues aren't definite proof that someone is trying to attack North Korea. The country's internet is only accessed by a handful of people, so it doesn't take much to force it offline. Officially...
  • Proof that The End of Moore’s Law is Not The End of The Singularity

    12/06/2014 1:48:55 PM PST · by 2ndDivisionVet · 14 replies
    Lifeboat News - Safeguarding Humanity The Blog ^ | December 5, 2014 | Eric Klien
    During the last few years, the semiconductor industry has been having a harder and harder time miniaturizing transistors with the latest problem being Intel’s delayed roll-out of its new 14 nm process. The best way to confirm this slowdown in progress of computing power is to try to run your current programs on a 6-year-old computer. You will likely have few problems since computers have not sped up greatly during the past 6 years. If you had tried this experiment a decade ago you would have found a 6-year-old computer to be close to useless as Intel and others were...