Free Republic 1st Quarter Fundraising Target: $88,000 Receipts & Pledges to-date: $29,077
33%  
Woo hoo!! And the first 33% is in!! Thank you all very much!!

Keyword: computers

Brevity: Headers | « Text »
  • FBI Seeks To Legally Hack You If You're Connected To TOR Or a VPN

    01/25/2015 11:15:40 PM PST · by LibWhacker · 49 replies
    Slashdot.org ^ | 1/20/15
    The investigative arm of the Department of Justice is attempting to short-circuit the legal checks of the Fourth Amendment by requesting a change in the Federal Rules of Criminal Procedure. These procedural rules dictate how law enforcement agencies must conduct criminal prosecutions, from investigation to trial. Any deviations from the rules can have serious consequences, including dismissal of a case. The specific rule the FBI is targeting outlines the terms for obtaining a search warrant. It's called Federal Rule 41(b), and the requested change would allow law enforcement to obtain a warrant to search electronic data without providing any specific...
  • Adobe acknowledges critical remote vulnerability in Flash, exploits already in the wild

    01/25/2015 9:08:43 PM PST · by Swordmaker · 56 replies
    AppleInsider ^ | Sunday, January 25, 2015 | By AppleInsider Staff
    Adobe on Saturday released an updated version of its Flash player software that patches an undisclosed vulnerability which could allow remote attackers to take control of Macs or PCs, urging users to update as the problem is being actively exploited by malicious actors. Flash versions up to and including 16.0.0.287 on OS X and Windows and 11.2.202.438 on Linux are susceptible to the attack, the cause of which has yet to be detailed. Mac users with Adobe's automatic update feature enabled should begin receiving updates to version 16.0.0.296 immediately, and the company is preparing a standalone patch for manual installation...
  • Google drops three OS X zero-day vulnerabilities on Apple

    01/24/2015 1:41:55 AM PST · by Swordmaker · 7 replies
    MacDailyNews ^ | Friday, January 23, 2015
    “Don’t look now, but Google’s Project Zero vulnerability research program may have dropped more zero-day vulnerabilities—this time on Apple’s OS X platform,” Dan Goodin reports for Ars Technica. “” “In the past two days, Project Zero has disclosed [three] OS X vulnerabilities,” Goodin reports. “At first glance, none of them appear to be highly critical, since all three appear to require the attacker to already have some access to a targeted machine.” ‘Still, the exploits could be combined with a separate attack to elevate lower-level privileges and gain control over vulnerable Macs,” Goodin reports. “And since the disclosures contain proof-of-concept...
  • What 'MacKeeper' is and why you should avoid it

    01/21/2015 10:23:51 PM PST · by Swordmaker · 54 replies
    iMore ^ | Wednesday, Jan 21, 2015 | By Peter Cohen
    Literally every time I work in the computer store, we'll get a customer whose Mac is plagued with problems they don't understand: Their Mac is acting slow. It crashes. And more. And in more cases than not, we find that they've installed a program called MacKeeper. Removing MacKeeper fixes the problem. So what is MacKeeper and why should you avoid it? MacKeeper was originally developed by a company called Zeobit and was sold a couple of years ago to another firm called Kromtech. The software purports to be a suite of more than a dozen individual utilities that are actually...
  • Windows 10 isn’t just a step back to the desktop, it’s a step up

    01/21/2015 6:27:53 PM PST · by smokingfrog · 95 replies
    digital +rends ^ | 1-21-15 | Matt Smith
    Today’s Windows event was the flashiest to grace Redmond in years. The company pulled a number of projects, like HoloLens, out of its skunk works in an effort to convince finicky geeks it isn’t out of ideas. Whether this gambit was successful is hard to say (the Twittersphere seems impressed), but in a few weeks it will also be irrelevant. Microsoft’s problem has always been execution, not imagination. Kinect, Courier and even Windows 8.1 are examples of ideas getting ahead of reality. Yet this event wasn’t entirely about concepts and prototypes. Alongside holograms and room-sized tablets, the company also displayed...
  • End of the Windows XP effect sends desktop sales tumbling, but laptop sales jump

    01/20/2015 10:09:38 AM PST · by smokingfrog · 27 replies
    ZD Net ^ | 1-20-15 | Steve Ranger
    Despite predictions to the contrary, it seem there is still plenty of life left in the PC market. PC shipments across Europe, the Middle East, and Africa (EMEA) reached 25.5 million units in the fourth quarter of 2014, a two percent increase on the same quarter a year ago, according to calculations by IDC. It said strong consumer demand during the holiday season meant the PC market racked up a third consecutive quarter of growth - albeit modest and patchy. PC sales across the region grew by 5.5 percent across the year, with 93.3 million PCs shipped. But the researchers...
  • The Digital Arms Race: NSA Preps America for Future Battle

    01/18/2015 5:03:16 AM PST · by LibWhacker · 8 replies
    Spiegel ^ | 1/17/15 | Jacob Appelbaum, Aaron Gibson, Claudio Guarnieri, Andy Müller-Maguhn, Laura Poitras, Marcel Rosenbac
    The NSA's mass surveillance is just the beginning. Documents from Edward Snowden show that the intelligence agency is arming America for future digital wars -- a struggle for control of the Internet that is already well underway. Normally, internship applicants need to have polished resumes, with volunteer work on social projects considered a plus. But at Politerain, the job posting calls for candidates with significantly different skill sets. We are, the ad says, "looking for interns who want to break things." Politerain is not a project associated with a conventional company. It is run by a US government intelligence...
  • Why You Should (or Shouldn't) Switch to Each Leading Linux Desktop

    01/15/2015 10:30:48 AM PST · by ShadowAce · 26 replies
    Datamation ^ | 13 January 2015 | Bruce Byfield
    The perfect desktop is undoubtedly the one you would design yourself. However, lacking the necessary time and expertise, many users hop instead from desktop to desktop desktop with the same enthusiasm as others hop between distros, hoping to find the ideal distribution.In many cases, they never find their ideal, and for good reason -- even the simplest Linux desktop is a mixture of advantages and disadvantages.Here, for example, are some core reasons for both accepting and rejecting the seven leading desktops of today:Cinnamon Leading Advantage: Like MATE, Linux Mint's other desktop, Cinnamon is a classic desktop for GNOME-based applications. However,...
  • Anonymous Vows Revenge And Destruction Upon Al-Qaeda And ISIS

    01/09/2015 6:58:11 PM PST · by God luvs America · 53 replies
    Truth Revolt ^ | Jan 9th, 2015 | Yehuda Remer
    "You will not impose your Sharia law in our democracies. We will not let your stupidity kill our liberties and our freedom of expression." The hacktivist group known as Anonymous has officially declared war on Al-Qaeda and ISIS. A new video by the hackers' Belgian branch is calling to avenge the killings at satirical newspaper Charlie Hebdo, with the new operation being called #OpCharlieHebdo. (Watch the video here with English translation.) "We will track you down - every last one - and will kill you,” says an individual wearing a Guy Fawkes in French. "You allowed yourselves to kill innocent...
  • ‘Super Cookies’ Track Your Private Web Browsing — Apple Users Can't Get Rid Of Them

    01/08/2015 3:04:25 PM PST · by Swordmaker · 42 replies
    Business Insider ^ | JAN. 8, 2015, 8:30 AM | ROB PRICE
    A security flaw means that users of almost every modern web browser can be surreptitiously tracked online without their knowledge, Ars Technica reports, even when they make use of “private browsing.” Apple users are particularly vulnerable, as their devices do not have a function that lets users delete super cookies from their browsers. Most websites place what’s called a “cookie” on visitors’ computers, which is used to track them and record their preferences. It’s how websites can remember your password, for example. Like your web-browsing history, cookies are easy to delete. If you use your browser’s “private browsing” mode, they’re...
  • Extra 'Leap Second' Will Be Added to Clocks June 30 [Ruh-roh!]

    01/08/2015 10:03:45 AM PST · by Red Badger · 31 replies
    www.ibtimes.com ^ | January 05 2015 9:25 PM or thereabouts | By Catherine Dunn
    Sometimes even the rotation of the Earth falls behind schedule. Come June 30, our planet's timekeepers will compensate by adding a "leap second" to clocks. The International Earth Rotation and Reference Systems Service (IERS) announced the change Monday at the Paris Observatory, in a bulletin addressed to the "authorities responsible for the measurement and distribution of time." The bulletin advises authorities the extra second will be introduced to Coordinated Universal Time (UTC) during the final minute, of the final day of June. That means that right after the clock hits "23h 59m 59s," it will strike "23h 59m 60s" UTC....
  • This year, I resolve to ban laptops from my classroom

    01/05/2015 5:58:02 AM PST · by C19fan · 54 replies
    Washington Post ^ | December 30, 2014 | Tal Gross
    I settled on my New Year’s resolution while giving a lecture to 85 masters students. It was one kid who unintentionally suggested the idea. He was sitting in the back row, silently pecking away at his laptop the entire class. At times, he smiled at his screen. But he rarely looked up at me. I had a choice. I could disrupt the class to single him out. Or I could do what most teachers in higher education do: just ignore it. After all, these students are adults, and they have to take a final exam. Do I have to be...
  • Flight 8501 Poses Question: Are Modern Jets Too Automated to Fly?

    01/04/2015 5:39:05 AM PST · by C19fan · 42 replies
    Daily Beast ^ | January 4, 2014 | Clive Irving
    Too many computers and not enough “hands-on” flying mean most pilots would have fallen victim to the weather that brought down AirAsia 8501. As searchers close in on what appears to be the main wreckage of AirAsia Flight 8501 the retrieval of the airplane’s flight data and cockpit voice recorders should soon follow. The wreckage lies no more than around 100 feet down in the Java Sea. Although there are strong currents and poor visibility, compounded by the high seas generated by stormy weather, divers should be able to locate the rear end of the fuselage where the flight data...
  • It’s a beautiful time to be alive and educated

    01/02/2015 7:39:17 AM PST · by 2ndDivisionVet · 27 replies
    Your Story ^ | January 2, 2015 | Vivek Wadhwa
    I grew up watching Star Trek and believing that by the time I became an adult we would all be using communicators, replicators, tricorders, and transporters. I was optimistic that the world would be a much better place: that we would have solved humanity’s problems and be exploring new worlds. That’s why my first career choice was one of astronaut. I thought it would best prepare me for Starfleet Academy. Needless to say, I was disappointed. I grew up into a world filled with hunger, poverty, and disease—in which we fight wars over dwindling natural resources. It is a world...
  • A Favicon Question,,mystery,,

    12/31/2014 4:10:35 PM PST · by MeshugeMikey · 6 replies
    MeshugeMikey | December 31m 2014 | self
    A Favicon. for the "non initiated " that tiny little icon that displays in the address bar whenever a web site provides a the proper file for same. One of my browsers doesnt display a favicon for the drudge report...one has chosen to "adopt" a YAHOO Icon for that site. While I dont necessarily view this ias problematic...it is somewhat of a mystery. anyone have any ideas?
  • The Most Futuristic Predictions That Came True In 2014

    12/31/2014 5:52:51 AM PST · by Mellonkronos · 6 replies
    io9 ^ | December 29, 2014 | George Dvorsky
    [Most of these, except for a couple, are very positive achievements. Let’s work for more in 2015, Happy New Year!] The Most Futuristic Predictions That Came True In 2014 By George Dvorsky As 2014 comes to a close, it's time to reflect on the most futuristic breakthroughs and developments of the past year. This year's crop features a slew of incredible technological, scientific, and social achievements, from mind-to-mind communication to self-guiding sniper bullets. Here are 15 predictions that came true in 2014. Technologically-assisted telepathy was successfully demonstrated in humans For the first time ever, two humans exchanged thoughts via mind-to-mind...
  • Comcast says I need a new Docsis 3.0 modem in January 2015. .....But I am skeptical (vanity)

    12/29/2014 2:00:12 PM PST · by dennisw · 34 replies
    Dec 2014 | self
    Freeper tech gurus I have a Motorola surfboard that has served me well for 8 years. It is probably Docsis 2.0...... I am topping out at 30 mbps which is good enough. Some internet reports say I can double this speed with a newer Docsis 3.0 modem I get phone calls from Comcast saying I will need this newer type modem or will have trouble with reception due to them upgrading where I am to a docsis 3.0 system. So I need the compatible modem Do I really need the newer 3.0 modem? THANKS!
  • There Are Signs That Someone Has Launched A Cyberattack Against North Korea

    12/22/2014 12:19:28 PM PST · by blam · 33 replies
    BI ^ | 12-21-2014 | James Cook
    James Cook December 22, 2014 North Korea appears to be suffering from a cyberattack that has brought down the country's internet connection. North Korea Tech is reporting, via Vox, that there were frequent outages on North Korea's internet network over the weekend. This chart from Dyn Research shows that North Korean websites have been going through regular outages: North Korea internet outagesDyn Research/North Korea Tech Internet connection issues aren't definite proof that someone is trying to attack North Korea. The country's internet is only accessed by a handful of people, so it doesn't take much to force it offline. Officially...
  • Proof that The End of Moore’s Law is Not The End of The Singularity

    12/06/2014 1:48:55 PM PST · by 2ndDivisionVet · 14 replies
    Lifeboat News - Safeguarding Humanity The Blog ^ | December 5, 2014 | Eric Klien
    During the last few years, the semiconductor industry has been having a harder and harder time miniaturizing transistors with the latest problem being Intel’s delayed roll-out of its new 14 nm process. The best way to confirm this slowdown in progress of computing power is to try to run your current programs on a 6-year-old computer. You will likely have few problems since computers have not sped up greatly during the past 6 years. If you had tried this experiment a decade ago you would have found a 6-year-old computer to be close to useless as Intel and others were...
  • Why the new 5G network will change your life

    12/04/2014 8:24:14 AM PST · by 2ndDivisionVet · 67 replies
    The London Metro's Tech Blog ^ | December 1, 2014 | Rob Waugh
    You might only just have got your head round the idea of 4G, but a new network is just around the corner, and it could be 100s of times faster – and the new technology could lead to a world where everything from your car to your lightbulbs ‘talk to you’ via apps. When David Cameron first mentioned research into 5G, he suggested 5G-equipped devices could download HD films in a second – but the new network might be so fast it can download 800 films per second, according to University of Surrey researchers. ‘Latency’ – that annoying ‘lag’ when...
  • Hacked Windows XP still updates, still a bad idea (not a bad idea!)

    12/03/2014 7:27:21 PM PST · by dennisw · 16 replies
    zdnet ^ | December 3, 2014 | Larry Seltzer
    Summary: Yes, you still can trick Microsoft into giving you security updates for Windows XP. No, it's not a good idea. You are not protected. Perhaps the most popular story I've written for ZDNet was the one explaining how you can hack the registry in Windows XP and trick Windows Update into continuing to send you security updates. The basis of it is that Microsoft has an embedded variant of Windows XP and support doesn't end on that until April 2016. The hack makes XP look like the embedded version. I have maintained a Hyper-V VM on a Windows 8.1...
  • Need computer help with FireFox Version 34

    12/02/2014 3:33:33 AM PST · by hsmomx3 · 70 replies
    self
    I am using WIN 8.1 OS and yesterday the latest version of Firefox was updated on to my computer. I can't access the browser as when I open it, the page is blank and I get the "page is not responding." According to my computer, it is telling me that this latest browser is NOT compatible with OS 8.1. I am unable to go back to an earlier version of Firefox. Any advice would be most appreciated!
  • Intel to merge struggling mobile chip unit into its PC chip business

    11/22/2014 11:44:17 AM PST · by Ernest_at_the_Beach · 18 replies
    hexus.net ^ | 18 November 2014, 11:05 | by Mark Tyson
    Intel CEO Brain Krzanich has announced, in an email sent to employees on Monday, new company plans to merge its loss-making mobile chip unit with its profitable PC business early next year, writes the Wall Street Journal. "The market continues to evolve rapidly, and we must change even faster to stay ahead," Krzanich asserted in the email. It is well known that Intel has struggled to gain a foothold in mobile computing, but even worse for the business its tablet and smartphone chip-making division has lost billions in the recent months. Intel's mobile communication group posted a $1 billion operating...
  • Now e-cigarettes can give you malware

    11/21/2014 3:40:53 PM PST · by upchuck · 20 replies
    Guardian ^ | Nov 21, 2014 | Alex Hern
    E-cigarettes may be better for your health than normal ones, but spare a thought for your poor computer – electronic cigarettes have become the latest vector for malicious software, according to online reports. Many e-cigarettes can be charged over USB, either with a special cable, or by plugging the cigarette itself directly into a USB port. That might be a USB port plugged into a wall socket or the port on a computer – but, if so, that means that a cheap e-cigarette from an untrustworthy supplier gains physical access to a device. A report on social news site Reddit...
  • State Dept computers hacked, email shut down

    11/16/2014 8:37:34 PM PST · by Ernest_at_the_Beach · 15 replies
    AP ^ | Nov 16, 3:40 PM EST | By MATTHEW LEE AP Diplomatic Writer
    WASHINGTON (AP) -- The State Department has taken the unprecedented step of shutting down its entire unclassified email system as technicians repair possible damage from a suspected hacker attack.
  • The man who can hear Wi-Fi wherever he walks [hearing aids]

    11/14/2014 11:01:04 AM PST · by BenLurkin · 17 replies
    newscientist.com ^ | 12 November 2014 | by Frank Swain
    I am walking through my north London neighbourhood on an unseasonably warm day in late autumn. I can hear birds tweeting in the trees, traffic prowling the back roads, children playing in gardens and Wi-Fi leaching from their homes. Against the familiar sounds of suburban life, it is somehow incongruous and appropriate at the same time. As I approach Turnpike Lane tube station and descend to the underground platform, I catch the now familiar gurgle of the public Wi-Fi hub, as well as the staff network beside it. On board the train, these sounds fade into silence as we burrow...
  • Can someone explain, in plain English, what 'NET NEUTRALITY' means?

    11/13/2014 6:04:17 AM PST · by maineman · 93 replies
    11/13/2014 | maineman
    I've researched the heck out of this BUT still don't get it. Just looking for a simple explanation for a simple man.
  • Man embeds computer chips in hands to store Bitcoin [Mark of the Beast?]

    11/11/2014 6:44:51 AM PST · by Red Badger · 31 replies
    www.telegraph.co.uk ^ | 3:41PM GMT 10 Nov 2014 | By Matthew Sparkes, Deputy Head of Technology
    By implanting 12mm glass computer chips in his flesh Martijn Wismeijer has been able to store Bitcoins inside his body, create a personalised alarm clock and will even be able to install keyless doors in his home. But how painful is the injection? A Dutch entrepreneur has had two wireless computer chips implanted under the skin in his hands to allow him to store digital currencies like Bitcoin inside his body. Martijn Wismeijer is the founder of Mr Bitcoin, a company which installs and operates crypto-currency cash machines in and around his native Amsterdam and across Europe. This month he...
  • Microsoft's CEO Gave Us The Clearest Vision For The Company We've Had In Years

    11/10/2014 8:50:35 AM PST · by SeekAndFind · 3 replies
    Business Insider ^ | 11/10/2014 | Steve Kovach
    Over the last few years, it’s been tough to pinpoint what Microsoft’s focus is. In 2012, then-CEO Steve Ballmer wrote an open letter to shareholders labeling Microsoft as a “devices and services” company. It was a signal that Microsoft would not only make the software that people use, but the devices that software runs on. That’s a very Apple-like philosophy, but one that hasn’t paid off for Microsoft as we’ve seen with its Surface line of tablets and acquisition of Nokia. The narrative shifted when Satya Nadella took over as CEO in April. Hardware took a backseat to what he...
  • This 3D Printer Is Made Out of a Floppy Disk Drive and Other E-Waste

    11/06/2014 12:57:12 PM PST · by 2ndDivisionVet · 5 replies
    Kinja's Gizmodo ^ | November 5, 2014 | Kelsey Campbell-Dollaghan
    When was the last time you used your computer's disc drive? What about your DVD player? E-waste is all around us, but as the brilliant Instructables user behind this $60 3D printer proves, there's plenty to be done with it—if you've got some engineering chops. Last week we wrote about the world's smallest 3D printer, which costs less than $300 and prints resin. But an Instructables user named Mikelllc has gone way further, uploading his designs for a 3D printer made from 80 percent recycled e-waste and costing roughly $60. Part of the idea, he writes, is to "help us...
  • What will life be like in 2064?

    11/03/2014 10:12:27 PM PST · by 2ndDivisionVet · 44 replies
    World Economic Forum ^ | October 8, 2014 | Martin Sorrell
    That an octopus called Paul had a better success rate than Goldman Sachs when predicting World Cup results (credit to the Wall Street Journal for the headline “Octopus Beats Vampire Squid”) tells you something about the wisdom of guessing the future in public. Guessing what the world will look like in 50 years’ time, however, is pretty safe, as I won’t be here to see myself proved wrong. Or will I? If Google’s director of engineering has his way, we’ll all be around indefinitely – in the cloud at least. AI (artificial intelligence) guru Ray Kurzweil is one of a...
  • The highly sophisticated hacking of Sharyl Attkisson's computers

    10/28/2014 6:06:07 AM PDT · by Former Proud Canadian · 62 replies
    Fox News ^ | October 28, 2014 | Howard Kurtz
    From the moment that Sharyl Attkisson met a shadowy source I’ll call Big Mac, she was plunged into a nightmare involving mysterious surveillance of her computers. They met at a McDonald’s in Northern Virginia at the beginning of 2013, and the source (she dubs him Number One) warned her about the threat of government spying. During their next hamburger rendezvous, Big Mac told Attkisson, then a CBS News reporter constantly at odds with the Obama administration, that he was “shocked” and “flabbergasted” by his examination of her computer and that this was “worse than anything Nixon ever did.” Attkisson’s forthcoming...
  • Retailers are disabling NFC readers to shut out Apple Pay

    10/26/2014 3:20:18 PM PDT · by ImJustAnotherOkie · 85 replies
    The Verge ^ | October 25, 2014 01:09 pm | By Dante D'Orazio
    There's a lot of hype around Apple Pay right now, but not everyone is on board with the new mobile payments system. In fact, a significant number of merchants, including heavyweights like Walmart, Kmart, 7-Eleven, and Best Buy, are in outright competition with Apple Pay. The retailers, through a joint venture formed in 2012, are building their own mobile payment app, called CurrentC. It's expected to launch next year. In the meantime, these retailers have no intention to support Apple Pay. Following Apple's announcement last month, both Wal-Mart and Best Buy confirmed to The Wall Street Journal that customers would...
  • Any Freeper IT independent consultants?

    10/25/2014 4:58:03 PM PDT · by taxcontrol · 30 replies
    None ^ | 25 Oct 2014 | Self
    So my company had a downsize / RIF / layoff and my group got hit. Sad news but hey, it happens. Now I am looking at being an independent IT consultant. Since I have always been an employee, I was wondering if there were any words of wisdom from the Freeper community.
  • Undetectable, Unpatchable USB-infecting malware is now publically available for anyone to use

    10/25/2014 10:35:47 AM PDT · by null and void · 11 replies
    Electronic Products ^ | Max Teodorescu
    Security experts prove it’s possible to infect USB sticks’ MCU Next time you find a foreign USB lying around, think twice before plugging it into your computer. A pair of security researchers named Karsten Nohl and Jakob Lell demonstrated before an audience at Black hat security conference in Las Vegas a fundamental flaw in USB firmware could be exploited to create an undetected malware that cannot be patched. Realizing the kind of power they were dealing with, the pair opted to keep the code secret – until fellow colleagues decided to post it publically on Github. Two other researchers –...
  • China-backed hackers may have infiltrated Apple's iCloud

    10/20/2014 7:36:36 PM PDT · by Citizen Zed · 17 replies
    Yahoo / Reuters ^ | 10-21-2014
    Apple Inc's iCloud storage and backup service in China was attacked by hackers trying to steal user credentials, a Chinese web monitoring group said, adding that it believes the country's government is behind the campaign. Using a method called a "man-in-the-middle" (MITM) attack, unknown hackers interposed their own website between users and Apple's iCloud server, intercepting data and potentially gaining access to passwords, iMessages, photos and contacts, Greatfire.org wrote in its blog post. Greatfire.org, a group that conducts research on Chinese Internet censorship, alleged government involvement in the attack, saying it resembled previous attacks on Google Inc, Yahoo Inc and...
  • The beginning of the people's Web: 20 years of Netscape

    10/17/2014 5:03:18 PM PDT · by sopwith · 31 replies
    ZDNET ^ | October 14, 2014 | By Steven J. Vaughan-Nichols
    I was the first writer to cover the Web for a popular audience, and it did prove popular. I mean, it must have had hundreds of thousands of users in 1993! Today, Facebook alone has over a billion users. What's Hot on ZDNet Apple releases OS X Yosemite for Mac for free; iWork updated iOS 8.1 available October 20 for iPhones, iPads Apple Pay ready for lift-off and Google 'trying to get it right' Microsoft to 'Connect' with developers at November event in New York You see the problem was that it was really, really hard to use the Web...
  • Sears says Kmart stores targeted in malware attack

    10/10/2014 5:13:21 PM PDT · by John W · 28 replies
    cnbc.com ^ | October 10, 2014 | rma Allen
    Sears Holdings Corp. said Friday that its Kmart stores were hit with a data breach that compromised some shoppers' debit and credit card information. The company is working with federal authorities and security experts to investigate the matter. The Secret Service confirmed Friday evening that it is investigating the data breach. The investigation indicates that the breach occurred in early September and did not affect kmart.com customers, the statement said.
  • Hackers Have Found A Flaw In Macs And Are Using It To Control 17,000 Apple Computers ... Via Reddit

    10/03/2014 8:06:46 AM PDT · by SeekAndFind · 57 replies
    Business Insider ^ | 10/03/2014 | James Cook
    Criminals have discovered a flaw in OS X, the Mac operating system, and are using it to control thousands of Apple computers around the world. The Russian security company Dr. Web first discovered the software, known as "Mac.BackDoor.iWorm." We don't yet know how the software spreads, but Dr. Web has released information on the clever way it connects to the criminals who control the program. When a Mac is infected with Mac.BackDoor.iWorm, the program tries to make a connection to a command server. The iWorm reportedly uses Reddit's search function to find comments left by the criminals in a Minecraft...
  • Microsoft event to talk about fresh-start Windows 9

    09/26/2014 1:20:14 PM PDT · by Red Badger · 81 replies
    PHYS.ORG ^ | 09-26-2014 | by Nancy Owano
    Microsoft is about to introduce Windows 9 next week at an event, ahead of its widespread release in 2015. The project for the next Windows operating system has been given the internal code name as Threshold. Microsoft watchers have noted that the next OS could indeed be a needed threshold move to win back business users who were put off by Windows 8 because of its tiles-based interface instead of the start menu they had relied on in Windows 7 and older Windows versions. The frustration was palpable last year, and one example was a posting in Micro Doctor, a...
  • The Bash Bug Could be a “Joe Biden-sized” Problem – Part 1

    09/26/2014 12:01:55 PM PDT · by lifeofgrace · 11 replies
    Charting Course ^ | 8/26/14 | Steve Berman
    Unless you’re a real-life version of Sheldon Cooper, a computer security professional, or, like me, work in the online payment industry, you probably don’t keep up with the latest computer vulnerabilities.  A new one that’s hit the web news like a tsunami in the last 72 hours is simply called “the bash bug” (sometimes called “shellshock”).  Everyone from Time, to Vox*, to tech site C|Net has covered this story. I am not going to get technical here.  You can read any of the above-mentioned articles which provide plenty of detail on that.  To summarize the problem:  a 25-year-old program that’s...
  • Remote exploit vulnerability in bash CVE-2014-6271

    09/25/2014 10:47:12 AM PDT · by zeugma · 26 replies
    CSOonline ^ | Sep 24, 2014 | Dave Lewis
    A remotely exploitable vulnerability has been discovered by Stephane Chazelas in bash on Linux and it is unpleasant. The vulnerability has the CVE identifier CVE-2014-6271 and has been given the name Shellshock by some. This affects Debian as well as other Linux distributions. You will need to patch ASAP. Bash supports exporting shell variables as well as shell functions to other bash instances. This is accomplished through the process environment to a child process.  The major attack vectors that have been identified in this case are HTTP requests and CGI scripts.  From Akamai:  Akamai has validated the existence of the vulnerability...
  • How to choose the right Linux distro

    09/25/2014 8:14:50 AM PDT · by ShadowAce · 21 replies
    Network World ^ | 24 September 2014 | Paul Venezia
    Credit: Thinkstock RHEL/CentOS, Fedora, Ubuntu, Debian, and OpenSuse have far more similarities than differences, but choosing the wrong one for the job can make life much harder Unlike most other desktop and server operating systems, Linux comes in a wide variety of flavors, each based on a common core of the Linux kernel and various GNU user space utilities. If you're running Linux servers -- or Linux desktops, for that matter -- you should understand the important differences and be discerning about which flavor of Linux is best suited to any given situation. This article will help you do...
  • Okay, Bloomberg is a big fat socialist RINO. What is Bloomberg Media?

    09/22/2014 7:17:32 PM PDT · by HiTech RedNeck · 25 replies
    Sept 22, 2014 | HiTech RedNeck
    Well, the HiTech RedNeck is looking for a job... AGAIN. This job hopping is getting old, but the boss of the group, at a major freight railroad, for which I'm a contractor has an integrity problem, to put it delicately. For some reason, I don't get along very well with liars and phonies. Well, I refreshed my resumes on Dice and Monster this past weekend and crossed my fingers. Well this morning what do I behold, but someone wants to know if I am interested in working for a company that turns out to be BLOOMBERG MEDIA. They are quoting...
  • Waiting on 20nm graphics cards from Nvidia and AMD? Don’t bother.

    09/21/2014 12:12:52 PM PDT · by Ernest_at_the_Beach · 11 replies
    techsoda.com ^ | March 8, 2014 | Jim Dotcom
    Billions of dollars are spent every year on shrinking the size of transistors, for good reason.Smaller transistors have superior performance characteristics but the main reason for the shrink is because the smaller the transistors are, the more you can squeeze into a chip.  That means you can get better performance from smaller chips, allowing you to squeeze more chips on to the same wafer – and the more chips on a wafer, the more money you make per wafer.Take this example of a 40nm wafer and a (more advanced) 28nm wafer:The left wafer (40nm transistors) has chips of 150mm^2,...
  • GamerGate And Why It Matters To Conservatives

    09/10/2014 1:53:53 PM PDT · by 2ndDivisionVet · 67 replies
    The Other McCain ^ | September 10, 2014 | Robert Stacy McCain
    <p>I don’t think it’s an exaggeration to say that with regard to entertainment, conservatives and libertarians find science fiction and videogaming to be the most attractive options offered by pop culture these days, mainly because there’s a lot of SF that doesn’t try and stuff political correctness and half-baked socialist egalitarianism up our snouts. The same goes for videogames, which are mostly about killing bad guys and/or solving puzzles.</p>
  • Non-volatile memory improves energy efficiency by two orders of magnitude

    09/03/2014 11:38:25 AM PDT · by Red Badger · 16 replies
    Phys.Org ^ | 03 Sep 2014 | by Lisa Zyga
    (Phys.org) —By using voltage-generated stress to switch between two magnetic states, researchers have designed a new non-volatile memory with extremely high energy efficiency—about two orders of magnitude higher than that of the previous most efficient non-volatile memories. The engineers, Ayan K. Biswas, Professor Supriyo Bandyopadhyay, and Professor Jayasimha Atulasimha at Virginia Commonwealth University in Richmond, Virginia, have published their paper on the proposed non-volatile memory in a recent issue of Applied Physics Letters. "We are excited that we have been able to come up with the idea of a strain-switched memory element capable of 180° switching using a simple geometric...
  • Basic Mechanisms of a Fire Control Computer (1950's Navy Training Film)

    08/30/2014 8:53:14 PM PDT · by DemforBush · 41 replies
    youtube ^ | n/a | n/a
    A pretty neat little film about the various parts of the mechanical fire control computers of those days, and how they are applied to real-life gunnery issues.
  • Gov't warns US retailers about hacking software

    08/22/2014 7:32:21 PM PDT · by markomalley · 13 replies
    AP ^ | 8/22/2014 | ALICIA A. CALDWELL and JEFF HORWITZ
    More than 1,000 U.S. retailers could be infected with malicious software lurking in their cash register computers, allowing hackers to steal customer financial data, the Homeland Security Department said Friday. The government urged businesses of all sizes to scan their point-of-sale systems for software known as "Backoff," discovered last October. It previously explained in detail how the software operates and how retailers could find and remove it. Earlier this month, United Parcel Service said it found infected computers in 51 stores. UPS said it was not aware of any fraud that resulted from the infection but said hackers may have...
  • Apple begins storing users' personal data on servers in China

    08/16/2014 7:08:33 AM PDT · by Innovative · 60 replies
    Reuters ^ | Aug 16, 2014 | Gerry Shih and Paul Carsten
    Apple Inc (AAPL.O) has begun keeping the personal data of some Chinese users on servers in mainland China, marking the first time the tech giant is storing user data on Chinese soil. The storage of user data in China represents a departure from the policies of some technology companies, notably Google Inc (GOOGL.O), which has long refused to build data centers in China due to censorship and privacy concerns. Apple said the move was part of an effort to improve the speed and reliability of its iCloud service, which lets users store pictures, e-mail and other data. Positioning data centers...