Keyword: computers
-
Reuters reporter Joseph Menn exclusively revealed on Friday that Democratic presidential candidate Beto O’Rourke belonged to one of the best-known groups of computer hackers as a teenager. Within minutes, his special report was the most popular story on Reuters.com here and was picked up by other news outlets. But the origin of the story goes back more than two years. Members of the group, which calls itself Cult of the Dead Cow, protected O’Rourke’s secret for decades, reluctant to compromise the former Texas Congressman’s political career. After more than a year of reporting, Menn persuaded O’Rourke to talk on the...
-
A function of Intel's processors dealing with speculative execution has another vulnerability that affects all Intel-based computers including Apple's Mac, researchers have revealed, with "Spoiler" potentially allowing an attacker the ability to view the layout of memory, and in turn potentially access sensitive data stored in those locations. The speculative execution function of Intel's processors, used to increase the performance of a CPU by predicting paths an instruction will go through before the branch is completed, is a useful function but one that has caused Intel issues in the past. A new report from security researchers from Worcester Polytechnic Institute...
-
But the money was already gone........ Millions of dollars were missing when the CEO of a crypto exchange died without sharing the passwords to his accounts. Investigators recently cracked his laptop — only to find the money was gone. Gerald Cotten, the founder of QuadrigaCX, was thought to have had sole access to the funds and coins exchanged on it. After his death in December, his colleagues said that about $137 million in cryptocurrency belonging to about 115,000 customers was held offline in "cold storage" and inaccessible. The case has sparked numerous theories, including that Cotten faked his own death...
-
What VPN do lots of freepers recommend? I want to use it at places like Starbucks. Will use of a VPN slow me down..? I don't simply want to get the one Rush advertizes, though I love Rush.
-
I have just reprogrammed a laptop for a friend. When I did, of course Windows 10 was reinstalled on it, and of course Windows Defender was also reinstalled as well. With all the news coming out lately about Windows Defender interfering with Windows Updates, and of course most of us know just how reliable (I'm trying really hard not to throw up on my keyboard right now) Windows Defender is, I'm trying to find a newer, better, SIMPLER Internet Security program. I've used AVG myself for many years but it's getting to the point where I hate to use it...
-
ORANGE COUNTY, Fla. - The toll bills haven't stopped coming for some drivers in Central Florida after SunPass’ software meltdown last summer. In fact, state senators were told more than 4 million outstanding bills are still heading to mailboxes, adding up to an outstanding balance of $100 million. Related Headlines Last June, SunPass took its online payment system offline for a week of scheduled maintenance. At the end of the week, the system wouldn’t come back online. Almost 250 days later, people are still getting bills in the mail for the weeks of tolls that SunPass couldn’t process. Some drivers...
-
Cindi Eckis doesn’t have a smartphone, and she doesn’t want one. “It makes my life simpler,” the Cheektowaga retiree said. But sticking with her flip phone will make it tougher for her and other low-tech motorists to find a place to park along some streets of downtown Buffalo. A new parking policy being rolled out by city officials adds parking zones where the only way to pay to park is through the Buffalo Roam parking app. Blue "Pay by app only" signs went up earlier this week on Cobblestone District streets. "Pay from your phone," the signs read. "Download Buffalo...
-
Neuroscientists have successfully hooked up a three-way brain connection to allow three people to share their thoughts – and in this case, play a Tetris-style game. The team thinks this wild experiment could be scaled up to connect whole networks of people, and yes, it's as weird as it sounds. It works through a combination of electroencephalograms (EEGs), for recording the electrical impulses that indicate brain activity, and transcranial magnetic stimulation (TMS), where neurons are stimulated using magnetic fields. The researchers behind the system have dubbed it BrainNet, and say it could eventually be used to connect many different minds...
-
IHC: I hate computers. I was working on a post and all of a sudden it disappeared; completely, irrevocably, irretrievably; the victim of an undefined ERROR. So here I am, leaving at the crack of dawn and I don’t have a post ready. So this is going to be necessarily brief.All the discussion yesterday about sweet potatoes with/without marshmallows got me thinking… about marshmallows! Aren’t marshmallows a great Christmas theme? So I selected some seasonal marshmallow music - Mark Steyn & Jessica Martin’s disco version of “It’s A Marshmallow World” Unfortunately that’s pretty much all I’ve got time for today....
-
Believe it or not, all these faces are fake. They have been synthesized by Nvidia’s new AI algorithm, a generative adversarial network capable of automagically creating humans, cats, and even cars. The technology works so well that we can expect synthetic image search engines soon — just like Google’s, but generating new fake images on the fly that look real. Yes, you know where that is going — and sure, it can be a lot of fun, but also scary. Check out the video. It truly defies belief: According to Nvidia, its GAN is built around a concept called “style...
-
All your activity are belong to us Updated A feature introduced in the April 2018 Update of Windows 10 may have set off a privacy landmine within the bowels of Redmond as users have discovered that their data was still flowing into the intestines of the Windows giant, even with the thing apparently turned off.In what is likely to be more cock-up than conspiracy, it appears that Microsoft is continuing to collect data on recent user activities even when the user has explicitly said NO, DAMMIT!First noted in an increasingly shouty thread over on Reddit, the issue is related to...
-
From an office suite on the 26th floor of the iconic Frost Bank Tower in Austin, Texas, a little-known recruiting firm called Crossover is searching the globe for software engineers. Crossover is looking for anyone who can commit to a 40- or 50-hour workweek, but it has no interest in full-time employees. It wants contract workers who are willing to toil from their homes or even in local cafes. “The best people in the world aren’t in your Zip code,” says Andy Tryba, chief executive of Crossover, in a promotional YouTube video. Which, Tryba emphasizes, also means you don’t have...
-
Facebook investors have called on the company’s chief executive Mark Zuckerberg to step down as chairman, following reports that the company hired a public relations firm to smear its critics by drawing links to George Soros. The attack on Mr Zuckerberg is set to complicate the daunting challenge facing Sir Nick Clegg, Facebook's new global head of policy and communications, who joined last month and has been asked to conduct a review of Facebook's use of lobbying firms. Jonas Kron, a senior vice president at Trillium Asset Management, a US investor which owns an £8.5m stake in Facebook, last night...
-
Tennis for Two ... the first videogame? Pic: Brookhaven National Laboratory The forerunner of today's video games celebrated its 60th birthday last week as the anniversary of William Higinbotham's Tennis for Two rolled around.Tennis for Two was built by Higinbotham as a way of injecting a bit of life into the somewhat non-interactive nature of US-based Brookhaven National Laboratory's annual exhibition. It consisted of two controllers attached to an analogue computer and an oscilloscope showing two lines representing a tennis court and net, and a bright dot to represent the ball.Each player had a controller with a button to swing...
-
It just goes to show that public figures should purchase their domain name.
-
Bloomberg said that its sources were key to its decision to run the Chinese spy chip story, the site writing that ’17 people confirmed the manipulation of Supermicro’s hardware and other elements of the attacks.’ However, one of the named sources – a security researcher who seemingly backed the claims – has said that his comment was taken out of context, and he actually told the site that what it was describing to him “didn’t make sense” … Hardware security expert Joe Fitzpatrick was quoted in the piece saying “the hardware opens whatever door it wants.” But speaking on the...
-
Capitol Police on October 3 arrested 27-year old congressional staffer Jackson Cosko for posting on Wikipedia the private addresses of three members of the Senate Judiciary Committee—what’s known as “doxxing” (a word derived from the shorthand for “document”). Cosko is facing serious charges that include illegally posting private information of public figures, witness tampering, threats, identity theft, and unlawful entry. In the mainstream media, Cosko is being portrayed as a hapless overzealous intern who didn’t even have the smarts to cover up his criminal act. His former boss— Rep. Sheila Jackson-Lee (D-Texas) has denied she knew anything about Cosko’s activities....
-
The reality of quantum computing could be just three years away Quantum computing has moved out of the realm of theoretical physics and into the real world, but its potential and promise are still years away. Onstage at TechCrunch Disrupt SF, a powerhouse in the world of quantum research and a young upstart in the field presented visions for the future of the industry that illustrated both how far the industry has come and how far the technology has to go. For both Dario Gil, the chief operating officer of IBM Research and the company’s vice president of artificial intelligence...
-
Intel has been scarred by another major security glitch that takes advantage of the same technology behind the Meltdown and Spectre vulnerabilities. The new set of vulnerabilities, labeled Foreshadow, allows passwords and other confidential information to be swiped from memory caches in Intel’s processors. On Tuesday, the Santa Clara, California-based company said it had released microcode to protect potentially vulnerable devices in personal computers and data centers. The company said that the changes, coupled with new updates for operating systems and hypervisor software made available on Tuesday, would protect most customers. “We are not aware of reports that any of...
-
Just as the kaleidoscopic dramas of Leo Tolstoy’s novel Anna Karenina, the pseudo-non-fiction murk of Alan Moore’s comic From Hell and the domestic pragmatism of Jamie Oliver’s 15 Minute Meals meet under the fat banner of prose, so the body of video games becomes an ever broader church. It is impossible to enforce orthodoxy in a medium where shifting technology defines the canvas. The artform now embraces work from a dizzying spectrum. A challenging time, then, for the Victoria and Albert Museum to stage its first major video game exhibition. Rather than reach into the primordial digital soup of the...
|
|
|