Keyword: tech
-
Mainly to help FReerepublic folders, but anyone can take advantage of this deal. Item number 7387-A11 (Refurbished) Lenovo 3000 J115 - Athlon 64 X2 Dual Core 2 GHz - RAM 1 GB - HD 250 GB - DVD±RW (+R DL) - Memory card reader - LAN- Fast Gig - Modem - Vista Home Premium. 1 year manuf. warr. incl. Subtotal: 210.00 Sales Tax: 0.00 Shipping: 30.32 Order Total: 240.32 Actually they are $230.00, but if you call the guy below, and ask him for a "folding@home" discount, he'll give you an additional $20.00 off. Tech For Less Cory -719-886-8000 ext....
-
The sound on my computer is not working properly. When I play mp3, mov, wav, wmv, wma, rm, and avi files, there is a beeping/crackling noise. Most of the time the jibberish noise is complete. Sometimes, a bit of the intended audio can be heard through the beeping/crackling. The only audio that plays well is from YouTube videos and .flv files. I have a Creative SoundBlaster Audigy sound card. I have uninstalled and reinstalled the drivers for the sound card with no success. I have removed the sound card and reseated it with no success. My speakers are 6.1 Cambridge...
-
By choosing Joe Biden as their vice presidential candidate, the Democrats have selected a politician with a mixed record on technology who has spent most of his Senate career allied with the FBI and copyright holders, who ranks toward the bottom of CNET's Technology Voters' Guide, and whose anti-privacy legislation was actually responsible for the creation of PGP. That's probably okay with Barack Obama: Biden likely got the nod because of his foreign policy knowledge. The Delaware politician is the chairman of the Senate Foreign Relations committee who voted for the war in Iraq, and is reasonably well-known nationally after...
-
Last week we discovered that some Fedora servers were illegally accessed. The intrusion into the servers was quickly discovered, and the servers were taken offline. Security specialists and administrators have been working since then to analyze the intrusion and the extent of the compromise as well as reinstall Fedora systems. We are using the requisite outages as an opportunity to do other upgrades for the sake of functionality as well as security. Work is ongoing, so please be patient. Anyone with pertinent information relating to this event is asked to contact fedora-legal redhat com One of the compromised Fedora servers...
-
I have been hijacked by an adserver/virus. I am running AdAware, but does not fix problem. I consider myself tech-savvy, but this is ridiculous. Problem started this morninng, and occurs on FR, and any other website I visit. Any suggestions, or ideas? Thanks.
-
Apple CEO Steve Jobs has confirmed that the iPhone 3G has a kill switch that can remotely remove software from the devices. {snip} But the real controversy started when Jonathan Zdziarski, author of the books iPhone Open Application Development and iPhone Forensics Manual, discovered a URL buried in Apple's firmware. That URL links to a file dubbed "unauthorizedApps" where malicious or simply bad apps might go once they disappear from the App Store. According to Zdziarski, I Am Rich isn't the only app to disappear. BoxOffice (renamed to Now Playing) and NullRiver's NetShare were also removed. But removing the applications...
-
Marisel Garcia is one of eight or nine women in the Gainesville, Florida who is a victim of a Webcam Spy Hacker voyeurism scandal, orchestrated by Craig Feigin. Craig Feigin, a computer programmer, worked on Marisel Garcia's computer to fix her laptop. When she got her machine back from Feigin, it had a slew of other problems so she brought it to another area repair man. One of the new problems was that the computer's built-in camera light came on every time she was near the machine. When Marisel Garcia got her computer back, she learned that Craig Feigin had...
-
A criminal gang is using software tools normally reserved for computer network administrators to infect thousands of PCs in corporate and government networks with programs that steal passwords and other information, a security researcher has found. The new form of attack indicates that little progress has been made in defusing the threat of botnets, networks of infected computers that criminals use to send spam, steal passwords and do other forms of damage, according to computer security investigators. Several security experts say that although attacks against network administrators are not new, the systematic use of administrative software to spread malicious software...
-
George Ledin teaches students how to write viruses, and it makes computer-security software firms sick.In a windowless underground computer lab in California, young men are busy cooking up viruses, spam and other plagues of the computer age. Grant Joy runs a program that surreptitiously records every keystroke on his machine, including user names, passwords, and credit-card numbers. And Thomas Fynan floods a bulletin board with huge messages from fake users. Yet Joy and Fynan aren't hackers—they're students in a computer-security class at Sonoma State University. And their professor, George Ledin, has showed them how to penetrate even the best antivirus...
-
Microsoft is incubating a componentized non-Windows operating system known as Midori, which is being architected from the ground up to tackle challenges that Redmond has determined cannot be met by simply evolving its existing technology. Midori is an offshoot of Microsoft Research’s Singularity operating system, the tools and libraries of which are completely managed code. Midori is designed to run directly on native hardware (x86, x64, ARM), be hosted on the Windows Hyper-V hypervisor, or even be hosted by a Windows process. According to published reports, Eric Rudder, senior vice president for technical strategy at Microsoft and an alumnus of...
-
What do you think of this router, printer server, and firewall? I need a wireless router for a laptop with DSL service, 2 old printers, and a portable printer (USB)? Frequently Asked QuestionsZoneAlarm Secure Wireless Router Z100G Discussion ForumZoneAlarm Secure Wireless Router Z110G - Is It Worth The Price? (post March 19, 2007) Other thoughts are a Belkin F5D8230-4 and a Belkin F5D7230-3.
-
Serial rabbit killer uses Google maps to find victims German police are concerned that the person killing rabbits may go on to kill human beings Roger Boyes in Berlin The roll call of victims is growing longer by the day. They have names like Rocco, Fussel, Marianne and Fluffy — and a five-man police unit has a file on each and every one. The so-called “bunny murders” — 40 domestic rabbits killed at night in their hutches, heads and sometimes paws sliced off, their bodies drained of blood — is stunning communities across western Germany. “Nobody knows where the killer...
-
FRANKFURT (Reuters) - One in three information technology professionals abuses administrative passwords to access confidential data such as colleagues' salary details, personal emails or board-meeting minutes, according to a survey. U.S. information security company Cyber-Ark surveyed 300 senior IT professionals, and found that one-third admitted to secretly snooping, while 47 percent said they had accessed information that was not relevant to their role. "All you need is access to the right passwords or privileged accounts and you're privy to everything that's going on within your company," Mark Fullbrook, Cyber-Ark's UK director, said in a statement released along with the survey...
-
Jim Louderback, CEO of internet TV network Revision3, is considering legal action against anti-piracy firm MediaDefender after an internal investigation revealed it to be the source of a Memorial Day weekend Denial of Service attack against Revision3’s computer network.
-
Computer hackers in China, including those working on behalf of the Chinese government and military, have penetrated deeply into the information systems of U.S. companies and government agencies, stolen proprietary information from American executives in advance of their business meetings in China, and, in a few cases, gained access to electric power plants in the United States, possibly triggering two recent and widespread blackouts in Florida and the Northeast, according to U.S. government officials and computer-security experts. One prominent expert told National Journal he believes that China’s People’s Liberation Army played a role in the power outages. Tim Bennett, the...
-
YouTube law fight 'threatens net' YouTube is owned by search giant Google A one billion dollar lawsuit against YouTube threatens internet freedom, according to its owner Google. Google's claim follows Viacom's move to sue the video sharing service for its inability to keep copyrighted material off its site. Viacom says it has identified 150,000 unauthorised clips on YouTube. In court documents Google's lawyers say the action "threatens the way hundreds of millions of people legitimately exchange information" over the web. The search giant's legal team also maintained that YouTube had been faithful to the requirements of the 1998 Digital...
-
MediaDefender attacks and cripples Revision3 for locking out its spy-bots Posted by Cory Doctorow, May 29, 2008 10:14 AM | permalink MediaDefender, the thugs paid by the entertainment industry to spy on file-sharers and attempt to cripple file-sharing networks, attacked a legitimate Internet TV company called Revision3 over the weekend, launch as massive denial-of-service attack in retaliation for having their spy-bots locked out of R3's BitTorrent trackers: Revision3 runs a tracker expressly designed to coordinate the sharing and downloading of our shows. ItÂ’s a completely legitimate business practice, similar to how ESPN puts out a guide that tells viewers how...
-
To be exceptionally honest with you, Ultrasonic Batgoggles don't exactly need any pimping from us. What you see above is a homegrown device that enables humans to discover how bats must feel when using echolocation in order to judge how far away certain objects are. The main components are an Arduino microcontroller clone, Devantech ultrasonic sensor and a set of welding goggles -- oh, and a sick poker face to really round things out. Check out the links below to get a gist of the background as well as a step-by-step guide to concocting your own. EXCERPTED....
-
Indispensable in hot kitchens: the nanotube Oxford chemists have found a way of using carbon nanotubes to judge the heat of chilli sauces. The technology might soon be available commercially as a cheap, disposable sensor for use in the food industry. Professor Richard Compton and his team at Oxford University have developed a sensitive technique to measure the levels of capsaicinoids, the substances that make chillies hot, in samples of chilli sauce. They report their findings in the Royal Society of Chemistry journal The Analyst. The current industry procedure is to use a panel of taste-testers, and is highly...
-
Doom-filled warnings arrive from AT&T this week. The company says that without substantial investment in network infrastructure, the Internet will essentially run out of bandwidth in just two short years. Blame broadband, says AT&T. Decades of dealing with the trickle of bandwidth consumed by voice and dialup modems left AT&T twiddling its thumbs. The massive rise of DSL and cable modem service in the 2000s has had AT&T facing a monstrous increase in the volume of data transmissions. And that's set to increase another 50 times between now and 2015. That's enough, says AT&T, to all but crash the system....
|
|
|