Z Machine Makes Progress Toward Nuclear Fusion
You have been eaten by a gru.
Feel better now?
The Computer Security Threat From Ultrasonic Networks
Given that the machines have to have the acoustic networking software installed on them (requiring already having root access), this is at worst a covert communications channel that could be used to bypass network security controls in order to exfiltrate information from an otherwise secure network. It has no impact on whether machines can be hacked to begin with.
How Reactive Programming Differs From Procedural Programming
I don't know why people keep submitting this garbage from Espresso Logic, who is just taking advantage of the fact the the term "reactive" has been overloaded to mean different things to exploit the hype surrounding the Reactive Manifesto and related technologies (e.g., Akka, Rx, Node.js, etc.) to push their own, completely unrelated product, which is based on the more traditional (i.e., the one you find in Wikipedia) definition of "Reactive Programming".
"Reactive programming", as defined by the Reactive Manifesto (which is what all the hype is about), is about designing applications that operate in an entirely asynchronous and non-blocking manner, so as to maximize CPU utilization and fully exploit parallelism, and ensure that the system is always responsive to new events (user input, incoming data streams, errors, changes in load, etc.) rather than having resources tied up waiting for external processes (e.g., blocking on I/O). It has nothing to do with "reactive databases".
Futuristic Highway Will Glow In the Dark For Icy Conditions
And what are they going to do for the remaining 6 hours of the night during winter?
Playstation Controller Runs Syrian Rebel Tank
Dammit! That should have read "had NO anti-tank capabilities".
Playstation Controller Runs Syrian Rebel Tank
Many early tanks (up through WW2) had anti-tank capabilities (indeed, the first tanks had no reason to have anti-tank capabilities - there were no other tanks to fight against). The main distinguishing features of a tank are its armor (which need not necessarily be very heavy - just enough to deflect small arms fire), its tracks, and the fact that it has some sort of weapon mounted on a turret.
The Panzer I was classified as a light tank but was armed only with MG13 machine guns. The British Vickers Light Tank Mk VI likewise only had .50cal and .303cal machine guns.
Opera's Haakon Wium Lie On CSS, Web Standards, and More
document structure != layout
The header and footer are part of the structure of the document.
The fact that they appear at the top and bottom of the screen is part of the layout.
Google Announces Google CDN
Only if they're targeting you by your DNS name and not your IP address.
Company Claims Ownership of Digital Messaging
Me too! I even still have Pidgin set up to log into it (along with every other account I have), though my ICQ contacts are so old I pretty much never talk to any of them.
UN Intervention Begins In Libya
Gadahi/Kadaffy/Qaddafi/whatever did say he declared a ceasefire. Meanwhile, Libyan tanks continued to roll into Benghazi to "disarm to protesters".
Oracle Could Reap $1 Million For Sun.com Domain
If the domain changes hands, that's going to break a lot of XML files containing xsi:schemaLocation attributes and DTD references pointing to documents within http://java.sun.com/xml/ns/j2ee/ .
Police Chief Teaches Parents To Keylog Kids
You should just put a big banner across the top of the screen that reads: "BIG BROTHER IS WATCHING YOU." The government in 1984 gave full disclosure as well.
That said, they are your children, and by extension it's probably your computer as well (or at the very least, your Internet connection), so you're well within your rights to monitor how it is used. It isn't really even necessary to actually do any monitoring. As long as they believe they're being monitored, the effect should be the same.
Facebook Opens Up Home Addresses and Phone Numbers
If any of you had bothered to read TFA, you'd notice that sharing your address and phone number is entirely optional for the user on a per-app basis. They just split the "Request for Permission" dialog into two options instead of one: 1. Access my basic information (the only option up until now) and 2. Access my contact information. Why anyone would actually choose the second option is beyond me (maybe they anticipate someone developing some sort of app that sends notifications via text messages), but it's not as if they're forcing you to share the information, or even making it likely that you'd accidentally share it.
Texas Supreme Court Cites Mr. Spock
Huh... are you against eating mutton?
New Tool Blocks Downloads From Malicious Sites
Lexmark Sues 24 Companies Over Toner-Cartridge Patents
I bought a Brother printer a few months ago when my Canon printer became irreparably clogged. It has worked quite well for me so far. The ink even comes in individual per-color cartridges.
YouTube Hit By HTML Injection Vulnerability
I wonder how many times this vulnerability was used to deliver malware.
Does Your PC Really Need a SysRq Button Anymore?
If you look at the pictures in TFA, you'll note that they've moved Print Screen to share space with the Insert key. To invoke Print Screen instead of Insert, you have to hold down the Fn key.
SQL Injection Attack Claims 132,000+
according to TFA:
Aliases: Trojan-PWS.Win32.Lmir (Ikarus, a-squared); TR/Hijacker.Gen (AntiVir); Trojan/Win32.Buzus.gen (Antiy-AVL); W32/Agent.S.gen!Eldorado (F-Prot, Authentium); Win32:Rootkit-gen (Avast); Generic15.CBGO (AVG); Trojan.Generic.2823971 (BitDefender, GData); Trojan.Buzus.croo (Kaspersky, QuickHeal); Trojan.NtRootKit.2909 (DrWeb); Trj/Buzus.AH (Panda).
That's the trojan that's being installed by the exploits served up by the injected IFRAME. It is not the vulnerability that is allowing the IFRAME to be injected to begin with.
REggert has no journal entries.