The Code War Arms Race
"A story in Bloomberg Businessweek gives the first in-depth look at a wave of new start-ups selling cyber weaponry"
And yet in the opening para we have some guy in a ski mask breaking into some offices. This, another article from the school of bad fiction and total cyberbullshit
Facebook Is Most Hated Social Media Company
'Customers have shown that, so far, they have been willing to suffer through a poor user experience in order to enjoy the benefits Facebook provides'
What customers, it's a free service, paid for through advertising !!!!
Napkins and the History of Ethernet, Compaq, Facebook
> The sketches featuring boxes labeled PDP-11 and pointers to "The Ether" would eventually be translated into a big-time business for 3Com, Digital Equipment Corp, and now, just about anybody in the computer, telecom and networking businesses ..
How did this happen without patent protection for "The Ether"?
Open Source Software Hijacked To Push Malware
And the solution is .. go directly to the Download site ...
Apple Slashes Australian App Store Prices To Match US
"British consumers will have to pay far more than their U.S. counterparts for Apple's latest must-have gadget, the iPad.
Apple has announced that the starting price in the UK will be £429 for the 16GB model with a wi-fi link to the internet - around 25 per cent more than in America. The equivalent price for the same device there is around £340 .. In an effort to explain the price difference between America and Britain, Apple pointed to the fact that there are different, and higher, taxes in Europe, as well as higher transport and other costs" .. link
The Wi-Fi Hacking Neighbor From Hell
"perceived sleights turned into byzantine obsession is a sign of a person who will do nothing but bring grief to anyone who ever touches his or her life"
Have you never see the Cable Guy or One Hour Photo. I guess the lesson to be learned here is don't piss off technical support .. :)
"Up until his termination in June of 2010, Ardolf worked at Medtronic as a neuromodulation device repair technician" link
How Investigators Deciphered Stuxnet
How Digital Detectives Deciphered Stuxnet, the Most Menacing Malware in History link
"Months earlier, in June 2009, someone had silently unleashed a sophisticated and destructive digital worm that had been slithering its way through computers in Iran with just one aim"
Is there some kind of directive in place that doesn't allow for the mention of MIcrosoft Windows and who in their right mind would be using Windows to control hardware? And that entire report coming from the style of bad journalism, ie. a very bad imitation of Tom Wolf.
"In this case, the exploit allowed the virus to cleverly spread from one computer to another via infected USB sticks. The vulnerability was in the LNK file of Windows Explorer"
Finally, we get to a mention of Windows and what's a browser even doing on a 'computer' controlling a centrefuge? So to recapp, Insert USB device->Windows attempts to to open an icon from a LNK shortcut, the loads a malicious DLL into memory, the DLL is in actuality a rootkit disguised as a digitally signed device driver that gets loaded and run with 'root' privileges, the perps now have full control of your 'computer'.
"When an infected USB stick was inserted into a computer, as Explorer automatically scanned the contents of the stick, the exploit code awakened and surreptitiously dropped a large, partially encrypted file onto the computer, like a military transport plane dropping camouflaged soldiers into target territory"
Ohh for fucks sake !!!
IT Crises vs. Vacation: Sometimes It Isn't Pretty
"On the night before Thanksgiving last year, T.J. Whelan .. phone started buzzing with texts .. The messages said there was no connectivity to the Microsoft Exchange cluster .. That meant that attorneys in the firm's two U.S. offices and two overseas offices were completely cut off from email .. The network manager contacted Dell support, which confirmed that the disks had failed but also reported that it might be a while before replacement parts could be located" ..
This beggers belief, the IT department of a major law firm don't keep a single harddrive as backup and don't have a standby system in place for just such an eventuality as a failed harddrive ..
Patent Troll Goes After Notebook Cooling
> the company appears to be establishing its case by suing Fujitsu and Lenovo over the use of its invention in the Lifebook and Thinkpad series of products ..
What 'invention`, a temperature controlled variable CPU clock frequency ...
Man Claiming Half of Facebook Suffers Setbacks
Paul Ceglia: The Man Who Owns 84% of Facebook? link
"Ceglia sifting through old files in his western New York home to find assets to pay back his clientele. He says he came across a document signed in 2003 by Mark Zuckerberg, then a freshman at Harvard and now chief executive of Facebook. He says the document is a valid contract that entitles him to an 84 percent stake in Facebook"
"Mr. Ceglia's high-profile representation .. recently withdrew from the case at a critical juncture .. Mr. Ceglia is carrying on with a small, boutique-y firm of four San Diego-based attorneys who, according to CNET, represent 200 medical marijuana collectives. link
Better watch out then as if you win then these two will come suing your ass off Winklevoss Twins Resume Facebook Attack..
Mozilla Ships Firefox 5, Meets Rapid-Release Plan
> My FF upgraded itself today to FF5 and I have plugins that don't work, tom17
Why did you change the "Ask me what to I want to do" setting in Update. The option third down from "Automatically check for updates to:". And just under that is an option "Warn me if this will disable any of my add-ons"
13-Year-Old Password Security Bug Fixed
"Gawker used this broken implementation, which replaced all non-ascii characters with question marks prior to hashing". link
"Versions of jBCrypt before 0.3 suffered from a bug related to character encoding that substantially reduced the entropy of hashed passwords containing non US-ASCII characters.
"An incorrect encoding step transparently replaced such characters by '?' prior to hashing. In the worst case of a password consisting solely of non-US-ASCII characters, this would cause its hash to be equivalent to all other such passwords of the same length". link
Didn't anyone ever test the algorithm to see if if functioned as designed, as in producing unique hashs for very similar passwords. Would be most important as part of an encryption suite ..
Court Case To Test GNU GPL
"Ironically, by preventing others from enacting the rights granted by the GNU GPL, AVM itself is in violation of the license terms. Therefore they have no right to distribute the software" says Till Jaeger.
United Airlines Passengers Stranded By Computer Outage
> The problem is that with Microsoft if there is a problem you call them up and they fix it but they don't tell you how to prevent the problem in the future ..
The average Microsoft Certified sandwichmaker only know how to click on a 'service pack' or reinstall, reinstall, reinstall the OS.
> However this does allow you to hire more, cheaper, engineers and programmers to run your wares. Unix systems required a higher caliber of programmer and engineer team because you didn't have the support, other than a company like IBM ..
That's a false analogy, more doesn't equate to cheaper, and Unix support staff aren't necessarily more expensive. And unless you are in the software development process, then you would have no need of onsite programmers. And there are numerous companies offering support contracts.
United Airlines Passengers Stranded By Computer Outage
"The big decision is in: United Airlines plans to wean itself off its decades-long reservations-system provider, Travelport’s Apollo, and to migrate its reservations to HP’s SHARES system in 2012". link
"The Apollo reservation system used by United Airlines was down worldwide for at least four hours Tuesday", Jan 2006 link
Why Businesses Move To the Cloud: They Hate IT
"Today, our businesses move too fast for the traditional IT model; instead, business technology (BT) leaders must partner with their business colleagues to create business and technology strategy simultaneously."
I thought that's how it was always done, identify a market for a particular technology. I hadn't realized the `traditional IT model' was a hindrance to doing business. Doing large scale IT projects is a bit like building bridges, each one is unique and you never want to be involved in one again. Given the anount of buzz words in that article I figure its aimed at the clueless PHB who don't know or don't want to know about real world IT processes.
Key words: building bridges, business architecture strategies, business change, business objectives., business partners, business strategy, business technology, co-created innovation, co-creating business, collective action, consultation, continual refinement, Counter-intuitively, customer-driven, empowered BT organization, empowered employees, flexibility, flexible processes , foundation, fresh technology implementations, interrelated disciplines:, IT capabilities , key potential driver, legacy burdens, new-generation technology visioning, operationalizing innovation, process flexibility, provision their own technology, push innovation, ruthless standardization of technology, scaling innovative solutions, service delivery infrastructure, smart business process management, technology alignment, technology strategy, the enterprise, tools, traditional IT , Unleash technology-based innovation, waterfall process ...
US Senate Votes For Repeal of Ethanol Subsidies
Brazil's ethanol industry
Brazil imports record amount of ethanol
"So, where's Brazil getting all of this ethanol from? The United States. According to Platts, almost all of Brazil's imports were U.S. corn-based ethanol, as prices were deemed to be the world's most competitive".
Linus' Other Gift to the World
`Linus Torvalds has done well with Linux and now Git, but I don't really seeing him deserving the title of pioneer of "open innovation". At least not in the way the author is using the word "pioneer"'
That might be true but first one would have to redefine the meaning of 'pioneer', 'creating', 'taking advantage of', "open innovation" and "open source methodologies"
"I'm doing a (free) operating system .. and I'd like to know what features most people would want. Any suggestions are welcome, but I won't promise I'll implement them :-) link
Franken Bill Would Protect Consumers Location Data
" Lies and the Lying Liars Who Tell Them is a satirical book on American politics by comedian, political commentator and now Senator Al Franken, published in 2003 link - Amazon.com Review
How Journalists Data-Mined the Wikileaks Docs
"This type of data mining holds great potential for investigative revelation — and great potential for journalistic abuse"
I don't think so ...