top OwnCloud Dev Requests Removal From Ubuntu Repos Over Security Holes
Why wouldn't Canonical simply update the repository with patches that address known security vulnerabilities?
"multiple critical security bugs for which no fixes have been backported,"
The summary answers your question. There are no patches that address the known security vulnerabilities.
it's up to someone from the Ubuntu community to step up and fix it.
If someone creates a patch, they are welcome to submit it, and maybe the package maintainer will apply it.
top 95% of ATMs Worldwide Are Still Using Windows XP
top Irish Politician Calls For Crackdown On Open Source Internet Browsers
He starts by condeming browsers and proxies that help people browse the internet anonymously. Then he jumps to saying that anonymous browsing leads to trading drugs, weapons, and pornography. Then he commends the USA NSA for spying on Americans but is concerned that now that they have been caught Americans might do something about it.
top Microsoft's Ticking Time Bomb Is Windows XP
Red Hat offers 10 years of support. And new versions of Red Hat are generally better than previous versions, so there isn't as much need to hold on to old versions.
top Need Directions? Might Not Want To Ask a Transit Rider
I don't want directions.
top Speed Test 2: Comparing C++ Compilers On WIndows
Did calling home really throw off the results? Since that is something that ordinary users would have to put up with, I would think it should be part of the test. It might be difficult to get an average, but testing Intel's compiler only when it is at its fastest doesn't seem fair.
top 2-D MMOG
Glitch Released Completely Into the Public Domain
How exactly would one steal a public domain work, even for a loose definition of "steal?"
top GCC 4.9 Coming With Big New Features
But then how would Googlebot know that Phoronix is really great and popular and they should rank it higher in searches?
top Call Yourself a Hacker, Lose Your 4th Amendment Rights
The tipping point for the Court comes from evidence that the defendants â" in their own words â" are hackers. By labeling themselves this way, they have essentially announced that they have the necessary computer skills and intent to simultaneously release the code publicly and conceal their role in that act.
Sounds reasonable. Anyone with an intermediate understanding of computers and the internet would be able to publish something silently. Create an account with a seedbox, upload file, upload torrent to thepiratebay.sx.
It looks like all they did with the "hacker" identification is determine that they were intermediate level with computers and networking.
Judging from the summary, this is a standard courtroom procedure, and the submitter is trying to sensationalize it by leaving out all of the other evidence.
top Should Google Get Aggressive About Monetizing Android?
History is ripe with companies that built a product that does something different, and in ways better, than the competition. And once their product is successful, they try to emulate something that somebody else does, and their product share slowly declines as their users realize there is no longer anything special about the product.
Look at Firefox. It was a faster, lighter, less annoying and extensible browser. Over time, it slowly got bulkier, slower, and in some ways buggier. They annoy users by panicing any time a certificate is signed by an authority not on the list. When Google released Chrome, Firefox decided they wanted to have a Chrome-like super fast release cycle, which hurt extensions. Users are slowly leaving Firefox for other browsers, especially Chrome, as Firefox becomes less and less special.
If Google locks down the OS and prevents users from installing their own applications, then Android will no longer be special. People will still use it, since it's still a smart phone and devices will be cheaper than Apple. But as soon as a competitor comes along that offers what Google used to offer, users will quickly leave, and within several years Android will be a memory.
top Several Western Govts. Ban Lenovo Equipment From Sensitive Networks
No evidence has yet been presented to back the claims...
Is it fearmongering?
Or is there some legitimate basis for the ban?
How would we know whether or not evidence exists? All we know is that we haven't seen any. Time will tell. If no evidence is preseneted in the next month or so, then we'll know that it's just fearmongering, and not a legitmate basis for a ban.
top NSA Utah Data Center Blueprints Reveal It Holds Less Than Thought
Obviously the previous reports were wrong. Anybody familiar with computers and storage space knew that the numbers reported by NPR and other "news" outlets were ridiculous. They were saying that the center would hold 5 zetabytes, and would only cost $1.2 billion! That's about 25 cents per TB.
Best I could tell, NPR et al misunderstood a Wired article from over a year ago. In the Wired article, somebody said that they would eventually like the processing power in the center to exceed 1 exaflops, and then maybe someday after that 1 zetaflops.
top Google Storing WLAN Passwords In the Clear
the fact that Google can read them (and disclose them if forced by 'law') is a bit surprising, too put it nicely.
That's not just nice, that's outright flattery. Seriously, who is surprised by this? Lots of cloud backup storage services don't let you encrypt data (or make it hard to do so), so why would it be surprising that Google, the mother of all data hoarders, would want to store and read this stuff?
top AMD/ATI Drops Windows XP Support
Find old versions right here:
I went to AMD's driver site, which I found with the google search, "amd catalyst download". I clicked on "Windows XP (32 bit)". Then I clicked on "Previous Drivers and Software."
top ISPs To Censor Porn By Default In the UK By 2014
Block the whole internet by default. Customers have to submit a list of checkmarks letting the ISP know what they would like to have unblocked.
about a year and a half ago
top New CFAA Could Subject Teens To Jail For Reading Online News
This reminds me of a female blogger several years ago after that tennager suicide case. She reported that she heard match.com didn't allow married people to use their site. She said that couldn't risk confirming this herself, since she was happily married.
The point is, how are you supposed to know if you are allowed to use a site, if you can't even read the terms of service without risking violating the terms of service?
about a year and a half ago
top Spanish Open Source Group Files Complaint Over Microsoft Use of UEFI Secure Boot
UEFI has been implicated in the death of Samsung laptops running Linux.
That had nothing to do with Linux, and UEFI had no fault in that. The problem is that Samsung wrote a serious bug into their UEFI implementation that causes the laptop to brick if the user does X, Y, and Z under any operating system.
top IBM Designing Superman Servers For World's Largest Telescope
Agreed. There are roughly 100 million internet enabled households in the United States. If each of these sent and received, on average, 1GB per month, that's 100 PB.
about a year and a half ago
top Can You Do the Regular Expression Crossword?
... an * [matches] any number of characters and so on.
No. That's shell expansion, not regular expression. To match any number of characters, you would use ".*".
top Online Ads Are More Dangerous Than Porn, Cisco Says
The popular belief is that security risks increase as the user engages in riskier
... behavior online
So security risks don't increase as I engage in risky behavior? How does that even work? If something doesn't increase risk, then it isn't risky. I can start downloading and executing everything I see without increasing security risks?
iYk6 has no journal entries.