Made in China: The world's fastest supercomputer: Shanghaiist - The Sunway TaihuLight was named the fastest supercomputer in the world this Monday, according to the latest TOP500 ranking. This is the first time that a Chinese supercomputer has topped the list without the help of parts designed in other countrie From Nony
Hands on with NexDock, the laptop that isn't | PCWorld - Whatâ€™s sitting next to me isnâ€™t a product that can you walk into an electronics store and buyâ€”not yet, anyway. The NexDock, which looks like a laptop but isnâ€™t, represents a possible future where phones become PCs From X Isle
vintage everyday: Colorful Pictures of Computing in the 1970s and 1980s - Once upon a time, our computers and various technologies came in vibrant colors. It made sense at a time when computers were massive. Also, 1960s and 70s decor tended to make everything colorful. Unlike today where our refrigerators are plain white or stainless steel â€“ fridges of the 60s and 70s were harvest gold, tangerine and avocado green. So too were the technologies of the day; a trend that truly didnâ€™t wear off until the late 1980s. From Nony
Hacker remotely crashes Jeep from 10 miles away - Hackers took control of a car and crashed it into a ditch by remotely breaking into its dashboard computer from 10 miles away.
In the first such breach of its kind, security experts cut out the engine and applied the brakes on the Jeep Cherokee, sending it into a spin – all while sitting on their sofa.
The US hackers said they used just a laptop and mobile phone to access the Jeep’s on-board systems via a wireless Internet connection. From Roddy
Plugging a 1986 Mac Plus into the modern Web - How hard could it be to right that wrong?
Everything went smoothly at first. I had my mom ship the computer to me. It arrived in good condition, having been stored undisturbed in her basement since the mid-1990s. I plugged it and its external hard drive in, flipped the power switches, and watched the happy Mac glow to life on the tiny CRT. Sure, the hard drive gave a groan of protest when it first spun up, but that quieted down, and everything seemed stable with the data intact. At least for the first few minutes. From Popper
10 Screensavers of Yore - In the early days of CRT monitors, we had real technical reasons requiring screensavers for our computers. Screensavers were programs that kicked in when you weren't using the computer, in order to prevent "burn-in" of constant onscreen elements like menu bars. But what started as a pragmatic solution quickly turned to the realm of entertainment: if you're going to display some random stuff on the screen, why not make it fun? From Nony
North Korea Not Responsible for Sony Pictures Hacking: US Cyber Experts - Sam Glines suggests that a former employee with code-name “Lena,” who had high access to the company’s servers and users’ data, could have been behind the attack since she had connections with GoP group. Citing the expert, CNN notes that “Lena” was probably mad about layoffs.” At the same time, “Lena” may have sympathized with cyber-pirates, Glines notes. From Roddy
Researchers unearth new clues about ancient ‘computer’ - Researchers have unearthed new clues to an ancient Greek astronomical puzzle that has fascinated archaeologists for over a century.
The Antikythera Mechanism, an ancient machine dubbed “the world’s first computer,” was recovered from a treasure-laden shipwreck off the coast of Greece in 1901. However, the latest research by James Evans, professor of physics at the University of Puget Sound, and Christián Carman, history of science professor at the University of Quilmes, Argentina, sheds new light on the clocklike astronomical mechanism.
The study, published in the Archive for History of Exact Science, pinpoints the date when the mechanism was timed to begin as 205 B.C., making it 50 to 100 years older than previously thought. From Popper
Your medical record is worth more to hackers than your credit card | Reuters - (Reuters) - Your medical information is worth 10 times more than your credit card number on the black market.Last month, the FBI warned healthcare providers to guard against cyber attacks after one of the largest U.S. hospital operators, Community Health Systems Inc, said Chinese hackers had broken into its computer network and stolen the personal information of 4.5 million patients. From Anawaram
Steve Jobs To His Kids: Don’t Use Ipads - “So, your kids must love the iPad?” I asked Mr. Jobs, trying to change the subject. The company’s first tablet was just hitting the shelves. “They haven’t used it,” he told me. “We limit how much technology our kids use at home.”
The chief technology officer of eBay sends his children to a nine-classroom school here. So do employees of Silicon Valley giants like Google, Apple, Yahoo and Hewlett-Packard.But the school’s chief teaching tools are anything but high-tech: pens and paper, knitting needles and, occasionally, mud. Not a computer to be found. No screens at all. They are not allowed in the classroom, and the school even frowns on their use at home. From Roddy
Mysterious Phony Cell Towers Could Be Intercepting Your Calls | Popular Science - Like many of the ultra-secure phones that have come to market in the wake of Edward Snowden's leaks, the CryptoPhone 500, which is marketed in the U.S. by ESD America and built on top of an unassuming Samsung Galaxy SIII body, features high-powered encryption. Les Goldsmith, the CEO of ESD America, says the phone also runs a customized or "hardened" version of Android that removes 468 vulnerabilities that his engineering team team found in the stock installation of the OS. From Anawaram
Nineteen Seventy Three --Damn Interesting - On 12 November 1971, in the presidential palace in the Republic of Chile, President Salvador Allende and a British theorist named Stafford Beer engaged in a highly improbable conversation. Beer was a world-renowned cybernetician and Allende was the newly elected leader of the impoverished republic. From Nony
Hack A Tesla Model S And Win $10,000 - The word "hack" is a little over-used in today's lexicon, but in the general sense it refers to the process of cracking the software system of a computer, a smartphone--or a car.Many electric cars roll those three categories into one, and now the organizers of a computer security conference have set hackers a special challenge: To hack into a Tesla Model S electric car for a $10,000 prize. From Anawaram
Hackers Wanted: An Examination of the Cybersecurity Labor Market | RAND - There is a general perception that there is a shortage of cybersecurity professionals within the United States, and a particular shortage of these professionals within the federal government, working on national security as well as intelligence. Shortages of this nature complicate securing the nation's networks and may leave the United States ill-prepared to carry out conflict in cyberspace. From Anawaram
Banking fraud campaign steals 500k euros in a week - The experts at Kaspersky Lab have discovered evidence of a targeted attack against the clients of a large European bank. According to the logs found in the server used by the attackers, apparently in the space of just one week cybercriminals stole more than half a million euros from accounts in the bank. From Anawaram
The Nightmare on Connected Home Street | Gadget Lab | WIRED - I wake up at four to some old-timey dubstep spewing from my pillows. The lights are flashing. My alarm clock is blasting Skrillex or Deadmau5 or something, I donâ€™t know. I never listened to dubstep, and in fact the entire genre is on my banned list. You see, my house has a virus again. From Anawaram
A new organization for cybersecurity across the electric grid | Bulletin of the Atomic Scientists - Cyber attacks are an increasing risk for the US electric sector and have eclipsed terrorism as the primary threat, according to the Federal Bureau of Investigation. The Industrial Control Systems Cyber Emergency Response Team responded to 256 incidents that targeted critical infrastructure sectors in fiscal year 2013, and 59 percent of those incidents involved the energy sector. From Anawaram
Several European manufacturers spawn NSA-proof Android %u201Ccryptophones%u201D - The NSA spy scandal caused an uproar in many countries, whose leaders' smartphones were being spied upon, most notably Germany's chancellor, Angela Merkel. The intelligence scandal greatly increased the demand for encrypted mobile devices and communications in Europe. Many European political leaders will most probably ditch their high-end iOS and Android devices for a new breed of smartphones â€“ the â€ścryptophonesâ€ť. From Anawaram
How a Hacker Intercepted FBI and Secret Service Calls With Google Maps - Earlier this week, Bryan Seely, a network engineer and one-time Marine, played me recordings of two phone calls (embedded below.) The calls were placed by unwitting citizens to the FBI office in San Francisco and to the Secret Service in Washington, D.C. Neither the callers nor the FBI or Secret Service personnel who answered the phone realized that Seely was secretly recording them. He used Google Maps to do it. From Anawaram
MICROSOFT (FAIL!!!) Bypassing EMET 4.1 | Bromium Labs - We at Bromium Labs regularly do security research on a variety of computer threats and protections. EMET (Enhanced Mitigation Experience Toolkit) is a free download provided by Microsoft to enhance the security of an endpoint PC. EMET helps protects userland (non-kernel) applications. From Anawaram
42.zip - The file contains 16 zipped files, which again contains 16 zipped files, which again contains 16 zipped files, which again contains 16 zipped, which again contains 16 zipped files, which contain 1 file, with the size of 4.3GB. From Nony
U.S. retailers face pressure to raise cybersecurity spending - Yahoo Finance - NEW YORK (Reuters) - Target Corp's decision to speed up a $100 million program to adopt the use of chip-enabled smart cards is just a drop in the bucket when it comes to what retailers need to do to defend themselves against future cyber attacks, according to security experts and IT service providers. From Anawaram
The North Korean Tablet Computer Samjiyon: Hardware, Software and Resources | 38 North: Informed Analysis of North Korea - A few months ago the ever-growing community of those interested in the DPRK learned that there is now something like a local version of the iPadâ€”the Samjiyon tablet computer (pâ€™anhyĹŹng kâ€™ompâ€™yutâ€™ĹŹ samjiyĹŹn). After having had a chance to test it briefly during a visit in May 2013, I could not resist buying a Samjiyon in a shop in Pyongyang in September 2013. It cost me 180 Euros. After a few days of intensive use I can say that this is one of the few cases in my career as a consumer when I got more for my money than I had expected. From Nony
Your D-Link router may have a backdoor | The Raw Story - A curious computer security professional published findings Saturday that deconstructed the firmware code for some D-Link router devices and discovered a backdoor built directly into the code. By changing the user-agent in a web browser to â€śxmlset_roodkcableoj28840ybtide,â€ť a user could bypass the security on the device and get online or control the higher functions of the router. From Anawaram
Former NSA Honcho Calls Enterprise Security 'Appalling' - Former NSA technology boss Prescott Winter has a word for the kind of security he sees even at large, technologically sophisticated companies: Appalling.Companies large enough to afford good security remain vulnerable to hackers, malware and criminals because they tend to throw technological solutions at potential areas of risk rather than focusing on specific and immediate threats From Anawaram
Raspberry Pi as an Ad Blocking Access Point - This tutorial will show you how to use your Raspberry Pi as a WiFi access point that blocks ads by default for any devices using it. This is really neat in that it would work for your Android or iOS device, your Xbox 360, TiVo, laptop, and more without needing to customize any of those devices other than to use your Raspberry Pi as the access point for WiFi. Using an ad-blocker can be useful for conserving bandwidth, helping out low-power devices, or for keeping your sanity while browsing the web! From Anawaram
Phone Phreak Captain Crunch Rare Interview from '78 - Agreed with this quote completely: "wow, just before 18:00 he alludes to mass surveilliance of calls (silver box).... makes me think of Snowden's leaks on systematic government surveilliance... how short a memory we have... or we simply don't care as a society."
Samsung Smart TV: Like A Web App Riddled With Vulnerabilities | The Security Ledger - mart television sets arenâ€™t short on cool features. Users can connect to Facebook and Twitter from the same screen that theyâ€™re using to watch Real Housewives of New Jersey, or log into Skype and use a built in- or external webcam to have a video chat. Unfortunately, the more TVs start to look like computers, the more they are becoming subject to the same underlying code vulnerabilities that have caused headaches and heartache in the PC space. From Anawaram
Wi-Fi routers: More security risks than ever | Security & Privacy - CNET News - LAS VEGAS -- More major brand-name Wi-Fi router vulnerabilities continue to be discovered, and continue to go unpatched, a security researcher has revealed at Defcon 21.Jake Holcomb, a security researcher at the Baltimore, Md.-based firm Independent Security Evaluators and the lead researcher into Wi-Fi router vulnerabilities, said that problem is worse than when ISE released its original findings in April.
- add yet another to the "I told you SO!!!" list. LOL From Anawaram
DEF CON To Feds: We Need Some Time Apart - One of the more time-honored traditions at DEF CON â€” the massive hacker convention held each year in Las Vegas â€” is â€śSpot-the-Fed,â€ť a playful and mostly harmless contest to out undercover government agents who attend the show.defconBut that game might be a bit tougher when the conference rolls around again next month: In an apparent reaction to recent revelations about far-reaching U.S. government surveillance programs, DEF CON organizers are asking feds to just stay away. From Anawaram
So, You Want to Hide from the NSA? Your Guide to the Nearly Impossible - Yahoo! News - Complaining about the government is a key part of being American, the first amendment to the Constitution. But it seems like a bit of a trickier proposition these days, with the government listening to everything you say online. In the interest of preserving your freedoms and bolstering our fair nation, here is the full articulation of the deeply paranoid and complex life you must live in order to assure that the government leaves you alone. From Nony
Altair 8800 Clone: A near-empty box filled with history - Owning a piece of computer history can be expensive and not much fun. You can buy a vintage MITS Altair 8800, one of the world’s first successful desktop computers, on eBay, but a good one will cost you over US$4,000. That’s why computer enthusiast Mike Douglas developed the Altair 8800 Clone. It’s a modern, inexpensive, functional reproduction of the historic Altair 8800 computer that uses 21st century technology to recreate a bit of computer history for hobbyists and educators. From Popper
Android Vulnerability Bypasses App's Digital Signature - A vulnerability exists in the Android code base that would allow a hacker to modify a legitimate, digitally signed Android application package file (APK) and not break the appâ€™s cryptographic signatureâ€”an action that would normally set off a red flag that something is amiss. From Anawaram
Ask Slashdot: Explaining Cloud Privacy Risks To K-12 Teachers? - Slashdot - With the advent of Google Apps for Education, there has been a massive uptake by the K12 schools I deal with on signing students up with their own Google powered email address under the school domain. This combined by the fact that the students' work when using Google Apps is stored offshore and out of our control â€” with no explicit comeback if TOS are breached by Google â€” it seems to me that the school cannot with integrity maintain it has control over the data and its use. I have expressed a concern that it is unethical to use these services without informing the students' parents of what is at stake e.g. the students are getting a digital footprint from the age of seven and are unaware of the implications this may have later in life. From Anawaram
CBS News confirms multiple breaches of Sharyl Attkisson%u2019s computer - A cyber security firm hired by CBS News has determined through forensic analysis that Sharyl Attkissonâ€™s computer was accessed by an unauthorized, external, unknown party on multiple occasions late in 2012. Evidence suggests this party performed all access remotely using Attkissonâ€™s accounts. While no malicious code was found, forensic analysis revealed an intruder had executed commands that appeared to involve search and exfiltration of data. From Anawaram
Cloud computing is a trap, warns GNU founder - The concept of using web-based programs like Google's Gmail is "worse than stupidity", according to a leading advocate of free software.Cloud computing â€“ where IT power is delivered over the internet as you need it, rather than drawn from a desktop computer â€“ has gained currency in recent years. Large internet and technology companies including Google, Microsoft and Amazon are pushing forward their plans to deliver information and software over the net. From Anawaram
Facebook's first data center DRENCHED by ACTUAL CLOUD - Facebook's first data center ran into problems of a distinctly ironic nature when a literal cloud formed in the IT room and started to rain on servers.Though Facebook has previously hinted at this via references to a "humidity event" within its first data center in Prineville, Oregon, the social network's infrastructure king Jay Parikh told The Reg on Thursday that, for a few minutes in Summer, 2011, Facebook's data center contained two clouds: one powered the social network, the other poured water on it. From Anawaram
Chinese hacking only part of the story - Blackhat hackers (state sponsored and independents) are not the only ones to blame... The infrastructure was poorly designed and maintained.
LOL - I've been saying this for YEARS!!! add it to the long list of "oh you're just too paranoid" - NOT!!! From Anawaram
Microsoft, FBI takedown Citadel botnet - Microsoft has successfully taken down one more botnet in collaboration with the FBI which was known to control millions of PCs across the globe and was allegedly involved in and responsible for bank fraud in tune of more than $500 million. From Anawaram
Robots Could Put Humans Out of Work by 2045 - Robots began replacing human brawn long agoâ€”now theyâ€™re poised to replace human brains. Moshe Vardi, a computer science professor at Rice University, thinks that by 2045 artificially intelligent machines may be capable of â€śif not any work that humans can do, then, at least, a very significant fraction of the work that humans can do.â€ť From Anawaram
Introducing Strongbox, a Tool for Anonymous Document-Sharing : The New Yorker - This morning, The New Yorker launched Strongbox, an online place where people can send documents and messages to the magazine, and we, in turn, can offer them a reasonable amount of anonymity. It was put together by Aaron Swartz, who died in January, and Kevin Poulsen. Kevin explains some of the background in his own post, including Swartzâ€™s role and his survivorsâ€™ feelings about the project. (They approve, something that was important for us here to know.) The underlying code, given the name DeadDrop, will be open-source, and we are very glad to be the first to bring it out into the world, fully implemented. From Anawaram
The Hacker Lifecycle - benjamin alexander smith - In general I'm a very motivated person. But during my free time, my motivation is cyclical. It waxes and wanes over the course of 9-12 months. I've started to think of this as the hacker lifecycle. From Anawaram
Hijacking airplanes with an Android phone - An extremely well attended talk by Hugo Teso, a security consultant at n.runs AG in Germany, about the completely realistic scenario of plane hijacking via a simple Android app has galvanized the crowd attending the Hack In The Box Conference in Amsterdam today. From Anawaram
Azimuth Security: Unlocking the Motorola Bootloader - I recently spent some time dissecting the bootloader used on Motorola's latest Android devices, the Atrix HD, Razr HD, and Razr M. The consumer editions of these devices ship with a locked bootloader, which prevents booting kernel and system images not signed by Motorola or a carrier. In this blog post, I will present my findings, which include details of how to exploit a vulnerability in the Motorola TrustZone kernel to permanently unlock the bootloaders on these phones. From Anawaram
Most IT admins considering quitting due to stress - The number of IT professionals considering leaving their job due to workplace stress has jumped from 69% last year to 73%, underlining the increasingly challenging business landscape in the UK and the growing emphasis being placed on IT to help businesses grow, thrive and compete. From Anawaram
The Most Detailed, GIF-Based Map Of Internet Was Made Hacking 420,000 Computers - When, exactly, is hacking OK? Most people would agree that it's not OK for strangers to hack into people's computers and look at personal information. When the government threatens to look at people's online information in the name of safety, Internet users are unhappy to say the least. But what about groups that argue their hacking is for the greater good? Do they have the right to hack organizations for the betterment of the public? There's a blurry moral line when it comes to hacking, and it just got a little blurrier. From Popper
Japanese cops collar malware-carrying cat - When imagining law enforcement officers investigating and searching for cyber criminals or evidence about their activities, the last thing that you can probably envision is them searching for a stray cat. From Anawaram
61-year-old computer springs back to life - If not, here's the story: The 2.5-ton machine, first constructed in the 1950s as part of an atomic research program, became the "world's oldest original working digital computer" after a museum in the UK restored and then rebooted it on Tuesday. Unlike today's nearly mute devices, the massive computer clicks, clacks and flashes like something out of an old sci-fi movie. From Popper
European bank malware steals $47 million - Hackers operating in western Europe have managed to make off with more than $47 million, thanks to a new iteration of a widespread banking Trojan that intercepts two-step authentication text messages sent to customers' phones. From Popper
New 25 GPU Monster Devours Passwords In Seconds - There needs to be some kind of Mooreâ€™s law analog to capture the tremendous advances in the speed of password cracking operations. Just within the last five years, thereâ€™s been an explosion in innovation in this ancient art, as researchers have realized that they can harness specialized silicon and cloud based computing pools to quickly and efficiently break passwords. From cw
iTunes 11: It%u2019s time for Apple%u2019s horrible, bloated program to die. - Slate Magazine - iTunes 11 did not arrive on time. Apple originally promised to deliver the next version of its ubiquitous music-management program in October. Last month, though, the company announced that the release would slip to November, because the company needed â€śa little extra time to get it right.â€ť This week the Wall Street Journal, citing â€śpeople who have seen it,â€ť reported that the real cause was â€śengineering issues that required parts to be rebuilt.â€ť From Nony
Security Firm VUPEN Claims to Have Hacked Windows 8 and IE10 - Windows 8 was released late last week, and already this week French security firm VUPEN says it has broken Microsoftâ€™s latest and greatest security features. The company claims it has developed a 0-day exploit for Windows 8 and IE10, by chaining multiple undisclosed flaws together. From Anawaram
The Accidental History of the @ Symbol | Science & Nature | Smithsonian Magazine - Called the â€śsnailâ€ť by Italians and the â€śmonkey tailâ€ť by the Dutch, @ is the sine qua non of electronic communication, thanks to e-mail addresses and Twitter handles. @ has even been inducted into the permanent collection of the Museum of Modern Art, which cited its modern use as an example of â€śelegance, economy, intellectual transparency, and a sense of the possible future directions that are embedded in the arts of our time.â€ť From X Isle
You’ll Hate Windows 8 - Microsoft has good reason to change Windows so radically—the company considers the enormous popularity of the iPad a major threat to its business, and the new Windows is the company’s effort to get out in front of the tablet wave. Yet Windows 8 fails to guide users through the enormous changes that it dumps upon them. Many of the things one takes for granted in PCs—the Start menu, the file manager, running apps in Windows side-by-side—have been radically redesigned in the new OS. Doing some of the most basic computing tasks will require a re-education. From Popper
Review: Google Nexus 7 Tablet by Asus - While the Nexus 7 isnâ€™t a full-on iPad-killer, it far out-classes anything else offered in the 7-inch category, and most 10-inch tablets too. The Nexus 7 does this by offering smartly designed, powerful hardware and the best Android tablet experience to date. For those who only use their gadgets to surf the web, check e-mail, play games and update their social media feeds, the Nexus 7 might be an even better choice than an iPad, given how much easier it is to carry around. From X Isle
'Leap Second' Bug Wreaks Havoc Across Web | Wired Enterprise | Wired.com - On Saturday, at midnight Greenwich Mean Time, as June turned into July, the Earthâ€™s official time keepers held their clocks back by a single second in order to keep them in sync with the planetâ€™s daily rotation, and according to reports from across the web, some of the netâ€™s fundamental software platforms â€” including the Linux operating system and the Java application platform â€” were unable to cope with the extra second.Many computing systems use whatâ€™s called the Network Time Protocol, or NTP, to keep themselves in sync with the worldâ€™s atomic clocks, and when an extra second is added, some just donâ€™t know how to handle it. From X Isle
This Tiny Computer is the Size of a USB Flash Drive : Discovery Channel - At Mobile World Congress, FXI Technologies debuted Cotton Candy, the computer in a thumb drive package. One end features USB, which it uses for power, while the other connects to displays with HDMI, CNET reports. In addition to the microSD slot, Cotton Candy includes a micro-USB port for peripherals. One thing itâ€™s missing is an operating system. Users are directed to download either Android 4.0 or Ubuntu after purchasing and registering the product. From X Isle
Apple Quietly Pulls Claims of Virus Immunity | PCWorld - Apple removed the previous statement "It doesn't get PC viruses" and replaced it with "It's built to be safe," and "Safeguard your data. By doing nothing" with "Safety. Built in." A comparison of the old and new messages is currently available here. From Nony
How Much Data is Created Every Minute? - Data never sleeps. Every minute massive amounts of it are being generated from every phone, website and application across the Internet. Just how much data is being created and where does it come from?For that you should check out this Domo infographic. From X Isle
Researchers claim quantum breakthrough - Researchers say they have designed a tiny crystal that acts like a quantum computer so powerful it would take a computer the size of the known universe to match it. From cw
More than 600,000 Macs infected with Flashback botnet | Security - CNET News - More than half a million Macs are infected with the Flashback Trojan, a malware package designed to steal personal information, according to a Russian antivirus company.The company -- Dr. Web -- originally reported today that 550,000 Macintosh computers were infected by the growing Mac botnet. But later in the day, Dr. Web malware analyst Sorokin Ivan announced on Twitter that the number of Macs infected with Flashback had increased to 600,000, with 274 of those based in Cupertino, Calif.
To see if you haven't got it:
In terminal run:
defaults read /Applications/Safari.app/Contents/Info LSEnvironment
You should get this error:
The domain/default pair of (/Applications/Safari.app/Contents/Info, LSEnvironment) does not exist
defaults read ~/.MacOSX/environment DYLD_INSERT_LIBRARIES
You should get this error:
The domain/default pair of (/Users/YOURUSER/.MacOSX/environment, DYLD_INSERT_LIBRARIES) does not exist
If you do you are clean of this variant!
If this doesn't happen go here to fix it
EDIT: I'm glad this is actually useful for people, it makes me feel warm and fuzzy inside to know I am being helpful!
from: http://www.reddit.com/r/technology/comments/ru5g0/more_than_600000_macs_infected_with_flashback/ From X Isle
Isochronous Application V0.8 - If you're changing planes or trains but have an hour or two of layover time you may want to explore your area, but it can be tricky to know how far you can go without getting lost or missing your next connection.
Webapp Cartoo uses Google Maps to predict how far you can travel by foot, bicycle, or car from a given point and specific window of time. For example: the map above shows how far you can travel in New York in 1 hour, using a bicycle. From X Isle
IBM takes big steps toward extremely fast quantum computing | VentureBeat - IBM is announcing today that it has made major advances toward creating a practical, full-scale quantum computer, a fabled, theoretical machine that relies on the tiniest atomic properties to compute problems faster than any supercomputer that exists today.Scientists at IBM Research in Yorktown Heights, N.Y., said that their quantum computing solution leverages the underlying quantum mechanics of matter and that a real quantum computer, which could work on millions of computations at once, could be built in the next decade. The hugely multitasking devices will have big implications for fields such as data encryption. From X Isle
Exclusive: Millions of printers open to devastating hack attack, researchers say - Could a hacker from half-way around the planet control your printer and give it instructions so frantic that it could eventually catch fire? Or use a hijacked printer as a copy machine for criminals, making it easy to commit identity theft or even take control of entire networks that would otherwise be secure?
It’s not only possible, but likely From Popper
How a chain of tea shops kickstarted the computer age - A British company stands on the cusp of a technological breakthrough that will change the way the entire world operates. The idea is worth countless hundreds of billions of pounds and is years ahead of similar efforts in America and elsewhere. The year, alas, is not 2011, but 1951. From cw
Steve Jobs “Think Differently” is LSD - In this time of mourning over the passing of Steve Jobs it is important to understand what made him such and outstanding individual. And although it is an inconvenient truth to some people, his success was due to using LSD. That is what Apple’s trademark phrase “Think Differently” is referring to.
In his own words, Jobs said that taking LSD was “one of the two or three most important things I have done in my life.” From Popper
Microsoft AV Mistakes Google Chrome For a Virus - If you're a PC user who can't launch your Google Chrome browser, blame Microsoft.Around 3,000 Google Chrome users couldn't access or even find their browsers on Friday, thanks to a bug in Microsoft Security Essentials (MSE) antivirus that tagged Google Chrome as a piece of malware. From Nony
Windows 8 Developer Preview Download - The Windows Developer Preview is a pre-beta version of Windows 8 for developers. These downloads include prerelease software that may change without notice. The software is provided as is, and you bear the risk of using it. It may not be stable, operate correctly or work the way the final version of the software will. It should not be used in a production environment. The features and functionality in the prerelease software may not appear in the final version. Some product features and functionality may require advanced or additional hardware, or installation of other software. From cw
30 Years of the PC: A Timeline | PCMag.com - The PC didn't magically appear in its current wide-screen, multi-core, HD/3D viewing form overnight. It took many years (30, to be exact) to evolve from the venerable IBM PC of 1981 to the high-powered tech gadgets of today. The original idea of the PC was sound: using off the shelf parts combined with a relatively open, but fiercely curated set of standards so we wouldn't have to reinvent the wheel every time we wanted to advance from one version of the PC to the next. Remember that in the 1960s and 1970s, you routinely had to know assembly or machine language commands to operate a computer to its fullest potential. Now all manner of computers from PCs to smartphones to tablets are touch-enabled and simple enough for even a two year old to manage. From cw
IE8, Safari Fall to Pwn2Own Hackers, Chrome Still Standing - Hackers at the Pwn2Own 2011 hacker conference at the CanSecWest conference in Vancouver broke through defenses in Apple's Safari 5.0.3 on fully patched Mac OS X 10.6.6 and Internet Explorer 8 on Windows 7 SP1.Pwn2Own has become one of the top security events of the year, even if it's a rather routine affair. Lots of products get hacked, some survive. It's not clear if the contest says anything meaningful about the security of the products, but there is a wide consensus that competitions like this improve security overall by pushing developers to do their best, if only out of pride. From cw
The birth of the first personal computer virus, Brain - TWENTY-FIVE years ago today, two brothers in Pakistan came up with a new and novel way to catch out software pirates.
As it turned out, they also gave birth to one of the greatest annoyances in the modern world. From Popper
The 1970s Computer Graphics Video That Inspired Tron - MAGI was founded in 1966 to help the government model nuclear radiation transport, or the way that radiation would travel in the event of a nuclear catastrophe. By the 1970s, it had become one of the country’s only computer graphics companies, thanks largely to a software package it developed called Synthavision. Using the techniques of ray-tracing and constructive solid geometry, Synthavision’s modeling eschewed polygons or wireframe meshes for solids. From Popper
Kinect sex – what's the holdup? - Meanwhile, some wily folks have been hacking the device and getting it to do some pretty nifty stuff. So one can only imagine that somewhere...out there...someone is working on a homebrew game of virtual boom-boom.
In fact, industrious tinkerer Dan Wilcox has already hacked the Kinect to track breasts — man breasts that is. From Popper
Air Force Unveils Fastest Defense Supercomputer, Made of 1,760 PlayStation 3s - The holidays may be driving video game console sales, but apparently so is the military. The Air Force Research Laboratory (AFRL) has strung together 1,760 PlayStation 3 gaming systems to create what it’s calling the fastest interactive computer system in the entire DoD, capable of executing 500 trillion floating point operations per second. From Popper
Pentium-III autopsy - For teaching a course I needed to take a closer look at a CPU. I asked around and got my hands on an old P-III Coppermine that was about to get thrown out. Iâ€™ll start with a disclaimer: I know virtually nothing about CPUs, so if I claim something to be true, it probably isnâ€™t.The first challenge is to get the actual silicon processor chip off of the plastic bonding board. In the picture below, the blue thing you see is the back side of the processor chip. When the processor is finished, it is turned upside down and bonded to the green circuit board. This allows the metal pads on the silicon chip and the pads on the circuit board to join, creating a connection (this is one of those claims...). I believe that the CPU at that stage is heated up in order to melt the joints and thereby solder them together. From danomil
Rare original 'Apple-1' computer sold by Steve Jobs from his parents' garage goe - The first ever Apple computer that company founder Steve Jobs sold from his parents' garage is up for sale - for a whopping Ł150,000.
There were about 200 examples of the original 'Apple-1' that were launched in 1976 and only a few survive today.
They were the forerunners of the iPod, iPad, iPhone and everything else that Apple has produced over the years. From Popper
Change to 'Bios' will make for PCs that boot in seconds - New PCs could start in just seconds, thanks to an update to one of the oldest parts of desktop computers.The upgrade will spell the end for the 25-year-old PC start-up software known as Bios that initialises a machine so its operating system can get going. From cw
Third co-founder of Apple walked away with hundreds of dollars, not billions - Wayne, 76, was present at the birth of cool April 1, 1976: Co-founder, along with Steve Jobs and Steve Wozniak, of Apple Computer Inc., Wayne designed the company's original logo, wrote the manual for the Apple I computer and drafted the fledgling company's partnership agreement. That agreement gave him a 10 percent stake in Apple, which would be worth more than $22 billion today if Wayne had held onto it.
But he didn't. From popper
The Aurora IE Exploit Used Against Google in Action - In the video you will see Metasploit set up a listening session, set up a web site that serves up the malicious code, and watch as an unsuspecting user visits the web site, triggers the attack that uses the IE vulnerability, and unknowingly opens a connection to a computer owned by the attacker. The attacker then lists the userâ€™s processes, and elects to kill Notepad where the user was working on an important document. IE 6.0 is used, as this is the version Microsoft references as having been used in the â€śtargeted attacksâ€ť on some 30 U.S. companies.
German Government: Stop Using Internet Explorer - In a statement issued today, the German Federal Office for Security in Information Technology (known as BSI) recommends that all Internet Explorer users switch to an alternative browser. They may resume using Explorer after a fix is issued by Microsoft for a critical vulnerability that has been implicated in the Chinese cyberattack against Google. From cw
10 things Ive overheard about my Linux laptop while on public transportation - I've been taking the train to work for 4 years now. It's a 45 minute rambling ride in which I usually either read a book, sleep, or grab my laptop loaded up with Ubuntu and get some stuff done. Over time, I've collected a few funny remarks I've either over heard, or that people have said directly to me. Here are the 10 best. From cw
Why computers suck at maths - Computers might struggle to exhibit intelligent behaviour, but blindly performing arithmetic calculations is surely their forte. Or is it?The failure of Google's online calculator and Excel's apparent inability to give correct answers to simple calculations are both well-known problems among programmers, but these aren't really bugs in the normal sense of the word. Instead they're just a consequence of the fact that computers suck at maths. From Nony
SCO fires CEO Darl McBride, architect of litigation strategy - In an SEC filing published today, SCO revealed that CEO Darl McBride has been terminated and is no longer with the company. The decision to fire the controversial CEO is part of a restructuring plan that is based on recommendations made by the Chapter 11 trustee who was assigned to SCO by the justice department. From bofh
Download More RAM! - What is this site you ask? Download more RAM does exactly what it says on the tin. Our website gives you the ability to 'download more RAM' at no cost! Just select the amount you need and download! Your speed will be improved instantly! From Nony
Back in the U.S.S.R - November 18, 1992. Wednesday. Deep in the heart of Siberia lives a winking monster. It is rumored to occupy an entire floor and to be outfitted with thousands of flashing console lights. Once part of the U.S.S.R.'s military, space, engineering, meteorological, and computer-science programs, it is the last working version of the legendary BESM-6 supercomputer. It stands amid the debris of its three compatriots, which have been smashed and melted down for the salvage value of their precious-metal content. I have pushed forward the timing of our visit to the former Soviet Union in an effort to save the last machine from the same violent fate. From cw
Hole in Windows Vista and 7 allows remote reboot - A vulnerability in Microsoft's implementation of the SMB2 protocol can be exploited via the net to crash or reboot Windows Vista and Windows 7 systems. The root of the problem is an error in how the srv2.sys driver handles client requests when the header of the "Process Id High" field contains an ampersand. The attack does not require authentication; port 445 of the target system merely has to be accessible, which in the default Windows local network configuration, it usually is. SMB2 is an extension of the conventional server message block protocol. From cw
Petabytes on a budget: How to build cheap cloud storage - At Backblaze, we provide unlimited storage to our customers for only $5 per month, so we had to figure out how to store hundreds of petabytes of customer data in a reliable, scalable wayâ€”and keep our costs low. After looking at several overpriced commercial solutions, we decided to build our own custom Backblaze Storage Pods: 67 terabyte 4U servers for $7,867.In this post, weâ€™ll share how to make one of these storage pods, and youâ€™re welcome to use this design. Our hope is that by sharing, others can benefit and, ultimately, refine this concept and send improvements back to us. Evolving and lowering costs is critical to our continuing success at Backblaze. From cw
You must obey: Unwritten laws of technology - Gordon Moore has one law but we've got him beat. Here at the (unofficial) Tech Law Brain Trust, we maintain a definitive, ever-expanding archive of the laws that govern your technology experiences — whether you know it or not. Please scan these lists to ensure that you are in compliance. From Popper
Is Adobe the next (pre-2002) Microsoft? - Nearly half of targeted attacks exploit holes in Acrobat Reader, which is used to read PDF (portable document format) files, according to F-Secure. Meanwhile, the number of PDF files used in dangerous Web drive-by attacks jumped from 128 during the first three and a half months of last year to more than 2,300 during that time this year, the company said. From cw
Inside the Worlds Most Hostile Network - As the world's largest hacker convention, DefCon is also home to the world's most hostile wired and wireless networks.This, understandably, creates challenges for the people in DefCon's Network Operations Center (NOC), who were tasked with keeping the networks up and running and relatively clean of malicious traffic during the four days the conference ran this year. From cw
Catastrophic Bug Found in Windows 7 RTM Build, Launch May be Delayed - Microsoft is now in code-red panic mode as a major bug has been found in Windows 7's RTM build, one which threatens to kill the OS's release party. The RTM build -- 7600.16385 -- thus far only received by a handful, features a reportedly massive memory leak in the unassuming, but frequently used program chkdsk.exe. From cw
Computer Failures Are Probed in Jet Crash - WSJ.com - Aviation investigators, running out of time to find the "black boxes" with key information on the crash of Air France Flight 447, suspect a rapid chain of computer and equipment malfunctions stripped the crew of automation today's pilots typically rely on to control a big jetliner.An international team of experts is building a scenario in which it believes a cascade of system failures, seemingly beginning with malfunctioning airspeed sensors, rapidly progressed to what appeared to be sweeping computer outages, according to people familiar with the probe. The Airbus A330, en route from Rio de Janeiro to Paris, crashed into the Atlantic Ocean during a storm 26 days ago, killing all 228 aboard. From danomil
Laptops With Sealed-in Batteries - But thereâ€™s a dirty little secret about removable-battery laptops owned by average consumers: Hardly anybody buys extra batteries. Research firm NPD estimates that fewer than 5% of consumers buy a spare. So, a small trend has begun in the industry: More electronic products are being designed with their rechargeable batteries sealed inside. For instance, Dellâ€™s new high-end laptop, the Adamo, has a sealed battery, as does the excellent Flip pocket video camera.........Apple says this makes sense because sealing in the batteries lets the company make them larger, without adding heft to the laptops. Apple says the two models are the same size and weight as their predecessors, yet their battery capacity has grown by 33% and 46%, respectively. From danomil
A Helping Hand From Afar - Windows XP comes with a Remote Assistance feature that lets an â€śexpertâ€ť control the computer of a â€śnoviceâ€ť over a network connection (like the Internet) to adjust system settings, look for lost files or provide other help. The feature takes a little bit of advance set-up, but Microsoft has a full overview here.Windows Vista also has its own Windows Remote Assistance service that can let it connect to other computers running Vista or Windows XP. To use it, go to the Start button to All Programs. Click on Maintenance and then on Windows Remote Assistance in the menu. A wizard then offers to walk you through the steps of either helping or being helped. A page on Microsoftâ€™s site explains how Remote Assistance works â€” and offers some caveats about privacy and security. From danomil
Inside the World's Greatest Keyboard - From the satisfying click of its keys to its no-nonsense layout and solid steel underpinnings, IBM's 24-year-old Model M is the standard by which all other keyboards must be judged.
I'm typing on one of these right now! From cw
Why Your Laptop's Batteries Die So Fast - Imagine if automakers got together and started measuring the gas mileage of new cars with a cool test of their own makingâ€”one in which the cars were rolling downhill with their engines idling. Suddenly you'd have some pretty amazing claims: Why, that three-ton SUV gets 300 miles per gallon! This subcompact gets 500! In tiny print at the bottom of the window sticker you'd find a disclaimer saying that, well, um, you know, your mileage may vary.Crazy, right? Yet that's more or less what's happening with laptop computers and their battery lives. Right now, I'm looking at a Best Buy flier touting a $599 Dell laptop that gets "up to 5 hours and 40 minutes of battery life." Down in the fine print comes a disclaimer explaining that "battery life will vary" based on a bunch of factors. Translation: you ain't gonna get five hours and 40 minutes, bub. Not ever. Not even close. From danomil
PC Touch-Screen Technology Moving Beyond Curiosity - NYTimes.com - For years, companies have dabbled with the touch-screen technology that lets people poke icons on a display to accomplish tasks like picking a seat at an airport check-in kiosk. Apple elevated such technology from a novelty to a must-have feature on mobile devices with its iPhone. People can flip through pictures with a flick of a finger or make a document larger by pressing two fingers against the screen and stretching them out.Now both personal computer manufacturers and software makers hope to do more with touch on larger devices by giving people a 10-fingered go at their screens. From danomil
Sony ready to unveil its PSP Go at E3 tomorrow | DVICE - Here at DVICE we like us some leaks, and this one will have gamers looking forward to Tuesday. Sony is unveiling the PSP Go at E3 in Los Angeles, and pictures of the handheld have already hit the web. The UMD disk format has been dropped, but there's a 16GB flash memory, plus a Memory Stick Micro slot and Bluetooth support From danomil
Four Ways to Strengthen a Password - Today, Iâ€™d like to go over what makes a good, strong password, the kind you should be using to, at minimum, protect online access to your financial accounts. From danomil
Apple Could Find Healthy Market For $700 Touch-Screen Tablet -- Apple -- InformationWeek - If Apple is building a touch-screen tablet as imagined by a recent analyst report, then the computer maker could find a strong market among consumers willing to pay more for a device that's easier to use and more functional than today's netbooks.Piper Jaffray analyst Gene Munster believes Apple is working on a device that would have a 7- to 10-inch touch screen and sell for $500 to $700, Apple Insider reported Thursday. The gadget would fill the gap between Apple's $400 iPod Touch and $1,000 MacBook. From danomil
Want to Speed up Your Computer? » The Fastest Computer Setup On Earth - Is your computer lagging? Does it take 20 minutes to start-up your PC? Days to download a movie? Weeks to print a few colour photos? Want to know ways to speed up your computer?Well providing you have enough disposable income, or well-placed family members, the technology is available to make computer-related waiting times a thing of the past. Sure, the technology weâ€™re going to show you will probably be outdated by the time youâ€™ve saved up enough cash to get your hands on it, but itâ€™s good to drool. From danomil
OhGizmo! » Archive » Rumor - Eee Keyboard To Be Released Next Month - The Eee Keyboard is basically your entire computer wrapped up into a nice neat keyboard package. It seems to be destined for the living room, what with itâ€™s wireless HDMI and all. The 5-inch touchscreen is really what sells the device for me. Speaking of selling, when exactly can we expect to see these on the market? From danomil
Companies Object to Google Policy on Trademarks - - When Audrey Spangenberg idly typed â€śFirePond,â€ť the name of her small software company, into Google this year, she was not happy with what she saw.
Her company’s site came up as the top search listing. But just above it, Google showed the ads of competitors that had paid Google to display their marketing messages whenever someone searched for FirePond, a registered trademark. From danomil
Five Controversial Ways to Speed Your PC - My continuing project this week has been converting an old Toshiba laptop into the fastest blogging machine possible. My overhauled PC screams, thanks to some tricks most technology writers wouldnâ€™t dream of telling you to try. From danomil
Cable Blues: Tangled & Crazy Wiring - Since our last issue we received a bunch of perplexing photos from all over the world, showing unceasing struggle of sysadmins, electricians and sound technicians against the sinister Doom of Second Law of Thermodynamics - the one of increasing entropy.Even though the struggle seems futile, various stuff still needs to be done - so these pictures of wiring messes testify that somewhere, somehow, someone actually understands where every cable goes and how the whole thing works: From danomil
64 Things Every Geek Should Know - LaptopLogic.com - The term 'geek', once used to label a circus freak, has morphed in meaning over the years. What was once an unusual profession transferred into a word indicating social awkwardness. As time has gone on, the word has yet again morphed to indicate a new type of individual: someone who is obsessive over one (or more) particular subjects, whether it be science, photography, electronics, computers, media, or any other field. A geek is one who isn't satisfied knowing only the surface facts, but instead has a visceral desire to learn everything possible about a particular subject. From danomil
Wolfram Alpha in Action - Last weekend, we attended a web demo of Wolfram Alpha, a new "computational knowledge engine" based on the work of Stephen Wolfram. Some have dubbed Alpha a "Google killer," but, in reality, it is very different from the standard search engines that we are all familiar with today. From Danomil
Conficker virus begins to attack PCs: Experts - BOSTON (Reuters) - A malicious software program known as Conficker that many feared would wreak havoc on April 1 is slowly being activated, weeks after being dismissed as a false alarm, security experts said. Conficker, also known as Downadup or Kido, is quietly turning an unknown number of personal computers into servers of e-mail spam, they added. From CC
Cinematograph HD Video Work log - This is my video work log documenting the build of my latest case mod, the Cinematograph HD. The Cinematograph HD is a complete, easily transportable, HD editing system. It features 2 22" monitors, desktop speakers, and full sized computer components, which include : 5 3.5" Hard drives, full ATX motherboard, full sized graphics, full sized PSU, and even a full sized optical drive. Additionally, the case houses a wireless keyboard and mouse for transport, so the only cable required is a standard PC power connector. From cw
Conficker Eye Chart - If you can see all six images in both rows of the top table, you are either not infected by Conficker, or you may be using a proxy server, in which case you will not be able to use this test to make an accurate determination, since Conficker will be unable to block you from viewing the AV/security sites. From cw
New malware attempts legitimacy by spreading phony reviews - Ars Technica - Scareware has found itself a new flavor in Anti-Virus-1, possibly in response to court cases and investigations launched against Antivirus XP last year. In this case, the program is a bit malware, a bit scareware, and generally bad news. It doesn't just yammer at the user with false positives, it'll also hijack your browser and aim it at phony positive reviewsâ€”of itself. From TerminalGlitch
Microsoft offers to just 'Fix it' - Over the past six weeks, Microsoft has quietly added a "Fix it" button to a few of the thousands of help documents on its Web site. When clicked, the computer then takes all the recommended steps automatically.
This just seems like a really bad idea. From Nonoxyl
Don't Fear the Penguin: A Newbie's Guide to Linux - Network World - Getting started with Linux can be an intimidating task, particularly for people who have never tried any operating system besides Windows. In truth, however, very little about Linux is actually difficult to use. It's simply a different OS, with its own approach to doing things. Once you learn your way around a Linux desktop, you're likely to find that it's no more challenging to work with than Windows or Mac OS. From Nonoxyl
PlayStation 3 tackles black hole vibrations - When black holes are perturbed, they vibrate somewhat like a ringing bell. Now astronomers have narrowed down the rotational speed at which that vibration should stop.
As is typical, they did it out by running a simulation. But instead of a supercomputer, they used a batch of Sony PlayStation 3 gaming consoles wired together. From popper
Malware infestation responsible for credit card data breach - Move over TJ Maxx, payment processor Heartland Payment Systems has potentially leaked up to 100 million credit and debit accounts into the black market. That number, if verified, would make this the largest data breach on record. It also means the United States has managed to set two national records in the same day. Guess which one folks are paying attention to? Awful convenient, that. From Nonoxyl
Unusual disk latency - don't shout at your computer! - This screenshot is from Analytics on the 7410. The issue is not with the 7410, it's with disk drives in general. The disk latency here is also not suffered by the client applications, as this is ZFS asynchronously flushing write data to disk. Still, it was great to see how easily Analytics could identify this latency, and interesting to see what the cause was. From cw
Langa Letter: XP's Little-Known 'Rebuild' Command - The Rebuild command--technically a software "switch" used with XP's Bootcfg tool--automatically searches a hard drive for valid startup information and files, letting you choose the correct ones. This has the effect of removing and repairing any references to whatever invalid, missing, or corrupt startup information was preventing normal booting. From cw
World's first personal supercomputer unveiled - The world's first personal supercomputer, which is 250 times faster than the average PC, has been unveiled.
Nice I might actually be able to run photoshop without it locking up. From warthog
First look at Windows 7's User Interface - At PDC today, Microsoft gave the first public demonstration of Windows 7. Until now, the company has been uncharacteristically secretive about its new OS; over the past few months, Microsoft has let on that the taskbar will undergo a number of changes, and that many bundled applications would be unbundled and shipped with Windows Live instead. There have also been occasional screenshots of some of the new applets like Calculator and Paint. Now that the covers are finally off, the scale of the new OS becomes clear. The user interface has undergone the most radical overhaul and update since the introduction of Windows 95 thirteen years ago. From cw
10 unusual operating systems - This post is about the desktop operating systems that fly under the radar of most people. We are definitely not talking about Windows, Mac OS X or Linux, or even BSD or Solaris. There are much less mainstream options out there for the OS-curious. From Nony
EU Hits Intel with fresh charges - European regulators have filed fresh charges against the world's biggest computer chip maker Intel over alleged abuse of its dominant market position. The European Commission (EC) accused the firm of paying a leading European retailer not to stock products containing chips made by rival AMD. From CC
All your VM's are belong to us - As of tomorrow morning, VM's running on all hosts with ESX 3.5U2 in enterprise configurations will not power on. VMotion/HA/DRS will probably also not work.Boom.Apparently, there is some bug in the vmware license management code. VMware is scrambling to figure out what happened and put out a patch.Running VM's will not be immediately impacted. From cw
India says it is developing a $10 laptop - India is developing a laptop to be sold at $10 that will target higher education applications, a minister of the federal government said today in Delhi. From cw
Microsoft Watch - Operating Systems - DOJ Has Windows 7, Why - Windows 7 already is being reviewed by U.S. government technical appointees, something many Microsoft executives probably couldn't have much imagined happening a year ago.Under the terms of Microsoft's November 2001 Justice Department settlement and final court judgment issued about a year later, a government-sanctioned "Technical Committee" has overseen Windows development. The TC is responsible for ensuring that Microsoft complies with the terms of the final judgment, investigating complaints about Microsoft abuses and regularly reporting on the company's compliance. From Surfer
Photo of great grandfather of modern computers found - Teleg - This is the first known photograph of the great grandfather of modern digital computers - a room sized, one ton jumble of wiring, valves and racks that was 640 million times less powerful than its descendant, the pocket-sized iPod. From cjdusa
Firefox 3 coming soon! :: The Mozilla Blog - The outpouring of interest and enthusiasm around Firefox 3 has been overwhelming (literally!). Our servers are currently feeling the burn and should be back to normal shortly. Download day will officially commence once the site goes live. The 24 hours period will be clocked from that moment. Thanks for your continued support. From cjdusa
Charging by the Byte to Curb Internet Traffic - By BRIAN STELTER
Some people use the Internet simply to check e-mail and look up phone numbers. Others are online all day, downloading big video and music files.
For years, both kinds of Web surfers have paid the same price for access. But now three of the country’s largest Internet service providers are threatening to clamp down on their most active subscribers by placing monthly limits on their online activity.
US bank loses unencrypted data on 4.5m people | The Register - ouriers lost magnetic tapes containing the personal details of 4.5 million people who had dealt with the Bank of New York Mellon, it has emerged. The incident happened three months ago, but has only surfaced after legal papers were filed in the state of Connecticut. From bofh
Judge to Dell: Dude, you're defrauding your customers! - The New York State Supreme Court has dealt a blow against Dell by ruling that the company and its affiliate, Dell Financial Services, engaged in fraud, false advertising, deceptive business practices, and abusive debt collection practices.Justice Joseph Teresi ruled against the companies late last week, saying that Dell repeatedly misled customers and failed to live up to promises. The monetary damages have yet to be determined, but New York Attorney General Andrew Cuomo said that Dell will eventually have to pay back customers. The company will also have to turn over any "unlawfully earned" profits to the state. From cw
Incredible folding laptop untucked on eBay - Origami computing
Laptops are designed to be portable, so a 19.5in machine is really defeating the object. Unless, that is you buy one that folds up. Now, thanks to one eBayer, you ca From cw
KOB.com - Group wants Wi-Fi banned from public buildings - A group in Santa Fe says the city is discriminating against them because they say that they're allergic to the wireless Internet signal. And now they want Wi-Fi banned from public buildings.Arthur Firstenberg says he is highly sensitive to certain types of electric fields, including wireless Internet and cell phones. From cjdusa
Revealed! The new face of the Eee PC - Model plan
The sun may be about to set on Asus' famous Eee-assessing blonde beach babe. She's apparently been supplanted by another woman, one with a taste for the finer things in life - and Small, Cheap Computers From cw