:: NEWS
10/23/2017
10/22/2017
10/21/2017
10/20/2017
computers
computers
InnSpire builds a computer into an Ethernet cable - Plug one end of InnSpire's InnCable into an Ethernet socket, the other end into a TV set's HDMI port, and you have a very neat Android set-top box.
From Popper
computers
|| 05/20/2017 ||
computers
computers
computers
computers
computers
computers
computers
How to remove the Windows 10 GWX upgrade nonsense - How to remove the Windows 10 GWX upgrade nonsense
From Surfer
:. Sponsored Links
Advertisement
computers
Made in China: The world's fastest supercomputer: Shanghaiist - The Sunway TaihuLight was named the fastest supercomputer in the world this Monday, according to the latest TOP500 ranking. This is the first time that a Chinese supercomputer has topped the list without the help of parts designed in other countrie
From Nony
computers
Intel x86s hide another CPU that can take over your machine (you can't audit it) / Boing Boing - Intel x86s hide another CPU that can take over your machine (you can't audit it)
From Surfer
computers
Hands on with NexDock, the laptop that isn't | PCWorld - What’s sitting next to me isn’t a product that can you walk into an electronics store and buy—not yet, anyway. The NexDock, which looks like a laptop but isn’t, represents a possible future where phones become PCs
From X Isle
computers
Intel is lining up super-fast Optane SSD tech for MacBooks | PCWorld - Optane is a brand name for a new type of memory and SSD based on 3D Xpoint, a technology jointly developed by Intel and Micron that can be 10 times denser than DRAM, and 1,000 times faster and more durable than flash storage.
From X Isle
computers
He had no friends. So he wreaked havoc on acquaintances%u2019 social media. - The Washington Post - On Tuesday, a federal judge sentenced Rubens to 10 years in federal prison. He had pleaded guilty late last year to cyberstalking, unauthorized access to a protected computer and aggravated identity theft in a case that seems to represent a particularly egregious example of social engineering and social media mayhem.
From X Isle
computers
|| 11/16/2015 ||
computers
computers
IF SOMEONE WERE WATCHING YOU, WOULD YOU KNOW? - Less than 5% of people know when their computer is recording them.
From Popper
computers
24 hours with Apple iOS 9, untethered jailbreak achieved - Hacker iH8sn0w shows us how it's done.
From Popper
computers
vintage everyday: Colorful Pictures of Computing in the 1970s and 1980s - Once upon a time, our computers and various technologies came in vibrant colors. It made sense at a time when computers were massive. Also, 1960s and 70s decor tended to make everything colorful. Unlike today where our refrigerators are plain white or stainless steel – fridges of the 60s and 70s were harvest gold, tangerine and avocado green. So too were the technologies of the day; a trend that truly didn’t wear off until the late 1980s.
From Nony
:. Sponsored Links
Advertisement
computers
Hacker remotely crashes Jeep from 10 miles away - Hackers took control of a car and crashed it into a ditch by remotely breaking into its dashboard computer from 10 miles away. In the first such breach of its kind, security experts cut out the engine and applied the brakes on the Jeep Cherokee, sending it into a spin – all while sitting on their sofa. The US hackers said they used just a laptop and mobile phone to access the Jeep’s on-board systems via a wireless Internet connection.
From Roddy
computers
Plugging a 1986 Mac Plus into the modern Web - How hard could it be to right that wrong? Everything went smoothly at first. I had my mom ship the computer to me. It arrived in good condition, having been stored undisturbed in her basement since the mid-1990s. I plugged it and its external hard drive in, flipped the power switches, and watched the happy Mac glow to life on the tiny CRT. Sure, the hard drive gave a groan of protest when it first spun up, but that quieted down, and everything seemed stable with the data intact. At least for the first few minutes.
From Popper
|| 03/19/2015 ||
computers
10 Screensavers of Yore - In the early days of CRT monitors, we had real technical reasons requiring screensavers for our computers. Screensavers were programs that kicked in when you weren't using the computer, in order to prevent "burn-in" of constant onscreen elements like menu bars. But what started as a pragmatic solution quickly turned to the realm of entertainment: if you're going to display some random stuff on the screen, why not make it fun?
From Nony
computers
North Korea Not Responsible for Sony Pictures Hacking: US Cyber Experts - Sam Glines suggests that a former employee with code-name “Lena,” who had high access to the company’s servers and users’ data, could have been behind the attack since she had connections with GoP group. Citing the expert, CNN notes that “Lena” was probably mad about layoffs.” At the same time, “Lena” may have sympathized with cyber-pirates, Glines notes.
From Roddy
computers
10 reasons why the FBI is wrong about the Sony Pictures hack - 10. Who do I think is behind this? My money is on a disgruntled (possibly ex) employee of Sony.
From Roddy
computers
Exclusive: FBI warns of 'destructive' malware in wake of Sony attack - Yahoo News - Reuters) - The Federal Bureau of Investigation warned U.S. businesses that hackers have used malicious software to launch a destructive cyberattack in the United States, following a devastating breach last week at Sony Pictures Entertainment.
From Anawaram
computers
Researchers unearth new clues about ancient ‘computer’ - Researchers have unearthed new clues to an ancient Greek astronomical puzzle that has fascinated archaeologists for over a century. The Antikythera Mechanism, an ancient machine dubbed “the world’s first computer,” was recovered from a treasure-laden shipwreck off the coast of Greece in 1901. However, the latest research by James Evans, professor of physics at the University of Puget Sound, and Christián Carman, history of science professor at the University of Quilmes, Argentina, sheds new light on the clocklike astronomical mechanism. The study, published in the Archive for History of Exact Science, pinpoints the date when the mechanism was timed to begin as 205 B.C., making it 50 to 100 years older than previously thought.
From Popper
computers
Now Everyone Wants to Sell You a Magical Anonymity Router. Choose Wisely | WIRED - Maintaining your privacy online, like investing in stocks or looking good naked, has become one of those nagging desires that leaves Americans with a surplus of stress and a deficit of facts. The last paragraph in the article is the most important - READ IT!!!
From Anawaram
computers
Your medical record is worth more to hackers than your credit card | Reuters - (Reuters) - Your medical information is worth 10 times more than your credit card number on the black market.Last month, the FBI warned healthcare providers to guard against cyber attacks after one of the largest U.S. hospital operators, Community Health Systems Inc, said Chinese hackers had broken into its computer network and stolen the personal information of 4.5 million patients.
From Anawaram
computers
Inventor of World Wide Web warns of threat to internet - Yahoo News - London (AFP) - The British inventor of the World Wide Web warned on Saturday that the freedom of the internet is under threat by governments and corporations interested in controlling the web.
From Anawaram
:. Sponsored Links
Advertisement
computers
Confirmed: Windows 9 to be a free upgrade for Windows 8 users - Yahoo News - Microsoft is considering releasing the upcoming platform as a free download to certain existing Windows users.
From Anawaram
computers
Steve Jobs To His Kids: Don’t Use Ipads - “So, your kids must love the iPad?” I asked Mr. Jobs, trying to change the subject. The company’s first tablet was just hitting the shelves. “They haven’t used it,” he told me. “We limit how much technology our kids use at home.” The chief technology officer of eBay sends his children to a nine-classroom school here. So do employees of Silicon Valley giants like Google, Apple, Yahoo and Hewlett-Packard.But the school’s chief teaching tools are anything but high-tech: pens and paper, knitting needles and, occasionally, mud. Not a computer to be found. No screens at all. They are not allowed in the classroom, and the school even frowns on their use at home.
From Roddy
computers
Mysterious Phony Cell Towers Could Be Intercepting Your Calls | Popular Science - Like many of the ultra-secure phones that have come to market in the wake of Edward Snowden's leaks, the CryptoPhone 500, which is marketed in the U.S. by ESD America and built on top of an unassuming Samsung Galaxy SIII body, features high-powered encryption. Les Goldsmith, the CEO of ESD America, says the phone also runs a customized or "hardened" version of Android that removes 468 vulnerabilities that his engineering team team found in the stock installation of the OS.
From Anawaram
computers
Visit the Wrong Website, and the FBI Could End Up in Your Computer | Threat Level | WIRED - Security experts call it a “drive-by download”: a hacker infiltrates a high-traffic website and then subverts it to deliver malware to every single visitor. It’s one of the most powerful tools in the black hat arsenal, capable of delivering thousands of fresh victims into a hackers’ clutches within minutes.
From Nony
computers
Apple iPhones allow extraction of deep personal data, researcher finds | Reuters - (Reuters) - Personal data including text messages, contact lists and photos can be extracted from iPhones through previously unpublicized techniques by Apple Inc (AAPL.O) employees, the company acknowledged this week.
From Anawaram
computers
Nineteen Seventy Three --Damn Interesting - On 12 November 1971, in the presidential palace in the Republic of Chile, President Salvador Allende and a British theorist named Stafford Beer engaged in a highly improbable conversation. Beer was a world-renowned cybernetician and Allende was the newly elected leader of the impoverished republic.
From Nony
computers
Hack A Tesla Model S And Win $10,000 - The word "hack" is a little over-used in today's lexicon, but in the general sense it refers to the process of cracking the software system of a computer, a smartphone--or a car.Many electric cars roll those three categories into one, and now the organizers of a computer security conference have set hackers a special challenge: To hack into a Tesla Model S electric car for a $10,000 prize.
From Anawaram
computers
Hackers Wanted: An Examination of the Cybersecurity Labor Market | RAND - There is a general perception that there is a shortage of cybersecurity professionals within the United States, and a particular shortage of these professionals within the federal government, working on national security as well as intelligence. Shortages of this nature complicate securing the nation's networks and may leave the United States ill-prepared to carry out conflict in cyberspace.
From Anawaram
computers
Banking fraud campaign steals 500k euros in a week - The experts at Kaspersky Lab have discovered evidence of a targeted attack against the clients of a large European bank. According to the logs found in the server used by the attackers, apparently in the space of just one week cybercriminals stole more than half a million euros from accounts in the bank.
From Anawaram
computers
Bitcoin security guarantee shattered by anonymous miner with 51% network power | Ars Technica - For the first time in Bitcoin's five-year history, a single entity has repeatedly provided more than half of the total computational power required to mine new digital coins, in some cases for sustained periods of time.
From Anawaram
:. Sponsored Links
Advertisement
computers
The Nightmare on Connected Home Street | Gadget Lab | WIRED - I wake up at four to some old-timey dubstep spewing from my pillows. The lights are flashing. My alarm clock is blasting Skrillex or Deadmau5 or something, I don’t know. I never listened to dubstep, and in fact the entire genre is on my banned list. You see, my house has a virus again.
From Anawaram
computers
Stalker: A creepy look at you, online - Jun. 13, 2014 - While you were having a latte and hunting for a Tinder date on your local coffee shop's open Wi-Fi, you were giving away your personal information.
From Anawaram
|| 06/08/2014 ||
computers
computers
Redmond is patching Windows 8 but NOT Windows 7, say security bods %u2022 The Register - Researchers found the gaps after they scanned 900 Windows libraries and uncovered a variety of security functions that were updated in Windows 8 but not in 7. They said the shortcoming could lead to the discovery of zero day vulnerabilities.
From Anawaram
computers
Your car is a giant computer - and it can be hacked - Jun. 1, 2014 - Imagine driving down the highway at 70 miles per hour, when suddenly the wheel turns hard right. You crash. And it was because someone hacked your car.
From Anawaram
computers
Registry hack enables continued updates for Windows XP | ZDNet - A single registry setting makes Windows Update think your XP system is Windows XP POSReady, which will receive updates for another five years.
From Anawaram
:. test
|| 05/10/2014 ||
computers
test -
From supreeth
computers
computers
How to Stop Your iPhone from Remembering Everywhere You Go, All the Time - You probably know that a lot of iPhone apps log your locations so they can offer directions or geographic-based recommendations. But did you know the iPhone keeps a separate, locally stored history of everywhere you’ve been?
From Anawaram
computers
PiPhone - A Raspberry Pi based Smartphone - Raspberry Pi - DIY cellphone
From Anawaram
:. Sponsored Links
Advertisement
computers
A new organization for cybersecurity across the electric grid | Bulletin of the Atomic Scientists - Cyber attacks are an increasing risk for the US electric sector and have eclipsed terrorism as the primary threat, according to the Federal Bureau of Investigation. The Industrial Control Systems Cyber Emergency Response Team responded to 256 incidents that targeted critical infrastructure sectors in fiscal year 2013, and 59 percent of those incidents involved the energy sector.
From Anawaram
computers
Several European manufacturers spawn NSA-proof Android %u201Ccryptophones%u201D - The NSA spy scandal caused an uproar in many countries, whose leaders' smartphones were being spied upon, most notably Germany's chancellor, Angela Merkel. The intelligence scandal greatly increased the demand for encrypted mobile devices and communications in Europe. Many European political leaders will most probably ditch their high-end iOS and Android devices for a new breed of smartphones – the “cryptophones”.
From Anawaram
computers
More Device Malware: This is why your DVR attacked my Synology Disk Station (and now with Bitcoin Miner!) - Internet Security | SANS ISC - Just found what looks like a bitcoin miner on the infected DVR. There are two more binaries. D72BNr, the bitcoin miner (according to the usage info based on strings) and mzkk8g, which looksl ike a simplar http agent, maybe to download additional tools easily (similar to curl/wget which isn't installed on this DVR by default). I will add these two files to https://isc.sans.edu/diaryimages/hikvision.zip shortly.
From Anawaram
computers
J.P. Morgan's $200 million problem (and Target's and Yahoo's and Barclays' ...) - Feb. 27, 2014 - This is the era of big data. Corporate America is collecting so much information on us that companies don't know what to do with it all. But are they protecting it?
From Anawaram
computers
How a Hacker Intercepted FBI and Secret Service Calls With Google Maps - Earlier this week, Bryan Seely, a network engineer and one-time Marine, played me recordings of two phone calls (embedded below.) The calls were placed by unwitting citizens to the FBI office in San Francisco and to the Secret Service in Washington, D.C. Neither the callers nor the FBI or Secret Service personnel who answered the phone realized that Seely was secretly recording them. He used Google Maps to do it.
From Anawaram
computers
MICROSOFT (FAIL!!!) Bypassing EMET 4.1 | Bromium Labs - We at Bromium Labs regularly do security research on a variety of computer threats and protections. EMET (Enhanced Mitigation Experience Toolkit) is a free download provided by Microsoft to enhance the security of an endpoint PC. EMET helps protects userland (non-kernel) applications.
From Anawaram
:. 42.zip
|| 02/15/2014 ||
computers
42.zip - The file contains 16 zipped files, which again contains 16 zipped files, which again contains 16 zipped files, which again contains 16 zipped, which again contains 16 zipped files, which contain 1 file, with the size of 4.3GB.
From Nony
computers
U.S. retailers face pressure to raise cybersecurity spending - Yahoo Finance - NEW YORK (Reuters) - Target Corp's decision to speed up a $100 million program to adopt the use of chip-enabled smart cards is just a drop in the bucket when it comes to what retailers need to do to defend themselves against future cyber attacks, according to security experts and IT service providers.
From Anawaram
computers
computers
Hackers Steal Law Enforcement Inquiry Documents from Microsoft | SecurityWeek.Com - Microsoft on Friday said that attackers breached the email accounts of a “select number” of employees, and obtained access to documents associated with law enforcement inquiries.
From Anawaram
:. Sponsored Links
Advertisement
computers
computers
|| 11/11/2013 ||
computers
JSMESS - The Javascript MESS - he JAVASCRIPT MESS project is a porting of the MESS emulator, a program that emulates hundreds of machine types, into the Javascript language. The MESS program can emulate (or begin to emulate) a majority of home computers, and continues to be improved frequently. By porting this program into the standardized and cross-platform Javascript language, it will be possible to turn computer history and experience into the same embeddable object as movies, documents, and audio.We have a long way to go, but this open beta is now available.
From Nony
computers
The Worst Acquisitions Apple Ever Made - Business Insider - Over the years, some of Apple's biggest successes have been the end result of the company acquiring another with promise and integrating their technologies with its own in a way that provides real value to users.
From Nony
computers
The North Korean Tablet Computer Samjiyon: Hardware, Software and Resources | 38 North: Informed Analysis of North Korea - A few months ago the ever-growing community of those interested in the DPRK learned that there is now something like a local version of the iPad—the Samjiyon tablet computer (p’anhyŏng k’omp’yut’ŏ samjiyŏn). After having had a chance to test it briefly during a visit in May 2013, I could not resist buying a Samjiyon in a shop in Pyongyang in September 2013. It cost me 180 Euros. After a few days of intensive use I can say that this is one of the few cases in my career as a consumer when I got more for my money than I had expected.
From Nony
|| 10/19/2013 ||
computers
cloudpaint.com -
From Nony
computers
Your D-Link router may have a backdoor | The Raw Story - A curious computer security professional published findings Saturday that deconstructed the firmware code for some D-Link router devices and discovered a backdoor built directly into the code. By changing the user-agent in a web browser to “xmlset_roodkcableoj28840ybtide,” a user could bypass the security on the device and get online or control the higher functions of the router.
From Anawaram
computers
Former NSA Honcho Calls Enterprise Security 'Appalling' - Former NSA technology boss Prescott Winter has a word for the kind of security he sees even at large, technologically sophisticated companies: Appalling.Companies large enough to afford good security remain vulnerable to hackers, malware and criminals because they tend to throw technological solutions at potential areas of risk rather than focusing on specific and immediate threats
From Anawaram
computers
A Few Thoughts on Cryptographic Engineering: RSA warns developers not to use RSA products - In today's news of the weird, RSA (a division of EMC) has recommended that developers desist from using the (allegedly) 'backdoored' Dual_EC_DRBG random number generator -- which happens to be the default in RSA's BSafe cryptographic toolkit. Youch.
From Anawaram
computers
Raspberry Pi as an Ad Blocking Access Point - This tutorial will show you how to use your Raspberry Pi as a WiFi access point that blocks ads by default for any devices using it. This is really neat in that it would work for your Android or iOS device, your Xbox 360, TiVo, laptop, and more without needing to customize any of those devices other than to use your Raspberry Pi as the access point for WiFi. Using an ad-blocker can be useful for conserving bandwidth, helping out low-power devices, or for keeping your sanity while browsing the web!
From Anawaram
:. Sponsored Links
Advertisement
computers
Phone Phreak Captain Crunch Rare Interview from '78 - Agreed with this quote completely: "wow, just before 18:00 he alludes to mass surveilliance of calls (silver box).... makes me think of Snowden's leaks on systematic government surveilliance... how short a memory we have... or we simply don't care as a society."

From Popper
computers
computers
Black Hat: Ad networks lay path to million-strong browser botnet | ITworld - Yet another item to add to my list of "I told you so" LOL!!!!
From Anawaram
computers
Samsung Smart TV: Like A Web App Riddled With Vulnerabilities | The Security Ledger - mart television sets aren’t short on cool features. Users can connect to Facebook and Twitter from the same screen that they’re using to watch Real Housewives of New Jersey, or log into Skype and use a built in- or external webcam to have a video chat. Unfortunately, the more TVs start to look like computers, the more they are becoming subject to the same underlying code vulnerabilities that have caused headaches and heartache in the PC space.
From Anawaram
computers
Wi-Fi routers: More security risks than ever | Security & Privacy - CNET News - LAS VEGAS -- More major brand-name Wi-Fi router vulnerabilities continue to be discovered, and continue to go unpatched, a security researcher has revealed at Defcon 21.Jake Holcomb, a security researcher at the Baltimore, Md.-based firm Independent Security Evaluators and the lead researcher into Wi-Fi router vulnerabilities, said that problem is worse than when ISE released its original findings in April. - add yet another to the "I told you SO!!!" list. LOL
From Anawaram
|| 08/05/2013 ||
computers
Hackers can watch you on your TV - "I told you so!!!" ;)
From Anawaram
computers
It Now Appears Possible to Hack a (Fancy, Japanese) Toilet - Robinson Meyer - The Atlantic - Satis - Japanese toilet (Hackable) LOL!!!!
From Anawaram
computers
Anonymous Web-host shut down, owner arrested; Tor users compromised by Javascript exploit - Boing Boing - FreedomWeb, an Irish company known for providing hosting for Tor "hidden services" -- services reached over the Tor anonymized/encrypted network -- has shut down after its owner, Eric Eoin Marques, was arrested over allegations that he had facilitated the spread of child pornography. Users of Tor hidden services report that their copies of "Tor Browser" (a modified, locked-down version of Firefox that uses Tor by default) were infected with malicious Javascript that de-anonymized them, and speculate that this may have originated with with FBI. Tor Browser formerly came with Javascript disabled by default, but it was switched back on again recently to make the browser more generally useful. Some are predicting an imminent Bitcoin crash precipitated by the shutdown.
From Anawaram
computers
Run Full Windows Applications on Your Windows RT Tablet - It's disgusting that M$ sells a crippled OS w/ their Surface RT, and to get the full functioning unit you must spend hundreds of $ more.

--Popper
From Popper
computers
DEF CON To Feds: We Need Some Time Apart - One of the more time-honored traditions at DEF CON — the massive hacker convention held each year in Las Vegas — is “Spot-the-Fed,” a playful and mostly harmless contest to out undercover government agents who attend the show.defconBut that game might be a bit tougher when the conference rolls around again next month: In an apparent reaction to recent revelations about far-reaching U.S. government surveillance programs, DEF CON organizers are asking feds to just stay away.
From Anawaram
:. Sponsored Links
Advertisement
computers
So, You Want to Hide from the NSA? Your Guide to the Nearly Impossible - Yahoo! News - Complaining about the government is a key part of being American, the first amendment to the Constitution. But it seems like a bit of a trickier proposition these days, with the government listening to everything you say online. In the interest of preserving your freedoms and bolstering our fair nation, here is the full articulation of the deeply paranoid and complex life you must live in order to assure that the government leaves you alone.
From Nony
computers
Altair 8800 Clone: A near-empty box filled with history - Owning a piece of computer history can be expensive and not much fun. You can buy a vintage MITS Altair 8800, one of the world’s first successful desktop computers, on eBay, but a good one will cost you over US$4,000. That’s why computer enthusiast Mike Douglas developed the Altair 8800 Clone. It’s a modern, inexpensive, functional reproduction of the historic Altair 8800 computer that uses 21st century technology to recreate a bit of computer history for hobbyists and educators.
From Popper
computers
Android Vulnerability Bypasses App's Digital Signature - A vulnerability exists in the Android code base that would allow a hacker to modify a legitimate, digitally signed Android application package file (APK) and not break the app’s cryptographic signature—an action that would normally set off a red flag that something is amiss.
From Anawaram
computers
Ask Slashdot: Explaining Cloud Privacy Risks To K-12 Teachers? - Slashdot - With the advent of Google Apps for Education, there has been a massive uptake by the K12 schools I deal with on signing students up with their own Google powered email address under the school domain. This combined by the fact that the students' work when using Google Apps is stored offshore and out of our control — with no explicit comeback if TOS are breached by Google — it seems to me that the school cannot with integrity maintain it has control over the data and its use. I have expressed a concern that it is unethical to use these services without informing the students' parents of what is at stake e.g. the students are getting a digital footprint from the age of seven and are unaware of the implications this may have later in life.
From Anawaram
computers
CBS News confirms multiple breaches of Sharyl Attkisson%u2019s computer - A cyber security firm hired by CBS News has determined through forensic analysis that Sharyl Attkisson’s computer was accessed by an unauthorized, external, unknown party on multiple occasions late in 2012. Evidence suggests this party performed all access remotely using Attkisson’s accounts. While no malicious code was found, forensic analysis revealed an intruder had executed commands that appeared to involve search and exfiltration of data.
From Anawaram
computers
Cloud computing is a trap, warns GNU founder - The concept of using web-based programs like Google's Gmail is "worse than stupidity", according to a leading advocate of free software.Cloud computing – where IT power is delivered over the internet as you need it, rather than drawn from a desktop computer – has gained currency in recent years. Large internet and technology companies including Google, Microsoft and Amazon are pushing forward their plans to deliver information and software over the net.
From Anawaram
computers
Facebook's first data center DRENCHED by ACTUAL CLOUD - Facebook's first data center ran into problems of a distinctly ironic nature when a literal cloud formed in the IT room and started to rain on servers.Though Facebook has previously hinted at this via references to a "humidity event" within its first data center in Prineville, Oregon, the social network's infrastructure king Jay Parikh told The Reg on Thursday that, for a few minutes in Summer, 2011, Facebook's data center contained two clouds: one powered the social network, the other poured water on it.
From Anawaram
computers
Chinese hacking only part of the story - Blackhat hackers (state sponsored and independents) are not the only ones to blame... The infrastructure was poorly designed and maintained. LOL - I've been saying this for YEARS!!! add it to the long list of "oh you're just too paranoid" - NOT!!!
From Anawaram
computers
Microsoft, FBI takedown Citadel botnet - Microsoft has successfully taken down one more botnet in collaboration with the FBI which was known to control millions of PCs across the globe and was allegedly involved in and responsible for bank fraud in tune of more than $500 million.
From Anawaram
computers
Memory gaffe leaves Aussie bank accounts open to theft - Applications - SC Magazine Australia - Secure Business Intelligence - Customers of major Australian banks are at risk of having usernames and passwords siphoned off by malware thanks to a flaw in the way credentials are stored.The client-side flaws allowed a custom malware tool to pull passwords, account numbers and access credentials from the Commonwealth Bank, ANZ Bank, Macquarie Bank, St George Bank and Bendigo Bank.
From Anawaram
:. Sponsored Links
Advertisement
computers
Robots Could Put Humans Out of Work by 2045 - Robots began replacing human brawn long ago—now they’re poised to replace human brains. Moshe Vardi, a computer science professor at Rice University, thinks that by 2045 artificially intelligent machines may be capable of “if not any work that humans can do, then, at least, a very significant fraction of the work that humans can do.”
From Anawaram
computers
Introducing Strongbox, a Tool for Anonymous Document-Sharing : The New Yorker - This morning, The New Yorker launched Strongbox, an online place where people can send documents and messages to the magazine, and we, in turn, can offer them a reasonable amount of anonymity. It was put together by Aaron Swartz, who died in January, and Kevin Poulsen. Kevin explains some of the background in his own post, including Swartz’s role and his survivors’ feelings about the project. (They approve, something that was important for us here to know.) The underlying code, given the name DeadDrop, will be open-source, and we are very glad to be the first to bring it out into the world, fully implemented.
From Anawaram
:. 0
|| 05/14/2013 ||
computers
computers
NATO conducts annual cyber defence exercise - Security - Technology - News - iTnews.com.au - The Western European and North American mutual defence pact organisation NATO has concluded an annual cyber defence exercise, defending a fictitious network against incoming attacks.
From Anawaram
computers
Cyber vulnerabilities found in Navy's newest warship: official | Reuters - (Reuters) - The computer network on the U.S. Navy's newest class of coastal warships showed vulnerabilities in Navy cybersecurity tests, but the issues were not severe enough to prevent an eight-month deployment to Singapore, a Navy official said on Tuesday.
From Anawaram
computers
computers
Stocks Finish Near Session Highs After Brief Plunge on 'Bogus' AP Tweet; Dow Soars 150 - Stocks took a steep plunge following a false AP tweet that indicated that the White House had been the victim of an explosion and that President Obama had been injured. The AP confirmed its Twitter account was hacked and the spokesman said the tweet was "bogus." The Twitter account was suspended shortly after the fake tweet.
From Anawaram
computers
The Hacker Lifecycle - benjamin alexander smith - In general I'm a very motivated person. But during my free time, my motivation is cyclical. It waxes and wanes over the course of 9-12 months. I've started to think of this as the hacker lifecycle.
From Anawaram
computers
Hijacking airplanes with an Android phone - An extremely well attended talk by Hugo Teso, a security consultant at n.runs AG in Germany, about the completely realistic scenario of plane hijacking via a simple Android app has galvanized the crowd attending the Hack In The Box Conference in Amsterdam today.
From Anawaram
computers
Azimuth Security: Unlocking the Motorola Bootloader - I recently spent some time dissecting the bootloader used on Motorola's latest Android devices, the Atrix HD, Razr HD, and Razr M. The consumer editions of these devices ship with a locked bootloader, which prevents booting kernel and system images not signed by Motorola or a carrier. In this blog post, I will present my findings, which include details of how to exploit a vulnerability in the Motorola TrustZone kernel to permanently unlock the bootloaders on these phones.
From Anawaram
:. Sponsored Links
Advertisement
computers
computers
Novell Netware 3.12 - Can you beat 16 years? - Epic uptime achievement unlocked. Can you beat 16 years?NetWare 3.12 server taken down after a decade and a half of duty. - Beat that Microsoft!!!
From Anawaram
computers
Most IT admins considering quitting due to stress - The number of IT professionals considering leaving their job due to workplace stress has jumped from 69% last year to 73%, underlining the increasingly challenging business landscape in the UK and the growing emphasis being placed on IT to help businesses grow, thrive and compete.
From Anawaram
computers
The Most Detailed, GIF-Based Map Of Internet Was Made Hacking 420,000 Computers - When, exactly, is hacking OK? Most people would agree that it's not OK for strangers to hack into people's computers and look at personal information. When the government threatens to look at people's online information in the name of safety, Internet users are unhappy to say the least. But what about groups that argue their hacking is for the greater good? Do they have the right to hack organizations for the betterment of the public? There's a blurry moral line when it comes to hacking, and it just got a little blurrier.
From Popper
|| 03/13/2013 ||
computers
Palm: I'm ready to wallow now - Palm computing retrospect
From Anawaram
computers
Japanese cops collar malware-carrying cat - When imagining law enforcement officers investigating and searching for cyber criminals or evidence about their activities, the last thing that you can probably envision is them searching for a stray cat.
From Anawaram
computers
61-year-old computer springs back to life - If not, here's the story: The 2.5-ton machine, first constructed in the 1950s as part of an atomic research program, became the "world's oldest original working digital computer" after a museum in the UK restored and then rebooted it on Tuesday. Unlike today's nearly mute devices, the massive computer clicks, clacks and flashes like something out of an old sci-fi movie.
From Popper
|| 12/15/2012 ||
computers
computers
European bank malware steals $47 million - Hackers operating in western Europe have managed to make off with more than $47 million, thanks to a new iteration of a widespread banking Trojan that intercepts two-step authentication text messages sent to customers' phones.
From Popper
computers
New 25 GPU Monster Devours Passwords In Seconds - There needs to be some kind of Moore’s law analog to capture the tremendous advances in the speed of password cracking operations. Just within the last five years, there’s been an explosion in innovation in this ancient art, as researchers have realized that they can harness specialized silicon and cloud based computing pools to quickly and efficiently break passwords.
From cw
:. Sponsored Links
Advertisement
computers
iTunes 11: It%u2019s time for Apple%u2019s horrible, bloated program to die. - Slate Magazine - iTunes 11 did not arrive on time. Apple originally promised to deliver the next version of its ubiquitous music-management program in October. Last month, though, the company announced that the release would slip to November, because the company needed “a little extra time to get it right.” This week the Wall Street Journal, citing “people who have seen it,” reported that the real cause was “engineering issues that required parts to be rebuilt.”
From Nony
computers
Security Firm VUPEN Claims to Have Hacked Windows 8 and IE10 - Windows 8 was released late last week, and already this week French security firm VUPEN says it has broken Microsoft’s latest and greatest security features. The company claims it has developed a 0-day exploit for Windows 8 and IE10, by chaining multiple undisclosed flaws together.
From Anawaram
computers
The Accidental History of the @ Symbol | Science & Nature | Smithsonian Magazine - Called the “snail” by Italians and the “monkey tail” by the Dutch, @ is the sine qua non of electronic communication, thanks to e-mail addresses and Twitter handles. @ has even been inducted into the permanent collection of the Museum of Modern Art, which cited its modern use as an example of “elegance, economy, intellectual transparency, and a sense of the possible future directions that are embedded in the arts of our time.”
From X Isle
|| 08/23/2012 ||
computers
You’ll Hate Windows 8 - Microsoft has good reason to change Windows so radically—the company considers the enormous popularity of the iPad a major threat to its business, and the new Windows is the company’s effort to get out in front of the tablet wave. Yet Windows 8 fails to guide users through the enormous changes that it dumps upon them. Many of the things one takes for granted in PCs—the Start menu, the file manager, running apps in Windows side-by-side—have been radically redesigned in the new OS. Doing some of the most basic computing tasks will require a re-education.
From Popper
computers
Review: Google Nexus 7 Tablet by Asus - While the Nexus 7 isn’t a full-on iPad-killer, it far out-classes anything else offered in the 7-inch category, and most 10-inch tablets too. The Nexus 7 does this by offering smartly designed, powerful hardware and the best Android tablet experience to date. For those who only use their gadgets to surf the web, check e-mail, play games and update their social media feeds, the Nexus 7 might be an even better choice than an iPad, given how much easier it is to carry around.
From X Isle
computers
'Leap Second' Bug Wreaks Havoc Across Web | Wired Enterprise | Wired.com - On Saturday, at midnight Greenwich Mean Time, as June turned into July, the Earth’s official time keepers held their clocks back by a single second in order to keep them in sync with the planet’s daily rotation, and according to reports from across the web, some of the net’s fundamental software platforms — including the Linux operating system and the Java application platform — were unable to cope with the extra second.Many computing systems use what’s called the Network Time Protocol, or NTP, to keep themselves in sync with the world’s atomic clocks, and when an extra second is added, some just don’t know how to handle it.
From X Isle
computers
This Tiny Computer is the Size of a USB Flash Drive : Discovery Channel - At Mobile World Congress, FXI Technologies debuted Cotton Candy, the computer in a thumb drive package. One end features USB, which it uses for power, while the other connects to displays with HDMI, CNET reports. In addition to the microSD slot, Cotton Candy includes a micro-USB port for peripherals. One thing it’s missing is an operating system. Users are directed to download either Android 4.0 or Ubuntu after purchasing and registering the product.
From X Isle
computers
Apple Quietly Pulls Claims of Virus Immunity | PCWorld - Apple removed the previous statement "It doesn't get PC viruses" and replaced it with "It's built to be safe," and "Safeguard your data. By doing nothing" with "Safety. Built in." A comparison of the old and new messages is currently available here.
From Nony
computers
How Much Data is Created Every Minute? - Data never sleeps. Every minute massive amounts of it are being generated from every phone, website and application across the Internet. Just how much data is being created and where does it come from?For that you should check out this Domo infographic.
From X Isle
computers
MIT creates self-assembling 3D nanostructures, could be the future of computer chips | ExtremeTech - MIT has devised a way of creating complex, self-assembling 3D nanostructures of wires and junctions. While self-assembling structures have been made from polymers before, this is the first time that multi-layer, configurable layouts have been created, opening up the path to self-assembled computer chips.
From X Isle
:. Sponsored Links
Advertisement
computers
Penny Arcade - Extra Credits %u2013 Spectrum Crunch - Great video on the bandwidth crunch, we're gonna run out of possible bandwidth to use. Nice video.
From X Isle
computers
The Only Post You Need To Read About Microsoft's New Tablet - So, Microsoft is making a tablet. Wait, let's just say this like normal people will say it: Microsoft is making an iPad. It's called the Surface.
From X Isle
computers
computers
WHERE ARE THEY NOW? What Happened To The People In Microsoft's Iconic 1978 Company Photo - Business Insider - We all know what happened with the two guys in the bottom left and bottom right corners -- Bill Gates, and Paul Allen. But what about the rest? We saw the question pop up on Hacker News recently, and decided to find out.
From Nony
computers
Researchers claim quantum breakthrough - Researchers say they have designed a tiny crystal that acts like a quantum computer so powerful it would take a computer the size of the known universe to match it.
From cw
computers
More than 600,000 Macs infected with Flashback botnet | Security - CNET News - More than half a million Macs are infected with the Flashback Trojan, a malware package designed to steal personal information, according to a Russian antivirus company.The company -- Dr. Web -- originally reported today that 550,000 Macintosh computers were infected by the growing Mac botnet. But later in the day, Dr. Web malware analyst Sorokin Ivan announced on Twitter that the number of Macs infected with Flashback had increased to 600,000, with 274 of those based in Cupertino, Calif. To see if you haven't got it: In terminal run: defaults read /Applications/Safari.app/Contents/Info LSEnvironment You should get this error: The domain/default pair of (/Applications/Safari.app/Contents/Info, LSEnvironment) does not exist Then run: defaults read ~/.MacOSX/environment DYLD_INSERT_LIBRARIES You should get this error: The domain/default pair of (/Users/YOURUSER/.MacOSX/environment, DYLD_INSERT_LIBRARIES) does not exist If you do you are clean of this variant! If this doesn't happen go here to fix it EDIT: I'm glad this is actually useful for people, it makes me feel warm and fuzzy inside to know I am being helpful! from: http://www.reddit.com/r/technology/comments/ru5g0/more_than_600000_macs_infected_with_flashback/
From X Isle
computers
computers
When computers were sexy: Hilarious vintage ads from the early days of the PC | Mail Online - Companies such as Apple have made their name by marketing their products not just as technological tools but as glamorous and fun toys.
From Nony
computers
WE'RE BLOWN AWAY:This Startup Could Literally ChangeThe Entire Software Industry - Numecent offers something it calls "cloud paging" and, if successful, it could be a game-changer for enterprise software, video gaming, and smartphone apps
From Guest_2012
|| 03/09/2012 ||
computers
Isochronous Application V0.8 - If you're changing planes or trains but have an hour or two of layover time you may want to explore your area, but it can be tricky to know how far you can go without getting lost or missing your next connection. Webapp Cartoo uses Google Maps to predict how far you can travel by foot, bicycle, or car from a given point and specific window of time. For example: the map above shows how far you can travel in New York in 1 hour, using a bicycle.
From X Isle
:. Sponsored Links
Advertisement
computers
IBM takes big steps toward extremely fast quantum computing | VentureBeat - IBM is announcing today that it has made major advances toward creating a practical, full-scale quantum computer, a fabled, theoretical machine that relies on the tiniest atomic properties to compute problems faster than any supercomputer that exists today.Scientists at IBM Research in Yorktown Heights, N.Y., said that their quantum computing solution leverages the underlying quantum mechanics of matter and that a real quantum computer, which could work on millions of computations at once, could be built in the next decade. The hugely multitasking devices will have big implications for fields such as data encryption.
From X Isle
|| 01/07/2012 ||
computers
The Restart Page - Free unlimited rebooting experience from vintage operating systems
From cw
computers
Exclusive: Millions of printers open to devastating hack attack, researchers say - Could a hacker from half-way around the planet control your printer and give it instructions so frantic that it could eventually catch fire? Or use a hijacked printer as a copy machine for criminals, making it easy to commit identity theft or even take control of entire networks that would otherwise be secure? It’s not only possible, but likely
From Popper
computers
The Sketchbook of Susan Kare, the Artist Who Gave Computing a Human Face | NeuroTribes - The gestures and metaphors of icon-driven computing feel so natural and effortless to us now, it seems strange to recall navigating in the digital world any other way. Until Apple's debut of the Macintosh in 1984, however, most of our interactions with computers looked more like this Command line How did we get from there to here?
From cw
computers
How a chain of tea shops kickstarted the computer age - A British company stands on the cusp of a technological breakthrough that will change the way the entire world operates. The idea is worth countless hundreds of billions of pounds and is years ahead of similar efforts in America and elsewhere. The year, alas, is not 2011, but 1951.
From cw
computers
Steve Jobs “Think Differently” is LSD - In this time of mourning over the passing of Steve Jobs it is important to understand what made him such and outstanding individual. And although it is an inconvenient truth to some people, his success was due to using LSD. That is what Apple’s trademark phrase “Think Differently” is referring to. In his own words, Jobs said that taking LSD was “one of the two or three most important things I have done in my life.”
From Popper
computers
Microsoft AV Mistakes Google Chrome For a Virus - If you're a PC user who can't launch your Google Chrome browser, blame Microsoft.Around 3,000 Google Chrome users couldn't access or even find their browsers on Friday, thanks to a bug in Microsoft Security Essentials (MSE) antivirus that tagged Google Chrome as a piece of malware.
From Nony
computers
Windows 8 Developer Preview Download - The Windows Developer Preview is a pre-beta version of Windows 8 for developers. These downloads include prerelease software that may change without notice. The software is provided as is, and you bear the risk of using it. It may not be stable, operate correctly or work the way the final version of the software will. It should not be used in a production environment. The features and functionality in the prerelease software may not appear in the final version. Some product features and functionality may require advanced or additional hardware, or installation of other software.
From cw
computers
computers
30 Years of the PC: A Timeline | PCMag.com - The PC didn't magically appear in its current wide-screen, multi-core, HD/3D viewing form overnight. It took many years (30, to be exact) to evolve from the venerable IBM PC of 1981 to the high-powered tech gadgets of today. The original idea of the PC was sound: using off the shelf parts combined with a relatively open, but fiercely curated set of standards so we wouldn't have to reinvent the wheel every time we wanted to advance from one version of the PC to the next. Remember that in the 1960s and 1970s, you routinely had to know assembly or machine language commands to operate a computer to its fullest potential. Now all manner of computers from PCs to smartphones to tablets are touch-enabled and simple enough for even a two year old to manage.
From cw
:. Sponsored Links
Advertisement
|| 06/08/2011 ||
computers
computers
California prisoners: Computer errors allow violent California prisoners to be released unsupervised - A computer system that lacked key information about inmates factored in the release of an estimated 450 prisoners with a "high risk of violence," according to the California inspector general.

Computer error? More like programming error
From Nony
computers
The Computer Chronicles - Software - 1985 - Vintage debate on computer piracy and hacking.
From Popper
computers
|| 04/12/2011 ||
computers
YouTube - unicode - shows all displayable characters in the unicode range 0 - 65536 (49571 characters). one character per frame.
From Nony
computers
|| 04/04/2011 ||
computers
Osborne! - The machine, the man, and the dawn of the portable computing revolution.
From Nony
computers
IE8, Safari Fall to Pwn2Own Hackers, Chrome Still Standing - Hackers at the Pwn2Own 2011 hacker conference at the CanSecWest conference in Vancouver broke through defenses in Apple's Safari 5.0.3 on fully patched Mac OS X 10.6.6 and Internet Explorer 8 on Windows 7 SP1.Pwn2Own has become one of the top security events of the year, even if it's a rather routine affair. Lots of products get hacked, some survive. It's not clear if the contest says anything meaningful about the security of the products, but there is a wide consensus that competitions like this improve security overall by pushing developers to do their best, if only out of pride.
From cw
computers
YouTube - Chain of Fools : Upgrading through every version of windows (HQ) - An experiment to see the effects of installing every major upgrade version of windows, in order, on the same machine.
From Nony
|| 02/26/2011 ||
computers
:. Sponsored Links
Advertisement
computers
Watson Takes Lead in Day 2 of 'Jeopardy! Match - IBM's super computer Watson clobbered the competition on night two of the three-day man vs. machine "Jeopardy!" challenge.
From Popper
computers
The birth of the first personal computer virus, Brain - TWENTY-FIVE years ago today, two brothers in Pakistan came up with a new and novel way to catch out software pirates. As it turned out, they also gave birth to one of the greatest annoyances in the modern world.
From Popper
|| 12/23/2010 ||
computers
computers
The 1970s Computer Graphics Video That Inspired Tron - MAGI was founded in 1966 to help the government model nuclear radiation transport, or the way that radiation would travel in the event of a nuclear catastrophe. By the 1970s, it had become one of the country’s only computer graphics companies, thanks largely to a software package it developed called Synthavision. Using the techniques of ray-tracing and constructive solid geometry, Synthavision’s modeling eschewed polygons or wireframe meshes for solids.
From Popper
|| 12/18/2010 ||
computers
Kinect sex – what's the holdup? - Meanwhile, some wily folks have been hacking the device and getting it to do some pretty nifty stuff. So one can only imagine that somewhere...out there...someone is working on a homebrew game of virtual boom-boom. In fact, industrious tinkerer Dan Wilcox has already hacked the Kinect to track breasts — man breasts that is.
From Popper
computers
Computer virus Stuxnet a 'game changer,' DHS official tells Senate - A highly complex computer attack that may have been targeting Iran's nuclear power plants is posing a serious security threat to critical infrastructure worldwide, according to government and cyber-industry experts testifying Wednesday on Capitol Hill.
From cw
computers
Air Force Unveils Fastest Defense Supercomputer, Made of 1,760 PlayStation 3s - The holidays may be driving video game console sales, but apparently so is the military. The Air Force Research Laboratory (AFRL) has strung together 1,760 PlayStation 3 gaming systems to create what it’s calling the fastest interactive computer system in the entire DoD, capable of executing 500 trillion floating point operations per second.
From Popper
|| 11/30/2010 ||
computers
Pentium-III autopsy - For teaching a course I needed to take a closer look at a CPU. I asked around and got my hands on an old P-III Coppermine that was about to get thrown out. I’ll start with a disclaimer: I know virtually nothing about CPUs, so if I claim something to be true, it probably isn’t.The first challenge is to get the actual silicon processor chip off of the plastic bonding board. In the picture below, the blue thing you see is the back side of the processor chip. When the processor is finished, it is turned upside down and bonded to the green circuit board. This allows the metal pads on the silicon chip and the pads on the circuit board to join, creating a connection (this is one of those claims...). I believe that the CPU at that stage is heated up in order to melt the joints and thereby solder them together.
From danomil
computers
Rare original 'Apple-1' computer sold by Steve Jobs from his parents' garage goe - The first ever Apple computer that company founder Steve Jobs sold from his parents' garage is up for sale - for a whopping Ł150,000. There were about 200 examples of the original 'Apple-1' that were launched in 1976 and only a few survive today. They were the forerunners of the iPod, iPad, iPhone and everything else that Apple has produced over the years.
From Popper
computers
Student who hacked OReilly, Coulter websites sentenced to 30 months in jail - A 23-year-old Ohio student who took down the websites of Fox News' Bill O'Reilly and conservative pundit Ann Coulter, and briefly disrupted the network of the University of Akron, has been sentenced to 30 months in prison.
From cw
:. Sponsored Links
Advertisement
computers
Alternative software and apps to your PC (Windows, Linux), Mac, iPhone, Android, Web/Online and other platforms. - AlternativeTo.net - AlternativeTo is a new approach to finding good software. Tell us what application you want to replace and we give you great alternatives, based on user recommendations
From Nony
computers
Change to 'Bios' will make for PCs that boot in seconds - New PCs could start in just seconds, thanks to an update to one of the oldest parts of desktop computers.The upgrade will spell the end for the 25-year-old PC start-up software known as Bios that initialises a machine so its operating system can get going.
From cw
computers
computers
Robots hook up to fly as a single unit - Researchers have created robots that seek each other out and then link up, Voltron-style, to form a larger flying machine.
From popper
computers
Third co-founder of Apple walked away with hundreds of dollars, not billions - Wayne, 76, was present at the birth of cool April 1, 1976: Co-founder, along with Steve Jobs and Steve Wozniak, of Apple Computer Inc., Wayne designed the company's original logo, wrote the manual for the Apple I computer and drafted the fledgling company's partnership agreement. That agreement gave him a 10 percent stake in Apple, which would be worth more than $22 billion today if Wayne had held onto it. But he didn't.
From popper
|| 05/25/2010 ||
computers
|| 04/22/2010 ||
computers
|| 03/08/2010 ||
computers
What Apple Sells... - Apple has never really been in the business of selling product. What Apple really sells is an experience.
From popper
computers
The Aurora IE Exploit Used Against Google in Action - In the video you will see Metasploit set up a listening session, set up a web site that serves up the malicious code, and watch as an unsuspecting user visits the web site, triggers the attack that uses the IE vulnerability, and unknowingly opens a connection to a computer owned by the attacker. The attacker then lists the user’s processes, and elects to kill Notepad where the user was working on an important document. IE 6.0 is used, as this is the version Microsoft references as having been used in the “targeted attacks” on some 30 U.S. companies.

From cw
computers
German Government: Stop Using Internet Explorer - In a statement issued today, the German Federal Office for Security in Information Technology (known as BSI) recommends that all Internet Explorer users switch to an alternative browser. They may resume using Explorer after a fix is issued by Microsoft for a critical vulnerability that has been implicated in the Chinese cyberattack against Google.
From cw
:. Sponsored Links
Advertisement
computers
10 things Ive overheard about my Linux laptop while on public transportation - I've been taking the train to work for 4 years now. It's a 45 minute rambling ride in which I usually either read a book, sleep, or grab my laptop loaded up with Ubuntu and get some stuff done. Over time, I've collected a few funny remarks I've either over heard, or that people have said directly to me. Here are the 10 best.
From cw
|| 01/11/2010 ||
computers
computers
Ye Olde Vintage Computer Gift Guide - Got a nostalgic geek on your holiday shopping list? Check out this list of classic PCs and other tech paraphernalia, many available for $10 or les
From popper
|| 12/07/2009 ||
computers
Acer: We'll have the first Chrome OS Netbook - The company's chairman says in an interview that Acer has been working on it since earlier this year.
From cw
|| 11/03/2009 ||
computers
Why computers suck at maths - Computers might struggle to exhibit intelligent behaviour, but blindly performing arithmetic calculations is surely their forte. Or is it?The failure of Google's online calculator and Excel's apparent inability to give correct answers to simple calculations are both well-known problems among programmers, but these aren't really bugs in the normal sense of the word. Instead they're just a consequence of the fact that computers suck at maths.
From Nony
computers
SCO fires CEO Darl McBride, architect of litigation strategy - In an SEC filing published today, SCO revealed that CEO Darl McBride has been terminated and is no longer with the company. The decision to fire the controversial CEO is part of a restructuring plan that is based on recommendations made by the Chapter 11 trustee who was assigned to SCO by the justice department.
From bofh
|| 09/30/2009 ||
computers
DOS Museum -
From Nony
|| 09/24/2009 ||
computers
Computer Power Test -
From Nony
computers
Thesis comes to life in cardboard computer case - The cardboard case, which can be assembled without fasteners and screws, eliminates the need for those parts and the manufacturing processes used to create them.
From bofh
|| 09/15/2009 ||
computers
Download More RAM! - What is this site you ask? Download more RAM does exactly what it says on the tin. Our website gives you the ability to 'download more RAM' at no cost! Just select the amount you need and download! Your speed will be improved instantly!
From Nony
:. Sponsored Links
Advertisement
computers
|| 09/10/2009 ||
computers
Back in the U.S.S.R - November 18, 1992. Wednesday. Deep in the heart of Siberia lives a winking monster. It is rumored to occupy an entire floor and to be outfitted with thousands of flashing console lights. Once part of the U.S.S.R.'s military, space, engineering, meteorological, and computer-science programs, it is the last working version of the legendary BESM-6 supercomputer. It stands amid the debris of its three compatriots, which have been smashed and melted down for the salvage value of their precious-metal content. I have pushed forward the timing of our visit to the former Soviet Union in an effort to save the last machine from the same violent fate.
From cw
computers
Hole in Windows Vista and 7 allows remote reboot - A vulnerability in Microsoft's implementation of the SMB2 protocol can be exploited via the net to crash or reboot Windows Vista and Windows 7 systems. The root of the problem is an error in how the srv2.sys driver handles client requests when the header of the "Process Id High" field contains an ampersand. The attack does not require authentication; port 445 of the target system merely has to be accessible, which in the default Windows local network configuration, it usually is. SMB2 is an extension of the conventional server message block protocol.
From cw
computers
Microsoft: Cyber-crooks Exploiting Unpatched IIS Bug (PC World) - PC World - Microsoft says that cyber-criminals are starting to exploit an unpatched bug in its IIS server software that was made public earlier this week.
From cw
computers
Petabytes on a budget: How to build cheap cloud storage - At Backblaze, we provide unlimited storage to our customers for only $5 per month, so we had to figure out how to store hundreds of petabytes of customer data in a reliable, scalable way—and keep our costs low. After looking at several overpriced commercial solutions, we decided to build our own custom Backblaze Storage Pods: 67 terabyte 4U servers for $7,867.In this post, we’ll share how to make one of these storage pods, and you’re welcome to use this design. Our hope is that by sharing, others can benefit and, ultimately, refine this concept and send improvements back to us. Evolving and lowering costs is critical to our continuing success at Backblaze.
From cw
computers
You must obey: Unwritten laws of technology - Gordon Moore has one law but we've got him beat. Here at the (unofficial) Tech Law Brain Trust, we maintain a definitive, ever-expanding archive of the laws that govern your technology experiences — whether you know it or not. Please scan these lists to ensure that you are in compliance.
From Popper
computers
Is Adobe the next (pre-2002) Microsoft? - Nearly half of targeted attacks exploit holes in Acrobat Reader, which is used to read PDF (portable document format) files, according to F-Secure. Meanwhile, the number of PDF files used in dangerous Web drive-by attacks jumped from 128 during the first three and a half months of last year to more than 2,300 during that time this year, the company said.
From cw
computers
Inside the Worlds Most Hostile Network - As the world's largest hacker convention, DefCon is also home to the world's most hostile wired and wireless networks.This, understandably, creates challenges for the people in DefCon's Network Operations Center (NOC), who were tasked with keeping the networks up and running and relatively clean of malicious traffic during the four days the conference ran this year.
From cw
computers
Catastrophic Bug Found in Windows 7 RTM Build, Launch May be Delayed - Microsoft is now in code-red panic mode as a major bug has been found in Windows 7's RTM build, one which threatens to kill the OS's release party. The RTM build -- 7600.16385 -- thus far only received by a handful, features a reportedly massive memory leak in the unassuming, but frequently used program chkdsk.exe.
From cw
|| 07/19/2009 ||
computers
56K Modem Emulator - A.K.A. Sounds Broadband Users Never Hear
From cw
:. Sponsored Links
Advertisement
computers
computers
|| 07/14/2009 ||
computers
computers
computers
computers
Computer Failures Are Probed in Jet Crash - WSJ.com - Aviation investigators, running out of time to find the "black boxes" with key information on the crash of Air France Flight 447, suspect a rapid chain of computer and equipment malfunctions stripped the crew of automation today's pilots typically rely on to control a big jetliner.An international team of experts is building a scenario in which it believes a cascade of system failures, seemingly beginning with malfunctioning airspeed sensors, rapidly progressed to what appeared to be sweeping computer outages, according to people familiar with the probe. The Airbus A330, en route from Rio de Janeiro to Paris, crashed into the Atlantic Ocean during a storm 26 days ago, killing all 228 aboard.
From danomil
computers
Laptops With Sealed-in Batteries - But there’s a dirty little secret about removable-battery laptops owned by average consumers: Hardly anybody buys extra batteries. Research firm NPD estimates that fewer than 5% of consumers buy a spare. So, a small trend has begun in the industry: More electronic products are being designed with their rechargeable batteries sealed inside. For instance, Dell’s new high-end laptop, the Adamo, has a sealed battery, as does the excellent Flip pocket video camera.........Apple says this makes sense because sealing in the batteries lets the company make them larger, without adding heft to the laptops. Apple says the two models are the same size and weight as their predecessors, yet their battery capacity has grown by 33% and 46%, respectively.
From danomil
|| 06/24/2009 ||
computers
A Helping Hand From Afar - Windows XP comes with a Remote Assistance feature that lets an “expert” control the computer of a “novice” over a network connection (like the Internet) to adjust system settings, look for lost files or provide other help. The feature takes a little bit of advance set-up, but Microsoft has a full overview here.Windows Vista also has its own Windows Remote Assistance service that can let it connect to other computers running Vista or Windows XP. To use it, go to the Start button to All Programs. Click on Maintenance and then on Windows Remote Assistance in the menu. A wizard then offers to walk you through the steps of either helping or being helped. A page on Microsoft’s site explains how Remote Assistance works — and offers some caveats about privacy and security.
From danomil
computers
Inside the World's Greatest Keyboard - From the satisfying click of its keys to its no-nonsense layout and solid steel underpinnings, IBM's 24-year-old Model M is the standard by which all other keyboards must be judged.
I'm typing on one of these right now!
From cw
computers
:. Sponsored Links
Advertisement
computers
Why Your Laptop's Batteries Die So Fast - Imagine if automakers got together and started measuring the gas mileage of new cars with a cool test of their own making—one in which the cars were rolling downhill with their engines idling. Suddenly you'd have some pretty amazing claims: Why, that three-ton SUV gets 300 miles per gallon! This subcompact gets 500! In tiny print at the bottom of the window sticker you'd find a disclaimer saying that, well, um, you know, your mileage may vary.Crazy, right? Yet that's more or less what's happening with laptop computers and their battery lives. Right now, I'm looking at a Best Buy flier touting a $599 Dell laptop that gets "up to 5 hours and 40 minutes of battery life." Down in the fine print comes a disclaimer explaining that "battery life will vary" based on a bunch of factors. Translation: you ain't gonna get five hours and 40 minutes, bub. Not ever. Not even close.
From danomil
computers
PC Touch-Screen Technology Moving Beyond Curiosity - NYTimes.com - For years, companies have dabbled with the touch-screen technology that lets people poke icons on a display to accomplish tasks like picking a seat at an airport check-in kiosk. Apple elevated such technology from a novelty to a must-have feature on mobile devices with its iPhone. People can flip through pictures with a flick of a finger or make a document larger by pressing two fingers against the screen and stretching them out.Now both personal computer manufacturers and software makers hope to do more with touch on larger devices by giving people a 10-fingered go at their screens.
From danomil
computers
Sony ready to unveil its PSP Go at E3 tomorrow | DVICE - Here at DVICE we like us some leaks, and this one will have gamers looking forward to Tuesday. Sony is unveiling the PSP Go at E3 in Los Angeles, and pictures of the handheld have already hit the web. The UMD disk format has been dropped, but there's a 16GB flash memory, plus a Memory Stick Micro slot and Bluetooth support
From danomil
computers
computers
Four Ways to Strengthen a Password - Today, I’d like to go over what makes a good, strong password, the kind you should be using to, at minimum, protect online access to your financial accounts.
From danomil
computers
Apple Could Find Healthy Market For $700 Touch-Screen Tablet -- Apple -- InformationWeek - If Apple is building a touch-screen tablet as imagined by a recent analyst report, then the computer maker could find a strong market among consumers willing to pay more for a device that's easier to use and more functional than today's netbooks.Piper Jaffray analyst Gene Munster believes Apple is working on a device that would have a 7- to 10-inch touch screen and sell for $500 to $700, Apple Insider reported Thursday. The gadget would fill the gap between Apple's $400 iPod Touch and $1,000 MacBook.
From danomil
computers
The Race to Provide Wi-Fi at 30,000 Feet - SOME airlines are rushing to offer Wi-Fi Internet connections in their domestic aircraft cabins, but none are talking about the space squeeze.
From danomil
computers
Want to Speed up Your Computer? » The Fastest Computer Setup On Earth - Is your computer lagging? Does it take 20 minutes to start-up your PC? Days to download a movie? Weeks to print a few colour photos? Want to know ways to speed up your computer?Well providing you have enough disposable income, or well-placed family members, the technology is available to make computer-related waiting times a thing of the past. Sure, the technology we’re going to show you will probably be outdated by the time you’ve saved up enough cash to get your hands on it, but it’s good to drool.
From danomil
computers
Create a Free website, Flash website builder - You can make stunning Flash websites for free!
From danomil
computers
OhGizmo! » Archive » Rumor - Eee Keyboard To Be Released Next Month - The Eee Keyboard is basically your entire computer wrapped up into a nice neat keyboard package. It seems to be destined for the living room, what with it’s wireless HDMI and all. The 5-inch touchscreen is really what sells the device for me. Speaking of selling, when exactly can we expect to see these on the market?
From danomil
:. Sponsored Links
Advertisement
computers
Companies Object to Google Policy on Trademarks - - When Audrey Spangenberg idly typed “FirePond,” the name of her small software company, into Google this year, she was not happy with what she saw. Her company’s site came up as the top search listing. But just above it, Google showed the ads of competitors that had paid Google to display their marketing messages whenever someone searched for FirePond, a registered trademark.
From danomil
computers
Five Controversial Ways to Speed Your PC - My continuing project this week has been converting an old Toshiba laptop into the fastest blogging machine possible. My overhauled PC screams, thanks to some tricks most technology writers wouldn’t dream of telling you to try.
From danomil
computers
Cable Blues: Tangled & Crazy Wiring - Since our last issue we received a bunch of perplexing photos from all over the world, showing unceasing struggle of sysadmins, electricians and sound technicians against the sinister Doom of Second Law of Thermodynamics - the one of increasing entropy.Even though the struggle seems futile, various stuff still needs to be done - so these pictures of wiring messes testify that somewhere, somehow, someone actually understands where every cable goes and how the whole thing works:
From danomil
computers
computers
64 Things Every Geek Should Know - LaptopLogic.com - The term 'geek', once used to label a circus freak, has morphed in meaning over the years. What was once an unusual profession transferred into a word indicating social awkwardness. As time has gone on, the word has yet again morphed to indicate a new type of individual: someone who is obsessive over one (or more) particular subjects, whether it be science, photography, electronics, computers, media, or any other field. A geek is one who isn't satisfied knowing only the surface facts, but instead has a visceral desire to learn everything possible about a particular subject.
From danomil
|| 05/02/2009 ||
computers
Wolfram Alpha in Action - Last weekend, we attended a web demo of Wolfram Alpha, a new "computational knowledge engine" based on the work of Stephen Wolfram. Some have dubbed Alpha a "Google killer," but, in reality, it is very different from the standard search engines that we are all familiar with today.
From Danomil
computers
Conficker virus begins to attack PCs: Experts - BOSTON (Reuters) - A malicious software program known as Conficker that many feared would wreak havoc on April 1 is slowly being activated, weeks after being dismissed as a false alarm, security experts said. Conficker, also known as Downadup or Kido, is quietly turning an unknown number of personal computers into servers of e-mail spam, they added.
From CC
|| 04/21/2009 ||
computers
Cinematograph HD Video Work log - This is my video work log documenting the build of my latest case mod, the Cinematograph HD. The Cinematograph HD is a complete, easily transportable, HD editing system. It features 2 22" monitors, desktop speakers, and full sized computer components, which include : 5 3.5" Hard drives, full ATX motherboard, full sized graphics, full sized PSU, and even a full sized optical drive. Additionally, the case houses a wireless keyboard and mouse for transport, so the only cable required is a standard PC power connector.
From cw
|| 04/09/2009 ||
computers
computers
Commodore 64 Original Hardware Laptop - Commodore 64 Original Hardware Laptop
From Nony
:. Sponsored Links
Advertisement
computers
The Official Site of Benjamin J Heckendorn - Commodore 64 Original Hardware Laptop
From TerminalGlitch
|| 04/03/2009 ||
computers
Conficker Eye Chart - If you can see all six images in both rows of the top table, you are either not infected by Conficker, or you may be using a proxy server, in which case you will not be able to use this test to make an accurate determination, since Conficker will be unable to block you from viewing the AV/security sites.
From cw
computers
Engineering Windows 7 : Beta to RC Changes %u2013 Turning Windows Features On or Off - MS is setting the option to turn off IE 8 and a host of other features. Not really getting rid of them but denying access. Not what they should be doing but it's a step in the right direction.
From TerminalGlitch
computers
New malware attempts legitimacy by spreading phony reviews - Ars Technica - Scareware has found itself a new flavor in Anti-Virus-1, possibly in response to court cases and investigations launched against Antivirus XP last year. In this case, the program is a bit malware, a bit scareware, and generally bad news. It doesn't just yammer at the user with false positives, it'll also hijack your browser and aim it at phony positive reviews—of itself.
From TerminalGlitch
computers
Take Your Time Adobe, It's Only a Severe Vulnerability - Take Your Time Adobe, It's Only a Severe Vulnerability
From TerminalGlitch
|| 02/20/2009 ||
computers
Fun With An Old Hardrive - Video -
From TerminalGlitch
computers
|| 02/06/2009 ||
computers
Microsoft offers to just 'Fix it' - Over the past six weeks, Microsoft has quietly added a "Fix it" button to a few of the thousands of help documents on its Web site. When clicked, the computer then takes all the recommended steps automatically.

This just seems like a really bad idea.
From Nonoxyl

computers
Don't Fear the Penguin: A Newbie's Guide to Linux - Network World - Getting started with Linux can be an intimidating task, particularly for people who have never tried any operating system besides Windows. In truth, however, very little about Linux is actually difficult to use. It's simply a different OS, with its own approach to doing things. Once you learn your way around a Linux desktop, you're likely to find that it's no more challenging to work with than Windows or Mac OS.
From Nonoxyl
computers
PlayStation 3 tackles black hole vibrations - When black holes are perturbed, they vibrate somewhat like a ringing bell. Now astronomers have narrowed down the rotational speed at which that vibration should stop. As is typical, they did it out by running a simulation. But instead of a supercomputer, they used a batch of Sony PlayStation 3 gaming consoles wired together.
From popper
:. Sponsored Links
Advertisement
computers
This guy is in trouble if his girlfriend sees his messy room! - His girlfriend is coming to visit him, so he quickly needs to clean up his room. This looks so cool!
From MercenaryFan
computers
Malware infestation responsible for credit card data breach - Move over TJ Maxx, payment processor Heartland Payment Systems has potentially leaked up to 100 million credit and debit accounts into the black market. That number, if verified, would make this the largest data breach on record. It also means the United States has managed to set two national records in the same day. Guess which one folks are paying attention to? Awful convenient, that.
From Nonoxyl
|| 01/03/2009 ||
computers
g-speak overview - cool! - radically condensed demonstration of oblong's g-speak spatial operating environment
From cw
computers
Unusual disk latency - don't shout at your computer! - This screenshot is from Analytics on the 7410. The issue is not with the 7410, it's with disk drives in general. The disk latency here is also not suffered by the client applications, as this is ZFS asynchronously flushing write data to disk. Still, it was great to see how easily Analytics could identify this latency, and interesting to see what the cause was.
From cw
computers
Langa Letter: XP's Little-Known 'Rebuild' Command - The Rebuild command--technically a software "switch" used with XP's Bootcfg tool--automatically searches a hard drive for valid startup information and files, letting you choose the correct ones. This has the effect of removing and repairing any references to whatever invalid, missing, or corrupt startup information was preventing normal booting.
From cw
computers
The humble computer mouse celebrates its 40th anniversary - The first public demonstration of the computer mouse took place 40 years ago on 9 December, 1968.
From cw
computers
World's first personal supercomputer unveiled - The world's first personal supercomputer, which is 250 times faster than the average PC, has been unveiled. Nice I might actually be able to run photoshop without it locking up.
From warthog
|| 12/05/2008 ||
computers
Top 10 weirdest USB devices ever - Here’s the list of the Top 10 weirdest USB devices ever:
From popper
computers
IBM Begins Work on New Generation HAL 1000 - IBM has announced it will lead a US government-funded collaboration to make electronic circuits that mimic brains.
From NeoCon
computers
original.aspx (JPEG Image, 2149x2111 pixels) - Scaled (25%) - Now THIS is a lot of cpu cores...Oh. My. God.
From Surfer
:. Sponsored Links
Advertisement
|| 11/06/2008 ||
computers
Can You RUN It? - Can your computer run that game?Automatically analyze your computer in just seconds, and it's FREE.
From Nony
computers
First look at Windows 7's User Interface - At PDC today, Microsoft gave the first public demonstration of Windows 7. Until now, the company has been uncharacteristically secretive about its new OS; over the past few months, Microsoft has let on that the taskbar will undergo a number of changes, and that many bundled applications would be unbundled and shipped with Windows Live instead. There have also been occasional screenshots of some of the new applets like Calculator and Paint. Now that the covers are finally off, the scale of the new OS becomes clear. The user interface has undergone the most radical overhaul and update since the introduction of Windows 95 thirteen years ago.
From cw
|| 10/28/2008 ||
computers
10 unusual operating systems - This post is about the desktop operating systems that fly under the radar of most people. We are definitely not talking about Windows, Mac OS X or Linux, or even BSD or Solaris. There are much less mainstream options out there for the OS-curious.
From Nony
computers
computers
computers
|| 08/20/2008 ||
computers
EU Hits Intel with fresh charges - European regulators have filed fresh charges against the world's biggest computer chip maker Intel over alleged abuse of its dominant market position. The European Commission (EC) accused the firm of paying a leading European retailer not to stock products containing chips made by rival AMD.
From CC
|| 08/13/2008 ||
computers
All your VM's are belong to us - As of tomorrow morning, VM's running on all hosts with ESX 3.5U2 in enterprise configurations will not power on. VMotion/HA/DRS will probably also not work.Boom.Apparently, there is some bug in the vmware license management code. VMware is scrambling to figure out what happened and put out a patch.Running VM's will not be immediately impacted.
From cw
computers
India says it is developing a $10 laptop - India is developing a laptop to be sold at $10 that will target higher education applications, a minister of the federal government said today in Delhi.
From cw
|| 07/25/2008 ||
computers
IBM Slides - It's 1975 And This Man Is About To Show You The Future(Scenes From An IBM Slide Presentation)
From Surfer
:. Sponsored Links
Advertisement
|| 07/24/2008 ||
computers
Windows Search 4.0 for Windows XP - Add Windows Vista start menu search feature to XP (via Microsoft).
From Surfer
computers
ASUS' Big Development - Columns by PC Magazine - While the media is downplaying ASUS' ROM boot chip, it may be the most interesting development in a while.
From Nonoxyl
computers
Features removed from Windows Vista - Wikipedia, the free en - A ginormous and legitimate list why Vista sucks: a comprehensive list of the useful things that's in XP but not in Vista.
From Surfer
|| 07/08/2008 ||
computers
360desktop Media -
From Surfer
computers
Bend Over Dude, You%u2019re Getting A Dell | Ripten.com - Dell disables sound card recording feature at pressure of RIAA
From Surfer
|| 07/07/2008 ||
computers
Keyboard Warrior - Interesting
From CC
computers
Microsoft Watch - Operating Systems - DOJ Has Windows 7, Why - Windows 7 already is being reviewed by U.S. government technical appointees, something many Microsoft executives probably couldn't have much imagined happening a year ago.Under the terms of Microsoft's November 2001 Justice Department settlement and final court judgment issued about a year later, a government-sanctioned "Technical Committee" has overseen Windows development. The TC is responsible for ensuring that Microsoft complies with the terms of the final judgment, investigating complaints about Microsoft abuses and regularly reporting on the company's compliance.
From Surfer
computers
Photo of great grandfather of modern computers found - Teleg - This is the first known photograph of the great grandfather of modern digital computers - a room sized, one ton jumble of wiring, valves and racks that was 640 million times less powerful than its descendant, the pocket-sized iPod.
From cjdusa
computers
Firefox 3 coming soon! :: The Mozilla Blog - The outpouring of interest and enthusiasm around Firefox 3 has been overwhelming (literally!). Our servers are currently feeling the burn and should be back to normal shortly. Download day will officially commence once the site goes live. The 24 hours period will be clocked from that moment. Thanks for your continued support.
From cjdusa
computers
Charging by the Byte to Curb Internet Traffic - By BRIAN STELTER Some people use the Internet simply to check e-mail and look up phone numbers. Others are online all day, downloading big video and music files. For years, both kinds of Web surfers have paid the same price for access. But now three of the country’s largest Internet service providers are threatening to clamp down on their most active subscribers by placing monthly limits on their online activity.
From warthog
:. Sponsored Links
Advertisement
|| 06/06/2008 ||
computers
IBM fills chips with water - Beating the 3-D stacking heat Oh, those crazy kids at IBM's Zürich lab. They can't get enough of processor cooling technolog
From cw
computers
US bank loses unencrypted data on 4.5m people | The Register - ouriers lost magnetic tapes containing the personal details of 4.5 million people who had dealt with the Bank of New York Mellon, it has emerged. The incident happened three months ago, but has only surfaced after legal papers were filed in the state of Connecticut.
From bofh
computers
Microsoft urges Windows users to shun 'carpet bombing' Safari - Rare security warning from Redmond Microsoft's security team is advising users to stop using Apple's Safari browser pending investigation into a quirk that allows miscreants to litter their desktop with hundreds of executable file
From cw
computers
Judge to Dell: Dude, you're defrauding your customers! - The New York State Supreme Court has dealt a blow against Dell by ruling that the company and its affiliate, Dell Financial Services, engaged in fraud, false advertising, deceptive business practices, and abusive debt collection practices.Justice Joseph Teresi ruled against the companies late last week, saying that Dell repeatedly misled customers and failed to live up to promises. The monetary damages have yet to be determined, but New York Attorney General Andrew Cuomo said that Dell will eventually have to pay back customers. The company will also have to turn over any "unlawfully earned" profits to the state.
From cw
computers
Incredible folding laptop untucked on eBay - Origami computing Laptops are designed to be portable, so a 19.5in machine is really defeating the object. Unless, that is you buy one that folds up. Now, thanks to one eBayer, you ca
From cw
computers
KOB.com - Group wants Wi-Fi banned from public buildings - A group in Santa Fe says the city is discriminating against them because they say that they're allergic to the wireless Internet signal. And now they want Wi-Fi banned from public buildings.Arthur Firstenberg says he is highly sensitive to certain types of electric fields, including wireless Internet and cell phones.
From cjdusa
computers
computers
Revealed! The new face of the Eee PC - Model plan The sun may be about to set on Asus' famous Eee-assessing blonde beach babe. She's apparently been supplanted by another woman, one with a taste for the finer things in life - and Small, Cheap Computers
From cw
computers
Microsoft appeals record European Commission fine - Once more unto the bench Microsoft is appealing a record European Commission fine for not complying with a milestone European Commission anti-trust rulin
From cw
computers
What laptop does Steve Ballmer use for his presentations? - What laptop does Steve Ballmer use for his presentations?
From cw
:. Sponsored Links
Advertisement
computers
Filthy as a loo seat: hazard of computer keyboards - Another peril can be added to the hazards of the innocent-looking computer keyboard. Not content with encouraging repetitive strain injury, the type-pads sometimes harbour more filth than the average loo seat and house millions of bacteria which can cause diarrhoea and vomiting, a study has shown.
From danomil
computers
New Zero-Watt Monitor Saves Cash and the Planet - The first zero-watt display monitor from Fujitsu Siemens Computers will get you out the office door that millisecond faster after coming up with a design that uses no power at all in idle mode. The zero-watt, 22-inch monitor has a switch in the power supply unit that is controlled by the computer. When no video signal is transmitted, the switch shuts down the complete circuit of the monitor.
From cw
computers
Linux guru Hans Reiser convicted of first-degree murder - Estranged wife's body never found A jury has convicted Hans Reiser, developer of the ReiserFS filesystem for Linux, of first degree murder for killing his estranged wife in 2006 even though her body was never foun
From cw
|| 04/25/2008 ||
computers
Victorian All-in-One PC - The inexorable march of technology has rendered my 4:3 aspect ratio 19" LCD mod and my pump-less water cooled PC obsolete, so when I saw at 24" wide screen monitor on sale for $299.00 I grabbed it with the intent on making a Steampunk All-in-One PC.
From cw
|| 04/24/2008 ||
computers
Seagate ships 1 billionth drive - Orders party platter for platter party Seagate is celebrating the shipment of its one billionth disk drive after 29 years in biz. The storage giant reckons it will reach its second billion in less than five-years' time.?From cw
|| 04/14/2008 ||
computers
Fans Tout Windows XP's Superiority - Fans of Windows XP are reacting to Microsoft's plan to retire the six-year-old operating system by papering the internet with blog posts, cartoons and petitions. They trumpet Windows XP's superiority to Windows Vista, Microsoft's latest PC operating system, whose consumer launch received lukewarm reviews.

From cw
computers
Security Guru Gives Hackers a Taste of Their Own Medicine - A Swedish researcher discovers a way to hack a computer Trojan horse so that he can get inside the hacker's computer. The counter-hack comes just as the government and security industry warn of increasing danger of such targeted computer attacks.

From cw
computers
Computer experts stage street protest in Oslo against MS - Roughly 60 data experts staged a rare and noisy street demonstration in downtown Oslo on Wednesday to protest the adoption of Microsoft Corp.'s document format as an international standard and against Norway voting for the move.
From cw
computers
The history of computer data storage - Nowadays we are used to having hundreds of gigabytes of storage capacity in our computers. Even tiny MP3 players and other handheld devices usually have several gigabytes of storage. This was pure science fiction only a few decades ago. For example, the first hard disk drive to have gigabyte capacity was as big as a refrigerator, and that was in 1980. Not so long ago!Pingdom stores a lot of monitoring data every single day, and considering how much we take today’s storage capacity for granted, it’s interesting to look back and get things in perspective. Here is a look back at some interesting storage devices from the early computer era.
From cw
computers
IBM offers 4,000 frequent flyer miles per core to abandon HP - Dump a Superdome. Go to the Bahamas Oh, baby. IBM is hitting its "move off HP and Sun" program harder than Amy Winehouse hits a crack pip
From cw
:. Sponsored Links
Advertisement
computers
Cisco to buy Nuova and sell its FCoE switch - Get rich quick spin-in comes home Cisco has revealed what its $70m "spin-in" investment in Nuova Systems has been all abou
From cw
computers
AMD will cut 10 per cent of global workforce - Decimation by Q3 or bust AMD plans to cut 10 per cent of its workforce over the next two quarters, after suffering lower-than-expected sales across all business units, the company said toda
From cw
computers
Gates teases bankers with Windows 7 dates - There's something big over the horizon, boys Bill Gates has dropped the biggest hint yet that Microsoft?s successor to its unloved operating system Windows Vista could arrive around the middle of 2009 ? ahead of the firm?s original roadma
From cw
computers
Time is right for Linux PCs to emerge (AP) -

The EeePC, a $400, fully functioning 2 pound notebook computer that uses the Linux operating system, is seen in New York in this Dec. 27, 2007 file photo.  The free Linux operating system handles big tasks like running supercomputers, cell phones and ATMs. Now Linux has a chance to finally crack Microsoft Corp.'s hold on computing's most visible domain — mainstream PCs — because of the rise of innovative, inexpensive machines. (AP Photo/Mary Altaffer, file)AP - The free Linux operating system handles big tasks like running supercomputers and ATMs. Now Linux has a chance to finally crack Microsoft Corp.'s hold on computing's most visible domain — mainstream PCs — because of the rise of innovative, inexpensive machines.



From cw
|| 03/31/2008 ||
computers
Harry Porter's Relay Computer - Harry Porter's Relay Computer
From cw
computers
AJAX patent threat to giants under the hammer | Reg Develope - A patent scheduled for sale next month in San Francisco could threaten some of the biggest players on the internet leading Web 2.0.Listed in Ocean Tomo's spring auction catalog as lot number seven, patent number 6,418,462: "Discloses methods allowing clients to perform tasks through a sideband communication channel, in addition to the main communication channel between a client and server".
From CJDUSA
|| 03/18/2008 ||
computers
All about boot.ini -
From Nonoxyl
|| 03/16/2008 ||
computers
Geek Porn -
From cw
computers
They Criticized Vista. And They Should Know. - New York Time - ONE year after the birth of Windows Vista, why do so many Windows XP users still decline to “upgrade”?
From Nonoxyl
computers
How To: Optimize A Fresh Ubuntu Installation - Making the leap to Linux? Trick out your freshly installed desktop OS with the free software programs listed in our guide. In a few steps, you'll have a machine worth leaving Windows or Mac OS X behind for.

From cw
:. Sponsored Links
Advertisement
|| 02/27/2008 ||
computers
Worst hard drive crash I've seen - Pics of the inside of a toasted hard drive.
From Nonoxyl
computers
Optimus Maximus: at long last, we bring one home to test - E - Optimus Maximus: at long last, we bring one home to test
From Surfer
|| 02/19/2008 ||
computers
computers
Prosecution Rests in Reiser Trial;Defense Moves for Aquittal - Three-plus months and more than 50 witnesses later, the prosecution in the Hans Reiser murder trial rested its case Thursday.
From bofh
computers
computers
Three bridges within a mile hit SIXTY-TWO times - It has been blamed for directing huge articulated lorries down tiny country lanes, encouraging car drivers to plunge into impassable fords - and even sending inattentive motorists down railway lines.And last night, it was revealed the curse of satnav has found yet another way to wreak havoc on Britain's roads - by funnelling tall vehicles under low bridges.The problem came to light after rail chiefs realised that three of the railway bridges most often hit by traffic lay in a one-mile radius in the same town: Grantham in Lincolnshire. Between them, they were struck an astonishing 62 times last year.
From cjdusa
|| 02/14/2008 ||
computers
USB: Wayward Gadgets Find a Port - The popularity of powering devices via computer has led to such products as USB-connecting toys, vacuums, paper shredders—even a lava lamp
From CJDUSA
computers
The fastest computer in the world? - Expanded BlueGene/L Configuration
From cw
computers
Online messenger for MSN, GTalk, IRC and ICQ - Communication Tube - Its a free web messenger chat client for the popular IM: msn,Google Talk,icq,irc. Communication Tube is compatible with all popular browsers.
From Elassy
computers
Favoring Stores, Dell Closes Mall Kiosks - New York Times - Dell Inc., which has been pushing its computers into more retail stores, said Wednesday it will close its 140 shopping mall kiosks in the United States. Dell now sells computers and other devices in more than 10,000 stores around the world, including Wal-Mart Stores Inc. and Best Buy Co., and the kiosks may be losing some of their novelty.
From bofh