Have a suggestion?
Click here to suggest a blog item.
Newsletters Archive
Catch up with DonationCoder by browsing our past newsletters, which collect the most interesting discussions on our site: here.
Editorial Integrity
DonationCoder does not accept paid promotions. We have a strict policy of not accepting gifts of any kind in exchange for placing content in our blogs or newsletters, or on our forum. The content and recommendations you see on our site reflect our genuine personal interests and nothing more.
Latest News
July 2, 2024
Server Migrations Coming
- Donationcoder server migration is slowly proceeding, expect some hiccups as we get all our ducks in a row..
July 19, 2022
Software Update
Jan 3, 2022
Event Results
May 13, 2020
Software Updates
Mar 24, 2020
Mini Newsletter
Dec 30, 2019
Software Updates
Jan 22, 2020
Software Updates
Jan 12, 2020
Newsletter
Jan 3, 2020
Event Results
Jan 2, 2020
Software Updates
Dec 30, 2019
Software Updates
- Automatic Screenshotter v1.16
- Screenshot Captor v4.35 beta
- Find and Run Robot v2.238 beta
- Clipboard Help and Spell v2.46.01
- LaunchBar Commander v1.157
- Mousers Media Browser v2.0
- MultiPhoto Quotes v2.09.1
- DiscussionList for Android v1.08
April 27, 2019
Software Updates
Feb 26, 2019
Software Updates
Feb 23, 2019
Software Updates
Feb 14, 2019
Software Updates
Jan 6, 2019
Event Results
Dec 2, 2018
Software Updates
Nov 13, 2018
Software Releases
July 30, 2018
Software Updates
June 24, 2018
Software Updates
June 6, 2018
Software Updates
Apr 2, 2018
Fundraiser Celebration
Apr 2, 2018
Software Updates
Feb 24, 2018
Software Updates
Jan 14, 2018
Major Site News
Jan 10, 2018
Event Results
Latest Forum Posts
Making Life Easier for Mac UsersI heard about you when trying to find a free screen shot capture utility [Screenshot Captor]. I write user guides as a small part of my job, and I love that I could get such a useful program for the PC (my mac has one inbuilt hehe). Looking through your catalogue since donating, there seem to be a few others that might be very useful to take the edge off having to use a PC all day. So my paltry donation (I'm a underpaid trainee) probably wont cover the use I get from your site.
J.N.
Our daily Blog
This page spotlights the most interesting posts collected from our forum every day.
You are viewing a specific blog item. Click here to return to the main blog page.
Tech News Weekly: Edition 45The Weekly Tech News
1. Microsoft and Google to Offer OpenID Spoiler http://dev.live.com/blogs/devlive/archive/2008/10/27/421.aspx http://google-code-updates.blogspot.com/2008/10/google-moves-towards-single-sign-on.html Google and Microsoft plan to offer OpenID services from their current sign-on mechanisms. Currently users are required to create individual passwords for many websites they visit, but users would prefer to avoid this step so they could visits websites more easily. Similarly, many websites on the Internet have asked for a way to enable users to log into their sites without forcing them to create another password. If users could log into sites without needing another password, it would allow websites to provide a more personalized experience to their users. 2. Programming Tools for Cracking Mifare Published Spoiler http://www.heise-online.co.uk/security/Programming-tools-for-cracking-Mifare-published--/news/111807 Practical tools for cracking the Mifare RFID chip have been released onto the internet. A hacker using the pseudonym Bla has published an open source tool called Crapto1 for cracking the encryption of the Mifare Classic RFID chip, as used in the Oyster Card. Besides an implementation in C of the vulnerable Crypto1 algorithm, the archive also contains the C source code for an attack that has been described in a paper by Dutch security researchers at Radboud University. 3. Adobe Acrobat 8 Critically Vulnerable Spoiler http://www.net-security.org/secworld.php?id=6715 Acrobat 8 has a vulnerability allowing a maliciously crafted PDF file to gain unauthorized access to the systems it's running on and assume the rights of the user running it via javascript. Core Security Technologies issued an advisory disclosing a vulnerability that could affect millions of individuals and businesses using Adobe’s Reader PDF file viewing software. Engineers from CoreLabs determined that Adobe Reader could be exploited to gain access to vulnerable systems via the use of a specially crafted PDF file with malicious JavaScript content. Upon making the discovery, CoreLabs immediately alerted Adobe to the vulnerability and the two companies have since coordinated efforts to ensure that a patch could be created and made available to protect users of the program. 4. AT&T Imposes Monthly Bandwidth Caps Spoiler http://www.datastronghold.com/index.php/tech-news/1480-atat-imposes-monthly-bandwidth-caps AT&T is trialing new monthly bandwidth caps in certain areas with the monthly limit based on the speed of a user's connection (read: based on the amount of money they're paying). Bad news off the wire for AT&T broadband customers, as AT&T has announced the fact that they are now imposing bandwidth limits in certain test areas. Currently this market trial was started November 1 in Reno and users will get between 20 GB and 150 GB a month depending on their speed tier. Unlike the bandwidth limitations that were imposed by companies like Time Warner and Comcast, there were only applied to new users this bandwidth cap will be applied to all users including current ones. 5. Virtual Heist Nets 500,000+ Bank, Credit Accounts Spoiler http://voices.washingtonpost.com/securityfix/2008/10/virtual_bank_heist_nets_500000.html http://www.theregister.co.uk/2008/10/31/sinowal_trojan_heist/ RSA's FraudAction Research Lab has uncovered a massive cache of stolen banking details accrued since 2006 via the Sinowal/Torpig/Mebroot trojan. A single cyber crime group has stolen more than a half million bank, credit and debit card accounts over the past two-and-a-half years using one of the most advanced strains of computer spyware in existence, according to research to be published today. The discovery is among the largest stolen data caches ever recovered. 6. Man Gets 21 Months for Recording Movies in Theatre With Camcorder Spoiler http://www.piracyisacrime.org/In-The-Courtroom/man-gets-21-years-for-recording-movies-in-theatre-with-camcorder.html A man has been found guilty of filming up to 100 movies in movie theatres in Washington DC and sentenced to 21 months in prison. He was caught via the use of "A Covert Anti-Camcording System" installed by the MPAA. Michael Logan, 31, of Maryland was sentenced today in federal court in the District of Columbia for filming with a camcorder in theatres, "28 Weeks Later", “Enchanted” and maybe up 100 more movies over the last few years according to the MPAA. 7. Google Abandons Deal With Yahoo Spoiler http://news.bbc.co.uk/2/hi/business/7711429.stm Google has abandoned their advertising deal with Yahoo to avoid the legal rammifications. The deal involved Google providing some of the advertising around Yahoo's search results and would have been worth $800m (£494m) a year to Yahoo. 8. Yahoo Tells Microsoft: 'Buy Us' Spoiler http://news.bbc.co.uk/2/hi/technology/7712298.stm Yahoo's CEO Jerry Yang has commented that Microsoft would still benefit from acquiring the company. His comments come on the tail of Google pulling out of the ad deal with them. The internet portal's co-founder and CEO Jerry Yang made the comment despite the fact Yahoo rejected a $33 (£21) a share offer from Microsoft back in May. 9. French Pirates Face Net Cut-off Spoiler http://news.bbc.co.uk/2/hi/technology/7706014.stm Anyone caught sharing pirated digital media in France will receive warnings before having their internet connection terminated under new legislation. The French Senate voted overwhelmingly in favour of the law, which aims to tackle ongoing piracy of music, movies, and games online. 10. Fire Fear Sparks Battery Recall Spoiler http://news.bbc.co.uk/2/hi/business/7701348.stm Discussion by app103: https://www.donationcoder.com/forum/index.php?topic=15546 Devices containing batteries manufactured by Sony over a period of almost a year will be recalled by the likes of HP, Toshiba and DELL due to overheating fears. Sony said the recall came after 40 instances of overheating, including four cases where users had minor burns. 11. British Tax Website Shut Down After Data Breach Spoiler http://www.dailymail.co.uk/news/article-1082402/Tax-website-shut-memory-stick-secret-personal-data-12million-pub-car-park.html http://news.cnet.com/8301-1009_3-10081737-83.html A memory stick found in a pub car park contating the tax details of 12 million people has forced the british goverment to shut down a taxation-related website. Ministers have been forced to order an emergency shutdown of a key Government computer system to protect millions of people's private details. 12. WPA Wi-Fi Encryption is Cracked Spoiler http://www.itworld.com/security/57285/once-thought-safe-wpa-wi-fi-encryption-cracked http://news.cnet.com/8301-10789_3-10083861-57.html WPA has taken a huge security hit as attackers use a protocol weakness and a mathematical breakthrough to break TKIP keys in order to read and/or forge data being sent from an access point to a client machine. Security researchers say they've developed a way to partially crack the Wi-Fi Protected Access (WPA) encryption standard used to protect data on many wireless networks. 13. Porn Breath Tests for PCs Heralds 'stop and Scan' Spoiler http://www.theregister.co.uk/2008/11/05/smut_tests_for_pcs/ New software developed by an Australian University will allow officials to quickly identify illicit images on PCs. Technology that claims to pick up traces of illicit images on PCs has attracted the interest of Australian cops. The software, developed in an Australian University, might eventually be used to screen PCs for pr0n during border inspections. 14. Hackers Jailbreak T-Mobile's Googlephone Spoiler http://www.theregister.co.uk/2008/11/05/google_android_jailbreak/ The Googlephone has already been broken by a hacker who determined you can acquire root privileges in Android by telneting to the device. Hackers have managed to jailbreak T-Mobile's new G1 phone by exploiting a gaping loophole in Android, the open source operating system supplied by Google. 15. Fake Site Punts Trojanised WordPress Spoiler http://www.theregister.co.uk/2008/11/06/trojanised_wordpress/ Wordpress hacker are at it again with a website offering an upgrade to the software which includes a Trojan. The website has spread via a vulnerability in older Wordpress versions which allows an attacker to redirect visitors to another website. Fraudsters have set up a fake site featuring a backdoored version of the WordPress blogging application as part of a sophisticated malware-based attack. 16. National ID Cards Compulsory for U.K. Airport Staff Spoiler http://news.cnet.com/8301-1009_3-10083732-83.html Airport staff in the U.K. will be required to carry one of the new National Identity cards at two airports trialing the new system. A pilot program of the U.K.'s national identity card plan will be compulsory at one of the two participating airports. 17. Remote Buffer Overflow Bug Bites Linux Kernel Spoiler http://blogs.zdnet.com/security/?p=2121 A buffer overflow vulnerability in a common Linux Kernel wireless driver could permit an attacker to remotely execute code with Kernel privileges, or cause a denial of service condition. A remote buffer overflow vulnerability in the Linux Kernel could be exploited by attackers to execute code or cripple affected systems, according to a Gentoo bug report that just became public. 18. EndNote Reverse-engineering Case Looks Headed to Courtroom Spoiler http://arstechnica.com/news.ars/post/20081104-endnote-reverse-engineering-case-looks-headed-to-courtroom.html EndNote has accused the open source Firefox extension Zotero of illegally reverse engineering their proprietary .ens file format. As anyone who works in academia knows, writing and publishing papers involves frequently citing the existing literature. When you're working on a paper with 30 or more references, keeping track of them all can be a downright pain, which is where reference-managing software like Thomson Reuters' EndNote comes in. EndNote is the market leader in this field, but recently it has been facing competition from the open source Zotero, which is a Firefox plugin that lets you manage your bibliographic library and insert references into papers. Right now though, EndNote and Zotero are locked in a legal battle over claims by Thomson Reuters that the developers of Zotero have illegally reverse-engineered aspects of EndNote. 19. FCC White Spaces Decision Kicks Off the Next Wireless Revolution Spoiler http://blog.wired.com/gadgets/2008/11/fccs-decision-t.html The FCC will permit transmissions over unused "white space" spectrum which will allow cheaper wireless. The Federal Communications Commission's decision to open up the 'white spaces' spectrum to unlicensed devices could usher in a new telecom revolution, say analysts. Spoiler http://www.webmonkey.com/blog/Firefox_Hits_20PERC_Browser_Share_Worldwide Adoption of Mozilla's Firefox browser has hit 20% across the globe. Mozilla is reporting that Firefox topped 20% of the worldwide market share for web browsers for the first time ever in October, 2008. Firefox broke the 20% mark twice last month, once during the week of October 5, and once again during the week of October 26. During the other two weeks, its share was around 19.8%, putting the average for the month just above below the 20% mark at 19.9% Ehtyar. |
|||