Have a suggestion?
Click here to suggest a blog item.
Newsletters Archive
Catch up with DonationCoder by browsing our past newsletters, which collect the most interesting discussions on our site: here.
Editorial Integrity
DonationCoder does not accept paid promotions. We have a strict policy of not accepting gifts of any kind in exchange for placing content in our blogs or newsletters, or on our forum. The content and recommendations you see on our site reflect our genuine personal interests and nothing more.
Latest News
July 2, 2024
Server Migrations Coming
- Donationcoder server migration is slowly proceeding, expect some hiccups as we get all our ducks in a row..
July 19, 2022
Software Update
Jan 3, 2022
Event Results
May 13, 2020
Software Updates
Mar 24, 2020
Mini Newsletter
Dec 30, 2019
Software Updates
Jan 22, 2020
Software Updates
Jan 12, 2020
Newsletter
Jan 3, 2020
Event Results
Jan 2, 2020
Software Updates
Dec 30, 2019
Software Updates
- Automatic Screenshotter v1.16
- Screenshot Captor v4.35 beta
- Find and Run Robot v2.238 beta
- Clipboard Help and Spell v2.46.01
- LaunchBar Commander v1.157
- Mousers Media Browser v2.0
- MultiPhoto Quotes v2.09.1
- DiscussionList for Android v1.08
April 27, 2019
Software Updates
Feb 26, 2019
Software Updates
Feb 23, 2019
Software Updates
Feb 14, 2019
Software Updates
Jan 6, 2019
Event Results
Dec 2, 2018
Software Updates
Nov 13, 2018
Software Releases
July 30, 2018
Software Updates
June 24, 2018
Software Updates
June 6, 2018
Software Updates
Apr 2, 2018
Fundraiser Celebration
Apr 2, 2018
Software Updates
Feb 24, 2018
Software Updates
Jan 14, 2018
Major Site News
Jan 10, 2018
Event Results
Latest Forum Posts
The Almighty DollarWell, you've got me hooked now. You are a rare breed these days! Someone who operates on higher principles than the almighty $. Keep up the good work!
B.H.
Our daily Blog
This page spotlights the most interesting posts collected from our forum every day.
You are viewing a specific blog item. Click here to return to the main blog page.
Tech News Weekly: Edition 47No meta-news this week. As usual, you can find last week's news here. 1. E-mails Show How Intel Benefited from Vista Capable Changes (Thanks 40hz) Spoiler http://arstechnica.com/news.ars/post/20081117-e-mails-show-how-intel-benefited-from-vista-capable-changes.html It seems Wintel is still truly alive and kicking. Documents have been produced in the "Vista Capable" lawsuit against Microsoft showing that Intel was the sole beneficiary in some of the decisions made about the campaign. A federal court judge recently unsealed a fresh batch of documents pertaining to the ongoing Vista Capable lawsuit, including two recent filings by both the plaintiff (Diane L. Kelley, et al) and defendant (Microsoft). The first filing, on behalf of Diane L. Kelley, begins by stepping through what we learned from the bevy of internal emails Microsoft was forced to release earlier this year. Plaintiffs allege that Microsoft's behavior as it regards the use of the "Vista Capable" designation constitutes an unfair and deceptive practice, and request summary judgment on this point. Microsoft's filing addresses a somewhat different matter, and requests a protective order from the court that would relieve the company of the obligation to produce CEO Steve Ballmer for deposition. 2. Big Guns Come Out In Effort To Show RIAA's Lawsuits Are Unconstitutional Spoiler http://techdirt.com/articles/20081030/0203582685.shtml Some VERY interesting material on how the legal heavyweights are finally getting involved in RIAA lawsuits...and may actually succeed in proving that much of the RIAA's backing is in fact unconstitutional. People have been submitting this story nonstop, but I wanted to take some time to read the details before commenting on it. It's not the first time that folks have argued that the damages sought by the RIAA in various lawsuits against file sharers are unconstitutional. However, the few times it's been brought up in court, the arguments haven't been persuasive. However, this time around, it looks like the big legal guns are getting involved, and the argument seems a lot more comprehensive and compelling. 3. Secret German IP Addresses Leaked Spoiler http://wikileaks.org/wiki/German_Secret_Intelligence_Service_(BND)_T-Systems_network_assignments,_13_Nov_2008 Via: http://www.schneier.com/blog/archives/2008/11/secret_german_i.html A document has been fed to Wikileaks detailing several IP address ranges allegedly held by German intelligence agency Bundesnachrichtendienst (BND). There is some proof it is legitimate. The PDF document holds a single paged scan of an internally distributed mail from German telecommunications company T-Systems (Deutsche Telekom), revealing over two dozen secret IP address ranges in use by the German intelligence service Bundesnachrichtendienst (BND). Independent evidence shows that the claim is almost certainly true and the document itself has been verified by a demand letter from T-systems to Wikileaks. 4. Online Age Verification for Children Brings Privacy Worries Spoiler http://www.nytimes.com/2008/11/16/business/16ping.html?_r=1&oref=slogin An interesting essay on one potential avenue for misuse of online age verification technology. Child-safety activists charge that some of the age-verification firms want to help Internet companies tailor ads for children. They say these firms are substituting one exaggerated threat — the menace of online sex predators — with a far more pervasive danger from online marketers like junk food and toy companies that will rush to advertise to children if they are told revealing details about the users. 5. Lego Safe is Ultra Secure Spoiler http://www.slipperybrick.com/2008/11/legos-safe/ Video: http://au.youtube.com/watch?v=XjWt4O4bSjQ An awfully fun way to spend ones cody-currency. You might think that a Lego safe would be easy to open. Maybe just remove a few bricks and you’re in. But that’s not the case with this thing, the cutting edge of Lego safe technology. The safe weighs 14 pounds and has a motion detecting alarm so it can’t be moved without creating a huge ruckus. 6. Microsoft Kills OneCare, Replaces It With Freebie 'Morro' Spoiler http://blogs.zdnet.com/security/?p=2190&tag=nl.e589 Discussion started by Carol Haynes: https://www.donationcoder.com/forum/index.php?topic=15803.0 Microsoft have decided to drop their Microsoft OneCare subscript in mid-2009 and replace it with a free anti-virus suite. Microsoft today announced plans to kill its Windows Live OneCare PC care and security suite and replace it with a free anti-malware utility. 7. Under Worm Assault, Military Bans Disks, USB Drives Spoiler http://blog.wired.com/defense/2008/11/army-bans-usb-d.html The US Military has banned the use of removable storage on it's classied and unclassified networks in an attempt to stop the spread of a worm that has infected their computer systems. The Defense Department's geeks are spooked by a rapidly spreading worm crawling across their networks. So they've suspended the use of so-called thumb drives, CDs, flash media cards, and all other removable data storage devices from their nets, to try to keep the worm from multiplying any further. 8. Dead Network Provider Arms Rustock Botnet from the Hereafter Spoiler http://www.theregister.co.uk/2008/11/18/short_mccolo_resurrection/ http://www.networkworld.com/news/2008/111708-dodgy-isp-briefly-comes-online.html In followup from this story in last week's news, ISP McColo briefly returned from the dead thanks to a backup arrangement with another ISP in order to allow its client to transfer control of botnets and such to new ISPs. McColo, a network provider that was yanked offline following reports it enabled more than half the world's spam, briefly returned from the dead over the weekend so it could hand-off command and control channels to a new source, security researchers said. 9. E-gold Directors Avoid Jail Spoiler http://www.theregister.co.uk/2008/11/21/e_gold_sentencing/ The top-knobs of notorious online money transfer firm E-Gold have escaped jail after a District Court Judge took leniency on them when she found they had not intentionally serviced criminals. Three directors of digital currency firm e-gold avoided a spell behind bars on Thursday after earlier pleading guilty to offences for money laundering and running an unlicensed money transfer business. 10. Phisher-besieged PayPal Sends Users Faux Log-in Page Spoiler http://www.theregister.co.uk/2008/11/20/paypay_hyperlink_snafu/ PayPal have been sending customers emails directing them to an incorrect login URL possibly for as long as two months. PayPal, the online payment service that is a major target of phishers, has been caught sending customer emails that confuse its own login page with a third-party landing site that offers spyware protection and a bevy of other products. 11. PC Virus Forces Three London Hospitals Into Computer Shutdown Spoiler http://www.theregister.co.uk/2008/11/18/london_hospital_malware_shutdown/ Three London hosptals had their computer system shutdown when it became apparent they were infected with malware. The systems have since returned and there is no indication any information on them was exposed. Three London Hospitals shut down their computer systems on Tuesday in response to a computer virus infection. 12. Lame Mac Trojan Limps Into View Spoiler http://www.theregister.co.uk/2008/11/19/mac_trojan/ Look out folks, believe it or not MACs might actually be becoming popular enough to have their own trojans, however ineffectual. Security researchers have uncovered a rare example of a Trojan that affects Mac PCs. 13. British National Party Membership List Leaks Online Spoiler http://www.theregister.co.uk/2008/11/18/bnp_loses_list/ The membership list of Britain's right-wing-nutjob political party has been leaked online. Included are names, phone numbers and email addresses along with various other personal details. Serves them right. The British National Party has lost its membership list - the whole thing has been published online. 14. SSH Sniffer Attack Poses Minor Risk Spoiler http://www.theregister.co.uk/2008/11/18/ssh_sniffer_attack/ A vulnerability that has the potential to reveal the plaintext of an SSH session has been discovered and is confirmed to affect OpenSSH and various commercial SSH clients and servers. The vulnerability is not considered to be particularly harmful, though users are urged to update their software or switch from CBC to stream mode. UK security researchers have discovered hard-to-exploit cryptographic weaknesses in the Secure Shell (SSH) remote administration protocol. 15. Obama's Cell Records Improperly Accessed Spoiler http://news.cnet.com/8301-1009_3-10104997-83.html Verizon staff have illegitimately accessed the mobile phone records of US president-elect Barack Obama. The phone in question is no longer being used. President-elect Barack Obama's cell phone billing records were improperly accessed by employees of Verizon Wireless, CNN reported late on Thursday. 16. Researchers Find Flaws In Microsoft VoIP Apps Spoiler http://www.darkreading.com/security/vulnerabilities/showArticle.jhtml?articleID=212100043 Flaws have been found in Microsoft Office Communications Server 2007, Office Communicator, and Windows Live Messenger that could allow an attacker to cause a denial-of-service condition in the software. Security researchers say they have discovered several vulnerabilities in Microsoft applications that work with voice over IP (VoIP). 17. FOIA Docs Show Feds Can Lojack Mobiles Without Telco Help Spoiler http://arstechnica.com/news.ars/post/20081116-foia-docs-show-feds-can-lojack-mobiles-without-telco-help.html According to documents obtained through Freedom of Information (and a lawsuit, naturally) by the ACLU and the EFF, US federal law enforcement is capable of tracking the location of cellphones without the assistance of cell providers as previously believed. Courts in recent years have been raising the evidentiary bar law enforcement agents must meet in order to obtain historical cell phone records that reveal information about a target's location. But documents obtained by civil liberties groups under a Freedom of Information Act request suggest that "triggerfish" technology can be used to pinpoint cell phones without involving cell phone providers at all. 18. Duke's New P2P Policy Won't Stop RIAA Lawsuits Spoiler http://arstechnica.com/news.ars/post/20081116-analysis-dukes-new-p2p-policy-wont-stop-riaa-lawsuits.html If nothing else, an interesting insight into the way the RIAA conducts their lawsuits. Since the RIAA decided to go after on-campus P2P use in a big way back in February 2007, one of the major questions facing university IT departments was how to respond to the RIAA's prelitigation settlement letters. Duke University has decided that it will now require concrete evidence that copyright infringement actually occurred before forwarding those letters to students. 19. Tennessee Anti-P2P Law to Cost Colleges Over $13 Million Spoiler http://arstechnica.com/news.ars/post/20081118-tennessee-anti-p2p-law-to-cost-colleges-over-13-million.html New legislation in the state of Tennessee requiring public and private colleges to to prevent copyright infringement on campus networks is likely to cost $13 million. With the RIAA's long-running legal war against file-sharing not having the desired effects, the music industry has turned its sights on legislation aimed at getting others to do the dirty work of copyright enforcement. Last week, they scored a victory when the state of Tennessee passed a law that would require colleges and universities to work to prevent copyright infringement over campus networks. It's great news for the RIAA, but bad news for Tennessee students and taxpayers who will have to foot the $13 million bill. 20. Apple Lawyers Hand IPod Hash Cracking Site a DMCA Notice Spoiler http://arstechnica.com/journals/apple.ars/2008/11/21/apple-lawyers-hand-ipod-hash-cracking-site-a-dmca-notice As one might expect, Apple isn't taking kindly to attempts to reverse engineer a file system protection mechanism on its iPods. Although not a widely-publicized addition, one of the newer "features" Apple has added to its iPods and iPhones is a hash that protects the iTunesDB file, which stores information about what music you have on your iPod and where it's located on the iPod's hard drive. As it turns out, Apple doesn't seem to like people meddling with the iPhone and iPod touch hash, and according to Slashdot, Apple lawyers recently sent a DMCA violation notice to a project that was attempting to reverse-engineer the current version of the iTunesDB protection. 21. Inaction On Disconnect Pleas at Root of Aussie ISP Lawsuit Spoiler http://arstechnica.com/news.ars/post/20081121-inaction-on-disconnect-pleas-at-root-of-aussie-isp-lawsuit.html Several Hollywood studios are taking Australian ISP iiNet to court in response to their failure to act on infringement notices. Seven major film studios and affiliates have filed suit in Australia against one of the country's large ISPs, iiNet, charging the company with a failure to act on detailed reports of illegal file-sharing across its network. 22. First Test for Interplanetary Net Spoiler http://news.bbc.co.uk/2/hi/technology/7741184.stm NASA has made its first successful test of the new Disruption-Tolerant Networking (DTN) technology it hopes will be the standard for communication through space in the future. Nasa has successfully transmitted images to and from a spacecraft 20 million miles away with a communications system based on the net. 23. Huge Buried Water Glaciers Discovered On Mars Spoiler http://blog.wired.com/wiredscience/2008/11/huge-buried-wat.html Huge subterranean glaciers have been discovered on Mars. Giant glaciers buried under the surface of Mars at much lower latitudes than any previously known ice are a potential source of drinking water for future astronauts. Ehtyar. |
||