Have a suggestion?
Click here to suggest a blog item.
Newsletters Archive
Catch up with DonationCoder by browsing our past newsletters, which collect the most interesting discussions on our site: here.
Editorial Integrity
DonationCoder does not accept paid promotions. We have a strict policy of not accepting gifts of any kind in exchange for placing content in our blogs or newsletters, or on our forum. The content and recommendations you see on our site reflect our genuine personal interests and nothing more.
Latest News
July 2, 2024
Server Migrations Coming
- Donationcoder server migration is slowly proceeding, expect some hiccups as we get all our ducks in a row..
July 19, 2022
Software Update
Jan 3, 2022
Event Results
May 13, 2020
Software Updates
Mar 24, 2020
Mini Newsletter
Dec 30, 2019
Software Updates
Jan 22, 2020
Software Updates
Jan 12, 2020
Newsletter
Jan 3, 2020
Event Results
Jan 2, 2020
Software Updates
Dec 30, 2019
Software Updates
- Automatic Screenshotter v1.16
- Screenshot Captor v4.35 beta
- Find and Run Robot v2.238 beta
- Clipboard Help and Spell v2.46.01
- LaunchBar Commander v1.157
- Mousers Media Browser v2.0
- MultiPhoto Quotes v2.09.1
- DiscussionList for Android v1.08
April 27, 2019
Software Updates
Feb 26, 2019
Software Updates
Feb 23, 2019
Software Updates
Feb 14, 2019
Software Updates
Jan 6, 2019
Event Results
Dec 2, 2018
Software Updates
Nov 13, 2018
Software Releases
July 30, 2018
Software Updates
June 24, 2018
Software Updates
June 6, 2018
Software Updates
Apr 2, 2018
Fundraiser Celebration
Apr 2, 2018
Software Updates
Feb 24, 2018
Software Updates
Jan 14, 2018
Major Site News
Jan 10, 2018
Event Results
Latest Forum Posts
May we recommend..
Screenshot Captor is our most well-known tool. A best-in-class tool for grabbing, manipulating, annotating, and sharing screenshots. It's different from other screenshot utilities in several notable ways...
Our daily Blog
This page spotlights the most interesting posts collected from our forum every day.
You are viewing a specific blog item. Click here to return to the main blog page.
Tech News Weekly: Edition 04-09Hi all. Not much news this week guys. Honestly, I'd prefer to have fewer articles than inflate the list with boring junk. As usual, you can find last week's news here. 1. New Paint Promises Low-cost Wi-Fi Shielding Spoiler http://www.itworldcanada.com//Pages/Docbase/ViewArticle.aspx?ID=idgml-80c6f4f0-b11e-461c-bb03-6fd5712d3d16&RSS=1&UID=B82BC1BD-28FF-4AEE-9A3A-B2C4D89EE233 Of course any organisation using a proper certificate-based authentication system isn't gonna care, but it's still cool...right? IT managers should start familiarising themselves with a new security tool, the paint brush, as Japanese researchers have come up with a paint that they say will block high-speed wireless signals, giving businesses a cheap option to protect their wireless networks. 2. Mac Malware Piggybacks On Pirated IWork Spoiler http://www.theregister.co.uk/2009/01/22/mac_trojan_attack/ Be careful Mac users, downloading a pirated copy of iWork could see you with a copy of OSX.Trojan.iServices.A bouncing around your machine with root privileges. Malware masquerading as part of Apple's iWork 09 productivity suite is targeting unsuspecting Mac users foolish enough to install pirated software downloaded on warez sites. 3. Newly-discovered Mac Exploit to Be Detailed at Black Hat Spoiler http://arstechnica.com/journals/apple.ars/2009/01/22/newly-discovered-mac-exploit-to-be-detailed-at-black-hat Seemingly unrelated to post No. 2, researchers have discovered a memory injection vulnerability in standard Apple hardware that could allow an attacker to run code on an Apple box without any indication to the user whatsoever. The exploit will be presented at the next Black Hat scheduled to begin in mid-February. A student who researches malware and intrusion detection systems at the University Politecnico di Milano in Italy will be making a presentation next month at the upcoming Black Hat conference in Washington D.C. The briefing, as Black Hat refers to it as, will deal with a memory injection technique specific to Apple hardware, which subsequently allows a piece of code to be run from memory. 4. Superworm Seizes 9m PCs, 'stunned' Researchers Say Spoiler http://www.theregister.co.uk/2009/01/16/9m_downadup_infections/ The Conficker/Downadup worm has reached staggering number of infections, almost 9 million according to security firm F-Secure. The massive spike has been attributed to the worm's ability to propagate across an entire network via a single infection. Downadup, the superworm that attacks a patched vulnerability in Microsoft Windows, is making exponential gains if estimates from researchers at F-Secure are accurate. They show 6.5 million new infections in the past four days, bringing the total number of machines it has compromised to almost 9 million. 5. Judge: 17,000 Illegal Downloads Don't Equal 17,000 Lost Sales Spoiler http://arstechnica.com/news.ars/post/20090119-judge-17000-illegal-downloads-dont-equal-17000-lost-sales.html A US district court judge (finally, one with some form of logic) has ruled that each illegal download in a piracy case is not equivalent to a lost sale. Record companies cannot collect restitution for every time a song has been illegally downloaded, a US District judge has decided. Judge James P. Jones gave his opinion on United States of America v. Dove, a criminal copyright case, ruling that each illegal download does not necessarily equate to a lost sale, and that the companies affected by P2P piracy cannot make their restitution claims based on this assumption. 6. Microsoft Contributes Code to Apache Interoperability Effort Spoiler http://arstechnica.com/journals/linux.ars/2009/01/23/microsoft-contributes-code-to-apache-interoperability-effort Microsoft have contributed source code to Apache's Stonehence project aimed at interoperation of projects built on different programming platforms. Microsoft has contributed source code to Apache's Stonehenge project, an open source effort that collects sample implementations of applications that are built with Service Oriented Architecture (SOA). The aim of the project is to test and demonstrate interoperability between application implementations that are built on different underlying technology. 7. The Plot to Kill Google Spoiler http://www.wired.com/techbiz/it/magazine/17-02/ff_killgoogle As anyone who knows me well will likely expect, I'm not a fan of the headline, though this article is an excellent read if you're interested in the gory details of how the Yahoo/Google deal went south. When Google's lawyers entered the smooth marble hallways of the Department of Justice on the morning of October 17, they had reason to feel confident. Sure, they were about to face the antitrust division—an experience most companies dread—to defend a proposed deal with Yahoo. But they had to like their chances. In the previous seven years, only one of the mergers that had been brought here had been opposed. And Google wasn't even requesting a full merger. It just wanted the go-ahead to pursue a small deal that it was convinced would benefit consumers, the two companies, and the search-advertising market as a whole. Settling around a large oval table in the conference room, the attorneys from Google and Yahoo prepared to make their arguments. Google wanted to serve its ads for certain search terms on Yahoo's pages in exchange for a share of the revenue those ads generated. It already had similar arrangements with AOL, Ask.com, and countless other Web sites. And the deal wasn't exclusive or permanent. 9. YouTube Contest Challenges Users To Make A 'Good' Video Spoiler http://www.theonion.com/content/video/youtube_contest_challenges_users Youtube has challenged users to create a video that "is actually worth watching". Ehtyar. |
||