Have a suggestion?
Click here to suggest a blog item.
Newsletters Archive
Catch up with DonationCoder by browsing our past newsletters, which collect the most interesting discussions on our site: here.
Editorial Integrity
DonationCoder does not accept paid promotions. We have a strict policy of not accepting gifts of any kind in exchange for placing content in our blogs or newsletters, or on our forum. The content and recommendations you see on our site reflect our genuine personal interests and nothing more.
Latest News
July 2, 2024
Server Migrations Coming
- Donationcoder server migration is slowly proceeding, expect some hiccups as we get all our ducks in a row..
July 19, 2022
Software Update
Jan 3, 2022
Event Results
May 13, 2020
Software Updates
Mar 24, 2020
Mini Newsletter
Dec 30, 2019
Software Updates
Jan 22, 2020
Software Updates
Jan 12, 2020
Newsletter
Jan 3, 2020
Event Results
Jan 2, 2020
Software Updates
Dec 30, 2019
Software Updates
- Automatic Screenshotter v1.16
- Screenshot Captor v4.35 beta
- Find and Run Robot v2.238 beta
- Clipboard Help and Spell v2.46.01
- LaunchBar Commander v1.157
- Mousers Media Browser v2.0
- MultiPhoto Quotes v2.09.1
- DiscussionList for Android v1.08
April 27, 2019
Software Updates
Feb 26, 2019
Software Updates
Feb 23, 2019
Software Updates
Feb 14, 2019
Software Updates
Jan 6, 2019
Event Results
Dec 2, 2018
Software Updates
Nov 13, 2018
Software Releases
July 30, 2018
Software Updates
June 24, 2018
Software Updates
June 6, 2018
Software Updates
Apr 2, 2018
Fundraiser Celebration
Apr 2, 2018
Software Updates
Feb 24, 2018
Software Updates
Jan 14, 2018
Major Site News
Jan 10, 2018
Event Results
Latest Forum Posts
Sharing the Software DiscountsI liked the idea of your site so, if I can save some money with the code for BBFlashback the least I can do is plough a bit of it back..
M.H.
Our daily Blog
This page spotlights the most interesting posts collected from our forum every day.
Way Simple Folder Cache for WindowsI took the AutoIt3 engine I had for monitoring when Explorer opens a folder and just converted it to a complete application. FolderCache. This implementation is much simpler than others I've done. Leave it run in the system tray. Hit Shift-PgUp to open the launch window. The GUI is no great shakes but I made it wide to avoid the need for horizontal scrolling to see all of the folder name. It should be usable in screen res 800x600 or higher. Right now there are no user configurable options. It's hard-wired for a max of 24 folders. There's no install needed. To have it start with Windows just make a shortcut in the Startup folder. (One note, the launch window is created dynamically when opened and destroyed with each close. While it is open, the folder monitor function is paused. No folders will be added to the cache while the launch window is open. For this reason there is no minimize button on the window frame. If you change your mind about opening a folder in the window, just click the close 'x' on the window frame or click the Open Selected Button with nothing selected, to close it.) |
||
Panda3d - Very impressive Open Source 3d Game Engine with Good Multiplayer Networking CodeDC member Gothi[c] has looked at and experimented with a ton of 3d game engines, and Panda3d is currently his top pick, which says a lot. While there are a lot of 3d engines out there, this is one of the more well-rounded ones, and it's actually been used in Disney's pirates MMORPG, so it seems like a good choice for larger-scale multiplayer stuff. It's multiplatform and open source. Panda3D is a 3D engine: a library of subroutines for 3D rendering and game development. The library is C++ with a set of Python bindings. Game development with Panda3D usually consists of writing a Python program that controls the the Panda3D library. http://panda3d.org |
||
Newsletter for April 20th, 2009 - Codename "Springtime Prelude"1. Newsletter Editorial
Greetings all, and welcome to another edition of the DonationCoder.com newsletter. First and foremost, it's time to say thank you to everyone who helped make our 4th anniversary fundraiser in March such a great success. We raised over $13,000 dollars thanks to the generous contributions from both new and long-time members. That's enough money to pay for our web hosting costs and server administration for the next two years -- Yay! We also wrapped up our first public survey and we've posted the results online for everyone to read.. Learn what your fellow readers think about the site and our software, and what we should concentrate on in the future. So on behalf of everyone at the site, let me again say "Thank You." Starting with this newsletter, we shall now return to normal, non-fundraising mode.. |
||
Recommend to me the BEST USB stick to get?I'm finally going to try to make a portable system to carry around with me. Can anyone recommend to me the absolute best USB stick to buy? I don't really care about looks or price, more for reliability, speed, quality.
usually, I'll just whatever USB stick is around, i don't care. But I was kind of wondering if there actually are differences in quality among sticks, and not just aesthetic. Looking forward to the responses! |
||
What is GhostNet? The Facts.In much the same way as they handled Conficker, the mass media have had a field day spreading sensationalism regarding the so-called "GhostNet". For those of you interested in a more factual report, give this and read and let me know what you think. GhostNet was discovered by a research outfit called Infowar Monitor (IWM), who represent a joint venture between two Canadian entities, the Secdev Group and the Citizen Lab at the University of Toronto to follow the use of cyberspace as a strategic domain. IWM had been working with the Tibetan government in exile, who suspected that their computer network had been infiltrated. Over the course of a 10 month long investigation, IWM managed to trace infections across 103 countries. GhostNet seems to mark high-profile political and economic targets (known as whaling or spearphishing, as opposed to standard phishing) for infection, accomplishing their goal via social engineering techniques which they use to convince the victim to open an infected email attachment. During their investigation of GhostNet, IWM determined that the attackers, and the infection itself originated from Chinese IP addresses geographically located on the island of Hainan. It is perhaps worth mentioning that Hainan is home to the Lingshui signals intelligence facility and the Third Technical Department of the Chinese People’s Liberation Army. IWM also determined one of the servers used to coordinate the infection was stationed at a Chinese Government run facility. The Remote Access Trojan/Tool (RAT) used in GhostNet is known as gh0st. It is open source software, and can be obtained in full with a quick internet search. A machine infected by gh0st RAT can be controlled and/or viewed in almost any manner by the attacker. gh0st RAT is fitted with remote desktop, webcam and microphone monitoring, and keylogging capabilities. gh0st RAT reports back from the infected machine to what's known as "command and control" servers, which send instructions to, and receive data from the Trojan. In the specific case of GhostNet, the infection is spread via social engineering, which is a method used by potential attackers to gain the trust of the target such that they are convinced to follow the attackers directions. The attackers monitor email or verbal communication between two parties, one of which is already infected thus making said monitoring possible. The attackers monitor the exchanges until an opportunity presents itself for the attackers to pass themselves off as the infected party. At this point, the attackers craft an email to the uninfected party, posing as the infected party, containing material that appears relevant to the original exchange. Attached to the email is (usually) a PowerPoint presentation which, once opened, infects the previously uninfected party with gh0st. Despite a substantial lack of evidence to implicate the Chinese government in the operation of GhostNet, some reports have taken the standpoint that they are behind it. It could be argued that, given the press this story has received, and the high profile of the victims, that the Chinese Government is perhaps complicit with the acts of those running GhostNet.It is also possible that they're being fed valuable confidential information retrieved via GhostNet. There have been reports of people held in Chinese custody being shown transcripts of private email conversations by Chinese officials. None of these possibilities have, or can be, confirmed. Sources: http://en.wikipedia.org/wiki/GhostNet and source reports http://www.f-secure....rchives/ghostnet.pdf http://www.cl.cam.ac...s/UCAM-CL-TR-746.pdf http://en.wikipedia....wiki/Infowar_Monitor http://en.wikipedia.org/wiki/Ghost_Rat Ehtyar. |
||
Tech News Weekly: Edition 16-09Table of Contents for this Week's Edition:
1. EBay Plans Skype Public Listing 2. PIN Crackers Nab Holy Grail of Bank Card Security 3. Evidence Suggests First Zombie Mac Botnet is Active 4. They're Gone! After Outcry, Time Warner Uncaps the Tubes 5. The Pirate Bay Verdict: Guilty, With Jail Time 6. Attack Sneaks Rootkits Into Linux Kernel 7. Wikipedians to Vote On Creative Commons License Adoption 8. Microsoft Owns Up to "E74" 360 Errors, Expands Warranty 9. How To Make A Baby |
||