Have a suggestion?

Click here to suggest a blog item.

Newsletters Archive

Catch up with DonationCoder by browsing our past newsletters, which collect the most interesting discussions on our site: here.

Editorial Integrity

DonationCoder does not accept paid promotions. We have a strict policy of not accepting gifts of any kind in exchange for placing content in our blogs or newsletters, or on our forum. The content and recommendations you see on our site reflect our genuine personal interests and nothing more.


Latest News

July 2, 2024
Server Migrations Coming

  • Donationcoder server migration is slowly proceeding, expect some hiccups as we get all our ducks in a row..

July 19, 2022
Software Update

Jan 3, 2022
Event Results

May 13, 2020
Software Updates

Mar 24, 2020
Mini Newsletter

Dec 30, 2019
Software Updates

Jan 22, 2020
Software Updates

Jan 12, 2020
Newsletter

Jan 3, 2020
Event Results

Jan 2, 2020
Software Updates

Dec 30, 2019
Software Updates

April 27, 2019
Software Updates

Feb 26, 2019
Software Updates

Feb 23, 2019
Software Updates

Feb 14, 2019
Software Updates

Jan 6, 2019
Event Results

Dec 2, 2018
Software Updates

Nov 13, 2018
Software Releases

July 30, 2018
Software Updates

June 24, 2018
Software Updates

June 6, 2018
Software Updates

Apr 2, 2018
Fundraiser Celebration

Apr 2, 2018
Software Updates

Feb 24, 2018
Software Updates

Jan 14, 2018
Major Site News

Jan 10, 2018
Event Results

Latest Forum Posts

What they say about us..
Nathan Gelen from Download3k image
Whether you are contacting the technical support for an application or you want to share something with your friends, Screenshot Captor is the right tool for the job.

Our daily Blog

This page spotlights the most interesting posts collected from our forum every day.

prev1 ... 243 244 245 246 247 [248] 249 250 251 252 253 ... 611next

The Agreeable Cat - Never be Bound By Online Legal Agreements Again

front.jpg
Of course, I have created a wonderful solution to this problem. My cat, Simba, agrees instead of me. As he is not a legal entity, I don't really know how kitty's agreements would stand up in court, but I like to think he would be responsible for any breaches of contract, assuming the agreement is even enforceable. After all, he is not even of legal age, at least in human years. First, we must create a way for Simba to push the button..

http://www.ohesso.co.../essays/essay006.htm


Tower Defense Flash Game of the Week: Ravine

Screenshot - 2_18_2009 , 5_59_43 AM_thumb.png
Here's a very nicely animated cartoony tower defense game.  Missing some features i like to see in a TD game, but this has to be one of the best graphics seen in this type of game.

http://www.axis-games.com/ravine.php


Overcoming the Cloud’s limits

blog clipart
Carol has been one of the clearest voices on the limits of cloud computing, so this paper caught my eye. It lays out how cloud computing can win if it overcomes the following ten obstacles, so say UC Berkeley researchers.
  • 1. Availability of service
  • 2. Data lock-in
  • 3. Data confidentiality and auditability
  • 4. Data transfer bottlenecks
  • 5. Performance unpredictability
  • 6. Scalable storage
  • 7. Bugs in large distributed systems
  • 8. Scaling quickly
  • 9. Reputation fate sharing
  • 10. Software licensing

The biggest obstacle is #2: data lock-in via proprietary formats. That's exactly why the more ODF we see, the more we will be free (to leave). Richard Stallman, warns us of the cloud's dark side: It’s stupidity. It’s worse than stupidity: it’s a marketing hype campaign. Somebody is saying this is inevitable — and whenever you hear somebody saying that, it’s very likely to be a set of businesses campaigning to make it true. (- The Guardian, 29 September 2008)


Newsletter for February 16th, 2009 - Codename "Forum Valentines"

blog clipart
Greetings and welcome to another edition of the newsletter.  With only 28 days, February has always seemed like a bit of a rip-off to me compared to the other months.  Let's just try to make the best of it by keeping busy.  If you're feeling like you need a bit of balance after Valentine's Day, I posted a link to a free mp3 album by one of my very favorite Singer/Songwriters, Edith Frost.  And If you have a significant other maybe you can let us know in the forum if you exchanged some special gifts?  If not, and you're feeling like you need some cheering up, don't miss the silly humour thread for a few good laughs (see section 3 below).

If you have young kids, you should check out a pair of programs made by dc members recently, designed to let the young ones pound away on the keyboard and amuse themselves.  One is called "Crazy Little Fingers", and was coded for our recent NANY programming challenge, and another is called "Teddy" and was coded in the last week or two as a programming experiment.  Crazy Little Fingers shows pictures of animals and objects matching the keys pressed; "Teddy" plays different drumkit sounds for each key.  Both make it easy for you to customize using your own photos and sounds.

And for forum regulars, I've been hard at work in the last two weeks working on new forum features; see section 3 below for more details.

Click here to continue reading the full newsletter now..


A free album of music from Edith Frost - one of my favorite singers

cover.jpg
Edith Frost is a very special singer and songwriter.. It's hard for me to fight my tendencies to want to keep such discoveries secret and sacred.  This is music that I find deeply moving and rare and haunting and heartbreaking and thrilling.  The kind that makes you want to keep everyone on the planet from hearing it.

But it also seems fitting to share some sad music about love and romance on valentine's day, for those that need it.

Download the album of outtake songs here (see top left to download entire set as zip):

Note that these are sparser less polished versions of the full album songs, but it will give you a good feel for the music.



Visit Edith Frost's Blog here: http://edithfrost.com/
Edith Frost on Amazon.com here: http://www.amazon.co.../ref=ntt_mus_gen_pel


Tech News Weekly: Edition 06-09

TNWeekly01.gif
As usual, you can find last week's news here.


1. Hacker Site Claims Breach of Third Security Firm Web Site in a Week
Spoiler
http://news.cnet.com/8301-1009_3-10161874-83.html
HackersBlog claims the websites of security firms Kaspersky, BitDefender and F-Secure have been breached via various SQL injection and cross-site scripting attacks.

HackersBlog publicized on its site that it had breached the U.S. Web site of Moscow-based firm Kaspersky on Saturday and the Portugal site of BitDefender on Monday using the same attack techniques.

Kaspersky said on Monday that no sensitive or customer data had been exposed in the breach and that it would ask a database expert to audit its systems. BitDefender said the site that had been breached belonged to an unnamed partner and no customer data was stolen.


2. HP Printer Hack Risk Prompts Update
Spoiler
http://www.theregister.co.uk/2009/02/09/hp_printer_firmware_update/
Several HP printer series have vulnerabilities in their firmware that could allow an attacker to gain access to documents sent to the printer via the web administration panel.

Users of HP LaserJet printers need to apply a firmware update following the discovery of a potentially troublesome vulnerability.

The security bug creates a means for hackers to gain access to files sent to printers via the web administration console on vulnerable machines. A security advisory from HP explains various versions of its HP Digital Senders as well as HP LaserJet printers and HP Color LaserJet printers are all potentially vulnerable.

Users of HP LaserJet 2410, 2420, 2430, 4250, 4350, 9040, and 9050 series all need to upgrade their printer's firmware software to a secure version. HP Color LaserJet 4730mfp, HP Color LaserJet 9500mfp and HP 9200C Digital Sender users also need to update.


3. Houston Justice System Laid Low by Conficker Worm
Spoiler
http://www.theregister.co.uk/2009/02/09/houston_malware_infection/
Yet another corporate network falls prey to Conflicker/Downadup.

The justice system in Houston was thrown into disarray late last week after the infamous Conficker (Downadup) worm infected key systems.

The infection forced municipal courts in the Texan city to shut down on Friday, and police had to temporarily stop making arrests for minor offences, such as those for outstanding traffic warrants or minor drug possession. "The people we pull over with outstanding traffic warrants will be issued a citation rather than being taken to jail," explained Houston Police Department spokesman John Cannon. "Anyone suspected of a violent crime will be taken to jail. We’re not cutting back on that."

Meanwhile, bail bonds agencies report that the process of releasing prisoners and handling bond payments has slowed to a crawl.


4. Win 7 and Smartphones Targeted in Pwn2own Challenge
Spoiler
http://www.theregister.co.uk/2009/02/12/pwn2own_preview/
The next Pwn2Own contest on the 16th of March will feature Windows 7 and Smartphones.

An annual hacking challenge has put the security of browsers and smartphones in the firing line.

The latest Pwn2own contest at CanSecWest next month will reportedly include challenges involving hacking into browser packages running on Windows 7 PCs and a separate contest involving breaking into next-generation smartphones. 3Com's TippingPoint security division is to sponsor both contests, due to take place at the Vancouver conference from 16 March.


5. A Promising New Key Management Standards Effort
Spoiler
http://news.cnet.com/8301-1009_3-10163186-83.html
Several of the big guns in IT have banded together to produce a new standard for encryption key management. Unfortunately, technical details are sketchy.

At ESG, we have this concept called ubiquitous encryption. As more and more encryption technologies are baked into products and enter the enterprise, data will likely be encrypted everywhere--on hard drives, networks, database columns, file systems, tape drives, portable media, etc.

Good news for data confidentiality and integrity but all of this encryption means tons of new encryption keys to create, protect, and manage. This situation has scared me for a while. If encryption keys are stolen, they can easily unlock secret data. If encryption keys are lost, critical data can turn into useless 1s and 0s.


6. Personal Data Of 45,000 Exposed In FAA Data Breach
Spoiler
http://www.darkreading.com/security/attacks/showArticle.jhtml?articleID=213402894
The US Federal Aviation Administration has suffered a data breach that has exposed that details of some 45,000 staff. It is not known how the data was exposed.

The Federal Aviation Administration (FAA) is warning some 45,000 employees that their personal data may have been compromised in a hack of one of its computer systems.

A notice about the FAA breach says that "an agency computer was illegally accessed and employee personal identity information was stolen electronically." Affected employees will receive individual letters to notify them about the breach, the notice says.


7. Security Websites Hit By Big DDoS Attack
Spoiler
http://darkreading.com/security/attacks/showArticle.jhtml?articleID=213402595
Security site Metasploit has been subjected DDoS attacks comprised of up to 80,000 hits per second.

Several renowned white-hat hacker security sites have been hit during the past few days with a distributed denial-of-service attack (DDoS). Immunity, Milw0rm, and Packet Storm were in the clear as of this posting, but attackers were still hammering away at Metasploit.

The attackers behind the DDoS -- which began on Feb. 6 and continued through the weekend on most of the sites -- deployed a massive botnet of some 80,000 zombies to flood the sites' domains with HTTP requests, according to Cisco researchers.


8. Cracking Down On Conficker: Kaspersky, OpenDNS Join Forces
Spoiler
http://arstechnica.com/business/news/2009/02/cracking-down-on-conficker-kaspersky-opendns-join-forces.ars
Kaspersky and OpenDNS will be working together to try to stop Conflicker from spreading.

The Conficker botnet is proving to be a feisty bit of malware. It may never become a problem of Storm-sized proportions, but Conficker's authors seem determined to keep their system in play. Team White Hat, however, isn't giving up—OpenDNS and Kaspersky Lab announced on Monday, February 9 that they'd be working together to prevent Conficker from spreading once it's infected a network. There are two components to the new approach. First, Kaspersky Labs is capable of predicting what domains Conficker will attempt to contact, while OpenDNS' Botnet Protection feature prevents those domains from resolving internally. The result—at least in theory—is a cooped-up Conficker.

The problem the two companies are trying to address dates back to a new version of Conficker we first covered three weeks ago. Dubbed Conficker.B, the newer model is capable of spreading via USB stick and attempts to crack the passwords of other local systems. Once it has found additional systems to sink its hooks into, Conficker fires up and begins spreading itself across the network; only one system need remain unpatched for an entire network of systems to become infected.


9.  Mozilla Call for EU Intervention in Browser War is Troubling
Spoiler
http://arstechnica.com/open-source/news/2009/02/mozilla-call-for-eu-intervention-in-browser-war-is-troubling.ars
Mozilla is backing calls from Opera for the EU to impose sanctions on Microsoft for including Internet Explorer in their operating system.

Mozilla Foundation chairperson Mitchell Baker contends that the inclusion of Microsoft's Internet Explorer web browser in the Windows operating system represents an ongoing threat to competition and innovation on the Internet. She supports the European Commission's investigation of Microsoft's bundling tactics and believes that remedies are needed to address Microsoft's alleged abuses. To that end, Mozilla intends to assist the commission by offering expertise about the browser market.

The European Commission (EC) issued a finding last month declaring that Microsoft has abused its dominant position as an operating system vendor by tying its web browser to the Windows platform. The commission has sent a Statement of Objections to Microsoft which outlines the basis for the accusation. Microsoft will be given the opportunity to respond in formal hearings before the EU evaluates the possibility of imposing fines or other remedies.


10. A Farewell to Palm(O)s: Company Stakes Future On WebOS
Spoiler
http://arstechnica.com/gadgets/news/2009/02/a-farewell-to-palm-os-company-stakes-future-on-webos.ars
PalmOS will be laid to rest as Palm's new WebOS takes over.

Palm's Pre debuted with a bang at CES this past January and was arguably the star of the show. Palm has struggled to remain a relevant, profitable player in the smartphone market for years; the company's last major smartphone (the Centro, released in the fall of 2007) was reasonably well-received, but it couldn't entirely negate the barrage of negative criticism that hit Palm following the cancellation of the ill-fated Foleo.

In a meeting with investors today, Palm President and CEO Ed Colligan confirmed that the company intends to leave its past behind and to devote itself entirely to its new webOS—after twelve-plus years, Palm OS is finally headed for retirement.


11. Moonlight 1.0 Brings Silverlight to Linux
Spoiler
http://arstechnica.com/open-source/news/2009/02/moonlight-10-brings-silverlight-to-linux.ars
Moonlight has officially gone gold, bringing Silverlight 1.0 compatibility to the Linux platform.

Novell has announced the official 1.0 release of Moonlight, an open source implementation of Microsoft's Silverlight rich Internet application framework. This release will make it possible for users of the Linux operating system to view content that is compatible with Silverlight 1.0.

The Moonlight project emerged in 2007, shortly after Microsoft unveiled Silverlight at the MIX conference. When Microsoft officially released Silverlight 1.0, the company announced plans to provide specifications and test suites to Novell in order to facilitate development of a Linux-compatible version. Moonlight has evolved significantly over the past year and is now ready for widespread use.


12. Russian and US Satellites Collide
Spoiler
http://news.bbc.co.uk/2/hi/science/nature/7885051.stm
Two communications satellites, one Russian, and one US, have collided in orbit.

The US commercial Iridium spacecraft hit a defunct Russian satellite at an altitude of about 800km (500 miles) over Siberia on Tuesday, Nasa said.

The risk to the International Space Station and a shuttle launch planned for later this month is said to be low.

The impact produced a cloud of debris, which will be tracked into the future.


13. Unix Lovers to Party Like It's 1234567890
Spoiler
http://blog.wired.com/gadgets/2009/02/unix-lovers-to.html
On Friday the 13th, 2009 at 11:31:30pm UTC (here in Aussie land that will be Saturday the 14th at 10:31:30am) the UNIX timestamp will reach 1234567890. This article was posted as close to that time as I could manage. To find out when it happened for you, try executing perl -e "print scalar localtime(1234567890);".

Unix weenies everywhere will be partying like it's 1234567890 this Friday.

That's because, at precisely 3:31:30 p.m. Pacific time on February 13, 2009, the 10-digit "epoch time" clock used by most Unix computers will display all ten decimal digits in sequence. (That's 6:31:30 Eastern, or 23:31:30 UTC.)


14. [NSFW] Sony Releases New Stupid Piece Of S**t That Doesn't F**king Work
Spoiler
http://www.theonion.com/content/video/sony_releases_new_stupid_piece_of
Discussion started by justice: https://www.donationcoder.com/forum/index.php?topic=16990.0
The Onion News Network reports on Sony's new "retarded hunk of garbage" which hit the shelves this week.

onion.png



Ehtyar.


prev1 ... 243 244 245 246 247 [248] 249 250 251 252 253 ... 611next

Share on Facebook