Have a suggestion?

Click here to suggest a blog item.

Newsletters Archive

Catch up with DonationCoder by browsing our past newsletters, which collect the most interesting discussions on our site: here.

Editorial Integrity

DonationCoder does not accept paid promotions. We have a strict policy of not accepting gifts of any kind in exchange for placing content in our blogs or newsletters, or on our forum. The content and recommendations you see on our site reflect our genuine personal interests and nothing more.


Latest News

July 2, 2024
Server Migrations Coming

  • Donationcoder server migration is slowly proceeding, expect some hiccups as we get all our ducks in a row..

July 19, 2022
Software Update

Jan 3, 2022
Event Results

May 13, 2020
Software Updates

Mar 24, 2020
Mini Newsletter

Dec 30, 2019
Software Updates

Jan 22, 2020
Software Updates

Jan 12, 2020
Newsletter

Jan 3, 2020
Event Results

Jan 2, 2020
Software Updates

Dec 30, 2019
Software Updates

April 27, 2019
Software Updates

Feb 26, 2019
Software Updates

Feb 23, 2019
Software Updates

Feb 14, 2019
Software Updates

Jan 6, 2019
Event Results

Dec 2, 2018
Software Updates

Nov 13, 2018
Software Releases

July 30, 2018
Software Updates

June 24, 2018
Software Updates

June 6, 2018
Software Updates

Apr 2, 2018
Fundraiser Celebration

Apr 2, 2018
Software Updates

Feb 24, 2018
Software Updates

Jan 14, 2018
Major Site News

Jan 10, 2018
Event Results

Latest Forum Posts

What they say about us..
Nathan Gelen from Download3k image
Whether you are contacting the technical support for an application or you want to share something with your friends, Screenshot Captor is the right tool for the job.

Our daily Blog

This page spotlights the most interesting posts collected from our forum every day.

prev1 ... 248 249 250 251 252 [253] 254 255 256 257 258 ... 611next

Tech News Weekly: Edition 04-09

TNWeekly01.gif
Hi all.  Not much news this week guys. Honestly, I'd prefer to have fewer articles than inflate the list with boring junk. As usual, you can find last week's news here.


1. New Paint Promises Low-cost Wi-Fi Shielding
Spoiler
http://www.itworldcanada.com//Pages/Docbase/ViewArticle.aspx?ID=idgml-80c6f4f0-b11e-461c-bb03-6fd5712d3d16&RSS=1&UID=B82BC1BD-28FF-4AEE-9A3A-B2C4D89EE233
Of course any organisation using a proper certificate-based authentication system isn't gonna care, but it's still cool...right?

IT managers should start familiarising themselves with a new security tool, the paint brush, as Japanese researchers have come up with a paint that they say will block high-speed wireless signals, giving businesses a cheap option to protect their wireless networks.

The problem of securing wireless networks has been an issue for a while now. Wi-Fi LANs with no encryption or running the obsolete WEP system, run the risk of having hackers outside the building eavesdrop on wireless LAN traffic, or simply stealing bandwidth. However, there are a number of solutions, besides encryption, for companies wishing to secure their networks.


2. Mac Malware Piggybacks On Pirated IWork
Spoiler
http://www.theregister.co.uk/2009/01/22/mac_trojan_attack/
Be careful Mac users, downloading a pirated copy of iWork could see you with a copy of OSX.Trojan.iServices.A bouncing around your machine with root privileges.

Malware masquerading as part of Apple's iWork 09 productivity suite is targeting unsuspecting Mac users foolish enough to install pirated software downloaded on warez sites.

Once installed, iServices.A has unfettered root access, which it promptly uses to connect to a remote server over the internet, according to Intego, which sells anti-virus software for Macs. A secondary download installs malware that makes victims part of a botnet that's attacking undisclosed websites.


3. Newly-discovered Mac Exploit to Be Detailed at Black Hat
Spoiler
http://arstechnica.com/journals/apple.ars/2009/01/22/newly-discovered-mac-exploit-to-be-detailed-at-black-hat
Seemingly unrelated to post No. 2, researchers have discovered a memory injection vulnerability in standard Apple hardware that could allow an attacker to run code on an Apple box without any indication to the user whatsoever. The exploit will be presented at the next Black Hat scheduled to begin in mid-February.

A student who researches malware and intrusion detection systems at the University Politecnico di Milano in Italy will be making a presentation next month at the upcoming Black Hat conference in Washington D.C. The briefing, as Black Hat refers to it as, will deal with a memory injection technique specific to Apple hardware, which subsequently allows a piece of code to be run from memory.

While it may sound like the RAM Disk feature from the days of OS 9 and before, the technique is nowhere near as benign. What makes the memory injection technique particularly attractive to would-be hackers is that no traces are left on the hard drive and a new process is not created, making it what the experts call an "anti-forensic technique." What is run in memory is up to the attacker; it can range from code snippets to complete applications.


4. Superworm Seizes 9m PCs, 'stunned' Researchers Say
Spoiler
http://www.theregister.co.uk/2009/01/16/9m_downadup_infections/
The Conficker/Downadup worm has reached staggering number of infections, almost 9 million according to security firm F-Secure. The massive spike has been attributed to the worm's ability to propagate across an entire network via a single infection.

Downadup, the superworm that attacks a patched vulnerability in Microsoft Windows, is making exponential gains if estimates from researchers at F-Secure are accurate. They show 6.5 million new infections in the past four days, bringing the total number of machines it has compromised to almost 9 million.

The astronomical growth stunned some researchers, although others cautioned the numbers could be inflated since the counting of infected computers is by no means an exact science. Most agreed F-Secure's estimate was certainly plausible and if it proved to be correct, represented a major development in the world of cyberthreats.


5. Judge: 17,000 Illegal Downloads Don't Equal 17,000 Lost Sales
Spoiler
http://arstechnica.com/news.ars/post/20090119-judge-17000-illegal-downloads-dont-equal-17000-lost-sales.html
A US district court judge (finally, one with some form of logic) has ruled that each illegal download in a piracy case is not equivalent to a lost sale.

Record companies cannot collect restitution for every time a song has been illegally downloaded, a US District judge has decided. Judge James P. Jones gave his opinion on United States of America v. Dove, a criminal copyright case, ruling that each illegal download does not necessarily equate to a lost sale, and that the companies affected by P2P piracy cannot make their restitution claims based on this assumption.

Daniel Dove was originally found guilty of criminal copyright infringement for running a torrent group called "Elite Torrents" between 2004 and 2005. The jury in the case had found Dove guilty of reproduction and distribution of copyrighted works, as well as conspiracy to commit criminal copyright infringement. At the time, Judge Jones sentenced Dove to 18 months in prison for each count, plus a special assessment of $200 and a $20,000 fine ($10,000 per count).


6. Microsoft Contributes Code to Apache Interoperability Effort
Spoiler
http://arstechnica.com/journals/linux.ars/2009/01/23/microsoft-contributes-code-to-apache-interoperability-effort
Microsoft have contributed source code to Apache's Stonehence project aimed at interoperation of projects built on different programming platforms.

Microsoft has contributed source code to Apache's Stonehenge project, an open source effort that collects sample implementations of applications that are built with Service Oriented Architecture (SOA). The aim of the project is to test and demonstrate interoperability between application implementations that are built on different underlying technology.

The project was launched in November under the aegis of the Apache Incubator, a pool of nascent community-driven projects that are working their way into the Apache ecosystem. According to Stonehenge participant Paul Fremantle, this is the first Incubator podling that has received direct involvement from Microsoft.


7. The Plot to Kill Google
Spoiler
http://www.wired.com/techbiz/it/magazine/17-02/ff_killgoogle
As anyone who knows me well will likely expect, I'm not a fan of the headline, though this article is an excellent read if you're interested in the gory details of how the Yahoo/Google deal went south.

When Google's lawyers entered the smooth marble hallways of the Department of Justice on the morning of October 17, they had reason to feel confident. Sure, they were about to face the antitrust division—an experience most companies dread—to defend a proposed deal with Yahoo. But they had to like their chances. In the previous seven years, only one of the mergers that had been brought here had been opposed. And Google wasn't even requesting a full merger. It just wanted the go-ahead to pursue a small deal that it was convinced would benefit consumers, the two companies, and the search-advertising market as a whole. Settling around a large oval table in the conference room, the attorneys from Google and Yahoo prepared to make their arguments. Google wanted to serve its ads for certain search terms on Yahoo's pages in exchange for a share of the revenue those ads generated. It already had similar arrangements with AOL, Ask.com, and countless other Web sites. And the deal wasn't exclusive or permanent.

Tom Barnett, assistant attorney general for antitrust, took his seat at the table and called the meeting to order. The Yahoo lawyers kicked things off by describing their negotiations with DOJ staff; they had already suggested limiting the length of the deal and capping the amount of money in play. Barnett seemed unimpressed. "Staff," he proclaimed, "is irrelevant." He made the decisions around there.


9. YouTube Contest Challenges Users To Make A 'Good' Video
Spoiler
http://www.theonion.com/content/video/youtube_contest_challenges_users
Youtube has challenged users to create a video that "is actually worth watching".

onion.png



Ehtyar.


Using a Desktop Search through the network

blog clipart
In our community-run library, we have about 20 computers connected through a LAN. Between them, we have upwards of 150,000 files stored on four computers. These files are of format .doc, .html, .pdf, .txt, .xls and .msg. We've been trying to come up with a search solution that will allow users (who are decently computer savvy) to search all the files, and them access them over the network.

Is it possible to:
  • Run a freeware desktop search on the central server and access the search engine on the local LAN?
  • Index network drives of four computers, and make them searchable?

Click here to make a suggestion..


Awesome article re: organization and notetaking

DDC_Bell_Curve_small.png
http://chandlerproje...icationPaperOutline2

This must be some classic. I wonder how I have missed it. If you use a notetaker, have read the long notetaking thread, etc you owe it to yourself to read this one.


Snake Wrangling for Kids: Learning to Program with Python

cover-tn.png
If you ever wanted to get your kids started with programming and wasn't sure where to find something written for their level, that they would understand, give this one a try.

Snake Wrangling for Kids is a free ebook (CC licensed) specifically written for teaching kids ages 8 and older how to program, using Python.

This one is meant to be printed out and stapled together and given to a child as a gift. (and not necessarily your own child, either)

It comes in 3 different flavors (Mac, Linux, Windows) and 2 different versions (for Python 3 & Python 2).

http://www.briggs.ne...e-wrangling-for-kids


Tech Presentations (site)

TechPresentationsLogo.png
Recently, I came across the site "Tech Presentations" when researching specific presentations.  So far, I take "Tech" in this context to mean mostly related to the Internet. Perhaps other folks will find this to be of some use at some point.

Authors of this blog are digging up technical presentations from different conferences and events. Quite often such presentations share information that can’t be found in books or articles and can give you insights at technology advances, company culture and even people personalities.
-From the about page of the associated blog:

One nice thing the site provides is different views of the collected presentations, including by:

  • Conferences
  • Presentations
  • People
  • Companies
  • Locations

http://www.techpresentations.org/


Tech News Weekly: Edition 03-09

TNWeekly01.gif
Hi all. Keep an eye out for No. 1 everyone, looks like it could get out of hand pretty quickly. Enjoy this week's news :)
As usual, you can find last week's news here.


1. Three Million Hit by Windows Worm
Spoiler
http://news.bbc.co.uk/2/hi/technology/7832652.stm
http://www.darkreading.com/security/attacks/showArticle.jhtml?articleID=212900793
A virus is rapidly infecting Windows machines that have not yet applied the patch for MS08-067. Researchers at security firm F-Secure peg the infection rate closer to 8 million, and have expressed concerns the virus could be the beginning of a new massive botnet.

A worm that spreads through low security networks, memory sticks, and PCs without the latest security updates is posing a growing threat to users.

The malicious program, known as Conficker, Downadup, or Kido was first discovered in October 2008.

Although Microsoft released a patch, it has gone on to infect 3.5m machines.


2. Windows 7 Now 'available to all'
Spoiler
http://news.bbc.co.uk/2/hi/technology/7825111.stm
After last week's debacle in which Microsoft failed to anticipate the level of enthusiasm surrounding the BETA of Windows 7, availability of the pre-release operating system has been restored, and without the planned limit on downloads.

The latest Windows release will be available to everyone after a surge in demand crashed the Microsoft website on 9 January, the original release date.

In response, the company has lifted a planned limit on the number of copies of the Windows 7 Beta available for download.

Microsoft delayed the launch by one day to add "more infrastructure and servers" to cope with demand.


3. UK Ministry of Defence Stung by Rapidly Spreading Virus
Spoiler
http://www.networkworld.com/news/2009/011609-uk-ministry-of-defence-stung.html
http://www.theregister.co.uk/2009/01/15/royal_navy_email_virus_outage/
The UK's Ministry of Defence has been overwhelmed by a virus rapidly spreading across its computer infrastructure. Although they have released no details ragarding the nature of this virus, one can suspect this story is related to item No 1.

The U.K. Ministry of Defence is in the midst of an electronic fight with a computer virus that rapidly spread through its computer networks starting Jan. 6.

The virus infected computers throughout the military, including those used by the Royal Air Force and Royal Navy, and is one of the most severe attacks the organization has ever faced, according to a Ministry of Defence spokeswoman.


4. Storm Worm Smackdown As Researchers Unpick Control System
Spoiler
http://www.theregister.co.uk/2009/01/13/storm_worm_unpicked/
As a new potential botnet rises, another may finally fall.

A team of security researchers have developed a technique for automatically purging the remnants of the Storm worm infection from the internet. But the approach - which involves turning the botnet's command and control system against itself - could run foul of computer hacking laws in Germany and elsewhere, which ban the modification of computer systems without consent.

Nonetheless, the work of the team from Bonn University and RWTH Aachen University have advanced knowledge about how botnets (networks of compromised zombie PCs) are established and maintained that could advance the development of more acceptable tracking and take-down techniques.


5. RIM Squashes BlackBerry PDF Peril
Spoiler
http://www.theregister.co.uk/2009/01/14/blackberry_pdf_patch/
A flaw in the way Blackberry PC software handles malformed PDFs that could potentially lead to remote code execution has been patched by Blackberry maker Research In Motion.

Research in Motion (RIM) has published a patch that fixes a pair of critical flaws in the way BlackBerry servers handle malformed PDF files.

The two related security updates address vulnerabilities in the PDF Distiller of the BlackBerry Attachment Service for BlackBerry Unite and BlackBerry Enterprise Server, respectively. As a result of the bugs, hackers might be able to inject hostile code onto computer systems running the BlackBerry Attachment Service, providing they can trick the user of a BlackBerry smartphone into opening a maliciously crafted PDF attachment, contained in an email message sent to them.


6. Why Microsoft Left Windows 7 Unpatched On Patch Tuesday
Spoiler
http://arstechnica.com/journals/microsoft.ars/2009/01/14/why-microsoft-left-windows-7-unpatched-on-patch-tuesday
Microsoft ignored the BETA of Windows 7 when it released its patch for MS09-001 this week because the remote code execution vulnerability was rated "moderate", a level that Microsoft deem unnecessary to patch in BETA versions of Windows.

Microsoft started 2009 by fixing just one security flaw in its software; this month's Patch Tuesday only had a single security bulletin, MS09-001.

The security update kills three birds with one stone: two privately reported vulnerabilities and one publicly disclosed vulnerability. This is possible since all three problems, which could allow remote code execution and give an attacker full user rights, are found in the Microsoft Server Message Block (SMB) Protocol.


7. FreeYourPhone.org Launches, Pushes for New DMCA Exemption
Spoiler

Good news for those with jailbroken phones. FreeYourPhone.org has launched a petition to have the DMCA amended to allow owners of jailbroken phones to maintain their legal rights as phone owners.

The Electronic Frontier Foundation has begun a new campaign to get the public to complain to lawmakers about the limitations of locked mobile phones. The new site, FreeYourPhone.org, encourages citizens to sign a petition going to the US Copyright Office in support of the EFF's recent push for an exemption to the Digital Millennium Copyright Act (DMCA), which it hopes will offer legal protection to phone users who have jailbroken or unlocked their devices.

The EFF submitted the exemption request back in December as part of the Copyright Office's triennial DMCA exemption reconsideration. In addition to phone jailbreaks and unlocks, the EFF asked for exemptions from the DMCA for YouTube's "remix culture," and university libraries across the country asked for more rights for using DVDs in classroom settings.


8. Meet Tim Cook: The Man in Charge of Apple
Spoiler
http://blog.wired.com/gadgets/2009/01/meet-tim-cook-h.html
Earlier this week, Apple announced Steve Jobs will stepping down as Apple CEO until June on medical grounds. Tim Cook, Jobs' right-hand-man, will stand in for him until such time as Jobs is able to return.

For millions of Apple fans, Steve Jobs is irreplaceable. But if there's one man Jobs himself trusts to stand in his shoes, it is his second in command, Apple Chief Operating Officer Tim Cook.

With Jobs on medical leave until June, Cook will be leading the team at Apple. And it is likely that when Jobs leaves Apple, it will be Cook he will anoint as the new CEO of the company.

"Tim runs Apple," says Michael Janes, the first general manager of Apple's online store and now co-founder of ticketing search engine FanSnap, "and he has been running Apple for a long time now."


9. Obama to Defend Telco Spy Immunity
Spoiler
http://blog.wired.com/27bstroke6/2009/01/obama-to-fight.html
It seems the Obama Administration will go along with the immunisation of Telcos that assisted the Bush Administration in its domestic spy program.

The incoming Obama administration will vigorously defend congressional legislation immunizing U.S. telecommunication companies from lawsuits about their participation in the Bush administration's domestic spy program.

That was the assessment Thursday by Eric Holder, President-elect Barack Obama's choice for attorney general, who made the statement during his confirmation hearings before the Senate Judiciary Committee. A court challenge questioning the legality of the legislation is pending in U.S. District Court in San Francisco -- where the judge in the case wanted to know what the Obama administration's position was.


10. Judge Calls RIAA Objections "specious," Will Stream Hearing
Spoiler
http://arstechnica.com/news.ars/post/20090115-judge-calls-riaa-objections-spurious-will-stream-hearing.html
Once again the RIAA planted it's proverbial foot squarely in its mouth when it objected to the live streaming of one of its infamous piracy lawsuits.

A federal judge has agreed to a novel request: streaming parts of an upcoming file-sharing trial over the Internet. Judge Nancy Gertner has granted the request of Harvard Law professor Charles Nesson and students to put the gavel-to-gavel footage on the Internet for any non-commercial use, over the RIAA's objections. But only on a one-time basis.

Joel Tenenbaum's first strategy for dealing with an RIAA settlement letter wasn't real helpful: he called them up and offered $500 instead of $3,500. His offer was rejected. When the case actually went to court, Tenenbaum tried to settle again, this time for $5,000, but by then the RIAA wanted $10,500.


11. Barbara Bush Runs Aground Off Coast Of Maine
Spoiler
http://www.theonion.com/content/video/barbara_bush_runs_aground_off
In an apparent send-off for her son as he leaves office, President Bush's mother, Barbara Bush, has run aground off the US cost.

onion.png




Ehtyar.


prev1 ... 248 249 250 251 252 [253] 254 255 256 257 258 ... 611next

Share on Facebook