Have a suggestion?
Click here to suggest a blog item.
Newsletters Archive
Catch up with DonationCoder by browsing our past newsletters, which collect the most interesting discussions on our site: here.
Editorial Integrity
DonationCoder does not accept paid promotions. We have a strict policy of not accepting gifts of any kind in exchange for placing content in our blogs or newsletters, or on our forum. The content and recommendations you see on our site reflect our genuine personal interests and nothing more.
Latest News
July 2, 2024
Server Migrations Coming
- Donationcoder server migration is slowly proceeding, expect some hiccups as we get all our ducks in a row..
July 19, 2022
Software Update
Jan 3, 2022
Event Results
May 13, 2020
Software Updates
Mar 24, 2020
Mini Newsletter
Dec 30, 2019
Software Updates
Jan 22, 2020
Software Updates
Jan 12, 2020
Newsletter
Jan 3, 2020
Event Results
Jan 2, 2020
Software Updates
Dec 30, 2019
Software Updates
- Automatic Screenshotter v1.16
- Screenshot Captor v4.35 beta
- Find and Run Robot v2.238 beta
- Clipboard Help and Spell v2.46.01
- LaunchBar Commander v1.157
- Mousers Media Browser v2.0
- MultiPhoto Quotes v2.09.1
- DiscussionList for Android v1.08
April 27, 2019
Software Updates
Feb 26, 2019
Software Updates
Feb 23, 2019
Software Updates
Feb 14, 2019
Software Updates
Jan 6, 2019
Event Results
Dec 2, 2018
Software Updates
Nov 13, 2018
Software Releases
July 30, 2018
Software Updates
June 24, 2018
Software Updates
June 6, 2018
Software Updates
Apr 2, 2018
Fundraiser Celebration
Apr 2, 2018
Software Updates
Feb 24, 2018
Software Updates
Jan 14, 2018
Major Site News
Jan 10, 2018
Event Results
Latest Forum Posts
What they say about us..
Whether you are contacting the technical support for an application or you want to share something with your friends, Screenshot Captor is the right tool for the job.
About Screenshot Captor.
Our daily Blog
This page spotlights the most interesting posts collected from our forum every day.
Tech News Weekly: Edition 04-09Hi all. Not much news this week guys. Honestly, I'd prefer to have fewer articles than inflate the list with boring junk. As usual, you can find last week's news here. 1. New Paint Promises Low-cost Wi-Fi Shielding Spoiler http://www.itworldcanada.com//Pages/Docbase/ViewArticle.aspx?ID=idgml-80c6f4f0-b11e-461c-bb03-6fd5712d3d16&RSS=1&UID=B82BC1BD-28FF-4AEE-9A3A-B2C4D89EE233 Of course any organisation using a proper certificate-based authentication system isn't gonna care, but it's still cool...right? IT managers should start familiarising themselves with a new security tool, the paint brush, as Japanese researchers have come up with a paint that they say will block high-speed wireless signals, giving businesses a cheap option to protect their wireless networks. 2. Mac Malware Piggybacks On Pirated IWork Spoiler http://www.theregister.co.uk/2009/01/22/mac_trojan_attack/ Be careful Mac users, downloading a pirated copy of iWork could see you with a copy of OSX.Trojan.iServices.A bouncing around your machine with root privileges. Malware masquerading as part of Apple's iWork 09 productivity suite is targeting unsuspecting Mac users foolish enough to install pirated software downloaded on warez sites. 3. Newly-discovered Mac Exploit to Be Detailed at Black Hat Spoiler http://arstechnica.com/journals/apple.ars/2009/01/22/newly-discovered-mac-exploit-to-be-detailed-at-black-hat Seemingly unrelated to post No. 2, researchers have discovered a memory injection vulnerability in standard Apple hardware that could allow an attacker to run code on an Apple box without any indication to the user whatsoever. The exploit will be presented at the next Black Hat scheduled to begin in mid-February. A student who researches malware and intrusion detection systems at the University Politecnico di Milano in Italy will be making a presentation next month at the upcoming Black Hat conference in Washington D.C. The briefing, as Black Hat refers to it as, will deal with a memory injection technique specific to Apple hardware, which subsequently allows a piece of code to be run from memory. 4. Superworm Seizes 9m PCs, 'stunned' Researchers Say Spoiler http://www.theregister.co.uk/2009/01/16/9m_downadup_infections/ The Conficker/Downadup worm has reached staggering number of infections, almost 9 million according to security firm F-Secure. The massive spike has been attributed to the worm's ability to propagate across an entire network via a single infection. Downadup, the superworm that attacks a patched vulnerability in Microsoft Windows, is making exponential gains if estimates from researchers at F-Secure are accurate. They show 6.5 million new infections in the past four days, bringing the total number of machines it has compromised to almost 9 million. 5. Judge: 17,000 Illegal Downloads Don't Equal 17,000 Lost Sales Spoiler http://arstechnica.com/news.ars/post/20090119-judge-17000-illegal-downloads-dont-equal-17000-lost-sales.html A US district court judge (finally, one with some form of logic) has ruled that each illegal download in a piracy case is not equivalent to a lost sale. Record companies cannot collect restitution for every time a song has been illegally downloaded, a US District judge has decided. Judge James P. Jones gave his opinion on United States of America v. Dove, a criminal copyright case, ruling that each illegal download does not necessarily equate to a lost sale, and that the companies affected by P2P piracy cannot make their restitution claims based on this assumption. 6. Microsoft Contributes Code to Apache Interoperability Effort Spoiler http://arstechnica.com/journals/linux.ars/2009/01/23/microsoft-contributes-code-to-apache-interoperability-effort Microsoft have contributed source code to Apache's Stonehence project aimed at interoperation of projects built on different programming platforms. Microsoft has contributed source code to Apache's Stonehenge project, an open source effort that collects sample implementations of applications that are built with Service Oriented Architecture (SOA). The aim of the project is to test and demonstrate interoperability between application implementations that are built on different underlying technology. 7. The Plot to Kill Google Spoiler http://www.wired.com/techbiz/it/magazine/17-02/ff_killgoogle As anyone who knows me well will likely expect, I'm not a fan of the headline, though this article is an excellent read if you're interested in the gory details of how the Yahoo/Google deal went south. When Google's lawyers entered the smooth marble hallways of the Department of Justice on the morning of October 17, they had reason to feel confident. Sure, they were about to face the antitrust division—an experience most companies dread—to defend a proposed deal with Yahoo. But they had to like their chances. In the previous seven years, only one of the mergers that had been brought here had been opposed. And Google wasn't even requesting a full merger. It just wanted the go-ahead to pursue a small deal that it was convinced would benefit consumers, the two companies, and the search-advertising market as a whole. Settling around a large oval table in the conference room, the attorneys from Google and Yahoo prepared to make their arguments. Google wanted to serve its ads for certain search terms on Yahoo's pages in exchange for a share of the revenue those ads generated. It already had similar arrangements with AOL, Ask.com, and countless other Web sites. And the deal wasn't exclusive or permanent. 9. YouTube Contest Challenges Users To Make A 'Good' Video Spoiler http://www.theonion.com/content/video/youtube_contest_challenges_users Youtube has challenged users to create a video that "is actually worth watching". Ehtyar. |
||
Using a Desktop Search through the networkIn our community-run library, we have about 20 computers connected through a LAN. Between them, we have upwards of 150,000 files stored on four computers. These files are of format .doc, .html, .pdf, .txt, .xls and .msg. We've been trying to come up with a search solution that will allow users (who are decently computer savvy) to search all the files, and them access them over the network.
Is it possible to:
|
||
Awesome article re: organization and notetakinghttp://chandlerproje...icationPaperOutline2 This must be some classic. I wonder how I have missed it. If you use a notetaker, have read the long notetaking thread, etc you owe it to yourself to read this one. |
||
Snake Wrangling for Kids: Learning to Program with PythonIf you ever wanted to get your kids started with programming and wasn't sure where to find something written for their level, that they would understand, give this one a try. Snake Wrangling for Kids is a free ebook (CC licensed) specifically written for teaching kids ages 8 and older how to program, using Python. This one is meant to be printed out and stapled together and given to a child as a gift. (and not necessarily your own child, either) It comes in 3 different flavors (Mac, Linux, Windows) and 2 different versions (for Python 3 & Python 2). http://www.briggs.ne...e-wrangling-for-kids |
||
Tech Presentations (site)Recently, I came across the site "Tech Presentations" when researching specific presentations. So far, I take "Tech" in this context to mean mostly related to the Internet. Perhaps other folks will find this to be of some use at some point. Authors of this blog are digging up technical presentations from different conferences and events. Quite often such presentations share information that can’t be found in books or articles and can give you insights at technology advances, company culture and even people personalities. One nice thing the site provides is different views of the collected presentations, including by:
http://www.techpresentations.org/ |
||
Tech News Weekly: Edition 03-09Hi all. Keep an eye out for No. 1 everyone, looks like it could get out of hand pretty quickly. Enjoy this week's news As usual, you can find last week's news here. 1. Three Million Hit by Windows Worm Spoiler http://news.bbc.co.uk/2/hi/technology/7832652.stm http://www.darkreading.com/security/attacks/showArticle.jhtml?articleID=212900793 A virus is rapidly infecting Windows machines that have not yet applied the patch for MS08-067. Researchers at security firm F-Secure peg the infection rate closer to 8 million, and have expressed concerns the virus could be the beginning of a new massive botnet. A worm that spreads through low security networks, memory sticks, and PCs without the latest security updates is posing a growing threat to users. 2. Windows 7 Now 'available to all' Spoiler http://news.bbc.co.uk/2/hi/technology/7825111.stm After last week's debacle in which Microsoft failed to anticipate the level of enthusiasm surrounding the BETA of Windows 7, availability of the pre-release operating system has been restored, and without the planned limit on downloads. The latest Windows release will be available to everyone after a surge in demand crashed the Microsoft website on 9 January, the original release date. 3. UK Ministry of Defence Stung by Rapidly Spreading Virus Spoiler http://www.networkworld.com/news/2009/011609-uk-ministry-of-defence-stung.html http://www.theregister.co.uk/2009/01/15/royal_navy_email_virus_outage/ The UK's Ministry of Defence has been overwhelmed by a virus rapidly spreading across its computer infrastructure. Although they have released no details ragarding the nature of this virus, one can suspect this story is related to item No 1. The U.K. Ministry of Defence is in the midst of an electronic fight with a computer virus that rapidly spread through its computer networks starting Jan. 6. 4. Storm Worm Smackdown As Researchers Unpick Control System Spoiler http://www.theregister.co.uk/2009/01/13/storm_worm_unpicked/ As a new potential botnet rises, another may finally fall. A team of security researchers have developed a technique for automatically purging the remnants of the Storm worm infection from the internet. But the approach - which involves turning the botnet's command and control system against itself - could run foul of computer hacking laws in Germany and elsewhere, which ban the modification of computer systems without consent. 5. RIM Squashes BlackBerry PDF Peril Spoiler http://www.theregister.co.uk/2009/01/14/blackberry_pdf_patch/ A flaw in the way Blackberry PC software handles malformed PDFs that could potentially lead to remote code execution has been patched by Blackberry maker Research In Motion. Research in Motion (RIM) has published a patch that fixes a pair of critical flaws in the way BlackBerry servers handle malformed PDF files. 6. Why Microsoft Left Windows 7 Unpatched On Patch Tuesday Spoiler http://arstechnica.com/journals/microsoft.ars/2009/01/14/why-microsoft-left-windows-7-unpatched-on-patch-tuesday Microsoft ignored the BETA of Windows 7 when it released its patch for MS09-001 this week because the remote code execution vulnerability was rated "moderate", a level that Microsoft deem unnecessary to patch in BETA versions of Windows. Microsoft started 2009 by fixing just one security flaw in its software; this month's Patch Tuesday only had a single security bulletin, MS09-001. 7. FreeYourPhone.org Launches, Pushes for New DMCA Exemption Spoiler Good news for those with jailbroken phones. FreeYourPhone.org has launched a petition to have the DMCA amended to allow owners of jailbroken phones to maintain their legal rights as phone owners. The Electronic Frontier Foundation has begun a new campaign to get the public to complain to lawmakers about the limitations of locked mobile phones. The new site, FreeYourPhone.org, encourages citizens to sign a petition going to the US Copyright Office in support of the EFF's recent push for an exemption to the Digital Millennium Copyright Act (DMCA), which it hopes will offer legal protection to phone users who have jailbroken or unlocked their devices. 8. Meet Tim Cook: The Man in Charge of Apple Spoiler http://blog.wired.com/gadgets/2009/01/meet-tim-cook-h.html Earlier this week, Apple announced Steve Jobs will stepping down as Apple CEO until June on medical grounds. Tim Cook, Jobs' right-hand-man, will stand in for him until such time as Jobs is able to return. For millions of Apple fans, Steve Jobs is irreplaceable. But if there's one man Jobs himself trusts to stand in his shoes, it is his second in command, Apple Chief Operating Officer Tim Cook. 9. Obama to Defend Telco Spy Immunity Spoiler http://blog.wired.com/27bstroke6/2009/01/obama-to-fight.html It seems the Obama Administration will go along with the immunisation of Telcos that assisted the Bush Administration in its domestic spy program. The incoming Obama administration will vigorously defend congressional legislation immunizing U.S. telecommunication companies from lawsuits about their participation in the Bush administration's domestic spy program. 10. Judge Calls RIAA Objections "specious," Will Stream Hearing Spoiler http://arstechnica.com/news.ars/post/20090115-judge-calls-riaa-objections-spurious-will-stream-hearing.html Once again the RIAA planted it's proverbial foot squarely in its mouth when it objected to the live streaming of one of its infamous piracy lawsuits. A federal judge has agreed to a novel request: streaming parts of an upcoming file-sharing trial over the Internet. Judge Nancy Gertner has granted the request of Harvard Law professor Charles Nesson and students to put the gavel-to-gavel footage on the Internet for any non-commercial use, over the RIAA's objections. But only on a one-time basis. 11. Barbara Bush Runs Aground Off Coast Of Maine Spoiler http://www.theonion.com/content/video/barbara_bush_runs_aground_off In an apparent send-off for her son as he leaves office, President Bush's mother, Barbara Bush, has run aground off the US cost. Ehtyar. |
||