Have a suggestion?

Click here to suggest a blog item.

Newsletters Archive

Catch up with DonationCoder by browsing our past newsletters, which collect the most interesting discussions on our site: here.

Editorial Integrity

DonationCoder does not accept paid promotions. We have a strict policy of not accepting gifts of any kind in exchange for placing content in our blogs or newsletters, or on our forum. The content and recommendations you see on our site reflect our genuine personal interests and nothing more.


Latest News

July 2, 2024
Server Migrations Coming

  • Donationcoder server migration is slowly proceeding, expect some hiccups as we get all our ducks in a row..

July 19, 2022
Software Update

Jan 3, 2022
Event Results

May 13, 2020
Software Updates

Mar 24, 2020
Mini Newsletter

Dec 30, 2019
Software Updates

Jan 22, 2020
Software Updates

Jan 12, 2020
Newsletter

Jan 3, 2020
Event Results

Jan 2, 2020
Software Updates

Dec 30, 2019
Software Updates

April 27, 2019
Software Updates

Feb 26, 2019
Software Updates

Feb 23, 2019
Software Updates

Feb 14, 2019
Software Updates

Jan 6, 2019
Event Results

Dec 2, 2018
Software Updates

Nov 13, 2018
Software Releases

July 30, 2018
Software Updates

June 24, 2018
Software Updates

June 6, 2018
Software Updates

Apr 2, 2018
Fundraiser Celebration

Apr 2, 2018
Software Updates

Feb 24, 2018
Software Updates

Jan 14, 2018
Major Site News

Jan 10, 2018
Event Results

Latest Forum Posts

Prevent the accidental closing of windows with NoClose
I am sure most of us have accidently closed a Windows that we wanted to keep open so NoClose is a good program to prevent just that.
EliteFreeware blog image

Our daily Blog

This page spotlights the most interesting posts collected from our forum every day.

prev1 ... 262 263 264 265 266 [267] 268 269 270 271 272 ... 611next

Battle of the Free Online Storages

blog clipart
I was searching the forum for the latest info and reviews of free online storage services. I found a couple of recent topics on the subject (SpiderOak offers 10Gb free online data backup account with promo code, Six Free Online Storage Services). I wonder if anyone has further information about these services. How's the user experience, limits you may find when using it, support, etc.

While googling this subject, I also found a very interesting post at This Could Be Living: Battle of the Free Online Storages, which includes a comparative chart and mini reviews of 13 such services.

Click here to read what forum members recommend..


Reliable web page capture?

Firefox-500x455.png
In my endless quest/obsession to find the perfect information manager, I've decided that one of the key features for me is reliable web page capture. Not pixel perfect. But close enough. There are lots of other features I'm willing to compromise on, but not that one.

Now you wouldn't think that would be a problem. But it is. Most of the information managers we know and love just are not as reliable as they should be. I have licences for three of the best -- Ultra Recall, Surfulater and Evernote. All claim that web page capture is part of their feature set.

And yet compared to the free Firefox add-on Scrapbook, their performance is variable, to say the least. Pictures speak louder than words, so here's a comparison of the three programs I mention above with Scrapbook, and web capture specialists Local Website Archive and WebResearch Pro.

I took a page from a mainstream site (BBC News) that I knew would present a decent challenge..

Click here to continue reading..


91 Ways to Become a Great Developer

91ways.png
I found this list full of tips, advice, and links today, while on one of my "click adventures".

It's broken down into the following sections:

1. Learn the Skills You Need
2. Write Self-Descriptive Code, Useful Comments or None at All
3. Program Efficiently
4. Be a Good Businessman
5. Get the Job You Deserve


http://effectize.com...e-coolest-programmer


Swoopo - A New Take on Online Auctions, or a Scam?

Swoopo Bids.png
For what is probably the first time in my life, I just saw an ad banner that interested me enough to find out more information about the product being advertised. The "product" is called Swoopo, and it is an online auction site unlike any other I've seen before.

From staring at it for the past 10 minutes trying to understand how it works, this is my observation:

Auctions have a continuous countdown timer to when the auction will end. However, this is actually the part that is vastly different from traditional auction websites. The timers are relatively short, and are based on the current bid for the item. So for instance, I'm looking at a Nintendo Wii that is currently going for $0.60. That's right. 60 cents. And the countdown timer appears to be 30 minutes until the end of the auction.

But here's the thing: Each time someone bids, it resets the timer. And actually, someone just bid on the Wii, and now it is going for $0.75 and the timer is now 15 minutes until the end of the auction. And it continues like this. As the bid increases, the time on the countdown timer decreases, until some of the auctions are down to 10 or 15 seconds for each bid.

And to prevent an auction lasting forever, there is a final ending time for the auction. This Wii auction is scheduled to end, at the latest, on December 2nd, if people keep bidding until then.

So it actually sounded fun and unique enough that I decided to sign up and try it out. And that's when I learned about the one "feature" that, to me, makes it sound too much like a scam than a real auction site.

You see, in order to place any bid on any item, you need to pay $1 for each bid. (Basically, you buy bids in advance.) That, to me, brings up too many questions about whether these other bidders are even real people, or just auto-bots made by Swoopo to artificially inflate the bid price and make you pay another $1 to bid again.

I can tell by some strange English sentences on the site that it's based in a foreign country. (Looks like Germany, after some research.) Not that that's necessarily a bad thing. It's just a side-effect of being inundated with spam that I'm always a little wary of professional looking sites with strange English translations.

Looks too much like a scam when their main source of revenue is to have people buy lots of bids instead of buying lots of products. Too much of a conflict of interests for it to seem ethical to me. I suggest you take a look at it if you want to just see what I'm talking about, but don't say I didn't warn you if you try to buy something and end up paying more on your bids than what you actually paid for the item.

In conclusion: Avoid it! :down: :down:


P.S. They also operate under http://www.swoopo.co.uk, http://www.swoopo.de, http://www.swoopo.es, and http://www.swoopo.at


NaNoWriMo: National Novel Writing Month 2008 begins now

ggggggggggggg Screenshot - 11_1_2008 , 6_36_58 AM_thumb.png
This is a great yearly event.. I'd love to hear about DonationCoder members who participate and succeed.

National Novel Writing Month is a fun, seat-of-your-pants approach to novel writing. Participants begin writing November 1. The goal is to write a 175-page (50,000-word) novel by midnight, November 30.

Valuing enthusiasm and perseverance over painstaking craft, NaNoWriMo is a novel-writing program for everyone who has thought fleetingly about writing a novel but has been scared away by the time and effort involved.

Because of the limited writing window, the ONLY thing that matters in NaNoWriMo is output. It's all about quantity, not quality. The kamikaze approach forces you to lower your expectations, take risks, and write on the fly.

http://www.nanowrimo.org/



Tech News Weekly: Edition 44

TNWeekly01.gif
Hi all. No meta-news this week, enjoy.
As usual, you can find last week's news here.

The Weekly Tech News

1. NIST Competition To Replace SHA Complete
Spoiler
http://csrc.nist.gov/groups/ST/hash/sha-3/index.html
Via: http://www.schneier.com/blog/archives/2008/10/the_skein_hash.html
The NIST competition for a replacement for the SHA-2 hash family closes today. Unfortunately it doesn't seem that the list of candidates is available yet. Please post a reply if you happen to come by it. Keep your eyes peeled for info.

NIST has opened a public competition to develop a new cryptographic hash algorithm, which converts a variable length message into a short “message digest” that can be used for digital signatures, message authentication and other applications.  The competition is NIST’s response to recent advances in the cryptanalysis of hash functions. The new hash algorithm will be called “SHA-3” and will augment the hash algorithms currently specified in FIPS 180-2, Secure Hash Standard. Entries for the competition must be received by October 31, 2008.


2. Security Flaw Is Revealed in T-Mobile’s Google Phone
Spoiler
http://www.nytimes.com/2008/10/25/technology/internet/25phone.html
The first flaw has been uncovered in Google's Android platform.

Just days after the T-Mobile G1 smartphone went on the market, a group of security researchers have found what they call a serious flaw in the Android software from Google that runs it.

One of the researchers, Charles A. Miller, notified Google of the flaw this week and said he was publicizing it now because he believed that cellphone users were not generally aware that increasingly sophisticated smartphones faced the same threats that plague Internet-connected personal computers.


3. E-mail Attachment Malware Soars 800 Per Cent in 3 Months
Spoiler
http://www.itbusiness.ca/it/client/en/home/News.asp?id=50510
According to Sophos, E-mail malware has made a substantial comback in the previous quarter of this year.

The volume of malware attacks conducted via e-mail attachments increased about 800 per cent over the past three months as this low-grade hacking method was brought back from the grave, according to a U.K.-based security vendor.

This reverses an earlier trend. Previously, malware trends indicated hackers were moving away from sending infected attachments. Most attacks were carried out by embedding links to viruses or Trojans right into the e-mail.


4. Koobface Returns
Spoiler
http://www.computerworld.com.au/index.php/id%3b509001956%3bfp%3b4194304%3bfpid%3b1
http://news.cnet.com/8301-1009_3-10078353-83.html
The infamous Koobface Facebook threat is back, and is using Google's website to bypass Facebook protection (blacklisting is to 1990's).

Hackers initially unleashed Koobface in late July, but Facebook's security team soon slowed its spread by blocking the Web sites that were hosting the malicious Trojan software.

That has prompted the criminals to change tactics, according to Guillaume Lovet, a senior research manager with Fortinet. In this latest attack they have hosted files that appear to be YouTube videos on Picasa and Google Reader and used Facebook to send them to victims.

The links appear safe because they go to Google.com Web sites, but once the victim arrives on the Google Reader or Picasa page, he is invited to click on a video or a Web link. The victim is then told he needs to download special codec decompression software to view the video. That software is actually a malicious Trojan Horse program, which is blocked by most antivirus programs, according to Facebook.


5. 'Security-on-a-Stick' to Protect Consumers and Banks
Spoiler
http://www.physorg.com/news144519988.html
IBM have developed a USB-sized device that can be used to thwart attempted online banking fraud.

The "security-on-a-stick" solution — a handy USB-sized device with a display, a smart card reader and buttons — protects a user's e-banking transactions from even the most malicious attacks. With the new device, developed by an expert team at IBM's Zurich Research Lab, a user sees exactly what transaction data the banking server receives. Moreover, he or she can approve or cancel each transaction directly with the banking server using the buttons on the device.


6. New Address Spoofing Flaw Smudges Google's Chrome
Spoiler
http://www.theregister.co.uk/2008/10/26/google_chrome_address_spoofing/
Chrome is subject to yet another major vulnerability allowing websites to impersonate other websites.

Google's Chrome browser has been marred by yet another vulnerability, this one allowing attackers to impersonate websites of groups like the Better Business Bureau, PayPal or, well, Google.

Researcher Liu Die Yu of the TopsecTianRongXin research lab in Beijing says the spoofing vulnerability is the result of faulty code inserted by programmers from the Mountain View, California search behemoth.


7. Opera Scrambles to Quash Zero-day Bug in Freshly-patched Browser
Spoiler
http://www.theregister.co.uk/2008/10/27/zero_day_opera_bug/
In similar news, Opera's most recent browser patch has led to an easily-exploited RCE vulnerability.

Just a few days after Opera Software patched critical vulnerabilities in its browser, researchers have identified another serious bug that allows attackers to remotely execute malicious code on the machines of people running the most recent version of the software. Opera has vowed to fix the flaw soon.

Among the bugs squashed in Opera 9.61 was a stored cross site scripting (XSS) vulnerability that allowed attackers to view victims' browsing history. That attack is no longer possible, but now researchers have discovered an even more serious exploit that's based on the same weakness.


8. ATO Loses CD With Private Details
Spoiler
http://news.cnet.com/8301-1009_3-10078353-83.html
The Australian Taxation Office has misplaced a disk containing the unencrypted tax details of 3122 trustees, and has failed to notify them of the breach until 3 weeks later. Interestingly enough, Australia still has no laws governing the handling or reporting of corporate data breaches. Yay for incompetent government!

The ATO admitted that the CD was not encrypted and victims were only notified three weeks later.

The disk contained the name, address and super fund tax file numbers for 3122 trustees and was being couriered to the ATO, but failed to reach the department.

The Tax Office was notified about the missing CD on October 3 but only sent out letters to the victims on October 24, offering to re-issue the tax file numbers for their super funds.


9. Court Rules Hash Analysis is a Fourth Amendment "search"
Spoiler
http://arstechnica.com/news.ars/post/20081029-court-rules-hash-analysis-is-a-fourth-amendment-search.html
The long-contested idea that using hashes to determine the content of computer files is classified under the Fourth Constitutional Amendment as a "search" has been upheld in court for the first time, though appeal is likely.

A good coder has as many uses for hash functions as George Washington Carver did for peanuts—but law enforcement is fond of these digital fingerprinting techniques as well, because they allow reams of data to be rapidly sifted and identified. Legal scholars, however, have spent a decade puzzling over whether the use of hash value analysis in a criminal investigation counts as a Fourth Amendment "search." A federal court in Pennsylvania last week became the first to rule that it does—but one legal expert says an appeal is very likely.


10. Windows 7's Streamlined UAC
Spoiler
http://arstechnica.com/journals/microsoft.ars/2008/10/30/arspdc-windows-7s-streamlined-uac
Although they're keeping that fugly UI, it seems Microsoft will be overhauling UAC in Windows 7.

One feature of Vista that came under more criticism than most was User Access Control. The feature, designed to make Windows more secure by both limiting the rights of Administrators and making it easier for regular Users to gain Administrator rights only when necessary, was deemed to be annoying and intrusive. As a result, some 10-15% of Vista users turn it off.

Vista SP1 smoothed a few of the more annoying UAC wrinkles, but retained the same fundamental mechanics. The two main problems with UAC:the screen going black momentarily whenever a confirmation prompt was displayed, and the need to reaffirm explicit user actions.

With Windows 7, Microsoft has tried to tone down UAC to make it less invasive while still affording the same protection.


11. Ubuntu 8.10 Intrepid Ibex Released
Spoiler
http://www.downloadsquad.com/2008/10/30/ubuntu-8-10-intrepid-ibex-released/
Bang-on-target Intrepid Ibex has gone final today, with many impressive new features.

Ubuntu 8.10 is available for download today. And because Ubuntu Linux is open source software and we've been following its development for the last 6 months, there aren't a ton of surprises. But that doesn't mean you shouldn't download it if you're running Ubuntu 8.04 or if you're looking for a new Linux distro to try. Because it does include a number of tweaks, bug fixes, and improvements. Here are just a few:

    * Improved support for connecting to 3G wireless networks
    * A utility for loading a fully working Ubuntu installation on a USB disk
    * There's a new System Cleaner utility that will help identify abandoned software packages (which could address one of my biggest pet peeves about most Linux distributions)
    * The Nautilus file manager now supports tabs


12. Tivo Set to Stream Netflix Movies by Christmas
Spoiler
http://blog.wired.com/business/2008/10/tivo-set-to-str.html
It appears TiVo and Netflix have finally pulled their fingers out and are testing their system for streaming Netflix movies directly to TiVo subscribers.

Four years in the making, the Tivo/Netflix streaming partnership is finally ready for prime time. Tivo began testing software Thursday and expects to have the entire Netflix streaming collection available to subscribers of both services by early December.

The companies originally announced plans to serve Netflix movies-on-demand to Tivo boxes in 2004 but shelved plans due to a lack of available content.


Ehtyar.


prev1 ... 262 263 264 265 266 [267] 268 269 270 271 272 ... 611next

Share on Facebook