Have a suggestion?

Click here to suggest a blog item.

Newsletters Archive

Catch up with DonationCoder by browsing our past newsletters, which collect the most interesting discussions on our site: here.

Editorial Integrity

DonationCoder does not accept paid promotions. We have a strict policy of not accepting gifts of any kind in exchange for placing content in our blogs or newsletters, or on our forum. The content and recommendations you see on our site reflect our genuine personal interests and nothing more.


Latest News

July 2, 2024
Server Migrations Coming

  • Donationcoder server migration is slowly proceeding, expect some hiccups as we get all our ducks in a row..

July 19, 2022
Software Update

Jan 3, 2022
Event Results

May 13, 2020
Software Updates

Mar 24, 2020
Mini Newsletter

Dec 30, 2019
Software Updates

Jan 22, 2020
Software Updates

Jan 12, 2020
Newsletter

Jan 3, 2020
Event Results

Jan 2, 2020
Software Updates

Dec 30, 2019
Software Updates

April 27, 2019
Software Updates

Feb 26, 2019
Software Updates

Feb 23, 2019
Software Updates

Feb 14, 2019
Software Updates

Jan 6, 2019
Event Results

Dec 2, 2018
Software Updates

Nov 13, 2018
Software Releases

July 30, 2018
Software Updates

June 24, 2018
Software Updates

June 6, 2018
Software Updates

Apr 2, 2018
Fundraiser Celebration

Apr 2, 2018
Software Updates

Feb 24, 2018
Software Updates

Jan 14, 2018
Major Site News

Jan 10, 2018
Event Results

Latest Forum Posts

Screenshot Captor: The most full-featured screenshot app I've seen
Screenshot Captor is an advanced, full-featured screenshot application boasting an impressive feature set that rivals the shareware favorite, SnagIt. In all, Screenshot Captor may be the most full-featured screenshot app I've seen, freeware or otherwise. On the other hand, it does have a slightly steeper learning curve, so if there's a downside, that may be it.
A. Pash at Lifehacker Blog image

Our daily Blog

This page spotlights the most interesting posts collected from our forum every day.

prev1 ... 24 25 26 27 28 [29] 30 31 32 33 34 ... 611next

Organizing videos for OCDers - The Most Organized Home in America

I wouldn't say I have OCD but I do have a real appreciation for maximizing organization in small spaces.  For some reason I find these videos compelling -- I'm sure there are lots of others on youtube.




Security vulnerability found in movie subtitle files

Screenshot - 5_24_2017 , 12_42_02 PM_thumb001.png
Yikes, this is unpleasant for those who download subtitles online.

Check Point researchers revealed a new attack vector which threatens millions of users worldwide – attack by subtitles. By crafting malicious subtitle files, which are then downloaded by a victim’s media player, attackers can take complete control over any type of device via vulnerabilities found in many popular streaming platforms, including VLC, Kodi (XBMC),

http://blog.checkpoi...cked-in-translation/



MGEN - Next generation music AI - open source (C++) project looking for collaborators

blog clipart
Programmer Alexey Arkhipenko posted on the forum today looking for collaborators for his new open source automated music composition program..

Alexey writes:

I started a new desktop C++ project, which is aimed at evolution of automated/aided music composition and virtual instruments performance, which (I believe) is a path to the new age in the music world.

Main ideas:
- Create different music composition / analysis / advise algorithms - currently three algorithms are working
- Automatically adapt midi files or generated notes for live playback with best virtual instruments - currently adaptation for piano, Samplemodeling Brass and Embertone Friedlander Violin is working
- Develop the framework (visualization, playback to DAW...) - currently main functions are working

Video introduction (not all features are shown):


Project url: https://github.com/rualark/MGen

Click here to read more and discuss..


Massive vulnerability in Windows Defender leaves most Windows PCs vulnerable

GettyImages-154748438-800x541.jpg
Massive vulnerability in Windows Defender leaves most Windows PCs vulnerable

Microsoft on Monday patched a severe code-execution vulnerability in the malware protection engine that is used in almost every recent version of Windows (7, 8, 8.1, 10, and Server 2016), just three days after it came to its attention. Notably, Windows Defender is installed by default on all consumer-oriented Windows PCs.
...
The exploit (officially dubbed CVE-2017-0290) allows a remote attacker to take over a system without any interaction from the system owner: it's simply enough for the attacker to send an e-mail or instant message that is scanned by Windows Defender. Likewise, anything else that is automatically scanned by Microsoft's malware protection engine—websites, file shares—could be used as an attack vector. Tavis Ormandy, one of the Google Project Zero researchers who discovered the flaw, warned that exploits were "wormable," meaning they could lead to a self-replicating chain of attacks that moved from vulnerable machine to vulnerable machine.

https://arstechnica....emote-vulnerability/




Beware Google Docs Phishing Scam Today and How to Fix

blog clipart
A particularly convincing looking and wide spread phishing scam went out to lots of people today, appearing to come from a google docs sharing email.

More info here:


A widely reported e-mail purporting to be a request to share a Google Docs document is actually a well-disguised phishing attack. It directs the user to a lookalike site and grants the site access to the target's Google credentials. If the victim clicks on the prompt to give the site permission to use Google credentials, the phish then harvests all the contacts in the victim's Gmail address book and adds them to its list of targets. The phish appears to have been initially targeted at a number of reporters, but it quickly spread widely across the Internet. Some of the sites associated with the attack appear to have been shut down.

How to deal with it if you got tricked into clicking it:

It’s not that this is some “website that looks like google” and is “duplicating the google sign-in page”. It’s an actual Google Doc app, that you have to give permission to access your account details. That’s what makes it so dangerous, that it’s acting as a normal app would, requiring normal google authentication and authorization. It doesn’t gain access to your credentials, but the permissions it requests gives it access to a hell of a lot of stuff in your account. You have to revoke the app permissions at https://myaccount.google.com/permissions if you gave it access. People are saying on twitter “change your password”, but that won’t revoke access, you have to actively revoke access to disconnect the malicious app from your account. Click on each app in the list, any that are listed for today (or whenever you clicked through the email), revoke it to be safe. For me, it was called something like “Google Docs”, but may not be the same for everyone.


Breakdown of Juicero expensive juice-pack squeezing machine travesty

Screenshot - 4_25_2017 , 4_05_41 PM_thumb002.png
Last week Bloomberg published an article exposing how easy it is to “hack” Juicero’s produce packs by squeezing them with your hands, deeming the $699 (now $399) WiFi-connected juice press completely unnecessary. Nearly overnight, Juicero has become the posterchild for Silicon Valley excess....

I hope this post serves as a lesson to other hardware startups that spending tens of millions of dollars on product development prior to shipping a single unit is a goal that’s not worth striving for.

Juicero’s Press is an incredibly complicated piece of engineering. Of the hundreds of consumer products I’ve taken apart over the years, this is easily among the top 5% on the complexity scale.

https://blog.bolt.io...pensive-6add74594e50


prev1 ... 24 25 26 27 28 [29] 30 31 32 33 34 ... 611next

Share on Facebook