Forgot your password?
typodupeerror

Comment: mod points (Score 0) 238

by Bill Evans (#46190203) Attached to: CERN Wants a New Particle Collider Three Times Larger Than the LHC

I got 15 points just a couple of days ago, and I've almost finished using them.

It's a good thing that I didn't need to log on to Beta, because Beta won't even let me log on. I click the "Sign on" button and that whole black left side of the window closes up again.

What do you call that thingie that's square shaped and consists of four horizontal lines, anyway?

Education

+ - Richard Buckland's UNSW Computing 1 - PuzzleQuest and the Art of Programming

Submitted by dncsky1530
dncsky1530 (711564) writes "UNSW professor Richard Buckland, lecturer of the famous Computing 1 course on YouTube, is now running a large scale open online Computer Science course for the world. UNSW Computing 1 — PuzzleQuest and the Art of Programming starts off with microprocessors and works it way through C with interactive activities while taking students on an adventure of hacking, cracking and problem solving. It's based around a three month long PuzzleQuest with grand and suspiciously unspecified prizes as well as fame and glory for the intrepid. Join a global community of learners and help people you've never met in this one of a kind online course on openlearning.com."
Android

+ - Accuweather app update hijacks phone lock screens->

Submitted by willyg
willyg (159173) writes "Accuweather pushed out an update to their paid Android phone app earlier today. One of the new "features" of the update was to replace the lock screen on your phone with their own lockscreen. To the casual glance, there is little indication on the lockscreen as to which app is responsible for the new lockscreen.

The Google play store has been reporting nothing but one star reviews today as users discover who is responsible for the new lock screen, installed with no apparent warning to them.

Accuweather has been responding, and promises to fix the issue as soon as possible.

Anyone feel like trusting their "fix"???"

Link to Original Source
Intel

+ - Some Windows 8 hardware already not compatible with Windows 7->

Submitted by Billly Gates
Billly Gates (198444) writes "This will make many Windows 7 users upset who expect to buy a new Windows 8 tablet or netbook to put Windows 7 on it. The problem is Intel's new clover Trail chipsets. Computers affected include our the Asus EEE line and some Fujitsu tablets so far.

In addition some Cedar Trail chipsets have the opposite problems of not being Windows 8 compatible. Intel executives mentioned users need to pick one or the other Intel Atom chipsets and stick with that OS. Many are blaming intel for the lack of drivers. Or could this be related to TPM 2.0 which is secretly on some new Windows 8 machines that refuse to run unsigned operating systems?"

Link to Original Source
Security

+ - Algorithm Sniffs Out Source of Malware Attacks->

Submitted by
itwbennett
itwbennett writes "Swiss scientists have developed an algorithm that can find the specific computer that sent a spam email as well as the first computer where a virus was injected by analyzing just 10-20% of the nodes in a network. The workings of the algorithm were detailed in a paper (PDF) entitled 'Locating the source of diffusion in large-scale networks' that was published in the Physical Review Letters journal on Friday."
Link to Original Source
Open Source

+ - The open source technology behind Twitter->

Submitted by caseyb89
caseyb89 (2670903) writes "If it weren't for open source technology, you wouldn't be able to tweet. Chris Aniszczyk, Open Source Manager at Twitter, shares how open source is vital to Twitter's success. He states that using open source is a "no-brainer" for Twitter because it "allows us to customize and tweak code to meet our fast-paced engineering needs as our service and community grows." Twitter also established an open source office about a year ago to support a variety of open source organizations that are important to them. Aniszczyk will discuss Twitters open source usage in his keynote at LinuxCon."
Link to Original Source
Government

+ - Monitoring weapons bans with social media->

Submitted by
Harperdog
Harperdog writes "Kirk Bansak has a great article outlining a coming revolution in non-proliferation of nuclear, chemical, and bio-weapons, courtesy of smart phones and social media. Early theory on arms control foresaw "inspection by the people" as a promising method for preventing evasion of arms control and disarmament obligations and serves as a starting point for understanding "social verification." As Rose Gottemoeller recently stated: "[Cell phone-based] sensors would allow citizens to contribute to detecting potential treaty violations, and could build a bridge to a stronger private-public partnership in the realm of treaty verification." Exciting stuff for techies and activists."
Link to Original Source

+ - Anonymizer owned by Abraxas parent company Cubics->

Submitted by killfixx
killfixx (148785) writes "Anonymizer, the company that brings you free anonymous email facilities, called nyms, as well as similar secure services used by activists all over the world, is actually owned by Cubic Corporations, the parent company that owns Abraxis, which in turn owns Trapwire. So, it’s possible, if not probable that all those activists around the world who believe their emails are safe may well be sending messages that go straight into Trapwire, the surveillance system that monitors activists."
Link to Original Source
Security

+ - 9 Popular IT Security Practices That Don't Work As Advertised->

Submitted by
snydeq
snydeq writes "When it comes to IT security, FUD is more than just the tool of overhyping vendors hoping to sell their next big thing. It is the reality that seasoned IT security pros live in, thanks in large part to the shortcomings of traditional approaches to securing IT systems and data. The truth is most common IT security products and techniques don't work as advertised, leaving us far more exposed to malicious code than we know. That's because traditional IT security takes a whack-a-mole approach to threats, leaving us to catch up with the next wave of innovative malware. From the truth about antivirus scanners to the failings of PKI, here are nine popular IT security practices that don't work and 10 nontraditional IT security tricks that do."
Link to Original Source

A Fortran compiler is the hobgoblin of little minis.

Working...