I couldn't agree more. We use TeamViewer to share desktops to watch the User behavior. When that isn't possible for some reason then we tell them to take a screen shot after each click, and paste every single screenshot into a Word document and send it over.
theodp writes "Combine smartphone auto correction and fat-fingered virtual keyboard typing, writes Rob Walker, and the results can be hilarious and even shocking. The website Damn You, Autocorrect collects the awesomely embarrassing text messages that you never meant to send. Now if you'll excuse me, I have to masturbate some chicken for bisexuals night!"
An anonymous reader writes "Researchers announced they found a fossil virus hiding in the most unexpected place: the chromosomes of several songbird species. This ancient virus resembles human hepatitis B virus. Finding this ancient virus will catalyze new lines of inquiry that may help scientists predict and prevent future human viral pandemics that originate in birds."
I was involved with a company who did this work on a Siberian Husky in 2007. CBS News in Colorado: http://email@example.com Triumph's website: http://triumphthedog.net/
ruphus13 writes "Nmap has a new release out, and it's a major one. It includes a GUI front-end called Zenmap, and, according to the post, 'Network admins will no doubt be excited to learn that Nmap is now ready to identify Snow Leopard systems, Android Linux smartphones, and Chumbies, among other OSes that Nmap can now identify. This release also brings an additional 31 Nmap Scripting Engine scripts, bringing the total collection up to 80 pre-written scripts for Nmap. The scripts include X11 access checks to see if X.org on a system allows remote access, a script to retrieve and print an SSL certificate, and a script designed to see whether a host is serving malware. Nmap also comes with netcat and Ndiff. Source code and binaries are available from the Nmap site, including RPMs for x86 and x86_64 systems, and binaries for Windows and Mac OS X. '"
Trailrunner7 writes with this snippet from ThreatPost: "Apple's first Mac OS X security update for 2010 is out, providing cover for at least 12 serious vulnerabilities. The update, rated critical, plugs security holes that could lead to code execution vulnerabilities if a Mac user is tricked into opening audio files or surfing to a rigged Web site." Hit the link for a list of the highlights among these fixes.