Forgot your password?
typodupeerror

+ - When users want malware

Submitted by johnjaydk
johnjaydk (584895) writes "How do You handle users who insists on installing malware? I'm running a nice tight ship where users can't install stuff and now I face a rebellion because I don't allow them to install malware. I can't even explain the concept of malware to them."
Security

+ - When vuln disclosures are outlawed->

Submitted by doperative
doperative (1958782) writes "'Legal goons from Magix AG sent a nasty gram to a researcher who goes by "Acidgen" after he reported the stack buffer overflow in the company's Music Maker 16. According to the report, Acidgen alerted Magix representatives to the bug in several emails that also included proof-of-concept code that forced the Windows calculator to open, indicating the flaw could be exploited to execute malicious code on a victim's computer.

"They misunderstood that I was getting money for doing this ... and illegally breaking into networks" link

Comment: of course the vulnerability isn't in the application but in the underlying Operating System ..."

Link to Original Source

+ - Nottingham Uni student arrested under terriosm act-> 1

Submitted by Anonymous Coward
An anonymous reader writes "On May 15 2008, two university members — a student and a member of staff — were arrested under the Terrorism Act (2000) because they possessed copies of the"Al-Qaeda Training Manual" which had been downloaded from the United States Department of Justice website. An extended version of the same document is available for sale in book form on Amazon.com. The student, a member of the university's Politics and International Relations department, was researching terrorism for his postgraduate studies and was being advised by a friend of his, who was a former student and administrative member of staff. Both men were held in police custody for six days before being released without charge.
The Terrorism Act (2000) stipulates that: "A person commits an offence if he possesses an article in circumstances which give rise to a reasonable suspicion that his possession is for a purpose connected with the commission, preparation or instigation of an act of terrorism."

The postgraduate tutor of the student at that time has submitted a paper to the British International Studies Association documenting how the university helped get these men arrested and what the university has done to cover up the story since"

Link to Original Source
Space

+ - FBI Releases Document Confirming Roswell UFO-> 8

Submitted by schwit1
schwit1 (797399) writes "An investigator for the Air Force stated that three so-called flying saucers had been recovered in New Mexico. They were described as circular in shape with raised centers approximately 50 feet in diameter. Each one was occupied by three bodies of human shape, but only 3 feet tall dressed in metallic clothing of very fine texture."
Link to Original Source
The Internet

Comcast Accused of Congestion By Choice 434

Posted by CmdrTaco
from the i'm-completely-shocked dept.
An anonymous reader writes "A kind soul known as Backdoor Santa has posted graphs purportedly showing traffic through TATA, one of Comcast's transit providers. The graphs of throughput for a day and month, respectively, show that Comcast chooses to run congested links rather than buy more capacity. Keeping their links full may ensure that content providers must pay to colocate within Comcast's network. The graphs also show a traffic ratio far from 1:1, which has implications for the validity of its arguments with Level (3) last month."
Privacy

Sheriff's Online Database Leaks Info On Informants 185

Posted by Soulskill
from the second-verse-same-as-the-first dept.
Tootech writes with this snippet from NPR: "A Colorado sheriff's online database mistakenly revealed the identities of confidential drug informants and listed phone numbers, addresses and Social Security numbers of suspects, victims and others interviewed during criminal investigations, authorities said. The breach potentially affects some 200,000 people, and Mesa County sheriff's deputies have been sifting through the database to determine who, if anyone, is in jeopardy. ... The FBI and Google Inc. are trying to determine who accessed the database, the sheriff said. Their concern: That someone may have copied it and could post it, WikiLeaks-style, on the Internet. 'The truth is, once it's been out there and on the Internet and copied, you're never going to regain total control,' Hilkey said. Thousands of pages of confidential information were vulnerable from April until Nov. 24, when someone notified authorities after finding their name on the Internet. Officials said the database was accessed from within the United States, as well as outside the country, before it was removed from the server."
Hardware

+ - Stephen Fry and DVD Jon back USB Sniffer Project->

Submitted by Anonymous Coward
An anonymous reader writes "bushing and pytey of the iPhone DevTeam and Team Twiizers have created a Kickstarter project to fund the build of an open-source/open-hardware high-speed USB protocol analyzer. The board features a high-speed USB 2.0 sniffer that will help with the reverse engineering of proprietary USB hardware, the project has gained the backing from two high-profile individuals Jon Lech Johansen (DVD Jon) and Actor and Comedian Stephen Fry"
Link to Original Source

Comment: Missing the point (Score 1) 4

by Tensor (#32602768) Attached to: Microsoft's Kinect for Xbox 360 is Doomed to Fail
Did he ever even see a Wii ? fine precise control ? nope ... sedentary ? nope ... sold millions ? yup

So WTF is he talking about ?

He's missing the whole point. This is not for assiduous gamers, that is what the normal xbox games are for. This is for the casual gamers, for people who can't be bothered to learn how to use the controllers. For playing with you dad or grandad. This has, or should have, an almost flat learning curve.

Comment: Re:7 hours easy, 8 should even be possible (Score 1) 454

by Tensor (#32523320) Attached to: My laptop's battery's good for roughly ...
You seem to have an understanding of Li-Po batts.

So my question is this, My RC Li-Po charger is huge, it monitors and balances cell charge, charging speed, batt temp, charging time, etc.

Is there that kind of monitoring going on inside the notebook? its not possible "traditionally" but would notebook batts benefit from a balancing from a real charger every once in a while ?

---

Having seen a large batt short circuit on a heli crash, and an explosion when charging it i'd love to watch as someone short-circuits one of these with a paper clip :D

I bet the human brain is a kludge. -- Marvin Minsky

Working...