Trailrunner7 writes "A new paper from researchers at Verizon Business identifies a method through which an attacker can bypass Internet Explorer Protected Mode and gain elevated privileges once he's successfully exploited a bug on the system. Protected Mode in Internet Explorer is one of a handful of key security mechanisms that Microsoft has added to Windows in the last few years. It is often described as a sandbox, in that it is designed to prevent exploitation of a vulnerability in the browser from leading to more persistent compromise of the underlying system. In their research, the Verizon Business team found a method that, when combined with an existing memory-corruption vulnerability in the browser, enables an attacker to bypass Protected Mode and elevate his privileges on the compromised machine (PDF). The technique enables the attacker to move from a relatively un-privileged level to one with higher privileges, giving him complete access to the logged-in user's account."
digitaldc writes with this excerpt from Gamasutra: "The Air Force Research Laboratory (AFRL) has connected 1,760 PlayStation 3 systems together to create what the organization is calling the fastest interactive computer in the entire Defense Department. The Condor Cluster, as the group of systems is known, also includes 168 separate graphical processing units and 84 coordinating servers in a parallel array capable of performing 500 trillion floating point operations per second (500 TFLOPS), according to AFRL Director of High Power Computing Mark Barnell."
GMGruman writes "Carriers are increasingly charging for 3G mobile access by the megabyte, to prevent 'unfair' subsidies of heavy users by everyone else. So why does the price of a 3G megabyte vary based on the device used to send or receive it? Why is an iPad megabyte cheaper than a MiFi one? After all, a megabyte is a megabyte as far as the network is concerned. InfoWorld has a comparison of 3G pricing for the four major US carriers for their various supported devices, so you can see whose 3G pricing is out of whack for which devices."
Csiko writes "Researchers at Boston University's department of cognitive and neural systems are working on an artificial brain implemented with memristors. 'A memristor is a two-terminal device whose resistance changes depending on the amount, direction, and duration of voltage that's applied to it. But here's the really interesting thing about a memristor: Whatever its past state, or resistance, it freezes that state until another voltage is applied to change it. Maintaining that state requires no power.' Also theoretically described, solid state versions of memristors have not been implemented until recently. Now researchers in Boston claim that memristors are the new key technology to implement highly integrated, powerful artificial brains on cheap and widely available hardware within five years."
traveller.ct writes "Researchers from Melbourne and London have identified the mechanism by which the immune system destroys malignant cells. The notion of killer cells puncturing a malignant cell to inject toxic enzymes has been understood for over a century, but now, using the Australian Synchrotron, researchers have identified the protein which is responsible for forming a pore in the malignant cell: perforin. Perforin resembles the cellular weaponry employed by bacteria such as anthrax, but may have been appropriated by our immune system in our evolutionary past to fight against them. The researchers are now investigating ways to boost perforin for more effective cancer protection and therapy for acute diseases such as cerebral malaria."
Timothy found a news report and a little video demonstrating the multi-touch capabilities of Ubuntu. It's attached below if you're curious what the new Unity Netbook UI is looking like these days.
digitaldc writes with this quote from PCWorld: "It kills me to say this: The dream of Linux as a major desktop OS is now pretty much dead. Despite phenomenal security and stability — and amazing strides in usability, performance, and compatibility — Linux simply isn't catching on with desktop users. And if there ever was a chance for desktop Linux to succeed, that ship has long since sunk. ... Ultimately, Linux is doomed on the desktop because of a critical lack of content. And that lack of content owes its existence to two key factors: the fragmentation of the Linux platform, and the fierce ideology of the open-source community at large."
An anonymous reader writes "We would like to think that the lawyers that are prosecuting alleged copyright infringers are practicing what they preach, but it looks like one of the most high profile firms involved in such cases are just as guilty of stealing others' work as those who are downloading illegal media."
Generally, it's used to refer to a non-compiled, interpreted language that has some simple structure and has a set of discreet functions or environment objects that you can use to automate processes. Here's WikiPedia's definition, which isn't too bad.