Has anyone looked at the differences between 7.1a and 7.2a? It seems unlikely that the TC authors would intentionally release 7.2a with security-compromising bugs...
Seeing as I get floating point math artifacts for simple arithmetic operations (e.g., balancing a household budget) in Google Doc spreadsheets...
When I upgraded to a more recent version of the Catalyst Control Center, I was advised that I was no longer able to use HDMI audio as I was using an "incompatible" DVI -> HDMI adapter. Given that I wasn't even using a DVI -> HDMI adapter ANYWHERE within the chain and was—in fact—leveraging the HDMI port soldered onto the card itself, well, I'd say this was a pretty massive fuckup. Now I think I get it: AMD probably just tacked the same sort of circuitry one would see in an DVI -> HDMI adapter on the board but neglected that EEPROM and now that the drivers are updated, I was fucked. AMD's stereoscopic HDMI does not work, even with the third-party $25-50 drivers one has to buy because they're too cheap to write their own or license them. AMD response? "We don't provide support for 3rd-party software." Buck passing. I have yet to find any solution that enables the card to produce a stereoscopic HDMI signal, yet my PS3 has no difficulty. I rolled back.
robbyyy writes "The New Statesman has just revealed the extent of the legal eccentricity and paranoia that exists at the WikiLeaks organization. The magazine published a leaked copy of the draconian and extraordinary legal gag which WikiLeaks imposes on its own staff. Clause 5 of the Confidentiality Agreement (PDF) imposes a penalty of £12,000,000 (approximately $20,000,000) on anyone who breaches this legal gag. Sounds like they don't trust their own staff."
Flavius Iulianus (1093015) writes "It's not new, this happened last year. But it's just now getting out into the media and is taking on a life of it's own. A woman in Missouri was involved in setting up a fake MySpace account for the express purpose of gaining the trust of a 13 year old girl. The woman claims she did it to monitor what the girl was saying about her daughter as they used to be friends. After making romantic (and possibily sexual)overtures to the girl, the fake persona sent her a series of scathing messages "breaking off" the online relationship and attacking her personally. The girl had been depressed for sometime and killed herself by hanging herself. After a year of investigation, the local authorities chose not to prosecute and the story broke. Now, in a manifestation of Karma, infuriated bloggers and netizens have been working to find the woman's identity (which was withheld in the original story) and get the word out about her activities."
Link to Original Source
Link to Original Source
Anonymous Coward writes "Beginning this month tweakers.net developer Tino Zijdel by was indicated a visitor on bug in Internet Explorer 7 which it makes possible a cross site scripting-exploit to carry out. The leak situates himself in the mimetype detection of the browser. http://babelfish.altavista.com/babelfish/trurl_pa
g econtent?lp=nl_en&url=http%3A%2F%2Ftweakers.net%2 F nieuws%2F47643%2FXSS-exploit-door-Microsoft-betit e ld-als-by-design.html
(dutch url: http://tweakers.net/nieuws/47643/XSS-exploit-door - Microsoft-betiteld-als-by-design.html )"
Chris Price writes "Recently we've heard quite a bit about munis installing free/subsidized Wi-Fi for its residents and businesses. Google/Earthlink is doing one in SFO. While a lot of hype is generated in the market the reality is something else. Business Week recently ran a story about state of public wi-fi in Anaheim. I found a really good article that explains a little more in depth the current on state on Wi-FiGurus.com. Here is the link Is public Wi-Fi good enough?. Enjoy."
bravo_2_0 (892901) writes "The BBC is reporting that Microsoft is paying $6bn (£3bn) to buy digital marketing firm Aquantive in its biggest ever acquisition. FTA: The all-cash takeover will allow Microsoft to expand into the highly lucrative internet advertising market, that Google and Yahoo have targeted."
pipingguy writes "[In 1982] The Soviets were developing a highly lucrative pipeline to carry natural gas across the expanse of Siberia, but they lacked the software to manage the complex array of pumps, valves, turbines, and storage facilities that the system would require. [...] KGB officials inserted an agent to abduct the technology from a Canadian firm. Unbeknownst to the Soviet spies, the software they stole sported a little something extra: a few lines of computer code which had been inserted just for them. [...] Some weeks after going online, in the summer of 1982, the clandestine code in the pipeline control program asserted itself. Disguised as an automated system test, the software instructed a series of valves, turbines, and pumps to increase the pipeline's pressure far beyond its capacity, putting considerable strain on the line's many joints and welds over a period of time. One day, somewhere in the cold loneliness of Siberia, the overexerted pipeline finally succumbed to the pressure. [...] It would be fourteen years before the real cause of the event would be revealed. [...] In any case, it clearly demonstrates that software piracy can have very serious consequences."