Forgot your password?
typodupeerror

Comment: Re:Okay, I have a question (Score 1) 153

by islanduniverse (#22550026) Attached to: Practical Web 2.0 Applications with PHP
If it's like master pages in Expression Web, then that's not quite right... Instead of calling a separate file for the header/footer/etc when the page is generated, the page is kept static.

When you modify the master page, there are areas of the page that you designate as editable regions, and so when anything outside these editable regions is updated in the master page, the change is replicated on to each associated page.

This is assuming these master pages are similar in functionality to the 'dynamic web templates'...
Security

+ - Cracked linux boxes used to weild windows botnets->

Submitted by m-stone
m-stone (666) writes "From ComputerWord:

"The vast majority of the threats we saw were rootkitted Linux boxes, which was rather startling. We expected Microsoft boxes," said Dave Cullinane, eBay's chief information and security officer, speaking at a Microsoft-sponsored security symposium at Santa Clara University.

Because Linux is highly reliable and a great platform for running server software, Linux machines are desired by phishers, who set up fake websites, hoping to lure victims into disclosing their passwords.

"We see a lot of Linux machines used in phishing," said Alfred Huger, vice president for Symantec Security Response. "We see them as part of the command and control networks for botnets, but we rarely see them be the actual bots. Botnets are almost uniformly Windows-based.""

Link to Original Source
Microsoft

+ - time.windows.com broken; Windows machines adrift?

Submitted by
An anonymous reader writes "It appears the widely-used time.windows.com Network Time Protocol server isn't working correctly. The host name is redirecting to unsynchronized Akamai NTP servers which are off by more than 100 seconds. This issue leaves millions of Windows XP and 2003 machines that still have the default configuration without a good source of network time. While most clients won't notice, there are certainly some important applications (such as kerberos authentication) that rely on accurate client time. This mis-configuration has been in place for at least several hours.

A bug report was submitted via Microsoft's website, but no response has been received in over 6 hours. This has apparently happened at least once before."
Privacy

+ - Scientist make quantum encryption breakthrough

Submitted by
Madas
Madas writes "Scientists working in Cambridge, England have managed to make quantum encryption completely secure by putting decoy pulses in the key transmission stream. According to the story this paves the way for safe, encrypted high-speed data links. Could this allow completely private transmission of data away from snooping eyes and ears? Or will it mean film studios can stop movies from being copied when travelling on the internet?"
Security

Who Pays For Credit Card Breaches? 313

Posted by kdawson
from the buck-stops-where? dept.
PetManimal writes "A scheme to steal customers' credit and debit card information at a New England supermarket chain highlights a little-understood fact about credit card security: Customers still think that the credit-card companies have to eat fraudulent charges, but since the PCI DSS standards were adopted, it's actually the merchant banks and merchants who have to pay up. And, according to the blogger writing in the latter article, it's a good thing." "The main reason PCI exists is that there are tens of thousands of merchants who don't understand the basics of information security and weren't even taking the very minimum steps to secure their networks and the credit card information they stored... PCI pushes that burden downstream and forces merchants to... put in a properly configured firewall, encrypt sensitive information and maintain a minimum security stance or be fined by their merchant banks... [T]he credit card companies have taken the bulk of the financial burden off of themselves and placed it on the merchants, which is where much of it belongs...'"
Movies

Don't Believe What You See at the Movies 441

Posted by Zonk
from the made-the-star-wars-movies-possible dept.
MattSparkes writes "Many images you see in a magazine are Photoshopped, and it's getting less and less likely that what you see at the cinema is any more genuine. In the film 'Blood Diamond', tears were added to Jennifer Connolly's face after a scene was shot. According to The Times, digital effects artists can even change actors' expressions. 'Opening or closing eyes; making a limp more convincing; removing breathing signs; eradicating blinking eyelids from a lingering gaze; or splicing together different takes of an unsuccessful love scene to produce one in which both parties look like they are enjoying themselves.' The article mentions the moral qualms digital effects people have over performing these manipulations, and the steps actors are taking to protect their digital assets."
Software

+ - Vista - Ubuntu Install Comparison

Submitted by
Cokeisbomb
Cokeisbomb writes "Andrew Thomas, at the Inqurier has recently installed both Vista and the latest version of Ubuntu on his desktop and has compared the install process and initial setup. Although he has been using computers for 30+ years, his findings were different than what many of us might expect. From the article: "Well, I've only been playing with computers since 1972 and I couldn't make it work. Linux can see the Windows boxes and vice versa, but any attempt to access files is met with a login dialogue box that refuses any username and password I enter. So I've done what any normal person would do in the circumstances — give up"."

"Be *excellent* to each other." -- Bill, or Ted, in Bill and Ted's Excellent Adventure

Working...