Forgot your password?

+ - Xerox Alto Source Code Released To Public-> 1

Submitted by zonker
zonker (1158) writes "In 1970 the Xerox Corporation established the Palo Alto Research Center (PARC) with the goal to develop an “architecture of information” and lay the groundwork for future electronic office products. The pioneering Alto project that began in 1972 invented or refined many of the fundamental hardware and software ideas upon which our modern devices are based, including raster displays, mouse pointing devices, direct-manipulation user interfaces, windows and menus, the first WYSIWYG word processor, and Ethernet.

The first Altos were built as research prototypes. By the fall of 1976 PARC’s research was far enough along that a Xerox product group started to design products based on their prototypes. Ultimately ~1500 were built and deployed throughout the Xerox Corporation, as well as at universities and other sites. The Alto was never sold as a product but its legacy served as inspiration for the future.

With the permission of the Palo Alto Research Center, the Computer History Museum is pleased to make available, for non-commercial use only, snapshots of Alto source code, executables, documentation, font files, and other files from 1975 to 1987. The files are organized by the original server on which they resided at PARC that correspond to files that were restored from archive tapes. An interesting look at retro-future."

Link to Original Source

+ - 6 New Features in Android 5.0 Lollipop->

Submitted by Anonymous Coward
An anonymous reader writes "Google affirmed a lot of information about the latest version of Android previously, but we didn’t get a name – it was just “Android L.” Currently there is a name and a version number too. Google has named it “Lollipop”, bearing in mind the trend of naming its OSes after treats. Lollipop has landed first on the newest Nexus devices – Nexus 6, Nexus 9 and Nexus Player.
More: http://auckland.fortuneinnovat..."

Link to Original Source

+ - Lead Mir Developer: "Mir More Relevant Than Wayland In Two Years"

Submitted by M-Saunders
M-Saunders (706738) writes "Canonical courted plenty of controversy with it announced Mir, its home-grown display server. But why did the company choose to go it alone, and not collaborate with the Wayland project? Linux Voice has an interview with Thomas Voss, Mir's lead developer. Voss explains how Mir came into being, what it offers, and why he believes it will outlast Wayland."

+ - Debian - preserve freedom of choice of init systems->

Submitted by Anonymous Coward
An anonymous reader writes ""Debian has decided (via the technical committee) to change its
    default init system for the next release. The technical committee
    decided not to decide about the question of "coupling" i.e. whether
    other packages in Debian may depend on a particular init system.

    This GR seeks to preserve the freedom of our users now to select an
    init system of their choice, and the project's freedom to select a
    different init system in the future. It will avoid Debian becoming
    accidentally locked in to a particular init system (for example,
    because so much unrelated software has ended up depending on a
    particular init system that the burden of effort required to change
    init system becomes too great). A number of init systems exist, and
    it is clear that there is not yet broad consensus as to what the
    best init system might look like.""

Link to Original Source

+ - Eric Schmidt: Anxiety Over U.S. Spying Will "Break The Internet"->

Submitted by jfruh
jfruh (300774) writes "Oregon Senator Ron Wyden gathered a group of tech luminaries to discuss the implications of U.S. surveillance programs, and Google Chairman Eric Schmidt didn't mince words. He said that worries over U.S. surveillance would result in servers with different sets of data for users from different countries multiplying across the world. "The simplest outcome is that we're going to end up breaking the Internet.""
Link to Original Source

+ - The malware of the future may come bearing real gifts->

Submitted by Anonymous Coward
An anonymous reader writes "Research by Prof. Giovanni Vigna of the University of California leads him to believe that the malware of the future will come in a friendly form, be genuinely useful and may not reveal its intentions for a protracted period of time.

Prof. Vigna, speaking at IP Expo in London, outlined a fearful future of 'mimicry' in evolved strains of malware. In the current stage of the war between malware and security researchers, the emphasis is almost entirely on the attempt to convince increasingly intelligent — and increasingly suspicious — malware that it is operating in a bare-metal environment when it is in fact in a sandbox or VM environment.

For the malware, the stakes are tremendously high — if it has reached the point of OS-level execution without its hash being indexed and red-flagged by online security databases, it cannot afford to reveal its intentions in a test environment. This article outlines the extraordinary game of cat-and-mouse being played between researchers and hackers, and how future malware exploits are likely to abandon a rush for the buffer overflow in favour of 'the long game' — and to make themselves useful in the process."

Link to Original Source

+ - Systemd Adding Its Own Console To Linux Systems->

Submitted by Anonymous Coward
An anonymous reader writes "The next version of systemd is poised to introduce an experimental "systemd-consoled" that serves as a user-space console daemon. The consoled furthers the Linux developers' goal of eventually deprecating the VT subsystem found within the Linux kernel in favor of a user-space driven terminal that supports better localization, increased security, and greater robustness of the kernel's seldom touched and hairy CONFIG_VT'ed code."
Link to Original Source

+ - Google Spends Over $75,000 To Fix 159 Security Issues With Chrome 38 1

Submitted by Anonymous Coward
An anonymous reader writes "In addition to updating Chrome for iOS, Google today released Chrome 38 for Windows, Mac, and Linux. While Chrome 38 beta brought a slew of new features, the stable release is pretty much just a massive security update. This means that, with Chrome 38, Google isn’t adding any features to the stable channel. That said, Chrome 38 does address a huge 159 security issues (including 113 “relatively minor ones”). Google spent a whopping $75,633.70 in bug bounties for this release."

+ - 'Aunt Jemima' relatives suing pancake company for $2B->

Submitted by Anonymous Coward
An anonymous reader writes ""The great grandsons of Anna Short Harrington, who was hired as the American pancake icon in 1933, claim that her family is entitled to a percentage of the company's revenue every time her likeness was used. They're now seeking $2 billion in compensation, plus a share of future revenue.""
Link to Original Source

+ - 133 DDoS Attacks Over 100Gbps So Far In 2014

Submitted by Anonymous Coward
An anonymous reader writes "Arbor Networks released global DDoS attack data for Q3 2014 showing a remarkable increase in Simple Service Discovery Protocol (SSDP) reflection attacks. Arbor monitored very few attacks using SSDP as a reflection mechanism in Q2, but nearly 30,000 attacks with this source port in Q3 alone, with one such attack reaching 124Gbps. Average monitored attack in Q3 was 858.98Mbps; peak attack of 264.6Gbps."

+ - How to keep Student's Passwords Secure? 2

Submitted by bigal123
bigal123 (709270) writes "My son's school is moving more and more to online and is even assigning Chromebooks or iPads to students (depending on the grade). In some cases they may have books, but the books stay home and they have user names and passwords to the various text book sites. Then hey also have user names/passwords to several other school resources. Most all the sites are 3rd party site. So each child may have many user names (various formats) and passwords. They emphasized how these elementary kids needed to keep their passwords safe and not share them with other kids. However when asked about the kids remembering all the user names and passwords the school said they are going to have the kids write them down in a notebook. This seemed like a very bad practice for a class room and to/from home situation. Do others have good password management suggestions or suggestions for a single sign-on process (no/minimal cost) for kids in school accessing school provisioned resources?"