Forgot your password?
typodupeerror

Comment: Re:How do I tell...? (Score 1) 250

by webmaster404 (#23030374) Attached to: Top Botnets Control Some 1 Million Hijacked Computers
Ok, tell me, where do most Linux users get their software? From binaries downloaded from various freeware sites or from repositories with carefully scanned open-source software and some reputable proprietary software. What browser do most Linux users use, is it the one filled with Active X security flaws?

While it is true some Linux boxes are bots, 99% are not and will not be, why? Because the average Windows user does generally insecure things to their machine (Surfs using IE, downloads untrusted binaries, uses Outlook for e-mail, is root, doesn't have a proper firewall...) while the average Linux user/newbie will usually do some rather secure things, (Firefox for browsing, nearly all software is from repositories, uses Thunderbird or similar for e-mail, isn't root) all of which put them at significantly less risk for becoming a bot. Its not impossible but the risks are FAR far less.
Handhelds

+ - Palm Warranty == sneakwrap

Submitted by sehlat
sehlat (180760) writes "There's a new article over at Ed Foster's Gripelog about the warranty on Palm Tungsten E2 and Z22 being ninety days rather than the industry-standard one year. It notes the fact that you only find out about this by opening the package with the device inside.

With software products, we all know that somewhere deep in the fine print the vendor probably disavows any real warranty. But it's a little more unexpected that a hardware vendor like Palm would hide — in the most obscure corners of its website — the fact that their warranty period on some products is so short as to be virtually useless.
"
Robotics

+ - MIT's entry for the DARPA Urban challance-> 1

Submitted by Matt
Matt (834853) writes "Here is a youtube video of MIT's entry to the upcoming DARPA Urban Challenge. This years challenge takes place November 3, 2007, in Victorville, California and will require the vehicles to navigate city traffic. The video shows some of the hardware used by MIT and shows to students teaching the car how to drive."
Link to Original Source
Hardware Hacking

+ - Man Builds $30K Jumbo Jet Simulator in his Bedroom->

Submitted by Anonymous Coward
An anonymous reader writes "This guy has built an amazing 747 simulator in his bedroom. The level of detail in the pictures is just stunning, but the funniest thing is what he says in the interview. Question: 'What else do you keep in your spare bedroom?' Answer: 'There's no room for anything else — that's why my wife had to go!'"
Link to Original Source
Encryption

+ - PayPal now using Verisign Security Keys->

Submitted by
macgeek
macgeek writes "PayPal is now offering Verisign Security Keys to users. These SecureID type devices generate new codes every 30 seconds and should, in theory, make your PayPal (and eBay if you choose) accounts more secure. I just got one and it seems to work fine — but it makes me wonder what else I could use this type of thing for. Anyone else using it? Will it catch on?"
Link to Original Source
The Military

+ - Indian Stealth fighter to take on the F22 Raptor

Submitted by
Gary
Gary writes "After developing the supersonic cruise missile Brahmos, India and Russia have come together once again to develop a fifth-generation stealth fighter aircraft (FGFA). The Indian Air Force wants the FGFA which is being called T-50 by the Sukhoi Design Bureau, to exceed the capabilities of the American F/A-22 'Raptor' and somewhat match the F-35 'Lightning-II' fighter. The distinguishing features of the FGFA will be stealth technology, composite materials, thrust-vectoring, advanced radars and sensors, and the ability to supercruise (achieve supersonic speeds without the use of the afterburner)."
The Internet

+ - Cox Cable Bandwidth Limitation Notice

Submitted by Anonymous Coward
An anonymous reader writes "You have probably seen these before, but I felt it relevent with the use of online movie services which may place you above the most minimal "Value" download specification. Yeah yeah, unlimited doesn't mean unlimited....wait what? Should I just bite the bullet and upgrade my service to download more or fight the "man"?

Dear Cox High Speed Internet Customer:

In order to provide all Cox High Speed Internet customers with an optimal online
experience, Cox must effectively manage network resources for our users. As
part of our network management activities, we proactively identify accounts that
may be utilizing excessive network bandwidth.

Our records indicate that your account may be exceeding our bandwidth usage
policy. Please note that if the situation is not corrected, your Cox High Speed
Internet account may be suspended. Privacy note: Cox does NOT track Internet
sites that you visit or files you download — it only measures total bandwidth
used for purposes of network management. Below are frequently asked questions
regarding excessive bandwidth usage.

- What Are the Current Cox High Speed Internet Residential Bandwidth
Limitations?
The Limitations vary based on your level of service. The complete list is
available at http://www.cox.com/policy/limitations.asp.

Preferred Package — 40 gigabytes downstream; 10 gigabytes upstream
Premier Package — 60 gigabytes downstream; 15 gigabytes upstream
Value Package — 4 gigabytes downstream; 1 gigabyte upstream

- What Might Cause My Account To Use Excessive Bandwidth?
1. Often a peer-to-peer file sharing application such as KaZaa, Morpheus or
Gnutella may be the problem. These programs operate as file servers by default
and offer files from your hard drive to other Internet users, possibly causing
your account to use excessive bandwidth without your knowledge.
2. If you have a wireless home network, there is a possibility that other people
are using your wireless network without your knowledge and greatly increasing
your network usage. Please refer to the documentation provided with your
networking equipment to secure your connection with a password.
3. Your computer may be affected by a computer virus. A virus will often send
out mass emails from your computer without your knowledge. Installing antivirus
software on your computer and scanning for possible infections may resolve this
issue.
4. In some cases, excessive usage indicates the presence of a commercial
Internet server. Customers using servers and/or bandwidth above normal amounts
may be best served by a commercial account available from Cox Business Services
(www.coxbusiness.com).

- Does Using A File Sharing Application Violate the Cox Acceptable Use Policy
(AUP)?
No, using a peer-to-peer file sharing program to download files does not in
itself violate the AUP. If your software is already configured not to share
files to other users, you should not have a problem. Please visit
support.cox.net for more information and instructions for securing most common
file sharing programs.

- Does Having A Wireless Home Network Violate the Cox Acceptable Use Policy
(AUP)?
No, however Cox does not provide support for your home network and you must take
precautions to secure any wireless home network.

- What Will Happen If My Account Continues To Use Excessive Bandwidth?
If the excessive usage is not corrected, your account may be suspended per the
Acceptable Use Policy (AUP).

- Where Can I View The Acceptable Use Policy (AUP)?
The AUP is available online at http://www.cox.com/policy/#Acceptable_Use_Policy.

If you have further questions regarding this policy or feel you have received
this notice in error, please visit http://support.cox.com/sdccommon/asp/contentr
edirect.asp?sprt_cid=ad888fb1-7447-4a80-bcb5-47131d31e307
or send an email to support@cox.net.

Thank you for your cooperation,

The Cox High Speed Internet Team"
Censorship

+ - Google News Doesn't Censor

Submitted by datapharmer
datapharmer (1099455) writes "I went to read google news today and was greeted by a penis. Yes, a penis. Apparently google doesn't believe in censorship (except in China). The story is on STDs. I can understand that it relates to genitals. I don't need a visual to remind me. I understand that censorship is bad, but couldn't they at least use a default filter like they do on their websearches? After all — think of the children!
A screen capture of the offending image in context can be seen below.

Note: the following link may not be work safe!
screen capture."
Programming

+ - Announcing New C++ Example Source Codes: MyUppEdoc->

Submitted by
Yeoh HS
Yeoh HS writes "FOR IMMEDIATE RELEASE

CONTACT:
Yeoh HS
author@yeohhs.com
http://www.yeohhs.com/

Announcing New C++ Example Source Codes: MyUppEdoc version 1.1

Yeoh HS, who runs an IT consulting firm, is pleased to announce the release of a C++ example source codes package, "MyUppEdoc".

Would you like to know how to create e-document programs using Visual C++ 2005 Express Edition and the Platform SDK with Ultimate++ framework?

MyUppEdoc is a Windows executable program that displays e-documents. It was built using Visual C++ 2005 Express Edition with the Platform SDK R2 (Microsoft Platform SDK for Windows Server 2003 R2). It does not use MFC but instead uses the free C++ framework, Ultimate++. Its fully commented source codes show you how to use Ultimate++ to create e-document programs. This way you can distribute your own electronic documents as a program so you do not need to use any other document reader.

The purpose of MyUppEdoc is to be a learning tool for you to learn how to use Ultimate++ to create your own e-documents. From the step-by-step commented source codes of this e-document program, you can learn how to create the electronic version of many types of documents such as user manuals, guides, catalogs, articles, picture albums and books.

To harness the full power of C++, use Ultimate++ so that you can create e-document programs that:
1. allow you the full flexibility of changing the user interface;
2. allow you the option of extending the program features by using other Ultimate++ packages;
3. do not depend on Internet Explorer to be installed on the user's machine;
4. do not use MFC; and
5. are easily ported to the several platforms which are supported by Ultimate++.

A FREE fully functional program is
available for download at http://www.yeohhs.com/myuppedoc.htm

Price: US$24.95
File Size: 511KB (demo program installer)
File Size: 152KB (full source codes)
The registered package contains the full source codes for an Ultimate++ project.

This product comes with a 60-day money back unconditional guarantee.
All purchasers are also entitled to the next updated version free of charge.
All orders are processed via an easy and secure online shopping system.

# # #"

Link to Original Source
Windows

+ - Windows Vista - show time zones in the taskbar->

Submitted by Anonymous Coward
An anonymous reader writes "If you work in a corporation and you need to schedule meetings with people from all over the world, it's quite a challenge to convert your time to two or three different time zones. If, for example, you are based in Europe and you need to schedule a conference call with people from USA and India or Philippines, it's quite difficult to find an hour when everybody is at work. One of the small but useful changes in Windows Vista, allows you to have three clocks in the taskbar, each clock showing the time for a different time zone. This can be of great help when scheduling this kind of meetings. You can quickly see the hour in the other time zones and make the correct arrangements."
Link to Original Source
Hardware Hacking

+ - Locating Linux-loyal Laptops->

Submitted by
davidmwilliams
davidmwilliams writes "Linux can bring new life to old laptops, and is a great choice for brand new systems in its own right. However, with few major vendors making laptops that ship with Linux out of the factory, how can you be sure the laptop you're eyeing off will run your favourite distro rather than the proprietary OS it comes with? Here's our guide to finding out! http://digg.com/linux_unix/Locating_Linux_loyal_Laptops"
Link to Original Source
The Internet

+ - How to Fix Fragmented Social Networking 2

Submitted by Anonymous Coward
An anonymous reader writes "Anyone familiar with Slashdot, Netflix, del.icio.us, flickr, Last.fm, etc knows that social networking at these sites (sharing / commenting) happens in isolation. Want to see what your friends are up to in terms of music listening, picture uploading, movie watching, or Internet bookmarking? Clear your schedule to log in 12 times. Here's another option: http://www.techconsumer.com/2007/10/05/friendfeed-a-solution-to-fragmented-social-networking/"
Space

+ - Earth II may become a reality->

Submitted by
realwx
realwx writes "Astronomers have spotted evidence of a second Earth being built around a distant star 424 light-years away. Using NASA's Spitzer Space Telescope, astronomers have spotted a huge belt of warm dust swirling around a young star called HD 113766 that is just slightly larger than our sun. The dust belt, which scientists suspect is clumping together to form planets, is located in the middle of the star system's terrestrial habitable zone where temperatures are moderate enough to sustain liquid water. Scientists estimate there is enough material in the belt to form a Mars-sized world or larger."
Link to Original Source

"All my life I wanted to be someone; I guess I should have been more specific." -- Jane Wagner

Working...