As an aside, anytime I set a box in the DMZ and review access logs, the majority of IPs attempting access are from CN. Which tells me there are LOTS of pwned boxes in CN...or...they're up to something.
Agree 100%. <rant> Off topic and all that good stuff but, on a purely gut level with NO rational explanation, when I look at someone's eyes and the reading is "dead inside" my level of mistrust takes an immediate spike. As far as I'm concerned, anything associated with Zuckerburg is bad news. </rant>
nk497 writes: "What really happens to your PC when it's handed over to computer repair cowboys? We reveal the horror stories from computer repair shops — the dodgy technicians that install pirated software, steal personal photos, lie about hardware upgrades, upsell to the unsavvy, or simply steal your PC to sell on. Plus, we tell you how to avoid such dodgy fixers and find a trustworthy repairman."
from the please-steal-this-software dept.
An anonymous reader writes "This week TPB got a very unusual e-mail. It was a 'Notice of Ridiculous Activity' from a company that had found one of its apps cracked and listed as a torrent on TPB. The app in question is called Memoires, developed by Coding Robots. Memoires is marketed as the easiest way to keep a journal on your Mac. It costs $29.99 to buy after you've enjoyed a 30-day free trial. That, of course, didn't stop someone from cracking the software and making it available for free as a torrent. Dmitry Chestnykh, founder of Coding Robots, noticed the cracked torrent and decided to download it to see what had been done. After using it, he was upset — not because the cracked version was available, but because the cracker (named Minamoto) had done such a bad job of cracking it. The best section of the e-mail has to be this: 'I demand that you don't remove this torrent, so that people can laugh at Minamoto and CORE skills. However, I also demand the[sic] better crack to be made, so that it doesn't cripple the user experience of my beautiful program.'"
GPone writes: "Crypt Your Life allows encrypting all your SMS and your password. Moreover, encrypting your SMS conversation is user-friendly thanks to its symmetric encryption mechanism. In order to give you an optimal security, Crypt Your Life is using some of the best cryptographic algorithm: AES, RSA and MD5." It is free and i hope this could help.
Forcing users to choose passwords that are rare and “unpopular,” rather than “strong," as it has traditionally been defined, provides a better defense against one type of attack, known as "statistical guessing," according to a paper by researchers Cormac Herley and Stuart Schechter of Microsoft Research and Michael Mitzenmacher, a professor of Computer Science at Harvard University. The researchers will present their paper, "Popularity is Everything: A new approach to protecting passwords from statistical-guessing attacks" at the USENIX HotSec '10 Workshop in Washington, D.C. on August 10.
An anonymous reader writes: With the "three strikes" law now in effect in France, the organization tasked with implementing it, Hadopi, has been working on technology specs for making the process work — and those specs have now leaked. It appears to involve client-side monitoring and controlling software, that would try to watch what you were doing online, and even warn you before you used any P2P protocol (must make Skype phone calls fun). It's hard to believe people will accept this kind of thing being installed on their computers, so I can't wait to see how Hadopi moves forward with it. It also appears to violate EU rules on privacy.
wog777 writes: Researchers at the University of California, San Diego School of Medicine have discovered that a kind of sugar molecule common to chimpanzees, gorillas and other mammals but not found in humans provokes a strong immune response in some people, likely worsening conditions in which chronic inflammation is a major issue.This non-human sialic acid sugar is an ingredient in some biotechnology drugs, and may be limiting or undermining their therapeutic effectiveness in some patients, the scientists report in a letter published in the advance online July 25 edition of the journal Nature Biotechnology. However, they also propose a simple modification to the drug-making process that could solve the problem.
tcrown007 writes: MGE UPS makes UPS systems and software that are protected by hardware dongles. After the dongles expired, GE bypassed the dongles and continued to use the software. MGE sued, won, and now lost on GE's appeal. Directly from the court's ruling, "Merely bypassing a technological protection that restricts a user from viewing or using a work is insufficient to trigger the DMCA’s anti-circumvention provision...The owner’s technological measure must protect the copyrighted material against an infringement of a right that the Copyright Act protects, not from mere use or viewing." Say what? I think I just saw a flying pig go by.
x_IamSpartacus_x writes: I have been administering Windows machines for more than 10 years and am extremely comfortable in a Windows environment. I went to school as came out with a Windows Network Administration degree, my CCNA and a Cisco Network Admin degree and have worked in the corporate world administering mid-level scale Windows environments. Unfortunately, I took only 1 (basic) Linux administration class and promptly forgot it because it had no bearing on my degree plan(s). I know the slashdot community will hate me for this but I would really consider myself quite technical and yet I know virtually nothing about administering Linux. I am hoping that the slashdot community can (after forgiving me for my obvious lack of geeky Linux knowledge) help me get started on my quest to be as familiar with Linux as I am with Windows. I have no CS background so I am not a programmer but I hope that I can learn to write drivers for hardware (never needed in Windows) and get a deeper understanding of the Linux environment and it's strengths. Where should I start and what path should I follow to do this?