I wasn't recommending writing a full featured CMS, that would be crazy. Writing an application that grabs a row from a database is not hard and one would have to be _trying_ to make it vulnerable to do so.
You could write your own... A blog is incredibly simple to write if you want featureless and lightweight.
It can be as simple as having entries be rows in a database and then displaying them in some order, haha.
Barence writes "At CES, Palm announced what promises to be the product that finally matches and even betters the Apple iPhone, and certainly looks to be the most important product announced at this year's Consumer Electronics Show. It's called the Palm Pre and it's based on a completely new operating system, called Palm webOS. Its key specs include a 3.1in 320x 480 touchscreen, 8GB of storage, UMTS HDSPA support (in the UK version of the phone), 802.11b/g WLAN, Bluetooth, and GPS. It also includes a slide-out Qwerty keyboard, 3.5mm headphone jack, and what Palm described as the 'fastest ever' Texas Instruments OMAP processor."
from the don't-eat-the-yellow-line dept.
CurtMonash writes "Fandome offers a fascinating video explaining how the first-down line on football broadcasts actually works. Evidently, theres a lot of processing both to calculate the exact location being photographed on the field — including optical sensors and two steps of encoding — and to draw a line in exactly the right place onscreen. For those who don't want to watch the whole video, highlights are here."
from the endangered-species dept.
eXchange writes "Well-known hacker Dino Dai Zovi has written an article at ZDNet discussing last week's discovery of a critical threat to Mac OS X, and another announcement of a Trojan horse exploiting this discovery. He suggests that Snow Leopard, or Mac OS X 10.6, should integrate more robust means of preventing malware attacks. Some of the suggestions he has include mandatory code-signing for kernel extensions (so only certified kernel extensions can run), sandbox policies for Safari, Mail, and third-party applications (so these applications cannot do anything to the system), and some lower-level changes, such as hardware-enforced Non-eXecutable memory and address space layout randomization."
from the getting-it-right dept.
paleshadows writes "Researchers at UCSC developed a tool that measures the trustworthiness of each Wikipedia page. Roughly speaking, the algorithm analyzes the entire 7-year user-editing-history and utilizes the longevity of the content to learn which contributors are the most reliable: If your contribution lasts, you gain 'reputation,' whereas if it's edited out, your reputation falls. The trustworthiness of a newly inserted text is a function of the reputation of all its authors, a heuristic that turned out to be successful in identifying poor content. The interested reader can take a look at this demonstration (random page with white/orange background marking trusted/untrusted text, respectively; note "random page" link at the left for more demo pages), this
presentation (pdf), and this paper (pdf)."