Forgot your password?
typodupeerror
Microsoft

Submission + - Mac users' Internet experience to remain seamless 2

thefickler writes: Mac users will continue to see the Internet as it was intended, thanks to the renewal of a font licensing agreement between Microsoft and Apple. At TypeCon2007 Microsoft and Apple announced they have renewed their font licensing agreement, giving Apple users ongoing use of the latest versions of Microsoft Windows core fonts.

Back in 1996 Microsoft started the "Core fonts for the Web" initiative. The idea of this initiative was to create a a standard pack of fonts that would be present on all or most computers, allowing web pages to be displayed consistently on different computers. While the project was terminated in 2002, some of the fonts defined as core fonts for the web have gone on to become known as "web safe fonts", and are therefore widely used by Internet developers.
Security

Submission + - Point and click Gmail hacking at Black Hat (tgdaily.com)

not5150 writes: "Using Gmail or most other webmail programs over an unsecured access points just got a bit more dangerous. At Black Hat, Robert Graham, CEO of errata security, showed how to capture and clone session cookies. He even hijacked a shocked attendee's Gmail account in the middle of his Black Hat speech."
United States

Submission + - Forensics Expert says Al-Qaeda Images Altered

WerewolfOfVulcan writes: Wired reports that researcher Neal Krawetz revealed some veeeeeery interesting things about the Al-Qaeda images that our government loves to show off.

From the article: "Krawetz was also able to determine that the writing on the banner behind al-Zawahiri's head was added to the image afterward. In the second picture above showing the results of the error level analysis, the light clusters on the image indicate areas of the image that were added or changed. The subtitles and logos in the upper right and lower left corners (IntelCenter is an organization that monitors terrorist activity and As-Sahab is the video production branch of al Qaeda) were all added at the same time, while the banner writing was added at a different time, likely around the same time that al-Zawahiri was added, Krawetz says." Why would Al-Qaeda add an IntelCenter logo to their video? Why would IntelCenter add an Al-Qaeda logo? Methinks we have bigger fish to fry than Gonzo and his fired attorneys... }:-) The article contains links to Krawetz's presentation and the source code he used to analyze the photos.

Feed The 2006 Engadget Awards: Vote for Worst Gadget of the Year (engadget.com)

Filed under: Announcements, Misc. Gadgets

Ready to get your hater on? We're at the end of the line, and your chance to cast your ballot for the 2006 Worst Gadget of the Year! (Note: nominees were not necessarily selected for having outright bad or defective gadgets -- the disappointment / let-down factor also plays a big role.) Our Engadget Awards nominees are listed below, and you've got until 11.59PM EST on Wednesday, April 18th to file your vote. You can only vote once, so make it count, and may the best tech win! The nominees: Defective Apple MacBooks (see here, here, here, and here), Exploding Sony batteries (see here, here, here, here, here, and many more), Microsoft Zune, Motorola Q, Nintendo Wiimote straps (see here, here, here, and here), and Sony PlayStation 3.

Permalink | Email this | Comments

BOLD MOVES: THE FUTURE OF FORD A new documentary series. Be part of the transformation as it happens in real-time

Office Depot Featured Gadget: Xbox 360 Platinum System Packs the power to bring games to life!


The Internet

Enforced Ads Coming to Flash Video Players 397

Dominare writes "The BBC is reporting that Adobe is releasing new player software which will allow websites that use their Flash video player (such as YouTube) to force viewers to watch ads before the video they selected will play. 'But the big seller for Adobe is the ability to include in Flash movies so-called digital rights management (DRM) — allowing copyright holders to require the viewing of adverts, or restrict copying. "Adobe has created the first way for media companies to release video content, secure in the knowledge that advertising goes with it," James McQuivey, an analyst at Forrester Research said.' This seems to have been timed to coincide with Microsoft's release of their own competitor, Silverlight, to Adobe's dominance of online video."

Feed Review: SpamSieve 2.6 (macworld.com)

SpamSieve 2.6 should be on the lips of all Mac users serious about ridding their computers of junk mail. It's affordable, effective, easy to use, and as configurable as just about anyone needs a spam utility to be.


Programming

Father of Instant Ramen Passes Away 195

Chained Fei writes "Ando Momofuku, Father of the Instant Ramen, passed away on January 5th at the age of 96. He concocted the idea for Instant Ramen after WWII, hoping to reduce the amount of poor nourishment for soldiers in the field. If not for this great man, many a poor college student and programmer would have starved over the years. From the article: 'In 1971, Nissin introduced the Cup Noodle featuring instant ramen in a waterproof plastic foam container. Dubbed the "Ramen King," Ando is credited with expanding Nissin into the No. 1 company in the industry and was well-known for his dedication to his work ... In 1999, Ando opened the Momofuku Ando Instant Ramen Museum in Ikeda, Osaka Prefecture, after installing his second son, Koki, as president of the company.'"

SHA-1 Collisions for Meaningful Messages 128

mrogers writes "Following on the heels of last year's collision search attack against SHA-1, researchers at the Crypto 2006 conference have announced a new attack that allows the attacker to choose part of the colliding messages. "Using the new method, it is possible, for example, to produce two HTML documents with a long nonsense part after the closing </html> tag, which, despite slight differences in the HTML part, thanks to the adapted appendage have the same hash value." A similar attack against MD5 was announced last year."

Are NDA 'Prior Inventions' Clauses Safe to Sign? 300

BenderMan asks: "I own a small consulting company. Today I was asked by yet another corporate customer to sign an NDA with the increasingly popular 'Prior Inventions' clause. The gist of it is they want you to provide a list of all your past and current inventions and/or ideas so they can define and protect the intellectual property that they have hired you to build. Like many of us that lay awake at night, whilst the hamster wheel spins new ideas, I've got a number of un-patented works in various stages of development. Given that mutual NDAs only provide one year of protection, I don't feel obligated, nor do I have sufficient time and energy, to fully and properly document my inventions for an NDA. While these clauses are written with good intentions, the reality is that these valuable ideas would be placed in the hands of people that could potentially profit with impunity (Have you priced patents lately?). Unfortunately many companies are not willing to strike this clause from their contracts. Does Slashdot agree that this is a concern, and how have you dealt with these situations?"

Cloned Beef Coming Soon? 529

An anonymous reader writes "According to this article at Popular Science cloned beef may be coming soon. It talks about using meat within 48 hours of slaughter to allow cloning the best possible specimens, something that is not possible to determine while the animal is still alive. Apparently only 1 in 8000 animals is truly the best. Personally I'd love to see us progress to the point where it was possible to grow just the meat itself without the animal. That would end all the ethical issues with raising an animal for food, potential issues from mad cow disease, bird flu and whatever the next media induced panic is."

The Future & History of the User Interface 249

An anonymous reader writes "The Mac Observer is taking a look at UI development with lots of video links to some of the latest developments in user interfaces. It also has links to some of the most interesting historical footage of UI developments, here's one of the 1968 NLS demo. From the article: 'Sadly, a great many people in the computer field have a pathetic sense (or rather ignorance) of history. They are pompous and narcissistic enough to ignore the great contributions of past geniuses... It might be time to add a mandatory "History of Computers" class to the computer science curriculum so as to give new practitioners this much needed sense of history.'"

Researcher Creates Handheld Hacking Tool 69

Kickball Notches writes "Immunity's Dave Aitel plans to start selling a portable hacking device equipped with hundreds of exploits. The wireless handheld, called Silica, comes equipped with more than 150 exploits from Canvas and an automated exploitation system that allows simulated hacking attacks from the palm of your hand. It supports 802.11 (Wi-Fi) and Bluetooth wireless connections and is based on Linux."

Voyager 1 Passes 100 AU from the Sun 326

An anonymous reader writes "Yesterday, Voyager 1 passed 100 astronomical units from the sun as it continues operating after nearly 30 years in space. That is about 15 billion kilometers or 9.3 billion miles as it travels about 1 million miles per day. Scientists still hope it will find the edge of the solar system and get into interstellar space."

SQL Pocket Guide, Second Edition 50

Graeme Williams writes "So many dimensions are folded into this compact book that it took me more than a few moments to see what I was looking at. In the space of 184 pages, SQL Pocket Guide, Second Edition documents, explains, illustrates and compares the most common SQL statements from Oracle (10g), DB2 (8.2), SQL Server (2005), MySQL (5.0) and PostgreSQL (8.1), with occasional notes on previous versions, and pointers to more material on the author's web site. The book bills itself as "A Guide to SQL Usage" and it has an ample amount of explanatory material in addition to syntax and examples." Read the rest of Graeme's review.

Slashdot Top Deals

Our OS who art in CPU, UNIX be thy name. Thy programs run, thy syscalls done, In kernel as it is in user!

Working...