Help each other out of non-Webroot technical jams and discuss tech-related stuff in general.
- 4,741 Topics
- 12,030 Replies
"Quote" Safari, Chrome push to mask URLs By [url=http://www.computerworld.com/s/author/9000163/Gregg+Keizer]Gregg Keizer[/url]June 6, 2014 06:45 AM ET Summary/ Computerworld - Safari on OS X Yosemite will mask most of a URL in its top-of-window address bar, following in the footsteps of Safari on iOS, and beating Google's Chrome, which is experimenting with the same design, to the desktop. ComputerWorld/ Full Read Here/ [url=http://www.computerworld.com/s/article/9248884/Safari_Chrome_push_to_mask_URLs]http://www.computerworld.com/s/article/9248884/Safari_Chrome_push_to_mask_URLs[/url]
By [url=http://www.securityweek.com/authors/eduard-kovacs]Eduard Kovacs[/url] on May 27, 2014[b]VirusTotal, the popular service that lets users analyze suspicious files and URLs to help facilitate the detection of malware, has launched a Mac OS X version of its VirusTotal Uploader utility. [/b] In September 2012, Google [url=http://www.securityweek.com/google-acquires-virustotal]acquired VirusTotal[/url], which lets users submit a file that may be suspect and scans it using the engines of dozens of antivirus products to see if the file in question has been marked as malicious by any of the vendors. [img]http://www.securityweek.com/sites/default/files/Virus-Total.png[/img] The VirusTotal Uploader tool enables security researchers to easily submit files to VirusTotal. The Windows version of the utility has been around for years and it has benefited from numerous improvements. Some members of the community have even developed alternatives, l
Bing apps now MSN apps, Lumia 1520, Lumia 635 and Lumia 630 get new Lock screen skills By Mike Browne on September 30, 2014 2:00 pm [img]https://d1qy7qyune0vt1.cloudfront.net/webroot-en/attachment/16117iE1538C375A99C5EE.gif[/img] Bing Weather, News, Sports, Finance, Travel, Health & Fitness, and Food & Drink on Nokia Lumia smartphones running Windows Phone 8.1 have been updated with new MSN branding, while the Nokia Lumia 1520, Lumia 635 and Lumia 630 also get new Lockscreen skills to enhance your workouts and weather watching. Read on to find out about the new MSN branding for Bing apps. Microsoft has updated its entire Bing apps to bring it in line with one unified Azure-platform appearance. Bing will continue to deliver search and intelligent experiences, such as powering Cortana.
By [url=http://www.infoworld.com/author-bios/serdar-yegulalp]Serdar Yegulalp[/url] | [url=http://www.infoworld.com/]InfoWorld[/url] Posted on June 30, 2014 Self-upgrading, subscription-based Linux distribution built around Docker containerization draws funding from backers for Puppet Labs CoreOS, a newly minted Linux distribution that [url=http://www.infoworld.com/t/application-virtualization/coreos-uses-docker-put-linux-diet-242218]uses Docker containers[/url] to manage both applications and the system as a whole, has landed $8 million in Series A funding and announced a subscription version of its product -- two moves that nudge it closer to Red Hat territory. [url=https://coreos.com/products/managed-linux/]CoreOS Managed Linux[/url], as the new subscription product is called, runs on one's own servers or on supported platforms (Amazon, Google, and Rackspace, among others) and is automatically kept current by CoreOS's engineers. Patches and updates are streamed to each
Author/ Zeljka Zorz/ HNS Managing Editor Posted on 23 June 2014. A team of Cisco software engineers has created a new encryption scheme, and has released it to the public along with the caveat that this new block cypher is not ready for production, i.e. is still in the experimental phase. It's been dubbed FNR (shortened for "Flexible Naor and Reingold"), and is a "practical variant" of the work proposed in an [url=http://link.springer.com/article/10.1007%2FPL00003817]earlier work[/url] by researchers Moni Naor and Omer Reingold. Help Net Security/ full read here/ [url=http://www.net-security.org/secworld.php?id=17035]http://www.net-security.org/secworld.php?id=17035[/url]
Good piece on software, security, 0-days and mass surveillance: [b] [url=https://medium.com/message/81e5f33a24e1]https://medium.com/message/81e5f33a24e1[/url] [/b] [i]..The NSA is doing so well because software is bull**bleep**..[/i] [i] [/i] [i]..When we tell you to apply updates we are not telling you to mend your ship. We are telling you to keep bailing before the water gets to your neck...[/i] [i] [/i] [i]..In theory, the reason we’re so nice to soldiers, that we have customs around honoring and thanking them, is that they’re supposed to be sacrificing themselves for the good of the people. In the case of the NSA, this has been reversed. Our wellbeing is sacrificed to make their job of monitoring the world easier. When this is part of the culture of power, it is well on its way to being capable of any abuse..[/i] [i] [/i]
[b]The latest Debian release is available from Softpedia[/b] By [url=http://news.softpedia.com/editors/browse/silviu-stahie]Silviu Stahie[/url] on October 20th, 2014 [b]The Debian project project has announced that Debian 7.7 "Wheezy" is now out and available for download. This is the regular maintenance update, but it packs quite a few important fixes.[/b] Debian gets regular major updates for the distribution, but if you already have it installed and you keep it up to date you won't need to do anything extra. The developers have implemented a few important fixes, so it's recommended to upgrade as soon as possible. [url=http://news.softpedia.com/news/Debian-7-7-Is-Out-with-Security-Fixes-462647.shtml]Full Article[/url]
By [url=http://www.theregister.co.uk/Author/2835]Tom Brewster[/url], 23 Jun 2014 No doubt many of The Reg’s readers are tired of the term “the Internet of Things”. It is both a nebulous term and a vague idea. What it attempts to encapsulate is the masses of networks of automated machines that didn’t traditionally have connectivity, working to manage the environment around them, supposedly for the benefit of everyone. Typical examples are fridges that notify users when something’s not right with the groceries inside, smart energy systems that manage heating to maximise efficiency and a toothbrush that reports oral hygiene habits to dentists. It’s a brave new world, one rife with possibility for businesses hoping to make money from things that weren’t profitable before they were able to interact with the internet. The problem with giving objects IP addresses, however, is that they become exploitable. And in the world of embedded devices, if hackers hit them, they might be a
by Pierluigi Paganini on October 20th, 2014 [img]http://securityaffairs.co/wordpress/wp-content/uploads/2014/10/Tor-Browser-4.0-release-300x135.png[/img] [H2]New significant software updates Tor Browser 4.0 and Tails 1.2 are available for the popular Privacy Tools used to preserve online anonymity[/H2]The [url=http://securityaffairs.co/wordpress/27751/intelligence/intelligence-supports-tor-project.html]Tor projec[/url]t has released a new version of the popular free software for enabling online anonymity [url=http://securityaffairs.co/wordpress/26982/hacking/tor-working-fix-flaw.html]Tor[/url], [url=https://blog.torproject.org/blog/tor-browser-40-released]Tor Browser 4.0[/url] is the release Tor Browser Bundle available for download. The Tor Browser Bundle is based on an Extended Support Release (ESR) version of the Mozilla Firefox project, in the new Tor version 4.0 the Firefox version has been updated from 24 ESR to 31 ESR vers
By [b]Chuong H Nguyen[/b] At the [url=http://www.windowscentral.com/tag/teched]TechEd[/url] Europe 2014 conference, Microsoft announced new features and technologies to help developers as it focuses on a mobile-first, cloud-first world. Announcements were made for Microsoft [url=http://www.windowscentral.com/tag/azure]Azure[/url], [url=http://www.windowscentral.com/tag/intune]Intune[/url] mobile device management, cross-platform developer tools support, and new cloud partners. [url=http://www.windowscentral.com/microsoft-announces-new-cloud-services-enterprise-mobility-features-and-tools-teched-2014]Full Article[/url].
[H2]"Digital humans, synthetic humans? We're struggling on what to call this."[/H2]by [url=http://arstechnica.com/author/david-kravets/]David Kravets[/url] - May 29 2014 Eyes popped at the staggering $500,000 cost to produce Michael Jackson's nearly 14-minute-long "Thriller" video in 1983. Fast forward to today, and a nearly 4-minute-long hologram performance at the recent Billboard Music Awards by a now-deceased Jackson cost "multiple millions" to make, according to Frank Patterson, the chairman of Pulse, the company that produced the show. Patterson said in a phone interview that he was still ringing up the cash register and had not yet finalized the tab. The Jackson estate, he said, had asked Pulse to do the job. Six months later, and after countless hours of coding and "reviewing thousands of videos of Michael's work," the King of Pop was brought back to life. [url=http://arstechnica.com/business/2014/05/minutes-long-michael-jackson-hologram-show-cost-mult
By [url=http://betanews.com/author/mwilliams/]Mike Williams[/url]/ Posted on June 26 2014 Unix is renowned for its powerful command line tools, and there are many ways you can try at least some of them on the PC. Installing [url=http://www.downloadcrew.com/article/26088-gnu_on_windows]Gnu on Windows[/url] gets you 100+ of the best known tools, recompiled to run under Windows, while favorites like grep have been [url=http://www.downloadcrew.com/article/31544-grepwin_32-bit]ported individually[/url]. But if you’re looking for simplicity and convenience, it’s hard to beat [url=http://www.downloadcrew.com/article/32376-busybox_for_windows]BusyBox[/url], which crams tiny versions of 117 Unix utilities into a single 645 KB executable. There’s no bulk, no complex folder structure, just one package which provides everything you need. You don’t need any Unix/ Linux knowledge to get at least something from the program, as many of its commands are very simple. Cal displays a t
[b][url=http://www.darkreading.com/author-bio.asp?author_id=924]Dave Piscitello[/url] Posted on 9/18/2014[/b] [b]Check out these examples of how to implement real-time or offline traffic monitoring using common commercial or open source security products.[/b] In [url=http://www.darkreading.com/attacks-breaches/monitor-dns-traffic-and-you-just-might-catch-a-rat/a/d-id/1269593]Monitor DNS Traffic & You Just Might Catch A RAT[/url], I described how inspecting DNS traffic between client devices and your local recursive resolver could reveal the presence of botnets in your networks. Today, I'll share how you can monitor traffic using security systems and name resolvers you may already have deployed. DarkReading/ full article here/ [url=http://www.darkreading.com/analytics/threat-intelligence/5-ways-to-monitor-dns-traffic-for-security-threats/a/d-id/1315868?]http://www.darkreading.com/analytics/threat-intelligence/5-ways-to-monitor-dns-traffic-for-security-t
By [url=http://www.esecurityplanet.com/author/20512210/Joe-Stanganelli]Joe Stanganelli[/url] | Posted July 01, 2014 Healthcare and life sciences organizations are some of the biggest users of Big Data today. The industry is already beginning to enter the exabyte age. Chris Gladwin, CEO of storage solutions company Cleversafe, announced in April that Cleversafe had acquired exabyte customers. The industry will likely begin using up [url=http://www.saasintheenterprise.com/author.asp?section_id=3438&doc_id=273367&]zettabytes in less than 10 years[/url]. With this growth in data, two things have become extremely important to health and life sciences organizations: collaboration (including externalization) and the cloud. The two go hand in hand. "If you're going to the cloud, are others going with you?" asked Sebastien Lefebvre, IT platform director of Research and Development for Biogen Idec, during at a presentation at the recent Bio-IT World Conferen
By [url=http://www.esecurityplanet.com/author/4440/Sean-Michael-Kerner]Sean Michael Kerner[/url] | Posted June 20, 2014 Bromium has been working on creating a technology that enables users to be [url=http://www.esecurityplanet.com/trends/bromium-secure-by-design-the-future-of-it-security.html]secure by design[/url]. The company leverages the open-source Xen hypervisor as the basis for building a microkernel that provides security for an end-user device. In a video interview, Simon Crosby, co-founder and CTO of Bromium, details what his company's technology is all about and how it is continuing to evolve. The Bromium [url=http://www.esecurityplanet.com/news/bromium-vsentry-defends-enterprises-with-microkernel-virtualization.html]vSentry solution[/url] became available in 2012, providing a microkernel virtualization-based solution. A key component is the Live Attack Visualization and Analysis (LAVA) data solution. eSecurity Planet/ full read here/ [url=http
[url=https://www.reddit.com/r/science/comments/2mk0qz/science_ama_series_im_temple_grandin_professor_of/]https://www.reddit.com/r/science/comments/2mk0qz/science_ama_series_im_temple_grandin_professor_of/[/url] She's a high-function autistic person who's written several books. I got to see her speak at a conference once, and it was fascinating. She has trouble with metaphorical speech so she'd often ask people to restate their question in more plain terms.
By [url=http://www.infoworld.com/author-bios/david-linthicum]David Linthicum[/url] | [url=http://www.infoworld.com/]InfoWorld[/url] Posted on June 27 2014 Neither the buzzword nor the [url=http://www.infoworld.com/d/consumerization-of-it/what-the-internet-of-things-really-means-217657]concept of the "Internet of things"[/url] is new. Since the Internet emerged back in the 1990s (and before), we found it interesting to connect Coke machines and coffee pots, among other items. In fact, some of my first work with the Internet was around connecting data-collection devices to remote databases. These days, everything comes with some kind of network connection option. This includes our thermostats, TVs, refrigerators, and [url=http://www.cnet.com/news/internet-connected-coffee-maker-has-security-holes/]even coffee makers[/url]. The real progress is being made in the area of industrial equipment, such as those sold by GE and other manufacturers that have pushed this concept in the last
By [url=http://www.theregister.co.uk/Author/2684]Jasper Hamill[/url], 25 Jun 2014 When Buzzfeed first began to offer the world a constant free stream of inane listicles, cat pics and funny fail.gifs, it seemed too good to be true. Yet it turns out that the world's biggest content aggregator isn't just shiny and happy – it's curious too. In fact, according to a digital marketer, Big Buzzfeed is watching us all. On his [url=http://barker.co.uk/buzzfeediswatching]blog[/url], e-commerce and digital marketing expert Dan Barker warned that Buzzfeed was in fact wolfing down large amounts of its readers' data. The Register/ full read here/ [url=http://www.theregister.co.uk/2014/06/25/buzzfeed_aggregated_data_slurp/]http://www.theregister.co.uk/2014/06/25/buzzfeed_aggregated_data_slurp/[/url]
By Mikael RicknäsJune 11, 2014 04:01 AM ET Summary/IDG News Service - Qualcomm is bringing 4G coverage to offices and homes with a low-cost chip that will power wireless routers with both Wi-Fi and LTE. The introduction of the FSM90xx SoC (system-on-a-chip) is a change of pace for Qualcomm. When the company entered the small cell sector it did so with high-performing products, but has now started to scale down the underlying technology, according to Dan Rabinovitsj, senior vice president at Qualcomm. ComputerWorld/ Full Read Here/ [url=http://www.computerworld.com/s/article/9249014/Qualcomm_chip_combines_Wi_Fi_and_LTE?taxonomyId=15]http://www.computerworld.com/s/article/9249014/Qualcomm_chip_combines_Wi_Fi_and_LTE?taxonomyId=15[/url]
By [b]Michelle Starr[/b] It's a recurring horror in sci-fi: the hull is pierced, a human is trapped without equipment in an airlock about to open, a door needs to be opened in order to [url=http://youtu.be/zqzHdKqZAmo?t=2m40s]expel something undesirable[/url]. With no air and almost zero pressure, the human body isn't going to last long without some form of protection. But what does happen, exactly? Do your eyes explode outward while your blood evaporates? Well, no. The truth is both less dramatic and far more fascinating -- as we have discovered through accidents [url=http://en.wikipedia.org/wiki/Soyuz_11]in space[/url] and in test chambers, and [url=http://www.ncbi.nlm.nih.gov/pubmed/14334706]animal experimentation[/url] in [url=http://oai.dtic.mil/oai/oai?verb=getRecord&metadataPrefix=html&identifier=AD0479738]the 1960s[/url]. [url=http://www.cnet.com/news/what-happens-to-the-unprotected-human-body-in-space/]Full Article[/url]. It's very fascniating.:)
Maybe the give away is in the title - Hacking ;) [url=http://time.com/author/denver-nicks/]Denver Nicks[/url] [url=https://twitter.com/DenverNicks]@DenverNicks[/url] [H2]The hacker who has presided for 22 years over what is today the biggest hacker conference in the United States talks to TIME about Edward Snowden, Dorian Gray and hackers' changing role in society.[/H2] For one weekend every year, thousands of the world’s best—or worst, depending on your point of view—hackers meet in Las Vegas, Nevada, for Defcon. It’s one of the biggest hacker conferences on Earth, with about 15,000 attendees this year. It’s an event that some feel pushes the boundaries of legality, as hackers teach one another skills from lock picking and password cracking to evading government surveillance. The weekend is a celebration of hackish whimsy, the right to privacy and radical freedom of expression. [url=http://time.com/3103530/defcon-hackers-dark-tangent/]Full Article[/url]
[b]Spam and online gambling – a surefire loser[/b] by Tatyana Kulikova [i]Daylight robbery or an innocent bet?; Lottery: Win without playing!; Horse racing; Spam doping; Stretching the law[/i] Who hasn’t dreamt of Lady Luck smiling on them and bestowing untold wealth without having to make the slightest effort? Sometimes people get so caught up in the excitement of gambling that they fail to realize they are merely throwing away their money instead of winning that coveted fortune. In their view, gambling is not just a way of winning money but also a chance to try their luck, which is sure to change eventually. Isn’t it? Phenomena in the real world are quick to gain popularity in the virtual world. The various games that involve gambling are no exception: most of them have adapted to the peculiarities of the Internet and successfully established themselves online. However, just like in the real-world gaming industry, popular legal online resources exist
Already have an account? Login
Login to the community
No account yet? Create an account
Enter your username or e-mail address. We'll send you an e-mail with instructions to reset your password.