Language Selection

English French German Italian Portuguese Spanish

March 2005

Internet Music Theft Likely To Survive

Filed under
Web
Legal

Justices appeared divided, both worried that new lawsuits could stunt the next iPod, and also deeply troubled by what they see as Grokster's efforts to encourage rampant Internet piracy and profit from it. However they rule, it's unlikely to solve once and for all, internet copyright issues, say observers.

Naomi Campbell 'beat assistant with PDA'

Filed under
Hardware

Supermodel Naomi Campbell has angrily rejected US reports that she assaulted a personal assistant with a PDA. The 34-year-old catwalk babe and author is alleged to have set about her PA with a Blackberry during a jaunt to Rio de Janeiro.

'Game theft' led to fatal attack

Filed under
Gaming
Legal

Shanghai gamer Qiu Chengwei killed player Zhu Caoyuan when he discovered he had sold a "dragon sabre" he had been loaned, said the china Daily.

Mr Chengwei only got the powerful virtual weapon shortly before it was sold for 7,200 yuan (£460) or about $800US.

Before the attack Mr Chengwei told police about the theft who said the weapon was not real property.

Hollywood seeks iTunes for film

Filed under
Movies
Sci/Tech

In other movie news, Sony Pictures Digital Entertainment is trying to develop and own the next iTunes--but for films.

Taking the Film out of the Film Industry

Filed under
Movies
Sci/Tech

Wired.com is running a story about how Mark Cuban, co-owner of Landmark Theatres, is converting his theaters to all digital playback of movies. Starting with theaters in San Francisco and Dallas, he plans to change all 60 to the "first all-digital theater empire".

Mandrake Thinking Name Change?

Filed under
MDV

There's an interesting thread running on one of the mandrake mailing lists discussing the possibility of an upcoming name change since their buy out of Connectiva. Seems there may be some truth to the rumors as a whois it might prove.

The Guide to 'The Hitchhiker's Guide to the Galaxy'

Filed under
Movies
Web

The Hitchhiker's Guide to the Galaxy

Learn all about Vogons, Deep Thought, and Pan Galactic Gargle Blasters in the guide to 'The Hitchhiker's Guide to the Galaxy.'

Do You Like to "Blog"?

Filed under
Web

Some blogs are endless diatribes from people with too much time on their hands, yet others are interesting and news breaking. I personally don't read too much unless they make headlines in revealing some new technology or the like. But if you like to blog or read other's blogs, here might be a site for you.

O'Reilly Releases "Linux Network Administrator's Guide, Third Edition"

Filed under
Linux
Misc

Perhaps it's not a Linux system administrator's bible, but it's nearly so. For a decade, Linux administrators have regularly consulted their own dog-eared but prized copies of this book for the facts and guidance they need to do their jobs. Now in its third edition, the "Linux Network Administrator's Guide" (O'Reilly) by Tony Bautts, Terry Dawson, and Gregor N. Purdy, brings sys admins up to date with an in-depth look at all of the essential networking software and utilities that come with the operating system, including basic infrastructure (TCP/IP, wireless networking, and firewalling) and the other popular services on Linux systems.

Growing Up With Computers

Filed under
Hardware

As another birthday comes closer with its ugly reminder of how short life is, it makes me think of you younger folks.

Because while you grew up with computers, my situation was just the opposite - computers grew up with me.

More in Tux Machines

New in Linux 5.12

  • Linux 5.12 To Allow Voltage/Temperature Reporting On Some ASRock Motherboards - Phoronix

    Voltage, temperature, and fan speed reporting among desktop motherboards under Linux remains one of the unfortunate areas even in 2021... Many SIO ICs remain publicly undocumented and the Linux driver support is often left up to the community and usually through reverse-engineering. Thus the mainline Linux kernel support is left to suffer especially among newer desktop motherboards.

  • [Older] F2FS With Linux 5.12 To Allow Configuring Compression Level

    While the Flash-Friendly File-System (F2FS) allows selecting between your choice of optional compression algorithms like LZO, LZ4, and Zstd -- plus even specifying specific file extensions to optionally limit the transparent file-system compression to -- it doesn't allow easily specifying a compression level. That is fortunately set to change with the Linux 5.12 kernel this spring. Queued now into the F2FS "dev" tree ahead of the Linux 5.12 merge window is a patch that's been floating around for some weeks to allow easily configuring the compression level. The compress_algorithm mount option is expanded to allow also specifying a level, such that the format supported is [algorithm]:[level] should you want to override any level preference like with the LZ4 and Zstd compression algorithms.

Security and Proprietary Software

  • diffoscope 165 released

    The diffoscope maintainers are pleased to announce the release of diffoscope version 165. This version includes the following changes:

    [ Dimitrios Apostolou ]
    * Introduce the --no-acl and --no-xattr arguments [later collapsed to
      --extended-filesystem-attributes] to improve performance.
    * Avoid calling the external stat command.
    
    [ Chris Lamb ]
    * Collapse --acl and --xattr into --extended-filesystem-attributes to cover
      all of these extended attributes, defaulting the new option to false (ie.
      to not check these very expensive external calls).
    
    [ Mattia Rizzolo ]
    * Override several lintian warnings regarding prebuilt binaries in the
    * source.
    * Add a pytest.ini file to explicitly use Junit's xunit2 format.
    * Ignore the Python DeprecationWarning message regarding the `imp` module
      deprecation as it comes from a third-party library.
    * debian/rules: filter the content of the d/*.substvars files

  • SonicWall hardware VPNs hit by worst-case 0-zero-day-exploit attacks

    “…have information about hacking of a well-known firewall vendor and other security products by this they are silent and do not release press releases for their clients who are under attack due to several 0 days in particular very large companies are vulnerable technology companies,” BleepingComputer was told via email.

  • Cyber Firm SonicWall Says It Was Victim of ‘Sophisticated’ Hack

    The Silicon Valley-based company said in a statement that the two products compromised provide users with remote access to internal resources.

    The attackers exploited so-called “zero days” -- a newly discovered software flaw -- on certain SonicWall remote access products, the company said in a statement.

  • Former manager of Microsoft Taiwan investigated for fraud

    A former manager at the Taiwanese branch of software giant Microsoft was questioned Friday (Jan. 22) about an alleged fraud scam directed against the company.

    In 2016 and 2017, Chang Ming-fang (張銘芳) allegedly colluded with managers of other companies to forge orders to obtain discounts and products at lower prices, UDN reported.

  • School laptops sent by government arrive loaded with malware [iophk: Windows TCO]

    A number of the devices were found to be infected with a "self-propagating network worm", according to the forum, and they also appeared to be contacting Russian servers, one teacher wrote. The Windows-based laptops were specifically infected with Gamarue.1, a worm Microsoft identified in 2012.

  • Ransomware provides the perfect cover

    Look at any list of security challenges that CISOs are most concerned about and you’ll consistently find ransomware on them. It’s no wonder: ransomware attacks cripple organizations due to the costs of downtime, recovery, regulatory penalties, and lost revenue. Unfortunately, cybercriminals have added an extra sting to these attacks: they are using ransomware as a smokescreen to divert security teams from other clandestine activities behind the scenes.

    Attackers are using the noise of ransomware to their advantage as it provides the perfect cover to distract attention so they can take aim at their real target: exfiltrating IP [sic], research, and other valuable data from the corporate network.

  • Global ransom DDoS extortionists are retargeting companies

    According to Radware, companies that received this letter also received threats in August and September 2020. Security researchers’ analysis of this new wave of ransom letters suggested that the same threat actors from the middle of 2020 are behind these malicious communications.

    When the DDoS extortion campaign started in August of 2020, a single Bitcoin was worth approximately $10,000. It’s now worth roughly $30,000. The attackers cited this in the latest round of ransom letters, and it represents the impact the rising price of Bitcoin is having on the threat landscape.

    A few hours after receiving the message, organizations were hit by DDoS attacks that exceeded 200 Gbps and lasted over nine hours without slowdown or interruption. A maximum attack size of 237 Gbps was reached with a total duration of nearly 10 hours, the alert warned.

  • Boeing 737 MAX is a reminder of the REAL problem with software | Stop at Zona-M

    And that problem almost never is software.

7 Linux Distros to Look Forward in 2021

Here is a list of most anticipated Linux distributions you should keep an eye on in the year 2021. Read more

Games Leftovers

  • Gaming Like It's 1925: Last Week To Join The Public Domain Game Jam!

    Sign up for the Public Domain Game Jam on itch.io »

  • ujoy(4) added to -current

    With the following commit, Thomas Frohwein (thfr@) added a joystick/gamecontroller driver to -current: [...]

  • The First Online Conference Is Happening Today For The Godot Game Engine - Phoronix

    For those interested in Godot as the premiere open-source 2D/3D game engine or just looking for some interesting technical talks to enjoy this weekend, the first GodotCon Online is today. GodotCon 2021 is the open-source game engine's first entirely online conference for developers, users, and other contributors to this promising open-source project. The YouTube-based event has been running from 8:45 UTC today until 16:00 UTC, but fear not if you missed out as you can already go back and listen to the prior talks in the stream. The recordings will remain available for those wanting to enjoy it in the days ahead. All of the content is free of charge.