- Latest Headlines
- Recent comments
- All-Time Popular Stories
- Hot Topics
- Latest Members
|Story||Mandriva Linux 2010 background contest winners||srlinuxx||2||30/10/2009 - 6:23pm|
|Story||Make Linux faster and lighter||srlinuxx||1||30/10/2009 - 6:21pm|
|Story||Mozilla's messaging story gains credibility||srlinuxx||30/10/2009 - 4:46pm|
|Story||Windows 7 vs. Ubuntu 9.10 - Strengths and weaknesses||srlinuxx||30/10/2009 - 12:46pm|
|Story||The Laptop Renovation Project: Decisions, Conclusions and Lessons Learned||srlinuxx||30/10/2009 - 12:44pm|
|Story||Where the battle lines are drawn||srlinuxx||30/10/2009 - 10:52am|
|Story||AMD Loses Its Linux Core Engineering Manager, Matthew Tippett||srlinuxx||30/10/2009 - 10:50am|
|Story||Measuring performance of GTK theme||srlinuxx||30/10/2009 - 10:48am|
|Story||Round up of recent distro releases||srlinuxx||30/10/2009 - 10:45am|
|Story||Ubuntu can't cut geek support umbilical||srlinuxx||30/10/2009 - 10:43am|
14 million games console owners are still at risk of waking up to find their Xbox has become an ex-box. For when Microsoft issued a safety advisory for Xbox customers last month, it failed to address the underlying problem.
Fraud by third-party merchants could hurt brand integrity, some experts say
John Wocher bought the camera of his dreams from a seller on Amazon.com with nary a second thought, gleefully anticipating its arrival after wiring $4,549 to zShop merchant awesomediscount.com in January.
As February approached, Wocher stepped up the frequency of his e-mails with the seller, asking for the UPS tracking number, his concern growing after he had so amicably arranged the wire transfer from his home in Japan.
When Joanne had a row with a longtime friend last year, she had no idea it would spill into cyberspace.
But what started as a spat at a teenage sleepover swiftly escalated into a three-month harangue of threatening e-mails and defacement of her Web log. "It was a nonstop nightmare," says Joanne, 14, a freshman at a private high school in Southern California. "I dreaded going on my computer."
The Presidential IT Advisory Committee (PITAC) has recommended the federal government sharply increase its spending on cybersecurity R&D and shift the focus to fundamental, long-term solutions to security challenges.
"The IT infrastructure is highly vulnerable to premeditated attacks with potentially catastrophic effects," PITAC warned in a letter submitting the report, titled Cyber Security: A Crisis in Prioritization, to the president. "These vulnerabilities put the nation's entire critical infrastructure at risk."
A bill introduced into the Illinois State House last December would supersede current ESRB ratings when it comes to video games with "violent and sexually explicit" content. The focus would be on isolating games deemed to have content not suitable for those under the age of 18 and would also attach a fine to retailers who violate the restriction on sales of those games.
Although the European Commission's statements are diplomatic to the point of opacity, there's no mistaking what it thinks of the latest turn in the Microsoft antitrust saga. The Commission doesn't think Microsoft's trying hard enough, and it has canvassed widespread industry support to bolster its position. From a Microsoft document unearthed by ZDNet, and still available here [PDF 450kb], we can see why even long time Redmond partners are losing their patience.
Gentoo Linux 2005.0 for x86 is now complete, and we will begin fulfilling x86 pre-orders today! AMD64 and PowerPC should start shipping very shortly as well.
Please note that 2005.0 is not yet available for download on Gentoo mirrors -- the Store is getting 2005.0 a week in advance of it appearing on various Gentoo mirrors worldwide. This is a good thing, as it will give us several days to catch up on Store pre-orders.
Although windows-centric, theregister has published an article on the lessening numbers of "Slammer-style worms". They attribute this decline to "the widespread use of XP SP2 and greater use of personal firewall" rendering "worms far less potent in the same way that boot sector viruses died out with Windows 95 and the introduction of Office 2000 made macro viruses far less common."
secunia.com has published "some vulnerabilities have been reported in the Linux kernel. One has an unknown impact, and the others can be exploited to cause a DoS (Denial of Service) and potentially compromise a vulnerable system."
In response to that judge's decision in a Santa Clara County Superior Court to force the producers of the Mac blogs to reveal their sources in that apple law suite, theinquirer has quoted a very interesing article from Wendy M. Grossman on the subject of journalists and their rights to protect sources as it applies to bloggers. She cites many professionally paid and respected journalists publish blogs to the net everyday and asks are those not consider real news? The underlying premise...
TheWeblogProject premieres a revolutionary and innovative way to movie production, and one which according to its creators, may seriously start to challenge Hollywood in the near future.
TheWeblogProject is in fact the first grassroots film that will be freely distributed, via the Internet and via those very P2P networks seen today as the major threats to Hollywood own sustainability.
TheWeblogProject is the first movie in which everyone can actively participate by sending in video clips.
"some of you are probably rubbing your eyes, but you read it correctly. unix on a motorcycle.
a fellow by the name of ben installed a freebsd powered pc into his kawasaki z1000. a webcam on his helmet connects to a video capture board in the pc, which he uses to record movies of trips to the burrito store. his future plans are to have the freebsd box control his ipod, track gps data, and potentially interconnect with the bike’s ecu."
Story and links on hackaday.
An article on theinquirer leads to a report detailing the arrest of "hundreds of people across two continents [...] in a Spanish-led operation to break a child pornography ring operating via the internet."
BBC news has posted an article relating a study "by security researchers who have spent months tracking more than 100 networks of remotely-controlled machines. They discovered 'bot nets [were]used to launch 226 distributed denial-of-service attacks on 99 separate targets.'"
zdnet has a nice little article covering KDE 3.4 accessibility features. They say, "An improved colour scheme and a tool that reads out text should make KDE Linux desktop more usable for those whose vision is impaired."
"It's a huge improvement in accessibility," said Matthias Dalheimer, a KDE developer. "There is a new screen reading technology for visually impaired people and a much better colour scheme with icons that have a high contrast."
Sebastian Krahmer has reported a vulnerability in KDE, which can be exploited by malicious, local users to cause a DoS (Denial of Service).
The vulnerability is caused due to an error in the authentication process in the DCOP (Desktop Communication Protocol) daemon dcopserver. This can be exploited to lock the dcopserver for arbitrary local users. Successful exploitation may result in decreased desktop functionality for the affected user.
The vulnerability has been reported in versions prior to 3.4.
Solution: Upgrade to KDE 3.4 or apply patch.
Click for more information and links to patches.
Original information on dot.kde.org.
Cyber-security in the US is "nearly failing" and has been given a "must try harder" D+ rating by the Federal government.
The US Office of Management and Budget set forth cyber-security standards in the Federal Security Management Act 2002, encouraging federal agencies to tighten their IT systems.
Defined as a network transparent contemporary desktop environment for UNIX workstations similar to the desktop environments found under the MacOS or Microsoft Windows, KDE provides an easy-to-use highly customizable integrated graphical interface for today's most demanding tasks. These include email communication, newsgroup participaton, web surfing, instant messaging, graphic design and manipulation, multimedia capabilities thru audio and video applications, system monitoring, file managing, and even software package handling. Today we will look at the latest incarnation.
AMD today announced that the U.S. Environmental Protection Agency (EPA) awarded AMD's Cool'n'Quiet(TM) technology with an ENERGY STAR(R) Certificate of Recognition for advancing computer energy efficiency. All AMD Athlon(TM) 64 desktop processors have the innovative Cool'n'Quiet technology, a system-level feature that lowers the power consumption of a computer whenever maximum performance is not needed. AMD received the certificate on March 15 in conjunction with the 2005 ENERGY STAR Awards Ceremony in Washington, D.C.