Not sure if i buy this, but apparently the same guy that hacked Comodo CA is responsible for the latest DigiNotar attack. http://arstechnica.com/security/news/2011/09/comodo-hacker-i-hacked-diginotar-too-other-cas-breached.ars?utm_source=rss&utm_medium=rss&utm_campaign=rss The hack of Dutch certificate authority DigiNotar already bore many similarities to the break-in earlier this year that occurred at a reseller for CA Comodo. Bogus certificates were issued for webmail systems, …
MANILA — A monster 21-foot (6.4-metre) saltwater crocodile, believed to be the biggest ever captured, has been trapped in the southern Philippines after a spate of fatal attacks, officials said Tuesday. The 1,075-kilogram (2,370-pound) male is suspected of eating a farmer …
I ran across this today as well… this is true.. too much planning and rigid guidelines can lead to a poor solution. I am not minimizing the importance of planning, only the scope. Projects fail all the time because we unwittingly …
I often read Lifehacker on a weekly if not daily basis and this article really spoke to me. I have repeatedly been accused of being lucky in my life. Not just my adult life, but as a child as well. This article may explain that observation by asserting it has more to do with our …
Apple loses another unreleased iPhone http://news.cnet.com/8301-13579_3-20099899-37/apple-loses-another-unreleased-iphone-exclusive/?tag=topStories want to know more on the iphone5? read here: http://www.cnet.com/8301-17918_1-20073431-85/iphone-5-rumor-roundup/?tag=mncol;txt
im not kidding.. we will see where this leads, but check this out: http://h20435.www2.hp.com/t5/The-Next-Bench-Blog/More-TouchPads-on-the-Way/ba-p/68749 more to come
see for yourself http://pastebin.com/ff7Yg663 also read here http://pastebin.com/SwCZqskV If you are a mozilla Firefox user and wish to delete the cert, please see this post http://support.mozilla.com/en-US/kb/deleting-diginotar-ca-cert this is the first known thread that mentioned the posting. http://www.google.co.uk/support/forum/p/gmail/thread?tid=2da6158b094b225a&hl=en Microsoft also posted a prompt response Microsoft Releases Security Advisory 2607712 http://blogs.technet.com/b/msrc/archive/2011/08/29/microsoft-releases-security-advisory-2607712.aspx Google responded in …
Using this you can utilize API’s similar to the commercial cloud providers such as Amazon etc and use whatever Hypervisor you see fit. now part of Citrix, this tool may prove useful to those of you that run your own private cloud. It even allows for provisioning of systems that do not support virtualization , …
ok this is hardly news, but it did catch my eye. Basically this worm is pretty easy to stop. Just have good passwords. No MS vulnerability to worry about, this worm just finds port 3389 open and brute forces a password to get in. once a connection is made, it simply uses the RDP protocols …
No more unrealistic estimations on file operations! its about damn time! For years I’ve sat in awe of the estimated time to copy files as it inexplicably jumped from minutes to hours as it copies files of varying sizes, wondering when i was going to be done. That’s (almost) all going to change, with the arrival …