Quantcast
Channel: Noise
Browsing all 39395 articles
Browse latest View live

TorrentFreak: When Authors Demand Payment For Every Copy, They Advocate...

Yes, really. There's a whole lot of confusion in the dangerous and wrong cliché that "authors must be paid" for every copy that's made. We live in a market economy for good reasons.Source:...

View Article


xkcd.com: Watson Medical Algorithm

This post was syndicated from: xkcd.com and was written by: xkcd.com. Original post: at xkcd.com

View Article


TorrentFreak: Top 10 Most Pirated Movies of The Week – 12/21/15

The top 10 most downloaded movies on BitTorrent are in again. 'The Intern.' tops the chart this week, followed by ‘The Peanuts Movie' 'Pan' completes the top three.Source: TorrentFreak, for the latest...

View Article

TorrentFreak: The Hateful Eight and The Revenant Screeners Leaked Online

High quality copies of some of the year's most anticipated movies have begun leaking to torrent sites. Screeners of The Hateful Eight and The Revenant leaked before their theatrical release, with one...

View Article

LWN.net: Kernel prepatch 4.4-rc6

The 4.4-rc6 kernel prepatch is out. "Things remain fairly normal. Last week rc5 was very small indeed, this week we have a slightly bigger rc6. The main difference is that rc6 had a network pull in it."

View Article


Raspberry Pi: Star Wars Carnival (no spoilers!)

We went to see The Force Awakens on Friday. (Short review: it’s terrific and you should go and see it.) The comments here are a spoiler-free zone: comments which give away any of the plot will be...

View Article

Schneier on Security: Back Door in Juniper Firewalls

Juniper has warned about a malicious back door in their firewalls that automatically decrypts VPN traffic. It's been there for years. Hopefully details are forthcoming, but the folks at Hacker News...

View Article

LWN.net: Cracking Linux with the backspace key?

Anybody who has been paying attention to the net over the last week or so will certainly have noticed an abundance of articles with titles like "How to hack any Linux machine just using backspace"....

View Article


AWS Official Blog: AWS Week in Review – December 7, 2015

Let’s take a quick look at what happened in AWS-land last week: Monday December 7 We announced Instance Protection for Auto Scaling. We announced Encryption at Rest for Amazon Aurora. I published AWS...

View Article


Linux How-Tos and Linux Tutorials: How to convert packages between .deb and .rpm

Unfortunately, and after years of development in every part of the free software that we enjoy, there are still two primary types of software package available in GNU/Linux systems. The one is the .deb...

View Article

Image may be NSFW.
Clik here to view.

AWS Security Blog: AWS ISO 27001 Certification Increases Total In-Scope...

AWS has just completed our annual audit of ISO 27001, a certification we achieved back in 2010. 10 new services are now in scope under ISO 27001:   Amazon CloudFront Amazon EC2 Container Service (ECS)...

View Article

Darknet – The Darkside: PowerSploit – A PowerShell Post-Exploitation Framework

PowerSploit is a collection of Microsoft PowerShell modules that can be used to aid penetration testers during all phases of an assessment. Basically PowerSploit is a PowerShell Post-Exploitation...

View Article

Let's Encrypt - Free SSL/TLS Certificates: OVH Sponsors Let’s Encrypt

We’re pleased to announce that OVH has become a Platinum sponsor of Let’s Encrypt. According to OVH CTO and Founder Octave Klaba, “OVH is delighted to become a Platinum sponsor. With Let’s Encrypt, OVH...

View Article


LWN.net: Security advisories for Monday

CentOS has updated jakarta-commons-collections (C5: code execution). Debian has updated blueman (privilege escalation) and tomcat8 (Security Manager bypass). Fedora has updated bind (F23: two...

View Article

TorrentFreak: Hackers Grab Deluge and qBitTorrent User Databases

The websites of the torrent clients Deluge and qBittorrent, as well as the torrent site SumoTorrent, have reportedly been compromised. Access to the stolen user information including emails and hashed...

View Article


Schneier on Security: “The Medieval Origins of Mass Surveillance”

This interesting article by medieval historian Amanda Power traces our culture's relationship with the concept of mass surveillance from the medieval characterization of the Christian god and how piety...

View Article

Backblaze Blog | The Life of a Cloud Backup Company: VP of B2 Sales: Return...

Following the trend of founders coming back to their companies (Alexis Ohanian to Reddit, and Jack Dorsey to Twitter), Backblaze is thrilled to have one of our founding team join us again. Nilay Patel...

View Article


Lauren Weinstein's Blog: A Proposal for Dealing with Terrorist Videos on the...

As part of the ongoing attempts by politicians around the world to falsely demonize the Internet as a fundamental cause of (or at least a willing partner in) the spread of radical terrorist ideologies,...

View Article

Matthew Garrett: GPL enforcement is a social good

The Software Freedom Conservancy is currently running a fundraising program in an attempt to raise enough money to continue funding GPL compliance work. If they don't gain enough supporters, the...

View Article

AWS Official Blog: AWS Week in Review – December 14, 2015

Let’s take a quick look at what happened in AWS-land last week: Monday December 14 We announced Encrypted EBS Boot Volumes. We updated the DynamoDB Backend for Titan to Version 1.0. We announced that...

View Article
Browsing all 39395 articles
Browse latest View live