Quantcast
Channel: Noise
Browsing all 39395 articles
Browse latest View live

Image may be NSFW.
Clik here to view.

AWS Security Blog: How to Automate HIPAA Compliance (Part 1): Use the Cloud...

The United States healthcare ecosystem is highly complex. It is composed of review boards, regulating bodies, government agencies, pharmaceutical companies, insurance payers, and a mix of public and...

View Article


LWN.net: Wielaard: Looking forward to GCC6 – Many new warnings

Mark Wielaard writes about some of the many new compiler warnings provided by the GCC6 release. "My favorite is still -Wmisleading-indentation. But there are many more that have found various bugs....

View Article


LWN.net: Security updates for Monday

Arch Linux has updated firefox (same-origin restriction bypass) and nghttp2 (denial of service). Debian has updated iceweasel (denial of service), postgresql-9.1 (three vulnerabilities), and...

View Article

TorrentFreak: Cox Refuses to Spy on Subscribers to Catch Pirates

Cox Communications is objecting to a broad permanent injunction requested by music publisher BMG. The music group wants the ISP to spy on its subscribers and take action against those who download...

View Article

AWS Official Blog: AWS Week in Review – February 8, 2016

Let’s take a quick look at what happened in AWS-land last week: Monday February 8 We announced that Amazon Redshift Now Supports Appending Rows to Tables and Exporting Query Results to BZIP2-compressed...

View Article


LWN.net: Secret Lab: It’s OK to abandon your project (Opensource.com)

Opensource.com covers a linux.conf.au talk by Paris Buttfield-Addison and Jon Manning of Secret Lab. "Secret Lab participates in hackathons to subtly subvert that mission by making interesting games...

View Article

Errata Security: Fscking Visual Studio Code JS Hello World

The reason Linux never succeeded on the desktop is the lack of usability testing. Open-source programmers hate users, and created such an ugly baby that only a fanboy could love it. It's funny watching...

View Article

Source Code in TV and Films: coding lesson in Serial Experiments Lain ep1

coding lesson in Serial Experiments Lain ep1

View Article


TorrentFreak: Steal This Show S01E06: Revolutionizing Hollywood

Today we bring you the sixth episode of the Steal This Show podcast, with feature guest Lance Weiler. In this episode we discuss upsides of piracy and how digital distribution revolutionized indie...

View Article


TorrentFreak: Kanye West’s The Life of Pablo Sparks Piracy Craze

Kanye West's latest album is making headlines in the news, and this buzz is directly translating to various pirate site. Over a half million people have downloaded a pirated copy of The Life of Pablo a...

View Article

Errata Security: We’ve always been at war with Eastasia

Our media is surprisingly Orwellian, and it's not always due to government control. People practice "doublethink" at their own volition, without a Thought Police. Social media (Twitter, Facebook) are...

View Article

Schneier on Security: Fear and Anxiety

More psychological research on our reaction to terrorism and mass violence: The researchers collected posts on Twitter made in response to the 2012 shooting attack at Sandy Hook Elementary School in...

View Article

Raspberry Pi: A Raspberry Pi-controlled book scanner

Today we’ve an excellent project from our forums to share with you: Jonathon Duerig, known as duerig on the forums, posts about the standalone book scanner he has built, controlled by a Raspberry Pi 2...

View Article


TorrentFreak: Singapore Court Orders Country’s First Pirate Site Blockade

Solarmovie.ph will become the first piracy website to be blocked on copyright grounds by Internet service providers in Singapore. Legislation targeting pirate sites was introduced in 2014 but progress...

View Article

Krebs on Security: The Great EMV Fake-Out: No Chip For You!

Many banks are now issuing customers more secure chip-based credit cards, and most retailers now have card terminals in their checkout lanes that can handle the "dip" of chip-card transactions (as...

View Article


Darknet – The Darkside: LNHG – Massive Web Fingerprinter (mwebfp)

The LowNoiseHG (LNHG) Massive Web Fingerprinter was conceived in July 2013 after realizing the usefulness of webserver screenshots to pentesters, during an engagement with large external or internal IP...

View Article

LWN.net: A remote code execution vulnerability in glibc

The Google Online Security Blog discloses a security issue in the GNU C library; a fix, workarounds, and a proof-of-concept exploit are all provided. "The glibc DNS client side resolver is vulnerable...

View Article


Backblaze Blog | The Life of a Cloud Backup Company: Hard Drive Reliability...

By the end of 2015, the Backblaze datacenter had 56,224 spinning hard drives containing customer data. These hard drives reside in 1,249 Backblaze Storage Pods. By comparison 2015 began with 39,690...

View Article

AWS Official Blog: AWS Webinars for February & Early March 2016

Last month I challenged you to learn something new in 2016 and offered up our January webinar series as a starting point. We’ve put together another strong lineup for February and I’d like to share it...

View Article

LWN.net: Security advisories for Tuesday

Debian has updated eglibc (multiple vulnerabilities), glibc (multiple vulnerabilities), graphite2 (three vulnerabilities), and libgcrypt11 (key leak). Debian-LTS has updated xdelta3 (code execution)....

View Article
Browsing all 39395 articles
Browse latest View live