Quantcast
Channel: Noise
Browsing all 39395 articles
Browse latest View live

LWN.net: Linux Mint downloads (briefly) compromised

The Linux Mint blog announces that the project's web site was compromised and made to point to a backdoored version of the distribution. "As far as we know, the only compromised edition was Linux Mint...

View Article


Image may be NSFW.
Clik here to view.

Медийно право : Apple vs FBI, отговорността на лидерите

Много голям отзвук в интернет има  отвореното писмо на изпълнителния директор  на Apple Тим Кук до потребителите на компанията. То е в отговор на настояването   за достъп до iPhone, който е използван...

View Article


TorrentFreak: Meet the ‘Pirate’ Journalist Hunted By the Music Labels

In 2012, TorrentFreak obtained an IFPI presentation which revealed how the labels had tracked down a music journalist who they claim had been leaking pre-release music. This week we spoke to 'ALEKO'...

View Article

TorrentFreak: Software Piracy Hurts Linux Adoption, Research Finds

New research suggests that software piracy has a detrimental effect on the adoption of Linux desktop operating systems. Piracy is one of the reasons why Windows has been able to maintain its dominant...

View Article

xkcd.com: Twitter Bot

This post was syndicated from: xkcd.com and was written by: xkcd.com. Original post: at xkcd.com

View Article


The diaspora* blog: diaspora* version 0.5.7.0 released

As scheduled, a new minor release following the new release schedule is now released. Over the past six weeks, we have managed to collect 82 commits made by 6 contributors for this minor release....

View Article

Image may be NSFW.
Clik here to view.

Source Code in TV and Films: From 1980 UFO movie “The Return” — part of the…

From 1980 UFO movie “The Return” — part of the scrolling code supposedly determining the time & place in the Universe one would have to be to see a particular constellation formation.

View Article

Errata Security: The disingenuous question (FBIvApple)

I need more than 140 characters to respond to this tweet:If you were a crime victim and key evidence was on suspect's phone, would you want govt to search phone w/ warrant?— Orin Kerr (@OrinKerr)...

View Article


TorrentFreak: Top 10 Most Pirated Movies of The Week – 02/22/16

The top 10 most downloaded movies on BitTorrent are in again. 'Deadpool' tops the chart this week, followed by ‘Creed' 'Victor Frankenstein' completes the top three. Source: TF, for the latest info on...

View Article


GattaNegra's days: Shitty Service (Части за прахосмукачка от ЧУЖБИНА)

Следващите в класацията са Zelmer. Винаги съм била доволна от дистрибутора Densi, понеже уредите им не са супер скъпи и ако ми трябват консумативи – винаги са на линия. Прецаках (аз ли няма!) поредната...

View Article

TorrentFreak: Copyright Holders Move to Block vKontakte, Russia’s Facebook

Social networking giant vKontakte is facing the prospect of being blocked by ISPs in Russia after copyright holders took a complaint to court. According to a local anti-piracy outfit, vKontakte - which...

View Article

Raspberry Pi: Webfoot games for Raspberry Pi

It’s an excellent time to be a Raspberry Pi gamer. After last Monday’s blog post about some great games that are available for Raspberry Pi, Dana Dominiak of Webfoot Games got in touch last week to...

View Article

LWN.net: GNU C Library 2.23 released

Version 2.23 of the GNU C Library (glibc) has been released. The headline feature this time around seems to be Unicode 8.0.0 support; there are a number of API changes, performance improvements and...

View Article


Beyond Bandwidth: Six Ways to Modernize Your WAN

Society has moved beyond smoke signals and carrier pigeons, but given the ever-changing demands on your business, your network may still be in need of some modernization. Businesses are rapidly moving...

View Article

AWS Security Blog: How to Translate HIPAA Controls to AWS CloudFormation...

In my previous post, I walked through the setup of a DevSecOps environment that gives healthcare developers the ability to launch their own healthcare web server. At the heart of the architecture is...

View Article


Lauren Weinstein's Blog: FBI vs. Apple: A New Crypto Commission to Be Ignored?

As new revelations dribble forth regarding the FBI vs. Apple iPhone case, calls are rising in various quarters (both in tech and government) for the creation of Yet Another Commission of Experts to...

View Article

AWS Official Blog: Announcing the AWS Pop-Up Loft in Tel Aviv

The AWS Pop-up Lofts in San Francisco and New York have become hubs and working spaces for developers, entrepreneurs, students, and others who are interested in working with and learning more about...

View Article


LWN.net: Security advisories for Monday

Arch Linux has updated chromium (code execution) and thunderbird (multiple vulnerabilities). Debian has updated chromium-browser (multiple vulnerabilities), didiwiki (unintended access), and xdelta3...

View Article

Image may be NSFW.
Clik here to view.

Errata Security: Band-Aids over Basics: Anti-Drone Bill Revisions Compound...

Glossing over fundamental legislation flaws in favor of quick fixes only serves lawyers and lobbyists.  In this guest post, friend of Errata Elizabeth Wharton (@lawyerliz) highlights the importance of...

View Article

AWS Security Blog: Register for and Attend This March 2 Webinar—Using AWS WAF...

As part of the AWS Webinar Series, AWS will present Using AWS WAF and Lambda for Automatic Protection on Wednesday, March 2. This webinar will start at 10:00 A.M. and end at 11:00 A.M. Pacific Time...

View Article
Browsing all 39395 articles
Browse latest View live