TorrentFreak: Elsevier Cracks Down on Pirated Scientific Articles
Academic publishing company Elsevier has filed a complaint at a New York District Court, hoping to shut down the Library Genesis project and the SciHub.org search engine. The sites, which are...
View ArticleSANS Internet Storm Center, InfoCON: green: Microsoft Patch Tuesday Summary...
Overview of the June 2015 Microsoft Patches and their status. # Affected Contra Indications - KB Known Exploits Microsoft rating(**) ISC rating(*) clients servers MS15-056 Cumulative Security Update...
View ArticleBackblaze Blog | The Life of a Cloud Backup Company: HGST 8TB Drives – Helium...
We recently installed and deployed 45 HGST 8TB hard drives into Backblaze Storage Pod 902 and the drives have recently completed their initial data loading phase. As we have done with Seagate, Western...
View ArticleLWN.net: [$] Obstacles to contribution in embedded Linux
Tim Bird has worked with embedded Linux for many years; during this time he has noticed an unhappy pattern: many of the companies that use and modify open-source software are not involved with the...
View Articlexkcd.com: The Martian
This post was syndicated from: xkcd.com and was written by: xkcd.com. Original post: at xkcd.com
View ArticleSANS Internet Storm Center, InfoCON: green: ISC StormCast for Wednesday, June...
(c) SANS Internet Storm Center. https://isc.sans.edu Creative Commons Attribution-Noncommercial 3.0 United States License.
View ArticleTorrentFreak: Kim Dotcom’s MegaNet Preps Jan 2016 Crowdfunding Campaign
Kim Dotcom's dream of a people-powered, censorship-resistant Internet will rely on the goodwill of supporters to get off the ground. In an announcement this morning, the entrepreneur confirmed that his...
View ArticleSchneier on Security: Should Companies Do Most of Their Computing in the...
Yes. No. Yes. Maybe. Yes. Okay, it's complicated. The economics of cloud computing are compelling. For companies, the lower operating costs, the lack of capital expenditure, the ability to quickly...
View ArticleKrebs on Security: Adobe, Microsoft Issue Critical Security Fixes
Adobe today released software updates to plug at least 13 security holes in its Flash Player software. Separately, Microsoft pushed out fixes for at least three dozen flaws in Windows and associated...
View ArticleRaspberry Pi: Beer and Wine Fridge of Awesomeness
Jamie Bailey from Initial State, the Internet of Things (IoT) data solutions company, recently posted this how-to for creating a Beer/Wine Fridge of Awesomeness: How do you take a perfectly good beer...
View ArticleLWN.net: Security updates for Wednesday
Arch Linux has updated cups (two vulnerabilities). Debian has updated cups (two vulnerabilities). Debian-LTS has updated libapache-mod-jk (information disclosure) and libraw (denial of service)....
View ArticleSchneier on Security: Should Companies Do Most of Their Computing in the...
Let me start by describing two approaches to the cloud. Most of the students I meet at Harvard University live their lives in the cloud. Their e-mail, documents, contacts, calendars, photos and...
View ArticleTorrentFreak: Pirate Party Adopts Torrent Tracker to Fight Legal Pressure
Coppersurfer, one of the largest torrent trackers on the Internet, has been targeted by copyright holders throughout Europe. Most recently, a German court ordered a local hosting provider to hand over...
View ArticleSANS Internet Storm Center, InfoCON: green: VMWare Workstation Guest Escape...
Shared hardware has always been a weakness of virtualization products. In some cases side channel attacks can be exploited to collect information from other virtual machines, or bugs in drivers can be...
View ArticleSANS Internet Storm Center, InfoCON: green: How much is your IPv4 Space...
Thanks to Rob for reminding me of IPv4auction websites again. I looked at them a couple years ago, but there was very little real activity at the time. Looks like that has changed now. ARIN is...
View ArticleLWN.net: Inside NGINX: How We Designed for Performance & Scale
The folks behind the NGINX web server have put up a highly self-congratulatory article on how the system was designed. "NGINX scales very well to support hundreds of thousands of connections per...
View ArticleLWN.net: Huston: Multipath TCP
Geoff Huston has written a lengthy column on multipath TCP. "For many scenarios there is little value in being able to use multiple addresses. The conventional behavior is where each new session is...
View ArticleSchneier on Security: Should Companies Do Most of Their Computing in the...
Cloud computing is the future of computing. Specialization and outsourcing make society more efficient and scalable, and computing isn't any different. But why aren't we there yet? Why don't we, in...
View ArticleDarknet - The Darkside: Agile Security – How Does It Fit Into A World Of...
So, Agile Security? How does it fit into the new age of rapid iteration, continuous integration and continuous development? It’s an interesting discussion and personally very on point for me as I...
View ArticleLWN.net: [$] Resurrecting the SuperH architecture
Processor architectures are far from trivial; untold millions of dollars and many thousands of hours have likely gone into the creation and refinement of the x86 and ARM architectures that dominate...
View Article