Archive

Posts Tagged ‘computer’

Ask Slashdot: Using a Tablet As a Sole Computing Device?

January 5th, 2013 01:48 admin View Comments

Handhelds

cashman73 writes “My mother’s six year old desktop computer finally bit the dust due to an electrical surge. It’s out-of-warranty, and not really worth fixing. Plus, I’m 2,500 miles and two time zones away, so I can’t exactly troubleshoot things from here. I recently got a new tablet, and even 80% of the things I do are done easier with it. Plus, she really likes the size, convenience, portability, and the screen. Virtually everything she does is simple web browsing, email, light photo sharing but no heavy editing, and other simple tasks. We’re thinking that using a tablet as her sole ‘computer’ might be the best solution here. What are other Slashdotter’s experiences using tablets without a separate desktop computer?”

Source: Ask Slashdot: Using a Tablet As a Sole Computing Device?

Antivirus Software Performs Poorly Against New Threats

January 2nd, 2013 01:11 admin View Comments

Security

Hugh Pickens writes “Nicole Perlroth reports in the NY Times that the antivirus industry has a dirty little secret: antivirus products are not very good at stopping new viruses. Researchers collected and analyzed 82 new computer viruses and put them up against more than 40 antivirus products, made by top companies like Microsoft, Symantec, McAfee and Kaspersky Lab and found that the initial detection rate was less than 5 percent (PDF). ‘The bad guys are always trying to be a step ahead,’ says Matthew D. Howard, who previously set up the security strategy at Cisco Systems. ‘And it doesn’t take a lot to be a step ahead.’ Part of the problem is that antivirus products are inherently reactive. Just as medical researchers have to study a virus before they can create a vaccine, antivirus makers must capture a computer virus, take it apart and identify its ‘signature’ — unique signs in its code — before they can write a program that removes it. That process can take as little as a few hours or as long as several years. In May, researchers at Kaspersky Lab discovered Flame, a complex piece of malware that had been stealing data from computers for an estimated five years. ‘The traditional signature-based method of detecting malware is not keeping up,’ says Phil Hochmuth. Now the thinking goes that if it is no longer possible to block everything that is bad, then the security companies of the future will be the ones whose software can spot unusual behavior and clean up systems once they have been breached. ‘The bad guys are getting worse,’ says Howard. ‘Antivirus helps filter down the problem, but the next big security company will be the one that offers a comprehensive solution.’”

Source: Antivirus Software Performs Poorly Against New Threats

FSF Does Want Secure Boot; They Just Want It Under User Control

December 30th, 2012 12:16 admin View Comments

DRM

Yesterday, we ran a story with the headline “Free Software Foundation Campaigning To Stop UEFI SecureBoot.” It’s more complicated than that, though, writes gnujoshua: “We want computer manufacturers to implement Secure Boot in a way that is secure. If a user can’t disable Secure Boot and they are unable to sign their own software (e.g., bootloader, OS, etc), then we call that particular implementation ‘Restricted Boot.’ We don’t want computer makers to implement Restricted Boot. We want them to implement Secure Boot and to provide a way for individuals to install a fully free OS on their computers. Many computer makers are implementing UEFI Secure Boot in this way, and we want to continue encouraging them to do so.” The complete text of the statement they’d like people to sign reads: “We, the undersigned, urge all computer makers implementing UEFI’s so-called “Secure Boot” to do it in a way that allows free software operating systems to be installed. To respect user freedom and truly protect user security, manufacturers must either allow computer owners to disable the boot restrictions, or provide a sure-fire way for them to install and run a free software operating system of their choice. We commit that we will neither purchase nor recommend computers that strip users of this critical freedom, and we will actively urge people in our communities to avoid such jailed systems.”

Source: FSF Does Want Secure Boot; They Just Want It Under User Control

Mobile Raspberry Pi Computer: Build Your Own Pi-to-Go

December 22nd, 2012 12:29 admin View Comments

Handhelds

An anonymous reader writes “Everyone has seen Raspberry Pi Computer, the credit card sized mini PC circuit board that costs only $35. Now there is a new Mobile Raspberry Pi called Pi-to-Go, with a mini LCD, 10-hour battery, and 64GB SSD, all packed together in a 3D printed case. See if you are up to the task to build your own.”

Source: Mobile Raspberry Pi Computer: Build Your Own Pi-to-Go

Hacker Behind Leaked Nude Celebrity Photos Gets 10 Years

December 18th, 2012 12:01 admin View Comments

Crime

wiredmikey writes “A U.S. judge sentenced a computer hacker to 10 years in prison on Monday for breaking into the email accounts of celebrities and stealing private photos. The hacker accessed the personal email accounts and devices of stars including Scarlett Johansson, Christina Aguilera and Renee Olstead, among dozens of other people he hacked. The hackers arrest in October 2011 stemmed from an 11-month investigation into the hacking of over 50 entertainment industry names, many of them young female stars. Hacked pictures of Johansson showed her in a state of undress in a domestic setting. Aguilera’s computer was hacked in December 2010, when racy photos of her also hit the Internet. Mila Kunis’ cell phone was hacked in September that year with photos of her, including one in a bathtub, spread online. According to the FBI, the hacker used open-source, public information to try to guess a celebrity’s email password, and then would breach the account.”

Source: Hacker Behind Leaked Nude Celebrity Photos Gets 10 Years

Adam Lanza Destroyed His Computer Before Rampage

December 17th, 2012 12:52 admin View Comments

Crime

Hugh Pickens writes writes “Here’s some breaking news I saw MSNBC this morning that I haven’t seen reported anywhere in the print media yet. NBC reporter Pete Williams reported on Chuck Todd’s The Daily Rundown that (police) ‘had been hopeful that they could extract some information from the computer at (Lanza’s) home. He was very into computers. Before he left his mother’s house on the morning that he shot his mother while she was sleeping, he damaged extensively his computer. He took the hard drive out, pulled the disk out, and did a lot of damage to it,’ said Williams. ‘It’s not clear that (police) are going to be able to extract any information or not.’ It has previously been reported that Lanza left no online footprint. Police had been eager to examine Lanza’s computer in hopes of determining a motive in his killings or finding records of purchases of firearms and ammunition. ‘If he visited certain websites, they are going to glean whatever information they can from that and see what it means,’ said the source, who spoke on the condition of anonymity because he is not authorized to discuss the investigation publicly. ‘Does he have friends he communicates with online? Was there a fight with somebody?’”

Source: Adam Lanza Destroyed His Computer Before Rampage

First Photos and Video of Raspberry Pi Model A

December 14th, 2012 12:49 admin View Comments

Hardware

coop0030 writes “The first photos and videos of the Model A production samples are now available. The Raspberry Pi Model A is the newest low-cost computer from the Raspberry Pi Foundation. Compared to the popular Model B, the Model A forgoes the Ethernet Controller, has 256MB of RAM, and has a single USB port. A benefit of the missing Ethernet controller is that power consumption is reduced. This allowed them to reach their goals of a low-cost $25 computer. The release date is for sometime early in 2013.”

Source: First Photos and Video of Raspberry Pi Model A

No Charges In UK For Gary McKinnon

December 14th, 2012 12:34 admin View Comments

United Kingdom

clickclickdrone sends this news from the BBC: “Computer hacker Gary McKinnon, who is wanted in the U.S., will not face charges in the U.K., the Crown Prosecution Service has said. Director of Public Prosecutions Keir Starmer QC said the chances of a successful conviction were ‘not high.’ He announced the decision some three months after Home Secretary Theresa May stopped the extradition. Mr. McKinnon, 46, admits accessing U.S. government computers but says he was looking for evidence of UFOs. The U.S. authorities tried to extradite him to face charges of causing $800,000 (£487,000) to military computer systems and he would have faced up to 60 years in prison if convicted.”

Source: No Charges In UK For Gary McKinnon

Happy Birthday To Ada Lovelace, the First Computer Programmer

December 10th, 2012 12:01 admin View Comments

Programming

First time accepted submitter MrBeeudoublez writes “Honored by a Google Doodle, Ada Lovelace is the first computer programmer. From the article: ‘Ada’s life as a member of British society (first as the daughter of Lord Byron, and later as the wife of the Count of Lovelace), brought her into contact with Charles Babbage, whose concepts for mechanical calculating machines (early computers) she took a great interest in. Ultimately, her work on explaining Babbage’s design for the Analytical Engine resulted in her being credited as the first true computer programmer in history, even if the computer she programmed for was not actually built until 2002.’”

Source: Happy Birthday To Ada Lovelace, the First Computer Programmer

How To Use a Linux Virtual Private Server

December 10th, 2012 12:27 admin View Comments

Open Source

Nerval’s Lobster writes “Game developer David Bolton writes: ‘For my development of Web games, I’ve hit a point where I need a Virtual Private Server. (For more on this see My Search for Game Hosting Begins.) I initially chose a Windows VPS because I know Windows best. A VPS is just an Internet-connected computer. “Virtual” means it may not be an actual physical computer, but a virtualized host, one of many, each running as if it were a real computer. Recently, though, I’ve run into a dead end, as it turns out that Couchbase doesn’t support PHP on Windows. So I switched to a Linux VPS running Ubuntu server LTS 12-04. Since my main desktop PC runs Windows 7, the options to access the VPS are initially quite limited, and there’s no remote desktop with a Linux server. My VPS is specified as 2 GB of ram, 2 CPUs and 80 GB of disk storage. The main problem with a VPS is that you have to self-manage it. It’s maybe 90% set up for you, but you need the remaining 10%. You may have to install some software, edit a config file or two and occasionally bounce (stop then restart) daemons (Linux services), after editing their config files.’”

Source: How To Use a Linux Virtual Private Server