Why Run Leopard On A PC? A Hacker Explains
In writing an article about how hackers had gotten Apple's new Leopard operating system to run on PCs, I corresponded with the individual responsible for posting a how-to-guide for creating a "hackintosh."
The person who posted the how-to-guide goes by the forum name BrazilMAC and since he responded to my query at length, it seemed appropriate t
Google Takes No Prisoners
Google today began giving its Gmail users access to IMAP, an e-mail protocol that allows users to synchronize their e-mail across multiple devices.
While Google's announcement is likely to be appreciated by users of Apple's iPhone (which supports IMAP) and business users, what's particularly noteworthy about the news is how Keith Coleman, Gmail product manager, describes Google's intentions.
Emergency Services Hack Gets Teen Arrested
Authorities used computer forensics to find and arrest a teenager who allegedly made a false 911 call that resulted in a homeowner staring into the barrels of a SWAT team's assault rifles.
National Research Council Calls For Open Science
The possibility that the United States might lose its edge in technology and research represents one of the greatest risks to national security, claims a former U.S. undersecretary of defense.
SpaMP3 Floods the Net
MP3 audio spam pitching a company called Exit Only is flooding the Internet, say security firms.
VoIP Hack Puts PCs In Peril
A security researcher says attacking VoIP devices over SIP can be difficult, but many of the devices have embedded Web servers that can be hacked using a buffer overflow exploit.
Core Security Adds Web App Security Testing
Version 7.5 adds the ability to test Web applications for SQL Injection and Remote File Inclusion vulnerabilities, two of significant areas of concern for Web applications.
Google And IBM Partner To Push Cloud Computing
To prepare students "to harness the potential of modern computing systems," the companies will provide universities with hardware, software, and services to advance training in large-scale distributed computing.
MSNBC Acquires Social News Site Newsvine
MSNBC is following in the footsteps of other media companies that have bought into socially-oriented Web sites and blogs, including Conde Nast, CNET, News Corp.
Apple DRM Patent Contemplates Media Sharing
Despite its current iTunes retail model, a 2006 patent application shows that Apple has been developing the technical infrastructure for a subscription service for digital content.
Blogs
Why Run Leopard On A PC? A Hacker Explains
In writing an article about how hackers had gotten Apple's new Leopard operating system to run on PCs, I corresponded with the individual responsible for posting a how-to-guide for creating a "hackintosh."
The person who posted the how-to-guide goes by the forum name BrazilMAC and since he responded to my query at length, it seemed appropriate t
Google Takes No Prisoners
Google today began giving its Gmail users access to IMAP, an e-mail protocol that allows users to synchronize their e-mail across multiple devices.
While Google's announcement is likely to be appreciated by users of Apple's iPhone (which supports IMAP) and business users, what's particularly noteworthy about the news is how Keith Coleman, Gmail product manager, describes Google's intentions.
Emergency Services Hack Gets Teen Arrested
Authorities used computer forensics to find and arrest a teenager who allegedly made a false 911 call that resulted in a homeowner staring into the barrels of a SWAT team's assault rifles.
National Research Council Calls For Open Science
The possibility that the United States might lose its edge in technology and research represents one of the greatest risks to national security, claims a former U.S. undersecretary of defense.
SpaMP3 Floods the Net
MP3 audio spam pitching a company called Exit Only is flooding the Internet, say security firms.
VoIP Hack Puts PCs In Peril
A security researcher says attacking VoIP devices over SIP can be difficult, but many of the devices have embedded Web servers that can be hacked using a buffer overflow exploit.
Core Security Adds Web App Security Testing
Version 7.5 adds the ability to test Web applications for SQL Injection and Remote File Inclusion vulnerabilities, two of significant areas of concern for Web applications.
Google And IBM Partner To Push Cloud Computing
To prepare students "to harness the potential of modern computing systems," the companies will provide universities with hardware, software, and services to advance training in large-scale distributed computing.
MSNBC Acquires Social News Site Newsvine
MSNBC is following in the footsteps of other media companies that have bought into socially-oriented Web sites and blogs, including Conde Nast, CNET, News Corp.
Apple DRM Patent Contemplates Media Sharing
Despite its current iTunes retail model, a 2006 patent application shows that Apple has been developing the technical infrastructure for a subscription service for digital content.
|