1. Busybox takes another step up GPL protection ladder

    Date: 12/19/07 (Open Source)    Keywords: software

    The deal piles the pressure on Verizon to settle, but the terms of the agreement, while manageable by Monsoon and Xterasys, may prove onorous to a phone company which harps on how "unapproved" software can damage its network.

    Source: http://feeds.feedburner.com/~r/zdnet/open-source/~3/202754216/

  2. Antivirus firm: Google text ad Trojan detected

    Date: 12/19/07 (Security)    Keywords: software, virus, antivirus, web, google

    BitDefender says ads placed by Google on Web pages were being hijacked by Trojan software, redirecting inquiries to rogue server. Advertisements placed by Google in Web pages are being hijacked by so-called Trojan horse software that replaces the intended text with ads from a different provider, Romanian antivirus...

    Source: http://news.zdnet.com/2100-1009_22-6223511.html

  3. IBM buys database software firm Solid Information

    Date: 12/21/07 (Data Management)    Keywords: software, technology, database

    Deal expected to close in early 2008; financial details not disclosed. International Business Machines said on Friday it has agreed to buy in-memory database software provider Solid Information Technology from private owners for an undisclosed sum. Solid's largest owners were private equity firms Apax Partners and CapMan. ...

    Source: http://news.zdnet.com/2110-3513_22-6223858.html

  4. Developer-friendly Hosting?

    Date: 12/22/07 (PHP Community)    Keywords: php, programming, mysql, software, database, sql, postgresql, web, hosting

    Hello Friends

    I am interested in exploring web programming via Lisp, Ruby on Rails, and several of the popular Python frameworks.

    Here are the features I am interested in:

    * Lisp hosting including access to web servers and/or mod_lisp
    * Ruby on Rails hosting
    * Python hosting
    * Configurable source control repository with public and private areas (SVN/Trac or better)
    * SSH access
    * MySQL or PostgreSQL database
    * PHP support (for third-party software packages)

    Has anyone here had similar needs? Would you recommend any particular hosting solution?

    Thanks,
    '[info]'jkndrkn

    Source: http://community.livejournal.com/php/605765.html

  5. .NET Remoting on port 80 -- reasonable?

    Date: 12/29/07 (C Sharp)    Keywords: software, xml, database, asp, web, linux, hosting, microsoft

    All,

    As those of us who have worked with attempting to make any logically partitioned/layered OO schema work between .NET client applications and WebServices know, it's simply not possible without going far out of your way to do a lot of extra work that the elegant OO inheritance/extension was supposed to alleviate anyway. When I am especially irked about this issue, I will construct job interviews with the following two questions spaced one after the other:

    n) Do you consider yourself a fully object-oriented developer, familliar with the concepts of inheritance, extension, abstract classes, interfaces, with the ability to both understand and work with the boundaries/"layers"/"tiers" between classes for a given software project (e.g. Database/Business Objects/User Interface)?

    m) If so, what do you consider the most effective way to transmit an instance or instances of a business object from one .NET application to another (either client -> server or server -> client)?

    The answers are invariably n) Absolutely, yes, I am God's gift to rational software development; and m) [whirr-clunk as Microsoft gears engage within brain] Using disconnected System.Data.DataSets since they're already XmlSerializable!

    Always gives me a laugh. Nevermind that employing such an approach basically necessitates the creation of a FOURTH boundary/"layer"/"tier" -- call it Middleware, or specifically in this hideous world, Serialization/Deserialization.

    Anyway, on to my question!

    Due to the headaches raised by the above subject, and the deeper object replication that goes on using .NET Remoting (e.g. regardless of what is actually transmitted down the wire, you get a complete, functional, fully type-specific object with its public/private members/properties/methods intact, with NO Reference.cs or any other whiz-bang class-redefinition machinery thrown in your face), I come upon a quandary.

    In my mind, at least up til the present moment, .NET Remoting is great for applications over whose general operational control you or your company or your trusted partner will maintain for the lifecycle of said application. With this kind of organizational scenario, routers and firewalls are generally surmountable, or at least negotiable, obstacles, since you know exactly from which machine(s) or subnet(s) certain TCP packets will be sent, and exactly to which machine(s) or subnet(s) those packets will be transmitted, and on what TCP port(s).

    .NET WebServices, on the other hand, are a better choice for software with an eventual goal of wider distribution to CUSTOMERS rather than colleagues or partners -- entities whose firewalls you do not control, and who will regard something as little as a request as to its status wrt your application's performance as reflecting an incredibly unprofessional design. In other words, it's not much of a limit to place on your customers that they can transmit HTTP over port 80, and/or HTTPS over port 443.

    But, as I finish up the previous 4 hours of banging my head into various WebService-related walls attempting to get class instances (or even just their public data -- I know how WebServices work and I understand it's for good reason) to replicate, I have to wonder -- what kinds of problems might there be lurking in, say, a widespread commercial application, some of whose clients employ .NET Remoting to communicate with their remote servers using TCP port 80? I don't see any particular *TECHNICAL* problems that are unsurmountable -- obviously, as usage scales, there will be more of a hassle doing load-balancing types of activities compared to, say, turning on IIS clustering and walking away. But that's a problem that is entirely out-of-scope for me -- if I get there with the subject of this question, and it's my biggest problem, I will be very happy.

    Anyone consider or try this in a relatively large/Enterprise-level "ASP" (in its original disambiguation, that is, an Application Service Provider hosting the requests of potentially hundreds or thousands or more clients) environment? I pulled the better part of a decade as a systems/network admin and general TCP/IP geek (UNIX/Linux), so I know that, at least as of ~2003, you couldn't tell your router (unless it had more processors than most mainstream servers in 2007) to ONLY allow traffic fitting the profile of HTTP requests out on port 80. So I don't really see any technical problems.

    However, any feedback is welcome. Thanks for reading this -- my fingers tend to run away from me. :)

    Source: http://community.livejournal.com/csharp/90393.html

  6. New Computer Security Conference

    Date: 12/31/07 (Algorithms)    Keywords: software, technology, asp, security



    We are excited to announce SOURCE Boston, a new computer security conference taking place in Boston, Massachusetts on March 12-14, 2008. SOURCE combines business, technology, and software development, and provides security experts an opportunity to share ideas, insights and opportunities.

    SOURCE Boston will include the following:

    * An intimate setting provides opportunities for networking, focused conversations, opportunities to converse with speakers and industry thought leaders
    * Top keynote speakers, including Steven Levy, Dan Geer, and Richard Clarke.
    * Special VIP evening reception
    * First con to combine the edginess and creativity of hacking with the professionalism of the business environment.
    * First computer security conference to have a track devoted to application security
    * Combines industry and professional sessions with edgy fun approaches
    * First L0pht reunion in ten years
    * Business track will include talks from chief executives and other key members of the management community
    * SOURCE Boston is organized by key industry thought leaders, including former founders of @stake, professionally published security research experts, and former NSA employees
    * SOURCE Boston takes place the week before St Patrick’s Day – one of the most exciting times to be in Boston. Additionally, the Hyatt rate will be extended into the weekend so attendees can experience Boston’s St. Patrick’s Day celebrations.


    Additional speakers include:
    * Matthew Moynahan, CEO of Veracode
    * James Mobley, CEO of Neohapis and former CEO of @stake
    * Andy Jaquith, Yankee Group
    * Cedric Blancher, EADS
    * Robert Martin, MITRE
    * Senior Members and Founders oof Cult of the Dead Cow
    * Michael Rash, Author and Security Researcher

    Cost:
    $895 per person
    $195 student/volunteer rate

    We are also looking for volunteers to assist us during the con. Please email info@sourceboston.com for more information.

    HTTP://WWW.SOURCEBOSTON.COM

    Please go to http://www.regonline.com/Checkin.asp?EventId=167940 to purchase tickets.

    See you in March!

    Source: http://community.livejournal.com/algorithms/96641.html

  7. As always, my stupid questions

    Date: 01/02/08 (Computer Help)    Keywords: software, virus, spyware

    Xposted to computersupport

    1. I bought a desktop from an old friend who failed to tell me until after I purchased it that he installed windows XP with his old software, meaning I couldn't install service packs. What a friend right? Anyways, how do I go about making this a legit copy, and will it delete everything I have on my computer currently?

    2. Randomly the other day my computer started getting heinous internet explorer popups. I never even use IE! I tried going to add/remove programs to delete IE but it isn't listed. I think it started after the boyfriend installed some torrent downloading thing and put some music on the computer. Could it go away if I simply delete the software and the songs he downloaded, or has it embedded itself deeper in my files? I'm running Spybot and it finds and removes about 10 files every startup, but it can't delete one file called something like Virtuco....somethingsomethingsomething. What other spyware adware virus programs should I try?

    And again, I apologize for the absolutely retarted questions =P

    Source: http://community.livejournal.com/computer_help/852784.html

  8. Sorry for the Dumb Question

    Date: 01/01/08 (Computer Help)    Keywords: software

    Okay. My dad has purchased a new computer and wishes to transfer his old files and software from the old one onto it. Here's the catch. We don't have the installation cds and the like for some of the programs. Since we're not exactly the technologically savvy, we don't know how to do this.

    The question then is this. How do we transfer programs from one computer to the next without the installation cds? Or is that even possible?

    Please help. Please.

    Source: http://community.livejournal.com/computer_help/852482.html

  9. Say "No!" to bundled apps!

    Date: 01/02/08 (Security)    Keywords: software

    You've gotta be careful when you install software nowadays - you install one thing and you end up with a couple of applications that you didn't expect to get.  Welcome to the world of applications bundling, and it seems that everyone is doing it nowadays. Over the...

    Source: http://blogs.zdnet.com/hardware/?p=1103

  10. Video-photo file

    Date: 01/02/08 (Software)    Keywords: software

    Hello All,

    I was wondering if you could help me. I'd like to put together a file made of videos and photographs. Can you suggest an easy software to use?

    Source: http://community.livejournal.com/software/78068.html

  11. Ransomware fun: Pay by phone extortion (these guys can't spell either)

    Date: 01/02/08 (Security)    Keywords: software

    A Trojan is delivering an unpleasant surprise: Ransomware that takes over your desktop unless you fork over $35. The trojan--Backdoor.Win32.Delf.ctk--was highlighted Dec. 31 by Sunbelt Software with a screenshot walkthrough. First you get a warning--of course it's spelled wrong since hackers don't use spell check. The message: ...

    Source: http://blogs.zdnet.com/security/?p=775

  12. Data integration demand will grow in 2008

    Date: 01/03/08 (Data Management)    Keywords: software

    Software that integrates data with applications is expanding at a rapid pace but the cost of these projects that require custom code is skyrocketing also. XAware's Bill Miller has ideas to keep it under control. Commentary--The demand for software that integrates data with applications is expanding at a rapid...

    Source: http://news.zdnet.com/2424-9595_22-181807.html

  13. Sony BMG to drop copy protection for downloads

    Date: 01/07/08 (Security)    Keywords: software

    Hoping to boost digital sales, Sony BMG finally will join EMI, Warner Music Group and Universal Music Group in dropping DRM. Sony BMG Music Entertainment, the world's second-largest music company, will this month become the last of the big four majors to drop copy protection software on music...

    Source: http://news.zdnet.com/2100-9588_22-6224807.html

  14. Is McAfee just asking for a lawsuit?

    Date: 01/08/08 (Open Source)    Keywords: software

    McAfee stock is down 25% because, it seems, they're just asking to be sued. A carefully written shareholder's letter seems to say the company may have become infected with some GPL software, making it subject to that license's requirements

    Source: http://feeds.feedburner.com/~r/zdnet/open-source/~3/213217405/

  15. McAfee claims open source legal concerns are much ado about nothing

    Date: 01/09/08 (Open Source)    Keywords: software, security

    McAfee says concerns about potential open source litigation are unfounded. The company issued a statement this week to ZDNet following news this week that the security software company cited potential legal risks associated with its use of open source in its most recent annual report and letter to shareholders. Chief spokesman Joris Evers said the [...]

    Source: http://feeds.feedburner.com/~r/zdnet/open-source/~3/213814067/

  16. Understanding Intrusion Detection System - Samhain

    Date: 01/10/08 (Java Web)    Keywords: software, security, web

    You never worry about your site security until after your site has been hacked for the first time. It is always a moment of truth, when you first realize how vulnerable you (your site & your data) truly are. You have probably dozens of scripts running on your server ranging from weblog software, comment form, [...]

    Source: http://blog.taragana.com/index.php/archive/understanding-intrusion-detection-system-samhain/

  17. Autodesk CIO: Billy Hinners - Transcript

    Date: 10/23/07 (Data Management)    Keywords: software

    Dan Farber: Billy, thanks for joining me. Billy Hinners: I'm happy to be here Dan. Dan Farber: Autodesk is a large company, $1.5 billion in revenue last year, and certainly well known for its engineering and architectural software, but you're also...

    Source: http://video.zdnet.com/CIOSessions/?page_id=206

  18. Oracle plans 27 security fixes for Jan. 15

    Date: 01/10/08 (Data Management)    Keywords: software, database, security

    Oracle said Thursday that its latest batch of patches will fix 27 security fixes "across hundreds of Oracle products," including eight for the company's database, seven for its e-business suite and six for its application server. In its advisory, Oracle outlines a laundry list of software affected....

    Source: http://blogs.zdnet.com/security/?p=798

  19. Open-source security moves to next step

    Date: 01/11/08 (Security)    Keywords: software, security

    Eleven projects are certified as secure in government-backed initiative led by source code analysis specialist Coverity. Source code analysis expert Coverity has found and helped fix more than 7,500 security flaws in open-source software, and published a list of the 11 open-source projects working fastest to sort them...

    Source: http://news.zdnet.com/2100-1009_22-6225700.html

  20. PC Software for Personal Business

    Date: 01/15/08 (Computer Geeks)    Keywords: templates, software, web

    I'm thinking WAY ahead here, but I'm about to start graduate school and I will eventually run a private health practice. Thus far, I only have experience with the student edition of MS Office. I'd like to familiarize myself with all the programs I need to run my own small business. I'll need to manage at least the following:

    *Contacts
    *Data/records
    *Personal finance/book keeping
    *Promotional material creation
    *Presentations
    *Professional document templates
    *Website creation/management

    Would you recommend a more advanced edition of MS Office, a different series of PC programs altogether, or a combination? I'd like to keep things as streamlined and simple as possible, but be sure I also have the skills to work with common PC software if I end up in a group practice.

    Suggestions? Thanks!

    Source: http://community.livejournal.com/computergeeks/1142947.html

Previous page  ||  Next page


antivirus | apache | asp | blogging | browser | bugtracking | cms | crm | css | database | ebay | ecommerce | google | hosting | html | java | jsp | linux | microsoft | mysql | offshore | offshoring | oscommerce | php | postgresql | programming | rss | security | seo | shopping | software | spam | spyware | sql | technology | templates | tracker | virus | web | xml | yahoo | home