Category: ‘Geeky Stuff’


Hmmm… don’t you find her excuses just a little… how should I say… pathetic? Yep, I think that’s the correct word.

Dell tricked this poor college student by sending her a laptop with the evil Ubuntu installed on it….now she has to drop out of school. Damn you Ubuntu! Damn you!
© [H] Enthusiast

:ble: :th-down:

Google changed its favicon last year and many people said that the new one was ugly. Probably this the reason why Google decided to use another favicon starting from today. The new favicon uses all the colors from Google’s logo, while keeping the same lowercase “g”.

Here are all the three Google favicons, starting with the new one, followed by the simple favicon added last year and the initial Google favicon, which is still my favorite:


via Google Operating System & Official Google Blog

З.Ы.: Мне по-прежнему нравится их старый/”классический” favicon. Я, собственно, и не заметил бы изменений, если б не прочел в вышеупомянутых блогах, т.к. продолжаю пользоваться скриптом для Greasemonkey, который заменяет там где надо новый favicon на старый :grin2:

nsalogoАгентство Национальной Безопасности США разработало и запатентовало новую технику, при помощи которой в компьютерной сети можно будет вычислить хакеров, которые пытаются выдать себя за легитимных пользователей. В основе разработки АНБ находится программное обеспечение, точно измеряющее время, необходимое для того, чтобы передать по сети тот или иной тип данных от одного компьютера другому.

В том случае, если время, необходимое для передачи, резко возрастает или уменьшается, то программное обеспечение предупреждает о нетипичном поведении компьютера, находящегося “по ту сторону” сети.

В АНБ замечают, что ранее временная техника уже предлагалась к использованию другими исследователями, однако их методика отличается от всего, предложенного до сих пор. Новая технология предусматривает отправку различного типа данных, сравнивая скорость и узлы, по которым они идут в процессе своей доставки до узла назначения.

“Изюминка метода заключается в том, что он смотрит на несколько сетевых уровней сразу”, – говорит Тадаеши Коно, один из разработчиков системы и работник Университета Вашингтона.

Разработчики говорят, что их метод позволяет находить фишинговые сайты, а также бороться с распространенной атакой типа man-in-the-middle, когда злоумышленник пропускает и прослушивает весь секретный трафик от клиента к серверу через свой компьютер.

ИТ-эксперт Дэн Камински, обнаруживший крупный баг в системе DNS в этом году, не особо впечатлен разработкой американских разведчиков: “Подумайте, если ваша сеть стала чуть медленнее, или плохие парни заполняют ее плохими пакетами, то данный метод становится не очень-то эффективен. На практике может быть миллиард причин, по которым маршрутизация может замедляться”.

Пока в АНБ не сообщают, будут ли они публиковать новую разработку под лицензией GPL, как это было в свое время с SELinux.

Напомнило вот. :giggle: :grin2:

“The Pentagon now believe they can identify terrorists by the way they walk.”


A new trojan popped up at several torrent sites a few weeks ago, one that blocks access to The Pirate Bay and Mininova, while informing its victims that “downloading is wrong.” The trojan edits the hosts file on Windows machines, and redirects the BitTorrent sites to localhost, making them impossible to load.

The trojan in question (Troj/Qhost-AC) identified by anti-virus company Sophos, is a rather unusual one. It doesn’t seem to install spyware or traditional malware, but instead blocks access to the two most popular BitTorrent sites.


It turned out that the trojan originated from a keygen supplied with a copy of pirated software. Instead of generating a key, it modified the hosts file of the computer so that it redirects The Pirate Bay, Suprbay (The Pirate Bay forums) and Mininova to, which means that the sites never load.

The bad torrent was removed from The Pirate Bay soon after users commented that the key generator didn’t work, but it is safe to assume that this is not the first and only attempt to spread a trojan like this one.

The question remains, who is behind this? While some might argue that the MPAA, RIAA or other anti-piracy advocates might be the source, we think it more likely that the attack originates from a relatively innocent prankster targeting pirates.

The good news is that it is fairly easy to fix, manually removing the entries from the hosts file solves the problem.



Media ProtectorHustler Europe, part of the world’s largest adult entertainment company, has hired anti-piracy company Media Protector to start chasing down file-sharers. The partnership will have a familiar aim – to find alleged infringers on P2P networks and send them threats to pay up – or else.

Hustler Europe is getting on the “turn piracy into profit” bandwagon. It has recently hired anti-piracy tracking company Media Protector to start tracking down those who share Hustler videos online.

Media Protector operates in a similar way to tracking company Digiprotect, who currently work with lawyers Davenport Lyons in the UK. It connects to BitTorrent swarms, eD2k and other filesharing networks, and harvests IP addresses of those sharing copyright works without permission. Media Protector then works with lawyers to force ISPs to disclose the personal details of those allegedly sharing files, sending them letters ordering them to pay a ‘fine’ (out-of-court settlement) or face legal action.

“We are working today with a lot of international rights-holders and leading production companies — including Hustler, the world’s largest adult entertainment company — and have detected well over 200,000 copyright infringements in Germany alone,” Media Protector founder and Managing Director Rainer Strassmeir told Xbiz.


Anti-piracy company Digiprotect has been open about its aims – it says it helps clients “turn piracy into profit”, although the lawyers it works with in the UK deny that there is any profit motive, rather their actions are purely for anti-piracy purposes. Strassmeir isn’t embarrassed to say that he tries to generate profit from piracy either, as he states that his customers “enjoyed a new revenue stream by effectively monetizing copyright infringements.”

Last year, the evidence collected by Media Protector was called into doubt. A recipient of a 700 Euro compensation demand for unauthorized uploading was actually operating a client which was modified never to upload, thus making infringement impossible.


Nothing is more annoying than working in the zone and getting interrupted. When it turns out Windows Update is pestering you to reboot, a double homicide is imminent.

Microsoft likes to “help out” by installing patches in the middle of the night. That is a good thing. But whatever goodwill they earn with this convenience is immediately destroyed when first thing in the morning a “reboot computer” message appears. And appears… and appears…


If you choose Restart Later, it waits about 10 minutes and then pops this screen up again. Argggh!


It occurred to me some of you may hate this as much as I do, but you don’t want to go fiddling around in Services.msc or have to memorize “net stop” commands. Worse is the articles that teach you to shut it off permanently. If you shut it off for good, you don’t get updates unless you manually go to Windows Update. In the long run, this can be more painful than rebooting as soon as you see the message.

So to address this problem, I created a simple little app called Leave Me Alone! When you run it and click the “Leave Me Alone” button it temporarily turns off the source of these restart messages. It is certain to boost your productivity when the WU Restart beast comes calling.

I see about 5 advantages to using this software:

1. You can get back to work immediately
2. Does not permanently disable your updates
3. You don’t have to memorize net-stop commands
4. You don’t have to fish around in the system services panel
5. You don’t have to set a system policy

Download @

Inspired by Transformers and created by digital artist Nick Green Lee, this short Visual Effects piece shows us what really goes on inside our home computers … that’s right, they’re robots, and they wanna beat the f#!@ out of each other.


Долгое время считалось, что операционная система от Apple не подвержена атакам вирусов. Вернее, вирусы под Mac создавались, однако до сих пор они носили чисто “лабораторный” характер и мало кто обращал внимания на подобные проблемы. Однако все меняется – руководство Apple признает появление новых, намного более опасных, чем ранее вирусов и призывает своих пользователей устанавливать антивирусы.

До сих пор антивирусы под Mac обсуждались разве что в анекдотах. Как известно, количество различных вирусов под Windows исчисляется легионами, и никакому подсчету и контролю не подлежит, несмотря на все старания Microsoft и компаний-производителей антивирусного программного обеспечения.

В последнее время участились случаи инфицирования Mac-систем, что немало удивляет тех, кто давно уже работает с этой ОС. Apple советует всем своим пользователям применять не более одного сканера вирусов, а также использовать надежный файерволл. В качестве рекомендуемого программного обеспечения руководство Apple советует использовать Intego VirusBarrier, Symantec Norton Anti-Virus 11 для Macintosh и McAfee VirusScan для Mac.

ie7 sucksHackers love to play cat and mouse with security firms. A case in point is the current Internet Explorer 7 unpatched vulnerability being exploited worldwide. On Tuesday, hackers waited until Microsoft released their monthly patches before revealing an undisclosed vulnerability in the web browser software, giving villains the maximum amount of time to compromise computers before users get patched up in 30 days. Sans Internet Storm Center has more details here.

Unsuspecting users need only visit a website and they are automatically compromised by the server. The exploit code takes advantage of a flaw in the XML handling parsers in IE and a trojan is downloaded without the user knowing. Right now, this trojan is looking for passwords to certain online games, and the exploit is targeting Chinese language users. But according to Microsoft, just about everyone with IE7 is vulnerable, including Vista users.

Our investigation so far has shown that these attacks are against Windows Internet Explorer 7 on supported editions of Windows XP Service Pack 2, Windows XP Service Pack 3, Windows Server 2003 Service Pack 1, Windows Server 2003 Service Pack 2, Windows Vista, Windows Vista Service Pack 1, and Windows Server 2008.

If you are an administrator of an enterprise and want to block the sites that are dishing out this malware, Shadowserver.Org has a list of urls here. But don’t go being foolish and visit any of the hosts listed because they are hosting active exploit code and will pwn you if you are using IE7. And judging by the list of servers, it seems that Baidu, the Chinese mp3 fileswapping servers, are the ones dishing out most of the badness.



Newly Revised Edition Created by Karl Fisch, and modified by Scott McLeod; Globalization & The Information Age.

Recommended Stuff

This is a random selection from a list of stuff/posts I personally enjoyed a lot. Some sort of "My Favorites" or "Bookmarks"...

  • Why don’t you do right? by Dianae
  • Pirelli Calendar 2008
  • Pirelli Calendar 2008
  • Shannyn Sossamon
Bookmark and Share