-
How eco-friendly is a BMW?
The short answer is: I don’t know š While I was watching National Geographic, I caught a glimpse of the BMW “Efficient Dynamic” advertisement campaign. The claims made by this campaign were quite extraordinary and – being the cynic that I am – I thought: hang on, this sounds too good to be true. The…
-
Recouping your data from a hung program
Scenario: you are typing away in your blog editor on Ubuntu doing a (somewhat) Flash-heavy post. You make the mistake of hitting “Preview” and the blogging software hangs. How can you get your post out? Find the PID of your blogging software Coredump it (gcore [PID] – this will create a file called core.[PID] in…
-
Congratulation to AV-Comparatives!
AV-Comparatives is an independent, well-known and well respected testing organization in the AV/Anti-Malware field. They recently published two reports and one meta-report: Whole Product Dynamic Test Performance Test Summary Reports Go read them if you have questions like “which product is the best for me?”. Thank you Andreas for providing a great and impartial service.…
-
Don’t listen alone!
Do you like Linux? Do you listen to podcasts? If you’ve answered yes to both of those questions, you should know what LUG Radio is (if not, do a quick checking – I promise you that it will be worth it!). The bad news? They stopped it in 2008. The good news? A documentary titled…
-
delicious/cdman83
A long overdue “linky” post: Internet Guide | dyn.com Posted: 22 Oct 2009 04:55 AM PDT Dyn (of DynDNS) is also getting in the internet content filtering business. About the Fitbit Posted: 23 Oct 2009 11:10 AM PDT BorderWare ReputationAuthority Posted: 23 Oct 2009 12:09 AM PDT Petabytes on a budget: How to build cheap…
-
Schneier videos
Bruce Schneier is always fun, and together with Markus Ranum he is extra fun (sidenote: although it is title “face-off”, they agree more than they disagree): Schneier-Ranum face-off, part1: The future of information security Schneier-Ranum face-off, part 2: Social networking Schneier-Ranum face-off, part 3: Compliance and security Schneier-Ranum face-off, part 4: Cybersecurity coordinator Schneier-Ranum face-off…
-
New challenges
After missing the announcement for the second part of the Network Forensics Puzzle (yes, Iām subscribed the feed now!) I would like to regain your trust by bringing two other contests to your attention: Miracle on Thirty-Hack Street from ethicalhacker.net the sevenfour challenges (a ākeygen-meā type of challenge) Bonus content: t2ā09 challenge solutions (via the…
-
A game of Chinese whispers
Yet an other example of real-life Chinese whispers in the security journalism: A Hungarian online news site published an article titled āHackers tried to steal user data from Amazonā (here is a somewhat usable automatic translation for the non-Hungarian speakers). I assume that the information went like this: What happened ā> What the security company…
-
Twitter hacked
It had to happen, didnāt it? Iāve fired up Pidgin with the microblog-purple plugin, only to get an āinvalid certificateā error for twitter. Iāve quickly became nervous, since a quick digging indicated that I was getting the wrong IP address for the domain twitter.com. My first thought was: āIāve been compromisedā. After quickly verifying my…
-
Discount Codes UK review
These days most online shops offer the ability to use discount codes at checkout and get a price reduction anywhere from 5% to 50%. These codes are announced in various media (like podcast or blogs), but even if you donāt follow the particular program, it is rather easy to find them with a search engine.…