NCC Group has published a set of security standards that you'll have to follow if you want to operate a .trust website.
The company owns the rights to sell dot-trusts, and uploaded the 124-page policy document [PDF] earlier this month. It provides a technical rundown covering network security to secure DNS settings, and NCC Group says the rules will be used as a configuration standard for all new dot-trust websites.
I've been thinking it's time to upgrade my trusty Dell Inspiron 531. Although quite happy with the seven year old system, I am thinking of just replacing the Motherboard, CPU and RAM.*
The last time I did an upgrade like this was back in the days when the original Athlon was a big deal, so I'm feeling quite out of date. A couple of hours trolling through various shopping sites hasn't helped.
What I really could use is some real world advice on what products or features don't play well with Linux, especially Mint. I'm hoping to pull all of this together without spending more than about $250. Not a gamer, not doing massive heavy duty stuff, don't overclock, probably can live for years with 8 gigs of RAM. Do have dual monitors. Mostly just run what installs with Mint, plus Windows Vista in Virtualbox once or twice a month.
For instance, is UEFI BIOS still an issue? Are there certain things that still absolutely don't work with Linux? Suggestions and warnings please!
* Haven't considered whether the Dell has some odd MB spec that nothing else will fit into.
Martin Brinkmann over at ghacks.net brings us info on Windows 10 security changes:
The company started to open up only recently and reveal additional information about Windows 10. It published a lengthy blog post today on the Windows For Your Business blog that details security improvements coming to the operating system.
Aimed at business and enterprise customers, it provides insight for consumers as well.
One of the changes discussed in the blog post is how Microsoft plans to change how users identify themselves on the system. Microsoft plans to eliminate single-factor authentication systems such as user/password log ins by building improved protection right into the operating system.
Yeah, I know we're way off normal in Linux usership around here but we still have relatives whose computers we have to fix, so...
Brian Fung reports at the Washington Post that earlier this year emergency services went dark for over six hours for more than 11 million people across seven states. "The outage may have gone unnoticed by some, but for the more than 6,000 people trying to reach help, April 9 may well have been the scariest time of their lives." In a 40-page report, the FCC found that an entirely preventable software error was responsible for causing 911 service to drop. "It could have been prevented. But it was not (PDF)," the FCC's report reads. "The causes of this outage highlight vulnerabilities of networks as they transition from the long-familiar methods of reaching 911 to [Internet Protocol]-supported technologies."
On April 9, the software responsible for assigning the identifying code to each incoming 911 call maxed out at a pre-set limit; the counter literally stopped counting at 40 million calls. As a result, the routing system stopped accepting new calls, leading to a bottleneck and a series of cascading failures elsewhere in the 911 infrastructure. Adm. David Simpson, the FCC's chief of public safety and homeland security, says that having a single backup does not provide the kind of reliability that is ideal for 911. “Miami is kind of prone to hurricanes. Had a hurricane come at the same time [as the multi-state outage], we would not have had that failover, perhaps. So I think there needs to be more [distribution of 911 capabilities].”
Fancy a stroll in the Chinese and Japanese Gardens? Why not up the ante, book a ride online and take a driverless buggy ride through the gardens? Making this a reality are researchers and engineers from the Singapore-MIT Alliance for Research and Technology (SMART) [新加坡-麻省理工学院科研中心], and the National University of Singapore (NUS), as Singapore builds up to be the world’s first Smart Nation.
This is the first time, not one, but two driverless vehicles are being deployed, free-of-charge for public use.
[...] Commuters can monitor the locations of the vehicles [from a website]. The buggies will also feature vehicle-to-vehicle communications that will allow each vehicle to know where the other vehicle is. This allows the buggies to know if there is a possibility of overlapping paths, and for each buggy to intelligently determine how best to move so as to improve the overall efficiency of the fleet.
Analysis of an allosaur skeleton (Abstract) shows that it died of a deep wound in the lower pubis - the shape and size of which matches a stegosaurus tail spike (informally, the Thagomizer). As the vertical strike came from below the allosaur, it shows that stegosaurus had great dexterity when using its tail as a defensive weapon.
Stegosaurs might be portrayed as lumbering plant eaters, but they were lethal fighters when necessary, according to paleontologists who have uncovered new evidence of a casualty of stegosaurian combat. The evidence is a fatal stab wound in the pubis bone of a predatory allosaur. The wound – in the conical shape of a stegosaur tail spike – would have required great dexterity to inflict and shows clear signs of having cut short the allosaur's life.
“A massive infection ate away a baseball-sized sector of the bone,” reports Houston Museum of Natural Science paleontologist Robert Bakker and his colleagues, who present a poster on the discovery on Tuesday at the meeting of the Geological Society of America in Vancouver, B.C. “Probably this infection spread upwards into the soft tissue attached here, the thigh muscles and adjacent intestines and reproductive organs.” The lack of any signs of healing strongly suggests the allosaur died from the infection.
In order to deliver the mortal wound to the allosaur, a stegosaur would have had to sweep its tail under the allosaur and twist the tail tip, because normally the spikes point outward and backward. That would have been well within the ability of a stegosaur, Bakker said.
Ad formats. We’ve been testing new ad formats in search results on queries related to music and movies that help people find legitimate sources of media. For the relatively small number of queries for movies that include terms like “download”, “free”, or “watch”, ..
An improved DMCA demotion signal in Search. In August 2012 we first announced that we would downrank sites for which we received a large number of valid DMCA notices. We’ve now refined the signal in ways we expect to visibly affect the rankings of some of the most notorious sites. This update will roll out globally starting next week. ..
Removing more terms from autocomplete, based on DMCA removal notices. We’ve begun demoting autocomplete predictions that return results with many DMCA demoted sites.
Every day our partnership with the entertainment industry deepens. Just this month we launched a collaboration with Paramount Pictures to promote their upcoming film “Interstellar” with an interactive website. And Content ID (our system for rightsholders to easily identify and manage their content on YouTube) recently hit the milestone of enabling more than $1 billion in revenue to the content industry.
Providing more targeting ads you can now buy that new album from google directly from the search.
Also Google will change the way that they do rankings, so some SEO techniques are thrown out the window.
For those who haven't already changed http://duckduckgo.com is great search engine with a bunch of awesome tricks.
El Reg reports:
Apple co-founder Steve Wozniak has joined the University of Technology, Sydney (UTS), as an adjunct professor. Woz will teach in the "Magic Lab" (Innovation and Enterprise Research Laboratory), School of Software and the Centre for Quantum Computation and Intelligent Systems at UTS' Faculty of Engineering and IT.
Magic Lab director Professor Mary-Anne Williams has allowed herself to be quoted saying Wozniak is the "coolest person in the Universe" and "loves the energy, the vibe and the robots in the Magic Lab."
"Woz constantly highlights the new possibilities for technology to change the world and enjoys sharing his insights and experiences," Williams added. "The students have been totally wowed by the attention he has given them--one claiming he had changed her life in less than 60 seconds."
Arielle Schlesinger, from HASTAC, is working on her thesis: Feminism and Programming Languages
a feminist programming language is to be built around a non-normative paradigm that represents alternative ways of abstracting. The intent is to encourage and allow new ways of thinking about problems such that we can code using a feminist ideology. ... I realized that object oriented programmed reifies normative subject object theory. This led me to wonder what a feminist programming language would look like, one that might allow you to create entanglements."
Are there any insights to be gained here? Or, is this yet another social theorist questionably applying critical theory to the sciences?
For those who RTFA, be sure to read the comment on the article by Juliet Rosenthal. She brings up the obvious questions that leap to the mind of any computer scientist, and formulates them well without being needlessly confrontational.
The Computer History Museum, with the aid of Xerox PARC has released the source code for the Xerox Alto.
Depending on your age, your first computer might have been an Apple II, a Radio Shack TRS-80, an IBM PC, an Apple Macintosh, or another of the early personal computers. If you missed these early machines the first time around, perhaps you have seen them in the Personal Computer section of the Revolution exhibit at the Computer History Museum. ...
It’s hard to explain just how advanced the Alto seemed at the time. It had a full-page graphics display with 606 by 808 black & white pixels, a keyboard, a mouse, a fairly powerful processor with 128 KBytes of main memory, a hard drive with a 2.5 MByte removable cartridge, and a 2.94 Mbit/sec Ethernet interface. The Ethernet connected Altos together into a local network that included a high-performance laser printer, an Alto-based file server with hundreds of megabytes of capacity, and gateways to local networks at other Xerox offices and to the ARPANET.
That's what Congressman Darrell Issa tweeted as it became clear that Congress would have no part of the FBI's plan to require backdoors (or frontdoors) into encrypted phones.
The Register is reporting that the FBI's request had publicly failed after senators said the proposal would be rejected. Congresswoman Zoe Lofgren said:
"I think the public would not support it, certainly industry would not support it, civil liberties groups would not support it."
"I think [Comey is] a sincere guy, but there's just no way this is going to happen."
The bipartisan opposition signaled the end of the line (at least until after the next election) of any chance for the FBI's proposal according to an article in The Hill.
Earlier this year, in another bipartisan move, Lofgren, and Rep. Thomas Massie introduced a measure to the defense spending bill banning the National Security Agency from using “backdoor” searches to spy on Americans through a legal provision targeting foreigners. That measure overwhelmingly passed the House 293-123.
Ars has a story that has civil liberties implications galore. The U.S. Supreme Court has agreed to hear another Fourth Amendment privacy case, this one related to a Los Angeles ordinance which requires hotels to surrender guest registries to the police upon request without a warrant. From the article:
The justices agreed Monday to hear Los Angeles' appeal of a lower court that ruled 7-4 that the law—meant to combat prostitution, gambling, and even terrorism—was unconstitutional. The law (PDF) requires hotels to provide the information—including guests' credit card number, home address, driver's license information, and vehicle license number—at a moment's notice. Several dozen cities, from Atlanta to Seattle, have similar ordinances. [...]
The appeal is the third high-profile Fourth Amendment case the justices have taken in three years.
In 2012, the justices ruled that authorities generally need search warrants when they affix GPS devices to a vehicle. And earlier this year, the Supreme Court said that the authorities need warrants to peek into the mobile phones of suspects they arrest.
In the latest case, Los Angeles motel owners sued, claiming that the law was a violation of their rights. The 9th US Circuit Court of Appeals agreed with the motel owners in December and said the only documents they must disclose include a hotel's proprietary pricing and occupancy information.
The next iPhones were announced and sold out (just as Apple planned), the fanbois lined up, camped out, and stopped mocking big phones.
A couple people noticed it came equipped with a barometer. Yawn. Android had them for years, nobody cares.
Well one guy does care. He is Cliff Mass, of the Weather Blog. Why is Cliff so excited:
Because they offer the chance to get a extraordinary density of pressure observations, which provides the potential to describe small scale atmospheric structures. Structures we need to know about if we are to predict key weather features like strong thunderstorms.
To forecast fine-scale weather features (like thunderstorms), you need a fine-scale description of the atmosphere, and the current observational network is often insufficient. We need millions of observations per hour over the U.S. to do the job.
The region of genome that is associated with autism contains a genetic variation that evolved relatively recently (Abstract) in human history - in the last 250,000 years.
Human geneticists have discovered that a region of the genome associated with autism contains genetic variation that evolved in the last 250,000 years, after the divergence of humans from ancient hominids, and likely plays an important role in disease.
Modern-day Renaissance man Nick Szabo de-constructs the first phase of the Industrial Revolution which occurred roughly between 1750 and 1830. Szabo organizes his short essay around the theme of inventions improving trade routes and supply paths to mines and farms; along the way, he points out a couple analogies to the Internet age.
Horse-drawn carriages and wagons had been in use in north-western Europe since the Middle Ages. During the early years of the Industrial Revolution, this mode of transportation was optimized through improvements to wheels, tires, shock absorption, and roads. It then became economically feasible to build out canals and navigate rivers to haul the cargo long distances, with horses used most heavily for "the last mile", e.g. transport of materials and goods from mines and farms.