Free Republic 3rd Quarter Fundraising Target: $88,000 Receipts & Pledges to-date: $7,815
8%  
Woo hoo!! And the first 8% is in!! Thank you all very much!!

Keyword: computers

Brevity: Headers | « Text »
  • Deprecating Secure Sockets Layer Version 3.0 (RFC 7568)

    06/30/2015 8:21:27 PM PDT · by zeugma · 32 replies
    Internet Engineering Task Force (IETF) ^ | 06/2015 | R. Barnes et.al.
    A post for the computer techies on the site Internet Engineering Task Force (IETF) R. Barnes Request for Comments: 7568 M. Thomson Updates: 5246 Mozilla Category: Standards Track A. Pironti ISSN: 2070-1721 INRIA A. Langley Google June 2015 Deprecating Secure Sockets Layer Version 3.0 Abstract The Secure Sockets Layer version 3.0 (SSLv3), as specified in RFC 6101, is not sufficiently secure. This document requires that SSLv3 not be used. The replacement versions, in particular, Transport Layer Security (TLS) 1.2 (RFC 5246), are considerably more secure and capable protocols. This document updates the backward compatibility section of RFC 5246 and its...
  • Islamic State uses downloadable apps to hide attack plans, recruit followers

    06/28/2015 6:29:48 PM PDT · by markomalley · 4 replies
    Washington Times ^ | 6/28/15 | Rowan Scarborough
    The Islamic State terrorist army is snatching up the latest off-the-shelf encrypted applications to hide their military planning, with fighters publicly thanking former National Security Agency contractor Edward Snowden for tipping them on U.S. spying tactics.The West’s fertile tech laboratories have unwittingly become the Islamic State’s research and development arm for free messaging software. It uses the apps to recruit followers, defeat the U.S.-led coalition and expand conquests in Iraq and Syria.The Islamic State’s mastery of secure communications is an especially important advance because its commanders do their attack planning — and then execution — via the Internet and smartphones....
  • POPULAR SECURITY SOFTWARE CAME UNDER RELENTLESS NSA AND GCHQ ATTACKS

    06/22/2015 7:33:22 AM PDT · by rickyrikardo · 100 replies
    GLENN GREENWALD's (Snowden's pal) Firstlook.org The Intercept ^ | June 22 ,2015 | ANDREW FISHMAN AND MORGAN MARQUIS-BOIRE
    The National Security Agency and its British counterpart, Government Communications Headquarters, have worked to subvert anti-virus and other security software in order to track users and infiltrate networks, according to documents from NSA whistleblower Edward Snowden. The spy agencies have reverse engineered software products, sometimes under questionable legal authority, and monitored web and email traffic in order to discreetly thwart anti-virus software and obtain intelligence from companies about security software and users of such software. One security software maker repeatedly singled out in the documents is Moscow-based Kaspersky Lab, which has a holding registered in the U.K., claims more than...
  • Lightning blew out my computer! Need to replace. Laptop this time?

    06/19/2015 2:43:57 PM PDT · by onyx · 159 replies
    Free Republic | Friday, June 19, 2015 | Onyx
    A huge thunderstorm ripped through here four days ago. It blew out my TV and my computer. My small town only has a Walmart and an Office Depot. I would prefer to go buy a new computer at Walmart. I'm thinking a laptop would be a better purchase. I have no idea how to install it on my own. I'm thinking of asking a clerk to come home with me to install it and I will pay him $50. I need this new computer installed before the start of our FReepathon on July 1 I will also need one that...
  • Plugging a 1986 Mac Plus into the modern Web

    06/20/2015 11:12:19 AM PDT · by Swordmaker · 35 replies
    Kernel Mag — The Early Internet ^ | March 22nd, 2015 | By Jeff Keacher
    Reviving an old computer is like restoring a classic car: There’s a thrill from bringing the ancient into the modern world. So it was with my first “real” computer, my Mac Plus, when I decided to bring it forward three decades and introduce it to the modern Web. It’s a lowly machine, my Mac. The specs pale in comparison to even my Kindle: 8 MHz CPU, 4 MB RAM, 50 MB hard drive, and 512 x 384 pixel black-and-white screen. My current desktop PC is on the order of 200,000 times faster—not even including the GPU. Still, that Mac Plus...
  • Engineers find a simple yet clever way to boost chip speeds

    06/18/2015 12:01:38 PM PDT · by Red Badger · 33 replies
    Phys.Org ^ | 06-17-2015 | Provided by Stanford University
    A typical computer chip includes millions of transistors connected with an extensive network of copper wires. Although chip wires are unimaginably short and thin compared to household wires both have one thing in common: in each case the copper is wrapped within a protective sheath. For years a material called tantalum nitride has formed protective layer in chip wires. Now Stanford-led experiments demonstrate that a different sheathing material, graphene, can help electrons scoot through tiny copper wires in chips more quickly. Graphene is a single layer of carbon atoms arranged in a strong yet thin lattice. Stanford electrical engineer H.-S....
  • Encryption “would not have helped” at OPM, says DHS official (Outsourced to China)

    06/17/2015 4:37:13 PM PDT · by 2ndDivisionVet · 17 replies
    Ars Technica | June 16, 2015 | Sean Gallagher
    Link only due to copyright issues: http://arstechnica.com/security/2015/06/encryption-would-not-have-helped-at-opm-says-dhs-official/
  • Is the FOSS Infrastructure Crumbling?

    06/17/2015 8:36:35 AM PDT · by ShadowAce · 14 replies
    FOSSForce ^ | 17 June 2015 | Christine Hall
    It appears as if much of the open source infrastructure we depend on is suffering from neglect. That’s the message brought to the SouthEast LinuxFest (SELF) by David Nally. Listening to his talk, “The Tragedy of Open Source,” it was hard not to think that some of our infrastructure projects are beginning to resemble some disintegrating municipal water and sewer systems, or maybe compare his examples with our crumbling roads and bridges. Nally is a South Carolina based “recovering sysadmin” who now wears many hats at Apache as well as being an employee at Citrix.The neglect he mentions has caused...
  • Cardinals Face F.B.I. Inquiry in Hacking of Astros’ Network

    06/16/2015 9:27:27 AM PDT · by gwjack · 28 replies
    The New York Times ^ | 6/16/2015 | Michael S. Schmidt
    WASHINGTON — The F.B.I. and Justice Department prosecutors are investigating whether front-office officials for the St. Louis Cardinals, one of the most successful teams in baseball over the past two decades, hacked into internal networks of a rival team to steal closely guarded information about player personnel. Investigators have uncovered evidence that Cardinals officials broke into a network of the Houston Astros that housed special databases the team had built, according to law enforcement officials. Internal discussions about trades, proprietary statistics and scouting reports were compromised, the officials said.
  • The Rise of the Machines

    06/16/2015 8:51:19 AM PDT · by Oldpuppymax · 4 replies
    Coach is Right ^ | 6/16/15 | By LtCol Forrest R. Lindsey USMC (ret), staff writer
    Hardly a day goes by without some new article describing the very rapid advance of automation in our lives. As it is right now, more and more manufacturing is done using computer-controlled machining and robots doing the assembling and even testing. We can’t call for customer assistance anymore without going through a battery of mechanical voices asking us which option we want while directing us away from any hope of human interaction. Machines are accurate, dependable and they never sleep. They don’t belong to unions and they never complain about working conditions and best of all for the Captains of...
  • Duqu 2.0 malware buried into Windows PCs using stolen Foxconn certs (Signed by Chinese factory)

    06/15/2015 8:24:50 PM PDT · by dayglored · 38 replies
    The Register ^ | June 15, 2015 | John Leyden
    The super-sophisticated malware that infiltrated Kaspersky Labs is more crafty than first imagined. We're told that the Duqu 2.0 software nasty was signed using legit digital certificates issued to Foxconn – a world-leading Chinese electronics manufacturer, whose customers include Microsoft, Dell, Google, BlackBerry, Amazon, Apple, and Sony. The code-signing was uncovered by researchers at Kaspersky Lab, who are studying their Duqu 2.0 infection. Windows trusts Foxconn-signed code because the Chinese goliath's certificate was issued by VeriSign, which is a trusted certificate root. Thus, the operating system will happily load and run the Foxconn-signed Duqu 2.0's 64-bit kernel-level driver without setting...
  • An Arlington burial for Jack Wheeler (Service today, April 29, 2011)

    04/29/2011 9:29:05 AM PDT · by smoothsailing · 7 replies · 1+ views
    Daily Press ^ | 4-27-2011
    An Arlington burial for Jack Wheeler April 27, 2011The murder of Jack Wheeler remains unsolved, but his funeral on Friday might provide a small bit of solace for his family and friends. Wheeler, a former Hampton resident, will be inurned with full military honors in the Columbarium at Arlington National Cemetery. Wheeler was a 1962 graduate of Hampton High School and a member of the Class of '66 at the U.S. Military Academy at West Point. He served in the Army from 1966 to 1971 and spent time in Vietnam. He went on to serve three GOP presidents in various...
  • Iran's Cyber Warfare Commander Found Dead

    10/02/2013 7:16:03 PM PDT · by Eleutheria5 · 54 replies
    Arutz Sheva ^ | 3/10/13 | Elad Benari
    The head of Iran’s cyber warfare program has been shot dead, triggering further accusations that outside powers are carrying out targeted assassinations of key figures in the country’s security apparatus, reports the Telegraph. Mojtaba Ahmadi, who served as commander of Iran’s Cyber War Headquarters, was found dead in a wooded area near the town of Karaj, northwest of the capital Tehran. Five Iranian nuclear scientists and the head of the country’s ballistic missile program have been killed since 2007. The regime has accused Israel’s external intelligence agency, the Mossad, of carrying out these assassinations. Ahmadi was last seen leaving his...
  • Fiorina Slams Disney, Then Admits She Used H-1B Program At HP

    06/11/2015 6:38:59 PM PDT · by 2ndDivisionVet · 29 replies
    The Daily Caller ^ | June 10, 2015 | Rachel Stoltzfoos
    Republican presidential candidate Carly Fiorina admitted Wednesday she used the H-1b visa program to hire foreign workers while CEO at Hewlett-Packard, but rejected any comparison to Disney’s recently reported use of the program to displace American tech workers. “Did we ask American workers to train foreign workers with H-1b visas so that we can pay them less and lay them off?” she said on the Howie Carr radio show Wednesday. “The answer is most definitely no.” “I can’t remember exactly — it was a long time ago — how many [were brought in],” she added. “But there were some particular...
  • Clearing your browser history can be deemed 'obstruction of justice' in the U.S.

    06/09/2015 4:34:41 PM PDT · by 2ndDivisionVet · 47 replies
    CBC News ^ | June 9, 2015 | Lauren O'Neil
    Next week, a 24-year-old man who knew Boston Marathon bombers Dzhokhar and Tamerlan Tsarnaev is scheduled to appear in U.S. Federal Court for sentencing on obstruction of justice charges related to the 2013 attacks. Khairullozhon Matanov, a former taxi driver, did not participate in or have any prior knowledge of the bombings, according to U.S. authorities. What could land him 20 more years in prison — where he has been since his arrest — are the charges that he deleted video files from his computer and cleared his browser history in the days following the attacks. A Grand Jury indictment...
  • Fallout 4 Countdown Clock Appears, Runs Out Today

    06/03/2015 4:37:35 AM PDT · by Berlin_Freeper · 45 replies
    ign.com ^ | June 2, 2015 | Luke Karmali
    Bethesda has launched a new website almost certainly confirming Fallout 4 will be announced today. The site bears a countdown timer that currently looks like it'll run out today, June 3 at 7am PT / 10am ET / 3pm GMT.
  • The Trillion Fold Increase In Computing Power, Visualized

    05/30/2015 11:28:13 AM PDT · by QT3.14 · 42 replies
    Gizmodo ^ | May 24, 2015 | Maddie Stone
    [Snip]...The visualization below, inspired by the recent 50th anniversary of Moore’s law, tells the story of the trillion fold increase in computing performance we’ve witnessed over the past sixty years. That’s impressive enough, but some of the other finds are downright astounding. The Apollo guidance computer that took early astronauts to the moon, for instance, has the processing power of 2 Nintendo Entertainment Systems, while the Cray-2 supercomputer from 1985—the fastest machine in the world for its time—roughly measures up to an iPhone 4.
  • Malware is not only about viruses – companies preinstall it all the time

    05/27/2015 4:52:27 PM PDT · by sopwith · 66 replies
    the guardian ^ | ‘Amazon’s Kindle shackles the user against sharing or even freely giving away or lending the book, | Richard Stallman
    In 1983, when I started the free software movement, malware was so rare that each case was shocking and scandalous. Now it’s normal. To be sure, I am not talking about viruses. Malware is the name for a program designed to mistreat its users. Viruses typically are malicious, but software products and software preinstalled in products can also be malicious – and often are, when not free/libre. In 1983, the software field had become dominated by proprietary (ie nonfree) programs, and users were forbidden to change or redistribute them. I developed the GNU operating system, which is often called Linux,...
  • New maze-like beamsplitter is world's smallest

    05/25/2015 4:57:28 PM PDT · by aimhigh · 50 replies
    Physics World ^ | 05/25/2015 | Ker Than
    An ultracompact beamsplitter – the smallest one in the world – has been designed and fabricated by researchers in the US. Using a newly developed algorithm, the team built the smallest integrated polarization beamsplitter to date, which could allow computers and mobile devices of the future to function millions of times faster than current machines.
  • Extreme Networks Cuts 18 Percent Of Workforce; Plans To 'Rely More On Channel Partners' (285 jobs)

    05/23/2015 9:13:15 PM PDT · by 2ndDivisionVet · 7 replies
    CRN ^ | May 21, 2015 | Mark Haranas
    Extreme Networks on Thursday disclosed plans to restructure by cutting 18 percent of its global workforce -- 285 jobs -- and investing in software and cloud services for the channel. Some sales positions were included in the job cuts, and Extreme plans to fill those gaps by working more closely with solution providers, said Ed Meyercord, president and CEO of Extreme, during a conference call. "In certain markets, rather than have the fixed costs of a direct sales team or people in place, we'll cover that through the channel and channel partners," Meyercord said. "We're going to rely more heavily...
  • Google Tone Shares Links To Computers Within Earshot Using Beeps And Boops

    05/23/2015 9:46:54 AM PDT · by Enlightened1 · 21 replies
    Popular Science ^ | 05/22/15 | Jason Cipriani
    A new Chrome extension, called Google Tone, released this week makes it possible to share a URL with another computer in the room using a series of beeps and boops. The concept is dead simple yet instantly instills a sense of disbelief. A computer making seemingly random sounds can transmit the URL for the tab I have open in Chrome across the room? Get out. Full of skepticism, I decided to put it to the test. I installed the Chrome extension on a MacBook Air and a HP laptop running Windows 10. And you know what? It works! Click on...
  • Computing at the speed of light: Team takes big step toward much faster computers

    05/18/2015 11:32:22 AM PDT · by Red Badger · 16 replies
    Phys.Org ^ | 05-18-2015 | Provided by University of Utah
    University of Utah engineers have taken a step forward in creating the next generation of computers and mobile devices capable of speeds millions of times faster than current machines. The Utah engineers have developed an ultracompact beamsplitter—the smallest on record—for dividing light waves into two separate channels of information. The device brings researchers closer to producing silicon photonic chips that compute and shuttle data with light instead of electrons. Electrical and computer engineering associate professor Rajesh Menon and colleagues describe their invention today in the journal Nature Photonics. Silicon photonics could significantly increase the power and speed of machines such...
  • Stephen Hawking warns computers will overtake humans within 100 years

    05/14/2015 4:46:48 AM PDT · by Enlightened1 · 28 replies
    Tech World ^ | 05/14/15 | Sam Shead
    Stephen Hawking today warned that computers will overtake humans in terms of intelligence at some point within the next century. Speaking at the Zeitgeist 2015 conference in London, the internationally renowned cosmologist and Cambridge University professor, said: “Computers will overtake humans with AI at some within the next 100 years. When that happens, we need to make sure the computers have goals aligned with ours.” Hawking, who signed an open letter alongside Elon Musk earlier this year warning AI development should not go on uncontrolled, added: “Our future is a race between the growing power of technology and the wisdom...
  • Conservatives Press GOP to Restrict DOJ’s Foreign Cloud Snooping

    05/13/2015 10:04:08 AM PDT · by Kaslin · 4 replies
    Townhall.com ^ | May 13, 2015 | Neil McCabe
    An alliance of free-market conservatives is building support for a bill that would thwart the Obama administration's bid to make foreign computers, servers and data farms subject to Justice Department search and seizure.The alliance stepped up its pressure on Capitol Hill with the release of its May 1 “coalition letter” to Sen. Charles “Chuck” Grassley (R-Iowa) and Rep. Robert W. Goodlatte (R.-Va.), the two men who chair the judiciary committees in their chamber. The letter calls on the chairmen to move forward on the Law Enforcement Access to Data Stored Abroad Act.To put things in perspective, in 1995 the email...
  • CHIP, a $9 computer with WiFi, Bluetooth, 1GHz CPU, 512MB RAM and 4GB storage

    05/10/2015 3:56:53 PM PDT · by ShadowAce · 59 replies
    The Next Digit ^ | 10 May 2015 | Suzanne Jean
    With the sizes slimming down, it is certainly not a huge surprise that we have a Chip sized computer amidst us. What is really astonishing is the fact that this chip sized computer costs only $9 and can do literally everything for you. The Chip as it has been named runs on Linux and includes Wi-Fi and Bluetooth as well.In fact, CHIP from Next Thing Co. also offers a VGA or an HDMI post for monitors, adding immense versatility to it. To be true, this is certainly one invention that all of us might just have been looking forward to.CHIP has...
  • Solid-state drives lose data if left without power for just a few days

    05/10/2015 1:06:11 PM PDT · by Utilizer · 49 replies
    ZDNet ^ | May 9, 2015 | Zack Whittaker
    Storage. It's not a sexy topic. But everyone uses it in some way or another. You have iPhones, you have computers. Everyone knows how important a person's data is. But it doesn't just "disappear." Or does it? New research suggests that newer solid-state hard drives, which are faster and offer better performance, are vulnerable to an inherent flaw -- they lose data when they're left dormant in storage for periods of time where the temperature isn't properly regulated. The worrying factor is that the period of time can be weeks, months, but even in some circumstances -- just a few...
  • Taking on the Smart Criminals

    05/07/2015 11:29:45 PM PDT · by nickcarraway · 1 replies
    Financial Times ^ | Emma Jacobs
    In the mid-1990s, Marc Goodman, then an investigator in the Los Angeles Police Department, tried to convince his boss of the need for a computer crime unit. The reaction? Utter bafflement. “This captain said to me, ‘Computer crime, what is that? Like if you take the monitor and hit somebody in the head and kill them?’” It is a telling anecdote. While law enforcement agencies have become in­creasingly sophisticated technologically, criminals have the edge, according to Mr Goodman. That was something he observed when investigating drugs and vice in LA. “In those days the only people that had pagers in...
  • Glenn Beck on Ted Cruz: 'I'm not sure that he could govern'

    05/04/2015 11:50:06 AM PDT · by 2ndDivisionVet · 127 replies
    The Washington Examiner ^ | May 4, 2015 | Eddie Scarry
    (VIDEO-AT-LINK) Conservative radio host Glenn Beck said on his show Monday that he's "not sure" Republican presidential candidate Ted Cruz is able to "govern." Beck made the comment while discussing each of the potential GOP presidential nominees and what he saw as their ability to lead. "We are looking at unbelievable times ahead of us," Beck said. "And I would say on this, I'm not sure [Cruz] could get the coalition together. He'll be a bulldog and he'll stand for principles but I'm not sure that he could govern. I'm not sure yet." One of Beck's co-hosts asked how Cruz...
  • Silicon Valley Then and Now: To Invent the Future, You Must Understand the Past

    05/03/2015 6:00:06 PM PDT · by 2ndDivisionVet · 10 replies
    BackChannel ^ | May 1, 2015 | Leslie Berlin
    “You can’t really understand what is going on now without understanding what came before.” Steve Jobs is explaining why, as a young man, he spent so much time with the Silicon Valley entrepreneurs a generation older, men like Robert Noyce, Andy Grove, and Regis McKenna. It’s a beautiful Saturday morning in May, 2003, and I’m sitting next to Jobs on his living room sofa, interviewing him for a book I’m writing. I ask him to tell me more about why he wanted, as he put it, “to smell that second wonderful era of the valley, the semiconductor companies leading into...
  • Big adobe Illustrator Issues

    04/29/2015 11:50:22 AM PDT · by MeshugeMikey · 26 replies
    MeshugeMikey ^ | April 29, 2015 | MeshugeMikey
    When I do a normal launch of adobe illustrator It freezes. when I do the optional launch....I get no toolbar etc etc. Im stumped and haven't been able to get anywhere on the adobe forums help! Thank you
  • Pentagon says it evicted Russian Hackers

    04/24/2015 11:38:40 AM PDT · by Izzy Dunne · 6 replies
    Reuters ^ | 23 Apr 2015 | Phil Stewart
    The United States on Thursday disclosed a cyber intrusion this year by Russian hackers who accessed an unclassified U.S. military network, in a episode Defense Secretary Ash Carter said showed the growing threat and the improving U.S. ability to respond.
  • Here’s How to Download and Delete What Google Search Knows About You

    04/22/2015 12:03:08 PM PDT · by ckilmer · 36 replies
    yahoo.com ^ | April 21, 2015 | Daniel Howley
    Have you ever what Google Search really knows about you? Well, now you can check, as Google has added a new feature that lets you view and download your entire search history. Yep. Everything.
  • "Fed Up" Colorado Man, 38, Busted For Killing His Computer In Cold Blood

    04/21/2015 3:34:59 PM PDT · by MeshugeMikey · 110 replies
    The Smoking Gun ^ | APRIL 21, 2015 | No Attribution
    A Colorado man who has been “fighting with his computer for the last several months” unloaded a volley of shots into his Dell tormentor, resulting in the death of the computer and his arrest for discharging a firearm, cops report. When asked about the shooting, Hinch told TSG, “I just had it,” adding that he tired of the balky computer’s “blue screen of death.” Hinch said that he whacked the computer with a 9mm Hi-Point pistol recently purchased from a Craigslist seller. The gun was seized by police, who left the computer behind. The late Dell XPS 410 model, seen...
  • Colorado man cited for 'killing' uncooperative computer with handgun

    04/21/2015 2:03:32 PM PDT · by Beave Meister · 37 replies
    Reuters ^ | 4/21/2014
    DENVER (Reuters) - Police in Colorado have cited a 37-year-old man for carrying his computer into an alley then shooting it eight times with a handgun after what authorities said had been a long battle with the uncooperative machine. Lucas Hinch was cited for discharging a firearm within city limits after officers responded to a "shots fired" call early on Monday evening, the Colorado Springs Police Department said in a statement. "Investigation revealed a resident was fed up with fighting his computer for the last several months," said the statement, entitled "Man Kills His Computer."
  • Future of BIG DATA

    04/17/2015 11:47:03 AM PDT · by Paul46360 · 1 replies
    The interesting part is the lower right hand of the pictorial.
  • Adobe Patches Flash Flaw Targeted by Exploit in the Wild

    04/14/2015 8:34:23 PM PDT · by Swordmaker · 45 replies
    Intego.com ^ | April 14th, 2015 | by Derek Erwin
    Adobe Systems has released a patch for 22 vulnerabilities in Flash Player, one of which is reportedly under attack by an exploit that exists in the wild. The most critical vulnerability, CVE-2015-3043, could lead to code execution. Adobe's Flash Player security updates are available for Macintosh, Windows and Linux."Adobe is aware of a report that an exploit for CVE-2015-3043 exists in the wild, and recommends users update their product installations," said Adobe. If you reached this page because you're unsure if a popup alert from Adobe is real, take a look at our helpful guide for best practices how to safely install and...
  • Kaspersky releases tools to decrypt files encrypted with CoinVault Ransomware

    04/14/2015 6:46:32 PM PDT · by Utilizer · 20 replies
    TechWorm ^ | on April 14, 2015 | Abhishek Kumar Jha
    Software security group Kaspesky labs in collaboration with the Dutch police has released a tool which helps to decrypt files locked by Ransomware. Kaspersky Labs has released a decryption tool for files encrypted with CoinVault ransomware. The tool was developed by the Kaspersky lab after the The National High Tech Crime Unit (NHTCU) of the Dutch police handed over the information obtained from a database of CoinVault command-and-control server containing the decryption keys.
  • More than 300 Chicago jobs lost as TigerDirect shutters stores

    04/08/2015 8:09:34 AM PDT · by fulltlt · 12 replies
    Crain's Chicago Business ^ | 4/6/2015 | Crain's Chicago Business
    More than 300 Chicago-area jobs will be lost when electronics retailer TigerDirect closes all but three of its 34 stores, including four Chicago-area locations and a distribution center. About 40 employees at each location will be cut, a spokeswoman said. Stores in Orland Park, Hoffman Estates, Naperville and Vernon Hills are among those closing. According to the latest Illinois Warn report, layoffs will occur at the retail locations May 9. A distribution center adjacent to the Naperville store will also be shuttered, with 172 workers scheduled to be laid off June 8.
  • How the US thinks Russians hacked the White House

    04/08/2015 4:17:19 AM PDT · by afraidfortherepublic · 15 replies
    CNN ^ | 4-8-15 | Evan Perez and Shimon Prokupecz
    Washington (CNN)—Russian hackers behind the damaging cyber intrusion of the State Department in recent months used that perch to penetrate sensitive parts of the White House computer system, according to U.S. officials briefed on the investigation. While the White House has said the breach only affected an unclassified system, that description belies the seriousness of the intrusion. The hackers had access to sensitive information such as real-time non-public details of the president's schedule. While such information is not classified, it is still highly sensitive and prized by foreign intelligence agencies, U.S. officials say. The White House in October said it...
  • Russia’s Invasion of White House Computers: The Story Still Has Not Been Told

    04/08/2015 4:10:21 AM PDT · by afraidfortherepublic · 9 replies
    Powerline ^ | 4-7-15 | John Hinderaker
    CNN has made news with this headline: “How the U.S. thinks Russians hacked the White House.” Russian hackers behind the damaging cyber intrusion of the State Department in recent months used that perch to penetrate sensitive parts of the White House computer system, according to U.S. officials briefed on the investigation. While the White House has said the breach only affected an unclassified system, that description belies the seriousness of the intrusion. The hackers had access to sensitive information such as real-time non-public details of the president’s schedule. While such information is not classified, it is still highly sensitive and...
  • Mono 4 Released, First Version To Adopt Microsoft Code (Windows .NET for Linux)

    04/05/2015 8:26:58 AM PDT · by dayglored · 8 replies
    Slashdot ^ | April 5, 2015 | jones_supa
    Version 4.0.0 of Mono, the FOSS implementation of the .NET Framework, has been released. This is the first release of Mono that replaces various components of Mono with code that was released by Microsoft under the MIT license. Microsoft itself is working towards .NET Core: a redistributable and re-imagined version of .NET, which has two code drops: CoreFX and CoreCLR. Mono at this point continues to provide an API that tracks the .NET desktop/server version. This means that most of the Mono code that has been integrated from Microsoft comes from the ReferenceSource code drop. ...
  • Malwarebytes Programs

    04/02/2015 10:43:19 AM PDT · by hsmomx3 · 21 replies
    Is Malwarebytes and Malwarebytes Anti-Exploits two separate programs? If so, is it advised to have both programs on my computer? I am currently using Malwarebytes Anti-malware on my Windows 8.1 system.
  • No, it’s not always quicker to do things in memory (computer)

    03/26/2015 8:27:11 PM PDT · by Utilizer · 67 replies
    ITworld ^ | March 25, 2015 | Phil Johnson
    It’s a commonly held belief among software developers that avoiding disk access in favor of doing as much work as possible in-memory will results in shorter runtimes. The growth of big data has made time saving techniques such as performing operations in-memory more attractive than ever for programmers. New research, though, challenges the notion that in-memory operations are always faster than disk-access approaches and reinforces the need for developers to better understand system-level software. These findings were recently presented by researchers from the University of Calgary and the University of British Columbia in a paper titled When In-Memory Computing is...
  • SSL/TLS Suffers 'Bar Mitzvah Attack'

    03/26/2015 10:43:03 AM PDT · by Citizen Zed · 5 replies
    Dark Reading ^ | 3-26-2015 | Kelly Jackson Higgins
    SSL/TLS encryption once again is being haunted by an outdated and weak feature long past its prime:  a newly discovered attack exploits a weakness in the older, less secure RC4 encryption algorithm option in SSL/TLS that's still supported in many browsers and servers. Itsik Mantin, director of security research with Imperva, at Black Hat Asia in Singapore today will detail how an attacker could sniff credentials and other information during an SSL session in an attack he named the "Bar Mitzvah Attack" after 13-year-old weaknesses in the algorithm it abuses. The attack is a glaring reminder that the RC4 algorithm,...
  • BitWhisper turns up heat on air-gap security

    03/24/2015 9:46:52 AM PDT · by Patriot777 · 4 replies
    © 2015 Tech Xplore, Phys.org ^ | March 24, 2015 - 5 hrs ago | Nancy Owano
    Ben Gurion University reported Monday that researcher Mordechai Guri, assisted by Matan Munitz and guided by Prof. Yuval Elovici, uncovered a way to breach air-gapped systems—that's quite something considering that air-gapped systems, said the Daily Mail, are among the most secure computers on the planet, used in high security settings such as classified military networks, payment networks processing credit and debit card transactions for retailers, and industrial control systems for critical infrastructure. The research initiative was given the name BitWhisper, part of research on the topic of air-gap security at the Cyber Security Research Center at Ben-Gurion University. Dudu Mimran,...
  • No love lost: Microsoft tries to block Linux on Windows machines

    03/24/2015 7:52:28 AM PDT · by ShadowAce · 37 replies
    Linuxveda ^ | 21 March 2015 | Paul Hill
    Remember the most talked about story of 2014? It was Microsoft loves Linux. It looks like Microsoft’s love for Linux is more like Mark Wahlberg’s love for Reese Witherspoon as we saw in the movie Fear.If reports are to be trusted Microsoft’s survival mechanism may kick in again, with the new release of Windows. The legacy software maker may resort to ‘secure boot’ to block alternative operating systems on Windows PCs.At Microsoft’s hardware conference WinHEC, new slides were shown which could mean bad news for Linux users. Machines shipping with Windows 10 may see OEMs enforcing Secure Boot without an option...
  • Trouble with Firefox and Java

    03/23/2015 2:07:45 PM PDT · by lafroste · 23 replies
    me | 3/23/15 | lafroste
    Last week I had a very wierd computer glitch. It screwed up my text fonts, desktop icons and other stuff. At any rate I have gotten things mostly back under control, except for one thing. Java scripts refuse to run in Firefox. I have updated Firefox, I have update Java, I have gone through everywhere I can think of to enable Java script, but it still will not run. Does anyone have any suggestians on how to fix this or what the problem might be? It has me flummoxed. Any help is appreciated. Thanks!
  • Italian Researchers Expect 3D Printed Eyes by 2027, Providing Enhanced Vision & WiFi Connection

    03/21/2015 8:34:15 PM PDT · by 2ndDivisionVet · 12 replies
    3D Print ^ | March 20, 2015 | Bridget Butler Millsaps
    There’s one thing you may have begun to notice about digital design and 3D printing: whatever you think might happen in the future is probably going to advance far beyond whatever you envisioned or thought might be a cool idea. And literally, one day you may be envisioning your entire world, and recording it as well, through completely artificially constructed, 3D printed eyeballs. You may be able to say goodbye to prescription glasses and contact lenses — and even your camera, as your original retina is replaced by a new and digital network contained inside your head, and even able...
  • Ransomware: Pay it or fight it?

    03/21/2015 9:30:33 AM PDT · by xzins · 50 replies
    Network World ^ | Mar 16, 2015 | Colin Neagle
    Ask security experts what to do when hit with ransomware – the sophisticated malware that infects a device or network, uses military-grade encryption to restrict access, and demands payment for the decryption key – and you'll typically get the same answer: "never pay the ransom." But for many, that's simply not an option. For example, last November an employee in the Sheriff's Department in Dickinson County, Tenn., accidentally clicked on a malicious ad and exposed the office network to the infamous CryptoWall ransomware. Detective Jeff McCliss told local News Channel 5 that CryptoWall had encrypted "every sort of document you...
  • Ethereum, IT Dreamed Up By a Wunderkind 19 y.o. That Could One Day Transform Law, Finance & Society

    03/19/2015 11:50:14 PM PDT · by 2ndDivisionVet · 16 replies
    Reason Magazine's Hit & Run Blog ^ | March 19, 2015 | Jim Epstein
    Ethereum, the brainchild of wunderkind software developer Vitalik Buterin, who was just 19 when he came up with the idea, is the most buzzed-about project right now in the cryptocurrency community. It has attracted an all-star team of computer scientists and raised $18.4 million in a crowdfunding campaign—the third most successful of all time. And now, according to the official Ethereum blog, it's on the verge of being rolled out to the public. Ethereum's developers use a rolling ticker tape of bold tag lines to describe what they're creating, including a “Social Operating System for Planet Earth,” and “the Upcoming...