SharkLaser writes "Homeland Security's ICE unit has just started another phase of Operation In Our Sites. Last week the seized sites were selling counterfeit goods, but this time the list consists solely of movie download sites. ICE has now seized the domains of 11 Korean movie download portals. This is first time Operation In Our Sites has been expanded to include sites targeting non-U.S. nationals and non-English sites. ICE has since added a message in Korean to the seized sites. Interestingly, while the sites were in Korean, the domain names are all connected to a Seattle-based company World Multimedia Group, Inc."
ananyo writes "In a tongue-in-cheek contest of microscopic mobility, a line of bone marrow stem cells from Singapore beat out dozens of competitors to claim the title of the world's fastest cells. They whizzed across a petri dish at the breakneck speed of 5.2 microns per minute — or 0.000000312 kilometers per hour."
BobJacobsen writes "The UC Berkeley email system has been either offline, or only providing limited access, for more than a week. How can the place where sendmail originated fall so far? The campus CIO gave an internal seminar (video, slides) where he discussed the incident, the response, and some of the history. Briefly, the growth of email clients was going to overwhelm the system eventually, but the crisis was advanced when a disk failure required a restart after some time offline. Not discussed is the long series of failures to identify and implement the replacement system (1, 2, 3, 4). Like the New York City Dept. of Education problem discussed yesterday, this is a failure of planning and management being discussed as a problem with (inflexible) technology. How can IT people solve things like this?"
theshowmecanuck submits this news from Russia, where "Websites which exposed violations in Russia's parliamentary elections were inaccessible Sunday in a hacking attack they said was aimed at preventing them revealing the extent of election day fraud." Further, says the linked article, "Prime Minister Vladimir Putin, whose United Russia party is expected to win Sunday's polls but with a reduced majority, has denounced non-governmental organisations like Golos, comparing them to the disciple Judas who betrayed Jesus. Russia has seen an upsurge in Internet penetration since the last elections in 2007, and analysts have said the explosion of critical material on the web poses one of the biggest challenges to United Russia's grip on power."
First time accepted submitter txoof writes "I have a personal email archive that goes back to 2003. The early archives are around 2 megabytes. Every year the archives have grown significantly in size from a few tens of megs to nearly 500 megs from 2010. The archive is for storage only. It is a mirror of my Gmail account. The archives are both sent and received mail compressed in a hierarchy of weekly, monthly and yearly mbox files. I've chosen mbox for a variety of reasons, but mostly because it is the simplest to implement with fetchmail. After inspecting some of the archives, I've noticed that the larger files are a result of attachments sent by well-meaning family members. Things like baby pictures, wedding pictures, etc. What I would like to do is from this point forward is strip out all of the attachments and only save the texts of the emails. What would be a sane way to do that using simple tools like fetchmail?"
An anonymous reader writes "Anyone who's worked in a large engineering firm is familiar with institutional amnesia. Things get built, and then forgotten. Documentation is supposed to help, but rots, is lost, or uses obsolete methods and notation nobody understands anymore. I recently found myself in a strange position, rehired as a consultant with the unofficial job of reminding the company how an old plant works. I even have some personal copies of documents they seem to have lost, which I have to awkwardly smuggle back in. I don't find these kinds of experience written about often, but I'm convinced they're more common than you'd think."
First time accepted submitter DrDevil writes "The British spy agency GCHQ recently published a puzzle at canyoucrackit.co.uk (as featured on Slashdot), now just a few days later an academic at the University of Greenwich in England has posted a full video explanation of the puzzle. The puzzle has three stages and is not at all simple — likely to challenge even the best computer science graduates."
mrquagmire submits a link to the Jerusalem Post's report that an American reconnaissance UAV has been captured by the Iranian military. "'Iran's military has downed an intruding RQ-170 American drone in eastern Iran,' Iran's Arabic-language Al Alam state television network quoted the unnamed source as saying. 'The spy drone, which has been downed with little damage, was seized by the Iranian armed forces.' ... 'The Iranian military's response to the American spy drone's violation of our airspace will not be limited to Iran's borders any more,' Iran's Arabic language Al Alam television quoted the military source as saying, without giving details."
theodp writes "Harvard Law School Prof Jonathan Zittrain explains in The Personal Computer is Dead why you should be afraid — very afraid — of the snowballing replicability of the App Store Model. 'If we allow ourselves to be lulled into satisfaction with walled gardens,' warns Zittrain, 'we'll miss out on innovations to which the gardeners object, and we'll set ourselves up for censorship of code and content that was previously impossible. We need some angry nerds.' Searchblog's John Battelle, who's also solidly in the tear-down-this-walled-garden camp, adds: 'I'm not a nerd, quite, but I'm sure angry.'"
EagleHasLanded writes "The Berkeley Pit, an abandoned open pit copper mine in Butte, Montana — part of the largest Superfund site in the U.S. — is filled with 40 billion gallons of acidic, metal-contaminated water. For years the water was believed to be too toxic to support life, until Andrea and Donald Stierle, a pair of organic chemists at the University of Montana, discovered that the Pit is a rich source of unusual extremophiles, 'many of which have shown great promise as producers of potential anti-cancer agents and anti-inflammatories.' In the course of their ongoing investigation, the two self-described 'bioprospectors' have also discovered an uncommon yeast, which might play a significant role in cleaning up the site. In the meantime, the Pit has become a tourist attraction in Butte, which charges $2 for the opportunity to take in the view from the Viewing Stand."
Hugh Pickens writes "BBC reports that with 4,000 people killed in Syria since March, the government has banned the iPhone and threatened confiscation and prosecution for anyone found with an iPhone as the government tries to control information getting out of the country. Most international media have been banned from Syria since the uprising began, so footage of the violent crackdown has primarily come from activists filming material themselves and posting it on the internet. A mobile app for the iPhone called Souria Wa Bas (which roughly translates as 'Syria and That's All') covers the actions of opposition groups, including the Local Coordination Committees which claim to have members across the country and includes links for news, videos, and a map of opposition hot spots. The app's creators say they produced Souria Wa Bas to counter regime accounts of the opposition's activities. 'Under the fast-moving events in Syria and the deliberate attempts to distort the facts by some. We have compiled the most important Syrian news sources available,' say creators of the app at the Apple store."
Nancy_A writes "While the world as we know it runs on carbon, science fiction's long flirtation with silicon-based life has spawned a familiar catchphrase: 'It's life, but not as we know it.' Although non-carbon based life is a very long shot, this Q&A with one of the U.S.'s top astrochemists — Max Bernstein, the Research Lead of the Science Mission Directorate at NASA headquarters in Washington,D.C. — discusses what silicon life might be like."
adeelarshad82 writes "The Asus Eee Pad Transformer Prime happens to the first Quad-Core Android Tablet, which also makes it the fastest and most powerful tablet. The secret ingredient is Nvidia's five-core Tegra 3 chipset, including four cores which work together at up to 1.4GHz each and a 'companion core' which runs alone. When tested on the Antutu system benchmark, the Prime scored a breathtaking 10,619, which is roughly double the score of even fast devices like the HTC Jetstream. Benchmark results for Sunspider and Browsermark browsing scored at 17ms and 98324, respectively, which also happened to be amongst the best. The tablet weighs 1.3 pounds and measures 10.4 by 7.1 inches, but it's very slim at 0.3 inches."
1sockchuck writes "Apple may build a huge new data center next door to the Facebook server farm in rural Prineville, Oregon. Slashdot has previously noted the potential that Prineville could become a data center mecca due to its climate, which is ideal for using fresh air to cool servers. The scenario could mirror the trend in rural North Carolina, where both Apple and Facebook have built data centers. it's always been likely that Apple will need at least one other large data center complex to provide backup capabilities for the facility in North Carolina."
First time accepted submitter xx_chris writes "Cell carriers can and do brick jail broken cell phones but they won't brick stolen cell phones. Except in Australia. The Australians apparently have been doing this for 10 years and it reduces violent crime since the thieves know they won't be able to sell the stolen phone. The article points out that cell carriers have a financial disincentive to do this since a stolen phone means another sale."
Das Samsung Galaxy Nexus ist das erste Smartphone, das mit Android 4.0 Ice Cream Sandwich ausgeliefert wird. Die neue Version von Googles mobilem Betriebssystem fühlt sich deutlich runder an als die Vorgängerversion. ...
Einmal im Jahr erstellt Sectools.org eine Übersicht mit den wichtigsten Tools für Penetration Tester und Sicherheitsforscher. 2011 wurde das Verfahren ein wenig umgestellt, so das eine Reihe interessanter ...
Wie kann der Anwender RealVNC mit einem DSL-Router benutzen und was ist zu tun, wenn unter Ubuntu 10.10 das Programm keine Videos anzeigt. Wir haben Ihnen die wichtigsten FAQs zu dieser Remote-Control-Software ...
Apple hat in iOS 5 für die Photo-App einen Panorama-Modus integriert, der allerdings nicht freigeschalten ist. Mit einem Trick und ohne Jailbreak lässt sich auf dem iPhone 4 und iPhone 4S das Feature ...
Mit iLock lässt sich die gezielte Zugriffskontrolle einzelner Apps auf dem BlackBerry durchsetzen. So kann bewusst das Adressbuch oder sämtliche SMS-Kommunikation mit einem Passwort abgesichert und vor ...
ZoneAlarm Free gehört zu den bekanntesten und populärsten kostenlosen Firewall-Angeboten im Netz. Das Programm bietet Zwei-Wege-Funktionalität und ist ein guter Ersatz für die standardmäßige Windows-Firewall. ...
Bei der Wartung, Optimierung und Erhöhung der Sicherheit von Windows-Clients assistieren dem Administrator und Endanwender Gratis-Tools. Wir stellen empfehlenswerte Systemwartungs-Utilities vor.
Es wurden zwei Schwachstellen in JBoss AS 7.x gemeldet, die sich für Cross Site Scripting ausnutzen lassen. Gewisse Eingaben im Nachrichten-Zentrum der Administrations-Konsole werden nicht ausreichend ...
Die Hersteller der Smartphones haben sich klar von CarrierIQ distanziert. Es liege an der Mobilfunk-Betreibern, wie man die Geräte ausliefert. Die Schnüffelsoftware wurde auf Android-, webOS-, BlackBerry- ...
Der über 350 Seiten starke Ratgeber "Smartphones und Tablets im Unternehmen" steht den Lesern von TecChannel-Premium ab sofort kostenlos als eBook zur Verfügung.
Für Informatikabsolventen gibt es nicht nur viele Stellenangebote, sondern auch mehr Geld als noch vor zwei Jahren. Berufseinsteiger mit Diplom sind dabei weiterhin begehrter als Bachelor-Abschlüsse. ...
Die englischsprachige Freeware-Software Eraser löscht Daten so nachhaltig, dass Sie mit vertretbarem Aufwand selbst von professionellen Datenrettungslaboren nicht mehr sichtbar gemacht werden können. ...
Testen Sie Ihr IT-Wissen! Jeden Tag finden Sie bei TecChannel eine Frage aus dem IT-Bereich, deren richtige Antwort Sie als IT-Experte kennen sollten. Machen Sie kostenlos mit und erweitern Sie Ihre IT-Kenntnisse!
DroidStats bietet besonders für Inhaber von Inklusivpaketen praktische Funktionen, mit denen sich der eigene Verbrauch überwachen lässt. Zusätzliche Widgets informieren bereits auf dem Homescreen über ...
Ohne Unterstützung gleicht das Stöbern im App Store der Suche nach der Nadel im Heuhaufen. Die schiere Masse an Apps ist kaum noch überschaubar, wirklich gute Programme gehen einfach in der Masse unter. ...
Büros und Heimarbeitern, die über einen VPN-Zugangsknoten mit dem Firmennetz verbunden werden müssen, bietet die kompakte UTM-Appliance Fortinet FortiGate-50B eine solide Hardware-Lösung mit ausgereiften ...
AbiWord ist eine kostenlose Textverarbeitung für Windows, Linux und MacOS. Die Open-Source-Software erlaubt die gleichzeitige Bearbeitung eines Dokuments von mehreren Anwendern.
Die Fernsteuerungs- und Meeting-Software TeamViewer ist ab sofort in der neuen Version 7 verfügbar. Der gleichnamige Hersteller TeamViewer hat das Programm um zahlreiche neue Features erweitert.
Das Tool AllSync unterstützt den Anwender bei der Synchronisierung und Sicherung von sensiblen Daten. Es hilft Informationen an zwei verschiedenen Orten auf den gleichen Stand zu halten. Das Programm ...
Parallels hat einen Flicken für Plesk Panel 10.x zur Verfügung gestellt und schließt damit zwei Sicherheitslücken.
Der durch Cloud Computing verursachte Datenverkehr soll laut Netzwerkspezialist Cisco bis 2015 jährlich um 66 Prozent steigen. Im Jahr 2015 würde demnach zwölf Mal mehr Datenverkehr von Cloud Computing ...
Der TL-MR3020 von TP-Link ist ein kleiner WLAN-N-Router für den mobilen Business-Anwender. Der Router kann mittels eines UMTS/HSPA-USB-Sticks etwa als universeller Hotspot für unterwegs eingesetzt werden ...
Das Gratis-Tool "The Dude" untersucht das Subnetz und stellt die Zusammenhänge aller gefundenen Systeme in einer Übersichtskarte dar. Zusätzlich sammelt die Software Statusinformationen kompatibler Systeme ...
Das gibt mit Sicherheit ärger wegen Verletzung der Privatsphäre. Wie sich herausstellte haben bestimmte Mobilfunkbetreiber Spyware auf den Smartphones installier.