Von "A...löchern" und "Hanswürsten"


Einen Prozessgegner in einem Internetforum als "Arschloch" zu bezeichnen, ist nicht automatisch eine Beleidigung in rechtlichem Sinn. Zu diesem Urteil kamen die Richter des Landgerichtes Köln. Nach Ansicht des Gerichtes handelt es sich lediglich um eine "pointierte Äußerung des Missfallens".


¬> Hier gehts zur Geschichte

... Link (0 comments) ... Comment



Freie Konkurrenz schlägt MP3


In einem der Hörtests von Audioformaten hat sich die lizenzfreie MP3-Konkurrenz Ogg Vorbis gegen den De-facto-Standard MP3 durchgesetzt. Ausgewählte Musik-Experten sowie über 3.000 Teilnehmer eines Online-Tests haben MP3 und seine Konkurrenten verglichen und bewertet.



¬>
Hier gehts zur Geschichte

... Link (0 comments) ... Comment



Freie Konkurrenz schlägt MP3


In einem der Hörtests von Audioformaten hat sich die lizenzfreie MP3-Konkurrenz Ogg Vorbis gegen den De-facto-Standard MP3 durchgesetzt. Ausgewählte Musik-Experten sowie über 3.000 Teilnehmer eines Online-Tests haben MP3 und seine Konkurrenten verglichen und bewertet.


<>¬> Hier gehts zur Geschichte

... Link (0 comments) ... Comment



IBM Ice Cube - 26.000 Gigabyte gewürfelt


Der "Ice Cube" genannte Speicherwürfel soll bis zu 26.000 Gigabyte Daten speichern und Daten von fehlerhaften Modulen automatisch auslagern.Jeder Datenwürfel hat eine abgeflachte metallene Ecke, die beim Einstecken automatisch mit einer Wasserkühlungsleiste des Sockels verbunden wird und somit die Wärme aus dem Würfelgehäuse ableiten soll.


¬><a href="www.golem.de"target="_blank"> GOLEM

... Link (0 comments) ... Comment



Exploit Modelling and Generalization


Exploit writing has been done for a long time, and much time and energy is consumed by those writing them. Most of the time exploits are variations on the same principles most of the time. Even if we accept this as 'truth', we see that pieces of code are written from scratch time and time again, and the same sort of calculations and techniques are performed most of the time. The impact of this has two sides, first of all lots of energy is wasted, since the writing could have cost the author much less time, the second is that most of the time the author seems happy with his achievements and is not planning to go and waste more energy implementing ease-of-use and more reliable use for something that's going to be fixed only few days after the vulnerability has been disclosed. This paper tries to generalize exploitation principles and also strives to build a non-formal exploitation model for use in buffer overflow and format string exploit building.

¬> SECURITY PROTOCOL

... Link (0 comments) ... Comment



Advanced buffer overflow exploits


Nowadays there are many buffer overflow exploit codes. The early buffer overflow exploit codes only spawn a shell ( execute /bin/sh ). However, nowadays some of the buffer overflow exploit codes have very nice features. For example, passing through filtering, opening a socket, breaking chroot, and so on. This paper will attempt to explain the advanced buffer overflow exploit skill under intel x86 linux.

¬> SECURITY PROTOCOLS

... Link (0 comments) ... Comment



More cyber-attacks coming from Malaysia


According to data compiled by its regional Global Command Centers (GCCs), which monitor and protect client networks from cyber-attacks, Malaysia was among the top three countries of origination of intrusion attacks. “Using a monthly analysis, Malaysia-originated attacks accounted for 20 percent of overall incidents in July, compared to only 5 percent for the month of June,” said Alan See.

¬> CNET

... Link (0 comments) ... Comment



BROWSER Archive


ALLE Browser dieser welt Penibel geordnet & zum download bereit gestellt. z.b mosiac-ncsa/windows/0.7beta/:

Browser Archive — the Internet's leading source for web browsers, old and new.

¬> BROWSER ARCHIVE

... Link (0 comments) ... Comment



HELLO .... my name is TUROK


Five people have changed their names by deed poll to that of computer-game character "Turok" in a new marketing ploy that aims to turn people into living adverts, according to the company pioneering the scheme.Everything from their passports to their telephone bills will now simply carry the name of the hero of a cult dinosaur-hunter computer game.

<img SRC=us.news1.yimg.com WIDTH=300HEIGHT=84 BORDER=0> <a href="story.news.yahoo.com"target="_blank">REUTERS

... Link



The full top 10: Hoax virus warnings and spam scams


Here's what's been fooling email users this summer...

  1. JDBGMGR
  2. Budweiser frogs
  3. 'A virtual card for you'
  4. Hotmail hoax
SILICON.com

... Link (0 comments) ... Comment



Büromaschinenmuseum


Der Geschichte der Büroatomatisation und ihrer Auswirkungen auf den Büroalltag ist diese Seite der Johannes Kepler Universität in Linz gewidmet.


<a href="www.idv.uni-linz.ac.at"target="blank">Hier gehts zum Büromaschinenmuseum

... Link (0 comments) ... Comment



Combining XML and databases


XML has evolved into a viable alternative for representing data. As more applications use XML, the big question becomes how to combine XML with relational databases. Let’s dive deeper into the issues involved in combining XML with databases and look at how all that data can be stored and queried.

<a href="builder.com.com"target="_blank">Take me 2 the BUILDER

... Link (0 comments) ... Comment