Mar
23
2009
Skype has made a new foray into the business front with their announcement of “Skype for SIP.” This allows businesses to migrate to Skype without having to move off of their old PBX systems. “Skype has long had a business unit, but that version of its service required computers and software, which is how most users make their Skype calls. With Skype for SIP the company seeks to lower the pain barrier by requiring no hardware installation whatsoever, and the re-configuration of a SIP-enabled PBX to an established codec that presumably is within the skillset of whoever maintains it already.”

Read more of this story at Slashdot.


Comments Off on Skype Courts Businesses With "Skype for SIP" | tags: computers, google | posted in technical news
Mar
22
2009
narramissic writes “Researchers with security consultancy IOActive have created a worm that could quickly spread among Smart Grid devices, small computers connected to the power grid that give customers and power companies better control over the electricity they use. ‘[The worm] spread from one meter to another and then it changed the text in the LCD screen to say “pwned,”‘ said Travis Goodspeed, an independent security consultant who worked with the IOActive team. In the hands of a malicious hacker, this code could be used to cut power to Smart Grid devices that use a feature called ‘remote disconnect,’ which allows power companies to cut a customer’s power via the network. The robustness of US power networks has been a hot-button issue after a technical glitch in 2003 caused a cascading power failure in the eastern United States and Canada that affected 55 million people.”

Read more of this story at Slashdot.


Comments Off on Smart Grid Computers Susceptible To Worm Attack | tags: computers, google, network, security, tv | posted in technical news
Mar
21
2009
The Narrative Fallacy writes “John Markoff has a story at the NY Times speculating about what will happen on April 1 when the Conficker worm is scheduled to activate. Already on an estimated 12 million machines, conjectures about Conficker’s purpose ranges from the benign — an April Fool’s Day prank — to far darker notions. Some say the program will be used in the ‘rent-a-computer-crook’ business, something that has been tried previously by the computer underground. ‘The most intriguing clue about the purpose of Conficker lies in the intricate design of the peer-to-peer logic of the latest version of the program, which security researchers are still trying to completely decode,’ writes Markoff. According to a paper by researchers at SRI International, in the Conficker C version of the program, infected computers can act both as clients and servers and share files in both directions. With these capabilities, Conficker’s authors could be planning to create a scheme like Freenet, the peer-to-peer system that was intended to make Internet censorship of documents impossible. On a darker note, Stefan Savage, a computer scientist at the University of California at San Diego, has suggested the possibility of a ‘Dark Google.’ ‘What if Conficker is intended to give the computer underworld the ability to search for data on all the infected computers around the globe and then sell the answers,’ writes Markoff. ‘That would be a dragnet — and a genuine horror story.'”

Read more of this story at Slashdot.


Comments Off on Researchers Ponder Conficker’s April Fool’s Activation Date | tags: cap, computers, google, Mac, program, security | posted in technical news
Mar
20
2009
An anonymous reader writes “I hate my career of the past few years. For a long time I’ve wondered what I’d do after I broke even and could get into something new, and I keep coming back to computers. I’d like to get into software, since I always enjoyed coding. I have some background with C++ so I’m not starting entirely from scratch. My problem is my degrees and past employment have no practical application to the field. Where should I start? I have friends in both IT and software development who might be able to pull some strings and get me an interview or two for entry-level positions, but what can I do to make myself hireable in a short period of time? Is it possible to pick up enough of what I’d need within a couple months? If so, what and how?”

Read more of this story at Slashdot.


Comments Off on From an Unrelated Career To IT/Programming? | tags: computers, developer, google, program, programming | posted in technical news
Mar
19
2009
Because I use auto-increment integers in almost every table I can for the primary key, they tend to get very large very fast. This can sometimes be an annoying problem when I’m debugging an application or testing a mysql database query. They are resetable and it’s so much quicker to select from the database when you’re checking for id=3 or id=25 then id=305678.
The query to reset the auto increment primary id of your choosing is :
ALTER TABLE some_table AUTO_INCREMENT = 1;
It is also possible to set the next auto_increment number
You can do it like this :
SET insert_id=5;
Now your next mysql_insert_id() will be 5.
4 comments | tags: computers, database, mysql, sql, technical knowledge | posted in problems and solutions, reference
Mar
18
2009
Wellington Grey writes “I’m a physics teacher and have been wondering what ways it’s possible to get students to participate in or donate to real science projects. I encourage my students to help out with things like Galaxy Zoo (which has just released a new version) and to get them to install BOINC on their personal computers. Do Slashdotters out there have any other suggestions that would be appropriate for the 11-18 age range? Extra credit if you can think of a way that I can track their progress so that I can give them extra credit.”

Read more of this story at Slashdot.


Comments Off on How To Get High-Schoolers Involved In Real Science? | tags: computers, google | posted in technical news
Mar
18
2009
r3lody writes “An extremely large amount of the information we get on a daily basis comes from what we see. Imagery is therefore very important to those who want to communicate with us. When computers had advanced enough to be able to process images in a digital fashion, the market opened up for programs that could manipulate them in many ways. While many professionals would opt for the paid programs, there is a free alternative: GIMP (Gnu Image Manipulation Program). The only stumbling block is learning how to use it properly. That is where Beginning GIMP: From Novice to Professional, Second Edition by Akkana Peck comes in.” Read below for the rest of Ray’s review.

Read more of this story at Slashdot.


Comments Off on Beginning GIMP: From Novice to Professional 2nd Ed | tags: computers, google, program | posted in technical news
Mar
13
2009
Urchin writes “In the early 1990s, the World Wide Web was a power-hungry monster unpopular with network administrators, says Robert Topolski, chief technologist of the Open Technology Initiative. They preferred the sleek text-only Gopher protocol. Had they been able to use data filtering technology to prioritize gopher traffic Topolski thinks the World Wide Web might not have survived. But it took computers another decade or so to be powerful enough to give administrators that option, and by that time the Web was already enormously popular.” My geek imagination is now all atwitter imagining an alternate gopher-driven universe.

Read more of this story at Slashdot.


Comments Off on How Moore’s Law Saved Us From the Gopher Web | tags: computers, google, network, technology, twitter, web | posted in technical news
Mar
12
2009
An anonymous reader writes “‘[The BBC] managed to acquire its own low-value botnet — the name given to a network of hijacked computers — after visiting chatrooms on the internet. The programme did not access any personal information on the infected PCs. If this exercise had been done with criminal intent it would be breaking the law. But our purpose was to demonstrate botnets’ collective power when in the hands of criminals.’ The BBC performed a controlled DDoS attack, ‘then ordered its slave PCs to bombard its target site with requests for access to make it inaccessible.'”

Read more of this story at Slashdot.


Comments Off on BBC Hijacks 22,000 PCs In Botnet Demonstration | tags: computers, google, network, program | posted in technical news
Mar
12
2009
News programme ‘Click’ takes over a botnet.The BBC has deliberately hacked into 22,000 PCs to prove the power of botnets, and the damage that can be done with a network of compromised computers.
Comments Off on BBC hacks into thousands of PCs | tags: computers, network, news, program | posted in technical news