Chinese Company Shares Huge Malware Database
A Chinese company that has created a massive database of malware found on Chinese Web sites opened up the information to other security organizations on Thursday. Beijing-based KnownSec gathered the viruses and other information with a crawler that scans nearly 2 million Chinese Web sites each day, Zhao Wei, CEO of the security company, said in an interview in Beijing. He planned to give a presentation on the subject at the Forum of Incident Response and Security Teams (FIRST) security conference in Kyoto, Japan this week.
Four Open Source Mind Mapping Apps to Keep You Focused
Mind mapping tools are among the unsung heroes of project management. They’re often overlooked or underused because some people mistakenly believe the learning curve is too steep or the features are unnecessary. Most mind mapping software is easy to use, however, and the applications are a great way to keep track of projects, research, book notes, and brainstorming sessions.
Ich nutze kein GTD oder Mindmapping-Werkzeug mehr. Ich habe nur noch eine kleine ToDo-Liste mit welcher ich wirklich harmoniere. Aber andere Menschen, andere Abläufe, somit eine kleine Übersicht, welche wirklich nur MindMapping ist, aber nicht vollständig…
100 Geeky Places to Take Your Kids This Summer
There is plenty of summer vacation season left on the calendar, and boredom may already be settling in around the house. So what are some fun, geeky places to take your geeklets? Even better, what are some fun, geeky places that kids and adults will all enjoy?
Da frage ich mich, als bekennender Onkel, welche Plätze es so in Deutschland gibt, any Hints?
Tutorials And Tips On Building A Twitter Application
In this post i have collected some tutorials and resources for developers on building a twitter application.
Ich arbeite an einem identi.ca-Client mit dialog und perl. Somit, wenigstens dann ein identi.ca-Client mehr und nicht nur Twitter…
Howto Check your webserver for vulnerabilities : Nikto a website scanner
Nikto is an Open Source (GPL) web server scanner which scans your webserver against more than 3500 dangerous files/CGIs, outdated version checking, It has a very good plugin support.
Nikto ist immer in meinem Repertoire. Ich mag Ihn. Naja, die Anleitung laggt ein wenig, aber ich kann wenigstens mit guten Gewissen verlinken, ist ja nicht wirklich eine Anleitung für den Hacker§
So Many Trolls, So Little GNU/Linux Usersâ€¦
Some Windows users even go under names like „Sabayon User“ or „Gentoo User“ because it makes them seem more credible.
Und wollen sie 1337 sein nutzen sie …
SSL VPN hack vulnerability details to emerge
Black Hat demo to show even extended validation certificates are vulnerable to man-in-the-middle attacks
How 16 Electronics Companies Got Their Names
Most of us spend a lot of time staring at a computer or TV screen, playing video games, or gabbing into our cell phones. The brand names for these products are all familiar, but where did they come from in the first place? Just what is a Nokia? Here’s a look at the origins of some of your favorite tech and gadget companies‘ names.
Nmap 5.00 Released
Nmap („Network Mapper“) is a free and open source (license) utility for network exploration or security auditing. Many systems and network administrators also find it useful for tasks such as network inventory, managing service upgrade schedules, and monitoring host or service uptime.
CSS 3 Cheat Sheet
In this post we present a printable CSS 3 Cheat Sheet (PDF), a complete listing of all the properties, selectors types and allowed values in the current CSS 3 specification from the W3C. Each property is provided in a section that attempts to match it with the section (module) that it is most actively associated within the W3C specification. Next to each property is a listing of the expected values that that property takes (normal text shows named values it accepts and italics shows value types it will accept).
Michigan Supreme Court Issues New Stop Twittering Rule For Juries
There have been a few recent stories about jury members using Twitter, and courts have been trying to figure out how to deal with it. Well, over in Michigan, the Supreme Court has issued new rules for judges to tell jurors concerning their use of text messaging and other communication services.
Das muss man denen noch sagen?!?!?
Google To Newspapers: Here, Let Me Introduce You To Robots.txt
With the silly introduction last week of the AP’s attempt to create a weird and totally unnecessary new data feed to keep out aggregators and search engines, it seems that Google has gotten fed up.
Naja, wenigstens macht es google nun selbst. Es gibt genug Blogposts, welche schon mit Sarkasmuserklärungen es den großen Gazetten in Deutschland klar machen wollten.
eBoot Camp: Proven Internet Marketing Techniques to Grow Your Business (Amazonlink, Achtung)
In this Web 2.0 era, small business owners are at a severe disadvantage because they have minimal, if any, knowledge, about Internet marketing. They also lack the budget to hire a top-notch web marketer. As a result, the thrust of their Internet marketing program is usually a poorly performing website that attracts few visitors.
Auch BigBusiness Owners. Wäre mal etwas für die Freunde von Vodafone… Sorry, ich konnte es mir nicht verkneifen, ich musste auch mal