Thursday, June 19th, 2008
Twitter is a fun Web 2.0 communications tool that allows users to deliver quick messages of 140 characters or less. The hastiness and ephemeral nature of these messages means that Twitter has become more than a communication tool — it's a source of angry, funny and awkward messages that would ...
Posted in General BS, Internet, Privacy, Software | No Comments
Wednesday, June 18th, 2008
Less than one day after its launch, Firefox 3 has a vulnerability.
According to Tipping Point's Zero Day Initiative, the vulnerability, which it rates as critical, was reported within the first five hours of Firefox 3's release.
"Once the vulnerability was verified in TippingPoint's DVLabs and acquired from the researcher, the vulnerability ...
Posted in Internet, Security, Software | No Comments
Wednesday, June 18th, 2008
"HTML forms (i.e. <form>) are one of the features in HTTP that allows users to send data to HTTP servers. An often overlooked feature is that due to the nature of HTTP, the web browser has no way of identifying between an HTTP server and one that is not an ...
Posted in Coding, Internet, Privacy, Security | No Comments
Wednesday, June 18th, 2008
Web traffic volumes will almost double every two years from 2007 to 2012, driven by video and web 2.0 applications, according to a report from Cisco Systems.
Increased use of video and social networking has created what Cisco calls 'visual networking', which is raising traffic volumes at a compound annual growth ...
Posted in Hardware, Internet, Networking | No Comments
Tuesday, June 17th, 2008
An Australian man has discovered security vulnerabilities in his Internet-connected coffee maker that could allow a remote attacker to not only take over his Windows XP-based PC but also make his coffee too weak.
Craig Wright, a risk advisory services manager at professional services firm BDO, found several security holes, including ...
Posted in General BS, Hardware, Internet, Networking, Security | No Comments