The Return of BSOD: Does ANYONE trust Microsoft patches?

Found on The Register on Monday, 18 August 2014
Browse Software

On 12 August Microsoft released 40 updates for Internet Exploder, Windows 7 and Windows 8 Pro.

Very shortly afterwards people began reporting their Windows machines bricking – while others glimpsed something they hadn't seen in a very long time: the Blue Screen of Death.

Sysadmins must decide whether to trust Microsoft one more time or to run the gauntlet of hackers and malware writers, applying patches late and infrequently to save their own sanity and their credibility in the workplace.

You could avoid a lot of updates if IE wouldn't be deeply integrated into the OS. For someone who never ever uses it, the best patch would be if it wasn't even there.

It's Now Possible To Play Netflix Natively On Linux Without Wine Plug-Ins

Found on Phoronix on Saturday, 09 August 2014
Browse Software

Thanks to DRM support with HTML5 and Google's Chrome developers moving quick to implement the support that's backed by Netflix, you can today run Chrome and play Netflix videos.

It's not as easy though right now just firing up Chrome 38 Beta on Linux to play Netflix, but you first need to switch the reported HTTP user-agent string.

Closed source DRM that won't make it into Chromium, plus working around a useragent block. With pointless roadblocks like that people will keep on supporting torrents. Stopping someone from accessing your website based on the useragent just makes you look like an idiot.

PHP gets a formal specification, at last

Found on IT World on Thursday, 31 July 2014
Browse Software

"It is about time a formal specification is defined for PHP, though the lack of one has by no means hindered the adoption of this programming language," wrote Al Hilwa, program director of software development research for IT analyst firm IDC.

Thanks to its copious use on the Web, PHP is the seventh most widely used language today, according to the latest monthly estimate of programming language popularity from development tools provider Tiobe.

Let's hope they can finally agree on the order of arguments required by a function. Sometime the haystack comes first, in other cases the needle. Or numerous functions which do pretty much the same. PHP needs a serious code cleanup and has to drop a lot of old ballast.

14 antivirus apps found to have security problems

Found on The Register on Tuesday, 29 July 2014
Browse Software

COSEINC is a Singapore security outfit that has run a critical eye about 17 major antivirus engines and products and found dangerous local and remotely-exploitable vulnerabilities in 14.

"AV engines make your computer more vulnerable with a varying degree of performance penalty [and] is as vulnerable to zero day attacks as the applications it tries to protect from. [It] can even lower the operating system exploiting mitigations."

AV engines have peaked already. It doesn't make sense if an AV product detects 99.99% of all known viruses, because, well, it should figure out how to detect the unknown ones. Outbreaks spread world-wide within hours so fast signature updates are mission-critical. All that aside, most of the responsibility for security has the company behind the OS and software developers (hello Adobe Flash and Acrobat).

Oracle Linux 7 Makes Its Debut

Found on eWEEK on Thursday, 24 July 2014
Browse Software

As Oracle Linux 7 is based on RHEL 7, it inherits many of the same new features, though Oracle is not simply cloning RHEL and putting the company's name on it.

Full compiled versions of Oracle Linux 7 are available to anyone to use as they please and do not require that organizations pay Oracle anything to use, he said.

Larry is pretty bold there, taking the OS from Redhat and slapping a different name onto it to lure people in. CentOS already offers a free version, but at least they tell users to go to Redhat if they need paid support.

Red Hat Delivers Enterprise-Grade Ceph Storage

Found on eWEEK on Wednesday, 16 July 2014
Browse Software

Red Hat today announced the Inktank Ceph Enterprise 1.2 storage platform, the first Ceph Enterprise release since Red Hat acquired Inktank.

Among the major new features in Ceph Enterprise 1.2 are erasure-coding and cache-tiering capabilities. Erasure coding is a technology that provides forward error correction for storage, giving users a higher degree of storage stability and resilience.

Now if one would only have the time to test things like this.

'The writing is TOO SMALL': MPs row over Parliamentary move to Office 365

Found on The Register on Friday, 11 July 2014
Browse Software

"The most common cause of a call to the service desk after the mailbox migration has been to request help to follow the process for logging into the new mail box for the first time," he said.

"For example, Office 365 seems to require people to have 20:20 vision, and the average age of a member of this House is 55. It is proving extremely difficult," she said.

"Why is it that so many men are employed in PICT? There are hardly any women at all. What's going on in recruitment here? Surely we believe that women can do this kind of task in a way that is equal to, if not better than, men," said the leftist firebrand.

"If not better". Imagine a guy would have said that. There's a simple rule: you hire people because of their abilities, not because of their gender.

Flash: The most INSECURE program on a UK user's PC

Found on The Register on Thursday, 10 July 2014
Browse Software

Adobe Flash Player was the most insecure program installed on UK computer users PCs throughout the second quarter of 2014, according to stats from vulnerability management firm Secunia.

The report reveals that Microsoft XML Core Services 4 (MSXML) is another security weak spot.

Of 2014? Of all times.

Apple aims to speed up secure coding with Swift programming language

Found on The Register on Monday, 02 June 2014
Browse Software

What it is, is an entirely new syntax that – in the words of Apple senior VP Craig Federighi, who unveiled it during the Monday morning WWDC keynote – aims to be "Objective-C without the baggage of C."

Like scripting languages but unlike C, Swift lets you get straight to the point. The single line println("Hello, world") is a complete program in Swift. Note, also, that you don't even have to end the statement with a semicolon, as you do in C. Those are optional, unless you're combining multiple statements on a single line.

So in the end, a less strict language. What just gives you more rope to hang yourself.

TrueCrypt Website Says To Switch To BitLocker

Found on Slashdot on Wednesday, 28 May 2014
Browse Software

Several readers sent word that the website for TrueCrypt, the popular disk encryption system, says that development has ended, and Windows users should switch to BitLocker.

A source code diff of the two versions has been posted, and the new release appears to simply remove much of what the software was designed to do. It also warns users away from relying on it for security.

Sounds pretty much like a defacement. Although someone bothered to put a little more work into it that usual. Just sit back, stick to your currently installed version and wait a few days; until then things should have cleared up some.