Web Browser Performance Comparison And Database

Found on Hot Hardware on Sunday, 18 October 2015
Browse Internet

There are a number of standard metrics we can throw at each browser, as well as a number of standards-based compliance tests, and it's these that we'll be focusing on.

Microsoft still has a long way to go in both IE and Edge when it comes to HTML5. It's improving, and most people won't notice any detrimental effects, but it still gives developers a headache.

There is no dominant browser generally speaking. What it will come down to is features.

What is annoying with IE/Edge is that the browser is still built into the operating system. Even if you never ever use it, you still have to roll in updates (which are almost always the by far biggest).

BBC iPlayer Blocks UK VPN Servers Over Piracy Concerns

Found on TorrentFreak on Saturday, 17 October 2015
Browse Internet

The BBC is taking measures against the unauthorized use of its iPlayer service by actively blocking UK VPN services. The measures aim to prevent foreigners from accessing iPlayer without permission, but they're also blocking many legitimate UK citizens from surfing the Internet securely.

This effectively stops foreigners and expats from accessing the service, but it also affects license paying UK citizens who use a VPN to browse the Internet securely. They will now have to disconnect their VPN if they want to access iPlayer.

Cat, meet a new mouse. If the BBC wants to alienate its users and support "piracy" (because some will now distribute the blocked content), that's just fine.

Red Hat Acquires Ansible for DevOps IT Automation

Found on eWEEK on Friday, 16 October 2015
Browse Software

Red Hat today announced that it is acquiring privately held IT automation vendor Ansible, whose open-source platform is well-known and deployed in the DevOps community and is competitive with both Chef and Puppet.

Red Hat plans to use Ansible's technology to complement its existing IT management tools, including CloudForms and Satellite. The decision to acquire Ansible does not, however, mean that Red Hat will abandon its use of Puppet.

Red Hat already has a clear idea of where Ansible fits in. "We will integrate Ansible playbooks into CloudForms automation and orchestration," Fitzgerald said.

Ansible looks pretty promising, although Puppet seems to have the bigger userbase.

Here’s Why Cybersecurity Experts Want Public Source Routers

Found on Motherboard on Thursday, 15 October 2015
Browse Hardware

The experts reasoned that closed-source router firmware could expose users across the internet to security vulnerabilities. If these routers’ firmware were available for scrutiny online, the thinking goes, the wider community of experts and developers could work together to battle vulnerabilities without having to wait for router makers to release a patch—if they bother to do so at all.

Paul Vixie, the CEO of computer security firm Farsight Security, told Motherboard about one recent router vulnerability that allowed hackers to redirect their victims’ internet traffic to an ad server under their control.

This has worked for other areas, like encryption software where it is critically important that any 3rd party can verify the absence of backdoors. Considering the recent router security issues, this is a very valid demand.

The Most Mysterious Star in Our Galaxy

Found on The Atlantic on Wednesday, 14 October 2015
Browse Astronomy

“We’d never seen anything like this star,” says Tabetha Boyajian, a postdoc at Yale. “It was really weird. We thought it might be bad data or movement on the spacecraft, but everything checked out.”

When I spoke to Boyajian on the phone, she explained that her recent paper only reviews “natural” scenarios. “But,” she said, there were “other scenarios” she was considering.

Wright and his co-authors say the unusual star’s light pattern is consistent with a “swarm of megastructures,” perhaps stellar-light collectors, technology designed to catch energy from the star.

Theoretically, it could be a Dyson sphere.

Twitter to trim 8 percent of its staff

Found on CNet News on Tuesday, 13 October 2015
Browse Internet

The social network will lay off up to 336 employees, or about 8 percent of its workforce, as it looks to streamline its operations, Dorsey said Tuesday.

Known for the brevity and speed of users' posts, Twitter has been struggling trying to engage to a broader audience.

Twitter had 4,100 workers around the world, half of them engineers and the rest spread among administrative and marketing, as of June 30.

Twitter's stock rose as much as 5 percent Tuesday on news about the layoffs.

Stock market logics: fire 8% and win 5%. Maybe if Dorsey lays off 80% he could make 50% more? That said, it is surprising how something as trivial as posting short lines of text (which are in 99.999% of all cases utterly pointless) onto a website can provide jobs for 4100 people.

Google's .bro file format changed to .br after gender bother

Found on The Register on Monday, 12 October 2015
Browse Various

The reason for the change is threads like this one, in which posters suggest that “'bro' has a gender problem” and “comes of[f] misogynistic and unprofessional due to the world it lives in.”

To many, “bro”, just means brother. To others, the word's been adopted as a prefix in the term ““brogrammer” that denotes macho programmers who bring sexist attitudes into the workplace and make life difficult for women in technology-heavy workplaces.

Seriously, people have issues with something as pointless as a file extension? Next on the list: HTML because the M might be mistaken for "male" and the command line utility unzip.

Brute Force Amplification Attacks Against WordPress XMLRPC

Found on Sucuri on Sunday, 11 October 2015
Browse Internet

One of the hidden features of XML-RPC is that you can use the system.multicall method to execute multiple methods inside a single request. That’s very useful as it allow application to pass multiple commands within one HTTP request.

Instead of going against wp-login.php (which can be easily blocked or protected via .htaccess) or doing a single attempt against xmlrpc, attackers are leveraging the system.multicall method to attempt to guess hundreds of passwords within just one HTTP request.

Wordpress is the new Flash, a pile of code riddled with bugs. Actually this is not really a bug, but a decision. Before, xmlrpc.php was pretty much considered a security hole, but WP devs now decided that this security hole should be always enabled starting with version 3.5 (while at the same time they removed the option to turn it off from the backend). Better make sure that access to xmlrpc.php is blocked via .htaccess (don't rely on some random WP "protection" plugin) or just rename/delete that file. Or even better, delete that resource hogging Wordpress entirely.

The Final Leaked TPP Text is All That We Feared

Found on Electronic Frontier Foundation on Saturday, 10 October 2015
Browse Politics

Today's release by Wikileaks of what is believed to be the current and essentially final version of the intellectual property (IP) chapter of the Trans-Pacific Partnership (TPP) confirms our worst fears about the agreement, and dashes the few hopes that we held out that its most onerous provisions wouldn't survive to the end of the negotiations.

If you dig deeper, you'll notice that all of the provisions that recognize the rights of the public are non-binding, whereas almost everything that benefits rightsholders is binding.

Perhaps the biggest overall defeat for users is the extension of the copyright term to life plus 70 years (QQ.G.6), despite a broad consensus that this makes no economic sense, and simply amounts to a transfer of wealth from users to large, rights-holding corporations.

If you look for provisions in the TPP that actually afford new benefits to users, rather than to large, rights-holding corporations, you will look in vain. The TPP is the archetype of an agreement that exists only for the benefit of the entitled, politically powerfully lobbyists who have pushed it through to completion over the last eight years.

Any politician supporting TPP should be sued for treason. They were elected to work for the people, not against them.

LogMeIn Buys Password Manager LastPass for $110 Million

Found on eWEEK on Friday, 09 October 2015
Browse Internet

"We believe this transaction instantly gives us a market leading position in password management, while also providing a highly favorable foundation for delivering the next generation of identity and access management solutions to individuals, teams and companies," LogMeIn CEO Michael Simon said in a statement.

One commenter to the announcement wrote, "Oh no! This is NOT good news. logmein has a terrible track record with acquisitions. I feel story for the LastPass team, your management has sold you out. Good luck finding new jobs. [Has] anyone got any good recommendations for alternative password managers? Time to jump ship before this ship sinks."

Nobody with a few braincells left should ever entrust passwords to some random online service.