Lost treasure of Atari REVEALED

Found on The Register on Monday, 28 April 2014
Browse Software

A recap for the uninitiated: In 1983, as The New York Times reported, Atari secured the rights to turn E.T. the Extra-Terrestrial into a video game. The results were beyond dreadful. That was bad news for Atari because it had made lots more cartridges of the game than it could sell.

Some treasures better stay buried.

North Korea labels South's president as 'crafty prostitute' after Obama visit

Found on The Guardian on Sunday, 27 April 2014
Browse Politics

North Korea has launched a vitriolic attack on the South Korean president, comparing her to "crafty prostitute" in thrall to her "pimp" Barack Obama.

"What Park did before Obama this time reminds one of an indiscreet girl who earnestly begs a gangster to beat someone or a capricious whore who asks her fancy man [pimp] to do harm to other person while providing sex to him," North Korea's CPRK said.

North Korea is always good for a laugh. It's like that little ugly kid nobody wants to play with; yet North Korea actually believes it is important and has any influence. Furthermore, they can't really complain about Park for not having any children; at least not as long as Nort Korea's people die from hunger.

Bug in Microsoft Security Essentials Downs Windows XP Machines

Found on eWEEK on Saturday, 26 April 2014
Browse Software

An update to Microsoft Security Essentials, the software company's free anti-malware software, crashed Windows XP computers last week, causing business disruptions to customers still relying on the outdated—and, in many cases, now-unsupported—operating system.

While uninstalling Microsoft Security Essentials worked around the issue, it also caused an additional problem: Even though Microsoft later fixed the update, MSE could not be reinstalled on Windows XP computers because the systems are no longer supported by Microsoft, the source said.

A bug? More like someone at MS watched too much Bob Ross: "We don't make mistakes, just happy little accidents".

Ex-Wife Allegedly Using Copyright To Take Down Husband's Suicide Note

Found on Techdirt on Friday, 25 April 2014
Browse Legal-Issues

It would be great to see both the takedown demand, and the judge's claim, but it is undeniable that the letter itself has been taken down in some places due to a copyright claim -- and the claim appears to have come from that same law firm. Some others are claiming they've personally been pressured into removing the letter.

Furthermore, as this is getting more attention, more people appear to be posting variations on the letter getting it much more attention. In fact, a bunch are now reading the letter aloud on YouTube (making it even more transformative in any fair use analysis).

I don't think this ex-wife has heard the term Streisand Effect before.

In just one year, Zynga lost nearly half of its daily active users

Found on Ars Technica on Thursday, 24 April 2014
Browse Internet

The company reported that its daily active users rose from 27 million in the last quarter of 2013 to 28 million this quarter. But when compared to the first quarter of 2013, Zynga had 53 million daily active users—which means the company has lost about half of its most active players in a year.

Those are good news. It's hard to believe that an entire company is based on pointless games which are a total waste of time; and it's even harder to believe that investors really thought that business idea could bring in great profits.

NYPD Twitter campaign 'backfires' after hashtag hijacked

Found on BBC News on Wednesday, 23 April 2014
Browse Internet

Users were asked to tweet a photo of themselves with officers and add the hashtag #myNYPD as part of a social media campaign.

But while several people did so, the hashtag was also picked up by others who used it to identify tweets containing photos of the NYPD in more hostile situations.

You reap what you sow. The NYPD obviously isn't known for being friendly.

Easter egg: DSL router patch merely hides backdoor instead of closing it

Found on Ars Technica on Tuesday, 22 April 2014
Browse Software

The same security researcher who originally discovered a backdoor in 24 models of wireless DSL routers has found that a patch intended to fix that problem doesn’t actually get rid of the backdoor—it just conceals it. And the nature of the “fix” suggests that the backdoor, which is part of the firmware for wireless DSL routers based on technology from the Taiwanese manufacturer Sercomm, was an intentional feature to begin with.

Once the backdoor is switched back on, it listens for TCP/IP traffic just as the original firmware did, giving “root shell” access—allowing anyone to send commands to the router, including getting a “dump” of its entire configuration.

That's why hardware manufacturers should be required to publish the source code of their systems. Business secrets are all nice and such, but obviously they aren't nice when it comes to critical infrastructure components.

Popular LAUSD science teacher on being suspended due to controversial experiments

Found on Southern California Public Radio on Monday, 21 April 2014
Browse Science

One project was a marshmallow shooter—which uses air pressure to launch projectiles. The other was an AA battery-powered coil gun—which uses electromagnetism to launch small objects.

Schiller said Los Angeles Unified School District officials accused him of “supervising the building, research and development of imitation weapons.” He has been reporting to a district administrative office since March 6, as he waits for LAUSD to conclude its investigation.

Are there only full blown retards? If this goes on, picking up a rock would earn you a free trip to jail for "preparing an assault weapon". Those who granted the suspension should be under investigation instead.

Easy-to-Use NTP Amplification Emerges as Common DDoS Attack Vector

Found on eWEEK on Sunday, 20 April 2014
Browse Internet

The two most popular types of reflection attacks, which bounce network traffic off intermediate servers on the Internet, have shot up in popularity, accounting for 23 percent of all infrastructure attacks in the 2014 first quarter, Akamai stated in its Prolexic Quarterly Global DDoS Attack Report.

The largest attack seen by Akamai targeted a European entertainment firm, and exceeded 200G bps at its peak, the firm said. The attack lasted more than 10 hours, and amplified the attack volume through vulnerable servers using a combination of NTP and the Domain Name System (DNS) reflection.

To be fair, NTP and DNS both were developed long before there was any reason to think about abuse. Or better: the network was so small back then that it was easy to find out who is the abuser.

How has an increase in system complexity affected new programmers?

Found on Ars Technica on Saturday, 19 April 2014
Browse Software

Making a memory-efficient program was required 40/50 years ago because there wasn't enough memory and it was expensive, so most programmers paid close attention to data types and how the instructions would be handled by the processor. Nowadays, some might argue that due to increased processing power and available memory, those concerns aren't a priority.

That's exactly the reason why we have printer drivers which are over 100MB in size, or mainstream software which requires half your disk space to display a pdf or open a spreadsheet. It's true that software these days is more powerful than it was decades ago, but compared to the efficiency of the code, it's mostly turned into bloatware. Today, marketing will tell you that you need a more powerful machine because they pay more attention to a quick release than to efficiency.