Lost treasure of Atari REVEALED
A recap for the uninitiated: In 1983, as The New York Times reported, Atari secured the rights to turn E.T. the Extra-Terrestrial into a video game. The results were beyond dreadful. That was bad news for Atari because it had made lots more cartridges of the game than it could sell.
North Korea labels South's president as 'crafty prostitute' after Obama visit
North Korea has launched a vitriolic attack on the South Korean president, comparing her to "crafty prostitute" in thrall to her "pimp" Barack Obama.
"What Park did before Obama this time reminds one of an indiscreet girl who earnestly begs a gangster to beat someone or a capricious whore who asks her fancy man [pimp] to do harm to other person while providing sex to him," North Korea's CPRK said.
Bug in Microsoft Security Essentials Downs Windows XP Machines
An update to Microsoft Security Essentials, the software company's free anti-malware software, crashed Windows XP computers last week, causing business disruptions to customers still relying on the outdated—and, in many cases, now-unsupported—operating system.
While uninstalling Microsoft Security Essentials worked around the issue, it also caused an additional problem: Even though Microsoft later fixed the update, MSE could not be reinstalled on Windows XP computers because the systems are no longer supported by Microsoft, the source said.
Ex-Wife Allegedly Using Copyright To Take Down Husband's Suicide Note
It would be great to see both the takedown demand, and the judge's claim, but it is undeniable that the letter itself has been taken down in some places due to a copyright claim -- and the claim appears to have come from that same law firm. Some others are claiming they've personally been pressured into removing the letter.
Furthermore, as this is getting more attention, more people appear to be posting variations on the letter getting it much more attention. In fact, a bunch are now reading the letter aloud on YouTube (making it even more transformative in any fair use analysis).
In just one year, Zynga lost nearly half of its daily active users
The company reported that its daily active users rose from 27 million in the last quarter of 2013 to 28 million this quarter. But when compared to the first quarter of 2013, Zynga had 53 million daily active users—which means the company has lost about half of its most active players in a year.
NYPD Twitter campaign 'backfires' after hashtag hijacked
Users were asked to tweet a photo of themselves with officers and add the hashtag #myNYPD as part of a social media campaign.
But while several people did so, the hashtag was also picked up by others who used it to identify tweets containing photos of the NYPD in more hostile situations.
Easter egg: DSL router patch merely hides backdoor instead of closing it
The same security researcher who originally discovered a backdoor in 24 models of wireless DSL routers has found that a patch intended to fix that problem doesn’t actually get rid of the backdoor—it just conceals it. And the nature of the “fix” suggests that the backdoor, which is part of the firmware for wireless DSL routers based on technology from the Taiwanese manufacturer Sercomm, was an intentional feature to begin with.
Once the backdoor is switched back on, it listens for TCP/IP traffic just as the original firmware did, giving “root shell” access—allowing anyone to send commands to the router, including getting a “dump” of its entire configuration.
Popular LAUSD science teacher on being suspended due to controversial experiments
One project was a marshmallow shooter—which uses air pressure to launch projectiles. The other was an AA battery-powered coil gun—which uses electromagnetism to launch small objects.
Schiller said Los Angeles Unified School District officials accused him of “supervising the building, research and development of imitation weapons.” He has been reporting to a district administrative office since March 6, as he waits for LAUSD to conclude its investigation.
Easy-to-Use NTP Amplification Emerges as Common DDoS Attack Vector
The two most popular types of reflection attacks, which bounce network traffic off intermediate servers on the Internet, have shot up in popularity, accounting for 23 percent of all infrastructure attacks in the 2014 first quarter, Akamai stated in its Prolexic Quarterly Global DDoS Attack Report.
The largest attack seen by Akamai targeted a European entertainment firm, and exceeded 200G bps at its peak, the firm said. The attack lasted more than 10 hours, and amplified the attack volume through vulnerable servers using a combination of NTP and the Domain Name System (DNS) reflection.
How has an increase in system complexity affected new programmers?
Making a memory-efficient program was required 40/50 years ago because there wasn't enough memory and it was expensive, so most programmers paid close attention to data types and how the instructions would be handled by the processor. Nowadays, some might argue that due to increased processing power and available memory, those concerns aren't a priority.