Blog Tips

Simply click on the URL (http:// ...) link in each article to visit the article's page

To search this blog, try the Search Box on the right, or click on the Labels following each post entry

23 February, 2015

ISPs will hand pirates over to the movie houses, potentially without a court fight, under Australia's proposed piracy code. As of September 1, Australian internet service providers will be forced to send warning notices to alleged movie pirates, under a draft Copyright Notice Scheme industry code unveiled on Friday.

http://www.smh.com.au/digital-life/computers/gadgets-on-the-go/isps-to-dob-in-movie-pirates-under-proposed-threestrikes-rule-20150220-13kc2c.html

The U.S. government on Friday advised Lenovo Group Ltd customers to remove a "Superfish," a program pre-installed on some Lenovo laptops, saying it makes users vulnerable to cyberattacks.

http://www.reuters.com/article/2015/02/20/lenovo-cybersecurity-dhs-idUSL1N0VU21H20150220?irpc=932

Telstra, Optus and Vodafone may be forced to order the recall of potentially millions of mobile phone SIM cards after it was revealed that US and British spy agencies stole encryption keys that secured personal information, including calls and texts, on the chips.

http://www.smh.com.au/digital-life/consumer-security/telcos-face-mass-sim-card-recall-after-spy-agencies-encryption-hack-revealed-20150223-13mecc.html

Java vs. Node.js: An epic battle for developer mind share. Comparison

http://www.infoworld.com/article/2883328/java/java-vs-nodejs-an-epic-battle-for-developer-mindshare.html

Take Your Selfie Game to the Next Level With a 3-D Printed Statue of Yourself

http://www.wired.com/2015/02/3d-printed-selfies/

Software reverse engineering, the art of pulling programs apart to figure out how they work, is what makes it possible for sophisticated hackers to scour code for exploitable bugs. It’s also what allows those same hackers’ dangerous malware to be deconstructed and neutered. Now a new encryption trick could make both those tasks much, much harder.

http://www.wired.com/2015/02/crypto-trick-makes-software-nearly-impossible-reverse-engineer

From the Ground Up: How I Built the Developer's Dream Keyboard. Arduino

http://www.toptal.com/embedded/from-the-ground-up-how-i-built-the-developers-dream-keybooard