I thought on TV shows they put some ridiculous Apple/DOS GUI?
At one of Toronto’s locations of The Bay department store, four giant screens have suffered from the infamous Blue Screen of Death for days. You’d think that someone would, I dunno, turn off the freakin’ screens. Or, at minimum, there’s gotta be some 2.4gHz nanny cam feed they could leech for at least a few days before anyone complained. Because after the first 24 hours or so of BSOD, we begin to think that they like the aesthetic.
Full size after the jump.
There is something quite alarming on the recently released â€œBlue Magicâ€ music video.
The song, by the wildly successful rap artist and businessman Jay-Z, is on an album of songs accompanying/inspired by the Ridley Scott movie â€œAmerican Gangster,â€ starring Denzel Washington and Russell Crow.
But it wasnâ€™t sex, drugs, violence or explicit language that shocked my conscience.
“Here’s to the crazy ones. The misfits. The rebels. The troublemakers. The round pegs in the square holes. The ones who see things differently. They’re not fond of rules. And they have no respect for the status quo. You can praise them, disagree with them, quote them, disbelieve them, glorify or vilify them. About the only thing you can’t do is ignore them. Because they change things. They invent. They imagine. They heal. They explore. They create. They inspire. They push the human race forward. Maybe they have to be crazy. How else can you stare at an empty canvas and see a work of art? Or sit in silence and hear a song that’s never been written? Or gaze at a red planet and see a laboratory on wheels? We make tools for these kinds of people. While some see them as the crazy ones, we see genius. Because the people who are crazy enough to think they can change the world, are the ones who do.”
I thought I might share with you a way to recover password on a *nix system. The commands and screen shots are from Ubuntu, but this basic process should work for any distro.
When you create an account on a Linux system, the password isn’t stored. Instead, the hash of the password is stored in /etc/shadow. Here is a portion of my shadow file. The password hash field begins with $1$.
Now, if I want to discover the passwords for those accounts, I need to enlist the help of John the Ripper.
On some networks itâ€™s impossible to use BitTorrent. For example, if youâ€™re at work, school, or connected to Comcast or a public hotspot. But thereâ€™s an easy solution to overcome this problem. By using a secure connection (SSH), you can bypass almost every firewall or traffic shaping application.
Being subjected to advertising is just something weâ€™ve come to expect in our daily routines, and for most of us, weâ€™ve become so conditioned to various advertising methods that we donâ€™t even think twice about it. There is nothing wrong with advertising in and of itself. Itâ€™s how we learn about products, services and entertainment. Advertising is also the big main source of revenue for things we hold dear like television and The Movie Blog (which is 100% funded by advertising), so Iâ€™m certainly never going to rail on the evils of advertising.
However, advertising in movie theaters is a topic that has been brought up here on The Movie Blog more than a few times, and a recent report by the Cinema Advertising Council in the New York Post begs us to once again revisit the issue. Weâ€™ve all figured that commercials playing in movie theaters was worth a lot of moneyâ€¦ but did you realize its worth almost HALF A BILLION DOLLARS? The IMDB gives us this:
Revenue from in-theater advertising rose more than 15 percent to $456 million from $395 million a year agoâ€¦ The Post quoted CAC Chairman Cliff Marks as expressing the belief that moviegoers are becoming â€œmore acceptingâ€ of screen advertising. A recent Arbitron poll indicated that two-thirds of moviegoers â€œdonâ€™t mindâ€ the ads.
Donâ€™t mind the ads? DONâ€™T MIND THE ADS???
Thanks to the media, the word “hacker” has gotten a bad reputation. The word summons up thoughts of malicious computer users finding new ways to harass people, defraud corporations, steal information and maybe even destroy the economy or start a war by infiltrating military computer systems. While there’s no denying that there are hackers out there with bad intentions, they make up only a small percentage of the hacker community.
The term computer hacker first showed up in the mid-1960s. A hacker was a programmer — someone who hacked out computer code. Hackers were visionaries who could see new ways to use computers, creating programs that no one else could conceive. They were the pioneers of the computer industry, building everything from small applications to operating systems. In this sense, people like Bill Gates, Steve Jobs and Steve Wozniak were all hackers — they saw the potential of what computers could do and created ways to achieve that potential.
How pathetic this guy’s life must be?
Spent 3 hours at Wal-Mart today. I stoped 11 out of 12 people from getting HD-DVD players. I will be spending a lot of time down thier the rest of this year. It is the best I can do to help the less tech savy not get screwed on this half-step format. One couple I talked too went straight over to the games section and picked up a 40GB PS3. The wife said about HD-DVD “We have purchased Toshiba products for over 10 years and we have never been disipointed in them. I can not believe that they would sell a product that is not of the upmost quality.” Two other’s went ahead and picked up the 80GB which really shocked me , because that is a lot more than they came in expecting to spend. One of these people was an older man about mid 50′s he said “It would really be nice if they posted the differances between these products more. Seeing 30 of those GB things compared to 50 really gives you more of a idea about these products than price and names.” The only one I could not stop from buying it was this 27 year old guy that said he already had the 360 HD-DVD drive for his 360 in the living room, and he wanted to get this one for his bedroom.
Overall I think the day went well. I was surprised to see so much traffic towards HDM. It seems this year will see a lot of sales in this spectrum of the market. I am going to do my best to try and make sure that these Walmart shoppers in my area make an informed decision before purchaseing into HDM. Hopefully it will help Blu win and put us on track to a medium that will last for a solid 15 to 20 years.
More than 15,000 people have appealed to the government since February to have their names removed from the terrorist watch list that delayed their travel at U.S. airports and border crossings, the Homeland Security Department says.
The complaints have created such a backlog that members of Congress are calling for a speedier appeal system that would help innocent people clear their names so they won’t fall under future suspicion. Among those who have been flagged at checkpoints: toddlers and senior citizens with the same names as suspected terrorists on the watch list.
“To leave individuals in this purgatory is un-American,” says Rep. Yvette Clarke, D-N.Y., who says she’ll introduce legislation to try to streamline the process.
The Homeland Security Department says it gets about 2,000 requests a month from people who want to have their names cleared. That number is so high that the department has been unable to meet its goal of resolving cases in 30 days, says Christopher White, spokesman for the Transportation Security Administration, which handles the appeals. He says the TSA takes about 44 days to process a complaint.
In February, the TSA launched the Traveler Redress Inquiry Program, a one-stop shop for people to appeal links to the watch list, which flags anyone with potential ties to terrorism. The list has more than 750,000 names.
House Homeland Security Committee Chairman Bennie Thompson, D-Miss., says he will grill officials at a hearing on Thursday. “Given the widespread use of the terrorist watch list, the redress process is of paramount importance,” he says.
Fedora is a Linux-based operating system that showcases the latest in free and open source software. Fedora is always free for anyone to use, modify, and distribute. It is built by people across the globe who work together as a community: the Fedora Project. The Fedora Project is open and anyone is welcome to join.
The Fedora Project is out front for you, leading the advancement of free, open software and content.
As usual… Microsoft’s days are numbered… this release seals the deal… and for those Ubuntu users, no offense… but this release is pretty ruthless.
Screenshots after the jump.
Download for free.
Microsoft has extended the life of Windows XP because Vista has simply not shown any life in the market. We have to begin to ask ourselves if we are really looking at Windows Me/2007, destined to be a disdained flop. By all estimates the number of Vista installations hovers around the number of Macs in use.
How did this happen? And whatâ€™s going to happen next? Does Microsoft have a Plan B? A number of possibilities come to mind, and these things must be considered by the company itself.
So what went wrong with Vista in the first place? Letâ€™s start off with the elephant in the room. The product was overpriced from the outset. Why was it so expensive? What was special about it? All the cool and promised features of the original vision of Longhorn were gutted simply because it was beyond Microsoftâ€™s capability to implement those features.
This failure to deliver what was promisedâ€”even after several delays in the productâ€™s release, by the wayâ€”did nothing to excite anyone. It made the company look bad. It directly resulted in a no-confidence vote that was manifested in a lackluster reception and low sales. Microsoft should have scrapped the project two years ago and instead patched XP until it could deliver something hot.
To make things worse, there are too many versions. Exactly what is the point of that? Donâ€™t we all just want Vista Ultimate? The other versions seem like a way to maybe save money for some users who cannot afford to get the real thing. You can be certain this version glut results only in complaints about what each variation is missing.
Microsoftâ€™s initial approach to marketing this turkey was obviously going to be to put it on just new machines, which would eventually saturate the market, but the PC manufacturers squawked and demanded the continuation of XP sales. Though there is some chatter about how Linux could use this lull in the Microsoft juggernaut to make some real headway onto the desktop, this is unlikely to happen. But Microsoft, with all its paranoid thinking, might have believed it to be possible. So XP is still with us and will be until deep into next year.
I should mention here that much of this mess, I strongly believe, is due to Microsoftâ€™s recent obsession with Google and online search. Now Microsoft wants to be in the advertising business because Google is in the advertising business. Meanwhile, it canâ€™t do its real job.
Read the rest of this entry »
Stanford University research project on converting bitmap images to vector art, aka “auto tracing” or “automatic vectorization”. Similar to Adobe Illustrator’s Live Trace and CorelDRAW’s PowerTRACE but works better in many cases. Upload image and get a converted result (EPS/SVG) in a few moments.
This week Wal-Mart started selling a $199 PC with a Linux based operating system called gOS pre-loaded. A lot of websites mistakenly reported that the “g” stands for Google, because this stripped down operating system has direct links to a bunch of Google services like YouTube, Docs & Spreadsheets, and Blogger. But gOS is actually a stripped down “green” operating system based on Ubuntu.
The ISO weighs in at 728 MB, making it a tight fit for a CD-R, but leaving plenty of room on a DVD-R. And like almost all Ubuntu-based operating systems, gOS comes as a LiveCD, meaning you can take it for a test drive without installing anything. Just boot your PC from the DVD. When you’re done, shut down, pop the DVD out and reboot into Windows, Linux, or whatever you’ve been using up until now.
At least two law firms here, including Allen & Gledhill, have also offered to help him appeal the sentence.
The 21-year-old who is doing a double degree in engineering and economics on a National University of Singapore scholarship, met up with lawyers from Allen & Gledhill on Wednesday.
While he has yet to make a final decision, with the fine settled “there was no big need to appeal and I need to catch up on my studies,” he said.
First of all, does anyone even remember the band W.A.S.P.? If I remember correctly they were a band from the early 80â€™s. Heavy metal always shadowed by the likes of Motley Crew, Twisted Sister, Scorpions, etc..
Second, can you believe that ANYONE would attend one of their shows today? Maybe I am being a little bit harsh here, but I honestly couldnâ€™t name a single hit that this band has, let alone even name or hum one of their songs.
And to top it all of they have now released an official statement saying that ALL cameras, even mobile phones will be confiscated from people as then enter their shows.
If you lose a Windows password, or you buy a system that has an OS on it, but you don’t know the password, what are you to do? The best thing to do would be to throw in a Linux CD, format the drive, and install the Distro. But, what if you want to boot to the system and see what’s on there, and get data off?
In Part 1, Intro to Reverse Engineering – No Assembly Required, we extended the series of coding articles for non-programmers with an area of high interest in the infosec community. We’re proud to be able to bring you the highly anticipated follow-up complete with screen shots, sample code and applications. This one is long and detailed, so strap yourselves in for some great educational content. This paper is designed to outline some essential reverse engineering concepts, tools and techniques – primarily, debuggers and using the debugging process to reverse engineer application functions and algorithms. It is assumed you have knowledge of basic assembly and C programming. An understanding of Win32 programming and API calls is also helpful. This tutorial does not necessarily have to be read in order (although it is strongly advised), as some sections do not contain information that directly relates to subsequent sections. However, if you begin skipping around and find that you have trouble understanding a concept, or feel like you missed an explanation, it would be best to go back to previous sections of the tutorial and read them first.