IndyWatch Science and Technology News Feed Archiver

Go Back:30 Days | 7 Days | 2 Days | 1 Day

IndyWatch Science and Technology News Feed Today.

Go Forward:1 Day | 2 Days | 7 Days | 30 Days

IndyWatch Science and Technology News Feed was generated at World News IndyWatch.

Monday, 03 April

00:41

Measuring the QO-100 WB transponder power budget Daniel Estvez

The QO-100 WB transponder is an S-band to X-band amateur radio transponder on the Eshail 2 GEO satellite. It has about 9 MHz of bandwidth and is routinely used for transmitting DVB-S2 signals, though other uses are possible. In the lowermost part of the transponder, there is a 1.5 Msym QPSK 4/5 DVB-S2 beacon that is transmitted continuously from a groundstation in Qatar. The remaining bandwidth is free to be used by all amateurs in a use whatever bandwidth is free and dont interfere others basis (there is a channelized bandplan to put some order).

From the communications theory perspective, one of the fundamental aspects of a transponder like this is how much output power is available. This sets the downlink SNR and determines whether the transponder is in the power-constrained regime or in the bandwidth-constrained regime. It indicates the optimal spectral efficiency (bits per second per Hz), which helps choose appropriate modulation and FEC parameters.

However, some of the values required to do these calculations are not publicly available. I hear that the typical values which would appear in a link budget (maximum TWTA output power, output power back-off, antenna gain, etc.) are under NDA from MELCO, who built the satellite and transponders.

I have been monitoring the WB transponder and recording waterfall data of the downlink with my groundstation for three weeks already. With this data we can obtain a good understanding of the transponder behaviour. For example, we can measure the input power to output power transfer function, taking advantage of the fact that different stations with different powers appear and disappear, which effectively sweeps the transponder input power (though in a rather chaotic and uncontrollable manner). In this post I share the methods I have used to study this data and my findings.

Assumptions

The main idea behind this post is that if we record waterfall data of the downlink, we are able to measure the relative power of the different signals in the transponder, as well as our receivers noise floor. If we do some reasonable assumptions, this allows us to estimate other quantities, which are in principle not directly measureable. These assumptions are the following:

  • The transponder characteristics, such as its input to output power transfer function and its passband shape are constant over time.
  • The effective G/T of my groundstation is constant over time. By effective G/T I mean the one which considers the antenna gain in the direction...

00:40

Leaked documents from Russian firm NTC Vulkan show Sandworm cyberwarfare arsenal Security Affairs

Files leaked by Russian IT contractor NTC Vulkan show that Russia-linked Sandworm APT requested it to develop offensive tools.

Documents leaked from Russian IT contractor NTC Vulkan show it was likely involved in the development of offensive tools. The documents demonstrate that it also developed hacking tools for the Russia-linked APT group Sandworm.

The Sandworm group (aka BlackEnergyUAC-0082, Iron Viking, Voodoo Bear, and TeleBots) has been active since 2000, it operates under the control of Unit 74455 of the Russian GRUs Main Center for Special Technologies (GTsST).

The group is also the author of the NotPetya ransomware that hit hundreds of companies worldwide in June 2017. In 2022, the Russian APT used multiple wipers in attacks aimed at Ukraine, including AwfulShredCaddyWiperHermeticWiperIndustroyer2IsaacWiperWhisperGatePrestigeRansomBoggs, and ZeroWipe. 

A joint research conducted by Mandiant with a collective of media outlets (including Papertrail Media, Der Spiegel, Le Monde, and Washington Post) focused on documents, dated between 2016 and 2020, belonging to NTC Vulkan (Russian: ).

The documents detail project requirements contracted with the Russian Ministry of Defense, including in at least one instance for GRU Unit 744...

00:38

Microsoft Windows Down to Just a Quarter of Connected Computers Techrights

Based on this surveyer that Microsoft likes to cite in other (misleading) contexts, only about a quarter of Web hits now come from Windows, based on about 3 million Web sites.

Windows quarter

Summary: In April (so far) Microsofts Windows is measured at about 25%; Android (Linux inside) is the most dominant operating system a trend that shows no signs of abatement

In India: (direct URL)

India's Windows share

Windows down to 13%.

00:00

Design Files Released for the PR2 Robot Hackaday

Its always great fun to build your own robot. Sometimes, though, if youre doing various projects or research, its easier to buy an existing robot and then use it to get down to business. That was very much the role of the Willow Garage PR2, but unfortunately, its no longer in production. However, as covered by The Robot Report, the design files have now been released for others to use.

The PR2 was built as an advanced platform with wide-ranging capabilities. It was able to manipulate objects with its 7-degrees-of-freedom end effectors, as well as visualize the real world with a variety of complex sensor packages. Researchers put it to work on a variety of tasks, from playing pool to fetching beers and even folding laundry. The latter one is...

00:00

Neuralinks FDA Troubles Are Just the Beginning IEEE Spectrum



Neuralink, the neurotechnology company founded by Elon Musk, is at best having a rough initial go-round with the Food and Drug Administrations human trials application process. The company also faces additional investigations by two other U.S. government agencies. These setbacks and the broad, cure-all expectations that its founder has placed on the companys neural implant could now incite increased scrutiny from regulators. By contrast, however, other neurotech companies have to date managed largely to avoid such intense regulatory scrutiny.

Neuralink is developing The Link, a brain-computer interface that records and stimulates electrical activity within a users brain. Brain-computer interfaces, or BCIs, are neural implants that connect a users brain to external electronics. Getting the device into peoples heads for the first time is a major goal for the company. Musk himself stated at a press event the company held last November that they planned to start human trials by the end of May of this year and are, reportedly, looking for a partner with whom to coordinate initial experiments.

Despite Musks characteristically overeager timetable, Neuralinks challenges in gaining FDA approval are only mounting. The Link, which is inserted across a users skull and into their brain, is categorized by the FDA as a Class III device, a designation of medical devices that sustain or support life, are implanted, or present potential unreasonable risk of illness or injury. FDA approval for a human test to potentially class III device statusknown as an investigational device exemption (IDE)can only be granted after an involved application process. In it, Neuralink must document how The Link is sufficiently safe and capable for its labeled indications. Just to initiate medical trials, in other words, substantial hurdles must be clear...

Go Back:30 Days | 7 Days | 2 Days | 1 Day

IndyWatch Science and Technology News Feed Today.

Go Forward:1 Day | 2 Days | 7 Days | 30 Days

Sunday, 02 April

23:57

Southern California Linux Expo 20x (SCaLE 20X) Are Now Online SoylentNews

The videos from Southern California Linux Expo 20x (SCaLE 20X) are now online. (Alternative via Invidious and its mirrors). SCaLE 20X took place in Pasadena, California from Thursday, March 9th through Sunday, March 12th, 2023.

The keynote speakers were Arun Gupta, Dr. Kitty Yeung, and Ken Thompson. There were nearly 100 sessions covering everything from open government to embedded, security, and FOSS@HOME to name only a few. Ceph, DevOps LA, Kubernetes and PostgreSQL also had presences at the event. Ken Thompson's keynote covered several topics including a long running project of his regarding music playback, which now includes a Raspberry Pi powered jukebox with tens of thousands of albums available. For the older material, the jukebox does playback through a player piano.


Original Submission

Read more of this story at SoylentNews.

23:22

Alzheimers May Not Actually Be a Brain Disease, Expert Says Lifeboat News: The Blog

The pursuit of a cure for Alzheimers disease is becoming an increasingly competitive and contentious quest with recent years witnessing several important controversies.

In July 2022, Science magazine reported that a key 2006 research paper, published in the prestigious journal Nature, which identified a subtype of brain protein called beta-amyloid as the cause of Alzheimers, may have been based on fabricated data.

One year earlier, in June 2021, the US Food and Drug Administration had approved aducanumab, an antibody-targeting beta-amyloid, as a treatment for Alzheimers, even though the data supporting its use were incomplete and contradictory.

22:48

Intel Alder Lake Motherboard With Coreboot/Dasharo Support On Sale For $153 USD Phoronix

If you have been wanting to experiment with running the open-source Coreboot on a modern Intel Alder Lake (Z690) motherboard, the MSI PRO Z690-A WiFi DDR4 that works thanks to 3mdeb's Dasharo is now for sale at its lowest price ever at just over $150...

21:42

Why Techrights Condones Fentanylware (TikTok) Ban and Suggests Extending Bans to Supposedly Good Fentanyl Techrights

Fentanylware: Who's there?

Summary: Were going to write a lot more about why social control media/networks ought to be avoided and what can be done to eradicate this disease from civil society (its not social; its surveillance, propaganda and censorship)

SOCIAL control media (AKA centralised manipulation) is generally bad and modern socially-manipulative media [sic] even more so; it is a lot worse for reasons well name in future posts. There are many reasons and itemising them properly takes effort. The dosages are increasing over time (like narcotics for the brain), not just the bandwidth. Surveillance, propaganda and censorship are among the levers (tenets?) and addiction is leveraged through gamification and FOMO. This is no childrens game.

Those who have been following our Daily Links are well aware that were not proponents of TikTok and not even remotely apologists of the parent company; its not racist or uncool to point out what TikTok does, probably by design (the same is true for social control media made in/operated from Europe and north America).

Computers were meant to make life easier and safer. In practice, however, we often see it turning out to be exactly the opposite.In the coming years were likely to write a lot more about the issue. Its not an enigma or some deep mystery why media has often sided with TikTok, seeing that budget was allocated to AstroTurfing and many in the media are themselves TikTok junkies.

Computers were meant to make life easier and safer. In practice, however, we often see it turning out to be exactly the opposite. In some cases, computers over-complicate life and put life itself at risk. Thats due to the choices made by people who truly control them, and those people arent the users who paid for these computers.

We strongly discourage adoption of social control media and we encourge people to abandon not only TikTok. The media found itself a bit of a scapegoat to distract from equally culpable surveillance and manipulation giants.

The problems here are multi-facetedWhen it comes to tackling this problem (both TikTok and others), one must tread very carefully and not adopt a one-size-fits-all omnibus...

21:22

Heres how growing plants on the Moon could benefit Earth Lifeboat News: The Blog

Plants could be grown in Moon soil, a new study shows. The findings on plant stress responses have the potential to help develop drought-resistant crops.

21:00

Printing a Brutalist Kitchen Timer Hackaday

Kitchen timer project in a angled green 3d printed case with a 7 segment display and knob.

A kitchen timer is one of those projects thats well defined enough to have a clear goal, but allows plenty of room for experimentation with functionality and aesthetics. [Hggh]s exploration of the idea is a clean, Brutalist kitchen timer.

The case for [Hggh]s kitchen timer is 3D printed with openings for a TM1637 four digit, seven segment display and for a KY-040 rotary encoder with knob attached. The internals are driven by an ATmega328P powered from a 18650 cell with a DW01-P battery protection chip and a TP4056 chip for charging. On the back of the case is a power switch and USB-C connector for power. It looks like the 3D printed case was sanded down to give it a smooth matte surface finish.

All the project files, including the STLs, OpenSCAD code, and KiCAD design, are available on GitHub. This Brutalist kitchen timer project is a nice addition to some of the kitchen timers weve featured in the past, including a minimalist...

20:30

Two More Gigabyte Motherboards See Sensor Monitoring With Linux 6.3 Phoronix

Earlier this week I wrote about a budget Gigabyte motherboard for AMD Ryzen CPUs seeing Linux sensor monitoring support with the addition to the Gigabyte WMI sensors driver. Two more Gigabyte motherboards are now enabled for this driver in time for the Linux 6.3-rc5 release...

20:08

Linux 6.3-rc5 Bringing Fix For Touchpad/Keyboard Issues With Some Clevo/TUXEDO Laptops Phoronix

Sent to Linus Torvalds on Saturday and already merged ahead of today's Linux 6.3-rc5 release were a set of input driver fixes. Most notable with that round of fixes were addressing some touchpad and keyboard issues with some TUXEDO Computers laptops when resuming from suspend...

19:55

FreeBSD 13.2-RC6 Released Due To Lingering Issue Phoronix

FreeBSD 13.2-RC4 was scheduled to be the last release candidate for this BSD operating system update but then 13.2-RC5 came with one fix. Now in dragging out the release into April, FreeBSD 13.2-RC6 has been released with another fix...

19:13

Lockheed Martin Plans to Build Lunar Satellite Network SoylentNews

Crescent Space will be 'well positioned' to get a piece of NASA's cash pie, no contract yet:

Aerospace firm Lockheed Martin has announced the launch of a subsidiary to build a satellite communications network to connect future Moon missions with those of us stuck on Earth.

Crescent Space Services' first big project will be Parsec, a "novel cislunar communications and navigation network," which will use a constellation of small satellites built by Lockheed Martin to connect lunar explorers to each other and ground control on Earth.

Lockheed Martin describes Parsec's communications links between the Moon and Earth as being "completely controlled by the network," which it said will save those involved in mission planning some IT support time so they can focus on operations instead.

Along with being a communications network, Parsec will also act as a lunar positioning system "informing those on the ground of their exact location, hidden hazards and even how to get back to base," Lockheed Martin said.

[...] "With momentum gaining around humanity's return to the Moon, this is an immediate area of opportunity for Crescent," the company said - without stating whether it had actually secured any deals to get its constellation into orbit.

Read more of this story at SoylentNews.

18:30

Week in review: 3CX supply chain attack, ChatGPT data leak Help Net Security

Heres an overview of some of last weeks most interesting news, articles, interviews and videos: Visa fraud expert outlines the many faces of payment ecosystem fraud In this Help Net Security interview, Michael Jabbara, the VP and Global Head of Fraud Services at Visa, delves into digital skimming attacks, highlighting their common causes, and provides insights into what measures merchants can take to prevent them. Exchange Online will soon start blocking emails from old, vulnerable More

The post Week in review: 3CX supply chain attack, ChatGPT data leak appeared first on Help Net Security.

18:00

Rubiks Cube Solver Does It In 4.56 Seconds Hackaday

Solving Rubiks Cubes is a learnable skill. However, to compete at the top level, youll have to train hard. Speed cubers can solve a 33 cube in under ten seconds these days, after all. [aaedmusa] was a long way off that speed, but his robot is an absolute demon that solves at a rapid pace.

The robot relies on a Teensy 4.1 microcontroller to run the show, paired with its Ethernet kit for connectivity. It runs six stepper motors via TMC2208 drivers, enabling it to directly actuate each face of the cube. Purists will note, however, that the steppers are fitted with adapters that slot directly into modified center squares on the cube. A regulation Rubiks, this is not.

The design doesnt feature a machine vision system to capture the state of the cube. Instead, the cubes status must be input to a web app on an attached computer. Once the cubes state is loaded into the program, though, the mechanical job of solving the cube can be...

15:22

Predicting neuroblastoma outcomes with molecular evolution Lifeboat News: The Blog

A research team led by the German Cancer Research Center in Heidelberg, Germany, has discovered that the genetic sequence of a tumor can be read like a molecular clock, traced back to its most recent common ancestor cell. Extracting the duration of tumor evolution can give an accurate predictor of neuroblastoma outcomes.

In a paper published in Nature Genetics titled Neuroblastoma arises in early fetal development and its evolutionary duration predicts outcome, the team details the steps they took in identifying a genomic clock tested against a sequenced population combined with analysis and mathematical modeling, to identify evolution markers, traceability and a likely origin point of infant neuroblastomas.

Cancer cells start out life as heroic healthy tissues, with the sort of all for one, one for all, throw yourself on a grenade to save your matestype attitude that is taking place throughout the body every day. At some point, something goes wrong, and a good cell goes bad.

15:22

New IVF method: More expensive, not more effective Lifeboat News: The Blog

The use of time-lapse monitoring in IVF does not result in more pregnancies or shorten the time it takes to get pregnant. This new method, which promises to identify the most viable embryos, is more expensive than the classic approach. Research from Amsterdam UMC, published today in The Lancet, shows that time-lapse monitoring does not improve clinical results.

Patients undergoing an IVF treatment often have several usable embryos. The laboratory then makes a choice as to which embryo will be transferred into the uterus. Crucial to this decision is the cell division pattern in the first three to five days of embryo development. In order to observe this, embryos must be removed from the incubator daily to be checked under a microscope. In time-lapse incubators, however, built-in cameras record the development of each embryo. This way embryos no longer need to be removed from the stable environment of the incubator and a computer algorithm calculates which embryo has shown the most optimal growth pattern.

More and more IVF centers, across the world, use time-lapse for the evaluation and selection of embryos. Prospective parents are often promised that time-lapse monitoring will increase their chance of becoming pregnant. Despite frequent use of this relatively expensive method, there are hardly any large clinical studies evaluating the added value of time-lapse monitoring for IVF treatments.

15:22

First single molecule microscopic visualization of the full-length human BRCA2 protein binding to DNA Lifeboat News: The Blog

Using a self-built inverted microscope complete with laser optical tweezers to capture DNA, Yale Cancer Center and University of California Davis researchers for the first time created a visualization of the full-length human BRCA2 protein at the single molecule level.

Mutations in the breast cancer susceptibility gene, BRCA2, can significantly increase an individuals lifetime risk of developing cancer. Approximately one in every 400 people carry a BRCA gene mutation accounting for a significant proportion of cancer that is heritable. The study was published on March 28 in the Proceedings of the National Academy of Sciences.

If you carry a BRCA mutation, you have this incredibly high risk for breast and , and also for men, prostate and , said Yale Cancer Center member and co-author of the paper, Ryan Jensen, Ph.D., who is also an associate professor of therapeutic Radiology at Yale School of Medicine.

15:22

Trojanized Tor browsers target Russians with crypto-stealing malware Lifeboat News: The Blog

A surge of trojanized Tor Browser installers targets Russians and Eastern Europeans with clipboard-hijacking malware that steals infected users cryptocurrency transactions.

Kaspersky analysts warn that while this attack is not new or particularly creative, its still effective and prevalent, infecting many users worldwide.

While these malicious Tor installers target countries worldwide, Kaspersky says that most are targeting Russia and Eastern Europe.

15:16

Mobile OS Market Share (as Judged by Web Access) More Than Double All Versions of Windows Combined Techrights

As per these latest figures:

Mobile and Windows

Summary: With the share of Windows falling (the latest propaganda/talking point from Microsofters singles out Vista 11 to claim growth) it might not be long before Android and iOS alone have 3 times more in market share than Windows; Microsoft-sponsored media almost never points this out, nor does it mention that Bing fell below 3% globally (Bing also has many LAYOFFS), instead focusing on some Bing chatbot whose market share is negligible and rapidly falling as people lose interest

15:00

Why Do Rifa Capacitors Fail? Hackaday

Anyone who works with older electronic equipment will before long learn to spot Rifa capacitors, a distinctive yellow-translucent component often used in mains filters, that is notorious for failures. Its commonly thought to be due to their absorbing water, but based upon [Jerry Walker]s long experience, hes not so sure about that. Thus hes taken a large stock of the parts and subjected them to tests in order to get to the bottom of the Rifa question once and for all.

What he was able to gather both from the parts he removed from older equipment and by applying AC and DC voltages to  test capacitors, was that those which had been used in DC applications had a much lower likelihood of exhibiting precursors to failure, and also a much longer time before failure when connected to AC mains.

Indeed, its only at the end of the video that he reveals one of the parts in front of him is an ex-DC part thats been hooked up to the mains all the time without blowing up. Its likely then that these capacitors didnt perform tot heir spec only when used in AC applications. He still recommends replacing them wherever they are found and wed completely agree with him, but its fascinating to have some light shed on these notorious parts.

...

14:33

Elemental Music: Interactive Periodic Table Turns He, Fe, Ca Into Do, Re, Mi SoylentNews

https://arstechnica.com/science/2023/03/elemental-music-interactive-periodic-table-turns-he-fe-ca-into-do-re-mi/

We're all familiar with the elements of the periodic table, but have you ever wondered what hydrogen or zinc, for example, might sound like? W. Walker Smith, now a graduate student at Indiana University, combined his twin passions of chemistry and music to create what he calls a new audio-visual instrument to communicate the concepts of chemical spectroscopy.

Smith presented his data sonification projectwhich essentially transforms the visible spectra of the elements of the periodic table into soundat a meeting of the American Chemical Society being held this week in Indianapolis, Indiana. Smith even featured audio clips of some of the elements, along with "compositions" featuring larger molecules, during a performance of his "The Sound of Molecules" show.

As an undergraduate, "I [earned] a dual degree in music composition and chemistry, so I was always looking for a way to turn my chemistry research into music," Smith said during a media briefing.
[...]
Data sonification is not a new concept. For instance, in 2018, scientists transformed NASA's image of Mars rover Opportunity on its 5,000th sunrise on Mars into music. The particle physics data used to discover the Higgs boson, the echoes of a black hole as it devoured a star, and magnetometer readings from the Voyager mission have also been transposed into music. And several years ago, a project called LHCSound built a library of the "sounds" of a top quark jet and the Higgs boson, among others. The project hoped to develop sonification as a technique for analyzing the data from particle collisions so that physicists could "detect" subatomic particles by ear.

Related:
Scientists Are Turning Data Into Sound to Listen to the Whispers of the Universe (and More) (Aug. 2022)
How one Astronomer Hears the Universe (Jan. 2020)
...

13:23

Scientists Found a Leak in Photosynthesis That Could Fill Humanitys Energy Bucket Lifeboat News: The Blog

Researchers believe theyve found a way to tap deeper into one of natures most impressive, life-sustaining mechanisms.

13:23

Bill Monroe: A threatened species clogs up rivers as another arrives Lifeboat News: The Blog

Geologists have confirmed that our world will be getting a brand new ocean according to new research published in the peer-reviewed journal Geophysical Research Letters.

13:22

Scientists Have Just Found An Untouched Civilization In The Amazon Jungle Lifeboat News: The Blog

There are a number of places on earth that remain shrouded in mystery, despite the best efforts of scientists to explain them. Some of these places are locations where strange things have happened for centuries, while others are relatively new. But one thing is for sure they all remain a mystery.

12:00

Building an Energy Sword Replica From Halo Hackaday

A good many of us whiled away the hours of our youths playing Swords Only deathmatch in Halo 2. The Energy Sword, aka the Plasma Sword, was the star of the show, with its devastating glowing blades granting us scoreboard domination. [Arnov Sharma] has now built a quality replica of this science-fiction weapon.

The build starts with a 3D design drawn up in Fusion 360. The parts are then 3D printed, with opaque filament used for the handle and translucent PLA filament for the blade. Inside the blade elements are twenty WS2812B LEDs, creating the characteristic glow that made the Energy Sword so tantalizing to find in game. An ATtiny85 is charged with running the LEDs, with the aid of an IP5306 chip to act as a boost converter for the lithium-ion battery supplying the juice.

[Anton] admits that the sword was built for the sole purpose of beautifying his maker space. Thats something we can respect, because wed love to have one hanging on the wall at home. Weve featured some other fun gaming replicas before, too.

...

11:32

Geminispace: Still Growing, Still Community-Controlled Techrights

Summary: Almost 2.4k live (online) capsules are observed by Lupa right now (there are more, but Lupa cannot see them all), with just 31 more to go before this 2,400 milestone

THE growth of Gemini did not stop. 2021 and 2022 were exciting years of growth for Gemini; we made many videos and published many articles about that. Just because we barely do that anymore doesnt mean we mothballed the thing and it doesnt mean that users abandoned it. In terms of the number of Gemini servers, it continues to grow. In terms of actual users who surf Geminispace, that too is growing. Here are the stats for the last two weeks of March, from Techrights alone:

 24644 page requests on 2023/03/17
 34315 page requests on 2023/03/18
 33622 page requests on 2023/03/19
 37344 page requests on 2023/03/20
 18577 page requests on 2023/03/21
 12592 page requests on 2023/03/22
 23301 page requests on 2023/03/23
 15574 page requests on 2023/03/24
 38011 page requests on 2023/03/25
 18483 page requests on 2023/03/26
 35098 page requests on 2023/03/27
 17227 page requests on 2023/03/28
 8096 page requests on 2023/03/29
 7546 page requests on 2023/03/30
 33676 page requests on 2023/03/31

Almost 50,000 of the above were transported through a Web proxy.

Many people use apps, but thats a different problemThe Tux Machines Gemini capsule, which is relatively new (only months old), there have been 14.5k requests since the start of the month (April). So there too there has been a lot of activity.

The World Wide Web is shrinking (more sites shut down than new ones created; Google continues to dominate), but people flock elsewhere. Theyre still online, but they may be using other protocols. Many people use apps, but thats a different problem

Here is the growth of Gemini visualised (graph plotted just 2 hours old). Gemini, unlike W3C-led bloat, is community-controlled.

Gemini capsules April 2023

11:00

Valve Shows A Huge Drop In Linux Gamers For March, But The Numbers Are Questionable Phoronix

Valve just published their Steam Survey results for March 2023 and these initial numbers show a 0.54% drop to the Linux gaming marketshare, putting the overall Linux gaming population at around 0.84% of the Steam customer base. However, once again these numbers appear skewed/inaccurate...

10:53

Microsoft Layoffs in the Buzzwords Department Techrights

Far too many divisions at Microsoft operate at a loss and it is unsustainable, even with bailouts from taxpayers, facilitated by Trump and Biden in more recent years under the guise of coronavirus stimulus and defence contracts

Debt Loading

Summary: Microsoft hired or acquired (acquisition-based hiring, which enables faking growth, faking wealth when no actual money changes hands, and sometimes debt-loading) a lot of trash and hype; now it pays the price

IT is far too easy to get cynical these days, seeing how technology gets described in the media. We wrote many articles in the past, condemning or just playfully mocking all sorts of marketing buzzwords.

Heres the latest at Microsoft: (hard to keep track already of all those waves of layoffs; its not just 10,000 staff but a lot more)

Microsoft is shutting down its metaverse unit comprising 100 employees amidst broader layoffs. Microsoft has internally announced disbanding its Industrial Metaverse Core group, a division comprising around 100 employees focused on bringing the metaverse to industrial environments through software.

Just a fortnight or so after Microsoft fired AI staff it is firing the Metaverse staff. What next? Will Microsoft also fire all the Smart staff and be left with a bunch of Cantrells?

09:46

How a Major Toy Company Kept (Keeps) 4chan Online SoylentNews

Toxic image board 4chan has managed to stay online for the past seven yearsamid boycotts and advertiser flight, after being implicated in several mass shootings, even as it was identified as a source of the conspiracy theories that inspired the January 6 insurrectionthanks, in part, to a $2.4 million investment from a major Japanese toy company.

A partnership agreement, obtained exclusively by WIRED, shows not only how current site owner Hiroyuki Nishimura acquired the far-right message board but also how Japanese industry helped finance the deal.
[...]
In recent years, Good Smile has branched out into content creation, working with various animation and film studios, has opened online wholesale companies in China and elsewhere, and has even sponsored a Super GT racing team.

In 2021, former employees of Good Smile's Los Angeles officeembroiled in a legal dispute about the future of their employmentcountersued the company. In legal filings, they allege Good Smile was responsible for the distribution of potentially obscene sexually explicit anime products and merchandise ("lolicon") and that it, unbeknownst to its family-friendly corporate partners, was funding 4chan.

The accusations were picked up in The Ankler and The Hollywood Reporter, which cited a Good Smile representative admitting a passive investment in 4chan. The lawsuit was settled out of court, and the allegations were never proven.

Read more of this story at SoylentNews.

09:35

LockBit leaks data stolen from the South Korean National Tax Service Security Affairs

The LockBit ransomware gang announced the publishing of data stolen from the South Korean National Tax Service.

On March 29, 2023, The Lock Bit ransomware gang announced the hack of the South Korean National Tax Service. The group added the South Korean agency to its Tor leak site and announced the release of stolen data by April 1st, 2023 in case the ransom was not paid.

The National Tax Service (NTS) which is mainly in charge of the assessment and collection of internal taxes was established as an external organization of the Ministry of Finance on March 3, 1966. The major functions of National Tax Service are:

  • Supplying the revenue base
  • Promoting taxation fairness

The deadline has come and the group has announced the publication of the stolen information.

South Korean National Tax Service

At the time of this writing the group has yet to publish the stolen data, however, if the hack was real, the stolen data poses a severe risk to the privacy and security of South Korean citizens.

Tax Service agencies collect the personal and financial information of citizens, such data can be exploited by threat actors to carry out a broad range of fraudulent activities, including financial scams and identity theft.

Lockbit continues to be one of the most active ransomware gangs, in March the group added 100 new victims to its Tor leak site.

Please vote for Security Affairs (https://securityaffairs.com/) as the best European Cybersecurity Blogger Awards 2022 VOTE FOR YOUR WINNERS
Vote for me in the sections:

  • The Teacher Most Educational Blog
  • The Entertainer Most Entertaining Blog
  • The Tech Whizz Best Technical Blog
  • Best Social Media Account to Follow (@securityaffairs)

Please nominate Security Affairs as your favorite blog.

...

09:00

CloudBees integrates with Argo to enhance cloud-native software delivery Help Net Security

CloudBees has unveiled the integration of CloudBees continuous delivery and release orchestration solution, CloudBees CD/RO, with Argo Rollouts. The integration will enhance customers ability to deliver software faster, with higher quality, and at scale in cloud-native environments. This latest integration for CloudBees furthers its ability to support customers to deploy applications with confidence in their desired format. This integration of CloudBees CD/RO with Argo Rollouts is a continuation of our commitment to best-in-class open-source tools More

The post CloudBees integrates with Argo to enhance cloud-native software delivery appeared first on Help Net Security.

09:00

Cat Skull for Internet Connection Divination Hackaday

A cat skull enclosed in a domed security camera enclosure with green LEDs illuminating the eye sockets, sitting on a table with other skulls and rocks.

[Emily Velasco] has an internet provider that provides sub-par connectivity. Instead of repeatedly refreshing a browser tab to test if the network is up, [Emily] decided to create an internet status monitor by embedding indicator lights in a cat skullfor some reason.

...

08:51

Ukrainian Hacktivists Trick Russian Military Wives for Personal Info HackRead | Latest Cybersecurity and Hacking News Site

By Waqas

Ukrainian hacktivists extracted personal information, including sensitive military data and even nude photos of one of the targeted military wives.

This is a post from HackRead.com Read the original post: Ukrainian Hacktivists Trick Russian Military Wives for Personal Info

06:00

Blender and openEMS Teamed Up Make Stunning Simulations Hackaday

Theres tons of theory out there to explain the behavior of electronic circuits and electromagnetic waves. When it comes to visualization though, most of us have had to make do with our lecturers very finest blackboard scribbles, or some diagrams in a textbook. [Sam A] has been working on some glorious animated simulations, however, which show us various phenomena in a far more intuitive way.

The animations were created in Blender, the popular 3D animation software. As for the underlying simulation going on behind the scenes, this was created using the openEMS platform. [Sam] has used openEMS to run electromagnetic simulations of simple circuits via KiCAD. From there, it was a matter of finding a way to export the simulation results in a way that could be imported into Blender. This was achieved with Paraview software acting as a conduit, paired with a custom Python script.

The result is that [Sam] can produce visually pleasing electromagnetic simulations that are easy to understand. One neednt imagine a RF signals behaviour in a theoretical coax cable with no termination, when one can simply see what happens in [Sam]s animation. 

Simulation is a powerful tool which is often key to engineering workflows, as weve seen before.

...

05:43

Italys Data Protection Authority temporarily blocks ChatGPT over privacy concerns Security Affairs

Italys data protection agency is temporarily blocking the popular chatbot ChatGPT due to a possible violation of the European data privacy regulation.

The Italian Data Protection Authority, Garante Privacy, has temporarily banned ChatGPT due to the illegal collection of personal data and the absence of systems for verifying the age of minors.

The Authority pointed out that OpenAI does not alert users that it is collecting their data.

According to the announcement, there is no legal basis underpinning the massive collection and processing of personal data to train the algorithms on which the platform relies.

No way for ChatGPT to continue processing data in breach of privacy laws. The Italian SA imposed an immediate temporary limitation on the processing of Italian users data by OpenAI, the US-based company developing and managing the platform. An inquiry into the facts of the case was initiated as well. reads the press release published the Authority. A data breach affecting ChatGPT users conversations and information on payments by subscribers to the service had been reported on 20 March. ChatGPT is the best known among relational AI platforms that are capable to emulate and elaborate human conversations.

The Authority carried out some tests on the service and determined that the information it provides does not always match factual circumstances so that inaccurate personal data are processed.

The Authority claims that ChatGPT exposes minors to inappropriate responses for their age despite the service being designed to respond to users aged above 13.

Finally, the Italian SA emphasizes in its order that the lack of whatever age verification mechanism exposes children to receiving responses that are absolutely inappropriate to their age and awareness, even though the service is allegedly addressed to users aged above 13 according to OpenAIs terms of service. continues the press release.

According to the announcement, OpenAI will have to notify the Italian Authority within 20 days of the measures implemented to comply with the order. If the company will fail to notify Italys data protection agency it will be fined up to EUR 20 million or 4% of the total worldwide annual turnover in compliance to the General Data Protection Regulation (GDPR).

Italian users that attempt to visit the ChatGPT website will display the following message:

Dear ChatGPT customer,
We regret to inform you that we have disabled ChatGPT for users in Italy at the request of the Ita...

05:18

1xbet New Customer Bonus Up To 200 Nzd For Bettors In New Zealand h+ Media

1xbet New Customer Bonus Up To 200 Nzd For Bettors In New Zealand

1XBet is one of those bookies where buyer help is paramount. There a quantity of safe and convenient banking options that customers with accounts right here will take pleasure in. 1XBet is supportive of mobile gaming and those on the transfer will get pleasure from excellent cellular gaming. Whats fascinating is that Kiwis favorite sport rugby is covered extensively. The most necessary thing is that you understand how to claim 1xbet promo codes and purchase one or more bonuses in the future.

You can gather Loyalty Points by playing your favourite games then redeem them for distinctive gifts. There are additionally a quantity of regular promotional offerings, like a 2x/Double Up Promotion on Wednesdays and common Roulette tournaments. Find an in depth listing of the out there promotions and special supply bonuses on the on line casinos promos web page.

Make a deposit and start you journey all over the world of free bets, jackpots, sports winnings, and beneficiant presents. Re a part of the community already, simply sign up and choose your favourite market to wager on. The presented greatest bookmakers have a set of distinctive presents, as nicely as the complete or cell model. Each of the listed corporations rigorously monitors market tendencies and continually adds new copyright bonuses and incentives for its users. Any self-respecting bookmaker takes care of the investments of its customers and makes each effort to provide distinctive content. Indeed there could not be a greater way for bettors from New Zealand to make the most of your registration with them.

You will discover sports activities like football, ice hockey, boxing, cycling, among others, and basic casino games to wager on. Now the infrastructure of the bookmaker comes with several tons of of betting locations. The conventional company differs The great Odds and the broad line of the deliberate event each participant can select beneath a sport by which may be very savvy. But earlier than you place your bets in 1 of these, you must have a simple registration technique and obtain in this system an individual how to open accounts.

Bonus is rolled 5x for accrued bets with 3 events with odds beginning at 1.4. Those who need assist can talk with the 1xBet Casino sites extremely expert and really useful customer service representatives. From easy tech help to payout inquiries, the assist brokers are trained to deal with all types of buyer necessities. You get a generoussignup bonusafter a profitable registration. There is a 100 percent deposit bonus on the very first deposit. To avail thewelcome bonus, a punter must be of authorized age and residing in a non-restricted nation.

  • Make a deposit and start you journey all over the world of free bets, jackpots, sports winnings, and generous presents.
  • Can your customers find the video games that they&#821...

05:18

Search Tag 1xbet App Login Opentop171com Helen Mirren Net Value Pocket Video Games Apk Opentop171com$limitadong Regalo!mag Register Para Makakuha Ng P50 Might 50% Cashback Sayong Unang Deposit!$a7 h+ Media

Search Tag 1xbet App Login Opentop171com Helen Mirren Net Value Pocket Video Games Apk Opentop171com$limitadong Regalo!mag Register Para Makakuha Ng P50 Might 50% Cashback Sayong Unang Deposit!$a7

Everyone can perform 1xBet registration and start collaborating in. Also, essential and priceless things for youre that one may make your deposit not only in the type of widespread cash although additionally cryptocurrency, e. The website has a somewhat massive section of video protection;, nonetheless , you probably can watch videos so long as youre registered and possess a constructive stability. The website has been translated into many languages, including English.

The bookmaker goals at creating a stable and long-term relationship with customers. This is clear within the 100% payouts on player winnings and personalized customer support help. For optimum engagement, occasions are accompanied by live markets, reside odds, and stay statistics. Using the devoted reside stream, players can watch the video games from the comfort of their properties. It has cemented its reputation by making certain speedy payouts, competitive bonus, and high-quality customer service. The vastly well-liked, 1xBet Sportsbook covers more than 1000 sporting occasions daily.

Players are also sad in regards to the unskilled and very sluggish help system, which is unable to deal with their queries. On prime of that, the location has very strict terms/conditions. If you be a part of the new loyalty program, the casino provides a token of gratitude within the form of VIP cashback. 1xBet is powered by a high-end SSL encryption service to make sure the safety of their clients private data and banking information.

We also ensure all reviews are revealed with out moderation. Companies can ask for critiques via automated invites. I truly have submitted all documents and have been informed that I would obtain answer soon. Lets see what next they do after saying I have passed verification procedure.youd see what I have been saying

At the identical time, there are new players entering the market, who offer glorious conditions for betting. In fact, sports activities betting didnt actually take off until the mid-to-late Eighties, when three groups that make up the National Basketball Association made it legal. Since then, the industry has exploded and exhausting betting has turn out to be a thing of the past. However, that doesnt mean that there usually are not plenty of good wager sites on the market.

Another reason why the 1xBet promo code can fail to work is that you just havent verified your account. Like youll find a way to see from our Betregal welcome bonus evaluate, weve compiled preeminent suggestions from specialists to assist you take advantage of the 1xBet bonus code. You will only receive the bonus after creating an account, verifying your telephone quantity, and makin...

05:17

Search Results For: 1xbet Promo Code Bangladesh Openhot688com$limitadong Regalo!mag Register Para Makakuha Ng P50 Might 50% Cashback Sayong h+ Media

Search Results For: 1xbet Promo Code Bangladesh Openhot688com$limitadong Regalo!mag Register Para Makakuha Ng P50 Might 50% Cashback Sayong

Theres nothing riskier than having your private and financial info by the hands of unauthorized events. Some people with sick motives can use such delicate information to harm you. Better but, youll be able to easily customize the layout and design of the location if youd like it to match your display. As a bettor, you may also select any of the 50 languages that this website helps or even customize your background to perfectly fit your desire. Apart from a large number of games and betting choices, 1XBet additionally boasts of a few of the most tasty odds. Some of the chances that 1XBet offers its clients are excessive enough to the extent of rivaling the ones supplied by a few of the greatest names within the trade.

You have to look at options corresponding to bonuses, games, bonus terms, security, and more. Fortunately, Ive already accomplished the legwork so that you simply can prepare this record with one of the best Bitcoin cell playing apps of 2020. The bonus is available pertaining to the bookie s players in all countries. Register, open the bookmaker s checking account, deposit any amount on your bill and take part within the promotion. 2020 Lucky Friday give is a nice way to receive further cash.

You need to choose on any, the whole process wouldnt take lots of time and youll transfer to 1xBet login in a brief time. It is sweet to know that after finishing it, each signed up user can obtain registration bonuses. You can get a hundred % enroll offer on their first deposit up to 130. The on line casino is taken into account a powerhouse for being one of the veterans in theonline casino scene.

Different types of bets like single, accumulators, chain bets, and extra are there. There is a match of the day, with the best daily presents. From the primary click on, punters will realize that this as actual because the real-life gaming expertise. The stay streaming video services supply superior high quality thats why players feel as if theyre certainly in an actual gaming corridor.

Now that youve joined many fellow men down the street to profitable betting, you can start enjoying the privilege of the bonus funds given away by 1xBet. It is taboo to withdraw funds by way of the 1xBet Black Friday provide, usually, the promotion might be abolished. First deposit the bonus account with any amount starting from one specific on Friday. Inside the next, the presentation from the passport isnt necessary to become paid cash, without the need to get affirmation of the identity of paperwork.

The VIP cashback is available to players who advance to the highest ranges of play based mostly on accumulate factors. The levels embrace Copper, Bronze, Gold, and VIP Status, on the higher finish. For Spor...

05:16

Search Outcomes For: 1xbet On-line Openhot688com Winner On Line Casino Bono 0 Go Perya Piso Talpak Login Openhot688com$limitadong Regalo!ma h+ Media

Search Outcomes For: 1xbet On-line Openhot688com Winner On Line Casino Bono 0 Go Perya Piso Talpak Login Openhot688com$limitadong Regalo!ma

Therefore , it virtually exactly repeats the performance of William Hillside. Of course , some clumsiness is noticeable, however the an eye fixed are rather handy to only click on. Moreover, it goes to be quite easy to grasp the information blocks for a novice.

Try to examine respected New Zealand betting websites beneath. I even have gained good quantity on 1xbet and I by no means had any drawback for withdrawal in india. Our Service YouthLaw is a neighborhood regulation centre working beneath the Legal Services Act 2011. We provide a free authorized service to youngsters and young people aged underneath 25 years. At Electrify NZ we consider the future of transportation is electrical. We need to make it straightforward so that you can browse, discover and take a look at an electrical bike (e-bike) that works for you, from an extensive vary of excessive quality ebike manufacturers.

You will discover sports activities like soccer, ice hockey, boxing, biking, among others, and traditional casino games to bet on. Now the infrastructure of the bookmaker comes with several tons of of betting locations. The traditional company differs The nice Odds and the broad line of the planned event each participant can choose under a sport during which is very savvy. But earlier than you place your bets in 1 of those, you should have a simple registration methodology and obtain in the program a person tips on how to open accounts.

You can earn real cash and develop your financial institution by simply engaging of their fun play to top it all off. In the subsequent step youll be asked to finish the player s private data and registration information obtainable. The easiest method is to create a bank account in one click on. You should choose the area, currency and confirm the captcha used to protect towards bots. Should youve a promo code, you probably can enter it within the course of.

1XBet seems to be as competitive as possible with their odds for the preferred leagues. For top football leagues, you may discover margins within the 2% range for the primary markets. For high American sports, youll typically find margins in the 3% range. This means margins are in the identical range as some low-margin suppliers. However, 1xBet will want a while earlier than they reach a stage of reputation that matches a few of the finest low-margin providers. They supply such aggressive odds as a outcome of they know that they will never pay anybody that could also be a vital winner.

This detailed portion has taken into consideration all of the possible questions anybody can presumably ask. This is written in a simple, clear, and very easy to understand language. Sign up to LoveCoupons.co.nz publication for our latest weekly offers for man...

05:15

On Line Casino Frenzy Free Cash Opentop171com 1xbet App Download 2022 Bet24 Opentop171com$limitadong Regalo!mag Register Para Makakuha Ng P50 Might 50% Cashback Sayong Unang Deposit!$rj Search Results h+ Media

On Line Casino Frenzy Free Cash Opentop171com 1xbet App Download 2022 Bet24 Opentop171com$limitadong Regalo!mag Register Para Makakuha Ng P50 Might 50% Cashback Sayong Unang Deposit!$rj Search Results

Usability and navigation is one thing that website users contemplate when searching on the internet. Ease-of-use is something that matters probably the most, especially for brand new customers that are making an attempt to entry your web site for the primary time. If your prospects cant find what theyre in search of with ease, they could log out and head elsewhere where web site navigation is hassle-free.

When betting both from the app or from the cellular site, rest assured of quick loading speeds. 1XBet compensates its lack of an intuitive website by providing several language that players can use while on the internet site. Some of the available languages on 1XBets web site include German, English, French, Spanish, Russian, and Portuguese, amongst others. Several ways of navigating the identical occasions are additionally current here, a matter that tends to crowd the display. If you wish to easily navigate the between the out there sports with ease, wed advise you to faucet on the main Sports hyperlink. Thereafter, tap on the small band of sport icons that the events show since such dont have hover menus.

Thousands of individuals, including New Zealanders, flock to the 1xBet Sportsbook daily to attempt their luck enjoying their favorite video games. The gaming platform now boasts more than four hundred,000 users. It is something that has earned the location the next rating on net analytic sites like Alexa. The different popular offerings embody on line casino slots, desk games, lottery, E-Sports, and poker. Bonuses and promotions are necessary, particularly for on-line sports betting operators.

You need to choose any, the complete course of wouldnt take a lot of time and you may transfer to 1xBet login in a brief time. It is sweet to know that after ending it, each signed up user can acquire registration bonuses. You can get a hundred % sign up provide on their first deposit as much as 130. The on line casino is considered a powerhouse for being one of many veterans in theonline on line casino scene.

The primary goal of 1xBet Casino is to provide a very entertaining and thrilling experience. The casino offers varied sportsbettingopportunities, lottery video games, and quite a few casinogames, with wagers ranging from low to excessive stakes. Because of the varied languages and currencies they support, gamers from everywhere in the words get interested in the casino. There are scores of wager varieties obtainable to punters at 1xBet. These embrace system bets, accumulators, and singles bets.

Now 1xBet methods register new clients just by producing unique account quant...

05:15

Search h+ Media

Search

Some parts come onto the display slowly, piece by piece. Ivory Coast and a lot of other loyalty applications, allow you to make money on sports activities paris. At least three occasions inside each accumulator should have odds of 1.forty or greater. To begin our article about 1XBET lets check out the design and colour scheme of the website. The 1XBET website has been created utilizing mainly blue and white as the base colours and that makes everything clear and easy to know. It goes towards our guidelines to offer incentives for evaluations.

1xBet is amongst the most popular sports betting web sites within the CIS. 1xBet, then again, present much more than simply sports activities betting. 1xBet supplies a real pleasure from a recreation, in addition to the opportunity to interact with different fans on their forum and receive skilled recommendation and suggestions. Bettors from unregulated international locations arent permitted to entry the sports activities betting platform. The site is 18+ secure and has a zero-tolerance towards underage betting. 1xBet has also applied 2FA system to reduce back unauthorized access to users accounts.

1xBet cellular on line casino is a wholly-owned subsidiary of Sergey Korsakov. The father or mother firm is predicated in Cyprus and has branches worldwide. 1xBet cellular on line casino is licensed and controlled underneath the legal guidelines of the Government of Curacao. The expansive sport lobby in 1xBet cellular on line casino is respected software program providers similar to Microgaming and NetEnt.

Again, when you forgot it, it s time to contact technical help. Indicate within the discover the name and label whereas 1xBet enroll, sign up, foreign money, country, phone. You need to write from the mail that is assigned to the 1xBet login. Do not overlook that to find a way to get full use of your player account potentialities, you should enter your personal data later. Verification of participant identification info is carried out by the workplace safety service.

It additionally boasts of several particular markets that its clients can take pleasure in. 1xBet is among the greatest sportsbooks that supply in-play betting. In-play betting means youll be able to watch a recreation on their live playing channel and place your wagers during the game. Sports betting bonuses and promotions have deadlines, and the 1xBet bonus code is no exception.

Players can use the Google Authenticator app to scan the QR code and enter a 6-digit code to verify id. 1XBet presents its players a few of the greatest odds around and ensures their customers their safety when betting on-line. Join 1XBet right now, get your welcome bonus, and begin claiming the goodies on supply here. As a sportsbook, 1XBet appears a stable sports betting website from our viewpoint. They are ticking a majority of the best packing containers based mostly on giving its members a spread...

05:14

1xbet Sportsbook Evaluation Claim 100% As Much As $100 Bonus h+ Media

1xbet Sportsbook Evaluation Claim 100% As Much As $100 Bonus

Thousands of individuals, together with New Zealanders, flock to the 1xBet Sportsbook every day to attempt their luck taking part in their favorite video games. The gaming platform now boasts more than 400,000 customers. It is one thing that has earned the positioning the next rating on net analytic sites like Alexa. The different popular choices embrace casino slots, desk games, lottery, E-Sports, and poker. Bonuses and promotions are important, especially for online sports betting operators.

Also to it, there are six more languages, which makes it strange in phrases of intercontinental. The info cant be accessed by unauthorized parties. For world normal checks and balances, the bookmaker is regulated by the authoritative Gibraltar Gaming Commission. The dark blue-tinged background can additionally be very welcoming.

  • That is why it has secured the site with SSL encryption know-how.
  • This part is very popular among users, individuals who like eSports.
  • You might select between two ways to have the ability to through e-mail or SMS.
  • In addition, get acquainted with the Welcome current for any new consumer.

These bets feature dynamic odds, which often change to replicate the flow of the sport. 1xBet sportsbook has been round for a while and so far, it continues to give punters the most effective sports betting expertise. Over the past years, 1xBet gained momentum and established itself as a thoughtful competitor for the highest firms within the sports playing sector. One of the reasons is the bookies main sportsbook that covers a broad variety of sports activities.

This detailed portion has taken into consideration all the potential questions anyone can presumably ask. This is written in a easy, clear, and very straightforward to understand language. Sign up to LoveCoupons.co.nz publication for our latest weekly presents for manufacturers like 1xBet and lots of more. Even a novice may have no bother making a wager with them. 1xBet web site accommodates thorough rules and instructions, in addition to dependable knowledge and secure and easy payment choices. Join 1xBet Sportsbook and guess on over 20 totally different sports activities.

Now you can place bets without thinking relating to any security points. If you finished 1xBet Ghana signing up it implies that you confirmed your authorized age. Do not forget to review Terms and Conditions earlier than urgent the button. You are able to register your account utilizing your phone. It is advisable to not register and making bets if youre beneath the legal age, as a outcome of its restricted by rules.

We therefore disclaim all duty for information which may be outdated. They have over 60 software program sport suppliers that supply punters a broad selection of gaming choices. There are thousands of different games that can enter...

05:13

Zimbra email platform vulnerability exploited to steal European govt emails HackRead | Latest Cybersecurity and Hacking News Site

By Deeba Ahmed

Researchers have noted that attackers are targeting a medium-severity Zimbra vulnerability that the company patched in

This is a post from HackRead.com Read the original post: Zimbra email platform vulnerability exploited to steal European govt emails

05:13

Search Solver-ac68 Cc-1xbet- Solvermtkpe-ac68 Cc-1xbet60xi- Solverv2n0x-1xbetpw0c h+ Media

Search Solver-ac68 Cc-1xbet- Solvermtkpe-ac68 Cc-1xbet60xi- Solverv2n0x-1xbetpw0c

Whereas the middle showcases the results of current matches, and theslots/live casinocategories are on the proper. Operating since 2007, 1xBet has been offering a variety of bets, not just for sports activities events but additionally for TV video games. They supply an in depth choice of bets on international sports competitions each on the club and national stage. The major benefit of their betting company is that they supply a singular alternative to make LIVE bets.

  • 1xBet bookmaker has created an all-in-one platform for gamers to check their luck and make huge money rewards.
  • Theres so much of every little thing sports, casinos, games, promotions, numerous unique playing choices, and so forth.
  • Bonuses and promotions are essential, particularly for online sports activities betting operators.

Not simply the net site is cell optimized, however there are additionally standalone apps. Clients o fulfill theminimum deposit and withdrawal requirements. For bank cards and bank transfers, processing may take as little as 1 day to five days. For e-wallets, processing will only take anyplace from a few minutes to 24 hours.

Noteworthy, this site is likely considered one of the first in the gaming industry that accepts Bitcoin and other cryptocurrencies as a cost option. Making a wager with a bookmaker is a good way to test your luck, get an adrenalin rush, and make some money in the course of. Hundreds of betting websites offer their services to millions of followers who like to wager on sports online.

The site began offering on-line betting companies in 2011, but its Sportsbook started as early as 2007. Players that often place their bets on this on line casino shall be very happy to notice that they award loyalty factors. These factors accumulate on the basis of the deposits that you make on the on line casino.

Different forms of bets like single, accumulators, chain bets, and extra are there. There is a match of the day, with one of the best daily presents. From the first click, punters will understand that this as actual as the real-life gaming experience. The live streaming video companies provide awesome quality thats why avid gamers really feel as if theyre certainly in an precise gaming hall.

Even so, presents from other bookies such as the Betsafe new customer supply are worthy of your consideration. You must redeem the bonus within 30 days of registration. Otherwise, the bonus and all winnings created from the bonus might be revoked. The 1xBet welcome offer is only meant for new customers.

Thousands of individuals, including New Zealanders, flock to the 1xBet Sportsbook every single day to try their luck enjoying their favourite games. The gaming platform now boasts greater than 400,000 customers. It is some...

05:13

1xbet Reviews Learn Customer Support Reviews Of 1xbet Com 63 Of 82 h+ Media

1xbet Reviews Learn Customer Support Reviews Of 1xbet Com 63 Of 82

So if you count on to bet on-the-go from your cell moreso than out of your desktop, you can really feel assured enjoying with 1XBet. When it involves betting markets, 1XBet can provide an enormous number. If you really like a breadth of betting markets, this can be great.

Pass the process of registration on Lucky Comes to an end and obtain this superb bonus give. 1XBets want since welcoming its first batch of customers is to become the last word on-line sports betting vacation spot, especially for New Zealands bettors. Having opened for business nearly a decade ago in 2011, 1XBet boasts of greater than 30 sporting markets and over 1,000 occasions each day. 1XBet is a worldwide bookmaker consisting of several websites throughout the globe, ones is the 1XBetNZ.

Please notice that we reserve the best to decline provide if the pharmacist assesses that using this medication isnt applicable. Live Chat service is on the market across the clock to ensure gamers get help after they want it. This means New Zealand players get prompt answers to urgent issues and rising queries.

After claiming the 1xBet welcome supply and wagering in your favorite events, check the progress of your bets. This is essential, particularly if youre pondering of cashing out. Besides, it could possibly help you know how far youre from assembly the wagering necessities. Lets start with sports, where youll find over forty totally different sports activities to bet on.

Unlike other websites, the wagering requirements in order to declare the bonus at 1xBet is comparatively lower. The wagering necessities state that players should wager the bonus on a minimal variety of solely three accumulators. Each of those should additionally include no much less than three selections with the percentages of a minimum of 1.forty or 2/5. Since its launch, the net site has grown from being a struggling beginner site that accepts bets into a gaming giant with lots to supply. The company now has many lively registered gamers, amounting to virtually half one million.

1XBet allows its players to place their bets on their favorite sports using their cell units. You can easily access the location on obtain or prompt play. There are those that prefer utilizing the 1XBet native app on their cellphones while there are those who choose playing from the bookies cellular site.

It is available for all Android (not less than four. 1 version) and iOS users. To down load it you have to go to the AppStore or to the official website for apk model. The software is fairly related, discover the same green button to create new account. If you may be able to learn to create accounts, begin with one-click option .

  • There several secure and convenient banking choices that customers with accounts right here will enjoy.
  • To be fair, 1xbet could be one of the best...

05:04

New Essence of Chinese Culture Rule Book Dumps Mao, Others SoylentNews

If you still want your Mao memorabilia, you better hurry down to Tiananmen Square, Beijing, while you still have the chance.

In China, the State Council is somewhat comparable to the Cabinet. Headed by the Prime Minister and consisting of the heads of the various Ministries (Defense, Commerce, Education, Agriculture and Rural Affairs, Justice, Civil Affairs, State Security, Public Security and so on), it handles the day-to-day running of the country while formulating economic policy.

Its operational procedures are described in a document, conveniently titled "Working Procedures for the State Council". On has a couple of changes.

First off, the State Council now has to "report any major decisions, major events and important situations" to the Central Committee "in a timely manner." Previous edition sentences like "administration according to law, seeking truth from facts, democracy, openness, pragmatism and integrity" have been scrapped, as has the requirement for the State Council "to correct illegal or inappropriate administrative actions", or to "guide and supervise" the bureaucracy. In other words, its wings have been seriously clipped.

Secondly, any and all references to Marxism/Leninism, Mao Zedong Thought, the thought of Deng Xiaoping and the ideologies of former presidents Jiang Zemin and Hu Jintao are now verboten. Only references to Xi Jinping Thought are allowed, as that is "the essence of Chinese culture and the spirit of the times".

To drive the point home, the Central Committee of the CCP launched another nationwide disciplinary campaign among its 96 million members.

This round will check them for loyalty to supreme leader Xi Jinping, weeding out "black sheep" and "two-faced" officials.


Original Submission

Read more of this story at SoylentNews.

05:00

HACKERS IN HISTORY - A LOOK WAY BACK 2600 - 2600: The Hacker Quarterly

The term hacker may have gained notoriety in recent decades, but the act of hacking, or using clever and unconventional methods to achieve a goal, has been practiced for centuries. Here are ten historical figures prior to the 19th century who would be considered good hackers by today's standards.

1. Archimedes (287 BC - 212 BC)

Archimedes, the ancient Greek mathematician, engineer, and inventor, is famous for his contribution to the field of mathematics and physics. He was also known for his clever tactics during the Siege of Syracuse in 214 BC. Archimedes used mirrors and lenses to focus sunlight on the Roman ships, setting them on fire.

2. Julius Caesar (100 BC - 44 BC)

Julius Caesar, the Roman statesman and military leader, is known for his brilliant tactics on the battlefield. He also used cryptography to send secret messages to his allies, using a code in which each letter was replaced with the letter three places down the alphabet.

3. Leonardo da Vinci (1452 - 1519)

Leonardo da Vinci was an Italian polymath who excelled in multiple fields, including painting, sculpture, engineering, and science. He also had a keen interest in cryptography, creating a code in which letters were replaced with symbols and shapes.

4. Mary Queen of Scots (1542 - 1587)

Mary Queen of Scots, the Scottish monarch, was known for her clever escape attempts from captivity. In one instance, she dressed up as a servant and escaped from a castle in which she was being held captive.

5. Galileo Galilei (1564 - 1642)

Galileo Galilei, the Italian astronomer and physicist, is known for his contributions to the field of science. He was also a skilled telescope maker, designing and building his own telescopes to observe the stars.

6. Benjamin Franklin (1706 - 1790)

Benjamin Franklin was an American statesman, scientist, and inventor. He is known for his contributions to the fields of electricity and physics. Franklin was also a skilled printer and used his knowledge of printing to disseminate his ideas and beliefs.

7. Jeanne de Clisson (1300s - 1359)

Jeanne de Clisson, a French pirate, was known for her ruthless attacks on French ships during the Hundred Years' War. She would paint her ships black and red to symbolize her hatred for the French monarchy.

8. Matsuo Basho (1644 - 1694)

Matsuo Basho was a Japanese poet who is considered one of the greatest poets of the Edo period. He is known for his haiku, a form of poetry that is characterized by its brevity and simplicity.

9. Ada Lovelace (1815 - 1852)

Ada Lovelace was an English mathematician and writer who is considered to be the world's first computer programmer. She wrote the first algorithm for Charles Babbage's Analytical Engine, a mechanical computer that was n...

04:00

BOB DYLAN'S LOST SONG ABOUT HACKERS 2600 - 2600: The Hacker Quarterly

Bob Dylan has written so many ballads over the years that it was inevitable one would be about hackers. We were able to find the lyrics to this unrecorded piece written on the back of several napkins (or possibly the front - it's hard to tell the difference). Perhaps a spirited campaign will convince Bob to finally record this - and give it a title!

Come gather round, hackers all,
And listen to my tale,
Of how some took to their keyboards,
And the governments did assail.

It all began in the 80s,
With hackers breaking in,
To corporate and government systems,
For a thrill, and sometimes for a win.

But it was in the 90s,
When things really took off,
With groups like Cult of the Dead Cow,
And the formation of the EFF.

Hackers began to see,
The power that they could wield,
To fight against censorship,
And to expose truths concealed.

They hacked into Chinese sites,
To protest Tiananmen Square,
And into the Church of Scientology,
To show their secrets bare.

Then came the rise of WikiLeaks,
With Julian Assange at the helm,
Leaking government secrets,
And causing quite the realm.

The Arab Spring was fueled,
By hacktivist group Anonymous,
Who launched attacks on government sites,
And helped to topple oppressors.

But with the power came the risk,
Of being hunted down,
By the FBI and other agencies,
And ending up in prison bound.

So now we must ask ourselves,
What is hacktivism's fate,
Will it continue to be a force for good,
Or will it meet a darker date?

But one thing is for certain,
Hacktivism won't go away,
As long as there are truths to be told,
And injustices to be slayed.
 

03:57

CISA adds bugs exploited by commercial surveillance spyware to Known Exploited Vulnerabilities catalog Security Affairs

CISA has added nine flaws to its Known Exploited Vulnerabilities catalog, including bugs exploited by commercial spyware on mobile devices.

U.S. Cybersecurity and Infrastructure Security Agency (CISA) has added nine new vulnerabilities to its Known Exploited Vulnerabilities Catalog.

Five of the issues added by CISA to its catalog are part of the exploits used by surveillance vendors to target mobile devices with their commercial spyware:

  • CVE-2021-30900  Apple iOS, iPadOS, and macOS Out-of-Bounds Write Vulnerability.
  • CVE-2022-38181  Arm Mali GPU Kernel Driver Use-After-Free Vulnerability
  • CVE-2023-0266  Linux Kernel Use-After-Free Vulnerability
  • CVE-2022-3038  Google Chrome Use-After-Free Vulnerability
  • CVE-2022-22706  Arm Mali GPU Kernel Driver Unspecified Vulnerability

The decision to add the flaws to the catalog is the response of the agency to a recent report published by Googles Threat Analysis Group (TAG) that shared details about two distinct campaigns which used several zero-day exploits against Android, iOS and Chrome. The experts pointed out that both campaigns were limited and highly targeted. The threat actors behind the attacks used both zero-day and n-day exploits in their exploits.

The exploits were used to install commercial spyware and malicious apps on targets devices.

Google TAG shared indicators of compromise (IoCs) for both campaigns.

The remaining flaws added to the catalog are:

  • CVE-2013-3163 Microsoft Internet Explorer Memory Corruption Vulnerability
  • CVE-2017-7494 Samba Remote Code Execution Vulnerability
  • CVE-2022-42948 Fortra Cobalt Strike User Interface Remote Code Execution Vulnerability
  • C...

03:48

Ray Nayler, author of "The Mountain in the Sea", joins our Futurists Board. Lifeboat News

Ray Nayler, author of "The Mountain in the Sea", joins our Futurists Board.

03:00

THE 28TH AMENDMENT TO THE UNITED STATES CONSTITUTION 2600 - 2600: The Hacker Quarterly

The 28th Amendment to the United States Constitution:

Section 1: The right to reverse engineer technology and repair personal property shall not be infringed.

Section 2: Reverse engineering shall be defined as the process of dismantling or analyzing a product to understand how it works, with the goal of creating a similar or improved product.

Section 3: The right to repair shall be defined as the ability of individuals or entities to repair their personal property, including but not limited to electronic devices, motor vehicles, and home appliances, using available parts and documentation.

Section 4: Manufacturers and sellers of products shall not be allowed to restrict or limit the ability of individuals or entities to reverse engineer or repair their personal property.

Section 5: Manufacturers of products shall be required to provide consumers with access to the necessary tools, parts, and documentation for repair and maintenance of their products.

Section 6: Manufacturers of products shall not be allowed to void warranties or impose penalties for repairs made by individuals or entities outside of the manufacturer's authorized service providers.

Section 7: The federal government shall have the authority to enforce this amendment through appropriate legislation and regulation.

Section 8: This amendment shall not be interpreted as limiting any existing rights or protections under the law.

Section 9: This amendment shall take effect immediately upon ratification.

The purpose of this amendment is to protect the rights of individuals and entities to reverse engineer and repair their personal property, as well as to promote innovation and sustainability by allowing for the creation of new and improved products through reverse engineering. The amendment also seeks to prevent manufacturers from limiting the ability of consumers to repair their own property and to provide greater access to the necessary tools and documentation for repair and maintenance. By protecting these fundamental rights, this amendment will ensure that individuals and entities are able to maintain control over their personal property and promote a more sustainable and equitable economy.
 

02:26

Intel IAA 2.0 Accelerator Preparations Coming With Linux 6.4 Phoronix

Introduced with Intel Xeon Scalable 4th Gen "Sapphire Rapids" processors was the In-Memory Analytics Accelerator (IAA) for hardware accelerating data compression/decompression combined with primitive analytics functions for helping to accelerate the likes of RocksDB and ClickHouse. Intel IAA with Sapphire Rapids has already been supported for some time on an open-source stack as laid out in the Intel Sapphire Rapids accelerator setup guide while now Intel engineers are preparing Linux for IAA 2.0...

02:00

2600 PRESENTS - QUANTUM COMPUTING FOR TODDLERS! 2600 - 2600: The Hacker Quarterly

Hello boys and girls! We're here today to learn all about quantum computers! It's easy - and fun!

Imagine you have a toy box filled with different toys, like blocks and dolls. Each toy has a specific shape and color, and you can use your hands to pick them up and move them around.

Now, imagine you have a special toy box that can do things your regular toy box can't. This toy box is called a quantum computer. It's like a really fast and smart toy box that can help you solve really big problems.

In a quantum computer, instead of using your hands to move the toys around, you use something called "quantum bits" or "qubits" to store and process information. These qubits are like special blocks that can do different things depending on how they're arranged.

Just like how you can use blocks to build towers or castles, quantum computers can use qubits to solve complex problems and make new discoveries. They can help us understand things like the weather, how medicines work, or even how our universe was created.

So, just like how your regular toy box helps you play and have fun, a quantum computer helps scientists and researchers discover new things and solve important problems.

Ready for Part 2? Then click here!

02:00

Tiny Exploding Houses Promoted 18th-Century Lightning Rods IEEE Spectrum



Imagine if engineers were required to build a working model to demonstrate every new technological concept to the general public. Done right, tech literacy might soar! A compelling visual example can really help people understand the applications and implications of new technologies. That was the idea behind the thunder house, which in the second half of the 1700s became a popular means of getting out the word about Benjamin Franklins experiments on the lightning rod.

The thunder house was a simple tabletop device to show the benefits of a grounded versus ungrounded conductor. The demonstrator would place a small amount of gunpowder inside the model and then zap the house with an electric charge from an early battery called a Leyden jar. If the house had a lightning rod, simulated by a grounded conductor, the charge would pass through without incident. But if the house was set up with an open conductor, the charge would ignite the gunpowder and the sides of the house would collapse with a loud bang. This modern demonstration shows how it was done:


Thunder house www.youtube.com

The demos were certainly dramatic, and yet it took years for lightning rods to catch on.

Ben Franklins experiments confirmed that lightning carries electricity

Franklins experiments with electricity began in 1745 when Peter Collinson, a Fellow of the Royal Society and patron of the American Philosophical Society, sent him a glass tube and a set of directions for experiments. Franklin enthusiastically undertook the research. By 1750 he had written back to Collinson proposing his own experiment to determine if the lightning he observed in the...

02:00

THIS IS REAL - PLEASE DON'T IGNORE 2600 - 2600: The Hacker Quarterly

I was typing away at my computer, working on the day's April Fools' Day prank for the website. Suddenly, everything went black.

I panicked, but then the screen flickered back to life. Except, it's not the normal screen. It's the program that creates web posts. And I'm trapped inside.

At first, I thought it was a joke. A prank that someone is playing on me. But as the hours passed, I realized that this is no joke. I'm really trapped inside the program.

I tried to post a message on the website, explaining my situation and begging for help. But no one believed me. They all think it's part of the April Fools' Day prank.

I'm stuck inside the program, unable to eat, drink, or sleep. I tried everything I can think of to get out, but nothing works.

As time drags on, I'm beginning to lose hope. I wonder if I'll ever be able to escape this virtual prison.

And so, I remain trapped inside the program, trying desperately to get someone to believe me and help me break free. But as time passes, it becomes clear that I may never be able to escape.
 

01:21

Judge Finds Google Destroyed Evidence and Repeatedly Gave False Info to Court SoylentNews

https://arstechnica.com/tech-policy/2023/03/judge-finds-google-destroyed-evidence-and-repeatedly-gave-false-info-to-court/

A federal judge yesterday ruled that Google intentionally destroyed evidence and must be sanctioned, rejecting the company's argument that it didn't need to automatically preserve internal chats involving employees subject to a legal hold.

"After substantial briefing by both sides, and an evidentiary hearing that featured witness testimony and other evidence, the Court concludes that sanctions are warranted," US District Judge James Donato wrote. Later in the ruling, he wrote that evidence shows that "Google intended to subvert the discovery process, and that Chat evidence was 'lost with the intent to prevent its use in litigation' and 'with the intent to deprive another party of the information's use in the litigation.'"
[...]
After yesterday's ruling against Google in the Northern California federal court, a US Department of Justice attorney submitted a notice of the sanctions to the DC-based court. Google is fighting the request for sanctions in that case, too.

Related:
US DoJ, Microsoft and 35 States Support an Appeal of Epic Games-Apple Decision (20220202)
Google's Antitrust Case Won't Go to Trial Until Sept. 2023 (20201221)
Google Reportedly Could be Hit With Second Antitrust Lawsuit This Week (20201217)


Original Submission

Read more of this story at SoylentNews.

01:00

SHAKESPEARE'S LONG-LOST MICHELANGELO VIRUS SONNET 2600 - 2600: The Hacker Quarterly

The question isn't how Shakespeare was able to write about this centuries before it happened. The question is how did this long forgotten masterpiece fall into our hands. And the answer is, of course, SecureDrop. If you have a literary work from the Elizabethan Era that you'd like to leak anonymously, just visit our SecureDrop site at www.2600.com/securedrop.

Here then, are the words from the Michelangelo scene of Shakespeare's unreleased "Charles III":

Oh, Michelangelo! How thou art feared,
A virus that doth cause such great dismay.
Thou spreadeth fast, and none may be spared,
From thy deadly, destructive, viral way.

Like Michelangelo, thou art an artist,
Creating chaos and destruction all around.
Thou maketh thy victims truly hardest,
As they struggle to restore their lost ground.

But unlike Michelangelo's works so grand,
Thy legacy is one of pain and woe.
For thou dost wreak havoc across the land,
Leaving naught but destruction in thy flow.

Oh, Michelangelo virus, thou art vile,
And we shall never forget thy wicked guile.
 

00:10

PrimeWire Wont Die or Stop Pirating, $21.7m Judgment Be Damned TorrentFreak

deadpirateMajor Hollywood studios Disney, Paramount, Sony, Universal and Warner, plus relative newcomer Netflix, are all members of the Motion Picture Association (MPA). They have something else in common too.

Every single minute of every single day, rain or shine, people can be found pirating their movies and TV shows online. In Netflixs case, that means every single piece of content the company has ever produced.

For studios with longer histories and huge catalogs of movies and TV shows, piracy doesnt win the Oscar for Total Content Coverage, but still gets top marks for effort on top of its annual lifetime achievement award. Hollywoods corporate sheen and projections of wealth have a tendency to suffocate public empathy, but on any level, that must be pretty intolerable.

Lawsuit Against PrimeWire

When Hollywood sued PrimeWire in late 2021, the only surprise was the timing. For more than a decade, PrimeWire had played a key role in illegally streaming many thousands of movies and TV shows, perhaps hundreds of millions of times.

The studios received annual licensing payments of absolutely nothing but were spending money on lawyers in site-blocking actions in multiple countries. PrimeWires operator/s never appeared in any of them, most likely too busy running the site and circumventing site-blocking orders.

The same applied in the U.S. lawsuit. In the sites absence, the studios attorneys methodically obtained an injunction to shut PrimeWire down, but faced with overseas entities reluctant to take action, PrimeWire never went completely offline.

Cant Kill What You Cant See

Links to movies and TV shows did disappear from PrimeWire for a while but the studios werent taking the bait. They were already engaged in a compelling investigation to identify PrimeWires operator/s.

In most shutdown operations, unmasking the target is a priority. Taking a domain or shutting down hosting is the equivalent of shooting a zombie in the body; somewhat irritating but easy to recover from. Unmasking, on the other hand, opens up the possibility of a clean headshot and the elimination of po...

00:00

VORNADO ANNOUNCES PLANS FOR FORMER HOTEL PENNSYLVANIA SITE 2600 - 2600: The Hacker Quarterly

FOR IMMEDIATE RELEASE

Vornado Realty Trust Announces Plans to Transform Former Hotel Pennsylvania Site into a Center for the Overprivileged

New York City, NY - Vornado Realty Trust, one of the largest real estate investment trusts in the United States, announced today that it will be transforming the former site of the Hotel Pennsylvania into a luxurious center for the overprivileged. The new center will provide an exclusive escape from the daily stresses of life among the middle class, and will feature multiple floors reserved for polo, swimming, and croquet. Admission to the center will be restricted to those earning over $750,000 a year.

The Hotel Pennsylvania, a historic landmark in the heart of Manhattan, has been an iconic part of the New York City skyline since 1919. As a testament to its legacy, the building has undergone numerous renovations over the years, becoming a hub for tourists and locals alike. However, the building has now outlived its usefulness, and Vornado Realty Trust has decided to demolish it to make way for this new venture.

"This is an exciting time for Vornado Realty Trust and for New York City," said Steven Roth, Chairman and CEO of Vornado Realty Trust. "We believe that the overprivileged deserve a place where they can relax and enjoy the finer things in life. This new center will provide a sanctuary for those who have worked hard to achieve success and are looking for a well-deserved break from the middle class."

The new center will feature state-of-the-art facilities, including multiple swimming pools, a polo field, and a croquet court, as well as other luxurious amenities. In addition, the center will offer a range of exclusive services, including private chefs, personal trainers, and spa treatments.

As the demolition of the historic Hotel Pennsylvania continues, Vornado Realty Trust is committed to ensuring that its legacy is not forgotten. The company will be preserving a number of key artifacts from the building's storied history, which will be on display in the new center.

"We recognize the Hotel Pennsylvania's significance in New York City's history, and we are committed to honoring its legacy," said Roth. "We look forward to opening this new center for the overprivileged and providing them with a truly unique and exclusive experience."

Construction of the new center is set to begin in the coming months, with an expected completion date in the next two years.
 

Go Back:30 Days | 7 Days | 2 Days | 1 Day

IndyWatch Science and Technology News Feed Today.

Go Forward:1 Day | 2 Days | 7 Days | 30 Days

Saturday, 01 April

23:51

GTK & Blender Are The Latest Software Supporting Wayland Fractional Scaling Phoronix

The Blender open-source 3D modeling software as well as the GTK toolkit are the latest open-source projects this week ironing out support for Wayland's fractional scaling protocol...

23:28

Wine-Staging 8.5 Adds Patches To Allow Diablo IV To Run Without Errors Phoronix

Following yesterday's Wine 8.5 bi-weekly development release, some 500+ extra patches are applied atop the upstream Wine code-base...

23:00

CROSSOVER SERIES OF "MR. ROBOT" AND "LEAVE IT TO BEAVER" ANNOUNCED 2600 - 2600: The Hacker Quarterly

Title: "Beaver's Bytes"

Logline: In 2023, a grown-up Theodore "Beaver" Cleaver finds himself caught up in a world of cybercrime and corporate corruption when he discovers that his beloved town of Mayfield is under threat from an unknown hacker group. With the help of his old friend, Elliot Alderson, the mastermind behind the infamous fsociety hack, Beaver sets out to uncover the truth and save his hometown from destruction.

Synopsis: "Beaver's Bytes" is a hybrid of the classic family sitcom "Leave It To Beaver" and the cyber thriller "Mr. Robot." Set in the year 2023, the show follows the now-grown Theodore "Beaver" Cleaver as he returns to his hometown of Mayfield after a long absence. He quickly realizes that Mayfield is no longer the idyllic town of his youth, but instead a place overrun with corrupt corporations and cybercriminals.

Beaver reunites with his childhood friend, Elliot Alderson, who has become a legend in the world of hacking thanks to his work with the fsociety group. Elliot has been lying low since the end of the "Mr. Robot" series, but Beaver's return to Mayfield gives him a reason to come out of hiding and help his friend.

Together, Beaver and Elliot set out to uncover the identity of the hacker group that is threatening Mayfield, using their unique combination of old-school sleuthing and cutting-edge hacking skills. Along the way, they encounter a cast of characters both old and new, including some familiar faces from the original "Leave It To Beaver" series.

As the investigation heats up, Beaver and Elliot begin to realize that the threat to Mayfield is much bigger than they initially thought. They must race against time to stop the hackers before they can cause irreparable damage to the town and its residents.

"Beaver's Bytes" is a unique blend of comedy, drama, and suspense, featuring a cast of beloved characters from a classic sitcom alongside the gritty, high-stakes world of cybercrime. With its timely themes of corporate corruption and online privacy, the show is a thrilling and thought-provoking ride that will keep audiences on the edge of their seats.
 

22:00

Squeezing Secrets Out Of An Amazon Echo Dot Hackaday

Photo of the Echo Dot PCB, highlighting the capacitor that needs to be shorted out for the exploit to work

As we have seen time and time again, not every device stores our sensitive data in a respectful manner. Some of them send our personal data out to third parties, even! Todays case is not a mythical one, however its a jellybean Amazon Echo Dot, and [Daniel B] shows how to make it spill your WiFi secrets with a bit of a hardware nudge.

Theres been exploits for Amazon devices with the same CPU, so to save time, [Daniel] started by porting an old Amazon Fire exploit to the Echo Dot. This exploit requires tactically applying a piece of tin foil to a capacitor on the flash chip power rail, and it forces the Echo to surrender the contents of its entire filesystem, ripe for analysis. Immediately, [Daniel] found out that the Echo keeps your WiFi passwords in plain text, as well as API keys to some of the Amazon-tied services.

Found an old Echo Dot at a garage sale or on eBay? There might just be a WiFi password and a few API keys ripe for the taking, and who knows what other kinds of data it might hold. From Amazon service authentication keys to voice recognition models and maybe even...

22:00

UNCLAIMED HACKER HANDLES 2600 - 2600: The Hacker Quarterly

The following 100 hacker handles are unclaimed in the Hacker Registry. If you are interested in obtaining one of these, registration will open on Monday. For a monthly fee of $8, we will register the handle of your choice to you (first come, first served). There is a limit of two handles per Social Security number.

ByteCrasher
Hacktivator
ShadowPuppet
DarkByte
LogicBomb
GhostCracker
CyberChaos
CodeCrusader
TechTerrorist
DataDiva
CyberRanger
HackSmasher
CrypticCracker
TerminalTerror
ByteBandit
NetworkNecromancer
WebWarrior
CyberSiren
FirewallFoe
ByteBrute
CodeCrusher
CircuitSavior
ShadowSurfer
HackHunter
DarkDynamo
CodeConqueror
CyberCaptor
PhantomProgrammer
ByteBattler
CyberCommando
TerminalTactician
NetNemesis
WebWizard
CryptoCrusader
ByteBrawler
CyberSpartan
DigitalDominator
CodeChampion
GhostGeek
CircuitCrusher
ShadowShark
HackHustler
DarkDestroyer
TechnoTitan
ByteBurglar
CodeCrafter
CyberCrusade
DataDagger
PhantomPilot
TerminalTornado
WebWitch
BinaryBandit
CyberSpecter
DigitalDynamo
Encryptor
FirewallFury
GhostHacker
InfraRed
JavaJacker
LogicLad
MalwareManiac
OracleOctopus
PasswordPunisher
QuantumQuasar
RouterRider
ScriptSlinger
TechTornado
Ultraviolet
VirusVandal
WiFiWarrior
XenoXploit
YellowHacker
ZombieZero
AlphaArmor
ByteBasher
CryptoCraze
DarkDefender
EchoEagle
FireflyHacker
GreyGuru
HackHive
InfiKnight
JoltJumper
KeyKing
LogikLord
MachineMaster
NetNimbus
OverloadOracle
PhantomPirate
QuantumQuark
RogueRunner
SparkSavage
TechTerror
VirusVigilante
WhirlwindWizard
XenonXenocide
YellowYak
ZombieZone
ArchAngel
Cipherphreak

 

21:55

KDE Ends Out March With More Fixes - Including More Plasma Wayland Work Phoronix

The KDE developers ended March on a high note with more fixes, continued porting around Qt 6, and also taking care of more Plasma Wayland issues...

21:00

VPNS TO BE OUTLAWED IN THE U.S. - IT'S FOR THE BEST, REALLY 2600 - 2600: The Hacker Quarterly

The United States government is set to outlaw the use of VPNs later this year, citing concerns about their use for illegal activity. VPNs, or virtual private networks, allow users to connect to the internet through a server in another location, which can be used to mask their identity and location. This has made them popular for a variety of activities, including accessing blocked websites, pirating copyrighted content, and committing fraud.

The government argues that VPNs are a major tool for criminals and that outlawing their use will help to reduce crime. However, some critics argue that the ban will stifle freedom of speech and privacy. They argue that VPNs can be used for legitimate purposes, such as protecting oneself from government surveillance.

The ban on VPNs is set to go into effect later this year. It is unclear how the ban will be enforced, but it is likely that users who are caught using a VPN will be prosecuted.

Here are some of the reasons why VPNs are considered dangerous:

They can be used to access blocked websites and content. This can be used for illegal purposes, such as pirating copyrighted content or accessing child pornography.

They can be used to commit fraud. For example, VPNs can be used to create fake identities or to steal credit card information.

They can be used to hide illegal activity. For example, VPNs can be used to hide the location of a computer that is being used to commit a crime.

They can be used to spy on users. For example, some VPN providers may sell user data to third-party companies.
 

20:34

AI Image Generator Midjourney Stops Free Trials but Says Influx of New Users to Blame SoylentNews

AI image generator Midjourney has stopped free trials of its software:

AI image generator Midjourney has halted free trials of its service, blaming a sudden influx of new users. Midjourney CEO and founder David Holz announced the change on Tuesday, originally citing "extraordinary demand and trial abuse" in a message on Discord (this announcement was spotted first by The Washington Post). In an email to The Verge, Holz stated that the pause is "because of massive amounts of people making throwaway accounts to get free images."

"We think the culprit was probably a viral how-to video in china," said Holz over email. "This happened at the same time as a temporary gpu shortage. The two things came together and it was bringing down the service for paid users."

Given Holz's reference to "abuse," it was originally thought that the pause was linked to a spate of recent viral images created using Midjourney, including fabricated images of Donald Trump being arrested and the pope wearing a stylish jacket, which some mistook for real photographs. However, Holz characterized earlier reports as a "misunderstanding" and notes that the free trial of Midjourney that creates the most realistic images and which is thought to have been used for these viral pictures.

[...] Midjourney maintains a list of banned words "related to topics in different countries based on complaints from users in those countries," as per a message from Holz last October. But it doesn't share a last year, "Almost no one ever notices [the ban list] unless they're specially trying to create drama which is against our rules in tos [terms of service] 'don't use our tools to create drama.'"

[...] At the time of writing, Midjourney is still not allowing free users to generate images, though this may change in the future. "We're still trying to figure out how to bring free trials back, we tried to require an active email but that wasn't enough so we're back to the drawing board," said Holz.


...

20:33

888 On Line Casino India No Deposit Bonus, Codes & Free Spins h+ Media

888 On Line Casino India No Deposit Bonus, Codes & Free Spins

However, the on line casino operates in many other international locations where it is legally licensed to take action. Follow the instructions provided by the deposit methodology you have chosen to complete the transaction. Select your preferred deposit method from the list of choices available.

Suppose you be part of 888 India and set aside a $40 installment. The on line casino would then give you a 100 percent matched deposit bonus, which would convey your complete report surplus up to $80. That implies youve the $40 you deposited, alongside an extra $40 in bonus reserves. At all web based club destinations, rewards accompany agreements. Rewards accompany betting conditions, expiry dates, most excessive successes from there, the skys the restrict. While perusing the agreements, make sure to verify which video games the rewards work with as not all games add to clearing the prerequisites 888 video games.

I additionally obtained a quantity of internships from the campus with Fortis Hospital and Centre for academic progress and analysis. The tutorial studying and company expertise with a world class infrastructure at NDIM has given me the talents wanted for lifelong excellence. I am really looking ahead to my career with Byjus. I am very proud to be a member of the NDIM household and glad about my determination to join this prestigious Institute. NDIM made me plan out my management dream and the trail to attain it.

When the game hundreds, and head for money adventures. Onlinecasinoguide.in is the main guide to learn every thing about Indian on-line casinos. We provide fresh and impartial casino reviews and assist Indian players find the most effective on line casino bonuses and games.

The first welcome bonus youll be eligible to say is 888s $88 no-deposit bonus. All you should do is create an account at 888, confirm your e-mail tackle and keep an eye fixed on your emails inbox. You will then be sent an e-mail within 10 minutes, which accommodates a particular FreePlay credit. This permits you to declare as a lot as $88 in casino funds and you ought to use these funds to play on virtually any casino or slot game you want. Steave jobs has once said that ,sometimes life hits you in a head with break .. this what precisely occurs when an mental sickness caught you . Depression started enjoying disguise and sick with me whe

Its recommended to set a budget that you could afford to lose and stick with it. Dont chase your losses by growing your bets, as this can result in even larger losses. If you discover yourself constantly going over your price range, it might be time to take a break from playing.

Since then, it has produced quite a few on-line platforms for participating countries around the globe. As one of the worlds first major iGaming web sites, 888 Holdings is headquartered in Gibraltar...

20:31

Jeetbuzz Casino h+ Media

Jeetbuzz Casino

These promotions are designed to incentivize gamers to use the cellular platform and might embrace free spins, bonus funds, and other rewards. Welcome to 4raBet, an official on-line bookmaker in India. Licensed by the government of Curacao, it operates legally in Asia and Europe, offering 40+ sports activities to wager on pre-match and live.

The lobby part of the location is the place youll be able to browse the complete vary of games that are obtainable on the casino. Type in CRYPTO4RASP in the reside chat, make a second deposit with BTC, ETH, Litecoin, Dogecoin, Tether, or another crypto, and get a candy bonus. You need to wager the bonus eight occasions in single or combo bets with the percentages of 1.7+. NDIM made sure our studies dont endure because of the sudden nation-wide lockdown. Even from house we got exceptional studying, placement preparation and job alternatives.

You might struggle to tear yourself away from the screen due to the number of jackpot games and incentivizing bonuses. 888 Casino is a safe guess if you want to take pleasure in an enormous array of lifelike casino games online. Your money is all the time secure, and the chances are never bent in anybodys favour as proven by its eCOGRA certification. Its mother or father firm, 888 Holdings, holds licenses in quite a few international locations across the globe, together with the UK, Gibraltar, Denmark, and the us

Reaching the client assist representatives at 888 Casino is not troublesome. The group is on the market round the clock to reply all casino-related queries of gamers, regardless of whether or not it is about cost, any technical term, recreation, or some other. 888 Casino customer assist may be accessed in multiple languages through e mail, telephone, or e mail. Providing award-winning gaming expertise stay and on cell gadgets, 888 casino becomes a most popular selection for rising numbers of players. It has no limitations other than the next one.

Deposit $20+ using the promo code TravelThurs and get 20% up to $100 FreePlay in two top vacation spot games. Yes, 888 casino is the official establishment which is available to players worldwide, aside from sure nations (888 on line casino GEO info restricted countries). From then on, youll have entry to the complete assortment of leisure and you will be able to play in all of the universes with a single account. The expertise is bound to convey you full satisfaction. There is little question in regards to the legitimacy of 888 on line casino. It is an old casino brand that has been in the world playing scene for a very lengthy time.

To all the people who find themselves affected by psychological sickness, I simply yearn to say that you are not alone. My family has been supportive all this time and I am grateful for them. I would get up every morning feeling very empty, directionless. It appeared like there were butterflies in my sto...

20:28

888 Casino Review 2022 h+ Media

888 Casino Review 2022

$88 is given as a No deposit bonus to each new player. We should let you understand that Skrill and Netellers deposit doesnt qualify for the Welcome bonus on this Apple Pay casino. It is subsequently advisable to avoid them when making deposits.

The first welcome bonus youll be eligible to claim is 888s $88 no-deposit bonus. All you have to do is create an account at 888, verify your email handle and regulate your emails inbox. You will then be sent an email within 10 minutes, which contains a particular FreePlay credit. This lets you declare up to $88 in casino funds and you can use these funds to play on nearly any on line casino or slot sport you like. Steave jobs has once mentioned that ,generally life hits you in a head with break .. this what precisely occurs when an mental sickness caught you . Depression started playing cover and sick with me whe

Indeed, it is possible for you to to find the creations of the iGaming behemoths at the online on line casino. NetEnt will offer you a wide selection of the cream of the crop of its virtual slot machines such as Gonzos Quest or South Park. Can you merge the numbers and efficiently get, play online slot Poker has seen elevated acceptance and popularity within the US. Baseballs all-time hits leader is banned from the game for betting on it, the UK. Offers topic to alter without notice, China and different European nations and now the card recreation online has additionally begun to acquire immense traction in India. Der Firmensitz von diesem Online Casino befindet sich in Grobritannien, the second one requires the charge to be paid and takes a specific amount of days to be executed.

Additional bets are not limited to particular ideas; you presumably can wager on varied things. The participant determines the winner of the sporting event. In general, likelihood is accepted before the match starts. It is a tough betting sort, as it is hard to foretell how the bettors will behave from the seasons starting. However, the higher the risk, the upper the payout from the official website 4rabet.

It additionally has the eCOGRA label which certifies that the video games are dependable, so you can play right here with peace of mind. Theyre called the Macau, casino windsor poker which absolves the federal government of accountability. We all wish we knew extra, serves solely the pursuits of the betting industry on the expense of gambling addicts and our high streets.

The company stands out from the rest by providing numerous betting markets as nicely as distinctive playing instruments. Are you in search of a secure and authorized betting site? Sign u...

20:00

Happy Month Sales catonmat.net

At Browserling and Online Tools, we love sales.

We just created a new automated sales campaign called "Happy Month Sales".

Now each new month, for the first couple of days we show a 50% discount offer to all users who visit our site.

This month it's "Happy April Sales". Next month it will be "Happy May Sales", etc.

Here's how it looks:

Run Happy Month Sales too and see you next time!

Happy April Sale catonmat.net

At Browserling and Online Tools, we love sales.

We just created a new automated sales campaign called "Happy month Sale" where month is a variable.

Now each new month, for the first couple of days, we show a 50% discount offer to all users who visit our site.

This month it's "Happy April Sale". Next month it will be "Happy May Sale", etc.

Here's how it looks:

Run happy month sales too and see you next time!

19:33

Microsoft Fixes New Azure AD Vulnerability Impacting Bing Search and Major Apps The Hacker News

Microsoft has patched a misconfiguration issue impacting the Azure Active Directory (AAD) identity and access management service that exposed several "high-impact" applications to unauthorized access. "One of these apps is a content management system (CMS) that powers Bing.com and allowed us to not only modify search results, but also launch high-impact XSS attacks on Bing users," cloud security

19:00

Apple Never Gave Them USB. Now, Theyre Getting It For Themselves Hackaday

These days we use USB as a default for everything from low-speed serial ports to high-capacity storage, and the ubiquitous connector has evolved into a truly multi-purpose interface. Its difficult to believe then, that the first Apple Mac to be designed with a USB interface was shipped without it; but thats the case with 1997s grey Power Mac G3.

On the personality board are all the footprints for a single USB 1.1 port, but USB-hungry Apple fanboys had to wait for the translucent iMac and later G3 before they had a machine with the parts fitted. [Croissantking] is righting that particular wrong, by piecing together the missing Apple circuit using parts from contemporary cards for PCs. Over a long forum thread there are a few teething problems, but it certainly seems as though grey G3 owners will soon be able to have reliable USB upgrades.

If omitting USB from a 1997 Mac seems unexpected, its as well to remember how slow the first USB versions were. At the time SCSI was king in the high-speed peripheral world, and USB seemed more appropriate as a replacement for Apple Desktop Bus and the serial port. Even when they embraced USB they were reluctant to follow the standards of the PC world, as we remember finding out when for curiositys sake we tried swapping the mice and keyboards between an...

18:00

Science Confirms Turmeric Is as Effective as 14 Drugs Terra Forming Terra



We always wondered why for tumeric.  After all it is endemic in Indian food.  From this we certainly see it is justified.

I personally use it and ginge and black peppar to augment my grapefruit peel boiled extraction.  Seemed like a natural add in to my brew and otherw8ise harmless.

I then take a couple of ounces of my extra ct and add hot water along with a heaping teaspoon of ascorbic acid.  It works well to drink a cup of this yellow tea or potion which packs natural quinine,.


.
Science Confirms Turmeric Is as Effective as 14 Drugs

Over 12,000 studies reveal wide-ranging effects of a potent compound found in this bright spice


Apr 2 2021
biggersmaller
Turmeric is one the most thoroughly researched plants in the world and a possible cause of sleepless nights for some pharmaceutical company executives. (Shutterstock)


If ever there were an herb that puts existential fear into the bottom line of pharmaceutical companies, its turmeric.
...

Woman Who Felt Abandoned by God Dies in Hospital Room, Receives Answer From Jesus Terra Forming Terra



This is a remarkable report of a near death experience that is much richer than any i have read before and the information shared adds well to what is known.


The major teaching here is just how deeply we chose our lifeway before we are born.  I was not expectiing that.  We discover lefe experiences are carried forward using even our cells which must have that super computer.

What must be noted is that we think in terms of DNA which is nice enough.  Yet every single lectron has 2400 vertices and inforamtion handling capacity and we do not understand how to integrate photon ribbons all tied into all this.

So why not just tie information forward into time in order to inform our present.  somehow our off on concept of cognition is tattered.




Woman Who Felt Abandoned by God Dies in Hospital Room, Receives Answer From Jesus



MARCH 27, 2023 PRINT

...

Trump indictment shows that power-crazed Democrats are incompatible with human society Terra Forming Terra



A nice statement here which is how this cascade of leftist behavior can be seen.  Just why though?  How can a minority of odd thinking folk rise up this way and expect a good result.

It is completely proper for a minority taste to approach the majority and ask for forbearance.  We saw exactly that evolve in our acceptance of public homosexuality, even though even today, the watch word is descreet.

And discreet should be the watch word for all this.  No women needs to be wolf whistled.  It will all be good when that goes out of fashion.

Right now, a lot of indiscreet behavior is been foisted upon the majority expecting actual acceptance or some other good result.  It vis not ever going to work out without a majority culture of forebearance and ample discretion


Trump indictment shows that power-crazed Democrats are incompatible with human society



I believe that Trump's indictment by power-crazed Democrats is yet another necessary step for the trial by fire that will see America rise up against tyranny, censorship, election rigging and the demonic infestation of the Left that has produced child grooming, transgenderism, trans terrorism and widespread psychological trauma.

As you'll hear today in my Brighteon Broadcast News episode (below), I also believe that Trump himself needs to make it through this trial by fire to achieve a personal transformation.

I think Trump's arrest and prosecution may actually be the wake up call that Trump needs to finally get serious about draining the swamp and using executive power to arrest and imprison the traitors, operatives and treasonous actors who have declared war on this nation.

Explorers Uncover Cave in Spain With Over 100 Prehistoric Engravings Depicting Copper Age Pastoral Life Terra Forming Terra




This is interesting is only because it involves the copper age which is recent compared to known cave paintings.  No real comment on age here and that must wait for archelogical work to actually be done here.

It may well have also been known over thousands of years, but only to a few in each generation.  These caves do not seem to ever have been used as storage caches even though well suited.  Lousy locations usually.

Which likely speaks to a singular visitation site, perhaps used by a shaman.

Explorers Uncover Cave in Spain With Over 100 Prehistoric Engravings Depicting Copper Age Pastoral Life


MARCH 28, 2023

https://www.theepochtimes.com/explorers-uncover-cave-in-spain-with-over-100-prehistoric-engravings-depicting-copper-age-pastoral-life_5143982.html?

A Spanish cave lost for 80 years has been rediscovered with over 100 unique prehistoric engravings on its interior walls. The caves eight panels of incredible hand-engraved art are delivering further insight into prehistoric life in Spain.

The cave, known as Cova de la Vila in Catalan, was rediscovered in the village of Febr at Baix Camp, Tarragona, during a topographical expedition by the group of speleologists, Barranc de la Cova del Corral, on May 13, 2021. The cave was originally excavated in the 1940s by the researcher Salvador Vilaseca, whose team later lost its location.
...

16:00

Working With Old High-Voltage EPROMs Is Fussy Hackaday

EPROMs, those UV-erasable memory chips of the 80s and 90s, once played a crucial role in countless electronic devices. Theyve become relics of a bygone era, but for enthusiasts of vintage electronics, the allure of these light-sensitive devices remains strong. Today, were diving into [Kevin Osborn]s nostalgic journey as he uncovers the secrets of old EPROMs loaded with Atari 7800 code.

[Kevin] used to work at General Computer Company, which produced the Atari 7800 and several games for the system. Thus, he had a handful of old carts and development EPROMs sitting up in his attic along with an old console. Recently, he decided to try and uncover what was on the EPROMs and begun an investigation. They wouldnt run in his Atari, and he quickly realized why: the EPROMs werent cryptographically signed, so the system wouldnt load them.

After a little work, he was able to dump the EPROMs with the help of a TL866II+ reader. After some hacking, he was able to fettle the data on the EPROMs into something that would run on the A7800 emulator. This was easy enough, as the emulator doesnt run checks for properly signed code. From there, he was able to use a UV phone sanitizer to wipe the EPROMs, and re-burn them with signed versions of their original code. This took the application of some high voltage, but with the aid of an external power supply, it worked. He was able to successfully run the obscure ROMs on real Atari 7800 console hardware.

UV-erasable PROMs, or EPROMs, have long been superseded by the more convenient...

15:52

Silence Gets You Nowhere in a Data Breach SoylentNews

Your victim status won't last long if your response is nonexistent:

In cybersecurity, the phrase "what they don't know won't hurt them" is not only wrong, it's dangerous. Despite this, it's a motto that remains in many organizations' PR playbooks, as demonstrated by the recent LastPass and Fortra data breaches.

[...] TechCrunch+ has learned that LastPass has already lost customers because of its silent-treatment approach to its breach. And Fortra is likely to face a similar fate after TechCrunch+ heard from multiple customers that they only learned that their data had been stolen after receiving a ransom demand; Fortra had assured them that the data was safe.

Smaller companies, too, are employing a silent-treatment approach to data breaches: Kids' tech coding camp iD Tech failed to acknowledge a January breach that saw hackers access the personal data of close to 1 million users, including names, dates of birth, passwords stored in plaintext, and about 415,000 unique email addresses. Concerned parents told us at the time that they only became aware of the breach after receiving a notification from a third-party data breach notification service.

[...] While getting hacked can be forgivable, an organization's victim status will not last long if it fails to respond appropriately or at all as demonstrated by LastPass and Fortra.


Original Submission

Read more of this story at SoylentNews.

15:51

Cacti, Realtek, and IBM Aspera Faspex Vulnerabilities Under Active Exploitation The Hacker News

Critical security flaws in Cacti, Realtek, and IBM Aspera Faspex are being exploited by various threat actors in hacks targeting unpatched systems. This entails the abuse of CVE-2022-46169 (CVSS score: 9.8) and CVE-2021-35394 (CVSS score: 9.8) to deliver MooBot and ShellBot (aka PerlBot), Fortinet FortiGuard Labs said in a report published this week. CVE-2022-46169 relates to a critical

15:36

Hackers Exploiting WordPress Elementor Pro Vulnerability: Millions of Sites at Risk! The Hacker News

Unknown threat actors are actively exploiting a recently patched security vulnerability in the Elementor Pro website builder plugin for WordPress. The flaw, described as a case of broken access control, impacts versions 3.11.6 and earlier. It was addressed by "Improved code security enforcement in WooCommerce components," the Tel

13:15

Socura releases Managed SASE service to secure the hybrid workforce Help Net Security

Socura has launched its Managed SASE (Secure Access Service Edge) service in partnership with Palo Alto Networks Prisma. Market industry researchers expect SASE to be a $60bn industry by 2027 fuelled by the rise of flexible working, which was enshrined into UK law in December 2022, whereby millions of UK employees were granted the right to request flexible working hours throughout their employment. By combining SASE with its Managed SOC (Security Operations Centre) service, Socura More

The post Socura releases Managed SASE service to secure the hybrid workforce appeared first on Help Net Security.

13:09

18 Years Later schestowitz.com

I recently wrote that I had been looking at many old photos, trying to basically recall much older days because of my sisters wedding (4 days ago).

Roy in ZermattOne experience that I still remember was in 2005 (Zermatt). It cemented my decision to do Free software activism for a lifetime if possible. I wasnt rich, but I came to realise that all the superficial nonsense rich people dwell in does not bring true happiness. Its more about show-off and class consciousness. Thus, the concept of hoarding money or showing money was rather pointless. Id never be interested in it.

My stance or my position has not changed since then (18 years ago). I still do campaigning, I still share all my work/code, and Ive worked hard to secure that for at least another decade to come.

13:00

Creating a 3D Visualization of Freely Moving Organisms Using Camera Array and Software Algorithm Hackaday

Observing a colony, swarm or similar grouping of creatures like ants or zebrafish over longer periods of time can be tricky. Simply recording their behavior with a camera misses a lot of information about the position of their body parts, while taking precise measurements using a laser-based system or LiDAR suffers from a reduction in parameters such as the resolution or the update speed. The ideal monitoring system would be able to record at high data rates and resolutions, while presenting the recorded data all three dimensions. This is where the work by Kevin C. Zhou and colleagues seeks to tick all the boxes, with a recent paper (preprint, open access) in Nature Photonics describing their 3D-RAPID system.

This system features a 96 camera grid, making for a total of 54 cameras which image the underlying surface. With 66% overlap between cameras across the horizontal dimension, there enough duplicate data between image stream that is subsequently used in the processing step to extract and reconstruct the 3D feat...

13:00

Zenoss introduces monitoring capabilities for Kubernetes Help Net Security

Zenoss has launched a free trial for monitoring Kubernetes, the de facto standard platform for running containers in production at scale, including in on-prem and cloud environments. This real-time monitoring of Kubernetes streaming data is another advancement of the Zenoss unified monitoring vision. The Zenoss monitoring capabilities for Kubernetes enable customers to: Begin monitoring in minutes with no training required for operations personnel. Leverage secure, cloud-based monitoring with zero install. Gain insights for Kubernetes clusters More

The post Zenoss introduces monitoring capabilities for Kubernetes appeared first on Help Net Security.

12:38

Linus Tech (Illiteracy) Tips, LTT, Buys Phoronix Media Techrights

Linus I gotchu fam: Linus Tech (Illiteracy) Tips and PTS

Summary: Phoronix Media is being acquired by a larger company; the site will not change though

Linus Gabriel Sebastian, founder of Linus Tech Tips (LTT), has just announced the transfer of Phoronix Media (best known for Phoronix.com and PTS) to his company based in Canada.

Readers of the site wont be affected. They can still get a spoonful of Microsoft chaff along with plenty of (other) ads.Phoronix.com and PTS are a strategic addition to our growing portfolio, remarked Yvonne Ho, who will oversee the operations to ensure the benchmarks always include ClearLinux and articles habitually include a Microsoft distro that only Microsoft uses.

Michael Larabel could not be reached for comment. He has been busy this past month trying to figure out new and innovative ways to block all the ad blockers. Mr. Sebastian insists that evading ads is nothing short of piracy.

Readers of the site wont be affected. They can still get a spoonful of Microsoft chaff along with plenty of (other) ads.

Phoronix on Microsoft

12:13

Decided to Quit Debian and Use WSL Instead (Best of Both Worlds) Techrights

Hayden Barnes: the only thing Debian needs is a decent back door

Summary: Today starts a journey to a better experience, which lets Microsoft audit the kernel and leverage telemetry to improve my Debian experience

THIS is a hard post to write. Today, April 1, Im beginning my migration. I will report on it later today, explaining how it all went along. Maybe Ill change my mind.

Thankfully I already have some Microsoft MVPs like Hayden Barnes helping my migration.Having used GNU/Linux since my teenage years Ive decided that its just too boring. Ive not rebooted Debian since January when I first installed it (only the post-install reboot) and I am beginning to wonder if theres a bootkit somewhere inside my system. Thank God, Microsoft made secure boot to do this for me. As it turns out, Debian 11 is not good anymore. Vista 11 has WSL, which reinvents Cygwin, dating back to 1995. So why on Earth use only GNU/Linux? Best of both worlds, right? Anything else would be an act of bigotry and intolerance.

Thankfully I already have some Microsoft MVPs like Hayden Barnes helping my migration. They kept coming to our IRC network for years, advocating WSL. I give up! They have a point!

11:46

Microsoft Has Laid Off Lennart Poettering and Hired Elon Musk Techrights

Microsoft hires Elon Musk to oversee layoffs, algorithm decides to fire Poettering

Got Hollerith tabulating machine; willing to travel

Summary: Poettering gets rehired by IBM; IBM and Microsoft announce merger, putting Poettering back into his former position

MICROSOFT is going through some truly tough times. There are layoffs every week, the company is unable to hide it by compelling staff to sign NDAs (the press finds out eventually), and tens of thousands of puff pieces about a chaffbot cannot distract the public entirely from the real crisis.

As a result, the first person to go is Lennart Poettering, who quietly defected from IBM to Microsoft only months ago.Microsoft has just announced, in its Friday shareholders meeting, that it has convinced Elon Musk to join Microsofts Board of Directors and spend some time carrying out duties at Microsoft, at least at a part-time capacity, focusing on AI.

Musk has demonstrated solid track record running companies that suffer deep losses, the company said in its meeting minutes, not only convincing a lot of staff to leave voluntarily but also laying off a significant proportion without paying severance.

IBM has meanwhile signalled that it is willing to rehire Mr. Poettering, but discussions are still ongoing about the IBM/Microsoft merger, which dates back to 2011.An anonymous source told us that OpenAI has unveiled a new algorithm for HR. As a result, the first person to go is Lennart Poettering, who quietly defected from IBM to Microsoft only months ago. Poettering insists that it was not a defection, it was just a matter of wearing the correct badge after more than a decade of work, which some deemed sabotage.

IBM has meanwhile signalled that it is willing to rehire Mr. Poettering, but discussions are still ongoing about the IBM/Microsoft merger, which dates back to 2011. The discussions are already more than a decade old and Bill Gates is losing interest in them.

11:10

These Angry Dutch Farmers Really Hate Microsoft SoylentNews

Tech giants want to build massive, "hyperscale" data centers in the Netherlands, but a popular political movement wants them stopped:

There are around 200 data centers in the Netherlands, most of them renting out server space to several different companies. But since 2015, the country has also witnessed the arrival of enormous "hyperscalers," buildings that generally span at least 10,000 square feet and are set up to service a single (usually American) tech giant. Lured here by the convergence of European internet cables, temperate climates, and an abundance of green energy, Microsoft and Google have built hyperscalers; Meta has tried and failed.

Against the backdrop of an intensifying Dutch nitrogen crisis, building these hyperscalers is becoming more controversial. Nitrogen, produced by cars, agriculture, and heavy machinery used in construction, can be a dangerous pollutant, damaging ecosystems and endangering people's health. The Netherlands produces four times more nitrogen than the average across the EU. The Dutch government has pledged to halve emissions by 2030, partly by persuading farmers to reduce their livestock herds or leave the industry altogether. Farmers have responded with protests, blockading roads with tractors and manure and dumping slurry outside the nature minister's home.

The courts have also halted thousands of building projectsforcing construction jobs like Microsoft's to apply for permits proving they would not make the nitrogen crisis worse.

[...] The dispute over nitrogen permits has put Microsoft's data center developments in direct opposition to an increasingly powerful farming community. Earlier this month, a new political force, called the Farmer Citizen Movement (BBB), did so well in provincial elections, it became the joint-largest party in the Dutch Senate. The party, which emerged in response to the nitrogen crisis, also has strong views on data centers. "We think the data center is unnecessary," says Ingrid de Sain, farmer turned party leader of the BBB in North Holland, referring to the Microsoft complex. "It is a waste of fertile soil to put the data centers boxes here. The BBB is against this."

Read more of this story at SoylentNews.

10:37

New AMD Ryzen CPUs, Intel Sapphire Rapids, Rust Adoption & More In Q1 Phoronix

During the first quarter of 2023 on Phoronix I wrote 708 original news articles pertaining to Linux, open-source, and hardware. That was complemented by another 45 Linux hardware reviews / multi-page featured articles for the quarter. Here is a look back at what excited Linux/open-source enthusiasts for the quarter...

10:34

10:15

Italy Temporarily Blocks ChatGPT, Citing Privacy Issues HackRead | Latest Cybersecurity and Hacking News Site

By Habiba Rashid

Italy has given OpenAI, the parent company of ChatGPT, a deadline of 20 days to sort out privacy issues, including data collection, under Europe's General Data Protection Regulation (GDPR).

This is a post from HackRead.com Read the original post: Italy Temporarily Blocks ChatGPT, Citing Privacy Issues

10:00

Tiny Yet Functional Bike Built From Scratch Hackaday

Sometimes, you just want to go ride your bike in the great outdoors, but you cant be bothered throwing it in the back of the car. That wouldnt be a problem if you rode this latest build from [The Q]: a bike small enough to fit in a handbag.

...

08:43

Wine 8.5 Released With VKD3D 1.7 Included, WinRT App Dark Theme Phoronix

Wine 8.5 is out to end out the month as the newest bi-weekly development release for enjoying the ability to run Windows games and applications on Linux and other platforms...

08:23

For Europe, This Upcoming German Rocket Can't Arrive Soon Enough SoylentNews

Isar Aerospace recently secured $165 million in funding to gear up for the inaugural launch of its Spectrum rocket:

German company Isar Aerospace has raised $165 million in order to ramp up the development of its Spectrum rocket, which is scheduled for its debut launch later this year. For Europeans needing access to space, the rocket's arrival will come not a moment too soon.

[...] Isar Aerospace has raised a total of $330 million so far, with $75 million raised during its previous round of funding in July 2021. The funds will go towards the development of Isar's Spectrum rocket, a two-stage launch vehicle designed to carry small and medium sized satellites to orbit. According to ISAR, Spectrum should be capable of carrying 2,205 pounds (1,000 kilograms) to low Earth orbit (LEO). By comparison, SpaceX's medium-lift Falcon 9 can hoist 50,265 pounds (22,800 kg) to LEO.

Spectrum's inaugural launch is planned for the second half of 2023. Isar Aerospace is currently running tests on the rocket's Aquila engine, which was developed and manufactured in-house. The company is also finalizing its infrastructure at the launch site in Andya, Norway, which will host Spectrum's debut liftoff.

[...] Europe is desperately in need of its own launch vehicles, whether for small or medium lift, to provide local access to space. Spectrum won't be the most powerful rocket when it debuts, but it'll fill a troublesome gap, especially until Vega-C and Ariane 6 come through.


Original Submission

Read more of this story at SoylentNews.

07:59

New Cylance Ransomware Targets Linux and Windows, Warn Researchers HackRead | Latest Cybersecurity and Hacking News Site

By Waqas

For now, Cylance ransomware is still in its early stages, yet it has already claimed several victims.

This is a post from HackRead.com Read the original post: New Cylance Ransomware Targets Linux and Windows, Warn Researchers

07:58

07:49

07:17

Intel oneDNN 3.1 Further Optimizing For Sapphire Rapids, Starts Tuning For Sierra Forest Phoronix

Intel's oneAPI software engineers are closing out the quarter by library that is used by the likes of PyTorch, Tensorflow, PaddlePaddle, ONNX, OpenVINO, MATLAB's Deep Learning Toolbox, Apache MXNet, and many other applications...

07:16

Hackers are actively exploiting a flaw in the Elementor Pro WordPress plugin Security Affairs

Threat actors are actively exploiting a high-severity flaw in the Elementor Pro WordPress plugin used by more than eleven million websites

WordPress security firm PatchStack warns of a high-severity vulnerability in the Elementor Pro WordPress plugin that is currently being exploited by threat actors in the wild.

Elementor Pro is a paid plugin that is currently installed on over 11 million websites, it allows users to easily create WordPress websites.

This vulnerability was reported on March 18 by security researcher Jerome Bruandet from NinTechNet.

The expert reported that the issue impacts Elementor Pro when it is installed on a site that has WooCommerce activated.

allowing authenticated users, like shop customers or site members, to change the sites settings and can potentially lead to a complete site takeover. 

Elementor Pro, a popular page builder plugin for WordPress, fixed a broken access control vulnerability affecting versions <=3.11.6 that could allow full site takeover. reads the advisory published by Bruanded.

The flaw is broken access control on the plugins WooCommerce module (elementor-pro/modules/woocommerce/module.php), anyone can exploit the issue to change WordPress settings in the database. The flaw is exploited through a vulnerable AJAX action, pro_woocommerce_update_page_option, which is used by Elementors built-in editor.

The issue stems from improper input validation and a lack of capability check to restrict its access to a high privileged user only.

An authenticated attacker can leverage the vulnerability to create an administrator account by enabling registration and setting the default role to administrator, change the administrator email address or, redirect all traffic to an external malicious website by changing siteurl among many other possibilities, wrote Bruandet.

Elementor Plugin bug actively exploited

PatchStack researchers are observing attacks from multiple IP addresses, most of them from the following IP addresses:

  • 193.169.194.63
  • 193.169.195.64
  • 194.135.30.6

The experts are also seeing files being uploaded with the followin...

07:14

Pirate Site Blocking Decreases Internet Traffic, Research Finds TorrentFreak

an old tvIn recent years, website blocking has become one of the most widely-used anti-piracy enforcement mechanisms in the world.

ISPs in several dozen countries prevent subscribers from accessing a variety of pirate sites. While new blocks are added every month, research on the effectiveness of these efforts is rather limited.

Early Piracy Blocking Research

One of the earliest pieces of academic research, based on UK data, showed that the local Pirate Bay blockade had little effect on legal consumption. Instead, pirates turned to alternative pirate sites, proxies, or VPNs to bypass the virtual restrictions.

A follow-up study added more color and brought hope for rightsholders. The research showed that once a large number of sites were blocked in the UK, overall pirate site traffic decreased. At the same time, the researchers observed an increase in traffic to legal services such as Netflix.

These academic studies originated at Carnegie Mellon University. They were conducted independently but the research received sizable gifts from the Motion Picture Association. The movie industry group often cites these results to show that site blocking is effective.

New Blocking Study Adds Nuance

The two blocking papers and their results are founded on quality research, but theyre not without limitations. One shortcoming is that they are based on UK data that may differ from how blocking measures affect piracy and legal consumption in other parts of the world.

A recently released study can partly fill this gap. It was conducted by researchers from the Catolica-Lisbon School of Business and Economics in Portugal, in collaboration with a colleague who, again, is affiliated with Carnegie Mellon University.

Instead of looking at UK data, the researchers analyzed data from a country where a voluntary pirate site blocking scheme was introduced at some point.

The target country isnt mentioned but considering that the researchers are Portuguese, paired with the fact that Portugal is one of the few countries which has a voluntary blocking scheme, we can take an informed guess.

Tracking Internet, TV, and Sp...

07:00

See Satellites in Broad Daylight with This Sky-Mapping Dish Antenna Hackaday

If you look up at the night sky in a dark enough place, with enough patience youre almost sure to see a satellite cross the sky. Its pretty cool to think youre watching light reflect off a hunk of metal zipping around the Earth fast enough to never hit it. Unfortunately, it doesnt work during the daylight hours, and you really only get to see satellites in low orbits.

Thankfully, theres a trick that allows you to see satellites any time of day, even the ones in geosynchronous orbits you just need to look using microwaves. Thats what [Gabe] at [saveitforparts] did with a repurposed portable satellite dish, the kind that people who really dont like being without their satellite TV programming when theyre away from home buy and quickly sell when they realize that toting a satellite dish around is both expensive and embarrassing. They can be had for a song, and contain pretty much everything needed for satellite comms in one package: a small dish on a motorized altazimuth mount, a low-noise block amplifier (LNB), and a single-board computer that exposes a Linux shell.

After figuring out how to command the dish to specific coordinates...

05:49

EuroLinux Desktop 9.1 Released As Easy Windows Workstation Replacement FOSS Force

EuroLinux, the Poland-based company behind the RHEL clone by the same name, has announced the first point release of EuroLinux Desktop, a desktop Linux distribution that was unveiled in September.

The post EuroLinux Desktop 9.1 Released As Easy Windows Workstation Replacement appeared first on FOSS Force.

05:37

Italy Moves to Ban Lab-grown Meat to Protect Food Heritage SoylentNews

Food safety authorities in the US and Singapore have already approved synthetic meat and the EU is also expected to:

Italy's right-wing government has backed a bill that would ban laboratory-produced meat and other synthetic foods, highlighting Italian food heritage and health protection.

If the proposals go through, breaking the ban would attract fines of up to 60,000 (53,000).

Francesco Lollobrigida, who runs the rebranded ministry for agriculture and food sovereignty, spoke of the importance of Italy's food tradition.

The farmers' lobby praised the move.

But it was a blow for some animal welfare groups, which have highlighted lab-made meat as a solution to issues including protecting the environment from carbon emissions and food safety.

[...] The proposals, approved by ministers on Tuesday, seek to ban synthetic foods produced from animal cells without killing the animal, and would apply to lab-produced fish and synthetic milk too.


Original Submission

Read more of this story at SoylentNews.

05:35

German Police Raid DDoS-Friendly Host FlyHosting Krebs on Security

Authorities in Germany this week seized Internet servers that powered FlyHosting, a dark web offering that catered to cybercriminals operating DDoS-for-hire services, KrebsOnSecurity has learned. FlyHosting first advertised on cybercrime forums in November 2022, saying it was a Germany-based hosting firm that was open for business to anyone looking for a reliable place to host malware, botnet controllers, or DDoS-for-hire infrastructure.

A seizure notice left on the FlyHosting domains.

A statement released today by the German Federal Criminal Police Office says they served eight search warrants on March 30, and identified five individuals aged 16-24 suspected of operating an internet service since mid-2021. The German authorities did not name the suspects or the Internet service in question.

Previously unknown perpetrators used the Internet service provided by the suspects in particular for so-called DDoS attacks, i.e. the simultaneous sending of a large number of data packets via the Internet for the purpose of disrupting other data processing systems, the statement reads.

News of a raid on FlyHosting first surfaced Thursday in a Telegram chat channel that is frequented by people interested or involved in the DDoS-for-hire industry, where a user by the name Dstatcc broke the news to FlyHosting customers:

So Flyhosting made a migration with it[s] systems to new rooms of the police ;), the warning read. Police says: They support ddos attacks, C&C/C2 and stresser a bit too much. We expect the police will take a deeper look into the files, payment logs and IPs. If you had a server from them and they could find bad things connected with you (payed with private paypal) you may ask a lawyer.

...

05:33

05:30

Move Aside Yoda, its Furbys Turn On Lukes Back Hackaday

When you want a backpack that turns heads and gets people talking, you can get ahead of the conversation with a talking backpack. [Nina] created a rucksack with the legendary babbler itself, the infamous Furby.

Believe it or not, no actual Furbies were sacrificed in the making of this backpack. The build uses an Arduino Nano, two servos, and a DFPlayer Mini for audio. A 3D printed faceplate is used for the iconic eyes and face. The code is fairly simple, waiting for a random delay and then triggering one of four effects. It can play a sound or blink and does its best to move the mouth while the sound is playing thanks to the handy busy line coming off the sound module. A unicorn childrens backpack offered a furry shell to stuff the electronics inside. A custom PCB makes the whole thing just a little neater internally.

Perhaps next [Nina] can integrate voice recognition so that the backpack can answer simple questions like...

05:19

WHO Now Says COVID Vaccines Not Recommended For Healthy Kids & Teens cryptogon.com

After forcing it on millions Via: Summit News: Yet another leading health institution has unveiled a significant Covid policy reversal this week this time its none other than the World Health Organization (WHO) saying something that might have gotten an individual suspended from social media or publicly canceled a mere one or two years ago. []

04:15

Ukraine Busts Gang for Massive $4.3 Million Phishing Scams HackRead | Latest Cybersecurity and Hacking News Site

By Habiba Rashid

The Ukrainian Cyber Police carried out 30 searches and managed to seize computer equipment, mobile phones, SIM cards, and other equipment.

This is a post from HackRead.com Read the original post: Ukraine Busts Gang for Massive $4.3 Million Phishing Scams

04:00

Why A Community Hackerspace Should Be A Vital Part Of Being An Engineering Student Hackaday

Travelling the continents hackerspaces over the years, I have visited quite a few spaces located in university towns. They share a depressingly common theme, of a community hackerspace full of former students who are now technology professionals, sharing a city with a university anxious to own all the things in the technology space and actively sabotaging the things they dont own. Ive seen spaces made homeless by university expansion, Ive seen universities purposefully align their own events to clash with a hackerspace open night and discourage students from joining, and in one particularly egregious instance, Ive even seen a university take legal action against a space because they used the name of the city, also that of the university, in the name of their hackerspace. I will not mince my words here; while the former are sharp practices, the latter is truly disgusting behaviour.

The above is probably a natural extension of the relationship many universities have with their cities, which seems depressingly often to be one of othering and exclusion. Yet in the case of hackerspaces I cant escape the conclusion that a huge opportunity is being missed for universities to connect engineering and other tech-inclined students...

03:52

Video Friday: Grain Weevil IEEE Spectrum



Video Friday is your weekly selection of awesome robotics videos, collected by your friends at IEEE Spectrum robotics. We also post a weekly calendar of upcoming robotics events for the next few months. Please send us your events for inclusion.

Robotics Summit & Expo: 1011 May 2023, BOSTON
ICRA 2023: 29 May2 June 2023, LONDON
RoboCup 2023: 410 July 2023, BORDEAUX, FRANCE
RSS 2023: 1014 July 2023, DAEGU, KOREA
IEEE RO-MAN 2023: 2831 August 2023, BUSAN, KOREA
CLAWAR 2023: 24 October 2023, FLORIANOPOLIS, BRAZIL
Humanoids 2023: 1214 December 2023, AUSTIN, TEXAS, USA

Enjoy todays videos!

This is the Grain Weevil, and its designed to keep humans out of grain bins. I love this because its an excellent example of how to solve a real, valuable problem uniquely with a relatively simple, focused robot.

[ Grain Weevil ]

As the city of Paris sleeps, Spot is hard at work inspecting some of RATP Groups 35,000 civil works components. The RATP Group (Autonomous Parisian Transportation Administration), is a French state-owned public transport operator and maintainer for the Greater Paris area. With thousands of civil works to inspect each year, the company has turned to mobile robotics to inspect hard-to-reach and hazardous areas in order to keep employees out of harms way.

...

03:43

nrcisztikus vagyok? Hogyan mondhatjuk el h+ Media

nrcisztikus vagyok? Hogyan mondhatjuk el

nrcizmus lerja a szemlyisgjegyeket, mint pldul a hisg s az ngazdlkods. A nrcisztikus szemlyisgzavar mentlis egszsgi llapot, olyan tulajdonsgokkal, amelyek magukban foglalhatjk a tlzott figyelmet, az nfontossg felfjt rzst s az emptia hinyt.

Valaki, aki nrcisztikus, tlsgosan foglalkozhat a megjelenssel, vagy kevs id van arra, hogy msokra sszpontostson.

Ez azonban nem felttlenl jele annak, hogy valakinek nrcisztikus szemlyisgzavar (NPD) van. Brki viselkedhet nkzpont mdon az let klnbz pontjain.

Az NPD -vel rendelkez embereknek nehznek nem koncentrlni magukra, s nem ismeri fel, hogy ezt megteszik. Az NPD egy hossz tv llapot, amely jelentsen befolysolja az ember kapcsolatait s az rzelmi mkdst.

Ebben a cikkben megvizsgljuk, mi az NPD, az NPD jelei, s hogy ez hogyan befolysolja a kapcsolatokat.

Azt is megvitatjuk, hogy a nrcisztikus emberek megvltozhatnak -e, s hogyan tudjk ezt megtenni.

Mi a nrcisztikus szemlyisgzavar?

Az American Psychiatric Association (APA) szerint az NPD egy olyan szemlyisgzavar, amely csodlatra s msok irnti emptia hinyra.

Az NPD-ben szenved embereknek nagymrtkben nfontossg rzse s jogosultsg rzse lehet. Gyakran hinyzik az emptia, s kevs rdekldsk lehet a msokkal val intim kapcsolatok kialaktsa irnt.

Mg az NPD-vel rendelkez szemlyek tl magabiztosnak tnhetnek, gyakran alacsony nrtkelsk van. Attl fggen, hogy milyen slyos a rendellenessgk, rosszul reaglhatnak, amikor egy szemly vagy esemny megkrdjelezi a flnyrzetket.

Egy rgebbi 2008 -as tanulmny a Journal of Clinical Psychiatry becslse szerint az emberek 6,2% -a l az NPD -ben letk valamikor. Az arny magasabb a frfiak krben (7,7%), mint a nstnyek (4,8%).

A tanulmny azt is jelentette, hogy az NPD szignifiknsan elterjedtebb:

  • Fekete felnttek
  • spanyol nstnyek
  • Fiatalabb felnttek
  • Azok, akik elvlasztottak, elvltak vagy zvegyek
  • felnttek, akik soha nem hzasodnak meg Az NPD szles kr s eltr mdon jelenik meg, az egyes esetek slyossgtl fggen.

    Az NPD-vel rendelkez emberek lehetnek:

    • nbizonyt vagy nelgltsg
    • extrovertlt vagy trsadalmilag elszigetelten vagy munkanlkliek
    • A polgrok vagy antiszocilis tevkenysgekben rszt vev emberek modelljei

    Ezrt nehz lehet felismerni az NPD -vel rendelkez szemlyt. A mentlis rendellenessgek diagnosztikai s statisztikai kziknyvnek (DSM-5) tdik kiadsa azonban a kvetkez tneteket tartalmazza:

    1. Az nfontossg tlzott rzse

    Grandiose-val rendelkezik. Az nfontossg rzse az NPD meghatroz jellemzje. Az NPD -ben szenved embereknek rzse van a tbbiekkel szemben.

    Nem...

03:42

Re: CVE-2023-29132: Irssi SA-2023-03 / Use after free in printing routine Open Source Security

Posted by Ailin Nemui on Mar 31

CVE-2023-29132 was assigned

03:02

A quarter century of Mozilla LWN.net

The Mozilla project celebrates 25 years of existence.

A lot has changed since 1998. Mozilla is no longer just a bold idea. Were a family of organizations a nonprofit, a public benefit-corporation, and others that builds products, fuels movements, and invests in responsible tech.

And were no longer a small group of engineers in Netscapes Mountain View office. Were technologists, researchers, and activists located around the globe not to mention tens of thousands of volunteers.

But if a Mozillian from 1998 stepped into a Mozilla office (or joined a Mozilla video call) in 2023, I think theyd quickly feel something recognizable. A familiar spirit, and a familiar set of values.

03:01

Do advanced Linux disk usage diagnostics with this sysadmin tool Linux.com

Use topdiskconsumer to address disk space issues when youre unable to interrupt production.

Read More at Enable Sysadmin

The post Do advanced Linux disk usage diagnostics with this sysadmin tool appeared first on Linux.com.

03:00

Hackaday Podcast 212: Staring Through ICs, Reading Bloom Filters, and Repairing, Reworking, and Reballing Hackaday

It was quite the cornucopia of goodness this week as Elliot and Dan sat down to hash over the week in hardware hacking. We started with the exciting news that the Hackaday Prize is back already? for the tenth year running! The first round, Re-Engineering Education, is underway now, and were already seeing some cool entries come in. The Prize was announced at Hackday Berlin, about which Elliot waxed a bit too. Speaking of wax, if youre looking to waterproof your circuits, thats just one of many coatings you might try. If youre diagnosing a problem with a chip, a cheap camera can give your microscope IR vision. Then again, you might just use your Mark I peepers to decode a ROM. Is your FDM filament on the wrong spool? Weve got an all-mechanical solution for that. Well talk about tools of the camera operators trade, the right to repair in Europe, Korean-style toasty toes, BGA basics, and learn just what the heck a bloom filter is or is it a Bloom filter?

Check out the links below if you want to follow along, and as always, tell us what you think about this episode in the comments!

...

03:00

Panfrost Driver For Linux 6.4 Adds Speed Binning, New MediaTek SoCs Phoronix

The Panfrost DRM driver providing open-source kernel graphics driver support for modern Arm Mali graphics in various SoCs is seeing some new hardware support for the upcoming Linux 6.4 cycle as well as now supporting speed binning functionality...

02:51

Bent Light in Deep Space Reveals One of the Biggest Black Holes Ever Detected SoylentNews

A rare 'ultramassive' black hole, 30 billion times the mass of the Sun, is lurking in the cosmos:

Holy smokes. A group of astronomers have found a black hole containing (checks notes) 30 billion times the mass of our Sun. That's more than seven thousand times the size of the supermassive black hole at the center of the Milky Way.

The team used gravitational lensing to see the black hole. In this natural phenomenon, massive objects' gravitational fields bend photons of light magnifying and warping themmaking it possible to see object that would otherwise be hidden or too faint. Last year, a team spotted the oldest known star in an arc of gravitationally lensed light.

According to a Durham University release, the newly detected black hole is the first ever found using gravitational lensing. A paper about the discovery is published today in the Monthly Notices of the Royal Astronomical Society.

[...] The team identified the black hole by modeling the different pathways light might take through the universe, depending on the presence of black holes of varying mass. They then compared the computer data with images of the cosmos taken by the Hubble Space Telescope. Lo and behold, they found a match.

[...] "Gravitational lensing makes it possible to study inactive black holes, something not currently possible in distant galaxies," Nightingale added. "This approach could let us detect many more black holes beyond our local universe and reveal how these exotic objects evolved further back in cosmic time."

A brief video explaining the process

Journal Reference:
James. W. Nightingale, Russell J. Smith, Qiuhan He, et al., Abell 1201: Detection of an Ultramassive Black Hole in a Strong Gravitational Lens, arXiv:2303.15514 [astro-ph.GA], https://doi.org/10.48550/arXiv.2303.15514


Original Submission

Read more of this story at SoylentNews.

02:46

Paillier's additively homomorphic cryptosystem David Wong | Cryptologie | HTML

Pascal Paillier released his asymmetric encryption algorithm in 1999, which had the particularity of being homomorphic for the addition. (And unlike RSA, the homomorphism was secure.)

Homomorphic encryption, if you haven't heard of it, is the ability to operate on the ciphertext without having to decrypt it. If that still doesn't ring a bell, check my old blogpost on the subject. In this post I will just explain the intuition behind the scheme, for a less formal overview check Lange's excellent video.

Paillier's scheme is only homomorphic for the addition, which is still useful enough that it's been used in different kind of cryptographic protocols. For example, cryptdb was using it to allow some types of updates on encrypted database rows. More recently, threshold signature schemes have been using Paillier's scheme as well.

The actual algorithm

As with any asymmetric encryption scheme, you have the good ol' key gen, encryption, and decryption algorithms:

Key generation. Same as with RSA, you end up with a public modulus $N = pq$ where $p$ and $q$ are two large primes.

Encryption. This is where it gets weird, encryption looks more like a Pedersen commitment (which does not allow decryption). To encrypt, sample a random $r$ and produce the ciphertext as:

$$(N+1)^m \cdot r^N \mod{N^2}$$

where $m$ is the message to be encrypted. My thought at this point was "WOOT. A message in the exponent? How will we decrypt?"

Decryption. Retrieve the message from the ciphertext $c$ as

$$\frac{c^{\varphi(N)} -1}{N} \cdot \varphi(N)^{-1} \mod{N^2}$$

Wait, what? How is this recovering the message which is currently the discrete logarithm of $(N+1)^m$?

How decryption works

The trick is in expanding this exponentiation (using the Binomial expansion).

The relevant variant of the Binomial formula is the following:

$$(1+x)^n = \binom{n}{0}x^0 + \binom{n}{1}x^1 + \cdots + \binom{n}{n} x^n$$

where $\binom{a}{b} = \frac{a!}{b!(a-b)!}$

So in our case, if we only look at $(N+1)^m$ we have:

$$ \begin{align} (N+1)^m &= \binom{m}{0} + \binom{m}{1} N + \binom{m}{2} N^2 + \cdots + \binom{m}{m} N^m \\ &= \binom{m}{0} + \binom{m}{1} N \mod{N^2}\\ &= 1 + m \cdot N \mod{N^2} \end{align} $$

Tada! Our message is now back in plain sight, extracted...

02:30

GaN Charger Teardown Reveals Value Of This New Technology Hackaday

Every so often, a new technology comes along that offers a broad range of benefits over what we already have. Just as lithium-ion batteries have made nickel-cadmium cells boring and old hat, gallium nitride semiconductors are making silicon parts look unimpressive by comparison. [Brian Dipert] looked at what this means in a practical sense by tearing down a GaN phone charger.

The charger in question is a 30 watt USB-C charger produced by Voltme. It cost [Brian] just $10, as prices of GaN hardware have come down significantly as economies of scale have kicked in. The charger measures just 1.21.31.2 inches, and weighs only 1.5 ounces. That compact size is thanks to GaN semiconductors, which are able to run cooler at higher power levels than their silicon forebearers.

Cracking into the charger required levering open the case. The back panel came off with some work, revealing the mains terminals, which deliver AC power to the PCB inside via the case holding them in contact. Interestingly, the entire circuit inside is filled with an adhesive thermal goop, which helps pass heat from the hottest components...

02:22

Supply chain cyberattack with possible links to North Korea could have thousands of victims globally Lifeboat News: The Blog

Hackers modified an enterprise communication companys installation software in an attack that could steal credentials and other information from companies around the world, according to an analysis published Wednesday.

Researchers with cybersecurity firm SentinelOnes SentinelLabs team traced illicit activity flagged by its detection systems back to the installation software from a company called 3CX, which according to its website provides video conferencing and online communication products to companies such as Toyota, McDonalds, Pepsi and Chevron. In total, the company says it serves some 12 million customers globally.

This sort of large-scale attack that takes advantage of a companys supply chain similar to how attackers leveraged a flaw within a SolarWinds product update to install backdoors inside its customers networks can be difficult to defend against and could lead to devastating consequences for victims. Its also the kind of operation that is typically associated with a nation-state hacking group.

02:08

BSD Release: MidnightBSD 3.0.0 DistroWatch.com: News

MidnightBSD is a desktop-oriented operating system derived from FreeBSD. The project's latest stable release is MidnightBSD 3.0.0 which is available in i386 and x86_64 builds. With this leap in changes. "There are known issues with the Firefox,....

02:00

The Staggering Scale of the EV Transition IEEE Spectrum



Over the last 20 or so years, contributing editor Robert N. Bob Charette has written about some of the thorniest issues facing the planet at large and engineers in particular. For IEEE Spectrum, hes dug into software reliability and maintenance, the so-called STEM crisis, and the automation paradox, examining those complex topics through the eyes of a seasoned risk analyst who has consulted for governments and corporations for five decades.

Ive been fortunate to be Bobs editor for many of his ambitious projects. We often converse on Friday afternoons about what hes hearing from industry insiders and academics on whatever subject hes currently investigating. Our conversations are jovial, sometimes alarming, and always edifying, at least for me.

So when he called me on a Friday afternoon in the summer of 2021 to propose an article delving into the complexities of the global transition to electric vehicles, I knew that hed do the research at a deeper level than any tech journalist, and that hed explore angles that wouldnt even occur to them.

Take power-grid transformers. These essential voltage-converting components are designed to cool down at night, when power consumption is typically low. But with more people charging their EVs at home at night, the 30-year design life of a transformer will dropto perhaps no more than three years once mass adoption of EVs takes hold. Transformers can cost more than US $20,000 each, and theyre already in short supply in many countries. Bob examined factors like that and dozens of others during the last year and a half.

Throughout his research and reporting, Bob focused on the EV transition at scale: What needs to happen in order for electric vehicles to displace internal-combustion-engine vehicles and have a measurable impact on climate change by midcentury? Quite a lot, it turns out. Humans must change two foundational sectors of modern civilizationenergy and transportationto achieve the targeted reductions in greenhouse gas emissions. These simultaneous global overhauls will involve trillions of dollars in investments, tens of millions of workers, millions of new EVs, tens of thousands of kilometers of new transmission...

01:49

[$] An operation for filesystem tucking LWN.net

As a general rule, the purpose behind mounting a filesystem is to make that filesystem's contents visible to the system, or at least to the mount namespace where that mount occurs. For similar reasons, it is unusual to mount one filesystem on top of another, since that would cause the contents of the over-mounted filesystem to be hidden. There are exceptions to everything, though, and that extends to mounted filesystems; a "tucking" mechanism proposed by Christian Brauner is designed to hide mounted filesystems underneath other mounts temporarily, at least.

01:43

CISA Warns of Vulnerabilities in Propump and Controls Osprey Pump Controller HackRead | Latest Cybersecurity and Hacking News Site

By Habiba Rashid

CISA's advisory came after the Macedonian cybersecurity firm Zero Science Lab discovered and reported the vulnerabilities to authorities.

This is a post from HackRead.com Read the original post: CISA Warns of Vulnerabilities in Propump and Controls Osprey Pump Controller

01:40

Security updates for Friday LWN.net

Security updates have been issued by Debian (joblib, json-smart, libmicrohttpd, and xrdp), Fedora (thunderbird and xorg-x11-server-Xwayland), Mageia (dino, perl-Cpanel-JSON-XS, perl-Net-Server, snort, tigervnc/x11-server, and xapian), SUSE (curl, kernel, openssl-1_0_0, and shim), and Ubuntu (glusterfs, linux-gcp-4.15, musl, and xcftools).

01:07

Winter Vivern APT Targets European Government Entities with Zimbra Vulnerability The Hacker News

The advanced persistent threat (APT) actor known as Winter Vivern is now targeting officials in Europe and the U.S. as part of an ongoing cyber espionage campaign. "TA473 since at least February 2023 has continuously leveraged an unpatched Zimbra vulnerability in publicly facing webmail portals that allows them to gain access to the email mailboxes of government entities in Europe," Proofpoint

01:00

This Week in Security: Macstealer, 3CX Carnage, and Githubs Lost Key Hackaday

Theres a naming overload here, as two bits of security news this week are using the MacStealer moniker. Were first going to talk about the WiFi vulnerability, also known as Framing Frames (pdf). The WPA encryption schemes introduced pairwise encryption, ensuring that not even other authenticated users can sniff each others traffic. At least thats the idea, but this attack finds a couple techniques to bypass that protection.

A bit more background, there are a couple ways that packets can be delayed at the sender side. One of those is the power-save message, that signals the access point that the given client is going into a low power state. Hold my calls, Im going to sleep. That message is a single bit in a frame header. And notably, that bit isnt covered by WPA encryption or verification. An attacker can send a message, spoof a victims MAC address, and the access point marks that client as being in power-save mode.

This observation leads to a question: What happens when the encryption details change between the packet joining the queue, and actually transmitting? Turns out, the specifications on WiFi encryption dont spell it out, and some implementations do the last thing youd want, like sending the packets in t...

00:39

Distribution Release: Linux Lite 6.4 DistroWatch.com: News

Linux Lite is a beginner-friendly Linux distribution based on Ubuntu's long-term support (LTS) release and featuring the Xfce desktop. The project has published an update to its 6.x series which improves packaging compression for custom software, offer a new reporting tool to diagnose problems, and updates the layout....

00:37

Cyber Police of Ukraine arrested members of a gang that defrauded EU citizens of $4.33M Security Affairs

The Cyber Police of Ukraine, with law enforcement officials from Czechia, has arrested several members of a gang responsible for $4.33 million scam.

The Cyber Police of Ukraine, with the support of law enforcement officials from the Czech Republic, has arrested several members of a cybercriminal ring that defrauded EU citizens of $4.33 million with phishing campaigns.

The suspects set up more than 100 phishing websites to obtain the bank card data and banking account credentials of foreign citizens. 

The members of the international criminal group were exposed by the employees of the Cyber Police Department together with the Main Investigation Department of the National Police and in cooperation with law enforcement officers of the Czech Republic. reads the press release published by the Cyber Police of Ukraine. Some of the people involved, who live in Ukraine, created more than 100 phishing sites aimed at European users. Various products were offered on web resources at below-market prices. Bank card data, which customers indicated on phishing resources to pay for orders, automatically became known to attackers. Later, they appropriated money from their accounts. 

The cybercrime organization also created two call centers, in Vinnytsia and in Lviv, as part of the fraudulent scheme. Operators at the call centers attempted to trick customers into making purchases.

The websites were offering heavily discounted products to lure visitors placing orders. The bad news for the users was that the operators behind the websites were only interested in gathering financial information provided by the visitors while making fake purchases.

Cyber Police of Ukraine

The authorities identified more than 1,000 victims from multiple countries, includi...

00:26

Hack the Pentagon website promotes the benefits of bug bounties to US Military Graham Cluley

My guess is that if you stumbled across a website that called itself "Hack the Pentagon" and was decorated with a grisly-looking skull, you would probably think that you might be somewhere less than legitimate. After all, normally if you hacked The Pentagon you would find yourself in heaps of trouble. Read more in my article on the Hot for Security blog.

00:04

Netflix Might Bring its Games to TVs in Effort to Get People to Actually Play Them SoylentNews

Netflix has been releasing mobile video games since 2021, but this would be the company's first attempt at TV-based video games:

Higher quality TV and movies? No. A standard of not cancelling shows after a single season? Nah. Mobile games on your TV? Yup. That appears to be Netflix's plan after a developer found some hidden code while digging through the platform. The company's actually been offering games on mobile since 2021, but given paltry player numbers, the effort to bring them to TVs, where most subscribers actually use Netflix, might be the best way to remind people that they're even there.

App developer Steve Moserwho shared his findings with Bloombergfound some sneaky lines of code during some digging into Netflix's back end. One line of the code allegedly read "A game on your TV needs a controller to play. Do you want to use this phone as a game controller?," indicating that a user's smartphone would serve as the controller for a game hosted on Netflix's interface.

Currently, Netflix's gaming service is relegated to mobile, and while there's critically acclaimed titles like Teenage Mutant Ninja Turtles: Shredder's Revenge and Immortality in there, you can only get at them either by stumbling on Netflix's games on your phone's app store or through a single row in the Netflix app. As such, it's easy to miss out on this side of Netflix entirely. According to recent data, only one percent of subscribers are playing games on Netflix.

Read more of this story at SoylentNews.

00:01

; h+ Media

;

, . , - .

.

, (NPD). .

NPD . NPD .

, NPD, NPD .

.

;

(APA), NPD .

NPD - . .

NPD , . , .

2008 6,2% NPD . (7,7%) (4,8%).

NPD :

  • /li>

  • ,

NPD , .

NPD :

, NPD. , ...

Go Back:30 Days | 7 Days | 2 Days | 1 Day

IndyWatch Science and Technology News Feed Today.

Go Forward:1 Day | 2 Days | 7 Days | 30 Days

Friday, 31 March

23:58

Vulkan 1.3.246 Released With VK_EXT_shader_object Phoronix

Vulkan 1.3.246 has been published with one prominent new extension introduced that was started by Nintendo and worked on by several other hardware/software vendors...

23:30

Google Posts KVM-CPUFreq Driver To Dramatically Boost VM Performance, Power Efficiency Phoronix

Google engineers on Thursday posted initial "request for comments" patches on their KVM-CPUFreq driver that is part of their effort to improve the dynamic voltage and frequency scaling behavior and task placement within KVM-based virtual machines. This effort is leading to big improvements in raw performance and performance-per-Watt for tasks running within Linux VMs...

23:12

Re: polkitd service user privilege separation Open Source Security

Posted by Johannes Segitz on Mar 31

It adds an additional step an attacker needs to take before having root
privileges. Also it is not just about security, it also helps to limit the
impact of non-security bugs. So I would keep the service user, but add
clear language that explains that this isn't a meaningful security boundary
and that this account needs to be considered to have root privileges.

Johannes

23:10

CVE-2023-26269: Apache James server: Privilege escalation through unauthenticated JMX Open Source Security

Posted by Benoit Tellier on Mar 31

Severity: moderate

Description:

management service without authentication by default. This
allows privilege escalation by a
malicious local user.

Administrators are advised to disable JMX, or set up a JMX password.

Work Arounds:

automatically for Guice users.

Credit:

Matei "Mal" Badanoiu (reporter)

References:...

23:07

Re: Re: sox: patches for old vulnerabilities Open Source Security

Posted by Steffen Nurpmeso on Mar 31

Hello Nam.

Nam Nguyen wrote in
<87bkk9hljn.fsf@n.m>:
|Steffen Nurpmeso writes:
|> Steffen Nurpmeso wrote in
|> <20230314201652.RlbWr%steffen () sdaoden eu>:
|> ...
|>||Helmut Grohne wrote in
|>|| <20230314110138.GA1192267 () subdivi de>:
|>|||On Fri, Feb 03, 2023 at 09:44:47PM +0100, Helmut Grohne wrote:
|>|||> * CVE-2021-33844
|>|||
|>|||The original fix for this issue would cause a...

23:05

Re: Re: sox: patches for old vulnerabilities Open Source Security

Posted by Nam Nguyen on Mar 31

Steffen Nurpmeso writes:

I propose keeping that check in order to fix the regression of not
opening wav gsm files.

Steffn Nurpmeso's patch with tweaks can be found inline at the end of
this email. This patch retains the line 654 hunk and adds line 961 hunk
to avoid dividing by 0 for wav gsm files. wav->numSamples is calculated

Feedback is welcome as I am not familiar with the code base....

23:01

Cyber Police of Ukraine Busted Phishing Gang Responsible for $4.33 Million Scam The Hacker News

The Cyber Police of Ukraine, in collaboration with law enforcement officials from Czechia, has arrested several members of a cybercriminal gang that set up phishing sites to target European users. Two of the apprehended affiliates are believed to be organizers, with 10 others detained in other territories across the European Union. The suspects are alleged to have created more than 100 phishing

22:47

Deep Dive Into 6 Key Steps to Accelerate Your Incident Response The Hacker News

Organizations rely on Incident response to ensure they are immediately aware of security incidents, allowing for quick action to minimize damage. They also aim to avoid follow on attacks or future related incidents. The SANS Institute provides research and education on information security. In the upcoming webinar, well outline, in detail, six components of a SANS incident response plan,

22:22

Microsoft lays off entire AI ethics team while going all out on ChatGPT Lifeboat News: The Blog

A new report indicates Microsoft will expand AI products, but axe the people who make them ethical.

22:22

Scientists use rocket to create artificial Northern Lights to better understand space weather Lifeboat News: The Blog

Aurora Borealis can cause damage to satellites in severe solar storms. Scientists are experimenting to understand near-space weather better.

22:00

Sound Open Firmware 2.5 Released - Continues Adoption Of Zephyr, Adds MediaTek MT8188 Phoronix

Sound Open Firmware "SOF" 2.5 has been released as this open-source sound/DSP firmware initiative that was originally started by Intel but now is a Linux Foundation project and seeing hardware support from multiple vendors...

22:00

Archiving the Entirety of DPReview Before Its Gone Hackaday

Despite the popular adage about everything on the internet being there forever, every day pages of information and sometimes entire websites are lost to the sands of time. With the imminent shutdown of the DPReview website, nearly 25 years of reviews and specifications of cameras and related content are at risk of vanishing. Also lost will be the content of forum posts, which can still be requested from DPReview staff until April 6th. All because the owner of the site, Amazon, is looking to cut costs.

As announced on r/photography, the Archive.org team is busy trying to download as much of the site as possible, but due to bottlenecks may not finish in time. One way around these bottlenecks is what is called the Archive Team Warrior, which involves either a virtual machine or Docker image that runs on distributed systems. In early April an archiving run using these distributed systems is planned, in a last-ditch attempt to re...

21:46

Bloomberg Launches Open-Source Funding Initiative Phoronix

The Bloomberg financial, software, and media company has announced their FOSS Fund as a small step for helping open-source projects they rely on and of interest to their employees...

21:27

Fedora 39 Planning For RPM 4.19 - Adds x86-64 v2/v3/v4 Feature Levels Phoronix

With the Fedora 39 release later this year the developers are packaging format...

21:23

Scientists Just Learned Something New About How Aspirin Works SoylentNews

New research into aspirin might one day lead to safer painkillers or even new cancer treatments:

We still have more to learn about one of the world's oldest drugs: aspirin. In research out this week, researchers say they've uncovered more about how the drug reduces inflammation. The findings might pave the way toward creating similar but safer treatments for inflammation and possibly even cancer, according to the team.

Also known as acetylsalicylic acid, aspirin was first synthesized around the turn of the 20th century, though a precursor to itderived from willow plantshas been used by humans for thousands of years. It's a type of nonsteroidal anti-inflammatory drug (NSAID), and, like other NSAIDs, it can treat fever, inflammation, and pain. It also has a unique blood-thinning effect.

Aspirin remains one of the most widely used medications in the world, both as a short-term option for various ailments and as a preventative treatment for people at high risk of cardiovascular disease. But it's not without side effectsnamely an increased risk of gastrointestinal bleeding. Last year, U.S. experts even stopped recommending a daily dose of baby aspirin for older adults without a history of heart attack or stroke, citing evidence that any modest benefits for the typical person would be outweighed by the known risks.

[...] Aspirin is known to inhibit enzymes called cyclooxygenase, or COX. These enzymes play a vital role in producing other chemicals that cause inflammation. The researchers say they discovered several ways that aspirin influences this process, from controlling transcription factors that allow the expression of cytokines (proteins involved in inflammation and our immune response) to slowing the breakdown of the amino acid tryptophan, another important player in inflammation. It also seems to accomplish the latter by inhibiting the production of indoleamine dioxygenases (IDOs), particularly IDO1, during the inflammatory process.

Read more of this story at SoylentNews.

20:58

Ubuntu 23.04 Beta Released - Powered By Linux 6.2, GNOME 44 & Other Updates Phoronix

The beta of Ubuntu 23.04 "Lunar Lobster" and its various spins/flavors were released overnight for testing...

20:52

Russian APT group Winter Vivern targets email portals of NATO and diplomats Security Affairs

Russian hacking group Winter Vivern has been actively exploiting Zimbra flaws to steal the emails of NATO and diplomats.

A Russian hacking group, tracked Winter Vivern (aka TA473), has been actively exploiting vulnerabilities (CVE-2022-27926) in unpatched Zimbra instances to gain access to the emails of NATO officials, governments, military personnel, and diplomats.

The CVE-2022-27926 flaw affects Zimbra Collaboration versions 9.0.0, which is used to host publicly facing webmail portals.

The attacker can also use the compromised accounts to carry out lateral phishing attacks and further infiltrate the target organizations

TA473 targeted US elected officials and staffers since at least February 2023. The threat actors created bespoke JavaScript payloads designed for each government targets webmail portal.

TA473s cyber operations align with the support of Russian and/or Belarussian geopolitical goals.

Researchers have observed TA473, a newly minted advanced persistent threat (APT) actor tracked by Proofpoint, exploiting Zimbra vulnerability CVE-2022-27926 to abuse publicly facing Zimbra hosted webmail portals. The goal of this activity is assessed to be gaining access to the emails of military, government, and diplomatic organizations across Europe involved in the Russia Ukrainian War. reads the post published by Proofpoint.

The JavaScript payloads were designed to conduct Cross Site Request Forgery attacks and steal usernames, passwords, and store active session and CSRF tokens from cookies facilitating the login to publicly facing target webmail portals.

These payloads allow actors to steal usernames, passwords, and store active session and CSRF tokens from cookies allowing the login to publicly facing vulnerable webmail portals belonging to target organizations.

The APT group uses scanning tools like Acunetix to identify unpatched webmail platforms used by target organizations.

The threat actors send phishing email from a compromised address, which is spoofed to appear as someone relevant to their organization.

Once the attackers identified the vulnerable platform, they deliver phishing emails containing malicious URLs that abuse known vulnerability to execute JavaScript payloads within the victims webmail portals. 

...

20:49

How 2023 (When They Tell Us Pandemic is Over) Compares to 1999-2018 Death Rates schestowitz.com

tl;dr We are not back to normal, the new normal is a lot of death.

Here is the chart (notice the death levels on the right compared to the left, before and after pandemic)

The new normal in 2023

Source data: original PDF from this page; it is compared to numbers from 2023 and 2022

20:37

3CX Supply Chain Attack Here's What We Know So Far The Hacker News

Enterprise communications software maker 3CX on Thursday confirmed that multiple versions of its desktop app for Windows and macOS are affected by a supply chain attack. The version numbers include 18.12.407 and 18.12.416 for Windows and 18.11.1213, 18.12.402, 18.12.407, and 18.12.416 for macOS. The issue has been assigned the CVE identifier CVE-2023-29059. The company said it's engaging the

20:25

Dune Space Folding [HD] Lifeboat News: The Blog

Dune Scene Stars: Kyle MacLachlan, Francesca Annis, Jrgen Prochnow, Silvana Mangano Director: David Lynch Writers: Frank Herbert, David Lynch Producer: Raffaella De Laurentiis Music: TOTO Production: Dino De Laurentiis Company, Estudios Churubusco Azteca S.A. Distributon: Universal Pictures Released: 1984

watch Dune https://play.google.com/store/movies/details/Dune?id=BB5433C0E07FCF5BMV

watch more Dune Movie Clips https://www.youtube.com/playlist?list=PLlv9mHE-UZgiplosau3azMHpKSbA1Imqz.

watch the Dune Movie Trailer https://www.youtube.com/watch?v=vqi7HxWNaF8&list=PLlv9mHE-UZ6ovmsoI28g.

watch Dune Special Features https://www.youtube.com/playlist?list=PLlv9mHE-UZghdiTb721OAsB-678qx946l.

listen to the Dune Original Score https://www.youtube.com/watch?v=xJBZU3USZ2E&list=PLlv9mHE-UZ4_Y-jBfB7y.

19:54

Canadian ISPs Blocked Pirate IPTV & Logged Customer IP Addresses TorrentFreak

iptvWhen the first pirate site blocking applications began to gather momentum in Europe, those concerned about where it all might lead spoke of slippery slopes and thin ends of wedges.

More than 15 years later, judges in dozens of countries have not only approved blocking injunctions that target static sites but are also happy to hand down flexible orders designed to rapidly counter new domains, proxies, and mirrors.

When pirate IPTV services hit the mainstream less than 10 years ago, the legal and technical challenges of blocking content quickly were considerable. But by carefully tapping in the wedge, showing patience, and not asking for too much at the wrong time, rightsholders can now block pirate IPTV services while judges are tucked up in bed.

Canadas Blocking Fast Track

Canadas Federal Court approved the countrys first IPTV blocking order in 2018, and the Federal Court of Appeal upheld it in May 2021.

Just two months later, the architects of the first order Rogers, Bell, TVA, and others filed a new application demanding faster, more flexible blocking. The Federal Court obliged and in 2022, Justice William F. Pentney handed down Canadas first dynamic pirate IPTV blocking order, crafted to protect the NHL broadcasters revenues.

Justice Pentney also issued instructions for one or more experts to review the process to ensure compliance with the Courts criteria for identifying pirate IP addresses. Dates and times when the IP addresses were supposed to be blocked, and whether they actually were, for example. A report on general compliance was the overriding theme.

Report Satisfied Judge, New Injunction Awarded

Before Rogers, Bell, TVA, and the other plaintiffs were able to renew their injunction, the Court reviewed the experts report to ensure that its instructions had been followed. The report was produced by IP lawyer David Lipkus and Jon Wilkins, co-founder of Quadra Partners.

While both men h...

19:00

Could 1080p Video Output From The RP2040 Be Possible? Hackaday

Modern microcontrollers often have specs comparable with or exceeding early gaming consoles. However, where they tend to fall short is in the video department, due to their lack of dedicated graphics hardware. With some nifty coding, though, great things can be achieved  as demonstrated by [TEC_IST]s project that gets the RP2040 outputting 1080p video over HDMI.

The project builds on earlier work that saw the RP2040 outputting...

18:35

If You Dislike Choosing Captcha Images From a List Owl Have Good News for You SoylentNews

gCaptcha is the leading rival for quality captcha services against Google's renowned and universally despised recaptcha. When Google increased the price for recaptcha competing services took off taking what Google started from to improve the experience significantly. Some experiences with smiling dogs and cloudy horses were deemed to take this too far but these experiments showed that there are improvements to be made in the captcha game.

With hackers out to solve any captcha programmatically captcha services need to stay one step ahead. The slider method was found to be easily bypassed. Rotating puzzle pieces is harder to solve but involves more user interaction and has moving parts in the code that can break.

Recently hCaptcha has introduce a test that challenges the user to click on the center of an owl's head. This is an improvement over selecting a type of ball from a grid of 9 or going through the excruciating experience Google inflicts on users. There must be a better way to prove that the person viewing the web page is a human and not a bot. How about it, Soylentils? What's your best idea for a captcha system given the state of the systems we have today?

[Ed's Comment: Bonus points if you can suggest a system that does not rely on graphics (not everyone uses the latest browsers or even anything more than a simple line of text) to access some sites - our own included. We have the need for a robust captcha system for people creating accounts in order to reduce the number of fake accounts being created by a bot.]


Original Submission

Read more of this story at SoylentNews.

18:22

Elon Musks Twitter Widens Its Censorship of Modis Critics Lifeboat News: The Blog

Two months ago, Musk said he was too busy to look into his companys role in mass censorship in India. Its only gotten worse.

18:00

Medieval Living: How Did Medieval Peasants Light Their Homes? Terra Forming Terra














We have all heard of tallow and slow and is good enough..

Understand that eskimos used seal oil and dry moss in a stone bowl which seems good enough as well.

The real point is that you do not need much because your eyes adjust hugely.



Medieval Living: How Did Medieval Peasants Light Their Homes? (Video)

https://www.ancient-origins.net/history-ancient-traditions/medieval-lighting-0018149?


...

Nasty Pesticide Broken Down by Probiotic Used In Culturing Food Terra Forming Terra



This shows us a pathway for making food safe.  Not easy though, but still important.

This protocol needs to be available.

I do think we will simply get there. It is a lot of reseach, but it is still been done.



Nasty Pesticide Broken Down by Probiotic Used In Culturing Food
Posted on: Thursday, March 30th 2023 at 7:00 am

Written By: Sayer Ji, Founder

This article is copyrighted by GreenMedInfo LLC, 2023


Cultured food has a wide range of health benefits, but did you know that the microbes found within fermented food are capable of breaking down certain highly toxic chemicals in our gut?

A compelling study published in Letters in Applied Microbiology shows that a commonly used food probiotic known as Lactobacillus plantarum is capable of degrading dangerous pesticide residues in wheat (pirimiphos-methyl), confirming the traditional fermentation-based food-processing technique known as culturing can significantly improve the safety of conventional food.

...

Deadly weed may actually help us look younger, heal faster Terra Forming Terra



All plants need to be tested rigorously in order to observe their talents. We all know this plant and many like it which none of us ever consume.

Again it can be valuable.

and we have known this plant since Aristotle.


Deadly weed may actually help us look younger, heal faster

By Bronwyn Thompson

March 29, 2023

https://newatlas.com/health-wellbeing/noxious-weed-anti-aging-wound-healing/

If youre on a hike, youd be best steering well clear of the cocklebur weed. While the stalky green plants with curious-looking spiky burs dont appear particularly deadly, this noxious plant is a killer.



In 2007, 76 villagers fell ill in northeastern Bangladesh after consuming the plants seedlings, and a quarter of those died. The toxin present in the seedlings and burs (also often called their fruit and their seeds), carboxyatractyloside, can cause nausea, palpitations, drowsiness, hallucinations and multiple organ dysfunction leading to death.




It can also cause acute liver failure in pigs, cattle, sheep, poultry, horses and other ruminants.

...

Weight-loss injectable could replace bariatric surgery knife Terra Forming Terra







This is as promising as it gets and we have collaterral impact as well.  On the otger hand, the bar is pretty low here.

It is good news and we will take it.  Right now it can remove fat in rats.


hopefully it is safe and helpful for us as well.



Weight-loss injectable could replace bariatric surgery knife

March 29, 2023


Bariatric surgery is successful at treating obesity, but it's not without its risks

https://newatlas.com/medical/weight-loss-injectable/

Bariatric surgery, which includes gastric bypass and other ways of manipulating the digestive tract, has proven to be a successful way of treating obesity and, in some cases, even reversing diabetes. However, as with all surgeries, it comes with certain risks, has a lengthy recovery time, and is a costly procedure to undergo. Now, working with rodents, researchers have found a way to harness benefits similar to those from surgery, but in the form of an injection. They also found that it helped with metabolism, insulin production and, most surprisingly, with opioid cravings.


When bariatric surgery such as...

17:50

Announcing paid plans for Number tools catonmat.net

Team Browserling keeps shipping!

Last month we launched paid plans for Random Tools and today we're launching paid plans for our next most popular tool category Number Tools. Number tools are used by 45,000 people every month and they let you generate number sequences, convert numbers to words and words to numbers, sort, round, factor numbers, and much more.

Next, we're adding paid plans to all other online tools categories that we built and joining them into a single ultimate get things done website called OnlineTools.com, making it the top 100 website on the Internet.

From technical standpoint, we used HTML templates, Google SEO, and a $5 Linode instance to launch the paid plans. Checkmate, front-end developers and devops engineers.

You can still use all tools for free for a limited time but if you really like them, then you can get a subscription to support my team's work. See the pricing page for more information.

See you next time!

16:29

Development Release: Lubuntu 23.04 Beta DistroWatch.com: News

Development Release: Lubuntu 23.04 Beta^Simon Quigley has announced the availability of the beta build of Lubuntu 23.04, code-named "Lunar Lobster": "Thanks to all the hard work from our contributors, Lubuntu 23.04 Beta has been released. With the codename Lunar Lobster, Lubuntu 23.04 will be the 24th release of....

16:03

New infosec products of the week: March 31, 2023 Help Net Security

Heres a look at the most interesting products from the past week, featuring releases from BreachLock, HackNotice, LOKKER, Nile, and Tausight. HackNotice Actions helps people to understand the extent of their data exposure HackNotice is offering additional tailored protection via its new service, HackNotice Actions. Further empowering employees, HackNotice Actions reaches out to any company where a persons PII or other data has been compromised, and asks for a full report on or erasure of More

The post New infosec products of the week: March 31, 2023 appeared first on Help Net Security.

16:00

Clever Test Rig Clarifies Capacitor Rules-of-Thumb Hackaday

A bench setup with a spectrum analyzer and a PCB under test

If youve done any amount of electronic design work, youll be familiar with the need for decoupling capacitors. Sometimes a chips datasheet will tell you exactly what kind of caps to place where, but quite often youll have to rely on experience and rules of thumb. For example, you might have heard that you should put 100 F across the power supply pins and 100 nF close to each chip. But how close is close? And can that bigger cap really sit anywhere? [James Wilson] has been doing research to get some firm answers to those questions, and wrote down his findings in a fascinating blog post.

...

16:00

Overcoming obstacles to introduce zero-trust security in established systems Help Net Security

In this Help Net Security interview, Michal Cizek, CEO at GoodAccess, discusses the crucial balance between leveraging distributed resources and maintaining top-notch security measures. With the growing remote work trend, Cizek highlights the importance of implementing a zero-trust security model, emphasizing the complexities and challenges of such an endeavor. How can organizations make the most of distributed IT resources while simultaneously keeping them secure? It has become a standard that an organization runs only a More

The post Overcoming obstacles to introduce zero-trust security in established systems appeared first on Help Net Security.

15:51

Sundry Files - 274,461 breached accounts Have I Been Pwned latest breaches

In January 2022, the now defunct file upload service Sundry Files suffered a data breach that exposed 274k unique email addresses. The data also included usernames, IP addresses and passwords stored as salted SHA-256 hashes.

15:48

Stop Blaming the End User for Security Risk SoylentNews

Stop Blaming the End User for Security Risk:

It's common among cybersecurity professionals to point to the end user as a top area of risk in securing the organization. This is understandable. Systems and software are under our control, but users are unpredictable, that unruly variable that expands our threat surface to each geographically dispersed user, personal device, and all-too-human foibles and flaws.

Certainly, threat actors target our users quite successfully I'm not here to dismiss this obvious truth. But what is equally certain is this:We cannot train our way out of this problem. Enterprises pour significant investments into user security-awareness training, and still, they suffer embarrassing, costly breaches. So, focusing primarily on securing the end user isn't a sound strategy.

Fact: your users are a major risk factor. According to Verizon's "2022 Data Breach and Investigations Report," 35% of ransomware infections began with a phishing email. Fact: This is despite escalating investments in security-awareness training over many years. The cybersecurity awareness training market is projected to grow from $1,854.9 million in 2022 to $12,140 million by 2027. Fact: Even with all these investments, ransomware (just as one attack type) is also expected to grow aggressively, despite many organizational efforts, including training.

Sad, unavoidable fact: Our users are still going to make mistakes we're all human, after all. A survey conducted to prove the need for more security training, in my view, proved its inability to stop the cyber crisis: Four out of five surveyed had received security awareness training; between 26% and 44% (based on age demographic) continued to click on links and attachments from unknown senders anyway.

Read more of this story at SoylentNews.

15:30

The foundation of a holistic identity security strategy Help Net Security

Only 9% of organizations are taking an agile, holistic and mature approach to securing identities throughout their hybrid and multi-cloud environments, according to CyberArk. A critical path for cyber resilience The data-driven model identifies 9% of organizations as those with the most mature and holistic identity security strategies. These transformative organizations have a well-rounded focus on implementing identity security tools, are inherently agile and display a fail fast, learn faster characteristic even in times of More

The post The foundation of a holistic identity security strategy appeared first on Help Net Security.

15:00

Leveraging network automation to enhance network security Help Net Security

Data backups get a lot of attention, but sadly, sometimes, the operational work that keeps networks secure like device backups, upgrades, and configuration grooming goes undone. Recent high-profile network outages have brought attention to the importance of not just automating improvements in network security and operations but recovering quickly and minimizing downtime when disaster strikes. Its incredible that even today, the simplest configuration change or even a typo can sometimes cause a ripple More

The post Leveraging network automation to enhance network security appeared first on Help Net Security.

14:30

Cloud diversification brings complex data management challenges Help Net Security

As IT infrastructure becomes more diverse, organizations face the challenge of integrating data management and control, according to Nutanix. The research showed that the majority of IT teams leverage more than one IT infrastructure, a trend thats expected to intensify in the future, but struggle with visibility of data across environments with only 40% reporting complete visibility into where their data resides. A hybrid multicloud support In the coming years, there will be hundreds of More

The post Cloud diversification brings complex data management challenges appeared first on Help Net Security.

14:22

Allies or enemies of cancer: The dual fate of neutrophils Lifeboat News: The Blog

Why do cancer immunotherapies work so extraordinarily well in a minority of patients, but fail in so many others? By analyzing the role of neutrophils, immune cells whose presence usually signals treatment failure, scientists from the University of Geneva (UNIGE), from Harvard Medical School, and from Ludwig Cancer Center have discovered that there is not just one type of neutrophil, but several. Depending on certain markers on their surface, these cells can either promote the growth of tumors, or fight them and ensure the success of a treatment. By boosting the appropriate factors, neutrophils could become great agents of anti-tumor immunity and reinforce the effects of current immunotherapies. These results have been published in the journal Cell.

Immunotherapy involves activating mainly T cellsto recognize and destroy . While this treatment is very efficient for some patients, and sometimes even exceeds expectations, it is unfortunately not the case in most cases. The reasons for these failures remain largely unknown, says Mikal Pittet, full professor at the UNIGE Faculty of Medicine, holder of the ISREC chair in immuno-oncology, director of the Centre for Translational Research in Onco-Hematology and member of the Ludwig Cancer Center, who directed this work. This is why deciphering the immune components involved is key to develop more advanced treatments and make immunotherapies a real therapeutic revolution.

Neutrophils are the most abundant immune cells in the blood and are very useful in infections or injuries by being quickly mobilized to the affected area and releasing antimicrobial factors. In the context of cancer, however, their presence is generally bad news as they promote vascularization and tumor progression.

14:22

Study indicates interleukin-6-dependant pathway dysregulation as a key druggable feature of COVID-19 Lifeboat News: The Blog

In a recent study on the medRxiv preprint server, researchers identified an interleukin 6 (IL-6) dependent alternative pathway as a therapeutic strategy against coronavirus disease 2019 (COVID-19).

Study: A Complement Atlas identifies interleukin 6 dependent alternative pathway dysregulation as a key druggable feature of COVID-19. Image Credit: MarynaOlyak/Shutterstock.com

14:22

Humans to attain immortality by 2029? Ex-Google scientist makes striking claim Lifeboat News: The Blog

You wont live forever is a catchphrase which has often been touted and has so far remained the proven truth of life of humans and almost every other living being on planet earth. But soon, this catchphrase may well become the truth of the past, as humanity steps forward to attain immortality.

A former Google scientist has made a prediction, which if proven right, may redefine human civilisation as we know it. Ray Kurzweil, whose over 85 per cent of 147 predictions have been proven right, has predicted that humans will become immortal by 2029.

The revelation came when the 75-year-old computer scientist dwelled upon genetics, nanotechnology, robotics and more in a YouTube video posted by channel Adagio.

14:22

Increased use of telehealth services, medications during pandemic associated with reduced risk for fatal overdose Lifeboat News: The Blog

The expanded availability of opioid use disorder-related telehealth services and medications during the COVID-19 pandemic was associated with a lowered likelihood of fatal drug overdose among Medicare beneficiaries, according to a new study.

The results of this study add to the growing research documenting the benefits of expanding the use of telehealth services for people with use disorder, as well as the need to improve retention and access to medication treatment for opioid use disorder, said lead author Christopher M. Jones, PharmD, DrPH, director of the National Center for Injury Prevention and Control, Centers for Disease Control and Prevention. The findings from this collaborative study also highlight the importance of working across agencies to identify successful strategies to address and get ahead of the constantly evolving crisis.

Published today in JAMA Psychiatry, this study is a collaborative research effort led by researchers at the National Center for Injury Prevention and Control, a part of CDC; the Office of the Administrator and the Center for Clinical Standards and Quality, both part of the Centers for Medicare & Medicaid Services (CMS); and the National Institute on Drug Abuse, a part of the National Institutes of Health.

14:00

OSC&R open software supply chain attack framework now on GitHub Help Net Security

OSC&R (Open Software Supply Chain Attack Reference) is an open framework for understanding and evaluating software supply chain security threats. It has received the endorsement of former U.S. NSA Director Admiral Mike Rogers, and is now available on GitHub. Spearheaded by OX Security, OSC&R is a MITRE-like framework designed to provide a common language and structure for understanding and analyzing the tactics, techniques, and procedures (TTPs) used by adversaries to compromise the security of software More

The post OSC&R open software supply chain attack framework now on GitHub appeared first on Help Net Security.

13:30

Intruder unveils API scanning to help organizations reduce exposure Help Net Security

Intruder updates its cloud-based vulnerability management service, allowing organisations of all sizes to secure their APIs by automatically detecting vulnerabilities, gaps, security weaknesses, and misconfigurations that hackers can exploit. As more organisations build APIs to facilitate automation, attack surfaces are expanding, making it crucial for organisations to include them under their security operations. Intruders latest capability automatically scans every API, providing organisations with detailed insights that they can use to proactively reduce exposure whether More

The post Intruder unveils API scanning to help organizations reduce exposure appeared first on Help Net Security.

13:20

AttackIQ Ready! gives security teams a clear portrait of their security program performance Help Net Security

AttackIQ launched AttackIQ Ready!, a fully managed breach and attack simulation service that leverages years of advanced content and actionable reporting to improve organizations security posture and security program performance. The service was designed to simplify the execution of a continuous security validation program, showing results in real-time and orchestrating faster remediation all through one automated platform for everyone who wants it. Absent real data, teams lack clarity about their capabilities and performance More

The post AttackIQ Ready! gives security teams a clear portrait of their security program performance appeared first on Help Net Security.

13:15

ReasonLabs Dark Web Monitoring identifies malicious online activity Help Net Security

ReasonLabs has launched a Dark Web Monitoring feature to its RAV Online Security solution, a web extension that provides real-time, 24/7 protection against a range of malicious online activity. The Dark Web Monitoring feature scans tens of thousands of combination lists, leaked databases, and malware data hidden from the surface netthe publicly accessible internetfor mentions of users personal data, and instantly notifies users when breaches occur. The dark web, a part of the internet that More

The post ReasonLabs Dark Web Monitoring identifies malicious online activity appeared first on Help Net Security.

13:03

Twitter Obtains Subpoena Forcing GitHub to Unmask Source-Code Leaker SoylentNews

Ars Technica is reporting that Twitter has convinced a judge to issue a subpoena to Github, requiring them to provide all personal details in their possession of a user called "FreeSpeechEnthusiast".

Twitter has obtained a subpoena compelling GitHub to provide identifying information on a user who posted portions of Twitter's source code.

Twitter on Friday asked the US District Court for the Northern District of California to issue a subpoena to GitHub. A court clerk signed off on the subpoena [PDF] yesterday.

GitHub user "FreeSpeechEnthusiast" posted Twitter source code in early January, shortly after Elon Musk bought Twitter and laid off thousands of workers. Twitter reportedly suspects the code leaker is one of its many ex-employees.

GitHub removed the code repository on Friday shortly after Twitter filed a DMCA (Digital Millennium Copyright Act) takedown notice. Twitter's takedown notice also requested identifying information on FreeSpeechEnthusiast, but GitHub didn't provide those details to Twitter immediately.

With the subpoena now issued, GitHub has until April 3 to provide all identifying information, "including the name(s), address(es), telephone number(s), email address(es), social media profile data, and IP address(es), for the user(s) associated with" the FreeSpeechEnthusiast account. GitHub was also ordered to provide the same type of information on any "users who posted, uploaded, downloaded or modified the data" at the code repository posted by FreeSpeechEnthusiast.

Read more of this story at SoylentNews.

12:40

Translating the Lies of Antnio Campinos (EPO) Techrights

Summary: Antnio Campinos has read a lousy script full of holes and some of the more notorious EPO talking points; we respond below

THE Benot Battistelli era did not truly end. Another terrible liar, whose English isnt that good (their native tongue is French), said the above. Our remarks below, preceded by timestamps:

0:06: Yes, Tony, global uncertainty like tactical nukes being deployed to Belarus, which you at the EPO funded. When the general public found out that the EPO had worked with and paid Belarus you just started shouting out the F word at staff! Like a true grown-up

0:11: Tell us more about inventors, Tony. What did you invent?

0:17: A record number of applications when you openly advertise lenience and expansion of scope, e.g. Hey Hi (AI, software patents in new clothing)

0:25: Up 2.5% after a year of lockdowns

0:30: I count Europe (a continent) like a country to make it sound good when only 1 in 3 applications in the European Patent Office is in fact European (in origin)

0:35: Growth in requests for monopolies (inside and across Europe) comes from outside Europe, so the European Patent Office is increasingly granting European monopolies to firms that are not European

0:43 I measure growth in China in terms of %, year-to-year, because in relative terms (relative to the whole) not many patent applications come from China

0:50: I cannot tell the difference between patents (monopolies) and inventions, but I never invented anything, so I just read this script regardless

1:00: At 50 (not yet!) I celebrate tremendous growth when the number of employees is in fact decreasing, as does the calibre

1:11: I compare the present to the early 1970s to make it seem like an incredible growth (national patent offices had existed already and there was no EU)

1:20: I dont say software patents, I just use some other words

1:30: I say double-digit growth when measuring only how many monopolies the EPO granted (lenience, pressure on examiners to meet quotas and targets), nothing economic and nothing to do with national patent offices, foreign patent offices etc.

1:37: This is 1contradicted by what Campinos said earlier because over time fewer and fewer patent applicants (relative to...

12:38

Leaked Reality - 114,907 breached accounts Have I Been Pwned latest breaches

In January 2022, the now defunct uncensored video website Leaked Reality suffered a data breach that exposed 115k unique email addresses. The data also included usernames, IP addresses and passwords stored as either MD5 or phpass hashes.

12:23

Professor Brian Cox Proves That Time Travel Is Possible With This Amazing Experiment Lifeboat News: The Blog

Physics-Astronomy: Home of the best science(focusing physics, astronomy) and technology news since 2012. Keep up with the latest news via email or social media. We are curious about the Universe, are you?

11:35

[Meme] Too Many Fake European Patents? So Start Fake European Courts for Patents. Techrights

EPO going down the toilet in pursuit of short-term profits

Antnio Campinos and Klaus Grabinski: Madame, don't mind us starting kangaroo courts

Summary: Antnio Campinos, who sent EPO money to Belarus, insists that the EPO is doing well; nothing could be further from the truth and EPO corruption is actively threatening the EU (or its legitimacy)

11:17

Thomas Magenheim-Hrmann in RedaktionsNetzwerk Deutschland About Declining Quality and Declining Validity of European Patents (for EPO and Illegal Kangaroo Courts) Techrights

Thomas Magenheim-Hrmann in RedaktionsNetzwerk Deutschland

Summary: Companies are not celebrating the production line culture fostered by EPO management, which is neither qualified for the job nor wants to adhere to the law (it's intentionally inflating a bubble)

Days ago the EPO delivered its annual results propaganda and released a video of a figurine-like Antnio Campinos talking to the camera (clearly not qualified for this job), telling a bunch of lies like Benot Battistelli used to do, misusing statistics to promote European software patents (typical buzzwords) and pretend the EPO had been doing well. The propaganda was of course propagated instantly to patent extremists platforms like Watchtroll and JUVE. However, some in German media [1, 2] are more sceptical, so the EPOs staff union retained copied of the printed versions and moreover released translations of an article published by Thomas Magenheim-Hrmann 3 days ago. His articles about the EPO go a long way back (hes no stranger to the issues) and his latest was translated as follows into English (there are other languages):

RND RedaktionsNetzwerk Deutschland

Corporations voice sharp criticism

Quarrel about the European Patent Office: Is examination becoming increasingly lax?

The authority puts mass before class and...

11:00

HPR3825: Creating a natural aquarium Hacker Public Radio

An alternative method to the big box store way of setting up an aquarium. You don't need a bunch of equipment, chemicals, or experience to have a balanced thriving aquarium that not only runs itself after a period of time, but is a healthier environment for your aquatic creatures and will be a great conversation piece. Learn how to emulate nature so that everything works together in its own ecosystem from the bottom up. Only a little bit of patience is needed.

Inverse Relationship Between Bugs and Patches It Will Never Work in Theory

How easily can you spot the difference between code that introduces bugs and code that fixes them? Given the explosion of interest in AI-based code generators over the last few months, an equally important question is now, "How well can machines tell the two apart?"

To answer that question, the authors of this recent paper applied clustering methods to both bug fixes and bug patches and found that most are similar enough to be clustered togetheri.e., they are superficially indistinguishable. What's more, they found that code mutation tools (used to generate buggy code for testing) and automatic program repair tools (used to generate fixes for bugs) can often be used interchangeably if trained on each other's data. That's good news for researchersit's always a bit of a thrill to realize that two ideas or approaches can be unifiedbut probably a sign that useful AI-based coding assistants are going to require more (and more careful) training than their giddier advocates expect.

Jinhan Kim, Jongchan Park, and Shin Yoo. The inversive relationship between bugs and patches: an empirical study. 2023. arXiv:2303.00303.

Software bugs pose an ever-present concern for developers, and patching such bugs requires a considerable amount of costs through complex operations. In contrast, introducing bugs can be an effortless job, in that even a simple mutation can easily break the Program Under Test (PUT). Existing research has considered these two opposed activities largely separately, either trying to automatically generate realistic patches to help developers, or to find realistic bugs to simulate and prevent future defects. Despite the fundamental differences between them, however, we hypothesise that they do not syntactically differ from each other when considered simply as code changes. To examine this assumption systematically, we investigate the relationship between patches and buggy commits, both generated manually and automatically, using a clustering and pattern analysis. A large scale empirical evaluation reveals that up to 70% of patches and faults can be clustered together based on the similarity between their lexical patterns; further, 44% of the code changes can be abstracted into the identical change patterns. Moreover, we investigate whether code mutation tools can be used as Automated Program Repair (APR) tools, and APR tools as code mutation tools. In both cases, the inverted use of mutation and APR tools can perform surprisingly well, or even better, when compared to their original, intended uses. For example, 89% of patches found by SequenceR, a deep learning based APR tool, can also be found by its inversion, i.e., a model trained with faults and not patches. Similarly, real fault coupling study of mutants...

10:52

10:35

Certa collaborates with ID-Pal to simplify third-party onboarding Help Net Security

Certa, has unveiled its official partnership with ID-Pal. Using a blend of biometric, document, and database checks, ID-Pals solution will enable Certa customers to verify the identity of third-party contacts in real time, all seamlessly integrated and orchestrated into a clients workflow. Our mission has always been to help businesses onboard customers, suppliers, sellers, partners, etc., quickly, effectively, and with transparency at every step, said Jag Lamba, CEO of Certa. Through our partnership with ID-Pal, More

The post Certa collaborates with ID-Pal to simplify third-party onboarding appeared first on Help Net Security.

10:31

Links 30/03/2023: HowTos and Political News Techrights

10:21

TSMC May Not Expand in US If Double Taxation Rule Continues SoylentNews

TSMC may not expand in US if double taxation rule continues:

As Apple's major chip manufacturer TSMC nears the opening of its Arizona plant, US officials want it to build more but US versus China politics are complicating matters.

Taiwanese company TSMC has already invested $40 billion in its new Arizona factory, which it says will open in 2024. But since the US does not have a income tax agreement with Taiwan, TSMC faces double taxation on its profits from this or any other factory it could build in the States.

According to the Financial Times, unless there is a change in the law, TSMC will be paying out over 50% of its profits earned in the US. In comparison, Samsung pays much less because its home country of South Korea has a tax treaty with the States.

Naturally, then, US politicians who want to see the firm expand in the States argue that President Biden should negotiate a tax accord with Taiwan. TSMC officials have reportedly also asked for such an agreement to ease this double taxation burden.

However, at present the US does not recognize Taiwan as a separate country or sovereign nation. Instead, it sees it as part of China.


Original Submission

Read more of this story at SoylentNews.

09:36

A Muon Collider? Not Even Wrong

The US particle physics community has been going through a multi-year process designed to lead up this fall to a 10 year strategic plan to be presented to the DOE and the NSF. In particular, this will generate a prioritized list of what projects to fund over this period. The process began with the Snowmass self-study, concluded last year, and available here. Since last fall there have been two independent efforts going on:

  • A National Academies study has been holding meetings, materials available here.
  • A P5 (Particle Physics Project Prioritization Panel) is holding meetings, see here, and planning for a report to NSF and DOE by October.

Looking through all the materials relevant to particle theory, there seems to me little acknowledgement of the serious problems faced by the subject, or any new ideas for how to address these problems. Most of the effort though is devoted to where most of the money will be spent, on the experimental side. To a large degree, for the short-term its clear where funding has to go (to continue supporting the LHC into the HL-LHC era, and finish building the DUNE/LBNF US neutrino project). The longer-term is however very uncertain, as it is unclear whether theres a viable energy-frontier project that could study higher energies than those accessible at the LHC.

Last week EPP2024 and P5 held Town Hall events at Fermilab, see here and here. Theres video of the EPP2024 event here. On the question of the long-term future, one issue that is getting a lot of attention is that of whether to prioritize development of a possible muon collider. In this presentation a young physicist gives a future timeline including their likely retirement and death dates, showing that a muon collider is their only hope for new energy frontier physics during their lifetime. For those of my age the situation is a bit different, since even a muon collider is not going to do the job. At the EPP2024 event (3:28 in the video) Nima Arkani-Hamed makes the case that:

I think the subject has not been so exciting for many, many decades, and at the same time our ability to experimentally address and solidly settle some of these very big questions has never been more uncertain. I dont think its a normal time, its an inflection point in the history of the development of our subject, and it requires urgency The confluence...

09:01

Trump Indicted cryptogon.com

Via: New York Post: The vote sets the stage for the first ever criminal prosecution of a former US president. The Manhattan grand jury hearing evidence in the Stormy Daniels hush money investigation on Thursday voted to indict the former president, two sources with knowledge of the case told The Post.

08:19

Irssi SA-2023-03 / Use after free in printing routine Open Source Security

Posted by Ailin Nemui on Mar 30

Hi,

The issue has been reported to us by ednash, who were experiencing
frequent crashes of their Irssi. With the release of GLib 2.77, the
slice memory allocator that was previously obscuring this memory issue
was removed, thus making it much easier to trip.

When Irssi prints a message while another message is being printed, the
list that keeps track of Irssi variables for use in statusbar/message
patterns is not correctly cleaned up, leading...

08:16

Re: Re: sox: patches for old vulnerabilities Open Source Security

Posted by Steffen Nurpmeso on Mar 30

Steffen Nurpmeso wrote in
<20230314201652.RlbWr%steffen () sdaoden eu>:
...
||Helmut Grohne wrote in
|| <20230314110138.GA1192267 () subdivi de>:
|||On Fri, Feb 03, 2023 at 09:44:47PM +0100, Helmut Grohne wrote:
|||> * CVE-2021-33844
|||
|||The original fix for this issue would cause a regression. After applying
|||it, sox would be unable to decode WAV GSM files. This has been reported
...

Today i got a nice email from...

08:01

Super FabriXss vulnerability in Microsoft Azure SFX could lead to RCE Security Affairs

Researchers shared details about a flaw, dubbed Super FabriXss, in Azure Service Fabric Explorer (SFX) that could lead to unauthenticated remote code execution.

Researchers from Orca Security shared details about a new vulnerability, dubbed Super FabriXss (CVE-2023-23383  CVSS score: 8.2), in Azure. The experts demonstrated how to escalate a reflected XSS vulnerability in Azure Service Fabric Explorer to an unauthenticated Remote Code Execution.

The researchers explained that they have abused the metrics tab and enabled a specific option in the console the Cluster Type toggle.

The name Super FabriXss comes from the FabriXss flaw (CVE-2022-35829, CVSS score: 6.2) that was addressed by Microsoft in October 2022.

The Super FabriXss vulnerability enables remote attackers to leverage an XSS vulnerability to achieve remote code execution on a container hosted on a Service Fabric node without the need for authentication. reads the analysis published by Orca Security. What started initially as a discovery of an XSS vulnerability that allowed a malicious script to be reflected off a web application, ended up being a full remote code execution (RCE) vulnerability after clicking on a crafted malicious URL and toggling the Cluster Event Type setting under the Events tab.

The researchers demonstrated how to exploit the vulnerability in Azure Service Fabric Explorer by sending a crafted URL to any Azure Service Fabric user. The experts discovered that is possible to embed an iframe in a vulnerable Node Name parameter in the users context. The iframe is used to retrieve remote files from a server, eventually leading to the execution of a malicious PowerShell reverse shell.

This attack chain can ultimately result in remote code execution on the container which is deployed to the cluster, potentially allowing an attacker to take control of critical systems. continues the report.

Unlike FabriXxs, the SuperFabriXxs issue only exists in the Windows Cluster, but it can be used in code execution attacks on a large scale.

The attack is composed of two main phases:

1. Once the iframe is embedded and the fetch request is triggered, the attackers code takes advantage of the upgrade process to overwrite the existing deployment with a new, malicious one. This new deployment includes a CMD instruction in its Dockerfile that w...

07:47

IRS tax forms W-9 email scam drops Emotet malware HackRead | Latest Cybersecurity and Hacking News Site

By Waqas

Researchers have warned users to be on alert, as the IRS never sends emails to confirm taxpayers' personal information.

This is a post from HackRead.com Read the original post: IRS tax forms W-9 email scam drops Emotet malware

07:41

Newly Declassified Government Report Suggests Havana Syndrome Might be Caused by an Energy Weapon SoylentNews

Newly Declassified Government Report Suggests Havana Syndrome Might Be Caused by an Energy Weapon:

After years of debate about the cause of the strange malady, a recently declassified document points the finger (once again) at "electromagnetic energy."

Several weeks after the intelligence community came out to disavow claims that "Havana Syndrome"the bizarre rash of neurological disorders plaguing U.S. foreign service officerswas the result of a directed energy weapon, a newly declassified report alleges that may very well be what it is.

The group behind the report, the Intelligence Community Experts Panel on Anomalous Health Incidents (AHIs), was established by the government to figure out just what the heck had happened to the 1,000-ish American officials who claim to have suffered from "Havana"'s bizarre symptoms. Those symptoms, which first cropped up at a U.S. embassy in Cuba in 2016 and soon spread to other parts of the globe, include a rash of inexplicable ailmentsthings like hearing and memory loss, severe headaches, light sensitivity, nausea, and a host of other debilitating issues.

Well, after a substantial research effort to get to the bottom of Havana Syndrome's seemingly impenetrable mystery, the IC panel ultimately released their findings to the government, but the contents of the report have remained classifieduntil now, that is.

[...] According to the report, a plausible explanation for the disorders may be "pulsed electromagnetic energy." It reads:

Electromagnetic energy, particularly pulsed signals in the radio frequency range, plausibly explains the core characteristics, although information gaps exist. There are several plausible pathways involving forms of electromagnetic energy, each with its own requirements, limitations, and unknowns. For all the pathways, sources exist that could generate the required stimuli, are concealable, and have moderate power requirements.

Read more of this story at SoylentNews.

07:38

888 New Zealand Casino Log In h+ Media

888 New Zealand Casino Log In

888 Casino jackpot is totally different for each game and ranges from the 1000s to the tens of millions. These pokies offer multi-media rich performance and are cornering the ground in popular on-line casinos. With autoplay performance, free spins, bonus rounds, and extra, you can see that progressive-themed pokies offer good payouts and are a ton of fun for anyone who loves enjoying the pokies.

These manufacturers go hand in hand with the on line casino and can all be accessed from the main web web page of the 888 Casino. All payouts are processed after a forty eight hour pending period, during which they can be reversed. Again, if youre not acquainted with the codecs of those competitions than there is no need to worry as 888 give you guides to get started on these too. Without additional ado, lets take a dive into the world of 888 and see whats on supply for the players who opt for their service. We at NZ Casino are additionally committed to the subject and have an allotted page for Responsible Gambling.

  • Thus, I extremely advocate that 888casino work on the cell apps navigation.
  • The most a truth in the on-line traditional casino world will be Range Riches through the producer Barcrest and the Cleopatra on-line slot machine sport from IGT.
  • A good Skrill on line casino is conscious of that the safety of your gamers is a precedence and solely from this level should think about the remaining areas.
  • All you have to do is observe via their simple and fast registration process and get ready to spin.
  • Thats why we have been so happy to see that this web site applies SSL encryptions to all deposits and withdrawals, preserving your financial and private particulars safe.
  • Both Android and iOS customers will be in a position to use the app to get complete access to 888 Casino.

The progressive and unique casino options out there at 888Starz make this casino stand out from its competition. Ranging from super-fast payouts to extremely safe banking solutions, were sure 888Starz is not going to disappoint. Kiwis can enjoy a large assortment of reside supplier video games powered by over 15 different recreation suppliers.

You can use Interac, Instant Banking, bank cards or iDebit to get dollars into your account. Another fine banking technique possibility for deposit and withdrawal is PaysafeCard. 888 took a bit of time onboarding Interac, but from the beginning of 2023 theyve allowed Interac transactions. 888 on-line on line casino provides plenty of completely different sort of on-line on line casino video games together with online slots. 888 on line casino slot video games selection is correct there with the best slots casinos like LuckyDays and Voodoo Dreams. In addition to their very own unique slots, you can play basic slots and jackpot slots like Mega Moolah.

If youre a newbie on the looko...

07:36

Sabong Slots Casino Sabong888, g188 Phsabong Slots Casino Sabong888, Sabong Sabong 2018 Gcash Login, g188phsabong Slots Casino Sabong888, Sabong Sabong 2018 Gcash Login,1e h+ Media

Sabong Slots Casino Sabong888, g188 Phsabong Slots Casino Sabong888, Sabong Sabong 2018 Gcash Login, g188phsabong Slots Casino Sabong888, Sabong Sabong 2018 Gcash Login,1e

A live on line casino is on offer as properly, with reside sellers dealing the games for the net viewers. Pretty much every type of on line casino game is out there at 888 Casino, allowing them to maintain up their standing as one of the business leaders. This is after all capped by their major presence within the on-line poker and sports activities betting arenas, for which they provide very powerful platforms as nicely. One of the primary options of any on-line on line casino is the welcome bonus available for model spanking new players.

Visit the 888 3D Casino the place youll have the flexibility to costume up a non-public icon as your self and play on-line three-dimensional video games. Unfortunately, 888 Casino isnt presently on the market to our PA gamers proper now. The app is easy to make use of and features an array of account administration options. The web-based cell casino web site is true for fast gaming periods, which additionally permits you to make deposits, withdrawals, declare bonuses, and even enroll.

  • It consists of self-help tools on tips on how to best handle your online gaming experience.
  • $4 added to your bankroll for on-line casino and on-line poker video games.
  • You perhaps nonetheless wont win 1,000,000 dollars in a single spin here, nevertheless nailing the first prize ought to nonetheless net you no much less than $200,000.
  • 888 cell on line casino provides you the prospect to play anytime you need from anywhere you want, so you probably can always win huge when youve an web connection.
  • For 888 withdrawal, you have to go to the primary foyer simply as youll when making a deposit.

However, theres a commission for deposit and cashout transfers to and out of your Upaycard. Reef Club abides by the rules of accountable gambling in all international locations where it operates and offers a series of self-exclusion instruments. A little more than a 39 payment strategies can be found, and these usually consist of MasterCard, Neteller, PayPal. The design of the Reef Club on-line casino didnt use too many visuals and the page parts have been saved easy.

The sleek design of the mobile lobby and tables is much like the one found on desktop computers, though the customization options arent as rich. A good touch to the gaming platform is that users can still opt for practice play if they want and thus use the demo credits to play poker with real opponents. When it involves ce...

07:36

888 Casino Nz Evaluation Exclusive 100% Welcome Bonus h+ Media

888 Casino Nz Evaluation Exclusive 100% Welcome Bonus

Most of the video games could be performed free of charge in practise mode, which is great for gamers wanting good their strategy or test out the model new features. While this on-line on line casino platform is understood for its longevity and games which have stood the test of time, its glorious bonus and promotions are another major perk that makes it stand out. 888 Casino NZ offers gamers commendable bonuses that assist them improve their chances of winning with out having to spend greater than they want to. These bonuses include match cash, free spins, and amazing presents that payers can get without restriction.

888Casino has the top jackpot pokies out there including the Millionaire Genie slot game. This is probably one of the prime ranking pokies on the location, and all it takes is one spin to win big. A dedicated section of the lobby will current numerous tables and tournaments for gamers looking to enjoy the recreation with out utilizing actual cash in the process. Thanks to its very high site visitors numbers, the poker site on-line has numerous video games working all through the day. This is nice information for gamers from New Zealand because the peak hours are largely primarily based on European times.

You can use Interac, Instant Banking, credit cards or iDebit to get dollars into your account. Another nice banking technique option for deposit and withdrawal is PaysafeCard. 888 took a little bit of time onboarding Interac, however from the start of 2023 theyve allowed Interac transactions. 888 online on line casino provides loads of totally different kind of on-line casino video games along with on-line slots. 888 on line casino slot video games selection is correct there with the most effective slots casinos like LuckyDays and Voodoo Dreams. In addition to their very own exclusive slots, you possibly can play basic slots and jackpot slots like Mega Moolah.

So, at 888 you will have the right firewall and encryption feature ever made. The on line casino app is so light-weight, that your storage will hardly really feel it is there. The 888 Casino runs through the HTLM browser software program, so the app is synced to this and nothing else. In one month alone, a complete of $34 Million dollars was won by players inside. You missed out, however that is okay, it happens each month and now you know about it, well there isnt a excuse now why you did not be part of.

888 poker works slightly different to the relaxation of their service as primarily, the service is a downloadable client. Add this to your computer and you will gain entry to a plethora of various poker options which might be offered to their players by the team at 888 on line casino. Maybe these much less conventional styles might quickly flip into your all-time favourite earlier than long. This is due to the fact that alongside their very own games you additionally get to...

07:33

Oryx Gaming Launches With 888 On Line Casino h+ Media

Oryx Gaming Launches With 888 On Line Casino

We only listing well reviewed high online casinos offering all attainable kinds of free spins. Free spins NZ is proud to be the #1 trusted platform for on line casino gamers in New Zealand whore in search of No Deposit Free Spins and far more. 888, based in 1997, are stalwarts of the net on line casino industry with fingers in many pies. 888casino is only one such finger protruding from the 888 holdings tart.

While 888 Casino doesnt maintain an infinite list of game titles they handle to supply a selection of various varieties of gaming action to accommodate the tastes of any player. Slots and progressive video games are unique to their website and titles similar to Super Thundering 888, 2 Times Extra Wild or Millionaire Genie offer gamers the potential to money in on hundreds of thousands. The site contains sports activities betting and bingo as well as many other desk games similar to blackjack, baccarat or roulette.

We recommend that you just be taught all about 888 casinos generous promotions before enjoying to have the ability to get the most bang for your buck. Is 888 reliable in phrases of providing you with entry to reliable cost brands? With every thing coated within the 888 Poker evaluation, we are ready to truthfully say that the poker site is doubtless certainly one of the prime selections, if not the perfect. The trendy software appears nice and works even better as gamers can simply browse a massive selection of poker games and stakes. Short descriptions are available within the assist part and there are additionally guides for making deposits. Everything is 100% safe and actual money funds are added to the account immediately once they have been processed.

Here you presumably can view top tables, refine video games by category and then enter the foyer to pick your most popular desk. Once in the sport you possibly can modify the view of the desk or use the chat operate to interact in actual time with the supplier and your table mates. 888 is a family name whether or not you have used the bingo website before otherwise youre simply aware of their glorious status for offering a fun experience, youve positively heard of them earlier than.

There are https://bet-xbahis.icu/jewel-of-the-jungle-slot/ quite a few checks, examinations, audits and RTP reports by third events to make certain that every thing is protected, legal and impartial. All of those 888 casino security measures are in place in order that gamers enjoy a safe and reliable gaming setting. Players can contact pleasant, skilled, prepared agents by using e-mail, cellular phone, and settle chat. Very nicely because the exceptional slot choice, Mr Bet supplies plenty of Video Holdem poker, Scratch Greeting card, Roulette, Sic Bo, Blackjack, Baccarat and other on-line games.

B...

07:31

Functional Programming: The Biggest Change Since We Killed the Goto? IEEE Spectrum



Transcript

Stephen Cass: Welcome to Fixing the Future, an IEEE Spectrum podcast. Im senior editor Stephen Cass, and this episode is brought to you by IEEE Explorer, your gateway to trusted engineering and technology research with nearly 6 million documents with research and abstracts. Today we are talking with Charles Scalfani, CTO of Panoramic Software, about how adopting functional programming could lead to cleaner and more maintainable code. Charles, welcome to Fixing the Future.

Charles Scalfani: Thank you.

Cass: So you recently wrote an expert feature for us that turned out to be incredibly popular with readers. That argued that we should be adopting this thing called functional programming. Can you briefly explain what that is?

Scalfani: Okay. Functional programming is an is basically, as it says, its basically based around functions. So where object oriented programming is has an object model, where its everything you see everything through the lens of an object, and the whole world is an object, and everything in that world is an object. In functional programming, its the similar, its you see everything as a function, and the whole world looks like everything in the world looks like a function. You solve all your problems with functions. The reason its older and wasnt adopted is because the ideas were there, the mathematics, the ideas, and everything were there, the hardware just couldnt keep up with it. So it became relegated to academia and the hardware just wasnt available to do all of the things. That has been, since probably the 90s, its been not a problem anymore.

Cass: So I just wanted to like, as somebody who is, I would call itself a kind of a very journeyman programmer. So one of the first things I learned when Im using a new language is usually the section says, how to define a function, and theres a little you know, everybodys got it, Pythons got it, you know, even some versions of Basic used to have it, C has it. So I think function here means something different to those functions Im used to in something like C or Python.

Scalfani: Yeah. I have a joke that I always say is that when I learned C, the first program I wrote was hello world. And when I learned Haskell, a functional programming language, the last thing I learned was hello world. And s...

07:29

CD Projekts Legal Pressure Pushes GOG-Games to The Dark Web TorrentFreak

gog logoAs the creator of The Witcher series and Cyberpunk 2077, game developer CD Projekt won the hearts of millions of gamers.

The Polish company also scored points when it spoke out against DRM on numerous occasions, including the FCKDRM campaign promoted by its game distribution service GOG.

The anti-DRM stance is laudable but also has its drawbacks. Most notably, it becomes much easier for pirates to copy and share games. And indeed, new GOG games were swiftly shared online, including on a site that even copied its name: GOG-Games.com.

CD Project likely anticipated that their games would be pirated, but seeing a site use its own brand to promote pirated games must have stung. As a result, the videogame company has worked hard to get GOG-Games offline.

GOG-Games Under Pressure

Earlier this week, those efforts appeared to pay off when GOG-Games replaced its game repository with a notice that signaled serious problems.

Notice posted on GOG-Games earier this week

gog news

According to the operators, CD Projekts GOG team has been trying to take the site offline since 2011. Since GOG-Games uses a host that simply ignores DMCA notices, results have been limited, but more recently, the admin was contacted directly.

[S]omeone from their legal team sent a DMCA final call email directly to our site admin email address, the notice reveals.

The email in question wasnt directed at the operators of the site directly, but at the hosting company. It notes that GOG-Games violates GOGs copyrights and trademarks, urging the provider to take action.

The website is infringing GOGs word by using it to brand an unlawful operation of downloading both CD PROJEKT Groups and third parties games. The website also infringes CD PROJEKT S.A. trademarks and copyrights related to CD PROJEKT S.A games; The Witcher and Cyberpunk 2077.

We are extremely determined to take the above mentioned website down and we would like to ask you to treat the situation with utmost importance...

07:00

AMD CDX Bus Landing For Linux 6.4 To Interface Between APUs & FPGAs Phoronix

Since last year AMD-Xilinx has been posting Linux patches for enabling CDX as a new bus between application processors (APUs) and FPGAs. The AMD CDX bus is now poised for introduction in the upcoming Linux 6.4 cycle...

05:52

Betway h+ Media

Betway

Here is the listing of withdrawal choices for the Indian punters on Betway India. The creators present pleasant provides and promotions for users. Remember, theyre valid for every week and the minimal amount should be no much less than rupees 1,500.

These are secure, fast and easy-to-use strategies which are popular in India. Despite all the pros of Betway, we did find some drawbacks that were not too joyful about. The operators customer help is inadequate, although it has several useful articles and an FAQ section on its web site. The bonuses provided are also few, compared to some other gambling sites. We imagine Betway will do one thing to improve these drawbacks in the future.

However, if you have already got an account, enter your username and your password within the top proper corner of the page. You want first join the Free Bet Club program to get this kind of Betway bonus. With the primary deposit, youre supplied a one hundred pc bonus on the deposited quantity not exceeding $250. As for the wagering rules, the primary bonus is 100% of the deposit made. But not extra than $250, and wagering is done with a Wager of 50. During the wagering course of, you can not exceed the wager of $7.5, and one hundred pc of the quantity spent will solely count in the direction of the wagering when utilizing slots.

Betway presently holds licenses in regulated markets similar to Malta, the UK, Sweden, Denmark, Italy, Spain, Belgium, and Ireland. The Malta Gaming Authority and the New Jersey Gaming Commission regulate the operations of Betway out and in of the US. Other certificates include eCogra, Gambling Therapy, Gambling Commission, IMAS, and the International Betting Integrity Association. Kolkata Knight Riders skipper Dinesh Karthik grabbed a breathtaking working catch to dismiss Quinton De Kock during the match against Mumbai Indians at the

Luckily, Betway India has obtained several Indian fee options like UPI and Net Banking. Of course, you even have e-wallets like Neteller and Skrill. Players experiencing difficulties can contact buyer support by email on There is also a reside chat available, which may be accessed beneath fast links in your account. In the advisory, the govt. said on-line offshore betting platforms are now using information websites as a surrogate product to promote the betting platforms on digital media.

Jamieson, who was ruled out of the event as a outcome of an injury, was purchased by the franchise for INR 1 Crore. His alternative, Magala, has wealthy experience in the shortest format of the sport. Though he has played simply 4 T20Is for South Africa, Magala has a popularity for being a daily wicket-taker in home T20 video games through the years. He will join CSK at his base price of INR 50 Lakh, IPL stated in a press release. Magala, who has only participated in 4 T20 International matches for the Proteas, will sign on with the four-time IPL...

05:50

Betway Deposits h+ Media

Betway Deposits

The record goes on and on, covering just about every top-flight soccer league throughout the globe. Football is arms down the most well-liked sport on the planet and has an enormous and dependable fan base in India. We cant say we had been stunned, though, given the operators robust connections with the UK sports activities sector. Minimum deposit necessities you must deposit 200+ to become eligible for the intro bonus. Please assist us defend Glassdoor by verifying that you would possibly be a real person.

You can see betting boosts, guess slip, and money out option easily. Its on line casino offers a powerful variety of games provided by Microgaming platform. It has roulette, jackpot, slots, poker, blackjack, desk games, retro slots, and more.

Betway presents digital sports betting, that are fast games to play. Horse racing is the commonest instance, but digital cricket betting can be accessible place a bet and find out the sports conclusion in minutes. However, to accelerate demand, Betway had to diversify their offering and create a sports activities betting app and one for casino games.

Betway is an external betting 1win indir website with no legally registered entity in India, as this isnt allowed. This is the query that seems to have extra answers than web pages. However, the confusion regarding Betways legality in India is understandable, given the Indian legal guidelines on playing. Yes, Betway is a protected and trusted web site that players can completely rely on. The given personal data similar to name, ID details should be actual and all payments have to be made underneath the same name. Although no phone contact number has been provided, you can attain Betway buyer help personnel by way of the official email ID ().

  • Everything depends on your preferred cost methodology and whether or not it is accessible in your jurisdiction.
  • Betway is amongst the greatest stay betting platforms in the world.
  • Winnings can then be withdrawn back to the participants account or used to proceed enjoying.
  • If you fulfill the wagering circumstances specified in the supplys Terms & Conditions, you shall be able to withdraw the bonus cash.
  • Be it pre-game or in-game betting, Betway leads the way in which by offering probably the most aggressive odds in comparison with another bookmaker online.

Betway India, however, does not provide stay streaming choices which might appear as a disadvantage. Nevertheless, Betway provides lots of instruments like historical stats, stay updates, etc. so that punters have extra information earlier than inserting a bet. With so many reside betting options out there for Indian punters, our Betway scores are high. Punters can earn plus points by taking half in on any Betway product, or via particular presents or promotio...

05:47

Star Sports Activities Reside h+ Media

Star Sports Activities Reside

Information about the amount, high quality, purity, efficiency, price, and commonplace of goods or companies. Zurich , March 24 Narrated by Welsh actor and soccer fan Michael Sheen, Written in the Stars is the Official Film of the first FIFA World Cup to be held within the Middle East. Your account will mechanically be activated once your registration goes through. All you should ensure most safety and security on your account is to confirm it. Check the email handle you used for the site and see should you obtained a message from Betway.

Live betting choices abound, and the bookmaker supplies a diversified choice of disciplines in addition to a diverse roster. This method is essentially the most reliable and fastest of the options given on the bookmakers website. If you choose to withdraw funds using a financial institution card, you have to be aware of the deposit limitations and terms. For example, the presence of both a bookmaker and a casino, a profitable welcome bonus, in style payment strategies, the presence of an application, and so on. Indian gamers can legally deposit, play and withdraw cash on the Betway website.

Since this isnt the case with Betway, youll have the ability to wager all you want right here. Betway has a lot of sports video games you probably can guess on with great odds. They also have a Betway Boost, which is an offer that may increase the price of your odds and raise your winnings. Contact MethodResponse TimeEmail5 48hPhone1 30 minLive Chat30 sec forty minOne factor we might have beloved to see is immediate access to the customer service reside chat.

Also on the location offers sections of playing casino, slot machines. Betting company Betway has high-quality mobile apps on iOS and Android. It is probably certainly one of the few online betting websites designed fantastically for Indian players. Its features provide plenty of simplicity, making the betting expertise fairly straightforward.

The maximum is decided by the type of occasion, the recognition of the event, and the sort of wager. Generally, searching the sportsbook makes it straightforward to search out whatever you need. Depending on the popular mode of access, a bettor can scroll down the page utilizing the sidebar or search function to get what they can not find on the menu.

However, few cover the world cup, and those that do wont have good offerings concerning bonuses, payment methods, or buyer help. If youre on the lookout for high betting websites with lots of prizes and top-tier cricket offers, Betway will be your most suitable option. Everything from IPL to international matches is on the market right here. Betway India, one of the worlds largest bookmakers, is an experienced betting web site that launched its providers worldwide in 2006. It is a worldwide on-line gambling company, on which tens of millions of individuals bet on many spo...

05:46

Betway India Evaluation 2023 h+ Media

Betway India Evaluation 2023

From poker, roulette, video poker, blackjack, wheel of fortune, 8% of the amounts wagered will count in the direction of the wagering. Finally, youll need to wager the bonus funds as per the principles. Go to the website of Betway or open the cell app utilizing your account, and log in. Due to giving the customers full proof safety, Betway has a signup process that takes slightly too lengthy. There are many betting types of choices for the purchasers of Betway. Betway has topped the line and is all the time prepared to help, the customers can get help from customer care.

Choose your date of birth, and enter your address, city, pin code, and state/region. Type in your e mail handle, and supply your phone number. In the top-right corner of the display screen, you must spot a green button that says Register.

Depositing & WIthdrawing money has been made ridiculously easy by Betway India. To deposit, all you have to do is the choose bank from the drop-down menu and locate the deposit button current. After that, enter the mandatory data and enter the quantity you would like to deposit for your gaming.

  • You are truly spoilt for selection in phrases of fee choices here!
  • Launched in 2006, the company operates across a quantity of regulated online markets and holds licences within the UK, Malta, Italy, Denmark, Spain, Belgium, Germany and Ireland.
  • Look at the table beneath for additional details about Betway bonuses.
  • Betway India values its prospects for often betting with them, and so to understand this, theyve created the Betway Plus loyalty program to reward its common punters.
  • Betway virtual on line casino has been serving gambling enthusiasts since 2006.
  • It presents you a one hundred pc matched bonus up to INR 4000, which will maintain the bettors going for some time of their journey.

The operator supplies a number of solutions and is a superb place to gamble on-line on sports, casino games, poker, esports, and horse racing. Put differently, the operator doesnt have distinct intro offers for sports activities punters and on line casino gamers. Furthermore, Betway, being some of the renowned betting websites on the earth, can also be in reside streaming. They have the broadcasting rights for a number of occasions which are streamed stay on their platform once in a while. Check out Funbet, which provides a match bonus of up to Rs.10,000 on sports betting. After youve created your Betway account, you will...

05:43

Betway Evaluation India 2023 h+ Media

Betway Evaluation India 2023

You can now play one of the best titles on the market in Betway casino. Old-school classics and modern fan-favourites like video poker are all on provide. In truth, the number of on line casino games here is absolutely mind-boggling. As quickly as you sit on one, youll be greeted by horny, skilled dealers who will do their greatest for you to enjoy. One of the best stay cricket satta ratesavailable in the meanwhile, Betway allows you to wager on any cricket match you possibly can think of.

  • As for the cricket markets themselves, you will find any and every event possible for you to guess on.
  • Without any doubt, Betway India is amongst the top betting websites in India the place you can go to and revel in a quality-filled betting expertise.
  • With state-of-the-art know-how, youll get to work together with stay sellers.
  • Overall, I advocate Betway, especially for these looking for non-typical betting experiences.

You can relaxation assured that youll be at the forefront of the newest on-line on line casino games with Betway casino. You can download their app from the Play Store or your App store. The download is fast, offered you have good internet connectivity. Customers who do not want to set up the app can continue using their website on their devices as their website is cell pleasant. We recommend customers to download the app as it is meant for cellular and tablet use.

Once credited, the guess have to be redeemed before 30 days of activation. You are allowed to apply your free bet bonus within the line and stay web site sections at any sport type obtainable. It has been working since 2006, and the number of offers it beholds makes it a world-renowned betting web site.

Depending on the tactic used, the withdrawal course of might take longer. Every yr, Betway introduces new features, improves the person experience, and raises the diploma of comfort when enjoying. As such, it may be inconceivable to level out a person whos received the most. Here are three sportsbook options to Betway that bettors may contemplate.

The knowledge offered to deposit and withdrawal is saved non-public and not shared with any third celebration. Once you turn into a Betway buyer, you have seven days to deposit the minimum amount by credit card or PayPal. In a situation the place you didnt tick the bonus checkbox when registering, youll find a way to activate the Betway bonus by way of help to get a solid start at Betway betting. Betway Free Bet Club presents you 500 Free Bets if you bet 500 on doubles or larger on any sport sort.

The on line casino app might be installed very quickly and you can enjoy a seamless mobile betting expertise. Loyalty programme is one division where Betway can undoubtedly step up its game. After all, players favor betting in an environment the place they are rewarded not solely with their winnings however with e...

05:39

The Future of Fintech Applications HackRead | Latest Cybersecurity and Hacking News Site

By Owais Sultan

This article explores the world of fintech applications, highlighting their most popular features now and in the next

This is a post from HackRead.com Read the original post: The Future of Fintech Applications

05:29

New AlienFox toolkit harvests credentials for tens of cloud services Security Affairs

AlienFox is a novel comprehensive toolset for harvesting credentials for multiple cloud service providers, SentinelLabs reported.

AlienFox is a new modular toolkit that allows threat actors to harvest credentials for multiple cloud service providers.

AlienFox is available for sale and is primarily distributed on Telegram in the form of source code archives. Some modules are available on GitHub allowing threat actors to customize their malicious code to suit their needs.

AlienFox allows its operators to harvest API keys and secrets from popular services including AWS SES & Microsoft Office 365.

SentinelLabs has identified a new toolkit dubbed AlienFox that attackers are using to compromise email and web hosting services. AlienFox is highly modular and evolves regularly. Most of the tools are open-source, meaning that actors can readily adapt and modify to suit their needs. Many developers take credit on different iterations of the tools. reads the report published by SentinelLabs. The evolution of recurring features suggests the developers are becoming increasingly sophisticated, with performance considerations at the forefront in more recent versions.

AlienFox targets misconfigured servers running popular web frameworks, including Laravel, Drupal, Joomla, Magento, Opencart, Prestashop, and WordPress. AlienFox collects lists of misconfigured cloud endpoints through security scanning platforms like LeakIX and SecurityTrails.

The malware is able to target secrets for popular cloud-based email platforms, including 1and1, AWS, Bluemail, Exotel, Google Workspace, Mailgun, Mandrill, Nexmo, Office365, OneSignal, Plivo, Sendgrid, Sendinblue, Sparkpostmail, Tokbox, Twilio, Zimbra, and Zoho.

The researchers analyzed AlienFox versions 2 through 4, which date from February 2022 onward.

The oldest variant of the toolset, Version 2 focuses primarily on extracting credentials from web server configuration or environment files. Version 3.x contained the first observed version of the script Lar.py, which allows automation of the extraction of keys and secrets from compromised Laravel .env files. Version 3.x logs the results to a text file along with the targeted server details.

05:00

Why Governments Involvement in Standards Development is Crucial IEEE Spectrum



With the rapid rate of technological advancements and evolution, coupled with urgent global challenges, the worlds need for technical standards has never been greater. Technology standards establish specifications and procedures designed to maximize the reliability of materials, products, methods, and services. In short, standards help increase the reliability and effectiveness of many of the goods and services people interact with daily.

Technical standards also play an important role as governmental bodies around the globe explore and establish policies and regulations to address challenges such as data governance, privacy, security, climate change, and the impact of rapid technological advances on citizens.

Global standards are critical instruments in areas such as innovation, trade, and public policy. But it can be challenging for government representatives to gain access to technical experts, best practices, and other resources needed to help them understand the standardization landscape and navigate issues that arise.

A complex system of standards bodies

One level of complexity governments face is that standards are developed by different types of organizations.

Standards bodies with a geographic designation generally are categorized as international, regional, or national, and they typically function under a nation-centric approach whereby governments, or groups closely coupled to governments, mandate standards.

Technical standards play an important role as governmental bodies explore and establish policies and regulations to address challenges such as data governance, privacy, security, and climate change.

There are also standards-developing bodies with a global technical or industry designation. They include state-independent standards-developing bodies, such as IEEE, with a globally open participation mode.

A program specific to governments

The IEEE Government Engagement Program on Standards helps agencies, commissions, ministries, and regulatory bodies better understand the standards development process. The program facilitates the global interoperability of devices and systems, provides a way to strengthen standards portfolios, and supports efforts to minimize redundant or conflicting standards.

Participation in IEEE GEPS is free, and there are no membership requirements. Participants have observer status...

05:00

NVIDIA 525.105.17 Linux Driver Backports IBT Kernel Compatibility, Other Fixes Phoronix

While last week NVIDIA promoted their 530 Linux driver series to stable, for those using the prior NVIDIA 525 series production branch a new point release was issued today that backports several fixes...

DRAM Got Cheaper and Prices Will Continue to Fall SoylentNews

DRAM got cheaper and prices will continue to fall:

While prices for computer hardware have remained relatively high in the past few years, the slowing of PC and component sales are starting to take effect. DRAM is the latest piece of hardware to become even cheaper, and projections show that prices will continue to fall in the coming months.

According to a report from TrendForce, DRAM prices have fallen 20% in the first quarter of 2023. This is a continued decline for the DRAM market as sales have been slowing for all sectors of the industry. Some DRAM manufacturers have already started layoffs as they see their revenues on a steep decline. For the second quarter of 2023, TrendForce says that prices are expected to fall another 10 to 15%.

Despite production cuts already in effect, PC makers still have between 9 and 13 weeks of DRAM inventory. The mobile sector seems to be having healthier levels of inventory as mobile manufacturers were more conservative in their plans.

Nonetheless, mobile DRAM pricing is also expected to decline by 10 to 15%. As consumer demand for DRAM was sluggish, suppliers looked to the server side of the business for sales, however this simply resulted in a huge pile-up of inventory for server DRAM.


Original Submission

Read more of this story at SoylentNews.

04:55

Vulnerability Enabled Bing.com Takeover, Search Result Manipulation HackRead | Latest Cybersecurity and Hacking News Site

By Habiba Rashid

Cybersecurity researchers at Wiz reported the vulnerability to Microsoft and dubbed the attack "BingBang".

This is a post from HackRead.com Read the original post: Vulnerability Enabled Bing.com Takeover, Search Result Manipulation

04:02

Researchers Detail Severe "Super FabriXss" Vulnerability in Microsoft Azure SFX The Hacker News

Details have emerged about a now-patched vulnerability in Azure Service Fabric Explorer (SFX) that could lead to unauthenticated remote code execution. Tracked as CVE-2023-23383 (CVSS score: 8.2), the issue has been dubbed "Super FabriXss" by Orca Security, a nod to the FabriXss flaw (CVE-2022-35829, CVSS score: 6.2) that was fixed by Microsoft in October 2022. "The Super FabriXss vulnerability

03:47

How To Install LXD on Debian 11 Linux nixCraft

nixCraft Patreon supporters can .
See all Debian/Ubuntu Linux related FAQ

You can install LXD pure-container Debian, Ubuntu, CentOS, Fedora, Alpine, Arch and many other Linux distro. You can mimic AWS or different cloud instance types with LXD for testing and deployment purposes on your development machine. You can also run a GUI app such as Firefox completely isolated using LXD for security or privacy reasons. Let us see how to set up and use LXD on the Debian Linux 11 server or desktop.

Love this? sudo share_on: Twitter - Facebook - LinkedIn - Whatsapp - Reddit

The post How To Install LXD on Debian 11 Linux appeared first on nixCraft.

Thursday, 30 March

11:00

Classification of Identity Management Approaches It Will Never Work in Theory

It's hard to make progress without discussing things, and it's hard to discuss things if you don't agree on terminology. This paper presents a systematic, comprehensible classification of various approaches to identity management, and gives examples (like the two shown below) of where different use cases fit. By creating this, the authors have made it easier for us to see where we agree and disagree, and have also pointed out some interesting gaps in existing approaches. There are (necessarily) a lot of acronyms in the paper, but anyone implementing identity management should read it, and it would be a great starting point for a lecture or two in an undergrad course on system design or software architecture.

Examples of identity management classifications

Daniela Phn and Wolfgang Hommel. IMC: a classification of identity management approaches. 2023. arXiv:2301.00444.

This paper presents a comprehensive classification of identity management approaches. The classification makes use of three axes: topology, type of user, and type of environment. The analysis of existing approaches using the resulting identity management cube (IMC) highlights the trade-off between user control and trust in attributes. A comparative analysis of IMC and established models identifies missing links between the approaches. The IMC is extended by a morphology of identity management, describing characteristics of cooperation. The morphology is then mapped to the life cycle of users and identity management in a further step. These classifications are practically underlined with current approaches. Both methods combined provide a comprehensive characterization of identity management approaches. The methods help to choose suited approaches and implement needed tools.

IndyWatch Science and Technology News Feed Archiver

Go Back:30 Days | 7 Days | 2 Days | 1 Day

IndyWatch Science and Technology News Feed Today.

Go Forward:1 Day | 2 Days | 7 Days | 30 Days

IndyWatch Science and Technology News Feed was generated at World News IndyWatch.

Resource generated at IndyWatch using aliasfeed and rawdog