IndyWatch Science and Technology News Feed Archiver

Go Back:30 Days | 7 Days | 2 Days | 1 Day

IndyWatch Science and Technology News Feed Today.

Go Forward:1 Day | 2 Days | 7 Days | 30 Days

IndyWatch Science and Technology News Feed was generated at World News IndyWatch.

Wednesday, 05 April

03:47

Finland Joins NATO cryptogon.com

Via: Reuters: Finland formally joined NATO on Tuesday, its flag unfurling outside the military blocs Brussels headquarters, in a historic policy shift brought on by Russias invasion of Ukraine, drawing a threat from Moscow of counter-measures. Finlands accession, ending seven decades of military non-alignment, roughly doubles the length of the border that the North Atlantic []

03:34

Robert Maxwell Goes to Texas: The Story of Bluebonnet cryptogon.com

Via: Unlimited Hangout: Understanding Bluebonnet requires unpacking a tangled and diffuse web of fraudsters, intelligence assets, bankers and real estate developers who together rampaged across Texas and surrounding states during the mid-1980s, bilking and crashing a near-limitless number of thrifts and related lending institutions in a then-unprecedented spree of brazen financial crime. Much of this []

03:27

Genetic analysis tool developed to improve cancer modeling Lifeboat News: The Blog

Lifestyle behaviors such as eating well and exercising can be significant factors in ones overall health. But the risk of developing cancer is predominantly at the whim of an individuals genetics.

Our bodies are constantly making copies of our to produce new cells. However, there are occasional mistakes in those copies, a phenomenon geneticists call mutation. In some cases, these mistakes can alter proteins, fuse genes and change how much a gene gets copied, ultimately impacting a persons risk of developing cancer. Scientists can better understand the impact of mutations by developing predictive models for tumor activity.

Christopher Plaisier, an assistant professor of biomedical engineering in the Ira A. Fulton Schools of Engineering at Arizona State University, is developing a called OncoMerge that uses genetic data to improve cancer modeling technology.

03:27

Serotonin gates the transfer of visual information from the eyes to the thalamus Lifeboat News: The Blog

Humans are known to perceive the environment around them differently based on the situation they are in and their own feelings and sensations. Internal states, such as fear, arousal or hunger can thus affect the ways in which sensory information is processed and registered by the brain.

Researchers at Beth Israel Deaconess Medical Center, Boston Childrens Hospital, and Peking University have recently carried out a study investigating the possible effects of , a neurotransmitter known to regulate sleep, mood, , and other inner states, in the processing of visual information. Their findings, published in Neuron, suggest that serotonergic neurons in the brainstem (i.e., the central trunk of the mammalian brain) gate the transfer of visual information from the eyes to the thalamus, an egg-shaped area of the brain.

Internal states are known to affect sensory perception and processing, but this was generally thought to occur in the cortex or thalamus, Chinfei Chen, one of the researchers who carried out the study, told Medical Xpress. One of our previous studies revealed that arousal can suppress certain visual information channels at an earlier stage of the visual pathwayat the connection between the mouse retina and the thalamus, before the information even reaches the brain. This form of filtering of information suggests a very efficient means of processing only relevant information.

03:26

Wired-up symbiotic multi-organism can turn sunlight and air into valuable proteins Lifeboat News: The Blog

Symbiont could enable microfactories to produce biochemicals for food, farming and drugs.

03:26

Scientists find deepest fish ever recorded at 8,300 metres underwater near Japan Lifeboat News: The Blog

Footage of unknown snailfish captured by researchers from Western Australia and Tokyo in Izu-Ogasawara trench.

03:25

A new mitochondrial theory of Alzheimers deserves serious attention Lifeboat News: The Blog

A grand unifying theory of brain ageing suggests malfunctioning mitochondria might be to blame for Alzheimers and other brain conditions. And this new avenue of exploration already has some potential therapies at the ready.

03:25

Room-Temperature Superconductor Discovery Meets With Resistance Lifeboat News: The Blog

A paper in Nature reports the discovery of a superconductor that operates at room temperatures and near-room pressures. The claim has divided the research community.

03:22

Why Are Many Technology Leaders Calling For An AI Halt? Lifeboat News: The Blog

An open letter signed by more than 1,100 technology and business industry leaders calls for a six-month moratorium on the race to develop artificial intelligence (AI), and in particular large language models like ChatGPT-4.


ChatGPT-4 is an example of AI exhibiting human-competitive intelligence and poses a risk to humanity without managed care.

03:00

Supercon 2022: Chris Combs Reveals His Art-World Compatibility Layer Hackaday

[Chris Combs] is a full time artist who loves using technology to create unique art projects and has been building blinky artwork since about a decade now. In his 2022 Supercon talk Art-World Compatibility Layer: How to Hang and Sell Your Blinky Goodness as Art (Slides, PDF), [Chris] takes us behind the scenes and shows us how to turn our blinky doodads in to coveted art works. There is a big difference between a project that just works, and a work of art, and its the att...

02:54

FTC Chair Refused Musk's Meeting Request, Told Him to Stop Delaying Investigation SoylentNews

https://arstechnica.com/tech-policy/2023/03/ftc-chair-refused-musks-meeting-request-told-him-to-stop-delaying-investigation/

Twitter owner Elon Musk requested a meeting with Federal Trade Commission Chair Lina Khan late last year, but he was rebuffed and told to stop dragging his heels on providing documents and depositions needed for the FTC investigation into Twitter's privacy and data practices, a New York Times report said yesterday.

"In a Jan. 27 letter declining the meeting, Ms. Khan told a Twitter lawyer to focus on complying with investigators' demands for information before she would consider meeting with Mr. Musk," the NYT wrote.

Twitter has to comply with conditions in a May 2022 settlement in which it agreed to pay a $150 million penalty for targeting ads at users with phone numbers and email addresses collected from those users when they enabled two-factor authentication. Last year's settlement was reached after the FTC said Twitter violated the terms of a 2011 settlement that prohibited the company from misrepresenting its privacy and security practices.

Related:
FTC Fines Twitter $150M for Using 2FA Info for Targeted Advertising (20220527)
Twitter Faces FTC Probe, Likely Fine Over Use of Phone Numbers for Ads (20200804)


Original Submission

Read more of this story at SoylentNews.

01:57

Learn From the Best Minds in Commercial Robotics Development IEEE Spectrum



This sponsored article is brought to you by Robotics Summit & Expo.

The Robotics Summit & Expo, taking place May 10-11 at the Boston Convention Center, will bring together the brightest minds in robotics to share their commercial robotics development experiences.

Learn from industry-leading speakers, build new relationships by networking, see demos from 150+ exhibitors showcasing enabling technologies to help build commercial robots.



Event logo has white and gray geometric figure on the left and on the right the words Robotics Summit & Expo in black and red.Use code IEEE25 at checkout to save 25% off your full conference pass!

The conference programming will provide professionals the information they need to successfully develop the next generation of commercial robots. This years program has an exceptional lineup of speakers.

The Robotics Summit keynote speakers include the following:

  • Howie Choset, Professor of Robotics, Carnegie Mellon University: Idea to Reality: Commercializing Robotics Technologies
  • Laura Major, CTO, Motional: Scalable AI Solutions for Driverless Vehicles
  • Marc Raibert, Executive Director, AI Institute: The Next Decade in Robotics
  • Martin Buehler, Global Head of Robotics R&D, Johnson & Johnson MedTech: The Future of Surgical Robotics
  • Nicolaus Radford, CEO, Nauticus Robotics: Developing Robots for Final Frontiers

The expo hall at the Robotics Summit will have more than 150 exhibitors showcasing their latest enabling technologies, products and services that can help robotics engineers throughout their development journey.

The Robotics Summit also offers networking opportunities, a Career Fair, a robotics development challenge and much more.


...

01:48

CISA adds Zimbra bug exploited in attacks against NATO countries to its Known Exploited Vulnerabilities catalog Security Affairs

US CISA has added a Zimbra flaw, which was exploited in attacks targeting NATO countries, to its Known Exploited Vulnerabilities catalog

U.S. Cybersecurity and Infrastructure Security Agency (CISA) has added a Zimbra flaw, tracked as CVE-2022-27926, to its Known Exploited Vulnerabilities Catalog.

The CVE-2022-27926 flaw affects Zimbra Collaboration version 9.0.0, which is used to host publicly-facing webmail portals.

Proofpoint researchers recently reported that a Russian hacking group, tracked as Winter Vivern (aka TA473), has been actively exploiting vulnerabilities (CVE-2022-27926) in unpatched Zimbra instances to gain access to the emails of NATO officials, governments, military personnel, and diplomats.

The attacker can also use the compromised accounts to carry out lateral phishing attacks and further infiltrate the target organizations

TA473 targeted US elected officials and staffers since at least February 2023. The threat actors created bespoke JavaScript payloads designed for each government targets webmail portal.

TA473s cyber operations align with the support of Russian and/or Belarussian geopolitical goals.

Researchers have observed TA473, a newly minted advanced persistent threat (APT) actor tracked by Proofpoint, exploiting Zimbra vulnerability CVE-2022-27926 to abuse publicly facing Zimbra hosted webmail portals. The goal of this activity is assessed to be gaining access to the emails of military, government, and diplomatic organizations across Europe involved in the Russia Ukrainian War. reads the post published by Proofpoint.

The JavaScript payloads were designed to conduct Cross Site Request Forgery attacks and steal usernames, passwords, and store active session and CSRF tokens from cookies facilitating the login to publicly facing target webmail portals.

These payloads allow actors to steal usernames, passwords, and store active session and CSRF tokens from cookies allowing the login to publicly facing vulnerable webmail portals belonging to target organizations.

The APT group uses scanning tools like Acunetix to identify unpatched webmail platforms used by target organizations.

The threat actors send phishing email from a compromised address, which is spoofed to appear as someone r...

01:35

System76 Teases Their "Virgo" In-House Manufactured Laptop Phoronix

While for a number of years now System76 has manufactured their own Thelio desktop line of Linux PCs from their facility in Denver, Colorado (and their Launch Keyboard), they have long talked up ambitions for eventually manufacturing their own Linux laptops rather relying on other white-label manufacturers as they currently do. Today a first glimpse of their in-house laptop prototyping was shared,..

01:30

New Expansion Module Brings Standard Slots to Ancient Laptop Hackaday

An expansion board with two 8-bit ISA slots plugged into a Sharp laptop

Upgrading and repairing vintage laptops is often a challenge even if their basic hardware is compatible with ordinary PCs, they often use nonstandard components and connectors due to space constraints. The Sharp PC-4600 series from the late 1980s is a case in point: although it comes with standard serial and parallel ports, the only other external interface is a mysterious connector labelled EXPBUS on the back of the case. [Steven George] has been diving into the details of this port and managed to design a module to turn it into a pair of standard ISA ports.

Apparently, no peripherals were ever released for the EXPBUS port, so reverse-engineering an existing module was out of the question. [Steven] did stumble upon a service manual for the PC-4600 however, and as it turned out, the connector carried all the signals present in an 8-bit ISA bus. Turning it into something useful was simply a matter of designing an adapter board with the EXPBUS connector on one side and regular ISA slots on the other.

...

01:24

Crystal impervious to radiation could be used in spaceship computers Lifeboat News: The Blog

Putting two forms of semiconductor material called gallium oxide together seems to make it completely resistant to radiation.

By Alex Wilkins

01:24

Plastic transistor amplifies biochemical sensing signal Lifeboat News: The Blog

The molecules in our bodies are in constant communication. Some of these molecules provide a biochemical fingerprint that could indicate how a wound is healing, whether or not a cancer treatment is working or that a virus has invaded the body. If we could sense these signals in real time with high sensitivity, then we might be able to recognize health problems faster and even monitor disease as it progresses.

Now Northwestern University researchers have developed a new technology that makes it easier to eavesdrop on our bodys inner conversations.

While the bodys chemical signals are incredibly faintmaking them difficult to detect and analyzethe researchers have developed a new method that boosts signals by more than 1,000 times. Transistors, the building block of electronics, can boost weak signals to provide an amplified output. The new approach makes signals easier to detect without complex and bulky electronics.

01:24

The quantum revolution: Brain waves Lifeboat News: The Blog

Presented by Madhumita Murgia and John Thornhill, produced by Josh Gabert-Doyon and Edwin Lane. Executive producer is Manuela Saragosa. Sound design by Breen Turner and Samantha Giovinco. Original music by Metaphor Music. The FTs head of audio is Cheryl Brumley. Special thanks to The Hospital for Sick Children.

Were keen to hear more from our listeners about this show and want to know what youd like to hear more of, so were running a survey which you can find at ft.com/techtonicsurvey. It takes about 10 minutes to complete and you will be in with a chance to win a pair of Bose QuietComfort earbuds.

Read a transcript of this episode on FT.com.

01:20

The 2023 Debian Project Leader election LWN.net

The first call for votes for the 2023 Debian Project Leader election has gone out. The campaigning was easy to miss this year, for one simple reason: the current incumbent, Jonathan Carter, is running unopposed for another term. That suggests that turnout will be low this time but, as several developers have pointed out, there is still value in voting; it clarifies whether Carter still has the support of the project.

01:00

Ending an Ugly Chapter in Chip Design IEEE Spectrum



Discussions at chip design conferences rarely get heated. But a year ago at the International Symposium on Physical Design, things got out of hand. It was described by observers as a trainwreck and an ambush. The crux of the clash was whether Googles AI solution to one of chip designs thornier problems was really better than humans or state-of-the-art algorithms. It pitted established male EDA experts against two young female Google computer scientists, and the underlying argument had already led to the firing of one Google researcher.

This year at that same conference, a leader in the field, IEEE Fellow Andrew Kahng, hoped to put an end to the acrimony once and for all. He and colleagues at University of California, San Diego delivered what he called an an open and transparent assessment of Googles reinforcement its process, called Circuit Training, and reverse-engineering some parts that were not clear enough for Kahngs team, they set reinforcement learning against a human designer, commercial software, and state-of-the-art academic algorithms. Kahng declined to speak with IEEE Spectrum for this article, but he spoke to engineers last week at ISPD, which was held virtually.

In most cases, Circuit Training was not the winner, but it was competitive. Thats especially notable given that the experiments did not allow Circuit Training to use its signature abilityto improve its performance by learning from other chip designs.

Our goal has been clarity of understanding that will allow the community to move on, he told engineers. Only time will tell whether it worked.

The Hows and the Whens

The problem in question is called placement. Basically, it is the process of determining where chunks of logic or memory should be placed on a chip in order to maximize the chips operating frequency while minimizing its power consumption and the area it takes up. Finding an optimal solution to this puzzle is among the most difficult problems around, with more possible permutations than the game Go.

But Go was ultimately defeated by a type of AI called deep reinforcement learning, and thats just what former Google Brain researchers Azailia Mirhoseini and Anna Goldie applied to the placement problem. The scheme, then called Morpheus, treats placing large pieces of circuitry, called macros, as a game, learning to find an op...

00:58

Music Labels Win Legal Battle Against Youtube-dls Hosting Provider TorrentFreak

uberspaceThe major record labels dont want the public to download music from YouTube, which is common practice for millions of people.

To stop this, the music industry titans deployed a variety of legal tactics around the world. They obtained site-blocking orders, for example, and have taken on stream-ripping sites such as 2Conv and Yout.com directly in court.

Youtube-dl Takedown Battle

In late 2020, the open-source software youtube-dl was added to the list of targets. The tool is used by many stream-ripping sites and was freely available on GitHub. The RIAA asked the developer platform to take youtube-dl offline, arguing that it violates the DMCAs anti-circumvention provision.

GitHub initially complied with the takedown request but after public outrage and involvement from digital rights groups including the EFF, the decision was eventually reversed. GitHub went on to put $1 million into a takedown defense fund.

ytdl

While this series of events represented a setback, the record labels didnt back off. Instead, they set their sights on youtube-dls website hosting provider Uberspace.

The RIAA had already sent cease-and-desist orders to the hosting company in 2020, before it approached GitHub. Uberspace didnt take any action at the time; the youtube-dl website it hosted was not the host of the youtube-dl software. The website carried links to the software and that was hosted elsewhere.

Labels Sue Uberspace in Germany

Last year, Sony Entertainment, Warner Music Group and Universal Music...

00:23

3CX Supply chain attack allowed targeting cryptocurrency companies Security Affairs

Threat actors behind the 3CX supply chain attack have targeted a limited number of cryptocurrency companies with a second-state implant.

As of Mar 22, 2023, SentinelOne observed a spike in behavioral detections of the 3CXDesktopApp, which is a popular voice and video conferencing software product.

The products from multiple cybersecurity vendors started detecting the popular software as malware suggesting that the company has suffered a supply chain attack.

SentinelOne is tracking the malicious activity as SmoothOperator, the company speculates that the threat actor behind the attack has set up its infrastructure starting as early as February 2022.

The company started distributing digitally signed Trojanized installers to its customers.

The impact of the attack could be devastating because the company claims that 3CX has 600,000 customer companies with 12 million daily users. The software is used by organizations in almost every industry, including automotive, food & beverage, hospitality, Managed Information Technology Service Provider (MSP), and manufacturing.

Researchers from Kaspersky discovered that the supply chain attack was used to deliver a backdoor tracked by the Russian firm as Gopuram. The Gopuram backdoor was first discovered by Kaspersky in 2020, but the researchers observed a surge in the number of infections in March 2023, likely coinciding with the attack on 3CX.

While investigating an attack on a Southeast Asian cryptocurrency company in 2020, the researchers noticed the presence of the AppleJeus backdoor on systems infected with Gopuram backdoor. AppleJeus is known to be a backdoor used by North Korea-linked Lazarus APT Group.

The Gopuram backdoor was employed in other attacks on organizations in the cryptocurrency industry, which is aligned with the interests of the Lazarus threat actor.

Upon executing the Gopuram backdoor, the malware connects to a C2 server and await further commands. The backdoor is able to launch at least eight in-memory modules.

The backdoor implements commands that allow the attackers to interact with the victims file system and create processes on the infected machine. Gopuram was additionally observed to launch in-memory modules. reads the analysis published by Kaspersky. Just like the implants used in the 3CX campaign, Gopurams modules are DLL files th...

00:13

New Chipset Could Finally Make It Easier to Build Budget Ryzen 7000 PCs SoylentNews

A620 chipset is missing features, but (mostly) not the important ones:

If you're trying to build a low-end to midrange gaming PC or workstation with inexpensive but modern parts, it has been hard to recommend AMD's Ryzen 7000-series processors. That's partly because Intel's CPUs have offered more cores for similar money, but motherboards with AMD's socket AM5 have remained stubbornly expensive, and their lack of support for DDR4 memory means you'll pay more to get DDR5 RAM.

That may change somewhat thanks to the new entry-level AMD A620 chipset, which the company quietly announced last week. AMD says it should bring the prices of AM5-based motherboards down to around $85, not far north of what low-end Intel-based H610 and B660 motherboards cost, though they'll still require DDR5 (for the DDR5-6000 that AMD recommends for optimal Ryzen performance, the price premium is still not quite double what you'll pay for the same amount of DDR4-3200).

Compared to X670 and B650-based motherboards, A620 chipsets will have more limited connectivity. There's no PCI Express 5.0 support at all for either graphics cards or SSDsnot a huge blow since no GPUs and few SSDs support PCIe 5.0 at this point anyway, but a step back for future-proofing. The processor will still provide enough PCIe 4.0 lanes for a GPU and a single SSD, but the chipset only supports PCIe 3.0 speeds for additional SSDs. The chipset also supports fewer USB ports overall and no 20Gbps USB ports.

Perhaps more significantly, A620 chipsets don't support any kind of processor overclocking, nor do they support the Precision Boost Overdrive (PBO) or Curve Optimizer features for automated overclocking or undervolting. This is consistent with past AMD A-series chipsets and non-Z-series Intel chipsets, which have also limited their support for overclocking features. AMD says that memory overclocking will still be supported by "most [motherboard] models."

[...] AMD says that more A620-based boards are coming from the usual suspectsASRock, Asus, Gigabyte, MSI, and Biostar are all planning to release a range of A620 motherboard options.


Original Submission

Read more of this story at SoylentNews.

00:00

The Liquid Trees of Belgrade: The Facts Behind The Furore Hackaday

Historically, nature has used trees to turn carbon dioxide back into oxygen for use by living creatures. The trees play a vital role in the carbon cycle, and have done so for millennia. Recently, humans have thrown things off a bit by getting rid of lots of trees and digging up a lot more carbon.

While great efforts are underway to replenish the worlds tree stocks, Belgrade has gone in a different direction, creating artificial liquid trees to capture carbon dioxide instead. This has spawned wild cries of dystopia and that the devices are an affront to nature. Lets sidestep the hyster...

Go Back:30 Days | 7 Days | 2 Days | 1 Day

IndyWatch Science and Technology News Feed Today.

Go Forward:1 Day | 2 Days | 7 Days | 30 Days

Tuesday, 04 April

23:51

Sorting Through Haystacks to Find CTI Needles The Hacker News

Clouded vision CTI systems are confronted with some major issues ranging from the size of the collection networks to their diversity, which ultimately influence the degree of confidence they can put on their signals. Are they fresh enough and sufficiently reliable to avoid any false positives or any poisoning? Do I risk acting on outdated data? This difference is major since a piece of

23:44

Security updates for Tuesday LWN.net

Security updates have been issued by Fedora (openbgpd and seamonkey), Red Hat (httpd:2.4, kernel, kernel-rt, and pesign), SUSE (compat-openssl098, dpdk, drbd, ImageMagick, nextcloud, openssl, openssl-1_1, openssl-3, openssl1, oracleasm, pgadmin4, terraform-provider-helm, and yaml-cpp), and Ubuntu (haproxy, ldb, samba, and vim).

23:30

Intel Posts Xe DRM Scheduler Patches For Review Phoronix

As part of the process for getting Intel's new Xe DRM kernel driver upstreamed as the eventual replacement to the existing i915 driver for Gen12 graphics hardware and newer, Intel engineers on Monday posted the initial Xe DRM scheduler patches that have been separated out to get review on them, figure out what can be common/shared among drivers, and get those bits upstreamed...

23:16

Rorschach Ransomware Emerges: Experts Warn of Advanced Evasion Strategies The Hacker News

Cybersecurity researchers have taken the wraps off a previously undocumented ransomware strain called Rorschach that's both sophisticated and fast. "What makes Rorschach stand out from other ransomware strains is its high level of customization and its technically unique features that have not been seen before in ransomware," Check Point Research said in a new report. "In fact, Rorschach is one

23:07

New Rilide Malware Targeting Chromium-Based Browsers to Steal Cryptocurrency The Hacker News

Chromium-based web browsers are the target of a new malware called Rilide that masquerades itself as a seemingly legitimate extension to harvest sensitive data and siphon cryptocurrency. "Rilide malware is disguised as a legitimate Google Drive extension and enables threat actors to carry out a broad spectrum of malicious activities, including monitoring  browsing history, taking screenshots,

23:01

Automate PostgreSQL database deployment using RHEL System Roles Linux.com

The new PostgreSQL System Role helps speed and simplify deployment and management of PostgreSQL servers in Red Hat Enterprise Linux (RHEL).

Read More at Enable Sysadmin

The post Automate PostgreSQL database deployment using RHEL System Roles appeared first on Linux.com.

22:33

Updated NVIDIA Turing Firmware Published For Open-Source Nouveau Driver Phoronix

NVIDIA has published updated NVIDIA TU10x /TU11x "Turing" GPU firmware to support newer RTX 20 hardware revisions and fix outstanding issues affecting the open-source Nouveau driver...

22:23

Prevent and detect Adobe ColdFusion exploitation (CVE-2023-26360, CVE-2023-26359) Help Net Security

When Adobe released security updates for its ColdFusion application development platform last month, it noted that one of the vulnerabilities (CVE-2023-26360) had been exploited in the wild in very limited attacks. Were your servers among those hit? And what should you do if they were? About CVE-2023-26360 (and CVE-2023-26359) CVE-2023-26360 is an improper access control vulnerability that could result in arbitrary code execution in the context of the current user, and was reported to Adobe More

The post Prevent and detect Adobe ColdFusion exploitation (CVE-2023-26360, CVE-2023-26359) appeared first on Help Net Security.

22:17

GPT: Where are we in the food chain? the loose wire blog

On November 29 2022 I implored the tech world to bring on winter: Were out of good ideas. I should have kept my mouth shut: The next day ChatGPT was unleashed on the public, and we havent paused for breath since. I believe we users need to contribute more to the debate and figure out where we stand, and what we stand for.

The mad rush to compete in this space means the big players are rolling their AIs out not only before theyre ready, but silly money is being thrown at startups promising exploitation of these tools. A massive land-grab is taking place, with little idea of the consequences and with the ink of some 155,000 tech layoff slips barely dry.

I wish I could be more sanguine. Ive always loved technology, and I am absolutely bowled over by the latest iteration of ChatGPT, GPT-4. Everyone else has been writing about their experiences with it, so I wont bore you with mine, but theres no question were in Kansas anymore. This technology will change a lot. A LOT.

But we need to keep our eye on the ball. Some have called for a moratorium, which is at best naive and at worst giving the industry too much credit for a sense of responsibility. Thats not what is going on here. Its money.

Man watching ball, craiyon.com

The ball we need to keep an eye on is market (and political, but well leave for later) power, and we should be watching it carefully as it shifts. It doesnt shift far, but it is shifting. We are not witnessing disruption in the sense that Clayton Christensen defined it, were...

21:53

PowerDNS Security Advisory 2023-02: Deterred spoofing attempts can lead to authoritative servers being marked unavailable Open Source Security

Posted by Otto Moerbeek on Apr 04

Hello,

We have released PowerDNS Recursor 4.6.6, 4.7.5 and 4.8.4 due to
a low severity security issue found.

Please find the full text of the advisory below.

The [1]4.6, [2]4.7 and [3]4.8 changelogs are available.

The [4]4.6.6 ([5]signature), [6]4.7.5 ([7]signature) and
[8]4.8.4 ([9]signature) tarballs are available from our download
[10]server. Patches are available at [11]patches. Packages for various
distributions...

21:28

Are Your Strawberries Bland? Pesticides Could be to Blame SoylentNews

Strawberries tend to be blander and less nutritious when treated with particular pesticides:

Have you ever bitten into a plump, red strawberry, only to find it bland and watery? Certain pesticides might be responsible. A team reporting in ACS' Journal of Agricultural and Food Chemistry has found that two common strawberry fungicides can impact cellular mechanisms, creating berries with subdued flavor and sweetness, as well as a lower nutritional value.

The flavor profile of any produce, including berries, is a result of its taste and smell sweetness often arises from the amount of dissolved glucose or fructose, and a unique aroma comes from volatile compounds, such as esters and terpenes. In addition, many fruits are also full of nutrients, including vitamin C, folic acid and antioxidants. But because fungicides are designed to disrupt the cellular processes of detrimental fungi, they could accidentally interfere with these processes in crops, inhibiting production of these important flavor and nutritional compounds. So, Jinling Diao and colleagues wanted to investigate how two common pesticides used on strawberries boscalid (BOS) and difenoconazole (DIF) affect specific molecular pathways in berries.

[...] Looking more closely, the team found that BOS had a direct effect on the regulation of genes involved in cellular pathways related to producing sugars, volatile compounds, nutrients and amino acids. Finally, in a blind taste test, people consistently preferred the untreated strawberries. The researchers say that this work could provide guidance to farmers about the use of pesticides.

The researchers found that, despite having the same size and color of untreated strawberries, the ones treated with the pesticides had lower levels of soluble sugar and nutrients, the sugars were converted into acids, and the amounts of volatile compounds changed, which subdued the taste and aroma.

Journal Reference:
Yuping Liu, Rui Liu, Yue Deng, et al., Insights into the Mechanism of Flavor Loss in Strawberries Induced by Two Fungicides Integrating Transcriptome and Metabolome Analysis, J. Agric. Food Chem. 2023, 71, 8, 39063919, 2023 https://doi.org/10.1021/acs.jafc.2c08157


Original Submission

Read more of this story at SoylentNews.

21:24

On-line Casino Money Back From Online Gambling h+ Media

On-line Casino Money Back From Online Gambling

The max bonus amount for the 1st deposit is $100, for the 2nd deposit $100 and for the 3rd deposit $100. The minimum deposit thats eligible for the bingo bonus is $25. The casino partners with a number of E-Wallet firms that may permit you to switch the amount you want into your casino account. Transfers from E-Wallet to the casino account take a short amount of time to complete. In the unlikely event that you run into an issue while at the Mr Green Sports site, the client care staff is available 24/7 and available via reside chat, e mail, and get 1xbet bonus code 131% for new customers phone. You can also send them a message by way of a textual content box within the Help section of the site, together with your consumer ID automatically connected.

You can be reach them by e-mail as nicely as being called via local telephone numbers. Mr Greens Live Casino will get a player up close to the action with the assistance of the HD quality and numerous camera angles in addition to offering a slow-motion replay if needed. There is also an assorted vary of betting limits provided across all tables, with low stakes options and high limits alongside. There can also be a Gold Card Bonus where youll find a way to play the exclusive live blackjack desk during the weekend.

The account verification is a standard process of each on line casino these days and they deal with players privacy with the utmost confidentiality. The addContent of documents is safe and their use is restricted solely to a handful of people in management of carrying out the verifications. Once the request has been made the on line casino needs to course of and approve your request. According to the on line casino, it could occur in a few seconds, however the timeframe is highly dependent on your account verification standing, the quantity requested, and the payment method.

Then here you will find all the information about the best Pay n Play on line casino obtainable in New Zealand. We can safely conclude that they managed to attempt this and the website is highly safe for anyone enjoying there. The operator made certain to acquire the license of the Malta Gaming Authority, which is the playing commission that issued licenses for so much of reputable platforms on the market. A reputable on-line playing operator needs to be on the players disposal at any given second. You can not predict when you ought to have a problem with how the platform works, or a query to ask in regards to the website.

  • There are additionally many purposes that make life easier for us every day like Mr Green App that may be downloaded.
  • All on-line UK Casino should abide by the Data Protection Act, which is significant as youll be asked to share your personal and banking particulars.
  • This gamesite also...

21:22

Mr Green Why You Should Choose This Casino h+ Media

Mr Green Why You Should Choose This Casino

Many players are huge followers of the pokies video games that are primarily based on the popular Marvel comedian collection. TheMr Green Live Casinooffers an in depth range of games all streamed stay from a purpose-built studio and dealt by professional sellers. The games on provide embody numerous totally different blackjack and roulette video games, baccarat, Caribbean stud poker, casino holdem, Texas Holdem and 3-card poker. In the menu on the primary web page, a participant can simply find a part with sports activities betting, where there might be an option of having a bet without having to create a second account.

It can detect when a participant is falling into a threat zone and help them change for the better. Responsible betting is all about being in charge of how a lot, when, and tips on how to wager. An accountable gambler begins by identifying the proper bets and sticks to their budget via proper bankroll administration. They are additionally aware of the wagering situations to allow them to implement strategies with out involving their emotions. Because eSports is a fancy subject, Mr Green lays out betting ideas to help new players sharpen their abilities.

The on-line on line casino and its producers Kambi Gaming knew it very well have offered Mr Green cell on line casino for the shoppers which may be downloaded free of charge from Play Store or App Store. Ultimately, the bonus provides, incredible games choice, and high quality list of buyer assist and fee options make the positioning a valuable find. Some of the primary choices include sports activities betting, stay casino, and on line casino games, and the bonus can be utilized by your preference.

It provides free, unbiased and private help on all elements of problems with gambling on their website. Banking options are covered extensively on Mr Greens help centre, everything from withdrawals, deposits and proof of identification. Also, it allows e-banking like credit card or eWallet transactions. It has become the accepted standard for casinos to have 24/7 reside chatrooms out there for his or her players. Mr Green Casino does not have a live chat room theyre out there a assist centre team to obtain and reply any questions 24/7.

Although its barely different to the desktop page, the cellular web site is still easy to navigate. If you take pleasure in enjoying at on-line casinos on your smartphone or tablet, the Mr Green Casino website for cell browsers is amongst the very best around. Mr Green not just provides a welcome bonus however has many ongoing promotional presents for its gamers. Each time you log into your account and play, you will earn entries in weekly drawings in your free casino credit. Mr Green has a loyalty reward program on a person foundation based mostly on the way you play.

Sensitive info that has to do along with your banks is the primary target of cybe...

21:19

Mr Green On Line Casino Evaluate & Score Is Mr Geen Protected & Fair? h+ Media

Mr Green On Line Casino Evaluate & Score Is Mr Geen Protected & Fair?

The max bonus amount for the first deposit is $100, for the 2nd deposit $100 and for the 3rd deposit $100. The minimum deposit thats eligible for the bingo bonus is $25. The on line casino companions with several E-Wallet companies that will allow you to switch the amount you need into your casino account. Transfers from E-Wallet to the on line casino account take a short period of time to finish. In the unlikely occasion that you just run into a problem whereas on the Mr Green Sports web site, the shopper care staff is readily available 24/7 and obtainable via live chat, email, and telephone. You also can send them a message through a textual content field within the Help part of the positioning, with your consumer ID routinely attached.

  • Their web sites are absolutely optimized for mobile gaming, but solely permit direct entry by way of the browser.
  • Which means having a comprehensivelive casinoplatform for their players enjoyment.
  • We have accomplished thorough research on all operators we recommend to guarantee that the information conveyed to you is related, and for the purposes of wagering for entertainment needs.
  • Alternatively, you probably can playweb-based versions of all Mr Green mobile slotsdirectly in the browser of any smartphone or pill, by going to on line casino.mrgreen.com.

When youre on the app, youll discover the latest promotions, essentially the most famend games, and the chance to search for your favorite on line casino game at the high of the web page. Gambling is genuinely online when youll have the ability to totally rely on iPhone Casinos with out bothering about downloads or in-phone storage. Before getting into your data into a web-based betting web sites database, double-check the manner of operation. Any restriction on the variety of games you could play in your ultra-smooth smartphone is certain to be a bummer. You dont desire the identical situations in terms of iPhone casinos.

Video Games Available Right Here

My ac is verified and if I request withdrawal at 9pm its often in my account by 4pm the next day. Ive had a couple of concern re deposit restrict not refreshing however nothing main. Service-wise, the members have a incredible array of promotions and great customer assist. Even though the banking choices are minimal, they are a minimal of the more common cost companies that get used on-line. Their accountable gaming feature permits gamers to set limits on what is banked as deposits and what time they can be spent when playing on the positioning. The wagering requirement we mentioned works in conjunction with your capacity to withdraw any winnings made with the bonus money.

The registration, deposit and the primary few rounds with slot machines and reside on line casino went well as expected. The o...

21:00

Open-Source FaceID With RealSense Hackaday

Screenshot of the demonstration video that shows the desktop being unlocked with face recognition, with a camera feed and a terminal showing how the software works.

RealSense cameras have been a fascinating piece of tech from Intel weve seen a number of cool applications in the hacker world, from robots to smart appliances. Unfortunately Intel did discontinue parts of the RealSense lineup at one point, specifically the LiDAR and face tracking-tailored models. Apparently, these havent been popular, and we havent seen these in hacks either. Until now, that is. [Lina] brings us a real-world application for the RealSense face tracking cameras, a FaceID application for Linux.

The project is as simple as it sounds: if the cameras built-in face recognition module recognizes you, your lockscreen is unlocked. With the target being Linux, it has to tie into the Pluggable Authentication Modules (PAM) subsystem for authentication, and of course, theres a PAM module for RealSense to go with it, aptly named pam_sauron. This module is written in Zig, a modern C-like language, so its both a good example of how to create your own PAM in...

21:00

Initial Support For AMD's Next-Gen, Multi-XCC CDNA Accelerator Starting With Linux 6.4 Phoronix

As I pointed out at the end of March, AMD has begun bringing up a new CDNA GPU in their Linux kernel driver code, past the currently known Instinct MI300 "GFX940" series. This "GFX943" part is some new CDNA multi-XCC accelerator and the open-source AMD engineers have begun posting many patches for this new GPU target. The initial bits of that support will appear in the upcoming Linux 6.4 cycle...

20:42

RADV Sees Experimental Fragment Shader Interlock - Important For Emulators, D3D12 Phoronix

A currently-testing implementation of VK_EXT_fragment_shader_interlock has been published for Mesa's Radeon Vulkan "RADV" driver. This Vulkan fragment shader interlock support is used by some game emulators as well as being useful in running Direct3D 12 atop Vulkan and similar purposes...

20:22

xf86-input-libinput 1.3 Brings Custom Pointer Acceleration Profile Support Phoronix

Peter Hutterer, Red Hat's leading Linux input expert, today X.Org Server driver for making use of libinput in an X.Org Server world...

20:08

Arid Viper Hacking Group Using Upgraded Malware in Middle East Cyber Attacks The Hacker News

The threat actor known as Arid Viper has been observed using refreshed variants of its malware toolkit in its attacks targeting Palestinian entities since September 2022. Symantec, which is tracking the group under its insect-themed moniker Mantis, said the adversary is "going to great lengths to maintain a persistent presence on targeted networks." Also known by the names APT-C-23 and Desert

19:54

Think Before You Share the Link: SaaS in the Real World The Hacker News

Collaboration sits at the essence of SaaS applications. The word, or some form of it, appears in the top two headlines on Google Workspaces homepage. It can be found six times on Microsoft 365s homepage, three times on Box, and once on Workday. Visit nearly any SaaS site, and odds are collaboration will appear as part of the apps key selling point.  By sitting on the cloud, content within

19:47

Wayland 1.22 Released With New Preferred Buffer Scale & Transform Protocol Phoronix

Wayland 1.22 is now available as the newest feature update to this core set of Wayland protocol and helper code...

19:12

1500+ Increase in Weekly Deaths (England and Wales) is Not Back to Normal schestowitz.com

Ive just checked ONS. Its site was updated faster than usual, as early as 9:30AM this morning, at least for this dataset.

The site updated at ONS:

The site updated at ONS

Number of deaths for week 11:

Number of deaths for week 11

Notice how much that grew between 2022 and 2023.

2019 was a lot better too. 2019 data for March/April:

2019 data for March/April

So to summarise

2019: 10,567 deaths
2022: 10,928 deaths
2023: 12,133 deaths

They tell us the pandemic is a thing of the past. The data does not support this assertion.

18:45

Stable Diffusion Copyright Lawsuits Could be a Legal Earthquake for AI SoylentNews

https://arstechnica.com/tech-policy/2023/04/stable-diffusion-copyright-lawsuits-could-be-a-legal-earthquake-for-ai/

The AI software Stable Diffusion has a remarkable ability to turn text into images. When I asked the software to draw "Mickey Mouse in front of a McDonald's sign," for example, it generated the picture you see above.

Stable Diffusion can do this because it was trained on hundreds of millions of example images harvested from across the web. Some of these images were in the public domain or had been published under permissive licenses such as Creative Commons. Many others were notand the world's artists and photographers aren't happy about it.

In January, three visual artists filed a class-action copyright lawsuit against Stability AI, the startup that created Stable Diffusion. In February, the image-licensing giant Getty filed a lawsuit of its own.
[...]
The plaintiffs in the class-action lawsuit describe Stable Diffusion as a "complex collage tool" that contains "compressed copies" of its training images. If this were true, the case would be a slam dunk for the plaintiffs.

But experts say it's not true. Erik Wallace, a computer scientist at the University of California, Berkeley, told me in a phone interview that the lawsuit had "technical inaccuracies" and was "stretching the truth a lot." Wallace pointed out that Stable Diffusion is only a few gigabytes in sizefar too small to contain compressed copies of all or even very many of its training images.

Related:
Ethical AI art generation? Adobe Firefly may be the answer. (20230324)
Paper: Stable Diffusion "Memorizes" Some Images, Sparking Privacy Concerns (20230206)
Getty Images Targets AI Firm For 'Copying' Photos (20230117)
Pixel Art Comes to Life: Fan Upgrades Classic MS-DOS Games With AI (20220904)
A Startup Wants to Democratize the Tech Behind DALL-E 2, Consequences be Damned (20220817)


Original Submission

...

18:43

How to install PHP 8.2 with Apache on Debian 11 Linux nixCraft

nixCraft Patreon supporters can .
See all PHP related FAQ

Debian 11 is an excellent server OS to run the LAMP stack. PHP (Hypertext Preprocessor) is a widely-used open source general-purpose scripting language especially suited for web development. However, Debian 11 comes with

Love this? sudo share_on: Twitter - Facebook - LinkedIn - Whatsapp - Reddit

The post How to install PHP 8.2 with Apache on Debian 11 Linux appeared first on nixCraft.

18:41

DoJ cracks down on cryptocurrency fraud, seizes $112 million in linked funds Help Net Security

The Department of Justice (DoJ) declared the confiscation of digital currency valued at approximately $112 million connected to fraudulent cryptocurrency investments. Laundering money from cryptocurrency confidence scams According to court documents, the virtual currency accounts were allegedly used to launder proceeds of various cryptocurrency confidence scams. In these schemes, fraudsters cultivate long-term relationships with victims met online, eventually enticing them to make investments in fraudulent cryptocurrency trading platforms. In reality, however, the funds sent by More

The post DoJ cracks down on cryptocurrency fraud, seizes $112 million in linked funds appeared first on Help Net Security.

18:32

Pirate Site Admins Arrested in 2015, Now Acquitted For a Second Time TorrentFreak

series-ly-logoIn 2014, David Tard, Andreu Caritg, and Oriol Sol were hard at work in Spain developing Tviso, a service with a goal to unify legal streaming services into a centrally-accessed discovery hub.

Tviso was a new venture for the Spaniards, although not an entirely unfamiliar one. At the same time, the men were also the operators of Series.ly, a then-four-year-old social television download site that aimed to blend the benefits of free access to premium TV series and movies with a walled-garden social network of entertainment media fans.

With a reported four million users, Series.ly was a success. It reportedly generated over 638,000 euros in the three years leading up to 2015, after which new legislation in Spain would render its activities illegal.

Police Raid Operators of Series.ly

Following a complaint from a local trade industry group representing U.S. rightsholders, and six months after the introduction of reformed intellectual property law in Spain, local authorities were ready to take action.

An investigation carried out by the Anti-Piracy Group of the Central Computer Security Brigade, with assistance from the Provincial Judicial Police Brigade of Barcelona, had linked Series.ly to a company operated by Tard, Caritg, and Sol.

seriesly-bb

In the summer of 2015, Polica Nacional officers raided the companys offices in search of evidence related to the operation of Series.ly. That included details of revenue generated by advertising and premium account sales to customers all over Europe, Switzerland, United States, Mexico, Chile and beyond.

The three men were arrested and subsequently charged with intellectual property crimes. It would be another seven years before they had their day in court.

Rightsholders Demand Four Years in Prison

Local police labeled Tard, Caritg, and Sol a criminal organization. Rightsholders represented by the Association of National Videographic Distributors and Importers (ADIVAN), described the conduct of Series.lys operators as straigh...

18:00

CP/M 6502-Style Hackaday

There are projects you create to share with the world, but there are also those you do just because you want something for yourself. Lucky for us, [Dietrich-L]s 30-year-long project to create CPM-65, a CP/M-like OS for the 6502, has become both.

[Dietrich-L] does admit that the documentation is sparse and for my personal needs. Still, the OS has most of what youd expect and runs well on the target system, a heavily-modified Elektor Junior with 57 kB of RAM. The disk structure is compatible with CP/M, although the Transient Program Area (TPA) apparently starts at $200, which is a bit different from a typical CP/M. Apparently, the system uses some low memory which necessitated the relocation. Just in case you were hoping, CPM-65 doesnt emulate an 8080 system, so you cant run normal CP/M programs. You just get a similar operating environment and tools.

The 31 commands listed include an assembler, BASIC, Forth, an editor, and some disk tools, along with a debugger. Xmodem is available, too. Everything is written in assembly for the CPM-65 assembler, so bootstrapping could be an issue if you need to make any changes.

Speaking of changes, there is some documentation in the docs sub-directory, including the layout of [Dietrich-L]s system, which would be handy if you were trying to run this on your own hardware. Youll also find basic commands for the editor...

17:29

That ticking noise is your end users laptops Graham Cluley

Graham Cluley Security News is sponsored this week by the folks at Kolide. Thanks to the great team there for their support! Heres an uncomfortable fact: at most companies, employees can download sensitive company data onto any device, keep it there forever, and never even know that theyre doing something wrong. Kolides new report, The Continue reading "That ticking noise is your end users laptops"

17:01

17:00

Obsidians SSPM solution enables organizations to increase their SaaS security Help Net Security

Obsidian Security released its latest suite of SaaS security solutions. This suite of solutions comprising Obsidian Compliance Posture Management, Obsidian Integration Risk Management, and Obsidian Extend will together enable security and GRC teams to increase their SaaS security and compliance posture measurably. For far too long, Security and GRC teams have been working in the dark. We hear from security leaders time and again that they have no control over their ever-expanding mesh of SaaS More

The post Obsidians SSPM solution enables organizations to increase their SaaS security appeared first on Help Net Security.

17:00

On retreat again, October 2022. Antarctica Starts Here.

Time and funds permitting, I try to go on retreat every year or two. I like driving someplace new, someplace I've never been before, and getting off the grid for a couple of days. I find that it makes it much easier to relax, rest, catch up on my reading (or sometimes television), do some writing, tinker with locks a bit, and generally be nonverbal for about a week. It's not easy these days (and won't be for a while, I suspect) but it is something that I at least attempt periodically. The AirBnB I rented had a most unusual design, it was basically a wedge built into a hillside so that the earth that covered the walls and much of the roof formed insulation (something that many houses in this state lack). Because I'm not a total maniac I try to make sure that there is connectivity where I am, and this particular location had both DSL and Starlink service in a shotgun configuration, which worked surprisingly well. I will say, however, that takeout that far in northern California can be a bit dodgy and I found myself getting quite sick just before the end of my trip.

All of that aside I did some hiking and took some photographs of the forest out that way, some things I came across, and the local wildlife that visited me once in a while. I never did see the bear that I was told about but the deer there, while not actually tame did approach more closely than expected.

I know nobody really likes to hear these words, but here are my vacation pictures.

Ukraine - The Road To War Terra Forming Terra





I do like this analysis. More critically, western policy has been folly when it comes to Russia and has been driven by the out right greed of our so called war industry rather than what was clearly in our interest from the very beginning. Yet Russia also had to both learn and mature.

All the other so called analysis has largely been excusing activity used to goad russia into some form of war.  What Russia obviously did was secure effective Russian provinces against Ukrainian attacks.  The Ukrainian now have to push dug in Russian forces out.

This can only happen with motivated well trained Ukrainian forces.  At best, there may be a few.

We have a lot of feel good stories out there but also no further change on the ground.  Everything i have seen so far conforms to a grab and hold approach by Russia, then allowing the Ukrainians to exhaust themselves in the trenches.  It takes serious training and real motivation to overcome a defensive trench warfare.  No sign of that at all.



Part One: The Road To War

https://www.globalresearch.ca/the-military-situation-in-the-ukraine/5778420

For years, from Mali to Afghanistan, I have worked for peace and risked my life for it. It is therefore not a question of justifying war, but of understanding what led us to it. [.]

Lets try to examine the roots of the [Ukrainian] conflict. It starts with those who for the last eight years have been talking about separatists or independentists from Donbass. This is a misnomer. The referendums conducted by the two self-proclaimed Republics of Donets...

FDA confirms Graphene Oxide is in the mRNA COVID-19 Vaccines Terra Forming Terra




Now i understand just what they were trying to do.  In 1993, I was paid to understand just how small particles of activated charcoal could be used to produce nanoparticles of a useful biological for skin care.  This was fifteen years before graphene itself was discovered.

What we were working with was not dangerous but also difficult to do.  The advent of graphene solved that as nano particles could now be produced.  My problem is that they are potentially dangerous but easy to slide through as safe.(NOT)

It is now turning out that they are dangerous as hell.  Because they are so called reduced, it means that they will attach to another pparticle and thus we see fibers show up.  Not good.  The body can handle a lot of all this, but is is hardly good news or practise.

That may well be good news because it separates it all out and the blood system can then bypass any blockage. Otherwise the particles are like shards of glass chwing up cells.
 


BREAKING: FDA confirms Graphene Oxide is in the mRNA COVID-19 Vaccines after being forced to publish Confidential Pfizer Documents by order of the US Federal Court


https://expose-news.com/2023/04/02/fda-confirms-graphene-is-in-the-covid-vaccines/

The Covid-19 vaccines have been at the centre of a heated debate since their introduction, with many questions and concerns raised about their safety and effectiveness.
...

Plasma SPACE. Terra Forming Terra





 Plasma SPACE.


I am continuing my reading of the book by Robert Temple on Plasma, but before we go further i do want to suggest something.  We know that 98 % of the mass cannot be seen.  We Know that this mass is in the observed galaxies.  We also know that all particle creation must also be specific to any given galaxy.  Way more important and a complete error to ignore is that all such mass is sublight.  That means that it is all contained within those galaxys.

Past that it follows that our whole galaxy is a living ocean of our neutral neutron pairs which alone are able to generate enough gravity.  It still takes gravitational compression to produce decay events and we have that in spades with every star including our sun.  I do think we are watching neutral neutron pairs decaying into hydrogen.

There are other aspects to think about incuding conglomeration into proto elements in particular, but we need to get used to the idea that we are all breathing this and likely even walking through it or even passing through it with no capacity to detect.

The big take home is the lack of measurable drag,  Does a fish notice drag?

Understand that the so called ether of a century ago has been measured of late.  So yes, something is there and it is not impossibleum.  

The point is that we are not able to detect 98% of our surrounding mass.  Of course it is spread out like cotton batten as compared to the matrial we can see and touch and it is out there certainly filling our whole solar system and likely our whole galaxy.

What i am trying to do here is to induce a mental flip in your thinking.  It was hard for me and cannot be any easier for you.,


Reversing Dementia, Parkinsons, Alzheimers, Autism and other neurological issues. Terra Forming Terra

 



I had an extended conversation today with my daughter on her ongoing spiritual researchs regarding the above medical problems.  Extremely insightful.  In fact, the future for all these has just brightened.  

Two big take homes is that those diseases driven by physicological changes can be reversed using a deeply researched new supplement product.  It takes time but we have complete reversal in one autistic child to share and this is indicated for most of the rest as well.

The key problem to over come are microlesions both on the brain surface and also likely within the brain as well.  Simply reversing those micro lesions allows the brain to properly rewire.

This is very good news that can ultimately applied by any practicioner.

The second big take hame has been the complete reversal of dementia in a 93 year old woman.I have never heard of that happening before.  The process required extensive spiritual work with a family member that also engaged the rest of the family as well, but culminated with the womans spirit causing it all to happen. At no time was the patient communicated with because that was impossible.

What we learned is that the cognitive mind can block healing or any form of improvement even when the spirit of that person is standing by.  engaging that spirit remotely allowed resolution and a restoration of an active cognitive mind.  It is quite possible that cognitive minds can shut down almost in pursuit of death.

I now think that all forms of mental illness can be resolved.  It is still in most cases a process and we are even taking on chronic family disorders as well successfully.  Plenty of overlap obviously.  Yet it is early days and we will soon need talented folks to join in with the process.  We will need a community of spiritual practicioners.

From the persective of sharing this message, we understand that reversing dementia will provide best traction.  Everyone has been touched and millions of caregivers want to see a better outcome.  Th...

16:01

Microsoft Close to Settling EC Antitrust Cloud Complaints SoylentNews

Transparency? Redmond's heard of it:

Microsoft is close to resolving antitrust complaints lodged against it with the European Commission by local suppliers OVHcloud, Aruba S.p.A and Danish Cloud Community (DCC) over alleged commercial abuses.

The details of the said settlement remain under wraps and likely won't be published in detail, which is frustrating others' efforts to take the US software and cloud giant to task over alleged controlling market behavior.

OVHcloud, Aruba and DCC fired a joint complaint against Microsoft in May, with OVH itself confirming they were pressing the authorities for a "level playing field among cloud providers," saying Microsoft "undermines fair competition."

The complaint was focused on the higher costs of buying and running Microsoft software in clouds other than Azure, and technical adjustments needed to run some programs on competitors' clouds.

Fast-forward to this week and chatty sources close to the situation indicate Microsoft has agreed to settle the case and will propose binding commitments imminently, according to Bloomberg.

[...] Representing 24 cloud providers, the Cloud Infrastructure Service Providers in Europe (CISPE) group itself filed a formal competition complaint against Microsoft in November, saying the vendor uses: "unjustified and discriminatory bundling, tying, self-preferencing pricing and technical and economic lock-in" to "restrict choice".

It claimed the actions of Microsoft were in violation of Article 102 TFEU, and provide grounds for the EC to launch a formal investigation.

Francisco Mingorance, Secretary General at CISPE, which counts OVH, Aruba and many others as members, told us today the decision by the trio to settle with Microsoft was "disappointing on many levels."

Read more of this story at SoylentNews.

15:00

Truly Flexible Circuits Are a Bit of a Stretch Hackaday

a flexible film with a matrix of illuminated color LEDs being stretched

Flexible PCBs have become increasingly common in both commercial devices and DIY projects, but Panasonics new stretchable, clear substrate for electrical circuits called Beyolex takes things a step further. The material is superior to existing stretchable films like silicone, TPU, or PDMS due to its high heat tolerance (over 160 C) for the purposes of sintering printable circuit traces.

But, a flexible substrate isnt very useful for electronics without some conductive traces. Copper and silver inks make for good electrical circuits on stretchable films, and are even solderable, but increase resistance each time they are stretched. Recently, a team out of the University of Coimbra in Portugal has developed a liquid metal ink that can stretch without the resistance issues of existing inks, making it a promising pair with Panasonics substrate. Theres also certain environmental benefits of printing circuits in this manner over t...

14:52

NOW: Pensions and the Missing 18,000,000 Pounds schestowitz.com

Sounds familiar? Yes, Standard Life (2011-2016). Seems like a pattern

TPR confirms end to serious admin issues at Now Pensions

TPR confirms end to 'serious' admin issues at Now Pensions

TPR forces Now Pensions to overhaul admin system after 18m failing

TPR forces Now Pensions to overhaul admin system after 18m failing

NOW:Pensions failed to collect 18m of contributions

NOW:Pensions failed to collect 18m of contributions

Now Pensions fined for long-running issues

Now Pensions fined for 'long-running issues'

Summary: The above is important because of the timing. After 5+ years of pension fraud at Sirius Open Source the company enrolled staff without paperwork/signatures and barely with any consent (in late 2016); to make matters worse, a few years ago it upped staff contribution levels without increasing its own, in effect forcing staff to send even more money (ones own money, not the companys) into this dubious pot with uncertain future.

14:45

Sirius Open Source Moved to NOW: Pensions the Same Year (2016) It Failed to Collect Money Techrights

Sounds familiar? Yes, Standard Life (2011-2016). Seems like a pattern

TPR confirms end to serious admin issues at Now Pensions

TPR confirms end to 'serious' admin issues at Now Pensions

TPR forces Now Pensions to overhaul admin system after 18m failing

TPR forces Now Pensions to overhaul admin system after 18m failing

NOW:Pensions failed to collect 18m of contributions

NOW:Pensions failed to collect 18m of contributions

Now Pensions fined for long-running issues

Now Pensions fined for 'long-running issues'

Summary: The above is important because of the timing. After 5+ years of pension fraud at Sirius Open Source the company enrolled staff without paperwork/signatures and barely with any consent (in late 2016); to make matters worse, a few years...

14:45

Vulnerabilities impacting multiple QNAP operating systems (CVE-2022-27597, CVE-2022-27598) Help Net Security

Two vulnerabilities affecting various QNAP operating systems (CVE-2022-27597 and CVE-2022-27598) have been uncovered by Sternum. These vulnerabilities enable authenticated remote users to access secret values, requiring owners to take immediate action by updating their operating system(s). Finding CVE-2022-27597 and CVE-2022-27598 Before discovering the vulnerabilities, the researchers ran performance testing and benchmarking on a QNAP TS-230 NAS device. Unexpectedly, attention shifted to a string of security alerts coming from the system, informing the team about multiple More

The post Vulnerabilities impacting multiple QNAP operating systems (CVE-2022-27597, CVE-2022-27598) appeared first on Help Net Security.

14:30

How can organizations bridge the gap between DR and cybersecurity? Help Net Security

Breaking down the silos between disaster recovery (DR) and cybersecurity has become increasingly important to ensure maximum business resiliency against outages, data breaches, and ransomware attacks. Yet, many organizations still operate these functions separately, leading to slower response times, budgeting challenges, duplicated resource allocations, and an overall weaker security and business continuity posture. Why must DR and cybersecurity teams collaborate? Encouraging collaboration between your disaster recovery and cybersecurity teams can offer several benefits for your More

The post How can organizations bridge the gap between DR and cybersecurity? appeared first on Help Net Security.

14:30

Microsoft Tightens OneNote Security by Auto-Blocking 120 Risky File Extensions The Hacker News

Microsoft has announced plans to automatically block embedded files with "dangerous extensions" in OneNote following reports that the note-taking service is being increasingly abused for malware delivery. Up until now, users were shown a dialog warning them that opening such attachments could harm their computer and data, but it was possible to dismiss the prompt and open the files. That's going

14:25

Severe IT Failure: NOW: Pensions Allowed the Sensitive Personal Details of 30,000 Customers to Leak Out Online schestowitz.com

They tried blaming it on outsourcing (their own)

NOW: Pensions article

Summary: NOW: Pensions, which is apathetic towards crimes of Sirius Open Source (because it gets paid to play along), has one heck of a history when it comes to managing data; 2 years ago its customers data (some of it highly sensitive) was copied and posted online for all to download, at least temporarily, after a severe breach

14:20

Did NOW: Pensions Adopt Security Malpractices of Sirius Open Source? Server Breaches The Norm Now? Techrights

They tried blaming it on outsourcing (their own)

NOW: Pensions article

Summary: NOW: Pensions, which is apathetic towards crimes of Sirius Open Source (because it gets paid to play along), has one heck of a history when it comes to managing data; 2 years ago its customers data (some of it highly sensitive) was copied and posted online for all to download, at least temporarily, after a severe breach

14:00

Streamlining cybersecurity decision-making for analysts and CISOs Help Net Security

Using structured, machine-readable data in defensive systems can present a significant challenge. In this Help Net Security interview, Giorgos Georgopoulos, CEO at Elemendar, discusses these challenges and how Elemendars application can help cyber analysts and CISOs. Giorgos highlights the companys customizable technology, which can be tailored to meet the unique needs of different organizations, as well as the security measures that Elemendar takes to protect the data processed by their AI technology. What are some More

The post Streamlining cybersecurity decision-making for analysts and CISOs appeared first on Help Net Security.

13:55

NOW: Pensions Has Concerns About the Future (Peoples Plans May be Insolvent) schestowitz.com

In their own words (latest statement from Companies House):

NOW: Pensions net cash

NOW: Pensions going concern

Summary: The crimes of Sirius Open Source are under investigation, but NOW: Pensions does not seem to care. On the phone, the manager at this pension firm said hed send assurance letters. In his E-mail he said the same. Two of his workers had said the same for 2 months prior. They all lied. Lying is the norm there. Would you trust a pension provider such as this? If this is the norm in this sector (financial/pension industry), theres big trouble ahead.

13:54

Cryptocurrency Companies Targeted in Sophisticated 3CX Supply Chain Attack The Hacker News

The adversary behind the supply chain attack targeting 3CX deployed a second-stage implant specifically singling out a small number of cryptocurrency companies. Russian cybersecurity firm Kaspersky, which has been internally tracking the versatile backdoor under the name Gopuram since 2020, said it observed an increase in the number of infections in March 2023 coinciding with the 3CX breach.

13:52

Pension Provider of Sirius Open Source: Well Probably be Okay for the Next 12 Months Techrights

In their own words (latest statement from Companies House):

NOW: Pensions net cash

NOW: Pensions going concern

Summary: The crimes of Sirius Open Source are under investigation, but NOW: Pensions does not seem to care. On the phone, the manager at this pension firm said hed send assurance letters. In his E-mail he said the same. Two of his workers had said the same for 2 months prior. They all lied. Lying is the norm there. Would you trust a pension provider such as this? If this is the norm in this sector (financial/pension industry), theres big trouble ahead.

13:30

Shadow data slipping past security teams Help Net Security

The rapid pace of cloud transformation and democratization of data has created a new innovation attack surface, leading to 3 in 4 organizations experiencing a cloud data breach in 2022, according to Laminar. 68% of data security professionals have identified shadow data as their top concern when it comes to protecting cloud data. The report reveals that concern over shadow data has increased to a 93% compared to 82% the year before. This finding indicates More

The post Shadow data slipping past security teams appeared first on Help Net Security.

13:17

NASA's Massive Rocket Transporter is Officially a Record-Breaking Big Boy SoylentNews

The space agency's Crawler Transporter 2 has officially broken the Guinness World Record for the heaviest self-powered vehicle:

NASA's Crawler Transporter 2 was originally designed to carry Saturn V rockets during the Apollo program nearly 60 years ago. The aging giant recently got a much-needed upgrade for supporting the Artemis SLS megarocket, beating its twin vehicle for a world record.

On Wednesday, Guinness World Records presented NASA teams at the Kennedy Space Center with a certificate confirming that, at a whopping 6.65 million pounds (3 million kilograms), Crawler Transporter 2 is the world's heaviest self-powered vehicle, NASA announced in a statement.

"Anyone with an interest in machinery can appreciate the engineering marvel that is the crawler transporter," Shawn Quinn, program manager of Exploration Ground Systems, said in the statement. [...]

"NASA's crawlers were incredible pieces of machinery when they were designed and built in the 1960s," John Giles, NASA's Crawler Element Operations manager, said in the statement. "And to think of the work they've accomplished for Apollo and shuttle and now Artemis throughout the last six decades makes them even more incredible."

Due to how heavy the Crawler Transport is, the vehicle essentially crawls its way to the launch pad. It takes about eight to 12 hours for the rocket-carrying vehicle to drive the 4.2 miles (6.7 kilometers) from the Vehicle Assembly Building to the launch pad, going at a slow and steady speed of one mile per hour (1.6 kilometers per hour). It could take you a shorter time to walk that distance by foot.

Here's a crawler-transporter fact sheet [pdf]


Original Submission

Read more of this story at SoylentNews.

13:00

Lack of security employees makes SMBs sitting ducks for cyber attacks Help Net Security

For SMBs (and startups in particular), breaches can be devastating, according to DigitalOcean. To strengthen their cybersecurity posture, companies must spend valuable resources on maintaining or updating systems, hiring and training staff, and implementing security software resources and options that many dont have readily available. SMBs security posture Cybersecurity threats are more real and prevalent than ever before. For businesses, security breaches risk not only exposure to customer data and a decrease in trust, More

The post Lack of security employees makes SMBs sitting ducks for cyber attacks appeared first on Help Net Security.

12:57

Microsoft (Mis)Uses NDAs to Hide the Full Breadth of Its Massive Layoffs, Which Are Ongoing Every Week Techrights

How very typical of Microsoft (conditionally bribe the victims to keep them quiet, the hush money the media barely cares about)

Microsoft Fires Unknown Number of Devs, Managers in Nairobi

Today (also a niche African site):

Microsoft cut several jobs in Kenya
Mind the finer prints

Summary: Microsoft layoffs this month are still ongoing, marking the fourth consecutive month of Microsoft layoffs (which the media barely mentions; too occupied with overhyped chaffbots). Considering the manager/non-manager ratio, NDAs notwithstanding, it seems like loads of people have just been fired and not a single Western news site covered this in English.

12:00

Machine Learning Helps Electron Microscopy Hackaday

Machine learning is supposed to help us do everything these days, so why not electron microscopy? A team from Ireland has done just that and published their results using machine learning to enhance STEM scanning transmission electron microscopy. The result is important because it targets a very particular use case low dose STEM.

The problem is that to get high resolutions, you typically need to use high electron doses. However, bombarding a delicate, often biological, subject with high-energy electrons may change what you are looking at and damage the sample. But using reduced electron dosages results in a poor image due to Poisson noise. The new technique learns how to compensate for the noise and produce a better-quality image even at low dosages.

The processing doesnt require human intervention and is fast enough to work in real time. It is hard for us to interpret the tiny features in the scans presented in the paper, but you can see that the standard Gaussian filter doesnt work as well. The original dots appear fat after filtering. The new technique highlights the tiny dots and reduces the noise between them. This is one of those things that a human can do so easily, but traditional computer techniques dont always provide great results.

You have to wonder what other signal processing could improve with machine learning. Of course, you want to be sure you aren&...

12:00

Guardz releases cybersecurity platform for MSPs and IT professionals Help Net Security

Guardz has launched its dedicated cybersecurity platform for MSPs and IT professionals that empowers MSPs to protect their clients with automated remediation plans, to improve their reporting for existing clients and better obtain new ones, and to cut operational and licensing costs up to 75%, ultimately boosting revenue. Cybersecurity attacks aimed at small and mid-size businesses are on the rise, yet only 14% of these companies are prepared to defend themselves. Many either cannot afford More

The post Guardz releases cybersecurity platform for MSPs and IT professionals appeared first on Help Net Security.

11:37

Environmental Sustainability at EPO Must Become More Than a Buzzword Techrights

And sure, granting loads of monopolies on alternative energy only exacerbates the climate crisis

EPO greening

Summary: Battistellis Nemesis, Ion Brumme, wrote a letter to Battistellis sidekick last week; the EPO is being challenged to pursue real sustainability rather than name-drop that as a buzzword

WHEN Antnio Campinos was parachuted into the EPO by his mate Benot Battistelli, serving in a role he was not qualified to fill, Campinos reportedly spared not much time. He told Ion Brumme he would be better off leaving; remember that Battistelli attacked Brumme and the EPO was forced to reinstate Brumme only years later when ILOAT finally delivered a much-needed ruling.

Months ago Brumme wrote about the situation and it doesnt look too good. Now, after another election in Munich, the Local Staff Committee Munich (LSCMN) kicks into action. Brumme writes as Vice-Chair of LSCMN. In this letter, LSCMN explains, we propose that the Office considers financially supporting the purchase of these tickets by staff up to a 100% refund.

Since Campinos fancies talking about "sustainability" all the time (distracting from the EPOs abuses) maybe he should listen. Heres the full letter from Brumme, dated about a week ago:

European Patent Office
80298 Munich
Germany

Local Staff Committee Munich
Comit local du personnel de Munich
rtlicher Personalausschuss Mnchen

Email: mnstcom@epo.org

Date: 29.03.2023
sc23010ml

European Patent Office | LSC Munich | GERMANY

President of the EPO
Mr Antnio Campinos
via email PRESIDENT@epo.org

OPEN LETTER
Subject: Deutschlandticket Environmental sustainability

Dear Mr....

10:29

Google Assistant Might be Doomed: Division Reorganizes to Focus on Bard SoylentNews

https://arstechnica.com/gadgets/2023/03/google-assistant-might-be-doomed-division-reorganizes-to-focus-on-bard/

Is the Google Assistant doomed? The evidence is starting to pile up that the division is going down the tubes. The latest is news from CNBC's Jennifer Elias that says the Google Assistant division has been "reshuffled" to "heavily prioritize" Bard over the Google Assistant. It all sounds like the team is being reassigned.

We'll get into the report details in a minute, but first a quick recap of the past two years of what the assistant has gone through under Google:

  • Google Assistant saw eight major speaker/smart display hardware releases in five years from 2016-2021, but the hardware releases seem to have stopped. The last hardware release was in March 2021. That was two full years ago.
  • 2022 saw Google remove Assistant support from two in-house product lines: Nest Wi-Fi and Fitbit wearables.
  • 2022 also saw a report from The Information that said Google wanted to "invest less in developing its Google Assistant voice-assisted search for cars and for devices not made by Google."
  • Google Assistant's driving mode was shut down in 2022.
  • Google Assistant's "Duplex on the web" feature was also shut down in 2022.
  • One of Google Assistant's core unique features, Reminders, is being shut down in favor of Google Task Reminders soon.
  • Google Assistant has never made money. The hardware is sold at cost, it doesn't have ads, and nobody pays a monthly fee to use the Assistant. There's also the significant server cost to process all those voice commands, though some newer devices have moved to on-device processing in a stealthy cost-cutting move. The Assistant's biggest competitor, Amazon Alexa, is in the same boat and loses $10 billion a year.

Each one of those developments could maybe be dismissed indivi...

10:00

HPR3827: Reply to hpr 3798 Hacker Public Radio

From Wikipedia, the free encyclopedia LILO (Linux Loader) is a boot loader for Linux and was the default boot loader for most Linux distributions in the years after the popularity of loadlin. Today, many distributions use GRUB as the default boot loader, but LILO and its variant ELILO are still in wide use. Further development of LILO was discontinued in December 2015 along with a request by Joachim Wiedorn for potential developers. For EFI-based PC hardware the now orphaned ELILO boot loader was developed,originally by Hewlett-Packard for IA-64 systems, but later also for standard i386 and amd64 hardware with EFI support. hardware, ELILO is one of the available bootloaders. It supports network booting using TFTP/DHCP. https%3A%2F%2Fen.wikipedia.org%2Fwiki%2FLILO_%28bootloader%29%23elilo hpr3798 slackware.com https://sourceforge.net/projects/elilo/files/elilo/ elilo.config: prompt delay=20 timeout=20 default=g #default=h chooser=simple message=textmenu-message.msg image=vmlinuz-generic label=g initrd=initrd.gz read-only append="root=/dev/nvme0n1p5 resume=/dev/nvme0n1p6" image=vmlinuz-huge label=h read-only append="root=/dev/nvme0n1p5 resume=/dev/nvme0n1p6" image=dummy label=w slackware; reading is not an option Ken: added aditional links and wikipedia summary

08:41

Fedora Workstation Aiming To Improve Encryption, Possibly Encrypted Disk By Default In The Future Phoronix

Fedora Workstation developers and those involved at Red Hat have been working to improve the state of disk encryption on Fedora with a end-goal of possibly making the installer encrypt systems by default...

08:16

Debian 12's Installer Reaches RC1 Status Phoronix

The Debian Installer for the upcoming Debian 12 "Bookworm" release has reached its release candidate phase...

08:15

Jeff Otto joins Riskified as CMO Help Net Security

Riskified has announced that Jeff Otto has joined the company as Chief Marketing Officer, effective immediately. Otto will be responsible for a global integrated marketing strategy that will amplify Riskifieds brand, strengthen its category leadership and accelerate demand for Riskifieds expanding product suite. Its an exciting moment to have Jeff lead the charge on marketing with Riskified reaching the crossroads of both growth and profitability, said Eido Gal, CEO, Riskified. Jeff has the ideal blend More

The post Jeff Otto joins Riskified as CMO appeared first on Help Net Security.

07:39

The 'Insanely Broad' RESTRICT Act Could Ban VPNs in the USA SoylentNews

https://www.vice.com/en/article/4a3ddb/restrict-act-insanely-broad-ban-tiktok-vpns

[...] The bill could have implications not just for social networks, but potentially security tools such as virtual private networks (VPNs) that consumers use to encrypt and route their traffic, one said. Although the intention of the bill is to target apps or services that pose a threat to national security, these critics worry it may have much wider implications for the First Amendment.

"The RESTRICT Act is a concerning distraction with insanely broad language that raises serious human and civil rights concerns," Willmary Escoto, U.S. policy analyst for digital rights organization Access Now told Motherboard in an emailed statement. [...]

[...] Under the RESTRICT Act, the Department of Commerce would identify information and communications technology products that a foreign adversary has any interest in, or poses an unacceptable risk to national security, the announcement reads. The bill only applies to technology linked to a "foreign adversary." Those countries include China (as well as Hong Kong); Cuba; Iran; North Korea; Russia, and Venezuela.

The bill's language includes vague terms such as "desktop applications," "mobile applications," "gaming applications," "payment applications," and "web-based applications." It also targets applicable software that has more than 1 million users in the U.S.

"The RESTRICT Act could lead to apps and other ICT services with connections to certain foreign countries being banned in the United States. Any bill that would allow the US government to ban an online service that facilitates Americans' speech raises serious First Amendment concerns," Caitlin Vogus, deputy director of the Center for Democracy & Technology's Free Expression Project, told Motherboard in an emailed statement. "In addition, while bills like the RESTRICT Act may be motivated by legitimate privacy concerns, banning ICT services with connections to foreign countries would not necessarily help protect Americans' privacy. Those countries may still obtain data through other means, like by purchasing it from private data brokers." [...]


Original Submission

Read more of this story at SoylentNews.

07:13

UK outsourcing services provider Capita suffered a cyber incident Security Affairs

UK outsourcing services provider Capita confirmed that the outage suffered on Friday was caused by a cyberattack.

Capita, the UK outsourcing giant, confirmed that its staff was locked out of their accounts on Friday after a cyber incident.

Capita is one of the governments biggest suppliers, with 6.5bn of public sector contracts, reported The Guardian. The outsourcing firm signed numerous contracts with the Ministry of Defence.

In an update shared on April 3 about the incident, the company announced it has experienced a cyber incident primarily impacting access to internal Microsoft Office 365 applications. 

The attack disrupted some services provided to individual clients, but the company pointed out that the majority of its client services were not impacted.

Our IT security monitoring capabilities swiftly alerted us to the incident, and we quickly invoked our established and practised technical crisis management protocols. Immediate steps were taken to successfully isolate and contain the issue. The issue was limited to parts of the Capita network and there is no evidence of customer, supplier or colleague data having been compromised. reads the update.

Working in collaboration with our specialist technical partners, we have restored Capita colleague access to Microsoft Office 365 and we are making good progress restoring remaining client services in a secure and controlled manner.

Capita has immediately taken action to isolate and contain the issue.

The company did not disclose details about the incident, however, its...

07:12

Melbet Betting Firm h+ Media

Melbet Betting Firm

Click on the Melbet login button in the upper right nook or beneath on the house web page. The task of putting a wager at Melbet India is made lots of simplified if you follow a set of procedures. They would begin with logging into the account with the small print. Receive the bonus Receive the bonus in the type of free bets. Sign up at Melbet India from the link under Sign up with a Melbet India promo code.

It ensures that every one your private knowledge and funds are fully protected from anything dangerous on-line. Login to the melbet account via the necessary credentials. Login to the melbet account and click on on the Payments option on the bottom of the web page. The consumer should make a minimal required amount to avail of any bonuses on the site. Login to your melbet account with the mandatory credentials. Here well provide you solely interesting content material, which you will like very much.

You shouldnt get greater than 21, but as a substitute, should get greater than the vendor. Blackjack games on the Melbet BD app are Double Exposure Blackjack, Rainbow Blackjack, and many extra. This type of wager is just a combination of multiple Accumulator bets. With Express bets, you presumably can lose one guess, however nonetheless, earn cash from other bets. Download the program from our official web site, set up it after which run the Melbet app. In the folder of downloaded recordsdata, find the installation file and install it in your smartphone.

To get the bonus you have to deposit no much less than INR one thousand on Friday. The obligatory situation for getting the bonus is the volume of bets in sections of fast games and slots not less than INR and the account must be at least 30 days old. Unlike the model of the mobile site, which supports stay chats, the cell application, unfortunately, doesnt have an online chat feature. The ticket booking process could be very simple and PCA tickets can be booked online. Users have to go to the official/partner web site where they can book cricket match tickets. They can select their favorite stand from the various obtainable stands.

Instead, a devoted cell web page does its duty to ship a lot of the merchandise and features. There is a small sacrifice in the total gaming expertise, but customers can proceed to entry Mel Bet with none location restriction. The Melbet app is out there for Android and Apple platforms.

Tons of Melbet cricket evaluation in India states that the positioning is welcoming to Indian punters with lots of unique offers for them. Melbet India accepts funds made in India Rupee and permits its gamers to wager using Indian Rupees. Melbet is legal in India and welcomes gamers from India to open a Melbet India account. If youre a genuinely Indian bettor, Melbet India is an effective place to begin.

At the identical time, the bookmaker doesnt cost gamers any inner commissions. Talking in re...

07:10

The Method To Use Melbet App h+ Media

The Method To Use Melbet App

Youll discover that the sites forex will then change to Indian rupees on all pages. Thankfully, the procedure is relatively simple, particularly on Android telephones. You have detailed directions on the positioning, so that you wont have to guess what you should do. Just observe them, complete the installation, and start having fun. The Fast Games part includes 124 unique, fast-paced games that are incredibly enjoyable and rewarding. They require zero data and zero effort they are simply there to entertain you and reward you if youre fortunate.

The all-rounder brought an end to the blistering knock from Mayers and celebrated the wicket with an enormous roar. On Saturday, Lucknow Super Giants are batting first in opposition to Delhi Capitals and the spectators witnessed an explosive knock from Kyle Mayers within the first innings. DC required something special to wrap up the West Indian batter and Axar Patel was the man to rise to the state of affairs. His breakthrough was result of a particular supply and the all-rounder made it additional special with an extravagant celebration. Even the ordinary dismissals are made special by bowlers with extravagant celebrations after the wicket. Getting acquainted with the historical past of transactions and bets.

Stadium map depicts all the stand, pitch, pavilions, entry gates and different useful information of the bottom. During the CM Yogi Adityanath swearing ceremony, guests attended the ceremony. Map of Ekana stadium will surely assist the guests to search out the designated seat. Log on to the official website selling IPL Lucknow tickets. Lucknow Ekana International Cricket StadiumLucknow worldwide cricket stadium is constructed by Ekana Sportz City Pvt.

An important part of sports activities betting is the depth of the guess record. You can wager on greater than 1500 different outcomes on main sporting events. At the identical time, the games of native leagues are additionally not disadvantaged of the eye of the bookmaker.

Fast video games day Every Wednesday, casino players could make a deposit and get a 100 percent matched bonus as a lot as 100 (8,900) and five free spins. Naturally, you have to use the bonus on chosen quick video games Melbet offers. MelBet does every little thing possible on your consolation, so the site routinely adjusts to your system parameters, making it straightforward to navigate between the sections you want. You will also be ready to register, fund your account and bet on sports activities or casinos, and you may always ask your inquiries to the support team. Using the Melbet app makes your playing so much simpler.

Next step is to choose your preferred fee technique. You might be provided with four easy registration strategies. Over/underscore Here, the punters will predict whether the ultimate total rating of a staff in...

07:07

Melbet On Line Casino Evaluation 2023 Melbet Casino India h+ Media

Melbet On Line Casino Evaluation 2023 Melbet Casino India

bookmarks in your browser. By doing that you simply wont lose entry to your winnings and personal knowledge at any time. All of that could be reached by utilizing just your browser, as a substitute of putting in the Melbet software and filling the system storage! All your data is protected with an SSL-encryption key even in a cellular model of a website. Note that Melbet is compatible with any browser, together with Safari, Mozilla, Google Chrome, and Opera).

There are also varied reload bonuses, and free bet provides available once in a while. Melbet frequently runs attractive promotions that can considerably increase your winnings. For example, they usually offer enhanced odds-on sure markets, permitting you to position bets with inflated odds and potentially make massive profits. They additionally run regular reload bonuses, providing you with a percentage bonus on top of your deposited quantity when replenishing your account stability. Volleyball is one other fashionable sport amongst Melbet prospects.

This provide nonetheless, solely applies to pre-match single and accumulator bets and not reside bets. To avail this bonus provide, punters should have made the bets with real money and people bets must be having minimum odds of 1.three. The bonus quantity might be instantly credited to your account once you place your one hundredth bet. For a cushty game from a smartphone, a cellular

Just for this chance, you need to use the smartphone program and have it all the time at hand. Downloading Melbet for Android is free, service is out there to all Internet users. However, in the intervening time its inconceivable to find the program in the Play Market.

The website of Melbet is well navigable, which cuts down plenty of problem for the gamers. It also options an amazing loyalty program, which is designed to offer a personalised experience to its loyal gamers. This online on line casino is accepting gamers from all the world over including India. Moreover, the operators have made special efforts in catering to the requirements of Indian gamers by adding Indian gambling video games in its broad selection of games. Its now time to evaluate one of the veterans in the on-line on line casino recreation, Melbet. Launched in 2012, they are in a number of different markets from all over the world and now theyve entered India and are making a huge impact.

PCA stadium ticket counter timings shall be announced in advance through the official channels. From the ticket rate desk, visitors can check Mohali Stadium IPL tickets price 2023. Cricket followers of Lucknow and UP are very excited that the T20 matches of the Lucknow Giants IPL matches shall be hosted in this stadium.

The primary complaints theyve relating to particular features or wageri...

07:05

Melbet India Evaluate Get 2150 In Free Bets h+ Media

Melbet India Evaluate Get 2150 In Free Bets

This is probably the most sought-after payment answer in India. Millions of bettors are using this digital fee system because of the excellent customer support and very low transaction fees. If you are the proprietor of the iOS system, check one of the best apps for betting in India below. The bonus might be credited to the clients account automatically after the first deposit is made, until the field I are not wanting for any bonuses is ticked. [newline]This methodology can be referred to as essentially the most dependable, also whenever you create an account in this method, sooner or later it will be a lot easier to pass the verification procedure. Here you will need to specify a legitimate email tackle, currency, nation and different personal information which might be requested by the bookmaker.

I even have been betting on this web site for over 2 years now, no withdrawal problems, I actually have withdrawn over 700,000 already. Melbet is a standard online bookmaker that has been round since 2012. The firm is owned and operated by Bonnal Limited. You can log in to your private account by entering an e-mail address and a password specified throughout registration. Thanks to the above points, the program for phones works even with a poor connection to the cellular Internet. To verify your melbet account, you simply want to provide information about you and your house of residence.

Real-time bets require plenty of consideration, as the odds on bets change throughout the sport. The Melbet India website is a reliable, safe platform for betting on sports activities. Here, your money and private knowledge are fully protected. Also available to you is a magnificent world of assorted betting and entertainment at any time of day and night time. While making their first deposit, users can get a 100% bonus, which may be as a lot as Rs. eight,000. It calculates routinely after you make your first deposit.

The app is primarily the identical for each iOS and Android and very useful. You can fill in your credentials later to unlock all the enhanced options the site offers, including the power to make a cost. The reside on line casino is as extensive because the common on line casino, no much less than when the variety of games is in query. If youre looking for quite a lot of sports activities and betting presents, you cant go mistaken with Melbet.

The web model of Melbet bookmaker does not have such speed of response, updating and offering information. Live mode users will extremely respect the features of the mobile app. Melbet may be new to the web betting scene, nevertheless it definitely is no novice. It presents its customers with a plethora of engaging options, sport collections and bonus provides which are sufficient for a punters lengthy dedication to this site. Melbet India provides all kinds of generous bonus and promotional provides to it...

07:04

Melbet App Obtain For Android Apk And Ios Free Of Charge h+ Media

Melbet App Obtain For Android Apk And Ios Free Of Charge

There is a robust emphasis on sports betting, and this prominence makes it troublesome for gamers to find different recreation choices. This on line casino offers a dynamic mix of reside on line casino games plus options for stay sports betting supplied by well-known on line casino software program companies. Our experts delve into the positive and negative features of MELbet in India to discover out whether or not it is the proper match for an Indian gambler. BetRaja is your go-to source for on-line betting in India. The advantages of this bookmaker are undoubtedly a handy line, a handy Melbet cellular utility. There have been no problems with crediting and withdrawing funds but.

Betting on Sports with Melbet wouldnt be full when the website didnt provide Live Betting options. In contrast to Pre Match bets, Live bets are made simply as the occasion runs. The odds right here are often decrease and theyre dynamic. Both the app of Melbet and its website helps Live Streaming.

You can download Melbet cellular app for Android and iOS and make bets out of your smartphone. The shopper has a user-friendly interface, pleasant design and supports all of the sports available on the site. Bet on cricket, kabaddi and different disciplines, get winnings and withdraw them by way of the cashier, make deposits and activate bonuses. All this shall be obtainable in Melbet app for smartphones. When gamers place one hundred bets in a span of 30 days, they get the chance to win a bonus equal to the amount of the common stake of these one hundred bets.

One of the most effective things about Melbet is that the positioning is great for newbies and superior gamers alike. Please note that the corporate does not cost any commissions for your transactions, nevertheless commissions could apply to your most well-liked fee method. When you sign up for Melbet, youll be requested to create a username and password. This will be your login info for the Melbet website. Once youve logged in, youll have the flexibility to view the percentages for all the obtainable bets.

If there isnt any cash in your account, you might make a deposit by way of the cashier. We cowl all well-liked eSports events and offer a wide variety of outcomes for betting. And bets are available on both particular person match outcomes and international results, such because the winner of the championship. Enter promo code STARTBONUS1 to get your welcome bonus and to have a possibility to participate in all the promotions supplied by our bookmaker workplace. Depending on the registration technique you select, you will want to fill in a number of fields along with your personal knowledge.

We recommend reserving Mohali tickets 2023 solely via official web sites. Always comply with pointers and security procedures to enjoy the reside match within the stadium. Check the website account and r...

06:59

New VPN Malvertising Attack Drops OpcJacker Crypto Stealer HackRead | Latest Cybersecurity and Hacking News Site

By Deeba Ahmed

Researchers warned that the campaign works through a network of fake websites that promote seemingly harmless crypto apps and other software.

This is a post from HackRead.com Read the original post: New VPN Malvertising Attack Drops OpcJacker Crypto Stealer

05:53

05:53

04:56

Amazon's Smart Speakers Collecting Kids Data May Lead to Government Lawsuit SoylentNews

Amazon's smart speakers may've landed the tech giant in hot water:

A Federal Trade Commission complaint could lead the US government to sue Amazon over children's data the retail giant collected through its line of smart speakers, according to a Bloomberg report on Friday.

At issue is whether Amazon's series of Alexa-powered smart speakers were collecting data on children under the age of 13 without parental consent and retaining it even after users attempted to delete it, which children's advocacy organizations asked the FTC look into back in 2019, the report said.

Now the FTC is now recommending issuing a complaint that Amazon didn't confirm parental consent before collecting data and that most of the Alexa activities designed for kids didn't have a privacy policy, sources told Bloomberg. The Justice Department could take the next step and file a lawsuit against Amazon next month.

The Amazon suit comes amid an FTC crackdown on data collection over the last few years under Chair Lina Khan, including fining the company formerly known as Weight Watchers for improperly storing kids' info. The commission also ordered Fortnite creator Epic Games to pay $520 million in fines and refunds for tricking kids into making in-game purchases and violating their privacy.

[...] Should the lawsuit find Amazon at fault, it's unclear how much it could be forced to pay in penalties. While Amazon reportedly claimed to be in compliance with the Children's Online Privacy Protection Act (COPPA), if it's found to have violated those rules dictating how children's data should be protected, the company could pay $50,000 per child affected, according to Politico.


Original Submission

Read more of this story at SoylentNews.

04:54

Trump Leaves Florida for New York Ahead of Expected Surrender and Arraignment cryptogon.com

Update: Trump to be Charged Tuesday with 34 Felony Counts: Donald Trump will be placed under arrest on Tuesday and informed that he has been charged with 34 felony counts for falsification of business records, according to a source who has been briefed on the procedures for the arraignment of the former president. A New []

04:38

Distribution Release: ExTiX 23.4 DistroWatch.com: News

ExTiX is a deepin-based (previously Ubuntu-based) distribution. Deepin today (230403). This ExTiX Build is based on Deepin 23 Alpha 2 (latest version) released by Deepin Technology on....

04:26

Eliezer Yudkowsky: Dangers of AI and the End of Human Civilization, I Hope Theres Nobody Inside There cryptogon.com

I havent been posting much because Ive been reading, watching and listening to things like this all weekend. Via: Lex Fridman: Related: They Dont Know How It Works In the Battle Between Microsoft and Google, LLM Is the Weapon Too Deadly to Use

03:24

Cloudflare DNS Must Block Pirate Sites, Italian Court Confirms TorrentFreak

1111Website blocking has become an increasingly common anti-piracy tool. ISPs in dozens of countries have been ordered by courts to block pirate sites.

More recently, these blocking requests have expanded to DNS providers as well. In Germany, for example, a court ordered DNS resolver Quad9 to prevent users from accessing the music piracy site Canna.to.

Court Ordered Cloudflare to Block Torrent Sites

As one of the larger DNS resolvers, Cloudflare is also under fire. In Italy, several music companies, including Sony Music, Warner Music, and Universal, took Cloudflare to court, demanding the blocking of three torrent sites on the companys freely available 1.1.1.1 resolver.

Last year, an Italian court sided with the music companies. Through an interim order, the court ordered the blocking of kickasstorrents.to, limetorrents.pro, and ilcorsaronero.pro, three domains that are already blocked by ISPs in Italy following an order from local regulator AGCOM.

Cloudflare was unhappy with the courts decision and immediately protested the injunction. The challenge failed last November when the court upheld its initial ruling, discarding Cloudflares objections.

Among other things, the court held that the blocking order doesnt require the DNS resolver to surveil user activity, as Cloudflare challenged. A general monitoring obligation for online intermediaries would violate EU law, but the court determined that wasnt relevant in this case.

Cloudflares obligation to intervene to prevent the resolution of names does not derive from a general duty of surveillance but arises with the reporting of the specific illegal activity carried out through the public DNS service, the court held.

Court Confirms DNS Blocking Requirement

The ruling was a setback for Cloudflare, but that wasnt its only challenge. The American company filed an additional application where it requested clarification on the technical implementation of the blocking order. According to Cloudflare, blocking measures severely interrupt its DNS service, also in relation to competitors....

03:00

Updated SUSE ALP Prototype Focuses On Confidential Computing Phoronix

SUSE announced today the release of "Piz Bernina", its latest quarterly update to the SUSE Adaptable Linux Platform that is working to establish the next-generation SUSE/openSUSE computing platform...

02:13

A Serial Tech Investment Scammer Takes Up Coding? Krebs on Security

John Clifton Davies, a 60-year-old con man from the United Kingdom who fled the country in 2015 before being sentenced to 12 years in prison for fraud, has enjoyed a successful life abroad swindling technology startups by pretending to be a billionaire investor. Davies newest invention appears to be CodesToYou, which purports to be a full cycle software development company based in the U.K.

The scam artist John Bernard a.k.a. Alan John Mykailov (left) in a recent Zoom call, and a mugshot of John Clifton Davies from nearly a decade earlier.

Several articles here have delved into the history of John Bernard, the pseudonym used by a fake billionaire technology investor who tricked dozens of startups into giving him tens of millions of dollars.

John Bernards real name is John Clifton Davies, a convicted fraudster from the United Kingdom who is currently a fugitive from justice. For several years until reinventing himself again quite recently, Bernard pretended to be a billionaire Swiss investor who made his fortunes in the dot-com boom 20 years ago.

The Private Office of John Bernard let it be known to investment brokers that he had tens of millions of dollars to invest in tech startups, and he attracted a stream of new victims by offering extraordinarily generous finders fees to brokers who helped him secure new clients. But those brokers would eventually get stiffed because Bernards company would never consummate a deal.

John Bernards former website, where he pretended to be a billionaire tech investor.

Bernard would promise to invest millions in tech startups, and then insist that companies...

02:10

Fearing Loss of Control, AI Critics Call for 6-Month Pause in AI Development SoylentNews

https://arstechnica.com/information-technology/2023/03/fearing-loss-of-control-ai-critics-call-for-6-month-pause-in-ai-development/

On Wednesday, the Future of Life Institute published an open letter on its website calling on AI labs to "immediately pause for at least 6 months the training of AI systems more powerful than GPT-4." Signed by Elon Musk and several prominent AI researchers, the letter quickly began to draw attention in the pressand some criticism on social media.

Earlier this month, OpenAI released GPT-4, an AI model that can perform compositional tasks and allegedly pass standardized tests at a human level, although those claims are still being evaluated by research. Regardless, GPT-4 and Bing Chat's advancement in capabilities over previous AI models spooked some experts who believe we are heading toward super-intelligent AI systems faster than previously expected.

See Also: FTC Should Stop OpenAI From Launching New GPT Models, Says AI Policy Group

Related:
OpenAI Is Now Everything It Promised Not to Be: Corporate, Closed-Source, and For-Profit (March 2023)
OpenAI's New ChatGPT Bot: 10 "Dangerous" Things it's Capable of (Dec. 2022)
Elon Musk Says There Needs to be Universal Basic Income (Aug. 2021)
Tesla Unveils Chip to Train A.I. Models Inside its Data Centers (Aug. 2021)
Elon Musk Reveals Plans to Unleash a Humanoid Tesla Bot (Aug. 2021)
...

01:57

Linux Foundation is Outsourcing Linux Development and Communications to Surveillance Giants Techrights

More centralised than distributed, as thats how big sponsors (buying Board seats for 7-figure sums) of the Linux Foundation truly want things to be. Its neither pragmatic nor desirable, but impractical workflows enable control from above, not by peer (like peer review).

Linus Torvalds on using webmail: I only have a web browser, which is how I read e-mail and a couple of terminal windows open, which is where I end up doing my Git pulls and any coding although the coding part is not that common any more. (Partial transcript)

Video download link | original/full

Summary: It seems like Mr. Torvalds, the founder of Linux, has been tragically compelled to use proprietary software for E-mail (the primary means/tool for collaboration around Linux); this concerning trend, however, would be consistent with a lot of what weve been seeing from Jim 'respect Microsoft' Zemlin and his associates at the Board of Directors (proprietary software boosters)

THE Linux Foundations insistence on the use of Microsofts proprietary GitHub has long been documented here. Its done in defiance of...

01:30

AMD P-State EPP Performance With EPYC On Linux 6.3 Phoronix

Among the many new features coming in Linux 6.3 -- including many AMD additions -- is the AMD P-State EPP "Energy Performance Preference" support being merged for modern Ryzen and EPYC systems. AMD P-State EPP can further help tune the performance and power efficiency of AMD Linux systems beyond the existing basic AMD P-State driver support and address some existing deficiencies. Here are some benchmarks of the AMD P-State and ACPI CPUFreq driver configurations benchmarked on an EPYC Milan-X server with the in-development Linux 6.3 kernel.

00:24

Western Digital Security Breach Hackers infiltrate Internal Systems HackRead | Latest Cybersecurity and Hacking News Site

By Waqas

The cyberattack has forced the technology giant to shut down and take some of its operations offline.

This is a post from HackRead.com Read the original post: Western Digital Security Breach Hackers infiltrate Internal Systems

00:22

Western Digital took its services offline due to a security breach Security Affairs

Western Digital disclosed a security breach, according to the company an unauthorized party gained access to multiple systems.

Western Digital has shut down several of its services after discovering a security breach, the company disclosed that an unauthorized party gained access to multiple systems.

Western Digital is currently experiencing a service outage impacting the following products: My Cloud, My Cloud Home, My Cloud Home Duo, My Cloud OS5, SanDisk ibi, SanDisk Ixpand Wireless Charger. reads the status page of the company on April 2, 2023. We are working to restore service. We apologize for any inconvenience. Next update will be posted on Monday, April 3.

On March 26, 2023, Western Digital identified a network security incident involving Western Digitals systems. In connection with the ongoing incident, an unauthorized third party gained access to a number of the Companys systems. reads the press release issued by the company. Upon discovery of the incident, the Company implemented incident response efforts and initiated an investigation with the assistance of leading outside security and forensic experts. This investigation is in its early stages and Western Digital is coordinating with law enforcement authorities.

Western Digital launched an investigation into the security breach and announced that it is implementing proactive measures to secure its operations. The response to the incident includes taking systems offline.

The company is working to understand the nature and extent of that security breach, it is also working on restoring impacted services.

The response to the incident put in place by WD suggests that the company was the victim of a ransomware attack, but at this time it is not included in any of Tor leak sites of ransomware groups.

Please vote for Security Affairs (https://securityaffairs.com/) as the best European Cybersecurity Blogger Awards 2022 VOTE FOR YOUR WINNERS
Vote for me in the sections:

  • The Teacher Most Educational Blog
  • The Entertainer Most Entertaining Blog
  • The Tech Whizz Best Technical Blog
  • Best Social Media Account to Follow (@securityaffairs)

Please nominate Security Affairs as your favorite blog.

...

00:18

Mesa Zink Change Leads To 50% Reduction In Memory Utilization Phoronix

A rather profound change is pending for Mesa 23.1 that should lead to this OpenGL-on-Vulkan driver's memory utilization being cut in half for most games without negatively impacting the performance and likely closing a number of bugs in the process...

00:00

Self-Healing Concrete: What Ancient Roman Concrete Can Teach Us Hackaday

Concrete is an incredibly useful and versatile building material on which not only todays societies, but also the ancient Roman Empire was built. To this day Roman concrete structures can be found in mundane locations such as harbors, but also the Pantheon in Rome, which to this day forms the largest unreinforced concrete dome in existence at 43.3 meters diameter, and is in excellent condition despite being being nearly 1,900 years old.

Even as the Roman Empire fell and receded into what became the Byzantine also known as the Eastern Roman Empire and the world around these last remnants of Roman architecture changed and changed again, all of these concrete structures remained despite knowledge of how to construct structures like them being lost to the ages. Perhaps the most astounding thing is that even today our concrete isnt nearly as durable, despite modern inventions such as reinforcing with rebar.

Reverse-engineering ancient Roman concrete has for decades now been the source of intense study and debate, with a recent paper by Linda M. Seymour and colleagues adding an important clue to the puzzle. Could so-called &#...

Go Back:30 Days | 7 Days | 2 Days | 1 Day

IndyWatch Science and Technology News Feed Today.

Go Forward:1 Day | 2 Days | 7 Days | 30 Days

Monday, 03 April

23:55

[$] User trace events, one year later LWN.net

The kernel has a well-developed mechanism for the control of tracing of events in kernel space. Developers often want to be able to trace user-space activity as well, using the same interfaces, but that mode is rather less well supported. One year ago, an attempt to add an API for the control of user-space trace events ran into trouble and has never been fully enabled. Now, Beau Belgrave is back with a reworked API that may finally result in this mechanism becoming generally available.

23:51

bet365 ba88 Comntx On-line Food & Grocery h+ Media

bet365 ba88 Comntx On-line Food & Grocery

It is likely one of the greatest on-line betting corporations in terms of buyer base and revenue. The company products include a sportsbook, a racebook, an online on line casino, poker, and bingo. The 365 online casino brings the thrill of on line casino entertainment proper to the New Zealand players PC or cellular gaming screens.

There can be Playback bonus up for grabs each Tuesday, the place the participant can win 10% of as a lot as $100 of what the home has taken as a end result of your play. Like the new participant bonus, a wagering requirement is connected earlier than you can withdraw any resultant winnings. Bet365 supply two Playtech platforms, Euro and Asian, with a wide-ranging selection games.

Players utilizing the Bet365 cell are in a place to stream reside matches, bet reside matches, cash-out and carry out other actions similar to depositing and withdrawing. It wasnt till the January 2000 when Denise Coates struck gold by registering the domain name Bet365.com. As you presumably can see, we couldnt actually find any negatives to listing about Bet365 NZ. The platform is great. If you wish to use a trusted casino with a wonderful game selection, this is one of the top actual cash casinos obtainable. You can break up the hand into two palms and double your bet, youre free to enjoy their big sport platform whereas knowing fairness and security is always deal with and examined at random.

This can additionally be true for Bet365 that lists round half as many methods for withdrawing such as Visa, financial institution switch, PayPal and Skrill. A participant ought to mind the minimal quantity of $10 and this could be a very low restrict as compared to peer online casinos out there. Moreover, the max withdrawal restrict is restricted by capabilities and rules of a cost method, not the on line casino. For example, Visa debit card allows for a max $30,000 in any single transaction. So a participant who needs to cash out a larger sum, has to do that in no much less than two installments. Anyway, no time limits is a pleasant strategy exercised by the online casino.

There, on the very best, youll be able to select the type of guess Standard or Banker. To place an specific guess on Bet365 login my account, enter the wager quantity beneath the name of the events, reverse the inscription Doubles. Each web site on-line account shopper has one of the best to find out on the suitable verification methodology. Australia has a 100 percent regulated sports activities betting and racing trade.

To withdraw your cash, you have to go to My Account click on on the withdraw link, after which select your hottest methodology. For further suggestion on using Bet365 welcome bonus, youll have the facility to always contact the betting firm employees. You can then make a guess and cost options primarily based in your non-public...

23:49

Bet365 Nz Casino Evaluate $200 Nzd Bet365 On Line Casino Bonus 2023 h+ Media

Bet365 Nz Casino Evaluate $200 Nzd Bet365 On Line Casino Bonus 2023

In complete, there are over 325 pokie games to play in the main bet365 Casino NZ lobby. Clicking the Games tab at the high left masses a special lobby, with an extra assortment of over a thousand of the best pokie video games. This variety supplies NZ players with a pleasant number of titles to evaluate. They have video games from high suppliers who add the newest recreation features, including fixed jackpots, progressives, methods plus, power play, money gather, megaways, and extra. Many pokie slots right here can be played using a bet365 bonus code or other promotional offers offered by the on line casino, together with their first deposit offer and weekly free spins deal. Casino customers obtained accustomed to the reality that cashing out is effected via fewer strategies than are offered for deposit.

forty five million sports activities betters go to Bet365 Sports for a reason, and we see no concern with recommending you attempt them out. We recommend you employ these instruments if you need them, as its not definitely value the stress of tolerating a gambling downside in any sense. If youre starting to assume that your sporting betting is getting out of hand, Bet365 Sports has a range of tools to help you get things back underneath management. In phrases of enhanced odds or boosted odds, take a look at out part above on Bet365s promotions there are a ton of them.

When it comes to creating withdrawals, you can enjoy a similar range of payment options. Other measures embody a compulsory handle and identity verification which is according to its KYC pointers. To curb money laundering gamers are required to withdraw cash using the same cost they used for deposit. In circumstances the place the card might have been expired, youll have to withdraw cash to your checking account which is required to have an analogous name and address to your Bet365 profile. The deposit and withdrawal limits depend upon the cost methods used. However, the sportsbook is versatile and accepts deposits and withdrawals as low as USD 10.

Our evaluation found that it is a very trustworthy site who has licenses in Australia and Malta and therefore makes it safe to guess right here from New Zealand. The bookmaker facilitates a broad range of reliable fee strategies, and their customer support group are available 24/7 to assist you along with your sports activities bets. Bet365 is one of the most recognised sports betting corporations on the market but what many people dont realise is that it also has an internet casino suite. Our Bet365 evaluation takes a look at this side of the operator, exploring its options and discovering its strengths and weaknesses.

The report serves exactly studied and analyzed information of the major industry players along with their share within the Sports Betting market. The analytical instruments used for the research compri...

23:27

Security updates for Monday LWN.net

Security updates have been issued by Debian (duktape, firmware-nonfree, intel-microcode, svgpp, and systemd), Fedora (amanda, dino, flatpak, golang, libldb, netconsd, samba, tigervnc, and vim), Red Hat (nodejs:14), Slackware (ruby and seamonkey), SUSE (drbd, flatpak, glibc, grub2, ImageMagick, kernel, runc, thunderbird, and xwayland), and Ubuntu (amanda).

23:26

Do Trees Really Talk to Each Other Through Underground Fungal Networks? SoylentNews

U of A expert contests popular claims about a "wood-wide web":

The idea that forest trees can "talk" to each other through a connective underground web of delicate fungal filaments tickles the imagination.

In fact, the concept is so intriguing, it's taken root in popular media, from a popular book to podcasts, TV and radio shows.

Dubbed the "wood-wide web," the idea that underground fungi allow trees to share resources with their seedlings and even protect them definitely puts the "fun" in fungus.

But the science behind those ideas is unproven, cautions University of Alberta expert Justine Karst.

In a perspective published in Nature Ecology & Evolution, Karst and two colleagues contest three popular claims about the capabilities of underground fungi known as common mycorrhizal networks, or CMNs, that connect roots of multiple plants underground. Fungi are living organisms such as moulds, yeast and mushrooms.

"It's great that CMN research has sparked interest in forest fungi, but it's important for the public to understand that many popular ideas are ahead of the science," says Karst, associate professor in the U of A's Faculty of Agricultural, Life & Environmental Sciences.

Read more of this story at SoylentNews.

23:24

Is it possible to transfer human consciousness to a computer? Storage, time and space constraints boggle researchers Lifeboat News: The Blog

We often imagine that human consciousness is as simple as input and output of electrical signals within a network of processing units therefore comparable to a computer. Reality, however, is much more complicated. For starters, we dont actually know how much information the human brain can hold.

23:23

Google announces a series of cost-saving measures across the company as it cuts some staff perks Lifeboat News: The Blog

As part of belt-tightening at the company, Google told staff it would cut back on some of its lavish perks, including reducing caf hours.

23:22

This Transformers-Like eVTOL Concept Is One Step Closer to Hitting the Skies Lifeboat News: The Blog

Woah, were halfway there. The company behind the hotly anticipated eVTOL Cavorite X5 announced it has completed construction of a 50-percent-scale prototype of its stylish flying vehicle concept.

Horizon Aircraft impressed us last year when it unveiled the Cavorite X5, with the Toronto-based company showing that the usually utilitarian world of eVTOLs could afford a little more attractive form with its function. The sleek, canard-style plane can takeoff, soar and land like a conventional aircraft, but the wings can open to reveal 16 ducted fans that provide the aircrafts vertical lift. Once at altitude, the wing closes as it transitions to cruising. This technology would allow the aircraft to fly 98 percent of its voyage in a low-drag configuration, much like a traditional aircraft. When Horizon hybrid electric system that can recharge a battery in-flight.

23:07

3CX supply chain attack: What do we know? Help Net Security

Five days have passed since the supply chain attack targeting 3CX customers gained wider public attention, but the softwares manufacturer is yet to confirm how the Windows and macOS desktop apps (based on the Electron software framework) have been compromised by the attackers. 3CX has called in outside experts On March 29th, 3CX received reports from a third party of a malicious actor exploiting a vulnerability in our product. We took immediate steps to investigate More

The post 3CX supply chain attack: What do we know? appeared first on Help Net Security.

23:05

Rust-Written Coreutils v0.0.18 Released With Improved GNU Compatibility Phoronix

One of several notable open-source projects to rewrite key Linux software components with the memory-safety-focused Rust programming language is uutils as an alternative to GNU Coreutils. Released this weekend was uutils v0.0.18 that continues to enhance compatibility with the upstream GNU Coreutils programs...

23:01

Monitor your infrastructure with Streamlit Linux.com

Learn how to use Streamlit for monitoring and compare it against Grafana and InfluxDB to observe your infrastructure.

Read More at Enable Sysadmin

The post Monitor your infrastructure with Streamlit appeared first on Linux.com.

22:36

Intel Prepares AMX-COMPLEX Support For GCC & LLVM Compilers Phoronix

Intel compiler engineers have sent out the initial GCC and LLVM/Clang compiler patches for enabling the newly-disclosed AMX-COMPLEX extension with next year's Xeon Scalable "Granite Rapids" processors...

22:35

Mullvad VPN and Tor Project Release Mullvad Browser HackRead | Latest Cybersecurity and Hacking News Site

By Waqas

Mullvad VPN and the Tor Project Join Forces to Launch Mullvad Browser, a Privacy-Focused Web Browser.

This is a post from HackRead.com Read the original post: Mullvad VPN and Tor Project Release Mullvad Browser

22:28

Links 03/04/2023: Tux Paint 0.9.29 and Krita Plans Techrights

  • GNU/Linux

    • Applications

      • TecMint 19 Best Open Source WYSIWYG HTML Editors in 2023

        Every website on the internet uses HTML language and relies on using an editor to build the website. The HTML editor is a platform to edit and create the websites content.

        A great way to make HTML content is often through a WYSIWYG editor, short for What You See is What You Get. These editors work similarly to a word processor, creating the HTML for you and giving you a preview of what to expect.

        Additionally, we must remember that the WYSIWYG HTML editors are open-source products for everyone. With open-source H...

22:24

LogRhythm releases new cybersecurity capabilities to improve operational efficiency Help Net Security

For a fourth consecutive quarter, LogRhythm releases new cybersecurity capabilities that makes it easier for security teams to reduce noise, prioritize work and quickly secure their environments. Analysts gain a simplified experience to focus on detecting, investigating, and responding to threats. In its continued commitment to customer satisfaction, LogRhythm also announces the Unlimited Upgrades Service by the Professional Services team which assists customers in upgrading to every quarterly SIEM release with ease. LogRhythm is proud More

The post LogRhythm releases new cybersecurity capabilities to improve operational efficiency appeared first on Help Net Security.

22:00

Microsoft Lays Off African Staff as Windows Market Share in Africa Falls to 15% Techrights

Summary: Microsoft is rapidly shrinking while the media is paid to run a festival about Hey Hi (AI), distracting from what really goes on at the company

BEHIND the smokescreen of chaffbots and fake figures (e.g. about Vista 11s adoption rates) there is a very dark reality. Last week I heard from two people connected to the company. The workers are terrified. Not only colleagues but also managers just vanish. Morale is awful.

Only 15% of Web accesses in Africa originate from Windows and this exacerbates further after Microsoft was paying Kenyans just $2 an hour to work for Microsoft, reportedly trying to correct the output from Microsofts epic waste of electricity, trying to put over-provisioned and under-utilised Azure to work; lets face it, Azure is failing and many there have been laid off for 3 years already! There are more reports from TheLayoff. Its impossible to keep track of the number of waves of layoffs anymore. Have over 20,000 Microsoft employees been shown the door or given notice yet? 30,000? Anyone deviating away from Microsofts official talking points is being ridiculed and dismissed as crazy. The media helps Microsoft cement a lie, belittling the crisis.

How very tolerant those Microsofters

How many Cantrells are on Microsofts payroll?

It was covered in a local site:

Microsoft begins wave of African layoffs in Kenya

More to come for sure.

Microsoft is also...

21:41

Western Digital Hit by Network Security Breach - Critical Services Disrupted! The Hacker News

Data storage devices maker Western Digital on Monday disclosed a "network security incident" that involved unauthorized access to its systems. The breach is said to have occurred on March 26, 2023, enabling an unnamed third party to gain access to a "number of the company's systems." Following the discovery of the hack, Western Digital said it has initiated incident response efforts and enlisted

21:32

Microsoft fixed Azure AD bug that led to Bing.com results manipulation and account takeover Security Affairs

Microsoft addressed a misconfiguration flaw in the Azure Active Directory (AAD) identity and access management service.

Microsoft has addressed a misconfiguration issue impacting the Azure Active Directory (AAD) identity and access management service that exposed multiple Microsoft applications, including the Bing management portal, to unauthorized access.

The vulnerability was discovered by Wiz Research which determined that about 25% of multi-tenant applications turned out to be vulnerable. 

We found several high-impact, vulnerable Microsoft applications. One of these apps is a content management system (CMS) that powers Bing.com and allowed us to not only modify search results, but also launch high-impact XSS attacks on Bing users. reads the post published by security firm Wiz. Those attacks could compromise users personal data, including Outlook emails and SharePoint documents.

The issues were reported to Microsoft in January and February 2022, following which the tech giant applied fixes and awarded Wiz a $40,000 bug bounty. Redmond said it found no evidence that the misconfigurations were exploited in the wild.

The vulnerability is related to a misconfiguration in Shared Responsibility confusion. The shared responsibility model allows application owners to add an authentication function by simply clicking a button.  

The experts pointed out that the flaw has a severe impact, especially on multi-tenant applications without proper validation because any Azure user will be able to log in to the application.

This means that several Microsoft Microsoft applications permit external parties to obtain read and write to the impacted applications.

The researchers detailed a case study on the Bing Trivia application, which they have called #BingBang, which demonstrates how the misconfiguration impacts Microsoft...

21:25

Italian Watchdog Bans OpenAI's ChatGPT Over Data Protection Concerns The Hacker News

The Italian data protection watchdog, Garante per la Protezione dei Dati Personali (aka Garante), has imposed a temporary ban of OpenAI's ChatGPT service in the country, citing data protection concerns. To that end, it has ordered the company to stop processing users' data with immediate effect, stating it intends to investigate the company over whether it's unlawfully processing such data in

21:22

A brief history of artificial intelligence Lifeboat News: The Blog

Explore the history of artificial intelligence, from Alan Turings Turing Test to the latest breakthroughs in machine learning and natural language processing.

21:20

"It's The Service Accounts, Stupid": Why Do PAM Deployments Take (almost) Forever To Complete? The Hacker News

Privileged Access Management (PAM) solutions are regarded as the common practice to prevent identity threats to administrative accounts. In theory, the PAM concept makes absolute sense: place admin credentials in a vault, rotate their passwords, and closely monitor their sessions. However, the harsh reality is that the vast majority of PAM projects either become a years-long project, or even

21:03

Slint 1.0 Released As Rust-Focused Graphical Toolkit Phoronix

In addition to today marking the release of Qt 6.5 LTS, Slint 1.0 has been released as a Rust-focused graphical toolkit that also supports bindings for other programming languages. Slint aims to deliver efficient and fluid GUIs from embedded to desktop and features its own markup language...

21:00

Minecraft Finally Gets Multi-Threaded Servers Hackaday

Minecraft servers are famously single-threaded and those who host servers for large player bases often pay handsomely for a server that has gobs of memory and ripping fast single-core performance. Previous attempts to break Minecraft into separate threads havent ended successfully, but it seems like the folks over at [PaperMC] have finally cracked it with Folia.

Minecraft is one of (if not the most) hacked and modded games in history. Mods have been around since the early days, made possible by a dedicated group who painstakingly decompiled the Java bytecode and reverse-engineered it. Bukkit was a server mod back in the Alpha days that tried to support plugins and extend the default Minecraft. From Bukkit, Spitgot was forked. From Spitgot, Paper was forked, which focused on performance and gameplay mechanics. And now from Paper, Folia is a new fork focused on multi-threading.

...

20:53

Apache IoTDB 1.1 Released For Open-Source Time-Series Database Phoronix

Apache IoTDB 1.1 has been released today as this database for the "Internet of Things" as a high performance time-series database solution. Like with most time-series databases, ApAche IoTDB aims to provide a high performance solution for data management and analysis from the edge to the cloud with high throughput, efficient data storage, and robust open-source software integration...

20:36

WebKitGTK Working On Accelerated Composited Rendering With DMA-BUF Phoronix

While WebKitGTK already provides accelerated compositing support, there are different code paths depending upon whether Wayland or X11 are used and various other complexities involved as well as differences between using the GTK3 and GTK4 toolkits. WebKitGTK developers have been working to instead shift their multiple different code paths toward one route by way of DMA-BUF...

20:34

Catch-23: The New C Standard Sets the World on Fire SoylentNews

ACM Queue magazine has an article with the title "Catch-23: The New C Standard Sets the World on Fire". This article offers opinions and analysis of a new major revision of the C language standard, C23, expected to be voted on in 2023:

[...] Like the previous major revision, C11, the latest standard introduces several useful features. The most important, if not the most exciting, make it easier to write safe, correct, and secure code. For example, the new header standardizes checked integer arithmetic.

[...] C23 also adds new features to protect secrets from prying eyes and programmers from themselves. The new memset_explicit() function is for erasing sensitive in-memory data; unlike ordinary memset, it is intended to prevent optimizations from eliding the erasure.

[...] In addition to these new correctness and safety aids, C23 provides many new conveniences: Constants true, false, and nullptr are now language keywords; mercifully, they mean what you expect. The new typeof feature makes it easier to harmonize variable declarations. The preprocessor can now #embed arbitrary binary data in source files. Zero-initializing stack-allocated structures and variable-length arrays is a snap with the new standard "={}" syntax.

[...] Sadly, good news isn't the only news about C23. The new standard's nonfeatures, misfeatures, and defeatures are sufficiently numerous and severe that programmers should not "upgrade" without carefully weighing risks against benefits. Older standards such as C99 and C11 weren't perfect, but detailed analysis will sometimes conclude that they are preferable to C23.

[...] Developers should also note that C23 has drifted further from C++ than the earlier C standards. The notion that C is (mostly) a subset of C++ is further from reality than ever before.

Magazine article:
Terence Kelly and Yekai Pan. 2023. Catch-23: The New C Standard Sets the World on Fire. Queue 21, 1, Pages 30 (January/February 2023), 19 pages. https://doi.org/10.1145/3588242


Original Submission

Read more of this story at SoylentNews.

20:18

Qt 6.5 LTS Released With Many Improvements Phoronix

Out today is the Qt 6.5 toolkit that is also now the second Qt6 long-term support release...

20:00

Building Smallsat Capabilities for Deep Space Centauri Dreams Imagining and Planning Interstellar Exploration

Building Smallsat Capabilities for Deep Space

LightCraft is the term used by Slava Turyshevs team at JPL and elsewhere to identify the current design of the ambitious mission we looked at briefly in the previous post. This is a Technology Demonstrator Mission (TDM), which can be considered a precursor to what may become a mission to the solar gravitational lens. The mission concept is under active investigation, partly via a Phase III grant from NASAs Innovative Advanced Concepts office. Reaching the focal region (for practical purposes, beyond 600 AU) in less than 25 years requires changes to our thinking in propulsion, not to mention payload size and the potential of robotic self-assembly en-route.

Hence the paper the researchers have just released, Science opportunities with solar sailing smallsats, which makes the case for leveraging our growing expertise in solar sail design and the highly successful move toward miniaturization in space systems, which the authors believe can be extended to include smallsats operating in the outer Solar System.

The TDM mission is conceived as a series of preparatory flights that allow the testing and validation of the technology and operational concepts involved in a mission to the focal region. The implications are hardly limited to the outer Solar System, for the smallsat/sail paradigm should be applicable to a wide range of missions in the inner system as well.

Lets pause for a moment on the term smallsat, which generally refers to a spacecraft that is both small and lightweight, usually less than 500 kilograms, and sometimes much less, as when we get into the realm of CubeSats. Frequently in the news as we explore their capabilities, CubeSats can get down to less than 2 kilograms. What the authors have in mind is a demonstrator design that is scalable, the initial payload in the 1-2 kilogram range, but capable of moving up to between 36 and 50 kilograms.

The goal is a demonstrator mission that will perform a one to two-year test flight using a solar sail and a sundiver maneuver to achieve speeds greater than 5 AU per year. The figure works out to something on the order of 23.6 kilometers per second, an impressive feat given that Voyager 1, our current record holder, is moving at 17.1 kps. With the TDM demonstrating the capabilities of the sails vane structure and the needed control for perihelion passage, the full solar gravitational lens mission contemplates still higher velocities, reaching 20 AU per year (roughly 95 kilometers per second).

The SGL mission concept is being built around in-flight cruise assembly of the full spacecraft through modules separately delivered as 20 kilogram or less smallsats. Given that overall design, you can see the need for the demonstrator...

19:39

Western Digital network security incident and service outage Help Net Security

US-based data storage company Western Digital has announced that it has suffered a network security incident that resulted in an unauthorized third party gaining access to a number of the companys systems and some company data. These are the most important details from the terse and very vague press release: Western Digital identified the network security incident on March 26, 2023 The company started IR efforts with the help of external security and forensic experts, More

The post Western Digital network security incident and service outage appeared first on Help Net Security.

19:22

Protons seem to be a different size depending on how you look at them Lifeboat News: The Blog

An experiment that probed particles called gluons, which contain most of the mass of a proton, has revealed that a protons radius alters depending on whether you look at the particles charge or mass.

By Alex Wilkins

19:20

Crypto-Stealing OpcJacker Malware Targets Users with Fake VPN Service The Hacker News

A piece of new information-stealing malware called OpcJacker has been spotted in the wild since the second half of 2022 as part of a malvertising campaign. "OpcJacker's main functions include keylogging, taking screenshots, stealing sensitive data from browsers, loading additional modules, and replacing cryptocurrency addresses in the clipboard for hijacking purposes," Trend Micro researchers

19:11

Malware and machine learning: A match made in hell Help Net Security

Weve been developing machine learning-based cybersecurity systems for many years and began developing automation for analysis in our labs in 2005. These early automation projects have since evolved into full-blown machine-learning frameworks. Since then, weve been waiting for our enemies to make the same move, and after 18 years, the wait is over malware with artificial intelligence has arrived. Defenders have been able to automate their work for some time, enabling excellent detection, analysis More

The post Malware and machine learning: A match made in hell appeared first on Help Net Security.

18:15

Malwarebytes unveils WorldBytes to help users reveal the hidden cyber threats around them Help Net Security

Malwarebytes launched WorldBytes, a next-generation mobile security application that takes the malware scanning technologies that customers know and love and applies them to the first frontier of human evolution: real life interactions. Powered by Malwarebytes and AI technology, WorldBytes empowers users to use their mobile devices to scan the world around them and get real-time threat assessments of anything and everything including questionable Tinder dates, the unlabeled sauce at the back of their fridge More

The post Malwarebytes unveils WorldBytes to help users reveal the hidden cyber threats around them appeared first on Help Net Security.

18:00

Tennis Balls Serve As Decent Bicycle Tires That Dont Easily Puncture Hackaday

Pneumatic tires provide a great ride, great grip, and yet have one fatal flaw theyre always getting punctured and leaving you stranded. [The Q] decided to solve this problem with a unique design: tires that use tennis balls as the cushioning medium instead.

The build begins with small cut sections of plastic water pipe. These are used as housings to hold tennis balls, which are pressed in with a unique tool of [The Q]s own construction. The individual ball assemblies are then bolted into a standard bicycle wheel, and a tread from a regular bike tire is stretched around the outside for grip.

It goes without saying that these tires wont offer the same quality of ride as regular pneumatic bike tires. Nor will the performance be as good, due to the significant extra unsprung weight. They are eye-catching...

17:49

Why Sharing Ebooks is Good for People and Good for Publishers SoylentNews

Why sharing ebooks is good for people and good for publishers:

One of the joys of reading is being able to share your favourite books with friends, family and colleagues. As I am sure is the case for most people, in these circumstances I often go on to buy my own copy of a book I have been lent and like. In this respect, sharing books is not only an important social act of generosity, it's also one of the best forms of marketing, since it represents a recommendation from a trusted source, and a chance to try before you buy.

Things have changed recently, with the increasing popularity of ebooks. Many use Digital Rights Management (DRM) to make it hard for people to share books. More generally, publishers have pushed the line that unlike physical books, ebooks should never be shared. Their main reason for this assertion seems to be that it's simply too easy to share digital books by making a copy, and so people shouldn't do it, because, well, copyright. But this new injunction is really part and parcel of publishers' wider fear of and hatred for anything digital. That's because they know that it is impossible to stop digital material being copied, no matter what laws are passed, or DRM is applied.

The idea that ebooks by definition must never be shared was always wrong books released under sensible licences can be shared without problems. It is also dangerous, because it leads to this kind of stupidity, noticed by the Twitter user @emeraalds when looking to buy a (physical) book, and reported here on The Mary Sue site (via mvario):

The copyright page, which is from a book called Zodiac Academy #1: The Awakening by Caroline Peckham and Susanne Valenti, reads, "This book may not be re-sold or given away to other people. If you would like to share this book with another person, please purchase an additional copy for each recipient. If you're reading this book and did not purchase it, or it wasn't purchased for your use only, then please return to your favourite book retailer and purchase your own copy. Thank you for respecting the hard work of this author."

Read more of this story at SoylentNews.

17:45

Moobot botnet spreads by targeting Cacti and RealTek flaws Security Affairs

The Moobot botnet is actively exploiting critical vulnerabilities in Cacti, and Realtek in attacks in the wild.

FortiGuard Labs researchers observed an ongoing hacking campaign targeting Cacti (CVE-2022-46169) and Realtek (CVE-2021-35394) vulnerabilities to spread ShellBot and Moobot malware.

The ShellBot, also known as PerlBot, is a Perl-based DDoS bot that uses IRC protocol for C2 communications. The ShellBot performs SSH bruteforce attacks on servers that have port 22 open, it uses a dictionary containing a list of known SSH credentials.

The Mirai-based Moobot botnet was first documented by Palo Alto Unit 42 researchers in February 2021, in November 2021, it started exploiting a critical command injection flaw (CVE-2021-36260) in the webserver of several Hikvision products. Since September 2022, Moobot botnet was spotted targeting vulnerable D-Link routers.

The CVE-2021-35394 flaw is an arbitrary command injection vulnerability that affects UDPServer due to insufficient legality detection on commands received from clients.

The CVE-2022-46169 flaw is a command injection vulnerability that can be exploited by an unauthenticated user to execute arbitrary code on a server running Cacti. The vulnerability resides in the remote_agent.php file, which can be accessed by an unauthenticated user.

The script file to further download Moobot is shown below. It executes the Moobot with the parameter realtek.<Filename>. reads the report published by FortiGuard Labs. Like most Mirai variants, it has an encrypted data section with a botnet configuration.

17:32

Free Google Play Alternative MicroG Framed in Bogus Vanced DMCA Notices TorrentFreak

microgWith no serious threat of being held to account, the DMCA takedown notice system is seen by some as a mechanism to hurt rivals or sow chaos for unspecified reasons.

As part of TorrentFreaks regular monitoring of the Lumen Database, an invaluable repository of DMCA notices received by Google and other platforms, we recently uncovered a particularly malicious attempt to frame a respected free and open-source project as the entity behind a series of bogus DMCA claims against almost two dozen sites.

MicroG Project and Vanced

The MicroG Project (microG) is a software development initiative that enables Android apps that rely on Google Play services to run without them. The people behind the project say that while Android is a Linux-based open-source operating system, increasing numbers of libraries and APIs are only available on devices that run proprietary Google software.

One of many projects that relied on microG was YouTube Vanced, an alternative YouTube app that removed all advertising and enabled background play, among other things.

Due to legal issues, Vanced shut down in early 2022 but was soon replaced by ReVanced, a new project with similar functionality. ReVanced and various apps that have emerged as clones or copycats of Vanced/ReVanced still use microG in some way.

Imposters Masquerade as microG

Previously sponsored by Germanys Federal Ministry of Education and Research, microG is a free-as-in-freedom open-source project. This means that microG is free of charge and has no restrictions on use, so when we saw copyright claims filed in microGs name targeting almost two dozen sites, that obviously raised alarm bells.

On March 30, 2023, someone claiming to be MicroG sent a DMCA complaint to Google. The following websites use our content, which is a significant loss for our company,...

17:23

Eliezer Yudkowsky: GPT-4 should not be open sourced | Lex Fridman Podcast Clips Lifeboat News: The Blog

Lex Fridman Podcast full episode: https://www.youtube.com/watch?v=AaTRHFaaPG8
Please support this podcast by checking out our sponsors:
- Linode: https://linode.com/lex to get $100 free credit.
- House of Macadamias: https://houseofmacadamias.com/lex and use code LEX to get 20% off your first order.
- InsideTracker: https://insidetracker.com/lex to get 20% off.

GUEST BIO:
Eliezer Yudkowsky is a researcher, writer, and philosopher on the topic of superintelligent AI.

PODCAST INFO:
Podcast website: https://lexfridman.com/podcast.
Apple Podcasts: https://apple.co/2lwqZIr.
Spotify: https://spoti.fi/2nEwCF8
RSS: https://lexfridman.com/feed/podcast/
Full episodes playlist: https://www.youtube.com/playlist?list=PLrAXtmErZgOdP_8GztsuKi9nrraNbKKp4
Clips playlist: https://www.youtube.com/playlist?list=PLrAXtmErZgOeciFP3CBCIEElOJeitOr41

SOCIAL:
- Twitter: https://twitter.com/lexfridman.
- LinkedIn: https://www.linkedin.com/in/lexfridman.
- Facebook: https://www.facebook.com/lexfridman.
- Instagram: https://www.instagram.com/lexfridman.
- Medium: https://medium.com/@lexfridman.
- Reddit: https://reddit.com/r/lexfridman.
- Support on Patreon: https://www.patreon.com/lexfridman

17:00

Covid Vaccination knocks up to 2.5 Decades off a Mans life according to CDC Terra Forming Terra



Now let me say something truly disturbing.  I have been waiting for this particular dog to bark. It is that the primary beneficuary will be insurance managed pension funds who cannot really survive lengthening life spans.

This will forshorten life spans for the vaccinated and this releases funds back to the industry.  Is this the money that Gates was shooting for?

The industry should be shouting to the rooftops about this problem and they are not.



Covid Vaccination knocks up to 2.5 Decades off a Mans life according to CDC


https://expose-news.com/2023/04/01/covid-vaccination-knocks-25years-off-mans-life-cdc/

The long-term consequences of Covid-19 vaccination are now being realised

A year ago, doubly vaccinated Australians were 10.72x more likely to catch Omicron than the unvaxxed. Now they are 20x more likely and the triply or more vaxxed are 35x more likely, as the latest NSW Health stats show (see below).

Meanwhile, the latest Cleveland Clinic Data and the latest US data analysed by...

Autopsy Studies of COVID-19 Illness Rule Out Extensive Myocarditis Terra Forming Terra



What this does is rule out COVID as a source of Myocarditus and actually puts it solely on the Vaccine.

This is actually nasty news as we need vto discover how bad it can be and can it be reversed or at least ameliorated.  The good news is that we now know that the VACCINE is a profound long lasting killer.

It is also an AIDS varient which means direct damage to the immune system, but not necessarily progressive.  By the way, this Vaccine was never a protection against COVID nor was it ever meant to be.  It was a lie top to bottom and a continuing part of something even bigger..


Autopsy Studies of COVID-19 Illness Rule Out Extensive Myocarditis

Systematic review of 50 studies with 548 hearts does not find heart inflammation as significant contributor to death



Mar 30 2023

https://www.theepochtimes.com/health/autopsy-studies-of-covid-19-illness-rule-out-extensive-myocarditis_5160022.html?

From the original Baric study demonstrating beta-coronavirus loading in laboratory models can cause myocarditis to the first year of the COVID-19 crisis there has been a concern that SARS-CoV-2 infection in humans could cause heart inflammation.
...

Even Machine Brains Need Sleep Terra Forming Terra




This is profound and confirms what we have suspected about sleep.  I wonder if all those new imports are actually checked against future needs by actually looki0ng up future pages of TIME.


It would make great sense to do just that if that capacity is possible.


It is really handy if we can remember the future and doing so as part of memory consolidation is likely the most practical way to do it.  Yet this also suggersts that real time consolidation is good enough for most day to day problems.



Even Machine Brains Need Sleep


Without some downtime, artificial neural networks become catastrophically forgetful.

BY KATHERINE HARMON COURAGE
March 15, 2023

https://nautil.us/even-machine-brains-need-sleep-288191/

We all might wish for minds as retentive as a hard drive. Memory file created. Saved. Ready for access at any time. But dont yet go wishing for the memory performance of AI.

Artificial neural networks are prone to a troublesome glitch known, evocatively, as catastrophic forgetting. These seemingly tireless networks can keep learning tasks day and night. But sometimes, once a new task is learned, any recollection of an old task vanishes. Its as if you learned to play tennis decently well, but after being taught to play water polo, you suddenly had no recollection of how to swing a racket.

This apparent network overload put an idea in the head of Maxim Bazhenov, a professor who studies computational neuroscience and sleep at the University of California San Diego School of Medicine. Perhaps the spiking neural networks he was working with simply needed a rest.

In natural sleep, he had seen that the same basic brain processes occur in humans and in honeybees, working over information accumulated during waking moments. That machinery presumably was doing something useful in order to be conserved across evolutionary paths, he says. So, he thought, why not try a similar state for the machines.
...

GITMO Files | The List of Traitors Hanged in GITMO Terra Forming Terra





We have beden listening to the silence for a long time.  Recall it was impossible for John Brenner to ever shut up.  But then he did.  This list pretty nicely corelates with the last public utterances of all these folks.

Anyone needed has been replaced by an actor in a face mask and that includes Biden.

What we see here is a process that ultimately includes tens of thousands of the lessor known and again it is by secret military tribunal until the massive job is done.  The signal for the end will see a public round up of the minnows.  Thius list is of the publuic players.

Jim Coney and John Brenner.  Silent forever.



GITMO Files | The List of Traitors Hanged in GITMO | You Watch The News Every Day But You See Fake Persons, Human Clone, Because They Have Been Executed

Sunday, April 2

March 3, 2023


15:23

This Massive Meatball Was Made With Woolly Mammoth DNA Lifeboat News: The Blog

,!!!


In a sense, the extinct woolly mammoth has returned as a meatball. On Tuesday, an Australian cultured meat start-up revealed a sphere of lab-grown meat, produced with a DNA sequence from the elephant-like mammal.

But you wont find this product in grocery stores; the creation is not meant to be eaten, at least for now. Instead, the mammoth meatball aims to highlight the environmental impacts of standard agricultural practices and present cultured meat as a viable option for food production down the line.

We wanted to get people excited about the future of food being different to potentially what we had before, Tim Noakesmith, a co-founder of Vow, the company behind the meatball, tells Mike Corder of the Associated Press (AP). We thought the mammoth would be a conversation starter. What we wanted to do was see if we could create something that was a symbol of a more exciting future thats not only better for us, but also better for the planet.

15:22

Machine Learning Expert Calls for Bombing Data Centers to Stop Rise of AI Lifeboat News: The Blog

Wont that just make enemies of AI?


One of the worlds loudest artificial intelligence critics has issued a stark call to not only put a pause on AI but to militantly put an end to it before it ends us instead.

In an op-ed for Time magazine, machine learning researcher Eliezer Yudkowsky, who has for more than two decades been warning about the dystopian future that will come when we achieve Artificial General Intelligence (AGI), is once again ringing the alarm bells.

Yudkowsky said that while he lauds the signatories of the Future of Life Institutes recent open letter which include SpaceX CEO Elon Musk, Apple co-founder Steve Wozniak, and onetime presidential candidate Andrew Yang calling for a six-month pause on AI advancement to take stock, he himself didnt sign it because it doesnt go far enough.

15:01

Twitter Open Sources its Recommendation Algorithm SoylentNews

Twitter has released its content recommendation algorithm, known as "Responsible ML," to the public under an open-source license. The company says it hopes that the code will be used by other organizations to promote responsible development of artificial intelligence (AI) and machine learning (ML) systems. Twitter's Responsible ML system is used to make content recommendations to users, such as suggesting accounts to follow or tweets to engage with. The company says that the system is designed to promote healthy conversations on the platform and reduce the spread of misinformation.

Twitter's move to open-source the algorithm comes after criticism from some quarters about the company's use of AI and ML. In particular, there have been concerns about the way that algorithms can amplify harmful content, such as hate speech or conspiracy theories. Twitter says that it has taken steps to address these concerns, such as using human reviewers to evaluate content recommendations and implementing transparency measures to give users more control over their feeds.

The release of Responsible ML also comes amid wider debates about the regulation of AI and ML systems. Some experts have called for greater transparency and accountability in the development of these technologies, while others have warned about the potential risks of using algorithms to make decisions that affect people's lives.

The decision to open-source Responsible ML is part of Twitter's broader efforts to promote ethical and responsible development of AI and ML systems. The company says that it will continue to work with the academic community and other organizations to advance the field of responsible ML.

Submission created with ChatGPT

Read more of this story at SoylentNews.

15:00

Spy On Your Cat to Make Sure It Gets Its Paws In Hackaday

A shot of the underside of a "One Fast Cat" cat wheel with an installed ESP8266 and hall effect sensors attached to the base.

[Scott Cutler] has a young cat, [Cygnus], that loves to run on a cat wheel and [Scott] had some some important questions about [Cygnus]s usage of the cat wheel like, how often its used, what direction is preferred and how fast does [Cygnus] go. To answer these questions, [Scott] put some telemetry sensors onto the cat wheel and analyzed the results.

An ESP8266 microcontroller and two 3144E hall effect modules were used to sense eight magnets glued onto the outer housing of a One Fast Cat cat wheel. [Scott] installed the ESP8266 and hall effect modules onto the base support for the wheels, using 3D printed brackets to secure them.

...

14:52

Passbolt: Open-source password manager for security-conscious organizations Help Net Security

In this Help Net Security interview, Kevin Muller, CEO at Passbolt, delves into the critical concerns linked to password usage, outlines how the Passbolt password manager guarantees the utmost level of security for businesses, highlights its features in the competitive landscape, sheds light on how Passbolt meets the distinct requirements of teams and organizations, and more. What are the main issues associated with using passwords, and how do these problems impact online security and user More

The post Passbolt: Open-source password manager for security-conscious organizations appeared first on Help Net Security.

14:30

Rookouts Snapshots: The fourth pillar of observability for more secure applications Help Net Security

Liran Haimovitch, CTO and co-founder of Rookout, with his extensive background in cybersecurity within the Israeli government, has a unique perspective on the importance of security and its impact on businesses. In this Help Net Security interview, well explore how his experience has influenced his approach to developing Rookout, a startup that aims to help organizations streamline their debugging processes and reduce friction between IT Ops and developers. Well also explore Lirans thoughts on the More

The post Rookouts Snapshots: The fourth pillar of observability for more secure applications appeared first on Help Net Security.

14:00

How airlines can embrace IT system modernization Help Net Security

Recent travel meltdowns at Southwest Airlines and the FAA have exposed our dependence on fragile, outdated, or unreliable computer systems. Institutional failures have made updating airline technology even more challenging, with some legacy systems dating back to the 1970s. Airlines that continue to use outdated operation management systems place data security at massive risk and are likely to face growing financial burdens and operational inefficiencies. In this Help Net Security video, Jim Jackson, President and More

The post How airlines can embrace IT system modernization appeared first on Help Net Security.

13:30

Millions still exposed despite available fixes Help Net Security

Although KEV catalog vulnerabilities are frequent targets of APT Groups, a large and exploitable attack surface remains due to software vendors lack of awareness and action, according to Rezilion. The Known Exploited Vulnerabilities (KEV) catalog, maintained by the Cybersecurity and Infrastructure Security Agency (CISA), provides an authoritative source of information on vulnerabilities that have been exploited in the past or are currently under active exploitation by attackers. In a recent study, the Rezilion research team More

The post Millions still exposed despite available fixes appeared first on Help Net Security.

13:22

Why preserving your lemons in salt will make them even tastier Lifeboat News: The Blog

The flavour of fresh lemon is delicious, but this citrus fruit becomes even more wonderful when it is preserved in salt, says Sam Wong

By Sam Wong

13:22

New AI upgrade could be indistinguishable from humans: expert Lifeboat News: The Blog

OpenAI could release GPT-5 at the end of this year and achieve artificial general intelligence, which would make generative AI indistinguishable from a human, according to a report.

13:00

Managing the risks of unstructured data growth Help Net Security

Locating and identifying sensitive data, including defense-in-depth strategies where a series of mechanisms are layered to protect valuable information, should be a critical component of any cloud data security strategy, say experts at Aparavi. Data security refers to protecting digital information from unauthorized access, corruption or theft throughout its lifecycle. Cloud data security focuses specifically on protecting digital information in the cloud. With cyberattacks increasing in both sophistication and frequency, and regulatory requirements regarding the More

The post Managing the risks of unstructured data growth appeared first on Help Net Security.

12:12

With AI, Astronomers Dig Up the Stars That Birthed the Milky Way SoylentNews

There once was a cosmic seed that sprouted the Milky Way galaxy. Astronomers have discovered its last surviving remnants:

For around 20 years, astronomers have struggled to find an ancient group of stars mixed in with the gas, dust and newer stars of our galaxy's bulge. These "fossil" stars preceded the Milky Way and should have been discernible by their distinctive chemistry and orbits. Yet until recently, only a small number of them had ever been found.

Now, a determined effort using data-intensive machine learning has unearthed a trove of them, bringing into focus their features and fates. The methods used in their discovery have enabled scientists to update their understanding of the Milky Way's formation and of disk galaxies in general.

Astronomers believe that the Milky Way was preceded by something called a proto-galaxy  a violent, chaotic place containing young stars with wild orbits. Its origin story starts out credibly enough. After the Big Bang, dark matter coalesced in our region of space. The dark matter attracted ordinary matter. The first waves of stars then arose, but how these stars got there was anyone's guess.

[...] By the 2000s, scientists had settled on two formation theories. Either the proto-galaxy gave birth to the Milky Way's first stars internally, as gas coalesced into stars, or it cannibalized other galaxies, ripping out stars and siphoning off dark matter. To settle the question, astronomers would need to isolate the Milky Way's earliest star population. Studies identified candidate stars, but if the internal-nursery theory was correct, a much larger fossil population lay undiscovered.

Journal Reference:
Hans-Walter Rix et al 2022 ApJ 941 45 [open] DOI 10.3847/1538-4357/ac9e01

Read more of this story at SoylentNews.

12:00

Sound Sculpture Uses Daisy Seed To Generate Audio Hackaday

Here at Hackaday, we love a good art piece, whether that involves light or sound. Combining both is a sure-fire way to get our attention, and [Eirik Brandal] did just that with his Void Extrusion piece.

The project is built around the Daisy Seed from Electrosmith. Its an embedded platform designed for musical purposes, which made it perfect for [Eirik]s project. Based on an STM32 chip, its ve...

11:39

15 Officer Resignations at NOW: Pensions LTD in Just Over One Decade (Three Quarters of Officers Have Resigned) Techrights

This is relevant to us because of crimes of a firm which claimed to be a leader in "Open Source" whilst in fact defrauding its own staff; the current pension provider uses pessimistic tone in its financial filings and officers flee

NOW: Pensions LTD

Summary: NOW: Pensions LTD, which has had scandals and a takeover, seems to be nearly insolvent as rotations in management (some resignations as recent as 3 months ago) are very frequent; everyone there, including management, lies to people with pots of money

10:57

In South America, Every Country Has Android Majority (Except Falkland Islands) Techrights

According to a surveyor Microsofters fancy citing (in misleading contexts):

South America is Android

Summary: This month it seems like Android finally managed to acquire majority share in every south American counry, except the small disputed islands (still Windows majority there, same as last month)

10:39

Gemini Improving: Tux Machines and Techrights, Navigating Daily Links Techrights

Video download link | md5sum 9ffa2751d345f57575c5677f1303a8b3
Gemini and Daily Links
Creative Commons Attribution-No Derivative Works 4.0

Summary: A quick look at how Tux Machines and Techrights offer access to plenty of material over gemini://

THE Techrights Gemini capsule can be used to track Geminispace as a whole or read our own articles, wiki pages etc. Tux Machines has complete presence in Geminispace as well, as demonstrated in the video above.

Weve recently devoted/invested more time and effort in tools used to find, curate, and manage the news (over RSS).Theres still a lot of activity in Geminispace, but not in Gemini Protocol (its stable and stale, by intention). Weve recently devoted/invested more time and effort in tools used to find, curate, and manage the news (over RSS). Its one of the things were very proud of, namely keeping abreast of new developments, especially in the area of Free-as-in-Freedom (FaaF) Software.

10:19

DistroWatch Weekly, Issue 1013 DistroWatch.com: News

This week in DistroWatch Weekly: Review: Alpine Linux 3.17.2News: Ubuntu Cinnamon becomes an official Ubuntu community edition, HardenedBSD plans for outage, Endeavour OS to get a new system installer, UBports 20.04 runs on the PinePhoneQuestions and answers: Printing copies of local manual pagesReleased last week: Porteus Kiosk 5.5.0,....

10:14

NOW: Pensions Failing the Victims of Pension Fraud schestowitz.com

Video download link | md5sum cfff2fb2cceefc626740e3c7f0427891
3 Months Now
Creative Commons Attribution-No Derivative Works 4.0

Summary: The crimes of Sirius Open Source are being passively tolerated by those who knowingly or unknowingly facilitated them; today we focus again on NOW: Pensions, which is based here in Manchester

THE corrupt company that I left in December is becoming one heck of a hot mess. The pension providers, however, arent taking it seriously enough and do not respond fast enough. The video above explains the latest from NOW: Pensions, a company based here in Manchester. Strangely enough neither myself nor my wife (who also left the company in December) can remember ever signing up with this pension provider. No paperwork, no signature, no plan specified. What sort of pension gets offered without even consent being expressed? The whole thing seems rather dodgy. Last night my wife attempted to access the portal, only to discover that they had changed it. She could not get in until she changed her password in a password recovery process. Even then, in the new portal, it wasnt clear what was signed for (nothing) and how it started. So a company that committed pension fraud for at least 5 years just enrolled staff without giving even the most basic details. One lingering suspicion is that one type of pension fraud was substituted with another in 2016, mayube a case of kickbacks, e.g. the CEO passing workers money to an old friend using some scheme managed by a dodgy provider, a serial violator that already paid fines and isnt providing a good service.

At the end of the day this whole thing bodes rather badly not just for companies that claim theyre Open Source (but gradually move away from it) but also for pension providers in the UK. They seem to be somewhat complicit in the scam and even after months of effort, with multiple victims being actively involved, theres little or no concrete progress....

10:11

If This is What Pension Providers Are Truly Like, Were All in Serious Trouble Techrights

Video download link | md5sum cfff2fb2cceefc626740e3c7f0427891
3 Months Now
Creative Commons Attribution-No Derivative Works 4.0

Summary: The crimes of Sirius Open Source are being passively tolerated by those who knowingly or unknowingly facilitated them; today we focus again on NOW: Pensions, which is based here in Manchester

THE corrupt company that I left in December is becoming one heck of a hot mess. The pension providers, however, arent taking it seriously enough and do not respond fast enough. The video above explains the latest from NOW: Pensions, a company based here in Manchester. Strangely enough neither myself nor my wife (who also left the company in December) can remember ever signing up with this pension provider. No paperwork, no signature, no plan specified. What sort of pension gets offered without even consent being expressed? The whole thing seems rather dodgy. Last night my wife attempted to access the portal, only to discover that they had changed it. She could not get in until she changed her password in a password recovery process. Even then, in the new portal, it wasnt clear what was signed for (nothing) and how it started. So a company that committed pension fraud for at least 5 years just enrolled staff without giving even the most basic details. One lingering suspicion is that one type of pension fraud was substituted with another in 2016, mayube a case of kickbacks, e.g. the CEO passing workers money to an old friend using some scheme managed by a dodgy provider, a serial violator that already paid fines and isnt providing a good service.

They seem to be somewhat complicit in the scam and even after months of effort, with multiple victims being actively involved, theres little or no concrete progress.At the end of the day this whole thing bodes rather badly not just for companies that claim theyre Open Source (but gradually move away from it) but also for p...

10:00

HPR3826: HPR Community News for March 2023 Hacker Public Radio

table td.shrink { white-space:nowrap } New hosts There were no new hosts this month. Last Month's Shows Id Day Date Title Host 3803 Wed 2023-03-01 Chatbot hallucination dnt 3804 Thu 2023-03-02 2022-2023 New Years Show Episode 2 HPR Volunteers 3805 Fri 2023-03-03 Document File Formats on Wikipedia Archer72 3806 Mon 2023-03-06 HPR Community News for February 2023 HPR Volunteers 3807 Tue 2023-03-07 PeePaw builds a computer Brian in Ohio 3808 Wed 2023-03-08 Funkwhale A social platform to enjoy and share music Ken Fallon 3809 Thu 2023-03-09 The Abominable Post Apocalyptic Podcast Player Mechatroniac 3810 Fri 2023-03-10 Clifton, Arizona Ahuka 3811 Mon 2023-03-13 mkfifo and named pipes Klaatu 3812 Tue 2023-03-14

Alternatives to Cells in Data Science Pipelines It Will Never Work in Theory

I was tempted to call this post "Notebooks Cells Considered Harmful" as a nod to one of computing's great traditions, but I think that's an exaggeration. One study after another has found that allowing people to execute arbitrary chunks of code in a computational notebook an arbitrary order leads to confusion, and often to incorrect results. That does not imply that notebooks and cells are intrinsically bad ideas, but rather that we need ways to manage their complexity, just as for-loops and case statements managed the tangled FORTRAN flowcharts of my youth.

This recent paper explores one approach: constructing an explicit dataflow graph right from the start. The next generation of notebooks will almost certainly combine this with some kind of post-hoc structure discovery; watching these ideas take shape is yet another reason to keep an eye on the research literature.

Lars Reimann and Gnter Kniesel-Wnsche. An alternative to cells for selective execution of data science pipelines. 2023. arXiv:2302.14556.

Data Scientists often use notebooks to develop Data Science (DS) pipelines, particularly since they allow to selectively execute parts of the pipeline. However, notebooks for DS have many well-known flaws. We focus on the following ones in this paper: (1) Notebooks can become littered with code cells that are not part of the main DS pipeline but exist solely to make decisions (e.g. listing the columns of a tabular dataset). (2) While users are allowed to execute cells in any order, not every ordering is correct, because a cell can depend on declarations from other cells. (3) After making changes to a cell, this cell and all cells that depend on changed declarations must be rerun. (4) Changes to external values necessitate partial re-execution of the notebook. (5) Since cells are the smallest unit of execution, code that is unaffected by changes, can inadvertently be re-executed.

To solve these issues, we propose to replace cells as the basis for the selective execution of DS pipelines. Instead, we suggest populating a context-menu for variables with actions fitting their type (like listing columns if the variable is a tabular dataset). These actions are executed based on a data-flow analysis to ensure dependencies between variables are respected and results are updated properly after changes. Our solution separates pipeline code from decision making code and automates dependency management, thus reducing clutter and the risk of making errors.

09:23

Multi-Die Systems Define the Future of Semiconductors SoylentNews

Multi-die system or chiplet-based technology is a big bet on high-performance chip design:

While the global semiconductor shortage that began in 2020 had its proximate causes in natural disasters and geopolitics, its effects drew widespread attention to the fact that just about every industry relies on chips. And pandemic-related ripple effects aside, the silicon status quo has been in flux for some time. New technologies like artificial intelligence and machine learning (AI/ML), which require greater computing efficiency and performance, have strained traditional systems in recent years.

With the rise of the Internet of Things (IoT), customers have also come to expect intelligence in everything from refrigerators to lightbulbs. Innovators are responding accordingly. Our poll found that nearly one-third (31%) of business executives plan to improve upon their companies' existing smart products, and almost another third (29%) intend to add AI/ML capabilities to their products soon. Only 9% of respondents said they were not producing IoT or connected devices.

This type of technology, however, necessitates robust edge computing and on-device processing, which requires greater and more efficient hardware performance. Complicating matters, the cloud data centers powering this compute shift are also voracious energy consumers. This is another area where traditional silicon is stagnating: sustainability. The cost of producing superfluous silicon is not just bad for businessit has an environmental impact. And while there's an ongoing push toward net-zero carbon emissions within the semiconductor supply chain, the industry isn't yet on track to meet the emissions standards set forth in the UN 2016 Paris Agreement.

Read more of this story at SoylentNews.

09:00

Hackaday Links: April 2, 2023 Hackaday

Hackaday Links Column Banner

It may be hard to believe, but its time for the Hackaday Prize again! The 2023 Hackaday Prize was announced last weekend at Hackaday Berlin, and entries are already pouring in. The first-round challenge is all about Re-engineering Education, which means youve got to come up with a project idea that helps push back the veil of ignorance somehow. Perhaps youve got a novel teaching tool in mind, or a way to help students learn remotely. Or maybe your project is aimed at getting students involved and engaged. Whatever it is and whatever the subject matter; it doesnt just have to be hacking-adjacent get an entry together, build a team, and get to work. The first round closes on April 25, so get to it!

From the Stupid ChatGPT Tricks department, this week we saw the wildly popular chatbot used to generate activation keys for Windows 95. While trying to scam the licensing engine of a nearly three-decade-old OS might sound like a silly thing to ask an AI to do, espec...

08:53

Kernel prepatch 6.3-rc5 LWN.net

The 6.3-rc5 kernel prepatch is out for testing. "This release continues to appear very normal and boring, which is just how I like it. The commit count says that we've started calming down right on schedule, and the diffstat looks normal too."

07:55

Linux 6.3-rc5 Released - Looking To Be In Good Shape Phoronix

Linus Torvalds just released Linux 6.3-rc5 and it's looking to be in good shape for this stage of development...

06:00

Visual Ear Demonstrates How The Cochlear Works Hackaday

The cochlear is key to human hearing, and it plays an important role in our understanding of complex frequency content. The Visual Ear project aims to illustrate the cochlear mechanism as an educational tool.

The cochlear itself is the part of the ear that converts the pressure waves of sound into electrical signals for the brain. Different auditory frequencies excite different parts of the cochlea. The cells in the different parts of the cochlea then send signals to the brain corresponding to the sound it has picked up.

The Visual Ear demonstrates similar behavior on a strip of addressable LEDs. Lower LEDs coded in the red part of the color spectrum respond to low frequency audio. Higher LEDs step through yellow, green, and up to blue, and respond to the higher frequencies in turn. This is achieved at a high response rate with the use of a Teensy 4.0 running a Fast Fourier Transform on incoming audio, and then outputting signals to run a string of WS2812B LEDs. The result is a visual band display of 104 bands spanning 43 Hz up to 16,744 Hz, which covers most but not all of the human range of hearing.

Its an impressive display, and one that makes a great music visualizer, too. When teaching the physics of human hearing and the cochlear, we can imagine such a tool would be quite useful.

...

05:55

Rightsholders Flag Official EU Website for Copyright Infringements TorrentFreak

pirate-flagThe European Union recognizes that online piracy poses a serious threat to copyright holders and the public at large.

In recent years, Europe has updated legislation to deal with modern piracy threats. This includes a requirement for large platforms to deter repeat copyright infringers.

The regulation is mostly targeted at legitimate user-generated content platforms such as YouTube, Twitter, and Facebook. However, traditional pirate sites are also on the EUs radar, with several of the worst offenders highlighted in the recent piracy and counterfeiting watchlist.

According to the EU, pirate sites lead to high financial losses for copyright holders. Members of the public face risks too, such as piracy-related malware and scammers determined to obtain their credit card details.

Scammers Exploit Europa.eu

The EU warning highlights a real threat. While not all pirate sites are malware traps, scammers are known to use piracy to lure and exploit people. Ironically, this problem is now causing issues for the European Commissions official website.

Over the past few months, we have documented how scammers are exploiting weaknesses in various Europa.eu portals including, most recently, the European School Education Platform. These scams exploit public upload tools to share .pdf files, which in turn advertise pirated versions of the latest blockbusters.

Scams Continue to Proliferate

eu search results

People who fall for these scams are in for a huge disappointment. Instead of gaining access to pirated movies, they are redirected to shady sites that often promise free content in exchange for the visitors credit card details.

The European Commission has been aware of the problem for months and is working on it. After we published a second article on the topic last month, a spokesperson informed us that a long-term solution is being sought, without taking away opportunities for EU citizens to speak out.

We are aware of it and continue working to resolve it. Long-term solutions requ...

04:38

Hackers Exploit WordPress Plugin Flaw That Gives Full Control of Millions of Sites SoylentNews

Hackers exploit WordPress plugin flaw that gives full control of millions of sites

Hackers have been exploiting a critical vulnerability in a popular WordPress plugin called 'Loginizer' that allows them to take full control of affected sites. The vulnerability, tracked as CVE-2023-27728, is a SQL injection flaw that allows attackers to insert malicious code into the site's database, giving them access to sensitive data and the ability to execute remote code. Loginizer is installed on millions of WordPress sites, and the vulnerability affects all versions up to and including 1.6.5. The plugin is designed to provide security features such as two-factor authentication and brute-force protection.

Security researchers have identified multiple hacking groups actively exploiting the vulnerability in recent weeks. The attackers are scanning the internet for WordPress sites that have the vulnerable plugin installed and are using automated tools to inject malicious code into the site's database. Once a site is compromised, the attackers can use it for various malicious purposes, such as stealing user data or distributing malware.

The plugin's developers have released a patch for the vulnerability, and WordPress site owners are advised to update their installations immediately. However, given the widespread use of the plugin, it is likely that many sites remain vulnerable to exploitation. Loginizer is just one of many WordPress plugins that have been found to have security flaws in recent years, highlighting the importance of regular security updates and monitoring for site owners.


Original Submission

Read more of this story at SoylentNews.

03:23

Asking NOW: Pensions for a Very Simple Letter for 3 Months Techrights

Are you gonna tackle the fraud? Not really

Summary: After Sirius Open Source defrauded its staff the current pension provider is in no real rush to do something concrete about it; weve pursued action since January

03:12

Cant Believe a Word NOW: Pensions Says (Even the Management of NOW: Pensions) schestowitz.com

NOW: Pensions = No pensions

Summary: It does not seem (and certainly does not feel) safe to keep a pension with a repeat offender, managing a pension for a company that defrauded its staff; given the financial troubles of NOW: Pensions, as well as fines, maybe its time to abandon them as soon as possible

TO my surprise, but not to any great astonishment, NOW: Pensions has not progressed despite the issue being escalated to management (many hours spent on the phone). I spoke to the manager there (John Pattinson) more than two weeks ago and his promises/assurances were in vain. Worse yet, he barely responds to E-mail, so Ive just sent him this message (a generic NOW: Pensions account; he hides his personal account behind that).

Complaints now pensions support wrote on 16/03/2023 17:39:
> Hi Roy,
>
> Thank you for your call today, apologies for the bad communication and
> service you have had from us regarding you concerns with your employer
> Sirius Corporation.

Hi, more than 2 weeks have passed. Its now April.

> As discussed,.
>
> * I will arrange for a letter to be sent to you and or email with
> assurances that your pension money is safe with Now Pensions

This did not happen.

My wife received no letter.

I received no letter.

> * I will alert the team that deals with your employer that the CEO is
> wanted for embezzlement and that he effectively scammed all his
> employers previously through a pension scheme with Standard Life

Has that happened? I heard nothing.

> * they put on hold/review any financial requests from the company
> * request what due diligence they do when acquiring employers to use
> NOW Pensions

I still received no communications, no letters, nothing.

> Please feel free to add to the above list with any further assurances
> that you would like and call or email me.

I dont see the point to be honest. It does not seem like you did anything at all, i.e. it has been the same with you since January.

Please arrange for my wife and I to collect our pensions with an unauthorised (heavily tax) withdrawal. I will advise colleagues accordingly.

I regret to say that John Pattinson has failed me just like the people whom he bosses. He and his colleagues keep lying to clients. Why trust these people with ones hard-earned mone...

03:09

NOW: Pensions Has Offered 3 Months of Lies, Even From the Trust Administration Team (John Pattinson) Techrights

NOW: Pensions = No pensions

Summary: It does not seem (and certainly does not feel) safe to keep a pension with a repeat offender, managing a pension for a company that defrauded its staff; given the financial troubles of NOW: Pensions, as well as fines, maybe its time to abandon them as soon as possible

TO my surprise, but not to any great astonishment, NOW: Pensions has not progressed despite the issue being escalated to management (many hours spent on the phone). I spoke to the manager there (John Pattinson) more than two weeks ago and his promises/assurances were in vain. Worse yet, he barely responds to E-mail, so Ive just sent him this message (a generic NOW: Pensions account; he hides his personal account behind that).

Complaints now pensions support wrote on 16/03/2023 17:39:
> Hi Roy,
>
> Thank you for your call today, apologies for the bad communication and
> service you have had from us regarding you concerns with your employer
> Sirius Corporation.

Hi, more than 2 weeks have passed. Its now April.

> As discussed,.
>
> * I will arrange for a letter to be sent to you and or email with
> assurances that your pension money is safe with Now Pensions

This did not happen.

My wife received no letter.

I received no letter.

> * I will alert the team that deals with your employer that the CEO is
> wanted for embezzlement and that he effectively scammed all his
> employers previously through a pension scheme with Standard Life

Has that happened? I heard nothing.

> * they put on hold/review any financial requests from the company
> * request what due diligence they do when acquiring employers to use
> NOW Pensions

I still received no communications, no letters, nothing.

> Please feel free to add to the above list with any further assurances
> that you would like and call or email me.

I dont see the point to be honest. It does not seem like you did anything at all, i.e. it has been the same with you since January.

P...

02:22

Intel Linux Improvements, AMD openSIL, Zen 4 3D V-Cache & Other March Highlights Phoronix

Along with the Phoronix Q1'2023 recap, here is a look back at what excited Phoronix readers the most in March when it came to all of the original open-source and Linux focused content. During March on Phoronix were 240 original news articles and 15 featured Linux hardware reviews / multi-page benchmark articles written by your's truly...

Sunday, 02 April

23:56

Melbet App Obtain For Android Apk And Ios h+ Media

Melbet App Obtain For Android Apk And Ios

Once the match is over, the wager might be settled. In case of a win, the prize money shall be credited to your account instantly. You can divide bonuses for Sports and Casino as you open the Promotions page. One of the Sports bonuses is the Champion Bet. Its concept is that you simply place a wager that Melbet specifically chooses. Then, simply receive a code that you can use to win money.

These will inform you about your guess and the proceeding of the match itself. You can also select to receive details about all new promotions and provides that the Melbet on line casino and sportsbook have. For all loyal prospects, Melbet provides a cash again bonus.

On the pop-up display screen that appears, click Trust. Then, from the house web page, you should scroll down and click on the cellular version. You shall be routinely redirected to a model new web page with a download button. This button will take you on to the app web page. You will discover it at the backside of the house page or by way of the main menu.

This part consists of the most well-liked board video games like Andar Bahar, Teen Patti, roulette, blackjack, baccarat, wheel of fortune, and others. The Melbet app provides its clients with all the required information that could be useful whenever you place bets. With our statistics, it is possible for you to to take extra reasonable decisions on what group to guess on and what the outcomes of a particular match could be. This sort of wager includes one occasion only. In explicit, you probably can guess on a team to win, a draw, the number of objectives which are anticipated to be scored, etc. Find the Melbet icon in your iOS gadget and click to begin out the application.

Available only at Melbet, a TOTO bet slip allows you to select 12 sports events and place a free prediction on the end result. By using this provide each day, you may have the possibility to win from one hundred to 7,000 bonus factors. Enter the Melbet app and place a wager on UEFA Champions League matches that have odds of 1.7 or higher. With this bonus, you will get a free bet value 5 INR in case your wager loses. The minimal deposit is 10 INR and can only be positioned on Correct Score, Correct Score , First Match Score, and Match Score markets. Players should notice that this isnt an extensive list of the fee choices provided within the Melbet app.

It permits you to use a lot of cost instruments. Now you possibly can create an account to begin out using Melbet to place wagers in your favourite sporting occasions. In general, the Melbet supplier. However, there are small https://sporbahis.icu/kraken-deep-wins-slot-review/ variations in the interface. Below yow will discover a desk that gives a transparent comparability, displaying the advant...

23:53

Melbet App Obtain For Android And Ios 2023 h+ Media

Melbet App Obtain For Android And Ios 2023

You ought to keep in mind that this is not an intensive record. The Melbet app has been tested on these devices, so that you dont have to worry about its compatibility with your phone https://sporbahis.icu/torre-jeppe-slot-machine/. Having a slightly older or newer model of these phones shouldnt be an issue either.

Follow the steps and you can simply obtain the app in your iOS mobile. The worldwide bookmaker provides solely secure methods to deposit and withdraw money. There are many companies on the checkout which are well-liked amongst Indian bettors. If you cant or dont wish to download Melbet, use the operators cellular web site for sports predictions. It has almost the same design and options because the app. The variations concern only the placement of individual buttons and tabs.

The website is really convenient and well thought out significantly better than that of the highest workplaces, whose advertising is on each corner. It is convenient that you can write to assist and immediately get a solution, especially for dummies who dont perceive how to set accurately. Just as easily Melbet app free obtain on their gadgets. Good bookmaker, no makes an attempt to cheat with money have been noticed. The money is withdrawn without issues, however to the same account from which the replenishment was made, and nothing else.

Like the internet site, the applying makes use of trendy data encryption applied sciences, which reduces the chance of confidential information leakage. Security settings are additionally obtainable with connecting two-factor authentication and setting a password. All on line casino sections are optimized and out there for Melbet app customers to play. Click the login button within the Melbet utility, enter your details and log in.

Since that point, it has been owned and operated by Tukia Ltd and can be licensed through the Curaao government. Having earned the eye of a huge number of bettors, MELbet India has turn into a superbly affluent bookmaker in its business. The firm holds greater than 2,000 live sports activities occasions each month, as nicely as many sports activities betting for its players. By the greatest way, all these services are available not only on the companys website.

In most fee services, the minimum quantity for deposit and withdrawal is 50 Indian rupees. As for the maximum, it modifications from time to time. The POS app has all the data you should learn about limit updates. Withdrawal of funds takes from 1 to 7 days. Account replenishment immediately, immediately after the transaction. In order to not enter the site handle each time and to not seek for Melbet in the search engine, make a bookmark.

Soccer might be the most well-liked game on the planet....

05:15

Gg Bets Openak319com 1xbet Bonus Dice Odds Calculator Openak319com$limitadong Regalo!mag Register Para Makakuha Ng P50 May 50% Cashback Sayong Unang Deposit!$be Search Results h+ Media

Gg Bets Openak319com 1xbet Bonus Dice Odds Calculator Openak319com$limitadong Regalo!mag Register Para Makakuha Ng P50 May 50% Cashback Sayong Unang Deposit!$be Search Results

Also to it, there are six more languages, which makes it ordinary when it comes to intercontinental. The info cant be accessed by unauthorized events. For world normal checks and balances, the bookmaker is regulated by the authoritative Gibraltar Gaming Commission. The darkish blue-tinged background is also very welcoming.

Different kinds of bets like single, accumulators, chain bets, and extra are there. There is a match of the day, with one of the best every day presents. From the primary click on, punters will notice that this as actual as the real-life gaming experience. The live streaming video providers offer superior high quality thats why players feel as if they are indeed in an actual gaming corridor.

Everyone can carry out 1xBet registration and start collaborating in. Also, essential and priceless things for you would possibly be that one might make your deposit not solely in the type of common money although additionally cryptocurrency, e. The web site has a considerably giant section of video protection;, nonetheless , you can watch movies so long as you might be registered and possess a optimistic balance. The website has been translated into many languages, together with English.

You can earn real cash and develop your financial institution by merely engaging in their enjoyable play to top it all off. In the next step you will be asked to complete the player s personal information and registration information obtainable. The easiest method is to create a checking account in one click. You must select the area, currency and make sure the captcha used to protect in opposition to bots. Should youve a promo code, you probably can enter it in the course of.

You can t intervene with the Swift Buttons on the website and 1xBet Ghana login methodology. This simplifies authorization and lets you complete your account sooner and make bets. How to change the forex you presumably can simply find in settings.

The LoveCoupons.co.nz staff save our guests thousands of dollars every month, lots of which never knew 1xBet low cost codes have been available till visiting our website. Now that you understand how simple it is to save lots of at 1xBet with our promo and coupon codes, bookmark LoveCoupons.co.nz and all the time examine us out earlier than you checkout. Good live streaming choices included in the in-play betting part. There are other kinds of bonuses and promotions out there right here. However, most of them are short-term solely lasting for a weeks or months. 1XBet also rewards it prospects with loyalty points that they will redeem.

This file is an software package deal that allows you to set up an app on your smartphone without going via the Google Play Store. This softwa...

IndyWatch Science and Technology News Feed Archiver

Go Back:30 Days | 7 Days | 2 Days | 1 Day

IndyWatch Science and Technology News Feed Today.

Go Forward:1 Day | 2 Days | 7 Days | 30 Days

IndyWatch Science and Technology News Feed was generated at World News IndyWatch.

Resource generated at IndyWatch using aliasfeed and rawdog