Recent Changes - Search:
NTLUG

Linux is free.
Life is good.

Linux Training
10am on Meeting Days!

1825 Monetary Lane Suite #104 Carrollton, TX

Do a presentation at NTLUG.

What is the Linux Installation Project?

Real companies using Linux!

Not just for business anymore.

Providing ready to run platforms on Linux

Show Descriptions... (Show All) (Single Column)

LinuxSecurity.com - Security Advisories


  • Fedora 28: curl Security Update
    `bbLinuxSecurity.com`/bb: - fix FTP shutdown response buffer overflow (CVE-2018-1000300) - fix RTSP bad headers buffer over-read (CVE-2018-1000301)



  • RedHat: RHSA-2018-1664:01 Important: libvirt security update
    `bbLinuxSecurity.com`/bb: An update for libvirt is now available for Red Hat Enterprise Linux 6.4 Advanced Update Support. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score,


  • RedHat: RHSA-2018-1667:01 Important: libvirt security update
    `bbLinuxSecurity.com`/bb: An update for libvirt is now available for Red Hat Enterprise Linux 6.7 Extended Update Support. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score,


  • RedHat: RHSA-2018-1654:01 Important: qemu-kvm-rhev security update
    `bbLinuxSecurity.com`/bb: An update for qemu-kvm-rhev is now available for RHEV 3.X Hypervisor and Agents for Red Hat Enterprise Linux 7 Extended Life Support. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score,


  • RedHat: RHSA-2018-1690:01 Important: vdsm security update
    `bbLinuxSecurity.com`/bb: An update for vdsm is now available for RHEV 3.X Hypervisor and Agents Extended Lifecycle Support for Red Hat Enterprise Linux 7. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score,


  • RedHat: RHSA-2018-1656:01 Important: qemu-kvm security update
    `bbLinuxSecurity.com`/bb: An update for qemu-kvm is now available for Red Hat Enterprise Linux 6.4 Advanced Update Support. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score,



  • RedHat: RHSA-2018-1669:01 Important: libvirt security update
    `bbLinuxSecurity.com`/bb: An update for libvirt is now available for Red Hat Enterprise Linux 6. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability


  • RedHat: RHSA-2018-1665:01 Important: libvirt security update
    `bbLinuxSecurity.com`/bb: An update for libvirt is now available for Red Hat Enterprise Linux 6.5 Advanced Update Support. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score,


  • RedHat: RHSA-2018-1659:01 Important: qemu-kvm security update
    `bbLinuxSecurity.com`/bb: An update for qemu-kvm is now available for Red Hat Enterprise Linux 6.7 Extended Update Support. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score,


LXer Linux News

  • How to Install The Latest AMD Radeon Drivers on Ubuntu 18.04 Bionic Beaver Linux
    If you're planning on using an AMD graphics card with Ubuntu 18.04, you have a couple of options. Because Bionic is an LTS release, you do have the option of using the proprietary AMDGPU-PRO drivers. The open source drivers that come with Ubuntu are probably better for gamers, though. They're already installed, and you can configure your system to receive constant performance-boosting upgrades from the latest Mesa releases. Either way, you're going to have great experience working with AMD on Ubuntu 18.04.



  • Easy & simple guide to Backup & Restore GITLAB
    Gitlab is a web GUI for git repositories with support for CI/CD, issue tracking & wiki. We have already discussed in detail, how we can install GITLAB on CentOS & Ubuntu systems. In this tutorial, we will discuss how we can backup & restore Gitlab.


  • Advanced use of the less text file viewer in Linux
    I recently read Scott Nesbitt[he]#039[/he]s article "Using less to view text files at the Linux command line" and was inspired to share additional tips and tricks I use with less.LESS env varIf you have an environment variable LESS defined (e.g., in your .bashrc), less treats it as a list of options, as if passed on the command line.


  • Nextcloud 13: How to Get Started and Why You Should
    Nextcloud could be the first step toward replacing proprietary services like Dropbox and Skype. In its simplest form, the Nextcloud server is"just" a personal, free software alternative to services like Dropboxor iCloud. You can set it up so your files are always accessiblevia the internet, from wherever you are, and share them with yourfriends. However, Nextcloud can do so much more.



  • VMware OpenStack 5 Rolls Out for Data Centers and Telecoms
    Although VMware has been releasing VIO since 2015, having two versions of the offering is relatively new, with the first release of Carrier and Data Center editions taking place last September. The Carrier version is designed to address specific requirements by telecoms deploying NFV-based network services, especially as they prepare for the 5G world.



  • Linux Foundation LFCE: Hugues Clouâtre
    How well does the certification prepare you for the real world? To help illustrate that, this series features some of those who have recently passed the certification examinations. These testimonials should serve to help you decide if either Linux Foundation Certified System Administrator (LFCS) or Linux Foundation Certified Engineer (LFCE) certification is right for you. In this article, we talk with recently certified LFCE Hugues Clouâtre.









  • Cookies That Go the Other Way
    The web's underlying protocol, HTTP, is distributed and collaborative. It doesn't say we need to be subordinate to websites, always consenting to those sites' terms and policies. It doesn't even say we have to be calves to the websites' cows. Consent can go the other way. And so can cookies. So let's bake some.


  • Add subtitles to your web videos with Amara
    Think of a foreign-language movie or song that you'd like to understand more deeply. Imagine being able to watch the movie at an airport with the sound muted to avoid interference with announcements. Wouldn't a subtitle improve your viewing experience (and your tiring layover)?read more


  • Guide to Linux Environment Variables
    Objects that are given by names and contain data used by at least one, usually multiple applications are called environment variables. Put simply, an environment variable is nothing more than a variable that has a name and a value.



Error: It's not possible to reach RSS file http://www.newsforge.com/index.rss ...

Digg Top Stories

  • After 20 Years Is 'Unreal' Still Unreal?
    Today, its most high-profile designer is stepping away from the medium, and you have to dig through pages of Google search results to even find a passing mention of it. There might not be a better time to jump back into the world of "Unreal."



  • The Uncompromising Comedy Of Issa Rae
    With "Insecure," one of the most original series on TV, Issa Rae is blazing a path for a new generation of auteurs who want to make shows that don't cave to network expectations.


  • Better Management Tools Means Less Unnecessary Meetings
    monday.com is a centralized platform for teams to manage every detail of their work, from high-level roadmap planning to the specifics of day-to-day tasks, while building a culture of transparency. It works for any sized team and will help you replace clunky spreadsheets and excessively long meetings.



  • More Than Make-Work
    The idea that the government should provide a job for anyone who wants one is both radical and impressively well-liked.


  • What If The NFL Were Regulated By OSHA?
    In the eyes of the law and regulatory systems, prol football players are, in fact, employees of the NFL. That means that OSHA could technically step in and issue rules and regulations to reduce the potential harm caused by the work they do — which, in this case, is play football.















  • How To Be A Middle-Aged Rock Star
    Tool frontman Maynard James Keenan has perfected the art of maintaining mystique — in an age and at an age that usually complicates things.






  • This Rat Trap Is A Brutal Work Of Art
    We're a little concerned at how much time these guys spend thinking about the best way to behead rodents, but this particular piece is admittedly amazing.





  • Planet Nine, Show Thyself
    Astronomers have found tantalizing new evidence that strengthens the case for a ninth planet beyond Neptune — but some still doubt its existence.













  • Body Doubles
    Deepfakes make clear that images of the body are extensions rather than representations of the self.







  • The Perfect Summer Slip-On
    These low-profile, 100% canvas slip-ons are exactly what you've been wanting for summer. Tip: we found them to run a little small, so keep that in mind when ordering yours.



Slashdot

  • Yelp Files New EU Complaint Against Google Over Search Dominance
    Yelp has filed a complaint with the EU's antitrust watchdog against Google, arguing that the search company has abused its dominance in local search and pressuring Brussels to launch new charges against the tech giant, Financial Times reported Tuesday. From the report: European antitrust authorities fined Google $2.8B in June 2017 for favouring its own shopping service over rival offerings in its search results. Google denied wrongdoing and has appealed that decision. Now Yelp, which provides user ratings, reviews and other information about local businesses, wants Margrethe Vestager, the EU Competition Commissioner, to take action against Google for similar alleged abuse in the local search market, according to a copy of the complaint seen by the Financial Times. The move comes days after Yelp founder Jeremy Stopplelman appeared on 60 Minutes to talk about Google's search monopoly. Here's the exchange he had with reporter Steve Kroft: Jeremy Stoppelman: If I were starting out today, I would have no shot of building Yelp. That opportunity has been closed off by Google and their approach. Steve Kroft: In what way? Jeremy Stoppelman: Because if you provide great content in one of these categories that is lucrative to Google, and seen as potentially threatening, they will snuff you out. Steve Kroft: What do you mean snuff you out? Jeremy Stoppelman: They will make you disappear. They will bury you.
            

    Read more of this story at Slashdot.


  • Senators Demand FCC Answer For Fake Comments After Realizing Their Identities Were Stolen
    Two US senators -- one Republican, one Democrat who both had their identities stolen and then used to post fake public comments on net neutrality -- are calling on FCC Chairman Ajit Pai to address how as many as two million fake comments were filed under stolen names. From a report: Senators Jeff Merkley, Democrat of Oregon, and Pat Toomey, Republican of Pennsylvania, are among the estimated "two million Americans" whose identities were used to file comments to the FCC without their consent. "The federal rulemaking process is an essential part of our democracy and allows Americans the opportunity to express their opinions on how government agencies decide important regulatory issues," the pair of lawmakers wrote [PDF]. "As such, we are concerned about the aforementioned fraudulent activity. We need to prevent the deliberate misuse of Americans' personal information and ensure that the FCC is working to protect against current and future vulnerabilities in its system. We encourage the FCC to determine who facilitated these fake comments," the letter continues. "While we understand and agree with the need to protect individuals' privacy, we request that the FCC share with the public the total number of fake comments that were filed."
            

    Read more of this story at Slashdot.


  • The Wayback Machine is Deleting Evidence of Malware Sold To Stalkers
    The Internet Archive's Wayback Machine is a service that preserves web pages. But the site has been deleting evidence of companies selling malware to illegally spy on spouses, Motherboard reported Tuesday. From the report: The company in question is FlexiSpy, a Thailand-based firm which offers desktop and mobile malware. The spyware can intercept phone calls, remotely turn on a device's microphone and camera, steal emails and social media messages, as well as track a target's GPS location. Previously, pages from FlexiSpy's website saved to the Wayback Machine showed a customer survey, with over 50 percent of respondents saying they were interested in a spy phone product because they believe their partner may be cheating. That particular graphic was mentioned in a recent New York Times piece on the consumer spyware market. In another example, a Wayback Machine archive of FlexiSpy's homepage showed one of the company's catchphrases: "Many spouses cheat. They all use cell phones. Their cell phone will tell you what they won't." Now, those pages are no longer on the Wayback Machine. Instead, when trying to view seemingly any page from FlexiSpy's domain on the archiving service, the page reads "This URL has been excluded from the Wayback Machine."
            

    Read more of this story at Slashdot.


  • The Whole World is Now a Computer, Says Microsoft CEO Satya Nadella
    Thanks to cloud computing, the Internet of Things and artificial intelligence, we should start to think of the planet as one giant computer, according to Microsoft chief executive Satya Nadella. From a report: "Digital technology, pervasively, is getting embedded in every place: every thing, every person, every walk of life is being fundamentally shaped by digital technology -- it is happening in our homes, our work, our places of entertainment," said Nadella speaking in London. "It's amazing to think of a world as a computer. I think that's the right metaphor for us as we go forward." [...] AI is core to Microsoft's strategy, Nadella said: "AI is the run time which is going to shape all of what we do going forward in terms of applications as well as the platform." Microsoft is rethinking its core products by using AI to connect them together, he said, giving an example of a meeting using translation, transcription, Microsoft's HoloLens and other devices to improve decision-making. "The idea that you can now use all of the computing power that is around you -- this notion of the world as a computer -- completely changes how you conduct a meeting and fundamentally what presence means for a meeting," he said.
            

    Read more of this story at Slashdot.


  • Twitter Is Killing Several of Its TV Apps, Too
    Twitter is shutting down its TV apps on Roku, Android TV and Xbox starting on May 24, the company announced this morning. From a report: The news of the apps' closure comes at a time when Twitter is now trying to steer its users to its first-party mobile apps and its desktop website by killing off apps used by a minority of its user base -- like the Twitter for Mac app it shut down earlier this year. And more recently, it has attempted to kill off popular third-party Mac apps with a series of unfriendly API changes. It's unclear why this has become Twitter's agenda. While it can be a burden for a company to support a broader ecosystem of apps where some only have a niche audience, in some cases those "niche" users are also the most influential and heavy users. And arguably, anyone launching Twitter's app on their TV must be a die-hard user -- because who is really watching that much Twitter on their TV?
            

    Read more of this story at Slashdot.


  • Faster Audio Decoding and Encoding Coming To Ogg and FLAC
    FLAC and Ogg now have faster audio encoding and decoding capabilities thanks to recent code improvements. An anonymous reader writes: Robert Kausch of the fre:ac audio converter project informed news outlet Phoronix about recent changes he has made to FLAC and Ogg for bolstering faster performance. Kausch says he updated the CRC checks within FLAC and Ogg to a faster algorithm and those patches have now been accepted upstream. The Ogg and FLAC updates were merged this week for using the optimized CRC algorithm. As a result of this, encoding and decoding FLAC is now 5 percent faster, while encoding and decoding Ogg FLAC is 10 percent and 15 percent faster, respectively. Opus sees about one percent faster decoding, while Vorbis does decoding at two percent faster pace.
            

    Read more of this story at Slashdot.


  • 90% of Financial Institutions Targeted By Ransomware in the Last Year
    An anonymous reader shares a report: A new report from cloud security specialist Carbon Black, based on responses from CISOs at 40 major financial institutions -- including six of the top 10 global banks -- seeks to better understand the attack landscape. Among the findings are that 90 percent of financial institutions report being the subject of a ransomware attack in 2017. In addition one in 10 respondents report encountering destructive attacks unrelated to ransomware, such as application attacks and fileless malware. These potentially enable cybercriminals to move freely and laterally within an organization's network and often go completely overlooked until it's too late.
            

    Read more of this story at Slashdot.


  • Amazon Pushes Facial Recognition to Police, Prompting Outcry Over Surveillance
    Nick Wingfield, reporting for The New York Times: In late 2016, Amazon introduced a new online service that could help identify faces and other objects in images, offering it to anyone at a low cost through its giant cloud computing division, Amazon Web Services. Not long after, it began pitching the technology to law enforcement agencies, saying the program could aid criminal investigations by recognizing suspects in photos and videos. It used a couple of early customers, like the Orlando Police Department in Florida and the Washington County Sheriff's Office in Oregon, to encourage other officials to sign up. But now that aggressive push is putting the giant tech company at the center of an increasingly heated debate around the role of facial recognition in law enforcement. Fans of the technology see a powerful new tool for catching criminals, but detractors see an instrument of mass surveillance. On Tuesday, the American Civil Liberties Union led a group of more than two dozen civil rights organizations that asked Amazon to stop selling its image recognition system, called Rekognition, to law enforcement. The group says that the police could use it to track protesters or others whom authorities deem suspicious, rather than limiting it to people committing crimes.
            

    Read more of this story at Slashdot.


  • Microsoft To Block Flash In Office 365 Starting January 2019
    An anonymous reader writes: Microsoft plans to soon block Flash, Shockwave, and Silverlight content from activating in Office 365, it said. The block, however, will only be applicable in Office 365 subscription clients -- and not in Office 2016, Office 2013, or Office 2010 distributions, the company added. The change is set to come into effect starting January 2019. This is a full-on block, and not just Microsoft disabling problematic controls with the option to click on a button and view its content, BleepingComputer reports. The block means that Office 365 will prevent Flash, Shockwave, or Silverlight content from playing inside Office documents altogether. Microsoft cited various reasons for taking this decision. It said that malware authors have abused this mechanism for exploit campaigns, but also that Office users rarely used these features. In addition, Microsoft said it was also taking this decision after Adobe announced Flash's end-of-life for 2020.
            

    Read more of this story at Slashdot.


  • 3D Headphone Startup 'Ossic' Closes Abruptly, Leaving Crowdfunders Hanging
    An anonymous reader quotes a report from NPR: Ossic raised more than $3.2 million in crowdfunding for its Ossic X, which it touted as the "first 3D audio headphones calibrated to you." But after delivering devices to only about 80 investors who'd paid at least $999 to for the "Developer/Innovator" rewards level on Kickstarter, Ossic announced Saturday it had run out of money -- leaving the more than 10,000 other backers with nothing but lighter wallets.   Ossic, which The San Diego Union-Tribune notes was founded by former Logitech engineers Jason Riggs and Joy Lyons, had excited gamers, audiophiles and other sound consumers by creating headphones that used advanced 3D audio algorithms, head-tracking technology and individual anatomy calibration to "deliver incredibly accurate 3D sound to your ears," according to its funding campaign on Kickstarter. In less than two months in 2016, it was able to raise $2.7 million from more than 10,000 backers on Kickstarter. It raised another $515,970 on Indiegogo. "This was obviously not our desired outcome," the company said in a statement. "To fail at the five-yard line is a tragedy. We are extremely sorry that we cannot deliver your product and want you to know that the team has done everything possible including investing our own savings and working without salary to exhaust all possibilities."
            

    Read more of this story at Slashdot.


  • Asteroid From Another Star System Found Orbiting Wrong Way Near Jupiter
    Astronomers have spotted an asteroid orbiting our sun in the opposite (retrograde) direction to the planets. The 2-mile-wide asteroid, known as 2015 BZ509, is the first "interstellar immigrant" from beyond our solar system to remain, according to the study published in the journal Monthly Notices of the Royal Astronomical Society. The Guardian reports: Further work on the asteroid revealed it takes the same length of time to orbit the sun as the planet Jupiter at a similar average distance, although in the opposite direction and with a different shaped path, suggesting the two have gravitational interactions. But unpicking quite where the asteroid came from was challenging. Asteroids that orbit the sun on paths that take them between the giant planets -- Jupiter, Saturn, Uranus and Neptune -- are known as centaurs, and it is thought that many might come from distant bands of material within the solar system such as the scattered disk or the Oort cloud. Several, like BZ509, are known to have retrograde paths, although how they ended up on such orbits is unclear.   But there was a clue there was something unusual about BZ509: while previous studies suggested retrograde centaurs stay gravitationally "tied" to planets for 10,000 years at most, recent work had suggested this asteroid's orbit had been linked to Jupiter for far longer, probably as a result of the planet's mass and the way both take the same time to orbit the sun. The discovery provides vital clues as to the asteroid's origins. [Dr Fathi Namouni from the Observatory de la Cote d'Azur said] that the model suggests the most likely explanation is that the asteroid was captured by Jupiter as it hurtled through the solar system from interstellar space. "It means it is an alien to the solar system," he said.
            

    Read more of this story at Slashdot.


  • Trump Ignores 'Inconvenient' Security Rules To Keep Tweeting On His iPhone, Says Report
    According to Politico, "President Donald Trump uses a White House cellphone that isn't equipped with sophisticated security features designed to shield his communications." The decision is "a departure from the practice of his predecessors that potentially exposes him to hacking or surveillance." From the report: The president uses at least two iPhones, according to one of the officials. The phones -- one capable only of making calls, the other equipped only with the Twitter app and preloaded with a handful of news sites -- are issued by White House Information Technology and the White House Communications Agency, an office staffed by military personnel that oversees White House telecommunications. While aides have urged the president to swap out the Twitter phone on a monthly basis, Trump has resisted their entreaties, telling them it was "too inconvenient," the same administration official said. The president has gone as long as five months without having the phone checked by security experts. It is unclear how often Trump's call-capable phones, which are essentially used as burner phones, are swapped out.
            

    Read more of this story at Slashdot.


  • German Test Reveals That Magnetic Fields Are Pushing the EM Drive
    "Researchers in Germany have performed an independent, controlled test of the infamous EM Drive with an unprecedented level of precision," writes PvtVoid. "The result? The thrust is coming from interactions with the Earth's magnetic field." From the report: Instead of getting ahold of someone else's EM drive, or Mach-effect device, the researchers created their own, along with the driving electronics. The researchers used precision machining and polishing to obtain a microwave cavity that was much better than those previously published. If anything was going to work, this would be the one. The researchers built up a very nice driving circuit that was capable of supplying 50W of power to the cavity. However, the amplifier mountings still needed to be worked on. So, to keep thermal management problems under control, they limited themselves to a couple of Watts in the current tests. The researchers also inserted an enormous attenuator. This meant that they could, without physically changing the setup, switch on all the electronics and have the amplifiers working at full noise, and all the power would either go to the EM drive or be absorbed in the attenuator. That gives them much more freedom to determine if the thrust was coming from the drive or not.   Even with a power of just a couple of Watts, the EM-drive generates thrust in the expected direction (e.g., the torsion bar twists in the right direction). If you reverse the direction of the thruster, the balance swings back the other way: the thrust is reversed. Unfortunately, the EM drive also generates the thrust when the thruster is directed so that it cannot produce a torque on the balance (e.g., the null test also produces thrust). And likewise, that "thrust" reverses when you reverse the direction of the thruster. The best part is that the results are the same when the attenuator is put into the circuit. In this case, there is basically no radiation in the microwave cavity, yet the WTF-thruster thrusts on. So, where does the force come from? The Earth's magnetic field, most likely. The cables that carry the current to the microwave amplifier run along the arm of the torsion bar. Although the cable is shielded, it is not perfect (because the researchers did not have enough mu metal). The current in the cable experiences a force due to the Earth's magnetic field that is precisely perpendicular to the torsion bar. And, depending on the orientation of the thruster, the direction of the current will reverse and the force will reverse. The researchers' conclude by saying: "At least, SpaceDrive [the name of the test setup] is an excellent educational project by developing highly demanding test setups, evaluating theoretical models and possible experimental errors. It's a great learning experience with the possibility to find something that can drive space exploration into its next generation."
            

    Read more of this story at Slashdot.


  • Comcast Website Bug Leaks Xfinity Customer Data
    An anonymous reader quotes a report from ZDNet: A bug in Comcast's website used to activate Xfinity routers can return sensitive information on the company's customers. The website, used by customers to set up their home internet and cable service, can be tricked into displaying the home address where the router is located, as well as the Wi-Fi name and password. Two security researchers, Karan Saini and Ryan Stevenson, discovered the bug. Only a customer account ID and that customer's house or apartment number is needed -- even though the web form asks for a full address.   ZDNet obtained permission from two Xfinity customers to check their information. We were able to obtain their full address and zip code -- which both customers confirmed. The site returned the Wi-Fi name and password -- in plaintext -- used to connect to the network for one of the customers who uses an Xfinity router. The other customer was using his own router -- and the site didn't return the Wi-Fi network name or password.
            

    Read more of this story at Slashdot.


  • The Toughest (And Weakest) Phones Currently On the Market
    New submitter Daneel Olivaw R. shares a report from Tom's Guide: To measure each phone's toughness, [Tom's Guide] dropped it from both 4 and 6 feet onto wood and concrete. After each test, we recorded the damage to the phone. If a phone was rendered unusable -- the screen totally shattered, for instance -- then we stopped dropping it. [More details on the testing process can be found here.] Each drop was worth a maximum of 5 points; if a phone made it through all of the rounds unscathed, it would earn 35 points. The more severe the damage per drop was, the more points were deducted. If a phone was rendered unusable after a given drop, it would earn no points, and would not undergo any subsequent test. In total, there were seven tests. [...] If a phone died in the 6-foot edge drop, it was penalized an extra 10 percent. If it died in the 6-foot face drop, it was penalized 5 percent. And if it died when dropped into the toilet, it lost 2.5 percent. We then divided the total score by 3.5, to put it on a 10-point scale. Here are the scores of each device:  Motorola Moto Z2 Force - Toughness score: 8.5/10  LG X Venture - Toughness score: 6.6/10  Apple iPhone X - Toughness score: 6.2/10  LG V30 - Toughness score: 6/10  Samsung Galaxy S9 - Toughness score: 6/10  Motorola Moto G5 Plus - Toughness score: 5.1/10  Apple iPhone 8 - Toughness score: 4.9/10  Samsung Galaxy Note 8 - Toughness score: 4.3/10  OnePlus 5T - Toughness score: 4.3/10  Huawei Mate 10 Pro - Toughness score: 4.3/10  Google Pixel 2 XL - Toughness score: 4.3/10  iPhone SE - Toughness score: 3.9/10
            

    Read more of this story at Slashdot.


The Register

















  • OVH prepares not-discounts to not-match AWS, Azure, et al
    As bit barn builds subside, increased quotas and capacity will land at the same price
    OVH’s wave of global expansion is nearly done and the company will soon follow other public cloud operators’ leads by cost-cutting for customers.…




  • Router admin? Bored? Let's play Battleships using BGP!
    Protocol how-to turns into
    EPIC AS-vs-AS SLUGOUT
    Playing Battleships over the Border Gateway Protocol probably wasn't a scenario considered by the standard's authors, but UK blogger Ben "Jojo" Cox has explained how to do it.…



  • Summoners of web tsunamis have moved to layer 7, says Cloudflare
    DDoS launchers increasingly target application processes instead of flooding networks
    Attackers have noticed that the world is getting better at fending off massive distributed denial-of-service attacks, and are trying to overwhelm application processes instead.…



  • Adobe acquires Magento to go B2B2C and beyond
    Experience Cloud to add commerce and content management facilities
    Adobe has announced it will acquire Magento Commerce, and fold the gobbled business's platform into its Experience Cloud.…


  • Qualcomm readies 60GHz goodies for Facebook's Terragraph
    Also unveils silicon for 5G NR small cells, because big rigs will drown on traffic any year now
    Qualcomm has backed Facebook's plan to take over the mobile network with its Terragraph project: the chip-designer has revealed it's prepping silicon for backhaul systems using today's 802.11ad and 11.ay in the future.…


  • Victoria's educational apps-for-students let creeps contact kids
    World+Dog can contact any student via a shared doc
    UPDATED Google and the Victorian Department of Education have set parents, students, teachers, and the Office of the Australian Information Commissioner a poser: at what point does a feature become a vulnerability? Or just too creepy to put in front of kids?…
















  • RAF Air Command to take on UK military space ops
    Dan Dare has a think about Galileo in least interesting comic strip ever
    The Royal Air Force (RAF) is to take on command and control of UK military space operations, including a possible UK-based alternative to the EU's Galileo satellite constellation.…







  • The harbingers of Doomwatch: Quist is quite the quasi-Quatermass
    Bug behaviour in the wild
    Stob "Plastic-eating bugs [...] could help solve the global plastic pollution crisis," was the this story, triggering the recollection of a childhood nightmare. I inhaled my mouthful of coffee. The office youngsters couldn't understand my panic. "It's the Doomwatch scenario!", I coughed. "The skies will soon be falling!"…



  • Your parents love you, Cortana. That's why we bought you an upgrade
    Microsoft slurps conversational-AI startup Semantic Machines
    Microsoft's decided its Cortana speech assistant needs a bit of buffing to survive in a world where Google AI can book restaurants and a parrot can turn the lights off with Alexa*, so the company has acquired a conversational-AI startup called Semantic Machines.…


  • Sysadmin hailed as hero for deleting data from the wrong disk drive
    An incident that started with a lazy slave ended with a rousing recovery
    Who, me? If the thought of another week at work has you down, worry not: The Register has another instalment of “Who, me?” for you to read, so you can enjoy another tale of errors made by someone other than yourself!…


Page last modified on November 02, 2011, at 09:59 PM