Tags: thema

Sort by: Date / Title / URL

  1. Mockapetris Unternehmen betreibt bereits die DNS-Infrastruktur nahezu aller deutschen Provider. Er stehe voll und ganz hinter der Umsetzung. Die Sperrlisten werden verschlüsselt, um eine Veröffentlichung zu verhindern.
  2. Hid.im is a new web-based service that allows users to hide .torrent files inside PNG images. This means that users can easily upload hidden torrent files to their favorite image hosting service and forums, or use it as an avatar on social networking sites without being censored.
  3. Wie Microsoft mit der OOXML ISO Spezifikation die ISO behindert. Oder: Wie viele neue P-Mitglieder in der ISO sich nur um eine Sache gekümmert haben.
  4. French hackers claim to have sabotaged Internet forensics by creating a firmware for routers that cracks nearby WiFi networks and routes your traffic through them at random, creating false trails leading to your neighbors instead of you. They're calling it the HADOPI Router, in honor of Nicolas Sarkozy's crazy Internet law of the same name.
    12-07-2009 to , , , , by totpunk and -1 others
  5. we're announcing a new project that's a natural extension of Google Chrome — the Google Chrome Operating System. It's our attempt to re-think what operating systems should be.
  6. Over the past 24 hours we've had a number of readers tell us that there is an OpenSSH exploit in active use. We cannot confirm its existence, other than a DOS exploit for OpenSSH that is on Milw0rm. If you have any concrete evidence of this (not rumors or URLs to blogs where people are discussing that there might be a problem) please let us know via our contact form. Again, no rumors and no links to discussions of rumors please. We need reports of active exploitation or other evidence that this a real issue.
  7. Vergangene Woche ließ die afghanische Regierung zehntausende von Büchern in einen Fluss werfen. Dieses feindselige Verhalten gegenüber Büchern hat eine Geschichte
  8. If a picture's worth 1000 words, how much of a picture can you fit in 140 characters?
  9. Ãœbersicht deutscher Sicherheits- und Ãœberwachungsgesetze, ihres kritischen Inhalts und des Stimmverhaltens der Fraktionen im Deutschen Bundestag
  10. mona lisa in einem tweet kodiert - in chinesischen schriftzeichen

First / Previous / Next / Last / Page 3 of 31