OpenEducationDisc | Programs - 0 views
Squeak in Extremadura - 0 views
Javascript Tutor - 0 views
Quackit Webmaster Tutorials - 0 views
Man Arrested For Exploiting Error In Slot Machines - Slashdot - 0 views
-
"A man awaiting trial in Pennsylvania was arrested by Federal agents on Jan. 4, and accused of exploiting a software 'glitch' within slot machines in order to win payouts. The exploit may have allowed the man to obtain more than a million dollars from casinos in Pennsylvania and Nevada, and officials say they are investigating to see if he used the method elsewhere. The accused stated that 'I'm being arrested federally for winning on a slot machine. Let everybody see the surveillance tapes. I pressed buttons on the machine on the casino. That's all I did.' Apparently, slot machine software errors are fairly common. The lesson here seems to be that casinos can deny you a slot machine win any time they wish by claiming software errors, and if you find an error that you can exploit, you may find yourself facing Federal charges for doing so
Hackers find new way to cheat on Wall Street -- to everyone's peril | The Industry Stan... - 0 views
-
High-frequency trading networks, which complete stock market transactions in microseconds, are vulnerable to manipulation by hackers who can inject tiny amounts of latency into them. By doing so, they can subtly change the course of trading and pocket profits of millions of dollars in just a few seconds
Jeff Bezos' Original Job Ad: It's 1994, You're a Unix Programmer. Would You Have Got In... - 0 views
-
In 1994, a 30-year-old Jeff Bezos was looking for "extremely talented C/C++/Unix developers to help pioneer commerce on the Internet." This was when his company was called Abracadabra, not yet Amazon, and before the developer whizzes he did hire would indeed pioneer commerce on the internet. Would you have answered this ad?
Putin to put Russian government on Linux by 2015 - Computerworld - 0 views
-
Russian Prime Minister Vladimir Putin [cq] has ordered government agencies there to open-source software by 2015, according to translated documents. Putin's order, signed this month, follows news reports from October saying the Russian government was planning to drop Microsoft products in favor of a national open-source operating system based on Linux.
Author Slams eBook Piracy, Son Outs Her As a Music Pirate | TorrentFreak - 0 views
-
As part of an article investigating the growing phenomenon of eBook piracy, a Scandinavian news outlet interviewed a 19 year-old self-confessed pirate who bragged about his activities. To counter his viewpoint a well known author contributed to the piece, stating that she abhors book piracy since it costs her huge amounts of money. However, her moral stance took a bit of a beating when her son let an embarrassing fact slip out
YouTube - googleOSPO's Channel - 0 views
Volunteer Cyber Army Emerges In Estonia : NPR - 0 views
-
In April 2007, the Baltic republic of Estonia became the first country in the world to experience cyberwar. Government, financial and media computer networks were paralyzed by a series of attacks, which authorities ultimately concluded originated in Russia. In the years since that cyberassault, Estonia has distinguished itself once again: Now it is a model for how a country might defend itself during a cyberwar. The responsibility would fall to a force of programmers, computer scientists and software engineers who make up a Cyber Defense League, a volunteer organization that in wartime would function under a unified military command.
Home :: VIP Trolley - 0 views
Cisco Explains the 7 Deadly Weaknesses of Social Network Users and More in Security Report - 0 views
Welcome news for Open Source | Kate Lundy - 0 views
-
Principle 3: Australian Government agencies will actively participate in open source software communities and contribute back where appropriate.
Build Your Own Blocks (BYOB) - 0 views
-
an attempt to extend the brilliant accessibility of Scratch to somewhat older users-in particular, non-CS-major computer science students-without becoming inaccessible to its original audience. BYOB 3 adds first class lists and procedures to BYOB's original contribution of custom blocks and recursion.
Let the hacking begin: Zuckerberg targeted - 0 views
-
"One thing is certain, and is unlikely to be news that's welcomed at Facebook HQ. There is a growing perception out there that Facebook isn't the safest of places to be," wrote Sophos senior technology consultant Graham Cluley in a recent blog post. Some of the key threats recently highlighted by Sophos are rogue applications or survey scams that pop up from users' own Facebook friends who have been tricked into clicking on an interesting looking news headline or YouTube video that then duplicates to everyone in their friend's list. It then directs them to click on a website or survey, or inadvertently download malware. One of the offenders now doing the rounds is a fake application that promises to let you see who has been viewing your profile.
« First
‹ Previous
41 - 60 of 67
Next ›
Showing 20▼ items per page