the DDoS attack force completely bombards the site with traffic at one specific chokepoint, leaving other legitimate requests to bounce away unfulfilled as the server struggles to keep its head above water. For some context
livecode.com | Download - 0 views
-
"Create your own apps and utilities using LiveCode Community Edition. This full featured programming environment allows you to create open source apps for all major platforms including Windows, Mac, Linux, iOS, Android and Server. Download it completely free and start making your ideas come to life. "
'Password fatigue' haunts internet masses as experts ponder the future of the password - 0 views
-
"Sixty-three random alpha-numeric characters - in this case, generated by an online password generator - are as good as it gets when it comes to securing your virtual life. But as millions of internet users have learned the hard way, no password is safe when hackers can, and do, pilfer them en masse from banks, email services, retailers or social media websites that fail to fully protect their servers."
How China and Others Are Altering Web Traffic - Technology Review - 0 views
Inside Mac OS X Snow Leopard: Exchange Support - RoughlyDrafted Magazine - 0 views
-
"Windows Enthusiasts like to spin Apple's support for Exchange on the iPhone and in Snow Leopard as endorsement of Microsoft in the server space. From another angle, Apple is reducing its dependance upon Microsoft's client software, weakening Microsoft's ability to hold back and dumb down its Mac offerings at Apple's expense."
-
Interesting breakdown comparing Exchange services from Apple and Microsoft.
What A DDoS Attack Looks Like | Gizmodo Australia - 0 views
Welcome to Prineville, Oregon: Population, 800 Million | Wired Enterprise | Wired.com - 0 views
-
Web giants like Google and Amazon are notoriously secretive about what goes on inside the worldwide network of data centers that serve up their sweeping collection of web services. They call it a security measure, but clearly, they also see these facilities as some sort of competitive advantage their online rivals mustn't lay eyes on.
'Dating' Site Imports 250,000 Facebook Profiles, Without Permission | Epicent... - 0 views
-
“Facebook, an endlessly cool place for so many people, becomes at the same time a goldmine for identity theft and dating — unfortunately, without the user’s control. But that’s the very nature of Facebook and social media in general. If we start to play with the concepts of identity theft and dating, we should be able to unveil how fragile a virtual identity given to a proprietary platform can be.”
-
Mark Zuckerberg, the company’s founder, made his name at Harvard in 2003 by scraping the names and photos of fellow classmates off school servers to feed a system called FaceMash. With the photos, Zuckerberg created a controversial system that pitted one co-ed against another, by allowing others to vote on which one was better looking.
-
"How does a unknown dating site, with the absurd intention of destroying Facebook, launch with 250,000 member profiles on the first day? Simple. .. an approach taken by two provocateurs who launched LovelyFaces.com this week, with profiles - names, locations and photos - scraped from publicly accessible Facebook pages."
-
Is scraping data off Facebook art or does this raise privacy issues? Interesting.
Video: Google Offers Rare Glimpse Into its Data Centers - 1 views
-
Google uses its own custom, stripped down version of Linux. It uses only a minimum set of packages.
-
The facilities are hypersecure - vehicles can't enter without authorization, and iris scanners are used at some locations.
1 - 10 of 10
Showing 20▼ items per page