|
Microsoft believes it can do a better job than Google, and it has released a Chrome plugin, Windows Defender Browser Protection, that brings its own anti-phishing protection to Google's browser. Now we just need an Edge extension to render in Chrome, and the full circle of life will be complete
Hakuna mabrowsa!
|
|
|
|
|
Cyber-attackers are turning to tools that automate the process of finding and hijacking vulnerable servers, a study has found. What kind of world are we in, when we can't even rely on hackers to put in an honest day's work?
|
|
|
|
|
It's amazing how quickly mainstream news picks up stories like this. Automated hacking tools have been around longer than I care to think.
"If you don't fail at least 90 percent of the time, you're not aiming high enough."
Alan Kay.
|
|
|
|
|
Oracle has set out on a mission to create a universal virtual machine that can support multiple languages while providing consistent performance, tooling and configuration. "What... is your quest?"
|
|
|
|
|
“The Committee should be willing to consider the design / quality of proposals even if they may cause a change in behavior or failure to compile for existing code.” "Cry 'Havoc!', and let slip the dogs of war!"
Do you think anyone would notice if they removed pointers?
|
|
|
|
|
There’s a lot more to viability than just popularity, though popularity matters. Just because no one uses it, doesn't mean no one uses it
|
|
|
|
|
Researchers for the social network taught people to feel 100 words on their arms with a wearable prototype. And now I'm feeling silly
|
|
|
|
|
I sense an overuse of the poo emoji in the near future...
|
|
|
|
|
I can see that getting "repurposed" to fit other body parts ... "Oh! Like me! Like me! Again!"
Bad command or file name. Bad, bad command! Sit! Stay! Staaaay...
AntiTwitter: @DalekDave is now a follower!
|
|
|
|
|
This weeks’ blog post covers a technique you can use to make all file operations on Windows run at one tenth their normal speed (or slower), in a way that will be untraceable for most users! A detective story
|
|
|
|
|
Microsoft admitted yesterday that the reason it did not launch the Spring Creators Update for Windows 10 last week was because of technical issues the company encountered with the supposed final release. I thought that's what customers were supposed to find?
|
|
|
|
|
Kent Sharkey wrote: I thought that's what customers were supposed to find?
That makes at least two of us.
|
|
|
|
|
I can see how naming releases by release date is less confusing than using random names like "Creators' Update" but isn't there an even easier system that the rest of us have been using for years? You know, the one where we just use incremental version numbers and rely on people's instinctive ability to realise that version 10.3 is more recent than version 10.2?
98.4% of statistics are made up on the spot.
|
|
|
|
|
PeejayAdams wrote: You know, the one where we just use incremental version numbers and rely on people's instinctive ability to realise that version 10.3 is more recent than version 10.2?
MS product version numbers and names have been all over the place ever since Bill Gates decided to call Windows 4 Windows 95.
But usually there will be another number somewhere that follows something like the scheme you cite. I.e., the bigger the number the more recent the version.
Kevin
|
|
|
|
|
But that had me thinking, how much effort would it be to actually embed machine readable data inside a dubstep track, while ensuring that the sound could be enjoyed by humans as well… wub wub wub
|
|
|
|
|
I'm not entirely convinced that encoding in dubstep is the best approach to ensuring the sound could be enjoyed by humans.
(To be honest, I quite enjoy some dubstep, but it maybe doesn't have the broadest reach)
"If you don't fail at least 90 percent of the time, you're not aiming high enough."
Alan Kay.
|
|
|
|
|
A group of 34 companies has signed the Cybersecurity Tech Accord, an agreement promising to defend customers around the world from hacks regardless of where they take place or who the perpetrator might be. Because they've done such a good job so far, I'm sure they'll be 100% successful
|
|
|
|
|
In order for customers to sign up to be a part of this, they need your name, age, government identification info, and facebook status.
|
|
|
|
|
The company is also using its processors’ performance monitoring to detect malicious code. Will it render pretty pictures while doing so?
|
|
|
|
|
|
its flagship operating system was too big and too unwieldy for what it had in mind.
I guess free is an argument one can't counter when the other option is "fix it."
|
|
|
|
|
Following the release of Linux kernel 4.16, Linus Torvalds has said that the next kernel will be version 5.0. Or maybe it won't, because version numbers are meaningless. Mission accomplished?
|
|
|
|
|
In this blog post, I’ll show how to port business logic from WPF and build a phone- and tablet-friendly mobile app for Android, iOS, and UWP. Existing C# code can often be re-used with minimal changes, and the user interfaces can be built using Xamarin.Forms XAML to run across platforms. You know, for all those Windows phones users
OK, it's cross-platform, but I needed to rub some salt in WP wounds
|
|
|
|
|
Public cloud services are now in use in 97 percent of organizations, but one in four have experienced data theft and cloud-first strategies are on the decline. The rest just haven't noticed yet?
|
|
|
|
|
Automated source code analysis of 33 web applications has found that 94 per cent of them have at least one high-severity vulnerability, according to security biz Positive Technologies. Sorry, were we supposed to fix those?
|
|
|
|