The CF slot (“Compact Flash”) found on more and more PDAs seems to be the latest gadget for (un)usuful extensions: After memory extensions, GPS, Wifi, Webcams, now … the FM radio! 🙂 http://www.prolink.com.tw/english/products/PDA/FM201.htm
Where are we going?! Some guys are ready to make business based on anything! 🙁 Show Your American Patriotism! (Better to turn your speaker off)
I found the following text as signature in a mail… So real! Choose no life. Choose no career. Choose no family. Choose a fucking big computer, choose disk arrays the size of washing machines, modem racks, CD-ROM writers, and electrical coffee makers. Choose no sleep, high caffeine and mental insurance.
Nice introduction to this page: “There’s no excuse to write insecure code.” – various Lot of vulnerabilities should never be exploited if all developers always followed some golden rules! The Shmoo Group – How to Write Secure Code
An original trip towards Brussels made withbikers 🙂 http://web.wanadoo.be/djcalle/moto03.mpe.
The classic RFC of April 1st 🙂 ftp://ftp.rfc-editor.org/in-notes/rfc3514.txt
Tired of PocketPC? It’s now quite easy to install Linux on your PDA! There are even distributions ready for them: MIZI Research, Inc. Should be very exciting to test it but, in my case, I’ll loose my GPS applications! If somebody has a spare PDA, mail me 🙂
Nice new toy: a Bluetooth modem/fax connected to your classic phone line. Then it’s used as a dialer when some other Bluetooth enable devices connect to it. http://www.billionton.com.tw/english/product/bt56r.htm
Micro$oft refuses to provide a fix for the latest security hole found in their Windows operating systems…. They recommend to simply protect the box behind a firewall 🙂 Microsoft Security Bulletin MS03-010
You detected unusual activity on your server? Strange packets going thru your network? Your box has been compromised? First, don’t panic! Disconnect it from the network and start investigations… SecurityFocus has published a first article (two others will follow soon) regarding the tools and best practices to analyse a compromised