happygeek 2,411 Most Valuable Poster Team Colleague Featured Poster

If this is an Apple-style leak then there should be plenty of totally unsubstantiated rumor to follow. I've heard first prize will be an iPad 3:)

happygeek 2,411 Most Valuable Poster Team Colleague Featured Poster

If you advise others not to drink, then why are you 'sad to say' you don't drink yourself?

happygeek 2,411 Most Valuable Poster Team Colleague Featured Poster

Is the freedom thing a red herring though? You have the freedom to purchase an Apple device or something else, so surely you are buying into the product as provided and so the whole 'freedom' complaint after the event seems a little odd.

Discuss :)

happygeek 2,411 Most Valuable Poster Team Colleague Featured Poster

Yep, that pretty much sums it up Sanjay. I see the threads, and they are pretty much all spam... :(

happygeek 2,411 Most Valuable Poster Team Colleague Featured Poster

Arf! ;)

happygeek 2,411 Most Valuable Poster Team Colleague Featured Poster

jailbreakme.jpg Earlier this week a hacker group called Dev-Team launched a revamped website service that enables owners of the iPhone 4 and iPad 2 (amongst a myriad other iOS-powered devices) to jailbreak them in next to no time, for free, online. The JailBreakMe site exploits a vulnerability with the way that the Safari browser client handles PDF files to enable the jailbreaking to be performed in such a painless way.

However, as security researchers have been warning , the same vulnerability could be exploited by others for nefarious purposes rather than simply the ability to get apps which have not been approved by Apple onto their devices.

Graham Cluley, senior technology consultant at security vendor Sophos, worries that "cybercriminals would be able to create booby-trapped webpages that could run code on visiting devices without the user's permission" and predicted that Apple would be spitting feathers "that this vulnerability has been made public in this way" before it had a chance to get a patch out. Indeed, Cluley went on to wonder "how quickly they can issue a patch for iOS to close this vulnerability".

Well now we have the answer, sort of. Apple has confirmed it is working hard on a fix for the JailBreakMe vulnerability and although no release date has been announced, an Apple spokesperson says it will be "available to customers in an upcoming software update".

Given the coverage that the JailBreakMe site is getting online, I suspect that …

happygeek 2,411 Most Valuable Poster Team Colleague Featured Poster

I always liked that bloke from the Monty Python sketch:

Tarquin Fintimlinbinwhinbimlim Bus Stop F'tang F'tang Ole Biscuit-Barrel

happygeek 2,411 Most Valuable Poster Team Colleague Featured Poster

:?:
What are the discuss on area51 category in DANIWEB.:icon_question:

Currently we are talking about you... muhahaha >;)

jingda commented: Lol +0
happygeek 2,411 Most Valuable Poster Team Colleague Featured Poster

Peter Mile.

happygeek 2,411 Most Valuable Poster Team Colleague Featured Poster

Sigh. Because signature links are used for that very purpose, among other things, and members are quite at liberty to put their links in them as well as in their profiles...

happygeek 2,411 Most Valuable Poster Team Colleague Featured Poster

1. I drink an average of four or five pints of beer (real ale such as spitfire or batemans) per week

2. Stupid question, only applies to those who depend upon booze surely?

3. I use Cialis, lasts longer than Viagra

4. Never water down your beer

JoshuaBurleson commented: most entertaining thing I've ever read +0
happygeek 2,411 Most Valuable Poster Team Colleague Featured Poster

Ignore jingda. you are most welcome to post your own web links in your signature - that's what it is for.

Jingda, perhaps you should read the rules yourself first before giving people advice about them?

happygeek 2,411 Most Valuable Poster Team Colleague Featured Poster

Why's that then?

happygeek 2,411 Most Valuable Poster Team Colleague Featured Poster

What If - Coldplay

happygeek 2,411 Most Valuable Poster Team Colleague Featured Poster

One Way - The Levellers

happygeek 2,411 Most Valuable Poster Team Colleague Featured Poster

Anyone who likes tattoos is OK by me, says the DaniWeb admin with two full sleeves, a full backpiece and a full chest of the things... Welcome little one :)

happygeek 2,411 Most Valuable Poster Team Colleague Featured Poster

The tutorial posting process currently remains as:

Post in most relevant forum
Clearly flag as a tutorial
PM the mods of that forum and/or myself
Tutorial gets peer reviewed as is
If of high enough quality then gets post type changed to tutorial

happygeek 2,411 Most Valuable Poster Team Colleague Featured Poster

The main thing is to contribute good quality postings, ask interesting and relevant questions and answer threads where you know the answer. Aside from that, tell your friends/colleagues about DaniWeb and encourage them to do the same.

happygeek 2,411 Most Valuable Poster Team Colleague Featured Poster

ipads.jpg Imagine lining up 57.5 billion Apple iPads to build a wall measuring about 4000 miles long and 60 feet high. To put that into perspective, think of the Great Wall of China cloned and stacked on one top of the other, that's how big we are talking here folks. Now imagine all of those iPads stuffed choc-a-bloc with data. 1.8 zettabytes (or 1 billion terabytes if you prefer) of it to be precise.

That, somewhat incredulously, is the amount of data that will be created globally just this year according to the new IDC Digital Universe study ' Extracting Value from Chaos '.

The study suggests that the quantity of data being produced is now actually growing faster than Moore's Law, and yes I know Moore's Law does not apply to data but it's an interesting analogy nonetheless. The amount of data being produced around the world is now more than doubling every two years, which is really quite a frightening statistic.

Need more help visualising just how much data 1.8 zettabytes actually is? OK, how about if everyone, including you dear reader, were to Tweet consistently at a rate of 3 Tweets-per-minute for 26,976 years without stopping at all.

Other interesting things to note from the report include:
Data growth is outpacing the growth of data storage capacity (as a single gigabyte of data can generate a further petabyte of data that is transient in nature such as streaming …

jingda commented: Like the thought of comparing data storage with Moore's Law. Its just bad that i have nothing useful to contribute to this forum +9
happygeek 2,411 Most Valuable Poster Team Colleague Featured Poster

Sounds more like Mr X has found a glitch that allows him to access a forum that he shouldn't be able to - Area 51 for example - rather than being a hacker to be honest...

happygeek 2,411 Most Valuable Poster Team Colleague Featured Poster

ok sounds great. so you just run one website? Any plans for other websites?

Also see: ProgrammingForums.Org

happygeek 2,411 Most Valuable Poster Team Colleague Featured Poster

Nothing, it was a spammer - now dealt with.

happygeek 2,411 Most Valuable Poster Team Colleague Featured Poster

Can you tell us, by PM if you want, which restricted link Mr X was able to access regularly so that Dani can look into it purely from a fixing any holes persepctive rather than go get Mr X perspective?

happygeek 2,411 Most Valuable Poster Team Colleague Featured Poster

That 'something' could be geeks, or maybe nerds... :)

happygeek 2,411 Most Valuable Poster Team Colleague Featured Poster

Perhaps gullible is a better word, but the article supports the statement whatever. No more stupid than anyone else picking up and inserting sticks they find on the floor I grant you, but stupid/gullible nonetheless.

happygeek 2,411 Most Valuable Poster Team Colleague Featured Poster

dohs1.jpg Penetration testing by the US Department of Homeland Security which involved dropping USB thumb drives and various data discs around the car parks of government agency buildings has revealed a not-so-shocking truth: just like most folk, government workers allow curiosity to trump security when faced with the opportunity to have a nosey at something they think they shouldn't be looking at.

Some 60 percent of those who picked up the thumb drives and discs went on to stick them straight into their company computers in order to see what they contained. The more that the drive or disc looked like it really might contain something 'official' and secret, those with an official looking logo stamped on them for example, the more likely people were to plug them in. In fact an amazing 90 percent of the drives with official logos that were picked up were installed.

Of course, this will come as absolutely no surprise to anyone who knows anything about both human nature and IT security. Stick baiting, as the process is known amongst the bad guys, is a remarkably simple and effective method of installing malware onto the networks of target businesses. This particular pen test proves that government departments are not immune to the curiosity factor when it comes to targeted attacks. The DOHS testers got their percentage numbers for this test because the drives were 'infected' with a basic call home routine, but this could just as easily have been …

happygeek 2,411 Most Valuable Poster Team Colleague Featured Poster

Resistance is futile...

happygeek 2,411 Most Valuable Poster Team Colleague Featured Poster

Like the world itself, GL threads have no official use by date.

happygeek 2,411 Most Valuable Poster Team Colleague Featured Poster

Welcome aboard the good ship DaniWeb, Kerry...

happygeek 2,411 Most Valuable Poster Team Colleague Featured Poster

I liked him as Locutus of Borg best...

happygeek 2,411 Most Valuable Poster Team Colleague Featured Poster

Facepalm? Isn't that the new Google Social Networking resource...

happygeek 2,411 Most Valuable Poster Team Colleague Featured Poster

This would probably come under the Computer Fraud and Abuse Act in the USA, or the Computer Misuse Act in the UK (most countries have different laws covering much the same thing).

The US law defines hacking as having "knowingly accessed a computer without authorization or exceeding authorized access" which your example would fit into I imagine.

As for punishment that could be a fine or prison term, but then how long is a piece of string.

My advice to the hypothetical Mr X, as an administrator here, would be DON'T DO IT!

happygeek 2,411 Most Valuable Poster Team Colleague Featured Poster

I swear I thought the thread title was 'Two nuns spotted in China defy explanation' but then I've never been able to explain nuns...

jingda commented: very funny. +0
happygeek 2,411 Most Valuable Poster Team Colleague Featured Poster

Until Apple confirms the date, and indeed the specs, it is all speculation.

happygeek 2,411 Most Valuable Poster Team Colleague Featured Poster

Welcome to DaniWeb!

happygeek 2,411 Most Valuable Poster Team Colleague Featured Poster

Set fire to the rain - Adele

happygeek 2,411 Most Valuable Poster Team Colleague Featured Poster

Erm, possibly like I said in paragraph three of the piece: "with the launch of the iPhone 5, which is now expected on September 7th according to most sources we have contacted" :)

happygeek 2,411 Most Valuable Poster Team Colleague Featured Poster

With the release of iOS 5 to developers, Apple has signalled the arrival of the much awaited iPhone 5. But when can we expect to see it, and how will it be different to the iPhone? As usual, the Apple rumor mill has been churning out specs for many months now but some seem much more likely than others so DaniWeb has attempted to separate the wheat from the chaff to bring you what we think is the most probable list of iPhone 5 specs.

dw-ios5001a.jpg


Apple has already informed the world, well the world of app developers to whom the release of iOS 5 has been targeted in order for them to get working on creating and updating apps to work with the new iPhone 5 when it launches, that iOS 5 will come complete with no less than 200 new user features. Oh, and let's not forget the updated SDK which accompanies it and features a rather impressive 1500 new APIs.

So what are some of the most interesting of those 200 new user features we can expect to see implemented when iOS 5 hits the streets with the launch of the iPhone 5, which is now expected on September 7th according to most sources we have contacted? Well how about a BlackBerry matching messaging function called, naturally, iMessage? You want delivery and read receipts like the BlackBerry? You got it. You want secure end-to-end encryption like the …

Dani commented: Wow, this article is doing great with traffic! +13
jingda commented: Cool +9
happygeek 2,411 Most Valuable Poster Team Colleague Featured Poster

I reckon we should have an admin of the year vote between you, me and Julienne. Winner gets to delete all spam in the marketing forums for six months. PS. please don't vote for me! ;)

No need for a Super Mod of the year vote, Sanjay has a shoe-in for that one :)

happygeek 2,411 Most Valuable Poster Team Colleague Featured Poster

1. Those links are not against the rules, and being in a signature not spam either

2. Even if it was spam he would get a warning, zero points, for a first offence and would not be banned

happygeek 2,411 Most Valuable Poster Team Colleague Featured Poster

It's one of the more bizarre questions I have been asked during my twenty year involvement in the computer security business. Yet here I am, pondering whether something being called the Shrek virus could have enabled tens of thousands of butt ugly lonely people to bypass the attractiveness filtering of an online dating agency which only allows people voted 'beautiful enough' by the existing membership to join.

shrek.jpg OK, so I'll readily admit I'm not 'beautiful' at least on the outside, but I'd rather slash my wrists than join a dating agency which proclaims "Browse beautiful profiles of men and women without sifting through all the riff raff" and "Meet REAL beautiful people who actually look in real life as they do online" to be honest. Shallow folk don't turn me on much, and this whole concept stinks of being shallow to me. Looks are not something a lasting relationship can be built upon.

I have to admit that the press release from BeautifulPeople.com regarding the 'Shrek Virus' also has something of a fishy smell about it. As a rather cynical chap by nature, I cannot help but notice the release comes at the same time as serious security breaches making the headlines. Talking to my contacts at various security companies, none of them have been informed about the existence of a Shrek virus, and none of them have seen any evidence to suggest it does actually exist. Indeed, Graham Cluley who is the Senior Technology Consultant …

happygeek 2,411 Most Valuable Poster Team Colleague Featured Poster

That's Los Angeles in Pakistan is it? Your IP address doesn't lie, unlike you of course who have been spamming your signatures using different accounts here for a couple of years now.

I've deleted them, by the way...

jingda commented: Cool +0
happygeek 2,411 Most Valuable Poster Team Colleague Featured Poster

No problem.

happygeek 2,411 Most Valuable Poster Team Colleague Featured Poster

Gone to Earth - by The Boyne Hunt Saboteurs

happygeek 2,411 Most Valuable Poster Team Colleague Featured Poster

webnet is already being used by someone else

happygeek 2,411 Most Valuable Poster Team Colleague Featured Poster

That was the month that I wasn't around, but now fixed - thanks for the heads up!

happygeek 2,411 Most Valuable Poster Team Colleague Featured Poster

Members only get banned if they break the rules enough times to reach 10 infraction points, simple as.

That's what happened with the Original Poster: he received a number of warnings and infractions during his stay with DaniWeb, so when he sent an abusive/offensive PM to a moderator I gave him a Keep it Pleasant infraction which took him over the 10 point threshold and triggered the ban.

Every DaniWeb member is given every opportunity to modify their behavior and abide by the community rules, but if they refuse so to do then a ban becomes almost an inevitability.

happygeek 2,411 Most Valuable Poster Team Colleague Featured Poster

According to reports, the LulzSec hacking group has claimed responsibility for a denial of service hack attack on the cia.gov website resulting in it being inaccessible for a while late yesterday.

lulz.jpg


LulzSec appears to have taken up the baton of high profile hacking from the Anonymous group in recent weeks, with attacks being reported to have hit the Senate, News Corp, Sony and even the UK National Health Service. Yet all these hacks have one thing in common: they all seem to be aimed at getting media exposure as much as anything else.

It could also be argued that they are exposing serious security shortcomings in web-based operations that really should know better, and certainly the likes of the Senate and CIA sites fall into that category. However, the light-hearted approach to the serious matter of hacking, with 'humorous' Tweets announcing them and claiming responsibility, have led to some security analysts to ask if LulzSec are just in it for laughs?

Not that the FBI is laughing, LulzSec members are currently wanted by the Feds for their activities which, at the end of the day, are in breach of the law no matter how much the group may want to paint themseleves as hacktivist pranksters.

The general public, however, would appear to get the funny side of the hacking according to a new survey from security outfit Sophos. When asked if they found "LulzSec’s activities amusing" an astonishing 56.85 percent …

happygeek 2,411 Most Valuable Poster Team Colleague Featured Poster

Meditation is well worth the effort if you can get into it.

happygeek 2,411 Most Valuable Poster Team Colleague Featured Poster

Sorry, thought I'd got your Featured Poster badge sorted - might have been a casualty of my having to leave DaniWeb temporarily to sort my life out. Anyway, now sorted :)