Chachazz

Members
  • Content Count

    1522
  • Joined

  • Last visited

Posts posted by Chachazz


  1. Just days after the releases of Mozilla Firefox 1.0.5 and Mozilla Thunderbird 1.0.5, it appears likely that

    1.0.6 versions of the two applications could be coming as early as next week. It is understood that API changes in 1.0.5 unintentionally broke some extensions.

    In comment 45 of bug 300028, Rafael Ebron said yesterday, "We received feedback on 1.0.5 from distributors and extension developers on API changes that affected them (not a security issue), so we're looking at a 1.0.6 to fix it." It is known that the Enigmail PGP extension for Thunderbird does not work in version 1.0.5.

    http://www.mozillazine.org/talkback.html?article=6950


  2. Mac OS X 10.4.2

    This update offers many reliability and compatibility improvements.

    The update has been released for both the client version and the Server version of Tiger.

    This software updates Mac OS X 10.4.1 to version 10.4.2.

    Specific fixes in this new release include:

    * file sharing using AFP and SMB/CIFS network file services

    * single sign-on authentication and reliable access to Active Directory servers

    * autologin for managed user accounts

    * AirPort and wireless access

    * Core Graphics, Core Audio, Core Image, including updated ATI and NVIDIA graphics drivers

    * Finder updates including finding on Kind and using Slideshow

    * synchronizing your iDisk with .Mac

    * installation reliability

    * managing Dashboard widgets

    * Address Book, Automator, iCal, iChat, Mail, Safari, and Stickies applications

    * compatibility with third party applications and devices

    <<Improvements & Installation Instructions>>

    <<Download>>


  3. R-Linux is a free file recovery utility for the Ext2FS file system used in the Linux OS and several Unixes. R-Linux uses InteligentScan technology and flexible parameter settings that give you real control over the fastest data recovery ever seen. It recovers files from existing logical disks even when file records are lost. However, there is no any network capabilities or ability to reconstruct damaged RAIDs or stripe sets in R-Linux.

    *  Standard "Windows Explorer" - style interface.

    * Host OS: Win9x, ME, NT, 2000, XP, 2003.

    * Supported file systems: Ext2FS (Linux) only.

    * Recognition and parsing Dynamic (Windows 2000/XP), Basic and BSD (UNIX) partitions layout schema.

    * Creates IMAGE FILES for an entire DISK, PARTITION or its part. Such image files can be processed like regular disks.

    * Recognizes localized names.

    * Recovered files can be saved on any (including network) disks accessible by the host operating system.

    R-Linux recovers files:

    *  Removed by virus attack, power failure or system crash;

    * After the partition with the files was reformatted, even for different file system;

    * When the partition structure on a disk was changed or damaged. In this case, R-Linux can scan the disk trying to find previously existed partitions and restore files from found partitions.

    * From disks with bad sectors. In this case, R-Linux can first copy the entire disk or its part into an image file and then process such image file. This is especially useful when new bad sectors are constantly appearing on the disk, and remaining information must be immediately saved.

    System Requirements

    * An Intel-compatible platform running Windows 9x/ME/NT4.0/2000/XP/2003.

    * At least 32 MB of RAM, a mouse, and enough disk space for recovered files, image files, etc.

    * The administrative privileges are required to install and run R-Linux under WinNT/2000/XP/2003.

    http://www.data-recovery-software.net/Linux_Recovery.shtml


  4. What's New With CWShredder?

    CWShredder is now owned and maintained by Trend Micro.

    CWShredder now cleans the CWS.Cassandra variant that includes a desktop hijack as well as a browser hijack.

    Originally developed by Merijn Bellekom of the Netherlands, CWShredderâ„¢ was owned and maintained by InterMute until June of 2005 when InterMute was aquired by Trend Micro.

    http://intermute.com/products/cwshredder.html


  5. Convinced that the recent upswing in virus and Trojan attacks is directly linked to the creation of botnets for nefarious purposes, a group of high-profile security researchers is fighting back, vigilante-style.

    The objective of the group, which operates on closed, invite-only mailing lists, is to pinpoint and ultimately disable the C&C (command-and-control) infrastructure that sends instructions to millions of zombie drone machines hijacked by malicious hackers.

    "The idea is to share information and figure out where the botnets are getting their instructions from. Once we can identify the command-and-control server, we can act quickly to get it disabled. Once the head goes, that botnet is largely useless," said Roger Thompson, director of malicious content research at Computer Associates International Inc.

    Thompson, a veteran anti-virus researcher closely involved in the effort, said the group includes more than 100 computer experts (unofficially) representing anti-virus vendors, ISPs, educational institutions and dynamic DNS providers internationally.

    "It's just a bunch of good guys that have an interest in shutting down these botnets. We are dealing here with some very skilled and sophisticated attackers who have proven they know how to get around the existing defense systems," Thompson said in an interview with Ziff Davis Internet News.

    Story>>


  6. Thursday June 16th, 2005

    Dave Miller writes: "There will be multiple mozilla.org service outages the week of June 20-24, lasting anywhere from a few minutes to a few hours on each outage, as we move several servers to a new collocation facility."

    Dave's weblog post on the outages has more details. Virtually every public-facing service will be affected to some extent. Individual outages will be announced on nagios.mozilla.org.

    The outages are occurring because the Mozilla Foundation is moving the last of its servers from one meer.net colocation facility to another.

    http://www.mozillazine.org/talkback.html?article=6800

    get your Mozilla-fix!


  7. GLib 2.6.5 is now available for download at:

    ftp://ftp.gtk.org/pub/gtk/v2.6/

    glib-2.6.5.tar.bz2 md5sum: 777d2e34a60edad28319207b576cda91

    glib-2.6.5.tar.gz md5sum: 90af9fc0425c1737166f3e75e42154c2

    This is a bug fix release and is source and binary compatible

    with 2.6.0.

    GLib is the low-level core library that forms the basis for projects

    such as GTK+ and GNOME. It provides data structure handling for C,

    portability wrappers, and interfaces for such runtime functionality as

    an event loop, threads, dynamic loading, and an object system.

    More information about GLib is available at: http://www.gtk.org/

    An installation guide for the GTK+ libraries, including GLib, can

    be found at: http://developer.gnome.org/doc/API/2.0/gtk/gtk-building.html

    Overview of Changes from GLib 2.6.4 to GLib 2.6.5

    =================================================

    * GOption

    - Treat '-' as non-option argument [Tim Musson, Thomas Leonard]

    * Win32 changes

    - Improve g_get_system_data_dirs() [Tor]

    * Other bug fixes [Tommi Komulainen, Tor, Benjamin Otte,

    Morten Welinder, Christian Biere, Noah Levitt, Michael Banck]

    * Documentation improvements [Mattew F. Barnes, Federico

    Mena Quintero, Daniel Vaillard, Matthias]

    * New and updated translations (da,eu,gl,mn,nb,ne,no)

    http://www.gtk.org/


  8. GIMP 2.3.1 development release

    2005-06-10

    Another development release is out for those of you that are afraid of using CVS but want to follow the development towards GIMP 2.4. The source is available from ftp://ftp.gimp.org/pub/gimp/v2.3/ or from one of its mirrors.

    The List of Changes includes usability improvements as well as some very promising changes to the Python bindings.

    If you want to try GIMP 2.3.1, please make sure that you read the Release Notes for Development Releases

    In Development - Use at own Risk


  9. Summer of Code

    Google Code

    Deadline: June 14, 2005

    The Summer of Code is Google's program designed to introduce students to the world of open source software development.

    This summer, don't let your programming skills lie fallow. Use them for the greater good of open source software and computer science. Google will provide a $4500 award to each student who successfully completes a project by the end of the summer. (Payment details can be found in the FAQ)

    By pairing applicants up with the proven wisdom and experience of established prominent open source organizations (listed below), we hope to make great software happen. If you can't come up with a great idea to submit, a number of our organizations have made idea lists available.

    Summer of Code Info>>


  10. Summer of Code

    Google Code

    Deadline: June 14, 2005

    The Summer of Code is Google's program designed to introduce students to the world of open source software development.

    This summer, don't let your programming skills lie fallow. Use them for the greater good of open source software and computer science. Google will provide a $4500 award to each student who successfully completes a project by the end of the summer. (Payment details can be found in the FAQ)

    By pairing applicants up with the proven wisdom and experience of established prominent open source organizations (listed below), we hope to make great software happen. If you can't come up with a great idea to submit, a number of our organizations have made idea lists available.

    Summer of Code Info>>