iodine lets you tunnel IPv4 data through a DNS server. This can be usable in different situations where internet access is firewalled, but DNS queries are allowed. It runs on Linux, Mac OS X, FreeBSD, NetBSD, OpenBSD and Windows and needs a TUN/TAP device. The bandwidth is asymmetrical with limited upstream and up to 1 Mbit/s downstream.

If you are familiar with vcs software such as Subversion, you might think of boar as "version control for large binary files". But keep reading, because there is more to it.

Boar stores snapshots of directory trees in a local or remote repository and provides tools to ensure that your data is consistent and complete. You can keep just some or all of your data checked out for viewing and editing.

The repository has a simple layout to ensure that the data can easily be extracted even if the original software should be unavailable. This simplicity makes boar ideal for data that needs safe long-term storage.

Enterprises addicted to Microsoft's nine-year-old Internet Explorer 6 (IE6) browser are having a tough time migrating to Windows 7, an analyst said today.


Organizations running IE6 have told Gartner that 40% of their custom-built browser-dependent applications won't run on IE8, the version packaged with Windows 7. Thus many companies face a tough decision: Either spend time and money to upgrade those applications so that they work in newer browsers, or stick with Windows XP.

But Windows XP won't live forever. Microsoft will retire Windows XP from all support in April 2014, forcing businesses to abandon it or risk running an operating system vulnerable to attack.

Yeah yeah, it's a ComputerWorld article on a Gartner report, but it's just too funny not to bookmark. Ah, the joys of proprietary, nonstandard software.

IS CYBERWARFARE (a) one of the biggest threats of the 21st century or (b) an elaborate hoax designed to extract money from gullible governments? Stuxnet, the computer worm running rampant in Iran's nuclear facilities, tells us the answer. An analysis

of the worm by computer security company Symantec makes it abundantly clear that a few lines of malicious computer code can trip electricity grids, burn out power-station generators, pollute water supplies and sabotage gas pipelines. That cyberattacks can become real-world attacks is no longer a matter of conjecture.

Prey is a lightweight application that will help you track and find your laptop if it ever gets stolen. It works in all operating systems and not only is it Open Source but also completely free.

projectM is an awesome music visualizer. There is nothing better in the world of Unix. projectM's greatness comes from the hard work of the community. Users like you can create presets that connect music with incredible visuals. Try it!

A modern configuration of the powerful and famous Vim, Cream is for Microsoft Windows, GNU/Linux, and FreeBSD.

Pdftk allows you to manipulate PDF easily and freely. It does not require Acrobat, and it runs on Windows, Linux, Mac OS X, FreeBSD and Solaris.

Gramps is a free software project and community. We strive to produce a genealogy program that is both intuitive for hobbyists and feature-complete for professional genealogists. It is a community project, created, developed and governed by genealogists.

In a report being released today, Google said that between January 2009 and the end of January 2010, its malware detection infrastructure found some 11,000 malicious or hacked Web pages that attempted to foist fake anti-virus on visitors. The search giant discovered that as 2009 wore on, scareware peddlers dramatically increased both the number of unique strains of malware designed to install fake anti-virus as well as the frequency with which they deployed hacked or malicious sites set up to force the software on visitors.

Fake anti-virus attacks use misleading pop-ups and videos to scare users into thinking their computers are infected and offer a free download to scan for malware. [...] Worse still, fake anti-virus programs frequently are bundled with other malware. What’s more, victims end up handing their credit or debit card information over to the people most likely to defraud them.

Now can we agree that "anti-virus" programs are a bad idea?

|< First   < Previous   11–20 (81)   Next >   Last >|