I am now on the go to move Kadosu to launchpad.net. See any progress here. Enjoy it!
Month: September 2008
Stop Software Patents World Day, September 24th
Bruce Schneier: Are photographers really a threat? | Technology | The Guardian
CTV124 Tron – Chaosradio Podcast Network
Schneier on Security: UK Ministry of Defense Loses Memory Stick with Military Secrets
digi images – Alter Mann von Schmier
Illegale Überwachung im Justizzentrum Magdeburg | Halle-Forum.de | Online-Zeitung aus Halle Saale
CTV084 Citizen Cam – Chaosradio Podcast Network
CTV089 Binary marble adding machine – Chaosradio Podcast Network
CTV094 Tennis for Two – Chaosradio Podcast Network
CTV095 Softwaretausch bei einem Wahlcomputer in 60 Sekunden – Chaosradio Podcast Network
CTV099 Der Wahlstift-Hack Zweiter Streich – Chaosradio Podcast Network
CTV101 Überwachung und ihre Gefahren für die Gesellschaft – Chaosradio Podcast Network
CTV102 Digitalisierung und ihre Gefahren für die Gesellschaft – Chaosradio Podcast Network
CTV106 Wir sind alle Terroristen – Chaosradio Podcast Network
CTV125 Nieder mit I.T. – Chaosradio Podcast Network
CCC | Finanzämter weisen Personenkennziffer zu
Stoppt die Vorratsdatenspeicherung – Aufruf zur Demo “Freiheit statt Angst 2008”
WELT DEBATTE – Weblogs – Apocalypso – Nicht mal ein Rauchverbot kriegen wir hin
Open Source Days 2008: Forside
VIA releases open source Xorg driver
Harald Welte’s blog
VIA releases open source Xorg driver
Triggering Commands On File/Directory Changes With Incron | HowtoForge – Linux Howtos and Tutorials
The last burst of checkins has brought Tux3 to the pointer where it undeniably acts like a filesystem: one can write files, go away, come back later and read those files by name. We can see some of the hoped for attractiveness starting to emerge: Tux3 clearly does scale from the very small to the very big at the same time. We have our Exabyte file with 4K blocksize and we can also create 64 Petabyte files using 256 byte blocks. How cool is that? Not much chance for internal fragmentation with 256 byte blocks.
— Daniel Phillips
“real man” programmers stare at the code in Zen contemplation and debug by powercycling – thats one thing even hard RT processes can’t beat.
Alan Cox
Find SQL injection vulnerabilities with sqlmap [LWN.net]
The Kernel Hacker’s Bookshelf: UNIX Internals [LWN.net]
Cryptology ePrint Archive
Cryptology ePrint Archive
Cube Attacks on Tweakable Black Box Polynomials
You must be logged in to post a comment.