Do NOT follow this link or you will be banned from the site!
talk
Share it now!
Windows 11 - privacy exploits
Submitted by thedosmann on Sun, 11/27/2022 - 00:23Windows 11 review and insights on privacy exploits.
Share it now!
Dr. Fauci and UNESCO
Submitted by thedosmann on Thu, 09/09/2021 - 23:15UNESCO is a part of the United Nations with the ability and connections to kickstart nations or send nations into oblivion.
Share it now!
THE LOST ART OF CUSTOMER SERVICE
Submitted by thedosmann on Wed, 02/24/2021 - 03:01Today, there is little attention paid to customer service. The luster of customer service is dimmed by poor attitudes and a lack of genuine concern.
Share it now!
ZombieLoad - A new but not so new threat
Submitted by thedosmann on Wed, 07/31/2019 - 13:52The latest threat to computers is the Zombieload vulnerability.
So many of the known threats to computer devices are because of how the software or hardware was created. The exploits and vulnerabilities we discover are flaws in how the system or code was constructed. Is it possible that we just didn’t have the tools we needed to test for security flaws?
Share it now!
Confirming that which was expected
Submitted by thedosmann on Mon, 11/26/2018 - 19:01In programming code it is possible to theorize about several aspects of code flow and dependency through coding models. One such model is the Actor Model.
Share it now!
Facebook and Bad Ads
Submitted by thedosmann on Mon, 01/18/2016 - 16:27Deceitful scam ads are being presented on Facebook daily and the social/media giant is doing little to stem the trend toward deceit in advertising on the internet and their sponsored feeds.
Share it now!
We need more programming languages
Submitted by thedosmann on Wed, 09/30/2015 - 23:11By making programming languages less difficult to work with you increase the number of people writing programs and successively increase the number and variety of programs available.
Share it now!
Understanding The Semantic In Semantic Web
Submitted by thedosmann on Tue, 09/01/2015 - 20:23In a previous article I describe how, in order to have a true Semantic Web, we would need to have a user action to direct the program. I would like to examine some of the motivations for this point of view.
Share it now!
Is online banking safe?
Submitted by thedosmann on Sun, 08/02/2015 - 17:48Online banking continues to be an increasing method of choice for conducting business and paying bills. According to a recent Pew report, fifty-one percent of U.S. adults, or 61% of internet users, bank online. Is online banking safe?
Share it now!
jQuery, Touch, and Hammer
Submitted by thedosmann on Sat, 07/04/2015 - 02:14The original concept was for the system to display a number of images on a tabbed-page HTML layout. Each tab/page of images needed to be centered and allow a user to touch a thumbnail to bring up larger rendering of that image.
Share it now!
FLUFF - Forwarding Links Using Factual Facades
Submitted by thedosmann on Sat, 06/06/2015 - 13:28Most search engines do an adequate job at sorting out some of these FLUFF sites but they still somehow show up in search results. Maybe what we need in the search engine tools arsenal is a FLUFF filter.
Share it now!
A Look Into The Not Too Distant Future
Submitted by thedosmann on Sun, 05/10/2015 - 13:14Within the next few years, we will see an exponential growth in micro touch screen devices that can be unfolded from 3x6 to 12x6 (and other sizes) to form a touch screen. These devices will have no hard drive, no CD/DVD, no memory other than an ultra-thin EPROM, and no external ports.
Share it now!
SpongeBob and the Semantic Web
Submitted by thedosmann on Wed, 04/15/2015 - 17:52When talking about the Semantic Web there are a few premises one must acknowledge. One premise is that any data exchange on the internet is originally initiated by a human. There is no information retrieval without a request for that information and that request can be directly tied to a human request for the information.
Share it now!
Twitter is fighting back
Submitted by thedosmann on Wed, 03/04/2015 - 21:41Twitter is fighting back against cyber-crime and malicious activity in its recent actions toward Tor users and Isis.
Share it now!
The ghosts of bugs past
Submitted by thedosmann on Fri, 02/06/2015 - 14:16A critical vulnerability in glibc, a core Linux library, can be exploited remotely through PHP applications.
Share it now!
A look at the Sony Hack
Submitted by thedosmann on Wed, 12/17/2014 - 20:26As the Sony hack investigation unfolds, revelations regarding its possible origin, type of hack used, and the damage it is purported to have caused, are starting to be revealed.
Share it now!
Is Virtual Reality dead?
Submitted by thedosmann on Sun, 09/21/2014 - 13:58VR (Virtual Reality) is not a new concept and it has seen its share of failures and even long spans of time in virtual limbo. The idea and reality of VR have, for some time, been separated by a chasm of ergonomics, hardware requirements, and consumer acceptance.
Share it now!
Another reason NOT to click
Submitted by thedosmann on Thu, 07/24/2014 - 20:54Coinciding with the cascading avalanche of information on the disaster of Flight MH17, there is an influx of malware, false stories, and spam, permeating the internet.
Share it now!
Geo-targeted IP and DDoS
Submitted by thedosmann on Mon, 06/09/2014 - 11:10Detecting spoofed Ips and geo-targeting. A national infrastructure like this would also expose ISPs and routes that allow non-network IPs to originate from their network.
Share it now!
Buzzwords can be a Buzz Kill- Republished
Submitted by thedosmann on Mon, 05/26/2014 - 08:00In computing , and life in general, we find ourselves often hearing new phrases that tend to evoke certain connotations. These Buzzwords are generally created for the benefit of marketing and brand recognition but can also be used to label campaigns or causes. The creation of Buzzwords have become so prolific that there are even games devoted to it.
Share it now!
Is Open Source to blame?
Submitted by thedosmann on Sun, 04/27/2014 - 20:29The black market of hacking programs and routines are born out of a programming community of sharing and cooperation. Additionally, the struggle for internet security is set against mass marketing, mass distribution, and mass code refinement, which grows and spreads through open source creation and manipulation of various programs and scripts.
Share it now!
SDLC - The magic elixir?
Submitted by thedosmann on Tue, 03/04/2014 - 14:01A term, which you may have heard of, in the IT arena that is gaining a lot of momentum, is SDLC, Systems development life-cycle. Like many other IT terms its use is more of a vernacular acronym in the IT community then a pragmatic approach to system's development.
Share it now!
Was Target Security Asleep?
Submitted by thedosmann on Sun, 01/19/2014 - 12:18The news buzz about the latest, large scale, cyber-attack generates more questions than answers. According to the latest reports on the attack at Target, and other retailers, the attack originated from a teenage hacker in Russia.
Share it now!
Yahoo Ad Malware Attack
Submitted by thedosmann on Tue, 01/07/2014 - 15:09According to the latest news reports an attack on one of Yahoo's Ad servers perpetuated a large scale malware infestation across user's computers of the popular search engine and the breech seems to point to flaws in the java code used on the servers.
Share it now!
Programmer salary on the rise
Submitted by thedosmann on Thu, 11/28/2013 - 20:19In an increasingly technical world that depends on well written programs to run multi-million dollar infrastructures and global financial concerns, it is no surprise that programmers are in high demand.
Share it now!
MWP Has a new look!
Submitted by thedosmann on Sun, 11/10/2013 - 19:13I've been working for a few weeks now to republish Memphis Web Programming with a new look and feel. Here are some of the changes:
Share it now!
Obamacare Site- A new punchline?
Submitted by thedosmann on Tue, 10/29/2013 - 11:48healthcare.gov - Well, it's pretty bad. After several hours of going through the initial registration and validation steps I got to a dead end at the point where I was supposed to be presented with my insurance options and costs.
Share it now!
Ember.js -A great JS Framework
Submitted by thedosmann on Mon, 09/09/2013 - 12:11Ember.js offers a good framework for JSON and JQuery in a fairly slick MVC with a good VIEWS API binding that will eliminate a lot of the grunt work of building JS applications.
Share it now!
Mobile-connected devices will exceed the world's population in 2013
Submitted by thedosmann on Wed, 08/14/2013 - 14:03Cisco report says the number of smartphones, tablets, laptops and internet-capable phones will exceed the number of humans in 2013. One can only imagine the power if an individual or group had control over a portion of those devices.
Share it now!
Quantum Dawn 2
Submitted by thedosmann on Fri, 07/19/2013 - 12:47By observing Newton's law we can conclude that the efforts of the quantum dawn tests and the other security risk assessments undertaken across internet connected sites have been significant but have not yet matched the effort of the attackers.
Share it now!
Justin Carter- A victim of our times?
Submitted by thedosmann on Wed, 07/03/2013 - 21:55Justin Carter - published content on the internet can echo forever and those listening may just misunderstand your message.
Share it now!
Should APIs be copy protected
Submitted by thedosmann on Wed, 06/26/2013 - 22:05If an API becomes a way for developers to strengthen their bank account the result will be a weaker Internet and a strong stumbling block to the future of software development.
Share it now!
Has the US done enough to combat malicious websites?
Submitted by thedosmann on Fri, 05/31/2013 - 18:38It may be time for the Government to take more of a role in protecting its citizens, businesses, and institutions, from attacks by cyber-criminals and terrorists.
Sign the petition for the creation of a Department of Defense agency to combat malicious websites, website hacking, and to increase general computer security across the internet. http://wh.gov/lqvr8
Share it now!
What you publish on the web stays on the web
Submitted by thedosmann on Tue, 05/14/2013 - 12:09With photos or digital pictures a huge security step disappears out of the equation the moment it processes and displays on your screen.
Share it now!
The First Web Site
Submitted by thedosmann on Tue, 04/30/2013 - 15:49In 1993 I was telneting to BBSs using a 14.4 modem. There were all types of BBS connection hubs covering a broad array of subject matter and discussion groups. But 20 years ago today the first Web Site was brought online and we were introduced to browsers and the World Wide Web. To learn more about this time in history visit the first web site project page.
Share it now!
Fighting DDoS with Virtualization
Submitted by thedosmann on Fri, 04/19/2013 - 21:46The success of DDoS attacks depends on the filtering done on the client zombies. It is this filtering that we can take advantage of and exploit. If the BOT net cannot connect to the target then it can't flood it with requests.
Share it now!
Strange Code Signal Discovered in Curiosity's Video Feed
Submitted by thedosmann on Wed, 03/27/2013 - 15:04"A video that was sent back by Curiosity on Feb 28, 2013 is being examined because of an anomaly found in the signal by engineers. It seems to be a structured algorithm that is not consistent with video streams we have been analyzing."
Share it now!
Behind the 8 ball with Windows 8
Submitted by thedosmann on Sat, 02/16/2013 - 14:38Microsoft may have inadvertently slowed the inevitable progress of the general public in adapting to, and the eventual acceptance of, the advancement of information technology utilization.
Share it now!
Buying from China Part 2 of 2
Submitted by thedosmann on Thu, 02/07/2013 - 11:37Most of the information I'm about to go over is available from a number of sources on the Internet but this article may help anyone navigating the often contradictory information you will encounter in doing research on buying from China.
Share it now!
The Latest On Java And Oracle's Response To Exploits
Submitted by thedosmann on Fri, 02/01/2013 - 13:00It is with great trepidation that one will venture to use Java in a browser environment. Currently little to no comforting actions are coming from Oracle and to make matters worse the effort put forth by the software giant so far leaves one in the dark concerning security improvements.
Share it now!
Buying from China Part 1 of 2
Submitted by thedosmann on Wed, 01/30/2013 - 22:02During my journey I noticed a number of units from China that not only seemed to match my product concept but also offered a significant savings.
Share it now!
50 Shades of Code
Submitted by thedosmann on Sun, 01/20/2013 - 09:44Give me any programming task or project and I'll show you 50 ways to program it.
Share it now!
Java Exploit- Again
Submitted by thedosmann on Sat, 01/12/2013 - 07:43"The problem can allow an untrusted Java applet to escalate its privileges, without requiring code signing. Oracle Java 7 update 10 and earlier are affected, US-CERT said.
Share it now!
Is There Any Body Out There?
Submitted by thedosmann on Mon, 12/24/2012 - 13:25How a computer works is a 4 part look into how computers work. If that information is contextually and semantically received universally then the circle will be complete. What if we discover that the most universally accepted language is machine code.
Share it now!
Pimping Gimp
Submitted by thedosmann on Tue, 12/18/2012 - 15:20Have i mentioned that Gimp is an awesome image program? If not, then let me take this opportunity to do so.
I started using Gimp 7 years ago and I'm still learning new features and ways to use Gimp. Recently, on a project, I was tasked with creating large, enhanced photo images. When I say large, some of these images are 10 megabytes. The significant size was required because the images had to be able to be viewed at almost 3 feet in length and remain sharp and clear.
Share it now!
How a Computer Works Part 3
Submitted by thedosmann on Sun, 11/25/2012 - 15:36How a computer works is a 4 part look into how computers work. All data in a computer is electronic. What you see on the screen or what is printed or even the sounds you hear are all electronic responses to electronic input.
Share it now!
How a Computer Works Part 2
Submitted by thedosmann on Wed, 11/14/2012 - 22:04How a computer works is a 4 part look into how computers work. We can imagine the CPU, Central Processing Unit, as a master Conductor orchestrating a symphony of instruments in a myriad of frequencies that produces a collective energy critically tuned to a specific flow of musical notes.
Share it now!
How a Computer Works Part 1
Submitted by thedosmann on Wed, 10/31/2012 - 11:39How a computer works is a 4 part look into how computers work. In its most pure definition a computer is any device or object that receives information in and then will present an output based on that information.
Share it now!
Buzzwords can be a Buzz Kill
Submitted by thedosmann on Tue, 09/25/2012 - 17:39Buzzwords are great for marketing and brand recognition or to get the masses all-a-buzz with the latest "makes it sound good" phrase but it has no place in defining what a software package can or can't do.
Share it now!
Templates And Automation
Submitted by thedosmann on Thu, 08/30/2012 - 13:25A coding template is a design that has replaceable or re-definable parts that when changed does not effect overall structure. In programming, and in computers generally, there are numerous duplications. There are events, checks, layouts, and other parts of computing that do not change. These parts are often put into templates that allow for differing outputs while maintaining the same general methods to accomplish the code or program execution.
Share it now!
Microsoft Is Sharing
Submitted by thedosmann on Wed, 08/22/2012 - 13:55As if programmers didn't have enough to be leery of the new Microsoft openness approach is quite unsettling. Just when we were positive and secure in the belief that MS would be the last kid on the block to share, they create Microsoft Open Technologies, Inc.
Share it now!
Closure Compiler For javascript
Submitted by thedosmann on Wed, 08/08/2012 - 14:11The folks over at Google have hit another winner.If you have'nt been introduced to Google's Closure Compiler you missing out on a great tool.To put it in Google's own words:
Share it now!
Troubleshooting Programming Code
Submitted by thedosmann on Sat, 07/28/2012 - 16:57When troubleshooting code I try to follow a set path in order to quickly isolate the issue. The problem is that I’m just as guilty as others at trying to shortcut the process. One major trap I fall into is the time consuming ‘wandering’ into certain parts of the code and encountering a road block by not staying on the original path. In doing this I often end up chasing problems that are caused by other problems that need to be addressed first. With that being said I have developed a good instinct for finding problem code.
Share it now!
Semantic Web - Action Speaks Louder Than Words
Submitted by thedosmann on Wed, 06/27/2012 - 14:18"The Semantic Web provides a common framework that allows data to be shared and reused across application, enterprise, and community boundaries. It is a collaborative effort led by W3C with participation from a large number of researchers and industrial partners.
Share it now!
Block Foreign IP Addresses?
Submitted by thedosmann on Thu, 06/21/2012 - 13:52I admit I have considered this same thing. I had even prepared my IP tables and firewalls to cut off all but regional IP traffic. I never implemented it but I was close. In hindsight I realize it was just a knee-jerk response to constant kicks at my server door.
Share it now!
Computer User License Being Considered
Submitted by thedosmann on Sat, 06/16/2012 - 15:24A proposal is being considered that would require all users of computers, smart phone devices, and other internet connected devices, to obtain a license. As is, the proposal would require those users to pass a test and be licensed in order to own and operate such equipment. The licensing process would involve a written test and a practical exam.
Share it now!
Only disclose to the highest bidder
Submitted by thedosmann on Mon, 06/11/2012 - 19:56Lately there has been a lot of buzz about 'Do Not Track'. For those that don't know, Do not Track or DNT is a little message your browser tells each website before it starts loading on your computer screen.
Share it now!
Who will deliver the rich web content on mobile devices?
Submitted by thedosmann on Fri, 06/08/2012 - 18:46In the evolution of mobile technology internet connectivity has had a roller coaster ride. Not just the actual connecting but the browsing and searching for information. Over the years I’ve noticed a tug-a-war going on between those creating internet sites that are mobile friendly and mobile OS’s trying to render content and deliver internet browsing in a mobile format.
Share it now!
Web Programming Is A Group Effort
Submitted by thedosmann on Tue, 06/05/2012 - 11:47Web programming can be both exciting and foreboding at the same time. Most programmers spend their time chasing bugs in other code and platforms while tying together newly created code with existing code content. While it is good to be excellent in one particular thing, often, in programming you have to work with and consider several platforms to integrate what you’re doing.
Share it now!