TwoFactorAuth Lists All the Sites with Two-Factor Authentication

Two-factor authentication is critical for protecting your online accounts, but sadly, not every site supports it (even, shockingly, many banks ). TwoFactorAuth.org is a new site that all the sites that do or do not support two-factor authentication. Read more…        

More here:
TwoFactorAuth Lists All the Sites with Two-Factor Authentication

Java 8 Officially Released

darthcamaro writes “Oracle today officially released Java 8, nearly two years after Java 7, and after much delay. The new release includes a number of critical new features, including Lambda expressions and the new Nashorn JavaScript engine. Java 8, however, is still missing at least one critical piece that Java developers have been asking for, for years. ‘It’s a pity that some of the features like Jigsaw were dropped as modularity, runtime dependencies and interoperability are still a huge problem in Java, ‘ James Donelan, vice president of engineering at MuleSoft said. ‘In fact this is the one area where I still think Java has a long way to go.'” Read more of this story at Slashdot.

View article:
Java 8 Officially Released

43,000-Year-Old Woolly Mammoth Remains Offer Strong Chance of Cloning

EwanPalmer sends a followup to a story from last year about a team of Siberian scientists who recovered an ancient wooly mammoth carcass. It was originally believed to be about 10, 000 years old, but subsequent tests showed the animal died over 43, 000 years ago. The scientists have been surprised by how well preserved the soft tissues were. They say it’s in better shape than a human body buried for six months. “The tissue cut clearly shows blood vessels with strong walls. Inside the vessels there is haemolysed blood, where for the first time we have found erythrocytes. Muscle and adipose tissues are well preserved.” The mammoth’s intestines contain vegetation from its last meal, and they have the liver as well. The scientists are optimistic that they’ll be able to find high quality DNA from the mammoth, and perhaps even living cells. They now say there’s a “high chance” that data would allow them to clone the mammoth. Read more of this story at Slashdot.

See more here:
43,000-Year-Old Woolly Mammoth Remains Offer Strong Chance of Cloning

The Always Up-to-Date Guide to Building a Hackintosh (OS X 10.9.2)

Building a hackintosh—that is, installing Mac OS X on non-Apple hardware—used to require extremely restricted hardware choices and quite a bit of know-how. Now your options are vast and the installation process is fairly simple. With that in mind, here is our always up-to-date guide to building a hackintosh that will walk you through purchasing compatible parts, building your machine, and installing OS X all on your own. Read more…        

View the original here:
The Always Up-to-Date Guide to Building a Hackintosh (OS X 10.9.2)

The Non-Jailbreakers Guide to Emulation on iOS

Technically speaking, you’re not supposed tone able to install emulators on an iPhone to play classic games. But that doesn’t mean it’s not possible. Here’s how to install emulators on any iOS device, no jailbreak required. Read more…        

See original article:
The Non-Jailbreakers Guide to Emulation on iOS

Blogger Fined €3,000 for ‘Publicizing’ Files Found Through Google Search

mpicpp points out an article detailing the case of French blogger Olivier Laurelli, who had the misfortune to click links from search results. Laurelli stumbled upon a public link leading to documents from the French National Agency for Food Safety, Environment, and Labor. He downloaded them — over 7 Gb worth — and looked through them, eventually publishing a few slides to his website. When one of France’s intelligence agencies found out, they took Laurelli into custody and indicted him, referring to him as a ‘hacker.’ In their own investigation, they said, “we then found that it was sufficient to have the full URL to access to the resource on the extranet in order to bypass the authentication rules on this server.” The first court acquitted Laurelli of the charges against him. An appeals court affirmed part of the decision, but convicted him of “theft of documents and fraudulent retention of information.” He was fined €3, 000 (about $4, 000). Read more of this story at Slashdot.

See more here:
Blogger Fined €3,000 for ‘Publicizing’ Files Found Through Google Search

Godot Game Engine Released Under MIT License

goruka writes with news that a new game engine has been made available to Free Software developers under the permissive MIT license “Godot is a fully featured, open source, MIT licensed, game engine. It focuses on having great tools, and a visual oriented workflow that can deploy to PC, Mobile and Web platforms with no hassle. The editor, language and APIs are feature rich, yet simple to learn. Godot was born as an in-house engine, and was used to publish several work-for-hire commercial titles. With more than half a million lines of code, Godot is one of the most complex Open Source game engines at the moment, and one of the largest commitments to open source software in recent years. It allows developers to make games under Linux (and other unix variants), Windows and OSX.” The source is available via Github, and, according to Phoronix, it’s about as featureful as the Unity engine. Read more of this story at Slashdot.

Read more here:
Godot Game Engine Released Under MIT License

Windows Replacement? ReactOS 0.3.16 Gets Themes, CSRSS Rewrite, and More

jeditobe writes with this announcement from the ReactOS home page: “The ReactOS Project is pleased to announce the release of version 0.3.16. A little under a year has passed since the previous release and a significant amount of progress has been made. More than 400 bugs were eliminated. Some of the most significant include completion of the CSRSS rewrite and the first stages of a shell32 rewrite. 0.3.16 is in many ways a prelude to several new features that will provide a noticeable enhancement to user visible functionality. A preview can be seen in the form of theme support, which while disabled by default can be turned on to demonstrate the Lautus theme developed by community member Maciej Janiszewki. Another user visible change is a new network card driver for the RTL8139, allowing ReactOS to support newer versions of QEMU out of the box.” You can download release images here. Want to see how it handles Windows software? Here are demos of Office 2003, Photoshop CS2, and OpenMPT. Read more of this story at Slashdot.

Original post:
Windows Replacement? ReactOS 0.3.16 Gets Themes, CSRSS Rewrite, and More

Fire Destroys Iron Mountain Data Warehouse, Argentina’s Bank Records Lost

cagraham writes “A fire at Iron Mountain’s data warehouse in Buenos Aires left the facility ‘ruined’ and killed nine first-responders, according to the Washington Post. The origin of the fire is unknown. The facility was supposedly equipped with sprinkler systems, fire control systems, and had a private emergency team on standby. Among the records destroyed are Argentina’s bank archives, the loss of which could have some surprisingly far-reaching implications.” Read more of this story at Slashdot.

Read the original:
Fire Destroys Iron Mountain Data Warehouse, Argentina’s Bank Records Lost

Scientists Detect Two Dozen Computers Trying To Sabotage Tor Privacy Network

New submitter fynbar writes “Computer scientists have identified almost two dozen computers that were actively working to sabotage the Tor privacy network by carrying out attacks that can degrade encrypted connections between end users and the websites or servers they visit (PDF). ‘Two of the 25 servers appeared to redirect traffic when end users attempted to visit pornography sites, leading the researchers to suspect they were carrying out censorship regimes required by the countries in which they operated. A third server suffered from what researchers said was a configuration error in the OpenDNS server. The remainder carried out so-called man-in-the-middle (MitM) attacks designed to degrade encrypted Web or SSH traffic to plaintext traffic. The servers did this by using the well-known sslstrip attack designed by researcher Moxie Marlinspike or another common MitM technique that converts unreadable HTTPS traffic into plaintext HTTP.'” Read more of this story at Slashdot.

Read the original:
Scientists Detect Two Dozen Computers Trying To Sabotage Tor Privacy Network