Wednesday, September 27, 2006
Tuesday, September 12, 2006
Thursday, September 07, 2006
Tuesday, August 29, 2006
Monday, July 17, 2006
Red thread factsheet
Red thread factsheet: "RED THREAD ON TURFGRASS"
Red thread occurs in the spring and fall during humid periods when the air temperatures are between 16°C and 24°C (60°F and 75°F). The disease is especially severe on slow-growing nitrogen-deficient turf. Bluegrasses (Poa sp.), fescues (Festuca sp.), ryegrasses (Lolium sp.), and bentgrasses (Agrostis sp.) can be affected. Fine-leaved fescues and some ryegrasses are particularly susceptible.
Red thread occurs in the spring and fall during humid periods when the air temperatures are between 16°C and 24°C (60°F and 75°F). The disease is especially severe on slow-growing nitrogen-deficient turf. Bluegrasses (Poa sp.), fescues (Festuca sp.), ryegrasses (Lolium sp.), and bentgrasses (Agrostis sp.) can be affected. Fine-leaved fescues and some ryegrasses are particularly susceptible.
Wednesday, July 05, 2006
Jameser's Tech Tips: Tip #6: Recovering Deleted Files
Today's tip is on recovering deleted files from your hard drive... Accidentally deleting files is something we all try to avoid, but it can happen on occasion...
Jameser's Tech Tips: Tip #6: Recovering Deleted Files
Jameser's Tech Tips: Tip #6: Recovering Deleted Files
Wednesday, June 14, 2006
Gmail - Nmap 4.10 Released
Hello everyone,
I am pleased to announce the release of Nmap 4.10. The 10 Google SoC students are hard at work and have already produced some interesting patches. And I'm itching to make some big changes as well. So I decided to produce a release before destabalizing the tree with all of this development work. Especially since 4.10 includes many important changes that deserve to go out ASAP. For example, we have integrated all of your version detection submissions (about a thousand) for Q1, bringing the DB up to 3,441 signatures representing 401 protocols! The output format has been changed a bit to allow multiple ignored port states. So if you scan a machine with thousands of ports in both the filtered and closed states, your terminal will no longer be flooded with pages of output. Meanwhile the ICMP rate limit detection algorithms have been tweaked for better performance. Oh, and we're putting out a call for ASCII artists. ./configure for details. Read on for dozens of other changes.
As always, Nmap is available from:
http://www.insecure.org/nmap/download.html
Gmail - Nmap 4.10 Released
I am pleased to announce the release of Nmap 4.10. The 10 Google SoC students are hard at work and have already produced some interesting patches. And I'm itching to make some big changes as well. So I decided to produce a release before destabalizing the tree with all of this development work. Especially since 4.10 includes many important changes that deserve to go out ASAP. For example, we have integrated all of your version detection submissions (about a thousand) for Q1, bringing the DB up to 3,441 signatures representing 401 protocols! The output format has been changed a bit to allow multiple ignored port states. So if you scan a machine with thousands of ports in both the filtered and closed states, your terminal will no longer be flooded with pages of output. Meanwhile the ICMP rate limit detection algorithms have been tweaked for better performance. Oh, and we're putting out a call for ASCII artists. ./configure for details. Read on for dozens of other changes.
As always, Nmap is available from:
http://www.insecure.org/nmap/download.html
Gmail - Nmap 4.10 Released
Tuesday, June 06, 2006
Hack Attack: Turn your $60 router into a $600 router - Lifehacker
Of all the great DIY projects at this year’s Maker Faire, the one project that really caught my eye involved converting a regular old $60 router into a powerful, highly configurable $600 router. The router has an interesting history, but all you really need to know is that the special sauce lies in embedding Linux in your router. I found this project especially attractive because: 1) It’s easy, and 2) it’s totally free.
Hack Attack: Turn your $60 router into a $600 router - Lifehacker
Hack Attack: Turn your $60 router into a $600 router - Lifehacker
Inside the Linux boot process
The process of booting a Linux® system consists of a number of stages. But whether you're booting a standard x86 desktop or a deeply embedded PowerPC® target, much of the flow is surprisingly similar. This article explores the Linux boot process from the initial bootstrap to the start of the first user-space application. Along the way, you'll learn about various other boot-related topics such as the boot loaders, kernel decompression, the initial RAM disk, and other elements of Linux boot.
Inside the Linux boot process
Inside the Linux boot process
Wednesday, May 31, 2006
Schneier on Security: Data Mining Software from IBM
In the long term, corporate data mining efforts are more of a privacy risk than government data mining efforts. And here's an off-the-shelf product from IBM:
IBM Entity Analytic Solutions (EAS) is unique identity disambiguation software that provides public sector organizations or commercial enterprises with the ability to recognize and mitigate the incidence of fraud, threat and risk. This IBM EAS offering provides insight on demand, and in context, on "who is who," "who knows who," and "anonymously."
Schneier on Security: Data Mining Software from IBM
IBM Entity Analytic Solutions (EAS) is unique identity disambiguation software that provides public sector organizations or commercial enterprises with the ability to recognize and mitigate the incidence of fraud, threat and risk. This IBM EAS offering provides insight on demand, and in context, on "who is who," "who knows who," and "anonymously."
Schneier on Security: Data Mining Software from IBM
Subscribe to:
Posts (Atom)