Science and Technology

Facebook Twitter

Real World Haskell. Hackers see the cloud as ripe territory. Is the cloud a hacker's paradise?

Hackers see the cloud as ripe territory

A survey at last month's Defcon hacking conference paints that picture. Sponsored by security vendor Fortify Software, the survey asked 100 hackers who attended Defcon about security in the cloud. A sizable 96 percent said they believe the cloud opens up more hacking opportunities, while 89 percent said cloud vendors aren't doing enough to address cybersecurity issues. Download Linked Notes: Free Personal Wiki Software. I have felt a need for this kind of software since a long time, and finally found it today.

Download Linked Notes: Free Personal Wiki Software

Linked Notes is a Free Personal Wiki Software.What that means is that you can organize your notes in form of a wiki, so that you can easily manage them. Consider Linked Notes as a wiki style notepad for your computer. When you add a new page, it is added to a tree like structure on the left side. The tree can be organized in a hierarchical order. This makes it very easy to navigate through notes, and have them properly managed.

Scientific Studies

Applications. Wired. A Protein Killer Could Treat All Cancers, and Possibly All Illnesses. By Corey Binns Posted 08.23.2010 at 10:21 am Choking a Tumor MRI scans show that blood flow [red] decreases in liver tumors after ALN-VSP therapy, which stops cancer cells from making proteins that form blood vessels. Courtesy ALNYLAM Since last April, 19 cancer patients whose liver tumors hadn’t responded to chemotherapy have taken an experimental drug.

Within weeks of the first dose, it appeared to work, by preventing tumors from making proteins they need to survive. Learn Ethical Hacking Tools Free Hacking Tricks How To Hack Hacking Passwords & Email Hacking. Google Hacking: Ten Simple Security Searches That Work. Google has become the de facto standard in the search arena.

Google Hacking: Ten Simple Security Searches That Work

It’s easy, quick and powerful. For those same reasons that the general user has gravitated to Google, so have the hackers. And as we all know, if the hackers do Google Hacking, the security professionals need to utilize it as well. And it doesn’t hurt to have Johnny Long (with help from Ed Skoudis) showing you the ropes.

Software News