Here's a fine idea about what to do with those old, but still functional, computer systems you have in your garage:
"Follow along now as I describe the basics of installing Slackware 3.5 on one of them. You will find that the network installation of Linux doesn't differ greatly from a standard installation that uses a local CD-ROM, and you will find that it meets our twin criteria of Cheap and Easy. Cheap, because it eliminates redundant hardware. As for Easy, well, keep reading and find out for yourself."
Source: Computer User
A group of vigilante hackers said it has identified the leader of a rival Pakistani hacking group and has turned the information over to the FBI.
Members of Yihat, an international coalition of hackers attempting to disrupt terrorist computer networks, said they have discovered the real name and contact information for the co-founder of GForce Pakistan.
Source: CNet Malaysia
L33tdawg: Did I ever tell you guys about the time biatch0, myself and a gang of friends sat around in a restaurant and attempted to access pron via a Compaq iPaq connected via an IR enabled handphone? Well, let's just say it wasn't exactly a 'broadband experience'. :)
3G-licence holder Hutchison 3G said on Monday that it was looking into the issue of adult services being available through its 3G devices.
A recurring argument in the computer security world is that clamping down on the dissemination of information about vulnerabilities, and tools that exploit them, will mitigate everyone's risk. Last week, one proponent of this argument, Scott Culp, manager of Microsoft's security response center, coined the term "information anarchy" to describe the current situation, comparing it with yelling "fire" in a crowded movie house.