Skip to main content

Software-Programming

8 hacks to make Firefox ridiculously fast

posted onJuly 28, 2009
by hitbsecnews

Firefox has been outperforming IE in every department for years, and version 3 is speedier than ever.

But tweak the right settings and you could make it faster still, more than doubling your speed in some situations, all for about five minutes work and for the cost of precisely nothing at all. Here's what you need to do.

Unix turns 40: The past, present and future of the OS

posted onJuly 28, 2009
by hitbsecnews

Forty years ago this summer, a programmer sat down and knocked out in one month what would become one of the most important pieces of software ever created.

In August 1969, Ken Thompson, a programmer at AT&T Bell Laboratories, saw the monthlong absence of his wife and young son as an opportunity to put his ideas for a new operating system into practice. He wrote the first version of Unix in assembly language for a wimpy Digital Equipment Corp. PDP-7 minicomputer, spending one week each on the operating system, a shell, an editor and an assembler.

Report Examines Static Source Code Analyzers

posted onJuly 23, 2009
by hitbsecnews

Static analyzers try to find weaknesses in other programs that could be triggered accidentally or exploited by intruders. A report from the National Institute of Standards and Technology (NIST) entitled Static Analysis Tool Exposition (SATE), edited by Vadim Okun, Romain Gaucher, and Paul Black, documents NIST's Static Analysis Tool Exposition -- an exercise by NIST and static analyzer vendors to improve the performance of these tools.

Researchers Create Database-Hadoop Hybrid

posted onJuly 21, 2009
by hitbsecnews

Yale computer science professor Daniel Abadi and his students Azza Abouzeid and Kamil Bajda-Pawlikowski have announced the release of HadoopDB - an open source stack that includes PostgreSQL, Hadoop, and Hive, along with some glue between PostgreSQL and Hadoop, a catalog, a data loader, and an interface that accepts queries in MapReduce or SQL and generates query plans that are processed partly in Hadoop and partly in different PostgreSQL instances spread across many nodes in a shared-nothing cluster of machines.

Adobe doles out bug-filled PDF Reader to users

posted onJuly 20, 2009
by hitbsecnews

Adobe delivers an out-of-date version of Reader to users who download the popular application from its Web site, a security company warned today.

The edition Adobe currently offers includes at least 14 security vulnerabilities that have been patched by the company in the last two months.

Yahoo widgets for the social networker

posted onJuly 16, 2009
by hitbsecnews

Yahoo widgets are designed to bridge the gap between the Web and your desktop. After you search through the company's listing of widgets and find what you like, you can download them onto your desktop.

But what if you're a social-networking fanatic? Certainly, being on the Web works fine for you, but Yahoo widgets might make it just a little easier to satisfy your desire to stay connected. Here are some Yahoo widgets that help you network with your friends right on your desktop.

Nmap Security Scanner Version 5.00 Released

posted onJuly 16, 2009
by hitbsecnews

Insecure.Org is pleased to announce the immediate, free availability of the Nmap Security Scanner version 5.00 from http://nmap.org/. This is the first stable release since 4.76 (last September), and the first major release since the 4.50 release in 2007. Dozens of development releases led up to this.

Considering all the changes, we consider this the most important Nmap release since 1997, and we recommend that all current users upgrade.

Developers Create Unofficial Find My iPhone API

posted onJuly 16, 2009
by hitbsecnews

The iPhone is correctly credited with bringing location services to the consumer. It started at launch with Google Maps. It kicked into hyper-drive with the launch of the App Store (there are now over 2800 location-enabled apps). However, there is still a step to go, the iPhone needs the ability to share your location in the background to a third-party server. This has been done for them by a couple of hackers.