An IT article is publicizing a remote hole in Microsoft Internet Explorer that can be allegedly used to execute arbitrary code. The latest virus definition update for McAfee VirusScan prevents the proof of concept page at computerterrorism.com from executing the payload right after Internet Explorer crashes, but systems without third-party security products may be vulnerable. […]
My interest in contributing to open source projects has been growing lately. I use several open source operating systems, and I rely on many open source applications. There are many applications that I am very interested in developing for myself, and the open source community can provide a lot of off-the-shelf components that I can […]
A recent worm, Lupper, is traversing the Internet and exploiting computers that run the XML-RPC package for PHP. The official XML-RPC for PHP homepage states that the package’s abuse of the PHP eval function created a security hole that allowed remote execution of arbitrary code. This means that any systems that run PHP and a […]
A post on slashdot.com points out an outline for managing geeks by Eric Schmidt. If Schmidt still carries these management beliefs, then Google’s success at wooing technologists should be expected. This guideline suggests that any tech company that intends to benefit from innovation requires in-house developers. He also restates the widely accepted software engineering observation […]
An item on eweek.com references a supposed Microsoft developer’s blog entry, which conveys frustration with the decision to ship a product that is not ready for release. This developer’s sentiments are definitely shared among many developers in other software development pursuits. The developer’s attachment to the product and the dedication to minimize its faults is […]