Topic: Computing (Page 2)

You are looking at all articles with the topic "Computing". We found 455 matches.

Hint: To view all topics, click here. Too see the most popular topics, click here instead.

πŸ”— Zip Bomb

πŸ”— Computing πŸ”— Computer Security πŸ”— Computer Security/Computing

A zip bomb, also known as a zip of death or decompression bomb, is a malicious archive file designed to crash or render useless the program or system reading it. It is often employed to disable antivirus software, in order to create an opening for more traditional viruses.

Rather than hijacking the normal operation of the program, a zip bomb allows the program to work as intended, but the archive is carefully crafted so that unpacking it (e.g. by a virus scanner in order to scan for viruses) requires inordinate amounts of time, disk space or memory.

Most modern antivirus programs can detect whether a file is a zip bomb, to avoid unpacking it.

Discussed on

πŸ”— Transputer

πŸ”— Computing πŸ”— Computing/Computer hardware

The transputer is a series of pioneering microprocessors from the 1980s, featuring integrated memory and serial communication links, intended for parallel computing. They were designed and produced by Inmos, a semiconductor company based in Bristol, United Kingdom.

For some time in the late 1980s, many considered the transputer to be the next great design for the future of computing. While Inmos and the transputer did not achieve this expectation, the transputer architecture was highly influential in provoking new ideas in computer architecture, several of which have re-emerged in different forms in modern systems.

Discussed on

πŸ”— Oberon Operating System

πŸ”— Computing πŸ”— Computing/Software πŸ”— Computing/Free and open-source software

The Oberon System is a modular, single-user, single-process, multitasking operating system written in the programming language of the same name. It was originally developed in the late 1980s at ETH ZΓΌrich. The Oberon System has an unconventional visual text user interface instead of a conventional CLI or GUI. This "TUI" was very innovative in its time and influenced the design of the Acme text editor for the Plan 9 from Bell Labs operating system.

The latest version of the Oberon System, Project Oberon 2013, is still maintained by Niklaus Wirth and a number of collaborators but older ETH versions of the Oberon Systems have been orphaned. The Oberon System also evolved into the multi-process, SMP-capable Bluebottle operating system, with a zooming user interface.

Discussed on

πŸ”— Port Knocking

πŸ”— Computing πŸ”— Computing/Computer Security πŸ”— Computing/Networking

In computer networking, port knocking is a method of externally opening ports on a firewall by generating a connection attempt on a set of prespecified closed ports. Once a correct sequence of connection attempts is received, the firewall rules are dynamically modified to allow the host which sent the connection attempts to connect over specific port(s). A variant called single packet authorization (SPA) exists, where only a single "knock" is needed, consisting of an encrypted packet.

The primary purpose of port knocking is to prevent an attacker from scanning a system for potentially exploitable services by doing a port scan, because unless the attacker sends the correct knock sequence, the protected ports will appear closed.

Discussed on

πŸ”— β€œBush hid the facts” bug

πŸ”— Computing πŸ”— Microsoft Windows πŸ”— Microsoft Windows/Computing πŸ”— Software πŸ”— Software/Computing

Bush hid the facts is a common name for a bug present in some versions of Microsoft Windows, which causes text encoded in ASCII to be interpreted as if it were UTF-16LE, resulting in garbled text. When the string "Bush hid the facts", without newline or quotes, was put in a new Notepad document and saved, closed, and reopened, the nonsensical sequence of Chinese characters "η•‚ζ‘³ζ  ζ‘©η ζ•¨ζ˜ ζ‘η΄" would appear instead.

While "Bush hid the facts" is the sentence most commonly presented on the Internet to induce the error, the bug can be triggered by many strings with letters and spaces in the same positions, for example "hhhh hhh hhh hhhhh". Other sequences trigger the bug as well, including even the text "a ".

The bug occurs when the string is passed to the Win32 charset detection function IsTextUnicode. IsTextUnicode sees that the bytes match the UTF-16LE encoding of valid (if nonsensical) Chinese Unicode characters, concludes that the text is valid UTF-16LE Chinese and returns true, and the application then incorrectly interprets the text as UTF-16LE.

The bug had existed since IsTextUnicode was introduced with Windows NT 3.5 in 1994, but was not discovered until early 2004. Many text editors and tools exhibit this behavior on Windows because they use IsTextUnicode to determine the encoding of text files. As of Windows Vista, Notepad has been modified to use a different detection algorithm that does not exhibit the bug, but IsTextUnicode remains unchanged in the operating system, so any other tools that use the function are still affected.

Discussed on

πŸ”— iLoo

πŸ”— Internet πŸ”— Computing πŸ”— Brands πŸ”— Microsoft πŸ”— Home Living

The iLoo (short for Internet loo) was a cancelled Microsoft project to develop a Wi-Fi Internet-enabled portable toilet. The iLoo, which was to debut at British summer festivals, was described as being a portable toilet with wireless broadband Internet, an adjustable plasma screen, a membrane wireless keyboard, a six-channel speaker system, and toilet paper embossed with popular web site addresses. The iLoo was also to have an extra screen and keyboard on the outside, and was to be guarded. It was intended as the next in a series of successful initiatives by MSN UK which sought to introduce the internet in unusual locations, including MSN Street, MSN Park Bench and MSN Deckchair.

The project was announced by MSN UK on April 30, 2003, and was widely ridiculed before being declared a hoax by Microsoft on May 12. On May 13, another Microsoft press release stated that although the project had not been a hoax, it had been cancelled because it would do little to promote the MSN brand. There has since been speculation as to whether the project was cancelled for fear of being sued by Andrew Cubitt, who had invented the similarly named product "i-Loo". The iLoo was described as a public relations "debacle" by Online Journalism Review.

Discussed on

  • "iLoo" | 2015-07-23 | 354 Upvotes 56 Comments

πŸ”— Embrace, Extend, and Extinguish

πŸ”— Computing πŸ”— Marketing & Advertising πŸ”— Computing/Software πŸ”— Computing/Free and open-source software πŸ”— Open πŸ”— Microsoft

"Embrace, extend, and extinguish" (EEE), also known as "embrace, extend, and exterminate", is a phrase that the U.S. Department of Justice found was used internally by Microsoft to describe its strategy for entering product categories involving widely used standards, extending those standards with proprietary capabilities, and then using those differences in order to strongly disadvantage its competitors.

Discussed on

πŸ”— SoftICE

πŸ”— Computing

SoftICE is a kernel mode debugger for DOS and Windows up to Windows XP. Crucially, it is designed to run underneath Windows such that the operating system is unaware of its presence. Unlike an application debugger, SoftICE is capable of suspending all operations in Windows when instructed. For driver debugging this is critical due to how hardware is accessed and the kernel of the operating system functions. Because of its low-level capabilities, SoftICE is also popular as a software cracking tool.

Microsoft offers two kernel-mode debuggers, WinDbg and KD, for no charge. However, the full capabilities of WinDbg and KD are available only when two interlinked computers are used. SoftICE therefore is an exceptionally useful tool for difficult driver related development. The last released version was for Windows XP.

Older versions exist for DOS and compatible operating systems. SoftICE was originally produced by a company called NuMega, and was subsequently acquired by Compuware in 1997, which in turn sold the property to Micro Focus in 2009. Currently, Micro Focus owns the source code and patents, but is not actively maintaining SoftICE.

Discussed on

πŸ”— Xv6

πŸ”— Computing πŸ”— Computing/Software πŸ”— Computing/Free and open-source software

xv6 is a modern reimplementation of Sixth Edition Unix in ANSI C for multiprocessor x86 and RISC-V systems. It is used for pedagogical purposes in MIT's Operating Systems Engineering (6.828) course as well as Georgia Tech's (CS 3210) Design of Operating Systems Course, IIIT Hyderabad, IIIT Delhi and as well as many other institutions.

Discussed on

  • "Xv6" | 2015-11-14 | 350 Upvotes 47 Comments

πŸ”— Yoda conditions

πŸ”— Computing πŸ”— Computing/Software πŸ”— Star Wars

In programming jargon, Yoda conditions (also called Yoda notation) is a programming style where the two parts of an expression are reversed from the typical order in a conditional statement. A Yoda condition places the constant portion of the expression on the left side of the conditional statement. The name for this programming style is derived from the Star Wars character named Yoda, who speaks English with a non-standard syntax.

Yoda conditions are part of the Symfony, and the WordPress coding standards.

Discussed on