Updated: 12/6/2006; 9:43:03 AM.

Ken Novak's Weblog
Purpose of this blog: to retain annotated bookmarks for my future reference, and to offer others my filter technology and other news. Note that this blog is categorized. Use the category links to find items that match your interests.
Subscribe to get this blog by e-mail.
New: Read what I'm reading on Bloglines.



daily link  Tuesday, November 21, 2006


d y n e : b o l i c -- a free multimedia studio in a GNU/Linux live CD: "You don't need to install anything, you don't even need an harddisk .. Download the ISO-image, burn your own CD, reboot your machine and you'll get back true love ;^)

dyne:bolic is shaped on the needs of media activists, artists and creatives as a practical tool for multimedia production: you can manipulate and broadcast both sound and video with tools to record, edit, encode and stream, having automatically recognized most device and peripherals: audio, video, TV, network cards, firewire, usb and more; all using only free software ..

It is optimized to run on slower computers, turning them into a full media stations: the minimum you need is a pentium1 or k5 PC 64Mb RAM and IDE CD-ROM, or a modded XBOX game console - and if you have more than one, you can easily do clusters.

dyne:bolic is RASTA software released free under the GNU General Public License. This software is about Digital Resistance ina babylon world which tries to control the way we communicate, we share our interests and knowledge." Integrating many multimedia tools, running with minimal system installation, doing automatic clustering for quick render farms: sounds real interesting.
  11:51:39 PM  permalink  

Hackers Use Virtual Machine Detection To Foil Researchers:  Funny benefit for users of virtual machines -- if you run a vm, increasing amounts of malware will refuse to run. "Hackers are adding virtual machine detection to their worms and Trojans to stymie analysis by anti-virus labs, a security research said Sunday. The tactic is designed to thwart researchers who use virtualization software, notably that made by VMware, to quickly and safely test the impact of malicious code. .. "Three out of 12 malware specimens recently captured in our honeypot refused to run in VMware," said Lenny Zeltser, an analyst at SANS Institute's Internet Storm Center (ISC) in an online note Sunday.

Malware writers use a variety of techniques to detect virtualization, including sniffing out the presence of VMware-specific processes and hardware characteristics, said Zeltser. "More reliable techniques rely on assembly-level code that behaves differently on a virtual machine than on a physical host," he added. "
  4:55:43 PM  permalink  

 

November 2006
Sun Mon Tue Wed Thu Fri Sat
      1 2 3 4
5 6 7 8 9 10 11
12 13 14 15 16 17 18
19 20 21 22 23 24 25
26 27 28 29 30    
Oct   Dec


Links to related pages:
-
Subscribe to "Ken Novak's Weblog" in Radio UserLand.

Click to see the XML version of this web page.
Click here to send an email to the editor of this weblog. E-mail me
Click here to visit the Radio UserLand website.

jenett.radio.simplicity.1.3R


Copyright 2006 © Ken Novak.
Last update: 12/6/2006; 9:43:03 AM.