d y n e : b o l i c -- a free multimedia studio in a GNU/Linux live CD:
"You don't need to install anything, you don't even need an harddisk .. Download the ISO-image, burn your own CD, reboot your machine and you'll get back true love ;^)
dyne:bolic is shaped on the needs of media activists, artists and creatives as a practical tool for multimedia production: you can manipulate and broadcast both sound and video with tools to record, edit, encode and stream, having automatically recognized most device and peripherals: audio, video, TV, network cards, firewire, usb and more; all using only free software ..
It is optimized to run on slower computers, turning them into a full media stations: the minimum you need is a pentium1 or k5 PC 64Mb RAM and IDE CD-ROM, or a modded XBOX game console - and if you have more than one, you can easily do clusters.
dyne:bolic is RASTA software
released free under the GNU General Public License. This software is about Digital Resistance ina babylon world which tries to control the way we communicate, we share our interests and knowledge." Integrating many multimedia tools, running with minimal system installation, doing automatic clustering for quick render farms: sounds real interesting. 11:51:39 PM
Hackers Use Virtual Machine Detection To Foil Researchers:
Funny benefit for users of virtual machines -- if you run a vm, increasing amounts of malware will refuse to run. "Hackers are adding virtual machine detection to their worms and Trojans to stymie analysis by anti-virus labs, a security research said Sunday. The tactic is designed to thwart researchers who use virtualization software, notably that made by VMware, to quickly and safely test the impact of malicious code. .. "Three out of 12 malware specimens recently captured in our honeypot refused to run in VMware," said Lenny Zeltser, an analyst at SANS Institute's Internet Storm Center (ISC) in an online note Sunday.
Malware writers use a variety of techniques to detect virtualization, including sniffing out the presence of VMware-specific processes and hardware characteristics, said Zeltser. "More reliable techniques rely on assembly-level code that behaves differently on a virtual machine than on a physical host," he added. " 4:55:43 PM