Home | News | Hacking | Sciences | Technology | Ti 92 | Programming | Free articles | Links | Webmaster


Programming >> home








  Coding and languagues

Computer viruses
Plant simulation
Programming history
TI 92 : code source
Virus and artificial life 

 Free articles



  Software write codes for you

If you're a programmer, your job might be obsolete soon. Bob Brennan, the chief engineer for Cambridge, England-based Synapse Solutions, claims he's developed software that lets anyone become a programmer by simply typing a description in everyday English of what the program should do. The software, called MI-Tech (short for machine intelligence technology), can take that written description and translate it directly into machine code. With MI-Tech, Brennan says, anyone can write an application without knowing a thing about C++, Java, or any other traditional programming language. In fact, there is no programming language underlying MI-Tech, Brennan says. Okay, I'm a bit skeptic, but who knows maybe the guy's a genius.(Source: KULT)  


   A new worm targets Linux

Welcome to Security Alerts, an overview of recent Unix and open-source security advisories. In this column, we look at the Linux based Adore Worm; buffer overflows in xntpd and ntpd; and vulnerabilities in SharePlex, Ultimate Bulletin Board, Lucent/ORiNOCO Closed Network, Red Hat's OpenSSH, Cisco Content Services Switches, and IPFilter.


   FreeBSD 4.3 Released

Release notes are available, or find the nearest mirror.

Release Notes
FreeBDS Mirror


   Time to go hacker school ?

Many solutions providers are launching security practices to lock down corporate networks or to teach customers how to combat hackers and crackers. Some solutions providers are even sending their employees to hacker school, where a typical one to four day course can cost $750 to $3,500. For a look at a typical course, tag along with Sm@rt Partner technology editor David Raikow. He recently attended a four-day course in computer hacking at Foundstone Inc. in New York. The following is Raikow's daily diary of his high-intensity educational experience.



   Anewest hacker technique : War driving

Shipley, a computer security researcher and consultant, is demonstrating what many at the security super-conference are quietly describing as the next big thing in hacking . It doesn't take long to produce results. The moment he pulls out of the parking garage, the laptop displays the name of a wireless network operating within one of the anonymous downtown office buildings: "SOMA AirNet." Shipley's custom software passively logs the latitude and longitude, the signal strength, the network name and other vital stats. Seconds later another network appears, then another: "addwater," "wilson," "tangentfund." "These companies probably spend thousands of dollars on firewalls," says Shipley. "And they're wide open."

The Register


   Script Kiddies Beware

SecurityFocus.com has taken the wraps off the Attack Registry & Intelligence Service (ARIS), which the company says is the world's first network attack predictor and incident management system. The software, which resides on a company's network, consists of two main modules: an Analyzer and a Predictor. The Analyzer does what many network security packages do, namely collecting and analyzing incident data. However, it is the Predictor module that is the firm's jewel in the crown, since it interfaces its data anonymously with other networks using ARIS data. In use, ARIS automatically - and anonymously - collects a company's intrusion detection system (IDS) log files, and presents users with organized reports on attacks to their systems, as well as information on how best to respond to these attacks.





depuis le 30/09/2003
© 1999- . Progsystem All rights reserved. 
Webmaster Lskeleton as Delbé Lionel