Tumblelog by Soup.io
Newer posts are loading.
You are at the newest post.
Click here to check if anything new just came in.

September 06 2007

torpor
22:16
ooh baby you know what i like .. when you take your TOP off ..
torpor
22:16

September 03 2007

torpor
00:36

September 02 2007

torpor
23:17
torpor
22:57
torpor
22:40

Comparing Visual Studio and Eclipse

An anonymous reader writes "Getting started with Eclipse can be confusing. New concepts, such as plug-in architecture, workspace-centric project structure, and automatic build can seem counterintuitive at first. Without waxing too philosophical about IDE design, this article presents the main differences between Visual Studio and the Eclipse IDE."

Read more of this story at Slashdot.

torpor
21:44
torpor
21:43
torpor
21:27

Virtual Earth Exposes Nuclear Sub's Secret

NewsCloud alerts us to a story a few months old that has been getting a lot of play recently. A Seattle blogger, Dan Twohig, was browsing in Microsoft's Virtual Earth when he accidentally came across a photo of a nuclear sub in dry-dock. Its propeller is clearly visible — this was a major no-no on the part of someone at the Bangor Sub Base. The designs of such stealth propellers have been secret for decades. Twohig blogged about the find and linked to the Virtual Earth photo on July 2. The debate about security vs. Net-accessible aerial photography has been building ever since. The story was picked up on military.china.com on Aug. 17 — poetic justice for the Chinese sub photo that had embarrassed them a month before. On Aug. 20 the Navy Times published the article that most mainstream media have picked up in their more recent coverage. Twohig's blog is the best source to follow the ongoing debate. No one has asked Microsoft, Google, or anyone else to blur the photo in question. Kind of late now.

Read more of this story at Slashdot.

torpor
21:18
torpor
21:08
torpor
21:06
torpor
20:52
torpor
20:48
torpor
20:42
torpor
20:13

Nmap From an Ethical Hacker's Point of View

ddonzal notes a new tutorial that introduces Nmap from the viewpoint of an ethical hacker. (Part 1 of 2 parts is up now.) The author is Kirby Tucker, who writes: "After completing this 2 Part Series and having practiced the techniques described, one should not only be able to sit at a 'roundtable' with advanced security professionals and 'hold their own' in a discussion concerning Nmap, but also utilize this great tool in protecting their own network."

Read more of this story at Slashdot.

torpor
20:05
torpor
19:55
torpor
19:47
torpor
19:21
Older posts are this way If this message doesn't go away, click anywhere on the page to continue loading posts.
Could not load more posts
Maybe Soup is currently being updated? I'll try again automatically in a few seconds...
Just a second, loading more posts...
You've reached the end.

Don't be the product, buy the product!

Schweinderl