ExtremeTech is running a how-to on hacking OSX Tiger. The article shows how Video Desktop works and how you can display a video camera's output in a view using QuickTime's Sequence Grabbers.
Novell has filed its response to SCO Group
slander of title case against it, making the same claim against the Unix vendor and adding
that it believes it is entitled to 95% of SCO's intellectual property licensing revenue.
This legal filing is the latest twist in the long-running argument between SCO and Novell over which company holds the copyrights to the UnixWare
operating system and Unix
System V code base, and could have a financial impact on SCO's other legal claims.
Apple's transition to the PowerPC processor, which began publicly in 1994, began in an IBM lab in the mid seventies. Read about Apple's move to RISC at Low End Mac.
In a move sure to spark tons of heated "toldja so" debates, Apple has released a new mouse, Yahoo reports. Aptly named Mighty Mouse, it got a touch-sensitive top shell which works like left/right buttons, a pair of force-sensing side buttons, and a 360-degree scroll button which doubles as the third button.
A lawyer acting for Linus Torvalds has contacted Linux vendors in Australia and asked them to sign a legal document relinquishing any legal claim to the word "Linux" and demanding they purchase a licence for its use from the Torvalds-created Linux Mark Institute, which administers the Linux trademark. The effort is part of an 18-month struggle to get 'Linux' registered as an Australian trademark.
So, how does the news of Apple and DRM change, or not change, your purchasing habits regarding x86 Macs? Let us know by participating in our following poll:
The SCO Group's OpenServer 6 inherits a new kernel from its UnixWare sibling that significantly boosts the product's scalability. Although SCO seems like an unlikely outlet for open-source software, the company has extended OpenServer with updated versions of Samba, Perl, PHP and other key components, and it has given this operating system a more modern interface option.
It has been a big day for Sun Microsystems today, who, after announcing their largest deal ever, now report that General Electric has selected Sun's Java System Identity Manager, "the provisioning component of the Sun Java Enterprise System, across all GE business units and 450,000 users on a global scale."
Head of all things Windows at Microsoft, Jim Allchin provides a heads up on the operating system formerly known as Longhorn: "Most of the stuff that we would expect that tech enthusiasts and consumers will be interested in will happen at Beta 2. Beta 1 is not what I would call deeply interesting unless you are a real bithead".
Slashdot reports: "Several people have discovered that the new Intel kernel Apple has included with the Developer Kit DVD uses TCPA/TPM DRM. More specifically, it includes "a TCPA/Palladium implementation that uses a Infineon 1.1 chip which will prevent certain parts of the OS from working unless authorized."
The release of the IBM PC proved revolutionary for the then tiny microcomputer industry, and for IBM itself. Read about the birth of the IBM PC 5150 at Braeburn.
The advent of JUnit has been a boon to developers. Unfortunately, many think it's enough to learn the JUnit API and write a few tests in order to have a well-tested application. This idea is worse than not testing at all because it leads to a false sense of code health. Learning JUnit is the easiest part of testing. Writing good tests is the hard part. This article presents some common JUnit antipatterns and shows how to resolve them.
"The Kubuntu distribution is a partner project of Ubuntu Linux. Designed for those who prefer KDE over GNOME, Kubuntu maintains the usual high development standards of its parent project, while providing users with the latest KDE packages throughout the distribution's release cycle. We caught up with Jonathan Riddell, the initiator and lead developer of Kubuntu."
Two BeOS tutorials have been released. The first one explains which settings to use with WonderBrush when working on icons. It is available in English, Dutch and German. The second one is a complete set of instructions on how to get the unique im_kit working. This one is available in English and Dutch.
Along with the release of the new Windows Vista beta, developers are being treated to technologies to create applications for the new operating system. Microsoft last week gave developers access to the WinFX Runtime Components Beta 1 and the WinFX SDK. FlexBeta has a video of Vista beta 1.
The focus of this white paper is to describe the basic workings of a new capability, the Microsoft Phishing Filter, that will be included in the upcoming release of Internet Explorer 7. The Microsoft Phishing Filter will help provide consumers with a dynamic system of warning and protection against potential phishing attacks.
Want to assess security vulnerabilities on your Linux system without lengthy installation and configuration efforts? We introduce four packages -- Auditor, Whoppix, Knoppix-STD, and PHLAK -- that bring you that ability through the magic of LiveCD.
Sun and General Motors have announced that GM will be building its entire SOA system on JES, which will be the largest single Java deployment ever. This marks both a victory for Sun's new licensing policies, as well as makes Sun's recent acquisition of SeeBeyond pay off. The new agreement will deploy Java's full line of identity management services and development tools, running on Solaris 10.
It looks as if Cisco's cease and desist letters to Web sites hosting Michael Lynn's banned Blackhat presentation detailing a critical flaw in the company's IOS operating system are not having the effect the company desires. An increasing number of other Web sites are now making available Lynn's presentation to whomever cares to read or download it.
There seems to be a new important security patch out for Linux every month, lots of "do not use this program" warnings, too many articles and books with too little useful information, high-priced consultants, and plenty of talk about compromised systems. It is almost enough to send someone back to Windows. Can the average Linux user or system administrator keep his or her system secure and still have time to do other things? Bob Toxen is happy to say yes and here is how to do it.