Skip to Content

2010 February

  Page 1 of 2  Next Page »
February 26, 2010

PHP 5.2.13 addresses security holes

The H-Secirity writes:

An update which fixes around 40 bugs is available for the PHP 5.2 development branch. Version 5.2.13 comes highly recommended for all PHP 5.2.x users, as it includes a number of security-related fixes. These include a bug when validating the safe_mode configuration variable in the tempnam() function which arises when the path does not end in /).
An open_basedir/safe_mode bypass vulnerability in the session extension has also been fixed. (more…)


.NET 4.0 Parallel Programming will be presented in Corvallis

February Corvallis .NET Users Group (CDNUG) Meeting
Mateus de Carvalho (a Software Engineer/Architect at University of Oregon) will be presenting the new .NET 4.0 Parallel Programming. Come learn about how easy the new version of .NET makes parallel programming.

Thursday, February 25th, 2010. 6:00 PM
High 5 Sports Bar & Grill


  • 5:30 – 6:15: Networking Opportunities & Dinner (free food!)
  • 6:15 – 7:30: Mateus de Carvalho “.NET 4.0 Parallel Programming”
  • 7:15 – 7:45: Q&A / Discussion
  • 7:45 – 8:00: Giveaways: Books and cool stuff!

For more information visit Corvallis .NET Users Group

February 25, 2010

When It’s Okay to Pay For an App

New Gizmodo review: what apps are worth to be paid for?

There are over 130,000 apps in the App Store. About 33,000 of those expect you to pay cash money for a download. Sometimes it’s worth it! Often, it’s not.

Oscar Wilde was right about cynics: they know the cost of everything and the value of nothing. On your next trip to the App Store, don’t be cynical. Be smart—even if it means spending a little money.
The App Store Effect Is Real. Use It. (more…)

February 24, 2010

Software Development for the iPhone and iPod Touch at the UO

Apple seminar: February 25
Learn how to develop for the hottest mobile platforms around, the iPhone and iPod touch.

We’ll discuss and demonstrate Apple’s software development tools for the iPhone and iPod Touch, and show how individuals and institutions are building innovative mobile applications for their organizations and the wider world. We’ll highlight and deconstruct some popular applications – both web-based and native – and show you how to get started building your own with Apple’s free developer tools.

We’ll talk about web development with Dashcode, native application development with Xcode and Interface Builder, and review the integration and deployment options and Apple’s developer program. And if the presenter messes up, we may accidentally wind up demonstrating the debugger as well. (more…)

Adobe Fixes Critical Bug in Flash, Reader Utility

Computerworld writes:
Adobe patched a critical vulnerability in the Windows utility used to download the company’s two most popular products, Adobe Reader and Flash Player

Urges Windows users to search PCs for flawed Adobe Download Manager

It was the second time in the last six weeks that Adobe fixed a flaw in Download Manager, the program it installs on PCs when customers download Reader or Flash Player.

The bug, Adobe acknowledged in an advisory, “potentially allow[s] an attacker to download and install unauthorized software onto a user’s system.”

Better Way for Computers to “See” Combines Molecular Biology and Gaming Hardware

A story from California Science & Technology News
based on Harvard and MIT research surveys

Taking inspiration from genetic screening techniques, researchers from Harvard and MIT have demonstrated a way to build better artificial visual systems with the help of low-cost, high-performance gaming hardware.

The neural processing involved in visually recognizing even the simplest object in a natural environment is profound — and profoundly difficult to mimic. Neuroscientists have made broad advances in understanding the visual system, but much of the inner workings of biologically-based systems remain a mystery.

Using Graphics Processing Units (GPUs), the same technology video game designers use to render life-like graphics, researchers are now making progress faster than ever before. A new study, co-led by David Cox, Principal Investigator of the Visual Neuroscience Group at the Rowland Institute at Harvard, and Nicolas Pinto, a Ph.D. Candidate in James DiCarlo’s laboratory at the McGovern Institute for Brain Research and the Department of Brain and Cognitive Sciences at MIT, was published in the November 26th issue of PLoS Computational Biology. (more…)

Report outlines IPv6 security challenges

Interesting report on Government Computer News about IPv6 security:

NIST document identifies deployment risks
Ready or not, the next generation of Internet Protocols is likely to be making their appearance on government networks in the not-too-distant future, and the National Institute of Standards and Technology is advising network engineers and administrators to familiarize themselves with the security challenges of IPv6.

“The migration to IPv6 services is inevitable as the IPv4 address space is almost exhausted,” a new NIST draft publication states. “IPv6 is not backwards-compatible with IPv4, which means organizations will have to change their network infrastructure and systems to deploy IPv6.” (more…)

Apple iPad: The definitive guide

Detailed iPad test drive report from Engadget here

By now you’ve probably read more on Apple’s iPad then you ever dreamed possible. In the last few days we’ve covered a lot of angles on the tablet and compiled a lot of data. Still, we felt that we hadn’t given you clear hands-on impressions and collected the myriad details about the device in one, easy-to-reach place. So we’ve decided to bundle all of that info into a single feature, joining our first-hand encounters with the iPad together with all of the data and details you should be aware of — including specs, plans, release schedules, pics, and video. So read on for everything we know (so far) about Cupertino’s first tablet!


Active Directory Technical Breakdown at the UO

Information Services invites all users to attend the upcoming Active Directory Technical Breakdown this Friday February 26th, 2010.

This meeting will discuss the technical implementation of IDM and Active Directory and what the project looks like right now in the pilot phase.
We will spend some time going over the migration process; including prerequisites, communications, and user experience. We will also look at AD management and the new features and data available using the domain.

This is a great opportunity for folks with existing domains or those who are considering managing their own OU to get a feel for what a migration to the new domain will entail. Please bring all of your questions and be prepared to tentatively set a date for your migration to the new environment.

Friday February 26
1pm – 2:20pm
Living Learning Center South (LLC-S) Room 101

How to Copy Text from protected PDF files to Word?

An easy explanation from Computeruser:

According to Adobe, there are more than 250 million PDF documents on the web today. The number will greatly increase since eBook and some portable devices become popular. PDF is really a good thing for reading and sharing. PDF have great reliability, almost anyone on any computer system can view PDF.

However, many PDF users are getting used to Microsoft since they have been using it for many years. Copy text from PDF to Word format is necessary for them in some situations. For example, the boss needs some contents of a protected PDF report which is created by a former colleague but he is not working for the company anymore. Or you bought an eBook and want to keep the favorite chapters so that you can read again in the future, but the format is all messed up after you pasted in Word. (more…)

  Page 1 of 2  Next Page »