58 Topics
| |
The [AI 'arms race'](https://www.ft.com/content/21eb5996-89a3-11e8-bf9e-8771d5404543) between China and the U.S. is heating up. Forget nuclear weapons, the real power now lies in microchips that can outsmart entire nations at any game and predict their next move. This arms race is part of a larger cold war backdrop, which includes massive investments … | |
While keen to point out that Microsoft's TechNet portal security was "in no way compromised" by the tactic, researchers with security outfit FireEye [discovered](https://www.fireeye.com/blog/threat-research/2015/05/hiding_in_plain_sigh.html) that [a well established China-based hacking campaign called Deputy Dog](https://www.fireeye.com/blog/threat-research/2013/09/operation-deputydog-zero-day-cve-2013-3893-attack-against-japanese-targets.html) had managed to create profiles and posts on TechNet that contained embedded Command and Control codes … | |
Oh the irony. In what is starting to read very much like the script to a Hollywood movie itself, the latest twist to the Sony Pictures hacking plot took an unexpected turn yesterday. It would appear that at one stage yesterday access to the web across pretty much all of … | |
An increasing number of my acquaintances seem to be in the habit of buying cheap Android smartphones when in China on business and, increasingly, from online auction sites. More often than not these will be clones of flagship models but without the flagship price tag; however, cheap is not always … | |
According to a [report](http://www.fireeye.com/resources/pdfs/fireeye-operation-ke3chang.pdf) from researchers at US security outfit FireEye, a number of computers belonging to diplomats attending the G20 summit in Russia three months ago, including at least five European foreign ministries, were successfully targeted by Chinese hackers. FireEye researchers had monitored a server, one of 23, used … | |
Small groups of what are best described as cyber-mercenaries, willing and able to perform surgically precise hit and run hacking operations, are offering their services for hire out of China, Japan and South Korea. That's the conclusion of security researchers at [Kaspersky Lab](http://www.kaspersky.co.uk/) who have been following the progress of … | |
Back in December 2011, reports were circulating regarding a data breach at one of the big Chinese social networking sites, Tianya.cn that suggested the login credentials of some 40 million users were potentially exposed. Clear text usernames and password combinations were stolen by hackers during the breach, although a Tianya … | |
It has been just over a month now since North Korea gloated about its successful nuclear weapon test. A test which prompted the imposition of new UN sanctions against Pyongyang, and if the Korean Central News Agency (KCNA) which acts as a state mouthpiece for the Democratic People's Republic of … | |
A recent survey, conducted by IT risk management specialists nCircle, suggests that as many as 50% of IT security professionals think that the organisations they work for are a potential target for state-sponsored hackers. A number that Tim Keanini, nCircle Chief Research officer, thinks is rather on the low side … | |
An ongoing attack aimed at users of the Apple Mac platform is being reported by security researchers. [AlienVault,](http://www.alienvault.com) which has discovered these weaponised attacks in the wild, warns that regular Mac users without IT security software installed could be at risk of infection and hijacking. ![alien](/attachments/small/0/alien.jpg "align-right") The researchers suspect … | |
hi all i want to enter a turkish word to the database using netbeans but what apper in the database is something like that how i can solve it?????? thank you for help | |
A Google official has announced this morning that the search giant is back in action in China. Google, the second most popular search engine in China, behind Baidu, announced in January of this year that it would no longer censor its search results on the Chinese version of its website, … | |
| Hi Daniweb, I am learning Chinese and it's quite hard to learn the characters. As I prefer learning by watching videos I thought it would be great it I could grab the Subtitles from the video and have them translated/annotated in a program I already made. So - how would … |
The Iranian Cyber Army may be the latest elite military hacking squad to hit the headlines, but Iran has a long way to go if it's to catch up with China in terms of international data disruption. According to one newly published report into the threat from Chinese state-sponsored espionage … | |
Sykipot is not a new Trojan Horse by any means, but the variation found to be attacking Department of Defense smart cards is certainly something that government agencies need to be worried about. United States government agencies, that is. It's doubtful the Chinese government will be too worried about them, … | |
Hey all, I got a small job here. The site design is the way the client likes. Mainly, I just want to get some feedback regarding content... I don't speak Arabic or Chinese. He needed the content translated to both. He suggested Google Translate (he doesn't speak it either), but … | |
| Hi, I am still new to C# and am working on an annotator: 1. Input some Chinese Text. 2. Click Button. 3. Output some Chinese Text - each word that's found in the dictionary get's a span-html-class around for later implementing it in a website. Here it the code for … |
| Hi, I am currently working on a websiteproject for learning chinese. To help the readers to understand the texts better, I want to annotate the Chinese Characters with popup translations from the HanDeDict (German-Chinese Dictionary). I already downloaded the dictionary but the file seems to be too big to work … |
I have a c# form application with a text box and a button. I type Chinese character in the text box and press the button to assign the input to a string using the following code [CODE]String chineseChar = Textbox1.Text ;[/CODE] // TextBox font property: Arial Unicode MS or SimSun … | |
On Thursday 2nd June 2009 it will be the 20th anniversary of the Tienanmen Square massacre when an undisclosed number of student protesters were killed after tanks rolled into squash the protests. You might imagine, then, that in China services such as Twitter would be a-buzz with talk about the … | |
Hi everyone, I'm a budding developer. I want to modify the OS of typical china mobile ([url]http://www.chinavasion.com/product_info.php/pName/direktor-wifi-dual-sim-quadband-worldphone/[/url]) and try to make it good as close as possible to a symbian OS. Even many popular companies like Fly, Lava, Micromax and many others are also using the more or less similar … | |
I am told, by those who follow the sport, that the Netherlands soccer team stands a pretty good chance of lifting the FIFA 2010 World Cup trophy. The bad news for any Netherlands fans is that their side has already been defeated by India, in the World Cup of security … | |
Many a gadget freak has claimed 'I would kill for an iPad' over the last few weeks, but as the world officially goes iPad crazy ask your self this: would you die for an iPad? That's the rather serious question being asked as the Chinese factory where the iPad is … | |
I'm in the middle of developing a website and i always track uses to my site even in development, and i looked through the tracking and i notice under 'PageVisited' (Which is the page the user goes to on my site) and it said on one record 'http://www.baidu.com/' which is … | |
Who wants some forged educational documents that will help you get a job in some foreign country? The answer, it would seem, is lots and lots of people. At least that would explain why spam advertising fake diplomas has topped the list of junk mail subject matter for China, South … | |
According to new figures, published today by [URL="http://www.sophos.com"]Sophos[/URL], something strange has happened in the world of spam: China has dropped out of the list of the world's worst spam relaying countries for the first time ever. The Sophos 'Dirty Dozen Spammers' list has become something of a staple diet for … | |
[ATTACH=right]14127[/ATTACH] [I]We can be Heroes For ever and ever What d'you say ~David Bowie, Heroes [/I] Yesterday afternoon I read with some surprise that [URL="http://www.washingtonpost.com/wp-dyn/content/article/2010/03/24/AR2010032401543.html"]domain registrar Go Daddy was following Google out of China[/URL]. It seems they had had quite enough of the Chinese government's restrictions, and like Google, decided … | |
It's not exactly news that the relationship between Google and China has soured over the last month or two and it looks as though [URL="http://www.macworld.com/article/147096/2010/03/china_google.html?lsrc=rss_main"]Google may quit China soon[/URL] leaving the vastly lucrative Chinese market to Microsoft and others. What's not clear is what the implications will be for the … | |
I've seen a collection of articles about computer security breaches originating from China and would like to give a report from the ITYS Foundation. ITYS, for the unaware, is "I Told You So." I've discussed the use of Linux on the desktop for years, touting its security, stability, thousands of … | |
Three men have been arrested, and what is thought to be a training site for hackers closed down, as Chinese officials get tough in the wake of the [URL="http://www.daniweb.com/news/story252590.html"]Google Gmail human rights hacking scandal[/URL]. While China has something of a history of being [URL="http://www.daniweb.com/blogs/entry4434.html"]tough on political activists[/URL], online [URL="http://www.daniweb.com/news/story235672.html"]multi-player gaming[/URL] … |
The End.