The U.S. National Security Agency has reportedly been working for the past several years on expanding its ability to infect computers with surveillance malware and creating a command-and-control infrastructure capable of managing millions of compromised systems at a time.
The U.S. Foreign Intelligence Surveillance Court has temporarily reversed its earlier order that call records collected by the National Security Agency should be destroyed after the current five-year limit.
Mt. Gox may have collected a large sum in trading fees in the weeks before its closure, even though it was already aware that a vast number of bitcoins had gone missing, its U.S. bankruptcy filing suggests.
You don’t have to go it old school when it comes to going back to school. A clever nerd, can find a way to fit learning a professional or technical skill into time that’s currently a bit of a waste. How about the hour you spend watching soaps and news on the treadmill? And that time you spend catching up on not-so-relevant emails during your train commute? Saturday morning lying in bed? Keep doing that. But take a class at the same time.
Taking advantage of .NET generics can save you loads of repetitive data access leg work. Since it’s likely that each of your data tables will require the same basic operations (Get, Find, Add, Update, Delete) you’d be better off writing these functions once instead of recreating them for each data model.
Unix systems administrators tend to be very serious about their responsibilities -- except when they're not. And, when they're not, the pranks that they play on each other and some of their more annoying users might surprise you.