You May Also Like

Darpa funds invisible, shoot-through shield

Darpa funds invisible, shoot-through shield -

Filed under:

In a move seemingly influenced in equal parts by Halo and David Lynch's film Dune, Darpa has announced that it's ponying up $15 million to develop one-way-invisible, self-healing, shoot-through shields for use in urban combat. While the Pentagon's research division acknowledges that there are "significant technical obstacles" in the process, it's fairly gung-ho about developing a technology combining metamaterials, 'coded' obscurant systems, and a bunch of other stuff no one really understands. Trust us, you'll thank them if the Harkonens try and overthrow your spice-mining operation.

[Via Digg]


Read | Permalink | Email this | Comments

Office Depot Featured Gadget: Xbox 360 Platinum System Packs the power to bring games to life!

Read More

Search: Find useful web apps with SimpleSpark

Search: Find useful web apps with SimpleSpark - simple_spark.png

If you're looking for a specific web application to meet your needs, but you're not sure where to find it, you might want to check out SimpleSpark, a catalog of over 3000 useful online services.

For instance, I typed in "organize" and retrieved around 95 different results to help me get my stuff together. You can also browse through the entire catalog (organized by category), browse pending listings, or check out what's just been added. I found this incredibly helpful especially since there's just so much good new stuff coming out; it's somewhat tricky to keep track of what works and what doesn't.

Read More

Shockvoice Alpha 0.6.0 released

Shockvoice Alpha 0.6.0 released - [WArp2Search]

I just tried this out on a server that was setup for and I have to say its pretty good. The voice quality is amazing and the built in browser is cool. You can setup your server to pull up a page when your connect and change channels. Is this a replacement for ventrilo? Click below to see a screenshot of the client.

Read More

Detect insider threats with Linux auditing

Detect insider threats with Linux auditing -

Organizations of all sizes need to mitigate the risk of insider threats. Misconduct by authorized users represents a grave threat to an organization. According to the 2005 Computer Security Institute and Federal Bureau of Investigation Computer Crime and Security Survey, organizations reported that computer intrusions from inside sources accounted for nearly half of all incidents. You can secure your network perimeter with intrusion detection systems, firewalls, and virus scanners, but don't neglect to monitor authorized users. The Linux Audit daemon can help you detect violations of your security policies.

Read More