Search This Blog

Thursday, April 17, 2014

Exposed! 13 pieces of classic software whose code is now accessible

The true costs of UI development in .NET

Facebook users targeted by iBanking Android trojan app

ITworld Today
April 17, 2014
Share this email

Exposing the source: 13 pieces of classic software whose code is now accessible

The source code behind proprietary software doesn't always remain hidden forever. Here are a baker's dozen examples where the code behind well-known applications has come to light.

READ MORE
 

Issue highlights

1. The true costs of UI development in .NET

2. Facebook users targeted by iBanking Android trojan app

3. WIN THIS BOOK: Java SE8 for Programmers, 3rd Edition

4. Windows XP's retirement turns into major security project for Chinese firm

5. LaCie warns hackers may have customer info, credit cards after year-long breach

6. Mac Pro shortage sets record as worst Mac production boondoggle

7. Teen arrested in Heartbleed attack against Canadian tax site

8. Apps that fight our distracted driving habits

9. Twitch.tv not content being the idiot box of gaming, expands to sales and funding

White Paper: Box

Box beats Dropbox – and all the rest – for business

Box trumps Dropbox, Engyte, Citrix ShareFile, EMC Syncplicity, and OwnCloud with rich mix of file sync, file sharing, user management, deep reporting and enterprise integration. Learn more in this article from InfoWorld. Learn more>>

The true costs of UI development in .NET

Building a user interface heavy application in .NET is a difficult task. With the rise of tablet computing, the technique you use is more important than ever if you want your app to perform on a wide range of devices. But each technique has its trade-offs. READ MORE

Facebook users targeted by iBanking Android trojan app

Cybercriminals have started using a sophisticated Android Trojan app designed for e-banking fraud to target Facebook users, possibly in an attempt to bypass the two-factor authentication protection on the social network. READ MORE

WIN THIS BOOK: Java SE8 for Programmers, 3rd Edition

Five will win. Enter the drawing today! READ MORE

Windows XP's retirement turns into major security project for Chinese firm

Microsoft may have retired Windows XP, but one of China's leading security vendors is trying to keep the OS threat-free, and rolling out protection software to hundreds of millions of users in the nation. READ MORE

White Paper: Perforce Software

Continuous Delivery: 5 Habits of Successful Practitioners

Whether it's New York Stock Exchange or Netflix, Samsung or Salesforce.com, companies of all kinds have embraced the design practice known as Continuous Delivery--a discipline in which software can be released to production at any time. In this Best Practices eBook, discover 5 habits that set top practitioners apart. Learn more >>

LaCie warns hackers may have customer info, credit cards after year-long breach

For almost an entire year, malicious attackers may have been harvesting customer information including credit card data. READ MORE

Mac Pro shortage sets record as worst Mac production boondoggle

Apple's inability to meet demand for its Mac Pro desktop computer has surpassed that of its most egregious Mac production problem in memory, the debacle over the all-in-one iMac of late 2012 and early 2013. READ MORE

Teen arrested in Heartbleed attack against Canadian tax site

Canadian police have arrested a 19-year-old man for allegedly using the Heartbleed bug to steal data about taxpayers. READ MORE

Apps that fight our distracted driving habits

Here are some of the apps and tools I would recommend trying out if you want to try making your phone conscious of your driving. READ MORE

Twitch.tv not content being the idiot box of gaming, expands to sales and funding

Streaming your games for others to watch on Twitch is a big fad these days, but it looks like the company is taking the first tentative steps towards branching into other areas. READ MORE

White Paper: CA Technologies

Complexity Ate My Budget

When it comes to data protection, having multiple point solutions is not the answer. Find out how to gain a holistic view of your IT infrastructure, with an emphasis on business needs and IT/data risk and recovery, that will inform your choice for a comprehensive, cost-effective data protection solution. Read now!

BOOK GIVEAWAY:

We've got 5 copies of each of these new books to give to some lucky ITworld readers. Enter today for your chance to win!

Quality Code: Software Testing Principles, Practices, and Patterns
Using real-world code examples, Stephen Vance introduces patterns, principles, and more than two dozen detailed techniques for testing any software system more fully, effectively, and painlessly.

Java SE8 for Programmers, 3rd Edition
Hundreds of complete Java programs with thousands of lines of proven Java code, and hundreds of tips will help you build robust applications.

DON'T MISS...

16 terrible computer pranks that could get you fired

Your new PC needs these 22 free programs

8 books every IT leader should read this year

A method to the madness: How 13 programming languages got their names

IT Salary Survey, 2014: How IT pros really feel about their pay, stress, and career prospects

Follow ITworld

Share this email

You are currently subscribed to itworld_today as security.world@gmail.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

Learn about INSIDER

If you are interested in advertising in this newsletter, please contact: sean_weglage@itworld.com

Copyright (C) 2014 ITworld, 492 Old Connecticut Path, Framingham, MA 01701

** Please do not reply to this message. To contact someone directly, send an e-mail to online@itworld.com. **

No comments: