SOMA.FM: Webradio review

I actually took the time to look into the Firefox bookmarks for the current backtrack 3 security analisys distro and immediately got hooked to SOMA.FM

14 unique channels of listener-supported, commercial-free, underground/alternative radio broadcasting from San Francisco.

Very nice tunes indeed, my favorites are:

Drone Zone Served best chilled, safe with most medications. Atmospheric textures with minimal beats.

Space Station Soma Tune in, turn on, space out. Spaced-out ambient and mid-tempo electronica

Tag`s Trip Progressive house / trance. Tip top tunes.

I recommend you check out alle the channels listed directly on the main page!

Current Study reveals Acer as Netbook market leader

A current Quarterly Notebook PC Shipment and Forecast Report by displaysearch.com reveals Acer as the current leader on the Netbook market.

Here are the figures:

  • Acer — 38.3
  • Asus — 30.3
  • HP — 5.8
  • MSI — 5.7
  • Dell — 2.8
  • OLPC — 2.3
  • Medion — 2.3
  • Kohjinsha — 1.0
  • Intel — 1.0
  • Lenovo — 0.7
  • Toshiba — 0.5
  • All others — 9.1

Further info can be found at:

http://www.linuxdevices.com/news/NS8222978703.html

http://www.displaysearch.com/cps/rde/xchg/displaysearch/hs.xsl/quarterly_notebook_pc_shipment_and_forecast_report.asp

Analyzing SOHO Router Security

http://www.sourcesec.com/2008/11/09/hacking-the-routers-soho-router-security/

With embedded devices permeating today’s home networks, they have begun to attract a higher level of scrutiny from the security community than in previous years. In particular, the members of GNUCitizen have been relentlessly testing routers and wireless access points. Their discovery of multiple vulnerabilities in the BT Home Hub router affected a wide range of home networks in the UK [1], and their Router Hacking Challenge prompted a flurry of vulnerability reports against a variety of popular home routers, including the venerable Linksys WRT54G [2]. Specific vulnerabilities in home routers range from traditional Web attacks, such as XSS and CSRF, to authentication bypass attacks and buffer overflows; it is assumed that the reader has at least a passing knowledge of the attacks described in this paper.