Some more sweet Drupal news
Eh, I am on a Drupal kick, and might as well bookmark some nerd things. (I have been adding quite a bit to my del.icio.us bookmarks too, lately, be sure to look @ the top of the page for those).
More tech items: I was impressed to find BetaNews | Inside Information; Unreleased Products
BetaNews | Google continues to mete out privacy features
BetaNews | Google adds fuel to Canada's BitTorrent throttling fracas
BetaNews | Angry YouTube users boycott, Viacom seems to respond
BetaNews | Google releases its data encoding format to compete with XML
Google Open Source Blog: Protocol Buffers: Google's Data Interchange Format
how it works! Developer Guide - Protocol Buffers - Google Code
more here, there was hax0rs in t3h DNS lulz: Dan Kaminsky Discovers Fundamental Issue In DNS: Massive Multivendor Patch Released | securosis.com!
Fixes Released for Massive Internet Security Issue
On July 8th, technology vendors from across the industry will simultaneously release patches for their products to close a major vulnerability in the underpinnings of the Internet. While most home users will be automatically updated, it’s important for all businesses to immediately update their networks. This is the largest synchronized security update in the history of the Internet, and is the result of hard work and dedication across dozens of organizations.
Earlier this year, professional security research Dan Kaminsky discovered a major issue in how Internet addresses are managed (Domain Name System, or DNS). This issue was in the design of DNS and not limited to any single product. DNS is used by every computer on the Internet to know where to find other computers. Using this issue, an attacker could easily take over portions of the Internet and redirect users to arbitrary, and malicious, locations. For example, an attacker could target an Internet Service Provider (ISP), replacing the entire web — all search engines, social networks, banks, and other sites — with their own malicious content. Against corporate environments, an attacker could disrupt or monitor operations by rerouting network traffic traffic, capturing emails and other sensitive business data.
Mr. Kaminsky immediately reported the issue to major authorities, including the United States Computer Emergency Response Team (part of the Department of Homeland Security), and began working on a coordinated fix. Engineers from major technology vendors around the world converged on the Microsoft campus in March to coordinate their response. All of the vendors began repairing their products and agreed that a synchronized release, on a single day, would minimize the risk that malicious individuals could figure out the vulnerability before all vendors were able to offer secure versions of their products. The vulnerability is a complex issue, and there is no evidence to suggest that anyone with malicious intent knows how it works.
Slashdot: Your Mashup Is Probably Legal
Drupal time now! Summer of Code 2008 Mid-term Results wherein the Big G puts up some money to get the kiddos makin totally badass modules. Mostly these won't make a lot of sense to the outsiders among you, but they look good!
We are seeing a lot of these clever youngsters realizing that the 5.x modules were too specific, and it would be much better to write plugin module frameworks so that the redundant stuff can be minimized. So now fancy feature areas like Geographic bookmarking/plotting and WYSIWYG editors, two messy areas, would be streamlined as these projects mature.
Look at this! CCK GMap Address. Would look delicious! Wysiwyg looks like a needed fork of TinyMCE, and an abstraction.
More to be seen about this fun area here: Location and Mapping | groups.drupal.
Discussion of cool things:
When needed, this is nice: Drupal Modules - Search, Rate, and Review Drupal Modules.
On a related note, they have the official shit list of the government! US Foreign Enemies List is impressive - all the individuals in the PLO, Kahanists, the very bad al-Tikriti family in Iraq...
I think I am getting into a tangent here...