Parted Magic – Partitioning, Cloning, Recovery, and Rescue Software

The Parted Magic OS employs core programs of GParted and Parted to handle partitioning tasks with ease, while featuring other useful software (e.g. Partimage, TestDisk, Truecrypt, Clonezilla, G4L, SuperGrubDisk, ddrescue, etc…) and an excellent set of info to benefit the user.

parted-mgic-002

This is probably the most thoroughly tested version of Parted Magic we’ve done in awhile. More attention was given to fixing old problems then adding new features. That’s not to say there are a few new ones.

 

Read More: Parted Magic – Partitioning, Cloning, Recovery, and Rescue Software

VLC media player reaches 2.0.8 a small update

VLC is a free and open source cross-platform multimedia player and framework that plays most multimedia files as well as DVD, Audio CD, VCD, and various streaming protocols.

vlc-2253v

2.0.8 specific changes:

  • 2.0.8 is a small update that fixes some regressions of the 2.0.x branch of VLC.
  • 2.0.8 fixes numerous crashes and dangerous behaviors.
  • 2.0.8 also fixes ISDB-S tunning and some OSX issues.

With faster decoding on multi-core, GPU, and mobile hardware and the ability to open more formats, notably professional, HD and 10bits codecs, 2.0 was a major upgrade for VLC.

Read More: VLC media player reaches 2.0.8

Fast Food Hamburgers Made up of as Little as 2% ACTUAL Meat

hamburger-263x164

For the study, researchers analyzed the content of 8 fast food hamburger brands. To ensure that there was no bias in the results, they assigned each hamburger with an anonymously designated name, ranging from H1 to H8. While it would only logical to assume that hamburgers are made up primarily of meat, much of the 5 billion hamburgers consumed by Americans annually actual contain very little meat (and could contain a whole host of other ingredients.

Snort an open source network intrusion prevention system

Snort is an open source network intrusion prevention system, capable of performing real-time traffic analysis and packet logging on IP networks. It can perform protocol analysis, content searching/matching, and can be used to detect a variety of attacks and probes, such as buffer overflows, stealth port scans, CGI attacks, SMB probes, OS fingerprinting attempts, and much more.

snort-00s

Snort has three primary uses: It can be used as a straight packet sniffer like tcpdump, a packet logger (useful for network traffic debugging, etc), or as a full blown network intrusion prevention system.

Read More: Snort 2.9.5.3 is now available