We at Bio::Neos believe that giving back to the community is of important which is why, I committed to be the lead instructor for the Dev/Iowa Summer Series this year. For the past 9 weeks I have been exposing our group of students to web development tools, frameworks, and best practices.
This past weekend, Bio::Neos was called out in the UI College of Liberal arts commencement speech by UI President Sally Mason. Thanks for the mention! We were pleasantly surprised to hear that our name had come up, and grateful for all of the support from the UI, JPEC, and everyone we have worked with in Iowa and Iowa City for the past eleven years.
Start watching at 6 minutes!
For the last three years I have been given the chance to return to my Alma Mater, the University of Iowa College of Engineering, as a guest judge for the Huber E. Storer Start-up Award. As a judge, I have gotten to see a lot of great pitches by some motivated and passionate engineers who will surely have a place in shaping our future world.
A colleague pointed me to a site with some BAM and VCF analysis tools, real-time and over the web. It’s fun to use, and might make for some good instructional content.
We have been interested in developing training tools for various diseases (inherited eye diseases, deafness, cancer, and others). Here is a nice site that provides "radiology tutorials." Nice example of using images, image annotation, and wiki-style background information.
The site is here:
So apparently Chrome maintains a list of "unsafe" ports (or maybe a list of safe ones). I did not know this... and got a minor headache from it.
I was trying to setup a new printer remotely on one of my workstations that currently is configured to allow access to CUPS only locally on port 631 (default setup). That's easy enough, I'll just use SSH's port forwarding to allow my connection to appear local to cups:
There was a release of denyhosts that finally fixes this bug! (Maybe the RHEL EPEL maintenance crew read my blog post, haha). So as long as you patch through 2.6-6.el5 (or equivalent if you are running a newer version of CentOS/RHEL/etc) then you will not have this issue. Thanks EPEL team!
Original article for reference
So, I hesitate to call this a vulnerability, but it definitely is a critical issue.