An electric race car has lapped Daytona for the first time

This is the Hyundai Veloster N ETCR, an electric racing car being developed for a new EV touring car category. [credit:
LAT Images ]

The annual 24-hour race at Daytona International Speedway in Florida got under way on Saturday afternoon. And this year’s race has been a pretty good one so far—although there are still nearly seven hours left to run as I write this. This year is the 59th running of a race that has become, unofficially at least, the start of the year’s racing season for many. But on Friday, the 3.5-mile (5.6km) road course tried something new, when an electric racing car took to the track for for some demonstration laps: the first time a racing EV has done so. With any luck, it may be a herald of things to come as the sport’s organizers explore the potential


Original URL: https://arstechnica.com/?p=1738501

Original article

Perl.com Domain Stolen, Now Using IP Address of Past Malware Campaigns

“The domain name perl.com was stolen and now points to an IP address associated with malware campaigns,” reports Bleeping Computer:

Perl.com is a site owned by Tom Christiansen and has been used since 1997 to post news and articles about the Perl programming language. On January 27th, Perl programming author and Perl.com editor brian d foy tweeted that the perl.com domain was suddenly registered under another person. Intellectual property lawyer John Berryhill later replied to the tweet that the domain was stolen in September 2020 while at Network Solutions, transferred to a registrar in China on Christmas Day, and finally moved to the Key-Systems registrar on January 27th, 2020.

It wasn’t until the last transfer that the IP addresses assigned to the domain were changed from 151.101.2.132 to the Google Cloud IP address 35.186.238[.]101…

On the 28th, d foy tweeted that they have set up perl.com temporarily at http://perldotcom.perl.org for users


Original URL: http://rss.slashdot.org/~r/Slashdot/slashdot/~3/XX-qMEMVvyo/perlcom-domain-stolen-now-using-ip-address-of-past-malware-campaigns

Original article

Proudly powered by WordPress | Theme: Baskerville 2 by Anders Noren.

Up ↑

%d bloggers like this: