2 brothers software
Two Brothers Software, Providing Ergonomic Software including utilities and games, and web optimization since 2003
Two Brothers Software
HOME
Two Brothers Software
UTILITIES
Two Brothers Software
CONTACT
Two Brothers Software Shareware
SHAREWARE
Two Brothers Software Store
STORE
divider

HOME

CONTACT US

UTILITIES

divider



divider

SHAREWARE

divider

SPYWARE STATEMENT

divider

ART AND MUSIC

divider

STORE

divider



welcome to the Two Brothers Software Games Page. From this page you can access many of the games we have designed.

Games
Current we are not supporting any games.

© Two Brothers Software






Slashdot
Slashdot
News for nerds, stuff that matters

Scientists Discover How To Track Natural Errors In DNA Replication
by samzenpus
28 Jan 2015 at 6:00pm
BarbaraHudson writes Researchers figured out how to label and keep track of new pieces of DNA, and learned to follow the enzyme responsible for copying those pieces. Their research focused on enzymes called polymerases. These enzymes create small regions in DNA that act as scaffolds for the copied DNA. Scientists assumed that the body deletes the scaffolds containing errors, or mutations, and the standard computer models supported this theory. However, the actual research showed that about 1.5 percent of those erroneous scaffolds are left over, trapped within the DNA. After running models, scientists now believe they can track how DNA replicates and find the most likely areas where these scaffolds with errors turn up. The erroneous scaffolds usually appear close to genetic switches, those regions that turn on when genes activate. The mutations damage the switch, which results in genetic disease, as well as increasing the likelihood of cancer.

Read more of this story at Slashdot.









Adobe's Latest Zero-Day Exploit Repurposed, Targeting Adult Websites
by samzenpus
28 Jan 2015 at 5:17pm
MojoKid writes Adobe issued a patch for bug CVE-2015-0311, one that exposes a user's browser to become vulnerable to code injection, and the now infamous Angler EK (Exploit Kit). To fall victim to this kind of attack, all someone needs to do is visit a website with compromised Flash files, at which point the attacker can inject code and utilize Angler EK, which has proven to be an extremely popular tool over the past year. This particular version of Angler EK is different, however. For starters, it makes use of obfuscated JavaScript and attempts to detect virtual machines and anti-virus products. Its target audience is also rather specific: porn watchers. According to FireEye, which has researched the CVE-2015-0311 vulnerability extensively, this exploit has reached people via banner ads on popular adult websites. It was also noted that even a top 1000 website was affected, so it's not as though victims are surfing to the murkiest depths of the web to come in contact with it.

Read more of this story at Slashdot.










Newsfeed display by CaRP