Monday, August 1, 2011

Internet Explorer Users Are Kinda Stupid...

a "psychometric consulting" firm that provides hiring exams for businesses, gave online IQ tests to more than 100,000 people. Visitors arrived either through organic searches or through advertisements on other sites, and Aptiquant made a note of which browser each test taker was using.

On average, Internet Explorer users fared the worst, with IE6 users at the bottom of the pile and IE8 users performing slightly better. Firefox, Chrome and Safari fell in the middle with little difference between them. IE with Chrome Frame and Camino landed on top, along with Opera, whose users scored the highest (on average).

"The study showed a substantial relationship between an individual's cognitive ability and their choice of web browser," AptiQuant concluded. "From the test results, it is a clear indication that individuals on the lower side of the IQ scale tend to resist a change/upgrade of their browsers."

Read on at PC World


Saturday, July 2, 2011

Buddy Chilling

Maybe?

DaVinRock

Massive botnet 'indestructible,' say researchers - TDL-4

Computerworld - A new and improved botnet that has infected more than four million PCs is "practically indestructible," security researchers say.

"TDL-4," the name for both the bot Trojan that infects machines and the ensuing collection of compromised computers, is "the most sophisticated threat today," said Kaspersky Labs researcher Sergey Golovanov in a detailed analysis Monday.

"[TDL-4] is practically indestructible," Golovanov said.

Saturday, June 18, 2011

The Government's Gadget Habit

"The Federal procurement database reveals millions of dollars are being spent on gadgets. Over the past 10 years, the US government has spent $117 million on BlackBerries (including service plans), almost $18 million on iOS devices, about $1 million on PS3s, over $500k on Xboxes, and somehow, $12k on Zunes." - SlashDot

Friday, June 17, 2011

Is This the Golden Age of Hacking?

"With a seemingly continuous wave of attacks hitting the public and commercial sectors, there has never been a more prodigious period for hackers, argues PC Pro. What has led to the sudden hacking boom? Ease of access to tools has also led to an explosion in the numbers of people actively looking for companies with weakened defenses, according to security experts. Meanwhile, the recession has left thousands of highly skilled IT staff out of work and desperate for money, while simultaneously crimping companies' IT security budgets. The pressure to get systems up and running as quickly as possible also means that networks aren't locked down as tightly as they should be, which can leave back doors open for hackers." - SlashDot

Friday, June 3, 2011

LulzSec reveals massive Sony security breach

LulzSec hacks Sony Pictures, reveals 1m passwords unguarded HTML clipboard

Sony was embarrassed again on Thursday after Lulz Security posted that it had successfully hacked Sony Pictures' website. It lived up to its earlier promise and used a basic SQL injection attack to expose one million users' personal data, 3.5 million digital coupons and 75,000 music codes. The hacking team found that the information had few defenses and that none of the data, even including passwords, were stored in clear text.

http://cache.gawkerassets.com/assets/images/7/2011/06/medium_lulzsec.jpg

Not all of the information could be taken due to resources and time, LulzSec said. As evidence, though, it posted a selection of what it had as evidence, including databases for related sites like AutoTrader, the coupons and codes, and the plain login information for some of the database. Administrator data was compromised both at the US site as well as from Belgium and the Netherlands.

LulzSec, which doesn't pursue hacks for commercial gain, cast itself as doing both Sony and the public as a favor. The move would push Sony to lock down its security more thoroughly across its sites. For end users, it was a warning as to how easily compromised Sony's sites were even after the PSN hack and several follow-ups from different sources.

"From a single injection, we accessed EVERYTHING," the team said. "Why do you put such faith in a company that allows itself to become open to these simple attacks?"

Sony hadn't responded to the breach as of Thursday but was ironically due to testify at a Congress hearing the same day on its security practices



Sunday, April 17, 2011

iPad eliminating thousands of American jobs.

"on an anti-technology rant on Friday on the floor of Congress, http://www.motifake.com/image/demotivational-poster/small/1003/taking-over-the-world-ipad-apple-fail-demotivational-poster-1267796770.jpgblaming the iPad for eliminating thousands of American jobs. '
Why do you need to go to Borders anymore?' asked Jackson.
'Why do you need to go to Barnes & Noble?

Buy an iPad, download your book, download your newspaper, download your magazine.'
 
'What becomes of publishing companies and publishing company jobs?
And what becomes of bookstores and librarians and all of the jobs associated with paper?
Well, in the not too distant future, such jobs simply will not exist.
Steve Jobs is doing pretty well. He's created the iPad.
Certainly, it has made life more efficient for Americans, but the iPad is produced in China.
It is not produced here in the United States."

Wednesday, March 23, 2011

Splinternet, Or How We Broke the Good Old Web

HTML clipboard SlashDot - "I don't want to be that scruffy guy with 'The end is nigh' sign and some really bad dental problems, but most industry analysts already noticed that global Internet is coming apart, changing into a cluster of smaller and more closed webs. They have even created a catchy name for this Web 3.0 – the Splinternet.

Friday, March 18, 2011

New kind of quantum public key cryptography - Wooohooo!

"Public key cryptography allows anybody to encrypt a message using a public key but only those with another private key can decrypt the message. That's possible because of certain mathematical functions that are easy to perform in one direction but hard to do in reverse. The most famous example is multiplication. It's easy to multiply two numbers together to get a third but hard to start with the third number and work out its factors. Now Japanese researchers have discovered a quantum problem that is hard to solve in one direction but easy to do in reverse. This asymmetry, they say, could form the basis of a new kind of quantum public key cryptography. Their system is based on the problem of distinguishing between two ensembles of quantum states. This is similar to the problem of determining whether two graphs are identical, ie whether they correspond vertex-for-vertex and edge-for-edge. Increasing the complexity of the graph can always make this problem practically impossible for a quantum computer to solve in a reasonable time. But knowing the structure of a subset of the graph makes this problem easy, so this acts as a kind of private key for decrypting messages."

Saturday, March 5, 2011

Chain of Fools : Upgrading through every version of windows (HQ)

DOA - SysAdmins

The Decline and Fall of System Administration"Deep End's Paul Venezia questions whether server virtualization technologies are contributing to the decline of real server administration skills, as more and more sysadmins argue in favor of re-imaging as a solution to Unix server woes.

http://www.thinkgeek.com/images/blog/devotion_to_duty.jpg

'This has always been the (many times undeserved) joke about clueless Windows admins: They have a small arsenal of possible fixes, and once they've exhausted the supply, they punt and rebuild the server from scratch rather than dig deeper. On the Unix side of the house, that concept has been met with derision since the dawn of time, but as Linux has moved into the mainstream — and the number of marginal Linux admins has grown — those ideas are suddenly somehow rational.'"

Friday, February 4, 2011

Internet Kill Switch is Easy, just ask Gates

Register When US TV anchor Katie Couric asked the Microsoft co-founder and chairman if he was surprised that Egyptian president Hosni Mubarak could take the unprecedented step of killing the entire Egyptian internet, Gates responded with an emphatic: "no".

"It's not that hard to shut the Internet down if you have military power where you can tell people that's what's going to happen," Gates said. "Whenever you do something extraordinary like that you're sort of showing people you're afraid of the truth getting out, so it's a very difficult tactic, but certainly it can be shut off."

The majority ISPs Internet connectivity from the rest of the world comes from a small group of backbone pipes....
"If you want people to stay at home and do nothing, why don't you turn the internet back on?" - Conan O'Brien

Wednesday, January 26, 2011

Facebook and Twitter The Pathological Problem

Twitter and Facebook don't connect people – they isolate them from reality...

Guardian The way in which people frantically communicate online via Twitter, Facebook and instant messaging can be seen as a form of modern madness, according to a leading American sociologist.

"A behaviour that has become typical may still express the problems that once caused us to see it as pathological," MIT professor Sherry Turkle writes in her new book, Alone Together, which is leading an attack on the information age.

Turkle's book, published in the UK next month, has caused a sensation in America, which is usually more obsessed with the merits of social networking. She appeared last week on Stephen Colbert's late-night comedy show, The Colbert Report. When Turkle said she had been at funerals where people checked their iPhones, Colbert quipped: "We all say goodbye in our own way."

Turkle's thesis is simple: technology is threatening to dominate our lives and make us less human. Under the illusion of allowing us to communicate better, it is actually isolating us from real human interactions in a cyber-reality that is a poor imitation of the real world.


Social networking under fresh attack as tide of cyber-scepticism sweeps US

The list of attacks on social media is a long one and comes from all corners of academia and popular culture. A recent bestseller in the US, The Shallows by Nicholas Carr, suggested that use of the internet was altering the way we think to make us less capable of digesting large and complex amounts of information, such as books and magazine articles. The book was based on an essay that Carr wrote in the Atlantic magazine.

demotivational posters - FACEBOOK

It was just as emphatic and was headlined: Is Google Making Us Stupid?

Another strand of thought in the field of cyber-scepticism is found in The Net Delusion, by Evgeny Morozov. He argues that social media has bred a generation of "slacktivists". It has made people lazy and enshrined the illusion that clicking a mouse is a form of activism equal to real world donations of money and time.

Other books include The Dumbest Generation by Emory University professor Mark Bauerlein – in which he claims "the intellectual future of the US looks dim"– and We Have Met the Enemy by Daniel Akst, which describes the problems of self-control in the modern world, of which the proliferation of communication tools is a key component.

Turkle's book, however, has sparked the most debate so far. It is a cri de coeur for putting down the BlackBerry, ignoring Facebook and shunning Twitter. "We have invented inspiring and enhancing technologies, yet we have allowed them to diminish us," she writes... the social media generation, suggesting that Facebook was created by people who failed to fit in with the real world.


Is this creating the uncivil culture that has no empathy? 
Fellow critics point to numerous incidents to back up their argument. Recently, media coverage of the death in Brighton of Simone Back focused on a suicide note she had posted on Facebook that was seen by many of her 1,048 "friends" on the site. Yet none called for help – instead they traded insults with each other on her Facebook wall. Read on at Guardian

Thursday, January 20, 2011

Computer Virus's Turn 25

"Happy anniversary Brain Virus, the first bit of malware capable of infecting a DOS-based PC. Back in those relatively innocent times, the brothers actually embedded their real names and business address in the code and later told Time magazine they had written the virus to protect their medical software from piracy. Who knows what they were really thinking, but by all accounts the Brain Virus was relatively harmless. Twenty-five years later, most malware is anything but benign and cyber criminals pull off exploits the Alvi brothers never envisioned."
Read more of this story at Slashdot

Wednesday, January 19, 2011

Tweet Age Wasteland... world of the web

  • 107 trillion emails were sent
  • 89% of that email was spam.
  • Domain Names: Over 202 million are already taken. *
  • There are 1.97 billion internet users in the world. That's 14% more than last year. Asia has 825 million, Europe has 475 million, North America has 266 million.
  • There are 152 million blogs
  • There were 25 billion tweets sent.
  • Facebook had 600 million members.
There are a lot more numbers in Pingdom's post.

Sunday, January 16, 2011

GOV on Facebook

"Congress was broadcast live on Facebook for the first time in history. Now you can waste time and not get work done by watching Congress waste time and not get work done." —Jimmy Fallon

Friday, January 7, 2011

Hope for Change in Microsoft

Apparently MS is getting tired of getting kicked around by IOS and Android... Can they catch up at this point? 

CES: Microsoft Hacks Up Next OS as SOC


With the Pre-CES Keynote made by [Steve Ballmer], the announcement came that the next iteration of their operating system being available in SOC specific form.  This will lead to windows being able to run a very diverse hardware set in a much more efficient manner than it does right now.  Microsoft displayed 4 different versions of what the next generation prototypes are from 4 different manufacturers but there has been no work done yet on the GUI for SOC as [Ballmer] was very clear to mention that more than a couple of times. 

The picture below is Intel's iteration of System on a Chip.

Read more at HackAday

Thursday, January 6, 2011

How you can't avoid online tracking....

Where ever, where ever you are... I will follow
Even after you set your browser to delete existing cookies and ban new ones, download super-cookies and use the tools created by pro-privacy programmers, there's one data-gathering technique that you simply cannot avoid. Your computer has hundreds of settings that control things like the main interface language (English, Korean, etc.), sound and screen resolution settings, and the color schemes people set for their Microsoft Word documents.

As you scroll the Internet, most websites automatically take snapshots of your settings. That information, combined with data on where you connect to the internet, can be used to track your movements around the web and build a profile about each visitor. To see how effective this is at tracing individual users, I ran a test designed by Eckerseley called Panopticlick on my own computer. I've only had this computer for about a month, so I haven't even taken the time to open my control panel and customize the settings for the track pad, keyboard, screen, etc. (The program doesn't search for computers or beacons on your computer.)

Nevertheless, Panopticlick found 20 bits of identifying information on my Mac. Using those bits, it could tell that I was a unique user and not one of the 1.3 million people who ran the test before me.

How to avoid online tracking. (Hint: you can't.)

Wednesday, December 22, 2010

FCC approves controversial ‘Net Neutrality’ regulations

RawStory -  Sen. Al Franken (D-MN), who has championed "Net Neutrality" in the HTML clipboardHTML clipboardhttps://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhdII1jeVkADWThMCIHaYjQncEkXp0g4SSF9XFot5z94Zuz3xnvIzwQOSjWPbpP7xDCTkIDXtMcofNxja3dEW9eshnRZHi3Zhs2fIVju6BSL51NgtqqlA-07rKh3UR_hG-fNkoj7MAdD8A/?imgmax=800past, said the FCC's proposed rules would actually "destroy" the principle of "Net Neutrality."

The rules authored by FCC Chairman Julius Genachowski would require ISPs to allow their customers to have access all legal online content, applications and services over their wired networks and prohibit unreasonable network discrimination.

But the plan would also allow for a greater fractioning of the Internet and data rationing on mobile and wired networks, according to analysis of the policies. Major network stakeholders like Verizon and AT&T would be able to sell bandwidth in capped tiers, with overage charges for users who download too much information, and certain types of data traffic like peer-to-peer file transfers could be banned altogether.

If they pass and telecoms are allowed to move forward with their plans, "the Internet as we know it would cease to exist," Sen. Franken concluded in an editorial published by Huffington Post.

"The FCC will be meeting to discuss those regulations, and we must make sure that its members understand that allowing corporations to control the Internet is simply unacceptable." Read more at RawStory

Thursday, December 16, 2010

WTF has a new meaning Zuckerberg

Society FAIL - Zuckerberg, TIME Magazine's Person of the Year

WTF!... Welcome To Facebook

demotivational posters - WTF

Tuesday, December 14, 2010

new cloud computing looks like a plan "to push people into careless computing"

http://www.masternewmedia.org/images/free_as_in_freedom_book_cover_richard_stallman.gifGuardian...making extensive use of cloud computing was "worse than stupidity" because it meant a loss of control of data, warns Richard Stallman, founder of the Free Software Foundation and creator of the operating system GNU.

HTML clipboardNow he says he is increasingly concerned about the release by Google of its ChromeOS operating system, which is based on GNU/Linux and designed to store the minimum possible data locally. Instead it relies on a data connection to link to Google's "cloud" of servers, which are at unknown locations, to store documents and other information.

The risks include loss of legal rights to data if it is stored on a company's machine's rather than your own, Stallman points out: "In the US, you even lose legal rights if you store your data in a company's machines instead of your own. The police need to present you with a search warrant to get your data from you; but if they are stored in a company's server, the police can get it without showing you anything. They may not even have to give the company a search warrant."

...He sees a creeping problem: "I suppose many people will continue moving towards careless computing, because there's a sucker born every minute. The US government may try to encourage people to place their data where the US government can seize it without showing them a search warrant, rather than in their own property. However, as long as enough of us continue keeping our data under our own control, we can still do so. And we had better do so, or the option may disappear."

"I'd say the problem is in the nature of the job ChromeOS is designed to do. Namely, encourage you to keep your data elsewhere, and do your computing elsewhere, instead of doing it in your own computer."


Please read full at Guardian

Thursday, December 9, 2010

Steve Wozniak: 'We've lost a lot of control'

CNN -  "All of a sudden, we've lost a lot of control," he said. "We can't turn off our internet; we can't turn off our smartphones; we can't turn off our computers."

"You used to ask a smart person a question. Now, who do you ask? It starts with g-o, and it's not God," he quipped.

Earlier that day, Wozniak said the biggest obstacle with the growing prevalence of technology is that our personal devices are unreliable.

"Little things that work one day; they don't work the next day," he said enthusiastically, waving his hands. "I think it's much harder today than ever before to basically know that something you have ... is going to work tomorrow."

Reciting an all-too-common living-room frustration, Wozniak told a story about the countless hours he spent trying to troubleshoot his media player, called Slingbox.

"There is no solution," Wozniak said of tech troubles. "Everything has a computer in it nowadays; everything with a computer is going to fail. The solution is: kill the people who invented these things," he said with a smile.

Saturday, November 27, 2010

NPR on the future of the Internet, 1993

VIA boing2

17 years ago, Internet radio pioneer (and future rogue archivist) Carl Malamud and search engine inventor (and future Internet Archive founder) Brewster Kahle appeared on an historic segment of NPR's Science Friday to talk with Ira Flatow about the amazing future of the Internet.
Scientists from Xerox PARC helped them put this broadcast onto the Internet, and they even received call-ins from people on powerful Unix workstations at academic institutions with blazing-fast ISDN connections (which no doubt sent their sysadmins into a panic as the traffic across the campus routers spiked). Call-in guests asked how we'd manage the glut of information, how we'd figure out what was true, what you could do with your overstuffed email inbox, and, of course, how copyright would fare. Good times!

Science Friday, 1993: The Future of the Internet


Friday, October 29, 2010

World’s Fastest Supercomputer… Is Now In China

Nvidia- Tianhe-1A, a new supercomputer designed by the National University of Defense Technology (NUDT) in China has set a new performance record of 2.507 petaflops, making it the fastest system in the world today.

Thursday, October 21, 2010

I, Product

I tweet, therefore I am...

You may think of yourself as a user of Google, Facebook or Amazon, but you are actually their product.

 Photos Uncategorized 2008 02 21 Barcode 2Forget 1984 and Brave New World. The men who wrote those books were dangerously naïve and not as prescient as we once believed. Instead of Big Brother looking after us, we're immersed in a dizzily delightful system that cares so much about us that it anticipates our every pleasure, like a giant planetary-class Vegas, an immense, inexhaustible Disney World. All we have to do is to preserve the illusion that we, "the users," have the power: in that ignorance, we can live happily ever after.

Sure, Google will provide you with search results, but they are not in the search business; they are in the advertising business. Their profits come from marketing firms that buy your behavior.

Similarly, Amazon is not in the book business, although they will send you the books you've ordered. They are in the personal information business.

The assets of modern web-based companies are the intimate profiles of those who "use" them, like you and me. Time to forget the nice pronouncements like "Do no evil" that accompany the wholesale destruction of privacy now taking place on the web, or rather within the walled gardens that companies like Facebook, Google and Apple are erecting around us on the web. Compared to them, the Chinese censors re-inventing their Great Wall are a bunch of sissies.

Well, who cares? Look at what we've gained: We now have access to unprecedented new riches. Movies and songs by the thousands; new "friends" by the hundreds; timely pieces of data by the millions. Our lives have become richer, more intelligent, more interesting.

The world moves on. You may have had privacy rights as a customer or a user but what makes you think you should retain those rights now that you're just a product?

Read More at the Boing2

Sunday, October 10, 2010

Wiretapping the Internet - To tech with IT all!

SCHNEIER On Monday, The New York Times reported that President Obama will seek sweeping laws enabling law enforcement to more easily eavesdrop on the internet. Technologies are changing, the administration argues, and modern digital systems aren't as easy to monitor as traditional telephones. http://www.synapseproductions.org/whatson/images/1984web.jpg

...Formerly reserved for totalitarian countries, this wholesale surveillance of citizens has moved into the democratic world as well. Governments like Sweden, Canada and the United Kingdom are debating or passing laws giving their police new powers of internet surveillance, in many cases requiring communications system providers to redesign products and services they sell. More are passing data retention laws, forcing companies to retain customer data in case they might need to be investigated later.

HTML clipboard

Obama isn't the first U.S. president to seek expanded digital eavesdropping. The 1994 (CLINTON) CALEA law required phone companies to build ways to better facilitate FBI eavesdropping into their digital phone switches. Since 2001, the National Security Agency has built substantial eavesdropping systems within the United States.

These laws are dangerous, both for citizens of countries like China and citizens of Western democracies. Forcing companies to redesign their communications products and services to facilitate government eavesdropping reduces privacy and liberty; that's obvious. But the laws also make us less safe. Communications systems that have no inherent eavesdropping capabilities are more secure than systems with those capabilities built in.

Any surveillance system invites both criminal appropriation and government abuse. Function creep is the most obvious abuse: New police powers, enacted to fight terrorism, are already used in situations of conventional nonterrorist crime. Internet surveillance and control will be no different.

Please read more from the SCHNEIER