Wednesday, September 7, 2011
Friday, August 12, 2011
Monday, August 1, 2011
Internet Explorer Users Are Kinda Stupid...
On average, Internet Explorer users fared the worst, with IE6 users at the bottom of the pile and IE8 users performing slightly better. Firefox, Chrome and Safari fell in the middle with little difference between them. IE with Chrome Frame and Camino landed on top, along with Opera, whose users scored the highest (on average).
"The study showed a substantial relationship between an individual's cognitive ability and their choice of web browser," AptiQuant concluded. "From the test results, it is a clear indication that individuals on the lower side of the IQ scale tend to resist a change/upgrade of their browsers."
Saturday, July 16, 2011
Sunday, July 3, 2011
Saturday, July 2, 2011
Massive botnet 'indestructible,' say researchers - TDL-4
"TDL-4," the name for both the bot Trojan that infects machines and the ensuing collection of compromised computers, is "the most sophisticated threat today," said Kaspersky Labs researcher Sergey Golovanov in a detailed analysis Monday.
"[TDL-4] is practically indestructible," Golovanov said.
Saturday, June 18, 2011
The Government's Gadget Habit
Friday, June 17, 2011
Is This the Golden Age of Hacking?
Friday, June 3, 2011
LulzSec reveals massive Sony security breach
LulzSec hacks Sony Pictures, reveals 1m passwords unguarded HTML clipboard
Sony was embarrassed again on Thursday after Lulz Security posted that it had successfully hacked Sony Pictures' website. It lived up to its earlier promise and used a basic SQL injection attack to expose one million users' personal data, 3.5 million digital coupons and 75,000 music codes. The hacking team found that the information had few defenses and that none of the data, even including passwords, were stored in clear text.
Not all of the information could be taken due to resources and time, LulzSec said. As evidence, though, it posted a selection of what it had as evidence, including databases for related sites like AutoTrader, the coupons and codes, and the plain login information for some of the database. Administrator data was compromised both at the US site as well as from Belgium and the Netherlands.
LulzSec, which doesn't pursue hacks for commercial gain, cast itself as doing both Sony and the public as a favor. The move would push Sony to lock down its security more thoroughly across its sites. For end users, it was a warning as to how easily compromised Sony's sites were even after the PSN hack and several follow-ups from different sources.
"From a single injection, we accessed EVERYTHING," the team said. "Why do you put such faith in a company that allows itself to become open to these simple attacks?"
Sony hadn't responded to the breach as of Thursday but was ironically due to testify at a Congress hearing the same day on its security practices
Saturday, May 28, 2011
Wednesday, May 25, 2011
Monday, May 16, 2011
Sunday, May 15, 2011
Friday, May 6, 2011
Wednesday, May 4, 2011
Sunday, April 17, 2011
iPad eliminating thousands of American jobs.
Why do you need to go to Borders anymore?' asked Jackson.
'Why do you need to go to Barnes & Noble?
Buy an iPad, download your book, download your newspaper, download your magazine.'
'What becomes of publishing companies and publishing company jobs?
And what becomes of bookstores and librarians and all of the jobs associated with paper?
Well, in the not too distant future, such jobs simply will not exist.
Steve Jobs is doing pretty well. He's created the iPad.
Certainly, it has made life more efficient for Americans, but the iPad is produced in China.
It is not produced here in the United States."
Saturday, April 16, 2011
Saturday, April 9, 2011
Sunday, March 27, 2011
Wednesday, March 23, 2011
Splinternet, Or How We Broke the Good Old Web
Friday, March 18, 2011
New kind of quantum public key cryptography - Wooohooo!
Sunday, March 6, 2011
Saturday, March 5, 2011
DOA - SysAdmins
The Decline and Fall of System Administration"Deep End's Paul Venezia questions whether server virtualization technologies are contributing to the decline of real server administration skills, as more and more sysadmins argue in favor of re-imaging as a solution to Unix server woes.
'This has always been the (many times undeserved) joke about clueless Windows admins: They have a small arsenal of possible fixes, and once they've exhausted the supply, they punt and rebuild the server from scratch rather than dig deeper. On the Unix side of the house, that concept has been met with derision since the dawn of time, but as Linux has moved into the mainstream — and the number of marginal Linux admins has grown — those ideas are suddenly somehow rational.'"
Wednesday, March 2, 2011
Friday, February 18, 2011
Thursday, February 17, 2011
Friday, February 4, 2011
Internet Kill Switch is Easy, just ask Gates
"It's not that hard to shut the Internet down if you have military power where you can tell people that's what's going to happen," Gates said. "Whenever you do something extraordinary like that you're sort of showing people you're afraid of the truth getting out, so it's a very difficult tactic, but certainly it can be shut off."
The majority ISPs Internet connectivity from the rest of the world comes from a small group of backbone pipes....
"If you want people to stay at home and do nothing, why don't you turn the internet back on?" - Conan O'Brien
Wednesday, February 2, 2011
Monday, January 31, 2011
Wednesday, January 26, 2011
Facebook and Twitter The Pathological Problem
Twitter and Facebook don't connect people – they isolate them from reality...
Guardian The way in which people frantically communicate online via Twitter, Facebook and instant messaging can be seen as a form of modern madness, according to a leading American sociologist.
"A behaviour that has become typical may still express the problems that once caused us to see it as pathological," MIT professor Sherry Turkle writes in her new book, Alone Together, which is leading an attack on the information age.
Turkle's book, published in the UK next month, has caused a sensation in America, which is usually more obsessed with the merits of social networking. She appeared last week on Stephen Colbert's late-night comedy show, The Colbert Report. When Turkle said she had been at funerals where people checked their iPhones, Colbert quipped: "We all say goodbye in our own way."
Turkle's thesis is simple: technology is threatening to dominate our lives and make us less human. Under the illusion of allowing us to communicate better, it is actually isolating us from real human interactions in a cyber-reality that is a poor imitation of the real world.
Social networking under fresh attack as tide of cyber-scepticism sweeps US
The list of attacks on social media is a long one and comes from all corners of academia and popular culture. A recent bestseller in the US, The Shallows by Nicholas Carr, suggested that use of the internet was altering the way we think to make us less capable of digesting large and complex amounts of information, such as books and magazine articles. The book was based on an essay that Carr wrote in the Atlantic magazine.
It was just as emphatic and was headlined: Is Google Making Us Stupid?
Another strand of thought in the field of cyber-scepticism is found in The Net Delusion, by Evgeny Morozov. He argues that social media has bred a generation of "slacktivists". It has made people lazy and enshrined the illusion that clicking a mouse is a form of activism equal to real world donations of money and time.
Other books include The Dumbest Generation by Emory University professor Mark Bauerlein – in which he claims "the intellectual future of the US looks dim"– and We Have Met the Enemy by Daniel Akst, which describes the problems of self-control in the modern world, of which the proliferation of communication tools is a key component.
Turkle's book, however, has sparked the most debate so far. It is a cri de coeur for putting down the BlackBerry, ignoring Facebook and shunning Twitter. "We have invented inspiring and enhancing technologies, yet we have allowed them to diminish us," she writes... the social media generation, suggesting that Facebook was created by people who failed to fit in with the real world.
Is this creating the uncivil culture that has no empathy?
Fellow critics point to numerous incidents to back up their argument. Recently, media coverage of the death in Brighton of Simone Back focused on a suicide note she had posted on Facebook that was seen by many of her 1,048 "friends" on the site. Yet none called for help – instead they traded insults with each other on her Facebook wall. Read on at Guardian
Thursday, January 20, 2011
Computer Virus's Turn 25
Read more of this story at Slashdot
Wednesday, January 19, 2011
Tweet Age Wasteland... world of the web
- 107 trillion emails were sent
- 89% of that email was spam.
- Domain Names: Over 202 million are already taken. *
- There are 1.97 billion internet users in the world. That's 14% more than last year. Asia has 825 million, Europe has 475 million, North America has 266 million.
- There are 152 million blogs
- There were 25 billion tweets sent.
- Facebook had 600 million members.
Sunday, January 16, 2011
GOV on Facebook
Saturday, January 15, 2011
Friday, January 7, 2011
Hope for Change in Microsoft
CES: Microsoft Hacks Up Next OS as SOC
With the Pre-CES Keynote made by [Steve Ballmer], the announcement came that the next iteration of their operating system being available in SOC specific form. This will lead to windows being able to run a very diverse hardware set in a much more efficient manner than it does right now. Microsoft displayed 4 different versions of what the next generation prototypes are from 4 different manufacturers but there has been no work done yet on the GUI for SOC as [Ballmer] was very clear to mention that more than a couple of times.
The picture below is Intel's iteration of System on a Chip.
Thursday, January 6, 2011
How you can't avoid online tracking....
Even after you set your browser to delete existing cookies and ban new ones, download super-cookies and use the tools created by pro-privacy programmers, there's one data-gathering technique that you simply cannot avoid. Your computer has hundreds of settings that control things like the main interface language (English, Korean, etc.), sound and screen resolution settings, and the color schemes people set for their Microsoft Word documents.How to avoid online tracking. (Hint: you can't.)As you scroll the Internet, most websites automatically take snapshots of your settings. That information, combined with data on where you connect to the internet, can be used to track your movements around the web and build a profile about each visitor. To see how effective this is at tracing individual users, I ran a test designed by Eckerseley called Panopticlick on my own computer. I've only had this computer for about a month, so I haven't even taken the time to open my control panel and customize the settings for the track pad, keyboard, screen, etc. (The program doesn't search for computers or beacons on your computer.)
Nevertheless, Panopticlick found 20 bits of identifying information on my Mac. Using those bits, it could tell that I was a unique user and not one of the 1.3 million people who ran the test before me.
Wednesday, December 22, 2010
FCC approves controversial ‘Net Neutrality’ regulations
The rules authored by FCC Chairman Julius Genachowski would require ISPs to allow their customers to have access all legal online content, applications and services over their wired networks and prohibit unreasonable network discrimination.
But the plan would also allow for a greater fractioning of the Internet and data rationing on mobile and wired networks, according to analysis of the policies. Major network stakeholders like Verizon and AT&T would be able to sell bandwidth in capped tiers, with overage charges for users who download too much information, and certain types of data traffic like peer-to-peer file transfers could be banned altogether.
If they pass and telecoms are allowed to move forward with their plans, "the Internet as we know it would cease to exist," Sen. Franken concluded in an editorial published by Huffington Post.
"The FCC will be meeting to discuss those regulations, and we must make sure that its members understand that allowing corporations to control the Internet is simply unacceptable." Read more at RawStory
Thursday, December 16, 2010
WTF has a new meaning Zuckerberg
Society FAIL - Zuckerberg, TIME Magazine's Person of the Year
WTF!... Welcome To Facebook
Tuesday, December 14, 2010
new cloud computing looks like a plan "to push people into careless computing"
The risks include loss of legal rights to data if it is stored on a company's machine's rather than your own, Stallman points out: "In the US, you even lose legal rights if you store your data in a company's machines instead of your own. The police need to present you with a search warrant to get your data from you; but if they are stored in a company's server, the police can get it without showing you anything. They may not even have to give the company a search warrant."
...He sees a creeping problem: "I suppose many people will continue moving towards careless computing, because there's a sucker born every minute. The US government may try to encourage people to place their data where the US government can seize it without showing them a search warrant, rather than in their own property. However, as long as enough of us continue keeping our data under our own control, we can still do so. And we had better do so, or the option may disappear."
"I'd say the problem is in the nature of the job ChromeOS is designed to do. Namely, encourage you to keep your data elsewhere, and do your computing elsewhere, instead of doing it in your own computer."
Please read full at Guardian
Saturday, December 11, 2010
Thursday, December 9, 2010
Steve Wozniak: 'We've lost a lot of control'
"You used to ask a smart person a question. Now, who do you ask? It starts with g-o, and it's not God," he quipped.
Earlier that day, Wozniak said the biggest obstacle with the growing prevalence of technology is that our personal devices are unreliable.
"Little things that work one day; they don't work the next day," he said enthusiastically, waving his hands. "I think it's much harder today than ever before to basically know that something you have ... is going to work tomorrow."
Reciting an all-too-common living-room frustration, Wozniak told a story about the countless hours he spent trying to troubleshoot his media player, called Slingbox.
"There is no solution," Wozniak said of tech troubles. "Everything has a computer in it nowadays; everything with a computer is going to fail. The solution is: kill the people who invented these things," he said with a smile.
Saturday, November 27, 2010
NPR on the future of the Internet, 1993
17 years ago, Internet radio pioneer (and future rogue archivist) Carl Malamud and search engine inventor (and future Internet Archive founder) Brewster Kahle appeared on an historic segment of NPR's Science Friday to talk with Ira Flatow about the amazing future of the Internet.
Scientists from Xerox PARC helped them put this broadcast onto the Internet, and they even received call-ins from people on powerful Unix workstations at academic institutions with blazing-fast ISDN connections (which no doubt sent their sysadmins into a panic as the traffic across the campus routers spiked). Call-in guests asked how we'd manage the glut of information, how we'd figure out what was true, what you could do with your overstuffed email inbox, and, of course, how copyright would fare. Good times!
Science Friday, 1993: The Future of the Internet
Monday, November 15, 2010
Friday, October 29, 2010
World’s Fastest Supercomputer… Is Now In China
Saturday, October 23, 2010
Friday, October 22, 2010
Thursday, October 21, 2010
I, Product
I tweet, therefore I am...
You may think of yourself as a user of Google, Facebook or Amazon, but you are actually their product.
Forget 1984 and Brave New World. The men who wrote those books were dangerously naïve and not as prescient as we once believed. Instead of Big Brother looking after us, we're immersed in a dizzily delightful system that cares so much about us that it anticipates our every pleasure, like a giant planetary-class Vegas, an immense, inexhaustible Disney World. All we have to do is to preserve the illusion that we, "the users," have the power: in that ignorance, we can live happily ever after.
Sure, Google will provide you with search results, but they are not in the search business; they are in the advertising business. Their profits come from marketing firms that buy your behavior.
Similarly, Amazon is not in the book business, although they will send you the books you've ordered. They are in the personal information business.
The assets of modern web-based companies are the intimate profiles of those who "use" them, like you and me. Time to forget the nice pronouncements like "Do no evil" that accompany the wholesale destruction of privacy now taking place on the web, or rather within the walled gardens that companies like Facebook, Google and Apple are erecting around us on the web. Compared to them, the Chinese censors re-inventing their Great Wall are a bunch of sissies.
Well, who cares? Look at what we've gained: We now have access to unprecedented new riches. Movies and songs by the thousands; new "friends" by the hundreds; timely pieces of data by the millions. Our lives have become richer, more intelligent, more interesting.
The world moves on. You may have had privacy rights as a customer or a user but what makes you think you should retain those rights now that you're just a product?
Read More at the Boing2Wednesday, October 20, 2010
Monday, October 18, 2010
Sunday, October 17, 2010
Friday, October 15, 2010
Thursday, October 14, 2010
Sunday, October 10, 2010
Wiretapping the Internet - To tech with IT all!
...Formerly reserved for totalitarian countries, this wholesale surveillance of citizens has moved into the democratic world as well. Governments like Sweden, Canada and the United Kingdom are debating or passing laws giving their police new powers of internet surveillance, in many cases requiring communications system providers to redesign products and services they sell. More are passing data retention laws, forcing companies to retain customer data in case they might need to be investigated later.
Obama isn't the first U.S. president to seek expanded digital eavesdropping. The 1994 (CLINTON) CALEA law required phone companies to build ways to better facilitate FBI eavesdropping into their digital phone switches. Since 2001, the National Security Agency has built substantial eavesdropping systems within the United States.
These laws are dangerous, both for citizens of countries like China and citizens of Western democracies. Forcing companies to redesign their communications products and services to facilitate government eavesdropping reduces privacy and liberty; that's obvious. But the laws also make us less safe. Communications systems that have no inherent eavesdropping capabilities are more secure than systems with those capabilities built in.
Any surveillance system invites both criminal appropriation and government abuse. Function creep is the most obvious abuse: New police powers, enacted to fight terrorism, are already used in situations of conventional nonterrorist crime. Internet surveillance and control will be no different.
Please read more from the SCHNEIER