Co-authored by Arvind Narayanan. Debates over web tracking and Do Not Track tend to be framed as a clash between consumer privacy and business need. That’s not quite right. There is, in fact, a spectrum of possible tradeoffs between business interests and consumer privacy. Our aim with the Tracking Not Required series is to show how those tradeoffs are not at all linear; it is possible to swap a little functionality for a lot of privacy. Tracking Not Required: Frequency Capping « Web Policy
Google HQ Bans Microsoft Windows In-House After Hacking Scare The Financial Times reports that according to Google sources, all versions of Microsoft's Windows OS are henceforth banned. Employees will instead be able to choose between Apple's Mac OS and Linux. Google employees have until now been able to choose their OS of choice, but apparently due to security concerns in the wake of that whole hacking mess, the Google higher-ups have deemed Windows too risky to support. Google declined to comment.
Amazon EC2 cloud is made up of almost half-a-million Linux servers Almost half-a-million Amazon cloud servers run Linux every day. We know that Linux on servers is big and getting bigger. We also knew that Linux, thanks to open-source cloud programs like Eucalyptus and OpenStack, was growing fast on clouds. What he hadn't know that Amazon's Elastic Compute Cloud (EC2), had close to half-a-million servers already running on a Red Hat Linux variant. Huang Liu, a Research Manager with Accenture Technology Lab with a Ph.D. in Electrical Engineering whose has done extensive work on cloud-computing, analyzed EC2's infrastructure and found that Amazon EC2 is currently made up of 454,400 servers. While Amazon has never officially said what it's running as EC2's base operating system, it's generally accepted that it's a customized version of Red Hat Enterprise Linux (RHEL).
Powerful tool for creating web surveys. Online survey software made easy!
Web Upd8: Ubuntu / Linux blog Laptop Mode Tools is a package that allows you to extend the battery life of your laptop by enabling the Laptop Mode Linux kernel feature along with other power-related tweaks. This was a command line only tool until version 1.64, which introduces a GUI that lets you toggle individual power saving modules. The new GUI configuration tool isn't exactly pretty as you can see in the screenshot below, but it's definitely an useful addition because it no longer requires users to work with various configuration files.
Every day, the citizens of the Internet send each other billions of e-mail messages. If you're online a lot, you yourself may send a dozen or more e-mails each day without even thinking about it. Obviously, e-mail has become an extremely popular communication tool. Have you ever wondered how e-mail gets from your computer to a friend halfway around the world? What is a POP3 server, and how does it hold your mail? How E-mail Works"
Online tools and applications - Go2web20 fontpro.com Font Pro - is a free fonts database with awesome typeface testing tool. It provides more than 20,000 free fonts and web fonts. Font Pro has made the process of searching fonts, previewing fonts, collecting fonts, to discovering new font combinations super easy and awesome. This tool can save hours of design time every week.
IBM and the Holocaust is a book by investigative journalist Edwin Black which details the business dealings of the American-based multinational corporation International Business Machines (IBM) and its German and other European subsidiaries with the government of Adolf Hitler during the 1930s and the years of World War II. In the book Black outlines the way in which IBM's technology helped facilitate Nazi genocide through generation and tabulation of punch cards based upon national census data. Synopsis Black details the ongoing business relationship between Watson's IBM and the emerging German regime headed by Adolf Hitler and his National Socialist German Workers Party (NSDAP). Hitler came to power in January 1933; on March 20 of that same year he established a concentration camp for political prisoners in the Bavarian town of Dachau, just outside the city of Munich. Repression against political opponents and the country's substantial ethnic Jewish population began at once. IBM and the Holocaust
Welcome to SecurityTube!
Sslstrip Tutorial Description: SSLstrip was released by Moxie to demonstrate the vulnerabilities he spoke about at Blackhat 2009. In this video we will look at how to get started with SSLstrip. We setup 2 vmware machines, one running Widnows XP (victim) and the other Backtrack 3 (Attacker). Before we actually begin hacking using SSLstrip, we need to setup the entire Man in the Middle Mechanism and packet redirection / forwarding mechanism. We do this by using the following commands in sequence: Sslstrip Tutorial
Night School News, Videos, Reviews and Gossip - Lifehacker
Computer Security Jane F. Kinkus Mathematical Sciences Librarian Purdue Universityjkinkus@purdue.edu The term computer security is used frequently, but the content of a computer is vulnerable to few risks unless the computer is connected to other computers on a network. Computer Security
Free Tech Support - Computer Questions and Answers - Ask Bob Rankin Recent Comments Comment by Rich on Geekly Update - 10 April 2014 (April 11, 2014 12:43 AM)I thought the oldest torrent on The Pirate Bay would be a rerun of "I Love Lucy".... Comment by Lee McIntyre on Windows 8 File History (April 10, 2014 09:25 PM)I have the same question as Art: "Can the external device also be used for other storage, or is it reserved exclusively for File History?" Tha...
News Release SANTA MONICA, CA -- Google has allowed its social network to become a virtual playground for online ... social network, Google+.” In a letter to Google CEO Larry Page and Executive Chairman Eric Schmidt, ... that Google+ has become a virtual playground for online predators. Consumer Watchdog’s own study confirmed many ... SANTA MONICA, CA. – Google’s latest proposal to settle a European antitrust investigation does nothing ... Commission. Search | Consumer Watchdog
Since it's hard to trust what companies that get your data will do with it, the best way to maintain your privacy online is to minimize what you give them. Create accounts with pseudonyms or variants of your name (yes, even Facebook and Google+). Supply only profile information that is absolutely necessary, and lie about critical stuff like birthdates. Your Privacy Kind of Sucks, Fix it Up This Weekend
Block Sites from Using Your Facebook Login with Adblock Plus