PirateBox. PP. PHP: a fractal of bad design - fuzzy notepad. (This article has been translated into Thanks!)
Preface I’m cranky. I complain about a lot of things.  25 Years of IBM’s OS/2: The Strange Days and Surprising Afterlife of a Legendary Operating System. It was one of the most ambitious computer-product announcements in history.
On April 2, 1987, at twin press conferences in New York and Miami, IBM unveiled its plans to reinvent the PC industry, which it had jump-started less than six years earlier with the introduction of the first IBM PC. The company introduced four new computers dubbed the PS/2 line, including an $11,000 model that it said was seven times faster than current models. The new products were rife with advanced features, including 32-bit processors, fancy graphics, 3.5-in. hard-shell floppy-disk drives and optical storage. And the new hardware was accompanied by a next-generation operating system, OS/2.
The Anonymous Power. Entreprises dominant le secteur. Web memes. The Streisand Effect. Jeux vidéos | PC. Crowdsourcing : violence urbaine & incivilités. Semantic Web. YouTube - Wild Wild Web - Pris dans la toile. Sous le règne du buzz, malaise dans la politique et l'informatio. Narvic buzze-t-il? Débat de blogueurs : buzz, morale et sémantique - Miscellanée de. Arditi et la tirade d'anti-net. Image Circle. Akinator, le génie du Web. Comment marche Akinator, le site qui lit dans vos pensées ? Microsoft Quashed Effort to Boost Online Privacy.
Graffiti Analysis at MALAU – ZEITUNG & INTERNET SPIEGEL.
 Long Live the Web. The world wide web went live, on my physical desktop in Geneva, Switzerland, in December 1990.
It consisted of one Web site and one browser, which happened to be on the same computer. The simple setup demonstrated a profound concept: that any person could share information with anyone else, anywhere. In this spirit, the Web spread quickly from the grassroots up. Today, at its 20th anniversary, the Web is thoroughly integrated into our daily lives. We take it for granted, expecting it to “be there” at any instant, like electricity.  Things a hacked URL shortening service could do to you. Posted in Tech blog on June 23rd, 2009 by Pingdom URL shortening services have been around for a long time (TinyURL started back in 2002) but it wasn’t until Twitter started gaining momentum that they became widely popular.
Now we have a TON of them, including the original TinyURL, Bit.ly, Is.gd, and many, many more. We have all placed an enormous amount of trust in these services by using them to such a large extent.  Is the Web heading toward redirect hell ? Google is doing it.
Facebook is doing it. Yahoo is doing it. Microsoft is doing it. And soon Twitter will be doing it. We’re talking about the apparent need of every web service out there to add intermediate steps to sample what we click on before they send us on to our real destination.  The Great Cyberheist.  The Shadow Internet. They start with a single stolen file and pump out bootleg games and movies by the millions.
Inside the pirate networks that are terrorizing the entertainment business. By Jeff HowePage 1 of 4 next » Just over a year ago, a hacker penetrated the corporate servers at Valve, the game company behind the popular first-person shooter Half-Life. He came away with a beta version of Half-Life 2. "We heard about it," says 23-year-old Frank, a well-connected media pirate.  Bruit et silence dans les vieilles réclames. What Happened to Yahoo. August 2010 When I went to work for Yahoo after they bought our startup in 1998, it felt like the center of the world.
It was supposed to be the next big thing. It was supposed to be what Google turned out to be. What went wrong?  Secrets of the Little Blue Box. Why this is the authoritative edition As published in the October 1971 issue of Esquire Magazine. by Ron Rosenbaum A story so incredible it may even make you feel sorry for the phone company.
What They Know. What They Know: How Websites Expose Visitors to Monitoring. I have experienced a simple version of web monitoring myself: since simply checking out some office chairs at some obscure shopping website, almost every website I visit (including my own blog) is plastered with multiple Google Ads of that specific shop.
After several weeks, the office chair issue is long vanished, but the ads still persist. Where can I opt out please? What They Know [wsj.com] is an interactive graph by the Wall Street Journal, illustrating the degree to which the 50 most popular websites exposes visitors to monitoring (think cookies, beacons, Flash cookies and the like, which together reveal large parts of your past browsing patterns). Each red slice at the top represents a unique website, like msn.com or photobucket.com. Internet-signalement.gouv.fr - Portail officiel de signalements de contenus illicites - Accueil.
Broadband World: Mapping the global picture. More than a billion people around the world are connected to the net, but speed of access ranges from dial-up to fibre optic connections.
Use this map to explore the state of our Broadband World across eight different countries, as explained by BBC correspondents and reporters. 5000 miles © 2014 Microsoft Corporation Image courtesy of NASA See this location in bird's eye view. Special Reports. The need for clear data licenses. There is clearly a movement to openly share data from numerous data sources: governments, organizations, Web sites, individuals, and devices. Users are more easily able to publish data through collaborative sites, or find and download data that they can use to remix, reapply, reuse, and extend. The trajectory of open data sharing and utilization parallels the development of open-source, where the potential magnified impact of open sharing and collaboration yields far great outcomes.
However, unlike the open source world, the legal and cultural frameworks in which to share data have not yet emerged. In code, there are a gamut of well known and widely used licenses: GPL, BSD, MIT, Apache, and more. While each has unique characteristics, their overall meaning and implications are easily understood by developers and comply with business operations that wish to use open-source software. Internet Statistics & Social Media Usage. Le format H.264 gratuit jusqu'en 2016 : un piège contre le logic. De la métamorphose du captcha. Apparent Software blog » Blog Archive » “Is PayPal good for your.
Dec 18 Update: This morning I was contacted by a PayPal manager from their fraud department who talked with me close to an hour. He went out of his way to apologize for their mishandle of my case. He told me that my account was initially so severely limited because in early October there were several attempted transfers that were marked as possible fraud. In fact, these attempts were my own attempts to fund the PayPal account using my own credit card by requesting money from myself. I needed the funds in order to perform a mass payment which is only possible if there are money in PayPal’s account. PayPal Alternative - Pay Pal Lawsuits, PayPal Complaints & Fraud. Fix your terrible, insecure passwords in five minutes. - By Farh. It's tempting to blame the victim.
In May, a twentysomething French hacker broke into several Twitter employees' e-mail accounts and stole a trove of meeting notes, strategy documents, and other confidential scribbles. The hacker eventually gave the stash to TechCrunch, which has since published notes from meetings in which Twitter execs discussed their very lofty goals.