background preloader

WEB

Facebook Twitter

Adblock Plus — surfez sans désagrément.

Bots

Oil and gas firms hit by hackers. 10 February 2011Last updated at 15:59 The attacks meant hackers had access to some networks for years Hackers have run rampant through the networks of at least five oil and gas firms for years, reveals a report. Compiled by security firm McAfee, it details the methods and techniques the hackers used to gain access to the unnamed multinational firms. Via a combination of con tricks, computer vulnerabilities and weak security controls, the attackers gained access and stole secrets, it says. The hackers targeted documents about oil exploration and bidding contracts. Cashing in Greg Day, director of security strategy at McAfee, said that the attacks used to break into all the networks were built around code and tools widely available on the net's underground.

As such, he said, they were not very sophisticated but that did not dent their effectiveness. In a long-running campaign, the attacks continued and the hackers methodically worked to penetrate the computer networks of these firms.

Downloads

Bittorrent. WikiLeaks. Julian Assange and the Computer Conspiracy; “To destroy this invisible government” (en Español) (auf Deutsch) (in het nederlands) “To radically shift regime behavior we must think clearly and boldly for if we have learned anything, it is that regimes do not want to be changed. We must think beyond those who have gone before us, and discover technological changes that embolden us with ways to act in which our forebears could not.

Firstly we must understand what aspect of government or neocorporatist behavior we wish to change or remove. Secondly we must develop a way of thinking about this behavior that is strong enough carry us through the mire of politically distorted language, and into a position of clarity. The piece of writing (via) which that quote introduces is intellectually substantial, but not all that difficult to read, so you might as well take a look at it yourself. Authoritarian regimes give rise to forces which oppose them by pushing against the individual and collective will to freedom, truth and self realization. Conspiracies are cognitive devices. Wikileaks' Julian Assange 'would be denied justice' 7 February 2011Last updated at 12:32 ET Julian Assange: "A black box applied to my life with the word rape on it is now being opened" There is a risk of "denial of justice" if Wikileaks founder Julian Assange is tried for rape in Sweden, his lawyer has told a UK extradition hearing.

Geoffrey Robertson QC also said his client could face the death penalty if then sent to the US on charges relating to the whistleblowing website. But prosecutors rejected suggestions the Swedish legal system did not have safeguards against such a "violation". Mr Assange, 39, denies claims of sexual assault against two women. At Belmarsh Magistrates' Court in London, Mr Assange's lawyers accused the prosecutor in Sweden attempting to extradite Mr Assange of having a "biased view" against men.

They said he was "willing and able" to co-operate with Swedish authorities, so no arrest warrant was needed. 'Trial by media' In a document released by Mr Assange's defence team, his lawyers argued: Analysis. Sorry about that! Canada reverses metered Internet decision. Oops! Terrified by a critical mass of enraged broadband consumers, Canada's government is telling its telecom regulator to rescind its approval of metered or "usage based" billing, or else. Industry Minister Tony Clement is now insisting that Canada's Radio-television and Telecommunications Commission (CRTC) has to undo the ruling.

Most Canadian newspapers are getting the same message from the top. The CRTC "should be under no illusion—the Prime Minister and Minister of Industry will reverse this decision unless the CRTC does it itself," a member of Canada's conservative government told the Toronto Star on Wednesday. "Frankly, a decision like this is clearly not in the best interest of consumers," the unnamed senior official added. Back to the drawing board The CRTC approved usage-based billing late last year, allowing Bell Canada to charge smaller competitive ISPs by the gigabyte, a move which made it hard for those ISPs to offer flat-rate service any longer. You need to get off facebook. Who Controls the Internet? The Internet is subject to control because its infrastructure is subject to control Who Controls the Internet? Illusions of a Borderless World is a 2006 book by Jack Goldsmith and Tim Wu that offers an assessment of the struggle to control the Internet.[1] Starting with a discussion of the early vision of a borderless global community, the authors present some of the most prominent individuals, ideas and movements that have played key roles in developing the Internet.

As law professors at Harvard and Columbia, respectively, Goldsmith and Wu assert the important role of government in maintaining Internet law and order while debunking the claims of techno-utopianism that have been espoused by theorists such as Thomas Friedman. Overview[edit] The book has three parts. Part One: The Internet Revolution[edit] Jon Postel Goldsmith and Wu describe key changes in control over the Internet that occurred in the 1990s, beginning with consolidation of power by the U.S. Reviews[edit] See also[edit] Web 3. μTorrent. History[edit] Early development[edit] Out of general discontent with bloatware, Serge Paquet suggested to Ludvig Strigeus that he should make a smaller and more efficient BitTorrent client.

Strigeus began to conceptualize the plans for the program's development, which, at the time, did not include making the client feature-rich. After initially working on it for about a month during the last quarter of 2004 (the first build is dated October 17, 2004), mostly during his free time before and after work, Strigeus ceased coding µTorrent for a year. He resumed work on September 15, 2005, and three days later, the first public release (version 1.1 beta) was made available as freeware, and began generating feedback. PeerFactor SARL[edit] On March 4, 2006, PeerFactor SARL announced the signing of a six-month contract with Strigeus for the development of "new content distribution applications on the Web Ownership change[edit] Magnet Link (URI) Support[edit] Features[edit] Size[edit] Revenue[edit] Vuze. Features[edit] Vuze (classic UI) statistics page Azureus platform-specific[edit] Azureus supports the following Azureus Platform specific features: Ability to share torrents between friends and receive "friend boosts.

" Classic and Azureus-specific[edit] Vuze/Azureus "swarm view" visualizes the incoming and outgoing torrent connections in real-time. Azureus also supports the following cross-interface features: Vuze[edit] Interface[edit] Vuze[edit] Since version 3.0, Azureus starts with the main Vuze interface, designed to promote Vuze content. Classic interface[edit] Vuze swarm feature (shown in Classic UI) Users upgrading from previous versions will automatically keep the classic interface. The main noticeable difference between the classic interface and the Vuze interface is the header and footer. While downloading a file under the classic or advanced interface, the user can view several different statistics including:[8] Plugins[edit] A complete list can be seen here [9] History[edit] Azureus[edit]

Azureus.