background preloader

The Daily Dot

The Daily Dot

Related:  TRENDINGOf Various Interests and Possibly beyond the PaleGood Readsbarbarabusby2Long Talks about the NSA

BBC Trending Image copyright Anadolu Agency/Getty Live video stream apps, like Facebook Live and Periscope, seemed to be the medium of choice for a new digital generation in Turkey this week, as they spread the news of recent political turbulence to the world. In January 1991, Peter Arnett reported live on CNN from the Al-Rashid hotel as the first air strikes of the Gulf war hit the Iraqi capital of Baghdad. This was the moment of CNN's pioneering 24-hour news channel, changing the information sharing landscape permanently. Twenty years later, at Tahrir Square in Cairo, a new form of information sharing came into fruition. Understanding Arabs: the use of the Inappropriate Hand In most Arab countries and/or countries influenced by Arab traditions, the left hand is considered "unclean" and is not to play a part in social settings at all. The left hand is for private duty only. Do not make a fool of yourself and commit a major cultural faux pas by putting your left hand forward to receive or give anything, be conscious of the left hand’s role in dealing with Arabs.

If You Could Hear Inside The Mind Of A Williamsburg Hipster (Video) Nick Cannon sat down for an interview with Big Boy and they were allowed to say whatever they wanted, because it was for the web only. And boy, did they say whatever they wanted. Taking a page out of Lindsay Lohan‘s book, Big Boy asked Cannon to reveal five celebrity females he’s banged. Introducing Genie, the NSA's $652 million botnet One of the scariest tools in a hacker's toolbox is a botnet, which lets someone infect scores of other computers with malware that allows the hacker to send out commands en masse. The National Security Agency has one. It's named Genie. At least it was, as the latest evidence we have of such a program is from 2011. Genie's existence was revealed Friday by the Washington Post, part of the paper's ongoing series of the intelligence community's secret "Black Budget."

Hashtagify Popular Hashtags: Global Top 30 Get daily, weekly or monthly updates about the top hashtags for: any language. Just type your email address, choose your frequency and click "Get Free Updates". This chart shows the top 30 hashtags by popularity on Twitter during last week, for tweets in any language. Period Popularity is a 1-100 rating to compare the popularity of the hashtags.

Feature [My friend Peter Sheridan is a Los Angeles-based correspondent for British national newspapers. He has covered revolutions, civil wars, riots, wildfires, and Hollywood celebrity misdeeds for longer than he cares to remember. As part of his job, he must read all the weekly tabloids. Doctor Performs Epic Rap Song To Tell Girl How To Take Care Of Her Broken Leg (Video) Despite the fact that identical twins look almost exactly the same, there are always a few things different for each of them. It may be their personalities or the paths they’ve chosen. You wouldn’t be able to tell at a young age, but after years and years of being the sibling of a person identical […] Clearly, I’m single, but were going to rewind a year and a half (oh, that’s pathetic) and pretend my mentality is on the same wavelength as many of you wifed-up readers.

Tailored Access Operations A reference to Tailored Access Operations in an XKeyscore slide The Office of Tailored Access Operations (TAO) is a cyber-warfare intelligence-gathering unit of the National Security Agency (NSA). It has been active since at least circa 1998.[1][2] TAO identifies, monitors, infiltrates, and gathers intelligence on computer systems being used by entities foreign to the United States.[3][4][5][6] The NSA terms these activities "computer network exploitation". TAO is reportedly "now the largest and arguably the most important component of the NSA's huge Signal Intelligence (SIGINT) Directorate, consisting [more than] 1,000 military and civilian computer hackers, intelligence analysts, targeting specialists, computer hardware and software designers, and electrical engineers."[1]

Useful Websites Here is a list of websites we have featured in the past that might come in handy. Remember to set as your start page if you haven’t already. Educational/Learning – Useful and educational links updated daily. Set it as your homepage and forget about - video lectures on just about any - lectures by smart - for every educational website or useful web app out - classroom - expand your vocabulary while feeding the - a collection of geography - timed math - the best short - learn about - turn a Wikipedia article into a - a collection of intellectually stimulating - a place to learn amazing and unusual historical and scientific facts

Cowardice is contagious: on anonymous reviewing Yesterday, the Wheeler Centre published another contribution in the slow-burning, long-running debate about anonymous book reviewing, a debate sparked by the practices of the new Saturday Paper. None of the previous defences of anonymity seemed at all convincing to me, and this one’s no better. It consists largely of a critic … telling us not to criticise. Erik can do what he wants. It’s a private company. If you’re not happy with it, start your own paper.

NSA's Plan to Use Porn Habits to Discredit 'Radicalizers' The document, provided by NSA whistleblower Edward Snowden, identifies six targets, all Muslims, as “exemplars” of how “personal vulnerabilities” can be learned through electronic surveillance, and then exploited to undermine a target's credibility, reputation and authority. (Public domain)New documents obtained by NSA whistleblower Edward Snowden and leaked to journalist Glenn Greenwald and the Huffington Post show that the spy agency made plans to use the online activities, including visits to pornographic sites and other habits, of so-called Muslim "radicalizers" in order to discredit their standing. "The NSA's operation is eerily similar to the FBI's operations under J. Edgar Hoover in the 1960s where the bureau used wiretapping to discover vulnerabilities, such as sexual activity, to 'neutralize' their targets." –James Bamford, journalist According to the reporting:

Related:  VeilleNet Actu & 3TUseful (self-improvement) WebsitesNewsNouvelles offresTrending