Oracle v. Google: The bewildering Java trial explained | Digital Trends:
"If Oracle wins its assertions that the Java APIs are copyrightable, the jury finding seems to imply that Google could be on the hook for infringement."
'via Blog this'
Just a basic blog—snagging random stuff that catches our eye—nothing else, really...
Friday, August 31, 2012
Oracle's Billion Dollar Question: Can You Copyright a Language?
Oracle's Billion Dollar Question: Can You Copyright a Language?:
"It is fair to say that Oracle figured it could take all the intellectual property it acquired from Sun and use it to make money through litigating companies that supposedly infringe on Java patents."
'via Blog this'
"It is fair to say that Oracle figured it could take all the intellectual property it acquired from Sun and use it to make money through litigating companies that supposedly infringe on Java patents."
'via Blog this'
Thursday, August 30, 2012
Wednesday, August 29, 2012
NO by WhiteIrisRecs on SoundCloud - Create, record and share your sounds for free
NO by WhiteIrisRecs on SoundCloud - Create, record and share your sounds for free:
Produced by NO & Eric Palmquist
Mixed by Lewis Pesacov & Dave Schiffman
Produced by NO & Eric Palmquist
Mixed by Lewis Pesacov & Dave Schiffman
How to Make Firefox, IE, Safari, Chrome, Opera, Your Default Browser
How to Make Firefox, IE, Safari, Chrome, Opera, Your Default Browser:
"We're going to show you how to permanently set your web browser of choice to be your default browser in all situations."
'via Blog this'
"We're going to show you how to permanently set your web browser of choice to be your default browser in all situations."
'via Blog this'
Executive Excess 2012: The CEO Hands in Uncle Sam's Pocket - IPS
Executive Excess 2012: The CEO Hands in Uncle Sam's Pocket - IPS
"These tax dollars are flowing from average Americans who depend on public services to the kingpins of America’s private sector. "
'via Blog this'
"These tax dollars are flowing from average Americans who depend on public services to the kingpins of America’s private sector. "
'via Blog this'
Tuesday, August 28, 2012
Monday, August 27, 2012
Simple Auto-Playing Slideshow | CSS-Tricks
Simple Auto-Playing Slideshow | CSS-Tricks
Very nice!
Wrapper with div's as the "slides", which can contain any content.
Very nice!
Wrapper with div's as the "slides", which can contain any content.
Friday, August 24, 2012
Schneier on Security: Is iPhone Security Really this Good?
Schneier on Security: Is iPhone Security Really this Good?
Simson Garfinkel writes that the iPhone has such good security that the police can't use it for forensics anymore:
Simson Garfinkel writes that the iPhone has such good security that the police can't use it for forensics anymore:
Court affirms $675,000 penalty in music-downloading case | Politics and Law - CNET News
Court affirms $675,000 penalty in music-downloading case | Politics and Law - CNET News
A jury found that Tenenbaum's infringement was willful and ordered him to pay $675,000 in damages. Tenenbaum argued that the jury award was unconstitutional and the federal judge who oversaw his trial agreed that the amount was "excessive."
A jury found that Tenenbaum's infringement was willful and ordered him to pay $675,000 in damages. Tenenbaum argued that the jury award was unconstitutional and the federal judge who oversaw his trial agreed that the amount was "excessive."
Are 30 Songs Really Worth $675,000? The Justice System Thinks So | WebProNews
Are 30 Songs Really Worth $675,000? The Justice System Thinks So | WebProNews
Tenenbaum is stuck with a massive $675,000 fine that’s now set in stone. Despite not even being 30 yet, he’s pretty much ruined for life.
Tenenbaum is stuck with a massive $675,000 fine that’s now set in stone. Despite not even being 30 yet, he’s pretty much ruined for life.
Wednesday, August 22, 2012
More details on the Florida Hospital breach | PHIprivacy.net
More details on the Florida Hospital breach | PHIprivacy.net:
Dissent says: "The hospital couldn’t cooperate in an investigation involving theft of patient data because of HIPAA? I’d like to see/understand their explanation of this. I have sent an email inquiry to the hospital about certain points raised in WFTV’s coverage."
'via Blog this'
Dissent says: "The hospital couldn’t cooperate in an investigation involving theft of patient data because of HIPAA? I’d like to see/understand their explanation of this. I have sent an email inquiry to the hospital about certain points raised in WFTV’s coverage."
'via Blog this'
Monday, August 20, 2012
Why are elderly duped? Area in brain where doubt arises changes with age
Why are elderly duped? Area in brain where doubt arises changes with age
A study conducted for the National Institute of Justice in 2009 concluded that nearly 12 percent of Americans 60 and older had been exploited financially by a family member or a stranger. And, a report last year by insurer MetLife Inc. estimated the annual loss by victims of elder financial abuse at $2.9 billion.
A study conducted for the National Institute of Justice in 2009 concluded that nearly 12 percent of Americans 60 and older had been exploited financially by a family member or a stranger. And, a report last year by insurer MetLife Inc. estimated the annual loss by victims of elder financial abuse at $2.9 billion.
FBI — New Internet Scam
FBI — New Internet Scam:
"There is a new “drive-by” virus on the Internet, and it often carries a fake message—and fine—purportedly from the FBI."
'via Blog this'
"There is a new “drive-by” virus on the Internet, and it often carries a fake message—and fine—purportedly from the FBI."
'via Blog this'
Saturday, August 18, 2012
Download Tableau Public | Tableau Public
Download Tableau Public | Tableau Public:
"Tableau Public is a free application that brings data to life. Create and share interactive charts and graphs, stunning maps, live dashboards and fun applications in minutes then publish anywhere on the web. Anyone can do it, it’s that easy—and it’s free."
'via Blog this'
"Tableau Public is a free application that brings data to life. Create and share interactive charts and graphs, stunning maps, live dashboards and fun applications in minutes then publish anywhere on the web. Anyone can do it, it’s that easy—and it’s free."
'via Blog this'
Friday, August 17, 2012
Right Of Publicity � Brief History of RoP
Right Of Publicity � Brief History of RoP:
New York’s limiting viewpoint was addressed by Judge Jerome Frank in Haelan Laboratories, Inc. v. Topps Chewing Gum, Inc. 202 F.2d 866 (2nd Cir. 1953). In his decision, Judge Frank distinguished the “right of publicity” from the “right of privacy” by focusing on the economic interests involved, rather than the personal interests characteristic of the right of privacy. Haelan is also cited as the first articulation of these interests as the “Right of Publicity.”
New York’s limiting viewpoint was addressed by Judge Jerome Frank in Haelan Laboratories, Inc. v. Topps Chewing Gum, Inc. 202 F.2d 866 (2nd Cir. 1953). In his decision, Judge Frank distinguished the “right of publicity” from the “right of privacy” by focusing on the economic interests involved, rather than the personal interests characteristic of the right of privacy. Haelan is also cited as the first articulation of these interests as the “Right of Publicity.”
Thursday, August 16, 2012
Germany Investigating Facebook's Face-Recognition Features Again
Germany Investigating Facebook's Face-Recognition Features Again
Data privacy officials in Germany have reopened a probe to look deeper at Facebook’s face recognition technology and determine if the social networking giant was collecting member photos without their knowledge.
Data privacy officials in Germany have reopened a probe to look deeper at Facebook’s face recognition technology and determine if the social networking giant was collecting member photos without their knowledge.
TrapWire Antiterrorist Software Leaks Set Off Web Furor - NYTimes.com
TrapWire Antiterrorist Software Leaks Set Off Web Furor - NYTimes.com
A new release of stolen corporate e-mails by WikiLeaks has set off a flurry of concern and speculation around the world about a counterterrorist software program called TrapWire, which analyzes images from surveillance cameras and other data to try to identify terrorists planning attacks.
A new release of stolen corporate e-mails by WikiLeaks has set off a flurry of concern and speculation around the world about a counterterrorist software program called TrapWire, which analyzes images from surveillance cameras and other data to try to identify terrorists planning attacks.
White hats publish DDoS hijacking manual, turn tables on attackers | Ars Technica
White hats publish DDoS hijacking manual, turn tables on attackers | Ars Technica
Turning the tables on miscreants who paralyze websites with torrents of junk data, security researchers have published a detailed manual that shows how to neutralize some of the Internet's most popular denial-of-service tools.
Turning the tables on miscreants who paralyze websites with torrents of junk data, security researchers have published a detailed manual that shows how to neutralize some of the Internet's most popular denial-of-service tools.
Daily Kos: The Gentleperson's Guide to Forum Spies
Daily Kos: The Gentleperson's Guide to Forum Spies
What follows is a lengthy dissertation on how to subvert/co-opt Internet discussion groups. A veritable how-to manual for Forum Trolls and Hijackers.
What follows is a lengthy dissertation on how to subvert/co-opt Internet discussion groups. A veritable how-to manual for Forum Trolls and Hijackers.
Monday, August 13, 2012
Wanna Hack Mars "Curiosity"? This is all it takes....
Could you hack into Mars rover Curiosity? | ExtremeTech: "The first approach would involve the would-be hacker building the equivalent of NASA’s Deep Space Network (DSN), a worldwide network of big-dish antenna that send and receive spacecraft signals, and perform radio astronomy. To perform uplink communications (to the rover), the DSN’s biggest antennae — 230-feet (70-meter) dishes — are outfitted with transmitters that deliver up to 400 kilowatts of output power. The hacker would also have to replicate the exact same encoding scheme (probably QPSK, the same as satellite TV) and use the same frequency (X band, around 8GHz)."
'via Blog this'
'via Blog this'
Sunday, August 12, 2012
Death Benefits for Google Employees...
Even if you've only worked at Google for weeks, you are entitled (or, rather, your significant other is entitled to) Google's Death Benefit:
Here's What Happens To Google Employees When They Die - Forbes: "Should a U.S. Googler pass away while under the employ of the 14-year old search giant, their surviving spouse or domestic partner will receive a check for 50% of their salary every year for the next decade. Even more surprising, a Google spokesperson confirms that there’s “no tenure requirement” for this benefit, meaning most of their 34 thousand Google employees qualify."
'via Blog this'
Here's What Happens To Google Employees When They Die - Forbes: "Should a U.S. Googler pass away while under the employ of the 14-year old search giant, their surviving spouse or domestic partner will receive a check for 50% of their salary every year for the next decade. Even more surprising, a Google spokesperson confirms that there’s “no tenure requirement” for this benefit, meaning most of their 34 thousand Google employees qualify."
'via Blog this'
Saturday, August 11, 2012
Same Old Story...forgot to maintain important infrastructure
Here's a rant I have about failsafes: They were created so bad things would never happen. Think about factory explosions, oil spills, fires, and any of the thousands of catastrophes we see every year...each time there was a failsafe in place but, over the years, things were going so well, that upper management decided to forgo updates/upgrades or even regular maintenance because, well, things were going so well! That should never, ever be an excuse to justify not keeping failsafes up to date because the day will come when it all bites you in the arse.
AP NewsBreak: Refinery probe focusing on possible corrosion in decades-old pipe - The Washington Post: "Federal investigators probing the cause of a massive Chevron oil refinery fire are focusing on possible corrosion in a decades-old pipe the company inspected late last year but did not replace."
'via Blog this'
AP NewsBreak: Refinery probe focusing on possible corrosion in decades-old pipe - The Washington Post: "Federal investigators probing the cause of a massive Chevron oil refinery fire are focusing on possible corrosion in a decades-old pipe the company inspected late last year but did not replace."
'via Blog this'
Wednesday, August 8, 2012
Has Hacking Team's government trojan been used against journalists? | Privacy International
Has Hacking Team's government trojan been used against journalists? | Privacy International:
According to Hacking Team, the Da Vinci software logs Skype calls, emails, instant messaging, web browsing records, deleted files and shots taken from the computer’s own webcam. In effect, the company claims that their product not only relays what's happening on a target’s computer, but also enables surveillance of anything that occurs within the range of the computer’s internal camera or microphone.
Hacking Team’s Remote Control System was detected 'in the wild' last week - shortly after Gamma International's FinSpy (a similar tool) was identified in email attachments sent to Bahraini activists.
According to Hacking Team, the Da Vinci software logs Skype calls, emails, instant messaging, web browsing records, deleted files and shots taken from the computer’s own webcam. In effect, the company claims that their product not only relays what's happening on a target’s computer, but also enables surveillance of anything that occurs within the range of the computer’s internal camera or microphone.
Hacking Team’s Remote Control System was detected 'in the wild' last week - shortly after Gamma International's FinSpy (a similar tool) was identified in email attachments sent to Bahraini activists.
Tuesday, August 7, 2012
This Hot Hybrid Hovercraft Needs a Little Extra Lift | Autopia | Wired.com
This Hot Hybrid Hovercraft Needs a Little Extra Lift | Autopia | Wired.com:
he promises that the Mercier-Jones hovercraft will be like nothing else ever built before. With an exterior inspired by exotic cars, the design also has a unique gas-electric hybrid drivetrain that allows for continuous airflow while still providing enough energy for short bursts of power necessary in high-speed maneuvering. The setup is lightweight and promises to be quieter than existing hovercraft.
he promises that the Mercier-Jones hovercraft will be like nothing else ever built before. With an exterior inspired by exotic cars, the design also has a unique gas-electric hybrid drivetrain that allows for continuous airflow while still providing enough energy for short bursts of power necessary in high-speed maneuvering. The setup is lightweight and promises to be quieter than existing hovercraft.
This Hot Hybrid Hovercraft Needs a Little Extra Lift | Autopia | Wired.com
This Hot Hybrid Hovercraft Needs a Little Extra Lift | Autopia | Wired.com:
he promises that the Mercier-Jones hovercraft will be like nothing else ever built before. With an exterior inspired by exotic cars, the design also has a unique gas-electric hybrid drivetrain that allows for continuous airflow while still providing enough energy for short bursts of power necessary in high-speed maneuvering. The setup is lightweight and promises to be quieter than existing hovercraft.
he promises that the Mercier-Jones hovercraft will be like nothing else ever built before. With an exterior inspired by exotic cars, the design also has a unique gas-electric hybrid drivetrain that allows for continuous airflow while still providing enough energy for short bursts of power necessary in high-speed maneuvering. The setup is lightweight and promises to be quieter than existing hovercraft.
Monday, August 6, 2012
Spear Phishing Statistics: 2012 Findings from Microsoft TechEd, RSA Security Conference Surveys | Proofpoint: Security, Compliance and the Cloud
Spear Phishing Statistics: 2012 Findings from Microsoft TechEd, RSA Security Conference Surveys | Proofpoint: Security, Compliance and the Cloud:
"Today, Proofpoint published the findings from a recent survey of more than 330 IT professionals, aimed at learning the extent and impact of targeted phishing attacks (a.k.a., "spear phishing")."
'via Blog this'
"Today, Proofpoint published the findings from a recent survey of more than 330 IT professionals, aimed at learning the extent and impact of targeted phishing attacks (a.k.a., "spear phishing")."
'via Blog this'
PhishTank > Statistics about phishing activity and PhishTank usage
PhishTank > Statistics about phishing activity and PhishTank usage: "
Online, valid phishes
Total Submissions
Total Votes
6,923
1,487,747
5,853,008"
'via Blog this'
Online, valid phishes
Total Submissions
Total Votes
6,923
1,487,747
5,853,008"
'via Blog this'
How to Watch the Mars Curiosity Rover Landing | News & Opinion | PCMag.com
How to Watch the Mars Curiosity Rover Landing | News & Opinion | PCMag.com:
"NASA's Mars Curiosity Rover is making its final approach to the Red Planet and is expected to touch down at 1:31 a.m. Eastern on Monday, August 6 after a 350 million-mile journey that kicked off in November."
'via Blog this'
"NASA's Mars Curiosity Rover is making its final approach to the Red Planet and is expected to touch down at 1:31 a.m. Eastern on Monday, August 6 after a 350 million-mile journey that kicked off in November."
'via Blog this'
Sunday, August 5, 2012
Creating masking tracks in Vegas
Creating masking tracks in Vegas:
"Vegas software has always offered robust video compositing features which make it possible to create sophisticated composited sequences without opening a dedicated compositing application."
'via Blog this'
"Vegas software has always offered robust video compositing features which make it possible to create sophisticated composited sequences without opening a dedicated compositing application."
'via Blog this'
Loading Progress Bar Intro - Free Download | Sony Vegas | Obviously Tech
Loading Progress Bar Intro - Free Download | Sony Vegas | Obviously Tech:
"Below you’ll find the loading progress bar effect in a video preview! You can download this effect as a simple .wmv video file so you can use it in your videos, and/or you can download it as a .veg Sony Vegas Project File to allow you to customize the loading bar yourself, change the colors, size, text, even add in extra text if you wish!"
"Below you’ll find the loading progress bar effect in a video preview! You can download this effect as a simple .wmv video file so you can use it in your videos, and/or you can download it as a .veg Sony Vegas Project File to allow you to customize the loading bar yourself, change the colors, size, text, even add in extra text if you wish!"
Saturday, August 4, 2012
Skydiving record broken @ 220mph
I haven't even gone that fast being earth-bound! I can't imagine what it would feel like to fall that fast. Can you even keep your mouth closed at those speeds? Do you get bugs in your teeth? ;-)
Vertical skydiving record broken as 138 skydivers hit speeds of 220mph in snowflake formation - The Washington Post:
'via Blog this'
Vertical skydiving record broken as 138 skydivers hit speeds of 220mph in snowflake formation - The Washington Post:
'via Blog this'
Thursday, August 2, 2012
FBI finally computerized!
You ever wonder why there have never been stories about the FBI being hacked? Well.... that was because they didn't have a digital system that was connected to others. (Seriously! There were full analog: paper and pencil!) Now, after all these years, the FBI is finally connected. Anyone placing bets on when the first hack happens? Anyone want to make a side bet on who, or which country, makes the first hack? How long before you can find FBI files with simple Google hacks? LMFAO!!
FBI Files Go Digital, After Delays and Cost Overruns - WSJ.com:
'via Blog this'
FBI Files Go Digital, After Delays and Cost Overruns - WSJ.com:
'via Blog this'
Wednesday, August 1, 2012
USB flash drive security - Wikipedia, the free encyclopedia
USB flash drive security - Wikipedia, the free encyclopedia
Companies in particular are at risk when sensitive data are stored on unsecured USB flash drives by employees, who use the devices to transport data outside the office.
Companies in particular are at risk when sensitive data are stored on unsecured USB flash drives by employees, who use the devices to transport data outside the office.
Out of the Black: The Declassification of the NRO
Out of the Black: The Declassification of the NRO
As the documents illustrate, the issue of NRO declassification was considered as early as 1973. The documents further show that DCI Stansfield Turner (1977-1981) concluded that the fact of NRO and NRP existence did not meet the test of classification. As a result, Turner included declassification as part of a plan to revise the system of handling Sensitive Compartmented Information – but that plan was not implemented before the Carter administration was replaced by the Reagan administration, nor thereafter.
http://www.gwu.edu/~nsarchiv/NSAEBB/NSAEBB24/nsa25.pdf
As the documents illustrate, the issue of NRO declassification was considered as early as 1973. The documents further show that DCI Stansfield Turner (1977-1981) concluded that the fact of NRO and NRP existence did not meet the test of classification. As a result, Turner included declassification as part of a plan to revise the system of handling Sensitive Compartmented Information – but that plan was not implemented before the Carter administration was replaced by the Reagan administration, nor thereafter.
http://www.gwu.edu/~nsarchiv/NSAEBB/NSAEBB24/nsa25.pdf
Daily Kos: NSA: It's not the Privacy - it's the Incompetence
Daily Kos: NSA: It's not the Privacy - it's the Incompetence
If the call is of "interest", but an American is involved - that Americans name would be redacted and the file destroyed until surveillance was authorized by the FISA court. But even before 9/11 this was no longer the case according to Truthout.org
If the call is of "interest", but an American is involved - that Americans name would be redacted and the file destroyed until surveillance was authorized by the FISA court. But even before 9/11 this was no longer the case according to Truthout.org
‘Control-Alt-Hack’ game lets players try their hand at computer security | UW Today
‘Control-Alt-Hack’ game lets players try their hand at computer security | UW Today
“Control-Alt-Hack” gives teenage and young-adult players a taste of what it means to be a computer-security professional defending against an ever-expanding range of digital threats"
'via Blog this'
“Control-Alt-Hack” gives teenage and young-adult players a taste of what it means to be a computer-security professional defending against an ever-expanding range of digital threats"
'via Blog this'
Dropbox Reports User Accounts Were Hijacked, Adds New Security Features | TechCrunch
Dropbox Reports User Accounts Were Hijacked, Adds New Security Features | TechCrunch:
"Two-factor authentication, a way to optionally require a unique code in addition to your password when signing in."
Is not really two-factor.
'via Blog this'
"Two-factor authentication, a way to optionally require a unique code in addition to your password when signing in."
Is not really two-factor.
'via Blog this'
BBC News - Tax havens: Super-rich 'hiding' at least $21tn
BBC News - Tax havens: Super-rich 'hiding' at least $21tn
"A global super-rich elite had at least $21 trillion (£13tn) hidden in secret tax havens by the end of 2010, according to a major study."
'via Blog this'
"A global super-rich elite had at least $21 trillion (£13tn) hidden in secret tax havens by the end of 2010, according to a major study."
'via Blog this'
Subscribe to:
Posts (Atom)