Originally posted on Gigaom:
Fast forward to this week when Amazon roped off older EC2 instances from their newer brethren. When users go to buy EC2, they’ll be steered to the shinier, more muscular instances but if they really want the older stuff, it’ll still be there — if they look for it. At least for now.
Constellation Research analyst Holger Mueller expects we may see two-tier pricing from all IaaS vendors, with Microsoft Azure Basic blazing the trail. Amazon did not respond to requests for comment.
Others characterize Amazon’s move as a continuation of…
View original 268 more words
Originally posted on TechCrunch:
iControl historically has sold its products through various channels, including home security companies and cable service providers. Founded about a decade ago, iControl has spent the last several years signing up customers like ADT, Comcast, Time Warner Cable, Rogers, and others with white-labeled home monitoring products.
The company has raised about $130 million since being founded, from institutional investors such as Charles River Ventures and Kleiner Perkins, as well as strategic investors that include Intel Capital, Comcast Ventures, Cisco, and others.
Blacksumac, meanwhile, is an early upstart in the home monitoring market. The company first came to light with an Indiegogo campaign for its Piper home monitoring…
View original 298 more words
Originally posted on PandoDaily:
The internet is a dangerous place for anyone holding sensitive information. I know it, you know it, and corporations know it. Historically, however, knowing this has meant little in terms of preventing cyber attacks. Cyber-crime still costs the global economy north of $300 billion per year, and the US economy north of $100 million according to a July 2013 study by The Center for Strategic and International Studies.
The problem, according to most experts, is that there are too many attack vectors to protect against and cyber-criminals are evolving faster and playing by a looser set of rules than those people trying to keep them at bay.
Today, Cybereason, a new cyber-security company founded by ex-Israeli Intelligence Services experts and with operations in Cambridge, Mass. and Tel Aviv, Israel, is launching out of stealth to offer what it claims is an altogether different solution than anything currently on…
View original 1,052 more words
Originally posted on TechCrunch:
Microsoft selling Windows to OEM partners is even more entrenched than apple pie is to Americanism. No more of that? It’s almost unthinkable.
However, once you get past the oddity of the concept, it can make sense if you approach it properly. Let’s do this in a section-list format for brevity:
1. Microsoft has made billions selling Windows to consumers through its OEM partners. It now also sells Windows to consumers on devices that it builds. This means it has new ways to monetize a New PC To Consumer.
2. The era in which Microsoft made the bulk of its Windows income is not now. Windows OEM revenue is falling. If it weren’t for corporate PC sales, the top line that…
View original 562 more words
Originally posted on Pilot Fish:
1. Myth: Writers Are Strange.
There is an element of truth to this! Writers (and other creative people) must be willing to look below the surface of everyday life and explore the world and relationships like a curious outsider. This perspective sets us apart, but at the same time, it allows us…
View original 587 more words
Edward SnowdenSystem Administrator
- Edward Joseph Snowden is an American computer specialist, a former Central Intelligence Agency employee, and former National Security Agency contractor who disclosed top secret NSA documents to several … Wikipedia
Originally posted on Counter Information:
Video – German Television 01/26/2014
Posted January 28, 2014
US Media Blacks Out Snowden Interview Exposing Death Threats
By Bill Van Auken
January 28, 2014 “Information Clearing House - “WSWS” - The former National Security Agency contractor Edward Snowden appeared Sunday night in his first extended television interview. Citing published statements by unnamed US intelligence and military operatives calling for his assassination, he warned that he faces “significant threats” to his life and that US “government officials want to kill me.”
The interview, broadcast by the German television network ARD, was largely blacked out by the US media. The New York Times carried not a word of what Snowden said, while the cable and broadcast news programs treated the interview with near total silence.
The American media’s reaction stood in stark contrast to that of both broadcast and print media in Germany, where the interview conducted with Snowden in…
View original 1,005 more words
Originally posted on GulfDogs:
At least 110 million consumers were affected by the hack involving Target and Neiman Marcus retailers. Whether or not millions more will have their identities manipulated and finances ruined within the coming months due to more breaches of security at other stores is anyone’s guess, says identity theft recovery expert Scott A. Merritt.
“By necessity, I became an expert on identity theft. My information was stolen in 2006, and in repairing the damage, I learned some not-so-obvious ways we can all protect against identity theft in the first place,” says Merritt, CEO of Merritt & Associates and author of (scottamerritt.com) “Identity Theft Do’s and Don’ts.”http://canadafreepress.com/index.php/article/60588
It is Free and Open Source. Free TOR download:
Originally posted on YouViewed/Editorial:
” The debate Edward Snowden envisioned when he revealed the extent of National Security Agency (NSA) spying on Americans has taken a bad turn. Instead of a careful examination of what the NSA does, the legality of its actions, what risks it takes for what gains, and how effective the agency has been in its stated mission of protecting Americans, we increasingly have government officials or retired versions of the same demanding — quite literally — Snowden’s head and engaging in the usual fear-mongering over 9/11. They have been aided by a chorus of pundits, columnists, and present as well as former officials offering bumper-sticker slogans like “If you have nothing to hide, you have nothing to fear,” all the while claiming our…
View original 112 more words
Originally posted on CLINGERS... BLOGGING BAD ~ DICK.G: AMERICAN !:
How the NSA Threatens National Security
Schneier on Security ^ | 1/13/2014 | Bruce Schneier
Posted on Monday, January 13, 2014 2:49:48 PM by NewHampshireDuo
First and foremost, the surveillance state is robust. It is robust politically, legally, and technically. I can name three different NSA programs to collect Gmail user data. These programs are based on three different technical eavesdropping capabilities. They rely on three different legal authorities. They involve collaborations with three different companies. And this is just Gmail. The same is true for cell phone call records, Internet chats, cell-phone location data.
Our choice isn\’t between a digital world where the NSA can eavesdrop and one where the NSA is prevented from eavesdropping; it\’s between a digital world that is vulnerable to all attackers, and one that is secure for all users.
Fixing this problem is going to be hard. We are long past the…
View original 86 more words
Originally posted on GulfDogs:
Google has spent the last decade building databases on everything, including each and every computer-using American citizen. Now it intends to join forces with the United States Military to put all that info to good use. The giant “swooshing sound” you are hearing right now is the major leap forward of the Mark of the Beast.
The DC: Google CEO Larry Page has rapidly positioned Google to become an indispensable U.S. military contractor. Google recently purchased Boston Dynamics, a robotics pioneer that produces amazing humanoid robots for the U.S. Defense Department.
This development invites attention to Google’s broader military contracting ambitions — especially since Boston Dynamics is the eighth robotics company that Google has bought in the last six months.
read more here>>> http://www.nowtheendbegins.com/blog/?p=16024
Originally posted on Scott Rhymer:
Regina Dugan has plans for you…the former head of DARPA, and current head of Advanced Technologies at Motorola (owned by Google) wants citizens to submit to an edible microchip to “authenticate your identity.”
“This pill has a small chip inside of it with a switch,” said Dugan. “It also has what amounts to an inside out potato battery. When you swallow it, the acids in your stomach serve as the electrolyte and that powers it up. And the switch goes on and off and creates an 18 bit ECG wide signal in your body and essentially your entire body becomes your authentication token.”
She claims it’s perfectly safe for the user. And, of course, there’s no chance of this being used to nefarious purpose…no! Her even creepier idea is an electronic tattoo on your throat to read subvocalized speech — the kind most people do every day when censoring themselves…
View original 14 more words
Content still reigns as the king in the world of Search Engine Optimization (SEO). Some websites get on top of search engine rankings because of high-powered link building campaigns, but when you talk about visitor loyalty and traffic retention (and yes, public consumption), it will always require that good old optimized content
1 Dedicate some time to writing really great content. The saying goes that you should write for people first and search engines second. This basically means you should be creating really quality pieces that are useful and engaging for humans because the search engines will recognize your efforts. Your readers will share your work generating additional backlinks, not to mention extra traffic, and search engines will recognize your quality piece because it will flow naturally with not too many keywords (something which is penalized in the post Penguin Update world).
- Write content people want to share on Facebook, Twitter, Pinterest and other social networks. The search engine will read those social signals as a signal of the quality of your domain. You can accelerate the spread of your content on these sites by having an account on these social networks with lots of followers.
- Consider submitting your content to sites like Reddit, Delicious, Digg and other content aggregators that might gain you a few readers.
- Go back and SEO rewrite some old content. Chances are you know stuff about search engine optimisation that you didn’t know last year (not to mention changes in SEO best practices since last year). Re-visit some old content and re-write it with your search engine optimisation hat on, updating image attributes, changing keyword density, adding links to your home page and other relevant content on your site. Even consider republishing as a fresh article for extra brownie points with the search engines!
- Even if you are new to the web, you have natural links you could try to get. All businesses have suppliers whether they be accountants, solicitors or raw material providers. All these suppliers are bound to have a website, contact them to ask for a link back, but do not offer a link in exchange. Link exchanges don’t violate Google’s TOS, but they will now work against you. When building links, always give other site owners a reason to want to link back to you. Perhaps write an article based on a particular client – everyone likes bragging rights and this can gain you additional links without even having to ask. All Google wants to see is links that have an editorial right to be there.
- Complete all image attributes. Pictures dress up your pages but search engines don’t really know how to deal with them unless you complete all the nitty-gritty details like title, caption, alternate text, description. Be ethical though, don’t use it as an opportunity to cram an extra few keywords onto the page as this will likely have a negative impact on your search engine ranking. Some people search for what they are looking for via Google image search, if you’re image is highly visible then your potential customers will likely visit your page.
5 Take note of word count. Although it’s been a classic rule that “readers online do not read”, it simply doesn’t mean that one has to deprive the online users of good, meaty content. Stick to at least 250 words a page. SEOs know that writing down for an appropriate length of text means being more able to include more related terms for the target keywords.
6 Avoid duplicate content. The content on your website should be unique from other pages on your site, and from external sites as well. Consider using a tool such as Siteliner to look for duplicate content.
The first is your page title. It’s very important to put keywords in your page title; specifically try to get important keywords first and try to limit the overall length of your page title. Well-constructed title tags contain the main keyword for the page. It should contain less than 65 characters with no stop words such as: a, if, the, then, and, an, to, etc. Your title tag should also be limited to the use of alphanumeric characters, hyphens, and commas.
Next, it’s important to look at the header tags on your site-h1, h2, h3, h4 and so on. H1 is the most significant. Make sure you have the most important keyword labeled as h1 tag. This will help you with ranking for your site, especially if someone is searching for that particular key word or phrase.
Next up is the content. You definitely want to put your keywords in the contents somewhere, but the object, though, is to make sure the content is very well written for visitors to your website. You want to insert the keywords for that page only where it makes sense. Page content should have between 300 and 700 words of descriptive content that contains the keywords specified in the keywords meta tag for the page. You also want to try to optimize your URLs. Make sure to include important keywords in the URL.
Next are the Meta keywords and Meta description. These are pieces of code behind the scene. The code should look something like this: It should be placed directly under the title tag code <title> Your site tittle</tittle> <meta name=”description” content=”your site description” <meta name=”keywords” content=”keyword1, keyword2, keyword3″ Your keywords meta tag should contain between 5-10 keywords or keyword phrases that are also found in page content. Also one more important meta tag is description tag that contains information about the page’s content so you can persuade search engine users to visit your web site. It should have 15-160 characters, remember not to stuffed with keywords.
Next is to have proper navigation. Each page of your site should contain links to every other page so search engine spiders can find every page. This is an important step for the proper indexing and page ranking for your site.
Next is having a proper site map. It’s important to use two site maps for your website–an XML version and a static version. The XML version can be created by sitemap generators tools such as http://www.xml-sitemaps.com. The sitemap should then be submitted to the Google Webmaster Tools account for that site. This will aid in crawling of Google’s Spidebot. The static version should be a HTML page that contains links to every other page.
- If you have a local business, get listed in the Google Local Business search results. 86% of people looking for something offline will search online using the likes of Google and Bing. Even businesses like hairdressers and butchers can’t afford to miss out on a spot of search engine optimization Head over to the Google Local Business Centre and add your business to the map, that way your business info and contact details will appear next time a potential customer searches for a service you provide in your local area!
- Dynamic pages are tough to index as it contains too many special characters, some bots takes much longer time to index those pages or sites as well. Try to avoid dynamical writing of site pages.
- SEO-friendly content is no longer the restrictive, robotical-sounding content it used to be. Search engines, in their aim to continuously refine search are catering more to the online readers, the social aspect of the World Wide Web. Content comes out to be more human-centered, and ready for consumption.
Originally posted on thedailyblogreport:
Twitter users can now privately message photos to each other, the company announced today in a blog post.
The feature looks pretty straightforward. Using one of the company’s mobile apps, you can send and view photos using Twitter’s pre-existing direct message feature. On Twitter.com, users wil…
Read more about:
You Can Now Send Photos Privately Using Twitter
Originally posted on Sally's Serenity Spot:
“The wicked flee when no man pursues them, but the [uncompromisingly] righteous are bold as a lion.”~~Proberbs 28:1
“If we intend to succeed at being ourselves, we must reach a point where we can be led by the Holy spirit. Only God, through His Spirit, will lead us to succeed and be all we can be. Other people usually won’t, the devil certainly won’t, and we are not able to do it ourselves without God. Being led by the Spirit does not mean that we do not make mistakes or that we are perfect. The Holy Spirit does not make mistakes but we do.
Following the Spirit’s leading is a process which can only be learned by doing. We start by stepping out into things we believe God is putting on our hearts, and we learn by wisdom and experience…
View original 222 more words
OCTOBER 25, 2013 | BY DANNY O’BRIEN
One of the trends we’ve seen is how, as the word of the NSA‘s spying has spread, more and more ordinary people want to know how (or if) they can defend themselves from surveillance online. But where to start?
The bad news is: if you’re being personally targeted by a powerful intelligence agency like the NSA, it’s very, very difficult to defend yourself. The good news, if you can call it that, is that much of what the NSA is doing is mass surveillance on everybody. With a few small steps, you can make that kind of surveillance a lot more difficult and expensive, both against you individually, and more generally against everyone.
Here are ten steps you can take to make your own devices secure. This isn’t a complete list, and it won’t make you completely safe from spying. But every step you take will make you a little bit safer than average. And it will make your attackers, whether they’re the NSA or a local criminal, have to work that much harder.
Use end-to-end encryption. We know the NSA has been working to undermine encryption, but experts like Bruce Schneier who have seen the NSA documents feel that encryption is still “your friend”. And your best friends remain open source systems that don’t share your secret key with others, are open to examination by security experts, and encrypt data all the way from one end of a conversation to the other: from your device to the person you’re chatting with. The easiest tool that achieves this end-to-end encryption is off-the-record (OTR) messaging, which gives instant messaging clients end-to-end encryption capabilities (and you can use it over existing services, such as Google Hangout and Facebook chat). Install it on your own computers, and get your friends to install it too. When you’ve done that, look into PGP–it’s tricky to use, but used well it’ll stop your email from being an open book to snoopers. (OTR isn’t the same as Google Chat‘s option to “Go off the record”; you’ll need extra software to get end-to-end encryption.
Encrypt as much communications as you can. Even if you can’t do end-to-end, you can still encrypt a lot of your Internet traffic. If you use EFF’s HTTPS Everywhere browser add on for Chrome or Firefox, you can maximize the amount of web data you protect by forcing websites to encrypt webpages whenever possible. Use a virtual private network (VPN) when you’re on a network you don’t trust, like a cybercafe.
Strong passwords, kept safe. Passwords these days have to be ridiculously long to be safe against crackers. That includes the password to email accounts, and passwords to unlock devices, and passwords to web services. If it’s bad to re-use passwords, and bad to use short passwords, how can you remember them all? Use a password manager. Even write down your passwords and keeping them in your wallet is safer than re-using the same short memorable password — at least you’ll know when your wallet is stolen. You can create a memorable strong master password using a random word system like that described at diceware.com.
Use Tor. “Tor Stinks”, this slide leaked from GCHQ says. That shows much the intelligence services are worried about it. Tor is an the open source program that protects your anonymity online by shuffling your data through a global network of volunteer servers. If you install and use Tor, you can hide your origins from corporate and mass surveillance. You’ll also be showing that Tor is used by everyone, not just the “terrorists” that GCHQ claims.
Turn on two-factor (or two-step) authentication. Google and Gmail has it; Twitter has it; Dropbox has it. Two factor authentication, where you type a password and a regularly changed confirmation number, helps protect you from attacks on web and cloud services. When available, turn it on for the services you use. If it’s not available, tell the company you want it.
Don’t click on attachments. The easiest ways to get intrusive malware onto your computer is through your email, or through compromised websites. Browsers are getting better at protecting you from the worst of the web, but files sent by email or downloaded from the Net can still take complete control of your computer. Get your friends to send you information in text; when they send you a file, double-check it’s really from them.
Keep software updated, and use anti-virus software. The NSA may be attempting to compromise Internet companies (and we’re still waiting to see whether anti-virus companies deliberately ignore government malware), but on the balance, it’s still better to have the companies trying to fix your software than have attackers be able to exploit old bugs.
Keep extra secret information extra secure. Think about the data you have, and take extra steps to encrypt and conceal your most private data. You can use TrueCrypt to separately encrypt a USB flash drive. You might even want to keep your most private data on a cheap netbook, kept offline and only used for the purposes of reading or editing documents.
Be an ally. If you understand and care enough to have read this far, we need your help. To really challenge the surveillance state, you need to teach others what you’ve learned, and explain to them why it’s important. Install OTR, Tor and other software for worried colleagues, and teach your friends how to use them. Explain to them the impact of the NSA revelations. Ask them to sign up to Stop Watching Us and other campaigns against bulk spying. Run a Tor node, or hold a cryptoparty. They need to stop watching us; and we need to start making it much harder for them to get away with it.
Originally posted on Gigaom:
Well here’s one way to stymie the NSA: in a couple of years, much if not most of the open web will be encrypted by default. Following recent discussions between the big browser makers, standards-setters and other industry folks, the World Wide Web Consortium’s (W3C) HTTP Working Group announced on Wednesday that the upcoming second version of the HTTP protocol will only work with secure “https” web addresses.
Those “https” prefixes usually denote what’s known as Transport Layer Security (TLS), or sometimes its predecessor Secure Sockets Layer (SSL). Commonly used on banking or email services today — or really anything that needs protection of some kind — this kind of basic security technique was already on the rise before Edward Snowden revealed mass online surveillance. Now the movement has gained fresh urgency.
A lot of this effort is taking place under the auspices of the W3C and the…
View original 621 more words
Originally posted on TechCrunch:
The distillation of one human life into a few hundred pages is a task herculean enough to trip up even seasoned biographers. Expanding that to include four co-founders and a company with as explosive a history as Twitter’s is begging for disaster.
A new book called Hatching Twitter: A True Story Of Money, Power, Friendship and Betrayal, from New York Times reporter Nick Bilton attempts to do just that. It’s around 300 pages and packs in the nearly seven-year history of Twitter as a company and a bit more.
The introduction rips along, introducing us to the four people most responsible for Twitter: Noah Glass, Evan Williams, Biz Stone and Jack Dorsey.
A quick portrait of each of them is painted, albeit in fairly broad strokes. All talented, all intelligent, all searching for human connections and a way to enhance those connections using the Internet.
Bilton is also careful…
View original 1,079 more words
Amen to that! The lazy liberals have less incentive to work for what they want.
Hell, if they can get things without working for it, why would they choose to work? Then they try to justify taking other people’s hard earned money by saying that it is not hurting anyone.
In truth, it is! It is hurting the hard working taxpayers, that choose to work for what they want, and the small businesses trying to survive.
Instead of “feeding them fish”, we need to teach them “how to fish”!!
Anyone collecting welfare should have to be drug tested, and do some kind of work in exchange for it. We need to teach people that you do not get something for nothing.
If you are NOT an American or sick, elderly, or disabled, then you should not be collecting taxpayers money.
Give a man a fish, and you feed him for a day; show him how to catch fish, and you feed him for a lifetime.
A proverbial saying which suggests that the ability to work is of greater benefit than a one-off handout.
This proverb has fallen foul of the spurious etymological rule: ‘if you don’t know the origin of an enigmatic proverb, say it is ancient Chinese‘. May you live in interesting times and a picture is worth a thousand words suffer the same fate. There’s no evidence to link ‘Give a man a fish…’ with China. A further confusion over the origin is that the authoritative and generally trustworthy Oxford Dictionary of Quotations says it is of mid-20th century origin.
The expression actually originated in Britain in the mid 19th century.
Anne Isabella Ritchie, the daughter of William Makepeace Thackeray, (who, if her photograph is any guide, was a studious young woman) wrote a story titled Mrs. Dymond, sometime in the 1880′s and it includes this line.
“He certainly doesn’t practise his precepts, but I suppose the patron meant that if you give a man a fish he is hungry again in an hour; if you teach him to catch a fish you do him a good turn.”
The book was published in 1890 but the story was put into print a few years earlier. The American magazine Littell’s Living Ageprinted the story in its September 1885 issue and it was taken from an earlier but undated issue of the British Macmillan’s Magazine.
So, the proverb dates from 1885 or shortly before and there’s every reason to suppose that it was coined by Anne Ritchie.
…the Chinese axiom “Give a man a fish, and you have fed him once. Teach him how to fish and you have fed him for a lifetime.”
Publications of that sort were what brought the proverb into general use but, as we have seen, weren’t the actual source.
- Give a man a fish… (voxstarnation.wordpress.com)
- Give a man a fish… http://www.phrases.org.uk/meanings/give-a-man-a-fish.html
Originally posted on Mario Murillo Ministries:
By Ronnie Cohen and Alexei Oreskovic
SAN FRANCISCO (Reuters) – How badly does Google want to keep under wraps a mysterious project taking shape on a barge in San Francisco Bay? Badly enough to require U.S. government officials to sign confidentiality agreements.
At least one Coast Guard employee has had to sign a non-disclosure agreement with the Internet giant, said Barry Bena, a U.S. Coast Guard spokesman. Another person who would only identify himself as an inspector for a California government agency had to do the same.
Moored in the shadow of the Bay Bridge off of Treasure Island, a former military base, the nondescript barge is stacked several stories high with white shipping containers, and sprouts what appear to be antennas on top. The hulking structure, half shrouded in scaffolding, has stirred intense speculation in the Bay Area since reports…
View original 571 more words
Originally posted on wchildblog:
The ‘official’ US unemployment rates pushed by number cookers may seem grim, but the real unemployment rates within the US tell a much more realistic and concerning tale.
Source: storyleak.com by Daniel G. J.
Even recent drops in the numbers of unemployed people reported by the U.S. Labor Department were apparently too good to be true. The U.S. Bureau of Labor Statistics has admitted that the improved employment figures it recently reported were the result of a computer error, and that’s just the beginning. We’re looking at the ‘final breath’ of the economy before either collapse or reform that Anthony Gucciardi has detailed.
The Labor Department reported that the number of those applying for unemployment benefits fell by 31,000 during the first week of September. Yet just a week later a Labor Department spokesman admitted the real cause of the drop was that two states he wouldn’t identity changed…
View original 285 more words
Despite having front-door access to communications transmitted across the biggest Internet companies on Earth, the National Security Agency has been secretly tapping into the two largest online entities in the world, new leaked documents reveal.
Those documents, supplied by former NSA contractor Edward Snowden and obtained by the Washington Post, suggest that the US intelligence agency and its British counterpart have compromised data passed through the computers of Google and Yahoo, the two biggest companies in the world with regards to overall Internet traffic, and in turn allowed those country’s governments and likely their allies access to hundreds of millions of user accounts from individuals around the world.
“From undisclosed interception points, the NSA and GCHQ are copying entire data flows across fiber-optic cables that carry information between the data centers of the Silicon Valley giants,” the Post’s Barton Gellman and Ashkan Soltani reported on Wednesday.
The document providing evidence…
View original 309 more words
Originally posted on TechCrunch:
Members of Congress calling Congressional oversight of the United States intelligence empire flaccid at best, and utterly incompetent at worst, is becoming a trend. Recently in The Guardian, Rep. Alan Grayson called Congressional oversight of the National Security Agency a “joke.”
Calling oversight in Congress nothing more than “overlook,” Rep. Grayson also stated that he has “learned far more about government spying on citizens from the media than [from] official intelligence briefings.” Us too, Congressman.
The comments of a lone, controversial representative in the House isn’t usually news, but Rep. Grayson’s comments come as a member of a larger grouping that is worth highlighting.
Sen. Bob Corker of Tennessee sent the president a letter, complaining that briefings provided to Congress were “limited” and did not provide “a fulsome accounting of the totality of surveillance activities conducted by the federal government, and in particular, by the NSA.”
View original 323 more words
And that is exactly what the Terrorist Usurper wants to destroy America and our economy! So far, he is doing a damned good job of it! It is the only thing he knows how to do besides LYING, BLAMING, and MAKING EXCUSES for his IGNORANCE!!
Originally posted on wchildblog:
by Michael Snyder, Economic Collapse Blog:
On the global financial stage, China is playing chess while the U.S. is playing checkers, and the Chinese are now accelerating their long-term plan to dethrone the U.S. dollar. You see, the truth is that China does not plan to allow the U.S. financial system to dominate the world indefinitely. Right now, China is the number one exporter on the globe and China will have the largest economy on the planet at some point in the coming years. The Chinese would like to see global currency usage reflect this shift in global economic power. At the moment, most global trade is conducted in U.S. dollars and more than 60 percent of all global foreign exchange reserves are held in U.S. dollars. This gives the United States an enormous built-in advantage, but thanks to decades of incredibly bad decisions this advantage is starting to…
View original 1,279 more words
Originally posted on A Moral Outrage:
The National Security Agency is harvesting hundreds of millions of contact lists from personal e-mail and instant messaging accounts around the world, many of them belonging to Americans, according to senior intelligence officials and top-secret documents provided by former NSA contractor Edward Snowden.
The collection program, which has not been disclosed before, intercepts e-mail address books and “buddy lists” from instant messaging services as they move across global data links. Online services often transmit those contacts when a user logs on, composes a message, or synchronizes a computer or mobile device with information stored on remote servers.
Rather than targeting individual users, the NSA is gathering contact lists in large numbers that amount to a sizable fraction of the world’s e-mail and instant messaging accounts. Analysis of that data enables the agency to search for hidden connections and to map relationships within a much smaller universe of foreign…
View original 65 more words
Originally posted on TechCrunch:
Acer was early to the Chromebook market, releasing the C7 for a mere $199 and the C710 for $299. These laptops – more tablets with keyboards than fully-featured machines – work well as “third screen” devices that you throw onto a coffee table or use for browsing and some mild document editing. Now Acer is back with the C720, a $249 with SD card reader, USB 3.0 port, and a front-facing HD webcam for video chats.
The new laptop now competes in the same space as the Pixel, a handsome Google-branded device, and the new HP Chromebook 11, an ultralight laptop that charges via Micro-USB. That doesn’t mean Acer’s creation is overrun with competition, it simply changes the space slightly.
While specs rarely matter in the Chromebook world, the C720 holds its own with 8 hours of battery life, 4GB memory, and a solid Intel Celeron 2955U processor with Haswell…
View original 116 more words
Originally posted on TechCrunch:
You know, it’s been a while saince I’ve written up some clever Google Glass hack simply because it was awesome. Let’s fix that.
Looking to test the concept of using Glass as a second screen, Android developer Mike DiGiovanni has managed to capture Grand Theft Auto’s oh-so-crucial in-game GPS interface, beaming it to the player’s eyepiece in real time.
Now, if you’ve spent every free minute since GTA V’s release blasting around Los Santos, one caveat: Mike had to go back a few generations to make this work. It requires GTA to be running on a computer, which, as many a scorned PC gamer could tell you, means Grand Theft Auto V is out. GTA 4, meanwhile, didn’t want to boot up on any of Mike’s systems. So this is all built around 2001′s Grand Theft Auto 3.
(A render of what the player sees when using Mike’s setup…
View original 1,354 more words
By Jeff Poor 7:30 PM 10/03/2013
On Fox Business Network’s “Cavuto” on Wednesday, computer programmer and founder of McAfee, Inc. John McAfee said the online component of Obamacare “is a hacker’s wet dream” that will cause “the loss of income for the millions of Americans who are going to lose their identities.”
For starters, McAfee said the way it is set up makes it possible for fake websites be set up to fool people to think they’re signing up for Obamacare.
“It’s seriously bad,” McAfee said. “Somebody made a grave error, not in designing the program but in simply implementing the web aspect of it. I mean, for example, anybody can put up a web page and claim to be a broker for this system. There is no central place where I can go and say, ‘OK, here are all the legitimate brokers, the examiners for all of the states and pick and choose one.’”
“Instead, any hacker can put a website up, make it look extremely competitive, and because of the nature of the system — and this is health care, after all — they can ask you the most intimate questions, and you’re freely going to answer them,” he continued. “What’s my Social Security number? My birth date? What are my health issues?”
According to McAfee, there’s not a quick fix — and as long as it set up this way, it could be a playground for computer hackers.
“Here’s the problem: It’s not something software can solve,” McAfee continued. “I mean, what idiot put this system out there and did not create a central depository? There should be one website, run by the government, you go to that website and then you can click on all of the agencies. This is insane. So, I will predict that the loss of income for the millions of Americans who are going to lose their identities — I mean, you can imagine some retired lady in Utah, who has $75,000 dollars in the bank, saving her whole life, having it wiped out in one day because she signed up for Obamacare. And believe me, this is going to happen millions of times. This is a hacker’s wet dream. I mean I cannot believe that they did this.”
Originally posted on END TIME HEADLINES:
US officials have claimed that Iranian hackers have infiltrated unclassified US Navy computer networks. According to a report by Wall Street Journal published on September 27, the US officials, whose names were not mentioned in the report, claimed cyber attacks against the Navy computer systems had been carried out by hackers affiliated with the Islamic Republic’s government. The report added however that, while US military officials have been briefed on the “intrusions,” the “Pentagon wouldn’t confirm the alleged Iranian hacks.” The unsubstantiated allegation comes while Iran has been the target of several cyber attacks itself. In June 2012, a report by the Washington Post said the US and the Israeli regime had cooperated in creating the computer virus Flame to spy on Iran. US National Security Agency, the CIA and the Israeli military worked together to create the Flame virus, the paper added. In addition, the New York Times also revealed in the same month…
View original 27 more words
Originally posted on END TIME HEADLINES:
What are human workers going to do when super-intelligent robots and computers are better than us at doing everything? That is one of the questions that anew study by Dr. Carl Frey and Dr. Michael Osborne of Oxford University sought to address, and what they concluded was that 47 percent of all U.S. jobs could be automated within the next 20 years. Considering the fact that the percentage of the U.S. population that is employed is already far lower than it was a decade ago, it is frightening to think that tens of millions more jobs could disappear due to technological advances over the next couple of decades. I have written extensively about how we are already losing millions of jobs to super cheap labor on the other side of the globe. What are middle class families going to do as technology also takes away huge numbers…
View original 71 more words
Originally posted on END TIME HEADLINES:
Amidst the destruction caused by the devastating earthquake in Pakistan that killed more than 500 people, a new island emerged from the depth of the sea. NASA has released images of the newly formed islet. NASA has released before and after photos of a new terrestrial body that was born on September 24 during a quake that struck Pakistan. Called Zalzala Jazeera, or a an earthquake island, the terrestrial formation can now be found 380 kilometers from the earthquake’s epicenter in Paddi Zirr Bay near Swadar, Pakistan in the Arabian Sea. The first image of the island was taken by NASA’s Earth Observing-1 satellite on September 26, while the second snapshot shows the same bay on April 17 with water and no landmass around the coordinates that the new island now inhabits. More
Originally posted on Conservatives Against Tyranny:
9/26/13. Amid spying scandal, billion-dollar NSA data center may secretly open. RT.com
“The new National Security Agency building in Bluffdale, Utah will be the most expensive facility in the NSA’s history, but don’t expect any sort of grand unveiling when it’s finally functioning.
The $1.5 billion NSA data center is scheduled to officially open up this fall, but the Salt Lake City Tribune is now reporting that the facility may already be up and running.
View original 444 more words
Now might be a good time to check your credit history for anything fishy. A new investigative report from security researcher Brian Krebs shows that a group of identity thieves have successfully infiltrated the networks of three major data brokers, giving them access to Social Security Numbers, dates of birth, and other personal details that could put all our financials at risk. More
Originally posted on VentureBeat:
Sponsored Jobs on LinkedIn just got a little more valuable. The company announced today that these paid-for job listings will now be pushed into users’ LinkedIn feeds found on the site’s homepage.
LinkedIn first released the option to buy sponsored jobs last year, but these listings did not show up in the targeted person’s feed. Now, both “active and passive job seekers” will be able to view your job postings, broadening the potential applicant pool while continuing to filter for those the company truly wants. This might serve as an attractive option in a time when many businesses’ first complaint is that they can’t find the right candidate.
It will also serve as a potentially lucrative ad product for LinkedIn. Social networks and Internet companies alike are searching for new ways to make revenue. In-stream job-lead generation could be a good avenue for LinkedIn, which has a very purpose-driven audience.
View original 68 more words
Originally posted on Lost Packets:
- The desperate search for online privacy is over (japantimes.co.jp)
- Tor Browser Bundle – how to download and start using it (indiaitd.wordpress.com)
- FBI Admits It Controlled Tor Servers Behind Mass Malware Attack (sallyannfredericktudor.wordpress.com)