Archive for February, 2015 | Monthly archive page

An evidence-based approach to an ancient pursuit: systematic review on converting online contact into a first date

a description of personal traits increased likeability when it: showed who the dater was and what they were looking for in a 70:30 ratio; stayed close to reality; and employed simple language with humour added. Invitations were most successful in obtaining a response from the potential date when they: were short personalised messages addressing a […]

Lenovo ships laptops with man in the middle spyware on it

The superfish software shipped with Lenovo laptops can intercept and redirect your secure browsing sessions (eg to your bank) so that third parties can hijack them. You can test to see if your Lenovo product is infected, how to do so is included in the link below. It can also be removed, again instructions in […]

HTTP/2 Released

Why revise HTTP? HTTP/1.1 has served the Web well for more than fifteen years, but its age is starting to show. Loading a Web page is more resource intensive than ever (see the HTTP Archive’s page size statistics), and loading all of those assets efficiently is difficult, because HTTP practically only allows one outstanding request […]

EU air passenger surveillance system could be ready for take-off by year end

Despite privacy concerns and doubts over its usefulness, a plan to track passengers entering or leaving the European Union in a series of national databases is likely to become reality by the end of the year. The call to build national databases of so-called passenger name records (PNRs) has become louder since the recent terror […]

Stop de bewaarplicht » Eis dat jouw provider stopt met de bewaarplicht!

Stop de bewaarplicht » Eis dat jouw provider stopt met de bewaarplicht!.

Hackers fear arms control pact makes exporting flaws illegal

The Wassenaar Arrangement, signed by 42 nations, can be implemented differently by each of these nations. Hackers are worried that exploits are controlled by these arms controls and will be punishable. Leaving 0-day exploits in the wild or unpublished is not good for IT security, as only the people who have them can use them […]

Hackers steal 1 billions dollars over 2 years time in greatest heist ever

By learning about the habits of co-workers in over 100 financial institutions, mainly in Russia, the hackers infected computers using spear fishing techniques. They upped the balance of accounts and transferred away the excess money. They also programmed PIN machines to spit out money at specified times. Hackers stelen 1 miljard dollar bij 'grootste bankroof […]

3 Rear Admirals Forced Out Amid Massive Navy Bribery Scandal

As well as several other officers, they were bribed to the tune of hundreds of thousands of dollars, allowing the company doing the bribing to overcharge for around $20 million dollars. 3 Rear Admirals Forced Out Amid Massive Navy Bribery Scandal |

The Most Comprehensive Handstand Tutorial

The Most Comprehensive Handstand Tutorial

over 500 free-programming-books

BMW finally fixes 1/2 year old flaw that lets anyone open windows and doors

Luxury car manufacturer BMW has rolled out a patch for a security flaw that could have allowed hackers to open the doors of some 2.2 million vehicles. The issue affects BMW, Mini and Rolls Royce models that come equipped with ConnectedDrive – a technology that allows car owners to access internet, navigation and other services […]

Anthem, America’s second biggest health insurer, HACKED: Millions hit by breach • The Register

Anthem, the US’s second biggest health insurer with about 70 million people on its books across the country, admitted late on Wednesday, Pacific time, that it has been comprehensively ransacked by criminals. Tens of millions of records are likely to have been obtained illegally as a result of the hack, Anthem warned

WebRTC enabled browsers give up your real IP through a VPN

via a piece of javascript, so using NoScript on Firefox negates it. Beware!

Samsung TVs listen to you and send your words far away

“If you do not enable Voice Recognition, you will not be able to use interactive voice recognition features, although you may be able to control your TV using certain predefined voice commands. While Samsung will not collect your spoken word, Samsung may still collect associated texts and other usage data so that we can evaluate […]

EU politicians use outlook in the cloud, surprised all their base belongs to USA

How is it possible these muffheads running Europe didn’t realise this? If you put stuff in American cloud it is giving it away to the NSA FBI and any other 3 letter US acronym you can think of. And these dozy fuckers are surprised it’s going badly with the economy? And that people don’t like […]

FSF certify Libreboot X200 laptop

The Free Software Foundation (FSF) has certified another laptop by the UK based supplier The Gnulug. This is the second laptop by the company to get FSF certification. […] They also had to replace Intel’s Management Engine (ME) system and Intel’s Active Management Technology (AMT) firmware which are proprietary. FSF have previously addresses ME and […]

Twine is an open-source tool for telling interactive, nonlinear stories.

Twine is an open-source tool for telling interactive, nonlinear stories. You don’t need to write any code to create a simple story with Twine, but you can extend your stories with variables, conditional logic, images, CSS, and JavaScript when you’re ready. Twine publishes directly to HTML, so you can post your work nearly anywhere. Anything […]

Skip to toolbar