Google: “Every day our partnership with the entertainment industry deepens”
Don’t be evil? via Google Public Policy Blog: Continued progress on fighting piracy.
Linking ideas with the world
Don’t be evil? via Google Public Policy Blog: Continued progress on fighting piracy.
The addresses and domains you email to, your search terms, how often you use your Mac. And this with a few hours of poking. Apple keeps saying it’s leaving users alone, but really? fix-macosx/yosemite-phone-home · GitHub.
The Dutch province Utrecht has signed a deal with City Wireless that allows people free wireless. They can log in with their Facebook profile, which is then harvested for information for marketing purposes. City Wireless has since changed its’ homepage, removing the grizly details, but the Dutch paper still has the screencaps. Article in Dutch. Read more about NL Provice of Utrecht buys citizen Facebookprofiles for marketing by offering free WiFi.[…]
Free up shared wifi spots! Over a year of traveling, I’ve consistently struggled with broken wifi spots overloaded with torrent traffic. After talking with the frustrated non-technical people who owned/managed them, I wrote this program to help network users and owners. This program: Listens for BitTorrent clients on the network, Adds their IPs and MACs Read more about BitHammer – Ban BitTorrent clients[…]
A recent AP survey of 10 leading voice biometric vendors found that more than 65 million people worldwide have had their voiceprints taken, and that several banks, including Barclays PLC in Britain and Minneapolis-based U.S. Bancorp, are in the process of introducing their customers to the technology. via Banks harvest callers' voiceprints to fight fraud. Read more about Banks harvest callers’ voiceprints without their knowledge[…]
Lockheed Martin is developing an exoskeleton that transfers all the energy used to the ground, thus allowing you to lift heavy loads without using batteries. FORTIS Exoskeleton · Lockheed Martin.
The South Korean government is considering a complete overhaul of its national identity number computer system – after hackers comprehensively ransacked it and now hold the ID codes for as much as 80 per cent of the population. Each South Korean citizen is issued with a lifetime unique ID number. This number is used in Read more about Hackers own 80% of all South Korean ID data[…]
Fact does not come from the grand leaps of discovery but rather from the small, careful steps of verification. That is the premise of the Open Source Security Testing Methodology Manual also known as the OSSTMM (pronounced as "awstem") It is a peer-reviewed manual of security testing and analysis which result in verified facts. These Read more about Open Source Security Testing Methodology Manual (OSSTMM)[…]
PrintScreen is an enabling technology for digital fabrication of customized flexible displays using thin-film electroluminescence (TFEL). It enables inexpensive and rapid fabrication of highly customized displays in low volume, in a simple lab environment, print shop or even at home. We show how to print ultra-thin (120 um) segmented and passive matrix displays in greyscale Read more about PrintScreen: print touch screens on anything, including paper[…]
They found that if Friendster had used certain state-of-the-art prediction algorithms, it could have divined sensitive information about non-members, including their sexual orientation. “At the time, it was possible for Friendster to predict the sexual orientation of people who did not have an account on Friendster,” [….] The problem Garcia identifies lies in something called Read more about Not on a Social Network? You’ve Still Got a Privacy Problem[…]
Adobe’s Digital Editions 4 ebook reader software is collecting detailed information about the reading habits of its users – and sending it back to the company in a format that’s easy for others to slurp. An investigation by Nate Hoffelder of The Digital Reader blog showed that ADE 4 was collecting telemetry on which pages Read more about Adobe spies on readers: EVERY page you turn, EVERY book you own leaked back to base[…]
Microsoft collects information about you, your devices, applications and networks, and your use of those devices, applications and networks. Examples of data we collect include your name, email address, preferences and interests; browsing, search and file history; phone call and SMS data; device configuration and sensor data; and application usage. This isn’t the only thing Read more about Using the Windows 10 Technical Preview? Microsoft might be watching your every move to “help with feedback”[…]
It’s a comb like structure, which means the hairs can be washed out easily Tiya convenient floor drain – 2014 | concept | Red Dot Award: Design Concept.
2 pcs. Red and Blue Light Saber Space Keys for $10,- via Light Saber Keys, space keys..
The University of Illinois has put together a comprehensive list of stain solutions. Each solution contains the supplies you will need and the preferred method for cleaning the stain via Stain Solutions | U of I Extension.
Conservative policy towards the Human Rights Act has serious consequences for privacy and freedom of expressionAccording to most of the broadsheets, if there is a Conservative Government after the next General Election, the European Court of Human Rights will no longer be able to overrule British courts. via Conservative policy towards the Human Rights Act Read more about UK Conservatives want to get rid of pesky EU Human Rights[…]
Are you looking for an easy way to access Linux desktop applications LibreOffice, Evolution etc remotely?fernapp makes it possible to run a GUI application on a Linux server and access it from anywhere via web browser!It’s not an ordinary remote desktop. It focuses on the application windows and integrates them nicely. via fernapp. In the Read more about fernapp – libreoffice in the browser[…]
Authy provides you Strong Authentication for your daily apps like Facebook, Dropbox, Evernote, AWS, Outlook and many others. You can use Authy to keep safe of hacking & phishing attacks easy & quickly. It runs on Apple, Android, Blackberry, OS X, Windows and Linux. It also works when you’re offline. via Two-Factor Authentication App | Read more about Two-Factor Authentication App | Authy[…]
To build your own device Purchase 2 sets of 2 lenses with different focal lengths f1 and f2 (4 lenses total, 2 with f1 focal length, and 2 with f2 focal length) Separate the first 2 lenses by the sum of their focal lengths (So f1 lens is the first lens, f2 is the 2nd Read more about ‘Cloaking’ device uses ordinary lenses to hide objects across range of angles[…]
Viator.com | Viator News & Press Releases.
The little robot in the picture above is a PIBOT, a small, very low-cost humanoid (actually a Bioloid Premium from Robotis). It’s been slightly modified to be able to work the controls of a scaled-down, simulated aircraft cockpit, as in the pic above. PIBOT is able to identify and use all of the buttons and Read more about Tiny Humanoid Robot Learning to Fly Real Airplanes[…]
Four Heroes Search the Deadly Gauntlet For Untold Riches WILL THEY MAKE IT OUT ALIVE? For ages, fool-hardy adventurers have been lured by promises of countless treasures in the depths of the Gauntlet, yet none have ever made it out alive. The corrupt wizard Morak conjures minions and devious traps against would-be champions and taunts Read more about Gauntlet 2014 released![…]
A very cheap mission has managed to park into Mars Orbit first time, something never before done. Congratulations India! ISRO: Mars Orbiter Mission.
Engineering students from the University of Toronto have developed a 3D bioprinter that can rapidly create artificial skin grafts from a patient’s cells to help treat burn victims. via PrintAlive: 3D Bioprinter Creates 'Living Bandage' Skin Grafts to Treat Burn Victims – Yahoo News UK.
Australian spies will soon have the power to monitor the entire Australian internet with just one warrant, and journalists and whistleblowers will face up to 10 years’ jail for disclosing classified information. via Terror laws clear Senate, enabling entire Australian web to be monitored and whistleblowers to be jailed.