27 de abril de 2012
26 de abril de 2012
Madeleine McCann: Portuguese police refuse to reopen case saying there is no new evidence - Telegraph
Madeleine McCann: Portuguese police refuse to reopen case saying there is no new evidence - Telegraph
Portuguese police have refused to reopen the inquiry into the disappearance of Madeleine McCann saying there is no new evidence
Ficamos mal vistos...
Portuguese police have refused to reopen the inquiry into the disappearance of Madeleine McCann saying there is no new evidence
Ficamos mal vistos...
Russia expects North Korea nuclear test - Telegraph
Russia expects North Korea nuclear test - Telegraph
Pyongyang is showing no signs of bowing to the international pressure, however, and on Wednesday used the 80th anniversary of the founding of the North Korean army to declare that it is armed with "powerful, modern weapons" that are capable of defeating the "imperialists" – meaning the United States – in "a single blow."
Estes gajos são os reis vivem mesmo numa realidade á parte...
Pyongyang is showing no signs of bowing to the international pressure, however, and on Wednesday used the 80th anniversary of the founding of the North Korean army to declare that it is armed with "powerful, modern weapons" that are capable of defeating the "imperialists" – meaning the United States – in "a single blow."
Estes gajos são os reis vivem mesmo numa realidade á parte...
25 de abril de 2012
Hollande Portugal aprovou o Pacto Europeu? Não importa, haverá nova negociação! - Expresso.pt
Hollande Portugal aprovou o Pacto Europeu? Não importa, haverá nova negociação! - Expresso.pt
Ler mais: http://expresso.sapo.pt/hollande-portugal-aprovou-o-pacto-europeu-nao-importa-havera-nova-negociacao=f721515#ixzz1t5AKXIvu
Em conferência de imprensa, em Paris, o favorito para as presidenciais francesas desvalorizou o facto de Portugal ter já aprovado o Pacto Orçamental Europeu, com os votos a favor do PS português: "Não importa, se for eleito haverá uma nova negociação!"
Ler mais: http://expresso.sapo.pt/hollande-portugal-aprovou-o-pacto-europeu-nao-importa-havera-nova-negociacao=f721515#ixzz1t5AKXIvu
Mind-controlled robot for paraplegics unveiled - Telegraph
Mind-controlled robot for paraplegics unveiled - Telegraph
A robot that can be controlled by the brainwaves of a paraplegic person wearing an electrode-fitted cap has been unveiled.
Introducing Google Drive... yes, really
Introducing Google Drive... yes, really: Just like the Loch Ness Monster, you may have heard the rumors about Google Drive. It turns out, one of the two actually does exist.
Today, we’re introducing Google Drive—a place where you can create, share, collaborate, and keep all of your stuff. Whether you’re working with a friend on a joint research project, planning a wedding with your fiancé or tracking a budget with roommates, you can do it in Drive. You can upload and access all of your files, including videos, photos, Google Docs, PDFs and beyond.
With Google Drive, you can:
Drive is built to work seamlessly with your overall Google experience. You can attach photos from Drive to posts in Google+, and soon you’ll be able to attach stuff from Drive directly to emails in Gmail. Drive is also an open platform, so we’re working with many third-party developers so you can do things like send faxes, edit videos and create website mockups directly from Drive. To install these apps, visit the Chrome Web Store—and look out for even more useful apps in the future.
This is just the beginning for Google Drive; there’s a lot more to come.
Get started with Drive today at drive.google.com/start—and keep looking for Nessie...
Posted by Sundar Pichai, SVP, Chrome & Apps
Today, we’re introducing Google Drive—a place where you can create, share, collaborate, and keep all of your stuff. Whether you’re working with a friend on a joint research project, planning a wedding with your fiancé or tracking a budget with roommates, you can do it in Drive. You can upload and access all of your files, including videos, photos, Google Docs, PDFs and beyond.
With Google Drive, you can:
- Create and collaborate. Google Docs is built right into Google Drive, so you can work with others in real time on documents, spreadsheets and presentations. Once you choose to share content with others, you can add and reply to comments on anything (PDF, image, video file, etc.) and receive notifications when other people comment on shared items.
- Store everything safely and access it anywhere (especially while on the go). All your stuff is just... there. You can access your stuff from anywhere—on the web, in your home, at the office, while running errands and from all of your devices. You can install Drive on your Mac or PC and can download the Drive app to your Android phone or tablet. We’re also working hard on a Drive app for your iOS devices. And regardless of platform, blind users can access Drive with a screen reader.
- Search everything. Search by keyword and filter by file type, owner and more. Drive can even recognize text in scanned documents using Optical Character Recognition (OCR) technology. Let’s say you upload a scanned image of an old newspaper clipping. You can search for a word from the text of the actual article. We also use image recognition so that if you drag and drop photos from your Grand Canyon trip into Drive, you can later search for [grand canyon] and photos of its gorges should pop up. This technology is still in its early stages, and we expect it to get better over time.
Drive is built to work seamlessly with your overall Google experience. You can attach photos from Drive to posts in Google+, and soon you’ll be able to attach stuff from Drive directly to emails in Gmail. Drive is also an open platform, so we’re working with many third-party developers so you can do things like send faxes, edit videos and create website mockups directly from Drive. To install these apps, visit the Chrome Web Store—and look out for even more useful apps in the future.
This is just the beginning for Google Drive; there’s a lot more to come.
Get started with Drive today at drive.google.com/start—and keep looking for Nessie...
Posted by Sundar Pichai, SVP, Chrome & Apps
Australian Police Accused of Mass Software Piracy
Australian Police Accused of Mass Software Piracy:
The Aussie police are clearly not setting the right example when it comes to copyright infringement. In 2008 computers of the South Australian police force’s IT branch were found to contain hundreds of pirated movies.
There is, however, an even ongoing bigger case in which the New South Wales police are accused of massive software piracy involving its criminal intelligence database.
The software in question, ViewNow, is developed by the UK company Micro Focus. While the company licensed its software to the police in the past, it discovered nearly two years ago the police were using thousands of unauthorized copies.
Even worse, the police also shared the software with third parties such as the Ombudsman’s Office, the Department of Correctives Services and the Police Integrity Commission. All without permission from the software company.
In an attempt to get compensated for several years worth of mass piracy, Micro Focus has filed a lawsuit in which it’s demanding more than $10 million in damages. Micro Focus’ managing director Bruce Craig says they saw no other option than to sue, as they can’t go to the police.
“When someone pirates your software you think who am I gonna call, the police? In this case, they’re the pirates,” Craig comments on 7.30.
“This is potentially a crime that has to be handled as a civil matter because everybody’s got their hands dirty,” he added. “The victims can’t go to police – it’s the police who are doing the stealing.”
At the center of the legal battle is a dispute over the licenses for the ViewNow software. Micro Focus says the police had licenses to install ViewNow on up to 6,500 computers, but in fact more than 16,000 copies were installed. In addition, the police shared copies with other organizations without permission.
“The licenses were for police only. Yet police were out there handing out our software like confetti,” Craig says. “They did not pay for those extra licenses. It’s incredible. It shows an organization that’s completely out of control.”
The police on the other hand claim that they are not aware of any restrictions. Instead, they claim that they could use as many copies as they want according to their interpretation of the contract.
To make matters even worse, Micro Focus is now threatening a new lawsuit as they suspect that the police have replaced the ViewNow software with an alternative called NetManage Applet. This application also belongs to Micro Focus, and they have not licensed the police to use that without restrictions either.
Who’s right and who’s wrong will eventually be decided by the court, but there is already one losing party – the taxpayer. The police have already spent hundreds of thousands of dollars in legal fees, and the case has barely begun.
Source: Australian Police Accused of Mass Software Piracy
The Aussie police are clearly not setting the right example when it comes to copyright infringement. In 2008 computers of the South Australian police force’s IT branch were found to contain hundreds of pirated movies.
There is, however, an even ongoing bigger case in which the New South Wales police are accused of massive software piracy involving its criminal intelligence database.
The software in question, ViewNow, is developed by the UK company Micro Focus. While the company licensed its software to the police in the past, it discovered nearly two years ago the police were using thousands of unauthorized copies.
Even worse, the police also shared the software with third parties such as the Ombudsman’s Office, the Department of Correctives Services and the Police Integrity Commission. All without permission from the software company.
In an attempt to get compensated for several years worth of mass piracy, Micro Focus has filed a lawsuit in which it’s demanding more than $10 million in damages. Micro Focus’ managing director Bruce Craig says they saw no other option than to sue, as they can’t go to the police.
“When someone pirates your software you think who am I gonna call, the police? In this case, they’re the pirates,” Craig comments on 7.30.
“This is potentially a crime that has to be handled as a civil matter because everybody’s got their hands dirty,” he added. “The victims can’t go to police – it’s the police who are doing the stealing.”
At the center of the legal battle is a dispute over the licenses for the ViewNow software. Micro Focus says the police had licenses to install ViewNow on up to 6,500 computers, but in fact more than 16,000 copies were installed. In addition, the police shared copies with other organizations without permission.
“The licenses were for police only. Yet police were out there handing out our software like confetti,” Craig says. “They did not pay for those extra licenses. It’s incredible. It shows an organization that’s completely out of control.”
The police on the other hand claim that they are not aware of any restrictions. Instead, they claim that they could use as many copies as they want according to their interpretation of the contract.
To make matters even worse, Micro Focus is now threatening a new lawsuit as they suspect that the police have replaced the ViewNow software with an alternative called NetManage Applet. This application also belongs to Micro Focus, and they have not licensed the police to use that without restrictions either.
Who’s right and who’s wrong will eventually be decided by the court, but there is already one losing party – the taxpayer. The police have already spent hundreds of thousands of dollars in legal fees, and the case has barely begun.
Source: Australian Police Accused of Mass Software Piracy
23 de abril de 2012
Hungary's president steps down after plagiarism scandal - Telegraph
Hungary's president steps down after plagiarism scandal - Telegraph
The president of Hungary has quit after being stripped of his university doctorate in a plagiarism scandal.
Video: Nicolas Sarkozy: France can no longer continue this way - Telegraph
Video: Nicolas Sarkozy: France can no longer continue this way - Telegraph
Nearly one in five French voters cast their ballot in the first round for Marine Le Pen. She wants to pull out of the euro currency, reinstate border controls, crack down on immigrants, and stamp out what she claims is the Islamisation of France.
Nearly one in five French voters cast their ballot in the first round for Marine Le Pen. She wants to pull out of the euro currency, reinstate border controls, crack down on immigrants, and stamp out what she claims is the Islamisation of France.
European Union increases pressure on Hungary - Telegraph
European Union increases pressure on Hungary - Telegraph
Prime Minister Viktor Orban's conservative Fidesz party has been condemned by the international community for introducing measures that threaten the independence of the media, the judiciary and the central bank since sweeping to power in 2010.
Prime Minister Viktor Orban's conservative Fidesz party has been condemned by the international community for introducing measures that threaten the independence of the media, the judiciary and the central bank since sweeping to power in 2010.
21 de abril de 2012
Weapons of Mass Instruction
Weapons of Mass Instruction:
Argentinian artist Raul Lemesoff constructed a reading tank to spread the word… or words, if you please.
Argentinian artist Raul Lemesoff constructed a reading tank to spread the word… or words, if you please.
Submitted by: Unknown
Via: Recyclart
Most awesome guy on the planet
Most awesome guy on the planet:
Submitted by: tuxa91
Posted at: 2012-04-20 00:04:12
See full post and comment: http://9gag.com/gag/3919614
Submitted by: tuxa91
Posted at: 2012-04-20 00:04:12
See full post and comment: http://9gag.com/gag/3919614
We miss you Charlie!
We miss you Charlie!:
Submitted by: trolldicu
Posted at: 2012-04-19 20:23:00
See full post and comment: http://9gag.com/gag/3917481
Submitted by: trolldicu
Posted at: 2012-04-19 20:23:00
See full post and comment: http://9gag.com/gag/3917481
19 de abril de 2012
Spy tech exports from Europe face tighter scrutiny
Spy tech exports from Europe face tighter scrutiny:
The EU could soon introduce rules to monitor the deployment of internet censorship technology in autocratic regimes including China and Saudi Arabia.
The European Parliament is proposing a resolution to strengthen the accountability of countries that export gear used to block websites and eavesdrop on mobile communications.
The European Parliament is proposing a resolution to strengthen the accountability of countries that export gear used to block websites and eavesdrop on mobile communications.
Tags:
Hackers have all the exploits needed for iOS 5.1 jailbreak
Hackers have all the exploits needed for iOS 5.1 jailbreak:
L33tdawg: The iOS jailbreak 'Dream Team' including pod2g, planetbeing, nikias and p0sixninja will be in Amsterdam next month at HITB2012AMS in their first ever public appearance!
Hackers have all the exploits needed for iOS 5.1 jailbreak
Hackers have all the exploits needed for iOS 5.1 jailbreak:
L33tdawg: The iOS jailbreak 'Dream Team' including pod2g, planetbeing, nikias and p0sixninja will be in Amsterdam next month at HITB2012AMS in their first ever public appearance!
Canonical is not interested in the Linux kernel
Canonical is not interested in the Linux kernel:
Canonical said it has "no interest" in Linux kernel development. Two weeks ago a Linux Foundation report showed that since version 2.6.32, Microsoft had committed more code to the Linux kernel than Canonical. Since then, Canonical has faced claims from rivals that it does not contribute to Linux as much as it should given its popularity.
European Parliament agrees to send airline passenger data to US
European Parliament agrees to send airline passenger data to US:
The European Parliament on Thursday approved a controversial data transfer agreement with the U.S. that had sharply divided legislators.
Tags:
15 de abril de 2012
2012-04-11: Governo cria comissão instaladora do Centro Nacional de Cibersegurança
2012-04-11: Governo cria comissão instaladora do Centro Nacional de Cibersegurança: Segundo o comunicado do Conselho de Ministros, a comissão instaladora do Centro Nacional de Cibersegurança está obrigada a apresentar, até 30 de junho[...]
Famous designer says Apple will reveal 'revolutionary' product within 8 months
Famous designer says Apple will reveal 'revolutionary' product within 8 months:
Acclaimed French designer Phillippe Starck revealed in a recent interview that he has been working with Apple on a "revolutionary" new product that will be revealed within the next 8 months.
Starck revealed the information in a radio interview with France Info, as discovered by HardMac. No further details were given on what the product may be.
Starck revealed the information in a radio interview with France Info, as discovered by HardMac. No further details were given on what the product may be.
Tags:
FBI track Anonymous hacker using his girlfriend's boobs
FBI track Anonymous hacker using his girlfriend's boobs: FBI track Anonymous hacker using his girlfriend's boobs
The FBI swooped on Higinio O Ochoa III after he posted the snap, which included a gloating message to his online victims.He took the picture on his iPhone and posted it on Twitter without realising it contained GPS data pointing directly to his house.
Researching the username “w0rmer”, investigators also found a reference online which
The FBI swooped on Higinio O Ochoa III after he posted the snap, which included a gloating message to his online victims.He took the picture on his iPhone and posted it on Twitter without realising it contained GPS data pointing directly to his house.
Researching the username “w0rmer”, investigators also found a reference online which
How To Make VPNs Even More Secure
How To Make VPNs Even More Secure:
While simple to set up and use out of the box, it may comes as a surprise that the security of VPN anonymity services can be improved. Of course, when things run absolutely to plan there’s little to worry about, but there are occasions where there may be a hiccup or where an extra level of security is needed.
Fortunately, there are solutions.
“To protect against the event of VPN failure/disconnection, disable any internet access that does not tunnel through your VPN service provider,” Andrew from PrivateInternetAccess told TorrentFreak. “This can be achieved using specific Firewall rules (Ubuntu) or by changing TCP/IP routes.
But of course, not everyone wants to spend time with these manual configurations that could potentially cause problems if they’re not done properly. So, TorrentFreak spoke with the creators of two free pieces of software that do the job more easily.
VPNetMon (Windows) can be downloaded here.
VPNCheck (Windows/Linux) can be downloaded here.
“A DNS leak may happen whenever a DNS query ‘bypasses’ the routing table and gateway pushed by the OpenVPN server. The trigger on Windows systems may be as simple as a slight delay in the answer from the VPN DNS, or the VPN DNS unable to resolve some name,” explains Paolo from AirVPN.
A tool for checking for leaks can be found at DNSLeakTest.com and a solution for fixing any problems can be found here. Alternatively, anyone using the pro version of VPNCheck will have this feature built in.
“If you don’t trust your VPN provider 100%, use two VPNs,” explains Felix from VPNetMon. “This way you are tunneling your already encrypted connection through another tunnel.”
In Windows this is easily achieved. First, simply set up at least two VPN accounts as normal (if you’d like an extra one for testing purposes you can get a free limited account from VPNReactor). Then connect to one VPN and when complete connect to the another without disconnecting the first. Like magic, a tunnel through a tunnel.
Its also possible to VPN over TOR, but please please don’t use TOR for file-sharing traffic, it’s not designed for it.
“VPN over TOR gives several security advantages, for a performance price, above all partition of trust,” explains Paolo from AirVPN. “In case of betrayal of trust by one party, the anonymity layer is not compromised in any way.
A VPN over TOR tutorial can be found here, further discussion here.
For Windows Vista and above:
Open cmd prompt and type:
netsh interface teredo set state disabled.
For Ubuntu 10+:
Copy and paste all four lines into a terminal:
echo “#disable ipv6″ | sudo tee -a /etc/sysctl.conf
echo “net.ipv6.conf.all.disable_ipv6 = 1″ | sudo tee -a /etc/sysctl.conf
echo “net.ipv6.conf.default.disable_ipv6 = 1″ | sudo tee -a /etc/sysctl.conf
echo “net.ipv6.conf.lo.disable_ipv6 = 1″ | sudo tee -a /etc/sysctl.conf
“For example, signup for an anonymous e-mail account using Tor and use a Bitcoin Mixer to send Bitcoins to a newly generated address in your local wallet. Alternatively, use the Bitcoin-OTC to purchase Bitcoins ‘over the counter’ from a person, rather than an exchange.
“Then, use a patched Bitcoin client, such as coderrr’s anonymity patch to avoid linking the newly generated address to any of your pre-existing Bitcoin addresses.”
Do you have a helpful security tip for VPN users? If so, feel free to add it to the comments below.
Source: How To Make VPNs Even More Secure
While simple to set up and use out of the box, it may comes as a surprise that the security of VPN anonymity services can be improved. Of course, when things run absolutely to plan there’s little to worry about, but there are occasions where there may be a hiccup or where an extra level of security is needed.
Securing your privacy when your VPN fails
Ok, so you’ve purchased your VPN subscription, enabled the service, and you’re enjoying your new found levels of privacy. Then – disaster strikes. While you were away from your machine somehow and for some unknown reason your VPN disconnected and now snoopers have a clear view of your IP address.Fortunately, there are solutions.
“To protect against the event of VPN failure/disconnection, disable any internet access that does not tunnel through your VPN service provider,” Andrew from PrivateInternetAccess told TorrentFreak. “This can be achieved using specific Firewall rules (Ubuntu) or by changing TCP/IP routes.
But of course, not everyone wants to spend time with these manual configurations that could potentially cause problems if they’re not done properly. So, TorrentFreak spoke with the creators of two free pieces of software that do the job more easily.
VPNetMon
“VPNetMon continuously watches the IP addresses of your PC. If the IP address of your VPN is not detected anymore, VPNetMon closes specified programs instantly. The program reacts so quickly that a new connection through your real IP will not be established by these applications,” creator Felix told TorrentFreak.VPNetMon (Windows) can be downloaded here.
VPNCheck
“VPNCheck helps you to feel safe if your VPN connection breaks, this is done by shutting down your main network connection or programs of your choice and showing a notification box,” Jonathan from Guavi.com told TorrentFreak. “Basically it constantly looks for a change in your VPN network adapter. You can connect to either PPTP or L2TP with VPNCheck.”VPNCheck (Windows/Linux) can be downloaded here.
Stop DNS Leaks
When using a VPN service one might expect that all of the user’s traffic will go through the privacy network, but on rare occasions a phenomenon known as “DNS leakage” might occur. This means that rather than using the DNS servers provided by the VPN operator, it’s possible that the user’s default DNS servers will be used instead or otherwise become visible.“A DNS leak may happen whenever a DNS query ‘bypasses’ the routing table and gateway pushed by the OpenVPN server. The trigger on Windows systems may be as simple as a slight delay in the answer from the VPN DNS, or the VPN DNS unable to resolve some name,” explains Paolo from AirVPN.
A tool for checking for leaks can be found at DNSLeakTest.com and a solution for fixing any problems can be found here. Alternatively, anyone using the pro version of VPNCheck will have this feature built in.
Double up your security for extra sensitive data transfers
What if you don’t have 100% trust in your VPN provider and worry that even they might snoop on your communications? Admittedly it’s a very unusual hypothetical situation, but one with an interesting solution.“If you don’t trust your VPN provider 100%, use two VPNs,” explains Felix from VPNetMon. “This way you are tunneling your already encrypted connection through another tunnel.”
In Windows this is easily achieved. First, simply set up at least two VPN accounts as normal (if you’d like an extra one for testing purposes you can get a free limited account from VPNReactor). Then connect to one VPN and when complete connect to the another without disconnecting the first. Like magic, a tunnel through a tunnel.
Its also possible to VPN over TOR, but please please don’t use TOR for file-sharing traffic, it’s not designed for it.
“VPN over TOR gives several security advantages, for a performance price, above all partition of trust,” explains Paolo from AirVPN. “In case of betrayal of trust by one party, the anonymity layer is not compromised in any way.
A VPN over TOR tutorial can be found here, further discussion here.
Fix the PPTP / IPv6 security flaw
As revealed here on TorrentFreak in 2010, people using a PPTP VPN and IPv6 are vulnerable to a nasty security flaw which means that Windows and Ubuntu users could leak their real IP addresses. The following fix comes from Jonathan at VPNCheck.For Windows Vista and above:
Open cmd prompt and type:
netsh interface teredo set state disabled.
For Ubuntu 10+:
Copy and paste all four lines into a terminal:
echo “#disable ipv6″ | sudo tee -a /etc/sysctl.conf
echo “net.ipv6.conf.all.disable_ipv6 = 1″ | sudo tee -a /etc/sysctl.conf
echo “net.ipv6.conf.default.disable_ipv6 = 1″ | sudo tee -a /etc/sysctl.conf
echo “net.ipv6.conf.lo.disable_ipv6 = 1″ | sudo tee -a /etc/sysctl.conf
Pay for your VPN with untrackable currency.
“When anonymity is a factor, pay with an un-trackable currency,” explains Andrew from PrivateInternetAccess.“For example, signup for an anonymous e-mail account using Tor and use a Bitcoin Mixer to send Bitcoins to a newly generated address in your local wallet. Alternatively, use the Bitcoin-OTC to purchase Bitcoins ‘over the counter’ from a person, rather than an exchange.
“Then, use a patched Bitcoin client, such as coderrr’s anonymity patch to avoid linking the newly generated address to any of your pre-existing Bitcoin addresses.”
Only use VPN providers that take your privacy seriously
We’ve said this before but it’s worth repeating. VPN providers who heavily log are useful if all you’re concerned about is securely communicating with the Internet through an open public WiFi connection, but not beyond that. For a run down of providers who do not log any data which would enable a 3rd party to identify a user, see our previous article here.Do you have a helpful security tip for VPN users? If so, feel free to add it to the comments below.
Source: How To Make VPNs Even More Secure
11 de abril de 2012
Military finds IT security certification difficulties
Military finds IT security certification difficulties:
The U.S. Army is having a hard time manning its IT staff because it cannot find military personnel with the right networking and IT security qualifications.
Tags:
Subscrever:
Mensagens (Atom)