Skip to main content

Home/ Groups/ Centre for Internet and Society
Pranesh Prakash

GoogleSharing :: A Special Kind Of Proxy - 0 views

  •  
    "Where GoogleSharing Comes In GoogleSharing is a system that mixes the requests of many different users together, such that Google is not capable of telling what is coming from whom. GoogleSharing aims to do a few very specific things: Provide a system that will prevent Google from collecting information about you from services which don't require a login. Make this system completely transparent to the user. No special websites, no change to your work flow. Leave your non-Google traffic completely untouched, unredirected, and unaffected. The GoogleSharing system consists of a custom proxy and a Firefox Addon. The proxy works by generating a pool of GoogleSharing "identities," each of which contains a cookie issued by Google and an arbitrary User-Agent for one of several popular browsers. The Firefox Addon watches for requests to Google services from your browser, and when enabled will transparently redirect all of them (except for things like Gmail) to a GoogleSharing proxy. There your request is stripped of all identifying information and replaced with the information from a GoogleSharing identity. This "GoogleShared" request is then forwarded on to Google, and the response is proxied back to you. Your next request will get a different identity, and the one you were using before will be assigned to someone else. By "sharing" these identities, all of our traffic gets mixed together and is very difficult to analyze. The result is that you can transparently use Google search, images, maps, products, news, etc... without Google being able to track you by IP address, Cookie, or any other identifying HTTP headers. And only your Google traffic is redirected. Everything else from your browser goes directly to its destination. "
Pranesh Prakash

WPA CRACKER - 1 views

  •  
    "An Introduction WPA Cracker is a cloud cracking service for penetration testers and network auditors who need to check the security of WPA-PSK protected wireless networks. WPA-PSK networks are vulnerable to dictionary attacks, but running a respectable-sized dictionary over a WPA network handshake can take days or weeks. WPA Cracker gives you access to a 400CPU cluster that will run your network capture against a 135 million word dictionary created specifically for WPA passwords. While this job would take over 5 days on a contemporary dual-core PC, on our cluster it takes an average of 20 minutes, for only $17. "
Pranesh Prakash

Smita Srinivas | GSAPPonline - 0 views

  •  
    Smita Srinivas is Assistant Professor in the Urban Planning program at Columbia University, Director of the Technological Change Lab (TCLab), and a Faculty Associate of the South Asian Institute (SAI), Columbia University. Current and past projects include primary research in India and Finland, and comparative and collaborative work in the USA, Brazil, South Africa, and elsewhere. She advises students for their M.S. and PhD. dissertations on diverse settings: Yemen, Kenya, S. Korea, Mexico, Spain, Germany, USA, Uganda, India, and others.
Pranesh Prakash

Confabb: The Conference Community - 0 views

  •  
    This allows you to use a TiddlyWiki to take collaborative notes.
Pranesh Prakash

Fake e-profile lands spurned actor in cop net - The Times of India - 0 views

  •  
    Handa (26) was arrested late on Saturday after the police traced the internet protocol address from which the profile was created to his residence at Four Bungalows in Andheri. Booked for breach of trust, forgery and under the Information Technology Act, 2000, he has been remanded in police custody. During interrogations, Handa admitted to the police that he had created the fake profile whom "he was interested in". Handa first met the victim two years ago when the latter had just started to make a career in astrology. The two became friends and for a while, they even shared an apartment in Andheri, the police said. However, the two subsequently fell out when the friend brushed aside Handa's "advances".
Pranesh Prakash

Government 2.0 - a phenomeon on the rise in India | IndiaSocial - social media open - 0 views

  •  
    Examples of Indian government using social media tools.
Pranesh Prakash

gladwell dot com - something borrowed - 0 views

  • Lavery knew that failing to credit Partington would have been wrong. Borrowing the personal story of a woman whose sister was murdered by a serial killer matters because that story has real emotional value to its owner. As Lavery put it, it touches on someone's shattered life. Are boilerplate descriptions of physiological functions in the same league?
  • And this is the second problem with plagiarism. It is not merely extremist. It has also become disconnected from the broader question of what does and does not inhibit creativity. We accept the right of one writer to engage in a full-scale knockoff of another—think how many serial-killer novels have been cloned from "The Silence of the Lambs." Yet, when Kathy Acker incorporated parts of a Harold Robbins sex scene verbatim in a satiric novel, she was denounced as a plagiarist (and threatened with a lawsuit).
  • When I worked at a newspaper, we were routinely dispatched to "match" a story from the Times: to do a new version of someone else's idea. But had we "matched" any of the Times' words—even the most banal of phrases—it could have been a firing offense. The ethics of plagiarism have turned into the narcissism of small differences: because journalism cannot own up to its heavily derivative nature, it must enforce originality on the level of the sentence.
  •  
    My friend had hundreds of these examples. We could have sat in his living room playing at musical genealogy for hours. Did the examples upset him? Of course not, because he knew enough about music to know that these patterns of influence-cribbing, tweaking, transforming-were at the very heart of the creative process. True, copying could go too far. There were times when one artist was simply replicating the work of another, and to let that pass inhibited true creativity. But it was equally dangerous to be overly vigilant in policing creative expression, because if Led Zeppelin hadn't been free to mine the blues for inspiration we wouldn't have got "Whole Lotta Love," and if Kurt Cobain couldn't listen to "More Than a Feeling" and pick out and transform the part he really liked we wouldn't have "Smells Like Teen Spirit"-and, in the evolution of rock, "Smells Like Teen Spirit" was a real step forward from "More Than a Feeling." A successful music executive has to understand the distinction between borrowing that is transformative and borrowing that is merely derivative, and that distinction, I realized, was what was missing from the discussion of Bryony Lavery's borrowings. Yes, she had copied my work. But no one was asking why she had copied it, or what she had copied, or whether her copying served some larger purpose.
Pranesh Prakash

Response to "On the Rights of Molotov Man" | LEESEAN.NET - 0 views

  •  
    Very reminiscent of the debates around cultural appropriation of the Alberto Korda photo of Che.
Pranesh Prakash

The Hindu : Tamil Nadu / Chennai News : Case registered against Airtel - 0 views

  •  
    CHENNAI: The Cyber Crime Cell of the Chennai Central Crime Branch has registered a case on a complaint filed by a city advocate against Airtel mobile communication service that it was sending obscene messages to his phone without his consent. The police registered the case on a complaint filed by the advocate, V.S.Suresh of George Town here, to the Chief Metropolitan Magistrate (CMM), Egmore. The CMM, R.Killivalavan, had forwarded the complaint to the City Central Crime Branch for registering an FIR, investigating the matter and filing the final report. The case has been registered against the Chief Executive Officer, Bharati Airtel Limited for offences, including under Sections 292 (Sale, etc., of obscene books) and 294 (Obscene acts and songs) of IPC.
Pranesh Prakash

Sony sued over Blu-ray patents | Betanews - 0 views

  • Sony has been sued for patent infringement for its Blu-Ray technology once again, this time by California intellectual property company Orinda IP USA.In May 2007, a company called Target Technology sued Sony, alleging that Blu-ray infringed on patents discussing the reflective materials used on optical discs. The suit from Orinda, filed on August 20, involves the method of reproducing data on "disk-shaped media," namely Blu-ray discs.
  •  
    Sony has been sued for patent infringement for its Blu-Ray technology once again, this time by California intellectual property company Orinda IP USA.In May 2007, a company called Target Technology sued Sony, alleging that Blu-ray infringed on patents discussing the reflective materials used on optical discs. The suit from Orinda, filed on August 20, involves the method of reproducing data on "disk-shaped media," namely Blu-ray discs.
Pranesh Prakash

China and American Inventors -- Selected Consequences of Proposed U.S. Patent "Reforms" - 0 views

  • Using that same logic, Chinese pirates and counterfeiters are now defending themselves with a new technique called “A Great Wall of Patents.” The process is simple. Chinese counterfeiters are filing for patents in China for the products they are copying. Most often, they make their applications using drawings and descriptions they take from the patent offices Internet sites in the U.S., Europe and Japan. The International Herald Tribune reports that these Chinese patents are often modifications of the original.
Pranesh Prakash

China Mobile Phones - 0 views

  • Last but not the least the latest cloned mobile released by a Chinese mobile company is the clone of Nokia Xpress Music. This mobile is really going popular and once again has some distorted name of 'Nokia'. It has got some features like:
  •  
    Details of cheap Chinese phones.
Pranesh Prakash

Commons Course Syllabus | David Bollier - 0 views

  •  
    This course surveys the political and economic history of the commons, its strengths and limitations over the centuries, and its burgeoning contemporary manifestations.  We will be guided by the writings of Elinor Ostrom, Peter Linebaugh, Yochai Benkler, Lawrence Lessig, Peter Barnes, Lewis Hyde and David Bollier as well as by a range of films, essays and Web resources.  The course will have direct conversations with policy experts, academics and activists who are at the forefront of commons work, and confront the ambiguities and perplexities of this still-emerging realm of thought and action.
Pranesh Prakash

Understanding Knowledge as a Commons - The MIT Press - 1 views

  •  
    Contributors consider the concept of the commons historically and offer an analytical framework for understanding knowledge as a shared social-ecological system. They look at ways to guard against enclosure of the knowledge commons, considering, among other topics, the role of research libraries, the advantages of making scholarly material available outside the academy, and the problem of disappearing Web pages. They discuss the role of intellectual property in a new knowledge commons, the open access movement (including possible funding models for scholarly publications), the development of associational commons, the application of a free/open source framework to scientific knowledge, and the effect on scholarly communication of collaborative communities within academia, and offer a case study of EconPort, an open access, open source digital library for students and researchers in microeconomics. The essays clarify critical issues that arise within these new types of commons-and offer guideposts for future theory and practice.
1 - 20 of 203 Next › Last »
Showing 20 items per page