Skip to main content

Home/ Centre for Internet and Society/ Group items tagged security

Rss Feed Group items tagged

Pranesh Prakash

DMCA Rules Regarding Access-Control Technology Exemptions - The Library Today (Library ... - 0 views

  •  
    "The six classes of works are: (1) Motion pictures on DVDs that are lawfully made and acquired and that are protected by the Content Scrambling System when circumvention is accomplished solely in order to accomplish the incorporation of short portions of motion pictures into new works for the purpose of criticism or comment, and where the person engaging in circumvention believes and has reasonable grounds for believing that circumvention is necessary to fulfill the purpose of the use in the following instances: (i) Educational uses by college and university professors and by college and university film and media studies students; (ii) Documentary filmmaking; (iii) Noncommercial videos (2) Computer programs that enable wireless telephone handsets to execute software applications, where circumvention is accomplished for the sole purpose of enabling interoperability of such applications, when they have been lawfully obtained, with computer programs on the telephone handset. (3) Computer programs, in the form of firmware or software, that enable used wireless telephone handsets to connect to a wireless telecommunications network, when circumvention is initiated by the owner of the copy of the computer program solely in order to connect to a wireless telecommunications network and access to the network is authorized by the operator of the network. (4) Video games accessible on personal computers and protected by technological protection measures that control access to lawfully obtained works, when circumvention is accomplished solely for the purpose of good faith testing for, investigating, or correcting security flaws or vulnerabilities, if: (i) The information derived from the security testing is used primarily to promote the security of the owner or operator of a computer, computer system, or computer network; and (ii) The information derived from the security testing is used or maintained in a manner that does not facilitate copyright infringement or a violation
Pranesh Prakash

After BlackBerry, govt lens on web traffic - Internet - Infotech - The Economic Times - 0 views

  •  
    According to department of telecom (DoT) sources, an inter-ministerial group meeting has been called on August 20 and will be attended by senior officials from DRDO, the Cabinet secretariat, security agencies, National Technical Research Organization (NTRO), Centre for Development of Telematics (C-DOT ) and DoT, to review the internet monitoring systems deployed nationwide by C-DOT . It seems there are new requests from the Directorate of Revenue Intelligence (DRI) and National Investigation Agency (NIA) for internet monitoring systems. Internet traffic in India is monitored at international internet gateways using C-DOT systems. Unlike mobile voice and data traffic, the government does not issue specific warrants for intercepting and monitoring messages on specific targets in case of internet services. The government has access to these through CDOT-deployed systems and can use them to access messages based on the needs of security agencies. Internet traffic monitoring also raises some serious issues of consumer privacy, because unlike mobile telephones , the operator has no role in carrying out specific interceptions.
Pranesh Prakash

United States' 2010 Joint Strategic Plan on Intellectual Property Enforcement - 0 views

  •  
    The strategy contains more than thirty concrete recommendations for improvement, falling into six main categories. First, we will lead by example. Specifically, we will work to ensure that we do not mistakenly purchase or use illegal products. Second, the strategy underscores that this Administration supports transparency. That includes transparency in our development of enforcement policy, information sharing, and reporting of law enforcement activities at home and abroad. Third, we will improve coordination and thereby increase efficiency and effectiveness of law enforcement efforts at the Federal, state and local level, of personnel stationed overseas and of our international training efforts. Fourth, we will work with our trading partners and within international organizations to better enforce American intellectual property rights in the global economy. In that regard, we will initiate a comprehensive review of current efforts in support of U.S. businesses that have difficulty enforcing their intellectual property rights in overseas markets, with a particular focus on China. Fifth, we must secure our supply chain. To achieve this most important goal, we will take a close look at the unique problems posed by foreign-based websites and other entities that provide access to counterfeit or pirated products, and develop a coordinated and comprehensive plan to address them. We will make sure our law enforcement has the authority it needs to secure the supply chain and also encourage industry to work collaboratively to address unlawful activity on the internet, such as illegal downloading and illegal internet pharmacies. Sixth, and finally, we will make sure we spend your money wisely, a process we have already begun. To do that, we have, and will continue to collect and track the amount of money we spend on intellectual property enforcement per year. We will use this information to map out the most effective way to fight this theft.
Pranesh Prakash

8 Principles of Open Government Data - 0 views

  •  
    "Open Government Data Principles Government data shall be considered open if it is made public in a way that complies with the principles below: 1. Complete All public data is made available. Public data is data that is not subject to valid privacy, security or privilege limitations. 2. Primary Data is as collected at the source, with the highest possible level of granularity, not in aggregate or modified forms. 3. Timely Data is made available as quickly as necessary to preserve the value of the data. 4. Accessible Data is available to the widest range of users for the widest range of purposes. 5. Machine processable Data is reasonably structured to allow automated processing. 6. Non-discriminatory Data is available to anyone, with no requirement of registration. 7. Non-proprietary Data is available in a format over which no entity has exclusive control. 8. License-free Data is not subject to any copyright, patent, trademark or trade secret regulation. Reasonable privacy, security and privilege restrictions may be allowed."
Pranesh Prakash

WPA CRACKER - 1 views

  •  
    "An Introduction WPA Cracker is a cloud cracking service for penetration testers and network auditors who need to check the security of WPA-PSK protected wireless networks. WPA-PSK networks are vulnerable to dictionary attacks, but running a respectable-sized dictionary over a WPA network handshake can take days or weeks. WPA Cracker gives you access to a 400CPU cluster that will run your network capture against a 135 million word dictionary created specifically for WPA passwords. While this job would take over 5 days on a contemporary dual-core PC, on our cluster it takes an average of 20 minutes, for only $17. "
Pranesh Prakash

Google Bans Music Uploads From Blogs | The Korea Times - 0 views

  • Google has banned subscribers to its Korean blogging platform, Textcube (www.textcube.org), from uploading songs onto their blogs, citing the country's new anti-file sharing provisions aimed at thwarting online piracy. This is the first time that the U.S. giant has disabled its bloggers from posting music files on their personal Web pages.
  • Last month, Google blocked users from posting videos and comments on the Korean site of YouTube (kr.youtube.com), its online video service. This was to avoid the new regulations that mandate Internet users to make verifiable real-name registrations on all Web sites with more than 100,000 daily visitors, which means they have to submit their resident registration codes, the Korean equivalent of social security numbers.
  • Complying with the real-name rules would have been an enormous risk for Google, as the government could later demand user information from the company, not a precedent it wants to show to other countries.
  •  
    Google has banned subscribers to its Korean blogging platform, Textcube (www.textcube.org), from uploading songs onto their blogs, citing the country's new anti-file sharing provisions aimed at thwarting online piracy. This is the first time that the U.S. giant has disabled its bloggers from posting music files on their personal Web pages. Last month, Google blocked users from posting videos and comments on the Korean site of YouTube (kr.youtube.com), its online video service. This was to avoid the new regulations that mandate Internet users to make verifiable real-name registrations on all Web sites with more than 100,000 daily visitors, which means they have to submit their resident registration codes, the Korean equivalent of social security numbers.
Pranesh Prakash

Innovation: Harnessing spammers to advance AI - tech - 17 April 2009 - New Scientist - 0 views

  •  
    Spammers have already written software able to match humans at some CAPTCHAs. But when CAPTCHAs finally fail, their co-creator Luis von Ahn at Carnegie Mellon University says there will be reason for celebration as well as concern. Software that can solve any text-based CAPTCHA will be as much a milestone for artificial intelligence as it will be a problem for online security.
Pranesh Prakash

As Sarkozy Pushes Three Strikes, He Pays Up For His Own Copyright Violations | Techdirt - 0 views

  •  
    We found it rather ironic that, just as French President Nicolas Sarkozy was so adamant about passing a three strikes law to kick file sharers off the internet, he was being accused of copyright infringement himself, specifically for using music from the US band MGMT at an event and in two online videos without securing a license. Now, you might hope that this would cause Sarkozy to rethink his stance on copyright infringement. Instead, it looks like his political party has simply agreed to pay up and make the issue go away, while still pushing for the three strikes law. It sounds like they paid about 30,000 euros, which is a lot more than the single euro that Sarkozy's party initially offered (yes, seriously). No word on whether or not this counts towards the number of strikes on Sarkozy's internet connection.
Pranesh Prakash

Government Shuts Down BitTorrent Tracker | TorrentFreak - 0 views

  •  
    April 21, 2009: Today the Malaysian government ordered prominent webhosting provider Shinjiru to close down BitTorrent site LeechersLair.com. The order came from the Content, Consumer and Network Security Division of the Malaysian Communications and Multimedia Commission.
Pranesh Prakash

freedom bits » FSFE statement at WIPO SCP/13 re/ future work - 0 views

  •  
    "Over the past years, various Member States have repeatedly requested that WIPO become inclusive of all methodologies to foster innovation, including Copyright, Patents, Free Software and Open Innovation Models. Many Member States successfully employ a wider mix of methodologies on a national level already, such as Germany, which as part of its response to the financial crisis decided to invest 500m EUR into the focus areas Green IT, IT-Security and Free Software. Other examples exist from various Member States around the world, spanning all regional groups."
Pranesh Prakash

NY tax worker accused of stealing taxpayers' IDs - 0 views

  •  
    TROY, N.Y. -- A former New York state tax department worker was accused of stealing the identities of thousands of taxpayers and running up more than $200,000 in fraudulent charges. Walter Healey gathered credit card, brokerage account and Social Security numbers that he used to open more than 90 credit card accounts and lines of credit between 2006 and 2008, prosecutors said.
1 - 11 of 11
Showing 20 items per page