Skip to main content

Home/ Collective Intelligence theory research/ Group items tagged defense

Rss Feed Group items tagged

Gonzalo San Gil, PhD.

Beware: Piracy Defense Lawyers Can Be "Trolls" Too - TorrentFreak [# ! Note] - 0 views

    • Gonzalo San Gil, PhD.
       
      # ! Copyright Enforcement is, sadly, corrupting The Law... ... The Justice... The Coexistence. # ! And, as You may see, it seems that everybody is benefiting from 'Piracy' (beyond the mentioned Defense Attorneys...): From Musicians for the extra promotion; Collecting Societies and Audiovisual Producers getting Grants from Governments and Governments themselves, acquiring 'extra control' over Media... and The Culture itself, promoting Censorship with the excuse of the 'Protection of The Intellectual Property'...
  •  
    " Ernesto on February 8, 2016 C: 37 News Every month hundreds of people are sued for sharing copyrighted media through file-sharing networks, mostly BitTorrent. This practice is big business for copyright holders and lawyers alike. Unfortunately, however, not all defense attorneys appear to have the best interests of their clients at heart."
  •  
    " Ernesto on February 8, 2016 C: 37 News Every month hundreds of people are sued for sharing copyrighted media through file-sharing networks, mostly BitTorrent. This practice is big business for copyright holders and lawyers alike. Unfortunately, however, not all defense attorneys appear to have the best interests of their clients at heart."
Gonzalo San Gil, PhD.

Linux Security Guide (extended version) - Linux Audit - 0 views

  •  
    "With so many articles about Linux security on the internet, you may feel overwhelmed by how to properly secure your Linux systems. With this guide, we walk through different steps, tools, and resources. The main goal is to have you make an educated choice on what security defenses to implement on Linux. For this reason, this article won't show any specific configuration values, as it would implicate a possible best value. Instead, related articles and resources will be available in the text. The goal is to make this guide into a go-to article for when you need to secure your Linux installation. If you like this article, help others and share it on your favorite social media channels. Got feedback? Use the comments at the bottom. This document in work in progress and last updated in September 2016"
  •  
    "With so many articles about Linux security on the internet, you may feel overwhelmed by how to properly secure your Linux systems. With this guide, we walk through different steps, tools, and resources. The main goal is to have you make an educated choice on what security defenses to implement on Linux. For this reason, this article won't show any specific configuration values, as it would implicate a possible best value. Instead, related articles and resources will be available in the text. The goal is to make this guide into a go-to article for when you need to secure your Linux installation. If you like this article, help others and share it on your favorite social media channels. Got feedback? Use the comments at the bottom. This document in work in progress and last updated in September 2016"
Gonzalo San Gil, PhD.

HTTPS is not a magic bullet for Web security | Ars Technica - 0 views

  •  
    "Some advocates present HTTPS as synonymous with "security"-but this is not semantics. by Scott Gilbertson - Jul 11, 2016 12:00 pm UTC"
  •  
    "Some advocates present HTTPS as synonymous with "security"-but this is not semantics. by Scott Gilbertson - Jul 11, 2016 12:00 pm UTC"
Gonzalo San Gil, PhD.

Internet Archive Seeks to Defend Against Wrongful Copyright Takedowns - TorrentFreak [#... - 0 views

  •  
    " By Andy on March 23, 2016 C: 25 Breaking As a non-profit library of millions of free books, movies, software and music, the Internet Archive has a keen interest in copyright law. In a submission to the U.S. Copyright Office the Archive says since the major studios often send invalid notices, they're suggesting a change in the law to allow content to remain up while disputes are settled."
  •  
    " By Andy on March 23, 2016 C: 25 Breaking As a non-profit library of millions of free books, movies, software and music, the Internet Archive has a keen interest in copyright law. In a submission to the U.S. Copyright Office the Archive says since the major studios often send invalid notices, they're suggesting a change in the law to allow content to remain up while disputes are settled."
Gonzalo San Gil, PhD.

Free DoS Attack Tools - blackMORE Ops - 0 views

  •  
    "Short for denial-of-service attack, a type of attack on a network that is designed to bring the network to its knees by flooding it with useless traffic. Many DoS attacks, such as the Ping of Death and Teardrop attacks, exploit limitations in the TCP/IP protocols. We will review some of the best and free DoS attack tools in this post."
  •  
    "Short for denial-of-service attack, a type of attack on a network that is designed to bring the network to its knees by flooding it with useless traffic. Many DoS attacks, such as the Ping of Death and Teardrop attacks, exploit limitations in the TCP/IP protocols. We will review some of the best and free DoS attack tools in this post."
Gonzalo San Gil, PhD.

How to Prosecute Abusive Prosecutors - The New York Times [# ! Sharing Justice mechanis... - 0 views

  •  
    "WHEN it comes to poor people arrested for felonies in Scott County, Miss., Judge Marcus D. Gordon doesn't bother with the Constitution. He refuses to appoint counsel until arrestees have been formally charged by an indictment, which means they must languish in jail without legal representation for as long as a year."
1 - 6 of 6
Showing 20 items per page