Skip to main content

Home/ 91.113 Exploring the Internet/ Group items tagged use

Rss Feed Group items tagged

P Krolak

When Gadgets Betray Us by Robert Vamosi - 0 views

  •  
    When Gadgets Betray Us gives us a glimpse into the secret lives of our gadgets and helps us to better understand-and manage-these very real risks. Technology is evolving faster than we are. As our mobile phones, mp3 players, cars, and digital cameras become more and more complex, we understand less and less about how they actually work and what personal details these gadgets might reveal about us. Robert Vamosi, an award-winning journalist and analyst who has been covering digital security issues for more than a decade, shows us the dark side of all that digital capability and convenience. Hotel-room TV remotes can be used to steal our account information and spy on what we've been watching, toll-booth transponders receive unencrypted EZ Pass or FasTrak info that can be stolen and cloned, and our cars monitor and store data about our driving habits that can be used in court against us.
P Krolak

Devs respond to Google Maps API limits - 0 views

  •  
    Google Maps has introduced usage limits. According to a blog post by Thor Mitchell, product manager, Google Maps API, developers must now reduce their usage below set limits, opt-in to paying for excess usage or purchase a Maps API Premier licence. Update: A Google spokesperson has provided .net with the following statement: "Non-profits are not subject to these usage limits. For example, a disaster relief map is not subject to the usage limits even if it has been developed and/or is hosted by a commercial entity. In addition we recommend that eligible non-profits apply for a Maps API Premier license through the Google Earth Outreach program. This provides a number of benefits, including the right to opt-out of advertising, higher quotas for Maps API web services, and technical support." "We understand that developers need time to evaluate their usage, determine if they are affected, and respond if necessary," said Mitchell, noting that enforcement will only occur as of early 2012. He reasoned as follows on the changes: "[For] continued growth in adoption of the Maps API we need to secure its long-term future by ensuring that even when used by the highest volume for-profit sites, the service remains viable." Developers we contacted were split on the decision. Matthew Budd of Yammayap told us he's "been using the Google Maps API for years and restrictions come and go". He said that Google realises its system is widely used and imposing restrictions is inevitable. "All this restriction does is clarify the reasoning behind using Google Maps as a solution and shouldn't affect general everyday usage, where a whole online application doesn't rely on it," he added, suggesting that if you do need to use Google Maps as the basis for a whole application for a client, it makes sense to purchase a Premier license to lift the restrictions.
Beibei Yang

New Facebook Trusted/HTTPS Settings Allow You To Browse Securely - 0 views

  • New Facebook Trusted/HTTPS Settings Allow You To Browse Securelyby Meghan Stabler on Thursday, January 27, 2011 at 2:40pmRecently there have been a number of simple hacks that allow your Facebook to be compromised. Today, Facebook announced a new feature that will help solve many of your security issues. You can now easily prevent that with this awesome (and long overdue) new feature from Facebook that allows you to browse the website securely. Spread the word! Why?  Because it’s optional and you have to enable it yourself ! To enable it simply go to the Account Security section of the Account Settings page and enable it. Note that I have tested this feature and should you use Facebook over a Corporate Network (VPN) and other similar secure access systems, not all images and photos will display due to the security layer in place.  Essentially it works by adding secure encryption to your browser, similar to when you’re checking out on an e-commerce website. This should become a DEFAULT setting for anyone who uses Facebook. Until it becomes the default setting make sure to protect yourself and change it today, it only takes a second… “Starting today we’ll provide you with the ability to experience Facebook entirely over HTTPS. You should consider enabling this option if you frequently use Facebook from public Internet access points found at coffee shops, airports, libraries, or schools,” the post says. “The option will exist as part of our advanced security features, which you can find in the Account Security section of the Account Settings page.” Using HTTPS may mean that some pages will take a little bit longer to load, and some third-party applications aren’t currently supported, the company said. The option is rolling out over the next few weeks. “We hope to offer HTTPS as a default whenever you are using Facebook sometime in the future,” the post says. “Every user’s Facebook page is unique and it’s been complex pulling together all the different parts,” said Facebook Chief Security Officer Joe Sullivan when asked what the time frame is to making HTTPS the default setting. “It’s an interesting technical challenge for the company.” Click here for more information on HTTPS After you modify that account setting you will notice that whenever you browse Facebook your browser bar will show “https://www.Facebook.com/“  and you should notice the LOCK graphic denoting that you are now browsing on a secure encrypted protection.  It will look something like this:  typically appearing in your browsers bottom right corner,this will vary by browser.  If you don’t see a lock, then you’re not protected.
    • Beibei Yang
       
      In Facebook, go to Account -> Account Settings -> Account Security, and check "Browse Facebook on a secure connection (https) whenever possible".
P Krolak

How US Government Spies Use Facebook (Updated) - 0 views

  •  
    The US Department of Justice this week released slides from a presentation deck titled Obtaining and Using Evidence from Social Networking Sites. The document was released in response to a Freedom of Information Act request by the Electronic Frontier Foundation (EFF). The DoJ presentation describes Facebook as much more co-operative with law enforcement requests for user information than Twitter and MySpace are. Update: Facebook's Barry Schnitt contests this interpretation of the document, says the company is resistant to illegitimate government requests for user information and offers one example of that resistance in a comment posted below. The document also explains to officers what the advantages of going undercover on social networking sites are. The EFF posted IRS training documents for using various internet tools as well, including Google Street View, but those were much tamer than the Justice file.
P Krolak

Exploring The Internet: 91- 113 Week 3 The Electronic Library and Advanced Searching th... - 1 views

  •  
    Week3  Using the Electronic Library and Finding Information on the Web The First Step, Readings: Read the 3rd Week of 91-113 Using the Electronic Library Searching for Material on the Web Hacking Google Searchs The Second Step Advanced Google Hacking Readings: The concept of Google hacking is to use Google's advanced search tools and data to find data in the "deep web".
michaelpenta

Amanda Palmer uses technology to promote her music - 3 views

Here is a email about making money using twitter http://www.hypebot.com/hypebot/2009/06/amanda-palmer.html and a video about using email and twitter to connect to her fans http://www.wired.com/und...

twitter socialnetwork SocialMedia 91.113 internet

started by michaelpenta on 02 Sep 11 no follow-up yet
P Krolak

Cleaning machines 'based on military robots' - 0 views

  •  
    Experts have been promising for decades to put a robot in everyone's home - and finally robots are beginning to make the transition from specialist to everyday use. Spencer Kelly discovers the similarities between robots used for cleaning and those used by soldiers in Afghanistan for a very different purpose.
P Krolak

Foreign hackers targeted U.S. water plant in apparent malicious cyber attack, expert says - 0 views

  •  
    And so it begins in the real world and not in a movie, or lab demo. This is a real attack on US infrastructure via the internet. Foreign hackers broke into a water plant control system in Illinois last week and damaged a water pump in what appears to be the first reported case of a malicious cyber attack damaging a critical computer system in the United States, according to an industry expert. On Nov. 8, a municipal water district employee in Illinois noticed problems with the city's water pump control system, and a technician determined the system had been remotely hacked into from a computer located in Russia, said Joe Weiss, an industry security expert who obtained a copy of an Illinois state fusion center report describing the incident. "This is a big deal," said Weiss. The report stated it is unknown how many other systems might be affected.
fgmart

Blown to Bits - 0 views

shared by fgmart on 02 Feb 11 - Cached
  •  
    This is a new book by Hal Abelson (a renowned computer scientist and computer science education researcher) and two others that delves into how pervasive use of computing is changing our world. It combines technological and sociological material. The full title is "Blown to Bits: Your Life, Liberty, and Happiness after the Digital Explosion." The book is used in UC Berkeley's "CS 0" introductory/non-majors course. It's a goldmine of material. It's published under a Creative Commons license, so you can buy a hard copy or just download the PDF. I am sure that you will find it valuable if you assign readings for any of the topics we have been discussing over the last few weeks.
P Krolak

Google Art Project -- A Visitor Guide - 1 views

  •  
    Google has put online some of the great art museums of the world. It has copied these museum's art collections. It also use it Street View approach use to create video tours of the associated museums. The site is located at -- http://www.googleartproject.com/
P Krolak

Robot wars 'still a long way off' - 0 views

  •  
    Despite the US Department of Defense once predicting that a third of US fighting strength would be composed of robots by 2015, experts warn that the machine wars seen in the movies will remain science fiction for quite some time yet.
P Krolak

Google Maps to charge for usage 31 October 2011 - 0 views

  •  
    Users of Google Map links for their websites will be charged for heavy usage of the service, it has been revealed. From 1 January 2012, Google will charge for the Google Maps API service when more than the limit of 25,000 map "hits" are made in a day. Websites, especially travel firms, use Google Maps to link customers to a view of the destinations they inquire about. Google is rumoured to be charging $4 per 1,000 views in excess of the limit.
P Krolak

'Nitro' Hackers Reportedly Attack Dozens of Companies in Chemical, Defense Industries ... - 0 views

  •  
    Hackers reportedly used an off-the-shelf computer attack created in China to compromise the computers of at least 48 companies, including in the chemical and defense industries -- an attack described as being similar to the notorious Stuxnet virus, if not as severe. The goal of the attacks, reported Monday by security software company Symantec, "appears to be to collect intellectual property such as design documents, formulas, and manufacturing processes." The purpose: "industrial espionage, collecting intellectual property for competitive advantage." Symantec dubbed the attack "Nitro" and said a total of 29 companies in the chemical industry were targeted, in addition to 19 in other sectors, starting in late July. Among the companies were some that develop materials used primarily in military vehicles. Read more: http://www.foxnews.com/scitech/2011/10/31/nitro-hackers-reportedly-attack-dozens-companies-in-chemical-defense-industries/?test=latestnews#ixzz1cTIClsp4
Beibei Yang

The untouchable Mean Girls - The Boston Globe - 0 views

  • Phoebe kept walking, past the abuse, past the can, past the white picket fence, into her house. Then she walked into a closet and hanged herself. Her 12-year-old sister found her.You would think this would give the bullies who hounded Phoebe some pause. Instead, they went on Facebook and mocked her in death.They told State Police detectives they did nothing wrong, had nothing to do with Phoebe killing herself.
  • “Things like this aren’t supposed to happen in South Hadley,’’ said Darby O’Brien, a high school parent, wondering why the bullies who tormented Phoebe are still in school. “And so instead of confronting the evil among us, the reality that there are bullies roaming the corridors at South Hadley High, people are blaming the victim, looking for excuses why a 15-year-old girl would do this. People are in denial.’’
P Krolak

Surveillence Society -- security and privacy in the Internet Age - 0 views

  •  
    The advance of wireless technology, smart sensors, and cloud computing have changed the government's approach to security in the face of 9-11 and global terrorism. The Internet is being used in ways we could not have imaged a decade ago. This powerpoint explores issues of surveillence, privacy, and evovling law in the context of world events.
P Krolak

Facial scanner breach at airport - 0 views

  •  
    Facial recognition gates at Manchester Airport were temporarily taken out of use after a couple walked through the scanners after swapping passports. It is believed the pair passed through the gates in Terminal One on the morning of 8 February. The UK Border Agency said they were stopped by the immigration officer supervising the gates afterwards.
P Krolak

Emotion sensor catches out liars - 0 views

  •  
    A sophisticated new camera system can detect lies just by watching our faces as we talk, experts say. The computerised system uses a simple video camera, a high-resolution thermal imaging sensor and a suite of algorithms. Researchers say the system could be a powerful aid to security services.
1 - 20 of 28 Next ›
Showing 20 items per page