Skip to main content

Home/ Fabroa ICS2O/ Group items tagged Privacy

Rss Feed Group items tagged

Spider Man

New Xbox requires an always-on connection to block used games, says report | The Verge - 0 views

  •  
            It is being reported that the newest Xbox console will have online DRM (Digital Restrictions Management). DRM is technology that puts restrictions on media such as software, games, music, etc. that limits how the buyer is able to use and share the media that he or she bought. This means that the Xbox will always need to have an active internet connection to be able to use the games that you buy, even if the game itself does not require internet connection. The point of this is to prevent to prevent the resale of used games. However, this will mean that people can not share games with eachother, play if the internet goes out or they they do not have the internet at all. This will increase the sale of new games giving the companies more profits. However, this may backfire on Microsoft, as many gamers may not purchase the new console as a form of boycott, reducing Microsoft's profit until the DRM is removed. 
  •  
    This is a very great report, keep up the great work Spider Man
  •  
    Uncle Ben would be proud
janfrey reparejo

Greek Police Accused of Terrible Photoshop Job to Hide Evidence of Brutality - 0 views

  •  
    Photoshop is a software that is used by  It is used by  millions of graphic artists, print designers, visual communicators, and regular people like you. It's likely that nearly every picture you've seen ,such as posters, book covers, magazine pictures, and brochures has either been created or edited by Photoshop. they use Photoshop, because of imperfections in your face to make it more cleaner and your body to make you more skinnier or editing your picture to make illusion. But in this report a Greek police did a photoshop to hide an evidence to brutality. this Greek police will soon be in under investigation for attempting to airbrush out evidence of police abuse in the mugshots for four young men.  These men were arrested for an attempted for armed robbery, but the photos that were taken in the scene clearly shows that they were bleeding and bruised and several days after these mug shots however, shows that their in a better shape. The police defense, he did not admit that he changed the photo. This police has been accused treating immigrants and other prisoners like an animal. 
Kimberly Bueno

Like Elephants, Search Engines Never Forget | TechCrunch - 0 views

  •  
    Basically it's about search engines and how they have a long memory and how we don't think before we post. Our immoral and illegal act online, such as the negative tweets towards Obama. Basically saying that whatever you post is hard to take back even if it was something you once did years ago. (Which you probably even know) "The past is hard to escape" I agree. No matter what bad things you do, if you put something out there, someone will remember for long periods. Just like remembering those embarrassing moments in elementary. Although it's a good thing to make it hard to escape. Most youths and victims will eventually find it a huge mistake/regret.
Liam Liu

Satechi releases $40 mini router that fits in a purse, works as a repeater - 0 views

  •  
    Mini Router? Fits in Purse? Only $40?!  Is this even possible? Guess so. This Mini Router which can fit into a purse is only $40. It is being released by a company called Satechi and it works as a repeater. This Mini-Router gives you a private, 300 Mbps WiFi access from any hotel's wired internet, but can produce and redistribute a wireless signal anywhere else in the room. It can also work as a router stand-alone, or even as a bridge which will let you take an exisiting WiFi network, and make it basically your own with a different name, and potentially a different security code, useful in internet cafe's, hotels, even St. Elizabeth ;).
Javier Ayala

Get Ready To Lose Your Job | TechCrunch - 0 views

  •  
    This article i found is very interesting. It explains to us how people will begin to see many jobs being taken by machines and robots. An example of this given in the article is that Google is making self driven cars which may seem good but many jobs need people driving the cars themselves, like truck drivers and taxis. If vehicles could drive themselves many if not all of the people that drive vehicles will be out of work. Another example is the car insurance companies will charge more for vehicles that are driven manually which will make other companies either have this new technology on there cars or risk going out of business. The article also states that Moore's Law is now going faster and we can see these changes happening sooner. This new change will be great for many computer programmers or similar jobs but other people will have trouble finding a jobs
anthony garisto

Cyberwar Imperative: We Need A Next-Generation Internet - ReadWrite - 0 views

  •  
    With people becoming more tech savvy, the security and firewalls of major websites and servers are becoming just obstacles to hackers looking for valuable information these websites contain.  Michael Tchong suggests that we need a new internet, one built from the ground up. He says that China is far more advanced with technology and internet security than that of the United States and Canada. Some suggestions that Michael Tchong has made for this new internet is making the internet so secure that to hack it, you will need to be a genius with alot of time on your hands. He proposes that there should be a next-generation eye-recognition technology using a computer or mobile camera. This will help sites like Facebook and LinkedIn in their endless battle against identity fraud. Also he thinks that it should only be accessed by Americans for obvious reasons that the Chinese and other known hacking countries would try and destroy the new internet.  
Nicked -

The First Time the Public Ever Saw a Polaroid - 0 views

  •  
    The article is an excerpt from "Instant: The Story of Polaroid" by Christopher Bonanos. The Polaroid is described as 'that thing that happened before Instagram happened' in the comment proceeding the excerpt. The excerpt tells the tale of how the first Polaroid camera was revealed to the public in 1947 at a scientific meeting of the Optical Society of America by Edwin Land. It is a story of innovation and breakthrough. Previously, cameras would produce negatives on film which would be sent to labs, or developed in home-made darkrooms. This process was difficult, time consuming, and could potentially fail. The Polaroid would change all that. Land took a picture of himself and set a 50 second timer for it to develop. He described how a thick chemical reagent was being reacted with the negative, the same stuff that normally went down a darkroom drain. This was one of Land's biggest breakthroughs. With the 50 seconds up, he peeled back the print, revealing a sepia (or as we described it: a browned-up-a-notch) portrait of himself. This was monumental. A process which normally took a week was done in under a minute. The story of the instant camera raced across America, landing Land in the New York Times and Life magazine. This article relates to the present, where cameras are generally smaller and predominantly digital. As a class, we recently watched a video on micro-technology. Over the years, scientists and engineers have been on the constant struggle to make things smaller, faster, and more efficient. The camera is no exception. Today's cameras contain microchips and processors of their own, in a compact space. Recent Polaroids can print in colour. In a world driven by invention and innovation, many new things may be introduced in our life time. Perhaps one will be as impactful as the Polaroid camera.
Stephanie Bortolin

Social Bicycles Will Run on AT&T's Wireless Network - 0 views

  •  
    This article tells us about how riding a bike in the city will soon be easier than ever courtesy of two wheels and AT&T's wireless network for many big cities across the US. The bicycles will have built-in GPS using AT&T's wireless network to make the basic part of public bicycle renting possible-making sure they don't get stolen or abandoned in some unknown place. Also, smartphone users will be able to use an app to locate Social Bicycle racks nearby, as well as reserve bikes and unlock them from racks. Riders will then be capable to bike around the city and return the Social Bicycle at any rack located in the city. You can also rent a bicycle by using the smartphone app to reserve one. The app will automatically send your personalized pin to the rack, which will unlock the bicycle, checking out the bicycle in your name. It also has a cool feature where you can use the app to track stats like calories burned, emissions reduced, and dollars saved. There isn't any information yet on how much the bike rentals will cost. Social Bicycles will hit more cities at the beginning of 2013.
Stephanie Bortolin

3 Celebrity Hacks to Learn From - 1 views

  •  
    On the internet, it,s our responsibility to keep our personal lives private. This article is about how 3 celebrities got hacked, and how we can learn from it. The celebrities include Paris Hilton, who's phone got hacked and her personal information was posted. Scarlett Johansson had nude pictures of her, and lastly, Brett Favre who also had nude pictures of himself. We need to be aware of the fact that our personal information may be falling into the wrong hands. Celebrities have different lives than us, particularly those who have paparazzi who follow them around all day which means the information a celebrity chooses to keep on a digital device is in jeopardy. Imagine if someone was constantly trying to hack into your e-mail or social accounts to post embarrassing things about you? This is why we have to be careful about what we post online.
Dragos Penelea

How to Crack a Wi-Fi Network's WPA Password with Reaver - 1 views

  •  
    This post is on cracking Wi-Fi WPA passwords with "Reaver." Many people know that cracking a WEP password is fairly easy, so they use the more bulletproof WPA security protocol. Reaver is a program that exploits a security hole in wireless routers and can crack most routers' passwords with relative ease. First off, you will need the BackTrack 5 Live DVD. Download the Live DVD from BackTrack's download page and burn it to a DVD. Next, you need a computer with Wi-Fi and a DVD drive. Lastly, you need a nearby WPA-secured Wi-Fi Network. Using four steps you can hack into a WPA Wi-Fi Network. Step 1: Boot into BackTrack, Step 2: Install Reaver, Step 3: Gather the Router's information, and Step 4: Crack the WPA password to the Wi-Fi Network. Now I will explain how you can protect against Reaver attacks. Since the vulnerability lies in the implementation of WPS, your network should be safe if you can simply turn off WPS (or, even better, if your router doesn't support it in the first place), however Reaver may still be able to crack your password, even with WPS manually turned off. You could also set up MAC address filtering on your router (which only allows specifically whitelisted devices to connect to your network), but a sufficiently savvy hacker could detect the MAC address of a whitelisted device and use MAC address spoofing to imitate that computer. The good news is that there is a way to surely protect against Reaver. You can get the open-source router firmware DD-WRT installed on your router. Reaver has been tested on routers with this firmware and it was not able to crack the password. As it turns out, DD-WRT does not support WPS, so there's yet another reason to love the free router-booster.
Andrew Lieou

Iron Man 3 Trailer Is Ridiculously Amazing - 0 views

  •  
    In the movie Iron Man 3, Tony Stark, played by Robert Downey Jr., loses his entire life to a man named Mandarin, played by Ben Kingsley.  Iron Man loses all his suits and his entire private life and starts hunting for who was responsible for doing all this to him.  When he goes on this quest he needs everything at his disposal to help him and keep him from losing his cool.  This movie is going to continue where the Iron Man 1 and Iron Man 2 Movies left off.  Mandarin is a classic Iron Man enemy so to have him in Iron Man 3 is just mind blowing.  Iron Man 3 comes out May 3, 2013.
Adrian Ma

'Jesus' and 'Ninja' Infiltrate List of Worst Passwords | TechnoBuffalo - 0 views

  •  
    According to SplashData, a new list of "Worst Passwords of 2012" has been published and some of the new worst passwords include "jesus", "ninja", "welcome", and more. SplashData gets their information based on files containing millions of stolen passwords posted online by hackers. These are perhaps the worst passwords that can ever be used when protecting your account. The best passwords contain at least eight characters and uses a combination of numbers, letters, and even symbols. "password" remains the most used, but worst password ever. For some of my less important accounts, I too also have use the password "password".
Jizelle Pineda

38% of Children on Facebook Are Younger Than 12 - 0 views

  •  
    This article is about how 38% of children on Facebook are younger than 12 years old. I found this to be really shocking! Even though there are privacy settings for Facebook, you still have to be careful with the people you talk to. Another thing i found surprising was that 74% of parents are worried about their children's safety, yet they still let their children on Facebook. There are many things that parents have to look out for when their children are on Facebook. Including sexual predators and cyber bullying. Even though parents say they are concerned it doesn't show in the stats when there are 6 year olds on Facebook.  
  •  
    This article talks about how 38% of children on Facebook are younger than 12! There is an age restriction on Facebook, you must be at least over 13 to have an account. This shows how the generations have really evolved. Children under the age of 6 already have Facebook accounts! All parents are concerned about their children's safety but by allowing them to be on Facebook at an early age might be in more risk. Children can have sexual predators, expose too much information, talk to strangers and many more. I think that parents shouldn't be exposing their children to networking site at such an early age.
Jason Strassler

Privacy alert - The CIA wants to spy on you through your TV - 1 views

  •  
    This article notifies the world that the CIA wants to spy on you through your TV and has the means just to do so. Anytime you download a movie from Netflix to your television or turn on a Internet-based radio, you could be alerting people who you don't want or need watching you. The CIA organization will not need to plant bugs in homes or other places to spy on individuals because of coming advances in computer and Internet technology. Just by people purchasing and using new apps and various "connected" devices, people will essentially be bugging their own homes. The CIA agency and others will be able to "read" these and other gadgets from outside places to monitor via the Internet and perhaps even with radio waves outside your home. This is astonishing information and what makes it even more surprising is it can get worse, it the sense that everything, not just electronics, will be controlled by an app or chip, and will ultimately be viewed and seen by outside sources. This is a scary idea that can be put to action and that fact that we won't even be secure and safe in our homes because there may always be someone watching us and viewing what we are doing. I understand technology is helping us in our everyday lives, but I feel this is too far and the government is now using there means of advancing technology against society. They have the power and resources to possibly monitor and maybe to control what we go on the Internet or what we watch on TV and this will alter our once safe and comfortable environment to have the freedom to use technology how we like in our home.
Shirin Naghizadeh

Silence Your iPhone with Do Not Disturb and iOS 6's New Phone Features [IOS 6] - 0 views

  •  
    The new iPhone IOS'6 update includes Do Not Disturb and VIP attributes that allow consumers to enable features that suit their personal needs. With the Do Not Disturb aspect you are able to customise your phone so that incoming calls are received while your device is locked; giving you the option of able to avoid the call or accept it, with just a "simple text." And a bunch of other features that are supposedly supposed to make your life easier. People who constantly use apple products would be more comfortable when upgrading their systems because they actually use these attributes. Although to the average teen, it seems pointless and contradictory. With the Do Not Disturb feature, if someone can access your password then, they could change your settings. Therefore you wouldn't receive any calls! Apple entices people to keep upgrading their systems because they are a cooperate business.
Nicole Trezzi

Facebook Provides 56 New Gender Identity Options - ReadWrite - 0 views

  •  
    On the 13th of February, Facebook made a change to their gender identity on profiles. You can now choose from the existing "male" and "female" option, but now there are also 56 different gender identities. Some options include agender, cis, gender fluid, transgender, and neither. Not only did Facebook change the identity, you can now also control what your friends can refer you as- male, female or neutral (they/their). Facebook worked with a group of leading LGBT organizations to help select the new genders in the option, now the only thing people ask for in the comments of this official announcement is for Facebook to change the "Interested in" option.
  •  
    thoughts & opinions?
junewi

Official Blog: Chromebox, now for simpler and better meetings - 0 views

  •  
    This article talks about how people can now talk in conferences using chromebox. This will change how we work in our careers and create different kinds of jobs or make jobs more "smart".
  •  
    Make sure you lend some opinion and thoughts to your posts for full marks
Robert Augustynowicz

Government spying tools will worsen Internet security - experts - 0 views

  •  
    The United States governments is spying on everyone, and the easiest way to monitor people is through the internet. Many people believe that one day the US government's way of monitoring people will be shared with or found out by a criminal organization. I believe that although it is important for that US governments to put surveillance they should just monitory anyone suspicious. Also I believe that if they spy on everyone it will become easier to find and hack them back. Personally I would not care if a government was watching my every move on the internet because I have nothing to hide. Finally I believe that most people would sleep better if the Government would tell the population if their spying program was compromised.      
saintmichaeld

All Gmail will now use HTTPS, messages will be encrypted when moving inside Google | An... - 0 views

  •  
    Google is improving the security of their email application. Gmail is switching to https, and is looking at a more private future for its users. Sending messages over a secure https connection ensures no one can come in contact with a message. This now has become the default in all gmail practices. It is no longer an option like in 2010. In addition, emails sent will be encrypted, along with communication. This is the news that I actually liked hearing from google, most of the time it's them trying to steal our identities through google search and targeting ads towards us w/out permission.
« First ‹ Previous 81 - 100 of 113 Next ›
Showing 20 items per page