Skip to main content

Home/ Indie Nation/ Group items tagged old

Rss Feed Group items tagged

John Lemke

OverDrive Dumps WMA, Announces all Audiobooks Sold to Libraries Will be in MP3 Format - 0 views

  • The MP3s do not have DRM (Digital Rights Management), as the WMA formatted books do.
  • OverDrive told librarians that it will work with them to get libraries' old WMA format books converted for free.
  • This is in response to user preferences,
  •  
    Quote "This is in response to user preferences" ... also of note they are going to work with libraries on getting the old WMA converted.
John Lemke

Man Arrested for Urinating on Dunkin Donuts Counter - WJW - 0 views

  •  
    ALLIANCE, Ohio A 19-year-old man was taken into custody early Sunday morning after police say he urinated on the counter and carpet at a Dunkin Donuts in Alliance. According to an arrest report filed on the incident, James Dobran, 19, was arrested at 1:30 am after police received a call from employees at the store claiming Dobran had exposed himself and urinated on the counter and floor of the business.
John Lemke

Man High On Bath Salts Calls Cops About Imaginary Intruders | Scene and Heard: Scene's ... - 0 views

  •  
    31-year-old Lucas Kocab called the cops around dinnertime on February 17 because there were 30 intruders in his house. The police arrived to find exactly zero intruders, but did find Kocab frantically running around and "acting paranoid." He told the cops that the intruders were intentionally blending in with chairs and trees, incognito-like, so that no one could see them. But he could see them. He knew they were there. Those 30 invisible ninjas weren't putting anything over on our brave hero.
John Lemke

White House releases trusted Internet ID plan - security, government, Google, Gary Lock... - 0 views

  •  
    The U.S. government will coordinate private-sector efforts to create trusted identification systems for the Internet, with the goal of giving consumers and businesses multiple options for authenticating identity online, according to a plan released by President Barack Obama's administration. The National Institute of Standards and Technology (NIST) will work with private companies to drive development and adoption of trusted ID technologies, White House officials said. The National Strategy for Trusted Identities in Cyberspace (NSTIC), released by the Department of Commerce on Friday, aims to protect the privacy and security of Internet users by encouraging a broad online authentication market in the U.S. "The fact is that the old password and username combination we often use to verify people is no longer good enough," Commerce Secretary Gary Locke said at an NSTIC release event hosted by the U.S. Chamber of Commerce. "It leaves too many consumers, government agencies and businesses vulnerable to ID and data theft."
John Lemke

Man allegedly steals $100k coin collection then spends for face value on pizza and a mo... - 2 views

  • Garren denied the accusation back in May, telling police they, "didn't have any evidence against him," according to a report filed in Cowlitz County Superior Court.
  • But then Garren and Massman allegedly began using the coins at local establishments, spending them at face value, including a quarter that is estimated to be worth thousands of dollars. The Daily News reports the collection includes a variety of rare coins included Liberty Head quarters, Morgan dollars and several others dating back to the early 1800's, After police conducted their investigation, they now say the couple spend several 1930's coins at a Battle Ground area movie theater, using quarters worth between $5 and $68 each. Later on the same day, they then spend more of the coin collection at a local pizza restaurant, including a Liberty quarter with an estimated value between $1,100 and $18,500.
    • John Lemke
       
      I like the "but then" ... like he thought.. better ditch the evidence... no on will notice some of these coins are TWO centuries old"
John Lemke

Uroburos Rootkit: Most sophisticated 3-year-old Russian Cyber Espionage Campaign - The ... - 0 views

  • The researchers claimed that the malware may have been active for as long as three years before being discovered and appears to have been created by Russian developers.
  • The two main components of Uroburos are - a driver and an encrypted virtual file system, used to disguise its nasty activities and to try to avoid detection. Its driver part is extremely complex and is designed to be very discrete and very difficult to identify.
  • The virtual file system can’t be decrypted without the presence of drivers, according to the Gdata’s analysis explained in the PDF.
  • ...2 more annotations...
  • we assume that the group behind Uroburos is the same group that performed a cyberattack against the United States of America in 2008 with a malware called Agent.BTZ
  • The attacks carried out with Uroburos are targeting government institutions, research institutions, intelligence agencies, nation states, research institutions or companies dealing with sensitive information as well as similar high-profile targets. The oldest drivers identified by the researchers was compiled in 2011 is the evidence that the malware was created around three years ago and was undetected.
John Lemke

Snowden leak examines gaming as a terrorist propaganda and training tool | Ars Technica - 0 views

  • But those leaked documents also include an in-depth report on the potential for games to be used as recruitment, training, and propaganda tools by extremist organizations.
  • Even if, as the report says, "the line between the ‘virtual’ world and the ‘real’ world is blurring, and to some users may be non-existent," most of the game-related terrorist training and planning scenarios laid out here seem a lot less likely than plain old non-game-related options. In any case, the leak of this report and the scenarios it outlines show that the security apparatus is interested in online games as more than just a place to spy on potential enemy communications.
John Lemke

Hackers charged with stealing Xbox, 'Call of Duty,' and US Army secrets worth over $100... - 0 views

  • Four hackers have been jointly charged with conspiracies to commit computer fraud, copyright infringement, wire fraud, mail fraud, identity theft, and theft of trade secrets. Individually, they have been charged with counts of aggravated identity theft, unauthorized computer access, copyright infringement, and wire fraud.
  • The defendants, aged between 18 and 28, are believed to have stolen more than $100 million in intellectual property and other proprietary data from the likes of Microsoft Corporation, Epic Games, Valve, and even the US Army. This includes pre-release versions of Gears of War 3 and Call of Duty: Modern Warfare 3, Apache helicopter simulation software developed for the US army, and information about the Xbox One console. Two of the suspects have pleaded guilty, one of which is 22-year old David Pokora. His plea represents what may be the first conviction of a foreign-based individual for hacking into US businesses to steal trade secret information.
  • 18-count superseding indictment
John Lemke

Simply Scripts - Old Time Radio from the Golden Age of Radio - 0 views

  • Academy Award Theater: "The Maltese Falcon"
  • Academy Award Theater: The Great McGinty
  • Academy Award Theater: Brief Encounter
1 - 14 of 14
Showing 20 items per page